Document
stringlengths
87
1.67M
Source
stringclasses
5 values
obesity-993126_1920.jpgDoes your belt need a new hole or two? Has that spare tire made it hard to see your toes? If so, there’s a good chance you’re among the 60 percent of Canadian now considered overweight. You may have attempted a diet or two in the past – any diet – and tried your luck at the game of losing weight. But if you’re like most people, permanent weight loss has eluded you. Most diets are simply too restrictive and unhealthy to be of any long term benefit to the body. They may have short-term results, but in the long run, the weight comes back in spades. Many nutritionists now promote the only regimen proven to work 100 percent of the time. Hold your breath, because here it is….wholesome food and exercise. If this sounds too simple, it’s because we’ve strayed too far into self-delusion. There’s simply no magical answer for our weight problems. We’ve been blinded by misleading advertising, dishonest authors, unhealthy pills and wacky gadgets. Just 60 minutes of daily exercise; a small portion of our overall weekly time, is associated with substantial reductions in body weight. Couple this with a wholesome diet and you provide the elements needed to win the battle. Here are some guiding principles to consider for good health and a leaner body: 1. Eat a balanced diet rich in fresh fruits and vegetables, nutritious grains like whole brown rice, oatmeal and whole wheat, dairy, grass fed beef chicken and eggs, legumes, seeds and nuts. Organic or naturally raised are best, as they’re richest in nutrients. 2. Stay hydrated.  Water helps to burn fat and speed up your metabolism. Pop, or other sugary drinks with their inherent high sugar content, are extremely unhealthy. 3. Change your oils. Monounsaturated fats and omega 3 fats found in cold water fish, avocados, raw nuts, seeds and olive oil dramatically improve health. 4. Avoid refined and simple sugars, and high glycemic load foods including sugary drinks, white flour, or white rice. 5. Avoid canned, boxed, fried and junk foods which are loaded with chemicals, starches and unhealthy fats. Even those with low fat claims should be avoided, as they lack the enzymes, nutrients and co-factors necessary for long-term good health. 6. Don’t supplement a poor diet to make it healthy. Wholesome foods cause specific hormonal responses which are healing to the body. Whole food supplements (made from concentrated whole foods) should be used to augment an already healthy diet. 7. Exercise for health and weight loss. Include resistance training, functional exercises, core training and stimulating cardio in your program. We can continue to debate the merits of different diets, but until we start abstaining from unhealthy foods and stop living sedentary lifestyles, we’re going to increase in national girth. Losing weight in the long run requires sensible changes, not restrictive fads. Not only is this a healthier, more energetic way to live, but it’s an investment in yourself.
ESSENTIALAI-STEM
The United Kingdom held a general election on May 7. Members of the public voted in local elections that determined which political party would lead the UK’s House of Commons. The House of Commons is part of Parliament, the lawmaking body of the UK. There are 650 Members of Parliament (MPs) in the House of Commons. A party needs to win 326 seats to claim a majority, allowing that party to set the agenda. However, five major parties took part in the election. If no party won a majority, then parties would have to join together to create a majority. That is called a coalition. Many polls predicted that this would occur. Instead, the Conservative Party won 331 seats to claim the majority. The result also meant that current Prime Minister David Cameron will keep his position. Photo of the UK Houses of Parliament by alice-photo/Shutterstock.
FINEWEB-EDU
URL of this page: https://medlineplus.gov/genetics/condition/factor-xiii-deficiency/ Factor XIII deficiency Description Factor XIII deficiency is a rare bleeding disorder. Researchers have identified an inherited form and a less severe form that is acquired during a person's lifetime. Signs and symptoms of inherited factor XIII deficiency begin soon after birth, usually with abnormal bleeding from the umbilical cord stump. If the condition is not treated, affected individuals may have episodes of excessive and prolonged bleeding that can be life-threatening. Abnormal bleeding can occur after surgery or minor trauma. The condition can also cause spontaneous bleeding into the joints or muscles, leading to pain and disability. Women with inherited factor XIII deficiency tend to have heavy or prolonged menstrual bleeding (menorrhagia) and may experience recurrent pregnancy losses (miscarriages). Other signs and symptoms of inherited factor XIII deficiency include nosebleeds, bleeding of the gums, easy bruising, problems with wound healing, bleeding after surgery, and abnormal scar formation. Inherited factor XIII deficiency also increases the risk of spontaneous bleeding inside the skull (intracranial hemorrhage), which is the leading cause of death in people with this condition. Acquired factor XIII deficiency becomes apparent later in life. People with the acquired form are less likely to have severe or life-threatening episodes of abnormal bleeding than those with the inherited form. Frequency Inherited factor XIII deficiency affects 1 to 3 per million people worldwide. Researchers suspect that mild factor XIII deficiency, including the acquired form of the disorder, is underdiagnosed because many affected people never have a major episode of abnormal bleeding that would lead to a diagnosis. Causes Inherited factor XIII deficiency results from mutations in the F13A1 gene or, less commonly, the F13B gene. These genes provide instructions for making the two parts (subunits) of a protein called factor XIII. This protein plays a critical role in the coagulation cascade, which is a series of chemical reactions that forms blood clots in response to injury. After an injury, clots seal off blood vessels to stop bleeding and trigger blood vessel repair. Factor XIII acts at the end of the cascade to strengthen and stabilize newly formed clots, preventing further blood loss. Mutations in the F13A1 or F13B gene significantly reduce the amount of functional factor XIII available to participate in blood clotting. In most people with the inherited form of the condition, factor XIII levels in the bloodstream are less than 5 percent of normal. A loss of this protein's activity weakens blood clots, preventing the clots from stopping blood loss effectively. The acquired form of factor XIII deficiency results when the production of factor XIII is reduced or when the body uses factor XIII faster than cells can replace it. Acquired factor XIII deficiency is generally mild because levels of factor XIII in the bloodstream are 20 to 70 percent of normal; levels above 10 percent of normal are usually adequate to prevent spontaneous bleeding episodes. Acquired factor XIII deficiency can be caused by disorders including an inflammatory disease of the liver called hepatitis, scarring of the liver (cirrhosis), inflammatory bowel disease, overwhelming bacterial infections (sepsis), and several types of cancer. Acquired factor XIII deficiency can also be caused by abnormal activation of the immune system, which produces specialized proteins called autoantibodies that attack and disable the factor XIII protein. The production of autoantibodies against factor XIII is sometimes associated with immune system diseases such as systemic lupus erythematosus and rheumatoid arthritis. In other cases, the trigger for autoantibody production is unknown. Inheritance Inherited factor XIII deficiency is considered to have an autosomal recessive pattern of inheritance, which means that it results when both copies of either the F13A1 gene or the F13B gene in each cell have mutations. Some people, including parents of individuals with factor XIII deficiency, carry a single mutated copy of the F13A1 or F13B gene in each cell. These mutation carriers have a reduced amount of factor XIII in their bloodstream (20 to 60 percent of normal), and they may experience abnormal bleeding after surgery, dental work, or major trauma. However, most people who carry one mutated copy of the F13A1 or F13B gene do not have abnormal bleeding episodes under normal circumstances, and so they never come to medical attention. The acquired form of factor XIII deficiency is not inherited and does not run in families. Other Names for This Condition • Deficiency of factor XIII • Deficiency, Laki-Lorand factor • Fibrin stabilizing factor deficiency Additional Information & Resources Genetic and Rare Diseases Information Center Research Studies from ClinicalTrials.gov Scientific Articles on PubMed References • Biswas A, Ivaskevicius V, Thomas A, Oldenburg J. Coagulation factor XIII deficiency. Diagnosis, prevalence and management of inherited and acquired forms. Hamostaseologie. 2014;34(2):160-6. doi: 10.5482/HAMO-13-08-0046. Epub 2014 Feb 7. Citation on PubMed • de Jager T, Pericleous L, Kokot-Kierepa M, Naderi M, Karimi M. The burden and management of FXIII deficiency. Haemophilia. 2014 Nov;20(6):733-40. doi: 10.1111/hae.12474. Epub 2014 Jul 17. Citation on PubMed • Kohler HP, Ichinose A, Seitz R, Ariens RA, Muszbek L; Factor XIII And Fibrinogen SSC Subcommittee Of The ISTH. Diagnosis and classification of factor XIII deficiencies. J Thromb Haemost. 2011 Jul;9(7):1404-6. doi: 10.1111/j.1538-7836.2011.04315.x. No abstract available. Citation on PubMed • Levy JH, Greenberg C. Biology of Factor XIII and clinical manifestations of Factor XIII deficiency. Transfusion. 2013 May;53(5):1120-31. doi: 10.1111/j.1537-2995.2012.03865.x. Epub 2012 Aug 28. Citation on PubMed • Muszbek L, Bagoly Z, Cairo A, Peyvandi F. Novel aspects of factor XIII deficiency. Curr Opin Hematol. 2011 Sep;18(5):366-72. doi: 10.1097/MOH.0b013e3283497e3e. Citation on PubMed • Schroeder V, Kohler HP. Factor XIII deficiency: an update. Semin Thromb Hemost. 2013 Sep;39(6):632-41. doi: 10.1055/s-0033-1353392. Epub 2013 Aug 8. Citation on PubMed The information on this site should not be used as a substitute for professional medical care or advice. Contact a health care provider if you have questions about your health.
ESSENTIALAI-STEM
AfterDeath AfterDeath is a 2015 horror film directed by Gez Medinger and Robin Schmidt, produced by Cameron Lawther. It stars Miranda Raison, Sam Keeley, Daniella Kertesz, Elarica Johnson and Lorna Nickson Brown as five twentysomethings who mysteriously end up in a remote cabin by the sea following a nightclub fire. Plot Strong willed and organised Robyn wakes up unexpectedly on a strange beach. Panicked and with strange supernatural events happening around her she runs to a small cabin not far away. There she finds Seb is enjoying himself in a threesome with outgoing Patricia and the youngest, kind-hearted, Livvy. Uncertain of where she is she speaks to the three and finds out that they are in some sort of afterlife following the collapse of a roof in an overcrowded nightclub. Suddenly quiet and shy Onie appears out of no-where, suggesting she may be teetering between life and death. Clues are provided by the cabin itself, the different rooms, and two paintings inside the cabin. Whilst the five get to know each other tensions flare as they try and work out why they are all there. A nearby lighthouse causes them all to have terrifying flashbacks accompanied by deafening sounds. Any attempt to walk away from the cabin towards the lighthouse is met by them somehow ending back up at the hut. Despite Onie trying to self-harm, and the girls trying to kill Seb, it appears they can no longer 'die' again as they are already dead. A supernatural being of unknown power, manifesting as black smoke, takes over the bodies of Seb and Robyn at various points. As time passes the 'bubble' they are trapped in slowly grows smaller around the cabin, which contains different rooms from each of the occupants lives. It is determined that the house is a single occurrence of a cosmic test which everyone must undergo upon death (each group of deceased people encountering a unique house but the same test), with the solution being not to sin again having reached the tabula rasa ("blank slate") house. It is also determined that no one has ever passed the test, that everyone outside the bubble is in Hell, and that Heaven is empty because of this. Onie reappears and disappears for one last time having decided to live, leaving a blanket to control the smoke monster. Livvy uses the blanket to make Robyn possessed, revealing that she figured out Robyn's sin (she was the night club manager who let too many people in and caused the collapse) and convincing her to use the demon power to take Livvy to Heaven (hoping it will cause a destruction of all afterlife, harking back to a saying Patricia's father had said about Heaven being destroyed if a sinner were to enter). Upon destruction of the afterlife, Hell would theoretically also be destroyed, freeing every soul who ever died from it. At the end the bubble closes on itself and the film ends abruptly, with the result of Livvy's plan left ambiguous. Cast * Miranda Raison as Robyn * Sam Keeley as Seb * Daniella Kertesz as Onie * Elarica Johnson as Patricia (credited as Elarica Gallacher) * Lorna Nickson Brown as Livvy Filming location The lighthouse in the film is the Happisburgh Lighthouse in Happisburgh, on the North Norfolk coast of eastern England. Critical response The film received mixed reviews critically, scoring well for originality, but failing to deliver on early promise plot-wise.
WIKI
User:Jeremy Sylvester/sandbox/Jeremy Sylvester Jeremy Sylvester is an internationally renowned House & Garage DJ, having been an early pioneer of the genre in the UK. Sylvester has three UK Top 20 singles and has sold over 4 million records worldwide. From the early 90s Jeremy became a fixture in many of the UK's biggest dance music labels, such as Nice 'N' Ripe and Azuli Records. As an in-house producer for both labels, Sylvester launched the careers of performers such as Shola Ama and Kristine Blonde, as well as creating a bank of timeless garage hits as part of the legendary production crew, Club Asylum. He continues to produce prolifically. His catalogue of over 700 original tracks since 2010 alone, gets bigger by the month. Jeremy has already released two EPs in 2017, with two more scheduled for release before the end of the year. One of Jeremy's more recent achievements is the creation of Urban Dubz, the global music PR company and record label under which his most recent EPs have been released. In addition to holding a vast catalogue of records taking in the full spectrum of dance music, Urban Dubz has clients all over the world.
WIKI
User:Wsnyder0080/ENES-100/project 3 number 1 choice is rube goldberg number 2 choice is toys number 3 choice is costume Week1 Narrative recieved new projects and teammates and individual tasks here is the associated week 1 /CDIO/ page Week2 Narrative compared and submitted designs for approval, began work on building rube goldberg parts. here is the assoiciated /week 2 CDIO page/ Week3 Narrative combined the rube goldberg parts here is the associated /CDIO page/ Week4 Narrative all three parts were tested together here and CDIO pages combined here combined CDIO pages here is the week 4 CDIO page
WIKI
Gross ecosystem product The Gross Ecosystem Product (GEP) is an innovative metric developed to account for the economic value of ecosystem services within broader economic evaluations, traditionally measured by Gross Domestic Product (GDP). While GDP provides a quantitative measure of all goods and services produced economically within a country, it does not consider the ecological services that underpin economic output. GEP addresses this oversight by measuring the contribution of ecosystems through direct products, regulation services such as climate control, and cultural services like tourism. Overview and application China introduced a national standard for GEP in 2020, integrating ecological values into its economic assessment framework. This initiative has led to its adoption at several governmental levels. By 2023, 15 local governments in China had developed guidelines to implement GEP, initiating approximately 200 related projects. In Zhejiang, the first province to implement these rules, the performance of local officials is evaluated in part by the economic values assigned to local ecosystems, such as a US$43 million value attributed to the Chengtian Radon Spring Nature Reserve. GEP is also used in economic modeling to provide a comprehensive view of the interplay between economic and ecological health. For example, the MAGNET model, developed by the Joint Research Centre (JRC) and Wageningen Economic Research, incorporates GEP to analyze how policies can simultaneously affect economic output and ecosystem conditions. This model helps policymakers make informed decisions that strive to harmonize economic development with environmental sustainability. The ongoing development of GEP aims to improve its precision and practicality in economic and environmental policy-making. By assigning monetary values to ecosystem services, GEP facilitates a deeper understanding of their critical role in sustainable economic development. This approach ensures that strategies for economic growth also support ecological well-being, emphasizing a balanced approach to development.
WIKI
Comedy Playhouse (American TV series) Comedy Playhouse is an American anthology television series that aired on CBS in the summer of 1971. The 30-minute episodes consisted of unsold television pilots. Background The practice of television executives of ordering dozens of pilots for proposed television series each year – far more than their networks could possibly broadcast as series – created a sizable body of unsold pilots that had never aired. Packaging these unsold pilots in anthology series and airing them during the summer provided television networks with a way of both providing fresh programming during the summer rerun season and recouping at least some of the expense of producing them. Comedy Playhouse was one of these series, aired by CBS in the summer of 1971, and it consisted of unsold pilots for four situation comedies and one hidden camera reality television show. Stars appearing in the series included Janet Leigh, McLean Stevenson, Phil Silvers, Elke Sommer, Michael Landon, Dick Martin, Rose Marie, and Peter Marshall. Broadcast history Comedy Playhouse ran for five episodes over the course of six weeks in the summer of 1971, airing on CBS from 8:00 to 8:30 p.m. Eastern Time on Sunday evenings. It premiered on August 1, and its last episode aired on September 5. The episode scheduled for August 15 was preempted by an address by President Richard Nixon and was rescheduled for September 5. Episodes SOURCES
WIKI
A Kiss of Shadows A Kiss of Shadows is an erotic horror novel by American writer Laurell K. Hamilton, the first book in the Merry Gentry series. Plot introduction A faerie princess turned private investigator in a world where faeries are not only known to the general public, but are also popular, the heroine is Princess Meredith NicEssus. As niece to Andais, The Queen of Air and Darkness, she is a royal of the Unseelie Court, however having fled the court three years before she has been hiding herself under the name of Merry Gentry and working as a private investigator for the Grey Detective Agency. Plot summary The story begins in Los Angeles, California, in a world where magical creatures are "out of the closet" and, in some cases, even legal. Princess Meredith NicEssus is working for the Grey Detective Agency under the assumed name of Meredith 'Merry' Gentry. When two women come to the agency with a story about fey-wannabes and rituals involving fey women, Merry goes undercover to investigate. However, she and her colleagues get more than they bargained for when it is discovered that the culprit is using Branwyn's Tears, an illegal oil that can make a human appear as a sidhe (pronounced 'shee') lover for a night, and turn even a sidhe or a sidhe-descendant into his sexual slave. In the process of solving the case, Merry's secret is revealed, and she is hunted by the demonic Sluagh. Brought to see their King, Sholto, he offers Meredith a deal. Himself disapproved of by Andais, Queen of Air and Darkness, because of his mixed blood, he proposes an alliance between the two of them. Jealous at the idea of Merry becoming his lover, Sholto's harem of nighthags attack Merry. During the fight Merry's gift, the Hand of Flesh, is revealed when one of them, Nerys, turns into a ball of flesh. Shocked, Merry tries to flee, but is trapped. Doyle, Captain of the Queen's Raven Guard, appears. He announces that the Queen never sent the Sluagh, and that in fact the Queen meant her no harm. As proof of this he produces the Queen's sword Mortal Dread, as well as the Queen's mark, which he transfers to Merry in a kiss. Merry returns with Doyle to the Court. The Queen claims that she wants her bloodline to continue upon the throne. She is willing to take as her heir whichever of Meredith or her cousin, Cel, can first produce an heir. She lifts the geiss of celibacy upon her Ravens for Meredith alone, insisting that she choose at least three in order to increase the chance of pregnancy. While this offer would permit Merry to end her self-imposed exile and return home, it also brings dangers. Cel, previously the sole heir, makes several attempts upon her life. Merry makes alliances with others such as Kurag, the Goblin King. However, Cel was behind the Branwyn's Tears incident in LA. In punishment, he is to be confined for six months after being coated with the oil himself, something akin to torture. Major characters A Kiss of Shadows features the following major characters: * Andais - Queen of Air and Darkness, Merry's aunt, the sister of Essus, and mother of Cel. Andais is a war goddess, and the sadistic Queen of the Unseelie Court. Her personal guard, called the "Queen's Ravens" is composed exclusively of men. Although she is a sadist and is widely believed to be insane, Andais appears to have the best interests of the Court at heart and has sworn to abdicate her throne in favor of whichever of Cel or Merry can demonstrate themselves capable of producing new sidhe children. Her current consort is Eamon. * Barinthus - A sea god and one of the Queen's Ravens, Barinthus is one of the most powerful members of the Courts. He has long been called the "Kingmaker" for his involvement in the selection of court rulers. He supported first Essus and now Merry for the Unseelie throne. * Cel - Prince of Old Blood and son of Andais. His personal guard is made up entirely of women. * Doyle - Captain of the Queen's Ravens. Often referred to as the Queen's Darkness (or simply as my Darkness by the Queen.) * Frost - Doyle's second-in-command, one of the Queen's Ravens. Often referred to as Killing Frost. * Galen - The youngest member of the Queen's Ravens and also Merry's best friend. Lineage is half-pixie and half Unseelie sidhe. Powers include subtle ability to have everyone like him. Extremely unpolitical, naive and idealistic. He is the voice of childhood reasoning for Merry. Unfortunately, letting go of those ideals is allowing Merry to survive. * Jeremy Grey - Owner of the Grey Detective Agency, Trowe. * Kitto - Goblin/sidhe/snake hybrid, given to Merry by Kurag as part of their alliance. * Kurag - King of Goblins, Merry's ally. Was ally of Merry's father prior to his death. Has a conjoined twin that is attached to the side of his head. When formally addressed by Merry, she addresses both Kruag and his twin. * Meredith NicEssus/Merry Gentry - Title heroine, Princess, Daughter of Essus. * Nicca - One of the Queen's Ravens, and a spy for Queen Andais. * Rhys - Raven, former God of Death. Film Noir buff. * Sholto - King of the Sluagh, One of Queen Andais' Ravens. * Siobhan - Captain of the King's Guard, Cel's right hand and personal Killer. Can kill with a touch. Other characters Recurring characters include: * Barry Jenkins - Human newspaper reporter. * Black Agnes - Nighthag, Member of the Sluagh and Sholto's lover. * Ringo - Formerly a human gang member, but turned fae after saving some sidhe who ended up in the wrong place at the wrong time. * Griffin - One of the Queen's Ravens, Merry's ex-fiancée * Prince Essus - Unseelie Sidhe, Merry's father, Andais' brother. * Besaba - Seelie Sidhe, Merry's mother, who is part brownie part sidhe. * Queen Niceven - Queen of the demi-Fey * Eamon - One of the Queen's Ravens, Consort of Queen Andais, father of Prince Cel. Now works for the Grey Detective Agency. * Roane Finn - Merry's lover and colleague at the Grey Detective Agency, a Roan or Selkie * Segna the Gold - A nighthag and member of the Sluagh. * Teresa - The Grey Detective Agency's resident psychic * Uther - A Jack-in-Irons who works for the Grey Detective Agency. Non-recurring characters include: * Alistair Norton - Fae wannabe * Eileen Galan - Lawyer * Gethin - one of the Sluagh * Frances Norton - Wife of Alistair Norton who approaches the Grey Agency for help with a death spell. * Keelin - a Brownie who was Merry's childhood friend and is now Cel's lover. * Lucinda Tate - Detective * Maury Klein - Security specialist * Naomi Phelps - Lover of Alistair Norton who approaches the Grey Agency for help * Nerys the Grey - A nighthag and member of the Sluagh. * Raimundo Alvera - Detective * Conri - One of the Queen's Ravens The death toll in A Kiss of Shadows includes: * Alistair Norton - Killed by being eaten by spiders * Nerys the Grey - Killed by Merry when Hand of Flesh appears. * Pasco - One of the Queen's Ravens. Died during attack on Merry, turned inside out and joined to twin Rozwyn. Tossed down the endless pit * Rozenwyn - Died during attack on Merry. turned inside out and joined to twin Pasco. Tossed down the endless pit
WIKI
Talk:Instant Recall/GA1 GA Review The edit link for this section can be used to add comments to the review.'' Reviewer: Aoba47 (talk · contribs) 03:37, 30 January 2018 (UTC) * Grabbing for review. Aoba47 (talk) 03:37, 30 January 2018 (UTC) * Lead and infobox * I would remove the references in the lead. The information and sources should already be present in the body of the article. As a rule of thumb, references are primarily included in leads for more “controversial” bits of information. * . --Bcschneider53 (talk) 05:26, 30 January 2018 (UTC) * I would make the final air date clear in the lead. * ✅. --Bcschneider53 (talk) 05:26, 30 January 2018 (UTC) * For this part (The series premiered on), I would just say (It premiered on) for simplicity. * ✅. --Bcschneider53 (talk) 05:26, 30 January 2018 (UTC) * I would include information about the show’s reception in the lead. * ✅. --Bcschneider53 (talk) 05:26, 30 January 2018 (UTC) * Please include ALT text for the infobox image. * ✅. --Bcschneider53 (talk) 05:26, 30 January 2018 (UTC) * Gameplay * Please provide ALT text for the image. * ✅. --Bcschneider53 (talk) 05:26, 30 January 2018 (UTC) * For the image caption, I would include the year in which it was taken. * ✅. --Bcschneider53 (talk) 05:26, 30 January 2018 (UTC) * For the image caption, I think it would be more appropriate to say “a co-host” as he was not the only host of the show. * ✅. --Bcschneider53 (talk) 05:26, 30 January 2018 (UTC) * For this part (also features several additional main), remove “also” as it is not needed. * ✅. --Bcschneider53 (talk) 05:26, 30 January 2018 (UTC) * For this sentence (At first, the contestant does not know he or she is being filmed or even on the show itself.), I would use a different transition then “At first” as the previous sentence already used “first” in the phrase “with the first” so it is a little too repetitive. * ✅. --Bcschneider53 (talk) 05:26, 30 January 2018 (UTC) * I am not certain about the tone of this section (At the end of the scenario, one of the actors asks the contestant, "Do you like game shows?", after which Martindale appears to reveal to the contestant that he or she is on a hidden camera game show.). It reads a little too sensational for my taste, particularly the language such as “to reveal”, and I would bring the tone down to make it more appropriate for Wikipedia. * ✅? Let me know if it still needs improvement on your second run-through. --Bcschneider53 (talk) 05:26, 30 January 2018 (UTC) * There are a few sticky areas of prose in this section, where the ideas do not quite transition together as cohesively as they could. I would suggest doing a small copy-edit on this part with a focus on making stronger transitions between the ideas. * ✅? Ditto above. --Bcschneider53 (talk) 05:26, 30 January 2018 (UTC) * Production * How is this part (who had previously been involved with the hidden camera show Punk’d) relevant to this particular article? Unless a source drew comparisons between Punk’d and this show, it is not really relevant here. * The reference was made in GSN's press release. --Bcschneider53 (talk) 05:26, 30 January 2018 (UTC) * The phrase “Executive Producers” should not be in caps. * . --Bcschneider53 (talk) 05:26, 30 January 2018 (UTC) * This part (airing eight episodes in total.) requires a citation. * ✅. --Bcschneider53 (talk) 05:26, 30 January 2018 (UTC) * Is there any way to expand this section further? Just wanted to ask as this section is rather short. * Tried my best, again, not much out there for an eight-episode series that wasn't as heavily promoted as other GSN shows. --Bcschneider53 (talk) 05:26, 30 January 2018 (UTC) * Reception * I would add more context about Carrie Grosvenor to identify who she is for an unfamiliar reader. * ✅. --Bcschneider53 (talk) 05:26, 30 January 2018 (UTC) * I would include information on the time and day in which the show was initially broadcast. * ✅. --Bcschneider53 (talk) 05:26, 30 January 2018 (UTC) * See also * I am not sure if this section is necessary. It borders a little on original research, unless you have sources that make the comparisons between this show and those other two shows. I would remove this. * . Oblivious, kept Hidden Agenda (both are GSN hidden-camera shows that debuted within months of each other, leading many to make comparisons. --Bcschneider53 (talk) 05:26, 30 January 2018 (UTC) * References * Make sure that all of the work/publisher parameters are linked in the citations. For instance, CNN should be linked in Reference 6. * ✅. --Bcschneider53 (talk) 05:26, 30 January 2018 (UTC) * Suggestions for further resources * Here are some suggestions for sources that may be helpful for this article (1, 2, and 3) * . --Bcschneider53 (talk) 05:26, 30 January 2018 (UTC) * Final comments * Once my comments are addressed, I will give this another read and add some more comments. Aoba47 (talk) 04:12, 30 January 2018 (UTC) * Ready for another run-through. Many thanks again. --Bcschneider53 (talk) 05:26, 30 January 2018 (UTC) * After reading through it another time, I think that it is ready for GA, so I will promote it. Good work with it! Aoba47 (talk) 14:57, 30 January 2018 (UTC)
WIKI
Add the SliceZone to your project The Slice Zone component is used to insert your component libraries in to the page. Adding the power of Slicemachine where you need it. Create a [uid].js file in your page folder Create a new [uid].js file at the root of your page folder that will dynamically generate pages with the different components. Import the necessary dependencies in your [uid].js file You can add the Slice Zone component to a new page called [uid].js by adding the following code, here we have specified this Prismic custom type 'page' and this page's route will dynamically be populated by the URL. Copy import { Client } from '../prismic' import SliceZone from 'next-slicezone' import { useGetStaticProps, useGetStaticPaths } from 'next-slicezone/hooks' import resolver from '../sm-resolver.js' const Page = (props) => <SliceZone {...props} resolver={resolver} /> // Fetch content from prismic export const getStaticProps = useGetStaticProps({ client: Client(), uid: ({ params }) => params.uid }) export const getStaticPaths = useGetStaticPaths({ client: Client(), type: 'page', fallback: true,// process.env.NODE_ENV === 'development', formatPath: ({ uid }) => ({ params: { uid }}) }) export default Page
ESSENTIALAI-STEM
Posts Tagged ‘networking’ Howto Mac OS X Time Machine Backup to a Network Drive I do not own a Time Capsule, I do not plan to get one, nor do i want to connect a usb disk every time i feel like making a backup of my stuff. What i do have however is a wireless network and a Windows 7 PC. Why not use the available disk space in my PC for the backups of my Macbook Pro? I found out how to Time Machine Backup to a Network Drive… In Snow Leopard it was still possible with a few tweaks and manual image file creation to get the OS to actually backup over the Network onto a Windows NTFS disk. Hoozah! In Lion (MacOSX 10.7.2) there is even another step required to get the backup process running. Using just step 1 it will fail with the message ‘The network backup disk does not support the required AFP features’. 1. So besides the same steps as in Snow Leopard to prepare the Backup Image File (my previous post) you will also need to… 2. Download and run the script from this file to modify backupd in such a way that it accepts remote disk on the network share: backupd_anyafp_r2 – just unpack and run ./install.sh from the terminal. Thanks to msft.guy for the script! PS: I still get the feeling that the backup of a FileVault encrypted home directory even on Lion still doesn’t work while being logged in. Meh. Correction: I had to switch to FileVault2. Now the whole disk is encrypted and my guess is Time Machine can handle that… What if I still can’t find my share in TimeMachine? (added 24. Jan. 2013) Here is a checklist what I would try then: 1. close the preferences or even reboot after running the script above. 2. Find out your Computer Name: 1. Go to Apple menu > System Preferences and click Sharing. 2. Note the computer name appearing at the top of the window. – For example “ZergasMacbook”. 3. Find your MAC address: 1. In Apple menu, select System Preferences... 2. From the View menu in System Preferences, select Network. 3. In the left column of the Network preference window that opens, click the name of your connection ( Ethernet or Built-in Ethernet). 4. Click the Advanced... button, and in the dropdown, click the Hardware or Ethernet tab. 5. The address is the string of letters and numbers next to “MAC Address:” or “Ethernet ID:”. – For example “00:15:20:aa:fe:a1”. 4. Create your sparsebundle: 1. Follow the steps described in my guide: Create a sparsebundle on your Mac manually with the name “ComputerName_MACaddressWithoutColons.sparsebundle” and move it into the shared folder on the windows machine. – In the case of the examples above it would be “ZergasMacbook_001520aafea1.sparsebundle”. 5. Connect to the share: 1. On your Mac, in Finder go to the menu Go -> Connect to Server… 2. Choose the share with the sparsebundle in it on your Windows computer. The share will now be mounted under Volumes with the name of the share folder you gave in windows. – For example let’s call the directory “MacBackup” on the computer “WindowsPC” then you a folder on your Mac called “/Volumes/MacBackup”. 6. Mount the sparsebundle: 1. Open a terminal and mount the sparsebundle as a drive under /Volumes on your mac by typing: hdiutil attach -verbose /Volumes/MacBackup/ZergasMacbook_001520aafea1.sparsebundle You can also just double-click on it to mount (thanks, mike!). 7. Connect the sparsebundle: 1. Now add the sparsebundle as the Time Machine destination with the terminal by typing: sudo tmutil setdestination /Volumes/mounted_sparse_bundle 8. Then try starting the preferences and go to TimeMachine looking for the sparsebundle again. BTW: In the terminal you can hit TAB and OSX will complete the name of a file or folder you were about to write. Like this you dont have to type all the sparsebundle file name. Good luck! Cablecom is the shit My provider (Cablecom) is the most crappiest experience i ever had using internet and i have tried AOL 30 days in the 90s… Ok, they sell you 100Mbit by now, and maybe you might get that kind of speed between 4am and 6am but the latency is making the connection useless 22 hours per day: playing games, VoIP calls and streaming videos is absolutely impossible especially during rush hours (from 17h00 to 1h00). And lets be honest, what else do you need the internet for? And when?! Its not a single occurrence either. This has been going like that since November last year. Sure, it has been ok once in a while, but i feel that every time you actually need the latency-free connection, it starts behaving like THAT: Normal would be ±12ms to a server of that distance. And yeah i tried already all kinds of shit: connecting with cable, connecting without router, rebooting, switching cables, using windows, macosx and ubuntu – nothing ever works. And when it comes to asking support about whats going on i just get answers like i should send them a speedtest log, use their speed-tool for windows to increase my connection’s performance or check my antivirus – well whatever… No i am not downloading on 3 computers from p2p while trying to skype! No, i am not even using a firewall. Just admit that you just sold more bandwidth in my neighborhood than you can provide and lets finally upgrade the connection accordingly or at least downgrade all of our speeds to a decent degree so everyone can enjoy their crappy connection without latency. 100Mbit my ass! I need responsiveness!! Dammit! Howto convince MacOSX Time Machine to backup on Samba Network Share (Win/Linux) This evening i was trying out how to use Time Machine on my Mac. Unfortunately I am kind of short on external harddrives at the moment. Here is the full list of steps i did to make my Mac surrender and actually backup over the network onto my windows network share… 1. Create a read/write windows network share on the target system. 2. Mount the network share in your mac. 3. Open a terminal in mac and enter “defaults write com.apple.systempreferences TMShowUnsupportedNetworkVolumes 1” – this makes Time Machine accept non-local, non-HFS drives… 4. Open Time Machine and voila: you see the network share. 5. Select the network share and wait for the backup process to start. Observe the network share and copy the filename which is created by Time Machine, since we want to create this file for it. The process will end with an error. I found out that Time Machine is unable to create the so-called sparsebundle file. 6. Open “Disk Utility” on the Mac and create a new image. 7. Save your new image with the filename like the one created by Time Machine. The name should be something like “ComputerName_MACAddress.sparsebundle”. ATTENTION: The MACAddress HAS to be the MACAddress of the Ethernet, no matter which interface you use for backup. I was trying the backup over wifi and Time Machine created a file with the wifi MACAddress. For some reason this doesnt work. Its possible to backup over wifi, but use the Ethernet MACAddress in the filename. The volume name however can be whatever you like. Custom volume size must be the last value set. 8. Change partition to “No Partition Map” 9. Change Image Format to “Sparce Bundle Disk Image” 10. Set “Custom Volume size” to the maximum you want to use on your remote location. Dont worry, as your Mac doesnt have to have the required space available you can choose whatever is available on your network share. 11. Save the image and move it to the network share. 12. Start the Time Machine process again. Voila! My backup seems to be running now (around 2% finished) and i will keep it running over night. In case anything goes wrong i will write it here. If you have any trouble, feel free to contact me… good luck! Return top
ESSENTIALAI-STEM
User:Ndegbesi Janet/Yoruba language The Yoruba people (Yoruba: Ìran Yorùbá, Ọmọ Odùduwà, Ọmọ Káàárọ̀-oòjíire are a West African ethnic group that mainly inhabit parts of Nigeria, Benin, and Togo. The areas of these countries primarily inhabited by Yoruba are often collectively referred to as Yorubaland. The Yoruba constitute more than 50 million people in Africa, are a few hundred thousand outside the continent, and bear further representation among members of the African diaspora. The vast majority of the Yoruba population is today within the country of Nigeria, where they make up 21% of the country's population according to CIA estimations, making them one of the largest ethnic groups in Africa. Most Yoruba people speak the Yoruba language, which is the Niger-Congo language with the largest number of native or L1 speakers. In Africa, the Yoruba are contiguous with the Yoruboid Itsekiri to the south-east in the northwest Niger Delta, Bariba to the northwest in Benin and Nigeria, the Nupe to the north and the Ebira to the northeast in central Nigeria. To the east are the Edo, Ẹsan and the Afemai groups in mid-western Nigeria. To the northeast and adjacent to the Ebira and northern Edo groups are the related Igala people on the left bank of the Niger River. To the southwest are the Gbe speaking Mahi, Gun, Fon and Ewe who border Yoruba communities in Benin and Togo, to the west they are bordered by the Kwa speaking Akebu, Kposo of Togo, and to the northwest, by the Kwa speaking Anii, and the Gur speaking Kabiye, Yom-Lokpa and Tem people of Togo. Significantly Yoruba populations in other West African countries can also be found in Ghana,Benin, Ivory Coast, and Sierra Leone. Outside Africa, the Yoruba diaspora consists of two main groupings; the first being that of the Yorubas taken as slaves to the New World between the 16th to 19th centuries, notably to the Caribbean (especially in Cuba) and Brazil, and the second consisting of a wave of relatively recent migrants, the majority of whom began to migrate to the United Kingdom and the United States following some of the major economic and political changes encountered in Africa in the 1960s to 1980s.
WIKI
Rupertinoe The Rupertinoe was an advanced naval gun designed by, and named after, Prince Rupert of the Rhine in the 17th century. The name is actually a mis-transcription of the words "Rupert inv" found on one of the cannon. Details Naval warfare in the Restoration period placed an emphasis on naval firepower; as one writer has put it, warships had evolved into "floating artillery emplacements". The Rupertinoe gun was a response to this challenge. Designed by Prince Rupert, an experienced naval commander and senior admiral of the Royal Navy, the gun was intended for use against the Dutch during the Anglo-Dutch Wars. The Rupertinoe was a high specification, annealed and lathe produced gun made - experimentally - at Rupert's foundry at Windsor Castle reflecting Rupert's scientific interests in metallurgy—he was the third founding member of the Royal Society. Unfortunately the high cost of the gun—three times the price of a regular weapon —meant that by the Third Anglo-Dutch War (1672-4) only three ships had been equipped with it: the Royal Charles, the Royal James and the Royal Oak. Later guns were produced in the Weald by John Browne and his son but led to their financial downfall. The guns cost £60 per ton as Rupert received a royalty of £20 per ton and as there were no perceived advantages purchase was soon discontinued. The cost of the gun led to a fraud investigation by the Naval Commissioner Samuel Pepys, although no evidence to support the claim was discovered.
WIKI
Wikipedia:Featured article candidates/Nokian Tyres/archive1 * The following is an archived discussion of a featured article nomination. Please do not modify it. Subsequent comments should be made on the article's talk page or in Wikipedia talk:Featured article candidates. No further edits should be made to this page. The article was not promoted by SandyGeorgia 00:09, 30 January 2010. Nokian Tyres * Nominator(s): 🇫🇮Suomi Finland 2009 (talk) 19:33, 29 January 2010 (UTC) I am nominating this for featured article because it appears to meet the criteria. A word of apology, this is a small company so there are not tens of thousands of employees and dozens of corporate subsidiaries. If FA is granted, this would be the first tyre related FA in all of English Wikipedia and one of the first articles related to Finland. Having more diversity is good for Wikipedia. Suomi Finland 2009 (talk) 19:34, 29 January 2010 (UTC) * Comment. Please add alt text to images; see WP:ALT. Eubulides (talk) 21:48, 29 January 2010 (UTC) * Oppose. I'm really sorry to have to do this, after helping this article through a GA reassessment recently, but it's not ready for FAC. --Malleus Fatuorum 21:57, 29 January 2010 (UTC) * Nomination temporarily withdrawn. Since it was just opened, I will just remove it from the FAC page so that re-nomination won't be needed.Suomi Finland 2009 (talk) 23:53, 29 January 2010 (UTC) Please do not add comments unless this is relisted. Rather, write to me on my user talk page or the article talk page if you have comments.
WIKI
Quick Sleek Strong Arm Workout This exercise routine will hit major upper body muscles, will help stabilizer your shoulder joints, improve your posture and build that strong tone look. Using light weights perform 15 to 25 reps of each exercise. Go from one move to the next with little or no rest between. Do 2 to 3 sets 3 times a week Reverse Fly Grab a pair of dumbbells and stand with your feet hip width apart and your knees bent (But not over your toes) Bend forward at the hips and let your arms hang straight down from your shoulders palms facing each other. Raise both arms out to the sides as you squeeze you shoulder blades together. Return to Start Bicep Curl Hold a pair of dumbbells at your sides palms facing forward keep your back straight and chest up. Without moving your upper arms bend you elbows and curl the weights toward your shoulders. Slowly lower the weights back to the starting position straightening your arms completely. Dumbbell Cross Jab Stand with your feet a bit wider than hip width and knees slightly bent. Hold the dumbbells at chest height with elbows bent and palms facing each other, Extend your left arm across your body until the weight is in line with your right shoulder. As you return to start repeat with the right arm Lying Triceps Extension Lie face up on a bench or on the floor Hold a pair of dumbbells above your head Arms straight and palms facing each other Without moving upper arms bend your elbows to lower the dumbbells until they are at either side of your head. Pause then lift the weights back to starting position.
ESSENTIALAI-STEM
POST P1 Video Scale Video scale https://api.repliq.co/v2/launchTemplate Requirements On each request you need to provide your Bearer authentication token. See the Authentication section for more details. AuthorizationBearer Token Token<token> POST /launchTemplate This API call launch a request to generate a video from a "Video Scale" RepliQ template. See RepliQ dashboard (opens in a new tab) about the options you have access for this type of template. Mandatory Parameters On each request, this endpoint requires the following parameters: ParametersTypeDescription templateIdstringThe id of the template you want to use. Id can be found on here (opens in a new tab) urlstringThe url of the website you want to use as background. Optional Parameters Here is the list of optional parameters you can use with this endpoint to control the video generation: ParametersTypeDescription firstNamestringThe name of the person you create the video for lastNamestringThe lastName of the person you create the video for emailstringThe account email you want to send this the video to. webhookstringAttach a webhook url that will trigger when the video is ready for you to use. You cannot use multiple url. Zapier, make or pabbly webhooks are automaticaly added, so no need to include them in the request. Response Parameters Depending of the traffic, a video gets generated in around 1min. Following is the list of parameters you will receive in the response if you get a 200 status code: ParametersTypeDescription idstringThe id of the video that is being generated placeholderobjectVarious data that you can use as placeholder before the video is ready for you to use as well as data you provided when doing your video. Inside the placeholder object you will receive: ParametersTypeDescription videoLinkstringThe url of your video videoPreviewstringThe preview image or gif url htmlCodestringThe preview html code you can use in your outreach tool shortHtmlstringAnother preview html code which is less than 250 characters long (for tool that require this). It does not contain a title bellow with your prospects info imgHtmlCodestringThe preview image html code statusstringThe status of the video, "pending" meaning that the video is in the creation process backgroundstringThe background use for your video datestringThe date when the video process started originUrlstringThe url you choose for the background of your video firstNamestringThe firstname you use for your video lastNamestringThe lastName you use for your video emailstringThe email you use for your video typestringTo help you filter automation, this variable will always be equal to "video_scale" dataobjectAdditionnals data you used for your video such as videoTitle, videoDescription, ctaLink, ctaText, calendarUrl, logo and domain used Webhook Response Parameters If you have attached a webhook url to your request OR you are using Zapier / Make or Pabbly automation trigger, you will receive the following response on a successfull request: ParametersTypeDescription idstringThe id of your process videoLinkstringThe url of your video videoPreviewstringThe preview image or gif url htmlCodestringThe preview html code you can use in your outreach tool shortHtmlstringAnother preview html code which is less than 250 characters long (for tool that require this). It does not contain a title bellow with your prospects info imgHtmlCodestringThe preview image html code videoSuccessstringIf the video is generate correctly, the response will be "YES", otherwise "NO" statusstringThe status of the video, "pending" meaning that the video is in the creation process backgroundstringThe background use for your video datestringThe date when the video process started originUrlstringThe url you choose for the background of your video firstNamestringThe firstname you use for your video lastNamestringThe lastName you use for your video emailstringThe email you use for your video typestringTo help you filter automation, this variable will always be equal to "video_scale" templateNamestringTo help you filter automation, this variable will always be equal to your selected template name dataobjectAdditionnals data you used for your video such as videoTitle, videoDescription, ctaLink, ctaText, calendarUrl, logo and domain used RepliQ API Docs
ESSENTIALAI-STEM
2011 Armor All Bathurst 12 Hour The 2011 Armor All Bathurst 12 Hour was an endurance race for FIA GT3 cars, Australian GT Championship cars, Group 3E Series Production Cars and other invited vehicles. The event, which was staged at the Mount Panorama Circuit, Bathurst, New South Wales, Australia on 6 February 2011, was the ninth running of the Bathurst 12 Hour, and the fifth since the race was revived in 2007. The race saw GT cars return to long distance racing at Mount Panorama for the first time since the 2003 Bathurst 24 Hour. The addition of the faster GT3 entries saw the leading cars smash the previous distance record by 29 laps. Unfortunately it also saw many of the Class D and E cars not compete due to being reduced from outright contenders in previous races to class contenders for 2011. One of the reason's for including the GT cars was an attempt to not only increase manufacturer involvement in the race but to also raise the international profile of the event and attract the top FIA GT3 teams. The race was won by Audi's official factory supported team Audi Sport which was run by Audi's Le Mans 24 Hour team, Joest Racing, under the banners of "Audi Australia" for car #7 and "Audi Top Service" for car #8. Running a pair of Audi R8 LMS GT3s, the team of Marc Basseng, Christopher Mies and Darryl O'Young (#8) lead home teammates Mark Eddy, Craig Lowndes and Warren Luff (#7) in a 1-2 finish, the cars crossing the line only 0.7141 seconds apart in a true racing finish. Lowndes fastest race lap of 2:09.0861 also set a new GT lap record for Mt Panorama, cutting a second from the time of 2:10.0277 set 16 months earlier by Tony Quinn driving an Aston Martin DBRS9. Lowndes time came within 0.6210 of his Team Vodafone teammate Jamie Whincup's outright lap record of 2:08.4651 set in a Ford BF Falcon V8 Supercar in 2007. The Joest Racing R8's finished one lap in front of the VIP Pet Foods Racing Porsche 997 GT3 Cup R of Craig Baird and father and son pairing Tony and Klark Quinn. The race was run under international endurance rules meaning that all cars compulsory pit stops were each to be no less than 90 seconds in duration. The Class A cars had to make 12 compulsory stops with no less than 10 laps between each stop while Class B cars only had to make 9 compulsory stops. Class structure Cars competed in the following classes: * Class A – FIA GT3, Australian GT Championship * Class B – Australian GT Challenge * Class C – Australian GT Production * Class D – Production (High Performance All Wheel Drive) * Class E – Production (High Performance Rear Wheel Drive) * Class F – Production (Performance) For the race thin entries saw Classes D and E merged into Class D and Class F became the new Class E. There were several other classes listed in the regulations that attracted no entries. Official results Those in Bold represent class winners. Fastest Laps in Italics represent the class fastest lap. Statistics * Pole Position - #7 Mark Eddy, Craig Lowndes, Warren Luff * Fastest Lap - #7 Craig Lowndes - 2:09.0861 (GT lap record) on lap 267 ''* Grid positions were taken on the lap average of the fastest times set by all drivers in a car, e.g Steve Owen set the fastest time of all cars with a GT qualifying record of 2:09.1015 in his Porsche 997 GT3 Cup S but the times of co-drivers James and Theo Koundouris averaged out to start the car 3rd behind the two Joest Racing Audi R8 LMS GT3's. Warren Luff had the overall 2nd fastest qualifying time in his Audi R8 (2:09.6360) but the times of co-drivers Mark Eddy and Craig Lowndes saw the #7 car start from pole position.'' * Craig Lowndes fastest race lap in the #7 Audi, set on lap 267 of 292 when the car had already covered 1,652km, was not only a new GT lap record for the Mt Panorama Circuit but undercut the Owen's qualifying record by 0.0154 seconds.
