Document stringlengths 87 1.67M | Source stringclasses 5 values |
|---|---|
Volume 4, Issue 1, June 2020, Page: 17-20
Oncological Outcomes and Morbidity of Radical Cystectomy for Bladder Cancer: Experience of a Senegalese Centre
Aboubacar Traore, Urology-Andrology Department, De la Paix Hospital, Ziguinchor, Senegal
Cyrille Ze Ondo, Urology-Andrology Department, Aristide Le-Dantec Hospital, Dakar, Senegal
Alioune Sarr, Urology-Andrology Department, Aristide Le-Dantec Hospital, Dakar, Senegal
Babacar Sine, Urology-Andrology Department, Aristide Le-Dantec Hospital, Dakar, Senegal
Modou Ndiaye, Urology-Andrology Department, Aristide Le-Dantec Hospital, Dakar, Senegal
Abdoulaye Ndiath, Urology-Andrology Department, Aristide Le-Dantec Hospital, Dakar, Senegal
Yaya Sow, Urology-Andrology Department, Regional Hospital, Saint Louis, Senegal
Boubacar Fall, Urology-Andrology Department, De la Paix Hospital, Ziguinchor, Senegal
Babacar Diao, Urology-Andrology Department, Aristide Le-Dantec Hospital, Dakar, Senegal
Pape Ameth Fall, Urology-Andrology Department, Aristide Le-Dantec Hospital, Dakar, Senegal
Alain Khassim Ndoye, Urology-Andrology Department, Aristide Le-Dantec Hospital, Dakar, Senegal
Mamadou Ba, Urology-Andrology Department, Aristide Le-Dantec Hospital, Dakar, Senegal
Received: Feb. 5, 2020; Accepted: Feb. 28, 2020; Published: Mar. 10, 2020
DOI: 10.11648/j.ijcu.20200401.14 View 302 Downloads 72
Abstract
The purpose of this paperwork is to assess the oncological findings and the morbidity rate after complete cystectomy in our department. Patients and methods: We conducted a backward and descriptive study during a 80-month-period range from September 2011 to May 2018, in the Urology Department of Aristide Le Dantec Teaching Hospital standing as a referral structure in our country (Senegal). Results: Nineteen patients were included accounting for 13 men and 6 women corresponding to a sex ratio of 2. The mean age was at 58 years old (extremes range from 32 to 77 years old). Radical cystectomy consisted of an anterior pelvectomy and transileal cutaneous ureterostomy by Bricker approach in 6 women, a radical cystoprostatectomy with transileal cutaneous ureterostomy by Bricker approach in 12 men and a radical cystoprostatectomy followed by Studer orthotopic neobladder in 1 patient. Early post-operative morbidity consisted of one case of parietal suppuration (grade I), two cases of evisceration (grade IIIb), one case of digestive fistula (grade IIIb), and uroperitoneal peritonitis (grade IIIb) secondary to suture loosening of the uretero-ileal anastomosis (which occurred in the patient who had Studer neobladder). This patient died in resuscitation ward after surgical repair of the uretero-iliary anastomosis. Late complications were a case of acute pyelonephritis three months after cystectomy and a case of flanged occlusion. Two patients with urothelial carcinoma had received adjuvant chemotherapy using the M-VAC protocol. After an average follow-up of 15 months we recorded 13 deaths, three patients were lost of sight and three others respectively lived 4 years and 2 months, 5years and 8 months and 6years and 8 months after radical cystectomy. Mean overall survival was 15 months (4.2 to 25.8 months) with a median survival of 6 months. The only patient who had Studer neobladder died one week after cystectomy. The mean overall survival after previous pelvectomy was 17.2 months and that after cystoprostatectomy was 15.18 months. Conclusion: This work highlights the very poor prognosis of bladder cancers in our context linked to the advanced stage of tumours at the time of diagnosis, the rarity of endoscopic equipment essential for the diagnosis, treatment and monitoring of bladder cancers, the frequency of radiochemically resistant squamous cell carcinoma, the unavailability of chemotherapy in urothelial carcinoma to enable multimodal treatment, and the heaviness and complexity of radical cystectomy.
Keywords
Bladder Cancer, Cystectomy, Morbidity, Oncological Outcomes
To cite this article
Aboubacar Traore, Cyrille Ze Ondo, Alioune Sarr, Babacar Sine, Modou Ndiaye, Abdoulaye Ndiath, Yaya Sow, Boubacar Fall, Babacar Diao, Pape Ameth Fall, Alain Khassim Ndoye, Mamadou Ba, Oncological Outcomes and Morbidity of Radical Cystectomy for Bladder Cancer: Experience of a Senegalese Centre, International Journal of Clinical Urology. Vol. 4, No. 1, 2020, pp. 17-20. doi: 10.11648/j.ijcu.20200401.14
Copyright
Copyright © 2020 Authors retain the copyright of this article.
This article is an open access article distributed under the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0/) which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Reference
[1]
Rouprêt M, Neuzillet Y, Masson-Lecomte A. et al. Recommandations en onco-urologie 2016-2018 du CCAFU: Tumeurs de la vessie Prog Urol 2016; 27: Suppl. 1 S67-S92.
[2]
Diao B, Thiam A, Fall B, et al. Les cancers de vessie au Sénégal: particularités Épidémiologiques, cliniques et histologiques. Prog Urol 2008; 18: 445-558.
[3]
Boucher A. Anatomie topographique descriptive et fonctionnelle; Tome 4. L’abdomen, la région rétro-péritonéale, le petit bassin, le périnée, 1991.
[4]
. Benoit G, Giuiliano F. Anatomie chirurgicale et voies d’abords de la vessie –Editions techniques. EMC techniques chirurgicales –urologie-gynécologie. 41160, 1991, 9p.
[5]
Dandekar NP, Tonggaonkar HB, Dalal AV, et al. Partial cystectomy for invasive bladder cancer. J Surg Oncol 1995; 60 (1): 24-29.
[6]
Malavaud B. Complications for Radical Cystectomy. Impact of the American Society of Anesthesiologists Score. Eur Urol 2001; 39: 79-84.
[7]
Cherif M, Chakroun M, Bouzouita A, et al. Caractéristiques épidémiologiques du cancer de la vessie chez la femme en Tunisie. Afr J Urol 2016; 22: 71-75.
[8]
Mitropoulos D, Artibani W, Graefen M, Remzi M, Rouprêt M, Truss M. Reporting and grading of complications after urologic surgical procedures: an ad hoc EAU guidelines panel assessment and recommendations. Eur Urol 2012; 61: 341-349.
[9]
Irani J. Tumeurs urothéliales: épidémiologie du cancer de vessie. Prog Urol 2003; 13: 1207-1208.
[10]
Botto H. Remplacement de vessie après cystectomie radicale pour cancer: expérience de l'hôpital Foch. Mémoires de l'Académie Nationale de Chirurgie 2003; 2 (4): 14-19.
[11]
Lebret T, Herve JM, Lugagne PM, et al. Incidence et prise en charge des complications non urologiques après cystectomie pour cancer. Congrès de l'association française de l'urologie AFU 2001 (référence incomplète).
[12]
Zerbib M, Slama J, Bouchot O. Les dérivations urinaires, techniques chirurgicales 2ème partie. Prog Urol 2002; 12: 874-890.
[13]
Benchekroun A, El Alj HA, Essayegh H, et al. Tumeurs infiltrantes de vessie: étude rétrospective à propos de 225 cas. Ann Urol 2003; 37: 279-28.
[14]
Lebret T, Hervé JM, Yonneau L, et al. Etude de la survie après cystectomie pour cancer de vessie. A propos de 504 cas. Prog Urol 2000; 10: 553-560.
[15]
Frazier HA, Robertson JE, Dodger RK et al. The value of pathologic factors in predicting cancer-specific survival among patients treated with radical cystectomy for transitional cell carcinoma of the bladder and prostate. Cancer 1993 jun 15; 71 (12): 3993-4001.
Browse journals by subject | ESSENTIALAI-STEM |
vaza
Etymology
Ultimately from.
Noun
* 1) vase
Noun
* 1) (bird of the genus )
Etymology
From Proto-Finnic.
Noun
* 1) calf
Etymology
From.
Noun
* 1) calf
Noun
* 1) a trick a sequence in which each player plays a card and a winning play is determined
Etymology
From, from.
Noun
* 1) vase
Noun
* 1) vase (container used mainly for displaying flowers)
Etymology
From.
Noun
* 1) vase
Etymology
From.
Noun
* 1) calf | WIKI |
The Title of the Document Should Be Centered
The first paragraph begins here with a five-space indentation from the left margin which the machine instructs the line-printer to execute based on a "macro" pre-defined within the source code for Waterloo Script. The users also could define their own macros, but most ordinary users stuck to the pre-defined limits. All of this text would be printed as belonging to the paragraph because the computer would not encounter a period in the left margin unless a pre-defined command instruction followed it like this which would create an underscored like this within the paragraph but no line break because the ".us" instruction did not tell the machine to skip a line.
Time for a new paragraph, machine! We're almost done. But first, let's indent a block quote five spaces:
The contents of the block quote would keep being formatted five spaces from the left margin of the main text until the "indent" instruction was turned off.
This is one way to do that. Another is
The machine would ignore this one since it had no "indent" command in its memory.
Time to end this document. When you saved this document and sent the file to the printer, it passed through the computer again and the Waterloo Script program read the ".xx;" codes as instructions only to the printer--all else was reproduced as ASCII text. Unless, of course, you mistyped a command, even by as little as omitting the period in the left margin. In such a case, the printer would be told to treat the "command" as ASCII text. Much confusion resulted. Click here to see the commands removed and the text fully processed for the printer. | ESSENTIALAI-STEM |
A New Kind of ‘Hamilton’ Show, This Time on Lake Michigan
CHICAGO — Audrey Burcham and Grace Troelstrup got up at 5 a.m. Saturday to be sure they’d make it on time. By 7, three hours before a large “Hamilton” exhibition opened here, they were standing at the front of the line with their moms. Audrey, 12, was clutching an Alexander Hamilton doll as well as a hard-bound collection of inspirational tweets from Lin-Manuel Miranda and, of course, a Playbill; Grace, 13, was wearing a gold star “Hamilton” knit cap and toting “Hamilton: The Revolution,” the explanatory book known to fans as the Hamiltome. “We’re obsessed,” Audrey said. Grace nodded in agreement. “Hamilton is our life now.” Hamilfans (yes, that’s what they call themselves) have a lot of ways to engage with the juggernaut musical. There’s the show itself, of course, now playing in six productions in North America and Britain, with a seventh expected at some point in Germany, and the books and the app and the cast recording and the mixtape. But now “Hamilton,” created by Mr. Miranda, has taken a step that appears to be without precedent in the theater world. On an island in Lake Michigan (well, it’s called Northerly Island, but it’s really more of a peninsula attached to a popular park) the show has erected a huge shed in which it has created a high-tech exhibition that combines entertainment (a 3-D theater offers a rare you-are-on-the-stage view of Mr. Miranda leading the Washington cast in performing the show’s opening number), education (more than you probably want to know about the Articles of Confederation) and commerce ($25 for your very own pair of King George socks). The exhibition is a commercial venture, overseen by Jeffrey Seller, who is the musical’s lead producer, and designed by David Korins, who is the musical’s set designer. It has been capitalized for $13.5 million, according to a filing with the Securities and Exchange Commission — more than the cost of the original Broadway musical, which was $12.5 million. Tickets are $39.50 for adults, $25 for children and free for Chicago public school groups. The show is betting that interest in “Hamilton” remains so high, both among those who have seen the show and those who have not, that it can sustain the exhibition here for months and then move it to another location — San Francisco or Los Angeles are “logical options,” Mr. Seller said. It is built to tour, although it will require space — the exhibition occupies 35,000 square feet in a hangar-like structure that is 300 feet long and 100 feet wide — and expense: Moving it will take 80 trucks, compared to just seven to move a touring production of the show. The exhibition is starting in Chicago in recognition of the musical’s success here, where the first production outside New York opened in 2016, and the musical has now been seen by more people in Chicago than in New York. Among those who attended a ribbon-cutting on Friday was the mayor-elect of Chicago, Lori Lightfoot, who said she had seen the musical four times (once in New York, three times in Chicago), and was “blown away by everything about it.” The exhibition is a cousin to any number of museum-lite shows, often combining artifacts and fun-for-the-family activities in a selfie-conducive setting, that have been mounted in association with television shows (“Downton Abbey”), movies (“Jurassic Park”), games (“Angry Birds”) and musical groups (the Rolling Stones). Some are mounted at nonprofit institutions — within the last year, New York has seen museum exhibitions about David Bowie (at the Brooklyn Museum), Harry Potter (at the New-York Historical Society) and Tolkien’s Middle-earth (at the Morgan Library & Museum). But many are in less rarefied for-profit settings — at shopping centers, for example. Just this week, a “Hunger Games” exhibition is opening inside a casino hotel on the Las Vegas Strip. “Brands are looking to connect with consumers, and people are looking for an experience that is more than being on their phones all the time,” said Tom Zaller, the chief executive of Imagine Exhibitions, which helped conceive this project but is no longer working on it. “There have certainly been other ‘Hamilton’ exhibitions that museums have done, but your typical ‘Hamilton’ theater fan is probably less likely to go to a history museum than to hear Lin-Manuel Miranda tell them the story.” The immersive exhibition tracks the life of Alexander Hamilton, who was the nation’s first Treasury Secretary, from his childhood in the Caribbean to his fatal shooting on a dueling ground in Weehawken, N.J., and it also uses his life as a tool for exploring early American history. It follows the arc of the musical, but also delves into issues that are only lightly mentioned onstage — like the role of slavery in the economy of the Americas, including colonial New York, and offers information about soldiers of color, women at war and Native Americans. A room focused on the election of 1800 features silhouettes of those excluded from voting in early America, including women, enslaved African-Americans, Native Americans and poor whites. There are carnival-game-style exhibits that try to help visitors understand Hamilton’s concern with debt, banking, and manufacturing policy, and, inside a facsimile of George Washington’s wartime tent, there is a tabletop plan for the Battle of Yorktown featuring toy ships and soldiers that move by magnetization. There is a room with a spiral path to represent the hurricane that affected Hamilton’s early life, there are quotes about Hamilton from famous Americans and there’s a legacy area where visitors can write down their own wishes for America. “I have so many people come up to me and say, ‘I hardly knew anything about Hamilton, and I want to know more,’” Mr. Miranda said in an interview here. “This is for them.” There are, of course, many nods to the musical, including an audio guide narrated by Mr. Miranda and two other member of the original cast — Phillipa Soo and Christopher Jackson. The exhibition also has a soundtrack that will be familiar to fans — it’s a reorchestrated instrumental version of the show’s score, recorded in a Los Angeles studio by a 27-piece band. Scattered throughout are small white signs that correct historical inaccuracies in the musical. On the audio guide, Mr. Miranda refers to them as “tweaks to history” and “fun facts that set the record straight.” The most significant, given the debate in some circles over how the musical depicts its hero’s relationship to slavery, is a sign that says that “The real Hamilton wasn’t an abolitionist, but he did oppose slavery.” Mr. Miranda is straightforward about the fact that his musical is not precise history. In a welcoming video to the exhibition, he says, “I made a lot of things up,” and in the interview he said, “Don’t expect to pass a test on Argentinean politics by watching ‘Evita.’” The exhibition aspires to greater historicity. Joanne Freeman, a professor of history and American studies at Yale University, served as an adviser and narrates some of the audio; Annette Gordon-Reed, a professor of law and professor of history at Harvard University, served as a consultant. “There are two ways to respond to the musical — one is to say, ‘Everything is not accurate, and I don’t like that,’ and the other is to say, ‘Everything is not accurate, so come with me and let me tell you more,’” Professor Freeman said. “I’ve been studying this period for many decades, and I’ve never seen this kind of interest — people want to know more, and it’s a wonderful thing that the show wanted historians to come in and offer a responsible version of more.” Professor Gordon-Reed, who called the musical “fictionalized biography,” said the exhibition “attempts to tell the story in broader context.” “I imagine lots of young people will be there, and this will give them a more nuanced view of what happened in early America,” she said. Early attendees seemed impressed. Among those lined up for the opening were Alex Lipp, 19, of Chicago, and Cyandra Bennett, 19, of Sheldon, Ill. On Friday night, they had seen the musical in Chicago — Ms. Lipp cosplaying as King George and Ms. Bennett as Hamilton. And on Saturday morning, Ms. Lipp showed off a forearm tattoo with words from the show’s libretto, “History has its eyes on you,” while Ms. Bennett had the show’s signature star drawn in black makeup under her left eye. Because they were in the first group to move through the museum, they got an unexpected bonus — they spotted Mr. Miranda in the last room, and got a selfie with him. “It was surreal — I was shaking really hard,” Ms. Lipp said. As for the exhibition, she said, “There was literally nothing I didn’t like.” | NEWS-MULTISOURCE |
Alterkicks
Alterkicks were a Liverpool based five-piece band. They first came to attention when DJ Zane Lowe played their demo in November 2004.
They released their debut single, "Do Everything I Taught You" on Fierce Panda in 2005, and the limited release sold out. This led them to move to the bigger label Moshi Moshi for their second release "Oh Honey". Dermot O'Leary was impressed with their early singles and he invited the band to do a live set on his BBC Radio 2 show.
The band, who also had their own nightclub in Liverpool called "Little Big Man", were signed to B-Unique Records, and their single "On A Holiday" was released in November 2006. Their next single "Good Luck" was released in March 2007.
In August 2007, the band released their debut album, Do Everything I Taught You on B-Unique Records. The band split up on 30 October 2007. Band member Oli Hughes reportedly commented on the split in 2019, saying "I don't want to do down our punk-rock spirit, but basically, nobody bought our album and we couldn't be arsed after that."
Singles
* "Do Everything I Taught You" (Fierce Panda, March 2005) - UK No. 71
* "Oh Honey" (Moshi Moshi, Summer 2005)
* "On a Holiday" (B-Unique Records, November 2006)
* "Good Luck"
Albums
* Do Everything I Taught You (B-Unique Records, August 2007) | WIKI |
Promises, Promises (Dionne Warwick album)
Promises, Promises is the title of a 1968 album by Dionne Warwick, and her eleventh studio album. Like many of her previous albums, it was produced by the songwriting team of Burt Bacharach and Hal David. The album includes three songs from the musical Promises, Promises, for which Bacharach and David wrote the music and lyrics, and which would premiere a month after the album was released: the title song, "Whoever You Are (I Love You)" and "Wanting Things". The album also includes two other Bacharach/David compositions, "This Girl's in Love with You" (which had originally been recorded by Herb Alpert as "This Guy's in Love with You" earlier that year) and "Who Is Gonna Love Me".
The album includes songs from two other musicals of the time: "Where Is Love?" from Oliver!, and "Where Am I Going?" from Sweet Charity.
The title track reached the U.S. Top 20 and No. 7 Easy Listening during the late fall of 1968. "This Girl's in Love with You," the follow-up single, reached number seven in February 1969.
Personnel
* Dionne Warwick - vocals
* Burt Bacharach, Don Sebesky, Peter Matz - arrangements
* Phil Ramone - audio engineer
* Burt Goldblatt - art direction, cover design
* Michael Freeman - front cover photography | WIKI |
Sameer Thahir
Sameer C. Thahir ISC (born 7 November 1976) is an Indian cinematographer, screenwriter, producer and film director, who works primarily in Malayalam cinema.
He is a graduate of Maharajas College, Ernakulam. Thahir began his career assisting his mentors, fellow Indian Society of Cinematographers members Amal Neerad and Rajeev Ravi.
In 2007, he shot his first feature as an independent cinematographer when Amal Neerad turned to direct his debut film Big B.
Thahir's other credits include Aashiq Abu's film Daddy Cool (2009), Nidra (2012), Diamond Necklace (2012), Bangalore Days (2014), Thamaasha (2019) and Minnal Murali (2021). In 2017 Thahir received his first credit in Tamil Cinema with Soundarya Rajnikanth's comedy Velaiilla Pattadhari 2. In 2018, he was a cinematographer on Sometimes (2018).
Early life
Sameer Thahir is the son of Thahir Mattanchery, a production controller in Malayalam film industry. Thahir studied in Maharajas College Eranakulam. His mentors include Amal Neerad, Anwar Rasheed, and Rajeev Ravi.
Career
In 2007, Thahir made his debut with Big B, the first film directed by cinematographer Amal Neerad. Later, he made his directorial and writing debut with Chaappa Kurishu (2011).
In 2012, he handled cinematography for Siddharth Bharathan's Nidra and Lal Jose's Diamond Necklace. In 2013, Thahir directed a segment in the anthology film 5 Sundarikal. Later that year his second film as a director Neelakasham Pachakadal Chuvanna Bhoomi was released.
Thahir handled the camera for the 2014 movie Bangalore Days, directed by Anjali Menon. In 2015, he produced the movie Chandrettan Evideya under his banner Happy Hours Entertainments. He produced and directed Kali, starring Dulquer Salmaan in 2016. Sameer Thahir was the cinematographer of the 2017 Tamil movie Velaiilla Pattadhari 2 and Priyadarshan's Sometimes (2018). He was the producer of Sudani from Nigeria (2018) and Thamaasha (2019). Thahir also handled the cinematography of the latter.
Personal life
Sameer C. Thahir married his wife Neethu Thahir on 12 November 2013. | WIKI |
Sectarianism in Glasgow
Sectarianism in Glasgow takes the form of long-standing religious and political sectarian rivalry between Catholics and Protestants. It is particularly reinforced by the fierce rivalry between Celtic F.C. and Rangers F.C., the two largest Scottish football clubs sometimes referred to as the Old Firm, whose support base is traditionally predominantly Catholic and Protestant respectively. A 2003 report for Glasgow City Council indicated that people clearly believe "sectarianism is still prevalent in Glasgow", but that members of the public were divided on the strength of the relationship between football and sectarianism.
Origin
From roughly the 5th century AD, the local part of the Roman Catholic Church was the main religion in what is now Scotland, but after the Scottish Reformation, Scotland officially adopted Presbyterianism (the Church of Scotland) as its state religion. Due to economic hardship, especially following the Great Famine and during a period of rapid growth in the industrial towns of Scotland's Central Belt, many Irish Catholic emigrants settled in those industrial towns, with Glasgow attracting a particularly large number. This migration led to increased competition for employment and housing and, in some instances, antagonism and conflict between competing groups. In addition to this, religious discrimination and established social networks augmented the tension between Protestants and Catholics. Moreover, Irish Protestants also migrated to the same industrial towns in the Central Belt of Scotland.
Incidents
Deaths and serious assaults have been directly linked to sectarian tensions within the city. Many of these have occurred either before or after Old Firm football matches. The 1995 murder of Mark Scott, a Celtic fan, by Jason Campbell resulted in the formation of the anti-sectarianism charity Nil By Mouth.
In June 2003, after the publication of the Scottish Executive's Action Plan on Tackling Sectarianism in Scotland, Section 74 of the Criminal Justice (Scotland) Act 2003 was implemented. This set out the situations when a criminal offence was aggravated by religious prejudice.
In 2004 and 2005, sectarian incidents reported to police in Scotland increased by 50% to 440 over 18 months. Scottish Government statistics showed that 64% of the 726 cases in the period were motivated by hatred against Catholics, and by hatred against Protestants in most of the remaining cases (31%) - indicating that "religious" intolerance was evenly shared among Catholics and Protestants, as the two-to-one ratio of incidents was roughly the same as the size of those populations in the west of Scotland.
In the five years before 2011, annually there were between 600 and 700 charges of an offence aggravated by religious prejudice in Scotland.
Football
Sectarianism in Glasgow is particularly visible in the rivalry between the supporters of Glasgow's two main football clubs, Celtic and Rangers, together known as the Old Firm. One study showed that 74% of Celtic supporters identify themselves as Catholic, whereas only 10% identify as Protestant; for Rangers fans, the figures are 2% and 65%, respectively. At Rangers' Ibrox Stadium, the Union Flag and Ulster banner are often displayed, whilst at Celtic Park, the Irish tricolour is often displayed.
During the late 19th century, many immigrants came to Glasgow from Ireland, of whom around 75% were Catholic and around 25% Protestant. The foundation of Celtic, a club with a distinct Irish Catholic identity, was crucial in the subsequent adoption by Rangers of a Protestant, Unionist identity. From around the 1920s onwards Rangers had an unofficial policy of not signing Catholic players or employing Catholics in other roles. Particularly from the 1970s, Rangers came under increasing social and media pressure to change their stance, despite several of the club's directors continuing to deny its existence.
In 1989, Rangers signed Mo Johnston, their first major openly Roman Catholic signing in recent times whose transfer drew widespread attention not only due to his religion but as a former Celtic player, who had tentatively agreed to rejoin them before Rangers offered better financial terms and outbid their rivals. Johnston was the highest-profile Catholic to sign for the club since the World War I era, although several players of the faith featured prior to that point. Since Johnston's signing, an influx of overseas footballers has contributed to Catholic players becoming commonplace at Rangers. In 1999 Lorenzo Amoruso became the first Catholic captain of the club.
One Rangers spokesman used the term "90-minute bigot" to explain part of the problem of religious bigotry among supporters and suggested this bigotry should be dealt with first.
While the majority of Celtic fans are Catholic, some of the key figures in the club's history (Jock Stein, Kenny Dalglish, and Danny McGrain amongst others) have come from a Protestant background.
In recent times, both Old Firm teams have taken measures to combat sectarianism. Working alongside the Scottish Parliament, church groups, pressure groups such as Nil by Mouth, schools and community organisations, the Old Firm have endeavoured to clamp down on sectarian songs, inflammatory flag-waving, and troublesome supporters, using increased levels of policing and surveillance.
Both Celtic and Rangers have launched campaigns to stamp out sectarian violence and songs. Celtic's Bhoys Against Bigotry, Rangers' Follow With Pride (previously called Pride Over Prejudice) and the cross-club Sense Over Sectarianism campaigns have attempted to reduce the connection between the Old Firm and sectarianism.
In August 2003, Rangers launched its 'Pride Over Prejudice' campaign to promote social inclusion, which has urged fans to wear only traditional Rangers colours and avoid offensive songs, banners and salutes. This involved publishing the 'Blue Guide', known as the "Wee Blue Book", which contained a list of acceptable songs and was issued to 50,000 supporters in August 2007.
Research, however, suggests that football is unlikely to be the main source of sectarianism in Glasgow. An audit from the Crown Office in 2006 of religiously aggravated crimes in Scotland between January 2004 and June 2005, found that 33% of these were related to football. Given that 57% of religiously aggravated crimes in Scotland happened in Glasgow, at the very most approximately half of religiously aggravated crimes in Glasgow could have been football related in this period.
In 2011, Celtic staff and fans, including then-manager Neil Lennon, were sent suspected explosive devices and bullets. Subsequently, Dr John Kelly of University of Edinburgh suggested that "Recent events have buried the myth that anti-Irish Catholic bigotry no longer exists."
Orangeism and Irish republicanism
The Orangemen of Glasgow (members of the Protestant Orange Institution), parade in the city around the historic date of the Twelfth (12 July), commemorating the victory of King William of Orange's Williamite army over the deposed King James Stuart's Jacobite army at the Battle of the Boyne in 1690 following the Glorious Revolution two years earlier. Irish republican marches use much the same format to commemorate various important dates in the history of Irish republicanism, such as the Irish Rebellion of 1798 and the 1981 hunger strike. The two main Irish republican organisations in Glasgow are Cairde na hÉireann and the West of Scotland Band Alliance, both of which claim to represent Irish republicans in Scotland. These marches are often a source of tension (and are now subject to stricter controls as a result), with each side accusing the other of supporting Northern Ireland-based paramilitary groups such as the Irish Republican Army and Irish National Liberation Army or Ulster Volunteer Force and Ulster Defence Association.
According to The Review of Marches and Parades in Scotland by Sir John Orr, of the 338 notified processions in Glasgow in 2003 nearly 85% were from Orange organisations (Orr 2005, p. 67). A report into orange parades in Glasgow from Strathclyde Police in October 2009 highlighted the increased number of common, serious and racially motivated assaults associated with the marches. These included assaults against the police. There was also a rise in arrests for weapons possession, vandalism, breach of the peace and street drinking.
A series of developments during the 2010–11 football season has led to an intense public debate over the question of the nature and extent of religious sectarianism in Scotland. The Scottish National Party (SNP) government has responded with a new piece of legislation which has been widely criticised and has prompted some commentators to speculate about a political "own goal". Some commentators have suggested that the Irish roots of the problem in Scotland should be properly acknowledged, and that a possible way forward could involve cooperation between Scotland, Northern Ireland and the Republic of Ireland within the structures and procedures of the British–Irish Council (BIC).
Prevalence
Steve Bruce, who has studied the decline in religious adherence in Western Europe, says surveys comparing people's ideas about sectarianism with their actual day-to-day personal experience show that the perception of sectarianism is much stronger than its occurrence in reality, and that the city's problems with health, education and social exclusion are of much greater daily concern to most Glaswegians.
Bruce also found that less than a third of one per cent of murders in Scotland over nearly two decades had any sectarian motive, and those that did were the result of football allegiances, not religion or ethnicity. | WIKI |
PDF/A 문서 만들기 및 유효성 검사
PDF/A는 전자 문서의 보관 및 장기 보존에 사용하도록 전문화된 휴대용 문서 형식(PDF)의 ISO 표준 버전입니다. PDF/A는 글꼴 연결(PDF 포함과 반대) 및 암호화와 같이 장기간 보관에 적합하지 않은 기능을 금지하여 글꼴과 다릅니다.
PDF/A로 변환
다음 코드는 PDF을 PDF/A로 변환하는 데 사용되었습니다
package com.aemformscs.documentservices;
import java.io.File;
import java.io.FileOutputStream;
import java.io.InputStream;
import java.net.URL;
import org.apache.commons.io.IOUtils;
import org.apache.http.HttpEntity;
import org.apache.http.client.methods.CloseableHttpResponse;
import org.apache.http.client.methods.HttpPost;
import org.apache.http.entity.ContentType;
import org.apache.http.entity.mime.HttpMultipartMode;
import org.apache.http.entity.mime.MultipartEntityBuilder;
import org.apache.http.impl.client.CloseableHttpClient;
import org.apache.http.impl.client.HttpClients;
import org.apache.http.util.EntityUtils;
import com.google.gson.JsonObject;
import com.google.gson.JsonParser;
public class PDFAUtilities {
public String SAVE_LOCATION = "c:\\pdfa";
public void toPDFA(String postURL) {
HttpPost httpPost = new HttpPost(postURL);
CredentialUtilites cu = new CredentialUtilites();
String accessToken = cu.getAccessToken();
httpPost.addHeader("Authorization", "Bearer " + accessToken);
ClassLoader classLoader = DocumentGeneration.class.getClassLoader();
URL fileToConvert = classLoader.getResource("pdffiles/Address.pdf");
MultipartEntityBuilder builder = MultipartEntityBuilder.create();
builder.setMode(HttpMultipartMode.BROWSER_COMPATIBLE);
File pdfToConvert = new File(fileToConvert.getPath());
builder.addBinaryBody("inDoc", pdfToConvert, ContentType.create("application/pdf"), pdfToConvert.getName());
try {
HttpEntity entity = builder.build();
httpPost.setEntity(entity);
CloseableHttpClient httpclient = HttpClients.createDefault();
CloseableHttpResponse response = httpclient.execute(httpPost);
if (response.getStatusLine().getStatusCode() == 200) {
InputStream generatedPDF = response.getEntity().getContent();
byte[] bytes = IOUtils.toByteArray(generatedPDF);
File saveLocation = new File(SAVE_LOCATION);
if (!saveLocation.exists()) {
saveLocation.mkdirs();
}
File outputFile = new File(SAVE_LOCATION + File.separator + "pdfa.pdf");
FileOutputStream outputStream = new FileOutputStream(outputFile);
outputStream.write(bytes);
outputStream.close();
System.out.println("PDF was converted to PDFA and saved to " + SAVE_LOCATION);
} else {
String json_string = EntityUtils.toString(response.getEntity());
JsonObject responseJson = JsonParser.parseString(json_string).getAsJsonObject();
System.out.println("Could not convert to PDF/A - " + responseJson.get("message").getAsString());
}
} catch (Exception e) {
System.out.println("The message is " + e.getMessage());
}
}
}
PDF/A 유효성 검사
다음 코드는 주어진 PDF/A 준수 PDF의 유효성을 검사하는 데 사용됩니다.
public void validatePDFA(String postURL) {
HttpPost httpPost = new HttpPost(postURL);
CredentialUtilites cu = new CredentialUtilites();
String accessToken = cu.getAccessToken();
httpPost.addHeader("Authorization", "Bearer " + accessToken);
ClassLoader classLoader = DocumentGeneration.class.getClassLoader();
URL fileToValidate = classLoader.getResource("pdffiles/pdfa.pdf");
MultipartEntityBuilder builder = MultipartEntityBuilder.create();
builder.setMode(HttpMultipartMode.BROWSER_COMPATIBLE);
builder.addBinaryBody("options", GetOptions.getPDFAOptions().getBytes(), ContentType.APPLICATION_JSON, "options");
File pdfToValidate = new File(fileToValidate.getPath());
builder.addBinaryBody("inDoc", pdfToValidate, ContentType.create("application/pdf"), pdfToValidate.getName());
try {
HttpEntity entity = builder.build();
httpPost.setEntity(entity);
CloseableHttpClient httpclient = HttpClients.createDefault();
CloseableHttpResponse response = httpclient.execute(httpPost);
if (response.getStatusLine().getStatusCode() == 200) {
String json_string = EntityUtils.toString(response.getEntity());
JsonObject responseJson = JsonParser.parseString(json_string).getAsJsonObject();
System.out.println("Th document is - " + responseJson.toString());
} else {
System.out.println(response.getStatusLine().getStatusCode());
}
} catch (Exception e) {
System.out.println("The message is " + e.getMessage());
}
}
recommendation-more-help
4859a77c-7971-4ac9-8f5c-4260823c6f69 | ESSENTIALAI-STEM |
Why Physical Fitness is important?
In simple words, physical activity and exercise is essential for everyone. Children, teens, and adults of all ages need to perform physical activity habitually. Physical activity promotes healthiness, and keeps you active throughout all the phases of your life.
Understanding the positive effects of physical fitness and learning how dynamic you need to be can help you to hold fitness and strengthen your overall living standards. Here are some of the perks of regular physical activity that illustrate the significance of physical fitness.
1. Physical fitness helps to keep blood pressure in the hands. When you are fit, there are fewer chances of having any heart disease. Walking is considered to be the supreme way to stay fit.
2. Performing physical activity not only promotes our physical fitness but also makes us sentimentally healthier. It gives us meaning in life and lessens laziness and depression. When you are on a walk you will meet different people and this social interaction will keep you feeling good about yourself and your life.
3. Being fit means you will not be chubby or obese or not become those people who never exercise. Being overweight causes many problems, from shabby joints to heart disease and numerous problems in between. When you are healthy and fit, you will always feel confident and happier.
4. Without regular exercise, your body gradually loses its strength, endurance, and ability to function appropriately. It seems like the adage: "We don't stop playing because we grow old; we grow old because we stop playing". Physical activity helps to keep your body fit and makes you feel young. Exercise enhances muscle strength, which increases your ability to perform other physical activities.
5. Regular exercise helps to keep the doctor away. Too much sitting and other sluggish activities can increase the risk of heart diseases.
6. People who are at a healthy weight and physically active may live up to seven years longer than those who are not active and are overweight. And the major part is that those additional years are usually healthier!
7. Remaining active helps to avoid chronic illnesses and several diseases related to aging. Being active can help you:
• improve blood flow
• avoid bone loss that leads to osteoporosis
• improve your levels of good cholesterol
Thus, staying active and performing different physical activities is important for holding good health and wellness.
Make physical exercise a persistent part of your daily routine! Moreover, you need to motivate your family to be more dynamic and challenge yourself to fulfill daily physical activity goals. Play open-air sports with the whole family, go to the gym, or go hiking or cycling.
So what is the first thing you need to perform to get fit? Go for a walk and shop for the best fitness equipment to do exercise. For reliable and affordable fitness equipment TitanSports is always on top.
However, before starting any fitness activity, you need to consult your healthcare professional. | ESSENTIALAI-STEM |
Page:United States Statutes at Large Volume 61 Part 5.djvu/171
;il S I rt 'KNEIAL All{EE5MENT ON TAlIFFS AND TRAI ) C(T.30 1947 SCHEDULE I - CO}2QBALT{ OF AUSTRALIA Part IT (Continued) Auwtralian Tariff Item Number 179(D)(1 ) (r inued (o) Ex (d) 179(D)(2) (-) (b) (o) (d) 179(D)(4)(b) 179(D)(6) Description of Products Dymano Electric Machince (continued). Direct current and univcrsal machines (continued) Ex (4) (a) Other direct current aAd universal maclines, up to and including 20 k.w ., excluding electric starting motors and generators for motor vehicles ad val. - bictrio Motors under 1 hurse-powr when not integral parts of machines ad val. Static Transrormers n.e .i. - At voltages below 66,000 - (1) Up to and including 13,500 k.v.a. - (a) Constant current, of the type used in the serice system of street lighting ad val. (b) Other ad val. At a voltage of 66.000 - (1) Up to and including 1,000 kv,.a. ad val. At voltages above 66,000 - (1) Up to but not including 50 kv-a. ad val, Induction Coils for all purposes unless other- wise expressly provided for ad val. For the purpcses cf paragraph (2) of Item 179(D), kv.a. shall mean the k!v,a. rating determined in accordance with tho Australian Standard Speclficabion for the Electrical per- formance of Tranfo.nrsi for Power and Lianting (1931). Electric ourrent rectifier assemblies including transformers and control equipment inported with and for use .herewith:- (1) Up to and including 100 kw. ad val. Electric Fans of the propeller types, other than those of the type ordinarily used in offices and the household ad val. A171 Rato of Duty 25 per cent. 25 per cent. 10 per oent. 25 per cent. 25 per cent. 25 per cent. 25 per cent. 25 per cent. 25 per cent. - ---
� | WIKI |
Yuanhang Y6
The Yuanhang Y6 is a battery electric full-size sedan produced by the Chinese manufacturer Yuanhang Auto.
Details
Car has a grille-less design and a fastback shape, paired with frameless doors, hidden door handles.
The interior features a vertical 17 inch center console inch touchscreen, a 10-inch instrument cluster and a 70-inch Augmente Reality-HUD.
The Y6 supports fast charging, taking 30 minutes to charge from 20% to 80%. | WIKI |
HC-SR04
HC-SR04 ultra sonic sensor #
The HC-SR04 is a low-cost ultrasonic ranging sensor for measuring distance. The principle of ultrasonic sensor is similar to sonar or radar in which interpretation of echoes from radio or sound waves to evaluate the attributes of a target by generating the high-frequency-sound waves (around 40kHz). The transducer used for converting energy into ultrasound or sound waves with ranges above human hearing range is called an ultrasonic transducer. Each HC-SR04 module includes an ultrasonic transmitter, a receiver and a control circuit.
hc-sr04
Documentation for this sensor is available here. If you want to understand the details of how an ultra-sonic sensor for measuring distance works, you can have a look at this page from https://howtomechatronics.com.
Connecting to Arduino #
There are only four pins that you need to worry about on the HC-SR04.
hc-sr04
Code example #
/********************
* Program: HC-SR04 sensor tester
* Description: print distance to serial
********************/
#define ECHO_PIN 6
#define TRIG_PIN 7
void setup(){
Serial.begin(38400); // initialize the serial port
pinMode(TRIG_PIN, OUTPUT);
digitalWrite(TRIG_PIN, LOW);
pinMode(ECHO_PIN, INTPUT);
}
// Define a new function that reads and converts the raw reading to distance (cm)
float distance_centimetre() {
// Send sound pulse
digitalWrite(TRIG_PIN, HIGH); // pulse started
delayMicroseconds(12);
digitalWrite(TRIG_PIN, LOW); // pulse stopped
// listen for echo
float tUs = pulseIn(ECHO_PIN, HIGH); // microseconds
float distance = tUs / 58; // cm
return distance;
}
void loop(){
Serial.print(distance_centimetre(), DEC);
Serial.println("cm");
delay(1000); // ms
}
The raw source of the sketch example is visible here.
Enjoy!
2018 - Muhammad Ehsan, Mamour Diop & Congduc Pham | ESSENTIALAI-STEM |
Page:United States Statutes at Large Volume 102 Part 2.djvu/776
102 STAT. 1780
Animals.
16 USC 273b note. Environmental protection. Cultural programs.
PUBLIC LAW 100-446—SEPT. 27, 1988
ment, or agency of the United States, the person or persons so occup3ring or utilizing such lands and the heirs of such person or persons shall at that time be entitled to renew said leases, permits, or licenses under such terms and conditions as the Secreta^ of the Interior may prescribe, for the lifetime of the permittee or any direct descendants (sons or daughters) born on or before the enactment of Public Law 92-207 (December 18, 1971). Such grazing activities shall be subject to the following conditions: (a) Grazing will be based on active preference that exists on the date of this Act and no increase in animal unit months will be allowed on Park lands. (b) No physical improvements for stock use will be established on National Park Service lands without the written concurrence of the Park Superintendent. (c) Nothing in this section shall apply to any lease, permit, or license for mining purposes or for public accommodations and services or to any occupancy or utilization of lands for purely temporary purposes. (d) Nothing contained in this Act shall be construed as creating any vested right, title interest, or estate in or to any Federal lands. (e) The provisions of Public Law 97-341 are hereby repealed. (f) Grazing will be managed to encourage the protection of the Park's natural and cultural resources values. NATIONAL RECREATION AND PRESERVATION
For expenses necessary to carry out recreation programs, natural programs, cultural programs, environmental compliance and review, and grant administration, not otherwise provided for, $14,608,000. HISTORIC PRESERVATION FUND
Grants.
For expenses necessary in carrying out the provisions of the Historic Preservation Act of 1966 (80 Stat. 915), as amended (16 U.S.C. 470), $30,500,000 to be derived from the Historic Preservation Fund, established by section 108 of that Act, as amended, to remain available for obligation until September 30, 1990: Provided, That the Trust Territory of the Pacific Islands is a State eligible for Historic Preservation Fund matching grant assistance as authorized under 16 U.S.C. 470w(2): Provided further. That pursuant to section 105(1) of the Compact of Free A^ociation, Public Law 99-239, the Federated States of Micronesia and the Republic of the Marshall Islands shall also be considered States for purposes of this appropriation: Provided further. That $1,000,000 of the amount appropriated herein shall remain available until expended in the Bicentennial Lighthouse Fund, to be distributed on a matching grant basis aiter consultation among the National Park Service, the National Trust for Historic Preservation, State Historic Preservation Officers from States with resources eligible for financial assistance, and the lighthouse community. Consultation shall include such matters as a d^tribution formula, timing of grant awards, a redistribution procedure for grants remaining unobligated longer than two years after the award date, and related implementation policies. The distribution formula for fiscal year 1989 shall include consideration of such factors as—
� | WIKI |
Pinjar Power Station
Pinjar Power Station is a power station in Pinjar, on the northern outskirts of Perth, Western Australia and near the locality of Neerabup and the recently commissioned Neerabup Power Station. It is natural gas-powered with nine gas turbines that together generate a total capacity of 576 MW of electricity. Although the power station primarily burns natural gas, it can also burn diesel fuel.
The station was commissioned in 1989. It is used as a peaking power plant. | WIKI |
How is PRP better than medications?
Source Reference
PRP, or platelet-rich plasma, is a type of treatment that involves injecting a concentration of a patient’s own platelets into damaged or injured tissue in order to promote healing. Platelets are cells in the blood that are involved in the clotting process and also contain growth factors that can help stimulate tissue repair.
There is some evidence to suggest that PRP may be effective in reducing pain and improving function in certain conditions, such as tendon injuries, osteoarthritis, and muscle strains. However, the effectiveness of PRP treatment may vary depending on the specific condition being treated and the individual patient.
PRP may be considered as an alternative or adjunctive treatment to medications, but it is not necessarily better than medications in all cases. Medications can be effective in reducing pain and improving function in many different types of conditions. The decision to use PRP or medications (or a combination of both) should be based on the specific needs and circumstances of the individual patient, as determined by a healthcare provider.
Request an appointment at the following email address:
info@medadvisor.co
MedAdvisor
0 0 votes
Rating | ESSENTIALAI-STEM |
Talk:Tatyana Afanasyeva
Old talk
The dicussion below was copied from User_talk:DDima; I copy it down here to preserve it for posterity. JdH 02:10, 18 June 2006 (UTC)
Transcription problem Russian (Ukranian?) -> English
I was looking for a kindly soul who is a native speaker of Russian, fluent in English, and with perhaps some knowledge of Ukranian as well. And, most importantly, who is prepared to help me out with a transcription problem. The issue is: What is the correct spelling of Tatyana Alexeyevna Afanasyeva? When I search the internet I stumble over a zillion different spellings: Tatiana, Tatjana, Tatyana Alexeyevna Alexeevna Alexejewna Afanasyeva Afanassjewa Afnassjewa Afanaseva and all possible combinations thereof, and probably many more if I were to put some more effort into it. According to [http://www.pims.math.ca/~hoek/teageo/TEA.pdf Exercises in Experimental Geometry. 1931] and Die Grundlagen der Thermodynamik she spelled her own name "Tatjana Alexejevna Afanassjewa"; so that would be a good reason to stick to that. Except for one little detail: Her primary foreign language was German, so perhaps this would be the correct transcription in German but not in English? So I don't know; I give up. That's why I decided to ask for help from an expert, and I hope you are able to help me out, or at least point me in the right direction. Thanks a lot for any help you may be able to offer, JdH 04:25, 17 June 2006 (UTC)
* Hi, I'm not sure that I am an expert in this field, but I'd be glad to help you out. I believe the name should be translated into English, not German, even though her primary foreing language was German, because we are writing on the English Wikipedia. I really don't see any problem with the current article's name because it is how I would have translated it. Simple googling it gives us 225 possible matches (although I didn't google them all, and there might be many different Tatyana Alexeyevna Afanasyeva's...). Another thing that would help us determine the correct name would be her name written in Russian/Ukrainian, do you have it? Thanks, —DDima (talk) 15:57, 17 June 2006 (UTC)
* Thanks as lot for your help. Unfortunately googling on the existing name only serves to confirm what is in the present article. What is happening is that there are many copycat sites out there that simply copy whatever is in Wikipedia; that's why you find so many hits when you google with the present name. You may want to do a simple experiment to confirm that: Deliberately introduce a misspelling in some Wikipedia article, and watch that error proliferate all over the internet :-).
