Document
stringlengths
87
1.67M
Source
stringclasses
5 values
Kau Kau or KAU may refer to: * Kau (bull), a legendary bull in Meitei mythology * Kau, Hawaii, the southernmost district on the island of Hawaii * Kauhava Airfield, an airport in Kauhava, Finland (IATA airport code KAU) * Kau River, Mizoram, India * Kõue Manor or Kau, in Estonia * Karlstad University * Kenya African Union * Kerala Agricultural University * King Abdulaziz University, Jeddah, Saudi Arabia * Korea Aerospace University, Goyang, South Korea
WIKI
FIX: 0x00000124 BSoD error [Full Guide] Matthew Adams by Matthew Adams Windows & Software Expert Matthew is a freelancer who has produced a variety of articles on various topics related to technology. His main focus is the Windows OS and all the things surrounding it. He is passionate about the... Affiliate Disclosure • The 0x00000124 error is a result of hardware problems and it will restart or shut down your PC. • Fixing this error is quite simple if you install a third-party system restoration tool. • You can also get rid of the 0x00000124 issue if you run the DISM and SFC scans. • Some users also suggested updating your drivers, your OS, and even resetting your Windows as a last resort. fix blue screen 0x00000124 To fix various PC problems, we recommend DriverFix: This software will keep your drivers up and running, thus keeping you safe from common computer errors and hardware failure. Check all your drivers now in 3 easy steps: 1. Download DriverFix (verified download file). 2. Click Start Scan to find all problematic drivers. 3. Click Update Drivers to get new versions and avoid system malfunctionings. • DriverFix has been downloaded by 0 readers this month. The 0x00000124 error is a scary blue screen issue that shuts down or restarts your Windows, causing you to lose any unsaved data. It presents an extended error message that states, The system encountered an uncorrectable hardware error. The error message includes the 0x00000124 code and makes it fairly clear that this is primarily a hardware issue. If your desktop or laptop has displayed the 0x00000124 error message more than once, this is how you can fix the issue. How do I fix STOP 0x00000124 BSoD error on PC? 1. Use a system restoration tool BSoD errors can be hard to trace and they aren’t always easy to solve by yourself, especially when you lack the necessary knowledge. Therefore, we suggest downloading a third-party system restoration tool that will automatically scan your computer for problematic files and fix them for you. Restoro repair Restoro is powered by an online database that features the latest functional system files for Windows 10 PCs, allowing you to easily replace any elements that can cause a BSoD error. This software can also help you by creating a restore point before starting the repairs, enabling you to easily restore the previous version of your system if something goes wrong. This is how you can fix registry errors using Restoro: 1. Download and install Restoro. 2. Launch the application. 3. Wait for the software to identify stability issues and possible corrupted files. 4. Press Start Repair. 5. Restart your PC for all the changes to take effect. As soon as the fixing process is completed, your PC should work without problems, and you will not have to worry about BSoD errors or slow response times ever again. Get Restoro Disclaimer: This program needs to be upgraded from the free version in order to perform some specific actions. 2. Open the Blue Screen troubleshooter 1. Open the Windows Search Bar and enter troubleshoot in the search box. 2. Open Troubleshoot. 3. Select the Blue Screen troubleshooter and press Run the troubleshooter. 4. The troubleshooter will automatically scan. Windows 10 includes numerous troubleshooters that can help you fix software and hardware issues. The Blue Screen troubleshooter is one that might help you fix the 0x00000124 error. 3. Check for Windows updates 1. Firstly, press the Windows Key + S to open the search menu. 2. Search for Settings and press Enter. 3. In the Settings window, select Update & Security. 4. Then, select Windows Update. 5. Lastly, select Check for updates. 6. Let Windows install all of the necessary updates. Windows updates also update drivers and might include hotfixes for blue screen errors. Windows 10 usually automatically updates itself unless you have switched the update service off. However, you can also manually check for updates to see if there are any available. Learn how to do it with this handy article. 4. Update your drivers 1. Press the Windows Key + S. 2. Then, type in Device Manager and press Enter. 3. Select the device you want to update. 4. Right-click on it, then choose Update driver. 5. Repeat for every device. Update drivers automatically Windows automatically updates more essential drivers, but that doesn’t guarantee that none are outmoded. You need software that will automatically scan for outdated drivers and list those in need of an update. Not only that, this lightweight utility can even detect missing drivers, and download the newest compatible version for those as well, making it both a driver updater and a driver fixer. Get DriverFix 5. Scan the system files 1. Press the Windows Key + S. 2. Search Command Prompt and open it as an administrator. 3. Enter the following command and press enter: sfc /scannow 4. Let CMD run the search and restart your PC. Corrupt OS system files might be responsible for the blue screen 0x00000124 errr. The System File Checker is a tool you can utilize in the Command Prompt. The SFC scans for corrupted system files and might also repair any that it detects. This is how you can run an SFC scan. 6. Unplug newly installed hardware The 0x00000124 error message states, check to make sure any new hardware or software is properly installed. Have you installed a new hardware device? If so, double-check that you’ve installed all the required software and updates for the hardware as outlined within its manual. Hardware such as graphics cards can also have specific system requirements. Check that your PC matches the hardware device’s system requirements listed on its box or in the manual. If the hardware is not entirely compatible with your desktop, you should certainly unplug it. So long as you kept its receipt, you can return the device to the vendor and replace it with a compatible alternative. 7. Switch off the C1E Enhanced Halt State setting 1. To open the BIOS, restart Windows and press F2 as it reboots. 2. Then select Advanced Chipset Features and CPU Configurations with the keyboard keys. • You can navigate through the menus with the keyboard’s arrow and Enter keys. 3. Select the C1E Enhanced Halt State setting, and press the Enter key. 4. Now you can select a Disable option to switch the setting off. 5. You can save the changes by pressing F10. 6. Exit the BIOS and restart Windows. The BIOS (Basic Input Output System) is a program outside of Windows that includes extra hardware settings. C1E Enhanced Halt State is a setting included in the BIOS that you can fix 0x00000124 error with. Note: Different motherboard models have different BIOS interfaces, so yours might not be the same as the one we used above as an example. It is best to consult your motherboard’s manual and find the settings. 8. Roll Windows back to a Restore Point 1. Press the Win key + R hotkey to open Run. 2. Enter rstrui.exe in Run’s text box and click OK to open System Restore. 3. Click the Choose a different restore point option to select an alternative date to roll Windows back to. 4. Next, select the Show more restore points option so that you have a full list of restore points to choose from. 5. Select a restore point to roll Windows back to. 6. Press Next > Finish to confirm your selected restore point and restart Windows. If you recently added any kind of new software to Windows just before the blue screen issue occurred, there’s always a chance the software might in some way be responsible for the 0x00000124 error. The 0x00000124 error message also suggests that you remove recently installed software. The System Restore tool will automatically remove apps and drivers added to Windows after a selected date and undo system file and registry changes. Thus, rolling Windows back to a restore point is another potential resolution. If you want to know more about the System Restore tool and how to use it, check out this detailed article. Overall, there are numerous potential resolutions for the STOP 0x00000124 error. Windows repair software might also come in handy for fixing various blue screen issues. We encourage you to leave us any feedback regarding the subject in the comment section below. This article covers:Topics: Frequently Asked Questions • The Windows Stop Code is also known as the Blue Screen of Death. There are many different BSoD errors. If you’ve encountered the 0x00000124 error, take a look at this detailed guide about fixing it. • There are a lot of BSoD errors out there so there is not a general fix for all of them. However, here’s an awesome list containing all the causes and fixes you need. • Yes, the Blue Screen of Death is never good, unless it’s a fake Blue Screen of Death. Learn more about this serious error by reading our detailed article dedicated to it. There are no comments yet. Please leave a comment add a comment Leave a Reply Your email address will not be published. Required fields are marked *
ESSENTIALAI-STEM
Page:Select Essays in Anglo-American Legal History, Volume 1.djvu/700 686 V. BENCH AND BAR one of God*s appropriate blessings upon just men. It is a fulfillment of the Prophet's word that the generation of the righteous is blessed, that their children shall be blessed, and that their seed shall endure forever. Perhaps Fortescue, after the fatal field of Tewkesbury, when he lay a prisoner in the Tower, found consolation in the promise of the Psalm- ist : " The steps of a good man are ordered by the Lord ; though he fall, yet shall he not be utterly cast down, for the Lord sustaineth him with his hand." For once at least the promise came true. Fortescue lived his last years in peace and honor. He saw the bloody tyrant, Richard of Gloucester, on Bosworth field, pay the penalty of his many crimes, and when the great Chief Justice passed away, a Lancastrian king was in undisturbed possession of the throne. IV. The Iron Age of the Common Law: From Henry VII. to the Revolution of 1688 ^ The Yorkist kings had betrayed a tendency to use the courts for the furtherance of tyrannical ends ; but Henry VII., who had been trained in the Lancastrian tradition of the independence of the judiciary, made absolutely no change in the judges after his victory at Bosworth. The avarice of this king was, however, so great that we have an instance of a melancholy practice which became common under the V Stuarts. The king sold to Robert Read, a very good law- much fuller in detail. The State Trials are invaluable for the whole period. Besides these may be named: Fitzherbert's Abridgement, New Natura Brevium and Diversity of Courts, Lynwoode's Provinciale, St. Germain's Doctor and Student, Select Cases from the Court of Requests (Selden Society), Select Cases from the Star Chamber (Selden Society), Reeves' History of English Law, Spedding's Life of Bacon, Anderson's, Dyer's, Popham's and Plowden's Reports, Pollock's I^and Laws, Dug- dale's Origines, Staunforde's Pleas of the Crown, Coke upon Littleton, Coke's Institutes, Coke's Reports with the Introductions, Whitelocke's Memorials, Hale's Introduction to Rolle's Abridgement (in Hargrave's Collecteana Juridica), Saunders' Reports, North's Life of Lord Keeper North, Irving's Life of Jeffreys, Roscoe's Lives of Eminent Lawyers. Hale's Pleas of the Crown and History of the Common Law are not critical. For the historical development of the rules of evidence consult Wigmore on Evidence under the particular rule. * General references for this period : Foss and Campbell now become
WIKI
How Does the Cytoplasm Divide Between Daughter Cells Following Mitosis? ••• Jupiterimages/liquidlibrary/Getty Images Without cell division, there would be no life on Earth. Cell division is necessary for growth, maintenance, homeostasis and both sexual and asexual reproduction. Every species from bacteria to humans creates daughter cells from a mother cell. The most common method of dividing is a process called mitosis. Mitosis duplicates and splits the DNA -- the chromosomes -- within a cell so each daughter gets a full set. To finish the job, there's a final step called cytokinesis. Cytokinesis is completed once the cytoplasm of the cell is being divided between the daughter cells successfully to create two fully formed new cells. Mitosis Although mitosis in different types of organisms shares many characteristics, there are some differences. In this article, we're going to focus on the specifics of animal cell division, although many of these steps are common in other eukaryotes as well. In animals, each cell combines tiny fibers to create a cord called the spindle. The spindle stretches through the middle of the cell, DNA duplicates and condenses into visible chromosomes, then the nuclear membrane begins to fade from view and breaks down. Fibers from the spindle connect to the pairs of chromosomes and pull them to different sides of the cell. That completes the preparation for division. The Cleavage Furrow After the division of the nuclear material is completed and the nuclear membrane begins to fade from view, the cell develops a ring around its center. The ring is a narrow furrow called the cleavage furrow. The direction of the spindle directs the orientation of the cleavage furrow. If you think of the spindle as a long pole, the cleavage furrow is a ring around the center of the pole. This is important, because the cell is like a ball, which means it could split in half along any line through the center. But if the cleavage furrow were oriented along a different axis, the chromosomes might not divide equally between the different halves, which is essential as the cytoplasm of the cell is being divided. The Cytoplasm of the Cell Is Being Divided By the Contractile Ring Imagine you have a round balloon. If you wanted to shape it into separate halves, you'd place your hands around the middle of the balloon and squeeze. Cytokinesis happens the same way, except that there are no hands from the outside to give the cell a squeeze. Instead, an internal ring built of the proteins actin and myosin pulls tight. Actin and myosin are the same proteins that contract your muscles, and the ring they make around the center of the cell is called the contractile ring. The contractile ring shrinks right through the center of the cell, evenly dividing the cytoplasm between the two halves. This indicates that cytokinesis is completed and the cell has been replicated. Meiosis and Gamete Production Cell division for sex cells (aka gametes) proceeds in a different fashion. The overall process of cell division for sex cells is called meiosis. Meiosis has several differences from mitosis -- the biggest being that one mother cell with a full complement of DNA ends up as four daughter cells, each with one half the full complement of DNA. Besides going from diploid to haploid, another big difference between mitosis and meiosis with egg cells in particular is that cytokinesis happens asymmetrically. That is, rather than a cell division producing all same-sized daughter cells that equally share the cytoplasm, each division provides the vast majority of the cytoplasm to what ends up as the egg cell. Once the nuclear membrane begins to fade from view, the DNA is divided, and cytokinesis is completed, the other entities (the non-cell entities) are called polar bodies. These polar bodies don't contain enough cytoplasm (and the organelles/nutrients within it) to survive. References About the Author First published in 1998, Richard Gaughan has contributed to publications such as "Photonics Spectra," "The Scientist" and other magazines. He is the author of "Accidental Genius: The World's Greatest By-Chance Discoveries." Gaughan holds a Bachelor of Science in physics from the University of Chicago. Photo Credits • Jupiterimages/liquidlibrary/Getty Images
ESSENTIALAI-STEM
User:Jthorstensen I am a Professor of Physics and Astronomy at Dartmouth College. My areas of expertise include stars (especially cataclysmic binary stars), astrometry, and spherical astronomy. Some useful astronomical software I have written is linked here and here. I am new at this -- my intention is to help edit articles in which I have some expertise. I expect to contribute only occasionally.
WIKI
Index talk:Rewards and Fairies (Kipling, 1910).djvu Looks like this work has not been worked on for a while. I intend to tweak formatting of poem pages already proofread, and perhaps continue proofreading after that. Londonjackbooks (talk) 00:39, 7 February 2018 (UTC) To Do Needs transclusion: * Rewards and Fairies/The Looking-Glass
WIKI
Fix: Google Nest Wifi dropping or Wifi Not Working The smart audio device Google Nest has been a great accessory to have for everyone around. This device requires an active power connection, a steady network, a Google account, and a compatible mobile device. Even if all the other three requirements fall in place, people often complain about having issues with the WiFi network. Also Read: Google Nest WiFi Keeps Disconnecting | Solution People claim that when they try to connect to Google Nest via the WiFi network, they encounter connectivity issues. Sometimes the WiFi connection would drop, while in some instances, it won’t even connect to the WiFi network in the first place. These are some common issues with Google Nest, and in this article, we will try to solve your problem by suggesting a few solutions. So without any further ado, let’s get into it. Google Nest How to fix Google Nest WiFi dropping or WiFi Not Working? It is difficult to point out the specific possible reason behind someone having connectivity issues with their Google Nest. But we have listed out all the possible solutions, and one of them will help you out. Check cables and connections: Ensure that all the cables are connected securely to all the right ports to ensure a stable connection. • Firstly, make sure the provided Ethernet cable is connected to your modem properly. Also, make sure the connection to the Google Nest device is secure. • Make sure your WiFi router and modem are powered up and ready to go. • Check that your modem is connected to an internet source, such as the cable, DSL, or Fiber connection. Restart your modem, router, and point(s): Restart your modem and WiFi device by turning it off and then on again. • Firstly. Disconnect the power on all the network devices, including the modem and the Google Nest device. • The will be indicator lights on these devices. Make sure that all the lights have stopped blinking. • Once everything is off, connect power to your Modem again. Wait till the modem powers up again completely. This might take a couple of minutes, depending on the modem in use. • After the modem is up and running, provide power to the Google Nest device too. • Once the google nest turns on, make sure all your cables are connected properly and then launch the application you normally use to operate the Google Nest device(Google Home app or Google Wifi app). If you still face issues in maintaining the connection, then try the next solution mentioned below. Check your configuration: Google Nest Wifi and Google Wifi use DHCP, a common internet connection protocol. If your ISP does not provide DHCP support but requires a different protocol like PPPoE or uses Static IPs, you will have to tweak around some WAN settings. To allow internet access to the Nest Wifi router or a primary Wifi point via the modem, you will have to enter PPPoE account name and password. This is can be done by accessing the Google WiFi app’s WAN settings page. If you don’t know what PPPoE is, contact your ISP, and they will provide you with the required login credentials. Again, if you receive a static IP from your ISP, you need to enter your static IP information in the app’s WAN settings. This piece of information is also something you need to gather from your ISP. Finally, if you have recently made any changes to your network configuration, you need to revert those changes. Even after trying all these, if you are still having troubles with your WiFi connection with the Google Nest device, then move on to the next potential solution. Call your internet service provider: If you could connect to your WiFi before and now you are facing issues, then the problem could be with your ISP too. Contact the customer care of your ISP and enquire about any changes made in the network recently. Inform them about your network issue with the Google Nest device and enquire whether there was a connection issue from their side. There might be a service outage situation specifically in your area too. If that is the case, then all you can do is wait till the issue resolves itself. Ask them about any changes regarding the static IP or PPPoE account credentials. Factory reset your WiFi devices: Factory reset your WiFi device. In most cases disconnecting the power cable completely and keeping the device idle for a few minutes does the trick. And then try connecting your Google Nest WiFi to your modem again. Since you have performed a reset, you will have to connect as a new connection again. If even resetting the WiFi device does not do you any good with your WiFi connection, you should directly contact Google’s customer care regarding your connection query. So that is all that you can try to fix the WiFi not working issue on your Google Nest device. If you have any questions or queries about this article, then comment down below, and we will get back to you. Also, be sure to check out our other articles on iPhone tips and tricks, Android tips and tricks, PC tips and tricks, and much more for more useful information. Leave a Reply Your email address will not be published. Required fields are marked * This site uses Akismet to reduce spam. Learn how your comment data is processed.
ESSENTIALAI-STEM
Endotricha admirabilis Endotricha admirabilis is a species of snout moth in the genus Endotricha. It was described by Valentina A. Kirpichnikova in 2003, and is known from China (Henan) and the Russian Far East. The wingspan is 17 - 18 mm.
WIKI
Federal Writers' Project – Life Histories/2020/Summer II/Section 12/Isaac Hathaway Overview Issac Hathaway was a black man born in 1872 who was interviewed by Rhussus L. Perry for the Federal Writer's Project in Kentucky. He was an artist who created sculptors commemorating the work of notable black historical figures. Early Life Isaac Hathaway was born on April 4, 1872, to a black family in Lexington Kentucky. When he was a young boy, his father Reverend Elijah Hathaway brought him to visit an art exhibition located in Cincinnati Ohio. While viewing the various works of art, Hathaway attempted to locate a bust of the notable abolitionist and writer Frederick Douglas. After he was unable to find any art featuring Douglas, Hathaway’s father explained to him that more black artists were needed to portray the great men of their race, because white artists would not create or display their likenesses.This was caused, in part, by the Jim Crow laws that legalized racial segregation in America and severely limited the opportunities available for black artists. This sobering experience inspired Hathaway to learn the art of sculpting so that he could create busts and statues of great black men and display them in populated areas for all people to view. Career Hathaway graduated from the Chandler Normal College which was formally located in Lexington, Kentucky, and later studied art at the New England Conservatory of Music and the Cincinnati Art Academy. After finishing these programs he went on to create busts and statues of notable black figures such as Martin DePores, Booker T. Washington, Richard Allen, and even Frederick Douglas. These works of art received great praise and were featured in various art exhibits across the country. While working on his pieces, Hathaway also taught ceramics and sculpting to students at Georgia State Industrial College, Bishop’s College, and other schools across America. He instructed many black students with the hopes of inspiring them to create art memorializing notable black figures as his father had once inspired him. Personal Life Hathaway had a close relationship with his father, Elijah, and spoke proudly of his many accomplishments. Elijah was born enslaved to Senator Garret Davis of Kentucky. Despite being unable to attend proper schooling, Elijah managed to learn how to read and write, and later escaped from bondage and joined the Union army. Unfortunately, Elijah experienced discrimination as he was treated poorly by his white officers and often mistaken for a servant. This aspect of his father's life also served to inspire Hathaway's artistic talent as he based many of his sculptures on notable black men who served during the civil war. Segregation Segregation is the purposeful separation of different racial or ethnic groups. Slavery, Jim Crow laws, and racist attitudes all contributed to the segregation of white people and people of color in America, which began with the end of reconstruction in 1877. Segregation negatively affected the lives of black Americans by severely limiting their education and career opportunities. Black Americans were forced to attend underfunded and lower-performing schools and were not allowed to attend many colleges. Realtors also refused to sell black people houses in wealthier suburbs and other white-majority areas. They were therefore forced to live in highly segregated cities that suffered from "higher levels of violent and property crime." Another negative aspect of segregation was the art created during this era which depicted black people as unintelligent and animalistic. To combat these derogatory stereotypes, black artists worked to "construct an image of the black person that was different from the one transmitted by racist images." During this period, many black activists and white allies worked to make segregation illegal, however not all of their endeavors succeeded. In 1896, a court case called [https://en.wikipedia.org/wiki/Plessy_v._Ferguson#:~:text=Plessy%20v.%20Ferguson%2C%20163%20U.S.,as%20%22separate%20but%20equal%22. Plessy vs. Ferguson] attempted to repeal the Louisiana Separate Car Act, however, the Supreme court ruled that segregation would remain legal, as facilities were separate but equal. Eventually, after years of activism such as non-violent protests, sit-ins, lawsuits, marches, and civil disobedience, segregation was officially made illegal with the signing of the Civil Rights Act of 1964. Black Soldiers in the Union Army The United States Colored Troops were regiments of black soldiers who fought during the American Civil War. These soldiers made up about ten percent of the Union Army, and they faced their own unique set of challenges. Many black soldiers had to face bigotry and prejudice from their superior officers and were discriminated against in various ways. One example of this unfair treatment is how “Black recruits were not permitted to become commissioned officers, and were paid much less than white soldiers of the same rank.” Additionally, only black soldiers were required to pay an additional uniform fee, and they “were much more likely to be assigned to heavy manual duties while white soldiers were sent to fight in the battlegrounds." Furthermore, these black soldiers faced significant risk, as many were formerly enslaved people who, if captured, would face re-enslavement or death. The Impact of the Great Depression on Black Americans The Great Depression was a very severe economic depression that began in 1929 with a major stock market crash in America. This catastrophic event led to nearly a decade of financial hardship and an increase in unemployment. Although this financial crisis impacted all Americans, black people were disproportionately affected. Although an average of twenty-five percent of all Americans were unemployed, “By 1932, approximately half of Black Americans were out of work.” There are several causes for this disparity, but racial prejudice played a large role in preventing black Americans from finding employment. “In some Northern cities, whites called for blacks to be fired from any jobs as long as there were whites out of work.” In an attempt to respond to the need for support and restoration as a result of the Great Depression, President Franklin D. Roosevelt created the New Deal. This was a collection of regulations, reforms, and public work projects. Unfortunately, although the New Deal was largely considered effective at bringing relief to many people, it did not solve many of the problems faced by Black Americans. “The New Deal contained no anti-lynching legislation-even though the beating and lynching of black citizens was still a common occurrence in some parts of the nation.” Furthermore, racial discrimination still influenced several New Deal programs which limited the assistance received by black people. For example, “African Americans in southern work relief programs under the WPA received lower wages than their white counterparts.”
WIKI
Marystown Group The Marystown Group is a Neoproterozoic stratigraphic group of predominantly volcanic sediments – subaerially deposited ash flow tuffs from rhyolites and alkali basalts (with some minor sedimentary strata – red to green siltstones to conglomerates – interleaved), with a central sandstone unit, cropping out in Newfoundland. It is likely to be temporally equivalent (more or less) to the Love Cove Group, Connaigre Bay Group, Long Harbour Group and Rock Harbour Group. Age More accurate/precise dates suggest that the formation is 580-570 Ma (younger than stated in the box above, which uses U-Pb dates).
WIKI
Interpretable Model Drift Detection PROCEEDINGS OF 7TH JOINT INTERNATIONAL CONFERENCE ON DATA SCIENCE AND MANAGEMENT OF DATA, CODS-COMAD 2024(2024) Cited 0|Views4 No score Abstract Data in the real world often has an evolving distribution. Thus, machine learning models trained on such data get outdated over time. This phenomenon is called model drift. Knowledge of this drift serves two purposes: (i) Retain an accurate model and (ii) Discovery of knowledge or insights about change in the relationship between input features and output variable w.r.t. the model. Most existing works focus only on detecting model drift but offer no interpretability. In this work, we take a principled approach to study the problem of interpretable model drift detection from a risk perspective using a feature-interaction aware hypothesis testing framework, which enjoys guarantees on test power. The proposed framework is generic, i.e., it can be adapted to both classification and regression tasks. Experiments on several standard drift detection datasets show that our method is superior to existing interpretable methods (especially on real-world datasets) and on par with state-of-the-art black-box drift detection methods. We also quantitatively and qualitatively study the interpretability aspect including a case study on USENET2 dataset. We find our method focuses on model and drift sensitive features compared to baseline interpretable drift detectors. More Translated text AI Read Science Must-Reading Tree Example Generate MRT to find the research sequence of this paper Chat Paper Summary is being generated by the instructions you defined
ESSENTIALAI-STEM
Page:Frazer (1890) The Golden Bough (IA goldenboughstudy01fraz).djvu/332 310 “the many-named,” “the thousand-named,” and in Greek inscriptions “the myriad-named,” Tiele confesses candidly that "it is now impossible to tell precisely to what natural phenomena the character of Isis at first referred.” Mr. Renouf states that Isis was the Dawn, but without assigning any reason whatever for the identification. There are at least some grounds for seeing in her a goddess of corn. According to Diodorus, whose authority appears to have been the Egyptian historian Manetho, the discovery of wheat and barley was attributed to Isis, and at her festivals stalks of these grains were carried in procession to commemorate the boon she had conferred on men. Further, at harvest-time, when the Egyptian reapers had cut the first stalks, they laid them down and beat their breasts, lamenting and calling upon Isis. Amongst the epithets by which she is designated on the inscriptions are “creatress of the green crop,” “the green one, whose greenness is like the greenness of the earth,” and “mistress of bread.” According to Brugsch she is “not only the creatress of the fresh verdure of vegetation which covers the earth, but is actually the green corn-field itself, which is personified as a goddess.” This is confirmed by her epithet Sochit or Sochet, meaning “a corn-field,” a sense which the word still retains in Coptic. It is in this character of a corn-goddess that the Greeks conceived Isis, for they
WIKI
Talk:ทันเนล Hi. Please check the pronunciation, if it's OK, especially the final "l" and the length of the second syllable. Loanwords seem to always mismatch with (online) dictionaries. BTW, my Paiboon dictionary does mention that young people manage to pronounce final "s", "f" and "l". Perhaps we should allow for accents of older generations as well? --Anatoli T. (обсудить/вклад) 04:33, 27 June 2016 (UTC) I never see this word before. Where you get this? May discuss at RFV instead. BTW, I am pretty sure that we don't read ทัน-เนน. --Octahedron80 (talk) 05:51, 27 June 2016 (UTC) RFV discussion: June 2016 Never see this word before. Please provide some context. Generally, we call tunnel as อุโมงค์. --Octahedron80 (talk) 05:56, 27 June 2016 (UTC) * Feel free to delete, I don't boast a good knowledge of Thai, as you know, I'll leave it to your judgement. My source is not very reliable -, which gives the phonemic "ทัน-เนน". Used in ("Carpal tunnel syndrome"). It's interesting that you say you never heard the word (Talk:ทันเนล) but you're sure that it's pronounced with the final "l", not "n". :) --Anatoli T. (обсудить/вклад) 06:23, 27 June 2016 (UTC) * You should make the whole term คาร์พัลทันเนลซินโดรม instead because it is the transcription of the syndrome and we do not solely use คาร์พัล and ทันเนล anywhere. Delete ทันเนล please. --Octahedron80 (talk) 06:30, 27 June 2016 (UTC) * As a native speaker, I can say that "ทันเนล" does not exist. No one calls tunnel as "ทันเนล". "คาร์พัลทันเนลซินโดรม" is a technical term directly transcribed from English carpal tunnel syndrome. And I think the transcribed term "คาร์พัลทันเนลซินโดรม" is very rarely used as there are a number of Thai terms referring to the syndrome, such as "กลุ่มอาการช่องข้อมือ" coined by, etc. --YURi (talk) 06:39, 27 June 2016 (UTC) * . Thanks again. Can I suggest a compromise, if is indeed a correct term? Please see my edit at . --Anatoli T. (обсудить/вклад) 06:45, 27 June 2016 (UTC)
WIKI
User:Beefmangoes/sandbox Teramoto Kosaku (寺本広作, August 29, 1907 - April 7 1992) was a Japanese politician and bureaucrat. After graduating from Tokyo University, he served in the Home Ministry working local affairs in Kochi, Ibaraki, Aomori, and Shimane prefectures." Teramoto was placed in Section V of the Special Higher Police, and was responsible for surveillance of extreme nationalists under the 1925 Peace Preservation Law. 2 Leveraging the chaos that ensued following the military defeat of Japan and occupation by American forces, Teramoto and his team at the Labor Standards Section of the Welfare Ministry drafted the Labor Standards Law of 1947. After presenting the law to occupation forces at GHQ, Teramoto misled otherwise unwilling politicians into adopting the bill by implying that the act was a non-negotiable reform insisted upon by the Americans. 3] He served three consecutive terms as governor of Kumamoto prefecture between 1959 and 1971,4 as well as two terms in the Japanese House of Councilors
WIKI
User:DCorp617/sandbox = Chaerin Kim = A multi-instrumentalist, being one of the very few in the world who you can see performing as a soloist with two instruments on the same stage, internationally acclaimed harpist, pianist, composer, and professor Dr. Chaerin Kim is the winner of several international competitions. She was the winner of the Special Prize of Best Performance of Russian Music at the International Harp Competition in Russia, the CFA Award and Department Honor Award from Boston University, the Garrett Award, Foundation Award, and Julia Leney Harp Prize in London, the Soloist Competition Winner at Ewha University, Kaywon School for the Arts, and Boston University, the Bronze Medalist for Solo Piano at the Walgan Music Competition, and winner of the Grand Prize from the Korean Student’s Newspaper. She has been featured as a soloist on both instruments: Rachmaninoff Piano Concerto No. 2, Debussy Danses for Harp, Mozart’s Flute and Harp Concerto with UMB Orchestra, Rachmaninoff Piano Concerto No. 2 with Boston Chamber Orchestra, the Ginastera Harp Concerto with BU Symphony Orchestra, Ginastera Harp Concerto with Seongnam Philharmonic, a Guest Soloist of the International Music Festival broadcast live in Korea, Ravel’s Introduction and Allegro and Debussy’s Danses with Yonsei Sinfonietta, and the Pierne Harp Concerto with EU Orchestra. Her harp performance has been used for the British movie Kaleidoscope (Main actor Toby Jones), which was the winner of Best Performance at the Edinburgh International Film Festival. As a composer, her composition, Rendezvous, has 92 versions, including versions for orchestra, harp, piano, and voice, with lyrics written by her and translated into 80 different languages, and the orchestral version of Rendezvous had its world premiere in Boston, Massachusetts. Dr. Kim’s musical studies began when she was six years old. She majored in piano at the Yeiwon Music Middle School, while also beginning studies in cello and voice. After Yeiwon, she went on to attend Kaywon High School of Arts, where she continued to major in piano. In her last year, at the age of eighteen, she also started lessons on harp, and six months later won the Soloist Audition for Harp. She received her B.A. with Highest Honors from Ewha University in Seoul – then, while pursuing her master’s degree at Ewha, she was offered a scholarship for a PGD at the Royal Academy of Music in London, where she graduated with “distinction.” She got her M.M. from Yale University on a scholarship, graduating summa cum laude. She was invited to the Artist’s Diploma program at Yale and Graduate Diploma Program at New England Conservatory – however, she decided to pursue her doctorate at Boston University, where she was offered a full scholarship. She was the “quickest recipient of a Doctorate” in BU Music School’s history, completing it in three and a half years. Dr. Kim was formerly a professor at Eastern Nazarene College, where she taught harp, piano, music theory and music history classes, and was also the former Head of the Harp Department at Adagio Music Academy and South Shore Conservatory. Currently, she is an artistic director of UIMC, a professor of both instruments; harp and piano at University of Massachusetts Boston and harp through the Office of Arts at Harvard University. Teaching Positions Piano Faculty at University of Massachusetts Boston (January 2014 – Present) Harp Faculty at University of Massachusetts Boston (January 2012 – Present) Undergraduate Harp Instructor at Harvard University (September 2010 – Present) Artistic Director of the USA International Music Competition (September 2009 – Present) Harp Faculty at Eastern Nazarene College (January 2012 – August 2018) Harp Faculty at Youth and Must International Music Festival (August 2012) Harp Department Chair at South Shore Conservatory (2009 – 2013) Composition, Piano, and Harp Teacher at Beech Knoll School (2011 – 2013) Education Consultant of the Musical Journey II (2009 – 2010) Head of the Harp Department; Member of the Piano Faculty at Adagio Music Academy (2009) Teaching Assistant at Boston University (2008) Teaching Assistant at Yale University (2005) Awards and Prizes Winner of the Soloist Competition at Boston University (2008) Recipient of the Department Honor Award at Boston University (2008) A Special Prize Winner of the Best Performance in Russian Music Diploma for the Musical Skills from the International Harp Competition in Moscow, Russia (2005) Recipient of the CFA Award, Boston, U.S.A (2005) Winner of the M.A. Garrett Award, London, England (2003) Winner of the Foundation Award, London, England (2002) Winner of the Julia Leney Harp Prize, London, England (2002) Winner of the Soloist Competition at Ewha University (1998) Winner of the Soloist Competition at Kaywon High School (1996) Grand Prize of Korean Student’s Newspaper Music Competition as a Solo Pianist, Seoul, Korea (1989) Walgan Music Competition Bronze Medalist as a Solo Pianist, Seoul, Korea (1987) Education Boston University, USA – DMA in Harp Performance: graduated summa cum laude, Full Scholarship Recipient from the CFA; Minor in Piano; “Quickest recipient of doctorate in BU School of Music history” (2008) Yale University, USA – M.M. in Harp Performance, graduated summa cum laude (2005) Royal Academy of Music in London, England – PGD in Harp Performance: graduated with “Distinction”; Awarded scholarship for two years (2003) Ewha University, Korea – B.A. in Harp Performance – graduated with “Highest Honors” (2001) Kaywon High School of Music, Korea – Major in Piano & Harp (1996) Yeiwon Middle School of Music, Korea – Major in Piano (1994) Solo Performances with Orchestra World Premiere of own composition Rendezvous with University of Massachusetts Boston Chamber Orchestra (2018) Rachmaninoff Piano Concerto No. 2 with University of Massachusetts Boston Chamber Orchestra (2018) Debussy’s Danses with University of Massachusetts Boston Orchestra (2014) Rachmaninoff Piano Concerto No. 2 with Boston Chamber Soloists (2014) Mozart’s Flute and Harp Concerto with University of Massachusetts Boston Chamber Orchestra (2012) A. Ginastera Harp Concerto with Boston University Symphony Orchestra, as winner of the Soloist Competition (2008) A. Ginastera Harp Concerto with Seongnam Philharmonic, as Guest Soloist of the International Music Festival in Korea (2007), broadcast live in Korea M. Ravel Introduction and Allegro with Yonsei Sinfonietta, as Guest Soloist (2000) C. Debussy’s Danse with Yonsei Sinfonietta, as Guest Soloist (2000) G. Pierne Harp Concerto with Ewha University Orchestra, as winner of the Soloist Competition (1998) Solo Performances Marguerite douloureuse at rouet for the British film Kaleidoscope, with main actor Toby Jones; winner of Best Performance at the Edinburgh International Film Festival (2017) World premiere of People Town, composed by M. Maganuco in Boston (2008) Boston University, Concert Hall (2005, 2006, 2007, 2008) World Premiere the Harp Concerto written for Chaerin Kim by I. Lisak in Boston (2007) Live Performances on Radio & TV in Seoul, Korea (2007) Three-Times Chamber Concert at Seiji Ozawa Hall, Tanglewood Music Festival (2006) Yale University, Harkness Hall and Sprague Hall (2004 & 2005) Live Performances in Radio & TV in Moscow, Russia (2005) United States – Lexington, Massachusetts (2005) Royal Academy of Music in London, England (2003) Harp Ensemble & Harp Duo on Wales National TV, U.K. (2003) London, England – Salvi Concert (2002 & 2003) Chosun Newspaper Young Musician Concert, Korea (2001) Korea – Ewha University (2001) Seoul Baroque Music Course, Korea (2000) Korea – Seoul Art Hall (2000) Korea – Duet with Teacher in Young-san Arts Hall (1999) Department’s Honorable Student Concert at Ewha University (1997) Spring Concert as Best Performer of the Year at Kaywon High School, Korea (1996) Final Concert of the Susan MacDonald Music Course, Switzerland (1995) Conducted the Yeiwon Middle School Choir at the Jung-dong Church (1991) Solo Pianist at the Korea Young Musician Festival in Seoul, Korea (1990) Masterclass / Guest Faculty Visiting Piano Professor at Madras Music College, India (2019) Piano and Harp Masterclass at KM Music College, India (2019) Piano Masterclass at Strings Music Academy, India (2019) Piano Masterclass Loyola College, India (2018) Instructor at University of Massachusetts Boston (2017) Instructor at Eastern Nazarene College, USA (2011) Artist-in-Residence at Quincy Public School, USA (2011) Music Festivals Soloist of the Korean International Music Festival (2007) Tanglewood Music Festival (2006) World Harp Congress, Dublin (2005) Seoul Baroque Music Course, Korea (2000) Summer Hap Festival, Switzerland (1995) Soloist at the Korean Young Musician Festival in Seoul, Korea (1990) Orchestral Experience Boston Cantata Singers, under David Hoose (2007 – 2010 Seasons) Waltham Symphony (2009) Boston University Symphony (2005-2008) Boston College Symphony (2008) Boston Symphony Hall (2006 & 2007) Boston University Symphony at Carnegie Hall (2006) Tanglewood Music Center Orchestra Principal Harpist, under conductor James Levine (2005) Yale Philharmonic, under conductor Shin Ik Ham (2003 – 2005) Russian Philharmonic in Carnegie Hall (2004) Royal Academy of Music Philharmonic (2001 – 2003) Ewha University Symphony, under conductor Taek Ju Lee (1997 – 2000) KBS (Korean Broadcasting System) National Symphony Orchestra as a second Harpist (1998 & 1999) Seoul Youth Symphony Orchestra (1998) Conducting Experience Conductor and Artist-in-Residence at Silversounds Orchestra at Beechwood Knoll School (2011) Yeiwon Middle School Choir (1994) Compositions “Rendezvous,” written in various instrumentations including orchestra, harp, piano, and voice, with lyrics available in 80 languages. (2018) “The Fireworks” for solo piano (2006) “The Variation” for solo piano (2005) Arrangements G. B. Pescetti Sonata in C minor for flute and harp (2007) Recordings David Took on Harp by Albany Records Spin by Albany Records Dedicated Poem * June, 3, 2017 * May, 1, 2013 * Feb, 2, 2010
WIKI
Greatest Hits Volume 2 (Marcia Hines album) Greatest Hits Volume 2 is the second greatest hits album by Australian recording artist, Marcia Hines. It was released in early 1982, following the success of Greatest Hits, which was released in December 1981 and peaked at number 2 on the Australian Kent Music Report in January 1982. This remains Hines’ highest charting album. Track listing * Side A * 1) "Signed, Sealed, Delivered" (3:30) * 2) "Love Is the Key" (2:30) * 3) "April Sun in Cuba" (3:45) * 4) "Save the Last Dance for Me" (2:39) * 5) "(Until) Your Love Broke Through" (3:19) * 6) "A Love Story" (3:35) * 7) "In a Mellow Mood" (2:40) * 8) "Maybe It's Time" (3:20) * 9) "Love Is a Hurtin' Thing" (2:56) * Side B * 1) "Try it With Me" (2:46) * 2) "You Gotta Let Go" (3:30) * 3) "But it's Alright" (2:35) * 4) "Let the Music Play" (4:26) * 5) "Dance You Fool Dance" (5:16) * 6) "Imagination" (3:49) * 7) "Once We Get Started" (4:55)
WIKI
Build 1940 will not start. Get error. :-( Discussion in 'Parallels Desktop for Mac' started by Manatee, Oct 11, 2006. 1. Manatee Manatee Messages: 50 I just installed build 1940 on my MacBook Pro 2GHz 2GB RAM, and I'm getting the dreaded Error occurred while trying to interact with Parallels driver! Parallels Desktop is either not installed or/and configured or has integrity problems, which prevent it from operating properly. Please reinstall the Parallels Desktop. I've tried reinstalling, and I still get the error. Build 1884 was working fine. I've tried rebooting and running Repair Disk Permissions. I always install to the default location. I've been using Parallels since day one, and this is the first time I've had trouble with a build. Any ideas? Thanks. Peter   2. DarylF2 DarylF2 Messages: 33 Have you tried running the Parallels uninstaller, then rebooting, then reinstalling Parallels build 1940, then rebooting again, and only then running Parallels build 1940?   3. Manatee Manatee Messages: 50 Ok, I tried that, but it didn't work. I still get the error. Thanks for the suggestion, though. BTW, I reinstalled build 1884, and it works fine. Strange.   4. DarylF2 DarylF2 Messages: 33 Weird. Build 1940 is working fine here (Mac Pro 3.0GHz Quad Xeon, 4.0GB RAM). Are you running Mac OS X 10.4.8?   5. Manatee Manatee Messages: 50 Yes, I'm using 10.4.8. It's funny, since the first beta, other people have had trouble with various installs, and I never had a problem. Now I guess it's my turn.   Share This Page
ESSENTIALAI-STEM
Nigeria reports first polio cases in two years: WHO GENEVA (Reuters) - Nigeria has reported that two children in Borno state have been paralyzed by polio, the first cases of the disease in the country in two years, the World Health Organization (WHO) said on Thursday. Nigeria and the U.N. agency are conducting immunization campaigns and strengthening surveillance systems that help catch the virus early, the WHO said in a statement on the latest setback to its global program to eradicate polio. “The overriding priority now is to rapidly immunise all children around the affected area and ensure that no other children succumb to this terrible disease,” said Dr. Matshidiso Moeti, WHO Regional Director for Africa. Pakistan and Afghanistan have also reported polio this year, with 21 cases to date, WHO said. Reporting by Stephanie Nebehay; editing by Andrew Roche
NEWS-MULTISOURCE
ICAMS / Interdisciplinary Centre for Advanced Materials Simulation Events Micromechanics of polycrystals: full-field computations and second-order homogenization approaches Date: 12.05.2010 Place: UHW 11/1102 Ricardo Lebensohn, Los Alamos National Laboratory, Los Alamos, USA Models based on crystal plasticity are increasingly used in engineering applications. Three key elements of these methods are: 1) a proper consideration of the plastic deformation mechanisms at single crystal level; 2) a representative description of the polycrystal’s microstructure, and 3) an appropriate scheme to connect the microstates in the crystallites and the polycrystal's response. The latter can be based on homogenization theories, which rely on a statistical description of the microstructure, or be full-field solutions (e.g. crystal plasticity Finite Elements or spectral methods), which requires a spatial description of the microstructure. In the first part of this talk we will present a spectral formulation based on crystal plasticity (CP) and Fast Fourier Transforms (FFT) for the determination of micromechanical fields in plastically-deformed 3-D polycrystals. This formulation, pioneered by Suquet and coworkers as a fast algorithm to compute the response of composites using as input a digital image of their microstructures (e.g. [1]), has been in turn adapted to deal with polycrystals deforming by dislocation glide [2]. Next, we will show applications of the CP-FFT formulation to the following problems: prediction of orientation-dependent intragranular misorientations in Cu polycrystals deformed in tension [3], prediction of strain localization in columnar ice polycrystals deformed in creep [4], study of effect of the matrix’s crystallinity on the dilatational plastic behavior of polycrystals with intergranular cavities [5]. Finally, the CP-FFT formulation will be used to assess the accuracy of different available nonlinear homogenization approaches for the prediction of the viscoplastic behavior of polycrystalline aggregates. We will show that Ponte Castañeda’s second-order formulation [6], which explicitly uses information on average intragranular field fluctuations, implemented within the widely-used ViscoPlastic Self-Consistent (VPSC) code, yields the most accurate results [7]. [1] H. Moulinec, and P. Suquet, Comput Meth Appl Mech Eng 157, 69 (1998). [2] R.A. Lebensohn, Acta mater 49, 2723 (2001). [3] R.A. Lebensohn, R. Brenner, O. Castelnau et al., Acta mater. 56, 3914 (2008). [4] R.A. Lebensohn, M. Montagnat, P. Mansuy et al. Acta mater 57, 1405 (2009). [5] R.A. Lebensohn, M. Idiart, P. Ponte Castañeda et al., in preparation. [6] P. Ponte Castañeda, J. Mech. Phys. Solids 50, 737 (2002). [7] R.A. Lebensohn, C.N. Tomé and P. Ponte Castañeda, Phil. Mag. 87, 4287 (2007). The seminar takes place at 10:30 a.m. in the ICAMS seminar room UHW 11/1102, Stiepeler Straße 129, 44801 Bochum. For further information contact Bernhard Eidel, bernhard.eidel@rub.de. Supporting information: File1 « back
ESSENTIALAI-STEM
2015–16 Algerian Ligue Professionnelle 2 The 2015–16 Algerian Ligue Professionnelle 2 was the 52nd season of the Algerian Ligue Professionnelle 2 since its establishment, and its sixth season under its current title. A total of 16 teams contested the league.
WIKI
Harvard’s Find of a Colonial Map of New Jersey Is a Reminder of Border Wars The border wars between New York and New Jersey have seen fierce fighting over the years, from actual shots fired in the 18th century to trash-talking and legal wrangling over the ownership of Ellis Island almost into the 21st. Now, a librarian in the neutral territory of Massachusetts has uncovered a long-lost document from those tangled disputes: a hand-drawn map that may be the earliest surviving one showing New Jersey’s northern border where it is today. The map, which is owned by Harvard University, was created by the celebrated colonial surveyor Bernard Ratzer in 1769, at the request of a royal commission charged with settling the long-burning northern border dispute once and for all. It was found by John Overholt, a curator of rare books and manuscripts at the university’s Houghton Library, rolled up in a container and stacked with some uncataloged material. “I pulled it out just enough to get a sense of what it was and saw the name ‘Ratzer,’” Mr. Overholt said. “I thought, Gosh, this must be something important.” And after more than a year in a conservation lab, the map, which measures about 63 inches by 32 inches, has been digitized as part of a broader effort to put Harvard’s colonial North America manuscript material online. Ratzer is known as a maestro of early American maps. When an ultra-rare copy of his famous 1770 map of New York City turned up at the Brooklyn Historical Society in 2011, the discovery was front-page news. The newly uncovered New Jersey map, with its dense web of annotated alternate boundary lines for the northern border, may not have the same immediate eye-candy appeal. (It does not address disputes over New Jersey’s coastal borders.) But experts say it offers another glimpse of Britain’s attempts, on the eve of the American Revolution, to get its colonial house in order, cartographically speaking. “It’s a significant find, without a doubt,” said Matthew Knutzen, the director of the humanities and social science research division at the New York Public Library, and a former head of its maps division. “It marks the canonical version of the states’ shapes, and comes with a seal of approval.” Like Ratzer’s New York City map, the New Jersey map, Mr. Knutzen added, was all about “setting things straight.” “It was almost like the British were saying: ‘What’s going on with these crazy people in New Jersey? Can’t we figure this out already?’” The New York-New Jersey border dispute is one of the great rabbit-holes of American cartographic history. Confusion reigned almost from the beginning, thanks to a 1665 charter that, among other puzzling features, defined New Jersey’s northern boundary in relation to a branch of the Delaware River that no one could definitively locate. There was cross-border skirmishing throughout the first half of the 18th century, as well as sometimes vicious subdisputes, like riots that flared in the 1740s over the dividing line between East and West Jersey — despite the fact that the two territories had been amalgamated politically decades earlier. “Where you drew the northern border also had bearing on how New Jersey was divided in half,” Mr. Knutzen said. A royal commission to settle the northern boundary was declared in the 1760s, with Ratzer, a British Army officer, hired to do the surveying. The original copy of his hand-drawn map was presumably sent to the commission in London, but Mr. Overholt said he has been unable to determine if it survives in British archives. The map at Harvard, he said, appears to be a copy prepared for New York’s representatives to the commission, to rebut any appeal by New Jersey. It includes the border as surveyed by Ratzer as well as lines indicating alternate boundaries, including one showing the New Jersey-friendly “pretended settlement of 1719” — loaded language presumably added by New York’s representatives, Mr. Overholt said — and another giving New York a large chunk of present-day New Jersey. The Harvard map includes a notarized statement from Ratzer attesting that it was an accurate copy of his original for the commission, plus the additional lines. That same statement, Mr. Overholt said, is on a printed version of the map that appears in a rare 1770 pamphlet summarizing the controversy. “Our map is clearly the source,” Mr. Overholt said. (Ratzer’s map also became the basis for more widely distributed engraved maps of New Jersey published later in the 1770s.) The New York and New Jersey legislatures approved the compromise border in 1772. But they soon began squabbling over their coastal boundary, laying down their arms only after the Supreme Court ruled in 1998 — some 2,000 documents and 4,000 pages of testimony later — that while the parts of Ellis Island created by landfill were in New Jersey, the original part belonged to New York. The Harvard map may not revive the border wars. But Mr. Overholt said it was a welcome reminder of the political nature of cartography. “All maps are ideological statements about the world,” he said. “It’s really helpful to have a map where that’s so obvious.”
NEWS-MULTISOURCE
PDA View Full Version : Is iSight quality better in iChat than AIM? kaidomac 06-26-2006, 10:32 PM I tested out my new iSight web cam with a couple people tonight, using iChat and my AIM account. The video came out somewhat blurry. Does using a dedicated iChat account improve quality? Aptmunich 06-27-2006, 01:34 AM I don't think so, as long as you are using iChat... Are all the parties using 10.4? If not you won't see the H.264 goodness, but the slightly less crisp looking H.263 video compression... schweb 06-27-2006, 06:05 AM A lot of it also depends on your processor speed, what else you're doing on your computer at the time, and the speed of your internet connection. imacdoyou 06-27-2006, 02:53 PM I also find that the room needs to have an abundant light source. kaidomac 06-27-2006, 04:25 PM I also find that the room needs to have an abundant light source. Well my preview window looks great, but they get somewhat blurry reception on their end and I get somewhat blurry reception from them on my end (through AIM on iChat).
