Document
stringlengths
87
1.67M
Source
stringclasses
5 values
Home » Blog » The Differences and Treatments for Type 1 and Type 2 Diabetes Type 1 and Type 2 diabetes are chronic diseases that affects glucose (blood sugar) getting to the various cells in the body. This disease is caused by either the pancreas not producing enough or insulin or because the cells do not respond to the insulin that the body does produce. There are two main types of diabetes and a few other less common types. Type 1 diabetes is when the body does not produce insulin in sufficient amounts, commonly known as ‘insulin-dependent’ diabetes. Type 2 diabetes is where the cells in the body do not adequately respond to insulin or when the level of insulin produced is not high enough. Classic signs of diabetes include weight loss, increased thirst and hunger and increased urination. These symptoms can be slow to come on or rapid dependent upon the severity and type of diabetes. There are also some long term symptoms and complications which mean the diabetes must be managed in a proper way to avoid damage to vital organs. In severe cases when blood sugar is too high or low the patient will be in a state of hyperglycemia or hypoglycemia. The causes of diabetes vary widely. While sometimes it is an inherited condition, Type 1 diabetes can be developed if the body does have some form of physiological change in the pancreas, cell mutations or infections. Type 2 diabetes is caused by lifestyle and diet although occasionally it can be attributed to genetics. All forms of diabetes have been treatable since insulin became available around 1920. Because of the seriousness of this disease, it is important that anyone who suffers has access to good and regular healthcare. Although it cannot be cured, it can be managed very successfully but usually involves some drastic lifestyle and dietary changes. Type 1 diabetes is managed and treated via insulin and sometimes combined with medication. Insulin allows blood sugar to be absorbed into the body and has to be injected into the body as it cannot be taken as a tablet or medicine. If it was swallowed in pill form it would be absorbed in the stomach before it could take effect. Regular tests of blood sugar are made through the day and insulin is injected if required. It is something that is easily managed so long as a person looks after their diet. When medication is required it is done so to help control diabetes and cannot and will not cure it. Once medication once is used, it is done so for the rest of the patient’s life. The medication is used to help maintain the diet and sugar levels although it cannot be used on its own. A dietary change is still required. Diet is the main way in which diabetes is controlled. Both type 1 and 2 require blood sugar levels to be maintained, monitored and controlled. Patients often have to severely limit the amount of sugary and carb based foods they eat. When they do alter their consumption of these foods, they will have to alter their insulin levels accordingly. Experience of dealing with diabetes will let a patient know when and how much they can eat. By not monitoring their glucose levels, they greatly increase the risks involved and chance of hyper or hypoglycemia setting in. While diabetes is very serious, it is also very manageable. The different types have different methods of being controlled, however, dietary change is the constant for both. Whilst eating lots of sugary foods will not cause diabetes it will have a dangerous effect on a person who has diabetes.
ESSENTIALAI-STEM
Page:Treatise on poisons in relation to medical jurisprudence, physiology, and the practice of physic (IA treatiseonpoison00chriuoft).pdf/112 Crampton; and Mr. Alfred Taylor has referred to several others, the stomachs of which are preserved in Guy's Hospital Museum, and gives the particulars of some which had occurred in the practice of that institution or to his friends. Occasionally no symptom exists prior to the perforation, as in an instance related by Dr. Kelly of a stout healthy servant, who was suddenly seized with excruciating pain in the stomach and expired in eighteen hours, and in whose body the stomach was found perforated in the middle of an extensive thickening and induration of the villous coat. The second variety of perforation takes place by simple ulceration without previous scirrhus. In one of Dr. Crampton's papers will be found some remarks by Mr. Travers, along with a case of this kind. The subject of it was a man of a strumous habit, who enjoyed good health, till one day at dinner he was suddenly attacked with acute pain in the pit of the stomach, and died in thirteen hours. The stomach was found perforated in the centre of a superficial ulcer of the mucous coat, occupying two-thirds of the ring of the pylorus. This case shows that the present variety of perforation may take place without the preliminary organic disease being indicated by any symptom. The circumstances under which it commenced are peculiarly important in relation to the medical jurisprudence of poisoning. Another case which has been lately described with great exactness by M. Duparcque, was preceded only by very trivial dyspeptic symptoms. Here the whole mischief arose from a small ulcer eight lines long and five in breadth on the inside of the stomach, and not more than a line and a half in diameter at the perforation through the peritonæum. Several excellent examples of the same disease have been related by Dr. Abercrombie. In one of these the ulcer in the centre of which the perforation had been formed, was not bigger than a shilling, and the rest of the stomach quite healthy. A very instructive case of a similar nature, but of unusual duration, has been related by Mr. Alfred Taylor. A young woman, after suffering for some time from nausea and constant craving for food, but inability to indulge it, and occasionally from pain in the stomach, was attacked suddenly with the usual symptoms of perforation, and died forty-two hours afterwards. The villous coat of the stomach, though generally healthy, presented at the lesser curvature several small elevated points, and in the middle of two of these a sharply-defined ulcer, one affecting the mucous coat only, while the other, which was half an inch in diameter where it affected the mucous coat, perforated the muscular and peritonæal coats by a hole no bigger than a crow-quill. A case still more remarkable has
WIKI
What I Can Teach You About Services Sports Massage Eastern Suburbs: Reasons to Book an Appointment! Massaging is a popular technique used in helping people who have muscle or bone pains. It is about a skillful pattern of pressing muscles to help them relax and recover from pain and stress. Massaging dates to thousands of years ago and has been in existence throughout the human civilizations. Modern day doctors have confirmed that it actually works and this may explain why the ancient people were fond of it. There are several types of massage techniques, and they all depend on where they originated from. The Japanese shiatsu is probably the most popular and this explains why it is even offered by robots. Yet, the human massage is still the most effective,. Below are reasons to have a sports massage in Cogee. A massage for pregnant women Most pregnant women often find it difficult to walk and work due to the intensive pains at specific parts of their body. The body carries unusual weight resulting from the pregnancy and this makes the legs, back and abdomen area to feel pain at times. A pregnancy massage is necessary for a couple of reasons. One, it will make you find walking easier than before. Lest you forget, the majority of body weight is felt at the back and legs. This makes them find it hard to operate as easily as they’d have done without the weight. The addition of weight is likely to make pregnant women a little sluggish; but, after the massage, the muscles are revitalized and are ready to function seamlessly. Improve circulation A massage makes anyone who has had a stressful day at work or is feeling pain as a result of strenuous exercises. Remember, the body relies on your muscles for movement. So, if there is pain in your muscles, it is likely that you will not have the right flexibility. Getting a professional sports’ massage after a strenuous activity will help your muscles relax, revitalize and improve blood flow therein as well. Circulation is an important function in your body and health. It is one of the most crucial part of human life and any setback in blood flow means you’d be in danger. The circulatory system works independently of other organ systems- but not entirely! The myogenic nature of the system can be influenced by the condition of the muscles. Just like a water flows in a pipe or tunnel, blood goes through the arteries and capillaries. If the muscles are not in their right position, they could easily press capillaries and this would hinder proper blood flow. Massaging these muscles makes them to stay in their right place and shape and this allows blood to flow seamlessly, taking nutrients and healing agents where they are needed. The Art of Mastering Wellness Understanding Services Related posts
ESSENTIALAI-STEM
空間識 : 高さと身体の平衡(臨床例を中心に) Spatial Orientation : Height and Body Balance in Clinical Subjects この論文にアクセスする この論文をさがす 著者 抄録 Twelve normal adults, 50 patients with inner ear lesions and 33 patients with dizziness were examined by stabilometer to see how height affects spatial orientation especially on body balance.<BR>The subjects were requested to stand still on the stabilometer for 30 sec with eyes open and fixed on a target 2.1 m in front of the subject, and again with eyes closed in darkness. The total length and area of stabiolometry were measured while standing for 30 sec on the floor, and on a bed elevated 83 cm above the floor.<BR>1. The total length and the area showed no significant difference between standing on the floor and standing on the bed in normal subjects.<BR>2. In cases of inner ear lesions and of dizziness, there were significant differences in the total length of gravity movements between standing on the floor and on the bed, both with eyes open and with eyes closed. There were no significant differences in the area of the stabilometry.<BR>3. There were no significant differences between patients with inner ear lesions and those with dizziness when they were standing on the floor or on the bed elevated 83 cm above the floor. 収録刊行物 • Equilibrium research Equilibrium research 57(5), 536-541, 1998-10-01 一般社団法人 日本めまい平衡医学会 参考文献:  12件中 1-12件 を表示 各種コード • NII論文ID(NAID) 10008711595 • NII書誌ID(NCID) AN00001485 • 本文言語コード JPN • 資料種別 ART • ISSN 03855716 • データ提供元 CJP書誌  J-STAGE  ページトップへ
ESSENTIALAI-STEM
FURMANITE AMERICA, INC., Plaintiff, v. T.D. WILLIAMSON, INC., TDW Services, Inc., Greg Foushi, Jose Delgado, Saul Ferrer, James Jackson, Robert Jolin, Michael Mainelli, Rebecca Minervino, James Overstreet, Robert Schmidt, Nicole Turner, John Foushi and Bryan McDonald, Defendants. No. 6:06-cv-641-Orl-19JGG. United States District Court, M.D. Florida, Orlando Division. April 11, 2007. Daniel W. Matlow, Thomas K. Gallagher, Ruden, McClosky, Smith, Schuster & Russell, PA, Ft. Lauderdale, FL, for Plaintiff. Richard D. Tuschman, Epstein Becker & Green, P.C., Neil F. McGuinness, Miami, FL, for Defendants. ORDER FAWSETT, Chief Judge. This case comes before the Court on the following: 1. Motion for Summary Judgment (with Incorporated Memorandum of Law), filed by Defendants T.D. Williamson, Inc., TDW Services, Inc., and Bryan McDonald on December 29, 2006; (Doc. No. 101); 2. Former Employees’ Motion for Summary Judgment (with Incorporated Memorandum of Law), filed by Defendants Greg Foushi, Jose Delgado, Saul Ferrer, James Jackson, Robert Jolin, Michael Mainelli, Rebecca Minervino, James Over-street, Robert Schmidt, Nicole Turner, and John Foushi on December 29, 2006; (Doc. No. 102); 3. Plaintiffs Response to Defendants, T.D. Williamson, Inc., TDW Services, Inc., and Bryan McDonald’s, Motion for Summary Judgment, filed by Plaintiff Furmanite America, Inc., (“Furmanite”) on January 29, 2007; (Doc. No. 119); and 4. Plaintiffs Response to Former Employees’ Motion for Summary Judgment, filed by Furmanite on January 30, 2007. (Doc. No. 120). Background Furmanite and T.D. Williamson, Inc. are both firms which operate in the industrial pipeline repair industry. Prior to December of 2005, Furmanite employed Defendants Greg Foushi, Jose Delgado, Saul Ferrer, James Jackson, Robert Jolin, Michael Mainelli, Rebecca Minervino, James Overstreet, Robert Schmidt, Nicole Turner, John Foushi as employees in its Orlando, Florida service center. (E.g., Doc. No. 61, ¶ 24). On March 31, 2006, Greg Foushi, Jose Delgado, Saul Ferrer, James Jackson, Robert Jolin, Michael Mainelli, Rebecca Minervino, James Overstreet, Robert Schmidt, and Nicole Turner all resigned from their employment with Fur-manite, allegedly without providing any advance notice of their resignations and leaving Furmanite’s Orlando office without staffing. (Id. at ¶ 31). On or about April 3, 2006, these individuals interviewed and completed paperwork to become employees of T.D. Williamson. (E.g., id. at ¶ 35; Doc. No. 101, p. 8, ¶ 12). The employees brought various items with them to T.D. Williamson. An employee for T.D. Williamson arranged to have a U-Haul truck pick up the employees’ materials. (E.g., Doc. No. 120-31, pp. 7-8). It is undisputed that one of the items Greg Foushi and Michael Mainelli brought with them to T.D. Williamson from Furmanite is the ACT Database, a contact management software program. (E.g., Doc. No. 101, p. 9, ¶ 15). The crux of the instant case is an alleged conspiracy on the part of the corporate and individual Defendants to cripple Fur-manite’s Orlando office by having the former employees simultaneously resign on March 31, 2006 while also removing Fur-manite’s property and engaging in trade slander by disparaging Furmanite to its customers. (See generally Doc. No. 61). Furmanite alleges that Defendants’ actions amount to tortious interference with business relationships, (Count I), Trade Slander, (Count II), a violation of Section 688.001 et seq., Florida Statutes, (Count III), breach of confidentiality agreements, (Count IV), conversion, (Count V), a violation of the Florida Unfair and Deceptive Trade Practices Act, (Count VI), economic boycott, (Count VII), civil conspiracy, (Count VIII), and a breach of the duty of loyalty on the part of John and Greg Fou-shi. (Count IX). TDW and the individual Defendants deny the above allegations, and Defendants Greg Foushi and Michael Mainelli counterclaim for breach of contract and unpaid commissions. (See gener ally Doc. Nos. 65, 66). TDW and the individual Defendants each move for summary judgment on all Counts of the Amended Complaint, arguing that no genuine issue of material fact exists and that Defendants are entitled to judgment as a matter of law. In the alternative, Defendants ask for partial summary judgment on those claims for which no genuine issue of material fact is present. Furmanite argues in response that genuine issues of material fact exist for all Counts of the Amended Complaint. Standard of Review Summary judgment is authorized “if the pleadings, depositions, answers to interrogatories, and admissions on file, together with the affidavits, if any, show that there is no genuine issue as to any material fact and that the moving party is entitled to a judgment as a matter of law.” Fed.R.Civ.P. 56(c); Anderson v. Liberty Lobby, Inc., 477 U.S. 242, 248, 106 S.Ct. 2505, 91 L.Ed.2d 202 (1986). Summary judgment is appropriate only in circumstances where “the evidence is such that a reasonable jury could [not] return a verdict for the nonmoving party.” Id. The moving party bears the burden of proving that no genuine issue of material fact exists. Celotex Corp. v. Catrett, 477 U.S. 317, 323, 106 S.Ct. 2548, 91 L.Ed.2d 265 (1986). In determining whether the moving party has satisfied its burden, a court considers all inferences drawn from the underlying facts in the light most favorable to the party opposing the motion and resolves all reasonable doubts against the moving party. Anderson, 477 U.S. at 255, 106 S.Ct. 2505. A court may not weigh conflicting evidence or weigh the credibility of the parties. See Hairston v. Gainesville Sun Pub. Co., 9 F.3d 913, 919 (11th Cir.1993) (citation omitted). If a reasonable fact finder could draw more than one inference from the facts, and that inference creates an issue of material fact, then a court must not grant summary judgment. Id. (citation omitted). Once a movant who does not bear the burden of proof on the pertinent claim or defense satisfies its initial burden under Rule 56(c) of demonstrating the absence of a genuine issue of material fact, the burden shifts to the party bearing the burden of proof on the pertinent claim or defense to come forward with specific facts showing that there is a genuine issue for trial. Fitzpatrick v. City of Atlanta, 2 F.3d 1112, 1115-17 (11th Cir.1993); see also Matsushita Elec. Indus. Co. v. Zenith Radio Corp., 475 U.S. 574, 587, 106 S.Ct. 1348, 89 L.Ed.2d 538 (1986). The non-movant must demonstrate that there is a material issue of fact that precludes summary judgment. Clark v. Coats & Clark, Inc., 929 F.2d 604, 608 (11th Cir.1991). “A mere ‘scintilla’ of evidence supporting the [nonmoving] party’s position will not suffice; there must be enough of a showing that the jury could reasonably find for that party.” Walker v. Darby, 911 F.2d 1573, 1577 (11th Cir.1990) (citing Anderson, 477 U.S. 242, 106 S.Ct. 2505, 91 L.Ed.2d 202). “[T]he nonmoving party may avail itself of all facts and justifiable inferences in the record taken as a whole.” Tipton v. Bergrohr GMBH-Siegen, 965 F.2d 994, 998 (11th Cir.1992) (citing United States v. Diebold, Inc., 369 U.S. 654, 655, 82 S.Ct. 993, 8 L.Ed.2d 176 (1962)). All justifiable inferences are to be drawn in favor of the non-movant, and the evidence presented by the non-movant is to be believed by the court. Tipton, 965 F.2d at 999 (quoting Anderson, 477 U.S. at 255, 106 S.Ct. 2505) (citing Adickes v. S.H. Kress & Co., 398 U.S. 144, 158-159, 90 S.Ct. 1598, 26 L.Ed.2d 142 (1970)). Where the record taken as a whole could not lead a rational trier of fact to find for the non-moving party, there is no genuine issue of material fact remaining for trial. Matsushita, 475 U.S. at 587, 106 S.Ct. 1348 (citing First Nat’l Bank of Ariz. v. Cities Serv. Co., 391 U.S. 253, 289, 88 S.Ct. 1575, 20 L.Ed.2d 569 (1968)) (internal quotation marks omitted). Analysis A. License Defendants seek summary judgment on Furmanite’s claims for lost business opportunities in Counts I through VIII, arguing that Furmanite cannot legally recover such damages because it was not licensed to perform “line stop” and “wet tap” services, and thus that it could not legally undertake these jobs under Section 489.128, Florida Statutes. This argument is not well taken. First, an issue of fact exists as to whether Furmanite possessed a valid license. It is undisputed that prior to the resignation of John Foushi, Furmanite had no licensing problems because John Foushi was a licensed, qualified individual under Florida law. (E.g., Doc. No. 101, p. 10; Doc. No. 119, pp. 7-8). Furmanite claims, and John Foushi admits, that he granted Furmanite permission to use his license after he retired from the company. (Doc. No. 119-6, p. 7). However, John Foushi claims, and Furmanite denies, that he granted such permission with a condition that Furman-ite’s right to use his license would expire if his son, Greg Foushi, ever left the company. (E.g., Doc. No. 119-6, pp. 7-8; Doc. No. 119-5, p. 2). Thus, an issue of fact exists as to the scope of the agreement between John Foushi and Furmanite regarding Furmanite’s right to use the Fou-shi license after the resignation of Greg Foushi. Furthermore, TDW offers no evidence that Furmanite’s claims for lost business opportunities encompass only claims for work for which a license was required. Section 489.128 only bars unlicensed contractors from enforcing contracts for work requiring a license. § 489.128, Fla. Stat. (2006). A license is not required for all potential work a contractor could conceivable undertake. See, e.g., id. at § 489.128(b) (“if no state or local license is required for the scope of work to be performed under the contract, the individual performing that work shall not be considered unlicensed.”). In fact, an employee of TDW testified that its qualifying individual does not live in the State of Florida and only oversees one or two projects per year. (Doc. No. 119-10, p. 3). Construing all reasonable inferences in favor of the non-moving party, Furmanite could have suffered lost business opportunities for which a license was not required even if it had no permission to use the Foushi license. For these reasons, the Court will deny Defendants’ motion for summary judgment as to the licensing issue. B. Trade Slander Count II of the Amended Complaint avers that all Defendants are liable for trade slander for making false statements to other persons regarding the condition of Fur-manite’s business and its ability to perform contracts. (Doc. No. 61, p. 9). Defendants deny such allegations and argue that there is no evidence of trade slander in the instant case. To recover for slander or libel under Florida law, a plaintiff must demonstrate 1) that the defendant published a false statement; 2) about the plaintiff; 3) to a third party; and 4) the party suffered damages as a result of the publication of the statement. E.g., Thompson v. Orange Lake Country Club, Inc., 224 F.Supp.2d 1368, 1376 (M.D.Fla.2002); Valencia v. Citibank Int’l, 728 So.2d 330, 330 (Fla. 3d DCA 1999). In its memorandum in opposition, Furmanite argues it has evidence of two statements made by Greg Foushi to potential clients that Furmanite had gone “bankrupt.” It offers no evidence or argument as to alleged slanderous statements made by any Defendant other than Greg Foushi, or the existence of an agreement or plan between the Defendants regarding these alleged statements. After examining the record, the Court agrees with Defendants that there is no genuine issue of material fact concerning this claim as to Defendants other than Greg Foushi and that Defendants T.D. Williamson, Inc., TDW Services, Inc., Bryan McDonald, Jose Delgado, Saul Ferrer, James Jackson, Robert Jolin, Michael Mainelli, Rebecca Minervino, James Overstreet, Robert Schmidt, Nicole Turner, and John Foushi are entitled to judgment as a matter of law on Furmanite’s trade slander claim. Summary judgment must also be granted in favor of Greg Foushi, as there is no evidence in the record that Greg Foushi ever made a knowingly false statement about Furmanite. Furmanite argues that Greg Foushi told Daniel Salmas of Poole & Kent Construction Company that Furman-ite had gone bankrupt. (Doc. No. 120, p. 11). However, there is no support for this contention in the record. Daniel Salinas testified that Greg Foushi told him that Flowserve Corporation “no longer existed.” (Doc. No. 120-30, p. 4). Furmanite has presented no evidence that Greg Fou-shi ever said anything about Furmanite’s solvency or its ability to service it customers, and Greg Foushi confirmed this in his deposition. (Doc. No. 120-2, p. 18). In fact, the only evidence of any statement made by Greg Foushi about Furmanite was the factual statement made in mid-April of 2006 that the former employees had resigned. (Id.) Thus, since Furmanite has presented no evidence of any false statement about Furmanite published by Greg Foushi or any other Defendant, the Court will grant summary judgment as to all Defendants on Count II of the Complaint. C. Misappropriation of Trade Secrets Count III of the Amended Complaint alleges that Defendants, with the exception of John Foushi and Bryan McDonald, misappropriated trade secrets in violation of Section 688.001, et seq., Florida Statutes. For the reasons that follow, the Court finds that genuine issues of material fact exist and that summary judgment is not warranted on this Count. Defendants do not dispute that the former employees took the following items with them to TDW after their resignation on March 31, 2006: 1) customer lists within the ACT database, a contact management software program used by Greg Fou-shi and Michael Mainelli; 2) a log of quotes for “hot-tapping” and “line-stopping” services; and 3) computer files and contracts. (E.g., Doc. No. 102, pp. 8-11). In order to prevail on a claim for misappropriation of trade secrets under Florida law, a plaintiff must demonstrate that the defendants misappropriated secret information from the plaintiff of which the plaintiff made reasonable efforts to maintain the secrecy, resulting in damages. See § 688.004, Florida Statutes; Lee v. Cercoa, Inc., 433 So.2d 1, 2 (Fla. 4th DCA 1983). Information that is generally known or readily available to third parties generally cannot qualify for trade secret protection under Florida law. American Red Cross v. Palm Beach Blood Bank, Inc., 143 F.3d 1407, 1410 (11th Cir.1998). Defendants argue that Furmanite cannot demonstrate ownership of the ACT database, cannot demonstrate that any of the other alleged documents constitute a trade secret, and likewise cannot show that it took sufficient steps to protect any of the taken information. While Defendants may be able to demonstrate such points at trial, the Court finds that Defendants have not demonstrated that no genuine issue of material fact exists with regard to these highly fact-specific allegations. Courts are extremely hesitant to grant summary judgment regarding the fact-intensive questions of the existence of a trade secret or whether a plaintiff took reasonable steps to protect its trade secrets. “The term ‘trade secret’ is one of the most elusive and difficult concepts in the law to define. The question of whether an item taken from an employer constitutes a ‘trade secret,’ is of the type normally resolved by a fact finder after full presentation of evidence from each side.” Lear Siegler, Inc. v. Ark-Ell Springs, Inc., 569 F.2d 286, 289 (5th Cir.1978); see also Learning Curve Toys, Inc., v. PlayWood Toys, Inc., 342 F.3d 714, 723 (7th Cir.2003). Courts have previously found an ACT database and information such as that contained in quote logs can contain confidential, trade secret information. E.g., Merrill Lynch, Pierce, Fenner & Smith Inc. v. Dunn, 191 F.Supp.2d 1346, 1352 (M.D.Fla.2002); Thomas v. Alloy Fasteners, Inc., 664 So.2d 59, 59 (Fla. 5th DCA 1995); Conseco Finance Serv. Corp. v. North American Mortgage Co., 381 F.3d 811, 819-20 (8th Cir.2004). Summary judgment is likewise inappropriate in the instant case, as issues of fact exist regarding Furmanite’s claims. First, a “full presentation of evidence” from each “side” is required regarding whether the ACT database and quote log constitute a trade secret. Defendants argue that the information in the quote log is not a trade secret because none of the information was provided by Furmanite. Defendants further claim that the information in the ACT database is not a trade secret because Greg Foushi and Michael Mainelli entered the information themselves, and the names and contact information are available from other sources. Such arguments are insufficient to demonstrate the absence of a genuine issue of material fact. Furthermore, Furmanite has presented evidence that information in the quote log and ACT database was provided to the employees by Flowserve, Furmanite’s predecessor and the company whose records Furman-ite purchased. (Doc. No. 120-2, pp. 29-30). Thus, summary judgment is not appropriate on this issue. Defendants next argue that neither Fur-manite nor its predecessors made sufficient effort to claim ownership of the ACT database. (Doc. No. 102, p. 9). However, Defendants point to no specific instances of Greg Foushi or Michael Mainelli ever claiming ownership of such database to Furmanite or of Furmanite or its predecessor disclaiming ownership of the ACT database. This, without more, is insufficient to demonstrate that the database was not the property of the employer, Furman-ite. Defendants further argue that Furman-ite did not take sufficient steps to protect the confidentiality of the information contained in the ACT database, the quote log, or in Furmanite’s computer or paper files. However, Furmanite had each Defendant execute a confidentiality agreement which prohibited the dissemination of, inter alia, customer files, computer records, and financial data. (See, e.g., Doc. No. 120-9). Defendants point to no instance where Furmanite allowed its employees to disclose any of the above information to third parties. In fact, Greg Foushi and Michael Mainelli testified that they did not share the information in the ACT database and did not know if the two databases they respectively used were identical. (Doc. No. 120-2, pp. 26-28; Doc. No. 120-13, p. 13). Furthermore, Defendants’ contentions are belied by the fact that as soon as the quote log was discovered at TDW, it was immediately returned the following day. (Doc. No. 120-27, pp. 3-4). Based on the limited evidence presented, the Court cannot conclude as a matter of law that the measures taken by Furmanite did not give the employees reason to know that Furmanite intended or expected the secrecy of such information be maintained. Next, Defendants appear to argue that partial summary judgment is warranted because TDW never used the information contained in the quote log or allegedly missing files. Furmanite argues that sufficient evidence exists on this issue to survive summary judgment, and also that use of the trade secret is not required. If Furmanite cannot show at trial that TDW used any of the information in the quote log or missing files or that Furmanite suffered any damages in the actual loss of such materials, Furmanite cannot recover for the misappropriation of such material even if it demonstrates that the materials constituted a trade secret. However, Defendants have not met their burden of demonstrating that no use of the information took place in the instant case. TDW possessed the quote log for nineteen (19) days before returning it to Furman-ite, and Furmanite alleges that some information from their files is still missing. Considering the facts of the instant case and construing all reasonable inferences in favor of the non-movant, the Court cannot conclude as a matter of law that no use of the information occurred. Lastly, Defendants argue that there is no evidence that any computer files were taken by the former employees. However, Furmanite’s corporate representative stated that files were missing the day the employees left. (E.g., Doc. No. 119-12, pp. 4, 5). Thus, an issue of fact also exists as to misappropriation of Furmanite’s files. For these reasons, the motions for summary judgment on Count III of the Complaint are denied. D. Breach of Confidentiality Agreements Count TV of the Amended Complaint avers that Defendants, with the exception of Bryan McDonald, are all liable for breaching the confidentiality agreements between the former employees and Furmanite. (Doc. No. 61, p. 11). Defendants contend that summary judgment must be granted as to all Defendants. The Court finds that summary judgment must be granted in favor of TDW but denied as to the individual Defendants named in the Complaint except for Bryan McDonald. As TDW points out, corporate defendants T.D. Williamson, Inc, and TDW Services, Inc. were never parties to a confidential agreement with Furmanite. Furmanite concedes this point and further concedes that Count TV was not meant to be directed toward the corporate Defendants. (Doc. No. 119, p. 19). Thus, the Court will grant summary judgment on Count IV in favor of TDW. However, summary judgment is not warranted with respect to the remaining individual Defendants named in Count IV. The former employees argue, as they did with respect to Count III, that they are entitled to judgment as a matter of law because Furmanite cannot establish that any information obtained from the formér employees was a trade secret, that any information was misappropriated, that it has suffered any damages, or that any information was used or shared by the former employees or TDW. (Doc. No. 102, p. 19). For the reasons explained above, numerous issues of fact exist as to these defenses which make summary judgment inappropriate. Furthermore, unlike a trade secrets claim, Furmanite need not prove that the former employees or TDW used the removed information in order to prevail on a claim for breach of the confidentiality agreement, as the agreement does not limit damages to this situation. (See Doc. No. 120-9). Thus, Defendants’ contention that no information was shared with TDW is not determinative of this issue. For these reasons, the Court will deny the former employees’ motion for summary judgment on Count IV. E. Conversion In Count V of the Amended Complaint, Furmanite alleges conversion claims against all Defendants for the misappropriation of its electronic and paper files, equipment, and “the value of Furmanite’s Orlando service center.” (Doc. No. 61, pp. 11-12). Defendants claim that summary judgment must be granted as to all Defendants as there is no evidence of conversion. Defendants also argue that Florida law does not recognize a conversion claim for the value of Plaintiffs service center. (Doc. No. 102, pp. 19-21). Under Florida law, conversion is an intentional tort consisting of an unauthorized act which deprives another of his property, permanently or for an indefinite time. E.g., Senfeld v. Bank of Nova Scotia Trust Co. (Cayman) Ltd., 450 So.2d 1157, 1160-61 (Fla. 3rd DCA 1984) (footnote omitted) (citing Star Fruit Co. v. Eagle Lake Growers, Inc., 160 Fla. 130, 33 So.2d 858 (1948) (en banc)). The essence of the tort is not the acquisition of the property; rather, it is the wrongful deprivation of the property. Star Fruit Co., 33 So.2d at 860. In the case at bar, summary judgment must be granted on Furmanite’s conversion claim for the value of its Orlando office as to all named Defendants, but denied with respect to its claims for conversion of files and equipment. Thus, the Court will grant partial summary judgment on Count V of the Complaint. There is no genuine issue of material fact with regard to Furmanite’s conversion claim for the value of its Orlando office. As Defendants point out, there is no evidence that TDW or the former employees ever acted to deprive Furmanite of its Orlando service center. Having satisfied its initial burden under Rule 56(c) of demonstrating the absence of a genuine issue of material fact, the burden shifts to Fur-manite to come forward with specific facts showing that there is a genuine issue for trial. Fitzpatrick, 2 F.3d at 1115-17. Furmanite has not done so, arguing only that circumstantial evidence exists to survive summary judgment on all conversion claims. Furthermore, summary judgment is appropriate on this issue because Florida law does not recognize a claim for conversion of the value of a business under the instant circumstances. Courts have generally been hesitant to extend common law actions for conversion further than to claims for the misappropriation of a tangible chattel or the misappropriation of intangible rights which are identified or merged in a document or other tangible chattel. See, e.g., In re Estate of Corbin, 391 So.2d 731, 733 n. 1 (Fla. 3d DCA 1980); Ippolito v. Lennon, 150 A.D.2d 300, 303, 542 N.Y.S.2d 3 (N.Y.App.1989). Furmanite cites solely to the Corbin case for support that its claim can survive summary judgment. However, in Corbin, Florida’s Third District Court of Appeal held that an action for conversion may be brought for the intangible interests in a business venture where the personal representative of an estate unlawfully sold the estate’s business to a third party and kept the consideration for the transfer. Thus, the Court reasoned, an action for conversion should be allowed because the defendant deprived the property owner of its rights over the business and did so in a fashion where restitution “may well be an inadequate remedy.” Id. at 733, n. 1. Corbin bears no resemblance to the allegations of the instant case, where Defendants are not alleged to have deprived Furmanite of the ownership or possession of its Orlando office. Thus, the Court grants summary judgment on this issue in favor of Defendants. Material issues of fact exist, however, with respect to Furmanite’s claims for conversion of its files and equipment. On the day he resigned, Greg Foushi admitted copying some of his files to a disk and deleting others from his work computer, in part because he was “upset.” (Doc. No. 119-13, pp. 5-8). Furmanite initiated an inventory of its Orlando office in April after the resignation of the former employees and discovered that electronic and paper files regarding business contacts, job descriptions, and financial information were missing. (Doc. No. 119-12, pp. 3-4, 7-8,14-15). Furthermore, TDW arranged to have a truck pick up materials of the former employees and transport the materials to TDW. Gary Goins, TDW’s manager, stated that tools were among the things moved, but he never checked to see if any of Furmanite’s equipment was among those items removed. (Doc. No. 119-10, pp. 6-7). The former employees all deny moving any Furmanite equipment. (E.g., Doc. No. 102-2) (declarations of former employees denying the taking of Furman-ite property). Construing all reasonable inferences in favor of Furmanite, a genuine issue of material fact exists as to whether Furmanite’s property was among the materials taken by the former employees. F. Tortious Interference Count I of the Amended Complaint alleges that all Defendants tortiously interfered with Furmanite’s business relationships with its customers, causing Furmanite damages. (Doc. No. 61, p. 8). Defendants move for summary judgment, arguing that because Furmanite’s claims for trade slander and misappropriation of trade secrets must fail, Fur-manite cannot establish any interference with a business relationship under Florida law. Pursuant to Florida law, Plaintiff must establish five elements to state a claim for tortious interference with an advantageous business relationship: (1) the existence of a business relationship under which the claimant has rights; (2) the defendant’s knowledge of the relationship; (3) an intentional and unjustified interference with the relationship; (4) by defendant; and (5) damage to the claimant caused by the interference. E.g., Rudnick v. Sears, Roebuck, and Co., 358 F.Supp.2d 1201, 1205 (S.D.Fla.2005). In the instant case, the Court finds Defendants have not met their burden of establishing that no genuine issue of material fact exists with respect to Furmanite’s tortious interference claim. Genuine issues of material fact exist as to whether the former employees, acting in concert with TDW and Bryan McDonald, misappropriated Furmanite’s trade secrets, files, equipment, and financial information, and issues of fact exist as to whether such actions constitute tortious interference under Florida law. Defendants admit that the former employees removed property from Furmanite’s Orlando office with the assistance of TDW, although the exact contents of what was removed is in dispute. {E.g., Doc. No. 119-13, pp. 5-8; Doc. No. 119-12, pp. 3-4, 7-8, 14-15; Doc. No. 102-2). TDW’s manager confirms that items were removed but testified he had know way of knowing to whom the items belonged, and he did not check to see if Furmanite material was hauled away from Furmanite’s office. (Doc. No. 119-10, pp. 6-7). Florida courts have stated that the alleged conversion and unauthorized use of a customer list under certain circumstances could constitute tortious interference with business relationships. E.g., Viscito v. Fred S. Carbon, Inc., 717 So.2d 586 (Fla. 4th DCA 1998). For these reasons, Defendants’ claim for summary judgment on Count I of the Complaint is denied. G. Florida Deceptive and Unfair Trade Practices Act Count VI of the Amended Complaint avers that TDW, Bryan McDonald, and John Foushi are liable to Furmanite for violations of the Florida Deceptive and Unfair Trade Practices Act (“FDUTPA”). (Doc. No. 61, pp. 12-13). Defendants argue that summary judgment on Count VI must be granted for several reasons. First, Defendants argue that actions for damages under FDUTPA apply only to consumer transactions. Next, they argue that summary judgment is warranted because Plaintiffs allegations are based on the misappropriation of trade secrets and confidential information and TDW’s hiring of the former employees, none of which constitute an unfair or deceptive trade practice. (Doc. No. 101, pp. 14-22). FDUTPA broadly declares unlawful any unfair or deceptive acts or practices committed in the conduct of any trade or commerce. § 501.204(1), Fla. Stat. Section 501.211 provides that any person who has suffered a loss as a result of such practices may commence a private action for actual damages and possibly attorneys’ fees and court costs. § 501.211(2), Fla. Stat. The Florida Supreme Court has emphasized that the remedies of the FDUT-PA “are in addition” to other remedies available under state or local law. Pinellas County Department of Consumer Affairs v. Castle, 392 So.2d 1292, 1293 (Fla.1980). A practice is unfair under FDUT-PA if it offends established public policy, is immoral, unethical, oppressive, unscrupulous, or substantially injurious to consumers. Suris v. Gilmore Liquidating, Inc., 651 So.2d 1282, 1283 (Fla. 3d DCA 1995). The Florida Supreme Court has recently held that the statute “applies to private causes of action arising from single unfair or deceptive acts in the conduct of any trade or commerce, even if it involves only a single party, a single transaction, or a single contract.” PNR, Inc. v. Beacon Prop. Mgt. Inc., 842 So.2d 773, 777 (Fla.2003). Prior to July 1, 2001, FDUTPA provided that “[i]n any individual action brought by a consumer who has suffered a loss as a result of a violation of this part, such consumer may recover actual damages, plus attorney’s fees and court costs.” § 501.211(2), Fla. Stat. (emphasis added). However, FDUTPA was amended in 2001, and the amendment replaced the word “consumer” with the word “person.” The current version of FDUTPA provides that “[i]n any action brought by a person who has suffered a loss as a result of a violation of this part, such person may recover actual damages, plus attorney’s fees and court costs.” § 501.211(2), Fla. Stat. (emphasis added). This amendment demonstrates a clear legislative intent to allow a broader base of complainants who have been injured by violations of FDUTPA to seek damages, not just injunctive relief. See, e.g., Advanced Protection Tech., Inc. v. Square D Co., 390 F.Supp.2d 1155, 1164 (M.D.Fla.2005); Gritzke v. M.R.A. Holding, LLC, No. 4:01CV495-RH, 2002 WL 32107540, at *4 (N.D.Fla. Mar. 15, 2002). “With the deletion of consumer transaction from FDUTPA, it would seem that such business entity consumers could sue for damages from outlawed acts and practices in ordinary business transactions without regard to whether the claimant was acting in the capacity of consuming goods or services. At least, nothing in section 501.211(2) purports to state otherwise.” Beacon Prop. Mgt., Inc. v. PNR, Inc., 890 So.2d 274, 278 (Fla. 4th DCA 2004) (emphasis in original). After the amendments to the FDUTPA, courts have opined on several occasions that actions under the statute could be sustained absent the failure to allege that FDUTPA violation arose from a “consumer transaction.” See, e.g., Gritzke, 2002 WL 32107540 at *4 (§ 501.211(2), as amended, merely requires a “person” who “has been damaged by [a] defendant’s violation” of the statute); Niles Audio Corp. v. OEM Systems Co., Inc., 174 F.Supp.2d 1315, 1319-20 (S.D.Fla.2001) (concluding that legislature’s replacement of the word “consumer” with the word “person” in § 501.211(2) was intended to make damages remedy available to anyone aggrieved by violation of statute); see also Beacon Property, 890 So.2d at 278 (rejecting the per se argument that a judgment was erroneous “simply because the facts at trial do not involve a consumer transaction”). This Court has recently held that the 2001 amendments to FDUTPA allow a plaintiff to seek damages despite a failure to allege that the unfair and deceptive conduct arose from a “consumer transaction.” See True Title, Inc. v. Blanchard, Case No. 6:06-cv-1871-Orl-19DAB, 2006 U.S. Dist. LEXIS 95069, at * 10 (M.D.Fla. Feb. 5, 2006). Thus, the Court cannot agree with Defendants’ contention that summary judgment is warranted in the instant case because no consumer transaction is involved. Furthermore, summary judgment on Furmanite’s FDUTPA claim is inappropriate because of the numerous issues of fact which remain regarding TDW’s alleged misappropriation of Furmanite’s trade secrets and confidential information. Accepting all reasonable inferences from the facts of the case, TDW’s alleged plan to hire all of Furmanite’s employees away en masse and use them to misappropriate Furmanite’s trade secrets would constitute unlawful and unfair or deceptive acts or practices under the broad reading Florida courts traditionally apply to FDUTPA. In fact, Stanley Pitts, a manager for TDW, admitted in his deposition that the conduct of the TDW employees in the instant case in his opinion was not up to the “ethical standards of TDW.” (Doc. No. 119-3, p. 6). In addition, Defendant Bryan McDonald stated that although he denied any wrongdoing on the part of TDW, if the facts were as Furmanite believed them to be, TDW’s actions would amount to “inappropriate” and “unethical” conduct in the marketplace. (Doc. No. 119-17, p. 4). For these reasons, the Court finds that issues of fact exist which preclude granting summary judgment on Furmanite’s FDUTPA claims. H. Conspiracy/Economic Boycott Count VII of the Amended Complaint alleges that all Defendants are hable to Furmanite under the theory of economic boycott. Specifically, Furmanite alleges that the coordination of the simultaneous resignations of the former employees amounted to an economic boycott. (Doc. No. 61, pp. 13-14). Economic boycott is a cause of action sounding in civil conspiracy under Florida law. Some courts have also referred to this as the “force of numbers exception” to the general rule that the basis for a civil conspiracy must be an independent wrong or tort which would constitute a cause of action if the wrong were done by one person. See Kee v. Nat’l Reserve Life Ins. Co., 918 F.2d 1538, 1541-42 (11th Cir.1990). Under this exception, the “conduct complained of would not be actionable if done by one person, but by reason of force of numbers or other exceptional circumstances, the defendants possess some peculiar power of coercion, which gives rise to an independent tort of conspiracy, sometimes referred to as an ‘economic boycott.’ ” American Diversified, 439 So.2d at 906. A showing of mere malice is not enough. Id. The result of the defendants’ concerted action “must be different from anything that could have been accomplished separately.” Kee, 918 F.2d at 1542. In the Kee case, the Plaintiff sought to recover under a civil conspiracy theory that several companies acted in concert to destroy the plaintiffs business by informing the state commissioner of his alleged wrongdoings and thus causing him to be investigated, by cancelling the plaintiffs general agent’s contracts, and by withholding from him commissions he had allegedly earned. In refusing to find that the “narrow” force of numbers exception would allow the plaintiff to recover under his theory of the case, the Eleventh Circuit reasoned that “[e]aeh company could independently inform the insurance commissioner of its suspicions, cancel the at-will agency contracts, and withhold commissions pending resolution of the claims in court. These independent acts taken together did not amount to something larger than the sum.” Id. at 1542. In the instant case, there is no dispute that the former employees were at-will employees who could all legally resign at any time. Furmanite’s employee handbook stated that either Furmanite or the employee could end the employment “at any time, with or without cause, notice, or reason.” (Doc. No. 101-9, p. 3). Applying the analysis used by the Eleventh Circuit in Kee to the instant case, Defendants rightfully argue that there is no evidence in the record that the alleged agreement by the Defendants for the former employees to resign caused any harm in addition to that which would have been caused if the employees had all individually decided to resign without agreement. See also American Diversified, 439 So.2d at 906 (“the allegations do not show that appellees, by force of numbers or other exceptional circumstances ... attempted to destroy appellant’s business by acting together”). Having demonstrated the absence of a genuine issue of material fact on this issue, the burden shifts to Furmanite to come forward with specific facts showing that there is a genuine issue for trial. Fitzpatrick, 2 F.3d at 1115-17. Furmanite has not done so. Furmanite attempts to distinguish Kee by arguing that if the former employees had resigned independently, Furmanite would have suffered less in damages. However, Furmanite offers no evidence to support this proposition. For these reasons, the Court grants summary judgment on Count VII of the Complaint. I. Civil Conspiracy Count VIII of the Amended Complaint alleges that all Defendants are liable to Furmanite under the theory of civil conspiracy. Unlike Furmanite’s claim for economic boycott, Furmanite alleges that the overt acts in furtherance of such conspiracy were Defendants’ actions in tortiously interfering with Furmanite’s business relations, and conversion of Fur-manite’s paper and electronic files and equipment. (Doc. No. 61, pp. 14-15). Thus, because Furmanite has alleged an unlawful act or act in furtherance of such conspiracy, and several issues of fact exist as to whether tortious interference and conversion actually took place, it would be inappropriate to grant summary judgment on Count VIII of the Complaint. See American Diversified, 439 So.2d at 906-07 (despite dismissing economic boycott claim, allegations of tortious interference in the complaint that former employee diverted to new employer inquiries and leads were sufficient to state a cause of action for civil conspiracy). In the instant case, Defendants’ lone argument is that summary judgment must be granted on the conspiracy claim if the Court grants summary judgment on the conversion and tortious interference claims. As the Court has not granted summary judgment on these claims, Defendants have not met their burden of demonstrating that no genuine issue of material fact exists with regard to the civil conspiracy claim. J. Breach of the Duty of Loyalty Count IX of the Amended Complaint avers that John Foushi and Greg Foushi are liable to Furmanite for breaching their respective duties of loyalty to Furmanite. Furmanite alleges that John Foushi breached his duty of loyalty by holding a meeting with the former employees while he was still employed with Furmanite in which he solicited them to accept employment with TDW, and that Greg Foushi breached his duty of loyalty by orchestrating the simultaneous resignations of the former employees without notice. (Doc. No. 61, p. 15). The general rule with regard to an employee’s duty of loyalty to his employer is that an employee does not violate his duty of loyalty when he merely organizes a competing business during his employment to carry on a rival business after the expiration of his employment. Fish v. Adams, 401 So.2d 843, 845 (Fla. 5th DCA 1981). Mere preparation to open a competing business, such as assisting in the opening of a bank account, the obtaining of office space and other services with respect to the future employer are likewise insufficient to demonstrate a breach of such duty. E.g., Harllee v. Professional Serv. Indust., Inc., 619 So.2d 298, 300 (Fla. 3d DCA 1992). Additionally, an employee may take with him a customer list that he himself has developed. Id. However, an employee may not engage in disloyal acts in anticipation of his future competition, such as using confidential information acquired during the course of his employment or soliciting customers and other employees prior to the end of his employment. Id.; Insurance Field Services, Inc. v. White & White Inspection & Audit Service, Inc., 384 So.2d 303 (Fla. 5th DCA 1980). An employee does not have to be managerial in order to have this duty of loyalty. Fish, 401 So.2d at 845. In the instant case, summary judgment on this issue must be denied with respect to both Defendants. Issues of fact which exist as to whether Greg Foushi misappropriated trade secrets and company property and engaged in tortious interference preclude the entry of summary judgment as to that Defendant. Furthermore, Fur-manite has presented evidence of at least one e-mail by Greg Foushi sent from Fur-manite’s computers to a contractor encouraging it to do business with TDW. 0See Doc. No. 119-4, p. 2) (e-mail to Suffolk Construction providing TDW’s new contact information in Orlando and stating “everybody at TDW knows about your project and its importance. You and your customer are in even better hands ... ”). For these reasons, summary judgment is denied with respect to Defendant Greg Foushi. In addition, issues of fact exist with respect to John Foushi’s actions which also preclude the entry of summary judgment. Furmanite contends that John Foushi told it when he resigned that he was going to retire. However, John Foushi had a meeting with Furmanite’s Orlando employees in March of 2006 prior to his resignation in which attendees state that John Foushi told them he was not going to retire, that TDW was opening a service center in Orlando in which he was going to work, and that TDW was offering opportunities for them which “looked good.” (E.g., Doc. No. 101-7, p. 3). Accepting all reasonable inferences from these facts, an issue of fact exists as to whether John Foushi solicited Furmanite’s employees on behalf of TDW while he was still employed by Furmanite. For these reasons, summary judgment as to John Foushi on this claim must be denied. Conclusion Based on the foregoing, the Motion for Summary Judgment (with Incorporated Memorandum of Law), filed by Defendants T.D. Williamson, Inc., TDW Services, Inc., and Bryan McDonald on December 29, 2006, (Doc. No. 101), and the Former Employees’ Motion for Summary Judgment (with Incorporated Memorandum of Law), filed by Defendants Greg Foushi, Jose Delgado, Saul Ferrer, James Jackson, Robert John, Michael Mainelli, Rebecca Minervino, James Overstreet, Robert Schmidt, Nicole Turner, and John Foushi on December 29, 2006, (Doc. No. 102), are GRANTED in part and DENIED in part, as follows: 1. Summary judgment is DENIED as to Count I of the Amended Complaint (Tortious Interference); 2. Summary judgment is GRANTED as to Count II of the Amended Complaint (Trade Slander); 3. Summary judgment is DENIED as to Count III of the Amended Complaint (Misappropriation of Trade Secrets); 4. Summary judgment is GRANTED in favor of Defendants T.D. Williamson, Inc., and TDW Services, Inc. as to Count IV of the Amended Complaint (Breach of Confidentiality Agreements). In all other respects, summary judgment is DENIED with respect to Count IV; 5. Summary judgment is GRANTED as to all Defendants as to Furman-ite’s Conversion claim for the value of its Orlando office. In all other respects, summary judgment is DENIED as to Count V of the Amended Complaint (Conversion); 6. Summary judgment is DENIED as to Count VI of the Amended Complaint (FDUTPA); 7. Summary judgment is GRANTED as to Count VII of the Amended Complaint (Economic Boycott); 8. Summary judgment is DENIED as to Count VIII of the Amended Complaint (Civil Conspiracy); 9. Summary judgment is DENIED as to Count IX of the Amended Complaint (Breach of Duty of Loyalty). . John Foushi had previously resigned on March 17, 2006. (E.g., Doc. No. 61, ¶28). . For the purposes of the instant motion, the Court will refer to the corporate Defendants, T.D. Williamson, Inc., and TDW Services, Inc. simply as “TDW.” . The last named individual Defendant in the instant case, Bryan McDonald, is an employee of T.D. Williamson, Inc., and is alleged to have assisted the former employees in their actions. (E.g., Doc. No. 61, ¶ 15, 71). . (See Doc. No. 61). . Furthermore, the Court questions whether Section 489.128 bars an unlicensed contractor from being a Plaintiff in the instant case. The statute in question only bars unlicensed contractors from attempting to enforce a contract in law or in equity. The Court’s independent research has produced no Florida case extending the statute beyond its plain language to bar damages for tort claims. Defendants cite to the case of Marco Island Cable, Inc. v. Comcast Cablevision of the South, Inc., No. 2:04-cv-26-FTM-29DNF, 2006 WL 263605 (M.D.Fla. Feb. 2, 2006), for the proposition that Furmanite lacks standing in the instant case. However, Marco Island is distinguishable because in that case Plaintiff was an unlicensed cable operator who was barred by federal law from providing any cable services without a franchise. Id. at *4. In addition, that case involved whether the plaintiff could establish antitrust standing. Id. No antitrust claims are pled in the instant case. . Furmanite also contends that the former employees took documents and files from Furmanite's office, which Defendants dispute. (Id. atpp. 11-12). . Defendants concede that Greg Foushi and Michael Mainelli continue to use the ACT database in the course of their employment with TDW. . See, e.g., Alphamed Pharms. Corp. v. Arriva Pharms, Inc., 432 F.Supp.2d 1319 (S.D.Fla.2006) (Defendants did not violate statute by taking documents containing competitor's trade secrets from its trash, absent showing that competitor suffered any actual damages as result or that competitor obtained injunc-tive relief, because no damages were shown and nominal damages were not available under statute). .(E.g., Doc. No. 120-27, p. 4). . There is evidence in the record to create a genuine issue of material fact with regard to TDW's alleged hiring plan. John Foushi discussed with the former employees employment opportunities with TDW both before and after his resignation. (E.g., Doc. No. 101-7). Furthermore, Furmanite has produced emails between Greg Foushi and Stanley Pitts of TDW which, construing all inferences in favor of Furmanite, appear to discuss the timing and repercussions of a mass resignation of the former employees. (See Doc. No. 119-4, p. 5) (e-mail by Greg Foushi to Stanley Pitts discussing how it would be "real aggressive to be in by April 3rd” and e-mail statement by Greg Foushi to Stanley Pitts that if there is a delay in having a lease "before the cat is out of the bag .... we could all be exposed”). . See, e.g., MJS Publications, LLC v. Hal Leonard Corp., No. 8:06-cv-488-T30EAJ, 2006 WL 1208015, at *2 (M.D.Fla. May 4, 2006) (“Therefore, when considering whether a defendant’s actions support a finding of 'unfair methods of competition, unconscionable, deceptive, or unfair acts or practices in the ‘ conduct of any trade or commerce,’ courts have regarded the concept as ‘extremely broad.’ [...]”) (internal citations omitted). . Matthew Sisson offered that, in Furman-ite's opinion, if fewer employees had resigned on March 31, 2006 and more had stayed employed with the company, Furmanite would have been "better off,” (Doc. No. 119— 12, p. 19), but this speculation is unsupported in the record and furthermore is not the proper inquiry under Kee.
CASELAW
Talk:Rijeka Airport Could this be considered slightly too POV? :) "However in recent years the airport is being left to rot by the utter incompetence of the management. The current leading political party in Croatia (HDZ) has also appointed a co-director (Gordan Žurga) to further destroy what is left of the airport (his first action was to buy himself an official car). With the total incompetence of the management, its a wonder the airport is still functioning." --Mareklug talk 23:49, 17 August 2010 (UTC)
WIKI
User:Writ Keeper/Scripts/inlineDiffDocs This is a common documentation page for User:Writ Keeper/Scripts/commonHistory.js, User:Writ Keeper/Scripts/watchlistDiffs.js, User:Writ Keeper/Scripts/userHistory.js, User:Writ Keeper/Scripts/generalHistory.js, and User:Writ Keeper/Scripts/contribsHistory.js. I created userHistory.js first at Yunshui's request; it's a modified version of Ale jrb's user history script. This script fixes a few bugs with Ale jrb's original, and it adds a new feature: a button is added to each entry that displays the diff of that entry in-line, without leaving the page. This way, all the diffs of the listed edits can be displayed, hidden, and re-shown on the same page at once. The generalHistory script extends this functionality to the standard article history page, the contribsHistory script likewise extends it to a user's contribs page, and the watchlistDiffs script does the same for the watchlist (and RecentChanges). The commonHistory.js script is a consolidated version of these scripts, providing the in-place diff functionality of all these scripts, with the exception of the original UserHistory script. That is, it provides the in-place diff functionality to recentchanges, watchlist, contributions, and history screens, without adding the history filter from Ale jrb's original script. Use of the commonHistory.js script instead of the piecemeal scripts is recommended. By default, the added buttons are a Twinkle-style link like: [ inspect diff ] . The text that appears can be altered by adding the variables, , and to the same .js page where you installed the commonHistory.js script, right above its import line. For example: if you wanted to change the text into + or -, you would put: ...where before you might have had only: Similarly, if you want viewing the diff to mark that page as viewed on the watchlist, put. If you want to install it on other wikiprojects use the following line instead:
WIKI
T-raperzy znad Wisły T-Raperzy znad Wisły ("T-Rappers From Vistula") is a Polish hip-hop group founded in 1995 by Grzegorz Wasowski, Sławomir Szczęśniak, Lucyna Malec and Andrzej Butruk. In the years 1995-2000 the band was an inseparable part of a TV show called Komiczny Odcinek Cykliczny. The songs are satirical in character and can be classified as comedy hip-hop. Early in the band's career, however, they created not only rap pieces, but also disco. The group has issued 6 albums to date. Poczet Królów Polskich T-Raperzy znad Wisły are known for their songs about Polish kings and princes, presenting their biographies with humor. Each of the band's rap songs concern a particular monarch or a summary of a well-known Polish text. T-Raperzy znad Wisły issued an album called Poczet Królów Polskich ("The List of the Kings of Poland") containing 18 tracks. Each of the songs, put chronologically, tells about the most important sovereigns of Poland, describing the crucial moments of their lives and recalling key facts. Other tracks contained on the album are funny summaries of famous books, for instance "Bolesław Prus"' Lalka, Henryk Sienkiewicz's Potop or Adam Mickiewicz's Pan Tadeusz. The most popular piece by T-Raperzy znad Wisły is "Mieszko" - the first track of "Poczet Królów Polskich" - describing the story of Mieszko I, the first ruler of Poland. The well-known chorus "Mieszko, Mieszko, mój koleżko" ("Mieszko, Mieszko, my pal") was used in the television series Rodzina Zastępcza ("The Foster Family") and in a song by Grupa Operacyjna, a Polish hip-hop band. Billboard defined their song as "a lesson in Polish history set to a hip-hop beat". A 2009 album After a several-year pause, on November 20, 2009, Traperzy znad Wisły issued a new album entitled "Ekshumacja 2," consisting of their songs from "Poczet Królów Polskich," remastered and with new beats added Apart from the songs concerning monarchs, the band recorded "Starfest" featuring the famous Polish artists Edyta Geppert, Stanisław Soyka, Aga Zaryan, Fisz, Kasia Nosowska, Łona, Anna Maria Jopek, Zygmunt Staszczyk, Dorota Miśkiewicz, Lech Janerka and Marek Kondrat. Co-founder Andrzej Butruk died at 47 in 2011.
