Document
stringlengths
87
1.67M
Source
stringclasses
5 values
Tabriz University of Medical Sciences Advanced Pharmaceutical Bulletin 2228-5881 10 2 2020 02 18 Cupric Oxide Nanoparticles Induce Cellular Toxicity in Liver and Intestine Cell Lines 213 220 10.34172/apb.2020.025 EN Mahmoud Abudayyak https://orcid.org/0000-0003-2286-4777 Elif Guzel https://orcid.org/0000-0001-9072-3322 Gül Özhan https://orcid.org/0000-0002-6926-5723 Journal Article 10.34172/apb.2020.025 2019 07 04 2019 10 09 Purpose: The wide application of cupric oxide nanoparticles (copper (II) oxide, CuO-NPs) in various fields has increased exposure to the kind of active nanomaterials, which can cause negative effects on human and environment health. Although CuO-NPs were reported to be harmful to human, there is still a lack information related to their toxic potentials. In the present study, the toxic potentials of CuO-NPs were evaluated in the liver (HepG2 hepatocarcinoma) and intestine (Caco-2 colorectal adenocarcinoma) cells. Methods: After the characterization of particles, cellular uptake and morphological changes were determined. The potential of cytotoxic, genotoxic, oxidative and apoptotic damage was investigated with several in vitro assays. Results: The average size of the nanoparticles was 34.9 nm, about 2%-5% of the exposure dose was detected in the cells and mainly accumulated in different organelles, causing oxidative stress, cell damages, and death. The IC50 values were 10.90 and 10.04 µg/mL by MTT assay, and 12.19 and 12.06 µg/mL by neutral red uptake (NRU) assay, in HepG2 and Caco-2 cells respectively. Apoptosis assumes to the main cell death pathway; the apoptosis percentages were 52.9% in HepG2 and 45.5% in Caco-2 cells. Comet assay result shows that the highest exposure concentration (20 µg/mL) causes tail intensities about 9.6 and 41.8%, in HepG2 and Caco-2 cells, respectively. Conclusion: CuO-NPs were found to cause significant cytotoxicity, genotoxicity, and oxidative and apoptotic effects in both cell lines. Indeed, CuO-NPs could be dangerous to human health even if their toxic mechanisms should be elucidated with further studies. Copper oxide Nanoparticle DNA damage Cytotoxicity Oxidative stress Apoptosis
ESSENTIALAI-STEM
Torna Éices Torna, nicknamed Éices or Éces ("the poet, sage"), was a legendary Irish poet of the 5th century, noted as "the last great bard of Pagan Ireland." He is not to be confused with Torna Éigeas, the 17th-century bard who figures in the Contention of the Bards. He was the foster-father of the Irish kings Corc and Niall of the Nine Hostages, and to him is attributed the Lament for Corc and Niall of the Nine Hostages. In the tale Suidigud Tellaig na Cruachna ("The Settling of the Manor of Crúachan"), he is the author of a poem on famous men and women who were buried in the cemetery of Crúachan (Rathcroghan).
WIKI
Page:Federal Reporter, 1st Series, Volume 1.djvu/93 PAP.S0N8 V. CASWBLIi. 85 �goods, most or ail of which were new goods. It îs true that each of these notes represented in aggregate other liabilities previously existing, and for some or ail of which Caswell had a certain character of security; but the giving of these new notes at such a critical time, and when the suits in question were commeneed or pending, and for the payment of which the bankrupt, as I read the testimony, then gave to Caswell greater and better security than he before had, evidences an intention on the part of Caswell to acquire such security, and on the part of the bankrupt to give such a preference, as the law under the circumstances forbids; and this goes not only to the validity of these transfers themselves, but, as I have said, colors ail the transactions under investigation, so far as motive, intent and acts are concerned. It is true that upon the liabilities which made up the note of $535.69 Caswell had a certain character of security in the shape of a chattel mortgage, and a lease which contained a clause transferring to Caswell the personal property upon the leased premises, but it is very doubtful whether this security was valid, and it is evident that it was not relied upon as possesing the value which the emergency required. It is noticeable, also, that one of the notes which went into and formed part of the note for $535.69, namely, a note for $156.93, was not then due, and I am elearly of the opinion that tl^ese two transactions did not constitute an exchange of securities which may be pro- tected within the rule laid down by the supreme court, and certainly, transpiring as they did, just on the eve of the bankrupt's failure, they tend strongly to show a deliberate purpose on the part of the bankrupt to prefer his crediter by giving to him the best security at his command. It was urged, upon the argument by the learned counsel for defend- ants, that the notes upon which the judgments in question were rendered were judgment notes; that the judgments were not obtained as speedily as they might have been, and that this is a circumstance tending to show that there was no such co-operation between the parties as will now be held to inval- idate these liens; but ail of the notes sued on were not judg- ment notes, and some were executed as if in preparation for ��� �
WIKI
User:MANOZ RAM MANOZ is an indian actor,director,film producer,farmer,writer,comedian. Manoz was born in paigaon(mathura),uttar Pradesh,India. he is a good entertainer. Manoz blong from Brij. he is making a Brij bhasha film.
WIKI
Page:The church manual (Church of the Brethren 1916).djvu/36 Rh 3. If these efforts both fail to secure a reconciliation, it shall be the duty of the offended to lay the matter before the church, and submit to her action in the case. 4. If any member of the church shall be publicly guilty of any crime or gross impropriety, it shall be the duty of the member, knowing the transgression, to inform the elder, who shall see or write to the offender, and inform him that the matter will be laid before the church, that he may appear in his own defense. 5. When common report charges a crime against a member, it shall be the duty of the one hearing it to report it to the elder, who shall have the member visited or informed of the report, and if there is reason to believe that it is true, to have the most judicious steps taken to ascertain its correctness, and then lay the report and its evidence before the church for action in the case. 6. When circumstances are impracticable to have a member who is reported to have been guilty of crime visited, it shall be the duty of the elder, hearing of such crime, to take the most judicious measures to ascertain the truth in regard to the report, and lay the matter before the church.
WIKI
10 My environment has user requests passing through a number of systems: [Client] --> [ELB] ---> [nginx] --> [web] (ELB = AWS Elastic Load Balancer) Thanks to this answer, I have nginx determining and passing the correct client IP address to the upstream servers (web) with the X-Forwarded-For and X-Real_IP headers. The relevant nginx config: real_ip_header X-Forwarded-For; set_real_ip_from 10.0.0.0/8; real_ip_recursive on; proxy_set_header X-Real-IP $remote_addr; My problem is this, the Real IP module in nginx replaces the existing $remote_addr variable with the result of its X-Forwarded-For calculations. This gives me the originating client IP, but I'm losing the IP address of the system that actually sent the request to the proxy (i.e. the ELB). Overall, having the client IP is more important to me, but I would like to be able to log the full chain of requests so I can understand (and debug) how traffic is flowing. Currently, I can only have nginx log the client IP, its own IP, and the upstream server IP. I would like to be able to log the ELB IP as well. I see X-Istence asked the same question in 2013, with little luck. Has anything changed or improved since then? 9 You can get the original client address of the connecting ELB in the variable $realip_remote_addr, but be aware that this variable was only added in nginx 1.9.7, so you'll need to be running a very recent version of nginx. 1 • Thanks @Michael Hampton♦! I was coming back to answer my own question because after pursuing an alternate strategy, I finally stumbled upon $realip_remote_addr. It works beautifully. Was actually trying to get proxy_protocol to work and came upon the nginx patch notes for 1.9.7 – michaelg Dec 19 '15 at 6:51 Your Answer By clicking “Post Your Answer”, you agree to our terms of service, privacy policy and cookie policy Not the answer you're looking for? Browse other questions tagged or ask your own question.
