Document stringlengths 87 1.67M | Source stringclasses 5 values |
|---|---|
United States v. Calamaro/Dissent Burton
Mr. Justice BURTON, dissenting.
For the reasons stated in Sagonias v. United States, 5 Cir., 223 F.2d 146, I believe that the respondent pickup man was 'engaged in receiving wagers for and on behalf' of the banker, within the meaning of §§ 3290 and 3291(a)(3), and therefore was required to pay the occupational tax and to register not only his name and place of residence, but that of the banker.
The language of § 3290 does not limit the occupational tax to persons 'accepting wagers' in a contractual sense. Instead, it imposes the tax on 'each person * * * who is engaged in receiving wagers for or on behalf of any person so liable (for the excise tax).' Those words readily include a pickup man for he is engaged in receiving for the banker the slips which provide the banker with the sole evidence of the wagers made.
The legislative history contains specific references that indicate that the section was to apply to bookmakers' agents or runners. It shows that the occupational tax was enacted not only as a revenue measure on its own account, but as a measure to help enforce the much larger excise tax placed by § 3285 upon the principal operator of the gambling enterprise. To this end, § 3291(a)(1) and (3) requires each person who is subject to the occupational tax to register not only his own name and place of residence, but also that of the person for whom he is receiving wagers. Registration of the pickup man aids the Government in tracking these gambling operations to their headquarters and is essential to the enforcement of the excise tax. Since the 'receiving wagers' phrase in the registration provisions includes the pickup man, it must have the same meaning in the identical provisions imposing the occupational tax.
Furthermore, the administrative interpretation of § 3290 is significant. Since the enactment of the section in 1951, there has been in effect the following explanation of its scope in Treasury Regulations 132:
'Example (2). B operates a numbers game. He has an arrangement with ten persons, who are employed in various capacities, such as bootblacks, elevator operators, news dealers, etc., to receive wagers from the public on his behalf. B also employs a person to collect from his agents the wagers received on his behalf.
'B, his ten agents, and the employee who collects the wagers received on his behalf are each liable for the special tax.' (Emphasis supplied.) 26 CFR, 1957 Cum. Pocket Supp., § 325.41.
This regulation should not be disregarded unless shown to be plainly inconsistent with the statute. Commissioner of Internal Revenue v. Wheeler, 324 U.S. 542, 547, 65 S.Ct. 799, 802, 89 L.Ed. 1166; Brewster v. Gage, 280 U.S. 327, 336, 50 S.Ct. 115, 117, 74 L.Ed. 457. Moreover, Congress re-enacted § 3290 in 1954 as 26 U.S.C. (Supp. II) § 4411, 26 U.S.C.A. § 4411. It thus impliedly accepted this established interpretation of the scope of the section. Corn Products Refining Co. v. Commissioner of Internal Revenue, 350 U.S. 46, 53, 76 S.Ct. 20, 24, 100 L.Ed. 29; Helvering v. Winmill, 305 U.S. 79, 83, 59 S.Ct. 45, 46, 83 L.Ed. 52. | WIKI |
Bill Kay (baseball)
Walter Brocton "Bill" Kay (February 14, 1878 – December 3, 1945) was an outfielder in Major League Baseball. Nicknamed "King Bill", he played for the Washington Senators in 1907. | WIKI |
Arctic Rally
Arctic Rally, currently Arctic Lapland Rally and also known as Tunturiralli, is an annual rally competition held on ice- and snow-covered roads in Rovaniemi, Lapland, Finland. It has been organized continuously since 1966. In 2021, a separate event based on the rally became part of the World Rally Championship as Arctic Rally Finland. The rally is also part of the Finnish Rally Championship and has previously been a round of the European Rally Championship until 2003 and the FIA Cup for Rally Drivers in 1977 and 1978.
In 2021 the rally was held twice, once between 14-16 January for the Finnish Rally Championship, and again between 26-28 February for the World Rally Championship, as a replacement for the canceled Rally Sweden.
The rally has been won by five World Rally Champions: Marcus Grönholm, Tommi Mäkinen, Hannu Mikkola, Timo Salonen and Ari Vatanen. In recent years, it has attracted competitors from circuit racing. The 2009 entry list included four current or former Formula One drivers; JJ Lehto finished ninth on his tenth Arctic Rally, Kimi Räikkönen 13th on his first-ever rally competition, Mika Häkkinen 19th on his fourth outing in the event while a gearbox failure ended Mika Salo's third Arctic Rally. Most recently, Valtteri Bottas finished fifth overall in 2019, ninth in 2020 and sixth in January 2021. In 2020, Kalle Rovanperä won his first ever event driving a World Rally Car, the Toyota Yaris WRC. Juho Hänninen won the January 2021 event. | WIKI |
Talk:Development of Jehovah's Witnesses doctrine/Archive 3
606 to 607
I explained my deletion of this part poorly in my edit notes. The Jehovah's Witnesses went from using AD to CE at about the time the previous writer cites as their change in dating things. Since the difference between 606 and 607 is critical for many of their beliefs about time, I removed it, as I believe this alteration was not a doctrinal change, but a shift due to their use of CE vs. AD. I can't remember the specific reference, but here's one that is close, from the Watchtower Bible and Tract Society's "All Scripture" book: Now, since the Common Era did not begin with the year zero but began with 1 C.E., and the calendar for the years before the Common Era did not count back from a zero year but began with 1 B.C.E., the figure used for the year in any date is in reality an ordinal number. That is, 1990 C.E. really represents 1989 full years since the beginning of the Common Era, and the date July 1, 1990, represents 1,989 years plus a half year since the beginning of the Common Era. The same principle applies to B.C.E. dates. So to figure how many years elapsed between October 1, 607 B.C.E., and October 1, 1914 C.E., add 606 years (plus the last three months of the previous year) to 1,913 (plus the first nine months of the next year), and the result is 2,519 (plus 12 months), or 2,520 years. Or if you want to figure what date would be 2,520 years after October 1, 607 B.C.E., remember that 607 is an ordinal number—it really represents 606 full years—and since we are counting, not from December 31, 607 B.C.E., but from October 1, 607 B.C.E., we must add to 606 the three months at the end of 607 B.C.E. Now subtract 606 1/4 from 2,520 years. The remainder is 1,913 3/4. That means that 2,520 years from October 1, 607 B.C.E., takes us 1,913 3/4 years into the Common Era—1,913 full years brings us to the beginning of 1914 C.E., and three fourths of a year in addition brings us to October 1, 1914 C.E. If anyone has a different source, I am genuinely interested to see it. I might be working with limited information. Babuinu (talk) 04:45, 29 May 2008 (UTC) | WIKI |
2006 AAMI Classic – Draw
Roger Federer was the defending champion, but lost in the first round to Tommy Haas.
Andy Roddick won in the final 6–3, 7–6(8–6), against Tommy Haas.
Players
• # Roger Federer (first round, fifth place)
• # 🇺🇸 Andy Roddick (champion, first place)
• # 🇦🇷 David Nalbandian (first round, retired/withdrew due to a stomach virus)
• # 🇦🇷 Guillermo Coria (semifinals, third place)
• # Ivan Ljubičić (first round, seventh place)
• # 🇩🇪 Nicolas Kiefer (semifinals, retired/withdrew due to an ankle injury)
• # 🇫🇷 Gaël Monfils (first round, eighth place)
• # 🇩🇪 Tommy Haas (final, second place)
• # 🇧🇾 Max Mirnyi (replaced David Nalbandian, Sixth place/replaced Nicolas Kiefer, fourth place) | WIKI |
Basic Flowchart Symbols and Meaning
Basic Flowchart Symbols and Meaning
Flowcharts are the best for visually representation the business processes and the flow of a custom-order process through various departments within an organization. ConceptDraw PRO diagramming and vector drawing software extended with Flowcharts solution offers the full set of predesigned basic flowchart symbols which are gathered at two libraries: Flowchart and Flowcharts Rapid Draw. Among them are: process, terminator, decision, data, document, display, manual loop, and many other specific symbols. The meaning for each symbol offered by ConceptDraw gives the presentation about their proposed use in professional Flowcharts for business and technical processes, software algorithms, well-developed structures of web sites, Workflow diagrams, Process flow diagram and correlation in developing on-line instructional projects or business process system. Use of ready flow chart symbols in diagrams is incredibly useful - you need simply drag desired from the libraries to your document and arrange them in required order. There are a few serious alternatives to Visio for Mac, one of them is ConceptDraw PRO. It is one of the main contender with the most similar features and capabilities. Read more
How to Build a Flowchart
How to Build a Flowchart
"In mathematics, the Euclidean algorithm, or Euclid's algorithm, is a method for computing the greatest common divisor (GCD) of two (usually positive) integers, also known as the greatest common factor (GCF) or highest common factor (HCF). ...
The GCD of two positive integers is the largest integer that divides both of them without leaving a remainder (the GCD of two integers in general is defined in a more subtle way).
In its simplest form, Euclid's algorithm starts with a pair of positive integers, and forms a new pair that consists of the smaller number and the difference between the larger and smaller numbers. The process repeats until the numbers in the pair are equal. That number then is the greatest common divisor of the original pair of integers.
The main principle is that the GCD does not change if the smaller number is subtracted from the larger number. ... Since the larger of the two numbers is reduced, repeating this process gives successively smaller numbers, so this repetition will necessarily stop sooner or later - when the numbers are equal (if the process is attempted once more, one of the numbers will become 0)." [Euclidean algorithm. Wikipedia]
The flowchart example "Euclidean algorithm" was created using the ConceptDraw PRO diagramming and vector drawing software extended with the Mathematics solution from the Science and Education area of ConceptDraw Solution Park. Read more
Euclid's algorithm flow chart
Euclid's algorithm flow chart, terminator, start, end, rectangle, process, action, decision, connector,
mathematical diagrams, mathematical symbols, tape diagrams Mathematics
mathematical diagrams, mathematical symbols, tape diagrams
Mathematics solution extends ConceptDraw PRO software with templates, samples and libraries of vector stencils for drawing the mathematical illustrations, diagrams and charts. Read more
flow chart software, flowchart maker, flowchart, flow chart Flowcharts
flow chart software, flowchart maker, flowchart, flow chart
The Flowcharts Solution for ConceptDraw PRO v10 is a comprehensive set of examples and samples in several different color themes for professionals that need to graphically represent a process. Solution value is added by basic flow chart template and shapes' library of Flowchart notation. ConceptDraw PRO flow chart creator lets one depict a processes of any complexity and length, as well design of the flowchart either vertically or horizontally. Read more
Types of Flowchart - Overview
When designing a process or an instruction in clear and understandable way, you should consider creating a flowchart. You can avoid spending a lot of time understanding complex concepts as they get clear with different diagrams. The flowcharts are very popular diagram type, they are useful at different fields from the description business processes to the presentation of cooking recipes. Basic Flowchart, Business Process Modeling Diagram, Process Flowchart, Cross Functional Flowchart, Procedure Flowchart, Data Flow Diagram, IDEF Flowchart, SDL Diagram, Workflow Diagram, Document Flowchart, Program Flowchart, Value Stream Map, System Flowchart, Highlight Flowchart, Sales Flowchart are the main types flowchart. The ConceptDraw PRO is one of the professional applications which has great advantages and using which you can create different types of Flowcharts easy and fast. Try to draw an illustrative and comprehensible diagram in ConceptDraw PRO describing the processes instead of writing complex long text and make sure how it is convenient. Visio is expensive, and if you use it in a team environment, these costs are compounded. ConceptDraw PRO is an affordable alternative to Visio and luckily, it comes with a team plan. ConceptDraw PRO can import and export Visio files, so Mac users can collaborate with PC users stuck on Microsoft's software. Read more
How to Simplify Flow Charting
How to Simplify Flow Charting
Account Flowchart. Flowchart Examples
Create your own flow charts of computer or network system account processing using the ConceptDraw PRO diagramming and vector drawing software extended with the Cross-Functional Flowcharts solution from the Business Processes area of ConceptDraw Solution Park. The flow chart example shows the computer network system account processing. Read more
Best Vector Drawing Application for Mac OS X
ConceptDraw PRO creates drawings, diagrams and charts with great visual appeal in Mac OS X. Read more
Scientific Symbols Chart
ConceptDraw PRO is the beautiful design software that provides many vector stencils, examples and templates for drawing different types of illustrations and diagrams.
Mathematics Solution from the Science and Education area of ConceptDraw Solution Park includes a few shape libraries of plane, solid geometric figures, trigonometrical functions and greek letters to help you create different professional looking mathematic illustrations for science and education. Read more
Best Multi-Platform Diagram Software
ConceptDraw PRO is a powerful tool for drawing business communication ideas and concepts, simple visual presentation of numerical data in the Mac environment. Read more
Introduction to bookkeeping: Accounting flowchart process
Everything about Bookkeeping: Accounting flowchart process. Which symbols to use, how to make a chart. Read more
HelpDesk
How to Draw Geometric Shapes in ConceptDraw PRO
Knowledge of geometry grants people good logic, abstract and spatial thinking skills. The object of study of geometry are the size, shape and position, the 2-dimensional and 3-dimensional shapes. Geometry is related to many other areas in math, and is used daily by engineers, architects, designers and many other professionals. Today, the objects of geometry are not only shapes and solids. It deals with properties and relationships and looks much more about analysis and reasoning. Geometry drawings can be helpful when you study the geometry, or need to illustrate the some investigation related to geometry. ConceptDraw PRO allows you to draw plane and solid geometry shapes quickly and easily. Read more
The Best Drawing Program for Mac
ConceptDraw PRO is the professional business graphic software for drawing diagrams and charts with great visual appeal on Mac OS X. Read more
3 Circle Venn Diagram. Venn Diagram Example
This template shows the Venn Diagram. It was created in ConceptDraw PRO diagramming and vector drawing software using the ready-to-use objects from the Venn Diagrams Solution from the "What is a Diagram" area of ConceptDraw Solution Park. Venn Diagrams visualize all possible logical intersections between several sets and are widely used in mathematics, logic, statistics, marketing, sociology, etc. Read more
HelpDesk
How to Create a Venn Diagram in ConceptDraw PRO
Venn diagrams were invented by John Venn as a method of depicting relationships between different components. A Venn diagram consists of two or more circles. Each circle represents a specific group or set. The entities which are depicted by circles generally have some common characteristics. A Venn Diagram shows all the possible logical relations between these entities. Any properties that belong to more than one set should be indicated in the sections where the circles overlap. A Venn Diagram can be useful to visually summarize the status and future viability of a project. ConceptDraw PRO allows you to make a Venn diagrams using the Venn Diagrams solution. Read more | ESSENTIALAI-STEM |
Page:Popular Science Monthly Volume 21.djvu/791
Rh , and of which only the closing portion sets forth ethical conclusions as corollaries from all the conclusions that have preceded.
There remains only to answer the question, How could Mr. Mozley have been led to imagine a resemblance between things so different? He has himself gone far toward furnishing an explanation. In his introduction (page 1) he admits, or rather asserts, that "reminiscences are very suspicious matter"; and that "the mental picture of events long passed by, and seen through an increasing breadth of many-tinted haze, is liable to be warped and colored by more recent remembrances, and by impressions received from other quarters." He adds sundry illustrations of the extreme untrustworthiness of memory concerning the remote past; and in chapter lxxxiii he characterizes Denison's "Reminiscences of Oriole College" as a "jumble of inaccuracies, absurdities, and apparent forgets." Moreover, he indicates (page 4) a special cause of distortion, saying of those "whose memory is subordinate to imagination and passion" that "they remember too easily, too quickly, and too much as they please." Now, as is implied by his religious ideas and ecclesiastical leanings, and as is also shown by a passage in which he refers to the scientific school with manifest aversion, Mr. Mozley is biased toward an interpretation which tends to discredit this school, or a part of it; and, obviously, to fancy a resemblance between scientific views now current and those which he describes as a "dream" of his youth, which disappeared with his manhood, is not unsatisfactory. On looking through the "many-tinted haze" of sixty years at what he admits to be "a vague idea" of his early philosophy, he has unconsciously "warped and colored" it, and imagined in it a resemblance which, as I have shown, it could not possibly have had.
I will add only that serious injustice is apt to be done by publication of reminiscences which concern others than the writer of them. Widely diffused as is Mr. Mozley's interesting work, his statement will be read and accepted by thousands who will never see this rectification.—Athenæum.
THE chief explosive mixture used in the arts of war and peace will probably for a long time continue to be that which we know by the name of gunpowder. It has been used so long that its origin (like that of the mariner's compass) is entirely lost in the misty atmosphere of the middle ages, if indeed it was not known before the Christian era. The ingredients spoken of by Roger Bacon in 1237, in his | WIKI |
Türkiye (disambiguation)
Türkiye or Turkey is a transcontinental country straddling West Asia and Southeast Europe.
Türkiye or Turkiye may also refer to:
* SS LASH Türkiye, former name of the SS Cape Florida
* Türkiye (newspaper), a Turkish newspaper
* Türkiye.gov.tr, a Turkish public services website; see | WIKI |
Malala and Nobel laureates call on U.N. to stop Myanmar killings
LONDON (Thomson Reuters Foundation) - A dozen Nobel laureates, including Malala Yousafzai and Muhammad Yunus, urged the United Nations on Wednesday to use “all available means” to end violence in Myanmar that has forced about 400,000 Rohingya Muslims to flee to Bangladesh. The exodus began after a series of Rohingya militant attacks sparked a sweeping military response in Buddhist-majority Myanmar, which the U.N. rights agency said was a “textbook example of ethnic cleansing”. “We urge you to take decisive actions to stop the violence against innocent civilians,” Yousafzai and 29 others, including Archbishop Desmond Tutu and British billionaire Richard Branson, said in an open letter to the U.N. Security Council. “Complete villages have been burned, women raped, many civilians arbitrarily arrested, and children killed,” the laureates said. The appeal came as the Security Council was due to meet behind closed doors for the second time since the crisis erupted in August, adding to mounting pressure faced by Myanmar’s leader Aung San Suu Kyi. Critics say Suu Kyi, who is also a Nobel laureate, should be stripped of her prize for failing to do more to end the strife. Suu Kyi’s office said on Wednesday that she had canceled her trip to the U.N. because of the crisis. Reports from refugees and rights groups paint a picture of widespread attacks on Rohingya villages in the north of Rakhine state by the security forces and ethnic Rakhine Buddhists, who have torched numerous Muslim villages. Myanmar authorities have denied that the security forces, or Buddhist civilians, have been starting the fires, instead blaming the insurgents. Myanmar has restricted most aid agency access to the north of Rakhine, with some officials accusing them of supporting the insurgents. The letter called for Myanmar’s government to implement the recommendations of a commission led by former U.N. chief Kofi Annan to give the Rohyingya citizenship and freedom of movement. Myanmar’s government regards Rohingya as illegal migrants from Bangladesh, even though many have lived in the country for generations. “The government of Myanmar needs to be told that international support and finance is conditional on a major change in policy towards the Rohingya,” the laureates said. Reporting by Umberto Bacchi @UmbertoBacchi, Editing by Katy Migiro. Please credit the Thomson Reuters Foundation, the charitable arm of Thomson Reuters, that covers humanitarian news, women's rights, trafficking, property rights, climate change and resilience. Visit news.trust.org | NEWS-MULTISOURCE |
The Velvet Lady
The Velvet Lady is a "musical comedy in three acts" with music by Victor Herbert and a book and lyrics by Henry Blossom. Blossom's book is an adaptation of Fred Jackson's 1915 play A Full House. It was the final collaboration between Herbert and Blossom; premiering on Broadway just a month before Blossom's death. The musical opened at Broadway's New Amsterdam Theatre on February 3, 1919. It closed at that theatre in June 1919 after 136 performances. The production starred Fay Marbe as Vera Venon, a.k.a "The Velvet Lady", Ernest Torrence as Parks, Marie Flynn as Ottilie Howell, Ray Raymond as George Howell, Georgia O'Ramey as Susie, Minerva Coverdale as Bubbles, Alfred Gerrard as Ned Pembroke, and Jed Prouty as Nicholas King. | WIKI |
Preparation and characterization of self-assembled nanoparticles based on glycol chitosan bearing adriamycin
Jae Hyung Park, Yong Woo Cho, Yoen Ju Son, Kwangmeyung Kim, Hesson Chung, Seo Young Jeong, Kuiwon Choi, Chong Rae Park, Rang Woon Park, In San Kim, Ick Chan Kwon
Research output: Contribution to journalArticlepeer-review
50 Scopus citations
Abstract
An anthracycline drug, adriamycin, was chemically conjugated onto the backbone of glycol chitosan via an acid-labile cis-aconityl linkage. The physicochemical characteristics of the glycol chitosan-adriamycin (GC-ADR) conjugates were investigated by dynamic light scattering, atomic force microscopy, and fluorescence spectroscopy. The GC-ADR conjugates were capable of forming nano-sized self-aggregates in an aqueous medium, when the adriamycin content in the conjugate was in the range of 2.0-5.0 wt.%. The self-aggregates were spherical in shape, and had mean diameters of 238-304 nm, depending on the adriamycin content. The critical aggregation concentrations of the conjugates, estimated by the fluorescence quenching method, were as low as 1.0-2.5×10-2 mg/ml. The size of self-aggregates was not affected by the polymer concentration in the range from 50 to 2,000 μg/ml, and was maintained up to 8 days in phosphate-buffered saline (pH 7.4), indicating high colloidal stability. The release of adriamycin from self-aggregates was significantly dependent on the pH of the medium due to the cis-aconityl linkage; e.g., the amount of adriamycin released for 4 days was 7.3±0.3% at pH 7, whereas it was 29.3±1.9% at pH 4. The cell viability results demonstrated that free adriamycin shows more potent cytotoxicity than the conjugates, primarily attributed to the sustained release of adriamycin from self-aggregates. In conclusion, the self-aggregates, formed by GC-ADR conjugates, might be useful for the site-specific delivery of adriamycin in a sustained manner.
Original languageEnglish
Pages (from-to)763-770
Number of pages8
JournalColloid and Polymer Science
Volume284
Issue number7
DOIs
StatePublished - Apr 2006
Keywords
• Adriamycin
• Cytotoxicity
• Glycol chitosan
• Self-aggregates
• Sustained release
Fingerprint
Dive into the research topics of 'Preparation and characterization of self-assembled nanoparticles based on glycol chitosan bearing adriamycin'. Together they form a unique fingerprint.
Cite this | ESSENTIALAI-STEM |
What Investors Need to Know About the GDS Holdings IPO
The American stock market is home to a growing number of ambitious China-based tech companies. It's no wonder, as this country's investors seem to have a generous appetite for issuers active in the massive Asian market.
Despite recent hiccups, Chinese stocks such as Baidu and NetEase have historically delivered impressive returns over their time on American exchanges. Investors of the country's GDS Holdings will be hoping for the same after the stock hits the market on Wednesday. Here's a brief look at the company and a few words about its IPO.
Image source: Getty Images.
GDS Holdings
GDS Holdings develops and operates a network of data centers -- the facilities that centralize an organization's IT effort -- in China.
All told, as of the end of this past September, it operated nearly 49,000 square meters (527,432 square feet) of data center space located in the key cities of Beijing, Shanghai, Chengdu, Guangzhou, and the "special administrative region" of Hong Kong. Almost 94% of this space was committed. Another 37,000 square meters (398,265 square feet) are under construction.
In its prospectus, GDS Holdings cites data from 451 Research stating that it is the top high-performance, carrier-neutral data center service provider in China, with a market share of just under 25%. It also quotes a 451 Research estimate that the domestic market is anticipated to keep growing, from last year's $1.5 billion to $2.4 billion in 2018.
Judging by the financial statements provided by GDS Holdings, it seems the company has so far benefited from this growth -- at least on the top line. Full-year 2015 revenue was almost 704 million yuan ($104 million), well up from the 2014 tally of 468 million yuan ($69 million).
For the most recent six-month periods, January to June 2016 saw the company book revenue of 447 million yuan ($66 million), against 305 million yuan ($45 million) in the same period the previous year.
However, GDS Holdings posted net losses in all of those periods. In fact, full-year 2015's bottom-line deficit of almost 217 million yuan ($32 million) was almost equaled by the January-June 2016 shortfall of 216 million yuan ($32 million).
This Fool's take
By entering the U.S. market, GDS Holdings is coming into a field of established competitors. CoreSite Realty (NYSE: COR) , Digital Realty Trust (NYSE: DLR) , and QTS (NYSE: QTS) have all been popular stocks on the exchange for years.
It will be a challenge for the Chinese company to distinguish itself in such a crowd, not least because the American incumbents have performed very well in terms of both fundamentals and shareholder return. CoreSite has more than doubled its return over the past two years, with Digital Realty Trust gaining 49% and QTS rising 39%.
Also, unlike GDS Holdings -- which is structured as a traditional company -- those American companies are all real estate investment trusts. This structure requires an entity to pay out the bulk of its earnings as shareholder dividends. Since CoreSite, Digital Realty Trust, and QTS have been consistently profitable of late, this means a steady stream of investor distributions.
GDS Holdings, on the other hand, has never paid a dividend. And in its prospectus, it admits that it has no plans to do so in the immediate future.
So in spite of its obvious growth potential and those climbing top-line figures, I don't think GDS Holdings will look tempting next to those companies. Additionally, its fellow China tech companies are more established and reliably profitable, and thus more likely to be favored by investors who want to put money into that country's tech sector.
This stock will be an interesting and unique addition to the lineup of data center providers currently listed on our stock exchanges. But I wouldn't expect it to be any more popular than its American data center rivals or its fellow Chinese techs.
The details
GDS Holdings is selling 19.25 million American Depositary Shares in its IPO. These are set to be priced between $12 and $14 per ADS. The company will be listed on the Nasdaq under the ticker symbol GDS.
The issue's underwriting syndicate includes Credit Suisse , JPMorgan Chase division J.P. Morgan, and Citigroup .
A secret billion-dollar stock opportunity
The world's biggest tech company forgot to show you something, but a few Wall Street analysts and the Fool didn't miss a beat: There's a small company that's powering their brand-new gadgets and the coming revolution in technology. And we think its stock price has nearly unlimited room to run for early in-the-know investors! To be one of them, just click here .
Eric Volkman has no position in any stocks mentioned. The Motley Fool owns shares of and recommends Baidu. The Motley Fool recommends NetEase. Try any of our Foolish newsletter services free for 30 days . We Fools may not all hold the same opinions, but we all believe that considering a diverse range of insights makes us better investors. The Motley Fool has a disclosure policy .
The views and opinions expressed herein are the views and opinions of the author and do not necessarily reflect those of Nasdaq, Inc.
The views and opinions expressed herein are the views and opinions of the author and do not necessarily reflect those of Nasdaq, Inc. | NEWS-MULTISOURCE |
noggrann
Adjective
* 1) careful, scrupulous taking care to do something right
* 2) accurate, precise | WIKI |
SphereOneManager
The SphereOneManager is how you will interact with the SDK. Its a singleton MonoBehavior that can be accessed anywhere in your code, and will stay instantiated across scenes with DontDestroyOnLoad(). It should be placed in your starting scene.
Configuration
You'll need to add your api key (provided by SphereOne), and if using Popup mode add your Client Id and Redirect URL (the URL your game is deployed to or http://localhost:port for testing).
Login Mode
You will need to choose a login mode for you game. Currently we support 2 modes: Slideout and Popup.
• Slideout Mode
• This mode will embed the SphereOne Wallet (https://wallet.sphereone.xyz) into an iframe that slides out on top of your game. This gives your players a convenient way to quickly access their wallet without leaving the game.
• Popup Mode
• This mode will launch an auth popup when SphereOneManager.Instance.Login() is called. Once the player logs in, it will redirect them back to your game and load their credentials.
• Once authenticated, the SDK will encrypt the player's credentials and store in the browser's local storage.
iOS / Android
• A custom Redirect Scheme can be used to differentiate your app from others installed on the users device.
• This can be configured on the SphereOneManager editor
• Make sure to update the scheme value in the android manifest file - Assets/Plugins/Android/AndroidManifest.xml
Environments
• Editor
• For local testing in the editor (play mode), mock data can be used to simulate data coming from the SphereOne API. This mode uses mock data from multiple json files located in SphereOne / Scripts / MockData.
• You must switch to production before building.
• Production
• This environment will connect to the production SphereOne API, and use real data.
Accessing the SDK
using SphereOne;
...
SphereOneManager.Instance
Accessing Data
TODO
Events
The SDK provides delegate events that your scrips can observe.
These events trigger when new data is fetched from the Sphere One API. This happens during the awake() method of SphereOneManager, or when you manually call to fetch new data.
void OnEnable()
{
SphereOneManager.onUserLoaded += UserLoaded;
SphereOneManager.onUserLogout += ClearAll;
SphereOneManager.onUserWalletsLoaded += WalletsLoaded;
SphereOneManager.onUserBalancesLoaded += AccountsLoaded;
SphereOneManager.onUserNftsLoaded += NftsLoaded;
}
void OnDisable()
{
SphereOneManager.onUserLoaded -= UserLoaded;
SphereOneManager.onUserLogout -= ClearAll;
SphereOneManager.onUserWalletsLoaded -= WalletsLoaded;
SphereOneManager.onUserBalancesLoaded -= AccountsLoaded;
SphereOneManager.onUserNftsLoaded -= NftsLoaded;
}
void UserLoaded(User user)
{
// do work
}
void WalletsLoaded(List<Wallet> wallets)
{
// do work
}
...
Create a charge
var chargeItems = new List<ChargeItem>
{
new ChargeItem
{
name = "Your Item",
image = "https://your-image-url.somewhere.com",
amount = 0.9,
quantity = 1,
}
};
var chargeRequest = new ChargeReqBody
{
chain = SupportedChains.SOLANA,
symbol = "SOL",
amount = 0.9,
tokenAddress = "So11111111111111111111111111111111111111112",
items = chargeItems,
successUrl = "https://your-website.com/success",
cancelUrl = "https://your-website.com/cancel",
};
var isTest = false;
var charge = await SphereOneManager.Instance.CreateCharge(chargeRequest, isTest);
if (charge == null) {
// Handle the error
return;
}
Debug.Log(charge.ToString());
Pay a charge
var payment = await SphereOneManager.Instance.PayCharge(charge.chargeId);
if (payment == null)
{
// Handle the error
return;
}
Debug.Log(payment.ToString());
// Payment has been submitted, it will take a few minutes to process
// At this point, your game server should listen to the webhook from sphereone (setup in the merchant dashboard)
// Sphereone will trigger the webhook when the payment completes successfully or fails | ESSENTIALAI-STEM |
Serverless Try/Catch/Finally with IBM Composer
It’s been a few weeks since I blogged about IBM Composer, sorry about that, flying to China and getting a kid will put a kink into your blogging schedule. ;) Today I want to share a simple demo of how to wrap serverless functions with try/catch and try/catch/finally logic. Let’s start off with a simple function.
function main(args) {
if(!args.input) args.input = 0;
if(args.input === 0) {
throw new Error("Can't divide by zero and maintain the Universe.");
}
return { result: 10/args.input };
}
This function simply takes an input value and then returns the result of dividing it into ten. If the input is 0, an error is thrown. I called this function tendividedby. Here’s a sample result using an input of 2:
{
"result": 5
}
And here is a result when the input is 0:
{
"error": "An error has occurred: Error: Can't divide by zero and maintain the Universe."
}
If you get the activation record for the last test, you can clearly see it reported as an error:
"response": {
"status": "action developer error",
"statusCode": 0,
"success": false,
"result": {
"error": "An error has occurred: Error: Can't divide by zero and maintain the Universe."
}
},
Alright, so what if we don’t want an error reported? This is where a try/catch composition will come in handy. I begin by creating a new file for my composition, app.js. Here’s the code.
composer.try(
'safeToDelete/tendividedby',
args => ({result:'invalid input'})
);
The composition consists of one command, composer.try. This command takes two arguments - the action to try running and an action to run on failure. In the example above an inline action is being used but you can definitely pass the name of an existing action instead. My inline action simply says to return a result with a string indicating the error. You could do other things of course, for example sending an email about the error so people could be notified.
So that’s try/catch, nice and simple. How about try/catch/finally? While this isn’t built into the composer function itself, you can “fake” it by simply using a sequence where the “finally” part comes after the try/catch. Here’s how that could look:
composer.sequence(
composer.try(
'safeToDelete/tendividedby',
args => ({result:'invalid input'})
),
'safeToDelete/final'
)
In this case, I’ve set the “finally” part of my logic to be an action called final. All that does is add a timestamp:
function main(args) {
//just take the result and add a time
args.timestamp = new Date();
return args;
}
In case you’re curious, this could also be an inline function, but I wanted to demonstrate a mixture of both. To start working with this composition, first I create it:
fsh app create trycatchdemo app.js
Then I invoke it:
fsh app invoke trycatchdemo --param input 5
This results in:
{
result: 2,
timestamp: "2017-11-22T13:52:32.177Z"
}
And here is the error condition version:
{
result: "invalid input",
timestamp: "2017-11-22T13:52:53.489Z"
}
What’s cool is that the Composer’s graphical shell does a kick butt job of rendering these calls. So for example, here is the good test:
Good example
And here is the bad run:
Bad example
If you have any questions about these examples, let me know!
Raymond Camden's Picture
About Raymond Camden
Raymond is a developer advocate for Extend by Auth0. He focuses on serverless and enterprise cat demos. If you like this article, please consider visiting my Amazon Wishlist or donating via PayPal to show your support.
Lafayette, LA https://www.raymondcamden.com
Comments | ESSENTIALAI-STEM |
Solved
SQLPLUS SUBSTR
Posted on 2007-04-06
5
4,908 Views
Last Modified: 2013-12-19
how do I get the first name out of a string like this with sql plus in oracle.
DOE-DOE, JOHN-XXXX
JOHN would be the first name.
0
Comment
Question by:fusebox
5 Comments
LVL 7
Expert Comment
by:gattu007
ID: 18867348
I dont think using substar you can know all the first names... coz substar will not know the number of characters....
you can first count the number of characters... either programetically
The "substring" functions return a portion of string, beginning at character position, substring_length characters long. SUBSTR calculates lengths using characters as defined by the input character set. SUBSTRB uses bytes instead of characters. SUBSTRC uses Unicode complete characters. SUBSTR2 uses UCS2 codepoints. SUBSTR4 uses UCS4 codepoints.
The following example returns several specified substrings of "ABCDEFG":
SELECT SUBSTR('ABCDEFG',3,4) "Substring"
FROM DUAL;
Substring
---------
CDEF
SELECT SUBSTR('ABCDEFG',-5,4) "Substring"
FROM DUAL;
Substring
---------
CDEF
http://download-east.oracle.com/docs/cd/B10501_01/server.920/a96540/functions119a.htm#1004186
0
Author Comment
by:fusebox
ID: 18867583
I was thinking that it should be something like substr(column,instr(column but not sure of the exact sequence.
0
LVL 12
Accepted Solution
by:
jwahl earned 500 total points
ID: 18868848
yes, it works with SUBSTR and INSTR combinations, but it's hard to read:
1)
INSTR('DOE-DOE, JOHN-XXXX', ', ') +2 ... beginning of code to extract:
SQL> SELECT SUBSTR('DOE-DOE, JOHN-XXXX', INSTR('DOE-DOE, JOHN-XXXX', ', ') + 2) FROM dual;
JOHN-XXXX
2)
INSTR('DOE-DOE, JOHN-XXXX', '-', -1) ... absolute position of ending code to extract:
SQL> SELECT INSTR('DOE-DOE, JOHN-XXXX', '-', -1) FROM dual;
14
3)
length of the string:
SQL> SELECT LENGTH('DOE-DOE,JOHN-XXXX') FROM dual;
17
4)
finally the complete set:
SQL>
SELECT SUBSTR('DOE-DOE, JOHN-XXXX',
INSTR('DOE-DOE, JOHN-XXXX', ', ') + 2,
LENGTH('DOE-DOE, JOHN-XXXX') - INSTR('DOE-DOE,JOHN-XXXX','-',-1) - 1
)
FROM dual;
JOHN
but i'd recommend to write a stored procedure or function ...
0
LVL 32
Expert Comment
by:awking00
ID: 18869894
As stated herein, the solution is going to be some combination of substr and instr depending on the structure of the data. If the first name ALWAYS starts after the ", " (comma, space) and ALWAYS before the last "-" (hyphen), then jwahl's proposed solution will work fine. If the possibility exists that the data can have a different structure (e.g. there is no hyphen after the first name), then more diagnostics will be required to cover all of the possibilities. If you know of all the possible data formats, post them here and we'll try and work out a suitable query.
0
LVL 28
Expert Comment
by:Naveen Kumar
ID: 18875928
Writing a stored procedure is the best way to implement these type of logics because they give you the flexibility to debug and even for code changes.
We can do anything with a sql query but that cannot be used for reengineering later. I mean later on if someone has to work on that sql, it will be difficult for understanding/complex will be more because we might have tried to each include possibility of data and so there is a very good chance of the sql statement growing bigger and bigger everyday to accomodate logic for new cases discovered over a period of time.
Thanks
0
Featured Post
PRTG Network Monitor: Intuitive Network Monitoring
Network Monitoring is essential to ensure that computer systems and network devices are running. Use PRTG to monitor LANs, servers, websites, applications and devices, bandwidth, virtual environments, remote systems, IoT, and many more. PRTG is easy to set up & use.