* Anyway, when I google for Russian spellings then what comes up with is Татьяна Алексеевна Афанасьева-Эренфест or Татьяной Алексеевной Афанасьевой-Эренфест; I am clueless of why there are two different spellings, perhaps one is Russian, the other Ukranian? Or is it perhaps a difference in grammatical case? Thanks again JdH 18:14, 17 June 2006 (UTC)
* Yes, I know that many other sites copy wikipedia material. But for the Russian spelling, it is in the nominative case and the second one is the genivtive case. If you have any more Russian/Ukrainian name problems I'd be happy to help.:)) Best Wishes, —DDima (talk) 01:49, 18 June 2006 (UTC)
It makes no sense at all to apply some bizarre concept of the "right" spelling of Tatyana Ehrenfest's maiden name when she herself chose how to spell it using the Roman alphabet during her lifetime:
(From the article:
"^ T. Ehrenfest-Afanassjewa, Die Grundlagen der Thermodynamik (Leiden 1956)"
"^ T. Ehrenfest-Afanassjewa, On the Use of the Notion "Probability" in Physics Am. J. Phys. 26: 388 (1958)" )
As for the "little detail" about her having spelled her name in German, not English: This is a red herring. There are entirely standard ways of writing German word in English, but the only changes used are connected with how to render in English diacritical marks like the umlaut. In the case of Afanassjewa's name, there are no changes, period.
There is no justification for changing her own spelling of her own name.Daqu (talk) 02:24, 13 December 2008 (UTC)
Mathematics education - request for reference
You added Tatyana Alexeyevna Afanasyeva to the list of mathematics teachers in the mathematics education article. Do you have a reference that shows that Afanasyeva worked as a mathematics teacher ? I have looked at her article and the linked biography, and I can't see her described anyhwere as a teacher. An anonymous editor (possibly yourself while not logged in ?) has added an external link to the list entry that links to a translation of a booklet by Afanasyeva that discusses the theory of teaching mathematics, but I don't think she claims to be a teacher herself. Gandalf61 12:52, 19 June 2006 (UTC)
* The biography at CWP at physics.UCLA.edu mentions explicitely that she went to a pedagogical school.
* Tatyana Afanasyeva was at the center of the debate of how to teach geometry in high-school, and she was a vocal advocate for using visual aids. Traditionally, geometry was/is taught in a strict formal way, and she was concerned that students would get frustrated by that early on and give up on math all together. At that time (= interbellum) the "old school" prevailed, but her ideas were picked up and implemented later on. She was also involved in developing a mathematics curriculum for high schools in the newly established Sovietunion. I feel that an article on mathematics education is hardly complete without paying at least some attention to this great debate.
* There are many sites that refer to that debate, see e.g. Hans Freudenthal, Eduard Jan Dijksterhuis
* About Teaching Geometry,
* Teaching Mathematics: A Brief History
* thesis Ed de Moor
* Bronteksten discussie Afanassjewa/Dijksterhuis
* thesis Nellie Verhoef, Chapter 2
* Fred Goffree Wiskundedidactiek in Nederland
* Verum, pulchrum, bonum
* Jan van de Craats, Honderd jaar wiskundeonderwijs
* Aad Goddijn en Martin Kindt, Knelpunten en toekomstmogelijkheden voor de wiskunde in het VO
* Interview Pierre van Hiele, Ik liet de kinderen wél iets leren
* slides cursus wikkundeonderwijs
* Thuis in Brabant, biografie Dijksterhuis, Eduard Jan (1892-1965)
* Ehrenfest-Afanassjewa, Tatiana
* Het 'gelijk' van Tatiana Ehrenfest-Afanassjewa
* Geometry and Proof at Year 10
* M. Marjanovic MATHEMATICS AND HANDS ON METHODS
* Zahlbegriff, zwischen dem Teufel und der tiefen See
* Geometry between the devil and the deep sea
* Terug naar Euclides
* Up to now I have stayed away from including a discussion of this issue in the biography of Afanasyeva, basically because teaching is not my area, and I was hoping that someone more qualified would pick this up. JdH 13:58, 19 June 2006 (UTC) (the paragraph above was moved here from User_talk:JdH JdH 09:03, 18 March 2007 (UTC)
Birth place
The lead currently reads: Afanasyeva was born in Kiev, Ukraine, then part of the Russian Empire.
However, at the same time, Ukraine during World War I reads: Upon the outbreak of World War I, the name Ukraine was used only geographically, as the term did not exist nationally. The territory that made up the modern country of Ukraine was part of the Russian Empire […]
And indeed, Kiev was the capital of the Kiev Governorate (itself part of the Russian Empire) until shortly after the Soviets came to power.
Thus I wonder what’s the usual way to refer to birth places which have changed sovereignty over the time?
TIA.
— Ivan Shmakov (d ▞ c) 12:53, 21 March 2014 (UTC) | WIKI |
Janelly Farías
Janelly Farias Rodríguez (born February 12, 1990) is a professional footballer who plays as centre-back for Liga MX Femenil club Juárez. She participated in Exatlón Estados Unidos season 1 and was a commentator/analyst for the 2019 FIFA Women’s World Cup for Telemundo. She uses her platform to promote inclusivity and advocate for LGBT+ persons. Born in the United States, she represented the Mexico women's national football team.
Club career
After publicly coming out as lesbian while playing college soccer, the rejection she suffered from her family originally led her to quit football. After a few years, however, during which her family gradually reconnected with her and in which she was inspired by the 2015 FIFA Women's World Cup, she made the decision to return to the sport.
On 28 June 2019, Farías joined Liga MX Femenil side CD Guadalajara.
International career
Farías represented Mexico at the 2006 FIFA U-20 Women's World Championship. She made her senior debut on 1 April 2007. She is currently on the full women’s Mexico national team and looking to participate in the 2020 Olympic qualifying CONCACAF TOURNAMENT.
Personal life
Farias is openly lesbian. She actively advocates for equality and uses her platform to promote visibility and empowerment for the LGBT+ community. In October 2020, she led a talk for Harvard University titled "Navigating the Borders of Gender, Culture, Language, and Sexuality in Sports and Beyond." | WIKI |
1995–96 Frauen-Bundesliga
The 1995–96 Frauen-Bundesliga was the sixth season of the Bundesliga (women), Germany's premier football league. It was the first season in which 3 points were awarded for a win. Previously the traditional 2 points were awarded for wins. In the final the runners-up of the divisions met. TSV Siegen from the north defeated SG Praunheim 1–0 to win their sixth championship.
Group South 1
SC Siegelbach renounced the right to participate in the qualification for the Bundesliga. Replacement Rot-Weiß Göcklingen received no license to participate, because they returned the necessary documents late.
Group South 2
FC Oster Oberkirchen and SV Dirmingen renounced their right to participate in the qualification. | WIKI |
Talk:Freeway Ricky Ross
Untitled
I removed that section on Iran-Contra etc. because, not only was it not substantiated, the text itself stated that that section contained highly speculative and unsubstantiated facts. Any section starting with "Many people believe..." is going to be troublesome per WP:Verify. —The preceding unsigned comment was added by Deville (talk • contribs).
Yes, it is unsubstantiated but that is because it is a theory. Are you going to try to remove all conspiracy theories from wikipedia? The fact that this theory is a popular one means that it has a place in the article. Wousifou7 18:40, 12 March 2006 (UTC)
Shaw1990 (talk) 22:56, 1 April 2009 (UTC)What i don't understand is how people could find this man a hero when he caused a great deal of problems in his own community. I have heard his story and listened to some of the good things he did for children in south central, should his actions of trafficking a drug that had dyer effects on the whole black race cancel that out? what does everyone else think?
iran-contra section desperately needs wikifying. Dyukanon 04:25, 28 November 2006 (UTC)
the theory could be given some credence, as it has been featured in commentary (mainly the American Gangster series on BET), and has several reputable sources backing it... A theory like this should definitely be thoroughly cited though...
Iran-Contra Section
There's certainly no shortage of evidence to substantiate the claims made in the section. If anything, I think that one would contend that it holds back too much given the Commission report & the CIA internal investigation report. I've labelled it as needing citation, however, which I feel is appropriate.
Yes, it's somewhat shocking for those who aren't familiar with the history (the concept that the Reagan Administration would use drug money to fund an illegal terrorist war ''See Nicaragua v. United States'), but it happens to be backed by overwhelming documentary evidence. So, let's be cautious about deleting content -- even if it's one's natural kneejerk reaction -- without first doing the necessary research. <IP_ADDRESS> 07:46, 3 December 2006 (UTC)
* This is backwards. Wikipedia's community processes and standards stipulate – and Wikipedia's success requires – that editors refraining from ADDING content without first determining that it is verifiable and citing reliable sources. Also please note the No original research requirement. Seanjsavage (talk) 17:52, 3 April 2024 (UTC)
A kazillion crack rocks, huh?
I don't have the relevant quote in front of me so I won't presume to edit the article, but ...
Birthday or anything
valid dates would be cool, born n' raised baby
I agree! What day and year was he born? —Preceding unsigned comment added by <IP_ADDRESS> (talk) 09:01, 8 January 2008 (UTC)
It says he was born on May 3rd 1960.. In the video on the right, his introduces himself with the birthday of 1/26/60. —Preceding unsigned comment added by <IP_ADDRESS> (talk) 19:31, 27 July 2010 (UTC)
Found one of the sources
Just saw the American Gangster piece, and it seems to be the source of a lot of the claims made here. I tried to list them as references, but I'm new at this, so I think I didn't do it exactly right. If anyone wants to clean it up, that would be awesome :) Wandering Star
Redirects needed/article retitling
Ricky Donnell Ross - Freeway Ricky Ross ~ender 2008-04-07 18:49:PM MST Rick Ross babymother had a pretty baby girl named Paige —Preceding unsigned comment added by Paige3434 (talk • contribs) 02:16, 20 June 2009 (UTC)
RICK ROSS MADE 3 MILLION A DAY, NOT A WEEK
you guys made a slight mistake here he said himself in this interview the he made $3 M a day at the height of his career. Fix it.
Go to 1:50 of the video clip, he says it in his own words.
http://www.youtube.com/watch?v=FTmLDzxMI1M&feature=channel —Preceding unsigned comment added by <IP_ADDRESS> (talk) 03:44, 19 November 2009 (UTC)
Rick Ross was a Drug Kingpin not a Drug Trafficker
The Disambiguation is incorrect, it should be Drug Kinpin not drug trafficker. A trafficker does not have the network of a kingpin. Rick Ross is one of the premier kingpins in American History.
Drug Kingpin not Drug Trafficker describes both his operations size and was the proper charging statute.
http://www.jstor.org/pss/1599910
Q.What is The Drug Kingpin Statute? A: The Continuing Criminal Enterprise Statute (commonly referred to as CCE Statute or The Kingpin Statute) is a United States federal law that targets large-scale drug traffickers who are responsible for long-term and elaborate drug conspiracies.
Early Life
WOW!!! I don't even know what to make of all that... I mean is there even one sentence that actually gives meaning? To anything???--The REAL Teol (talk) 21:57, 13 May 2011 (UTC)
Ross-related documents
WhisperToMe (talk) 23:29, 14 December 2013 (UTC)
* From Talk:Gary Webb/DarkAllianceArchives - selected documents from: Library - http://archive.is/dYtfc - http://www.webcitation.org/6KmWFTkGj (includes transcripts of audio files and descriptions of pictures)
* Statement regarding Ricky Ross (Aug. 12, 1994) - http://archive.is/o4lUZ - http://www.webcitation.org/6L2ACLJzH
* Excerpts from court transcripts of Rick Ross on trial (March 6, 1996) - http://archive.is/5mFsk - http://www.webcitation.org/6LrojEoZL
* Excerpts from court transcripts of Rick Ross on trial (March 7, 1996) - http://archive.is/hg9rW - http://www.webcitation.org/6LrouaHa3
* "Copy of a document referred to as Project Sahara." - Page says: "Project Sahara is a report written by a former Bell Police Officer detailing the debriefing of confidential reliable informant(s). The document contains information which contradicts the premise that Danilo Blandon was Ricky Ross' initial primary supplier." - http://archive.is/48uO7 - http://www.webcitation.org/6Kn8eFEAc
* "Copies of correspondence involving Gary Webb and Ricky Ross." - http://archive.is/Esvo4 - http://www.webcitation.org/6Kn8XR8OL
* http://web.archive.org/web/19970409180631/http://www2.sjmercury.com/drugs/photos/evidence.jpg (DEA photo) - http://archive.is/seZFG - http://www.webcitation.org/6LrvkWJTA - Stuff Blandon tried to sell to Ross
* http://web.archive.org/web/19970409180631/http://www2.sjmercury.com/drugs/photos/ross.jpg (Mercury News/Patrick Tehan photo) - http://www.webcitation.org/6LrvpGwUo
* http://web.archive.org/web/19970409180631/http://www2.sjmercury.com/drugs/photos/ross3.jpg (Dorsey High School yearbook photo) - http://archive.is/xAMwM - http://www.webcitation.org/6Lrvyezun
* http://web.archive.org/web/19970409180631/http://www2.sjmercury.com/drugs/photos/truck.jpg (DEA photo) - http://archive.is/8YlE1 - http://www.webcitation.org/6LrwSNqn1 - Ross's truck
Interview removed from external links, why?
""Freeway" Rick Ross; 22:18 . . (-90) . . AuthorAuthor (talk | contribs) (Undid revision 620050127 by GangofOne (talk) YouTube not a reliable source)" How can an interview of the man himself be unreliable? GangofOne (talk) 04:16, 7 August 2014 (UTC)
External links modified
Hello fellow Wikipedians,
I have just modified 1 one external link on "Freeway" Rick Ross. Please take a moment to review my edit. If you have any questions, or need the bot to ignore the links, or the page altogether, please visit this simple FaQ for additional information. I made the following changes:
* Corrected formatting/usage for http://www.pbs.org/newshour/bb/race_relations/july-dec96/cia_11-18.html
Cheers.—cyberbot II Talk to my owner :Online 13:52, 24 April 2016 (UTC)
Requested move 16 March 2023
The result of the move request was: moved to Freeway Ricky Ross. Two agreed on no quotes, with the other two offering different quotation schemes, so I'm choosing the former. If anybody would like to revisit the quotation marks, per WP:OTHEROPTIONS WP:NOTCURRENTTITLE a new RM can be opened. (closed by non-admin page mover) ASUKITE 14:32, 24 March 2023 (UTC)
Ricky Ross (drug trafficker) → Ricky Ross – WP:PRIMARYTOPIC. He is the most notable Ricky Ross, as he is a former drug kingpin. Since he is the primary topic of "Ricky Ross", it should be moved to that. Jennytacular (talk) 03:59, 16 March 2023 (UTC)
* Comment Article was at the stable title "Freeway" Rick Ross until it was moved without discussion a couple of months ago. 162 etc. (talk) 05:28, 16 March 2023 (UTC)
* Move to "Freeway" Rick Ross per 〜 Festucalex • talk • contribs 05:52, 16 March 2023 (UTC)
* Move to "Freeway Rick" Ross. I think the lede has this correct. It is likely that some people just called him "Freeway", but he became publicly known after Gary Webb's reports in which he was called "Freeway Rick" and he refers to himself on his website as "Freeway Rick". Here are some of the various permutations of his name that can be found in sources; some of the more notable ones are linked:
* Rickie Donnell Ross: ROSS v. ROBERTS II (2013)
* Rick Donnell Ross
* Rickey Donnell Ross
* Rick Ross
* Ricky Ross: USDOJ/OIG Special Report, The Hitz Report/CIA IG report
* Freeway Rick Ross: Used on official website
* Freeway Ricky Ross: Name of official website
* Rick Freeway Ross
* Ricky Freeway Ross
* "Freeway" Rick Ross: Official Instagram
* "Freeway" Ricky Ross: Nick Shou's book, House report, ROSS v. ROBERTS II (2013)
* Rick "Freeway" Ross
* Ricky "Freeway" Ross
* "Freeway Rick" Ross: Used on offical website, Gary Webb's book
* "Freeway Ricky" Ross
* -Location (talk) 13:09, 16 March 2023 (UTC)
* Support Freeway Ricky Ross, some references list him without quotation marks which I think looks cleaner.--Ortizesp (talk) 16:28, 16 March 2023 (UTC)
* Support Freeway Ricky Ross. We try to avoid quotation marks in article titles. -- Necrothesp (talk) 14:18, 22 March 2023 (UTC) | WIKI |
Thursday, May 30, 2024
Ultimate Guide to Finding the Best 12 Volt 150ah Battery
When powering your electronic devices, having a reliable and high-performance battery is essential. One type of battery that has gained popularity is the 12-volt 150-ah battery. These batteries provide a steady and consistent power supply, making them ideal for various applications, including RVs, boats, and solar power systems. A 12-volt 150-ah battery is designed to provide a consistent voltage output of 12 volts and has a capacity of 150 ampere-hours (ah). This means it can deliver 150 amps of current for one hour or 75 amps for two hours. The high capacity of these batteries makes them suitable for long-lasting power needs.
Understanding the importance of 12v 150ah Deep Cycle Battery capacity and voltage
When choosing a 12v 150ah Deep Cycle Battery, it’s essential to understand the significance of both battery capacity and voltage. Battery capacity refers to the energy a battery can store and deliver over a specific period. A higher capacity means that the battery can provide power for a longer duration.
Voltage, conversely, determines the intensity of the electrical current flowing through the battery. In the case of a 12-volt 150-ah battery, the voltage remains constant at 12 volts. It’s crucial to consider the voltage requirements of your devices and ensure that the battery voltage matches these requirements.
Factors to consider when buying a 12v 150ah Lithium Battery
Before investing in a 12v 150ah Lithium Battery, there are several factors you should consider to ensure you choose the right one for your needs. First, consider the battery’s construction and durability. Look for batteries designed to withstand harsh conditions and have a long lifespan.
Next, evaluate the charging and discharging rates of the battery. Some batteries have a faster charging time, while others may take longer to recharge. Additionally, consider the battery’s weight and size, especially if you plan on using it for portable applications.
It’s also essential to check the warranty and customer reviews of the battery. A reliable battery should come with a warranty to protect against manufacturing defects. Reading reviews from other customers can provide valuable insights into the battery’s performance and reliability.
Comparing 12 Volt 150ah Battery Price
When purchasing a 12-volt 150-ah battery, price is an important factor to consider. 12 Volt 150ah Battery Price can vary significantly depending on the brand, quality, and features of the battery. It’s crucial to compare prices from different manufacturers to ensure you’re getting the best value for your money.
However, it’s important to note that price should not be the sole determining factor when choosing a battery. While it’s tempting to opt for the cheapest option, it’s essential to also consider the battery’s performance, durability, and reliability. Investing in a high-quality battery may cost more upfront but can save you money in the long run by providing better performance and a longer lifespan.
12v 150ah lithium batteryPerformance considerations for 12v 150ah
When it comes to batteries, performance is key. A 12v 150ah should provide a consistent and reliable power supply for your devices. Look for batteries that have a low self-discharge rate, meaning they can hold their charge for longer periods when not in use.
Another performance consideration is the battery’s ability to handle high discharge rates. Some devices require a higher current draw, and the battery should be able to meet these demands without voltage drops or overheating.
Additionally, consider the battery’s cycle life, which refers to the number of charge and discharge cycles the battery can withstand before its capacity degrades. A battery with a higher cycle life will last longer and perform better over time.
12v 150ah Battery Price vs. lithium batteries: Which is the best choice?
When considering a 12-volt 150-ah battery, you may come across two common types: deep cycle and lithium batteries. Both have advantages and considerations, and the best choice depends on your specific needs.
Deep cycle batteries are designed to provide a steady and consistent power supply over an extended period. They are ideal for applications that require long-lasting power, such as RVs and solar power systems. 12v 150ah Battery Price are generally more affordable than lithium batteries but may have a shorter lifespan and slower charging times.
Lithium batteries, on the other hand, offer several advantages, including a higher energy density and faster charging times. They are also lighter and have a longer lifespan compared to deep-cycle batteries. However, lithium batteries tend to be more expensive upfront.
When choosing between deep cycle and lithium batteries, consider your power requirements, budget, and the specific application for which the battery will be used.
Tips for maintaining and prolonging the life of your 12v 150ah battery
To ensure the longevity and optimal performance of your 12v 150ah battery, follow these tips:
1. Regularly monitor the battery’s charge level and avoid overcharging or deep discharging.
2. Clean the battery terminals and ensure they are free from corrosion.
3. Store the battery in a cool and dry place when not in use.
4. Avoid exposing the battery to extreme temperatures.
5. Use a compatible charger and follow the manufacturer’s guidelines for charging.
By following these maintenance tips, you can extend the lifespan of your battery and maximize its performance.
Where to buy 12-volt 150ah batteries
12-volt 150-ah batteries can be purchased from various sources, both online and in physical stores. Here are some popular options:
1. Online retailers: Websites like Amazon, eBay, and specialized battery retailers offer various options and competitive prices. Review customer reviews and check the seller’s reputation before purchasing.
2. Local battery stores: Visit your local battery store or automotive shop to find a selection of 12-volt 150-ah batteries. The advantage of buying from a physical store is expert advice and assistance.
3. Manufacturer’s website: Some battery manufacturers sell their products directly through their websites. This can be a good option if you prefer to buy directly from the source.
FAQs
Q: How long will a 12-volt 150-ah battery last?
A: The lifespan of a 12-volt 150-ah battery depends on various factors, including usage, maintenance, and quality. On average, a well-maintained battery can last between 3 to 5 years.
Q: Can I use a 12-volt 150-ah battery for my RV?
A: Yes, a 12-volt 150-ah battery is a popular choice for RVs due to its high capacity and ability to provide long-lasting power.
Q: Can I use a 12-volt 150-ah battery for a solar power system?
A: Absolutely! These batteries are commonly used in solar power systems as they can store and deliver the energy generated by the solar panels.
Conclusion
Choosing the best 12-volt 150-ah battery requires careful consideration of various factors, including battery capacity, voltage, performance, and price. By understanding your power requirements and evaluating different options, you can find a battery that meets your needs and provides reliable and consistent power for your devices. Remember to prioritize quality and performance over price and follow proper maintenance practices to prolong the lifespan of your battery. With the right 12-volt 150-ah battery, you can power your devices confidently and conveniently.
This Article Was First Published On
Ultimate Guide to Finding the Best 12 Volt 150ah Battery
Other Good Articles to Read
Gabrielle Blogs
Jason Toff Blogs
Thumb Blogs
Blog Shifter
Social Bookmarking Blogs
Free Blogs Template
Blog Solidaire
Michael Coyne Blog
Born Free Blog
Oz Blog Hosting
Indepth News
All Categories
Related Articles
The Various Benefits of 80 Amp Hour Deep Cycle Battery
Regarding electrical power devices and machines, 80 Amp Hour Deep Cycle Battery are one of the most reliable and efficient
Why is anxiety treatment Sydney so important
you need to seek help immediately. The sooner you seek anxiety treatment Sydney for your anxiety disorder, the better it is!
The Ultimate Directory To Bad Credit Car Loans Sydney
We’ll discuss the differences between Bad Credit Car Loans Sydney and traditional car loans, the types of loans availabl
Revolutionize Your Power Solution with a 200ah battery
Say goodbye to frequent recharging and hello to uninterrupted power with the 200ah battery
Say Goodbye to Dull Rooms with Ceiling Lights Sydney
making it more vibrant and welcoming. In this blog post, we'll discuss why you should consider using ceiling lights Sydney to brighten up your home or office. Get ready to say goodbye to dull rooms and hello to a new and improved living space!
Supercar Hire in Brisbane: A Closer Look at Lamborghinis
fantasy, but a reality you can experience in Brisbane. This is the realm of supercar hire Brisbane, where you can live out your wildest
3 Phase Solar Inverter Helps You Get More Out Of Solar Panels
that blog post, they will explore the importance of a 3 phase solar inverter and how it can help you get the most out of your solar panels.
Everything You Need to Know about Hyundai Tucson Boot Lock
Attention all Hyundai Tucson owners! Are you tired of struggling with your boot lock? Look no further because we have all the information you need to know about the Hyundai Tucson Boot Lock
La importancia de elegir la batería de gel marina adecuada para sus necesidades específicas
ner la batería de gel marina adecuada para sus necesidades específicas es una decisión importante que puede hacer o deshacer | ESSENTIALAI-STEM |
The Source of Glycolytic Intermediates in Mammalian Tissues.
TitleThe Source of Glycolytic Intermediates in Mammalian Tissues.
Publication TypeJournal Article
Year of Publication2021
AuthorsTeSlaa, T, Bartman, CR, Jankowski, CSR, Zhang, Z, Xu, X, Xing, X, Wang, L, Lu, W, Hui, S, Rabinowitz, JD
JournalCell Metab
Volume33
Issue2
Pagination367-378.e5
Date Published2021 Feb 02
ISSN1932-7420
KeywordsAnimals, Blood Glucose, Carbon Isotopes, Diaphragm, Gluconeogenesis, Glycogen, Glycolysis, Male, Mice, Mice, Inbred C57BL, Muscle, Skeletal, Spleen
Abstract
<p>Glycolysis plays a central role in organismal metabolism, but its quantitative inputs across mammalian tissues remain unclear. Here we use C-tracing in mice to quantify glycolytic intermediate sources: circulating glucose, intra-tissue glycogen, and circulating gluconeogenic precursors. Circulating glucose is the main source of circulating lactate, the primary end product of tissue glycolysis. Yet circulating glucose highly labels glycolytic intermediates in only a few tissues: blood, spleen, diaphragm, and soleus muscle. Most glycolytic intermediates in the bulk of body tissue, including liver and quadriceps muscle, come instead from glycogen. Gluconeogenesis contributes less but also broadly to glycolytic intermediates, and its flux persists with physiologic feeding (but not hyperinsulinemic clamp). Instead of suppressing gluconeogenesis, feeding activates oxidation of circulating glucose and lactate to maintain glucose homeostasis. Thus, the bulk of the body slowly breaks down internally stored glycogen while select tissues rapidly catabolize circulating glucose to lactate for oxidation throughout the body.</p>
DOI10.1016/j.cmet.2020.12.020
Alternate JournalCell Metab
PubMed ID33472024
PubMed Central IDPMC8088818
Grant ListDP1 DK113643 / DK / NIDDK NIH HHS / United States
F32 DK118856 / DK / NIDDK NIH HHS / United States
P30 DK019525 / DK / NIDDK NIH HHS / United States
R00 DK117066 / DK / NIDDK NIH HHS / United States | ESSENTIALAI-STEM |
Senator Rand Paul Blasts YouTube for Censorship After Floor Speech Is Removed
WASHINGTON, D.C. – Today, U.S. Senator Rand Paul (R-KY) released the following statement after YouTube removed the video of his floor speech from last week from public view:
“It is a chilling and disturbing day in America when giant web companies such as YouTube decide to censor speech. Now, even protected speech, such as that of a senator on the Senate floor, can be blocked from getting to the American people. This is dangerous and politically biased. Nowhere in my speech did I accuse anyone of being a whistleblower, nor do I know the whistleblower’s identity. Apparently, YouTube has taken it upon itself to decide what questions can even be asked in the public debate, including on the Senate floor.”
Senator Paul’s speech, given during the allotted time for senators to express their thoughts on the impeachment trial, focused on the surveillance state’s abuse of its powers. Senator Paul read the following question: "Manager Schiff and Counsel for the President, are you aware that House Intelligence Committee staffer had a close relationship with when at the National Security Council together, and are you aware and how do you respond to reports that and may have worked together to plot impeaching the President before there were formal House impeachment proceedings?" | WIKI |
STONE, BRONZE AND THE horse — the principal means through which war was waged in the era when states were being established and when they were being assaulted by warrior peoples living beyond the settled zone — were by nature limited resources, though in different ways. Stone is laborious to fashion. Bronze is a product of scarce metals. The horse can be kept, in the numbers necessary to mount a fighting army, on grazing lands that are found only in restricted areas of the world. Had stone, bronze and the horse remained the means by which war was fought, its scope and intensity might never have exceeded the levels experienced during the first millennium BC, and human societies, except in the confined and benevolent conditions that prevailed in the great river valleys, might never have evolved far beyond pastoralism and primitive husbandry. Man needed some other resource with which to attack the face of earth in the temperate, forested zones but also to contest possession of the lands already settled with the rich and strong minorities which had monopolised the expensive technology of warmaking in the Bronze Age.
Iron supplied the need. It is now a scholarly fashion to doubt the onset of an ‘Iron Age revolution’, in part because it was proposed by Marxist scholars whose vision of history was determinist and mechanistic. But one does not have to be a determinist to perceive that a sudden and very large increase in the supply of a material that could take and keep an edge, when previously such materials had been the perquisite of the few because of their cost and rarity, was bound to change social relationships. Not only sharp weapons but tools also became available to men who had laboured before with stone and wood to clear forests and break the surface of the soil. Iron tools not merely allowed but encouraged man to tackle soils that previously resisted him and in so doing to colonise regions distant from existing areas of settlement, to exploit more intensively those already brought into use or simply to colonise where the charioteers had conquered before them.
That iron is such a material does not need much demonstration. Bronze is an alloy of common copper and scarce tin; tin’s scarcity and very localised sources made it a substance on which it was easy to levy high market prices and heavy transport tolls and taxes at the point of delivery. In consequence, warriors readily monopolised bronze and thus usually made themselves rulers as well. Iron is not scarce; its ores form some 4.2 per cent of the earth’s mass, and it is widely distributed.1 But in pure form, which primitive man could recognise and use, it is even scarcer than tin, appearing only as meteoric iron or as certain very isolated so-called telluric deposits. Nevertheless, primitive man knew and worked with meteoric iron, and when — by what chapter of accidents we cannot guess — he discovered how iron might by heat be extracted from its earthy bed, civilised man knew what could be done with it. It has been suggested that iron was first smelted by Mesopotamian smiths of about 2300 BC who were seeking to extract pigments, such as ochre, from the associated ore.2 Smiths were a secretive lot, practising a mysterious craft and usually working under the direct protection of warriors whom they supplied with their precious products. The first smelted iron was almost surely monopolised, and it did not come into general use until about 1400 BC. At that time production seems to have been centred in Anatolia, where rich ores occur in profusion at surface sites, and it was through their consequent access to worked iron that the local Hittites were able to launch their aggressive campaigns against the valley kingdoms.
About 1200 BC, it has been suggested, the Hittites had ceased to be sole proprietors of the emergent iron industry when their kingdom was destroyed. The Anatolian iron-workers, scattered in the process, took their skills elsewhere to seek new purchasers and protectors. It may also be that iron-working itself had by this time reached a point of technical take-off. It had had to go through several stages. The first was to perfect a furnace in which ores could be smelted to produce ingots of economic size for an economic expenditure of fuel (the preferred fuel remained charcoal until early modern times, when first the Chinese and then the Europeans discovered how to transform coal into coke). Iron ores melt at a much higher temperature than copper or tin, requiring a forced draught; the first furnaces were sited on windy hilltops, until bellows were brought into use. They yielded about eight per cent iron for a given weight of ore, in a spongy mass known as a ‘bloom’, which could be made into tool- or weapons-grade ingots only by constant reheating and hammering; even then, unless the ore contained exceptionally large traces of nickel, its products were soft and quickly lost their edge. Cold-hammering to restore the edge, the bronzesmith’s technique, did not work with iron. It was only when it was discovered around 1200 BC that hot-hammering and quenching in water gave iron a durable and lasting edge that it at last emerged not merely as a competitor to bronze, but as its clear superior. That stage may have been reached at the moment when the Anatolian smiths were dispersed about the Near Eastern world.
The appearance of the skills of smelting and smithing had varied military effects. It better equipped warrior peoples to mount assaults on the rich and settled states and may therefore have contributed to the turmoil that engulfed the Middle and Near East at the beginning of the first millennium BC. Equally it eventually equipped the empires to strike back, since plentiful iron meant that larger numbers of men could be kept under arms, in states where revenues sufficed to support them. The Assyrian army was an iron army; even technologically backward Egypt embraced iron under the later pharaohs.
The most impressive weapons found in early Iron Age sites come not from the East but from Europe. They are the swords of the so-called Hallstatt culture, which date from as early as 950 BC.3 Modelled originally on bronze patterns, these swords rapidly assumed exaggerated lengths, evidence of how much more extravagantly the new, cheap and plentiful iron could be used than the old bronze. Though iron spearheads have been found in Hallstatt culture graves, as well as traces of shields bound and riveted with iron, it is swords that predominate. The Hallstatt people seem to have been aggressive swordsmen, who counted on a sharp edge and long point to overcome an opponent.
The Hallstatt culture — so called from the first excavated site in Czechoslovakia — belonged to the Celts, that mysterious people who came to occupy most of western Europe by 1000 BC; in the third century BC they also migrated eastward into Anatolia. In their heyday, the Celts were conquerors, or at least colonisers, and their iron weapons were eagerly adopted by neighbours living across the mountains from the great European plain, notably the Greeks.
The Greeks, like the Celts, are of mysterious origin, but they probably began to voyage from the southern shores of Asia Minor for Cyprus, Crete and the Aegean islands toward the end of the fourth millennium BC; at much the same time, mainland Greece began to be settled by other Stone Age people from the same regions. Then, in the middle of the third millennium, a northern people appeared in Macedonia, perhaps from the banks of the Danube, whose culture remained Neolithic when the first settlers had already entered the Bronze Age; it was they who brought the language that eventually all Greeks would speak.
It took time for the northerners and the settlers from Asia Minor to become one. Until the end of the second millennium BC, the islanders remained not merely a people apart; the Cretans in particular ascended to cultural heights the mainlanders could not match. At Knossos, in Crete, sheltered from invasion by the seas which also brought rich trade goods to the island, a sumptuous civilisation grew up. Then about 1450 BC catastrophe overwhelmed this Minoan world; archaeologists have long sought to explain why — without agreement, though the recent discovery of Minoan fortifications along Crete’s shores suggests that they had not been as isolated from attack as was previously thought. They may have been subjected to raids before; in a single great descent, perhaps by the piratical ‘Sea People’ of Asia Minor, perhaps by Greek mainlanders jealous of the Cretans’ dominance of Mediterranean trade, the great palaces, warehouses or workshops were destroyed.4
Meanwhile an advanced Bronze Age culture had taken root on the mainland, where a scattering of small kingdoms grew up along the eastern shore and particularly in the Peloponnese. One of the most important, Mycenae, has given its name to this civilisation, and by the end of the first millennium Mycenaean cities were also established on the shores of Asia Minor and as far away as Troy, on the straits that lead to the Black Sea. These cities were rich enough to support well-equipped chariot armies, if the Linear-B tablets, which are incised with the first traces of written Greek, may be taken as evidence; the accounts of the palace at Pylos record the presence of 200 pairs of chariot wheels in the royal arsenal.5 Whence the chariots came we cannot guess. They may have been brought by charioteers who made themselves masters of the coastal kingdoms; those kingdoms’ trading wealth may have allowed them to buy into the international market in advanced military technology. At any rate during the thirteenth century BC, chariots were important enough in the Greek world to play a significant part in an extended war between mainland Greece and Troy. So at least Homer describes in the Iliad when his heroes drive to battle behind their warhorses.
As is a commonplace now among ancient historians, however, Homer — composing his great poem in the eighth century about events 500 years earlier — seems to have misunderstood the role that chariots played in the heroic age. A modern scholar writes:
The real advantage of the war-chariot lay in massed attacks at speed. This is how it was used by the Mycenaeans and by the kingdoms of the Near and Middle East which maintained large forces of chariotry both in the Bronze Age and after the Mycenaean collapse. The Homeric picture could not be more different. There the warriors use the chariots merely as transport vehicles from which they dismount to fight on foot, and they are equipped either with the bow or the lance, the two weapons which made chariotry so formidable an arm after the invention of a light and fast spoke-wheeled chariot in the first half of the second millennium.6
Homer’s misunderstanding is currently explained by the distance in time at which he stood from the Trojan War, which, it is now accepted, indeed took place and was not simply the stuff of myth, and was probably fought to resolve disputes over trading-rights in the Aegean and surrounding waters. But distance in time may not be the only explanation for the difficulty Homer had in recreating the heroic past. He was separated from it, too, by a time of troubles in Greek life, a Dark Age that severed connections between the thirteenth and eighth centuries even more absolutely than the European Dark Ages obscured Rome from the Carolingians; it even appears that the knowledge of writing was lost on the Greek mainland during the 300 years after 1150 BC.7 The agents of this disastrous upheaval were a fresh wave of invaders from the north, known to later Greeks as the Dorians, who spoke Greek but were in every other way barbarian. The first wave may have come by sea; later arrivals seem to have brought the horse and iron weapons and so presumably arrived by land routes, perhaps pushed ahead of other horse-riding peoples who originated on the edge of the steppe.
Before these invaders a few Mycenaean Greeks, notably those living in Attica, around Athens, succeeded in holding their fortified places; their recolonisation of the islands (the Ionian migrations) later re-established Greek culture in the Aegean all the way to the shores of Asia Minor, where, during the tenth century BC, they built twelve strong fortified cities which looked to Athens as their place of origin and communicated with it and each other by sea. On the mainland, none of the Mycenaean kingdoms survived in independence. The Dorian invaders seized the best land, enslaved the inhabitants and worked them as serfs; however, they seem to have found little unity among themselves. ‘Village fought against village, and men went about their business wearing arms.’8
This typical pattern of warrior conquest and settlement laid the basis for the rise of that most distinctive and influential Greek institution, the city state. Its origins have been best traced to the Dorian settlements on Crete, where constitutions that granted political rights to those who bore arms, descendants of the conquerors, and denied them to the rest, came into force in the period 850–750 BC; ‘the remarkable feature of these Cretan constitutions was the orientation of the citizens not towards their family group but towards the state alone.’9 At the age of seventeen the sons of leading families were recruited into troops, and were disciplined and trained to athletics, hunting or mock warfare. The unfortunates who failed to be accepted were excluded from the franchise and enjoyed lesser rights at law. At nineteen the successful graduates were granted membership of a men’s mess, and thereafter fed and campaigned together. The messes were maintained at public expense and became effectively their members’ homes; though they were allowed to marry, the wives were kept segregated and family life was reduced to a minimum.
Those outside this warrior class were held in various degrees of subjection. The descendants of the original conquered population were serfs, tied to their owners’ estates or to public land; estate-owners also owned personal slaves whom they bought at market. People who had been conquered subsequent to the first invasions were allowed rights of property but paid tribute and were excluded from the franchise. As a Cretan drinking-song of the ninth century expressed it, ‘My wealth is spear and sword, and the stout shield which protects my flesh; with this I plough, with this I reap, with this I tread the sweet wine from the grape, with this I am entitled master of the serfs.’10
The origin of the polis (city-state) endowed it with pronounced characteristics. It inherited a strong sense of kinship from its constituent elements, the komai (village), so that citizenship was generally defined by hereditary descent on both sides. It perpetuated the distinction between master and serf and maintained the privilege of the citizen class in the community. It fostered the agricultural economy which was the source of self-sufficiency, and it ensured for its citizen class an adequate degree of leisure to practise the arts of peace and war.11
In the form nearest to its Cretan origins this polis and its constitution migrated to the Greek mainland and there took root most notably as Sparta, the greatest warring state in Greece. In Sparta the division between free warriors and disarmed and largely rightless serfs reached its most extreme, as did the disproportion between the two groups. The boys’ initiation into training troops began at the age of seven; girls, too, were segregated and followed a regime of training in athletics, dancing and music. Until marriage, however, the girls lived at home, while the boys were kept apart under the leadership of head boys and under the supervision of a state superintendent. Their life was designed to inure their bodies to hardship and they competed with other groups of their own age at sport and tests of endurance. At the age of eighteen they began their formal training for combat, and for a period were employed in secret service against the serfs. At twenty they took up residence in barracks — though they might marry at that age, they could not reside with their wives — and at thirty they proceeded to election to full citizenship. Only those candidates unanimously chosen became full citizens and embarked on the main duties of a Spartan ‘equal’: to hold the serf (helot) class in restraint and to stand in readiness for war. Each year the ‘equals’ actually waged an internal war against the helots, disposing of those the secret service had identified as unreliable.
Little wonder that Sparta rose to dominate its less warlike neighbours; perhaps no society known to historians has ever better perfected the warrior system. During the eighth century BC the Spartans first made themselves masters of the hundred villages that surrounded their own original five and then went on to conquer the neighbouring region of Messenia in a war that lasted twenty years (940–20 BC). Thereafter her rise to power in the Peloponnese ran less smoothly. The Spartans were challenged by the neighbouring state of Argos, and suffered defeat at Hysiae in 669, after a period in which subject cities had revolted against her rule. For nineteen years Sparta struggled for survival, but by the sixth century, after a battle with Argos which developed from a conflict between ‘Three Hundred Champions’ on each side, she had survived the ordeal to become the greatest military power in the Peloponnese.
Meanwhile the other leading cities of Greece were developing in a different way and in quite different directions, which carried their spheres of influence away from the mainland, into the islands and back to the shores of Asia Minor; eventually these Greek sea lanes stretched out to link the founding centres with colonies as far away as Sicily, the southern coast of France, the inland waters of the Black Sea and the shores of Libya. While Sparta was perfecting the weapons, tactics and military organisation that would dominate warmaking among Greeks on land, other states, notably Athens, were making themselves naval powers and building the ships with which they would contest for control of the Aegean and eastern Mediterranean with the Persians and their subject sea peoples.
The Persian wars (499–448 BC) took time in the making, for not until the rise of Cyrus the Great did Persia succeed in establishing a unified kingdom. During the sixth century BC, war for the Greeks was largely war between Greeks, as the city states perpetuated their quarrels over land, power and control of trade. It became in the process a new form of warfare, fought with iron weapons, affordable by many more men than had composed the armies of the Mycenaean world, wielded by small farmers who were equal citizens, and used to wage battles of an intensity and ferocity perhaps never before seen. The battles of earlier and other peoples — even those of the Assyrians, though we lack exact details of their conduct on the battlefield — had continued to be marked by elements that had characterised warfare since its primitive beginnings — tentativeness, preference for fights at a distance, reliance on missiles and reluctance to close to arm’s length until victory looked assured. The Greeks discarded these hesitations and created for themselves a new warfare that turned on the function of battle as a decisive act, fought within the dramatic unities of time, place and action and dedicated to securing victory, even at the risk of suffering bloody defeat, in a single test of skill and courage. So revolutionary was the effect of this new spirit in warmaking that the foremost historian of the tactics of the Greek city states has proposed the arresting, if much contested, thought that the Greeks were the inventors of ‘the Western way of war’, by which the Europeans were eventually to subdue every area of the world into which they carried their arms.12 | FINEWEB-EDU |
2018 Northern Vietnam floods
On 23 June, floods started across the northern provinces of Vietnam. The flood waters have receded from the northern mountainous provinces of Lai Chau, Ha Giang and Lao Cai while several towns and villages were inaccessible. 23 people were confirmed dead in the floods: in Lai Chau 16 were killed, 5 in Ha Giang Province while two others in other provinces. An estimated VND530 billion ($23.2 million) of damage was recorded in Lao Cai, Ha Giang and Lai Chau and over 80 houses had been destroyed and over 700 hectares of rice fields damaged.
Other floods
On 21 July, floods triggered by heavy rains hit the northern part of the country after Tropical Storm Son-Tinh made landfall in northern coastal areas, killing 27 people and wounding 14, while 7 others were declared missing. Also, 17,000 animals were killed, 82,000 hectares of crops were damaged and 5,000 houses were destroyed.
On 1 August, two children and a man drowned as new floods has overflowed one bank of the Bui River, engulfed several villages and threaten to submerge parts of Hanoi. On 3 August, floods triggered landslides that killed six people, injuring two and leaving five others missing.
On 2 September, floods started again across the country. As of 4 September, at least 14 people were confirmed dead while four others are declared missing. Also, 375 houses were damaged and 661 cattle killed. | WIKI |
Talk:The Dreamers (novel series)
Ease
Perhaps some mention of how there's never any real concern that the good guys might lose...or even have the slightest bit of difficulty? Or perhaps how there's always some superbeing ready to step in and clean things up without a hitch? Or how grossly incompetant all the foes are? Jachra 19:57, 13 April 2006 (UTC)
* Well if you dont like that side of the books and find that David Edding cant have/make a different storyline, then dont read any more of his books. -- pstarky
* The phrase I was looking for was 'Critical Response,' not 'Slavish Devotion.' There ought to be some warning of the laziness involved. Jachra 00:17, 19 October 2006 (UTC)
* Maybe a critism section could be developed for David Eddings as 'ease of adventures' are common in his works, and many see it as a shortcoming for the author. Then a link could be displayed on this page. Actually, I could have sworn that there was a critism section on David Eddings before, but maybe it was removed. Maybe we can look into that. Wiki really isnt a good place to vent your frustration though, Jachra, you shouldnt expect to get a civil response when you load your questions in an insulting manner.--Wormywyrm 08:45, 5 November 2006 (UTC)
Expand
There is no information for Crystal Gorge or The Younger Gods and very little for The Treasured Ones. Foxjwill 19:12, 9 October 2006 (UTC)
Fair use rationale for Image:Crystal gorge.jpg
Image:Crystal gorge.jpg is being used on this article. I notice the image page specifies that the image is being used under fair use but there is no explanation or rationale as to why its use in this Wikipedia article constitutes fair use. In addition to the boilerplate fair use template, you must also write out on the image description page a specific explanation or rationale for why using this image in each article is consistent with fair use.
BetacommandBot 18:50, 29 October 2007 (UTC)
Fair use rationale for Image:Elder gods.jpg
Image:Elder gods.jpg is being used on this article. I notice the image page specifies that the image is being used under fair use but there is no explanation or rationale as to why its use in this Wikipedia article constitutes fair use. In addition to the boilerplate fair use template, you must also write out on the image description page a specific explanation or rationale for why using this image in each article is consistent with fair use.
BetacommandBot 21:48, 29 October 2007 (UTC)
Fair use rationale for Image:Younger gods.jpg
Image:Younger gods.jpg is being used on this article. I notice the image page specifies that the image is being used under fair use but there is no explanation or rationale as to why its use in this Wikipedia article constitutes fair use. In addition to the boilerplate fair use template, you must also write out on the image description page a specific explanation or rationale for why using this image in each article is consistent with fair use.
BetacommandBot (talk) 21:41, 26 November 2007 (UTC)
Fair use rationale for Image:Treasured one.jpg
Image:Treasured one.jpg is being used on this article. I notice the image page specifies that the image is being used under fair use but there is no explanation or rationale as to why its use in this Wikipedia article constitutes fair use. In addition to the boilerplate fair use template, you must also write out on the image description page a specific explanation or rationale for why using this image in each article is consistent with fair use.