WIKI
User:Cosmede ray/sandbox COSME-DE.COM COSME-DE.COM, (Chinese: 玫麗網, 玫丽网), is an international online shopping website for skincare and cosmetics products. It is developed by Cosme De Net Company Limited, a beauty and cosmetics product trading group registered in Hong Kong with over 10 years of retailing and wholesaling business. COSME-DE.COM is an expansion of its core business. COSME-DE.COM offer services to customer around the world including United States and United Kingdom, and has localized online storefronts for China, Hong Kong and Australia. Brand and Logo COSME-DE.COM has its logo registered. The English version of the brand has to be in capital letters. The Chinese version is in a typographic design. COSME-DE.COM introduces itself as a butterfly, and reveal its concept in an imaginary scene."The logo of COSME-DE.COM is a butterfly, which also resembles a flower. Butterfly represents beauty, elegance and freedom while flower is the equivalent of beauty. That’s why they are always associated together.""Imagine you are in a tranquil garden, suddenly a butterfly passes by, out of curiosity you follow it. After a while, it leads you to a beautiful garden, you see all kinds of blossoming gorgeous flowers, and you are elated.""Today, in the vast Internet world, the butterfly brings you to COSME-DE.COM, so you can enjoy our quality products, competitive prices and attentive service; and indulge yourself in choosing and shopping comfortably.""COSME-DE.COM dedicates this flower to each of you and sincerely invites you to visit this beautiful garden with us ...... Be the Beautiful One!" History 2003 -  The company launched the online store in Japan. 2007 -  The company launched business to China and other regions with COSME-DE.COM. 2014 - Cosme De Net acquired ISO9001:2008 (Cert: AJA15/17460) certification. Awards & Accomplishments 2008 - TeJiaWang listed COSME-DE.COM to be one of the top 10 online cosmetic store in China. == Payment methods accepted == PayPal, Visa, MasterCard, UnionPay, Alipay, Tenpay Company Address 12/F Yau Lee Centre, 45 Hoi Yuen Road, Kwun Tong, Kowloon, Hong Kong
WIKI
Engineering Projects/Electric Cars/Howard Community College/Fall2011/550 ekart Problem Statement How can a team of three HCC students design and build an electric go-kart? Team Members * CR * Jeffreycarllloyd Summary Weekly reports Story Made up of two members: Jeffrey Lloyd, and Carlos Riveros. The project ekart will be an attempt to design and build an all electric go-cart prototype to encourage further funding of this project. We want to do things first by creating this prototype e-kart with inexpensive and donated materials while staying within a $250.00 budget. After we have a tangible working product, we will showcase it to HCC to get further funding and probably start an intercollegiate competition among Maryland's community colleges. Week One * Confused about project. Problem: What HCC allows and is willing to fund VS. What we as a team want to accomplish: an electric go kart. * Lots of research * Finding donations for project * Find pre-made go kart frame and buy it Week Two * More research * Could not buy inexpensive frame, therefore we had to build one from scratch * Ekart frame design and construction * DC motor mounting ideas Week Three * More research. * Bought speed controller and 3-way potentiometer. * Bought inexpensive frame from private vendor. * Modified bought frame for our project's needs. Week Four * Finished ekart presentation * Tested ekart's frame and steering by using a 0.5HP fan motor. * Ordered battery cables, plugs and fuses for ESC system. * Tested the motor After four weeks of research and hard work, we were able to get a test-run of the ekart using a 0.5HP DC fan motor: 1ST TEST-RUN Decision List * After the previous team's attempt to build an electric car, this new ekart team has decided to build an electric go-kart. * Searched for donations of parts and tools. * Decided to create a powerpoint presentation to obtain approval for this project. * Decided to test the donated motors. * Decided to buy frame and modify it. Materials List * Steel tubes (1" and 1.5" diameter) -- DONATED * MIG welder -- BORROWED * Plastic chair seat -- DONATED * Two 6V lead-acid batteries -- DONATED * Two 12V lead-acid batteries -- DONATED * Programmable 200A 48V Kelly ESC -- BOUGHT FOR $120.00 * 10" go kart wheels -- DONATED * Used go kart frame without motor -- BOUGHT FOR $60.00 * Battery cable 48V -- DONATED * 3-way potentiometer (throttle pedal) -- BOUGHT FOR $30.00 Software List * Web Browser (Online Research) * Microsoft's Power Point 2010 * Microsoft's Excel 2010 * Autodesk 123D for go-kart design * Google Sketch Up * Prezi presentation aid Time * Week 0: Each student spent an average of 6.5 hours doing research and coordinating existing materials. * Week 1: Each student spent an average of 7.2 hours creating a presentation, testing the electric motor, and performing research on individual parts. * Week 2: Each student spent an average of 7.3 hours designing key components and testing existing equipment for compatibility. * Week 3: Each student spent an average of 6.2 hours working on ekart's frame and handling components (steering and braking system). * Week 4: Each student spent an average of 5.7 hours working on ekart's motor and electrical components. * TOTAL TIME: 32.9 HOURS Tutorials Our inspiration: "The Neurotikart" Research links: http://www.kartbuilding.net/ http://auto.howstuffworks.com/electric-car2.htm http://electronics.howstuffworks.com/motor.htm Next Steps Create an effective electrical system for the ekart. Test ekart and present finished product to HCC to get funding for a better and faster version.
WIKI
How Many Miles Is A 500 Treadwear Rating? How many miles will a typical car actually get on a tire rated 500? The number of miles between replacements depends on how much you drive. For example, if your car has an average grade and no steep hills then the tread life will be around 30-50K which means 500 should last 150 thousand miles or so! The purpose here is to show that there’s not always a correlation between what we see with our eyes and understanding motor mechanics when it comes down from optimization strategies such as tire rotations for optimal performance under various driving conditions But what does it mean, and how do you know if a particular tire has a good treadwear rating? Tire manufacturers test their tires to determine the treadwear rating, which is expressed in millage. Let’s see the details. What Is A Treadwear Rating? A treadwear rating is a numerical code assigned to a tire to provide information about its expected performance. The ratings are standardized by the U.S. Department of Transportation’s (DOT) National Highway Traffic Safety Administration (NHTSA). How Many Miles Is A 500 Treadwear Rating The treadwear rating system uses a comparative test to rate tires. A control tire is given a rating of 100. The other tires being rated are compared to the control tire and assigned a percentage based on their wear rate. For example, if a tire being rated wears at twice the rate of the control tire, it would be given a treadwear rating of 50. Treadwear ratings provide consumers with information that can be used to compare the relative performance of tires. The ratings are useful for making decisions about which tires to purchase, but should not be the only factor considered. How Is The Treadwear Rating Determined? The treadwear rating is determined by a tire’s ability to resist wear under controlled laboratory conditions on a standardized test track. Some factors that can influence a tire’s treadwear rating include its design, compound, tread pattern, and construction. In general, tires with higher treadwear ratings will last longer than those with lower ratings. However, it is important to keep in mind that treadwear ratings are only a guide and not a guarantee of how long a tire will actually last. Several other factors, such as driving habits and road conditions, can also affect a tire’s tread life. For example, a tire with a treadwear rating of 400 should last twice as long as a tire with a treadwear rating of 200. However, this is only an estimate, and the actual difference in tread life will depend on other factors. Such as the type of roads driven on, driving habits, and inflation pressure. Some manufacturers also offer “utility” or “commercial” tires with even higher treadwear ratings. These tires are designed for use on vehicles that cover a lot of mileage or operate under harsh conditions, such as construction vehicles or long-haul trucks. To compare treadwear ratings from different manufacturers, it is important to look at the “treadwear index.” This is a number that represents the wear rate of a tire in relation to other tires. For example, a tire with a treadwear index of 200 would be expected to last twice as long as a tire with a treadwear index of 100. It is important to keep in mind that treadwear ratings are only one factor to consider when choosing tires. Other important factors include grip, handling, and noise level. Ultimately, the best tires for your vehicle will depend on your specific needs and driving habits. Benefits Of Choosing A Tire With A Higher Treadwear Rating Some benefits of choosing a tire with a higher treadwear rating include: • Increased Durability: Tires with higher treadwear ratings are designed to last longer, making them a great choice for those who want to get the most out of their investment. • Better Traction: Higher treadwear ratings often translate into better traction on the road, which can be especially beneficial in inclement weather conditions. • Enhanced Handling : Tires with higher treadwear ratings tend to provide better handling characteristics, making them a good choice for those who enjoy driving on winding roads or who frequently take their vehicle to the track. • Increased Resale Value: Because they are designed to last longer, tires with higher treadwear ratings often retain more of their value when it comes time to sell or trade in your vehicle. • More Peace Of Mind: Knowing that your tires have a high treadwear rating can give you added peace of mind when driving, especially on long trips or in unfamiliar territory. How Can You Tell If Your Tires Need To Be Replaced? It is important to check your tires regularly to ensure they are in good condition and do not need to be replaced. There are a few things you can look for to tell if your tires need to be replaced: • Check the tread depth of your tires. The minimum tread depth for most passenger vehicles is 4/32 of an inch. If your tires are below this, they will need to be replaced. • Look for cracks, cuts, or other damage on the surface of the tire. This can be caused by driving over potholes or other objects in the road. If you see any damage, it is best to replace the tire to avoid a possible blowout. • Check the sidewalls of the tires for signs of bulging or splitting. This can be caused by overinflation or hitting a curb too hard. If you see any damage, the tire will need to be replaced. • Have a professional inspect your tires if you are unsure if they need to be replaced. They will be able to tell you if the tread depth is sufficient or if there is any damage that needs to be repaired. Things You Should Consider when Choosing New Tires You bet! In addition to making sure your new tires fit your vehicle properly, you’ll also want to take into account the type of driving you do most often. For instance, if you live in an area with a lot of snow and ice, you’ll want to make sure you have tires that can provide good traction in those conditions. The same goes for if you do a lot of off-roading you’ll want tires that can handle rougher terrain. Ultimately, it’s important to choose tires that are well-suited to the type of driving you do most often. Another thing to keep in mind is that tires come in different sizes. So, you’ll need to make sure you choose tires that are the correct size for your vehicle. You can usually find this information in your vehicle’s owner’s manual. Once you know the right size, you can start shopping around for tires that fit both your vehicle and your driving needs. With a little bit of research, you can find the perfect tires for your car, truck, or SUV. Just make sure to keep all of the above factors in mind, and you’ll be sure to find tires that last and perform well no matter where the road takes you. How Does The Treadwear Rating Affect Your Tires’ Lifespan And Performance? The treadwear rating is a number that indicates how well a tire will wear compared to other tires. The higher the number, the longer the tire is expected to last. The treadwear rating does not indicate how fast a tire will wear out, but rather how long it will last compared to other tires. For example, a tire with a treadwear rating of 200 is expected to last twice as long as a tire with a treadwear rating of 100. The treadwear rating is not a guarantee of how long a tire will last, but it can be used as a general guide. Factors such as driving habits, road conditions, and Tire maintenance can all affect the lifespan of a tire. If you are looking for a tire with a long lifespan, look for one with a high treadwear rating. Keep in mind that the other factors mentioned above can also affect the lifespan of a tire, so make sure to take them into account as well. If you’re looking for tires with a 500 treadwear rating, there are a few options to choose from. Michelin, Continental, and Pirelli all offer tires with this rating. When choosing a tire with this rating, it’s important to consider the type of vehicle you drive and how you use it. For example, if you have a heavy-duty truck that you use for off-roading, you’ll want to choose a tire that can handle that type of terrain. If you have a smaller car that you use mostly for city driving, you can choose a tire with a softer compound that will provide better traction and handling on wet or icy roads. When it comes to tires with a 500 treadwear rating, there are a few things to keep in mind. First, these tires will typically last longer than other types of tires. This is because they’re made with a harder compound that can withstand more wear and tear. However, this also means that they may not provide as much traction on wet or icy roads. Additionally, they may not be as comfortable to drive on because of their harder compound. If you’re looking for a tire that will provide the best of both worlds long lasting tread wear and good traction you may want to consider a tire with a 400 treadwear rating. Final Thought So there you have it the answer to how many miles a 500 treadwear rating is. As you can see, this rating isn’t exactly indicative of how many miles a tire will last, but rather how much wear it will endure. With that in mind, always be sure to consult your owner’s manual or speak with an expert at your local dealer before making any decisions about replacing your tires. And don’t forget to come back and check out our blog for more helpful tips and information! Miguel Watts Miguel is an automobile engineer, who works in his automobile workshop. He is in this track for almost fifteen years, so he has vast experience with automobile tools and accessories. Besides this profession, he’s a hobbyist blogger who loves to research different tools and accessories of cars, motorbikes, automobiles, etc., and shares his findings with others. The Toolsinsider is a result of that. Miguel creates this site to share his findings with a broader audience. Leave a Reply Your email address will not be published. Required fields are marked * Recent Posts
ESSENTIALAI-STEM
El-Sa'ka Forces El-Sa‘ka Forces (قوات الصاعقة) is an Egyptian military commando force established in 1955 by Major General Jalal Mahmoud Fahmy Al-Haridi. High fitness is required and training is conducted at the El Sa‘ka Academy built by Major General Ahmed Ragai Ateya. Unit 777 and Unit 999 are divisions of the Sa'ka forces. It is reported that Ahmed Sallahudin Abdul Halim, who went on to become Commander, Second Field Army in 1981–83, commanded the 31 Thunderbolt Brigade and Thunderbolt Units in Yemen in 1964 during the North Yemen Civil War. Shadwan Island raid (Operation Rhodes) January 1970 Operation Rhodes was an Israeli heliborne raid against the Egyptian island of Shadwan on 22 January 1970, during the War of Attrition. Egyptian Sa'ka Forces commandos faced Israeli paratroopers and Shayetet 13 naval commandos. The Israelis took control of the island for over a day before leaving with 62 captured Egyptian soldiers, mostly from the Sa'ka Forces, and radar equipment. Egypt had launched the War of Attrition in order to weaken Israel's hold on the territories in the Sinai it had captured during the 1967 Six-Day War. Refusing to limit the war to the canal front, in January 1970 Israeli ground forces were tasked with a strike at the isolated and lightly garrisoned Shadwan. The aim of the raid was to capture Egyptian POWs to be exchanged for Israeli prisoners in Egypt, and to sabotage a local radar post which was deemed a threat to Israeli shipping in the Gulf of Suez. The task of taking Shadwan was assigned to the IDF's Paratroopers Brigade under the command of Haim Nadal. Its 202nd Battalion, commanded by Lt. Colonel Ya'acov Hasdai, and the brigade's elite reconnaissance company (Sayeret Tzanhanim), commanded by Captain Motti Paz, were to land on the island. The Egyptian garrison on Shadwan was headquartered in the island's lighthouse, at its southern tip. The lighthouse was defended by a fortified perimeter consisting of 9 outlying outposts and manned by a company of Egyptian Sa'ka commandos. In all, 100 Egyptian soldiers were present on Shadwan, of which 60 were commandos and the rest Egyptian Navy and technical personnel. After an airstrike, Operation Rhodes commenced on the morning of January 22, 1970. With the defenders thus engaged, Israeli ground forces started landing on Shadwan, ferried to the island by Bell 205 and Aerospatiale Super Frelon helicopters. Within an hour after landing, all but three outposts had fallen to the paratroops. One Israeli soldier, corporal Haim Isrovich, was killed by sniper fire. By 15:30 fighting had ceased. 14 Egyptians had been captured and 17 killed. Several dozen more POWs were found in subsequent scouring of the island. Holding the island throughout the night, Israeli forces received the order to evacuate at 11:50 on the morning of January 23. All structures save for the lighthouse were demolished and the forces withdrew with 62 Egyptian POWs and a captured British Decca radar set. The last helicopter, bearing Haim Nadal, departed the island at 17:40. 3 Israelis had been killed and 7 injured, while Israeli spokesmen put the number of Egyptian fatalities at 70, including both soldiers on Shadwan and on the sunk torpedo boats. Egypt admitted to 80 soldiers killed, wounded or missing, but attempted to paint the Israeli raid in the best possible light. It initially reported that Israelis "attempted to land" on the island and had suffered 30 casualties and lost 2 aircraft, and later stated Israeli forces failed to remain on the island "due to stiff resistance on land and massive air strikes". The Egyptian press focused on the actions of Captain Hosni Hamad, who had lost his life leading the torpedo boats to the island under his own initiative. Brigades and groups Dani Asher wrote in 2009 that "when the Yom Kippur War broke out there were twenty-four commando battalions in the Egyptian army, organised into six groups (majmu'ot), each of which consisted of three to five battalions. Support units included one battalion of Sager anti-tank missiles and a group of BM-21s (122mm rocket launchers)." Structure Most sources use Trevor Dupuy's commando brigade designations: 127, 128, 129, 130, 131, 132, and 134. But Dani Asher clearly defines six commando groups (group = brigade size). He doesn't identify the groups, but from Arab sources, the following designations are available: 39, 127, 129, 136, 139, and 145. The 127th Brigade is listed in the Defense Intelligence Agency's released order of battle for 1967. In 1990 there were five brigade-sized commando groups; from 2011 to 2019, the International Institute for Strategic Studies' Military Balance has continued to list a total of five commando groups. The Sa'ka consists of eight Special Forces Regiments/Groups (Brigade level) (117th, 123rd, 129th, 135th, 141st, 147th, 153rd, 159th) (of which 3 Lightning/Saaqa regiments and three Commandos regiments, the remaining two are the Marine Commandos and the Infiltration Anti-terror units). It is not clear whether references to three Infiltration Anti-terror Battalions (333th, 777th, 888th, 999th) are also a reference to Unit 333, Unit 777, Unit 888 and Unit 999.
WIKI
PATIENT TESTIMONIALS & EXPERIENCES A CASE REPORT: Michelle Methods Intervention/Treatment Patient with Severe Tremors, Complex Pain Syndrome, & Migraines, co-treated with Dental and SOT Chiropractic Care: A case report. Initially the patient was co-treated with a dental night and day time appliance, trochanter belt, and treated for category two or sacroiliac joint hypermobility syndrome. During the course of treatment over the initial months she was treated with category two protocols, sutural cranial temporomandibular joint (TMJ) interventions, T8 chiropractic manipulative reflex technique (CMRT) for the liver along with supportive nutritional supplements and dietary restrictions to support liver function and reduce general body inflammation. The SOT cranial procedures were incorporated to facilitate her category two stabilization and enable her to accommodate to the dental modifications. A 42 year old female presented with an unsteady Parkinsonian type of gait (shaking, rigidity and pain) diagnosed as psychogenically driven based on various university healthcare clinics. She also had tremors that would occur when she would stand from a seated position starting from her right leg and radiating superiorward affecting her whole body. She also diagnosed with an atypical version of a complex regional pain syndrome (CRPS) called complex pain syndrome (CPS) due to its whole body generalization as well as a history of migraines. CRPS is a severe chronic pain condition characterized by sensory, autonomic, motor, and dystrophic signs and symptoms. Patients with CRPS are commonly refractory showing only modest improvement with most current therapies [1]. In one study CRPS (n=888) syndrome affected mostly white women in the 25- to 55-year-old age group. It was often precipitated by trauma (surgical or nonsurgical) and commonly involved the lower ( approximately 56%) and upper ( approximately 38%) extremities [2]. Evaluating referral patterns for CRPS (n=102) 61% had presented first at the general practitioner, while 80% subsequently consulted one or more medical specialists, most frequently an anesthetist (55% of the cases) or a specialist in rehabilitation medicine (41%) [3]. The patients CPS was fibromyalgic in nature with pain that was severe, migratory and occurred in multiple major joints, all her muscle groups experienced pain, spasms, and involuntary contractions. She had nighttime leg spasms that would awaken her from sleep. The pain and muscle tension led to multiple ranges of motion limitations generalizing to all joints of her body. The patients condition had been occurring for 9 years and was gradually worsening. The patient had seen neurologists, internal medicine, rheumatologists, and visited multiple university hospital clinics. At the initial office visit she was prescribed medications for her tremors, migratory pain, and migraines that included Aciphex, Topamax, Atenolol, Tramadol, Gabapentine, Cymbalta, Minoxidil, Fluocinonide, Zanaflex, and Neurontin. A sleep study at Stanford University Health Clinic found that the patient did not exhibit sleep apnea however she still had no REM sleep even though she was taking sleeping medication and would sleep. This finding helped explain why she found her sleep not restful. Due to the severity of the patients symptoms and their whole body disturbance on her multiple levels chiropractic and dental care was attempted since all other interventions were unhelpful. Methods Intervention/Treatment Initially the patient was co-treated with a dental night and day time appliance, trochanter belt, and treated for category two or sacroiliac joint hypermobility syndrome. During the course of treatment over the initial months she was treated with category two protocols, sutural cranial temporomandibular joint (TMJ) interventions, T8 chiropractic manipulative reflex technique (CMRT) for the liver along with supportive nutritional supplements and dietary restrictions to support liver function and reduce general body inflammation. The SOT cranial procedures were incorporated to facilitate her category two stabilization and enable her to accommodate to the dental modifications. Results At the first office visit with the dental appliance, trochanter belt and category treatment all her shaking would stop when standing. Concurrently as the shaking would cease her pain would also be reduced and her range of motion also increased gradually but notably over the months of care. Treatment began in February 2009 and she was treated only one time per week and though she attempted to come for treatment more frequently the travel time to the office (2.5 hours one way) was too stressful, physically and emotionally. While she was initially treated one time a week from February 2009 through July 2009 following July 2009 she reduced care to two treatments per month.
ESSENTIALAI-STEM
author = {Naveen, L. and Malkarnekar, Santoshi.}, title = {{Adult-Onset Distal Renal Tubular Acidosis with Hypokalemic Quadriparesis in a Patient with Autoimmune Hypothyroidism}}, journal ={Journal of Integrative Nephrology and Andrology}, volume ={1}, number ={2}, pages = {82-84}, doi = {10.4103/2225-1243.143392}, year = {2014}, abstract ={A 40-year-old lady, a known case of hypothyroidism, presented with 1-day history of progressive weakness in all four limbs and reported a history of similar episodes since 3 years. Clinical examination revealed grade 2 hyporeflexic quadriparesis without any bulbar involvement. Workup revealed hypokalemia, non-anion gap hyperchloremic metabolic acidosis and alkaline urine suggestive of distal renal tubular acidosis (RTA). Antiperoxidase and antithyroglobulin antibodies were positive, suggestive of an autoimmune basis for hypothyroidism. She was managed with intravenous potassium chloride, thyroid replacement and bicarbonate therapy, following which remarkable recovery was noted. One week later, she was discharged on oral thyroxine and oral sodium bicarbonate and she remained weakness-free for a follow-up period of over 1 year. RTA presenting in a setting of autoimmune hypothyroidism is a rare occurrence and the possible role of immunological mechanisms and thyroxine deficiency in the pathogenesis of acidification defect seems most likely.}, URL ={http://www.journal-ina.com/article.asp?issn=2394-2916;year=2014;volume=1;issue=2;spage=82;epage=84;aulast=Naveen;t=6}, eprint ={http://www.journal-ina.com/article.asp?issn=2394-2916;year=2014;volume=1;issue=2;spage=82;epage=84;aulast=Naveen;t=6} }
ESSENTIALAI-STEM
Article Text PDF FRI0121 Remission at 6 months and identification of future good radiographic and physical outcome in early rheumatoid arthritis 1. NP Sundlisater1, 2. A-B Aga1, 3. IC Olsen1, 4. HB Hammer1, 5. T Uhlig1, 6. D van der Heijde2, 7. TK Kvien1, 8. S Lillegraven1, 9. EA Haavardsholm1, 10. on behalf of the ARCTIC study group 1. 1Diakonhjemmet Hospital, Oslo, Oslo, Norway 2. 2Leiden University Medical Center, Leiden, Netherlands Abstract Background Treat-to-target strategies with achievement of clinical remission within 6 months minimize radiographic progression and physical impairment in RA.(1) The preferred target, ACR/EULAR Boolean remission criteria, was developed to optimize a combination of radiographic and functional outcome.(2) However, clinical remission does not exclude subclinical inflammation, associated with progression of radiographic damage.(3) Objectives Our aim was to assess the association between definitions of remission at six months, including absence of ultrasound inflammation, and future absence of joint damage and physical disability. Methods DMARD-naïve RA patients with <2 years since first swollen joint and indication for DMARD treatment were included in the treat-to-target ARCTIC trial.(4) Patients followed with ultrasound (treatment target DAS <1.6 + SJC44=0 + no PD signal in 32 joints) were analyzed. We assessed remission at 6 months according to the following criteria: DAS-ESR, DAS28-ESR, SDAI, CDAI, ACR/EULAR Boolean remission (based on 44 joints), no swollen joints (SJC44), no ultrasound PD signal in any joint (0–96), and minimal greyscale (GS) score (GS ≤2, 0–96). Radiographs were scored by two readers using van der Heijde-Sharp score, with no radiographic progression defined as <1 unit change between 12–24 months based on the average score of the readers. We defined good outcome as a combination of no radiographic progression and physical function (PROMIS) ≥ median of the general population.(2) Odds ratios of reaching both outcomes were calculated according to various remission states at 6 months. Results Of the 103 patients included, 74% were female, mean [SD] age 51.4 [12.9], disease duration 6.7 [5.3] months, DAS 3.5 [1.1] and PROMIS 39 [8]. Median [25th, 75th percentile] radiographic progression 12–24 months was 0.49 [0.0, 1.03], and 71% had no progression. DAS remission was achieved by 59% at the 6-month visit, while 42% were in ACR/EULAR Boolean remission. Patients in ACR/EULAR Boolean remission had significantly higher odds ratio of no radiographic progression from 12–24 month than patients not in Boolean remission, as had patients with no PD signal or minimal GS findings (fig). Being in remission at six months according to each composite score separately or ACR/EULAR Boolean remission (OR 7.52, CI 3.06 –18.49) predicted a good outcome, while criteria based on ultrasound or no swollen joints did not (fig). No statistically significant association was found between remission according to composite scores and radiographic progression (Fig). Conclusions Our data show that being in ACR/EULAR Boolean remission after six months of treat-to-target therapy increases both the odds of no radiographic progression and good physical function, supporting current recommendations stating that ACR/EULAR remission should be the preferred treatment target in early RA.(1) Additionally, our analyses support that absence of ultrasound inflammation is associated with no future radiographic progression. References 1. Smolen JS, et al. ARD. 2016;75:3–15. 2. Felson DT, et al. ARD. 2011;70:404–13. 3. D'Agostino M, et al. ARD. 2016;75:1902–1908. 4. Haavardsholm E, et al. BMJ. 2016;354:i4205. References Disclosure of Interest N. Sundlisater: None declared, A.-B. Aga: None declared, I. Olsen: None declared, H. Hammer Consultant for: AbbVie, Pfizer, BMS, Roche, UCB, T. Uhlig: None declared, D. van der Heijde: None declared, T. Kvien: None declared, S. Lillegraven: None declared, E. Haavardsholm Grant/research support from: AbbVie, Pfizer, MSD, Roche, UCB Statistics from Altmetric.com Request permissions If you wish to reuse any or all of this article please use the link below which will take you to the Copyright Clearance Center’s RightsLink service. You will be able to get a quick price and instant permission to reuse the content in many different ways.
ESSENTIALAI-STEM
Talk:Dreams (bed retailer) Protected Right, I've protected this article for the time being. There is constant warring to rearrange sections (such as awards and investigations) coming from a number of parties (at least two of whom have been suspected as having a conflict of interest. Conflicts of interest shouldn't matter unless there is bias introduced (which, by reordering the sections, is the case). Any requests for edit can be made on this page by using the editprotected template. This protection has been employed to generate consensus. matt (talk) 11:30, 9 February 2010 (UTC) The Sleep Matters Club There is a proposal to merge the The Sleep Matters Club article into this one but I can find no reliable sources that even mention the club let alone indepth. Theroadislong (talk) 15:29, 7 December 2016 (UTC) * and the editor with a conflict of interest has added it with no reliable secondary source, unless a reliable source can be found it should be removed it's just marketing by Dreams otherwise. Theroadislong (talk) 09:51, 9 December 2016 (UTC) External links modified Hello fellow Wikipedians, I have just modified 5 external links on Dreams (bed retailer). Please take a moment to review my edit. If you have any questions, or need the bot to ignore the links, or the page altogether, please visit this simple FaQ for additional information. I made the following changes: * Added archive https://web.archive.org/web/20081122013231/http://www.oft.gov.uk/shared_oft/reports/unfair_contract_terms/oft246.pdf to http://www.oft.gov.uk/shared_oft/reports/unfair_contract_terms/oft246.pdf * Added archive https://web.archive.org/web/20081121225210/http://www.oft.gov.uk/shared_oft/reports/unfair_contract_terms/oft388.pdf to http://www.oft.gov.uk/shared_oft/reports/unfair_contract_terms/oft388.pdf * Added archive https://web.archive.org/web/20121005190036/http://www.growingbusiness.co.uk/dreams-mike-clare.html?page=2 to http://www.growingbusiness.co.uk/dreams-mike-clare.html?page=2 * Added archive https://web.archive.org/web/20100918144009/http://asa.org.uk/Complaints-and-ASA-action/Adjudications/2007/2/Dreams-Plc/TF_ADJ_42259.aspx to http://www.asa.org.uk/Complaints-and-ASA-action/Adjudications/2007/2/Dreams-Plc/TF_ADJ_42259.aspx * Added archive https://web.archive.org/web/20110131082848/http://www.asa.org.uk/ASA-action/Adjudications/2010/6/Dreams-plc/TF_ADJ_48583.aspx to http://www.asa.org.uk/ASA-action/Adjudications/2010/6/Dreams-plc/TF_ADJ_48583.aspx Cheers.— InternetArchiveBot (Report bug) 00:50, 14 September 2017 (UTC) Founding and first store Hi, there is a discrepancy in the date of founding and first store with the lede saying 1987, the history section saying 1985, the ref says 1987, while the official website says 1985 in ithe about us section, imv Atlantic306 (talk) 20:06, 8 November 2023 (UTC)
WIKI
Rules which enforce generally accepted best practices. Table of Contents AmbiguousResolution Since: PMD 6.21.0 Priority: Medium (3) There is multiple candidates for this type resolution. While generally this is not an error, this may indicate a bug. This rule is defined by the following Java class: net.sourceforge.pmd.lang.modelica.rule.bestpractices.AmbiguousResolutionRule Example(s): package Test package Inc1 model X end X; model Y end Y; end Inc1; package Inc2 model Y end Y; model Z end Z; end Inc2; model B import Test.Inc1.*; import Test.Inc2.*; Y y; // Class Y is imported twice end B; end Test; Use this rule by referencing it: <rule ref="category/modelica/bestpractices.xml/AmbiguousResolution" /> ClassStartNameEqualsEndName Since: PMD 6.21.0 Priority: High (1) Having a class starting with some name and some different name in its end clause is an error. This rule is defined by the following XPath expression: //ClassSpecifier/*[SimpleName[1]/@Image != SimpleName[last()]/@Image] Example(s): model SomeName Real x; equation x = 1; end SomeOtherName /* should be SomeName */; Use this rule by referencing it: <rule ref="category/modelica/bestpractices.xml/ClassStartNameEqualsEndName" /> ConnectUsingNonConnector Since: PMD 6.21.0 Priority: Medium High (2) Modelica specification requires passing connectors to the connect clause, while some implementations tolerate using it on plain variables, etc.. This rule is defined by the following Java class: net.sourceforge.pmd.lang.modelica.rule.bestpractices.ConnectUsingNonConnectorRule Example(s): package Example connector Conn Real x; Real y; end Conn; model Test input Conn c1; output Conn c2; input Real x1; output Real x2; equation connect(c1, c2); // OK connect(x1, x2); // error, x1 and x2 are not (both) connectors // x1 = x2; // OK end Test; end Example; Use this rule by referencing it: <rule ref="category/modelica/bestpractices.xml/ConnectUsingNonConnector" />
ESSENTIALAI-STEM
The decade of the 1920s was, comparatively speaking, a carefree era. A burgeoning youth culture was emerging. America’s colleges were becoming centers of cultural influence. Women were entering college in greater numbers than ever before. Meanwhile, the women’s rights movement was achieving many long worked for goals. The right to vote was achieved in 1920. The first female governor, Nellie Ross, was elected in Wyoming in 1925. In 1929, Gerti Cori won the Nobel Prize in science for the “Cori Cycle” movement of energy theory. Still, the education of women was not a high priority in America. The overall percentage of women who attended college remained low in comparison to that of the men. Those who did attend faced several difficulties. Long-held misconceptions about women and education were still in place. The early college women were also judged on their appearance, both by the college administrators and by their fellow students. The result of these factors was a sometimes crushing pressure to conform. In addition to the unique pressures felt by these women, they also were typically not offered a fair playing field. Course offerings often were not comparable to those available to their male counterparts. Despite the drawbacks, most college women of the 1920s viewed their educational experience positively. They succeeded despite the difficulties. They sensed the potential of higher education to make strides toward a more equal future. Gaining entrance to higher education has historically been difficult for women in America. For the early colonists higher education was not an option. The harshness of life on a new continent dictated that the new settlers live with a cooperative, communal approach. The roles for men and women were tightly defined as each new community struggled to survive. Once safely established in the new world the European immigrants began to develop institutions of higher learning. These early colleges were more often than not under heavy religious influence. The religions tended to reinforce a traditional perspective on masculine and feminine roles. As radical as the new Americans might have seemed to the rest of the world; they created a society based upon the long-held traditions of Europe. The nation was radical enough to shake off tyranny. It was not yet radical enough to end slavery, institute universal suffrage or encourage the education of women. Despite the emergence of prominent educated women like Dolly Madison and Abigail Adams, women were largely relegated to the role of second class citizens. Former slaves would actually be granted the right to vote long before the women of America. Educated women were somewhat rare in the 18th and 19th centuries but not entirely unheard of. Women from the elite classes were educated in private schools or sent to Europe to receive a classical education. Meanwhile the doors of most American colleges were closed to the average woman. Population growth and the expansion westward created a critical need for teachers. Ironically, women were expected to fulfill this role even though their own educational opportunities were severely limited. Out of this landscape it was the progressive women of the mid-1800s that would pave the way for the influx of college women more than fifty years later. The movement to open the doors of higher education to women was intrinsically tied to the drive for women’s suffrage. At the first women’s rights convention in 1848, Elizabeth Cady Stanton boldly stated that “all men and all women” were created equal. This was both a demand and a plea to society. A growing number of women wanted to participate in the American democratic experiment. The Constitution of the United States proclaims certain rights that every individual has. The women at that convention knew that they would never be able to fully fulfill those rights until the right to vote and the opportunity for higher education were secured. The Constitution set a radical new precedent for government despite its omissions. Fully realized, it threatened to turn tradition on its ear. The patriarchal traditions the new Americans brought with them were still strong, however. Law and culture rarely move at the same speed. Arguably, the freedoms stated in the Constitution still have not been fully realized. After the Civil War former slaves (males) we granted the right to vote. None the less cultural forces continued to prevent free exercise of this right. Voting, or attending college could be life threatening for African-Americans. It would take another hundred years until the culture was able to effectively address this denial of rights. The battle to secure women’s suffrage after passage of the Nineteenth Amendment was not as long lasting and never as bloody. This does not mean that all the hopes of suffragists were achieved immediately. Suffrage leaders had hoped that passage of this amendment would help break down walls in education and many other areas. This, in fact, would happen. The effect was neither instantaneous nor complete, though. The progressive college women of the 1920s would have to confront a society that was still getting used to their presence. Even with the gradual societal acceptance of college women in the early 20th century, the women had to face an increasingly competitive environment. College applications, from men and women, soared to record levels after the end of World War One. Colleges with a limited number of slots became increasingly more selective. They could afford to take into account subjective factors beyond academic qualifications. The road would be difficult but the women gladly accepted this challenge. A unique cultural shift was under way in the 1920s. The end of World War One in 1919 had brought about a palatable sense of relief and a motivation to live for the moment, especially in the victorious Allied nations. America was infused with a new found energy that manifested itself in a more carefree and permissive culture. There had been a women’s rights movement in the United States since the founding of the country. For centuries, however, it had been unable to generate sufficient momentum to instigate meaningful change. This gradually began to change in the latter half of the 19th century. One point of emphasis for the women’s movement was access to formal education. In the 1800s the nation still operated under confining, unwritten rules about roles for the sexes. Some small steps were made during the 1800s. The first women’s colleges were opened. Free high schools for girls were also opened in some parts of the country. Those who favored the status quo were able to raise irrational fears, i.e, educated women would end up spinsters. Incredibly it was prevailing medical opinion at the time somehow damage a woman’s general and/or reproductive health. Women had smaller heads and smaller brains. They reasoned, therefore, that their brains were less capable and unable to hold up under the stress of a rigorous academic curriculum. Flexner writes: “It was almost universally believed that a woman’s brain was smaller in capacity and therefore inferior in quality to that of a man” That opinion did not go without dispute, however. In the late 1800s a contrary conclusion was gradually gaining acceptance. A study conducted by the Association of College Alumnae reported that a rigorous academic program actually benefited a woman’s health. In addition, the study found that college women who played sports were benefited even more Very few social movements move on a continuous trend line, though. Resistance to women’s rights ebbed and flowed throughout the 19th century. Many still saw the education of women as a radical threat. In the words of Flexner “the idea that women might possess creative intellectual powers was an explosive one” Traditionalists feared everything from harm to the women themselves to the destruction of the family unit. One selling point for those in favor of education was the idea that women were only going to college to better themselves in performing their traditional roles. “Their power to do good will be incalculably enlarged” In other words, the pro-education advocates had to tread lightly. Society, they sensed, was not yet ready for the “career woman” as we know today. A somewhat modest statement of expectations helped the women’s education movement gain some traction in the late 1800s. Barriers, legal and societal, were still in place that prevented women from participating in many professions. A strong cultural pressure toward traditional roles for women still limited opportunities, even for those fortunate enough to have acquired a college education. By the turn of the 20th century most (70%) college women were attending coeducational institutions. However, only about 7% percent of all women in the U.S. attended college That percentage did not increase substantially until after the 19th Amendment was passed in 1920. An Education Revolution In the mid-1800s The Women’s Rights Convention had addressed the need for formalized education bluntly. In the statement from their 1848 meeting they wrote that “he [men] has denied her the facilities of a thorough higher education, all colleges being closed to her” In this context, the effect of the passage of the suffrage amendment cannot be underestimated: “It conferred the opportunity to claim enhancedsocial status and greater independence on every female in the land” By the 1920s women had been part of college life for 50 years. The success of the suffrage movement helped women to higher aspirations than they had in the past, even if the establishment had other ideas. The college women of the 1920s had to walk a fine line of independence and conformism; cultural influence and peer influence. The colleges were quickly becoming hubs of youth culture. That culture was fostered, in a large part, by activities outside the classrooms. The extracurricular activities reflected the social emphasis at colleges of the day. The New Jersey College for Women (a division of Rutgers University) exemplified this emphasis. A 1922 issue of Redbook listed the activities for that year, which included: …the Christmas Dance, mid winter play, Mothers Day, field day, Senior ball, Junior prom, Sophomore hop, and St. Valentines, Halloween and St. Patricks Day dance. College life offered a freedom that women had not experienced before. By most accounts they enjoyed this freedom to full effect. Most colleges had rules in the dormitories, i.e. curfews and dress codes. These restrictions were of no consequence to most students however. Students found ways to have raucous, alcohol-fueled “petting parties” on a regular basis. A joke from the 1920s state She doesn’t drink. She doesn’t pet. She hasn’t been to college yet. Sports, fraternities and sororities were also integral parts of the lives of 1920s college students. In the days before title IX opportunities for women to play intercollegiate sports were still limited. Football games and other men’s sports were still events women could attend and revel with the rest of the student body. Events like these helped women at newly co-ed universities become part of the social landscape. The weekly football game was the center of activity at many colleges. Thousands gathered to cheer on the team. The game might be a destination for daters, or it might be a place to find a date. Author F. Scott Fitzgerald, who tried out for football at Princeton, wrote of the pageantry and spectacle of college football. The newfound independence women enjoyed was expressed in a multitude of ways. From provocative dress to challenging the academic establishment women were showing themselves as a force to be reckoned with. Not all of the expressions of freedom were positive though. College women who saw their screen idols smoke took up smoking in record numbers. To them it was a statement of independence. Unfortunately, a grudging resentment still existed among the male students and faculty at some colleges. Sometimes this resentment boiled to the surface. Whether uttered behind women’s backs or published for all to see in the school newspaper, there was an undercurrent of discontent among some of the male students. At that time, most college students still had come from families with considerable wealth in which the male heir is made to feel great entitlement. It is this background that helped to create perceptions such as those noted by Green: Women are stupid, out to spend men’s money, and either the goody-goody type who would be reticent to be too physically intimate or the wild rebellious type. The Jazz Age also ushered in a whole new language of slang, many of the terms having to do with women. It was not uncommon for women walking across campus to hear themselves referred to as a “broad”, a “dame”, a “doll” or a “charity case”. Generally speaking these terms were not taken as insulting as they are today. An exception might be the term “charity case” which referred to the sexual promiscuity of a woman. Terms to describe college men like “Joe College” and “Joe Yalie” also became popular in the 1920s. The vibrant social life of the students in the 1920s was partially due to a relatively low emphasis on academic performance. Most students were perfectly content with “C”, or average, grades. In fact there was a certain peer pressure within the college environment to be “average”. Students who spent a great deal of time studying were sometimes socially shunned and looked on with derision. This is another example of the mixed messages the college women of that era often received. They had heard the social message that education is the key to success and independence. At the same time their peers were telling them to temper their ambition and that college was much more about social interaction than about academics. College and Body Image The stereotyping of women was still a generally accepted practice in the 1920s. According to Green the prevailing perception of many males was that there are “two kinds of women among college students in the 1920s; sexual women who lived by the rules and those who did not”. For the women of American society, college was much more than just a place to obtain an academic education. In the 1920s college became a “critical site where modern notions of female body image were mapped out” 12. Appearance, in effect, became an additional qualification for college admittance. In their reviews administrators “routinely noted their impressions of students’ appearance”. If not stated explicitly; it was understood by the college women of the 1920s that other people’s perceptions of appearance were going to play a significant role in the women’s future success or lack of it. Many women were forced to feel inadequate. Most of them felt an intense pressure to conform to others expectations. As white and black women claimed access to the life of the mind, it was their bodies that drew intense personal, public and institutional scrutiny. In the early 1900s a health craze was influential in forming people’s impressions of the ideal body type. By the 1920s, a different ideal had emerged. The “ideal” woman of the 20s was more sophisticated and fashion conscious, but extremely young-looking in appearance. Fashion was more than just the way people dressed. Closer fitting clothes contributed to the increased societal focus on body type. The emergence of targeted marketing and new media helped to reinforce the messages early college women were getting from their peers. In the same way that the painfully thin supermodel ideal is unapproachable today, so was the child-like flapper image in the 1920s. In addition to being trailblazers in the field of education, women had to deal with body image issues forced upon them by the culture. The influence of the “culture of youth” on college women of the 1920s cannot be underestimated. In that age, the term “youth” became more than just a descriptive term. It became a verb; a way of life. Given that context it is not surprising that the first winner of the Miss America contest, Margaret Gorman, was only sixteen years old. Her measurements were a waiflike 30-25-32. According to Green “the practice of youth…as a fully structured directive social act” came to full fruition in the 20s. It was the beginning of the youth obsessed culture we live in today.
FINEWEB-EDU
Sweden to offer compensation for transgender sterilizations STOCKHOLM (Reuters) - Sweden’s center-left government proposed legislation on Monday that would grant compensation to transgender men and women who had to undergo mandatory sterilization in order to have their sex legally reassigned. Transgender Swedes had to be sterilized before they could legally change their gender until 2013. The government’s bill would allow an estimated 800 people to claim 225,000 crowns ($26,000) each in compensation from the state. “Sterilization as a condition to obtain a change of gender was an expression of a view that society today distances itself from,” Healthcare Minister Gabriel Wikstrom said in a statement. Maria Sundin, a transgender activist and former chairwoman of Transgender Europe, was forced to undergo sterilization in 1999. She said of the bill: “It is a very positive outcome. It is vindication, and very positive that we didn’t have to take it to court.” The Swedish Federation for Lesbian, Gay, Bisexual, Transgender and Queer Rights had long threatened to sue the government over the sterilizations and wanted 300,000 crowns in compensation for each affected individual. “It is very welcome that the government, the first in the world, is paying compensation in recognition of the crimes committed by the state against transgender people,” it said in a statement. Sweden - often viewed as a bastion of tolerance - has a dark history of sterilization that dates back to the 1930s when Roma were often targeted in drives for racial purity. Mental disability, institutionalization, or simply having what authorities deemed to be too many children, could also result in sterilization during those decades. An estimated 63,000 people - the vast majority of them women - were sterilized between 1935 and 1975, according to a government report published in 2000. Roughly half of these procedures, primarily during the first 20 years, were done by force or coercion. Many European countries, such as Finland, Switzerland and Greece, still require transgender people who want to legally change their gender to undergo sterilization, according to Transgender Europe. The practice of involuntary sterilization has been widely condemned as a human rights violation, including by the United Nations. In Europe, transgender people are twice as likely as gay people to be attacked, threatened or insulted, according to a European Union report published in December 2014.
NEWS-MULTISOURCE
@article{RemmeleXianAlbrechtetal.2014, author = {Remmele, Christian W. and Xian, Yibo and Albrecht, Marco and Faulstich, Michaela and Fraunholz, Martin and Heinrichs, Elisabeth and Dittrich, Marcus T. and M{\"u}ller, Tobias and Reinhardt, Richard and Rudel, Thomas}, title = {Transcriptional landscape and essential genes of Neisseria gonorrhoeae}, doi = {10.1093/nar/gku762}, url = {http://nbn-resolving.de/urn:nbn:de:bvb:20-opus-113676}, year = {2014}, abstract = {The WHO has recently classified Neisseria gonorrhoeae as a super-bacterium due to the rapid spread of antibiotic resistant derivatives and an overall dramatic increase in infection incidences. Genome sequencing has identified potential genes, however, little is known about the transcriptional organization and the presence of non-coding RNAs in gonococci. We performed RNA sequencing to define the transcriptome and the transcriptional start sites of all gonococcal genes and operons. Numerous new transcripts including 253 potentially non-coding RNAs transcribed from intergenic regions or antisense to coding genes were identified. Strikingly, strong antisense transcription was detected for the phase-variable opa genes coding for a family of adhesins and invasins in pathogenic Neisseria, that may have regulatory functions. Based on the defined transcriptional start sites, promoter motifs were identified. We further generated and sequenced a high density Tn5 transposon library to predict a core of 827 gonococcal essential genes, 133 of which have no known function. Our combined RNA-Seq and Tn-Seq approach establishes a detailed map of gonococcal genes and defines the first core set of essential gonococcal genes.}, language = {en} } @article{SharmaDugarHerbigetal.2013, author = {Sharma, Cynthia M. and Dugar, Gaurav and Herbig, Alexander and F{\"o}rstner, Konrad U. and Heidrich, Nadja and Reinhardt, Richard and Nieselt, Kay}, title = {High-Resolution Transcriptome Maps Reveal Strain-Specific Regulatory Features of Multiple Campylobacter jejuni Isolates}, series = {PLoS Genetics}, journal = {PLoS Genetics}, doi = {10.1371/journal.pgen.1003495}, url = {http://nbn-resolving.de/urn:nbn:de:bvb:20-opus-96610}, year = {2013}, abstract = {Campylobacter jejuni is currently the leading cause of bacterial gastroenteritis in humans. Comparison of multiple Campylobacter strains revealed a high genetic and phenotypic diversity. However, little is known about differences in transcriptome organization, gene expression, and small RNA (sRNA) repertoires. Here we present the first comparative primary transcriptome analysis based on the differential RNA-seq (dRNA-seq) of four C. jejuni isolates. Our approach includes a novel, generic method for the automated annotation of transcriptional start sites (TSS), which allowed us to provide genome-wide promoter maps in the analyzed strains. These global TSS maps are refined through the integration of a SuperGenome approach that allows for a comparative TSS annotation by mapping RNA-seq data of multiple strains into a common coordinate system derived from a whole-genome alignment. Considering the steadily increasing amount of RNA-seq studies, our automated TSS annotation will not only facilitate transcriptome annotation for a wider range of pro- and eukaryotes but can also be adapted for the analysis among different growth or stress conditions. Our comparative dRNA-seq analysis revealed conservation of most TSS, but also single-nucleotide-polymorphisms (SNP) in promoter regions, which lead to strain-specific transcriptional output. Furthermore, we identified strain-specific sRNA repertoires that could contribute to differential gene regulation among strains. In addition, we identified a novel minimal CRISPR-system in Campylobacter of the type-II CRISPR subtype, which relies on the host factor RNase III and a trans-encoded sRNA for maturation of crRNAs. This minimal system of Campylobacter, which seems active in only some strains, employs a unique maturation pathway, since the crRNAs are transcribed from individual promoters in the upstream repeats and thereby minimize the requirements for the maturation machinery. Overall, our study provides new insights into strain-specific transcriptome organization and sRNAs, and reveals genes that could modulate phenotypic variation among strains despite high conservation at the DNA level.}, language = {en} } @article{AlbrechtSharmaReinhardtetal.2010, author = {Albrecht, Marco and Sharma, Cynthia M. and Reinhardt, Richard and Vogel, Joerg and Rudel, Thomas}, title = {Deep sequencing-based discovery of the Chlamydia trachomatis transcriptome}, url = {http://nbn-resolving.de/urn:nbn:de:bvb:20-opus-68389}, year = {2010}, abstract = {Chlamydia trachomatis is an obligate intracellular pathogenic bacterium that has been refractory to genetic manipulations. Although the genomes of several strains have been sequenced, very little information is available on the gene structure of these bacteria. We used deep sequencing to define the transcriptome of purified elementary bodies (EB) and reticulate bodies (RB) of C. trachomatis L2b, respectively. Using an RNAseq approach, we have mapped 363 transcriptional start sites (TSS) of annotated genes. Semiquantitative analysis of mapped cDNA reads revealed differences in the RNA levels of 84 genes isolated from EB and RB, respectively. We have identified and in part confirmed 42 genome- and 1 plasmid-derived novel non-coding RNAs. The genome encoded non-coding RNA, ctrR0332 was one of the most abundantly and differentially expressed RNA in EB and RB, implying an important role in the developmental cycle of C. trachomatis. The detailed map of TSS in a thus far unprecedented resolution as a complement to the genome sequence will help to understand the organization, control and function of genes of this important pathogen.}, subject = {Biologie}, language = {en} } @article{AlbrechtSharmaDittrichetal.2011, author = {Albrecht, Marco and Sharma, Cynthia M. and Dittrich, Marcus T. and M{\"u}ller, Tobias and Reinhardt, Richard and Vogel, J{\"o}rg and Rudel, Thomas}, title = {The Transcriptional Landscape of Chlamydia pneumoniae}, url = {http://nbn-resolving.de/urn:nbn:de:bvb:20-opus-69116}, year = {2011}, abstract = {Background: Gene function analysis of the obligate intracellular bacterium Chlamydia pneumoniae is hampered by the facts that this organism is inaccessible to genetic manipulations and not cultivable outside the host. The genomes of several strains have been sequenced; however, very little information is available on the gene structure and transcriptome of C. pneumoniae. Results: Using a differential RNA-sequencing approach with specific enrichment of primary transcripts, we defined the transcriptome of purified elementary bodies and reticulate bodies of C. pneumoniae strain CWL-029; 565 transcriptional start sites of annotated genes and novel transcripts were mapped. Analysis of adjacent genes for cotranscription revealed 246 polycistronic transcripts. In total, a distinct transcription start site or an affiliation to an operon could be assigned to 862 out of 1,074 annotated protein coding genes. Semi-quantitative analysis of mapped cDNA reads revealed significant differences for 288 genes in the RNA levels of genes isolated from elementary bodies and reticulate bodies. We have identified and in part confirmed 75 novel putative non-coding RNAs. The detailed map of transcription start sites at single nucleotide resolution allowed for the first time a comprehensive and saturating analysis of promoter consensus sequences in Chlamydia. Conclusions: The precise transcriptional landscape as a complement to the genome sequence will provide new insights into the organization, control and function of genes. Novel non-coding RNAs and identified common promoter motifs will help to understand gene regulation of this important human pathogen.}, subject = {Chlamydia pneumoniae}, language = {en} }
ESSENTIALAI-STEM
Python Coding Class Follow-up Info For those that were wondering, I found a MUCH better Python sandbox where you can write Python programs online, in your browser. Use this as a starting place: https://repl.it/@RobertTalada/LibraryDemo The link above is great for getting started with Python, and I highly encourage you to use that until you start to hit its limitations. Then, if you want to move into using Python to make graphics and create more elaborate programs, you’ll need a Raspberry Pi or a full blown Python installation on a computer. Python can be run just about anywhere. You can borrow a Raspberry Pi from the Library and get started programming immediately or install Python on a computer you already have. If you have a laptop or desktop computer at home (it will not need to be super new), you can download and install Python. Here is a good place to get you started. Any computer running Windows 7 or later or Mac OS X should be fine. A good, basic IDE for Python would be Thonny, which is also available for Windows, not just the Raspberry Pi:  https://thonny.org/ If you’d like to use something more advanced, try Sublime Text: https://www.sublimetext.com/  If you have a Chromebook, you will be limited to https://repl.it/languages/Python3 unless you follow some pretty complex directions. If you’re feeling adventurous, those complex directions are: https://wsvincent.com/install-python3-chromebook/ Here are some additional learning resources (ordered by difficulty, from easy to very challenging): https://automatetheboringstuff.com/ http://greenteapress.com/thinkpython/html/index.html http://www.diveintopython3.net/ http://chimera.labs.oreilly.com/books/1230000000393 http://interactivepython.org/runestone/static/pythonds/index.html
ESSENTIALAI-STEM
What is CSS cross-browser compatibility in 2023? iamdtms 2 min readApr 6 -- “CSS compatibility — AI version” Intro A thought experiment from the perspective of many years. Earlier times, “cross-browser compatibility” was a super rhyme for agencies developing application. In 2000s. Since @supports (2019) static method been, and container queries (2022) placed, CSS logic started transforming irreversible. Cross-browser • The browser support of style definitions been querying by @supports rules easily: https://caniuse.com/css-supports-api • The app/lib UI logic might been built for the most supported props, it is a personal interest at the first of the app/lib need to work with a huge range of devices! • Browsers cruel race increasingly rises face-to-face to support CSS features wider and earlier as well. Nobody like unsupported style definitions. As we see, creating an app for “everybody” in 2023 means making CSS for… • a large scale of viewport range availability container queries from XS mobiles to 4K TVs. • a large number of browsers backward compatibility also represented by having default styles updated by @supports rule extensions if available. • the complexity of the application logic even more and more robust supporting x browser y version z viewport size. It is also can be solved. Conclusion Although in the age of Singularity, this is not our biggest problem available to create an app for a new arrival company, even so how we manage and keeps up the thing called Internet what is the citadel of human knowledge, hopefully not consumed finally by AI robots. -- --
ESSENTIALAI-STEM
Alain Meyer Alain Meyer (born 21 November 1949 in Luxembourg City) is a Luxembourgish politician. He was the President of Luxembourg's Council of State, in which capacity he served from 1 October 2007 till 14 November 2009. A member of the Luxembourg Socialist Workers' Party since 1981, Meyer was first nominated to the Council of State on 15 November 1991 to replace Georges Thorn. He was named Vice-President of the Council of State on 18 December 2006, and President on 1 October 2007 to replace Pierre Mores.