ESSENTIALAI-STEM
12th International Platinum Symposium Country: Russian Federation City: Ekaterinburg Abstr. due: 10.03.2014 Dates: 11.08.14 — 14.08.14 Area Of Sciences: Geology and mineralogy; Address: Pochtovy 7, Yekaterinburg, 620075, Russia. Organizing comittee e-mail: OrganizingCommittee@igg.uran.ru Organizers: The Zavaritsky Institute of Geology and Geochemistry Uralian Division of Russian Academy of Sciences Conference fees and accomodation: Regular registration 350 Euro   The following topics are suggested for the scientific program of the 12th International Platinum Symposium: Session 1. Magma dynamics, cumulates and ore genesis. Conveners: Rais Latypov (Rais.Latypov@wits.ac.za) and Steve Barnes (Steve.Barnes@csiro.au) Keynote speaker: Christian Tegner Session focus. Magmatic ore deposits produced by mafic-ultramafic magmatism (e.g. massive sulphide bodies, chromitite and Fe-Ti oxide layers, platinum group element-rich horizons) are igneous cumulate rocks that are generated by processes of magma differentiation, crystallization and solidification in crustal chambers. Therefore a key to understanding the origin of these deposits and consequently to developing a better strategy for their exploration is the deep knowledge of physico-chemical processes that govern magma evolution in crustal chambers and conduits. This session will emphasize the physical and fluid dynamic aspects of igneous petrology that bear on three major ore-related questions: where are ore deposits located? how did they get there? and how were they produced? The following fundamental aspects of magmatic processes will be addressed by this session: the relative importance of in situ crystallization versus crystal settling in evolving magma chambers and the origin of layering; the role of thermal and compositional convection in magma differentiation; the effects of compaction and post-cumulus melt migration within the cumulate pile on compositional profiles of magmatic bodies; the interactions between resident melt in the chamber and inflowing magma during chamber replenishment events; and the fluid dynamics and emplacement mechanisms of magmas, crystal slurries and emulsions. This session welcomes field, textural, mineralogical, geochemical, isotopic, experimental and numerical examination of igneous intrusions that provide us with new ideas on how magma chambers and conduits work to produce magmatic ore deposits. Session 2. PGE mineralization in mafic-ultramafic intrusions of Russia: geology and petrogenesis. Conveners: Alexey Ariskin (ariskin@rambler.ru) and Wolfgang Maier (MaierW@cardiff.ac.uk) Keynote speaker: Sarah-Jane Barnes and Andrey Izokh The session will focus on PGE mineralized mafic to ultramafic intrusive complexes of Russia. We invite presentations that provide information on their geology, petrology, mineralogy, and geochemistry and that help to constrain the petrogenesis of the intrusions and their different styles of PGE mineralization. Contributions dealing with sulfide and chromite transport in the parental magmas, and percolation of sulfides and volatiles through the cumulate pile are particularly welcome, as are talks and posters that have implications for exploration targeting, using a variety of techniques and vectors. Session 3. PGE-Cu-Ni sulphide-bearing ultramafic-mafic intrusions of the Noril'sk Province: insights into ore genesis and exploration. Conveners: Kreshimir Malitch (dunite@yandex.ru) and Chusi Li (cli@indiana.edu) Keynote speakers: Nicholas Arndt and Nadezhda Krivolutskaya Despite the long-term study of the ‘Noril’sk-type’ intrusions (e.g., Noril`sk-1, Talnakh and Kharaelakh), they remain a subject of ongoing debate related to their origin. A broad range of different or contradictory ideas for the formation of ore-bearing ultramafic-mafic intrusions in the Noril’sk region has been proposed. These include (a) differentiation of a single magma, (b) emplacement of multiple magmas with distinct compositions, (c) volcanic feeder systems, (d) a crust-mantle interaction model, (e) assimilation and (f) metasomatic models. A common assumption in these models is that the intrusions are coeval with the 250 Ma Siberian flood basalts, which erupted over a period of ~1 Ma or less, despite the fact that the age range of the intrusions is considerably larger. We invite contributions that use mineralogy, petrology, geochemistry, geochronology and structural controls to improve our understanding on the origin of ultramafic-mafic intrusions with different degrees of PGE-Cu-Ni sulphide mineralisation (i.e., economic, subeconomic and non-economic) in the Polar Siberia. New isotope-geochemical data that can be used for the exploration of PGE-Cu-Ni sulphide deposits are particularly welcome. Session 4. Models and exploration methods for magmatic Ni-Cu-PGE sulphide and PGE-oxide deposits from around the World. Conveners: Sarah-Jane Barnes sjbarnes@uqac.ca), Marina Yudovskaya (maiya@igem.ru) and Judith Kinnaird (judith.kinnaird@wits.ac.za) Keynote speakers: Edward Ripley and Alexandr Sobolev The session is intended to cover how magmatic platinum-group element (PGE) deposits form and how to use this information to explore for them. The concentrations of PGE in ore are generally only at the g/tonne level and thus the fact that the rocks are enriched in PGE is not evident in hand specimen. Furthermore most PGE are not readily soluble and thus there is no halo around ore bodies. Therefore exploration for PGE deposits depends heavily on a combination of lithogeochemical sampling and searching for minerals such as Ni-Cu sulphides and oxides (in particular chromite) that are present in many PGE deposits. Consequently how Ni-Cu sulphide and oxide deposits form and why some contain platinum-group elements and some do not is also of interest in studying how PGE deposits. Papers describing models for the formation of and exploration techniques for the deposits are welcome. Session 5. Ophiolites and Ural-Alaskan-type intrusions: traditional and innovative looks on the PGM formation. Conveners: Evgeny Pushkarev (pushkarev.1958@mail.ru) and Edward Ripley (ripley@indiana.edu) Keynote speaker: Giorgio Garuti The session will focus on the PGE enrichment and platinum-group minerals formation in chromitites and ultramafites of ophiolite complexes and Ural-Alaskan-type intrusions. Potential topics include: 1) Chromite and PGM formation in ophiolite and Ural-Alaskan intrusions – why do the huge chromite deposits in ophiolites contain relatively low concentrations of PGEs relative to the Pt-rich chromitites from Ural-Alaskan intrusions. 2) Geological, mineralogical, geochemical and experimental studies on the association between chromite and PGMs. 3) The role of high- and low-temperature fluids in the formation and distribution of PGEs in chromitites and ultramafic rocks. 4) The genesis of unusual sulfide-rich PGE mineralization in Ural-Alaskan intrusions. 