ESSENTIALAI-STEM
Curry This module is dedicated to partial application. We support two types of partial application: @curry and partial. @curry is a new concept for most Python developers, but Python already has a great tool to use partial application: functools.partial The only problem with it is the lack of typing. Let’s see what problems do we solve with this module. Warning This module requires our mypy plugin to be present. Without it we will fallback to the original behaviour. Partial Here’s how typing works there: from functools import partial def some_function(first: int, second: int) -> float: return first / second reveal_type(partial(some_function, 1)) # => functools.partial[builtins.float*] # => Which is really: `def (*Any, **Any) -> builtins.float` And compare it with out solution: from returns.curry import partial def some_function(first: int, second: int) -> float: return first / second reveal_type(partial(some_function, 1)) # => def (second: builtins.int) -> builtins.float* # => Which is fair! Note We still use functools.partial inside. We just improve the typings. Generics One more problem is generics support in functools.partial. Here’s the comparison: from functools import partial from typing import List, TypeVar T = TypeVar('T') x: List[int] def some_function(first: List[T], second: int) -> T: return first[second] reveal_type(partial(some_function, x)) # => functools.partial[T`-1] # => Which is broken! And our solution works fine: from returns.curry import partial reveal_type(partial(some_function, x)) # => def (second: builtins.int) -> builtins.int* We also work with complex generic with multiple arguments or with multiple generics. The only known problem is that passing explicit generic like [1, 2, 3] will resolve in List[Any]. Because mypy won’t be able to infer this type for some reason. The reasonable work-around is to pass annotated variables like in the example above. Types and Instances We can also work with types and instances. Because they are callable too! from returns.curry import partial class Test(object): def __init__(self, arg: int) -> None: self.arg = arg def __call__(self, other: int) -> int: return self.arg + other reveal_type(partial(Test, 1)) # N: Revealed type is 'def () -> ex.Test' reveal_type(partial(Test(1), 1)) # N: Revealed type is 'def () -> builtins.int' No differences with regular callables at all. Overloads We also support working with @overload definitions. It also looks the same way: from typing import overload from returns.curry import partial @overload def test(a: int, b: str) -> str: ... @overload def test(a: int) -> int: ... @overload def test(a: str) -> None: # won't match! ... def test(a, b=None): ... reveal_type(partial(test, 1)) # N: Revealed type is 'Overload(def (b: builtins.str) -> builtins.str, def () -> builtins.int)' From this return type you can see that we work with all matching cases and discriminate unmatching ones. @curry curry allows to provide only a subset of arguments to a function. And it won’t be called untill all the required arguments are provided. In contrast to partial which works on the calling stage, @curry works best when defining a new function. >>> from returns.curry import curry >>> @curry ... def function(first: int, second: str) -> bool: ... return len(second) > first >>> assert function(1)('a') is False >>> assert function(1, 'a') is False >>> assert function(2)('abc') is True >>> assert function(2, 'abc') is True Take a note, that providing invalid arguments will raise TypeError: >>> function(1, 2, 3) Traceback (most recent call last): ... TypeError: too many positional arguments >>> function(a=1) Traceback (most recent call last): ... TypeError: got an unexpected keyword argument 'a' This is really helpful when working with .apply() method of containers. Warning We recommend using partial instead of @curry when possible because it’s much faster. Typing @curry functions are also fully typed with our custom mypy plugin. Let’s see how types do look like for a curried function: >>> from returns.curry import curry >>> @curry ... def zero(a: int, b: float, *, kw: bool) -> str: ... return str(a - b) if kw else '' >>> assert zero(1)(0.3)(kw=True) == '0.7' >>> assert zero(1)(0.3, kw=False) == '' # If we will reveal the type it would be quite big: reveal_type(zero) # Overload( # def (a: builtins.int) -> Overload( # def (b: builtins.float, *, kw: builtins.bool) -> builtins.str, # def (b: builtins.float) -> def (*, kw: builtins.bool) -> builtins.str # ), # def (a: builtins.int, b: builtins.float) -> def (*, kw: builtins.bool) # -> builtins.str, # def (a: builtins.int, b: builtins.float, *, kw: builtins.bool) # -> builtins.str # ) It reaveals to us that there are 4 possible way to call this function. And we type all of them with overload type. When you provide any arguments, you discriminate some overloads and choose more specific path: reveal_type(zero(1, 2.0)) # By providing this set of arguments we have chosen this path: # # def (a: builtins.int, b: builtins.float) -> def (*, kw: builtins.bool) # -> builtins.str, # # And the revealed type would be: # # def (*, kw: builtins.bool) -> builtins.str # It works with functions, instance, class, and static methods, including generics. See Limitations in the API Reference. FAQ Why don’t you support * and ** arguments? When you use partial(some, *my_args) or partial(some, **my_args) or both of them at the same time, we fallback to the default return type. The same happens with curry. Why? There are several problems: • Because mypy cannot not infer what arguments are there inside this my_args variable • Because curry cannot know when to stop accepting *args and **kwargs • And there are possibly other problems! Our advice is not to use *args and *kwargs with partial and curry. But, it is still possible, but in this case we will fallback to Any. API Reference partial(func, *args, **kwargs)[source] Typed partial application. It is just a functools.partial wrapper with better typing support. We use a custom mypy plugin to make sure types are correct. Otherwise, it is currently impossible to properly type this function. >>> from returns.curry import partial >>> def sum_two_numbers(first: int, second: int) -> int: ... return first + second >>> sum_with_ten = partial(sum_two_numbers, 10) >>> assert sum_with_ten(2) == 12 >>> assert sum_with_ten(-5) == 5 Parameters • func (Callable[…, ~_ReturnType]) – • args (Any) – • kwargs (Any) – Return type Callable[…, ~_ReturnType] curry(function)[source] Typed currying decorator. Currying is a conception from functional languages that does partial applying. That means that if we pass one argument in a function that gets 2 or more arguments, we’ll get a new function that remembers all previously passed arguments. Then we can pass remaining arguments, and the function will be executed. partial() function does a similar thing, but it does partial application exactly once. curry is a bit smarter and will do partial application until enough arguments passed. If wrong arguments are passed, TypeError will be raised immediately. We use a custom mypy plugin to make sure types are correct. Otherwise, it is currently impossible to properly type this function. >>> from returns.curry import curry >>> @curry ... def divide(number: int, by: int) -> float: ... return number / by >>> divide(1) # doesn't call the func and remembers arguments <function divide at ...> >>> assert divide(1)(by=10) == 0.1 # calls the func when possible >>> assert divide(1)(10) == 0.1 # calls the func when possible >>> assert divide(1, by=10) == 0.1 # or call the func like always Here are several examples with wrong arguments: >>> divide(1, 2, 3) Traceback (most recent call last): ... TypeError: too many positional arguments >>> divide(a=1) Traceback (most recent call last): ... TypeError: got an unexpected keyword argument 'a' Limitations: • It is kinda slow. Like 100 times slower than a regular function call. • It does not work with several builtins like str, int, and possibly other C defined callables • *args and **kwargs are not supported and we use Any as a fallback • Support of arguments with default values is very limited, because we cannot be totally sure which case we are using: with the default value or without it, be careful • We use a custom mypy plugin to make types correct, otherwise, it is currently impossible • It might not work as expected with curried Klass().method, it might generate invalid method signature (looks like a bug in mypy) • It is probably a bad idea to curry a function with lots of arguments, because you will end up with lots of overload functions, that you won’t be able to understand. It might also be slow during the typecheck • Currying of __init__ does not work because of the bug in mypy: https://github.com/python/mypy/issues/8801 We expect people to use this tool responsibly when they know that they are doing. Parameters function (Callable[…, ~_ReturnType]) – Return type Callable[…, ~_ReturnType]
ESSENTIALAI-STEM
Screen is not a process control system Posted on ‐ Tagged #deamons #upstart #supervisor #process control Just like you wouldn’t use a bucket to fill up an entire swimming pool, you shouldn’t use screen to manage your daemons. Stable and flexible IT infrastructure is all about using the right tools for the right job. This post may seem like it should be blatantly obvious, but in the last month alone, I’ve heard of numerous people using screen and/or cron to keep daemons alive. Worse, there’s even semi-official guides out there that still recommend it, even in this day and age. Now, don’t get me wrong, screen is absolutely awesome (though I prefer the newer tmux) for what it’s meant to do, such as multiplexing terminals and providing window management of those terminals. But it is not designed to control and watch over your daemon processes. For example, it doesn’t manage your logfiles, it won’t respawn a crashed program and it’s not going to come up by itself after a reboot, either. Thankfully however, there are a lot of modern tools that are designed specifically for this purpose. Supervisord Supervisord is a “client/server system that allows its users to monitor and control a number of processes on UNIX-like operating systems.” It’s a daemon that’s started like all the others on your system by init, but in turn manages other processes for you through simple configuration files, which look like this: # /etc/supervisor/conf.d/err.conf [program:err] directory=/home/err/repository command=/home/err/virtualenv/bin/python /home/err/repository/scripts/err.py --config "/home/err" --xmpp autostart=true autorestart=true startsecs=10 stopwaitsecs=60 redirect_stderr=true stdout_logfile=/var/log/supervisor/err.log stderr_logfile=None stdout_logfile_maxbytes=150MB stdout_logfile_backups=0 user=err environment=HOME=/home/err,USER=err It provides a command-line program to manage the programs under it’s control, which you can see below, as well as many other features, including an API in case you wanted to integrate it with other systems. $ supervisorctl status devpi-server RUNNING pid 1517, uptime 19 days, 1:43:17 err RUNNING pid 1503, uptime 19 days, 1:43:17 munin-fcgi-graph RUNNING pid 1504, uptime 19 days, 1:43:17 munin-fcgi-html RUNNING pid 1495, uptime 19 days, 1:43:17 $ supervisorctl restart devpi-server devpi-server: stopped devpi-server: started Upstart Upstart is “an event-based replacement for the /sbin/init daemon which handles starting of tasks and services during boot, stopping them during shutdown and supervising them while the system is running. It was originally developed for the Ubuntu distribution, but is intended to be suitable for deployment in all Linux distributions as a replacement for the venerable System-V init.” It’s one of many init replacements, systemd and OpenRC being some other examples. I’m a Ubuntu user so for me, using upstart makes a lot of sense in my infrastructure. I use upstart rather than supervisor when it comes to system-level daemons, especially those where it’s nice to be able to control where in the boot process they get started. Upstart scripts are just as simple to write as supervisor entries, though. # /etc/init/uwsgi-emperor.conf description "uWSGI Emperor" start on runlevel [2345] stop on runlevel [06] respawn respawn limit 10 5 pre-start script [ -e /var/run/uwsgi-emperor ] || mkdir /var/run/uwsgi-emperor chmod 1777 /var/run/uwsgi-emperor end script exec uwsgi --logto /var/log/uwsgi-emperor.log --log-date --thunder-lock --die-on-term --emperor /etc/uwsgi/apps-enabled Others The two I just highlighted specifically are merely the tip of the iceberg. There’s also monit, daemontools, circus and runit, just to name a few. All that matters is you should be using one of the many tools designed specifically for this purpose, rather than hacking together fragile solutions with tmux, screen or cron.
ESSENTIALAI-STEM
Provided by: alliance_5.1.1-1.1build1_amd64 bug NAME gethtitem - searches an item in a hash table SYNOPSYS #include "mut.h" int gethtitem(table, key) ht ∗table; void ∗key; PARAMETERS table Hash table pointer key Key used by the hash coding function DESCRIPTION gethtitem() searches an item in the hash table pointed to by table. RETURN VALUE If the key key exists, the associated value is returned, if it doesn't, the function returns EMPTYHT. EXAMPLE #include <stdio.h> #include "mut.h" check(p) losig_list *p; { char *amatla; losig_list *ptsig; locon_list *ptcon; ht *h; for (i = 0, ptsig = p->LOSIG; ptsig; i++, ptsig = ptsig->NEXT); h = addht(i); /* two connectors can't have the same name! */ for (ptcon = p->LOCON; ptcon; ptcon = ptcon->NEXT) addhtitem(h, ptcon->NAME, 0); for (ptsig = p->LOSIG; ptsig; ptsig = ptsig->NEXT) { if (ptsig->TYPE == INTERNAL) { amatla = getsigname(ptsig); /* this is nicely done with sethtitem! */ if (gethtitem(h, amatla) == EMPTYHT) { printf("N %s;\n", amatla); addhtitem(h, amatla, 0); } } } delht(); } SEE ALSO mbk(1), addht(3), delht(3), addhtitem(3), delhtitem(3), viewht(3).
ESSENTIALAI-STEM
Bironella Bironella is one of the three mosquito genera in the subfamily Anophelinae. The other two genera are Anopheles Meigen, which has a nearly worldwide distribution, and Chagasia Cruz, which is found in the Neotropics. Distribution Bironella is predominantly found in Australia, with one species, Bironella obscura, also found in New Guinea. Species The genus Bironella comprises eight described species, which are divided into three subgenera: Bironella Theobald (Two species),Brugella Edwards (Three species), Neobironella Tenorio (Three species). Phylogenetic relationships Within the subfamily Anophelinae, Bironella appears to be the sister taxon to the genus Anopheles. In contrast, Chagasia forms the outgroup, highlighting its distinct evolutionary lineage within this subfamily.
WIKI
helpwanted161 helpwanted161 - 1 year ago 48 ASP.NET (C#) Question How to make several DropDownlists read from the same datasource in a non-Redundant way? I have about 4 fields built inside a form view but each have to appear to a maximum of 10 if the user wishes to add more info (Note: this is required) so its like :NameTextBox1 till NameTextBox10 and TestTextBox1 till TestTexBox10 If the user clicks the "add field" button the extra textboxes appear. Now for the Question: One of the fields is a dropdownlist henceforth I have 10 dropdownlists that all have the same info they all read from the same function. Is there a more efficient way to go about doing the below procedure than writing the same thing 10 times? DropDownList DropDownList1 = (DropDownList)EntryFormView.FindControl("DropDownList1"); DropDownList1.DataSource = GeographicManager.ReadLocations(); DropDownList1.DataBind(); Answer Source Wrap it into another function that takes IDs: private void initDropDown(string dropDownID) { DropDownList DropDownList1 = (DropDownList)EntryFormView.FindControl(dropDownID); DropDownList1.DataSource = GeographicManager.ReadLocations(); DropDownList1.DataBind(); } initDropDown("DropDownList1"); initDropDown("DropDownList2"); If you need to init them all at once, you can use a loop to do so: for (int i=1; i<=10; i++) { initDropDown("DropDownList" + i); } Or you can put their IDs in an array and iterate over that. Also useful if your IDs do not follow simple pattern of "DropDownListX": string[] dropDownIDs = ["DropDownList1", "DropDownListTwo", "TheDropDownList"]; foreach (String ID in dropDownIDs) { initDropDown(ID); }
ESSENTIALAI-STEM
Career Development Career development resources for aspiring professionals. Career Change Center Career change guides, tutorials and resources for professionals in transition. Job Search Resources Job search resources, websites, guides and directories for job seekers. Elevator Construction Careers, Jobs and Training Information Career and Job Highlights • Most elevator installers and repairers gain their skills by completing four year training programs that consists of both coursework and practical instruction. • Prospects for those entering the industry are expected to be mediocre. People can maximize their opportunities by getting advanced degrees in electronics. • This occupation is less dependent on weather conditions than other occupations in the construction industry, so the work is more stable. Career Overview Workers in this area, who are variously called elevator installers, constructors, repairers, or mechanics, are involved putting elevators, dumbwaiters, escalators, moving sidewalks, and other equipment in structures. After they’ve installed the equipment their work consists of performing maintenance and repair work too. They might also update equipment as it becomes broken-down or outdated. This work requires a comprehensive knowledge of electrical systems, physics, and electronics as most of this equipment uses computerized or electronic controls. Many of these use microprocessors which gather information and assess flow of foot traffic to see how the equipment can be used the most effectively. Installation of a new elevator starts with detailed specifications. Installers read these and then plan placement of rails, mechanisms, spaces for cars, cylinders, hydraulic pumps, and foundations. Next installers begin actually putting in equipment. They spend a lot of their time on scaffolds or stands inside the shafts where they secure rails made out of steel to the sides of shaft for the elevator to run along. The next step is to work on the electrical system. They begin by installing conduit, a special type of tubing, on the sides of the shaft from one floor to the next. After the conduit is positioned, installers thread wires through it and put in other electrical parts like control panels on every floor and a master control panel for the whole building. Next, installers fuse together the steel frame of an elevator car, and then assemble the rest of the car’s floor, walls, and door panels. After the car is put together they secure guiding shoes and wheels to sides of the car to ensure a smooth ride. They finish by installing the frames and doors at the entrances to the elevators on each floor. Some elevators use cables. These elevators involve a machine, some types of which use gears and some types of which do not, and require a traction drive wheel that controls the thick steel cables that run from the elevator car to the counterweight. The counterweight balances the weight of elevator car which lessens the amount of weight the motor has to lift. Other elevators use hydraulic power. These elevators rest on a plunger that is powered by a heavy pump, which operates on the same principle as your car jack. Some workers are involved in the installation of escalators. They position the steel frame, the individual steps, the tracks, and the various parts of machinery and electronics. Workers might also work with other equipment like industrial elevators, moving sidewalks, dumbwaiters, and equipment for making structures handicapped accessible. Experienced elevated installers and repairers can become adjusters who make final adjustments to the equipment after it has been installed. They ensure that all the equipment is working smoothly and as planned. After it is up and running, elevators require periodic maintenance like oiling, replacing parts, and checking for potential problems. Workers then take preventative measures and may be called in when problems do occur. Most major repairs like installing new cables or doors are done by a service team. Major repairs often require heavy equipment like blowtorches or rigging that an average installer doesn’t have. Service teams might also do remodeling work on older buildings like installing new machinery or pumps. The majority of workers in this area usually focus on one area: maintaining existing equipment, installing new equipment, or repairing. Individuals who specialize in maintaining or repairing need to know more about electrical systems because a lot of their time will be spent pinpointing specific problems. Adjusters also need to know a lot about computers and electrical systems to do their job effectively. Generally elevator installers and maintainers work normal hours, though this may not always be case. For instance they may have to work overtime to make repairs in busy establishments. Some repairers may be on call around the clock even if they only work a normal eight hours. Installers usually work in teams, but maintainers usually work alone. They usually have a few elevators on their rotation that they consistently maintain, check, and repair over long periods of time. This work can be hazardous. Workers need to transport heavy material and equipment, and may have to work in confined spaces like shafts. They risk injury from falling, electrical shock, and muscle injuries. Since most work is completed inside, workload is less dependent on weather conditions than in other occupations in the construction industry. Career Training and Job Qualifications The majority of workers in this field start out by finding a job through their regional chapter of the International Union of Elevator Constructors. Individuals looking to be apprentices need to be eighteen or older, be a high school graduate or have an equivalent degree, be physically fit, and have a passing grade on a skills assessment. Most apprenticeship programs are run by regional administrators from both employers and the union. The apprentice gains a very comprehensive education in all areas of installation, maintenance, and repair. The programs consist of both practical training and coursework in reading blueprints, electrical theory, math, physics, safety guidelines, and simple first aid. Some establishments, like independent contractors, that are not union-run may offer training programs. The first six months of an apprentice’s training is a trial period where the apprentice is under close supervision. If the apprentice gets through that time they have four years in which to become qualified. This qualification requires a passing grade from a test given by the National Elevator Industry Education Program. Prospective elevator installers and repairers may also need to be certified by their local state or town. The National Association of Elevator Contractors offers the designation of Certified Elevator Technician to workers both in and out of the union. Usually apprentices start out as helpers to professionals. They are given simple tasks like transporting materials and equipment, securing rails, and putting together elevator parts. As they learn they will learn how to do the electrical aspects of the job and other complex tasks. Potential elevator technicians can maximize their employability by having prior experience. This might come from high school classes in shop, math, or physics. Also, new technology is making this industry more complex and so workers might want to gain additional education by taking classes in electronics at a vocational school or junior college. The more education you have, the better the job prospects. Many employers offer training to elevator technicians in new techniques or technological innovations. Manufacturers might offer training as well so technicians can know all about their individual product. Oftentimes unions offer correspondence training courses as well and encourage their members to be as knowledgeable and as up-to-date as possible. Continuing education can greatly enhance opportunities for advancement. Advancement could mean becoming an adjustor. Or a worker might be given extra responsibility as a supervisor or mechanic-in-charge. Some workers move away from technical work to become a salesperson, inspector, or design new products. Job and Employment Opportunities This is an occupation of limited size and analysts don’t expect a lot of job growth. The vast majority of elevator technicians are members of a union and have invested a lot in their education and so there isn’t very high turnover. Relatively high earnings and good health and retirement benefits are further inducements for workers to stay in this occupation. Prospective workers can maximize their opportunities by earning qualifications in electronics. Job growth is projected to be about average in coming years. Most new jobs will be created by increasing commercial construction like department stores and office buildings that are multi-story. Other jobs will be created as old equipment needs to be replaced by newer models or as stores or companies want a new look. Equipment will also have to be updated with computerized controls. Since it is always imperative that elevators are safe and operational, this occupation will not be as susceptible to fluctuations in the economy as other occupations in the construction industry. Historical Earnings Information Elevator technicians are paid hourly. The majority of workers earned between $20.10/h and $31.70/h in 2002 with a median of $26.00/h. The lowest tenth on the pay scale made under $14.60/h and the highest tenth made over $36.80/h. Earnings for various special trade contractors had a median of $26.60/h. Salaries are supplemented by good health and retirement benefits and free continuing education programs.
ESSENTIALAI-STEM
In this blog, I am going to show you how to set up a stable deployment environment and deployment of Fineract 1.x along with the Mifos X community web app(old) on AWS. I’ve divided the entire process into a series of steps as shown below: 1. Set up AWS Lightsail instance with Linux OS & the LAMP stack 2. For networking, set up a Static IP to later allow a domain of your choice to resolve to the community app, publicly accessible. 3. Connect to your Lightsail Instance via SSH 3. Deploying Fineract 1.x 4. Deploying the community web app on the Lightsail instance Few Notes: * Checking the Database * Checking Logs * Common Deployment Issues and Solutions Few Resources: Muellners Repositories We work on a monthly Rebase to the upstream codebase and hence our repositories are quite updated literally. Community Web App: https://github.com/muellners/community-app Fineract 1.x: https://github.com/muellners/fineract Step 1: Set Up AWS Lightsail Instance Set Up an AWS Lightsail Instance with the appropriate stack. CREATE AN INSTANCE: You need to set up a Lightsail instance which is a virtual server used to host your application. 1. First, Login to Amazon AWS Console using your credentials. **Note:** You ought to have access to a ‘root’ user that you created when you signed up for AWS console. If you are not the root user, an IAM User account (hopefully your organization Admin has properly allocated roles and policies) will also let you access your AWS console. With IAM user, you will use the following to sign in: * Account ID or Alias * Email * Password 2. Next, go to “Build a solution > Build using virtual servers with Lightsail” 3. Then, select “LAMP (PHP7)” as a blueprint. 4. When you’re sure you’ve chosen your instance location, picked your instance image and plan, click on the “Create Instance” button. SETUP STATIC IP Remember to set up a Static IP to this instance. It will help you in many ways. See [this article] for instructions on how to create a static IP for any Lightsail Instance. SSH TO INSTANCE Connecting to the Lightsail Instance via SSH: The following steps involve either deploying the community web app or Fineract 1.x. In order to perform them, you will need to create an SSH connection with your Lightsail instance so that you can interact with it. There are multiple ways to do so, but what I prefer is connecting with an SSH client, using an SSH key. * Assuming you are logged into your Amazon Console already, you can get/download your key by going to [this link]. * Depending on your OS, follow the instructions here to connect with an SSH client. Step 2: Deploy Fineract 1.x To deploy Fineract 1.x on AWS Lightsail, you would have to build a jar file of the project and run it on the Lightsail instance. 1. First, connect to the Lightsail instance as I specified in the previous step. Take note that version 8 of mysql was automatically installed when I chose to create the instance with the LAMP stack. By the time you read this, you might have version 8 or greater installed on your instance if you chose the LAMP stack option like I did. If this is the case, you will have to reinstall or install an additional version of mysql manually, choosing version 5.7 this time. Else, you will be unable to run the jar file in the end. 2. Next, follow [these instructions] to install the remaining requirements on the server. This includes Java >= 11 and MySQL 5.7. You will also have to [install docker] depending on the Linux distro running on your instance (if you intend to run the MySQL server in a container). 3. Clone the [muellners fineract 1.x repository] available here at https://github.com/muellners/fineract, preferably in the directory “~/htdocs” 4. After this, you have to create the required databases as shown [here] by running the following commands at the root of the fineract project. 5. You are now ready to [build the jar file]. This can be done by running this command 6. If you’re still at the root of the fineract project on your Lightsail instance, you can start the application using the jar file by running this command. This runs the application on the port 8443. 7. The nohup tool can be used to keep the process running in the background even after the shell is exited. Since it is part of GNU coreutils, you don’t have to install it. It comes pre-installed in all Linux distributions. Step 3: Deploy the community web app: After connecting to your instance, deploying this shouldn’t be very hard. All you have to do is build the project and host the built files. 1. The very first step is to follow the instructions about building the project from the source on the [Muellners Community Web App repository]. 2. Instead of “grunt serve”, run the “grunt prod” command to build the code for production deployment. 3. Then, replace the contents of the directory “~/htdocs” with the contents of “PROJECT_PATH/dist”. Where “PROJECT_PATH” refers to the root directory of your cloned version of the community web app on your AWS Lightsail instance. 4. And voila! You should now see your hosted version of the community web app when you go to the static IP address representing your Lightsail instance in your browser. It should look like this: I have replaced the logo of this community app as we have been enhancing this system’s capabilities along with another open source project [Finscale]. (Optional) Adding DNS records (If community app is public over the Internet) It’s always preferable to point a domain name or a subdomain name, to your Lightsail instance and to use this to access the community app. This provides security settings, HTTPS, and certain benefits of caching. Again, there exist numerous resources that can be used to achieve this, but I have chosen to use Cloudflare. To add records manually for the domain or subdomain you want to point to this instance, 1. Add your domain to Cloudflare. 2. Follow [this procedure] to add a new record. You will have to set up an A record and point the domain to the static IP you generated in Step 1. When all this is done, you should now be able to log into the front end application using the URL https://yourdomain.com/?baseApiUrl=https://yourdomain.com:8443/fineract-provider&tenantIdentifier=default Checking the Database Connectivity Issues 1. When trying to run the built jar for fineract 1.x for the first time, you might encounter database connectivity issues such as: Or a certain transaction error with the Drizzle driver. Try: * Checking your MySQL username and password match the default (`root` and `password` respectively). * Verifying you are using version 5.7 of MySQL 2. You can check your database using phpMyAdmin. After connecting to your instance via SSH, you may encounter the following error while trying to access phpMyAdmin from your browser using the URL “https://yourdomain.com/phpmyadmin”: This can be overcome by: * Connecting to your instance via SSH, this time using this command `ssh -N -L 8888:127.0.0.1:80 -i yourLightsailInstanceKey [email protected]` * You should now be able to see the phpMyAdmin page when you retry the URL mentioned above. Checking Logs How to check logs? Well, logs are important and occasionally, you may need to check the logs of your deployed version of Fineract 1.x. This is because they will help you to discover and solve issues quickly. They are most commonly used to discover and solve bugs in a production environment. To check the logs of the application, run this command: Common Deployment Issues and Solutions 1. “Couldn’t Connect to Server. Make sure you are using Correct Server Settings” You might come across this error on the UI when attempting to log in. The most common reasons for this error are: The backend is not running. You specified the wrong base API url in your browser Your internet connection is unstable. 2. You may notice that after deployment, there are functional feature failures. E.g Each date in a loan schedule jumps one day backwards or generally, does not conform to the dates defined by the loan product. In the image above, the first repayment date was supposed to be on 14 September and the second on 29 September and so on. These shifts in loan schedule dates occur due to a timezone offset and can be resolved by setting up your tenant timezone configuration based on the hosted environment of your deployment. * You can do that by changing the tenant timezone in fineract_tenants.tenants table from Asia/Kolkata (default) to UTC. There are many such deployment related concerns that we have covered in another article. I hope you enjoyed this guide. Feel free to write to us or join the discussion on Apache Fineract channel on Muellners Foundation’s slack workspace. And don’t forget to subscribe. 0 Shares: You May Also Like
ESSENTIALAI-STEM
Microbots: Micro-Swimmers 0 369 In Context  • According to recent research, ‘Micro-swimmers’ may soon help with drug delivery. • The research aims at moving microbots into the bloodstream to deliver drugs. • The technique makes use of light as a fuel to induce the tiny robots to move in simulations About ‘Micro-swimmers’  • Made from the two-dimensional compound poly (heptazine imide) carbon nitride (aka PHI carbon nitride), these microbots are nothing like the miniaturised humans.  • They range from 1-10 micrometre (a micrometre is one-millionth of a metre) in size, and can self-propel when energised by shining light. • How do they swim across the blood? • The PHI carbon nitride microparticles are photocatalytic • Like in a solar cell, the incident light is converted into electrons and holes. These charges drive reactions in the surrounding liquid. •  The charges react with the fluid surrounding them. This reaction, combined with the particle’s electric field, makes the microbots (micro-swimmers) swim. • As long as there is light, electrons and holes are produced on the surface of the swimmers, which in turn react to form ions and an electric field around the swimmer • These ions move around the particle and cause fluid to flow around the particle.  • So this fluid flow causes the micro-swimmers to move. Source:TH
ESSENTIALAI-STEM
Excelitas Technologies Corp. Datasheets for Spark Plugs Spark plugs are used in engine cylinders to ignite the fuel in an internal combustion engine while withstanding high pressures and temperatures. Spark Plugs: Learn more Product Name Notes Over-Voltage Spark Gaps Excelitas ceramic-metal overvoltage spark gaps consist of two refractory metal electrodes in a hermetically sealed pressurized envelope. Overvoltage gaps are most often used in crowbar circuits to divert the energy... Triggered Mini Spark Gaps and Transformers Excelitas Mini-Triggered Spark Gaps are designed for high-reliability switching up to 4kV and 10kA. Constructed of hermetically sealed ceramic-metal and filled with pressurized gas, they are typically used for activating... Triggered Spark Gaps Excelitas Triggered Spark Gaps consist of three electrodes in a hermetically sealed, pressurized envelope. Their applications fall into two broad categories, each involving capacitor switching at low impedance. A protective... Triggered Vacuum Spark Gaps Excelitas triggered vacuum gaps are the ideal high-voltage switches for applications where a wide operating voltage range is desired. The low end of the operating voltage range is independent of...
ESSENTIALAI-STEM
Mosquito Plant Health Benefits Naturalhealthmessage.com receives compensation from some of the companies, products, and services listed on this page. Advertising Disclosure mosquito plant health benefits The mosquito plant was around many years before insecticide sprays. Popular wisdom used sprays made with this plant as insect repellents. Its name pulegium is a Latin word that means fleas. The mosquito plant’s medicinal properties have been known for thousands of years. Dioscorides, the great Greek physician and botanist of the 1st century, said of this plant that “it has the strength to heal, to achieve weight loss, and to digest.” Indeed, the mosquito plant helps in these cases. However, it would be better not to have to use it to treat the symptoms. Avoiding excess is wiser than healing the consequences, even with a natural remedy like herbal tea. Mosquito Plant Scientific Facts 1. Other names: Mock pennyroyal, European pennyroyal, squaw balm, squawmint, tickweed. 2. French: Pouliot. 3. Spanish: Poleo. 4. Environment: It grows in cool places, sometimes near brooks, all over Europe. The mosquito plant is also widespread in America. 5. Description: The vibrant plant of the Labiatae family is very aromatic and grows from 25 to 40 cm high. Its flowers grow in the axils of the leaves, and are lilac, pink or white. Their aroma resembles those of lemon rind and peppermint. 6. Parts of the plant used medicinally: The whole plant. Healing Properties and Warning mosquito plant as an insect repellant The whole plant contains an essential oil (0.5%-1%) based on pulegone, an unsaturated ketone. It also contains menthone, limonene, and other ketones. Its properties are the following: 1. Digestive and stomachic invigorator: This plant promotes digestive processes, increases the production of juices (gastric, pancreatic, intestinal), and stimulates the stomach and the small intestine action. It has carminative properties, combats intestinal fermentation, and eases headaches caused by digestive disorders. It also increases bile secretion. Thus, its use is recommended whenever promoting digestive processes is required, such as hypochloridria, heavy digestion, excess gas, and gall bladder disorders. 2. Expectorant and antitussive: It is helpful for colds and whooping cough. 3. Emmenagogue and antispasmodic: It promotes menstruation and eases the pain which may accompany it. 4. Vermifuge: In order to expel intestinal parasites, drink a cup daily, with an empty stomach, for five days. 5. Antiseptic: It is beneficial in mouth rinses for bad breath or pyorrhea, and also to wash skin wounds. 6. Insecticide: Put in your wardrobe some small bags with this plant to repel moths. You can also kill pet fur parasites by rubbing pet hair with a mosquito plant concentrated infusion. Pennyroyal is primarily used for all lung infections and fevers. It drives out inflammation and heat through the skin and helps circulation. A warm infusion used liberally will stimulate sweating. It is excellent for treating colds, nervousness, hysteria, cramps, intestinal pains, and nervous headaches. It is also used for colic, lung congestion, and convulsions. A warm infusion helps stimulate menstruation. Hot footbaths of pennyroyal tea can be used to bring on menstrual flow. Therefore, it helps relieve menstrual cramps and flow. However, it should not be used by individuals with a propensity toward extreme menstrual cycles. In external applications, pennyroyal can be used to repel insects like fleas, flies, and mosquitoes because it is a potent-smelling mint. It can also be used for itching and skin conditions. NOTE: The European species (Mentha pulegium) and the American species (Hedeoma pulegioides) have similar properties. Therefore, either one is beneficial. WARNING! Although this plant is not advised against gastro-duodenal ulcers, it must be used with caution and never in a period with ulcer attacks. The use of the plant, and particularly its essence in very high doses, may be dangerous. Avoid this plant when pregnant! How to use This Plant 1. Infusion: After boiling a liter of water, add 10-20g of the plant and steep for some minutes. It may be sweetened with honey. As a digestive invigorator, drink a cup after every meal. For bronchial afflictions or menstrual disorders, drink a hot cup every other hour. 2. Mouth rinses with a more concentrated infusion (30g per liter). 3. Cleansings with the infusion as mentioned earlier. American pennyroyal facts Tincture: Take thirty to sixty drops regularly. Fluid Extract: Take one to two drops frequently. Powder: Regularly take three to ten #0 capsules (20 to 60 grains). American Pennyroyal American pennyroyal grows in North America and is very similar to mosquito plants in appearance and properties. North American natives used this plant to ease headaches and menstrual pains and heal wounds. REFERENCES • George D. Pamplona-Roger, M.D. “Encyclopedia of Medicinal Plants.” George D. Pamplona-Roger, M.D. Encyclopedia of Medicinal Plants. Ed. Francesc X. Gelabert. vols. 2 San Fernando de Henares: Editorial Safeliz, 2000. 461,462. Print. • Vance Ferrell Harold M. Cherne, M.D. The Natural Remedies Encyclopedia [Book]. – Altamont, TN: Harvestime Books, 2010. – Vol. Seventh Edition: 7: pp. 173. Recommended For You
ESSENTIALAI-STEM
Don’t Send Them Here: Local Officials Resist Plans to House Coronavirus Patients In California and Alabama, plans to house evacuees with the virus in federal or state facilities are meeting with resistance from local political leaders. Get an informed guide to the global outbreak with our daily Coronavirus newsletter. The scramble to find places to quarantine American coronavirus patients is beginning to run into resistance from local officials who do not want the patients housed in their backyards. The city of Costa Mesa, Calif., has gone to court to block state and federal officials, at least temporarily, from placing dozens of people evacuated from Asia in a state-owned residential center in their community. A hearing on the issue in federal court is scheduled for 2 p.m. Pacific time on Monday. And Alabama officials have reacted with alarm to news that coronavirus patients could be sent as early as Wednesday to a Federal Emergency Management building on a former army base in Anniston, Ala., about 90 miles west of Atlanta. Uncertainty and distrust are stymieing federal attempts to plan for quarantining Americans who are infected with the coronavirus. At least 34 people in the United States have tested positive for the virus, most of them after traveling abroad, and the authorities have warned of the seriousness of the threat. So far, no one in the United States has died of the disease, and at least four patients in this country are said to have fully recovered. Yet local officials have expressed concerns that little is being done to prepare for a potential influx of patients, and that much is still unknown about the virus, which has killed at least 2,461 people, all but 19 of them in mainland China. transcript Voices like these from Chinese citizens are very rare. People who are willing to speak out about the government’s attempts to control news about the deadly coronavirus. They asked to remain anonymous, because what they’re doing could put them and their families at great risk. But these people are part of a new wave of Chinese citizens, fighting to get the message out in a country that aggressively censors information. Accounts or messages like these calling for free speech are quickly scrubbed from the internet. Or videos like this, showing people frustrated about life under lockdown. [clanging] Posted online one day, but gone the next. But the crisis over the coronavirus is changing the landscape, for now at least. Everyday citizens are preserving and reposting information the government doesn’t want out there. Experts say this kind of digital resistance is happening at a scale they’ve never seen before. Social media networks like YouTube, Facebook and Twitter are blocked in China. But internet savvy people use techniques that allow them to repost censored content to these platforms, while staying under the radar of authorities. They’re creating a visual archive by preserving videos like this one, showing overwhelmed hospitals. [screaming] And they’re reposting people’s personal stories. Some are also turning to less obvious platforms, including GitHub, which is a site mostly used by coders. Another taboo Chinese citizens are pushing back on? They’re making open and widespread calls for freedom of speech. These were triggered by the death of Dr. Li Wenliang. He was an early whistleblower who warned about the virus, and was punished by officials for speaking out. He died in early February from the coronavirus. Right after his death, the hashtag “I want freedom of speech” started to trend on Weibo, a Chinese social media site. Then, it was quickly censored by the government. Dr. Li’s become an icon in the online fight for freedom of speech between censors and citizens. So, who’s winning? For now, citizens are staying a step ahead of the authorities. But a renewed government crackdown could test the strength of this digital resistance. At a hastily called news conference on Saturday, elected officials in Costa Mesa, a city of 113,000 people about 40 miles south of Los Angeles, expressed opposition to a state plan to send dozens of patients to the Fairview Developmental Center, a nearly vacant state hospital formerly used for people with developmental disabilities. “We’re a compassionate community,” said the city’s mayor, Katrina Foley. “But we are not going to continue to be the place where everybody drops off their crises and expects us to correct it.” The patients involved would be people now quarantined at Travis Air Force Base who have tested positive for the coronavirus but do not have severe symptoms requiring hospital care. Several people confirmed to have the virus are quarantined in their homes across the United States, but that is not an option for some, including people who do not live alone; the authorities are trying to find a secure place for them to stay. Wherever they go, they would be kept away from contact with the public until the danger of contagion passes. Updated Feb. 29, 2020 Local officials in Costa Mesa were told of the plan on Thursday night, and filed a request for an emergency injunction in federal court on Friday. The court issued a temporary injunction, pending the hearing on Monday, when a judge will consider whether to extend it. “Of course we want people to be cared for,” Ms. Foley said in an interview on Sunday. “We just don’t think this is an appropriate site,” she said, noting that it was next to a golf course, a soccer field and a densely populated residential neighborhood. The mayor, who is running for a State Senate seat as a Democrat, said she was told on a conference call with federal officials on Friday that the military wanted the coronavirus patients moved off all its bases to eliminate the risk that troops would be exposed. “I don’t want anyone exposed, military or otherwise,” Ms. Foley said. The city’s 14-page request for a restraining order lists as defendants a group of state and federal actors, including the Defense Department, the Air Force, the Centers for Disease Control and Prevention, the State of California and Gov. Gavin Newsom’s Office for Emergency Services. “Plaintiffs now seek to prevent Costa Mesa from becoming ground zero to a state and potentially nationwide public health crisis caused because the state and federal governments have not sought to include local officials and emergency personnel in the planning and execution of their efforts,” the city told the court in its filing. The federal government responded by telling the court that the city’s request was “ill-informed and legally baseless” and that it “endangers the safety and well-being of the American people” by interfering with state and federal efforts to cope with the crisis. “Instead of providing public-health expertise (or any expertise), plaintiffs ask this court to rely on internet statements and speculation,” the federal response said, adding that the center in Costa Mesa “would be better for public health than the alternatives, which consist of using hospitals or home isolation.” The city appeared to acknowledge that it might be powerless to stop the state from sending patients to the center. In its court filing, it instead asked the court to order that “the state and federal government stop acting under the cover of darkness,” and that they provide the city’s emergency personnel with appropriate training to deal with the coronavirus. The question of where to house infected patients gained urgency on Saturday after the federal government indicated that people with the virus who were evacuated from the Diamond Princess cruise ship in Japan could not remain at the air base. “These people are at Travis Air Force Base right now — why can’t they stay there?” said Jennifer L. Keller a lawyer in Irvine, Calif., who helped Costa Mesa file for the injunction. The city questioned whether the Fairview center was in good enough repair to be used for quarantine housing. As recently as Feb. 5, the city said in its court filing, state officials deemed it unsuitable for an emergency homeless shelter without extensive renovations. In her ruling on Friday, U.S. District Judge Josephine L. Staton wrote that the state’s plan to move patients to Costa Mesa as early as Sunday “without conducting an adequate site survey or providing sufficient safeguards against transmission of the disease” constituted an immediate threat. Gov. Kay Ivey of Alabama said in a statement on Sunday that she learned late Friday night about a plan by the Health and Human Services Department to relocate some patients evacuated from the Diamond Princess to the former army base in Anniston. She quickly informed Alabama’s senators and members of Congress, prompting two rounds of conference calls among Alabama elected officials, federal health officials and the White House. “I made it abundantly clear that while the state of Alabama wants to work closely with the Trump administration to assist fellow Americans who may have tested positive for the coronavirus, there were some grave concerns about why the site in Anniston was chosen and how, logistically, this would play out,” the governor’s statement said. “First and foremost, my priority is to protect the people of Alabama.” The Alabama Department of Public Health later issued a statement saying it had been assured by federal officials that the plan to house patients in Anniston was only a backup plan in case facilities in other states could not handle the load, and that no patients were scheduled to be sent to Alabama.
NEWS-MULTISOURCE
(OCD) Obsessive Compulsive Disorder  What is it? We all have habits of some description, such as having to double check the front door is locked or making sure the TV is unplugged from the wall before going to bed. For people who have obsessive-compulsive disorder (OCD), these habits ‘take over’ and begin to seriously impact on their quality of life. Their recurrent obsessions and /or compulsions are severe enough to cause considerable distress and interfere with the person’s functioning at work and at home with their family, and in social activities. Obsessions are unwanted, intrusive thoughts, ideas, urges, impulses or worries that run through the person’s mind over and over again. Often the ideas do not make any sense, or are unpleasant or counter to the person’s values or beliefs. They are accompanied by fear, guilt, worry, sadness or anxiety. Common obsessions include: • repeated impulses to kill someone you love (even though that is the last thing you’d want to do in reality); • worries about dirt, germs, contamination and infection; • recurrent thoughts that something has not been done properly, even though you know it has; • fear about losing something important; • fear about being responsible for keeping someone safe / preventing harm; • ideas that certain things must be in a certain place. Compulsions or rituals Compulsions or rituals are repeated behaviours or mental actions that are used to reduce anxiety or discomfort caused by an obsession. The purpose or intention behind a ritual is to ‘undo’ or ‘neutralise’ the obsession. Most people recognise that these rituals are excessive but still feel compelled to do them in a particular way, according to their own rules, like checking the car alarm six times. Common rituals are: hand washing, showering, cleaning, touching certain objects, repeating an action to undo a thought or image, placing things in a particular order, collecting items, repeating certain phrases, exchanging a ‘good’ thought for a ‘bad’ one. Compulsions may occur only now and then, or they may take up many hours every day. OCD is often a long-term condition that fluctuates over time. The person with OCD may go to great lengths to hide the problem so that the disorder goes unnoticed, even by family members. However, when the symptoms start to impact on different aspects of a person life, sometimes becoming their major life activity, OCD becomes difficult to conceal. How does OCD begin? Lots of people have intrusive thoughts that are similar to those experienced by people with OCD, such as thoughts of doing something violent or verbally blasting someone or being extremely rude. However, people who don’t go on to develop OCD seem to understand that while their intrusive thoughts are unexpected or odd, they don’t really warrant attention and are easy to dismiss. In contrast, people who go on to develop OCD appear to respond to these intrusive thoughts as if they represent real threats and have to be taken seriously. They try and stifle the thoughts. This usually has the opposite effect - the thoughts appear more often. In addition, people who are afraid of their intrusive thoughts or images start to avoid situations and /or objects that might trigger the thoughts (for instance, the kitchen area where there are sharp knives, provoking thoughts of stabbing someone). This often does not work, so the individual tries to undo them using behavioural or mental rituals. Unfortunately, avoiding situations and compulsions prevent the individual from experiencing their thoughts fully and getting used to them so that they no longer cause discomfort or distress. In this way obsessions and compulsions can become an increasingly deep-rooted pattern, and the person never learns that, by tolerating the obsessions without avoiding situations or engaging in rituals, their fears will reduce over time. Treatment of OCD Many people can benefit from treatment using Cognitive Behavioural Therapy (CBT) and/or medication. Essentially there are two approaches within CBT for OCD. 1) The behavioural approach aims to disconnect obsessive thoughts, images and impulses from the fear and distress usually associated with them. This is achieved by: • gradual exposure to a list of feared situations (planned carefully in advance with your therapist); and • prevention of rituals and avoidance behaviours. 2) The cognitive approach helps people to examine their interpretations and beliefs, and to develop alternative ways of thinking about intrusive thoughts and images that are far less threatening. Basic elements are: • Identification of irrational thoughts and beliefs • Questions examining the logic for the interpretations (‘how have you arrived at this conclusion?’) • Techniques, such as conducting your own behavioural experiment to test out ideas relating to obsessions or estimating areas of responsibility for a feared event, that can help challenge thoughts or beliefs (‘provide a reality check’). Self-help and finding out more... In this short video from NHS Choices, someone who has experienced OCD talks about how Obsessive Compulsive Disorder has affected her, how she has dealt with it, and the support available to people with OCD. You might also find the following self-help guide to OCD helpful in learning more about your own situation. Accessing Talking Therapies in Wirral If you feel that talking therapies could help you, please talk to your GP about a referral to our service. We operate from GP Practices and other community locations across Wirral, so we're able to provide support near to where you live. Find a support group, develop an interest, get active, reconnect... Our Wirral HelpFinder is a mental health and wellbeing directory of other local organisations and resources that can provide support to people affected by common mental health problems such as anxiety and depression.   Need Help Now
ESSENTIALAI-STEM
Allopregnanolone, the Neuromodulator Turned Therapeutic Agent: Thank You, Next? Pharmacological treatments, including finasteride and oral contraceptives, that inhibit 5α-RI, which results in a blood and brain allopregnanolone decrease also affect subunit expression of GABAA receptor and are associated with mood symptoms and suicide and are part of post-finasteride syndrome. Post-finasteride syndrome, in addition to depression, anxiety and cognitive deficits also induces sexually-related side effects, such as loss of libido, erectile dysfunction, decreased arousal and difficulty in achieving an orgasm that persist despite drug withdrawal. Evidence suggests during pregnancy and across the estrous cycle a switch of extrasynaptic δ with synaptic γ2 subunits may be operative. Rapid and dynamic changes among synaptic and extrasynaptic GABAA receptor conformation in areas that regulate cognitive functions and emotions, including the hippocampus have been reported. Pinna G (2020) Allopregnanolone, the Neuromodulator Turned Therapeutic Agent: Thank You, Next? Front. Endocrinol. 11:236. doi: 10.3389/fendo.2020.00236 [Frontiers in Endocrinology]
ESSENTIALAI-STEM
Page:John Bunyan's Dream Story.djvu/145 Rh Then Mrs. Timorous returned to her own house. And Christiana and her boys went out hopefully and began their journey. And the sweet-faced maiden whose name was Mercy went with them. "I will be your companion even to the wicket gate and as much farther as the King will permit me to go," she said.
WIKI
Minimum Degree Some articles on degree, minimum degree, minimum: Degree (graph Theory) ... In graph theory, the degree (or valency) of a vertex of a graph is the number of edges incident to the vertex, with loops counted twice ... The degree of a vertex is denoted The maximum degree of a graph G, denoted by Δ(G), and the minimum degree of a graph, denoted by δ(G), are the ... In the graph on the right, the maximum degree is 5 and the minimum degree is 0 ... Line Graph Of A Hypergraph - Line Graphs of k-uniform Linear Hypergraphs, k ≥ 3 ... list of forbidden induced subgraphs for linear 3-uniform hypergraphs with minimum vertex degree at least 69 ... for linear k-uniform hypergraphs, no matter what lower bound is placed on the degree ... such that the consecutive diamonds share vertices of degree two ... Moore Graphs As Cages ... the number of vertices in a graph in terms of its maximum degree and its diameter, we can calculate via similar methods a lower bound on the number of vertices in terms of ... Suppose G has minimum degree d and girth 2k+1 ... Therefore, any Moore graph has the minimum number of vertices possible among all graphs with minimum degree d and diameter k it is a cage ... Famous quotes containing the words degree and/or minimum: As to the bride, she is blithe as the month; if one can compare in any degree a weed of December, with the fragrance of May; for a weed in truth it is, and a weed not in its first prime. Frances Burney (1752–1840) After decades of unappreciated drudgery, American women just don’t do housework any more—that is, beyond the minimum that is required in order to clear a path from the bedroom to the front door so they can get off to work in the mourning. Barbara Ehrenreich (20th century)
ESSENTIALAI-STEM
Hypophrenia– 3 Seccessful Cases Case 1 : One boy, white eyeball big, can’t walk at 3, low voice, either hot or cold on feet, loose stools. Morning formula as Buzhong yiqi decoction plus wuweizi, shanyao, to tonify spleen and lung, evening formula as liuwei dihuang pills plus wuweizi, niuxi, lurong to tonify liver and kidney. Less than 3 months, healed. Case 2: One boy can’t talk at 5 years old, every body believed he is handicapped. But inspection indicated his lung and kidney deficient, then apply Liuwei dihuang pills plus wuweizi, lurong, and buzhong yiqi decoction plus wuweizi. Over 2 months, qi and body developed stronger, can talk one or two words over half an year, can talk properly over one year. Case 3: Gao, girl, 6 y. first visit on 07.03.1974.  she had high fever 4 days after birth, accompanied by jaundice. After high fever and jaundice relieved, she had nodding head, shaking head symptoms. Convulsion at half year old and disappear at one, but then had nodding head, shaking head, dripping saliva,  hand twisted inward and shaking, uneven walking etc. at age of three became aphasia, at age of six, hypophrenia, no response to things. Red tongue and thread-wiry pulse. Diagnosis as liver wind, marrow insufficiency. Treatment principle: calm liver, benefit intelligence Formula: Shengzibeichi 62.5g,  shengzishiyin 62.5g, (生紫贝齿,生紫英石) shengshijueming 62.5g, zhenzhumu 31g, hanliancao 31g, hehuanhua 15.6g, baijili 25g, nuzhenzi 25g, yizhiren 25g, woniuke 12.5g, tianzhuhuang 12.5g, dannanxing 12.5g, tianma 18.8g, shexiang 1g, ground and make to honey powder, 6g per powder, in take twice per day, long term use. After half a year, intelligence improved significantly, can speak simple words, some response to things, can raise questions. Nodding, shaking head, shaking hands symptoms mainly controlled, other symptoms improved as well.  《中医历代医案精选》 TCM Clinical Cases Collection
ESSENTIALAI-STEM
Death penalty sought in deaths of Palm Springs officers (CNN)Riverside County District Attorney Mike Hestrin will pursue the death penalty against the man accused of killing two police officers in Palm Springs, California. John Hernandez Felix is accused of ambushing the officers on October 8 as they responded to a family disturbance call from a woman who said she was Felix's mother. Officer Jose Gilbert Vega, a 35-year veteran of the department was due to retire this year; Officer Lesley Zerebny was the mother of a 4-month-old daughter. Why the death penalty call? Felix, 26, was charged with two counts of murder. He faces special circumstance allegations attached to these charges: the murder of law enforcement officers and lying in wait. "Those allegations each make Felix eligible for the death penalty," authorities said. They say he is a convicted felon. Felix also was charged with three counts of attempted murder for allegedly opening fire on three other officers. One was wounded by gunfire, the two others were not hit. Authorities say Felix, who they said was wearing soft body armor, unlawfully possessed the ammunition and weapon. According to CNN affiliate KMIR, Felix has pleaded not guilty to all charges. Who made the decision? The choice to seek the death penalty was made after Hestrin met with other prosecutors to examine the evidence. "This was a heinous crime involving the murders of two police officers who were gunned down simply because they were police officers," Hestrin said. "The victims in this case were responding to a call for service and died in the line of duty protecting our community." The shootings left the quiet desert town 100 miles east of Los Angeles in mourning.