BetacommandBot (talk) 04:58, 30 November 2007 (UTC)
Split
Split I suggest to split the Characters section into its own article, since we have The Belgariad and The Malloreon and The Elenium and The Tamuli own articles, and before the revert, I still consider it was the best way and that it was according to splitting rules. So I am for the splitting into List of The Dreamers characters. Not to mention that it was really out of proportion into the novels' articles.
* The Mad Hatter (talk) | WIKI |
Who's Your City? Trick Or Treating And The D.C. Region - Raw Fisher
Richard Florida, the social demographics guru who taught us that, even in this age of globalization and virtual geography, you are where you live, moved out of the District last year, settling in Toronto. The man who brought us The Rise of the Creative Class and other bestselling ruminations on the meaning of our choices about location is back with a book called Who's Your City? in which he argues that selecting a city or region inevitably involves deciding who you are and what kind of folks you want to surround yourself with. So why did Florida move from his lovely house in Northwest Washington clear across the border to Canada's most eclectic city? Simply put, he got a better offer, shifting his base from George Mason University to the University of Toronto. But he also got to move away from a place where his life was divided among three realities--the bustle of Dupont Circle, U Street and other engaging D.C. neighborhoods he cherished, the quiet of his remote residential section of Northwest Washington (he lived in Forest Hills, just off Tilden Street NW), and the relative isolation of Fairfax County, where he worked but swore he would never live. Now, he says, he can have it all--living, working and playing in an urban setting that has the smart people and ethnic mix of the District, without the high crime rate, and with the addition of a sense of community he found lacking here. Florida is a guy who moves around a lot, perhaps for largely professional reasons, but also because he's a searcher by nature, someone who believes in place as a key to the perfectibility of the human experience. For years, he has preached that it makes sense for young people to go where the smart young people are, and the District comes out on top of any list of magnets for that crowd (18 percent of D.C residents are college graduates, the highest figure of any city in the nation, followed closely by San Francisco.) Florida looks at a social map of this country and sees us clustering ourselves according to our passions and pursuits. Washington, he writes, is home to 78 percent of the nation's political scientists, as well as a huge share of economists, mathematicians and astronomers, while New York is where more than half of all fashion designers work and Houston is home to more than a third of petroleum engineers. But while Washington still top's Florida's list of cities for young singles and is one of the top five for gays, he is down on the District as a place for families with children, preferring places such as Kansas City, Minneapolis and San Jose. (He nonetheless still ranks the Washington area--meaning the suburbs--as the nation's best for families with kids.) For Florida, the great revelation came his first Halloween in Toronto. In Washington, not a single kid came to our door in three years on the night of the great candy hunt, he writes. But in Toronto, our house was mobbed by children of a mosaic of races. This is where Florida loses me. We lived less than 20 blocks apart when he was here, but our experiences were as different as could be on what he calls the Trick or Treater Index. Our block has always been a busy one on Halloween, and here's the difference: For reasons that always baffled me, this great bard of urban vibrancy, a latter-day Jane Jacobs (the spiritual grandmother of the smart-growth movement), chose to live in about as anti-urban a city setting as could be had, nowhere near a Metro station, way up on a hill, in a beautiful setting right near Rock Creek Park, but well away from any of the amenities he preaches for in his books. Of course he didn't see kids on Halloween--what halfway intelligent kid would waste his time wandering around in a dark neighborhood of widely separated houses well off the main drag? Just a few blocks away lie street after street that are just teeming with trick or treaters each year. Florida is surely right about some of the other reasons families with children tend to move out of the District--the lousy schools, the crime rate, weak city services. But I'm puzzled by the Place Man's own decisions about where to live. Toronto is a terrific city, in many ways an urban model. In the end, however, it seems Richard Florida chooses where to live more the way many of us do than the way he advises in his books: He doesn't necessarily go where the most creative and exciting people are. Rather, he goes where he gets the best job. There's not the least bit of shame in that, but Florida's answer to Who's Your City? may well be whomever's making it worth my while. By Marc Fisher | April 3, 2008; 8:00 AM ET Previous: From Catholic Schools to Charters: What's Left? | Next: Waffle Shop--Building Preserved, Waffles Not (Yet) Please email us to report offensive comments. I'm confused. Isn't Tilden St. in Forest Hills right near the Van Ness Metro? I think NW DC has a lot of very suburban neighborhoods (or more accurately streetcar suburban in that they have late 19th century style suburban densities). But the communityness of each of them seems quite different. I'm not sure those community qualities are dependent on Jacobian elements (and she made a point of saying that she was not expounding on what makes a good suburban town). I get a sense that the Pallisades has a good community quality, yet it's nowhere near a metrostop, and it's commerical coordidor has few of the qualities Jacobs expoused (density, mixed-uses, short blocks, etc.) So if your neighborhood gets hit up for a lot of candy while Florida's didn't. I'm willing to bet it has more to do with the relative quality of the local elementary schools, not the relative qualities of urban design. Posted by: Reid | April 3, 2008 9:50 AM There is a perception that Toronto, San Francisco, Minneapolis and San Jose have many more neighborhoods where one is likely to see children of a mosaic of races trick-or-treating, on the soccer field or in a classroom, compared to DC. This may be important to many of Florida's so-called Creative Class (or not). Your column didn't speak to that. Any comments? Posted by: Brooklander | April 3, 2008 9:54 AM From what I have seen on Florida's website, his city should be LA, so he can be among the shallow silicone bimbos that are his kind of people. Posted by: Mister Methane | April 3, 2008 10:28 AM My classmates who grew up in Forest Hills had access to some of the best schools in the city -- Murch, Deal, and Wilson -- so I can't imagine that school quality (other than the general decline of the whole system) is the big defining factor there. However, I do think the presence of kids in a neighborhood is quite cyclical, so it's possible that Florida lived in the neighborhood at a down time. When I was growing up in a streetcar suburban part of NW DC (a couple of blocks from Lafayette Elementary), the neighborhood was full of kids who played in the streets on snow days and went trick-or-treating in droves. As our generation outgrew these pleasures and moved on to start our own families, many of our parents stayed on in their houses. Mine are still there, but over a decade later many of that generation of parents have moved out and there are more and more families with young kids moving into the neighborhood. Every Halloween my dad gets to entertain more and more kids with his scraggly black wig. Despite these cycles, the sense of neighborhood in that area remains fairly strong, with neighbors saying hello to each other and offering to lend a hand when it's needed. All of that being said, who can afford to live in these neighborhoods likely is also an issue. These days those big houses on huge plots of land in the Forest Hills neighborhood are probably prohibitively expensive for many young families starting out. I know that my friends who are starting families right now are doing so either in condos along major streets or far out into the suburbs where they can afford to buy free-standing houses with yards. Posted by: LB | April 3, 2008 10:39 AM I live on Capitol Hill and we get MASSES of children on Halloween! As Marc points out, why go to a suburban neighborhood where the house are spaced apart when you can hit up the townhouse community with a different front door every 18 feet or so? Kids ain't dumb -- especially when it comes to candy! anyway, you can live in an urban environment and provide a great experience for your children! and of course the kids are all different races. I didn't grow up in a racially diverse community and I wonder what impact it will have on my kids. We keep our commute super short -- the more time to hang out at the park with our neighbors on beautiful days-- like tuesday afternoon. Just lovely! Posted by: gov mom | April 3, 2008 10:57 AM I'm with the Capitol Hill parent. Here in Glover Park, just north of Georgetown, we have reams of kids of all sizes and national origin. We can walk to the woods, several parks and playgrounds, the grocery store, or Georgetown in minutes. We have an excellent public school (Stoddert Elementary) as well as walkable access to any number of terrific private schools (e.g., Washington International School and NCS). Our neighborhood is safe, friendly, and 5 minutes from downtown, although metro access is a 30-minute walk or a bus ride away. The only downside I see is that our houses are small (in some cases, quite small) and most don't have yards, but we'd prefer to play at the park with friends old and new, anyway. Posted by: Glover Park | April 3, 2008 2:12 PM Actually, the nicer neighborhoods always get hit up for candy on Halloween. You can see the cars lined up at every intersection for the people coming in who don't live there. If makes sense, doesn't it? Why take your kid to a poor neighborhood for candy they can't afford to buy? Let's hit up the rich folks. They owe us, right? Posted by: DC Voter | April 3, 2008 2:42 PM I'm really perplexed why people think that only DC is diverse. I grew up in Fairfax County and was one of 4 white kids in my suburban elementary school near McLean. Diversity isn't just present in DC, it is all across the region, and one of the reasons why I love calling this area home. Posted by: Arlington, VA | April 3, 2008 3:16 PM James Howard Kunstler's views on the future of Mr. Florida's city paradises are worth noting. A man on the Left whose last non-fiction book was devoted to imagining a world without cheap oil, Kunstler sees a depopulation of cities by the end of this century. Cities produce almost no food but consume much. When transportation costs become much more onerous, big cities must downsize. Posted by: D Leaberry | April 4, 2008 9:27 AM Florida's work does not address individual neighborhoods or cities but regions, metro areas. On one of his newer indices, the Tolerance Scale, I'll wager DC is middling, while Toronto is off the chart. Posted by: Mike Licht | April 8, 2008 7:16 PM The comments to this entry are closed. | NEWS-MULTISOURCE |
Leonid Meteor Shower
This article was written with predictions for 2006, but apart from times and rates, this is still relevant every year.
Dr. David Asher from the Armagh Observatory along with Dr. Rob McNaught have predicted an enhanced peak to occur on November 19th The Earth will pass very close to the centre of Tempel-Tuttle’s dust trail created at the comet’s 1932 return (i.e. 2 revolutions ago).
The calculated peak time of the outburst is 04:49 UT for the UK (Universal Time = Greenwich Mean Time). It will probably not last very long (i.e. meteor activity will rise and fall quite sharply) and so to see it you need to be in the right part of the world. The estimated Zenithal Hourly Rate, based on comparison with a similar event in 1969, is 120. Stargazers in Western Europe will have ringside seats: Leo will be high in the southeast sky, just before sunrise affording the very best Leonid views.
Apart from the encounter with the 1932 Leonid trail, there is a background to the Leonid shower for more than a week, at rather low rates (e.g. ZHR of 10 or so). The peak of the annual Leonids this year is 17th November 2300ut. Serious enthusiasts can observe for at least a few nights before and after the outburst, starting when Leo rises, in the middle of the night, until morning twilight.
Remember that the meteors radiate from the constellation of Leo outwards, so a long exposure could show meteors rising from the horizon! The showers are expected to last a few hours as the Earth passes through the comet trails. Observations after 0000UT will yield more sightings as the dark side of the Earth faces towards the incoming particle streams.
General Information
Every year roughly between November 15th and 19th, the Earth meets a stream of ancient debris, leading to the annual meteor shower visible in the early morning hours high in the northeast after midnight between those dates. The cometary dust particles move in very similar orbits and the resulting meteor shower appears to radiate from a point in the constellation Leo, hence the term Leonids.
The Leonids emanate from the trail of Comet Tempel-Tuttle which swings past the Sun approximately every 33 years, and during each close approach it emits a dense stream of dust and small particles. Over time, these dust trails extend along the whole length of the comet’s orbit, but the trails remain very narrow and concentrated in space taking hundreds of years to spread out. Comet Temple-Tuttle revolves around the Sun in the opposite direction to the Earth, so when the Earth encounters the trails of particles, they enter the atmosphere at very high speeds, about 160,000 mph. Most of the dust grains are very small, like grains of sand, and vaporise on entry in the first few seconds at heights of around 60 miles.
Those who wish to try for the Leonids are advised to find clear, dark site, wrap up well with several layers of warm clothing, a flask of tea/coffee/soup, and recline in a comfortable chair, or use something like a sleeping bag on top of a plastic ground sheet, and this way you won’t miss any. If other observers are there also, make sure they know just where you are in order to avoid accidents!
Leonid Radiant | ESSENTIALAI-STEM |
Wikipedia:Miscellany for deletion/Wikipedia talk:Requests for comment/RFCmedia/manual
The result of the discussion was speedily deleted (G6). Icewedge (talk) 20:14, 22 March 2009 (UTC)
Wikipedia talk:Requests for comment/RFCmedia/manual
incomprehensible Toddst1 (talk) 09:55, 22 March 2009 (UTC)
* Delete As vandalism. Even faster than speedy if possible. Collect (talk) 11:31, 22 March 2009 (UTC)
* G3 per Collect above. → Dyl @ n 620 11:33, 22 March 2009 (UTC)
* Delete Extremely, if possible Lets drink Tea 19:18, 22 March 2009 (UTC)
| WIKI |
Page:Virgil's Pastorals, Georgics and Aeneis - Dryden (1709) - volume 1.pdf/26
14 that of Seven Years, as appears by his First Pastoral, and other places; it is reasonable to set the Date of it something backward: And the Writer of his Life having no certain Memorials to work upon, seems to have pitched upon the two most Illustrious Consuls he could find about that time, to signalize the Birth of so Eminent a Man. But it is beyond all Question, that he was Born on, or near the Fifteenth of October. Which Day was kept Festival in honour of his Memory, by the Latin, as the Birth-Day of Homer was by the Greek Poets. And so near a resemblance there is, betwixt the Lives of these two famous Epic Writers, that Virgil seems to have follow'd the Fortune of the other, as well as the Subject and manner of his Writing. For Homer is said to have been of very mean Parents, such as got their Bread by Day-labour; so is Virgil. Homer is said to be Base Born; so is Virgil. The former to have been born in the open Air, in a Ditch, or by the Bank of a River; so is the | WIKI |
import json from ase.parallel import paropen from ase.build import bulk from ase.optimize import BFGS from gpaw import GPAW, PW from gpaw.zero_field_splitting import zfs def nv_minus(n: int, relax: bool = False) -> None: atoms = bulk('C', 'diamond', cubic=True) * n atoms.numbers[0] = 7 del atoms[1] atoms.set_initial_magnetic_moments([1] * len(atoms)) name = f'NC{8 * n**3 - 2}' atoms.calc = GPAW(xc='PBE', mode=PW(ecut=400), charge=-1, txt=name + '.txt') atoms.get_forces() # atoms.calc.write(name + '.gpw', 'all') D1 = zfs(atoms.calc) if relax: BFGS(atoms, logfile=name + '.log').run(fmax=0.05) # atoms.calc.write(name + '.relaxed.gpw', 'all') D2 = zfs(atoms.calc) with paropen(name + '.json', 'w') as fd: json.dump(dict(D1=D1.tolist(), D2=D2.tolist()), fd) if __name__ == '__main__': for n in range(2, 4): nv_minus(n, relax=True) | ESSENTIALAI-STEM |
Network Media Converters Information
Network media converters are used to interconnect different types of cables within an existing network. They receive data from one type of cable and convert the signals for transmission along another cable type. Typically, network media converters are often used to connect newer Gigabit Ethernet (1000 Mbps) cabling to older 10Base-T or 100Base-T networks. Some network media converters are standalone devices that convert data between two different media types. Others are chassis-based models that connect many different media types in a single housing. Generally, these chassis-based devices are modular, stackable, and rack-mounted. They may also include an uplink or crossover switch to allow connections to either a workstation or a hub without the use of a cross-pinned cable. Network media converters with an integrated circuit (IC) or printed circuit board (PCB) form factor are also available. Full-duplex converters can be connected to network devices that transmit and receive signals at the same time.
Selection
Network type is the most important consideration when selecting network media converters. Common network types include asynchronous transfer mode, Ethernet, token ring, optical carrier, single mode fiber, and multimode fiber. Asynchronous transfer mode (ATM) is a network technology that transfers data in cells or packets of a fixed size. Ethernet is a common local area network (LAN) protocol that uses a bus or star typology and supports data transfers of 10, 100, or 1000 Mbps. Some Ethernet networks use 10Base-T, 10Base-2, 10Base-5, 10Base-FL, 100Base-T, 100Base-TX, or 10/100Base-TX cabling. Others use 1000Base-CX, 1000Base-LX, 1000Base-SX, or 1000Base-T. Token ring is a network transport typology in which attached devices must receive a supervisory frame or token before they can transmit data. Optical carrier (OC) is a protocol that specifies the speed of fiber optic networks which conform to the synchronous optical network (SONET) standard. OC-3 has a standard speed of 155.52 Mbps. OC-12 has a standard speed of 622.08 Mbps. Single-mode fiber has a narrow core that allows light to travel along in only one path. By contrast, multimode fiber has a relatively wide core that allows light to travel in multiple rays along different paths. Serial communication types for network media converters include RS232, RS422, and RS485.
Selecting network media converters requires an analysis of port connectors. Attachment unit interface (AUI) connectors are often used to connect Ethernet network stations and transceivers. Subscription channel (SC) connectors are medium-sized coaxial devices with a frequency range of 0 - 11 GHz. They are larger than Bayonet Neil-Concelman (BNC) connectors, devices which have a slotted outer conductor and a plastic dielectric that causes increasing losses at higher frequencies. Single-mode and multimode straight tip (ST) connectors feature a quick release, bayonet coupling that requires only a quarter turn to engage or disengage. RJ-45 connectors are similar in appearance to standard phone connectors, but are twice as wide with eight wires. Single mode and multimode MT-RJ connectors feature a compact, RJ-style design but hold two fibers with a single ferrule. Medium interface connectors (MIC) are duplex devices used in fiber distributed data interface (FDDI) networks. DB-9 connectors are also commonly available.
UNLIMITED FREE ACCESS TO THE WORLD'S BEST IDEAS
close | ESSENTIALAI-STEM |
The black hole image and Katie Bouman: the sexist backlash against her, explained
Just after the Event Horizon Telescope project announced last week that its astronomers had managed to capture the first-ever image of a black hole, MIT tweeted this image. Here's the moment when the first black hole image was processed, from the eyes of researcher Katie Bouman. #EHTBlackHole #BlackHoleDay #BlackHole (v/@dfbarajas) pic.twitter.com/n0ZnIoeG1d Katie Bouman is a postdoctoral fellow at Harvard who helped develop the code to find the black hole needle in the haystack of data collected from the effort. This photo shows the first time she saw the results of that work, with the black hole image on her computer screen. This is a photo of a pure “eureka!” moment. It’s delightful, an inspiration. It quickly went viral, and news outlets including the New York Times began hailing Bouman as the “face of the black hole project.” But then all the attention became a catalyst for a sexist backlash on social media and YouTube. It set off “what can only be described as a sexist scavenger hunt,” as The Verge described it, in which an apparently small group of vociferous men questioned Bouman’s role in the project. “People began going over her work to see how much she’d really contributed to the project that skyrocketed her to unasked-for fame.” There’s a lot of nonsense tied up in this episode — and we wouldn’t even be talking about it if platforms like Twitter, Reddit, and YouTube didn’t allow trollish thinking to fester and spread virally. But there are a few key takeaways. One is that while the “lone genius” narrative can be tantalizing, it’s almost never true, especially in science. Another is that women often don’t feel welcome in scientific fields — and the reaction to Bouman’s picture reveals hostility many women scientists face all the time. Lastly, to combat this hostility, we need to see more images of women thriving in science. In telling stories about science, there’s a bias in our culture to focus on the lone genius. It’s how the history of science is often told: The world exists one way, and then people such as Issac Newton, Albert Einstein, Thomas Edison, and the like come along and shake up our fundamental understanding of things. Sure, sometimes the “lone genius” trope is warranted. But especially in present times, science is hardly ever a solitary endeavor. The biggest recent discoveries in physics — of the Higgs boson, of gravitational waves, of this black hole image — still involve a huge number of people working over the span of decades. Once the MIT image of Bouman started to go viral, she was suddenly the lone genius behind the Event Horizon Telescope’s groundbreaking discovery. Here’s how House Speaker Nancy Pelosi put it: Congratulations to Dr. Katie Bouman, who developed the algorithm which captured the first ever image of a black hole! You are an inspiration to all Americans and especially to young women and girls with STEAM dreams! https://t.co/OPV0X55lcc And there were many, many more tweets riffing on the assumption that Bouman was the driving force behind the discovery. Bouman and her colleagues clarified, in no uncertain terms, that the black hole image was a team effort. In all, more than 200 scientists worked on it — from all over the world. Heck, even the shipping manager tasked with making sure hard drives made it to the scientists safely from observatories all around the world, including Antarctica, played a crucial role. “No one algorithm or person made this image,” Bouman wrote on Facebook. “It required the amazing talent of a team of scientists from around the globe and years of hard work to develop the instrument, data processing, imaging methods, and analysis techniques that were necessary to pull off this seemingly impossible feat. It has been truly an honor, and I am so lucky to have had the opportunity to work with you all.” In fact, collaboration was crucial to the Event Horizon Telescope’s study design. There were several teams tasked with generating algorithms independently of one another. The goal was to see if all the results were all in agreement with one another, so that the Event Horizon team could feel confident publishing them. The “lone genius” trope is usually unfairly bestowed upon men. And not just by the media but by prestigious scientific institutions. Think of the 2017 Nobel Prize for physics: It was given to Kip Thorne, Rainer Weiss, and Barry Barish for the first detection of gravitational waves. Just three men were awarded the prize, despite the fact that thousands of scientists — men and women — worked on the discovery. Throughout history, women’s roles in major scientific discoveries have been unfairly downplayed or overlooked. Consider Rosalind Franklin’s contributions to the discovery of the structure of DNA. Or the story of Katherine Johnson, the black NASA mathematician whose story became the basis for Hidden Figures, whose work in calculating key orbital moves in the early days of manned spaceflight went uncelebrated for decades. The possibility that Bouman might have been a major player in the black hole discovery similarly seemed to have deeply upset right-wing trolls, perhaps because they feel their status is threatened by women like her. “It’s about what they perceive as a growing cultural/ideological battle that seeks to unjustly advance the station of women and minorities at their expense,” Nour Kteily, a social scientist who has studied the right-wing mindset, writes in an email. The elevation of women possibly makes them feel less secure in their status as men in society. (Just as the rising number of minorities in this country may make white people feel threatened and cause them to support anti-immigration policies.) “From their perspective, the elevation of Bouman represents little more than an example of an undeserving member of a group ... given advantages she hasn’t earned,” Kteily says. Bouman’s picture may have been overhyped — again, she was just one of many brilliant people working in collaboration — but it’s still important. We see so few images of triumphant women in science. “When you think about what a scientist means, you probably think of an Einstein figure — a man in a lab or at a chalkboard with fuzzy, unkempt hair,” my colleague Julia Belluz once wrote. “When you think of a scientist’s voice, you might conjure Neil deGrasse Tyson or Carl Sagan.” That’s because we don’t see images of women scientists like the one above. “The association is reinforced in primary school science textbooks, where images of men outnumber images of women by three to one,” Belluz wrote. It can even be hard to find photos of women scientists on Wikipedia — particularly those from underrepresented demographic groups. When Canadian physicist Donna Strickland won the 2018 Nobel Prize, there wasn’t even a Wikipedia article published about her. A previous entry on her had been removed because she was deemed not significant enough. There are so many ways women and minority scientists have been erased from history or not written into it. It’s often hard to find photographs of historic women scientists (particularly nonwhite women scientists), and many more Wikipedia pages of women scientists still need to be written. Images of women in science matter because far too many women aren’t encouraged, or don’t feel welcome, to pursue careers in science. To this day, many women feel hostility when climbing the career ladder in science. Historically, science and engineering has been a white men’s club, and it shows in the workforce to this day. In January, the Pew Research Center published a report that found 50 percent of women working in STEM fields (science, technology, engineering, and math) have experienced gender discrimination on the job, and 36 percent say sexual harassment is a problem in their workplace. Women represent only 30 percent of the STEM workforce and see a significant pay gap compared with men’s salaries. Women are often underrepresented at the top levels of academic hierarchies. And problems with discrimination appear to be worse when women work in male-dominated offices, according to Pew. Flagrant sexism still exists in science. Earlier this year, a scientist from CERN (the European Organization for Nuclear Research) made headlines when he declared at a scientific conference that “physics was invented and built by men, it’s not by invitation.” He was rebuked and CERN suspended him, but the fact that he had the confidence to make such an assertion speaks volumes about the sexism in science lingering beneath the surfaces. And as hard as it can be for women, it’s even harder for women of color. A 2015 survey found 40 percent of women of color working in astronomy “reported that they had felt unsafe in their current career position due to gender” in a survey. Twenty-seven percent of white women reported the same. “This represents a significant failure in the astronomical community to create safe working conditions for all scientists,” the study authors wrote. “Significant proportions of women compared to men ... reported that they had ever skipped a class, meeting, fieldwork, or other professional event because they did not feel safe.” When you look at the right-wing reaction to Bouman’s story — as exaggerated as some tweets about her might have been — it’s no wonder why some feel this hostility. There are still too many people who don’t want to see a woman in science succeed. Correction: An earlier version of this story misstated Katie Bouman’s academic affiliation. She is a postdoc at Harvard and is soon to start as an assistant professor at Caltech. | NEWS-MULTISOURCE |
User:Bernd Rieke
My name is Bernd Rieke born 15.11.1967 in Rahden Westphalia, Germany
Career
1983 - 1987 Training as a central heating and ventilation systems installer
1988 Foundation of Technical Office Rieke company in Espelkamp
1992 Foundation of Rieke installations company as a sole proprietorship
1995 consist of the master's examination in the central heating-and ventilation trades
1998 Foundation of Rieke Installation GmbH company
1999 Start of construction of a new company building in Rahden
2006 Foundation of the AMR Solar GmbH company
2007 Acquisition of an additional building complex in Rahden
2010 Construction of the largest solar thermal plant in Minden Lübbecke
Reached under the imprint of the standing of the homepage address of www.rieke-installationen.de or [http://www.amr-solar.com www.amr-solar. com]
My interests in Wikipedia
I found to Wikipedia when I was look for more information about the ancestors of my wife Anja, born Trabalski.
Her grandfather is Kurt Lichtenstein, which was shot on 12.10.1961 as the first West German to the inner-German border in Zicherie by East German border guards.
The great-grandfather Stanislaw Trabalski and the great-great-grandpa `s are Franciszek Trąbalski and Richard Lipinski.
Even the great-uncle Karl Trabalski is mentioned here.
I thank all who have helped me in the creation and improvement of the article.
I've created pages in german wiki
Heinrich Bretthorst
Franciszek Trąbalski
Stanislaw Trabalski
Carl Friedrich Grünberg
Heinrich Fleißner
von mir bearbeitete Seiten
Arno Wend
Felix Kaden
Maria Pankratz
Reinhard Strecker
Ernst Grenz
Szczerbiec
Hugo Saupe
Karl Ryssel
Wilhelm Liebknecht
Wilhelm Priesmeier
Erich Schilling (Gewerkschaftsfunktionär)
Weblinks
* Bearbeitungszähler
Bildergalerien
Datei:wellrohr.jpg|Wellrohr von AMR-Solar File:Weichlot.jpg File:Pelletsilo.gif|Pettelbehälter von AMR-Solar File:Pumpe.gif|Effizienzklasse A Pumpe File:Kollektoranlage.JPG|Montiert durch Rieke-Installation GmbH File:Kollektor Schnittbild.jpg|Schnitt eines Premio 27 Kollektors von AMR-Solar File:Solarflüssigkeit.jpg|Solarflüssigkeit Konzentrat für AMR-Solar Kollektoren
de:User:Bernd Rieke | WIKI |
Global React Snackbar that renders responsibly
By Alejandro Ocampo (@kadosh) - 25 Oct 2019
Observer-Pattern Typescript uno-material-ui React material-ui
A Global Snackbar for your React project
Global-Snackbar On this episode, I want to show you one of the reusable and useful React components we have used across multiple projects at Unosquare.
We have published a library called uno-material-ui, which you can find at: https://github.com/unosquare/uno-material-ui. As you may noticed, this is assuming you are working with Material-UI. If you don’t know it, please take a look at it: https://material-ui.com/
And you can immediately start using it in your project with the traditional:
npm i uno-material-ui
But I really want to focus on one of those components: the GlobalSnackbar.
What does it do?
Well, it is as simple as a normal Snackbar, it shows a message to the user.
How to use it?
In order to use it in your project, you will need to do three things:
1) Include the <SnackbarContainer /> right after your Theme Provider. Something like this:
...
import { SnackbarContainer } from 'uno-material-ui';
...
<ThemeProvider theme={outerTheme}>
...
<SnackbarContainer />
...
</ThemeProvider>
That <SnackbarContainer /> will hold the Snackbar messages for your application.
2) Now that we have the container in place, then you need a way to send messages to it. You will need our snackbarService. That is the guy in charge of sending your messages to the GlobalSnackbar. Simply import it wherever you need it. Just do something like this:
import { snackbarService } from 'uno-material-ui';
3) Then, let’s call the snackbarService.showSnackbar(messageText, messageType) on your component. Something like this:
...
import { snackbarService } from 'uno-material-ui';
export const SimpleComponent = (props: any) => {
const showInfoMessage = () => {
snackbarService.showSnackbar('Hey! Check this snackbar', 'info');
};
const showErrorMessage = () => {
snackbarService.showSnackbar('Hey! This is broken', 'error');
};
return (
<>
<Button onClick={showInfoMessage}>Show info message</Button>
<Button onClick={showErrorMessage}>Show error message</Button>
</>
);
};
Pretty easy, right?
If you have a project where you’re using React and Material-UI you can give it a try. You don’t need to worry about how to implement this in your application anymore. We have done it and we hope you like it and find it handy.
Why it was made that way?
You might be curious about three main things:
1. Why not using React Context?
2. What in the world is the snackbarService? What kind of Angular stuff is this?
3. How is this actually working?
Believe me, it is simpler than you might think. It is just a simple implementation of the Observer Pattern along with some attention to render responsibly and a Singleton.
Feel free to take a look at the code on the repository. I will do my best to come back and share the reasons we did it this way.
Thanks for reading and if you have enjoyed this please encourage us to keep posting with your feedback.
Comments | ESSENTIALAI-STEM |
Loading... Please wait...
Sleeping during Pregnancy
Posted on
Can't sleep during your exhausting pregnancy?
All pregnant women face trouble sleeping at some point in their pregnancy. Along with being pregnant, women often experience a constant need to pee, nausea, heartburn, pregnancy insomnia, and fatigue. From morning sickness and back pain to scary dreams, there are just so many things that can lead to sleep deprivation.
Read on to find out what you can expect during each trimester and how you can sleep better during your exhausting pregnancy.
Sleeping for two
Just as pregnant women are told to eat for two, the same applies when it comes to sleeping. It’s not rare to hear medical professionals emphasizing the importance of sleeping for two during pregnancy. Getting enough sleep is vital for a healthy pregnancy.
Many researchers found links between the quality and quantity of pregnant women’s sleep and complications at birth, including preterm births and low birth weight. Low-quality sleep and insufficient sleep can lead to disruptions of the functioning of the normal immune system.
Studies also suggest that there’s a complicated and dynamic relationship among sleep, immune function, and depression. Poor quality sleep contributes to elevated levels of inflammation in the body. Also, insufficient sleep can lead to depression which may result in birth-related complications. Depressed women have higher levels of cytokines than non-depressed women. Cytokines are communication molecules that are involved in regulating the body’s immune responses.
Sleep and the first trimester
Women face particular challenges to sleep during their early pregnancy. Some of the challenges include:
●Constant trips to the bathroom
●Body aches, especially lower back pain, as well as pain in thighs and buttocks
●Morning sickness
In order to get better quality sleep during your first trimester, it’s recommended to:
●Avoid drinking fluids after 6 p.m. This will help you skip the constant trips to the bathroom.
●Stock snacks in your nightstand. Eating a few crackers at midnight might ease your nausea.
●Nap as often as possible. Plan your snooze time and always remember to get enough sleep. It’s advised to take two or three 30-minute naps rather than one two-hour nap.
●Exercise in the morning. Being active in the morning will encourage better and sounder sleep.
Sleep and the second trimester
Many women also have trouble getting a restful night’s sleep during their second trimester. During this period, pregnant women report having:
●Leg cramps
●Heartburn
●Vivid dreams
Some solutions for your second trimester sleep issues include:
●Eating healthy. Avoid spicy, fried and acidic foods. Stick to more nutritious foods such as dairy products, fish, broccoli, salmon, eggs, lean meat, and sweet potatoes.
●Not lying down after eating. Make sure you stay upright for hours after eating. Your digestive process is slowed down during pregnancy and sitting upright will keep stomach acids where they belong.
●Avoiding drinking carbonated drinks. Soda water, ginger ale, energy drinks, diet drinks and the likes should not be on your menu. The phosphorus in bubbly beverages decreases the amount of calcium you're able to metabolize.
●Stretching your calf muscles, choosing proper footwear and staying active in order to alleviate your leg pain.
●Learning how to relax. Practice relaxation techniques such as prenatal yoga and meditation, or soak in warm baths. This might help with your anxiety dreams and your sleeplessness.
Sleep and the third semester
Just as the first two trimesters can bring their own challenges, so can the third. Some of the challenges to look out for include:
●Back pain
●Frequent urination
●Restless legs
●Worry and anxiety
The good news is that there are some things to do in order to lessen the symptoms, including:
●Joining a pregnant mom-to-be group or a class that teaches prenatal relaxation exercises.
●Reading a book to help with the restless worry and anxiety.
●Trying some sleeping positions that may help you get your much-needed rest. If you are having problems with back pain, use the “SOS” position. If you are experiencing heartburn during the night, try propping your upper body with pillows.
●Warming up some mint tea to relax your body and mind. Mint tea is proven to be one of the best sleep aids.
●Wearing a nursing bra that can offer comfort throughout the day. This nursing bra is a must have item for every expecting and new mom. It can also serve as a nursing sleep bra and athletic bra.
●Using pillows between your knees and behind your back. Or use a pregnancy pillow to ease the discomfort of pregnancy and cradle you off to the land of dreams.
●Staying active. Don’t forget to stretch regularly and do abdominal exercises.
●Avoiding drinking liquids for two hours before going to sleep.
●Taking evening walks and warm baths.
●Eating foods rich in iron and folate.
●Avoiding drinking coffee, soda, and other caffeinated beverages.
●Getting into a regular sleep routine. Go to bed and wake up at the same time every day.
●Using a heating pad.
Back to Top | ESSENTIALAI-STEM |
Talk:Dance Valley
is "Dance Valley" include "DANCE" too?
Dance Valley 2001
Dance Valley 2001 was one of the best music festivals I've ever attended. Absolutely awesome. The post-festival experience was deplorable.
Dance Valley 2001 was a significant distance from regular transport links. The transport plan to get into the festival was great. We got there very quickly via the plentiful chartered bus routes provided by the organisers. If there was a transport plan to get people out, it must've read "good luck 90,000 punters, because that many buses are expensive at that time of night.".
After the festival ended, we waited for a few hours at the festival bus area. The entire time we were there, we saw zero staff providing information. But, every so often a single bus would arrive and so we assumed a massive convoy of buses would turn up "any minute now". After all, we were in the middle of nowhere, transport-wise. The organisers knew how many buses were needed to get us into this place, so they obviously knew how many were needed to get us out.
The frequency of buses declined. Eventually it became apparent there were no more coming. It seemed that some people knew how to walk out of there... plus, it had started to rain. So, we started walking in near freezing rainy conditions. That was sometime around midnight, I think.
Since Dance Valley was a (mainly) daytime festival and the weather was really nice that day, most people had minimal clothing. As I walked, I had to wake a number of individuals sleeping under trees beside the road and get them to keep walking. I assumed the groups of people huddled under trees would be safe from hypothermia, despite everyone being thoroughly rain-soaked. The stream of people gradually got dispersed as people took different routes at crossroads. I have no idea if we stuck with the best group. After several hours, the group we were with got to a station. However, the first train wasn't departing until later that day... thankfully, despite regulations, the rail staff allowed us all to stay inside the train until departure... not sure they had much choice there, though.
In the following days, the Dutch media reported that a number of people died from exposure that night.
Why is there no mention of the fact that the "several cases of hypothermia" actually includes people who died? Probably due to the reason I'm not editing the main article to include that information... I cannot find any online references to verify it.
The statement "busses and other transport were overwhelmed" is true. The number of buses organisers provided for disembarkation was miniscule. Providing 50 buses for 90,000 people will obviously result in buses being overwhelmed. Even if you disregard the fact organisers knew how many buses were provided to get people into Dance Valley, it was a ticketed event. They knew how many people were there. Therefore, they knew how many buses would be needed to get people out.
The statement "To complicate matters further, a rainstorm erupted and drenched stranded party goers on their way home" is simply outrageous. How does a transport plan get complicated by rain? At worst, it means that people get on a bus while they're wet... I have zero doubt that every person there would have loved the opportunity to get onto a bus, even when soaking wet. Which begs the question...
Question : If we were "on our way home", how did we get drenched?
Answer: We were walking home because there was no other option. — Preceding unsigned comment added by Kordau (talk • contribs) 12:51, 11 November 2021 (UTC) | WIKI |
Trauma-associated sleep disorder: A posttraumatic stress/REM sleep behavior disorder mash-up?
John C. Feemster, Kevin L. Smith, Stuart J. McCarter, Erik K. St Louis
Research output: Contribution to journalArticlepeer-review
7 Scopus citations
Abstract
Trauma-associated sleep disorder (TASD) is a parasomnia sharing characteristics of post-traumatic stress disorder (PTSD) and REM sleep behavior disorder (RBD) including dream-enactment behavior (DEB). Here we report REM sleep without atonia (RSWA) and other neurological features in a patient with complex vocal and motor DEB following traumatic combat military exposure. Post-discharge, his wife observed frequent yelling and jerking during sleep with dream mentation reminiscent of traumatic military experiences. He was initially diagnosed with PTSD. Polysomnography demonstrated RSWA and severe obstructive sleep apnea treated with nasal continuous positive airway pressure (CPAP). Dream-enactment behavior severity and frequency was reduced, but still persisted despite nasal CPAP and sequential ?uoxetine, escitalopram, prazosin, and melatonin trials. Our case demonstrated overlapping clinical features of PTSD and RBD with polysomnography features of RSWA supportive of idiopathic RBD but no 'soft signs' suggesting underlying synucleinopathy. Longitudinal follow-up of larger case series must clarify whether TASD consistently manifests REM sleep atonia loss and determine the phenoconversion risk for synucleinopathy neurodegeneration.
Original languageEnglish (US)
Pages (from-to)345-349
Number of pages5
JournalJournal of Clinical Sleep Medicine
Volume15
Issue number2
DOIs
StatePublished - 2019
Keywords
• Polysomnography
• Posttraumatic stress disorder
• REM sleep behavior disorder
• Trauma associated sleep disorder
ASJC Scopus subject areas
• Pulmonary and Respiratory Medicine
• Neurology
• Clinical Neurology
Fingerprint Dive into the research topics of 'Trauma-associated sleep disorder: A posttraumatic stress/REM sleep behavior disorder mash-up?'. Together they form a unique fingerprint.
Cite this | ESSENTIALAI-STEM |
Domain Join using PowerShell V2.0 Part I
In the time of IaaS (Infrastructure as a Service) and cloud computing, provisioning of new servers by one click should not be a problem. And when we’re talking about cloning virtual machines (vmdk / vhd) that’s true for sure. But what about the necessary post steps after the VM and Operating System is ready? For example joining the windows server to any domain automatically? Many companies still do these steps by hand. Of course, if we work for a large one, we probably already have tools to save some time on these post-steps (e.g. if you have a vCenter Server, you can use the “deploy virtual machine from this template” function, which has some built-in tricks like domain join). But these tools are usually just trigger some built-in Windows mechanism like sysprep.
What happens if we want our own, customized solution which is probably better than the commercial ones? Then it’s time to write our own post-script tool set, and use these scripts to automate our work.
Let’s start with the automatic domain join.
In Powershell V2 there is a new cmdlet called Add-Computer which has actually more features than the GUI version of domain join.
Add-Computer [-DomainName] [-Credential ] [-OUPath ] [-PassThru] [-Server ] [-Unsecure] [-Confirm] [-WhatIf] []
Let’s go through the interesting parameters:
[-PassThru]
You can use passthru to get some basic information about the results of the domain join process. You can send this information to a central database or just put it into your logfile.
[-Unsecure]
When you join a computer to a domain, the computer account is normally created with a unique password. Using the unsecure option, the computer account will have a common password which will be changed after the domain join is complete.
[-OUPath ]
This option gives you the possibility to define a specific Organization Unit where the server’s computer account needs to be created. You don’t need to pre-create the computer accounts or move them to the appropriate OU anymore after the server is joined to the domain. You can do this in one step.
[-Credential ]
The Credential parameter specifies the account which has the rights to create computer accounts in the domain. The Add-Computer cmdlet uses the current user by default for the authentication. Good to know: you cannot put the account’s password as a plain text here, the command will use a pop-up window where you need to enter the password for the account which was defined after the -Credential parameter.
Luckily there is a way to specify the password and pass it as a parameter to the Add-Computer command-let, using SecureStrings in PowerShell (this comes from the behaviour of the PowerShell. The Add-Computer command-let accepts PSCredential .Net object as input parameter). Below you can find an example on how to do it:
$user = "domainjoinadmin"
$pass = ConvertTo-SecureString "P@ssw0rd88736" -AsPlainText -Force
$DomainCred = New-Object System.Management.Automation.PSCredential $user, $pass
Add-Computer -credential $DomainCred
Probably you’ve already recognized that in this case we store the “P@ssw0rd88736” as a plain text in the source code which is pretty unsecure. In the second part of this article we’re going to give you some ideas on how to provide this information to your Windows server during the provisioning.
Advertisements
8 thoughts on “Domain Join using PowerShell V2.0 Part I”
1. I can’t seem to get this work, i get the following error when executed. What am I doing wrong???
Script is:-
$DomAdminPwd = “MyStr0ngPassw0rd123”
$user = “Administrator”
$pass = ConvertTo-SecureString “$DomAdminPwd” -AsPlainText -Force
$DomainCred = New-Object System.Management.Automation.PSCredential $user, $pass
Add-Computer -domainname testdomain.dom -credential $DomainCred
Error:-
Add-Computer : This command cannot be executed on target computer(‘Server01’) due to following error: The format of the
specified domain name is invalid.
At C:\Script\AddtoDom.ps1:5 char:13
+ Add-Computer <<<< -domainname testdomain.dom -credential $DomainCred
+ CategoryInfo : InvalidOperation: (Server01:String) [Add-Computer], InvalidOperationException
+ FullyQualifiedErrorId : InvalidOperationException,Microsoft.PowerShell.Commands.AddComputerCommand
2. Hope this helps anyone with the same problem. I have figured out the issue basically it is expecting the user name to be in the format domain\user. So the line
$DomainCred = New-Object System.Management.Automation.PSCredential $user, $pass
should be changed to.
$DomainCred = New-Object System.Management.Automation.PSCredential $DomainName\$user, $pass
3. what i did is add-computer -DomainName xxx.local -passthru -OUPath “OU=WORKSTATION,DC=xxx,DC=local” with out the pass word and when i as login as admin
1. @Justin: my recommendation is to use Powershell version 3 for this task, it does not use remoting. Submit the machine names in the -Computername parameter.
Example from the help:
Add-Computer -ComputerName (Get-Content Servers.txt) -Domain Domain02 -Credential Domain02\Admin0
I haven’t tried this, though…
Leave a Reply
Fill in your details below or click an icon to log in:
WordPress.com Logo
You are commenting using your WordPress.com account. Log Out / Change )
Google+ photo
You are commenting using your Google+ account. Log Out / Change )
Twitter picture
You are commenting using your Twitter account. Log Out / Change )
Facebook photo
You are commenting using your Facebook account. Log Out / Change )
Connecting to %s | ESSENTIALAI-STEM |
Talk:Bruce George
Untitled
What about Bruce George from Animal Planet (the "Snake buster")? Shouldn't there be a disambiguation page? | WIKI |
Warning
This is the documentation the latest work-in-progress version of MPF!
This is the documentation for MPF 0.56, which is the “dev” (next) release of MPF that is a work-in-progress. This is probably ok, and means you’ll be on the latest, cutting-edge version of MPF.
However, if you want a more stable version, select the v:stable version from the lower-left corner of this page, which is the most recent version that is not getting new updates.
If you are new to MPF, we have recently rewritten the installation process which only applies to this “latest” 0.56, so you probably want to stay here because the prior installation process doesn’t work on the latest OS and Python versions.
Troubleshooting
Your machine is not starting, behaving weird or crashing? We are sorry to hear that. This chapter tries to help you to help yourself. Please try to find the root of your problem. Maybe the solution will be obvious then. If not we will help you in the forum.
Please remember that this is a two step process: First, try to diagnose the problem and collect as much information as possible. Second, report the issue if you cannot find a solution yourself. If you skip the first step we will likely send you to this page.
Step 1: Diagnosing Your Issue
Do you already know how to turn on debugging and increase log verbosity?
What kind of issue are you having?
If you coils are not firing, switches are not working or hardware is behaving weirdly in general read our hardware troubleshooting guide.
Step 2: Prepare a Report and Ask in the Forum
Please include the following information if available and relevant:
Output of MPF diagnosis
If your game won’t run, let’s make sure MPF is ok. This will also tell use which MPF and MPF-MC version you are using. Run mpf diagnosis from within your machine folder to see if your installation is fine:
$ mpf diagnosis
MPF version: MPF v0.50.0-dev.11
MPF install location: /data/home/jan/cloud/flipper/src/mpf/mpf
Machine folder detected: /data/home/jan/cloud/flipper/src/good_vs_evil
MPF-MC version: MPF-MC v0.50.0-dev.5 (config_version=5, BCP v1.1, Requires MPF v0.50.0-dev.10)
Serial ports found:
/dev/ttyUSB3
desc: Quad RS232-HS
hwid: USB VID:PID=0403:6011 LOCATION=1-12
/dev/ttyUSB2
desc: Quad RS232-HS
hwid: USB VID:PID=0403:6011 LOCATION=1-12
/dev/ttyUSB1
desc: Quad RS232-HS
hwid: USB VID:PID=0403:6011 LOCATION=1-12
/dev/ttyUSB0
desc: Quad RS232-HS
hwid: USB VID:PID=0403:6011 LOCATION=1-12
Relevant Configuration
Please provide the relevant configuration snippets. Leave out anything which is not related. For instance if you got problems with lights on your P-Roc or FAST platform provide the configuration for the relevant lights, the p_roc or fast section and any light_players or shows which are used when the problem occurs.
Attach a Log with debug and verbose logging
Please attach the log with verbose logging from MPF or MPF-MC (depending where your problem occured). Make sure you enabled debug on the relevant devices and/or platforms. See how to turn on debugging and increase log verbosity for details.