WIKI
Page:Frank Owen - Woman Without Love (1949 reprint).djvu/37 That night Templeton and Helen celebrated after their fashion. They had dinner at the Waldorf after which they went to the theatre to see Floradora. Two weeks later they moved away from Stevens House. Templeton purchased a magnificent four-story home on Upper Fifth Avenue, opposite Central Park. It was a bit far from Wall Street but a contract had been let for a new subway and when it was completed it would be easy to get home. In the meantime there were the new electric trolleys or else he could drive uptown in a hansom-cab. He was well able to afford the expense. Helen was wondrously happy. It was a dream come true to at last have a home of her own. "It is like going off on a second honeymoon," she said enthusiastically. "According to my recollection," he drawled, "we never went away on our first." "It would be wonderful if we could go to your home in Galvey for our second honeymoon," said Helen, wistfully. "Do you think we could—some day?" "Some day," said Templeton, and kissed her. "My father and mother are getting old, dear, and my sister—" He did not say anything about his sister, Mary. He did not know anything about her. There was no second honeymoon—then—as Helen had known there would not be. He plunged again into work, and it was not until two summers later—1893—that Helen was able to persuade her husband to take a much needed vacation. "You might like it at the World's Fair in Chicago," she insisted. "Though I can't go with you." In the end Templeton went to the World's Fair. August when Louella Leota arrived in Chicago for the Columbian Exposition. She was a vision of loveliness,
WIKI
Talk:3 ft gauge railways Vandalism? Someone 'thinks' that SBNO has been 'deleted' and has been substetuted (closed). Of course it is a redirect. This same 'contributor' (vandal?) has doe the same in many other articles and hence he/she needs to be blocked. Peter Horn User talk 00:02, 26 October 2017 (UTC) * See Wikipedia talk:WikiProject Amusement Parks/Archive 3 & Articles for deletion/Standing but not operating. 2001:E68:542E:805D:408E:F217:6E8A:7DE0 (talk) 04:21, 27 October 2017 (UTC) * Per the discussion mentioned above, the page, SBNO, is now redirected to List of defunct amusement parks, which really has nothing to do with 3 ft gauge railways. It was decided in an AFD discussion, and although I think it was a bad decision, that was the decision made. All the articles that have links to the page SBNO are no longer valid. The IP user above is doing a massive cleanup, changing "SBNO" to "closed." These edits are not vandalism.— JlACEer ( talk ) 17:37, 27 October 2017 (UTC) * It is the Ferrocarril Recreacional, a ride in the park that is closed, not the Parque Lenin. * Peter Horn User talk 21:46, 27 October 2017 (UTC) * I think he user needs to be blocked as well. Hawkeye75 (talk) 02:26, 28 October 2017 (UTC) * I think he user needs to be blocked as well. Hawkeye75 (talk) 02:26, 28 October 2017 (UTC)
WIKI
Template talk:Draft proposal Source Credibility Engine Are their any administrators who specialize in computer software? Maybe you can help. One way we can make Wikipedia more reliable is by creating an engine that processes reference sources to check their credibility. That way, misleading websites cannot lead to misleading information on Wikipedia. The Engine should be able to: * Check the given source * Evaluate its credibility * Prevent users from using an invalid source for their citations. Can anyone help develop this? * While what sort of source is required depends on what text one is hoping to support. Not an easy task. Doc James (talk · contribs · email) (if I write on your page reply on mine) 19:46, 2 June 2013 (UTC)
WIKI
Electronics - MSP430 - Using the temperature demo GUI Without changing anything, it's possible to check the current temperature with the MSP430 board and the default software. Indeed, Texas Instruments provides a tool to display the temperature on your computer's screen. So, let's go and display temperature with the Graphical User Interface (GUI). Installation First of all, we need the Temperature Demo GUI. Two ways are possible. From the TI's official website You could download it directly from the TI's website: http://software-dl.ti.com/trainingTTO/trainingTTO_public_sw/MSP430_LaunchPad_Workshop/LaunchPad_Temp_GUI.zip With the IAR Embedded Workbench IDE Or if you use the IAR Embedded Workbench, you could find it in the installation directory. For example, if you installed it in D:\soft\mcu\iar\ewmsp430, you could find it in: • D:\soft\mcu\iar\ewmsp430\430\examples\examples\Hardware boards\MSP-EXP430G2\MSP-EXP430G2\LaunchPad_Temp_GUI\bin\LaunchPad_Temp_GUI.exe Let's play with the Temperature Demo GUI We have now to plug the board with the USB cable to our computer. Instantaneously LED1 (the red light) and LED2 (the green one) are blinking successively. Now an important step (otherwise it won't work): click the User button, just at the left corner of the board. LEDs stop blinking. This is the moment to open your Temperature Demo GUI by double clicking it. A window appears with a LaunchPad_Temp_GUI title and the following text: Please, select the COM port that your Launchpad is connected to. [0] COM3 Just under you have to select the appropriate COM. In my case, I have only the [0] COM3, so I just have to click the ENTER key to activate the software. If you had several choices, click the correponding number, for example 0, 1 or 2 to make a choice and click ENTER. And it works! I can see on my screen: • Current Temperature: 78° Temperature is of course in degrees Fahrenheit. If you put four finger on the microcontroller, you could see that the temperature is increasing. Conclusion A great first toy to play with during the cold winter nights. Good job, you've just displayed the temperature with your MSP430G2 board! angel Add new comment Plain text • No HTML tags allowed. • Lines and paragraphs break automatically. CAPTCHA This question is for testing whether you are a human visitor and to prevent automated spam submissions. Image CAPTCHA Enter the characters shown in the image.
ESSENTIALAI-STEM
Stephen Buyl Stephen Buyl (born 2 September 1992) is a Belgian professional footballer who plays as a winger for Rupel Boom. Career On 27 July 2020, Buyl joined Roeselare on a deal until the summer 2023 with an option for one further year. He left the club in September 2020, after its bankruptcy without making an appearance. In November 2020, he joined lower league club Lokeren-Temse. Buyl signed with Dutch Eerste Divisie club TOP Oss on 26 July 2021, where he was reunited with manager Bob Peeters, who had coached him at Westerlo. He made his debut on 6 August in a 1–0 league win over Excelsior, coming on as a substitute in the 74th minute for Joshua Sanches. On 9 June 2022, Buyl agreed to join Rupel Boom in the third-tier Belgian National Division 1.
WIKI
Motion Cue Analysis for Parkinsonian Gait Recognition RESEARCH ARTICLE Motion Cue Analysis for Parkinsonian Gait Recognition The Open Biomedical Engineering Journal 15 Jan 2013 RESEARCH ARTICLE DOI: 10.2174/1874120701307010001 Abstract This paper presents a computer-vision based marker-free method for gait-impairment detection in Patients with Parkinson’s disease (PWP). The system is based upon the idea that a normal human body attains equilibrium during the gait by aligning the body posture with Axis-of-Gravity (AOG) using feet as the base of support. In contrast, PWP appear to be falling forward as they are less-able to align their body with AOG due to rigid muscular tone. A normal gait exhibits periodic stride-cycles with stride-angle around 45o between the legs, whereas PWP walk with shortened stride-angle with high variability between the stride-cycles. In order to analyze Parkinsonian-gait (PG), subjects were videotaped with several gait-cycles. The subject’s body was segmented using a color-segmentation method to form a silhouette. The silhouette was skeletonized for motion cues extraction. The motion cues analyzed were stride-cycles (based on the cyclic leg motion of skeleton) and posture lean (based on the angle between leaned torso of skeleton and AOG). Cosine similarity between an imaginary perfect gait pattern and the subject gait patterns produced 100% recognition rate of PG for 4 normal-controls and 3 PWP. Results suggested that the method is a promising tool to be used for PG assessment in home-environment. Keywords: Gait impairment, Parkinson’s disease, Gait video analysis, Image processing..
ESSENTIALAI-STEM
Return to search Mercury dimer spectroscopy and an Einstein-Podolsky-Rosen experiment The dissociation of a 199Hg2 dimer prepares an entangled state of two spatially separated 199Hg atoms, each with nuclear spin 1/2, and with zero total electron and nuclear spin angular momenta. This is identical to the entangled state of the two spin 1/2 particles in Bohm’s classic version of the EPR gedankenexperiment. An analysis of the rotational structure of the CD=57HCI=0 band of the D3K+ u (1u)HX1Kg + (0+ g ) transition in Hg2 (natural abundance) is presented. The analysis of the fluorescence excitation spectrum using a dye laser gives the values of the constants BCD=57 and BCI=0 for the excited and ground electronic energy states involved in the transition, respectively. To increase the accuracy of the rotational constants and resolve the fine spectrum of the Hg2, a continuously tunable single longitudinal mode laser with ultra-narrow line-width is needed. Measurements using a narrow line-width alexandrite laser had been attempted and the values of BCD=57 and BCI=0 were determined. To improve the quality of the laser beam and hence the precision of the rotational constants, modifications have been made to the cavity of the alexandrite laser. This provides a possibility for further investigation. Identiferoai:union.ndltd.org:tamu.edu/oai:repository.tamu.edu:1969.1/ETD-TAMU-3041 Date15 May 2009 CreatorsQu, Xinmei ContributorsFry, Edward S. Source SetsTexas A and M University Languageen_US Detected LanguageEnglish TypeBook, Thesis, Electronic Dissertation, text Formatelectronic, application/pdf, born digital Page generated in 0.0013 seconds
ESSENTIALAI-STEM
Why Shares of JD.Com, DiDi Global, and Up Fintech Holding Are Falling Today What happened Shares of Chinese stocks listed on U.S. exchanges struggled today as the situation between U.S. and Chinese financial regulators continued to play out. Recently, the Securities and Exchange Commission (SEC) has added more Chinese stocks that face being delisted. Shares of JD.com (NASDAQ: JD) had fallen nearly 6% as of 1:03 p.m. ET today. Shares of DiDi Global (NYSE: DIDI) had sunk more than 9% and shares of Up Fintech Holding (NASDAQ: TIGR) traded nearly 11% down. So what For decades now, U.S. and Chinese regulators have been at odds over the auditing of Chinese stocks that trade on U.S. exchanges. U.S. regulators want to fully review Chinese company financials like they do with U.S.-based stocks. However, Chinese regulators don't allow foreign accountants to review current Chinese company financials due to national security concerns. The argument came to a boiling point in 2020 when U.S. lawmakers passed the Holding Foreign Companies Accountable Act (HFCAA), which would delist Chinese stocks if U.S. regulators can not review their financials for three consecutive years. Recently, U.S. regulators took more steps to uphold the law by specifically listing names of Chinese companies that face being delisted. The first five were Yum China Holdings, ACM Research, BeiGene, Zai Lab, and Hutchmed. Potentially 200 Chinese stocks could face delisting due to the HFCAA. Image source: Getty Images. However, shortly after the SEC specifically named companies that face delisting, Chinese regulators surprised the market and voiced support for foreign-listed Chinese stocks. They even said they would work with U.S. regulators on a cooperation agreement to solve the long-standing auditing issue. Following this news, Chinese stocks soared and enjoyed their best day of trading in years. Since then, the situation has shown that it may be more difficult to solve than initially believed. The SEC has added more Chinese companies that face delisting threats, including Weibo. This week, the SEC added Baidu, as well as Futu Holdings Limited, Nocera, iQIYI, and CASI Pharmaceuticals as potential delisting candidates. "There have been thoughtful, respectful, productive conversations, but I don't know where this is going to end up," SEC Commissioner Gary Gensler said earlier this week, according to Bloomberg, referring to a potential agreement over the auditing issue. "It's up to the Chinese authorities, and it could be frankly a hard set of choices for them." Similar to Futu, Up Fintech is an online brokerage, so investors may see the fact that Futu has now joined the list as a precursor of what's to come. DiDi is also in interesting shape because toward the end of 2021 the company had announced that it planned to delist from the New York Stock Exchange and list its shares in Hong Kong. But not long ago, Chinese regulators shut this plan down, at least for the time being, citing security and data concerns. Now, China's largest ride-hailing company may not have a lot of options if it were to delist from the New York Stock Exchange. Now what The fact that Chinese regulators signaled support for foreign-listed Chinese stocks is certainly good news. But it's also clear that U.S. regulators have taken a hard line on their position, as they continue to name stocks that face delisting and say that Chinese companies will need to be in full compliance with U.S. auditing laws. That may be a difficult pill for Chinese authorities to swallow, considering this issue has gone on for decades. While Chinese stocks have been hammered and there is upside, given their large market opportunities and if regulators come to terms on the auditing issue, I see these stocks as particularly risky trades right now because so much depends on regulators. 10 stocks we like better than DiDi Global Inc. When our award-winning analyst team has a stock tip, it can pay to listen. After all, the newsletter they have run for over a decade, Motley Fool Stock Advisor, has tripled the market.* They just revealed what they believe are the ten best stocks for investors to buy right now... and DiDi Global Inc. wasn't one of them! That's right -- they think these 10 stocks are even better buys. See the 10 stocks *Stock Advisor returns as of March 3, 2022 Bram Berkowitz has no position in any of the stocks mentioned. The Motley Fool owns and recommends Baidu and JD.com. The Motley Fool recommends iQiyi. The Motley Fool has a disclosure policy. The views and opinions expressed herein are the views and opinions of the author and do not necessarily reflect those of Nasdaq, Inc.
NEWS-MULTISOURCE
The name "Kung Fu" refers to a group of ancient Chinese martial arts styles. Karate, on the other hand, arose in Japan from a martial arts discipline known as "te," which involved hand moves. Karate was later influenced by Chinese martial arts systems, explaining the link between the two disciplines. Kung fu is believed to have originated in the late 18th century during the Qing dynasty. It was developed by monks who were looking for ways to protect themselves and their communities against violent criminals who were able to evade punishment because there were no legal means available to combat them. The first documented reference to "kung fu" dates back to 1784. The term originally described a set of self-defense techniques used by street performers in China. As it evolved, this unique system of defense became so popular that it eventually led to the creation of various schools where students could learn how to execute its moves effectively. In comparison, karate is much younger than kung fu. It was developed around 1872 by Kyoshi (or sensei) Matsumura Sokon Shusen, who was looking for a way to defend himself against bullies in his hometown of Kuroki Province, Japan. Inspired by watching monks practice their kung fu routines, he decided to combine their movements with his own fighting skills to create an effective self-defense method. Today, karate is practiced worldwide by people of all ages for use in self-defense situations. Chinese martial arts, often known as kung fu (/'kUNG' fu:/; Chinese: Gong Fu; pinyin: gongfu; Cantonese Yale: gung fu), kuoshu (Guo Shu; guoshu), or wushu (Wu Shu; wushu), are a collection of several hundred combat techniques that evolved over centuries in Greater China. They are distinguished from other Asian combat systems by their emphasis on physical training and skill rather than strength or armor, although many techniques include elements of both. Kung fu is not to be confused with Japanese martial art called karate, which is completely different in style and technique. Kung fu is also different from the Indian system of martial arts called yoga. The earliest evidence of martial arts in China comes from two isolated instances around 220 B.C. In both cases, the word "gong" (martial) was followed by the term "fu" (method/style). Thus, we can conclude that in China, there was initially no name for what we now call martial arts. As they evolved, certain movements and techniques became more popular and were given names, which then were applied to the styles that used them. For example, the phrase "finger of god" was given to a technique used by Bruce Lee that was later adopted by Andy Lau when he created his own version of it. There are records of eight major schools of martial arts operating in China during the early years after Christ's death. Each one of these schools had its own unique style that it taught to its students. Chinese martial arts, often known as kung fu (/'kUNG' fu:/; Chinese: Gong Fu; pinyin: gongfu; Cantonese Yale: gung fu), kuoshu (Guo Shu; guoshu), or wushu (Wu Shu; wushu), are a collection of several hundred combat techniques that have evolved in China over the years. They include art forms such as taekwondo, karate, jujitsu, wrestling, and fencing. The term "martial art" is generally applied only to those systems developed before 1970; since then many new styles have been created by their respective schools. Kung fu can be divided into various categories according to how the fighter uses his or her hands, feet, arms, legs, torso, or head. These categories include ch'uan fa (self-defense fighting) which uses only your body to defeat an attacker, shuai jiao (medical fighting) which involves applying subtle internal forces to disable your opponent without causing serious injury, and wu shuai (martial arts) which combines the techniques of both self-defense and medical fighting. In addition to these major categories, other classifications have also been made based on how the fighter trains, what objects he or she may use in combat, and even the number of times his or her body is attacked in one session. For example, there are combative sports such as kali boxing and wushu that require different skills to compete at a high level. Karate is a Japanese martial art that began on the island of Okinawa. In Japanese, karate means "empty hand." Karate is thought to have been influenced by Fujian White Crane, a kind of kung fu that originated in Southern China. In the late 14th century, Buddhist monks from China learned how to defend themselves using bamboo and stone weapons. They taught this technique to the indigenous people of Okinawa. This form of self-defense came to be known as kobudo (Japanese for "way of the monk's staff"). In 1922, kobudo was introduced to Japan's public schools when Takahiro Shinkai created Shotokan. This is the modern form of karate that is practiced throughout the world. Okinawa has been a part of Japan since 1872 but it still maintains its own government and military. Okinawan culture is unique and well-known for its martial arts. There are many different styles of karate here that use either hands or feet to deal out punishment. In conclusion, karate is thought to have originated in China but it has also been adopted into Japan's own version called Shotokan. Kung Fu (Gong Fu) is spelled as Gong Fu in Pinyin, which is a more precise and suitable pronunciation. The name is made up of two characters: Kung (Gong), which might signify skilled effort, arduous training, or endeavor. They refer to time spent on skilled labor, endeavor, or rigorous training. Fu is the character that most people associate with martial arts. In English, it can be translated as "the art of combat" or "the way of harmony". Kung fu means skillful effort. It is not just a random collection of moves willy-nilly but rather it is an organized system for combating external threats and achieving internal goals through coordinated body movements and techniques. It is also referred to as "The Supreme Art" because it is the highest form of self-defense and has no equal when it comes to actual fighting. Its purpose is to defend one's self against attack while also giving one the skills necessary to attack back should the need arise. In other words, it is a complete system for achieving total security. In addition, kung fu is based on knowledge and understanding of human anatomy and physiology, which allows its practitioners to use their energy efficiently during fights or maneuvers.
FINEWEB-EDU
Stanley Common Stanley Common is a village in the south-east of Derbyshire in the East Midlands of England. It is situated on the A609 main road between Ilkeston and Derby and is in the Erewash borough, although in the new (2010) UK parliamentary constituency of Mid Derbyshire. Stanley Common is part of the same civil parish as the village of Stanley which is situated a mile or so to the South. It has the larger population of the two villages and incorporates Smalley Common, once part of the neighbouring village of Smalley, but which is located much nearer to Stanley Common. Smalley Common Smalley Common lies on the A609 between Smalley and Stanley Common. Morleyhayes Wood is adjacent to the east with extensive farmland to the north and south. Recently it has been redeveloped and amalgamated with Stanley Common. The old village existed for almost 100 years and so merits inclusion here. Smalley Common was for many years a coal-mining community which, after some expansion in the early 1900s and up to the late 1970s was a distinct and separate settlement consisting mainly of tied colliery terraces. From 1946 these were rented from the National Coal Board. The majority of the inhabitants gained a living in the local mines, namely Shipley Woodside near Heanor, the Nibby Pit at Stanley, and Mapperley Pit near West Hallam. At this time the main part of the village consisted of four rows of compact terraced dwelling. There were two streets, Spencer Street and Blunt Street, with about 61 identical dwellings and some 19 homes as part of the original linear village along the A609. Up to the late 1960s they still had no private garden, no bathrooms and a single outside privy. A map from 1887 shows no trace of the terraces but they do appear on a map from 1901 so they were erected sometime between these dates, probably for the local coal-mine workers on behalf of a colliery company absorbed by the National Coal Board in 1946. Most of the children from the village attended the Smalley Common Council School, later renamed as the Crown Hills Junior Mixed and Infants. This is at the top of Crown Hill east along the A609 and has now been converted to private homes. From about 1954 for several years the area just north of the village as far as the primary school was subject to opencast mining. A picturesque bridleway bounded on each side by tall hedges known to the locals as Swine Lane led to Swine Hill and Swine Hill Wood. These features were regrettably destroyed at this time although the wood has now been replanted. To the North East of these old workings, nearer to the village of Smalley, opencast mining recommenced in 2008 at Lodge House, despite fierce opposition and a long campaign from those living nearby. The footballer, coach and manager Dennis Booth lived in Spencer Street from 1949 to 1964. Historical references to Smalley Common. There is evidence of early coal extraction in the area: "in the High Yates Closes, a group of fields between Bell Lane and Smalley Common, Patrick Richardson, father of Samuel, took a lease of the coals in 1650 from Jacinth Sacheverell of Morley. The early Smalley coal workings extended further south along the higher ground to Smalley Common." An entry in the Nottingham Road Bill of 1784 includes "the Cross Post upon Smalley Common, (probably at the site of the White Post Inn) in the County of Derby". and in the same year the village is mentioned on the Smalley Common enclosure award map when there is also mention of the road being a turnpike at Smalley Common. There is also mention of a working windmill in 1880 but no traces remain.
WIKI
Talk:屈狸 Spellings Looking through 新明解, 大辞林, 大辞泉, and Shogakukan's 国語大辞典, only Shogakukan lists any kanji spelling at all as specifically for the Japanese term, and that is 屈狸. Since other sources do not list any kanji spelling at all, this suggests that 屈狸 is the more common of the two apparent kanji spellings. The page at Kotobank includes an entry from 日本大百科全書 (ニッポニカ) that discusses the spelling some for Chinese, but that's not terribly relevant to Japanese. So far, this is the only JA source I've found that also lists the spelling, but as the Chinese term. (That entry also lists the original source language for the term as Gilyak, but it turns out that's just an old exonym for Nivkh.) Just looking at Google, gets 848 hits, and gets 4,250. gets 81,500, FWIW. ‑‑ Eiríkr Útlendi │Tala við mig 01:03, 1 March 2016 (UTC)
WIKI
@aws-cdk/aws-sqs The CDK Construct Library for AWS::SQS Stats StarsIssuesVersionUpdatedCreatedSize @aws-cdk/aws-sqs 7,3752,1641.129.02 days ago3 years agoMinified + gzip package size for @aws-cdk/aws-sqs in KB Readme Amazon Simple Queue Service Construct Library cfn-resources: Stable cdk-constructs: Stable Amazon Simple Queue Service (SQS) is a fully managed message queuing service that enables you to decouple and scale microservices, distributed systems, and serverless applications. SQS eliminates the complexity and overhead associated with managing and operating message oriented middleware, and empowers developers to focus on differentiating work. Using SQS, you can send, store, and receive messages between software components at any volume, without losing messages or requiring other services to be available. Installation Import to your project: import * as sqs from '@aws-cdk/aws-sqs'; Basic usage Here's how to add a basic queue to your application: new sqs.Queue(this, 'Queue'); Encryption If you want to encrypt the queue contents, set the encryption property. You can have the messages encrypted with a key that SQS manages for you, or a key that you can manage yourself. // Use managed key new sqs.Queue(this, 'Queue', { encryption: QueueEncryption.KMS_MANAGED, }); // Use custom key const myKey = new kms.Key(this, 'Key'); new sqs.Queue(this, 'Queue', { encryption: QueueEncryption.KMS, encryptionMasterKey: myKey }); First-In-First-Out (FIFO) queues FIFO queues give guarantees on the order in which messages are dequeued, and have additional features in order to help guarantee exactly-once processing. For more information, see the SQS manual. Note that FIFO queues are not available in all AWS regions. A queue can be made a FIFO queue by either setting fifo: true, giving it a name which ends in ".fifo", or by enabling a FIFO specific feature such as: content-based deduplication, deduplication scope or fifo throughput limit. If you find any bugs or have a feature request, please open an issue on github! The npm package download data comes from npm's download counts api and package details come from npms.io.
ESSENTIALAI-STEM
The Cincinnati Observatory is the oldest professional observatory in the United States and it houses one of the oldest working telescopes. It is located outside of downtown Cincinnati on Mount Lookout. professor in Cincinnati by the name of Ormsby Mitchel went door to door to raise enough money to travel to Europe to buy the telescope in Germany. Once it was brought back to Cincinnati in 1843 it was placed in an observatory on Mt. Ida and was dedicated by President John Quincy Adams later that year. The observatory is unique in that the general public has always been allowed to use the telescope and observatory since its opening. observatory would move from the crowded and polluted downtown to its current location on Mt. Lookout in 1873 on land that was donated for that purpose. A Greek revival style building, that was so popular at the time, was designed and built for the telescope. Also a new telescope was bought and placed in the old building. The University of Cincinnati would incorporate the observatory into its physics department in the late 1970s. It became a National Historic Landmark in 1997. By 1999 it was changed from a research facility to a center for public education and attracts over 25,000 people and students every year.
FINEWEB-EDU
Page:NIOSH Manual of Analytical Methods - 1012.pdf/3 DIFLUORODIBROMOMETHANE: METHOD 1012, Issue 2, dated 15 August 1994 - Page 3 of 4 b. Allow standards to come to room temperature, and dilute to the mark. c. Analyze together with samples and blanks (steps 11 and 12). d. Prepare calibration graph (peak area vs. mg difluorodibromomethane). 9. Determine desorption efficiency (DE) at least once for each lot of charcoal used for sampling in the calibration range (step 8). Prepare three tubes at each of five concentrations plus three media blanks. a. Remove and discard back sorbent section of a media blank sampler. b. Inject a known amount of cold (<0 °C) difluorodibromomethane directly onto front sorbent section with a microliter syringe. NOTE 1: Perform this step in a cold room or cold box. NOTE 2: For small quantities (0.4 to 4 mg), use 2 to 20 µL of a 200 mg/mL standard solution of difluorodibromomethane in pentane. c. Cap the tube. Allow to stand overnight. d. Desorb (steps 5 through 7) and analyze together with working standards (steps 11 and 12). e. Prepare a graph of DE vs. mg dibromodifluoromethane recovered. 10. Analyze three quality control blind spikes and three analyst spikes to ensure that the calibration graph and DE graph are in control. MEASUREMENT: 11. Set gas chromatograph according to manufacturer’s recommendations and to conditions given on page 1012-1. Inject sample aliquot manually using solvent flush technique or with autosampler. NOTE: If peak area is above the linear range of the working standards, dilute an aliquot of the desorbed liquid with 2-propanol, reanalyze, and apply the appropriate dilution factor in calculations. 12. Measure peak area. CALCULATIONS: 13. Determine the mass, mg (corrected for DE) of difluorodibromomethane found in the sample front and back sorbent sections, and in the average media blank front and back sorbent sections. NOTE: If >  /10, report breakthrough and possible sample loss. 14. Calculate concentration,, of difluorodibromomethane in the air volume sampled, (L): , mg/m³. EVALUATION OF METHOD: Method S107 was issued on April 11, 1975, and evaluated at 470, 932, and 1876 mg/m³ [1]. Spiking of samples and standards preparation were done in a cold room (0 °C). Samples of difluorodibromomethane in air were generated and collected on activated coconut charcoal (SKC Lot 105). The air concentration was independently determined by gas chromatographic analysis using a 5-mL sampling loop and comparison to gas bag samples. The mean desorption efficiency over the range 4.4 to 18.5 mg difluorodibromomethane per sampler was 99.5%. The breakthrough volume for 100-mg charcoal beds was 15.6 L at 1875 mg/m³, low relative humidity, and a flow rate of 0.2 L/min. No storage stability study was done. NIOSH Manual of Analytical Methods (NMAM), Fourth Edition
WIKI
Talk:Morse code/Archive 4 Another reason for the popularity of morse code among radio amateurs Something that I think is missing on this page is one of the reasons why using morse stayed very popular for such a long time among radio amateurs. Apart from matters like it's robustness to interference, an important point is that you need much smaller RF power to be able to communicate over long distances compared to any voice transmitting technology. This means a simpler and cheaper transmitter could be used. A transmitter for morse is also simpler to build because you don't need a modulator. In essence, it's just turning on and of of a transmitter. — Preceding unsigned comment added by <IP_ADDRESS> (talk) 09:16, 23 January 2013 (UTC) * Morse code wasn't popular among radio amateurs. It was popular with a small minority of radio amateurs who used Morse as a means of "gatekeeping" to keeo out those interested in becoming radio amateurs but not interested in learning a largely irrelevant and useless relic of the radio world of the early 1900s. — Preceding unsigned comment added by <IP_ADDRESS> (talk) 14:09, 10 May 2013 (UTC) * another negative comment from an unsigned poster..using morse code was never a conspiracy to keep people out of radio..in the 1st place when hams invented radio it was the only form of communication via radio waves..in addition read the reasons why it is used per the previous comment all of which are very valid..also morse code allows people who speak different languages besides English to communicate per Q codes and standard radio procedures..now that the morse code requirement has been dropped the bands have been become overcrowded and the overall level of competence has deteriorated..the CB mentality which has pervaded the amateur frequencies since the drop has had a very negative impact on ham radio in my opinion..I have nothing against CB radio..it`s what got me into ham radio..most of the amateurs on the air these days could learn a lot from both CB and studying morse code but 11 meter 2 way radio is pretty much a thing of the past in America as well except with truck drivers..the code forced operators to study and know what they were doing before they got on the radio..please sign your post if you have something to say...especially if it`s negative..no one likes a whiner Lonepilgrim007 (talk) 16:15, 1 July 2013 (UTC) * I think it's time to invoke WP:NOTAFORUM. Discussion that isn't about improving the article doesn't belong on WP talk pages. (to <IP_ADDRESS>: Less transmitter power and less bandwidth too :) ) Jeh (talk) 16:26, 1 July 2013 (UTC) A to Z in Morse file This edit was immediately reverted, but in fact the IP is correct - File:A through Z in Morse code.ogg does not contain Z, it finishes on Y. I have e-mailed the uploader but they do not seem to be active on Wikipedia any more so may not reply. Should we change the caption in the meantime? Change the filename? Spinning Spark 06:38, 19 May 2013 (UTC) * Ah, thanks for this, I couldn't figure out what they were talking about (the page is on my watchlist but I don't actually don't take an active interest in it). My opinion is that we probably shouldn't even use the file if it's broken like that. It would be like if the map in the article for the US didn't have Florida on it. It would just look unprofessional. Better to do without until we can find a better audio file. SQGibbon (talk) 13:09, 19 May 2013 (UTC) * I've heard from the uploader and he is looking at it. Let's wait to see if he fixes it. Spinning Spark 14:32, 19 May 2013 (UTC) * When I play it, there is a Z at the end. The file entry says 2009. Glrx (talk) 03:03, 20 May 2013 (UTC) * What browser are you using? It seems to be browser related. I can hear the "Z" as well when played through IE10, but not in Firefox. Spinning Spark 08:02, 20 May 2013 (UTC) * I'm using Chrome. If I play it on FireFox, there is no Z. I'm running XP, so I have a backward IE that downloads the file and fires up the default application for .ogg -- which has the Z. Glrx (talk) 02:44, 21 May 2013 (UTC) * The file has now been fixed. Spinning Spark 09:44, 30 May 2013 (UTC) In the history section It states "That same year a radio on the airship America had been instrumental in coordinating the rescue of its crew.[8] However, there was no aeronautical radio in use during World War I, " However both British and French reconnaissance aircraft carried radios from 1915 on, as is detailed in the relevant wikipedia article I am not sure if the writers here are aiming at some other usage? Cricketjeff (talk) 15:08, 21 October 2013 (UTC) Link to continuous wave on first mention of CW transmissions The first mention of CW transmissions doesn't link to the article for continuous wave transmissions or explain what they are. Please fix this. <IP_ADDRESS> (talk) 10:45, 8 December 2013 (UTC) * Is there some reason you need others to do this for you? Spinning Spark 18:21, 8 December 2013 (UTC) * Not everyone is comfortable editing articles. In this case, I thought the best thing to do was to remove the early mentions of CW, which were really being used as a synonym for "Morse Code". --agr (talk) 20:35, 8 December 2013 (UTC) * The article is protected. I even registered and still can't edit. I don't mind due to the vandalism, but just remember to check next time. <IP_ADDRESS> (talk) 02:06, 9 December 2013 (UTC) * Yes, sorry, new accounts can't edit semi-protected articles util confirmed. Tell me the name of your account on my talk page and I will confirm it for you so you can edit straight away. Spinning Spark 18:22, 9 December 2013 (UTC) Semi-protected edit request on 15 January 2014 Please change "Morse code is a method of transmitting text information as a series of on-off tones..." to "Morse code is a method of transmitting text information as a series of short and long tones..." from Steven Fletcher Stevenfletcher (talk) 12:30, 15 January 2014 (UTC) * I have confirmed your account so you should now be able to edit yourself. Spinning Spark 14:06, 15 January 2014 (UTC) ARRL Farnsworth increasing readability - source? The article states ARRL Farnsworth is increasing readability for human decoders. However the Link explaining ARRL Farnsworth (Link doc 25) only states that it ieasier for beginners to use Farnsworth. Suggest to remove the sentence with increased readability when using Fanrsworth. As a personal note: I think standard Morse (no Farmsworth) is easier to decode for me, even at very low signal levels.. — Preceding unsigned comment added by <IP_ADDRESS> (talk) 21:45, 8 February 2014 (UTC) Semi-protected edit request on 14 February 2014 the line below needs a space in front. It is being treated as header text. "===.===...===.===.===...=.===.=...=.=.=...=.......===.=.===.=...===.===.===...===.=.=...=" ===.===...===.===.===...=.===.=...=.=.=...=.......===.=.===.=...===.===.===...===.=.=...= Jrob007 (talk) 17:30, 14 February 2014 (UTC) * Here it is, reformatted. That doesn't mean it's good sending ;-) * Lou Sander (talk) 17:40, 14 February 2014 (UTC) * ✅. I've fixed the version in the article. --Nigelj (talk) 18:58, 14 February 2014 (UTC) Dots and dashes The &amp;middot; and &amp;minus; make better dots and dashes: ·&minus;·&minus;. Compare to hyphen, middot, endash, minus: -·–&minus;. Glrx (talk) 22:42, 15 February 2014 (UTC) Revisions to "Letters, numbers, punctuation" Section I've bundled several revisions together in the "Letters, numbers, punctuation" section (mostly the table presentation in that section): * 1) While the previous table (reproduced below) was more compact, its presentation was difficult to read in the middle columns, and it was not a standard tabular representation in that there was no relationship between all items on the same row. I converted the display to a standard table. * 2) I added a "Note" column for additional information about characters. * 3) I created links to new audio files I created for the punctuation marks. * 4) I made the Morse Code samples into links to their respective audio files, and made the characters links to their respective Wikipedia entries (thus making the letters and numbers consistent with how the punctuation marks were already linked). --JoeDeRose (talk) There appear to be errers in the last two items in the table. Lou Sander (talk) 23:49, 30 March 2014 (UTC) * Thank you! I thought I had double- and triple-checked that -- but I must have missed it. It's fixed now. Thanks, again. --JoeDeRose (talk) 23:58, 30 March 2014 (UTC) Joe, thanks for your work on this. I like the change to linking the Morse files to the code rather than the symbols. However, not so happy with the large amount of whitespace that has been created by making the tables linear. The compact form of the previous version was better. The objection that lines of a table should be semantically associated with one item can be overcome by embedding tables within tables and the borders can be used as a visual indication of the boundary between columns. Spinning Spark 08:53, 31 March 2014 (UTC) * Thanks for the compliment as well as the critique. I have mixed feelings about white space: While it can create emptiness on the page, it also can be the byproduct of a focus on data organization. Personally, I tend to prioritize data organization (but, of course, that doesn't mean my opinion must carry the day). I'm also not sure I trust a nested table solution, as its readability might be perfect on one screen size, but it might look very wrong on a different screen (especially a tablet or phone). Nested tables also don't support sorting, and I'm wondering if this table would be improved by making it sortable (an issue I raise in the new section below). tags between different items in the Note column to reduce the width of that column. How do you feel about the amount of white space with these changes in place?'' --JoeDeRose (talk) 13:46, 31 March 2014 (UTC) * ''But by raising the issue you gave me another idea that I hope will satisfy both concerns: I've deployed a revision with the table floating to the right so that text can wrap around it. I've also added Make Morse Code Table Sortable? Would the list of characters and codes be improved by making it sortable? I'm imagining a scenario in which someone might hear (for example) "· – · · ·" and wonder what character it represents. There's no good way to find that text using the browser's "Find" function -- but making the table sortable might make it easier. If this change is made, however, I think it might be best to add the prosigns and non-English characters into the table. What do others think about these possible changes? --JoeDeRose (talk) 13:46, 31 March 2014 (UTC) Who was it named for? Who Was It Named For???? — Preceding unsigned comment added by <IP_ADDRESS> (talk) 01:18, 8 April 2014 (UTC) * Samuel Morse, as it says in the article. Spinning Spark 09:58, 8 April 2014 (UTC) "Thus, the following Morse code sequence..." Is comically broken. Multiple dah's are being combined into em and en dashes. — Preceding unsigned comment added by <IP_ADDRESS> (talk) 04:09, 29 March 2014 (UTC) * I've had a go at trying to fix this, by using minus signs '−' instead of dashes '–'. It does leave tiny gaps between them on my screen, but I don't know to what extent that is just a function of my particular browser and fonts. Hopefully it looks better for other people too. --Nigelj (talk) 18:03, 28 April 2014 (UTC) Letters, Numbers, Punctuation heading * The wait sign di-DAH-di-di-dit: I am unclear if this is in the ITU-R recommendation according to the notes in the table. If it is, but the same-sounding ampersand isn't, then perhaps list Wait separately and add a new line to the table with another di-DAH-di-di-dit, calling it the ampersand and carrying the note about its not being in the recommendation. * Keyboard @: States that the @ sign was adopted May 24, 2004 but link 31 points to an ARRL page that is in the Go Back Machine archive that speaks of the upcoming adoption in May. There is no documentation referring to May 24, but I have maintained a page from the beginning that references an ARRL Letter for April 30, 2004 which sets May 3 as the date of adoption. My documentation is here: Morse code @ Symbol * Improving the readability of "di-dah" notation: Looking just above the Link Budget Issues line for some examples, I might suggest the use of all-capitals on the "DAH" syllables. It might also be an idea to add white space between each letter each letter sound and that in turn will widen the white space between each: "White:" "di-DAH-DAH di-di-dit di-dit DAH dit" Lytzf (talk) 22:14, 27 April 2014 (UTC) Edit: fixed my links Lytzf (talk) 12:12, 28 April 2014 (UTC) * I think you've made a good case for the changes you propose. No one else has replied, so I believe you can proceed without fear of controversy. * --JoeDeRose (talk) 03:22, 30 April 2014 (UTC) Modifications to Letters, numbers, punctuation Section I've made several changes to the tables in in this section, which can be explained here better than in the Edit summary. Non-English extensions * 1) Added links to sound files for Morse code. * 2) Made table sortable. * 3) Gave each character its own line with notes about shared codes to facilitate review (previously they were not in alphabetical order and there was no structure as to which character was the "basic" example, and which ones were afterthoughts). * 4) Put letters in order. * 5) Added upper-case characters: The basic alphabet table shows characters in upper-case, while this table showed lower-case. I considered upper-case important for character distinction -- but retained lower-case to disambiguate between Eth (Ð, ð) and D with stroke (Đ, đ) -- for which the upper-case characters appear identical. (I plan to add lower-case to the main table for consistency.) Prosigns * 1) Added links to sound files. * 2) Put in alphabetic order. * 3) Made table sortable. Main Table * 1) Added lower-case characters for consistency with Non-English extensions. --JoeDeRose (talk) 02:52, 12 May 2014 (UTC) The layout on Morse code# Letters, numbers & punctuation On the village pump, Spinningspark made a comment about the layout, the comment being that with the current layout, especially with the audio template, when you click it, it transports you to another page, then you have to click the back button to get back to the page you started from. So how about a change where when you click on the morse code "A", you hear the sound of the aymbol without actually leaving this page. I was thinking more along the lines of this: KoshVorlon Angeli i demoni kruzhili nado mnoj 18:19, 13 May 2014 (UTC) I have no objection to this change. Note that it might widen the table enough that the "float:right" style is no longer necessary. My only recommendation is that the prosigns and non-English character tables be treated equivalently. (They might even be added to the main table -- which I actually considered doing on my recent round of edits.) --JoeDeRose (talk) 04:13, 14 May 2014 (UTC) * I'll wait a bit to see if we have any more comments before touching anything, since it would constitute a major layout change. KoshVorlon Angeli i demoni kruzhili nado mnoj 16:59, 14 May 2014 (UTC) * I'm ok with that too, and thank you for taking an interest. The only comment I would make is that something more useful could be written in the player title. In fact, why not make the title the code: like this? Also, changing the dash to − (minus sign) vertical aligns better with the dot. Which means the code can be made bigger without the alignment error becoming prominent. Spinning Spark 19:30, 14 May 2014 (UTC) * I know I said I only had one comment and then made two, but I just made another change to the example table. I changed the non-breaking spaces to hair spaces . The larger size font makes it obvious that the spacing is incorrect with nbsp. Symbol spaces should be equal to a dot. Spinning Spark 20:07, 14 May 2014 (UTC) * No problem, I like your change, especially the more prominent morse code, it makes it easier for those that might be sight-impared to read it ! It's ALSO cleaner, and takes less room (to make up for the extra room the listen template takes up). Looks better than mine! Great job Spinningspark KoshVorlon Angeli i demoni kruzhili nado mnoj 20:19, 14 May 2014 (UTC) * I too like these changes very much! Thanks to both of y'all! (And special thanks to SpinningSpark for mentioning hair spaces. I'd never heard of these before, but I'll find them useful in the future.) * --JoeDeRose (talk) 20:27, 14 May 2014 (UTC) * If you enjoyed hair spaces, you might also enjoy http://www.w3schools.com/charsets/ref_utf_punctuation.asp which has lots more spaces to choose from. The smallest is the "zero-width space" which, despite its name, will usually still leave some whitespace, but I would not recommend it here. It is font dependent, the whitespace is the space actually within the font character so you have no control over how it will actually display. Spinning Spark 20:39, 14 May 2014 (UTC) Follow up --- new sandbox created As a follow up, I've started a subpage to this talkpage where the table can be built in full before being added in, it's right over here feel free to jump in, gut it, whatever, but keep the discussion here, please KoshVorlon Angeli i demoni kruzhili nado mnoj 15:32, 15 May 2014 (UTC) * The wrong characters are being used for both dots and dashes. Compare the valign of the two samples I did (A and B) with the rest of the table. * The code for "9" is wrong * Presumably, the notes column is being retained in the final version. Or do you plan to handle that information in another way? Spinning Spark 16:26, 15 May 2014 (UTC) * I don't know why, but the audio does not always sound right. For instance, the "9" seems to stutter at the start, making the first dash sound like two dots. It is not consistent, sometimes it does it, sometimes not, but the "old" full screen player does not seem to have this issue. Actually, playing with it a bit more as I type, it plays ok the first time, but is wrong on subsequent plays until the page is reloaded. All the players have this problem, not just the "9". We've had problems with audio files in the past that are only apparent in some browsers. CAn people try this in there own browsers please. I am using Firefox. I've also tried IE but Microsoft Media player can't deal with ogg files apparently, perhaps someone with the right player attached can try it. Spinning Spark 16:53, 15 May 2014 (UTC) * Spinningspark 1.) Not sure what you mean by wrong code, I copied your version, so we're both using the same code as far as I know, but please, feel free to change it, that's why it's in the sandbox * Can you not see the dots and dashes are not aligned?. Yes, you copied my code, but you have not continued to use the characters I used in the rest of the table. Spinning Spark 01:18, 16 May 2014 (UTC) * Actually, another editor has fixed them (thanks), or at least, most of them. Spinning Spark 01:23, 16 May 2014 (UTC) 2.) The code for 9 - I've corrected that -- my bad 3.)I tested the sounds on my end using Windows 7 Pro with Chrome as my browser ( my work set up) and I've tested in on OpenSuse 12.1 with Chromium (home setup ) and sounds played great on both systems. 