NEWS-MULTISOURCE
001package jmri.jmrix.ieee802154.swing.nodeconfig; 002 003import java.awt.Container; 004import java.awt.FlowLayout; 005import java.awt.event.WindowEvent; 006import javax.swing.BoxLayout; 007import javax.swing.JLabel; 008import javax.swing.JPanel; 009 010import jmri.jmrix.ieee802154.IEEE802154Node; 011import jmri.jmrix.ieee802154.IEEE802154TrafficController; 012import jmri.util.swing.JmriJOptionPane; 013 014/** 015 * Frame for Adding new Nodes 016 * 017 * @author Bob Jacobsen Copyright (C) 2004 018 * @author Dave Duchamp Copyright (C) 2004 019 * @author Paul Bender Copyright (C) 2013,2016 020 */ 021public class AddNodeFrame extends jmri.util.JmriJFrame { 022 023 protected javax.swing.JTextField nodeAddrField = new javax.swing.JTextField(); 024 protected javax.swing.JTextField nodeAddr64Field = new javax.swing.JTextField(); 025 protected javax.swing.JButton addButton = new javax.swing.JButton(Bundle.getMessage("ButtonAdd")); 026 protected javax.swing.JButton cancelButton = new javax.swing.JButton(Bundle.getMessage("ButtonCancel")); 027 028 protected IEEE802154Node curNode = null; // IEEE802154 Node being editted 029 030 private IEEE802154TrafficController itc = null; 031 032 /** 033 * Constructor method 034 * @param tc tc for connection for node 035 */ 036 public AddNodeFrame(IEEE802154TrafficController tc) { 037 super(); 038 addHelpMenu("package.jmri.jmrix.ieee802154.swing.nodeconfig.AddNodeFrame", true); 039 itc = tc; 040 } 041 042 /** 043 * Initialize the config window 044 */ 045 @Override 046 public void initComponents() { 047 setTitle(Bundle.getMessage("AddNodeWindowTitle")); 048 Container contentPane = getContentPane(); 049 contentPane.setLayout(new BoxLayout(contentPane, BoxLayout.Y_AXIS)); 050 051 // Set up node address and node type 052 JPanel panel = new JPanel(); 053 panel.setLayout(new BoxLayout(panel, BoxLayout.Y_AXIS)); 054 panel.add(new JLabel(Bundle.getMessage("LabelNodeAddress") + " ")); 055 panel.add(nodeAddrField); 056 /*nodeAddrField.addActionListener(new java.awt.event.ActionListener() { 057 058 @Override 059 public void actionPerformed(java.awt.event.ActionEvent e) { 060 } 061 });*/ 062 nodeAddrField.setToolTipText(Bundle.getMessage("TipNodeAddress")); 063 panel.add(new JLabel(Bundle.getMessage("LabelNodeAddress64") + " ")); 064 panel.add(nodeAddr64Field); 065 nodeAddr64Field.setToolTipText(Bundle.getMessage("TipNodeAddress64")); 066 /*nodeAddr64Field.addActionListener(new java.awt.event.ActionListener() { 067 068 @Override 069 public void actionPerformed(java.awt.event.ActionEvent e) { 070 } 071 });*/ 072 073 initAddressBoxes(); 074 contentPane.add(panel); 075 076 // Set up buttons 077 JPanel panel4 = new JPanel(); 078 panel4.setLayout(new FlowLayout()); 079 addButton.setText(Bundle.getMessage("ButtonAdd")); 080 addButton.setVisible(true); 081 addButton.setToolTipText(Bundle.getMessage("TipAddButton")); 082 addButton.addActionListener((java.awt.event.ActionEvent e) -> { 083 addButtonActionPerformed(); 084 }); 085 panel4.add(addButton); 086 panel4.add(cancelButton); 087 cancelButton.setText(Bundle.getMessage("ButtonCancel")); 088 cancelButton.setVisible(true); 089 cancelButton.setToolTipText(Bundle.getMessage("TipCancelButton")); 090 panel4.add(cancelButton); 091 cancelButton.addActionListener((java.awt.event.ActionEvent e) -> { 092 cancelButtonActionPerformed(); 093 }); 094 contentPane.add(panel4); 095 096 // pack for display 097 pack(); 098 } 099 100 /** 101 * Method to handle Add button 102 */ 103 public void addButtonActionPerformed() { 104 // Check that a node with this address does not exist 105 String nodeAddress = readNodeAddress(); 106 if (nodeAddress.equals("")) { 107 return; 108 } 109 // get a IEEE802154 Node corresponding to this node address if one exists 110 curNode = (IEEE802154Node) itc.getNodeFromAddress(nodeAddress); 111 if (curNode != null) { 112 JmriJOptionPane.showMessageDialog(this, 113 Bundle.getMessage("Error1",nodeAddress), 114 Bundle.getMessage("AddNodeErrorTitle"),JmriJOptionPane.ERROR_MESSAGE); 115 log.error("Error creating IEEE802154 Node, Node exists."); 116 return; 117 } 118 // get node information from window 119 120 // all ready, create the new node 121 curNode = itc.newNode(); 122 if (curNode == null) { 123 JmriJOptionPane.showMessageDialog(this,Bundle.getMessage("Error3"), 124 Bundle.getMessage("AddNodeErrorTitle"),JmriJOptionPane.ERROR_MESSAGE); 125 log.error("Error creating IEEE802154 Node, constructor returned null"); 126 return; 127 } 128 this.dispatchEvent(new WindowEvent(this, WindowEvent.WINDOW_CLOSING)); 129 } 130 131 /** 132 * Method to handle cancel button 133 */ 134 public void cancelButtonActionPerformed() { 135 // Reset 136 curNode = null; 137 // Switch buttons 138 addButton.setVisible(true); 139 cancelButton.setVisible(false); 140 this.dispatchEvent(new WindowEvent(this, WindowEvent.WINDOW_CLOSING)); 141 } 142 143 /** 144 * Read node address from the nodeAddressField or nodeAddr64Field 145 * as appropriate and return as a string. 146 * 147 * @return String containing the short (two byte) address of the node. 148 * if the two byte node address is either "FF FF" or "FF FE", 149 * returns the long (64 bit) address. 150 */ 151 private String readNodeAddress() { 152 String addr = nodeAddrField.getText(); 153 if (addr.equals("FF FF ") || addr.equals("FF FE ") || addr.equals("")) { 154 addr = nodeAddr64Field.getText(); 155 } 156 return (addr); 157 } 158 159 // Initilize the text boxes for the addresses. 160 protected void initAddressBoxes() { 161 nodeAddrField.setText(""); 162 nodeAddr64Field.setText(""); 163 } 164 165 private static final org.slf4j.Logger log = org.slf4j.LoggerFactory.getLogger(AddNodeFrame.class); 166 167}
ESSENTIALAI-STEM
 how to tell if a metal ore is silver MB5X Grinding Mill MB5X Pendulous Hanging Grinding Mill represents the most advanced grinding processing technology. The brand-new structural design ; Hammer Mill Hammer Mill is specially designed for coarse powder grinding and small size of sand production. Hammer Mill adopts some principles of crusher. Because of its special design,… Ball Mill Ball mill has been used in many industries for a long time, the technology is quite mature already. But there are still some problems, such as, lots of investors expressed… MTM Series Trapezium Mill Raymond mill is ever one classic powder grinding machine in the past. And most of modern mill are from it and MTM series milling machine is the most successful one. It optimized… LM Vertical Roller Mill Vertical Roller Mill is our newly-launched product which is applied as a solution to the technical issues such as low output and high energy consumption in the ordinary industry.… MTW Series Trapezium Mill MTW Series European Trapezium Grinding Mill (MTW Raymond Mill) is developed on the basis of our experts' long-term R & D experience, structure & performance analyses of traditional… How can you tell if silver is real or plated? The method used to extract a given metal from its ore depends upon the reactivity of the metal and so how stable the ore is. In each case, the metal ion in … How to Find Copper, Iron, Tin, Silver, Obsidian, and Black ... Silver processing, preparation of the ore for use in various products.. Silver has long been valued for its white metallic lustre, its ability to be readily worked, and its resistance to the corrosive effects of moisture and oxygen.The lustre of the pure metal is due to its electron configuration, which results in its reflecting all electromagnetic radiation of wavelengths longer … How to Find Copper, Iron, Tin, Silver, Obsidian, and Black ... Silver is commonly extracted from ore by smelting or chemical leaching. Ore treatment by mercury amalgamation, such as in the patio process or pan amalgamation was widely used through the 1800s, but is seldom used today.. Silver is also produced during the electrolytic refining of copper and by application of the Parkes process on lead metal obtained from lead … How to Identify Silver Ore | Our Pastimes Silver is a good thermal conductor. So if you put an ice cube on top of your silver item, then the ice cube will start to melt quickly. An ice cube placed on silver will melt quicker than on iron and a little quicker than on copper. The easiest way to conduct this test is to place a real silver coin and a potentially fake silver coin side by side. Photos of Natural Silver Ore, Silver minerals, Crystal ... 14 · Found within the Mountains biome, Silver ore can be mined from deposits that are primarily hidden beneath the ground. Please note that Silver ore can only be mined with an Iron pickaxe or better . 6 Ways to Test Silver Aug 13, 2019· Silver-colored cobalt metal is brittle, has a high melting point and is valued for its wear resistance and ability to retain its strength at high temperatures. It is one of the three naturally occurring magnetic metals ( iron and nickel being the other two) and retains its magnetism at a higher temperature (2012°F, 1100°C) than any other metal. A Forecast of When We'll Run Out of Each Metal Silver processing, preparation of the ore for use in various products.. Silver has long been valued for its white metallic lustre, its ability to be readily worked, and its resistance to the corrosive effects of moisture and oxygen.The lustre of the pure metal is due to its electron configuration, which results in its reflecting all electromagnetic radiation of wavelengths longer … Don't Fake It: 7 Ways to Identify Precious Metals Since your old scrap silver quite a bit on today's silver hungry market it is very important to know how to tell real silver. Many people have silver lying around that they are not sure about because they do not know how to tell is something is real silver or some other metal. Fake silver can also be called silver plated among other things. How can you tell if silver is real or plated? Silver is a good thermal conductor. So if you put an ice cube on top of your silver item, then the ice cube will start to melt quickly. An ice cube placed on silver will melt quicker than on iron and a little quicker than on copper. The easiest way to conduct this test is to place a real silver coin and a potentially fake silver coin side by side. How to Detect Silver in the Ground at a Silver Mine | Our ... Aug 13, 2019· Silver-colored cobalt metal is brittle, has a high melting point and is valued for its wear resistance and ability to retain its strength at high temperatures. It is one of the three naturally occurring magnetic metals ( iron and nickel being the other two) and retains its magnetism at a higher temperature (2012°F, 1100°C) than any other metal. Silver processing | Britannica You can purchase silver acid tests online, but they should only be used as a last resort. These tests will tell you whether it is real, how pure it is, and even what metal it is if it is not real. Sound Test: Silver emits a ringing sound when it is tapped, much like a bell, whereas many cheaper metals will emit a dull thud. Tap the piece with ... Silver mining Nov 05, 2018· Investing in silver means putting your money into the production, trading or outright ownership of silver metal. For most investors this means buying quantities of bullion in coin or bar form and ... How To Tell If Something Is Real Silver To compensate for its malleability, silver is often mixed with other metals. For an item to qualify as genuine silver, it must be 92.5 % pure. Most sterling silver is composed of 7.5 % other metal, typically copper. Jewelry or other substances composed primarily of other metals and coated with only a thin layer of silver are called silverplated. Counterfeit Silver: How to Spot Fake Silver? | GoldBroker.com Last Edited: 21 Feb 2021 1:27 am. Home/Games/ How to Find Copper, Iron, Tin, Silver, Obsidian, and Black Metal Scraps – Valheim Wiki Guide Cobalt Metal Characteristics Jan 08, 2012· There are many different types and levels of metal detectors,so it is difficult to know which metal detector would be the best metal detector for you if you arehunting for gold.For eons mineralized quartz arteries and unexposed ore bodies have been shedding pure gold fornugget hunters to find. Investing in Silver: Four Ways to Invest and Why To compensate for its malleability, silver is often mixed with other metals. For an item to qualify as genuine silver, it must be 92.5 % pure. Most sterling silver is composed of 7.5 % other metal, typically copper. Jewelry or other substances composed primarily of other metals and coated with only a thin layer of silver are called silverplated. How to Find Gold and Silver With Your Metal Detector To a lesser extent, base metal sulfides including Galena, sphalerite, pyrite, chalcopyrite, and chalcocite may all be and frequently are argentiferous, but in most silver ore deposits, the silver is most concentrated in the minerals of the group first named. Of the base metal ore minerals, the most common primary ones are argentiferous galena ... Don't Fake It: 7 Ways to Identify Precious Metals May 05, 2019· One reason why this metal is so valuable is that it is currently only mined in South Africa. 1. Rhodium – $2,930 per ounce. Rhodium is the most expensive metal in the world, according to 911 Metallurgist. This is one of the rarest metals and the largest producers of the metal are South Africa, Canada, and Russia. How Do You Identify Silver Ore? Mar 16, 2018· Silver is a precious metal located throughout the world in geological deposits. Colorado's state nickname is the "Silver State" due to the large deposits of silver ore found there. Silver is extracted from the ore by a smelting or leaching procedure. Here's how to identify silver ore. Metal ores The XRF Gold Analyzer can accurately analyze the purity of four precious metals: gold, silver, platinum and palladium, analytical tolerance range is 0.01% to 0.3%. It can also test what kind of metal this is (except for Au, Ag, Pt, Pd, which cannot be tested for metal purity). 3 Tests to Tell if your Silver is Real or Fake Dec 04, 2019· Stamping plated articles: "In the case of articles of merchandise made in whole or in part of an inferior metal, having deposited or plated thereon or brazed or otherwise affixed thereto a plating, covering, or sheet composed of gold or silver, or of an alloy of either of said metals, and known in the market as rolled gold plate, gold plate ... How to Test Silver at Home | Learn to Spot Fake Silver Apr 05, 2013· Because silver is such an effective thermal conductor, an ice cube will melt much more rapidly on silver than it will on another metal. To perform this test, all you have to do is put one ice cube on the silver object that you want to test and another on any other piece of metal, like a stainless steel bowl.
ESSENTIALAI-STEM
Dick Tufeld Richard Norton Tufeld (December 11, 1926 – January 22, 2012) was an American actor, announcer, narrator and voice actor from the late 1940s until the early 21st century. He worked constantly and continuously throughout this lengthy career and was one of the busiest announcers in television history. He was a well-known and well respected presence on television as an announcer on countless television shows, award shows, network promos, radio and movie promos but his most famous and beloved role was as the voice of the Robot in the television series Lost in Space and in the Lost in Space movies. Early life Born in Los Angeles, California, to a Russian father and a Canadian mother, he spent his childhood in Pasadena, California. Tufeld attended the Northwestern University School of Communication, then known as the university's School of Speech. In 1945, he obtained a job as an engineer at KLAC, a radio station in Los Angeles. Career Tufeld's voice career began in radio. He was the announcer on ABC's The Amazing Mr. Malone in early 1950 (before the show moved to New York and NBC); then on Alan Reed's Falstaff's Fables, a five-minute ABC radio program that began in the fall of 1950. From October 25, 1952, to March 19, 1955, Tufeld was the announcer for the entire run of ABC Radio's Space Patrol. Tufeld moved to television in 1955, working in ABC daytime programming and anchoring The Three Star Final, a 15-minute newscast on KABC-TV, Los Angeles. It debuted on October 3, 1955, at noon (replacing Wrangler Jim), then moved to 11 p.m. on April 2, 1956. Tufeld was often heard as the announcer on Disney television shows, including the 1957–1959 series Zorro starring future Lost in Space lead Guy Williams. He narrated Disneyland's 1955 Man in Space. He had periods as the house announcer on two ABC variety series, The Hollywood Palace and The Julie Andrews Hour. In 1954, he was cast in assorted roles in fifteen episodes of Gene Autry Productions's syndicated television series, Annie Oakley, which starred Gail Davis and Brad Johnson. Tufeld is perhaps best known as the voice of the B9 Robot in the CBS television series Lost in Space, a role he reprised for the 1998 feature film. He also provided narrations for many other Irwin Allen productions, such as ABC's Voyage to the Bottom of the Sea and The Time Tunnel, and did voice work for the 1978 animated television series Fantastic Four. He narrated several episodes of Thundarr the Barbarian (1980). From 1977 - 1985, he was the chief announcer for ABC-TV’s popular “Love in the Afternoon” soap opera promos. He was the main title narrator on the 1979 DePatie-Freleng series, Spider-Woman, as well as the main title announcer on the 1981 Marvel Productions show Spider-Man and His Amazing Friends. Personal life, death and legacy Tufeld was married to Adrienne Tufeld (1948–2004, her death), and commissioned a home by architect Gregory Ain in 1952. Tufeld died in 2012 of congestive heart failure. His son, Bruce Tufeld, was a talent agent; he died in 2019.
WIKI
Page:History of Indian and Eastern Architecture Vol 1.djvu/20 NOTE. ONE of the great difficulties that met every one attempting to write on Indian subjects forty years ago was to know how to spell Indian proper names. The Gilchristian mode of using double vowels, which was fashionable early last century, had then been done away with, as contrary to the spirit of Indian orthography, though it left a plentiful crop of discordant spellings. On the other hand, Sir William Jones and most scholars, by marking the long vowels and by dots to distinguish the palatal from the dental consonants, had formed from the Roman alphabet definite equivalents for each letter in the Indian alphabets both Sanskritic and Persian. Lepsius, Lassen, and Max Muller in turn proposed various other systems, which ha^e not found much acceptance ; and of late continental scholars have put forward still another scheme, quite unsuited for English use. In this system such names as " Krishna," " Chach," " Rishi," are to be represented byKrsna, Cac, Rsi so pedantic a system is, impossible both for cartographer and ordinary reader and, like others, it may well cease to be. Meanwhile a notable advance towards official uniformity has been made in the spelling of Indian place-names. When the 'Imperial Gazetteer of India" was projected, Government judiciously instructed the editor to adopt the Jonesian system of transliteration as slightly modified by Professor H. H. Wilson, but devoid of the diacritical dots attached to certain consonants. The authorisation of this system in the new maps and Gazetteer, and its use in published works since, has established its claim to acceptance in a work intended for the general reader. In the following pages, consequently, this system has been used, as nearly as may be, avoiding diacritical marks on consonants, but indicating the long vowel sounds ti, i, ft, as in Lzit, Halebid, Stupa, etc., whilst e and o, being almost always long, hardly require indication. Thus a l sounds as in " rural " ; a as in " tar " ; i ,, ,, "fill"; i ,, "police"; ,, ,, "full"; ft ,, "rude"; e ,, ,, " there"; and o ,, "stone". Only the palatal 5, as in "sure," is distinguished from the dental, as in "hiss," by the italic form among Roman letters, as in "jikhara," "Aroka." A hundred years hence, when Sanskrit and Indian alphabets are taught in all schools in England, it may be otherwise, but in the present state of knowledge on the subject it seems expedient to use some such simple method of indicating, at least approximately, the Indian sounds. Strictly accurate transcription in all cases and of well-known names, however, has not been followed. In Burmese, which lisps sounds like s and ch, the spellings used in the Gazetteers of Burma have been generally adopted. 1 The shut vowel, inherent in all consonants of the proper Indian alphabets, was formerly transliterated by almost any English vowel : in " Benares" (for " Banaras"). t is used twice for it.
WIKI
Frank Kidson Frank Kidson (15 November 1855 – 7 November 1926) was an English folksong collector and music scholar. Career He was born in Leeds, where he lived for most of his life. He worked briefly with his brother in an antique business, then turned to landscape painting, for which he travelled widely, which gave him the opportunity to get to know local music. He was interested both in living folk music, which he gathered with the help of his niece Emma Mary Kidson (whom he called Ethel), and in the printed remains of popular music, which he collected and on which he was recognised as the leading authority of his day. His early work on folk music, published in Old English Country Dances (1890) and Traditional Tunes: A collection of ballad airs (1891) gave impetus to a rising interest in the subject. He was one of the founders of the Folk-Song Society in 1898 and guided its publications with his knowledge of early ballad literature. English folk-song and dance by Frank Kidson and Mary Neal was published in 1915. Other aspects of the developing folksong revival were less welcome to him, in particular Cecil Sharp’s enthusiasm for institutionalising folk music and dance in education. He published one further book of folk music A Garland of English Folk-Songs (1926); and after his death, on 7 November 1926, Ethel Kidson edited two further books from his collections, Folk Songs of the North Countrie (1927) and English Peasant Songs (1929). In these collections, they worked in association with Alfred Edward Moffat. He also worked on other aspects of musical history, writing British Music Publishers, Printers and Engravers (1900) and The Beggar’s Opera: Its Predecessors and Successors (1922), and contributing many articles to the Grove Dictionary of Music and Musicians. A large part of his personal collection, including thirteen folio volumes of broadsides, was acquired at auction on his death by the Mitchell Library.
WIKI
Drilling holes in the head is modern medicine? SkullDrill Trepanning is a term for the surgical exposure of the dura mater, the outermost layer of the meninges that encapsulates the brain. The procedure dates back to 10,200 B.C.E, denoted by cave paintings, and was likely performed in neolithic times to treat mental illness. Given that some of the theories once associated with trepanning include drilling holes in skulls to release evil spirits, it comes as a bit of a surprise that trepanning is a viable and not exceedingly rare modern medical treatment. Being said, the procedure is not routine and is one of those things you have to find other people in the know to get done. TrepanationEngraving The ITAG, the International Trepanation Advocacy Group, seems to be the centralized group behind the surgical procedure. They postulate: The hypothesis here at ITAG has been that making a opening in the skull favorably alters movement of blood through the brain and improves brain functions which are more important than ever before in history to adapt to an ever more rapidly changing world. They claim to have established relations with a medical facility, and from 2000-2004 have performed 15 trepanations without incident. TrepanationSkull Surprisingly there is fairly comprehensive physiological research on modern trepanation. Moskalenko et al. from the Sechenov Institute of Evolutionary Physiology and Biochemistry in St. Petersburg, Russia published in 2007 their findings of 11 trepanation patients using transcranial Doppler sonography, rheoencephalography, and observation during craniotomy. They reported surprising results: After craniotomy, the cross-flow of CSF between the cranial and spinal cavities decreased significantly, giving way to volumetric compensatory translocations of blood and CSF within the cranial cavity per se during the cardiac cycle, which increased the intracranial utilization of the energy of the cardiac output and contributed to the outflow of venous blood from the cranium. The conclusion: trepanation improves circulation and metabolism in the brain. After evaluating their publication, I respect their methods, yet I’d still be more than hesitant to start drilling holes in my head. Apparently, self-trepanation is a thing. If you decide trepanation is worth your money, I’d rather get it done on a surgical table. Just my 2 cents. Source 1, 2, 3, 4, 5 Supeding Pastry Chef (https://butterhub.org), software engineer (http://jamesding.org), and fitness enthusiast. You may also like... 5 Responses Leave a Reply Read more: How bad is flu this season? Google trends is tracking flu term searching as a measure of how many people get sick. They say: We've found... Obese might face benefit cuts in the UK It has been proposed by Westminster Council to cut benefits to obese people that refuse to exercise following a doctor's... Science of Productivity ASAPscience feature video. Takeaway points: Willpower is limited ("ego-exhaustion") Starting a project makes it easier to complete (Zeigarnik effect) Deliberate... Nexium vs Prilosec! Is there really a difference? AstraZenica's a monster of a pharmaceutical company. If you saw our last posts (here and here) on the drugs most... Close
ESSENTIALAI-STEM
differences between lambda binary vs. JSR 335 EDR Maurizio Cimadamore maurizio.cimadamore at oracle.com Tue Nov 22 05:48:16 PST 2011 Hi, Here's a list of the main differences between the compiler implementation and the spec EDR: *) Compiler uses infix '#' instead of '::' for method reference syntax (15.28) i.e. SAM s1 = foo#bar; SAM s2 = Foo<String>#new; SAM s3 = new Bar()#<Z>baz; *) Compiler allows optional explicit argument types on method references (15.28) i.e. SAM s1 = foo#bar(String); SAM s2 = foo#new(Integer, List<String>); *) Compiler accepts a mix of explicit/implict types in lambda parameter declaration (15.27) SAM s1 = (int x1, x2)->x1 + x2; *) Compiler supports a slightly less powerful analysis for detecting effectively final variables that only applies to variables with an initializer (4.12.4) void m() { int x; x = 2; SAM s = ()->x*2; //error } *) Generic lambdas are not supported/generic functional descriptors are not supported (15.27 and 9.8) interface SAM { <X, Y extends X> void m(X x, Y y); } SAM s = <U, V extends U>(x,y)->{}; *) Target-typing for conditional expressions is not supported (15.25) SAM s = cond ? ()->true : ()->false; //error Maurizio More information about the lambda-dev mailing list
ESSENTIALAI-STEM
Page:Julian Niemcewicz - Notes of my Captivity in Russia.djvu/92 64 with the heart-rending idea, that it was all over with our country, having before our eyes the melancholy picture of the recent atrocities perpetrated at Praga, the proscription of our relatives and friends, and the confiscation of our estates—overwhelmed by all these melancholy thoughts, we now advanced on our way in mournful silence. Titow and his people, who had shewn us hitherto some outward marks of civility, assumed all at once an air of authority and reserve, either in consequence of having just received new instructions, or what is more likely, because they did not see any one superior to themselves. The character of our head-superintendent was a mixture of ignorance, presumption, and cruelty; it was said that he was brave before the enemy,—it maybe so; but certainly he was more mendacious and thievish than brave. His companions were Captain Ostafi Ostaficz Udom, a knave, but who had better manners than the others; Zmiewski, a stupid nonsensical drunkard; Mitrowski, a down-right good fellow; finally, the young Lieutenant Karpen,
WIKI
Can I Buy an HD Cable Converter Box? by Rob Kemmett Cable converter boxes are also called television converter boxes. Cable converter boxes are also called television converter boxes. Comstock/Comstock/Getty Images A cable converter box, often used on televisions that are not cable ready, changes analog signals to digital signals, or vice versa. Converter boxes are available in standard and high-definition models. High-definition converter boxes contain the necessary technology to convert high-definition signals without losing the high-def picture and audio quality. As of the time of publication, a few manufacturers sell high-definition cable converter boxes. High-Definition Models When compared to the amount of standard definition converter boxes on the market, there aren't many high-def models available. Some models, like the Zinwell ZAT-970A, Samsung DTBH260F and Digital STREAM DTX9950F convert high-definition and standard definition signals without compromising the quality. Other models, such as the iNet Access SSR 3909A, down convert digital high-definition television signals to analog quality; models like this are intended for use with standard definition television. High-definition cable converter boxes are available from online retailers and electronics stores. What They Do Simply put, cable converter boxes convert CATV television signals into different formats. CATV is an abbreviation often used for "cable television." Each box is different, but they all work in a similar fashion: the box receives a signal, reads the data and converts the data so it can play on a television as if it were coming from a different type of signal. A converter box detects a CATV signal and converts it into an analog RF format, the most basic of television signals, so a television that is not cable-ready can receive television broadcasts. High-Definition Quality The technology behind high-definition is complex, but it can be explained rather simply. High-definition picture quality is much better than standard definition. The pixel ratio of a picture is important, the higher the pixel ratio, the better the picture. High-definition signals produce 1 million or more pixels creating the images you see on your television, which is much more than standard definition. You will know if your converter box or television is a high-definition model if you see 1080p, 1080i or 720p on the specifications. Those labels reference the quality of the pixel ratio, all of which are high-definition. If you see 480p or 480i, the model is not high definition. Installation Once you purchase a converter box, you need to install it. Installation does not require a professional, but it is good to know the basics before you get started. Most converter boxes come with a basic coaxial cable, which is the standard connector cable used in most homes and businesses. Attach the existing coaxial cable, the one already connected to your television, to the "Antenna In" port on the converter box. Attach one end of the supplied coaxial cable to the "To TV" port on the converter box and the other end to the "Antenna In" port on the television. Turn on the cable converter box and follow the on-screen instructions to setup the box. About the Author Rob Kemmett began writing professionally in 2010 and specializes in writing about food and hospitality. Kemmett has worked in various fine-dining restaurants throughout his career and holds an Associate of Applied Science in Le Cordon Bleu culinary arts from the Cooking and Hospitality Institute of Chicago. Photo Credits • Comstock/Comstock/Getty Images
ESSENTIALAI-STEM
Wikipedia:Peer review/Walter Hallstein/archive1 Walter Hallstein This peer review discussion has been closed. I've listed this article for peer review because I would like to get the article to FA status eventually. Though many people will not have heard of Walter Hallstein, he was an important figure in European integration and in the rehabilitation of Germany after World War II. Thanks, Boson (talk) 18:15, 8 July 2013 (UTC)
WIKI
Nickey v. Mississippi/Opinion of the Court This case is here on appeal, section 237 of the Judicial Code (28 USCA § 344), from a decree of the Supreme Court of Mississippi allowing recovery of delinquent taxes assessed upon appellants' lands within the state and overruling their contention that the assessment of the tax and the decree for its payment infringe the due process clause of the Fourteenth Amendment. 167 Miss. 650, 145 So. 630, 146 So. 859. So far as the state court discussed these contentions with specific reference to the Constitution of the United States, both in its original opinion, and in an opinion denying the appellants' application for rehearing, they may be reviewed here, notwithstanding the failure of appellants to mention them in their assignment of errors to the state supreme court, as required by its rules. Wall v. Chesapeake & Ohio R. Co., 256 U.S. 125, 41 S.Ct. 402, 65 L.Ed. 856; Saltonstall v. Saltonstall, 276 U.S. 260, 267, 48 S.Ct. 225, 72 L.Ed. 565; Cumberland Coal Co. v. Board of Revision of Tax Assessm nts, 284 U.S. 23, 24, 52 S.Ct. 48, 76 L.Ed. 146. We confine our opinion to the questions thus discussed. Appellants, nonresidents of Mississippi are owners of tracts of land in Tunica county, Miss., all of which were assessed for local and state taxation for the year 1928. They failed to pay the tax on one tract alone, and the state, on relation of the Attorney General, brought the present suit in the chancery court of Tunica county to recover the unpaid tax as a debt of the owners. This suit was begun by attachment of other lands of appellants' on which the tax had been paid. The bill of complaint alleges that the appellants are engaged in removing timber from the land on which the tax has not been paid; that the land without it is not of sufficient value to pay the tax, and that unless they are restrained from cutting the timber the state and its municipal subdivisions will be deprived of the tax. The bill prays that appellants be enjoined from cutting the timber until the tax is paid, and that it be satisfied from the attached lands. Appellants appeared generally in the suit, and secured the release of the attachment by giving bond, in the sum of $10,000, an amount in excess of all taxes claimed and recovered, by which they and their surety became bound to satisfy any decree which might be recovered in the suit. In their answer they set up numerous defenses on state grounds, all of which so far as now material have been resolved against them and may not be reviewed here. They also set up two distinct defenses, which are urged here: First, that they are and at all times have been nonresidents of the state and that the tax demanded was assessed without service of any process on them, or notice to them, or opportunity to be heard in any proceedings for its assessment, and without their appearance in any such proceedings; that in consequence the state taxing officers were without jurisdiction to assess the tax and that any collection is an infringement of the Fourteenth Amendment. Second, that the decree of the state court, so far as it purports to adjudicate any right of the state to satisfy the tax liability out of lands of appellants within the state other than those upon which the tax was assessed, or to impose upon appellants any personal liability for the tax is likewise a violation of due process. 1. Section 3122 of the Mississippi Code of 1930 declares that every lawful tax is a debt for the recovery of which an action may be brought in the state courts 'and in all actions for the recovery of ad valorem taxes the assessment rolls shall only be prima facie correct.' In construing and applying this section in the present case, the state court held that the tax, recovery of which it allowed, was a debt collectible by suit. But as the statute makes the assessment roll only prima facie correct, the court, following its decision in George County Bridge Co. v. Catlett, 161 Miss. 120, 135 So. 217, ruled that it is open to a defendant, in such a suit, to assail the correctness and legal sufficiency of the assessment; that it is the proceeding in court and not the assessment which finally fixes the liability to pay the tax, and since appellants had appeared in the suit and had had full opportunity to be heard before the decree was rendered upholding the assessment, there was no denial of due process. Accepting, as we must, this construction of the laws of the state by its highest court, they infringe no constitutional limitation. There is no constitutional command that notice of the assessment of a tax, and opportunity to contest it, must be given in advance of the assessment. It is enough that all available defenses may be presented to a competent tribunal before exaction of the tax and before the command of the state to pay it becomes final and irrevocable. Wells, Fargo & Co. v. Nevada, 248 U.S. 165, 39 S.Ct. 62, 63 L.Ed. 190; Bristol v. Washington County, 177 U.S. 133, 146, 20 S.Ct. 585, 44 L.Ed. 701; McMillen v. Anderson, 95 U.S. 37, 4 L.Ed. 335; see American Surety Co. v. Baldwin, 287 U.S. 156, 168, 53 S.Ct. 98, 77 L.Ed. 231, 86 A.L.R. 298. 2. The question remains whether the state, in conformity with due process, may declare the tax, lawfully assessed upon one tract of appellants' land, a debt collectible from other property of theirs within the state and from the appellants themselves by a judgment in personam. It can no longer be questioned that a state may collect taxes, assessed against one parcel of property within its jurisdiction, from other parcels within the state, owned by the same person, though he be a nonresident. Scottish Union & National Insurance Co. v. Bowland, 196 U.S. 611, 632, 25 S.Ct. 345, 49 L.Ed. 619; Bristol v. Washington County, Supra, 145 of 177 U.S., 20 S.Ct. 585; compare Marye v. Baltimore & Ohio R. Co., 127 U.S. 117, 123, 124, 8 S.Ct. 1037, 32 L.Ed. 94; see Iowa v. Slimmer, 248 U.S. 115, 120, 39 S.Ct. 33, 63 L.Ed. 158. To that extent at least the power of the state over the property within its bounds may be exerted to affect the interest of the common owner. The power to collect the tax from property within the state is always exercised at the expense of the owner, even though a non-resident, and an obligation in rem is thus imposed on his ownership, which is within the control of the state because of the presence there of the physical objects which are the subject of ownership. As it is an incident of property that it may be made to respond to obligations to which its owner may be subject, no want of due process is involved in satisfying an obligation imposed upon the ownership of one item of property by resort to another which is subject to the same ownership. Here the suit was brought to compel payment of the tax out of the attached property. The end sought was the same as that constitutionally achieved in Scottish Union & National Ins. Co. v. Bowland, supra, by distraint upon the non-resident's property to satisfy a tax assessed upon other property within the taxing state, and is equally free from constitutional objection. By giving their bond to release the attachment, the appellants have voluntarily substituted their personal liability on the bond for the liability which might otherwise have been satisfied from the attached property. As the tax, payment of which is decreed, is less than the amount of the bond, it is only this personal liability upon the bond which the state seeks to enforce here. It is unnecessary to decide the different question with respect to appellants' personal liability to pay the tax which would be presented if the decree had exceeded the amount of the bond, or if appellants had appeared and defended the suit without giving bond or securing release of the attachment. See Dewey v. Des Moines, 173 U.S. 193, 19 S.Ct. 379, 43 L.Ed. 665; Scottish Union & National Insurance Co., supra, 632 of 196 U.S., 25 S.Ct. 345. Compare York v. Texas, 137 U.S. 15, 11 S.Ct. 9, 34 L.Ed. 604.
WIKI
blob: 543b0e1b8ea8a44b09f59a5c1ba08c1e9aa8bfc2 [file] [log] [blame] //===-- OptionValuePathMappings.cpp ---------------------------------------===// // // Part of the LLVM Project, under the Apache License v2.0 with LLVM Exceptions. // See https://llvm.org/LICENSE.txt for license information. // SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception // //===----------------------------------------------------------------------===// #include "lldb/Interpreter/OptionValuePathMappings.h" #include "lldb/Host/FileSystem.h" #include "lldb/Utility/Args.h" #include "lldb/Utility/FileSpec.h" #include "lldb/Utility/Stream.h" using namespace lldb; using namespace lldb_private; static bool VerifyPathExists(const char *path) { if (path && path[0]) return FileSystem::Instance().Exists(path); else return false; } void OptionValuePathMappings::DumpValue(const ExecutionContext *exe_ctx, Stream &strm, uint32_t dump_mask) { if (dump_mask & eDumpOptionType) strm.Printf("(%s)", GetTypeAsCString()); if (dump_mask & eDumpOptionValue) { if (dump_mask & eDumpOptionType) strm.Printf(" =%s", (m_path_mappings.GetSize() > 0) ? "\n" : ""); m_path_mappings.Dump(&strm); } } Status OptionValuePathMappings::SetValueFromString(llvm::StringRef value, VarSetOperationType op) { Status error; Args args(value.str()); const size_t argc = args.GetArgumentCount(); switch (op) { case eVarSetOperationClear: Clear(); NotifyValueChanged(); break; case eVarSetOperationReplace: // Must be at least one index + 1 pair of paths, and the pair count must be // even if (argc >= 3 && (((argc - 1) & 1) == 0)) { uint32_t idx; const uint32_t count = m_path_mappings.GetSize(); if (!llvm::to_integer(args.GetArgumentAtIndex(0), idx) || idx > count) { error.SetErrorStringWithFormat( "invalid file list index %s, index must be 0 through %u", args.GetArgumentAtIndex(0), count); } else { bool changed = false; for (size_t i = 1; i < argc; idx++, i += 2) { const char *orginal_path = args.GetArgumentAtIndex(i); const char *replace_path = args.GetArgumentAtIndex(i + 1); if (VerifyPathExists(replace_path)) { if (!m_path_mappings.Replace(orginal_path, replace_path, idx, m_notify_changes)) m_path_mappings.Append(orginal_path, replace_path, m_notify_changes); changed = true; } else { std::string previousError = error.Fail() ? std::string(error.AsCString()) + "\n" : ""; error.SetErrorStringWithFormat( "%sthe replacement path doesn't exist: \"%s\"", previousError.c_str(), replace_path); } } if (changed) NotifyValueChanged(); } } else { error.SetErrorString("replace operation takes an array index followed by " "one or more path pairs"); } break; case eVarSetOperationAssign: if (argc < 2 || (argc & 1)) { error.SetErrorString("assign operation takes one or more path pairs"); break; } m_path_mappings.Clear(m_notify_changes); // Fall through to append case LLVM_FALLTHROUGH; case eVarSetOperationAppend: if (argc < 2 || (argc & 1)) { error.SetErrorString("append operation takes one or more path pairs"); break; } else { bool changed = false; for (size_t i = 0; i < argc; i += 2) { const char *orginal_path = args.GetArgumentAtIndex(i); const char *replace_path = args.GetArgumentAtIndex(i + 1); if (VerifyPathExists(replace_path)) { m_path_mappings.Append(orginal_path, replace_path, m_notify_changes); m_value_was_set = true; changed = true; } else { std::string previousError = error.Fail() ? std::string(error.AsCString()) + "\n" : ""; error.SetErrorStringWithFormat( "%sthe replacement path doesn't exist: \"%s\"", previousError.c_str(), replace_path); } } if (changed) NotifyValueChanged(); } break; case eVarSetOperationInsertBefore: case eVarSetOperationInsertAfter: // Must be at least one index + 1 pair of paths, and the pair count must be // even if (argc >= 3 && (((argc - 1) & 1) == 0)) { uint32_t idx; const uint32_t count = m_path_mappings.GetSize(); if (!llvm::to_integer(args.GetArgumentAtIndex(0), idx) || idx > count) { error.SetErrorStringWithFormat( "invalid file list index %s, index must be 0 through %u", args.GetArgumentAtIndex(0), count); } else { bool changed = false; if (op == eVarSetOperationInsertAfter) ++idx; for (size_t i = 1; i < argc; i += 2) { const char *orginal_path = args.GetArgumentAtIndex(i); const char *replace_path = args.GetArgumentAtIndex(i + 1); if (VerifyPathExists(replace_path)) { m_path_mappings.Insert(orginal_path, replace_path, idx, m_notify_changes); changed = true; idx++; } else { std::string previousError = error.Fail() ? std::string(error.AsCString()) + "\n" : ""; error.SetErrorStringWithFormat( "%sthe replacement path doesn't exist: \"%s\"", previousError.c_str(), replace_path); } } if (changed) NotifyValueChanged(); } } else { error.SetErrorString("insert operation takes an array index followed by " "one or more path pairs"); } break; case eVarSetOperationRemove: if (argc > 0) { std::vector<int> remove_indexes; for (size_t i = 0; i < argc; ++i) { int idx; if (!llvm::to_integer(args.GetArgumentAtIndex(i), idx) || idx < 0 || idx >= (int)m_path_mappings.GetSize()) { error.SetErrorStringWithFormat( "invalid array index '%s', aborting remove operation", args.GetArgumentAtIndex(i)); break; } else remove_indexes.push_back(idx); } // Sort and then erase in reverse so indexes are always valid llvm::sort(remove_indexes.begin(), remove_indexes.end()); for (auto index : llvm::reverse(remove_indexes)) m_path_mappings.Remove(index, m_notify_changes); NotifyValueChanged(); } else { error.SetErrorString("remove operation takes one or more array index"); } break; case eVarSetOperationInvalid: error = OptionValue::SetValueFromString(value, op); break; } return error; }
ESSENTIALAI-STEM
Aramco CEO sees oil supply shortage as investments and discoveries drop The world might be heading for an oil supply shortage following a steep drop in investments and a lack of fresh conventional discoveries, Saudi Aramco's chief executive said on Monday. Unconventional shale oil and alternative energy resources are an important factor to help meet future demand but it is premature to assume that they can be developed quickly to replace oil and gas, Amin Nasser told a conference in Istanbul. "If we look at the long-term situation of oil supplies, for example, the picture is becoming increasingly worrying," Nasser said. "Financial investors are shying away from making much needed large investments in oil exploration, long-term development and the related infrastructure. Investments in smaller increments such as shale oil will just not cut it," Nasser said. About $1 trillion in investments have already been lost since a decline in oil prices from 2014. Studies show that 20 million barrels per day of new production will be needed to meet demand growth and offset natural decline of developed fields over the next five years, he said. "New discoveries are also on a major downward trend. The volume of conventional oil discovered around the world over the past four years has more than halved compared with the previous four," Nasser said. State oil giant Aramco, which is preparing to sell around 5 percent in itself next year in an initial public offering, is continuing to invest in maintaining its oil production capacity of 12 million barrels per day. "We plan to invest more than $300 billion over the coming decade to reinforce our pre-eminent position in oil, maintain our spare oil production capacity, and pursue a large exploration and production program centering on conventional and unconventional gas resources," Nasser said. Nasser said that one of Aramco's priorities was "direct conversion of crude oil into petrochemicals" while adding the company was also focusing on solar and wind projects. Follow CNBC International on and Facebook.
NEWS-MULTISOURCE
How Much Sweating Is Too Much? How Much Sweating Is Too Much? To sweat is natural and healthy. Sweat helps cool the body. But excessive sweating can pose problems. Sweat, as stinky and uncomfortable as it can be, is a natural and healthy part of life, helping to cool the body. But excessive sweating can pose problems in your social life and relationships, and perhaps even to your emotional health.   How can you tell if you sweat excessively, beyond the body's normal needs? Check the answers below to find out. Why Do I Sweat? Sweat helps maintain a normal body temperature. "Sweating is your body's way of reducing your internal body temperature," says dermatologist Patricia Farris, MD, a clinical assistant professor of dermatology at Tulane University in New Orleans. When temperatures rise -- for any reason -- the sweat glands kick in to produce more sweat, Farris says. You might have a fever. You might be nervous. It may be hot outside. Or you may be exercising. This is why "in summer, we sweat more," says Eric Schweiger, MD, a dermatologist and clinical instructor of dermatology at Mt. Sinai School of Medicine, New York. Even your diet can play a role in your sweat output. "Some people have a sweating response to spicy foods," Schweiger says, as well as some hot foods or beverages. Sweating: What's Normal, What's Not? "The amount of sweat considered normal is quite variable and depends on the demands of the body," says Dee Anna Glaser, MD, a professor of dermatology at St. Louis University, in St. Louis, Mo., and president of the International Hyperhidrosis Society. People may sweat less than a liter, or up to several liters a day, based on what they're doing.   "It is going to depend on whether you are an office worker in a climate-controlled building, or a roadside worker in Alabama," Glaser says. If you're exercising or doing manual labor in a hot climate, expect to sweat a lot. It's normal.   What Is Excessive Sweating? Excessive sweating, also called hyperhidrosis, means that you sweat far more than your body needs you to sweat. For example, if you sweat while sitting calmly at your desk, that is excessive sweating.   In hyperhidrosis, the body's cooling mechanism is so overactive that it produces four or five times the amount of sweat that you need. About 3% of the population has excessive sweating. Because people have different "sweat needs," doctors say they can't put a solid number on the question: how much sweat does it take to be diagnosed with excessive sweating? "It's very difficult to quantify, but most people really do understand when they are sweating too much," Glaser says. ''If you think you are sweating more than everyone else, or more than you used to, there is probably an issue going on," she tells WebMD. Patients are very good at knowing how much is too much, Schweiger agrees. "Pretty much anyone who comes to me [complaining of] excess sweating has it," he says. Except for women during the menopausal transition, there's no "normal" increase in sweating with age, Glaser says. If you think you're sweating more as you get older, don't just chalk it up to additional birthdays, she says. One telltale clue that sweating may be abnormal, Glaser says, is sweating excessively from one area of your body only. (But sometimes excessive sweating occurs all over the body.) Sweating without a need for it is another sign of abnormal sweating. "If you're sweating constantly in the winter in Chicago, that's probably excessive," Farris says. Those with excessive sweating of the feet may produce so much sweat they are sliding out of their shoes, she says. What Causes Excessive Sweating? Most often, no cause of excessive sweating can be found. Doctors call it idiopathic -- meaning the cause is unknown or obscure. However, there may be genetic influences. "About 50% of people with primary [excessive sweating] have a known family history," Glaser says. This type of excessive sweating usually begins after puberty, Glaser says. Sweating just on the hands and feet often starts even younger, perhaps in infancy or during the toddler years. A variety of other factors can cause excessive sweating, including underlying medical conditions and medicines, Glaser says. For instance: • Frey's syndrome is a condition in which sweating occurs from just one side of the face when certain foods are eaten. It occurs after surgery on, or injury near, the saliva-producing glands. • Medications taken for endocrine problems, diabetes, and thyroid disease can also trigger excessive sweating.  • So can certain high blood pressure medicines, as well as some antidepressant medications. • In addition, heavy sweating can be caused by infections, certain cancers, heart or lung disease, menopause, and sometimes even a stroke.   How Is Excessive Sweating Diagnosed? It's important to keep in mind that most people who sweat heavily are normal, and not sick. If you are worried, and decide to see a doctor, most specialists will take a careful medical history, Glaser says. Among the questions you can expect: • Do you sweat excessively from certain small areas of your body or all over? • When do you notice yourself sweating? Can you describe the situation? • What medications are you taking regularly? • Have you recently started taking new medications? • Have you had any surgeries recently? • Are you going through menopause? • Do you have family members who complain of excessive sweating? If the doctor determines that your sweating is "idiopathic," and has no known cause, you can still treat the problem if you wish. Treatments range from simple home remedies such as showering more frequently to medications or surgery such as sweat gland removal. It's important to see a doctor, Glaser says. So many of her patients, she says, have been told even by health care professionals: "It's no big deal." But Glaser sees the impact excessive sweating can have on her patient's lives. "I have teenagers who will not raise their hands in class," she says, fearing their underarm area will be excessively and embarrassingly wet. "I have kids who have never gone on a date." Quality of life is affected in older patients too. "It can affect business relationships," Schweiger says. "People are embarrassed to shake hands." So don't sweat about the problem. Instead, talk to an expert. Remember, sweating is a good thing. But too much of a good thing can become a big problem. Page: [[$index + 1]]
ESSENTIALAI-STEM
Nutrition Can i Take Creatine Without Working Out: What You Need to Know Can i Take Creatine Without Working Out Creatine is a popular supplement used by athletes and bodybuilders to enhance their performance and build muscle mass. However, many people wonder if it is safe to consume creatine without working out. The answer is not straightforward, as there are several factors to consider. Firstly, it is important to understand what creatine is and how it works. Creatine is a natural compound found in the body, primarily in muscles, and it helps to produce energy during high-intensity exercise. When taken as a supplement, creatine can increase the amount of creatine in the muscles, which may improve performance during exercise. However, without exercise, the body may not use the extra creatine effectively, and it may lead to unwanted side effects. Understanding Creatine Creatine is an amino acid that occurs naturally in the body from methionine, arginine, and glycine. It plays a vital function in the generation of adenosine triphosphate (ATP), which serves as the primary energy source for muscles. The body stores creatine in the form of phosphocreatine, which can quickly convert into ATP to provide energy during high-intensity activities like weightlifting or sprinting. Creatine reserves can be boosted by consuming supplements. Many athletes and bodybuilders consume creatine supplements to increase their performance during workouts. However, some people wonder if it’s possible to consume creatine without working out. While creatine supplements can be consumed without working out, it’s important to note that they are designed to enhance physical performance during high-intensity activities. Taking creatine without engaging in physical activity may not provide any noticeable benefits. Moreover, immoderate consumption of creatine supplements can result in unfavorable outcomes such as stomach cramps, diarrhea, and dehydration. Hence, it’s crucial to adhere to the recommended dosage and seek advice from a healthcare professional before initiating any supplement routine. Creatine and Muscle Development Creatine is a popular supplement among athletes and bodybuilders. It is known to improve muscle strength and power, which makes it a common choice for those who want to enhance their performance. However, many people wonder whether it is possible to consume creatine without working out and still see muscle development. The short answer is that creatine can help with muscle development, but it is not a magic pill. The mechanism of action of creatine involves augmenting the quantity of phosphocreatine in muscle cells, thereby facilitating the generation of more energy during high-intensity workouts. This increased energy production can lead to better muscle performance and growth. While creatine can help with muscle development, it is important to note that it is not a substitute for exercise. Without proper strength training or resistance training, the benefits of creatine may be limited. Additionally, consuming creatine without exercising may lead to weight gain or other health issues. It is also important to note that the effects of creatine on muscle development may vary depending on the individual. Some people may see significant gains in muscle mass and strength, while others may not see much of a difference. Factors such as diet, exercise routine, and genetics can all play a role in how effective creatine is for muscle development. Creatine and Energy Production Creatine is an organic compound that is naturally present in the human body. It performs a vital function in energy production and serves as a crucial element in the adenosine triphosphate (ATP) regeneration process. ATP, also known as adenosine triphosphate, acts as the primary energy source for the cells in the body. When the body requires energy, it decomposes ATP into ADP (adenosine diphosphate) and discharges energy. Creatine assists in restoring ATP from ADP, enabling the body to sustain high levels of energy during intense physical activity. Research has demonstrated that incorporating creatine supplementation can augment energy availability and enhance endurance and stamina. This can be particularly advantageous for athletes and individuals who participate in high-intensity workouts. Creatine has also been found to increase fatigue resistance, which can help individuals to perform at a higher level for longer periods of time. This is due to the fact that creatine helps to reduce the accumulation of lactic acid in the muscles, which is a major contributor to fatigue. Creatine and Cognitive Function Creatine is a popular supplement among athletes and bodybuilders, but it has also been suggested to have benefits for cognitive function. Creatine is naturally found in the body and is involved in energy metabolism, particularly in the muscles and brain. Research has shown that creatine supplementation may improve cognitive function, particularly in tasks that require short-term memory, attention, and reasoning ability. In a study of healthy young adults, creatine supplementation was found to improve performance on a test of working memory and intelligence. Creatine may also have benefits for individuals with neurological diseases or cognitive decline. Studies have shown that creatine supplementation may improve cognitive function in individuals with Parkinson’s disease and Huntington’s disease. In addition, creatine may have benefits for the elderly population. Research has shown that creatine supplementation may improve cognitive function and reduce the risk of falls in older adults. Creatine and Exercise Creatine is a popular supplement among athletes and fitness enthusiasts. One of the primary reasons people take creatine is to improve their athletic performance during exercise. Creatine has been shown to increase strength, power, and muscle mass, which can be beneficial for those looking to improve their physical performance. Regarding creatine and exercise, it’s crucial to note that creatine is most efficacious when employed in conjunction with consistent exercise. While creatine can provide some benefits on its own, it is not a replacement for exercise. In terms of specific types of exercise, creatine has been shown to be particularly effective for activities that involve short bursts of intense activity, such as sprinting or weightlifting. However, creatine can also be beneficial for endurance activities, such as long-distance running or cycling. It’s crucial to acknowledge that creatine supplementation should be employed in tandem with a comprehensive workout regimen that encompasses rest days and a diverse range of exercise forms. Furthermore, creatine should not be employed as a replacement for adequate nutrition or hydration. Creatine and Diet Creatine is a naturally occurring compound found in red meat and fish. It is also produced by the human body. Creatine is often taken as a supplement to improve athletic performance, but can it be consumed without working out? The answer is yes, creatine can be consumed without working out, but it may not provide the same benefits as when taken in conjunction with exercise. Although creatine supplementation can assist in augmenting muscle mass, strength, and endurance, it is most efficacious when utilized in conjunction with resistance training. In terms of diet, creatine can be obtained through the consumption of red meat and fish. However, it can be difficult to consume enough creatine through diet alone to see the benefits associated with supplementation. This is where creatine supplements come in. When taking creatine supplements, it is important to also consider one’s diet. Carbohydrates, particularly simple carbs, can help increase the uptake of creatine into the muscles. Protein is also important for muscle growth and repair, which can further enhance the benefits of creatine supplementation. For those looking to maximize the benefits of creatine, a loading phase may be considered. This involves taking a higher dose of creatine for a short period of time to saturate the muscles with creatine. This can be followed by a maintenance phase where a lower dose is taken to maintain creatine levels in the muscles. Creatine Supplementation Without Exercise Creatine is a prevalent dietary supplement that athletes and bodybuilders frequently employ to optimize their training performance and augment muscle growth. Nonetheless, several individuals ponder whether they can consume creatine without exercising and still reap its advantages. While creatine is typically associated with exercise and physical activity, there is some evidence to suggest that it may still have some benefits for individuals who are not actively training. For example, some studies have shown that creatine supplementation may improve cognitive function and memory in older adults, as well as reduce fatigue and improve mood in individuals with depression. Moreover, creatine might offer some potential health benefits, such as ameliorating inflammation and enhancing heart health. Nevertheless, further research is necessary to comprehensively comprehend the effects of creatine supplementation on non-exercisers. It’s crucial to note that creatine supplementation is generally deemed safe for most individuals, but it can cause side effects like stomach cramps, nausea, and diarrhea. Additionally, it’s essential to adhere to the recommended dosage instructions, as excessive consumption of creatine can be detrimental to the kidneys and liver. Potential Health Implications Consuming creatine without working out may have potential health implications. While creatine is generally considered safe, it can cause some side effects in certain individuals. One potential issue is that creatine supplementation can cause bloating and dehydration. This can lead to thirst and the need for increased hydration. Additionally, creatine can upset the digestive system and cause stomach discomfort. There is also concern that long-term use of creatine may impact liver and kidney function. However, research has shown that there is no evidence of harm to healthy kidneys or liver function with moderate creatine supplementation. Creatine may also have some positive effects on bone density and blood sugar regulation, as well as antioxidant properties. Nevertheless, additional research is required to comprehensively comprehend these prospective advantages. Creatine for Special Populations While creatine is often associated with athletic performance, it may also have benefits for certain special populations. Here are some examples: Vegetarians Vegetarians may have lower levels of creatine in their muscles due to their diet. Supplementing with creatine may help increase their muscle stores and improve their exercise performance. In fact, research has shown that vegetarians may experience greater benefits from creatine supplementation compared to non-vegetarians. Elderly Population As people age, their muscle mass and strength tend to decline, which can increase the risk of falls and other health issues. Creatine supplementation may help preserve muscle mass and improve strength in older adults. Studies have shown that creatine supplementation can increase muscle strength and power in older adults, as well as improve their ability to perform activities of daily living. It’s essential to acknowledge that although creatine supplementation may offer potential advantages for specific groups, it’s always advisable to seek guidance from a healthcare professional before commencing any new supplement regimen.