5) PGMs are from source to placer - only accumulation or transformation? The unique PGMs placers of the World. Session 6. PGE and Au through experiments (the session will be sponsored by SGA). Conveners: Alexander Borisov (aborisov@igem.ru) and Anna Vymazalova (anna.vymazalova@geology.cz) Keynote speakers: Chris Ballhaus and Boris Tagirov The session will focus on experimental studies of PGE and Au solubility in sulphides and silicate melts, PGE and Au partitioning between phases as well as PGE minerals stability and composition at T-P range from magmatic to hydrothermal conditions. Also contributions focused of phase equilibria in PGE-Au systems, and thermodynamic properties of PGE minerals and phases are welcomed. Session 7. New advances in the understanding of PGE mineralogy from magmatic to supergene environments (the session will be sponsored by SGA). Conveners: Tanya Evstigneeva (evst@igem.ru) and Federica Zaccarini (federica.zaccarini@unileoben.ac.at) Keynote speaker: Thomas Oberthuer The platinum group elements (PGE) form specific phases, the so called platinum group minerals (PGM) or they occur in solid solution, as trace and ultra-trace elements, mainly in sulfide and oxides. With few exceptions, the PGM form minute inclusions, generally less than 50 microns in size. Thus, their identification and characterization is a difficult target. It is also not easy to determine the amount of PGE occurring in solid solution because of their low concentration. Recently, the development of advanced methodology and scientific methods allow us to better characterize the PGM as well as to detect the PGE at very low concentration at the scale of ppm or ppb using in-situ techniques. Contributions that describe the latest in analytical methods and applications to PGE mineralogical study, including LA-ICPMS, PIXE, XRD, EPMA, SEM are welcome. Abstracts discussing other techniques are also strongly encouraged. Session 8. Open Session. Conveners: Elena Anikina (Elena.Anikina@igg.uran.ru) and Frank Melcher (frank.melcher@unileoben.ac.at) Keynote speakers: Thierry Auge and Kreshimir N. Malitch This session intends to highlight various aspects of PGE research in geological environments that are not covered by topics of the other sessions. The session also welcomes contributions with focus on PGE and PGM related to osmium isotopes, analytical methods, mineral processing, including quality and process control, hydrometallurgical processing, refining and product developments. Information source:http://www.minsoc.ru/confs.php?id=22&cid=1373 Conference Web-Site: http://conf.uran.ru/default.aspx?cid=12ips
ESSENTIALAI-STEM
Investing in This ETF Right Now Could Make You a Millionaire Retiree Many investors will need to become millionaires in retirement if they hope to maintain their current lifestyles, but that can be a very difficult task. It requires a lifetime of diligent saving along with investment growth. To achieve that growth, some investors resort to trying to time short-term market fluctuations, or they try to hitch their success to a small group of companies that they expect to deliver tremendous gains. Going for extra upside, they end up reducing their investment diversity and increase their risk of losing big. But there is an alternative. A number of exchange-traded funds (ETFs) have been developed to provide some tremendous upside potential while still offering some risk reduction that is achieved through diversification. Choosing the right ETF today and purchasing shares regularly can help your retirement portfolio outpace the market and turn you into a millionaire. Let's look at how and why to do this and an ETF that might help you achieve this goal. Image source: Getty Images. Do you really even need $1 million? Yes, probably. Eclipsing $1 million in retirement savings might be more important than you realize. Mean family income in the U.S. currently sits at around $117,000 in the U.S., though retirees generally don't need quite that much cash flow to replicate the lifestyle available on an average income. A retiree generally can count on lower expenses related to child support, reduced housing costs, lower income tax bills, funds no longer being saved, and the availability of Social Security supplemental income. Taking all of that into account, including the average individual Social Security annual benefit of $18,170, the average household would still require an annual income of roughly $50,000 to remain comfortable and meet healthcare spending needs. Retirement investment accounts are designed to create that income through the interest and dividends earned. However, there's only so much you can safely withdraw without reducing your fund. Experts recommend withdrawing only 3%-4% of savings each year in retirement to avoid running out of cash. Under those guidelines, to produce $50,000 in annual income, your portfolio would have to be a minimum of $1.25 million. For funds coming out of 401(k) or traditional IRA accounts, the amount saved would need to be even higher to account for the income taxes that you'll need to pay. If you are young, you can expect all these figures to be even greater when you reach retirement age due to inflation. How to accumulate $1 million in retirement savings Becoming a millionaire in retirement depends, in part, on your savings rate and investment growth rate. Assuming an 8% rate of return on investments, it would take 20 years for a family saving 20% of their $117,000 average household income to reach $1 million in savings. Saving 20% of your income is a great goal, but most families these days are unable (or unwilling) to save nearly that much. The average personal savings rate in the U.S. has fallen to between 5%-10% these days. If this describes you, then you'll likely have to work on building retirement savings with the idea of saving for more than 20 years. You might also need to find opportunities to get savings growth rates higher than the oft-cited 8% average annual return. Finding consistently high-growth investments is easier said than done, especially without taking on lots of additional risks, which is something you'll want to avoid with a retirement account. Image source: Getty Images. Investors looking to boost growth rates might consider niche ETFs that track high-growth stock categories. Owing these targeted ETFs allows you to bet on the industry rather than individual companies and it gains you exposure to small companies that could eventually grow into industry leaders. To execute this strategy, consider funds that hold stocks benefiting from developing trends like 5G networks, the Internet of Things, cybersecurity, cloud computing, data management, analytics, robotics, telemedicine, and artificial intelligence. As one example, the ETFMG Prime Cyber Security ETF (NYSEMKT: HACK) is a popular and unique fund that meets the above criteria. This ETF currently holds 57 stocks from around the world engaged in the development of cybersecurity hardware, software, and related services. These companies are expected to benefit greatly over the next few decades from the growing trends of cloud computing and remote collaboration. The digital transformation these trends require will drive demand for cybersecurity companies. Rather than pursuing a market-cap weighting of the stocks in the fund (a regular feature in index funds), Prime Cyber Security fund establishes an equal weighting among constituent companies. This leads to much more exposure to small-cap and mid-cap stocks in the industry, which can increase the odds of outsized growth. No single holding makes up more than 3.8% of the total ETF portfolio, creating a balanced approach to cybersecurity investing. Investors should note that the Prime Cyber Security ETF carries a larger-than-average 0.6% expense ratio that will eat into returns every year. There's also a relatively high 0.14% average spread that increases the net cost of buying and selling. None of this is enough to make this ETF an investment to avoid, but it's worth noting. 10 stocks we like better than ETFMG Prime Cyber Security ETF When investing geniuses David and Tom Gardner have a stock tip, it can pay to listen. After all, the newsletter they have run for over a decade, Motley Fool Stock Advisor, has tripled the market.* David and Tom just revealed what they believe are the ten best stocks for investors to buy right now… and ETFMG Prime Cyber Security ETF wasn't one of them! That's right -- they think these 10 stocks are even better buys. See the 10 stocks *Stock Advisor returns as of November 20, 2020 Ryan Downie has no position in any of the stocks mentioned. The Motley Fool has no position in any of the stocks mentioned. The Motley Fool has a disclosure policy. The views and opinions expressed herein are the views and opinions of the author and do not necessarily reflect those of Nasdaq, Inc.