4.)Not sure about the notes column, I wasn't thinking of keeping it, but where it was important, I would insert a note in parentheses in the the cell labeled "character" It's easily enough done on a seperate line. My reasoning being, this new table is wider, so rather than have 3 wide columns, leave it at 2 as the third column wasn't necessary (letter / number and code are essential here ), however, if consensus is that notes have to come back, no problem. You're welcomed to give it a go if you want, again, it's in the sandbox so anyone can have a go at it. KoshVorlon Angeli i demoni kruzhili nado mnoj 23:39, 15 May 2014 (UTC) I think the notes are useful and should be retained. If your goal is to minimize the number of columns or the width of the table, I think the goal of simplifying the display could be merged with the goal of detailed information by putting the notes below the character name or below the sound file. (If they don't keep their own column, I favor under the sound file.) I haven't made a change in the sandbox so as to give others a chance to voice their preferences. --JoeDeRose (talk) 02:17, 16 May 2014 (UTC) * I think the notes that show an alternative character should simply be added to the comma separated list in the "character" column without further comment. Some of the other notes could be converted to footnotes. Digraphs could be placed in brackets after their character name to which they apply, it is not necessary to keep repeating the word digraph and linking it. Digraphs and there method of representation should be explained (once only) in the text before they are first used and then just used without comment. By the way, "See below regarding MN alternative" is a perfect example of why "see below/" should not be used in Wikipedia articles. It actually renders above that point on the screens of most readers. Spinning Spark 06:45, 16 May 2014 (UTC) * Okay, I just added the notes in the "character" cell, below the character. Once again, have a look, feel free to gut it if you think it needs it ! :) KoshVorlon 13:23, 16 May 2014 (UTC) * The last table is still using the wrong character codepoints in the codes * Joe, is there some reason that some characters are treated differently and presented as "shared with" instead of just added with equal status? For instance, why is Ç (c-cedilla) not shown as Ć|Ć, ć, Ç|Ç, ç etc.? Spinning Spark 15:15, 16 May 2014 (UTC) * Spinningspark Not sure what you mean when you say the last table is using the wrong character codepoints. All of the tables are using the same coding. You've mentioned this before, but haven't explained this so I'm not sure what you're referring to, and again, I used your template as a source, and am using the same coding you used, so please be a bit more specific. (I'm not being a dick, I don't really understand what your'e telling me ). Or better yet, jump in and correct what you'd like, it's in the sandbox for that reason. KoshVorlon 16:41, 16 May 2014 (UTC) * Unless you are using a font that is wildly different from anything standard, you should see that the dots and dashes in · − − · − ·   line up nicely whereas – – · · – · does not. The second one was pasted from last table. Spinning Spark 17:39, 16 May 2014 (UTC) * SpinningSpark, I introduced the separation of the non-English characters for consistency in sorting. The most prominent examples are "CH, Ĥ, Š" and "È, Ł". These cannot be placed on the same line anywhere in the table such that someone would be able to find all of the characters intuitively. If there's a solution that I haven't thought of, I'm definitely open to it. But I don't think a return to the previous system ("È (and Ł)") is the right approach. * --JoeDeRose (talk) 18:05, 16 May 2014 (UTC) * Spinningspark Now that you explained what you were talking about, I understand you. Thank you. This seems to be a cosmetic issue, but yes, since the other side (the right side matches up) the left side should as well. I can also see why looking at the code didn't help. In code both dots and dashes look the same. I'll see if I can fix that later on tonight (I lead a band later on tonight, so it would be after 10 PM EST ). Thanks ! KoshVorlon 18:35, 16 May 2014 (UTC) Spinningspark - the code on the left hand side of the page (Non-English morse code symbols) has been corrected. Thanks again ! KoshVorlon 19:10, 16 May 2014 (UTC) In the sandbox, I've made the character names bold to distinguish them from their notes. (Feel free to revert if you don't find this to be an improvement.) --JoeDeRose (talk) 01:40, 17 May 2014 (UTC) * JoeDeRose I like you change! Great idea. This looks good, but I'll wait and see what consensus says about it :) Kosh Vorlon 16:02, 18 May 2014 (UTC) * The tables all look fine. The only comment I would make is that when they are pasted into the article they are pasted in "linear" rather than try to go side-by-side. The latter is not really working well on a narrow screen. Spinning Spark 18:17, 18 May 2014 (UTC) * Spinningspark, I'd like to keep the side-by-side format if at all possible. I'm not using a particularly wide screen and I can see both sides just fine (I was able to see this on my cell phone as well). The vertical format would leave a lot of space on the right, however, if consensus is that they should be vertical only, with no horizontal layout, then that't what they'll be. Kosh Vorlon 13:16, 19 May 2014 (UTC) * See this scrap view. Spinning Spark 14:34, 19 May 2014 (UTC) * You can see the tables side-by-side on your cell phone? Not on my phone their not. You must be using some kind of tablet and you cannot be using the mobile version of Wikipedia; the mobile version of the page always shows the tables linear regardless of the screen size. Spinning Spark 14:47, 19 May 2014 (UTC) I introduced the " " on the table to satisfy SpinningSpark's concern about there being too much which space. (See the history page of 2014-04-08 at 16:58.) At the time, I was concerned about the effect this would have on different screen sizes, but it is what the collaborative process led us to. I've never been a fan of floating the table, and now that the user whom I was responding to in doing so is asking for it to be undone, I join in that recommendation. Could we resolve this issue to everyone's satisfaction by including the prosigns and the non-English extensions as additional rows at the end of the (non-floated) main table, rather than as two separate tables? This would also make it easier for someone to sort by the "Code" column to figure out, for example, what character(s) the code "· – · · ·" belongs to. --JoeDeRose (talk) 17:29, 19 May 2014 (UTC) * Sorry for changing my mind on this, but now that the tables are wider the overlap is much more of an issue and the white space less so. Spinning Spark 19:12, 19 May 2014 (UTC) * Spinnngspark Interesting, your computer displays it quite a bit different than both of mine. Here's a screencap from my work box (Win 7, Dual monitor, Chrome Browser . It looks fine on my side. However, I will not move it to the article without consensus Kosh Vorlon 19:46, 19 May 2014 (UTC) * It looks like you are viewing in full screen on a wide monitor. Not everybody does that, and not everybody has a widescreen monitor (although they are rapidly becoming standard). I tend to work in two windows, a main one taking over half to 2/3 of the screen and a minor one. This is because I frequently need another article or a source document open while I work on an article in the main window. While we can't possibly make the display perfect for everyone, by the same token, we should not be optimising it just for one person's personal preference. Spinning Spark 20:33, 19 May 2014 (UTC) Spinningspark I totally agree - however, you're the only person (so far) that's complained about the width. By the way, I have two monitors, and one is wide screen (but that's not the monitor I use for Wikipedia ) the one I use for Wikipedia is a standard square monitor (not widescreened - but I have a fairly high resolution on it of 1280 X 1024 (my widescreen monitor is 1680 x 1050 ). I'll wait for conesnsus before I move it however. Kosh Vorlon 16:41, 20 May 2014 (UTC) * Um, to clarify, I agree with JoeDeRose, so possibly that makes three of us. Just stick it in the article already. You've talked about it enough. Spinning Spark 16:59, 20 May 2014 (UTC) * Ok - added in to the page. Once again, feel free to adjust it Kosh Vorlon 20:31, 20 May 2014 (UTC) One Code Table Instead of Three (I mentioned this above, but I think it got lost in the discussion about table width and placement.) Does anyone object if I unite the existing 3 code tables into a single table? --JoeDeRose (talk) 16:43, 22 May 2014 (UTC) * JoeDeRose Why not use the sandbox and show us what it would look like ? Kosh Vorlon 10:50, 23 May 2014 (UTC) * Okay, I've prepared 2 options (a simple union of the tables and a version with categories). I personally prefer the second version (with the categories). * --JoeDeRose (talk) 12:41, 23 May 2014 (UTC) * The one with categories is more informative to the reader. Spinning Spark 13:27, 23 May 2014 (UTC) * I like #2 as well. Kosh Vorlon 18:23, 23 May 2014 (UTC) * The player changes make the page load very slowly.... Glrx (talk) 21:18, 23 May 2014 (UTC) (2014) correct international morse-code according to ITU 2009 here it is: www.itu.int/dms_pubrec/itu-r/rec/m/R-REC-M.1677-1-200910-I!!PDF-E.pdf 1.1.1 Letters a. − i. . r. − . b −. . . j. − − − s. . . c −. − . k −. − t − d −. . l. − . . u. . − e. m − − v. . . − '''accented e. . − . .''' n −. w. − − f. . − . o − − − x −. . − g − −. p. − − . y −. − − h. . . . q − −. − z − −. . and so on... --<IP_ADDRESS> (talk) 14:28, 7 June 2014 (UTC) Spelling By this edit, Spinningspark reverted an edit of mine with the comment that I had made a "gratuitous change of spelling system". This is incorrect for two reasons. First, I did not change the spelling system. Most of the article uses AE spelling, beginning with the word "standardized" in the second sentence. By changing a few BE spellings to AE, I was conforming those passages to the existing spelling system. Second, even if the entire article had been written in BE, a change to AE would not be "gratuitous" but would be in keeping with Wikipedia policy. Morse code, developed in the US by three Americans, has a clear tie to one English-speaking country, so that country's spelling should be used, under Wikipedia policy. Accordingly, I'm reinstating the minor spelling corrections ("vocalise" to "vocalize", etc.). JamesMLane t c 05:40, 19 June 2014 (UTC) * The discussion is meant to come after the revert and before reinstating the original edit, but whatever. Your edit summary was "sp" which gave the impression you were correcting spelling mistakes. This is frequently done by American editors who simply do not realise that British spelling is different, not mistaken. I revert such edits automatically without investigating (and I would do the same if an article is changed to British spelling without a rationale). I don't really object to this article being declared American spelling provided that is what is agreed here, but I would make a couple of points. First of all, the "ize" spelling is not conclusive evidence for American spelling in the way that color or canceled would be. There is a British spelling system called the Oxford spelling system which uses "ize" rather than "ise". Secondly, an American inventor does not necessarily force an American spelling system and each case should be considered on its merits. The Samuel Morse article should unarguably be in American spelling because he is an American and thus the article has an American subject. The Morse code article is not so clear cut. Morse code, whatever its origins, is an international topic, it was ubiquitous in its day. One could even argue that the international Morse code is German since it orginated with Gerke adapting it from Morse's original. Spinning Spark 07:07, 19 June 2014 (UTC) * I understand BRD as to substance, but, yes, this did seem to me to be a simple mistake -- not because "vocalise" is the wrong way to spell the word (I've edited the article on Comparison of American and British English and I understand that BE spelling is simply different, not inherently wrong), but because "vocalise" is the wrong way to spell the word in the context of this article. I gave two reasons. The first is that the article is already in AE spelling and Wikipedia policy is to make each article internally consistent. You suggest that perhaps the article is, instead, already in Oxford spelling, which uses -ize endings. I don't need to delve into Oxford spelling to determine which is used here, because every change I made was changing an -ise/-ised ending to -ize/-ized. From my quick glance at the Oxford spelling article, I gather that this change would be correct even if the article were in Oxford spelling (though I saw nothing in the article that is not in AE spelling except the few instances I changed). * Second, I pointed out the subject's strong ties to the United States. You respond by noting later work done in Germany. Under Wikipedia policy, that's irrelevant. "An article on a topic that has strong ties to a particular English-speaking nation should use the English of that nation." (from Manual of Style) Ties to Germany don't matter. (I think some people have suggested that a strong tie to an EU country would call for BE spelling and a strong tie to a Latin American country would call for AE spelling, on the basis that the form of English most common in that non-English-speaking country should be used, but I don't think this is policy.) In any event, Gerke was merely modifying a system that originated in the US and that still bears the name of its principal American inventor. I don't see a plausible case for "strong national ties" to Germany. * By the way, as a side note that's irrelevant to how to spell words in this article: You give color and canceled as clear examples of AE spelling. I consider canceled to be correct in AE, because we follow the general rule of not doubling the consonant if the last syllable is unaccented, while BE departs from that rule for some words ending in -l. Nevertheless, for some reason, cancelled has some currency in the United States, even though travelled and the like are virtually never seen. As I said, this has nothing to do with the Morse code article, but, given that you mentioned the example, I thought you might be interested. JamesMLane t c 12:13, 19 June 2014 (UTC) * You are kind of misrepresenting me here. I did not claim the article is in Oxford spelling, or that it should be, I merely reverted an unexplained edit doing something that is often controversial. True, I argued that International Morse Code as we currently know it is an international subject, not tied to the USA in particular. However, that was not an argument against using American spelling. As I already said, I don't actually object to using American spelling. Spinning Spark 23:15, 20 June 2014 (UTC) * Comment. The only issue for this talk page is which language dialect should be used for this article. I'm open to either A or B at this point, but I'm leaning toward A due to James' argument that Morse was American. I welcome further argument either way. Glrx (talk) 23:36, 20 June 2014 (UTC) Bandwidth Part of my edit summary was cut off because it was too long. The missing part said "The limit on speed is set by the abilities of the operator, not by the bandwidth of the channel". In comparison to the transmission speeds in use at the time, the bandwidth was essentially unlimited. In fact, it was not even accepted that faster speed required more bandwidth until around the 1920s. Before that it was believed that radio telegraphy occupied a single frequency only. SpinningSpark 11:55, 15 February 2015 (UTC) * Thank you for opening this discussion. I think we have a different understanding of bandwidth. What I mean by that is the common meaning from information theory (which is explained at Bandwidth (computing), namely the speed at which a certain amount of information is transferred. So this is _not_ about the speed at which the Morse operator can produce dots and dashes. Instead, given a certain, fixed speed of the Morse operator, the speed of communication is the rate of which the actual text is transferred. In the design of Morse this speed was increased by encoding the alphabet such that as much text (information) as possible is communicated by a given amount of dots and dashes. Although the whole concept of information theory had not been formalized at the time then the Morse alphabet was designed, there was still an understanding at that time, that an encoding of the more frequent characters with shorters codes would increase the speed of the communication. Apart from the hint at this with the link to the Huffman coding, the article is quite weak regarding this aspect, and it would be good to extend it with typical data rates (i.e. actual amount of information transferred, not number of dots and dashes) for typical operator speeds. Btw, a similar and related case is that of cryptography, where also in the 19th century cryptography techniques were used without a formal understanding of how well they were working, like the one-time pad. Lklundin (talk) 12:35, 15 February 2015 (UTC) * I perfectly understand what is meant by bandwidth here, please don't talk down to me, I have more than forty years experience in this field. Data bandwidth is not the same as frequency bandwidth but the two are most certainly related. The fact remains that nobody talks about Morse code in those terms, especially the early history of it, so it is wrong to put that in the article. You can transmit the data as fast as you like, but it doesn't make any difference if you are limited by the speed of a single operator. The difference can be seen at the point at which multiplexing came in. Multiplexing unarguably increases the transmitted data bandwidth. However, it was still not recognised that there was a limit to the channel bandwidth, they naively thought that they could carry on adding more Morse channels ad infinitum. It was only the advent of telephony that changed that outlook. * Going back to a single operator, the transmission is limited by the symbol rate the operator can produce. The symbols in this case are dots and dashes, but we could equally call them 0s and 1s. Changing the coding does not change the symbol rate produced by that operator. It follows that the transmitted data bandwidth has not changed either. Optimizing the code to efficiently encode the English language is not the same as increasing bandwidth. In my opinion "efficient" was exactly the right word here. SpinningSpark 14:29, 15 February 2015 (UTC) Letters, numbers, punctuation, prosigns and non-English variants The digraph AR is currently only represented as the plus sign [+]. Its more common usage as an "end of message" prosign is absent. Likewise, the digraph KN is currently only represented as an open parenthesis [(]. Its common usage as an "invitation to transmit, called station only" prosign is absent. Notes to these effects could be added to the pre-existing entries in the sub-category Punctuation. <IP_ADDRESS> (talk) 02:14, 25 February 2015 (UTC)B. Salvisberg, WA6A * L. Peter Carron Jr., W3DKV "Morse Code The Essential Language" Second Edition ©1991 American Radio Relay League ISBN 0-87259-035-6. Challenge for the quinary view I want a citation for that; it's not WP:CALC because sources (e.g. Shannon in the celebrated A_Mathematical_Theory_of_Communication!) say that it's at most quaternary (four symbols) because of how symbols may occur; in particular a single unit-space cannot occur arbitrarily so it may subsumed to the dit or dah to its left. <IP_ADDRESS> (talk) 22:12, 1 March 2015 (UTC) And if Shannon is wp:primary source for you but your uneducated and uncited WP:OR is somehow acceptable instead, refer to Richard Blahut's "Information Theory and Coding" in in Wendy M. Middleton Reference Data for Engineers: Radio, Electronics, Computer, and Communications (9th ed.) as secondary source expanding on Shannon's analysis at a textbook level. <IP_ADDRESS> (talk) 22:18, 1 March 2015 (UTC) * So the "short gap" and "medium gap" elements would each lose a "0" because that is provided by the "0" that ends the preceding dit or dah. I like it. I've always disliked the "quinary" view and never could figure out why (besides that it looked like OR, but the entire article needs more refs, so it didn't stand out so much). I think you have perfectly good references there and should go ahead and make the change. It will be very difficult for anyone to make a case complaining about something referenced to Shannon, preferring something that is unreferenced! If you are unfamiliar with the reference templates, just put in the "raw" references and some OCD person like me will fix them up. Jeh (talk) 22:29, 1 March 2015 (UTC) * Obtw, I would use both references. Jeh (talk) 22:30, 1 March 2015 (UTC) * Morse code is in essence binary: there are only two information carrying symbol elements, the DOT and DASH. The rest are spacing and delimiting elements. These latter are unavoidable artefacts of asynchronous serial data transmission. The equivalent in a modern code is the start and stop "bits" of ASCII. These are different in timing (in many transmission systems) from both the MARK sand SPACE symbols and different from each other. In particular, the stop bit was typically 2.5x the length of a MARK or SPACE bit to allow time for mechanical teleprinters to recover from printing the previous character ready for the next character. Yet I have never heard of ASCII or Baudot codes being considered quaternary because of the start and stop bits. They are always considered binary, the transmission housekeeping overheads are not considered part of the information code. SpinningSpark 13:38, 4 March 2015 (UTC) * By the way, the Shannon paper does not explicitly call Morse code quaternary, although it does say there are four elements. Nor does the Middleton book, even though the term quaternary appears in the book in several other coding contexts. Spinning<b style="color:#4840A0">Spark</b> 14:09, 4 March 2015 (UTC) * I think you are confusing character codes with framing. First, ASCII is not strictly a binary code. It is defined by a table of characters vs. integer values, which can be written in any notation desired. It is the representation of those integer values in computers and on transmission lines that is binary. As for asynchronous serial transmission, start and stop bits in transmission of ASCII, etc., use the same mark and space durations that are used during intra-character-time. (Granted that a stop bit can really be of indefinite length, it is still value with only one unit time.) It is rather a different thing for Morse to use different lengths of spaces for inter-mark gaps, inter-character gaps, and inter-word gaps: A space of inter-character duration or greater never occurs inside a character. That cannot be said of the marks or spaces in async serial. * In any case, Shannon characterizes Morse as having the four elements mentioned, and who are we to argue with Shannon? There is no more reliable source in information theory (the man was largely responsible for founding it, and he didn't stop with that). I don't think it's OR to then call this "quaternary": if two elements are binary, then what else would you call four elements? Jeh (talk) 20:11, 6 March 2015 (UTC) * I'm not disputing Shannon, but he never said "quaternary", possibly for a good reason. My case here is that there is no codepoint in the Morse code that includes an inter-character space, and Shannon explicitly includes the intra-character spaces as part of the DOT and DASH elements. Likewise, there is no codepoint in ASCII that includes a stop bit. It is beside the point that stop bits are not part of the ASCII standard, the point is that their use is not tantamount to introducing a third element. You are wrong in stating that the start and stop bits are the same length as character bits. In the mechanical teleprinter era it was pretty standard to make the stop bit 2.5 units, and the start bit was sometimes longer than one unit also. Making the stop bit one unit was a later practice in the computer era when hardware had improved sufficiently to make long stop bits unnecessary and the code could then conveniently fit in a byte. Eventually the stop bit was completely unneeded and could then be used to extend the code to an 8-bit code or serve as a parity bit. You are also wrong in stating that ASCII was not defined as binary. The original ASA standard explicitly declares the code to be a 7-bit code and defines all the codepoints as binary numbers. <b style="background:#FAFAD2;color:#C08000">Spinning</b><b style="color:#4840A0">Spark</b> 17:40, 7 March 2015 (UTC) * Shannon's inclusion of inter-character and inter-word spaces is a correct analysis. You cannot unambiguously decode letters and words without them. ASCII does include an inter-word space, i.e. the space character. The inter-character space is implicit in ASCII because it is not a variable-length code. It is required in Morse because Morse is a variable-length code. It is implicitly present at the end of every character in the Morse code chart. If it wasn't there, then it would not be possible to tell whether dit dah meant "E T" or "A". It is therefore very definitely an "information-carrying element". Similarly with the inter-word space. * The start/stop bit discussion is a digression, but: * I never claimed that stop bits appeared in ASCII code points. They're necessary for character framing in async serial comm (regardless of character code), but they're not part of ASCII. My experience with teleprinters only goes back to the ASR33 area, where stop bits were exactly 2 (of course an idle line could extend this indefinitely). On later terminals that did not need the extra time, they went to 1 stop bit as you stated, and 1.5 on the 2741. I never heard of anything requiring or sending 2.5 stop bits. Our article on Teleprinter says that the older machines (Baudot) used 1.43 stop bits. * You are incorrect about the possibilities of "start bit sometimes longer than one unit" and "stop bits eventually unneeded". Oh, a machine could be built, and maybe was back in the old days, that needed 1.5 start bits or some such. Maybe that's what you meant. But whatever the system defines the start bit length as - it's one bit time in modern serial comm - that time is invariable. This is because the next bit after the start bit can be either mark or space, and the receiver starts looking for the first data bit one start-bit-time after the start bit begins. If the start bit is longer than expected then the framing and hence interpretation of the data bits will be off: The receiver could be looking for a data bit while the start bit is still arriving. * And you are grossly incorrect about "stop bits were eventually unneeded". if you get rid of the "guaranteed mark" of the stop bit, then you can't identify the beginning of a start bit! (What the stop bit does is to guarantee a "mark" at the end of a character frame, so that the timing of the start bit, which is always a "space", can be identified.) Nor did stop bits ever have to fit in a byte with the character code; that was never a concern. * ASR33s sent and received 7 data bits plus a parity bit (I believe they could be optioned from the factory for space, mark, even, or odd parity; I've certainly worked with all of those except even, iirc). Async serial comm was extended to eight data bits by redefining the parity bit as an eighth data bit, or by preserving the parity bit but adding an eighth data bit (e.g. 8E1), not by removing the stop bit. Again: You can't get rid of the stop bit. * ASR33's sent and received a start bit (space), seven data bits, a parity bit, and two stop bits (mark). Of course if the machine was then idle the line would continue in "mark" condition. Some later equipment (VDTs, daisy wheel printing terminals, etc.) could be optioned to run with eight data bits and a parity bit (and, still, of course, a stop bit). * Regarding "not defined as binary", you are confusing how ASCII was originally spec'd with how it was subsequently analyzed and understood in information theory. The fact that ASCII code points were originally and commonly described in terms of bit configurations is purely incidental to the latter. (Every ASCII code chart I ever used had both binary and some other representation, usually hex nibbles; as a programmer I had very little use for the binary, but much use for the other.) If we had a decimal computer using Dekatrons for storage - each storage position having ten states - and we used three of those positions to store each ASCII character, with e.g. "A" being stored as 065, that would still be the ASCII code even though it isn't binary. Numbers are just points along the number line; they are not inherently binary, decimal, or octal, or Roman numerals or base e for that matter, regardless of how someone happened to first write them down. * Though Morse was and is widely described as consisting of just dits and dahs, hence "binary," Shannon's deeper analysis correctly recognized that the inter-character and inter-word gaps are necessary for unambiguous decoding, and so represent additional information-carrying elements. Just as you can't recognize dits and dahs without intra-character gaps, you similarly can't correctly recognize characters without inter-character gaps, and you can't correctly decode words without inter-word gaps. We don't have to say that Morse definitely consists of four elements and the old "binary" description is wrong, but we should definitely include a summary of Shannon's analysis that presents it as a "later understanding" or some such. Jeh (talk) 19:22, 7 March 2015 (UTC) * Jeez, TLDR. Find a decent source that actually says Morse is quaternary then we can talk some more. <b style="background:#FAFAD2;color:#C08000">Spinning</b><b style="color:#4840A0">Spark</b> 16:05, 8 March 2015 (UTC) * Better? I hatted the irrelevant parts. Also made a couple of minor tweaks, but nothing meaning-changing. I am not insisting on use of the word "quaternary". But Shannon is a completely sufficient source for saying that Shannon's analysis of Morse shows it to have four elements. No other source is needed. Jeh (talk) 19:00, 8 March 2015 (UTC) Citation needed for all those "Non-English Extensions" code groups This page's Morse code table has quite an extensive listing of codes for letters with diacritical marks not used in English. But it has no indication of what the source is for those codes. Can anyone cite a source for them? --<IP_ADDRESS> (talk) 09:49, 20 May 2015 (UTC) It appears that semicolon is not in the ITU Morse code recommendation The article currently states, "The &, $ and _ signs are not defined inside the ITU recommendation on Morse code." Which implies that the other punctuation marks, where not otherwise noted, are from the ITU Morse code recommendation. However, if you actually go to the ITU's website and download their Morse code reccomendation document, it doesn't include the semicolon. (See https://www.itu.int/rec/R-REC-M.1677-1-200910-I/en ). So perhaps the semicolon should also be listed as "not defined by the ITU" along with those other punctuation marks. --<IP_ADDRESS> (talk) 09:56, 20 May 2015 (UTC) * I think the sentence was intended to introduce the following material. I've edited it to make that clear. Obviously there are many symbols that are not in ITU Morse.--agr (talk) 21:08, 20 May 2015 (UTC) DYK congratulations for you today <span style="font-family:Monotype Corsiva;background:#E6E6FA;border:solid 1px;border-radius:7px;box-shadow:darkgray 0px 3px 3px;"> Bfpage &#124;leave a message 15:15, 13 June 2015 (UTC) External links modified Hello fellow Wikipedians, I have just added archive links to 4 one external links on Morse code. Please take a moment to review my edit. If necessary, add after the link to keep me from modifying it. Alternatively, you can add to keep me off the page altogether. I made the following changes: * Added archive https://web.archive.org/20141201115959/http://www.faa.gov:80/air_traffic/publications/atpubs/aim/aim0101.html to http://www.faa.gov/air_traffic/publications/atpubs/aim/aim0101.html * Added archive https://web.archive.org/20131122080042/http://www.tc.gc.ca/media/documents/ca-publications/COM-AIM-2013-2_ENG-3.pdf to http://www.tc.gc.ca/media/documents/ca-publications/COM-AIM-2013-2_ENG-3.pdf * Added archive https://web.archive.org/20150502204507/http://www.iaru.org/rel030703att2.html to http://www.iaru.org/rel030703att2.html * Added archive https://web.archive.org/20090904034127/http://www.faa.gov:80/air_traffic/publications/ATpubs/AIM/Chap1/aim0101.html to http://www.faa.gov/air_traffic/publications/ATpubs/AIM/Chap1/aim0101.html Cheers. —<sup style="color:green;font-family:Courier">cyberbot II <sub style="margin-left:-14.9ex;color:green;font-family:Comic Sans MS"> Talk to my owner :Online 03:59, 27 August 2015 (UTC) Gerke I seem to remember this is the second time someone has tried to claim this as a German invention, but I can't quickly find it in the history. Presumably the logic (judging by the edit summary) is that the International Morse Code is based on Gerke's version, not the original American version. But that's a bit like claiming Rudolf Diesel invented the motor car. <b style="background:#FAFAD2;color:#C08000">Spinning</b><b style="color:#4840A0">Spark</b> 15:36, 6 September 2015 (UTC) AR Digraph / "End of message" prosign In the section: "Letters, numbers, punctuation, Prosigns for Morse code and non-English variants", the character shown for ·—·—· shows only its usage as the [+] punctuation, and lacks its usage as the "End of message" prosign, commonly written as the AR digraph. As this article is now "semi-protected", I am unable to edit it directly. - B. Salvisberg, WA6A <IP_ADDRESS> (talk) 07:27, 4 January 2016 (UTC) * If you first register an account, I will confirm it to allow you to edit the article on request. <b style="background:#FAFAD2;color:#C08000">Spinning</b><b style="color:#4840A0">Spark</b> 07:53, 4 January 2016 (UTC) Semi-protected edit request on 14 January 2016 in sound files of morse code several errors appear present at beginning of the file giving extra dot dash Wakawakawaka11 (talk) 13:30, 14 January 2016 (UTC) * Please be specific as to which sound files. I listened to several of them and heard no such errors. Jeh (talk) 13:44, 14 January 2016 (UTC) Semi-protected edit request on 4 February 2016 Prosign for "End of message" * - valign="top" * Punctuation || Plus sign [+] AR digraph Inclusion of missing "End of message" prosign usage in pre-existing [+] character entry, per Talk. Would be even better to include an entry under "Prosigns" section, as "End of message" prosign is primary usage of this character. <IP_ADDRESS> (talk) 12:29, 4 February 2016 (UTC)B. Salvisberg, WA6A * ✅. The AR digraph is actually for the beginning of a new page – see Prosigns for Morse code. Assume good faith! Paine 04:05, 13 February 2016 (UTC) External links modified Hello fellow Wikipedians, I have just added archive links to 1 one external link on Morse code. Please take a moment to review my edit. If necessary, add after the link to keep me from modifying it. Alternatively, you can add to keep me off the page altogether. I made the following changes: * Added archive http://web.archive.org/web/20160101063644/http://homepages.cwi.nl/~dik/english/codes/morse.html to http://homepages.cwi.nl/~dik/english/codes/morse.html#korean Cheers.—<sup style="color:green;font-family:Courier">cyberbot II <sub style="margin-left:-14.9ex;color:green;font-family:Comic Sans MS"> Talk to my owner :Online 11:41, 27 February 2016 (UTC) Link Budget Issues Re section in this Morse code article on "Link Budgets". I am a professional communications Engineer and I do understand the technical issues involved in 'link budgets' for communications systems. That said, I am also an active high speed Morse code ham radio operator. In my opinion the Section on "Link Budget Issues" can be safely eliminated from the Morse Code article for the following reasons: (1) The term Link Budget is not defined or used anywhere else in the Morse Code article. (2) There are no pointers or references to that subject anywhere in the section or article, (3) The so-called issues for Morse as opposed to competing technologies are not explicitly listed nor discussed thoroughly, (3) Most, if not all current active Morse code practitioners have little or no interest in such issues with respect to their daily operation, and certainly there was little interest in such issues during the 150 year wired telegraph era itself. I recommend that this section entitled "Link Budget Issues" either be expanded and improved or completely eliminated on the basis of non-interest. — Preceding unsigned comment added by <IP_ADDRESS> (talk) 14:37, 15 March 2016 (UTC) I just checked the actual Wikipedia article on "Link Budget" and although there is a fairly extensive discussion of Link Budgets for communications systems, as I suspected there is no mention there of Morse code or Link Budgets for Morse code. Likely, as I suggested in the preceding paragraph, because these issues are of little or no interest to Morse code operators. FWIW... — Preceding unsigned comment added by <IP_ADDRESS> (talk) 14:41, 15 March 2016 (UTC) New Wikipedia article related to Morse code A new Wikipedia article entitled, QSK Operation (Full Break-In) has recently been created and added to Wikipedia. This new Wiki article could profitably be added to the "See Also" section of the Morse code article. There are likely one or more other places in the Morse code article where links to QSK Operation (Full Break-In) and the article Prosigns for Morse code could be profitably added to the current Morse code article. Editors of the Morse code Wiki article might take note. <IP_ADDRESS> (talk) 19:29, 21 March 2016 (UTC) Pete k1po Semi-protected edit request on 16 September 2016 Please can you change the Verbal Form for the letter J from "dit dit dit dah" to "dit dah dah dah" so it correctly matches the Written and TONE Forms ToeBee (talk) 16:49, 16 September 2016 (UTC) * Yes check.svg Done @ToeBee: Thank you for pointing that out. 73 —C.Fred (talk) 19:20, 16 September 2016 (UTC) ____ Timing examples the same Is it just me, or are the recorded examples in the Timing section the same for "fast" and "slow"? Lebeda Karel (talk) 07:14, 22 September 2016 (UTC) * I agree, I can't detect a difference, and the "fast" files are certainly not at the speed claimed. However, it is now moot as I have removed them as part of the revert explained in the previous section. <b style="background:#FAFAD2;color:#C08000">Spinning</b><b style="color:#4840A0">Spark</b> 17:49, 28 September 2016 (UTC) More charts Do we really need the additional morse code chart with audio files and the additional sample audio files recently added by user:GeorgeV73GT? There have been complaints in the past that the many audio files make the page slow to load. This will only make this problem worse. The new material looks to me to be largely duplicating existing existing stuff, or at least superfluous to it. <b style="background:#FAFAD2;color:#C08000">Spinning</b><b style="color:#4840A0">Spark</b> 13:44, 17 September 2016 (UTC) --- a very good point "<b style=background:#FAFAD2;color:#C08000">Spinning</b><b style="color:#4840A0">Spark</b> !!!! Do we really need an article about Morse Code at all? Who uses it? Who cares ??? i know you do!!...but remember "Wikipedia is a compilation of a diverse set knowledge in many languages" ... Sorry about the slow loads, i need more bandwidth as well!!! Do we really need this at all?? — Preceding unsigned comment added by GeorgeV73GT (talk • contribs) 16:21, 21 September 2016 (UTC) * I was hoping you would provide an understandable rationale for adding this material, but you have not. I have removed it on the grounds that it is redundant to material already in the article. No information has been lost by doing this. <b style="background:#FAFAD2;color:#C08000">Spinning</b><b style="color:#4840A0">Spark</b> 17:47, 28 September 2016 (UTC) Dear <b style=background:#FAFAD2;color:#C08000">Spinning</b><b style="color:#4840A0">Spark</b> May i suggest that we fork the Morse Code article? One page that would load fast and contain no audio files, for those who only wanted a written intellectual article, and then one fork of the article would be a slower but would have the audio files. It is somewhat like an article on a famous Painter's works and people complaining that the new renditions of their work in color take longer to load than the older renditions that were in one bit black and white. Sounds like a personal bandwidth problem. If you will set up the fork, I will undertake to move all the audio files to the other fork. As it is, you just whacked about two to three hours of my work. Where do I go to complain? Jimbo? The design of Wikipedia is primarily for text and pictures (I haven't even addressed video), and it may be the slow speed of the page load is a design problem in the Wikipedia core. Certainly You and i will not fix that. Should i set up audio files on youtube and link them with references to the matrix (YOU WILL BE ASSIMILATED!)??? GeorgeV73GT (talk) 01:52, 29 September 2016 (UTC) PS. I appreciate (Thank You!) you willingness to reason, but who do I go to complain about other Unreasonable Editors? GeorgeV73GT (talk) 01:52, 29 September 2016 (UTC) PSS. I am going to revert the matrix without the audio files, which seems to deal with the immediate complaint. * IMO Spinningspark is correct - there is no need for the additional table, with or without audio files. It provides no information not already in the article; it is merely a visually different arrangement. I support the removal of any such addition (with or without the audio files - and will do the removal myself if Spinningspark doesn't happen to get to it quickly), until and unless GeorgeV can explain how it adds information or usability or tutorial value that is not already in the article. If you really think readers need help understanding that ". -" should be spoken as "dit dah", despite the already-existing descriptions of this, then the "dit dah", etc., should be added to the existing table. Jeh (talk) 06:03, 29 September 2016 (UTC) * The issue is not just the slow load speeds (this is not so much a personal issue by the way, I was just pointing out that others have made this point in the past). The point is that absolutely no information has been added. The audio files in the new table were just copies of the existing table morse files. A table giving the spoken form would need spoken audio files. The table as you constructed it is entirely redundant, and if it were not redundant, it would be completely over the top for the point you are trying to make. A single file speaking the morse alphabet would more than suffice. On creating a fork, please see WP:CFORK where you will see that these are against guidelines. But perhaps you meant that some of the exising article could be moved to a daughter page. I might support that, but not for the purpose of finding a home for your unwanted table. As for where to go to complain, see Dispute resolution, but remember, Wikipedia works by finding consensus in a collegial atmosphere. There is NO "headmaster" you can go to to make a ruling on content disputes. <b style="background:#FAFAD2;color:#C08000">Spinning</b><b style="color:#4840A0">Spark</b> 10:47, 29 September 2016 (UTC) Semi-protected edit request on 6 December 2016 The table in has Prosign labels in the first column which are linked to Prosigns for Morse Code. That's a redirect page; it would be better to link them all to Prosigns for Morse code (with a lower-case c) instead. But per MOS:NOPIPE it would be even better (and this is the edit I'm requesting) to link them to Prosign directly. <IP_ADDRESS> (talk) 00:51, 6 December 2016 (UTC) * Yes check.svg Done Stickee (talk) 03:36, 6 December 2016 (UTC) Edit or Citation Needed In the "Other Uses" section, it states "Submarine periscopes include a signal lamp." My husband is an ETCS SS ANAV on board US submarines the past 18 years and just informed me this is false, at least regarding US Submarines; past and present and that "that was just some Hunt For Red October bullsh**." (He can't specify regarding foreign subs). Can someone either remove this statement or provide a valid citation (so my husband can stop laughing with the guys about this.) Thanks!Crayolakym (talk) 01:58, 12 December 2016 (UTC) * Done. <b style="background:#FAFAD2;color:#C08000">Spinning</b><b style="color:#4840A0">Spark</b> 15:48, 12 December 2016 (UTC) Hagal Dune Field edits/reverts Seems to me that since the Hagal Dune Field is called the "Martian Morse Code" by NASA, Time magazine, and the HiRISE Operations Center of the University of Arizona plus other sources that this information is relevant to this subject and it does belong in the "See also" section. After all, it shows the cultural significance of Morse code in today's society. And though MOS:SEEALSO says * Whether a link belongs in the "See also" section is ultimately a matter of editorial judgment and common sense. The links in the "See also" section should be relevant, should reflect the links that would be present in a comprehensive article on the topic, and should be limited to a reasonable number. it also states: * The links in the "See also" section might be only indirectly related to the topic of the article because one purpose of "See also" links is to enable readers to explore tangentially related topics. I would not know about this geologic formation on Mars named for Morse code if it weren't for the Wikilink previously in the 'See also' section. Let's discuss. Shearonink (talk) 19:19, 18 July 2017 (UTC) * Thank you . I fully agree with you. That's why I added it in the first place. I thought it is remarkable that a topological formation would have similar characteristics, and be named after, Morse Code. But when I got reverted with a rude edit-summary, I chose not to enter the predictable conflict, and associated bickering. Dr. K. 19:59, 18 July 2017 (UTC) History This article fails to sketch the entire history of Morse code. In particular: when, how, and why did it go into decline? The article only mentions that wireless Morse code was abundant in World War II, and then that it was dropped as a standard for maritime distress in 1999. Of course the decline was more gradual than that. Even in the 1940s, telex was readily available. As radio communications improved, Morse code was needed less and less. And with the advent of computers and advanced electronics, messages could be spread - and encoded - in progressively more efficient ways. All these changes took place gradually, but how exactly? Steinbach (talk) 23:11, 20 October 2016 (UTC) * I would say that such a discussion belongs in the electric telegraph article rather than here. Morse went into decline because the telegraph itself went into decline. International Morse became the dominant code, but it was not the only code ever in use and is not synonymous with the telegraph. Having said that, you could probably raise the same issue about the electric telegraph article. <b style="background:#FAFAD2;color:#C08000">Spinning</b><b style="color:#4840A0">Spark</b> 15:56, 12 December 2016 (UTC) * Morse was in use for radio long after the decline of the wired telegraph system. There's not a good link. Number774 (talk) 12:40, 24 April 2017 (UTC) * Radiotelegraphy went into decline for the same reason that wired telegraphy went into decline: voice communication became widely available and made it obsolete. The fact that RT survived longer than wired does not invalidate my argument that the decline of Morse was a result of the decline of telegraph. <b style="background:#FAFAD2;color:#C08000">Spinning</b><b style="color:#4840A0">Spark</b> 19:35, 19 July 2017 (UTC) "Stop" Does anyone else think its odd the word "stop" (used in place of a period, since the early language didn't have a code for a period) doesn't appear anywhere in the article? --RThompson82 (talk) 02:02, 24 July 2017 (UTC) * Was the usage of "stop" to denote a full stop (period) part of Morse code itself, or was it a convention among operators? —C.Fred (talk) 03:40, 24 July 2017 (UTC) "A telegraph" or "the telegraph"? User:Glrx changed "Morse, a telegraph inventor" to "Morse, an inventor of the telegraph". I think this should be reverted, but as I am responsible for the original wording I'm posting here first. There have been a number of different telegraph systems in commercial use, and many, many more invented but never got past prototype or proof of concept. Morse was not the first in either category, so describing him as an inventor of the telegraph is misleading. <b style="background:#FAFAD2;color:#C08000">Spinning</b><b style="color:#4840A0">Spark</b> 13:39, 4 September 2017 (UTC) * I'm no expert on the subject. Spinningspark's edit removed several inventor names (Cooke, Wheatstone, Gale, Vail). My primary objection to "a telegraph inventor" was about numerosity; it implies a large set of inventors rather than a small set identified in the explicit list or an implication of gifted persons. I was less concerned with "the", but that article may still be appropriate. There are many inventors, but Morse was the single wire, relay amplified, on-off timed system that was the successful telegraph. See Samuel F. B. Morse. Glrx (talk) 16:48, 4 September 2017 (UTC) * I removed the other names partly because that is going well off the topic of Morse code, but primarily because the claim that Morse "shared" the invention is patently false. Morse did not invent the telegraph. He is not even close to being the first, or one even one of the first. He invented a particular design of telegraph, as you say, the relay-repeated telegraph. That telegraph eventually became the world dominant system, but not immediately. A one-wire version of the Cooke and Wheatstone telegraph was popular in Europe and some sets remained in use well into the twentieth century. * Writing that Cooke was an inventor of the telegraph is akin to writing that Boeing was an inventor of the aeroplane. We would not write that. Not even if it were true that Boeing came to compleely dominate the commercial aircraft market. We would write instead that he was an aeroplane inventor. That is also the right way to refer to Morse, he was a telegraph inventor. <b style="background:#FAFAD2;color:#C08000">Spinning</b><b style="color:#4840A0">Spark</b> 17:41, 6 September 2017 (UTC) Semi-protected edit request on 15 December 2017 Please fix this bug/typo, under the Section "Symbol representations", subsection "Exclamation mark": The KW digraph is correct, but the following code in parenthesis is wrong. It should be "(-.-.--)", not "(-.---)". <IP_ADDRESS> (talk) 15:14, 15 December 2017 (UTC) * Yes check.svg Done There was a typo in the Morse code template, a "dot" was typed as "dat" resulting in a dot not being represented. Thank you for the catch. Eggishorn (talk) (contrib) 21:00, 15 December 2017 (UTC) Semi-protected edit request for ";", $\overline{KW}$, and "É" vs "Đ" Please cut and paste text "Not in ITU-R recommendation" into table in Morse code section, line for ";". (Amazing, but true. I checked ITU-R M.1677-1 from Oct 2009.) Please cut and paste text "Not in ITU-R recommendation" into table in Morse code section, line for $\overline{KW}$. ( I checked ITU-R M.1677-1 from Oct 2009.) This is the first time that I've seen $\overline{NY}$=$\overline{KW}$=$\overline{CM}$, which is a welcome discovery; could you please add a source for the code? You might want to include the "backwards J" exclamation point (---·) if anyone uses that; I've seen it in books as a U.S. & Caribbean local code but never heard it on-air. This is tricky: É is the one-and-only accented character included in the ITU-R M.1677-1 from Oct 2009; all the rest are national variants. So on the line for Đ, for example, Đ is not in the ITU-R, but the É listed in the same line is. The following is my estimate of the least tedious way to get this across: Please cut-and-paste Morse code in the lines for Đ, É, Ę the text "É is the only accented character included in ITU-R recommendation." Spintendo ᔦᔭ 05:38, 3 January 2018 (UTC) It would be even more Encyclopedic to stick in ref-links for each and every particular character from the local national standard that uses it. However I have not found any such yet: Just old code-training pamphlets (incl. ARRL) which do not cite any authorities. (Many do, however, list the characters into language sets, like the Esperanto Morse set, to give context for the overlapping codes used for marked letters.) AstroTomical (talk) 23:29, 2 January 2018 (UTC) * ✅ Everything except the following: * 1) $\overline{NY}$=$\overline{KW}$=$\overline{CM}$ not implemented — I dont have the source code. * 2) Nor do I have access to any loc nat standards. * Regards, Spintendo ᔦᔭ 13:03, 3 January 2018 (UTC) https://www.youtube.com/watch?v=scFR4sYnVDc <- nokia SMS tone. — Preceding unsigned comment added by <IP_ADDRESS> (talk) 05:58, 7 May 2018 (UTC) Conflicting Source I came across the following, which has some significant differences with the signs as given in this article. I'm not a Morse expert (actually, I was just working on designing a font) so I have no real knowledge of the sources for this page, but this seems to show a version of Continental Morse which differs in the letters O, P, X, Y, Z, and numerals from that given in the chart in this article. The linked version corresponds to the International Morse standard, which makes sense given that it is what International Morse was derived from. (did a writer in 1912 assume they were the same?) https://earlyradiohistory.us/1912code.htm Worldwalker (talk) 13:39, 19 August 2018 (UTC)
WIKI
Claus von Wagner Claus von Wagner (born 28 November 1977) is a German Kabarett artist, a stand-up observational comic and political satirist. Early life Born in Munich, von Wagner grew up in Miesbach, southeast of Munich. His father, originally from Prussia, was a lawyer, while his mother was a housewife. After completing his final school exams, he pursued studies in Communications Sciences, Modern History, and Media Law at Ludwig-Maximillian-University in Munich. In 2003, he graduated with a degree of "Magister Artium." The subject of his master's thesis was "Political cabaret on German television. Between social criticism and self-promotion. An expert survey." Prior to and during his university studies, he set up his first "Kabaret" show, "Warten auf Majola", which premiered in 1997. In 2012 he joined the German TV show heute-show. In 2014, he co-hosted the popular television political satire Kabarett program, Die Anstalt alongside Max Uthoff. [4] Additionally, from 2004 to 2014, he was a member of the First German Forced Ensemble, a trio that included Mathias Tretter and Philipp Weber. Awards * 2016 Dieter Hildebrandt Prize Personal Claus von Wagner lives in Munich and has a daughter.
WIKI
Biphoton Interference in a Double-Slit Experiment Ananya Paul, Tabish Qureshi Abstract A double-slit experiment with entangled photons is theoretically analyzed. It is shown that, under suitable conditions, two entangled photons of wavelength λ can behave like a biphoton of wavelength λ/2. The interference of these biphotons, passing through a double-slit can be obtained by detecting both photons of the pair at the same position. This is in agreement with the results of an earlier experiment. More interestingly, we show that even if the two entangled photons are separated by a polarizing beam splitter, they can still behave like a biphoton of wavelength λ/2. In this modified setup, the two separated photons passing through two different double-slits, surprisingly show an interference corresponding to a wavelength λ/2, instead of λ which is the wavelength of each photon. We point out two experiments that have been carried out in different contexts, which saw the effect predicted here without realizing this connection. Quanta 2018; 7: 1–6. Full Text: PDF DOI: http://dx.doi.org/10.12743/quanta.v7i1.67 Cited by • There are currently no citations to this article.  