Question has a verified solution.
If you are experiencing a similar issue, please ask a related question
Suggested Solutions
Title # Comments Views Activity
Oracle DATE Column Space 11 79
sort a spool into file output in oracle 1 28
Oracle SQL Select unique values from two columns 4 53
oracle- set role and grant privileges 6 28
Article by: Swadhin
From the Oracle SQL Reference (http://download.oracle.com/docs/cd/B19306_01/server.102/b14200/queries006.htm) we are told that a join is a query that combines rows from two or more tables, views, or materialized views. This article provides a glimps…
Background In several of the companies I have worked for, I noticed that corporate reporting is off loaded from the production database and done mainly on a clone database which needs to be kept up to date daily by various means, be it a logical…
This video explains at a high level about the four available data types in Oracle and how dates can be manipulated by the user to get data into and out of the database.
This videos aims to give the viewer a basic demonstration of how a user can query current session information by using the SYS_CONTEXT function
770 members asked questions and received personalized solutions in the past 7 days.
Join the community of 500,000 technology professionals and ask your questions.
Join & Ask a Question | ESSENTIALAI-STEM |
User:Seyvon
Seyvon - Mission Viejo, CA
Yup, that's me. I want to help the world by sharing my knowledge and contributing in any way I can. Maybe I can learn something too. | WIKI |
Talk:Advanced Camera for Surveys
the article says field-of-view of 200"×204" but i'm pretty sure it is 204"x204". please verify. <IP_ADDRESS> 02:23, 15 January 2006 (UTC) | WIKI |
REFILE-Britain's FTSE led higher by Coca-Cola HBC and miners
(Refiles to fix spelling in headline) * FTSE 100 up 1.5 pct * Coco-Cola HBC rises after upgrade * Miners up as metals prices firm * Ladbrokes gains after competition regulator decision By Kit Rees LONDON, May 20 (Reuters) - UK shares rose on Friday, set for their biggest daily gain in more than a month after a rise in bottling company Coca-Cola HBC and a rally in mining stocks. The blue-chip FTSE 100 index rose 1.5 percent to 6,144.42 points by 0826 GMT, outperforming the broader European market. Among the top risers, Coca-Cola HBC jumped 4.2 percent after Citigroup raised its rating on the stock to “buy”. Analysts at Citigroup said that concerns which included a potential naira devluation and rising world sugar prices were priced in, while they expected a visible margin recovery opportunity to be an important driver of share performance. “With the shares trading at a 5-year peak discount to peers ... we feel these concerns are priced in, providing a good opportunity to buy into improving fundamentals,” analysts at Citigroup said in a note. Miners were the top sectoral gainers, with the FTSE 350 Mining index rising 2.8 percent as metals prices firmed, with copper supported by signs of more demand in China as local prices rose. Miners Anglo American, Glencore, Rio Tinto , BHP Billiton and Antofagasta all rose between 2.1 percent to 5 percent. Outside of the blue chips, bookmaker Ladbrokes surged 10.9 percent after the British competition regulator said that Ladbrokes and Gala Coral would have to sell between 350 to 400 shops to win clearance for their merger. Traders said that the number of shops the two firms would have to sell were less than expected. “The regulator’s been softer on the deal. It’s not a done deal, but it’s more doable now ... it’s going in the right direction in favour of the merger,” Zeg Choudhry, managing director at LONTRAD, said. Electrical engineering company Spectris dropped over 7 percent, hitting a three-month low after posting a softer first-quarter results. The company said that trading conditions in the period continued to be challenging, and reiterated its 2016 oulook. ADVISORY- Reuters plans to replace intra-day European and UK stock market reports with a Live Markets blog on Eikon (see cpurl://apps.cp./cms/?pageId=livemarkets for site in development). In a real-time, multimedia format from 0600 London time through the 1630 closing bell, it will include the best of our market reporting, Stocks Buzz service, Eikon graphics, Reuters pictures, eye-catching research and market zeitgeist. Breaking news and dramatic market moves will continue to be alerted to all clients and we will continue to provide a short opening story and comprehensive closing reports. If you have any thoughts, suggestions or feedback on this, please email mike.dolan@thomsonreuters.com. Mike Dolan, Markets Editor EMEA. (Reporting by Kit Rees; Editing by Toby Chopra) | NEWS-MULTISOURCE |
PIA04357: Where on Earth...? MISR Mystery Image Quiz #18:
Normandy, Poitou, Bourgogne Regions, France
Target Name: Earth
Is a satellite of: Sol (our sun)
Mission: Terra
Spacecraft: Terra
Instrument: MISR
Product Size: 1337 x 1692 pixels (width x height)
Produced By: JPL
Full-Res TIFF: PIA04357.tif (6.794 MB)
Full-Res JPEG: PIA04357.jpg (680.6 kB)
Click on the image above to download a moderately sized image in JPEG format (possibly reduced in size from original)
Original Caption Released with Image:
Here's another chance to play geographical detective! This natural-color image from the Multi-angle Imaging SpectroRadiometer (MISR) represents an area of about 368 kilometers x 465 kilometers, and was captured by the instrument's vertical-viewing (nadir) camera in March, 2004. Use any reference materials you like and answer the following 5 questions:
1. The soils in the prominent pale tan area in the upper right are derived from marine fossil sediments that accumulated there over two million years ago. Partly because of its well-drained, chalky soils, this region is renowned for a particular agricultural product. What is that product?
2. The large river apparent just above image center traverses agricultural, urban, pastoral and forested lands before emerging at the coast in the upper left. Below are three true statements about water quality in the river now, as compared with 30 years ago, and one false statement. Which one is the false statement?
(A) The concentration of dissolved oxygen in the waters of the river is now lower.
(B) The concentration of nitrates in the waters of the river is now higher.
(C) The concentration of phosphate in the waters of the river is now lower.
(D) The number of fish and the diversity of species found in the waters of the river is now higher.
3. The aforementioned river flows through a city, indicated by the pale purple-gray area above image center. Many of the city's notable architectural monuments are located along the river. Are the majority of these monuments situated upstream or downstream of the island at the city's center?
4. There are two wetland areas within the image that have been internationally recognized for their significance. Two of these statements are true for one wetland and the other two are true for the other wetland. In which combination (AB-CD, AC-BD or BC-AD) should the statements be paired?
(A) thousands of small man-made and semi-natural lakes are found here
(B) the sea eagle regularly spends its winters here
(C) there are 50 different types of dragonfly found here
(D) this lowland complex includes three major vegetation zones
5. Two clusters of very dark brown pixels surrounded by green, are apparent in the top right-hand corner and at the right-hand edge toward the bottom. Which of the following best describes both of these areas in terms of surface characteristics?
(A) low-lying pasture and cropland
(B) high-country forest
(C) low-lying forest
(D) high-country pasture and cropland
E-mail your answers, name (initials are acceptable if you prefer), and your hometown by the quiz deadline of Tuesday, May 11, 2004, to suggestions@mail-misr.jpl.nasa.gov.
Answers will be published on the MISR Quiz page . The names and home towns of respondents who answer all questions correctly by the deadline will also be published in the order responses were received. The first 3 people on this list who are not affiliated with NASA, JPL, or MISR and who have not previously won a prize will be sent a print of the image.
A new "Where on Earth...?" mystery appears as the MISR "latest featured image" approximately once every two months. New featured images are released on Wednesdays at noon Pacific time on the MISR home page, http://www-misr.jpl.nasa.gov.
The image also appears on the Earth Observatory, http://earthobservatory.nasa.gov/, and on the Atmospheric Sciences Data Center home pages, http://eosweb.larc.nasa.gov/ , though usually with a several-hour delay.
MISR was built and is managed by NASA's Jet Propulsion Laboratory, Pasadena, CA, for NASA's Office of Earth Science, Washington, DC. The Terra satellite is managed by NASA's Goddard Space Flight Center, Greenbelt, MD. JPL is a division of the California Institute of Technology.
Image Credit:
NASA/GSFC/LaRC/JPL, MISR Team
Image Addition Date:
2004-04-28 | ESSENTIALAI-STEM |
A regular expression, abbreviated regex or regexp, is a very old and powerful way to describe search patterns by using a concise text string to define complex searching algorithms. As a programmer, if you can master regular expressions, you can save yourself a whole lot of time and effort. One regular expression can often accomplish what would otherwise take tens or hundreds of code.
Regular expressions are frequently used to check for the validity of text strings of any sequence of characters. Here is what a typical regex to validate date format looks like in Javascript:
function validateDate(testdate) {
var date_regex = /^(0[1-9]|1[0-2])\/(0[1-9]|1\d|2\d|3[01])\/(19|20)\d{2}$/ ;
return date_regex.test(testdate);
}
You’re probably wondering why you couldn’t just, say, use Date.Parse() in Javascript. That works well until you try to mess around with the UK date format (dd/mm/yyyy).
Now that we know how useful regular expressions are, I want to just list a few handy ones.
1. Test password strength
/^(?=.*[A-Z].*[A-Z])(?=.*[!@#$&*])(?=.*[0-9].*[0-9])(?=.*[a-z].*[a-z].\*[a-z]).{8}$/
Breakdown:
/ Delimiter
^ Start anchor
(?=.*[A-Z].*[A-Z]) Ensure string has two uppercase letters
(?=.\*[[email protected]#$&\*]) Ensure string has one special case letter
(?=.*[0-9].*[0-9]) Ensure string has two digits
(?=.*[a-z].*[a-z].\*[a-z]) Ensure string has three lowercase letters
.{8} Ensure string is of length 8
$ End anchor
2. Matching an integer
/^-?\d+$/
3. Validate an email address
/^([a-z0-9\_\.-]+)@([\da-z\.-]+)\.([a-z\.]{2,6})$/
4. Validate IPv4 addresses
/^(?!0)(?!.\*\.$)((1?\d?\d|25[0-5]|2[0-4]\d)(\.|$)){4}$/
5. Validate IPv6 addresses
/^(([0-9]|[1-9][0-9]|1[0-9]{2}|2[0-4][0-9]|25[0-5])\.){3}([0-9]|[1-9][0-9]|1[0-9]{2}|2[0-4][0-9]|25[0-5])$|^(([a-zA-Z]|[a-zA-Z][a-zA-Z0-9\-]*[a-zA-Z0-9])\.)*([A-Za-z]|[A-Za-z][A-Za-z0-9\-]*[A-Za-z0-9])$|^\s*((([0-9A-Fa-f]{1,4}:){7}([0-9A-Fa-f]{1,4}|:))|(([0-9A-Fa-f]{1,4}:){6}(:[0-9A-Fa-f]{1,4}|((25[0-5]|2[0-4]\d|1\d\d|[1-9]?\d)(\.(25[0-5]|2[0-4]\d|1\d\d|[1-9]?\d)){3})|:))|(([0-9A-Fa-f]{1,4}:){5}(((:[0-9A-Fa-f]{1,4}){1,2})|:((25[0-5]|2[0-4]\d|1\d\d|[1-9]?\d)(\.(25[0-5]|2[0-4]\d|1\d\d|[1-9]?\d)){3})|:))|(([0-9A-Fa-f]{1,4}:){4}(((:[0-9A-Fa-f]{1,4}){1,3})|((:[0-9A-Fa-f]{1,4})?:((25[0-5]|2[0-4]\d|1\d\d|[1-9]?\d)(\.(25[0-5]|2[0-4]\d|1\d\d|[1-9]?\d)){3}))|:))|(([0-9A-Fa-f]{1,4}:){3}(((:[0-9A-Fa-f]{1,4}){1,4})|((:[0-9A-Fa-f]{1,4}){0,2}:((25[0-5]|2[0-4]\d|1\d\d|[1-9]?\d)(\.(25[0-5]|2[0-4]\d|1\d\d|[1-9]?\d)){3}))|:))|(([0-9A-Fa-f]{1,4}:){2}(((:[0-9A-Fa-f]{1,4}){1,5})|((:[0-9A-Fa-f]{1,4}){0,3}:((25[0-5]|2[0-4]\d|1\d\d|[1-9]?\d)(\.(25[0-5]|2[0-4]\d|1\d\d|[1-9]?\d)){3}))|:))|(([0-9A-Fa-f]{1,4}:){1}(((:[0-9A-Fa-f]{1,4}){1,6})|((:[0-9A-Fa-f]{1,4}){0,4}:((25[0-5]|2[0-4]\d|1\d\d|[1-9]?\d)(\.(25[0-5]|2[0-4]\d|1\d\d|[1-9]?\d)){3}))|:))|(:(((:[0-9A-Fa-f]{1,4}){1,7})|((:[0-9A-Fa-f]{1,4}){0,5}:((25[0-5]|2[0-4]\d|1\d\d|[1-9]?\d)(\.(25[0-5]|2[0-4]\d|1\d\d|[1-9]?\d)){3}))|:)))(%.+)?\s\*$/
6. Check a Hex Value
/^#?([a-f0-9]{6}|[a-f0-9]{3})$/
7. Check a URL
/^(https?:\/\/)?([\da-z\.-]+)\.([a-z\.]{2,6})([\/\w \.-]*)*\/?$/
8. Check if a string is currency
This regex works like isDecimal, except that only zero or two digits are allowed after the decimal points.
/^\s*(\+|-)?((\d+(\.\d\d)?)|(\.\d\d))\s*$/
9. Check a Username
Checks a username to see if it has at least 4 characters.
/^[\w\d\_.]{4,}$/
10. Check IE version
Though obsolete, Internet Explorer hasn’t been completely replaced yet, so many sites may still consider fixing their compatibility issues with IE. Here’s a regex to check for IE version.
/^.*MSIE [5-8][1]?(?!.*Trident\\/[5-9]\\.0).\*$/
11. Check the URL Prefix
There’re plenty of times in web development when you need to check the URL prefix, whether it’s http:// or https://, and you can do that with this regex:
if ( !s.match( /^[a-zA-Z]+:\\/\\// ) ) {
s = 'http://' + s;
}
12. Check a Domain
This checks if a domain name is valid.
/^[a-z0-9]+[a-z0-9-.]\*[a-z0-9]+.[a-z.]{2,6}$/
I found a really awesome quick reference guide for regular expressions, and a pretty good cheat sheet for Javascript regular expressions here: Javascript regex cheat sheet
Also, Regex101 is an excellent regular expressions tester that highlights pattern and matches online.
Hey, kudos for making it this far! Wanted to let you know that if you liked this, you might also like tmux Cheatsheet and Shortcuts.
ABOUT THE AUTHOR RSS Feed Icon
I'm Bobby Yan, a programmer, music lover, researcher, and a third-year undergraduate student at UC Berkeley majoring in Electrical Engineering and Computer Science. I am currently doing research on robotics, planning, and systems for machine learning at RISELab. In the past, I built IB Notes, a website with useful and concise study guides and notes for IB, and Spanish Vocab Builder, an iOS app to help Spanish learners. See my résumé for more details.
If you enjoyed this article, you should follow me on Twitter or sign up to get an email whenever I write something new:
Share this article with your friends: | ESSENTIALAI-STEM |
Responsible Child
Responsible Child is a 2019 British television film directed by Nick Holt and written by Sean Buckley. The film is based on a true story and stars Billy Barratt in the role of Ray, a 12-year-old boy who goes to trial accused of killing his mother's boyfriend. It was produced by Kudos with 72 Films for BBC Two.
At the 48th International Emmy Awards, Barratt won the award for Best Performance by an Actor, making him the youngest person ever to do so.
Cast
* Billy Barratt ... Ray
* James Tarpey ... Nathan
* Tom Burke ... William Ramsden
* Neal Barry ... Kevin - Appropriate Adult
* Tina Harris ... Sergeant Lucas
* Owen McDonnell ... Pete
* Michelle Fairley ... Kerry
* Debbie Honeywood ... Veronica
* Shaun Dingwall ... Scott
* Kirsten Wright ... Serena
* Zachary Barnfield ... Christie
* Angela Wynter ... Grace
* Matthew Aubrey ... Gary
* Zita Sattar ... Sam Delaney
* Stephen Boxer ... Judge Walden | WIKI |
-- Sugar Climbs in New York on Signs of Import Demand; Cocoa Gains
Sugar rose for the first time in
five days in New York as premiums in the physical market signal
growing import demand. Cocoa also advanced. Brazilian raw sugar for loading this month was at a premium
of 0.05 cent to 0.1 cent to the October futures in New York last
week, compared with 0.05 cent as of Aug. 1, Swiss Sugar Brokers
said in a report dated Aug. 31. About 700,000 metric tons of
sugar was sold in the past three weeks with Chinese and Middle
East refiners buying, the company said. “The physical premiums are a little bit stronger, we’ve
seen very good demand,” Jonathan Kingsman , managing director of
researcher Kingsman SA in Lausanne, Switzerland , said by phone
today. “Because of this strengthening of import demand it’s
beginning to look as if the surplus problem for 2013 is on its
way to being solved.” Raw sugar for delivery in October advanced 0.7 percent to
16.45 cents a pound by 5:47 a.m. in New York on ICE Futures U.S.
White sugar for delivery the same month rose 0.2 percent to
$478.50 a ton on NYSE Liffe in London. Sugar production will exceed demand by 4.5 million tons in
the 2013-14 season that starts in October, according to the
International Sugar Organization in London. That follows a
record surplus of 10 million tons in 2012-13. Cocoa for December delivery rose 0.6 percent to $2,450 a
ton on ICE. Cocoa for delivery in December increased 0.6 percent
to 1,629 pounds ($2,538) a ton in London , the first gain in four
days. Arabica coffee for delivery in December climbed 0.6 percent
to $1.1695 a pound in New York. Robusta for November delivery
advanced 0.6 percent to $1,769 a ton in London. To contact the reporter on this story:
Alex Pashley in London at
apashley@bloomberg.net To contact the editor responsible for this story:
Claudia Carpenter at
ccarpenter2@bloomberg.net | NEWS-MULTISOURCE |
Page:The Works of William Harvey (part 1 of 2).djvu/290
190 changed in disposition. In like manner women occasionally be- come insane through ungratified desire, and to such a height does the malady reach in some, that they are believed to be poisoned, or moon-struck, or possessed by a devil. And this would certainly occur more frequently than it does, without the influence of good nurture, respect for character, and the modesty that is innate in the sex, which all tend to tranquillize the inordinate passions of the mind.
The passage from the external uterine orifice to the internal parts and uterus itself, where the egg is perfected, is by that part which in other animals is called the vagina or vulva. In the fowl, however, this passage is so intricate, and its internal membrane is so loose and wrinkled, that although there is a ready passage from within outwards, and a large egg makes its way through all without much difficulty, still it scarcely seems likely that the penis of the male could penetrate or the spermatic fluid make its way through it; for I have found it impossible to introduce either a probe or a bristle; neither could Fabricius pass anything of the sort, and he says that he could not even inflate the uterus with air. Whence he was led I fancy to give an account of the uterus, proceeding from more internal to more external parts. Considering this structure of the uterus also, he denies that the spermatic fluid of the male can reach the cavity of the uterus, or go to constitute any part of the egg. To this statement I most willingly subscribe; for, indeed, there is nothing in the fruitful egg which is not also in the barren one; there is nothing in the way of addition or change which indicates that the seminal fluid of the male has either made its way into the uterus, or come into contact with the egg. Moreover, although without the access of the cock all eggs laid are winded and barren, still through his influence, and long after inter- | WIKI |
BlackBerry Messenger (yes, that BBM) is shutting down on May 31st
Clutch your old BlackBerries dear, because the consumer version of BBM is officially dying at the end of May. In a blog post, Emtek (the company that has taken over running the BBM app since 2016) has announced that it will end support for the messaging app on May 31st, citing fleeting users over the past years despite efforts to revitalize the app with features like Uber hailing and video calling. “We are proud of what we have built to date ... The technology industry however, is very fluid, and in spite of our substantial efforts, users have moved on to other platforms, while new users proved difficult to sign on,” the company wrote in a blog. “Though we are sad to say goodbye, the time has come to sunset the BBM consumer service, and for us to move on.” Those using the enterprise version of the app, called BBMe, will continue operations as normal. If you really miss BBM and want to keep using it, you can also download the enterprise version on Android and iOS for free, but there is a $2.50 subscription fee for every six months. BBMe does offer end-to-end encryption and message editing / unsending where the consumer version didn’t, so it may be worth the dollars if you’re still an avid BBM believer. But if, like most people, you’ve already moved on, then let us all remember a moment in time when it was considered cool to tell people to find you on an app using a convoluted mixture of numbers and letters as a way to add friends. | NEWS-MULTISOURCE |
Germán Tena Orozco
Germán Tena Orozco (22 October 1934 – 23 December 2022) was a Mexican businessman and politician. A member of the National Action Party, he served in the Chamber of Deputies from 1985 to 1988.
Tena died on 23 December 2022, at the age of 89. | WIKI |
Sunoco upgraded to outperform after convenience store divestiture
Sunoco LP was upgraded to outperform from neutral at Baird Monday based on Sunoco's planned divestiture of 1,110 convenience stores, which is the majority of its real estate portfolio. Sunoco plans to divest the stores to 7-Eleven in a $3.3 billion transaction that is expected to close in the fourth quarter. The analysts increased their price target to $36 from $28. The analysts say the divestiture puts Sunoco on a good path to cover its distribution and they see it as the beginning of a "roll-up" of Sun to Energy Transfer Partners . Shares of Sunoco have gained 23% in the past month, while the S&P 500 has lost 1%. | NEWS-MULTISOURCE |
how to set environmental variable through Install Script ?
hi all,
I am using installShield professional2000 for preparing installshield of our project.
there we need to set the environmental variables(like LOG_LEVEL=2);
On the dos prompt we can set using "set LOG_LEVEL=2".
How can we do it through installShield script.
As far I know we can run any .exe file through InstallShield by using windows API LanchApp (".exe","");
Please let me know if at all any way to set the LOG_LEVEL using IS.
regards,
Adinarayana,K
adinarayanakAsked:
Who is Participating?
V_BapatConnect With a Mentor Commented:
Adi
For adding uninstall shortcut etc, I used the following method. It was a long time back and I don't remember the details. It may require some modification according to your project but I hope this will solve your problem.
function SetupFolders()
NUMBER nResult;
STRING szCommandLine, szProgramFolder, szUninstIcon, szUninstPath;
begin
szCommandLine = svDir ^ @PRODUCT_KEY;
LongPathToQuote ( szCommandLine , TRUE );
nResult = CreateProgramFolder ( @FOLDER_NAME );
szProgramFolder = FOLDER_PROGRAMS ^ @FOLDER_NAME;
nResult = AddFolderIcon (szProgramFolder, @PRODUCT_NAME, szCommandLine,
TARGETDIR, "", 0, "", REPLACE|RUN_MAXIMIZED);
nResult = AddFolderIcon ( FOLDER_DESKTOP, @FOLDER_NAME, szCommandLine,
TARGETDIR, "", 0, "", REPLACE);
szUninstPath = TARGETDIR ^ UNINST_LOGFILE_NAME;
LongPathToQuote ( szUninstPath , TRUE );
szCommandLine = WINDIR ^ "IsUninst.exe -f" + szUninstPath;
nResult = AddFolderIcon ( szProgramFolder, "Uninstall NetPower", szCommandLine,
WINDIR, "", 0, "", NULL );
return 0;//nResult;
end;
Add this line in the setup script in the "string defines" section generated by the IS Wizard.
#define UNINST_LOGFILE_NAME "Uninst.isu"
Also, you have to define the constants.
Hope this helps.
Vicky
0
adinarayanakAuthor Commented:
one more addition to that is
While creating the installscript through project wizard,I missed out the uninstall option somewhere.Now I added so many thing to the setup.rul file. At the end I tested my script.
I could not able to our project name in the add/remove programs after installation.There is one black line appearing.If I activate and click on the add/remove button on that panel then everything getting installed again.I could not able to uninstall that.
What may be the possible cause for that and How add unistall option for the existing installscript.It is urgent,please do it.
I will de thankfull to you.
regards,
AdinarayanaK
0
V_BapatCommented:
Hi Adi
For the first problem, use BatchAdd() or EzBatchAddString(). This will add the environment variable to "autoexec.bat" by default. You can specify the batch file.
If you are using BatchAdd() you have to open and close the batch file using BatchFileLoad() and BatchFileSave().
If you are using EzBatchAddString(), the batch file is automatically opened and closed for you.
Look in the IS help for details and/or examples.
Vicky
0
Free Tool: Subnet Calculator
The subnet calculator helps you design networks by taking an IP address and network mask and returning information such as network, broadcast address, and host range.
One of a set of tools we're offering as a way of saying thank you for being a part of the community.
adinarayanakAuthor Commented:
Dear V_Bapat,
reply to the first question is excellent.
regarding the second question,
After installing a product through the installscript I should be able to see the file " Uninst.isu" in TARGETDIR.But it is not getting appeared in the target directory.
What could be the reason ? and why that FOLDER_NAME is not getting appeared in the add/remove programs ? I Hope I stated the question clearly.If not I will send the code with the next comment.
Hope U will solve my poblem.
regards
Adi.
0
V_BapatCommented:
Hi Adi
Uninst.isu is present in windows directory. Since that dir is in the path, the file is picked up from there.
Vicky
0
adinarayanakAuthor Commented:
hi V_Bapat,
I did the same as you directed.The Shortcut is not getting created in the startup programs.
what could be the reason.
please let me know the solution as quick as possible.
regards,
Adi
0
adinarayanakAuthor Commented:
the short cut is getting appeared in Start menu.When u click on uninstall it is giving the message that unable to locate uninst.isu. Could not uninistall.
what could be the reason. ?
Adi
0
adinarayanakAuthor Commented:
the short cut is getting appeared in Start menu.When u click on uninstall it is giving the message that unable to locate uninst.isu. Could not uninistall.
what could be the reason. ?
Adi
0
V_BapatCommented:
If you post some code, I can understand what is happening better.
I would prefer to take the discussion to email. My email id is vicky@miel.mot.com.
Vicky
0
Question has a verified solution.
Are you are experiencing a similar issue? Get a personalized answer when you ask a related question.
Have a better answer? Share it in a comment.
All Courses
From novice to tech pro — start learning today. | ESSENTIALAI-STEM |
Seyed Ali Mousavi
Seyed Ali Mousavi may refer to the following people:
* Ali Mousavi - Iranian football (soccer) player
* Seyed Ali Mousavi - the nephew of Iranian politician Mir-Hossein Mousavi, whose death sparked protests across Iran | WIKI |
We use cookies to give you the best experience possible. By continuing we’ll assume you’re on board with our cookie policy
Science Essays
Lysergic Acid Diethlamide (LSD)
LSD or lysergic acid diethlamide is a commonly used drug of teens. LSDis a hallucinogenic drug which effects the nervous system. The drug is ingestedin many different ways, absorbed through the skin, taken orally or absorbedthrough the eye or ear. This drug was originally developed by the government ofthe United States as a treatment for …
Defense of Socrates
Plato’s “Defense of Socrates” follows the trial of Socrates for charges of corruption of the youth. His accuser, Meletus, claims he is doing so by teaching the youth of Athens of a separate spirituality from that which was widely accepted. Socrates’ argument was unique in that he tried to convince the jury he was just …
We will write a custom essay sample on
Science
Specifically for you for only $16.38 $13.9/page
ORDER NOW
The Brain
The human body is divided into many different parts called organs. An organ called the brain, is the center of the nervous system and it is the center of all voluntary and involuntary activities. It is also responsible for other complexities such as thought, language, and emotion. The brain weighs merely three pounds in an …
Coalition Chemistry
Coalition Chemistry 1. a) Bulk movement is the overall movement of a fluid. Themolecules all move in the same direction. Diffusion however is the randommovement of molecules which usually results in a fairly even distribution. Inother words the movement is not guaranteed to move in one direction but theprobability that it will move in the …
To His Coy Mistress By Marvell
Andrew Marvell writes an elaborate poem that not only speaks to his coy mistressbut also to the reader. He suggests to his coy mistress that time is inevitablyticking and that he (the speaker) wishes for her to act upon his wish and have asexual relationship. Marvell simultaneously suggest to the reader that he/shemust act upon …
Euclid
Euclid is one of the most influential and best read mathematician of all time. His prize work,Elements, was the textbook of elementary geometry and logic up to the early twentieth century. Forhis work in the field, he is known as the father of geometry and is considered one of the greatGreek mathematicians. Very little is …
Galileo
In this project I will be explaining about Galileo’s life ; what he contributed to our world. If you never actually knew exactly who was Galileo, then you should really read this project. In brief he was a great person who lived during the renaissance, and was a great follower of Copernicus. He was mostly …
Sociology Response- Cherokee Tribe
Symbol- Anything stands for or symbolizes something else Language- a set of spoken or written symbols which enable people to communicate complex information to others Values- Values are standards that provide a means to evaluate the worth of both material and immaterial aspects of culture Norm- Norms are rules for behavior held by a society …
Separating the Components of Panacetin
Will Jeffries 11/12/11 Period Two Organic Chemistry Extraction and Evaporation. Separating the Components of Panacetin. Pre-Lab: Analgesic drugs are known for reducing pain, while antiseptic drugs reduce symptoms such as fevers and swelling. However, some of these drugs can reduce both illnesses. To obtain a pure compound in these drugs, the scientist needs to separate …
Influences on Sir Isaac Newton and the Acceptance of the Heliocentric Theory of the Universe
5th Period AP European History 11 November 2011 Unit 4 Essay 3. Isaac Newton once said, “I have stood on the shoulders of giants. ” Explain this statement and explain how Newton was the product of time and circumstance. When Isaac Newton said, “I have stood on the shoulders of giants,” he demonstrated that he …
Stars
STARSA star is a large celestial body composed of gravitationally contained hot gases giving off electromagnetic radiation, especially light. The sun is actually a star. Unlike the sun the stars seem to be fixed, but in fact stars are in rapid motion, but their distances are so great no relative changes can be seen with …
Chem Lab
Isotopes and Atomic Mass It’s Vegium I. Purpose The purpose of this lab is to determine the average weights of each isotope of the “element” vegium, determine the relative abundance of isotopes of vegium, and calculate from experimental data the atomic mass of vegium. II. Apparatus Sample of vegium, balance, weighing cups III. Data Tables …
Cheat Sheet for Biological Oceanography Midterm
Planktons: groups of tiny floating organisms that cannot swim against the current. Taxonomy: size, function, autotrophs-producers, heterotrophs-consumers/decomposers, mixotrophs, complex, symbiotic/parasitic *Small to big: femtoplankton (viruses), pico (bacteria), nano (diatoms, dinoflagellates), micro(sameasnano+protozoa), meso(mostly zooplankton), macroplankton *Grazing food chain: Phyto->zooplk->fish*Sinking flux: dead fall to deeper ocean POM: Particulate organic materialDOM: dissolved organic material *Microbial Loop: see picture …
Biology Cells Organelles
Biology- cell organelles assignment Animal cells: Introduction: An animal cell is called a eukaryotic cell; it has a cell membrane, cytoplasm and a nucleus. The cell surface is covered by a membrane only. The cell membrane is strong and keeps the cell together even though it is thin and flexible. The cell membrane also controls …
Hermann Ebbinghaus
Hermann Ebbinghaus was born in Barmen, Germany on January 24, 1850. Ebbinghaus’ father was a rich merchant, and he encouraged Hermann to go to a University. At age 17, Ebbinghaus started his education at the University of Bonn studying history and philosophy, later he studied at the Universities of Berlin and Halle. He stopped his …
1) What Are Action and Absorption Spectra? How Is the Absorption Spectrum for Chlorophyll Different from the Action Spectrum for Photosynthesis? Why?
Electromagnetic energy, in the form of light, travels in wavelengths and is measured in nanometres (nm). Pigments within matter, such as plants, absorb varying wavelengths of light. The absorption spectrum can be defined as a graphical representation of a pigment’s ability to absorb light against varying wavelengths (nm). The pigments light absorbing ability is measured …
Stoichiometry and Limiting Reagent
Stoichiometry and Limiting Reagents Theodore A. Bieniosek I. Purpose and Theory The purpose of the experiment is to study and apply the processes of stoichiometric calculation on a controlled chemical reaction. We will be adding variable amounts of reactants in a chemical reaction in order to demonstrate the effect of limiting reagents. Based on the …
Split Brain
Split-Brain Patients: The independent functioning of the left and right hemisphere when no longer connected by the corpus callosum. The human brain is a dynamic and elastic processing unit that manages the great extent of human life. This entails both conscious and unconscious functioning of each human system. For example, the brain controls emotions through …
Separation of the Components of a Mixture
Separation of the Components of a Mixture Purpose: To become familiar with the methods of separating substances from one another using decantation, extraction, and sublimation techniques. Apparatis and Chemicals: balance, Bunsen burner, rubber hose, tongs, 2 evaporating dishes, 2 watch glasses, 100-mL graduated cylinder, clay triangles, 2 ring stands, 2 iron rings, 2 glass stirring …
Separation of a Mixture Containing Calcium Carbonate and Naphthalene
Thursday 9/29/11 3:00pm Michaela Howard Partner: Craig Delancy Separation of a Mixture Containing Calcium Carbonate and Naphthalene Objective: Finding a method to successfully separate a mixture of calcium carbonate and naphthalene. Properties to be considered: Calcium Carbonate Naphthalene Solubility in water slightly insoluble Solubility in ethanol insoluble partially Melting point 825 degrees C 80. 2 …
Photosynthesis Investigation and Light
LIGHT IN PHOTOSYNTHESIS Theory: Leaf discs float normally. When the air spaces are infiltrated with the solution the overall density of the leaf disc increases and the disc sinks. The infiltration solution includes a small amount of sodium bicarbonate. The bicarbonate ions serve as the carbon source for photosynthesis. As photosynthesis proceeds oxygen is released …
Moral Philosophy
Moral Philosophy “Principles or rules that people use to decide what is right or wrong” 1. TELEOLOGY:- * An act is considered morally right or acceptable if it produces some desired result, i. e. , pleasure, knowledge, career growth, a self-interest, or utility. * Theory that derives duty from what is valuable as an end, …
Mirror Equation
The Mirror Equation Ray diagrams can be used to determine the image location, size, orientation and type of image formed of objects when placed at a given location in front of a concave mirror. The use of these diagrams was demonstrated earlier in Lesson 3. Ray diagrams provide useful information about object-image relationships, yet fail to provide …
Biochemistry-Anaerobic Respiration
Contents 1. 0 Introduction | PAGE | 2. 0 | PAGE | 3. 0 Lactic Acid Fermentation 3. 1 Types of Fermentation 3. 2 Energy Produced from Lactic Acid Fermentation| PAGE | 4. 0 Anaerobic Exercise 4. 1 Benefits of Anaerobic Exercise 4. 2 Anaerobic threshold (AT) 4. 3 Male vs. female anaerobic exercise characteristics| | …
Haven’t Found A Paper?
Let us create the best one for you! What is your topic?
By clicking "SEND", you agree to our terms of service and privacy policy. We'll occasionally send you account related and promo emails. | ESSENTIALAI-STEM |
Talk:Spaced armour
more vehicles with spaced armour
didn't the matilda have spaced armour? — Preceding unsigned comment added by Fdsdh1 (talk • contribs) 18:05, 30 September 2012 (UTC)
Perforated armour
The title Perforated armour redirects to this page, but the subject is not addressed. The Chobham armour page draws a distinction between the two but does not explain. If there's a subject-matter expert around, please add a summary and point us to some good references. Thanks. (The title Perforated armor, by the way, points to the Vehicle armour page, so that should be resolved as well.) <IP_ADDRESS> (talk) 09:51, 14 November 2016 (UTC)
* I have redirected Perforated armour and Perforated armor to Slat armor, which is more appropriate. ( Hohum @ ) 15:38, 4 February 2017 (UTC)
Delete article?
This whole article is merely an unsourced restatement of content that is in the vehicle armor article anyway and should be deleted. DMorpheus2 (talk) 20:45, 20 January 2017 (UTC)
Anti-tank rifles & Schurzen
Anti-tank rifles generally fire solid shot (at least Soviet ones did) not HEAT. I reverted. DMorpheus2 (talk) 15:49, 27 January 2017 (UTC)
And just to clarify: schurzen are one type of spaced armor. There are many other types. Thus, the fact that schurzen were developed as a countermeasure for AT rifles does NOT contradict the fact that spaced armor of some types can be effective against HEAT in some circumstances. Spaced armor can also enhance the effect of HEAT if the standoff is wrong, but, that's a whole nuther paragraph that doesn't currently exist in the article. DMorpheus2 (talk) 16:44, 27 January 2017 (UTC)
* The same editor is reverting this without bothering to engage in discussion here. While the source used is not the best possible, it does at least refer to proper sources itself. Amazing that the only sourced part of the article is the one being fought over. ( Hohum @ ) 15:53, 5 February 2017 (UTC)
* Added a published reference:
* ( Hohum @ ) 16:19, 5 February 2017 (UTC)
* In addition, the following source has a detailed explanation of how Russian AT rifles prompted Schurzen design and employment. link ( Hohum @ ) 16:26, 5 February 2017 (UTC)
* Same user keeps removing sourced information and isn't participating in talk page discussion despite referral to WP:BRD. Twinkle advisory left on their talk page. ( Hohum @ ) 18:12, 8 February 2017 (UTC)
* Same user keeps removing sourced information and isn't participating in talk page discussion despite referral to WP:BRD. Twinkle advisory left on their talk page. ( Hohum @ ) 18:12, 8 February 2017 (UTC)
Against HEAT
"However, the use of add-on spaced armour skirts on armored vehicles may have the opposite effect and actually increase the penetration of some shaped charge warheads. Due to constraints in the length of the projectile/missile, the built-in stand-off on many warheads is less than the optimum distance. In such cases, the skirting effectively increases the distance between the armor and the target, and the warhead detonates closer to its optimum standoff."