WIKI
Page:Oregon Historical Quarterly vol. 9.djvu/404 376 John Minto. tion there has grown up quite a body of magazine literature in regard to the loss of natural resources by fire, floods, erosions, etc., ascribed generally to the destruction of the forest cover, ""liese sources of waste are summarized by the President as follows: "The Southern Appalachian region embraces the highest peaks and largest mountain masses east of the Rockies. It is the greatest physiographic feature of the eastern half of the continent and no such lofty mountains are covered with hard- wood forests in all North America, ''Upon these mountains descends the heaviest rainfall in the United States, except that of the North Pacific Coast; it is often of extreme violence, as much as eight inches having fallen in eleven hours, thirty-one inches in a month, and one hundred and five inches in a year. "The soil, once denuded of its forests and swept by tor- rential rains, rapidly loses first its humus, then its rich upper strata, and finally is washed in enormous volume into the streams, to bury such of the fertile lowland as is not eroded by the floods ; to obstruct the rivers and to fill the harbors of the coast. More good soil is now washed from these cleared mountain-side fields during a single heavy rain than during centuries under forest cover." This description of results by the President is unquestioned as to some of the mountains and farms of that region, and the manner of rainfall described is not uncommon as far north as Pennsylvania. On the Pacific Coast, however, the 105-inch record is limited to a low gap in the Coast Range in Tillamook County, Oregon, extending less than twenty miles from south to north. But the President's mention of the North Pacific as a region having as much rainfall annually as he mentions— 105 inches— carries an inference, to the uninformed, that the North Pacific Coast receives its rains in the same way and with like results. Such an assumption would be a very serious mistake. Judging by the number of writers seeking attention through the cheap magazines, it is time that some one who has lived on this coast and had some opportunities to have an intelli- gent view of nature's operations in the three separate ranges
WIKI
New to Telerik Test Studio? Download free 30-day trial Execute Custom Scripts Before/After the Test Run • I would like to invoke a custom script once the test finishes. The custom script must have access to newly-generated test results. • I would like to invoke a custom script just before the test starts executing. Solution Override the OnAfterTestCompleted(TestResult result) method for the "after" script and the OnBeforeTestStarted() method for the "before" script. They are both members of the BaseTest class that are invoked once the test finishes or before it starts. First, create a coded step in order to generate a code-behind file. Then open the code-behind class and add the override definition inside the BaseTest class. Standalone version 1. If your test doesn't contain any coded steps, add a Script Step in order to generate the code-behind file. 2. Once you add the script step, click View Class to make the BaseTest class visible. View Class button 1. Add the override definition inside the BaseTest, but not inside another method/coded step. Override definition Visual Studio plugin 1. If your test doesn't contain any coded steps, click the Add Code-Behind File button. 2. If you test contains a coded step, right click it and select View Code to go to the code-behind file. View code 1. Write the override definition inside the BaseTest (but not inside another method/coded step). The Override Definition The TestResult object lets you access the test results from the run that just finished (i.e. the one invoking the OnAfterTestCompleted method): public override void OnAfterTestCompleted(TestResult result) { string overall = Convert.ToString(result.Result); Log.WriteLine(overall); result.ExportToResultFile(@"C:\", result.TestName); } Public Overrides Sub OnAfterTestCompleted(result As TestResult) Dim overall As String = Convert.ToString(result.Result) Log.WriteLine(overall) result.ExportToResultFile("C:\", result.TestName) End Sub The OnBeforeTestStarted method allows you to perform actions required for the initialization of your test (starting scripts, etc.): public override void OnBeforeTestStarted(BeforeTestStartedArgs args) { this.ExecuteTest("Folder1\\WebTest2.tstest"); } Public Overrides Sub OnBeforeTestStarted(BeforeTestStartedArgs args) Me.ExecuteTest("Folder1\WebTest2.tstest") End Sub You can use logic from assemblies in these methods. First add references to the assemblies. For Test Studio Standalone version, see the article on how to Add an Assembly Reference. In this article Not finding the help you need? Improve this article
ESSENTIALAI-STEM
Kavita MISRA, Plaintiff-Appellant, v. Naveen MISHRA, Defendant-Appellee. No. 17AP-306 Court of Appeals of Ohio, Tenth District, Franklin County. Rendered on December 20, 2018 On brief: Arenstein & Andersen Co., LPA, Jessica L. Sohner, and Nicholas I. Andersen, Dublin, for appellant. Argued: Jessica L. Sohner. DECISION HORTON, J. {¶ 1} Plaintiff-appellant, Kavita Misra, appeals from a judgment of the Franklin County Court of Common Pleas, Division of Domestic Relations, which granted a divorce to appellant and appellee, Naveen Mishra, pro se, and determined the division of property, spousal support, and all issues related to the parties' two children. Appellee did not file an appellee's brief. For the following reasons, we reverse in part and affirm in part the judgment. I. FACTS AND PROCEDURAL HISTORY {¶ 2} The following are the pertinent facts and procedural history. Appellant and appellee were married on November 4, 2003 in New Delhi, India, and moved to the United States shortly thereafter. The parties have two minor children born as issue of the marriage. The parties separated on or about October 19, 2015, after a domestic disturbance which resulted in appellee being found guilty of violating R.C. 2919.25(A), domestic violence, and R.C. 2903.13(A), assault. {¶ 3} Appellant filed a complaint for divorce on November 9, 2015. Appellee filed his answer and counterclaim on December 18, 2015. On December 20, 2016, the parties entered into a stipulated agreement as to separate property that was read into the record at trial and admitted as a joint exhibit. (Joint Ex. 2.) Specifically, appellee stipulated that "[appellee] hereby expressly agrees that the sum of $500,000.00, plus the passive income derived from the same, constitutes a gift to [appellant] and shall be awarded to [appellant] as her separate property pursuant to R.C. § 3105.171(A)(6)(a)(vii)." (Joint Ex. 2 at ¶ 4.) In addition, the parties agreed that separate non-marital funds from the gift totaling $16,976.34 would be transferred to appellant. Both parties concede that appellee transferred to appellant the cash sum of $500,000 days before appellant filed for divorce. {¶ 4} This matter was tried before the trial court on January 17, February 22, 23, 27, and March 2 and 3, 2017. The evidence showed that, at the time of the trial in the case, appellee was employed as a software engineer with JP Morgan Chase, where he had been employed for the past 10 years. Appellee has been employed in the same field for approximately 23 years and was earning $96,500 at the time of trial. Prior to the parties' marriage, he had obtained a bachelor of arts degree in commerce from a school in India. {¶ 5} Prior to the parties' marriage, appellant had obtained a degree of arts in psychology from a school in India. At the start of this trial, appellant was employed as a part-time assistant with two different employers: Dublin Latchkey (since November 2016) and The Barrington School (since January 2017). {¶ 6} The trial court was troubled by appellant's handling of her separate property assets. Appellant testified that she earned a mere $675 in interest income in 2016 on accounts whose balances totaled in excess of $500,000. She also readily admits that Indian banks routinely pay 8 percent interest per year and that she presently earns 9.25 percent interest per year on her existing Axis Bank Fixed Deposit account. The trial court asked her "[w]hy haven't you moved [her accounts] to something that is going to make more money?" (Jan. 17, 2017 Tr. Vol. II at 222.) Appellant responded, "I didn't want to move it while I was in trial." Id. Appellant did say that after the divorce she would discuss her finances with a professional. (Tr. Vol. II at 223.) {¶ 7} On March 29, 2017, the trial court issued its "Judgment Entry-Decree of Divorce" (hereinafter "Divorce Decree"). As relevant to this appeal, in the Divorce Decree the trial court granted both parties an "absolute divorce" from each other. Id. In addition, the parties stipulated that appellant's earned income was $16,848. (Divorce Decree at 13.) The trial court also found that appellant voluntarily elected to forego pursuing meaningful, full-time employment, and she has never worked full time during the course of the parties' marriage. As such, the trial court found that appellant is voluntarily underemployed and electing not to work on a full-time basis although she is entirely capable of doing so. Hence, her income would be imputed at a figure higher than her stipulated current annual earnings of $16,848. (Divorce Decree at 14.) {¶ 8} The trial court, in attempting to apply R.C. 1343.03 and 5703.47 found that "the annual interest rate for tax year 2017 tax obligations will be 6% annually plus 3% = 9%." (Divorce Decree at 18.) As such, the trial court imputed interest income at 9 percent on appellant's accounts, which totaled $515,353, for an interest income total of $46,382. Id. {¶ 9} Furthermore, the trial court found that no impediments existed to appellant working full-time. (Divorce Decree at 22.) Therefore, the trial court imputed full-time employment to appellant at the same rate of pay she was receiving as a part-time employee, which increased her yearly income from the stipulated amount of $16,848 to $22,880. (Divorce Decree at 18.) As such, appellant was deemed to an imputed income amount of $69,262. Again, the court found that appellee's income was $96,500 per annum. Id. {¶ 10} The trial court utilized these income amounts in deciding that appellee was to pay child support in the amount of $954 per month, and that he would maintain primary health insurance coverage for the children. (Divorce Decree at 10-11.) In addition, pursuant to R.C. 3119.01, the parties would equally pay the first $100 of the reasonable and ordinary uninsured and unreimbursed medical expenses for the minor children, and any extraordinary medical expenses (defined as those exceeding the first $100) including co-payments and/or deductibles would be divided between the parties with appellant paying 42 percent and appellee paying 58 percent of such expenses. (Divorce Decree at 11.) The trial court also found that appellant was not entitled to spousal support. (Divorce Decree at 22.) II. ASSIGNMENTS OF ERROR {¶ 11} Appellant appeals and raises the following assignments of error for our review: [I.] The trial court erred and abused its discretion when it concluded that Appellant was voluntarily underemployed pursuant to R.C. § 3119.01. [II.] The trial court erred and abused its discretion when it imputed income to Appellant in the amount of $69,262 per year. [III.] The trial court erred and abused its discretion when it failed to calculate Appellee's child support obligation in accordance with R.C. § 3119.01, et seq. and further divided the uninsured health expenses according to an erroneous allocation of the parties' income. [IV.] The trial court erred and abused its discretion when it determined that spousal support is not warranted or supported by the evidence. [V.] The trial court erred and abused its discretion when it arbitrarily disregarded the parties' stipulation that $16,976.34 of funds held in the parties' bank accounts were non-marital separate property and included the funds in its division of marital assets. III. STANDARD OF REVIEW {¶ 12} We first note that generally the judgments of domestic relations courts are upheld absent a finding that the court abused its discretion. Patel v. Patel , 10th Dist., 2014-Ohio-2150, 11 N.E.3d 800, ¶ 14, citing Scinto v. Scinto , 10th Dist. No. 09AP-5, 2010-Ohio-1377, 2010 WL 1248298, ¶ 4, citing Booth v. Booth , 44 Ohio St.3d 142, 144, 541 N.E.2d 1028 (1989). An abuse of discretion connotes more than an error of law or judgment; it implies that the court's attitude is unreasonable, arbitrary or unconscionable. Blakemore v. Blakemore , 5 Ohio St.3d 217, 219, 450 N.E.2d 1140 (1983). {¶ 13} We note that the trial court, as trier of fact, "was in the best position to assess the credibility of the witnesses and to determine which testimony it found believable." Mayle v. Ohio Dept. of Rehab. & Corr. , 10th Dist. No. 09AP-541, 2010-Ohio-2774, 2010 WL 2433119, ¶ 32, citing Seasons Coal Co. v. Cleveland , 10 Ohio St.3d 77, 461 N.E.2d 1273 (1984). In addition, "we always bear in mind the trial court's large measure of discretion to determine the sufficiency of the evidence, the credibility of the witnesses and the weight to be given to the testimony." Buckles v. Buckles , 46 Ohio App.3d 102, 116, 546 N.E.2d 950 (10th Dist.1988). See also Chapman v. Chapman , 10th Dist. No. 04AP-812, 2005-Ohio-2801, 2005 WL 1331942, ¶ 14. IV. DISCUSSION {¶ 14} In general, appellant argues that the trial court erred as to the parties' respective income/earning capacity in calculating appellee's child support obligation, and additionally in finding that spousal support was not warranted. As a result of the improper calculation of the parties' income, appellant submits that the trial court's calculation as to support was erroneous and an abuse of discretion. A. ASSIGNMENT OF ERROR ONE-VOLUNTARILY UNDEREMPLOYED {¶ 15} In assignment of error one, appellant submits that the trial court committed error and an abuse of discretion in concluding that appellant was voluntarily underemployed because: (1) the parties stipulated to appellant's earning capacity, and (2) competent and credible evidence was not presented by appellee to support a finding that appellant was voluntarily underemployed. {¶ 16} Pursuant to R.C. 3119.01(C), income for child support purposes is defined to include the sum of the parent's gross income and "any potential income of the parent." R.C. 3119.01(C)(5)(b). Potential income includes imputed income that the court determines the parent would have earned if fully employed based upon the criteria articulated in R.C. 3119.01(C)(11)(a)(i) through (x). Even if defendant were "totally unable to earn any real or potential income" as found by the trial court, the statutory duty of support attaches to available assets pursuant to R.C. 3103.03 and 3113.215(A) and (B). Williams v. Williams , 10th Dist. No. 92AP-438, 1992 WL 246020 (Sept. 24, 1992). {¶ 17} As we stated in Meeks v. Meeks , 10th Dist. No. 05AP-315, 2006-Ohio-642, 2006 WL 328685, ¶ 35 : [B]efore a trial court may impute income to a parent, it must first find that the parent is voluntarily unemployed or underemployed. Inscoe v. Inscoe (1997), 121 Ohio App.3d 396, 424, 700 N.E.2d 70 ; Marek v. Marek , 158 Ohio App.3d 750, 2004 Ohio 5556, 822 N.E.2d 410 at ¶ 14. Whether a parent is voluntarily unemployed or underemployed is a determination within the trial court's discretion and will be upheld absent an abuse of discretion. Rock v. Cabral (1993), 67 Ohio St.3d 108, 112, 616 N.E.2d 218. Once a party is found to be voluntarily underemployed, the court may impute income to that party for purposes of calculating support. Apps v. Apps , 10th Dist. No. 02AP-1072, 2003-Ohio-7154, 2003 WL 23024253, ¶ 48. As we said in Harper v. Harper, 10th Dist. No. 01AP-1314, 2002-Ohio-4320, 2002 WL 1938319, ¶ 24 : The decision to impute income to a parent involves a two-step process. Smith v. Smith (Feb. 10, 2000), Franklin App. No. 99 AP-453 [2000 WL 145077]. First, the trial court must conclude that the parent is voluntarily unemployed or underemployed. Id. If the court so finds, then the trial court must determine the amount of income to impute based on the factors set forth in R.C. [3119.01(C)(11)(a) ] and the facts and circumstances of the case. Id. {¶ 18} Pursuant to R.C. 3119.01(C)(11)(a), when imputing income to a parent, the trial court must consider the enumerated factors. Meeks at ¶ 37. The trial court made the following findings regarding the underemployed issue: In this case, Plaintiff has never been employed on a full-time basis. Although she concedes that she earned the same degree as Defendant, she argues that initially Defendants controlling manner prevented her from working outside the home. Then later in the relationship, she simply experienced difficulty finding suitable employment with her degree given her lack of work experience. However, by the time of trial, Defendant and Plaintiff had been living separate and apart for nearly 18 months. Both parties concede that Defendant transferred to Plaintiff's sole dominion and control the cash sum of $500,000 days before the date of filing of the instant Complaint for Divorce on November 9, 2015. Therefore, for quite some time now, Plaintiff has enjoyed the freedom to pursue work and/or education opportunities, and she has possessed the financial means to facilitate the same - but elected not to do so . * * * In this case, the testimony and evidence establishes that Plaintiff voluntarily elects to forego pursuing meaningful, full-time employment, and she has never worked full time during the course of the parties' marriage. Through his examination of Plaintiff, Defendant proves that the parties' children have only been enrolled in limited extra-curricular activities and only since November of 2016. The parties agree that Plaintiff sought and obtained her first part-time job on/about November 21, 2016. * * * Indisputably, Plaintiff is voluntarily underemployed and electing not to work on a full-time basis although she is entirely capable of doing so. Hence, her income shall be imputed at a figure higher than her stipulated current annual earnings of $16,848. (Emphasis sic.) (Divorce Decree at 12-14.) {¶ 19} Appellant argues that, on the first day of trial, the parties stipulated as to both appellant's income and earning capacity in the amount of $16,848. Appellant reasons that because the trial court accepted the parties' stipulation as to appellant's income and earning ability, it was unnecessary to make further factual findings on these issues. {¶ 20} Appellant's argument is based on the following testimony elicited by the court: THE COURT: So you are withdrawing your statement and saying that 16,848 is a fair statement of her income or earning potential? MR. MISHRA: No. Actually, if she calculate everything, she can earn a lot more. THE COURT: Pardon me? MR. MISHRA: She can earn more. THE COURT: Then what is the number that you are going to be proposing to the Court. MR. MISHRA: I'm not ready for that right now. THE COURT: What do you mean you are not ready for that? MR. MISHRA: I am okay with 16,800. THE COURT: We are not going to do this. We're not going to go back and forth. We're not. So I will ask you one last time. Are you stipulating that your wife's income or earning ability is, in fact, 16,848, yes or no? MR. MISHRA: Yes. (Tr. Vol. I at 36.) {¶ 21} Appellant argues that appellee stipulated to appellant's income and earning capacity. First, we note that the trial court asked appellee if he was stipulating to appellant's income or earning capacity. At this opening stage of the trial, the trial court did not clarify whether the stipulation was to income and/or earning capacity. However, the trial court interpreted the stipulation as applying to income only. Later in the trial, the trial court allowed appellee, over appellant's objection, to testify as to his estimation of appellant's actual income and earning capacity. (Tr. Vol. III at 459-61, 465.) The trial court specifically found that the parties did not stipulate as to earning ability. (Tr. Vol. III at 460.) Our review shows that the trial court did not abuse its discretion in finding that appellee's stipulation applied only to income. {¶ 22} Appellant further argues that competent and credible evidence was not presented by appellee to support a finding that appellant was voluntarily underemployed. Appellant claims that because that the trial court did not properly follow the requirements of R.C. 3119.01, it erred and abused its discretion in determining appellant's income for purposes of calculating support obligations. Appellant cites to our cases of Chapman and Apps . {¶ 23} However, Chapman and Apps are clearly distinguishable from the present action. In Chapman , "the trial court did not explicitly refer to R.C. 3119.01(C)(11) when it imputed income to the appellant, and the judgment entry contains no indication that the trial court considered any of the factors set forth in R.C. 3119.01(C)(11)." Id. at ¶ 12. In Apps, "[t]he trial court did not make an explicit finding that appellant was voluntarily unemployed or underemployed prior to imputing potential income to her. Further, the judgment entry contains no indication that the trial court considered any of the factors set forth in R.C. 3119.01(C)(11)." Id. at ¶ 49. {¶ 24} Contrary to Chapman and Apps , in the present case the trial court noted that it was mandatory that the trial court consider the statutory factors pursuant to R.C. 3119.01(C)(11)(a) in determining its imputation of income to appellant. Specifically, the trial court addressed the factors and found that appellee failed to introduce any testimony or evidence that related to R.C. 3119.01(C)(11)(a)(iv), (v) and (ix). (Divorce Decree at 14-15.) The trial court found R.C. 3119.01(C)(11)(a)(i), (iii), (vii), and (viii), inapplicable and/or irrelevant to the case at bar. (Divorce Decree at 15.) In addition, the trial court found R.C. 3119.01(C)(11)(a)(ii) -level of education, (vi)-special skills and training, and (x)-any other relevant factor, were applicable and/or relevant to this particular case. Id. The trial court then proceeded to discuss appellant's education and training and her handling of her separate property assets. (Divorce Decree at 15-16.) In addition, the trial court also noted that it is not the trial court's duty to investigate or develop evidence not presented by the parties. The trial court may presume that any factor not substantiated by evidence is immaterial to its determination of imputed income. Wilburn v. Wilburn , 169 Ohio App.3d 415, 2006-Ohio-5820, 863 N.E.2d 204, ¶ 38 (9th Dist.). Our review shows that the trial court did consider the R.C. 3119.01 factors in deciding the imputation of income to appellant. {¶ 25} The trial court found that appellant was voluntarily underemployed and electing not to work on a full-time basis, although she was entirely capable of doing so. Hence, her income would be imputed at a figure higher than her stipulated current annual earnings. Based on our review of the record, including the trial transcript and the evidence, as well as noting that the trial judge, as trier of fact, was in the best position to determine the credibility of the witnesses, as well as the weight to be afforded to the evidence, we find that the trial court did not abuse its discretion in finding that appellant was voluntarily underemployed. Appellant's first assignment of error is overruled. B. ASSIGNMENT OF ERROR TWO-IMPUTED INCOME {¶ 26} In assignment of error two, appellant argues that the trial court's imputation of employment income to appellant in the amount of $22,880 constitutes an abuse of discretion, and that the imputation of 9 percent per annum to appellant's separate property assets was unreasonable and unsupported by the facts of this case and relevant statutes. {¶ 27} In the present case, at the time of the trial, appellant was employed for approximately 30 hours per week as a part-time assistant with two different employers. Appellant testified she would be able to obtain another position, but it would likely be a similar position. (Divorce Decree at 21.) The court then extrapolated her current pay rate in her part-time positions to full-time and found that "Plaintiff's income from the $10 to 12 per hour part-time jobs she typically works annualize to roughly $22,880 per annum." (Divorce Decree at 18.) As such, although the trial court felt that appellant was qualified for higher paying jobs, the trial court imputed income at appellant's current rate of pay from the stipulated income amount of $16,848 to $22,880, i.e., the trial court imputed approximately $6,000 in additional income. {¶ 28} Appellant argues that Ohio courts have previously held that it is improper to calculate imputed earnings by merely extrapolating an hourly wage over a full-time basis. See Marek at ¶ 22, citing Arnott v. Arnott , 9th Dist. No. 21291, 2003-Ohio-2152, 2003 WL 1983819, ¶ 15. A review of these Ninth District Court of Appeals cases shows that they are distinguishable from the present case. In Marek , the court stated that "[w]e find such an approach especially troublesome in this case, where the hourly wage is based on the defendant's rough guess, elicited by his own attorney and challenged by the opposing attorney; the same testimony explains that the work season is only seven months; and the defendant expressly testifies that such a wage would not apply to him." Id. at ¶ 22. Likewise in Arnott at ¶ 15, the court found that: The record, however, does not support Wife's assertion that the trial court should have extrapolated Husband's fifty-five dollar hourly rate over a full time basis to calculate his annual income. Husband testified that fifty-five dollars was his hourly rate, but did not testify that he earned this rate on a full-time (i.e., forty hours per week) basis. Rather, Husband testified that the plumbing business was sometimes busy and sometimes slow, and generally was busier during the summer. Husband also testified that some jobs were billed on a flat fee, rather than an hourly, basis. Husband estimated that his net receipts from his plumbing employment in 2000 would be between $ 12,500 and $ 12,700. Husband also testified that his gross receipts from his plumbing business in 1999 were $ 28,466, and he anticipated that his gross receipts in 2000 would be approximately twenty-five percent higher. In addition, Husband had back surgery immediately before the trial, which he testified would incapacitate him for eight to ten weeks. In light of all the foregoing, we cannot conclude that the trial court abused its discretion in refusing to impute a full time wage of fifty-five dollars per hour for purposes of calculating Husband's child support obligation. {¶ 29} Our review of the trial court's imputation of income of approximately $6,000 does not raise the same issues of unreliability that are raised in Marek and Arnott . We do not find that the trial court abused its discretion in imputing full-time employment at the same pay rate to appellant. {¶ 30} Appellant argues that her separate property did not qualify as "nonincome-producing assets," and therefore, it was an improper abuse of discretion for the trial court to impute additional interest income to them. Appellant claims that while R.C. 3119.01(C)(11) permits the imputation of employment income to a parent that is not fully employed and/or an imputation of income to nonincome-producing assets, it does not permit the imputation of income to income-producing assets. Appellant cites Rapp v. Rapp , 89 Ohio App.3d 85, 89, 623 N.E.2d 624 (12th Dist.1993), for the proposition that "an asset that produces income * * * does not come within the definition of a 'nonincome-producing asset.' " {¶ 31} However, our review shows that the question before the Twelfth District Court of Appeals was whether a roll-over IRA that was established two years prior to the motion to decrease child support falls under the definition of "income" as set forth in what is now R.C. 3119.01. Rapp at 88, 623 N.E.2d 624. Other appellate courts in Ohio have addressed closely analogous questions. In Albertson v. Ryder , 85 Ohio App.3d 765, 621 N.E.2d 480 (11th Dist.1992), for example, the court held that annual interest from an obligor's IRA or employee savings plan could be considered as gross income when determining child support. In Rapp , the trial court did not predicate its child support order on either the interest income appellant gained from the IRA or on a contribution he made to the IRA. In fact, during the two-year period he has maintained the IRA, appellant did not contribute any additional money to the retirement account. Rather, the court focused exclusively on an IRA that was created two years before the motion to decrease child support was filed. As such, the actual holding in Rapp was that an "IRA is an asset that produces income and thus does not come within the definition of a 'nonincome-producing asset.' " Id. at 89, 623 N.E.2d 624. {¶ 32} In the present case, it is not disputed by the parties that the computation of the child support order is governed by R.C. 3119.01. The definition of "income" as set forth in R.C. 3119.01 is intended to be both broad and flexible. See, e.g., Williams v. Williams , 74 Ohio App.3d 838, 843, 600 N.E.2d 739 (4th Dist.1991). Such an expansive definition is necessary to ensure that the best interest of children, the intended beneficiaries of child support awards, are protected. For the purpose of calculating a child support obligation, "income" is defined by R.C. 3119.01(C)(5) in the following manner: "Income" means either of the following: (a) For a parent who is employed to full capacity, the gross income of the parent; (b) For a parent who is unemployed or underemployed, the sum of the gross income of the parent and any potential income of the parent. (7) "Gross income" means, except as excluded in division (C)(7) of this section, the total of all earned and unearned income from all sources during a calendar year, whether or not the income is taxable, and includes income from salaries, wages, overtime pay, and bonuses to the extent described in division (D) of section 3119.05 of the Revised Code ; commissions; royalties; tips; rents; dividends; severance pay; pensions; interest ; trust income; annuities; social security benefits, including retirement, disability, and survivor benefits that are not means-tested; workers' compensation benefits; unemployment insurance benefits; disability insurance benefits; benefits that are not means-tested and that are received by and in the possession of the veteran who is the beneficiary for any service-connected disability under a program or law administered by the United States department of veterans' affairs or veterans' administration; spousal support actually received; and all other sources of income. "Gross income" includes income of members of any branch of the United States armed services or national guard, including, amounts representing base pay, basic allowance for quarters, basic allowance for subsistence, supplemental subsistence allowance, cost of living adjustment, specialty pay, variable housing allowance, and pay for training or other types of required drills; self-generated income; and potential cash flow from any source. (Emphasis added.) {¶ 33} The trial court found that appellant was underemployed and imputed potential income from interest associated with her separate property accounts. R.C. 3119.01(17)(b), reads: Potential income means both of the following for a parent who the court pursuant to a court support order, or a child support enforcement agency pursuant to an administrative child support order, determines is voluntarily unemployed or voluntarily underemployed: * * * (b) imputed income from any non-income-producing assets of a parent, as determined from the local passbook savings rate or another appropriate rate as determined by the court or agency, not to exceed the rate of interest specified in division (A) of section 1343.03 of the Revised Code, if the income is significant. {¶ 34} In the present case, the record shows that, in 2016, appellant earned only $675 in interest on accounts with assets of $515,353. As such, we take judicial notice that appellant's rate of return on her separate property interests was only 13/100 of one percent, or stated another way, her interest rate was .0013 percent. In one account with Wells Fargo, appellant only earned $43.46 in interest on a balance of $423,378.79. (Tr. Vol. II at 218.) The trial court commented that "[t]o earn $43 in a year off of $423,000 is ridiculous." (Tr. Vol. II at 222.) Appellant stated that she did not want to transfer the money into higher interest bearing accounts while she was involved in the divorce proceeding. Id. Based on the above, we do not find that the trial court abused its discretion in imputing income to appellant under R.C. 3119.01(17)(b). {¶ 35} Even if it was error to conclude that appellant's separate property accounts were nonincome producing, such error would be harmless. Although the trial court used the word "imputed" when it attributed interest income to appellant's separate property accounts, the record indicates that the trial court was treating the interest income as "potential cash flow" under R.C. 3119.01(C)(7), and not as "potential income" due to voluntary underemployment; thus, it was not necessary to find that appellant was unemployed or underemployed. See Smart v. Smart, 3d Dist. No. 17-07-10, 2008-Ohio-1996, 2008 WL 1849631, ¶ 19, quoting Sizemore v. Sizemore , 2d Dist. No. 13673, 1994 WL 558917 (Oct. 14, 1994), "[O]ne of the purposes of the 'potential cash flow' provision in [the statute] * * * [is] to prevent a parent from avoiding child support obligations by shifting present income to a cash flow expected to be enjoyed at some future time, when the children have become emancipated." {¶ 36} In Sizemore , the trial court did not find that the child support obligor was voluntarily unemployed or underemployed, but it did find that it was proper to impute 12 percent interest upon $115,237 that the obligor had loaned to his corporation, even though he was not currently receiving any interest or return on this investment. The court utilized the "potential cash flow" provision in the statute in order to prevent the obligor from avoiding his current child support obligations by shifting potential present income to some future time, after the children were emancipated. See also Smart at ¶ 23. Likewise, in the present case, appellant chose not to place her money in higher interest bearing accounts and therefore, did not receive the higher interest payments until after the litigation was concluded. {¶ 37} Finally, appellant argues that the trial court erred and abused its discretion in imputing income to appellant's accounts in the amount of 9 percent per annum. Appellant claims that pursuant to R.C. 1343.03 and 5703.47, the rounded federal short-term interest rate, as determined by the Tax Commissioner, is 1 percent, plus 3 percent, which yields 4 percent as the applicable per annum interest rate to be used in computing the interest that accrues during the calendar year of 2017. We agree. {¶ 38} Pursuant to R.C. 1343.03, the appropriate interest rate is determined pursuant to R.C. 5703.47, which provides that the federal short-term interest rate shall be determined on October 15 of each year, and the appropriate interest is the federal short-term interest rate rounded to the nearest whole number plus 3 percent, which shall then be the interest rate per annum used during the following calendar year. Hasch v. Hasch , 3d Dist. No. 4-05-15, 2006-Ohio-49, 2006 WL 39110, ¶ 8. {¶ 39} In this case, the pertinent tax rate for 2017 would be set by the federal short-term interest rate as of October 15, 2016, rounded to the nearest whole number plus three percent. In the Divorce Decree, the trial court cites to the applicable web address and states "the annual interest rate for tax year 2017 tax obligations will be 6% annually plus 3% = 9%." (Divorce Decree at 18.) The court then applies the 9 percent rate to appellant's separate property assets of $515,353, and imputes interest income in the amount of $46,382. The trial court adds this amount to the annual income of $22,880 and arrives at an income imputation of $69,262. We find the tax rate of 9 percent to be in error. {¶ 40} Our review shows that the October 2016 federal short-term interest rate was .66 percent, i.e., 0.66 percent. Rev. Rul. 2016-25 Table 1. The nearest whole number to 0.66 percent is 1 percent. Adding 3 percent to 1 percent equals 4 percent. As such, 4 percent is the correct interest rate. The trial court abused its discretion when it applied an erroneous interest rate, i.e., 9 percent, to appellant's separate property assets. Appellant's second assignment of error is sustained. C. ASSIGNMENT OF ERROR THREE-CHILD SUPPORT-HEALTH INSURANCE {¶ 41} In assignment of error three, appellant alleges that the trial court erred and abused its discretion when it erroneously imputed appellant's income to $69,262 per year for purposes of calculating child support and the allocation of health insurance expenses. Appellant further submits that the trial court erred and abused its discretion when it calculated child support based only on appellee's base salary and failed to consider other sources of appellee's income. {¶ 42} The starting point for determining the proper amount of child support to be paid is parental income, defined as gross income for those employed to full capacity or gross income plus potential income for those not employed to full capacity. Morrow v. Becker , 138 Ohio St.3d 11, 2013-Ohio-4542, 3 N.E.3d 144, ¶ 11 ; R.C. 3119.01(C)(5). This court has held that a trial court's judgment as to the amount of child support is unreasonable, and an abuse of discretion, when it lacks a rational basis or there is no sound reasoning process to support it. Poling v. Poling , 10th Dist. No. 13AP-189, 2013-Ohio-5141, 2013 WL 6157245, ¶ 22, citing Vaughn v. Vaughn , 12th Dist. No. CA2007-02-021, 2007-Ohio-6569, 2007 WL 4295707, ¶ 12. {¶ 43} Appellant alleges that the trial court erred and abused its discretion when it incorrectly imputed appellant's income for purposes of child support and the allocation of health insurance expenses. We agree. It is clear that the trial court erroneously imputed 9 percent (instead of 4 percent) of appellant's separate property assets as income. The calculations regarding child support and health insurance expenses lack a rational basis and are therefore in error. {¶ 44} Appellant also argues that the trial court erred and abused its discretion when it calculated child support and health insurance expenses based only on appellee's base salary. For purposes of child support, a parent's gross income is defined as "the total of all earned and unearned income from all sources during a calendar year, whether or not the income is taxable, and includes income from salaries, wages, overtime pay, and bonuses * * * royalties; tips; rents; dividends; * * * interest; * * * and all other sources of income." R.C. 3119.01(C)(7). {¶ 45} We note that appellee was earning approximately $96,500 in base salary at the time of trial. (Tr. Vol. I at 34-35.) In the child support computation summary worksheet, the parties' percentage of total income to total income, based solely on appellee's income of $96,500 and appellant's income of $69,262, was appellee at approximately 58 percent and appellant at approximately 42 percent. (Divorce Decree, Attachment B.) These percentages were used in the trial court's allocation of uncovered medical expenses. {¶ 46} Appellee testified that he could earn bonuses at JP Morgan Chase and previously earned a bonus in the amount of $1,500. (Divorce Decree at 20.) Appellee also testified to receiving extensive benefits from his employer totaling $31,562 in comprehensive benefits, including a 401(k) match, employee sponsored life insurance, contributions to a pension, and stock options. Id. {¶ 47} The trial court indicated that "the values of any such benefits, which have been quantified through testimony and evidence during the trial, are duly captured * * * and included in the Child Support Computation Summary Worksheet included as Attachment B." Id. However, our review of the worksheet attached shows that the calculations only reference appellee's base salary of $96,500 and fail to address these benefits. (Divorce Decree, Attachment B.) {¶ 48} Based on the above, we find that the trial court erred in imputing an erroneous amount of interest to appellant, and in failing to take into account appellee's gross income, including all earned and unearned income from all sources during a calendar year, whether or not the income is taxable, and including income from salaries, wages, overtime pay, bonuses, interest, and all other sources of income pursuant to R.C. 3119.01(C)(7). Therefore, appellant's third assignment of error is sustained. D. ASSIGNMENT OF ERROR FOUR-SPOUSAL SUPPORT {¶ 49} In assignment of error four, appellant argues that the trial court erred and abused its discretion when it determined that spousal support is not warranted or supported by the evidence. The appellant submits that it was error and an abuse of discretion for the trial court to impute income, i.e, the 9 percent interest income. Having found that the application of a 9 percent interest rate to appellant's separate private asset was error, we agree with appellant. {¶ 50} This court has previously found that the incorrect imputation of income to a party justifies remand on the issue of spousal support. Chapman at ¶ 22. In Meeks at ¶ 43, the trial court had used the same income figure that it had imputed to the obligor for child support when it calculated his spousal support obligation. This court concluded in Meeks that the amount of income imputed to the obligor was an abuse of discretion for purposes of calculating child support, this court also concluded that it was error to use that amount of income in calculating spousal support pursuant to R.C. 3105.18(C)(1)(a). Id. {¶ 51} Appellant also submits that the trial court failed to appropriately consider all of the statutory factors in R.C. 3105.18 when determining that spousal support was not warranted. "In determining whether to award spousal support, a trial court must consider the factors enumerated in R.C. 3105.18(C). As with its property division, a trial court need not itemize and comment upon each factor; however, there must [be] a clear indication in the court's decision that the factors were considered." Hightower v. Hightower , 10th Dist. No. 02AP-37, 2002-Ohio-5488, 2002 WL 31262059, ¶ 24. The record need only show that the trial court considered the factors in making its award. McClung v. McClung , 10th Dist. No. 03AP-156, 2004-Ohio-240, 2004 WL 98621, ¶ 21. {¶ 52} In the present case, the trial court addressed each of the R.C. 3105.18(C)(1) factors on which evidence was presented and noted that the additional R.C. 3105.18(C)(1) factors were not specifically addressed by the parties. "When a trial court specifically indicates that it has reviewed the appropriate statutory factors, there is a strong presumption that the factors were indeed considered." Huffman v. Huffman , 10th Dist. No. 01AP-726, 2002-Ohio-2565, 2002 WL 1290892, ¶ 35. Based on our review, we do not find that the trial court failed to appropriately consider the statutory factors of R.C. 3105.18. {¶ 53} Due to the incorrect amount of income being imputed to appellant, we sustain appellant's fourth assignment of error. E. ASSIGNMENT OF ERROR FIVE-NON-MARITAL SEPARATE PROPERTY {¶ 54} Appellant alleges that the trial court erred and abused its discretion when it disregarded the parties' stipulation that $16,976.34 of funds held in the parties' bank accounts were appellant's non-marital separate property and would be transferred to her, and included the same funds in its division of marital assets. (Stipulated Agreement as to Separate Property at ¶ 8.) The stipulated agreement as to separate property was read into the record and accepted into evidence as joint exhibit 2. This issue is not mentioned in the trial court's Divorce Decree, as such, appellant's fifth assignment of error is sustained. V. CONCLUSION {¶ 55} Having sustained appellant's second, third, fourth and fifth assignments of error, this action is remanded to the trial court with instructions to (1) impute interest income to appellant based on the correct interest rate, i.e., 4 percent, and then recalculate and reconsider the trial court's findings as to (2) child support and healthcare responsibilities pursuant to R.C. 3119.01, (3) spousal support pursuant to R.C. 3105.18, and (4) per assignment of error five, reconsider and implement paragraph 8 of the parties' stipulated agreement as to separate property. VI. DISPOSITION {¶ 56} For the foregoing reasons, appellant's first assignment of error is overruled. Appellant's second, third, fourth, and fifth assignments of error are sustained and this cause is remanded to the Franklin County Court of Common Pleas, Division of Domestic Relations, for further proceedings consistent with this decision. Judgment affirmed in part; reversed in part; case remanded with instructions. KLATT and DORRIAN, JJ., concur. "In Marker v. Grimm (1992), 65 Ohio St.3d 139, 601 N.E.2d 496, the Supreme Court of Ohio held that 'the terms of R.C. 3113.215 are mandatory in nature and must be followed literally and technically in all material respects.' Id. at paragraph two of the syllabus. We note that R.C. 3113.215 was repealed effective March 22, 2001, and was replaced by R.C. 3119.01. Because the provisions of R.C. 3119.01 are comparable to those in R.C. 3113.215, the court's statements regarding R.C. 3113.215 apply to R.C. 3119.01." Apps v. Apps , 10th Dist. No. 02AP-1072, 2003-Ohio-7154, ¶ 47. See http://apps.irs.gov/app/picklist/list/federalRates.html
CASELAW
Oracle Database 11g: Virtual columns 2 Views in the Oracle database have several uses. You can use them to provide a view of data in different tables as a single object to query. You can use views to achieve a virtualization layer. Also views can be used to provide a user specific view of data. Implementing views however also have some challenges if you want to ‘do it right’. You should consider grants to the table and the view. Maybe create synonyms. You should also consider what will happen if someone does access the underlying table since your data can now be queried from a different place (no single source of truth anymore). Do you want to have the view implement similar functionality as a table by providing an instead-of trigger when performing inserts on the view? Sometimes a view might seem too much for what you might want to accomplish. Suppose you want to add a single calculated field to a table. In this case there is a much easier solution than creating a view. A virtual column. The virtual column was introduced in Oracle Database 11g. In this blog post I’ll give a simple minimal example of how you can use a virtual column and some things to mind when doing. Disclaimer: this code will not conform to many standards and is only meant as a minimal example. Suppose we have the SCOTT schema with the EMP and DEPT tables: CREATE TABLE "SCOTT"."EMP" ( "EMPNO" NUMBER(4,0), "ENAME" VARCHAR2(10 BYTE), "JOB" VARCHAR2(9 BYTE), "MGR" NUMBER(4,0), "HIREDATE" DATE, "SAL" NUMBER(7,2), "COMM" NUMBER(7,2), "DEPTNO" NUMBER(2,0), CONSTRAINT "PK_EMP" PRIMARY KEY ("EMPNO"), CONSTRAINT "FK_DEPTNO" FOREIGN KEY ("DEPTNO") REFERENCES "SCOTT"."DEPT" ("DEPTNO") ENABLE ) CREATE TABLE "SCOTT"."DEPT" ( "DEPTNO" NUMBER(2,0), "DNAME" VARCHAR2(14 BYTE), "LOC" VARCHAR2(13 BYTE), CONSTRAINT "PK_DEPT" PRIMARY KEY ("DEPTNO") ) Adding a virtual column In the employee table we want to add a column for the location of the department. In order to keep it simple and thin, we do not want to create a view and avoid having to create additional objects, grants, synonyms, etc. The expression used in the virtual column definition however has some restrictions: • It cannot refer to another virtual column by name. • It can only refer to columns defined in the same table. • If it refers to a deterministic user-defined function, it cannot be used as a partitioning key column. • The output of the expression must be a scalar value. It cannot return an Oracle supplied datatype, a user-defined type, or LOB or LONG RAW. In order to reference a column from another table, we can use a function. PL/SQL functions however do not allow specifying the size of the return type. Thus while the LOC column in the SCOTT.DEPT table is 13 bytes, the virtual column will be of type varchar2 and thus use the maximum allowed size for a varchar2. In order to avoid this, you can cast the return value of the function to the correct size. You can also encounter the following error: SQL Error: ORA-30553: The function is not deterministic Cause: The function on which the index is defined is not deterministic Action: If the function is deterministic, mark it DETERMINISTIC. If it is not deterministic (it depends on package state, database state, current time, or anything other than the function inputs) then do not create the index. The values returned by a deterministic function should not change even when the function is rewritten or recompiled. Thus the function should be deterministic. See below for a working example of a function and a virtual column: CREATE OR REPLACE FUNCTION SCOTT.GET_DEPT_LOC( p_deptno IN NUMBER) RETURN VARCHAR2 DETERMINISTIC AS l_retval SCOTT.DEPT.loc%type; BEGIN SELECT loc INTO l_retval FROM SCOTT.DEPT WHERE SCOTT.DEPT.DEPTNO=p_deptno; RETURN l_retval; END; ALTER TABLE "SCOTT"."EMP" ADD( LOC VARCHAR2(13 BYTE) GENERATED ALWAYS AS (CAST(SCOTT.GET_DEPT_LOC(DEPTNO) AS VARCHAR2(13 BYTE) ))); The result looks as followed with LOC as the virtual column: Virtual column LOC Virtual column definition Serially reusable Something to mind is when you are using packages which have PRAGMA SERIALLY_REUSABLE specified, and you have your function inside that package, you will encounter the following error: ORA-06534: Cannot access Serially Reusable package string Cause: The program attempted to access a Serially Reusable package in PL/SQL called from SQL context (trigger or otherwise). Such an access is currently unsupported. Action: Check the program logic and remove any references to Serially Reusable packages (procedure, function or variable references) which might happen in PL/SQL called from sql context (trigger or otherwise). Using PRAGMA SERIALLY_REUSABLE can have performance benefits so I recommend to put the function in a separate package so the other package code can remain serially reusable. About Author Maarten is a software architect and Oracle ACE. Over the past years he has worked for numerous customers in the Netherlands in developer, analyst and architect roles on topics like software delivery, performance, security and other integration related challenges. Maarten is passionate about his job and likes to share his knowledge through publications, frequent blogging and presentations. 2 Comments 1. Marteen, could you amplify on this statement? “Using PRAGMA SERIALLY_REUSABLE can have performance benefits” My understanding of the feature is that it will force repeating initialization of the package, which might not be great for performance, but can help with freeing up PGA memory. Which I suppose could help with performance more broadly in the application….. Anyway, love to hear more from you on this! • Hi Steven. Thank you for noticing! I will get back on this (in a separate blog article) as soon as I have the time to setup a scenario (with concurrent service requests) and do some tests. With kind regards.
ESSENTIALAI-STEM
The Trojan War was a war waged, according to legend, against the city of Troy in Asia Minor by the armies of the Achaeans, following the kidnapping (or elopement) of Helen of Sparta by Paris of Troy. The war is among the most important events in Greek mythology and was narrated in a cycle of epic poems of which only two, the Iliad and the Odyssey of Homer, survive intact. The Iliad describes an episode late in this war, and the Odyssey describes the journey home of one of the Greek leaders, Odysseus. Other parts of the story, and different versions, were elaborated by later Greek poets, and by the Roman poet Virgil in his Aeneid. Ancient Greeks believed that the events Homer related were basically true. They believed that this war took place in the 13th or 12th century BC, and that Troy was located in the vicinity of the Dardanelles in what is now north-western Turkey. By modern times both the war and the city were widely believed to be mythological. In 1870, however, the German archaeologist Heinrich Schliemann excavated a site in this area which he believed to be the site of Troy, and at least some archaeologists agree. There remains no certain evidence that Homer's Troy ever existed, still less that any of the events of the Trojan War cycle ever took place. Many historians believe that the Homeric stories are a fusion of various stories of sieges and expeditions by the Greeks of the Bronze Age or Mycenean period, and do not describe actual events. Those who think that the stories of the Trojan War derive from a specific historical conflict usually date it to between 1300 BC and 1200 BC. According to Greek mythology, Zeus became king of the gods by overthrowing his father Cronus; Cronus in turn had overthrown his father Ouranos. Zeus came to learn of a prophecy that he himself would be overthrown by a son of his. (Within the extent of Greek myth, though, this never happened). Another prophecy said of the sea-nymph Thetis, with whom Zeus had an affair, that her son would be greater than his father. Possibly for one or both of these reasons, Thetis was betrothed upon Zeus' orders to a now-elderly human king, Peleus. To Peleus and Thetis a son was born, named Achilles. It was prophesied that he would die, young, at Troy. Hoping to protect him, when he was an infant his mother bathed him in the river Styx, making him invincible everywhere except the heel by which she held him. He grew up to be the greatest of all mortal warriors. All of the gods were invited to Peleus and Thetis' wedding, except Eris, or Discord. Insulted, she attended invisibly and cast down upon the table a golden apple on which were inscribed the words Kallisti, (To the fairest one). The apple was claimed by Hera, Athene, and Aphrodite. They quarreled bitterly over it, and none of the other gods would venture an opinion favouring one contender for fear of earning the enmity of the other two. Eventually, Zeus ordered the matter to be settled by the judgment of Paris, a prince of Troy, who was being raised as a shepherd because of a prophecy that he would be the downfall of Troy. The goddesses tried to bribe the boy. Athena offered Paris wisdom, skill in battle, and the abilities of the greatest warriors; Hera offered him political power and control of all of Asia, and Aphrodite offered him the love of the most beautiful woman in the world. Paris awarded the apple to Aphrodite, and returned to Troy. The Elopement of Helen The most beautiful woman in the world was Helen, one of the daughters of Tyndareus, king of Sparta. Her mother was Leda, who had been seduced by Zeus in the form of a swan; accounts differ over which of Leda's four children were fathered by Zeus and which by Tyndareus. Helen had scores of suitors, and her father was unwilling to choose one for fear the others would retaliate violently. Finally, one of the suitors, Odysseus of Ithaca, proposed a plan to solve the dilemma. In exchange for Tyndareus' support of his own suit towards Penelope, he suggested that Tyndareus require all of Helen's suitors to promise that they would defend the marriage of Helen, regardless of who she chose. The suitors duly swore the required oath, although not without a certain amount of grumbling. Helen chose Menelaus to wed. He had humbly not petitioned for her himself, but instead sent his brother Agamemnon on his behalf. The two brothers had been living at Tyndareus' court since being exiled from their homeland of Argos after their father, Atreus, was killed and had his throne usurped by his brother Thyestes and Thyestes' son Aegisthus. Menelaus inherited Tyndareus' throne of Sparta, with Helen as his queen, and Agamemnon married Helen's sister Clytemnestra and took back the throne of Argos. On a diplomatic mission to Sparta, Paris fell in love with Helen and, with Aphrodite's help, kidnapped or seduced her (accounts vary) and took her back to Troy as his wife. All the kings and princes of Greece were called upon to make good their oaths and retrieve Helen. The story of Helen is paralleled by the earlier elopement from Troy of the princess Hesione with Telamon of Salamis. The Marshalling of the Forces Odysseus had by this time married Penelope and fathered a son, Telemachus. In order to avoid the war, he feigned madness, and sowed his fields with salt. Palamedes outwitted him by putting his infant son in front of the plough, and Odysseus turned aside, unwilling to kill his son, and so revealed his sanity and joined the war. Calchas the oracle had stated that the Greeks would not win without Achilles. His mother Thetis, knowing that Achilles would die if he went to Troy, disguised him as a woman in the court of king Lycomedes in Scyros. There he had an affair with the king's daughter Deidameia, resulting in a child, Neoptolemus. Odysseus, Ajax the Greater, and Achilles's tutor Phoenix went to retrieve Achilles. According to one story they blew a horn, and Achilles revealed himself by seizing a spear to fight intruders rather than fleeing. According to another, they disguised themselves as merchants bearing trinkets and weaponry, and Achilles was marked out from the other women by admiring the wrong goods. Eventually, a fleet of more than a thousand ships was gathered, commanded by Agamemnon. But when they reached Aulis, the winds ceased. The prophet Calchas stated that the goddess Artemis was punishing Agamemnon for killing a sacred deer (or a deer in a sacred grove) and boasting that he was a better hunter than she. The only way to appease Artemis, he said, was to sacrifice Agamemnon's daughter Iphigenia. According to some versions, he did so, but others claim that he sacrificed a deer in her place, or nothing, and that Iphigenia was taken by Artemis to the Crimea to prepare others for sacrifice to her. Hesiod said she became the goddess Hecate. The Greeks also brought the bones of Pelops, father of Atreus and grandfather of Agamemnon and Menelaus to help them win the war. An oracle said they would be necessary to win. The Greek forces are described in detail in the Catalogue of Ships in the second book of the Iliad. They consist of 28 contingents from mainland Greece, the Peloponnese, the Dodecanese islands, Crete and Ithaca, amassing to a force of some 100,000 men. The Trojan forces are also listed in the second book of the Iliad, consisting of the Trojans themselves, led by Hector, and various allies listed as Dardanians, Zeleians, Adrasteians, Percotians, Pelasgians, Thracians, Ciconian spearmen, Paionian archers, Halizones, Mysians, Phrygians, Maeonians, Miletians and Lycians. When the Greeks left for the war, they accidentally stopped in Mysia, ruled by King Telephus. In the battle, Achilles wounded Telephus, who killed Thersander. The wound would not heal and Telephus asked an oracle who claimed "he that wounded shall heal". Telephus went to Aulis, and either pretended to be a beggar, asking Achilles to help heal his wound, or kidnapped Orestes and held him for ransom, demanding the wound be healed. Achilles refused, claiming to have no medical knowledge. Odysseus reasoned that the spear had inflicted the wound and the spear must be able to heal it. Pieces of the spear were scraped off onto the wound, and Telephus was healed. Philoctetes was Heracles's friend and, because he lit Heracles's funeral pyre when no one else would, he received Heracles's bow and arrows. He sailed with seven ships full of men to the Trojan War, where he was planning on fighting for the Greeks. They stopped on Chryse for supplies, and Philoctetes was bitten by a snake. The wound festered and smelled horrible; Odysseus advised and the Atreidae ordered Philoctetes to stay on Lemnos. Medon took control of Philoctetes's men. Philoctetes stayed alone on Lemnos for ten years. An oracle had prophesied that the first Greek to walk on the land after stepping off a ship in the Trojan War would be the first to die. Protesilaus, leader of the Phylaceans, fulfilled this prophesy. The Greeks buried him as a god and Hermes was sent to show him his wife one last time before going to Hades. His wife, Laodamia, followed him to his death. Alternatively, Hector killed Protesilaus and Laodamia killed herself in grief. After Protesilaus' death, his brother, Podarces, joined the war in his place. The Greeks besieged Troy for nine years. There were occasional skirmishes, both with Troy and her allies. At one point, Greek forces sacked a nearby town and Agamemnon took as his slave-girl Chryseis, daughter of Chryses, a priest of Apollo. When Chryses tried to buy her back, he was rebuked, so he prayed to Apollo to punish the Greeks, and the army was struck by a plague. Chryseis and Briseis The events of the Iliad begin at this point. For more information, see that article.COWSAn oracle told Agamemnon he must give up Chryseis. Furious at this, and at Achilles who had guaranteed the oracle his own protection, Agamemnon took Achilles' concubine Briseis as his own. Achilles and Agamemnon argued and Achilles refused to fight any longer. Although the Greeks were destined to win the war, Achilles begged his mother Thetis to intervene with Zeus and ensure that the Greeks did badly until Agamemnon apologized to Achilles. The next day the Greeks were badly beaten in open battle, and all of the major warriors but Ajax were eventually injured too seriously to continue. The Trojans, led by Hector, advanced steadily on the Greek position. Seeing the danger, Achilles let his comrade Patroclus borrow his armour, and lead his troops into battle. Patroclus was killed by Hector who then took Achilles' armour. Maddened with grief, Achilles swore revenge. He donned new armour from Hephaestus brought to him by Thetis, and killed Hector, then dragged his body from his chariot around Troy three times. He refused to return it to the Trojans for funeral rites. Priam, with protection from the gods, personally came and begged to have it back, at which point Achilles relented, and a truce was called for twelve days while Hector was buried. The narrative of the Iliad ends here. During the Trojan War, Xanthus, one of Achilles' horses, was rebuked by Achilles for allowing Patroclus to be killed. Xanthus responded by saying that a god had killed Patroclus and a god would soon kill Achilles too. The Erinyes struck the horse dumb. The Death of Achilles Shortly after the death of Hector, Achilles defeated Memnon of Ethiopia, Cycnus of Colonae and the Amazonian warrior Penthesilia (with whom Achilles also had an affair in some versions). He was very soon killed by Paris - either by a poisoned arrow (the arrow was guided by Apollo; Paris did not do it by himself), or in an older version by a knife to the back (or heel), while visiting a Trojan princess, Polyxena, during a truce. Both versions conspicuously deny the killer any sort of valour, saying Achilles remains undefeated on the battlefield. His bones were mingled with those of Patroclus, and funeral games were held. Like Ajax, he is represented as living after his death in the island of Leuke at the mouth of the Danube. Achilles' armour/death of AjaxAchilles' armour was the object of a feud between Odysseus and Ajax. They competed for it and Odysseus won. Ajax went mad with grief and vowed to kill his comrades; he started killing cattle (thinking they were Greek soldiers), and then himself. The Greeks captured Helenus, son of King Priam of Troy, a prophet, and tortured him until he told them under what circumstances they could take Troy. Helenus said they would win if they retrieved Heracles' arrows (which were in Philoctetes's possession); steal the Trojan Palladium (they accomplished this with the Trojan Horse; or Odysseus and Diomedes did so one night) and persuade Achilles' son (Neoptolemus) to join the war. Neoptolemus was hiding from the war at Scyros but the Greeks retrieved him. Alternatively, he told them that they could win if Troilius, Helenus' half-brother, son of Apollo and Hecuba, was killed before he turned twenty. Achilles ambushed Troilius. Odysseus and Neoptolemus retrieved Philoctetes from Lemnos. Philoctetes' wound was healed by Machaon or Asclepius. Philoctetes then killed Paris with a poisoned arrow he got from Heracles.DiomedesDiomedes almost killed Aeneas in battle but Aphrodite, Aeneas's mother, saved him. Diomedes wounded Aphrodite and she dropped her son, fleeing to Mount Olympus. Aeneas was then enveloped in a cloud by Apollo, who took him to Pergamos, a sacred spot in Troy. Artemis healed Aeneas there. Later in the war, Diomedes fought with Hector and saw Ares, the war-god, fighting on the Trojans' side. Diomedes called for his soldiers to fall back slowly. Hera, Ares's mother, saw Ares' interference and asked Zeus, Ares's father, for permission to drive Ares away from the battlefield. Hera encouraged Diomedes to attack Ares and he threw his spear at the god. Athena drove the spear into Ares's body and he bellowed in pain and fled to Mount Olympus, forcing the Trojans to fall back. The end of the war came with one final plan. The Greeks (or, in some records, Odysseus on their behalf) devised a new ruse - a giant hollow wooden horse, an animal that was sacred to the Trojans. It was built by Epeius and filled with Greek warriors led by Odysseus. The rest of the Greek army appeared to leave and the Trojans accepted the horse as a peace offering. A Greek spy, Sinon, convinced the Trojans that the horse was a gift despite the warnings of Laocoon and Cassandra. The Trojans, who were understandably overjoyed that the ten-year siege had lifted, entered a night of mad revelry and celebration, and when the Greeks emerged from the horse the city was in a drunken stupor. The Greeks opened the city gates to allow their fellow soldiers in, and the city was utterly destroyed--every single man and boy killed (including infants), every woman and girl enslaved, all its wealth pillaged, and the city itself reduced to rubble. There is much question as to whether a wooden horse was even created. Homer's stories are believed by many to be the merging of many wars fought on Troy. In his merging, he creates many characters out of the gods and uses many metaphors. It is suggested that the Trojan Horse actually represents an earthquake that occurred between the wars that could have weakened Troy's walls and left them open for attack. Structural damage on the city believed to be Troy - its location being the same as that represented in Homer's Iliad and the artifacts found there suggesting it was a place of great trade and power - shows signs that there was indeed an earthquake. Other scholars, including several ancient sources, suggest that the "Trojan horse" was in fact a battering ram. The ghost of Achilles appeared to the survivors of the war, demanding Polyxena, the Trojan princess, be sacrificed before anybody could leave. Neoptolemus did so. According to the Odyssey, Menelaus's fleet was blown by storms to Crete and Egypt where they were unable to sail away because the wind was calm. Menelaus had to catch Proteus, a shape-shifting sea god to find out what sacrifices to which gods he would have to make to guarantee safe passage. Proteus also told Menelaus that he was destined for Elysium (Heaven) after his death. Menelaus returned to Sparta with Helen. According to some stories the Helen who was taken by Paris was a fake, and the real Helen was in Egypt where she was reunited with Menelaus at this point. They had a daughter, Hermione. After the war, Idomeneus' ship hit a horrible storm. Idomeneus promised Poseidon that he would sacrifice the first living thing he saw when he returned home if Poseidon would save his ship and crew. The first living thing was his son, whom Idomeneus duly sacrificed. The gods were angry at his murder of his own son and they sent him in exile to Calabria in Italy. (Aeneid III, 400). In an alternate version, his own subjects on Crete sent him into exile because he brought a plague with him from Troy. He fled to Calabria, and then Colophon, in Asia Minor, where he died. In yet a third version, used by Virgil, the plague was visited upon Crete as punishment for Idomeneus' act. Cassandra was raped by Ajax the lesser, then taken as a concubine by Agamemnon. Agamemnon returned home to Argos. His wife Clytemnestra (Helen's sister) was having an affair with Aegisthus, son of Thyestes, Agamemnon's cousin who had conquered Argos before Agamemnon himself retook it. Possibly out of vengeance for the death of Iphigenia, Clytemnestra plotted with her lover to kill Agamemnon. Cassandra foresaw this murder, and warned Agamemnon, but he disregarded her. He was killed, either at a feast or in his bath according to different versions. Cassandra was also killed. Agamemnon's son Orestes, who had been away, returned and conspired with his sister Elektra to avenge their father. They killed Clytemnestra and Aegisthus. Orestes married Hermione and retook Argos, becoming king over all the Peloponessus. Neoptolemus took Andromache and Helenus as slaves and married Andromache. He feuded with Orestes, because Menalaus had promised his daughter Hermione to him, but now wanted her to marry Neoptolemus. They fought, and Neoptolemus was killed. Helenus then married Andromache and they ruled over a colony of Trojan exiles in what had once been Achilles' kingdom. There Aeneas encountered them on his journey to Italy. Queen Hecuba of Troy was enslaved by the Achaeans. Lycaon was enslaved by Achilles. He was later killed trying to escape. Since Antenor, Priam's brother-in-law, had supported giving Helen back to the Greeks, he was spared. Aeneas led a group of survivors away from the city, including his son Ascanius, his trumpeter Misenus, father Anchises, the healer Iapyx, all the Lares and Penates and Mimas as a guide. His wife Creusa was killed during the sack of the city. They fled Troy with a number of ships, seeking to establish a new homeland elsewhere. They landed in several nearby countries that proved inhospitable and finally were told by a Sibyl that they had to return to the land of their forebears. They first tried Crete, where Dardanus had once settled, but found it ravaged by the same plague that had driven Idomeneus away. They found the colony led by Helenus and Andromache, but declined to remain. After seven years they arrived in Carthage, where Aeneas had an affair with Dido. Eventually the gods ordered him to continue onward (Dido committed suicide), and he and his people arrived at the mouth of the Tiber in Italy. There a Sibyl took him to the underworld and foretold the majesty of Rome, which would be founded by his people. He negotiated a settlement with the local king, Lavinius, and was wed to his daughter, Lavinia. This triggered a war with other local tribes, which culminatied in the founding of the settlement of Alba Longa, ruled by Aeneas and Lavinia's son Silvius. Three hundred years later, according to Roman myth, his descendants Romulus and Remus founded Rome. The details of the journey of Aeneas, his affair with Dido, and his settling in Italy are the subject of the Roman epic poem the Aeneid by Virgil. Odysseus, attempting to travel home, underwent a series of trials, tribulations and setbacks that stretched his journey to ten years' time. These are detailed in Homer's epic poem The Odyssey. ANCIENT GREECE INDEX ANCIENT CIVILIZATIONS INDEX CRYSTALINKS HOME PAGE PSYCHIC READING WITH ELLIE BOOK: THE ALCHEMY OF TIME DONATION TO CRYSTALINKS ADVERTISE ON CRYSTALINKS
FINEWEB-EDU
-- Egypt Central Bank Maintains Key Interest Rate at 8.25% as Inflation Slows The Egyptian central bank kept its benchmark interest rate unchanged at a four-year low as non-food inflation slows and economic growth accelerates. The Monetary Policy Committee left the overnight deposit rate at 8.25 percent and the overnight lending rate at 9.75 percent, the Cairo-based central bank said in a statement on its website today. All eight economists surveyed by Bloomberg News had expected the decision. Rates haven’t changed in more than a year as inflation slowed to 11 percent in September from 13.6 percent in January. Core inflation, which excludes food costs, eased to 7.6 percent from 8.2 percent a month earlier. At the same time the economy’s recovery from the global crisis is accelerating, with output expanding an annual 5.6 percent in the third quarter. “There are no major non-food inflationary pressures driven by demand-pull or cost-push factors,” Reham El Desoki , senior economist at Egyptian investment bank Beltone Financial in Cairo, said by e-mail before the announcement. “The worst is over for the monthly change in inflation at least until the end of the year.” The central bank last changed interest rates in September 2009, lowering them by a quarter percentage point to support the economy in the face of the global financial crisis. Growth accelerated from 5.4 percent in the second quarter, and the government expects an expansion of more than 6 percent in the fiscal year through June, compared with 5.1 percent in the previous 12 months. Egypt’s benchmark EGX30 stock index has gained about 9 percent this year, driven by companies including investment bank EFG-Hermes Holding SAE and builder Orascom Construction Industries . The central bank released its interest rate decision after the end of today’s trading session, in which the index added 0.8 percent to 6,764.61. To contact the reporter on this story: Alaa Shahine in Beirut via Cairo newsroom at asalha@bloomberg.net . To contact the editor responsible for this story: Peter Hirschberg at phirschberg@bloomberg.net .