NEWS-MULTISOURCE
Home Technology How Low-Code is Propelling the Evolution of App Technology? How Low-Code is Propelling the Evolution of App Technology? 289 Low-Code If you have a good listener and attention towards the tech. You absolutely listed the terms programming and coding. This term of computer uses computer language to give instruction to machines. It allows us to develop programs like operating systems, systems, and application development. So, In this article, we talk about low code platform. If you want to read some latest information, Keep reading the entire article. Code is simply used to communicate with the machine which you have known as a computer. To perform specific tasks people use coding which is machine language. Further in our social life, we use websites, tech, and apps. These all are working by coding. Evolution of Low Code As every day millions of people use apps. These are developed by using machine language which you call coding. In the year 2014, the term “Low-Code” was introduced to classify the platforms of development. The basic purpose behind introducing this term is to make it easier in the field of development. This platform allows users to code all levels of application without outright information to know how to code. First time in the development the drag and drop options were introduced for the interface. The main benefit of a low code platform is that it reduces hand-coding. Here we are discussing the search history of Facebook. How to clear Facebook Search History using Smartphones and Desktops. Keep reading this article to know more about it. Below are the step-by-step instructions to clear your search history. Evolution of low-code in popularity among the whole globe. According to an estimate 65%+ development nowadays is done by the low-code. Different tools for IT are used by the developers to make it easier in this field. RAD (Rapid Application Development) is somewhat the latest concept to develop new software, application, or many more with the help of low-code.  This purpose specifies bolster operations in a digital era. Other hands, low-code helps companies to do their tasks with strategic benefits. The market use of low-code is growing at breakneck speed. This is like stream automation of software which helps developers to write code by drag and drop. Due to the higher speed of coding, you can sort out the solutions of problems quickly with fully functioning in a very short time. Time-Saving A low code platform offers you to save your time and step forward towards the new project. In any case, if you want to start a new big project and your experts are not available or free. So, don’t wait for it with the help of low-code. You can easily save time and do tasks quickly at a lower cost. Because by using this term development is too easy, and you can roll different changes according to your taste at a low cost and without wasting your time or waiting for experts. Budget Saving The evolution of low code is effective and by using this you can easily save your money and time. Budget saving is offered by the low code. With the help and use of low code, you can decree the graph of the budget towards the saving. This offers in-budget programs by using them developers save more as compared to the first method of development. These days this is the key to success. Moreover, you can complete your project at a low price. Sometimes, you may not need a long time as a programmer to finish your task. The price of a high-quality low-code platform is significantly lower than the monthly income of a software developer. However, you want to save your money and time. Conclusion: Creatio is involved in the list of top 10 Low-code app development platforms where a citizen developer establishes a lot of applications and programs faster than conventional hand-coding methods. Low-code application development has successfully led to many companies in all types of industries. You can try it for a free trial of 14 days and also use it for your big tasks for companies.
ESSENTIALAI-STEM
Wikipedia:Redirects for discussion/Log/2010 December 22 December 22 This is a list of redirects that have been proposed for deletion or other action on December 22, 2010 Missile range * The result of the discussion was at Redirects for discussion/Log/2011 January 8. — ξ xplicit 02:05, 8 January 2011 (UTC) * → Spaceport (links to redirect • [ history] • ) I propose to redlink this article instead of redirecting it. All missile ranges are NOT spaceports. In fact, a minority of all the missile ranges in the world are also spaceports. — Preceding unsigned comment added by Daedraug (talk • contribs) 23:48, 22 December 2010 'The above is preserved as the archive of an RfD nomination. Please do not modify it.' * Disambiguate with a 'See also' to 'Spaceport'. We have articles on named missile ranges. Something similar should be done with Rocket range. Bridgeplayer (talk) 02:44, 23 December 2010 (UTC) * rocket range used to be a (very poor) article, and missile range used to redirect there. Uncle G (talk) 14:27, 24 December 2010 (UTC) * Instead of redirecting badly to an article that has very little to do with the subject, both missile range and rocket range ought to be established as new articles. Is the "old" version of rocket range around somewhere? Daedraug (talk) 18:40, 4 January 2011 (UTC) * See here. Simply south (talk) and their tree 19:33, 4 January 2011 (UTC) Plantilla:Nihogo * The result of the discussion was Deleted. -- JLaTondre (talk) 15:23, 30 December 2010 (UTC) * → Template:Nihongo (links to redirect • [ history] • ) Unused, unnecessary cross namespace redirect. Plantilla = template in Spanish. Mhiji (talk) 23:43, 22 December 2010 (UTC) Delete: As unused. → ♠ Gƒoley ↔ Four ♣ ← 02:26, 23 December 2010 (UTC) 'The above is preserved as the archive of an RfD nomination. Please do not modify it.' * Delete this is English Wikipedia, not Spanish Wikipedia. <IP_ADDRESS> (talk) 05:08, 23 December 2010 (UTC) * Delete&mdash;unneeded cross-namespace redirect. While it is allowed to have redirects in non-English languages to the English-equivalent article, I don't believe this should be extended to cross-namespace redirects. –Grondemar 14:53, 23 December 2010 (UTC) * Delete Spanish is one thing, but Spanish with a typo? Sideways713 (talk) 08:03, 24 December 2010 (UTC) Every Character Under the Bloody Sun * The result of the discussion was Deleted. -- JLaTondre (talk) 15:23, 30 December 2010 (UTC) * → Help:Multilingual support (links to redirect • [ history] • ) Unused, unnecessary cross-namespace redirect. Mhiji (talk) 23:10, 22 December 2010 (UTC) Delete as unused. → ♠ Gƒoley ↔ Four ♣ ← 02:27, 23 December 2010 (UTC) * Delete&mdash;inappropriate, potentially-confusing cross-namespace redirect. –Grondemar 14:54, 23 December 2010 (UTC) * Speedy Rich Farmbrough, 16:11, 27 December 2010 (UTC). 'The above is preserved as the archive of an RfD nomination. Please do not modify it.' WP:12 * The result of the discussion was delete. Consensus here seemed to agree that the search term is too vague and U.S.-centric. — ξ xplicit 00:50, 8 January 2011 (UTC) * → WikiProject United States presidential elections (links to redirect • [ history] • ) Delete - target to the WikiProject makes no sense. Simply south (talk) and their tree 19:52, 22 December 2010 (UTC) * Delete. Probably intended to reference the next election (2012), but the term is just too ambiguous. bd2412 T 20:46, 22 December 2010 (UTC) * Delete I concur. --Kumioko (talk) 21:23, 22 December 2010 (UTC) * Keep no valid rationale given for deletion. This is an obvious reference to the 2012 election, and has been in use for over a year.