That's either nonsense or badly translated.
* In what way does spaced armor increase the distance between armor and target?
* Stand-off is the distance to activate the warhead; optimum is whatever is most effective. What is "optimum stand-off"?
* If the missile has not yet reached optimum distance, how can it help that the distance is even shorter?
* Is the effect limited to the very short distance between spaced armor and conventional armor?
Please comment.<IP_ADDRESS> (talk) 16:20, 25 October 2017 (UTC) | WIKI |
User:Davethebrave371
Truth and Beauty
Hello, my name is David Spencer and this is my user page.
I was born on occupied Esquimalt land, lived most of my life on occupied Esquimalt land, and shortly before moving to occupied Haudenosaunee land, I lived briefly on occupied Songhees land. I've recently moved back to occupied Esquimalt land. I'm an activist, anarchist (of a libertarian socialist/anarcho-syndicalist/anarcho-communist flavour, with post-anarchist tendencies), a nihilist-leaning absurdist and a theological noncognitivist (it's clumsy, but I feel that igtheist is a bit too silly/easily misheard as atheist). I identify more as genderqueer/non-binary trans than I do as anything within the gender binary, but my beard usually leads people to refer to me as male. I am not male, and neither are beards. I use the singular they as a pronoun rather than male pronouns. Similarly, my identity/orientation as regards sexuality is more closely related to pansexuality/omnisexuality than those which define themselves within the restrictive structure of the binary. I have recently been diagnosed with severe clinical depression, GAD and SAD, symptoms of which began in early 2012 and have steadily worsened since then, and I am in firm solidarity with Mad Pride and those who identify within it as I do.
My primary focus as an activist is anti-poverty activism and Indigenous rights activism, with a strong focus on Decolonization, Postcolonialism and Intersectionality. As such, I acknowledge here my minority world privilege, white privilege and able-bodied privilege, which remove barriers for me whether I oppose the imbalance of barriers implicit in the currently existing white supremacist, ableist/sanist, patriarchal/misogynistic, heterosexist/homocidal global capitalist/authoritarian economic system or not.
I was born two days after Iosif Shklovsky passed away, which means I was probably conceived some time between the most recent transit of Earth across the Sun as seen from Mars and the inaugural flight of Virgin Atlantic's Maiden Voyager. If Aubrey de Grey can achieve his aims in my lifetime, maybe I'll take a Virgin Galactic spaceflight to Mars for the next one! Or, hopefully, there won't be corporations in space, and I'll just take a spaceflight in someone's DIY spacecraft (or make one myself)! Because if corporations aren't gone by 2084, we'll probably all be dead. | WIKI |
Kerry Town
Kerry Town is a village in the Rural District in the Western Area of Sierra Leone. the town is located about 31 km from the national capital, Freetown, which lies to the west-north-west. The population of Kerry Town is largely from the Krio ethnic group. The Treatment of the Ebola Virus clinic is located in Kerry Town.
Ebola treatment centre
Kerry Town is home to a centre for the treatment of Ebola virus disease. The facility was opened in November 2014 during the Ebola virus epidemic in Sierra Leone.
In early November 2014 the Ebola clinic in Kerry Town was completed after eight weeks of construction by the Ministry of Defence and handed over to the charity Save the Children. The clinic was the first of six planned clinics in the West Africa region. The clinic consisted of an 80-bed treatment centre with a 12-bed treatment centre for healthcare workers. The centre is staffed by Cuban and Sierra Leonean medics and international aid workers from Save the Children while the healthcare section are manned by British Army medics.
On 29 December 2014, Pauline Cafferkey, a British aid worker who had just returned to Glasgow from working at the treatment centre in Kerry Town, was diagnosed with Ebola at Glasgow's Gartnavel General Hospital. | WIKI |
Talk:YNAB
"philosophy" details removed
A company's own "philosophy" is generally irrelevant for an encyclopedic article (just like its "mission", "vision", and similar PR fluff). Content should reflect what independent reliable sources report about the topic, not how a company would like to present itself and its products (WP:NPOV). Also, a non-expert blog post - a blatant advertorial in this case - is not a reliable source (WP:RS). GermanJoe (talk) 19:18, 20 August 2017 (UTC) | WIKI |
Sahebganj
Sahebganj (also known as Sahibganj) is a scenic town and a port city in the Sahibganj subdivision of the Sahebganj district of Jharkhand state, India. It serves as headquarters for Sahibganj District, Sahibganj subdivision and Sahibganj (community development block). It is located on the north-east of Jharkhand and situated on the banks of Ganges. 17th May is the Foundation Day of the District, when Rajmahal and Pakur subdivisions of old Santhal Pargana district were carved out to form Sahibganj district.
Etymology
Sahibganj means a place (ganj) of masters (sahebs or sahibs). The place is likely to have been given its name because a number of English and other European people lived and worked in and around the railway station during the British Raj.
Early and Medieval Period
The history of Sahibganj town centers mainly on the history of Rajmahal and Teliagarhi Fort. There is evidence that the area is inhabited since time immemorial only by Malers (Mal Paharia). They were the early settlers of the territory of Rajmahal hills, who still reside in some areas of the same hills. They are considered to be the "Malli" mentioned in the notes of Megasthenes, Greek Ambassador of Selukus Nikater, who happened to be in the vicinity of the Rajmahal hills in 302 BC. Till the visit of Chinese traveller Hiuen Tsang in 645 AD, the history of this area was wrapped in obscurity. In his travelogue, the pilgrim mentions the Fort of Teliagarhi (on the present rail route, near Mirzachauki Railway Station), seeing the lofty bricks and stone tower not far from the Ganges. Information is gathered through the pages of history that it was a Buddhist Vihar. A continuous history of the district is extant from the 13th century when Teliagarhi became the main gateway of Muslim armies marching to and from Bengal. During the Sultanate rule in Delhi, Bakhtiar Khilji marched towards Bengal and Assam through the Teliagrahi pass. He captured Bengal, and its king, Lakshaman Sena, fled to Cooch Behar (in West Bengal). In 1538, Sher Shah Suri and Humayun came face to face for a decisive battle near Teliagarhi. On 12 July 1576, the battle of Rajmahal was fought and the foundation of Mughal rule in Bengal was laid. It was Man Singh, the most trusted general of Akbar, who in his capacity as Viceroy of Bengal and Bihar, made Rajmahal the capital of Bengal in 1592. But this honour of Rajmahal was short-lived, for the capital was shifted to Dhaka in 1608. Shortly after this, Teliagarhi and Rajmahal became the site of a fierce battle between the rebellious Prince Shahjahan and Ibrahim Khan. Shahjahan emerged victorious and became the overlord of Bengal for a time, before finally being defeated in 1624 at Allahabad. In 1639, Rajmahal regained its glory and was once more made the capital of Bengal by Shah Shuja, the second son of Emperor Shahjahan, on his appointment as the Viceroy of Bengal. It continued as the seat of the Mughal Viceroy up to 1660 and a mint town till 1661. It was at Rajmahal that Dr. Gabriel Boughten cured the daughter of Shah Shuja. By this means Dr. Boughten succeeded in securing an order (farman) from Shah Shuja giving the English the liberty to trade in Bengal. Thus the minutest foundation of the British rule was laid here. The fugitive Nawab of Bengal Siraj-ud- Daula was captured at Rajmahal during his flight after the Battle of Plassey in 1757.
Modern Period
The entire Santhal Pargana along with portions of the present Hazaribagh, Munger, Jamui, Lakhisarai, Begusarai, Saharsa, a part of Purnia and Bhagalpur, districts was termed as "Jungle Terai" by the English on assumption of Diwani in Sept. 1763 from Shah Alam II at Allahabad after the Allahabad Treaty. The victory at Plassey made British master of the then Bengal which contained the present Sahibganj District. In Santhal Pargana, they were up against a band of simple but determined opponents, the Paharias. Paharias were lovers of freedom and could not tolerate any intruder in their homeland. The English were very much concerned and Warren Hastings the Governor General of India organized a special corps of 800 men in 1772 to curb the Paharias. The corps was put under the command of Captain Brooke, who was appointed the Military Governor of the Jungle terai. As a direct consequence of the Santhal Hul or Rebellion of 1854–55 led by Sido and Kanu brothers Santhal Pargana has been created as a separate district in 1855 by ceding portions of Bhagalpur (which is now in Bihar) and Birbhum (which is now in West Bengal) district. The 1942 movement also spread to entire Santhal Pargana division, for that matter in Sahibganj and on 11 August 1942 a general strike was observed. On 12 August 1942 a procession was taken out at Godda and soon the entire district was aflame. Thus the district of Santhal Pargana marched hand-in-hand with other parts of the State in the protracted struggle for country's freedom which resulted on 15 August 1947 in the end of slavery.
Post independence
Government considered the Paharias and other tribals of Rajmahal hills as demographically underdeveloped section of society and embarked on policies and plans for their emancipation. Government's efforts in the past could not bring the desired results and the district continued to remain relatively backward. The Jharkhand Movement for separate statehood thus gained momentum and on 15 November 2000, a separate state named as Jharkhand came into existence comprising the 18 districts of the Chota Nagpur and Santhal Pargana divisions.
Population
According to the 2011 Census of India, Sahibganj had a total population of 88,2214, of which 46,449 (53%) were males and 41,675 (47%) were females. Population in the age range 0–6 years was 12,262. The total number of literate persons in Sahibganj was 75,952 (79.21% of the population over 6 years).
Geology
Plant Fossil bearing Inter-trappean beds of Rajmahal Formation in this district has been declared the National Geological Monuments of India by the Geological Survey of India (GSI), for their protection, maintenance, promotion and enhancement of geotourism.
Location
Sahebganj is located at 25.25°N, 87.65°W. It has an average elevation of 16 metres (52 feet).
Sahibganj has an area of 4.25 km2.
Overview
The map shows a hilly area with the Rajmahal hills running from the bank of the Ganges in the extreme north to south, beyond the area covered by the map into Dumka district. ‘Farakka’ is marked on the map and that is where Farakka Barrage is, just inside West Bengal. Rajmahal coalfield is shown in the map. The entire area is overwhelmingly rural with only small pockets of urbanisation.
Note: The full screen map is interesting. All places marked on the map are linked and you can easily move on to another page of your choice. Enlarge the map to see what else is there – one gets railway links, many more road links and so on.
Infrastructure
According to the District Census Handbook 2011, Sahibganj, Sahibganj covered an area of 4.25 km2. Among the civic amenities, it had 155 km roads with both open and closed drains, the protected water supply involved uncovered well, hand pump. It had 13,130 domestic electric connections, 600 road light points. Among the medical facilities, it had 2 hospitals, 10 dispensaries, 10 health centres, 1 family welfare centre, 1 maternity and child welfare centre, 1 maternity home, 1 TB hospital/ clinic, 1 nursing home, 2 charitable hospital/ nursing homes, 1 veterinary hospital, 50 medicine shops. Among the educational facilities it had 42 primary schools, 24 middle school, 6 secondary schools, 2 senior secondary schools, 1 general degree college, 2 recognised shorthand typewriting and vocational training institutions, 1 non-formal education centre, 2 special schools for disabled. Among the social recreational and cultural facilities, it had 1 working women’s hostel, 1 stadium, 3 cinema theatre, 6 auditorium/ community halls, 2 public libraries, 2 reading rooms. Important items it produced were bidi, curds, pickles, sweets, bamboo items. It had the branch offices of 9 nationalised banks, 1 cooperative bank, 2 agricultural credit societies, 5 non-agricultural credit societies.
Transport
Sahibganj Junction railway station is situated on the Sahibganj Loop of Eastern Railway.
The Government of India is building a bridge (^4 )across the river Ganges which will connect Sahibganj to Manihari in Bihar. This bridge will connect Jharkhand and South India to North Eastern India and will reduce transportation costs of essential minerals.
A multi modal transport hub combining rail, road and water is also being built here as part of the government's effort to develop National Waterway 1, i.e. the Gangetic stretch between Haldia to Allahabad.
Attractions
* Moti Jharna
* Kanhaiyasthan (Near Mangalhat on way to Rajmahal)
* Teliagarhi Fort
* Ganga Vihar Park at the footsteps of Rajmahal hills
* Shiv Gadi Dham, Barhait
* Maa Bindu Vasini Mandir, Barharwa
* Raksi Sthan,
* Baysi Sthan near Sahibganj Bijli Ghat
* Udhwa Jheel, Udhwa (Barharwa)
* Hool Karanti Sthal, Panchkthia
* Rajmahal hills
* St.Mary's Church
* Jhana colony
* Baghwa Kuan
* River Ganga
* Sahibganj park
* Rajmahal Fort (Preferred not to visit, nothing special about this place. waste of time).
* Sidhu Kanhu Stadium
* Azad nagar Bikash bhawan road
* Jhilmil Waterfall
* Sahibganj kachra plant
* Avengers Tower (6MW3+96 Sahibganj, Jharkhand) | WIKI |
Selector Options
You can pass the following options to the Selector constructor.
You can also overwrite the options you have specified before.
options.boundTestRun
Type: Object
If you need to call a selector from a Node.js callback, assign the current test controller to the boundTestRun option.
For details, see Calling Selectors from Node.js Callbacks.
options.timeout
Type: Number
The amount of time, in milliseconds, allowed for an element returned by the selector to appear in the DOM before the test fails.
If the visibilityCheck option is enabled, the element then must become visible within the timeout.
Default value: timeout specified by using the runner.run API method or the selector-timeout command line option.
options.visibilityCheck
Type: Boolean
true to additionally require the returned element to become visible within options.timeout.
Default value: false
Overwriting Options
You can overwrite selector options by using the selector's with function.
selector.with( options ) → Selector
with returns a new selector with a different set of options that includes options from the original selector and new options that overwrite the original ones.
The sample below shows how to overwrite the selector options so that it waits for the selected element to become visible.
import { Selector } from 'testcafe';
const elementWithId = Selector(id => document.getElementById(id));
fixture `My fixture`
.page `http://www.example.com/`;
test('My Test', async t => {
const visibleElementWithId = elementWithId.with({
visibilityCheck: true
});
const visibleButton = await visibleElementWithId('submit-button');
}); | ESSENTIALAI-STEM |
Poly(3-hydroxybutyrate) production by Halomonas boliviensis in fed-batch culture.
Research output: Contribution to journalArticle
Bibtex
@article{2fd5ad706ce240518ae63e5a8e331448,
title = "Poly(3-hydroxybutyrate) production by Halomonas boliviensis in fed-batch culture.",
abstract = "High poly(3-hydroxybutyrate) (PHB) content and volumetric productivity were achieved by fed-batch culture of Halomonas boliviensis using a defined medium. Initial shake flask cultivations in a minimal medium revealed that the growth of H. boliviensis was supported only when the medium was supplemented with aspartic acid, glycine, or glutamine. Addition of 0.1{\%} (w/v) glutamine in the medium resulted in the highest cell dry weight (CDW; 3.9 g l(-1)). Glutamine was replaced by the less expensive monosodium glutamate (MSG) in the medium without any notable change in the final cell density. Effect of initial concentrations of NH(4)Cl and K(2)HPO(4) on cell growth and PHB accumulation by H. boliviensis was then analyzed using a fed-batch fermentation system. The best conditions for PHB production by H. boliviensis were attained using 0.4{\%} (w/v) NH(4)Cl and 0.22{\%} (w/v) K(2)HPO(4) and adding MSG intermittently to the fermentor. Poly(3-hydroxybutyrate) content and CDW reached 90 wt.{\%} and 23 g l(-1), respectively, after 18 h of cultivation. In order to increase CDW and PHB content, MSG, NH(4)Cl, and K(2)HPO(4) were initially fed to the fermentor to maintain their concentrations at 2{\%}, 0.4{\%}, and 0.22{\%} (w/v), respectively, and subsequently their feed was suppressed. This resulted in a CDW of 44 g l(-1), PHB content of 81 wt.{\%}, and PHB volumetric productivity of 1.1 g l(-1) h(-1).",
author = "Jorge Quillaguaman and {Doan Van}, Thuoc and Hector Guzm{\'a}n and Daniel Guzm{\'a}n and Javier Mart{\'i}n and Akaraonye Everest and Rajni Hatti-Kaul",
year = "2008",
doi = "10.1007/s00253-007-1297-x",
language = "English",
volume = "78",
pages = "227--232",
journal = "European Journal of Applied Microbiology and Biotechnology",
issn = "1432-0614",
publisher = "Springer",
number = "2",
} | ESSENTIALAI-STEM |
Action of 28 September 1644
The action of 28 September 1644 was a battle that took place on 28 September 1644 about 70 mi from Rhodes, when six Maltese galleys under Gabrielle Chambres de Boisbaudran attacked an Ottoman convoy of sailing ships.
The battle
The Maltese San Lorenzo, Santa Maria and Vittoria overhauled and attacked a Turkish galleon, while San Giuseppe and San Giovanni captured a smaller sailing ship and the "capitana" chased a vessel which turned out to be Greek, before returning to fight the galleon. After 7 hours, she was captured, with 220 of the 600 or more on board dead. Boisbaudran was killed, and the senior captain, Cotoner, of the San Lorenzo, took over command. Maltese casualties were 82 killed and 170 wounded, apart from their rowers. On the voyage home, there were several storms, and eventually the galleon was abandoned near Malta, and ended up wrecked on the Calabrian coast.
Repercussions
The Turkish convoy had been heading from Constantinople to Alexandria, and carried a number of pilgrims bound for Mecca, the exiled former Chief Black Eunuch, Sünbül Agha, as well as a woman, originally considered by her captors to be one of the wives of the Ottoman Sultan Ibrahim, and her young son, who was therefore thought to be an heir to the Ottoman throne. This was eventually disputed, and many historians believe that she was a wife and/or a slave of Sünbül Agha and a former nurse of Mehmed IV. Some history books say that her name was Zafira, and that her son, named Osman, was born on January 2, 1642 - almost three months earlier than Mehmed IV (making Osman the eldest son of Ibrahim I and the true heir to the throne). Citizens of Manfredonia, Italy, believe that she was in fact a sultana – originally a girl by the name of Giacometta Beccarino, who was kidnapped from Manfredonia by Turks in 1620. (This practice was quite common among Ottoman rulers of the era; for example, the mother, the grandmother, the great-grandmother, and the first three wives of Ibrahim were all of non-Turkish origin and were all sold to the harems of their respective husbands as slaves. However, unlike Giacometta Beccarino, they were typically sold to the harem at the age of 12 to 16 and would give birth to their first child by 17.)
On the voyage home, the Maltese vessel carrying the loot stopped at Crete, then a Venetian dominion, where it took on board supplies and unloaded part of the treasure there. The Ottomans, already enraged at the loss of the ships, considered this act a breach of Venetian neutrality, and soon declared war on the Republic.
The capture of "Sultan's wife and son" was widely publicized throughout Europe. Sünbül Agha was killed in the battle, and the woman reportedly died of stress or fright during the battle or soon thereafter (some sources give her date of death as January 6, 1646). The boy was raised on Malta for several years and eventually sent to a monastery, where he became known as "Father Ottoman" or "Padre Ottomano".
Knights of Malta
* "Capitana" of Boisbaudran.
* San Lorenzo.
* Santa Maria.
* Vittoria.
* San Giuseppe.
* San Giovanni.
Ottomans
* A galleon – captured, and later wrecked.
* A smaller ship – captured.
* Several other ships. | WIKI |
Olympic Parents Share In the Glory and the Spotlight
They’re not hard to spot, often standing on the sidelines grinning from ear to ear. No Olympic athlete makes it to the top alone. It usually requires a major support system, and a lot of rides to and from practice. When the cameras turn to the stands, they often find proud parents who are more nervous — or celebratory — than any of the fans at home. (Who could forget Aly Raisman’s parents nervously swaying in their seats during the 2016 Rio Olympics?) Here are a few of the Olympic parents capturing attention during the Pyeongchang Games. The American star-in-the-making, who won the gold medal in the halfpipe, visited her family’s cheering section between runs on Tuesday. Her father, Jong Jin, is a Korean immigrant who gave up his job when she was 10 to help her pursue her Olympic dreams, according to Bleacher Report. “To see Chloe compete in the Olympics, it’s going to be very exciting and happy,” her mother, Boran Kim, told The New York Times before the event. “I think it will be the best moment of my whole life.” The 25-year-old Canadian skier won the gold medal on Monday, and his parents, Julie Thibaudeau and Robert Kingsbury, were there to witness it. The parents jumped over a fence and raced to their son to hug him, according to the Canadian Broadcasting Corporation. “We didn't talk. We hugged forever,” his mother said. “And then I said, ‘I love you.’” NBC captured footage of Biney’s father, Kweku Biney, reacting to her advancing to the quarterfinals of the 500-meter, standing and yelling with his arms in the air. Maame Biney lived in Ghana until she was 5, when she moved to the United States to live with her father. In December, he cheered her on while she was securing a spot on the Olympic team, holding a sign in the stands reading: “Kick some hiney Biney.” Greg and Robin Brandt have split loyalties: One daughter, Hannah, plays for the United States women’s hockey team, while their daughter they adopted when she was about four months old, Marissa, plays for the Korean women’s hockey team. The girls were inseparable as children, and when Hannah took up hockey instead of figure skating, Marissa soon followed, the parents told USA Today. “To have both girls be able to go to the Olympics at the same time, it’s pretty amazing,” Robin said. The American siblings who helped the United States win a bronze medal in team skating recorded a video to thank their mother, Naomi Shibutani, for her support. Naomi met her husband, Chris, when they were Harvard musicians, according to ESPN. “The parents are very much an integral part of what their training is,” said Patti Gottwein, who coached the siblings. Her parents, Kiyoto and Ikuko Nagasu, were working at their Japanese restaurant in Arcadia, Calif., when their daughter became the first American woman to land a triple axel during the Olympics. They were too busy to watch her team performance live, so they had to wait until they got home, Ikuko Nagasu told USA Today. To celebrate their daughter’s accomplishments, they occasionally offer the Mirai Roll, which includes tuna, tuna tatako, avocado, mentaiko, shrimp and tempura. And they’ll close for the first time in years when she skates in the individual competition. “The business is important, but it is special to be able to watch Mirai,” Ikuko said. In January, Bobby Butler, 30, skated over to deliver the good news to his father, John Butler: He had made the Olympic team. John Butler coached his son at Marlborough High School in Massachusetts, where he led the program for 25 years before retiring in 2011. “Playing for my dad was awesome,” Bobby told The Metro West Daily News. “He told me what it would take. He gave me the tools.” The 35-year-old holds the distinction of being the only American mother to compete in these Games. Her son, Breck, will turn 2 in April. It’s far more common for men to continue with high-level sports after becoming parents — there are 20 American fathers competing this year — because of the physical toll of pregnancy. She missed a season of racing while pregnant, but continued to work out twice a day, she told HuffPost. She took off a few weeks after childbirth before returning to hiking and biking, and it took about 10 months until she felt almost ready to fully compete again. “In some ways, I was pleasantly surprised at how much I could do, but in other ways, it did take a bigger toll on my body than I would’ve guessed,” she said. “It did take some patience and diligence to work back.” His father, Brett West, has sent out 1,250 T-shirts to Tucker’s fans, according to NBC Washington. He also drives around town in a “LUGE DAD” license plate. It’s not the most embarrassing thing he’s done: In 2014, he said on NBC’s “Today” that women should reach out to his “shy” and “very single” son. | NEWS-MULTISOURCE |
Background
Iron is an essential component of numerous proteins and enzymes in the human body. Over 60% of iron in the body is found in hemoglobin, the oxygen-carrying pigment of the red blood cell that transports oxygen from the lungs to tissues for use in metabolism. About 4% of iron is found in myoglobin, the oxygen binding storage protein of muscle, and trace amounts are associated with electron transport and iron-dependent enzymes. A large portion of the remaining iron in the body is found stored in the form of ferritin, primarily in the liver but also in bone marrow and the spleen. With the exception of pregnancy and menstruation where there is a net outward flux of iron, the iron content of the body is highly conserved. The secretion of iron into breast milk is low, with the average milk iron being in the order of 0.35 mg/l [81]. Maternal dietary iron intake appears to have very little effect on milk iron levels.
Dieting Dilemma and Skinny Solutions
Dieting Dilemma and Skinny Solutions
The captivating thing about diets is that you don't get what is researched or predicted or calculated but rather, you get precisely what you expect. If the diet resonates with you then it will likely work, if it doesn't resonate, it won't.
Get My Free Ebook
Post a comment | ESSENTIALAI-STEM |
Enterprise Environments: Understanding Deployment at Scale
04
JANUARY, 2021 by Ukpai Ugochi
Have you ever wondered what would happen if you mistakenly added bugs to your codes and shipped them to users? For instance, let’s say an IT firm has its primary work tree on GitHub, and a team member pushes codes with bugs to the primary work tree. The firm may also push the bug-infested software to users without knowing. Users will complain to the firm about the bug, but the problems may take a while to fix, especially if team members don’t work on weekends. This act can earn companies a bad reputation, since it means customer needs go unmet. So, which aspects of software deployment should IT firms be very mindful about? Why is it necessary to be careful about the codes team members deploy? And how scalable can deploying codes be? These questions may seem overwhelming. Join this ride to see how your organization can deploy codes with the best results.
What Is Deployment?
Let’s say that your DevOps team works together on different sections of software. Maybe some team members work on the front end, others work on the back end, and still others validate and test codes. Developers spend lots of time and energy to write codes, test them, and make sure they’re clean. However, developers can’t measure the performance of the software they’re building merely by looking at how clean their code is. What about API (application programming interface) end points? How will developers make sure there are no broken links and the application works as expected in the targeted device or devices? As a result of these uncertainties, codes need to be hosted in a target device or in servers online. What this means is that even as software developers have created workflows that make software development easier, testing the functionality of an application in a targeted device is still a priority in IT firms. Software or application deployment simply involves making the software or application ready for use by hosting it online or in a target device. When an application is deployed online, users can access and use the software as long as they accept the firm’s terms and conditions. An example is when the first version of GitHub was deployed in 2008, only then did users have access to use it. Firms can also deploy new features of an application online after first deploying it on target devices and testing it internally. With test methods put in place and the use of different hosting services, IT firms can deploy continually and pay as they go, or they can choose to pay a fixed amount for a period of time.
What Deployments Tell Us About Enterprise Environments
Before we can fully understand what deployment tells about an enterprise environment, let’s understand what an enterprise environment is. The term refers to the techniques, tools, and procedures an organization uses. For IT firms, it refers to all the processes and tools used during and after software development. What, then, does software deployment tell use about the tools and processes that IT firms use? Why will IT firms use different deploy tools for their different applications? Let’s look at the life cycle of software and how deploy processes can make or mar software releases.
It All Starts With the Code
Of course, the first step to designing and building a computer program is writing codes. The codes software developers write make up the software to be released. Most times, developers work on asynchronous development tools like GitHub and have to work asynchronously, sometimes remotely. Because different team members work on different functionalities of the application, the team lead needs to monitor team members’ codes. The reason firms ship software with bugs to users is that during this tracking of codes, some of the improper and bad codes never got fished out. Therefore, firms need to monitor codes before merging them with the primary code tree.
Testing and Debugging
Whether your organization uses agile or DevOps, testing of team members’ codes after they push them should be a priority. Testing of codes involves evaluating codes to make sure they return the required results when executed. Aside from testing codes, developers test the functionality of the application. This type of test is to make sure software completes the tasks it’s supposed to. Debugging is the next step after testing—fixing errors that emanate from testing. After this stage, the developer sees all the flaws, faults, and errors within the code. With Enov8 test monitoring tools, you can initiate testing of codes while integrating them with tools like Borland, Splunk, and so on.
Building
After writing and testing codes, you’ll need to compile and build them. Building codes involves putting individual units of code together so that software runs properly. Most times, a single developer can build codes using an IDE (integrated development environment). Builds are usually prerelease software versions that only the software companies use. Developers need to deploy software to allow customers to use them. You’re probably wondering why developers need to deploy software before users can use it—after all, the act of building compiles the software. Here’s the catch. For web applications, developers compile codes and then install them in servers for global use. In contrast, for desktop applications, developers build codes with build tools and then ship them to users with instructions on how to install or deploy them in the work environment. Tools such as benchmark release management let organizations monitor and get metrics of the build process.
Deploying
After the build process, deploying software is the next step. To deploy usually involves installing software so people can use it on a computer or target device. Deploying can either be on servers online or on a target device. It’s usually in users’ working environment. Developers can also deploy software in their working environment to test software functionality. In this case, the developer is the user. All the processes for installing and running software in a specific environment are part of deployment. Software deployment is also related to software releasing because software releasing involves redeploying software with new features.
Redeploying and Maintaining
Software maintenance is almost synonymous with redeploying, in my opinion. This is because while maintaining software, developers correct faults, enhance UI/UX, and add new features. How will these new features get to users if developers don’t deploy them? Redeploying involves pushing software codes again after each change to reflect changes in users’ copies. Sometimes redeploying codes are automatic, but it’s also possible to do them manually.
How to Scale Up Deployment
Deploying software shouldn’t be taken lightly. It ushers the software to users. A bad deployment can ruin the trust users have in the company. And what about the money it could cost your organization if software takes up unnecessary memory space on the server? Let’s dive into the different methods to scale up deployment—the do’s and don’ts for a successful software deployment.
Step 1: Automate Testing
For a successful deployment, it’s essential to automate testing. The idea of waiting to compile codes before testing is totally wrong because it eats up time. It makes sense to carry out tests after pushing codes. This way, codes that don’t pass tests won’t be accepted into the primary working tree. DevOps teams can automate testing while working with distributed version control systems (DVCS) such as Git, GitHub, and Bitbucket. With this method, testing of codes is continual, so you avoid the rush-hour testing of codes.
Step 2: Automate Deployments With Continuous Integration and Continuous Delivery
To automate deploying, it makes sense to implement continuous integration and delivery. In continuous integration, when team members push codes, the codes undergo tests and are added to the primary working tree. Delivery on the other way round means putting things in place to allow software to be released continually, anytime the team chooses. With this method, the DevOps team can minimize maintenance, maximize innovation, and reduce costs.
Continuous Deployment
There’s a thin line between continuous delivery and continuous deployment. In continuous delivery, the software is ready for release at any time. The act of releasing software to users continually is continuous deployment. With continuous deployment, teams can add new software features, remove bugs, and ship to users swiftly.
Containerization
Bugs used to show up when developers coded in one environment and deployed to another environment. Now, developers can compile codes and related files and dependencies they require to run in different environments, bug free. This method allows software to behave similarly in different operating systems. To use this method, DevOps teams use tools such as Docker, Kubernetes, and so on.
Step 3: Monitoring Deployment
Scaling deployment doesn’t stop at deploying your software. You’ll need to monitor the performance of software after deploying. Also, you’ll need to manage and add new features after deploying (or redeploying). How do you ensure deploying doesn’t fail? What measures do teams need to put in place? With test environment management tools, monitoring software is efficient even after deployment.
Further Reading
Everyone builds projects knowing deployment is inevitable. But not everyone takes deployment procedure seriously. For some, deployment is just a ritual that one must carry out. In this article, we’ve explored why deployment should be a critical process. You’ve seen how DevOps teams can scale up deployment processes and the possible effects of scaling deployment. Want to know more? You can read more about deployment metrics that can aid the optimization of IT operations, giving managers a clear understanding of properties to measure during deployments. You may also want to learn more about metrics for deployment management. And if you want to get a deeper understanding of containerization, this article is a great fit for you.
Ukpai Ugochi This post was written by Ukpai Ugochi. Ukpai is a full stack JavaScript developer (MEVN), and she contributes to FOSS in her free time. She loves to share knowledge about her transition from marine engineering to software development to encourage people who love software development and don’t know where to begin.
Relevant Articles
What Makes a Good Enterprise Release Manager?
09 SEPTEMBER, 2022 by Michiel MuldersDo you want your company to scale efficiently? Look for an enterprise release manager (ERM). An ERM protects and manages the movements of releases in multiple environments. This includes build, test, and production environments....
The Pros and Cons of Test Data Synthetics (or Data Fabrication)
22 August, 2022 by Louay Hazami *Update from October 2020Data privacy is one of the most pressing issues in the new digital era. Data holds so much value for normal internet users and for all types of companies that are looking to capitalize on this new resource. To...
What Is Data Fabrication in TDM
16August, 2022 by Carlos Schults *Update from 15 Mar 2021In today's post, we'll answer what looks like a simple question: what is data fabrication in TDM? That's such an unimposing question, but it contains a lot for us to unpack.What is TDM to begin with? Isn't data...
Your Essential Test Environment Management Checklist
08August, 2022 by Carlos Schults *Update from 26 Nov 2019.Your Essential TEM Checklist "Test Environment Management Checklist." Yep, that sounds like a mouthful, but don't let that discourage you. The idea here is quite simple—adopting a checklist to evaluate...
Sand Castles and DevOps at Scale
03JUNE, 2022 by Niall Crawford & Carlos "Kami" Maldonado. Modified by Eric Goebelbecker.DevOps at scale is what we call the process of implementing DevOps culture at big, structured companies. Although the DevOps term was back in 2009, most organizations still...
Test Environment Management Explained
3JUNE, 2022 by Erik Dietrich, Ukpai Ugochi, and Jane Temov. Modified by Eric GoebelbeckerMost companies spend between 45%-55% of their IT budget on non-production activities like Training, Development & Testing and lose 20-40% of productivity across their... | ESSENTIALAI-STEM |
Mortimer Davis
Sir Mortimer Barnett Davis (February6, 1866 – March22, 1928) was a Jewish Canadian businessman and philanthropist. The mansion that he built in Montreal's Golden Square Mile has been renamed Purvis Hall and is today owned by McGill University.
Business career
Born in Montreal, Quebec, to Samuel Davis and Minnie Falk Davis, he graduated from the High School of Montreal and then joined his elder brothers Eugene Harmon and Maurice Edward in the family's cigar business, S. Davis and Sons. In 1888, S. Davis and Sons purchased another Montreal firm, D. Ritchie and Company.
In 1895, the American Tobacco Company purchased D. Ritchie and Company, as well as the American Cigarette Company, another Montreal cigarette manufacturer. Samuel Davis retired from S. Davis and Sons, and Mortimer Davis left the family firm, which remained in the hands of two of his brothers, to become president of the American Tobacco Company of Canada.
In 1902, the British-American Tobacco Company Limited was formed by the merger of the American Tobacco Company and the Imperial Tobacco Company of England. It later purchased the American Tobacco Company of Canada, which became the Imperial Tobacco Company of Canada Ltd., and Mortimer Davis was its first president. The financial power of the empire over which he presided earned him the title of "Tobacco King," which he shares with his great rival, Sir William Christopher Macdonald.
In 1917, he was knighted by King George V, becoming the first Canadian-born Jew to receive such an honour.
Davis was a director of many companies, including the Union Bank, Royal Bank of Canada, Henry Corby distillery (he served as president from 1907 to 1922), Crown Trust Company, Empire Tobacco, and part of the senior management of the Nova Scotia Silver Cobalt Mining Company and the Consolidated Asbestos Mining Company. In addition, he was a member of the Montreal Board of Trade and the Montreal Stock Exchange.
Personal life
On June 12, 1898, in San Francisco, Davis married Henriette Marie Meyer, daughter of Charles Meyer, a banker and philanthropist. Their only son, Mortimer Davis, junior, died in 1940.
Davis was a member of Temple Emanu-El (see Temple Emanu-El-Beth Sholom (Westmount, Quebec)), which his father had helped to establish. He underwrote the entire $420,000 of a new YMHA (see Federation CJA) building, which opened at Mount Royal, near Park Avenue, shortly after his death. He was a key force in building the Mount Sinai Sanatarium, in Préfontaine.
In 1924, Davis divorced his wife in order to marry Eleanor Curran (d. 1963). He spent many of the final years of his life at Les Glaïeuls, his villa in Cannes, where he died in 1928.
He is interred within Mount Royal Cemetery in Montreal. His former residence in the Golden Square Mile (formerly called Sir Mortimer B. Davis House) is now known as Purvis Hall, on the grounds of McGill University.
Following his death, a dispute arose about the execution of his will. His widow, who was one of the executors, and his son together sued to have the other two executors, Lord Shaughnessy and A.M. Reaper, removed on the basis of fraud. The litigation was extensive, ultimately being decided in favour of Shaugnessy and Reaper by the Judicial Committee of the Privy Council, at that time the highest court in the British Empire, including Canada.