ESSENTIALAI-STEM
Portal:Baseball/Selected biography/2007 < purge cache This page is an archive of articles that appeared on the portal page in 2007. If an article appears here more than once, it means the article was on display for more than one week. Weeks in 2007 * Week 1 view - talk - biography/Week 1, 2007&action=history history * Week 2 view - talk - biography/Week 2, 2007&action=history history * Week 3 view - talk - biography/Week 3, 2007&action=history history * Week 4 view - talk - biography/Week 4, 2007&action=history history * Week 5 view - talk - biography/Week 5, 2007&action=history history * Week 6 view - talk - biography/Week 6, 2007&action=history history * Week 7 view - talk - biography/Week 7, 2007&action=history history * Week 8 view - talk - biography/Week 8, 2007&action=history history * Week 9 view - talk - biography/Week 9, 2007&action=history history * Week 10 view - talk - biography/Week 10, 2007&action=history history * Week 11 view - talk - biography/Week 11, 2007&action=history history * Week 12 view - talk - biography/Week 12, 2007&action=history history * Week 13 view - talk - biography/Week 13, 2007&action=history history * Week 14 view - talk - biography/Week 14, 2007&action=history history * Week 15 view - talk - biography/Week 15, 2007&action=history history * Week 16 view - talk - biography/Week 16, 2007&action=history history * Week 17 view - talk - biography/Week 17, 2007&action=history history * Week 18 view - talk - biography/Week 18, 2007&action=history history * Week 19 view - talk - biography/Week 19, 2007&action=history history * Week 20 view - talk - biography/Week 20, 2007&action=history history * Week 21 view - talk - biography/Week 20, 2007&action=history history * Week 22 view - talk - biography/Week 22, 2007&action=history history * Week 23 view - talk - biography/Week 20, 2007&action=history history * Week 24 view - talk - biography/Week 25, 2007&action=history history * Week 25 view - talk - biography/Week 25, 2007&action=history history * Week 26 view - talk - biography/Week 26, 2007&action=history history * Week 27 view - talk - biography/Week 27, 2007&action=history history * Week 28 view - talk - biography/Week 28, 2007&action=history history * Week 29 view - talk - biography/Week 29, 2007&action=history history * Week 30 view - talk - biography/Week 30, 2007&action=history history * Week 31 view - talk - biography/Week 31, 2007&action=history history * Week 32 view - talk - biography/Week 32, 2007&action=history history * Week 33 view - talk - biography/Week 33, 2007&action=history history * Week 34 view - talk - biography/Week 34, 2007&action=history history * Week 35 view - talk - biography/Week 35, 2007&action=history history * Week 36 view - talk - biography/Week 36, 2007&action=history history * Week 37 view - talk - biography/Week 37, 2007&action=history history * Week 38 view - talk - biography/Week 38, 2007&action=history history * Week 39 view - talk - biography/Week 39, 2007&action=history history * Week 40 view - talk - biography/Week 40, 2007&action=history history
WIKI
Thomas W. Parks Thomas W. Parks (born March 16, 1939, in Buffalo, New York, died December 24, 2020, in Ithaca, New York) was an American electrical engineer and Professor Emeritus of Electrical and Computer Engineering at Cornell University. He is best known for his contributions to digital signal processing, especially digital filter design and computation of the fast Fourier transform. His last work before retirement was in the area of demosaicing. Academic career Tom Parks received his bachelor's degree in electrical engineering from Cornell in 1961. He worked for General Electric for two years, then returned to Cornell to earn his masters and PhD degrees in 1964 and 1967, respectively. Upon graduation he joined the electrical engineering faculty at Rice University in Houston, Texas, where he began teaching and working in the nascent field of digital signal processing. In 1972 he and James McClellan published an influential paper on digital filter design. In 1986 Parks returned to Cornell, where he spent the remainder of his career and retired as emeritus professor. Parks received multiple awards based on his research focused on digital signal processing with its application to signal theory, multirate systems, interpolation, and filter design. He co-authored more than 150 books and papers. Affiliations and awards * Senior Fulbright fellowship (1973) * Alexander von Humboldt Foundation Senior Scientist Award (1973) * IEEE Signal Processing Society's Technical Achievement Award (1980) * Life Fellow, IEEE (1982) * Third Millennium Medal of the IEEE (2000) * IEEE Jack S. Kilby Signal Processing Medal (2004), together with James H. McClellan * National Academy of Engineering (2010)
WIKI
  Troubleshooting OpenSIPS encrypted SIP traffic March 23, 2021 Sometimes we need to have a quick way to troubleshoot encrypted SIP traffic. Using Homer is great, but if not setup yet, here’s how we can do it with sngrep. Setting up sngrep We will configure sngrep to accept and decode HEP/EEP version 3 packets. For this, we will create a configuration file for sngrep: cat <<EOF >> ~/.sngreprc set eep.listen on set eep.listen.version 3 set eep.listen.address 127.0.0.1 set eep.listen.port 5065 EOF Note1: replace lo, 127.0.0.1 and 5065 with the network interface, IP and port that matches your local setup. Note2: sngrep can run on a different machine then opensips (example: use the local interface eth0 and local IP 10.10.10.10 as the capture device and the listening address). Setting up opensips Next step is to configure opensips as a HEP/EEP capture agent. For this we will load the following modules: socket=hep_udp:127.0.0.1:6060 use_workers 1 ... loadmodule "proto_hep.so" modparam("proto_hep", "hep_id", "[sngrep_hep_id] 127.0.0.1:5065; transport=udp; version=3" ) loadmodule "tracer.so" modparam("tracer", "trace_on", 0) modparam("tracer", "trace_id", "[sngrep_trace_id]uri=hep:sngrep_hep_id") Note: The IP and port in the “hep_id” proto_hep module parameter must match the IP and port in the sngrep config file. Same for version. At the beginning of the main route we trace all transactions: route { if (!has_totag()) { if(is_method("INVITE") ) { # We need to use the dialog module to have the outgoing ACK traced trace("sngrep_trace_id", "d", "sip"); } } else { match_dialog(); } if (!is_method("INVITE,ACK,BYE,PRACK")) { # Requests that are not part of an established dialog will be transaction base traced trace("hep_lo", "t", "sip"); } trace("sngrep_trace_id", "t", "sip"); ... } If we want to trace locally generated requests, we setup tracing in the local_route route: onreply_route[local_route_reply_handle] { trace("sngrep_trace_id", "m", "sip"); } local_route { trace("sngrep_trace_id", "m", "sip"); t_on_reply("local_route_reply_handle"); ... } With the above code snippet, we can trace OPTIONS pings generated by the drouting module. Capturing Start opensips: sudo systemctl start opensips Start sngrep with dialog rotation: opensips-cli -x mi trace mode=on opensips-cli -x mi trace mode=on id=sngrep_hep_id sudo sngrep -l 4000 -R -Ludp:127.0.0.1:5065 port 5065 opensips-cli -x mi trace mode=off id=sngrep_hep_id opensips-cli -x mi trace mode=off Start sngrep with dialog rotation and OPTIONS and REGISTER requests filtered out: opensips-cli -x mi trace mode=on opensips-cli -x mi trace mode=on id=sngrep_hep_id sudo sngrep -l 4000 -R -Ludp:127.0.0.1:5065 -v "OPTIONS\ sip|REGISTER\ sip" port 5065 opensips-cli -x mi trace mode=off id=sngrep_hep_id opensips-cli -x mi trace mode=off Enjoy visualising SIP message flows in realtime! Based on this initial setup, more complex tracing scenarios can be implemented. Note1: ACKs related to a transaction that are leaving OpenSIPS are not traced if dialog tracing is not enabled. Note2: Locally generated requests don’t have the proper destination IP and port. Note3: sngrep is not able to export in pcap format packets captured in HEP/EEP format. Troubleshooting Kamailio encrypted SIP traffic March 22, 2021 Sometimes we need to have a quick way to troubleshoot encrypted SIP traffic. Using Homer is great, but if not setup yet, here’s how we can do it with sngrep. Setting up sngrep We will configure sngrep to accept and decode HEP/EEP version 2 packets (HEP/EEP version 3 packets work only with sngrep 1.4.7 and above). For this, we will create a configuration file for sngrep: cat <<EOF >> ~/.sngrephep2rc set capture.device eth0 set eep.listen on set eep.listen.version 2 set eep.listen.address 10.10.10.10 set eep.listen.port 5065 EOF Note1: replace eth0, 10.10.10.10 and 5065 with the network interface, IP and port that matches your local setup. Note2: sngrep can run on the same machine as kamailio (use lo and 127.0.0.1 as the capture device and the listening address) or on a different machine. Setting up kamailio (easy way) Next step is to configure kamailio as a HEP/EEP capture agent. For this we will load the siptrace module: loadmodule "siptrace.so" modparam("siptrace", "trace_mode", 0) modparam("siptrace", "trace_to_database", 0) modparam("siptrace", "trace_on", 1) modparam("siptrace", "duplicate_uri", "sip:10.10.10.10:5065") modparam("siptrace", "hep_mode_on", 1) modparam("siptrace", "hep_version", 2) modparam("siptrace", "hep_capture_id", 1) Note: The IP and port in the “duplicate_uri” siptrace module parameter must match the IP and port in the sngrep config file. The version number in the “hep_version” siptrace module parameter must match the version in the sngrep config file. At the beginning of the main request_route we trace all transactions: request_route { sip_trace_mode("t"); ... } We want to trace also relayed ACKs and we do that in the onsend_route: onsend_route { if (is_method("ACK")) { sip_trace(); } } If we want to trace locally generated requests, we setup tracing in the tm:local-request route: onreply_route[local_request] { sip_trace(); } event_route[tm:local-request] { t_on_reply("local_request"); sip_trace(); } With the above code snippet, we can trace OPTIONS pings generated by the dispatcher module. Setting up kamailio (easiest way) Next step is to configure kamailio as a HEP/EEP capture agent. For this we will load the siptrace module: loadmodule "siptrace.so" modparam("siptrace", "trace_mode", 1) modparam("siptrace", "trace_to_database", 0) modparam("siptrace", "trace_on", 1) modparam("siptrace", "duplicate_uri", "sip:10.10.10.10:5065") modparam("siptrace", "hep_mode_on", 1) modparam("siptrace", "hep_version", 2) modparam("siptrace", "hep_capture_id", 1) Note: The IP and port in the “duplicate_uri” siptrace module parameter must match the IP and port in the sngrep config file. The version number in the “hep_version” siptrace module parameter must match the version in the sngrep config file. Capturing Start sngrep: sudo sngrep -f ~/.sngrephep2rc Start kamailio: kamctl start Enjoy visualising SIP message flows in realtime! Based on one of this initial setups, more complex tracing scenarios can be implemented. Note: sngrep is not able to export in pcap format packets captured in HEP/EEP format. Extracting audio from calls recorded with RTPProxy November 15, 2011 Recording calls with RTPProxy is quite easy, using the rtpproxy module.  Getting the audio out of those pcap files can be tricky sometimes.  Here are the steps of how to extract audio from pcap files: • Step1:  Extract the audio out of the pcap file in raw format: rtpbreak -W -g -f -r [rtpproxy_pcap_record].a.rtp rtpbreak -W -g -f -r [rtpproxy_pcap_record].o.rtp A set of files will be generated for each stream: – rtp.[index].txt – a log of the extraction process; – rtp.[index].0.txt – characteristics of the audio stream; – rtp.[index].0.raw – the raw audio stream. • Step2:  Merge and convert and the two raw files in a wav file: sox --combine merge -r 8k -e [format] rtp.0.0.raw \ -r 8k -e [format] rtp.1.0.raw \ -t wavpcm -s [rtpproxy_pcap_record].wav Supported formats are listed on then sox manpage (search for −e ENCODING, −−encoding ENCODING). The format of the raw file can be found in the rtp.[index].0.txt file (look for the “RTP payload type” line).  Make sure that you are using the proper format for the raw file, otherwise the wav file will sound garbled. For PCMU use: sox --combine merge -r 8k -e u-law rtp.0.0.raw \ -r 8k -e u-law rtp.1.0.raw \ -t wavpcm -s [rtpproxy_pcap_record].wav For PCMA use: sox --combine merge -r 8k -e a-law rtp.0.0.raw \  -r 8k -e a-law rtp.1.0.raw \  -t wavpcm -s [rtpproxy_pcap_record].wav Parallel forking for OpenSIPS in B2B mode March 2, 2011 OpenSIPS is well-known as a scalable SIP proxy server.   But with the addition of two new modules: b2b_entities and b2b_logic, everything changed.  OpenSIPS is now able to act as a signaling Back to Back User Agent.  Being a signaling B2BUA means that media is still flowing between the end points, but signaling is divided in two individual legs: caller to opensips and opensips to callee. A particular feature that I was missing with this new addition to opensips was parallel forking.  For instance, if a user is registered at multiple locations, only the one with the higher priority will be used in routing.  Starting with release 1.7, parallel forking for OpenSIPS in B2B mode works out of the box.   Simply perform a lookup() on the incoming INVITE and then relay the call in “b2b – top hiding” mode. http://lists.opensips.org/pipermail/users/2011-March/017067.html
ESSENTIALAI-STEM
Welcome to DocDigitizer WorldObjects This page will help you get started with DocDigitizer WorldObjects - Semantic Objects What are WorldObjects? At DocDigitizer, we aim to unburden people from robotic work, including developers. DocDigitizer WorldObjects is a development platform that allows developers to leverage or build a myriad of human semantic objects. With WorldObjects you actually create native .Net code, leveraging the power of the .Net framework. WorldObjects also may be bundled with data. It means thousands of hours saved both in structuring common objects like countries and languages or custom objects like ISIN objects but also in managing the data load of those objects. With WorldObjects you can endlessly navigate in strong type mode during code development. var customerIntlDialCode = document.Invoice.Customer.Address.ZipCode.Country.IntlDialCode; In this example, we have a document (like an invoice) that has a customer address. Even if the international phone dial code is not mentioned in the document, it can seamlessly be retrieved by the framework through underlying Catalogs (ZipCode and Country for this case). Imagine how many tables, SQL queries and alike you'd need to run this simple line of code in your current projects WorldObjects eliminates the need for developers to reinvent the wheel every time they create an application. With WorldObjects, common human concepts like countries, addresses, document types or ID cards are already available. DocDigitizer WorldObjects represents Entities Objects such as a Customer, an Invoice, or a Citizen Card, in a semantic way. You can use global WorldObjects from the global repository or create your own objects. Read the technical documentation in Reference Guide. Using WorldObjects, you can bundle applications that reflect a specific scenario. They allow you to refer to objects in a standardized way, abstracting from concrete implementations of these Objects. WorldObjects in DocDigitizer DocDigitizer offers a framework and a scalable platform, DocDigitizer WorldObjects, where you can create your Entities using semantic language provided by this framework and dispose of and managed this Entitiy using functionalities provided by the platform. DocDigitizer WorldObjects provides semantic language to help create and define your Business Objects, adding properties that define each object and index mechanisms, which can be helpful to support semantic query processing. You can also use semantic objects shipped by with DocDigitizer WorldObjects. Did this page help you?
ESSENTIALAI-STEM
Fitness The Benefits Of Crossfit Strength Training CrossFit group training Crossfit is a high-intensity exercise program that was first invented to train military forces, policemen, and firemen.  As the benefits of CrossFit strength training became known it exploded in popularity. It has since been adopted by millions of people over the world, taking the world by storm and becoming a fitness trend. Crossfit was designed by incorporating diverse forms of exercises in order to help you achieve total body fitness.  Think of functional fitness instead of trying to increase muscle mass. The exercises are made up of constantly varied high-intensity movements, which aim to target all the muscle groups of your body.  Large and small muscle groups get worked. How does Crossfit work Crossfit is not a specialized sport and is not suitable for individuals interested in training a specific part of their body, such as athletes and bodybuilders. However, Crossfit can be modified to help you achieve your fitness goals.  As it was to initiate things like Crossfit Football and Crossfit Endurance.  As well as the CrossFit games. So, if you’re wondering whether Crossfit can be a good program to follow for strength training, then the answer is, yes it can be once you make a few tweaks. Crossfit strength training and how it works The thing to note about Crossfit is that it is made up of exercises from various training programs from strength, endurance, and stamina to help you be the best all-around athlete. This is why it is possible to modify Crossfit to meet your end goal because all you have to do is focus more on strength-based exercises. You can put 80% in strength training exercises, and then share the remaining 20% among the other exercises. Crossfit Strength Training Listed below are the exercises to follow for a  Crossfit Strength training regimen, each one designed to build strength in a specific area of the body. I. Glute Hypertrophy This exercise will target the muscles in your legs and butt. The exercise is known as the Booty program which requires you to lift three times a week. It’s known to provide good results regarding muscle growth in your lower body.  As well as an intense program that lasts 12 weeks and promises to be grueling and effective. CrossFit Strength training II. Power Challenge Linear Progression Treat this program as a 10-week cycle.  However, do it for as long as you want it to as long as you’re progressing. It consists of 1RM Back Squat, Bench Press, and Deadlift to total 1000/600. If you can improve gradually and consistently.  It will help you increase your lower back strength. III. 7/13 Squat Program This strength program targets your legs and glutes. It is a 10-week squat program to help you improve your front and back squats. You need to squat three times a week.  Add more of weights to provide more resistance to your muscles. Each daily workout involves 4 sets with increasing numbers of reps and levels of difficulty. Make sure you take a 24-hour rest between squat days.  There is no point burning your muscles out. IV. 5×5 Squat Program It is a squat program, which ultimately helps you improve your back squats and overall strength. This program, requires you to squat twice a week. The Squat program consists of 5 sets of squats.  With each set composed of 5 reps.  You should be trying to gradually increase weight in each set. The program lasts for 8 weeks.  Obviously, it got its name from its 5 reps in 5 sets structure. That is it for CrossFit strength training.  If you are familiar with the style and intensity of Crossfit training then that’s great. However, if you are starting out. go to a Crossfit gym and have an instructor teach you. It’s much safer that way. Related posts Massage Etiquette – 10 Rules To Follow For a Perfect Massage Jacob The Paleo Diet Benefits You can Have Every Day Jacob Boxing Training Myths – Whats Right and What Wrong Jacob Leave a Comment
ESSENTIALAI-STEM
Chiang Mai Women's Correctional Institution Chiang Mai Women's Correctional Institution (ทัณฑสถานหญิงเชียงใหม่) is a women's prison in Chiang Mai, Thailand, operated by the Department of Corrections. the warden is Arirat Thiamthong. As of the same year most inmates had committed crimes related to recreational drugs. The prison has a Thai massage training programme to help inmates adjust to the free world; members of the general public may receive massages from prisoners. Prisoners who participate in the programme can earn money from tips. A former warden's residence, Ruean Pathammarong, is used as the massage parlor.
WIKI
Amylyx Pharmaceuticals Inc (AMLX) Q1 2025 Earnings Call Highlights: Strategic Advances and ... Release Date: May 08, 2025 For the complete transcript of the earnings call, please refer to the full earnings call transcript. Amylyx Pharmaceuticals Inc (NASDAQ:AMLX) has achieved several meaningful milestones, including dosing the first participant in their pivotal phase 3 lucidity clinical trial for vexatide. The company has strengthened its financial position by raising approximately $65.5 million, extending their cash runway through the end of 2026. Positive topline data from the phase 2 Helios trial in Wolfram syndrome showed improvement or stabilization across all measured outcomes. The company is preparing for a potential commercial launch of vexatide in 2027, pending approval. Amylyx Pharmaceuticals Inc (NASDAQ:AMLX) has a robust pipeline with multiple clinical trials targeting diseases with high unmet needs, including ALS and progressive supranuclear palsy. There are no currently approved treatments for post-bariatric hypoglycemia (PBH), which vexatide aims to address, indicating a high-risk development area. The company faces challenges in educating the medical community and patients about PBH and the potential benefits of vexatide. The phase 3 lucidity trial for vexatide is still in early stages, with topline data not expected until the first half of 2026. Amylyx Pharmaceuticals Inc (NASDAQ:AMLX) has experienced a significant decrease in operating expenses, which may indicate reduced activity or cost-cutting measures. The company is dealing with residual cash obligations related to the discontinuation of previous products, which could impact financial flexibility. Warning! GuruFocus has detected 3 Warning Signs with AMLX. Q: On Avexotide for PBH, will a large patient education campaign be necessary because symptomatic patients don't know they have PBH, or will it target less symptomatic patients? A: (Co-CEO) PBH is well-known among adult endocrinologists and patients. The education campaign is crucial because PBH is a rare disease with no existing treatments. The goal is to educate the medical community, advocacy groups, and patients about PBH and the potential benefits of Avexotide if approved. Q: Regarding PSP, what efficacy should we expect on the PSP rating scale in the interim data? A: (Co-CEO) The study has 80% power to detect a 30% effect on the PSP rating scale. While the PSP rating scale is a primary endpoint, other secondary endpoints will also guide our decision on advancing the program. Clinical meaningfulness varies, but a 20-30% change is considered significant. Q: For PBH, how many of the 160,000 prevalent patients are seeking treatment, and should we still assume 8% of surgery patients will develop PBH? A: (Co-CEO) A larger group seeks treatment, with 30-50% experiencing hypoglycemia post-surgery. The 8% figure represents those with persistent hypoglycemia despite treatment. We continue to model 8% as the incidence rate, given the consistent number of bariatric surgeries. Q: What are the ongoing discussions with the FDA on trial design for the Wolfram syndrome study, and what will the 48-week data inform? A: (Chief Medical Officer) The 48-week data will provide insights into endpoints like AUC, C-peptide response, and glycemic measures. Discussions with the FDA are ongoing, and the data will inform the phase 3 program. This is the first trial for Wolfram syndrome, so there's no existing template. Q: Will there be subgroup analysis in the Avexotide study, and do you anticipate any payer restrictions post-approval? A: (Co-CEO) The study focuses on the full population, all experiencing frequent events. We don't anticipate step therapy as there are no approved therapies for PBH. We aim to ensure efficient access for patients needing treatment. For the complete transcript of the earnings call, please refer to the full earnings call transcript. This article first appeared on GuruFocus.
NEWS-MULTISOURCE
Open Science Research Excellence Ahmad H Abdelgwad Publications 2 Publications 2 10007530 Investigation of Utilizing L-Band Horn Antenna in Landmine Detection Abstract: Landmine detection is an important and yet challenging problem remains to be solved. Ground Penetrating Radar (GPR) is a powerful and rapidly maturing technology for subsurface threat identification. The detection methodology of GPR depends mainly on the contrast of the dielectric properties of the searched target and its surrounding soil. This contrast produces a partial reflection of the electromagnetic pulses that are being transmitted into the soil and then being collected by the GPR.  One of the most critical hardware components for the performance of GPR is the antenna system. The current paper explores the design and simulation of a pyramidal horn antenna operating at L-band frequencies (1- 2 GHz) to detect a landmine. A prototype model of the GPR system setup is developed to simulate full wave analysis of the electromagnetic fields in different soil types. The contrast in the dielectric permittivity of the landmine and the sandy soil is the most important parameter to be considered for detecting the presence of landmine. L-band horn antenna is proved to be well-versed in the investigation of landmine detection. Keywords: Full wave analysis, ground penetrating radar, horn antenna design, landmine detection. 1 10009601 Microstrip Patch Antenna Enhancement Techniques Abstract: Microstrip patch antennas are widely used in many wireless communication applications because of their various advantages such as light weight, compact size, inexpensive, ease of fabrication and high reliability. However, narrow bandwidth and low gain are the major drawbacks of microstrip antennas. The radiation properties of microstrip antenna is affected by many designing factors like feeding techniques, manufacturing substrate, patch and ground structure. This manuscript presents a review of the most popular gain and bandwidth enhancement methods of microstrip antenna and reports a brief description of its feeding techniques. Keywords: Gain and bandwidth enhancement, slotted patch, parasitic patch, electromagnetic band gap, defected ground, feeding techniques.
ESSENTIALAI-STEM
Operation Eagle Claw Operation Eagle Claw was a failed operation by the United States Armed Forces ordered by U.S. President Jimmy Carter to attempt the rescue of 53 embassy staff held captive at the Embassy of the United States, Tehran on 24 April 1980. The operation, one of Delta Force's first, encountered many obstacles and failures and was subsequently aborted. Eight helicopters were sent to the first staging area called Desert One, but only five arrived in operational condition. One had encountered hydraulic problems, another was caught in a sand storm, and the third showed signs of a cracked rotor blade. During the operational planning, it was decided that the mission would be aborted if fewer than six helicopters remained operational upon arrival at the Desert One site, despite only four being absolutely necessary. In a move that is still discussed in military circles, the field commanders advised President Carter to abort the mission, which he did. As the U.S. forces prepared to withdraw from Desert One, one of the remaining helicopters crashed into a transport aircraft that contained both servicemen and jet fuel. The resulting fire destroyed both aircraft and killed eight servicemen. In the context of the Iranian Revolution, Iran's new leader, Ayatollah Ruhollah Khomeini, stated that the mission had been stopped by an act of God ("angels of God") who had foiled the U.S. mission in order to protect Iran and his new Islamist government. In turn, Carter blamed his loss in the 1980 U.S. presidential election mainly on his failure to secure the release of the hostages. The American hostages were released the day of Ronald Reagan's inauguration. Motivation for military intervention On 4 November 1979, fifty-two American diplomats and citizens were taken hostage in the United States Embassy in Tehran, Iran, by a group of Iranian college students belonging to the Muslim Student Followers of the Imam's Line, avid supporters of the Iranian Revolution. American President Jimmy Carter called the hostage-taking an act of "blackmail" and the hostages "victims of terrorism and anarchy". but in Iran it was widely seen as an act against the U.S. and its influence in Iran, including its perceived attempts to undermine the Iranian Revolution and its longstanding support of the Shah of Iran, Mohammad Reza Pahlavi, who was overthrown in 1979. The crisis had reached a climax after diplomatic negotiations failed to secure the release of the hostages. Facing elections and with little to show from negotiations, the Carter government ordered the State Department to sever diplomatic relations with Iran on 7 April 1980. Cyrus Vance, the United States Secretary of State, had argued against a push by National Security Advisor Zbigniew Brzezinski for a military solution to the crisis. Vance left Washington on Thursday 10 April for a long weekend vacation in Florida. The following day, Friday 11 April, Brzezinski held a newly scheduled meeting of the National Security Council where he insisted that it was time to "lance the boil", and Carter said it was "time for us to bring our hostages home". It was during this Security Council meeting of 11 April, that Carter confirmed that he had authorised the mission. He did however continue to entertain the planning for a concurrent punitive air-strike, but this was finally rejected on 23 April, one day prior to the commencement of the mission. The rescue mission was code named Operation Eagle Claw. Operation Eagle Claw occurred amidst a breakdown in diplomatic relations between Iran and its western neighbor Iraq, including frequent border skirmishes, calls by Khomeini for Iraqi Shi'ites to revolt against the ruling Ba'ath Party, and allegations of Iraqi support for Arab and Kurdish separatists in Iran. According to an 11 April 1980 Central Intelligence Agency (CIA) analysis, "Evidence indicates that Iraq had probably planned to initiate a major military move against Iran with the aim of toppling the Khomeini regime" and had "sought to engage the Kuwaitis to act as intermediary in obtaining United States approval and support for Iraqi military action against Iran". Carter, who wrote in his diary on 10 April that "The Iranian terrorists are making all kinds of crazy threats to kill the American hostages if they are invaded by Iraq—whom they identify as an American puppet," may have been influenced by such reports to approve a rescue mission prior to the outbreak of a possible Iran–Iraq War. Planning and preparation Planning for a possible rescue mission began on 6 November, two days after the hostages were taken. Army Major General James B. Vaught was appointed as Joint Task Force commander and was to be forward-based at Wadi Kena in Egypt, reporting directly to the President. In turn, he had two field commanders: USAF Colonel James H. Kyle as the field commander for aviation and U.S. Army Colonel Charlie Beckwith as ground forces field commander. In planning the operation, some of the maps the US used were tourist maps. The ambitious plan was to be based on the use of elements from four branches of the U.S. military: Army, Navy, Marines, and Air Force. The concept was based on an operation whereby helicopters and C-130 aircraft, following different routes, would rendezvous on a salt flat (code-named Desert One) 200 miles (320 km) southeast of Tehran. Here the helicopters would refuel from the C-130s and pick up the combat troops who had flown in on the C-130 transports. The helicopters would then transport the troops to a mountain location (Desert Two) closer to Tehran from which the actual rescue raid would be launched into the city the following night. The operation was further to be supported by an in-country CIA team. On completion of the raid, hostages were to be shepherded to a captured Tehran airport from which they were to be flown to Egypt. On 31 March, anticipating the need for military action, a U.S. Air Force Combat Controller, Major John T. Carney Jr., was flown in a Twin Otter to Desert One by covert CIA operatives Jim Rhyne and Claude "Bud" McBroom for a clandestine survey and reconnaissance of the proposed landing areas for the helicopters and C-130s. Carney successfully surveyed the airstrip, installed remotely operated infrared lights and an IR strobe to outline a landing pattern for the pilots. He also took soil samples to determine the load-bearing properties of the desert surface. At the time of the survey, the salt-flat floor was hard-packed sand, but in the ensuing three weeks an ankle-deep layer of powdery sand had been deposited by sandstorms. The Tehran CIA Special Activities Division in-country paramilitary team, led by retired U.S. Army Special Forces officer Richard J. Meadows, had two assignments: to obtain information about the hostages and the embassy grounds and to transport the rescue team from Desert Two to the embassy grounds in pre-staged vehicles. Desert One was in the South Khorasan Province, in the Dasht-e Lut desert near Tabas (33.07306°N, 55.8925°W), while Desert Two was located 50 miles (80 km) short of Tehran at 35.23333°N, 52.15°W. Assault teams The ground forces consisted of 93 Delta soldiers to assault the embassy and a 13-man special forces assault team from Detachment "A" Berlin Brigade to assault the Ministry of Foreign Affairs where three further hostages were being held. A third group of 12 Rangers were to act as the roadblock team at the Desert One landing area. Rangers were also tasked with taking and holding the Manzariyeh Air Base near Tehran to provide the springboard for escape from Iran. In addition, the CIA had prepared an in-country team of 15 Iranian and American Persian-speakers, most of whom would act as truck drivers. Ingress The complex plan required that on the first night, three USAF EC-130s (Call signs: Republic 4, 5, and 6), carrying the logistical supplies, and three MC-130E Combat Talons (Call signs: Dragon 1, 2, and 3), carrying Delta Force and Ranger troops (132 assault and security troops in total), would depart the island of Masirah, off the coast of Oman, for Desert One, a flight of over 1,000 miles (1600 km). They would be refuelled by Air Force KC-135 tankers en route. Desert One would be secured by a protection force, and once secured a refueling area would be established for the helicopters with approximately 6,000 US gallons (22,700 L) of jet fuel being made available from collapsible fuel bladders carried in the C-130s. Eight United States Navy (USN) RH-53D Sea Stallion (Call signs: Bluebeard 1 – 8) helicopters were positioned aboard USS Nimitz (CVN-68), 60 miles off the coast of Iran. The helicopters would fly 600 mi to Desert One, refuel, load up the Delta Force and part of the Ranger teams, then fly 260 miles (420 km) further to Desert Two. As it would be close to morning, the helicopters and ground forces would hide during the day at Desert Two. The rescue operation would take place the second night. Rescue raid First, CIA officers who were already inside Iran would bring trucks they had sourced to Desert Two. Together, the CIA officers and ground forces would then drive from Desert Two into Tehran. This team would assault the embassy and Foreign Affairs building, eliminate the guards, and rescue the hostages, with air support from Air Force AC-130 gunships flying from Desert One. The hostages and rescue team would then rendezvous with the helicopters from Desert Two at the nearby Amjadieh Stadium, where the hostages and rescue teams would board the helicopters. Egress In parallel to the rescue, an Army Ranger company would capture the abandoned Manzariyeh Air Base, (34.98278°N, 50.80556°W) about 60 miles southwest of Tehran, to allow two C-141 Starlifters to arrive from Saudi Arabia. The helicopters would bring all parties from the stadium to the Manzariyeh airbase, and the C-141s would fly them to an airbase in Egypt. The eight helicopters would be destroyed before departure. Protection and support Protection for the operation was to be provided by Carrier Air Wing Eight (CVW-8) operating from Nimitz and CVW-14 operating from USS Coral Sea (CV-43). For this operation, the aircraft bore special invasion stripe identification on their right wings. This was necessary to distinguish support aircraft from Iranian F-14 and F-4 aircraft purchased by Iran from the US in the time of the Shah. CVW-14 Marine F-4Ns were marked with a red (VMFA-323) or yellow (VMFA-531) stripe enclosed by two black stripes while CVW-14 attack aircraft (A-7s and A-6s) had an orange stripe enclosed by two black stripes. The mission Only the delivery of the soldiers, equipment and fuel by the C-130 aircraft went according to plan. MC-130 Dragon 1 landed at Desert One at 22:47 local time. The landing was made under blacked-out conditions using the improvised infrared landing light system installed by Carney on the airstrip, visible only through night vision goggles. The heavily loaded Dragon 1 required four passes to determine that there were no obstructions on the airstrip and to align with the runway. Dragon 1 off-loaded the road-watch teams in Jeeps and a USAF Combat Control Team (CCT) to establish a parallel landing zone north of the dirt road and to set out TACAN beacons to guide in the helicopters. Soon after the first crews landed and began securing Desert One, a civilian Iranian bus with a driver and 43 passengers was stopped while traveling on the road, which now served as the runway for the aircraft. The bus was forced to halt by the Rangers and the passengers were detained aboard Republic 3. Minutes after the bus had been stopped, the Rangers in the road-watch team observed a fuel tanker truck, ignoring their orders to halt, bearing down on them. The truck, apparently smuggling fuel, was blown up by the Army Ranger roadblock team using a shoulder-fired rocket as it tried to escape the site. The truck's passenger was killed, but the driver managed to escape in an accompanying pickup truck. As the tanker truck was thought to be engaged in clandestine smuggling, the driver was not considered to pose a security threat to the mission. However, the resulting fire illuminated the nighttime landscape for many miles around, and actually provided a visual guide to Desert One for the disoriented incoming helicopters. Two hours into the flight, RH-53D Bluebeard 6 made an emergency landing in the desert when a sensor indicated a cracked rotor blade. Its crew was picked up by Bluebeard 8 and the aircraft was abandoned in the desert. The remaining helicopters ran into an unexpected weather phenomenon known as a haboob (an enormous, nearly opaque cloud of fine dust). Bluebeard 5 flew into the haboob, but abandoned the mission and returned to the Nimitz when electrical problems disabled flight instruments and flying without visual references proved impossible. The remaining six helicopters reached Desert One, 50 to 90 minutes behind schedule. Bluebeard 2 arrived last at Desert One at 01:00 with a malfunctioning secondary hydraulic system, leaving only one hydraulic system to control the aircraft. With only five fully serviceable helicopters now remaining to transport the men and equipment to Desert Two (minimum of six aircraft was the planned mission's abort threshold), the various commanders reached a stalemate. Senior helicopter pilot Seiffert refused to use unsafe Bluebeard 2 on the mission, while Beckwith (field commander for ground forces) refused to consider reducing his trained rescue team's size. Kyle (the field aviation commander), therefore, recommended to Vaught that the mission be aborted. The recommendation was passed on by satellite radio up to the President. After two and a half hours on the ground, the presidential abort confirmation was received. Collision and fire Fuel consumption calculations showed that the extra 90 minutes idling on the ground waiting for the abort confirmation order had made fuel critical for one of the EC-130s. When it became clear that only six helicopters would arrive at Desert One, Kyle had authorized the EC-130s to transfer 1,000 US gallons (3,800 L) from the bladders to their own main fuel tanks, but Republic 4 had already expended all of its bladder fuel refueling three of the helicopters and had none to transfer. To make it to the air tanker refueling track without running out of fuel, it had to leave immediately and was already loaded with part of the Delta team. In addition, RH-53D Bluebeard 4 needed additional fuel, requiring it to be moved to the opposite side of the road. To accomplish both actions, Bluebeard 3 piloted by Maj. James Schaefer had to be moved from directly behind the EC-130. The aircraft could not be moved by ground taxi and had to be moved by hover taxi (flying a short distance at low speed and altitude). A Combat Controller attempted to direct the maneuvre from in front of the aircraft but was blasted by desert sand churned up by the rotor. The Controller attempted to back away, which led Bluebeard 3 pilot to mistakenly perceive that his craft was drifting backward (engulfed in a dust cloud, the pilot only had the Controller as a point of reference) and thus attempted to "correct" this situation by applying forward stick to maintain the same distance from the rearward moving marshaller. The RH-53D struck the EC-130's vertical stabilizer with its main rotor and crashed into the EC-130's wing root. In the ensuing explosion and fire, eight servicemen died: five of the fourteen USAF aircrew in the EC-130, and three of the five USMC aircrew in the RH-53D, with only the helicopter's pilot and co-pilot (both badly burned) surviving. After the crash, it was decided to abandon the helicopters. During the frantic evacuation to the EC-130s by the helicopter crews, unsuccessful attempts were made to retrieve their classified mission documents and destroy the aircraft. The helicopter crews boarded the EC-130s. Five RH-53D aircraft were left behind at Desert One mostly intact, some damaged by shrapnel. They could not be destroyed because they were loaded with ammunition and any fire or explosion would have endangered the C-130s. The EC-130s carried the remaining forces back to the intermediate airfield at Masirah Island, where two C-141 medical evacuation aircraft from the staging base at Wadi Abu Shihat, Egypt, picked up the injured personnel, helicopter crews, Rangers, and Delta Force members, and returned to Wadi Kena. The injured were then transported to Landstuhl Army Regional Medical Center in Germany. The following day, after learning about the events at Desert One from the local Iranian news, the Tehran CIA team quietly left Iran, with the Iranians unaware of their presence. Aftermath The White House announced the failed rescue operation at 01:00 a.m. the following day (25 April 1980). Iranian Army investigators found eight bodies (eight Americans) and also alleged to have found the body of an Iranian civilian. However, it has been acknowledged that the fuel tank driver near the landing site who refused to stop, and whose tanker truck exploded after being hit by an anti-tank round, managed to leap from his vehicle and escape in a nearby pickup truck which was following; it was reported that the gas tank truck and a bus with 44 civilians were the vehicles which were stopped at the opposite ends of the dirt road near the Desert One landing site when the C-130 aircraft landed. Nine caskets were made, with Ayatollah Sadegh Khalkhali alleging that nine Americans were killed. The American bodies, which were acknowledged to have been numbered at eight, were returned to the United States on 6 May 1980, and buried at various locations across the country. The 44 Iranian civilians taken prisoner on the bus were released and subsequently gave eyewitness accounts of the operation. Casualties The eight Americans who died included three Marines and five Air Force personnel. On 25 April 1980, Major General Robert M. Bond read a message from President Jimmy Carter at a memorial service commemorating them in Niceville, Florida. A memorial honoring them was erected in the Arlington National Cemetery and Carter attended a memorial service there with the families on 9 May. Three of the servicemen who died – Maj. Richard Bakke, Maj. Harold Lewis Jr., and Sgt. Joel Mayo – were buried in the Arlington National Cemetery in a grave marked by a common headstone, located about 25 feet from the group memorial. In addition, five servicemen were injured, One from Valdosta, Georgia (Capt. Lynn McIntosh), including USMC Majors Jim Schaefer, pilot, and Les Petty, co-pilot. After the termination of the operation and the abandonment of equipment by the infiltration team, the Iranians became aware of the landings as well as the subsequent accident and fire. Mohammad Montazer al-Qaim, Commander of the Yazd Iranian Revolutionary Guards Corps (IRGC) went to the scene to investigate reports from locals. At the same time, without knowing of the investigation activities of the IRGC, the Iranian Air Force conducted two observation flights over the incident area. During the first flight, two F-14s flew over the abandoned US equipment and the flight requested permission to fire on the equipment. This was refused by the Iranian command. The next day, Iranian Air Force F-4 fighter jets patrolling the area thought that the American helicopters were about to fly and they fired at the remaining American equipment with direct order from Abolhassan Banisadr ( Iran's president at the time ) killing Mohammad Montazer al-Qaim. Political consequences President Carter continued to attempt to secure the hostages' release before his presidency's end. On 20 January 1981, minutes after Carter's term ended, the 52 US captives held in Iran were released, ending the 444-day Iran hostage crisis. US Secretary of State Cyrus R. Vance, believing that the operation would not work and would only endanger the lives of the hostages, opted to resign, regardless of whether the mission was successful or not. His resignation was confirmed several days later. Ruhollah Khomeini condemned Jimmy Carter, and in a speech after the incident, credited God with protecting Iran. He said: "Who crushed Mr. Carter's helicopters? We did? The sands did! They were God's agents. Wind is God's agent ... These sands are agents of God. They can try again!" The embassy hostages were subsequently scattered across Iran to preclude any second rescue attempt and were released on 20 January 1981, minutes after Ronald Reagan had taken the oath of office, after winning the 1980 election over Carter. Investigation and recommendations Retired Chief of Naval Operations Admiral James L. Holloway III led the official investigation in 1980 into the causes of the operation's failure on behalf of the Joint Chiefs of Staff. The Holloway Report primarily cited deficiencies in mission planning, command and control, and inter-service operability, and provided a catalyst to reorganize the Department of Defense. One mistake in mission planning was the selecting of the RH-53D helicopter over the better suited HH-53 helicopter. The various services' failure to cohesively work together prompted the establishment of a new multi-service organization several years later. The United States Special Operations Command (USSOCOM) became operational on 16 April 1987. Each service now has its own special operations forces under USSOCOM's overall control. The lack of well-trained Army helicopter pilots who were capable of the low-level night flying needed for modern special operations missions prompted the creation of the 160th Special Operations Aviation Regiment (SOAR) (Night Stalkers). In addition to the 160th SOAR's creation, the US Defense Department now trains many military helicopter pilots in low-level penetration, aerial refueling, and use of night-vision goggles. In addition to the formal report, various reasons for the mission failure have been argued, with most analysts agreeing that an excessively complex plan, poor operational planning, flawed command structure, lack of adequate pilot training and poor weather conditions were contributing factors. CIA * Special Activities Division/Special Operations Group (SAC/SOG) US Air Force * 1st Special Operations Wing: 8th Special Operations Squadron (EC-130) * 436th Military Airlift Wing * 437th Military Airlift Wing * 438th Military Airlift Wing * 322d Airlift Division US Army * 1st Special Forces Operational Detachment-Delta ("Delta Force") * 10th Special Forces Group Special Forces Detachment "A" * 75th Infantry Regiment (elements from 1st and 2nd Ranger Battalions) US Navy and Marine Corps * USS Nimitz (CVN-68) with Carrier Air Wing 8 * USS Coral Sea (CV-43) * USS California (CGN-36) * USS Gridley (CG-21) * USS Okinawa (LPH-3) * USS Alamo (LSD-33) * USS San Bernardino (LST-1189) * USS Mobile (LKA-115) * USS Barbey (FF-1088) * USS William H. Standley (CG-32) * USS Texas (CGN-39) United States The official Operation Eagle Claw Memorial is at Arlington National Cemetery and is described by cemetery literature as: "Dedicated in 1983, the Iran Rescue Mission Memorial consists of a white marble column with a bronze plaque listing the names and ranks of those who lost their lives during the mission." Iran The incident is considered as a US defeat and is commemorated annually in Tabas where government officials, religious leaders and people gather and display wreckage of the American planes and helicopters from the incident. A mosque called "gratitude mosque" was built at the crash site. On the road from Ashkezar to Tabas, at the location of Desert One there are several remnants of the operation, including wreckage and mock-ups of the RH-53D helicopters. An Iranian air-defense system is named Tabas, in commemoration of the crash site. At the old Tehran Airport, there is the shell of a RH-53D airframe on display. Aircraft * The abandoned Bluebeards 2 and 8 were inducted into service with the Islamic Republic of Iran Navy. * RH-53D Bluebeard 5 is immortalized at Wrightstown Gate Joint Base McGuire–Dix–Lakehurst, New Jersey * EC-130E Republic 5 which returned successfully, was retired by the USAF in June 2013 and is now on display at the Carolinas Aviation Museum. Second rescue plan Shortly after the first mission failed, planning for a second rescue mission was authorized under the name Project Honey Badger. Plans and exercises were conducted, but the manpower and aircraft requirements grew to involve nearly a battalion of troops, more than fifty aircraft, and such contingencies as transporting a 12-ton bulldozer to rapidly clear a blocked runway. Even though numerous rehearsal exercises were successful, the helicopters' failure during the first attempt resulted in the development of a subsequent concept involving only fixed-wing STOL aircraft capable of flying from the US to Iran using aerial refueling, then returning to land on an aircraft carrier for medical treatment of wounded. The concept called Operation Credible Sport, was developed but never implemented. It called for a modified Hercules, the YMC-130H, outfitted with rocket thrusters fore and aft to allow an extremely short landing and take-off in Amjadieh Stadium. Three aircraft were modified under a rushed secret program. The first fully modified aircraft crashed during a demonstration at Duke Field at Eglin Air Force Base on 29 October 1980, when its landing braking rockets were fired too soon. The misfire caused a hard touchdown that tore off the starboard wing and started a fire. All on board survived without injury. The impending change of administration in the White House forced this project's abandonment. Popular culture * Sand Storm, 1997 Iranian film directed by Javad Shamaghdari * "Ham Avaz-e Toofan" (, "Singing with the Storm"), a song by Hamed Zamani * The Delta Force (1986) – the incident is dramatized during the prologue * This incident is referenced a few times in the G.I. Joe: A Real American Hero comic book, in particular as the source of the injuries sustained by the popular masked character Snake Eyes * Desert One, 2019 US documentary by Barbara Kopple about the operation * The Canadian Caper, the successful joint Canadian-CIA covert extraction operation of six fugitive American diplomats out of Iran * "O Superman" (1981) – the song by Laurie Anderson "is directly related to" the incident. * Argo (2012 film) makes reference to this event and the 1979 revolution.
WIKI
In addition to diet, exercise and other lifestyle factors can also play an important role in bone health. Smoking and drinking too much alcohol can increase your chances of developing osteoporosis, while weight-bearing exercise (such as walking, dancing, yoga, or lifting weights) can lower your risk. Strength or resistance training—using machines, free weights, elastic bands, or your own body weight—can be especially effective in helping to prevent loss of bone mass as you age. It's easy to get lost in a killer playlist or Friends rerun on the TV attached to the elliptical, but mindless exercise makes all your hard work forgettable—and you can forget about seeing results too. “There is a huge difference between going through the motions of an exercise and truly thinking, feeling, and engaging the key muscles,” says Kira Stokes, master instructor at the New York City location of indoor cycling studio Revolve. “Be conscious of and enjoy the sensation of your muscles contracting and the feelings of growing stronger and more powerful with each rep.” Carbohydrates should provide 45%–65% of your daily calories. Most of those calories should come from the complex carbohydrates in high-fiber and unrefined foods, such as bran cereal and other whole-grain products, brown rice, beans and other legumes, and many fruits and vegetables. These carbohydrates are digested and absorbed slowly, so they raise the blood sugar gradually and don't trigger a large release of insulin. People who eat lots of these foods have higher HDL ("good") cholesterol levels and a lower risk of obesity, diabetes, and heart disease. A good amount of soluble fiber in the diet lowers LDL ("bad") cholesterol, and high-fiber diets reduce the risk of intestinal disorders ranging from constipation and diverticulosis to hemorrhoids. Some studies have shown that fiber may help reduce the risk of colon cancer. Men need more fiber than women: 38 vs. 25 grams a day before the age of 50 and 30 vs. 21 grams a day thereafter. Vitamin D: Over the past decade, dozens of studies have revealed many important roles for vitamin D, the nutrient that skin cells produce when they are exposed to sunlight. The recommended daily intake of Vitamin D is 600 IU per day, although recommended levels are under review. If you avoid the sun or live in the northern half of the U.S., ask your doctor whether your vitamin D level should be tested. Women's Fitness of Boston is conveniently located, fairly priced and a delight to be a member of. The owner, Julie, works so hard to make sure that her clients enjoy the gym. She is also a great personal trainer, and is willing to work closely with clients to push them to their potential. She's just that right balance of energetic and serious, making sure that her clients get what they need. It makes me sad writing this review because I miss this place so much. The reason why I am no longer a member here is because I have relocated. This gym is by far the best gym I have been to and to this day, nothing beats it. You will never feel uncomfortable or intimidated. All the instructors are great - each person have their own style when it comes to training. I will sum up a few instructors I know and how their styles are: Recent research by the Centers for Disease Control and Prevention showed that ART babies are two to four times more likely to have certain kinds of birth defects. These may include heart and digestive system problems, and cleft (divided into two pieces) lips or palate. Researchers don't know why this happens. The birth defects may not be due to the technology. Other factors, like the age of the parents, may be involved. More research is needed. The risk is relatively low, but parents should consider this when making the decision to use ART. After menopause. Lower levels of estrogen  after menopause raise your risk for chronic diseases such as heart disease, stroke, and diabetes, and osteoporosis, a condition that causes your bones to become weak and break easily. What you eat also affects these chronic diseases. Talk to your doctor about healthy eating plans and whether you need more calcium and vitamin D to protect your bones. Read more about how very low estrogen levels affect your health in our Menopause section. Most women also need fewer calories as they age, because of less muscle and less physical activity. Find out how many calories you need based on your level of activity.   Community centers  ↑ MN provision, ↑ health care utilization, ↑ knowledge about FP, ↑/NC use of FP  ↑ MN provision, ↑ health care utilization, ↑ knowledge about FP, ↑/NC use of FP  ↑ knowledge about nutritional needs, ↑ MN provision, ↓/NC maternal mortality, ↓ parasitemia, ↑ health care utilization, ↑ hospital deliveries, ↑ knowledge about FP, ↑/NC use of FP, ↑ STI testing    Carbohydrates should provide 45%–65% of your daily calories. Most of those calories should come from the complex carbohydrates in high-fiber and unrefined foods, such as bran cereal and other whole-grain products, brown rice, beans and other legumes, and many fruits and vegetables. These carbohydrates are digested and absorbed slowly, so they raise the blood sugar gradually and don't trigger a large release of insulin. People who eat lots of these foods have higher HDL ("good") cholesterol levels and a lower risk of obesity, diabetes, and heart disease. A good amount of soluble fiber in the diet lowers LDL ("bad") cholesterol, and high-fiber diets reduce the risk of intestinal disorders ranging from constipation and diverticulosis to hemorrhoids. Some studies have shown that fiber may help reduce the risk of colon cancer. Men need more fiber than women: 38 vs. 25 grams a day before the age of 50 and 30 vs. 21 grams a day thereafter. Omega-3s: These essential fatty acids, EPA and DHA, play many roles in the body, including building healthy brain and nerve cells. Some studies show that omega-3s, especially DHA, can help prevent preterm births. Even women who don't plan to have children should be sure to get plenty of omega-3s. These healthy oils have been shown to reduce the risk of heart disease, the number one killer of women. ×
ESSENTIALAI-STEM
summarylogtreecommitdiffstats path: root/.SRCINFO blob: 31bf991a141f449c5e50314d2ddaf2410dc01aaa (plain) 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 pkgbase = slatec pkgdesc = Common Mathematical Library pkgver = 4.1 pkgrel = 4 url = http://netlib.org/slatec arch = i686 arch = x86_64 license = PD makedepends = gcc-fortran depends = lapack source = slatec_4.1_src.tgz::http://netlib.org/slatec/slatec_src.tgz source = slatec4linux_4.1.tgz::http://www.netlib.org/slatec/slatec4linux.tgz source = LICENSE sha256sums = df009d9ef9c18aae06ce68711b1ae108d3533b4f174582c3cbea0915c4fdfe01 sha256sums = eef9234f8fcb49e7f4905a11eda8f453ec2ca314029a9ce303fdbc99cff42bf3 sha256sums = d83a2ee63ee4bbd56d59072a0778e06685fa001047f153a3f0293d30849c8046 pkgname = slatec
ESSENTIALAI-STEM
Category:2012 Green Party of the United States presidential primaries by state Green Party of the United States presidential primaries, 2012 by state and territory
WIKI
Bellamy's Mill Bellamy's Mill is a historic grist mill located near Enfield, Halifax County, North Carolina and Nash County, North Carolina. It was built about 1859, and is a three-story building constructed of cut stone blocks. It is two bays wide by three bays deep and has a gable roof. Associated with the mill are a dam and support structures, also built of stone blocks. It was listed on the National Register of Historic Places in 1974.