NEWS-MULTISOURCE
Formentera II Formentera II is the ninth studio album by Canadian-American indie rock band Metric. It was released on October 13, 2023, through the band's own label Metro Music International with distribution handled by Thirty Tigers Records. It is the sequel to the band's previous album Formentera (2022). Background Metric initially began work on Formentera II during the onset of the COVID-19 pandemic before completing the album in early 2023. Recording sessions were held at the band's Main Street Studios in Toronto and Motorbass Studios in Paris. Singles The album's lead single, "Just the Once", was released simultaneously with the album's announcement on July 7, 2023. Critical reception Formentera II was met with "generally favorable" reviews from critics. At Metacritic, which assigns a weighted average rating out of 100 to reviews from mainstream publications, this release received an average score of 79, based on 4 reviews. Personnel * Jimmy Shaw – production, engineering * Gus van Go – production, engineering * Liam O'Neil – production, engineering * Colin Leonard – mastering * Stuart White – mixing * Matheus Braz – mixing assistance * Justin Broadbent – artwork, design
WIKI
Parasagitta Parasagitta is a genus of arrow worms (phylum Chaetognatha) in the family Sagittidae. At one time these arrow worms were classified in the genus Sagitta. Species The World Register of Marine Species includes the following species in the genus: * Parasagitta chilensis (Villenas & Palma, 2006) * Parasagitta elegans (Verrill, 1873) * Parasagitta euneritica (Alvariño, 1961) * Parasagitta friderici (Ritter-Záhony, 1911) * Parasagitta megalophthalma (Dallot & Ducret, 1969) * Parasagitta peruviana (Sund, 1961) * Parasagitta popovicii (Sund, 1961) * Parasagitta setosa (Müller, 1847) * Parasagitta tenuis (Conant, 1896)
WIKI
Teenage tragedy song A teenage tragedy song is a style of ballad in popular music that peaked in popularity in the late 1950s and early 1960s. Examples of the style are also known as "tear jerkers", "death discs" or "splatter platters", among other colorful sobriquets coined by DJs that then passed into vernacular as the songs became popular. Often lamenting teenage death scenarios in melodramatic fashion, these songs were often sung from the viewpoint of the dead person's sweetheart, as in "Last Kiss" (1961), or another witness to the tragedy, or the dead (or dying) person. Notable examples include "Teen Angel" by Mark Dinning (1959), "Tell Laura I Love Her" by Ray Peterson (1960), "Ebony Eyes" by the Everly Brothers (1961), "Dead Man's Curve" by Jan and Dean (1964), and "Leader of the Pack" by the Shangri-Las (1964). The genre's popularity faded around 1965 (as a mostly American phenomenon, it was one of many musical styles drowned out by the British Invasion), but the hits from its heyday inspired a host of similar songs and parodies over the years. Origins and format By the mid-1950s, postwar youth culture in the U.S. was embracing rock and roll, and the folk revival was also approaching its zenith – the narrative style of many teenage tragedy songs had similarities to folk balladry. Prison ballads (such as the Kingston Trio's "Tom Dooley", based on a folk song about a real murder) and gunfighter ballads (such as Johnny Cash's "Don't Take Your Guns to Town" and Marty Robbins' "El Paso", with similar themes of death, were also popular during the form's heyday. ("El Paso" was followed at #1 by two consecutive teenage tragedy songs, "Running Bear" and "Teen Angel".)The teen tragedy genre's popular era began with "Black Denim Trousers and Motorcycle Boots", written by Jerry Leiber and Mike Stoller. Released just before 24-year-old actor James Dean's death in an automobile accident in the fall of 1955, it climbed the charts immediately afterward. Teenage tragedies had specific thematic tropes such as star-crossed lovers, reckless youth, eternal devotion, suicide, and despair over lost love; along with lyrical elements that teens of the time could relate to their own lives – such as dating, motorcycles and automobiles (car songs also being popular during the 1950s), and disapproving parents or peers. Contemporary girl groups of the '60s also borrowed the genre's melodramatic template (as well as the use of sound effects, orchestration, echo and other sonic touches) for non-fatal but otherwise tragic story-songs, such as Reparata and the Delrons' over-the-top "Saturday Night Didn't Happen" and its B-side, "Panic", in 1968. In the Pussycats' 1966 "Dressed in Black", (co-written by George 'Shadow' Morton, and originally a Shangri-Las B-side) and in "We Don't Belong" by UK singer Sylvan (1965), the heartbreak and melancholy are palpable – and in Sylvan's case, nearly suicidal. Ethnomusicologist Kirsten Zemke considers these songs as forming a strictly musical genre that was bound by common thematic tropes, musical style and production elements; and as being particularly of their time. As for their popularity, she writes: They sold well in their time, and the style has persisted throughout the decades in various forms. And … they have an interesting history. The question some writers have asked is "why?". Some of the reasons suggested for this genre’s macabre popularity are: * These were the ultimate teen rebellion songs. The only way out of parents' (and/or societal) control and expectations was death. * They were a natural extension of the "unrequited love" song, facilitated by the obvious rhyming of: good bye, cry and die. There were a number of publicized deaths of pop stars and young actors during that period, including Sam Cooke, Johnny Ace, Eddie Cochran; and of course the plane crash that killed Buddy Holly, Ritchie Valens, and the Big Bopper in 1959. This might explain the interest in songs around death, tragedy and sorrow. Ritchie Valens popularized the genre along with the late Johnny Cash and Dion & The Belmonts. Dion wrote his single "A Teenager in Love" while on a plane ride to Little Rock, AR. Deathless themes Teenagers meeting with tragedy in song was not new in the 1950s (or for that matter in the 1650s, around the time "Barbara Allen" was popular). In literature, it has been a recurring and resonant theme over centuries, most notably in William Shakespeare's Romeo and Juliet. Another early example in song is "Oh My Darling, Clementine", published in 1884 but based on earlier songs and apparently written as a parody. As popular music and the society it mirrored changed from the late 1960s onward, the themes carried on in different forms and styles. Songs and spoken-word productions about the dangers of drug abuse joined the parade of pathos on radio airwaves, ranging from three-minute morality plays to lamentations (from the parental perspective) on the generation gap. These include "Once You Understand" by Think (U.S. #23, 1971) and radio and TV host Art Linkletter's Grammy-winning single "We Love You, Call Collect" (U.S. #42, 1969). Recorded before his daughter Diane's apparent suicide in 1969, the record also included Diane speaking the reply, "Dear Mom and Dad". Into the 1970s, as the Vietnam War continued, hit ballads of youth and death included Terry Jacks' No. 1 hit "Seasons in the Sun" (1974), their protagonists of indeterminate age, or slightly older than teens. A song that was thought to have referenced the Civil War was Paper Lace's 1974 hit "Billy Don't Be a Hero", made a bigger hit in the U.S. by Bo Donaldson and the Heywoods. Hard-rock acts recorded vehicular death scenarios such as "D.O.A." (Bloodrock, 1971), "Detroit Rock City" (Kiss, 1976) and "Bat Out of Hell" (Meat Loaf, 1977). Teenage tragedy would continue to chart through the 1970s. In 1979, "I Don't Like Mondays" was written by Bob Geldof and Johnnie Fingers, inspired by the Grover Cleveland school shooting in San Diego that occurred while the Boomtown Rats were on tour in the U.S. The song went to No. 1 in the U.K., and No. 4 in Canada. The Smiths' 1987 song "Girlfriend in a Coma" also took inspiration from teenage tragedy songs, by taking the melodramatic aspect and pushing it to extremes. Some songs merely updated the sound of the previous era, such as "Racing Car" by Dutch group Air Bubble (1976), while others used the melodic and stylistic tropes of teen tragedy in tougher, grittier settings, as in the Ramones' "You're Gonna Kill That Girl" (1977) and "7-11" (1981), and the Misfits' "Saturday Night" (1999). "Teen Idle" by Marina and the Diamonds (2012), evoking an archetype of disenfranchised youth, is a thematic heir to the original teen tragedy oeuvre. Satires and parodies Notable parody songs, satires and send-ups of teen tragedy over the decades have included: * "Let's Think About Living" (1960), with Bob Luman mocking then-current musical trends, and trying to steer listeners away from the fascination with teenage death songs and gunfighter ballads. * "Valerie", a 1961 doo-wop styled teen tragedy spoof by the Mark III, a young folk trio. * "All I Have Left is Johnny's Hubcap" on the 1962 parody album, Mad “Twists” Rock ’n’ Roll, produced in association with Mad magazine. * "Surfin' Tragedy" (1963) by the Breakers, in which a surfer careens "90 miles an hour" into a Malibu pier, killing him instantly. It is included on The Rhino Brothers Present the World's Worst Records. * "Leader of the Laundromat" by the Detergents (1964), a direct parody of the Shangri-Las' hit, written by Paul Vance and Lee Pockriss. The Detergents were a studio group that included singer Ron Dante, later of the Archies. * Jimmy Cross's "I Want My Baby Back" (1965), a novelty record about a fatal head-on collision with "The Leader of the Pack", narrated in a down-home patter reminiscent of Andy Griffith. The single made the Billboard Hot 100 (reaching #92), and became a cult classic years later from airplay on Dr. Demento's syndicated radio show; it is on the World's Worst Records compilation and on Rhino's 1984 compilation LP Teenage Tragedies. * In a 1965 episode of The Lucy Show, "Lucy in the Music World", Lucille Ball tried to appeal to teenagers with a song about a boyfriend whose "surfboard came back by itself." She had been advised that youth today "aren't happy unless they're miserable." * "Death Cab for Cutie" by the Bonzo Dog Doo-Dah Band (1967), the inspiration for the band of the same name. * Randy Newman's song "Lucinda", on his 1970 album 12 Songs, concerns a girl who falls asleep on the beach in her graduation gown, and is killed and buried by a beach cleaning machine. * In John Entwistle's "Roller Skate Kate", from his 1973 album Rigor Mortis Sets In, the heroine is killed while skating in the high-speed lane of the motorway. * 10cc's 1973 song "Johnny Don't Do It", done in the style of early 1960s girl-group songs, with the trope of the bad boy who is good but misunderstood. Johnny steals a motorcycle and hits a truck, killing his girlfriend along with himself. * "Pizza Man," a parody of "Leader of the Pack", sung by Alice Playten as part of the National Lampoon Lemmings stage show and subsequent album, in 1973. * Gilda Radner, Jane Curtin, and Laraine Newman recorded a song for season 2 of Saturday Night Live entitled "Chevy, Chevy" which is a send-up of teen tragedy, presenting Chevy Chase as a teen idol. * On The Rich Little Show of March 8, 1976, Tom Bosley and "Sweathogs" Lawrence Hilton-Jacobs, Robert Hegyes, and Ron Palillo sang a parody of the genre called "Pizza Death", in which the simple-minded driver of a pizzeria delivery van crashed, affording the by-standers an opportunity for free pizza. * "My Baby's the Star of a Driver's Ed Movie," a 1983 song by Blotto. * "The Homecoming Queen's Got a Gun" by comedian and singer Julie Brown. Released nationally in 1984, the song (along with an accompanying video in heavy MTV rotation) was both a parody of the genre, and a satire of valley girl culture. * Tom Chapin and Michael Mark wrote a parody of a teenage tragedy song called "The Battle Beast and Barbie" for Chapin's 1994 album "So Nice To Come Home." Written in the parodic style of a '60s girl group tragedy ballad, it involves two plastic toys who "met by accident and fell in love", only for Battle Beast to be shot down by "Ken" at the school prom. * The MST3K treatment of the 1996 film Werewolf included a sketch in which Mike and the bots dressed up as a girl group to sing "Where, O Werewolf", about "Suzy" (Mike) in a doomed relationship with her werewolf boyfriend. * "Road Man" by Smash Mouth, in which a roadie is hit by a train while rushing to get the band's gear to a show. * Rilo Kiley, with lead singer Jenny Lewis, recorded "Teenage Love Song", a genre parody in which the singer laments being abandoned by her boyfriend after having sex in a motel room. * In "The Living End" by the Jesus and Mary Chain, a leather-clad biker in love with himself ends up crashing into a tree.
WIKI
Skip to Content How many eggs a week should you eat? Eggs are a nutritious food and a great source of protein. However, there has been a lot of debate over how many eggs it is healthy to eat in a week. This article reviews the research and provides recommendations on egg consumption. Are eggs healthy? Yes, eggs are a very healthy food. Here are some of the nutrients found in eggs: • High quality protein – One large egg contains 6 grams of protein, including all 9 essential amino acids. Protein helps build muscles and bones, and eggs are considered one of the best sources of protein. • Choline – Eggs are one of the richest dietary sources of choline, which is an essential nutrient for brain and liver health. Just one egg yolk contains over 200 mg of choline. • Lutein and Zeaxanthin – These antioxidants are found in high amounts in egg yolks and help prevent eye diseases like cataracts and macular degeneration. • Vitamin D – Most people are deficient in vitamin D and whole eggs are one of the few natural food sources, containing around 20% of the RDI per egg. • B Vitamins – Eggs provide B2, B12, B5 and other B vitamins. B vitamins help convert food into energy and are important for heart and brain health. The nutrients in eggs have been shown to promote heart health and reduce the risk factors for heart disease like inflammation, high blood pressure, and high cholesterol (1, 2). Overall eggs are one of the most nutritious and healthiest foods you can eat. Are eggs high in cholesterol? Yes, eggs are high in cholesterol. One large egg contains around 185 mg of cholesterol, which is over half of the recommended 300 mg per day. For this reason, health organizations have long recommended limiting egg consumption to less than 3 whole eggs per week. However, an increasing amount of research shows that dietary cholesterol has little effect on blood cholesterol levels. Your liver actually produces large amounts of cholesterol every day. When you eat more cholesterol, your liver simply compensates by producing less cholesterol instead. Therefore eating cholesterol rich foods like eggs has very little impact on total and LDL cholesterol levels (3). What matters most is not how much cholesterol you eat, but the type of fats you eat. Saturated and trans fats have the biggest impacts on cholesterol levels. Summary: Eggs are high in cholesterol, but eating them has minimal impacts on blood cholesterol levels. The type of fat you eat is what really matters. Do eggs increase heart disease risk? For many years, eggs were believed to increase the risk of heart disease. However, recent evidence does not support this (4): • A 1999 study followed 117,000 adults for up to 8 years and found no association between egg consumption and heart disease or stroke risk (5). • A 2008 study found that eating up to 6 eggs per week does not increase the risk of heart disease in healthy individuals (6). • A 2013 study involving 40,000 adults found eating 1-3 eggs per day was associated with a lower risk of heart disease (7). • A large review study from 2020 did not find any association between egg intake and heart disease or stroke, even in those with diabetes (8). The health benefits of eggs seem to outweigh any potential negative effects. Multiple studies indicate that eating up to 3 whole eggs per day is completely safe for healthy people. However, things may be different for those with diabetes. Some studies show increased heart disease risk from eating eggs in people with type 2 diabetes and prediabetes (9). Are Egg Whites Healthier Than Whole Eggs? Some people advocate eating egg whites instead of whole eggs in order to avoid dietary cholesterol. However, this misses out on many of the beneficial nutrients found in the yolks. Whole eggs actually increase HDL (the “good”) cholesterol while keeping LDL cholesterol unchanged. HDL helps remove cholesterol from the body, while LDL transports cholesterol to tissues. Egg yolks also contain antioxidants and nutrients that may help prevent heart attacks and strokes by reducing inflammation and improving blood vessel function (10). In one study, people with normal cholesterol who ate 3 eggs per day for 12 weeks increased their HDL cholesterol significantly more than those who ate egg substitutes (11). What’s more, egg yolks are loaded with choline, which helps protect against heart disease and other chronic diseases. Whole eggs really are greater than the sum of their parts. There are plenty of nutrients in the yolks that the whites simply don’t have. How Many Eggs Can You Safely Eat Per Week? Based on the research, it seems eating 1-3 eggs per day (7 to 21 per week) does not increase the risk of heart disease in healthy populations. However, some people should still limit their egg intake: • Those with prediabetes or type 2 diabetes: Egg intake may increase heart disease risk in diabetics. Limit eggs to 3-4 per week if you have diabetes (12). • Those at risk of heart disease: Discuss egg intake with your doctor if you have major risk factors. • People with the ApoE4 gene: The ApoE4 gene increases the risk of high cholesterol and heart disease. Limiting eggs may be wise for these individuals (13). As long as you don’t have any preexisting conditions and aren’t at risk of heart disease, consuming 1-3 eggs per day appears completely safe. This amounts to 7-21 eggs per week, though the upper limit is not firmly established. Take Home Message Based on research, eating up to 3 whole eggs per day does not increase the risk of heart disease in healthy populations. However, egg intake may increase heart disease risk in those with prediabetes or type 2 diabetes. As long as you are generally healthy, there is no need to limit your egg intake due to cholesterol concerns. Eggs are one of the most nutritious foods available and can safely be eaten every day.
ESSENTIALAI-STEM
National Book Critics Circle Announces Award Nominees Ta-Nehisi Coates, already a National Book Award winner for “Between the World and Me,” now has a chance to add a National Book Critics Circle Award for criticism to his mantel. Mr. Coates’s book, a meditation on racism in America written in the form of a letter to his son, joins works by the novelist Lauren Groff, the memoirist and critic Vivian Gornick and the poet Ada Limón among those nominated for the awards. The awards, determined by a jury of critics and book review editors, honor excellence in six categories – autobiography, biography, criticism, fiction, nonfiction and poetry. The winners will be named on March 17. On Monday, however, the group announced the recipients of its two annual citations: Wendell Berry, an environmentalist, farmer and novelist, won the Ivan Sandrof Lifetime Achievement Award, while Carlos Lozada, the nonfiction critic for The Washington Post, captured the Nona Balakian Citation for Excellence in Reviewing. Besides Ms. Groff’s nomination for “Fates and Furies,” the fiction finalists include: Paul Beatty’s “The Sellout,” Valeria Luiselli’s “The Story of My Teeth,” Anthony Marra’s “The Tsar of Love and Techno” and Ottessa Moshfegh’s “Eileen.” Nominees in other categories follow: Mary Beard, “SPQR: A History of Ancient Rome” (Liveright) Ari Berman, “Give Us the Ballot: The Modern Struggle for Voting Rights in America” (Farrar, Straus and Giroux) Jill Leovy, “Ghettoside: A True Story of Murder in America” (Spiegel & Grau) Sam Quinones, “Dreamland: The True Tale of America’s Opiate Epidemic” (Bloomsbury) Brian Seibert, “What the Eye Hears: A History of Tap Dancing” (Farrar, Straus and Giroux) Elizabeth Alexander, “The Light of the World” (Grand Central Publishing) Vivian Gornick, “The Odd Woman and the City” (Farrar, Straus and Giroux) George Hodgman, “Bettyville” (Viking) Margo Jefferson, “Negroland” (Pantheon) Helen Macdonald, “H Is for Hawk” (Grove Press) Terry Alford, “Fortune’s Fool: The Life of John Wilkes Booth” (Oxford University Press) Charlotte Gordon, “Romantic Outlaws: The Extraordinary Lives of Mary Wollstonecraft and Her Daughter Mary Shelley” (Random House) T.J. Stiles, “Custer’s Trials: A Life on the Frontier of a New America” (Alfred A. Knopf) Rosemary Sullivan, “Stalin’s Daughter: The Extraordinary and Tumultuous Life of Svetlana Alliluyeva” (Harper) Karin Wieland and Shelly Frisch, “Dietrich and Riefenstahl: Hollywood, Berlin, and a Century in Two Lives” (Liveright) Ta-Nehisi Coates, “Between the World and Me” (Spiegel & Grau) Leo Damrosch, “Eternity’s Sunrise: The Imaginative World of William Blake” (Yale University Press) Maggie Nelson, “The Argonauts” (Graywolf) Colm Tóibín, “On Elizabeth Bishop” (Princeton University Press) James Wood, “The Nearest Thing to Life” (Brandeis University Press) Ross Gay, “Catalogue of Unabashed Gratitude” (University of Pittsburgh Press) Terrance Hayes, “How to Be Drawn” (Penguin) Ada Limón, “Bright Dead Things” (Milkweed Editions) Sinéad Morrissey, “Parallax: And Selected Poems” (Farrar, Straus and Giroux) Frank Stanford, “What About This: Collected Poems of Frank Stanford” (Copper Canyon Press)
NEWS-MULTISOURCE
Baliochila neavei Baliochila neavei, the Neave's buff, is a butterfly in the family Lycaenidae which is found in Burundi, eastern Tanzania, the Democratic Republic of the Congo (Haut-Shaba), Malawi and Mozambique. Its habitat consists of forests. Adults are on wing from August to April. The larvae feed on algae (cyanobacteria) which grows on trees.
WIKI
This historic voyager could have crossed the Atlantic before the Vikings and Columbus. While most historians agree that the Vikings first sailed to North America around the year 1000, some believe that they were not the first European explorers to cross the Atlantic. There is a story from Ireland about a monk who was an expert sailor and traveled all over Ireland as well as Scotland, Wales, Brittany and France. His name was Brendan and he was born around 484 in southern Ireland. He had a great desire to bring more souls to God and took quite literally the commission of Jesus to “Go into all the world and preach the gospel to the whole creation” (Mark 16:15). Later on he also heard of rumors of a distant land in the West which some believed was the original Garden of Eden. This gave Brendan all the motivation he needed and he was determined to discover where this Paradise on earth was located and preach the Gospel to any unbelievers he met along the way. Taking a small crew, Brendan set out around the year 545 on a small round-bottom boat called a currach that was sealed with leather and had a square sail. An 8th-century account of the journey was recorded in The Voyage of St. Brendan and it describes various stops along the way that appear to correspond to places such as the Faroe Islands, Iceland, and Greenland, and even describes icebergs. The possibility of such a feat was researched in 1976 by historian Tim Severin, who crafted an identical boat from the description given and took along with him a few companions. He made stops similar to those he believed St. Brendan could have made and eventually reached Peckford Island, Newfoundland. Severin’s research proved that a cross-Atlantic voyage was possible during the 6th century using primitive technology. However, no Irish artifacts have ever been found that date to that time period, and most historians believe that’s Brendan’s voyage is a legend or simply an allegory to describe the journey of a person’s life. Whatever truth there is behind it, what is certain is that monks in the centuries after St. Patrick who evangelized Ireland were very zealous in their pursuit of religion and were willing to do anything to follow Christ, even if it meant traveling to the edge of the world. The first Thanksgiving in America was a Catholic Mass Archaeologists find the cell of St. Columba, one of the “Twelve Apostles of Ireland”
FINEWEB-EDU
FSLY Stock Alert: 3 Reasons Fastly Is Making Headlines Today InvestorPlace - Stock Market News, Stock Advice & Trading Tips Fastly (NYSE:FSLY) is seeing shares of its stock take off on Thursday following several bits of news concerning the cloud company. FSLY) website." width="300" height="169"> Source: Pavel Kapysh / Shutterstock.com The positive news for FSLY stock starts with an upgrade from Oppenheimer analyst Timothy Horan. This has him bumping the stock up from its old perform rating to a new outperform one. The analyst also includes a price target of $125 per share for FSLY stock. That suggests a 28% premium to its closing price of $97.63 per share on Wednesday. Horan’s bullish stance for FSLY stock comes after speaking with channel checks. According to this information, which is the second reason for the surging price of the stock today, the company is expecting record traffic in Q4. This comes on the heels of the compute@edge launch, which was reportedly positive, reports TheFly. Finally, some of the positive movement for FSLY stock comes directly from Fastly itself. The company announced today that it’s joining the Pledge 1% movement. This is a corporate philanthropy movement with a focus on making communities a strong focus for businesses. 7 Stocks To Buy As The Biden Presidency Begins All of the positive news today caught the interest of investors and shares of FSLY stock are seeing strong trading as a result. Roughly 7.4 million shares of the stock have moved in the morning hours. For comparison, the stock’s daily average trading volume is 7.5 million shares. FSLY stock was up 8.2% as of Thursday morning. On the date of publication, William White did not have (either directly or indirectly) any positions in the securities mentioned in this article. The post FSLY Stock Alert: 3 Reasons Fastly Is Making Headlines Today appeared first on InvestorPlace. The views and opinions expressed herein are the views and opinions of the author and do not necessarily reflect those of Nasdaq, Inc.
NEWS-MULTISOURCE
Specialized structures on the border between rhizocephalan parasites and their host’s nervous system reveal potential sites for host-parasite interactions A. Miroliubov, I. Borisenko, M. Nesterenko, A. Lianguzova, S. Ilyutkin, N. Lapshin, A. Dobrovolskij Research output Abstract Rhizocephalan barnacles are a unique group of endoparasitic crustaceans. In their extreme adaptation to endoparasitism, rhizocephalan adults have lost almost all features of their free-living relatives but acquired an outstanding degree of control over the body of their hosts (mostly decapods). The subtle influence exercised by rhizocephalans on the physiology, morphology and behaviour of their hosts is a vivid example of the most intimate host-parasite interactions but their mechanisms are very poorly known. In this study we examined the morphology and the adaptive ultrastructure of the organs invading the nervous system of the host in two rhizocephalan species from the families Peltogastridae, (Peltogaster paguri) and Peltogasterellidae (Peltogasterella gracilis). We found two essentially different types of structures involved in interactions of these two rhizocephalans with the nervous system of their hosts: modified rhizocephalan rootlets lying inside the ganglia and the neural fibres of the host enlacing the trophic rootlets of the parasites. We suggest that both these structures may be highly specialized tools allowing the parasite to interact with the host on the humoral level via neuromediators, hormones, attractants and trophic factors. Original languageEnglish Article number1128 JournalScientific Reports Volume10 DOIs Publication statusPublished - 24 Jan 2020 Fingerprint Cite this
ESSENTIALAI-STEM
Talk:siris Irish philosopher George Berkeley claimed in his book "Siris" (1744) that siris meant "chain" in Ancient Greek, but was also used as a name for the river Nile. I haven't been able confirm or disprove that claim yet, and in Greek letters it would be a different word for Wiktionary, of course, but as it has by now a long history in English language, too, that claim might be worthy of a small note somewhere in the article - especially in the case should it be found true. --Oop (talk) 22:52, 16 November 2016 (UTC) * It's evidently a branch of the Nile, not the full river; the Greek is and the Latin thence is . —Μετάknowledge discuss/deeds 01:19, 17 November 2016 (UTC)
WIKI
What is Cialis dosage compared to 50mg Viagra is mean safe and non addictive? One of the most common myths about drugs to increase potency is that they are addictive. The proof is that porn actors are not able to perform sexual intercourse without pills. However, this is not the fault of the drugs themselves, but the need to have sex for many hours. Cialis compared 50mg ViagraPhysiologists talk about the period of refractoriness after the completion of sexual intercourse – the inability of the body to respond with a persistent and prolonged erection to an erotic stimulant. It is associated with both a drop in the level of sex hormones after ejaculation, and with some nuances of the central nervous system. Porn actors do not leave the period of refractoriness during the whole “working day”. Moreover, to cause sufficient erection for the shooting, they really have to take drugs that increase the flow of blood to the penis. However, over time, even pills stop helping with this. At the same time, patients using drugs to increase potency for medical reasons – for example, during the treatment of prostatitis, after recovering from the underlying disease, can do well without medication. Talk about a certain addiction is reasonable in the case of erectile dysfunction associated with psychological causes. In this case, taking drugs to improve potency gives the patient self-confidence. However, do not forget that with erectile dysfunction caused by psychological reasons, it is necessary to take a course of psychoanalysis, which will help to cope with the root of the problem. Medicaments for potency increasing – connection with vision disorders Another “horror story” – drugs to improve the potency cause blindness. Indeed, these drugs are characterized by such side effects as a violation of color perception and narrowing of the visual field, conjunctiva and tears. However, after the drug is canceled, they left. Irreversible lesions of the optic nerve during taking these agents are very, very rare. The preparations for the potency and their effect on cardio system In each case of human death after taking drugs to increaseCialis compared 50mg Viagra the potency, an investigation was carried out and it was never proven that the cause of death was precisely the drug intake. Although, people whom cardiologists recommended to limit their sex life because of heart disease should not play with fire. Moreover, in case of problems with the heart, it is better to avoid the “missionary” position, which requires strong tension and choose more restful poses. In addition, drugs to improve potency can not be taken along with certain drugs to treat ischemia – for example, nitroglycerin. Their joint reception can cause a sharp drop of pressure. In any case, people suffering from diseases of the cardiovascular system can take such drugs as Cialis 5mg only by the prescription of the doctor, correcting if it is necessary the aftermaths of the underlying disease. When the medicaments for potency increasing is not required to take? Cialis compared 50mg Viagra Taking drugs for potency, the main thing is not to forget that these are exactly medicines that have both indications and contraindications of their use. In some cases, they are simply useless. Therefore, drugs to increase the potency do not affect the libido. In addition, if problems in a person’s sexual life are associated with a lack of desire, or other psychological problems, such medications will not help. However, in most cases, intake of Cialis 5mg for potency helps to solve problems of sexual life and at the same time it is safe enough. For those who can’t afford to buy Viagra due to the high price of this mean is still able to replace this mean with Cialis. So what is Cialis dosage compared to 50mg Viagra? It was proven that 10 mg of Cialis is equal to 50mg of Viagra.
ESSENTIALAI-STEM
Talk:C/C++ The C/C++ Programming language C/C++ is a programming language invented by Richard Heathfield, one of the authors of C Unleashed. A common mistake among novice programmers or uneducated persons is to refer to C or C++ as an amalgamated concept "C/C++", this is incorrect, since C only compiles as C with a C compiler, likewise for C++. Both languages are distinct even though some similarities may exist. Richard has created a language known as C/C++ by specification and several example programs exist. http://www.cpax.org.uk/prg/portable/c/c++/rfe00000.html http://www.cpax.org.uk/prg/portable/c/c++/rfe00001.html http://www.cpax.org.uk/prg/portable/c/c++/rfe00002.html http://www.cpax.org.uk/prg/portable/c/c++/rfe00003.html <IP_ADDRESS> (talk) 09:49, 15 September 2009 (UTC) * If C and C++ are distinct then why could you use C headers or source code written in C in a C++ program. If you are careful by knowing the differences between C and C++ programs, you could copy and paste the source code in either a C source file or C++ source file and have it compile. Anything that is written in C could be used in C++ with some very minor modifications due to compatibility reasons for some minor exceptions. —Preceding unsigned comment added by <IP_ADDRESS> (talk) 05:31, 16 October 2009 (UTC) You can use C headers or source code in a C++ program, but when you compile them with a C++ compiler, it is compiled as C++. <IP_ADDRESS> (talk) 06:56, 2 March 2010 (UTC)
WIKI
Atlanta Falcons free agency capsule - Washington Times The march of the September Surprises Google's new pollution police, coming to patrol near you Property rights and pricing ATLANTA FALCONS (11-7) UNRESTRICTED FREE AGENTS: DE Adrian Clayborn; FB Derrick Coleman; WRs Taylor Gabriel, Andre Roberts and Nick Williams; LBs Jordan Tripp, Sean Weatherspoon and Kemal Ishmael; DTs Dontari Poe, Courtney Upshaw and Ahtyba Rubin; CB Blidi Wreh-Wilson. RESTRICTED FREE AGENTS: FS Ricardo Allen; RBs Terron Ward and Terrence Magee; G Ben Garland. NEEDS: Tight end is priority following release of Levine Toilolo. Veteran could be signed to challenge Austin Hooper. Team cut Derrick Shelby and could lose Clayborn, so more pass rush help at defensive end may be needed. If team loses Poe and Upshaw in free agency, another veteran defensive tackle may be signed. Guard is another priority that may be addressed high in draft or in free agency. General manager Thomas Dimitroff said at NFL scouting combine that Gabriel would not be re-signed. Kicker Matt Bryant avoided free agency by agreeing to three-year deal. AVAILABLE SALARY CAP SPACE (approximately): $9 million ___ For more NFL coverage: http://www.pro32.ap.org and http://www.twitter.com/AP_NFL Copyright 2018 The Washington Times, LLC. Click to Read More and View Comments Click to Hide Terms of Use / Privacy Policy
NEWS-MULTISOURCE
User:Klgottlieb/be bold Being bold is important on Wikipedia. My name is Katelynn I am 20 years old! "lkmknklmlmlkm" mmklmlkml;mklk;npbhyu ←→′
WIKI
Sephora’s Beauty Insider sale 2019: What to buy and how to shop Sephora's 2019 Beauty Insider shopping event is running from November 1 through November 11, 2019.Rouge members can take up to 20% off online and in-stores starting November 1 while VIB and Insider members can save 15% and 10% respectively starting November 7. Here are the 22 best beauty products to buy during the Sephora Beauty Insider event.I've enjoyed Rouge status as a Sephora Beauty Insider for the past four years but I've yet to take advantage of its many benefits besides free shipping and early access to its big holiday sale. It's a great time to buy gifts for my family and friends, but mostly just for myself — it's the least I can do to keep up my Rouge status. Starting November 1 through November 11, 2019, Sephora Rouge members can take up to 20% off online and in-stores. If you're shopping in-store, Rouge members can bring a friend who will also receive 20% off their purchase. Sephora VIB and Insider members can save 15% and 10% respectively starting November 7 through November 11.Whether you're a Rouge, VIB, or Insider member, just use the code HOLIDAYSAVE during checkout and be on your merry way. Best of all, there's no limit to how many times the code can be used — none.We've rounded up 22 great buys, but there are also tons of exclusive and limited-edition gift sets or even its monthly beauty box subscription to check out before the sale ends on November 11.Here are the 22 best beauty, skin-care, and hair-care products to buy at Sephora's Beauty Insider sale:  Giorgio Armani Luminous Silk Foundation Giorgio Armani Luminous Silk Foundation, $64This foundation has a huge following even just in my immediate circle of friends and here at Insider Picks. This weightless formula makes your skin look so smooth and silky without suffocating you. Everyone who's used it complains about the price, which is why this holiday is the perfect time to buy it. Laneige Lip Sleeping Mask Laneige Lip Sleeping Mask, $20My lips are somehow always pretty dry and cracked, but this cult-favorite lip mask from Korean brand Laneige has helped make them so much softer. While the mask comes in a few different variations, nothing beats the scent (and flavor) of the original.  Hourglass Veil Translucent Setting Powder Hourglass Veil Translucent Setting Powder, $46This translucent setting powder buffs out to an undetectable finish, so it's great for many skin tones. It's talc-free, which is a major bonus and leaves your face looking natural and airbrushed at the same time. Stila Stay All Day Liquid Eye Liner Stila Stay All Day Liquid Eye Liner, $22This felt tip liquid eyeliner is very easy to use and extremely helpful if you want to achieve a cat-eye. Liquid eyeliner is ideal for newbies too, though, because it's like drawing with a Crayola marker, but one that will stay on your face longer. La Mer Merry Little Miracles Set La Mer Merry Little Miracles Set, $160Treat yourself to luxurious skin-care from La Mer. It's expensive but worth the money, and using the code HOLIDAYSAVE can save you even more.  Olaplex Holiday Hair Fix Set Olaplex Holiday Hair Fix Set, $58I'm obsessed with Olaplex's hair products that are pretty much universally loved by people with all kinds of hair types. I am not, however, obsessed with the price, so this set is the perfect opportunity to pick up travel-sized versions of what I use daily.   Slip Silk Pillowcase Slip Silk Pillowcase (Standard/Queen), $85This ultra-silky pillowcase will make a great addition to your bed and help protect your skin from wrinkles and your hair from knotting and frizzing overnight. Dr. Dennis Gross Skincare Alpha Beta Universal Daily Peel Dr. Dennis Gross Skincare Alpha Beta Universal Daily Peel, $88This daily peel is incredibly easy to use, so it's perfect if you're lazy or short on time. Just swipe the pre-soaked pads across your face in a circular motion until completely. You can expect to see diminished fine lines as you continue to use the pads. Huda Beauty Nude Obsessions Eyeshadow Palette Huda Beauty Nude Obsessions Eyeshadow Palette, $29Sometimes, finding the right shade of neutral eyeshadows that works with your skin tone can be a hassle. Luckily, Huda Beauty has created three eyeshadow palettes with nine shades each so you can find your ideal palette.  Dyson Airwrap Styler Dyson Airwrap Styler, $549Taking advantage of the discount and save tons on the Dyson Airwrap Styler. It uses hot air instead of heat, and this set has everything you need to dry, straighten, or curl your hair.   Herbivore Jewel Box Mini Facial Oil + Serum Set Herbivore Jewel Box Mini Facial Oil + Serum Set, $58Find your next favorite facial oil and serum with this set of minis from Herbivore. They're made with 100% natural ingredients and target dryness, dullness, fine lines, and more.  beautyblender Pro beautyblender Pro, $20Not blending your makeup might as well be a sin. A beautyblender will help you apply and blend makeup with ease, and the black color is ideal for intensely pigmented products that would otherwise stain the classic pink shade.  Charlotte Tilbury Matte Revolution Lipstick Charlotte Tilbury Matte Revolution Lipstick, $34If you're looking for a matte lipstick that won't dry out your lips, which is a hard thing to come by, Charlotte Tilbury's matte lipstick should do the trick. The Matte Revolution line of lipsticks is moisturizing, and the rectangular tip gives you better control over traditional pointed bullets when applying. Skin Laundry Essential Daily Moisturizer, $30The Beauty Insider sale is the perfect time to start stocking up on essentials. This lightweight moisturizer from Skin Laundry has hyaluronic acid and other proteins to moisturize your skin, ideal for dry and cold winters.  Fresh Sugar Lip Legends Gift Set Fresh Sugar Lip Legends Gift Set, $48 Fresh makes some of the best lip treatments I used for dry lips. Normally, each full-sized version costs $24, so this $48 set is a steal. Benefit Cosmetics Roller Lash Curling & Lifting Mascara Benefit Cosmetics Roller Lash Curling & Lifting Mascara, $25If your lashes are really straight and you want to give them a nice curl, Benefit's mascara will curl and lift even the shortest and straightest of lashes.  Smashbox Photo Finish Foundation Primer Smashbox Photo Finish Foundation Primer, $36This OG primer from Smashbox will help your makeup go on smoother and last longer. It's also vegan and paraben-free and is made with vitamins A and E so your skin stays nourished.  GHD Platinum + Professional 1" Styler GHD Platinum + Professional 1" Styler, $249This smart hair straightener self-regulates to ensure consistent heat while straightening your hair. It can also recognize the thickness of your hair, so you get a more personalized experience and result. Living Proof Perfect Hair Day Heat Styling Spray Living Proof Perfect Hair Day Heat Styling Spray, $28Before using any kind of heat styling product, mist your hair with Living Proof's heat protectant. It protects your hair from heat and smoothes your hair while giving it some extra shine.  Urban Decay Naked Honey Palette Urban Decay Naked Honey Palette, $49Urban Decay's newest eyeshadow palette has 12 golden neutral colors that can create a variety of looks. It also comes with a double-ended brush and mirror for convenience. Drunk Elephant T.L.C Sukari Babyfacial Mask Drunk Elephant T.L.C Sukari Babyfacial Mask, $80Don't let the $80 price point scare you — many people love this facial-in-a-bottle. It gently exfoliates dead cells to reveal softer, more youthful skin.   The Original MakeUp Eraser Makeup Remover Cloth The Original MakeUp Eraser Makeup Remover Cloth, $20Run this magical cloth under some water and then you can use it to remove all sorts of makeup, even waterproof makeup. No need for any other makeup remover — at. all.  Subscribe to our newsletter. Find all the best offers at our Coupons page. Disclosure: This post is brought to you by the Insider Picks team. We highlight products and services you might find interesting. If you buy them, we get a small share of the revenue from the sale from our commerce partners. We frequently receive products free of charge from manufacturers to test. This does not drive our decision as to whether or not a product is featured or recommended. We operate independently from our advertising sales team. We welcome your feedback. Email us at insiderpicks@businessinsider.com.
NEWS-MULTISOURCE
Perl http://www.activestate.com/activeperl/downloads Articles http://perldoc.perl.org/perlcheat.html http://perlmonks.org/?node_id=216602 - another cheat sheet http://perlmonks.org/?node_id=238031 - Cheat sheet for Perl 6 http://juerd.nl/site.plp/perlcheat - another Syntax Check Cheat Miscellaneous REST / API Array Hash Time Signal Flow control Working with files Working with dbm LWP / Making web requests CGI Working with databases (DBI, DBD, mysql) Sending email Working with email Working with command-line options (GetOpt) Regular expresion More code samples One liners printf format Moose Catalyst Sigill / Data structure OOP Design Pattern mod_perl Templating systems Mime::Parser Testing Debugging Catch system error Log::Log4perl Module installation and miscellaneous commands Socket Programming Signal Handling Gotchas The Parrot Virtual Machine Pugs Mottos perl-shorthand-instance-variables What is Perl and why should we use Perl? Officially, Perl stands for Practical Extraction and Report Language, except when it doesn't. Perl was originally a language optimized for scanning arbitrary text files, extracting information from those text files, and printing reports based on that information. It quickly became a good language for many system management tasks. Over the years, Perl has grown into a general-purpose programming language. It's widely used for everything from quick "one-liners" to full-scale application development. The language is intended to be practical (easy to use, efficient, complete) rather than beautiful (tiny, elegant, minimal). It combines (in the author's opinion, anyway) some of the best features of sed, awk, and sh, making it familiar and easy to use for Unix users to whip up quick solutions to annoying problems. Its general-purpose programming facilities support procedural, functional, and object-oriented programming paradigms, making Perl a comfortable language for the long haul on major projects, whatever your bent. Perl's roots in text processing haven't been forgotten over the years. It still boasts some of the most powerful regular expressions to be found anywhere, and its support for Unicode text is world-class. It handles all kinds of structured text, too, through an extensive collection of extensions. Those libraries, collected in the CPAN, provide ready-made solutions to an astounding array of problems. When they haven't set the standard themselves, they steal from the best — just like Perl itself. How can we get started with Perl? If you are using Unix / Linux, chances are good that Perl is already installed. If not, you can use the appropriate package manager for your operating system to install Perl. If you use Windows, you can google Perl and download the one from Active State. Just open up a text editor, and paste: #!/usr/bin/perl use strict; no warnings qw(uninitialized); use English '-no_match_vars'; sub printSomething { $message = shift; print $message; } printSomething("Hello world"); Save the file, and then run it: ./filename.pl perl filename.pl Read the OOP page and other links on this page for sample code. How can we do a syntax check on our code? perl -c filename.pl How can we use gethostbyname to determine its IP address? use Socket qw(inet_ntoa); $name = 'www.example.com'; my ($name,$aliases,$addrtype,$length,@addrs) = gethostbyname($name); $ip = inet_ntoa($addrs[0]); What is the purpose of the package statement? The package statement define the name space for a Perl module. Can we define multiple packages in a single file? Yes. package Sophie; sub say_hello { print "Hi World!"; } package Clara; use Sophie; # loads the package but does NOT import any methods say_hello(); # blows up Sophie->say_hello(); # correct usage Sophie::say_hello(); # works, but not for inherited methods Can a package be spread across multiple file? Yes. What happen when you use a module? When you use a package such as Some::Package, Perl looks for a file Some/Package.pm in the current directory. If this file doesn't exist, it looks for it in the system's global directory (like c:/perl/lib) and in the global @INC array. How can we cause Perl to look for module in our own user-defined location? It is a good idea to save your application packages to a directory like lib and add that directory to the list of namespace roots using use lib 'my/root/path': use lib 'lib'; # Add the sub-directory 'lib' to the namespace root @INC use Some::Package; # Walks through @INC to find the package file How can a module export its subroutines and variables into the global namespace? This is not recommended, unless you have a really good reason. In order to export symbols, inherit from the Exporter class and fill the @EXPORT array with the symbols you'd like to export: package Util; use base 'Exporter'; our @EXPORT = ('foo', 'bar'); sub foo { print "foo!"; } sub bar { print "bar!"; } package Amy; use Util; # imports symbols in @EXPORT foo(); # works fine bar(); # works fine The above code exports the foo and bar function by default. It might be a good idea to leave it up to the requiring package to decide which symbols get exported into its namespace. In that case you simply use the @EXPORT_OK array instead or @EXPORT: package Util; use base 'Exporter'; our @EXPORT_OK = ('foo', 'bar'); sub foo { print "foo!"; } sub bar { print "bar!"; } package Amy; use Util 'foo'; # only import foo() foo(); # works fine bar(); # blows up How can we import symbols from another module? package Student; use Some::Package 'param1', 'param2'; Whenever you use a package, the static method import is called in that package with all parameters you might have given: package Some::Package; sub import { my($class, @params) = @_; } How can we determine the caller of a subroutine? The caller() function lets you (among other things) find out what class was calling the current method: package Some::Package; sub import { my($class, @params) = @_; print "Look, " . caller() . " is trying to import me!"; } How can we iterate over an array using the foreach construct? foreach my $role ( qw( Flier Digger Feline ) ) { } How can we access environment variables? $ENV{"PATH"}; How can we execute an external command? system("command"); How can I make my perl program run faster? 1. Benchmark and profile to make sure that you are optimizing the right part. 2. Look for better algorithm instead of microtuning your code, and when all else fail, consider buying better/faster hardware. 3. Autoload seldom-used Perl code. See AutoSplit and AutoLoader module. 4. Locate bottlenecks and think about writing those parts in C or assembly. See Inline module. 5. If your perl executable is currently linked to libc.so, you can often gain 10-25% performance benefit by rebuilding it to link to the static libc.a instead. This make a bigger executable but your perl program may thank you for it. If your server is only for serving mod_perl code, you may want to double check. 6. Using substr() or vec() to simulate arrays can be highly beneficial. 7. The standard Tie::SubstrHash module can also help for certain types of data structure. 8. If you're working with specialist data structures (matrices, for instance) modules that implement these in C may use less memory than equivalent in Perl modules. 9. Another thing to try is to learn whether your Perl was compiled with the system's malloc or with Perl's builtin malloc. Whichever one it is, try using the other one and see whether this make a difference. You can find out whether you are using perl's malloc by typeing "perl -V:usemymalloc" 10. Don't read an entire file into memory if you can process it line by line. 11. Avoid using map and grep on large list. 12. Avoid unnecessary quotes and stringifications 13. Avoid stringifying arrays: { local $, = ""; print @big_arrays; } 14. Pass by reference. Pass arrays and hashes by reference, not by value. It avoids creating a copy of all the contents. 15. Tie large variables to disk. For big data stores, ones that exceed available memory, consider using one of the DB modules to store it on disk instead of RAM. This will incur a penalty in access time, but that's probably better than causing your hard disk to thrash due to massive swapping. 16. Don't use English.pm because it export a lot of variables (need verification) print("Hello world!\n"); $name = <STDIN> chomp($name); eq, ne @array = ("camel","llama","alpaca"); @array = qw(camel, llama, alpaca); $array[i] %hash = qw(fred camel barney llama betty alpaca wilma alpaca); $hash{"key"}; ($name =~ /^Randal/) ($name =~ /^Randal/i) # ignore-case ($name =~ /^randal\b/i) # word boundary special marker $name =~ s/\w.*//; # \w stand for non-word character (something beside letters, digits, or underscore) $name =~ tr/A-Z/a-z/; format STDOUT = @<<<<<<<<< @<<<<<<<<< @<<<<<<<<< $filename, $name, $word . format STDOUT_TOP = Page @<< $% Filename Name Word ==== === ==== . dbmopen(%last_good, "lastdb", 0666); $last_good{$name} = time; dbmclose(%last_good); keys(%last_good); // returns a list of keys sort(list) // sort a list alphabetically foreach $name (sort keys(%last_good)) { .. } ($e, @fred) = @fred; // remove the first element of @fred to $e $a = @fred; // $a is the length of @fred ($a) = @fred; // $a is the first element of @fred @fred[0,1] = @fred[1,0] $#fred // index of the last value (element) of fred push(@mylist, $newvalue); $oldvalue = pop(@mylist); unshift(@fred,$a); $x = shift(@fred); reverse(@a); sort(@str); chomp(@list); \n newline \r carriage return \t tab \f formfeed \b backspace \a bell \e escape \007 bell \x7f delete \cz control character \\ backslash \" double quote \l (lower-case letter l) lower-case the next character \L lower-case until \E \u upper-case the next character \U upper-case until \E \Q backslash all non-alphanumeric character until \E terminate \L, \U, and \Q chr($a) // returns the corresponding character (in this case, $a is a number) ord($a) // returns the corresponding number (in this case, $a is a character) lc, lcfirst uc, ucfirst length index rindex substr last // break next // continue redo // goto label $_ // default input separator $\ // output record separator $/ // input record separator $" // output list separator $, // output field separator $. // current input line number (x .. y) // range of input line keys values each // return the next key value pair delete exists split(/pattern/, string, limit) // In a list context, split returns a list of substring found. // In a scalar context, returns the count of substring found. join("separator string", list) map(expression, list) // returns a list of result grep(expression,list) // returns the number of pattern found (in scalar) // returns a list of pattern found in list context printf specifier format pack Unless otherwise stated, the content of this page is licensed under Creative Commons Attribution-ShareAlike 3.0 License
ESSENTIALAI-STEM
Pia Mancini Pia Mancini is an activist and technical project leader from Argentina. She is co-founder of Democracy Earth and Open Collective. The latter is a project that facilitates open source code contributors to receive donations. Career Mancini worked for the Unión Celeste y Blanco, an Argentine political party, from 2010 to 2012, but was dissatisfied with the lack of responsiveness to the public. She subsequently started the Net Democracy foundation, a non-profit, to support citizen participation in government through the use of technology. In 2012 the foundation released DemocracyOS, an online app that allows citizens to understand, discuss and "vote" on new legislation. As a next step, she and her associates founded the Net Party, an Argentine political party that pledges to act according to people's wishes as expressed online. In 2013 she co-founded the non-profit Democracy Earth, based in Palo Alto, California, which provides an online platform for political groups, and in January 2016 she co-founded Open Collective, which provides a platform for open-source project groups to collect and spend money semi-transparently. Her TED talk, How to Upgrade Democracy for the Internet Era, received over a million views.