--William S. Saturn (talk) 23:29, 22 December 2010 (UTC) * Hmmm, I wouldn't say it's obvious... Mhiji (talk) 23:44, 22 December 2010 (UTC) * It is for those who use it.--William S. Saturn (talk) 23:49, 22 December 2010 (UTC) * If that is the case, and i would agree it is not obvious, I still think it makes no sense. A lot of elections around the world happen every year as well as other events. We may as well have WP:12 redirect to the 2012 Olympics or WP:22 redirect to the football world cup in Qatar. I still stick with delete. Oh and now i will put up 08. Simply south (talk) and their tree 12:02, 23 December 2010 (UTC) See Redirects for discussion/Log/2010 December 23. Simply south (talk) and their tree 12:08, 23 December 2010 (UTC) * Rather than have discussion in two places (which makes no sense), why didn't you just add it to this discussion? Also, you have not linked to any other wikipedia projects that could or would like to use the redirect. It is currently in good use, therefore deletion would be disruptive. What are you trying to accomplish by deleting this redirect and preventing users from easily reaching the page?--William S. Saturn (talk) 18:16, 23 December 2010 (UTC) * I thought that umbrella noms couldn't be opened once the noms had already started. It is impossible to put this at other projects as this would still be ambiguous and if going by other sense there would be too many to list. I am not trying to be disruptive. Redirects are meant to be momerable and should be specific whereas this is a very broad redirect. Simply south (talk) and their tree 19:24, 26 December 2010 (UTC) * If another project that can put the redirect to better use wishes to do so, all they need to do is redirect the redirect. This happened with WP:2012. It doesn't make sense to delete a redirect because you don't understand its use. Those that use the redirect, do understand.--William S. Saturn (talk) 19:39, 26 December 2010 (UTC) * Comment WP:08 also redirects there, whatever is done with 12 should be done with it too. I tried WP:10 to see if it went to WP:WikiProject Politics of the United Kingdom but instead it goes to something completely different. The uses of 08 and 12 seem a little too U.S.-centric to me, but I suppose it does no harm until someone else wants those names. Wasted Time R (talk) 01:09, 23 December 2010 (UTC) * Remame: WP:US12 or something similar. It is a convenient shortcut to the project page, and adding "US" gives it specificity which should address the concerns about ambiguity.--JayJasper (talk) 15:15, 23 December 2010 (UTC) * Might as well keep, unless someone else wants the name for another purpose... Mhiji (talk) 18:12, 24 December 2010 (UTC) * Delete: It doesn't "obviously" (to quote someone above) mean anything, and I'm a voting American. If someone wants to create a WP:US2012 or something that actually makes sense, I have no objections to that. But just a number? Does anyone here really think no other country in the world is having elections that year? Or that the number 12 could have no other significance to people? — SMcCandlish Talk⇒ ʕ(Õلō)ˀ Contribs. 20:15, 25 December 2010 (UTC) * No one has claimed it for any other reason so I suppose the answer to your question is no.--William S. Saturn (talk) 18:15, 26 December 2010 (UTC) Delete - Nobody would type this, and according to page stats, nobody does type this; just because redirects are cheap is no reason to keep ridiculous redirects that make no sense. - Anomalocaris (talk) 04:40, 30 December 2010 (UTC) * That is not a valid reason to delete.--William S. Saturn (talk) 05:41, 30 December 2010 (UTC) * Then delete it because if anyone were crazy enough to enter WP:12 (which, again, hardly anybody does), there's no reason to believe they are interested in U.S. 2012 presidential elections, as opposed to something else in 2012 or 1912, or the 12th occurrence of some event, or who knows what. Delete Anomalocaris (talk) 01:03, 31 December 2010 (UTC) * There was also an election in 1912. However, if someone types it in and discovers the project, it would be beneficial to the project and to wikipedia. Again, no one is claiming this for anything else, it is just an easy way for participants to reach the page for collaboration.--William S. Saturn (talk) 01:11, 31 December 2010 (UTC) 'The above is preserved as the archive of an RfD nomination. Please do not modify it.' * Delete this, that, and the other are too ambiguous (Olympics, presidential elections, the list goes on). :| TelCo NaSp Ve :| 07:35, 7 January 2011 (UTC) Centrifugal force (disambiguation) * The result of the discussion was Disambiguation restored. There are still several applicable articles so I have restored the dab page. It should be noted that there was not a GFDL issue since content was not copied. Also, a redirect would be confusing as "NAME (disambiguation)" is our standard naming convention for dab pages and the proposed target is not a dab page. -- JLaTondre (talk) 15:32, 30 December 2010 (UTC) * → Centrifugal force (links to redirect • [ history] • ) No longer needed or used, per discussion at Talk:Centrifugal force. Dicklyon (talk) 18:33, 22 December 2010 (UTC) 'The above is preserved as the archive of an RfD nomination. Please do not modify it.' * Keep after the merge as it appears the redirect has extensive page history; we need to keep this history in order to stay compliant with our licenses. Redirects are cheap; there should be no harm in keeping this one. –Grondemar 15:01, 23 December 2010 (UTC) * Keep. None of the reasons to delete apply. Redirects are cheap. Mhiji (talk) 18:16, 24 December 2010 (UTC) Genesis creation myth * The result of the discussion was Kept. See WP:RNEUTRAL. -- JLaTondre (talk) 15:37, 30 December 2010 (UTC) * → Genesis creation narrative (links to redirect • [ history] • ) mistakenly nominated this redirect at WP:MFD, so I am renominating it here to get it into the correct venue. This is a procedural nomination; I take no position for or against the deletion of this redirect. The original deletion rationale from Silvrstridr was: unnecessary redirect with malicious intent of labeling Creation a "myth". RL0919 (talk) 16:57, 22 December 2010 (UTC) * Comment - Thanks for doing this... wikipedia makes things so difficult to change. So many unnecessary policies and trolls that edit this site! ~silvrstridr — Preceding unsigned comment added by Silvrstridr (talk • contribs) 17:02, 22 December 2010 (UTC) * Keep. The article was named Genesis creation myth for some time, and it is (referring to) a creation myth and a myth. — Arthur Rubin (talk) 17:12, 22 December 2010 (UTC) * Comment - The fact that Genesis Creation is considered a myth is a biased opinion. I did not bring this rfd up to argue that point though. I brought it up because it is unnecessary to have a redirect page created because someone was too lazy to create the redirect properly in the first place to Genesis creation narrative.