WIKI
Cosmetics & Toiletries Function Sponsored by Email This Item! Increase Text Size Comparatively Speaking: Fragrances in Nonpolar Bases vs. Water-based Systems By: Anthony J. O'Lenick Jr., Siltech LLC Posted: July 13, 2010 Fragrances are formulated into a wide range of products, from water-based systems like shampoo to extremely nonpolar bases like candles, and a fragrance must be engineered to be compatible in all these environments. There are three components to a fragrance: aroma molecules, solvents and possibly surfactants. Aroma molecules have a wide range of polarity. For example, pinene and limonene are nonpolar whereas vanillin and phenylethyl alcohol are polar. Generally, a blend of aroma molecules is viewed as nonpolar, even though the components have a range of solubility. Fragrances rarely contain only aroma chemicals. Solvents profoundly influence the polarity of the blend. Dipropylene glycol (DPG), a common solvent, is fairly polar and would be a good choice for a shampoo fragrance. DPG would be a bad choice for a candle fragrance, as it would immediately separate from the base. Nonpolar solvents that would be good in a candle, include benzyl benzoate and diethyl phthalate (DEP). DEP has held a bad reputation as of late because it is a phthalate, but this is a case of guilt by association. There certainly are "bad" phthalates, but DEP is safe. Still, many consumers demand the removal of DEP from fragrances, and other solvents are easily substituted. Solvent selection affects polarity but not enough to make a fragrance water-soluble, as no fragrance is water-soluble. Nonionic surfactants are used to transform the fragrance into a microemulsion. The fragrance is bound to the water through the hydrogen bonds with the surfactant.
ESSENTIALAI-STEM
Numberi Numberi is a Papuan surname. Notable people with the surname include: * Freddy Numberi (born 1947), Indonesian navy admiral and politician * Giovani Numberi (born 2000), Indonesian professional footballer * Theo Numberi (born 2001), Indonesian professional footballer
WIKI
To: vim_dev@googlegroups.com Subject: Patch 8.0.0375 Fcc: outbox From: Bram Moolenaar Mime-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit ------------ Patch 8.0.0375 Problem: The "+ register is not tested. Solution: Add a test using another Vim instance to change the "+ register. (Kazuki Kuriyama) Files: src/testdir/test_gui.vim *** ../vim-8.0.0374/src/testdir/test_gui.vim 2017-02-23 19:32:18.068709554 +0100 --- src/testdir/test_gui.vim 2017-02-26 14:56:41.355400256 +0100 *************** *** 72,77 **** --- 72,118 ---- endif endfunc + func Test_quoteplus() + let skipped = '' + + if !g:x11_based_gui + let skipped = g:not_supported . 'quoteplus' + else + let quoteplus_saved = @+ + + let test_call = 'Can you hear me?' + let test_response = 'Yes, I can.' + let vim_exe = exepath(v:progpath) + let testee = 'VIMRUNTIME=' . $VIMRUNTIME . '; export VIMRUNTIME;' + \ . vim_exe . ' -f -g -u NONE -U NONE --noplugin -c ''%s''' + let cmd = 'call feedkeys("' + \ . '\"+p' + \ . ':s/' . test_call . '/' . test_response . '/\' + \ . '\"+yis' + \ . ':q!\", "tx")' + let run_vimtest = printf(testee, cmd) + + " Set the quoteplus register to test_call, and another gvim will launched. + " Then, it first tries to paste the content of its own quotedplus register + " onto it. Second, it tries to substitute test_responce for the pasted + " sentence. If the sentence is identical to test_call, the substitution + " should succeed. Third, it tries to yank the result of the substitution + " to its own quoteplus register, and last it quits. When system() + " returns, the content of the quoteplus register should be identical to + " test_response if those quoteplus registers are synchronized properly + " with/through the X11 clipboard. + let @+ = test_call + call system(run_vimtest) + call assert_equal(test_response, @+) + + let @+ = quoteplus_saved + endif + + if !empty(skipped) + throw skipped + endif + endfunc + func Test_set_guifont() let skipped = '' *** ../vim-8.0.0374/src/version.c 2017-02-26 14:00:03.852862844 +0100 --- src/version.c 2017-02-26 15:00:31.805867406 +0100 *************** *** 766,767 **** --- 766,769 ---- { /* Add new patch number below this line */ + /**/ + 375, /**/ -- How To Keep A Healthy Level Of Insanity: 1. At lunch time, sit in your parked car with sunglasses on and point a hair dryer at passing cars. See if they slow down. /// Bram Moolenaar -- Bram@Moolenaar.net -- http://www.Moolenaar.net \\\ /// sponsor Vim, vote for features -- http://www.Vim.org/sponsor/ \\\ \\\ an exciting new programming language -- http://www.Zimbu.org /// \\\ help me help AIDS victims -- http://ICCF-Holland.org ///
ESSENTIALAI-STEM
32nd Lambda Literary Awards The 32nd Lambda Literary Awards were announced on June 1, 2020, to honour works of LGBT literature published in 2019. Due to the COVID-19 pandemic in the United States, there was no gala ceremony; instead, the winners were announced exclusively through social media and the press. The nominees were announced in March 2020. Winners are in bold.
WIKI
Mr Drew Andrew Nii Commey Otoo (born 10 June 1996) known by the stage name Mr Drew is a Ghanaian Highlife and Afrobeats musician and dancer. In 2021, he won the Best New Artist award at both Vodafone Ghana Music Awards and 3Music Awards. Early life and education Mr Drew was born in Accra in the Greater Accra Region of Ghana. He attended the Achimota Senior High School. Career Mr Drew started off as a dancer when he was in senior high school before later switching to become a musician full time. His career officially started when he joined and became the first runner-up at the MTN Hitmaker Season 6 in 2017. The MTN Hitmaker Mr Drew was signed to Highly Spiritual Music founded by music producer and engineer Kaywa. He however parted ways with the label after working together for five (5) years due to unfavorable terms and conditions in the contract later discovered. For showing gratitude to Kaywa's Highly Spiritual Music, the award winning artist decided to relinquish his royalties to his former label boss, Kaywa. Mr Drew released his debut album in 2021 named ALPHA, the album featured names like Victor AD, Seyi Shay, Kwabena Kwabena, Kelvyn Boy, Raybekah and KiDi. Singles * Gimme Love * Simajorley * Agbelemi Feat DopeNation & Incredible Zigi * Dw3 Feat Sarkodie & KRYMI * Dw3 Remix Feat Bosom P Yung, KRYMI, Kofi Mole, DopeNation, Quamina MP & Fameye * Later Feat Kelvyn Boy * Let Me Know * This Year * Mood * Pains * Shuperu Feat KiDi * S3K3 Feat Medikal * Dayana * Mr Drew - Case ft Mophty Album * Alpha 2021 Track list * 1) One by One (feat. Victor AD) * 2) Falaa * 3) Some More (Feat. Seyi Shay) * 4) Fo (Cry) Feat. Kwabena Kwabena * 5) Good Vibes (feat. Kelvyn boy) * 6) Party * 7) Filomina * 8) Zombie * 9) Letter (feat. Raybekah) * 10) Yaayaa * 11) Somebody's Bae * 12) Shuperu (feat. KiDi)
WIKI
Back to Inside Track Blog How and why should I track my workouts? The easy ways to get your fitness up September 15 2023 6 min read Tracking your workouts can be a great way to set goals, provide accountability and help you plan your training schedule.  If you’re new to fitness — or just want to start monitoring your progress — it can seem intimidating when you don’t know where to start. With this guide from Fitness First, we’ll help walk you through everything you need to know about tracking your workouts, including all of the different ways you can track and how to choose the right method for you! What does it mean to track a workout? To track a workout means systematically recording and monitoring the details and progress of your exercise sessions, whether it’s an all-out HIIT workout or a slow-flow yoga practice.  It involves keeping a record of various aspects of your workout, such as the exercises performed, sets and repetitions completed, weights or resistance used, duration of the workout, and anything else that you might think is relevant.  Why is it important to track a workout? Tracking your workouts serves as a pivotal tool in your fitness journey, contributing to your overall progress and success. But why is it important? • Enhanced motivation — Tracking your workouts offers tangible evidence of your progress and achievements. It serves as a powerful motivator, helping to instil a sense of confidence as you see your progress improve over the weeks. The visual representation of your efforts can inspire you to stay committed and strive for even greater milestones! • Progress assessment — Keeping track of your workouts allows you to assess the progress you’ve made. By analysing your tracked data, you can identify patterns, strengths, and areas that may need a bit of improvement. This valuable insight allows you to fine-tune your training approach, optimise your routines, and make informed adjustments aligned with your goals. • Effective goal setting — Tracking your workouts makes setting realistic and measurable goals much easier. By having access to detailed information about your workouts, you can set specific targets, break them down into manageable milestones, and monitor your progress towards achieving them.  • Accountability and discipline — When you record your exercises, you create a document that serves as a reminder of your commitment to your fitness objectives. This visual representation of your efforts acts as a gentle nudge to maintain consistency and stick to your planned routines. What can I use to track my workouts? From fitness watches to good old-fashioned pen and paper, there are a few ways you can track your workouts: • Fitness apps — There is a wide range of smartphone apps specifically designed for tracking workouts. These apps often offer pre-built exercise libraries, customisable routines, and the ability to input data like sets, reps, and weights. Apps like Apple Fitness+, Nike Training Club and Strava can help you take on any workout. • Pen and paper — A more traditional approach, this involves using a workout journal or notebook to manually record your workouts. This method is simple, inexpensive and allows for levels of customisation. • Wearable devices — Fitness trackers, smartwatches, and heart rate monitors can track workouts automatically or through manual input. These devices often provide data on heart rate, calories burned, steps taken, and duration of the workout. Some of the most popular watches on the market can range from affordable Fitbits to the more expensive Apple and Samsung watches. • Online platforms — Some fitness platforms, like Fitocracy, offer workout templates, exercise databases and the ability to log and track your progress over time. • Spreadsheets and digital templates — If you prefer a more customised approach, you can create your own workout tracking using spreadsheet software like Microsoft Excel or Google Sheets. You can also download free templates online, offering pre-built formats.  • Combination approach — You can also combine different methods based on your exact needs. For example, you might use a fitness app for tracking exercises and sets while using a wearable device to monitor your heart rate and calorie expenditure. Ultimately, the best tool for tracking workouts is the one that suits your preferences, supports your goals, and is easy for you to use consistently. What are the disadvantages of tracking your workouts? While tracking your workouts can be beneficial, it’s not to say that it doesn’t come with its drawbacks.  • Time and effort — Tracking workouts can be time-consuming, especially if you prefer to record detailed information. This additional effort may feel burdensome for some people who would instead focus solely on their workouts without the added task of recording data. • Obsession and stress — For some individuals, tracking workouts can lead to an unhealthy obsession with numbers and metrics. Constantly striving to meet specific targets or comparing yourself to others can create unnecessary stress and anxiety. It's important to maintain a healthy perspective and not let tracking become an obsession or a source of undue pressure. • Lack of flexibility — Strictly adhering to tracking routines can create rigidity in your workouts. While consistency is essential for progress, being too focused on recording every detail may limit your ability to adapt and modify your training based on how you feel on a particular day. It's crucial to listen to your body and make adjustments when necessary rather than being solely driven by tracking metrics. • Mental and emotional impact — For some individuals, tracking workouts can negatively impact their mental and emotional well-being. Constantly comparing oneself to others or feeling discouraged by not meeting specific goals can lead to feelings of inadequacy or demotivation. Maintaining a healthy mindset and remembering that progress looks different for everyone is important. How to choose the right tracking method for you When it comes to choosing your tracking method, you have to make sure it’s the right one for you, but there are a few things to consider beforehand. 1. Assess your goals Clarifying your fitness goals and what you hope to achieve by tracking your workouts can be a great way to get you in the right frame of mind. Ask yourself: • Do you want to improve your strength, endurance, flexibility or overall fitness? • Are you training for a specific event or competition? Understanding your objectives will help guide you in the right direction for selecting tracking methods that can cover all bases. 2. Evaluate your preferences Consider how you prefer to track, record and read information. While some people will enjoy the process of manual tracking, others may enjoy automated methods using fitness apps or watches that they don’t need to think about. Reflect on whether you prefer writing things down, using wearable tech or a combination of both! 3. Opt for trial periods If possible, try out different tracking methods for a trial period to explore options and find out which one suits you best. Experiment with various methods like manual tracking or testing out certain apps — that also offers a free trial — and see which you prefer! 4. Accountability and motivation Determine whether you need an accountability system or motivational features within the tracking method. Some apps offer community features, workout challenges, or even progress-tracking graphs that can help keep you motivated. Apple Fitness+ has a ‘burn bar’ on their HIIT workouts that lets you compete with others who have already taken on that specific workout.  Assess whether these elements are important to you and whether they contribute to your commitment and consistency. Do I have to track every workout? If it doesn’t align with your preferences, then there’s no need to track every single workout you do. While tracking workouts can be a helpful tool for monitoring progress, setting goals, and maintaining accountability, it's not necessary for everyone.  There are scenarios where tracking every workout may not be practical, like when your workouts involve a lot of variety or if they’re unstructured. In cases like group fitness classes or outdoor sports, it may be challenging to track each session accurately.  If tracking every workout starts to create stress, pressure, or anxiety, it's perfectly fine to take a break from it. Find a balance that works for you, whether it means tracking selectively, focusing on certain milestones, or adopting a more intuitive approach to exercise. Remember, the purpose of tracking workouts is to support your goals, but it should not become a burden or detract from your overall enjoyment and well-being in your fitness journey! Is tracking workouts time-consuming? “Tracking your workouts can be time-consuming, but it depends on the level of detail and the methods you use to track them”, explains Tim Andrews, Head of Fitness Product. To make your tracking more efficient, you can: • Plan workouts in advance so you have a clear idea of what you need to track. • Use pre-designed workout templates or programs. • Set aside specific time for tracking your workouts, such as straight after your session or at the end of the day. • Opt for fitness apps or wearable devices that offer seamless integration and automation. It doesn’t have to be hard to track your workouts! Can I still achieve my fitness goals without tracking workouts? Yes, it’s always possible to achieve your fitness goals, even if you don’t want to track all or any of your workouts.  While tracking workouts can provide valuable insights and help with accountability, it is not the sole determining factor for progress. Instead, focus on consistency and intensity in your exercise routine, making sure to challenge yourself and maintain a level of effort that pushes you outside your comfort zone. How often should I review my tracked workouts? Depending on personal goals and preferences, the frequency at which you track your workouts can differ. However, there are a few ways to determine how often you should: • Short-term goals — If you have specific short-term goals, such as increasing strength, improving endurance, or reaching a certain performance milestone, it can be helpful to review your tracked workouts more frequently. This allows you to assess your progress, make adjustments to your training routine if needed, and stay motivated by seeing your improvements. In such cases, reviewing your tracked workouts weekly or biweekly may be beneficial. • Long-term goals — For long-term progress and overall fitness assessment, it may be best to review your tracked workouts on a monthly or quarterly basis. This broader timeframe allows you to analyse trends and patterns over a more extended period, providing a better understanding of your overall progress and areas that may require additional attention. James Barr, a personal trainer at Fitness First, says, “It’s important to strike a balance between regular assessment for tracking sake and avoiding excessive fixation with the data. Find a schedule that works for you, helps keep you motivated and supports your continued development on your fitness journey.” Get ready to take on any workout with Fitness First At Fitness First, we have a wide range of fitness classes, personal training sessions and more to help you reach your fitness goals.  Book a club visit to come and experience our facilities for free. Or, for more helpful tips and advice on fitness and nutrition, check out our blog.
ESSENTIALAI-STEM
Page:Caledonia (Defoe).djvu/71 The Nation's willing Honours did afford, And thee cut out their. Glory by the Sword; For 'twas the early Fortunes of their Blood, To have their Worth both Crown'd and undertood; Princes by their trong Swords poet their Crowns, And grateful France their Ancient Glory owns. When Men are of true Merit firt poet, Jutice prevails, the World upply's the ret. For Characters will always uit Mens Deeds, Honours will follow, when our Vertue leads. The Mighty Branch that now upports the Race, Ripens the blooming Stock for Fame apace, With high intructing well directed Hand, Shews him both how t'obey, and how Command, By Jut Example guides him to purue, And double all their Ancient Deed's with New. Himelf with teady hand the State directs, Supprees Factions, Liberty protects, Scatters the threatning Clouds, prevents the Storms; And gently al! mitaken Zeal reforms; Backward to punih bears th' inulting Street, Yet makes his Patience and his Jutice meet: And when their Pride his Government defies, PITYS: For 'tis below him to depie.
WIKI
DURAMED PHARMACEUTICALS, INC., Plaintiff, v. PADDOCK LABORATORIES, INC., Defendant. No. 09 Civ. 1905(LBS). United States District Court, S.D. New York. June 1, 2010. Jay Philip Lefkowitz, Kirkland & Ellis LLP, New York, NY, Nathan S. Mammen, Daniel F. Attridge, Jessica Christine Kaiser, Leslie M. Schmidt, Philip John War-rick, Kirkland & Ellis, L.L.P., Washington, DC, Alexander F. MacKinnon, Nick G. Saros, Kirkland & Ellis LLP, Los Angeles, CA, Benjamin Ostapuk, Kirkland & Ellis LLP, San Francisco, CA, for Duramed Pharmaceuticals, Inc. Edgar H. Haug, Bryan Joseph Braunel, David Arnold Zwally, Porter F. Fleming, Frommer, Lawrence & Haug, L.L.P., Washington, DC, for Paddock Laboratories, Inc. OPINION SAND, District Judge. In this patent infringement action, Plaintiff Duramed Pharmaceuticals, Inc. (now Teva Women’s Health, Inc.) (“Duramed”) brings a motion for partial summary judgment, and Defendant Paddock Laboratories, Inc. (“Paddock”) brings a motion for summary judgment of non-infringement. Duramed holds a patent that it contends covers its product Cenestin, a conjugated estrogen tablet used in hormone replacement therapy. Duramed contends that Paddock infringed its patent when Paddock sought to manufacture and market a generic version of Cenestin. In order to succeed on its patent infringement claim, Duramed must prove that the “moisture barrier coating” (“MBC”) in Paddock’s tablet is equivalent to Cenestin’s MBC. Paddock counters that Duramed’s actions in prosecuting its patent before the Patent and Trademark Office (“PTO”) es-top Duramed from asserting equivalency. The Court finds that the doctrine of prosecution history estoppel bars Duramed from relying on the doctrine of equivalents to prove infringement, thereby defeating Duramed’s patent infringement claim. Accordingly, Duramed’s motion is denied, and Paddock’s motion is granted in part. I. Background The products in question in this case are conjugated estrogen pills used in hormone replacement therapy to treat menopause symptoms. In the early 1990s, the FDA withdrew its approval for generic versions of Wyeth Pharmaceutical’s patented conjugated estrogen product Premarin due to concerns that overly rapid dissolution of the pills could be harmful. (Duramed 56.1 ¶ 24.) In response, Duramed’s inventors sought to create a pill with a suitable dissolution profile to compete with Premarin. They did so by designing a pill that controlled the release rate of the estrogen, prevented the estrogen from disintegrating through contact with excess water during storage, and limited stress on the pill’s moisture barrier coating to prevent cracking. (Duramed 56.1 ¶¶ 10-19.) On July 25, 1996, Duramed applied for a patent on its invention. The patent application included one independent claim, claim 1, and 27 additional dependent claims. In the independent claim, • Duramed originally claimed a tablet using any type of moisture barrier coating. (Paddock Ex. 36, '638 file history, DPI_CENESTIN0074850) (claiming “[a] pharmaceutical composition ... wherein said solid unit dosage form is coated with a moisture barrier coating.”). Dependent claim 7 of the original patent application also specifically claimed “[a] pharmaceutical composition of claim 1 wherein said moisture barrier coating comprises ethyl-cellulose.” (Paddock Ex. 36, '638 file history, DPI_CENESTIN0074851.) Duramed then withdrew certain claims, and the patent examiner then rejected all remaining claims, including claim 1 and claim 7, as obvious in light of U.S. Patent No. 5,547,948 (“Barcomb”). (Paddock Ex. 36, '638 file history, DPI_CENES-TIN0074895-96.) The examiner explained that “Barcomb teaches .... tablets having at least one coating .... Such coatings would read on the instantly claimed ethyl cellulose as a moisture barrier.” (Paddock Ex. 36, '638 file history, DPL.CENES-TIN0074895-96.) On November 30,1998, the patent examiner conducted an in-person interview with Duramed, and suggested three amendments that would enable it to overcome the prior art and secure the patent. The interview summary stated that the “examiner suggests amending claim 1 to require the tablet to be substantially free of ‘inorganic excipients’ (which lead to cracking of coat) and insert limitations of claims 7 and 9 into claim 1. These limitations overcome[ ] art and render[ ] claims allowable.” (Paddock Ex. 36, '638 file history, DPI_CENESTIN0074900.) The examiner’s suggestion was thus that Duramed insert three further limitations into its overly broad independent claim to make the claim more specific: (1) the pill must be substantially free of inorganic excipients; (2) the pill must have a “moisture barrier coating compris[ing] ethylcellulose” (from dependent claim 7); and (3) the pill must comprise “about 30-70% gel-forming organic excipient and about 30-70% non-gel forming organic excipient by weight (from dependent claim 9). (Paddock Ex. 36, '638 file history, DPI_CENESTIN0074851, 900.) Duramed made the three suggested amendments “[i]n response to the Office Action dated June 4,1998 [ (the rejection) ] and an Examiner’s interview of November 30,1998.” (Paddock Ex. 36, '638 file history, DPI_CENESTIN0074902.) Dependent claims 7 and 9 were deleted, and their limitations were added to the independent claim. (Paddock Ex. 36, '638 file history, DPI_CENESTIN0074902.) In support of its amendments, Duramed argued that “the indication that a moisture barrier may be used [in the prior art Barcomb patent] does not suggest, or read upon, the claimed use of ethyl cellulose as a moisture barrier in combination with the claimed formulations comprising conjugated estrogens coated onto organic excipients, forming compositions having less than about 2.5% free water, which are coated with a moisture barrier over the tableted formulation.” (Paddock Ex. 36, '638 file history, DPL.CENESTIN0074906) (emphases in original). In response to Duramed’s amendments, the examiner allowed certain amended claims, including the independent claim. (Paddock Ex. 36, '638 file history, DPI_CENESTIN0074908.) In the notice of allowability mailed December 23, 1998, the examiner remarked that “applicants have adopted the suggestion made at the personal interview of November 30, 1998.” (Paddock Ex. 36, '638 file history, DPI-CENESTIN0074911.) The PTO granted U.S. Patent 5,908,638 (“the '638 patent”) on June 1, 1999. Duramed began selling Cenestin that same year, and it was the only “modified-release conjugated estrogen alternative to Premarin” on the market at the time. (Duramed 56.1 ¶ 31.) In October 2008, Paddock filed an Abbreviated New Drug Application (“ANDA”) with the Food and Drug Administration (“FDA”), which sought approval to sell a generic version of Duramed’s Cenestin tablets. (Duramed 56.1 ¶ 38.) Under the Hatch-Waxman Act, a company may seek expedited approval to market a generic version of a drug previously approved by the FDA by filing an ANDA. Bayer AG v. Elan Pharm. Research Corp., 212 F.3d 1241, 1244 (Fed.Cir.2000) (citation omitted). If the generic company can show “bioequivalence” between its proposed generic drug and the previously approved drug, it may forego safety and efficacy studies. Id. (citation omitted). Paddock’s ANDA certified that Duramed’s patent was invalid and that the patent would not be infringed by Paddock’s generic drug, and Paddock submitted statutorily required notice letters to Duramed explaining its position. (Compl.¶¶ 11-15.) In March 2009, Duramed brought this patent infringement action against Paddock. By filing this lawsuit, Duramed obtained an automatic 30-month stay of FDA approval for Paddock’s proposed generic drug. See 21 U.S.C. § 355(j)(5)(B)(iii); 21 C.F.R. § 314.107(b)(3). The automatic stay remains in effect until the district court enters a judgment of non-infringement or patent invalidity, or the expiration of thirty months, whichever occurs first. See 21 U.S.C. § 355(j)(5)(B)(iii)(I); 21 C.F.R. § 314.107(b)(3). The parties agree that the MBC in Paddock’s proposed generic tablets does not literally infringe the '638 patent. (Duramed 56.1 ¶ 51.) The '638 patent teaches a moisture barrier comprising ethylcellulose, while Paddock’s proposed generic tablets use a polyvinyl alcohol (“PVA”) MBC, marketed under the name Opadry AMB. Because Paddock’s MBC does -not literally infringe Duramed’s patent, Duramed must rely on the doctrine of equivalents to succeed on its patent infringement claim. “[F]or a court to find infringement, the plaintiff must show the presence of every element or its substantial equivalent in the accused device. A patentee must prove that the accused product contain(s) each limitation of the claim or its equivalent.” Terlep v. Brinkmann Corp., 418 F.3d 1379, 1384 (Fed.Cir.2005) (citation and internal quotation marks omitted). Paddock argues that Duramed abandoned all equivalents to ethylcellulose MBCs pursuant to the doctrine of prosecution history estoppel. II. Standard of Review Summary judgment is warranted “if the pleadings, depositions, answers to interrogatories, and admissions on file, together with the affidavits, if any, show that there is no genuine issue as to any material fact and that the moving party is entitled to judgment as a matter of law.” Fed.R.Civ.P. 56(c). A material fact is one that might affect the outcome of a suit under governing law. Kinsella v. Rumsfeld, 320 F.3d 309, 311 (2d Cir.2003). A “genuine” issue exists when “the evidence is such that a reasonable jury could return a verdict for the nonmoving party.” Anderson v. Liberty Lobby, Inc., 477 U.S. 242, 248, 106 S.Ct. 2505, 91 L.Ed.2d 202 (1986). When deciding cross-motions for summary judgment, the Court analyzes each motion on its own merits, drawing all reasonable inferences in the light most favorable to the nonmoving party. Heublein, Inc. v. United States, 996 F.2d 1455, 1461 (2d Cir.1993). Patent cases are amenable to summary judgment. Barmag Barmer Maschinenfabrik AG v. Murata Mach., Ltd,., 731 F.2d 831, 835 (Fed.Cir.1984). III. Discussion Prosecution history estoppel is designed to prevent a patentee from recap-taring through litigation what it has surrendered during patent prosecution to appease a skeptical patent examiner. Festo Corp. v. Shoketsu Kinzoku Kogyo Kabushiki Co., Ltd., 535 U.S. 722, 734, 122 S.Ct. 1831, 152 L.Ed.2d 944 (2002) (“Festo VIII ”). The doctrine provides that if an applicant seeking a patent is rejected by the patent examiner on the grounds that the original patent application swept too wide, and the applicant then adopts a narrowing amendment to mollify the patent examiner, the patentee is estopped from asserting that any of the abandoned territory constitutes an “equivalent” to the patented invention. See, e.g., id. at 740-41 (“A patentee’s decision to narrow his claims through amendment may be presumed to be a general disclaimer of the territory between the original claim and the amended claim.”). Hence, when a patent application is rejected for overbreadth, the applicant must either (1) immediately appeal the rejection to maintain the breadth, or (2) craft a narrower application to secure the patent, but forever relinquish the ability to later maintain in litigation that the surrendered territory is “equivalent” to the narrowed claims. “[An applicant’s] decision to forgo an appeal and submit an amended claim is taken as a concession that the invention as patented does not reach as far as the original claim.” Id. at 734. “Given a choice of imposing the higher costs of careful prosecution on patentees, or imposing the costs of foreclosed business activity on the public at large, this court believes the costs are properly imposed on the group best positioned to determine whether or not a particular invention warrants investment at a higher level, that is, the patentees.” Sage Products, Inc. v. Devon Industries, Inc., 126 F.3d 1420, 1425 (Fed.Cir.1997). In order to determine if prosecution history estoppel applies, a court first asks “whether an amendment filed in the Patent and Trademark Office (“PTO”) has narrowed the literal scope of a claim.” Festo Corp. v. Shoketsu Kinzoku Kogyo Kabushiki Co., Ltd., 344 F.3d 1359, 1366— 67 (Fed.Cir.2003) (“Festo IX”). An amendment narrows the literal scope of a claim when it renders a general description more specific, as when a genus is replaced with a species. See, e.g., Pioneer Magnetics, Inc. v. Micro Linear Corp., 330 F.3d 1352, 1356 (Fed.Cir.2003) (“[T]he amendment of claim 1 from a ‘multiplier’ to a ‘switching analog’ multiplier narrowed the literal scope of the claim.”). Here, it is plain that Duramed’s amendment narrowed the literal scope of the claim. Duramed originally claimed estrogen tablets with any kind of moisture barrier coating, and Duramed then amended the claim to reach only estrogen tablets with “moisture barrier eoating[s] comprising ethylcellulose.” (Paddock Ex. 36, '638 file history, DPLCENESTIN0074850, DPLCENES-TIN0074902.) “[I]f the accused infringer establishes that the amendment was a narrowing one, then the second question is whether the reason for that amendment was a substantial one relating to patentability.” Festo IX, 344 F.3d at 1366-67. “The burden is on the patent holder to establish that the reason for the amendment is not one related to patentability,” and “[w]here no explanation is established, a court should presume that the applicant had a substantial reason related to patent-ability for the amendment.” Pioneer Magnetics, 330 F.3d at 1356 (citing Warner-Jenkinson Co. v. Hilton Davis Chem. Co., 520 U.S. 17, 32-33, 117 S.Ct. 1040, 137 L.Ed.2d 146 (1997)). This is referred to as the Warner-Jenkinson presumption. Id. In opposing estoppel, Duramed makes no serious attempt to argue that the Warner-Jenkinson presumption does not apply. Nor could it, given that the prosecution history clearly shows that Duramed’s original patent application was rejected as obvious in light of prior art, the patent examiner then suggested the ethylcellulose narrowing amendment in order to overcome prior art, and Duramed followed the examiner’s advice and emphasized that the combination of the narrowing amendments established patentability. As the Court of Appeals for the Federal Circuit stated in Pioneer Magnetics, “[o]ur own examination of the prosecution history convinces us that the amendment was made to avoid prior art, the classic basis for the application of prosecution history estoppel.” Pioneer Magnetics, 330 F.3d at 1357. Since the Warner-Jenkinson presumption has not been rebutted, the Festo presumption applies, which presumes “that the patentee has surrendered all territory between the original claim limitation and the amended claim limitation.” Festo IX, 344 F.3d at 1367. The patentee bears the burden of rebutting the Festo presumption, and whether it has done so is a “question of law to be determined by the court, not a jury.” Id. There are “three ways in which the patentee may overcome the [Festo ] presumption[: (1) ] by demonstrating that the equivalent would have been unforeseeable at the time of the amendment, [ (2) ] that the rationale underlying the amendment bore no more than a tangential relation to the equivalent in .question, or [ (3) ] that there was some other reason suggesting that the patentee could not reasonably be expected to have described the insubstantial substitute in question.” Id. at 1365 (quotations, alterations, and footnote omitted). Duramed argues that material issues of fact prevent summary judgment on prongs one and two; Duramed does not dispute Paddock’s claim that prong three is inapplicable here. (See Pl.’s Mem. Opp. Def.’s Mot. Summ. J. 3.) a. Foreseeability Under the foreseeability prong, a patentee must show that the equivalent which it seeks to claim — in this case Paddock’s PVA MBC — was “unforeseeable at the time of the amendment and thus beyond a fair interpretation of what was surrendered.” Festo IX, 344 F.3d at 1369. “An equivalent is foreseeable if one skilled in the art would have known that the alternative existed in the field of art as defined by the original claim scope, even if the suitability of the alternative for the particular purposes defined by the amended claim scope were unknown.” Festo Corp. v. Shoketsu Kinzoku Kogyo Kabushiki Co., Ltd., 493 F.3d 1368, 1382 (2007) (“Festo X”). “Foreseeability does not require that the accused infringing product or process be foreseeable, nor that any equivalent exist at the time; rather foreseeability only requires that one of ordinary skill in the art would have reasonably foreseen the proposed equivalent at the pertinent time.” Honeywell Int’l, Inc. v. Hamilton Sundstrand Corp., 523 F.3d 1304, 1312 (Fed.Cir.2008) (citing Festo X, 493 F.3d at 1382). If an equivalent was developed after the date of the amendment, it is more likely to be unforeseeable; if it was developed before the amendment, it is more likely to be foreseeable. Festo X, 493 F.3d at 1369. If the equivalent not only preexisted the amendment but was “known in the prior art in the field of the invention, it certainly should have been foreseeable at the time of the amendment.” Id. (emphasis added); see also id. at 1379 (“[A]n alternative is foreseeable if it is disclosed in the pertinent prior art in the field of the invention” at the time of the amendment); Amgen Inc. v. Hoechst Marion Roussel, Inc., 457 F.3d 1293, 1313 (Fed.Cir.2006) (“[I]f an equivalent is known in the field, then it is foreseeable.”); Pioneer Magnetics, 330 F.3d at 1357 (“As noted, the Carpenter [patent] discloses a non-switching multiplier circuit. Therefore, a non-switching circuit was known in the art and would have been foreseeable at the time of the amendment.”). Polyvinyl alcohol MBCs were indeed “disclosed in the pertinent prior art in the field of the invention” at the time of Duramed’s narrowing amendment in 1998. Festo X, 493 F.3d at 1379. Colorcon, the manufacturer of Opadry AMB, filed an international patent application pursuant to the Patent Cooperation Treaty (“Color-con PCT”) on July 12,1995. (Paddock Ex. 49, COL0008.) The Colorcon PCT was published on January 25, 1996, more than two years before Duramed’s amendment. (Paddock Ex. 49, COL0008.) The Color-con PCT not only describes PVA as “a moisture barrier coating for pharmaceutical tablets and the like,” (Paddock Ex. 49, COL0008), but contains a claim disclosing exactly the same chemicals in the same concentrations as are used in the Opadry AMB coatings on some of Paddock’s generic tablets. (Paddock Ex. 49, COL0026; Paddock Ex. 45, COL0006-7.) The publication of the Colorcon PCT establishes that Polyvinyl Alcohol moisture barrier coatings for pharmaceutical tablets were “disclosed in the prior art,” and were foreseeable at the time of Duramed’s narrowing amendment. Festo X, 493 F.3d at 1379. Even discounting arguendo the four pre-1998 documents discussing Opadry AMB that Duramed claims were not published, several additional facts reinforce our finding that PVA MBCs were foreseeable at the time of Duramed’s narrowing amendment on December 3, 1998. (Paddock Ex. 36, '638 file history, DPL.CENESTIN0074902-07.) Colorcon' produced invoices for sales of Opadry AMB in the same formulation as used in Paddock’s proposed generic tablets as early as September 1996. (Paddock Ex. 57, 58.) Colorcon also averred that it marketed Opadry AMB at least since 1996 through one-on-one meetings, promotional literature, and advertising at relevant scientific conferences. (Paddock Ex. 22 (“Colorcon Dep.”), 37-43.) Such sales provide further evidence that PVA MBCs were “disclosed in the prior art.” Festo X, 493 F.3d at 1379; see also Kothmann Enterprises, Inc. v. Trinity Industries, Inc., 394 F.Supp.2d 923, 965 (S.D.Tex.2005) (“Trinity began selling the TRACC in 1999, long before the amendment was submitted to the PTO on July 27, 2002.... [Plaintiff] cannot assert that the TRACC product, which it claims is an equivalent, was unforeseeable when it filed the amendment.”). Paddock points to a patent issued in 1976 that teaches coating tablets with PVA to ensure “moisture tight[ness]” and “insolub[ility] in the gastrointestinal tract.” (Paddock Ex. 48, PADCE0049432.) Duramed’s only response to this evidence is to claim that it does not “relate to Opadry AMB or the use of PVA in moisture barrier coatings in pharmaceutical applications.” (Pl.’s Mem. Opp. Def.’s Mot. Summ. J. 8 n. 5.) However, prior art references need not disclose the exact equivalent product in order to establish foreseeability. “Foreseeability does not require that the accused infringing product or process be foreseeable, nor that any equivalent exist at the time; rather foreseeability only requires that one of ordinary skill in the art would have reasonably foreseen the proposed equivalent at the pertinent time.” Honeywell, 523 F.3d at 1312 (citation omitted). Duramed’s arguments against all of the foregoing evidence are based on a dubious construction of the legal standard used to determine foreseeability. Duramed relies on one of the Court of Appeals for the Federal Circuit’s many restatements of the standard for determining foreseeability: “an equivalent is foreseeable if the equivalent was generally known to those skilled in the art at the time of amendment as available in the field of the invention ....” Festo X, 493 F.3d at 1380 (emphasis added). Duramed argues that an equivalent must be “generally known” to those skilled in the art in the sense that the relevant knowledge must have in fact been widely disseminated among skilled artisans at the time of the amendment. This definition of the standard allows Duramed to opine that most actual skilled artisans would not have come across an international patent application or have known about certain sales of Opadry AMB, and therefore genuine issues of material fact preclude summary judgment on foreseeability. (See e.g. Pl.’s Mem. Opp. Def.’s Mot. Summ. 8-9) (“At best, the only ‘publications’ Paddock can point to as disclosing Opadry AMB by the relevant time are a handful of questionable abstracts from conferences no one remembers attending and publications no one remembers reading at the relevant time.”). Put differently, Duramed argues that the Court should ask what the majority of skilled artisans in fact knew and were able to foresee in 1998, while Paddock argues that the Court should ask what a hypothetical skilled artisan should have known and been able to foresee in 1998. However, Duramed’s construction of the standard is belied by the Court of Appeals for the Federal Circuit’s discussion in the very same Festo X opinion. The Festo X court went on to state that “an alternative is foreseeable if it is disclosed in the pertinent prior art in the field of the invention,” that is, it is foreseeable because it was disclosed in the art and a hypothetical skilled artisan is presumed to be familiar with said disclosure. Festo X, 493 F.3d at 1379. Likewise, in Pioneer Magnetics, the court held that because a prior patent disclosed the equivalent in question, it was for that reason alone considered known in the art and foreseeable. Pioneer Magnetics, 330 F.3d at 1357 (“As noted, the Carpenter [patent] discloses a non-switching multiplier circuit. Therefore, a non-switching circuit was known in the art and would have been foreseeable at the time of the amendment.”). Rather than actual dispersion of knowledge, the phrase “generally known” as used in Festo X refers to the fact that it need not be specifically known that the claimed equivalent “perform the same function in substantially the same way to achieve the same result” at the time of the amendment. Festo X, 493 F.3d at 1379 (citation omitted). Foreseeability only requires a less specific kind of knowledge about the claimed equivalent. See id. at 1381 (“For example, if a claim before amendment broadly claimed a metal filament for a light bulb but was later amended to avoid prior art and to specify metal A because of its longevity, the .equivalent metal B, known in the prior art to function as a bulb filament, is not unforeseeable even though its longevity was unknown at the time of amendment.”). In fact, the Court of Appeals for the Federal Circuit would later hold that the equivalent need not even exist at the time of the amendment so long as it would have been reasonably foreseen by skilled artisans based on the state of the art. Honeywell, 523 F.3d at 1312 (“Foreseeability does not require that the accused infringing product or process be foreseeable, nor that any equivalent exist at the time; rather foreseeability only requires that one of ordinary skill in the art would have reasonably foreseen the proposed equivalent at the pertinent time.”) (citation omitted). Duramed also argues that even if PVA MBCs were disclosed in the prior art or generally known to exist, serious questions existed as to PVA’s effectiveness as á MBC in 1998. In support, Duramed points to the Colorcon PCT, which details the many problems with PVA MBCs and provides only conclusory assertions that the inventors had overcome those problems. However, even if the effectiveness of PVA was unknown in 1998, that would not mean that PVA MBCs were unforeseeable. “An equivalent is foreseeable if one skilled in the art would have known that the alternative existed in the field of art as defined by the original claim scope, even if the suitability of the alternative for the particular purposes defined by the amended claim scope were unknown.” Festo X, 493 F.3d at 1382. Accordingly, the Court finds that there is no genuine issue of material fact with respect to foreseeability. When asked at oral argument what evidence Duramed would present at a bench trial, Duramed’s counsel claimed that it would present more testimony from the same expert witnesses that have been deposed, in which the experts would testify that Opadry AMB’s existence and suitability were not well known or known to them in 1998, as well as evidence questioning the availability of Paddock’s prior art documents. (T. at 66.) But for the reasons stated above, neither a showing that those experts did not know of Opadry AMB, nor that they doubted its efficacy, nor that they would be unlikely to come across the publicly available prior art references could support a verdict for Duramed. Accordingly summary judgment is appropriate on the issue of foreseeability. b. Tangentiality Turning to the tangentiality prong of the rebuttal of the Festo presumption, the Court asks “whether the reason for the narrowing amendment was peripheral, or not directly relevant, to the alleged equivalent.” Festo IX, 344 F.3d at 1369. The tangential prong is a “very narrow” exception to the Festo presumption. Cross Med. Prods., Inc. v. Medtronic Sofamor Danek, Inc., 480 F.3d 1335, 1335 (Fed.Cir.2007). The patentee bears the burden on the tangentiality prong and must make its showing by pointing to evidence in the prosecution history file. Festo IX, 344 F.3d at 1369. The essential question here is whether the reason behind the narrowing amendment implicates the alleged equivalent. See id. at 1342 (Fed.Cir.2007) (“[A]n amendment distinguishing prior art based on where the vacuum source was located was only tangentially related to an equivalent directed at the number of vacuum sources”) (emphases in original); Biagro W. Sales, Inc. v. Grow More, Inc., 423 F.3d 1296, 1306 (Fed.Cir.2005). If the patent holder narrowed claim X but the equivalent only relates to claim Y, which was never narrowed, then no estoppel can arise because the equivalent is only relevant to the non-narrowed claim. Accordingly, we must inquire whether Duramed’s narrowing amendment concerned the type of MBC covered by the patent, because the alleged equivalent is another type of MBC. In this case, it is clear that the narrowing amendment is not tangential to the equivalent. The main case relied on by Duramed, Regents of the University of California v. Dakocytomation, 517 F.3d 1364 (Fed.Cir.2008) is inapposite because in that case, the amendment focused on a method, not the type of chemical that would perform that method. Therefore, the patentee did not surrender other types of chemicals because it had never narrowed its claim as regards the type of chemical used. Id. at 1378 (“[T]he focus of the patentees’ arguments centered on the method of blocking' — -not on the particular type of nucleic acid that could be used for blocking. Indeed, the “nucleic acid” limitation was never narrowed during prosecution .... ”). In this case, the narrowing amendment related only to the type of moisture barrier coating used, and the alleged equivalent is a different type of moisture barrier coating. Duramed’s contends that the ethylcellulose amendment was unnecessary to secure patentability because the patent examiner originally rejected both claim 1, which claimed all types of MBCs, and claim 7, which specifically claimed an ethylcellulose MBC. Duramed argues that although the ethylcellulose limitation was added to claim 1 at the patent examiner’s suggestion, neither Duramed nor the patent examiner focused on it, and this amendment “did not improve the patentability of the claimed invention over the prior art.” (Pl.’s Mem. Opp. Def.’s Mot. Summ. J. 10.) Essentially, Duramed argues that there was no reason for the amendment. However, even if this were true, it would not suffice to meet Duramed’s burden; silence in the record as to the reason for the amendment does not overcome the Festo presumption. Honeywell, 523 F.3d at 1315; Festo IX, 344 F.3d at 1371-72 (“Festo thus argues that the amendment was unnecessary to respond to (and thus only tangential to) the ... rejection .... Because the prosecution history reveals no reason for the ... amendment, and because Festo still identifies no such reason, Festo has not shown that the reason for the ... amendment was only tangential to the accused equivalent.”). Because Duramed’s amendment concerned the type of MBC to be used, and the alleged equivalent is another type of moisture barrier coating, Duramed’s narrowing amendment was not tangential to the alleged equivalent. IV. Conclusion Based on the foregoing, Duramed is unable to rebut the Festo presumption, and prosecution history estoppel applies. Duramed is therefore precluded from relying on the doctrine of equivalents in its patent infringement action. Because Duramed cannot succeed on its patent infringement action without resorting to the doctrine of equivalents for the ethylcellulose MBC limitation, Duramed’s patent infringement claim fails. See, e.g., Lockheed, Martin Corp. v. Space Systems/Loral, Inc., 324 F.3d 1308, 1321 (Fed.Cir.2003). Accordingly, Paddock’s motion for summary judgment of non-infringement is granted solely on prosecution history estoppel grounds. This holding moots all remaining claims and arguments, including Paddock’s argument-based estoppel and claim vitiation arguments. Because our prosecution history estoppel ruling entails a holding of non-infringement, there is no indication that a live case or controversy is presented by Paddock’s further claims that the '638 patent is invalid; indeed, Paddock itself claims that a prosecution history estoppel holding “would end the case.” (Def.’s Mem. Opp. Pl.’s Mot. Partial Summ. J. 4.) Consequently, we forego consideration of Duramed’s motion for partial summary judgment, and both parties’ claim construction arguments. As the Hatch-Waxman Act automatic stay of FDA approval for Paddock’s proposed generic tablets will end on the date judgment is entered, the Clerk of Court is directed to enter judgment forthwith and close the case. SO ORDERED. . The Drug Price Competition and Patent Term Restoration Act of 1984, Pub. L. No. 98-417, 98 Stat. 1585 (1984) (codified as amended at 21 U.S.C. § 355 (1994) and 35 U.S.C. § 271(d)-(h)(1995). This legislation is commonly referred to as the Hatch-Waxman Act. . The numbering of the various Festo opinions has been inconsistently applied Compare Honeywell Intern., Inc. v. Hamilton Sundstrand Corp. 523 F.3d 1304 (Fed.Cir.2008) (referring to 493 F.3d 1368 (2007) as "Festo X") with Festo Corp. v. Shoketsu Kinzoku Kogyo Kabushiki Co., Ltd., 493 F.3d 1368 (2007) (referring to 344 F.3d 1359 (2003) as "Festo X"). We adopt the numbering used in Honeywell. . "[A] number of statutoiy requirements must be satisfied before a patent can issue. The claimed subject matter must be useful, novel, and not obvious.... In addition, the patent application must describe, enable, and set forth the best mode of carrying out the invention.'' Festo VIII, 535 U.S. at 736, 122 S.Ct. 1831 (citations omitted). "[A] narrowing amendment made to satisfy any requirement of the Patent Act may give rise to an estoppel.'' Id. In this case, the original patent application swept too wide because it was obvious in light of prior art. (Paddock Ex. 36, '638 file history, DPL.CENES-TIN0074895-96.) . In opposing Paddock’s motion for summary judgment, Duramed does not argue otherwise. (See Pl.'s Mem. Opp. Def.'s Mot. Summ. J. 3.) . (See Paddock Ex. 36, '638 file history, DPI_CENESTIN0074895-96) (patent examiner’s rejection of original application as obvious); (Paddock Ex. 36, '638 file history, DPI_CENESTIN0074900) (patent examiner's suggestion of ethylcellulose narrowing amendment, inter alia, to overcome prior art); (Paddock Ex. 36, '638 file history, DPI_CEN-ESTIN0074906) (Duramed's argument that its adoption of the examiner’s suggested narrowing amendments overcame prior art). . "The parties agree that a person skilled in the art of the '638 patent would have had pharmaceutical formulation development experience.” (Pl.’s Mem. Opp. Def.’s Mot. Summ. J. 4.) . Courts writing in the context of patent obviousness have noted that international patent applications (PCT applications) are considered prior art so long as they are published more than a year before the domestic patent application. See, e.g., C.R. Bard, Inc. v. M3 Systems, Inc., 157 F.3d 1340, 1347 (Fed.Cir.1998) ("The PCT application was filed on March 31, 1982 and was published on October 13, 1983. It is prior art to the United States patents in suit.”); Rocep Lusol Holdings Ltd. v. Permatex, Inc., 470 F.Supp.2d 448 (D.Del.2007). (finding patent invalid as anticipated by prior art PCT application). There is no indication that the term "prior art” has a meaning in prosecution history estoppel cases different from its meaning in other areas of patent law. See generally Black’s law dictionary, Art, (8th ed. 2004) (“[P]rior art. Patents!:] Knowledge that is publicly known, used by others, or available on the date of invention to a person of ordinary skill in an art, including what would be obvious from that knowledge. Prior art includes (1) information in applications for previously patented inventions; (2) information that was published more than one year before a patent application is filed; and (3) information in other patent applications and inventor’s certificates filed more than a year before the application is filed. The U.S. Patent and Trademark Office and courts analyze prior art before deciding the patentability of a comparable invention.”) (citing 35 U.S.C. § 102). Accordingly, the Colorcon PCT is prior art for the purposes of the instant foreseeability analysis. . Paddock points to an article in the journal "Manufacturing Chemist” from December 1995 extolling the virtues of Opadry AMB, and three scientific articles discussing PVA MBCs authored for distribution at scientific conferences in May 1995, May 1998, and November 1998. (Paddock Ex. 50, 52, 53, 55.) Duramed argues that a bench trial is necessary to determine whether the article was publicly available in a university library, and whether the conference articles were actually distributed to the conference attendees. Because these four documents are not necessary to establish foreseeability given the other evidence in the record, the Court will not consider them. . Furthermore, although the foreseeability inquiry is objective, Duramed’s own patent makes reference to Colorcon, increasing the likelihood that Colorcon and its line of coatings would be known to those skilled in the art at the time of Duramed’s narrowing amendment. (Paddock Ex. 7, DPL.CENES-TIN0074938.) . That Duramed places undue weight on this phrase can be readily ascertained from an examination of the context in which it is used. The phrase "generally known" appears only once in the Festo X opinion. Yet the Court of Appeals for the Federal Circuit restates the standard for foreseeability twice over within the same opinion without repeating the phrase "generally known.” See Festo X, 493 F.3d at 1379 ("[W]e find that an alternative is foreseeable if it is disclosed in the pertinent prior art in the field of the invention. In other words, an alternative is foreseeable if it is known in the field of the invention as reflected in the claim scope before amendment.”); id. at 1382 ("An equivalent is foreseeable if one skilled in the art would have known that the alternative existed in the field of art as defined by the original claim scope, even if the suitability of the alternative for the particular purposes defined by the amended claim scope were unknown.”). . Duramed raises similar arguments against Paddock's other prior art evidence, which must suffer the same fate. . All references to "T." refer to the transcript of the oral argument held before this Court on May 4, 2010. . Although we do not question Duramed’s good faith in seeking a bench trial, we note that a consequence of conducting such a trial would be to extend significantly the hold which the pendency of these proceedings has placed upon Paddock’s entry into the market. See 21 U.S.C. § 355(j)(5)(B)(iii)(I); 21 C.F.R. § 314.107(b)(3).