WIKI
Wayne Thomson Wayne Thomson is a Canadian politician who previously served as the mayor of Niagara Falls. He served two separate terms in the office, from 1978 to 1983 and from 1991 to 2003. In 1983, Thomson resigned as mayor amid controversy over a vacation given as a gift by a Toronto development firm, and a land purchase made by his then-fiancé Bonnie Dickson. His fiancé bought some land in Niagara Falls from a seller who did not want it to be sold to Marineland. Seven months later, she sold the plot to Marineland. Marineland owner John Holer stated she acted as trustee and was accompanied by Thomson when the arrangements were made. Thomson was defeated by Ted Salci in the 2003 municipal election. He subsequently ran and won re-election to Niagara Falls City Council as an councillor in the 2010 municipal election.
WIKI
Cato's Letters/Letter 25 SIR, The good of the governed being the sole end of government, they must be the greatest and best governors, who make their people great and happy; and they the worst, who make their people little, wicked, and miserable. Power in a free state, is a trust committed by all to one or a few, to watch for the security, and pursue the interest, of all: And, when that security is not sought, nor that interest obtained, we know what opinion the people will have of their governors. It is the hard fate of the world, that there should be any difference in the views and interests of the governors and governed; and yet it is so in most countries. Men who have a trust frankly bestowed upon them by the people, too frequently betray that trust, become conspirators against their benefactors, and turn the sword upon those who gave it; insomuch that in the greatest part of the earth, people are happy if they can defend themselves against their defenders. Let us look round this great world, and behold what an immense majority of the whole race of men crouch under the yoke of a few tyrants, naturally as low as the meanest of themselves, and, by being tyrants, worse than the worst; who, as Mr. Sidney observes, use their subjects like asses and mastiff dogs, to work and to fight, to be oppressed and killed for them. Even the good qualities and courage of such subjects are their misfortune, by strengthening the wicked hands of their brutal masters, and strengthening their own chains. Tyrants consider their people as their cattle, and use them worse, as they fear them more. Thus the most of mankind are become the wretched slaves of those, who are or should be their own creatures; they maintain their haughty masters like gods, and their haughty masters often use them like dogs: A fine specimen of gratitude and duty! Yet this cruel spirit in tyrants is not always owing naturally to the men, since they are naturally like other men; but it is owing to the nature of the dominion which they exercise. Good laws make a good prince, if he has a good understanding; but the best men grow mischievous when they are set above laws. Claudius was a very harmless man, while he was a private man; but when he came to be a tyrant, he proved a bloody one, almost as bloody as his nephew and predecessor Caligula; who had also been a very good subject, but when he came to be the Roman emperor, grew the professed executioner of mankind. There is something so wanton and monstrous in lawless power, that there scarce ever was a human spirit that could bear it; and the mind of man, which is weak and limited, ought never to be trusted with a power that is boundless. The state of tyranny is a state of war; and where it prevails, instead of an intercourse of confidence and affection, as between a lawful prince and his subjects, nothing is to be seen but jealousy, mistrust, fear, and hatred: An arbitrary prince and his slaves often destroy one another, to be safe: They are continually plotting against his life; he is continually shedding their blood, and plundering them of their property. Cuncta ferit, dum cuncta timet. I think it was Justinian, the Emperor, who said, "Though we are above the law, yet we live according to the law." But, by his Majesty's favour, there was more turn than truth in the saying; for princes that think themselves above law, act almost constantly against all law; of which truth Justinian himself is a known instance. Good princes never think themselves above it. It is an affecting observation, that the power given for the protection of the world, should, in so many places, be turned to the destruction of it. "As if the law was in force for their destruction, and not for their preservation; that it should have power to kill, but not to protect, them: A thing no less horrid, than if the sun should burn us without lighting us, or the earth serve only to bury, and not feed and nourish us," says Mr. Waller in a speech of his in Parliament. Despotick power has defaced the Creation, and laid the world waste. In the finest countries in Asia, formerly full of people, you are now forced to travel by the compass: There are no roads, houses, nor inhabitants. The sun is left to scorch up the grass and fruits, which it had raised; or the rain to rot them: The gifts of God are left to perish; there being none of his creatures, neither man nor beast, left to use and consume them. The Grand Seignior, who (if we may believe some sanctified mouths, not addicted to lying) is the vicegerent of heaven, frustrates the bounty of heaven; and, being the father of his people, has almost butchered them all. Those few (comparatively very few) who have yet survived the miserable fate of their brethren, and are reserved for sacrifices to his cruelty, as occasion offers, and his lust prompts him, live the starving and wretched property of ravenous and bloody bashaws; whose duty to their master, as well as their own avarice, obliges them to keep the people, over whom they preside, poor and miserable. But neither bashaws, nor armies, could keep that people in such abject slavery, if their priests and doctors had not made passive obedience a principle of their religion. The holy name of God is profaned, and his authority belied, to bind down wretchedness upon his creatures, and to secure the tyrant that does it. The most consummate of all wickedness, and the highest of all evils, are sanctified by the teachers of religion, and made by them a part of it. Yes, Turkish slavery is confirmed, and Turkish tyranny defended, by religion! Sir Paul Ricaut tells us, that the Turks maintain, "That the Grand Seignior can never be deposed, or made accountable for his crimes, whilst he destroys carelessly of his subjects under a hundred a day": 'Tis made martyrdom to die submissively by the hand of the tyrant; and some of his highest slaves have declared that they wanted only that honour to complete their felicity. They hold, that it is their duty to submit, though their tyrant "command a whole army of them to precipitate themselves from a rock, or to build a bridge with piles of their bodies for him to pass a river, or to kill one another to afford him pastime and pleasure." Merciful God! Is this government! And do such governors govern by authority from thee! It is scarce credible what Monsieur de L'Estoille tells us: He says he travelled in the Indies for above twenty days together, through lanes of people hanged upon trees, by command of the King; who had ordered above a hundred thousand of them to be thus murdered and gibbeted, only because two or three robberies had been committed amongst them.Bayle, ''Reponse aux Quest. d'un Provinc.'' tom. I. p. 595. It is one of the great evils of servitude, that let the tyranny be ever so severe, 'tis always flattered; and the more severe 'tis, the more 'tis flattered. The oppressors of mankind are flattered beyond all others; because fear and servitude naturally produce, as well as have recourse to, flattery, as the best means of self-preservation; whereas liberty, having no occasion for it, scorns it. Sir Paul Ricaut ascribes the decay of the Ottoman Empire to the force of flattery, and calls the Turkish court, a prison and banniard of slaves. Old Muley, the Lord's anointed of Morocco, who it seems is still alive, is thought to have butchered forty thousand of his subjects with his own hands. Such a father is he of his people! And yet his right to shed human blood being a genuine characteristick of the church of Morocco, as by law established, people are greedy to die by his hand; which, they are taught to imagine, dispatches them forthwith to paradise: Insomuch that, though, as I am told, every time he mounts his horse, he slices off the head of the slave that holds his stirrup, to shew that he is as good an executioner as he is a horseman, yet there is a constant contention among his slaves, who shall be the happy martyr on that occasion; so that several of them crowding to his stirrup at once, for the gracious favour, his Majesty has sometimes the honour to cut off two heads, and to make two saints, with one blow. The exercise of despotick power is the unrelenting war of an armed tyrant upon his unarmed subjects: it is a war of one side, and in it there is neither peace nor truce. Tacitus describes it, Saeva jussa, continuas accusationes, fallaces amicitias, perniciem innocentium: "Cruel and bloody orders, continual accusations, faithless friendships, and the destruction of innocents." In another place he says, that "Italy was one continual shambles, and most of its fair cities were defaced or overthrown; Rome itself was in many places laid in ashes, with the greatest part of its magnificent buildings: virtue was despised, and barefaced debauchery prevailed. The solitary islands were filled with illustrious exiles, and the very rocks were stained with slaughters: but, in the city itself, cruelty raged still more; it was dangerous to be noble, it was a crime to be rich, it was capital to have borne honours, and high treason to have refused them; and for virtue and merit, they brought sure and sudden destruction." These were some of the ravages of absolute dominion! And as to the common people, the same author says, "They were debauched and dispirited, and given up to idleness and seeing shews." Plebs sordida circo & theatris sueta. Oh! abject state of such as tamely groan Under a blind dependency on one! This is a sort of government, which is too great and heavy a curse for any one to wish, even upon those who are foolish enough, or wicked enough, to contend for its lawfulness; or, which is the same thing, for submission to it: But surely, if ever any man deserved to feel the merciless gripesof tyranny, it is he who is an advocate for it. Phalaris acted justly, when he hanselled his brazen bull with the wretch who invented it. As arbitrary power in a single person has made greater havock in human nature, and thinned mankind more, than all the beasts of prey and all the plagues and earthquakes that ever were; let those men consider what they have to answer for, who would countenance such a monstrous evil in the world, or would oppose those that would oppose it. A bear, a lion, or a tiger, may now and then pick up single men in a wood, or a desert; an earthquake sometimes may bury a thousand or two inhabitants in the ruins of a town; and the pestilence may once in many years carry off a much greater number: But a tyrant shall, out of a wanton personal passion, carry fire and sword through a whole continent, and deliver up a hundred thousand of his fellow creatures to the slaughter in one day, without any remorse or further notice, than that they died for his glory. I say nothing of the moral effect of tyranny; though 'tis certain that ignorance, vice, poverty, and vileness, always attend it. He who compares the world now with what it was formerly, how populous once, how thin now; and considers the cause of this doleful alteration, will find just reason to fear, that spiritual and temporal tyranny, if they go on much longer, will utterly extinguish the human race. Of Turkey I have spoken already: The great continent of America is almost unpeopled, the Spaniards having destroyed, ’tis thought, about forty millions of its natives; and for some kingdoms in Europe, especially towards the north, I do not believe that they have now half the inhabitants that they had so lately as a hundred years ago. Blessed be God, there are still some free countries in Europe, that abound with people and with plenty, and England is the foremost. This demonstrates the inestimable blessing of liberty. Can we ever over-rate it, or be too jealous of a treasure which includes in it almost all human felicities? Or can we encourage too much those that contend for it, and those that promote it? It is the parent of virtue, pleasure, plenty, and security; and 'tis innocent, as well as lovely. In all contentions between liberty and power, the latter has almost constantly been the aggressor. Liberty, if ever it produce any evils, does also cure them: Its worst effect, licentiousness, never does, and never can, continue long. Anarchy cannot be of much duration: and where 'tis so, it is the child and companion of tyranny; which is not government, but a dissolution of it, as tyrants are the enemies of mankind. Power is like fire; it warms, scorches, or destroys, according as it is watched, provoked, or increased. It is as dangerous as useful. Its only rule is the good of the people; but because it is apt to break its bounds, in all good governments nothing, or as little as may be, ought to be left to chance, or the humours of men in authority: All should proceed by fixed and stated rules, and upon any emergency, new rules should be made. This is the constitution, and this the happiness of Englishmen; as hath been formerly shewn at large in these letters. We have a constitution that abhors absolute power; we have a King that does not desire it; and we are a people that will never suffer it: No free people will ever submit to it, unless it steal upon them by treachery, or they be driven into it by violence. But a state can never be too secure against this terrible, this last of all human evils; which may be brought upon them by many causes, even by some that at first sight do not seem to threaten any such thing: And of all those causes, none seems more boding than a general distress, which certainly produces general discontent, the parent of revolutions; and in what such a circumstance of affairs may end, no man can ever foresee: Few are brought about without armies; a remedy almost always worse than the disease. What is got by soldiers, must be maintained by soldiers; and we have, in this paper, already seen the frightful image of a military government; a government, which, at best, is violent and bloody, and eternally inconsistent with law and property. It is therefore a dreadful wickedness to have any share in giving occasion for those discontents, which are so apt to burst into rage and confusion. A state sometimes recovers out of a convulsion, and gains new vigour by it; but it much oftener expires in it. Heaven preserve me from ever beholding contending armies in England! They are different things from what they once were. Our armies formerly were only a number of the people armed occasionally; and armies of the people are the only armies which are not formidable to the people. Hence it is, that, in the many revolutions occasioned by the strife between the two royal houses of York and Lancaster, there never was any danger of slavery from an armed force: A single battle decided the contention; and next day these popular soldiers went home, and resumed their ordinary arms, the tools of husbandry. But since that time armies have not been so easily parted with; but after the danger was over for which they were raised, have often been obstinately kept up, and by that means created dangers still as great. Some quacks in politicks may perhaps venture publick disturbances, out of an opinion that they shall be able to prevent them by art, or suppress them by force. But this shews their capacity, as well as their wickedness: For, not to mention the malignity of their hearts, in risking publick ruin, to gratify a private appetite; how can any event be certainly foreseen, when the measure of the cause cannot be certainly known? They can never ascertain the degree of opposition; they cannot foreknow what circumstances may happen, nor into whose hands things may fall. Cicero did not dream, when he employed Octavius for the commonwealth, that his young champion for liberty would ever be the tyrant of his country. Who could foresee that Cromwell would enslave those whom he was employed to defend? But there is no trusting of liberty in the hands of men, who are obeyed by great armies. From hence may be seen what a fatal and crying crime it would be, in any free country, to break the confidence between the prince and his people. When loyalty is once turned into indifference, indifference will soon be turned into hatred; hatred will be returned with hatred; resentment may produce tyranny, and rage may produce rebellion. There is no mischief which this mutual mistrust and aversion may not bring forth. They must therefore be the blackest traitors, who are the first authors of so terrible an evil, as are they who would endeavour to protect them. Henry III of Castile said, that he feared the curse of his people more than he did the arms of his enemies: In which saying he shewed as much wisdom as humanity; since, while he was beloved at home, he had nothing to fear from abroad, and the curses of his subjects were the likeliest means to bring upon him the arms of his enemies. G. I am, &c.
WIKI
Ted Wingfield Frederick Davis "Ted" Wingfield (August 7, 1899 – July 18, 1975) was an American professional baseball pitcher. He played all or part of five seasons in Major League Baseball from 1923 through 1927 for the Washington Senators (1923–24) and Boston Red Sox (1924–27). Listed at 5ft 11in, 168 lb., Wingfield batted and threw right-handed. He was born in Bedford, Virginia. In a five-season career, Wingfield posted a 24–44 record with a 4.18 ERA in 113 appearances, including 57 starts, 31 complete games, three shutouts, five saves, and 553.1 innings pitched. His best season statistically was 1925, when he posted career bests in wins (12), strikeouts (30), and innings pitched (254.1) while having an ERA of 3.96. Wingfield was notable for an especially low rate of strikeouts as a pitcher. In 553 1/3 innings, he struck out only 68 batters, or 1.1 per 9 innings. In his final season, over $74 2/3$ innings, he struck out a grand total of one batter. He struck out Chick Galloway, a good contact hitter, in a game in which Wingfield pitched poorly, allowing seven runs in three innings. Wingfield died at the age of 75 in Johnson City, Tennessee.
WIKI
How Skyworks Solutions Inc Is Growing Beyond Apple Skyworks Solutions (NASDAQ: SWKS) investors couldn't have asked for a better start to its fiscal 2017. A first quarter earnings beat and a stronger outlook for the ongoing quarter sent its stock soaring to new 52-week highs, as it rose over 13% in a single day. For the fiscal second quarter, Skyworks believes that its revenue will grow 8% year-over-year to $840 million, exceeding the consensus forecast of $818 million, while earnings of $1.40 per share should significantly outpace analyst estimates of $1.24 per share. Skyworks also delivered some solid long-term takeaways in its latest quarter. The company is now boasting of design wins at high-volume smartphone companies in China, as it is growing its revenue outside of Apple (NASDAQ: AAPL) . Still, Apple reportedly contributed 40% of Skyworks' top line in fiscal 2016. However, the company has been gradually working toward winning more business from other clients, and it has found some success. Growing beyond Apple Skyworks' business outside of Apple increased 8% in the last fiscal year, as Vivek Arya of Merrill Lynch pointed out on the latest conference call. Though this might not seem really big right now, the fact that overall revenue fell 1.3% year-over-year in the first quarter makes the growth beyond Apple a crucial factor for long-term success. In fiscal 2015, Apple was reportedly 44% of Skyworks' business. Thus, it can be assumed that of Skyworks' total revenue of $927 million in the first quarter of 2016, Apple contributed about $408 million of that. By comparison, the smartphone giant should have contributed $366 million to Skyworks' revenue (40% of $914 million) in the most recently reported quarter. This indicates that revenue from Apple fell about 10% year-over-year. That indicates Skyworks' growth from other clients powered its revenue and earnings beat last quarter. This is why Skyworks needs to aggressively pursue client diversification if it wants to mitigate the slowdown in business with Apple. Diversifying in the right areas Skyworks Solutions is building an army of clients in China. One of the most prominent names is Huawei. The company has been supplying its SkyBlue technology to the Chinese smartphone maker for its flagship Mate 9 smartphone. In fact, according to Skyworks CEO Liam Griffin, Huawei is now the company's second biggest client. This is a big deal for Skyworks since Huawei is now a formidable name in the smartphone industry. According to the latest data available from IDC, Huawei's smartphone market share stood at 9.3%, trailing Samsung 's 21% share and Apple's 12.5% share in the third quarter of 2016. More importantly, the Chinese smartphone giant has been selling more of its high and mid-range phones, which account for 57% of its total shipments. With a higher share of Huawei's sales being driven by premium and mid-range devices, it has been able to increase the average selling price of its phones. When the company had released its 2015 results, its average selling price of smartphones was up 17% to $204 per unit. Though the company has not released 2016 numbers yet, Huawei is capable of increasing its selling prices once again as it has been introducing its flagship phones in global markets. The higher average selling price, along with higher volumes, is good news for Skyworks since it will be able to enhance its dollar content in Huawei devices, which are in turn enjoying higher selling prices. Market research firm TrendForce points out that smartphone production will increase 4.5% this year to 1.4 billion units. Chinese smartphone companies will account for 634 million units of this production, with Oppo, Vivo, and Huawei being the biggest names. As Skyworks counts all three of them as clients, it will witness a rise in chip sales this year as the top Chinese smartphone companies are expected to sell 39% more phones in 2017 as compared to 2016. Therefore, higher component demand by Chinese companies to make more smartphones will push up Skyworks' average selling prices, since it should be able to charge a premium in the wake of tight supply. Skyworks can also make up for the volumes that it is losing due to Apple's slowing iPhone sales, as it can now sell more components to Chinese smartphone makers. Moving beyond mobile The great thing about Skyworks is that it is pursuing opportunities beyond mobile as well. The Internet of Things, or IoT, is one such opportunity where the company is aggressively enhancing its presence by launching new offerings. Skyworks released new front-end connectivity modules for machine-to-machine connectivity and IoT operations a few weeks ago. With its latest IoT product, Skyworks should be able to accelerate the deployment of IoT applications by encouraging migration from 2G networks due to its low cost and compact packaging. This product development move by Skyworks is a smart one, since the number of cellular devices communicating with each other will rise from 300 million at present to around two billion by 2020, according to GSMA. As the number of machine-to-machine connections increases, Skyworks' connectivity modules that enable the IoT will gain more traction and lead to higher shipment volumes. However, the company does not single out its revenue or shipments from the IoT segment, or any segment for that matter. But the sheer growth in the size of this market, coupled with the company's product development efforts, should prove to be a tailwind in the long run. The Foolish takeaway Skyworks revenue is expected to increase 8.7% in the current fiscal year, followed by stronger growth of 10.5% next year. It appears to be pulling the right strings to diversify its revenue away from heavily concentrated clients such as Apple, which seems to have hit its own roadblocks . As a result, Skyworks is well-positioned for long-term success as it focuses on markets that have significant room for growth versus areas approaching saturation. 10 stocks we like better than Skyworks Solutions When investing geniuses David and Tom Gardner have a stock tip, it can pay to listen. After all, the newsletter they have run for over a decade, Motley Fool Stock Advisor , has tripled the market.* David and Tom just revealed what they believe are the 10 best stocks for investors to buy right now... and Skyworks Solutions wasn't one of them! That's right -- they think these 10 stocks are even better buys. Click here to learn about these picks! *Stock Advisor returns as of January 4, 2017 Harsh Chauhan has no position in any stocks mentioned. The Motley Fool owns shares of and recommends Apple and Skyworks Solutions. The Motley Fool has the following options: long January 2018 $90 calls on Apple, short January 2018 $95 calls on Apple, and short August 2017 $87 calls on Skyworks Solutions. The Motley Fool has a disclosure policy . The views and opinions expressed herein are the views and opinions of the author and do not necessarily reflect those of Nasdaq, Inc. The views and opinions expressed herein are the views and opinions of the author and do not necessarily reflect those of Nasdaq, Inc.
NEWS-MULTISOURCE
The Theory of Everything (We Know So Far): The Ultimate Animated Primer on the Most Successful Model of Reality in the History of Humanity and Its Fertile Limits How the gaps in gravity contour the next frontiers in the quest to understand the fundaments of what we are. Complement with an animated look at the little loophole in the Big Bang model, then revisit the remarkable story of how Johannes Kepler revolutionized our understanding of the universe while defending his mother in a witchcraft trial. In the centuries since, we have made staggering discoveries of fundamental forces swirling exotic particles into “the ricochet wonder of it all: the plain everythingness of everything, in cahoots with the everythingness of everything else.” Along the way, in our longing for a final theory of everything, we have been staggered by revelation after revelation that things are not what we previously thought them to be and beneath each layer of reality we have unpeeled lies another. The heavens are not a clockwork orrery of perfect orbs revolving around us in perfect circles. The cosmic wilderness is overgrown with a species of mystery we call dark matter and the fabric of spacetime is pocked with black holes the rims of which gape our Munchian scream at the sense that the universe remains a sweeping enigma whose native language we are only just beginning to decipher, naming our particles and composing our equations in the alphabet of a long-gone civilization that believed the Earth was flat and the stars were at its service. Art from An Original Theory or New Hypothesis of the Universe, 1750. (Available as a print, as a face mask, and as stationery cards.) Our yearning for a Theory of Everything has culminated in what we call the Standard Model — a conceptual map of all the known particles and the fundamental forces that govern them to make the universe cohere into everything we know and are. It is the most successful scientific theory in the history of our species. But it is rather a Theory of Everything We Know So Far, at once triumphal and tessellated with incompleteness. Art from An Original Theory or New Hypothesis of the Universe, 1750. (Available as a print, as a face mask, and as stationery cards.) Between the time Hypatia of Alexandria first pointed her pre-telescopic eye to the cosmos millennia before the notion of galaxies and the time Vera Rubin stood at the foot of the world’s most powerful telescope to confirm the existence of dark matter by observing how distant galaxies rotate, and in all the time before, and in all the time since, we have hungered to understand the forces that move the stars and the Moon and the mind. Ever since Galileo leaned on his artistic training in perspective to draw his astronomical observations intimating that the universe might not be what the theologians have claimed it to be, humanity has been on a passionate and disorienting quest to understand the nature of the mystery that made us. The essence of that theory, its central contradictions, and how it contours the next layer of reality awaiting discovery is what theoretical physicist David Tong details in this animated primer for Quanta Magazine, drawing out discoveries and questions that punctuate the excellent anthology Alice and Bob Meet the Wall of Fire: The Biggest Ideas in Science from Quanta (public library). [embedded content] The Theory of Everything (We Know So Far): The Ultimate Animated Primer on the Most Successful Model of Reality in the History of Humanity and Its Fertile Limits
ESSENTIALAI-STEM
fonts don't look as good I recently had to replace my STB Nitro 4mb card.  It went bad.  I replaced it with a 4 mb ATI Rage IIc.  Other changes were  made about the same time.  I installed windows95b over itself, installed directX7, upgraded to windows98. After replacing the video card I noticed: The fonts on the desktop don't seem as good.  I think that the fonts even at boot up are not as clear as before. I have reinstalled the drivers.  I have the newest drivers.  I tried another monitor, same results. I have tried many different refresh rates.  I have tried diferent fonts and themes. Are these software or hardware issues. Thanks for any help. beagleAsked: Who is Participating? I wear a lot of hats... "The solutions and answers provided on Experts Exchange have been extremely helpful to me over the last few years. I wear a lot of hats - Developer, Database Administrator, Help Desk, etc., so I know a lot of things but not a lot about one thing. Experts Exchange gives me answers from people who do know a lot about one thing, in a easy to use platform." -Todd S. dew_associatesCommented: Beagle, describe for me what you mean by they don't seem as good. Is it a color problem, fuzzy or blurry, out of shape? How old is the system and especially the monitor. Is the monitor capable of handling the refresh rates set through the ATI card? Dennis 0 beagleAuthor Commented: The fonts are generally thinner and it seems like the font smoothing is not working well.  If I take the font smoothing off, it gets worse.  Some of the fonts look a bit more jagged.  I guess you could say they are fuzzy.  They don't look god awful, just not as good as before.  I have a two year old Optiquest v775 17" monitor.  The computer is an Inteva, two years old.  Everything worked fine when I had the STB card. 0 dew_associatesCommented: It could be the card or the drivers. Which drivers did you use, the ones that came with the card or the ones on the Win98 cd? 0 Starting with Angular 5 Learn the essential features and functions of the popular JavaScript framework for building mobile, desktop and web applications. beagleAuthor Commented: I have downloaded and installed the newest drivers for this card.  I phoned ATI and they had me go the install to make sure they were installed properly. 0 dew_associatesCommented: In that case, than it could be one of two problems, the card itself or possible the card is having a problem with the refresh rates with the monitor. Have you checked the monitor settings to make sure they coincide with the monitor? 0 beagleAuthor Commented: I have tried all different refresh rates, including windows optimum and adapter default.  ATI offered to send a different card but they didn't think that was the issue.  I had installed windows95b over itself and now have 98 on my system.  The video card was changed after I put 95  over itself.   I don't think the appearance of the fonts changed until after the card was installed.  Also I can't use 24bit or the scrolling is wavy.  It's okay in 16bit or 32bit. 0 dew_associatesCommented: A fresh installation of Win98 might help, is that a possibility? 0 beagleAuthor Commented: I really don't want to do that.  Why do you think that would help. 0 beagleAuthor Commented: I really don't want to do that.  Why do you think that would help. 0 larrypaloozaCommented: Perhaps it is DX7, have you tried starting fresh.  Also, you can try to slide the performance bar for video all the way to unaccelerated and see if things clear up. 0 dew_associatesCommented: Beagle, the reason I suggested a fresh frmat and reinstall is that when you upgrade to Win98, there's alot of old files and junk that is left behind that does cause problems. I haven't had a machine yet that didn't benefit from a fresh install. Even though you may have a Win98 upgrade disk, you can do a fresh install with it without installing 95B first. Dennis 0 beagleAuthor Commented: You probably are right but I wonder if that would take care of this font problem.  The fonts were altered after the video card was replaced and before the 98 upgrade.  I noticed that after the card was changed, even the white fonts on black screen as the computer is booting up before windows opens were not as clear/sharp.  Would that be solely a function of the card?   0 dew_associatesCommented: That's part of what I'm getting at. Rarely do ATI cards present problems, and most if not all of those are driver related. Obviously once in a while a card will go bad, but that happens with all electronic components. What I would do if faced with the same issue is have ATI replace it. When you install the replacement, if the problem persists it is probably a few bad files or bad settings buried in the registry somewhere. At least this will give you a place to start. 0 beagleAuthor Commented: I wonder if my fonts are not bad, they may be just not as sharp as they were before with the STB for some reason.  I was just looking at a computer in my office and the display looks similar to my computer at home.  I hate to belabor this issue but, will one video card have a different looking display over another especially with the fonts? 0 dew_associatesCommented: Beagle, font (or icon) corruption is always a possibility, but it's easy enough to check. Use your Find, Files and Folders and search for a file named shelliconcache (all one word) and delete it. Now reboot. Windows will rebuild this file during the boot process. If it is corruption, you'll know immediately. 0 beagleAuthor Commented: When you say that I would know immediately do you meant I would notice a change for a better?  Can doing this hurt anything? 0 dew_associatesCommented: Yes, there would be an improvement. There would be no damage as this is an acceptable process to recover from icon problems that do occur. 0 beagleAuthor Commented: I deleted the shelliconcache file but that didn't change anything.  I will probably have to try a reinstall sometime.  I have never done that before and am a little aprehensive.  Thanks for trying to help with this.  Should I stop the dialog now and award you the points or leave it open for other comments? 0 dew_associatesCommented: How about I post a full procedure for you to do a clean install as the answer. If that is okay, then tell me which versions of Windows you have on CD, such as full versions or upgrades, I'll post a step by step for you to follow whenever you wish to do this. 0 beagleAuthor Commented: Okay, My computer came with 95b installed.  I used a Windows 98 upgrade CD to upgrade.  I'm not sure when I will reinstall.  I changed the font for the icons to a font that ends in Mac.  I'm not at that machine right now so I don't remember the exact font.  The display looked a bit better so I may just hang in with it for awhile. 0 dew_associatesCommented: Is your machine a MAC? 0 beagleAuthor Commented: No it is not.  It's a pc 0 beagleAuthor Commented: News Gothic MT (Mac) is the specific font that I am using that looks better than the others.  Does this tell you anything? 0 dew_associatesCommented: Not rreally, but I will research it for you. You mentioned that your PC came with Win95B installed. Did they give you the CD Rom? 0 beagleAuthor Commented: yes they did. 0 dew_associatesCommented: Okay, then this will be a piece of cake for you then. The whole process should take you less than an hour. First and foremost, save off any: 1. Documents, pictures etc that you want to retain. 2. Also note any passwords and logon data that you will need to logon to your ISP. 3. If you use outlook, and want to save your address book and any email etc, just let me know which version and I'll post the procedure for you to do just that. 4. Lastly, if you want to save your IE favorites, let me know and I'll tell you how to export and save them. Here's the process to clean the system and restore just Win98. It is this simple! 1. Before formatting or doing anything else, take two new floppies and format them in full, not quick format. 2. Now click Start, Settings, Control Panel, Add/Remove Programs and click the Startup Disk. Insert your Win98 CD into the drive and make two startup disks. One is a backup in case you need it. When done, close control panel. 3. Now restart the system and boot to one of the floppies and verify that the system boots to it. Choose With CD-ROM drive support. With the Win98 CD Rom Disk in the drive, change directories to the CD ROM drive and type DIR<enter>. If you have access to your cd rom drive, you will see a directory of the contents of the Win98 CD. Repeat the process for the other floppy. Remove the floppy and boot to windows normally. If you do not have access to the CD Rom drive, stop here and post any errors that come up at this question. 4. Next, insert one floppy disk and using Find, Files and Folders, locate FORMAT.COM and copy it to the floppy. Repeat the process for the other disk. 5. At this point you should have saved off anything that you will need, documents, settings info for logon, favorites, email etc. 6. Now insert one of the floppies and boot the system. You will be presented with a menu giving you a choice between "With" and "Without" CD Rom drive support. Choose without CD Rom support. At the dos prompt, type FORMAT C:/S<enter> It will look like this before you touch enter: A:\>format c:/s 7. Once the format has completed, pop the floppy out of the drive and restart the system. It should boot to the "C" drive. 8. Put the floppy back into the drive and boot to it again, and this time choose With CD-ROM drive support. Take note of the drive letter that is assigned to your cd rom drive. If you only have one hard drive and one CD Rom drive, the drive letter will be "E" for the CD Rom drive as the setup disk creates a ram drive for the install process. 9. At the dos prompt, type E:\setup<enter> It will look like this before you touch enter: A:\>E:\setup 10. During the setup process, you will be asked whether you want a typical installation or custom. Choose custom. This will allow you to go through each area and choose all of the components and features you want. 11. During the installation, since you are using a Win98 upgrade CD, the installer will attempt to verify the existence of Win95 and won't find it. Just take the Win98 CD out and replace it with the Win95 CD and then point the installer to the cd rom drive. After it finds the Win95 cd, then swap the Win98 CD back in and continue with the setup. 12. Once the setup has finished, click start, settings, control panel and click the System icon and then select device manager. Go through the device list and look for any "!" or "?" for devices that have not loaded properly. You can remove the device by highlighting it and clicking remove. Then restart and load the correct drivers etc. 13. Once you've cleared your devices, setup you logon to your ISP etc. 14. Once the above has been done, you can recover your documents, pictures etc, and if we saved email etc, we can recover that as well. Questions? 0 Experts Exchange Solution brought to you by Your issues matter to us. Facing a tech roadblock? Get the help and guidance you need from experienced professionals who care. Ask your question anytime, anywhere, with no hassle. Start your 7-day free trial It's more than this solution.Get answers and train to solve all your tech problems - anytime, anywhere.Try it for free Edge Out The Competitionfor your dream job with proven skills and certifications.Get started today Stand Outas the employee with proven skills.Start learning today for free Move Your Career Forwardwith certification training in the latest technologies.Start your trial today Windows OS From novice to tech pro — start learning today.
ESSENTIALAI-STEM
F29 upgrade to F30 hangs Yes - the rpms were downloaded - just tried to do an install of the dnf modules and received the message that there were dependencies - is it possible to for the system to install the dependencies without know what they are in advance, i.e. the system will determine the dependencies and install them? Direct `dnf` dependencies $ dnf -q repoquery --requires --resolve --queryformat "%{NAME}" dnf bash python3-dnf systemd Recursive `dnf` dependencies $ dnf -q repoquery --recursive --requires --resolve --queryformat "%{NAME}" dnf acl alternatives audit-libs basesystem bash brotli bzip2-libs ca-certificates coreutils coreutils-common coreutils-single cracklib crypto-policies cryptsetup-libs curl curl-minimal cyrus-sasl-lib dbus dbus-broker dbus-common device-mapper device-mapper-libs dnf-data elfutils-default-yama-scope elfutils-libelf elfutils-libs expat fedora-gpg-keys fedora-release fedora-release-cinnamon fedora-release-cloud fedora-release-common fedora-release-container fedora-release-coreos fedora-release-iot fedora-release-kde fedora-release-matecompiz fedora-release-server fedora-release-silverblue fedora-release-snappy fedora-release-soas fedora-release-workstation fedora-release-xfce fedora-repos file-libs filesystem gawk gdbm-libs generic-release generic-release-common glib2 glibc glibc-all-langpacks glibc-common glibc-langpack-en glibc-minimal-langpack gmp gnupg2 gnutls gpgme grep gzip ima-evm-utils iptables-libs json-c keyutils-libs kmod-libs krb5-libs libacl libarchive libargon2 libassuan libattr libblkid libcap libcap-ng libcom_err libcomps libcurl libcurl-minimal libdb libdb-utils libdnf libfdisk libffi libgcc libgcrypt libgpg-error libidn2 libksba libmetalink libmodulemd libmodulemd1 libmount libnghttp2 libnsl2 libpcap libpsl libpwquality librepo libreport-filesystem libseccomp libselinux libsemanage libsepol libsigsegv libsmartcols libsolv libssh libssh-config libstdc++ libtasn1 libtirpc libunistring libusbx libutempter libuuid libverto libxcrypt libxml2 libyaml libzstd lua-libs lz4-libs mpfr ncurses ncurses-base ncurses-libs nettle npth openldap openssl-libs p11-kit p11-kit-trust pam pcre pcre2 popt publicsuffix-list-dafsa python-pip-wheel python-setuptools-wheel python3 python3-dnf python3-gpg python3-hawkey python3-libcomps python3-libdnf python3-libs python3-rpm qrencode-libs readline rpm rpm-build-libs rpm-libs rpm-sign-libs sed setup shadow-utils sqlite-libs systemd systemd-libs systemd-pam systemd-rpm-macros tzdata util-linux xz-libs zchunk-libs zlib As you downloaded the previously installed packages from the Fedora 30 repository, reinstalling them should fix the most critical issues: sudo rpm -i rpms/*.rpm sudo rpm -i --nodeps rpms/*.rpm Use the second command only if the first fails to resolve the dependencies. Wow! that is quite a list of dependencies. I have stored the rpms in the directory /root/rpms so should I execute the above command(s) from that directory or from / and specify the path to the rpms or does it matter? oh - I see my answer - missed the cd in the first line Argh - no success with the first command (rpm -i *.rpm) as the system noted there were dependencies. When tried the second command (rpm -i --nodeps *.rpm) there were multiple screens of messages - an example of which was /usr/bin/jemalloc.sh conflicts between attempted install of jemalloc-5.1.0-3.fc30.i686 and jemalloc-5.1.0-3.fc30.x86_64 (not sure where the i686 module is coming from). Didn’t think that was a good sign but tried the rpm --rebuilddb and then the ‘dnf clean all’ command - received the message the dnf command was not found (it was likely one of those that flew off the screen in the long list of the conflicts between the i686 and x86_64 modules. You can try to remove the i686-packages to avoid multilib-related issues: sudo rpm --nodeps -e $(rpm -q -a | grep -e i686) mkdir -p ~/rpms-i686 mv -f rpms/*.i686.rpm ~/rpms-i686 Also move the i686-packages in a separate directory if any and repeat the previous step. A bit of progress. Moved the i686 rpms to their own directory. Ran the ‘rpm -i --nodeps’ on the remaining x86_64 modules - all looked good - a number of messages about some were already installed. Next ran the ‘rpm --rebuilddb’ and then tried the 'dnf clean all" and received the message ‘-bash: dnf: command not found’. Not sure where the command was installed to but looked in the /etc directory and did find a dnf directory. What does it say if you try to install these packages specifically? sudo rpm -i rpms/dnf-*.rpm sudo rpm -i rpms/python3-dnf-*.rpm This issue might be even more serious than I assumed initially. If you do not have much progress, then it’s probably better to save your time and just reinstall the system. 1 Like Tried the suggested commands - the first one returned a message of ‘error failed dependencies’ - the dependencies were 3 python modules. The second was similar but in that case it was 9 phython modules. I have since re-installed Fedora 30 and am starting to customize to my previous setup. Thanks for your assistance and patience with working through this problem. I do have an issue with the re-install but will post that as a separate topic. 2 Likes Well, at least we can consider this path as an example of a deadlock, which probably does not have a simple solution.
ESSENTIALAI-STEM
How Facebook and other top tech companies have been keeping markets afloat Facebook lost more than $125 billion in value after the markets closed, with shares plummeting more than 20%, following an earnings report that missed revenue and user growth estimates. Why it matters: Facebook is part of a small group of companies that has been keeping the overall stock markets afloat for much of 2018. According to a Bank of America Merrill Lynch research note, the so-called FAANG stocks — Facebook, Amazon, Apple, Netflix and Alphabet (Google) —were single-handedly responsible for the S&P 500 being positive through the first half of 2018. Without them, the index’s first half performance would have been -0.73%. What happened: Facebook spent the quarter trying to fix its fake news problem, and it’s possible that these results show (perversely) that it’s beginning to work. Mark Zuckerberg wrote that “we're investing so much in security that it will significantly impact our profitability.” Thing is, profits were actually up. And up more than expected. This is a top-line issue reflecting slowed growth, not a bottom line issue about more money going out the door. Be smart: What we’ve seen in the past 12 hours is that these foundational stocks can fall very far, very fast, and very unexpectedly. Add in a recent subscriber growth hiccup from Netflix, which continues to trade at an astronomical multiple to earnings, and it shows just how thin the line has been between black and red. Go deeper: Subscribe to my new podcast, Pro Rata.
NEWS-MULTISOURCE
Developable In mathematics, the term developable may refer to: * A developable space in general topology. * A developable surface in geometry. * A tangent developable surface of a space curve
WIKI
Installing and Configuring OpenStack in Oracle® Solaris 11.2 Exit Print View Updated: April 2015     Installing and Configuring Heat Heat is OpenStack's orchestration engine that enables you to deploy cloud applications based on templates that you create. You install Heat on the same node as Keystone. How to Configure Heat Before You Begin You must configure Keystone first as described in the How to Install and Configure Keystone before performing this task. 1. Install the Heat package. controller# pkg install heat 2. Run the Heat setup script. controller# OS_SERVICE_ENDPOINT=http://$CONTROLLER_ADM_NODE \ SERVICE_HOST=$CONTROLLER_ADM_NODE \ OS_AUTH_URL=http://$CONTROLLER_ADM_NODE:5000/v2.0 \ OS_USERNAME=admin OS_PASSWORD=secrete OS_TENANT_NAME=demo \ /usr/demo/openstack/keystone/heat-keystone-setup 3. Configure Heat by either uncommenting or setting the parameters in these configuration files: • /etc/heat/heat.conf [database] connection = mysql://heat:heat@$CONTROLLER_ADM_NODE/heat [keystone_authtoken] auth_uri = http://$CONTROLLER_ADM_NODE:5000/v2.0 identity_uri = http://$CONTROLLER_ADM_NODE:35357 admin_tenant_name = tenant admin_user = heat admin_password = service-password • /etc/heat/api-paste.ini [filter:authtoken] auth_uri = http://$CONTROLLER_ADM_NODE:5000/v2.0/ identity_uri = http://$CONTROLLER_ADM_NODE:35357 admin_tenant_name = tenant admin_user = heat admin_password = service-password 4. Enable the heat service. controller# svcadm enable -rs heat-api heat-db heat-engine \ heat-api-cfn heat-api-cloudwatch
ESSENTIALAI-STEM
Ashok Bhushan Ashok Bhushan (born 5 July 1956) is a former judge of the Supreme Court of India and the chairperson of the National Company Law Appellate Tribunal. He was the 31st chief justice of the Kerala High Court. He is a former judge of the Kerala High Court and Allahabad High Court. Early life Ashok Bhushan was born in Jaunpur district, Uttar Pradesh on 5 July 1956 to the late Shri Chandrama Prasad Srivastava and his wife Smt. Kalavathi Srivasthava. After receiving a Bachelor of Arts in 1975 he studied law in Allahabad University and graduated in 1979. Career Bhushan started his career in advocacy by enrolling with Bar Council of Uttar Pradesh on 6 April 1979 and started practising in civil and original side at Allahabad High Court until the elevation to the bench. While practising as an advocate in Allahabad High Court, he served as the standing counsel for various institutions such as Allahabad University, State Mineral Development Corporation Limited and several municipal boards, banks and education institutions and also as the senior vice–president of the Allahabad High Court Bar Association. He was elevated as permanent judge of the Allahabad High Court on 24 April 2001 he served as chairman of the Higher Judicial Service committee and headed several other committees. He was appointed as a judge of the High Court of Kerala on 10 July 2014, has taken charge as Acting Chief Justice on 1 August 2014 and as chief justice on 26 March 2015. He was appointed as a judge of the Supreme Court of India on 13 May 2016. On the farewell speech organised by the Supreme Court Bar Association, Ashok said “Grant of appropriate remedy is not the discretion of the judge but his obligation. Justice must be tempered with mercy but justice cannot be substituted for mercy.” He retired on 4 July 2021. On 8 November 2021, he took the oath as the chairperson of National Company Law Appellate Tribunal.
WIKI
Web SDK in an iFrame I’ve seen a fair few topics about using the Web SDK via an iFrame although they’re all relatively old. Why isn’t it recommended? iFrame would be on the same domain and hosted via SSL, the only reason for the iFrame is to allow for custom styling of the page (rather than having the Zoom app take up the whole page). Any tips or suggestions appreciated. Hi @nicklx, The reason iFrames are not recommended is because they have different behaviours from browser to browser, and certain functionality will not work correctly if the frame itself is not set up with the relevant allowfullscreen etc permissions. You also need to make sure that the frame contents is based on the same domain, otherwise you’ll run into CORS errors. Also, Zoom are actively working on a way of editing the Web SDK UI, along with the Web Video SDK which is more powerful and customisable than the current implementation. Personally, we use Zoom embedded within an iFrame in our production environment and haven’t seen any issues with functionality, however you will need zome custom CSS to get it to render correctly in the browser, since it’s designed to be used in the entire window. If you do choose to use it in an iFrame, let me know if you have any issues as i have most likely come across them before! Thanks, Alex Cheers for the information @alexmayo. Just out of interest, what styling did you have to do? My assumption is that the SDK doesn’t know it’s in an iFrame, so it fills the size of the iFrame, and I just adjust the size of the iFrame to control the size of the Zoom window? From my testing this appears to work without any issues? Haven’t seen any issues as of yet through my testing, but stil working through the various features and browsers. We’ll be providing a link to join via the Zoom app either way, so if there’s any problems users can still access the meeting. So once you go below a certain width and height, some of the UI gets obscured. For example, the ‘join audio’ button will disappear off the screen if it’s too small. Some simple transform CSS will allow you to shrink the UI, though. Thank you for your input here @alexmayo! Let me know if you have any questions @nicklx. Max 1 Like
ESSENTIALAI-STEM
User:T1Coreon/sandbox Flex Tape! The super-strong waterproof tape that can instantly patch, bond, seal, and repair! Flex Tape is no ordinary tape. It's triple thick adhesive virtually welds itself to surfaces, instantly stopping the toughest leaks. Leaky pipes can cause MAJOR damage, but flex tape grips on tight and bonds instantly. PLUS, Flex Tape's powerful adhesive is so strong, it even works underwater! Now you can repair leaks in pools and spas without draining them. Flex Tape is perfect for marine, campers, and RVs. Flex Tape is super strong and once it's on, it holds on tight. And for an emergency auto repair, Flex Tape keeps its grip even in the toughest conditions. Big storms can cause big damage, but Flex Tape comes super wide so you can easily fix large holes. To show you the power of Flex Tape, I SAWED THIS BOAT IN HALF and repaired it with only Flex Tape. Not only does Flex Tape's powerful adhesive hold the boat together, but it creates a super-strong, water-tight seal so the inside is completely dry. YEE DOGGIE! Just cut, peel, stick and seal. Imagine everything you can do with the power of Flex Tape!
WIKI
Commits Steve Borho committed e57b97c patchctx: ignore invalid dates in path files (fixes #1361) Comments (0) Files changed (1) tortoisehg/util/patchctx.py import binascii import cStringIO -from mercurial import patch, util +from mercurial import patch, util, error from mercurial import node from mercurial.util import propertycache from hgext import mq, record if ph.message: ph.diffstartline += 1 self._user = ph.user or '' - self._date = ph.date and util.parsedate(ph.date) or util.makedate() self._desc = ph.message and '\n'.join(ph.message).strip() or '' + try: + self._date = ph.date and util.parsedate(ph.date) or util.makedate() + except error.Abort: + self._date = util.makedate() def invalidate(self): # ensure the patch contents are re-read
ESSENTIALAI-STEM
Tuning an HF Antenna with an Airspy, SWR-Bridge and Noise Source Over on his blog Anders J. Ørts has created a good writeup showing how he used the combination of an Airspy SDR with SpyVerter upconverter, SWR-Bridge and a noise source to tune his HF dipole for the 40 meter and 20 meter bands. If you’re interested we also have a writeup on doing something similar with the RTL-SDR here. By connecting the output of the noise source to the SWR-bridge input, and the antenna to the DUT port the return loss or SWR of the antenna can be measured with the Airspy. To get a wider than 10 MHz view of the spectrum Anders uses the SpectrumSpy software for the Airspy which is a spectrum analyzer application that allows you to view any bandwidth that you like. With the Airspy, noise source and antenna all connected correct to the SWR-Bridge significantly notches in the spectrum show up in SpectrumSpy. These notches are the resonant points of the antenna. Visually seeing these notches allows you to fine tune the length of the antenna elements for best SWR. How to connect it all up How to connect it all up SpectrumSpy showing the resonant notches at 40m and 20m. SpectrumSpy showing the resonant notches at 40m and 20m. 2 comments 1. Dave H I’ll bet you could use an old Palomar Engineering noise bridge for this. It has the noise source and SWR bridge in one package; you’d just connect the antenna to the antenna port on the bridge and the Spyverter + SDR to the receiver port. Set the controls to 50 ohms resistive and 0 ohms reactive and start tuning. In fact, if you’re working with a different impedance (say, 75 ohms) you could set the resistive control to that and still get good readings. Post a comment You may use the following HTML: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <s> <strike> <strong>
ESSENTIALAI-STEM
What Is a Capacitive Voltage Divider? A voltage divider is a type of passive linear circuit generating an output voltage that is a fraction of the input voltage. It’s possible to create these circuits using fixed-value resistors or reactive components.  The Stangenes offering of capacitive voltage dividers are specially created for diagnostic and monitoring applications, also commonly referred to as voltage monitors. These components can take a multi-kilovolt signal and output a low voltage signal that can be read on oscilloscopes and other monitoring devices.    Introduction to Capacitive Voltage Dividers When deciding whether to use a capacitive voltage divider, understanding how it works can help. Typically, when two interlinked circuit elements form a series, the input voltage divides through the elements. When circuit elements are interlinked but parallel, the electrical current will also normally split through the components. As a result, series circuits operate under the voltage divider rule while parallel circuits operate under the current divider rule. Also called the potential divider rule, the voltage divider rule is crucial for analyzing circuits by helping calculate each element’s individual voltage.  The elements of the circuit will dictate the category of the voltage divider rule, particularly these three categories: • Capacitive voltage divider • Resistive voltage divider • Inductive voltage divider   How Does a Capacitive Voltage Divider Work? These devices work by connecting two capacitors in a series with a resistor. One capacitor receives the input voltage, while the other is grounded. You can modify the voltage ratio between both capacitors by changing their resistance values. The electrical current travels through the divider via the resistors, forming an electrical field in the process. This field influences each capacitor’s charge and thus alters their respective voltages. The benefit of this operation is the ability to precisely control circuit voltage levels without any physical adjustment to the circuit elements.   Advantages and Disadvantages of a Capacitive Voltage Divider Capacitive voltage dividers offer several key benefits and disadvantages. Some of the advantages of these devices include: • Reduced resistance — Compared to resistors, capacitive voltage dividers have less resistance, meaning less dissipation of waste energy as heat. • Optimized accuracy and precision — Using a series of capacitors offers superior accuracy and precision compared to resistors and other dividers. • Low power consumption — Voltage divider capacitors need minimal power to function, which is why they’re ideal for low-voltage applications. Meanwhile, some potential downsides of using capacitive voltage dividers could include: • More expensive than other types of dividers — Lower voltage capacitive dividers can be more costly than other types of dividers. Higher voltage resistive dividers can also be expensive. • Increased complexity — To get the best results from these dividers, it’s critical to carefully calculate and design them, which can limit their use in some applications. • Sensitivity to temperature fluctuations — Ambient temperature can significantly influence the divider output, potentially leading to inaccuracies. This is why Stangenes uses temperature-compensating components to reduce this effect.   Capacitive Voltage Dividers from Stangenes Industries  Depending on your application, you may benefit from the use of a voltage divider capacitor. Stangenes Industries offers capacitive voltage dividers as well as compensated resistive voltage dividers in nearly any size or shape to meet your unique specifications. Our voltage dividers can be used for pulse voltages up to 800 kV, and we can custom-make units suitable for higher voltages.  To learn more about our offerings or get started on an order, request a quote today! Comments are closed
ESSENTIALAI-STEM
Thunder From Wikipedia, the free encyclopedia Jump to navigation Jump to search Thunder is the sound caused by lightning. Depending on the distance from and nature of the lightning, it can range from a sharp, loud crack to a long, low rumble (brontide). The sudden increase in pressure and temperature from lightning produces rapid expansion of the air surrounding and within a bolt of lightning. In turn, this expansion of air creates a sonic shock wave, similar to a sonic boom, often referred to as a "thunderclap" or "peal of thunder". Cause[edit] The cause of thunder has been the subject of centuries of speculation and scientific inquiry. The first recorded theory is attributed to the Greek philosopher Aristotle in the fourth century BC, and an early speculation was that it was caused by the collision of clouds. Subsequently, numerous other theories were proposed. By the mid-19th century, the accepted theory was that lightning produced a vacuum. In the 20th century a consensus evolved that thunder must begin with a shock wave in the air due to the sudden thermal expansion of the plasma in the lightning channel.[1] The temperature inside the lightning channel, measured by spectral analysis, varies during its 50 μs existence, rising sharply from an initial temperature of about 20,000 K to about 30,000 K, then dropping away gradually to about 10,000 K. The average is about 20,400 K (20,100 °C; 36,300 °F).[2] This heating causes a rapid outward expansion, impacting the surrounding cooler air at a speed faster than sound would otherwise travel. The resultant outward-moving pulse is a shock wave,[3] similar in principle to the shock wave formed by an explosion, or at the front of a supersonic aircraft. Experimental studies of simulated lightning have produced results largely consistent with this model, though there is continued debate about the precise physical mechanisms of the process.[4][1] Other causes have also been proposed, relying on electrodynamic effects of the massive current acting on the plasma in the bolt of lightning.[5] The shockwave in thunder is sufficient to cause injury, such as internal contusion, to individuals nearby.[6] Inversion thunder results when lightning strikes between cloud and ground occur during a temperature inversion. In such an inversion, the air near the ground is cooler than the higher air. The sound energy is prevented from dispersing vertically as it would in a non-inversion and is thus concentrated in the near-ground layer. Inversions often occur when warm moist air passes above a cold front; the resulting thunder sound is significantly louder than it would be if heard at the same distance in a non-inversion condition.[7] Thunder is the sound produced by lightning. Etymology[edit] The d in Modern English thunder (from earlier Old English þunor) is epenthetic, and is now found as well in Modern Dutch donder (cp Middle Dutch donre, and Old Norse þorr, Old Frisian þuner, Old High German donar descended from Proto-Germanic *þunraz). In Latin the term was tonare "to thunder". The name of the Nordic god Thor comes from the Old Norse word for thunder.[8] The shared Proto-Indo-European root is *tón-r̥ or *tar-, also found Gaulish Taranis and Hittite Tarhunt. Distance calculation[edit] A flash of lightning, followed after some time by a rumble of thunder, illustrates the fact that sound travels significantly slower than light. Using this difference, one can estimate how far away the bolt of lightning is by timing the interval between seeing the flash and hearing thunder. The speed of sound in dry air is approximately 343 m/s or 1,127 ft/s or 768 mph (1,236 km/h) at 20 °C (68 °F).[9] This translates to approximately 3 seconds per kilometer (or 5 seconds per mile); saying "One-Mississippi... Two-Mississippi..." (or "One One-thousand... Two One-Thousand...)[10] is a useful method of counting the seconds from the perception of a given lightning flash to the perception of its thunder (which can be used to gauge the proximity of lightning for the sake of safety).[11] The speed of light is high enough that it can be taken as infinite in this calculation because of the relatively small distance involved. Therefore, the lightning is approximately one kilometer distant for every three seconds that elapse between the visible flash and the first sound of thunder (or one mile for every five seconds). In the same five seconds, the light could have traveled the Lunar distance four times. (In this calculation, the initial shock wave, which travels at a rate faster than the speed of sound, but only extends outward for the first 30 feet (9 m), is ignored.)[12] Thunder is seldom heard at distances over 20 kilometers (12 mi).[13] A very bright flash of lightning and an almost simultaneous sharp "crack" of thunder, a thundercrack, therefore indicates that the lightning strike was very near. Very close thunder cracks See also[edit] References[edit] 1. ^ a b Rakov, Vladimir A.; Uman, Martin A. (2007). Lightning: Physics and Effects. Cambridge, England: Cambridge University Press. p. 378. ISBN 978-0-521-03541-5. 2. ^ Cooray, Vernon (2003). The lightning flash. London: Institution of Electrical Engineers. pp. 163–164. ISBN 978-0-85296-780-5. 3. ^ "Thunder". Encyclopædia Britannica. Archived from the original on 2008-06-07. Retrieved 2008-09-12. 4. ^ MacGorman, Donald R.; Rust, W. David (1998). The Electrical Nature of Storms. Oxford University Press. pp. 102–104. ISBN 978-0195073379. Archived from the original on 2014-06-28. Retrieved 2012-09-06. 5. ^ P Graneau (1989). "The cause of thunder". J. Phys. D: Appl. Phys. 22 (8): 1083–1094. Bibcode:1989JPhD...22.1083G. doi:10.1088/0022-3727/22/8/012. 6. ^ Fish, Raymond M (2004). "Thermal and mechanical shock wave injury". In Nabours, Robert E (ed.). Electrical injuries: engineering, medical, and legal aspects. Tucson, AZ: Lawyers & Judges Publishing. p. 220. ISBN 978-1-930056-71-8. 7. ^ Dean A. Pollet and Micheal M. Kordich, User's guide for the Sound Intensity Prediction System (SIPS) as installed at the Naval Explosive Ordnance Disposal Technology Division (Naveodtechdiv) Archived 2013-04-08 at the Wayback Machine. Systems Department February 2000. dtic.mil 8. ^ "thunder". Oxford English Dictionary (2 ed.). Oxford, England: Oxford University Press. 1989. 9. ^ Handbook of Chemistry and Physics, 72nd edition, special student edition. Boca Raton: The Chemical Rubber Co. 1991. p. 14.36. ISBN 978-0-8493-0486-6. 10. ^ Tulga, Phil. "Thunderstorm Stopwatch". Music Through the Curriculum. Retrieved 2018-05-28. 11. ^ "Web Weather for Kids". Web Weather for Kids. 12. ^ "The Science of Thunder - National Lightning Safety Institute". Archived from the original on 2007-10-15. 13. ^ Editors, The (1998-07-20). "Shinshoku". Encyclopedia Britannica. Retrieved 2017-01-01. External links[edit] • Media related to Thunder at Wikimedia Commons
ESSENTIALAI-STEM
Dominique Collon Dominique Petronella Margaret Collon, (born 18 May 1940) is a Belgian-born academic, author, archaeologist and former curator at the British Museum in London who has worked and travelled extensively in the Near East in Syria, Turkey and Iraq. She is an authority on cylinder seals. Collon was born in Belgium in 1940, the daughter of Petronella and Alexandre Collon. In 1962 she was a student at the Institute of Archaeology in Oxford where she was studying for the Postgraduate Diploma in Western Asiatic Archaeology. As an archaeologist Collon excavated in Turkey under her uncle who was the Director of the British Institute at Ankara; in Kültepe with Tahsin Özgüç in 1964; and with Seton Lloyd and Charles A. Burney at Kayalıdere, Muş in 1965. She took her PhD at Columbia University in 1971 with her thesis on The Seal Impressions of Tell Atchana/Alalakh and which was published in 1975. From 1973 to 1976, Collon was in Tunis where she excavated the mosaics of Utica and other sites and prepared the reports for publication. On her return to the United Kingdom she specialised in the study of the iconography displayed on ancient Mesopotamian and Anatolian cylinder seals. Dr Collon was with the Department of Western Asiatic Antiquities (later Ancient Near East and later still Middle East) at the British Museum from 1964 to 1968, and again from 1977 to 1988; she gained a full-time position at the Museum as curator of Western Asiatic Antiquities from 1988 until her retirement in 2005; her retirement was marked by a symposium held at Magdalen College, Oxford in June 2005. From 1979 to 2010 she was the co-editor of Iraq, the journal of the British Institute for the Study of Iraq, while from 1985 to 1989 she edited the Ancient Near East section of the Grove Dictionary of Art. Collon is a Fellow of the Society of Antiquaries of London and a corresponding member of the Deutsches Archäologisches Institut. Publications * (With others) Sondages au flanc sud du Tell de Qala'at el-Mudiq: néolithique, chalcolithique, bronze ancien, Centre belge de recherches archéologiques à Apamée de Syrie (Brussels, Belgium), 1975. * The Seal Impressions from Tell Atchana/Alalakh, Butzon & Bercker (Kevelaer, Germany), 1975. * Catalogue of the Western Asiatic Seals in the British Museum: Cylinders Seals II, Akkadian-Post Akkadian-Ur III Periods, British Museum Publications (London, England), 1982. * The Alalakh Cylinder Seals, British Archeological Reports (London, England), 1982. * Catalogue of the Western Asiatic Seals in the British Museum: Cylinder Seals III, Isin/Larsa and Old Babylonian Periods, British Museum Publications (London, England), 1986. * First Impressions: Cylinder Seals in the Ancient Near East, British Museum Press (London, England), 1987, University of Chicago Press (Chicago, IL), 1988, revised edition, British Museum Press (London, England), 2005. * Near Eastern Seals, University of California Press (Berkeley, CA), 1990. * Ancient Near Eastern Art, University of California Press (Berkeley, CA), 1995. * (Editor and contributor) 7,000 Years of Seals, British Museum Press (London, England), 1997. * Catalogue of the Western Asiatic Seals in the British Museum: Cylinder Seals IV, Neo-Assyrian and Neo-Babylonian Periods, British Museum Press (London, England), 2001. Collon has also contributed to books by others, including Art and Empire: Treasures from Assyria in the British Museum, Harry N. Abrams (New York, NY), 1995; to reference books; and shorter publications. She was the co-editor of the academic journal Iraq (1979—2010).