--Silvrstridr (talk) 17:27, 22 December 2010 (UTC) * Speedy keep. Normal terminology in widespread use. Jan 1 naD (talk • contrib) 17:34, 22 December 2010 (UTC) * Speedy Keep Looking at edits such as those at Genesis creation narrative, this looks like an attempt at aWP:POINT nomination. Silvrstridr, I've changed your !vote above to say 'Comment', you can only !vote once. Dougweller (talk) 17:49, 22 December 2010 (UTC) 'The above is preserved as the archive of an RfD nomination. Please do not modify it.' * Keep, plausible redirect. The article itself discusses the use of the term "myth". NawlinWiki (talk) 17:50, 22 December 2010 (UTC) * Keep The target article is a far more neutral term, but the redirect is a commonly used term. Alansohn (talk) 18:30, 22 December 2010 (UTC) * Keep&mdash;useful redirect, no reason provided to delete. –Grondemar 15:03, 23 December 2010 (UTC) Dodge B110 * The result of the discussion was Deleted. -- JLaTondre (talk) 15:43, 30 December 2010 (UTC) * → Dodge (links to redirect • [ history] • ) I can't find any information on any Dodge called B110. There was a B-series van at one point but these were B-100, B-200, and B-300. --Sable232 (talk) 01:03, 12 December 2010 (UTC) * Comment - Well, this is a former article that was kept at Articles for deletion/Dodge B110. Certainly it seems it may have existed, looking here. Bridgeplayer (talk) 02:53, 12 December 2010 (UTC) * The only non-trivial mention appears to be in an old version of a Wikipedia article (Volkswagen Type 2) which has since been changed to the correct Dodge A100. The "keep" !votes in that AFD don't seem to have much basis in anything but a poor nomination and "if someone created the article, it must exist." As far as I can tell there never was such a vehicle. --Sable232 (talk) 05:10, 13 December 2010 (UTC) * Keep neither harmful nor recent - but change to Dodge B Series. Rich Farmbrough, 16:28, 19 December 2010 (UTC). Please add new comments below this notice. Thanks, עוד מישהו Od Mishehu 12:48, 22 December 2010 (UTC) * How is it not harmful? The original article was a hoax. Someone searching for Dodge B-100 in the search box is just going to be confused when "Dodge B110" comes up. --Sable232 (talk) 20:03, 20 December 2010 (UTC) * Relisted to generate a more thorough discussion so a clearer consensus may be reached. * Dodge B110 WILL NOT show in a search for Dodge b100. Rich Farmbrough, 16:08, 27 December 2010 (UTC). * Delete - The Vehicle doesn't seem to actually exist. Keep only if can be proven otherwise. The Google search result doesn't seem to give me anything to prove that it's real. Perhaps I missed something, but there's no reason to keep this if there's nothing with such a name. NotARealWord (talk) 17:49, 22 December 2010 (UTC) * On the contrary, it prevents (or at lest makes more unlikely) inadvertent re-creation. Rich Farmbrough, 16:08, 27 December 2010 (UTC). * Delete - There is no reason to maintain a hoax-based redirect. Dicklyon (talk) 19:56, 26 December 2010 (UTC) * On the contrary, it prevents (or at lest makes more unlikely) inadvertent re-creation. Rich Farmbrough, 16:08, 27 December 2010 (UTC). 'The above is preserved as the archive of an RfD nomination. Please do not modify it.' House of Representatives of Ceylon * The result of the discussion was withdrawn by nominator. Non-admin closure. –Grondemar 14:49, 22 December 2010 (UTC) * → Parliament of Sri Lanka (links to redirect • [ history] • ) House of Representatives of Ceylon is not the Parliament of Sri Lanka. They are two different Legislatures. Blackknight12 (talk) 05:07, 22 December 2010 (UTC) 'The above is preserved as the archive of an RfD nomination. Please do not modify it.' * Keep: Deletion is not required anymore, as a user is going to write an article on the topic, very soon.--Blackknight12 (talk) 12:34, 22 December 2010 (UTC) National State Assembly * The result of the discussion was withdrawn by nominator. Non-admin closure. –Grondemar 14:52, 22 December 2010 (UTC) * → Parliament of Sri Lanka (links to redirect • [ history] • ) National State Assembly is not the Parliament of Sri Lanka. National State Assembly existed from (1972 - 1978) Blackknight12 (talk) 05:05, 22 December 2010 (UTC) 'The above is preserved as the archive of an RfD nomination. Please do not modify it.' * Keep: Deletion is not required anymore, as a user is going to write an article on the topic, very soon.--Blackknight12 (talk) 12:34, 22 December 2010 (UTC)
WIKI
The INTERNATIONAL ASSOCIATION OF MACHINISTS AND AEROSPACE WORKERS, AFL-CIO, et al., Plaintiffs, Appellants, v. WINSHIP GREEN NURSING CENTER, et al., Defendants, Appellees. No. 96-1206. United States Court of Appeals, First Circuit. Heard July 30, 1996. Decided Dec. 30, 1996. Mark Schneider, with whom John M. West and Bredhoff & Kaiser, P.L.L.C., Washington, DC, were on brief, for appellants. Richard L. O’Meara, with whom Charles P. Piacentini, Jr. and Murray, Plumb & Murray, Portland, ME, were on brief, for appellees. Before SELYA, Circuit Judge, TORRES and SARIS, District Judges. Of the District of Rhode Island, sitting by designation. Of the District of Massachusetts, sitting by designation. SELYA, Circuit Judge. In this eccentric case, the International Association of Machinists and Aerospace Workers (IAM or Union) charged an employer, Winship Green Nursing Center (Win-ship), with violating the Lanham Act, 15 U.S.C. §§ 1051-1127 (1994), through its unauthorized use of a service mark on propaganda disseminated during a union organizing campaign. The district court granted Winship’s motion for brevis disposition, reasoning that the Union’s claim failed to satisfy the Lanham Act’s jurisdictional requirements because (1) the parties were not competing for the sale of commercial services, and (2) Winship’s admittedly unauthorized use of the mark was in connection with services offered by the markholder rather than services offered by the infringer. See International Ass’n of Machinists v. Winship Green Nursing Ctr., 914 F.Supp. 651, 655-56 (D.Me. 1996). The Union appeals. We affirm, albeit on a different ground. I. BACKGROUND We present the basic facts in the light most flattering to the party vanquished by summary judgment. All the relevant events occurred in 1994, and all dates refer to that year. A In May the Union mounted a campaign to organize the nonprofessional employees at Winship’s facility in Bath, Maine. Not surprisingly, management resisted this initiative and exhorted the affected employees to vote against IAM’s election as a collective bargaining representative. As part of its retort Winship hand-delivered two pieces of campaign literature to employees in the putative bargaining unit. These handouts form the basis for IAM’s lawsuit. 1. The First Flier. The flier then advises recipients that “IT’S NOT TOO LATE” and implores them to “GIVE [certain named managers] A CHANCE” by “VOT[ING] NO ON AUGUST 4.” The letters, addressed individually to particular employees and dated one year after the scheduled election, comprise the second and third pages of the flier. One letter purports to be written on the Union’s letterhead, complete with a reproduction of the IAM service mark (consisting of a set of machinist’s tools surrounded by a gear and the IAM name) and the facsimile signature of an IAM plenipotentiary, Dale Hartford. This missive suggests that the Union had notified Winship of its obligation, pursuant to an invented collective bargaining agreement, to terminate the recipient’s employment because of her failure to pay certain assessments (e.g., union dues and an initiation fee). The other epistle, signed by Winship’s director of operations, is also postdated. It acknowledges Winship’s receipt of the notice and professes to inform the addressee that the company must honor the Union’s request. 