CASELAW
With caveats, Republicans praise Trump’s summit with Kim Jong Un | TheHill President TrumpDonald John TrumpFacebook releases audit on conservative bias claims Harry Reid: 'Decriminalizing border crossings is not something that should be at the top of the list' Recessions happen when presidents overlook key problems MORE’s highly anticipated meeting with North Korean leader Kim Jong Un largely attracted praise from congressional Republicans, but they also expressed wariness and want to sign off on any agreement.  Republicans said this week’s summit was a promising first step, but some expressed concern about Trump’s warm words for the North Korean leader and his surprise call to suspend joint military exercises with South Korea, a longtime ally. Senate Majority Leader Mitch McConnellAddison (Mitch) Mitchell McConnellPelosi, Schumer press for gun screenings as Trump inches away The malware election: Returning to paper ballots only way to prevent hacking First House Republican backs bill banning assault weapons MORE (R-Ky.) praised it as “an historic first step in an important negotiation.” Even so, he acknowledged that finding a long-term diplomatic solution “will take a great deal of hard work” and warned that allies must be ready to impose economic penalties if North Korea is not willing to follow through on its promises. Speaker Paul RyanPaul Davis RyanPaul Ryan moving family to Washington Embattled Juul seeks allies in Washington Ex-Parkland students criticize Kellyanne Conway MORE (R-Wis.) commended Trump “for not accepting the status quo.” But he also warned against celebrating a diplomatic victory prematurely. “We must always be clear that we are dealing with a brutal regime with a long history of deceit,” he said in a statement. “Only time will tell if North Korea is serious this time, and in the meantime we must continue to apply maximum economic pressure.”  Some Republicans raised concerns about Trump’s call to suspend joint military exercises with South Korea, something that took the Pentagon by surprise. “I don’t think that’s wise because we have done these exercises for years,” Sen. Joni ErnstJoni Kay ErnstErnst town hall in Iowa gets contentious over guns Air Force probe finds no corroboration of sexual assault allegations against Trump pick Gun control activists set to flex muscle in battle for Senate MORE (R-Iowa), who chairs a Senate Armed Services subcommittee, said Tuesday. “I would just ask the president, why do we need to suspend them? They are legal.” Other Republicans balked at Trump’s effusive praise for Kim, who he said has a “great personality” and is “very smart.” Sen. Jeff FlakeJeffrey (Jeff) Lane FlakeArpaio considering running for former sheriff job after Trump pardon Overnight Energy: Warren edges past Sanders in poll of climate-focused voters | Carbon tax shows new signs of life | Greens fuming at Trump plans for development at Bears Ears monument Carbon tax shows new signs of life in Congress MORE (R-Ariz.), a member of the Senate Foreign Relations Committee and a Trump critic, said he wouldn’t have made those kinds of remarks. Trump called into the weekly Senate Republican lunch on Tuesday to tout the Singapore summit as he flew back to the United States aboard Air Force One. Republicans in the meeting said Trump sounded jubilant about what he touted as a successful meeting. Democrats, meanwhile, went on the attack Tuesday, condemning the president for legitimizing what they say is a brutal regime and for appearing too eager to strike a deal. Senate Democratic Leader Charles SchumerCharles (Chuck) Ellis SchumerJohnson eyes Irish border in Brexit negotiations Lewandowski on potential NH Senate run: If I run, 'I'm going to win' Appropriators warn White House against clawing back foreign aid MORE (N.Y.) blasted Trump for giving “a brutal and repressive dictatorship the international legitimacy it has long craved.” He also faulted Trump for rushing into a deal with Kim and failing to secure detailed objectives. “It is best not to dive in head-first and hope for the best but rather to work slowly, transparently and verifiably to build trust and lock in concessions,” Schumer warned on the Senate floor. He questioned the lack of detail on how to achieve a pathway to the denuclearization of the Korean Peninsula and on how to verify that North Korea has disarmed. House Democratic Leader Nancy PelosiNancy PelosiJohnson eyes Irish border in Brexit negotiations Mueller report fades from political conversation Five key players in Trump's trade battles MORE (Calif.) said Trump gave away too much and received little in return. “In his haste to reach an agreement, President Trump elevated North Korea to the level of the United States while preserving the regime’s status quo,” she said in statement. Pelosi added Trump only won “vague promises” from Kim and failed to lock down a “clear and comprehensive pathway to denuclearization and non-proliferation.” But while Republicans acknowledged that the Trump administration has a long way to go to negotiate an acceptable final deal with North Korea, many of them praised him for making the effort. Sen. Tom CottonThomas (Tom) Bryant CottonCotton warns China: Crackdown on Hong Kong would be 'grave miscalculation' Congress must address gender gap in nominations to military service academies GOP senators press Google on reports it developed a smart speaker with Huawei MORE (R-Ark.), an emerging influential voice on national security issues within the Senate GOP conference, said Trump must deal directly with North Korea because it’s a nuclear power. “It’s not something that we should celebrate. It’s not a pretty sight. But it’s a necessary part of the job to try to protect Americans from a terrible threat,” Cotton told conservative talk-show host Hugh Hewitt. Rep. Tom ReedThomas (Tom) W. ReedRepublicans' rendezvous with reality — their plan is to cut Social Security The Democratic plan for smaller paychecks House passes bill to update tax code to help same-sex married couples MORE (R-N.Y.) warned of dire consequences for North Korea if Kim proves to be negotiating in bad faith. “If Kim Jong-un throws away this opportunity, it will mean the military destruction of his country and his death,” he said in a statement. Republicans made clear Tuesday that they don’t want a repeat of former President Obama’s historic deal with Iran — another longtime U.S. enemy — which did not have to clear the high bar of winning supermajority approval in the Senate. Instead, the Senate voted on a resolution of disapproval on the Iran deal, which fell short of the 60 votes it needed. GOP lawmakers say they want any deal with North Korea to be considered as a treaty, which would require 67 votes to pass the Senate. “I think there would be widespread interest in Congress for having involvement. ... [If] the president can reach a significant agreement with North Korea, I hope it takes the form of a treaty,” McConnell told reporters after meeting with the GOP conference. Senate Foreign Relations Committee Chairman Bob CorkerRobert (Bob) Phillips CorkerTrump announces, endorses ambassador to Japan's Tennessee Senate bid Meet the key Senate player in GOP fight over Saudi Arabia Trump says he's 'very happy' some GOP senators have 'gone on to greener pastures' MORE (R-Tenn.) said that Secretary of State Mike PompeoMichael (Mike) Richard PompeoCotton warns China: Crackdown on Hong Kong would be 'grave miscalculation' Pompeo expresses concern over North Korea missile tests Pompeo acknowledges 'places where ISIS is more powerful today' MORE has indicated that the administration plans to send any future agreement to Capitol Hill for approval. “Yeah, assuming there is a final agreement, they’ve indicated that they would bring that agreement to us in the form of a treaty,” Corker said of the administration.   Obama negotiated the Iran deal as a commitment among nations to sidestep the need for congressional approval, which angered many GOP lawmakers at the time. “I think when you’re talking about something as profound as maybe ending a war that we’ve been in for about 70 years. ... I think it should take congressional action to solidify it,” said Sen. Thom TillisThomas (Thom) Roland TillisThe United States broken patent system is getting worse Gun reform groups to pressure GOP senators with rallies in all 50 states To cash in on innovation, remove market barriers for advanced energy technologies MORE (R-N.C.). Jordain Carney and Melanie Zanona contributed. View the discussion thread. The Hill 1625 K Street, NW Suite 900 Washington DC 20006 | 202-628-8500 tel | 202-628-8503 fax The contents of this site are ©2019 Capitol Hill Publishing Corp., a subsidiary of News Communications, Inc.
NEWS-MULTISOURCE
Enter search term: SAP Rapid Data Migration (Detailed Guide) Data migration, in essence, is a major task and quite important for the successful implementation of your system. There are a fair few ways to do it, and among them, one of the most common methods is – SAP Rapid Data Migration. Why do people choose it, though? According to SAP, this type of migration can enable you to migrate your data efficiently and, as the name suggests, rapidly. Besides, it’s a much more secure option than the rest. Thus, the information you are thinking about moving can be trusted by everyone else. Also, rapid data migration-bound projects are relevant for every organization. However, it’ll be a little difficult for people to plan the whole structure of it properly. Usually, when it comes to planning for the migration, it can be done through three steps. These will include the following – • Profile the data and extract it from the source system. • Map whatever information you’ve found to the target data structure. • Assess and validate the data against whatever target business context you are using.  • Load the information into the target SAP system. • Reconcile it between the source system and the target SAP system. • Repeat the whole process iteratively until whatever information you have is ready. Anyway, before we discuss that, let’s learn a little more about the architecture of the system or migration procedure first. The Architecture of SAP Rapid Data Migration The architecture of SAP Rapid Data Migration usually features six different stages. Here’s what you need to know about it – 1: The Target and the Source System Firstly, take a look at the legacy data environment and the target environment. Here, you’ll find the target applications and the source collectively. While you are using this form of migration, the environment you should use will be an SAP-based application. This certain environment will include a rapid-development solution for the DM package. A legacy environment, on the other hand, can be any kind of non-SAP environment as a whole. Examples of these may include the following – • Flat files, • Databases, • Legacy applications, or • XML. 2: Profile and Extract The staging area of the architecture is offered by using Data Services. In this staging segment, you will need to profile data from your source system and extract them accordingly.  The profiling of the information is, in essence, a critical step, as it provides insights into the existing source system’s current state. An example of crucial details that you may keep an eye out for is the patterns across data. For instance, ZIP codes are used in five digits in the USA with an optional code with four digits. A thorough data evaluation will determine the number of unique ZIP codes you have and how frequently the +4 extension is being used through your source systems. 3: Cleanse, Transform, and Validate This step will include updating the data so that it meets all the specific patterns. Once you have done it, you will need to transform the data in accordance with the rules and validate it against the business context of SAP. It might involve combining two different fields into one and splitting it, and updating the data accordingly in the required fields. If you have done everything else, all you need to do is validate the data against the fields while looking for values from the business context and configuration of SAP. 4: SAP Configuration Extraction As a part of an SAP integration procedure, SAP has to be configured with different values or data, such as plants, groups, material types, etc. Mapping the source information for the same will require you to map the fields that comply with your SAP configuration. The extraction of SAP configuration data will take the settings within the SAP system so that the data can conform with the needed format within the source target. 5: Reconciliation, Reporting, and Dashboards The reconciliation stage usually focuses on what was loaded within the system versus what is expected to be loaded within it. Once it’s done, we’ll enter the phase of reporting.  Throughout the entire procedure, the dashboard will be available for people who want to get involved in or with the project to learn about the migration status. The data for it can be found through the reporting phase. Additionally, the migration will start the process of assessing the data quality governance and expectations around data management. Data Migration Content – How to Get Started? The rapid data migration procedure generally goes through several steps accordingly. We have offered a little bit of information regarding the same in this section. So, let’s have a look. • Step – 1: Click on this link to read an overview of the migration tool package and get it downloaded on your system. Optionally, you can also review the entire presentation of the summary and watch demos accordingly. Also, if you want, you can download a DVD file from the SDC (Software Download Center) if you don’t have the tool.  • Step – 2: Once you have completed the downloading procedure, you should consider exploring the content you have and accessing the getting started guides too. • Step – 3: At this point, you will have enough key guides and content to begin planning the migration. The content probably has Excel templates and Word documents to be used in your case too. You can use them to understand your objective properly. When you consider installing the software, you will get a temporary key from it. However, if you already have had your Data Services installed, you may want to begin by going through a tutorial that offers information about it. In any case, once you have installed everything, you can see a specific project known as – “AIO_BPFDM_IDOC” … that exists within Data Services. This project will have jobs for each business object, such as material master data or customer master data. Final Thoughts SAP Rapid Data Migration is a new procedure that has been implemented pretty recently. So, we couldn’t offer more information regarding the same yet. However, as we get more data, we will keep updating our article accordingly. In any case, if you want to know more, don’t forget to comment below. We’ll try our best to reply to you as soon as we can.
ESSENTIALAI-STEM
Tendonitis means inflammation of a tendon. Although the word “Tendonitis” is often used, it is actually an out-dated term. The suffix “itis” means inflammation, however, research has shown that it is really a build up of scar tissue and break down of collagen that is the problem, not inflammation. Therefore, the newer term that replaces tendonitis is “Tendinosis”, which denotes the scar tissue accumulation, and cellular changes to the tissue. pateller tendon - Copy Patellar tendinosis, or “jumper’s knee”, is a relatively common condition in patients who engage in sports that involve explosive lower-limb movements. The patellar tendon attaches the bottom of the kneecap to the top of the shin bone. Pain associated with this condition is located just below the kneecap. Initially, the pain occurs only after activity. As the condition progresses the pain occurs during the activity and then even at rest. Jumper’s knee may also e viewed as a spectrum that ranges from initial overuse inflammatory changes to chronic degenerative breakdown. In the last stage of this condition the patellar ligament completely ruptures. Prior damage to the knee from repetitive overuse or trauma, biomechanical factors, and the forces inherent in landing from a jump probably contribute to tendon fatigue and patellar tendon rupture. Treatment goals: • Breaking down scar tissue with Targeted Soft Tissue Therapy • Strengthening the weak muscles with Physiotherapy and/or Functional Rehabilitation • Correcting biomechanical imbalances (over-pronation) with Orthotics and/or proper shoe selection • Modifying the training program to allow proper rest and repair to the patellar tendon
ESSENTIALAI-STEM
Author:Richard Johns Works * Poems (1825) * "A Little Bit of Tape" in Bentley's Miscellany, Vol. I, No. 3, March 1837 * Legends and Romances: African and European (1839) * "The Mystic Habitation of the Soul" in Friendship's Offering and Winter's Wreath (1839) * The Schoolfellows or a By-Way to Fame (1841) * The Calendar of Victory (1855)
WIKI
User:Swinsl Hello. I'm Swinsl, Twitch streamer and GameCube/N64 Archivist. I am making several projects right now, including the following: • An Ura Zelda / Project BetaTriforce restoration project • A Rom hack for Super Mario 64 • Several articles here on Wikipedia • A Homebrew application for the Wii (FPShower, an application that shows your FPS and some other stats in some games) VARIOUS LINKS Twitch:https://www.twitch.tv/swinsl FPShower:[WIP]
WIKI
Four proven health benefits of massage How ready are you to ski or snowboard? January 12, 2021 Massage has been used for thousands of years to help relieve the body’s aches and pains, and we believe you should make massage a regular part of your life. We all have little niggles from time to time. Whether it’s sore leg muscles from working out in the gym or sore muscles in the neck from sustained poor posture while sitting at work. Tight muscles can be sore just on their own or they can refer to other areas of the body, such as tight neck muscles causing a headache. But muscle tightness can have more subtle effects, such as affecting the way you walk, the way you run or the way you swing a golf club. Altered body mechanics in everyday activities are less efficient, making you tire more easily, and can lead to greater stress placed on other areas of the body – leading to all manner of injuries and chronic, painful conditions. More than just a quick rub on the shoulders, a professional massage therapist, such as PhysioTrain’s experienced massage therapists, will take a full history, and assess your body to determine the areas that will respond best to massage. Once considered a luxury, massage has been proven time and time again to be vital to any injury prevention or personal wellness program. Here’s four scientifically-proven health benefits of massage. 1. Massage as a form or relaxation Your phone is turned off. Nobody can contact you for the next hour.  Having a 60 minute massage is an opportunity to slow your breathing and pay attention to your body.  A study showed a measurable decrease in the stress hormone Cortisol in people who received a deep tissue massage. 2. Reduce inflammation  A study found that massage works to ease sore muscles after a tough workout. Just 10 minutes can reduce inflammation, which can help your body recover. 3. Improves sleep If you’ve ever fallen asleep while getting a massage, you probably don’t need to be coaxed into believing massage can promote healthy sleep.  Numerous studies (see footnote) have shown that massage has a positive effect on delta waves, the kind of brain waves connected to deep sleep. 4. Reduces headaches  A study found that a 30-minute massage decreased pain for people with tension headaches, and even curbed some of the stress and anger associated with that pounding head. Tips for self management Your massage therapist will be able to identify problem areas and often give you some homework to do in between sessions. Having a couple of simple stretches or strength exercises to work on can be a great addition to your day.   Troubleshooting Little niggles may not be significant enough on their own to seek out professional help, but when you have a regular appointment you can bring up these small problems and deal with them before they become a chronic problem. Footnote: Field, T., Hernandes-Reif, M., Diego, M., Fraser, M. (2007). Lower back pain and sleep disturbance are reduced following massage therapy. Journal of Bodywork and Movement Therapies, 11(2) 141-145.
ESSENTIALAI-STEM
15 Terms Everyone in the website to automatically sync to iOS app Industry Should Know From Wiki Fusion Revision as of 13:24, 15 November 2021 by E7rjxtn739 (talk | contribs) (Created page with "It is possible to transfer your website's information to an iOS application. It involves installing the website on the device, such as a Mac, or PC, and then moving all data t...") (diff) ← Older revision | Latest revision (diff) | Newer revision → (diff) Jump to: navigation, search It is possible to transfer your website's information to an iOS application. It involves installing the website on the device, such as a Mac, or PC, and then moving all data to the phone. This article will guide you on how to get it done quickly and efficiently. When you've completed reading this article you'll know how to sync automatically to the iOS app. Here are some suggestions and tricks to help you transfer your website's information to an iOS app. It is essential that your server is compatible with both iOS and Mac OS X. There are numerous websites servers that web hosting companies can use for Mac as well as Windows. A well-known open source CMS called Joomla is used by many users today due to its ease-of-use and flexible website to automatically features. First, install Joomla. After that, you need to create an account. After you have created a Joomla account, your website website to automatically sync to iOS app is able to sync automatically with iOS. For example, if you have set up your iOS app site to automatically sync with the iOS app, the site will be opened on the device by the user who is executing the correct URL. For instance, to set your website up to automatically sync on iOS application, enter the URL for the page in iTunes and click the "Open icon. The URL will be copied to the clipboard and display directly on the iPhone. The website will open on your device after the user taps and presses the "Open” button. The same happens whenever the user taps on the Joomla's "lisha". There are many different ways to sync your website and iOS app. These are the most basic. It is recommended that you understand and master the entire process before attempting to do so. Although the process is simple however, it can be difficult if you're not familiar with it. Also, there are many tutorials on the web which would help you to create a website that can automatically sync with the iOS application. Once you've mastered how to do it, you are able to configure your website to connect to multiple devices. Push email is another way to sync website and iOS app. The website can be set to sync to your email client in the event that the user has already setup email auto-mail on an iPhone/iPad. To make this process easier it is necessary to include the URL to the webpage that the user wants to send an email. The user doesn't have to go to the site to setup the auto-mail feature. It can be done online in seconds. Not to be left out the website offers the option of synchronizing the iOS app. To use this feature, the user has to allow the website to sync on his/her iPhone/iPad. The website will be able to sync with the device when you follow these steps. The first step is that the user must go to the Settings section of his/her iPhone or iPad and select "Allow iPod syncing" in the section. After that, tap the plus icon within the iTunes App. This will display the URL of the website from which you would like to connect to your device. The hard part is over! Now, you can navigate to the site you wish to link to iOS.
ESSENTIALAI-STEM
Just How is Diabetes Diagnosed: Understanding the Refine Diabetes is a persistent condition that affects countless individuals worldwide. It is characterized by high blood glucose levels, which can lead to various health difficulties if left unmanaged. Early medical diagnosis as well as intervention are important for effectively taking care of diabetes and also decreasing its impact on an individual’s health and wellness. In this short article, we will certainly discover the process of identifying diabetes, including the different tests and criteria made use of by healthcare specialists. Detecting Diabetes: Key Factors as well as Symptoms Diabetic issues is identified based on numerous essential elements, consisting of symptoms, blood sugar level degrees, and the presence of threat elements. The most usual symptoms associated with diabetes include boosted thirst, constant urination, unusual weight reduction, tiredness, blurred vision, and slow recovery of injuries. If you experience any one of these signs and symptoms, it is necessary to get in touch with a medical care specialist for further evaluation. Additionally, healthcare professionals think about the visibility of threat variables when detecting diabetes mellitus. These threat variables include being overweight or obese, having an inactive way of living, having a family members history of diabetic issues, being over the age of 45, as well as coming from specific ethnic groups, such as African, Hispanic, or Eastern descent. If you have any of these danger elements, your doctor may recommend diabetes testing even in the lack of signs and symptoms. The procedure bionica opiniones of identifying diabetic issues normally involves a number of examinations, consisting of a fasting plasma glucose (FPG) examination, a dental sugar resistance test (OGTT), and a glycosylated hemoglobin (A1C) examination. • 1. Fasting Plasma Sugar (FPG) Test: The FPG test is a straightforward blood examination that determines your blood sugar levels after a duration of fasting. It is usually carried out in the morning after an over night rapid of at the very least 8 hours. A blood example is taken, and a laboratory examines the sugar level. A fasting plasma glucose level of 126 milligrams per deciliter (mg/dL) or greater on 2 separate events commonly shows diabetes mellitus. • 2. Oral Sugar Resistance Examination (OGTT): The OGTT determines just how your body procedures sugar over time. Before the test, you will certainly be asked to quick overnight. At the beginning of the test, your blood glucose degree will certainly be gauged. After that, you will eat a sugary drink including a details amount of glucose. After two hours, your blood glucose degree will be examined once more. A blood sugar level of 200 mg/dL or higher two hrs after taking in the glucose beverage is typically a sign of diabetic issues. • 3. Glycosylated Hemoglobin (A1C) Examination: The A1C examination offers an ordinary blood sugar level level over the previous a couple of months. Unlike the FPG and OGTT examinations, the A1C examination does not require fasting. Instead, a blood example is taken any time of the day. The outcomes are reported as a percent of hemoglobin that is glycated. An A1C level of 6.5% or higher on 2 separate tests usually suggests diabetes. Interpreting the Results and Comprehending Prediabetes If the outcomes of any of the above examinations show high blood sugar level degrees, additionally examination is required to verify a diabetes medical diagnosis. Sometimes, medical care professionals may duplicate the test on a various day to make certain accuracy. It is worth pointing out that there is a condition called prediabetes, which is defined by blood sugar degrees that are higher than regular yet not yet high enough to be classified as diabetes mellitus. Prediabetes is an essential warning sign that a person is at high risk of developing kind 2 diabetes in the future. The standards for diagnosing prediabetes consist of an A1C degree in between 5.7% as well as 6.4%, an FPG degree between 100 mg/dL as well as 125 mg/dL, or an OGTT result between 140 mg/dL as well as 199 mg/dL. Conclusion Diabetes is an intricate condition that requires cautious medical diagnosis as well as administration. The procedure of detecting diabetes entails considering symptoms, danger elements, and also carrying out various blood examinations to figure out blood sugar degrees. Early medical diagnosis is vital for prompt treatment and also reliable management of diabetic issues. If you experience any signs or have any type of risk aspects, it is important to seek advice from a medical care expert for appropriate analysis as well as screening. Keep in mind, prompt medical diagnosis as well as appropriate monitoring can considerably boost the lifestyle for people dealing with diabetes. Laisser un commentaire
ESSENTIALAI-STEM
The Best Way to Do Lunges Without Hurting Your Knees Fact Checked Milan Stojanovic/iStock/Getty Images Done correctly, lunges effectively work your abs, butt, and thighs. However, done incorrectly they can aggravate and even injure your knees. Proper form can protect your knees and the rest of your body from aches and pains and even from serious injury. Prior to doing any lunges, check with your doctor to make sure they are safe for you. Starting Position The first step to safe lunges is a proper starting position. Stand with your feet about hip-width apart and both toes pointing forward. You should have a slight bend to both of your knees. Pull your abdominal muscles in toward your spine to protect your back muscles and to avoid putting too much weight on your knees. Hold your abs in the entire time you are performing lunges. Relax your shoulders by imagining your shoulder blades gliding down your back toward your hips. Dangle your hands at your sides. To initiate your lunge, take a big step forward. Your front heel should hit the ground first, followed by your toe so your entire front foot is flat on the ground. When your front foot lands, your legs should be wide enough apart that you can keep both legs at 90-degree angles as you lunge down. Because your step was so big, you back heel will need to rise up off the ground as you lunge. Alignment Proper alignment of your entire body, but especially of your legs, is key to protecting your knees. As you lunge, your shoulders should be directly over your hips, and your hips should be directly over your back knee. Your torso should remain tall and straight, forming a continuous line with your back thigh. Do not lean forward as you lunge. After your first forward step, movement in a lunge is down and up. Minimize any forward motion during the downward and upward phases of your lunge. Knee Height The final way to protect your knees in lunges is by monitoring the height of your back knee. Your ultimate goal should be to get your back knee to just a few inches off the ground. Do not lower so far that your back knee touches the ground. As you lower your body to the ground, stop your descent if you feel any pain in either of your knees. While getting your knee almost all the way to the ground is your goal, you should not suffer knee pain to achieve that goal. ×
ESSENTIALAI-STEM
User:Magnus Arther Masters About Magnus Arther Masters is a professional freelance writer from the Dominican Republic, with expertise in the fields of travel, history, and geography pertaining to the Caribbean, specifically the island of La Hispaniola which is home to Haiti and the Dominican Republic.
WIKI
E-Handbook: Time to get prepared for IoT security issues Andrea Danti - Fotolia Tip With an IoT digital twin, security cannot be forgotten While digital twins can improve the security of IoT devices and processes, it is critical to consider the security of the twins themselves when implementing one. Any organization planning to use IoT should consider digital twins an essential technology, as they provide a bridge between the physical and digital worlds. In fact, everything points to a digital twin technology explosion. Research firm Gartner named the IoT digital twin in its top 10 strategic technology trends for the last two years, estimating that within three to five years, billions of things will be represented by digital twins. What is digital twin technology? Simply put, it's the virtual representation of a physical asset -- a virtual doppelganger of a thing that can help improve understanding, development and product lifecycle management. The history of the digital twin dates back to when NASA first started creating mirrored systems in the early days of space exploration that allowed engineers and astronauts to successfully work out how they could rescue the stricken Apollo 13 mission. Today, IoT digital twins are created to test and build all types of equipment in a virtual environment. Developers can run simulations and tests based on the data collected from physical, real-world IoT sensors, as well as model and monitor devices using artificial intelligence, machine learning and predictive analytics. Digital twins also reduce the security risks associated with IoT devices, as data and applications don't have to reside on the physical device, only in the cloud. For example, there's no need to deploy an expensive telematics unit to track a driver's behavior as the application can simply run in the cloud. Like everything in the world of IoT, data is the primary driver of the IoT digital twin, and it's the most valuable output of one. Like everything in the world of IoT, data is the primary driver of the IoT digital twin, and it's the most valuable output of one. As much of this data is sent to cloud-based systems for processing and analysis, IoT data security needs to be a top priority when deploying IoT and digital twins. History, however, has shown that security is often overlooked in new, fast-moving technologies, leading to valuable and sensitive data being lost and stolen. In the rush to take advantage of digital twin technology, it's important that enterprises take the time to secure data generated by IoT sensors and then stored and processed in the cloud -- just like any other data. While IoT data is less likely than many cloud application data to contain personally identifiable information, it is still highly probable that it will be data hackers will be willing to spend time and money trying to steal it. It is essential to ensure that only authenticated processes and users with the correct permissions can access IoT digital twin data. Roles should be created that manage access to specific digital twin resources and actions following the principle of least privilege to limit the role of each device, sensor and person. Data also needs to be encrypted while at rest and only transmitted over secure protocols. Both Microsoft Azure IoT and Device Shadow Service for AWS IoT provide security and identity tools to help manage access and authentication for IoT digital twins, as well as to facilitate tasks such as refreshing authentication credentials and keys on a regular basis. Those involved in IoT projects should be familiar with the security tools available and how best to use them. There's no doubt the IoT digital twin can transform products and services, as well as reduce development costs and operating and capital expenses. However, some of the cost savings and profits they generate have to be put back into ensuring they are properly secured. If they're not, then organizations will experience data breaches and attacks that can compromise proprietary technologies and affect critical infrastructure assets and services. Dig Deeper on Internet of Things (IoT) Security Strategy SearchCIO SearchSecurity SearchNetworking SearchDataCenter SearchDataManagement Close
ESSENTIALAI-STEM
3 Replies Latest reply on Jan 13, 2018 10:53 PM by roberttay RSS roberttay Apprentice Setting a remote property from the edge Reading up on the Edge SDK to try and understand the how the property aspects affect the behavior of data propagation from a VirtualThing on the edge to the RemoteThing in the Thingworx Platform on the server.   In general i understand the concept. Populate VirtualThing properties, then call updateSubscribedProperties() to tell the Edge SDK to push the property values up to the Thingworx Platform. I also understand that the property aspects pushType control when and if these property values actually get pushed.   Once the values are pushed to the Thingworx Platform, i understand that the cacheTime controls how the RemoteThing gets the update values.   Where i get confused is where exactly the values are stored. The documentation mentions that a cacheTime of 0 means that when the RemoteThing requests the value, it should request it from the property cache (as opposed to fetching it from the VirtualThing). Is the property cache a separate memory space from the property value? That is, does data always move from the edge to the property cache and then, when the RemoteThing requests the value, it moves the value from the cache to the property value memory space? What exactly happens here? • Re: Setting a remote property from the edge pchung Collaborator The platform has an in memory runtime model that will hold the latest property value assigned. A device can be pushing values into that. Depending what you set on the platform side. Always Read from Cache - it reads what is in memory Always Pull - it requests the latest known value from the Device Cached for # seconds - when the there is a platform side request of the value, if within cache it reads cache, else it will request from device.   Hope that helps. • Re: Setting a remote property from the edge Ravi Upadhyay Communicator Hi @Robert Taylor and Pai Chung , I am trying to explain this in little more detail , Please let me know if you find my answer useful. Synchronization of a remote VirtualThing with the ThingWorx server simplifies the data delivery process. You could make these updates on your own by directly calling a server RemoteThing over your SDK connection. However, the advantage of using a VirtualThing is that it introduces a cache between your remote data and its analog RemoteThing on the server. This cache allows you to efficiently manage requests between the server and your remote VirtualThing, preventing the server from making too many requests to your remote process. In addition, the cache allows you to easily bind the values in the cache to specific properties on a server RemoteThing.   This process of binding remote data to properties of a server RemoteThing allows you to compose server RemoteThings from the properties of multiple remote VirtualThings, enabling multiple remote devices or machines to contribute to the properties of a single RemoteThing on the server.   One remote device or machine could contribute data collected from a real sensor and push it to the server. The server could then notify a remote application that data had changed. That remote application could update itself and then contribute additional properties back to the server, based on its own calculations When it receives sensor data, a VirtualThing posts this data to the server cache.   RemoteThing on the server is bound to this property. This RemoteThing subscribes to changes in this property value. When this value changes, the subscription function is called. This subscription function notifies a VirtualThing in a remote application that new data is available.   This update could also be done using bindings since they can also trigger code within the remote machine. The result from the ThingWorx server perspective is that there is a single RemoteThing, whose state (its properties) is updated from multiple sources but appears to be a single entity as far as its use in mashups is concerned. At the same time, it is providing a real-time, synchronized copy of its state that you can then use to manipulate the RemoteThing.     ThankYou Ravi Upadhyay
ESSENTIALAI-STEM
User:Hippobunnyboy RANDOM STORIES: Today I was walking down the street when I saw a turtle I went up to the turtle and said “hello poop face.” He did not like that very much so he farted on me. I told him “that is not acceptable.” Then I picked him up and threw him it made me very happy so I walked along minding my own beeswax when a piece of doozy doo doo hit me in the face I saw the dog who did it and said “how rude!” The dog seemed very angry so he summoned an army of snails. “Ha ha ha those snails can’t catch me!” But five seconds later I found a wooden plank on a path to my face. I’m on the other one and mike is at work so he is not sure what’s up and mike is not sure what’s up or you gotta I was just wondering what I was thinking and I saw that I was texting and I gotta go to the movie I was just going bye
WIKI
User:Kloegirl Hey!!!! i am totally new to this website. Although it has already helped me!! So of you guys could give me a couple of pointers that would be awesome!!!! -kloe
WIKI
A Breath of Fresh Air: Lemon Essential Oil Takes On Halitosis Views 1979 In a twist that's sure to leave halitosis sufferers breathless (in a good way), new research suggests that the secret to fresher breath might be hiding in your fruit bowl. A recent study has found that lemon essential oil could be a powerful weapon in the fight against bad breath, potentially outperforming some traditional mouthwashes. Bad breath, medically known as halitosis, is more than just a social faux pas - it can be a source of significant embarrassment and anxiety for those affected. While the drugstore shelves are stocked with an array of minty fresh solutions, a study published in Oral Diseases in 2023 suggests that nature might offer a more zesty answer: lemon essential oil (LEO). The Stench of the Situation: Understanding Halitosis Halitosis affects millions worldwide, often stemming from oral bacteria that produce volatile sulfur compounds (VSCs). These VSCs are the primary culprits behind the unpleasant odor associated with bad breath. As Li Ma and colleagues note in their study, "Halitosis is a common oral health problem that can cause social and psychological discomfort."1 Common causes of halitosis include: Conventional Approaches to Halitosis Management Traditional treatments for halitosis typically involve: 1. Antimicrobial mouthwashes: Containing ingredients like chlorhexidine (CHX), cetylpyridinium chloride (CPC), or hydrogen peroxide (H2O2) 2. Mechanical cleaning: Tongue scraping and interdental cleaning 3. Saliva stimulants: To combat dry mouth 4. Masking agents: Temporary solutions like mints or gums While these methods can be effective, they often come with drawbacks. For instance, chlorhexidine can cause tooth staining with prolonged use, while alcohol-based mouthwashes may exacerbate dry mouth. A Citrusy Solution: Lemon Essential Oil in Halitosis Treatment Lemon essential oil, derived from the peel of Citrus limon, has long been valued for its refreshing scent and potential antimicrobial properties. The recent study by Ma et al. sought to evaluate its efficacy in combating halitosis. The Study: Putting Lemon to the Test Researchers conducted a two-part study to assess the effects of lemon essential oil on salivary bacteria and VSC production: 1. In vitro study: Saliva samples from five halitosis patients were treated with varying concentrations of LEO to measure its impact on bacterial growth, biofilm formation, and VSC production. 2. Clinical trial: 48 volunteers were randomly divided into four groups, gargling with either LEO, CPC, CHX, or H2O2. VSC levels and pH values were measured at intervals up to 120 minutes post-rinse. Key Findings: When Life Gives You Lemons, Use Them for Fresh Breath The results of the study were remarkably positive for lemon essential oil: 1. In vitro results: "Compared with the negative control group, under subinhibitory concentrations of LEO (0.563-2.25 mg/ml), the biofilm formation and VSC production of salivary bacteria in LEO group were significantly inhibited (p < 0.05)."1 2. Clinical trial results: "Compared with the baseline, the VSC production of subjects decreased after rinsing with the LEO in 60 min (p < 0.05). After gargling with LEO, the pH value rose significantly in 30 min and reverted to the baseline level at 120 min (p < 0.05)."1 In layman's terms, lemon essential oil not only inhibited the growth of odor-causing bacteria but also reduced the production of smelly compounds in real-world use. The Zesty Implication: Nature's Mouthwash Proves Its Worth The finding that lemon essential oil can effectively combat halitosis is significant for several reasons: 1. Natural alternative: It offers a plant-based option for those seeking alternatives to chemical mouthwashes. 2. Dual action: LEO appears to both inhibit bacterial growth and neutralize odor-causing compounds. 3. Temporary pH change: The brief increase in oral pH may create an environment less favorable for odor-producing bacteria. As the study authors conclude, "Lemon essential oil can inhibit the growth of salivary bacteria and reduce VSC production of patients with halitosis."1 The Science Behind the Scent While the exact mechanisms of LEO's anti-halitosis effects are still being explored, several theories have been proposed: 1. Antimicrobial action: Compounds in lemon oil may directly inhibit the growth of odor-causing bacteria. 2. Biofilm disruption: LEO appears to interfere with the formation of bacterial biofilms, which can harbor odor-producing microorganisms. 3. Chemical neutralization: Certain components of lemon oil may react with and neutralize VSCs. Dr. Ma and colleagues suggest that "The main component of lemon essential oil, limonene, may be responsible for its antimicrobial and anti-biofilm effects."1 Practical Implications: Bringing Lemon Essential Oil to Your Oral Care Routine The findings of this study have several practical implications for those struggling with halitosis: 1. Natural breath freshener: LEO could serve as a natural alternative or complement to traditional mouthwashes. 2. Potential for long-term use: Unlike some antimicrobial agents, LEO may be suitable for extended use without significant side effects. 3. Dual benefits: The pleasant scent of lemon oil may provide an immediate masking effect while also addressing the underlying causes of bad breath. As one study participant remarked, "I was surprised by how refreshing the lemon oil rinse felt. My breath felt cleaner for hours afterward, without that harsh, medicinal taste you get with some mouthwashes." Limitations and Future Directions While the results of this study are promising, it's important to note some limitations: • Small sample size: Larger studies are needed to confirm these findings. • Short-term effects: The study focused on immediate and short-term effects; long-term efficacy needs further investigation. • Potential sensitivities: Some individuals may be sensitive to essential oils. Future research should explore: 1. Optimal concentrations and delivery methods for LEO in oral care products 2. Potential synergistic effects of combining LEO with other natural or conventional oral care ingredients 3. Long-term safety and efficacy of LEO use for halitosis management Conclusion: A Citrus-Scented Future for Fresh Breath The discovery that lemon essential oil can effectively combat halitosis marks an exciting development in the field of oral care. It offers a natural, pleasant-smelling alternative to traditional mouthwashes and opens up new possibilities for those seeking fresher breath. As we continue to explore the potential of natural compounds in healthcare, the humble lemon serves as a fragrant reminder that sometimes, the most effective solutions can be found in nature's own pharmacy. In the words of the study authors, "This study highlights the potential of lemon essential oil as a simple, effective, and natural intervention for halitosis management."1 The next time you're reaching for a breath mint, consider reaching for a bottle of lemon essential oil instead. Your breath - and your taste buds - might thank you for it. Learn more about natural ways to treat halitosis here. Learn more about the therapeutic value of lemon here. References 1. Ma, Li, Chenyu Pang, Changqing Yan, Jing Chen, Xiaoyu Wang, Jin Hui, Li Zhou, and Xiangyu Zhang. "Effect of Lemon Essential Oil on Halitosis." Oral Diseases 29, no. 4 (2023): 1845-1854. https://doi.org/10.1111/odi.14140. 2. Fedorowicz, Zbys, Mona Nasser, Priya Sequeira-Byron, Raphael Freitas de Souza, Ben Carter, and Jan E. Heft. "Mouthrinses for the Treatment of Halitosis." Cochrane Database of Systematic Reviews 5 (2008). https://doi.org/10.1002/14651858.CD006701.pub2. 3. Bollen, Curd ML, and Thomas Beikler. "Halitosis: The Multidisciplinary Approach." International Journal of Oral Science 4, no. 2 (2012): 55-63. https://www.nature.com/articles/ijos201239. 4. Settineri, Salvatore, Carmela Mento, Simona C. Gugliotta, Ambra Saitta, Antonella Terranova, Giuseppe Trimarchi, and Domenico Mallamace. "Self-Reported Halitosis and Emotional State: Impact on Oral Conditions and Treatments." Health and Quality of Life Outcomes 8, no. 1 (2010): 34. https://hqlo.biomedcentral.com/articles/10.1186/1477-7525-8-34. 5. Aylıkcı, Bahadır Uğur, and Hakan Çolak. "Halitosis: From Diagnosis to Management." Journal of Natural Science, Biology, and Medicine 4, no. 1 (2013): 14. https://www.ncbi.nlm.nih.gov/pmc/articles/PMC3633265/. Disclaimer: This article is not intended to provide medical advice, diagnosis or treatment. Views expressed here do not necessarily reflect those of GreenMedInfo or its staff. Key Research Topics This website is for information purposes only. By providing the information contained herein we are not diagnosing, treating, curing, mitigating, or preventing any type of disease or medical condition. Before beginning any type of natural, integrative or conventional treatment regimen, it is advisable to seek the advice of a licensed healthcare professional. © Copyright 2008-2024 GreenMedInfo.com, Journal Articles copyright of original owners, MeSH copyright NLM.
ESSENTIALAI-STEM
In the world of databases, joins play a crucial role in retrieving and combining data from multiple tables. A join operation allows you to query data by establishing relationships between tables based on common columns. It enables you to fetch meaningful information by leveraging the power of relational databases. In this article, we will explore the concept of joins in databases and understand their various types and applications. A join operation combines rows from two or more tables into a single result set based on a related column between them. The related column, often called a join column, acts as a bridge that connects the tables. By using joins, you can extract specific information by matching values in these join columns, thereby uncovering valuable insights from the data. Types of Joins in Database There are different types of joins that cater to various scenarios. Let’s discuss some of the commonly used join types: 1. Inner Join: An inner join returns only the rows that have matching values in both tables involved in the join. It discards unmatched rows from both tables, resulting in a new table that contains only the combined data where the join condition is satisfied. 2. Left Join: A left join, also known as a left outer join, returns all the rows from the left table and the matched rows from the right table. If there are no matching rows in the right table, null values are included for the columns of the right table. 3. Right Join: A right join, also known as a right outer join, is the opposite of a left join. It returns all the rows from the right table and the matched rows from the left table. If there are no matching rows in the left table, null values are included for the columns of the left table. 4. Full Join: A full join, also known as a full outer join, combines the results of both the left and right joins. It returns all the rows from both tables, matching rows where the join condition is satisfied, and including null values for non-matching rows. 5. Cross Join: A cross join, also called a Cartesian join, produces the Cartesian product of the two tables involved. It combines each row from the first table with every row from the second table, resulting in a new table with all possible combinations. 6. Self Join: A self-join is a special type of join where a table is joined with itself. It is useful when you want to compare rows within the same table based on a related column. In self-joins, you use table aliases to differentiate between the copies of the table. Joins provide a powerful mechanism for querying and analyzing data in relational databases. They enable you to break down complex problems into smaller, more manageable tasks by splitting data across multiple tables. Joins also help maintain data integrity by enforcing relationships between tables through foreign key constraints. While joins offer immense flexibility, they can impact query performance if not used judiciously. As the size of the tables and the complexity of the join conditions increase, the query execution time can significantly slow down. It is crucial to optimize queries by choosing the appropriate join type, indexing relevant columns, and structuring the database schema efficiently. Conclusion In conclusion, joins are an integral part of working with databases. They allow you to combine data from multiple tables based on related columns, facilitating the extraction of meaningful insights. Understanding the different types of joins and their applications is crucial for efficient database management and querying. By leveraging the power of joins, you can harness the full potential of relational databases and unlock valuable information hidden within the data. 0 Comments Leave a Reply Avatar placeholder Your email address will not be published. Required fields are marked *
ESSENTIALAI-STEM
What’s on Sunday Night 8 P.M. (MTV) 2007 MTV MOVIE AWARDS Sarah Silverman, left, is host of this year’s ceremony, with duties ranging from frisking patrons at the door to serving popcorn — the Golden Bucket variety. Awards, presented live at the Gibson Amphitheater in Universal City, include breakthrough performance and “best” in categories like villain, performance, comedic performance, kiss, fight and summer movie you haven’t seen yet. Jessica Alba, Victoria Beckham, Jessica Biel, Cameron Diaz, Zac Efron, Ioan Gruffudd, Samuel L. Jackson Mandy Moore and Bruce Willis are among the presenters. Amy Winehouse, Rihanna and Jay-Z will perform. Viewers will choose best movie spoof from among hundreds of amateur film clips at mtvmovieawards.yahoo.com.