WIKI
5 falsos mitos sobre la ansiedad Blog 5 false myths about anxiety by Baia Food on Apr 19, 2024 Tabla de contenidos Anxiety is a natural and normal response of the body to situations of stress, danger or uncertainty. However, when anxiety becomes excessive , persistent, and disproportionate to the situation, it can interfere with daily life. * It is important to treat chronic anxiety with a specialist who can follow up. This blog attempts to help improve decisions, but it is not a solution to the problem. * Myth 1: Anxiety is bad This is a very widespread myth. Anxiety, like other emotions, is a natural response of the body. It is neither good nor bad, it has an evolutionary function . Anxiety is a mechanism that makes our body alert to a possible threat. For example, if you encountered an unknown tribe, it activated your physiological mechanisms to give you an advantage when fleeing or confronting the enemy. The thing is that the world today is nothing like the world in which we evolved. Today, we perceive situations in which our lives are not in danger as threats. For example, arriving late to work can put us on alert. This is normal, as long as it doesn't cause excessive worry leading to thoughts like "I'm going to get fired and I'm not going to find another job." Our body's reaction is disproportionate to what is really happening. It's not nice to confront your boss if you're late, but it's not a life or death situation. However, you have activated all the physiological mechanisms as if it were. Which brings us to myth number 2. Myth 2: We cannot modify its intensity or expression Even though it is activated involuntarily, we can apply certain tools and strategies that help us manage its intensity or when it appears. The first thing is to accept that it is there , thank it for "coming" to warn us of the possible danger and not classify it as "bad." The second thing is to change our thinking pattern . Yes, thoughts are very powerful and if we constantly think things like "I won't have time today" or "I never do it well", you will activate those mechanisms. We cannot control every thought, but we can try to redirect them when we realize it, thinking "I am doing the best I know, this is an opportunity to learn." Finally, it is proven that "forcing" a change in our body posture affects how we feel. If you feel distrustful or worried excessively, adopt expansion postures, with your arms and shoulders open, and smile. Your body associates these postures with positive moments of relaxation and confidence. Myth 3: Bad habits, tobacco and alcohol do not influence anxiety Nowadays we all know the harmful effects of alcohol and tobacco , but we often resort to them when we find ourselves in a loop of stress and negative thoughts. Although it is true that in the short term they give us a feeling of pleasure or sedation, when their effects wear off, the discomfort returns and probably in a stronger form , generating more anxiety in the long term. In fact, quitting smoking relieves stress and reduces symptoms of depression (1). In addition, they also damage our body. The first step is to become aware that these substances only give us immediate pleasure and look for a strategy that has a real impact on our well-being. Breathe, be aware of what you feel, accept it, try to understand what that fear, that worry, is telling you. Try to generate positive thoughts or thoughts that relativize your anxiety. Myth 4: Anxiety is only a mental problem Did you know that a poor diet, lack of sleep or lack of movement can contribute to your anxiety? We are a whole: how your body is affects your mind and how your mind is affects your body. It may be that certain habits are negatively contributing to your anxiety, and you're not even aware of it. It is not necessary to take drastic measures, but rather go little by little . The amount of information about health can lead us to worry excessively and end up doing nothing. Therefore, focus on the 20% of actions that give you 80% of the results, on what is really important: reduce processed and toxic foods and progressively incorporate fresh and natural foods. Make sure you spend enough time sleeping so your body can rest and repair itself. Move, in the way you like best. You can go for a walk with a podcast, play sports with friends, jump rope, ride a bike... (2). In fact, any small healthy habit you incorporate will have a very positive effect! Myth 5: Natural supplementation does not help with anxiety If anxiety is part of your daily life, the first thing is to incorporate habits that help you manage it (as we have been discussing throughout the blog) and use certain tools. Supplementation is one of those tools that can give you that last push. There are natural supplements , such as ashwagandha and other adaptogens, that can help manage symptoms of anxiety and stress. Adaptogens are a group of plants, herbs and fungi that grow in hostile environments, enduring great adversity. Thanks to this, they develop chemical compounds, which can be of great help when we consume them. They improve tolerance to any type of stressor (physical, chemical or biological) and promote a state of balance (if the body is very activated, it calms it and if it is very calm, it stimulates it). The word "adaptogen" refers to its ability to help the body adapt. Plus, they are safe for the body. It does not produce negative or harmful effects and has no side effects. In short, each person is a world. There are situations like taking a plane that can generate anxiety for many people while not for others. That is why it is important not to compare yourself and understand that each body perceives different threats. Professional help is always a great help to understand this great emotion and teach us tools to manage it. 1. https://www.guadalsalus.com/blog/relacion-entre-alcohol-y-ansiedad 2. https://www.mayoclinic.org/es/healthy-lifestyle/stress-management/in-depth/exercise-and-stress/art-20044469#:~:text=The%20ejercicio%20regular%20may%20increase ,%20depression%C3%B3n%20and%20%20anxiety
ESSENTIALAI-STEM
-- S. Korea Minister Cancels Japan Trip After Aso Shrine Visit South Korean Foreign Minister Yun Byung Se canceled a trip to Tokyo after Japanese Finance Minister Taro Aso and other Cabinet members visited a shrine seen in Asia as a symbol of wartime aggression. Yun canceled a meeting with counterpart Fumio Kishida, said a South Korean Foreign Ministry official who asked not to be named in line with ministry policy. While the official declined to give dates for the trip or a reason for the cancellation, the ministry released a statement expressing “deep concerns and regret” for the visits to Yasukuni Shrine over the weekend. China also lodged a diplomatic protest. The visits, timed with the shrine’s spring festival, were the first by members of Prime Minister Shinzo Abe’s government since his Liberal Democratic Party regained power in December. While Abe didn’t go to the shrine, he did send an offering, a gesture that harkens back to Japan ’s spirit of militarism, a Chinese newspaper said today in a commentary. Yun’s cancellation could impede efforts by Japan and South Korea to coordinate a response to threats by North Korea, which has warned of attacks in the region as it expands its nuclear weapons program. Japan is also mired in territorial disputes with South Korea and China even as it seeks to accelerate talks on a trilateral free trade agreement. ‘Private’ Visit Japanese Chief Cabinet Secretary Yoshihide Suga said no meeting between Yun and Kishida had been finalized. He said the visits by three Cabinet members to Yasukuni, as well as Abe’s donation, were made as “private citizens.” Aso’s visit yesterday was preceded by similar trips by Keiji Furuya, the minister in charge of the issue of Japanese citizens kidnapped by North Korea , and Internal Affairs Minister Yoshitaka Shindo. The fact that Abe only sent an offering rather than visit the shrine doesn’t change the nature of his act, and Japan has no future if it insists going down the wrong road, according to the commentary published today in the People’s Daily newspaper, published by China’s ruling Communist Party. The Yasukuni Shrine commemorates Japan’s war dead, including World War II leaders convicted by an international tribunal of war crimes . The Tokyo shrine is viewed in China and Korea as a symbol of military atrocities during Japan’s occupation of Asia in the first half of the 20th century. “Japan must face up to its past,” Chinese Foreign Ministry spokeswoman Hua Chunying told reporters in Beijing, saying the government filed a formal protest. To contact the reporters on this story: Sangwon Yoon in Seoul at syoon32@bloomberg.net ; Takashi Hirokawa in Tokyo at thirokawa@bloomberg.net To contact the editor responsible for this story: Rosalind Mathieson at rmathieson3@bloomberg.net
NEWS-MULTISOURCE
Page:United States Statutes at Large Volume 38 Part 1.djvu/1450 ociv INDEX. Porto R12:o—Contjnued. _ P¤8¢· Post Office Department-Continued. Pageleaves of absence allowed Agricultural appropriation for Director postal savings Department employees in. 441 tem, assistants, clerks, etc 495, 1037 may construct two bridges across Arecibo for gydurth Assistant Postmaster Gen- _ River. . ., -_ I .. 309 eral, clerks, etc. 495, 1037 opium, etc., special tax provisions m. 787 for superintendent division of rural Porto Rwq Regiment of Infantry, mails, etc. 495, 1037 appropgrggon for pay of officers; lo?-3159 1070 for sggerintttgendent division of dead le:-95 1 7 -·-····-·-·-·.--·-·_·, ,.9 ··--· ·---·.--- ·· -- -- for pay ptyenlisted men; longevity. . 359, 1070 for superintendent division of supplies, ’ mptams to be recommimioned as mp- etc ,.,,,. _.,,,,..,.. . . 496, 1037 tains United States Infantry. - . . 1070 for superintendent division of equipstatus; credit for former service, etc. ,, 1070 ment ,,,,,. ..,,,,,, ,...,, 1037 P for cage cg mgane soldiers. ...,,. 368, 1081 for contingent expenses. 496, 1038 ortwj _,. . _ _ for rent 496 1038 prelunitgsgy exainmation, etc., of harbor, 1055 for Oflkiial Postal Guide ,496; 1038 e mad_ e. -. posts service a propriations not to e, P<>f¢·wwu¢Z•, Qhw, _ _ _ for the lgepartrnent 496, 1038 appropnstwn for public building. . . . 13 for Solicitor for-the. 497, 1038 Pvftwnvvih, Ve., Sm ¢g]'8Z'mp¤¤(¤¤¢, for postal service --. . - . 295 payment of Co1u·t of ims nndmgs to 993 for printing and binding for ... 69, 672, 881 P0"W!I“l» _ _ _, dedciency appropriation for postal service 222, appropriation for mmister to . .. 442, 1116 324, 573, 578, 796, 1150 1158, 1161 · OT s¢¢1‘¢¤¤’§ of les¤¤<>¤ ·-·-..-·---· 443 for fitting up, etc., new post office, Wash- Poeey, Thomas ., _ _ _ rngton, D. C._; removal of divisions, paymergt of Court of CISHDS Endings to heir etc, from mgm building ,,_,,.. 324 0 ..-.- . .--.·..-.·.·... 971 for contingent expenses ..--·-.-.<PHONE_NUMBER> P°’t‘C“"d Alb“”'··’» for judgments, Court of Claims under. ’ 57 6; 1154 du? ¤¤ ·--- - --»-.--·-··---· 146 forprintingsnd binding, -·-·-- - - · - 1154 Piifu gil, 146 acceptance of beqlpest gg . F. Maoilpnald- 222 PM E¤¤d¤q**4z¢¤» M¢h¢¢¤?l» _ , pm ope; pspm-imma Buiwtg , Old (ses also 8PP¤>P¤l’l:;Pc*g¤ gr °°m*·'“°**°¤, m*'¤*§4’ 1076, General Land Office uildiug), P chen, i£·2»¥nié$r%iéf¤ir%=` bins--- 1976 “P}Z,§°,§’§.‘?S{Z,’Zé‘{£ £’$Z’€Z}r’°p“"“ °°‘``°``` ii °” °°. F' mis r pm`ring 1 b· "£`.`fZZZ[ZZf§QZ 44 ,,:gi;;;_ggg,g¤¤ f<>=- J ··-··---~ 3°° :3; ;°mp1¤y¤é¤i°el1.iI; o]ii%t$.i 488 ·P¤~P*9*i¤¤ fe Prem G·m*· P‘;’,€,?-£?‘,§‘,£t’;‘“éZ,'§· cn.- cet, tt in ,0--?.§*-2'§a§f°e;nse,;;;ze:::::::: it? ,0, P,·»¤ggg;¤»¤emn¤¤¤--f -·-- ii 494,1% er chref inspector etc ., 1036 · Q ``‘ '`'`’'' · for purchasing agent, clerks, etc .. 494: 1036 fm' P°1`. d1°m» “u°“·”°°° whm t°mP°' for attorneys, clerks, etc., Solicitors may “b°°“t mln} h°m°= °t° ··-~·-·· 295 division _______________________ 494_ 1036 for clerks, etc., division headquarters. . . 295 for care of new city post ofice, Washing- f°' *:”“'°l"'lg °*p°°°°°* °t° ‘‘‘‘‘‘‘°‘‘‘‘‘ 295 mn,D-C"--"._•_____·__•____ 494,1036 i0TllV€YYh1Y9--_·-_·;·--~··· ---··-· · -··- · 296 for sirstkssesmt Postmaster Generatlsh 10 gg; ;;=r¤¤¤¤¤h3£gv¤¤¤¤ hedqsems ---·· gg c er, etc .. . .. 36 · ’· `` 7 `` for superintendent, salaries, and :1110:6, 1036 de§?;i°::gly¤:§;;fo;Tr?;“t{;l02;1¥§;€é;é&·;···&· 296 ances, etc. . 4, ‘ for superintendent of appointments, etc. auowaggcndfsg B ····· égé · 323* 1159 for superintendent city delivery, etc. 495, 1036 duty ·--·-•--·-·--· ··-· ······--- 301 for Second Assistant Postmaster Gen- Post Ojiccy, _ eral, clerks, etc. 495, 1036 appropriation for postmzsters .. , . . 296 for superintendent railway adjustmentgé l1H S§lGS of stamps, tgtc., not in} etc ...,. 5, 1036 c u in gross receip as o for superintendent foreign mails, etc. 495, 1037 pay. .-...-... 296 for superintendent miscellaneous trans- for assistant postmnsters, iirst and second portation. , 495,1037 class offices. . 296 for General Superintendent Railway for clerks, etc., first and second class of- Mail Service, etc ... . 495, 1037 Bees. _ 296 for Third Amistant Postxnaster General, promotions provided for .. - .. 298 clerks, etc ... : .. 495, 1037 for mechanics. watchmen, etc .. 298 for superintendent division of stampgég) 103 got clogs in chargipf contract stations. . 298 etc . , 7 or su mute c er etc . . . 298 for superintendent diyision of finance 495, 1037 I for temporary and atixiliary clerks .. 298 for supermtendent division of classifies- I for seggsting mails, third and fourth tion, etc , .. 495, 1037 , c offices .._.,.,,,,, , ,,,,,,, 298 for superintendent division of registered for unusual conditions- - . . .._,. 298 malls, etc ,,, ,.,: .. 495, 1037 for clenqalpervices, third class offices; for suxsenntendent division of money restrictions ... 298 0 ers, etc ... . . 495, 1037 allowance for existant post;mastem_ _ , 299 * - ····· ; ··--·· · -···•·· · ·--······ C0mm`1¤Bl0¤ Nil? Uni to eillen OT Imonzee list, foreign government stamped- . 162 pmvement of money o ers service- 222.
WIKI
STATES MARINE LINES, INC., Appellant, v. George P. SHULTZ, Secretary of the Treasury, et al., Appellees. No. 73-2065. United States Court of Appeals, Fourth Circuit. Argued Dec. 6, 1973. Decided June 14, 1974. Gordon D. Schreck, Charleston, S. C. (Buist, Moore, Smythe & McGee, Charleston, S. C., on brief), for appellant. Ronald A. Hightower, Asst. U. S. Atty. (John K. Grisso, U. S. Atty., on brief), for appellees. Before HAYNSWORTH, Chief Judge, WINTER, Circuit Judge, and TURK District Judge. Sitting by designation. TURK, District Judge. This case concerns the amenability to suit of certain federal officers allegedly responsible for consequential damages resulting from the seizure of plaintiff’s property. The District Court concluded that the action could not be maintained because it is in substance an action against the United States and thus barred by its sovereign immunity. We vacate the dismissal order and remand the case for further proceedings. I The facts as set forth in plaintiff’s complaint and not here disputed by defendants are as follows: The freighter SS Mani which had been chartered by the plaintiff, States Marine Lines, Inc., arrived at the Port of Charleston, South Carolina on September 7, 1971, with a cargo of general merchandise from far eastern ports destined for discharge at various ports along the East Coast of the United States. Shortly after its arrival, agents of the Bureau of Customs entered the vessel and seized a portion of her cargo without permission of the Master or States Marine. This confiscated cargo, which was subsequently appraised as having a domestic value of $39,619.45, was removed to the United States Customs House at Charleston. Despite plaintiff’s protests that the seizure was wrongful and its offer to post security to obtain release of its cargo, the District Director of Customs refused to surrender it. On September 20, 1971, government officers issued a notice to the Master of the SS Mani that certain of the seized items valued at $29,821.20 were being held subject to forfeiture for alleged violations of certain statutes of the United States and that those persons having an interest in the cargo should make application for return of the cargo and for remission or mitigation of the penalties levied. Accordingly, on November 11, 1971, after further efforts to negotiate release of the cargo had failed, a petition requesting remission or mitigation of the penalty and forfeiture was filed with the defendant Secretary of the Treasury stating that there had been no violation of the customs laws. Although the government officers knew or should have known that the seizure of the cargo was causing damage to plaintiff, no action was forthcoming on this petition despite repeated requests both verbally and in writing that action be taken. On February 17, 1972, an additional notice was issued by the District Director of Customs that other cargo seized from the SS Mani, valued at $9,798.25, was also being held subject to forfeiture. On April 12, 1972, plaintiff filed an amended petition for remission or mitigation indicating that there was no basis for the seizure of the cargo and further indicating that the continued detention of the cargo was causing irreparable damage to those persons having an interest in it. The government officers failed to take action on this amended petition or to initiate forfeiture proceedings, despite continued requests both verbal and written that action be taken or that some arrangement be made for release of the cargo upon posting security during the pendency of the proceedings. The only explanation offered to plaintiff for the delay in acting on its petition was that of delay in the bureaucratic process or government “red tape.” Finally, on December 5, 1972, plaintiff forwarded a telegram to the Bureau of Customs in Washington, D. C., stating that if its petition were not acted upon by December 8th legal action would be taken. The telegram resulted in verbal assurances that some decision would be made, yet no decision was forthcoming. Meanwhile, plaintiff was forced to pay claims for nondelivery of the cargo which had been filed by the importers and ultimate purchasers of the seized merchandise. On January 19, 1973, States Marine took the legal action it had threatened by filing suit in U. S. District Court. It asked the court to order the defendants to institute forfeiture proceedings or in the alternative to restore the cargo to it. Additionally, incidental and consequential damages of $50,000 were alleged to have been suffered as a result of defendant’s conduct. In February, 1973, after the District Court Judge had issued an order to show cause why the defendants should not be ordered immediately to institute forfeiture proceedings or restore the cargo to States Marine, the Bureau of Customs rendered its decision that there had been no violation of law which would justify forfeiture and that the forfeiture of the cargo and associated penalties should be remitted and the cargo released. Thereafter, the District Court Judge granted the defendants’ motion to dismiss on the ground that the suit was in substance against the United States and as such was barred by the doctrine of sovereign immunity. II There is no doubt that if this suit is in essence against the United States, then it is specifically prohibited as an exception to the waiver of sovereign immunity in the Federal Tort Claims Act. Title 28 U.S.C. § 2680 lists the exceptions to the waiver of sovereign immunity contained in Title 28 U.S.C. § 1346(b) including the following: “(a) Any claim based upon an act or omission of an employee of the Government, exercising due care, in the execution of a statute or regulation, whether or not such statute or regulation be valid, or based upon the exercise or performance or the failure to exercise or perform a discretionary function or duty on the part of a federal agency or an employee of the Government, whether or not the discretion involved be abused. “(c) Any claim arising in respect of the assessment or collection of any tax or customs duty, or the detention of any goods or merchandise by any officer of customs or excise or any other law enforcement officer.” Thus the initial question is whether this suit is, in fact, against the sovereign and as such barred by the above exceptions. Of relevance to this question are two statutes bearing on the liability of customs officers. Title 28 U.S.C. § 2006 provides: “Execution shall not issue against a collector or other revenue officer on a final judgment in any proceeding against him for any of his acts, or for the recovery of any money exacted by or paid to him and subsequently paid into the Treasury, in performing his official duties, if the court certifies that: (1) probable cause existed; or (2) the officer acted under the directions of the Secretary of the Treasury or other proper government officer. When such certificate has been issued, the amount of the judgment shall be paid out of the appropriations of the Treasury.” Title 28 U.S.C. § 2465 provides: “Upon the entry of judgment for the claimant in any proceeding to condemn or forfeit property seized under any Act of Congress, such property shall be returned forthwith to the claimant or his agent; but if it appears that there was reasonable cause for the seizure, the court shall cause a proper certificate thereof to be entered and the claimant shall not, in such case, be entitled to costs, nor shall the person who made the seizure, nor the prosecutor, be liable to suit or judgment on account of such suit or prosecution.” If, as the District Court found, suits against customs officers were actually against the sovereign and barred by the exceptions in 28 U.S.C. § 2680(a) and (c) then the above statutes would be unnecessary. Yet these statutes have remained in effect and have been frequently construed and applied. E. g., Agnew v. Haymes, 141 F. 631 (4th Cir. 1905); United States v. Tito Campanula Societa Di Navigazione, 217 F.2d 751 (4th Cir. 1954) and cases cited therein. Traditionally, customs officers have been held liable in their individual capacities for tortious conduct committed in the performance of their duties, Truth Seeker Co. v. Durning, 147 F.2d 54, 56 (2nd Cir. 1945); Dioguardi v. Durning, 139 F.2d 774, 775 (2nd Cir. 1944), and the statutes quoted above were obviously for the protection of such officers. See, e. g., Gelston v. Hoyt, 16 U.S. (3 Wheat.) 246, 4 L.Ed. 381 (1818); Averill v. Smith, 84 U.S. (17 Wall.) 82, 21 L.Ed. 613 (1872); The Conqueror, 166 U.S. 110, 17 S.Ct. 510, 41 L.Ed. 937 (1897). There is no indication that the exceptions in 28 U.S.C. § 2680(a) and (c) were meant to alter the established practice of holding customs officers personally liable for the improper performance of their duties, but it rather seems probable that these exceptions merely recognized the established procedure and the long-standing protections afforded by 28 U.S.C. §§ 2006 and 2465. To construe 28 U.S.C. § 2680(a) and (c) as to afford the protection of sovereign immunity to customs officers would drain 28 U.S.C. §§ 2006 and 2465 of any purpose. This, in turn, would violate the proposition that apparently inconsistent statutes should be construed to give effect to each. Baines v. City of Danville, 337 F.2d 579, 590 (4th Cir.), cert. denied, 381 U.S. 939, 85 S.Ct. 1772, 14 L.Ed.2d 702 (1964); Fanning v. United Fruit Co., 355 F.2d 147, 149 (4th Cir. 1966); Ely v. Veelde, 451 F.2d 1130, 1134 (4th Cir. 1971). In concluding that this suit was in essence against the United States and thus barred by the doctrine of sovereign immunity, the court below relied upon the test of sovereign immunity set forth by the Supreme Court in Hawaii v. Gordon, 373 U.S. 57, 83 S.Ct. 1052, 10 L.Ed.2d 191 (1963); Dugan v. Rank, 372 U.S. 609, 83 S.Ct. 999, 10 L.Ed.2d 15 (1963); Malone v. Bowdoin, 369 U.S. 643, 82 S.Ct. 980, 8 L.Ed.2d 168 (1962); and Larson v. Domestic and Foreign Corporation, 337 U.S. 682, 69 S.Ct. 1457, 93 L.Ed. 1628 (1949). As stated in Dugan v. Rank, supra, “The general rule is that a suit is against the sovereign if ‘the judgment would expend itself on the public treasury or domain, or interfere with public administration,’ Land v. Dollar, 330 U.S. 731, 738 [67 S.Ct. 1009, 91 L.Ed. 1202 (1947), or if the effect of the judgment would be ‘to restrain the Government from acting, or to compel it to act.’ Larson v. Domestic & Foreign Corp., supra, at 704 [, 69 S.Ct. at 1468, 93 L.Ed. 1628] ; Ex parte New York, 256 U.S. 490, 502 [41 S.Ct. 588, 591, 65 L.Ed. 1057] (1921).” 372 U. S. at 620. The District Court Judge was of the opinion that if this suit were successful it would in all probability be paid by the United States. He thus concluded that it came within the above rule and was in reality against the sovereign. It is of course possible, although it is by no means a foregone conclusion, that some of the defendants could avail themselves of the provisions in 28 U.S.C. § 2006 in the event judgment were rendered against them. But even assuming that a judgment for plaintiff in this case would be paid by the sovereign, this fact does not necessarily bring the case within the above stated rule of sovereign immunity. It is clear that by its terms 28 U.S.C. § 2465, quoted supra, prevents judgments against a government officer in cases in which property is seized pursuant to an act of Congress and judgment in a subsequent forfeiture proceeding is entered for the claimant if the court certified there was reasonable cause for the seizure. In contrast, 28 U.S.C. § 2006 would apply to cases such as the instant case in which no forfeiture proceedings were instituted. See The Conqueror, 166 U.S. 110, 17 S.Ct. 510, 41 L.Ed. 937 (1897). To say that because the sovereign may have to pay a judgment rendered against certain of its officers by virtue of 28 U.S.C. § 2006, such a judgment is barred by the doctrine of sovereign immunity, is in effect to say that by agreeing to pay, the sovereign need not do so. Thus, even assuming that a judgment against one or more of the named defendants would be paid by the sovereign, in order for 28 U.S.C. §§ 2006 and 2465 to be harmonized with 28 U.S.C. § 2680(a) and (c) the latter must be construed as not affecting the long-established practice of permitting suits against customs officers in their individual capacities. Ill But aside from the effect of 28 U.S.C. § 2006, it also appears that this case comes within an exception to the doctrine of sovereign immunity. In Dugan v. Rank, supra, after stating the test of sovereign immunity quoted above, the court restated the two well-established exceptions to this test: "Those exceptions are (1) actions by officers beyond their statutory powers and (2) even though within the scope of their authority, the powers themselves or the manner in which they are exercised are constitutionally void.” 372 U.S. at 621-622. For the reasons that follow this court is of the opinion that the manner in which the defendants have exercised their statutory powers may have violated the Fifth Amendment to the Constitution. The statutory basis for the seizure of plaintiff’s cargo is found in Title 19 U. S.C. §§ 482 and 1581. Plaintiff does not contend that there was no statutory basis for the initial seizure but does contend that the subsequent detention of the cargo for some seventeen months was an unconstitutional deprivation of property without due process of law. The relevant statutory provisions governing the action to be taken following a seizure of merchandise as occurred in this case are set forth in Title 19 of the United States Code. Title 19 U.S.C. § 1602 provides: “It shall be the duty of any officer, agent or other person authorized by law to make seizures of merchandise or baggage subject to seizure for violation of the customs laws, to report every such seizure immediately to the appropriate customs officer for the district in which such violation occurred, and to turn over and deliver to such customs officer any vessel, vehicle, merchandise or baggage seized by him, and to report immediately to such customs officer every violation of the customs laws.” Title 19 U.S.C. § 1603 provides: “Whenever a seizure of merchandise for violation of the customs laws is made, or a violation of the customs laws is discovered, and legal proceedings by the United States attorney in connection with such seizure or discovery are required, it shall be the duty of the appropriate customs officer to report such seizure or violation to the United States attorney for the district in which such violation has occurred, or in which such seizure was made, and to include in such report a statement of all the facts and circumstances of the case within his knowledge, with the names of the witnesses and a citation to the statute or. statutes believed to have been violated, and on which reliance may be had for forfeiture or conviction.” Title 19 U.S.C. § 1604 provides: “It shall be the duty of every United States attorney immediately to inquire into the facts of cases reported to him by customs officers and the laws applicable thereto, and if it appears probable that any fine, penalty or forfeiture has been incurred by reason of such violation, for the recovery of which the institution of proceedings in the United States District Court is necessary, forthwith to cause the proper proceedings to be commenced and prosecuted, without delay, for the recovery of such fine, penalty, or forfeiture in such case provided, unless, upon inquiry and examination, such United States attorney decides that such proceedings cannot probably be sustained or that the ends of public justice do not require that they be instituted or prosecuted, in which ease he shall report the facts to the Secretary of the Treasury for his direction in the premises.” Title 19 U.S.C. § 1610 provides: “If the value of any vessel, vehicle, merchandise, or baggage so seized is greater than $2,500, the appropriate customs officer shall transmit a report of the case, with the names of available witnesses, to the United States attorney for the district in which the seizure was made for the institution of proper proceedings for the condemnation of such property.” It is apparent from the above statutes that following the seizure of merchandise the government officers involved are not given unfettered discretion in proceeding with the disposition of the seized merchandise. The defendants have not stated what actions were taken following the seizure in this case nor have they offered any explanation other than “red tape” for the delay incurred. On the other hand, plaintiff asserts that the following events transpired: On September 20, 1971, thirteen days after the seizure, plaintiff received notice that approximately $30,000 of the seized cargo was being held subject to forfeiture and that persons having an interest in the cargo should make application for its return or remission or mitigation of penalties; after failing in its attempt to negotiate release of the cargo, plaintiff filed a petition contending that there had been no violation of the customs laws; no action was taken on this petition despite plaintiff’s requests, and on February 17, 1972, a second notice was issued stating that cargo in addition to that specified in the initial notice was also being held subject to forfeiture; plaintiff filed an amended petition for remission or mitigation on April 12, 1972, and despite repeated requests that action be taken, nothing was done until February, 1973, after the plaintiff had begun legal proceedings and the District Court Judge had issued an order for defendants to show cause why they should not be ordered to institute forfeiture proceedings or return the seized goods. Although 19 U.S.C. § 1602 requires “immediate” action from a seizing officer in reporting such seizure to the appropriate customs officer and 19 U.S.C. § 1604 requires the United States attorney to “immediately inquire into the facts” and “forthwith” and “without delay” cause the proper proceedings to be instituted, 19 U.S.C. §§ 1603 and 1610 do not specifically direct that expeditious action be taken by customs officers in reporting seizures to the United States attorney. Thus the inordinate delay by defendants in this case was seemingly not in violation of the statutes, but plaintiff contends that the statutes, as applied to it in this case by the defendants amounted to a violation of its constitutional right secured by the Fifth Amendment not to be deprived of property without due process of law. In United States v. Thirty-Seven Photographs, 402 U.S. 363, 91 S.Ct. 1400, 28 L.Ed.2d 822 (1971) the Supreme Court considered the constitutionality of 19 U. S.C. § 1305(a) pursuant to which customs agents had seized thirty-seven allegedly obscene photographs from the claimant upon his return to the United States from Europe. Thirteen days after the seizure the United States Attorney instituted forfeiture proceedings in the District Court, and the claimant challenged the constitutionality of the forfeiture statute on the ground that 19 U.S.C. § 1305(a) did not contain time limits insuring a prompt judicial determination as to whether or not the seized materials were obscene. The court construed the statute in order to save it from constitutional attack by requiring “no more than 14 days from seizure of the goods to the institution of judicial proceedings for their forfeiture and no longer than 60 days from the filing of the action to final decision in the district court.” Id. at 373-374. Although the issue before the court was the constitutionality of 19 U.S.C. § 1305(a), the court commented by way of a footnote with respect to 19 U.S.C. §§ 1602 and 1604: “The United States urges that we find time limits in 19 U.S.C. §§ 1602 and 1604. Section 1602 provides that customs agents who seize goods must ‘report every such seizure immediately’ to the collector of the district, while § 1604 provides that, once a case has been turned over to a United States Attorney, it shall be his duty to ‘immediately inquire into the facts’ and ‘forthwith to cause the proper proceedings to be commenced and prosecuted, without delay’, if he concludes judicial proceedings are appropriate. We need not decide, however, whether §§ 1602 and 1604 can properly be applied to cure the invalidity of § 1305(a), for even if they were applicable, they would not provide adequate time limits and would not cure its invalidity. The two sections contain no specific time limits, nor do they require the collector to act promptly in referring a matter to the United States Attorney for prosecution. Another flaw is that § 1604 requires that, if the United States Attorney declines to prosecute, he must report the facts to the Secretary of the Treasury for his direction, but the Secretary is under no duty to act with speed. The final flaw is that neither section requires the District Court in which a case is commenced to come promptly to a final decision.” 402 U.S. at 368 n. 2. It is clear that the decision in United States v. Thirty-Seven Photographs may be distinguishable from the case at bar if it is read narrowly as involving primarily the court’s concern with the government's use of forfeiture statutes to impose prior restraints on First Amendment rights. Such a distinction is of doubtful validity, for although it is true that the Supreme Court has expressed a particular aversion to the prior restraint of First Amendment rights, it has in recent years been equally solicitous in ensuring that persons not be deprived of property without due process of law. See Fuentes v. Shevin, 407 U.S. 67, 92 S.Ct. 1983, 32 L.Ed.2d 556 (1972); Bell v. Burson, 402 U.S. 535, 91 S.Ct. 1586, 29 L.Ed.2d 90 (1971); Goldberg v. Kelly, 397 U.S. 254, 90 S.Ct. 1011, 25 L.Ed.2d 287 (1970); Wheeler v. Montgomery, 397 U.S. 280, 90 S.Ct. 1026, 25 L.Ed.2d 307 (1970); Sniadach v. Family Finance Corporation, 395 U.S. 337, 89 S.Ct. 1820, 23 L.Ed.2d 349 (1969). See also, Lynch v. Household Finance Corporation, 405 U.S. 538, 92 S.Ct. 113, 31 L.Ed.2d 424. (1972) in which the court stated: “Property does not have rights. People have rights. The right to enjoy property without unlawful deprivation, no less than the right to speak or the right to travel, is in truth a ‘personal’ right, whether the ‘property’ in question be a welfare check, a home or a savings account. In fact, a fundamental interdependence exists between the personal right to liberty and the personal right in property. Neither could have meaning without the other. That rights in property are basic civil Tights has long been recognized.” 405 U.S. at 552. When this court considers that the Supreme Court has interpreted the due process clause of the Fourteenth Amendment to require an evidentiary hearing by a State prior to the suspension of a driver’s license, Bell v. Burson, supra; or the termination of welfare benefits, Goldberg v. Kelly, supra; or garnishment of wages, Sniadach v. Family Finance Corporation, supra; or the repossession of goods sold under a constitutional sales contract, Fuentes v. Shevin, supra, it would be incongruous indeed if the federal government were left completely unrestrained under the identical wording of the Fifth Amendment following the seizure of goods by customs officers. Plaintiff does not contend that it was entitled to an evidentiary hearing before the cargo was seized, but merely that the defendants’ actions, or lack thereof, following the seizure amounted to a violation of its Fifth Amendment rights. In Fuentes v. Shevin, supra, Mr. Justice Stewart described certain “extra-ordinary situations” in which the court had allowed “outright seizure” without a prior hearing: “First, in each case, the seizure has been directly necessary to secure an important governmental or general public interest. Second, there has been a special need for very prompt action. Third, the State has kept strict control over its monopoly of legitimate force: The person initiating the seizure has been a government official responsible for determining under standards of a narrowly drawn statute, that it was necessary and justified in the particular instance.” 407 U.S. at 91. It is the third requirement stated above that has been violated in this case, and it is the considered opinion of this court that as in United States v. Thirty-Seven Photographs, supra, the statutes relative to the disposition of plaintiff’s seized property (19 U.S.C. §§ 1602, 1603, 1604) must be limited as to the time involved in their application if they are to pass constitutional muster. In Sarkisian v. United States, 472 F.2d 468 (10th Cir. 1973), appeal docketed, No. 73-252, August 6, 1973, the owner of goods seized by customs agents sued for release of the goods contending that the delay in commencing forfeiture proceedings violated his Fifth Amendment rights. The government had proceeded to forfeit the goods some nine months after the customs investigation had been completed and fourteen months after the initial seizure. The court considered only the time period which elapsed between the completion of the customs investigation and the filing of the forfeiture proceedings by the government. In finding this nine month delay to be an unconstitutional application of the relevant statutes (19 U.S.C. §§ 1602, 1603 and 1604) the court relied on United States v. Thirty-Seven Photographs, supra, stating “[t]he withholding of . property under the circumstances before us presents a constitutional claim of not less dignity than that arising from the dirty pictures.” 472 F.2d at 472. The court in Sarkisian then held that 19 U.S.C. § 1603 must contain time limits comparable to 19 U. S.C. §§ 1602 and 1604 which, as noted above, speak in terms of “immediately” “forthwith” and “without delay”. The court in Sarkisian also indicated, without specifically so stating, that the fourteen day time limit required by the Supreme Court in United States v. Thirty-Seven Photographs between the seizure of the allegedly obscene photographs and the institution of forfeiture proceedings under 19 U.S.C. § 1305(a) should also be required under 19 U.S.C. §§ 1603 and 1604 governing the time between the completion of the investigation by customs officers and the institution of suit by the United States Attorney in order to save the statutory scheme from constitutional attack. So construed the court found that the statute had not been complied with which in turn dictated that the claimant’s goods be released. While agreeing with the result of the court’s opinion in Sarkisian, we do not go so far as to impose the precise time limits in United States v. Thirty-Seven Photographs to this case, noting that the Supreme Court there stated: “Of course, we do not now decide that these are the only permissible time limits. We note, furthermore, that constitutionally permissible limits may vary in different contexts. . . .” 402 U.S. at 374. In the context of the First Amendment and particularly prior restraint of speech, by administrative action, the court has generally required greater precision in regulation than might be required in other constitutional contexts. See, e. g., Teitel Film Corp. v. Cusack, 390 U.S. 139, 88 S.Ct. 754, 19 L.Ed.2d 966 (1967); Freedman v. Maryland, 380 U.S. 51, 85 S.Ct. 734, 13 L.Ed.2d 649 (1964); Bantam Books, Inc. v. Sullivan, 372 U.S. 58, 83 S.Ct. 631, 9 L.Ed.2d 584 (1962). In the case before us, involving a Fifth Amendment challenge to the seizure of general merchandise, we do not consider it imperative to impose precise time limits on the administrative and judicial forfeiture process, but we do believe that 19 U.S.C. § 1603 must be construed so as to require “immediate” reporting of the seizure to the United States Attorney for the institution of forfeiture proceeding under § 1604. Of course, whether or not the requirement of “immediate” action is satisfied in any given case will depend upon factors such as the length of time necessary for an investigation by customs officers and whether delay in the proceedings is caused by the claimant. However, in the case before us the plaintiff has presented allegations considerably more egregious than those before the Tenth Circuit in Sarkisian, and accordingly, there is no question but that 19 U.S.C. §§ 1602, 1603, and 1604, insofar as they require expeditious administrative and judicial proceedings, have not been complied with. Furthermore, this failure to so comply, in the absence of explanation by defendants, amounts to a violation of plaintiff’s Fifth Amendment right not to be deprived of property without due process of law. This being the case, the doctrine of sovereign immunity is no bar to an action against defendants in their individual capacities. Dugan v. Rank, 372 U.S. 609, 621, 622, 83 S.Ct. 999, 10 L.Ed.2d 15 (1963). Having concluded that the plaintiff’s allegations assert both federal statutory and constitutional violations, jurisdiction in the District Court is readily available pursuant to 28 U.S.C. § 1331. Additionally, since this suit is against the defendants in their individual capacities and not against the sovereign, the fact that the Court of Claims has jurisdiction under 28 U.S.C. § 1491 of claims against the United States founded upon the Constitution is of no moment. IV Relying on the decision in Bivens v. Six Unknown Named Agents of Federal Bureau of Narcotics, 403 U.S. 388, 91 S.Ct. 1999, 29 L.Ed.2d 619 (1971), plaintiff contends that the court should recognize a cause of action for money damages against the customs agents allegedly responsible for violating its Fifth Amendment rights. In Bivens the court held that the Fourth Amendment right to be secure against unreasonable searches and seizures would support a federal cause of action for damages consequent upon a violation of that right. Thus the question posed is whether a cause of action should similarly be recognized for a Fifth Amendment claim. Decision of this question begins with consideration of the opinion in Bivens. The court there rejected the government’s argument that the protection of the rights secured by the Fourth Amendment should be left to state tort law with the role of the Fourth Amendment limited to that of possibly providing a defense to such actions. The court noted that such an approach would limit the protection afforded by the Fourth Amendment to cases in which the conduct of federal agents complained of was remediable under state law, which in turn would not necessarily include all conduct proscribed by the amendment. In this regard the court pointed out that the interests protected by state law and those protected by the Fourth Amendment might “be inconsistent or even hostile.” 403 U.S. at 394. In justifying its creation of a compensatory remedy for Fourth Amendment violations the court quoted from its earlier decision in Bell v. Hood, 327 U.S. 678, at 684, 66 S.Ct. 773, at 777, 90 L.Ed. 939 to the effect that “it is well settled that where legal rights have been invaded, and a federal statute provides for a general right to sue for such invasion, federal courts may use any available remedy to make good the wrong done.” The court also rejected the government’s suggestion that the availability of money damages should depend upon whether such relief was necessary to enforce the constitutional protection, stating: “The question is merely whether petitioner, if he can demonstrate an injury consequent upon the violation by federal agents of his Fourth Amendment rights, is entitled to redress his injury through a particular remedial mechanism normally available in the federal courts.” 403 U.S. at 397. With one possible exception, nothing said in Bivens would limit the application of the principles enunciated therein ta the case at bar. The single exception could be the court’s statement that “ [h] istorically damages have been regarded as the ordinary remedy for an invasion of personal interests in liberty.” 403 U.S. at 388. But subsequent to its decision in Bivens, the court has rejected, albeit in a different context, the artificial distinction between personal and property rights. Lynch v. Household Finance Corporation, 405 U.S. 538, at 552, 92 S.Ct. 113, 31 L.Ed.2d 424 (1972) (see quotation supra). In Lynch the court allowed suit in federal court under 42 U.S.C. § 1983 and its jurisdictional counterpart, 28 U.S.C. § 1343(3) for the alleged deprivation of property pursuant to state law in violation of the equal protection and due process clauses of the Fourteenth Amendment. To permit a party to sue for the alleged deprivation of his property without due process of law by persons acting under color of state law and not permit a suit for damages against a federal officer for identical acts in violation of the identical provision in the Fifth Amendment can only be justified, if at all, by the fact that Congress specifically recognized the potential liability of state officers for their allegedly unconstitutional acts in 42 U.S.C. § 1983. But, in light of the court’s decision in Bivens, the fact that Congress has not specifically recognized a cause of action for damages against federal officers is no longer an obstacle preventing federal courts from fashioning a damage remedy, where appropriate, directly from the Constitution. As Justice Harlan stated in his concurring opinion in Bivens, “Initially, I note that it would be at least anomalous to conclude that the federal judiciary — while competent to choose among the range of traditional judicial remedies to implement statutory and common law policies, and even to generate substantive rules governing primary behavior in furtherance of broadly formulated policies articulated by statute or Constitution ... is powerless to accord a damage remedy to vindicate social policies which, by virtue of their inclusion in the Constitution, are aimed predominantly at restraining the Government as an instrument of the popular will.” 403-404. Justice Harlan also stated: “[T]he Bill of Rights is particularly intended to vindicate the interests of the individual in the face of the popular will as expressed in legislative majorities; at the very least, it strikes me as no more appropriate to await express congressional authorization of traditional judicial relief with regard to these legal interests than with respect to interests protected by federal statutes.” > Assuming the truth of plaintiff’s allegations, government officers, under the cloak of federal statutory authorization vested in them, have deprived plaintiff of his property in violation of the Constitution resulting in considerable damages as a consequence. The necessity and appropriateness of judicial relief is no less compelling in this case than it was in Bivens. As in Bivens: A common law or state tort remedy may or may not afford a means of redressing this wrong, but in any case, will not be tailored specifically to cases of lawlessness pursuant to federal authority; the claim presented is obviously appropriate for money damages; and other remedies such as injunctive or relief in the nature of mandamus are no longer viable alternatives. V What we have said thus far answers defendants’ contention that the District Court did not have subject matter jurisdiction to hear this case by reason of 19 U.S.C. § 1618. For even accepting the argument that the District Court cannot entertain jurisdiction to review the decision of the Secretary of the Treasury in granting a petition for remission or mitigation, this is not the issue presented. As has been pointed out, the complaint in this case concerns the defendant’s failure to abide by 19 U.S.C. §§ 1602, 1603, 1604 and 1610 so as to have to the legality of the seizure considered by a court of law. It is true that prior to filing suit plaintiff filed two petitions for mitigation or remission, but these were never acted upon and the decision, or lack thereof, on these petitions was never an issue. In its complaint plaintiff merely asked that the court order defendants to institute forfeiture proceedings or return its goods and pay damages caused by the delay. VI A remaining issue, presented by the defendants as an alternative basis for affirming the District Court, is that the doctrine of immunity would shield them from suit. This defense was not considered by the District Court, and plaintiff has not responded to it here. In addition, the record now before us is wholly inadequate to resolve such an issue. It is, of course, possible that the doctrine of official immunity as developed in cases such as Barr v. Matteo, 360 U.S. 564, 79 S.Ct. 1335, 3 L.Ed.2d 1434 (1959); Spalding v. Vilas, 161 U.S. 483, 16 S.Ct. 631, 40 L.Ed. 780 (1896); and Norton v. McShane, 332 F.2d 855 (5th Cir. 1964), cert. denied, 380 U.S. 981, 85 S.Ct. 1345, 14 L.Ed.2d 274 (1965) will be applicable as a defense to the high ranking executive officers plaintiff has chosen to sue. But such immunity is not absolute, and its application must await further factual development of this case. In the recent case of Scheuer v. Rhodes, 416 U.S. 232, 94 S.Ct. 1683, 40 L.Ed.2d 90, 42 U.S.L.W. 4543 (U.S. Apr. 16, 1974), the Supreme Court considered the application of the defense of official immunity for executive officers in the context of damage suits brought by the personal representatives of the estates of three students killed at Kent State University in May, 1970. The named defendants, who were alleged to have deprived the students of their lives and rights in violation of the Constitution, were the then Governor of Ohio, the President of Kent State University, and the Adjutant-General and various unnamed members of the Ohio National Guard. The District Court had dismissed the complaints without requiring an answer on the basis that they were in substance and effect against the State of Ohio and as such barred by the Eleventh Amendment. The Court of Appeals affirmed on this basis and alternatively on the theory that the doctrine of absolute executive immunity barred the suits as against the named defendants. The Supreme Court rejected both bases for dismissing the suit and of particular interest to the case at bar is the court’s discussion of the doctrine of immunity. The court held that official immunity for executive officers is qualified and dependent upon the discretion and responsibility of the individual officer as viewed in relation to the act in question. The court quoted the following passage from Mr. Justice Harlan’s opinion in Barr v. Matteo, supra: “ ‘To be sure, the occasions upon which the acts of an executive department will be protected by the privilege are doubtless far broader than in the ease of an officer with less sweeping functions. But that is because the higher the post, the broader the range of responsibilities and duties, and the wider the scope of discretion it entails. It is not the title of his office but the duties with which the particular officer sought to be made to respond in damages is entrusted — the relation of the act complained of ‘to matters committed by law to his control or supervision,’ Spalding v. Vilas, supra, at 498 [16 S.Ct. 631] — which must provide the guide in delineating the scope of the rule which clothes the official acts of the executive officer with immunity from civil defamation suits.’ 360 U.S., at 573-574 [79 S.Ct. at 1340]” And the court then stated: “These considerations suggest that, in varying scope, a qualified immunity is available to officers of the executive branch of Government, the variation dependent upon the scope of discretion and responsibilities of the office and all the circumstances as they reasonably appeared at the time of the action on which liability is sought to be based. It is the existence of reasonable grounds for the belief formed at the time and in light of all the circumstances, coupled with good faith belief, that affords basis for qualified immunity of executive officers for acts performed in the course of official conduct.” 42 U.S.L.W. 4548 [94 S.Ct. 1692], Because of the absence of a factual record the court was unable to determine whether the named defendants should have been dismissed on the basis of official immunity, and the case was accordingly remanded. Although Scheuer involved a suit against state executive officers, the court’s discussion of the qualified nature of executive immunity would appear to be equally applicable to federal executive officers. But as in Scheuer, the lack of factual development in the trial court makes it impossible for this court to determine whether one or more of the named defendants should be dismissed from this suit on the basis of executive immunity. On remand of this case, the parties will have the opportunity to develop the facts showing the relationship of the defendants to the allegedly illegal detention of goods in light of the discussion in Scheuer, Plaintiff should also be afforded the opportunity to amend its complaint to add or subtract named defendants. We also note that 28 U.S.C. § 2006 and 28 U.S.C. § 2465 may be relevant to the application of the doctrine of official immunity in this case. Accordingly, for the reasqns stated, the dismissal order of the District Court is vacated and this case is remanded for further proceedings consistent with this opinion. Vacated and remanded. . The provisions now contained in 28 U.S.C. § 2465 were initially enacted in 1799 and the predecessor to 28 U.S.C. § 2006 was first enacted in 1863. The history of both statutes is discussed in Agnew v. Haymes, 141 F. 631 (4th Cir. 1905) in which this court found the two statutes not to be inconsistent. Both statutes have been reenacted several times with changes in the phraseology of both statutes last being made in 1948. . The legislative history of the Federal Tort Claims Act contains no reference to the provisions now found in 28 U.S.C. §§ 2006 and 2465 probably because suits against individual customs officers were not considered as being against the sovereign at that time. The Federal Tort Claims Act was enacted in 1947. See H.R.Rep.2245, 77th Cong., 2d Sess. 10 (1942) ; H.R.Rep.No.1287, 79th Cong. 1st Sess. 6 (1946); S S.Rep.No.1400, 79th Cong., 2d Sess. 33 (1946); Hearings on II.R. 5373 and H.R. 6463 Before the House Committee on the Judiciary, 77th Cong.2d Sess. (1942). In Nakasheff v. Continental Insurance Co., 89 F.Supp. 87 (S.D. N.Y.1950), a third-party suit against the Collector of Customs of the Port of New York, the court held that the suit was not against the United States despite the provision in 28 U.S.C. § 2680(c) and notwithstanding that the collector might be reimbursed in the event of judgment against him under 28 U.S.C. § 2006. . The District Court Judge cited 28 U.S.C. § 2006, quoted above and 19 U.S.C. § 508 which provides: “if any officer, or other person, executing or aiding or assisting in the seizure of goods, under any Act providing for or regulating the collection of duties on imports or tonnage, is sued for anything done in virtue of the powers given thereby, or by virtue of a warrant granted by any judge, or justice, pursuant to law, he may idead the general issue and give such Act and the special matter in evidence.” . As provided by the statute (28 U.S.C. § 2006), in order for the government to pay a judgment the court would first have to certify that probable cause existed or that the officer responsible for the detention acted under the directions of the Secretary of the Treasury. Whether the defendants could satisfy either of these requirements remains to be seen, but the court notes that the seized goods were listed on the ships manifest and the record contains no explanation as to why the goods were seized. During oral arguments, however, the court was told, in response to its inquiry, that a partition had been constructed in one of the holds during the voyage thus altering the compartmentalization, which may have been in violation of customs regulations. This allegedly aroused the general suspicions of customs agents since the goods were not located where the agents expected them to be. . In Baines v. City of Danville, 337 F.2d 579 (4th Cir.), cert. denied, 381 U.S. 939, 85 S.Ct. 1772, 14 L.Ed.2d 702 (1964) we stated with respect to a subsequent statute implicitly repealing an earlier statute: “Unless the later statute contains, or carries with it, strong evidence of an intention to repeal the earlier, or to carve out an exception from it, a court’s duty is to harmonize the two. We possess no legislative power of repeal. When we deal with valid statutes, our only role is to construe them.” 337 F.2d at 590-591. . Title 19 U.S.C. § 482 provides : Any of the officers or persons authorized to board or search vessels may stop, search, and examine, as well without as within their respective districts, any vehicle, beast, or person, on which or whom he or they shall suspect there is merchandise which is subject to duty, or shall have been introduced into the United States in any manner contrary to law, whether by the person in possession or charge, or by, in, or upon such vehicle or beast, or otherwise, and to search any trunk or envelope, wherever found, in which he may have a reasonable cause to suspect there is merchandise which was imported contrary to law; and if any such officer or other person so authorized shall find any merchandise on or about any such vehicle, beast, or person, or in any such trunk or envelope, which he shall have reasonable cause to believe is subject to duty, or to have been unlawfully introduced into the United States, whether by the person in possession or charge, or by, in, or upon such vehicle, beast, or otherwise, he shall seize and secure the same for trial. Title 19 U.S.C. § 1581 provides in part: (a) Any officer of the customs may at any time go on board of any vessel or vehicle at any place in the United States or within the customs waters or, as he may be authorized, within a customs-enforcement area established under sections 1701 and 1703-1711 of this title, or at any other authorized plage, without as well as within his district, and examine the manifest and other documents and papers and examine, inspect, and search the vessel or vehicle and every part thereof and any person, trunk, package, or cargo on board, and to this end may hail and stop such vessel or vehicle, and use all necessary force to compel compliance. (e) If upon the examination of any vessel or vehicle it shall appear that a breach of the laws of the United States is being or has been committed so as to render such vessel or vehicle, or the merchandise, or any part thereof, on board of, or brought into the United States by, such vessel or vehicle, liable to forfeiture or to secure any fine or penalty, the same shall be seized and any person who has engaged in such breach shall be arrested. (f) It shall be the duty of the several officers of the customs to seize and secure any vessel, vehicle, or merchandise which shall become liable to seizure, and to arrest any person who shall become liable to arrest, by virtue of any law respecting the revenue, as well without as within their respective districts, and to use all necessary force to seize or arrest the same. . Title 28 U.S.C. § 1331(a) provides : “The district courts shall have original jurisdiction of all civil actions wherein the matter in controversy exceeds the sum or value of $10,000, exclusive of interest and costs, and arises under the Constitution, laws, or treaties of the United States.” . Damage actions against federal officials for alleged violations of Fifth Amendment rights have been recognized by at least two courts in the wake of Bivens: Moore v. Koelzer, 457 F.2d 892 (3rd Cir. 1972); Butler v. United States, 365 F.Supp. 1035 (D.Hawaii 1973). . Also worthy of mention is the case of Jacobs v. United States, 290 U.S. 13, 54 S.Ct. 26, 78 L.Ed.2d 142 (1933). The Supreme Court was there faced with the question of whether in a suit under the Tucker Act claimants were entitled to interest on their damage award occasioned by the construction of a dam by the government. In holding that interest on the claim must be paid the court stated: “The suits were based on the right to recover just compensation for property taken by the United States for public use in the exercise of its power of eminent domain. The right was guaranteed by the Constitution. The fact that condemnation proceedings were not instituted and that the right was asserted in suits by the owners did not change the essential nature of the claim. The form of the remedy did not qualify the right. It rested upon the Fiftli Amendment. Statutory recognition was not necessary. Such a promise was implied because of the duty to pay imposed by the amendment. The suits were thus founded upon the Constitution of the United States.” Also of interest is the early case of Boyd v. United States, 116 U.S. 616, 6 S.Ct. 524, 29 L.Ed. 746 (1885) in which the court recognized the interrelationship between the Fourth Amendment and the self incrimination provision of the Fifth Amendment. . This statute provides: “Whenever any person interested in any vessel, vehicle, merchandise, or baggage seized under the provisions of this chapter, or who has incurred, or is alleged to have incurred, any fine or penalty thereunder, files with the Secretary of the Treasury if under the customs laws or under the navigation laws, before the sale of such vessel, vehicle, merchandise, or baggage a petition for the remission or mitigation of such fine, penalty, or forfeiture, the Secretary of the Treasury, . . . may remit or mitigate the same upon such terms and conditions as he deems reasonable and just, or order discontinuance of any prosecution relating thereto. . This is indicated by the court's quotation from Barr v. Matteo which was a libel suit against a federal executive officer, the Acting Director of the Office of Kent Stabilization. . As in Scheuer, we are confronted with the immunity question in the context of a constitutional claim. We are not here dealing with the question of absolute immunity as to a claim that has no constitutional foundation.