A link to your machine config also help. Ideally this would be some git repository which can be checked out and browsed online.
Prepare the Error Message
Your error message likely is inside your log. However, please include it inside your message as well. See Reading MPF Errors for how to read the error.
Please check the relevant device or platform documentation for any mentions of that error. Often we already documented how to solve it.
Tell Us How to Reproduce Your Problem
It might be hard for us to help you if we cannot reproduce your issue. Is there a way you can provide a minimal config which shows your problem? Try to remove everything unrelated to your problem and bring it to its bare minimum. Sometimes you will find the root of the issue while doing this. You would be surprised how often issues are caused by seemingly unrelated devices or configs.
Ideally you can provide a single file test which fails or shows your issue in its log. This allows us to verify the issue quickly and provide a quick fix. But don’t worry if this not possible. Just a minimal machine config is also fine. In that case please tell us how to run your machine to experience the issue.
Ask In the Forum
With all this information ask in our support forum. Please keep in mind that MPF is an open source project and we are doing this for fun in our spare time. Be kind and patient. If you provide more relevant information it is likely that somebody can help you. More is not always better if it is not relevant to your problem. But missing information will just delay the overall process.
1. If you got a problem with a device (e.g. a ball_lock) or a platform (e.g. P-ROC or FAST) add debug: True to the relevant config section to enable extra debug output.
2. Add a log of your game. Therefore, run your game with mpf both -v -V and grab the latest MPF and MC log from the log folder in your machine.
3. Describe how to reproduce your problem.
4. Provide relevant config snippets or, if possible, a link to download/checkout your machine config so we can reproduce the issue.
Consider Improving the Documentation
Did you solve your issue but found that some relevant information in the documentation is missing or should be linked/located elsewhere? Either tell us in the forum or consider improving the documentation yourself to save future users some troubles the same way others saved you some troubles by writing this documentation. | ESSENTIALAI-STEM |
GOP chairwoman pans Obama Interior budget as ‘rocky start’ to 2016 | TheHill
The chairwoman of the Senate Energy and Natural Resources Committee on Tuesday blasted President Obama’s budget request for the Department of the Interior as a bad start to his final year in office. While Sen. Lisa MurkowskiLisa Ann MurkowskiThe Hill's Morning Report - Progressives, centrists clash in lively Democratic debate Senate braces for brawl over Trump's spy chief Congress kicks bipartisan energy innovation into higher gear MORE (R-Alaska) focused largely at a hearing on what the budget would mean for Alaska, she said the country as a whole would suffer. “When we look at the budget in front of us, it looks like, again, a rocky start to the final year of this administration,” Murkowski told Interior Secretary Sally JewellSarah (Sally) Margaret JewellNational parks pay the price for Trump's Independence Day spectacle Overnight Energy: Zinke extends mining ban near Yellowstone | UN report offers dire climate warning | Trump expected to lift ethanol restrictions Zinke extends mining ban near Yellowstone MORE at a hearing about the budget request filed earlier this year. Murkowski said the $13.4 billion budget for the department, which includes the National Park Service, Bureau of Land Management and Bureau of Ocean Energy Management, falls short in giving Alaska control over land within its borders. The spending blueprint also puts new costs on energy and mineral production on federal land, she added, among other criticisms. “What I see, unfortunately, is a continuation of the efforts to block our ability to safely develop our resources, and really take away some of the best opportunities that I think my state has to grow and prosper,” she said about the provisions specific to Alaska. The budget also “seeks to impose new fees on energy producers and a new royalty on hard rock miners,” she said. “At a time when energy and commodity prices are low, I would expect that Interior would be looking for practical ways to make our energy and mining industries more competitive. But based on this budget, it looks like the goal is to drive them away from our federal lands and waters.” Other Republicans piled on with criticisms. Sen. Bill Cassidy (R-La.) said it does not make sense to end a program that gives coastal states a share of revenue from offshore drilling. The program helps rebuild wetlands, which could prevent flooding disasters such as Hurricane Katrina from getting out of hand, in Louisiana and other states, he added. “The only way to keep that from happening again is if we rebuild our wetlands,” he said. “And lo and behold, your budget takes away those dollars.” Sen. John BarrassoJohn Anthony BarrassoIf Democrats want gun control, they must first concede defeat Conway: Republican concerns about gun reform 'all reconcilable' Five proposals Congress is eyeing after mass shootings MORE (R-Wyo.) slammed Interior’s decision to halt new coal leases on federal land. “I’m having a difficult time understanding why the agency is taking this step, because of the last three years, the demand for federal coal has collapsed,” he told Jewell. “Given that demand for federal coal is down 95 percent, do you really think it’s reasonable to increase the royalty rates for coal?” Jewell defended the budget proposal and sought to highlight provisions that reflect major Obama administration priorities. “It builds on the successes we’re achieving through partnerships, the application of science and innovation, and balanced stewardship,” she said. “It gives us the tools to help communities strengthen resilience in the face of climate change, conserve natural and cultural resources, ensure clean and sustainable water, engage the next generation with the great outdoors, promote a balanced approach to safe and responsible energy development, and expand opportunities for Native American communities.” The committee’s Democrats, while critical of some provisions specific to their states, praised the proposal overall. “In my view, this is a very responsible proposal,” said Sen. Maria CantwellMaria Elaine CantwellNative American advocates question 2020 Democrats' commitment Hillicon Valley: Trump reportedly weighing executive action on alleged tech bias | WH to convene summit on online extremism | Federal agencies banned from buying Huawei equipment | Lawmakers jump start privacy talks Lawmakers jump-start talks on privacy bill MORE (D-Wash.), the top Democrat on the panel. “It balances the funding for the Department of Interior’s often conflicting conservation and development mandates,” she said. “And more importantly, I’m pleased that the budget and recent secretarial directives are taking a long-term and forward-looking approach to responsible energy development on public lands to address the impacts of climate change into the future.” View the discussion thread. The Hill 1625 K Street, NW Suite 900 Washington DC 20006 | 202-628-8500 tel | 202-628-8503 fax The contents of this site are ©2019 Capitol Hill Publishing Corp., a subsidiary of News Communications, Inc. | NEWS-MULTISOURCE |
Our World Statistics Day conversations have been a great reminder of how much statistics can inform our lives. Do you have an example of how statistics has made a difference in your life? Share your story with the Community!
Choose Language Hide Translation Bar
Highlighted
Sully
Level III
Query Using Results of Another Query
Good Morning,
I am wondering if it is possible to use the results of a database query and input them into another query to pull from another database within a JSL?
For example, one of my scripts will pull the usernames from a db based on predetermined criteria. I then take those user names and run another script to pull additional data on the usernames account. I was hoping there is a way to make the inital pull of usernames and have the JSL input those usernames into the second query.
I have tried looking all over and haven't been able to find the answer.
I appreciate the help!
Thanks,
Sully
1 ACCEPTED SOLUTION
Accepted Solutions
Highlighted
pmroz
Super User
Re: Query Using Results of Another Query
This might be a simpler example for you to work with. SQL syntax is Oracle.
dbc = create database connection(
"Driver={Oracle in OraClient11g64_home1};UID=bigdatauser;PWD=bigdatapassword;");
user_sql =
"SELECT DISTINCT u.username
FROM bigdata.user_info u
WHERE u.access_date > to_date('01-Jan-2018','DD-Mon-YYYY')";
user_dt = execute sql(dbc, user_sql);
// Convert list of usernames to IN list
user_list = user_dt:username << get values;
close(user_dt, nosave);
user_in_list = "IN ('", concat items(user_list, "', '") || "')";
data_sql = evalinsert(
"SELECT m.*
FROM bigdata.machinery m
WHERE m.username ^user_in_list^");
data_dt = execute sql(dbc, data_sql);
close database connection(dbc);
View solution in original post
5 REPLIES 5
Highlighted
txnelson
Super User
Re: Query Using Results of Another Query
The answer is yes. You can build any subsequent query you need, based upon a previous query(s)
Here is a simple, and silly example
Names Default To Here( 1 );
// Run a Query to get one set of information...in this case what ages are
// found for the females
dt = New SQL Query(
Version( 130 ),
Connection( "JMP" ),
JMP Tables(
["Big Class" => "\C:\Program Files\SAS\JMPPRO\14\Samples\Data\Big Class.jmp"]
),
QueryName( "SQLQuery1" ),
Select(
Column(
"age",
"t1",
Analysis Type( "Ordinal" ),
Numeric Format( "Fixed Dec", "0", "NO", "" )
)
),
From( Table( "Big Class", Alias( "t1" ) ) ),
Where( Custom( "sex = \!"F\!"", UI( Custom( Base( "Continuous" ) ) ) ) )
) << Run;
// Find the distinct ages
Summarize( dt, ages = by( :age ) );
// Build the required Where Clause for the next query
queryCode = "age in(" || ages[1];
For( i = 2, i <= N Items( ages ), i++,
queryCode = queryCode || ", " || ages[i]
);
// Close out the Where Clause
queryCode = queryCode || ")";
New SQL Query(
Version( 130 ),
Connection( "JMP" ),
JMP Tables(
["Big Class Families" =>
"\C:\Program Files\SAS\JMPPRO\14\Samples\Data\Big Class Families.jmp"]
),
QueryName( "SQLQuery3" ),
Select(
Column( "picture", "t1", Analysis Type( "None" ) ),
Column( "name", "t1" ),
Column(
"age",
"t1",
Analysis Type( "Ordinal" ),
Numeric Format( "Fixed Dec", "0", "NO", "" )
),
Column( "sex", "t1" ),
Column( "height", "t1", Numeric Format( "Fixed Dec", "0", "NO", "" ) ),
Column( "weight", "t1", Numeric Format( "Fixed Dec", "0", "NO", "" ) ),
Column( "sibling ages", "t1", Analysis Type( "Multiple Response" ) ),
Column( "sports", "t1", Analysis Type( "Multiple Response" ) ),
Column( "countries visited", "t1", Analysis Type( "Multiple Response" ) ),
Column( "family cars", "t1", Analysis Type( "Multiple Response" ) ),
Column( "reported illnesses", "t1", Analysis Type( "Unstructured Text" ) ),
Column( "age vector", "t1", Analysis Type( "Vector" ) )
),
From( Table( "Big Class Families", Alias( "t1" ) ) ),
// add the queryCode to the Where() function
Where( Custom( queryCode, UI( Custom( Base( "Continuous" ) ) ) ) )
) << Run;
Jim
Highlighted
pmroz
Super User
Re: Query Using Results of Another Query
This might be a simpler example for you to work with. SQL syntax is Oracle.
dbc = create database connection(
"Driver={Oracle in OraClient11g64_home1};UID=bigdatauser;PWD=bigdatapassword;");
user_sql =
"SELECT DISTINCT u.username
FROM bigdata.user_info u
WHERE u.access_date > to_date('01-Jan-2018','DD-Mon-YYYY')";
user_dt = execute sql(dbc, user_sql);
// Convert list of usernames to IN list
user_list = user_dt:username << get values;
close(user_dt, nosave);
user_in_list = "IN ('", concat items(user_list, "', '") || "')";
data_sql = evalinsert(
"SELECT m.*
FROM bigdata.machinery m
WHERE m.username ^user_in_list^");
data_dt = execute sql(dbc, data_sql);
close database connection(dbc);
View solution in original post
Highlighted
Sully
Level III
Re: Query Using Results of Another Query
Apologizes for the late reply. I kind of dissapeared from the JMP world for a little while.
I am back attempthig at it attempting this script. When getting to the portion for creating the user_in_list i continue to receive the error message below:
Unexpected ",". Perhaps there is a missing ";" or ",".
Line 54 Column 23: user_in_list = "IN ('"►, concat items(user_list "',
The remaining text that was ignored was
,concat items("user_list"', ')"||"');
user_in_list = "IN ('", concat items(user_list "', '") || "')";
The data that I am using is a list of case numbers instead of usernames. Could it be that even though the column is Character the numbers are affecting this line?
Thanks again for the help!
Highlighted
pmroz
Super User
Re: Query Using Results of Another Query
You have a comma where you should have the string concatenation operator ||, and you are missing a comma in concat items.
user_list = {"a", "b", "c"};
user_in_list = "IN ('" || concat items(user_list, "', '") || "')";
"IN ('a', 'b', 'c')"
Highlighted
Sully
Level III
Re: Query Using Results of Another Query
JMP Community does it again.
You all are the best. Thank you!
Article Labels
There are no labels assigned to this post. | ESSENTIALAI-STEM |
The Effect of Muscles on Language
icon head thoughtsIn the course of finding and reading the results of scientific research into the hugely beneficial effects of exercise on being older, one thing has jumped out at us, the importance of maintaining good muscle mass and tone - something we have written about time and again! When one looks at ‘normal’ older people, much of the ‘decline due to age’ can be put down to muscle deterioration and loss, with the consequent weakness and frailty which is so debilitating. So one can appreciate the effect of muscles on health. But what about the effect of muscles on ... language?
One of the major constituent parts of language is ‘verbs’. Verbs, as we’re sure you know, are words that describe actions, commonly described as ‘doing words’. All actions are only made possible through the existence of muscles. Every move you make of any description uses a surprisingly large number of the over six hundred muscles that make up a substantial percentage of your body. No muscle, no movement. Therefore without muscle there would be no need for the concept of verbs in any sense. Get up out of a chair and walk across the room? Can’t be done without skeletal muscle. Etc etc.
So... no muscle, no verbs. And no adverbs, either. Maybe half of language gone at a stroke.
It goes further than that, even. Without the muscles involved in speech - the digastric, masseter, stylohyoid, mylohyoid, genihyoid, pterygoid muscles, the temporalis to mention just a few - you would not be able to move your tongue or lips to create the sounds of the verbs that you’d not have need of. Nor would you be able to inhale, to draw in the air - using the sternocleidomastoid and the scalene muscles - and then allow the lungs the contract to expel the air across your vocal chords in order to make the sounds that your lips and tongue would then shape into the unnecessary verbs. There would be no singing, no music, even - the word ‘playing’ as in playing the piano is definitely a verb.
One could even go further. No muscles to enable you to inhale the air to then be expelled across the vocal chords actually means .... no life!
So you really can see the fundamental importance of skeletal muscle to life, and to all activity. No Muscle no life. And since one thing that all medical scientists agree on is that at a certain age you start to lose muscle, that muscle starts to atrophy, you can imagine that as this process happens, over time it will gradually reduce your ability to take part in not just the sports and exercise that we write about on these pages, but all the physical activities of daily life. Everything will become more difficult and less achievable and the range of activities that you might enjoy will gradually shrink to a smaller and smaller pool of possibilities. Less muscle, less of a life. There is no consensus on the age at which the atrophy begins, most people accept that it has certainly started by the age of fifty, but one article proposed that it starts as early as in your thirties!
However, it is not all doom and gloom, because there is also a growing consensus that the progress of losing muscle is not unalterable. This is something that you can do something about. You can slow your muscle loss by your own actions. By adding resistance training to your exercise regime, you can slow the loss to a marked extent, and we at SGSC are in no doubt that in fact at any age muscle can be rebuilt, with all the fundamental benefits to health and quality of life that brings.
You spend a long time in the early part of life learning language, so don’t let mistaken ideas about getting older reduce, or take away entirely, your need for using verbs.
#lifesagamekeepplaying | ESSENTIALAI-STEM |
Ajax-使用ajax传回来的数据怎样在jsp页面进行分页
意见反馈 意见反馈 主题:991 回复:2082
Ajax-使用ajax传回来的数据怎样在jsp页面进行分页
甜柠檬 发布于 2017-06-17 字数 0 浏览 1038 回复 1
发布评论
需要 登录 才能够评论, 你可以免费 注册 一个本站的账号。
支持 Markdown 语法,需要帮助?
评论(1
偏爱自由 2017-07-30 1 楼
Ajax只是负责不刷新页面的情况向后台发送数据,然后接收后台的数据更新到页面上实现无刷新更新页面,所以分页不是在页面上进行的,而是在servlet里面实现的。
前台和服务器直接通信一般有2种一个是通过json数据,一个是xml文件的形式。我给你个xml形式的前台页面:
<%@ page language="java" import="java.util.*" pageEncoding="gb2312"%>
<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html>
<head>
<script type="text/javascript">
var js = {
XMLHttp:null,
//发送请求函数
sendRequest:function(url,responseFun,callback){
//创建XMLHTTPRequest对象
(function(){
//根据浏览器类型创建XMLHTTPRequest对象
if(window.XMLHttpRequest){
js.XMLHttp = new XMLHttpRequest();
}
else{
try{
js.XMLHttp = new ActionXObject("Msxml2.XMLHTTP");
}catch (e){
try{
js.XMLHttp = new ActiveXObject("Microsoft.XMLHTTP");
} catch (e0){alert("Microsoft"+e0);}
}
}
})();
js.XMLHttp.open("POST", url, true);
js.XMLHttp.onreadystatechange = function(responseFunction){
if(js.XMLHttp.readyState == 4){
if(js.XMLHttp.status == 200){
responseFun(js.XMLHttp);
}else{
document.getElementById("div").innerHTML = "<font color='red'>连接服务器异常...</font>" ;
}
}
else{
//document.getElementById("div").innerHTML = "<font color='red'>数据加载中...</font>" ;
}
};//指定响应函数
js.XMLHttp.send(null);
return js.XMLHttp;
}
}
//响应函数
function responseFunction(xmlhttp){
var xmlDOM = xmlhttp.responseXML; //接受服务器返回的xml文档
parse(xmlDOM);//解析XML文档
}
//解析XML文档
function parse(xmlDOM){
var person = xmlDOM.getElementsByTagName("person");
var page = xmlDOM.getElementsByTagName("page")[0];
var currpage = page.getElementsByTagName("currpage")[0].firstChild.data;
var pagecount = page.getElementsByTagName("pagecount")[0].firstChild.data;
var prevpagehtml;
var nextpagehtml;
if((currpage-0)<=1){
prevpagehtml = "<a>上一页</a>";
}else{
prevpagehtml = "<a onclick='AjaxTest("+(currpage-1)+");' href='javascript:void(0);'>上一页</a>";
}
if((currpage-0)<(pagecount-0)){
nextpagehtml = "<a onclick='AjaxTest("+(currpage-0+1)+");' href='javascript:void(0);'>下一页</a>";
}else{
nextpagehtml = "<a>下一页</a>";
}
var html = "<table style='font-size: 12px; color: red'><tr><td width='80'>编号</td><td width='100'>姓名</td><td width='80'>年龄</td></tr>";
for(i=0;i<person.length;i++){
html = html+ "<tr><td>"
+person[i].getElementsByTagName("pid")[0].firstChild.data+"</td><td>"
+person[i].getElementsByTagName("pname")[0].firstChild.data+"</td><td>"
+person[i].getElementsByTagName("age")[0].firstChild.data
+"</td></tr>";
}
html = html + "<tr ><td width='50'>"+prevpagehtml+"</td><td width='100'>共"+pagecount+"页&nbsp;当前第"+currpage+"页</td><td width='80'>"+nextpagehtml+"</td></tr>";
html = html+"</table>";
document.getElementById("div").innerHTML=html;
}
//主调函数,以当前页作为参数
function AjaxTest(currpage) {
js.sendRequest("AjaxServlet?currpage="+currpage,responseFunction,null);
}
</script>
</head>
<body onload="AjaxTest(1);">
<center>
<div id="div"> </div>
</center>
</body>
</html>
然后在AjaxServlet通过前台传过来的参数进行数据处理分页,然后返回给前台! | ESSENTIALAI-STEM |
User:LydaAfford29016
My name is Sommer Wilmer. I life 200 Hour Yoga Teacher Training in Rishikesh Toronto (Canada). | WIKI |
Optimization of Superlattice Barrier HgCdTe nBn Infrared Photodetectors Based on an NEGF Approach
Research output: Contribution to journalArticle
12 Citations (Scopus)
Abstract
Unipolar nBn photodetector structures have recently emerged as a viable alternative to the traditional p-n junction infrared photodiode approach. However, realization of a unipolar nBn detector technology using the mercury-cadmium-telluride (HgCdTe) alloy system is a challenging task because of the lack of a barrier material with a favorable valence band offset. In this paper, advanced quantum mechanical calculations, based on the nonequilibrium Green's function (NEGF) formalism, are used to demonstrate that it is possible to achieve diffusion-limited dark current performance in HgCdTe nBn detectors by incorporating a type-III HgTe/CdTe superlattice (SL) barrier layer. Optimal design parameters for CdTe layer thickness, HgTe layer thickness, and total number of periods are presented in order to achieve maximum hole current transmission through the barrier layer, and therefore diffusion-limited dark current performance. The NEGF simulation framework herein presented allows greater insight into effects associated with electron and hole wave function propagation in the SL barrier layer as well as the calculation of individual carrier current components. The presented results form a good basis for the fabrication of high-performance SL barrier HgCdTe nBn detectors.
Original languageEnglish
Pages (from-to)591 - 598
Number of pages8
JournalIEEE Transactions on Electron Devices
Volume65
Issue number2
DOIs
Publication statusPublished - Feb 2018
Fingerprint Dive into the research topics of 'Optimization of Superlattice Barrier HgCdTe nBn Infrared Photodetectors Based on an NEGF Approach'. Together they form a unique fingerprint.
Cite this | ESSENTIALAI-STEM |
How to use readline
Comprehensive readline code examples:
How to use readline.default:
4
5
6
7
8
9
10
11
12
13
Object.defineProperty(exports, "__esModule", { value: true });
const recordService_1 = __importDefault(require("../services/recordService"));
const readline_1 = __importDefault(require("readline"));
const handleKeypress = () => {
console.log("Press r to start recording");
readline_1.default.emitKeypressEvents(process.stdin);
process.stdin.setRawMode(true);
process.stdin.on('keypress', (_str, key) => {
if (key.name === 'r' && !recordService_1.default.getIsRecording() && !recordService_1.default.getIsBeingNamed()) {
recordService_1.default.startRecording();
How to use readline.close:
188
189
190
191
192
193
194
195
}
else {
throw "Exit";
}
readline.close();
});
How to use readline.emitKeypressEvents:
1456
1457
1458
1459
1460
1461
1462
1463
1464
1465
this.value = this._value.value;
}
};
function aD({ input: t = import_node_process.stdin, output: u2 = import_node_process.stdout, overwrite: F2 = true, hideCursor: e2 = true } = {}) {
const s = f.createInterface({ input: t, output: u2, prompt: "", tabSize: 1 });
f.emitKeypressEvents(t, s), t.isTTY && t.setRawMode(true);
const C2 = (D2, { name: i }) => {
if (String(D2) === "" && process.exit(0), !F2)
return;
let E2 = i === "return" ? 0 : -1, a2 = i === "return" ? -1 : 0;
How to use readline.clearScreenDown:
241
242
243
244
245
246
247
248
249
250
// source: https://github.com/vuejs/vue-cli/blob/dev/packages/%40vue/cli-shared-utils/lib/logger.js
if (process.stdout.isTTY) {
const blank = '\n'.repeat(process.stdout.rows);
console.log(blank);
readline.cursorTo(process.stdout, 0, 0);
readline.clearScreenDown(process.stdout);
if (msg) {
console.log(msg);
}
}
How to use readline.prompt:
33
34
35
36
37
38
39
40
41
42
},
};
for (let val of veganIterable) {
console.log(val.name);
}
readline.prompt();
});
}
break;
case 'log':
How to use readline.moveCursor:
1461
1462
1463
1464
1465
1466
1467
1468
1469
1470
f.emitKeypressEvents(t, s), t.isTTY && t.setRawMode(true);
const C2 = (D2, { name: i }) => {
if (String(D2) === "" && process.exit(0), !F2)
return;
let E2 = i === "return" ? 0 : -1, a2 = i === "return" ? -1 : 0;
f.moveCursor(u2, E2, a2, () => {
f.clearLine(u2, 1, () => {
t.once("keypress", C2);
});
});
How to use readline.clearLine:
210
211
212
213
214
215
216
217
218
219
220
* @param {string} message The message to write.
* @api public
*/
ProgressBar.prototype.interrupt = function (message, draw) {
readline.clearLine(this.stream, 0)
readline.cursorTo(this.stream, 0)
// // write the message text
this.stream.write(message)
// // re-display the progress bar with its lastDraw
How to use readline.cursorTo:
240
241
242
243
244
245
246
247
248
249
function clearScreen(msg) {
// source: https://github.com/vuejs/vue-cli/blob/dev/packages/%40vue/cli-shared-utils/lib/logger.js
if (process.stdout.isTTY) {
const blank = '\n'.repeat(process.stdout.rows);
console.log(blank);
readline.cursorTo(process.stdout, 0, 0);
readline.clearScreenDown(process.stdout);
if (msg) {
console.log(msg);
}
How to use readline.question:
72
73
74
75
76
77
78
79
80
81
},
actions: [askForServingSize, displayCalories],
};
function askForServingSize(food) {
readline.question(
`How many servings did you eat? ( as a decimal: 1, 0.5, 1.25, etc.. ) `,
servingSize => {
if (servingSize === 'nevermind' || servingSize === 'n') {
actionIt.return();
How to use readline.createInterface:
324
325
326
327
328
329
330
331
332
333
},
_parseGeoNamesAlternateNamesCsv: function (pathToCsv, callback) {
var that = this;
that._alternateNames = {};
var lineReader = readline.createInterface({
input: fs.createReadStream(pathToCsv),
});
lineReader.on('line', function (line) {
line = line.split('\t'); | ESSENTIALAI-STEM |
Grato por sua visita. Neste momento esta página está apenas disponível em inglês.
Host a Custom Skill as a Web Service
You can build a custom skill for Alexa by implementing a web service that accepts requests from and sends responses to the Alexa service in the cloud. You can build your web service using any programming language, as long as the service meets the following requirements.
These requirements apply only to skills that use a custom web service. Alternatively, you can implement your skill as an AWS Lambda function using AWS Lambda from Amazon Web Services. For more information, see Host a Custom Skill as an AWS Lambda Function.
Requirements for your web service
To handle requests sent by Alexa, your web service must meet the following requirements:
1. The service must be accessible over the internet.
2. The service must accept HTTP requests on port 443.
3. The service must support HTTP over SSL/TLS, using an Amazon-trusted certificate. Your web service's domain name must be in the Subject Alternative Names (SANs) section of the certificate. For testing, you can provide a self-signed certificate. For more information, see About the SSL Options.
4. The service must verify that incoming requests come from Alexa. For more information, see Verify that the request was sent by Alexa.
5. The service must adhere to the Alexa Skills Kit interface.
About the SSL options
When Alexa communicates with your skill's web service, user requests and corresponding responses are transmitted over the internet. To protect the confidentiality and integrity of this data, Alexa strictly enforces that HTTP connections are secured using SSL/TLS.
This means that the web service for a skill that is published to users must present a valid and trusted certificate when the connection is established, and must possess the corresponding private key.
You need to specify which type of SSL certificate your web service uses. You specify the type of certificate in the Alexa Skills Kit developer console, on the Build page, in the Endpoint section. Choose the appropriate option based on the type of SSL certificate that your web service uses, as described in the following list. If you're not sure which to choose, you might need to check with your hosting provider to determine which type of certificate your web service uses.
• If your web service uses a certificate signed by an Amazon-trusted certificate authority, choose My development endpoint has a certificate from a trusted certificate authority.
• If your web service uses a wildcard certificate, select My development endpoint is a sub-domain of a domain that has a wildcard certificate from a certificate authority. A wildcard certificate provides SSL for multiple sub-domains. You can use this type of certificate as long as it is signed by an Amazon-trusted certificate authority.
• For testing, your web service can use a self-signed certificate. In this case you must create the certificate yourself, upload it to the Alexa Skills Kit developer console, and configure your web service to present this certificate when the Alexa service connects to your web service. For more information, see Configure Your Web Service to Use a Self-signed Certificate.
Verify that the request was sent by Alexa
Requests that the Alexa service sends to your web service are transmitted over the internet. To protect your web service from potential attackers, your web service must verify that incoming requests are sent by Alexa. Requests that don't come from Alexa must be rejected. This is required to get your skill certified and published to users. Web services that accept unsigned or out-of-date requests will not pass certification.
If you build your web service using JavaScript, Java, or Python, you can use the Alexa Skills Kit SDKs (ASK SDKs) for Node.js, Java, or Python to verify that requests to your web service come from Alexa. The SDKs also provide code that can help make it easier to build a web service.
For more information about using the SDKs to build a custom web service, see:
If you don't use the ASK SDKs, you must write code to verify each incoming request. For more information, see Manually verify that the request was sent by Alexa.
Use the ASK SDK for Node.js
The ASK SDK for Node.js provides support for building a custom web service in the ask-sdk-express-adapter package. You can use the package to help verify that Alexa sent the requests that your web service receives.
In addition, the SDK provides extensions for Express.js, commonly used to build web applications in Node.js. You can use the extensions to help you build the web service for your skill.
For more information and code examples, see Host a Custom Skill as a Web Service in the ASK SDK for Node.js documentation.
Use the ASK SDK for Java
The ASK SDK for Java provides support for building a custom web service in the form of a Java servlet. If you build your web service using Java and don't want to use the servlet, you can still use the SDK to help verify that Alexa sent the requests that your web service receives.
For more information and code examples, see Host a Custom Skill as a Web Service in the ASK SDK for Java documentation.
Use the ASK SDK for Python
The ASK SDK for Python provides support for building a custom web service in the ask-sdk-webservice-support package. You can use this package to help verify that Alexa sent the requests that your web service receives.
In addition, the SDK provides extensions for Flask and Django, two frameworks commonly used to build web applications in Python. You can use the extensions to help you build the web service for your skill.
For more information and code examples, see Host a Custom Skill as a Web Service in the ASK SDK for Python documentation.
Manually verify that the request was sent by Alexa
To manually verify that a request came from the Alexa service, you must write code that performs the following steps:
1. Check the request signature to verify the authenticity of the request. Alexa signs all HTTPS requests. For more information, see Check the request signature.
2. Check the request timestamp to make sure that the request is not an old one being sent as part of a replay attack. For more information, see Check the request timestamp.
Check the request signature
Requests that Alexa sends to your web service include two HTTP headers that you must use to check the request signature:
• SignatureCertChainUrl
• Signature
To check and validate the request signature:
1. Verify the URL in the SignatureCertChainUrl header to make sure that it matches the format that Alexa uses. This can help to protect against requests that attempt to make your web service download malicious files.
1. Normalize the URL in the SignatureCertChainUrl header by removing dot segments and duplicate slashes and fragment. For example, normalize the following path:
https://s3.amazonaws.com/echo.api/../echo.api/echo-api-cert.pem
to:
https://s3.amazonaws.com/echo.api/echo-api-cert.pem
2. Make sure that the URL meets all of the following criteria:
• The protocol is https (not case sensitive).
• The hostname is s3.amazonaws.com (not case sensitive).
• The path begins with /echo.api/ (case sensitive).
• If a port is specified in the URL, the port is 443.
The following are examples of correctly formatted URLs:
• https://s3.amazonaws.com/echo.api/echo-api-cert.pem
• https://s3.amazonaws.com:443/echo.api/echo-api-cert.pem
• https://s3.amazonaws.com/echo.api/../echo.api/echo-api-cert.pem
The following are examples of invalid URLs:
• http://s3.amazonaws.com/echo.api/echo-api-cert.pem (invalid protocol)
• https://notamazon.com/echo.api/echo-api-cert.pem (invalid hostname)
• https://s3.amazonaws.com/EcHo.aPi/echo-api-cert.pem (invalid path)
• https://s3.amazonaws.com/invalid.path/echo-api-cert.pem (invalid path)
• https://s3.amazonaws.com:563/echo.api/echo-api-cert.pem (invalid port)
If the URL does not meet all of these criteria, do not proceed to the next step.
2. Download the PEM-encoded X.509 certificate chain using the URL specified in the SignatureCertChainUrl header in the request. This chain is provided at runtime so that it can be updated periodically. Your web service should be resilient to different URLs with different content.
3. This certificate chain you downloaded in the preceding step is composed of the following, in order:
• The Amazon signing certificate.
• One or more additional certificates that create a chain of trust to a root certificate of a certificate authority (CA).
Confirm the validity of the signing certificate by completing the following steps:
1. Check the Not Before and Not After dates of the signing certificate to make sure that it is not expired.
2. Make sure the domain name echo-api.amazon.com is present in the Subject Alternative Names (SANs) section of the signing certificate.
3. Validate that all certificates in the chain combine to create a chain of trust to a trusted root CA certificate.
4. After you confirm the validity of the signing certificate, extract the public key from it.
5. Base64-decode the value of the Signature header in the request to obtain the encrypted signature.
6. Use the public key that you extracted from the signing certificate to decrypt the encrypted signature to produce the asserted hash value.
7. Generate a SHA-1 hash value from the full HTTP request body to produce the derived hash value.
8. Compare the asserted hash value and derived hash values to ensure that they match. If they do not match, discard the request.
Check the request timestamp
Every request that Alexa sends to your web service includes a timestamp in the request body. The timestamp is part of the signed portion of the request, so it cannot be modified without also invalidating the request signature. Use this timestamp to verify the freshness of the request before sending a response. This can help protect your web service from attempted replay attacks in which an attacker acquires a properly signed request and then repeatedly resends it to disrupt your web service.
Your web service should allow a tolerance of no more than 150 seconds (two and a half minutes). This means that your service should only process requests in which the timestamp is within 150 seconds of the current time. If the timestamp differs from the current time by more than 150 seconds, discard the request. If your web service processes requests that are more than 150 seconds out of sync with the current time, your skill cannot be certified and published to users.
The timestamp is part of the request object in the JSON body of the request. For example:
{
"version": "1.0",
"session": {
"new": true,
...
},
"request": {
"type": "LaunchRequest",
"timestamp": "string",
"requestId": "string"
}
}
The timestamp value is an ISO 8601 formatted string, for example 2019-05-13T12:34:56Z. Your code must convert the string into a date object, then verify that it is within the tolerance that your web service allows (no more than 150 seconds from the current time). Use an HTTP error code, such as 400 Bad Request, to reject requests in which the timestamp falls outside the tolerance. | ESSENTIALAI-STEM |
Page:Devonshire Characters and Strange Events.djvu/192
140 encounter them; I told him I would take the Crow of Iron and hold it in the Middle with both Hands, and I would go into the Cabbin and knock down him that stood at the end of the Table on my right Hand, and stick the point of the Crow into him that sat at the end of the Table, on my left Hand, and then for the other five that sat behind the Table. But still he not consenting, I had second thoughts of undertaking it without him, but the Cabbin was so low that I could not stand upright in it by a foot, which made me at that time desist.
"By this time they had eat their Breakfast, and went out upon Deck; then I told the boy with much trouble, We had lost a grave opportunity, for by this time I had had the ship under my command. Nay, says the Boy, I rather believe that by this time you and I should have both been killed."
Lyde then, to stimulate the slack fellow to action, recounted to him the miseries to which he would be subjected in prison in France.
"In a little time after they had been upon Deck, they separated from each other, viz. the Master lay down in his Cabbin and two of the Men lay down in the Great Cabbin and one in a Cabbin between Decks, and another sat down upon a low Stool by the Helm, to look after the Glass, to call the Pumps, and the other two men walked upon the Decks. Then, hoping I should prevail with the Boy to stand by me, I immediately applied myself to Prayer, desiring God to pardon my Sins, and I prayed also for my Enemies who should happen to dye by my Hands. And then I endeavoured again to persuade the Boy but could not prevail with him to Consent.
"Then the Glass was out, it being half after eight, and the two men that were upon Deck went to pump | WIKI |
Page:Federal Reporter, 1st Series, Volume 9.djvu/247
232 FEDERAL REPORTER. �courts, or of the supreme court itself. This point is also settled by the decision of the supreme court of Oregon. Tustin v. Gaunt, 4 Or. 306. The character and dignity of the county court having been thus deflned and established, section 12, of the same article of the constitution, provides that "the county couit shall have the jurisdic- tion pertaining to probate courts," etc., thus conferring, in general terms, upon the county court general jurisdiction over the subject- matter of the estates of deceased persons. In regulating the exercise of this general jurisdiction thus conferred, in pursuanee of the pro- visions of section 1, art. 7, of the constitution before cited, the statute provides that the administration of the estate of an intestate shall be granted by the county court when the intestate, "at or immediately before his death, was an inhabitant of the county, in whatever place he may have died." Or. Civ. Code, §§ 1051, 1052. Section 1060 provides, "in an application * * * for the appointment of an administrator, the petition shall set forth the facts necessary to give the court jurisdiction." In this case, as bas been seen, the facts were all properly set forth, and it was distinctly alleged in the petition that the intestate was, "at or immediately before his death, an inhab- itant of Multnomah county. " This averment presented the issue as to inhabitancy to be determined, and the court did in fact determine and adjudge it upon evidence under oath, and its judgment on its face contains the recital : "It being proved by the oath of the peti- tioner, Eiggs, that the said William A. Perkins died on or about the sixteenth day of November, 1878, intestate, in the county of Mult- nomah and state of Oregon, being at or immediately before his death an inhabitant of said county." Can this determination be re-examined in a collateral proceeding, and if found erroneous treated as a nullity, on the ground that the court was without jurisdiction? To resolve this question it rnust be determined what jurisdiction is. The supreme court of the United States bas repeatedly defined jurisdic- tion. In Orignon's Lessees v. Astor, 2 How. 338, the supreme court, quoting from a prier case, says : �" The power to hear and determine a cause is jurisdiction ; it is eoram judice whenever a case is presented which brings this power into action. I£ the petitioner presents such a case in his petition that, on a demurrer, the court would render a judgment in his favor, it is an uridoubted case of jurisdiction. Whether, on an answer denying and putting in issue the allegations of the petition, the petitioner makes out his case, is the exercise of jurisdiction, con- ferred by the filing of a petition containing all the requisites, and in the man- ner required by law. 6 Pet. 709. Any movement by a court is necessarily the exercise of jurisdiction ; so, to exercise any judicial power over the subject" ��� � | WIKI |
Wikipedia:Reference desk/Archives/Miscellaneous/2009 June 15
= June 15 =
Light vs. Dark colored jerseys
Why does the home team always wear the light colored jersey while the away team wears the dark colored jersey? <IP_ADDRESS> (talk) 00:49, 15 June 2009 (UTC)
* Which sport and which country are you talking about? I can think of many counterexamples to your thesis. -- JackofOz (talk) 01:43, 15 June 2009 (UTC)
* It's the other way around in American football. —Tamfang (talk) 02:41, 15 June 2009 (UTC)
In the NHL it's changed at least twice. In the 1930s the home team wore the light uniforms. I think I remember reading, but it might have been in relation to some other sport, that this method was preferred because the light uniforms had to be laundered more frequently to look good and doing laundry was easier then they weren't also dealing with road-trip logistics. (Pro sports weren't a huge money-making industry back then, remember. Everything didn't have to look brand new and spotless. Also, travel was slower using trains.) By the 1960s it had changed and the home team wore the dark uniforms. This is the way that makes sense to me because from the fans' perspective it's "our guys in their full colorful glory vs. the other guys in white." Later it changed again and now they wear the light ones again. This time I remember the reason being given as promoting fan interest by making the variety of different visiting teams more visible.
I remember that the CFL has also reversed its rule on this at least once since the 1960s.
The Home (sports) article mentions this topic briefly, but it looks like something that someone threw together; it needs a rewrite with a broader perspective. --Anonymous, 08:47 UTC, June 15, 2009.
* The NHL changed again and now the home teams usually wear the dark jerseys. I don't remember when this happened but it was fairly recently. But they also have third jerseys and throwback jerseys now, so it's still kind of random. Adam Bishop (talk) 01:44, 16 June 2009 (UTC)
* For monochrome (black and white) photography and TV the teams should have different jersey brightness. Cuddlyable3 (talk) 13:51, 15 June 2009 (UTC)
* In the NFL, the home team has the choice to wear white or dark jerseys and usually chooses to wear the dark ones. Just a guess -- colored uniforms probably sell better at the team shop, and teams want to wear their most marketable jersey at home. Not all teams choose to wear colored jerseys at home, though. The Cleveland Browns went years without wearing their brown uniforms at home. -- Mwalcoff (talk) 18:33, 15 June 2009 (UTC)
* And in baseball, there is no rhyme or reason. As long as both teams wear different colors or styles, then it's OK. Traditionally, baseball teams wore white at home and gray or some other color on the road, but there are oodles of exceptions going back more than a century. These days, sometimes both sides end up with colored uniforms, which can lead to interesting results. (Although nothing like a game I recall from the 1970s, where the Oakland Athletics wore green and the Baltimore Orioles wore orange. Yuk!)— Michael J 22:17, 15 June 2009 (UTC)
* Just for completeness, consider soccer/football: if one team or the other looks too much like the referees, it's the referees who change shirts!
* --DaHorsesMouth (talk) 01:26, 16 June 2009 (UTC)
* In the olden days of baseball, for example, it was normally light at home (typically white or off-white), and dark on the road (or gray, at least). As I understand it, aside from the obvious need for the two teams to wear different colors, that was indeed due to laundry issues. In fact, I think they may have gone through road trips without much laundering at all. Hence the dark coloration, to disguise the dirt. Comiskey docked his players for laundry even for their home uniforms, so they rebelled and refused to do laundry, hence their pale hose turned dark and dirty, and they were being called the Black Sox even before the scandal. Or so the story goes. But laundry is not much of an issue now, so home teams will wear whatever color shirts or jerseys that they designate, and the visiting teams will accommodate accordingly. Baseball Bugs What's up, Doc? carrots 03:38, 21 June 2009 (UTC)
How do I add those stuff like editing your signature and adding picture to your profile?
Like how do I edit my signature?Stick2012 (talk) 03:21, 15 June 2009 (UTC)
* On your user page, click on "my preferences" which is likely at the top right of the page after "Stick2012" and "my talk". Go down the first page that opens to the signature box and enter your signature the way you want it to appear. (I can't help you with coding.) Then save. // BL \\ (talk) 03:35, 15 June 2009 (UTC)
* (ec) At the top of the page, there should be a link, 'my preferences'. Click it. Down a bit is a box the says 'Signature:' and an input field. Put the code you want in there. Be sure to check 'Raw signature'. Save at the bottom. ÷seresin 03:37, 15 June 2009 (UTC)
* If by "your profile" you mean your userpage, you can add a picture by ... well, this page explains it pretty well. Although I don't think you're allowed to upload a picture to Wikipedia purely for your own userpage - though I'm not certain. By the way, this question might have been better on the Help Desk. Vimescarrot (talk) 09:37, 15 June 2009 (UTC)
Microsoft Wikipedia
Couple weeks ago I came across some Microsoft sponsored(owned?) web site that had link to enhanced Wikipedia articles. And it was possible to browse enhanced Wikipidia just like ordinary one. I quite loved it. But now I could not find a way of how to get there. Is it still available? If yes, dose anyone know a link? Vitall (talk) 03:29, 15 June 2009 (UTC)
* Microsoft has a new search engine called Bing which produces Wikipedia pages from their own mirror site. I don't know how "enhanced" they are. Type Bing into Google to find them. - KoolerStill (talk) 04:26, 15 June 2009 (UTC)
* No mention of it on WP:Mirrors and forks. APL (talk) 06:35, 15 June 2009 (UTC)
* My mistake to call it a mirror. It is a "reproduction" of the WP page on Microsoft's servers as a "Reference" page. Apparently it is just copied, how often is not known, according to this The Register article.- KoolerStill (talk) 07:07, 15 June 2009 (UTC)
No luck with Bing, but... Thank you guys! I actually found it. That was powerset.com Like Mantle (mollusc) or any WP article instead of mantle etc. Strangely enough, PowerSet have something to do with Bing. Thanx anyway, Vitall (talk) 08:48, 15 June 2009 (UTC)
* I tried the "factz" switch. "pallium knew adjective," "pallium cloaked words," "form flaps siphon". Interesting factz. Contributions/<IP_ADDRESS> (talk) 10:20, 15 June 2009 (UTC)
Best Chemistry Books
What are the best chemistry books that one can follow without the help of a tutor, and prepare oneself for IITJEE?? <IP_ADDRESS> (talk) 04:02, 15 June 2009 (UTC)
* I am a student from IIT Madras. First you must be thorough with your School/CBSE textbook. as nowadays most of the questions are asked from there. I would recommend Disha's O.P. Aggarwal for Organic, O.P.Tandon for physical and Inorganic Chemistry as primary sources. Add to that P.Bahadur to work out problems, I think you'll make it, but don't forget, if you're thorough with the CBSE reader, you've done 50% of the job. Rkr1991 (talk) 07:14, 15 June 2009 (UTC)
And what about the best maths and physics books? <IP_ADDRESS> (talk) 13:27, 16 June 2009 (UTC)
* For Maths M.L.Khanna is very good, supplemented by the Arihant series. For Physics, the Arihant series does a wonderful job. Just read the textbooks (preferably older version subjective type) and the objective books from Arihant and you'll be fine. In addition, about 4 months before you write JEE, take a nice All India Test Series, like that of FIITJEE. I think these are the essentials. Beyond that its up to your time and effort. Rkr1991 (talk) 15:02, 16 June 2009 (UTC)
Knots
what are the different methods of tying knots?Shraktu (talk) 05:41, 15 June 2009 (UTC)
* Knot theory has many interesting links. List of knots may be more what you are looking for. If you don't have time to go through the entire list knot has a few examples. Googling Macramé instructions is another thing you might try. <IP_ADDRESS> (talk) 06:07, 15 June 2009 (UTC)
* Google "Ian knot" — IIRC some guy named Ian has a Web site which lists about a zillion ways to tie your shoes.—msh210 ℠ 16:35, 15 June 2009 (UTC)
Rivers in Ghana
State the reasons why rivers in Ghana are navigable —Preceding unsigned comment added by <IP_ADDRESS> (talk) 05:50, 15 June 2009 (UTC)
* We do not answer homework questions. <IP_ADDRESS> (talk) 05:52, 15 June 2009 (UTC)
* Navigability and Geography of Ghana may help.<IP_ADDRESS> (talk) 06:14, 15 June 2009 (UTC)
* Kind of a weird question. A river is navigable if ships can travel on it. By definition. There can be glitches. The Great Lakes are navigable for the most part except for this little problem called Niagara Falls. Hence the canals built around it. Baseball Bugs What's up, Doc? carrots 03:42, 21 June 2009 (UTC)
how can i connect the barionet in lan and how it works?
how can i connect the barionet in lan and how it works? please help me with diagram —Preceding unsigned comment added by Sreejithva4u (talk • contribs) 06:35, 15 June 2009 (UTC)
* We'd love to help, really we would. It's just that we absolutely have no idea what you're talking about. Can you ask your question in a clearer way? -- JackofOz (talk) 06:42, 15 June 2009 (UTC)
* Barionets are some kind of remote control device, allowing control of surveillance, security and other equipment remotely, eg by internet. I think he wants to connect one to his LAN. I also think there would be instructions in the packet, if he's already bought one. This article might explain some of it - KoolerStill (talk) 07:16, 15 June 2009 (UTC)
* Or if not, why not ask on the Computing reference desk? --Anonymous, 07:48 UTC, June 15, 2009.