Davis left 75% of his estate to be used for the construction of a Jewish public hospital in Montreal that would bear his name. However, he stipulated that the funds be invested for 50 years to allow them to reach a sum capable of funding a sizable hospital. And so it was that in 1978, $10 million from his estate was donated to the existing Jewish General Hospital in Montreal, which was renamed the Sir Mortimer B. Davis Jewish General Hospital.
His first wife was an active philanthropist and was made an officer of the Légion d'honneur and Commander of the Order of the British Empire. She died in 1963. The Lady Davis Institute for Medical Research, the Lady Davis Fellowship, the Lady Davis Mechanical & Aeronautical Engineering Center (a 7-storey low-rise building of the Technion in Haifa), the Lady Davis Building (the main building of the National Library of Israel in Jerusalem) and the Lady Davis Carmel Medical Center in Haifa, Israel are named in her honour. | WIKI |
James Heywood (philanthropist)
James Heywood (28 May 1810 – 17 October 1897) was a British MP, philanthropist and social reformer.
Early life
James Heywood was born on 28 May 1810 in Manchester, Lancashire. He was the son of banker Nathaniel and Ann (née Percival) Heywood, and was the brother of Benjamin Heywood and Thomas Heywood and grandson of Thomas Percival. He matriculated from Trinity College, Cambridge and was admitted to the Inner Temple.
Career
Heywood was a member of the Portico Library and the Manchester Statistical Society, of which he was president between 1853–55, and published a study of the population of Miles Platting in Manchester. He was elected a Fellow of the Royal Statistical Society and served as their President from 1875 to 1877. He was also interested in geology and in 1840 donated some hundred specimens to help form the mineral collection of Manchester Museum. In 1835, he became the first president of the Manchester Athenaeum and he was also involved with the Manchester Literary and Philosophical Society.
Heywood was elected a Fellow of the Royal Society in February 1839. His candidature citation read: "James Heywood, Esq of Trinity College, Cambridge, residing at 17 Cork Street, London, Barrister of the Inner Temple, author of a Report on the Geology of the Coal District of South Lancashire, published in the Transactions of the British Association, & also of a Report on the state of the population in Miles Platting, Manchester, published in the Journal of the Statistical Society of London; a gentleman much attached to science, being desirous of becoming a Fellow of the Royal Society, we the undersigned, do, from our personal knowledge, recommend him as deserving of that honor, & as likely to be a useful & valuable member"
Heywood was Liberal MP for North Lancashire from 1847 to 1857. He campaigned for free libraries, museums and art galleries, university entrance for dissenters and university degrees for women. He was President of the Sunday Society which campaigned for leisure activities to be available on Sundays.
Heywood opened the first free library in Kensington at Notting Hill Gate in the 1870s, a decade prior to the 1889 dedication of the Kensington Central Library in the Kensington Vestry Hall.
Personal life and death
Heywood married on 11 June 1853 Anne (née Kennedy) Escher, the daughter of John Kennedy and widow of Albert Escher; they had a daughter Anne Sophia. They lived in London.
Heywood died on 17 October 1897. | WIKI |
Sen. Ted Cruz: Iran cheats on nuclear deal; 'reimpose sanctions'
The United States should put sanctions on Iran back into effect, Sen. Ted Cruz told CNBC on Friday, accusing Tehran of cheating on the 2015 agreement that it made with the U.S. and five other nations to curtail its nuclear weapons program. President Donald Trump on Friday is expected to refuse to certify to Congress that the Iran nuclear deal remains in the best interest of the U.S., but stop short of pulling the U.S. out or telling lawmakers to reimpose sanctions. "It is the right thing to decertify," Cruz said on CNBC's "Squawk Box, " just hours before Trump's afternoon speech. "I think we should reimpose sanctions. The administration can reimpose sanctions. That would be the right thing to do. Congress can reimpose sanctions." The Texas Republican, who unsuccessfully ran against Trump for the 2016 GOP presidential nomination, also accused Iran of cheating on the accord. However, the International Atomic Energy Agency, the United Nations watchdog, has said Iran has been living up to the terms. "When I was campaigning, I promised, that if I had been elected on Day 1 I would have ripped to shreds the Iran deal," Cruz said, claiming the agreement crafted under Trump's predecessor, Barack Obama, is "designed to allow cheating." Cruz said the agreement prevents the IAEA from monitoring military sites. "Well, guess where they're doing the nuclear work? On the military sites," he claimed, an assertion Iran has denied. Despite the senator's claims that Iranian military sites are off-limits, the accord actually does make some allowances for those inspections. But it requires monitors to request access from Iran. Critics claim that effectively makes them inaccessible. Trump faces a Sunday deadline to notify Congress on whether Iran is complying with the deal, a requirement of the president every 90 days. | NEWS-MULTISOURCE |
Page:The Novels of Ivan Turgenev (volume VIII).djvu/89
'He too was a landowner,' my new friend continued, 'and a rich one too, but he ruined himself—so he lives now with me. But in his day he was considered the most dashing fellow in the province; he eloped with two married ladies; he used to keep singers, and sang himself, and danced like a master. But won't you take some vodka? dinner is just ready.'
A young girl, the same that I had caught a glimpse of in the garden, came into the room.
'And here is Olga!' observed Radilov, slightly turning his head; 'let me present you. Well, let us go into dinner.'
We went in and sat down to the table. While we were coming out of the drawing-room and taking our seats, Fyodor Miheitch, whose eyes were bright and his nose rather red after his 'refreshment,' sang 'Raise the cry of Victory.' They laid a separate cover for him in a corner on a little table without a table-napkin. The poor old man could not boast of very nice habits, and so they always kept him at some distance from society. He crossed himself, sighed, and began to eat like a shark. The dinner was in reality not bad, and in honour of Sunday was accompanied, of course, with shaking jelly and Spanish puffs of pastry. At the table Radilov, who had served ten years in an infantry regiment and had been in Turkey, fell to telling anecdotes; I listened to him with attention, and secretly watched Olga. She was not very pretty; | WIKI |
User:Evans Kasiria
evans kasiria he is astudent at rev githirwa sech schl,he has been song writter and poems in 2014 he went and present poem during enviroment ceremony in ndabibi primary in naivasha latter he recorded a song about drugs and a gospel song that colled give me power but by know he is faci problem on school fees and he is requesting any one to pay for him<PHONE_NUMBER> | WIKI |
Equifax data breach liability could hinge on where case is tried
(Reuters) - Less than a day after Equifax revealed one of the biggest data breaches in U.S. corporate history, the credit reporting company has already been hit with two proposed class actions in federal court – and one of those cases was filed by consumer lawyers who just won the right to move forward with gargantuan data breach litigation against Yahoo. That’s an ominous development for Equifax. And you can be sure there will be more suits to come. Equifax said hackers accessed files that contained the names, Social Security numbers and driver’s license numbers of as many as 143 million U.S. consumers. The profusion of potential data breach victims will attract lots of lawyers who will probably file lots more proposed class actions. (Equifax did not respond to a request for comment on the litigation from my Reuters colleague Jon Stempel.) Eventually, if recent data breach litigation against Anthem, Yahoo and Target is a guide, the Equifax cases will be consolidated by a panel of federal judges who will transfer the cases to a single federal court. That court will rule on the crucial early-stage motions that will shape Equifax’s liability to the millions of consumers whose data has been compromised. That’s where things could get very interesting. In data breach litigation, the answer to a threshold question about who has the right to sue depends on which court is hearing the case. If litigation against Equifax ends up in Chicago, for example, data breach victims must only show they are at risk of identity theft to establish the constitutional right to sue in federal court, otherwise known as standing. But in Richmond, Virginia, heightened risk isn’t enough to satisfy standing requirements. Federal appellate courts are deeply divided on the question of who has standing to sue over data breaches. Several federal circuits, including the 3rd, 6th, 7th and District of Columbia U.S. Circuit Courts of Appeal, have held in the past two years that the mere increased risk of identity theft or credit card fraud gives consumers a threshold right to bring a class action. Those rulings make it much easier to move forward with data breach litigation because lawyers representing consumers whose personal information has been stolen don’t have to show their clients’ data has actually been misused. Getting class actions past the threshold requirement can, in turn, lead to quicker, larger settlements. This summer, for instance, the insurer Anthem agreed to a record-setting $115 million settlement of data-breach litigation consolidated in federal court in San Jose. The 9th Circuit, which encompasses California, has held that data breach victims meet standing requirements if they can show “a credible threat of real and immediate harm.” The 2nd, 4th and 8th Circuits don’t buy that reasoning. They have all recently held that risk alone - without allegations that personal information has actually been misused – is not an adequately concrete injury to allow consumers to sue. Equifax is based in Atlanta, which is located in the 11th Circuit. That appeals court most recently ruled on standing for data breach victims in 2012, in a proposed class action called Resnick v. AvMed, which involved the theft of two laptops containing personal information about clients of AvMed, a healthcare provider. The AvMed clients who filed the case claimed their information had already been misused. AvMed argued that they didn’t meet constitutional standing requirements because they couldn’t show the supposed misuse stemmed from the theft of AvMed laptops. The 11th Circuit concluded that data breach victims do not have to prove such a link in order to establish their threshold right to sue. But the Resnick opinion did not address the question of standing for data breach victims whose information has only been stolen but not yet misused – which is what consumers are alleging in the two Equifax proposed class actions that have already been filed. At least one federal district judge in the 11th Circuit has found, in a 2016 decision, that the risk of identity theft after a data breach is not enough to give consumers a right to sue. Sooner or later, the U.S. Supreme Court will probably have to resolve uncertainty among the federal appellate courts on the standing of data breach victims facing increased risk of identity theft. The health insurer CareFirst, which last month lost an appeal at the D.C. Circuit in which it tried to bounce a data breach class action, has informed the appeals court that it intends to ask the justices to hear the issue. Possible Supreme Court involvement is just one of the factors that will ultimately determine the magnitude of Equifax’s litigation exposure to consumers. (Another could be Equifax’s terms of service, which include a provision that appears to require consumers enrolling in a complimentary monitoring service called TrustedID Premier to waive their class action rights and submit disputes to arbitration.) These big data breach class actions are typically measured in years, not weeks or even months. But keep an eye on which court ends up overseeing the consolidated litigation. In data breach class actions, as in real estate, much depends on location, location, location. | NEWS-MULTISOURCE |
Investing Insider November 19: Inside ADIPEC, WeWork fallout
Dear Readers,As the US got caught up in President Donald Trump's impeachment proceedings last week, a different type of history was being made on the other side of the world. It occurred at the Abu Dhabi International Petroleum Exhibition & Conference (ADIPEC), where all the world's top oil and gas executives gathered to sign a blockbuster deal.The agreement revolved around a new exchange that will enable futures trading on a highly valuable type of crude oil native to the United Arab Emirates, called Murban. The new contracts — expected to start trading in the second or third quarter of 2020 — will be hosted by International Exchange.Chief executives from BP, Total, PetroChina, Shell, Vitol, Taiwan's PTT, Japan's JXTG, Korea's GS Caltex, and Inpex were on hand to sign up as partners in the deal. They envision the Murban becoming a new global benchmark, slotting in alongside WTI and Brent crude, with a specific focus on serving Asian markets.Business Insider was on hand to witness the historic accord in person. Here's a first-hand account of the official announcement, the hubbub that accompanied it, as well as the global CEO summit that came after. The following day, another gathering of global executives took place, where top brass explained their backing of the deal. BI was in the room for that as well.But ADIPEC wasn't all about the Murban exchange. There was also a major focus on innovation and the digitization of oil and gas technology. To that end, the conference had self-driving car pioneer Sebastian Thrun — the founder of Google's secretive lab called Google X — deliver a keynote address.BI was able to sit down for a private conversation with Thrun beforehand. He shared his artificial intelligence-driven vision for the future of the oil and gas industry, and offered a glimpse into how his mind works.To recap, here's BI's full coverage of ADIPEC:Inside a 'historic day' at the Middle East's biggest oil and gas conference, where all the world's top energy CEOs gathered to sign a deal that could permanently change the industry4 of the world's top oil and gas executives explain why they're backing a landmark trading deal that could revolutionize the industryThe godfather of the self-driving car shares his bold, AI-driven vision for the future of the oil and gas industry — and provides a peek into his disruptive mindsetGoing beyond that, here's a rundown of our other main coverage from the last week. It includes a grim look at what WeWork's recent failures mean for similarly unprofitable unicorns, a strategy for beating your peers during a market meltdown, and tips for avoiding so-called "value traps" in the stock market.WeWork is just the 'tip of the iceberg.' Here's why one market expert thinks Silicon Valley's business model 'is at the beginning of a massive unraveling.'Vincent Deluard, the director of global macro strategy at INTL FCStone, says Silicon Valley's overriding business model is fundamentally unsustainable as it stands right now.In an interview with Real Vision, he explained why he thinks WeWork's contagionlike effect will make it harder for companies to IPO.READ MORE HERE >>A fund manager who's crushing nearly all of his peers breaks down his unique strategy for continuing to outperform during a market crashConventional wisdom suggests investors should hide out in "defensive" corners of the market during a downturn — like utilities and telecom stocks.But Joshua Bennett, a portfolio manager of the Alger subsidary Weatherbie Capital, has an alternative approach. In an exclusive interview with Business Insider, he laid out his favorite strategy for outperforming peers during a market sell-off.READ MORE HERE >>The top researcher at a firm managing $89 billion told us the 3 ways he analyzes whether a cheap stock is set for a surge, or if it's a trapValue stocks have made a comeback in recent months after underperforming the broader market throughout much of the 10-year bull market.Michael Mullaney, the director of global markets research for Boston Partners, shared with Business Insider his best strategies for identifying value plays — ones that don't fit the traditional mold of a "value trap."READ MORE HERE >>Other good stories from the investing realm:Jim Rogers, the investing guru who earned a 4,200% return with George Soros, told us everyone should read 3 books that made a 'huge impression' on his careerLarry Hite built a $100 million dollar empire with a simple stock trading strategy. Here's his best advice for today's trader.The historic '60-40' rule of investing is finished for at least 10 years thanks to low bond returns, according to JPMorgan's $1.9 trillion asset-management arm. Here's what to do instead.'You don't have to be the smartest guy in the room': A self-made real-estate expert who's increased his net worth 100 times by flipping houses explains how he does itBank of America pinpoints the market's biggest vulnerability over the next decade, and offers its top investing strategies to prepare for an 'imminent' global recessionAs unicorns like WeWork and Uber test the IPO market with disastrous results, America's biggest wealth manager for the ultrarich shares his best strategies for investing in unproven giantsA personal finance expert details the path to 'guilt-free spending' — and breaks down the ideal financial mix that can lead to a 'rich life lived outside the spreadsheet' | NEWS-MULTISOURCE |
Azure NAT Gateway Explained
Reading Time: 7 minutes
If you are new to Azure, you might be wondering what is a NAT gateway and why do you need one. In this blog post, I will explain the basics of Azure NAT Gateway and how it can help you connect your Azure resources to the internet.
SNAT – Source Network Address Translation
Before diving into Azure NAT Gateway, have you ever wondered how your devices or services can access the internet using a single public IP address? This is possible thanks to a technique called SNAT, which stands for source network address translation. SNAT changes the original IP address and port of your outgoing packets to match the public IP address and a unique port. Let’s dig deeper.
At home, your Internet Service Provider provides you with a router to which all your devices connect to via wireless or a physical cable as demonstrated in the drawing below,
In most cases the devices connecting to your home router are issued with an IP address automatically using a built in DHCP service built into the router, see example below. Each device has an IP address.
The above assigned IP addresses are private and can only be used on your home network, these IP addresses are not internet routable so can not access the Internet. Yet, we know that your devices at home can access the Internet. How do your devices access the internet? via the router.
To allow access to the internet, your Internet Service Provider assigns you a public IP address, allocated to your router. As shown in the diagram below. (Public IP selected for demo purposes).
When your home devices connect to the Internet via the router, the router has a built in SNAT (Source Network Translation) which translates to allow traffic from a private network (your home network) to go out to the internet. All your devices use the public IP address assigned to your router to gain access to the internet. If you were to visit each one of your devices, open an internet browser (ensure you’re connected to your home router wirelessly or a cable) and visit the website https://whatismyip.com/ you will find that the public IP address is the same for all your devices (mobiles, ipads, laptops). This is because your devices are using the same Public IP to access the internet.
Now that you have a basic idea of SNAT (Source Network Address Translation), let’s move onto understand what a Azure NAT Gateway is.
What is a Azure NAT Gateway?
An Azure Network Gateway is similar to your home router but more intelligent and built for larger networks. An Azure Network Gateway allows your private resources (such as Virtual Machines) located in Azure to connect to the internet through a central, managed and highly resilient Network Address Translation (NAT) service.
But a Azure virtual machine can get out to the Internet by default, right?
Correct, and let’s understand how Virtual Machines in Azure access the internet (outbound) without the implementation of an Azure NAT Gateway.
Important Announcement: Default outbound access for vm’s in Azure will be retired September 2025
In Azure, virtual machines without explicit outbound connectivity defined are assigned a default outbound public IP address via the Azure platform. This IP address enables outbound connectivity from your virtual machine to the Internet. This access is referred to as default outbound access. This auto assigned public IP address belongs to Microsoft and is subject to change so it’s not recommended to depend on this default public IP address for production workloads. Customers don’t own the default outbound access IP and have no control over it. This IP may change, and any dependency on it could cause issues in the future. Logon to a virtual machine in Azure without a public IP address explicitly assigned and try accessing the Internet or browse to https://whatismyip.com/ and take a note of the automatically assigned default public IP address.
Can I assign an explicit outbound connectivity method by manually assigning an instance level public IP address to a Virtual Machine?
Yes, this is another option. You could create a Public IP address in Azure which you will have more control over such as ensuring it is static and doesn’t change, and then assign this public IP address to your Virtual Machine. Creating a public IP address will also allow Internet resources to communicate inbound to your Azure virtual machine and enable your virtual machine to communicate to the Internet. You dedicate the public IP address to the resource until you unassign/remove it, you’re in control.
A resource without a public IP assigned can communicate outbound to the Internet as we now know but inbound access is not allowed until you assign your own created public IP address and configure the required NSG/Firewall rules to allow inbound access from the Internet. Therefore, you could assign your virtual machines a public IP address but ask yourself a question, am I only granting these virtual machines a public IP to allow access to the internet? how many virtual machines do you have that require access to the internet? is it a good idea assigning each virtual machine a dedicated public IP address to allow access to the Internet? there is definitely another layer of management overhead as an accidental configuration could allow access to your resources from the outside world, such as accidentally allowing RDP from the outside world would trigger a brute force attack in no time.
So what do Microsoft recommend for resources in Azure requiring outbound Internet access without assigning each resource a public IP address?
Azure NAT Gateway
Azure NAT Gateway is a fully managed and highly resilient Network Address Translation (NAT) service. You can use Azure NAT Gateway to allow your resources in your Virtual Network subnets connect outbound to the internet while remaining fully private, as there is no need to assign all your resources a public IP address. Unsolicited inbound connections from the internet aren’t permitted through a NAT gateway, the service is secure by default. A NAT Gateway allows traffic to flow outbound to the Internet only. However, only packets arriving as response packets to an outbound connection can pass through a NAT gateway.
In the diagram above we have a NAT Gateway connected to two subnets inside a VNET (Virtual Network). The NAT gateway assumes the subnet’s default next hop type for all outbound traffic directed to the internet. No extra routing configurations are required. Outbound Internet traffic for Virtual Machines in Subnet A and Subnet B, along with the Virtual Machine Scale Set (VMSS) will flow through the NAT Gateway. The NAT gateway can be configured with up to 16 public IP addresses which can scale automatically as demand increases.
In the diagram below, we introduce a Load balancer, so how does traffic flow outbound when a Azure load balancer comes into the picture? traffic being distributed to a backend pool of servers via a load balancer will open the flow to allow traffic to return outbound via the Load balancer, so packets arriving as response packets to an inbound connection can pass back through the load balancer and not outbound via the NAT Gateway. Yes, the NAT Gateway has this intelligence built in.
What about a Virtual machine with a public IP assigned?
Exactly the same as inbound traffic via a load balancer (mentioned above), packets arriving as response packets to an inbound connection can pass back through the public IP address assigned to the Virtual Machine and will not flow outbound via the NAT Gateway.
Azure NAT Gateway benefits
• Simple setup
• Secure by default
• Scalable – Each NAT gateway public IP address provides 64,512 SNAT ports, and NAT gateway can
scale to use up to 16 public IP addresses, reducing the chances of SNAT Port Exhaustion. NAT gateway solves the problem of SNAT port exhaustion by providing a dynamic pool of SNAT ports so ports are only allocated to virtual machines when needed instead of a pool based SNAT allocation where a number of ports are assigned to a virtual machine from which some are used and others remain available but not used by the virtual machine. The virtual machines would keep hold of the additional assigned ports, which can cause SNAT port exhaustion.
Another cool feature of Azure NAT Gateway is that it selects SNAT ports at random from it’s available inventory to make new outbound connections and it only assigns ports to virtual machines as and when needed. As mentioned in the earlier paragraph, virtual machines are not being assigned additional ports when they will not be used.
Also, Azure NAT Gateway allows a SNAT port to be reused to connect to the same destination endpoint. However, before doing so, NAT Gateway places a reuse cooldown timer on the port after the initial connection closes, which prevents ports from being selected too quickly.
When NAT gateway cannot find any available SNAT ports to make new outbound connections, it can reuse a SNAT port that is currently in use so long as that SNAT port connects to a different destination endpoint.
• Performance – each NAT Gateway can process up to 50 Gbps of data. A NAT gateway can support up to 50,000 concurrent connections per public IP address to the same destination endpoint over the internet for TCP and UDP. The NAT gateway can process 1M packets per second and scale up to 5M packets per second. The total number of connections that a NAT gateway can support at any given time is up to 2 million. While it’s possible that the NAT gateway can exceed 2 million connections, you have increased risk of connection failures.
• NAT gateway takes precedence over other outbound connectivity methods, including Load balancer, instance-level public IP addresses (assigning a public IP address to a Virtual Machine), and Azure Firewall.
• NAT gateway automatically replaces the default Internet public IP assigned by the Azure platform.
• No traffic routing configurations are required to use NAT gateway.
Azure NAT Gateway Limitations
Yes, there are limitations you need to be aware of when implementing a Azure NAT Gateway. Documented at Azure NAT Gateway resource | Microsoft Learn
For more info on Azure NAT Gateway, visit the following Microsoft Learn link What is NAT Gateway and the Azure NAT Gateway FAQ page
Thank you and see you at the next post 🙂
4 thoughts on “Azure NAT Gateway Explained
Leave a Reply
Your email address will not be published. Required fields are marked *
This site uses Akismet to reduce spam. Learn how your comment data is processed. | ESSENTIALAI-STEM |
1st (Silesian) Life Cuirassiers "Great Elector"
The 1st (Silesian) Life Cuirassiers were a heavy cavalry regiment of the Royal Prussian Army. The regiment was originally formed as Dragoon Guards in 1674 and reorganized as a cuirassiers unit in 1718. The regiment fought in the Silesian Wars and the War of the Sixth Coalition 1813-15, the Austro-Prussian War, the Franco-Prussian War and World War I. The regiment was disbanded in 1919.
Between 1815 and 1863, its commander was Prince Frederick of Prussia (1794–1863). | WIKI |
Here's the (Alan) Brady Bunch - latimes
Nothing is expected to last in this throwaway society, Carl Reiner said. It is amazing that things do have a second life. Reiner was reminiscing about the longevity of his Emmy-winning series The Dick Van Dyke Show, which aired on CBS from 1961 to '66 and is currently in reruns on Nick at Nite. Begining Monday, it's Carl on Camera week on The Dick Van Dyke Show, as the week's episodes will feature Reiner. Four episodes will show Reiner as Alan Brady, the obnoxious, demanding star of comedy writer Rob Petrie's (Van Dyke) show. (The fifth features Reiner as a bearded artist who once painted a portrait of Laura.) During the first two seasons of Dick Van Dyke, viewers saw only the back of Brady's toupee-clad head. Originally, Reiner, the show's co-creator, producer and writer, wanted to cast a star in the role of Brady, but couldn't think of anybody to play that part. I knew I had been a second banana on 'Your Show of Shows,' but if I played Alan Brady myself, (the audience) would say, 'He is not a real star. He's a second banana.' So I gave him a name, turned him around and I used the back of his head. He became an offstage force. We needed that power upstairs that scared people. When the series began to involve the Brady character more, Reiner thought it was time to put a face to Alan. It wasn't fair to the scriptwriters, including myself, not to see the face of the person delivering the lines. By that time my ego was not as tender and I said, 'I could play a star.' So I turned myself around. It was really to make the shows more viable. I only did one every 12 or 13 weeks. I was too busy writing them. One of Reiner's favorite Brady shows is when Alan's toupee was mentioned in public. It was supposed to be a secret, he said. But I always admitted I wore a toupee from the very first time I was on 'Your Show of Shows.' I didn't have that ego, but we thought Alan Brady would. Brady, Reiner said, was not based on any single person. In those days there were a lot of comedian-stars of variety shows and none of them was as bad as Alan, he said. Milton Berle was known to be a tyrant--he would blow a whistle and yell at people. Phil Silvers was a noisy one. I worked with Sid Caesar for nine years and everybody thought I might be doing Sid, but Sid was a pussycat compared to this guy. Reiner admitted he never enjoyed playing Alan. I love being obnoxious, but I didn't enjoy the time it took to get on the set and rehearse, because I was always running up and down from my room and rewriting the next week's show. So I really didn't enjoy the show as much as after it was done. Doing the show was a chore. During the first two years of the series, Reiner wrote 40 out of 60 episodes. If I did have an outside writer I did all the rewrites, he said. The reason I wrote so many was that it was more difficult to rewrite someone. I could write a new one in four days and it took me eight days to do a rewrite. Reiner said CBS has come to him about doing a Dick Van Dyke reunion show, a la the recent retrospectives the network has done on The Bob Newhart Show, All in the Family, Mary Tyler Moore and The Ed Sullivan Show. I would like to do it in the future. I don't want to just do one, he explained. I have seen a couple that were great and then I saw one where people just sit there and self-aggrandize themselves. Reiner, who has directed such films as Summer School and Sibling Rivalry, doubts he would ever do another TV series. You never say never, but on a daily basis it's very difficult work. (Feature films are) far more relaxing and more fulfilling, as far as getting what you want on the screen without worrying about the networks saying, 'You can't do that.' Carl on Camera on The Dick Van Dyke Show Monday-Friday at 9 p.m. on Nickelodeon. There's more for marathon maniacs this holiday week: Imagine if you will, 13 consecutive hours of your favorite episodes of The Twilight Zone. On Thanksgiving, KTLA will present its 12th Annual Thanksgiving Day Twilight Zone Marathon (Thursday beginning at 9 a.m.) featuring viewers' requests. Want a neat, petite, ooky Turkey Day? Spend it with everyone's favorite ghouls who are now the stars of their own feature film, The Addams Family, opening in theaters Friday. KCAL presents The Addams Family Festival (Thursday from 9 a.m.-10 p.m.) and TBS also jumps on the bandwagon Friday with The Addams Family Special (7:05-9:05 p.m.) Turn Turkey Day on with a smile with six hours of The Mary Tyler Moore Show (Thursday from 10 a.m.-5 p.m. on KDOC). If Green Acres is the place you want to be, then check out the six-hour Green Acres Marathon (Friday from 10 a.m.-5 p.m. on KDOC). Looney Tunes Pig Out (Friday from 7 to 9 p.m. on Nickelodeon) features vintage cartoons of Bugs and Co. TNT presents A Salute to the Outer Limits II (Saturday from 8 p.m. to 5:45 a.m. Sunday), featuring nine uncut episodes from the '60s series. | NEWS-MULTISOURCE |
Microsoft VS/.NET Log Collection Tool
Heath Stewart
Using the Collect Utility
If you encounter any setup issues, we will need all relevant logs. Please follow the instructions below to collect all those logs.
1. Download collect.exe from the link below.
2. You may choose to save the tool for later use, or to run directly.
3. The utility creates a compressed cabinet of all the VS and .NET logs to %TEMP%\vslogs.cab.
Reporting Setup Errors
There are several options for reporting setup errors, but you might consider first checking to see if the issue is a known issue. This will save you time and provide more immediate results. In most scenarios, there will be a link on the error page after setup completes. Clicking on this should provide a smaller log that highlights the errors encountered. To dig deeper, check out some of the tips provided on Aaron’s blog and on my blog.
If you would like to report an error, be sure to collect logs as described above and choose from the options below.
1. Search or post on MSDN Forums in .NET Framework Setup or Visual Studio Setup and Installation. This is a community-driven web site on which Microsoft employees also participate.
2. Report installation issues or provide feedback for Visual Studio on Microsoft Connect. You may upload logs using Connect. This allows us to view and manage bugs, and customers to vote or provide additional details in a consistent manner.
3. Upload logs using Windows Error Reporting. Both the MSDN Forums and Microsoft Connect will most often provide faster help.
Current Usage
The following information is available from collect.exe -?:
Microsoft (R) Visual Studio/.NET Log Collection Tool version 10.0.20519.0
Copyright (C) 2009 Microsoft Corporation. All Rights Reserved
Collect install info for Microsoft Visual Studio and .NET Framework.
Note: This tool may incidentally capture information such as user or
machine name, and data on non-Microsoft software.
Usage: Collect <options>
Most options can be shortened to their initial letter.
If not otherwise specified, all accept -<opt>[:yes|no|y|n|true|false|+|-]
-cab:<name> Collect logs in cabinet <name>. Default: -c:%TEMP%\vslogs.cab
-dir:<dir> Collect logs from <dir>. Default: -d:%TEMP%
-user:<name> Collect logs from user <name>'s temp.
-time:<days> Collect logs only from the last <days> from today.
Default: -t:0 Use -t:0 to collect all.
-msi Collect Windows Installer logs (MSI*.log)
-events Collect relevant event log entries.
-sql Collect SQL installation logs.
-windows Collect Windows logs: CBS, WindowsUpdate, ReportingEvents
-inventory Collect inventory of items installed by Windows Installer.
-io:[pfctxs][:<dir>] Inventory options. Default: -io:pfct:%TEMP%
p = Products
f = Features (implies p)
c = Components
t = .TXT format
x = .XML format
s = Split xml: MsiInv.Products.xml, MsiInv.Components.xml
dir = Directory or file for inventory.
-x:<dir> Extract files to <dir>. Use with -cab:<input cabinet file>.
-xo:[lf] Extract options
l = List files only.
f = Flat - extract all files to same directory.
-post:<dir> Post collection to <dir>. -p:yes|no = use default|suppress
-pause Pause at end of run so console output can be read.
-quiet Suppress console output.
-nologo Suppress copyright banner.
http://go.microsoft.com/?LinkId=8967043 | ESSENTIALAI-STEM |
「折腾」Docker 化安装 Z-BlogPHP
吐槽/反馈/建议:→ 我的咸鱼心 ← → 爱发电-@wdssmq
使用 Docker Compose 部署「推荐」
wdssmq/zbp-docker-compose: 使用 Docker Compose 快捷部署 Z-BlogPHP + MySQL;:
https://github.com/wdssmq/zbp-docker-compose
# 安装 Docker Compose
sudo curl -L https://github.com/docker/compose/releases/download/v2.4.1/docker-compose-`uname -s`-`uname -m` \
-o /usr/local/bin/docker-compose
sudo chmod +x /usr/local/bin/docker-compose
docker-compose --version
生成最新版 Docker Compose 安装命令:https://demo.wdssmq.com/tools/GenShell/
创建一个网络用于容器互通
docker network create -d bridge net_web
后续创建的容器全部连接至该网络中,更多说明请见「这个链接」;
Docker 安装 MysQL + PHPMyAdmin
Docker 安裝 Mysql + Phpmyadmin | 愛吃東西的 RD
~~网络设置仍然不是很懂,只能说这样确实成功了;~~
下边命令最初是在 CentOS 下测试,Ubuntu 可能要加 sudo
# cd /root
# MYSQL_DIR=/root/MySQL
# if [ ! -d $MYSQL_DIR ]; then
# mkdir -p $MYSQL_DIR
# fi
# 删除已创建的容器
docker rm --force MySQL
docker run --name MySQL \
--net=net_web \
-e MYSQL_ROOT_HOST=172.%.%.% \
-e MYSQL_ROOT_PASSWORD=shujukumima \
--restart on-failure \
-d mysql/mysql-server:5.7
# PHPMyAdmin,映射端口为 9100
docker rm --force PHPMyAdmin
docker run --name PHPMyAdmin \
--network=net_web \
-e PMA_HOST=MySQL \
-e UPLOAD_LIMIT=4096K \
-p 9100:80 \
-d phpmyadmin/phpmyadmin
# 平时可以停用,需要的时候再开启
docker stop PHPMyAdmin
docker start PHPMyAdmin
# MySQL 安装验证
docker exec -it MySQL mysql -u root -p
# 进入容器内登录测试
# docker exec -it MySQL /bin/bash
# mysql -u root -p
# 命令行备份
if [ ! -d ~/backup ]; then
mkdir ~/backup
fi
# 指定要备份的数据库
DB_NAME=zblog_docker
docker exec -it MySQL mysqldump \
-u root -pshujukumima \
$DB_NAME > ~/backup/db_$DB_NAME-$(date +%Y-%m-%d-%H-%M).sql
# ↑ 重要:-p 参数后要不带空格直接连着密码
# 导入数据库
DB_SQL=~/backup/db_www.wdssmq.com.sql
DB_NAME=zblog_docker2
docker exec -i MySQL mysql \
-u root -pshujukumima \
-D $DB_NAME < $DB_SQL
# 下边命令仅作参考
use mysql;
select host,user from user;
update user set host='%' where user='root';
====================
Docker 安装 Z-BlogPHP
ZBP_DIR=~/wwwroot/zbp_folder
ZBP_PORT=8082
if [ ! -d $ZBP_DIR ]; then
mkdir -p $ZBP_DIR
fi
# 删除创建的容器
docker rm --force zbp
docker run --name zbp \
--net=net_web \
-v $ZBP_DIR:/app \
-e ZC_DB_HOST=MySQL \
-e ZC_DB_NAME=zblog_docker \
-e ZC_DB_USER=root \
-e ZC_DB_PWDD=shujukumima \
-e ZC_BLOG_USER=admin \
-e ZC_BLOG_PWDD=shezhimima \
-p $ZBP_PORT:80 \
--restart on-failure \
-d wdssmq/zblogphp
# 查看日志
docker logs zbp
# 进入容器内部
docker exec -it zbp /bin/bash
====================
构建 ZBP-Docker 镜像并发布到 docker hub
zblogcn/zblogphp-tencent-openapp-docker:
https://github.com/zblogcn/zblogphp-tencent-openapp-docker
cd ~/git
# 克隆项目并进入目录
git clone [email protected]:zblogcn/zblogphp-tencent-openapp-docker.git zbp-docker
cd zbp-docker
# Build
docker build -t wdssmq/zblogphp:22.05 .
# —— 指定 Tag
docker build -t wdssmq/zblogphp .
# —— 不指定 Tag,将默认为 :latest
# 查看镜像
docker image ls
# 登录 docker hub
# https://hub.docker.com/
# https://hub.docker.com/settings/security
# 推荐用 Access Tokens 作为下边登录的密码
docker login -u <用户名> -p <密码>
# 发布镜像
docker push wdssmq/zblogphp:22.05
docker push wdssmq/zblogphp:latest
=========================
其他
各种错误提示:
· Warning: Permanently added 'github.com,192.30.255.113' (RSA) to the list of known hosts.
解决:
执行ssh-keyscan -t rsa github.com >> ~/.ssh/known_hosts
· Permission denied (publickey).
解决:
使用形如[email protected]:zblogcn/zblogphp-tencent-openapp-docker.git的地址进行连接但是没有配置「SSH Key」时会出现该提示;
见下方ssh-keygen生成命令,然后将生成的*.pub内容填加至:https://github.com/settings/ssh/new
· ERROR: You're using an RSA key with SHA-1, which is no longer allowed. Please use a newer client or a different key type
解决:
RSA 算法已被认为不再安全(主要取决于密钥长度);
更直接的方法是更换算法为 ecdsa 或 ed25519,两者之间后者更安全,当然如果你的环境较旧,出现了unknown key type ed25519的提示,那么就选前者;
ssh-keygen -t ed25519
# unknown key type ed25519
ssh-keygen -t ecdsa
· Docker 网络相关
更详细的说明见「这个链接」;
docker network ls
docker network inspect bridge
docker network inspect host
docker network create -d bridge net_web
docker network inspect net_web
爱发电
本文标题:《「折腾」Docker 化安装 Z-BlogPHP》作者:沉冰浮水
原文链接:https://www.wdssmq.com/post/20120817544.html
特别注明外均为原创,转载请注明。
分享到微信
扫描二维码
可在微信查看或分享至朋友圈。
相关文章
发表评论:
◎欢迎参与讨论,请在这里发表您的看法、交流您的观点。 | ESSENTIALAI-STEM |
Security As A Distributed Platforms SCM Change Control Mechanism
[article]
Summary:
Ineffective operating system level security can jeopardize your entire SCM operations and the hundreds of millions of dollars of software assets you are trying to control. It is important to match SCM to your company’s security model and use OS security to exercise control over application runtime environments, which CCM tools typically do not control. Here are some important guidelines for using operating system security to provide robust SCM for Windows and *NIX platforms.