ESSENTIALAI-STEM
Park Jeong-ja (actress) Park Jeong-ja (, born March 12, 1942) is a South Korean actress. She made her debut as a theater actor in 1962 and is recognized for her intense, passionate, and intelligent performances. Park is the most critically acclaimed theater actress in South Korea. In 1997, Park became the first Woman who received theater award from 7th Lee Hae-rang Theatre Award, one of the major theater awards in Korea. She also holds the distinction of being the only actress to have won the Best Actress award three times at the Dong-A Theatre Award. In 1971, she received the award for her portrayal of Ondal's mother in "Where and How Shall We Meet?" (7th edition). Then, in 1986, she won for her performances as the second wife in "The Egg" and the aunt in "A Country as Far as the Sky" (22nd edition). In 1987, she secured the award once again for her role as Monique in "Women in Crisis" (23rd edition). Among these works, she played the lead role solely in "Women in Crisis," while in the other two productions, she acted in supporting roles. Park's talent as a film actress has garnered significant recognition. In 1975, she was honored with the Grand Bell Awards for Best Supporting Actress for her role in director Kim Ki-young's "The Promise of the Flesh." She achieved the same feat once again in 1985 for her performance in director Jeong Jin-woo's "The MA-NIM." In addition to these accolades, Park has showcased her acting skills in other notable films such as "Growing Generously," "Anemone," and "Widow's Dance." Since its establishment in 2005, she has served as chairman of the board of directors of the Korea Activist Welfare Foundation and has been supporting medical and living expenses for theater practitioners. In 2007, Park was awarded the 2007 Bogwan Order of Cultural Merit (South Korea) by the government. In 2008, She has been granted membership in the National Academy of Arts of Korea. Early life and education Park Jeong-ja, the youngest of five children, was born on March 12, 1942, in Sorae Port, Namdong-gu, Incheon, during the Japanese colonial period. Her father was a native of Incheon, while her mother originated from Ganghwa Island. Her Japanese name was Masako (正子). Her father selected Chinese character "Baaljeong (正)" as the middle character for her name. Reflecting on her name, Park later commented, "It is uncommon for a woman's name to include the character 'Baaljeong.' However, I believe that 'brightness' has been a guiding force in my life, bringing me to where I am today." Living in Seaside Town during her childhood, she was surrounded by salt farms and narrow-gauge trains. Her father ran a brewery wholesale business called Cheonil Sanghoe in Sorae Port and also served as the village head. Her family, moved to Sinheung-dong, Incheon in the wake of liberation in 1945. They moved into Jeoksan House, where Japanese people used to live. However, in the same year, her father was ill and passed away. After her father's death, Park Jeong-ja's family packs their bags and heads to Yongsan, Seoul. Her mother opens a textile factory in her newly settled city and struggles to support her five children. It was in Seoul, Park first encountered the world of theater. In April 1950, there was a theater called Bumin-gwan, located in what is now the Seoul City Hall. It was there that she witnessed the play "Wonsullang." She was able to watch plays at the theater thanks to her older brother, Park Sang-ho, who worked as a research student at Shinhyup Theater Company. In that era, television was non-existent, and radios were only found in one out of every ten households, making it a tremendous privilege to have the opportunity to attend the theater and experience a live performance. "I saw my first play when I was nine years old (Korean Age). In April 1950, before the June 25 Incident occurred, at the theater now called Bumin-gwan. My brother appeared in a minor role in 'Wonsulang' written and directed by Yoo Chi-jin (柳致眞, 1905-1974). I was ecstatic. Even now, I still remember that scene. Kim Dong-hoon (金東勳) plays the lead role of Won-sullang, Kim Seon-yeong (金仙英) plays Jin Dal-rae, the girl who follows Won-sullang, and Baek Seong-hee (白星姬) plays the princess who is Won-sullang's fiancée. Kim Sun-young was a North Korean actress during the June 25 Uprising. She was short, had a sonorous voice, and was an impressively tall actress."Following the outbreak of the Korean War on June 25, her older brother fled to Daegu with Shinhyup Theater Company. He enlisted locally, and went to consolation performances as a member of the military art corps. Her mother took her four young daughters to seek refuge in her hometown, Ganghwa Island. After the retreat on January 4, 1951, her family relocated once again, this time to Jeju Island. Park distinctly recalls embarking on a US military ship, the LST, from Wolmido to Jeju Island. During their stay, her mother would frequently travel between Jeju, Daegu and Mokpo, buying and selling various goods to make a living. These memories have led Park to consider Jongdal-ri, Gujwa-eup, Jeju, also as her hometown. In the future, she will occasionally visit to reminisce about those days, especially when she misses her mother. After three years of war, an armistice was finally declared, and Park's family returned home to Incheon. She transferred to the 4th grade at Parkmun Elementary School and continued her education in her hometown until the beginning of the 6th grade. During her time at Parkmun Elementary School, there was only one class per grade, and all the students were female. The school was situated within Dapdong Cathedral, which meant that she spent a significant amount of time in the church's front yard. She also appeared in a Sunday school play. She couldn't help but wonder why this fun thing was only done once a year on Christmas. Upon returning to Seoul, Park engaged in various activities during her middle and high school years at Jinmyeong Girls' Middle and High School. She participated in oratory, choir, and Korean dance. The stage became her calling, and she fearlessly embraced every opportunity to perform, showcasing her talent and dedication. During her university entrance exam preparations, a Theater and Film Department was established at Chung-Ang University. However, Park didn't feel inclined to apply. Instead, she unexpectedly chose to pursue Journalism in the Department of Journalism at Ewha Womans University. Initially, during her freshman year, Park intentionally avoided involvement in theater, considering her previous experiences sufficient. She held reservations about university theater, perceiving it as somewhat juvenile and uninteresting. As a result, she didn't audition or consider participating. However, by her sophomore year, the irresistible pull of theater became too strong to resist. Career In 1962, during her second year as a journalism student, Park auditioned for Jean Racine's Phèdre produced by The Ewha Womans University College of Liberal Arts Theater Department (이화여대 문리대 연극부). Despite being confident that she would secure the lead role of Phaedra, she was instead cast as Panov, a maid with only 16 lines of dialogue. When she took the stage, she became stiff and made a mistake towards the end, leading to a scolding from the director. These experiences served as humbling moments for her. Starting from 1962, Park actively participated in three plays throughout her university years. The following year, she performed The House of Bernarda Alba directed by Heo Gyu (許珪, 1934-2000). She received rave reviews for her role as an old woman in her 80s. There was even a comment that 'college plays threaten established plays.' The experiences laid a solid foundation for her career, thanks to the unique nature of The Ewha Womans University College of Liberal Arts Theater Department (이화여대 문리대 연극부). It went beyond being a typical theater club or a departmental project; it embodied the concept of a "college of arts play." The performances took place at prestigious venues such as the Drama Center and Myeongdong Art Theater, rather than the university auditorium. Renowned professional directors provided guidance for the productions, resulting in significant acclaim. Park's passion for acting motivated her to pursue a career in voice acting, especially considering that television was not yet widely accessible, making radio the primary form of entertainment at the time. In 1963, while in her third year of university, Dong-A Broadcasting was established and announced open recruitment for voice actors. Despite the fierce competition, with approximately 150 applicants for each available position, Park decided to apply. She successfully passed the first, second, and third rounds of exams. However, a dilemma arose as her university had a prohibition on students appearing in broadcasts. Park found herself faced with an important decision and ultimately chose to drop out. During her time as a voice actor, Park had the opportunity to work alongside her classmates and other theater actors who also ventured into voice acting on the radio, such as Sami-ja, Jeon Won-ju, and Kim Moo-saeng. She also collaborated with theater actors like Jang Min-ho and Na Ok-ju. This experience allowed her to further develop her skills as a theater actor, including improving her pronunciation abilities. Upon the request of the university's president, Kim Gap-soon (1914-2005), Park still practiced theater with students after work and perform on stage. In 1964, they staged the play Blood Wedding by Federico García Lorca at the National Theater of Korea in Myeongdong. It was during this time that she met the director Kim Jeong-ok, who later became her lifelong theater companion. Kim Jeong-ok was a renowned director from the Minjung Theater. In addition to teaching and directing at The Ewha Womans University College of Liberal Arts Theater Department (이화여대 문리대 연극부), he also held a professorship in Theater and Film Studies at Chung-Ang University. Early career as member of Jayu Theater In 1966, Kim Jeong-ok and Lee Byung-bok established Jayu Theater, inviting actors from the "Minjung Theater" such as Na Ok-ju, Kim Hye-ja, Ham Hyun-jin, and Choi Sang-hyun as founding members. Na Ok-ju recommended Park to join. Park agreed and very happy to be able to work in the same trope with Kim Jeong-ok. Subsequently, the company expanded its roster to include actors Kim Yong-rim, Yoon So-jung, Kim Gwan-soo, Choi Bul-am, Moon Oh-jang, and even film director Kim Hong-sik. In March 1966, they gathered at a famous restaurant called "Hyangwon" in Jingogae. After the founding meeting, with Teacher Lee Byung-bok as the representative, Jayu Theater was officially declared on April 29. Jayu's first performance was a play called "The Feast of the Followers" by Italian playwright Eduardo De Filippo (original title: Poverty and Nobility). It was a farce about poor servants disguising themselves as nobles. At Kim Jeong-ok's suggestion, Jayu Theater initially planned to stage Friedrich Dürrenmatt's The Physicists. However, due to its difficulty and philosophical nature, they changed the play to "The Feast of the Followers." With the performance date approaching in less than a month, they felt the pressure and urgency to prepare. They practiced tirelessly, using Lee Byung-bok's reception room in Jangchung-dong as their rehearsal space. Despite the challenging start, the performance was well-received, particularly for the actors' exceptional acting skills. This successful production marked the beginning of Jayu Theater's journey. "Like the saying 'There must be a small hill for a cow,' I, too, had a definite small hill in my life. Established in June 1966, the theater company called 'Jayu' (Freedom) has one of the longest histories in the Korean theater industry. To me, Jayu was not just a simple hill, but a place that felt like home. Jayu was the starting point where I, Park Jeong-ja, an aspiring actress, could have the space and time to become a star in the theater world."During her time with Jayu, Park had the privilege of participating in remarkable productions such as "The Feast of the Followers," "The Diver Ashore," "Murder Fantasy," "Marius," "The Medal of the Dead," "Song of the Sad Cafe," "Confessions for a Black Prostitute," "Where and What Will We Become?," "Couple Practice," and approximately 30 other works. After standing on stage with Jayu for years, there are works where evaluations of the productions intertwine with Park's personal history. One such work is "Where and How Shall We Meet?" written by Choi In-hoon and directed by Kim Jeong-ok. In the original production at Myeongdong National Theater in 1970, as well as in the revivals in 1974 and 1986, Park Jeong-ja portrayed the role of "On Dal's Mother." Throughout the play, she remained silent until her son, On Dal, died in battle and her daughter-in-law, Princess Pyeonggang, lost her life opposing the rival political faction. Then, she was left alone on stage, delivering a soliloquy in solitude, saying, "Is it snowing...? Why is he so late?" It was during this production in 1970 that Park received her first Dong-A Theatre Award. During the 1974 performance, Park took to the stage with a full-term pregnancy. In the early part of the play, when she had to lie down on the floor upon meeting the princess, she had concerns that the fetus might pop out through her mouth. It was a performance where the baby moved so much that she worried about such an occurrence. In the dressing room, she lay down, gasping for breath, and barely made it onto the stage, enduring each day of the performance. Park had an opportunity to reprise her role as Mother in play Blood Wedding by Federico García Lorca during an outdoor performance at the Malaga International Theatre Festival in Spain, which was the hometown of the playwright. The audience was enthralled even without translation. Local newspapers titled their articles, "Lorca was not betrayed." In response to the evaluation that the actress who played the role of the mother was a world-class performer, the excited interpreter relayed Kim Jeong-ok's words, softly but earnestly, "Park Jeong-ja is already a world-class actress. Her fame has simply not reached Spain yet." Works with Sanullim Theater Park first work with director Lim Young-woong CEO of Sanullim Theater, was play in 'A Country As Far As the Sky'. She acted alongside Jeon Jeon-song, Joo Ho-seong, Jo Myeong-nam and Baek Seong-hee. In January 1986, Park won her second Dong-A Theatre Award for her performance. In 1986, Lim Young-woong was planning to perform Korean adaptations of Simone de Beauvoir's play "Women in Crisis" to commemorate the first anniversary of Sanullim Theater opening. As CEO Lim Young-woong sought a suitable actress for the female lead, he asked Park for recommendations. Park suggested actors Kim Hye-ja and Kim Min-ja, but unfortunately, they were both too busy at the time. In the end, Park recommended herself. However, CEO Lim Young-woong initially rejected the idea, expecting a more renowned actress for the role, which deeply wounded Park's pride. Eventually, CEO Lim Young-woong approached her and handed her the script, suggesting that she join the production. The play turned out to be a success. From the first performance for VIPs on March 30, the response was unusual. Lee Byeong-bok, CEO of Jayu Theater Company, said to director Lim Young-woong, "Thank you for making Park Jeong-ja a woman," and from the next day, housewife audiences flocked to Sanullim Small Theater like a tide. The audience was indignant in real time at the lines spoken by Cho Myeong-nam, who played her husband, and when Park Jeong-ja complained, the housewives sobbed. The article was so popular that it appeared in the social section rather than the cultural section. Park Jeong-ja described it as a work that drew a tremendous audience and marked a significant moment in Korean theater. Through role Monique, Park garnered prestigious accolades including the Dong-A Theatre Award, Baeksang Arts Award, and Seoul Drama Critics Group Award. This remarkable achievement solidified her status as a triple crown winner in the theater industry. However, that particular year happened to coincide with the 20th anniversary of the Jayu Theater Company. Coincidentally, the play chosen to commemorate the occasion was "Where and How Shall We Meet?" based on Choi In-hoon's acclaimed work, which held significant importance for the Jayu Theater. The relationship between two great masters of the Korean theater world, Kim Jeong-ok and Lim Young-woong, was strained because neither of them wanted to give up on Park Jeong-ja. Park revealed that the clash between the two directors made her feel trapped in the middle, making it the most challenging moment in her career. Throughout the summer, "Woman in Crisis" drew packed audiences every day. It had been a long time since such an unprecedented hit had emerged, and the leading actress found herself torn between two extremes, contemplating whether to step down. After many twist and turn, Park Jeong-ja once again took on the role of Ondal's mother. "Woman in Crisis" continued its performances with a change in its lead actress. Kim Jeong-ok, who had not even made eye contact with Park Jeong-ja, resolved the conflict after her first performance by saying, "As expected, you shine on stage." In 1990, Park had remarkable moment in her acting career. It was during the performance of Marsha Norman's play 'night, Mother. Park portrayed the role of a mother desperately trying to dissuade her daughter from taking her own life. The play reached its climax in the final conversation between the mother and daughter, where the daughter ominously hinted at her intentions. The daughter retreated to her room, armed with a pistol, and locked the door. In front of the locked door, Park's character alternated between soothing her daughter, pleading with her, shouting at her, venting her anger, and ultimately collapsing in despair when the gunshots rang out. It was a haunting monologue that traversed a wide spectrum of emotions and showcased the diverse personalities of the characters in just over a minute. Such a performance is a testament to Park Jeong-ja's unique unparalleled talent. Park won Grand prize and Best Actress Award in 8th Baeksang Arts Awards for her performance in play 'night, Mother. When asked about this exceptional performance, Park Jeong-ja humbly responds, "That's high praise. However, I have no plans to revisit play 'night, Mother. I don't believe I can surpass what I accomplished back then. Nevertheless, there are a few other works that offer similar depth and challenges." In 1991, Park worked again with Sanullim Theater with the play 'Mom Discovered the Sea at Fifty,' It was performed for almost a year and attracted more than 50,000 audiences, and set a record of winning four categories including Best Picture, Best Actor, Best Director, and Best Translation in the free entry section of the Seoul Theater Festival. In that same year, The "Flower Bouquet Society," was established, starting with 17 people who love Park Jeong-ja's branded plays such as "Mom Discovered the Sea at Fifty" and "Woman in Crisis," The 12 members already form a group as early as 1987. The name "Flower Bouquet" was chosen by the members, symbolizing the desire to spread the subtle and long-lasting fragrance of culture, like the scent of dried flowers in a bag. Members of the Flower Bouquet Society pay an entrance fee of one million won and purchase four theater tickets per person whenever Park Jeong-ja has a performance. Attending the performances is mandatory. The entrance fees paid by the members are used for the Flower Bouquet Society's activities or donated to other organizations under the name of the society. In 1992, Sanullim Theater relocated to Dongsung-dong, as the current small theater in Unni-dong had to be closed in line with the Seoul Metropolitan Government's initiative to restore Daewongun's private residence. After the theater moved to its new location, a performance of their popular experimental repertoire, Agnes of God, was staged in April to celebrate the opening. Park played the role of the head nun, while Son Sook portrayed Dr. Livingstone. Shin Ae-ra and Jung Soo-young alternated in playing the character of Agnes. In 2003, Park took on the role of Maude in 2nd encore performance of "19 and 80." The play was originally titled Harold and Maude, written by Colin Higgins, and premiered in Korea in 1987, featuring Kim Hye-ja and Kim Joo-seung. The story revolves around Maude, an eccentric, adorable grandmother who, even at the age of 80, refuses to let go of her dream of becoming an astronaut. She meets Harold, a 19-year-old young man, who offers her wisdom and love, helping her find her own strength. It was directed by Jang Doo-yi. Park performed in "19 and 80" five times, in 2003, 2004, 2006, 2008, and 2012, each time with different co-stars. In 2008 version, the play was adapted into a musical. Park personally taking charge as a producer for all five productions. Other activities On May 2005, the Theater People's Welfare Foundation was established, with Park assuming the role of its inaugural president. The is to support the stability of actors' lives in retirement and scholarship programs for their children. Initially hesitant about creating an organization for the theater, Park was eventually persuaded by her colleagues. Park also believed that she had benefited greatly from theater and should contribute back to the theater community. Personal life Park Jeong-ja's path crossed with her future husband thanks to her friend Lee Ji-seon, a reporter of Women Donga. Lee Ji-seon enlisted Park's help to put on a consolation performance for a military unit in Gangwon Province where her brother, Lieutenant Lee Ji-song, was stationed. During Lieutenant Lee Ji-song's break from duty, Park and Lee Ji-seon met to discuss the upcoming performance. Alongside their colleagues Choo Song-woong and Ham Hyun-jin, member of the theater group Jayu, they passionately planned and performed the play "Friendship." Their collaboration and shared experiences forged a deep bond, and Park and Lieutenant Lee Ji-song began their relationship. The couple faced opposition from both families due to the four-year age gap between Park and Lee. Lee's mother, in particular, strongly objected to their relationship. She was worried about Lee's career choice of transitioning from interior design to the advertising industry, and she believed that his decision was solely motivated by his desire to marry Park. This intensified her concerns about the perceived instability of his profession. Despite facing opposition from their families, Park and Lee remained steadfast and ultimately tied the knot in 1972 when Park was 30 years old and Lee was 26 years old. Throughout their marriage, they had a son and a daughter. In 1973, after graduating from the Department of Western Painting at Hongik University, director Lee Ji-song entered the advertising industry. He worked as a commercial director at Manbosa, Yonhap Advertising, Sejong Culture, and Cheil Worldwide. Bravocon and Young Age were among the companies he worked for. He was known for creating successful commercials of the time, including Ghana Chocolate.
WIKI
Exogenous Ketones Exogenous Ketones Keto Exo ALL YOU NEED TO KNOW ABOUT EXOGENOUS KETONES. WHAT TYPE OF DIET WORKS BEST WITH KETO EXO© To get the most benefit we recommend a lower carb (less than 100g/day) or ketogenic (less than 50g/day) diet. DOES KETO EXO© HELP IMPROVE BRAIN FUNCTION? Yes, Ketones are arguably the preferred source of energy for the brain and are used efficiently. There are many trials showing mental improvements seen in ketogenic subjects, including a reduction in the mental decline of those suffering from Alzheimer’s, Dementia and Parkinson’s. Ketones have shown to improve functions around learning, memory and mood. It is estimated for every 1.0 m/mol of ketones in the blood there is approximately a 10% improvement in brain function. Using Keto-Exo could increase Ketones to 1-3 m/mol which could have a profound improvement in mental processing speed and creativity. You may want to consider using Fast Track prior to those important meetings or mentally demanding tasks.  HOW WILL IMPROVED BRAIN FUNCTION HELP ME AS AN ATHLETE? Many people underestimate the benefit of thinking clearing during racing and training. The ability to think through a situation, think through a strategy during the race and make good decisions could make or break your result. In every sport from golf, tennis, cycling to running race mistakes are made, its the person who doesn’t compound the mistake with another mistake that will get a great result. WILL KETONES ASSIST IN NOT HITTING THE WALL? Most athletes at some point have ‘hit the wall’ but attribute this to a physical failure of the body. What most people don’t know is hitting the wall is your body losing the battle with your brain for energy. Ketones are a primary fuel for the brain and the body spare glucose to be used by muscle and keep your brain alert and fueled making you ‘bonk proof’ HOW SOON WILL I BE IN KETOSIS AFTER CONSUMING KETO EXO©? Within 20–30 minutes you could be in full ketosis depending on your diet and when you consumed KETO Exo ©. It may keep you in ketosis for 3-4 hours. WHAT DO EXOGENOUS KETONES DO FOR DIET? Exogenous ketones are supplements and should be supplementary to a low carb/ketogenic style of eating. They will allow you to Fast track your way from High carb to Low carb, or get you back into Ketosis if your diet falls by the way side. Ketones don’t cause weight loss, they help cause ketosis. Exogenous Ketones can be used as a tool to achieve your low carb nutritional strategy without a number of the difficulties often experienced and cause many people to not follow a low sugar, low carb lifestyle and all the benefits. ARE RASPBERRY KETONES THE SAME AS EXOGENOUS KETONES? Are “Raspberry Ketones” the Same as “Ketone Bodies”? Raspberry ketones have become an increasingly popular ingredient used in fat-loss supplements. But, despite their name, they have no relation to ketone bodies. This has created some confusion for people interested in exogenous ketone supplements. WHAT DOES IT MEAN WHEN YOU HAVE KETONES IN YOUR URINE? Ketones are produced when the body burns fat for energy or fuel. They are also produced when you lose weight or if there is not enough insulin to help your body use sugar for energy. Without enough insulin, glucose builds up in the blood. Since the body is unable to use glucose for energy, it breaks down fat instead producing ketones. keto nutrition Socialize With Us: twitter facebook icon instagram
ESSENTIALAI-STEM
Tómas Holton Tómas Albert Tómasson Holton (born 8 July 1964) is an Icelandic former basketball player and coach. In 1983, he won the Icelandic championship and the Icelandic Cup as a member of Valur. Playing the point guard position, he led the Úrvalsdeild karla in assists in 1995 and 2000. Club career Tómas started his senior team career with Valur during the 1981-82 season and with them won the national championship and Iceland Cup in 1983. In 1989, he left the team to play for Budapesti Honvéd in the Hungary Basketball League. The following season he stayed in Hungary and signed with TFSE. He returned to Valur in 1991 for one season as a player-coach before signing with Ammerud Basket in Norway in 1992. From 1994 to 2000, he played for Skallagrímur. National team career Tómas played 55 games for the Icelandic national team from 1985 to 1992. Coaching career Tómas coached ÍS women's team from 1987 to 1989. In 1991, he took over as a player-coach for Valur, replacing Vladimir Obuchov who was fired after a 2-4 start. He guided the team to the Úrvalsdeild finals where it lost to Keflavík. He was the head coach of Skallagrímur from 1994 to 1996, 1997 to 1998 and again from 1999 to 2000. In June 2010, he was hired as the head coach of Fjölnir, replacing Bárður Eyþórsson. He resigned in November the same year after losing the first two games of the season. In September 2011, he returned to Fjölnir as an assistant coach. In August 2012, he replaced Helgi Jónas Guðfinnsson as an assistant to the Icelandic men's national team. In January 2016, he was hired as an assistant coach to Valur women's team. He remained with the team the following season. Personal life Tómas is married to Anna Björk Bjarnadóttir, a former member of the Icelandic women's national basketball team. Together they have three children and two of them, Bergþóra Holton Tómasdóttir and Tómas Heiðar Tómasson, played basketball in the Icelandic top-tier leagues. Tómas' uncle was Helgi Jóhannsson, one of the main pioneers of modern basketball in Iceland.
WIKI
Consumer Sector Update for 08/10/2017: APRN,WFM,AMZN,HDSN,DOOR Top Consumer Stocks WMT -1.00% MCD +1.25% DIS -1.05% CVS +1.06% KO +0.50% Consumer stocks were broadly lower Thursday afternoon, with shares of consumer staples companies in the S&P 500 recouping much of their prior declines in recent trading and pulling within 0.1% of breaking even while shares of consumer discretionary firms in the S&P 500 remaining over 1.1% lower. In company news, Blue Apron Holdings ( APRN ) dropped to its worst share price in its short tenure as a publicly traded company, sliding over 19% lower to an all-time low of $5.03 per share after the food home-delivery company today turned in a larger Q2 net loss than Wall Street was expecting. Net loss for the three months ended June 30 was $0.47 per share, retreating from $0.00 per share in the year-ago period and missing the Capital IQ consensus modeling a $0.34 per share Q2 net loss. Revenue rose 19% over the same quarter in 2016 to $238.1 million, narrowly beating the $235.8 million consensus. Blue Apron completed its initial public offering on June 29, selling 30 million shares at $10 apiece, the low end of their previously reduced price range. Within just one week, the freshly minted stock had dropped into a bear market, declining over 20%, and has largely plotted a downward course ever since - with the June 16 proposed merger between grocery rival Whole Foods ( WFM ) and online retailing giant Amazon.com ( AMZN ) particularily contributing to the negative investor sentiment. In other sector news, (+) HDSN, (+21.1%) Fiscal Q1 EPS beats by $0.02 per share. Revenue rises 38% to $38.8 mln, roughly in-line with the $38.96 mln consensus. Also, acquires Airgas-Refrigerants from parent company Airgas (ARG) for $220 mln. Transaction expected to close before the end of 2017. (-) DOOR, (-22.9%) Adjusted Q2 EPS falls to $0.89 from $1.02 per share during year-ago period and trailing the Capital IQ consensus by $0.22 per share. Net sales rise 1% to $520 mln, also lagging the $547.8 mln analyst mean. The views and opinions expressed herein are the views and opinions of the author and do not necessarily reflect those of Nasdaq, Inc. Copyright (C) 2016 MTNewswires.com. All rights reserved. Unauthorized reproduction is strictly prohibited. The views and opinions expressed herein are the views and opinions of the author and do not necessarily reflect those of Nasdaq, Inc.
NEWS-MULTISOURCE
Calculus The Particular Case of Positive Series Consider the series and its associated sequence of partial sums . Here we will assume that the numbers we are about to add are positive, that is, for any... The Geometric Series Introduction Suppose someone offers you the following deal: You get $1 on the first day, $0.50 the second day, $0.25 the third day, and so on. For a second,... Convergence of Series Consider the series and its associated sequence of partial sums . We will say that is convergent if and only if the sequence is convergent. The total sum of... Introduction to Series The notion of series is closely related to the sum of numbers. In fact, whenever one hears the word series, the first thing to come to mind is the... Problems on Sequences In this page you will find some not so easy problems on sequences. Problem 1: Let be a sequence of real numbers such that . Show that . A... Some Special Limits Here we will discuss some important limits that everyone should be aware of. They are very useful in many branches of science. Example: Show using the Logarithmic function that... Limit of a Sequence-2 Some basic properties. 1. The limit of a convergent sequence is unique. 2. Every convergent sequence is bounded. This is a quite interesting result since it implies that if... Limit of a Sequence The notion of limit of a sequence is very natural. Indeed, consider our scientist who is collecting data everyday. Set to be the sequence generated by our scientist (... Sequences: Basic Definitions Consider the sequence . It is clear that we have The numbers are getting bigger and bigger. Now consider the sequence . In this case, we have Notice that... Introduction to Sequences Sequences are to calculus what at calculator is to a scientist. There are many ways to introduce sequences. Here we will follow a somewhat unorthodox way. Indeed, consider a...
ESSENTIALAI-STEM
User:Jtwsaddress42/People/Porges, Stephen W. Porges, Stephen W. (1945 – ) Notable Accomplishments * Evolutionary Analysis of the Vertebrate Autonomic Nervous System * Polyvagal Theory Publications Related
WIKI
96 How does one combine two GCC compiled .o object files into a third .o file? $ gcc -c a.c -o a.o $ gcc -c b.c -o b.o $ ??? a.o b.o -o c.o $ gcc c.o other.o -o executable If you have access to the source files the -combine GCC flag will merge the source files before compilation: $ gcc -c -combine a.c b.c -o c.o However this only works for source files, and GCC does not accept .o files as input for this command. Normally, linking .o files does not work properly, as you cannot use the output of the linker as input for it. The result is a shared library and is not linked statically into the resulting executable. $ gcc -shared a.o b.o -o c.o $ gcc c.o other.o -o executable $ ./executable ./executable: error while loading shared libraries: c.o: cannot open shared object file: No such file or directory $ file c.o c.o: ELF 32-bit LSB shared object, Intel 80386, version 1 (SYSV), dynamically linked, not stripped $ file a.o a.o: ELF 32-bit LSB relocatable, Intel 80386, version 1 (SYSV), not stripped 1 • 2 gcc does not currently have a -combine option. It exists in gcc 4.1.2 and does not exist in gcc 6.3.0 (someone else can figure out just when it was removed). Jul 11, 2019 at 23:05 2 Answers 2 109 Passing -relocatable or -r to ld will create an object that is suitable as input of ld. $ ld -relocatable a.o b.o -o c.o $ gcc c.o other.o -o executable $ ./executable The generated file is of the same type as the original .o files. $ file a.o a.o: ELF 32-bit LSB relocatable, Intel 80386, version 1 (SYSV), not stripped $ file c.o c.o: ELF 32-bit LSB relocatable, Intel 80386, version 1 (SYSV), not stripped For an in-depth explanation see MaskRay's Relocatable linking article. 8 • 2 Is it possible to do the inverse operation? i.e. produce a.o and b.o from c.o? Feb 1, 2014 at 22:19 • 8 @BertRegelink no, because there's no unique inverse, In maths terms, doesn't forma group :P – Alec Teal Feb 23, 2014 at 8:03 • 7 Warning: --relocatable seems to be less portable. The ld that comes with Android NDK only recognizes -relocatable. If you need portability, stick to -r. Jun 20, 2017 at 15:27 • 3 @matthijs The word is the same; the difference is one minus or two. Sep 23, 2017 at 19:36 • 1 Ah, didn't see that. So, the Android NDK only recognizes -relocatable and -r, but not --relocatable. Thanks for clarifying! Sep 25, 2017 at 8:53 10 If you want to create an archive of two or more .o files (i.e.. a static library) use the ar command: ar rvs mylib.a file1.o file2.o 2 • @Lucian But why would you want to do this? A static library is much more convenient to link against than a .o file. – anon Jun 5, 2010 at 11:31 • 7 I need to run objcopy on the resulting file and make some kinds of symbols local to the file so that they are not visible externally. Some of the symbols that need be localized are referenced between the a.o and b.o files. I can't localize individual files – as the symbols would not be found at linker time – and I can't localize symbols from the static archive either. Jun 5, 2010 at 11:39 Your Answer By clicking “Post Your Answer”, you agree to our terms of service, privacy policy and cookie policy Not the answer you're looking for? Browse other questions tagged or ask your own question.
ESSENTIALAI-STEM
Please enter search term What Causes Your Eyelids to Sag? September 18, 2008 Numerous theories have been proposed seeking to explain what causes the baggy lower eyelids that come with aging. Now, researchers have determined that fat expansion in the eye socket is the primary culprit. The study is the first to examine the anatomy of multiple subjects to determine what happens to the lower eyelid with age. It is also the first face-aging study that uses high-resolution magnetic resonance imaging (MRI). The study looked at MRIs of 40 subjects (17 males and 23 females) between the ages of 12 and 80. The findings showed that the lower eyelid tissue increased with age, and that the largest contributor to this size increase was fat increase. Nearly 11.7 million cosmetic surgical and nonsurgical procedures were performed in the United States in 2007, according to the latest statistics collected by the American Society for Aesthetic Plastic Surgery. Cosmetic surgical procedures (including eyelid surgery, which was the third most popular type of cosmetic surgery) increased 8 percent between 2006 and 2007.  Blepharoplasty eyelid surgery lifts the sagging tissues underneath your eye that make you look tired and sad, into more youthful proportions.  What REALLY Causes Under-Eye Bags?  It's a pity that our culture is so into the quick fix, because it is very rare when the rigid application of basic natural therapies is insufficient to eliminate the need for these types of surgical interventions. Typically, bags under your eyes are related to a number of causes such as But one of the most important ones is oxidative stress – the result of eating a largely unhealthy diet of processed foods – which causes an accumulation of free radicals, or cell damaging substances, in your body. Naturally, this type of cellular damage is most visible on your face, in the form of wrinkles, bags, droopy eyelids and loss of skin elasticity and glow. Diets high in sugar increase free radicals and oxidative stress, and leads to signs of premature aging, and according to a recent study published in the European Journal of Clinical Investigation on May 16, 2008, people with metabolic syndrome suffer greater levels of oxidative stress than those who are not pre-diabetic. As I’ve reported before, almost 26 percent of U.S. adults over the age of 20 are pre-diabetics, and more than 35 percent of seniors, 60 and older have pre-diabetes. And that’s in addition to the 8 percent that have already crossed the line and are diabetics. Obese people also have much higher levels of oxidative stress. Believe me, there’s more to great skin and a youthful face than your genes at work. The way to decrease the speed at which signs of your real age show up, is by consuming large amounts of whole, unprocessed, healthy raw foods that are loaded with antioxidants. If you’re still young, you will be less likely to develop them in the first place if you take a proactive, healthy approach now. One of the reasons I started vegetable juicing is that I would see 75-year-old women in my practice who looked like they were 40 years old with virtually no facial wrinkles. Most of them were doing large amounts of juicing and led healthy lifestyles. This impressed me quite a bit -- so much so that I started daily vegetable juicing myself. Juicing for a Fresh Face I believe at least one-third of all the food you eat should be raw, as cooking and processing can destroy essential micronutrients. Juicing is therefore one of the healthiest choices you make  for your body, so if you don't already own a juicer, getting one might be one of the wisest investments you could make. There are three main reasons why you will want to consider incorporating vegetable juicing: 1. Juicing helps you absorb all the nutrients from the vegetables. This is important because most of us have impaired digestion as a result of making less-than-optimal food choices over many years. This limits your body's ability to absorb all the nutrients from the vegetables. Juicing will help to "pre-digest" them for you, so you will receive the maximum amount. 2. Juicing allows you to consume an optimal amount of vegetables in an efficient manner. If you are a carb type, you should eat one pound of raw vegetables per 50 pounds of body weight per day. Some people may find eating that many vegetables difficult, but it can be easily accomplished with a quick glass of vegetable juice. 3. You can add a wider variety of vegetables in your diet. Many people eat the same vegetable salads every day. This violates the principle of regular food rotation and increases your chance of developing an allergy to a certain food. But with juicing, you can juice a wide variety of vegetables that you may not normally enjoy eating whole. You will want to fine-tune your vegetable selections based on your nutritional type, and if at all possible, aim to buy organic, locally-grown vegetables that are in season. If no organic vegetables are available, carefully wash your foods, and remove peels and cores, to minimize your exposure to pesticides and other chemicals, which can also increase oxidative stress. Science also corroborates the wisdom of eating a nutrient dense diet for skin rejuvenation. A 2001 study published in the Journal of the American College of Nutrition concluded that the fountain of youth might be as close as your kitchen. In this international study of eating patterns and skin aging, investigators found that both dark- and fair-skinned people who ate plenty of wholesome foods, and passed on sugary confections, were less prone to wrinkling. This anti-wrinkle effect of a nutritious diet was consistent from sun-drenched Australia to sun-deprived Sweden. Some of the skin-smoothing foods included: The researchers found that even when they factored in age and smoking -- which is linked to premature skin aging -- diet still played a role in wrinkling of skin. Overall, people who ate more of the foods that are universally recommended for good health had smoother skin. Certain foods offered skin protection due to their high levels of antioxidants such as vitamins A, C and E. The skin, they noted, is a "major target of oxidative stress." Monounsaturated fats such as olive oil may offer protection through the same mechanism. Fatty acids are present in your skin, and monounsaturated fats resist oxidative damage. Other Common Sense Tips and Tricks As I mentioned above, under-eye puffiness can also result from fluid retention, which ironically can be exacerbated by dehydration, so making sure you’re drinking enough water every day might help reduce that swollen look.  You can also try the old potato trick, which seems to work better than cucumbers. Potatoes contain catecholase, which is actually used in some cosmetics as a skin lightener. Placing a half-moon slice of potato underneath each eye for about 20 minutes while you’re resting can help reduce the swelling and brighten dark under-eye circles. Another key to maintaining a youthful appearance and brighter, clearer skin is regular exercise, though not in excess, as excessive exercise can also cause wrinkles. Last, but certainly not least, a good night's sleep and properly addressing emotional stresses are essential keys to maintaining or regaining your optimum physical appearance. One of the best ways to address emotional challenges, which can also lead to insomnia, is with psychological acupressure techniques like the Emotional Freedom Technique (EFT). Previous ArticleDid Bayer Pesticides Cause the Mass Death of Bees? Next ArticleFood Makers Skimp on Ingredients in an Effort to Fatten Their Profits Sources and References Most Popular
ESSENTIALAI-STEM
Skip to main content Photography of Alvaro Montoro being a doofus Alvaro Montoro Fullstack Developer Building a coordinate system with HTML and CSS css html webdev I developed a dynamic cartesian coordinate system. It may be a bit basic, but I find it interesting because you can plug in many different functions and display the points correctly. All while having some interesting features: • Customizable: pick the colors, size, ranges, center of the system, etc. • Responsive: 100% of the parent width by default, but it can have relative/absolute sizes. • Easy-to-use: straightforward translation of functions to CSS. • Lightweight: 35 lines of CSS and a line of HTML for each point to be displayed. No JavaScript. Yes, you read right: it doesn't use JavaScript to do the function calculations. Instead, it's all in CSS with the calc() method. Article contents: 1. Introduction 2. The Code 3. Variables 4. Examples and Demos 5. Accessibility 6. What's next? Introduction A weekend in September —Yes, I've had the article written since then but never published it—, I woke up early, and taking advantage that everyone else in the house was still sleeping, I decided to play with HTML and CSS. Looking at Twitter, I found this tweet by Lea Verou: She uses calc() to generate a range of values following a linear function. It is an interesting approach that uses calc() combined with custom properties (I've also seen it done by Ana Tudor and Temani Afif, among others). I wanted to try something like this too. Maybe create an example using a quadratic function. Then one thing led to another, and the demo started growing. First, I built a basic graph of a cartesian system with a quadratic function with just HTML and CSS. All the values were hardcoded, so it was too specific. Then, I tried to make it more and more generic to match as many functions as possible: linear, quadratics, cubic, etc., and it worked. It scaled pretty well to the new operations. And it wasn't a complex demo either. The Code The whole code for the cartesian system fits in fewer than 40 lines of CSS code! And that's taking into account the use of CSS custom properties that made the whole thing a bit lengthy (but more customizable, so it's a give-and-take situation.) Here is the CSS code: .css-ccs { --c: 10; --cx: 5; --cy: 5; --dsize: 10; --dcolor: #369; --size: 100%; position: relative; width: var(--size); height: 0; padding-top: var(--size); box-sizing: border-box; aspect-ratio: 1/1; background-image: linear-gradient(#0000 calc(var(--cy) * 100% / var(--c) - 1px), #0008 0 calc(var(--cy) * 100% / var(--c) + 1px), transparent 0), linear-gradient(to right, #0000 calc(var(--cx) * 100% / var(--c) - 1px), #0008 0 calc(var(--cx) * 100% / var(--c) + 1px), transparent 0), repeating-linear-gradient(#0002 0 0.5px, #0000 0 calc(100% / var(--c) - 0.5px), #0002 0 calc(100% / var(--c))), repeating-linear-gradient(to right, #0002 0 0.5px, #0000 0 calc(100% / var(--c) - 0.5px), #0002 0 calc(100% / var(--c))); } .css-ccs.no-overflow { overflow: hidden; } .css-css .dot { --translationUnit: 100% / var(--c); --translationX: var(--translationUnit) * var(--cx); --translationY: var(--translationUnit) * var(--cy); /* Vertical is "flipped" in CSS: higher values go down! Do negative! */ --y: calc(var(--translationY) - var(--translationUnit) * var(--function)); width: calc(var(--dsize) * 1px); height: calc(var(--dsize) * 1px); background: var(--dcolor); border-radius: 50%; position: absolute; transform: translate(-50%, -50%); left: calc(var(--translationX) + var(--x) * var(--translationUnit)); top: var(--y); } That .css-ccs code will generate the axes and the guidelines, while the .dot sets the stage for the function later. As for the HTML, we will need an element with class css-ccs (CSS Cartesian Coordinates System) that will contain other elements of class dot that will set the x value in the style. Something like this: <div class="css-ccs"> <div class="dot" style="--x: -3;"></div> <div class="dot" style="--x: 0;"></div> <div class="dot" style="--x: 1;"></div> <div class="dot" style="--x: 2;"></div> <!-- ... --> </div> Ideally, I would have loved to have something like this: <figure> <figcaption>Graph Title</figcaption> <output data-x="-3"></output> <output data-x="0"></output> <output data-x="1"></output> <output data-x="2"></output> </figure> And while I will eventually change the tags, not all of the changes are possible. data-x would be the best way for indicating the x value: a data attribute for a piece of data instead of a "styling variable." Unfortunately, CSS doesn't currently support reading the data attributes and passing the value to a custom property. So the custom property will do for now. Finally, we need to plug in the function to the graph. It will go for the .dot class and be (kind of) straightforward: we will define a --function custom property in the dot with a calc() with the function. That's it. The catch? CSS doesn't have powers (or many other types of operations for that matter), so to do something like x2, we will need to multiply x by x (x*x). We have x in the --x custom property, so we will need to do this: .my-chart .dot { /** * x^2 = x * x = var(--x) * var(--x) */ --function: calc(var(--x) * var(--x)); } A bit lengthy and verbose, but still simple and not too difficult to read. Variables We can customize the graph, passing some CSS variables to the chart itself (the container) and individually to each dot. These are the variables for the container: Name Default Description --c 10 Number. Size of the diagram (in total "cells"). It must be a positive number. --cx 5 Number. Position of the x-axis in the diagram. It must be an integer. It should be positive and less or equal to --c. --cy 5 Number. Position of the y-axis in the diagram. It must be an integer. It should be positive and less or equal to --c. --dsize 10 Number. Size of the dots in pixels. It must be positive and greater than zero. --dcolor #369 Color. Color of the dots (any color format). --size 100% Length. Width of the coordinate system. It can be absolute or relative to the parent. Thanks to the CSS cascade, we can redefine some of those values individually for each dot. Additionally, we have to pass the x value for the dots: Name Default Description --dsize 10 Number. Size of the dots in pixels. It must be positive and greater than zero. --dcolor #369 Color. Color of the dots (any color format). --x N/A Number. Required. Value of the x to be passed to the function and represented in the graph. Examples and Demos Here there are some examples of plotted graphs with CSS using this method: Linear function: x - 3 #axis_x-3 .dot { /** * f(x) = x - 3 * x = var(--x) */ --function: calc(var(--x) - 3); } Quadratic function: x2 - 5 #axis_x2-5 .dot { /** * f(x) = x^2 - 5 * x^2 = var(--x) * var(--x) */ --function: calc(var(--x) * var(--x) - 5); } Cubic function: 0.4x3 - 5.25x - 4 #axis_04x3_525x_4 .dot { /** * f(x) = 0.4x^3 - 5.25x - 4 * 0.4x^3 = var(--x) * var(--x) * var(--x) * 5.25x = 5.25 * var(--x) */ --function: calc(0.4 * var(--x) * var(--x) * var(--x) - 5.25 * var(--x) - 4); } Reciprocal square function: 1 / x2 #axis_1_x2 .dot { /** * f(x) = 1 / x^2 * x^2 = var(--x) * var(--x) */ --function: calc(1 / (var(--x) * var(--x))); } Accessibility The graphs may look nice, but they present some accessibility challenges. The whole chart is empty, so we should at least add an aria-label with a description of the content. Also, a role would be nice. Adding a role of "img" or "figure" would help announce the graph correctly to assistive technologies. Even better, we could use the <figure>/<figcaption> tags. But then, we would need to do some CSS gymnastics because the background will take 100% of the container, and some overlap may happen. As for the data points, right now, they are <div>, but more semantic tags would better describe what these elements are. (For example, <output>, <data>, or <samp>.) <div class="css-ccs" role="img" aria-label="Cartesian coordinate system representing the function ... with points at ..."> <!-- ... --> </div> Apart from that, the points don't have any information, and it would be nice to have some data on hover/focus. If/When we do that, we'll need to take into account the accessibility of both states, so there are good alternatives for assistive technology users. What next? While the CSS works fine and it is a nice experiment, it lacks many key features. Some of them can be added or simulated with HTML and CSS, but others require JavaScript. Still, our little coordinates systems are lightweight and straightforward. CSS's limitations also restrict the graphs. CSS math function list is growing (min, max, clamp, etc.), and we can simulate some common operations (as Ana Tudor shows in her articles, but there are still many math calculations that cannot be done just with CSS, and that will limit us. Probably not something to keep building into a library, but it could be helpful for drawing small examples and doesn't require a heavy external library (I'll take 40 short lines of CSS vs. a 100KB bundle of JS). Plus it was fun to develop and figure out. Article originally published on
ESSENTIALAI-STEM
Synesthesia is a neurological condition in which someone's senses are stimulated by another sense. Someone with synesthesia may taste shapes, hear colors, or smell words. A more specific time of synesthesia that is related to music is called "Chromesthesia," and it's a very interesting phenomenon. What is even more interesting and shocking is that one in twenty people have some form of Synesthesia. Chromesthesia is a type of synesthesia in which sounds are translated into different colors. This affects different people with this condition in different ways, but one example of a person with Chromesthesia on which a study was done is an art teacher who described her experience. Whenever she would hear high notes, she would see pale colors. lower notes would evoke images of darker colors, and when she heard chords, she would see explosions of colors, almost like fireworks. Imagine that! People that experience Chromesthesia often do not even realize that they have it, because it is common to them to have their senses crossed. Although one does not have to be a musician to experience Chromesthesia, it would help an aspiring musician to learn an instrument. For example, many people see specific colors for specific pitches. This could relate very closely with someone who has perfect pitch, which is someone who can identify a pitch just by hearing it. This person might see the color purple when they hear a C, so learning would be easier, as they could associate the pitch with a color. The way each person perceives the world is different, but that makes us all unique! If you think you may have Synesthesia or Chromesthesia, a music career might be the right path for you. Or you can just be someone who experiences and enjoys music in a whole different way.
FINEWEB-EDU
Fairford (1782 EIC ship) Fairford was built by John Barnard at Barnard's Wharf in Rotherhithe and launched in January 1782. Captain John Haldane sailed from Gravesend on 2 May, bound for India. He stopped at Portsmouth where he waited for thee months. Fairford left Portsmouth on 11 September 1782 in company with General Goddard, General Coote, and several other East Indiamen. Fairford reached Bombay. She was loading cargo for England when she caught fire there on 15 June 1783. She was entirely consumed, but her crew was saved. The Governor of the Bombay Presidency, William Hornby, gave Haldane command of the packet Nancy. Nancy was lost off the Isles of Scilly on 9 February 1784, or 24 February. Among those drowned were actress Ann Cargill and her young child; Cargill was Haldane's lover or wife.
WIKI
Show Contents / Index / Search Create a New Session This sample program creates a completely new host session without an existing Reflection 2008 session file. The session is created by getting a control object, which contains only the data of a session and, by itself, isn't visible. (To make a session visible, you must also create a View object.) To create a new session 1. Start Reflection 2008. 2. In Visual Studio, create a new Console Application project. 3. In the New Project dialog box, type Create New Session in the Name box. 4. Select the Create directory for solution box, click Browse to select your API projects folder (for example, C:\MyProjects), and then click OK. 5. In Solution Explorer, add the class assemblies. (For instructions, see Create an API Project.) 6. Copy the code from one of the following programs: Create New Session (IBM) Create New Session (OpenSystems) 7. In Visual Studio, paste the code to the Program.cs tab, replacing all existing code. 8. Note the following operations in this program (examples below are for IBM hosts). Get an application object: Attachmate.Reflection.Framework.Application reflectionApplication = MyReflection.CreateApplication("Reflection"); Create a control object for a 3270 terminal session: IIbmTerminal terminal = (IIbmTerminal)reflectionApplication.CreateControl(new Guid("{09E5A1B4-0BA6-4546-A27D-FE4762B7ACE1}")); Connect to the host: terminal.HostAddress = "[MyHost]"; terminal.Connect(); Wait for the host screen to settle: screen.WaitForHostSettle(6000, 3000); Get text from the session screen (row 18, column 2, text string length 48): string text = screen.GetText(18, 2, 48); Write the text to a console window: Console.WriteLine(text); 9. Build the application (Build > Rebuild Solution) and then run it (Debug > Start Without Debugging). A console window should appear, displaying text from a session.