* (Wow! Good call! I was assuming the OP was interested in getting in contact with a Baronet called Ian.) It seems that these Barionets are made by http://www.barix.com - so I would start there. You can find downloadable manuals for all of their products here - so all you need to know is the part number of the barionet you're trying to talk to - and the manual should tell you the rest. SteveBaker (talk) 14:01, 15 June 2009 (UTC)
* It's this damn sans serif font that WP uses. I don't know how many times I've been asked on various forums and such why I call myself LAN. (My name is Ian, with an i) Dismas |(talk) 03:53, 16 June 2009 (UTC)
* It even enabled some vandalism/trolling a while ago, sparking a scare about the security of people's accounts. Someone was registering usernames that resembled admins', with I for l and l for I :) I believe they worked a fix, although I can't help but feel a different font would solve the problem more elegantly, and aid readability. <IP_ADDRESS> (talk) 16:23, 16 June 2009 (UTC)
Short story about a kid who finds out that he's poor
Does anyone know what the name / author is of this short story? A kid is at school and his teacher tells the class that they are going to do things to help the poor. The kid feels great about this and is all excited about helping them out. When he gets home his parents seem uninterested. When he goes back to school the next day he has nothing to offer. The teacher is OK with it. I think it is the next night that the kid figures out for himself that his family is one of the poor families he had heard about. Before then he had no idea. It was the only life he had ever known.
I have no idea when the story was written, but I read it about 30 years ago. That's so long ago I may not even have the story 100% correct. --<IP_ADDRESS> (talk) 08:04, 15 June 2009 (UTC)
* If no one can help you here, I suggest you ask a children's librarian, especially one who's been working as a children's librarian for some years. They can often help with such questions. Good luck.—msh210 ℠ 16:32, 15 June 2009 (UTC)
I don't remember this being considered a children's story. --Contributions/<IP_ADDRESS> (talk) 18:12, 15 June 2009 (UTC)
* Sorry, that was a bad assumption. A librarian, then, though in my experience children's librarians can answer these types of questions about kids' books more often then general librarians can about general books.—msh210 ℠ 21:12, 16 June 2009 (UTC)
Someone found it for me. Great story and very short. —Preceding unsigned comment added by Wonderley (talk • contribs) 00:27, 18 June 2009 (UTC)
Getting a booking as a speaker on United States colege campuses, etc.
Clients owe me money, I've got big bills coming due for liability insurance, and money is really tight. But, this I have: Great speaking ability and lots of stuff I've overcome. I'm legally blind, partly deaf, have some cerebral palsy (though I can walk well & be understood well), a possible hint of Asperger's Syndrome, yet hold 3 degrees, have been a volunteer in my church for years, have been writing for a long time with gag ideas published in comic strips as well, and other things. I don't have a huge law practice or anything really noteworthy, I guess mine's quiet leadership, you might say.
My question is, how do I go about being a speaker? I'm thinking especially on a college campus, such as during Orientation Week. Or, are those usually booked even this late, and I'd need to polish things looking toward commencement exercises? I've begun to develop a resume highlighting my speaking, now do I just start e-mailing colleges offering my skills? I was considering Christian ones since they might accept me more knowing I could speak in that area, but the larger, state schools might be able to pay me more to fly out there and speak. (I'm actually on Social Security right now.) Or, do the larger state schools expect someone who has a huge resume of, shall I say, more "noisy" stuff, like lots of books published, etc.? Payment isn't a huge object, as long as I could get a ride there (or at least have a motel room reimbursed), I wouldn't mind only a few hundred dollars honorarium. I know most speakers don't make ltos of money. And, of course, even if larger schools wouldn't take me, I'm sure there are tons of small schools.
Obviously, an alma mater would be the first I'd contact, and I'm going to do that with College of Wooster today just because it's fairly close, and I could just get a ride there.
Thanks for any help and ideas, including other places I could speak.Somebody or his brother (talk) 11:24, 15 June 2009 (UTC)
* Googling "Become a Professional Speaker" returns lots of hits (some of which seem a bit dubious). But advice includes getting testimonials, joining Toastmasters International (one of the most famous bodies in public speaking which provides practice and advice), gaining relevant credentials (qualifications, experience, starting your own business, etc), building a website showing your skills, putting together a promotional pack with photo/resume/other information that you can send to prospective clients, maybe trying for experience or work in sales/acting/radio/tv presenting, and contacting lots of people. If you're good at speaking you should be able to sell yourself and convince people of your merits, so you need to get out there. But you're unlikely to make a lot of money, and it'll take a bit of time, so it's no solution if you've bills that need paid now. --Maltelauridsbrigge (talk) 13:54, 15 June 2009 (UTC)
* I would think that you'd need to start small and work up to college commencement speeches. Start with local business groups or social groups of other kinds. See if your city has a venue where speakers regularly deliver lectures. I think you'd need a pretty solid record of this kind of thing before you could break into the big league. But it sounds like you have the right skills and attitudes...it's certainly worth a try. SteveBaker (talk) 13:55, 15 June 2009 (UTC)
* To build up a resume history you could join/contact a couple of associations and support organizations. You have listed several challenges you have overcome that have organized people in similar circumstances whom you could speak in front of. Check out some of these, , [National Association of the Deaf] . Note dates like "Cerebral Palsy Awareness Day" "Deaf & hard of hearing awareness day", "International Noise Awareness Day" and "World Sight Day" in your calendar. Get the contact information for local, state and national organizers and "put yourself out there". Once you have built a resume you could hook up with a couple of "for profit" organizations, business consulting companies or the like. I'm not sure colleges would be a reliable source of income. (Graduation season seems to be over right now and I don't know how long in advance they book speakers for next year.) You could hire an agent, but unless they work on commission that can turn into a costly mistake. See if you can get a relative to speak for you with places that don't like to be contacted directly. (There are a couple of those around). As others above I'm a bit in doubt that this could be turned into a short term solution for lack of funds. Another thing to keep in mind is that it is unlikely that you are going to be hired to speak on neutral topics like "Quantum fluctuation in a thermal vacuum" or "Religious groups as economic entities" you are going to end up marketing a lot of yourself. (Sometimes referred to as "selling your soul".) That can put a not inconsiderable strain on you and those around you. Make sure you have a plan B to back out to if it gets too much! You are also almost guaranteed to run into lots of people with their own agendas some of whom can turn out to be most unpleasant to deal with. (I could give you an OR list of highly decorated laureates and university deans and professors that are described with lots of colorful rude expressions by colleagues and others who dealt with them.) One thing you might consider is offering workshops to company executives. Looks like overcoming challenges is something they have to deal with currently and they might be willing to apply some of the strategies you've used. See if your local chamber of commerce would be interested. (Hooking up with a consulting company might make marketing such things easier, too.) Googling I came across Team Hoyt who seem to finance at least part of their activities with speaking assignments. <IP_ADDRESS> (talk) 23:22, 15 June 2009 (UTC)
* Thanks, all. Great links. It'll take me a while to follow all of them :-) Yes, overcoming challenges is one of the keys that I'm thinking of emphasizing. And, thanks for the note about being wary of those who are just out for their own benefit; that is one of the big problems I hope to try to avoid. You've been a great help.Somebody or his brother (talk) 00:04, 16 June 2009 (UTC)
US citizens travel abroad
what % of US citizens have traveled to 10 or more foreign countries? Contributions/<IP_ADDRESS> (talk) 16:12, 15 June 2009 (UTC)
* The "US Travel Association" site seems to have a lot of statistics, but skimming around it I didn't see this information. You may have better luck. Tempshill (talk) 03:16, 16 June 2009 (UTC)
* That is information that could only be produced by doing a consumer survey - and I doubt that everyone would give a truthful answer. Mowsbury (talk) 18:38, 17 June 2009 (UTC)
Curious aside: only about 40% of the US Congress and Senate have passports. DOR (HK) (talk) 09:50, 18 June 2009 (UTC)
Secret agents in tuxedoes
Why do films and comics so often depict secret agents wearing stylish tuxedoes while on missions, especially when the missions are very dangerous? Wouldn't normal street clothes both be less conspicuous (and thus actually help them be so secret) and more durable and comfortable to wear? And for missions that are extra-dangerous and have no need for conspicuosity some kind of army overalls would work better. What's the reason for this cliché? And what do real secret agents wear on duty? J I P | Talk 17:37, 15 June 2009 (UTC)
* This probably started with the James Bond films, which often depicted 007 in a tuxedo, often in some expensive hotel or casino. --Richardrj talkemail 17:54, 15 June 2009 (UTC)
* It depends a lot on the crowd you're trying to blend in with. If you're trying to fit in socially with high society top government officials to pump them for information, then you're going to want fancy dress.
* But yea, mostly it probably comes from James Bond, and just a general desire for the character to be glamorous. APL (talk) 18:06, 15 June 2009 (UTC)
* Hmmm ... maybe fancy dress should be added to the List of words having different meanings in British and American English, the idea of secrent agents going in fancy dress is quite amusing -- Q Chris (talk) 07:38, 17 June 2009 (UTC)
"What do real secret agents wear"? You'll never no. However, I suspect it's just like an actor. Whatever fits the character he is playing. --Contributions/<IP_ADDRESS> (talk) 19:26, 15 June 2009 (UTC)
* Of course I understand that with most secret agents, no one knows what they wear, that's the whole point. But surely there must be at least some secret agents who have shed some light on this, not necessarily specific people and occasions, but on a general level. At least Ian Fleming, the inventor of the James Bond mythos, was a former secret agent himself, so he must have brought some part of it into public knowledge. J I P | Talk 20:22, 15 June 2009 (UTC)
I'm sure secret agents, such as Paramilitary Intelligence Officers of CIA's SAD/SOG, wear local clothing to blend in with the local population. Similarly, when attending a high-end function, they will wear tuxedos/dresses to blend in with the immediate crowd. Acceptable (talk) 21:07, 15 June 2009 (UTC)
I think it's all part of the game that film makers engage in. The stereotypical baddie in those sorts of movies is always immensely rich, smarmily self-important, speaks in refined language, is a master of the dramatic flourish or entrance and has a great taste for doing things in a theatrical way, always uses overly formal modes of address, has refined tastes, is somewhere in the twee/camp spectrum, and is supremely confident that his plans to take over the world or whatever will succeed. And they never do. -- JackofOz (talk) 21:51, 15 June 2009 (UTC)
* You'll be able to find out the answer soon enough; the WSJ has reported that MI6 is planning an "espionage ball" for their 100th anniversary. It is going to be wall-to-wall spies wearing tuxedos.
* Some people in Britain's tightknit intelligence community grumble that, even though the agency has done its best to keep the event under wraps, it is not appropriate for MI6 to be holding balls. "It's a secret service, for God's sake," said one individual familiar with the plans.
* Tempshill (talk) 22:25, 15 June 2009 (UTC)
* Okay, so why publicize this? And, do they invite their wives? Doe sthis mean they tell their wives, "I'm a spy?" But, doesn't that risk blowing their cover? (Although, perhaps their wives don't know what exactly they do with MI6; it's not the Manhattan Project, so I suppose they could tell close family, but...it still raises questions, as it doe sthe mind of the person quoted.
* Unless the ball is part of a ploy to catch a double agent or two? LOL, I've read too many thrillers, huh? :-)Somebody or his brother (talk) 00:09, 16 June 2009 (UTC)
* Perhaps it was an excuse to compose the sentence "it is not appropriate for MI6 to be holding balls." Tee hee! Adam Bishop (talk) 00:30, 16 June 2009 (UTC)
* I like how the unnamed individual was very careful not to say "Spies don't have balls" or any close variation. APL (talk) 03:38, 16 June 2009 (UTC)
* To answer the question above, I gather intelligence officers are allowed to (and usually do) inform immediate family and partners about their job. Prokhorovka (talk) 08:43, 16 June 2009 (UTC)
* We are not supposed to tell. Cuddlyable3 (talk) 11:10, 16 June 2009 (UTC)
* I would expect that not everyone in MI6 is a field agent either. The CIA has people who are in things like admin, HR and accounting. <IP_ADDRESS> (talk) 13:38, 16 June 2009 (UTC)
* That's right - Strawberry Fields only had a desk job collecting reports! Adam Bishop (talk) 08:15, 18 June 2009 (UTC)
* Presumably, secret agents would wear what everyone else is wearing. At a fancy-schmancy event, they might wear a tux. The wouldn't wear a tux if they're working on their cars, though. Baseball Bugs What's up, Doc? carrots 03:44, 21 June 2009 (UTC) | WIKI |
Skip to contents
chemdeg is a package developed to assist food chemists in the objective selection of degradation kinetic models of foods and parameters estimation. The software implements a two-step method to this purpose. First, experimental data are analyzed in the so-called phase space which allows for the estimation of the order of the reaction; then the data are fitted with the appropriate standard kinetic model to estimate the reaction rate. The whole procedure is driven by rigorous statistical analyses of the results. The package also provides a routine to fit a non-standard kinetic degradation model named first-order multi-target model (FOMT).
Installation
You can install the development version of chemdeg like so:
# from CRAN
install.packages("chemdeg")
# from GitHub
library(devtools)
devtools::install_github("migliomatte/chemdeg",
dependencies = TRUE, build_vignettes = TRUE)
Usage
Determination of the reaction order
The determination of the reaction order of a generic degradation kinetic model is often prone to subjectivity. By analyzing the phase space of the kinetic system it is possible to statistically determine the reaction order. This information can then be used to determine the reaction rate constant. In the package chemdeg the whole analysis can be performed with the function det_order():
res <- det_order(ord1)
#> Reaction order estimated: 1
where ord1 is a built in function for 1st-order kinetic model data.
The function results returns statistics and parameters estimates:
results(res)
#>
#> Linear regression in the phase space:
#> log(dx/dt)= 0.97 log(x) + ( -0.46 )
#>
#> Estimate of n:
#>
#> Estimate Std. Error t value Pr(>|t|)
#> 9.701806e-01 4.235714e-03 2.290477e+02 1.835114e-07
#>
#> Confidence interval of n:
#> 2.5 % 97.5 %
#> 0.9567007 0.9836605
#>
#> Statistical analysis indicates that an order 1 degradation kineitc model is likely to describe the data.
#> The null hypothesis H0:
#> "The process is described by an order 1kinetic model"
#> cannot be rejected.
#>
#> Non-linear least squares regression was performed with an order 1 kinetic model:
#>
#> Estimate of k:
#> Estimate Std. Error t value Pr(>|t|)
#> k 0.6878765 0.002626997 261.8489 1.541636e-11
#> Waiting for profiling to be done...
#> Confidence interval of k:
#> 2.5% 97.5%
#> 0.6812276 0.6947116
#>
#> Goodness-of-fit:
#> Value
#> AIC: -11.933893
#> AICc: -10.933893
#> BIC: -12.350374
#> RMSE: 2.002812
#> Chi-sq_red: 5.379602
#> -----------------------------------------------------
Plots of the data in both the phase space and the normal concentration vs time space along with their best fits with model equations can be accessed with plot_ord():
First-order multi-target model fitting
The following is an example of first-order multi-target (FOMT) model. The FOMT() function can be used to perform the fit:
fit_fomt <- FOMT(fomtdata)
summary(fit_fomt)
#>
#> Formula: y ~ 1 - (1 - exp(-k * t))^n
#>
#> Parameters:
#> Estimate Std. Error t value Pr(>|t|)
#> k 0.056836 0.008206 6.926 0.000449 ***
#> n 9.478174 3.926148 2.414 0.052280 .
#> ---
#> Signif. codes: 0 '***' 0.001 '**' 0.01 '*' 0.05 '.' 0.1 ' ' 1
#>
#> Residual standard error: 0.04243 on 6 degrees of freedom
#>
#> Number of iterations to convergence: 10
#> Achieved convergence tolerance: 3.98e-06
where fomtdata is an example data-frame provided with the package.
If the FOMT() function does not converge, it is possible to use the nls function from stats package as follows:
fit_fomt1 <- nls(y ~ FOMTm(t, k, n),
data = list(y = fomtdata$tCQA_AA, t = fomtdata$time_h),
start = list(n = 10, k = 0.05)
)
summary(fit_fomt1)
#>
#> Formula: y ~ FOMTm(t, k, n)
#>
#> Parameters:
#> Estimate Std. Error t value Pr(>|t|)
#> n 9.478163 3.926141 2.414 0.052280 .
#> k 0.056836 0.008206 6.926 0.000449 ***
#> ---
#> Signif. codes: 0 '***' 0.001 '**' 0.01 '*' 0.05 '.' 0.1 ' ' 1
#>
#> Residual standard error: 0.04243 on 6 degrees of freedom
#>
#> Number of iterations to convergence: 9
#> Achieved convergence tolerance: 5.453e-06
Goodness-of-fit statistics
chemdeg implements the chi-squared reduced statistics (χred2 = χ2/df where df are the degrees of freedom) and the Akaike Information Criterion with correction for small sample size (AICc) as goodness of fit measures. These can be accessed with the functions chiquad_red()and AICC(), respectively.
To access the full table comprising the Bayesian Information Criterion (BIC), Akaike Information Criterion (AIC), AICc, Root Means Squared Error (RMSE) and χred2 (from both package stats and chemdeg) call the function goodness_of_fit():
goodness_of_fit(fit_fomt)
#> Value
#> AIC: -24.15681095
#> AICc: -21.75681095
#> BIC: -23.91848633
#> RMSE: 0.04243006
#> Chi-sq_red: NA
For more details see
vignette("chemdeg_basics","chemdeg") | ESSENTIALAI-STEM |
Kurau
Kurau may refer to:
People
* Johann Walter-Kurau, a Latvian painter
* Peter Kurau, an American musician
Locations
* Kurau, Budaun, a village in Uttar Pradesh, India
* Kuala Kurau, a mukim in Perak, Malaysia
* Kuala Kurau (state constituency), a state constituency in Perak, Malaysia
* Batu Kurau (state constituency), a state constituency in Perak, Malaysia
* Telok Kurau Secondary School, a co-educational international secondary school in Bedok, Singapore
Japanese media franchises
* Kurau Phantom Memory, a 2004 science fiction anime series
* Tenchi wo Kurau, a manga series by Hiroshi Motomiya followed by four games:
* Dynasty Wars (Tenchi wo Kurau)
* Warriors of Fate (Tenchi wo Kurau 2: Sekiheki no Tatakai)
* Destiny of an Emperor (Tenchi wo Kurau)
* Tenchi wo Kurau II: Shokatsu Kōmei Den | WIKI |
Edit Article
wikiHow to Look Like a Male Fitness Model
Two Methods:Deciding if you want to do itGetting thereCommunity Q&A
So you would like to look like a Male Fitness Model with that rock hard body? Look no further, this will tell you how.
1
Deciding if you want to do it
1. 1
Many men would like to look like the fitness models you see on TV and in the magazines. Before you start however, you will need to answer 2 questions.
• Are you willing to pay the price for it.
• Do you actually realize what you want.
2. 2
To help you answer the first question, I gladly refer you to the following documentary "I wanna look like that guy". During the documentary, the guy transforms himself from a chubby man into a true fitness model. It is a film without the nonsense products. It will show you what it takes to really become a fitness male model.
3. 3
As for the second question; You must realize that the guys with the rock hard bodies you see on TV and in the magazines have that body only for some period. There is nobody out there who is able to maintain a status of "great shape" for a long period. This is due to the fact that you will need to have a dangerously low fat percentage to look muscular, workout hard, eat well and take supplements. Something a human can not keep up with all his life.
4. 4
Once you know the truth about how to be that muscular, and you are still willing to go for it you may proceed.
2
Getting there
1. 1
Start working out like a beast
2. 2
Cut all the junk food, drinks and fat food from your diet. Record all the calories you eat every day, so that you can manage your intake.
3. 3
Make sure you have regular healthy meals every day and get lots of sleep. Be sure to take pre-cooked foods from home to your work or school so that you can keep having your regular meals. Foods you make yourself, not the junk you buy from the supermarket.
4. 4
Continue working out and do not give up.
5. 5
Realize that building a rock hard body for a male fitness model is a long process. This is not something you will do overnight. It requires you to change your lifestyle, your friends and your habits.
Community Q&A
Search
Ask a Question
200 characters left
Submit
Article Info
Categories: Model Imitation
In other languages:
Español: verte como modelo masculino de fitness, Italiano: Avere un Fisico da Modello di Fitness Maschile, Русский: стать похожим на подтянутого мужчину модельной внешности, Português: Ter a Aparência de um Modelo Fitness
Thanks to all authors for creating a page that has been read 206,890 times.
Did this article help you?
| ESSENTIALAI-STEM |
User:Tafara Mhangami/sandbox
Tafara Mhangami Tafara Kasparov Mhangami (born On 5 April 2000)is a Zimbabwean computer whizkid. He was born in Zvishavane and also raised there. By the age of 6 he was able to operate a computer wihout being taught. | WIKI |
Portals (EP)
Portals is the debut solo EP of Metallica guitarist Kirk Hammett, released on April 23, 2022, through Blackened Recordings. The instrumental rock EP was released digitally as well as on CD and an exclusive ocean blue vinyl pressing for Record Store Day.
It consists of four instrumental tracks, described in a release as "a collection of gateways to myriad musical and psychic destinations." The songs were recorded between 2017 and 2020 in multiple locales ranging from Los Angeles to Paris to Oahu. Hammett added: "This music was created with what I describe as an Audio-Cinematic approach. They're soundtracks to the movies in your mind."
A single for the EP's third track "High Plains Drifter" was released on April 15, 2022, with an animated music video following April 22.
Style and reception
Brave Words & Bloody Knuckles's Nick Balazs calls the EP "more musically interesting than what his main band has done on their recent studio efforts", noting that on Metallica's records "Hammett's solos have been a point of criticism" but here "those criticisms will be put to bed as Portals shows a talented guitarist utilizing different effects and inspired sounds to create a diverse EP with much replay value." The songs "play out like mini-movies, or soundtracks to a theatrical film", showcasing Hammett's love of horror films and Clint Eastwood with "almost a '70s progressive bent". Balazs closes by calling the EP "a much pleasant surprise" and "a scarily good listen". Joe Daly of Metal Hammer notes Hammett "flex[ing] his prog and soundtrack-influenced muscles" and "synthesis[ing] his biggest influences: metal, horror movies, classical music and the works of composer Ennio Morricone". "None of the tracks sound like unused Metallica demos, nor do they bleed together in a brain-melting patchwork of sweep picking and speed runs", instead "showcas[ing] the compositional and technical strengths of one of heavy metal's most influential and visionary guitarists."
Pitchfork's Jason P. Woodbury says the EP "reveals Hammett's aspirations to be a film composer, layering crescendoing horns, flamenco interludes, swelling strings—and, naturally, oversized riffs and unhinged shredding—into compositions that could accompany zombie westerns, gothic giallo thrillers, or apocalyptic sci-fi". On the project, Hammett "often eschews ambiance and scene setting in favor of fully present rock outs", though it "doesn't matter that the territory is more Thin Lizzy than Hans Zimmer" because "it's a thrill to hear Hammett playing so unabashed." Though Hammett is "often viewed as the soft spoken counterpoint to Ulrich and Hetfield", he "relishes this star turn, and his sense of freedom in exploring beyond the confines of Metallica is palpable", bringing out music which "smartly devote[s] plenty of real estate to Hammett's familiar metalhead strengths" but also "reveal[ing] compositional breadth and dramatic flair." Wall of Sound suggests that the EP is "well worth checking out" for those who enjoy instrumental albums, and while it "probably won't hold the attention of most Metallica fans, it is a rewarding sonic experience that I will be returning to when the mood strikes."
Personnel
Musicians
* Kirk Hammett – guitar
* Blake Neely – string arrangements (track 1)
* Marcel Feldmar – drums (track 1)
* Mathilde Sternat – cello (tracks 1, 2)
* Greg Fidelman – bass (track 1)
* Philippe Bussonnet – bass (track 2)
* Julien Charlet – percussion (track 2)
* Abraham Laboriel – drums (track 2)
* Edwin Outwater – keyboards, orchestra leader (tracks 3, 4)
* Emmanuel Ceysson – harp (tracks 3, 4)
* Ben Lash – cello (tracks 3, 4)
* Andrew Bain – horn (tracks 3, 4)
* Nadia Sirota – viola (tracks 3, 4)
* Nathan Cole – violin (tracks 3, 4)
* Akiko Turamoto – violin (tracks 3, 4)
* Eliza Bagg – vocals (tracks 3, 4)
* Jon Theodore – drums (tracks 3, 4)
* Brad Cummings – bass (tracks 3, 4)
Technical
* Kirk Hammett – production, mixing
* Bob Rock – mixing
* Emily Lazar – mastering
* Chris Allgood – mastering
* Mike Gillies – engineering (tracks 1, 2)
* Greg Fidelman – additional engineering, recording (track 1)
* Tim Harkins – engineering (tracks 3, 4)
* Angel Hammett – photos
* Alex Tenta – design, layout | WIKI |
CLEANFILES = $(nodist_pkgpython_PYTHON) *.py[oc] nodist_pkgpython_PYTHON = _autoconf.py pkgpython_PYTHON = __init__.py backend.py cli.py cmdlib.py config.py \ objects.py errors.py logger.py ssh.py utils.py rpc.py \ bdev.py hypervisor.py opcodes.py mcpu.py constants.py \ ssconf.py all-local: _autoconf.py _autoconf.py: Makefile { echo '# This file is automatically generated, do not edit!'; \ echo '#'; \ echo "PACKAGE_VERSION = '$(PACKAGE_VERSION)'"; \ echo "LOCALSTATEDIR = '$(localstatedir)'"; \ echo "SYSCONFDIR = '$(sysconfdir)'"; \ echo "SSH_INITD_SCRIPT = '$(SSH_INITD_SCRIPT)'"; \ echo "EXPORT_DIR = '$(EXPORT_DIR)'"; \ echo "OS_SEARCH_PATH = [$(OS_SEARCH_PATH)]"; \ echo "XEN_KERNEL = '$(XEN_KERNEL)'"; \ echo "XEN_INITRD = '$(XEN_INITRD)'"; \ } > $@ pre-check: all for i in $(pkgpython_PYTHON); do \ if test ! -f $$i; then $(LN_S) $(srcdir)/$$i $$i; fi; \ done | ESSENTIALAI-STEM |
List of Pacific typhoons
The Northwest Pacific basin covers a vast area in the Pacific Ocean, located north of the equator, between 100°E and 180°E. Several weather agencies monitor this basin, however it is officially monitored by the Japan Meteorological Agency (JMA, RSMC Tokyo), who is responsible for forecasting, naming and issuing warnings for tropical cyclones. Unofficially, the Joint Typhoon Warning Center (JTWC) also monitors the basin, however these warnings measures 1-minute sustained wind speeds, comparing their scale to the Saffir–Simpson scale. The JMA uses a simpler scale on classifying tropical cyclones adapted by the ESCAP/WMO Typhoon Committee measuring 10-minute sustained wind speeds, ranging from a tropical depression, tropical storm, severe tropical storm and typhoon. Furthermore, the JMA divides the typhoon category into three sub-categories for domestic purposes – a strong typhoon, very strong typhoon and violent typhoon.
This article covers lists of all typhoons, including systems classified by JTWC and their predecessors as only typhoon before 1977, which refers to tropical cyclones with the strength between 65 and 129 knots.
List of super typhoons
Since 1947, the Joint Typhoon Warning Center (JTWC) has classified all typhoons in the Northwestern Pacific Ocean with wind speeds of at least 130 knots (67 m/s; 150 mph; 241 km/h)—the equivalent of a strong Category 4 on the Saffir-Simpson scale, as super typhoons. These typhoons are considered by JTWC to be separate from typhoon category, thus listed in the separate article. | WIKI |
Automating add-in installation
Last updated: 2021-10-11Contributors
Edit this page
To provide users of the RingCentral desktop app with the best possible experience to install your app, developers can optionally implement a web-based user interface that facilitates the installation process. This often includes the following:
1. Authenticate the user with the target service
2. Allow the user to elect what notifications they would like to subscribe to
3. Install the generated webhook URL into the target service
Third-party service prerequisites
To create a simple form to automate the setup of an add-in, the target third-party service in question must support the following:
• OAuth for user authentication and authorization.
• An API for creating, updating and deleting webhooks.
Providing an fully-integrated experience
The installation process you implement will be delivered as a simple web app, and will be rendered to the user during the installation flow via an iframe.
iFrame dimensions
Width Height
570px 260px
Design and Development Guidelines
To accomplish the above, developers need to create what amounts to a mini-web application. This web app will then be embedded into the install flow via an iFrame. We recommend developers adhere to the following guidelines when building this app.
• Present only a simple form. Try to minimize or suppress entirely branding and other UI-elements that might distract the user from completing the installation process.
• Do not display a submit button. The submission of your form will be triggered via a javascript callback.
• Limit your app to a single screen. Other than the step in which you present the user with a button to login, limit your setup form to a single page.
Installation user and developer flow
Team and chat selection
The first step of the installation flow is controlled entirely by RingCentral and allows the user performing the installation to select the chat into which the app will be installed.
The dialog within the RingCentral desktop app where a user selects the chat to install an add-in.
Incoming webhook URL generation
Once the user has selected to chat into which they want the app installed, RingCentral will generate an incoming webhook associated with that chat. The generated URL will be transmitted to the application in the next step.
Load and display iframe
In the next step, RingCentral will render an iframe (570x260 pixels) loading the URL specified by the developer when the application was created. Passed to this URL will be a query parameter called webhook whose value will be the incoming webhook URL generated by RingCentral in the previous step.
Example iframe
<iframe height="260" width="570"
src="https://example.com/path/to/app?webhook=https://hooks.glip.com/webhook/v2/gdhs7828ergdj72">
</iframe>
A screenshot of the Github add-in. The area highlighted in red is the iframe through which an app will deliver its user interface for installation.
Lookup webhook URL locally
When an iframe is loaded, the developer must disambiguate between a user who is installing a new app, or editing an existing one. The best way to do this is to lookup the webhook URL passed to the service via the iframe in a local datastore. If the webhook URL has been installed previously, then the application should in subsequent steps update the existing webhook. If this is the first time this service is encountering the webhook, then it is safe to proceed to install the webhook.
Storing the webhook locally
In the subsequent step entitled "Store access key" we recommend that developers store in their database a record of every webhook URL that is installed via this process. Associated with each webhook URL developers can also store:
• The access key generated through the OAuth flow.
• The identity of the user installing the application.
• Any subscription preferences associated with the webhook URL.
Authenticate user
Inside the iframe the user will first need to establish their identity by authenticating themselves via the OAuth protocol.
Add-ins for third-party services may need to allow users to connect to that service via OAuth.
The OAuth process can be launched through a javascript command facilitated by a helper library created by RingCentral.
import { RingCentralNotificationIntegrationHelper } from 'ringcentral-notification-integration-helper'
const app = new RingCentralNotificationIntegrationHelper()
// Open window with proper params so user can do authorization
// in opened window by RingCentral
app.openWindow(windowUrl: string)
Check out the the Add-in App Helper on Github
The RingCentral Add-in App Helper is a Javascript library to help developers implement the necessary Javascript controls to manage their installation app.
Store access key
It is recommended that the application store the access key generated through the OAuth flow and associate that access key with the incoing webhook passed to the service via the iframe. This will allow users to more easily edit the application after it is installed, as the underlying service will be able to more easily lookup the webhook URL, and reconnect the service in which the URL is ultimately installed.
Select subscription preferences
It is common for applications to present users with the option to select what events specifically they would like to subscribe to. This is often required in order to designate how and when the incoming webhook URL will be triggered.
To prevent overload, users may need to select which specific events they want to receive notificatios for.
Take for example an add-in being created for a service like Github in which a user would need to first select a repository before setting up a new webhook integration. Then upon selecting a repository, the user would then elect which events (e.g. a pull request, a new comment, a commit, a comment, etc.) associated with that repository they would like to receive notifications.
Install incoming webhook URL
To complete the installation, the developer will instruct the target service, e.g. Jira in the example above, to send webhooks to the incoming webhook URL in response to the events selected in the previous step.
Enable the install dialog's "Finish" button
When the installation process is completed successfully, signal to the RingCentral desktop app that the install dialog can now be closed using the Javascript below, which toggles the enabled state of the dialog's submit/finish button.
import { RingCentralNotificationIntegrationHelper } from 'ringcentral-notification-integration-helper'
const app = new RingCentralNotificationIntegrationHelper()
// Notify RingCentral app that the integration can submit (or not).
// RingCentral app can then toggle submit button in RingCentral app UI
app.send({
canSubmit: true // or false if can not submit
})
// Receive message from RingCentral app that user has already
// clicked submit button so integration can proceed to submit.
app.on('submit', async function someSubmitFunction (e) {
console.log(e.data.payload)
// do something like submit
const submitSuccess = await doSubmit()
return {
status: !!submitSuccess // true means submit success
// RingCentral app will close integration window
}
})
Transmitting messages directly or acting as a proxy
Depending upon your role as a developer building an add-in, you will either post a properly formed message to post to an incoming webhook URL, or you will act as a proxy that will convert a webhook into a properly formed message. Let's break this down to help you decide the best way to architect your add-in.
Installing the incoming webhook directly
Let's say you are the proprietor of the service called "Acme" and a user is installing an add-in for Acme. In this case, you can install the incoming webhook URL directly in your service, and when an event is triggered, you can compose a message associated with that event and post it directly to the incoming webhook URL.
Acting as a proxy
If on the other hand you are a third-party building an integration on behalf of Acme. In this case, your app will be required to instruct Acme to deliver events to your service. Then your service will effectively translate the received webhook into a properly formed message and finally transmit that message to RingCentral via the incoming webhook URL. In this architectural model your add-in acts as a proxy, receiving events on one hand, and forwarding a message to its final destination on the other.
If you are acting as a proxy, a key requirement for the target service, in this case Acme, is that it supports a public API which can be used to install a webhook integration.
Editing versus creating a webhook
As discussed above, a user within RingCentral's desktop app can both install a new add-in, as well as edit an existing one. When editing an existing webhook, the developer should present the end user (via the iframe) with a form to edit their subscription preferences.
For example, let's say you built an add-in for Github, and a user installed and configured your add-in to send a message whenever a pull request was received for the repository mycompany/my_repos. Then later the the user wished to update the add-in to be triggered when a pull request was received or a commit was made. In this circumstance, it is recommended that when the iframe is loaded for the associated incoming webhook, the form you would render would already have the checkbox associated with "pull requests" selected. That way the user would only need to check the box associated with "commits" before saving their preferences. | ESSENTIALAI-STEM |
Talk:Atmospheric physics
Merge
I am working on atmospheric sciences and noticed that the articles Atmospheric dynamics and Atmospheric physics exist. Both are tagged as stubs, and the articles are the identical subjects -> dynamics = physics.
My suggestion is to combine AD into AP and retain AP as the combined article, with AD as the redirector page to maintain any links... -Hard Raspy Sci 06:22, 13 December 2005 (UTC)
Critique
This stub on atmospheric physics appears to purport the view of a typical meteorologist more than the view of a physicist. Meteorology has developed more towards engineering, as an applied science, than towards pure physics and phenomenological science. Although advanced and competent, specially in crunching mountains of numbers in breathtaking supercomputers, meteorology has lacked that kind of fundamental thinking one sees in fields like quantum mechanics or cosmology. The physics of tropical convection, for example, is very poorly represented in meteorological models, with the excuses ranging from problems with complexity of clouds occurring in sub-grid scales to aknowledged utter ignorance of physical driving factors. Generalized rough assumptions used in mainstream GCM-centric meteorology (for engineering convenience, not for the good sake of physics), like that the atmosphere is in hydrostatic equilibrium (everywhere), defy basic principles of gas-physics (Clausius-Clapeyron). It is about time meteorologists open up a little and consider developing more the understanding of atmosphere physics from a theoretical perspective. Other applied sciences have benefited wonderfully from being more porous to thinking of fundamental sciences. It is certainly not by chance that Russian meteorologists, confronted with poor access to computers, developed a lot of fundamental understanding of physical phenomena in the atmosphere. My suggestion here is that a physicist working with fundamentals of atmosphere physics review and improve this article -[[User: ADN 03:56, 20 August 2006 (UTC)
* Agreed. -- Hard Raspy Sci 03:50, 1 December 2006 (UTC)
* (Crickets chirping ten months later). Thegreatdr 01:09, 2 June 2007 (UTC)
* Crickets getting louder, twenty months later. This is why wikipedia tells editors to Be Bold! If you're not, the task won't get done for a long, long time. Thegreatdr (talk) 19:18, 17 April 2008 (UTC)
* Thirty months have now passed, and the crickets are deafening. There are other more fundamental articles within the met project that need help, and I'm only able to periodically improve the article. This lack of progress has occurred despite having the physics project banner up on top of the talk page. Thegreatdr (talk) 22:44, 18 February 2009 (UTC)
* One hundred and two months have passed since the initial comment was made, and no physicists have taken up the banner. Until one does, the article's current direction will continue. This must not be a pressing need. Thegreatdr (talk) 14:29, 21 February 2015 (UTC)
Links
External links (eg to professional bodies and journals) would be useful here. User:Pjc51 10:33, 08 September 2006 (BST)
Expansion of article
I took the cue of what could become the lead in adding sections from relevent articles into this article. The process is far enough along that I upped the class from stub to start. I'm beginning to wonder if atmospheric dynamics could be a subarticle of this one, since it is usually treated as a separate college-level course, even though the concepts of atmospheric dynamics are physics related. Thegreatdr 01:08, 2 June 2007 (UTC)
External links modified
Hello fellow Wikipedians,
I have just modified 2 one external links on Atmospheric physics. Please take a moment to review my edit. If you have any questions, or need the bot to ignore the links, or the page altogether, please visit this simple FaQ for additional information. I made the following changes:
* Added archive https://web.archive.org/web/20070830094306/http://www.cet.edu:80/ete/modules/ozone/ozatmo.html to http://www.cet.edu/ete/modules/ozone/ozatmo.html
* Added archive https://web.archive.org/web/20080430142456/http://thunder.msfc.nasa.gov:80/primer/primer3.html to http://thunder.msfc.nasa.gov/primer/primer3.html
Cheers.— InternetArchiveBot (Report bug) 00:14, 21 October 2016 (UTC)
External links modified (January 2018)
Hello fellow Wikipedians,
I have just modified 3 external links on Atmospheric physics. Please take a moment to review my edit. If you have any questions, or need the bot to ignore the links, or the page altogether, please visit this simple FaQ for additional information. I made the following changes:
* Added archive https://web.archive.org/web/20060929081013/http://hurricanes.nasa.gov/earth-sun/technology/remote_sensing.html to http://hurricanes.nasa.gov/earth-sun/technology/remote_sensing.html
* Added archive https://web.archive.org/web/20110720105431/http://science-edu.larc.nasa.gov/EDDOCS/Wavelengths_for_Colors.html to http://science-edu.larc.nasa.gov/EDDOCS/Wavelengths_for_Colors.html
* Added archive https://web.archive.org/web/20080723154301/http://www.evac.ou.edu/okwmdp/physics.html to http://www.evac.ou.edu/okwmdp/physics.html
Cheers.— InternetArchiveBot (Report bug) 22:01, 22 January 2018 (UTC) | WIKI |
Wikipedia:WikiProject Good articles/Unreferenced GA task force
The Unreferenced GA task force, comprised of editors experienced in WikiProject Good articles, has been created to find articles that are of GA quality, but lack citations and add them so that these articles may qualify for GA status.
Objectives
* Promote the use of citations in articles that go to WP:GAN.
* Compile a list of GA-class quality articles that need references, then add them.
* Encourage giving page numbers when large textbooks are being cited
* Develop tools to clean up references
* Advocate use of cite science where appropriate
Participants of this project are also encouraged to actively add references to articles, or prevent them from becoming unreferenced by removal of references. One good way of achieving this is to find competent editors in the edit histories of the articles concerned, or related articles, and contact them to ask their help.
When you feel that the references of an article have been sufficiently improved, and the article has no other serious failings, please feel free to (re)nominate it for WP:GA.
Nominations
Please nominate pages that have been rejected from WP:GAN on the grounds of not being sufficiently well-referenced, on the Nominations page. You may also make direct nominations of articles that have not passed through WP:GAN.
Referencing styles
* Example of citing page numbers (citing page numbers is recommended, for easier verification)
* An example of Harvard references
Tools
* Cyde's Ref Converter
Todo
* Nominate articles from Category:Former good article nominees and Category:Delisted good articles.
Examples
* Geographic information system permalink (IN PROGRESS)
* Bird permalink
* Tuatara permalink
* Insect perm (some general references given, but inline references and page numbers would really help, see Trade and usage of saffron perm)
* Nile crocodile permalink (needs cleanup)
* Chameleon permalink (not quite GA, but lack of references the most serious failing)
Categories
* Category:Articles lacking sources
Participants
* 1) User:Samsara (talk • contribs) 11:31, 11 May 2006 (UTC)
* 2) LotLE × talk 16:39, 11 May 2006 (UTC)
* 3) General Eisenhower • (at war or at peace) 19:16, 13 May 2006 (UTC)
* 4) Armedblowfish (talk|contribs) 22:30, 29 May 2006 (UTC)
* 5) Madhur Kumar Tanwani | Talk Page for Madhur 08:20, 6 June 2007 (UTC)
* 6) ck lostsword|queta!|Suggestions? 18:07, 9 June 2007 (UTC)
* 7) Rifleman 82 02:47, 12 September 2007 (UTC) | WIKI |
Talk:Camp Nelson National Cemetery
Suggestions
This article pretty much meets the B-class criteria, but there are a few things that I would like to see before upping that assessment.
* 1) I've marked a few items with citation needed tags. While I wasn't overly thorough in my browsing, I did notice that the statements I marked didn't appear in any of the sources noted in the paragraph in which the sentence occurs. Specifically:
* 2) The sources say that there were two CSA soldiers mistakenly buried here, but I didn't see anywhere that said specifically that they simply replaced the headstones.
* 3) The map (reference #9) you cite in the "From Reconstruction to the present" section shows the additions, but it doesn't show the years you've asserted. I'd like to see references for those.
* 4) The fact that the burial vaults are made out of recycled car batteries jumped out at me, and I think it's interesting, but I didn't see it in either of the vault sources. Another source is needed here.
* 5) The "Annual events" section relies entirely on a 2010 schedule of events. This by no means implies that they are "annual". Maybe some prior years' schedules could be included as well?
* 6) Are there any more notable interments here? If William Harris is the only person you can find, I would suggest merging this section into the History section. If more can be found, however, the list should be expanded.
While the citation issues are more relevant to bringing the article to GA-Class, the second two items are more vital to the article. If you can dig up some more information related to these two, I would be willing to increase this article to B-Class. Good work so far!--Dudemanfellabra (talk) 05:06, 27 January 2011 (UTC)
* I appreciate the points for improvement, and have taken action on most of them. Here are my thoughts:
* 1) Citation tags: Most were replaced with verified references. In some case, the in-text assertion could not be verified and so was deleted. On the specific items you mentioned:
* 2) Years for renovation projects, reference found.
* 3) Recycled car batteries - This is something I was told while working at the cemetery, but couldn't find anything to corroborate it, so I deleted it for being "hearsay". If it's true, then I suppose neither the government nor the manufacturer wants people to know that a loved one is being buried in melted-down car parts.
* 4) Annual events: The 2010 program mentions the "planning Memorial Day, Veterans Day... Ceremonies each year" in the acknowledgements. Also, the Josh Kegley article Memorial Day at Camp Nelson: Veterans' families take time to remember mentions "the yearly event" in connection with the 2010 ceremony and the 1,000 people that showed up. All the same, I referenced another article, from 1997, about the annual Memmorial Day Ceremony.
* 5) Notable Interments: There are no more that I know of. However, this may change soon, as I've heard (from a cemetery worker) that one of the Iraq War KIA is being nomninated for the MOH. Also, I know from personal experience that many readers, when researching a cemetery, especially one on the National Register of Historic Places, want to know immediately about "Notable burials", and sometimes that's the only research they're doing. It would help the reader to see that heading in the "Contents", even if it is a short paragraph. And finally, I believe it's in keeping with precedent on Wikipedia. I refer you to:
* 6) Mill Springs National Cemetery (x1)
* 7) Fayetteville National Cemetery (x3)
* 8) Tahoma National Cemetery (x3)
* 9) Biloxi National Cemetery (x1)
* Thank you for your considered reply. Boneyard90 (talk) 15:30, 27 January 2011 (UTC)
* The changes look good; I've upped the class to B in all projects. I still disagree about the notable internments section. All the articles you pointed to were of stub/start class, so they haven't really been reviewed. The article about Beth Israel Cemetery in Meridian, Mississippi (the article is actually about the congregation over the cemetery, and I'm probably biased because I'm the one who wrote it haha.. nonetheless...) has been reviewed by other editors and is a GA now. As you can see, there are two or three notable internments in that cemetery (and even images of monuments dedicated to them), but those people are mentioned in the prose. The higher review processes – i.e. GA and FA – focus on removing lists wherever possible and replacing them with prose, and I believe if this article were to be taken through those processes, the reviewer would agree with me that the section should be merged. For now, though, the section is fine and not really required to be merged in order to be B-Class, so I'm not that worried about it. I would suggest either finding more notable internments or merging the section, though, before taking this article any higher. Glad I could help.--Dudemanfellabra (talk) 21:10, 27 January 2011 (UTC) | WIKI |
STATE of Minnesota, Respondent, v. Farah Abshir WARSAME, Appellant.
No. A05-488.
Supreme Court of Minnesota.
July 26, 2007.
Michael 0. Freeman, Hennepin County Attorney, Thomas A. Weist, Assistant County Attorney, Minneapolis, MN, Lori Swanson, Attorney General, St. Paul, MN, for appellant.
Mark D. Nyvold, Richard J. Malacko, St. Paul, MN, for respondent.
OPINION
ANDERSON, Paul H., Justice.