2. The Second Flier. The remaining piece of campaign literature, disseminated by Winship a few days before the election, urges the reader to vote against unionization and warns that union membership will bring significant financial burdens. This flier contains a simulated invoice inscribed on what purports to be IAM’s letterhead (and which bears the IAM service mark). Under a heading that reads “PAYABLE TO THE MACHINISTS UNION BY [employee’s name]”, the invoice lists amounts designated as union dues, an initiation fee, and fines. Commentary, undiluted by subtlety, accompanies this listing: “NO MATTER WHAT THE UNION HAS TOLD YOU — JUST ASK THE EMPLOYEES AT LOURDES HOSPITAL” AND “JUST ASK THE 13 EMPLOYEES AT GENERAL ELECTRIC IN SOUTH PORTLAND WHO WERE FINED FOR CROSSING THE PICKET LINE THERE.” Large, bold letters at the bottom of the invoice proclaim: ‘WITHOUT THE MACHINISTS UNION, DO NOT PAY THIS BILL.” Notwithstanding Winship’s tactics — or, perhaps, due to them — the employees chose IAM as their collective bargaining representative in the August 4 election. B The Union proved to be a sore winner. It soon filed suit against Winship alleging inter alia trademark infringement and unfair competition under the Lanham Act. The Union premised its federal claims on the theory that Winship’s unauthorized use of the registered service mark occurred “in connection with ... services,” namely, IAM’s representational services, and thereby transgressed sections 32(1) and 43(a) of the Lanham Act. See 15 U.S.C. §§ 1114(l)(a) & 1125(a) (quoted infra note 5). The district court rejected this theory for the reasons previously mentioned. See IAM, 914 F.Supp. at 655-56. This appeal followed. II. THE SUMMARY JUDGMENT STANDARD Though the case is unconventional the- generic legal standard that we must apply-is prosaic. Summary judgment is appropriate in trademark infringement cases, as elsewhere, “if the pleadings, depositions, answers to interrogatories, and admissions on file, together with the affidavits, if any, show that there is no genuine issue as to any material fact and that the moving party is entitled to a judgment as a matter of law.” Boston Athletic Ass’n v. Sullivan, 867 F.2d 22, 24 (1st Cir.1989) (quoting Fed.R.Civ.P. 56(e)). Generally speaking, a fact is “material” if it potentially affects the outcome of the suit, see Garside v. Osco Drug, Inc., 895 F.2d 46, 48 (1st Cir.1990), and a dispute over it is “genuine” if the parties’ positions on the issue are supported by conflicting evidence, see Anderson v. Liberty Lobby, Inc., 477 U.S. 242, 250, 106 S.Ct. 2505, 2511, 91 L.Ed.2d 202 (1986). While an inquiring court is constrained to examine the record in the light most favorable to the summary judgment opponent and to resolve all reasonable inferences in that party’s favor, see Hachikian v. FDIC, 96 F.3d 502, 504 (1st Cir.1996), defeating a properly documented motion for summary judgment requires more than the jingoistic brandishing of a cardboard sword. This is especially true in respect to claims or issues on which the nonmovant ■ bears the burden of proof; in such circumstances she “must reliably demonstrate that specific facts sufficient to create an authentic dispute exist.” Garside, 895 F.2d at 48; see also Anderson, 477 U.S. at 256, 106 S.Ct. at 2514. We review, de novo the district court’s grant of summary judgment. See Mack v. Great Atl. & Pac. Tea Co., 871 F.2d 179, 181 (1st Cir.1989). Moreover, an appellate tribunal-is not bound by the lower court’s rationale but may affirm the entry of judgment on any independent ground rooted in the record. See, e.g., Hachikian, 96 F.3d at 504; Garside, 895 F.2d at 49. III. ANALYSIS Our analysis proceeds in five parts. A Trademark infringement and unfair competition laws exist largely to protect the pub-lie from confusion anent the actual source of goods or services. See, e.g., Star Fin. Servs., Inc. v. AASTAR Mortgage Corp., 89 F.3d 5, 9 (1st Cir.1996); DeCosta v. Viacom Int’l, Inc., 981 F.2d 602, 605 (1st Cir.1992), cert. denied, 509 U.S. 923, 113 S.Ct. 3039, 125 L.Ed.2d 725 (1993); 3 J. Thomas McCarthy, McCarthy on Trademarks and Unfair Competition § 23.01 (3d ed. 1996). The Lanham Act is cast in this mold. Generally speaking, the Act proscribes the unauthorized use of a service mark when the particular usage causes- a likelihood of confusion with respect to the identity of the service provider. See WCVB-TV v. Boston Athletic Ass’n, 926 F.2d 42, 44 (1st Cir.1991); see also Societe Des Produits Nestle, S.A. v. Casa Helvetia, Inc., 982 F.2d 633, 641 (1st Cir.1992) (explaining in respect to trademarks that “only those appropriations ... likely to cause confusion are prohibited”). Consequently, likelihood of confusion often is the dispositive inquiry in a Lanham Act case. See, e.g., WCVB-TV, 926 F.2d at 44; Pignons S.A. de Mecanique de Precision v. Polaroid Corp., 657 F.2d 482, 492 (1st Cir.1981). So it is here. B To demonstrate likelihood of confusion a markholder (or one claiming by, through, or under her) must show more than the theoretical possibility of confusion. See American Steel Foundries v. Robertson, 269 U.S. 372, 382, 46 S.Ct. 160, 162-53, 70 L.Ed. 317 (1926) (requiring probable confusion); Star, 89 F.3d at 10 (requiring evidence of a substantial likelihood of confusion); accord 3 McCarthy, supra, § 23.01[3][a]. Just as one tree does not constitute a forest, an isolated instance of confusion does not prove probable confusion. To the contrary, the law has long demanded a showing that the allegedly infringing conduct carries with it a likelihood of confounding an appreciable number of reasonably prudent purchasers exercising ordinary care. See McLean v. Fleming, 96 U.S. 245, 251, 24 L.Ed. 828 (1877); Mushroom Makers, Inc. v. R.G. Barry Corp., 580 F.2d 44, 47 (2d Cir.1978), cert. denied, 439 U.S. 1116, 99 S.Ct. 1022, 59 L.Ed.2d 75 (1979); Coca-Cola Co. v. Snow Crest Beverages, Inc., 162 F.2d 280, 284 (1st Cir.), cert. denied, 332 U.S. 809, 68 S.Ct. 110, 92 L.Ed. 386 (1947). This means, of course, that confusion resulting from the consuming public’s carelessness, indifference, or ennui will not suffice. See, e.g., United States v. 88 Cases, More or Less, Containing Bireley’s Orange Beverage, 187 F.2d 967, 971 (3d Cir.) (inferring that “the legislature contemplated the reaction of the ordinary person who is neither savant nor dolt, [and] who ... exercises a normal measure of the layman’s common sense and judgment”), cert. denied, 342 U.S. 861, 72 S.Ct. 88, 96 L.Ed. 648 (1951); see also Indianapolis Colts, Inc. v. Metropolitan Baltimore Football Club Ltd., 34 F.3d 410, 414 (7th Cir.1994) (explaining that the Lanham Act does not “protect the most gullible fringe of the consuming public”). We typically consider eight factors in assessing likelihood of confusion: (1) the similarity of the marks; (2) the similarity of the goods (or, in a service mark case, the services); (3) the relationship between the parties’ channels of trade; (4) the juxtaposition of their advertising; (5) the classes'of prospective purchasers; (6) the evidence of actual confusion; (7) the defendant’s intent in adopting its allegedly infringing mark; and (8) the strength of the plaintiffs mark. See Star, 89 F.3d at 10; Sullivan, 867 F.2d at 29. While this compendium does not conform easily to the peculiar facts of this ease, it is not intended to be either all-encompassing or exclusive. See DeCosta v. CBS, Inc., 520 F.2d 499, 513-14 (1st Cir.1975), cert. denied, 423 U.S. 1073, 96 S.Ct. 856, 47 L.Ed.2d 83 (1976). The listed factors are meant to be used as guides. See Astra Pharmaceutical Prods., Inc. v. Beckman Instruments, Inc., 718 F.2d 1201, 1205 (1st Cir.1983). No one listed factor is determinative, and' any other factor that has a tendency to influence the impression conveyed to prospective purchasers by the allegedly infringing conduct may be weighed by the judge or jury in gauging the likelihood of confusion. We completely agree with the authors of the Restatement that “[n]o mechanistic formula or list can set forth in advance the variety of factors that may contribute to the particular marketing context of an actor’s use.” Restatement (Third) of Unfair Competition § 21 emt. a (1995). Two related points are worth making. First, because the listed factors must be evaluated in context, any meaningful inquiry into the likelihood of confusion necessarily must replicate the circumstances in which the ordinary consumer actually confronts (or probably will confront) the conflicting mark. See, e.g., Libman Co. v. Vining Indus., Inc., 69 F.3d 1360, 1362 (7th Cir.1995), cert. denied, — U.S.