ESSENTIALAI-STEM
Mem 1: Implementation of De-Baathification Order No. 1 COALITION PROVISIONAL AUTHORITY MEMORANDUM NUMBER 1 IMPLEMENTATION OF DE-BA`ATHIFICATION ORDER NO. 1 (CPA/ORD/16 May 2003/01) Pursuant to my authority as Administrator of the Coalition Provisional Authority (CPA), relevant U.N. Security Council resolutions, including Resolution 1483 (2003), and the laws and usages of war, Recognizing that the Iraqi people have suffered large scale human rights abuses and depravations over many years at the hands of the Ba`ath Party, Noting the grave concern of Iraqi society regarding the threat posed by the continuation of Ba`ath Party networks and personnel in the administration of Iraq, and the intimidation of the people of Iraq by Ba`ath Party officials, Implementing CPA Order No. 1, De-Ba`athification of Iraqi Society (CPA/ORD/16 May 2003/01), and CPA Order No. 5, Establishment of the Iraqi De-Ba`athification Council (CPA/ORD/25 May 2003/05), I hereby promulgate the following: Section 1 Objective 1) This Memorandum prescribes a two-staged process fro carrying out the de- Ba`athification of Iraqi society. To expedite the identification of Ba`ath Party members at the outset of the CPA’s restoration of Iraq, the Commander of Coalition Forces, through Accreditation Review Committees (ARCs), will initially perform the investigative function, relying upon military investigative resources with training and experience in performing analogous fact-finding duties. 2) Later, as higher levels of the former Iraqi government undergo a reliable and rigorous de-ba`athificaiton process and the Iraqi De-Ba`athification Council demonstrates sufficient capability, the Administrator will task the IDC to assume increasing and ultimately full responsibility for the process, subject to the authority, direction and control of the Administrator. The ARCs shall remain in operation until the people of Iraq adopt a representative from of self-government. CPA/MEM/3 June 2003/01 � Section 2 Interim Process for Identifying Ba`ath Party Members 1) The commander of Coalition Forces shall provide military investigative resources sufficient to receive and compile information concerning possible Ba`ath Party affiliations of employees at all ministries. These resources may be augmented or replaced by U.S. civilian investigators as necessary, and should include professional Iraqis whenever possible. 2) These investigators will: a) Conduct Investigations. Investigators will be posted to the ministries to receive and compile information concerning the possible Ba`ath Party affiliations of their employees. These investigators will draw from available and relevant information, such as: i. Interviews with the individual (conducted by the investigators using the standardized form already developed); ii. Public records and announcements documenting the ascension or promotion of party members; iii. Judgments of CPA senior ministry advisors; iv. Testimony of Iraqis who have worked with the person in question; v. Findings of the Iraqi De-ba`athificaiton Council described below (passed to the investigators through the Administrator); vi. Assessments of leading Iraqi political figures; and vii. Government records revealing bonuses or other privileges associated with being a party member. b) Make Determinations of Ba`ath Party Membership. The investigator will make a factual finding about the person’s affiliation with the Ba`ath Party. The investigator will advise the employee that he or she has the right to appeal this factual finding (whether he or she was a Ba`ath Party member). Based upon the investigator’s finding, the Senior Ministry Advisor will take action in accordance with the criteria for removal set forth in CPA Order No. 1 (CPA/ORD/16 May 2003/01), unless an exception is granted. c) Prepare the Case for Exceptions Where Appropriate. When the ministry team requests an exception for an individual, the investigator will determine whether the person in question is eligible. The investigator will subsequently prepare the case for an exception. CPA/MEM/3 June 2003/01 � Section 3 Phased Process for Identifying Ba`ath Party Members 1) As the Administrator determines that the responsibility for identifying Ba`ath Party members effectively can be transferred to Iraqi citizens, the Administrator shall direct the Iraqi De-ba`athificaiton Council to assume an increasingly significant role in carrying out the de-ba`athificaiton process. 2) Initially, the Council will advise the Coalition on de-ba`athificaiton policies and procedures (including the appropriateness of granting exceptions to CPA Order No. 1 (CPA/ORD/16 May 2003/01)) and meaningfully involve the Iraqis in the de-ba`athificaiton effort. 3) The Council will provide information to the investigators (through the Administrator) and nominate Iraqi legal professionals to participate in the ARCs described in Section 4 herein, and in the investigatory process. When appropriate, it is anticipated that the Council will assume the investigative responsibility entirely. Section 4 Accreditation Review Committee 1) The Commander of Coalition Forces is authorized to establish and administer one or more ARCs. These bodies will be comprised of one military and two civilian members (one of whom will be an Iraqi). The ARCs shall remain in operation until the people of Iraq adopt a representative form of self-government. The ARCs will: a) Hear Appeals of Fact. The ARCs will hear the appeals of Iraqis who believe they were wrongly found to be ba`atheists. These appeals will be conducted in a manner that comports as nearly as practicable to tribunals convened by Coalition Forces under Article 5 of the 1949 Geneva Convention. b) Grant or Deny Requests for Exception. The ARC will review applications for exceptions prepared by the investigators, and grant or deny them. All ARC decisions will be immediately reported to the Administrator, who retains the authority to overturn any decision to grant or deny an exception. The ARC will take into account all available and relevant information, including whether the individual: i. Is willing to denounce the Ba`ath Party and his past association with it; CPA/MEM/3 June 2003/01
WIKI
Saudi Arabia executes prince (CNN)Saudi Arabia has taken the rare step of executing a member of its royal family after he was found guilty of murder, the Saudi Interior Ministry said in a statement. Prince Turki bin Saud bin Turki bin Saud Al-Kabeer was convicted in the shooting death of a man during a "group quarrel," the statement said Tuesday, according to the state-run Saudi Press Agency. The dead man was identified as a Saudi national. The execution took place Tuesday. The statement did not include any details about the method of execution. In other cases in Saudi Arabia the death sentence has been carried out by beheading. The guilty verdict was supported by an appeals court and later sanctioned by the Supreme Court of Saudi Arabia. A royal order was then issued to execute the courts' ruling, the press agency reported. Report: 'Blood money' refused The Saudi Gazette, an English-language newspaper based in Jeddah, said the victim's family had refused offers of "blood money" and demanded justice be carried out. It is extremely uncommon for a member of the Saudi royal family to be put to death in Saudi Arabia. In 1975, Prince Faisal bin Musaid was beheaded for assassinating King Faisal. "The government ... is keen to keep order, stabilize security and bring about justice through implementing the rules prescribed by Allah ... on whoever violates the sanctity of civilians," the Interior Ministry said. King as 'enforcer' The execution was "very rare," said Bruce Riedel, a senior fellow in the Center for Middle East Policy at the Brookings Institution. "This execution has been widely praised in the kingdom for establishing that the rule of law applies to everyone including royals," he told CNN. "The King has been the enforcer of the royal family since his days as governor of Riyadh province where most royals live. He served in that position for a half century before becoming crown prince." Many in the kingdom have taken to social media to commend King Salman for allowing the execution to go ahead despite the man being a member of the Saudi royal family. Numerous posts have praised the Saudi King for enforcing the law equally. One person using the handle @goromalbeshe took to Twitter, posting: "This is what we have known about (King) Salman the decisive may God grant him long age in his service. May God have mercy and the killer and the killed." Khaled Bin Saud al Kabeer, who appears to be a blood relative to the executed prince, tweeted: "In any case, praise to be to God. May God make implementing his law on son Turki Bin Saud bin Turki Bin Saud al Kabeer, a forgiveness for him and may have his place in heaven." Another user, @aboalrawe_a, wrote: "There is no doubt that Islamic sharia is practiced in Saudi Arabia." So fervent was discussion about the execution that a hashtag, which translates from Arabic to "Salman the divisive order the punishing of a prince," began trending on social media. King Salman ascended to the throne in January 2015 following the death of his brother King Abdullah. According to the rights group Amnesty International, at least 158 people were executed in Saudi Arabia in 2015, the highest recorded figure in the country since 1995. As of late May, at least 94 people had already been put to death this year, the group said. CNN's Ali Younes and Lauren Said-Moorhouse contributed to this report.
NEWS-MULTISOURCE
Hidden in middens: New clues of earliest known Bolivian Amazon humans Researchers have discovered the earliest evidence yet of humans living in the Bolivian Amazon, putting the first known human habitation of the region at about 8000 years earlier than was previously thought. The new finding, which centres on data gathered from middens in the often-flooded Bolivian grasslands, puts the date of the earliest known human habitation of the area at 10,400 years ago. The study, published today in the journal PLOS ONE, involved excavation of three middens in the Bolivian Amazon that revealed layers of freshwater snail shells, animal bones and charcoal topped by newer layers containing human bones, bone tools and pottery. Katherine Szabo, Principal Research Fellow at the University of Wollongong and a co-author of the new study, said that the finding showed these early human groups were able to adapt to difficult environments. "It was a watery habitat, which has a major effect on the distribution of animals they would be hunting. Any humans groups living there necessarily would have to be really mobile as well," she said. "Because it's such a difficult location, no one thought there would be early human occupation there. Other sites where evidence of human occupation had been found were close to coasts, river banks, forests and places with plentiful resources." "What this is telling us about early inhabitants of South America is that they were very much more flexible and adaptable than perhaps we have given them credit for in the past." The humans who helped build these middens lived in a time of changing climate conditions. "This was just as the last ice age was ending, at a time of environmental flux and there was starting to be a lot more water on landscapes," said Dr Szabo. "People were moving into new areas and the resources they relied on were changing." The new find was an exciting insight into the time line of humans in South America, but "the prehistory of the Americas is still quite recent compared to Asia or Africa," she said. Maciej Henneberg, Professor of Anthropological and Comparative Anatomy at University of Adelaide, said the new find was very interesting. "The methods used are innovative and allow detection of archaeological sites previously difficult to notice," said Professor Henneberg, who was not involved in the study. This story is published courtesy of The Conversation (under Creative Commons-Attribution/No derivatives).
FINEWEB-EDU
User:Rach.light Human cosmopolitan citizen from Planet Earth. Feel free to leave a comment for questions and input. Projects * Updating Generations * Creating Generation Alpha
WIKI
skitch Verb * 1) To hitch a ride by holding on to a motor vehicle while riding on a skateboard, roller skates, or bicycle.
WIKI
'Relief Bounce' Carries Stocks to Modest Gains "No news on the Syria front spurred a relief bounce, then late-day jitters led to a pullback in the final hour," observed Schaeffer's Senior Technical Strategist Ryan Detrick, CMT. "Economic data was ok -- I'm looking at you, GDP and jobless claims -- but Syria has most of us on edge." Although the Dow Jones Industrial Average (DJI) spent the bulk of the day in positive territory, it pared most of its intraday gains into the closing bell. "Tomorrow is the day before a three-day weekend," Detrick continued, "so expect very light volume and not a lot of action. Unless, of course, something happens in Syria, then all bets are off." Continue reading for more on today's market, including : Are "the bears in control? " Schaeffer's Senior Trading Analyst Bryan Sapp weighs in. Option traders swarmed Verizon Communications ( VZ ), on news of confirmed negotiations with current partner Vodafone Group ( VOD ). Groupon ( GRPN ) speculators are starting to come around to the bullish side, but skepticism lingers. plus... The GDP gets upwardly adjusted, Nasdaq lays blame, and one analyst questions the viability of Tesla Motors ( TSLA ) shares. Price action was similar to Wednesday's on the Dow Jones Industrial Average (DJI - 14,840.95) , which gave back the bulk of its gains as the close approached, ending up just 16.4 points, or 0.1%. Still, 20 of the Dow's 30 components closed higher on the day, led by Verizon Communications ( VZ ), which gained 2.7%. Exxon Mobil ( XOM ) paced the 10 laggards with a 1.8% loss. The S&P 500 Index (SPX - 1,638.17) endured intraday rejection at its overhead 10-day moving average, and finished the day just 3.2 points, or 0.2%, in the black. The Nasdaq Composite (COMP - 3,620.30) was the best of the lot, adding 27 points, or 0.8%, and settling back above its own 10-day after two days below this trendline. The CBOE Market Volatility Index (VIX - 16.81) managed to move higher as well, after spending much of the morning south of breakeven. By the close, the fear barometer had tacked on 0.3 point, or 1.9%. A Trader's Take : "There are many market worries out there right now, mainly the Dow breaking down," added Detrick. "Of course, if you look at just the Dow, then you'd be worried. But if you look at more risky and aggressive areas like small-caps and technology, things don't look so bad. In fact, we've long said small-caps are the key to this market. They led in December when everyone was worried about the 'fiscal cliff,' only to see a historic gain the first half of the year. And once again, they are holding up well." 3 Things to Know About Today's Market : The Commerce Department released its second estimate for last quarter's gross domestic product (GDP) , projecting a 2.5% annual rate of economic expansion. Not only was this reading north of economists' estimates, it handily topped last month's estimate of 1.7%. Elsewhere, weekly jobless claims advanced by 6,000 during the last week, hitting a seasonally adjusted rate of 331,000. The reading was roughly in line with economists' projections. The four-week moving average, which reduces week-to-week "noise," edged up by 750 to 331,250. (The New York Times, FOX Business) One week after a three-hour outage throttled the Nasdaq, the exchange operator is chalking the incident up to a software bug and other technology slipups. (Reuters) And in the latest developments regarding Syria, President Barack Obama took to the airwaves, noting that his administration has not yet reached a decision on if or when to launch military action. The commander in chief is weighing various options, as he awaits findings from the U.N. Security Council. (NBCNews) 5 Stocks We Were Watching Today : Our Weekly Contrarian asks a popular question: Is the Tesla Motors ( TSLA ) bubble ready to burst? One large-scale put seller shifted his position in Zynga (ZNGA) . Following its positive earnings report, Williams-Sonoma (WSM) earned a pair of price-target hikes this morning. AT&T (T) speculators rolled out a weekly put trade in the nick of time. A cautious Cognizant Technology Solutions (CTSH) trader utilized short calls and long puts to "collar" the stock. For a look at today's options movers and commodities activity, head to page 2. Commodities : After pegging a new two-year high on Wednesday, crude futures reversed course, dropping back below the $109-per-barrel mark. At the close, October-dated crude had lost $1.30, or 1.2%, to $108.80 per barrel. Gold futures moved lower as well, as immediate fears about a military strike on Syria subsided. The December gold contract dropped $5.90, or 0.4%, to $1,412.90 an ounce. The views and opinions expressed herein are the views and opinions of the author and do not necessarily reflect those of Nasdaq, Inc. All Rights Reserved. Unauthorized reproduction of any SIR publication is strictly prohibited. The views and opinions expressed herein are the views and opinions of the author and do not necessarily reflect those of Nasdaq, Inc.
NEWS-MULTISOURCE
User:Drjump! Hello, I'm Arthur. I live on Fandom. I just do it for fun. I'm creating this now. Draft:Dystopia Daily Works so far. * Draft:Dystopia Daily * Draft:Jack Pop * Draft:Huggbees * Draft:Quinton Reviews (American web series)
WIKI
A Redis server-container and transport for Barrister RPC. Branch: master Clone or download Fetching latest commit… Cannot retrieve the latest commit at this time. Permalink Type Name Latest commit message Commit time Failed to load latest commit information. lib test .gitignore .travis.yml Gemfile LICENSE LICENSE.txt README.md Rakefile barrister-redis.gemspec README.md Barrister::Redis A Redis server-container and transport for Barrister RPC. Before Getting Started First, check out Barrister RPC here: http://barrister.bitmechanic.com Reference Implementation For a working example of a Rails UI backed by services using the RedisTransport and RedisContainer, see https://github.com/laser/ruby-micro-services-redis Usage To instantiate a Redis transport, at a minimum you need the name of the list that the client and server will be using as a message bus. If no database_url is specified in the options hash, redis://localhost:6379 will be used as the default. transport_a = Barrister::RedisTransport.new 'user_service' transport_b = Barrister::RedisTransport.new 'user_service', database_url: ENV['OPEN_REDIS_URL'] Instantiating a Redis container is easy as well. By default, the container requires a path to the JSON output of the IDL to JSON conversion and an instantiated handler whose name matches the name of an interface in the IDL. By default, the RedisContainer will use the name of the JSON file for the name of the list (e.g. './foo/user_service.json' will result in the 'user_service' list). container_a = Barrister::RedisContainer.new './user_service.json', UserService.new container_a.start For more advanced users, additional options can be specified: opts = { database_url: ENV['OPEN_REDIS_URL'], list_name: 'some_list_name' } container_b = Barrister::RedisContainer.new './user_service.json', [HandlerA.new, HandlerB.new], opts container_b.start Calling the 'start' method of an instantiated RedisContainer will connect to the Redis database and begin polling for inbound messages. Installation Add this line to your application's Gemfile: gem 'barrister-redis' And then execute: $ bundle Or install it yourself as: $ gem install barrister-redis Contributing 1. Fork it ( http://github.com//barrister-redis/fork ) 2. Create your feature branch (git checkout -b my-new-feature) 3. Commit your changes (git commit -am 'Add some feature') 4. Push to the branch (git push origin my-new-feature) 5. Create new Pull Request
ESSENTIALAI-STEM
Search the Asterisk Blog Asterisk Containers and Objects (ao2) By Mark Michelson For those of you budding Asterisk developers out there, you may find yourself browsing the source code. All over, you’ll find function calls prefixed with “ast”, like “ast_read” or “ast_poll”. But then you’ll come across something that starts with “ao2”, and you might wonder “What does that mean? Why does it have that name?”. This blog post seeks to clear that all up for you. A History Lesson Anyone who has programmed in C will be familiar with two of its famous (or infamous) paradigms: • Memory management is performed manually • There is no standard container library Every C project out there develops its own implementation of standard containers like linked lists, hash tables, etc. And most will also develop their own memory management libraries as well. The Asterisk project is no different, and what’s in Asterisk has evolved over the years. Linked Lists (and ONLY linked lists) In the early days of Asterisk, if you wanted to place any sort of items in a container, your one and only choice for doing so was a linked list. The linked list implementation in Asterisk is a mixed bag. On the positive side: • The implementation is fairly simple. Even if you are not familiar with the API, you likely would understand code that manipulates linked lists. • It’s easy to declare a linked list of any particular type. • Linked lists are efficient for scenarios where you are only adding/removing items from the ends of the list. • Locks are built into lists by default. You can have a linked list with no lock, a mutex, or a read-write lock. • There are both singly-linked lists and doubly-linked lists. • Linked lists are well-tested and at this point can be considered “bulletproof”. On the negative side: • Searching for a specific object can be slow. • Sorting a linked list is slow. • Linked lists are not cache-friendly • Asterisk’s linked list implementation is intrusive. This means that the objects in the list need to declare that they are part of a list. This can lead to potential ABI issues if the container type needs to change in a future release. • Aside from insertion, removal, and traversal, there are not many utility functions built into the linked list API • Linked lists are implemented using macros, meaning that if you are not careful, you might end up passing side-effect-causing statements into the macro. • Linked lists have no concept of object ownership. They can easily be made to contain freed objects, and since the objects are intrusive, that can completely trash the list. • The singly-linked and doubly-linked list implementations require a lot of repetition. In addition, the read-write lock lists and the standard lists require repetition as well. • Some of the macros are not intuitively named. It may not be clear just from the name what the “safe” variant of a list traversal is. In defense of the API, this is documented well in doxygen, but the naming could have been thought through more. • The definitions of the linked list macros are in the header file. This means that • There is not any opacity in the implementation. • Changing anything in the implementation requires recompilation of all linked list users. • It is more difficult to add in-line debugging to the implementation. astobj In 2004, the Asterisk Team added a new API for object management. The API took the shorthand name “astobj”. This API introduced several innovations to Asterisk: • Reference-counting of objects. • The potential for using different types of containers to hold objects (more on that later). • Providing methods of traversal with callbacks. Despite the innovations introduced, the API is not fondly remembered by current Asterisk developers. Despite its use in a few places, the API never really caught on and so people mostly continued with the old style of memory management and the use of linked lists. The negatives associated with astobj are: • Just like with linked lists, everything is defined as macros in a header file. • Just like with linked lists, the API is intrusive. • The API is just plain wonky • ASTOBJ_RDLOCK and ASTOBJ_WRLOCK don’t actually operate on read-write locks. They just operate a mutex. • There were some magic builtin variable names, like “iterator” and “next” that you had to know were available to you in traversals. • The use of macros for everything led to some bizarre code constructs, like the following: • The destructor for an object was passed to the object unreferencing macro. This meant that you could accidentally call different destructor functions for different parts in the code. • There were macros built into the API that likely had no reason being there, such as “marking” all objects in a container. • The naming is in places unintuitive. Most API calls have a regular version and a “full” version. The “full” version usually has tons of unused parameters passed in. • Despite the fact that the API was built with the idea of supporting more than one container type, nothing was ever implemented other than a linked list. • Remember how I said that the linked list implementation was “bulletproof”? Well, for some reason, rather than using the linked list API directly, astobj decided to build in its own linked list implementation. • Fine-grained control of container locks was difficult to achieve. These days, the astobj API is deprecated. The only place it is still used is in another deprecated API (netsock). astobj2 In 2007, Marta Carbone and Luigi Rizzo contributed the next generation of Asterisk object management. Since this was the successor to astobj, this was called astobj2, or just ao2. This took a new approach to object management in Asterisk. It brought the following innovations: • Rather than using macros for the entire API, the header contains function declarations, letting the implementation be done in source files elsewhere. • Rather than starting with a linked list as the default container type, ao2 started with a hash table. The thing about a hash table is that it can end up operating like a linked list if there is only a single hash bucket. • Rather than writing five different variants of the same function, most functions take a “flags” argument. This argument allows for the function to behave differently. It also makes it much easier to add new behaviors to existing functions. • Rather than requiring intrusion into the contained objects, ao2 uses some clever manipulation of memory to build in object metadata at allocation time. ao2 was adopted rapidly by Asterisk developers. I suspect that ao2 was more readily accepted for the following reasons: • Luigi did an excellent job of mentoring during the project, and Marta did a fantastic job of seeing it through to completion. Luigi’s experience in general with software development plus his experience on the Asterisk project ensured that the result was something people would be happy to use. • The code went through code review prior to being committed. This meant that interested parties got to put in their feedback and find errors early in the process. Getting more developer eyes on the project also got those developers excited to get to use the new API. • The code was documented well from the get-go. Linked lists and astobj both contain doxygen now, but when they first were committed, they had no documentation at all. This meant that if you wanted to use those APIs, you essentially had to read the code to learn how they worked rather than reading documentation. For astobj in particular, this could be a daunting task. Further, since the header file contained only function declarations, it was much easier to consume the documentation than if all function definitions were contained there. • Developers had been wanting a reference counted hash table implementation for quite a while. Channels, SIP dialogs, SIP peers, and other data types in Asterisk naturally fit better in a hash table than a linear data structure. Many places in Asterisk switched overnight to use hash tables and saw performance improvements as a result. ao2 has been enhanced quite a bit since its inception. The most notable changes are: • Red-black tree. • Safely-accessible global objects. • Weak references. Examples Memory Management astobj2 objects are declared the same as any other C struct. What sets them apart as ao2 objects is the way they are allocated. By using ao2_alloc() to allocate an object, it builds in reference counting metadata. Upon allocating an object, its reference count is one. You can directly manipulate the reference count of an object with the ao2_ref() function. For instance, • ao2_ref(obj, +1) will increase the reference count of obj by 1. • ao2_ref(obj, -1) will decrease the reference count of obj by 1. • ao2_cleanup(obj) is an alias of ao2_ref(obj, -1) but is tolerant of obj being NULL. When the reference count of an object reaches zero, the destructor for that object is called. In the following example, ao2_alloc() indicates that destroy_foo() is the destructor for foo objects. Therefore, when a foo’s reference count reaches zero, destroy_foo() is called. Notice that in destroy_foo(), the constituent memory within the foo is freed, but the foo itself is not. Container Allocation ao2 objects can be stored in a variety of containers. To date, there are three types of containers that can be used • Hash table • Red-black tree • Linked list ao2 containers are themselves ao2 objects. This means that they are reference-counted and are also destroyed when their reference count reaches zero. When a container is destroyed, it releases its reference on each object in the container. Here are examples of container allocation for each container type. Below is the definition of the foo_hash function. I’ll leave the definition of foo_sort and foo_cmp as exercises for the reader.  Other ao2 callback templates are available on the asterisk wiki. Adding items to containers The ao2_link() function is used to add an ao2 object into a container. When an object is linked into a container, its reference count is increased by one, thus giving the container shared ownership of the object. Notice that the same object was added to three different containers in the above example. Since the same object was linked into three containers, it means that the object’s reference count was increased by three. Finding an item in a container The ao2_find() function is used to find a specific object in a container. ao2_find() uses the comparison function specified when the container was allocated in order to find a match. Removing an item from a container The ao2_unlink() function is used to remove an object from a container. When an object is removed from a container, the container’s reference of the object is removed, thus decreasing the reference count of the object by one. Container callbacks The ao2_callback() function is one of the most powerful tools in the ao2 toolbox. The premise is simple: it iterates over the container and calls a given callback function on each item. The callback’s return value indicates whether the container should continue calling the callback on additional objects. This means that you could, for instance, update a field on every item in the container (e.g. updating a timestamp). You can also use ao2_callback() as a way of finding an object using a custom matching method. In the previous example, find_by_baz() was called on each object in the container. Returning CMP_MATCH indicates that the traversal has found a match for ao2_callback() to return and the traversal should stop. Returning 0 indicates that the traversal should continue. Here’s another example of ao2_callback(): In this example, we’re removing all objects whose bar field starts with the bad_letter. OBJ_MULTIPLE tells the traversal not to stop after the first return of CMP_MATCH. OBJ_NODATA says not to actually return any objects. OBJ_UNLINK removes matches from the container. Final Thoughts The previous examples scratched the surface of ao2 usage in Asterisk. There’s a lot more for you to explore in the API and it could be just what you need for whatever Asterisk code you’re writing. If you are looking into making changes to ao2, feel free; we’d love to see the changes! We don’t currently have a wishlist of new features we’d like to see. I think if anything, we might want to see some of the fat trimmed in places. Since ao2 is so widely used, if we could get some good optimizations added, it would result in performance improvements all over the code. No Comments Yet Get the conversation started! Add to the Discussion Your email address will not be published. Required fields are marked * About the Author Mark Michelson Mark Michelson is a software developer and open source team lead at Digium and ten-year veteran to Asterisk development. His largest contributions to Asterisk include being one of the architects of the call completion supplementary services, being one of the architects of the PJSIP-based SIP channel driver that was introduced in Asterisk 12. He has his fingers just about everywhere in the code, though. Mark loves keeping up-to-date on software trends and applying what he learns to the Asterisk project. One of his biggest boasts is that he has actually removed more lines of code than he has added. Mark's interests outside of software development include cooking, skiing, travel, video games, and beer. See All of Mark's Articles
ESSENTIALAI-STEM
Madjiguene Sene Madjiguene Sene (born October 25, 1994) is a Senegalese basketball player who plays center for ASA Sceaux basket Feminin in France and Senegal women's national basketball team. Career history Sene plays for ISEG sports during the 2017–2018 season before joining Furdenheim in 2019-2020 where she play one season. She was part of the squad that plays against CB IFS which ended a home won of 62-56 for Furdenheim. She set a record of 21 points and 21 rebounds on that match. After the season she was transferred to Escaudain for 2021–2022 season. she was again transferred to ASA Sceaux basket Feminin during the 2022–2023 season. Senegal national team Madjiguene Sene first represented Senegal in 2021 when she was called up for 2021 women's Afrobasket where she played 5 games with 4.2 points per game, 3.8 rebounds per game, 0.6 assist per game and playing efficiency of 5.4. She was again called up for 2023 women's Afrobasket where she played 4 games with 1.5 points per game, 1.5 rebounds per game, 0.3 assist per game and 1.3 playing efficiency.
WIKI
Mesurado River Mesurado River is a river of Liberia. It flows through the capital of Monrovia and is crossed by the People's Bridge, built in the 1970s.
WIKI
John F. Kennedy assassination conspiracy theories The assassination of John F. Kennedy on November 22, 1963, has spawned numerous conspiracy theories. These theories allege the involvement of the CIA, the Mafia, Vice President Lyndon B. Johnson, Cuban Prime Minister Fidel Castro, the KGB, or some combination of these individuals and entities. Some conspiracy theories have alleged a coverup by parts of the federal government, such as the original FBI investigators, the Warren Commission, or the CIA. Former Los Angeles District Attorney Vincent Bugliosi estimated that a total of 42 groups, 82 assassins, and 214 people had been accused at one time or another in various conspiracy scenarios. Background On November 22, 1963, President John F. Kennedy was assassinated while traveling in a motorcade in an open-top limousine in Dallas, Texas. Lee Harvey Oswald was arrested for the murder of Dallas policeman J. D. Tippit and arraigned for both murders. On November 24, nightclub owner Jack Ruby killed Oswald. Immediately after President Kennedy was shot, many people suspected that the assassination was part of a larger plot, and broadcasters speculated that Dallas right-wingers were involved. Ruby's murder of Oswald compounded initial suspicions. Author Mark Lane has been described as firing "the first literary shot" with his article "Defense Brief for Oswald" in the National Guardian's December 19, 1963, issue. Thomas Buchanan's book Who Killed Kennedy?, published in May 1964, has been credited as the first book to allege a conspiracy. In 1964, the Warren Commission concluded that Oswald had acted alone and that no credible evidence supported the contention that he was involved in a conspiracy to assassinate the president. The Commission indicated that Secretary of State Dean Rusk, Defense Secretary Robert S. McNamara, Treasury Secretary C. Douglas Dillon, Attorney General Robert F. Kennedy, FBI director J. Edgar Hoover, CIA director John A. McCone, and Secret Service Chief James J. Rowley each individually reached the same conclusion on the basis of information available to them. During the trial of Clay Shaw in 1969, New Orleans District Attorney Jim Garrison challenged the single-bullet theory, claiming that the Zapruder film indicated that the fatal shot to Kennedy's head was fired from the "grassy knoll", a small hill that featured prominently in later conspiracy theories. In 1979, the United States House Select Committee on Assassinations (HSCA) agreed with the Warren Commission that Oswald killed Kennedy, but concluded that the commission's report and the original FBI investigation were seriously flawed. The HSCA concluded that at least four shots were fired, with a "high probability" that two gunmen fired at Kennedy, and that a conspiracy was probable. The HSCA stated that the Warren Commission had "failed to investigate adequately the possibility of a conspiracy to assassinate the President". Documents under Section 5 of the President John F. Kennedy Assassination Records Collection Act of 1992 were required to be released within 25 years of October 26, 1992. Most of the documents were released on October 26, 2017. A provision of the 1992 act allows a President to extend the deadline, and President Donald Trump set a new deadline of October 26, 2021, for the remaining documents to be released. In October 2021, President Joe Biden further extended the deadline to December 15, 2022, citing delays related to the COVID-19 pandemic. On December 15, 2022, NARA released an additional 13,173 documents as ordered by President Biden. In June 2023, it was reported that NARA had completed the review of the documents with 99% of all documents having been made public. Public opinion According to John C. McAdams, "The greatest and grandest of all conspiracy theories is the Kennedy assassination conspiracy theory." Others have referred to it as "the mother of all conspiracies". Author David Krajicek describes Kennedy assassination enthusiasts as people belonging to "conspiracy theorists" on one side and "debunkers" on the other. The great amount of controversy surrounding the event has resulted in bitter disputes between those who support the conclusion of the Warren Commission and those who reject it or are critical of the official explanation, with each side levelling accusations toward the other of "naivete, cynicism, and selective interpretation of the evidence". The number of books written about the assassination of Kennedy has been estimated to be between 1,000 and 2,000. According to Vincent Bugliosi, 95 percent of those books are "pro-conspiracy and anti-Warren Commission". Very few of the books and articles published about the assassination have been written by historians. Calvin Trillin's article "The Buffs" in the June 1967 edition of The New Yorker has been credited as the first addressing the "conspiracy phenomenon". Trillin described those who criticized the Warren Report: "They tend to refer to themselves (and the professionals) as 'investigators' or 'researchers' or, most often, 'critics.' They are also known as 'assassination buffs.'" Professor of History Colin Kidd also described amateur historians of the assassination as "buffs". "The study of Kennedy's assassination is now best known to academics as a counterculture, which grossly caricatures the best practices of the academy and where extravagant theories tend to trump sound scholarship, plausibility, and common sense." Public opinion polls have consistently shown that most Americans believe that there was a conspiracy to kill Kennedy. These same polls show no agreement on who else may have been involved in the shooting. The National Opinion Research Center conducted 1,384 in-person interviews between November 26, 1963, and December 3, 1963, and found that 62 percent believed that others were involved in the assassination, compared with 24 percent who believed that only one person was involved. In 10 polls conducted from 1963 through 2023, Gallup, Inc. found that the percentage of U.S. adults that did not believe that Oswald had acted alone increased from 52% in 1963 and 50% in 1966 to between 74% and 81% from 1976 through 2003 and then declined to 61% in 2013 and 65% in 2023. Arthur Lehman Goodhart dismissed the relevance of the polls in a 1968 article for the Alberta Law Review: "such a Gallup poll cannot prove anything except that the people often believe nonsense." In 2003, an ABC News poll found that 70 percent of respondents suspected that the assassination involved more than one person. In 2009, 76 percent of people polled for CBS News said that they believed that Kennedy had been killed as the result of a conspiracy. In 2023, a YouGov poll found that 54% of U.S. adults surveyed believed Oswald definitely or probably did not act alone in the assassination. Views of those close to Kennedy Kennedy's youngest brother Ted Kennedy wrote that he had been fully briefed by Chief Justice Earl Warren during the initial investigation and was "satisfied that the Warren Commission got it right". He stated that their middle brother Robert F. Kennedy was a "strong advocate for the accuracy of the report" and that it was his belief upon all of their discussions that he, too, accepted the Commission's findings. Kennedy's nephew Robert F. Kennedy Jr. believes that his uncle was killed in a conspiracy, and he endorsed the book JFK and the Unspeakable. He said that his father publicly supported the Warren Commission, but privately called it a "shoddy piece of craftsmanship", and was "fairly convinced" that others were involved in his brother's death besides Oswald. Background After Oswald's death, FBI Director J. Edgar Hoover wrote a memo detailing that the Dallas Police would not have had enough evidence against Oswald without the FBI's information. He then wrote: "The thing I am concerned about, and so is [Deputy Attorney General] Mr. Katzenbach, is having something issued so we can convince the public that Oswald is the real assassin." Top government and intelligence officials were also finding that, according to CIA intercepts, someone had impersonated Oswald in phone calls and visits made to the Soviet and Cuban embassies in Mexico City several weeks before the assassination. Over the next 40 years, this became one of the CIA's most closely guarded secrets on the Oswald case. A CIA career agency officer, Anne Goodpasture, admitted in sworn testimony that she had disseminated the tapes of these phone calls herself. She had earlier denied to congressional investigators in 1970 that she had any knowledge of recordings of Oswald's phone calls. On November 23, 1963, the day after the assassination, FBI Director J. Edgar Hoover's preliminary analysis of the assassination included the following: "The Central Intelligence Agency advised that on October 1st, 1963, an extremely sensitive source had reported that an individual identifying himself as Lee Oswald contacted the Soviet Embassy in Mexico City inquiring as to any messages. Special agents of this Bureau, who have conversed with Oswald in Dallas, Texas, have observed photographs of the individual referred to above and have listened to a recording of his voice. These special agents are of the opinion that the referred-to individual was not Lee Harvey Oswald." That same day, Hoover had this conversation with President Johnson: "Johnson: 'Have you established any more about the [Oswald] visit to the Soviet Embassy in Mexico in September?' Hoover: 'No, there's one angle that's very confusing for this reason. We have up here the tape and the photograph of the man at the Soviet Embassy, using Oswald's name. That picture and the tape do not correspond to this man's voice, nor to his appearance. In other words, it appears that there was a second person who was at the Soviet Embassy.'" President Johnson expressed concern that the public might come to believe that Soviet leader Nikita Khrushchev and/or Cuban leader Fidel Castro was implicated in the assassination—a situation that Johnson said might lead to "... a war that [could] kill 40 million Americans in an hour". Johnson relayed his concern to both Chief Justice Earl Warren and Senator Richard Russell, telling them that they could "serve America" by joining the commission Johnson had established to investigate the assassination, which would later become known unofficially as the Warren Commission. Katzenbach wrote a memorandum to Lyndon Johnson aide Bill Moyers that said, among other things, that the results of the FBI's investigation should be made public. Katzenbach suggested that a commission be formed, composed of people with "impeccable integrity", to conduct a complete investigation of the assassination. Katzenbach wrote: "Speculation about Oswald’s motivation ought to be cut off, and we should have some basis for rebutting thought that this was a Communist conspiracy or (as the Iron Curtain press is saying) a right–wing conspiracy to blame it on the Communists." He wrote: "The public must be satisfied that Oswald was the assassin; that he did not have confederates who are still at large; and that the evidence was such that he would have been convicted at trial". Four days after Katzenbach's memo, Johnson formed the Warren Commission with Earl Warren as chairman and Senator Richard Russell as a member. Alleged inconsistencies Numerous researchers, including author Mark Lane, Henry Hurt, Michael L. Kurtz, Gerald D. McKnight, Anthony Summers, and Harold Weisberg, have referred to what they see as inconsistencies, oversights, exclusions of evidence, errors, changing stories, or changes made to witness testimony in the official Warren Commission investigation, which they say could suggest a cover-up. Walter Cronkite, CBS News anchor, said, "Although the Warren Commission had full power to conduct its own independent investigation, it permitted the FBI and the CIA to investigate themselves—and so cast a permanent shadow on the answers." United States Senator and U.S. Senate Select Committee on Intelligence member Richard Schweiker said, "The fatal mistake the Warren Commission made was to not use its own investigators, but instead to rely on the CIA and FBI personnel, which played directly into the hands of senior intelligence officials who directed the cover-up." Schweiker told author Anthony Summers in 1978 that he "believe[d] that the Warren Commission was set up at the time to feed pablum to the American public for reasons not yet known, and that one of the biggest cover-ups in the history of our country occurred at that time". In 1966, Roscoe Drummond voiced skepticism about a cover-up in his syndicated column, saying, "If there were a conspiracy to cover up the truth about the assassination, it would have to involve the Chief Justice, the Republican, Democratic, and non-party members of the commission, the FBI, the CIA, the Secret Service, the distinguished doctors of the armed services—and the White House—a conspiracy so multiple and complex that it would have fallen of its own weight." Alleged witness intimidation Richard Buyer wrote that many witnesses whose statements pointed to a conspiracy were either ignored or intimidated by the Warren Commission. In JFK: The Last Dissenting Witness, a 1992 biography of Jean Hill, Bill Sloan wrote that Warren Commission assistant counsel Arlen Specter attempted to humiliate, discredit, and intimidate Hill into changing her story. Hill also told Sloan that she was abused by Secret Service agents, harassed by the FBI, and received death threats. A later book by Sloan, entitled JFK: Breaking the Silence, quotes several assassination eyewitnesses as saying that Warren Commission interviewers repeatedly cut short or stifled any comments casting doubt on the conclusion that Oswald had acted alone. In his book Crossfire, Jim Marrs gives accounts of several people who said they were intimidated by either FBI agents or anonymous individuals into altering or suppressing what they knew regarding the assassination. Some of those individuals include Richard Carr, Acquilla Clemmons, Sandy Speaker, and A. J. Millican. Marrs wrote that Texas School Book Depository employee Joe Molina was "intimidated by authorities and lost his job soon after the assassination", and that witness Ed Hoffman was warned by an FBI agent that he "might get killed" if he revealed what he observed in Dealey Plaza on the day of the assassination. Warren Reynolds, who claimed that he saw and chased the man who shot Tippit, was himself shot in the head in January 1964, two days after first talking to the FBI. He survived, and later testified to the Warren Commission that in February 1964 someone attempted to kidnap his 10-year-old daughter. Witness deaths The idea that witnesses to the Kennedy assassination met mysterious or suspicious deaths because they knew things that conspirators did not want to be revealed has been referred to by author Vincent Bugliosi as "one of the very most popular and durable myths". Allegations of mysterious or suspicious deaths of witnesses connected with the Kennedy assassination originated with journalist Penn Jones Jr. On the third anniversary of the assassination, Ramparts published an editorial by Jones, along with a handful of articles that he had written earlier for his newspaper, the Midlothian Mirror. Jones reported that there were six men who had met in Jack Ruby's apartment the night after Ruby shot Oswald. Of the six men, Jones noted that three of them had since died: reporter Jim Koethe, reporter Bill Hunter, and Jack Ruby's first attorney, Tom Howard. Jones described these three deaths as "mysterious". In a second article in the same issue, Jones reported on the deaths of seven other individuals who died within three years of the assassination: Earlene Roberts, Nancy Jane Mooney, Hank Killam, William Whaley, Edward Benavides, Dorothy Kilgallen, and Lee Bowers. Jones also described these deaths as "mysterious". Jones' article in Ramparts was picked up by Reuters and various other news outlets. TIME stated "the Ramparts-Jones non-history is riddled with factual errors and perverse conclusions" and offered examples to support its assessment. In 1973, similar claims about suspicious deaths of witnesses were brought to national attention by the theatrically released movie Executive Action. In 1989, Jim Marrs published a list of 103 people he believed had died "convenient deaths" under suspicious circumstances. He noted that the deaths were grouped around investigations conducted by the Warren Commission, New Orleans D.A. Jim Garrison, the Senate Intelligence Committee, and the House Select Committee on Assassinations. Marrs pointed out that "these deaths certainly would have been convenient for anyone not wishing the truth of the JFK assassination to become public." In 2013, Richard Belzer published Hit List: An In-Depth Investigation into the Mysterious Deaths of Witnesses to the JFK Assassination that examines the deaths of 50 people linked to the assassination and claims most of them were murdered as part of a cover-up. Vincent Bugliosi devoted two pages of his book Reclaiming History: The Assassination of President John F. Kennedy to refuting claims by journalist Dorothy Kilgallen. Kilgallen was publicly skeptical of the official version of the assassination of President Kennedy and Jack Ruby’s shooting of Lee Oswald. During 1964 and 1965, she wrote several newspaper articles on the subject and many relevant short items in her daily column. On February 23, 1964, the New York City newspaper New York Journal-American, where Kilgallen had worked since its formation in 1937, published her article about a conversation she had had with Jack Ruby, when he was seated at his defense table during a recess in his murder trial. Whether Kilgallen and Ruby had a second conversation in a private room in the Dallas County, Texas, courthouse several days later has been disputed. If they did, she never wrote about it for publication. One of Kilgallen's biographers, Mark Shaw, contends that even if Ruby did not reveal sensitive information to Kilgallen about the assassination, she still could have learned sensitive information during a trip she made to New Orleans several weeks before she died. Kilgallen's last brief item about the Kennedy assassination, published on September 3, 1965, ended with these words: "That story isn't going to die as long as there's a real reporter alive – and there are a lot of them alive." Two months later, on November 8, 1965, Kilgallen was found dead in her Manhattan townhouse. Her death was determined to have been caused by a combination of alcohol and barbiturates. Bugliosi referred to Kilgallen’s 1965 death as "perhaps the most prominent mysterious death" cited by assassination researchers. He added that the presence of Kilgallen’s husband and son in their five-story townhouse throughout the night when she died proves she could not have been murdered. Bugliosi said an intruder would have awakened her husband or her eleven-year-old son and then her husband would have called the police. According to author Jerome Kroth, Mafia figures Sam Giancana, John Roselli, Carlos Prio, Jimmy Hoffa, Charles Nicoletti, Leo Moceri, Richard Cain, Salvatore Granello, and Dave Yaras were likely murdered to prevent them from revealing their knowledge. According to author Matthew Smith, others with some tie to the case who have died suspicious deaths include Lee Bowers, Gary Underhill, William Sullivan, David Ferrie, Clay Shaw, George de Mohrenschildt, four showgirls who worked for Jack Ruby, and Ruby himself. The House Select Committee on Assassinations investigated another alleged mysterious death – that of Rose Cheramie (sometimes spelled Cherami), whose real name was Melba Christine Marcades. The Committee reported that Louisiana State Police Lieutenant Francis Fruge traveled to Eunice, Louisiana, on November 20, 1963 – two days before the assassination – to pick up Cheramie, who had sustained minor injuries when she was hit by a car. Fruge drove Cheramie to the hospital and said that on the way there, she "... related to [him] that she was coming from Florida to Dallas with two men who were Italians or resembled Italians." Fruge asked her what she planned to do in Dallas, to which she replied: "... number one, pick up some money, pick up [my] baby, and ... kill Kennedy." Cheramie was admitted and treated at the state hospital in Jackson, Louisiana, for alcoholism and heroin addiction. After the assassination, Lt. Fruge contacted Dallas Police Captain Will Fritz regarding what he had learned from Cheramie, but Fritz told him he "wasn't interested". In the 1970s, a state hospital physician, Dr. Victor Weiss, told a House Select Committee on Assassinations investigator that on November 25 – three days after the assassination – one of his fellow physicians told him that Cheramie had "stated before the assassination that President Kennedy was going to be killed". Dr. Weiss further reported that Cheramie told him after the assassination that she had worked for Jack Ruby and that her knowledge of the assassination originated from "word in the underworld". Cheramie was found dead close to a highway near Big Sandy, Texas, on September 4, 1965; she had been run over by a car. Concerning the Tippit shooting, the Warren Commission named 12 witnesses to the shooting and its aftermath. One of these witnesses, Warren Reynolds, was shot in the head 2 months after the Tippit shooting, but survived. Another witness, Domingo Benavides, who was close to the shooting and saw Tippit fall after being shot, lost his brother 15 months after the Tippit shooting; Benavides' brother was shot in the head in a bar and died. The House Select Committee on Assassinations investigated the allegation "that a statistically improbable number of individuals with some direct or peripheral association with the Kennedy assassination died as a result of that assassination, thereby raising the specter of conspiracy". The committee's chief of research testified: "Our final conclusion on the issue is that the available evidence does not establish anything about the nature of these deaths which would indicate that the deaths were in some manner, either direct or peripheral, caused by the assassination of President Kennedy or by any aspect of the subsequent investigation." Author Gerald Posner said that Marrs's list was taken from the group of about 10,000 people connected even in the most tenuous way to the assassination, including people identified in the official investigations, as well as the research of conspiracy theorists. Posner also said that it would be surprising if a hundred people out of ten thousand did not die in "unnatural ways". He noted that over half of the people on Marrs's list did not die mysteriously, but of natural causes, such as Secret Service agent Roy Kellerman, who died of heart failure at age 69 in 1984, long after the Kennedy assassination, but is on Marrs's list as someone whose cause of death is "unknown". Posner also pointed out that many prominent witnesses and conspiracy researchers continue to live long lives. Allegations of evidence suppression, tampering, and fabrication Many of those who believe in a JFK assassination conspiracy also believe that evidence against Oswald was either planted, forged, or tampered with. Ignored testimony Some researchers assert that witness statements indicating a conspiracy were ignored by the Warren Commission. Josiah Thompson stated that the Commission ignored the testimony of seven eyewitnesses who said they saw smoke in the vicinity of the grassy knoll at the time of the assassination, as well as an eighth witness who said he smelled gunpowder. Jim Marrs wrote that the Commission did not seek the testimony of eyewitnesses on the triple underpass whose statements pointed to a shooter on the grassy knoll. Confiscated film and photographs In 1978, Gordon Arnold told the Dallas Morning News that he had filmed the assassination from the grassy knoll and that he gave the film to a policeman who was waving a shotgun. Arnold said that he had been afraid to report the incident due to claims of "peculiar" deaths of witnesses to the assassination. Ten years later, he told producers for Nigel Turner's The Men Who Killed Kennedy that the film was taken from him. Another witness, identified as Beverly Oliver, came forward in 1970 and said she was the "Babushka Lady" who is seen, in the Zapruder film, filming the motorcade. She also said that after the assassination, she was contacted at work by two men whom she thought "... were either FBI or Secret Service agents". According to Oliver, the men told her that they wanted to take her film, have it developed, and then return it to her within ten days. The agents took her film, but never returned it. Withheld documents Richard Buyer and others have complained that many documents pertaining to the assassination have been withheld over the years, including documents from investigations made by the Warren Commission, the House Select Committee on Assassinations, and the Church Committee. These documents individually included the President's autopsy records. Some documents still are not scheduled for release until 2029. Many documents were released during the mid-to-late 1990s by the Assassination Records Review Board (ARRB) under the President John F. Kennedy Assassination Records Collection Act of 1992. Some of the material released contains redacted sections. Tax return information, which identified employers and sources of income, has not yet been released. The existence of several secret documents related to the assassination, as well as the long period of secrecy, suggests to some the possibility of a cover-up. One historian noted, "There exists widespread suspicion about the government's disposition of the Kennedy assassination records stemming from the beliefs that Federal officials (1) have not made available all Government assassination records (even to the Warren Commission, Church Committee, House Assassination Committee) and (2) have heavily redacted the records released under FOIA in order to cover up sinister conspiracies." According to the ARRB, "All Warren Commission records, except those records that contain tax return information, are (now) available to the public with only minor redactions." In response to a Freedom of Information Act request filed by journalist Jefferson Morley, the CIA stated in 2010 that it had over 1,100 documents in relation to the assassination, about 2,000 pages in total, that have not been released due to national security-related concerns. Tampering with evidence Some researchers have alleged that various items of physical evidence have been tampered with, including the "single bullet", also known as the "magic bullet" by some critics of official explanations, various bullet cartridges and fragments, the presidential limousine's windshield, the paper bag in which the Warren Commission said Oswald hid the rifle, the so-called "backyard" photos depicting Oswald holding the rifle, the Zapruder film, the photographs and radiographs obtained at Kennedy's autopsy, and the president's dead body itself. Photographs Among the evidence against Oswald are photographs of him holding a Carcano rifle in his back yard, the weapon identified by the Warren Commission as the assassination weapon. The House Select Committee on Assassinations concluded that the Oswald photos are genuine and Oswald's wife Marina said that she took them. In 2009, the journal Perception published the findings of Hany Farid, a professor in the Department of Computer Science at Dartmouth College who used 3D modeling software to analyze one of the photographs. He demonstrated that a single light source could create seemingly incongruent shadows and concluded that the photograph revealed no evidence of tampering. Researcher Robert Groden asserts that these photos are fake. Groden said in 1979 that four autopsy photographs showing the back of Kennedy's head were forged to hide a wound fired from a second gunman. According to Groden, a photograph of a cadaver's head was inserted over another depicting a large exit wound in the back of the president's head. HSCA chief counsel G. Robert Blakey stated that the "suggestion that the committee would participate in a cover-up is absurd" and that Groden was "not competent to make a judgment on whether a photograph has been altered". Blakey stated that the photographic analysis panel for the Committee had examined the photographs and that they "considered everything" that Groden had to say "and rejected it." Zapruder film The House Select Committee on Assassinations described the Zapruder film as "the best available photographic evidence of the number and timing of the shots that struck the occupants of the presidential limousine". The Assassination Records Review Board said it "is perhaps the single most important assassination record." According to Vincent Bugliosi, the film was "originally touted by the vast majority of conspiracy theorists as incontrovertible proof" of a conspiracy, but is now believed by many conspiracy theorists to be a "sophisticated forgery". Jack White, photographic consultant to the House Select Committee on Assassinations, claimed there were anomalies in the Zapruder film, including an "unnatural jerkiness of movement or change of focus… in certain frame sequences". In 1996, the Assassination Records Review Board asked Kodak product engineer Roland Zavada to undertake a thorough technical study of the Zapruder film. Zavada concluded that there was no detectable evidence of manipulation or image alteration on the film's original version. Former senior official at the CIA's National Photographic Interpretation Center, Dino Brugioni, said that he and his team examined the 8mm Zapruder film of the John F. Kennedy assassination on the evening of Saturday 23 November 1963 and into the morning of Sunday 24 November 1963. In