CASELAW
UpdateListItems Only Updates the First Record May 29, 2013 at 2:18 PM I'm running a script that enumerates the folders of a list. For each folder, I look up it's existing name in another list, return the new name from the second list and update the folder name to the new name returned. The lookups/returns are working fine. I want the folder "Title" and "BaseName" to change to the new name returned. Strangely, it succeeds completely for the first folder it attempts to update. However, subsequent folders only change their "Title" while the "BaseName" remains unchanged. I have tried several different methods and keep getting the same results. The returned XML for each UpdateListItem operation doesn't indicate any errors. Here's a snippet of what I'm doing: //Enumerate the folders of the target list $().SPServices({ operation: "GetListItems", async: false, listName: "UserMessages, //defalt view is by folder CAMLViewFields: "<ViewFields Properties='True' />", CAMLQuery: "<Query><Where><Eq><FieldRef Name='FSObjType' /><Value Type='Integer'>1</Value></Eq></Where></Query>", CAMLQueryOptions: "<QueryOptions><IncludeMandatoryColumns>FALSE</IncludeMandatoryColumns></QueryOptions>", completefunc: function(xData, Status) { //I've confirmed the GetListItems oop returns a list of folders $(xData.responseXML).SPFilterNode("z:row").each(function() { strWPUserName = $(this).attr("ows_Title"); lngUserMsgFolderID = $(this).attr("ows_ID"); strAFNetUsername = $(xmlAFNetCrossRef).find("[ows_WPUserName=" + strWPUserName + "]").attr("ows_AFNetUserName"); //This is the lookup to the second list (stored XML)--it works if(strAFNetUsername != undefined) { //console.log(strWPUserName + " = " + strAFNetUsername); //This operation updates "Title" and "BaseName" for the first record, only updates "Title" for each record after that(?????) $().SPServices({ operation: "UpdateListItems", async: false, batchCmd: "Update", listName: strListUpdate, valuepairs: [["Title", strAFNetUsername], ["BaseName", strAFNetUsername]], ID: lngUserMsgFolderID, completefunc: function(xData, Status) { console.log(xData.responseText); } }); } }); alert("Completed updates"); } }); I've run out of ideas..... Jun 3, 2013 at 5:22 PM OK, I've done some more testing and it gets weird. I figured out the only item it will update in a series is the first item, which happens to have an ID of 1. So, breaking it down to its simplest form, I created a short script and attempted to update other folders one at a time. function UpdateUserMsgFolders() { $().SPServices({ operation: "UpdateListItems", async: false, batchCmd: "Update", listName: "UserMessages", valuepairs: [["Title", "9999999999c"], ["BaseName", "9999999999c"]], ID: 4, completefunc: function(xData, Status) { console.log(xData.responseText); } }); alert("Completed updates"); } As long as the ID is 1 (and there is a folder with the ID of 1), everything works fine. If I choose the ID of any other existing folder, the 'Title' changes for the selected folder but the 'BaseName' does not. Does this make sense to anyone? Thanks, Geoff Coordinator Jun 4, 2013 at 2:46 PM Geoff: I'm not sure one this one. Let us know what else you find... M. Jun 4, 2013 at 8:19 PM And the weirdness continues..... I've learned that the SPServices function works as advertised on all folders in a Document Library. However, in a list that isn't a document library, you can only change the 'BaseName' field for a folder whose ID=1. This is very odd behavior but I have tested it about 50 different ways, including building my own $.ajax call from scratch (bypassing SPServices) and getting the same results all around. It boggles the mind... Geoff
ESSENTIALAI-STEM
Reconstruction talk:Proto-Germanic/kelþaz RFM discussion: January 2015–August 2016 * See Reconstruction talk:Proto-Germanic/kelþą. z-stem There was a "discussion" about this, but no real discussion took place. So what's the proof for a z-stem? Apparently Old English did have r-forms, but the plural was (more?) commonly unchanged. So wouldn't the more likely scenario be that the r-plural is from analogy with words like "lamb", "calf", as also happened with throughout continental West Germanic? * I seem to remember there's a more detailed discussion of the whole problem in Schaffner 2001, but I don't have access to it right now (I believe he concludes that calf is an original z-stem but lamb is not; however, I don't remember what exactly he says about child). Our decision to reconstruct a z-stem appears to be mainly based on Orel, who however does not offer details and merely cites the existing literature on the topic. --Florian Blaschke (talk) 19:41, 5 January 2020 (UTC)
WIKI
The Great Gatsby (2013 film) The Great Gatsby is a 2013 American historical romantic drama film based on the 1925 novel of the same name by F. Scott Fitzgerald. The film was co-written and directed by Baz Luhrmann and stars an ensemble cast consisting of Leonardo DiCaprio, Tobey Maguire, Carey Mulligan, Joel Edgerton, Isla Fisher, Jason Clarke, and Elizabeth Debicki. Filming took place from September to December 2011 in Australia, with a $105 million net production budget. The film follows the life and times of millionaire Jay Gatsby (DiCaprio) and his neighbor Nick Carraway (Maguire) who recounts his interactions with Gatsby amid the riotous parties of the Jazz Age on Long Island in New York. A polarizing film among critics, The Great Gatsby received both praise and criticism for its visual style, direction, screenplay, performances, soundtrack, and its interpretation of the source material. Audiences responded more positively, and Fitzgerald's granddaughter praised the film, stating "Scott would have been proud." As of 2023, it is Luhrmann's highest-grossing film, grossing over $353 million worldwide. At the 86th Academy Awards, the film won in both of its nominated categories: Best Production Design and Best Costume Design. Plot In December 1929, World War I veteran Nick Carraway, undergoing treatment at a psychiatric hospital, tells his doctor about Jay Gatsby, the most hopeful man he ever met. The doctor suggests Nick tap into his passion and write down his thoughts, and Nick begins cataloging the events to his doctor. Seven years earlier, in the summer of 1922, Nick moved from the Midwest to New York after abandoning writing. He rents a small groundskeeper's cottage in the North Shore village of West Egg, next to the mansion of Gatsby, a mysterious business magnate who often hosts extravagant parties. Nick has dinner with his beautiful cousin Daisy Buchanan and her domineering husband, Tom, at their mansion in East Egg. Daisy plays matchmaker between Nick and another guest, Jordan Baker, a famous golfer. When Nick returns home, he sees Gatsby standing by the harbor, reaching toward a green light coming from the Buchanans' dock. Tom brings Nick to the Valley of Ashes, an industrial dumping site between West Egg and the city, and picks up his mistress Myrtle Wilson at a garage owned by her husband George. One day, Nick receives an invitation to one of Gatsby's parties. There, Nick encounters Jordan and they both meet Gatsby. Gatsby takes Nick to Manhattan for lunch, telling Nick on the way that he is an Oxford graduate and war hero from a wealthy Midwestern family. They go to a speakeasy, where Gatsby introduces Nick to his business partner Meyer Wolfsheim. Jordan tells Nick how Gatsby, a Captain of the U.S. Army, started a relationship with Daisy in 1917 before the U.S. entered World War I, and is still in love with her; he throws parties hoping that Daisy might attend. Gatsby asks Nick to invite Daisy to tea. After an awkward reunion, Gatsby and Daisy begin an affair. Gatsby is dismayed when Daisy wants to run away with him, preferring that she get a proper divorce. He asks Nick and Jordan to accompany him to the Buchanan home, where he and Daisy plan to tell Tom that Daisy is leaving him. During the luncheon, Tom becomes suspicious of Gatsby and Daisy, but Daisy stops Gatsby from revealing anything to Tom and suggests they all go to the Plaza Hotel. Tom drives Nick and Jordan in Gatsby's car while Gatsby drives Daisy in Tom's car. Tom stops for gas at George's garage, where George tells him that he and Myrtle are moving and that he suspects Myrtle is unfaithful. At the Plaza, Gatsby tells Tom of his affair with Daisy. Tom accuses Gatsby of having never attended Oxford and having made his fortune through bootlegging with mobsters. Eventually, both Gatsby and Daisy leave. After fighting with George over her infidelity, Myrtle runs into the street and is fatally struck by Gatsby's car after mistaking it for Tom's. Upon learning about Myrtle's death, Tom tells George that the car belongs to Gatsby and that he suspects Gatsby was Myrtle's lover, while Nick deduces Daisy was driving when the accident happened. Nick, overhearing Daisy accepting Tom's promise to take care of everything, tries to warn Gatsby about it, but the latter stubbornly believed that Daisy needs time to think about living with Gatsby. Inside the mansion, Gatsby tells Nick the truth: that he was born penniless, his real name is James Gatz, and he had asked Daisy to wait for him until he had made something of himself after the war; instead, she married Tom seven months after the war ended. The next day, Nick goes back to work and Gatsby awaits a call from Daisy while swimming in his pool. The phone rings, and Gatsby's butler answers it. Believing the caller to be Daisy, Gatsby is shot and killed by a vengeful George, who then commits suicide. Nick, who was the one calling, hears the gunshots and is the only person other than reporters to attend Gatsby's funeral as Daisy, Tom, and their daughter are leaving New York. The media falsely and negatively paints Gatsby as Myrtle's lover and killer, enraging Nick. Disgusted with both the city and its inhabitants, Nick leaves after taking a final walk-through Gatsby's deserted mansion and reflecting on Gatsby's ability to hope. In the sanatorium, Nick finishes typing his memoir and titles it The Great Gatsby. Cast * Leonardo DiCaprio as James Gatz / Jay Gatsby, a mysterious millionaire who hosts wild parties at his house with the hope that his former lover Daisy will return * Tasman Palazzi as young James Gatz * Callan McAuliffe as teen James Gatz * Tobey Maguire as Nick Carraway, an aspiring writer, Gatsby's friend, and the film's narrator * Carey Mulligan as Daisy Buchanan, Gatsby's former lover, Tom's wife, and Nick's cousin * Joel Edgerton as Tom Buchanan, an old money socialite who hates Gatsby because of his new money status and relationship with Daisy * Jason Clarke as George Wilson, Myrtle's husband and owner of a gas station in Valley of Ashes * Isla Fisher as Myrtle Wilson, Tom's mistress and an ambitious social climber * Elizabeth Debicki as Jordan Baker, a golf star and Daisy's best friend * Amitabh Bachchan as Meyer Wolfsheim, a gambler who met Gatsby in 1919 * Jack Thompson as Walter Perkins, a doctor at the psychiatric hospital where Nick is a patient * Adelaide Clemens as Catherine, Myrtle's sister * Richard Carter as Herzog, Gatsby's butler * Steve Bisley as Dan Cody, an alcoholic millionaire yacht owner that Gatsby met in his teenage years * Felix Williamson as Henri * Barry Otto as Benny McClenehan Development Prior to the 2013 adaptation, there were four earlier film adaptations of F. Scott Fitzgerald's 1925 novel of the same name, including a now-lost 1926 version, a 1949 version, a 1974 version, and a 2000 made for TV version. In December 2008, Variety reported that Baz Luhrmann would direct this latest adaptation. Luhrmann stated that he planned it to be more up-to-date due to its theme of criticizing the often irresponsible lifestyles of wealthy people. While Luhrmann was at the Consumer Electronics Show in January 2011, he told The Hollywood Reporter that he had been workshopping The Great Gatsby in 3D, though he had not yet decided whether to shoot in the format. In late January 2011, Luhrmann showed doubt about staying on board with the project but decided to stay. In 2010, it was reported that the film was being set up by Sony Pictures Entertainment. However, by 2011, Warner Bros. was close to acquiring a deal to finance and take worldwide distribution of The Great Gatsby. Casting Luhrmann said the results from the movie's workshop process of auditioning actors for roles in The Great Gatsby had been "very encouraging" to him. Leonardo DiCaprio was cast first, in the title role of Jay Gatsby. It is the second time Luhrmann and DiCaprio worked together; DiCaprio costarred in Luhrmann's Romeo + Juliet (1996). Tobey Maguire was cast to play Nick Carraway, marking the second collaboration between Maguire and DiCaprio following This Boy's Life. Initial reports linked Amanda Seyfried to the lead role of Daisy Buchanan, in October 2010. The next month Deadline Hollywood reported that Luhrmann had been auditioning numerous actresses, including Seyfried, Keira Knightley, Jessica Alba, Rebecca Hall, Blake Lively, Abbie Cornish, Michelle Williams and Scarlett Johansson, as well as considering Natalie Portman, for Daisy. Soon afterward, with her commitment to Cameron Crowe's We Bought a Zoo (2011), Johansson pulled out. On November 15, Luhrmann announced that Carey Mulligan had been cast to play Daisy after reading for the part on November 2 in New York. Mulligan won the role shortly after Luhrmann showed her audition footage to Sony Pictures Entertainment executives Amy Pascal and Doug Belgrad, who were impressed by the actress' command of the character. Mulligan burst into tears after learning of her casting via a phone call from Luhrmann, who informed her of his decision while she was on the red carpet at an event in New York. Luhrmann said: "I was privileged to explore the character with some of the world's most talented actresses, each one bringing their own particular interpretation, all of which were legitimate and exciting. However, specific to this particular production of The Great Gatsby, I was thrilled to pick up the phone an hour ago to the young Oscar-nominated British actress Carey Mulligan and say to her: 'Hello, Daisy Buchanan.'" In April 2011, Ben Affleck was in talks about playing the role of Tom Buchanan but had to pass due to a scheduling conflict with Argo (2012). Bradley Cooper had previously lobbied for the part, and Luke Evans was a major contender. In May, Joel Edgerton was confirmed in the part of Tom. Isla Fisher was cast to play Myrtle Wilson. Australian newcomer Elizabeth Debicki won the part of Jordan Baker. While casting for the supporting role of Jordan, Luhrmann said the character must be "as thoroughly examined as Daisy, for this production, for this time", adding, "It's like Olivier's Hamlet was the right Hamlet for his time. Who would Hamlet be today? Same with a Jordan or a Daisy". In June 2011, Jason Clarke was cast as George B. Wilson. Indian actor Amitabh Bachchan appears as Meyer Wolfshiem in his first Hollywood role. Bachchan worked for free, as a favor to Luhrmann. Screenplay The screenplay by Baz Luhrmann and Craig Pearce made five notable changes to the novel's plot: Nick Carraway writes from a sanitarium, having checked himself in some time after the summer with Gatsby; he flirts with Jordan Baker but, unlike what happens in the novel, he's "too smitten with Gatsby to notice her"; Gatsby himself makes a grand entrance, whereas in the novel some time passes as they talk before Carraway realizes who he is; some of the racism or antisemitism has been toned down or removed; finally, Gatsby dies thinking his pursuit of Daisy was successful. Filming Principal photography was shot in Sydney. Filming began on September 5, 2011, at Fox Studios Australia and finished on December 22, 2011, with additional shots filmed in January 2012. The film was shot with Red Epic digital cameras and Zeiss Ultra Prime lenses. The "Valley of Ashes", the desolate land located between West Egg and New York was shot in Balmain, New South Wales. Manly Business School in Manly, New South Wales—known as Saint Patrick's Seminary—doubled as Gatsby's mansion. Palm trees had to be digitally removed in post-production to convey a faithfulness to the Long Island setting. Nick's house was located in Centennial Park. Daisy's house was Gowan Brae, a historic mansion at The King's School, Parramatta. Sets In creating the background scenery for the world depicted in the film, designer Catherine Martin stated that the team styled the interior sets of Jay Gatsby's mansion with gilded opulence in a style that blended establishment taste with Art Deco. The long-destroyed Beacon Towers, thought by scholars to have partially inspired Fitzgerald's Jay Gatsby estate, was used as a main inspiration for Gatsby's home in the film. The location used to film the exterior of Jay Gatsby's mansion was the college building of the International College of Management, Sydney. Some inspiration was also drawn from other Gold Coast, Long Island, mansions, including Oheka Castle and La Selva Mansion. Features evoking the Long Island mansions were added in post-production. The inspiration for the film version of the Buchanan estate came from Old Westbury Gardens in Old Westbury, New York. The mansion exterior was built on a soundstage, with digital enhancements added. The interior sets for the Buchanan mansion were inspired by the style of Hollywood Regency. The home of Nick Carraway was conceived as an intimate cottage, in contrast with the grandeur of the neighboring Gatsby mansion. Objects chosen adhered to a central theme of what the designers saw as classic Long Island. The architecture conjures American Arts and Crafts, with Gustav Stickley-type furnishings inside and an Adirondack-style swing out. The opening scene was filmed from Rivendell Child, Adolescent and Family Unit in Concord, Sydney, only a few kilometers from Sydney 2000 Olympic Stadium. Costumes Costume designer Catherine Martin approached many apparel designers to craft the film's costumes. In conjunction with Miuccia Prada, Martin achieved the iconic 1920s look by altering pieces from the Prada and Miu Miu fashion archives. Many of the fashions from archives were concepts from runways and fashion magazines that were never worn by women in real life. Martin and Prada worked closely together to create pieces with "the European flair that was emerging amongst the aristocratic East Coast crowds in the Twenties". Martin worked with Brooks Brothers for the costumes worn by the male cast members and extras. Tiffany & Co. provided the jewelry for the film. Costume historians, however, noted that the costumes were inauthentic as Martin and Prada modernized the 1920s-era fashions to resemble 2010s fashions. Most prominently, the women were clothed to emphasize their breasts, such as Daisy's push-up bra, in contrast to the flat-chested fashions of the era. Martin admitted that she took the styles of the 1920s and made them sexier for a modern audience. "If you look at the fashion illustrations, as opposed to what actually ended up being made, you will see that the '20s were all about sex," Martin stated in a Collector's Weekly interview. "It was the first time that women basically wore no undergarments and not even a [garter] belt." Alice Jurow of the Art Deco Society observed that the film's highly stylized costume designs reflected contemporary audiences' inaccurate expectations and misconceptions of 1922 fashions. "When people say 'the Gatsby era,' there's definitely a mid-'20s concept that comes to mind, with the shorter skirts and the real archetypal flapper look," explained Jurow. "But 1922, it was the Jazz Age in terms of music, but the fashions hadn't quite caught up yet. The skirts were still mid-calf, even approaching ankle length. Clothes were a little more graceful and ornate and flowy. People would be startled and disturbed if anybody actually did real 1922 fashion in the production of Great Gatsby. It’s just not how we picture those characters." Release and marketing Originally scheduled for a December 25, 2012 release, on August 6, 2012, it was reported that the film was being moved to a summer 2013 release date. In September 2012, this date was confirmed to be May 10, 2013. The film opened the 66th Cannes Film Festival on May 15, 2013, shortly following its wide release in RealD 3D and 2D formats. The first trailer for The Great Gatsby was released on May 22, 2012, almost a year before the film's release. Songs featured in various trailers include: "No Church in the Wild" by Jay-Z and Kanye West; a cover of U2's "Love Is Blindness" performed by Jack White; a cover of The Turtles' "Happy Together" by the band Filter; a cover of Amy Winehouse's "Back to Black" performed by André 3000 and Beyoncé; "Young and Beautiful" performed by Lana Del Rey; and two songs, "Bedroom Hymns" and "Over the Love", performed by Florence and the Machine. On April 15, 2013, Brooks Brothers premiered "The Gatsby Collection", a line of men's clothing, shoes and accessories "inspired by the costumes designed by Catherine Martin for Baz Luhrmann's The Great Gatsby". According to Fashion Weekly, "The looks weren't simply based on 1920s style: the new duds were designed based on the brand's actual archives [...] Brooks Brothers was one of the initial arbiters of Gatsby-era look. The actual costumes, designed by Catherine Martin, will be on display in select Brooks Brothers boutiques." On April 17, 2013, Tiffany & Co. unveiled windows at its Fifth Avenue flagship store "inspired by" Luhrmann's film and created in collaboration with Luhrmann and costumer Catherine Martin. The jewelry store also premiered "The Great Gatsby Collection" line of jewelry designed in anticipation of the film. The collection comprises 7 pieces: a brooch, a headpiece (both reportedly based on archival Tiffany designs), a necklace and four different rings, including one in platinum with a 5.25-carat diamond, priced at US$875,000. Soundtrack Released on May 7, the film's soundtrack is also available in a deluxe edition; a Target exclusive release also features three extra tracks. The film's songs were executive-produced by Jay-Z and The Bullitts. Penned by Lana Del Rey and the film's director, Baz Luhrmann, the song "Young and Beautiful" was released to contemporary hit radio as a single, and was used as the film's buzz single. A snippet of the track appeared in the official trailer for the film and played during the scene where the characters portrayed by Leonardo DiCaprio and Carey Mulligan express their romantic feelings for one another. Hip hop magazine Rap-Up called the single "haunting", while MTV called it "somber-sounding". The track performed by Florence and the Machine, "Over the Love", references the "green light" symbol from the novel in its lyrics. Chris Payne of Billboard praised Beyoncé and André 3000's cover of "Back to Black", made unique with a downtempo EDM wobble. The xx recorded "Together" for the film, with Jamie Smith telling MTV that the band's contribution to the soundtrack sounds like "despair", and revealing that it utilizes a 60-piece orchestra. Speaking of his goals for the movie's musical backdrop, Baz Luhrmann expressed his desire to blend the music of the Jazz Age, associated with the 1922 setting of the story, with a modern spin. Much like his modern twists applied in Moulin Rouge! and Romeo + Juliet, Baz uses the movie's music not as a background, but instead prominently in the foreground, which takes on a character of its own. Box office The Great Gatsby Grossed $144.8 million in North America, and $208.8 million in other countries, for a worldwide total of $353.6 million. Calculating in all expenses, Deadline Hollywood estimate that the film made a profit of $58.6 million. In North America, The Great Gatsby earned US$19.4 million on its opening Friday, including US$3.25 million from Thursday night and midnight shows. It went on to finish in second place, behind Iron Man 3, during its opening weekend, with US$51.1 million. This was the sixth-largest opening weekend for a film that did not debut in first place, the second-largest opening weekend for a film starring Leonardo DiCaprio behind Inception, and Luhrmann's highest-grossing movie. Critical response On review aggregation website Rotten Tomatoes the film has an approval rating of 48% based on 304 reviews, with an average rating of 5.9/10. The website's critical consensus reads, "While certainly ambitious—and every bit as visually dazzling as one might expect—Baz Luhrmann's The Great Gatsby emphasizes visual splendor at the expense of its source material's vibrant heart." Metacritic gives the film a score of 55 out of 100, based on reviews from 45 critics, indicating "mixed or average reviews". Audiences polled by the market research firm CinemaScore gave an average grade of "B" on an A+ to F scale. Joe Morgenstern of The Wall Street Journal criticized the film as "a tale told idiotically, full of noise and furor, signifying next to nothing." Morgenstern felt the elaborate production designs were a misfire. He likened the film's flaws to the decadent era which Fitzgerald criticized in his writing and stated that what is "intractably wrong with the film is that there's no reality to heighten; it's a spectacle in search of a soul". The Chicago Reader review felt "Luhrmann is exactly the wrong person to adapt such a delicately rendered story, and his 3D feature plays like a ghastly Roaring 20s blowout at a sorority house". In The Atlantic, Christopher Orr observed that "the problem is that when the movie is entertaining it's not Gatsby, and when it's Gatsby it's not entertaining." The positive reviews included A. O. Scott of The New York Times, who felt the adaptation was "a lot of fun" and "less a conventional movie adaptation than a splashy, trashy opera, a wayward, lavishly theatrical celebration of the emotional and material extravagance that Fitzgerald surveyed with fascinated ambivalence". Scott advised "the best way to enjoy the film is to put aside whatever literary agenda you are tempted to bring with you". Ty Burr of The Boston Globe reserved special praise for DiCaprio's performance, saying "magnificent is the only word to describe this performance—the best movie Gatsby by far, superhuman in his charm and connections, the host of revels beyond imagining, and at his heart an insecure fraud whose hopes are pinned to a woman". The Scene Magazine gave the movie a "B−" rating, and praised the actors' performances, in particular saying that "the stand-out actor is Joel Edgerton as Tom Buchanan doing an excellent job of showing the character's gruffness, despite the one-dimensionality given to him". A granddaughter of Fitzgerald, Eleanor Lanahan, praised the style and music of the film. Tobey Maguire's role as Nick received mixed reviews from critics, with Philip French of The Guardian calling him "miscast or misdirected". Ann Hornaday of The Washington Post wrote that "Tobey Maguire is his usual recessive presence, barely registering as either a dynamic part of the events he describes or their watchful witness", and Elizabeth Weitzman of The New York Daily News opined that, despite "the wry-observational skills needed for Nick's Midwestern decency", the character is "directed toward a wide-eyed, one-note performance". Rick Groen of The Globe and Mail was more positive of Maguire's character, saying "our narrator, [is] prone to his occasionally purple rhetoric. But that imposed conceit, the image of a talented depressive writing from inside the bauble of his imagination, seems to validate his inflated prose and, better yet, lets us re-appreciate its inherent poetry". Meme A still image from the film showing Leonardo DiCaprio as Gatsby lifting his glass in a toast gesture became a popular image macro internet meme.
WIKI
Keeping self-nurture Keeping Healthy in the Workplace Ellyl-Faith Llavore Chelan Wilkins, RHN National Education Trainer As we find ourselves reaching for those scarves, wool jackets and winter boots we also find ourselves surrounded by the dreaded cold and flu season. Unfortunately, as the weather shifts into to the colder months, the epidemic of sickness start to rise! It becomes very common for workplaces to see an increase of “sick days” and the stress levels accumulate to accommodate the lack of work begin to set in. So how do we stay healthy during the “cold and flu “ season, especially in the workplace? Here are some tips! First, let's talk about where the majority of our immune system resides! 70% of our immune system is located in our digestive tract! Crazy right? So when we talk about keeping our immunity up, we really should focus on our digestive system and the foods we are eating! Lots of people suffer from digestive disturbances, eat a poor diet, drink too much coffee, drink alcohol and suffer from high stress! These are all contributing factors to have a weak digestive tract – “ leaky gut”, IBS and even IBD ( Chrohns, Colitis, ). It is the “good bacteria” that resides in our intestines that keeps the bugs away, and if we have a compromised immune system, low beneficial bacteria leaves a window for our immune system to drop and bacteria’s to set in! This leads to low immunity and an increase of sickness during those seasons. work_stress When we find ourselves surrounded by sickness, stress and even in highly populated places that have a high amount of “ germs” how can we protect ourselves from illness and keep our immunity up? Here are a few of my recommendations to staying healthy: Nutrition: Everything that we eat plays a role in our body positively or negatively! Ensuring that we eat nutrient dense foods filled with our essential vitamins and minerals will most definitely help protect us from illness and those unwanted “sick days”. It is essential to eat lots of dark leafy green vegetables filled with our essential B vitamins, alongside vitamin C rich foods such as fruits ( oranges, berries, grapefruits ). If you can eat organic, I highly recommend having them! Organic fruits and vegetables ensure that you are getting those essential vitamins and minerals. I also like to suggest getting in enough healthy fats, to reduce the inflammation in our body and to give us long-lasting energy! nutrition_healthy_eats Reduce Sugar Consumption: Sugar consumption has been shown to suppress our immune system for up to 8 hours after ingesting it! When we consume a lot of sugar in our diets, it naturally decreases our immunity allowing the chance of viruses and bacteria to set it. This includes all sugars from sweets, candy, and alcohol. Wash your hands: We all have been told to wash our hands after the washroom before we eat etc. However, we should always try to wash our hands after we use door handles, sneeze, cough and shake hands with others! Germs spread so quickly, and in a large environment like a workplace, it can be even worse! washing_hands Take your breaks & get fresh air: I can’t stress the importance of fresh air. Taking your breaks, re-grouping and getting out into the fresh air not only clears your mind, but it also helps relieve stress and purify your lungs! Supplement your immune system: I like to help my immune system during the cold & flu season by adding some additional supports! A few of my favourites are as follows: • Probiotics: These help support the immune system with healthy bacteria that combat against various bad bacterias and support our immune system! They are essential in our Immunity. • Vitamin C: Vitamin C has been known for years to keep our immune system boosted, help combat illness as well shorten the recovery time from colds! • Pycnogenol: This powerhouse has remarkable healing properties in the body, as well as a powerful antioxidant! It binds to free radicals in the body, therefore reducing inflammation and oxidative stress! • Bone Broth: There are many benefits to consuming bone broth especially when we are not feeling well! It has been shown to increase our immune function, shorten the time of Upper respiratory tract infections and help with immunity in our digestive tract. Sleep: Sleep is so critical when it comes to how we feel! Our bodies need up to 8 hours of sleep a night! When we don’t get enough sleep, it causes our body to decrease its immunity. Long-term sleep deprivation will eventually lead to illness and other diseases. Our body does all its healing while we sleep, so it is vital to maintain our sleep routine and get at least 8 hours of uninterrupted sleep. bed_white_sheets_sleep
ESSENTIALAI-STEM
sambat Noun * 1) tie, connection, joint Noun * 1) point at which a road or river forks into two
WIKI
@Article{and.2023.35, AUTHOR = {Niemann, Nicki and Shill, Holly A.}, TITLE = {Essential tremor and ageing}, JOURNAL = {Ageing and Neurodegenerative Diseases}, VOLUME = {3}, YEAR = {2023}, NUMBER = {4}, ARTICLE-NUMBER = {21}, URL = {https://www.oaepublish.com/articles/and.2023.35}, ISSN = {2769-5301}, ABSTRACT = {Essential Tremor (ET) is a very common neurological condition that increases with age. Tremor progresses in severity and body distribution with aging. Patients with ET may develop clinical signs of cerebellar dysfunction. Other neurological signs may be seen as well, but their association with ET has not been fully solidified. Pathological changes in the cerebellum are seen with ET, although describing ET as a neurodegenerative disease is still premature. Links to other neurodegenerative disorders such as Alzheimer’s and Parkinson’s disease can be seen but may simply reflect co-incidental co-morbidities of aging.}, DOI = {10.20517/and.2023.35} }
ESSENTIALAI-STEM
Page:Quartette - Kipling (1885).djvu/65 "None of what kind at all. When I first came I made experiments frequently and all the others also, but we have always succumbed to the sand which is precipitated upon our heads." "But surely," I broke in at this point, "the river front is open, and it is worth while dodging the bullets, while at night." I had already matured a rough plan of escape which a natural instinct of selfishness forbade me sharing with Gunga Dass. He, however, devined my unspoken thought almost as soon as it was formed; and, to my intense astonishment, gave vent to a long low chuckle of derision—the laughter, be it understood, of a superior or at least of an equal. "You will not"—he had dropped the Sir completely after his opening sentence,—"make any escape that way; but you can try. I have tried. Once only." The sensation of nameless terror and abject fear which I had in vain attempted to strive against overmastered me completely. My long fast—it was now close upon ten o'clock, and I had tasted nothing since tiffin on the previous day, combined with violent and unnatural agitation, had exhausted me, and I verily believe that, for a few minutes, I acted as one mad. I hurled myself against the pitiless sand slope. I ran round the base of the crater, blaspheming and praying in turns. I crawled out among the sedges of the river-front, only to be driven back each time in an agony of nervous dread by the rifle bullets which cut up the sand round me—for I dared not face the death of a mad dog among that terrible crowd,—and finally fell spent and raving at the kerb of the well. No one had taken the slightest notice of an exhibition which makes me blush hotly even when I think of it. Two or three men trod on my panting body as they drew water, but they were evidently used to this sort of thing, and had no time to waste upon me. The situation was humiliating. Gunga Dass indeed, when he had banked the embers of his fire with sand, was at some pains to throw half a cupful of fetid water over my head, an attention for which I could have fallen on my knees and thanked him, but he was laughing all the while in the same mirthless, wheezy key that greeted me on my first attempt to force the shoals. And so in a semi-comatose condition I lay till noon. Then, being only a man after all, I felt hungry and intimated as much to Gunga Dass whom I had begun to regard as my natural protector. Following the impulse of the outer world when dealing with natives I put my hand into pocket and drew out four
WIKI
User:Naturaldecay We are all infinitely stupid and ignorant, well-learned perhaps in one field or another, but blind and stumbling in a world of infinite knowledge waiting to be accessed...
WIKI
2012–13 SPHL season The 2012–13 Southern Professional Hockey League season was the ninth season of the Southern Professional Hockey League (SPHL). The regular season began October 26, 2012 and ended April 14, 2013, after a 56-game regular season and an 8-team playoff. The Fayetteville FireAntz captured their first SPHL regular season title. The Pensacola Ice Flyers defeated the Huntsville Havoc in the President's Cup final 2 games to 1 to win the team's first President's Cup. Final standings * ‡ William B. Coffey Trophy winners * Advanced to playoffs President's Cup playoffs * indicates overtime period. Finals All times are local (EDT/CDT) Awards The SPHL All-Rookie team was announced on March 27, 2013, the All-SPHL teams on March 28, Defenseman of the Year on March 29, Rookie of the Year on April 1, Goaltender of the Year on April 2, Coach of the Year on April 3, and Most Valuable Player on April 4.
WIKI
2012–13 Hong Kong First Division League The 2012–13 Hong Kong First Division League, also known as 2012–13 Red MR Hong Kong First Division League for sponsorship reasons, was the 101st since its establishment. Kitchee were the defending champions, won their 5th Hong Kong title in the previous season. The season featured 8 teams from the 2011–12 Hong Kong First Division League and two new teams promoted from 2011–12 Hong Kong Second Division League: Kam Fung, which then renamed as Biu Chun Rangers, and Southern District who replace relegated Sham Shui Po and Hong Kong Sapling. Teams A total of 10 teams contested the league, including eight sides from the 2011–12 season and two promoted from the 2011–12 Hong Kong Second Division League. Stadia and locations Note: Table lists in alphabetical order. 1 Renamed Biu Chun Rangers, previously known as Kam Fung. 2 The capacity of Tseung Kwan O Sports Ground can be increased to 5,000 if the temporary stand is opened. 3 After successfully gaining the right to play in the 2012–13 Hong Kong First Division League on 8 April 2012, Southern plan to continue using Aberdeen Sports Ground as their home ground in the First Division League. 4 The capacity of Aberdeen Sports Ground is originally 9,000, but only the 4,000-seated main stand is opened for football match. 5 Renamed as Sun Pegasus, previously known as TSW Pegasus. 6 Renamed as Yokohama FC Hong Kong, previously known as Biu Chun Rangers. Foreign players The number of foreign players was restricted to six per team. Round 18 Remarks: 1 The capacity of Aberdeen Sports Ground is originally 9,000, but only the 4,000-seated main stand is opened for football match. 2 Yokohama FC Hong Kong's home matches against Kitchee and South China are played at Mong Kok Stadium instead of their usual home ground Siu Sai Wan Sports Ground. 3 Biu Chun Rangers's home matches against South China and Kitchee are played at Mong Kok Stadium instead of their usual home ground Sham Shui Po Sports Ground. 4 South China's home matches against Biu Chun Rangers will be played at Mong Kok Stadium instead of their usual home ground Hong Kong Stadium. 5 The match was abandoned after 28 minutes due to adverse weather and bad pitch conditions. 6 Since the 3,500-seated main stand was all full, the 1,500 temporary stand was opened and therefore the capacity of Tseung Kwan O Sports Ground was 5,000 in the home match against South China. Season play-offs The play-off semi-finals were played in one match each, contested by the teams who finished in 2nd and 3rd in the 2012–13 Hong Kong First Division League table, the champions of Senior Challenge Shield and the winners of FA Cup. The winners of the semi-finals went through to the finals, with the winner of the final gaining 2014 AFC Cup participation. Hat-tricks * 5 Player scored 5 goals in the match. Scoring * First goal of the season: Ng Wai Chiu for Sun Pegasus against Wofoo Tai Po (31 August 2012) * Fastest goal of the season: 0 minute and 50 seconds, Ng Wai Chiu for Sun Pegasus against Wofoo Tai Po (31 August 2012) * Widest winning margin: 6 goals * Biu Chun Rangers 2–8 Sun Pegasus (Week 18, 4 May 2013) * Highest scoring game: 10 goals * Citizen 7–3 Wofoo Tai Po (Week 8, 11 November 2012) * Biu Chun Rangers 2–8 Sun Pegasus (Week 18, 4 May 2013) Discipline * Most yellow cards (player): 7 * Eugene Mbome (Sun Pegasus) * Mauricio Correa Da Luz (Tuen Mun) * Most yellow cards in a match (club): 6 * South China (Week 4, South China 1–0 Kitchee) * Most yellow cards in total (club): 46 * Sun Pegasus * Most red cards in a match (club): 2 * Sunray Cave JC Sun Hei (Week 4, Sunray Cave JC Sun Hei 2–2 Biu Chun Rangers) * Yokohama FC Hong Kong (Week 5, Yokohama FC Hong Kong 1–4 Kitchee) * Most red cards in total (club): 5 * Yokohama FC Hong Kong Clean Sheets * Most clean sheets: 5 * South China * Citizen * Fewest clean sheets: 0 * Biu Chun Rangers * Wofoo Tai Po Monthly awards The monthly awards are organised by the Hong Kong Sports Press Association. 20 journalists who specialise in football in Hong Kong will vote their best player of the month. Player with the highest number of votes wins the award.
WIKI
C.A.B The C-A-B method is an alternative approach to cardiopulmonary rescue (CPR) that increases the chances of survival for people who suffer from cardiopulmonary arrest or airway obstruction. This technique differs from the traditional A-B-C approach in that it emphasizes chest compressions before airways and ventilations. Indeed, the primary goal of the C-A-B technique is to reduce the time to first chest compression, which is critical to maintaining blood flow and brain oxygenation. By starting with chest compressions, rescuers can quickly initiate the cardiac resuscitation process, without having to attend to airways and ventilations first. Thus, the C-A-B technique can be considered a more effective and rapid approach to cardiac resuscitation, especially in emergency situations where every second counts. However, it should be emphasized that this technique is not suitable for all cases and that it is important to follow the guidelines and protocols established by the relevant medical authorities. CAB Definition and Meaning The CAB resuscitation technique is a simplified approach to cardiopulmonary resuscitation (CPR) used to help save the life of a person in cardiac arrest. CAB stands for chest compression, airway and breathing. This technique involves first performing chest compressions to help maintain blood flow, followed by opening the airway and checking for breathing, then ventilation (blowing air into the person's lungs). This approach differs from the older ABC (airway, breathing, compression) technique that emphasized opening the airway first. The CAB technique is recommended for first aid on victims of cardiac arrest without apparent cause. However, it is important to follow specific recommended resuscitation protocols to ensure effective assistance in an emergency. ILCOR recommendation The new ILCOR (International Liaison Committee On Resuscitation) CPR guidelines recommend the C-A-B technique for rescuers. This involves starting cardiopulmonary rescue with chest compressions, followed by airway clearance (opening) and finally ventilations, instead of the traditional A-B-C order. This technique is intended to reduce the time between cardiac arrest and the first chest compression, thereby increasing the victim's chances of survival. It is important to remember that the rescuer must begin CPR with chest compressions, the C-A-B cycle.
ESSENTIALAI-STEM
Page:A Naval Biographical Dictionary.djvu/1215 Rh 38, Capts. Edwards Lloyd Graham and Anthony Blagrave Valpy; in which frigate he returned to England. In April, 1815 (he had been then for six months employed, again with Capt. Duncan, in the 50, among the Western Islands), he was presented with a commission bearing date 14 of the preceding Feb. He has since been on half-pay. – Messrs. Halford and Co. TRESAHAR. died 29 Dec. 1844, in the Old Kent Road. This officer entered the Navy, in Sept. 1782, as Midshipman, on board the, Capt. Rich. Hill, stationed in the West Indies; where he joined in succession, in the summer of 1783, the, Capt. Hardy, and , Capt. Fisher. He returned to England in Nov. of the same year; served next, from March, 1784, until Nov. 1785, in the, Capts. R. Hill and Jas. Hawkins, on the Channel station; and from June, 1786, until made Lieutenant, 19 Aug. 1793, into the 74, Capt. Chas. Cotton, was employed at Portsmouth in the 74, Capt. Roger Curtis, 64, Capt. Fras. J. Hartwell, 74, Capts. Chas. Thompson and Anthony Jas. Pye Molly, 100 and 74, both commanded by Capt. Roger Curtis, and again, flag-ship of Lord Howe. He sailed in the for the West Indies; and he was subsequently appointed – 9 Aug. 1795, to the command, on that station, of the – 9 Nov. 1796, to the 98, flag-ship of Admirals Henry Harvey and Lord Hugh Seymour, also in the West Indies – 1 Sept. 1800, to the 100, bearing the flag of Admiral Harvey in the Channel – 29 July, 1803, after 15 months of half-pay, to the 74, Capt. Frank Sotheron, in the Mediterranean – 22 Oct. 1806, to the 33, Capt. John Maitland, on the Irish station – 15 Dec. 1807, to the 18, Capt, John Willoughby Marshall, employed in the North Sea and Baltic – and 28 Feb. 1809 and 27 July, 1813, to the and 98, flag-ships of Sir Roger Curtis and Sir Rich. Bickerton at Portsmouth, where he remained until Feb. 1814. In the he was present at the reduction of Trinidad in 1797. He was placed on the Senior List of Retired Commanders 28 Feb. 1827. – J. Hinxman. TRIBE. entered the Navy, 2 Aug. 1806, as Fst.-cl. Vol., on board the 22, Capts. Geo. Edm. Byron Bettesworth and Hon. Geo. Cadogan, employed on the Halifax, Guernsey, Cape of Good Hope, and Lisbon stations. In May, 1809, he removed as Midshipman (a rating he had before attained) to the 74, Capts. .Joseph Bingham and Sam. Jas. Ballard; he served next, from Jan. 1812 until June, 1813, in the 98 and 110, flag-ships of Sir Harry Burrard Neale off Brest; in Sept. of the latter year he joined the 64, Capt. Hon. Geo. Alfred Crofton, lying at Portsmouth; and from the following Nov. until June, 1815, he was employed on the coast of North America in the 40, Capt. Joseph Nourse, 64, Capt. Owen, sloop, and 56, Capt. John Hayes. In the he accompanied the expedition to the Walcheren, assisted at the reduction of Guadeloupe, and cruized in the Bay of Biscay; in the he witnessed the surrender, 15 Jan. 1815, of the American ship President. On leaving her he was received for a few weeks, as Master’s Mate, on board the 120, Capt. Sir Arch. Collingwood Dickson, lying at Plymouth. He attained the rank of Lieutenant 19 Sept. 1815; and has been since appointed – in 1833, to the charge, for four years, of a Semaphore station – 8 Aug. 1838, to the Coast-Guard, in which service he remained until the early part of 1844 – and 24 Sept. 1846 and 1 March, 1848, to the 80 and 72, guardships at Sheerness, both commanded by Capt. David Price, under whom he continues. – Messrs. Halford and Co. TRINGHAM. passed his examination in 1820; and was made Lieutenant, 28 June, 1826, into the 46, bearing the broad pendant of Commodore Chas. Bullen on the coast of Africa; whence, in the following year, he returned to England. His succeeding appointments were – 28 Nov. 1836, to the 120, flag-ship of Hon. Chas. Elphinstone Fleeming and Sir Robt. Waller Otway at the Nore – 19 April, 1839, and 1 Oct. 1840, to the 120 and 110, bearing the flags of Hon. C. E. Fleeming and Sir Edw. Codrington at Portsmouth – 19 April, 1841, to the command of the steamer, on the North America and West India station, whence he returned in 1842 – and 1 July, 1843, to the steam-yacht, Capt. Lord Adolphus FitzClarence. Since he attained his present rank, 22 Oct. 1844, he has been on half-pay. Commander Tringham married, in 1831, Eleanor, widow of Lieut.-Colonel Henry Tarleton, late of the 60th Regiment. – Joseph Woodhead. TRIPP. is fourth and youngest son of the late Rev. John Tripp, Rector of Spofforth and of Catton, co. York, LL.D. of Christchurch, Oxford. His eldest brother, George, a Captain in the 25th Regt. of Foot, served under Sir Ralph Abercromby in Egypt in 1801, and died two years afterwards of consumption, occasioned by sleeping on the sands; his next, Charles, D.D., the present representative of the family, is Rector of Silverton, co. Devon, and a Magistrate for the counties of Somerset and Devon; and his third, Peter, is a Lieutenant-Colonel in the 98th Regt. of Foot. This officer entered the Navy, 20 Oct. 1802, as Fst.-cl. Vol., on board the frigate, Capt. Henry Vansittart; with whom he removed, in the following Feb., to the 36. In that ship, after blockading the rivers Elbe and Weser and cruizing off Boulogne, he sailed, in Feb. 1804, for the West Indies. When on her passage home in the summer of 1806, in company with the 74, frigate, an armed schooner, and a large fleet of merchantmen, the fell in with a number of Spanish vessels, under the protection of a 74-gun ship and two gun-boats. She was immediately detached in pursuit, and, assisted by the schooner and the boats of the, succeeded in capturing and destroying the gunboats and 20 sail deeply laden with sugar, &c. Independently of this Mr. Tripp assisted, during his sojourn in the West Indies, at the capture of Le Cazar and Le Vautour French privateers, a Spanish brig laden with cocoa, Le Grand Juge Bertolio French schooner of 7 guns and 51 men, and two Spanish feluccas laden with beef and flour. The latter vessels were destroyed. While cruizing in 1807 in the Channel the took Le Magicien privateer of 2 guns and 44 men. In Dec. 1808 Mr. Tripp, who had been rated Midshipman and Master’s Mate of the in April, 1805, and June, 1807, joined, in the latter capacity, the 74, Capt. Peter Halkett, on the Lisbon station; where he was made Lieutenant, 7 June, 1809, into the 74, Capt. Sam. Hood Linzee. He was afterwards employed, from Sept. 1809 until Aug. 1812, in the 98, flag-ship of Hon. Geo. Cranfield Berkeley in the Tagus; and from Oct. in the latter year until March, 1816, in the 74, Capts. Sir Thos. Masterman Hardy and Thos. Boys. Under Sir T. M. Hardy (who also commanded the ) we find him present in the in a variety of operations on the coast of North America, particularly at the blockade of New London, the occupation of the
WIKI
3-D Printing the Young Universe as a Lumpy Softball Trilobites If you’ve been watching the HBO series “Westworld,” you might suspect 3-D printers are starting to do some amazing things. Recently, I journeyed to Brooklyn to watch a whole universe come out of a printer — our own universe, actually, when it was a baby at just 380,000 years old. My guide was Janna Levin, a professor at Barnard College at Columbia and an award-winning author of books including, most recently, “Black Hole Blues,” about the discovery of gravitational waves. Dr. Levin is also the director of scientific programs at Pioneer Works a cultural and art center with laboratories as well as studios in Red Hook, Brooklyn, home to the universe-maker. In the corner stood a robot snowman, a “snowbot,” giving hugs to any humans who ventured close. To cook up her universe, Dr. Levin and her Pioneer Works colleagues used an algorithm devised by physicists at Imperial College in London. They call it Cosmic Sculpture. The model is based on a map of the universe made recently by the Planck satellite, which shows the residual heat left over from the Big Bang itself in the form of microwave radio waves. As it came out of the printer, the universe was about the size of a softball, all lumpy and splotchy with features only a mother could love. Over the eons the baby-verse would grow into the starry spectacle we now see when the sun goes down. Microwave light, which fills all of space, was discovered by accident in 1965, Dr. Levin pointed out. But it had been predicted 20 years earlier, an inescapable part of Einstein’s theorizing. That makes it different from many explanations of the universe’s origins, such as those one might hear in church. “We don’t have to talk anyone into it; we can just look at the map and it’s either true or its not true,” Dr. Levin said. At that moment, she was holding the whole universe in her hands.
NEWS-MULTISOURCE
enfés Noun * 1) * Circa 1250, Philippe Mouskes, Chroniques rimées, line 17802, published 1838 * Li enfés contre lui estoit * The child was against him * The child was against him
WIKI
Reading Time: 5 minutesHelen Keller was born on June 27, 1880, in Tuscumbia, Alabama. She was a happy healthy baby. Her father, Arthur, worked for a newspaper while her mother, Kate, took care of the home and baby Helen. She grew up on her family’s large farm called Ivy Green. She enjoyed the animals including the horses, dogs, and chickens. When Helen Keller was around one and a half years old she became very sick. She had a high fever and a bad headache for several days. Although Helen Keller survived, her parents soon realized that she had lost both her sight and her hearing. Helen Keller tried to communicate with the people around her. She had special motions she would use to indicate that she wanted her mom or her dad. However, she would also get frustrated. She realized that she was different and it was extremely difficult to let others know what she needed. She would sometimes throw tantrums, kicking and hitting other people in anger. Must Read: Annie Besant Soon Helen’s parents realized that she needed some special help. They contacted the Perkins Institute for the Blind in Boston. The director suggested a former student named Annie Sullivan. Annie had been blind but had her eyesight restored by surgery. Perhaps her unique experience would allow her to help Helen Keller. Annie came to work with Helen on March 3, 1887, and would be her helper and companion for the next 50 years. Annie began to teach Helen Keller words. She would press the letters of words into Helen’s hand. For example, she would put a doll in one of Helen’s hands and then press the letters of the word D-O-L-L into the other hand. She taught Helen a number of words. Helen Keller would repeat the words into Annie’s hand. However, Helen still didn’t understand that the hand signs had meaning. Then one day Annie put Helen’s hand into the water coming from a pump. Then she spelled out water into Helen’s other hand. Something clicked. Helen finally understood what Annie was doing. An entire new world opened up for Helen. She learned a number of new words that day. In many ways, it was one of the happiest days of her life. Learning to Read Next, Annie taught Helen how to read. Helen must have been very bright and Annie an amazing teacher, because soon Helen could read entire books in Braille. Braille is a special reading system where the letters are made out of little bumps on a page. Imagine trying to learn how to read if you couldn’t see or hear. It’s truly amazing what Helen and Annie were able to accomplish. At the age of ten Helen could read and use a typewriter. Now she wanted to learn how to talk. Learning to Talk Helen Keller learned how to talk from Sarah Fuller. Sarah was a teacher for the deaf. By resting her hand on Sarah’s lips, Helen learned how to feel sound vibrations and how the lips moved to make sounds. She started off learning a few letters and sounds. Then she advanced to words and, finally, sentences. Helen was so happy that she could say words. Also Read: 10 Most Inspirational Women on Planet At sixteen years old Helen attended Radcliffe College for women in Massachusetts. Annie attended school with her and helped to sign the lectures into Helen’s hand. Helen graduated from Radcliffe in 1904 with honors. During college Helen began to write about her experiences being deaf and blind. She first wrote a number of articles for a magazine called the Ladies’ Home Journal. These articles were later published together in a book called The Story of My Life. A few years later, in 1908, she published another book called The World I Live In. Working for Others As Helen grew older she wanted to help other people like herself. She wanted to inspire them and give them hope. She joined the American Foundation for the Blind and traveled the country giving speeches and raising money for the foundation. Later, during World War II, she visited with wounded army soldiers encouraging them not to give up. Helen spent much of her life working to raise money and awareness for people with disabilities, especially the deaf and the blind. You May Also Read: Things to know about Nathuram Godse Interesting Facts about Helen Keller - Annie Sullivan was often called the “Miracle Worker” for the way she was able to help Helen. - Helen became very famous. She met with every President of the United States from Grover Cleveland to Lyndon Johnson. That’s a lot of presidents! - Helen starred in a movie about herself called Deliverance. Critics liked the movie, but not a lot of people went to see it. - She loved dogs. They were a great source of joy to her. - Helen became friends with famous people such as the inventor of the telephone Alexander Graham Bell and the author Mark Twain. - She wrote a book titled Teacher about Annie Sullivan’s life. - Two films about Helen Keller won Academy Awards. One was a documentary called The Unconquered (1954) and the other was a drama called The Miracle Worker (1962) starring Anne Bancroft and Patty Duke. Don’t Miss: NELSON MANDELA
FINEWEB-EDU
User:Matma Rex/disFixer disFixer – tool that allows you to easily fix dabs and redirects. To use, add the following line to your common.js: importScript('User:Matma Rex/disFixer.js'); pl:User:Matma Rex/disFixer
WIKI
destroytoday.com A week of cleanup inline-contacts-form This past weekend, I wrapped up the inline forms for Cushion’s new invoice form. As expected, laying this early groundwork paved the way for the rest of the inline forms, so I was able to knock one out each day. Since all of these forms were a substantial amount of work for one stretch, I didn’t want to jump right into another heavy task, so I decided to dedicate this week to cleanup. cleanup list As I build Cushion, I often keep a “cleanup” list alongside my to-dos. This list mainly consists of refactors that I could do in the moment, but decide not to because they might lead me down a rabbit hole. This list is also useful for snippets I might want to extract into a reusable piece of code, but there aren’t enough occurrences to justify it yet. I normally tackle one of these cleanup items at a time in between other work, but this time, I felt like batching them all for a single week. The most significant refactor I completed had to do with Cushion’s form states. The initial form states in Cushion’s new form system started with a FormState object. This object kept track of whether the form had changed (for enabling the submit button) and whether the form was currently being saved (to disable the form, but also to show the saving animation). When I added error alerts to forms, I also included an error property on this object that would show a popover on the submit button. interface FormState { error: Error | null; hasChanged: boolean; isSaving: boolean; } const formState:FormState = { error: null, hasChanged: false, isSaving: false, } Since this new work on Cushion is my first foray into TypeScript, I’m learning as I go, so the FormState started as an interface. Because of this, anywhere I needed the FormState, I would need to instantiate an object with the necessary properties—hasChanged, isSaving, and error. After creating a few forms, this repetition became a code smell. I try my best to keep Cushion’s codebase DRY (don’t repeat yourself), so I’m always looking for ways to avoid repetition. In this case, the FormState object became a prime candidate for refactoring. class FormState { error: Error | null = null; hasChanged = false; isSaving = false; } Since the main problem with the FormState was the chore of setting the same default values each time, I decided to turn it into a class instead of an interface. This let me replace the objects with new FormState and set the defaults once, within the class. That was the easy part, but this refactor revealed other areas I could improve. async handleSubmit (e:FormEvent):Promise<void> { e.state.error = null; e.state.isSaving = true; const [err, res] = await createInvoice(e.payload); if (res) { e.state.hasChanged = false; // alert success // change route } else if (err) { e.state.error = err; } e.state.isSaving = false; } In my forms, when I handle the submit action, I reset the FormState’s error, set the saving boolean to true, then make the request to the API, and finish by resetting the change boolean upon success or populating the error upon failure. I also reset the saving boolean regardless of success or failure. These steps are exactly the same with every form, but I was manually calling them in each submit handler, which stood out as another area I could clean up. class FormState { async handle<T, E = Error> (promise: Promise<T>):Promise<[E | void, T | void]> { this.error = null; this.isSaving = true; const [err, res] = await promise; if (res) this.hasChanged = false; if (err) this.error = err; this.isSaving = false; return [err, res]; } } I ended up creating an async handle method on the FormState class that wraps the request promise and sets the correct properties before and after the request. For those who aren’t too familiar with TypeScript, the T and E parts might seem confusing, but they’re simply “type variables” that let this method maintain proper type safety. async handleSubmit (e:FormEvent):Promise<void> { const [, res] = await e.state.handle(createInvoice(e.payload)); if (res) { // alert success // change route } } Refactoring the submit handler to use the FormState.handle method replaced the entire block with a single line of code. Now, I simply need to react to a successful request. Being able to take the time to refactor code makes writing coding so much more enjoyable. It truly bothers me when I notice myself copy-pasting the same code several times throughout the codebase. It’s okay for trying something out, but once you do, take the time to clean it up. Back when Cushion was a month-to-month sprint, I didn’t feel like I had time to clean up because refactoring doesn’t feel like forward progress, but it is—just not immediate. I know that all the care and consideration that I’m putting into Cushion’s new system will pay off massively years from now. Would-be bugs will be caught by tests or type checks. Updates to complex parts of the app will come with the safety net and confidence of those tests. Adding to the app will be much easier due to the reusability of everything. Knowing all of this gets me excited. I like to think that Future Jonnie will appreciate that I spent the extra time to make his life easier—or not. He might end up being a jerk.