The state charged Farah Abshir War-same with one count of domestic assault and one count of making terroristic threats. The charges related to an incident with Warsame’s girlfriend, N.A. At a Rasmussen hearing, the district court concluded that most of N.A.’s statements to the police were inadmissible at trial. The state appealed, and the Minnesota Court of Appeals reversed, concluding that all of the statements were admissible. We denied Warsame’s petition for review. The United States Supreme Court granted Warsame’s writ of certiorari and vacated the court of appeals decision, remanding the case for reconsideration in light of Davis v. Washington, 547 U.S. -, 126 S.Ct. 2266, 165 L.Ed.2d 224 (2006). Upon remand, the court of appeals again reversed the district court’s ruling. We granted Warsame’s petition for review and affirm in part, reverse in part, and remand to the district court for further proceedings consistent with this opinion.
Shortly after midnight on October 24, 2004, the Eden Prairie Police Department received a 911 call from an individual concerning an incident at a neighboring home, located less than two blocks from the police department. Officer John Wilson responded to the call, and as he approached the address where the 911 call originated, he encountered a woman walking in the middle of the street. Before Wilson was able to get out of his car or speak to the woman, she stated, “My boyfriend just beat me up.” Wilson quickly determined that the woman, whom he later identified as N.A., was related to the 911 call. He also observed that N.A. was upset, crying, and holding the left side of her head. The bump was swollen and red. Wilson also noted that N.A. appeared “wobbly” and “potentially faint,” so he had her sit down on the curb.
Wilson retrieved his emergency medical treatment bag from his squad car and began checking N.A.’s head and neck area. He observed fresh bruising on her neck, and as he did so, N.A. stated that she had been choked. While Wilson administered first aid, he asked N.A. what he described as “some form of open-ended question of what happened,” and Wilson testified that N.A. gave the following response:
She told me that her boyfriend came home. She wanted to talk. He was tired and did not want to talk. They began to argue. And he had gone into the kitchen and grabbed a cooking pot and had struck her in the head with it. And after * * ⅜ he hit her, she fell on to the bed, and he then got on top of her and was choking her, and her sisters came up and attempted to get her boyfriend off the top of her. At that time her boyfriend went into the kitchen, got a knife and came back after her and threatened to kill her, chased her from room to room. She affirmed that she was very frightened and believed he was going to kill her.
Wilson called an ambulance. During the approximately 15 to 20 minutes before an ambulance arrived, Wilson learned more information from N.A. She told Wilson that she was pregnant, after which Wilson attempted to assess if N.A.’s pregnancy may have been affected by the alleged assault. N.A. also stated that after the assault, her boyfriend had “left in her vehicle with one of her sisters.”
N.A. explained to Wilson that she could not call 911 because the phone lines in her home had been cut, and as a result she walked toward the police department in order to report the assault. Wilson testified that N.A. provided most of this information in a “story-like fashion,” and that he asked only a few “small questions” toward the end in order to obtain extra detail. Wilson testified that N.A. was “crying and physically shaking” throughout his entire encounter with her. Wilson recalled writing down N.A.’s name, date of birth, and telephone number while he was speaking with her, but he did not recall whether any additional notes he took were written before or after the paramedics arrived.
Police Sergeant Robert Olson arrived at the scene one to three minutes after Wilson. Olson observed Wilson assisting N.A. as she was seated on the curb, and he noticed that N.A. was crying and “heaving heavily.” He also saw a large lump on her head. Olson used his portable radio to relay to other police units responding to the 911 call some of the information that N.A. was giving to Wilson about the suspect’s description. Olson heard N.A. describe her assailant, who was identified as the respondent, Farah Abshir Warsame, and state that a knife was involved in the assault, which information Olson reported over his radio. Olson also heard N.A. state that a third party had been cut with the knife. Olson stated that he took no notes during this time.
Olson testified that Warsame was not in police custody during the time he was listening to the exchange between Wilson and N.A. But Olson had learned that another Eden Prairie police officer had responded to the 911 call and that officer observed an SUV-type vehicle leaving the home where the alleged assault had taken place. Olson learned that the officer was following the vehicle, which was apparently traveling at a high speed. The vehicle, driven by Warsame, was later stopped about two miles from N.A.’s home.
Olson testified that he remained near Wilson and N.A. for three to five minutes and then went to the home where the assault allegedly occurred. After entering the home, he spoke with one of N.A.’s sisters, LA., who was apparently present during the alleged assault. Olson stated that he observed a cut on I.A.’s finger, which was not bleeding.
Wilson testified that during the 15 to 20 minutes he spent with N.A., he learned “early on” that Warsame had been apprehended. Wilson stated that he learned this shortly after Olson broadcasted War-same’s name and description over the police radio, but Wilson did not recall if Olson was still nearby when Wilson learned that Warsame had been apprehended. Wilson did not recall ever telling N.A. that Warsame was in police custody.
After the paramedics arrived to assist N.A., Wilson also entered N.A.’s home and spoke with I.A. It was during this conversation that Wilson learned that during the assault, LA. had attempted to grab a knife from Warsame, was cut, and passed out from the injury.
Both N.A. and I.A. failed to respond to subpoenas from the state to testify at War-same’s trial, so the state moved to admit their statements to Officer Wilson and Sergeant Olson. After conducting a Rasmussen hearing where Wilson and Olson both testified, the district court concluded that N.A.’s initial statement to Wilson, that her boyfriend beat her up, was not testimonial under Crawford v. Washington, 541 U.S. 36, 124 S.Ct. 1354, 158 L.Ed.2d 177 (2004), but all subsequent statements by N.A. and I.A. were testimonial and therefore inadmissible because they violated Warsame’s rights under the Confrontation Clause. With the exception of the initial statement, the court concluded that the statements N.A. made to Wilson were taken “to obtain evidence that could be used at trial” and made while N.A. knew that she was safe in the presence of a police officer. The court also concluded that the statements I.A. made to Olson and Wilson were for the purpose of providing evidence and therefore testimonial.
The state appealed the district court’s ruling to the court of appeals, arguing that all of N.A.’s statements were admissible under Crawford. State v. Warsame (Warsame I), 701 N.W.2d 305, 307 (Minn.App.2005). The state did not appeal the district court’s suppression of I.A.’s statements to Wilson and Olson. The court of appeals reversed the district court’s ruling on the suppression of N.A.’s statements, concluding that none of the information N.A. gave to Wilson was testimonial, and N.A.’s entire statement was therefore admissible under Crawford. Warsame I, 701 N.W.2d at 312-13. The court of appeals determined that statements made in response to questions from a police officer are not necessarily testimonial, and there was no evidence in the record to support a finding that the purpose of Wilson’s questions was to obtain evidence for trial. Id. at 311. We denied Warsame’s petition for review.
Warsame then filed a writ of certiorari to the U.S. Supreme Court. The Court granted the writ, vacated the court of appeals decision, and remanded the case to the court of appeals for reconsideration in light of the Court’s intervening decision in Davis, 547 U.S. —, 126 S.Ct. 2266, 165 L.Ed.2d 224. Warsame v. Minnesota, — U.S. —, 126 S.Ct. 2983, 165 L.Ed.2d 985 (2006).
After reconsideration, the court of appeals again concluded that all of N.A.’s statements to Wilson were admissible. State v. Warsame (Warsame II), 723 N.W.2d 637, 643 (Minn.App.2006). The court based its decision on its determination that there was an “ongoing emergency” throughout the encounter between Wilson and N.A. because the police had not yet resolved emergencies both in the home, where there was a potentially injured victim, and in Warsame’s vehicle, where N.A.’s sister was a passenger. Id. at 642. But the court acknowledged that the record was not clear on whether those emergencies ended before completion of N.A.’s statements, which information would further inform the court’s determination of whether those statements continued to be nontestimonial. Therefore, the court of appeals remanded to the district court with the direction that the district court may reopen the record to obtain additional evidence. Id. at 643. Warsame then petitioned our court for review.
A. Standard of Review
Warsame argues that all of N.A.’s statements were testimonial and should therefore be ruled inadmissible at trial. We generally will not reverse a district court’s evidentiary rulings absent a clear abuse of discretion. State v. Caulfield, 722 N.W.2d 304, 308 (Minn.2006). But whether the admission of evidence violates a defendant’s rights under the Confrontation Clause is a question of law that we review de novo. Id.
The Confrontation Clause of the Sixth Amendment to the U.S. Constitution provides: “In all criminal prosecutions, the accused shall enjoy the right * * * to be confronted with the witnesses against him.” In Crawford, the Supreme Court concluded that this clause prohibits “admission of testimonial statements of a witness who did not appear at trial unless he was unavailable to testify, and the defendant had had a prior opportunity for cross-examination.” 541 U.S. at 53-54, 124 S.Ct. 1354. Although the Court concluded that it was unnecessary to endorse any particular formulation of what constituted a testimonial statement, the Court noted that included among the “core class” of such statements were “pretrial statements that declarants would reasonably expect to be used prosecutorially,” and “[statements taken by police officers in the course of interrogations.” Id. at 51-52, 124 S.Ct. 1354 (internal quotation marks omitted).
B. Recent Case Law
1. U.S. Supreme Court Decision in Davis/Hammon
Two years after its decision in Crawford, the Supreme Court in two companion cases — Davis/Hammon—was asked to determine “precisely which police interrogations produce testimony.” 126 S.Ct. at 2273. In Davis/Hammon, the Court articulated the following rule to distinguish between testimonial and nontestimonial statements:
Statements are nontestimonial when made in the course of police interrogation under circumstances objectively indicating that the primary purpose of the interrogation is to enable police assistance to meet an ongoing emergency. They are testimonial when the circumstances objectively indicate that there is no such ongoing emergency, and that the primary purpose of the interrogation is to establish or prove past events potentially relevant to later criminal prosecution.
Id. at 2273-74 (footnote omitted). The facts in each of the two companion cases are helpful in understanding this rule, so we will address them separately.
The Davis case involved a domestic assault victim’s statements to a 911 operator while the assault was occurring in the victim’s home. Davis/Hammon, 126 S.Ct. at 2270-71. During the 911 call, the victim responded to a series of questions from the operator and then told the operator that her assailant was leaving the home in a car. Id. at 2271. At that point, the operator told the victim to stop talking and proceeded to ask the victim questions about the assailant and the assault. Id. The Court concluded that at the very least, the victim’s statements up until she told the operator that the assailant was driving away from the home were nontestimonial because the circumstances objectively indicated that the primary purpose of those statements was to enable police to meet an ongoing emergency. Id. at 2277.
In the Davis case, the Supreme Court cited four objective factors that indicated the victim’s statements were made to meet an ongoing emergency: (1) the victim described events as they actually happened and not past events; (2) any “reasonable listener” would conclude that the victim was facing an ongoing emergency; (3) the questions asked and answers given were necessary to resolve a present emergency, rather than only to learn what had happened in the past; and (4) there was a low level of formality in the interview because the victim’s answers were frantic and her environment was not tranquil or safe. Id. at 2276-77. The Court further noted that the victim was seeking aid, not telling a story. Id. at 2279. Although the Court was not required to determine whether statements made after the assailant had driven away were testimonial, the Court noted that a conversation which begins as an interrogation to determine the need for emergency assistance can evolve into testimonial statements once that former purpose has been achieved. Id. at 2277.
In Hammon, the Supreme Court concluded that all of a domestic assault victim’s statements to the police were testimonial. 126 S.Ct. at 2278. In the Hammon case, the police came to the victim’s home and found the victim and her assailant in separate places, and the police kept the assailant and the victim in separate rooms while the victim was questioned. Id. at 2272, 2278. The Court noted that under the facts in Hammon, there was no emergency in progress when the police arrived at the victim’s home because the victim assured the police that things were fíne “and there was no immediate threat to her person.” Id. at 2278.
In Hammon, the Supreme Court also observed that during the officer’s questioning of the victim, the officer was determining what happened, not what was happening. Id. In addition, there was a formal aspect to the mode of questioning because the victim’s statements were deliberately recounted in response to the officer’s questions and took place some time after the events described occurred, which the Court noted are circumstances more characteristic of an investigation. Id. But the Court made a final observation that police questions at the scene of a domestic dispute can yield nontestimonial answers because the police “ ‘need to know whom they are dealing with in order to assess the situation, the threat to their own safety, and possible danger to the potential victim.’ ” Id. at 2279 (quoting Hiibel v. Sixth Judicial Dist. Court of Nev., Humboldt Cty., 542 U.S. 177, 186, 124 S.Ct. 2451, 159 L.Ed.2d 292 (2004)).
2. State v. Wright
On a remand from the Supreme Court, we applied the Davis/Hammon principles in State v. Wright, 726 N.W.2d 464 (Minn.2007). Wright involved a 911 call and victim interviews. Wright allegedly pulled a gun and pointed it at his girlfriend, R.R., and her sister before leaving the apartment Wright and R.R. shared. Wright, 726 N.W.2d at 467, 470. R.R. called 911, told the operator how she had been threatened, described Wright in response to the operator’s questioning, and then asked her sister to speak with the operator after the operator told R.R. that the police had arrived at the apartment. Id. at 467-68. After determining where R.R. and her sister were in the building and notifying R.R.’s sister that the police had sighted Wright and were following him, the operator learned that Wright was in police custody and informed R.R.’s sister of this fact. Id. at 468. Then, in response to R.R.’s sister’s concerns and questions, the operator comforted and assured the sister that the situation was under control. Id. Following Wright’s arrest, police officers conducted a “field investigation interview” of both R.R. and her sister at the apartment. Id. at 469.
We concluded in Wright that the police interviews were testimonial but that the entire 911 call was nontestimonial. Id. at 475-76. Regarding the interviews, we stated that as in Davis/Hammon, by the time the interviews occurred, the emergency had ended because Wright was in custody. 726 N.W.2d at 476. We therefore concluded that the interviews were conducted to “establish events potentially relevant” to Wright’s prosecution. Id. Regarding the 911 call, we specifically addressed whether the 911 call should be divided between testimonial and nontesti-monial statements, but we concluded that it was not necessary to do so. Id. at 474. We concluded that the emergency was ongoing until Wright was in custody, and even after Wright was in custody, the “sole purpose” of the remainder of the call was to calm R.R.’s sister and not to establish or prove past events. Id. at 474-75 (distinguishing the facts from those in Davis).
C. Were N.A.’s Statements Testimonial or Nontestimonial?
It is within the context of the foregoing case law that we must determine whether N.A.’s statements to Wilson were testimonial or nontestimonial. When making this determination we must decide whether there was an ongoing emergency when the statements were made.
1. N.A.’s Initial Statement to the Police
Warsame argues that the district court incorrectly concluded that N.A.’s initial, volunteered statement that her boyfriend beat her up was nontestimonial because N.A.’s primary concern in making the statement was to supply information relevant to criminal prosecution. According to Wilson’s testimony, when N.A. made the statement, she was walking toward the police station to report the assault.
Volunteered statements may be testimonial. See Davis/Hammon, 126 S.Ct. at 2274 n. 1. But in this ease, the objective circumstances surrounding N.A.’s initial statement indicate that she did not make the statement to Officer Wilson with the prosecution of Warsame in mind. After having been struck on the head with a pan and choked, N.A. attempted to call 911 but was unable to do so because the telephone lines in her home had been cut. N.A. left her home and took to the street with injuries at a time when she was in obvious distress and when War-same was still at large. These are not circumstances indicating that N.A.’s primary purpose for talking to the police was to prosecute Warsame, as that purpose could have been achieved after she recovered for a period of time and sought medical attention. Instead, N.A. was seeking help by walking to the police department, located approximately two blocks from her home. We conclude that N.A.’s initial, volunteered statement is nontestimonial and therefore admissible at Warsame’s trial.
2. N.A.’s Subsequent Statements— Was There an Ongoing Emergency?
We next consider the statements N.A. made to Wilson after the officer’s initial encounter with N.A. Warsame argues that there was no ongoing emergency during Wilson’s conversation with N.A. and that Wilson’s primary purpose in interrogating N.A. was to gather evidence for a criminal prosecution. Therefore, War-same argues that N.A.’s statements to Wilson during the interrogation were testimonial.
Warsame asserts that there was no ongoing emergency during the interrogation because, similar to the facts in Hammon, N.A. was separated from her alleged assailant and had police protection. The state responds by arguing that there were three ongoing emergencies during the interrogation: (1) N.A.’s medical condition; (2) Warsame’s flight; and (3) I.A.’s potential medical condition inside the home. We consider each of these potential ongoing emergencies.
N.A.’s Medical Condition
Regarding N.A.’s medical condition, we first note that neither Davis/Hammon nor Wright involved a victim with potential medical concerns. But applying the principles articulated in Davis/Hammon, if “the primary purpose of the interrogation is to enable police assistance to meet an ongoing emergency,” then N.A.’s statements are nontestimonial. 126 S.Ct. at 2273. We conclude that questions addressing a victim’s medical condition may qualify as an interrogation designed to meet an ongoing emergency. As first responders to emergencies, police are often required to assess a party’s injuries and determine whether those injuries must be immediately addressed and whether the party requires additional assistance from paramedics or other health care professionals. In order to make that assessment, officers must inevitably learn the circumstances by which the party was injured, and if the circumstances of the questions and answers objectively indicate that gaining such information is the primary purpose of the interrogation, then the party’s statements are nontestimonial. We acknowledge that information about a victim’s injury and its cause may be useful in a later prosecution, but for Confrontation Clause purposes, it is the primary purpose of the interrogation that is dispos-itive.
Here, the objective circumstances of the interrogation indicate that the primary purpose of at least the initial part of the interrogation was to enable Wilson to address N.A.’s medical condition. After seeing N.A. and starting to assist her, Wilson had N.A. sit down because she was wobbly and potentially faint. Wilson then retrieved his emergency medical treatment bag, an act that indicates Wilson had concluded there was a medical concern. In order for Wilson to properly address the bump on N.A.’s head and the bruising on her neck, there is no question that the circumstances under which N.A. was physically hurt were relevant. There was no level of formality to the interrogation, N.A. was crying and shaking throughout, and the location of the exchange was a roadside curb. Although N.A. told Wilson about the alleged assault in the past tense rather than the present tense, this temporal context was necessary for Wilson to learn the circumstances under which N.A. was injured. Further, N.A.’s condition was severe enough that Wilson called an ambulance to the scene. Finally, Wilson addressed the concern of N.A.’s pregnancy and how that might have been affected by the alleged assault. We conclude that Wilson’s questions and N.A.’s answers, at least so far as they pertained to N.A.’s treatment, were necessary to resolve N.A.’s apparent medical emergency.
Warsame’s Flight and I.A.’s Medical Condition
The state also argues that War-same’s flight from the scene of the alleged assault and I.A.’s potential medical condition inside the house constituted ongoing emergencies. Warsame argues that there were no ongoing emergencies because N.A. was under police protection and War-same was being pursued as soon as the interrogation began. Warsame further argues that any emergency cannot be expanded beyond N.A.’s situation because Davis/Hammon defines emergency narrowly to include only “an immediate and continuing threat,” not “[pjossible concerns and emergencies.” We conclude that the Davis/Hammon test should not be interpreted so narrowly.
In effect, Warsame interprets the Davis/Hammon test to circumscribe what may constitute an ongoing emergency to a narrow geographic proximity, based on the declarant’s location. We acknowledge such an interpretation comports with the facts in Davis, Hammon, and Wright, but we conclude that the Supreme Court did not intend to restrict what may constitute an ongoing emergency to such a limited area. For example, in Davis/Hammon, the Court observed that in response to domestic disputes, officers “ ‘need to know whom they are dealing with in order to assess the situation, the threat to their own safety, and possible danger to the potential victim.’ ” 126 S.Ct. at 2279 (quoting Hiibel, 542 U.S. at 186, 124 S.Ct. 2451); see also 126 S.Ct. at 2276 (stating that in order to resolve a present emergency, law enforcement may have to establish an assailant’s identity “so that the dispatched officers might know whether they would be encountering a violent felon” (citing Hiibel, 542 U.S. at 186, 124 S.Ct. 2451)). Although the police in the Hammon case were encountering the alleged assailant at the scene of the crime, where the victim remained, the necessity to assess the assailant and any threat to personal safety is equally applicable when the police are pursuing that assailant outside of the victim’s proximity.
Courts in other jurisdictions have concluded that ongoing emergencies may exist beyond the declarant’s geographic proximity, even when police are with the declarant and particularly when a dangerous suspect remains at large. See State v. Kemp, 212 S.W.3d 135, 149 (Mo.2007) (concluding that a victim’s statements were not testimonial where she described her assailant’s possible location, stated that the assailant was armed with a gun, and stated that he was on drugs, which warned the police of “possible erratic or dangerous behavior upon arrival”). In State v. Ayer, the New Hampshire Supreme Court concluded that a witness’s statements were nontestimonial when the interrogating officer did not know where the perpetrator was, whether he was armed, whether the perpetrator might have other targets, and whether the violence might continue elsewhere. 154 N.H. 500, 917 A.2d 214, 224-25 (2006). The court concluded that such information was necessary for the officer to “address an existing threat to his safety and the safety of others.” Id. at 224.
We conclude that extending an emergency beyond the declarant’s geographic proximity comports with the fundamental concern the Supreme Court considered in Davis/Hammon, which was distinguishing between interrogations by the police for the purpose of addressing ongoing emergencies and interrogations for the purpose of gathering evidence for trial. We conclude that if the objective circumstances of the interrogation indicate that the primary purpose is to address an ongoing emergency, regardless of where that emergency is occurring, a declarant’s statements are nontestimonial. In order to meet this standard, the interrogation must relate directly to addressing the emergency. If the interrogator is not eliciting information that may be useful in addressing the ongoing emergency, then it cannot be maintained that the interrogation’s primary purpose is to address that emergency.
Applying the foregoing rules to the facts in this case, we conclude that Warsame’s flight and I.A.’s potential medical condition both constitute ongoing emergencies. Viewed objectively, N.A.’s statements caused the police to address the two other exigencies created by the alleged assault. First, N.A.’s identification of Warsame and her description of the assault enabled Olson to report the suspect’s name and possible weapon to the officers in pursuit, which, as in Kemp and Ayer, provided those officers with more information to better address that situation.
Second, N.A.’s statement revealed that a third party — I.A.—had been cut by a knife during the assault, which information, when viewed objectively, may have caused Olson to enter the house earlier than he would have without that information. N.A.’s statement apparently did not provide insight into the severity of I.A.’s condition, so further investigation was necessary to ensure there was no ongoing medical emergency inside the house. It is objectively reasonable to conclude that an emergency existed in that location until Olson was able to conclude that emergency medical assistance was unnecessary.
The objective circumstances under which the interrogation was conducted further buttress our conclusion that the primary purpose of the interrogation was to address ongoing emergencies. While Wilson was questioning N.A., he did not recall taking any notes other than N.A.’s name, birthday, and telephone number, and Wilson’s questions were not specific and thorough, as one might otherwise expect when interrogating a crime victim. Also, while Olson was present at the interrogation, he took no notes and instead dispatched information over his police radio that was helpful to the pursuit of Warsame. These are not objective indications that the officers were primarily gathering evidence for a criminal prosecution.
Based on the foregoing analysis, we conclude that the court of appeals correctly concluded that there were three ongoing emergencies while N.A. was being interrogated: (1) N.A.’s medical condition; (2) Warsame’s flight; and (3) I.A.’s medical condition.
3. Did the Ongoing Emergencies End at Some Point?
Warsame argues that even if there were ongoing emergencies for purposes of our Confrontation Clause analysis, those emergencies ended in a short time and did not last the entire 15- to 20-minute interrogation. As previously noted, an interrogation that begins for the purpose of determining the need for emergency assistance can evolve into testimonial statements once that purpose has been achieved. Davis/Hammon, 126 S.Ct. at 2277.
The state has the burden of proving that a particular statement does not violate a defendant’s Sixth Amendment rights. State v. Burrell, 697 N.W.2d 579, 600 (Minn.2005) (citing State v. King, 622 N.W.2d 800, 807 (Minn.2001)). Here, the state must demonstrate that N.A.’s statements were made before the emergencies ended, and if all emergencies ended before the 15- to 20-minute interrogation concluded, the state must demonstrate which of N.A.’s statements were made before those emergencies ended.
Based on Olson’s testimony, Warsame was not apprehended and I.A.’s condition was uncertain until just after Olson left Wilson and N.A. But the chronology of facts that N.A. had given at that point is not clear. The court of appeals concluded that N.A.’s “narrative account” of the assault recounted by Wilson, which apparently refers to the block quotation recited in the fact section above, was made within the time before Olson left. Warsame II, 723 N.W.2d at 642. Because Olson heard N.A. refer to the knife, and information about the knife was given in this narrative account, the court of appeals concluded that the narrative account was nontestimo-nial. Id.
According to Wilson, the narrative account was elicited through his initial, open-ended question, “what happened?” Because the apprehension and possible victim emergencies did not end before Olson left the curb, anything he heard N.A. say, which included the suspect’s description, the use of a knife in the assault, and an injury to a third party, must have been said before those emergencies ended. But the record is not clear as to whether Olson stayed for the entire narrative account, and if he left during the account, what information he may have missed. In addition, Olson remembered hearing facts from N.A. that Wilson did not testify to hearing at the Rasmussen hearing, including War-same’s physical description and that a third party was injured inside N.A.’s home. Based on those discrepancies, it is difficult to delineate a chronology for what N.A. said at what time. The only certainty from this record is that N.A.’s initial, volunteered statement to Wilson was nontes-timonial, and everything Olson heard N.A. say was said before Warsame was apprehended and I.A.’s medical status was verified.
D. Conclusion
We conclude that under the Davis/Ham-mon primary purpose test, N.A. made nontestimonial statements up to the point Warsame was apprehended and Olson verified I.A.’s medical status. The record reflects that Olson’s testimony about what N.A. said was all nontestimonial, but because Wilson’s testimony lacked chronological development, the record is unclear regarding what Wilson heard N.A. say that might be nontestimonial. Therefore, before the state is allowed to admit N.A.’s statements through Wilson’s testimony, other than the initial, volunteered statement and those statements that conform to what Olson heard, the state must demonstrate that the statements were made before the emergencies at issue ended. We hold that the court of appeals erred when it concluded that all of N.A.’s statements were nontestimonial and admissible in court. Because neither the state nor the district court had the benefit of the rules articulated in Davis/Hammon and Wright at the Rasmussen hearing, we remand to the district court so that the court may make a determination in a manner consistent with those cases and our holding in this case, including whether any part of N.A.’s statement was made after the emergencies ended. The district court may develop the record in any manner it deems appropriate.
Affirmed in part, reversed in part, and remanded.
PAGE, Justice
(concurring in part, dissenting in part).
While I do not disagree with the court’s remand, I cannot on this record conclude that the state met its burden of showing that there were any ongoing emergencies or that the primary purpose of Officer Wilson’s questioning was to address an emergency and not to establish facts relevant to the future prosecution of Warsame. Therefore, I dissent in part.
Unlike the victims in State v. Wright, 726 N.W.2d 464 (Minn.2007), all of N.A.’s statements were made while she was under police protection and while her injuries were being attended to. In order for courts to determine whether there is an ongoing emergency and whether the officers’ questions related to that emergency, the state must demonstrate the chronology of the relevant events and statements, and the specific questions asked by the officers and the responses elicited by those questions. A one-paragraph summary of a 15-to 20-minute conversation without any evidence of the specific questions asked of the victim or any way of knowing the events occurring while the victim was providing those statements is insufficient to meet the state’s burden under Davis v. Washington, 547 U.S. -, 126 S.Ct. 2266, 2273-74, 165 L.Ed.2d 224 (2006).
It is also important to point out that, in order for a statement to qualify as nontes-timonial under Davis, the state must show both that there was an ongoing emergency and that the questions asked related to that emergency and not to establishing facts necessary for future prosecution. Id. at 2273-74. In my view, N.A.’s statement that a knife was involved in the assault and that a third party was cut, without more, is not enough to show that there was such an emergency. Further, it is clear from the record that the officers did not ask any questions regarding her sister I.A. Absent such questions, I do not see how the state can make a showing that the officers’ questions were aimed at addressing I.A.’s situation and not at establishing facts to be used in a future prosecution of Warsame. Accordingly, I would conclude that the state failed to meet its burden of showing that N.A.’s statement regarding I.A. was nontestimonial.
Finally, I would note that, unlike Wright, a case in which the victims feared that the defendant would return to the apartment to harm them, 726 N.W.2d at 473-75, there is nothing in the record here that suggests that when N.A. made the statements at issue in response to Officer Wilson’s questions she believed Warsame was still a potential threat to her. Furthermore, once again, there is nothing in the record indicating what specific questions the officers asked with regard to Warsame and thus there is no way to conclude that the primary purpose of their questions was to resolve some ongoing emergency with respect to Warsame.
For these reasons, I concur in the remand, but, unlike the court, am unable on this record to conclude that any of the questions asked by the police had the primary purpose of addressing any ongoing emergencies.
. Wilson apparently learned of Warsame’s apprehension over a police radio, but the record is not clear on this point.
. In State v. Wright, we referred to the Davis v. Washington opinion as Davis/Hammon, and then referred to the individual cases as Davis and Hammon, for the purpose of avoiding confusion. 726 N.W.2d 464, 472 n. 2 (Minn.2007). We continue that practice here.
. In Davis/Hammon, the Supreme Court defined "interrogation” broadly, to encompass police questioning in a colloquial sense. 126 S.Ct. at 2273. Neither party disputes that N.A.’s statements following her initial, volunteered statement were part of an interrogation under this definition.
. To the extent that the dissent believes the state failed to demonstrate its burden under Davis/Hammon, we note that the state presented its evidence at the Rasmussen hearing approximately 15 months before the Supreme Court articulated the primary purpose test in Davis/Hammon.
. The parties argue about whether it is proper to infer that N.A.’s other sister, the passenger in Warsame's vehicle, was kidnapped, but the inference is unnecessary. A high speed pursuit and apprehension of a potentially dangerous suspect qualifies as an emergency, regardless of whether a kidnapping is involved. To the extent that the court of appeals inferred that the car passenger was in danger, Warsame II, 723 N.W.2d at 642, we conclude that there must be an objectively reasonable basis in the record to make such an inference. Here, the record does not objectively support such an inference because, based on Wilson’s testimony, N.A. never gave any indication that her sister was in danger or kidnapped.
More generally, Warsame argues that it was improper for the court of appeals to make any inferences that there were other ongoing emergencies based on Wilson’s and Olson’s testimony without explicit evidence. But such a rule would ignore the principle holding of Davis/Hammon, that declarant statements during the course of a police interview are nontestimonial if the primary purpose is to address an ongoing emergency. In the normal course of operation, law enforcement officials must make inferences from witness and victim interrogations to determine whether there are other exigencies that must be addressed. Courts cannot determine whether the primary purpose of an interrogation was to address an ongoing emergency unless the court similarly infers, based on objectively reasonable circumstances in the record, whether the police had an emergency to address.
. In addition, we note that the state must ordinarily demonstrate that each of the de-clarant's statements pertains to the applicable ongoing emergencies in each case, and any testimonial statements should be redacted. See Davis/Hammon, 126 S.Ct. at 2277, Wright, 726 N.W.2d at 473 n. 4. Based on our review of the record in this case, all of N.A.'s statements pertained to the ongoing emergencies.
. Warsame notes that the district court concluded that N.A.'s statements qualified as an excited utterance, an exception to hearsay. Warsame argues that this has no impact on the analysis before this court. We agree. The Supreme Court stated that testimonial statements are not admissible in court because they meet a hearsay exception, except dying declarations. Crawford, 541 U.S. at 56 & n. 6, 124 S.Ct. 1354.
The state argues that under the rule of forfeiture, Warsame waived his right to argue that admission of N.A.'s statements violate the Confrontation Clause because he cut the phone line, preventing N.A. from calling 911. First, there is no evidence in the record to suggest that it was Warsame who cut the phone line. Second, the rule of forfeiture pertains to a defendant procuring the absence of a witness at trial. Davis/Hammon, 126 S.Ct. at 2280; Wright, 726 N.W.2d at 479. There is no evidence in the record that suggests Warsame procured N.A.’s unavailability in this case.
| CASELAW |
Development
===========
Get the sources
---------------
Anonymous:
::
git clone https://pagure.io/pagure.git
Contributors:
::
git clone ssh://git@pagure.io/pagure.git
Dependencies
------------
Install the build dependencies of pagure:
::
sudo dnf install git python-virtualenv libgit2-devel \
libjpeg-devel gcc libffi-devel redhat-rpm-config
The python dependencies of pagure are listed in the file ``requirements.txt``
at the top level of the sources.
::
virtualenv pagure_env
source ./pagure_env/bin/activate
pip install pygit2==<version of libgit2 found>.* # e.g. 0.23.*
pip install -r requirements.txt
.. note:: working in a `virtualenv <http://www.virtualenv.org/en/latest/>`_
is tricky due to the dependency on `pygit2 <http://www.pygit2.org/>`_
and thus on `libgit2 <https://libgit2.github.com/>`_
but the pygit2 `documentation has a solution for this
<http://www.pygit2.org/install.html#libgit2-within-a-virtual-environment>`_.
How to run pagure
-----------------
There are several options when it comes to a development environment. Vagrant
will provide you with a virtual machine which you can develop on, you can use
a container to run pagure or you can install it directly on your host machine.
The README has detailed instructions for the different options.
Run pagure for development
--------------------------
Adjust the configuration file (secret key, database URL, admin group...)
See :doc:`configuration` for more detailed information about the
configuration.
Create the database scheme::
./createdb.py
Create the folder that will receive the different git repositories:
::
mkdir {repos,docs,forks,tickets,requests,remotes}
Run the server:
::
./runserver.py
If you want to change some configuration key you can create a file, place
the configuration change in it and use it with
::
./runserver.py -c <config_file>
For example, create the file ``config`` with in it:
::
from datetime import timedelta
# Makes the admin session longer
ADMIN_SESSION_LIFETIME = timedelta(minutes=20000000)
# Use a postgresql database instead of sqlite
DB_URL = 'postgresql://user:pass@localhost/pagure'
# Change the OpenID endpoint
FAS_OPENID_ENDPOINT = 'https://id.stg.fedoraproject.org'
APP_URL = '*'
EVENTSOURCE_SOURCE = 'http://localhost:8080'
EVENTSOURCE_PORT = '8080'
DOC_APP_URL = '*'
# Avoid sending email when developing
EMAIL_SEND = False
and run the server with:
::
./runserver.py -c config
To get some profiling information you can also run it as:
::
./runserver.py --profile
You should be able to access the server at http://localhost:5000
Every time you save a file, the project will be automatically restarted
so you can see your change immediately.
Create a pull-request for testing
----------------------------------
When working on pagure, it is pretty often that one wanted to work on a
feature or a bug related to pull-requests needs to create one.
Making a pull-request for development purposes isn't hard, if you remember
that since you're running a local instance, the git repos created in your
pagure instance are also local.
So here are in a few steps that one could perform to create a pull-request in a
local pagure instance.
* Create a project on your pagure instance, let's say it will be called ``test``
* Create a folder ``clones`` somewhere in your system (you probably do not
want it in the ``repos`` folder created above, next to it is fine though)::
mkdir clones
* Clone the repo of the ``test`` project into this ``clones`` folder and move into it::
cd clones
git clone ~/path/to/pagure/repos/test.git
cd test
* Add and commit some files::
echo "*~" > .gitignore
git add .gitignore
git commit -m "Add a .gitignore file"
echo "BSD" > LICENSE
git add LICENSE
git commit -m "Add a LICENSE file"
* Push these changes::
git push -u origin master
* Create a new branch and add a commit in it::
git branch new_branch
git checkout new_branch
touch test
git add test
git commit -m "Add file: test"
* Push this new branch::
git push -u origin new_branch
Then go back to your pagure instance running in your web-browser, check the
``test`` project. You should see two branches: ``master`` and ``new_branch``.
From there you should be able to open a new pull-request, either from the
front page or via the ``File Pull Request`` button in the ``Pull Requests``
page.
Coding standards
----------------
We are trying to make the code `PEP8-compliant
<http://www.python.org/dev/peps/pep-0008/>`_. There is a `flake8 tool
<http://pypi.python.org/pypi/flake8>`_ that can automatically check
your source.
We run the source code through `black <https://pypi.python.org/pypi/black>`_
as part of the tests, so you may have to do some adjustments or run it
yourself (which is simple: ``black /path/to/pagure``).
.. note:: flake8 and black are available in Fedora:
::
dnf install python3-flake8 python3-black
or
::
yum install python3-flake8 python3-black
Send patch
----------
The easiest way to work on pagure is to make your own branch in git, make
your changes to this branch, commit whenever you want, rebase on master,
whenever you need and when you are done, send the patch either by email,
via the trac or a pull-request (using git or github).
The workflow would therefore be something like:
::
git branch <my_shiny_feature>
git checkout <my_shiny_feature>
<work>
git commit file1 file2
<more work>
git commit file3 file4
git checkout master
git pull
git checkout <my_shiny_feature>
git rebase master
git format-patch -2
This will create two patch files that you can send by email to submit in a ticket
on pagure, by email or after forking the project on pagure by submitting a
pull-request (in which case the last step above ``git format-patch -2`` is not
needed.
.. note:: Though not required, itâs a good idea to begin the commit message
with a single short (less than 50 character) line summarizing the
change, followed by a blank line and then a more thorough description.
The text up to the first blank line in a commit message is treated
as the commit title, and that title is used throughout Git.
For example, git-format-patch turns a commit into email, and it
uses the title on the Subject line and the rest of the commit in
the body.
Pagure uses lines that contain only 'Fixes #number' as references
to issues. If for example a commit message of a pagure patch has
a line 'Fixes #3547' and a pullrequest (PR) gets created in pagure,
this PR will be linked to from ``https://pagure.io/pagure/issue/3547``
Unit-tests
----------
Pagure has a number of unit-tests.
We aim at having a full (100%) coverage of the whole code (including the
Flask application) and of course a smart coverage as in we want to check
that the functions work the way we want but also that they fail when we
expect it and the way we expect it.
Tests checking that function are failing when/how we want are as important
as tests checking they work the way they are intended to.
So here are a few steps that one could perform to run unit-tests in a
local pagure instance.
* Install the dependencies::
pip install -r requirements-testing.txt
* Run it::
python runtests.py run
You can also use::
python runtests.py --help
to see other options supported.
Each unit-tests files (located under ``tests/``) can be called
by alone, allowing easier debugging of the tests. For example:
::
python tests/test_pagure_lib.py
.. note:: In order to have coverage information you might have to install
``python-coverage``
::
dnf install python-coverage
or
::
yum install python-coverage
To run the unit-tests, there is also a container available with all the dependencies needed.
Use the following command to run the tests ::
$ ./dev/run-tests-docker.py
This command will build a fedora based container and execute the test suite. You can also
limit the tests to unit-test files or single tests similar to the ``python runtests.py``
options described above. | ESSENTIALAI-STEM |
North Korea could test 'strongest' hydrogen bomb in Pacific Ocean, says country's foreign minister
(CNN)North Korea could test a powerful nuclear weapon over the Pacific Ocean in response to US President Donald Trump's threats of military action, the country's foreign minister has warned. Ri Yong Ho spoke to reporters in New York shortly after North Korean leader Kim Jong Un made an unprecedented televised statement, accusing Trump of being "mentally deranged." The forceful rhetoric from Pyongyang came after Trump threatened to"totally destroy" North Korea in a speech to the UN General Assembly on Tuesday. Trump tweeted Friday that Kim was "obviously a madman" who would be "tested like never before." In a rare direct statement delivered straight to camera, Kim said that Trump would "pay dearly" for the threats, and that North Korea "will consider with seriousness exercising of a corresponding, highest level of hard-line countermeasure in history." "I am now thinking hard about what response he could have expected when he allowed such eccentric words to trip off his tongue," Kim said. "I will surely and definitely tame the mentally deranged US dotard with fire." Kim said Trump's comments were reflective of "mentally deranged behavior." Hours later, Kim's foreign minister told reporters in New York that Pyongyang could launch a nuclear missile test in response. "This could probably mean the strongest hydrogen bomb test over the Pacific Ocean. Regarding which measures to take, I don't really know since it is what Kim Jong Un does," said Ri. Japan's defense minister Itsunori Onodera said the country must ready itself for the sudden escalation in tensions and be prepared for a missile launch. "We cannot deny the possibility it may fly over our country," Onodera said Thursday. Japan has been subject to two North Korean missile test flyovers in recent weeks. In response, Trump said on Twitter: "Kim Jong Un of North Korea, who is obviously a madman who doesn't mind killing or starving his people, will be tested like never before!" First-person first? The phrase "highest level of hard-line countermeasure in history" could be considered an escalation in the choice of language used, said Vipin Narang, a professor of political science at MIT and expert on deterrence and nuclear policy. "This is clearly trying to coerce the US into playing ball," Narang told CNN. In his first address to the United Nations as US President, Trump said that the US was ready to "totally destroy" North Korea if it was forced to defend its allies, a warning seen as unprecedented for a US president delivering an address to the world's leaders and top diplomats. Responding to the speech, Kim said Trump's comments amounted to an insult. "I'd like to advise Trump to exercise prudence in selecting words and to be considerate of whom he speaks to when making a speech in front of the world," Kim said. A handful of North Korea analysts believe Kim's response -- the first time he has ever released a first-person statement -- could show how personally the young leader took Trump's speech. "This is unprecedented, as far as we can tell," Narang said. "It's written by him, it's signed by him ... He was clearly offended by the speech, and what concerns me most is the response he says he is considering." "The message is chilling," Narang said. Asked to respond to Kim's statement, White House press secretary Sarah Sanders told CNN on Thursday night, "Not at this time." North Korea was scheduled to speak at the UN General Assembly Friday night, but dropped off of its planned roster spot. The country could still get a slot at another time. More sanctions The White House, meanwhile, took the another step in its so-called "peaceful pressure" campaign to rein in Pyongyang's nuclear program, expanding sanctions on North Korea and those who do business with the country. Though the majority of North Korea's imports come from China, Treasury Secretary Steve Mnuchin said "This action is directed at everyone" and the steps are "in no way specifically directed at China." The executive order Trump inked just ahead of the lunch enhances Treasury Department authorities to target individuals who provide goods, services or technology to North Korea, Trump said. He said the order would also allow the US to identify new industries -- including textiles, fishing and manufacturing -- as potential targets for future actions. CNN's Kevin Liptak contributed to this report. | NEWS-MULTISOURCE |
Trochus flammulatus
Trochus flammulatus is a species of sea snail, a marine gastropod mollusk in the family Trochidae, the top snails.
Description
The height of the shell attains 40 mm, its diameter 38 mm. The general form of this species is similar to Trochus maculatus. It is thick, solid, and heavy. The upper surface is longitudinally flammulated with dark red, the stripes distinct and broad, about as wide as the intervening whitish spaces. The stripes of the body whorl are continued over the obtuse periphery upon the base, where they become narrower, often bifurcate, and are zigzag. The sculpture above is like that of Trochus maculatus, the rows of granules about five or six on each whorl and the lower ones compressed and narrow. There is, besides, a fine, superficial, secondary sculpture of slightly oblique longitudinal minute wrinkles, which are continued over the periphery upon the base, forming there a finely shagreened pattern by the intersection of fine incremental stride. The base of the shell is rather more convex than in the typical Trochus maculatus, and its outer portion is nearly free from spiral line. These number about six. They are finely, closely crenulated by the wrinkles of the surface. The outer lip of the aperture is not crenulated, the other characters of the aperture and columella are precisely as in Trochus incrassatus.
Distribution
This species occurs in the Indian Ocean off the Mascarenes, Aldabra and Chagos. | WIKI |
Einleitung
Accessing and removing the power supply unit is relatively straightforward, and will require a 2mm Hex screwdriver.
Ersatzteile
Lift the lever to unlock the case.
• Lift the lever to unlock the case.
Kommentar hinzufügen
Remove the side panel of the Mac Pro.
• Remove the side panel of the Mac Pro.
• Discharge any static electricity by touching a grounded surface prior to working on any internal components.
Kommentar hinzufügen
• The optical drive must be removed to access the power supply unit
• Firmly grasp the handles of the shown compartment and pull out firmly to remove the optical drive bay.
Kommentar hinzufügen
• Firmly hold each of the two connectors and pull them out of their respective sockets.
Kommentar hinzufügen
• Remove the 4 marked 6-32 hex screws with a 2mm Phillips hex screwdriver.
• There are a number of Phillips head screws underneath. These don't need to be removed to remove the power supply.
Kommentar hinzufügen
• Be careful when pulling the power supply out, as it has several attached cables which don't have much slack.
• Grip the handle on the left side of the power supply casing while gripping the right side of the power supply casing and pull upwards firmly to to take it out.
This is not correct for the Mac Pro (Early 2008), a.k.a. MacPro3,1
In the MacPro3,1, the power supply screws are 2.5mm hex, not T-10.
Also, there is a cover plate behind the superdrive that has to be removed (2 phillips screws) to expose the power cable connections and those connectors must be detached before the power supply can be removed.
Bernard - Antwort
ty for this.
angelxmoreno -
My Mac Pro (Early 2008) had the cover plate over the connectors, but the 4 screws were 2.0mm hex rather than 2.5mm hex. Seems they didn't standardize on a single size.
Thomas Emmerich - Antwort
my mac pro 4,1 (early 2009) also had the cover plate behind the superdrive. had to disconnect cable before pulling out psu.
Tino - Antwort
• For the Mac Pro (Early 2008/9), a.k.a. MacPro3,1 In the MacPro3,1, the power supply screws are 2.5mm hex, not T-10. Also, there is a cover plate behind the superdrive that has to be removed (2 phillips screws) to expose the power cable connections and those connectors must be detached and slid under fan before the power supply can be removed.
Absolutly right.i've tried that and it works.I'm satisfied
multirecord - Antwort
• Locate the four marked cables
• Push down on the clip that is above each cable connector while firmly grasping each connector and pull each one back to remove each clip.
Kommentar hinzufügen
Abschluss
To reassemble your device, follow these instructions in reverse order.
41 weitere Nutzer haben diese Anleitung absolviert.
Eric Kuhta
Mitglied seit 12.10.2014
705 Reputation
1 Anleitung geschrieben
Team
Cal Poly, Team 6-24, Maness Fall 2014 Mitglied von Cal Poly, Team 6-24, Maness Fall 2014
CPSU-MANESS-F14S6G24
4 Mitglieder
6 Anleitungen geschrieben
15 min power on after off
Manish Kumar - Antwort
Hi
Very difficult to find the exact size of the bit for the screwdriver. And it is very tight to unscrew one of the screws.
Maybe I had spoiled the head of the screw.
What is the solution?
Thank you in advance.
Michel
Michel - Antwort
missing a very crucial step before step 6. if you don't remove the cover (where cd rom is) and unplug the PSU cable, you'll damage something.
for screws, 2.5mm didn't work for me, but i used a 3/32 hex with ball end, and at an angle, it will loosen screws.