a 2011 interview with Douglas Horne of the Assassination Record Review Board, Brugioni said the Zapruder film in the National Archives today, and available to the public, has been altered from the version of the film he saw and worked with on November 23–24. Brugioni recalls seeing a "white cloud" of brain matter, three or four feet above Kennedy's head, and says that this "spray" lasted for more than one frame of the film. The version of the Zapruder film available to the public depicts the fatal head shot on only one frame of the film, frame 313. Additionally, Brugioni is certain that the set of briefing boards available to the public in the National Archives is not the set that he and his team produced on November 23–24, 1963. Kennedy's body In his 1981 book Best Evidence, author David Lifton presented the thesis that President Kennedy's dead body had been altered between the Dallas hospital and the autopsy site at Bethesda for the purposes of creating erroneous conclusions about the number and direction of the shots. Murder weapon The Warren Commission found that the shots that killed Kennedy and wounded Connally were fired from an Italian 6.5mm Manlicher Carcano rifle owned by Oswald. Deputy Sheriff Eugene Boone and Deputy Constable Seymour Weitzman both initially identified the rifle found in the Texas School Book Depository as a 7.65 German Mauser. Weitzman signed an affidavit the following day describing the weapon as a "7.65 Mauser bolt action equipped with a 4/18 scope, a thick leather brownish-black sling on it". Deputy Sheriff Roger Craig claimed that he saw "7.65 Mauser" stamped on the barrel of the weapon. When interviewed in 1968 by researcher Barry Ernest, Craig said: "I felt then and I still feel now that the weapon was a 7.65 German Mauser .... I was there. I saw it when it was first pulled from its hiding place, and I am not alone in describing it as a Mauser." Dallas District Attorney Henry Wade told the press that the weapon found in the book depository was a 7.65 Mauser, and the media reported this. But investigators later identified the rifle as a 6.5mm Carcano. In Matrix for Assassination, author Richard Gilbride suggested that both weapons were involved in the assassination and that Dallas Police Captain Will Fritz and Lieutenant J. Carl Day both might have been conspirators. Addressing "speculation and rumors", the Warren Commission identified Weitzman as "the original source of the speculation that the rifle was a Mauser" and stated that "police laboratory technicians subsequently arrived and correctly identified the [murder] weapon as a 6.5 Italian rifle." Bullets and cartridges The Warren Commission determined that three bullets were fired at the presidential motorcade. One of the three bullets missed the vehicle entirely; another bullet hit President Kennedy and passed through his body before striking Governor Connally; and the third bullet was the fatal head shot to the President. Some people claim that the bullet that passed through President Kennedy's body and hit Governor Connally – dubbed by some critics of the Commission as the "magic bullet" – was missing too little mass to account for the total weight of bullet fragments later found by the doctors who operated on Connally at Parkland Hospital. Those making this claim included the governor's chief surgeon, Dr. Robert Shaw, as well as two of Kennedy's autopsy surgeons, Commander James Humes and Lt. Colonel Pierre Finck. In his book Six Seconds in Dallas, author Josiah Thompson took issue with this claim. Thompson added up the weight of the bullet fragments listed in the doctor reports and concluded that their total weight "could" have been less than the mass missing from the bullet. With Connally's death in 1993, forensic pathologist Dr. Cyril Wecht and the Assassination Archives and Research Center petitioned Attorney General Janet Reno to recover the remaining bullet fragments from Connally's body, contending that the fragments would disprove the Warren Commission's single-bullet, single-gunman conclusion. The Justice Department replied that it "... would have [had] no legal authority to recover the fragments unless Connally's family gave [it] permission [to do so]." Connally's family refused permission. Allegations of multiple gunmen The Warren Commission concluded that "three shots were fired from the Texas School Book Depository in a time period ranging from approximately 4.8 to in excess of 7 seconds." Some assassination researchers, including Josiah Thompson and Anthony Summers, dispute the Commission's findings. They point to evidence that brings into question the number of shots fired, the origin of the shots, and Oswald's ability to accurately fire three shots in such a short amount of time from such a rifle. These researchers suggest that multiple gunmen were involved. Number of shots Based on the "consensus among the witnesses at the scene" and "in particular the three spent cartridges" found near an open window on the sixth-floor of the Book Depository, the Warren Commission determined that "the preponderance of the evidence indicated that three shots were fired". In 1979, the House Select Committee on Assassinations concluded that there were four shots, one coming from the grassy knoll. The Warren Commission, and later the House Select Committee on Assassinations, concluded that one of the shots hit President Kennedy in "the back of his neck", exited his throat, and struck Governor Connally in the back, exited the Governor's chest, shattered his right wrist, and implanted itself in his left thigh. This conclusion became known as the "single-bullet theory". Mary Moorman said in a TV interview immediately after the assassination that there were either three or four shots close together, that shots were still being fired after the fatal shot, and that she was in the line of fire. In 1967, Josiah Thompson concluded from a close study of the Zapruder film and other forensic evidence, corroborated by the eyewitnesses, that four shots were fired in Dealey Plaza, with one wounding Connally and three hitting Kennedy. On the day of the assassination, Nellie Connally was seated in the presidential car next to her husband, Texas Governor John Connally. In her book From Love Field: Our Final Hours, she said she believed that her husband was wounded by a bullet separate from the two that hit Kennedy. Origin of the shots The Warren Commission concluded that all of the shots fired at President Kennedy came from the sixth-floor window at the southeast corner of the Texas School Book Depository. The Commission based its conclusion on the "cumulative evidence of eyewitnesses, firearms and ballistic experts and medical authorities", including onsite testing, as well as analysis of films and photographs conducted by the FBI and the US Secret Service. In 1979, the House Select Committee on Assassinations agreed to publish a report from Warren Commission critic Robert Groden, in which he named "nearly [two] dozen suspected firing points in Dealey Plaza". These sites included multiple locations in or on the roof of the Texas School Book Depository, the Dal-Tex Building, the Dallas County Records Building, the triple overpass, a storm drain located along the north curb of Elm Street, and the Grassy Knoll. Josiah Thompson concluded that the shots fired at the motorcade came from three locations: the Texas School Book Depository, the Grassy Knoll, and the Records Building. Testimony of witnesses According to some researchers, the grassy knoll was identified by most witnesses as the area from where shots were fired. In March 1965, Harold Feldman wrote that there were 121 witnesses to the assassination listed in the Warren Report, 51 of whom indicated that the shots that killed Kennedy came from the grassy knoll, while 32 said the shots originated from the Texas School Book Depository. In 1967, Josiah Thompson examined the statements of 64 witnesses and concluded that 33 of them thought that the shots emanated from the grassy knoll. In 1966, Esquire magazine credited Feldman with "advanc[ing] the theory that there were two assassins: one on the grassy knoll and one in the Book Depository". According to a 2021 article in Frontiers in Psychology, discrepancies in earwitness testimony regarding the origin of the gunshots have "contributed to the breadth and persistence of the conspiracy theories that had emerged since the assassination." Dennis McFadden with Center of Perceptual Systems at the University of Texas at Austin summarized: "Localizing the origin of a supersonic gunshot is not easy under optimal conditions. On the day of the JFK assassination, the earwitnesses present were startled, surprised, confused, disbelieving, excited, and likely scared, so there is little wonder that their perceptions were inconsistent, and with the passage of time, fluid. Once the confusing acoustics of supersonic bullets and the vagaries of human sound localization are taken into account, the widespread uncertainty amongst the earwitnesses to the assassination becomes more understandable." Lee Bowers operated a railroad tower that overlooked the parking lot on the north side of the grassy knoll. When interviewed by the Warren Commission in 1964, he reported that he saw two men behind the grassy knoll's stockyard fence before the shooting took place. The men did not appear to be acting together or doing anything suspicious. After the shooting, Bowers said that one of the men remained behind the fence, but that he lost track of the second man whose clothing blended into the foliage. When interviewed by Mark Lane and Emile de Antonio in 1966 for their documentary film Rush to Judgment, Bowers noted that he saw something that attracted his attention, either a flash of light or smoke from the knoll, allowing him to believe "something out of the ordinary" had occurred there. Bowers told Lane that he heard three shots, the last two in quick succession. Physical evidence Several conspiracy theories posit that at least one shooter was located in the Dal-Tex Building, located across the street from the Texas School Book Depository. According to L. Fletcher Prouty, the physical location of James Tague when he was injured by a bullet fragment is not consistent with the trajectory of a missed shot from the Texas School Book Depository, leading Prouty to theorize that Tague was instead wounded by a missed shot from the second floor of the Dal-Tex Building. Some researchers claim that FBI photographs of the presidential limousine show a bullet hole in its windshield above the rear-view mirror, and a crack in the windshield itself. When Robert Groden, author of The Killing of a President, asked for an explanation, the FBI responded that what Groden thought was a bullet hole "occurred prior to Dallas". In 1993, George Whitaker, a manager at the Ford Motor Company's Rouge Plant in Detroit, told attorney and criminal justice professor Doug Weldon that after reporting to work on November 25, 1963, he discovered the presidential limousine in the Rouge Plant's B building with its windshield removed. Whitaker said that the limousine's removed windshield had a through-and-through bullet hole from the front. He said that he was directed by one of Ford's vice presidents to use the windshield as a template to fabricate a new windshield for installation in the limousine. Whitaker also said he was told to destroy the old one. Film and photographic evidence Film and photographic evidence of the assassination have led viewers to different conclusions regarding the origin of the shots. When the fatal shot struck, the President's head and upper torso moved rapidly backwards – indicating, to many observers, a shot from the right front. Sherry Gutierrez, a certified crime scene and bloodstain pattern analyst, concluded "the head injury to President Kennedy was the result of a single gunshot fired from the right front of the President." Paul Chambers believes that the fatal head shot is consistent with a high velocity (approx. 1,200 m/s) rifle rather than the medium-velocity (600 m/s) Mannlicher–Carcano. Close inspection of the Zapruder film (frames 312 and 313) show Kennedy's head moves downward immediately before it moves rapidly backwards. Anthony Marsh suggests that this downward motion was caused by driver William Greer's deceleration of the car. Others, including Josiah Thompson, Robert Groden, and Cyril Wecht, suggest that this downward-and-then-backward motion was caused by two near-simultaneous bullets: one from the rear and the other from the right front. In 1975, the Rockefeller Commission appointed a panel of experts to review the movement of Kennedy's head and body following the fatal head shot. The panel concluded that "...the violent backward and leftward motion of the President's upper body following the head shot was not caused by the impact of a bullet coming from the front or right front [but was] caused by a violent straightening and stiffening of the entire body as a result of a seizure-like neuromuscular reaction to major damage inflicted to nerve centers in the brain". Acoustical evidence In 1979, the United States House Select Committee on Assassinations (HSCA) agreed with the Warren Commission that Oswald killed Kennedy, but concluded that the commission's report and the original FBI investigation were seriously flawed. The HSCA concluded that at least four shots were fired, with a "high probability" that two gunmen fired at Kennedy, and that a conspiracy was probable. The HSCA stated that the Warren Commission had "failed to investigate adequately the possibility of a conspiracy to assassinate the President". The acoustical analysis that the HSCA presented as evidence for two gunmen has since been discredited. The HSCA acoustic experts said the Dictabelt evidence came from police officer H. B. McLain's radio microphone stuck in the open position. McLain stated that he was not yet in Dealey Plaza when the assassination occurred. A skeptical McLain asked the Committee, "If it was my radio on my motorcycle, why did it not record the revving up at high speed plus my siren when we immediately took off for Parkland Hospital?" In 1982, a panel of 12 scientists appointed by the National Academy of Sciences, including Nobel laureates Norman Ramsey and Luis Alvarez, unanimously concluded that the HSCA's acoustic evidence was "seriously flawed". They concluded that the recording was made after the President had already been shot and that the recording did not indicate any additional gunshots. Their conclusions were later published in the journal Science. In a 2001 article in Science & Justice, a publication of Britain's Forensic Science Society, D. B. Thomas wrote that the NAS investigation was itself flawed. Thomas analyzed audio recordings made during the assassination and concluded with a 96% certainty that a shot was fired from the grassy knoll in front of and to the right of the President's limousine. In 2005, Thomas's conclusions were rebutted in the same journal. Ralph Linsker and several members of the original NAS team reanalyzed the recordings and reaffirmed the earlier conclusion of the NAS report that the alleged shot sounds were recorded approximately one minute after the assassination. In a 2010 book, D. B. Thomas challenged the 2005 Science & Justice article and restated his conclusion that there actually were two gunmen. Medical evidence Some researchers have pointed to the large number of doctors and nurses at Parkland Memorial Hospital who reported that a major part of the back of the President's head was blown out. In 1979, the HSCA noted: "The various accounts of the nature of the wounds to the President ... as described by the staff at Parkland Memorial Hospital, differed from those in the Bethesda autopsy report, as well as from what appears in the autopsy photographs and X-rays". The HSCA concluded that the most probable explanation for the discrepancy between the Parkland doctors' testimony and the Bethesda autopsy witnesses was "that the observations of the Parkland doctors [were] incorrect". Some critics skeptical of the official "single bullet theory" have stated that the bullet's trajectory, which hit Kennedy above the right shoulder blade and passed through his neck (according to the autopsy), would have had to change course to pass through Connally's rib cage and fracture his wrist. Kennedy's death certificate, which was signed by his personal physician George Burkley, locates the bullet at "about the level of the third thoracic vertebra" – which some claim was not high enough to exit his throat. Since the shooter was in a sixth floor window of the Book Depository building, the bullet traveled downward. The autopsy descriptive sheet displays a diagram of the President's body with the same low placement at the third thoracic vertebra. There is a conflicting testimony regarding the autopsy performed on Kennedy's body, particularly during the examination on his brain and whether or not the photos submitted as evidence are the same as those taken during the examination. At Bethesda Naval Hospital, Commander J. J. Humes, the chief autopsy pathologist noted that Kennedy's brain weighed 1,500 grams following formalin fixation. In August 1977, Paul O'Connor, a laboratory technologist who assisted in the President's autopsy, told investigators for the HSCA that there was "nothing left in the cranium but splattered brain matter" and "there was no use me opening the skull because there were no brains." Douglas Horne, the Assassination Record Review Board's chief analyst for military records, said he was "90 to 95% certain" that the photographs in the National Archives are not really of Kennedy's brain. Some conspiracy theorists have said that Kennedy's brain was stolen to cover up evidence that he was shot from the front. In his book JFK and the Unspeakable, James Douglass cites autopsy doctor Pierre Finck's testimony at the trial of Clay Shaw as evidence that Finck was "... a reluctant witness to the military control over the doctors' examination of the president's body". A bone fragment found in Dealey Plaza by William Harper the day following the assassination was reported by the HSCA's Forensic Pathology Panel to have been from Kennedy's skull, a part of his parietal bone. Some critics of the lone gunman theory, including James Douglass, David Lifton, and David Mantick, contend that the bone fragment that Harper found is not parietal bone, but is actually a piece of Kennedy's occipital bone ejected from an exit wound in the back of his head. They allege this finding is evidence of a cover-up, as it proves that the skull radiographs taken during the autopsy, which do not show significant bone loss in the occipital area, are not authentic. Oswald's marksmanship The Warren Commission examined the capabilities of the Carcano rifle and ammunition, as well as Oswald's military training and post-military experience, and determined that Oswald had the ability to fire three shots within a time span of 4.8 to 5.6 seconds. According to their report, an army specialist using Oswald's rifle was able to duplicate the feat and even improved on the time. The report also states that the Army Infantry Weapons Evaluation Branch test fired Oswald's rifle 47 times and found that it was "quite accurate", comparing it to the accuracy of an M14 rifle. Also contained in the Commission report is testimony by Marine Corps Major Eugene Anderson confirming that Oswald's military records show that he qualified as "sharpshooter" in 1956. According to official Marine Corps records, Oswald was tested in shooting in December 1956, scoring 212, slightly above the minimum for qualification as a sharpshooter – the intermediate category. In May 1959, he scored 191, earning the lower designation of marksman. The highest marksmanship category in the Marine Corps is 'Expert' (220). Despite Oswald's confirmed marksmanship in the USMC, conspiracy theorists like Walt Brown and authors such as Richard H. Popkin contend that Oswald was a notoriously poor shot, that his rifle was inaccurate, and that no reconstruction of the event has ever been able to duplicate his ability to fire three shots within the time frame given by the Warren Commission. Role of Oswald The Warren Commission concluded that "there is no evidence that [Oswald] was involved in any conspiracy directed to the assassination of the President." The Commission came to this conclusion after examining Oswald's Marxist and pro-Communist background, including his defection to Russia, the New Orleans branch of the Fair Play for Cuba Committee he had organized, and the various public and private statements made by him espousing Marxism. Some conspiracy theorists have argued that Oswald's pro-Communist behavior was in fact a carefully planned ruse and part of an effort by U.S. intelligence agencies to infiltrate left-wing groups and conduct counterintelligence operations in communist countries. Others speculate that Oswald was either an agent or an informant of the U.S. government and that he may have been trying to expose the plot behind the assassination. Oswald denied shooting anyone and declared that he was "just a patsy". Dallas Police Department Chief Jesse Curry said, "I'm not sure about it. No one has ever been able to put [Oswald] in the Texas School Book Depository with a rifle in his hand." When asked to account for himself at the time of the assassination, Oswald claimed that he "went outside to watch P. Parade", referring to the presidential motorcade, and was "out with [William Shelley, a foreman at the depository] in front", and that he was at the "front entrance to the first floor". Initially, Texas School Book Depository superintendent Roy Truly and Occhus Campbell, the Depository vice president, said they saw Oswald in the first floor storage room after the shooting. Some researchers theorize that a man who was filmed by Dave Wiegman, Jr., of NBC, and James Darnell of WBAP-TV, standing on the Depository front steps during the assassination, referred to as "prayer man", is Oswald. Oswald's role as FBI informant was investigated by Lee Rankin and others of the Warren Commission, but their findings were inconclusive. Several FBI employees had made statements indicating that Oswald was indeed a paid informant, but the Commission was nonetheless unable to verify the veracity of those claims. FBI agent James Hosty reported that his office's interactions with Oswald were limited to dealing with his complaints about being harassed by the Bureau for being a communist sympathizer. In the weeks before the assassination, Oswald made a personal visit to the FBI's Dallas branch office with a hand-delivered letter, which purportedly contained a threat of some sort but, controversially, Hosty destroyed the letter by order of J. Gordon Shanklin, his supervisor. Some researchers suggest that Oswald served as an active agent of the Central Intelligence Agency, often pointing to how he attempted to defect to Russia but was able to return without difficulty, even receiving a repatriation loan from the State Department, as evidence of such. A former roommate of Oswald, James Botelho, who later became a California judge, stated in an interview with Mark Lane that he believed Oswald was involved in an intelligence assignment in Russia, although Botelho did not mention this suspicion in his testimony to the Warren Commission years earlier. Oswald's mother Marguerite often insisted that her son was recruited by an agency of the U.S. Government and sent to Russia. New Orleans District Attorney, and later judge, Jim Garrison, who in 1967 brought Clay Shaw to trial for the assassination of President Kennedy, held the opinion that Oswald was most likely a CIA agent drawn into the plot to be used as a scapegoat, even going as far as to say that Oswald "genuinely was probably a hero". Senator Richard Schweiker, a member of the U.S. Senate Select Committee on Intelligence, remarked that "everywhere you look with [Oswald], there're fingerprints of intelligence". Schweiker told author David Talbot that Oswald "was the product of a fake defector program run by the CIA." Richard Sprague, interim staff director and chief counsel to the U.S. House Select Committee on Assassinations, stated that if he "had to do it over again", he would have investigated the Kennedy assassination by probing Oswald's ties to the Central Intelligence Agency. In 1978, James Wilcott, a former CIA finance officer, testified before the HSCA that shortly after the assassination of President Kennedy he was advised by fellow employees at a CIA post abroad that Oswald was a CIA agent who had received financial disbursements under an assigned cryptonym. Wilcott was unable to identify the specific case officer who had initially informed him of Oswald's agency relationship, nor was he able to recall the name of the cryptonym, but he named several employees of the post abroad with whom he believed he had subsequently discussed the allegations. Later that year Wilcott and his wife, Elsie, also a former employee of the CIA, repeated those claims in an article in the San Francisco Chronicle. The HSCA investigated Wilcott's claims – an investigation that included interviews with the chief of station and officers in counterintelligence – and concluded that Wilcott's claims were "not worthy of belief". Despite its official policy of neither confirming nor denying the status of agents, both the CIA itself and many officers working in the region at the time (including David Atlee Phillips) have "unofficially" dismissed the plausibility of any possible ties of Oswald to the agency. Robert Blakey, staff director and chief counsel for the U.S. House Select Committee on Assassinations, supported that assessment in his conclusions as well. Alternative gunmen In addition to Oswald, Jerome Kroth has named 26 people as "Possible Assassins In Dealey Plaza". They include: Orlando Bosch, James Files, Desmond Fitzgerald, Charles Harrelson, Gerry Hemming, Chauncey Holt, Howard Hunt, Charles Nicoletti, Charles Rogers, Johnny Roselli, Lucien Sarti, and Frank Sturgis. Three tramps Vincent Bugliosi provides a "partial list of assassins ... whom one or more conspiracy theorists have actually named and identified as having fired a weapon at Kennedy" in his book Reclaiming History. He mentions the three tramps, men photographed by several Dallas-area newspapers under police escort near the Texas School Book Depository shortly after the assassination. Since the mid-1960s, various allegations have been made about the identities of the men and their involvement in a conspiracy to kill Kennedy. Records released by the Dallas Police Department in 1989 identified the men as Gus Abrams, Harold Doyle, and John Gedney. E. Howard Hunt The theory that former CIA agent and Watergate burglar E. Howard Hunt was a participant in the assassination of Kennedy garnered much publicity from 1978 to 2000. In 1981, Hunt won a libel judgment against Liberty Lobby's paper The Spotlight, which in 1978 printed an allegation by Victor Marchetti stating that Hunt was in Dallas on the day of the assassination and suggesting Hunt's involvement in a conspiracy; the libel award was thrown out on appeal and the newspaper was successfully defended by Mark Lane in a second trial. After Hunt's death in 2007, an audio-taped "deathbed confession" in which Hunt claimed first-hand knowledge of a conspiracy, as a co-conspirator, was released by his son Saint John Hunt. In the confession, Hunt claimed to have been a "bench warmer" in Dallas during the events, and he named several high-level CIA operatives as those who likely carried out the logistics of the assassination. Hunt named Vice President Lyndon Johnson as the most likely figure behind the main impetus of the conspiracy. The authenticity of the confession was met with some skepticism. J. D. Tippit Dallas Police Officer J. D. Tippit has been named in some conspiracy theories as a renegade CIA operative sent to silence Oswald and as the "badge man" assassin on the grassy knoll. According to some Warren Commission critics, Oswald was set up to be killed by Tippit, and Tippit was killed by Oswald in self-defense. Other critics doubt that Tippit was killed by Oswald and assert he was shot by other conspirators. Some critics have alleged that Tippit was associated with organized crime or right-wing politics. Bernard Weissman According to the Warren Commission, the publication of a full-page, paid advertisement critical of Kennedy in the November 22, 1963, Dallas Morning News, which was signed by "The American Fact-Finding Committee" and noted Bernard Weissman as its chairman, was investigated to determine whether any members of the group claiming responsibility for it were connected to Oswald or to the assassination. The Commission stated that "The American Fact-Finding Committee" was a fictitious sponsoring organization and that there was no evidence linking the four men responsible for the genesis of the ad with either Oswald or Ruby, or to a conspiracy to assassinate Kennedy. Related to the advertisement, Mark Lane testified during the Warren Commission's hearings that an informant whom he refused to name told him that Weismann had met with Tippit and Ruby eight days before the assassination at Ruby's Carousel Club. The Commission reported that they "found no evidence that such a meeting took place anywhere at any time" and that there was no "credible evidence that any of the three men knew each other". Lane later stated that he initially learned of the meeting through reporter Thayer Waldo of the Fort Worth Star-Telegram. According to Lane, a "prominent Dallas figure" who frequented Ruby's Carousel Club told Waldo, and later Lane, that he observed the meeting of the three men at the club. He said, "I had promised the man he would not be involved; he was a leading Dallas citizen; he was married, and the stripper he was going with had become pregnant." Despite not having revealed to the Warren Commission that Waldo was his original source of the alleged meeting, Lane disputed their findings and complained that they failed to ask Waldo about it. According to Hugh Aynesworth, the source of the allegation whose identity Lane promised not to reveal was Carroll Jarnagin, a Dallas attorney who had also claimed to have overheard a meeting between Oswald and Ruby. Aynesworth wrote: "Several people in Dallas were well aware of Jarnagin's tale, and that he later admitted making it all up." Unnamed accomplice(s) in the murder of J. D. Tippit The Warren Commission concluded that Oswald killed President Kennedy and then "killed Dallas Police Officer J. D. Tippit in an apparent attempt to escape." Regarding the evidence against Oswald in the shooting of Tippit, the Commission cited: "(1) two eyewitnesses who heard the shots and saw the shooting of Dallas Police Patrolman J. D. Tippit and seven eyewitnesses who saw the flight of the gunman with revolver in hand positively identified Lee Harvey Oswald as the man they saw fire the shots or flee from the scene, (2) the cartridge cases found near the scene of the shooting were fired from the revolver in the possession of Oswald at the time of his arrest, to the exclusion of all other weapons, (3) the revolver in Oswald's possession at the time of his arrest was purchased by and belonged to Oswald, and (4) Oswald's jacket was found along the path of flight taken by the gunman as he fled from the scene of the killing." Some researchers have alleged that the murder of Officer Tippit was part of a conspiracy to kill President Kennedy. Jim Marrs hypothesized that "the slaying of Officer J. D. Tippit may have played some part in [a] scheme to have Oswald killed, perhaps to eliminate co-conspirator Tippit or simply to anger Dallas police and cause itchy trigger fingers." Researcher James Douglass said that "... the killing of [Tippit] helped motivate the Dallas police to kill an armed Oswald in the Texas Theater [where Oswald was arrested], which would have disposed of the scapegoat before he could protest his being framed." Harold Weisberg offered a simpler explanation: "Immediately, the [flimsy] police case [against Oswald] required a willingness to believe. This was proved by affixing to Oswald the opprobrious epithet of 'cop-killer.'" Jim Garrison alleged that evidence was altered to frame Oswald, stating: "If Oswald was innocent of the Tippit murder the foundation of the government's case against him collapsed." Some critics doubt that Tippit was killed by Oswald and assert he was shot by other conspirators. They allege discrepancies in witness testimony and physical evidence that they think call into question the Commission's conclusions regarding the murder of Tippit. According to Jim Marrs, Oswald's guilt in the assassination of Kennedy is placed in question by the presence of "a growing body of evidence to suggest that [he] did not kill Tippit". Others say that multiple men were directly involved in Tippit's killing. Conspiracy researcher Kenn Thomas has alleged that the Warren Commission omitted testimony and evidence that two men shot Tippit and that one left the scene in a car. William Alexander – the Dallas assistant district attorney who recommended that Oswald be charged with the Kennedy and Tippit murders – later became skeptical of the Warren Commission's version of the Tippit murder. He stated that the Commission's conclusions on Oswald's movements "don't add up", and that "certainly [Oswald] may have had accomplices." According to Brian McKenna's review of Henry Hurt's book, Reasonable Doubt, Hurt reported that "Tippit may have been killed because he impregnated the wife of another man" and that Dallas police officers lied and altered evidence to set up Oswald to save Tippit's reputation. In the documentary JFK to 9/11, Francis Conolly claims that Tippit was shot because his looks resembled Kennedy's. Conolly speculates that the assassination plot did not go as planned, and that the conspirators needed a second body. He further theorizes that Tippit's body and JFK's body were switched on Air Force Two. Allegations about witness testimony and physical evidence The Warren Commission identified Helen Markham and Domingo Benavides as two witnesses who actually saw the shooting of Officer Tippit. Conspiracy theorist Richard Belzer criticized the Commission for, in his description, "relying" on the testimony of Markham whom he described as "imaginative". Jim Marrs also took issue with Markham's testimony, stating that her "credibility ... was strained to the breaking point". Joseph Ball, senior counsel to the Commission, referred to Markham's testimony as "full of mistakes", characterizing her as an "utter screwball". The Warren Commission addressed concerns regarding Markham's reliability as a witness and concluded: "However, even in the absence of Mrs. Markham's testimony, there is ample evidence to identify Oswald as the killer of Tippit." Domingo Benavides initially said that he did not think he could identify Tippit's assailant and was never asked to view a police lineup, even though he was the person closest to the killing. Benavides later testified that the killer resembled pictures he had seen of Oswald. Other witnesses were taken to police lineups. However, critics have questioned these lineups as they consisted of people who looked very different from Oswald. Witnesses who did not appear before the Commission identified an assailant who was not Oswald. Acquilla Clemons said she saw two men near Tippit's car just before the shooting. She said that after the shooting, she ran outside of her house and saw a man with a gun whom she described as "kind of heavy". She said he waved to the second man, urging him to "go on". Frank Wright said he emerged from his home and observed the scene seconds after the shooting. He described a man standing by Tippit's body who had on a long coat and said the man ran to a parked car and drove away. Critics have questioned whether the cartridge cases recovered from the scene were the same as those that were subsequently entered into evidence. Two of the cases were recovered by witness Domingo Benavides and turned over to police officer J. M. Poe. Poe told the FBI that he marked the shells with his own initials, "J.M.P." to identify them. Sergeant Gerald Hill later testified to the Warren Commission that it was he who had ordered police officer Poe to mark the shells. However, Poe's initials were not found on the shells produced by the FBI six months later. Testifying before the Warren Commission, Poe said that although he recalled marking the cases, he "couldn't swear to it". The identification of the cases at the crime scene raises more questions. Sergeant Gerald Hill examined one of the shells and radioed the police dispatcher, saying: "The shell at the scene indicates that the suspect is armed with an automatic .38 rather than a pistol." However, Oswald was reportedly arrested carrying a non-automatic .38 Special revolver. Allegations about timeline The Warren Commission investigated Oswald's movements between the time of the assassination and the shooting of Tippit, to ascertain whether Oswald might have had an accomplice who helped him flee the Book Depository. The Commission concluded "... through the testimony of seven witnesses [that] Oswald was always alone." According to their final report, Oswald was seen by his housekeeper, Earlene Roberts, leaving his rooming house shortly after 1:00 pm and had enough time to travel nine-tenths of a mile (1.4 km) to the scene where Tippit was killed at 1:16 pm. Witness Helen Markham stated in her affidavit to the Dallas Sheriff's department that Tippit was killed at "approximately 1:06 pm." She later affirmed the time in testimony before the Warren Commission, saying: "I wouldn't be afraid to bet it wasn't 6 or 7 minutes after 1." She initially told the FBI that the shooting occurred "possibly around 1:30 pm." In an unpublished manuscript titled When They Kill a President, Deputy Sheriff Roger Craig stated that when he heard the news that Tippit had been shot, he noted that the time was 1:06 pm. However, in a later statement to the press, Craig seemed confused about the time of the shooting. Warren Burroughs, who ran the concession stand at the Texas Theater where Oswald was arrested, said that Oswald came into the theater between 1:00 and 1:07 pm; he also claimed he sold Oswald popcorn at 1:15 pm – the "official" time of Officer Tippit's murder. A theater patron, Jack Davis, also corroborated Burroughs's time, claiming he observed Oswald in the theater prior to 1:20 pm. Babushka Lady The Babushka Lady was a woman who was seen to be holding a camera by eyewitnesses and was also seen in film accounts of the assassination. Her nickname arose from the headscarf she wore, which was similar to scarves worn by elderly Russian women. She was observed standing on the grass between Elm and Main streets, standing amongst onlookers in front of the Dallas County Building, and is visible in the Zapruder film as well as in the films of Orville Nix, Marie Muchmore, and Mark Bell. She is last seen in photographs walking east on Elm Street. Neither she, nor the film she may have taken, have ever been positively identified. Umbrella man The so-called "umbrella man" was one of the closest bystanders to the president when he was first struck by a bullet. The "umbrella man" has become the subject of conspiracy theories after footage of the assassination showed him holding an open umbrella as the Kennedy motorcade passed, despite the fact that it was not raining at the time. One conspiracy theory, proposed by assassination researcher Robert Cutler, suggests that a dart with a paralyzing agent could have been fired from the umbrella, disabling Kennedy and making him a "sitting duck" for an assassination. In 1975, CIA weapons developer Charles Senseney told the Senate Intelligence Committee that such an umbrella weapon was in the hands of the CIA in 1963. A more prevalent conspiracy theory holds that the umbrella could have been used to provide visual signals to hidden gunmen. In 1978, Louie Steven Witt came forward and identified himself as the "umbrella man". Testifying before the United States House Select Committee on Assassinations, Witt stated he brought the umbrella to heckle Kennedy and protest the appeasement policies of the president's father, Joseph Kennedy. He added: "I think if the Guinness Book of World Records had a category for people who were at the wrong place at the wrong time, doing the wrong thing, I would be No. 1 in that position, without even a close runner-up." Some researchers have noted a number of inconsistencies with Witt's story, however, and doubt him to be the "umbrella man". Dark complected man An unidentified individual who is referred to by some conspiracy theorists as the "dark complected man" can be seen in several photographs, taken seconds after the assassination, sitting on the sidewalk next to the "umbrella man" on the north side of Elm Street. Louie Steven Witt, who identified himself as the "umbrella man", said he was unable to identify the other individual, whose dark complexion has led some conspiracy theorists to speculate Cuban government involvement, or Cuban exile involvement, in the assassination of Kennedy. Badge Man "Badge Man" and "tin hat man" are figures on the grassy knoll who it is alleged can be seen in the Mary Moorman photo, taken approximately one-sixth of a second after President Kennedy was struck with the fatal head wound. The figures were first discovered by researchers Jack White and Gary Mack and are discussed in a 1988 documentary The Men Who Killed Kennedy, where it is alleged a third figure can also be seen on the grassy knoll, possibly the eyewitness Gordon Arnold. The "badge man" figure – so called as he appears to be wearing a uniform similar to that worn by a policeman, with a badge prominent – helped fuel conspiracy theories linking Dallas Police officers, or someone impersonating a police officer, to the assassination. Black dog man Another "figure" is the so-called "black dog man" figure who can be seen at the corner of a retaining wall in the Willis and Betzner photo of the assassination. In an interview, Marilyn Sitzman told Josiah Thompson that she saw a young black couple who were eating lunch and drinking Cokes on a bench behind the retaining wall and, therefore, it is possible that the "black dog man" figure is actually one of the pair. In The Killing of a President, Robert Groden argues that the "black dog man" figure can be seen in a pyracantha bush in frame 413 of the Zapruder film. The United States House Select Committee on Assassinations concluded that a head of an individual could be seen but that this individual was situated in front of, rather than behind the bushes. Bill Miller argues that this individual is actually the eyewitness Emmett Hudson. Conspiracy theories Conspiracy theorists consider four or five groups, alone or in combination, to be the primary suspects in the assassination of Kennedy: the CIA, the military-industrial complex, organized crime, the government of Cuba led by Fidel Castro, and Cuban exiles. Other domestic individuals, groups, or organizations implicated in various conspiracy theories include Lyndon Johnson, George H. W. Bush, Sam Giancana, Carlos Marcello, J. Edgar Hoover, Earl Warren, the Federal Bureau of Investigation, the United States Secret Service, the John Birch Society, and far-right wealthy Texans. Some other alleged foreign conspirators include the KGB and Nikita Khrushchev, Aristotle Onassis, the government of South Vietnam, and international drug lords, including a French heroin syndicate. New Orleans conspiracy New Orleans District Attorney Jim Garrison began an investigation into the Kennedy assassination in 1966. Garrison developed a theory of a plot that included a group of New Orleans residents in his jurisdiction. Garrison's 1988 book On the Trail of the Assassins discusses his prosecution of Clay Shaw for the assassination, and was partially adapted by Oliver Stone for his 1991 film JFK. The final report of the Assassination Records Review Board (ARRB) stated that the film "popularized a version of President Kennedy's assassination that featured U.S. government agents from the Federal Bureau of Investigation (FBI), the Central Intelligence Agency (CIA), and the military as conspirators." Journalist Rosemary James, whose article with Jack Dempsey and David Snyder in the New Orleans States-Item broke the news of the Garrison investigation, stated that because Garrison's theory evolved frequently, it was mockingly called the "theory du jour" by the media. Pamela Colloff and Michael Hall summarized the theory held by Garrison and Stone for Texas Monthly: "There is a secret government within our government, a cabal that in 1963 ordered the murder of a popular president, set up a patsy, installed its own puppet, and orchestrated an elaborate cover-up that included tampering with the corpse, destroying and suppressing evidence, and killing witnesses. Heading the cabal were some of the world’s most powerful men: rich and corrupt industrialists, generals, and right-wing politicians. Down below was an eclectic group of mobsters, spooks, lowlifes, and anti-Castro extremists, many of whom were headquartered at 544 Camp Street in New Orleans, including Oswald, former FBI agent Guy Banister, soldier of fortune David Ferrie, and suspected CIA informant Clay Shaw. Together, in the summer of 1963, they plotted Kennedy’s demise." Soon after the assassination of President Kennedy, Oswald's activities in New Orleans, Louisiana, during the spring and summer of 1963, came under scrutiny. Three days after the assassination, on November 25, 1963, New Orleans attorney Dean Andrews told the FBI that he received a telephone call from a man named Clay Bertrand, on the day of the assassination, asking him to defend Oswald. Andrews would later repeat this claim in testimony to the Warren Commission. Also, in late November 1963, an employee of New Orleans private investigator Guy Banister named Jack Martin began making accusations that fellow Banister employee David Ferrie was involved in the JFK assassination. Martin told police that Ferrie "was supposed to have been the getaway pilot in the assassination." He said that Ferrie had outlined plans to kill Kennedy and that Ferrie might have taught Oswald how to use a rifle with a telescopic sight. Martin claimed that Ferrie had known Oswald from their days in the New Orleans Civil Air Patrol, and that he had seen a photograph, at Ferrie's home, of Oswald in a Civil Air Patrol group. Ferrie denied any association with Oswald. It was later discovered that Ferrie had attended Civil Air Patrol meetings in New Orleans in the 1950s that were attended by a teenage Lee Harvey Oswald. In 1993, the PBS television program Frontline obtained a photograph taken in 1955, eight years before the assassination, showing Oswald and Ferrie at a Civil Air Patrol cookout with other C.A.P. cadets. Whether Oswald's and Ferrie's association in the Civil Air Patrol in 1955 is relevant to their later possible association in 1963 is a subject of debate. According to several witnesses, in 1963, both Ferrie and Banister were working for lawyer G. Wray Gill on behalf of Gill's client, New Orleans Mafia boss Carlos Marcello, in an attempt to block Marcello's deportation to Guatemala. On the afternoon of November 22, 1963 – the day John F. Kennedy was assassinated and the day Marcello was acquitted in his deportation case – New Orleans private investigator Guy Banister and his employee, Jack Martin, were drinking together at a local bar. On their return to Banister's office, the two men got into a heated argument. According to Martin, Banister said something to which Martin replied, "What are you going to do – kill me like you all did Kennedy?". Banister drew his .357 magnum revolver and pistol-whipped Martin several times. Martin, badly injured, went by ambulance to Charity Hospital. Earlier, in the spring of 1963, Oswald had written to the New York City headquarters of the pro-Castro Fair Play for Cuba Committee, proposing to rent "a small office at my own expense for the purpose of forming a FPCC branch here in New Orleans". As the sole member of the New Orleans chapter of the Fair Play for Cuba Committee, Oswald ordered 1,000 leaflets with the heading, "Hands Off Cuba" from a local printer. On August 16, 1963, Oswald passed out Fair Play for Cuba leaflets in front of the International Trade Mart in New Orleans. One of Oswald's leaflets had the address "544 Camp Street" hand-stamped on it, apparently by Oswald himself. The address was in the "Newman Building", which from October 1961 to February 1962 housed the Cuban Revolutionary Council, a militant anti-Castro group. Around the corner but located in the same building, with a different entrance, was the address 531 Lafayette Street – the address of "Guy Banister Associates", the private detective agency run by Guy Banister. Banister's office was involved in anti-Castro and private investigative activities in the New Orleans area. A CIA file indicated that in September 1960, the CIA had considered "using Guy Banister Associates for the collection of foreign intelligence, but ultimately decided against it". In the late 1970s, the House Select Committee on Assassinations (HSCA) investigated the possible relationship of Oswald to Banister's office. While the committee was unable to interview Guy Banister, who died in 1964, the committee interviewed his brother Ross Banister. Ross "told the committee that his brother had mentioned seeing Oswald hand out Fair Play for Cuba literature on one occasion. Ross theorized that Oswald had used the 544 Camp Street address on his literature to embarrass Guy." Guy Banister's secretary, Delphine Roberts, would later tell author Anthony Summers that she saw Oswald at Banister's office, and that he filled out one of Banister's "agent" application forms. She said, "Oswald came back a number of times. He seemed to be on familiar terms with Banister and with the office." The House Select Committee on Assassinations investigated Roberts's claims and said that "because of contradictions in Roberts' statements to the committee and lack of independent corroboration of many of her statements, the reliability of her statements could not be determined." In 1966, New Orleans District Attorney Jim Garrison began an investigation into the assassination of President Kennedy. Garrison's investigation led him to conclude that a group of right-wing extremists, including David Ferrie and Guy Banister, were involved with elements of the Central Intelligence Agency (CIA) in a conspiracy to kill Kennedy. Garrison later claimed that the motive for the assassination was anger over Kennedy's attempts to obtain a peace settlement in both Cuba and Vietnam. Garrison came to believe that New Orleans businessman Clay Shaw was part of the conspiracy and that Clay Shaw used the pseudonym "Clay Bertrand". Garrison further believed that Shaw, Banister, and Ferrie conspired to set up Oswald as a patsy in the JFK assassination. On March 1, 1967, Garrison arrested and charged Shaw with conspiring to assassinate President Kennedy. On January 29, 1969, Clay Shaw was brought to trial on these charges, and the jury found him not guilty. CIA conspiracy Addressing speculation that Oswald was a CIA agent or had some relationship with the Agency, the Warren Commission stated in 1964 that their investigation "revealed no evidence that Oswald was ever employed [by the] CIA in any capacity." The House Select Committee on Assassinations reported similarly in 1979 that "there was no indication in Oswald's CIA file that he had ever had contact with the Agency" and concluded that the CIA was not involved in the assassination of Kennedy. Gaeton Fonzi, an investigator for the House Select Committee on Assassinations, wrote that investigators were pressured not to look into the relationship between Lee Harvey Oswald and the CIA. He stated that CIA agent David Atlee Phillips, using the pseudonym "Maurice Bishop", was involved with Oswald prior to the Kennedy assassination in connection with anti-Castro Cuban groups. In 1995, former U.S. Army Intelligence officer and National Security Agency executive assistant John M. Newman published evidence that both the CIA and FBI deliberately tampered with their files on Lee Harvey Oswald both before and after the assassination. He found that both agencies withheld information that might have alerted authorities in Dallas that Oswald posed a potential threat to the President. Subsequently, Newman expressed the belief that CIA chief of counter-intelligence James Angleton was probably the key figure in the assassination. According to Newman, only Angleton "had the access, the authority, and the diabolically ingenious mind to manage this sophisticated plot." Newman surmised that the cover operation was not under James Angleton, but under Allen Dulles, the former CIA director, and later Warren Commission member, who had been dismissed by Kennedy after the failed Bay of Pigs invasion. In 1977, the FBI released 40,000 files pertaining to the assassination of Kennedy, including an April 3, 1967, memorandum from Deputy Director Cartha DeLoach to Associate Director Clyde Tolson that was written less than a month after President Johnson learned from J. Edgar Hoover about CIA plots to kill Fidel Castro. The memorandum reads: "Marvin Watson [adviser to President Johnson] called me late last night and stated that the president had told him, in an off moment, that he was now convinced that there was a plot in connection with the [JFK] assassination. Watson stated the president felt that [the] CIA had had something to do with plot." Later, Cartha DeLoach testified to the Church Committee that he "felt this to be sheer speculation". Shadow government conspiracy One conspiracy theory suggests that a secret or shadow government including wealthy industrialists and right-wing politicians ordered the assassination of Kennedy. Peter Dale Scott has indicated that Kennedy's death allowed for policy reversals desired by the secret government to escalate the United States' military involvement in Vietnam. In JFK vs Allen Dulles, author Greg Poulgrain describes an attempt by America's Rockefeller family to gain control over West Irian gold mines in Indonesia, in particular the substantially gold-rich Grasberg mine. Poulgrain speculates that President Kennedy's close relationship with Indonesian President Sukarno and a planned 1964 US–Indonesian summit could have led to Indonesia granting independence to West Irian, making it difficult for Rockefeller-owned Freeport Sulphur to gain control of the mines. Poulgrain contends that Allen Dulles, who had ties to the Rockefellers through his employment at Sullivan & Cromwell, organized the assassination on the Rockefellers' behalf to eliminate Kennedy's interference by easing Lee Harvey Oswald's return to the United States and getting him a job at the Texas School Book Depository, before instigating a coup in Indonesia with the cooperation of military officer Suharto to discredit the Communist Party of Indonesia. The subsequent nationwide massacres and Suharto's assumption of the presidency, Poulgrain purports, led to Freeport securing the mines with the approval of Suharto's pro-Western government. In the biographical book, The Devil's Chessboard: Allen Dulles, the CIA, and the Rise of America's Secret Government, David Talbot examines Dulles' career. Talbot also posits that Allen Dulles orchestrated the assassination of President Kennedy at the behest of corporate leaders, though on the basis of their perceiving Kennedy as a threat to national security instead of to primarily secure any specific business interests. According to Talbot, Dulles lobbied the new president, Lyndon Johnson, to have himself appointed to the Warren Commission. Talbot says that Allen Dulles also arranged to make Lee Harvey Oswald the person responsible for the assassination. The book asserts that the conspirators behind John Kennedy's death also murdered his brother Robert Kennedy, who the conspirators perceived to be "a wild card, an uncontrollable threat" that would reveal the plot. Military-industrial complex In the farewell speech given by U.S. President Dwight D. Eisenhower before he left office on January 17, 1961, warned the nation about the power of the military establishment and the arms industry. "In the councils of government, we must guard against the acquisition of unwarranted influence, whether sought or unsought, by the military-industrial complex. The potential for the disastrous rise of misplaced power exists, and will persist." Some conspiracy theorists have argued that Kennedy planned to end the involvement of the United States in Vietnam, and was therefore targeted by those who had an interest in sustained military conflict, including the Pentagon and defense contractors. Former United States Senator Ralph Yarborough in 1991 stated: "Had Kennedy lived, I think we would have had no Vietnam War, with all of its traumatic and divisive influences in America. I think we would have escaped that." According to author James W. Douglass, Kennedy was assassinated because he was turning away from the Cold War and seeking a negotiated peace with the Soviet Union. Douglass argued that this "was not the kind of leadership the CIA, the Joint Chiefs of Staff, and the military-industrial complex wanted in the White House." Oliver Stone's film, JFK, explored the possibility that Kennedy was killed by a conspiracy involving the military-industrial complex. L. Fletcher Prouty, Chief of Special Operations for the Joint Chiefs of Staff under Kennedy, and the person who inspired the character "Mr. X" in Stone's film, wrote that Kennedy's assassination was actually a coup d'état. Secret Service conspiracy The House Select Committee on Assassinations reported that it investigated "alleged Secret Service complicity in the assassination" and concluded that the Secret Service was not involved. However, the HSCA declared that "the Secret Service was deficient in the performance of its duties." Among its findings, the HSCA noted: (1) that President Kennedy had not received adequate protection in Dallas, (2) that the Secret Service possessed information that was not properly analyzed, investigated, or used by the Secret Service in connection with the President's trip to Dallas, and (3) that the Secret Service agents in the motorcade were inadequately prepared to protect the President from a sniper. The HSCA specifically noted: "No actions were taken by the agent in the right front seat of the presidential limousine Roy Kellerman to cover the President with his body, although it would have been consistent with Secret Service procedure for him to have done so. The primary function of the agent was to remain at all times in close proximity to the President in the event of such emergencies." Some argue that the lack of Secret Service protection occurred because Kennedy himself had asked that the Secret Service make itself discreet during the Dallas visit. However, Vince Palamara, who interviewed several Secret Service agents assigned to the Kennedy detail, disputes this. Palamara reports that Secret Service driver Sam Kinney told him that requests – such as removing the bubble top from the limousine in Dallas, not having agents positioned beside the limousine's rear bumper, and reducing the number of Dallas police motorcycle outriders near the limousine's rear bumper – were not made by Kennedy. In The Echo from Dealey Plaza, Abraham Bolden – the first African American on the White House Secret Service detail – claimed to have overheard agents say that they would not protect Kennedy from would-be assassins. Questions regarding the forthrightness of the Secret Service increased in the 1990s when the Assassination Records Review Board – which was created when Congress passed the JFK Records Act – requested access to Secret Service records. The Review Board was told by the Secret Service that in January 1995, in violation of the JFK Records Act, the Secret Service destroyed protective survey reports that covered JFK's trips from September 24 through November 8, 1963. Cuban exiles The House Select Committee on Assassinations wrote: "The committee believes, on the basis of the evidence available to it, that anti-Castro Cuban groups, as groups, were not involved in the assassination of President Kennedy, but that the available evidence does not preclude the possibility that individual members may have been involved". With the 1959 Cuban Revolution that brought Fidel Castro to power, many Cubans left Cuba to live in the United States. Many of these exiles hoped to overthrow Castro and return to Cuba. Their hopes were dashed with the failed Bay of Pigs Invasion in 1961, and many blamed President Kennedy for the failure. The House Select Committee on Assassinations concluded that some militant Cuban exiles might have participated in Kennedy's murder. These exiles worked closely with CIA operatives in violent activities against Castro's Cuba. In 1979, the committee reported: "President Kennedy's popularity among the Cuban exiles had plunged deeply by 1963. Their bitterness is illustrated in a tape recording of a meeting of anti-Castro Cubans and right-wing Americans in the Dallas suburb of Farmer's Branch on October 1, 1963." Author Joan Didion explored the Miami anti-Castro Cuban theory in her 1987 book Miami. She discussed Marita Lorenz's testimony regarding Guillermo Novo, a Cuban exile who, in 1964, was involved in shooting a bazooka at the headquarters of the United Nations building from the East River during a speech by Che Guevara. Allegedly, Novo was affiliated with Lee Harvey Oswald, and Frank Sturgis. Lorenz claimed that she, Oswald, and seven anti-Castro Cubans transported weapons from Miami to Dallas in two cars just prior to the assassination. These claims, though put forth to the House Assassinations Committee by Lorenz, have never been substantiated. Don DeLillo dramatized the Cuban theory in his 1988 novel Libra. Organized crime conspiracy In 1964, the Warren Commission found no evidence linking Ruby's killing of Oswald with any broader conspiracy to assassinate President Kennedy. The Commission concluded: "Based on its evaluation of the record, the Commission believes that the evidence does not establish a significant link between Ruby and organized crime. Both State and Federal officials have indicated that Ruby was not affiliated with organized criminal activity." However, in 1979, the House Select Committee on Assassinations wrote: "The committee believes, on the basis of the evidence available to it, that the national syndicate of organized crime, as a group, was not involved in the assassination of President Kennedy, but that the available evidence does not preclude the possibility that individual members may have been involved". Robert Blakey, who was chief counsel for the House Select Committee on Assassinations, would later conclude in his book, The Plot to Kill the President, that New Orleans Mafia boss Carlos Marcello was likely part of a Mafia conspiracy behind the assassination, and that the Mafia had the means and the opportunity required to carry it out. In a 1993 Washington Post article, Blakey added: "It is difficult to dispute the underworld pedigree of Jack Ruby, though the Warren Commission did it in 1964. Author Gerald Posner similarly ignores Ruby's ties to Joseph Civello, the organized crime boss in Dallas. His relationship with Joseph Campisi, the No. 2 man in the mob in Dallas, is even more difficult to ignore. In fact, Campisi and Ruby were close friends; they had dinner together at Campisi's restaurant, the Egyptian Lounge, on the night before the assassination. After Ruby was jailed for killing Oswald, Campisi regularly visited him. The select committee thought Campisi's connection to Marcello was telling; he told us, for example, that every year at Christmas he sent 260 pounds of Italian sausage to Marcello, a sort of Mafia tribute. We also learned that he called New Orleans up to 20 times a day." Government documents have revealed that some members of the Mafia worked with the Central Intelligence Agency on assassination attempts against Cuban leader Fidel Castro. In summer 1960, the CIA recruited ex-FBI agent Robert Maheu to approach the West Coast representative of the Chicago mob, Johnny Roselli. When Maheu contacted Roselli, Maheu hid the fact that he was sent by the CIA, instead portraying himself as an advocate for international corporations. He offered to pay $150,000 to have Castro killed, but Roselli declined any pay. Roselli introduced Maheu to two men he referred to as "Sam Gold" and "Joe". "Sam Gold" was Sam Giancana; "Joe" was Santo Trafficante, Jr., the Tampa, Florida, boss and one of the most powerful mobsters in pre-revolution Cuba. Glenn Kessler of The Washington Post explained: "After Fidel Castro led a revolution that toppled a friendly government in 1959, the CIA was desperate to eliminate him. So the agency sought out a partner equally worried about Castro – the Mafia, which had lucrative investments in Cuban casinos." In his memoir, Bound by Honor, Bill Bonanno, son of New York Mafia boss Joseph Bonanno, disclosed that several Mafia families had long-standing ties with the anti-Castro Cubans through the Havana casinos operated by the Mafia before the Cuban Revolution. Many Cuban exiles and Mafia bosses disliked President Kennedy, blaming him for the failed Bay of Pigs Invasion. They also disliked his brother, then United States Attorney General Robert F. Kennedy, who had conducted an unprecedented legal assault on organized crime. This was especially provocative because several Mafia "families" had allegedly worked with JFK's father, Joseph Kennedy, to get JFK elected. Both the Mafia and the anti-Castro Cubans were experts in assassination – the Cubans having been trained by the CIA. Bonanno reported that he recognized the high degree of involvement of other Mafia families when Jack Ruby killed Oswald, since Bonanno was aware that Ruby was an associate of Chicago mobster Sam Giancana. Some conspiracy researchers have alleged a plot involving elements of the Mafia, the CIA, and the anti-Castro Cubans, including Anthony Summers, who stated: "Sometimes people sort of glaze over about the notion that the Mafia and U.S. intelligence and the anti-Castro activists were involved together in the assassination of President Kennedy. In fact, there's no contradiction there. Those three groups were all in bed together at the time and had been for several years in the fight to topple Fidel Castro." News reporter Ruben Castaneda wrote in 2012: "Based on the evidence, it is likely that JFK was killed by a coalition of anti-Castro Cubans, the Mob, and elements of the CIA." In his book, They Killed Our President, former Minnesota governor Jesse Ventura concluded: "John F. Kennedy was murdered by a conspiracy involving disgruntled CIA agents, anti-Castro Cubans, and members of the Mafia, all of whom were extremely angry at what they viewed as Kennedy's appeasement policies toward Communist Cuba and the Soviet Union." Carlos Marcello allegedly threatened to assassinate the President to short-circuit his younger brother, Attorney General Robert Kennedy, who was leading the administration's anti-Mafia crusade. Information released in 2006 by the FBI has led some to conclude that Carlos Marcello confessed to his cellmate in Texas, Jack Van Lanningham, an FBI informant, using a transistor radio that was bugged by the FBI, to having organized Kennedy's assassination, and that the FBI covered up this information that it had in its possession. In his book, Contract on America, David Scheim provided evidence that Mafia leaders Carlos Marcello, Santo Trafficante, Jr., and Jimmy Hoffa ordered the assassination of President Kennedy. Scheim cited in particular a 25-fold increase in the number of out-of-state telephone calls from Jack Ruby to associates of these crime bosses in the months before the assassination, and to an attempted confession by Jack Ruby while in prison. David E. Kaiser has also suggested mob involvement in his book, The Road to Dallas. Investigative reporter Jack Anderson concluded that Fidel Castro worked with organized crime figures to arrange the JFK assassination. In his book Peace, War, and Politics, Anderson claimed that Mafia member Johnny Roselli gave him extensive details of the plot. Anderson said that although he was never able to independently confirm Roselli's entire story, many of Roselli's details checked out. Anderson said that Oswald may have played a role in the assassination, but that more than one gunman was involved. Johnny Roselli, as previously noted, had worked with the CIA on assassination attempts against Castro. The History Channel program The Men Who Killed Kennedy presented additional claims of organized crime involvement. Christian David was a Corsican Mafia member interviewed in prison. He said that he was offered the assassination contract on President Kennedy, but that he did not accept it. However, he said that he knew the men who did accept the contract. According to David, there were three shooters. He provided the name of one – Lucien Sarti. David said that since the other two shooters were still alive, it would break a code of conduct for him to identify them. When asked what the shooters were wearing, David noted their modus operandi was to dress in costumes such as official uniforms. Much of Christian David's testimony was confirmed by former Corsican member Michelle Nicole, who was part of the DEA witness protection program. The book Ultimate Sacrifice, by Lamar Waldron and Thom Hartmann, attempted to synthesize these theories with new evidence. The authors argued that government officials felt obliged to help the assassins cover up the truth because the assassination conspiracy had direct ties to American government plots to assassinate Castro. Outraged at Robert Kennedy's attack on organized crime, mob leaders had President Kennedy killed to remove Robert from power. A government investigation of the plot was thwarted, the authors allege, because it would have revealed embarrassing evidence of American government involvement with organized crime in plots to kill Castro. Lyndon B. Johnson conspiracy A 2003 Gallup poll indicated that nearly 20% of Americans suspected Lyndon B. Johnson of being involved in the assassination of Kennedy. Critics of the Warren Commission have accused Johnson of plotting the assassination because he "disliked" the Kennedys and feared that he would be dropped from the Democratic ticket for the 1964 election. According to journalist Max Holland, the first published allegation that Johnson perpetrated the assassination of Kennedy appeared in Penn Jones, Jr.'s book Forgive My Grief, self-published in May 1966. In the book, Jones provided excerpts of a letter purported to have been authored by Jack Ruby charging LBJ with the murder of the President. With his 1968 book, The Dark Side of Lyndon Baines Johnson, Joachim Joesten is credited by Bugliosi as being the first conspiracy author to accuse Johnson of having a role in the assassination. According to Joesten, Johnson "played the leading part" in a conspiracy that involved "the Dallas oligarchy and ... local branches of the CIA, the FBI, and the Secret Service". Others who have indicated there was complicity on the part of Johnson include Jim Marrs, Ralph D. Thomas, J. Gary Shaw, Larry Harris, Walt Brown, Noel Twyman, Barr McClellan, Craig Zirbel, Phillip F. Nelson, and Madeleine Brown. The fact that JFK was seriously considering dropping Johnson from the ticket in favor of North Carolina Governor Terry Sanford should Kennedy run in 1964 has been cited as a possible motive for Johnson's complicity in the assassination. In 1968, Kennedy's personal secretary Evelyn Lincoln wrote in her book, Kennedy and Johnson, that President Kennedy had told her that Lyndon B. Johnson would be replaced as Vice President of the United States. That conversation took place on November 19, 1963, just three days before the assassination of President Kennedy and was recorded that evening in her diary and reads as follows: "As Mr. Kennedy sat in the rocker in my office, his head resting on its back he placed his left leg across his right knee. He rocked slightly as he talked. In a slow pensive voice he said to me, 'You know if I am re-elected in sixty-four, I am going to spend more and more time toward making government service an honorable career. I would like to tailor the executive and legislative branches of government so that they can keep up with the tremendous strides and progress being made in other fields.' 