Understand Your Company’s Security Model
Your company’s security model, likely stops at securing hardware, operating system (OS) and database management system (DBMS) security. By operating system I am referring to the base operating system such as Windows 2000 or AIX and the mechanisms these OS’s use to secure file systems. I won’t belabor web security here because a web server is just an application on top of network (hardware), DBMS and OS security.
Hardware and OS security are relatively mature fields and your company’s security policies are likely to be widely understood and implemented. SCM, on the other hand, is often not as well understood throughout the organization and its implementation given a later start. This is to be expected since SCM is in many respects an extension, or specialized form of, security that includes additional change controls and reporting.
While OS security attempts to secure file and memory objects, and database security database objects, SCM attempts to secure and control changes to business objects that (should) map reasonable well to the file, memory and database objects. Since SCM usually involves getting into the nitty-gritty of files and database objects, you should understand the ins and outs of your company’s policies and conform to them to avoid run-in’s with you security organization.
Make Sure Security Is Implemented
Secondly, make sure your company’s security model is actually implemented to the detail you need for the applications you have or intend to have under SCM. If you are tasked with implementing SCM for a particular mission critical application and it is not locked down according to your company’s guidelines, then guess what? You’re going to be implementing OS level security also! Otherwise, you can’t trust the integrity of the file and database objects that the enterprise objects are based on. And then what’s the point of managing objects that you can’t trust the integrity of?
Many Enterprise-oriented SCM tools today require effective OS and DBMS level security measures, not surprisingly. They are no different than any other application in this regard, including web servers. Without these measures in place the control functions of your SCM tool can be bypassed or otherwise put at risk.
You may find that your company’s security policies are not detailed enough or otherwise inadequate to protect your enterprise objects. You may also find the policies are too strict and inhibit highly beneficial SCM controls or audit functions. Work closely with your security organization to make modifications with the understanding that you are working toward a common goal.
Securing Application QA Test and Production Runtime Environments
Unlike the mainframe, few distributed platforms CCM tools attempt to manage application runtime environments. This very important area is the machine and location on the machine where the application actually executes. To implement effective SCM, you must resort to the design and implementation of OS-level security measures in addition to mastering one or more software tools designed for SCM functions.
Aside from preventing malicious changes or disruptions to the application, OS-level security measures can act as a change control mechanism, limiting access to those who with the appropriate role to change them. This in turn has two consequences: greater segregation and clarity of roles and responsibilities, and reduction of change volume.
The benefits of locking down the production runtime environment to a limited few charged with production control responsibilities has long been known. On the distributed platforms you have little choice but to employ OS level security, including managing the passwords to the machines themselves. This concept should also be extended to critical QA test environments.
A classic example of the utility
Pages
About the author
AgileConnection is a TechWell community.
Through conferences, training, consulting, and online resources, TechWell helps you develop and deliver great software every day. | ESSENTIALAI-STEM |
Obama should not support Kaepernick's protest | TheHill
Observing the bombardment of Baltimore by British ships, Francis Scott Key penned the “Star-Spangled Banner” to capture the onslaught U.S. troops braved – “rockets’ red glare, bombs bursting in air” – for the sake of “the land of the free.” As it did then, our military will always without question answer the call to defend our nation. But airmen, soldiers, and sailors cannot be the only ones on whose shoulders rest the burden of cherishing the principles upon which our country is founded. President Barack ObamaBarack Hussein Obama3 real problems Republicans need to address to win in 2020 Obama's high school basketball jersey sells for 0,000 at auction Dirty little wars and the law: Did Osama bin Laden win? MORE, who has always possessed such a strong vision of what the United States could be, should understand this need better than anyone. All Americans must embrace and strive for what the United States – and its Anthem – represent. Thus, it is astonishing that the President suggested that only the military would be troubled by recent high-profile protests against the National Anthem. Key was imprisoned upon a British ship on the night of September 13, 1814. It was from captivity that he watched the British pound Baltimore’s Fort Covington. His desire to discern “by dawn’s early light,” whether the “star-spangled banner yet wave[s],” was fueled both by his yearning for liberty and the Nation’s hope to resist oppression. As a song, “The Star-Spangled Banner” pays homage to the ideals upon which the United States was founded and those U.S. service members who gave their lives to preserve them. As our national anthem, it is a symbol of our enduring and unified aspiration to live up to those ideals and a clear statement of our collective determination to defend them. Our National Anthem does not symbolize one simple law, political issue, or policy. It expresses a common heart within the Nation, striving to improve our laws and policies. During the Civil War, Oliver Wendell Holmes, Sr., father of the noted Supreme Court judge and defender of freedom of expression, proposed adding a stanza to the Anthem to further amplify Key’s message, including the lyrics: “By the millions unchained who our birthright have gained, we will keep her bright blazon forever unstained.” Yet, some now consider our National Anthem to represent oppression. San Francisco 49ers quarterback Colin Kaepernick recently refused to stand for the National Anthem to protest “a country that oppresses black people and people of color.” Other athletes have now joined him. It is the very principles celebrated in the Anthem that give Kaepernick the right to protest. No one knows this better than veterans; it is these principles that we swore to protect when we joined the U.S. military. Yet, incredulously, the Commander-in-Chief spoke not one word of indignation on behalf of the service members he has sent to war. Instead, President Obama minimized the outrage of veterans by saying, “When it comes to the flag and the National Anthem and the meaning that holds for our men and women in uniform and those who fought for us — that is a tough thing for them to get past...” A tough thing to get past? As veterans of the U.S. military, we are deeply troubled by these recent protests. But we should not be alone in this outrage. If we are to be the nation captured by Key – the “land of the free and the home of the brave” – if we are to continue in our national quest to provide all with the unalienable rights of life, liberty, and the pursuit of happiness, we cannot expect our military to be the only ones who honor and respect the symbols and principles of our country. No Commander-in-Chief of an all-volunteer force, predicated on the principles of civilian control and public service, should divide society – as President Obama has – between those who serve and honor our nation, and some who merely take riches from its vast opportunities. The Commander-in-Chief should speak forcefully in support of our national unity first, rather than simply defend the obvious rights of a pampered multimillionaire who has never served, like us, in war. Perhaps Kaepernick and the President could learn from the example of Dr. Martin Luther King. Before presenting an advanced version of his “I have a Dream” speech before a crowd of 25,000 in Detroit, King and his assembly stood as the Four Tops sang the National Anthem. King personally experienced far more injustice than Kaepernick ever will. Yet, unlike Kaepernick, he did not sit. If Kaepernick wants to better our society, he should celebrate our National Anthem. Its lyrics bring to life the message of sacrifice for liberty and justice more than any protest against it can. And if President Obama believes in the virtues of an “active citizenry” he should not be relegating respect for “the flag and the National Anthem and the meaning that holds” to just the armed forces. During the Anthem, we should all stand together, united as a nation. Stutzriem, USAF (ret.) was Director, Plans, Policy and Strategy, North American Aerospace Defense Command and U.S. Northern Command. He currently serves on the Board of Advisors for the Jewish Institute for National Security Affairs (JINSA). The views expressed by Contributors are their own and are not the views of The Hill. View the discussion thread. Contributor's Signup The Hill 1625 K Street, NW Suite 900 Washington DC 20006 | 202-628-8500 tel | 202-628-8503 fax The contents of this site are ©2019 Capitol Hill Publishing Corp., a subsidiary of News Communications, Inc. | NEWS-MULTISOURCE |
Sparta Systems Appoints Dana Jones As CEO
HAMILTON, N.J., April 3, 2018 /PRNewswire/ -- Sparta Systems, Inc ., the leading provider of quality and regulatory management software solutions, announced today that it has appointed Dana Jones as Chief Executive Officer. Current CEO Eileen Martinson, who has led Sparta since 2011, plans to retire but remain an active member of the board and strategic advisor to the company.
"Dana is a passionate leader who brings a valuable combination of customer focus and market-driven innovation to Sparta, making her the perfect fit for this role. I am thrilled to welcome Dana as our next CEO," said Martinson.
Jones is an accomplished software executive with decades of experience leading and growing cloud-based global businesses. She most recently served as CEO of Active Network, the leader in activity and event management software. Under her leadership, the company grew rapidly, leading to the strategic sale of the Sports and Communities divisions to Global Payments Inc. in 2017 for $1.2 Billion.
Prior to Active Network, Dana was CMO and SVP of Solutions Management for Sabre Airline Solutions, a global provider of mission critical software to the airline industry. At Sabre, she drove double-digit revenue and earnings growth by transforming the organization into a market-driven software company focused on accelerated product innovation.
"We are incredibly excited to partner with Dana," said Pete Masucci, Managing Director at New Mountain Capital. "She is a visionary leader with a track record of driving exponential growth, accelerating innovation, and building strong value-based cultures – all critical elements for Sparta's continued success and future growth," added Masucci. "We also want to thank Eileen for her longstanding service and leadership, and support during this transition period."
Jones joins Sparta Systems during a transformational period driven by industry, market and product portfolio innovations. The company recently launched TrackWise Digital , the world's most comprehensive cloud-based quality management platform and a key component of Sparta's strategy to connect quality ecosystem stakeholders through a virtual Quality Business Network.
"Sparta Systems is the market leader and is poised for its next phase of growth enabled by the cloud and the digital transformation revolutionizing the markets we serve," said Jones. "We have a world-class customer base, strong products, and a talented organization rich in domain expertise. I am thrilled to lead Sparta through its next phase of growth and, more importantly, deliver on our commitment to enable our customers to produce safe and compliant products."
About Sparta Systems
Founded in 1994, Sparta Systems is the world's premier provider of cloud and on-premise quality management software. We offer the solutions, analytics, and expertise that speed up quality and compliance. Our solutions help to lower risk, increase efficiency, and keep consumers safe while allowing manufacturers, suppliers, and distributors to collaborate in a seamless and integrated environment. Sparta is privately owned and headquartered in Hamilton N.J, with offices across Europe and Asia. We support close to 1 million users across 700+ implementations, in more than 30 countries. Companies in life sciences, consumer products, discrete manufacturing and more, rely on Sparta. Learn why at www.spartasystems.com .
Media Contacts
Michael Bord
Sparta Systems, Inc.
michael.bord@spartasystems.com
Kerin Norton
SHIFT Communications for Sparta Systems
sparta@shiftcomm.com
View original content: http://www.prnewswire.com/news-releases/sparta-systems-appoints-dana-jones-as-ceo-300623044.html
SOURCE Sparta Systems, Inc. | NEWS-MULTISOURCE |
List of craters on Venus
This is a list of craters on Venus, named by the International Astronomical Union's (IAU) Working Group for Planetary System Nomenclature. All craters on Venus are named after famous women or female first names. (For features on Venus other than craters see, list of montes on Venus and List of coronae on Venus. )
As of 2017, there are 900 named craters on Venus, fewer than the lunar and Martian craters but more than on Mercury.
Other, non-planetary bodies with numerous named craters include Callisto (141), Ganymede (131), Rhea (128), Vesta (90), Ceres (90), Dione (73), Iapetus (58), Enceladus (53), Tethys (50) and Europa (41). For a full list, see List of craters in the Solar System. | WIKI |
Nikita Okhotiuk
Nikita Alexeyevich Okhotiuk (Никита Алексеевич Охотюк; born 4 December 2000) is a Russian professional ice hockey defenceman for CSKA Moscow of the Kontinental Hockey League (KHL).
Playing career
Okhotiuk played in his native Russia as a youth with Belye Medvedi of the Junior Hockey League (MHL) before continuing his development in North America with the Ottawa 67's of the Ontario Hockey League (OHL).
He was drafted by the New Jersey Devils with the 61st overall pick in the second round of the 2019 NHL Entry Draft. In the following 2019–20 season, Okhotiuk was signed by the Devils to a three-year, entry-level contract on 30 December 2019.
During his second professional season within the Devils organization in 2021–22, Okhotiuk was recalled from AHL affiliate, the Utica Comets, and made his NHL debut for the Devils on 21 April 2022, and notched his first career NHL goal in a 5–2 loss to the Buffalo Sabres.
In the following 2022–23 season, Okhotiuk was traded by the Devils to the San Jose Sharks on 26 February 2023, as part of a multi-player deal, in which the Devils received Timo Meier.
During the 2023–24 NHL season, on 8 March 2024, Okhotiuk was traded by the Sharks at the trade deadline to the Calgary Flames in exchange for a 2024 fifth-round pick.
On May 26, 2024, Okhotiuk signed a two-year deal with CSKA Moscow of the Kontinental Hockey League (KHL), despite sanctions on the club by the International Ice Hockey Federation (IIHF) banning international transfers. | WIKI |
Henry Ford's method of locating the beam front axles in his early cars consisted of a triangulated arrangement comprising the wishbone and a beam axle, with a transverse leaf spring. The spring was mounted above the axle on pre-'35 cars and in front on '36-48 models, when the I-beam gave way to independent front suspension. The whole arrangement would pivot about the ball at the rear of the wishbone and the center of the leaf spring, mounted to the front crossmember. It was crude yet offered a huge range of suspension travel, especially when combined with a similar system at the rear.
However, with the installation of non-stock motors and the advent of dropped axles, interference problems with oil pans, or the removal of the wishbone's rear mount-whether on the crossmember or the trans, a la Model A-meant an alternative was required. The hot rodder's solution was simple: Split the wishbone and mount the rear ends of the now two separate halves to the chassis 'rails. Of course, little consideration was given back in the day to bumpsteer, Ackermann angle, or suchlike, and the split wishbone worked on hot rods with limited suspension travel, pretty much defining the look of postwar hot rods.
We dealt with early axles in the August issue, and touched on wishbones then, but the simple fact is if you want to run an unsplit wishbone, you'll need to source one from the same-year car as the axle. This is because the distance between the spring perch bosses on early Ford axles varies, and hence so does the measurement across the front of a wishbone. The '28-31 Model A axles measure 36 1/4 inches between bosses; '32-36 axles measure 36 1/21/2 inches; '37-41 axles are 38 1/21/2 inches; and '42-48 versions are the widest at 40 3/43/4 inches. Even if you intend to split your 'bones, you still need to be careful, as there are two perch-boss sizes. The '32-36 axles and their corresponding wishbones have yokes 2 inches across, while Model A and all the later 'bones measure 2 1/21/4 inches, though it's only a matter of adding a 1/4-inch spacer to run a later wishbone or Model A version on the '32-36 axle.
Then there's the length of the wishbones to consider. The Model A 'bones are short at 39 inches from the center of the ball to the center of the perch hole; '32 'bones are 47 1/21/2 inches; the '33-34 is 45 1/21/2 inches; the '37-41 is 44 1/2 inches; and the '42-48 measures 50 1/2 inches. Bear in mind that those '35-and-later have the spring in front of the axle, the extension for which will need removing if you intend to mount the spring above the axle in your application, and the '42-48 'bones have a step in them just behind the spring perch. Ideally, the pitman arm for the steering should be mounted directly above the rear mount of the split wishbone if you're contemplating a drag link style to eliminate bumpsteer as much as possible, which is why choosing a wishbone as close to the required length as possible is advisable. However, with the limited suspension travel on most hot rods, this isn't as major a concern as might be imagined. Heck, even stock Model As had a drag link roughly half the length of the wishbone. | ESSENTIALAI-STEM |
Page:Proceedings of the Convention of the Equal Rights and Educational Association of Georgia 1866.djvu/27
25 affirmative, he shall be conducted into the room of the Association by the chairman of the Examining Committee, and be introduced to the President; after which, the candidates shall sign the Constitution and pay a fee of twenty-five cents, and be declared members of the Association.
——When two or more Subordinate Associations shall have been organized in any county, they shall elect one representative for every twenty-five members, who, together with the President and Vice President, shall form a County Association.
—This Association is authorized to make any By-Laws not in conflict with the State or County Associations.
—The meetings of this Association may be public or private. —The members of one Subordinate Association shall have the privilege of attending the meetings of all Subordinate Associations. —The Treasurer of this Association shall pay into the Treasury of the State Association, twenty-five cents for each of its members and take a receipt for the same signed by the President of the State Association, and Secretary of the Council. | WIKI |
Configuring Nebula, a simple overlay networking tool (2024)
May 1, 2020 - ⏱️ 6 minutes to read
Network
Configuring Nebula, a simple overlay networking tool (1)
VPNs are one of the preferred ways to tie-up multiple servers (and clients) together, but their nature becomes a bottleneck when the infrastructure to link becomes larger.
A solution to this problem comes in the form of a software defined network (SDN).
Nebula (from SlackHQ) addresses this problem by providing software that helps you build a point-to-point network between devices that can be situated (almost) anywhere in the world!
The communication between devices is encrypted using the Noise Protocol Framework, the same used by Signal.
And you know what's great? Nebula is completely open source!
Nebula Vocabulary
Nebula's vocabulary is not so different from normal networking, you should only get accostumed to two terms:
• lighthouse;
• node.
Lighthouse is the term used by Nebula to address nodes that are publicly routable.
A node connects first to the lighthouse, then it discovers the most efficent path to reach other nodes on the network.
Configuring Nebula
Let's get to the fun part!
As stated earlier, to run a Nebula Lighthouse you need a machine with a publicly routable IP address, if you don't have one, a little 5$ Droplet on DigitalOcean will do just fine.
This guide will show you how to run Nebula as a regular user, in constrast with the official documentation that assumes you will run Nebula as the root user.
On the machines you'd like to attach to Nebula, you need to download the binary from the release page on GitHub and then extract it using tar.
$ curl -OL https://github.com/slackhq/nebula/releases/download/v1.2.0/nebula-linux-amd64.tar.gz$ tar xzvf nebula-linux-amd64.tar.gz
Now you need to move the Nebula binary to /usr/bin/ and set the right permissions.
You can do it manually or you can use the install command.
# install ./nebula /usr/bin
Since we don't want to run Nebula as root, it's the right time to add a system user (so it's hidden from your login manager) for Nebula.
This new user doesn't need a home directory, so we're instructing the useradd command to not create one.
#useradd --system --no-create-home nebula
Following the Filesystem Hierarchy Standard that states that configuration files should reside in the /etc directory, we're going to create the directories to store configuration files and certificates that are related to Nebula.
# mkdir /etc/nebula# mkdir /etc/nebula/certs
To instantiate a Nebula network you have to generate a Nebula Certificate authority, preferably on another host so you can keep your private key secure. Remember to copy the certificate to your hosts!
$ ./nebula-cert ca -name "My really cool organization"$ scp ca.crt user@<hostname>:/etc/nebula/certs
Make sure to keep the ca.key file in a safe place, you will need it if you want to add other hosts to your network.
Generate a keypair for each host you'd like to connect to your Nebula network and copy the pair to your Nebula's hosts:
$ ./nebula-cert sign -name "mylighthouse" -ip "192.168.100.1/24"$ scp mylighthouse.crt user@<hostname>:/etc/nebula/certs$ scp mylighthouse.key user@<hostname>:/etc/nebula/certs
It's time to configure Nebula!
Create a configuration file inside the previously created directory and open it with your text editor of choice. I've deviced to put my configuration in /etc/nebula/config.yml.The configuration will look a bit different depending by the node, for example, my Lighthouse node is sporting this configuration:
pki: ca: /etc/nebula/certs/ca.crt cert: /etc/nebula/certs/mylighthouse.crt key: /etc/nebula/certs/mylighthouse.key lighthouse: am_lighthouse: true listen: host: 0.0.0.0 port: 4242 punchy: punch: true tun: dev: nebula1 drop_local_broadcast: false drop_multicast: false tx_queue: 500 mtu: 1300 routes: unsafe_routes: firewall: conntrack: tcp_timeout: 120h udp_timeout: 3m default_timeout: 10m max_connections: 100000 outbound: # Allow all outbound traffic from this node - port: any proto: any host: any inbound: # Allow icmp between any nebula hosts - port: any proto: icmp host: any
On my other nodes, the configuration looks something like this:
pki: ca: /etc/nebula/certs/ca.crt cert: /etc/nebula/certs/mynode.crt key: /etc/nebula/certs/mynode.key static_host_map: "192.168.100.1": ["<lighthouse_public_ip>:4242"] lighthouse: hosts: - "192.168.100.1" punchy: punch: true tun: dev: nebula1 drop_local_broadcast: false drop_multicast: false tx_queue: 500 mtu: 1300 routes: unsafe_routes: firewall: conntrack: tcp_timeout: 120h udp_timeout: 3m default_timeout: 10m max_connections: 100000 outbound: # Allow all outbound traffic from this node - port: any proto: any host: any inbound: # Allow icmp between any nebula hosts - port: any proto: icmp host: any
Note that nodes need to define their "Lighthouse".
To make our "nebula" user the owner of the /etc/nebula directory, we have to change the ownership of it. We should also change the permissions of the certificats to something less permissive.
# chown -R nebula:nebula /etc/nebula# chmod 600 /etc/nebula/certs/*
We're almost done! The second-last thing to do is to add the NET_CAP_ADMIN capability to the Nebula binary since it needs to be able to create a new interface on the system.
# setcap cap_net_admin=+pe /usr/bin/nebula
For our last step, we run Nebula as the nebula user on our hosts.
# su nebula$ nebula -config /etc/nebula/config.yml
To test Nebula open a new shell and try to ping another machine on the Nebula network, it's almost magical.
Nebula as a Systemd unit
A natural step to take after you've tested Nebula is to run it as a service so you don't need to start it manually each time you need it. Well, nothing could be simpler!
You just have to create and edit a Systemd unit. An example can be found below:
[Unit]Description=Nebula ServiceAfter=network.targetStartLimitIntervalSec=0 [Service]Type=simpleRestart=alwaysRestartSec=1User=nebulaExecStart=/usr/bin/nebula -config /etc/nebula/config.yml [Install]WantedBy=multi-user.target
Note that this Systemd unit runs Nebula with the "nebula" user and starts just after reaching the network target.
Now you need to reload configuration files for the daemons on your system so Systemd can pick-up the new unit:
# systemctl daemon-reload
You can now enable the Nebula service so it starts automatically after a reboot. If you're not going to reboot, remember to start the service manually. 😉
#systemctl enable nebula.service#systemctl start nebula.service
Update: Launchd on macOS
If you want to run Nebula as a daemon on macOS, create and edit a launchd plist file as follows:
<?xml version="1.0" encoding="UTF-8"?><!DOCTYPE plist PUBLIC "-//Apple//DTD PLIST 1.0//EN" "http://www.apple.com/DTDs/PropertyList-1.0.dtd"><plist version="1.0"> <dict> <key>Label</key> <string>/usr/local/bin/nebula</string> <key>LaunchOnlyOnce</key> <true/> <key>ProgramArguments</key> <array> <string>/usr/local/bin/nebula</string> <string>-config</string> <string>/etc/nebula/config.yml</string> </array> <key>RunAtLoad</key> <true/> </dict></plist>
Remember to load this new daemon:
# sudo launchctl load /Library/LaunchDaemons/com.nebula.plist
Oh, nice to see you here!
If you've reached the end of this post you can now enjoy your freshly baked SDN!
Disclosure: this post contains one (or more) affiliate link. If you buy something through one of those links you won't pay anything more but I'll get a small commission that helps me mantaining this blog.
Configuring Nebula, a simple overlay networking tool (2024)
Top Articles
Latest Posts
Article information
Author: Arielle Torp
Last Updated:
Views: 5851
Rating: 4 / 5 (41 voted)
Reviews: 88% of readers found this page helpful
Author information
Name: Arielle Torp
Birthday: 1997-09-20
Address: 87313 Erdman Vista, North Dustinborough, WA 37563
Phone: +97216742823598
Job: Central Technology Officer
Hobby: Taekwondo, Macrame, Foreign language learning, Kite flying, Cooking, Skiing, Computer programming
Introduction: My name is Arielle Torp, I am a comfortable, kind, zealous, lovely, jolly, colorful, adventurous person who loves writing and wants to share my knowledge and understanding with you. | ESSENTIALAI-STEM |
Paul du Feu
Paul Bernard du Feu (September 1935 – 1 January 2013) was a Welsh builder, painter, author and model. He is best known for his marriages to the feminist Germaine Greer and the poet Maya Angelou.
He published the memoir Let's Hear it for the Long-legged Women in 1973.
Life
Born in 1935 in Wrexham, Wales, the son of a civil servant, du Feu grew up in London. His French surname came from ancestors who settled in the Channel Islands.
He attended King's College London, studying English literature, during which time he married Shirley Thompson, with whom he had two children. After graduating he worked as a builder.
Marriage to Germaine Greer
In 1968 after being discharged from the hospital where he had been treated for alcohol poisoning, du Feu met Germaine Greer, then an assistant lecturer at the University of Warwick, outside a pub in Portobello Road and after a brief courtship they married at Paddington Registry office. Though their marriage officially lasted five years, their relationship lasted only three weeks. Greer later recalled that she had been unfaithful to du Feu seven times during their short relationship, and she had spent her wedding night in an armchair because her husband, drunk, would not let her in bed. Eventually, during a party near Ladbroke Grove, "'[h]e turned to me and sneered (drunk as usual): 'I could have any woman in this room.' 'Except me,' I said, and walked away forever.'"
After this, du Feu posed in British Cosmopolitan, thought to be their first almost-naked male centrefold. In 1973 he also published an erotic memoir, Let's Hear it for the Long-legged Women, for which it is claimed he was paid more than Greer had been given as the advance for her 1970 work The Female Eunuch.
Marriage to Maya Angelou
du Feu met Maya Angelou in Soho in 1971, at a literary event for her best-selling autobiography, I Know Why the Caged Bird Sings. They married in 1974, and exchanged vows two further times, but divorced in 1983. They remained friends, and Angelou helped du Feu financially during his later years.
Later life
du Feu spent the rest of his life in California, both in Berkeley and later in Oakland, where he worked in home renovation. He died in January 2013. | WIKI |
The Calash
THE town of B -- -- had become very lively since a cavalry regiment had taken up its quarters in it. Up to that date it had been mortally wearisome there. When you happened to pass through the town and glanced at its little mud houses with their incredibly gloomy aspect, the pen refuses to express what you felt. You suffered a terrible uneasiness as if you had just lost all your money at play, or had committed some terrible blunder in company. The plaster covering the houses, soaked by the rain had fallen away in many places from their walls, which from white had become streaked and spotted, whilst old reeds served to thatch them.
Following a custom very common in the towns of South Russia, the chief of police has long since had all the trees in the gardens cut down to improve the view. One never meets anything in the town, unless it is a cock crossing the road, full of dust and soft as a pillow. At the slightest rain this dust is turned into mud, and then all the streets are filled with pigs. Displaying to all their grave faces, they utter such grunts that travellers only think of pressing their horses to get away from them as soon as possible. Sometimes some country gentleman of the neighbourhood, the owner of a dozen serfs, passes in a vehicle which is a kind of compromise between a carriage and a cart, surrounded by sacks of flour, and whipping up his bay mare with her colt trotting by her side. The aspect of the market-place is mournful enough. The tailor's house sticks out very stupidly, not squarely to the front but sideways. Facing it is a brick house with two windows, unfinished for fifteen years past, and further on a large wooden market-stall standing by itself and painted mud-colour. This stall, which was to serve as a model, was built by the chief of police in the time of his youth, before he got into the habit of falling asleep directly after dinner, and of drinking a kind of decoction of dried gooseberries every evening. All around the rest of the market-place are nothing but palings. But in the centre are some little sheds where a packet of round cakes, a stout woman in a red dress, a bar of soap some pounds of bitter almonds, some lead, some cotton and two shopmen playing at “svaika,” a game resembling quoits, are always to be seen.
But on the arrival of the cavalry regiment everything changed. The streets became more lively and wore quite another aspect. Often from their little houses the inhabitants would see a tall and well-made officer with a plumed hat pass by, on his way to the quarters of one of his comrades to discuss the chances of promotion or the qualities of a new tobacco, or perhaps to risk at play his carriage, which might indeed be called the carriage of all the regiment, since it belonged in turn to every one of them. To-day it was the major who drove out in it, to-morrow it was seen in the lieutenant's coach-house, and a week later the major's servant was again greasing its wheels. The long hedges separating the houses were suddenly covered with soldiers' caps exposed to the sun, grey frieze cloaks hung in the doorways, and moustaches harsh and bristling as clothes brushes were to be met with in all the streets. These moustaches showed themselves everywhere, but above all at the market, over the shoulders of the women of the place who flocked there from all sides to make their purchases. The officers lent great animation to society at B -- --.
Society consisted up till then of the judge who was living with a deacon's wife, and of the chief of police, a very sensible man, but one who slept all day long from dinner till evening, and from evening till dinner-time.
This general liveliness was still further increased when the town of B -- -- became the residence of the general commanding the brigade to which the regiment belonged. Many gentlemen of the neighbourhood, whose very existence no one had even suspected, began to come into the town with the intention of calling on the officers, or, perhaps, of playing bank, a game concerning which they had up till then only a very confused notion occupied as they were with their crops and the commissions of their wives and their hare-hunting. I am very sorry that I cannot recollect for what reason the general made up his mind one fine day to give a grand dinner. The preparations were overwhelming. The clatter of knives in the kitchen was heard as far as the town gates. The whole of the market was laid under contributions, so much so that the judge and the deacon's wife found themselves obliged that day to be satisfied with hasty pudding and cakes of flour. The little courtyard of the house occupied by the general was crowded with vehicles. The company only consisted of men, officers and gentlemen of the neighbourhood.
Amongst these latter was above all conspicuous Pythagoras Pythagoravitch Tchertokoutski, one of the leading aristocrats of the district of B -- --, the most fiery orator at the nobiliary elections and the owner of a very elegant turn-out. He had served in a cavalry regiment and had even passed for one of its most accomplished officers, having constantly shown himself at all the balls and parties wherever his regiment was quartered. Information respecting him may be asked of all the young ladies in the districts of Tamboff and Simbirsk. He would very probably have further extended his reputation in other districts if he had not been obliged to leave the service in consequence of one of those affairs which are spoken of as “a very unpleasant business.” Had he given or received a blow? I cannot say with certainty, but what is indisputable is that he was asked to send in his resignation.
However, this accident had no unpleasant effect upon the esteem in which he had been held up till then.
Tchertokoutski always wore a coat of a military cut, spurs and moustache, in order not to have it supposed that he had served in the infantry, a branch of the service upon which he lavished the most contemptuous expressions. He frequented the numerous fairs to which flock the whole of the population of Southern Russia, consisting of nursemaids, tall girls, and burly gentlemen who go there in vehicles of such strange aspect that no one has ever seen their match even in a dream. He instinctively guessed the spot in which a regiment of cavalry was to be found and never failed to introduce himself to the officers. On perceiving them he bounded gracefully from his light phaeton and soon made acquaintance with them. At the last election he had given to the whole of the nobility a grand dinner during which he declared that if he were elected marshal he would put all gentlemen on the best possible footing. He usually behaved after the fashion of a great noble. He had married a rather pretty lady with a dowry of two hundred serfs and some thousands of rubles. This money was at once employed in the purchase of six fine horses, some gilt bronze locks, and a tame monkey. He further engaged a French cook. The two hundred peasants of the lady, as well as two hundred more belonging to the gentleman, were mortgaged to the bank. In a word, he was a regular nobleman. Besides himself, several other gentlemen were amongst the general's guests, but it is not worth while speaking of them. The officers of the regiment, amongst whom were the colonel and the fat major, formed the majority of those present. The general himself was rather stout; a good officer, nevertheless, according to his subordinates. He had a rather deep bass voice.
The dinner was magnificent; there were sturgeons, sterlets, bustards, asparagus, quail, partridges, mushrooms. The flavour of all these dishes supplied an irrefutable proof of the sobriety of the cook during the twenty-four hours preceding the dinner. Four soldiers, who had been given him as assistants, had not ceased working all night, knife in hand, at the composition of ragouts and jellies. The immense quantity of long-necked bottles, mingled with shorter ones, holding claret and madeira; the fine summer day, the wide-open windows, the plates piled up with ice on the table, the crumpled shirt-fronts of the gentlemen in plain clothes, and a brisk and noisy conversation, now dominated by the general's voice, and now besprinkled with champagne, were all in perfect harmony. The guests rose from the table with a pleasant feeling of repletion, and, after having lit their pipes, all stepped out, coffee-cups in hand, on to the verandah.
“We can see her now,” said the general. “Here, my dear fellow," added he, addressing his aide-de-camp, an active well-made young officer, “have the bay mare brought here. You shall see for yourselves, gentlemen.”
At these words the general took a long pull at his pipe.
“She is not quite recovered yet; there is not a decent stable in this cursed little place. But she is not bad looking -- ” puff -- puff, the general here let out the smoke which he had kept in his mouth till then -- “the little mare.”
“Is it long since your excellency --” puff -- puff -- puff -- “condescended to buy her?” asked Tchertokoutski.
Puff -- puff -- puff -- puff. “Not very long, I had her from the breeding establishment two years ago.”
“And did your excellency condescend to take her ready broken, or to have her broken in here yourself?”
Puff -- puff -- puff -- puff. “Here.”
As he spoke the general disappeared behind a cloud of smoke.
At that moment a soldier jumped out of the stable. The trampling of a horse's hoofs was heard, and another soldier with immense moustaches, and wearing a long white tunic, appeared, leading by the bridle the terrified and quivering mare, which, suddenly rearing lifted him off his feet.
“Come, come, Agrafena Ivanovna,” said he, leading her towards the verandah.
The mare's name was Agrafena Ivanovna. Strong and bold as a Southern beauty, she suddenly became motionless.
The general began to look at her with evident satisfaction, and left off smoking. The colonel himself went down the steps and patted her neck. The major ran his hand down her legs, and all the other officers clicked their tongues at her.
Tchertokoutski left the verandah to take up a position beside the mare. The soldier who held her bridle drew himself up and stared fixedly at the guests.
“She is very fine, very fine,” said Tchertokoutski “a very well-shaped beast. Will your excellency allow me to ask whether she is a good goer?”
“She goes well, but that idiot of a doctor, deuce take him, has given her some balls which have made her sneeze for the last two days.”
“She is a fine beast, a very fine beast. Has your excellency a turn-out to match the horse?”
“Turn-out! but she's a saddle horse.”
“I know. I put the question, your excellency, to know if you have an equipage worthy of your other horses?”
“No, I have not much in the way of equipages; I must admit that, for some time past, I have been wanting to buy a calash, such as they build now-a-days I have written about it to my brother who is now at St. Petersburg, but I do not know whether he will be able to send me one.”
“It seems to me, your excellency,” remarked the colonel, “that there are no better calashes than those of Vienna.”
“You are right.” Puff -- puff -- puff.
“I have an excellent calash, your excellency, a real Viennese calash,” said Tchertokoutski.
“That in which you came?”
“Oh no, I make use of that for ordinary service, but the other is something extraordinary. It is as light as a feather, and if you sit in it, it seems as if your nurse was rocking you in a cradle.”
“It is very comfortable then?”
“Extremely comfortable; the cushions, the springs, and everything else are perfect.”
“Ah! that is good.”
“And what a quantity of things can be packed away in it. I have never seen anything like it, your excellency. When I was still in the service there was room enough in the body to stow away ten bottles of rum, twenty pounds of tobacco, six uniforms, and two pipes, the longest pipes imaginable, your excellency; and in the pockets inside you could stow away a whole bullock.”
“That is very good.”
“It cost four thousand rubles, your excellency.”
“It ought to be good at that price. Did you buy it yourself?”
“No, your excellency, I had it by chance. It was bought by one of my oldest friends, a fine fellow with whom you would be very well pleased. We are very intimate. What is mine is his, and what is his is mine. I won it of him at cards. Would your excellency have the kindness to honour me at dinner to-morrow? You could see my calash.”
“I don't know what to say. Alone I could not -- but if you would allow me to come with these officers -- -- ”
“I beg of them to come too. I shall esteem it a great honour, gentlemen, to have the pleasure of seeing you at my house.”
The colonel, the major, and the other officers thanked Tchertokoutski.
“I am of opinion myself, your excellency, that if one buys anything it should be good; it is not worth the trouble of getting, if it turns out bad. If you do me the honour of calling on me to-morrow, I will show you some improvements I have introduced on my estate.”
The general looked at him, and puffed out a fresh cloud of smoke.
Tchertokoutski was charmed with his notion of inviting the officers, and mentally ordered in advance all manner of dishes for their entertainment. He smiled at these gentlemen, who on their part appeared to increase their show of attention towards him, as was noticeable from the expression of their eyes and the little half-nods they bestowed upon him. His bearing assumed a certain ease, and his voice expressed his great satisfaction.
“Your excellency will make the acquaintance of the mistress of the house.”
“That will be most agreeable to me,” said the general twirling his moustache.
Tchertokoutski was firmly resolved to return home at once in order to make all necessary preparations in good time. He had already taken his hat, but a strange fatality caused him to remain for some time at the general's. The card tables had been set out, and all the company, separating into groups of four, scattered itself about the room. Lights were brought in. Tchertokoutski did not know whether he ought to sit down to whist. But as the officers invited him, he thought that the rules of good breeding obliged him to accept. He sat down. I do not know how a glass of punch found itself at his elbow, but he drank it off without thinking. After playing two rubbers, he found another glass close to his hand which he drank off in the same way, though not without remarking:
“It is really time for me to go, gentlemen.”