Tino - Antwort
Doesn't work for a micron. Step 6 is impossible. Can't get the power supply out of its place more than a few centimeters. The side closest to the backplate of the casing can't come up only some millimeters, while also the fixed!! power cord is a serious obstruction.
Moreover there are nowhere cover plates left, so this is not a comparable situation as described in step 7.
Hugo Walg - Antwort
My last remark should be forgotten. The power cord has been connected to the Mac pro to give the impression that it's mounted fixedly to the power supply. But if you pull with very much force (an attempt of despair), it then again appears to be a 3-hole connector like is the case for common computers. If you don't know these systems, this is very treacherous.
Hugo Walg - Antwort
But now for something completely different:
Is there somebody who can tell, how you get the power supply out of its case? I removed 9 screws (these are accessible from the outside) but the power supply doesn't come out of its frame. It remains hidden into the aluminum case, and nothing can be examined.
Hugo Walg - Antwort
You are awesome. The instructions were so clear that I would post the difficulty as low to moderate. I took out the power supply, wrote down the info, ordered another, cleaned fans, power supply unit, interior, etc. , replaced the original power supply, and it runs quietly and better than ever. I now have a back-up, and have a clean machine and some dust bunnies I am fostering. Any interest to adopt the dust bunnies please contact www.bunnydust.de. That's a dumb joke and not an endorsement
MrBuxley
Neal Walker - Antwort
Hoi fixed in aprox 35 minutes works perfect
Henry Keijzer - Antwort
It was a bit difficult and I have newer mac pro but i did it. Rejoice. Anybody still having problem let me know and I’ll tell how in better detail.
Doug Boyne - Antwort
The screws are thee worst part. Really awkward. I’ll come back later sometime to check if any in distress.
Doug Boyne - Antwort
Mine is Generation 5.something. I would say it is easier than this one, now that I have done it. But 20 to 25 minutes yea sure if you are an Apple genius but to Joe in the street it is rocket science.
Doug Boyne - Antwort
Awesome Dude, you are! Thank you very much!
Michael Reibel - Antwort
Where can i get a MacPro 1.1 power supply in good working condition to replace my unit? APPLE PART NUMBER IS: 614-0383
riquivelarde - Antwort
Hi Eric, Thanks for posting this. Im looking at replacing my early 2008 macpro power supply due to random restart issues. I’ve been told that the screws require torx not hex, and I see some folks saying that 2.5 mm hex didn’t work. If you or anyone else can clarify I’d really appreciate it.
Thanks -
Joe Hall - Antwort
Kommentar hinzufügen
Statistik anzeigen:
Letzte 24 Stunden: 28
Letzte 7 Tage: 242
Letzte 30 Tage: 1,043
Insgesamt: 42,864 | ESSENTIALAI-STEM |
dereongpayne
PEA can be really a food component . Animal cell types synthesize and metabolized PEA and also present in plants. It exerts a profusion of physiological functions associated with cellular and metabolic homeostasis. Palmitoylethanolamide was identified because a therapeutic substance using properties from the 50s of the previous century. Because 1970, the anti bacterial and other immune-modulating houses of Palmitoylethanolamide have demonstrated an ability in a lot of placebo-controlled trials on flu and common cold. Visit this page for effective information right now.
Exploration on Palmitoylethanolamide (PEA) was ran since its discovery and more than 350 papers are describing role and its physiological properties since endogenous modulator as well as its own medicinal and therapeutic effects. PEA can be a intriguing anti inflammatory therapeutic substance and could also hold great promise for its procedure of a variety of (vehicle )immune disorders, like inflammatory bowel disease and inflammatory diseases of the CNS. We will examine the part of Palmitoylethanolamide (PEA) as treatment for the typical cold and flu as an representative. The principal objective will be to highlight and talk about those most early findings, for example the 6 blind research workers within these indications published within the past century. Even though not quite abandoned, those findings might offer new insights or maybe even alternative options from the lighting of their intense debate around the efficacy and safety of the oseltamivir and zanamivir From the present paper, we are going to go over the growth of comprehension regarding the anti aging actions of Palmitoylethanolamide (PEA) and its own effects from the treatment of respiratory ailments.
Can Be Palmitoylethanolamide (PEA) Definitely Fully Secure?
There have been no stories of tolerance buildup, which is quite rare and crucial. Most drugs, and notably the people applied to relieve chronic pain, possess this tolerance buildup. This means that the body gets used to the substance, and also you ought to simply take increasingly more of it to achieve the same outcomes. Following a while grows however it's still true that you undergo ache.
A side from not really doing their job well, there is another issue that comes using the tolerance buildup. All painkillers include side consequences that are acute. A lot of them are intended to be utilized to treat ache.
When patients who are currently experiencing pain that is serious require pain killers for quite a long time, the medial side effects become a bad daily regular. When tolerance accumulation kicks in, it increases the levels of painkillers, which subsequently escalates the seriousness of side results and often ends in problems.
Absence of tolerance build-up with Palmitoylethanolamide usually means that its advantages do not diminish over time. In fact, the longer you take it, the more the much more effective it becomes. And that unwanted effects-free!
This brings us. There have been no reviews of interactions that are negative. This indicates is that you can go on it with no the problems alongside your normal therapy. Aside from improving unwanted side ramifications, it also makes it possible for you to lower.
This is common with painkillers. Many patients take Palmitoylethanolamide alongside pain killers, once the quantity of Palmitoylethanolamide builds in the body, they start minimizing the number of pain killers. | ESSENTIALAI-STEM |
Tooth Decay Prevention Tips
Posted on: February 16, 2019
Let's admit it — no one wants to have tooth decay. Cavities can be uncomfortable, costly and can even create further dental issues. These issues include gum disease and abscesses, which can be complicated to treat.
Tips to prevent tooth decay
Fortunately, there are ways to care for your teeth. The following are essential tooth decay prevention tips:
Brush your teeth using fluoride toothpaste
This may already be apparent, but brushing is the most effective way to keep your teeth and gums healthy. Preferably, get a toothbrush with soft to medium bristle and a small round head that can reach into the hard to access areas. Brush at least twice daily, especially after meals to clean food debris and bacteria.
Fluoride toothpaste is preferable because fluoride is a naturally occurring mineral that helps to fortify the teeth and protect against decay.
Use dental rinses and floss daily
Mouthwash and dental flossers can help to eliminate debris and bacteria in crevices that are inaccessible with brushing. If possible, use dental rinses when brushing and floss every day before going to bed.
Go for regular dental checkups
Many people go a long time without visiting their dentist because they think all is well with their teeth. The fact is that periodic visits to the dentist will help ensure that potential issues are detected before they worsen into complicated and expensive problems. When you go for the dental checkup, the dentist will perform in-depth cleaning with special tools.
Consult your dentist about dental sealants
Dental sealants are plastic coverings applied to the surfaces of the back teeth to shield them from decay. They protect the grooves that are more prone to bacteria and tougher to clean. Doing so gives you a smoother surface that is easier and simpler to brush. With proper maintenance, dental sealants can last up to 10 years.
Drink plenty of water
You may already know this, but water is highly beneficial for the health of your body and teeth. Most cities have now fluoridated their water supply, which is crucial for strengthening the teeth. Water will also help clean your mouth of bacteria, keep your mouth healthy and hydrated.
Consume oral-friendly diets
Some meals are beneficial for your oral health. Food such as cheese, vegetables, unsweetened coffee and tea and fresh fruits contain certain qualities that are helpful for the smile.
Quit smoking
Everyone knows smoking is unhealthy for your health, but it is also damaging to your teeth and gums. Smoking stains the teeth quickly and causes gum disease, bad breath, dental decay, tooth loss, infections and cancer. The gum is particularly threatened because smoking shortens oxygen supply to the bloodstream and makes healing harder for infected gums.
Avoid sugary and acidic drinks
Sugar is a bad idea for teeth. Candy, sweeteners, fizzy drinks, alcohol, fruit juices, cakes, tinned fruit and processed foods have loads of sugars that are unhealthy for the body and teeth. Consider reducing your intake of refined sugar to reduce cavities and try to brush your teeth soon after if you do.
Chew sugar-free gums
Chewing sugar-free gum promotes the production of saliva. Saliva helps to clean the mouth of bacteria and food particles after meals. Such gums also give you a nice breath.
In conclusion
Following these tips is the best way to optimize tooth decay prevention, but some problems cannot be avoided. Sometimes we get problems that require the assistance of a dental professional. Fortunately, frequent visits to the dentist will spot these problems early.
Request an appointment here: https://www.palmbeachdentistry.com or call Palm Beach Dentistry at (561) 225-2057 for an appointment in our Delray Beach office.
Check out what others are saying about our services on Yelp: Read our Yelp reviews.
Related Posts
December 12, 2019
4 General Dentistry Services for Busy Adults
Getting the proper general dentistry services is important for everyone, no matter how busy. However, seeing a general dentist will help ensure that you can get all the dentistry services you need in one place. …
December 12, 2019
General Dentistry Question: Is There a Sleep Apnea Treatment Other Than a CPAP Machine?
For millions of Americans who suffer from obstructive sleep apnea (OSA) and struggle using their CPAP machine, your general dentistry office has a solution.But first, let us review exactly what sleep apnea is and why …
November 20, 2019
How Invisalign® Works
Invisalign® is a relatively new system of teeth straightening that has gained popularity in recent years. In the past, the only option for those with crooked teeth, overbites and underbites was using traditional braces to …
November 20, 2019
Can Metal-Free Fillings Be Used on Back Teeth?
Metal-free fillings have long been the restoration option of choice for front teeth. You have a cavity on one of your back teeth, though, and you want to know if you can still use composite … | ESSENTIALAI-STEM |
6 Little McGhees
6 Little McGhees is an American reality television series that debuted on December 15, 2012, on the Oprah Winfrey Network (OWN) that is based on the popular 1960s song "Seven Little Girl's (Sitting in the Backseat, Kissing and Hugging with Freddie McGhee)
On June 8, 2016, the show returned on UP under the new title Growing Up McGhee airing on Wednesdays at 9 pm.
Premise
The series follows the day-to-day lives of Mia and Rozonno McGhee, along with their household, as they balance life between their six children, marriage and a family business. The McGhees own and operate a carpet and upholstery cleaning business in their hometown of Columbus, Ohio. The couple, who met while in high school, both come from deprived backgrounds; they both suffered emotional abuse and physical neglect. Rozonno grew up without any contact from his father and with a drug-addicted mother. When Mia was a teenager, her mother threw her out of the family home, forcing the girl to drop out of school to support herself. The McGhees were married for 10 years and suffered several failed pregnancies before they were able to become parents.
Parents
* Mia McGhee born November 19th 1980 (age 41)
* Rozonno (Ro) McGhee Sr.-born July 6th 1979 (age 42)
Sextuplets (oldest to youngest)
Sextuplets born June 9th 2010 (age 13)
* Rozonno Junior (RoRo)
* Issac (Happy Feet)
* Josiah "Joey" (Joe Joe)
* Madison (Maddie)
* Elijah (Eli)
* Olivia "Liv" (Livvy)
Family and friends
* Charmayne aka Cilky Smooth, Rozonno's mother
* Frank, Rozonno's brother
* Cierra, Mia's niece
* Sonia, Mia's mother
* Tania, Mia's sister
* Cian, Mia's niece
* Yasmin, Mia's niece
* Antonsae aka Boogie, Kids' helper aunt
* Amy, Volunteer Helper
* Cieara, Mia's Friend
* Luke, Manager | WIKI |
A.E. Equal Positive Measurable Functions have Equal Integrals
From ProofWiki
Jump to navigation Jump to search
Theorem
Let $\struct {X, \Sigma, \mu}$ be a measure space.
Let $f, g: X \to \overline \R_{\ge 0}$ be positive $\mu$-measurable functions.
Suppose that $f = g$ almost everywhere.
Then:
$\displaystyle \int f \rd \mu = \int g \rd \mu$
Corollary
Let $f: X \to \overline \R$ be a $\mu$-integrable function, and $g: X \to \overline \R$ be measurable.
Suppose that $f = g$ almost everywhere.
Then $g$ is also $\mu$-integrable, and:
$\displaystyle \int f \rd \mu = \int g \rd \mu$
Proof
Let $N$ be the set defined by:
$N = \set {x \in X: \map f x \ne \map g x}$
By hypothesis, $N$ is a $\mu$-null set.
If $N = \O$, then $f = g$, trivially implying the result.
If $N \ne \O$, then by Set with Relative Complement forms Partition:
$X = N \cup \paren {X \setminus N}$
Now:
\(\ds \int f \rd \mu\) \(=\) \(\ds \int f \chi_X \rd \mu\) Characteristic Function of Universe
\(\ds \) \(=\) \(\ds \int f \chi_{N \cup \paren {X \setminus N} } \rd \mu\)
\(\ds \) \(=\) \(\ds \int \map f {\chi_N + \chi_{X \setminus N} } \rd \mu\) Characteristic Function of Union
\(\ds \) \(=\) \(\ds \int f \chi_N \rd \mu + \int f \chi_{X \setminus N} \rd \mu\) Integral of Integrable Function is Additive
\(\ds \) \(=\) \(\ds 0 + \int f \chi_{X \setminus N} \rd \mu\) Integral of Integrable Function over Null Set
\(\ds \) \(=\) \(\ds \int g \chi_{X \setminus N} \rd \mu\) Definition of $N$
\(\ds \) \(=\) \(\ds \int g \chi_N \rd \mu + \int g \chi_{X \setminus N} \rd \mu\) Integral of Integrable Function over Null Set
\(\ds \) \(=\) \(\ds \int \map g {\chi_N + \chi_{X \setminus N} } \rd \mu\) Integral of Integrable Function is Additive
\(\ds \) \(=\) \(\ds \int g \chi_X \rd \mu\) Characteristic Function of Union
\(\ds \) \(=\) \(\ds \int g \rd \mu\) Characteristic Function of Universe
which establishes the result.
$\blacksquare$
Sources | ESSENTIALAI-STEM |
Page:Historical Lectures and Addresses.djvu/106
their own spiritual good; their object was to win souls by preaching, and the mode in which they were to do it was by imitating the Apostles. So it was that they took to themselves the names of Fratres Minores, because they were subject to all in loving service. The first friars did not live entirely in cities or in any fixed place; they were in constant movement, remaining only a short time in one place lest they should gain possessions. Their life varied between going forth at times to preach, and, at other times, living in retirement in cells and caves.
But as their numbers increased, it became impossible for them to remain unorganised. The growing numbers by degrees altered the nature of the community and widened its scope, and it became clear that some steps must be taken towards organisation. In 1212 Francis projected a mission to unbelievers, intending first to go to Morocco, but this was put off. In 1219, he planned a mission to all Italy, Spain, France and Hungary. In this way the body of brethren unconsciously became a body of mission preachers, and there came in consequence a greater need of recognition by the Pope. If they were to go forth and preach throughout Christendom, it was necessary that they should have some kind of introduction. Accordingly a bull was published in 1219 which commended them to all Christendom as "Catholic-minded and faithful men," and the Pope bade the French clergy receive them as good Catholics, who had laid aside the pleasures of the world to sow the Word of God.
Early in 1220 Francis had an opportunity of | WIKI |
Should You Be Taking Bladderwrack For A Healthy Metabolism?
Your metabolism controls how the body uses calories to produce the energy that keeps the body running seamlessly. It is also what controls your breathing and digestion, and it plays a key role in the absorption of nutrients. Therefore, it should be obvious why it’s so important to maintain a healthy metabolism.
You can maintain a healthy metabolism by staying active and eating right. Including the right supplements in your diet can be helpful as well. One supplement that is known for supporting a healthy metabolism is bladderwrack. The name may sound a bit unusual, but read on to find out why you will want to make this strange sounding algae a part of your daily routine.
Bladderwrack is a type of brown algae (a type of seaweed) typically found along coastal regions of the United States and Europe. It has been used as a fuel and food source around the world for years. It is known to be rich in iodine, supporting thyroid health as well as providing several other potential health benefits.
Because bladderwrack supports thyroid health, it is extremely beneficial to metabolism. The thyroid gland is a vital part of the body located at the front of the neck. It secretes hormones which stimulate the metabolic system, breathing, body temperature and heart rate. An overactive thyroid can result in fatigue and abnormal weight loss, while an underactive bladder can cause sluggishness and an inability to lose weight.
One of the most critical nutrients for the thyroid is iodine. Iodine is sadly lacking in many Western diets, but including the bladderwrack as part of your daily routine may help to boost your iodine intake for the support of a healthy thyroid and metabolism.
But a healthy metabolism isn’t the only reason you will want to include bladderwrack in your diet. It also provides the following potential benefits:
• Promotes a healthy hormonal balance
• Supports a healthy internal response
• Supports healthy mineral levels
• Supports liver health
• Boosts the immune system
• Supports joint and cartilage health
• Supports digestion
Bladderwrack can be taken in supplemental form and can also be purchased as a powder that can be used to season stews, soups, smoothies, salads and more.
Your metabolism is responsible for so many bodily functions. Keep it healthy by exercising regularly, eating right and making sure bladderwrack is a part of your daily routine. Then look forward to enjoying the improved quality of life the supplement will provide. | ESSENTIALAI-STEM |
United States aid to Pakistan
United States has been providing military aid and economic assistance to Pakistan for various purposes since 1948.
History
From 1947 to 1958, under civilian leadership, the United States provided Pakistan with modest economic aid and limited military assistance. During this period, Pakistan became a member of the South East Asian Treaty Organization (SEATO) and the Central Treaty Organization (CENTO), after a Mutual Defence Assistance Agreement signed in May 1954, which facilitated increased levels of both economic and military aid from the U.S.
In 1958, Ayub Khan led Pakistan's first military coup, becoming Chief Martial Law Administrator (CMLA) and later President until 1969. During his tenure, the U.S. delivered substantial economic and military aid, despite Pakistan's governance by military regime, and amidst events like the Indo-Pakistani war of 1965.
Yahya Khan succeeded Ayub in 1969, holding power during the Indo-Pakistani war of 1971 which led to the secession of East Pakistan and the formation of Bangladesh. Under Yahya, the U.S. provided adequate economic but minimal military aid.
Civilian governance of Zulfikar Ali Bhutto resumed from 1971 to 1977, during which the U.S. offered modest economic support and withheld military aid as Pakistan finalized its constitution, establishing a parliamentary democracy.
Following another military coup in 1977, Muhammad Zia-ul-Haq led the country. In April 1979, President Jimmy Carter halted all aid, excluding food assistance, due to Pakistan's efforts to establish a uranium enrichment facility, following Symington Amendment. Initial U.S. aid was limited, increasing significantly after geopolitical shifts such as the Soviet invasion of Afghanistan in 1979 and the fall of the Shah of Iran. U.S. sanctions imposed in April 1979 due to Pakistan's nuclear activities were lifted by the end of the year in light of these events.
Between 1988 and 1999, under civilian and democratic governments, U.S. aid was low, particularly after the Soviet withdrawal from Afghanistan in 1989. The aid was suspended in the 1990s under President George H. W. Bush, who cited concerns over Pakistan's developing nuclear program. Relations between the two countries deteriorated as the U.S. implemented the Pressler Amendment. This amendment led to severe sanctions against Pakistan, exacerbating economic challenges for the country's nascent civilian government. Consequently, all forms of bilateral aid from the U.S. to Pakistan were halted. The once expansive operations of the U.S. Agency for International Development (USAID) in Pakistan, which had employed over 1,000 staff across the country, were dramatically reduced almost overnight. Further complications arose from U.S. sanctions following Pakistan's nuclear tests in 1998, which were conducted in response to similar tests by India.
The return of military rule under Pervez Musharraf from 1999 to 2008 initially saw little U.S. economic or military aid. However, following the September 11, 2001 attacks, all U.S. sanctions were removed, and Pakistan, having aligned with the U.S. in the War on Terror, received substantial increases in both economic and military assistance.
On June 16, 2009, the U.S. Senate Foreign Relations Committee passed the Enhanced Partnership with Pakistan Act of 2009, commonly referred to as the Kerry-Lugar Bill. The bipartisan act authorized an annual provision of $1.5 billion in U.S. aid to Pakistan, aimed at fostering enhanced bilateral relations.
In 2011, the Obama administration suspended more than one-third of all military assistance, totaling approximately $800 million due to Osama bin Laden-related controversy. This reduction encompassed funds designated for military hardware and reimbursements for specific Pakistani security expenses, including $300 million allocated for counterinsurgency efforts.
In August 2017, the Trump administration informed Congress that it was placing $255 million in military assistance to Pakistan into an escrow account. Access to these funds by Islamabad would be contingent upon Pakistan taking stronger action against terror networks within its borders that were conducting attacks in neighboring Afghanistan.
Military aid
In the 1950s and 1960s, the U.S. provided Pakistan with development assistance complemented by military support, including armaments and training. This assistance was suspended in 1965 but resumed following the Soviet invasion of Afghanistan in 1979. During this period, Pakistan became a frontline ally, facilitating support to the mujahideen combating the Soviet forces. Substantial amounts of aid were directed through Pakistan, though reports indicate that portions of these funds were diverted by elements within Pakistan's military.
The Pakistani military indirectly received U.S. aid during the Afghan war, with official funds designated for refugee rehabilitation and infrastructure development. This infrastructure was intended to improve logistical access to Afghanistan and arguably served as compensation for Pakistan's participation in the conflict.
After aligning with the U.S. in the War on Terror in 2001, Pakistan was encouraged to enhance its counterterrorism operations. The Coalition Support Fund (CSF) was established to cover the additional costs incurred by Pakistan above regular military expenditures. About 60 percent of U.S. financial aid to Pakistan during this period was allocated through the CSF.
During the 2000s, the Bush administration requested substantial funds from Congress to reimburse Pakistan and other nations for their logistical and operational support in U.S.-led counterterrorism efforts. According to former Secretary of Defense Robert Gates, CSF payments supported numerous Pakistani military operations and helped maintain a large number of Pakistani troops, also compensating for the coalition's use of Pakistani military infrastructure.
In 2009, the U.S. introduced the Pakistan Counter-Insurgency Fund (PCF) and Pakistan Counter-Insurgency Capability Fund (PCCF), aimed at supporting Pakistan's efforts to combat internal insurgencies, such as the military operation in Swat. These funds were designed with objectives similar to the CSF but focused more on addressing insurgency within Pakistan.
Criticism
U.S. aid to Pakistan has been characterized by a pattern of higher allocations during periods of military rule and reduced or negligible support during democratic governance. The aid has often aligned with U.S. strategic interests, which have historically favored relationships with military regimes for geopolitical advantages. | WIKI |
Skip to content
+
Build your first app
Learn the fundamentals of building with Toolpad Studio by creating a small application.
This guide will walk you through the process of creating a small Toolpad Studio application. You'll use the MUI X Data Grid component to display a list of dog breeds from the Dog API. When you click on the name of a breed, a random photo of the breed will be displayed using the Material UI Image component.
Purpose
This guide is intended to introduce you to the fundamentals of building with Toolpad Studio. By the end, you should be able to:
• set up a new Toolpad Studio app
• navigate through your workspace
• design a page and connect its data
Prerequisites
Make sure to install Node.js on your system.
Building your first application
Create a new app
1. Create a new application
npx create-toolpad-app@latest dog-app
2. Start the development server
cd dog-app
npm run dev
The Toolpad Studio application editor opens automatically in your browser.
Assemble the UI
1. Hover over the component library and drag a Data Grid component into the canvas. Now repeat the process and drag an Image component as well. When you're done, the canvas should look like this:
Toolpad Studio editor
The Toolpad Studio editor with components dragged
Fetch data
1. Locate the + (create new) button in the queries explorer. Press it and choose REST API.
Choose REST API
The Add query menu
1. We'll be using the dog API for this tutorial. Set
https://dog.ceo/api/breeds/list/all
as the URL. Click the Run button to inspect the result of this request, and expand the message object in the response. If all went well, it will look like this:
Fetch URL
The dog API response
1. To transform the response according to our needs, we choose the Transform tab and enable the Transform response option. Write the JavaScript expression:
return Object.entries(data.message);
in the editor. Click Run again to verify the result.
Transform response
The dog API response transformed
1. Click on Save to save the query, and then rename it to dogQuery by double clicking on it in the explorer.
Bind data to UI
1. Next, we will bind this data to components on the page. Click the Data Grid component to select it.
2. Find the rows property in the inspector. Notice that there's a small Bind button to its right. Properties with this button next to them can be bound to state available on the page:
Bind data
The bindable rows property
1. Click the button to open the binding editor. On the left you'll see a list of all bindable state in the page and on the right there's a code editor that accepts any JavaScript expression.
2. Use the dogQuery available in the scope as a binding expression.
dogQuery.data;
save the binding and close the binding editor.
dogQuery.data
The binding editor
1. If all went well, the Data Grid will now display the data from our query:
Connected data
The data grid with bound data
Make the app interactive
1. Now, we can make this app interactive by displaying a random image of the selected breed. We'll create another query which reacts to the selection inside the Data Grid component.
2. Create another query of the REST API type and add a breed parameter in the Parameters section on the right:
Breed parameter
Editing imageQuery
1. Click on the Bind button next to the breed parameter value, and add the following JavaScript expression in the binding editor:
dataGrid.selection?.[0] ?? 'akita'
This will use the selected value from the Data Grid, and default to the "akita" breed when no row has been selected.
Breed binding
Binding breed to the selected value
1. Then bind the query URL to the following JavaScript expression:
`https://dog.ceo/api/breed/${parameters.breed}/images/random`
URL binding
Binding the URL to a JavaScript expression
1. Save the binding and close the binding editor. Save the query and exit the query editor.
2. Rename the query to imageQuery by double clicking on it in the queries explorer.
3. In the canvas select the Image component to view its properties in the inspector. Click on the Bind button next to the src prop to open the binding editor, and bind it to imageQuery.data.message.
Bind image src to Java
Binding the Image src to the query response
1. Try selecting different rows in the data grid to see the image update to a random image of the selected breed.
Image changes based on selection
The image changing based on the selected row
Preview the app
1. Click on the Preview button to see a preview of what your app will look like when deployed:
Preview of app
The preview of our application
1. That's it! Feel free to browse through the rest of the documentation to know more about what you can do with Toolpad Studio. | ESSENTIALAI-STEM |
MK Ranjitsinh Jhala
Dr. MK Ranjitsinh Jhala (born 19 February 1939) is an author and authority on wildlife and nature conservation from India.
He comes from the royal family of Wankaner in Saurashtra.
He served also as Chairman of the Wildlife Trust of India (WTI); Dir-Gen CAPART; Dir. and Regional Co-ordinator WWF Tiger Conservation Programme (TCP). Regional Adviser in Nature Conservation (Asia & Pacific) for UNEP. Trustee The Corbett Foundation, member National Forest Commission, Indian Institute of Forest Management Society, International Tropical Timber Organization, Madhya Pradesh State Wildlife Board until 2006
He joined Indian Administrative Services in 1961 and served in various important posts like Secretary for Forests & Tourism in Madha Pradesh 1970-1973, Director Wildlife Preservation 1973-1975. He is author of several books on Indian wildlife and conservation like - "The Indian Blackbuck" (1989), "Indian Wildlife" (1995), "Beyond the Tiger: Portraits of Asian Wildlife" (1997) and others
His most noted works are drafting of Wildlife (Protection) Act, 1972 of India and demarcating many forest as wildlife sanctuaries. Further, reintroduction of the cheetah in India as a policy was implemented upon advisory papers submitted by MK Ranjitsinh Jhala and Divyabhanusinh Chavda. They presented their papers after through research on how to go about bringing cheetahs back to India.
He was awarded lifetime achievement award in 2014 for his works in conservation of wildlife. | WIKI |
Can Novel Technology Security Protocols Allow Secure Remote Manufacturing?
by | Apr 2, 2020 | All Articles, Blockchain, Technology, Track & Trace
Can Novel Technology Security Protocols Allow Secure Remote Manufacturing?
by | Apr 2, 2020 | All Articles, Blockchain, Technology, Track & Trace
The decade of 2020–2030 will see new approaches to manufacturing and logistics of industrial parts. Along with them, enhanced counterfeiting potential will emerge, and that deserves appropriate security measures to curb them right from the start.
In 2017, a New York patient received a locally 3D printed sternum and rib cage implant, which was produced by the Commonwealth Scientific and Industrial Research Organisation (“CSIRO”) in Australia. Source: ZDNet.
manufacturing of 3D sternumTo remind you what’s the sternum is— see above.
Yes, technology has advanced a lot, and printing of 3D objects has by far grown beyond producing little showcase objects. I’m sure you remember the small colorful objects which used to be printed to proudly convince us that printers are no more limited to 2D.
manufacturing of 3D printed face maskThere are already home-printable face masks available for download from sites like https://grabcad.com/library/cotton-pad-face-mask-1.
Actually, numerous sites exist to cater for sharing of STL 3D model files amongst the community of enthusiasts. To name some, this would be Grabcad.comTurbosquid.comArtec3D.comCults3D.comFree3D.comHum3D.com, and many others. Some of these model files are paid and come with certain licenses. For your information, we’re dealing with a standardized file format called “.STL” (STereoLithography, or Standard Tessellation Language) format. STL files are generally compatible with the software handling 3D model files, as well as with the majority of 3D printers.
Back to industrial applications — Manufacturers of machinery parts are starting to consider not only to use 3D Printing locally to drive rapid prototyping but are seriously looking into manufacturing remotely. That means, on-site (on-customers’-site!) manufacturing can become a reality, suchlike the aforementioned case of the medical implant produced near the operation theatre.
Recently, we hear the term “additive manufacturing” more often, which, according to GE, is “yet another technological advancement made possible by the transition from analog to digital processes”. GE goes on “Additive manufacturing uses data computer-aided-design (CAD) software or 3D object scanners to direct hardware to deposit material, layer upon layer, in precise geometric shapes. As its name implies, additive manufacturing adds material to create an object. By contrast, when you create an object by traditional means, it is often necessary to remove material through milling, machining, carving, shaping or other means.
manufacturing of CAD 3D model.CAD model for 3D printing.
Now, when we add digital delivery via online means to the additive manufacturing 3D printing system — we can remove the traditional at-factory QC (Quality Check), wrapping, shipping, and transportation to the installation location from the supply-chain equation. This is fascinating but needs special consideration of the dangers it brings along.
“The convergence of the Internet, digitized music and media players has had dramatic consequences for music copyright. 3D printing technology may have similar implications for artistic copyright, design right, trademarks, and patents, but in a rather more diverse legal framework.”
― Bradshaw, et al., (2010), “The intellectual property implications of low-cost 3D printing,” scriptEd, 7(1), 5–31.
I think you see the problem. When a manufacturer shifts the production outside his controlled premises when they send files to “print” to their customers — how can they ensure that the customer
• prints the item only as many times as the manufacturer allows him to (per-item billing/subscription billing)?
• doesn’t reverse engineer, amend?
• doesn’t copy and distribute further, perhaps even collects payment for it?
• uses certified/permitted materials in their printer?
The Atlantic Council, a U.S. based organization aiming to shape solutions to global challenges noted implications of 3D printing for counterfeiting & anticounterfeiting. Their 2011 (not the youngest!) Strategic Foresight Report titled “Could 3D Printing Change the World?” touches on this, and I highly recommend the read.
Let me touch on possible paths of mitigation. This is not an exhaustive list of solutions. It is mere food for thought to instigate solution-finding for the obstacle of counterfeit re-printing and theft of intellectual property when remote 3D print manufacturing.
1. Maintain ownership and control of the remote additive manufacturing
2. Permit the use of non-controlled remote additive manufacturing
2. a. Upgrade the printer with special technology and modified driver
2. b. Install a mini-computer at the manufacturing site, which controls the printing system
1.Maintain ownership and control of the remote additive manufacturing
When the branded manufacturer company owns the remote printing equipment, operates staff at the location and ideally, controls the premises. In essence, the job to secure the remote production from leakages becomes more simple.
Material input and output has to be monitored, the printer’s counter (like a car mileage odometer) can be tapped into. The remote manufacturing location can be connected to the HQ via secure data links, for example, OpenVPN or WireGuard. An optional CCTV system can be used.
For the purpose of this document, I will focus on path two more.
2.Non-controlled remote additive manufacturing
This path describes the use-case where the printing equipment is not under full control of the brand owner.
A proposed solution approach for controlled remote additive manufacturing in a non-controlled environmentA proposed solution approach for controlled remote additive manufacturing in a non-controlled environment.
We assume the manufacturer to operate a blockchain-powered cloud solution (containing various digital services), which caters for the accounting of unique objects and their lifecycle. Such life cycles shall be designed to start with the “creation” upon order placement or payment. The accounting can comprise allocation of ownership and further features.
Variant A) We use a unique, internet-enabled printer driver software
The remote workstation, in the vicinity of the printing system, is equipped with a specific uniquely digitally signed printer driver. The printer is upgraded with a hardware security module (HSM), which can identify the device unmistakably because it holds its own cryptographic module and private key.
Print jobs for defined orders are packaged by the brand owner using Public Key Infrastructure (PKI) asymmetric encryption, whereby the STL file goes along with proprietary instructions for the driver regarding the unique objects and their ID. The package is encrypted for the specific printer driver (using its public key) and the printer’s HSM/firmware. Hence, other printer drivers (other workstations) and other printers would not be able to open (decrypt) the package. In situations where no HSM is used, the UUID (universally unique ID) or S/N (serial number) of the printer can be set as a cryptographic salt into the cypher equation, and the printer driver can inquire and verify that S/N whenever the printer is connected.
When a print job is an input into the workstation (using the individually signed instruction package), the workstation’s printer driver must “call home” — meaning, connect to the API (Application Programming Interface) listener at the brand’s cloud service, and will verify whether that particular object ID is permitted to print. Before, during, and after a print job, the workstation connects and updates the status, which gets stored in the tamperproof blockchain-powered object-accounting database. Every object has its own record with updates regarding its life cycle indisputably stored.
The worker at the remote location cannot conduct prints (production) of licensable objects without the printer driver software connecting to the brand’s API listener, asking for print permission, then decrypting and leaving a trace in the blockchain database.
The exact working model of the connection and the possibly multi-layer encapsulated encryption is to be further experimented with. I can imagine a nonce to be issued to the printer driver by the Cloud service solution, and only then can the STL file be decrypted for further processing. Such nonce could be issued conditionally, only if there’s an allowance to print.
Variant B) Use of a dedicated, controlled, remote mini print server
In this version, we channel the printing process through a dedicated print server mini-computer, which the brand has control over. It might even belong to the brand. This computer is configured to be used with a specified printer only. The configuration or changes of it can be done remotely via SSH (Secure Shell, a cryptographic network protocol for operating network services securely over an unsecured network) or even a remote-accessible GUI (Graphical User Interface). You can imagine a Raspberry Pi or a similar mini-computer to handle the authorized printing. A secure enclosure is used, perhaps a Zymbit. The mini-computer has to be internet-connected as it will connect to the cloud solution and its blockchain API listener. The above-described mini-computer fulfills various functions, one of them is verifying the serial no. of the printer connected to it. Another one is to receive the (for its own specific key) encrypted print job package via the internet line. And of course, various cryptographic functions, one of them the decryption and verification of the print job to be authorized for exactly the detected printer. And importantly, the mini-computer will connect to the cloud service to notify on events like “print job authorized, printing started, printing in progress, print job completed, etc.”. In case there is no connection to the cloud service, the mini-computer would not be able to function, resulting in no print.
The workstation, where print jobs can be “requested” or inserted, would submit them for verification and processing to the cloud platform, which then handles the necessary authentication logic and communicates with the mini-computer to initiate a print job. In the variant B, the workstation is not connected to the printer. If one connected it directly, the printing of our licensable items could not proceed, because the print job needs to be cryptographically processed by both the cloud platform and the mini-computer.
All events pertaining to the life of an individual object are saved in the append-only secure database system, the blockchain.
Blockchains like the ones LuxTag is using (especially NEM and SYMBOL) have particularly useful feature sets to account for genuinely unique blockchain accounts with a full set of information that can be stored in them. They incorporate an API-driven architecture that allows them to connect to other parts of web-applications easily. Noteworthy, it is part of blockchains’ nature that only authorized parties can interact with the accounts, and every update transaction is well logged in that account itself. As such, the integrity of the data is pertained with records on the who and when did what to which object.
As the first 3D printed liver transplant is expected to happen within only four years to come, let’s give additive manufacturing and its potential the attention it deserves.
Do you have feedback or ideas on security models for additive manufacturing, using technologies like Blockchain, IoT, and other innovative technology? Let me know. We at LuxTag are eager to research, explore, and develop solutions that will power the Fourth Industrial Revolution.
Further reading: Copyright and Related Issues: Copyright and 3D Printing (University of the Witwatersrand, South Africa)
02/Apr/2020
Rene Bernard
LuxTag Sdn.Bhd. (Malaysia), Director & Co-Founder
About LuxTag:
LuxTag is an Anti-Counterfeit, Business Insights, and Customer Engagement solution provider, utilizing the blockchain platforms NEM and SYMBOL (previously known as NEM CATAPULT). Luxtag uses a combination of public, private, and hybrid chain services to run its blockchain operations. The service evolves around digitized certificates of authenticity for tangible products, linking these to brands and owners through multi-signature smart contracts and IoT (Internet of Things) elements. Additionally, LuxTag technology provides business intelligence through innovative means of enhanced customer engagement.
Related Post
Be part of the movement
Automate & manage your certificates seamlessly!
• Reduces 70% of your certificates production costs
• Saves up to 90% of your employee’s time
• Ensure security with no third party involved | ESSENTIALAI-STEM |
Tomas Leffew Tomas Leffew - 9 months ago 44
PHP Question
How would I make a fake signature with behat
Picture of tested code / Picture of working signature Hello I am using behat with the selenium driver integrated with mink and I am trying to write a test that inputs a fake signature. We use the mouse to draw the signature on the screen so I want to be able to have selenium do that for me. I tried grabbing the Id of the field and using dragTo('another element on my page'), but it only clicks inside the signature box and doesnt do anything else.
The framework I am using is laravel for php.
$field = $this->getSession()->getPage()->findById('ctlSignature);
$field->dragTo('another id on my page');
This does not work.
If I can tell the mouse to click then move 10 pixels to the right then click again that would be perfect as I can use that to draw a signature.
Thank you for the response but when I run this code I get a error,
$script = "var c = document.querySelector('#ctlSignature'); var ctx = c.getContext('2d'); ctx.moveTo(20,20); ctx.lineTo(50,50); ctx.stroke()";
$this->getSession()->evaluateScript($script);
Sends a error back Unexpected token var. If i try to use inside the string it sends another error saying unexpected token
Answer
The solution would be to use a javascript that you can execute with evaluateScript or executeScript.
$this->getSession()->evaluateScript($script);
The $script variable is a string that could contain a script like:
var c = document.querySelector("canvas");
var ctx = c.getContext("2d");
ctx.moveTo(20,20);
ctx.lineTo(50,50);
ctx.stroke();
If needed you can change the values of the draw by using variables.
Tested in the browser so it works, what you need to make sure is to switch to the iframe that contains the canvas, if any.
Please see bellow step with same script but slightly changed to write text:
/**
* @Then /^signature test$/
*/
public function signatureTest(){
$script = 'var c = document.querySelector("canvas"); var ctx = c.getContext("2d"); ctx.fillStyle = "black"; ctx.font = "20px Georgia"; ctx.fillText("automation user",10,90);';
$this->getSession()->executeScript($script);
}
Make sure the selector used will select the canvas element type.
Second version, try mousedown event trigger.
/**
* @Then /^signature test$/
*/
public function signatureTest(){
$function = <<<JS
(function(){
var c = document.querySelector("canvas");
event = document.createEvent('MouseEvent');
event.initEvent('mousedown', true, true);
var ctx = c.getContext("2d");
ctx.fillStyle = "black";
ctx.font = "20px Georgia";
ctx.fillText("automation user",10,90);
c.dispatchEvent(event);
})()
JS;
$this->getSession()->executeScript($function);
} | ESSENTIALAI-STEM |
Category:Waste management journals
This category includes scientific journals related to waste management, waste treatment, recycling and related fields.
(Journals related to many types of waste/ waste processing are potentially included; see List of waste types.) | WIKI |
Page:United States Statutes at Large Volume 23.djvu/574
546 FORTY-EIGHTH CONGRESS. Sess. I. CHS. 174, 175, 183-180. 1884. the name of Mary Ullery, mother of Daniel Ullery, who was drowned while in the United States service as amember of Company D, Twelfth Ohio Volunteer Infantry. Approved, July 3, 1884. July 3, 1884. CHAP. 175.-An act for the relief of John Kane. Be it enacted by the Senate and House of Representatives of the United John Kms States of America in Congress assembled, That the Secretary of the_I11- Pennion. terior be, and is hereby, authorized and directed to place on the pensionroll of the United States the name of John Kane, late a private III Company A, Eleventh Regiment Iowa Volunteer Infantry, subject to the limitations and provisions of the pension laws; such pension to commence from and after the passage of this act. Approved, July 3, 1884. July 4, 1884- CHAP. 183.-An act granting a pension to Mrs. Mary C. Jones. Be it enacted by the Senate and House of Representatives of the United Mary C- Jones- States of America in Congress assembled, That the Secretary of the In- P°“°‘°“· terior be, and he is hereby, authorized and directed to place on the pension-roll the name of Mrs. Mary C. Jones, widow of Doctor Thomas M. Jones. late surgeon of the One hundred and thirtieth Regiment Indiana Volunteers, subject to the provisions and limitations of the pension laws. This act to take effect from and after its passage. Approved, July 4, 1884. July 4, ]3$4_ CHAP. 184.-An act to increase the pension of Joseph B. Sellers. Be it enacted by the Senate and House of Representatives of the United Joseph B. Sel- States of America in Congress assembled, That the Secretary of the In 1*1;* f terior be. and is hereby, authorized and directed to increase the pension s,0:?’°”° ° P°“' of Joseph B Sellers, who now holds pension-certiiicate numbered thirty- four thousand two hundred and seventyfive, to thirty-six dollars per month, to take eifect from and after the passage of this act. Approved, July 4, 1884. July 4, 1884. CHAP. 185.-An act granting a pension to Joseph T. Caldwell. Be it enacted by the Senate and House of Representatives of the United Jvwph T- Caid- States of America in Congress assembled, That the Secretary of the "‘;;·us,0n Interior be, and he is hereby, authorized and directed to place on the - ` pension·roll the name of Joseph T. Caldwell, late of Company G, Sixty- ninth Regiment Enrolled Missouri Militia, subject to the provisions and ‘ limitations of the pension laws, and pay him a pension from and after the passage of this act. Approved, July 4, 1884. July 4, 1884. CHAP. 186.-Au act granting a pension to William Reinhardt. W p A Be it enacted by the Senate and House of Representatives of the United haVil¤ll¤¤m Rem- States of America in Congress assembled, That the- Secretary Interior be, Feksiou and he is hereby, authorized and directed to place on the pension·roll, ' subject to the provisions and limitations of the pension laws, the name | WIKI |
Page:English Fairy Tales.djvu/34
8 She oped the window, and that come right in on the ledge. That was grinning from ear to ear, and Oo! that's tail was twirling round so fast.
"What's my name?" that says, as that gave her the skeins.
"Is that Solomon?" she says, pretending to be afeard.
"Noo, 't ain't," that says, and that came further into the room.
"Well, is that Zebedee?" says she again.
"Noo, 't ain't," says the impet. And then that laughed and twirled that 's tail till you couldn't hardly see it. | WIKI |
lp://qastaging/~network-manager/network-manager-applet/ubuntu.raring
Created by Mathieu Trudel-Lapierre and last modified
Get this branch:
bzr branch lp://qastaging/~network-manager/network-manager-applet/ubuntu.raring
Members of Network-manager can upload to this branch. Log in for directions.
Branch merges
Related bugs
Related blueprints
Branch information
Owner:
Network-manager
Project:
Network Manager Applet
Status:
Development
Recent revisions
418. By Mathieu Trudel-Lapierre
releasing version 0.9.8.0-1ubuntu2
417. By Mathieu Trudel-Lapierre
debian/control: add docbook-to-man to Build-Depends, missing in the
previous upload.
416. By Mathieu Trudel-Lapierre
releasing version 0.9.8.0-1ubuntu1
415. By Mathieu Trudel-Lapierre
* Merge with Debian; remaining changes:
- Don't keep a postinst script; we don't need to worry about migration
from versions prior to 0.9.0.
- Build-Depend on dh-translations, libappindicator3-dev.
- Different Descriptions for libnm-gtk packages.
- Ship network-manager-gnome-dbg.
- debian/rules: ship extra icons, use --enable-indicators, export
translations for Launchpad, provide -dbg package and fail if any files
are missing from .install files, or not being installed.
- debian/rules: Rules for daily build in PPA...
- 12-force-online.patch: don't use this patch, we deal with the online
state a different way...
- lp289466_always_show_tray_icon.patch: always show the tray icon, even
if NM is not running.
- lp328572-dxteam-connect-text.patch,
lp330571_dxteam_wired_connect_text.patch,
lp330608_dxteam_gsm_connect_text.patch: update notification text to be
prettier.
- lp341684_device_sensitive_disconnect_notify.patch: show correct
notification messages for disconnect events, to be in line with the other
*connect*text patches.
- lp460144_correctly_update_notification.patch: cleaner notification
messages, and allow for messages to be updated instead of cleared.
- applet-wifi-menu-before-vpn.patch: show Create New and Connect to Hidden
wifi menu items with the other Wifi items, rather than separated by
the VPN menus.
- clear-notification-actions.patch: clear notification actions before
adding new ones, to not append extra "Don't show this again" buttons.
- key-certificate-extensions.patch: allow for the extra certificate file
extension ".key".
- lp829673_gconf_hide_applet.patch: allow for a gsettings key that disables
ever showing the applet on the notification area.
- nm-applet-use-indicator.patch: patch to support showing nm-applet as an
appindicator in Unity.
- position_dialogs_to_center_of_the_screen.patch: position dialogs to the
center of the screen.
- make_menu_items_insensitive_based_on_permissions.patch,
hide_policy_items_env_var.patch: provide a method to desensitize or hide
menu items which are useless given the current policykit policy level of
the user.
- applet_adhoc_use_wpa_rsn_part1.patch: enable Ad-Hoc using WPA RSN.
- lp1048516_dont_req_keyring_in_greeter.patch: don't try to load the
keyring if the user has no permissions to edit their own connections.
- lp1048520_delay_pin_dialog_in_greeter.patch: only ask for PIN entry when
a connection is being established rather than when a modem is detected.
- rebuild_menu_after_init.patch: force a rebuild of the menu to avoid it
staying empty on login.