NEWS-MULTISOURCE
Skip to content Science, Maths & Technology Hand warmers Updated Tuesday 27th February 2007 Information on how to make hand warmers, one of the scientists' challenges on the BBC/OU series Rough Science 3 Mike Leahy and Jonathan Hare Copyrighted image Icon Copyright: Production team Challenge To make a safe, portable form of heating to take to the rest of the team working up on the glacier.   Exothermic and endothermic chemical reactions When a chemical reaction takes place, chemical bonds in the reactants are broken and new bonds are formed. Depending on the nature of the bonds involved, a reaction will either release energy to, or absorb energy from, the surroundings, as heat. When a process releases energy to the surroundings it’s called exothermic (from the Greek thermo meaning heat, and exo meaning outside). The most obvious effect of an exothermic chemical reaction is generally a rise in the temperature of the reaction mixture. However, some processes absorb heat energy from the surroundings in which case they’re called endothermic reactions (endo in Greek, means within). The effect of an endothermic chemical reaction is generally a fall in the temperature of the reaction mixture. All combustion reactions (e.g burning of coal) are exothermic. Incredibly, the reaction between iron and moist air to produce rust is a very exothermic process that generates lots of heat. Unfortunately, this particular reaction takes place so slowly that the liberation of heat is undetectable. Pyrotechnics, explosives and fuels, on the other hand, all involve very fast and hugely exothermic chemical reactions. For our hand warmer, do we need to use an exothermic process or an endothermic one? To generate heat and release it to the surroundings, we need an exothermic process and one that’s suitable for use in a hot pack for warming the hands. What properties do you think are necessary for a suitable chemical reaction for use in a hand warmer? Well, the reaction must be portable and easily reproducible. It must generate and be able to maintain a temperature that’s neither too hot nor too cold. It must also be safe, and not involve the use of hazardous chemicals. We decided to try three different exothermic processes to see if any met the above criteria: Heat from cold wood ashes Slaking lime The thermit(e) reaction. Heat from cold wood ashes The first ‘reaction’ that we tried for our hand warmer involved dissolving potassium carbonate (K2CO3) in water. Potassium carbonate is one of the chemicals left behind in the ashes of burnt wood. You can extract it from the ashes by boiling them in water and filtering off any undissolved solids. The potassium carbonate dissolves in the water, along with some other salts. Reducing the aqueous solution down by evaporating off much of the water, followed by filtering, will leave a clear solution containing predominantly potassium carbonate. If you evaporate off nearly all the water, solid potassium carbonate will eventually fall out of solution as it becomes increasingly concentrated. It can then be filtered off and dried. When we dissolved our dry, solid potassium carbonate in water, a temperature rise of only a few degrees Celsius occured . The process wasn’t therefore suitable for our purposes. We considered alternatives involving a chemical reaction of some sort. Although dissolving potassium carbonate (K2CO3) in water is an exothermic process, it isn’t a chemical reaction, because no chemical bonds are broken or formed as it takes place. But it generates heat, so can be described as exothermic. Slaking lime The second exothermic process we tried for our hand warmer involved the ‘slaking’ of quicklime, which involves a chemical reaction or two.. We took ordinary chalk (calcium carbonate, CaCO3) and heated it to between 1 200 and 1 400 ºC. At these temperatures, the calcium carbonate releases carbon dioxide gas (CO2) and is converted into quicklime (calcium oxide, CaO). When you add water to the quicklime, a process called ‘slaking’, a vigorous reaction takes place, and lots of heat is generated. The product of the reaction is a compound called ‘slaked’ lime (calcium hydroxide, Ca(OH)2). Although aqueous solutions of 'slaked' lime are alkaline, its solubility in water is so low that the solution would not represent a caustic hazard in a hand warmer. Given the right amount of lime, the amount of heat generated would be suitable for our purposes. The reaction’s also portable and easily reproducible. But let’s try one more exothermic reaction. The thermit(e) reaction The third process we tried was a chemical reaction called the thermit reaction (sometimes spelt thermite). This is a vigorous and highly exothermic reaction, which was used in the past to weld railway lines together. We managed to generate enough heat in our thermit reaction to weld two pieces of steel plate. The temperature generated by the reaction must therefore have been higher than 1 600 ºC. The thermit reaction involves the reduction (Originally, reduction involved the chemical removal of oxygen from, or the addition of hydrogen to, a compound. Reduction is more accurately defined as a process in which atoms, molecules or ions gain electrons) of certain metal oxides by aluminium (Al) powder. We got our aluminium powder by filing down old drinks cans. We chose to use iron(III) oxide, or Fe2O3, known more commonly as rust. We got ours off an old corrugated iron shed at the sawmill. When we mixed our aluminium powder and rust in the right proportions, and kick-started the reaction, a glowing mass of molten iron was formed, along with an amazing amount of heat and light. This was a little too vigorous a reaction to be used in making hand warmers so instead we decided to stick to the slaking of lime. Making your own hand warmer The best reaction for use in our hand warmers was the ‘slaking’ of lime. It generated enough heat for our purposes, and involved chemicals (water, calcium oxide and calcium hydroxide) that are comparatively safe, and readily available., The reaction’s also portable and easily reproducible. TO MAKE YOUR OWN HAND WARMER YOU WILL NEED 2 sealable polythene bags (approx. 10cm × 10cm) 14g powdered lime (calcium oxide) 10cm3 of tap water teaspoon plastic pipette or eye dropper bucket of cold water Before you try the following experiment, make sure that you are wearing protective glasses nd latex or rubber gloves. Do NOT handle these chemicals with your bare hands. Don’t use a Nylon garment. NOTE: Be careful: when mixing the contents you may find they become so hot, they may cause serious burns. Take a small, self-sealing polythene bag and place it inside another bag of the same type and size. Using the teaspoon, carefully add 14g of powdered lime to the inner bag, and use the pipette or eye-dropper to add about 10cm3 of tap water to it. Seal up both bags securely, and mix the contents together by carefully manipulating the powder and the water with your fingers. After a few seconds, you will notice that the temperature of the hand warmer starts to rise dramatically. When we took our ‘slaked’-lime hand warmers to the rest of the Team on the Franz Josef Glacier, we found that so much heat was generated by them that some of the plastic bags actually melted. If this happens when you try the experiment, drop the bags into a bucket of cold water and dispose of the resulting solution by flushing it down the toilet. Be sure to wash your hands immediately and thoroughly in plenty of cold running water.   For further information, take a look at our frequently asked questions which may give you the support you need. Have a question?
ESSENTIALAI-STEM
As nutrition goes, protein gets a lot of attention for its key role in popular diet trends. After all, adult men need at least 56 grams, while adult women need 46 grams. Protein offers your body unique benefits that help you look and feel better, but a deficiency can lead to hair and nail problems, loss of muscle mass, and in kids, stunted growth. Protein is often associated with fish, beef, and eggs. But it is also prevalent in nuts, seeds, and legumes. Nutraceutical manufacturers use high-quality ingredients from these sources when creating protein powders for the supplement market, and the benefits they bring to consumers is well documented. Recover After a Workout and Build Lean Muscle Protein is one of the essential building blocks for the entire body, from bones and muscles to skin and hair. For years, studies have shown that protein supplements can increase muscle growth in all ages and genders, making them the preferred supplement for athletes. Nutritionists, dieticians, and doctors alike recommend protein supplements for this purpose, and it’s even been shown to sustain healthy muscles in the elderly, a community which already trends toward deficiency. Satisfy Hunger and Reduce Snacking Protein helps curb snacking and satisfy hunger by giving your body more sustenance to break down. This causes the release of satiety hormones, the most significant indicator of hunger. Most dieticians will recommend that a variety of protein from both plant and animal sources is a significant step in the fight against hunger and late-night snacking. Additionally, increased protein intake has been shown to prevent cravings, an effect some scientists think is related to the function of dopamine. Boost Metabolism and Manage Weight Studies have shown that increased protein intake correlates with an increased metabolism and a reduction in caloric intake. It’s also been shown to support fat loss when consumed with intentional caloric restrictions, and one weight management study even showed a 50% weight gain reduction after as little as a 3% increase in protein. Furthermore, protein supplies the body with a means of enzyme creation, which in turn improves digestion.  Among the supplements in your cabinet, protein should sit front and center. Its benefits are well-documented, and if you aren’t prone to a high-protein diet, a daily dose is likely to help you stay healthy and strong. If you have a protein supplement that needs manufacturing, contact us to learn more about how Peak Nutritional Products can help bring your formula to the next level.
ESSENTIALAI-STEM
Wikipedia:Reference desk/Archives/Mathematics/2006 July 9 Satisfying Poll Results Involving "The Average" On a webpoll I recently saw, participants were asked to rank how well they drove, in comparison to everyone else who filled the poll. Options were "Average", "A bit better than average", "Considerably better than average", "Much better than average", "A bit worse than average", "Considerably worse than average", and "Much worse than average". Unsurprisingly, more people supposed that they were better than average than supposed they were worse, though every option had some takers. But some people seemed to interpret this as being "some people clearly think they are better drivers than they are," and it seems to me that is not necessarily true. After all, consider a simpler quiz of three options "Average," "Better than average", and "Worse than average", and we rank people's driving out of 100 as a way of deciding an average. If 90 people drive at a 75 level, 5 people drive at a 68 level, and 5 people drive at a 10 level, then the average is 68, and 90% of people drive better than this, 5% drive at this, and 5 drive worse. Those could well have been our more-above-average-than-below results. This got me thinking. Is it possible, given -any- distribution of people's guesses (satisfying certain requirements), to construct such a theoretical sample that would satisfy the result? Clearly, it could not be true if everyone said they were better than average, but it seems to me (I made a half-hearted attempt, but I can't prove it) that as long as you have an open-ended category on the underpopulated side of average that has at least one taker (e.g. a category like "Much worse than average" that covers every really bad driver, and there is no limit on how bad a driver can be, and there's at least one taker), then you can satisfy any possible set of results. This might not even be necessary. Anybody have any thoughts on the matter? What general rule can we construct about such a thing? Maelin 13:20, 9 July 2006 (UTC) (Minor edit for clarity 13:33, 9 July 2006 (UTC)) * If you have a sample of n people, with mean $$\frac{\sum x_i}{n}$$, and you add one more person to the sample, you can get any new mean y that you like by taking $$x_{i+1}=(n+1) y - {\sum x_i}$$. * Still, while people might be jumping to a logically unsound conclusion from your webpoll, the Lake Wobegon effect does seem like a plausible interpretation. It's also unclear what respondents think the word "average" means. If they think it refers to the median, not the mean, then your logical loophole disappears. -- Avenue 14:50, 9 July 2006 (UTC) * Yes, I strongly suspect that by "better than average", they mean "better than half of the drivers", which is really the median, not the average. StuRat 17:24, 9 July 2006 (UTC) volume of concrete Hello, My name is matt and I am helping my dad figure out a volume problem with our concrete. We are pouring gypcrete in our house and the contracter said that 1 1/2 inches of crete would do 18 square feet. My dad only wants to pour the thickness to 1 1/8 and hopefully have enough to do our room that is 20 square feet. How do we figure this problem? Thank You so much * One thing that might help is to get them into the same units, instead of using both inches and feet. 1 square foot = 12x12 = 144 square inches. You could work out the volume of the concrete you have, then find out to what depth you can fill 20 square feet (2,880 square inches) of floor with it. If you can fill higher than you need to, you have more than enough. The volume of a rectagular prism (box shape) is depth x area of bottom. Black Carrot 17:55, 9 July 2006 (UTC) * If you really want to help your dad (and not your grade), you should advise him to rely on the expertise of the contractor. The contractor is being paid to do the job properly, and might be expected to know his job. Using a thinner layer may prove to be false economy. If that too-thin layer causes problems in the future, the cost will be much more than buying more "crete" now. Issues include strength, noise control, and fire protection. There may also be requirements in building codes for minimum thickness. * Q. "How do I stick beans up my nose? A. Don't! --KSmrqT 20:53, 9 July 2006 (UTC) * Another pretty simple answer is that if you're making a 1 1/8" (7/8") slab instead of 1 1/2" (12/8"), you'll cover 12/7 as much area; if the original covered 18 square feet, the thinner slab would cover nearly 31 square feet. Of course, none of this says anything about, as User:KSmrq said, the advisability of going against the contractor's advice. grendel|khan 00:13, 14 July 2006 (UTC) * Grendel, I think you need some coffee, 1 1/8 is 9/8, not 7/8. StuRat 22:53, 14 July 2006 (UTC) * And this, kids, is why you should never attempt basic arithmetic after spending twelve-hours on shift and then throwing your brain in the blender of learning to use threading with Java. That's my story, and I'm stickin' to it. grendel|khan 03:19, 15 July 2006 (UTC) two different group laws I have two different group laws on a manifold, but it turns out that they're not so different after all. The manifold is R3 and the two group laws are * $$(a,b,c)*_1(d,e,f) = \left(a+d,b+e,c+f+\frac{1}{2}(ae-bd)\right)$$ and * $$(u,v,w)*_2(x,y,z) = (u+x,v+y,w+z+uy).$$ It turns out that these two groups have the same Lie algebra, and in fact the two operations can be understood in terms of the exponential map from this Lie algebra. The Lie algebra is of course also homeomorphic to R3. Let Q, P, E be a basis for the Lie algebra, and in terms of the exponential map we have: * $$(a,b,c)= e^{aQ+bP+cE}$$ and * $$(u,v,w)=e^{uQ}e^{vP}e^{wE}$$ so we see that the differences in the group law come from the choice to first combine the vectors, then exponentiate, or vice versa. The two group laws are thus really consequences of two different choices of parametrizations for the group. The relationship between the two is given by the Baker-Campbell-Hausdorff formula, which comes to * $$e^{uQ}e^{vP}e^{wE} = e^{uQ+vP+(w+\frac{1}{2}uv)E}.$$ In case you haven't recognized it, the groups described are (both?) the Heisenberg group and their Lie algebra are the canonical commutation relations of quantum mechanics. This group is a particularly nice place to analyze my question due to the simplicity of BCH, but it could be asked of any (nonabelian) Lie group, I suppose. Now we come to my question. Are the two groups the same? The most obvious map between them doesn't seem to be a homomorphism, unless I'm mistaken. On the other hand, aren't they just two different parametrizations for the same group, and therefore shouldn't they be isomorphic? I have one reference which calls the first group the Heisenberg group and the second group the polarized Heisenberg group and never mentions an isomorphism between them (which seems telling in its ommission). I have several other references which call the second group the Heisenberg group and make no mention of the first, and one which calls the first the Heisenberg group and makes no mention of the second. Right now the Wikipedia article has both groups, but in an inconsistent way, and it is in attempting to fix that article that I have gotten myself stuck on this issue and have come to you folk in suppliance. I could ask the same question about any Lie group, I think. For example, for the rotation group, I think it would sound like this: write the group law for rotatations in terms of their Euler angles, and then write the group law in terms of the single axis of rotation. Is there an isomorphism between the two groups? -lethe talk [ +] 21:47, 9 July 2006 (UTC) * Perhaps it is enough in this case to observe that both groups are finite-dimensional, simply connected, and have the same Lie algebra. Thus each is the same universal covering group (up to isomorphism), yes? Also, the groups are path-connected and not compact, so the exponential map should be your friend in constructing an isomorphism. --KSmrqT 23:13, 9 July 2006 (UTC) * Yes, this is of course correct. There is only one connected simply-connected Lie group to any Lie algebra, so we know at the outset that the two groups must be isomorphic. Furthermore, your suggestion that the exponential map should point to this isomorphism also sounds eminently reasonable. Either the "obvious" map between the two groups is not the correct map, or else my calculation about the map contains mistakes. I guess I will repeat the calculation. I'll post back my findings. Thank you for your input. -lethe talk [ +] 00:28, 10 July 2006 (UTC) * I've repeated the calculation, and actually the obvious map is a homomorphism. The groups are isomorphic, as they should be. Nothing more to say about this, I guess, except that I should be more careful, triple-check my calculations before I come to RD with silly questions. Thanks again. -lethe talk [ +] 13:48, 10 July 2006 (UTC) * Classifying smooth actions by real Lie groups is not the same as classifying real vector fields on Rn or classifying (real or complex) Lie groups themselves (which is not quite the same as classifying Lie algebras). There are many interesting questions still be answered in these areas. One interesting point is that Lie got into this from the left hand endpoint and wound up at the right hand endpoint, which is easier. I'm sure Lethe already knows all about this stuff, but the books * offer a nice discussion. Any fan of symmetry, Lie groups, representation theory, reflection groups, the ADE classification, invariant theory, differential equations of mathematical physics and Cartan's method of classification of (semi)-Riemannan manifolds up to local isometry will benefit from these books, I should think! ---CH 02:21, 14 July 2006 (UTC) * offer a nice discussion. Any fan of symmetry, Lie groups, representation theory, reflection groups, the ADE classification, invariant theory, differential equations of mathematical physics and Cartan's method of classification of (semi)-Riemannan manifolds up to local isometry will benefit from these books, I should think! ---CH 02:21, 14 July 2006 (UTC) * offer a nice discussion. Any fan of symmetry, Lie groups, representation theory, reflection groups, the ADE classification, invariant theory, differential equations of mathematical physics and Cartan's method of classification of (semi)-Riemannan manifolds up to local isometry will benefit from these books, I should think! ---CH 02:21, 14 July 2006 (UTC) * Oh, BTW, Lethe, do you know how the Heisenberg group arises in the Bianchi classification? OK, this isn't very profound :-/ Sometimes people ask about the difference between the Bianchi classification and Thurston's classification. ---CH 02:24, 14 July 2006 (UTC) Oi, barkeep, wheres my quid 3 guys in a bar, buy three drinks, cost comes to £30. Bartender refunds £5 for miscalculation, the three men take £1 each, and give the bartender back £2 for honesty. Each man spent £10 - £1 = £9 the three men spent £9 * 3 = £27 plus the £2 the tender had, comes to £29. Where is the other pound? There are several issues with this problem, the whole thing originates from there drinks costing £8⅓ each. Which is the first problem, I figured thats where the extra pound is, by I still can't explain the incosistency with the amount going in and the amount going out. Philc TECI 23:28, 9 July 2006 (UTC) * I believe the issue is you added when subtraction is needed. The three men did indeed spend £27, which includes a £2 gratuity (£25 for drinks, £2 for the barkeep). Thus adding £27 and £2 is meaningless--a more meaningful quantity is £27 - £2, the total spent minus the tip, which yields the cost of the drinks. --TeaDrinker 00:03, 10 July 2006 (UTC) * There seems to be a large hole in this problem. Is the £30 the price with or without the miscalculation? -- He Who Is[ Talk ] 01:22, 10 July 2006 (UTC) [Edit Conflict] :This seems to be one of the most commonly repeated questions on this desk (because of the various ways to word it I'm not sure you could search for it, but I wouldn't be surprised if it was asked at least once a month) - see Missing dollar paradox. Confusing Manifestation 01:19, 10 July 2006 (UTC) * There is NO missing £1. What you should do is ask "who has each of the original £30?" The answer then is: the cahier has £25, the three men have £1 each (£3) and the bar-tender has £2, so all 30 are accounted for - no 'missing' £1. * Hmm fair enough, makes sense, it all in the wording. Philc TECI 17:07, 10 July 2006 (UTC) Start from realizing that the three drinks cost £25. Then see the cash flow: Note two things: So it makes no sense to add 27+2. Such sum does not appear anywhere in the balance. :) --CiaPan 19:24, 10 July 2006 (UTC) * 1) No penny is missing – the sum in every row is the same £30. * 2) The £27 sum is what the three guys have paid – and it already contains the £2 tip.
WIKI
What is the difference in charging time between a Level 1 EVSE and a Level 2 EVSE? A Level 2 charging station can reduce the charge time for a Nissan Leaf from 25 hours down to 7.3 hours.  Charge time for a Chevrolet Volt can go from 11 hours to 3.2 hours (see table below). Charging Level 2013 Chevy Volt 2013 Nissan Leaf 6.6kw Level 1 charging time 120 V/8 A = 11 hours1 120 V/8 A = 20-25 hours1 120 V/12 A = 7.3 hours2 120 V/12 A = 12-16.6 hours2 Level 2 charging time 240 V/20 A = 3.2 hours!3 240 V/32 A = 3.3-3.5 hours!3 1 Electricians recommend charging at no more than 8 amps unless on a dedicated circuit. 2 The National Electrical Code (NEC) limits continuous charging to a maximum of 12 amps on a 15 amp circuit. 3 Charging time is based on the maximum capability of the on-board charger of the vehicle. All charging times differ based on external temperature and battery temperature management. Range – The Chevy Volt has a 40 mile battery-only range. The Nissan Leaf has a 100 mile range.
ESSENTIALAI-STEM
Wikipedia:Articles for deletion/ባህረ ሀሳብ The result was speedy delete. Deleted by RHaworth as A10. Randykitty (talk) 13:43, 2 August 2016 (UTC) ባህረ ሀሳብ * – ( View AfD View log Stats ) This is the wrong language - suggest you post this to the Ethiopian wikipedia. Jamesbushell.au (talk) 08:04, 2 August 2016 (UTC) * Note: This debate has been included in the list of Ethiopia-related deletion discussions. Shawn in Montreal (talk) 09:08, 2 August 2016 (UTC) * Please note that such articles should first be brought to Pages needing translation into English for attempted translation before deletion. I've raised it there. Shawn in Montreal (talk) 09:27, 2 August 2016 (UTC)
WIKI
Managing time zones in a globalized environment is a critical aspect of application development. In this guide, we’ll explore various timezone-related scenarios, especially when your MongoDB database is hosted in the UK, and you’re working in a different timezone, such as IST (India Standard Time). We’ll use Moment.js, a powerful JavaScript library for handling dates, times, and time zones. 1. Timezone Basics Link to heading Timezones represent the local time of a specific region or location. They account for differences in the Earth’s rotation and axial tilt. The UTC (Coordinated Universal Time) is often used as a reference point. 2. MongoDB and UTC Link to heading MongoDB stores the date in UTC by default. This helps ensure consistency across different timezones and simplifies handling daylight saving time changes. 3. Scenarios Link to heading Scenario 1: Querying in UTC Link to heading When querying the database, use UTC timestamps for date filtering. Moment.js simplifies this process with its utc method: javascriptCopy codeconst moment = require('moment'); // Assuming your MongoDB server is in the UK (GMT/UTC) const startDate = moment("2022-01-01T00:00:00Z"); // Z indicates UTC db.yourCollection.aggregate([ { $match: { createdAt: { $gte: startDate, // Additional conditions if needed // $lt: moment("2022-02-01T00:00:00Z") } } } ]); Scenario 2: Converting Local Time to UTC Link to heading Moment.js makes it straightforward to convert local timestamps to UTC before storing in the database. The utc method ensures a seamless transition: javascriptCopy codeconst moment = require('moment'); // Assuming local time in IST (India Standard Time) const localTime = moment("2022-01-01T00:00:00+05:30"); // IST const utcTime = localTime.utc(); // Store `utcTime` in the database Scenario 3: Displaying Dates in Local Time Link to heading When displaying dates to users, convert UTC timestamps to the local time zone using Moment.js’s tz method. This ensures a user-friendly representation: javascriptCopy codeconst moment = require('moment'); // Retrieve UTC timestamp from the database const utcTimeFromDatabase = moment("2022-01-01T00:00:00Z"); // UTC timestamp from the database // Convert to local time (e.g., IST) const localTimeForDisplay = utcTimeFromDatabase.clone().tz('Asia/Kolkata'); // IST // Display `localTimeForDisplay` to the user console.log(localTimeForDisplay.format("YYYY-MM-DD HH:mm:ss")); 4. Moment.js in Depth Link to heading Moment.js is a versatile and feature-rich library for working with dates and times. Some key features include: • Parsing and Formatting: Moment.js simplifies the parsing of date strings and provides a flexible formatting system. • Manipulation: Easily add or subtract days, months, years, etc., from a given date using intuitive methods. • Duration Handling: Manage durations and differences between dates effortlessly. • Relative Time: Express time differences in a human-readable format (e.g., “2 hours ago”). • ISO 8601 Strings: Moment.js makes it easy to obtain ISO 8601 string representations of dates. ISO 8601 Strings Link to heading ISO 8601 is an international standard for representing dates and times. Moment.js provides the toISOString method, which returns a string representation of a moment in the ISO 8601 format. For example: javascriptCopy codeconst moment = require('moment'); const myMoment = moment("2022-01-01T12:34:56+05:30"); // IST const isoString = myMoment.toISOString(); console.log(isoString); In this example, isoString will contain a string like "2022-01-01T07:04:56.000Z", adhering to the ISO 8601 format. The Complex MongoDB Document 📄 Link to heading Imagine a MongoDB document representing a tech conference event: jsonCopy code{ "_id": ObjectId("61f447550c1bc91e6f7b2e5a"), "eventName": "Tech Conference", "participants": [ { "name": "Alice", "attendanceTimestamps": [ { "timestamp": ISODate("2022-01-15T10:30:00Z"), "status": "present" }, { "timestamp": ISODate("2022-01-15T14:45:00Z"), "status": "present" } ] }, { "name": "Bob", "attendanceTimestamps": [ { "timestamp": ISODate("2022-01-15T11:00:00Z"), "status": "present" }, { "timestamp": ISODate("2022-01-15T16:00:00Z"), "status": "present" } ] } ] } In this document, the event “Tech Conference” has participants with their attendance timestamps, providing a rich dataset for analysis. Tackling Timezone Issues ⏰ Link to heading When your MongoDB database is hosted in a different timezone, handling dates becomes crucial to ensure accurate and consistent data representation. Scenario: Database Hosted in the UK (GMT/UTC) 🇬🇧 Link to heading Suppose your MongoDB server is hosted in the UK (GMT/UTC), and you’re working in a different timezone, such as IST (India Standard Time). Consider the following scenarios: Querying in UTC Link to heading When querying the database, use UTC timestamps for date filtering: javascriptCopy codeconst moment = require('moment'); // Convert query timestamps to Moment.js objects const startDate = moment("2022-01-15T10:00:00Z"); const endDate = moment("2022-01-15T15:00:00Z"); // MongoDB query with $elemMatch and Moment.js db.events.find({ participants: { $elemMatch: { name: "Alice", attendanceTimestamps: { $elemMatch: { timestamp: { $gte: startDate.toDate(), $lte: endDate.toDate() }, status: "present" } } } } }); In this query, we ensure that timestamps are in UTC, maintaining consistency with the database. Converting Local Time to UTC Link to heading When storing local timestamps in the database, convert them to UTC: javascriptCopy codeconst localTime = moment("2022-01-01T00:00:00+05:30"); // IST (India Standard Time) const utcTime = localTime.utc(); // Store `utcTime` in the database This conversion helps maintain a uniform representation across different time zones. Displaying Dates in Local Time Link to heading When displaying dates to users, convert UTC timestamps to the local time zone: javascriptCopy codeconst utcTimeFromDatabase = moment("2022-01-01T00:00:00Z"); // UTC timestamp from the database // Convert to local time (e.g., IST) const localTimeForDisplay = utcTimeFromDatabase.clone().tz('Asia/Kolkata'); // IST // Display `localTimeForDisplay` to the user console.log(localTimeForDisplay.format("YYYY-MM-DD HH:mm:ss")); This ensures a user-friendly representation of timestamps. Utilizing $elemMatch for Precise Queries 🎯 Link to heading When dealing with arrays of data, MongoDB provides the $elemMatch operator to filter documents that match specific conditions within arrays. Let’s say we want to find events where Alice was present between two specific timestamps. javascriptCopy codeconst moment = require('moment'); // Convert query timestamps to Moment.js objects const startDate = moment("2022-01-15T10:00:00Z"); const endDate = moment("2022-01-15T15:00:00Z"); // MongoDB query with $elemMatch and Moment.js db.events.find({ participants: { $elemMatch: { name: "Alice", attendanceTimestamps: { $elemMatch: { timestamp: { $gte: startDate.toDate(), $lte: endDate.toDate() }, status: "present" } } } } }); Conclusion Link to heading Handling timezones in MongoDB is crucial for maintaining data consistency and providing a seamless user experience across different regions. By understanding the scenarios and leveraging Moment.js, developers can streamline time-related challenges in their applications while benefiting from the extensive features offered by this versatile library.
ESSENTIALAI-STEM
San Pietro Val Lemina San Pietro Val Lemina (French: Saint-Pierre) is a town and comune in the Metropolitan City of Turin, part of the Piedmont region, northern Italy. It takes its name from the Lemina torrent, which flows in its territory.
WIKI
Milk Bar Pie Milk Bar Pie, also known as Crack Pie, is a dessert created by the American chef Christina Tosi in 2008 while working at the New York City restaurant wd~50. It became the signature dish of Tosi's bakery, Milk Bar. Tosi originally named the dessert Crack Pie for its addictive qualities, but changed it to Milk Bar Pie in 2019 after the name was criticized as insensitive. Development The American chef Christina Tosi created Milk Bar Pie, initially known as Crack Pie, for a staff meal while working at the New York City restaurant wd~50. She described regularly making desserts from "whatever mise-en-place was left over from the previous night's service". When missing ingredients one morning, she came across a recipe for chess pie in Joy of Cooking. Tosi describes chess pie as something "the old gals of yesteryear made when there was nothing to really make pie out of". She substituted heavy cream for the called-for buttermilk to create a gooier consistency and corn powder and milk powder for the called-for flour to create a more interesting flavor. The pie was popular at family meals. Milk Bar When Tosi opened Momofuku Milk Bar in 2008, she revised the Crack Pie to include an oatmeal-cookie crust. It became her signature product. According to Vice, "Tosi’s Milk Bar has been synonymous with the Crack Pie". Gourmet called it Tosi's "defining dessert". Bon Appetit called it her "most buzzed-about dish". New York Daily News called it "New York's favorite sugar high". In December 2009, Anderson Cooper appeared on Regis and Kelly discussing the pie. The New York Times called the appearance a "seminal moment". The Los Angeles Times in 2010 said the price of the pie, then $44, was "jaw-dropping"; it attributed the pie's having "taken New York City by storm" partially to the price. Axios in 2022 called the dish a "cult favorite". Tosi's first cookbook, Momofuku Milk Bar (2011), contains a recipe for the pie. Name change Some food writers and others have criticized naming foods including Crack Pie after addictive substances as insensitive and offensive. In May 2019, Devra First of the Boston Globe criticized the name in a column for making light of addiction by alluding to the addictiveness of crack cocaine. The following month, Milk Bar changed the name to Milk Bar pie.
WIKI
V1.3: Generators Hanami has convenient code generators to speed up our development process. Applications With Hanami architecture, we can have multiple Hanami applications running under apps/. The default application is called Web and lives under apps/web. We can generate new applications for different components that we want to add to our project. $ bundle exec hanami generate app admin This generates an application named Admin under apps/admin. Actions Generate an action along with the corresponding view, template, route and test code with one command. $ bundle exec hanami generate action web books#show This generates the action Web::Controllers::Books::Show. The first argument, web, is the name of the target application in a Hanami project. The argument books#show is the name of the controller and the action separated by the number sign (#). For nested actions, use a slash (/) to separate the modules. Nested actions work in conjunction with nested resourceful routes. For example: $ bundle exec hanami generate action web books/editions#show This generates the action Web::Controllers::Books::Editions::Show. If you wish to generate only the action, without the view and template, you can do that by using the --skip-view. $ bundle exec hanami generate action web books#show --skip-view If you wish to generate an action with a specific method, you can do that by using the --method. $ bundle exec hanami generate action web books#create --method=post Route The generated route is named after the controller name. # apps/web/config/routes.rb get '/books', to: 'books#show' If we want to customize the route URL, without editing our routes file, we can specify a --url argument. $ bundle exec hanami generate action web books#show --url=/books/:id This will generate the following route: # apps/web/config/routes.rb get '/books/:id', to: 'books#show' The default HTTP method is GET, except for actions named: Action name HTTP verb create POST update PATCH destroy DELETE This should help you route using RESTful resources. You can also set the HTTP method by specifying a --method argument when calling hanami generate action. Models Generate an entity and a repository with a single command $ bundle exec hanami generate model book create lib/bookshelf/entities/book.rb create lib/bookshelf/repositories/book_repository.rb create db/migrations/20170213123250_create_books.rb create spec/bookshelf/entities/book_spec.rb create spec/bookshelf/repositories/book_repository_spec.rb It generates an entity with the corresponding repository, migration, and tests. The migration will already contain the code for the creation of the table, the primary key and the timestamps: # db/migrations/20170213123250_create_books.rb Hanami::Model.migration do change do create_table :books do primary_key :id column :created_at, DateTime, null: false column :updated_at, DateTime, null: false end end end Migrations Generate a database migration $ bundle exec hanami generate migration create_books create db/migrations/20161112113203_create_books.rb It generates an empty migration with the UTC timestamp and the name we have specified: db/migrations/20161112113203_create_books.rb. Mailers Generate a mailer $ bundle exec hanami generate mailer welcome It creates the following files: $ tree lib/ lib ├── bookshelf │   # ... │   ├── mailers │   │   ├── templates │   │   │   ├── welcome.html.erb │   │   │   └── welcome.txt.erb │   │   └── welcome.rb # Mailers::Welcome # ... Secret Generate a HTTP sessions secret for an application. $ bundle exec hanami generate secret web Set the following environment variable to provide the secret token: WEB_SESSIONS_SECRET="a6aa65a71538a56faffe1b1c9e96c0dc600de5dd14172f03c35cc48c3b27affe"
ESSENTIALAI-STEM
Hair transplantation is a surgery that requires a lot of personal care for a quick recovery. On the other hand, is it a good idea to be exposed to the sun immediately after a hair transplant? Is it necessary to avoid sun exposure after hair transplant? All the information that will be useful to you is in our article. Why Do I Need To Avoid Sun Exposure Important After Hair Transplant? The transplanted area usually cannot protect itself against the sun’s rays for at least a few months following the hair transplantation surgery. Our skin contains chromatophores, which darken the skin when exposed to too much sun as a form of protection. However, these chromatophores become ineffective or die during transplantation and take time for them to heal or regenerate within the grafts. When it comes to hair transplantation, it is not only the outer skin layer that is treated. Surgery and excessive sunlight penetrate into these deep tissues, causing irreversible damage, while the layers of the epidermis are treated. For this reason, we recommend our patients to avoid sun exposure 3 months after hair transplant. Sun Exposure 3 Months After Hair Transplant We always need sun vitamins (such as sun vitamin D). For this, we need to be exposed to a sufficient amount of sunlight. However, this situation differs in the process after hair transplantation. You should not stay in the sun for a long time for at least 3 months after hair transplantation. This period may even be 4 months. It is beneficial not to use products such as sunscreen, conditioner, etc. until the cuts on your scalp are completely healed. How To Avoid Sun Exposure After Hair Transplant? During this period when the scalp is quite sensitive, it is very important that you protect your skin from the sun’s rays. The skin, which is also vulnerable to the sun in normal times, may be more vulnerable to the sun during this period. The scalp, especially the treated scalp, is more vulnerable during this period. In order to reach natural results in hair transplantation, you can take into account the following suggestions. Ways to avoid sun exposure post hair transplant: • Wearing a hat will protect your scalp from the sun. • Using high-protection sunblock will offer protection against the sun’s damaging UV rays. • Avoid being out in the sun for extended periods of time during afternoon. Patients usually predict that going out in the sun 30 days after hair transplant will not cause problems. However, this is not a correct idea. You should avoid sun exposure after hair transplantation. The time you need in this is a minimum of 3 months. When Can You Go in Sun After Hair Transplant? We all know that we need to get vitamin from sunlight. However, this situation may vary slightly in the processes after hair transplantation. After having this procedure, you should avoid sunbathing or sun exposure in any way for at least three months. The time you need this is from 3 to 4 months. That is, you should not go out in the sun until at least 3 months have passed since your procedure. Beach After Hair Transplant Especially after hair transplantation procedures performed in the summer months, the most curious question of the patients is “Is it possible to swim in the sea after hair transplant?”. However, as we mentioned above, you should avoid sun exposure for a certain period of time. Sun exposure after fue hair transplant, your avoidance is minimum 3-4 months. That’s why the idea of going to a beach can be risky for you. However, if you go to the beach without waiting for this time to pass, we recommend that you do not swim there and wear a hat to protect your scalp from the sun. Solarium After Hair Transplant Our recommendations regarding exposure to the sun’s rays also apply to the solarium. Do not enter the solarium for 3 months after the procedure. Do not swim in the sea or pool for 1 month after the procedure. However, avoid doing sports activities for 1 month. You can fill out the contact form on our hair transplantation page to get more detailed information about hair transplantation prices or procedures. Frequently Asked Questions When can you go in the sun after a hair transplant? After the hair transplantation operation, you can go out to the sun at any time. However, the point to be considered is to protect the treated area from direct sunlight and to provide shade with a hat that does not squeeze the head. Avoid prolonged sun exposure for 3 or 4 months. Does hot weather affect hair transplant? As long as you do not touch your procedure area and protect it from traumas, whether the air is hot or cold does not affect your recovery. However, it is important for your healing process that your scalp does not sweat too much. Therefore, instead of very hot weather, it is more beneficial to have this process done in autumn or winter. However, as we mentioned, if you are going to protect your trading area sufficiently, you can also have this process done in the summer. Can you sweat after hair transplant? After hair transplantation, you need to avoid excessive sweating so that the transplanted grafts are not damaged. It is also very important that you avoid touching and pulling your hair for the first ten days after the procedure. However, exercising can cause you to sweat excessively. However, hot showers, going into the sauna or staying outside for a long time on an extremely hot day can also cause you to sweat. After hair transplantation, we recommend that you avoid heavy work or physical activity so that you can protect your processing area from excessive sweating.    
ESSENTIALAI-STEM
FDA raises concerns about Meridian's plant that makes lead tests (Reuters) - The U.S. health regulator on Thursday raised concerns about Meridian Bioscience Inc’s facility that manufactures lead testing devices, nearly two months after the regulator warned that the tests may underestimate lead levels in blood. The Food and Drug Administration said it had issued Meridian unit, Magellan Diagnostics, a Form 483 for its North Billerica, Massachusetts-based facility, which manufactures the devices. Magellan’s devices are the only lead testing products cleared by the FDA and account for about half of all lead tests in the United States. If the agency finds problems in company facilities, it issues a Form 483 — a notice outlining violations — which if not resolved can lead to a "warning letter" and in worst case, a ban. (bit.ly/2udKvM8) In its report, the FDA listed certain observations that may be in violation of federal law, including concerns that design validation studies on some devices did not ensure they work the way they are intended to. The agency also called out the company for failing to identify potential risk to patients from a falsely low test result. "We are carefully reviewing the evidence collected during the inspection to determine if there have been violations of federal law and whether further action is warranted," the FDA said in a statement on Thursday. (bit.ly/2tMXFP1) Meridian said its unit will respond to the issues raised by the agency. “Magellan is addressing the observations noted in the Form FDA-483 with the highest sense of urgency,” the company said in a statement on Thursday. In May, the FDA warned laboratories and healthcare professionals not to use any lead testing device made by Magellan, which was bought by Meridian in 2016, to test blood drawn from veins. The tests are designed to detect lead poisoning that can stunt children’s growth and reduce IQs, according to the Centers for Disease Control and Prevention. Awareness of lead poisoning escalated following widespread exposure in Flint, Michigan. Reuters has identified more than 3,300 areas with lead poisoning rates in children at least double those found in Michigan City. Reporting by Divya Grover in Bengaluru; Editing by Shounak Dasgupta
NEWS-MULTISOURCE
Nigeria remains in recession Africa's biggest economy Nigeria is stuck in a painful recession with no end in sight, according to the latest official data released on Monday. Gross domestic product shrank by 2.24% in the third quarter of 2016, following a 2.06% contraction in the second quarter, and a 0.36% shrinking in the first quarter, according to data released by the country's National Bureau of Statistics. That extends the country's recession, which started in Q2, into a third quarter. Nigeria's ongoing recession is its first in 20 years. The continued recession is even deeper than expected, with economists polled by Bloomberg in the run-up to the data's release forecasting a contraction of just 2%. The big driver of the slump in the Nigerian economy, which was one of Africa's great success stories until recently, has been the persistently low price of oil over the past 2 1/2 years. Nigeria relies heavily on oil and is the largest producer of the commodity on the continent, producing roughly 2.4 million barrels a day. Given that the price of oil has slumped from more than $100 a barrel in 2014 to roughly $48 now, it is perhaps unsurprising that the country has struggled to find economic growth. The Nigerian oil industry's problems have been made even worse by a series of major disruptions in the oil-rich Niger Delta area, caused largely by a militant group calling itself the Niger Delta Avengers. Most notably, the group attacked a Chevron offshore facility in May and the underwater Forcados export pipeline operated by Shell in late March. The production disruptions caused by these attacks and others have wreaked havoc with the already stricken industry. The Avengers activities seemed to dwindle over the summer, but they have re-emerged in the past couple of months, and over the weekend vowed to blow up more oil facilities in the Niger Delta region because of an ongoing dispute with the government regarding criminal charges against a former militant leader called Government Ekpemupolo, Nigeria Today reports. The mining sector has also been a big issue for the country's economy. Output was more than 20% lower than in the same period in 2015, the Nigerian National Bureau of Statistics said (emphasis ours): "In real terms, Mining and Quarrying sector slowed by - 21.64% (year-on-year) in the third quarter of 2016 which was 22.77% points lower than rates recorded in the same Quarter of 2015, also 4.45% points lower than rates recorded in second quarter of 2016. The contribution of Mining and Quarrying to Real GDP in the third quarter of 2016 stood at 8.34%, showing a decline of 2.06% points relative to the corresponding quarter of 2015 and also a decline of 0.07% points relative to the second quarter of 2016." Nigeria could now be set for its first full-year recession since 1991, with Dr Yemi Kale, the head of Nigeria's statistical agency saying in a tweet that "Nigeria needs…growth in Q4 of 4.32 per cent to avoid full year negative growth." Nigeria's economic picture is made even worse by spiralling inflation — which as Business Insider's Elena Holodny reported last week— has hit an 11-year high. Consumer prices rose by 18.3% year-over-year in October, according to data from the central bank, accelerating from the previous month's rate of 17.9%. This was the highest rate since October 2005, and the 12th consecutive month it accelerated. The rate was in line with the median Bloomberg estimate.
NEWS-MULTISOURCE
Trump intends to take tax return fight to Supreme Court President Trump's lawyers intend to petition the U.S. Supreme Court by Nov. 14 to review a lower court ruling requiring the president to turn over eight years of his tax returns to a state grand jury, according to a letter written Friday. Why it matters: This case would mark the first time the Supreme Court makes a decision on Trump's legal argument — that he is immune from criminal investigation while in office — and could "produce a major statement on the limits of presidential power," the New York Times reports. Details: The Second Circuit Court of Appeals, which said on Monday that Trump must turn over his tax returns, dodged Trump's legal arguments that he is exempt from criminal investigations while in the White House. Instead, the court stated the president’s accounting firm is being subpoenaed for the documents — rather than Trump himself. Manhattan District Attorney Cyrus Vance subpoenaed Trump's tax returns as part of an investigation into hush-money payments allegedly made to Stormy Daniels by by the Trump Organization during the 2016 election. Background: Trump has filed at least three lawsuits to block the release of his tax returns. The president, his family and his company also filed a lawsuit against Deutsche Bank to block the bank from complying with congressional subpoenas for their business records. Read the letter from Trump's lawyers: Go deeper: Appeals court rules against Trump on his tax returns
NEWS-MULTISOURCE
Security Council Condemns Nuclear Test by North Korea UNITED NATIONS — The United Nations Security Council condemned North Korea for its nuclear test on Wednesday, but there was no evidence yet that the North’s most powerful backer, China, was willing to stiffen sanctions in a way that could push the unpredictable country to the point of collapse or slow its nuclear progress. As the question of how the international community should respond remained unanswered, White House officials, eager to undercut whatever propaganda value the North saw in claiming its first success in detonating a thermonuclear device, said that initial data from its monitoring stations in Asia were “not consistent” with a test of a hydrogen bomb. A two-hour closed session of the Security Council on Wednesday afternoon ended with a pledge to “begin to work immediately” on a resolution containing additional measures to rein in Pyongyang. It did not specify what those measures could be, and in the past, China and Russia have usually objected to steps that could threaten the North’s survival. The most obvious would be a prohibition on loading or unloading North Korean ships around the world, or on financial transactions with the nation. The White House press secretary, Josh Earnest, did not indicate the basis for the administration’s skepticism of Pyongyang’s claim. But more than a month ago, when Kim Jong-un, the country’s young leader, boasted that he possessed the technology for a hydrogen bomb, American officials said they had a variety of evidence — some technical, some from human sources — to call that claim into question. A hydrogen bomb would be far more powerful, and more fearsome, than the type of nuclear weapon the North has tested three times since 2006, when it conducted its first test during George W. Bush’s administration. The seismic wave left by the explosion was smaller than what most experts would expect from the detonation of a true thermonuclear weapon. Some experts said it was possible the North had increased, or boosted, the yield of a more traditional device by using tritium, a common technique, in the 70-year history of nuclear weapons. A South Korean Defense Ministry official, who requested anonymity to speak about a national security matter, said Thursday that the ministry believed that even if the device was a boosted fission bomb, the test was probably a failure. The explosive yield was even smaller than that from the North’s last and third nuclear test, in early 2013, he said. “Even a boosted fission bomb produces a yield bigger than this, so we don’t think this is a successful test of a boosted fission bomb either,” he added. But the true nature of the test may not be revealed until results are back from atmospheric testing, usually conducted by Air Force planes that run along the North Korean coast “sniffing” for byproducts of an explosion. Yet after the test in 2013, such inquiries were inconclusive. “We may never know,” said one intelligence official involved in the testing. “The technology is pretty hit-and-miss.” Gary Samore, Mr. Obama’s top nuclear adviser in the president’s first term, said Wednesday that the timing of the test was strange, with North and South Korea discussing restoring some economic ties and the North trying to reach out to the Chinese. North Korea claimed on Wednesday that it had tested a hydrogen bomb, the most powerful kind of nuclear weapon. Even China used unusually strong language, probably because it also appeared to have been given no warning about the test, which the North claimed — against considerable evidence to the contrary — was its first effort to detonate a hydrogen bomb. The Chinese said they were “strongly against this act,” and their ambassador to the United States met with Susan E. Rice, President Obama’s national security adviser, at the White House. President Obama said nothing in public about the test, in contrast to Mr. Bush, who responded to the first North Korean test in 2006 by declaring that the North would be held responsible if its bomb technology were found anywhere else in the world. Advisers said Mr. Obama was calculating that Mr. Kim was looking to get a rise out of him. “He’s not going to give him the satisfaction,” one aide said. On Wednesday evening, the White House said that Mr. Obama had spoken by telephone with President Park Geun-hye of South Korea and Prime Minister Shinzo Abe of Japan, reassuring both of America’s support. Some American officials, declining to speak on the record, speculated that a dust-up last month over the treatment of an all-female band that North Korea sent to Beijing might have so angered Mr. Kim that he ordered the test to go ahead. Just before the band was supposed to perform, Mr. Kim declared that the North possessed hydrogen bomb technology. The Chinese, with no explanation, downgraded the level of officials scheduled to attend the performance, and the band then headed home without performing. “I know this sounds like a crazy reason to set off a nuclear test,” one American intelligence official said. “But stranger things have provoked North Korean action.” But it is far from clear that all the major players with a stake in what the North does are willing to take the kind of risks, and impose the kind of sanctions, that might prompt Pyongyang to back down or, alternatively, to lash out. Kelsey Davenport, director for nonproliferation policy at the Arms Control Association in Washington, argued that stiffening existing sanctions, while sending a political message, would be insufficient. “Ratcheting up sanctions pressure demonstrates that there is a cost to violating Security Council resolutions,” she said in an email. “However, sanctions alone are not going to change Pyongyang’s behavior. North Korea has complex illicit trafficking networks for evading sanctions, and not all countries in the region are adequately enforcing existing measures.” The one time the United States did clearly get the North’s attention was when it cut off bank accounts in Macau that Kim Jong-il, the father of the current leader, used to finance the lifestyle of the North Korean elite. But eventually, the Bush administration had to lift that sanction, partly under pressure from allies. On Wednesday, American allies engaged in a now-familiar set of rituals. Ms. Park convened an urgent meeting of her top national security aides in Seoul. Japan’s ambassador to the United Nations, Motohide Yoshikawa, told reporters after the Security Council meeting that his government expected the Council to adopt a robust resolution to check North Korea’s nuclear weapons ambitions. The American ambassador, Samantha Power, called for a “tough, comprehensive and credible package of new sanctions.” But the Russian ambassador, Vitaly I. Churkin, would say only that a “proportionate response” was necessary. For Mr. Kim, there was some domestic politics in all this. His Workers’ Party is scheduled to hold its first full-fledged congress since 1980 this May. With no big improvements in the lives of his people, he needs something else to show for his four-year rule. “The biggest achievement Kim Jong-un can offer ahead of the party congress is his nuclear program,” said Choi Kang, vice president of the Asan Institute for Policy Studies. “It also means that things don’t look good in the economic sector.”