He began to play a fresh rubber. However, the conversation which was going on in every corner of the room took an especial turn. Those who were playing whist were quiet enough, but the others talked a great deal. A captain had taken up his position on a sofa and leaning against a cushion, pipe in mouth, he captivated the attention of a circle of guests gathered about him by his eloquent narrative of amorous adventures.
A very stout gentleman whose arms were so short that they looked like two potatoes hanging by his sides, listened to him with a very satisfied expression, and from time to time exerted himself to pull his tobacco pouch out of his coat-tail pocket. A somewhat brisk discussion on cavalry drill had arisen in another corner, and Tchertokoutski, who had twice already played a knave for a king, mingled in the conversation by calling out from his place: “In what year?” or “What regiment?” without noticing that very often his question had no application whatever. At length, a few minutes before supper, play came to an end. Tchertokoutski could remember that he had won a great deal, but he did not take up his winnings, and after rising stood for some time in the position of a man who has no handkerchief in his pocket.
They sat down to supper. As might be expected, wine was not lacking, and Tchertokoutski kept involuntarily filling his glass with it, for he was surrounded with bottles. A lengthy conversation took place at table, but the guests carried it on after a strange fashion. A colonel, who had served in 1812, described a battle which had never taken place; and besides, no one ever could make out why he took a cork and stuck it into a pie. They began to break-up at three in the morning. The coachmen were obliged to take several of them in their arms like bundles; and Tchertokoutski himself, despite his aristocratic pride, bowed so low to the company, that he took home two thistles in his moustache.
The coachman who drove him home found every one asleep. He routed out, after some trouble, the valet, who, after having ushered his master through the hall, handed him over to a maid-servant. Tchertokoutski followed her as well as he could to the best room, and stretched himself beside his pretty young wife, who was sleeping in a night-gown as white as snow. The shock of her husband falling on the bed awoke her -- she stretched out her arms, opened her eyes, closed them quickly, and then opened them again quite wide, with a half-vexed air. Seeing that her husband did not pay the slightest attention to her, she turned over on the other side, rested her fresh and rosy cheek on her hand and went to sleep again.
It was late -- that is, according to country customs -- when the lady woke again. Her husband was snoring more loudly than ever. She recollected that he had come home at four o'clock, and not wishing to awaken him got up alone, and put on her slippers, which her husband had had sent for her from St. Petersburg, and a white dressing-gown which fell about her like the waters of a fountain. Then she passed into her dressing-room, and after washing in water as fresh as herself, went to her toilet table. She looked at herself twice in the glass, and thought she looked very pretty that morning. This circumstance, a very insignificant one apparently, caused her to stay two hours longer than usual before her glass. She dressed herself very tastefully and went into the garden.
The weather was splendid: it was one of the finest days of the summer. The sun, which had almost reached the meridian, shed its most ardent rays; but a pleasant coolness reigned under the leafy arcades, and the flowers, warmed by the sun, exhaled their sweetest perfume. The pretty mistress of the house had quite forgotten that it was noon at least, and that her husband was still asleep. Already she heard the snores of two coachmen and a groom, who were taking their siesta in the stable, after having dined copiously. But she was still sitting in a bower from which the deserted high road could be seen, when all at once her attention was caught by a light cloud of dust rising in the distance. After looking at it for some moments, she ended by making out several vehicles, closely following one another. First came a light calash, with two places, in which was the general, wearing his large and glittering epaulettes, with the colonel. This was followed by another with four places, containing the captain, the aide-de-camp and two lieutenants. Further on, came the celebrated regimental vehicle, the present owner of which was the major, and behind that another in which were packed five officers, one on his comrade's knees, the procession being closed by three more on three fine bays.
“Are they coming here?” thought the mistress of the house. “Good heavens, yes! they are leaving the main road.”
She gave a cry, clasped her hands, and ran straight across the flower-beds to her bedroom, where her husband was still sleeping soundly.
“Get up! get up! get up at once,” she cried, pulling him by the arm.
“What -- what's the matter?” murmured Tchertokoutski, stretching his limbs without opening his eyes.
“Get up, get up. Visitors have come, do you hear? visitors.”
“Visitors, what visitors?” After saying these words he uttered a little plaintive grunt like that of a sucking calf: “M-m-m. Let me kiss you.”
“My dear, get up at once, for heaven's sake. The general has come with all his officers. Ah! goodness, you have got a thistle in your moustache.”
“The general! Has he come already? But why the deuce did not they wake me? And the dinner, is the dinner ready?”
“What dinner?”
“But haven't I ordered a dinner?”
“A dinner! You got home at four o'clock in the morning and you did not answer a single word to all my questions. I did not wake you, since you had so little sleep.”
Tchertokoutski, his eyes staring out of his head, remained motionless for some moments as though a thunderbolt had struck him. All at once he jumped out of bed in his shirt.
“Idiot that I am,” he exclaimed, clasping his hand to his forehead; “I had invited them to dinner. What is to be done? are they far off?”
“They will be here in a moment.”
“My dear, hide yourself. Ho there, somebody. Hi there, you girl. Come here, you fool; what are you afraid of? The officers are coming here; tell them I am not at home, that I went out early this morning, that I am not coming back. Do you understand? Go and repeat it to all the servants. Be off, quick.”
Having uttered these words, he hurriedly slipped on his dressing-gown, and ran off to shut himself up in the coach-house, which he thought the safest hiding-place. But he fancied that he might be noticed in the corner in which he had taken refuge.
“This will be better,” said he to himself, letting down the steps of the nearest vehicle, which happened to be the calash. He jumped inside, closed the door, and, as a further precaution, covered himself with the leather apron. There he remained, wrapped in his dressing-gown, in a doubled-up position.
During this time the equipages had drawn up before the porch. The general got out of his carriage and shook himself, followed by the colonel, arranging the feathers in his hat. After him came the stout major, his sabre under his arm, and the slim lieutenants, whilst the mounted officers also alighted.
“The master is not at home,” said a servant appearing at the top of a flight of steps.
“What! not at home; but he is coming home for dinner, is he not?”
“No, he is not; he has gone out for the day and will not be back till this time to-morrow.”
“Bless me,” said the general; “but what the deuce -- -- ”
“What a joke,” said the colonel laughing.
“No, no, such things are inconceivable,” said the general angrily. “If he could not receive us, why did he invite us?”
“I cannot understand, your excellency, how it is possible to act in such a manner,” observed a young officer.
“What?” said the general, who always made an
officer under the rank of captain repeat his remarks twice over.
“I wondered, your excellency, how any one could do such a thing.”
“Quite so; if anything has happened he ought to have let us know.”
“There is nothing to be done, your excellency, we had better go back home,” said the colonel.
“Certainly, there is nothing to be done. However, we can see the calash without him; probably he has not taken it with him. Come here, my man.”
“What does your excellency want?”
“Show us your master's new calash.”
“Have the kindness to step this way to the coach-house.”
The general entered the coach-house followed by his officers.
“Let me pull it a little forward, your excellency,” said the servant, “it is rather dark here.”
“That will do.”
The general and his officers walked round the calash, carefully inspecting the wheels and springs.
“There is nothing remarkable about it,” said the general; “it is a very ordinary calash.”
“Nothing to look at,” added the colonel; “there is absolutely nothing good about it.”
“It seems to me, your excellency, that it is not worth four thousand rubles,” remarked a young officer.
“What?”
“I said, your excellency, that I do not think that it is worth four thousand rubles.”
“Four thousand! It is not worth two. Perhaps, however, the inside is well fitted. Unbutton the apron.”
And Tchertokoutski appeared before the officers' eyes, clad in his dressing-gown and doubled up in a singular fashion.
“Hullo, there you are,” said the astonished general.
Then he covered Tchertokoutski up again and went off with his officers.
La Calèche Коляска (Гоголь) | WIKI |
Skip to content Skip to main navigation Report an accessibility issue
Research
VLSI & Nanoelectronics:
For decades, periodic downscaling of transistors, dictated by Moore’s law, has fueled progress of electronic technologies. In continuation to that, we have arrived at the very edge of conventional scaling process and approaching towards the atomic dimension. Quantum phenomena, short channel effects and the fundamental Boltzmann limit (stemming from statistical distribution of free carriers) have become major hindrances against continued improvement of device and circuit performance. At this critical stage, conventional CMOS based electronics is transitioning to the post-CMOS era. Several materials and devices are being explored to supplement/replace existing counterparts to meet performance/power targets. These emerging entities have unique characteristics including new opportunities and challenges. Due to the immense design complexity, secluded device or circuit centric design is not ideal for emergent technologies. Circuit driven device design (and vice versa) is mandatory to best utilize the potentials of these novel materials/devices. We work on device-circuit co-design with emerging technologies to facilitate low-power, reliable VLSI design.
Emerging Memory Devices:
The stupendous increase in the need for data storage for technical and non-technical applications has led to a manifold increase in the need for more reliable and denser memory devices/circuits/arrays. Large scale scientific experiments, space exploration, social media, financial services and interconnected smart devices have been creating data in mind-boggling proportion. Keeping up with the demand, innovation in the memory industry has been strongly accelerated. Non-volatile memory devices have garnered attention due to the increased popularity of portable, wearable, implantable devices and the internet of things. We explore the device/circuit/array level design of emerging memory devices including RRAM, MRAM, PCRAM and ferroelectric memories. We also work on designing and optimizing 3D Cross (X) point memory array with special emphasis on the ‘selector’ design.
Beyond CMOS Technologies:
The quest for next-generation low power devices has triggered a worldwide search for device designs that can achieve < 60 mV/Dec subthreshold swing (known as Boltzmann limit). While this is physically impossible for a Silicon-based conventional transistor, several new physical phenomena have been shown/proposed to be able to enable such performance. Our group contributes to the exploration and development of novel steep switching transistor technologies. We develop the design methodology for these devices and predict their unique circuit-level signatures. We also develop circuit compatible models for these novel devices to facilitate design exploration in higher levels of abstractions.
Artificial Intelligence & Neuromorphic Hardware:
Modern digital processors are excellent for cumbersome computations and to follow strenuous algorithms. However, the human brain- a marvelous bio-processor, has the unique ability to learn and evolve. Due to the popularity of applications like adaptive virtual assistants (Apple-Siri, Amazon-Alexa, Samsung-Bixby etc.), pattern matching, image recognition and unsupervised data mining; brain-inspired/neuromorphic computing is garnering huge interest. From the hardware point of view, the basic step to implement an efficient neuromorphic system is to establish a circuit equivalent of neurological primitives (neuron and synapse) and optimize/co-design them for specific applications. Phase transition materials and magnetic tunnel junctions are suitable to provide probabilistic/stochastic oscillations and therefore can be utilized to design spiking neurons. In addition, X-point array of RRAMs and FEFET with multi-domain gate stack can provide the spike time dependent plasticity (STDP), observed in the biological synapse. The multi-domain nature of FEFET can be harnessed to create multi-level weights for designing analog synapse, which is more similar to their biological counterparts. We explore hardware primitives for artificial neurons and synaptic networks to realize power-efficient neuromorphic system hardware.
Cryogenic Circuits and Quantum Computing Hardware
Quantum computing is a rapidly evolving field that has the potential to provide a paradigm-shifting impact on our civilization. We work on the design exploration of devices required to develop qubits. Our approach is based on modeling and simulations. In addition to the qubit designs, we also work on quantum and cryogenic circuits to facilitate the overall quantum computing system.
Other Areas
• Hardware security: physical unclonable functions, true random number generators
• Analog and Peripheral circuits: Low power rectifiers, sense amplifiers
• Nanoelectronic reliability: Negative bias temperature instability, time-dependent dielectric breakdown, hot carrier injection, radiation, etc. | ESSENTIALAI-STEM |
Forum Discussion
NelsonArce's avatar
NelsonArce
Qrew Member
2 years ago
How to "copy" data captured in a single field to more than one multiple choice field in same table (can a pipeline do it?)
Hello! I am working on "performance management" app and have a form that captures "staff member" along with the staff member's "manager" in separate fields on a "phone call" form.
Next, we are capturing how many "errors" the staff member made on a phone call, thus I created SIX multiple-choice fields (error 1, error 2, etc.) to capture each error. I am stuck trying to associate "staff member" and "manager" to each error committed. We need to be able to summary report out on all errors, errors by staff member, and errors linked each manager.
I'm trying to link/copy the value of the staff member and manager captured 1x per form to each error made captured in error 1, error 2, etc.
A colleague suggested looking at the "bucket" channel in pipelines, but I am new to pipelines and cannot figure out how to make it do what I need. Bulk Record Set also doesn't seem to do the trick.
Am I on the right track looking at pipelines or is there another solution I am not seeing Thanks for any guidance!
------------------------------
Nelson Arce
------------------------------
2 Replies
• Reporting on errors will be very difficult with that App design.
You should have a header record like you already have and then a child table for errors. Then all your reporting will be off the error child table. You will lookup up any fields you need from the Header like the Team Member and Manager and the date or whatever, down to the child errors table so you have those fields for reporting.
------------------------------
Mark Shnier (Your Quickbase Coach)
mark.shnier@gmail.com
------------------------------
• NelsonArce's avatar
NelsonArce
Qrew Member
Brilliant! I understand exactly how to do that, many thanks for the knock on the head to see more clearly.
------------------------------
Nelson Arce
------------------------------ | ESSENTIALAI-STEM |
Temenggor Lake Bridge
Lake Temenggor Bridge is the longest highway bridge on the East-West Highway, (Federal Route 4). Opened on 1 July 1982, the bridge crosses Lake Temenggor, which was created after the construction of Temenggor hydroelectric dam in Perak, Malaysia. There are two sections of the bridge, in west side (880 metres) and east side (640 metres). | WIKI |
Lasix Renal Scan
Make an Appointment
A lasix renal scan takes pictures of the kidneys, ureters and bladder to see if they're properly formed and working together correctly.
Kidneys filter and clean the blood to produce urine. Urine passes out of the kidneys down through the ureters and into the bladder. When the bladder is full the urine passes out of the body through the urethra.
If these parts don't work as they should, your doctor will choose a treatment method best suited for your child.
Lasix Renal Scan: What to Expect
Children must lie very still for the entire test. You can stay with your child to provide company and support.
Your doctor may give your child medication, called sedation, to help them fall asleep if they're having trouble lying still. This is usually given by mouth, and it's not the same thing as general anesthesia. Small children may require a catheter before the test.
A nurse injects a radioactive fluid into your child's vein. The fluid travels through the kidneys, ureters and bladder. It gives off invisible rays seen by a special camera placed close to the body. The camera records the rays as pictures. Your doctor then gives your child the Lasix medication to help the kidneys empty quickly.
How Long Does the Test Take?
It takes about 1-2 hours to take the pictures. It may also take an hour to prepare your child for the test.
After the test, your child will remain in the recovery area. Your doctor will review the test results with you. | ESSENTIALAI-STEM |
Talk:Umi Monogatari
Spoilers
User:Glenn Magus Harvey has been trying to remove spoilers over and over. Different wording is used for each edit, but considering the fixation on one particular sentence, it's pretty clear the edits were made with the same intention. Pretty sure spoilers shouldn't be a concern.
* http://en.wikipedia.org/w/index.php?title=Umi_Monogatari:_Anata_ga_Ite_Kureta_Koto&diff=prev&oldid=622464656
* http://en.wikipedia.org/w/index.php?title=Umi_Monogatari:_Anata_ga_Ite_Kureta_Koto&diff=prev&oldid=622358374
* http://en.wikipedia.org/w/index.php?title=Umi_Monogatari:_Anata_ga_Ite_Kureta_Koto&diff=prev&oldid=622306177
I also have IRC logs where he states that his intention was entirely to remove spoilers, but I don't know if it would be proper to paste them over (although that channel doesn't have a "don't paste logs elsewhere" rule anyway) NotARealWord (talk) 13:15, 23 August 2014 (UTC)
* In the event that someone nitpicks that wasn't warned about removing so-called "spoilers", I've placed the standard notice on his talk page. Also, given the first edit summary, it is quite clear that the subsequent edits are in violation of WP:SPOILER, so the IRC log shouldn't be necessary to demonstrate that he is editing the article in a disruptive manner. If he continues to remove of otherwise obscure the plot detail, take it to the administrator's noticeboard. —Farix (t | c) 13:37, 23 August 2014 (UTC)
* I know that Wikipedia's policy is spoiler-ignoring. I've also seen that pages for other anime series that essentially provide plot summaries that are spoiler-free yet informative. In my most recent edit, I aimed for a the solution that also best serves Wikipedia's aim to be encyclopedic (describing the role of plot details rather than presenting trivia). (For what it's worth, I have the IRC logs as well and I'm saying the same thing here as I said there.) Alternatively (as I stated on IRC as well), I have considered writing up summaries for all the characters. ~GMH talk to me 14:07, 23 August 2014 (UTC)
* There is no such thing as a "spoiler-free" plot summary—unless you are like me and believe that there is not such thing as spoilers. If it is "spoiler-free", then it is incomplete. —Farix (t | c) 14:16, 23 August 2014 (UTC)
* "Role of plot details" the way you wrote it was needlessly vague, and using terms like "drives the story" is steering towards interpretation rather than a straightforward recap. And those other pages don't exactly mean anything for what standards to use, considering I can very easily bring up an article that does "spoil" plot details. NotARealWord (talk) 14:18, 23 August 2014 (UTC)
* Farix: By that I mean statements of a plot in more general terms, such as in the overview section of Kiddy Grade, which describes story details using descriptions like "start to see the darker side of the GOTT" and "[t]heir past is gradually revealed". I'll admit that my wording is probably not the best, so feel free to suggest a better wording. Alternatively, as I mentioned, I'm thinking of just fleshing out the rest of the characters section by adding similarly-sized short summaries, as the list of characters without description is rather uninformative. ~GMH talk to me 14:28, 23 August 2014 (UTC)
* In the interest of full disclosure, NARW and I have been arguing about this on IRC concurrently. (NARW and I know each other from another context.) ~GMH talk to me 14:31, 23 August 2014 (UTC)
* Again, I can easily find an article that spoils things. First one that came to mind: The Fullmetal Alchemist article (which actually has a higher rating than the example you provided) describes the nature of the conspiracy plot, the main villain's identity and plans, and how things end for the lead characters. And I'm pretty sure some people would argue that "see the darker side" is itself a spoiler since it could suggest a change in tonality of the story. That what qualifies as a spoiler is even remotely arguable is probably one of the reasons why Wikipedia needs to completely ignore spoiler concerns. NotARealWord (talk) 14:37, 23 August 2014 (UTC)
* Interesting that you bring up Kiddy Grade as that is an example of an incomplete plot summary that needs to be rewritten. However, when writing plot summaries, whether a particular plot detail is a "spoiler" should not be taken into consideration. A balance between completeness and brevity are the main factors when writing a summary. If you look at any of the Quality Articles, you will see that almost every single one of them has a complete summary of the plot (or as near enough one can get with an ongoing series). In fact, a complete summary is required to get above a C-class quality rating. —Farix (t | c) 14:59, 23 August 2014 (UTC)
* @Farix: Fair enough, I see your point. By the way, would you mind if I added short character descriptions to the rest of the cast, along the lines of (though probably shorter than) the character bios for the three characters currently described? ~GMH talk to me 15:11, 23 August 2014 (UTC)
* Adding more character descriptions isn't a problem so long as you are not leaving out significant details because you think they are "spoilers". —Farix (t | c) 15:28, 23 August 2014 (UTC)
* Well I don't want to turn this into a trivia page, because that's not the point of Wikipedia either. Anyway, I've added a few words for everyone, except Utasha (a name I can't recall from the series). I changed the previously-posted reason for Kanon's breakup with Kojima since it was incorrect (as Kanon specifically cites at least one reason that's not suspected infidelity, if I recall correctly). Also some grammar fixes. ~GMH talk to me 16:28, 23 August 2014 (UTC)
Who is Utasha?
Is that the miko (is that the right term?) who sings the island's song? I'm having trouble finding confirmation online, but the voice credit for one version of the song in the soundtrack (Nami Miyahara) matches the voice credit given for this character name, and aside from even less significant characters, pretty much just the miko is left by process of elimination. Anyhow, I've refrained from adding a character description since I'm not sure that's the right character; someone else can add it later once this is confirmed. (MyAnimeList does not list this character in the characters section, so that was useless as a resource.) ~GMH talk to me 16:36, 23 August 2014 (UTC) | WIKI |
PSYCH 3GG3 Chapter Notes - Chapter 3: Bulimia Nervosa, Mental Disorder, Psychopathy
28 views5 pages
Published on 19 Apr 2013
School
McMaster University
Department
Psychology
Course
PSYCH 3GG3
Professor
Page:
of 5
ABNORMAL PSYCHOLOGY
Chapter 3 Classification & Diagnosis
Brief History of Classification
In earlier times, (19th early 20th century), there was great inconsistency in the classification of
abnormal psychology; different systems were used in different parts of the world
The DSM (Diagnosis Statistic Manuel) was first published in 1959, then updated in 68’ (DSM-II), and
again in 87’ (DSM-III), and finally in 94’ (DSM-IV)
The Diagnostic system of the American Psychiatric Association (DSM-IV and DSM-IV-TR)
‘Mental Disorder’ is defined as “a clinically significant behavioural or psychological syndrome or pattern
that occurs in and individual and that is associated with present distress (i.e. painful symptoms) or
disability (impairment in one or more areas of functioning) or with significantly increased risked of
death, pain, disability, or an important loss of freedom.
In addition, the syndrome can’t be an expected response or culturally sanctioned response, must be a
manifestation of a behaviour, psychological, or biological dysfunction
Five Dimensions of Classification
With the introduction of the DSM-III, came the mulitaxial classification where people are rated on 5
separate dimensions:
Axis I: All diagnostic categories except for mental retardation and personality disorders
Axis II: Personality disorders and mental retardation
Axis III: General Medical Condition
Axis IV: Psychosocial & Environmental problem
Axis V: Current level of Functioning
These five axes are for a diagnostician to consider a broad range of information
Although there are 5 axes, all abnormal behaviour is placed within the first 2 axes, the rest are to
provide additional information for the psychiatrist
Most people come to be treated for Axis I disorders, however sometimes they previously had Axis II
disorders, which is why they are separated from each other
Disorders
Disorders Diagnosed During Childhood
Separation Anxiety (anxiety from being away from home/parents)
Conduct Disorder (repeatedly violating social norms/rules)
Attention Deficit/Hyperactivity Disorder
Mental Retardation
Pervasive Developmental Disorders (including autism)
Learning Disorders (delays in acquisition of speech, grammar, reading ect.)
Mood Disorders
Major Depressive Disorder (person is deeply sad and discouraged and is likely to lose
weight/energy and have suicidal thoughts)
Mania (exceedingly euphoric, irrationally happy)
Bipolar Disorder
Anxiety Disorders
Phobia
Panic Disorder (sudden intense attacks of apprehension, likely to tremble and shake)
Generalized Anxiety Disorder (fear & apprehension are pervasive, persistent n’ uncontrollable)
Obsessive Compulsive Disorder (obsessions: thoughts; compulsions: actions)
Post Traumatic Stress Disorder
Acute Stress Disorder (Similar to Post Traumatic Stress Disorder but symptoms don’t last as long
Somatoform Disorders
Somatisation disorder (long history of multiple psychical complaints for which they have taken
medicine or consulted a doctor)
Conversion Disorder (report a loss of motor or sensory function i.e. paralysis, blindness, loss of
sensation
Pain Disorder (suffer from severe and prolonged pain)
Hypochondrias (misinterpretation of minor injuries for serious illnesses)
Body Dysmorphic Disorder (preoccupied with an imagined defect with their body)
Dissociative Disorders
Dissociative Amnesia (may forget their entire past or a particular period of time)
Dissociative Fugue (suddenly and unexpectedly travels to a new location, starts a new life, and
cannot remember his/her past identity)
Depersonalization Disorder (sever and disruptive feeling of self estrangement or unreality)
Sexual & Gender Disorders
Paraphilias (unconventional sources of sexual gratification (i.e. exhibitionism, voyeurism,
sadism, masochism)
Sexual Dysfunction (unable to complete the usual sexual response cycle)
Gender identity Disorder (extreme discomfort in their anatomical sex and identifies themselves
with the opposite sex)
Sleep Disorders
Dyssomnias (sleep is disturbed in amount (too much/too little), quality, or timing
Parasomnias (unusual events occurring during sleep)
Eating Disorders
Anorexia Nervosa
Bulimia Nervosa
Factitious Disorder
Are applied to people who intentionally produce or complain of psychical or psychological symptoms,
apparently because of a psychological need to assume the role of a sick person
Adjustment Disorder
Applied to emotional or behavioural symptoms following a major life stressor, however it does not
match the criterion for any disorder in the DSM.
Impulse-Control Disorder
Intermittent Explosive Disorder (episodes of violent behaviour that results in destruction of
property/injury)
Kleptomania (steals repeatedly but not for the monetary value or use of the object)
Pyromania (person purposefully gains pleasure from setting fire to things)
Pathological Gambling
Trichotillomania (irresistible urge to pluck one’s own hair out)
Personality Disorder
Schizoid Personality Disorder (person is aloof, few friends, is indifferent to praise/criticism)
Narcissistic Personality Disorder (has an overblown sense of self importance, fantasizes about
great success, requires constant attention, exploits others)
Anti-social Personality Disorder (psychopathy; starts with juvenile delinquency)
Dementias/Deliriums
Delirium (clouding of consciousness, wandering attention, incoherent stream of thought)
Dementia (deterioration of mental capacities (including Alzheimer’s and other conditions)
Amnesic Syndrome (Impairment of memory not caused by delirium or dementia)
Document Summary
In earlier times, (19th early 20th century), there was great inconsistency in the classification of abnormal psychology; different systems were used in different parts of the world. The dsm (diagnosis statistic manuel) was first published in 1959, then updated in 68" (dsm-ii), and again in 87" (dsm-iii), and finally in 94" (dsm-iv) The diagnostic system of the american psychiatric association (dsm-iv and dsm-iv-tr) In addition, the syndrome can"t be an expected response or culturally sanctioned response, must be a manifestation of a behaviour, psychological, or biological dysfunction. All diagnostic categories except for mental retardation and personality disorders. With the introduction of the dsm-iii, came the mulitaxial classification where people are rated on 5 separate dimensions: These five axes are for a diagnostician to consider a broad range of information. Although there are 5 axes, all abnormal behaviour is placed within the first 2 axes, the rest are to provide additional information for the psychiatrist. | ESSENTIALAI-STEM |
prinsipiell
Etymology
From, via.
Adjective
* 1) in principle, of principle
Etymology
From, via.
Adjective
* 1) in principle, of principle | WIKI |
Space Transport and Engineering Methods/System Elements
← Back to Page 1
Functional Analysis
Once requirements have been developed to a certain level (see page 1), the next step is Functional Analysis. Engineering analysis in general is the breaking down of an object, system, problem or issue into its basic elements, to get at its essential features and their relationships to each other, and to external elements. Analysis includes developing abstract models or performing calculations for the component elements of a system, to help arrive at a complete and optimized design. Functional analysis is a breakdown on the basis of what a system does, in terms of the functions it performs or a sequence of operations. This is before considering how it is performed. "How" is a design solution, which we don't want to choose prematurely. Instead we want to consider all the alternatives and optimizations, which we do in later steps of the process. Prior to selecting the best design, there may be multiple functional breakdowns, at least one for each system concept, and often alternate versions within a concept. The details of these steps and their interactions are recorded in the form of diagrams and models, which can then be used for calculations and assessments.
Concept Identification
Although we don't want to prematurely select a design solution, we do have to generate alternate concepts for how the system will function. At the level of the system as a whole it is difficult to define requirements and measures without an idea of how the system will work. Concept identification involves identifying alternate approaches to how it will operate, and synthesizing one or more system concepts for each potential approach. System level concepts give the general approach to design and function, without specifying exact values of parameters or what components will be used. For the Apollo program, for example, there was a choice of "Direct to the Moon" vs "Lunar Orbit Rendezvous" as mission concepts, with the latter being the one actually chosen. System concepts may include major variables such as type of propulsion (i.e. chemical or nuclear), service life (one or multiple missions), and supply concept (i.e. closed or open loop life support). At the least it covers what main tasks the system will perform, and how it will be operated and maintained. Once the system concepts are established, the process of analysis, optimization, and selection can begin to find the best version of each competing concept, and then compare and select among the concepts to carry to the next stage of development.
At lower levels of the design process, this step is repeated when there are multiple possible approaches. An example would be thermal protection for re-entry. An ablative heat shield burns off some material each time, so checking thickness and periodic replacement would be part of the necessary operations. A metallic heat shield might not burn off, but suffer cracking from heating and cooling cycles, and require different types of inspection. So when listing design alternatives, it is not just ablative vs metallic that is important, but also how that choice affects the total flow of operations in the system.
Functional Diagrams
Functional Diagrams are prepared during analysis to illustrate the component operations a system performs and their inputs and outputs. They are a model of how a system operates in visual form. They start at the top level with external inputs and outputs which cross the system boundary, then are broken down into multiple levels of detail. They are often in a step by step time sequence, but can be more complex networks of operations with decision points and loops (Figure 1.5-4). For example, for an airplane, the main functions would be Load Passengers and Cargo, Taxi to Runway, Takeoff, Fly, Land, Taxi to Gate, and Unload Passengers and Cargo. Each of these main functions are further divided into smaller steps, then assigned to system elements to carry out. For example, the landing gear might be assigned multiple functions such as "absorb landing loads" and "provide steering for taxiing". Those then become requirements for detailed design and testing of that element.
Individual functions in a diagram transform inputs into outputs (Figure 1.5-5). The diagram typically shows functions as boxes and input/output flows as arrows connecting the boxes running from left to right. Flows can contain any sort of item, including information, matter, energy, labor, etc, or a combination thereof. They may divide and combine on a diagram, but the divided flow must sum to the contents of the undivided one. This derives from the physics concept of conservation laws, where matter and energy do not arise out of nothing. Similarly the flows within a system do not arise from or vanish into nothing, they must enter from outside or be converted by a functional task. By following the Conservation of Flows logic, then all the inputs and outputs of a system will be accounted for.
Control inputs regulate the operation of a function. By convention they are shown entering the top of a function box. Mechanisms perform the function, but are not transformed themselves, and are shown entering from the bottom. A mechanism example is a stamping press, which converts flat steel blanks to shaped stampings. Tne blanks and stampings are the inputs and outputs, respectively. For a complex system, the diagrams form a hierarchy, with one box on a given level expanded to a full diagram with multiple boxes at the next level down. Developing the levels of diagrams is a continuing task done incrementally, rather than all at once. The diagrams are a way to record and communicate the structure and operation of a system. They allow numerical calculations, for example noting the time required for each step to find the total operation time, or summing staff required for each function to get total staff needed to operate the system. Functional diagrams can also be converted to mathematical simulations of system operations, typically with computer software made for that purpose. Any amount of description or other information may be attached to items in a diagram, by means of a unique function or flow reference number. By convention, expanded lower level diagrams use the same number as the parent box (i.e. 9.2), with another period followed by another number (9.2.1, 9.2.2, etc.). This is not required, but it makes tracing the connections between diagrams easier.
Requirements Allocation
The third major step in the systems engineering process is Requirements Allocation. To ensure all the top level requirements will be met, they are assigned to one or more functions to implement. The assignment may be the whole requirement, or by dividing it into parts and then assigning the parts to separate functions. Allocated requirements are documented in lower level requirements documents or specifications that apply to parts of a project. Traceability is being able to trace the links between lower and higher level requirements and the logic of how they were generated. At the lowest level, a subset of the requirements are assigned to a particular hardware or software item, skilled staff, procedures, facilities, interfaces, services, or other elements of the final system. With a complex project, software tools become very useful for the requirements allocation and tracking process. They can help manage the mass of details, and ensure everyone on a project has the most current information.
Requirements allocation is not a one-time task, although it is weighted towards the early stages of a project. As design and testing make progress, they can provide feedback and adjustment to the assigned requirements. These changes propagate to higher levels, and by tracing back their impacts, you can determine how they affect the top-level goals of the project. Changes can also have sideways effects at the same level. For example, an increase in weight of one part of a system may require weight-saving efforts elsewhere to not affect top level performance.
System Modeling
The next major step is to model the system and alternate approaches to the design. Various methods are used to model the design and configuration of the system elements. Traditional ones include two dimensional diagrams (blueprints) and physical scale models. These methods can help visualize a system, but are not easy to modify, derive parameters, or perform simulations. The trend is towards integrated software modeling, where software tools model and simulate multiple aspects of the system, or communicate from one tool to another. In software tools, a system is represented as data and mathematical relationships, which makes it much easier to change, optimize, and evaluate.
Input/Output Model
Input-Output Models were first developed for quantitative understanding of the total flows in an economy. They can be applied to any system, not just economic ones, for determining if all the inputs and outputs of a system add up. It can be visualized as a spreadsheet with the elements of a system as rows, and additional rows for items outside the system. Types of inputs and outputs are in columns. Each component requires inputs such as power, data, fuel, etc. It also produces some kind of output. The purpose of a model is to see if your system as a whole has closure and balance. In other words, are all the inputs matched by outputs? Are there missing components identified by missing inputs? Is the size or quantity of a particular element in the system the correct size/productivity? Will the system as a whole produce the desired output, and if so how much? These are really all questions of accounting. Rather than counting everything in money, this type of spreadsheet does the accounting of each type of input/output/resource/supply separately as categories. Note that human labor is one of the input types.
A model, such as an Input/Output Model lets you actively see how a change in any one component, such as a new design, impacts the system as a whole. By summing the flows of the component functions in a model spreadsheet (or other computer model) you can immediately find changes to the rest of the system components and the totals for the entire system. The Input/Output model and functional diagrams both model aspects of the same system, and may be combined within a single software tool or database if it can represent all the details of a system in sufficient detail. This is desirable for plotting how changes in system components affect the system as a whole.
Functional diagrams at a basic level are maintained as static drawings, and input/output models can be an actual spreadsheet. Using the same numbering system and structure for the diagrams and models maintains the relationship between them. They are both representing the same system, just different aspects.
Optimization and Trade Studies
Optimization and selection is done at all levels of engineering design. In the Systems Engineering process it is first applied at a high level to concepts before detailed design is performed. Optimization is varying parameters within a single concept or element in order to find the best values for those parameters. Trade Studies compare different concepts in order to select the best one. Different parameters like weight, cost, and risk cannot be directly compared. So they are scored by measures of effectiveness (see page 1). The concept or optimized parameters that yield the highest score is the "best option". In the early stages of design, there will be larger uncertainties in parameters like weight and performance. Finding how much effect variations in such parameters have is called Sensitivity Analysis. Knowing those will guide which areas to work on to reduce uncertainties.
If the difference in evaluation score between two concepts is sufficiently more than their uncertainties, the lower scoring one may safely be discarded. If the scores are within the range of uncertainties, both should be worked on in more detail until a clear winner emerges. If the effort to reduce uncertainty is judged more than the uncertainty reduction is worth, then one of the competing choices can be selected arbitrarily. Note that optimization of a system as a whole may not mean optimization of each individual part, since the parts can interact in a complex way. Once the optimization and selection is completed, the results are recorded and used to update the system concept and current design configuration.
Synthesis and Documentation
The last major step in the systems engineering design cycle is synthesis and documentation. In systems engineering, "System Synthesis" is assembling the results of completed analysis and studies into a coherent design. The design for a complex system typically includes multiple items of hardware, software, facilities, etc. Each separate item is referred to as a Configuration Item, and the current state of that item's design at any given time is called a Configuration. Configuration Management is the task of documenting the current state of the design and analysis work. This is necessary to coordinate the work for a complex design with many people involved. Otherwise some work would be based on obsolete data or incorrect assumptions. Other documents included in recording the work are Requirements, Specifications, Study Reports, Simulation code and results, 3D Models, and any other data and notes created in the course of the work. All of this is kept as a base for further work, if later changes are needed, or if questions or problems come up. Design data is also needed for later project stages like production.
Work Breakdown Structure (WBS)
A common method to document a system is to index all the requirements, plans, drawings, analyses, reports, budgets, work logs, and other data by a numbering system called a Work Breakdown Structure, which covers all the elements of the system across it's life cycle. In modern projects the actual data is mostly stored electronically, but a WBS helps organize and find particular items in the same way classification systems for books are used to organize libraries.
A WBS is a hierarchical table or drawing showing all the parts of a complex system and their successive division into smaller parts until you reach the level that specialty engineers can do the detailed design. It gives structure to what would otherwise be an amorphous mass of design work. The WBS serves as a tracking method and index, so that people working on different parts of the project tell they are talking about the same items. It also serves as a method to collect and file the engineering data as it accumulates, assign tasks to individuals and groups, and track progress and costs. The WBS is often derived from the functional analysis of the system.
In theory a WBS can be structured in any way you choose, but usually each level of division within the structure has a common basis. Examples include:
* By location on Earth or in Space
* By type of function, such as Production, Operation, and Transportation
* By type of element, such as Data, Software, Hardware, Facilities, and Staff.