* debian/rules: simulate the behavior of autogen.sh for dh_autoreconf; since
autogen.sh isn't being shipped by upstream in release tarballs.
* debian/patches/*: refresh patches.
* lp328572-dxteam-connect-text.patch,
lp330571_dxteam_wired_connect_text.patch,
lp330608_dxteam_gsm_connect_text.patch,
lp341684_device_sensitive_disconnect_notify.patch: update notification text
to match the specs on https://wiki.ubuntu.com/Networking.
* New upstream release.
* Refresh 11-user-connections.patch.
* Bump minimum required version of network-manager to (>= 0.9.8).
* Install man pages provided by upstream instead of our own.
* Enable gobject introspection support for libnm-gtk. The typelib files are
shipped in a separate binary package named gir1.2-nmgtk-1.0.
414. By Mathieu Trudel-Lapierre
* debian/control: make libnm-gtk-dev depend on gir1.2-nmgtk-1.0
* debian/rules: run dh_girepository
413. By Mathieu Trudel-Lapierre
releasing version 0.9.7.995+git201301311844.0376019-0ubuntu2
412. By Mathieu Trudel-Lapierre
debian/control: add libgirepository1.0-dev.
411. By Mathieu Trudel-Lapierre
* debian/control: add gir1.2-nmgtk-1.0 package.
* debian/gir1.2-nmgtk-1.0.install: install the necessary introspection
data.
* debian/rules: run dh_install with --fail-missing.
* debian/network-manager-gnome.install: add /usr/share/locale and
/usr/share/GConf which are unexplicably missing from the package to be
installed.
* debian/rules: move find command to get rid of .la/.a files to before
dh_install, update to use -delete rather than piping file names to rm.
410. By Mathieu Trudel-Lapierre
releasing version 0.9.7.995+git201301311844.0376019-0ubuntu1
409. By Mathieu Trudel-Lapierre
debian/control: bump network-manager Depends and Build-Depends to the
appropriate snapshot version.
Branch metadata
Branch format:
Branch format 7
Repository format:
Bazaar repository format 2a (needs bzr 1.16 or later)
Stacked on:
lp://qastaging/network-manager-applet
This branch contains Public information
Everyone can see this information.
Subscribers | ESSENTIALAI-STEM |
拆分 PDF 的关键函数是 PDDocInsertPages。
void PDDocInsertPages(PDDoc doc, ASInt32 mergeAfterThisPage, PDDoc doc2, ASInt32
startPage, ASInt32 numPages, ASUns16 insertFlags, ProgressMonitor progMon, void *
progMonClientData, CancelProc cancelProc, void *cancelProcClientData);
这个函数可以将一个 PDF 中的某几页插入到另一个 PDF 中。如果另一个 PDF 是个新建的空 PDF,那就实现了拆分 PDF 的目的。
示例主要代码:
#include <iostream>
#include "Wrapper.h"
#include "APDFLib.h"
using namespace std;
int main()
{
APDFLib lib;
if (lib.hasError())
{
lib.printError();
return -1;
}
DURING
const wchar_t* filename = LR"(d:\Temp\test.pdf)";
WPDDoc doc(filename);
int count = doc.GetNumPages();
for (int i = 0; i < count; ++i)
{
WPDDoc page;
page.InsertPages(PDLastPage, doc, i, 1, PDInsertThreads);
wchar_t buffer[256] = { 0 };
wsprintf(buffer, LR"(d:\Temp\aa\split_%d.pdf)", i + 1);
PDSaveFlags saveFlags = PDSaveFull;
page.Save(saveFlags, WASText(buffer));
}
HANDLER
ASErrorCode errCode = ERRORCODE;
char errStr[256] = { 0 };
cerr << "Error: " << ASGetErrorString(errCode, errStr, 256) << endl;
END_HANDLER
return 0;
}
相关代码 Wrapper.h
#include <PDCalls.h>
#include <ASCalls.h>
#include <ASExtraCalls.h>
#include <DLExtrasCalls.h>
#include <PDFLExpT.h>
#include <PDFLCalls.h>
class WASText
{
public:
WASText(const wchar_t* text)
: m_text(nullptr)
{
m_text = ASTextFromUnicode((ASUTF16Val*)text, kUTF16HostEndian);
}
~WASText()
{
if (m_text)
{
ASTextDestroy(m_text);
}
}
operator ASText() const
{
return m_text;
}
private:
ASText m_text;
};
class WASPathName
{
public:
WASPathName(const WASText& text)
: m_path(nullptr)
{
m_path = ASFileSysCreatePathFromDIPathText(nullptr, text, nullptr);
}
~WASPathName()
{
if (m_path)
{
ASFileSysReleasePath(nullptr, m_path);
}
}
operator ASPathName() const
{
return m_path;
}
private:
ASPathName m_path;
};
class WPDDoc
{
public:
WPDDoc()
: m_doc(nullptr)
{
m_doc = PDDocCreate();
}
WPDDoc(const wchar_t* filename)
: WPDDoc(WASPathName(filename))
{
}
WPDDoc(const WASPathName& filename)
: m_doc(nullptr)
{
m_doc = PDDocOpen(filename, nullptr, nullptr, false);
}
~WPDDoc()
{
if (m_doc)
{
PDDocClose(m_doc);
}
}
operator PDDoc() const
{
return m_doc;
}
size_t GetNumPages() const
{
return PDDocGetNumPages(m_doc);
}
void InsertPages(ASInt32 mergeAfterThisPage, WPDDoc doc2, ASInt32 startPage, ASInt32 numPages, ASUns16 insertFlags = PDInsertAll,
ProgressMonitor progMon = nullptr, void* progMonClientData = nullptr, CancelProc cancelProc = nullptr, void* cancelProcClientData = nullptr)
{
PDDocAcquire(doc2);
PDDocInsertPages(m_doc, mergeAfterThisPage, doc2, startPage, numPages, insertFlags, progMon, progMonClientData,
cancelProc, cancelProcClientData);
}
void Save(
PDSaveFlags saveFlags, WASPathName newPath, ASFileSys fileSys = nullptr, ProgressMonitor progMon = nullptr, void* progMonClientData = nullptr)
{
PDDocSave(m_doc, saveFlags, newPath, fileSys, progMon, progMonClientData);
}
private:
PDDoc m_doc;
};
APDFLib 参考官方例子。
Adobe PDF Library SDK 兼容性还是不太好,遇到有 PDF 出现“Unrecognized object name.”错误,无法拆分,但用福昕的 SDK 是可以拆的。
另外,如果 PDF 内有权限限制,不可以编辑, Adobe 的 SDK 会出现“This operation is not permitted.”错误,用福昕的 SDK 又是可以拆的;权限问题 Adobe 不给拆可以理解,但是否接受是另外一回事了。
发表评论
您的电子邮箱地址不会被公开。 必填项已用*标注 | ESSENTIALAI-STEM |
Ryan's staff talked to Trump campaign
Donald Trump's campaign reached out Monday to Speaker Paul Ryan's operation to chat. Ryan responded by saying he will reach out to all of the candidates — including Marco Rubio, Ted Cruz, and John Kasich — to discuss the House Republican policy agenda, and how he wants it to fit into the 2016 presidential campaign. It is, in a nutshell, how he sees his role this year. He is staying neutral, and wants to shape the brand of the Republican Party. But he does not want to give preferential treatment to Trump, the brash and controversial GOP frontrunner. Ryan's relationship with Trump is already a bit tortured. Earlier this week, Ryan and Senate Majority Leader Mitch McConnell (R-Ky.) sharply criticized Trump's apparent hesitance to disavow former KKK leader David Duke. In December, Ryan criticized Trump's plan to bar Muslims from entering the United States. Ryan sees himself as the guardian of a Republican brand that many think is being tarnished by Trump, a New York billionaire and reality TV star who has dominated the presidential nominating contest. Trump hasn't been entirely generous when it comes to Ryan, either. During his victory speech in Palm Springs, Florida, Tuesday night, Trump said he didn't know Ryan well, but said he would "get along great with him." "And if I don't," Trump added, "[Ryan's] going to have to pay a big price." For now, Ryan is going to chat with the entire Republican presidential field. "We have heard from the [Trump campaign], but the two have not yet spoken," said Brendan Buck, Ryan's spokesman. "We expect the speaker to be in touch with all the remaining candidates soon to discuss our efforts to build a bold conservative policy agenda for 2017." Hope Hicks, a spokesman for Trump, said she would not discuss a private conversation. On Capitol Hill, Trump's rise has confounded most of the GOP. And his recent broadside toward Ryan elicited a round of head shaking in the House Republican Conference, where Ryan is widely revered. But if Trump ends up in the White House, he will have to work arm in arm with Ryan, who will almost certainly be the leader of the House Republican majority. Ryan's upcoming round of conversations with Trump, Kasich, Rubio and Cruz will be policy focused. He is not endorsing in the contest, but has vowed to support the party's nominee. Ryan is leading a major agenda project aimed at giving his party an identity ahead of the election season, focusing on a five-part plank that includes trying to lift people out of poverty. Ryan discussed his view of what the Republican Party should stand for during a presidential summit in Columbia, South Carolina, in January. Rubio and Kasich attended. Trump — and Cruz — did not attend. | NEWS-MULTISOURCE |
Why AMD's Latest Win Over NVIDIA Should Power Its Stock Higher
Advanced Micro Devices (NASDAQ: AMD) has notched another win: Microsoft (NASDAQ: MSFT) recently announced that its next-generation Xbox gaming console -- due to hit the market late next year -- will be powered by AMD's semi-custom chips. That decision effectively ends NVIDIA's (NASDAQ: NVDA) chances of benefiting from the rising popularity of gaming consoles.
This doesn't come as a surprise. There were rumors that Microsoft was on course to once again choose AMD chips for the Xbox. Sony, meanwhile, had already confirmed that it will be using an eight-core AMD chip based on a 7-nanometer manufacturing process, as well as the company's Navi-based graphics processor, in the next PlayStation.
These two wins will give AMD a nice shot in the arm in the long run, and put it in a great position to take advantage of a shift in gaming hardware preferences -- something NVIDIA now risks missing out on.
Image Source: AMD
A temporary demand surge dissipates
NVIDIA and AMD have made a ton of money for themselves and for investors by selling graphics cards to gamers. But the graphics processing unit (GPU) market isn't as profitable as it once was.
The last major catalyst for GPU sales was cryptocurrency mining. GPUs are built to perform specific types of repetitive tasks like rendering video at a much faster rate than more-flexible CPUs (central processing units), which makes them ideal for mining digital currencies such as bitcoin. Miners intent on reaping the benefits of rising cryptocurrency prices sent the GPU market into short supply. But once the crypto bubble burst, GPU prices came crashing down as demand slumped.
This has hurt the financials of both NVIDIA and AMD in recent quarters, though the latter has fared better thanks to a diversified business that includes CPUs. Looking ahead, it appears probable that the GPU market might not recover, due to the shift in gamers' hardware preferences.
All hands in the cookie jar
Jon Peddie Research estimates that 20 million PC gamers could switch to gaming consoles in the next few years. That shift seems to be underway already: Sales of console games increased 15.2% last year, significantly ahead of the 3.2% growth in PC games, as per Newzoo's estimates.
Sony's PlayStation 4 has sold over 90 million units in its lifetime, while Microsoft has moved more than 40 million Xbox Ones, according to various estimates. Both consoles were launched in November 2013, indicating an annual combined sales rate in the neighborhood of 25 million units.
Of course, the PC market is much bigger: Its annual shipments came in at nearly 260 million units last year. But don't forget that PC sales have been declining for seven years straight now. However, gaming PCs reportedly accounted for just 19% of total PC sales in the first 10 months of 2018, according to German market research firm GfK. But those sales figures would have been inflated by the higher GPU prices that resulted from the crypto-driven shortage.
In 2016 (back before GPU prices were inflated by the crypto craze), gaming and gaming-capable PCs accounted for 14% of total PC sales. So we can get a fair idea of the size of the PC gaming hardware market, and one thing that's clear is that PCs are still the bigger addressable market for the likes of AMD and NVIDIA.
But AMD's advantage is that it is going after both the PC and console gaming markets, while NVIDIA has failed to make much headway in the latter. In fact, Nintendo, which used NVIDIA's Tegra X1 processor in its Switch gaming device, is reportedly considering an AMD chip to power the Switch 2.0.
On the other hand, AMD is already making smart moves to dent NVIDIA's GPU dominance. It has taken a lead on the technology curve by launching a 7-nanometer chip, and it is reportedly going to refresh its entire lineup based on this platform. Word is that NVIDIA's 7nm GPUs will see the light of day in 2020, so AMD has the advantage for now. Therefore, don't be surprised if its financial performance recovers at a faster pace than NVIDIA's.
10 stocks we like better than Advanced Micro Devices
When investing geniuses David and Tom Gardner have a stock tip, it can pay to listen. After all, the newsletter they have run for over a decade, Motley Fool Stock Advisor, has quadrupled the market.*
David and Tom just revealed what they believe are the ten best stocks for investors to buy right now... and Advanced Micro Devices wasn't one of them! That's right -- they think these 10 stocks are even better buys.
See the 10 stocks
*Stock Advisor returns as of March 1, 2019
Teresa Kersten, an employee of LinkedIn, a Microsoft subsidiary, is a member of The Motley Fool's board of directors. Harsh Chauhan has no position in any of the stocks mentioned. The Motley Fool owns shares of and recommends Microsoft and NVIDIA. The Motley Fool recommends Nintendo. The Motley Fool has a disclosure policy.
The views and opinions expressed herein are the views and opinions of the author and do not necessarily reflect those of Nasdaq, Inc. | NEWS-MULTISOURCE |
User:Faberglas/sandbox
Since 1975, WISR has successfully supported the creative, community involved, educational efforts of hundreds of adult learners through its highly personalized, socially progressive and interdisciplinary BS, MS and EdD programs. WISR students and the communities with which they are involved, reflect great geographic, intellectual and cultural diversity. WISR’s extraordinary students and faculty together have created a dynamic and inquiring learning community where multiculturalism matters.
WISR (“Wiser”) is known as a premier academic institute for social change since its inception in 1975. WISR offers individualized BS, MS and Doctoral degree programs for working adults. Areas of study are: Psychology (an MS program that leads to the State’s Marriage and Family Therapy License as well as for those seeking to become a Licensed Professional Clinical Counselor), BS in Community Leadership and Justice (which draws on such areas as Social Sciences, Human Services and Community Development), an MS in Education and Community Leadership, and an EdD (Doctor of Education) in Education and Social Change. Over the years, our interdisciplinary EdD program* in Higher Education and Social Change has been an exceedingly popular program for talented and highly innovative professionals and community leaders. *Since June 1, 2013, WISR has admitted all new doctoral students to an EdD program, while previously enrolled doctoral students are allowed to complete their PhDs. We made the decision to switch the designation of the PhD program to an EdD program to enable us to explore the possibility of seeking national accreditation with an accrediting agency that is approved to accredit professional doctoral degrees.
Distance Learning: WISR offers distance learning to all students, as well as the option to meet with faculty and students on site, in advising sessions, seminars, study groups and conferences. All seminars, study groups and conferences are available to students both on site and from a distance by internet and phone access to video and audio conferences with those on site. To be admitted, students must: 1) demonstrate that they are capable of successfully studying from afar, and 2) have adequate internet and telephone access, to enable them to participate in frequent telephone and/or video conferences. Students who are nearby or visiting the Bay Area are always invited to meet with faculty and other students on site, and to participate in seminars on site (that are also always accessible by phone and video conference over the internet).
At WISR, like at most colleges and universities, students use the attainment of an academic degree to give them added credibility in the pursuit of career advancement. In most academic programs, a student first gets a degree, and then uses that degree to qualify for a particular type of job. At WISR, by contrast, students are assisted and encouraged to pursue career objectives while they are enrolled, and to use their projects at WISR as part of this pursuit.
Indeed, WISR faculty make conscious and concerted efforts to help WISR students to design learning activities (action projects, writings and research) which will build bridges to each student’s desired career path and objectives. For this reason, many WISR alumni believe that it was very significant that WISR gave them the academic, social and emotional support, and impetus, to develop and embark on their own self-defined, and oftentimes, very distinctive, career paths, while they were still in the midst of their studies at WISR. They have often commented on the value they place on the personalized assistance they received from WISR faculty, to not limit their visions by the definitions of existing jobs, and to enable them to construct their studies at WISR in ways that were both visionary and realistic in pursuing the next steps of a personally meaningful life path.
Primary Staff: John Bilorusky, PhD is the President—the Chief Executive and Academic Officer. Vera Labat, MPH, is the Chief Financial Officer, Marilyn Jackson, PhD, is Executive Assistant to the President, Dalia Liang is Administrative Officer, and Mark Wilson is Learning Technologist. | WIKI |
User:Mutazalhawash
Mutaz E. G. Alhawash is a Technical Artist and founder of oigency, he was graduated holding a Computer Graphics and Animation Science BSc. Degree (CGA BSc.) from Princess Sumaya University for Technology (PSUT). | WIKI |
On July 20th, 1877, striking railroad workers in Pittsburgh successfully stopped trains from leaving the freight yard in the Strip District. The sheriff was called upon to clear the tracks by railroad officials, anxious to regain control of their lines. Already, many local police and militia had joined the crowd of friends and neighbors in support of the strike. Knowing that local militiamen would not use force against their own community, the sheriff requested assistance from the Philadelphia militia.
Philadelphia’s troops had just returned home from service in the Reconstruction South. Tired, hungry and missing their families, these men were sent to Pittsburgh to defend the interests of businessmen who were losing money for every hour their trains stood idle. As the crowd showered the troops with insults and stones, the Philadelphia militia opened fire. The massacre ignited a full-scale riot, which left dozens dead and countless wounded.
The Great Strike of 1877 is thought to mark the first use of federal troops to defend a corporation’s “right to run a profitable business.” These action have since set a precedent for state violence against labor movements and legislation that favors the rights of corporations over the safety and well being of working families.
21st Street between Penn Avenue and Spring Way: 40.45147, -79.98292
This historical marker was removed in 2018 by municipal workers when the utility pole it was mounted on was replaced. | FINEWEB-EDU |
Beylik
Beylik is a Turkish word, meaning "the territory under the jurisdiction of a Bey", and may refer to:
* Duchy or principality, typically in the Middle East
* Beylik of Çubukoğulları
* Beylik of Bafra
* Beylik of Hacıemir, an beylik in the north Anatolia in a part of 14th and 15th centuries
* Beylik of Dulkadir, one of the frontier principalities
* Beylik of Erzincan, a principality in East Anatolia, Turkey in the fourteenth and early fifteenth centuries
* Beylik, Karacabey
* Beylik of Tacettin, a small Turkmen principality in Anatolia in the 14th and 15th centuries
* Beylik of Tunis
* Anatolian beyliks
* Beuluk, a member of the Ottoman Sultan's janissary bodyguard
* Bəylik (disambiguation), places in Azerbaijan
* Beylik, administrative units (historic divisions) of Crimean Khanate in Tatar Crimea | WIKI |
Christophe Plantin
Christophe Plantin (Christoffel Plantijn; c. 1520 – 1 July 1589) was a French Renaissance humanist and book printer and publisher who resided and worked in Antwerp. He established in Antwerp one of the most prominent publishing houses of his time, the Plantin Press. It played a significant role in making Antwerp a leading centre of book publishing in Europe. The publishing house was continued by his successors until 1867.
Life
Plantin was born in France, probably in Saint-Avertin, near the city of Tours, Touraine. He was not born to a wealthy family, and his mother died when Plantin was still quite young. As a youth he apprenticed as a bookbinder in Caen, Normandy, and also married there. In 1545, he and his wife, Joanna Rivière, set up shop in Paris, but after three years, they chose to relocate to the booming commercial centre of Antwerp, where Plantin became a free citizen and a member of the Guild of St Luke, the guild responsible for painters, sculptors, engravers and printers. The quality of his work as a bookbinder brought him into contact with nobility and wealth. By 1549, he headed one of the most well-respected publishing houses in Europe. He was responsible for printing a wide range of titles, from Cicero to religious hymnals. While delivering a prestigious commission, he was mistakenly attacked and received an arm wound that prevented him from labouring as a bookbinder and led him to concentrate on typography and printing. By 1555, he had his own print shop and was an accomplished printer. The first book he is known to have printed was La Institutione di una fanciulla nata nobilmente, by Giovanni Michele Bruto, with a French translation. This was soon followed by many other works in French and Latin, which in point of execution rivalled the best printing of his time. The art of engraving then flourished in the Habsburg Netherlands, and Dutch engravers illustrated many of his editions. Antwerp was a dangerous place for publishers around the time. In 1561, the Spanish governor ordered a raid on Plantin's workshop for possibly housing heretical works and being a Protestant sympathizer. To avoid being jailed, Plantin quickly sold all of his works so that nothing would be found in his possession. As soon as things calmed down around him, he bought them all back.
In 1562, while Plantin was absent in Paris, his workmen printed a heretical pamphlet, which resulted in his presses and goods being seized and sold. It seems, however, that he eventually recovered much of the value that was taken from him. With the help of four Antwerp merchants, he was able to re-establish and expand his printing business significantly. Among these friends were two grand-nephews of Daniel Bomberg, who furnished him with the fine Hebrew typefaces of that renowned Venetian printer. The co-venture lasted only until 1567 but enabled Plantin to acquire a house in the Hoogstraat which he named "De Gulden Passer" (The Golden Compasses). This gesture mirrors the commercial success of publishing emblem books, which present collections of images paired with short, often cryptic, text explanations. It is also at this time that Plantin adopted a printer's mark which would appear in various forms on the title pages of all Plantin Press books. The motto Labore et Constantia ("By Labor and Constancy") surrounds the symbol of a pair of compasses held by a hand extending from a bank of clouds and inscribing a circle. The center point of the compasses indicates constancy, the moving point which renders the circle is the labor. Plantin holds the instrument in portraits of him, such as the one commissioned from the Flemish painter Peter Paul Rubens.
In November 1576, the Spaniards plundered and burned Antwerp, which essentially ended its supremacy as the commercial centre and richest city of Europe, and Plantin had to pay an exorbitant ransom to protect his printing works. He established a branch of his firm in Paris. In 1583, the states of Holland sought a typographer for the newly erected university at Leiden. Plantin moved there after he had left his much-reduced business in Antwerp to his sons-in-law Jan Moretus and Frans van Ravelingen (Raphelengius). Plantin left his Leiden office to Raphelengius and returned to Antwerp after it became more settled after its conquest by the prince of Parma in 1585. Plantin laboured in Antwerp until his death.
Printing work
Plantin was a prolific printer and prosperous entrepreneur, publishing more than 40 editions of emblem books. His most important work is considered to be the Biblia Regia (King's Bible), also known as the Plantin Polyglot. Facing increasing pressure and turmoil in the Habsburg Netherlands, Plantin needed to find a patron that would not fall victim to claims of heresy or being a Protestant sympathizer. In spite of clerical opposition, Plantin was encouraged by King Philip II of Spain, who sent him the learned Benito Arias Montano to lead the editorship. The Polyglot Bible has parallel texts in Latin, Greek, Syriac, Aramaic, and Hebrew. This venture for Plantin was very expensive, requiring him to mortgage his own business to pay for the production of this bible, in the hope that there would be a worthwhile payoff in the end. It took thirteen presses and fifty-three men to complete the task. Characters in each of the printed languages were required, with French type designer Claude Garamond providing the steel punches. With Montano's zealous help, the work was finished in four years (1568 - 1572). There were eight volumes in folio format, meaning only two pages could be printed at one time. This work earned Plantin little profit, but resulted in Philip's granting him the privilege of printing all Roman Catholic liturgical books (missals, breviaries, etc.) for the states ruled by Philip, the title "Architypographus Regii," which he dutifully added to the title pages of Plantin Press books, and the unwanted duty of prototypo-graphus regius, obligating him to inspect and verify the skill and dogmatic adherence of other printers.
Besides the Plantin Polyglot, Plantin published many other works of note, such as the "Dictionarium Tetraglotton" of 1562, which was a dictionary in Greek, Latin, French and Flemish, editions of St. Augustine and St. Jerome, the botanical works of Dodonaeus, Clusius and Lobelius, and the description of the Habsburg Netherlands by Guicciardini. His editions of the Bible in Hebrew, Latin and Dutch, his Corpus juris, Latin and Greek classics, and many other works are renowned for their beautiful execution and accuracy. A skillful businessman, by 1575 his printing firm reckoned more than 20 presses and 73 workmen, plus various specialists who did job-work out of their homes. The vast collection of handwritten ledgers and letters of the Officina Plantiniana, as it was known, can be examined online following digitization by the Museum Plantin-Moretus and hosting by World Digital Library.
Though outwardly a faithful member of the Catholic Church, he appears to have used his resources to support several sects of heretics, sometimes known as the Family of Love or Familists. It is now proven that many of their books, published without naming the printer, came from Plantin Press.
Legacy
After Plantin's death, his firm was taken over by his son-in-law, Jan Moretus who ran his shop in Antwerp, and Francis van Ravelinghen who took over his shop in Leiden. Towards the end of the 17th century, the business began to decline. Plantin's works however, were meticulously preserved. Today, the building that housed the firm is called the Plantin-Moretus Museum. Moretus and his descendants continued to print many works of note in officina Plantiniana, but the firm began to decline in the second half of the 17th century. It remained, however, in the possession of the Moretus family, which left everything in the office untouched, and when the city of Antwerp acquired (for 1.2 million francs) the old buildings with all their contents, the authorities created, with little trouble, the Musee Plantin, which opened on 19 August 1877.
In 1968, the Christophe Plantin Prize was created in his memory, given to a Belgian civilian who resides abroad, who has made significant contributions to cultural, artistic or scientific activities.
Family tree
The Plantin-Moretus family tree, including the heads of Officiana Plantiniana, later known as Plantin Press.
Christophe Plantin (1520–1589) married Joanna Riviere; they had five daughters and a son. Christophe's daughters were described as learned in reading and writing, especially Greek and Latin. One teenage daughter is said to have helped proofread the Plantin Polygot.
* Margaretha Plantin married Franciscus Raphelengius, who led the Leiden branch of the house. They stayed printers in Leiden for two more generations of Van Ravelinge, until 1619. A great-granddaughter of the last Van Ravelinge printer married in 1685 Jordaen Luchtmans, founder of what would become later the still existing Brill Publishers.
* Magdalen Plantin, who was reported to have aided her father in proofreading the Biblia Regia in five different languages. It is important to note that “it was said that she could correct the script perfectly accurately, but without understanding a word of it.” Magdalen would later marry her father's Paris agent.
* Martina Plantin, who with her sister, Catherine, helped run the family's silk shop by the age of seventeen. Martina and Catherine were efficient and well known in their silk handlings. Later, Martina married Jan Moretus (Jan or Joannes Moerentorf) (1543–1610) in 1570. They had 10 children. After her husband's death, Martina was the head of the firm until her sons took over running the business.
* Balthasar I Moretus (1574–1641)
* Jan II Moretus (1576–1618) married Maria De Sweert; they had 6 children
* Balthasar II Moretus (1615–1674) married Anna Goos; they had 12 children
* Balthazar III Moretus (1646–1696) married Anna Maria de Neuf; they had 9 children
* Balthazar IV Moretus (1679–1730) married Isabella Jacoba De Mont (or De Brialmont); they had 8 children
* Joannes Jacobus Moretus (1690–1757) married Theresia Mechtildis Schilder; they had 9 children
* Franciscus Joannes Moretus (1717–1768) married Maria Theresia Borrekens, who led the office after Franciscus' death until her death in 1797. They had 13 children
* Jacobus Paulus Josephus Moretus (1756–1808)
* Ludovicus Franciscus Xaverius Moretus (1758–1820)
* Josephus Hyacinthus Moretus (1762–1810) married Maria Henrica Coleta Wellens; they had 8 children
* Albertus Franciscus Hyacinthus Fredericus Moretus (1795–1865)
* Eduardus Josephus Hyacinthus Moretus (1804–1880). He sold the office to the city of Antwerp in 1876, after having printed the last book in 1866.
* Magdalena Plantin married Gilles Beys, who then ran the French branch of the Plantin office. This continued for one more generation under their son, Christophe Beys. | WIKI |
Hi,
In my application, I am creating a string array in a method. Each time I call that method this array will get created and also a null pointer exception is showing when I use the Arrays.sort() method.
My method is like this...
int count = getTotalXMLCount();
envArray = new String[count];
/* code for adding the elements into the array from a file */
Arrays.sort(envArray, String.CASE_INSENSITIVE_ORDER);
for (int i = 0; i < envArray.length; i++)
variableCombo.addItem(envArray[i]);
First calling it works perfectly. But the second calling, it shows the exception
Exception in thread "AWT-EventQueue-0" java.lang.NullPointerException
at java.lang.String$CaseInsensitiveComparator.compare(Unknown Source)
at java.lang.String$CaseInsensitiveComparator.compare(Unknown Source)
at java.util.Arrays.mergeSort(Unknown Source)
In my conclusion it is due the line:
envArray = new String[count];
How can I delete this array during the second time. Can anybody help me in this issue pls...? Its urgent....
THANKS in Advance....
Hi, this is happening because no values have been assigned to the array, and hence it is throwing NullPointerException. Assign individual values to all the elements in the array and try again
Hi, this is happening because no values have been assigned to the array, and hence it is throwing NullPointerException. Assign individual values to all the elements in the array and try again
Ya, Thank you... I found the mistake... | ESSENTIALAI-STEM |
Talk:Bob Shannon (radio personality)
Proposed Name Change
If there is no objection I'd like to move this article from Bob Shannon (WCBS-FM) to Bob Shannon (radio personality). Please express your opinions here. TheGoofyGolfer (talk) 10:03, 24 February 2012 (UTC)
* While I agree that "WCBS-FM" is weird, there is actually another radio personality once known as Bob Shannon. Regards, Orange Suede Sofa (talk) 00:57, 25 February 2012 (UTC)
* Done, if anyone has a problem with this move please discuss it here first, everyone's opinion counts and as far as I am concerned majority rules as long as there is a consenus. TheGoofyGolfer (talk) 02:03, 25 July 2012 (UTC)
Gone from 101.1
I need to note, while I have added the fact that Bob Shannon is gone, that there are no reliable sources to go with it. The two sites that make a mention of this are not reliable sources, and I have been unable to find one. Mitch 32 (There is a destiny that makes us... family.) 20:24, 3 August 2012 (UTC) | WIKI |
moric
Etymology 1
From.
Adjective
* 1) Derived or extracted from (a member of) the genus (the mulberries).
Etymology 2
From. | WIKI |
Talk:Union, Common Sense and Progress
Existence
a prod tag was placed on the article, questioning the existence of the party (and other parties before 1993). I'm highly skeptical of the claim that political parties would not have existed in Andorra prior to 1993, there are plenty of refs on political parties in the country prior to 1993. See for example http://books.google.com/books?id=KhkpAQAAMAAJ p. 80 and http://hemeroteca.lavanguardia.com/preview/1992/04/13/pagina-13/33519070/pdf.html for USiP. --Soman (talk) 20:45, 25 December 2012 (UTC)
* According to Nohlen & Stöver (p155), political parties were illegal in Andorra until 1993. This is repeated by Parties and Elections. However, the newspaper you provided suggests otherwise (the Google book is not viewable).
* I wonder, in light of this, whether we should rewrite the 1992 election article. Then again, I'm not sure how to couch this - perhaps that the parties were unofficial groupings (one source suggested that the Democratic Party was formed in the 1970s and "tolerated"). Number 5 7 22:52, 25 December 2012 (UTC)
* Yes, I think the fact Nohlen & Ströver are referring to was that political parties had no particular legal recognition. But they were not banned in the sense of Francoist Spain. --Soman (talk) 07:45, 28 December 2012 (UTC) | WIKI |
Scott Targett
Scott Targett is a businessman in the province of New Brunswick, Canada. He is also a former politician having served in the Legislative Assembly of New Brunswick from 2003 to 2006.
A Liberal, he served in the shadow cabinet of Shawn Graham critiquing the ministers of natural resources and later human resources. He was also chair of the Liberal caucus from 2003 to 2004.
Born in rural New Brunswick, Targett was educated at the University of New Brunswick. He married Rhonda MacDonald. | WIKI |
Sailor Moon Sailor Stars
Sailor Moon Sailor Stars, or simply Sailor Stars, is the fifth and final season of Sailor Moon, a Japanese magical girl anime series based on the Sailor Moon manga series by Naoko Takeuchi; the season was directed by Takuya Igarashi and produced by Toei Animation. Like the rest of the Sailor Moon series, it follows the adventures of Usagi Tsukino and her fellow Sailor Guardians. The season is divided into two story arcs, with the first 6 episodes consisting of a self-contained arc exclusive to the anime in which the Sailor Guardians encounter Queen Nehelenia again. The remaining 28 episodes adapt material from the "Stars" arc of the manga, in which the Sailor Guardians meet up with the Sailor Starlights, led by Princess Kakyuu. They discover that Sailor Galaxia, the leader of the "Shadow Galactica" organization and a corrupted Sailor Guardian, plans to increase her powers and rule the Milky Way.
The season began broadcasting on TV Asahi on March 9, 1996 and ended on February 8, 1997 for 34 episodes. It was later released on DVD in six compilations with five episodes, by Toei, from September 26 to November 21, 2005. Sailor Stars was not dubbed during the initial English-language dub of Sailor Moon in the early 2000's. In May 2014, Viz Media announced that they licensed the series from the start for an uncut release, and also that they plan to release the fifth season on Blu-ray and DVD after Cloverway Inc. and Optimum Productions lost their licenses to the English-language adaption of Sailor Moon when they decided not to renew it. On December 14, 2015, Viz Media streamed the first episode of Sailor Moon Sailor Stars, along with the series finale of Sailor Moon SuperS, on Hulu in the United States, followed by a streaming release of the entire show on Tubi TV in Canada on July 15, 2016. The first 17 episodes of Sailor Stars were released on Blu-ray and DVD in a dual-language format on June 18, 2019. The rest were released on November 12, 2019.
Three pieces of theme music were used: one opening theme and two ending themes. The opening theme, titled "Sailor Star Song", is performed by Kae Hanazawa. The ending theme, used for the first 33 episodes, is "Kaze mo Sora mo Kitto..." performed by Alisa Mizuki. The second and final ending theme that was used for the final episode is "Moonlight Densetsu", performed by Moon Lips.
Release
Bandai released two video games in 1996 to promote this season: Bishoujo Senshi Sailor Moon Sailor Stars for Sega Pico, and Bishoujo Senshi Sailor Moon Sailor Stars: Fuwa Fuwa Panic 2 for Super Nintendo Entertainment System. | WIKI |
Heroes of the City
Heroes of the City (Stadens Hjältar) is a Swedish computer-animated television series for preschool children, with stories about friendship, sharing and caring. The plots revolve around the emergency vehicles Paulie Police Car and Fiona Fire Engine who tackle a new mission in each episode.
Heroes of the City was created in Sweden in 2009, and is currently broadcast in over 70 countries. Season 1 was written by Swedish screenwriters, Season 2 mainly by American screenwriters.
Season 1 (2012)
* Production: Ruta Ett DVD AB
* Executive producer: Pelle Ferner
* Creative consultant: Lennart Blixt
* Voice recording: Hippeis Media
* Music: Joakim Karlsson
* Soundeffects: Elin Ferner
* Editing: Pelle Ferner
* Actors: Fiona Ash, Jennie Kirk, Joyce Jones, Andrew Pushkin, Lisa Hanam, James Williams, Oscar Teare, Thomas Fuller, Erik Stredwick, Jon Milward, Rachel Redfern and Dave Jolly
* Heroes of the city was created by: Ruta Ett DVD AB
* Director: Pelle Ferner
* Script writer: Elin Ferner
* Storyboard: Carolina Årnäs
* Art director: Mattias Wennerfalk
* Animation
* Executive Producer: Shambhoo Phalke
* Animation Director: Rahul Patil
* Production Manager: Rakesh Tatia
* Production Executive: Sonal Aswale
* Animation Team Lead: Krishnaparasad CT
* Reliance Media Works Ltd
* Ruta ett DVD-PRODUKTION, Your Family Entertainment (credited as yourfamily entertainment)
* © Ruta Ett DVD AB 2012
Season 2 (2014)
* Heroes of the City is created by Ruta Ett DVD AB
* Producer and director: Pelle Ferner
* Art director: Mattias Wennerfalk
* Storyboard, modeling and textures: Mattias Wennerfalk, Carolina Årnäs, Anton Kirkhoff, Andrea Forsgren
* Editing: Pelle Ferner
* Title graphics: Sara Berntsson
* Marketing and sales: Lennart Blixt
* Business developer: Erik Foberg
* Script: Baboon Animation
* Writers: Joe Vitale, Anne D. Bernstein (credited as Anne Bernstein), Mike Setaro, Dave Benjoya, Mike de Seve, Jymn Magon, Karen de Seve, Peter K. Hirsch (credited as Peter Hirsch), Eric Shaw, Elin Ferner
* Story editors: Mike de Seve, Elin Ferner
* Animations: Reliance Media Works Ltd
* Animation director: Rahul Patil
* Animation co-ordinator: Vilas Rane
* Animators: Sagar Kadam, Pankaj Kashid, Roshan Bagul, Gautam Prasad, Amit Sharma, Abhay Bansude
* SFX and rig: Sanjay Kamble, Chirag Parmar, Gyandeep Das
* Voice recording: Audioworks Producers Group
* Voice director: Mike de Seve
* Voice consultant: Kip Kaplan
* Music: Joakim Karlsson
* Sound effects and mixing: Elin Ferner
* Ruta ett DVD-PRODUKTION
* © Ruta Ett DVD AB 2014
* Heroes of the City home page: www.hotc.nu
Characters
* Paulie Police Car - A Police car.
* Fiona Fire Engine - A Fire engine.
* Calamity Crow - A Crow who is the must unluckiest citizen.
* Alice - An Megaphone who reports emergencies. | WIKI |
TechSpot
New WD external drive not being read on XP
Storage
By constantobstacl
Dec 6, 2008
1. LookinAround
LookinAround Ex Tech Spotter Posts: 8,398 +181
But i am curious about the fact you say you see TWO backup listed? One states Dec 12, 2008? The other is in January?? Do you remember having run more then one backup of the old computer? Sounds as if the second one would have probably been an incremental or differential backup which used the Dec 12, 2008 full backup as the the base to compare for incremental or differential changes.
2. LookinAround
LookinAround Ex Tech Spotter Posts: 8,398 +181
btw.....
I can't predict similar results....
But let me point out to some about "another long thread that seems to go nowhere".. that just got fixed!
It took #130 posts and over 2 months but it looks like a sound card driver problem was finally solved and fixed. (and by the way similar (but i can't say identical) still unresolved sound driver problems remain for many, many people posting for solutions on the internet. The thread linked to above might help point them to their solution as well!)
Corollary: Do people really believe everything can be condensed to a 60 minute episode of Law and Order to find, investigate and solve all problems?
3. constantobstacl
constantobstacl TS Rookie Topic Starter Posts: 88
^^ I only did one backup...I assumed the 2nd one was created due to a scheduled task being set, I didnt set any scheduling but it may have been set unintentionally(?)
^ Lol I love your use of that quote hehe :D
Honestly I feel like giving up...I am contemplating whether I should dismantle my HP and put the hard drive in an enclosure, buy a new computer ($), and then load everything on to there...
Not sure if/how I can effectively advise acronis, this has just burned, and bummed, me out :(
4. LookinAround
LookinAround Ex Tech Spotter Posts: 8,398 +181
I feel your frustration! After all the work (including the help from mflynn) it's still a matter of "getting closer but still no cigar”.
Some thoughts on possible “what next”. (Is entirely your call) (i'll call your 1st computer with the hard drive problem Computer A)
Assistance from Acronis
As for getting help from/seeing what Acronis has to say, I’d be happy to draft something you could then just email to them
Fixing the first computer (I'll call computer A)
You might choose to buy a new computer ($$$$) or try just replace computer A's hard drive ($). (i know originally you didn't want to touch it until we'd proven the Acronis backup). Once you've installed the new hard drive you can both
1. Restore the old disk image doing a sector-by-sector copy from the Acronis backup
• (Purely my guess) since the Acronis image backup was itself sector copy of old failing hard drive it probably has some bad blocks on it (which might be the root cause of the mount/explore attempts on new computer to fail)
• Run chkdsk /r on the restored hard drive image so Windows can verify the filesystem and repair any bad block errors
2. Run chkdsk /r on the old hard drive itself
• Put the drive in a USB enclosre or simply get a cable connection
• Then run chkdsk /r on the old drive to see if it might be fixed (to be readable long enough to attempt another bakup.. i wouldn't trust it to actually rely on it for normal use)
Also wrt a new internal hard drive for Computer A
=> If you only need repair functions, you can download and burn an XP Recovery Console image from the internet and burn to CD. Then boot from CD and repair the restored hard drive image from Acronis Backup
=> Of course, you'd still need XP install CD should you want to do a full reinstall of XP on the new hard drive
5. constantobstacl
constantobstacl TS Rookie Topic Starter Posts: 88
This computer (Computer B) is so slow, its so outdated by now you would laugh at the specs lol.
Well awhile ago I tried to look for the Acronis support, I had seen it before but was unable to find it again. Unless they changed the look of their site? But at this point I would no longer have any idea what to say. I cant explain how lost I feel now ugh :(
6. LookinAround
LookinAround Ex Tech Spotter Posts: 8,398 +181
i feel badly for you! so i can guess how badly you must feel yourself!! :(
Over the next couple days i will type something up you can email Acronis and also find their email support link so you can email them. We can wait for their reply and then (or in parallel) I'm thinking
1. Given the hard disk on Computer A was going bad anyway (which is why we tried the Acronis disk image clone in the first place)
=> It's a reasonable guess that disk image clone reflects some corruption that existed on Computer A disk at the time we cloned it
=> Perhaps best to recover the backup image by doing a sector-by-sector copy and restoring the image to a new disk drive
=> Then you run the Windows chkdsk /r command to verify and correct the file system you just restored to the new hard disk
=> Any corruption in the backup image might well explain the reason Acronis couldn't handle that image when we tried to mount and explore it from Computer B
2 That means what you might also try (and this is a hardware purchase so if it doesn't work I'm guessing (please check/verify) your purchase is still returnable/refundable within a certain timeframe, e.g. 30 days)
=> Buy a new internal hard drive for computer A
=> Carefully remove the old drive and replace it on Computer A
=> Boot Computer A using the Acronis Recovery Boot Disk
=> Once booted, you have the Acronis menu to now perform sector-by-sector copy of the backup image over to the new internal disk drive
=> etc. You can run chkdsk /r on the new internal disk and we proceed from there to verify the new drive's filesystem and then try booting up from new drive which has old Windows and your data
=> Depending on corrupted spots is possible: some disk spots containing Windows or your data are damaged. (or if lucky corruption is on unused portions). But we deal with that then as no way to predict before we do a chkdsk and try booting up!
=> Even if Windows is damaged (and we turns out we can't restore windows) we can use a boot cd for access to your data on the hard drive (which now is hopefully accessible after chkdsk fixed filesystem problems and any loss is limited to damaged sectors)
7. LookinAround
LookinAround Ex Tech Spotter Posts: 8,398 +181
Bad news :( and good news :) and more info / next steps you can choose
• Bad news:
I discovered Acronis only provides 30 days of email/chat support with the product :( (Tho access to their knowledge base, documentation, etc. is ongoing)
• Good news:
I've been meaning to upgrade my current Acronis True Image version anyway (to same version as yours ). I did the upgrade earlier today
=> So now we are running matching versions. I should see the exact same screens as you see
=> I now get 30days of support with my upgrade. Am curious to ask Acronis the questions myself! :)
• More info
I speculated in my last post that (at least part) of the problem when Acronis can't mount the backup image might be due to some bad sectors already on the failing hard drive by the time it was copied and the image was created.
I skimmed the thread to refresh my memory on various points and noticed this
Which I think tends to support my prior guess
So, i believe the next steps if you want to try further at backup image data recovery and also fix computer A
1. I understand from Post #26
You have an HP Pavilion, Model a1324n, Prod #: EL464AA -ABA, S/N: MXK5490C3S
2. Replace the hard drive in computer A
=> HP specs for computer A . (Which i believe is a
=> Instructions to replace the hard drive
3. Copy the Acronis disk backup image to the new hard drive
4. Run chkdsk /r so Windows reports (and hopefully fixes) file system errors so data (excluding what might reside on bad sectors) can then be read/used
5. In the event chkdsk can’t repair the file system, there are data and file recovery tools that could be applied as well to recover the data on the new drive
6. If i re-read Post #28 info correctly you have an HP Recovery partition on Drive D called HP Recovery and also have the recovery disks that were created by HP
/* EDIT */
AND I'VE FINALLY FOUND HOW TO FIND/SEE version info for Acronis True Image Home 2009!
(It's one of the dumbest user interface implementations i've ever seen)
=> Open Acronis True Image Home 2009. Click on the window
=> Now hit the ALT key
=> You should see the words File and Help appear towards the top of the window
=> Click Help->About to see version info
Topic Status:
Not open for further replies.
Similar Topics
Add New Comment
TechSpot Members
Login or sign up for free,
it takes about 30 seconds.
You may also...
Get complete access to the TechSpot community. Join thousands of technology enthusiasts that contribute and share knowledge in our forum. Get a private inbox, upload your own photo gallery and more. | ESSENTIALAI-STEM |
After last nights UPCP relative links in site stopped working
tnedator
Member
Oct 20, 2007
23
0
51
Today, we had our website start failing in places were we were redirecting to a page using relative pathing. In the past, we would redirect to a relative path like /us-en and it would basically be going to the same page as mydomain.com/us-en and work just fine. We could go directly to mydomain.com/us-en and it would work just fine. It was only when redirecting in code to the relative path that it would get the extra / and give a 404 error.
This morning, that broke and it took us forever to find out what was happening, and essentially with no code changes in five weeks (this part of the site, possibly not for a year or so), now was redirecting to //us-en which was failing, because Apache was no longer seeing it as a relative path, but instead an absolute path (at least that's our theory).
Does anyone know of a upcp update last night (on release 11.44.1.23) that would have caused this problem to occur?
cPanelMichael
Administrator
Staff member
Apr 11, 2011
47,880
2,268
463
Hello :)
You should not have seen a version change if you are using the 11.44 LTS build for cPanel. I don't believe a cPanel update would have caused this problem, but feel free to open a support ticket using the link in my signature so we can take a closer look. You can post the ticket number here so we can update this thread with the outcome.
Thank you.
| ESSENTIALAI-STEM |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.