ESSENTIALAI-STEM
Page:Harold Lamb--The House of the Falcon.djvu/62 but a white woman I will not touch. With my own ears I heard the cannon of the French warships battering the gates of Constantinople. The Protector of the Faithful is but a shadow and the cloak of Islam is rent asunder. I know, I know." "All this," said Monsey impatiently, "is idle talk. Abbas, there is a place where the hand of the Englishman does not reach. You know, for you lay hid there many months." "Above?" Abbas pointed upward and to the north. "Aye—beyond the Hills. Once the Cossack posts were set there, like the links of a strong chain. Now, the chain is broken. The tribesman grazes his cattle over the ashes of camp fires. The priests of Islam chant their prayers unheard, save by true believers. You have seen that, Abbas!" "It is true." Monsey tapped his chin reflectively with lean fingers. "No American consul is within a thousand miles. Do you think I am a child, wet with mother's milk, to want to make the American girl a slave to sell at a price? Not when I love her, as I do. Allah, and all his saints!—she is beautiful. I have been thinking." The Alaman was silent, pondering. Monsey, who had been the link by which he sold the choicest of his women to be "servants" of the Russian officers on the border during a former régime, never spoke idly. The dissolute gentleman—once an officer himself—had profited much by Abbas. But the shrewd merchant was cautious lest the whims of his companion should involve him in needless trouble. "Once beyond the Kashmir frontier, we would be safe, Abbas," muttered the white man, "Fraser-Carnie—a disciplined numskull—would not dare send any of
WIKI
Titanium elastic intramedullary nailing: closed or mini-open reduction? Acta orthopaedica Belgica PubMedID: 24205770 Uçar BY, Gem M, Bulut M, Azboy I, Demirtas A, Alemdar C. Titanium elastic intramedullary nailing: closed or mini-open reduction?. Acta Orthop Belg. 2013;79(4):406-10. The authors retrospectively studied 43 children with femoral fractures, treated with titanium elastic nailing (TEN). Twenty-two underwent closed fluoroscopic reduction ( Group I), whereas the other 21 underwent mini-open reduction (Group II). The operation time averaged 71 minutes in group I, and 48 minutes in group II (p < 0.001). The mean fluoroscopy time was 793 seconds in group I, and 35.5 seconds in group II (p <0.001). However, blood loss and hospital stay were significantly higher in group II (p < 0.001 and p = 0.001 respectively). Time to full weight bearing, time to radiographic union and TEN outcome score did not differ significantly. Overall, no one technique was really superior. From a practical viewpoint, a mini-open reduction may be decided intra-operatively if closed reduction proves to be problematic. This decreases intra-operative radiation and length of the surgical procedure.
ESSENTIALAI-STEM
FAQ What is the cost difference between a radio station and a TV station to implement CAP emergency alerting? All of our hardware and software products fully support both Audio and Visual alerting, no extra fees, licenses or code required. When a radio or TV station uses our systems to manage schedules and play out, it only requires checking off a menu item and alerts are automatically injected into the broadcast chain. Some stations already have an automation system or run manually operating in a standalone mode, requiring only the player to receive and issue alerts. Alerts are received and played out on demand from the onboard audio and/or video device to mixing board and modulator. Each station is setup and run differently to trigger alerts, using various methods including: streaming alerts on demand, interrupting IP stream or combination using RS232 serial GPIO.   How do I send a HD video stream to a Master Control? We do this several of ways. 1. Send out a HD Theora stream to a local Icecast server or a RTMP Video stream to YouTube or Twitch Channel, that can be relayed to Master Control. We can do this now including all the audio encoding and authentication. 2. Your MC might be picky on what video formats to accept, such as MPEG-TS, MPEG4 that isn't supported in Icecast. What format does MC prefer? 3. Output the playout (new model spec have dual Display Port) to a hardware encoder, around 500.00 USD that will be more compatible with MC. MC might have a recommendation for hardware ie Black Magic Presenter 4. We use the Gstreamer framework that supports many types of video formats and codec, it would not be too much trouble to include one of these into play out, less than 10 hours billable time.   How do I get started with OpenBroadcaster? Depends on your situation and demand we give you many broadcast choices for Products and Services. We provide you with free open source broadcast automation tools as well as a line of supported hardware.   How many individual media items can the online media library hold? Current structure gives us 36*36 directories = 1296. Each directory can support 10k without major performance issues with file manager tools, etc. So that's almost 13 million media items. Otherwise, It is limited by available inodes on the file system.   How does remote access anywhere work? Do I need any special tools? We are hardened with certificate based security and ease of network administration because it doesn't require any external applications that poke holes in your firewall. Everything is accessed through a modern web browser (Chrome, Firefox, Safari, Edge) without having to install remote desktop sharing software.   Are you compatible with Windows, Mac and Linux? For maximum efficiency and mobility, all of our broadcast automation products and services are accessed through a unified web browser interface including current versions of Chrome, Firefox, Safari and Edge.   What is the open source licensing conditions? OpenBroadcaster is free to use for experimenters, community, the curious... even in commercial applications under AGPL3 Open Source license. Mandatory paid subscription, unlock codes or dongles NOT required for full operation.   How is service and support handled? Is it mandatory to have a support contract? First line of support is ALWAYS our support site Still having problems? All our paid products and services include one-year technical support. Phone support (9-5 PST, Monday to Friday). For phone support, clients must provide  administrative access to port 22 for SSH for the Server. The Player's Dashboard; port 23233 must be open and accessible from the Internet.   How can our station sponsor custom module development? Customers are able to sponsor projects to get modules built with new specific features. An example is a new broadcast station that needs to talk to a specific Traffic/Accounting program or social media platform's website. For budgeting analysis an example is Competitor's Product “A” costs $5,000.00 and has many bells and whistles, of which only 3 key things are needed for your project. OB licensing uses open source (free), but it will still cost $1000.00 to get it setup on hardware. Out of the box default settings will do 2 key features of Product “A”. Your project requires the missing capability. Using the efficient module environment a custom feature is created for the deficient feature you "must have" for $1,000.00.Result: Customer has stable operating installation, with the 3 key features needed. Save $3,000.00 upfront. Visit our partner program to see examples of custom development.   How long will security and updates be supported? We provide access to basic security updates for the life of the product (approximate 3+ years) with the same functionality when it was first purchased. All features that you currently have will be maintained. We may offer new features and services in addition to what is currently available as a value added "opt In" service.   How many supported media formats can be broadcast? Supported Audio FormatsAudio Formats   FLAC, MP3, MP4A, Ogg, WAV Supported Video FormatsVideo Formats   AVI, MOV, MP4, MPEG, OGM, WMV Supported Image FormatsImage Formats   JPEG, PNG, SVG Supported Medium FormatsMedium supported Streaming Audio and Video, AoIP, RTP,  Livewire, Ravenna, Image, Colour LED Scrolling boards, Digital Display Signs. More info on other Codec and Containers For installations outside of North America, what are the supported languages? • POLLY Ai TTS Languages • English, French, Spanish, Estonian, German, Chinese Traditional, Thai • 60+ indigenous languages of North America • Over 40 international languages   We are after an inexpensive STL. What is Barix streaming protocol compatibility like? OBPlayer generates an MP3 stream direct to a Barix hardware receiver, creating a simple STL (studio transmitter Link). Alerts are generated on demand as mp3 priority streams that can be received by a Barix Exstreamer at transmitter with options to set the port and lead in times.   How does a server manage a network of embedded player boxes? OBServer runs on one box (or in a VM) managing a network share for large media libraries. Server manages remote units syncing it with schedules and media. Example has 24 hours of scheduled media. If server disappears, schedule and media are buffered on playout device and continue to play uninterrupted. Adding channels and stations is really easy to expand simply by provisioning additional playout boxes for: radio or TV transmitter, digital signage or CATV channel(s). 100% of horsepower is available for playout.   Does CAP emergency standalone alerting service only work in Canada? Our Alerting systems are built to CAP (Common Alerting Protocol) specifications and conforms to the CLFG (Canadian Common Look and Feel Guidance) 1.2  Our radio and television alerting systems are the CAP (Common Alerting Protocol) we are able to integrate into other countries NAAD alert systems, including: United States, Australia, New Zealand and many other countries.   Do we require local support resources to maintain our station? We provide a standalone, embedded "Plug and Play" supported broadcast appliance value added service with a standardized delivery model for software and updates. All of our products are built and designed on a common software build ISO image. We do this for a number of reasons, including our customers' concerns about stability and reliability. In addition to one click updates to a centralized repository of latest stable code, we also offer disaster recovery tools such as a self-installing backup ISO and local settings configuration file.   How do you inject alerts with the Mechanical Relay and GPIO? We have various solutions. In no particular order, we can provide a GPIO signal to switch mechanical relays and generate on demand MP3 alert streams. Newer digital consoles have GPIO built in that our systems are compatible. Other ways to inject alerts into the broadcast chain are listed here   Desktop or Headless operation? Headless means the application starts without a GUI desktop and meant for operating in a rack with full access through the web dashboard and SSH command line. Pulse audio is used in Headless Mode with all levels set through the dashboard with support for ALSA and JACK.  OBPlayer supports both Desktop or Headless mode.   Are there any special offers for non profit societies, NGO and companies? We support non profit companies, NGO, startups and maker spaces. Contact us and we will happily provide you with a customized plan.   Do you have any used equipment for donation? Sometimes we have used gear for sale or donation on our Specials page where we list Demo and slightly used gear. We always provide free open source software to the community at large. Subscribe to our Newsletter to get up to date information and check back out Donation and Sponsorship.   Where can we Demo, Experiment and Evaluate? Skilled to run a web server? Have existing hosting? Zero Budget? DIY is the way to go. Source code available from Github for Server and Player  We support inexpensive Raspberry Pi radio super computers with a low cost development platform that gets you a demo to evalutate.   Streaming Relay Server? Relay Server to reduce network congestion. Never stream out of your playout automation box as your main public service mount point. Streaming services, should be separate and segmented in your firewall. You do not want the public to touch your internal network. Use a dedicated streaming encoder/server at your studio and a relay media server, located on an outside gigabit connection to the internet. Send one single stream to this relay server and have public users connect to this server. This service is widely available and/or host your own relay server on AWS. Properly manage your network, run speed tests and sniff around for other sources of congestion and competing processes.   Do you support Shoutcast or Icecast? OBPlayer streaming output supports Icecast as well as Shoutcast media servers including music, images and video for a visual radio experience.   How do I create multiple channels and streams? One player can be created in >Player Manager, automatically creating a schedule for that player.  Additional players may be created with stand alone schedules. Another way is by creating new players and then selecting it to be cloned by an existing parent player. This allows multiple players to be setup as clones. In this case, only one schedule appears and is shared to multiple players.  
ESSENTIALAI-STEM
Use Cases vs Requirements vs Attributes/Methods Source: otug@rational.com Date: 30-Aug-97 Related Sites ------------------------------ o-< Problem: How are use cases different from requirements and from attributes/methods interaction models? --------------- o-< Doug Rosenberg wrote: Here's a simple "Save File" use case: USAGE: (reads like the user manual) Basic Course: The user selects the Save option from the file menu in order to save the current document to disk. The system displays a "File Save" dialog which allows the user to specify the directory and filename. After the user specifies this information, the file is stored to disk. Alternative Courses: If the filename specified by the user already exists at the specified location, the user is asked whether the existing file should be overwritten. If not, the "File Save" dialog is redisplayed. If the disk is full, the system displays an alert to the user, and re-displays the "File Save" dialog, allowing the user do navigate to a different volume. If an error occurs while writing the file, an alert is displayed. .......... REQUIREMENTS: (reads like a specification document) The system shall provide the ability to save files to disk. The system shall warn the user if an existing file is about to be overwritten. .......... ATTRIBUTES and METHODS: (presumes a specific design at the requirements stage) User specifies volume name, directory name, and a 32 character alphanumeric filename. The "CheckExistingFiles" method on the CDirectoryManager class is invoked. This method calls the "DisplayAlert" method of the CAlertHandler class if a file already exists in the specified location. .......... All three of the above clearly specify some useful information about a system. Only the first one is a properly written use case. Clearly we don't want one use case per "shall" statement, as both of the stated requirements legitimately should be allocated to the "Save File" use case. We might be able to guess the design correctly during the requirements definition phase, but it really isn't a good idea to be doing detailed design before we understand everything the system is supposed to do. Notice also that more than half the complexity of the use case occurs in the alternative courses of action; you're not done when you've written the basic course. Writing the use case completely and unambiguously describes the behavior of the system, without presuming any specific design. "Solution space" objects such as the "File Save Dialog" (which would be an Interface Object) are identified by describing system usage from the user manual perspective. There's an old (and too often ignored) programming maxim that is worth keeping in mind when approaching use cases. It goes: "write the user manual before you write the code". I probably heard this first 10 or 20 years before reading Jacobson's OOSE book. ------------------------------ o-< More Info: A short introduction of use cases by Martin Fowler Alistair Cockburn, Structuring Use Cases with Goals Alistair Cockburn, Writing Effective Use Cases ------------------------------
ESSENTIALAI-STEM
Talk:Laser safety Missing information in laser safety ratings (missing power values) Looking through the Laser ratings, the article seems to missing a great deal of information on power ratings for the various types of lasers and operating parameters Missing info: Class 1 max power output (MPE value?) Class 1B max power output (MPE value?) Class 3R max power output (pulsed visible, pulsed and non-pulsed non-visible) Class 3B max power output (non-pulsed visible, and pulsed non-visible) Class 4 min power output (dependent upon class 3 ratings) <IP_ADDRESS> (talk) 14:04, 1 September 2011 (UTC) What is safe? There seems to be considerable disagreement on reasonable safety guidelines. The initial version of this article seemed to justify (or try to justify) practices which include systematic breaching of laser safety regulations. In particular, it was considered safe to routinely work without safety glasses, even when dealing with class-IV lasers, provided that some guidelines are followed. Surely such practices would be allowed by safety regulations if it could be convincingly shown that they are safe. However, for many reasons (some of which are now given in the modified article), they are not safe. A former colleague of mine worked exactly in this style (no glasses, but keep out of the experimental plane) with a 500-mW Nd:YAG laser. He was later told by a doctor that peripheral regions of both his retinas are burned. He had not noticed that, but with somewhat less luck it could have hit the central portion of the retina, blinding him for ever. He then changed his style; at earlier times, I had been unable to convince him to use his glasses. Even though most laser operators have probably at least sometimes breached some safety regulations, there is an important difference between occassionally breaching a rule oneself and publicly recommending such breaches to others as allegedly reasonable practices. The latter can hardly be considered responsible. Therefore, I strongly recommend not to return to a relaxed version before laser safety experts can be convinced to include such practices into official rules and guidelines. RPaschotta 13:38, 30 Oct 2004 (UTC) I do not believe the picture "Green laser – class IIIb compared to class IIIa" has any meaning compared to the issue of safety and should be removed. It contributes nothing of value to the topic. Prof Gall 22:14, 14 April 2010 (UTC) —Preceding unsigned comment added by ProfGall (talk • contribs) I think that after your edit, the article is reasonably NPOV, discussing both common practice and objections against it. (As opposed to earlier versions that could be read as promoting dangerous behaviour and then as moralizing). By the way, I think most operators are actually more careful with class 4 lasers. I haven't found a table that lists the exact tresholds for the different classes at various wavelengths, but the treshold for class 4 seems to be around 500 mW. Diffuse reflections from pieces of paper with 500 mW visible light are definitely unpleasant to have within your field of view -- and likely harmful as well, so people tend to be more careful with those. More philosophically, one could wonder where one should put the boundary between acceptable and unacceptable risks. The chance of dying from head injury is about the same for an hour of car driving as for an hour of cycling (quite low compared to other risks in either case). However, few find it reasonable to recommend helmets to car drivers. Laser accidents happen, but are not very common, and I have not heard about anyone who actually completely lost sight in an eye. The worst I know of is someone who damaged 30% of the central view area of one eye due to a reflection from a mixing crystal. Han-Kwang (talk) 15:54, 30 Oct 2004 (UTC) It appears to me that the recommendations made in 2004 have not been implemented. The text still appears to condone unsafe behavior. Eyewear must be worn when engineering or other controls are inadequate to eliminate the potential exposure in excess of the applicable MPE. There have been dramatic improvements in eyewear coatings in the past few years. Eyewear can now be tailored to block only the harmful wavelengths produced by a given laser. The eyewear is also lightweight and comfortable, so the old excuses no longer apply. In the US, your employer is mandated by law to provide you with the safety equipment mandated by the ANSI Z136.1-2000 standard. In the case of Class 4 lasers, this applies to the purchase of eyewear, signage, viewing aids and laser access control systems. 1sciguy 18:25, 6 April 2007 (UTC) * It's an open encyclopedia: go ahead and edit it. However, if you update it, make sure that it's NPOV - something that already lacks now. The article is really not supposed to tell the reader what to do and what not to do - but rather explain what are common practices and what official regulations are. Han-Kwang 19:23, 6 April 2007 (UTC) disputed It says most laser pointers are class II. Where's the evidence for this? They're class IIIa or IIIb. Class II lasers have minimal output intensity, like that from an LED. Also see my counterclaims at Talk:Laser. lysdexia 21:25, 21 Dec 2004 (UTC) * Agreed. In the UK and parts of Australia laser pointers are advertized as 1mW, or if you read the fine print "<1W" thus class 2. In the US and most other countries they are advertized as 5mW and have a sticker on them that says, "<5mW" and "CLASS III LASER PRODUCT." Zyxwv99 (talk) 02:50, 8 August 2013 (UTC) Laser proof curtain is necessary Blink reflex does not work when you look at sun behind a curtain. It also applies when we exposed to a laser behind a curtain however, it is still dangerous it will burn points where the picture of light holes focus in the retina. All fabric curtains have these direct holes. --Mahdig 31 October 2006 (UTC) * I'm not sure what you mean. Of course, a laser curtain should be made of a material that doesn't transmit any light, but not for the reason you mention. The images of the holes on your retina are too low in intensity to cause harm (For the record, I regularly hold pieces of tissue paper into multi-watt beams and watch them without any harmful effects). However, typically part of the beam will propagate into the same direction after going through the tissue or open fabric. If your eye is in that beam path, it will of course be very unhealthy, since that beam will be focused onto a single spot on the retina. Han-Kwang 23:59, 31 October 2006 (UTC) * You said, "The images of the holes on your retina are too low in intensity to cause harm". It will be true only when the harm of light is thermal. However, in visible light region, the harm of laser to retina is photochemical and the size of picture in retina does not change harm effect. about the test you have done that I think you mean that when you look at a lamp behind a tissue the flash blindness does not occur however it occurs but in the points with distance to each other so it is not so noticeable. The problem exists with ordinary plastic curtain, too. Because you can see bright light behind them that it means that, it has holes. --Mahdig 14:06, 1 November 2006 (UTC) I still have no clue what you are talking about. I see that you created an article Cutains and The blinking reflex containing the above comment. I strongly suggest that you add a diagram, remove the two spelling errors in the article, and add some context. As the new article is now it is non-encyclopedic and a very likely candidate for WP:AFD. Also please remember WP:NOR. Han-Kwang 14:42, 1 November 2006 (UTC) * May be you understand what I am saying if you use a cloth instead of a tissue (tissue holes is very small) and with dark color and put it in front of your eye when looking to a lamp. Mahdig 18:52, 26 November 2006 (UTC) * OK, you mean that a laser-shielding curtain should be absolutely light-tight. Agreed. But that doesn't have anything to do with the blinking reflex. Han-Kwang 19:36, 26 November 2006 (UTC) Assenment scale I'd say that this article definately needs an A-class or at least a GA-class rating on the assesment scale. I have nominated it for one of these ratings. G man yo 09:55, 28 February 2007 (UTC) * What do these classes mean? Pzavon 15:24, 28 February 2007 (UTC) Reasons for GA Failure Unfortunately I have failed this article as there are a few areas in which I would like to bring to attention to the editors of this article in order to hepefully bring it up to standaeds in the future. * 1) The name of the article (Laser safety) is not mentioned in the introduction and not emboldened as mentioned in WP:MOS * 2) Secondly, there are very few interwikis is the second half of the article, therefore once again it is not up to the standards of WP:MOS. * 3) The different classes for the old system and the revised system should be in subcategories instead of just emboldened as mentioned in WP:MOS. * 4) There are only 2 categories, I'm sure they could be a few more added. If this article was improved in the ways mentioned above and any other areas in which editors bring to attention then it may pass in future months/weeks. Telly addict 13:00, 3 March 2007 (UTC) Leakage of high-power IR pump beam from DPSS laser pointers? Anything authoritative on this issue? * (scroll down to "Yet Another caution note on DPSS laser pointers") * "It's also possible for a misaligned green pointer to let out IR while still throwing a green beam; that can happen if you drop them and their internal alignment goes bad." "(From The Physical and Theoretical Chemistry Laboratory Oxford University)" Which makes the whole section a copyvio... ed g2s &bull; talk 13:30, 9 August 2007 (UTC) * I'll try to rewrite the section one of these days. Han-Kwang 10:04, 10 August 2007 (UTC) Excellent in general, but lacking some necessary details The Class 1 and Class I limits are clearly stated in the abstract ==> laser exposure may not exceed the MPE. However, while Class 2 and Class II limits are correctly expressed the for *visible* light (which Class 2 and II are specific to) Class 3x and Class IIIx and higher classifications continue to assume visible light. For instance, I work with lasers which regularly emit powers greater than 10 mW but which are still Class 1 - according to this page they would only possibly be Class 3b and Class IIIb due to the clear statement for each that lasers emitting greater than 5 mW radiation are such. There is also a serious problem with an earlier statement (section titled Classification) that the relevant units for MPE are W or J, and switch to W/m^2 at wavelengths greater than 4 um. This is just wrong. The relevant units are always, specifically, radiant exposure (in J/cm^2) or irradiance (in W/cm^2) for both MPE evaluation and classification. Statements like, "output may not exceed 5 mW" are rules of thumb for point-source lasers (in this case for visible Class IIIa lasers) which have implicit assumptions about beam diameter, ocular aperture, aversion response time, etc. built in. Looking first for response. If I have time perhaps I'll try to improve this. <IP_ADDRESS>mjd 2007-10-29 16:42 EDT * You don't indicate where you are located and which jurisdiction's laser safety regulations you are working with. On the issue of whether a 10mW laser could be Class 1, I believe the US FDA/CDRH regulations are structured so that such a laser could not be Class 1. Pzavon 02:16, 30 October 2007 (UTC) * According to IEC60825-1, the accessible emission limits (AEL) for class 1 are 0.39 mW for visible light (-700 nm), 10 mW for 1400-4000 nm, and 1 kW/m2 above 4000 nm. In the range 700-1400 nm, there is a wavelength dependence. However, the wavelength and pulse duration dependence is -not surprisingly- just as complicated as for the MPE plots, and I don't think it is very meaningful to specify it in so much detail. In principle, classifying a laser and sticking the correct warning labels on a laser is the duty of a manufacturer, who surely has a copy of the regulations. The user of the laser just has to read the label "class 1" and understand that it is safe to use without eye protection, or "class 3B" and understand that it is dangerous. The article just gives a few example AEL values for common types of lasers. I will clarify that a bit, although it is for example clearly mentioned that the 5 mW limit for Class 3R is for visible, continuous lasers. I don't have access to the old classification (the IIIa description in the article does not mention the wavelength range.) Pzavon, do you have a copy of the US and/or old regulations? Are the MPE/AEL numbers the same as in the IEC standard (I have the 2007 revision)? Han-Kwang (t) 15:42, 30 October 2007 (UTC) Harm through eyelids I removed this: ''**When picking up something from the floor, closing the eye may not give sufficient protection against multi-watt laser beams, as the eye's lid is partially transparent, particularly for infrared light. Closing both eyes when kneeling becomes second nature and automatic for workers in such fields.''. Not only is the remark about the second nature a bit strange, but also the first part is not correct. Although the eyelid may not absorb near-IR light, it still scatters the laser light which prevents the light from being focused onto the retina. Of course, a 10 W beam with a 3 mm diameter will probably burn the eyelid and possibly damage the cornea underneath as well, but this is not a very likely situation in a research lab, where the smell of burning clothes, skin, and wall painting would have drawn attention before. Han-Kwang (t) 22:24, 1 November 2007 (UTC) * Burning sweater in my case. ;) --Chuck Sirloin 17:15, 2 November 2007 (UTC) Suggestion for additional reference I suggest to insert the following additional reference, which is a page of my own "Encyclopedia of Laser Physics and Technology": article on laser safety in the Encyclopedia of Laser Physics and Technology RPaschotta 16:34, 5 Nov 2007 (UTC) Edits on class 4 and treatment lasers Regarding these edits, I think I agree with Pzavon, both on how a class 4 laser can damage skin and on the suitability of therapy lasers for this article (i.e., not suitable). Therapy laser treatment seems to be an interesting topic though, that would probably be suitable for an article of its own with a bit more background on what kind of medical conditions this laser treatment would deal with. Han-Kwang (t) 00:46, 16 December 2007 (UTC) Old/new classification I think the sections on the old and new classifications should be merged. Most of the specifications overlap. I think there should be a small intro about the differences between the schemes, and then Class 1/I can be discussed together. IN the current version there's too much duplicate info. Han-Kwang (t) 18:01, 12 February 2008 (UTC) * I disagree. The systems are distinct and separate in that the old system has regulatory force in the US and not elsewhere. The "new" system is a revision developed primarily in the EU and being adopted elsewhere, including the US. The purpose of two sections is to make it clear and easy to see the range of each system and to recognize the differences. In the US, symbols and phrases from both can be encountered at the same facility. Even the use of Arabic vs Roman numerals is easier to show clearly with a separate listing. And the new classes (1M, 2M, and 3R) do not have a precise one-to-one relationship with the replaced classes (IIA and IIIB). Perhaps some text can be combined, but the Hazard Class numbers should be displayed as two separate sequences. Pzavon (talk) 03:28, 13 February 2008 (UTC) I will think about how to combine some text. The problem is that I am not familiar with the details of the old system to really be able to give an overview of the philosophies behind the two systems. Something else: your recent edit summary: The definition of Class 4 is based upon determinations of what will damage skin. I looked it up, thinking that it was "skin damage OR dangerous diffuse reflectios", but indeed, The IEC standard says about class 4: "...for which intrabeam viewing and skin exposure is hazardous and for which the viewing of diffuse reflections may be hazardous. (emphasis added) Apparently, also from the description of class 3B, a laser can be dangerous in diffuse reflections without causing skin damage, and vice versa. I'll clarify this. Han-Kwang (t) 13:05, 13 February 2008 (UTC) * Your assessment of the basic criteria for Classes 3B and 4 is correct. Pzavon (talk) 03:21, 14 February 2008 (UTC) The "old system" (quotes from article) has no information about when that classification system was in use, nor when the classification scheme changed. It also has a very old citation needed tag. The section should be fixed or removed. <IP_ADDRESS> (talk) 17:36, 24 February 2011 (UTC) Problem with Class 2 Caution label text provided at line 90 This illustration of a label claims that eye damage could result if a Class 2 beam is directed at the eye for more than 10 seconds. such a label seems "off" to me. I am not aware of any labels containing explicit time limits. Can anyone really familiar with practice in the EU say whether such a label is actually in wide use? Pzavon (talk) 23:42, 16 March 2008 (UTC) * I didn't notice this Talk message before, but indeed that was not correct. The text was modified here, and I undid it a while ago. Case closed. Han-Kwang (t) 18:41, 6 July 2008 (UTC) Laser pointer safety I have edited the laser pointer section to reflect that, although red laser pointers appear to be safe and this shouldn't be denied, the overall tone of the article should still emphasise laser safety and the dangers of lasers in general. The paragraph removed consisted solely of an implication that people who complained over laser pointer exposure were liars, fraudsters or crybabies, which isn't too value adding above a simple statement of the fact that damage is unlikely to occur.<IP_ADDRESS> (talk) 19:41, 14 April 2008 (UTC) In research enviroments I just rewrote the section about conventional practice in research labs because I felt it was too much POV-, essay- and howto-like. Unfortunately, this is a subject that everybody who works in this area seems to know, but nobody writes down, probably because of legal consequences, so it still looks a bit like original research. I know many people who have had laser-related eye injury in a lab. The worst case is someone who damaged 30% of one fovea, meaning he can't use that eye for reading. And then there are many people who have a small burn. I did once have the opportunity to visit the R&D department in a laser factory, and the procedures were pretty similar to what I've seen in many university labs (goggles are available but only worn during very specific high-risk procedures). Any suggestions for references? Han-Kwang (t) 18:07, 6 July 2008 (UTC) Re-nomination for GA article Now, I'm no expert, but the reasons for this article failing at getting "good article" status seem to have been fixed. "Laser Safety" in bold is the first phrase in the whole article, there seem to be alot of links to other articles, the classes and class levels are now sections, and it has 7 categories.G man yo (talk) 11:41, 2 November 2008 (UTC) Okay, I've re-decided, this article is not necessarily a "good article" yet, however has the potential to soon be. It needs more sources cited inside of the text, and it needs to cover a couple more topics in the lead, even if just briefly (such as protective eyewear). If these things are fixed, then I think it could pass. G man yo (talk) 14:50, 10 November 2008 (UTC) * The section on research environments is problematic. I actually wrote a large part of it and I am pretty sure that the conventions there are common place (also indicated by the absence of objections despite 400 page views per day), but for liability reasons they are not written down anywhere. Following Wikipedia policy, this section should really be removed per WP:OR, but I'd rather have that section in for education of the world and have an article without GA status. Han-Kwang (t) 19:00, 10 November 2008 (UTC) * I can understand that desire, but that is not what the Wikipedia is for (not a How-to manual, etc.) I'll try to look more closely later this week and see if I can rework it, but otherwise I support removal. Pzavon (talk) 22:34, 10 November 2008 (UTC) * It seems that I was too pessimistic when I thought nobody writes these things down. Googling for "laser-safety horizontal beams" and "laser safety jewellery" brings up a lot of links, most of them indeed university institutes. I added a number of references which seem to roughly cover what is in the article, but there might still be a couple of unsupported statements. Unfortunately the new references don't really prove that these guidelines are commonplace, only that there are a couple of institutes that use them. We really need a secondary source that claims that "most university laser labs do such-and-so". Han-Kwang (t) 09:00, 11 November 2008 (UTC) * Actually, I think this is an important section, it's main problem being that it is a little biased (especially the first sentence). Really, the main problem with this article is the lack of citations, especially in the classification sections. Also, the difference between classes 1 and 1M and between 2 and 2M are hard to find. G man yo (talk) 11:59, 11 November 2008 (UTC) * Thanks for noting that there wasn't a reference for the classification system. It is all in the IEC 60825 standard, which was cited somewhere else in the article. Han-Kwang (t) 19:39, 11 November 2008 (UTC) I would like to see a few changes before considering this a "good article": * More comprehensive coverage of the typical safeguards required by regulations, for example assignment of a laser safety officer (probably deserves a whole section), use of beam stops, training requirements. * Clear description of the mechanisms for injury. * Each laser class (especially for the "old system") doesn't need a section heading taking up room in the TOC. * WP shouldn't make recommendations, even behind the veil of the passive voice ("is recommended"). * I disagree with this, and it's not policy. See WP:HOWTO. WP would not be able to discuss the treatment of any disease, in that case. Nor even ISO 9000 standards. Recommendations exist in the real world as objective facts with reliable sources. S B Harris 19:18, 7 May 2010 (UTC) I can work on some of this, but unfortunately don't have access to the actual regulations to be able to know I'm being complete and to give references. The Photon (talk) 03:21, 12 November 2008 (UTC) Does wearing Glasses or Contact Lenses Increase Laser Damage to the Eye? Since glasses and contact lenses are meant to focus light, do they increase the damage by lasers to the retina? I heard someone one time wearing contact lenses the she was more sensitive to daylight light when she first put them on.<IP_ADDRESS> (talk) 09:03, 7 May 2010 (UTC)BeeCier * Yes, wearing corrective lenses for near-sightedness (myopia) would be expected to focus any light more narrowly, including laser light. I suppose in marginal cases, that extra might be enough to make a difference between damage and not. But the relative effect is so small compared with safety eyewear, it's not worth discussing much, I think. S B Harris 19:15, 7 May 2010 (UTC) * No. Corrective eyewear, only serves to correct the eye's native inability to do exactly the same job. <IP_ADDRESS> (talk) 13:20, 9 March 2011 (UTC) class of laser product VS class of laser It seems that the class of a laser product can be lower than the class of the laser it contains (e.g. a DVD burner is a class 1 laser product but IIRC tends to contain a class 3b laser). Does anyone have any more details on this? <IP_ADDRESS> (talk) 07:20, 15 June 2010 (UTC) * The class applies to the radiation that escapes to the outside world. Since the laser radiation is wholly contained within the DVD burner, there should be no external radiation, thus the burner is a class 1 laser product. However, if you open the casing such that the laser radiation can escape, then it would indeed be a class 3b laser. I have seen DVD video players that have a label inside the casing stating that the laser is a class 3 laser, but this does not seem to be the norm. DieSwartzPunkt (talk) 14:47, 17 February 2011 (UTC) Hazardous LEDs??? Can someone comment on the following label found (on of all things) a weather forcasting gadget. It shows the laser hazard symbol (as at the head of the article) with the following words. CAUTION LED RADIATION CLASS 2 LED PRODUCT POWER: <100MW WAVELENGTH: 470 nm The product has 3 LEDs on it but the label seems to apply only to the blue one. I assume that the power should have read "<100mW" as a 100Megawatt blue LED is going to take a heck of lot of power to drive it. It seems odd to put such a label on a product where the blue LED is positioned such that it's only purpose is to be seen. AFAICT, there are no lasers in it whatsoever. DieSwartzPunkt (talk) 14:43, 17 February 2011 (UTC) * From http://en.wikipedia.org/wiki/Light-emitting_diode * Safety and health * The vast majority of devices containing LEDs are "safe under all conditions of normal use", and so are classified as :"Class 1 LED product"/"LED Klasse 1". At present, only a few LEDs—extremely bright LEDs that also have a tightly :focused viewing angle of 8° or less—could, in theory, cause temporary blindness, and so are classified as "Class 2".[81] In general, laser safety regulations—and the "Class 1", "Class 2", etc. system—also apply to LEDs.[82] * <IP_ADDRESS> (talk) 18:59, 29 October 2011 (UTC) Consolidate Systems I don't think the old and new system headings need subheadings for each class within them. They should probably be consolidated, most notably the old system. The Photon mentioned this in an earlier section. In fact, the organization of the entire article is rather arbitrary. It seems like things could be grouped better and reorganized. G man yo (talk) 07:35, 27 January 2012 (UTC) External links modified Hello fellow Wikipedians, I have just modified 3 one external links on Laser safety. Please take a moment to review my edit. If you have any questions, or need the bot to ignore the links, or the page altogether, please visit this simple FaQ for additional information. I made the following changes: * Added archive https://web.archive.org/web/20071206152721/http://info.tuwien.ac.at:80/iflt/safety/section1/1_2.htm to http://info.tuwien.ac.at/iflt/safety/section1/1_2.htm * Added archive https://web.archive.org/web/20070823215211/http://isic.epfl.ch/load/laser_safety.pdf to http://isic.epfl.ch/load/laser_safety.pdf * Added archive https://web.archive.org/web/20100129073022/http://www.cisco.com:80/en/US/products/hw/optical/ps1923/products_tech_note09186a00800945f9.shtml to http://www.cisco.com/en/US/products/hw/optical/ps1923/products_tech_note09186a00800945f9.shtml Cheers.— InternetArchiveBot (Report bug) 19:13, 11 November 2016 (UTC) External links modified Hello fellow Wikipedians, I have just modified one external link on Laser safety. Please take a moment to review my edit. If you have any questions, or need the bot to ignore the links, or the page altogether, please visit this simple FaQ for additional information. I made the following changes: * Added archive https://web.archive.org/web/20071225083035/http://www.safety.vanderbilt.edu/safety_links/laser.htm to http://www.safety.vanderbilt.edu/safety_links/laser.htm Cheers.— InternetArchiveBot (Report bug) 17:35, 17 December 2017 (UTC) Correction of plot MPE versus wavelength Someone pointed out (over email, after 11 years) that there was an error in File:IEC60825 MPE J nm.png in the wavelength range 315-400 nm for exposure times > 1 ns. I have corrected the plot. I'm posting it here so that editors watching this page are aware of the change. Han-Kwang (t) 10:55, 17 October 2018 (UTC) Indirect laser light can damage camera sensors: https://www.reddit.com/r/photography/comments/ayua7d/tip_dont_record_laser_tattoo_removal/?limit=500 --<IP_ADDRESS> (talk) 19:08, 10 March 2019 (UTC) class rename and 2 missing classes Class 4 should be renamed to class 4a. class 4b: Small part reflections, like dust, which still looked fairly dim at 460 milliwatts, are the next eye hazard. class 5: The beam's appearance from the side in clean dry air, which still looked dim at 5.5 watts, is the last eye hazard. <IP_ADDRESS> (talk) 19:34, 21 April 2024 (UTC)
WIKI
de película Adjective * 1) awesome; smashing; top-notch Adverb * 1) wonderfully; really well
WIKI
DEV Community Cover image for Create a backend in Javascript (part 7): NodeJS Events and Streams Eric The Coder Eric The Coder Posted on Create a backend in Javascript (part 7): NodeJS Events and Streams Here is a series of articles to help you create backend applications in Javascript. Node.js is now a must, so it is essential for a developer to master it. I will publish a new article every two days and little by little you will learn everything there is to know about Node.js To not miss anything follow me on twitter: https://twitter.com/EricTheCoder_ Events Much of the Node.js kernel is built around an idiomatic event-driven asynchronous architecture in which certain types of objects (called "emitters") emit events that cause a "listeners" function call. The following example shows a simple EventEmitter with a single "listener" that occurs when, for example, a sale is made const EventEmitter = require('events'); const myEmitter = new EventEmitter() myEmitter.on('newSale', () => { console.log('A new sale occur') }) myEmitter.emit('newSale') Enter fullscreen mode Exit fullscreen mode The eventEmitter.on() method is used to register a "listeners", while the eventEmitter.emit() method is used to trigger the event. When the event is triggered, the content of the function callback will be executed console.log('A new sale occur') Enter fullscreen mode Exit fullscreen mode Pass arguments to listeners The eventEmitter.emit () method allows an arbitrary set of arguments to be passed to "listeners" functions const EventEmitter = require('events'); const myEmitter = new EventEmitter() myEmitter.on('newSale', (total) => { console.log(`A new sale occur total of: ${price}`) }) myEmitter.emit('newSale', 599.99) Enter fullscreen mode Exit fullscreen mode Node.js server works with an eventEmitter Now that we know about Node.js events. We are able to better understand the logic of the Node.js server object. const server = http.createServer() // Create an event called "request" server.on('request', (req, res) => { // Execute this code when the "request" event is trigger res.end('Request received') }) // this will loop and wait for events server.listen(5000, '127.0.0.1', () => { console.log('Waiting for request') }) Enter fullscreen mode Exit fullscreen mode Streams What are Streams? Streams are used to process (read and write) data piece by piece (chunks) without completing the entire read and write operation and also without keeping all the data in memory. Youtube or Netflix are good examples of Streams. You don't need to wait for the video to fully load. The process is done piece by piece (chunks). So you can start watching the media even if the entire file is not yet downloaded. In Node.js, there are "readable" Streams and "writable" Streams. Readable Streams can for example be a read file or an http request for data. Writable Streams is the opposite of Readable Streams so for example an http response or a file to send Here is an example of reading a large data file. const fs = require('fs') const server = require('http').createServer() server.on('request', () => { // No need to load the entire file to memory // fs.readFile('data.txt', (err, data) => { // if (err) console.log(err) // res.end(data); // }) // Create a Readable Streams const readable = fs.createReadStream('data.txt') // Pipe the Stream chunk to a writable Stream readable.pipe(res); }) Enter fullscreen mode Exit fullscreen mode The readable.pipe() method attaches a "writeable" Stream to the "readable", which automatically switches it to fluid mode and transfers all of its data to the attached "writable". The data stream will be automatically managed so that the destination "writable" Stream is not overwhelmed by a faster "readable" Stream. Conclusion That's all for today, follow me on twitter: https://twitter.com/EricTheCoder_ to be notified of the publication of the next article (within two days). Top comments (3) Collapse   salehmubashar profile image Saleh Mubashar thanks a lot eric, just what I needed to understand . Although i have a lot of experience in React, but now I know how to use it with Node too. Would really appreciate if u check out my profile too, i got a few React related posts too Once again thanks! Collapse   guipinheiro profile image Guilherme Pinheiro Hello! Thanks for the content, Eric. Just what I was needing to start my backend journey. Just one question. About the event example of using arguments, you use the parameter 'total' on the anonymous function, but when creating the output, you use 'price' as the variable on the template literal inside console.log(). It should be the same variable, right? Thanks again! Collapse   max10 profile image max10 Thanks, I've just read all. very interesting and educational
ESSENTIALAI-STEM
Thomas Shelby Thomas Shelby may refer to: * Thomas Shelby, musician in the American band Lakeside * Tom Shelby (fl. 1853, founder of Shelby, Mississippi, U.S. * Tommie Shelby (born 1967), American philosopher * Tommy Shelby, a fictional character from Peaky Blinders
WIKI
User:Given Mphiwa Tsela5 Given Mphiwa Tsela born 25 June 2000. He is from Eswatini, He's hometown is Manzini. Currently residing at Mahlangatja. He is the third born of Jimson Tsela (1962-2013) and Sphiwe Hlophe(1962-present). Did his primary education at Nyatsini Primary School from (2006 to 2012). Did his high school a Nyatsini High school (2013-2017). The following year he moved to redo his studies a Zamani High School(2018-2019). He has been always a lover of technology and it was no surprise that he was the first student a Zamani to ge a "B" grade on Infomation Technology.
WIKI
"It would be huge": U.S. border town confronts possible import tax NOGALES, Arizona (Reuters) - For up to 16 hours a day, tomatoes, peppers, cucumbers and mangoes grown in Mexico flow north through a border checkpoint into Nogales, Arizona, helping to ensure a year-round supply of fresh produce across the United States. This is a city built on cross-border trade. Each year, some 330,000 trucks and 75,000 train cars carrying $17 billion worth of goods move through Nogales, according to U.S. Customs and Border Protection. Economists estimate trade supports nearly one in three jobs here, ranging from workers who inspect the goods to forklift operators who unload them in distribution centers. In many ways, Nogales represents the flip side of free trade deals that have battered industrial cities in the Midwest, where jobs have been outsourced and manufacturing plants shut down. The cities where Donald Trump’s promise to throttle what he calls unfair competition resonated most profoundly during the presidential campaign. It also represents potential risks that new trade barriers could pose for businesses and residents along the border. Only a tall, rusted fence separates Nogales, Arizona, from Nogales, Mexico; the cities are so intertwined that locals call them by a single name, “Ambos Nogales” or “Both Nogales.” Now in office, Trump is considering a 20 percent tax on imports from Mexico, one of several ideas under review in Washington, and is promising to renegotiate the North American Free Trade Agreement. More than a dozen city officials, employers and workers interviewed here said a border tax, if enacted, could choke the flow of imports from Mexico. They described a chain of events that would harm the economy, threaten local jobs and lead to higher prices for U.S. consumers. “President Trump should take a good look at the effects of whatever he does, because he’s going to end up with a real problem,” said Nogales Mayor John Doyle, who joined other lawmakers from Arizona, New Mexico and Texas in denouncing the import tax plan in letters to U.S. lawmakers. Food, autos and electronics go both ways across the border checkpoint, sometimes more than once. Mexican mangoes and melons come north while California almonds and apples from Washington state go south. U.S. car parts sent to Mexican factories are imported back as finished vehicles. “There are hundreds of products that come back and forth through the port of entry in Nogales,” Doyle said. The Trump administration told Reuters that any tax deal would protect U.S. interests. “The American people can rest assured that any policy President Trump pursues will be designed to increase wages for American workers, reduce the U.S. trade deficit, and strengthen the economy so that it works for all,” a White House official said in an email. Since the 1994 implementation of NAFTA, trade between Mexico and the United States has risen more than six fold. Each country exported about $40 billion to the other in 1993. Last year the United States imported $294 billion in goods from Mexico and exported $231 billion back, U.S. Census data show. Nationwide, nearly 5 million jobs are now tied to trade with Mexico, from importers to jobs dependent on low-cost goods, according to a study by the non-partisan Wilson Center’s Mexico Institute. In Santa Cruz County, surrounding Nogales, the produce import industry and supporting businesses account for more than 22 percent of jobs, according to a 2013 report by economists at the University of Arizona. Trade and support for factories across the border account for another 10 percent of the workforce. The report’s lead author, Vera Pavlakovich-Kochi, said a 20 percent border tax would create the strictest barriers to trade in five decades. In addition to Trump’s proposal of a 20 percent tax on imports from Mexico, Republican lawmakers have put forth a plan that would cut corporate income tax to 20 percent from 35 percent, exclude export revenue from taxable income and impose a 20 percent tax on imports. The proposals have split Corporate America. A group of major exporters including Boeing Co, General Electric Co and Pfizer Inc have formed a coalition to support the import tax. At the same time, large retailers, including Target Corp and Best Buy Co Inc, have countered that such a tax would raise consumer prices and hurt their businesses. Seated in his second-floor office in a warehouse nestled in the rolling hills on the outskirts of town, produce trader Jaime Chamberlain said business with Mexico is the lifeblood of Nogales, which brings in more pounds of Mexican produce than any other U.S. border town. It’s “one of the largest industries here with the most employment and the most to lose,” said Chamberlain, a board member of the Fresh Produce Association of the Americas. He voted for Trump and his pro-business, socially conservative agendas, but is lobbying state leaders to oppose the tax. Chamberlain’s parents began the family business with a $1,000 loan in 1971. He and his sister now own J-C Distributing Inc, which employs about 25 people who handle 120,000 pounds of Mexican tomatoes each week for Taco Bell in addition to orders for major companies such as Kroger Co and Sysco Corp. The company warehouse is among more than six dozen such facilities on Interstate 19, just a few miles north of Nogales’ town square. In all, they bring in fruits and vegetables worth $3.3 billion a year, according to the Fresh Produce Association. Local officials, residents and economists warn that a tax could reverberate across the local economy. For example, a 20 percent border tax could put some of the $17 million in produce trade-related fees on custom brokerage, freight forwarding and truck permits at risk. “There are a lot of unintended consequences with this,” said Santa Cruz Board of Supervisors Chairman Manuel Ruiz. “There are domino effects all over. “ Many local business people expect Mexico to fight back. “A 20 percent tax could start a trade war with Mexico. I don’t see how we can impose that unilaterally,” said Ricardo Crisantes, vice president of marketing and sales at Wholesum Harvest, which is part of a Mexico-based company that has offices in Nogales and organic farms on both sides of the border. Company representatives said a border tax could drive the company to shift more farming to the United States, but it also could send import demand to other parts of Latin America that would bypass Nogales. Restaurant and store owners say the tax would make already tough times even worse. “It would be huge,” said Karla Galindo, 35, who owns Rancho Grande restaurant in Nogales with her husband. She and other local business owners said sales have already been hurt by the war of words between officials in Mexico and the United States. “People are afraid to spend their money,” Galindo said. Editing by Peter Henderson and Paul Thomasch
NEWS-MULTISOURCE
Bruker HOS Contato Analysis of Biotherapeutic Drugs Biologics and biosimilars, also known as biotherapeutic drugs, are produced from living organisms such as bacteria, yeast and mammalian cells: this is in contrast to small molecule drugs, which are synthesised chemically. This means that on top of being very large molecules (peptides, small proteins, antibodies, polysaccharides etc.), they exhibit post-translational modifications and certain degrees of structure variability. Confirmation of the identity of the therapeutic drug through structural characterisation, from the primary amino acid sequence to the higher order structure, together with impurity control are critical factors to ensure efficacy and patients safety. Disulfide bond (DSB) analysis and hydrogen deuterium exchange (HDX) have emerged as technologies that can be employed to gain insights into protein structure. These insights are critical for determining structural similarity for biosimilars, or for monitoring protein stability during drug development. The tertiary structure of therapeutic proteins is key to their activity and stability.  Research and development labs require technology capable of automated DSB analysis in biopharmaceuticals, based on a single digest of the unreduced protein and without prior knowledge of enzyme specificity or native DSBs. Due to the complexity of these proteins and the fact that they will contain multiple disulfide bonds, analysis is a challenge, often requiring several LC-MS runs with the tryptic digests from reduced and non-reduced protein and a manual comparison of these two analyses. NMR is especially sensitive to changes to higher order structure at atomic resolution, making it ideally suited for similarity assessment of biologics and biosimilars. NMR also allows for intact protein analysis, enabling evaluation of the structure of therapeutic drugs without modification, in conditions that are physiologically relevant. Fourier Transform Infrared (FT-IR) spectroscopy can be used to analyse water-soluble and membrane proteins such as nuclear receptors, which are currently a very important targets in drug research and development, being associated with conditions such as Alzheimer, Parkinson diseases, diabetes and obesity. Fast data acquisition and high sample throughput are some of the benefits of this technique. Infrared protein analysis is also relatively inexpensive and is a powerful technique used for formulation optimisation, stability studies during drug development and QC of protein drug products.
ESSENTIALAI-STEM
The ovenbird (Seiurus aurocapilla) is a small, migratory bird that belongs to the family Parulidae. It is roughly 5.5 inches long and weighs around 0.5 ounces. The bird’s most distinctive characteristic is the bold, striped pattern on its head, which resembles the domed roof of an old-fashioned oven, hence its name. The rest of the bird’s plumage is a dull olive-brown color, and its underparts are paler with a white belly. The ovenbird’s legs are relatively long and its bill is slightly curved, making it well-suited for its ground-dwelling habits. The ovenbird is a migratory bird that breeds in North America and winters in Central and South America. It is commonly found in deciduous and mixed forests, where it forages for insects and other invertebrates on the forest floor. During breeding season, male ovenbirds are known for their distinctive “teacher-teacher-teacher” song, which can be heard throughout the forest. The ovenbird is a solitary bird that generally does not form flocks outside of migration season. The ovenbird’s migration habits are relatively complex. During fall migration, some individuals will cross the Gulf of Mexico directly from the United States to wintering grounds in Central America. Others will take a longer, more coastal route down to South America. During spring migration, ovenbirds generally take a more inland route, flying over the Gulf of Mexico and then northwards into North America. In terms of conservation, the ovenbird is considered a species of least concern by the International Union for Conservation of Nature (IUCN). However, the bird’s population has declined in some areas due to habitat loss and fragmentation, as well as exposure to pesticides and other pollutants. Conservation efforts to protect the bird’s forest habitat and limit exposure to pollutants are ongoing. In conclusion, the ovenbird is a small, migratory bird with distinctive markings on its head that make it easy to identify. It is found in deciduous and mixed forests across North America, and winters in Central and South America. The ovenbird’s migration habits are relatively complex, with some individuals taking a direct route over the Gulf of Mexico and others following a more coastal route. The bird is generally considered a species of least concern, but is subject to population declines due to habitat loss and exposure to pollutants. Copyright 2024
ESSENTIALAI-STEM
Page:The mislaid uncle (IA mislaiduncle00raym).pdf/130 could he do with her? A sick man—that was one thing; but a sick little girl, that was quite another matter. She would have to go, he feared, and to lose her now would seem very hard. After all, she did not appear ill. She laughed and apologized so sweetly to her would-be-angry host that he forgot his indignation and forgave her on the spot. Only warned her gravely that he was a man who meant exactly what he said, and intended anybody belonging to him should do the same. One hour was never two; and, in case they never came across that missing uncle of hers, he supposed she would have to stay where she was until such time as her own parents could claim her; ending his lecture with the question: "Would she remember?" She'd promise to try and remember; and would he like to hear all about what a lovely, lovely time she had had? Did he know what snow felt like? Had he ever ridden and ridden till he couldn't see, and been dumped into high banks and buried underneath the soft, cold
WIKI
Page:The story of Mary MacLane (IA storyofmarymacla00macliala).pdf/42 like drunken little Bacchantes, gay and garlanded in mad revelling. The entire wonderful, graceful mechanism of my woman's-body has fallen at the time—like the wonderful, graceful mechanism of my woman's-mind—under the enchanting spell of a day in October. "It is good," I think to myself, "oh, it is good to be alive! It is wondrously good to be a woman young in the fullness of nineteen springs. It is unutterably lovely to be a healthy young animal living on this charmed earth." After I have walked for several hours I reach a region where the sulphur smoke has not penetrated, and I sit on the ground with drawn-up knees and rest as the shadows lengthen. The shadows lengthen early in October. Presently I lie flat on my back and stretch my lithe slimness to its utmost like a mountain lioness taking her comfort. I am intensely thankful to the Devil for my two good legs and the full
WIKI
Ticks as a floating point value on XP (not 2000) Discussion in 'Questions (Windows Mobile)' started by lancaster, Apr 8, 2008. 1. lancaster lancaster Member Licensed User I have a desktop application that saves a ticks value into a column in a table control (and also into a column value in a SQL Lite database). I then use this value when filtering records. On Windows 2000, the TicksColumn value is reported as an 18 digit string (as expected) however on XP the value is reported as a floating point value (e.g. 6.33432093 E+17). A simple MsgBox is used to determine this. Now when I compose a SQLlite Select statement with "... WHERE TicksColumm > '" & Calendar1.value & "'" the select doesn't return the expected records on XP but works as expected on Win 2000. Any ideas where the difference is introduced? Do I need set the TickColumn value with Format(Now,"D18") to ensure it is always held as a string? Are there other known gotchas with desktop apps on different platforms? T.I.A. Dave Lancaster   2. Erel Erel Administrator Staff Member Licensed User Try to remove the apostrophes from your query. They are only needed with strings. I don't know how to explain the difference between the two computers. Here on XP it shows the ticks as an 18 digits number.   3. lancaster lancaster Member Licensed User Erel, Thanks for reply. Have tried without apostrophies with no change. However I can now exlude any platform differences. I have proven with the enclosed test program that DateFormat("dd/mm/yyyy") MsgBox DateParse("13/04/2008") returns 633436416000 on Windows 2000 and XP when run interpretively under B4PPC. however it returns 6.33436416E+17 on Windows 2000 & XP when run as a compiled executable. The net result is that my application works 100% under B4PPC but not once it is compiled. Any further suggestions gratefully received. Dave Lancaster   4. BjornF BjornF Active Member Licensed User Seems to have something to do with the type of compilation Using XP and a non-optimized compiled version I get 633436416000, but when using an optimized compilation I end up with 6.33436416E+17 all the best / Björn   5. lancaster lancaster Member Licensed User Erel, Bjorn, The brain is now in gear ... and it is to do with the way that the result from DateParse() is cast by the machine. I now get the exponential form of response if I use int(dateparse("13/04/2008")) both as an executable and under B4PPC. Therefore I can now force my application to always use exponential tick values (floating point integers - what's that all about then?). So, the fix to the problem is 1) Use int() to force the result to be cast as E+nn format 2) Use Erel's original suggestion of dropping apostrophes from SQLlite SELECT statement to make sure value is always treated as numeric. (I suspect it was performing a string comparison before). One for the knowledgebase I think. Thanks. Dave Lancaster   Loading... 1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register. By continuing to use this site, you are consenting to our use of cookies. Dismiss Notice
ESSENTIALAI-STEM