* By end item product, such as a launch vehicle or lunar base
* By Subsystem, such as structures, mechanical, or electrical
* By time sequence, such as Phase I, or Version 2 Upgrade
* By type of data such as drawings, analyses, or reports
The basis to use depends on what makes sense for the project, but a consistent structure, such as all second level divisions are by end item, makes the overall structure easier to understand and use. It is more important that everyone on the project use the same structure than exactly how it is divided up. Maintaining the structure is often assigned to systems engineering specialists because it is related to the other tasks they perform. Each part of the structure is given a number or identifying key, typically using decimal points to distinguish levels, i.e 1,2,3, ... for the top level, then 1.1, 1.2, 1.3, ... for the parts that make up the next level below item 1, and so on. This is not the only way to do such structuring, but it is commonly used and easy to understand. The following section illustrates some of the ways to arrange a given WBS level. It is not an exhaustive list.
WBS by Item Type
This example is for an automated factory that consists of operating data, software, and hardware, facilities, and staff:
1.0 Operating Data Components
* 1.1 Design Standards
* 1.2 Manuals and procedures
2.0 Software Components
* 2.1 Design Software - A great deal of design software already exists. The specific need for advanced manufacturing is to design parts so they can fit the production capability of given machines, and supply processing and assembly instructions for individual and collections of parts. This may required modifying or adding to existing software.
* 2.2 Work Order Software - Takes an incoming product design in the form of CAD files, compares it to the factory capabilities and inventory, and generates a work order list of tasks for each machine, parts and materials to order, etc. Work orders are then scheduled among the various components.
* 2.3 Machine Driver Software - Each type of automated machine requires specific driver software to control how it operates, and to collect data back to track progress and other purposes.
3.0 Hardware Components
* 3.1 Storage - Materials, parts, and assemblies need to be stored when not actively being worked on.
* 3.2 Materials Handling - To transport items from one location to another.
* 3.3 Production Machines - Turn raw materials into inventory stock or finished parts, possibly using several machines for different steps.
* 3.4 Assembly Machines - Convert a collection of parts into a finished item. This will generally involve one or more robots.
* 3.5 Inspection and Observation Hardware - To test items and oversee operations.
4.0 Facility Components - This includes modification of the surroundings, controlling the factory environment using buildings, and supplying utilities, but not specifically producing any items.
5.0 Staff Components - Humans are not components to be designed, but rather selected and trained for required skills, and then supplied in needed numbers.
WBS by Subsystem Type
This example is a typical set of subsystems for space hardware, and also lines up with design specialties:
* Structures
* Mechanical
* Power and Electrical
* Propulsion
* Thermal
* Data
* Communications
* Sensors
* Displays and Controls
* Internal Environment
* External Environment
* Crew Support
* Maintenance and Repair | WIKI |
The Black Plague started in 1346 and ended in 1352. The disease killed at least 25 million people, which resulted in a significant depopulation across several nations. But how did this affect the economy at the time?
After the Plague, the remarkable decrease in population brought about a shortage of laborers. Those who were available to work were also able to demand higher wages because of it. Some estimates show that a typical worker’s wage increased by 50%.
How Did The Black Plague Start?
Almost a third of Europe’s population had been wiped out because of The Black Plague. The disease started in Asia and spread across Europe through trading ships.
Back then, no one knew what the cause of the mysterious disease was. It wasn’t until years later did they discover that it originated from bacteria found on fleas and black rats. The fleas would infect the rats, and they would infect people after they stowed away on ships that docked on several European ports.
So lethal was the disease that cases were known of persons going to bed well and dying before they woke. So rapidly did it spread from one to another that to a French physician it seemed as if one sick person could infect the whole world.Barbara Tuchman
Did the Rulers Try to Stop Wages From Increasing?
The Plague affected everyone from every class. But it was the peasants who suffered the most during this time. As more and more people died, it became harder for those in the upper class to find people to plow the fields, harvest the crops, and produce other goods needed. It was then when the peasants decided to demand higher wages.
European leaders enforced laws for these workers to accept the same wages they did before the Black Plague began to stop this nonsense. The law was issued in 1351 and stated that every healthy unemployed individual below the age of 60 must work for any person willing to hire them. Those that violated the law would be punished and fined.
By 1360 the consequences got worse. Those who disobeyed and demanded better pay were sent to prison. If they escaped, they would be branded with the letter “F” on their foreheads. (Source: World History – Wages and the Black Death)
How Did Increased Worker Wages Affect the Economy?
The amount of work to be done did not change. However, because the workers had more to work on, they became more productive because they had less manpower. As a result, they produced more goods and services. This made employers happy, which led them to pay more for the excellent job done.
At this point, it was pretty apparent that the law that was enforced was not effective. Some employers would try to appease their workers by giving them payments in kind instead. Some of them would eventually pay higher wages illegally because there were just a few people.
As the wages for these workers rose, they were able to afford more things. Thus causing a chain reaction – there was a higher demand for goods, and the production increased. These workers eventually earned enough to move away from the estates they worked on and bought their own property. (Source: World History – Wages and the Black Death) | FINEWEB-EDU |
3-MeO-PCP
3-Methoxyphencyclidine (3-MeO-PCP) is a dissociative hallucinogen of the arylcyclohexylamine class related to phencyclidine (PCP) which has been sold online as a designer drug. It has been used across Europe and the United States. In some cases, consumption has been known to be fatal. It acts mainly as an NMDA receptor antagonist, though it has also been found to interact with the sigma σ$1$ receptor and the serotonin transporter. The drug does not possess any opioid activity nor does it act as a dopamine reuptake inhibitor.
Pharmacology
3-MeO-PCP has a K$i$ of 20 nM for the dizocilpine (MK-801) site of the NMDA receptor, 216 nM for the serotonin transporter (SERT), and 42 nM for the sigma σ$1$ receptor. It does not bind to the norepinephrine or dopamine transporter nor to the sigma σ$2$ receptor (Ki >10,000 nM). Based on its structural similarity to 3-hydroxy-PCP (3-HO-PCP), which uniquely among arylcyclohexylamines has high affinity for the μ-opioid receptor in addition to the NMDA receptor, it was initially expected that 3-MeO-PCP would have opioid activity. However, radioligand binding assays with human proteins have shown that, contrary to common belief, the drug also does not interact with the μ-, δ-, or κ-opioid receptors at concentrations of up to 10,000 nM. As such, the notion that 3-MeO-PCP has opioid activity has been described as a myth.
3-MeO-PCP binds to the NMDA receptor with higher affinity than PCP and has the highest affinity of the three isomeric anisyl-substitutions of PCP, followed by 2-MeO-PCP and 4-MeO-PCP.
As of 2018, controlled clinical studies have not been performed in humans but the elimination half-life is estimated to be between 10 and 11 hours.
Chemistry
3-MeO-PCP hydrochloride is a white crystalline solid with a melting point of 204–205 °C.
History
3-MeO-PCP was first synthesized in 1979 to investigate the structure–activity relationships of phencyclidine (PCP) derivatives. The effects of 3-MeO-PCP in humans were not described until 1999 when a chemist using the pseudonym John Q. Beagle wrote that 3-MeO-PCP was qualitatively similar to PCP with comparable potency. Interest in gray-market dissociates accelerated in 2008, when an online research chemical vendor began offering the less potent 4-MeO-PCP. In 2009, a Swiss chemist described the effects of taking the drug on the Bluelight forums. 3-MeO-PCP first became available as a research chemical in 2011. The drug was first reported to the European Monitoring Centre for Drugs and Drug Addiction by the UK on March 29, 2012.
Recreational Use
Based on the number of reported intoxications, 3-MeO-PCP is likely more popular than other similar grey market arylcyclohexylamines. 3-MeO-PCP has been available for purchase online as a research chemical. It has been found in drug samples in the United Kingdom and Italy. It is also known to be used in France, The Netherlands, Sweden, The United States, Spain, and the Czech Republic.
3-MeO-PCP is usually taken orally or nasally, but can also be injected or smoked. Duration and onset of effects varies depending on route of administration. When taken orally, onset takes 30-90 minutes and effects last 4-12 hours. It's effects are described as a dissociative hallucinogen, similar to PCP. Being slightly more potent than PCP, threshold activity is exhibited at 3-5mg, with dissociative effects starting at 5mg. Strong dissociative effects are seen at 10mg-20mg. The effects are generally reported as positive, with more euphoria and mental clarity than similar drugs. Negative effects include hypertension, tachycardia, confusion, and disorientation. In one case of an individual taking a very large oral dose (300-500mg), psychosis and aggressive behaviors, followed by amnesia were observed.
As of 2022, there has been two known deaths that can be attributed to 3-MeO-PCP alone; one in Sweden and one in the UK. There were 14 additional deaths where 3-MeO-PCP was detected in the blood post-mortem.
United Kingdom
On October 18, 2012, the Advisory Council on the Misuse of Drugs in the United Kingdom released a report about methoxetamine, saying that the "harms of methoxetamine are commensurate with Class B of the Misuse of Drugs Act (1971)". The report went on to suggest that all analogues of MXE should also become class B drugs and suggested a catch-all clause covering both existing and unresearched arylcyclohexylamines, including 3-MeO-PCP.
United States
3-MeO-PCP is not a controlled substance in the United States but possession or distribution of 3-MeO-PCP for human use could potentially be prosecuted under the Federal Analogue Act due to its structural and pharmacological similarities to PCP.
Canada
Canada's Controlled Drugs And Substances Act has for years placed all PCP analogues, derivatives, salts and further children thereof under a Schedule 1 prohibition, alongside opioids, cocaine and other top-ranked illegal psychoactives. As such, 3-MeO-PCP is automatically banned, although it is not mentioned by name in the schedule. Only PCP and Ketamine are specifically written in.
Sweden
Sweden's public health agency suggested classifying 3-MeO-PCP as hazardous substance on November 10, 2014.
Czech Republic
3-MeO-PCP is banned in the Czech Republic.
Chile
As per Chile's Ley de drogas, aka Ley 20000, all esters and ethers of PCP are illegal. As 3-MeO-PCP is an ether of PCP, it is thus illegal.
Portugal
3-MeO-PCP is neither a salt nor an isomer of PCP, not making it illegal. | WIKI |
User:Taxman/Created
Pages I created:
* Capital_gain
* Tarpaulin
* Tie_(draw)
* Corporate_finance
* Satellite_phone
* Collegiate_wrestling
* Alexander_Karelin
* Common_stock
* Economic_model
* VUL
* Managerial_finance
* Interstate_696
* Term_life_insurance
* Securities_Exchange_Act_of_1934
* Onside_kick
* Insurance_contract
* Municipal_Securities_Rulemaking_Board
* 529_plan
* Coverdell_Education_Savings_Account
* Self_insurance
* Employee_stock_option
* Economic_Growth_and_Tax_Relief_Reconciliation_Act_of_2001
* 403(b)
* M-52_(Michigan_highway)
* La_Albuera
* The_Avenues,_Salt_Lake_City,_Utah
* Comparative_statics
* Output_(economics)
* Biodiesel_production
* Health_savings_account
* Medical_savings_account
* Flexible_spending_account
* Gender_verification_in_sports
* Bond_convexity
* Share_(finance)
* Corporate_trainer
* Mercedes-Benz_240D
* Tron_(arcade_game)
* List_of_geographic_bodies_by_area
* Freeze_drying
* Culture_of_Spain
* Selling_technique
* 457_plan
* Timpanogos_Cave_National_Monument
* Chuck_Daly
* Market_power
* A_share
* Calculus_(disambiguation)
* Debtors'_prison
* Retirement_plans_in_the_United_States
* List_of_poker_related_topics
* List_of_Baroque_architecture
* Raymond_Cattell
* Estate_planning
* Timpanogos
* Qualified_domestic_relations_order
* SIMPLE_IRA
* Slurpee
* Brake_fluid
* Label
* Thermic_effect_of_food
* Sample_size
* Michigan_Educational_Assessment_Program
* Vegetable_ivory
* Butterbean
* Marquesas_Keys
* C_of_I
* Contradanza
* Crank–Nicolson method
* Gift_tax_in_the_United_States
* Camelina
* Camelina_sativa
* June_bug
* Ester_(disambiguation)
* Other_Minds
* Hindu_wedding
* Shaadi
* Silver_standard
* Veliidae
* Tetrapyrrole
* Gurdaspur
* Gurdaspur_district
* Metallography
* Xanthoria_parietina
* List_of_marathon_races
* Naphthol
* Yecla
* Sultanpur,_Uttar_Pradesh
* Sultanpur_district
* Barometric_light
* Phylo
* Uranium-lead_dating
* Roy_Kerr
* Nicolaus_Bernoulli
* Pierre_Berthelot
* Pierre_Raymond_de_Montmort
* Franz_Neumann
* Karl_Neumann
* Weizsäcker_family
* Nepidae
* Nepa_cinerea
* Francis_Wheatley_(painter)
* Francis_Wheatley
* Windthorst
* Wodrow
* Hapur
* Sitapur
* John_A._Anderson
* Sueca
* Chinch_bug
* Nysius_raphanus
* Blissus_leucopterus
* COLI
* Raas_(disambiguation)
* Kohat_Pass
* Munda
* Kol_people
* Montoro
* Monforte
* Montefrío,_Granada
* Pozoblanco
* Material_(disambiguation)
* Singrauli
* Corporate_tax_in_the_United_States
* Sins_(2005_film)
* Water_Parsnip | WIKI |
FGF8 signaling is chemotactic for cardiac neural crest cells
52Citations
Citations of this article
72Readers
Mendeley users who have this article in their library.
Abstract
Cardiac neural crest cells migrate into the pharyngeal arches where they support development of the pharyngeal arch arteries. The pharyngeal endoderm and ectoderm both express high levels of FGF8. We hypothesized that FGF8 is chemotactic for cardiac crest cells. To begin testing this hypothesis, cardiac crest was explanted for migration assays under various conditions. Cardiac neural crest cells migrated more in response to FGF8. Single cell tracing indicated that this was not due to proliferation and subsequent transwell assays showed that the cells migrate toward an FGF8 source. The migratory response was mediated by FGF receptors (FGFR) 1 and 3 and MAPK/ERK intracellular signaling. To test whether FGF8 is chemokinetic and/or chemotactic in vivo, dominant negative FGFR1 was electroporated into the premigratory cardiac neural crest. Cells expressing the dominant negative receptor migrated slower than normal cardiac neural crest cells and were prone to remain in the vicinity of the neural tube and die. Treating with the FGFR1 inhibitor, SU5402 or an FGFR3 function-blocking antibody also slowed neural crest migration. FGF8 over-signaling enhanced neural crest migration. Neural crest cells migrated to an FGF8-soaked bead placed dorsal to the pharynx. Finally, an FGF8 producing plasmid was electroporated into an ectopic site in the ventral pharyngeal endoderm. The FGF8 producing cells attracted a thick layer of mesenchymal cells. DiI labeling of the neural crest as well as quail-to-chick neural crest chimeras showed that neural crest cells migrated to and around the ectopic site of FGF8 expression. These results showing that FGF8 is chemotactic and chemokinetic for cardiac neural crest adds another dimension to understanding the relationship of FGF8 and cardiac neural crest in cardiovascular defects. © 2011 Elsevier Inc.
Cite
CITATION STYLE
APA
Sato, A., Scholl, A. M., Kuhn, E. B., Stadt, H. A., Decker, J. R., Pegram, K., … Kirby, M. L. (2011). FGF8 signaling is chemotactic for cardiac neural crest cells. Developmental Biology, 354(1), 18–30. https://doi.org/10.1016/j.ydbio.2011.03.010
Register to see more suggestions
Mendeley helps you to discover research relevant for your work.
Already have an account?
Save time finding and organizing research with Mendeley
Sign up for free | ESSENTIALAI-STEM |
N72 road (Ireland)
The N72 road is a national secondary road in Ireland that runs east-west from its junction with the N25 near Dungarvan in County Waterford to the N70 in Killorglin in County Kerry.
The road passes through Lismore – Fermoy (M8) – Mallow (N20) – Rathmore – Killarney (N22) – Killorglin.
The N72 is 165.923 km long.
Route
Like most national secondary roads, the N72 is mainly a single carriageway two-lane road. Some stretches are narrow with sharp bends. The N72 begins in County Waterford at the N25 near Dungarvan on the main Cork to Rosslare road. Travelling west from there to Cappoquin the road is single carriageway. From Cappoquin to Lismore the road is of good quality, with hard shoulders and a good surface. Past Lismore the road is of poorer quality, travelling via Tallowbridge and Fermoy to Mallow in County Cork. Some sections between Fermoy and Mallow are narrow with sharp bends and few hard shoulders. The section from Mallow to the R579 junction (Banteer) has hard shoulders. After the R579 junction, this section of the N72 has no hard shoulders until it joins the N22 in County Kerry, east of Killarney. Further west, after bypassing Killarney, the N72 leaves the N22 again, becoming part of the Ring of Kerry route to Killorglin, where the road terminates at the N70. When the N72 leaves the N22, it reaches its roundabout with the N71 which goes to Kenmare.
Proposed upgrades
Funding of €2.4 million has been secured in 2011 for realignment of a particularly accident-prone stretch of the N72. | WIKI |
Signing Linux RPM files using a Gnu Privacy Guard key
Signing Linux RPM packages assures users of the package that the RPM has not been tampered with. Learn how to create a Gnu Privacy Guard key and sign your RPM packages.
RPM is the standard for installing and managing software on Red Hat and SUSE. Meta package handlers such as Yum and Zypper make it easy to install packages. But, RPM can be dangerous because during installation scripts are executed with root permissions automatically. So, make sure you trust the RPM package. If you create RPM packages yourself, it's a good idea to sign them using a Gnu Privacy Guard (GnuPG or GPG) key.
In GPG, public/private-key pairs are used to ensure confidentiality. You can use them to encrypt files or as a digital signature that ensures that an email really comes from the listed sender. They can also be used to sign PRM packages.
When signing RPM packages, the creator of the RPM package needs to go through a signing procedure. This signature can be checked against the GPG key, which should be publicly available and can be imported by the person installing the package. If the signature matches this publicly available GPG key, the person who downloads the package has a guarantee that the package is signed by the GPG key that is joined with the package. This procedure is convenient, but it doesn't offer 100% guarantee. If the source where the package is offered gets compromised, both the RPM package and key may be falsified. Signing packages does increase the package security because the hacker needs to perform two hacks before the forged package can be offered.
If you want to offer signed RPM packages, you need to apply the following procedure:
1. Create a gpg key-pair. This generates a generic key pair that you can use for multiple purposes. To create it, use the gpg --gen-key command and specify the properties of the key. Before the key can be generated, you need to generate some random data, so make sure to generate disk activity to speed up the process of key generation. Below is the result of the gpg --gen-key command:
gpg: key 455F7CBF marked as ultimately trusted
public and secret key created and signed.
gpg: checking the trustdb
gpg: 3 marginal(s) needed, 1 complete(s) needed, PGP trust model
gpg: depth: 0 valid: 2 signed: 0 trust: 0-, 0q, 0n, 0m, 0f, 2u
pub 1024R/455F7CBF 2011-04-07
Key fingerprint = 4C78 4A47 1B84 E769 4ADD C43D 31DA C76F 455F 7CBF
uid Sander van Vugt <mail@xxxxxxxxxxxxx.nl>
sub 1024R/68D74CDD 2011-04-07
2. Now that you have the key pair, you need the key ID. Using the key ID, you need to create a key file. The key ID is what you see in the output of the gpg command in the pub line. In the example above, the key ID is 455F7CBF. The following command will create a file in the home directory of the current use that you can use to sign the key:
gpg -a -o ~/RPM-GPG-KEY-test --export 455F7CBF
3. Next, in the home directory of that same user, you have to create a .rpmmacros file that has the following content:
%_gpg_name 455F7CBF
4. At this point, you can (re)sign the package. The command below is used to sign an RPM package that has just been created and is available in the RPM build directory:
rpm --resign ~/rpmbuild/RPMS/x86_64/test-1.0-1.fc14.x86_64.rpm
5. At this point, you have a signed package and a key for the user to verify integrity of the package to use. You need to publish the key with the signed package. But first you need to test it. The following two commands conduct a local test; the first commands imports the GPG package, and the next command uses yum localinstall to install the package without the need to set up a repository:
rpm --import ~/RPM-GPG-KEY-test
yum localinstall ~/rpmbuild/RPMS/x86_64/test-1.0-1.fc14.x86_64.rpm
ABOUT THE AUTHOR: Sander van Vugt is an author and independent technical trainer, specializing in Linux since 1994. He is also a technical consultant for high-availability (HA) clustering and performance optimization, as well as an expert on SLED 10 administration.
This was last published in May 2011
Dig Deeper on Linux management and configuration
0 comments
Oldest
Forgot Password?
No problem! Submit your e-mail address below. We'll send you an email containing your password.
Your password has been sent to:
-ADS BY GOOGLE
SearchDataCenter
SearchServerVirtualization
SearchCloudComputing
SearchEnterpriseDesktop
Close | ESSENTIALAI-STEM |
User:DraculavanHelsing/Books/Clowns & Jesters
Clowns & Jesters
* 2016 clown sightings
* Archibald Armstrong
* Booger Dance
* Bouffon
* Bozo the Clown
* Cap and bells
* Chicot
* Chuchín
* Circus clown
* Clown
* Clown bicycle
* Clown car
* Clown society
* Coulrophobia
* Crazy wisdom
* Dagonet
* Emmett Kelly
* Evil clown
* Evil Clown of Middletown
* Fool (stock character)
* Harlequin
* Harlequinade
* Harley Quinn
* Heyoka
* It (character)
* It (novel)
* Jamie Fleeman
* Jane Foole
* Jeffrey Hudson
* Jesse Bogdonoff
* Jester
* Jester's privilege
* John Pace
* Joker (comics)
* Kachina
* Killer Klowns from Outer Space
* Killjoy (film series)
* List of clowns
* List of jesters
* Marotte
* Mask
* Master of the Revels
* Mime artist
* Motley
* Nicolai Poliakoff
* Perkeo of Heidelberg
* Pierrot
* Pueblo Clowns
* Punch and Judy
* Ritual clown
* Rodeo clown
* Roland the Farter
* Shakespearean fool
* Silly Billy
* Skomorokh
* Slapstick
* Stańczyk
* The Fool (Tarot card)
* Till Eulenspiegel
* Triboulet
* Trickster
* Will Sommers
* Yorick | WIKI |
Castledine
Castledine is a surname, and may refer to
* Annie Castledine (1939–2016), British theatre director, teacher and dramaturg
* Fred Castledine (1937–2019), Australian rules football player
* Gary Castledine (born 1970), Scottish former footballer
* Leo Castledine (born 2005), English footballer
* George Castledine (died 2018), British nursing educator and nursing consultant
* Stafford Castledine (1912–1986), English cricketer
* Stewart Castledine (born 1973), English former footballer | WIKI |
2005 V8 Supercar Championship Series
The 2005 V8 Supercar Championship Series was a motor racing championship for V8 Supercars. The series, which was the seventh V8 Supercar Championship Series, began on 18 March 2005 in Adelaide and ended on 27 November at Phillip Island Grand Prix Circuit after 13 rounds. The 46th Australian Touring Car Championship title was awarded to the series winner, Russell Ingall by the Confederation of Australian Motor Sport.
Calendar
The 2005 V8 Supercar Championship Series was contested over 13 rounds, including eleven single-driver 'sprint' rounds and two two-driver 'endurance' rounds.
Teams and drivers
The following drivers and teams competed in the 2005 V8 Supercar Championship Series.
* = Drove in Sandown 500 only ** = Drove in Bathurst 1000 only
* – Car #45 appeared as "Longhurst Racing" on some entry lists as a result of licence ownership issues.
Points system
Points were awarded on the results of each race as follows.
Drivers Championship
* Each round carried a maximum of 192, 186, 180 points etc. with each race at two-race rounds carrying half points and each race at three-race rounds carrying one third points.
* Each driver was required to drop his/her worst score from the first ten rounds.
* Gross total points are shown within brackets.
Teams Championship
(S) denotes a single car team.
Champion Manufacturer
Ford was awarded the Champion Manufacturer title, having achieved the most round wins during the series. | WIKI |
6
I have a list with 2x declarative approval workflows associated with it (the workflows themselves are copies of the OOTB Approval workflow and were built in SharePoint Designer 2010).
FYI: The items in my list go to a department for initial approval, and once they're approved they get routed to a second department for additional approval (i.e. the approvals happen in serial).
Workflow #1 is kicked off programmatically in my list's ItemAdded event, and I was hoping to kick off workflow #2 in the ItemUpdating event by checking if workflow #1's status column had just been set to Complete or Approved.
My problem however is that the ItemUpdating event does not seem to fire when workflow #1 is approved (even though the auto-added workflow status column on my list is updated to Approved).
FYI: I confirmed this by outputting trace messages to the ULS logs at the start of the event. These messages appear when editing the list items manually, but not when the workflow status changes.
Does anyone know how I can programmatically determine when a workflow status column is updated (preferably using the list's event receiver) so that I might manually start a second workflow?
• can you move items between lists for each steps ? – Steve B Jan 18 '12 at 16:27
• I'm not sure what you mean here Steve. Can you please elaborate? – Nick Larter Jan 20 '12 at 3:23
• If you think with "states" of the documents, you can use one library for each state. Changing state of an item will consists in moving the item from one library to another. Each library can have it's own approval process, which ends by moving the item to its next state (or previous, or close, etc. depending on your requirement). – Steve B Jan 20 '12 at 8:34
2
May be new workflow events can help you (if you are using sharepoint 2010 of course).
You can attach workflow event receiver to list and in code check workflow InstanceId. So, when your workflow #1 is completed, you can run workflow #2 on the same list item through code.
Workflow properties can be accessible using SPWorkflowEventProperties object.
• I didn't know these existed. Thanks @Kai, this worked a treat. – Nick Larter Jan 19 '12 at 4:47
0
DISCLAIMER: I am not sure whether this is the best approach since I have not tried this out; but might be a temporary solution.
When Workflow #1 updates automatically, the auto-added workflow status column may not fire the ItemUpdating event. When an approver, approves Workflow #1, you will have to somehow update the same list item, may be by updating a hidden list column. The hidden column value should help you identify that the list item has been approved. This will trigger your ItemUpdating event, even though everything is happening automatically. And then, you could trigger Workflow #2 on the same event.
• It seems a little onerous to add and update a new hidden field when the workflow is already updating an existing one that has all the info I need. Ideally I'l like to keep my list and workflow intact and use on of the existing contructs (like event receivers etc) to trap this update. I'll keep looking for a solid solution for now... – Nick Larter Jan 18 '12 at 7:12
Your Answer
By clicking “Post Your Answer”, you agree to our terms of service, privacy policy and cookie policy
Not the answer you're looking for? Browse other questions tagged or ask your own question. | ESSENTIALAI-STEM |
Ronald Reagan Centennial Commission Act
* Be it enacted by the Senate and House of Representatives of the United States of America in Congress assembled,
SECTION 1. SHORT TITLE.
* This Act may be cited as the ``Ronald Reagan Centennial Commission Act´´.
SEC. 2. ESTABLISHMENT.
* There is established a commission to be known as the ``Ronald Reagan Centennial Commission´´ (in this Act referred to as the ``Commission´´).
SEC. 3. DUTIES OF COMMISSION.
* The Commission shall—
* (1) plan, develop, and carry out such activities as the Commission considers fitting and proper to honor Ronald Reagan on the occasion of the 100th anniversary of his birth;
* (2) provide advice and assistance to Federal, State, and local governmental agencies, as well as civic groups to carry out activities to honor Ronald Reagan on the occasion of the 100th anniversary of his birth;
* (3) develop activities that may be carried out by the Federal Government to determine whether the activities are fitting and proper to honor Ronald Reagan on the occasion of the 100th anniversary of his birth; and
* (4) submit to the President and Congress reports pursuant to section 7.
SEC. 4. MEMBERSHIP.
* (a) Number and Appointment.—
* The Commission shall be composed of 11 members as follows:
* (1) The Secretary of the Interior.
* (2) Four members appointed by the President after considering the recommendations of the Board of Trustees of the Ronald Reagan Foundation.
* (3) Two Members of the House of Representatives appointed by the Speaker of the House of Representatives.
* (4) One Member of the House of Representatives appointed by the minority leader of the House of Representatives.
* (5) Two Members of the Senate appointed by the majority leader of the Senate.
* (6) One Member of the Senate appointed by the minority leader of the Senate.
* (b) Ex officio member.—
* The Archivist of the United States shall serve in an ex officio capacity on the Commission to provide advice and information to the Commission.
* (c) Terms.—
* Each member shall be appointed for the life of the Commission.
* (d) Deadline for Appointment.—
* All members of the Commission shall be appointed not later than 90 days after the date of the enactment of this Act.
* (e) Vacancies.—
* A vacancy on the Commission shall—
* (1) not affect the powers of the Commission; and
* (2) be filled in the manner in which the original appointment was made.
* (f) Rates of Pay.—
* Members shall not receive compensation for the performance of their duties on behalf of the Commission.
* (g) Travel Expenses.—
* Each member of the Commission shall be reimbursed for travel and per diem in lieu of subsistence expenses during the performance of duties of the Commission while away from home or his or her regular place of business, in accordance with applicable provisions under subchapter I of chapter 57 of title 5, United States Code.
* (h) Quorum.—
* A majority of the members of the Commission shall constitute a quorum to conduct business, but two or more members may hold hearings.
* (i) Chairperson.—
* The chairperson of the Commission shall be elected by a majority vote of the members of the Commission.
SEC. 5. DIRECTOR AND STAFF OF COMMISSION.
* (a) Director and staff.—
* The Commission shall appoint an executive director and such other additional personnel as are necessary to enable the Commission to perform its duties.
* (b) Applicability of Certain Civil Service Laws.—
* The executive director and staff of the Commission may be appointed without regard to the provisions of title 5, United States Code, governing appointments in the competitive service, and may be paid without regard to the provisions of chapter 51 and subchapter III of chapter 53 of such title relating to classification and General Schedule pay rates, except that the rate of pay for the executive director and other staff may not exceed the rate payable for level V of the Executive Schedule under section 5316 of such title.
* (c) Detail of Federal Employees.—
* Upon request of the Commission, the Secretary of the Interior or the Archivist of the United States may detail, on a reimbursable basis, any of the personnel of that department or agency to the Commission to assist it in carrying out its duties under this Act.
* (d) Experts and Consultants.—
* The Commission may procure such temporary and intermittent services as are necessary to enable the Commission to perform its duties.
* (e) Volunteer and Uncompensated Services.—
* Notwithstanding section 1342 of title 31, United States Code, the Commission may accept and use voluntary and uncompensated services as the Commission determines necessary.
SEC. 6. POWERS OF COMMISSION.
* (a) Hearings.—
* The Commission may, for the purpose of carrying out this Act, hold hearings, sit and act at times and places, take testimony, and receive evidence as the Commission considers appropriate.
* (b) Mails.—
* The Commission may use the United States mails in the same manner and under the same conditions as other departments and agencies of the United States.
* (c) Obtaining Official Data.—
* The Commission may secure directly from any department or agency of the United States information necessary to enable it to carry out its duties under this Act. Upon request of the chairperson of the Commission, the head of that department or agency shall furnish that information to the Commission.
* (d) Gifts, Bequests, Devises.—
* The Commission may solicit, accept, use, and dispose of gifts, bequests, or devises of money, services, or property, both real and personal, for the purpose of aiding or facilitating its work.
* (e) Available Space.—
* Upon the request of the Commission, the Administrator of General Services shall make available nationwide to the Commission, at a normal rental rate for Federal agencies, such assistance and facilities as may be necessary for the Commission to carry out its duties under this Act.
* (f) Contract Authority.—
* The Commission may enter into contracts with and compensate government and private agencies or persons to enable the Commission to discharge its duties under this Act.
SEC. 7. REPORTS.
* (a) Annual Reports.—
* The Commission shall submit to the President and the Congress annual reports on the revenue and expenditures of the Commission, including a list of each gift, bequest, or devise to the Commission with a value of more than $250, together with the identity of the donor of each gift, bequest, or devise.
* (b) Interim Reports.—
* The Commission may submit to the President and Congress interim reports as the Commission considers appropriate.
* (c) Final Report.—
* Not later than April 30, 2011, the Commission shall submit a final report to the President and the Congress containing—
* (1) a summary of the activities of the Commission;
* (2) a final accounting of funds received and expended by the Commission; and
* (3) the findings, conclusions, and final recommendations of the Commission.
SEC. 8. TERMINATION.
* The Commission may terminate on such date as the Commission may determine after it submits its final report pursuant to section 7(c), but not later than May 30, 2011.
SEC. 9. ANNUAL AUDIT.
* The Inspector General of the Department of the Interior may perform an audit of the Commission, shall make the results of any audit performed available to the public, and shall transmit such results to the Committee on Oversight and Government Reform of the House of Representatives and the Committee on Homeland Security and Governmental Affairs of the Senate.
SEC. 10. PROHIBITION ON OBLIGATION OF FEDERAL FUNDS.
* No Federal funds may be obligated to carry out this Act.
Approved June 2, 2009.
Legislative History
* CONGRESSIONAL RECORD, Vol. 155 (2009):
* Mar. 9, considered and passed House.
* May 19, considered and passed Senate.
* DAILY COMPILATION OF PRESIDENTIAL DOCUMENTS (2009):
* June 2, Presidential remarks and statement.
* June 2, Presidential remarks and statement. | WIKI |
Browse Source
Use assq instead of assoc with quoted symbols
* lisp/ob-core.el (org-babel-merge-params):
* lisp/org-agenda.el (org-agenda-prepare-window):
(org-agenda-to-appt):
* lisp/org-capture.el (org-capture-finalize):
* lisp/org.el (org-find-invisible-foreground):
(org-open-file):
(org-todo-trigger-tag-changes):
(org-back-over-empty-lines):
* lisp/ox-odt.el (org-odt-get-table-cell-styles):
Use assq instead of assoc with quoted symbols.
Aaron Ecay 2 years ago
parent
commit
48e7f17bc6
5 changed files with 22 additions and 22 deletions
1. 2 2
lisp/ob-core.el
2. 6 6
lisp/org-agenda.el
3. 1 1
lisp/org-capture.el
4. 5 5
lisp/org.el
5. 8 8
lisp/ox-odt.el
+ 2 - 2
lisp/ob-core.el
@@ -2491,10 +2491,10 @@ This takes into account some special considerations for certain
parameters when merging lists."
(let* ((results-exclusive-groups
(mapcar (lambda (group) (mapcar #'symbol-name group))
- (cdr (assoc 'results org-babel-common-header-args-w-values))))
+ (cdr (assq 'results org-babel-common-header-args-w-values))))
(exports-exclusive-groups
(mapcar (lambda (group) (mapcar #'symbol-name group))
- (cdr (assoc 'exports org-babel-common-header-args-w-values))))
+ (cdr (assq 'exports org-babel-common-header-args-w-values))))
(merge
(lambda (exclusive-groups &rest result-params)
;; Maintain exclusivity of mutually exclusive parameters,
+ 6 - 6
lisp/org-agenda.el
@@ -3625,10 +3625,10 @@ FILTER-ALIST is an alist of filters we need to apply when
((equal org-agenda-window-setup 'reorganize-frame)
(delete-other-windows)
(org-switch-to-buffer-other-window abuf)))
- (setq org-agenda-tag-filter (cdr (assoc 'tag filter-alist)))
- (setq org-agenda-category-filter (cdr (assoc 'cat filter-alist)))
- (setq org-agenda-effort-filter (cdr (assoc 'effort filter-alist)))
- (setq org-agenda-regexp-filter (cdr (assoc 're filter-alist)))
+ (setq org-agenda-tag-filter (cdr (assq 'tag filter-alist)))
+ (setq org-agenda-category-filter (cdr (assq 'cat filter-alist)))
+ (setq org-agenda-effort-filter (cdr (assq 'effort filter-alist)))
+ (setq org-agenda-regexp-filter (cdr (assq 're filter-alist)))
;; Additional test in case agenda is invoked from within agenda
;; buffer via elisp link.
(unless (equal (current-buffer) abuf)
@@ -10123,8 +10123,8 @@ to override `appt-message-warning-time'."
(and (stringp filter) (string-match filter evt))
(and (functionp filter) (funcall filter x))
(and (listp filter)
- (let ((cat-filter (cadr (assoc 'category filter)))
- (evt-filter (cadr (assoc 'headline filter))))
+ (let ((cat-filter (cadr (assq 'category filter)))
+ (evt-filter (cadr (assq 'headline filter))))
(or (and (stringp cat-filter)
(string-match cat-filter cat))
(and (stringp evt-filter)
+ 1 - 1
lisp/org-capture.el
@@ -711,7 +711,7 @@ captured item after finalizing."