'I am going to advocate changing some of the outmoded rules and regulations in the Congress, such as the seniority rule. To do this I will need as a running mate in sixty-four a man who believes as I do.' Mrs. Lincoln went on to write 'I was fascinated by this conversation and wrote it down verbatim in my diary. Now I asked, 'Who is your choice as a running-mate?' 'He looked straight ahead, and without hesitating he replied, 'at this time I am thinking about Governor Terry Sanford of North Carolina. But it will not be Lyndon.'" In 2003, researcher Barr McClellan published the book Blood, Money & Power. McClellan claims that Johnson, motivated by the fear of being dropped from the Kennedy ticket in 1964 and the need to cover up various scandals, masterminded Kennedy's assassination with the help of his friend, attorney Edward A. Clark. The book suggests that a smudged partial fingerprint from the sniper's nest likely belonged to Johnson's associate Malcolm "Mac" Wallace, and that Mac Wallace was, therefore, on the sixth floor of the Depository at the time of the shooting. The book further claims that the killing of Kennedy was paid for by oil magnates, including Clint Murchison and H. L. Hunt. McClellan states that the assassination of Kennedy allowed the oil depletion allowance to be kept at 27.5 percent. It remained unchanged during the Johnson presidency. According to McClellan, this resulted in a saving of over $100 million to the American oil industry. McClellan's book subsequently became the subject of an episode of Nigel Turner's ongoing documentary television series, The Men Who Killed Kennedy. The episode, "The Guilty Men", drew angry condemnation from the Johnson family, Johnson's former aides, and former Presidents Gerald Ford (who was a member of the Warren Commission ) and Jimmy Carter following its airing on The History Channel. The History Channel assembled a committee of historians who concluded the accusations in the documentary were without merit, and The History Channel apologized to the Johnson family and agreed not to air the series in the future. Madeleine Brown, who alleged she was the mistress of Johnson, also implicated him in a conspiracy to kill Kennedy. In 1997, Brown said that Johnson, along with H. L. Hunt, had begun planning Kennedy's demise as early as 1960. Brown claimed that by its fruition in 1963, the conspiracy involved dozens of persons, including the leadership of the FBI and the Mafia, as well as prominent politicians and journalists. In the documentary The Men Who Killed Kennedy, Madeleine Brown and May Newman, an employee of Texas oilman Clint Murchison, both placed FBI Director J. Edgar Hoover at a social gathering at Murchison's mansion the night before the assassination. Also in attendance, according to Brown, were John McCloy, Richard Nixon, George Brown, R. L. Thornton, and H. L. Hunt. Madeleine Brown claimed that Johnson arrived at the gathering late in the evening and, in a "grating whisper", told her that the "... Kennedys will never embarrass me again – that's no threat – that's a promise." Brown said that on New Year's Eve 1963, she met Johnson at the Driskill Hotel in Austin, Texas, and that he confirmed the conspiracy to kill Kennedy, insisting that "the fat cats of Texas and [U.S.] intelligence" had been responsible. Brown reiterated her allegations against Johnson in the 2006 documentary Evidence of Revision. In the same documentary, several other Johnson associates also voiced their suspicions of Johnson. Dr. Charles Crenshaw authored the 1992 book JFK: Conspiracy of Silence, along with conspiracy theorists Jens Hansen and J. Gary Shaw. Crenshaw was a third-year surgical resident on the trauma team at Parkland Hospital that attended to President Kennedy. He also treated Oswald after he was shot by Jack Ruby. While attending to Oswald, Crenshaw said that he answered a telephone call from Lyndon Johnson. Crenshaw said that Johnson inquired about Oswald's status, and that Johnson demanded a "death-bed confession from the accused assassin [Oswald]". Crenshaw said that he relayed Johnson's message to Dr. Shires, but that Oswald was in no condition to give any statement. Critics of Crenshaw's allegation state that Johnson was in his limousine at the moment the call would have been made, that no one in his car corroborated that the call was made, and that there is no record of such a call being routed through the White House switchboard. Former CIA agent and Watergate figure E. Howard Hunt accused Johnson, along with several CIA agents whom he named, of complicity in the assassination in his posthumously released autobiography American Spy: My Secret History in the CIA, Watergate, and Beyond. Referencing that section of the book, Tim Weiner of The New York Times called into question the sincerity of the charges, and William F. Buckley, Jr., who wrote the foreword, said material "was clearly ghostwritten". Shortly afterwards, an audio-taped "deathbed confession" in which Hunt claimed first-hand knowledge of a conspiracy, as a co-conspirator, was released by his sons; the authenticity of the confession was also met with some skepticism. In 1984, convicted swindler Billie Sol Estes made statements to a Grand Jury in Texas indicating that he had "inside knowledge" that implicated Johnson in the death of Kennedy and others. Historian Michael L. Kurtz wrote that there is no evidence suggesting that Johnson ordered the assassination of Kennedy. According to Kurtz, Johnson believed Fidel Castro was responsible for the assassination and that Johnson covered up the truth because he feared the possibility that retaliatory measures against Cuba might escalate to nuclear war with the Soviet Union. In 2012, biographer Robert Caro published his fourth volume on Johnson's career, The Passage of Power, which chronicles Johnson's communications and actions as Vice President, and describes the events leading up to the assassination. Caro wrote that "nothing that I have found in my research" points to involvement by Johnson. Political consultant and convicted felon Roger Stone believes that Johnson orchestrated Kennedy's assassination. He also claims that Rafael Cruz, father of Texas Senator and Republican presidential candidate for the 2016 elections Ted Cruz, is tied to Lee Harvey Oswald. George H. W. Bush conspiracy Some critics of the official findings theorize that George H. W. Bush was involved in the assassination as a CIA operative in Dealey Plaza. In the book Plausible Denial: Was the CIA Involved in the Assassination of JFK?, American attorney Mark Lane suggests that Bush worked out of a Houston office as a CIA agent at the time of the assassination. In the book Family of Secrets, Russ Baker contends that Bush became an intelligence agent in his teenage years and was later at the center of a plot to assassinate Kennedy that included his father, Prescott Bush, Vice President Lyndon B. Johnson, CIA Director Allen Dulles, Cuban and Russian exiles and emigrants, and various Texas oilmen. According to Baker, Bush was in Dallas on the night before and morning of the assassination. On November 29, 1963, exactly one week after the assassination, an employee of the FBI wrote in a memo that "Mr. George Bush of the Central Intelligence Agency" was given a briefing on the reaction to the assassination by Cuban exiles living in Miami. Joseph McBride speculated that the "George Bush" cited in the memo was the future U.S. president, George H. W. Bush, who was appointed head of the CIA by president Gerald Ford in 1976, 13 years after the assassination. During Bush's presidential campaign in 1988, the memo resurfaced, prompting the CIA to claim that the memo was referring to an employee named George William Bush. George William Bush disputed this suggestion, declaring under oath that "I am not the George Bush of the Central Intelligence Agency referred to in the memorandum." In 1998, the ARRB instructed the CIA to review its personnel files of former President Bush and to provide a definitive statement as to whether he was the person referred to in the memo. The CIA responded that it had no record of any association with former President Bush during the 1963 time period. On the website JFK Facts, author Jefferson Morley writes that any communication by Bush with the FBI or CIA in November 1963 does not necessarily demonstrate culpability in the assassination, and that it is unclear whether Bush had any affiliation with the CIA prior to his appointment to head the agency in 1976. Cuban government conspiracy In its report, the Warren Commission stated that it had investigated "dozens of allegations of a conspiratorial contact between Oswald and agents of the Cuban Government" and had found no evidence of Cuban involvement in the assassination of President Kennedy. The House Select Committee on Assassinations also wrote: "The committee believes, on the basis of the evidence available to it, that the Cuban Government was not involved in the assassination of President Kennedy". Some conspiracy theorists continue to allege that Fidel Castro ordered the assassination of Kennedy in retaliation for the CIA's previous attempts to assassinate him. In the early 1960s, Clare Boothe Luce, wife of Time-Life publisher Henry Luce, was one of a number of prominent Americans who sponsored anti-Castro groups. This support included funding exiles in commando speedboat raids against Cuba. In 1975, Clare Luce said that on the night of the assassination, she received a call from a member of a commando group she had sponsored. According to Luce, the caller's name was "something like" Julio Fernandez and he claimed he was calling her from New Orleans. According to Luce, Fernandez told her that Oswald had approached his group with an offer to help assassinate Castro. Fernandez further claimed that he and his associates eventually found out that Oswald was a communist and supporter of Castro. He said that with this new-found knowledge, his group kept a close watch on Oswald until Oswald suddenly came into money and went to Mexico City and then Dallas. According to Luce, Fernandez told her, "There is a Cuban Communist assassination team at large and Oswald was their hired gun." Luce said that she told the caller to give his information to the FBI. Luce revealed the details of the incident to both the Church Committee and the HSCA. Both committees investigated the incident, but were unable to uncover any evidence to corroborate the allegations. In May 1967, CIA Director Richard Helms told President Lyndon Johnson that the CIA had tried to assassinate Castro. Helms further stated that the CIA had employed members of the Mafia in this effort, and "... that CIA plots to assassinate Fidel Castro dated back to August of 1960 – to the Eisenhower Administration." Helms said that the plots against Castro continued into the Kennedy Administration and that Attorney General Robert Kennedy had known about both the plots and the Mafia's involvement. On separate occasions, Johnson told two prominent television newsmen that he believed that JFK's assassination had been organized by Castro as retaliation for the CIA's efforts to kill Castro. In October 1968, Johnson told veteran newsman Howard K. Smith of ABC that "Kennedy was trying to get to Castro, but Castro got to him first." In September 1969, in an interview with Walter Cronkite of CBS, Johnson said in regard to the assassination, "[I could not] honestly say that I've ever been completely relieved of the fact that there might have been international connections", and referenced unnamed "others". Finally, in 1971, Johnson told his former speechwriter Leo Janos of Time magazine that he "never believed that Oswald acted alone". In 1977, Castro was interviewed by newsman Bill Moyers. Castro denied any involvement in Kennedy's death, saying: "It would have been absolute insanity by Cuba. ... It would have been a provocation. Needless to say, it would have been to run the risk that our country would have been destroyed by the United States. Nobody who's not insane could have thought about [killing Kennedy in retaliation]." When Castro was interviewed later in 2013 by Atlantic editor, Jeffrey Goldberg, Castro said: "There were people in the American government who thought Kennedy was a traitor because he didn't invade Cuba when he had the chance, when they were asking him. He was never forgiven for that." Soviet government conspiracy The Warren Commission reported that they found no evidence that the Soviet Union was involved in the assassination of President Kennedy. The House Select Committee on Assassinations also wrote: "The committee believes, on the basis of the evidence available to it, that the Soviet Government was not involved in the assassination of President Kennedy". According to some conspiracy theorists, the Soviet Union, under the leadership of Nikita Khrushchev, was responsible for the assassination, motivated by the humiliation of having to back down during the Cuban Missile Crisis. According to a 1966 FBI document, Colonel Boris Ivanov – chief of the KGB Residency in New York City at the time of the assassination – stated that it was his personal opinion that the assassination had been planned by an organized group, rather than a lone individual. The same document stated, "... officials of the Communist Party of the Soviet Union believed there was some well-organized conspiracy on the part of the 'ultraright' in the United States to effect a 'coup.'" Much later, the high-ranking Soviet Bloc intelligence defector, Lt. Gen. Ion Mihai Pacepa, said that he had a conversation with Nicolae Ceauşescu who told him about "ten international leaders the Kremlin killed or tried to kill", including Kennedy. He claimed that "among the leaders of Moscow's satellite intelligence services there was unanimous agreement that the KGB had been involved in the assassination of President Kennedy." Pacepa later released a book, Programmed to Kill: Lee Harvey Oswald, the Soviet KGB, and the Kennedy Assassination, in 2007. Similar views on the JFK assassination were expressed by Robert Holmes, former First Secretary at the British Embassy in Moscow, in his 2012 book Spy Like No Other. Decoy hearse and wound alteration David Lifton presented a scenario in which conspirators on Air Force One removed Kennedy's body from its original bronze casket and placed it in a shipping casket, while en route from Dallas to Washington. Once the presidential plane arrived at Andrews Air Force Base, the shipping casket with the President's body in it was surreptitiously taken by helicopter from the side of the plane that was out of the television camera's view. Kennedy's body was then taken to an unknown location – most likely Walter Reed Army Medical Center – to surgically alter the body to make it appear that he was shot only from the rear. Part of Lifton's theory comes from a House Select Committee on Assassinations report of an interview of Lt. Richard Lipsey on January 18, 1978, by committee staff members Donald Purdy and Mark Flanagan. According to the report, Lt. Richard Lipsey said that he and General Wehle had met President Kennedy's body at Andrews Air Force Base. Lipsey "... placed [the casket] in a hearse to be transported to Bethesda Naval Hospital. Lipsey mentioned that he and Wehle then flew by helicopter to Bethesda and took [the body of] JFK into the back of Bethesda." Lipsey said that "a decoy hearse had been driven to the front [of Bethesda]". With Lipsey's mention of a "decoy hearse" at Bethesda, Lifton theorized that the casket removed by Lipsey from Air Force One – from the side of the plane exposed to television – was probably also a decoy and was likely empty. Laboratory technologist Paul O'Connor was one of the major witnesses supporting another part of David Lifton's theory that somewhere between Parkland and Bethesda the President's body was made to appear as if it had been shot only from the rear. O'Connor said that President Kennedy's body arrived at Bethesda inside a body bag in "a cheap, shipping-type of casket", which differed from the description of the ornamental bronze casket and sheet that the body had been wrapped in at Parkland Hospital. O'Connor said that the brain had already been removed by the time it got to Bethesda, and that there were "just little pieces" of brain matter left inside the skull. Researcher David R. Wrone dismissed the theory that Kennedy's body was surreptitiously removed from the presidential plane, stating that as is done with all cargo on airplanes for safety precautions, the coffin and lid were held by steel wrapping cables to prevent shifting during takeoff and landing and in case of air disturbances in flight. According to Wrone, the side of the plane away from the television camera "was bathed in klieg lights, and thousands of persons watched along the fence that bent backward along that side, providing, in effect, a well-lit and very public stage for any would-be body snatchers". Federal Reserve conspiracy Jim Marrs, in his book Crossfire, presented the theory that Kennedy was trying to rein in the power of the Federal Reserve, and that forces opposed to such action might have played at least some part in the assassination. According to Marrs, the issuance of Executive Order 11110 was an effort by Kennedy to transfer power from the Federal Reserve to the United States Department of the Treasury by replacing Federal Reserve Notes with silver certificates. Actor and author Richard Belzer named the responsible parties in this theory as American "billionaires, power brokers, and bankers ... working in tandem with the CIA and other sympathetic agents of the government". A 2010 article in Research magazine discussing various controversies surrounding the Federal Reserve stated that "the wildest accusation against the Fed is that it was involved in Kennedy's assassination." Critics of the theory note that Kennedy called for and signed legislation phasing out Silver Certificates in favor of Federal Reserve Notes, thereby enhancing the power of the Federal Reserve; and that Executive Order 11110 was a technicality that only delegated existing presidential powers to the Secretary of the Treasury for administrative convenience during a period of transition. Israeli government conspiracy Immediately following Kennedy's death, speculation that he was assassinated by a "Zionist conspiracy" was prevalent in much of the Muslim world. Among these views were that Zionists were motivated to kill Kennedy due to his opposition to an Israeli nuclear program, that Lyndon B. Johnson received orders from Zionists to have Kennedy killed, and that the assassin was a Zionist agent. According to Michael Collins Piper in Final Judgment: The Missing Link in the JFK Assassination Controversy, Israeli Prime Minister David Ben-Gurion orchestrated the assassination after learning that Kennedy planned to keep Israel from obtaining nuclear weapons. Piper said that the assassination "was a joint enterprise conducted on the highest levels of the American CIA, in collaboration with organized crime – and most specifically, with direct and profound involvement by the Israeli intelligence service, the Mossad." The theory alleges involvement of Meyer Lansky and the Anti-Defamation League. In 2004, Mordechai Vanunu stated that the assassination was Israel's response to "pressure [Kennedy] exerted on ... Ben-Gurion, to shed light on Dimona's nuclear reactor in Israel". In a speech before the United Nations General Assembly in 2009, Libyan leader Muammar Gaddafi also alleged that Kennedy was killed for wanting to investigate Dimona. Other published theories * Reasonable Doubt (1985) by Henry Hurt, who writes about his Warren Commission doubts. Hurt pins the plot on professional crook Robert Easterling, along with Texas oilmen and the supposed Ferrie/Shaw alliance. ISBN 0-03-004059-0. * Behold a Pale Horse (1991) by William Cooper alleges that Kennedy was shot by the presidential limousine's driver, Secret Service agent William Greer. In the Zapruder film, Greer can be seen turning to his right and looking backwards, just before speeding away from Dealey Plaza. This theory has come under severe criticism from others in the research community. ISBN 0-929385-22-5. * Former Secret Service agent Abraham Bolden's The Echo from Dealey Plaza (2008) (ISBN 978-0-307-38201-6) and Kevin James Shay's Death of the Rising Sun (2017) (ISBN 978-1-881-36556-3) detail plots that occurred shortly before Kennedy's trip to Dallas in 1963, in Chicago and Florida. Within the Secret Service during those chaotic months, "rumors were flying" about Cuban dissidents and right-wing southerners who were stalking Kennedy for a chance to kill him, Bolden wrote. The security threat in Chicago on November 2, 1963, involved former Marine Thomas Arthur Vallee, who was arrested after police found two M-1 rifles, a handgun, and 2,500 rounds of ammunition in his apartment. A high-powered rifle was confiscated from another suspected conspirator in Chicago shortly before Kennedy's trip there was canceled, Bolden said. Authorities also cited similar threats in Kennedy's Tampa, Fla., and Miami visits on November 18. * Mark North's Act of Treason: The Role of J. Edgar Hoover in the Assassination of President Kennedy, (1991) implicates the FBI Director. North documents that Hoover was aware of threats against Kennedy by organized crime before 1963, and suggests that he failed to take proper action to prevent the assassination. North also charges Hoover with failure to work adequately to uncover the truth behind Kennedy's murder, ISBN 0-88184-877-8. * Mortal Error: The Shot That Killed JFK (1992) by Bonar Menninger (ISBN 0-312-08074-3) alleges that while Oswald did attempt to assassinate JFK and did succeed in wounding him, the fatal shot was accidentally fired by Secret Service agent George Hickey, who was riding in the Secret Service follow-up car directly behind the presidential limousine. The theory alleges that after the first two shots were fired the motorcade sped up while Hickey was attempting to respond to Oswald's shots and he lost his balance and accidentally pulled the trigger of his AR-15 and the shot fatally hit JFK. Hickey's testimony says otherwise: "At the end of the last report (shot) I reached to the bottom of the car and picked up the AR 15 rifle, cocked and loaded it, and turned to the rear." (italics added). George Hickey sued Menninger in April 1995 for what he had written in Mortal Error. The case was dismissed as its statute of limitations had run out. The theory received public attention in 2013 when it was supported by Colin McLaren's book and documentary titled JFK: The Smoking Gun (ISBN 978-0-7336-3044-6). No Secret Service agent fired a weapon that day. * Who Shot JFK? : A Guide to the Major Conspiracy Theories (1993) by Bob Callahan and Mark Zingarelli explores some of the more obscure theories regarding JFK's murder, such as "The Coca-Cola Theory". According to this theory, suggested by the editor of an organic gardening magazine, Oswald killed JFK due to mental impairment stemming from an addiction to refined sugar, as evidenced by his need for his favorite beverage immediately after the assassination. ISBN 0-671-79494-9. * Passport to Assassination (1993) by Oleg M. Nechiporenko, the Soviet consular official (and highly placed KGB officer) who met with Oswald in Mexico City in 1963. He was afforded the unique opportunity to interview Oswald about his goals including his genuine desire for a Cuban visa. His conclusions were: (1) that Oswald killed Kennedy due to extreme feelings of inadequacy versus his wife's professed admiration for JFK, and (2) that the KGB never sought intelligence information from Oswald during his time in the USSR as they did not trust his motivations. ISBN 1-55972-210-X. * Norman Mailer's Oswald's Tale: An American Mystery (1995) concludes that Oswald was guilty, but holds that the evidence may point to a second gunman on the grassy knoll, who, purely by coincidence, was attempting to kill JFK at the same time as Oswald. "If there was indeed another shot, it was not necessarily fired by a conspirator of Oswald's. Such a gun could have belonged to another lone killer or to a conspirator working for some other group altogether." ISBN 0-679-42535-7. * David Wrone's The Zapruder Film (2003) concludes that JFK's head wound and his throat and back wounds were caused by in-and-through shots originating from the grassy knoll. Three shots were fired from three different angles, none of them from the sixth floor window of the Texas School Book Depository. Wrone is a professor of history (emeritus) at the University of Wisconsin–Stevens Point. ISBN 0-7006-1291-2. * The Gemstone File: A Memoir (2006), by Stephanie Caruana, posits that Oswald was part of a 28-man assassination team that included three U.S. Mafia hitmen (Jimmy Fratianno, John Roselli, and Eugene Brading). Oswald's role was to shoot John Connally. Bruce Roberts, author of the Gemstone File papers, claimed that the JFK assassination scenario was modeled after a supposed attempted assassination of President F.D. Roosevelt. Roosevelt was riding in an open car with Mayor Anton Cermak of Chicago. Cermak was shot and killed by Giuseppe Zangara. In Dallas, JFK was the real target, and Connally was a secondary target. The JFK assassination is only a small part of the Gemstone File's account. ISBN 1-4120-6137-7. * In "Allegations of PFC Eugene Dinkin", the Mary Farrell Foundation summarizes and archives documents related to Private First Class Eugene B. Dinkin, a cryptographic code operator stationed in Metz, France, who went AWOL in early November 1963, entered Switzerland using a false ID, and visited the United Nations' press office and declared that officials in the U.S. government were planning to assassinate President Kennedy, adding that "something" might happen to the Commander in Chief in Texas. Dinkin was arrested nine days before Kennedy was killed, placed in psychiatric care (deemed a mad man?), and released shortly thereafter. His allegations eventually made their way to the Warren Commission, but according to the Ferrell Foundation account, the Commission "took no interest in the matter, and indeed omitted any mention of Dinkin from its purportedly encyclopedic 26 volumes of evidence." * Described by the Associated Press as "one of the strangest theories", Hugh McDonald's Appointment in Dallas stated that the Soviet government contracted with a rogue CIA agent named "Saul" to have Kennedy killed. McDonald said he worked for the CIA "on assignment for $100 a day" and met "Saul" at the Agency's headquarters after the Bay of Pigs Invasion. According to McDonald, his CIA mentor told him that "Saul" was the world's best assassin. McDonald stated that after the assassination, he recognized the man's photo in the Warren Commission report and eventually tracked him to a London hotel in 1972. McDonald stated that "Saul" assumed he, too, was a CIA agent and confided to him that he shot Kennedy from a building on the other side of the street from the Texas School Book Depository. * Judyth Vary Baker claims that during the summer of 1963, she had an adulterous affair with Oswald in New Orleans while working with him on a CIA bioweapons project to kill Fidel Castro. According to John McAdams, Baker presents a "classic case of pushing the limits of plausibility too far". * Returning from the funeral of President Kennedy, Charles De Gaulle, the president of France, told his confidant Alain Peyrefitte that the Dallas police were linked to far-right segregationist "ultras" in the Ku Klux Klan, and that the far-right John Birch Society manipulated Oswald and used Jack Ruby to silence him. * A Woman I Know: Female Spies, Double Identities, and a New Story of the Kennedy Assassination (2023) by Mary Haverstick, identifies and interviews the real-life retired (female) pilot Jerrie Cobb, who died in 2019, and suggests that she either was the same person as, or impersonated June Cobb (d. 2015), a known CIA operative who may have been part of the team that attempted to assassinate Fidel Castro. She provides statements to the effect that Cobb (apparently as "June") piloted a small twin-engined plane to the Redbird private airport (now Dallas Executive Airport) in Dallas, where it remained with engines running during the assassination of the president, purportedly to assist in spiriting away Lee Harvey Oswald, and may also herself have been involved in the assassination as a second shooter in the vicinity of the presidential limousine; her conclusion, which has received mixed responses from reviewers, is that Oswald was "set up" to conduct the assassination by a clandestine team within the CIA including William King Harvey and Arnold M. Silver.
WIKI
Raised in South Central, Joe Ide Expands the Territory of L.A. Noir Profile LOS ANGELES — The crime writer Joe Ide sat in a car at the corner of San Pedro and Adams in South Central Los Angeles and memories of his boyhood returned — mostly in the form of characters. “The winos used to sit out there on orange crates and drink Thunderbird all day,” he said, pointing at the graffiti streaked storefront of what is now a pupuseria. There was one “wino,” tall, immaculate and dapper in a homburg hat “with a little feather in it,” who used to escort Mr. Ide’s mother onto the bus everyday, like a butler. This desolate collection of liquor stores, auto shops and taco places offers up a lot of ghosts for Mr. Ide. Stories poured out and he began sounding like the narrator of an Elmore Leonard novel. “There was a pool hall right up here,” Mr. Ide said. “Sam’s pool hall. And my older brother Jack he shot pool but it was too scary for me. It was one of those places where everyone is on parole and the hookers show you their bullet wounds. Yeah, there was a hooker out here who would actually show you her bullet wound.” The compact 60-year-old with a trim, salt-and-pepper goatee and sleek silver glasses, staring out from behind the wheel of a gray VW station wagon, seems an unlikely maven of these corners and their seedy histories, of their hustlers and drunks, of the territories of various warring gangs. But this is where Mr. Ide (pronounced EE-day) came of age in the 1960s and ’70s, in the years following the Watts riots, in a neighborhood overwhelmingly black and poor. His grandparents, who had bought a rickety wood-frame house here during the Depression, were themselves too poor to leave once all the other Japanese families moved away. Growing up, Mr. Ide lived in two worlds: At home, his stern grandfather collected samurai swords and spoke no English; outside he had mostly black friends. He was never completely at ease in either place, but the experience taught him how to decipher people and how to blend in. He didn’t even blink when I asked whether he hesitated to write books about almost exclusively black characters. “Never occurred to me,” he said. “I wanted to be black, but I knew I wasn’t,” Mr. Ide said. “I always felt something of an outsider. I wasn’t black. I wasn’t white. I was way far from being Japanese. So I was a lot on the fringe. And I was a watcher. I would listen to people. Listen to the way they talk and imagine what was going on in their heads.” This outsider sensibility combined with a deep knowledge of those South Central streets helped Mr. Ide many decades later when he sat down to write his first novel, about a cerebral private investigator who solves crimes in a community just like the one where he grew up. That first book, “IQ,” was published in 2016, praised and given awards not just for its Leonard-like fun with dialogue and character, but also because he was placing a Los Angeles crime story in a part of the city usually ignored by the genre. In her review for The New York Times, Janet Maslin called Mr. Ide “the best thing to happen to mystery writing in a long time.” His growing fan base includes the retired professional basketball player Kareem Abdul-Jabbar and the dean of Los Angeles crime writing Michael Connelly, who told me that he found Mr. Ide “completely refreshing,” a writer who “takes it up a notch,” because “he’s reflecting on how difficult this place can be to grow up in and survive when you live south of the 10 Freeway.” The third entry in the series, “Wrecked,” comes out Oct. 9. Mr. Ide was in his mid-50s when he decided to draw on that rough world of his youth and meld it with his childhood obsession with Arthur Conan Doyle’s Sherlock Holmes stories. About Sherlock, Mr. Ide said: “I identified with him. He’s a loner. What was most powerful was that just by virtue of his intelligence, he could face this world and not be afraid.” While Mr. Ide’s brother coped with his surroundings by joining a local gang, the Outlaws, and becoming a drug dealer, Mr. Ide himself looked to quiet, watchful Sherlock as his hero. The detective he created, Isaiah Quintabe, the IQ of the books, has incredible powers of deductive reasoning and hyper awareness, much like Sherlock. “He could scan a room, a city block, or a crowd of faces the way a peregrine could fly over a vast, brushy landscape and find that silhouette, that twitch, that shadow, that gleam of an eye, and spot the tiny ground squirrel that was the same color as the rocks it was hiding between,” Mr. Ide writes. Isaiah lives in East Long Beach (birthplace of Snoop Dogg and demographically similar to the South Central of Mr. Ide’s youth). He is a fastidious, aloof man who keeps spotless the polished cement floors of his house and always wears the same uniform: light blue button-down shirt, jeans and Timberland boots. After the death of his older brother in a hit-and-run accident (or was it?), Isaiah begins solving small local crimes — tracking down runaway children, confronting high school bullies, retrieving burgled heirlooms like old Miss Myra’s brooch — and accepting payment in the form of “a sweet potato pie or cleaning his yard or one brand new radial tire.” He soon acquires his very own Watson, Juanell Dodson, a bumbling former gangbanger and con man who is the funny to Isaiah’s heavy. As the books progress the stakes become more dangerous and the two are taken into worlds beyond the chain-link fences and dried-out lawns of the neighborhood. There are Chinese gangs and malicious pit bull breeders, scheming hip-hop producers and, in his new book, a group of corrupt former soldiers with a history of torturing detainees at Abu Ghraib. In addition to Sherlock Holmes, Mr. Ide imagines Isaiah to be like Steve McQueen in “Bullitt” or Sidney Poitier in “The Heat of the Night”: cool and competent. It’s not coincidental that his references are from films. Mr. Ide’s most recent career — there were a few — was as a screenwriter. After college he got a master’s degree in education with the intention of becoming a teacher but soon discovered, after one semester, that children annoyed him (“They were so fussy, always asking me questions”). He then spent years working odd jobs before beginning to write films. After what he says were “a dozen lousy screenplays,” he finally sold one to Disney and started working. But none of his films, all fairly formulaic he says now, ever came close to being greenlighted. In his early 50s he woke up one day and felt physically repulsed from turning on the screenwriting software. “There was so much failure associated with it,” Mr. Ide said. He fell into a depression that lasted a couple of years and only lifted when he began working on the IQ series, which he found liberating, as if he was finally telling stories that felt authentic to him and his life. It took three years to write the first book, but with no connections in the publishing world he wasn’t sure how to sell it. Mr. Ide did have one critical contact though, a first cousin he barely knew: Francis Fukuyama, the political scientist and author of several books, including “The End of History and the Last Man.” Mr. Ide remembered him mostly as a little boy who came to visit South Central decades ago wearing short pants and suspenders (“Oh yeah, he was fresh meat”). He had little hope his intellectual cousin would connect with a crime novel. But, in an email to me, Mr. Fukuyama wrote that once he received the book, he “couldn’t put it down.” Mr. Fukuyama’s agent read the manuscript in a weekend and committed right away to representing Mr. Ide, selling the television rights before the book was even in print. Back in the old neighborhood where Mr. Ide said most of the friends he grew up with ended up either dead or in jail, the streets were empty underneath the everyday blue of an Angeleno sky. He doesn’t visit here so much any more. Mr. Ide lives in Santa Monica now. But the talk and the curious situations from long ago aren’t far from his mind. As he tells it, they almost predestined him to tell these stories: “You meet people like that you almost have to write a book.”
NEWS-MULTISOURCE
New England Collegiate Conference (Division II) The New England Collegiate Conference (NECC) was an NCAA Division II college athletic conference based in the Northeastern United States that dissolved during the late 1990s after most of its members either moved to Division I or joined Division II leagues such as the Northeast-10 Conference or the New York Collegiate Athletic Conference, now known as the East Coast Conference. The conference was founded in 1981 as the New England College Basketball League, and eventually expanded to sponsor eleven sports: men's and women's soccer, men's and women's volleyball, men's and women's cross country, men's and women's tennis, men's and women's basketball, baseball and softball. Final members * Notes: Other members * Notes: Notable alumni * Bill Bayno, Sacred Heart, Former UNLV head men's basketball coach * Manute Bol, Bridgeport, NBA center with Washington Bullets, Golden State Warriors, and Philadelphia 76ers * Joe Nathan, Stony Brook, Major League Baseball pitcher with San Francisco Giants, Minnesota Twins, and Texas Rangers * Mike Petke, Southern Connecticut, MLS soccer player with Colorado Rapids, New York/New Jersey Metrostars and D.C. United
WIKI
Talk:Pre-caudal gland This page is redundant, and partially incorrect. Please see the page for "Violet gland". Furthermore the one reference given is unverifiable, it has no basis in science or systematic knowledge. Advice: remove it.--Richard Hawkins (talk) 11:50, 8 December 2008 (UTC) I agree. This is clearly the same gland as the violet supracaudal gland. The two pages should be merged unless someone can give a compelling reason. <IP_ADDRESS> (talk) 08:16, 13 January 2012 (UTC)
WIKI
User:Holymoney/sandbox/About Yakubu Ibrahim Hi Guy i am a secondary school graduate who will like to be an upcoming artist by the grace of God
WIKI
Telltale Signs Of Mental Health Issue As people age, they become more susceptible to diseases and disabilities. And so at the onset of the pandemic, it isn’t surprising that experts were quick to highlight how the elderly were the most vulnerable to severe illness from contracting COVID-19. Above all, it’s important to note that seniors’ physical health isn’t the only thing at risk in today’s health crisis. Loneliness, which can be amplified by social isolation, is an independent risk factor for depression, anxiety disorder, and suicide among seniors. This highlights the need for us to pay more attention to the mental wellbeing of our elderly loved ones. For Instance, here are some of the telltale signs of mental health issues among seniors to watch out for: Appetite changes Mental health issues are just as physiological as they are psychological. Sometimes these problems can manifest through physical sensations such as nausea, tense muscles, or a knot in the stomach. All these can make it harder for some to feel hunger or fullness, resulting in sudden appetite changes. Seniors suffering from mental health problems may start binging on certain food items and lose interest in the nutritional value of what they eat — regardless of the diet restrictions they may have. They may also start avoiding eating all together, especially when they find themselves so consumed by stress or anxiety.  Social withdrawal More often than not, mentally unwell older adults socially withdraw. They lose interest in the activities that they used to enjoy and slowly ease out of social activities. One of the reasons behind this is that mood disorders like depression can make it difficult to enjoy or feel fulfilled by most things. Moreover, mental health issues can also be physically and mentally draining, making even the most enjoyable activity taxing.  Memory issues Contrary to popular belief, memory issues are not a normal part of the aging process. In reality, they can be early warning signs of mental illnesses such as Alzheimer’s and dementia in older people. While Alzheimer’s is a progressive disorder that slowly destroys memory and thinking skills, dementia encompasses all the symptoms of cognitive decline. Usually, seniors who have memory problems fail to recognize people they used to know, misplace their belongings often, and repeatedly ask the same question in a short period of time.  Personal care changes While seniors are often encouraged to try new things that can keep them excited. And unexpected changes in overall appearance and style can be indicative of a mental health crisis. Older individuals battling mental health issues may sometimes find it inexplicably tiring to successfully adhere to their former routines. They may begin neglecting personal hygiene by forgoing bathing, shaving, and even changing clothes. In other words, worrying personal care changes can also go the other way around. But for instance, seniors dealing with mental health problems may start excessively caring about how they look and/or smell, much more than they typically do.  What can you do? Knowing the telltale signs is the first step in delivering the best care for elderly loved ones who might be suffering from mental health issues. The next step would be to determine the right treatments and interventions that can make your loved one’s golden years much better. Aside from seeking help from geriatric psychiatrists, it would also be a good idea to try reaching out to a geriatric nurse. As one of the most crucial careers in the nursing field at the moment, geriatric nurses are equipped to deal with mental health issues among the elderly, and can provide the patient-focused and empathetic expertise your loved one might need. You can also look for a therapist specializing in elderly mental health in your area, or one who can offer online sessions. Now, more than ever before, seniors require all the attention and care they could possibly get. If you have a senior loved one in your life. What you can do is check in regularly, stay alert, and look into the different ways. For more tips and insightful articles, do check out our blog. By: Rhiya Jasleen
ESSENTIALAI-STEM
Indonesian/Conjugation Pembentukan Kata (Word Forming) In Indonesian, you can form a new word from an existing word. For example, in English, you form the word organize from the word organ. Further, you can add -ization suffix on it and thus organization. This example pretty much illustrates how Indonesian words are formed. Certainly, this formation is not necessarily the same and it's far richer than that. You'll learn shortly why. The word formation is very attached to Indonesian / Malay culture. Some of the formations may not make sense to the westerners. However, with some stretch of imagination, you should be able to cope with it. Many Asian language speakers, on the other hand, will find it very intuitive and much more structured than, say, Chinese. Using these formations, you just need to memorize one type of word (either the noun form, the verb form, or the adjective form). You can then nounize the verb or verbize the noun or form other interesting words. In a sense, the word formation is the irregular side of Indonesian since you must know which word works with which affixes. This can be confusing for beginners. However, even if you use the incorrect affixes, as long as it doesn't lead to preexisting meaning, sympathetic speakers would understand. Susunan Aktif / Pasif (Active / Passive Formation) * Awalan me- Prefix me- * Imbuhan me-kan dan me-i Affix me-kan and me-i * Awalan ber- Prefix ber- * Imbuhan ber-an dan ber-i Affix ber-kan and ber-i * Awalan di- Prefix di- * Imbuhan di-kan dan di-i Affix di-kan and di-i * Awalan ter- Prefix ter- * Imbuhan ter-kan dan ter-i Affix ter-kan and ter-i Imbuhan Sederhana Lain (Other Simple Affixes) * Akhiran -kan Suffix -kan * Akhiran -i Suffix -i * Akhiran -lah Suffix -lah * Akhiran -an Suffix -an * Akhiran -nya Suffix -nya * Awalan ke- Prefix ke- * Awalan pe- Prefix pe- * Awalan se- Prefix se- Imbuhan komposit (Composite Affixes) * Imbuhan ke-an dan ke-i Affix ke-an and ke-i * Imbuhan pe-an dan pe-i Affix pe-an and pe-i * Imbuhan per-an dan per-i Affix per-an and per-i * Imbuhan ter-kan dan ter-i Affix ter-kan and ter-i * Imbuhan se-nya Affix se-nya Imbuhan kompleks (Complex Affixes) * Imbuhan memper-kan dan memper-i Affix memper-kan and memper-i * Imbuhan diper-kan dan diper-i Affix diper-kan and diper-i Imbuhan spesifik (Specific Affixes) I call these very specific affixes because, unlike the previous ones, they can only be used in very few words. * Akhiran -man, -wan, -wati, dan -ita Suffixes -man, -wan, -wati, -ita * Sisipan -en-, -el-, -er- Infixes -en-, -el-, dan -er-
WIKI
International Puppet Museum - Peruchet The International Puppet Museum - Peruchet (Musée International de la Marionette Peruchet; Internationaal Marionettenmuseum Peruchet) is a museum in Brussels, Belgium, part of the Royal Peruchet Theatre (Théâtre Royal du Peruchet). The theatre has a history dating to 1929 and had its heyday in the 1960s when it staged hundreds of performances annually. The museum was established in 1938. It is located in an 18th-century farmhouse on the Avenue de la Forêt/Woudlaan in Ixelles, near the tram from Boondael railway station. Theatre Carlo Speder founded the theatre in 1929. The name "Peruchet" owes its origin to Speder's daughter who called it le théâtre de mon père chéri ("the theatre of my beloved father"). The theatre moved a few times, first in 1931 to the Rue Joseph Lebeau/Joseph Lebeaustraat in central Brussels, then in 1938 to the Chaussée de Charleroi/Charleroisesteenweg. The Académie de la marionnette ("Academy of Puppetry") was founded in 1940. In 1950, Speder met puppeteer Franz Jageneau, an artist from the Hergé Studios. Jageneau became Speder's assistant, and in 1958, he took over the theatre's management. He was also a set designer and made over 2,000 marionettes. In 1968, the firm relocated to the Avenue de la Forêt/Woudlaan in Ixelles, which is still its current address. In that year, Jageneau met graduate playwright and theatre director Biserka Assenova in Prague. She has specialised in the puppet theatre of such major Czech practitioners as Erik Kolar and Jan Malík. At that time, the theatre performed more than two hundred performances annually in Belgium and elsewhere in Europe. Nowadays, the theatre continues to perform over 100 public shows a year as well as shows for schools. Apart from that, the theatre is well known for organising kids birthdays after the show. The repertoire contains most known fairy tales like Little Red Riding Hood, Puss in Boots, The Three Little Pigs, Mr. Seguin's Goat, The Curious Little Elephant, The Nutcracker, etc. The theatre also organises a festival (usually every other year) where well-known European masters play shows in their original language. Museum In 1938, Carlo Speder created the museum. In 1983, Jageneau and his family conceived the plan to breathe new life into the marionette collection by enlarging the museum. The museum is still located at the original address on the Avenue de la Forêt. Collection The museum displays a collection of thousands of marionettes from different countries and cultures worldwide. There are therefore many different types of puppets in the museum, which also vary in movement techniques (e.g. string puppets, hand puppets, water puppets, bunraku style puppets, shadow puppets, etc.). There are contemporary puppets in the collection, but also 18th-century pieces that were hand-crafted with great precision. The oldest puppets come from India.
WIKI
Page:TheYoungMansGuide.djvu/467 I more light because I have managed to involve those I love in the same gloom as myself? Is it not pleasant to see the sun shining on the mountains, even though we have none of it down in our valley? Oh, the littleness and the meanness of that sickly appetite for sympathy which will not let us keep our tiny Lilliputian sorrows to ourselves I Why must we go sneaking about, like some dishonorable insect, and feed our darkness on other people's light? We hardly know in all this whether to be more disgusted with the meanness, or more indignant at the selfishness, or more sorrowful at the sin. The thoughts of the dying mother are all concentrated on her new-born child. It is a beautiful emblem of unselfish holiness. So also let us hide our pains and sorrows. But while we hide them, let them also be spurs within us to urge us on to all manner of overflowing kindness and sunny humor to those around us. When the very darkness within us creates a sunshine around us, then has the spirit of Jesus taken possession of our souls. RIGHTLY considered, kindness is the grand cause of God in the world. Where it is natural, it must forthwith be supernaturalized. Where it is not natural, it must be supernaturally planted. What is our life? It is a mission to go into every corner it can reach, and reconquer for Goo's beatitude His unhappy world back to Him. It is a devotion of ourselves to the bliss of the Divine Life by the beautiful apostolate of kindness. LET us conclude. We have been speaking of kindness. Perhaps we might better have called it the spirit of Jesus. What an
WIKI
Revered and Feared in the Book Review On a recent morning, Marilyn Stasio’s Upper West Side living room contained at least two dozen piles of books — arranged on shelves, peeking from bags and boxes, heaped in precarious leaning towers. “Books to the right of me, books to the left of me, books in front of me, books behind me,” she declared. “It’s terrible!” Ms. Stasio entered her equally book-filled office and sat before a desk on a red stool that belonged to her grandmother. Outside, a soft rain fell and a blue jay sang. It did not seem like the sort of place where she might write about, say, a serial killer who tears out his victims’ throats with metal teeth and drinks their blood. But for Ms. Stasio, who has written The Times Book Review’s Crime column since 1988, the tales of atrocity and mystery in every corner fuel an everyday labor of love. A good murder novel, she once wrote, can be “a portal to a wider world.” Here she is literally at home among them, windows into alternate realities as familiar and vital to her as they can be strange and sinister to others. Ms. Stasio has always gravitated to darkness. As a student growing up in Revere, Mass., she liked the morbid and horrible: “Dracula,” for instance. She came to New York for graduate school and never left, reviewing theater for Cue magazine in the 1970s. (In addition to writing for The Times, she is now the chief theater critic for Variety.) A devourer of mystery novels, she began reviewing them in a syndicated column, which eventually led to her position at The Times. The path to each biweekly Crime roundup begins with the deluge of packages that arrive at the Times Building and Ms. Stasio’s front door. “Right away, I’m ruthless!” she said. “This author I just won’t read. Don’t like this. Let’s read a page of this to see if she’s gotten any better over the years.” She appreciates a sense of place, which helps explain why she adores historical and regional fiction. But she reads widely — more than 150 crime novels a year, and ideally a bit of every debut she receives. Even when speaking of her favorite writers, she says she admires them for different reasons: Elmore Leonard for his dialogue, P. D. James for her plots, Ruth Rendell for her mastery of suspense. She also focuses on a writer’s voice: “If there’s no voice in the first couple pages, you’re out.” The survivors end up in tall piles beside her desk, each tower labeled with the month of publication. She typically writes her column in a two-day burst. To the crime anthology editor Sarah Weinman, Ms. Stasio’s seriousness and longevity have transformed her into someone whom people “revere and fear.” She still recalls the first sentence Ms. Stasio wrote about a 2002 novel by Boston Teran: “When, exactly, do you give up on a book?” “It was a purely fair but still brutal evisceration,” Ms. Weinman said. “And it took him years to get published again.” For the mystery publisher Otto Penzler, an acquaintance of Ms. Stasio’s who owns the Mysterious Bookshop in Manhattan, she is set apart by her range of interests: “More than most reviewers, she has very catholic taste.” Ms. Weinman and Mr. Penzler also point to something else: In their eyes, Ms. Stasio is a kind of mystery herself, removed from the book events, parties and online debates that bind so many crime and mystery fanatics together. She would rather be reading, surrounded by her fortifications of novels. After all this time, she still isn’t sure why crime has such a hold on her. “I sort of don’t want to know why,” she said. “All I really remember is that when I was a little girl, before I could even read, I would take out the encyclopedia and look through the pictures.” There was one in particular that fascinated her: the two “princes in the tower” believed to have been killed by Richard III, their uncle. “They were in black velvet, and they looked so sweet, with their little blond hair, and I just knew they were being murdered,” she said. “I mean, I just remember thinking how wonderful this was. What a wonderful world.”
NEWS-MULTISOURCE
coma coma - 2 months ago 13 Javascript Question How to abort calls made by @cycle/http driver? I'm pretty new to the whole Cycle.js/RxJS ecosystem and was hoping for someone to guide me on the process of aborting an ongoing ajax call since it looks like doable somehow. It would be awesome to have a little example forked from the search-github-user one using this. I'm adding here a copy from that example for the sake of avoiding SO zealots downvoting: import Cycle from '@cycle/core'; import {Observable} from 'rx'; import {div, label, input, hr, ul, li, a, makeDOMDriver} from '@cycle/dom'; import {makeHTTPDriver} from '@cycle/http'; function main(sources) { // Requests for Github repositories happen when the input field changes, // debounced by 500ms, ignoring empty input field. const searchRequest$ = sources.DOM.select('.field').events('input') .debounce(500) .map(ev => ev.target.value) .filter(query => query.length > 0) .map(q => ({ url: 'https://api.github.com/search/repositories?q=' + encodeURI(q), category: 'github', })); // Requests unrelated to the Github search. This is to demonstrate // how filtering for the HTTP response category is necessary. const otherRequest$ = Observable.interval(1000).take(2) .map(() => 'http://www.google.com'); // Convert the stream of HTTP responses to virtual DOM elements. const vtree$ = sources.HTTP .filter(res$ => res$.request.category === 'github') .flatMap(x => x) .map(res => res.body.items) .startWith([]) .map(results => div([ label({className: 'label'}, 'Search:'), input({className: 'field', attributes: {type: 'text'}}), hr(), ul({className: 'search-results'}, results.map(result => li({className: 'search-result'}, [ a({href: result.html_url}, result.name) ]) )) ]) ); const request$ = searchRequest$.merge(otherRequest$); return { DOM: vtree$, HTTP: request$ }; } Cycle.run(main, { DOM: makeDOMDriver('#main-container'), HTTP: makeHTTPDriver() }); UPDATE Thanks to @user3743222 for pointing out the change on the master branch, it seems that the author has released a new version and now the abort part is here. Answer In current version, all the response$ streams get listened to immediately, so they never terminate before the request comes and aborting doesn't work effectively. There's an issue on that.