NEWS-MULTISOURCE
Stop Sugar from Ruining Your Life The holiday season mean cookies, booze, parties, and SUGAR! Think your willpower's no match for sugar? Think again. You can overcome cravings and avoid falling victim to the dessert tray with these easy tips. First off, to get you motivated, let’s look at the ways sugar wrongs us. Sugar: • Suppresses your immune system • Is linked to cancers • Promotes weight gain and obesity • Disrupts the body's mineral balance • Contributes to depression, anxiety and mood swings • Promotes gut dysbiosis or overgrowth of bad bacteria, such as candida, in the gut • Contributes to insulin resistance and diabetes • Can cause hormonal imbalances • Increases risk for Crohn’s disease and ulcerative colitis • Can cause hypoglycemia • Will reduce good HDL cholesterol and increase bad LDL cholesterol • Prohibits weight loss You know how it is. Once you start in on the sweets, you can’t stop at one. You have another and another, then you crave sugar and think about it all day. It’s an evil roller coaster. Stay off it. Here's how:  1. Start your day with protein and good fats.  Avoid refined foods such as cereals, bagels, croissants, or pastries. These foods contain sugar or break down quickly into sugar, causing an initial blood glucose spike followed by a crash. When your blood glucose drops too low and you crave sugar, what you actually need is protein.  For breakfast, have an egg-veggie scramble, a protein smoothie, or organic chicken sausages sauteed with spinach and topped with avocado. 2. Eat every 4 hours to maintain stable blood glucose levels. Fill up on healthy foods periodically so you're never ravenous. And while you're at it: avoid refined sugars (the white granulated stuff). The more you eat sugar, the more you’ll crave it.  3. Save desserts for special occasions, not every day.  If you're going to indulge, stick to dark chocolate or truffles over high sugar candies, and bring treats that don’t contain refined sugars to parties. When baking, use unrefined sweeteners such as molasses, honey, or grade B maple syrup. I also love using xylitol, which doesn't feed intestinal bad bacteria or spike blood sugar.  4. Eat protein.  Before parties, eat a protein-based snack like organic turkey slices wrapped around avocado, hard boiled eggs, or apple with almond butter. Don’t show up ravenous! 5. Go easy on the booze.  Alcohol is metabolized as pure sugar and can lead to hypoglycemia, making you hungry, likely to overeat, and prone to making poor choices when you do eat. Drink water between cocktails and try to cap it at 2 drinks. Or, have a mocktail such as sparkling water with lime. Sugar cravings are more than just a lack of willpower.  There is a physiological reason you crave sugar, and once you’re on the rollercoaster, it’s hard to get off. Don’t feel like a failure if you blow it; all you need to do is get back on that sugar-free horse the next day.  Start off with 8 ounces of hot water and the juice of 1/2 a lemon to detoxify, and drink green vegetable juices (celery, parsley, green apple, cucumber, ginger makes a nice blend) to alkalinize the body. (Sugar is very acidic). Then stick to protein & veggies throughout the day. If you’ve got a really bad sweet tooth, here are some tips: • Have a cup of green tea. It may sound preposterous, but we sometimes mistake hunger or craving cues for thirst, and the minerals in green tea give you a boost.  • Have a protein snack instead of reaching for the candy. As I mentioned, when blood sugar is low, you actually need protein to stabilize blood glucose levels. • 500 mg – 1000mg of glutamine helps halt sugar cravings. Break open the capsules and empty under your tongue, then swallow with water. • Certain minerals like chromium arrest sugar cravings. You can often find them in blood sugar balance supplement blends with other herbs or nutrients that also help. Examples are gymnema, alpha lipoic acid, and cinnamon. Enjoy the holiday season! It’s OK to treat yourself every once in a while. Just save the treats for parties and special occasions.  You May Also Enjoy About the Author Mary Vance is a certified holistic nutrition consultant practicing in San Francisco. She specializes in women's health, thyroid health, and digestive wellness. Find her at the one of San Francisco's amazing farmers' markets, playing on the beach with her dogs, or creating gluten and dairy free deliciousness in the kitchen. Check out her website at www.maryvancenc.com  for recipes and informative articles on holistic nutrition and wellness. Comments Popular
ESSENTIALAI-STEM
CBS and Viacom, Long Split, Will Be Told to Consider Reuniting A month after a bitter fight over Viacom’s leadership was settled, the company may find itself pressed to reunite with its corporate sibling, CBS. National Amusements — which is owned by the billionaire Sumner M. Redstone and is the controlling shareholder in Viacom and CBS — plans to send letters to both companies, instructing them to consider a merger, people briefed on the matter said on Wednesday. The request would prompt CBS and Viacom to establish independent board committees to explore the idea, said the people, who spoke on the condition of anonymity. As of Wednesday evening, neither company had received such a letter. The instructions could be the first step toward joining the two media companies, which split in 2006 during a period of questions over leadership and the growth of both businesses. Their fortunes have diverged since then: CBS, buoyed by strong ratings at its television network, has enjoyed a rising stock price and support from investors. By contrast, Viacom has struggled as its cable networks like Comedy Central and MTV have suffered from slumping ratings. This year, Shari Redstone, Mr. Redstone’s daughter, clashed with Philippe P. Dauman, then Viacom’s chief executive, over the direction of the company in a bitter and unusually public battle. At one point, after changes were made on the boards of National Amusements and Viacom, there were legal battles in three states in the fight for control. Then in August, Mr. Dauman agreed to step down as chairman and chief executive. Even now, Viacom is experiencing turmoil and uncertainty about its future. Its interim chief executive, Tom Dooley, said he would step down in November, leaving the company in a position of having to find a permanent leader quickly. A CBS-Viacom deal would represent a solution of what to do about Viacom for National Amusements and the Redstone family. Mr. Redstone, who is 93 and in poor health, controls about 80 percent of the voting shares in Viacom and CBS through National Amusements, the private theater chain started by his father. “The easiest thing to do from Shari’s point of view is to convince Les and the board of CBS to do a deal,” said Mario Gabelli, whose investment firm, Gamco, is the second-largest voting shareholder in Viacom and CBS. He was referring to Leslie Moonves, the president and chief executive of CBS. Mr. Gabelli noted that any such deal would have to be handled carefully to comply with corporate governance matters, including the consideration of how a transaction would benefit shareholders of both CBS and Viacom and not just the Redstone family. Some analysts have said that a merger makes sense, creating a bigger company with greater negotiating clout over cable and satellite providers. They have also contended that Mr. Moonves, who has successfully guided CBS, could be better positioned to fix the issues at Viacom as the top executive overseeing both companies. “Today’s news represents the next chapter in a story that in our minds should have never occurred to begin with,” Michael Nathanson, an analyst with MoffettNathanson said in a research note. He said that a deal also would allow for the elimination of executive compensation and other overhead costs, producing savings of at least $400 million. But Mr. Moonves and other industry analysts have expressed doubt about a corporate reunion. A major issue, analysts say, is that CBS is a strong company on its own and Viacom could drag down its fortunes. “We are doing extraordinarily well on our own with our own assets,” Mr. Moonves said in an investor conference earlier this month after he was asked about a deal with Viacom. “We are never going to do something that is bad for CBS shareholders or the employees.” On Wednesday, a spokesman for CBS said in an emailed statement, “As we’ve said before, the CBS Corporation will always act in the best interest of all of its shareholders.” Representatives for Viacom and National Amusements declined to comment.
NEWS-MULTISOURCE
2005 FIBA Europe Under-16 Championship for Women Division B The 2005 FIBA Europe Under-16 Championship for Women Division B was the second edition of the Division B of the European basketball championship for women's national under-16 teams. It was played in Tallinn, Estonia, from 22 to 31 July 2005. Slovakia women's national under-16 basketball team won the tournament. Participating teams * (16th place, 2004 FIBA Europe Under-16 Championship for Women Division A) * (15th place, 2004 FIBA Europe Under-16 Championship for Women Division A) * (16th place, 2004 FIBA Europe Under-16 Championship for Women Division A) * (15th place, 2004 FIBA Europe Under-16 Championship for Women Division A) * (16th place, 2004 FIBA Europe Under-16 Championship for Women Division A) * (15th place, 2004 FIBA Europe Under-16 Championship for Women Division A) * (15th place, 2004 FIBA Europe Under-16 Championship for Women Division A) * (15th place, 2004 FIBA Europe Under-16 Championship for Women Division A) * (15th place, 2004 FIBA Europe Under-16 Championship for Women Division A) * (15th place, 2004 FIBA Europe Under-16 Championship for Women Division A) * (15th place, 2004 FIBA Europe Under-16 Championship for Women Division A) * (15th place, 2004 FIBA Europe Under-16 Championship for Women Division A) * (15th place, 2004 FIBA Europe Under-16 Championship for Women Division A) * (15th place, 2004 FIBA Europe Under-16 Championship for Women Division A) Preliminary round In the preliminary round, the teams were drawn into four groups of four. The first two teams from each group advance to the quarterfinal round (Groups E and F), while the third and fourth teams advance to the Classification round (Groups G and H). Quarterfinal round In the quarterfinal round, the teams play in two groups of four. The first two teams from each group advance to the semifinals; the other teams advance to the 5th–8th place playoffs. Classification round In the Classification round, the teams play in two groups of four. The first two teams from each group advance to the 9th–12th place playoffs; the other teams advance to the 13th–16th place playoffs.
WIKI
8.6. Prevent Include/Configuration File Access When developing web based applications, do not allow users to access (read) files such as the program include and configuration files. This data may provide enough information (e.g., passwords) to break into the system. Note that this guideline sometimes also applies to other kinds of applications. There are several actions you can take to do this, including: These approaches won't protect you from users who have access to the directories your files are in if they are world-readable. You could change the permissions of the files so that only the uid/gid of the webserver can read these files. However, this approach won't work if the user can get the web server to run his own scripts (the user can just write scripts to access your files). Fundamentally, if your site is being hosted on a server shared with untrusted people, it's harder to secure the the system. One approach is to run multiple web serving programs, each with different permissions; this provides more security but is painful in practice. Another approach is to set these files to be read only by your uid/gid, and have the server run scripts at ``your'' permission. This latter approach has its own problems: it means that certain parts of the server must have root privileges, and that the script may have more permissions than necessary.
ESSENTIALAI-STEM
Fix illegal-instruction test when S-mode is not implemented [riscv-tests.git] / isa / rv64mi / illegal.S 1 # See LICENSE for license details. 2 3 #***************************************************************************** 4 # illegal.S 5 #----------------------------------------------------------------------------- 6 # 7 # Test illegal instruction trap. 8 # 9 10 #include "riscv_test.h" 11 #include "test_macros.h" 12 13 RVTEST_RV64M 14 RVTEST_CODE_BEGIN 15 16 .align 2 17 .option norvc 18 19 li TESTNUM, 2 20 bad2: 21 .word 0 22 j fail 23 24 # Skip the rest of the test if S-mode is not present. 25 li t0, MSTATUS_MPP 26 csrc mstatus, t0 27 li t1, (MSTATUS_MPP & -MSTATUS_MPP) * PRV_S 28 csrs mstatus, t1 29 csrr t2, mstatus 30 and t2, t2, t0 31 bne t1, t2, pass 32 33 # Test vectored interrupts if they are supported. 34 test_vectored_interrupts: 35 csrwi mip, MIP_SSIP 36 csrwi mie, MIP_SSIP 37 la t0, mtvec_handler + 1 38 csrrw s0, mtvec, t0 39 csrr t0, mtvec 40 andi t0, t0, 1 41 beqz t0, msip 42 csrsi mstatus, MSTATUS_MIE 43 1: 44 j 1b 45 msip: 46 csrw mtvec, s0 47 48 # Delegate supervisor software interrupts so WFI won't stall. 49 csrwi mideleg, MIP_SSIP 50 # Enter supervisor mode. 51 la t0, 1f 52 csrw mepc, t0 53 li t0, MSTATUS_MPP 54 csrc mstatus, t0 55 li t1, (MSTATUS_MPP & -MSTATUS_MPP) * PRV_S 56 csrs mstatus, t1 57 mret 58 59 1: 60 # Make sure WFI doesn't trap when TW=0. 61 wfi 62 bad3: 63 .word 0 64 j fail 65 66 bad4: 67 # Make sure WFI does trap when TW=1. 68 wfi 69 j fail 70 71 # Make sure SFENCE.VMA and sptbr don't trap when TVM=0. 72 sfence.vma 73 csrr t0, sptbr 74 bad5: 75 .word 0 76 j fail 77 78 bad6: 79 # Make sure SFENCE.VMA and sptbr do trap when TVM=1. 80 sfence.vma 81 j fail 82 bad7: 83 csrr t0, sptbr 84 j fail 85 86 # Make sure SRET doesn't trap when TSR=0. 87 la t0, bad8 88 csrw sepc, t0 89 li t0, SSTATUS_SPP 90 csrs sstatus, t0 91 li t0, SSTATUS_SPIE 92 csrc sstatus, t0 93 sret 94 bad8: 95 .word 0 96 j fail 97 98 # Make sure SRET does trap when TSR=1. 99 la t0, 1f 100 csrw sepc, t0 101 bad9: 102 sret 103 1: 104 j fail 105 106 TEST_PASSFAIL 107 108 .align 8 109 mtvec_handler: 110 j synchronous_exception 111 j msip 112 j fail 113 j fail 114 j fail 115 j fail 116 j fail 117 j fail 118 j fail 119 j fail 120 j fail 121 j fail 122 j fail 123 j fail 124 j fail 125 j fail 126 127 synchronous_exception: 128 li t1, CAUSE_ILLEGAL_INSTRUCTION 129 csrr t0, mcause 130 bne t0, t1, fail 131 csrr t0, mepc 132 la t1, bad2 133 beq t0, t1, 2f 134 la t1, bad3 135 beq t0, t1, 3f 136 la t1, bad4 137 beq t0, t1, 4f 138 la t1, bad5 139 beq t0, t1, 5f 140 la t1, bad6 141 beq t0, t1, 6f 142 la t1, bad7 143 beq t0, t1, 7f 144 la t1, bad8 145 beq t0, t1, 8f 146 la t1, bad9 147 beq t0, t1, 9f 148 j fail 149 2: 150 4: 151 6: 152 7: 153 addi t0, t0, 8 154 csrw mepc, t0 155 mret 156 157 3: 158 li t1, MSTATUS_TW 159 csrs mstatus, t1 160 j 2b 161 162 5: 163 li t1, MSTATUS_TVM 164 csrs mstatus, t1 165 j 2b 166 167 8: 168 li t1, MSTATUS_TSR 169 csrs mstatus, t1 170 j 2b 171 172 9: 173 j 2b 174 175 RVTEST_CODE_END 176 177 .data 178 RVTEST_DATA_BEGIN 179 180 TEST_DATA 181 182 RVTEST_DATA_END
ESSENTIALAI-STEM
Hearts That Strain Hearts That Strain is the fourth studio album by English indie rock singer-songwriter Jake Bugg. The album was released on 1 September 2017. Bugg has said: "Albums take you into their own sealed world. This time around I just wanted to write the tunes and record them with great musicians". The album received mixed reviews from critics.
WIKI
U.S. Family Network U.S. Family Network, Inc. (USFN) was founded in 1996 by Ed Buckham, who also served as the organization's consultant. USFN was a tax-exempt 501(c)(4) corporation founded in Virginia, with its principal offices located in the District of Columbia in the same building as Buckham's consulting firm Alexander Strategy Group and Tom DeLay's political action committee Americans for a Republican Majority (ARMPAC). USFN received $500,000 from the NRCC and $1 million from lobbyist Jack Abramoff's Russian clients. Much of the money went to Buckham and his wife, Alexander Strategy Group, and a 15-year lease on a Washington Redskins skybox used by Abramoff. The group closed in 2001 while under a Federal Election Commission probe, distributing several hundred thousands of dollars in remaining assets among people associated with USFN. The townhouse was sold at below market value to U.S. Representative Jim Ryun (R-KS). The activities of USFN are under investigation by the Justice Department; a subpoena for USFN documents was issued in February 2006, naming Abramoff, Tony Rudy and his wife Lisa, Tom DeLay and his wife Christine, Buckham and his wife Wendy, Ralph Reed, and Grover Norquist. Financial connections with Jack Abramoff The U.S. Family Network was largely funded by clients of embattled lobbyist Jack Abramoff. Payments to the group of up to $1 million coincided with votes and other actions taken by Tom DeLay in Congress in favor of the "donors." Northern Marianas Islands tycoon Willie Tan, an Abramoff client, gave USFN $650,000. $364,500 in donations to USFN from firms associated with Abramoff were in turn given to the Alexander Strategy Group. DeLay's financial connections The Dubya Report reported April 20, 2005 (updated December 29, 2005), that in 1998, the Democratic Congressional Campaign Committee "filed a Racketeer Influenced Corrupt Organizations (RICO) lawsuit against DeLay and his fundraising operations. DeLay's operation had begun in 1994 when Newt Gingrich slashed DeLay's budget as House Whip. DeLay responded by setting up an organization of his own that would extend his power by contributing to the political campaigns of his colleagues. He hired tobacco lobbyist and anti-union activist Karl Gallant, and induced Enron's Ken Lay to contribute $500,000 to ARMPAC. Enron also came up with a $750,000 consulting contract for Gallant and DeLay chief of staff Ed Buckham. Buckham would later set up his own lobbying firm, the Alexander Strategy Group, which boasted DeLay's wife Christine, a retired schoolteacher, on its staff at a $40,000 a year salary. "Also named in the RICO suit was Robert G. Mills. Prior to running DeLay's 1996 campaign, Mills worked for the Council for Government Reform, from which he reportedly stole $35,000. Before that he had worked for United Conservatives of America, which was investigated by the Federal Election Commission who believed that UCA's huge debts were being used to hide illegal corporate donations. In 1998 Mills represented an organization called the US Family Network, registered as a 501(c)(4) 'social welfare' organization focused on Christian conservatives. Also on the staff of US Family Network was Ed Buckham's wife, at a salary of $59,000 a year. "By 1999 Mills had left US Family Network, but Buckham, an ordained minister remained. The Network made headlines as the recipient of the largest single donation the National Republican Congressional Caucus ever made, $500,000. The check was cut by Virginia Congressman and DeLay crony Tom Davis, NRCC chair, but was never approved by the executive committee. The RICO suit alleged that US Family Network existed to hide the source and control of donated funds. The Washington journal Roll Call speculated that the group also existed to make statements and take actions on behalf of (or in opposition to) candidates that the NRCC would be embarrassed to do directly. "The other 'associated organizations' named in the RICO suit were: the Republican Majority Issues Committee (RMIC), which, like US Family Network, was designed to provide (possibly) legal money laundering for political contributions, and Americans for Economic Reform. The suit alleged that DeLay and his cohorts were 'extorting' money from people with a stake in federal legislation." Robert Dreyfuss wrote in the February 4, 2000, Texas Observer that in Fall 1999, according to Roll Call, the NRCC gave the Network the $500,000 to "turn out conservative Christian voters on election day." Additionally, on April 28, 2000, the Texas Observer reported that the "editors at Roll Call hired a tax accountant and consulted industry and academic authorities. Yet no one could figure why a 'grassroots lobbying' political action committee linked to Tom DeLay has raised $1.3 million from only five donors – then spent the money to buy a D.C. townhouse and a truck (registered at Buckham's home), and to lease a skybox at the Redskins stadium for fifteen years. "Roll Call describe[d] U.S. Family Network as one of a 'web of interlocking groups revolving around DeLay and Ed Buckham, his former chief of staff and top political advisor.'" The firm Liberty Consulting, owned by Tony Rudy's wife Lisa, was paid $15,600 by the U.S. Family Network in 1999 and $10,400 in 2000. Nature of organization "The fifteen-year lease on the skybox suggests that the group is doing a different kind of grassroots lobbying. Frances Hill, a University of Pennsylvania professor, who studies the political activities of tax-exempt groups, seemed bewildered by the group’s lobbying. 'What I can’t figure out is what type of lobbying they are doing,' Hill said. 'Usually a (c)4 is going to do expertise-type lobbying, which includes studies, reports and press conferences and publicly disseminating information. . . . They may have invented a way to turn lobbying into an entertainment activity, rather than an information activity. Have they really found a way to make direct lobbying a means to maintain what looks like a slush fund?' "Hill also questioned the amount of money U.S. Family spent on fundraising: $665,863 in expenses in 1998, with 60 percent of it going to fundraising and consulting. In 1998 Buckham told Roll Call that he held the fundraising contract and raised money all over the country for U.S. Family. But fundraising in 1998 should not have been so labor-intensive and costly. One donor gave the group $1 million, and other large contributions included a $150,000, a $100,000, and two gifts of $50,000 – not the sort of contributions that require a big investment in mass mail and phone banks. 'They’re not mailing,' Hill said. 'They are going to the skybox. And one assumes that ordinary citizens are not going there.' (The PAC withholds the names of its donors.) The PAC’s mission statement on its tax return is the 'Promotion of social welfare for American Families' and funding projects to 'promote sound family values legislation.' The skybox, according to Thomas Susman, a lobbying law expert consulted by Roll Call, 'wouldn’t be grassroots.'" Registered lobbyists * U.S. Family Network, Inc. holds lobbyist ID Number 34945000 in the U.S. House of Representatives. * On July 27, 2001 the State of Pennsylvania issued a cease and desist order against the US Family Network, which was listed among those organizations that could not "legally solicit contributions in Pennsylvania until they register[ed] with the bureau or provide[d] the bureau with evidence that they are excluded or exempt from the law."
WIKI
Arabella Scott Arabella Scott (7 May 1886 – 27 August 1980) was a Scottish teacher, suffragette hunger striker and women's rights campaigner. As a member of the Women's Freedom League (WFL) she took a petition to Downing Street in July 1909. She subsequently adopted more militant tactics with the Women's Social and Political Union (WSPU). She was one of a group who attempted arson at Kelso racecourse in May 1913. She was arrested many times and went on hunger strikes when she was sent to jail. Whilst in Perth Prison in 1914, she was force-fed for an extraordinarily long time under the supervision of Dr Hugh Ferguson Watson, the only prison doctor in Scotland prepared to use this method. She was released under the controversial Cat and Mouse Act. WSPU activism ceased when the First World War began and Scott became a field nurse, later she married emigrated to Australia. She wrote about her experiences in her autobiography A Murky Past. Early life and education Arabella Charlotte Scott was born on 7 May 1886 in Dunoon, Scotland. Her mother was a teacher and her father served as a captain in the British army for more than 25 years. She graduated with an MA from the University of Edinburgh and went on to become a school teacher in Leith, living with her sister at 88 Marchmont Road in Edinburgh. Scott and her sisters were advocates for women's suffrage and were active speakers in Scotland for the cause, in particular at open air meetings, all over Scotland. Campaigning for women's suffrage Arabella Scott joined the Women's Freedom League during or before 1908. In the summer of that year and in the following year, she and her sister supported Hannah Mitchell's WFL campaigning in East Fife. She joined the group of WFL members taking a petition on women's suffrage to the British Prime Minister in Downing Street in 1909, which was the first time she was arrested. From 1909 to 1912, Scott continued to speak at open-air WFL meetings across Scotland. She then decided that the WFL was not going to achieve universal women's suffrage and joined the more militant Women's Social and Political Union both in Scotland and in the south of England, and was convicted of arson and other charges associated with militant action, and when in prison, Arabella Scott went on hunger strikes, and was awarded the Hunger Strike Medal. Arrests and hunger strike In July 1909, Arabella and her sister Muriel Scott were both arrested on the charge of obstruction in London after they tried to hand a petition to the Prime Minister H. H. Asquith, and were sentenced to serve 21 days at HM Prison Holloway. Arabella Scott was arrested and released several times over the following years, under the Prisoners (Temporary Discharge for Ill Health) Act 1913, known by suffragettes as the Cat and Mouse Act. The Act was brought in so that suffragettes could not die in prison due to hunger strikes, instead when they became too weak they were released on licence. They would be re-arrested at a later time to complete their sentences, if they did not return voluntarily or provide a current address and all Scottish police forces were informed of the need to find and arrest them, as per the case file. On the 6 April 1913, Scott was arrested for trying to set fire to a racecourse stand at Kelso Racecourse along with Agnes and Elizabeth Thomson, Edith Hudson, and Donald McEwan. Following their trial, at Jedburgh Sheriff Court on 19 May 1913, Arabella Scott, Edith Hudson and Donald McEwan were sentenced to nine months, Elizabeth Thompson, three months, and Agnes was released. They were imprisoned at Calton Gaol Edinburgh and the women went on hunger strike. Scott was released under the Cat and Mouse Act on 24 May but when her licence ran out she failed to return to Calton Gaol, as reported by the prison governor to the H.M. Prison Commissioners. Scott was caught on 12 June 1913 at the house of sympathiser Miss de Pass and rearrested, when she returned to Calton Gaol she went on hunger strike again. She only served a few days of her sentence, as on 16 June she was assessed as too weak by a medical officer and was released on licence again but did not return to the jail. Scott was found in London on the 24 August and returned to Calton Gaol where she went on hunger and thirst strike. On 28 August the medical officer put her forward for immediate discharge due to her health, however she had to be removed from the jail by force as she did not want to be placed on leave under licence once more. When she was released she worked as an organiser for the WSPU in the south of England. The licence expired on 10 September 1913, but Scott was not found until May 1914, again resisting arrest. Scott continued to work as an organiser for the Women's Social and Political Union in the Brighton branch under the name, 'Catherine Reid'. Scotland Yard and the Brighton Police both had to help the police that had come from Scotland to arrest Scott and return her to prison there, as she refused to walk and had to be lifted and dragged onto trains. She started her hunger and thirst strike on 2 May when she was arrested, and by 8 May was ill and allowed to leave the Calton Gaol under licence. On 17 May Scott departed for London so that she could help the WSPU campaign against the liberal candidate in the Ipswich by-election. She was due to return to jail on 22 May. She was found on 19 June during a raid at a suffragette house, where she was rearrested and forced to return to jail, this time in Perth Prison, where she was force-fed. Scott was given a Hunger Strike Medal 'for Valour' by WSPU. Force-feeding at Perth prison Scott was taken to Perth Prison on 20 June and released on 26 July 1914. Perth Prison was a gaol where suffragette prisoners were sent to be force-fed. She knew this as she had sent a bunch of sweet peas to Ethel Moorhead in March that year, when she had been suffering from this treatment and was eventually being released in health grounds. Despite an appeal to prison authorities by Janie Allan on Scott's own behalf, warning of dangerous protests during a royal visit if Scott was force-fed, she suffered force feeding throughout her imprisonment three times a day for a period of five weeks. She was not allowed visitors or letters during her imprisonment, and her mother was not informed of her whereabouts. Scott was also denied access to a lawyer or permission to write to the Secretary of State for Scotland, nor given access to a copy of the prison rules. All this was to prevent 'unnecessary excitement' that may have hampered her 'treatment'. Her autobiography, My Murky Past, was compiled and edited by her niece, Frances Wheelhouse, from taped interviews, and has the details which Scott used to describe a force-feeding tube being driven into her stomach as bits of her broken teeth washed around with blood in her mouth. When she vomited after it was removed, Watson would shout at her "You did that on purpose". Scott also recalled that one day Watson had said to her, "Look here, it's a pity, why don't you give it all away? The government would send you over to Canada and I would personally conduct you there." She replied, "That would be tantamount to saying that all this protest of mine was in vain and wrong and I would be giving in." Scott was once more released under licence under the Cat and Mouse Act. Her sister Muriel had manned a stall by the river during Arabella's imprisonment, giving out suffrage materials and alerting people to the suffering her sister was undergoing, and regularly gathered a crowd of 3,000 people outside the prison to support her protest by singing and shouting to her to encourage her. Public buildings and films shows were cancelled, and an extra fifty police sent to the city. One Sunday, women interrupted the service at St. Ninian's Church saying that whilst they prayed her sister was being tortured. Upon her release to recover at Charlotte Street, near North Inch, Perth, the Dundee Courier reported that she was in 'good bodily health' which they reported as an unfortunate outcome from the Suffragettes point of view as an ending to this 'performance'. Scott was released on 26 June 1914, two days before Archduke Franz Ferdinand was assassinated and the First World War began, with the UK joining by declaring war on Germany on 4 August. The WSPU announced a truce on militant acts, the Secretary of Scotland announced on 10 August the mitigation of all suffragette sentences passed in Scottish courts including Scott's. Later life Arabella Scott went on to serve as a field hospital nurse during the war. She later married and as Arabella Colville-Reeves, emigrated to Sydney, Australia. She became a member of the Australian branch of the Suffragette Fellowship and was proud of her past, encouraging girls she taught to stand up for their rights. She died on 27 August 1980. Dramatic representation A fictional account based on Arabella Scott's ordeal has since been dramatised by Ajay Close. The writer had researched the novel A Petrol-scented Spring, following her play Cat and Mouse created during a writer-in-residence in Perth. The details were based on Watson's reports held in the National Archives of Scotland and from the select transcripts of taped interviews with Arabella Scott, provided by Frances Wheelhouse. The play explores the chemistry and relationship between the suffragette and the doctor who force-fed her.
WIKI
If someone asks you what CBD is, what would be the answer? Something that helps you relax without producing a high? Something that offers multiple health benefits, but you’re not sure how? Not many people will say that ‘CBD is one of many compounds called cannabinoids that are found in the Cannabis Sativa L. plant’.  Even though we all know CBD, we still can’t define its benefits and why we should take it. To get a grip on the terms, you must first understand the cannabis plant, which is the foundation of everything. Let’s find out more! Cannabis and Hemp Nowadays, people get more and more interested in CBD and that’s why there are so many different CBD products. What might be confusing to consumers is whether CBD comes from hemp or cannabis. The short answer is that it comes from varieties of the Cannabis Sativa L. plant. The confusion about hemp CBD and cannabis CBD refers to the plant’s classification, name, and makeup. In general, hemp plants have higher levels of CBD while cannabis plants have higher levels of THC, which is what causes users to feel “high.” Cannabis plants come in three main varieties: C. Indica, C. Sativa, and C. Ruderalis. Additionally, a variety of hybrid plants exist that combine these three strains. Compared to hemp plants, these cannabis plants have far greater and more variable THC levels. Moreover, these plants tend to have lower CBD concentrations than hemp plants, in addition to higher THC levels. CBD producers tend to create their products using the hemp plant’s leaves and flowers. Hemp plants contain THC but in small amounts and you can find some processed hemp products, such as tinctures, gummies, or capsules, that can produce a feeling of euphoria. Difference between Cannabis CBD and Hemp CBD Both cannabis and hemp plants contain CBD and THC as well as more than 540 chemical substances. The amount of each compound in the two plants is what distinguishes them most from one another. Cannabis has less CBD, and more THC and hemp has less THC and more CBD. Another key distinction between CBD from hemp and CBD from cannabis is their legal standing. According to the 2018 Farm Bill, C. Sativa plants with less than 0.3% THC are defined as hemp or industrial hemp. Producers are permitted to legally grow it in the majority of the United States, except for three states. On the other hand, cannabis with 0.3% THC or more (also known as marijuana) may be outlawed depending on the state in which you live. This law prohibits the sale of products derived from plants with high THC content. However, CBD products with more than 0.3% THC are considered marijuana, making them illegal under federal law but legal in some states. CBD and THC Main Difference CBD is the second most prevalent cannabinoid derived from the hemp plant, but it’s not the same as marijuana. The endocannabinoid system, or ECS, is how cannabinoids like THC and CBD interact with the human body. The ECS is in charge of controlling physiological processes like sleep, the immune system, and mood. CBD and THC don’t have the same psychoactive effects. CBD is the non-psychoactive portion of the plant, meaning it doesn’t produce euphoria, unlike THC, which causes you to get high.  Uses of CBD You can find CBD in a wide range of products, including oils, extracts, vape pens, capsules, lotions, foods, and cosmetics. A topical CBD-infused oil, lotion, or cream can be your best bet if you’re looking to reduce inflammation and treat muscle and joint pain. As an alternative, CBD can enter the bloodstream directly through a CBC patch, tincture, or spray that you can apply under your tongue. Note that outside of the US, the prescription medication Sativex, which contains CBD as an active component, is authorized to treat cancer pain and muscle spasticity caused by multiple sclerosis. Lastly, Epidiolex has received approval in the US to treat specific forms of epilepsy and tuberous sclerosis. CBD Health Benefits CBD has been proven to treat a wide range of health conditions. The most significant scientific evidence supports the use of CBD for treating some of the cruellest childhood epileptic syndromes, such as Dravet syndrome and Lennox-Gastaut syndrome (LGS), which often don’t react to anti-seizure drugs. Numerous studies have shown that CBD can both lessen and, in some circumstances, completely stop seizures. The first cannabis-derived medication approved by the FDA for these diseases is Epidiolex. Self-reports, animal studies, and human research indicate that CBD may also be beneficial for: • Anxiety: Clinical studies have shown the ability of CBD to lessen stress. • Insomnia: According to studies, evidence suggests that CBD can produce a calming effect on the central nervous system. • Chronic pain: Additional human research must be done to support claims that CBD reduces pain. According to an animal study published in the European Journal of Pain, using CBD topically may help reduce arthritis-related pain and inflammation. Furthermore, the difficult-to-treat inflammatory and neuropathic pain may be inhibited by CBD, according to additional studies. • Addiction: CBD can help reduce cravings for tobacco and heroin under certain circumstances, according to animal and human studies. The studies suggest it may also help lessen cravings for alcohol, cannabis, and opioids. For people wishing to incorporate CBD into their lifestyle to balance their health and well-being, its health benefits and the fact that it does not produce a high have made it a highly tempting and legal alternative.
ESSENTIALAI-STEM
User:Jmtreybal Page name: Jason M. Treybal (jmTreybal) Reasons for the existence of this page: * Assigments * As a placeholder * Stuff Below is a google.com link Google Ports and Junk line - -Jmtreybal (talk)Jason
WIKI
Wikipedia:Reference desk/Archives/Humanities/2021 May 19 = May 19 = Waiting periods for remarriage after divorce Dmitri Mendeleyev was technically a bigamist, because he married his second wife less than 7 years after his divorce from his first wife. He was only a month or two early, but the law was the law. The priest whom he bribed to officiate was even defrocked for his involvement. Have any other countries (or their official religious institutions) imposed such a long waiting period between a divorce and remarriage? Also, if the divorced couple reconciled and wanted to have another go, would they have been subject to the same waiting period? -- Jack of Oz [pleasantries] 00:19, 19 May 2021 (UTC) * According to some interpretations of Islamic law, if a couple are divorced and want to remarry each other, the woman must marry a different man first (see Nikah halala). However, the general waiting period is usually only about 3 months in Islam (considered long enough to avoid any questions about paternity). AnonMoos (talk) 09:06, 19 May 2021 (UTC) * For which see Iddah. DuncanHill (talk) 13:48, 19 May 2021 (UTC) Clara Lemlich speech Is the full Yiddish-language text of Clara Lemlich's 1909 speech at Cooper Union extant? If so, could I please be pointed to it?I remember reading a book in secondary school that quoted her as saying "ondzer oynziger oysveg iz eyn zheneral-strayk", but I am unable to find this sentence, or any variation thereof, anywhere online. M Imtiaz (talk · contribs) 03:03, 19 May 2021 (UTC) * Quoted in the spelling "Unzer ayntsiger oysveg iz a zshneral strayk" here, apparently copied from an illustration in the book Brave Girl: Clara and the Shirtwaist Makers' Strike of 1909. A search for אונדזער איינציגער אויסוועג or "undzer eyntsiger oysveg" also returned no results. --Lambiam 10:38, 19 May 2021 (UTC) * The book illustration can be seen here. --Lambiam 23:37, 20 May 2021 (UTC) Mystery man in selfie In the news reports regarding the murder of Cooper Harris, I saw these specific selfies. They feature Cooper and his father, Justin Ross Harris. But another man is also looking into the camera. Is there a chance the mystery man might've recognized himself on YouTube?<IP_ADDRESS> (talk) 11:08, 19 May 2021 (UTC) * There is always 'a chance', but this question seems to be asking for speculation. -- Q Chris (talk) 11:18, 19 May 2021 (UTC) * Not really, but some of the librarians here on Wikipedia could be YouTube users, right? (Perhaps that mystery man could also be one, as well.)2603:7000:8100:BD38:98AE:7970:8360:BDB5 (talk) 03:04, 21 May 2021 (UTC) * How would any of us know, YouTube users or not, if that man even saw any of these videos (except in the pretty unlikely case that the person in question also visits this section of the RD, in which case he might know the answer but perhaps not be inclined to make it public)? --Lambiam 16:36, 21 May 2021 (UTC) * He may have seen himself on the national news, as well. Anything is possible.<IP_ADDRESS> (talk) 01:45, 23 May 2021 (UTC) * Supposing he did... what of it? ←Baseball Bugs What's up, Doc? carrots→ 02:15, 23 May 2021 (UTC) * He was probably attending the same Atlanta Braves baseball game as Justin and Cooper Harris. I could tell by the bleachers, and by the shirt he's wearing.2603:7000:8100:BD38:D870:5014:FEA2:5B58 (talk) 22:27, 23 May 2021 (UTC) * Where can we see those selfies? ←Baseball Bugs What's up, Doc? carrots→ 23:29, 23 May 2021 (UTC) * You may wish to try YouTube.<IP_ADDRESS> (talk) 07:04, 25 May 2021 (UTC) * That is not a very specific clue. --Lambiam 11:21, 25 May 2021 (UTC) * It is reasonable to conclude that the OP doesn't really want to know. ←Baseball Bugs What's up, Doc? carrots→ 14:55, 25 May 2021 (UTC) Battle of Verdun (film) Does anyone know if this has had a recent film made? I'm thinking, in the spirit of 1917, Beneath Hill 60 etc? ('Ils ne passeront pas', a tous ici! :) 2A02:C7F:F27D:7200:704A:E442:E8FF:E545 (talk) 18:39, 19 May 2021 (UTC) * There's a documentary about it noted here. I can't recall, nor can I find, any recent fictional films about the subject. -- Jayron 32 19:00, 19 May 2021 (UTC) * In geological terms, Verdun: Visions of History (1928) is "recent". Other than that, it seems to be rather quiet on the Western movie front. Clarityfiend (talk) 21:25, 19 May 2021 (UTC) * Another French documentary is listed on this page, called THE BATTLE FOR VERDUN (1988) directed by Rémi Laurent. I haven't been able to find it anywhere else and I suspect that the title in French differs somewhat. * As for dramatised versions, Verdun was a national trauma as well as a triumph and I suspect that French film makers have found it too difficult to do justice to. Britons have similarly avoided making fictional films about the First day on the Somme. Alansplodge (talk) 21:55, 19 May 2021 (UTC) * On the other hand, neither the Germans nor the Russians had any qualms about filmifying the Battle of Stalingrad. Clarityfiend (talk) 00:13, 20 May 2021 (UTC) * Good point. Perhaps the localised street fighting in Stalingrad better lends itself to film, but I have strayed into postulation. Alansplodge (talk) 10:32, 20 May 2021 (UTC) * I think the putative Rémi Laurent 1988 piece may in fact be a 1986 35 minute film by Bernard George which features Laurent. It is called Verdun, année 1916. DuncanHill (talk) 19:18, 20 May 2021 (UTC) * Not a full-length film in the sense you mean, but the Swedish band Sabaton, who specialise in (factually accurate) songs (and music videos) about military history, released a 4-minute video in 2019 about the Battle of Verdun, called Fields of Verdun. You can find it on their 'Sabaton' YouTube channel (linked above), while on their parallel 'Sabaton History' channel there are two 15-minute lectures/discussions about the battle hosted by history presenter Indy Neidell. Be warned, the music video (which depicts a German assault on French trenches) is rather graphic. {The poster formerly known as <IP_ADDRESS>} <IP_ADDRESS> (talk) 02:27, 20 May 2021 (UTC) * Another example (which I haven't watched) is Egon Günther's 1973 three-part East German TV movie adaptation of Arnold Zweig's 1935 novel Erziehung vor Verdun (Education Before Verdun]) ---Sluzzelin talk 17:55, 20 May 2021 (UTC) * A 2015 documentary may qualify as recent, Verdun, ils ne passeront pas. DuncanHill (talk) 19:23, 20 May 2021 (UTC)
WIKI
Page:The Green Bag (1889–1914), Volume 14.pdf/11 vi Coke, A Posthumous Work of Lord. Common Law, Christianity and the. Conditions in Island of Negros, Legal Constitution and Religion, The Contract, A Novel. Control of " Trusts," The Could Show it if Necessary Counsellor McCann (verse) Court, Animals in Court, Ghosts in Court of Claims, The Court of Louis XIV'., The Poison Drama at the (illustrated) Court of Porto Rico, The Supreme (illustrated) Court Room, A Kentucky CourtSj Military. See I>egal View of the Inquiry Granted to Rear-Admiral Schley, A. . . . . Courts of Bengal, Reminiscences of the Mafassal Law Crea'n, The Strange Case of Dr. .... Crime, A Sequence in ( illustrated) .... Criminal Trials, Early, IV .... Curious Nullity Suit of the Thirteenth Century, A Decision, A. Philippine Development of Trial by Jury,. Disputed Guardianship, A Question of Ditties, Legal (verse) Divorces while You Wait, European. Doctrina Placitandi (illustrated) .. pa<;b 58S 267 19 411 459 460 335 i75 264 Arthur William Barber W. F. Norris Solomon Mendels . Harry Earl Montgomery Jonas Jutton C B Palmer. M. E. E. Kerr. . . . .. John De Morgan .. 276 186 318 . . . . . Bculah Brylawski Amram. 99 337 426 36 386 383 . . .. 274 239 598 549 9 584. Enoch Johnson ... Andrew T. H. Gerald 11 . . . Sibbald Chapin t' ArtJiur F. Odlin E. C. Lawrence. Adolph Moses J. H. Beaie, Jr.. E. Allen Frost. . . Eagle Case, The Black. . Early Christian Law, Women under Early Criminal Trials, IV Early English Procedure. Early English Soap Laws, Quaint. . Editorial Department . . . 45.87, 149, 199, Edwards, The Wool-sack and Woolens iu the Reigns of the Earlier ... ', * . ... English Judicature, A Century of, XI, XII (illustrated) English Jury Box, The Humors of the ... English Law Reports, Cases from the Old. See Cases from the Old English Law Reports. English Prison Rules and Remission of Sentences for Good Conduct. English Procedure, Early English Soap Laws, Quaint Early European Divorces while You Wait Evidence, The Victim in. Evolution of the Ambulance Chaser, The ( verse Experience, A Strange Extradition . Lee M. Friedman. . R. Vashon Rogers . . . . M. E. E. Kerr. . Z. G. Smith , 297, 347- 397, 445- 497. 5 53. Fiction, The. Law as Treated in Fight for Primitive Rights, A. ., Final Trial of the.Sifton Murder Case, The Fleet Marriages France, How Torture was Abolished in France, The Judicial System of (illustrated) Allan R. Campbell . .364 Henry Burns Geer . . 486 . . . 600 Vincent Van Marter Beede. 234 George H. Westley . . 35 Lawrence Incell . . 527 L. G. Smith Van Vechten Veeder Lawrence Inocll 63 539 386 592 368 607 . 595 27. 7i . 228 John Miller . . . 605 M. E. E. Kerr. . . 592 L. G. Smith . . . 368 /. H. Beale, Jr. ... 9 Henry Burns Geer . .283 Z. G. Smith . . . 263 John De Morgan . 76 Lawrence Irwell . .314
WIKI
Water softeners do remove minerals like calcium and magnesium from your water, and these are minerals that your body needs. However, having them removed from your water won’t decrease your intake of these minerals, since your body does not usually get these minerals from water but instead from your diet. Let’s take a closer look. Which Minerals Are in Hard Water? Hard water is typically water that contains significant amounts of dissolved calcium, magnesium, and similar minerals. These are picked up naturally from the areas water has flowed over before it reaches your home. Having these minerals in your water can lead to film-like deposits left on your dishes or other surfaces. These chalky deposits may seem nothing more than annoying on dishes, but they can also build-up in your appliances and eventually cause them to need repairs or replacement. What Happens to the Minerals? Softening water does not fully remove calcium and magnesium from your water, but it neutralizes them by changing their form. How this is done depends on what sort of water softener you have. For example, water softeners that use salt utilize a process called ion exchange. This process essentially “trades” the calcium and magnesium for the soft mineral sodium. However, if you have a salt-free water conditioner, the process is a little different. Salt-free systems are referred to as water conditioners rather than water softeners because they don’t remove hard minerals from water. Instead, they condition water by chemically changing minerals such as calcium and magnesium so that they no longer attach to surfaces and create build-up. Is Added Sodium Bad for You? If you have a water softener that uses salt, it will add sodium to your water. The amount of sodium added depends on how hard your water is. Sodium in large amounts can be unhealthy, but luckily the amount added by water softeners, even for very hard water, is incredibly small. If you are concerned about the amount of sodium that’s healthy for you, or if you have a sodium restricted diet, contact your doctor before using a water softener. You can also consider using a salt-free system instead. Where Else Can You Get Healthy Minerals? Whether you have a water softener or a salt-free water conditioner, both will leave your water without the original hard minerals it previously contained. Some people worry that because of this they will have an unhealthy lack of these minerals in their body. However, as mentioned earlier, your body does not get its calcium and magnesium from your water. In water these minerals exist in an inorganic state, and your body cannot even digest them. Instead of worrying about these minerals in water, look at your diet to make sure that you’re getting a healthy amount of them. For example, digestible calcium is found in dairy products like milk. Magnesium is present in broccoli and many other vegetables. As long as you have a healthy diet with a variety of foods, you’ll get the minerals that you need. If you’re concerned about the amount of calcium and magnesium you’re consuming, talk to your doctor about a diet that’s right for you. If you would like more information about how water softeners and conditioners work, contact Clear Water of San Marcos, located in San Marcos, TX.
ESSENTIALAI-STEM