(m2 (org-capture-get :end-marker 'local)))
(if (and m1 m2 (= m1 beg) (= m2 end))
(progn
- (setq m2 (if (cdr (assoc 'heading org-blank-before-new-entry))
+ (setq m2 (if (cdr (assq 'heading org-blank-before-new-entry))
m2 (1+ m2))
m2 (if (< (point-max) m2) (point-max) m2))
(setq abort-note 'clean)
+ 5 - 5
lisp/org.el
@@ -5665,7 +5665,7 @@ The following commands are available:
(mapcar
(lambda (alist)
(when (boundp alist)
- (cdr (assoc 'background-color (symbol-value alist)))))
+ (cdr (assq 'background-color (symbol-value alist)))))
'(default-frame-alist initial-frame-alist window-system-default-frame-alist))
(list (face-foreground 'org-hide))))))
(car (remove nil candidates))))
@@ -11434,7 +11434,7 @@ If the file does not exist, an error is thrown."
(cdr (assoc ext apps))
(cdr (assq t apps))))))
(when (eq cmd 'system)
- (setq cmd (cdr (assoc 'system apps))))
+ (setq cmd (cdr (assq 'system apps))))
(when (eq cmd 'default)
(setq cmd (cdr (assoc t apps))))
(when (eq cmd 'mailcap)
@@ -13060,9 +13060,9 @@ This hook runs even if there is no statistics cookie present, in which case
(when (and (stringp state) (> (length state) 0))
(setq changes (append changes (cdr (assoc state l)))))
(when (member state org-not-done-keywords)
- (setq changes (append changes (cdr (assoc 'todo l)))))
+ (setq changes (append changes (cdr (assq 'todo l)))))
(when (member state org-done-keywords)
- (setq changes (append changes (cdr (assoc 'done l)))))
+ (setq changes (append changes (cdr (assq 'done l)))))
(dolist (c changes)
(org-toggle-tag (car c) (if (cdr c) 'on 'off)))))
@@ -22535,7 +22535,7 @@ that may remove elements by altering the list structure."
"Move backwards over whitespace, to the beginning of the first empty line.
Returns the number of empty lines passed."
(let ((pos (point)))
- (if (cdr (assoc 'heading org-blank-before-new-entry))
+ (if (cdr (assq 'heading org-blank-before-new-entry))
(skip-chars-backward " \t\n\r")
(unless (eobp)
(forward-line -1)))
+ 8 - 8
lisp/ox-odt.el
@@ -3256,23 +3256,23 @@ styles congruent with the ODF-1.2 specification."
(cell-style-selectors (nth 2 style-spec))
(cell-type
(cond
- ((and (cdr (assoc 'use-first-column-styles cell-style-selectors))
+ ((and (cdr (assq 'use-first-column-styles cell-style-selectors))
(= c 0)) "FirstColumn")
- ((and (cdr (assoc 'use-last-column-styles cell-style-selectors))
+ ((and (cdr (assq 'use-last-column-styles cell-style-selectors))
(= (1+ c) (cdr table-dimensions)))
"LastColumn")
- ((and (cdr (assoc 'use-first-row-styles cell-style-selectors))
+ ((and (cdr (assq 'use-first-row-styles cell-style-selectors))
(= r 0)) "FirstRow")
- ((and (cdr (assoc 'use-last-row-styles cell-style-selectors))
+ ((and (cdr (assq 'use-last-row-styles cell-style-selectors))
(= (1+ r) (car table-dimensions)))
"LastRow")
- ((and (cdr (assoc 'use-banding-rows-styles cell-style-selectors))
+ ((and (cdr (assq 'use-banding-rows-styles cell-style-selectors))
(= (% r 2) 1)) "EvenRow")
- ((and (cdr (assoc 'use-banding-rows-styles cell-style-selectors))
+ ((and (cdr (assq 'use-banding-rows-styles cell-style-selectors))
(= (% r 2) 0)) "OddRow")
- ((and (cdr (assoc 'use-banding-columns-styles cell-style-selectors))
+ ((and (cdr (assq 'use-banding-columns-styles cell-style-selectors))
(= (% c 2) 1)) "EvenColumn")
- ((and (cdr (assoc 'use-banding-columns-styles cell-style-selectors))
+ ((and (cdr (assq 'use-banding-columns-styles cell-style-selectors))
(= (% c 2) 0)) "OddColumn")
(t ""))))
(concat template-name cell-type))))) | ESSENTIALAI-STEM |
Page:Doctor Thorne.djvu/92
88 be prudent on her part. The traces of her tears were still there; and she well knew that a very little, the slightest show of tenderness on his part, the slightest effort on her own to appear indifferent, would bring down more than one other such intruder. It would, moreover, be better for her to drop all outward sign that she remembered what had taken place. So long, then, as he and she were at Greshamsbury together, he should call her Mary if he pleased. He would soon be gone; and while he remained, she would keep out of his way.
'Your uncle has been obliged to go away to see an old woman at Silverbridge.'
'At Silverbridge! why, he won't be back all night. Why could not the old woman send for Dr. Century?'
'I suppose she thought two old women could not get on well together.'
Mary could not help smiling. She did not like her uncle going off so late on such a journey; but it was always felt as a triumph when he was invited into the strongholds of his enemies.
'And Janet is to come over for you. However, I told him it was quite unnecessary to disturb another old woman, for that I should of course see you home.'
'Oh, no, Mr. Gresham; indeed you'll not do that.'
'Indeed, and indeed, I shall.'
'What! on this great day, when every lady is looking for you, and talking of you. I suppose you want to set the countess against me for ever. Think, too, how angry Lady Arabella will be if you are absent on such an errand as this.'
'To hear you talk, Mary, one would think that you were going to Silverbridge yourself.'
'Perhaps I am.'
'If I did not go with you, some of the other fellows would. John, or George—'
'Good gracious, Frank! Fancy either of the Mr. De Courcys walking home with me!'
She had forgotten herself, and the strict propriety on which she had resolved, in the impossibility of foregoing her little joke against the De Courcy grandeur; she had forgotten herself, and had called him Frank in her old, former, eager, free tone of voice; and then, remembering she had done so, she drew herself up, bit her lips, and determined to be doubly on her guard for the future.
'Well, it shall be either one of them or I,' said Frank: 'perhaps you would prefer my cousin George to me?'
'I should prefer Janet to either, seeing that with her I should not suffer the extreme nuisance of knowing that I was a bore.' | WIKI |
Wikipedia:Articles for deletion/St. Davids Christian Writers' Conference
The result was DELETE. Notability not established or demonstrated. postdlf (talk) 03:06, 8 April 2011 (UTC)
St. Davids Christian Writers' Conference
* – ( View AfD View log )
No demonstration of notability in cited references. No in depth coverage from third party sources offered. Warfieldian (talk) 18:54, 21 March 2011 (UTC)
* Note: This debate has been included in the list of Organizations-related deletion discussions. -- • Gene93k (talk) 15:17, 22 March 2011 (UTC)
* Note: This debate has been included in the list of Events-related deletion discussions. -- • Gene93k (talk) 15:17, 22 March 2011 (UTC)
* Delete References at the article are self-referential. Google News finds only passing mentions. (BTW if the article is kept, the title needs to have its punctuation corrected. It should be St. David's Christian Writers Conference. Somehow the apostrophe migrated from "David" to "writers" in this article title.) --MelanieN (talk) 20:32, 27 March 2011 (UTC)
* The organization itself puts the apostrophe after writers' not after David, and they're writers.I.Casaubon (talk) 19:06, 28 March 2011 (UTC)
* Well, the items at Google News (written by REAL writers) mostly put it as I suggested. The fact that they style it this way leaves me even more convinced that the article should be deleted. What kind of writers can they be, if they can't punctuate their own name properly? 0;-D --MelanieN (talk) 23:50, 28 March 2011 (UTC)
* The apostrophe after Writers is correct, if the conference belongs to the writers that is. The missing one after David is another issue. Borock (talk) 03:26, 29 March 2011 (UTC)
* Keep it gets a lot of hits on google books, and appears to be "real" in the sense that it is a sizeable writer's conference that has been meeting annually for half a century, some authors give it a hat tip (I sold my first book via a contact I made at St. Davids), and draws a substantial crowd.I.Casaubon (talk) 19:00, 28 March 2011 (UTC)
* The article as it stands is very amateurish. it could use a writer. — Preceding unsigned comment added by I.Casaubon (talk • contribs) 19:01, 28 March 2011 (UTC)
Please add new comments below this notice. Thanks, Logan Talk Contributions 00:06, 29 March 2011 (UTC)
* Relisted to generate a more thorough discussion so a clearer consensus may be reached.
* Keep The topic seems to be notable enough, even though the article needs to be improved. But even as it is a reader learns something. Borock (talk) 03:23, 29 March 2011 (UTC)
* Delete - Article does not meet general notability criteria--יום יפה (talk) 14:45, 6 April 2011 (UTC)
* Delete due to insufficient verifiable third-party references. Stifle (talk) 09:51, 7 April 2011 (UTC)
| WIKI |
Stories by Scott Dunn
Phoenix Technologies Beinsync
BeInSync does four particular tasks--synchronizing, sharing, providing remote data access, and backing up--and it does them very well. There's no confusing of these tasks, each of which appears as a giant button in the cleanly designed interface. If you opt for the smaller 'Launch BeInSync' button, you get a more sophisticated interface, but with the same four buttons at the top.
Make Your Backups Painless and Brainless
One day, that 100-year-old oak outside your home-office window is going to plop onto your PC, or your power supply will dry up just as you attempt to save a huge Excel spreadsheet, or you'll have the one-in-a-million "reliable, robust" hard drive that suddenly, inexplicably gives up the ghost. What, you worry? Not for a minute, because you've set your system for automatic backups.
First Aid for Windows Help
Microsoft Corp.'s Hypertext Windows Help system was the envy of operating systems everywhere--until Microsoft decided to dump it in favor of a clumsy HTML-based version that doesn't let you bookmark topics, add annotations, or customize fonts. This is progress? A few applications continue to use the old system, but recent versions of Internet Explorer, Microsoft Office, and Windows itself are decidedly help-challenged. No instant fix is available to restore the hypertext version's features, but these tips will help you work around Windows Help's current limitations.
Folders: It's All in the Details View
Even the most descriptive file or folder name does not tell you much about what's behind the icon. How do you determine how large a file is, when a folder was created, or what that cryptic three-letter file extension means? Well, you could give your mouse a workout, or you could find out at a glance by using Details view in Windows Explorer or in an open folder window. These days, Windows Explorer and open folder windows are functionally equivalent, so we'll use the terms Explorer and folder interchangeably.
Annotate Your Folders and Files
Do you spend a lot of time opening files or folders just to see what's inside them? A good system for naming and organizing files can help, but sometimes you need more information than you can fit in a folder or file name. Fortunately, if you have Microsoft Corp.'s Windows 2000, Windows 98, or Windows 95 with Internet Explorer 4's Desktop Update feature installed, you can create annotations for any folder (and for some files) that are visible as an InfoTip, the small text that pops up when you hold the pointer over an object for a few seconds. You can also see these annotations for a selected item in the preview area of a folder displayed in Web View.
Give Us This Day Our Daily Tip
Remember when you first installed Microsoft Corp.'s Windows 95 and that annoying "Welcome to Windows 95" message appeared in the middle of the screen every time you rebooted? Remember how quickly you unchecked Show this Welcome Screen next time you start Windows? (Windows 95 users can relive the moment: Choose Start*Run, type welcome, and press Enter.) Fortunately, Microsoft has found a less obtrusive way to give you an occasional message. All you need is Windows 98 SE, Windows 2000, or Internet Explorer 5. (If you're a Windows 95 user who installed IE 5 without first installing IE 4's Desktop Update, the following will work only when browsing Web pages.) In any folder, browser, or Explorer window, choose View*Explorer Bar*Tip of the Day. A small pane opens at the bottom of the window containing a tip. Click the Next Tip link if you want to see more. Or drag the bar separating the tip from the rest of the window to adjust its size. The tip will stay visible until you close the window. If you display the tip pane in a browser window, it should reappear the next time you launch Internet Explorer (with Windows Explorer or folder windows, you have to manually display the tip pane each time).
Windows Tips
The Web viewpane of the Microsoft Corp.'s Windows 2000 Explorer vastly improves your preview of common bit-map image formats (such as GIF, JPEG, and BMP), letting you zoom in and out or launch a larger preview window. To activate this feature for a given folder, right-click an empty area of the folder and choose Customize This Folder. Click Next, check Choose or edit an HTML template for this folder,
Windows Tips: Quick and Easy Keyboard Shortcuts
If you frequently open certain applications, documents, folders, Control Panel applets or Web addresses, you can avoid digging through several levels of menus to find them by assigning a unique keyboard sequence to each. Here's how to get the most from this useful (and woefully underused) feature. | ESSENTIALAI-STEM |
Page:United States Statutes at Large Volume 56 Part 1.djvu/37
56 STAT.] 77'r CONG., 2D SESS.- CHS. 7 -9-JAN. 20, 1942 [CHAPTER 7] AN ACT To promote the national security and defense by establishing daylight saving time. Be it enacted by the Senate and House of Representatives of the United States of America in Congress assembled, That beginning at 2 o'clock antemeridian of the twentieth day after the date of enactment of this Act, the standard time of each zone established pursuant to the Act entitled "An Act to save daylight and to provide standard time for the United States", approved March 19, 1918, as amended, shall be advanced one hour. SEC. 2. This Act shall cease to be in effect six months after the termination of the present war or at such earlier date as the Congress shall by concurrent resolution designate, and at 2 o'clock antemeridian of the last Sunday in the calendar month following the calendar month during which this Act ceases to be in effect the standard time of each zone shall be returned to the mean astronomical time of the degree of longitude governing the standard time for such zone as provided in such Act of March 19, 1918, as amended. Approved, January 20, 1942. [CHAPTER 8] AN ACT Authorizing subsistence allowance provided for aviation cadets to be paid to messes in manner as prescribed by the Act of March 14, 1940 (Public, Numbered 433, Seventy-sixth Congress). Be it enacted by the Senate and House of Representatives of the UnitedStates of America in Congress assembled, That the subsistence allowance provided for aviation cadets in the Act of April 15, 1935 (49 Stat. 157; U. S. C., title 34, Supp. V ., sec. 843), may be paid to messes in the same manner as prescribed in the Act of March 14, 1940 (Public, Numbered 433, Seventy-sixth Congress). Approved, January 20, 1942. [CHAPTER 91 AN ACT To amend the Act approved June 23, 1938, entitled "An Act to regulate the distribution, promotion, and retirenient of officers of the line of the Navy, and for other purposes." Be it eracted by the Senate and House of Representatives of the United States of America in Congress assembled, That section 15 of the Act entitled "An Act to regulate the distribution, promotion, and retirement of officers of the line of the Navy, and for other purposes", approved June 23, 1938 (52 Stat. 953), is hereby amended by inserting at the end thereof the following new subsection: "(h) Selection boards to recommend brigadier generals of the line for promotion to major general shall be composed of officers of the permanent grade of major general on the active list of the Marine Corps to the extent that such officers are deemed available for this duty by the Secretary of the Navy, and the remainder of the board shall be composed of rear admirals on the active list of the line of the Navy, not restricted by law to the performance of shore duty only." Approved, January 20, 1942. 9 January 20, 1942 [S. 2160] [Public Law 403] Daylight saving time. 40 Stat. 45(i 15U. S.C. 261-264. Termination of Act. January 20, 1942 [S. 1677] [Public Law 404] Naval Reserve and Marine Corps Re- serve. Aviation cadets. 34 U.S. C. § 843. Post, p. 739. 54 Stat. 50. 34 U.S. C. § 908. January 20. 1942 [S9 1919] - [ublic l,aw 405] Marine Corps. 34U.S. C. I662b. Selection boards for recommending pro- motion.
� | WIKI |
Talk:Old Catholic Church of Austria
Stub?
For any who might have this on their watchlist: this article is sorely in need of updating. I'll do what I can, but someone with a knowledge of German would be helpful here. Quinto Simmaco (talk) 07:22, 4 March 2015 (UTC) | WIKI |
Rover (log canoe)
Rover is a Chesapeake Bay log canoe, built in 1886 by the Thompson brothers in Chester, Maryland. She measures 28'-1$3/4$" with a 6'-4$1/4$" beam. She has a longhead bow, braced back to the hull, and a sharp stern. She is privately owned and races under No. 11 in Eastern Shore competition. She is one of the last 22 surviving traditional Chesapeake Bay racing log canoes that carry on a tradition of racing on the Eastern Shore of Maryland that has existed since the 1840s. She is located at St. Michaels, Talbot County, Maryland.
She was listed on the National Register of Historic Places in 1985.
From: Tradition, Speed and Grace: Chesapeake Bay Sailing Log Canoes by John C. North II. Chesapeake Bay Maritime Museum, 2018.
"According to Bobbie Marshall of St. Michaels, she and her late husband, Marion C. “Junior” Marshall, purchased Rover in 1961 from Charles Grimes of Stevensville, Maryland. Grimes stated that the canoe was constructed about 1886 by the Thompson Brothers of Chester, Maryland, who also built Silver Heel. Rover was constructed as a workboat, and a motor was installed in her in 1902.
She was in terrible condition when acquired and was extensively rebuilt by Marshall and raced by him for the first time on Labor Day 1972. She was the only canoe in the fleet to be painted yellow.
Rover was poorly equipped for spars and sails and never won a race. She was known to capsize with some frequency and was called “rollover Rover.”
Her chief claim to fame was that she went to Washington, D.C., in 1976 to participate in the American Folklife Festival on the steps of the American Museum of Natural History. She was there for a week with crew members on hand to explain the wonders of a Chesapeake log canoe to the inquiring public." | WIKI |
post
Bodybuilder diet
Bodybuilder diet divide into three parts: Stage set of muscle mass , stage of strength training and “drying” . Three stages of the diet determine the training stages, since the athlete needs to work out all the muscle qualities. And also work the level of subcutaneous fat, because the aesthetic component influences not only on the size of the muscles, but also on how much the muscles are embossed. The stages of training should not be confused, since a set of calories is needed for muscle mass gain and strength increase, and a deficit balance of caloric content for reducing the level of subcutaneous fat. The fact is that hypertrophy of muscle fibers is an anabolic process of synthesis of organic tissues.
Despite the fact that during the recruitment of muscle mass and the study of strength indicators, anabolism occurs, however, the bodybuilder diet in these two stages is different. If, during the recruitment of muscle mass, the athlete trains the energy supply through glycolysis, developing muscle volumes, then during the training of strength indicators the athlete trains the body’s ability to provide energy to the muscles by the breakdown of creatine-phosphate. As a consequence, during mass recruitment, myofibrils are damaged more severely, and synthesis of organic tissues is more intensive, so the athlete needs more protein. During the training of muscle strength, there is a need for more energy, so the priority in nutrition is given to carbohydrates.
During the ” drying ” the athlete deliberately creates a calorie deficit, so the body accumulates a lack of energy from the subcutaneous fat. In general, there is no other way to lose weight! But the bodybuilding diet is for that and the diet is for bodybuilders, that the athlete is still trying to keep muscle volumes. First of all, it is possible to achieve the preservation of the massiveness of the musculature by training. In general, training at this stage should be aimed at preserving muscles, rather than increasing energy costs, because if an athlete trains in an aerobic style without taking pharmacology, the body will “eat” muscles faster than getting rid of excess weight. The output is strength training, which will force the body to maintain muscle volumes in order to cope with the load, Which you constantly take over.
Bodybuilder diet
Basic exercises allow you to use large working weights, as well as spend a lot of energy, while stimulating the release of testosterone. Testosterone, in turn, will help burn fat and prevent the burning of muscles. In other words, a diet to reduce the level of subcutaneous fat is a protein diet! This same stage of training allows unhindered use of sports nutrition. During other stages, the irregular application of sports nutrition knocks down the athlete’s reference points, which prevents the progression of the load, but during the “drying” the load does not need to progress, so in this case the sportspit is very effective.
Bodybuilder diet menu
The bodybuilder diet plan is the same for athletes of any level of fitness and physique, but the specific figures that determine the amount of a particular product are individual. Thus, during the recruitment of muscle mass, the athlete should consume 2-3 grams of protein per kilogram of body weight, while working out strength indicators of 1-2 grams of protein, and during the “drying” – 3-4 grams for each kilogram of its own weight.
Fiber should always be consumed a lot, because it is full of vitamins, and also helps to better digest meat and other products. Difficulties arise with carbohydrates, since it is important to use not some amount, but in relation to their energy costs and goals.
To gain control over the caloric intake, it is necessary to eat an equal number of foods or food items every day. The first method is easier, therefore, this article will be review him, the second method allows you to change products inside the bodybuilder diet menu, but requires the bodybuilder to use the table of food composition, food weights, as well as keeping a diary in which the athlete will record everything that he Ate a day. Thus, within a week you eat the same food or quantity of food, or the number of food items every day, then, by observing your result, you correct the bodybuilder diet menu within 10%.
Parts of a bodybuilder diet
During mass gain, the bodybuilder diet should be such that the athlete can progress from exercise to training, but at the same time the level of subcutaneous fat does not grow at all, or does not grow at all if possible. All time during the study of strength indicators, it is necessary to create a surplus of calorie balance and to monitor the growth of the fat layer is meaningless, because it will still grow, because, if carbohydrates are not enough, then there will be no increase in strength. In time during the reduction in the level of fat, you need to eat the recommended amount of protein, a lot of fiber, give up fatty, almost completely from carbohydrates, but not completely, so as not to drive yourself into a hungry pit. In the “drying” you do not need to lose weight faster than 2 kilograms per week.
Menu during the set of mass
15 minutes before breakfast – 300ml of boiled water at room temperature
Breakfast – rice, buckwheat porridge in milk, or oatmeal with dried fruits.
Second breakfast – pork chops with macaroni of solid varieties and tomato juice.
Lunch – red lean borsch and boiled veal or chicken with buckwheat porridge and Vegetables
Snack – boiled pollock or steamed with rice and sea cabbage
Dinner – cottage cheese with honey, walnuts and yogurt
Sports nutrition: protein isolate, whey protein, casein protein, complex amino acids, L-carnitin, creatine, glutamine, BCAA, complex vitamins and fish oil.
Menu during the study of strength indicators
15 minutes before breakfast – a glass of water without gases at room temperature
Breakfast – any porridge on milk and shortbread cookies
Second breakfast – pork with baked potatoes and vegetables
Lunch – any lean borsch and boiled meat with macaroni of firm grades and tomato juice
Snack – sea fish with Rice and coarse cabbage
Dinner – cottage cheese with yogurt and honey with walnuts
Sports nutrition: protein mixtures, including fast proteins and casein, preferably creatine and L-carnitin, amino acids, best glutamine and BCAA, do not interfere with complex vitamins.
Menu during the “drying”
15 minutes before breakfast – 300ml of mineral water without gases at room temperature
Breakfast – boiled chicken breast with vegetable salad in olive oil with walnuts added.
Second breakfast – boiled chicken breast with tomato juice.
Lunch – boiled chicken breast and kefir with green apples.
Afternoon snack – boiled Chicken breast and skimmed curd cheese
Dinner – skimmed cheese with yogurt and green apples
Sports nutrition: casein protein, BCAA, complex vitamins and L-carnitin | ESSENTIALAI-STEM |
Wadala Sandhuan
Wadala Sandhuan (Punjabi, Urdu: ) (Sandhuan also spelled Sandhwan or Sundhwan) is a town situated on the Gujranwala-Pasrur road in the Punjab province of Pakistan. Wadala Sandhuan is located at 32.11° North, 74.24° East. it is 232 meters (761 ft) above sea level and is nearly 18 km away from Gujranwala. This town belongs to Tehsil Daska and District Sialkot. The town is on the Gujranwala-Pasrur road, which allows logistical connections to the cities such as Pasrur and Gujranwala. It is in between Gujranwala and Pasrur. The town is home to grain markets which provides jobs for thousands of people. There are over 30 rice mills located in the area from which Shahid Butt Brothers Rice mill is one of the major market contributor. A Wheat Flour Mill owned the same Butt Family (Hudaibiya Flour & General Mills) is making it one of the major wheat grain contributor to markets in the Punjab region. There are vast green fields and gardens around the town. It shares the borders with some small towns and villages such as Kotli Kheran, Gopipur, Rampur, Chakri, Jhang, Dherowali, Ramke etc. Punjabi and Mewati are the local language, but Urdu is also common, particularly in schools and offices. Lahore Sialkot Motorway M11 is passing through. It shall intersect 18 km Gujranwal Pasrur Road and an interchange will be near Hudaibeya Flour Mills which will link to Pasrur, Satrah, Mianwali Bangla, Siranwali, Wadala Sandhuan, Dahrmkot Chock, Talwandi Musa Khan Gujranwala and surroundings. This Mega project will enhance and improve the Business, Educational, and Social activities in Wadala Sandhuan and Surroundings.
Transportation
Gujranwala-Pasrur road passes through the town and links it to many of the villages and town. By road, the town is less than one hours away from Gujranwala and Daska one hour drive from Sialkot. It is situated on the Gujranwala-Pasrur road which passes through the centre of the town. The nearest railway station is about 19 km away (Gujranwala railway station) this Railway Station was built by the British before the Independence of Pakistan and was one of the largest railway stations of the Asia. Sialkot International Airport is approximately 35 km away from Wadala Sandhuan. Lahore Sialkot Motorway M11 is passing through. It shall intersect 18 km Gujranwal Pasrur Road and an interchange will be near Hudaibeya Flour Mills which will link to Pasrur, Satrah, Mianwali Bangla, Siranwali, Wadala Sandhuan, Dahrmkot Chock, Talwandi Musa Khan Gujranwala and surroundings. This Mega project will not only reduce the distances in between cities but enhance and improve the Business, Educational, and Social activities in Wadala Sandhuan and Surroundings. Lahore Shall be just a half hour and Sialkot 15 mints from Wadala Sandhuan.
Climate
Wadala Sandhuan is located at 32.11° North, 74.24° East. it is 232 meters (761 ft) above sea level. It shares the borders with some small towns and villages such as Kotli Kheran, Gopipur, Rampur, Chakri, Jhang, Dherowali, Ramke etc.
The climate of Wadala Sandhuan changes quite drastically through the year. It is cold during winters and hot and humid during summers. May and June are the hottest months. It's quite humid during rainy season of July and August. The summer periods last from June through to September where the temperature reaches 36-42 degrees Celsius. The coldest months are usually November to February. The temperature can drop to seven degrees Celsius on average. The highest precipitation months are usually July and August when the Monsoon season hits the Punjab province. Most of the rain falls during the Monsoon season in summer which sometimes results in flooding. During the other months the average rainfall is roughly 25 mm. The driest months are usually November through to April, when little rainfall is seen. | WIKI |
Date of Award:
7-2011
Document Type:
Dissertation
Degree Name:
Doctor of Philosophy (PhD)
Department name when degree awarded
Biochemistry
Advisor/Chair:
Scott A. Ensign, Ph.D.
Abstract
The metabolism of propylene in Xanthobacter autotrophicus occurs via epoxypropane formation and subsequent metabolism by a three-step, four-enzyme pathway, utilizing the atypical cofactor Coenzyme M (CoM) to form acetoacetate. The last step in the epoxide carboxylase pathway is catalyzed by a distinctive member of the disulfide oxidoreductase (DSOR) family of enzymes, NADPH:2-ketopropyl CoM oxidoreductase/carboxylase (2-KPCC). 2-KPCC catalyzes the unorthodox cleavage of a thioether bond and successive carboxylation of the substrate. The focus of the research presented in this dissertation aims to elucidate the details of 2-KPCC that allow it to perform chemistry unconventional for typical DSOR members. Sitedirected mutagenesis was used to mutate specific active site residues and to examine the catalytic properties of 2-KPCC upon these changes. Mutation of His137, the proximal histidine that directly coordinates the water molecule, eliminated essentially all redox-dependent activity of the enzyme while mutation of His84, the distal histidine that coordinates the water molecule through His137, diminished redoxdependent enzymatic activity to approximately 25% that of the wild type enzyme, confirming the respective roles of the histidine residues in stabilizing the enolate intermediate formed upon catalysis. Neither mutation of either histidine residue, nor mutation of either redox active cysteine residue had any negative effect on the rate of the redox-independent reaction catalyzed by 2-KPCC, the decarboxylation of acetoacetate. Mutation of Met140 resulted in an enzyme with drastically altered kinetic parameters and suggests Met140 plays a role in shielding the substrate from undesired electrostatic interactions with the surroundings.
The inhibitory properties of the structural CoM analogs, 2- bromoethanesulfonate (BES) and 3-bromopropanesulfonate (BPS), were examined and exploited to provide further detail on the active site microenvironment of 2- KPCC. Modification by BES results in a charge transfer complex between the thiolate of Cys87 and the oxidized flavin. The spectral features of this charge transfer complex have allowed the determination of the pKa of the Cys87 to be significantly higher than the flavin thiol in other DSOR enzymes. BPS has been shown to be a competitive inhibitor of 2-KPCC with an inhibition constant over two orders of magnitude lower than for that of BES.
Comments
This work made publicly available electronically on September 1, 2011.
| ESSENTIALAI-STEM |
Pelophila borealis
Pelophila borealis is a species of ground beetle in Nebriinae subfamily which was described by Gustaf von Paykull in 1790. The species can be found in Belarus, Canada, Estonia, Finland, Latvia, Norway, Russia, and Sweden. It is black in colour and is shiny. The size of the species is 9.5 - 10.1 mm long. | WIKI |
Wikipedia:Articles for deletion/Taggle
Dictionary definition and neologism. I realize the article is brand-new, but I don't see any possibility that it could become encyclopedic. Transwiki to Wiktionary and delete. To the author: please don't take it personally, we do want you to contribute, but this simply isn't a subject appropriate for an encyclopedia. —Triskaideka 19:15, 2 Sep 2004 (UTC)
* Delete: Not really wiktionary, because it's Internet slang. Again, we aren't trying to bite the new user, but the article is a dictdef of an out of the way Internet slang term. Geogre 19:45, 2 Sep 2004 (UTC)
* Delete slang. Davodd 16:51, Sep 4, 2004 (UTC)
* Delete with regrets. Cute slang, nice layout, neat definition, interesting etymology (French phrase condensing into English-sounding word). Merging it into some internet culture article would be a good idea, but Internet Relay Chat, which sounds like the obvious location, surprisingly (to me) has no kind of appropriate section for such matters, neither in the English nor the French Wikipedia. But I would urge the originator and others to try to think of some such place for the material. Bishonen 00:49, 5 Sep 2004 (UTC)
* Delete slangdef. -- Cyrius|✎ 03:45, 5 Sep 2004 (UTC)
* Delete. Dictdef. — Gwalla | Talk 05:56, 6 Sep 2004 (UTC) | WIKI |
Save Memory and Processing with Sparse Memory Feature in GNS3
While preparing for Cisco certification, there might be times when students want to use identical devices to practice. As far as physical routers are concerned, every router has its own separate memory and therefore in that kind of scenario everything goes smooth. However when the same topology is configured in GNS3, the entire workload of all the routers is transferred to the shared hardware resources of physical computer. This remarkably reduces the performance of the computer, even if Idle PC value is calculated and configured. GNS3 provides a great feature named Sparse Memory which, when enabled, saves only a single instance of an IOS image in the memory even when multiple identical devices are used in the topology. In other words if Sparse Memory feature is not enabled and a user places two 3640 virtual routers, two copies of the IOS images will be used and will consume extra processing and memory. On the contrary if the above feature is enabled, only one copy of IOS image will be used for all the instances of virtual devices. If you want to enable Sparse Memory feature in GNS3 you need to follow the steps given below:
1. Logon to the Windows computer with the account that has administrative privileges.
2. Double click on the icon of GNS3 to open its console window and from Edit menu go to Preferences option.
3. On the opened box from the left pane select Dynamips and from the right pane check Enable sparse memory feature checkbox to enable above mentioned feature.
Enabling Sparse Memory Feature
4. Once done, click on Ok button to make the changes persistent. | ESSENTIALAI-STEM |
Greek Ferries Will Halt Sept. 26 as Seamen Join General Strike
Greek ferry services from the
country’s main port of Piraeus will stop on Sept. 26, when the
seamen’s union takes part in a 24-hour general strike. The Pan-Hellenic Seamen’s Federation said in an e-mailed
statement today that the strike is aimed at restoring labor and
social security rights affected by government austerity measures
and at achieving a collective bargaining agreement. To contact the reporter on this story:
Tom Stoukas in Athens at
astoukas@bloomberg.net To contact the editor responsible for this story:
Andrew Rummer at
arummer@bloomberg.net | NEWS-MULTISOURCE |
User:Tktk1
Tktk1 is Tadas Klimas, associate professor of law and attorney, admitted to practice in the Republic of Lithuania, formerly admitted to practice in NY, IL, and OH. | WIKI |
Page:Lazarus, a tale of the world's great miracle.djvu/197
Rh "Thou art, then, verily a Sadducee, like Annas thy father-in-law, and thy wife his daughter. Verily women have great power in this our day."
And his thoughts went back to his own wife, Claudia, who had stated her belief in Jesus and who dreamed so strangely.
"Yet I would ask thee further, noble Caiaphas, for of all our speech no certain thing hath come; neither whether this be the Christ, nor whom we shall release at the Feast of Passover. Answer me; if, as ye Sadducees believe, there be no resurrection, what profiteth a man to do good or evil? And why, then, fast ye? Surely 't is loss of time to be sad, if there be no ensuing good. If 't is true, let us waste no time; let us make merry, Caiaphas, let us eat and drink, for to-morrow we die."
Pilate laughed at his own words, in which there was a scornful ring. Then, lowering his voice, went on: "In truth, Caiaphas, hath it not a little truth, this saying of the Nazarene that hath upset thee so—That ye shut up the kingdom of Heaven against men, and ye neither go in yourselves nor suffer them that are entering to go in?"
"I am no Pharisee," said the High Priest angrily.
"How then art thou a ruler of Israel?" asked Pontius Pilate laughing; "for they were mostly chosen of the Pharisees; but methinks the world is upside down, for Judæa hath strange intruders that yet do rule her. We have the Idumæan Antipas and Philo and other Alexandrian Jews, and even Greeks; yet the Greeks and their influence are hated of the Jews. Thou art here to preach salvation to the | WIKI |
Page:All Over Oregon and Washington.djvu/352
346 which was, according to that report, one bushel higher than the yield of any other State. Minnesota came next, with a yield of nineteen bushels. The fact is, that good tillage in the Wallamet Valley will obtain an average yield of thirty bushels to the acre, one year with another. The records of our agricultural societies show that premiums have often been given on wheat fields yielding forty, fifty, and even sixty, bushels per acre; and that from sixty-three to sixty-seven pounds per bushel is not uncommon. In Marion County the average in an entire neighborhood, one year, embracing a dozen or fifteen farms, was ascertained to be as high as thirty-four and a fourth bushels per acre. The wheat of the Wallamet Valley is of a superior quality. It contains more gluten than wheat raised anywhere on the Pacific Coast; and on that account, the flour made from it commands in San Francisco, where its quality has become known, a higher price than any other, among bakers and large hotel-keepers, for it is more profitable; it makes a greater weight of bread to a given quantity of flour.
"Oats is the principal crop raised for feed in the Wallamet Valley. It is always a sure crop, yielding from fifty to one hundred bushels per acre. It weighs usually from thirty-six to forty-three pounds per bushel, and commands from ten to fifteen cents per hundred pounds more in the San Francisco market than California oats. Corn and barley are cultivated in the Wallamet Valley to some extent, and good crops of both have been raised, yet they are not well adapted to the climate. In some particularly warm localities corn is raised every year for fattening hogs. The bulk of the pork, however, is fattened on wheat. It is a cheaper feed, and, with experience in curing, has been found to make equally good meat. Rye and buckwheat are good crops; the former yielding from twenty to thirty bushels per acre, and the latter from forty to fifty bushels. These crops do best on the hilly lands of the valley. They are always sure. The rye and buckwheat flour of the Wallamet Valley is superior to that of any other part of the Pacific Coast.
"Timothy, clover, blue-grass, and several other varieties of grass, are cultivated throughout the valley for hay and feed. Timothy is the principal dependence for a hay crop. On the rich bottoms and swales it yields from two to four tons per acre, and is always a sure crop. The native grasses of the valley furnish excellent pasturage, summer and winter, for stock of all kinds. | WIKI |
Forums
WP on Yahoo Geocities w/ Mac OS X--Installation Help (3 posts)
1. literatureinreview
Member
Posted 7 years ago #
OK. So I'm trying like everyone else to install correctly. On my site literatureinreview.com I have two directories /blog and /admin. I've followed the directions for database creation. My database (seen from inside phpAdmin) is called "wordpress". I can't seem to run the "install.php" script as indicated in Step 5 of the detailed installation instructions. Any thoughts?
2. davidjg
Member
Posted 7 years ago #
Have you configured your wp-config.php file? It's initially called wp-config-sample.php. You need to fill in your database details.
Secondly, if you have done this, what error message are you getting when you try to run install.php? If it's saying "File not found", then are you using the correct path (i.e http://www.yoursite.com/blog/wp-admin/install.php)?
3. literatureinreview
Member
Posted 7 years ago #
Hi Davidjg,
Yes, I've followed the instructions for the wp-config.php file. Actually I solved the problem. For some reason Yahoo requires renaming 'localhost' to 'mysql'. After that everything is fine.
Thanks for the tip...
Charles
Topic Closed
This topic has been closed to new replies.
About this Topic | ESSENTIALAI-STEM |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.