ESSENTIALAI-STEM
Page:Narrative of an Official Visit to Guatemala.djvu/334 314 impracticable if I delayed it till later in the season, there was little choice left between returning immediately or remaining in the country until the end of the year. The political state of affairs was at that moment every thing that could be deemed favourable; I was, therefore, induced to adopt the former resolution, and all my arrangements were made accordingly. In looking over the information I had acquired, I was led to consider the nature and pretensions of the more influential, I mean the richer, classes of society; and having, casually, heard in conversation the ascribed amount of property and fortune which some of them possessed, I took great pains to ascertain the respective interests and fortunes of the rest. For this purpose I made a vocabulary of the names of the leading families in the country; and, after collecting the opinions of persons best informed upon the subject, annexed a statement of their respective properties, the nature of them, and the sources whence they
WIKI
Wikipedia:Requests for adminship/Martial Law * ''The following discussion is preserved as an archive of a request for adminship that did not succeed. Please do not modify it. Martial Law Final (7/32/10) ending 03:30, 14 March 2006 (UTC) – Enthusiastic. Eager to assist current administrators and bring issues to their attention. Eager to assist new users. (More description in my support indication below.) Nlu (talk) 22:54, 5 March 2006 (UTC) * Candidate, please indicate acceptance of the nomination here: Position Accepted — Preceding unsigned comment added by Martial Law (talk • contribs) 14:23, March 7, 2006 Support * 1) Support. A couple people have privately informed me of their reservation, but I decided to nominate anyway, because I see these positive characteristics in Martial Law: * 2) Eagerness to try to solve problems. * 3) Eagerness to learn. * 4) Eagerness to try to help others on the learning curve. * Now, those who had concerns have valid points, and I'm going to try to address why, despite the valid concerns, I am making the nomination anyway -- but also to let Martial Law know that what people might be looking for during and after the nomination process: * Not enough article edits. That is a valid point. However, the reason why I think it would be helpful for Martial Law to have admin privileges is not per se he's a great editor (great editors aren't necessarily admins or vice versa), but rather that he is eager to learn and help. I was particularly impressed with how he handled the User:Beckjord situation. * Somewhat questionable judgment in his edits. I believe that we all make questionable calls at times; the question is what you do when people let you know that you made a mistake. Again, Martial Law is anxious to learn, and I believe that he would be more than able to learn the admin ropes. * An additional thought: Martial Law, whether this passes or not, do not consider the opposition comments to be personal attacks; rather, take them as constructive criticism. In fact, I think this process will be very helpful to your maturation as an editor. --Nlu (talk) 23:11, 5 March 2006 (UTC) * 1) Support: He's been showing a friendly face in our encounters. De ryc k C. 16:03, 7 March 2006 (UTC) * 2) Support per Nlu. -- S iva1979 Talk to me 16:27, 7 March 2006 (UTC) * 3) moral Support - well, it's not going very well. Please stick around, take the recommendations in the oppose section, and move on with editing. Also suggestion to withdraw, unless you're looking for critiques. Seeing what Nlu has said, though, keep doing what you've been doing and you'll be alright. (And not signing the acceptance of your RfA has GOT to be bad luck...) -- Jjjsixsix (t)/(c) @ 03:14, 8 March 2006 (UTC) * 4) Support per nom. -- Eddie, Wednesday March 8 2006 at 04:50 * 5) Support I think you would do good. Whopper 17:55, 12 March 2006 (UTC) * 6) Support It looks great. User:Code Napoleon Oppose * 1) Oppose sorry. His inability to list his RfA correctly gives me pause, also lack of edit summaries for major edits and his low contribution to content. Sarah Ewart (Talk) 03:55, 7 March 2006 (UTC) * 2) Per Sarah. NSL E (T+C) at 03:58 UTC (2006-03-07) * 3) Per NSLE. Oleg Alexandrov (talk) 04:05, 7 March 2006 (UTC) * 4) Oppose. Martial Law should try to add more to the encyclopedia, whether it be through RC patrol, copyediting, adding good encyclopedic content, etc. To this point in time his interactions have mainly been through trying to bring issues to the attention of others via talk pages, rather than making many improvements himself. I'll also note he doesn't need admin rights to accomplish his goals for Question 1. &mdash;Bunchofgrapes (talk) 04:18, 7 March 2006 (UTC) * 5) Oppose. Eagerness is one thing, but skill would be better. --Calton | Talk 04:45, 7 March 2006 (UTC) * 6) Oppose I hate to oppose, seems like a great editor, but his answer to question 1 is a non admin task IMO. I think he might want to get some more experience doing mundane, janatoral tasks such as NEWPAGE patrol (we need more newpage patrolers, between 12 am -4 am i'd say 60% are tagged for deletion). Mike (T C) [[Image:Star_of_life2.svg|20px]] 05:30, 7 March 2006 (UTC) * 7) Oppose. Sorry, Martial Law clearly means well, and does contribute somewhat to Wikipedia-space, but Bunchofgrapes sums it up pretty well. I've seen Martial Law post plenty of stuff on pages like WP:AN or WP:ANI that I don't think really belongs there. And, of course, his responses to question 1 don't require adminship at all. Dispute resolution and mediation are things that don't require the adminship tools. If you want to contribute to Wikipedia in those ways, you are very welcome to do so without the adminship tools. --Deathphoenix ʕ 06:59, 7 March 2006 (UTC) * 8) Oppose Per Deathphoenix, I'd agree, I've also seen posts on WP:AN, WP:AN/I which (to me at least) are pretty cryptic, good communications are important. As per others, low edit summary count, answer to question 1 etc. --pgk( talk ) 09:57, 7 March 2006 (UTC) Corrected signed it properly and corrected error. --pgk( talk ) 09:59, 7 March 2006 (UTC) * 9) Oppose. While Martial Law has over 5000 edits, they are to less than 350 different pages. It is easy to infer from this that he has never been on RC or NP patrol. I appreciate that he has intervened successfully in a user dispute, but I suspect that he is not very familiar with processes and policies. And as per Deathphoenix, dispute resolution does not require adminship. Adminship does not require great editing skills, but it does require some other things that I and others have mentioned, and I hope Martial Law will work on those before reapplying. Stifle 11:32, 7 March 2006 (UTC) * 10) Oppose as per above, especially as per Stifle. Also, I'd would really like to see a significant increase in the use of edit summaries. --PS2pcGAMER (talk) 12:00, 7 March 2006 (UTC) * 11) Oppose, needs to use more edit summaries. Needs to have more experience as an administrator. --Ter e nce Ong 12:40, 7 March 2006 (UTC) * 12) Oppose. I get around the project a bit and I've only come across ML a couple of times, which is unusual in an RfA candidate; I also reviewed his edit summaries, and in recent days found him adding how-to content (WP:NOT), some contributions which were not as neutral as I'd like ( whihc appears to assert that alien abductions are real), so I'm not confident he has the necessary grasp of policy; finally, there are not enough edits to real, encyclopaedic articles. Just zis Guy you know? 12:41, 7 March 2006 (UTC) * Oppose. This user has a userbox which says, This User may run for and become a Administrator at any time. Sorry, but I don't think so. --BWD(talk) 12:59, 7 March 2006 (UTC) * 1) Oppose 348 page edits and low edit summary usage. Nope. Compu terjoe 16:12, 7 March 2006 (UTC) * 2) Oppose as very premature. Encourage nominee to withdraw and spend a few months actively building the encyclopedia before considering this role. Jonathunder 18:10, 7 March 2006 (UTC) * 3) Oppose Yikes! Unsigned acceptance of nomination. 8% edit summaries is just hard to wrap my head around. Sorry, I dislike edit-summary-coutitis, but I'm begining to come around to the benefits of users summarizing their edits. If its true that you are a quick learner then I look forward to supporting you in a few months. savidan(talk) (e@) 18:20, 7 March 2006 (UTC) * 4) Oppose. His admirable eagerness is cancelled out by immaturity and advocacy of questionable claims as fact. He sometimes gives the impression he is responding to what he thinks is the situation rather than the actual situation, the most recent example being him saying above, "Position Accepted", rather than "Nomination Accepted". That isn't a good look for an admin IMMHO. The nominator, Nlu, says Martial Law is anxious to learn, so maybe he could come back some time in the future. Moriori 20:49, 7 March 2006 (UTC) * 5) Oppose. His edit history screams "enthusiastic" (which is a very good thing) but definitely not imho "admin material" at this stage. He doesn't need adminship to fulfill his stated goals. --kingboyk 20:52, 7 March 2006 (UTC) * 6) Oppose. I'm sure he'll be a fine editor. this isn't an oppose because he's done something outstandingly wrong, just hasn't been around long enough to firm up an admin level editor status. Staxringold 00:32, 8 March 2006 (UTC) * 7) Oppose Low use of edit summaries for major edits makes me wonder if this candidate will leave reasons when deleting pages.--Jusjih 01:19, 8 March 2006 (UTC) * 8) Oppose. Based on past interactions, I've found no indication that the candidate understands basic Wikipedia policies, Verifiability in particular. I don't doubt his good will and enthusiasm, but he's far too inexperienced for me, and his sometimes-idiosyncratic way of communicating confuses me sometimes – I can't imagine what that would be like for a newbie. android 79 03:19, 8 March 2006 (UTC) * 9) Oppose per Moriori, sorry. Adminship is not a trophy. - Mailer Diablo 17:23, 8 March 2006 (UTC) * 10) Oppose. No hurry for the powertools kid; use your handtools for a little while, then I'll be o.k. knowing that you have the power to block my arse or delete my wedding pictures. You get the point. --Rob from NY 01:18, 9 March 2006 (UTC) * 11) Oppose. Due to the problem with User:Bumpusmills1 and general paranoia. --timecop 01:59, 9 March 2006 (UTC) * 12) Oppose, may have over 5000 edits, but lacks the use of edit summaries. He may delete pages without even a reason. --Ter e nce Ong 09:50, 9 March 2006 (UTC) * 13) Weak oppose lack of edit summaries --Ugur Basak 11:55, 9 March 2006 (UTC) * 14) Oppose per concerns raised above. — Mar. 9, '06 [20:39] * 15) Oppose, give it a bit more time, learn more about the community, don't take any of this personally like Nlu says -- Samir ∙ [[Image:Flag of Canada.svg|25px| ]] T C 23:16, 9 March 2006 (UTC) * 16) Oppose per above, mainly the lack of edit summarrys. Prodego talk 23:46, 9 March 2006 (UTC) * 17) Oppose but not to pile up oppostion. Per all the above oppose votes. M o e ε 18:09, 11 March 2006 (UTC) * 18) OpposeAs per all the other oppose votes.Prasi90 13:27, 12 March 2006 (UTC)[[Image:Flag of India.svg|25px]] * 19) Oppose. I agree with Android above, it's a bad idea to have people who don't know their way around procedures and policies practising on newbies, however eager to learn they are. ML is very enthusiastic and goodhearted, but I'm often quite nonplussed by his communications myself. Also a bit nonplussed by Nlu taking the initiative of nominating him. Bishonen | ノート 23:00, 13 March 2006 (UTC). * 20) Oppose -- Sorry; edit sums are very important. John Reid 03:01, 14 March 2006 (UTC) Neutral Comments * 1) Neutral Martial Law is an interesting fellow and seems determined but I haven't seen much admin type editing...I suggest doing some RC Patrol, participate in Wikipedia namespace discussions and the article deletion pages for some time yet.--MONGO 04:51, 7 March 2006 (UTC) * 2) Neutral. Would like to see more activity in project space. psch e mp | talk 06:10, 7 March 2006 (UTC) * 3) Neutral I would support Martial Law on the grounds that his intentions and heart are certainly in the right place. But I think it's a wee bit premature at this point to be nominated. However, I will watch carefully for his responses to questions and potentially swing to a support. No promises however. --DanielCD 14:02, 7 March 2006 (UTC) * 4) Neutral. ML is a very ensthusiastic editor and interesting charachter, no doubt. But unfortunately I cannot support him at this time, for I'm not fully convinced he's not batshit insane. No offense. Some of my nearest, dearest friends and relatives are batshit insane. However, the admin cabal is currently over its quota in this department. So if and until more of those retire or are defrocked, I must plead the Swiss.--R.D.H. (Ghost In The Machine) 22:47, 7 March 2006 (UTC) * One can make the argument that we're all "batshit insane." :-) In all seriousness though, that comment comes off as a mild personal attack on his character. Do you have anything specific? --BWD(talk) 21:05, 9 March 2006 (UTC) * 1) Neutral. I moved my vote to neutral after a bit of research. I'll probably support it when he is renominated. --BWD(talk) 00:02, 8 March 2006 (UTC) * 2) Neutral I might support in the future, but ... you forgot to sign your RfA. That's just plain bad luck :x — Adrian~enwiki (talk) 02:16, 8 March 2006 (UTC) * To expand slightly, this user's approach to Wikipedia is inconsistent with good administrative practice. Wikipedia is not a democracy, but it's not a military hierarchy either, a fact the User:Martial Law seems fuzzy on. Comments like "Be advised that a Admin. is not a janitor. He/she is like a police officer on Wikipedia" are really troublesome in an aspiring administrator. * — Adrian~enwiki (talk) 18:32, 9 March 2006 (UTC) * I agree. But if he comes up again, let's note that these problems were looked at here, and make sure we re-evaluate whether he has learned differently. I think people can leave comments like the "police officer" comment that can become invalid as they learn more, but I also agree the learning likely still needs to be done at this point. --DanielCD 22:18, 9 March 2006 (UTC) * 1) Neutral. I know his heart is in the right place, but the opinions here have given me reservations. Raven4x4x 08:30, 12 March 2006 (UTC) * 2) Neutral. I'm a bit skeptical about this user. J I P | Talk 16:47, 12 March 2006 (UTC) * 3) Neutral, leaning towards weak support. Ukrained 19:36, 12 March 2006 (UTC) * 4) Neutral, well I've changed my vote from Oppose to Neutral. I believe Martial can be a good contributor without the tools. However, if he wants to be an admin, he needs to use more edit summaries and be more familiar with admin stuff. If he can work on this, he can try for another RFA in a few months time. --Ter e nce Ong 08:08, 13 March 2006 (UTC) * Edit summary usage: 8% for major edits and 100% for minor edits. Based on the last 150 major and 2 minor edits in the article namespace. Mathbot 03:45, 7 March 2006 (UTC) * See Martial Law's edit count and contribution tree with Interiot's tool. * And a note to the people commenting about the userbox: he did not nominate himself, so I don't see it as really relevant. --DanielCD 14:05, 7 March 2006 (UTC) * It shows lack of maturity, among other things. --BWD(talk) 21:43, 7 March 2006 (UTC) * Hehe. A LOT of things around here show a lack of maturity. --DanielCD 01:27, 10 March 2006 (UTC) * Hehe. A LOT of things around here show a lack of maturity. --DanielCD 01:27, 10 March 2006 (UTC) Questions for the candidate Dear candidate, thank you for offering to serve Wikipedia in this capacity. Please take the time to answer a few generic questions to provide guidance for voters: * 1. What sysop chores, if any, would you anticipate helping with? Please check out Category:Wikipedia backlog, and read the page about administrators and the administrators' reading list. * A. Mainly dispute resolution. Seen that most Admins I've encountered have to attempt to solve disputes here, such as recent vandalisim to the Butter article. * 2. Of your articles or contributions to Wikipedia, are there any about which you are particularly pleased, and why? * A. The "Wiki-Directory" of Wiki-links found on my user page, so that new Wikipedians can find the wiki-links pertaining to their inquiries. When I find a new Wikipedian, I have them pay my user page a visit, as I Welcome them to Wikipedia, thus they'll see the directory itself. Status of this is that it is still being constructed, have not found all of the Wikipedia links. It also serves as a handy reference. * 3. Have you been in any conflicts over editing in the past or do you feel other users have caused you stress? How have you dealt with it and how will you deal with it in the future? * A. Some minor conflicts, but who has not ? No stress was initiated at all by any of them Questions from NSLE: The following are hypothetical situations you might find yourself in. I'd like to know how you'd react, as this may sway my vote. There is no need to answer these questions if you don't feel like it, that's fine with me, (especially if I've already supported you ;)). * 1) You find out that an editor, who's well-known and liked in the community, has been using sockpuppets abusively. What would you do? * 2) While speedying articles/clearing a backlog at CAT:CSD, you come across an article that many users agree is patent nonsense. A small minority, of, say, three or four disagree. Upon looking the article over, you side with the minority and feel that the article is salvagable. Another admin then speedies it while you are making your decision. What would you do? * 3) You speedy a few articles. An anon keeps recreating them, and you re-speedy them. After dropping a note on their talk page, they vandalise your user page and make incivil comments. You realise they've been blocked before. What would you do? Would you block them, or respect that you have a conflict of interest? * The above discussion is preserved as an archive of the discussion. Please do not modify it. Subsequent comments should be made on the appropriate discussion page (such as the talk page of either this nomination or the nominated user). No further edits should be made to this page.
WIKI
%0 Journal Article %A Zhang, Jialing %A Chen, Tony %A Yang, Xinping %A Cheng, Hui %A Späth, Stephan S. %A Clavijo, Paul E. %A Chen, Jianhong %A Silvin, Christopher %A Issaeva, Natalia %A Su, Xiulan %A Yarbrough, Wendell G. %A Annunziata, Christina M. %A Chen, Zhong %A Van Waes, Carter %T Attenuated TRAF3 Fosters Activation of Alternative NF-κB and Reduced Expression of Antiviral Interferon, TP53, and RB to Promote HPV-Positive Head and Neck Cancers %D 2018 %R 10.1158/0008-5472.CAN-17-0642 %J Cancer Research %P 4613-4626 %V 78 %N 16 %X Human papilloma viruses (HPV) are linked to an epidemic increase in oropharyngeal head and neck squamous cell carcinomas (HNSCC), which display viral inactivation of tumor suppressors TP53 and RB1 and rapid regional spread. However, the role of genomic alterations in enabling the modulation of pathways that promote the aggressive phenotype of these cancers is unclear. Recently, a subset of HPV+ HNSCC has been shown to harbor novel genetic defects or decreased expression of TNF receptor–associated factor 3 (TRAF3). TRAF3 has been implicated as a negative regulator of alternative NF-κB pathway activation and activator of antiviral type I IFN response to other DNA viruses. How TRAF3 alterations affect pathogenesis of HPV+ HNSCC has not been extensively investigated. Here, we report that TRAF3-deficient HPV+ tumors and cell lines exhibit increased expression of alternative NF-κB pathway components and transcription factors NF-κB2/RELB. Overexpression of TRAF3 in HPV+ cell lines with decreased endogenous TRAF3 inhibited NF-κB2/RELB expression, nuclear localization, and NF-κB reporter activity, while increasing the expression of IFNA1 mRNA and protein and sensitizing cells to its growth inhibition. Overexpression of TRAF3 also enhanced TP53 and RB tumor suppressor proteins and decreased HPV E6 oncoprotein in HPV+ cells. Correspondingly, TRAF3 inhibited cell growth, colony formation, migration, and resistance to TNFα and cisplatin-induced cell death. Conversely, TRAF3 knockout enhanced colony formation and proliferation of an HPV+ HNSCC line expressing higher TRAF3 levels. Together, these findings support a functional role of TRAF3 as a tumor suppressor modulating established cancer hallmarks in HPV+ HNSCC.Significance: These findings report the functional role of TRAF3 as a tumor suppressor that modulates the malignant phenotype of HPV+ head and neck cancers. Cancer Res; 78(16); 4613–26. ©2018 AACR. %U http://cancerres.aacrjournals.org/content/canres/78/16/4613.full.pdf
ESSENTIALAI-STEM
#90DaysOfDevOps Challenge - Day 19 - Docker for DevOps Engineers (Docker Volume and Docker Network) #90DaysOfDevOps Challenge - Day 19 - Docker for DevOps Engineers (Docker Volume and Docker Network) Play this article Welcome to Day 19 of the #90DaysOfDevOps Challenge. Today, we will explore two important concepts in Docker: Docker Volume and Docker Network. These features enable us to manage data persistence and establish communication between containers efficiently. Let's dive into the details. Docker Volume In Docker, a volume is a directory that is stored outside the container's filesystem. It allows us to persist data and share it between containers or between the host machine and containers. Docker volumes provide advantages such as data persistence, improved container performance, and easier data management. When a container is created, Docker sets up a writable storage layer. However, any changes made to this storage layer will not persist if the container is deleted or replaced. This is where Docker volumes come into play. Volumes provide a way to store and manage data separately from the container itself. Docker volumes can be used in various scenarios. For example, they are commonly used to store application data, configuration files, logs, or any other data that needs to be persistent. By utilizing volumes, we can ensure that our data remains intact even if the container is restarted or replaced. Additionally, Docker volumes can be shared between multiple containers, enabling efficient data exchange. This is particularly useful in microservices architectures, where different containers need access to shared data. To use Docker volumes, we can specify the -v or --volume flag when running a container, followed by the source and destination paths. For example: docker run -v /host/path:/container/path image_name This command mounts a volume from the host machine to a specific path inside the container. Any changes made to the data in that path will be reflected in both the container and the host. By specifying different paths, we can easily share and persist data between containers. In addition to using volumes with docker run, Docker provides commands like docker volume create, docker volume inspect, and docker volume rm to manage volumes and perform operations such as creating, inspecting, and removing volumes. Docker volumes are a powerful feature that enhances data management and facilitates seamless communication between containers. Docker Network Docker Network facilitates communication between containers and connects them with the outside world. By default, Docker creates a bridge network for containers to communicate with each other. Additionally, Docker supports other network types like host, overlay, and macvlan, allowing flexible networking configurations based on your application requirements. When containers are connected to a network, they can communicate with each other using container names as hostnames. This simplifies the process of establishing communication between containers, as Docker takes care of name resolution and routing. Docker networks also enable containers to communicate with external systems or services. By exposing ports on the host machine and mapping them to container ports, we can access containers from the host or other machines on the network. In addition to the default bridge network, Docker provides other network drivers to suit different networking scenarios. For example, the host network driver allows a container to share the network namespace with the host, eliminating the need for network address translation (NAT) and providing better performance. Overlay networks are used in distributed environments where containers need to communicate across multiple hosts. They enable seamless communication between containers running on different hosts by abstracting the underlying network infrastructure. Macvlan networks allow containers to have their own MAC addresses, making them appear as separate physical devices on the network. This is useful when containers need to be directly connected to the physical network. By understanding and utilizing Docker networks effectively, we can create flexible and scalable architectures for our containerized applications. Now that we have explored the concepts of Docker Volume and Docker Network, let's proceed to the tasks to gain hands-on experience in using them. Task 1: Creating a Multi-Container Docker-Compose File To manage multiple containers effortlessly, we will use Docker Compose. Follow the steps below: 1. Write a docker-compose.yml file defining the services for your application and database containers. version : "3.3" services: web: image: varsha0108/local_django:latest deploy: replicas: 2 ports: - "8001-8005:8001" volumes: - my_django_volume:/app db: image: mysql ports: - "3306:3306" environment: - "MYSQL_ROOT_PASSWORD=test@123" volumes: my_django_volume: external: true The given docker-compose.yaml file defines a multi-service Docker application with two services: 1. Web service: • Uses the image varsha0108/local_django:latest. • Deploys two replicas. • Maps host ports 8001-8005 to container port 8001. • Mounts the external volume my_django_volume to /app in the container. 2. DB service: • Uses the mysql image. • Maps host port 3306 to container port 3306. • Sets the root password as test@123 using an environment variable. The application utilizes Docker volumes for persistent storage, and the my_django_volume volume is assumed to be created externally. If not, use the below command: docker volume create my_django_volume 1. Use the docker-compose up -d command to start the containers in detached mode. 2. Employ the docker-compose scale command to scale the number of replicas for specific services or enable auto-scaling by adding the replicas parameter in the deployment file. 3. Verify the container status using docker compose ps and view logs using docker compose logs. 4. Finally, use docker compose down to stop and remove all containers, networks, and volumes associated with the application. Task 2: Using Docker Volumes To share data between containers using Docker Volumes, follow these steps: 1. Create a new volume docker volume create ubuntu_volume docker volume ls docker volume inspect ubuntu_volume 2. Create two or more containers that need to read and write data. Use the below command to specify the same volume configuration for each container. docker run -d --name nginx_container_1 -v ubuntu_volume:/app nginx:latest docker run -d --name nginx_container_2 -v ubuntu_volume:/app nginx:latest docker ps 3. Verify data consistency by executing commands inside each container using docker exec. docker exec -it dabd72adfc2e bash I have created a new file called 'volume-test.txt' while connected to nginx_container_1. Let's connect to nginx_container_2 and verify the text file is there. docker exec -it nginx_container_2 bash In this example, we have used the container ID and the container name with the docker exec command to verify the content of the volume 4. Utilize docker volume ls to list all volumes and docker volume rm to remove the volume once you have finished using it. Congratulations on completing Day 19 of the #90DaysOfDevOps challenge. In Day 19, we focused on further exploring Docker for DevOps Engineers. We learned how to work with Docker volumes to persist data across containers and how to scale our services using the Docker Compose scale command. Moving on to Day 20, we will review the Docker commands we have learned so far and create a comprehensive Docker cheatsheet. This cheatsheet will serve as a handy reference guide for you to quickly access and use Docker commands effectively in your DevOps workflows. Stay tuned! Did you find this article valuable? Support Esteban Moreno by becoming a sponsor. Any amount is appreciated!  
ESSENTIALAI-STEM
Matthew 5:48 Matthew 5:48 is the forty-eighth and final verse of the fifth chapter of the Gospel of Matthew in the New Testament and is part of the Sermon on the Mount. This is the final verse of the final antithesis, and it is a summary of Jesus' earlier teachings. Text In the King James Version of the Bible, the text reads: * Be ye therefore perfect, even as your Father which is in heaven is perfect. The World English Bible translates the passage as: * Therefore you shall be perfect, just as your Father in heaven is perfect. The Common English Bible uses the word "complete" instead of "perfect". The Novum Testamentum Graece text is: * Ἔσεσθε οὖν ὑμεῖς τέλειοι ὡς ὁ Πατὴρ ὑμῶν ὁ οὐράνιος τέλειός ἐστιν. Interpretations The formulation of this verse is known as the Imitatio Dei; a similar verse appears in Luke 6:36. The verse might be modeled on Leviticus 19:2, which says in the King James Version: * "Speak unto all the congregation of the children of Israel, and say unto them, You shall be holy: for I the LORD your God am holy." There is some debate about the meaning of the injunction to be "perfect", since orthodox Christianity teaches that creatures cannot achieve God's level of perfection. The term rendered "perfect" in most English translations is τέλειοι (téleioi), the same word used in the Septuagint for תָּמִים (tamím) and meaning "brought to its end, finished; lacking nothing necessary to completeness". According to Albert Barnes, "Originally, it is applied to a piece of mechanism, as a machine that is complete in its parts. Applied to people, it refers to completeness of parts, or perfection, where no part is defective or wanting." Some link the Gospel's use of the term with its use by the Greek philosophers. To them something was perfect if it fully had its intended function. One commentary offers, "Manifestly, our Lord here speaks, not of degrees of excellence, but of the kind of excellence which was to distinguish His disciples and characterize His kingdom. When therefore He adds, even as your Father which is in heaven is perfect—He refers to that full-orbed glorious completeness which is in the great Divine Model, 'their Father which is in heaven.'" Other scholars believe that Jesus is here setting a goal that is certain to be impossible, so that we will realize this and be humble. The pursuit of perfection is important, even if the attainment of it impossible. Another view is that this is a limited form of perfection that is being asked. Fowler notes that elsewhere in the New Testament, it is stated that those who believe in Jesus and rely fully upon him for all things is perfect. In Jewish scripture, certain individuals such as Noah (Genesis 6:9) and Abraham are referred to as perfect because of their obedience to God. In these passages perfect is used as a synonym for complete, and perfect obedience to God is simply complete obedience to God. Barclay argues that the previous verses made clear that man's function is to love, and anyone who does that absolutely can be considered perfect. Similarly, John Gill notes that "this perfection is to be restrained to the subject Christ is upon, love to men, and not to be referred to any, or every other thing". The Qumran followers described themselves as the followers of the "perfect way", in that they were followers of what they believed was perfect dedication to God. The Cambridge Bible for Schools and Colleges synthesizes several approaches: * Either (1) in reference to a future state, “if ye have this true love or charity ye shall be perfect hereafter;” or (2) the future has an imperative force, and perfect is limited by the preceding words = perfect in respect of love, i. e. “love your enemies as well as your neighbours,” because your Father being perfect in respect of love does this. Commentary from the Church Fathers Saint Remigius: Because the utmost perfection of love cannot go beyond the love of enemies, therefore as soon as the Lord has bid us love our enemies, He proceeds, Be ye then perfect, as your Father which is in heaven is perfect. He indeed is perfect, as being omnipotent; man, as being aided by the Omnipotent. For the word ‘as’ is used in Scripture, sometimes for identity, and equality, as in that, As I was with Moses, so will I be with thee; (Josh. 1:5.) sometimes to express likeness only as here. Pseudo-Chrysostom: For as our sons after the flesh resemble their fathers in some part of their bodily shape, so do spiritual sons resemble their father God, in holiness. St John Chrysostom compares the "old law" with this new one: "Let [us] examine attentively ... the different periods of time, and the persons to whom it was given; and he will admire the wisdom of the divine Legislator, and clearly perceive that it is one and the same Lord, and that each law was to the great advantage of mankind, and wisely adapted to the times of their promulgation. For, if among the first principles of rectitude, these sublime and eminent truths had been found, perhaps neither these, nor the less perfect rules of morality would have been observed; whereas, by disposing of both in their proper time, the divine wisdom has employed both for the correction of the world."
WIKI
Polymers for Advanced Technologies Polymers for Advanced Technologies is a monthly peer-reviewed scientific journal, published since 1990 by John Wiley & Sons. It covers research on polymer science and technology. Abstracting and indexing The journal is abstracted and indexed in Chemical Abstracts Service, Scopus, and the Science Citation Index Expanded. According to the Journal Citation Reports, its 2022 impact factor is 3.4. Most cited papers The three most-cited papers are: * 1) "Stepwise polyelectrolyte assembly on particle surfaces: a novel approach to colloid design", Volume 9, Issue 10–11, Oct-Nov 1998, Pages: 759–767, Sukhorukov GB, Donath E, Davis S, et al. * 2) "Formation of crew-cut aggregates of various morphologies from amphiphilic block copolymers in solution", Volume 9, Issue 10–11, Oct-Nov 1998, Pages: 677–699, Zhang LF, Eisenberg A. * 3) "Nanocomposite materials from latex and cellulose whiskers", Volume 6, Issue 5, May 1995, Pages: 351–355, Favier V, Canova GR, Cavaille JY, et al.
WIKI
ferreter Noun * 1) A person who hunts with ferrets. * 2) One who uncovers or brings to light; one who ferrets out.
WIKI
Best answer: Does resetting Windows 10 Delete? Reset removed everything, including your files–like doing a complete Windows resintall from scratch. On Windows 10, things are a bit simpler. The only option is “Reset your PC”, but during the process, you’ll get to choose whether to keep your personal files or not. Does reset delete everything Windows 10? If you’re having problems with your PC, you can: 1. Refresh your PC to reinstall Windows and keep your personal files and settings. … 2. Reset your PC to reinstall Windows but delete your files, settings, and apps—except for the apps that came with your PC. 3. Restore your PC to undo recent system changes you’ve made. Will resetting Windows 10 Delete Windows 10? No, a reset will just reinstall a fresh copy of Windows 10. I’d back up your files first, but then go for it! Once in that tab, click on “Get Started” under Reset this PC. Does resetting Windows Delete? The resetting process removes the applications and files installed on the system, then reinstalls Windows and any applications that were originally installed by your PC’s manufacturer, including trial programs and utilities. How do I reset Windows 10 but keep everything? Running Reset This PC with the Keep My Files option is actually easy. It will take some time to complete, but it is a straightforward operation. After your system boots from the Recovery Drive and you select the Troubleshoot > Reset This PC option. You’ll select the Keep My Files option, as shown in Figure A. Is it safe to reset Windows 10? A factory reset is perfectly normal and is a feature of Windows 10 that helps get your system back to a working state when its not starting or working well. Here is how you can do it. Go to a working computer, download, create a bootable copy, then perform a clean install. How long does it take to reset Windows 10 PC? It would take about 3 hours to reset a Windows PC and it would take another 15 minutes to set up your new PC. It would take 3 and a half hours to reset and start with your new PC. Does Windows 10 have a repair tool? Answer: Yes, Windows 10 does have a built-in repair tool that helps you troubleshoot typical PC issues. Is Microsoft release Windows 11? Windows 11 is coming out soon, but only a select few devices will get the operating system on release day. After three months of Insider Preview builds, Microsoft is finally launching Windows 11 on October 5, 2021. Is factory reset bad for your computer? Factory resets aren’t perfect. They don’t delete everything on the computer. The data will still exist on the hard drive. Such is the nature of hard drives that this type of erasure doesn’t mean getting rid of the data written to them, it just means the data can no longer be accessed by your system. What are the disadvantages of factory reset? But if we reset our device because we noticed that its snappiness has slowed down, the biggest drawback is the loss of data, so it is essential to backup all your data, contacts, photos, videos, files, music, before resetting. Will resetting PC remove virus? The recovery partition is part of the hard drive where your device’s factory settings are stored. In rare cases, this can become infected with malware. Hence, doing a factory reset will not clear the virus. Like this post? Please share to your friends: OS Today
ESSENTIALAI-STEM
Paid Notice: Deaths KLEINER, SAM KLEINER -- Sam. Fisher Brothers mourns the passing of our dear counsel, Sam Kleiner. For over two decades, he was our invaluable partner, confidant and most importantly, great friend. Beside being a skilled and knowledgeable attorney, Sam was an astute, fair-minded businessman, profoundly respected by all. Our hearts go out to his wife, Darlene, his five sons, Jeremy, Benjamin, Kenneth, David and Christopher, his two granddaughters, Karson and Devon, as well as his mother, Betty Kleiner, and his sister, Hannah Weise. Sam was taken from us all too soon. His warmth, gentleness, wisdom and pure sweetness will never be forgotten. Fisher Brothers Arnold Fisher Richard L. Fisher Ken Fisher Steven Fisher Winston C. Fisher KLEINER--Samuel K., 61 years old, died peacefully on November 18, 2003 after a valiant fight. Beloved and devoted husband, father, grandfather, son, brother, uncle, brother-in-law and friend. He was a highly respected real estate attorney, serving as General Counsel to Fisher Brothers for the past 25 years. His zest for life was expressed by his devotion to his family, his passion for tennis and cinema and his commitment to his friends. He is survived by his adored and adoring wife, Darlene Diamond Kleiner, his beloved sons Kenneth (Farrah), David, Christopher (Mollie), Jeremy and Benjamin, his loved granddaughters Carson and Devin. Cherished son of Betty and the late Sidney Kleiner. He will be loved and missed by all that knew him. Service will be held at Central Synagogue (55th and Lexington Avenue), Thursday, November 20, 2003 at 10:30AM. KLEINER--Samuel K. To our Grandpa Sam, we will miss you and wish you could have seen us grow up. Love, your girls Carson and Devin KLEINER--Samuel. The partners of Podell, Schwartz, Schechter & Banfield, LLP mourn the untimely passing of Sam Kleiner, a loving husband and father, and a most loyal and dedicated counsel to our clients and friends at Fisher Brothers. We extend our deepest condolences to Sam's mother Betty, wife Darlene, his cherished children Jeremy, Benji, Kenneth and Farrah, Christopher and David, and to everyone at Fisher Brothers who will miss Sam's wisdom, advice and passion for life. Podell, Schwartz, Schechter & Banfield, LLP KLEINER--Samuel L. Words cannot express how sad we are to learn of the terrible loss of our dear friend, Sam Kleiner. You have been such an important part of our lives, and we will never, ever forget you. Our thoughts and prayers go out to Darlene and their children, Kenneth, Christopher, David, Jeremy, and Benjamin, and to his mother Betty and his sister Hannah during this very difficult and painful time. Tammy, Ken, Crystal, Brittany, Joshua KLEINER--Samuel. We will miss Sam beyond our ability to express in words and shall treasure the memory of the wonderful times we have shared together. We extend our sincerest condolences to his mother Betty, his wife Darlene, his children Jeremy, Benji, Kenneth and Farrah, Christopher and David on the devastating loss of a most loving husband, dedicated father, and loyal friend. Lorraine and Herbert Podell KLEINER--Samuel L. We sadly acknowledge the passing of Sam Kleiner, our longtime confidant, partner and friend. His passing leaves a great void in the hearts of all those his life touched. Our thoughts and prayers are with his wife Darlene and their children Kenneth, Christopher, David, Jeremy, and Benjamin, and granddaughters Karson and Devon. Arnold and Audrey Fisher KLEINER--Sam. We mourn the loss of our dear and wise friend, Sam. His kindness and warmth permeated all his relationships and his character and integrity embraced us all. Sam made every day better for me and for all of us. Our heartfelt sympathies go to his wonderful wife, Darlene, his children and grandchildren. We will miss him forever. Nancy and Marty Edelman KLEINER--Samuel L. It is with great sadness that I acknowledge the passing of my teacher, my colleague and my close friend, Sam Kleiner. The impact he had on my life will always be an important part of me. I thank you, Sam, from the bottom of my heart, for all you have done for me. May you find peace and may you rest well, my friend. Ken Fisher KLEINER--Sam. We mourn the loss of our valued client, wise colleague and extraordinary friend, Sam Kleiner. His skills and intellect of profound heights were exceeded by his warmth and thoughtfulness. We extend our sympathies to his lovely wife, Darlene, and his family. Paul Hastings Janofsky & Walker KLEINER--Samuel L. The Intrepid Foundation family express our sincere condolences to Darlene and to all the Kleiner family on the loss of our great friend, Sam Kleiner. We cherished Sam's friendship, advice and support and we salute Sam for his generosity and for a life well lived. Bill White, Tom Tyrrell and all at Intrepid KLEINER--Samuel. Sam, a good friend, gentleman, and loved by all. Our heartfelt condolences to his wonderful wife Darlene, his sons Jeremy, Benjamin, Kenneth, David and Christopher and his granddaughters Karson and Devon. He will be deeply missed by all. Arthur and Jane Rosenbloom KLEINER--Samuel K. We extend our heartfelt sympathy to Darlene, Jeremy, Benjy, Kenneth and Farrah, David and Chris and Mollie and the entire Kleiner family. Sam was a great friend and wonderful human being and we will miss him. Marshall, Abbe and Simon Gluck KLEINER--Samuel. We record with sorrow the passing of Samuel Kleiner. We send our support and sympathy to Darlene and the entire Kleiner family during this difficult time, and extend our heartfelt condolences. The Staff of Rosenthal & Rosenthal, Inc. KLEINER -- Sam. Dearest Kleiner family, our hearts break with yours. Sam has been taken too soon. We will always be here for you. Our love of Sam and all our cherished memories of him will live on in our hearts. Judd, Wendy, Samantha, Jonathan and Joshua KLEINER--Sam. Central Synagogue records with profound sorrow the passing of its member Sam Kleiner. We extend heartfelt sympathy to his bereaved family. Peter J. Rubinstein, Rabbi Alfred Youngwood, President KLEINER--Sam. We extend our heartfelt sympathy to the family of our beloved friend, Sam Kleiner. Jon Kaye, The Kaplans and the Cohens KLEINER--Samuel K. Our deepest sympathies to Darlene and the children from his tennis partner and dear friends. Jayne & Richard Rosenhaus KLEINER--Sam. A true friend and a special person in my life. Never to be forgotten, may you rest in peace. Judd
NEWS-MULTISOURCE
Wikipedia:Articles for deletion/Dixie Randock This page is an archive of the proposed deletion of the article below. Further comments should be made on the appropriate discussion page (such as the article's talk page or on a Votes for Undeletion nomination). No further edits should be made to this page. The result of the debate was Delete. Redwolf24 23:07, 3 August 2005 (UTC) Dixie Randock This appears to be a self-promotional CV for a real estate agent who is marketing a line of training courses. TenOfAllTrades(talk) 00:30, 28 July 2005 (UTC) * Delete as ad. (nominator's vote) TenOfAllTrades(talk) 00:30, 28 July 2005 (UTC) * Hmmm...reading the other comments about her running diploma mills almost makes me want to keep an NPOV treatment of her career as an object lesson in the dangers of self-promotion on Wikipedia...almost. TenOfAllTrades(talk) 05:23, 28 July 2005 (UTC) * Per Jimbo's remarks below, it seems she isn't even possibly noteworthy for a relationship with diploma mills. My delete as non-notable self-promotion stands.TenOfAllTrades(talk) 14:55, 1 August 2005 (UTC) * Neutral this is an advert. However we may be able to NPOV it.Theresa Knott (a tenth stroke) 00:34, 28 July 2005 (UTC) * Delete not only because it is an advertisement, but also because the "school" (and it's founder by extension) is non-notable. - Thatdog 00:42, 28 July 2005 (UTC) * Very weak keep. She's been accused of operating a series of diploma mills. She has some notability through notoriety. Pburka 03:50, July 28, 2005 (UTC) * Delete : NN/Vanity --Ragib 04:22, 28 July 2005 (UTC) * Delete. Vanity article by a woman who allegedly runs diploma mills, and has already made legal threats against another Wikipedia editor. Rhobite 04:24, July 28, 2005 (UTC) * Keep a NPOV version of her biography, or merge it with Saint Regis University, the diploma mill she runs. This and its various allied "universities" appear rather notorious in this business and get several hits on news sites in connection with fake degree scandals. As we have articles on several of these interconnected Liberia-registered diploma mills, I find it completely reasonable to have articles on the people who actually run the scam. (If this exposes Wikipedia to the risk of being sued, I suggest we should let Jimbo take a decision on whether this is a significant enough risk to desist from writing about her.) Uppland 06:42, 28 July 2005 (UTC) * Delete based on comment by Jimbo Wales below. Uppland 11:55, 1 August 2005 (UTC) * Delete. Running a diploma mill isn't much of a personal accomplishment. The diploma mill might be worth an article, but not the proprietor. --Calton | Talk 06:47, July 28, 2005 (UTC) * I am not an expert on this, but as I understand it, these diploma mills are rather ephemeral entities; as soon as one name gets too compromised, the business moves over to another one. They also work in fake "networks", complete with their own accreditation organizations, as a way of falsely reinforcing the image of respectability they strive to maintain. If anything, I would suggest an article on the proprietors is more motivated, whenever they may be identified, and we should have the various diploma mills and other scams they have been running merged and redirected to the biography. That would have the additional advantage of making monitoring for POV edits easier. Uppland 07:19, 28 July 2005 (UTC) * Delete The owner is not notable. -- BMIComp (talk, HOWS MY DRIVING) 17:20, 28 July 2005 (UTC) * Keep Kurt Weber 17:47, 28 July 2005 (UTC) * Delete. The diploma mill is noteworthy. The owner isn't. --Carnildo 19:23, 28 July 2005 (UTC) * Merge and Redirect to Diploma_mill. --Alan Au 19:27, 28 July 2005 (UTC) * Redirect to Diploma mill. This is a vanity page. It should not be here but if the creator wants to have a page, it should redirect to a page that seems to fit what she allegedly does. Fear ÉIREANN \(caint) 03:14, 31 July 2005 (UTC) * Delete - It appears to me that this person is a victim of mistaken identity. She has offered to send a copy of the settlement of the lawsuit, which she says acknowledges that her being named in it was an error: "As far as I can tell my name appeared in a domain registration a few years ago, of which I had no ownership. I owned a web hosting company and I believe that at one time an employee used my credit card to register a customer's domain. The information was corrected (about a week later) but ever since my name appeared on a domain I do not own I have been harassed, stalked, defamed and even threatened by certain misinformed individuals." I think based on this that she's clearly a victim of circumstances, and otherwise non-notable but respectable person. --Jimbo Wales 11:19, 1 August 2005 (UTC) * Delete - Vanity - T&#949;x &#964; ur&#949; 16:57, 3 August 2005 (UTC)
WIKI
Template:Shared IP edu Welcome! [ Last edited]: Last edited by: (UTC) Interested in becoming a regular contributor to Wikiquote? Create an account! Your, and may be shared by multiple users, so you might receive messages on this page that were not intended for you. To have your own user pages, keep track of articles you've edited in a watchlist, and have access to a few other special features, please consider registering an account! It's fast and free. If you are unable to create an account due to your institution's IP address being blocked, follow these instructions. If you are autoblocked repeatedly, contact your network administrator or instructor and request that your school contact Wikimedia's XFF project about enabling X-Forwarded-For HTTP headers on its proxy servers so that blocks will affect only the intended user. Alternatively, you can list this IP address at WikiProject on XFFs. Administrators: review contributions carefully if blocking this IP address or reverting its contributions. If a block is needed, consider a soft block using School block. In response to vandalism from this IP address, abuse reports may be sent to its network administrator for investigation.
WIKI
Page:EB1911 - Volume 09.djvu/751 Rh that is, this is a 6-valued function of a, b, c, d, the root of a sextic (which is, in fact, solvable by radicals; but this is not here material). If, however, a, b, c, d denote the roots r, r&#8202;2, r4, r3 of the special equation, then the expression becomes viz. this is = &minus;1 + 4 + 142 &minus; 163, a completely determined value. That is, we have (r&#8202; + r&#8202;2 + 2r&#8202;4 + 3r&#8202;3) = &minus;1 + 4 + 142 &minus; 163, which result contains the solution of the equation. If = 1, we have (r&#8202; + r&#8202;2 + r&#8202;4 + r&#8202;3)4 = 1, which is right; if = &minus;1, then (r&#8202; + r&#8202;4 &minus; r&#8202;2 &minus; r3)4 = 25; if = i, then we have {r &minus; r4 + i(r&#8202;2 &minus; r3) }4 = &minus;15 + 20i; and if = &minus;i, then {r&#8202; &minus; r&#8202;4 &minus; i (r&#8202;2 &minus; r&#8202;3) }4 = &minus;15 &minus; 20i; the solution may be completed without difficulty. The result is perfectly general, thus:—n being a prime number, r a root of the equation xn&minus;1 + xn&minus;2 + ... + x + 1 = 0, a root of n&minus;1 &minus; 1 = 0, and g a prime root of gn&minus;1 &equiv; 1 (mod. n), then (r + r g + ... + n &minus; 2rg n&minus;2) n&minus;1 is a given function M0 + M1 ... + Mn&minus;2n&minus;2 with integer coefficients, and by the extraction of (n &minus; 1)th roots of this and similar expressions we ultimately obtain r in terms of, which is taken to be known; the equation xn &minus; 1 = 0, n a prime number, is thus solvable by radicals. In particular, if n &minus; 1 be a power of 2, the solution (by either process) requires the extraction of square roots only; and it was thus that Gauss discovered that it was possible to construct geometrically the regular polygons of 17 sides and 257 sides respectively. Some interesting developments in regard to the theory were obtained by C. G. J. Jacobi (1837); see the memoir “Ueber die Kreistheilung, u.s.w.,” Crelle, t. xxx. (1846). The equation xn&minus;1 + ... + x + 1 = 0 has been considered for its own sake, but it also serves as a specimen of a class of equations solvable by radicals, considered by N. H. Abel (1828), and since called Abelian equations, viz. for the Abelian equation of the order n, if x be any root, the roots are x, x, 2x, ... n&minus;1x (x being a rational function of x, and nx = x); the theory is, in fact, very analogous to that of the above particular case. A more general theorem obtained by Abel is as follows:—If the roots of an equation of any order are connected together in such wise that all the roots can be expressed rationally in terms of any one of them, say x; if, moreover, x, 1x being any two of the roots, we have 1x = 1x, the equation will be solvable algebraically. It is proper to refer also to Abel’s definition of an irreducible equation:—an equation x = 0, the coefficients of which are rational functions of a certain number of known quantities a, b, c ..., is called irreducible when it is impossible to express its roots by an equation of an inferior degree, the coefficients of which are also rational functions of a, b, c ... (or, what is the same thing, when x does not break up into factors which are rational functions of a, b, c ...). Abel applied his theory to the equations which present themselves in the division of the elliptic functions, but not to the modular equations. 24. But the theory of the algebraical solution of equations in its most complete form was established by Evariste Galois (born October 1811, killed in a duel May 1832; see his collected works, Liouville, t. xl., 1846). The definition of an irreducible equation resembles Abel’s,—an equation is reducible when it admits of a rational divisor, irreducible in the contrary case; only the word rational is used in this extended sense that, in connexion with the coefficients of the given equation, or with the irrational quantities (if any) whereof these are composed, he considers any number of other irrational quantities called “adjoint radicals,” and he terms rational any rational function of the coefficients (or the irrationals whereof they are composed) and of these adjoint radicals; the epithet irreducible is thus taken either absolutely or in a relative sense, according to the system of adjoint radicals which are taken into account. For instance, the equation x4 + x3 + x2 + x + 1 = 0; the left hand side has here no rational divisor, and the equation is irreducible; but this function is = (x2 + x + 1)2 &minus; x2, and it has thus the irrational divisors x2 + (1 + &radic;5)x + 1, x2 + (1 &minus; &radic;5)x + 1; and these, if we adjoin the radical &radic;5, are rational, and the equation is no longer irreducible. In the case of a given equation, assumed to be irreducible, the problem to solve the equation is, in fact, that of finding radicals by the adjunction of which the equation becomes reducible; for instance, the general quadric equation x2 + px + q = 0 is irreducible, but it becomes reducible, breaking up into rational linear factors, when we adjoin the radical &radic;( p2 &minus; q). The fundamental theorem is the Proposition I. of the “Mémoire sur les conditions de résolubilité des équations par radicaux”; viz. given an equation of which a, b, c. . . are the m roots, there is always a group of permutations of the letters a, b, c. . . possessed of the following properties:— 1. Every function of the roots invariable by the substitutions of the group is rationally known. 2. Reciprocally every rationally determinable function of the roots is invariable by the substitutions of the group. Here by an invariable function is meant not only a function of which the form is invariable by the substitutions of the group, but further, one of which the value is invariable by these substitutions: for instance, if the equation be (x) = 0, then (x) is a function of the roots invariable by any substitution whatever. And in saying that a function is rationally known, it is meant that its value is expressible rationally in terms of the coefficients and of the adjoint quantities. For instance in the case of a general equation, the group is simply the system of the 1.2.3&#8202;.&#8202;.&#8202;.&#8202;n permutations of all the roots, since, in this case, the only rationally determinable functions are the symmetric functions of the roots. In the case of the equation xn&minus;1 .&#8202;.&#8202;. + x + 1 = 0, n a prime number, a, b, c .&#8202;.&#8202;. k = r&#8202;, r&#8202; g, r&#8202; g 2 .&#8202;.&#8202;. r&#8202; g n&minus;2, where g is a prime root of n, then the group is the cyclical group ''abc .&#8202;.&#8202;. k, bc .&#8202;.&#8202;. ka'', .&#8202;.&#8202;. ''kab .&#8202;.&#8202;. j'', that is, in this particular case the number of the permutations of the group is equal to the order of the equation. This notion of the group of the original equation, or of the group of the equation as varied by the adjunction of a series of radicals, seems to be the fundamental one in Galois’s theory. But the problem of solution by radicals, instead of being the sole object of the theory, appears as the first link of a long chain of questions relating to the transformation and classification of irrationals. Returning to the question of solution by radicals, it will be readily understood that by the adjunction of a radical the group may be diminished; for instance, in the case of the general cubic, where the group is that of the six permutations, by the adjunction of the square root which enters into the solution, the group is reduced to abc, bca, cab; that is, it becomes possible to express rationally, in terms of the coefficients and of the adjoint square root, any function such as a2b + b2c + c2a which is not altered by the cyclical substitution a into b, b into c, c into a. And hence, to determine whether an equation of a given form is solvable by radicals, the course of investigation is to inquire whether, by the successive adjunction of radicals, it is possible to reduce the original group of the equation so as to make it ultimately consist of a single permutation. The condition in order that an equation of a given prime order n may be solvable by radicals was in this way obtained—in the first instance in the form (scarcely intelligible without further explanation) that every function of the roots x1, x2 .&#8202;.&#8202;. xn, invariable by the substitutions xak + b for xk, must be rationally known; and then in the equivalent form that the resolvent equation of the order 1.2.&#8202;.&#8202;.&#8202;(n &minus; 2) must have a rational root. In particular, the condition in order that a quintic equation may be solvable is that Lagrange’s resolvent of the order 6 may have a rational factor, a result obtained from a direct investigation in a valuable memoir by E. Luther, Crelle, t. xxxiv. (1847). Among other results demonstrated or announced by Galois may be mentioned those relating to the modular equations in the theory of elliptic functions; for the transformations of the orders 5, 7, 11, the modular equations of the orders 6, 8, 12 are depressible to the orders 5, 7, 11 respectively; but for the transformation, n a prime number greater than 11, the depression is impossible. The general theory of Galois in regard to the solution of equations was completed, and some of the demonstrations supplied by E. Betti (1852). See also J. A. Serret’s Cours d’algèbre supérieure, 2nd ed. (1854); 4th ed. (1877–1878). 25. Returning to quintic equations, George Birch Jerrard (1835) established the theorem that the general quintic equation is by the extraction of only square and cubic roots reducible to the form x5 + ax + b = 0, or what is the same thing, to x5 + x + b = 0. The actual reduction by means of Tschirnhausen’s theorem was effected by Charles Hermite in connexion with his elliptic-function solution of the quintic equation (1858) in a very elegant manner. It was shown by Sir James Cockle and Robert Harley (1858–1859) in connexion with the Jerrardian form, and by Arthur Cayley (1861), that Lagrange’s resolvent equation of the sixth order can be replaced by a more simple sextic equation occupying a like place in the theory. The theory of the modular equations, more particularly for the case n = 5, has been studied by C. Hermite, L. Kronecker and F. Brioschi. In the case n = 5, the modular equation of the order 6
WIKI