-, 116 S.Ct. 1878, 135 L.Ed.2d 173 (1996); Black Dog Tavern Co. v. Hall, 823 F.Supp. 48, 55 (D.Mass.1993). Second, Rule 56 places a special gloss upon the usual analytic approach. On summary judgment the reviewing court must decide whether the evidence as a whole, taken most hospitably to the markholder, generates a triable issue as to likelihood of confusion. See Sullivan, 867 F.2d at 29; Astra, 718 F.2d at 1205; see also 3 McCarthy, supra, § 23.11 (observing that, while legal precedent governs the analysis, the result of each case is controlled by the totality of its facts). Applying these principles, we conclude that the Union bears the burden here of adducing “significantly probative” evidence, Anderson, 477 U.S. at 249-50, 106 S.Ct. at 2510-11 (citation omitted), tending to show that an appreciable number of prospective voters (i.e., employees within the defined bargaining unit) were in fact likely to be confused or misled into believing that the service-marked campaign literature was produced, sent, or authorized by LAM. The Union has not reached this plateau. C As we set the scene for the main thrust of our analysis, we acknowledge that the campaign stump is an odd stage for playing out a Lanham Act drama. In the typical commercial setting, confusion as to the source of goods or services occurs when there is an unacceptably high risk that a buyer may purchase one product or service in the mistaken belief that she is buying a different product or service. See, e.g., Star, 89 F.3d at 9. But the instant case is well off the beaten track. It does not involve two entrepreneurs vying to sell competing products or services in the traditional sense. Rather, IAM was angling to represent the workers and, although Winship opposed that effort, it was neither offering nor seeking to provide a similar service. In the vernacular of the marketplace, IAM was “selling” its services to prospective union members and Winship was “selling” a negative — the lack of a need for any such services or service-provider. This twist has significant implications for a court’s assessment of the likelihood of confusion. If we assume, favorably to the Union, that confusion as to the source of the documents bearing the IAM service mark may at least indirectly deter prospective purchasers (voters within the bargaining unit) from' acquiring (voting for) IAM’s representational services, that deterrent will exist only if, and to the extent that, confusion causes purchasers to be misinformed about the nature or value of the services. We think it follows inexorably that, if the electorate can readily identify Winship as the source of the promotional materials, the deterrent vanishes. See, e.g., McIntyre v. Ohio Elections Comm’n, — U.S.-,-n. 11, 115 S.Ct. 1511, 1519 n. 11, 131 L.Ed.2d 426 (1995) (suggesting that once people know the source of a writing, they can evaluate its message, and, at that point, “it is for them to decide what is responsible, what is valuable, and what is truth”) (citation and internal quotation marks omitted). In that event, there is no misleading as to the genesis of the letters, and the voters can assess whether the Win-ship-authored handouts accurately describe the Union’s services, or, instead, are merely a manifestation of Winship’s no-holds-barred commitment to dissuade the voters from “purchasing” those services. Put another way, knowledge as to the source of the materials dispels incipient confusion. The Union attempts to confess and avoid. It contends that the recipients’ ability to ascertain the source of the documents does not necessarily negate confusion. This contention hinges on the theory that employees may have thought that the letters, even if delivered by the company, were actual IAM documents which Winship procured and then draped in anti-union invective. But that theory does not fit the facts: patently, this is neither an instance in which an employer distributes copies of a notice previously sent by a union to employees elsewhere and adds anti-union commentary, nor one in which an employer makes minor emendations to an .authentic union document. The letters and the invoice are composed around names and circumstances indigenous to this particular organizational effort. Among other things, the letters bear a date significant in its relation to the scheduled election; they address each Winship employee by name and home address; and they identify this employer. Source-identifiers specific to the Winship election are even more pervasive in the fictitious invoice. The Union’s fallback position seems to be that, even if it is nose-on-the-face plain that the letters and the invoice are not replicas of genuine IAM materials, the affected employees still may have believed that they somehow were based on genuine materials. We think this construct is both legally unsound and factually unsupported. In the first place, a recipient’s ability to recognize that the alleged infringer, at a minimum, must have substantially added to or altered a document alleviates any confusion as to its immediate source. Cf. Warner Bros., Inc. v. American Broadcasting Cos., 720 F.2d 231, 246 (2d Cir.1983) (suggesting that lack of substantial similarity leaves “little basis” for asserting likelihood of confusion in a Lanham Act claim). In the second place, even indulging the arguendo assumption that the contrived documents were based on a real scenario, the alterations are sufficiently extensive that an ordinary recipient, possessing a modicum of intelligence, could not help but recognize that Winship had tampered so substantially with the documents that they could no longer be perceived as emanating from the Union. In other words, the documents’ credibility would depend on the voters’ assessment of whether Winship was telling the truth. See McIntyre, — U.S. at - n. 11, 115 S.Ct. at 1519 n. 11 (discussing the value of knowing “the identity of the source” for the purpose of judging the truthfulness of ideas contained in a writing). We conclude, therefore, with regard to these documents, that as long as employees can ascertain either who authored or who substantially modified the literature, they will readily recognize the entire document (including the letters, in one case, and the invoice, in the second case) as propaganda, and they will be in a position to gauge its accuracy accordingly. This emphasis on source recognition takes into account the setting and the juxtaposition of the parties. Labor-management relations have not mellowed since Justice Clark observed three decades ago that representational campaigns “are ordinarily heated affairs ... frequently characterized by bitter and extreme charges, countercharges, unfounded rumors, vituperations, personal accusations, misrepresentations and distortions.” Linn v. United Plant Guard Workers of Am., Local 114, 383 U.S. 53, 58, 86 S.Ct. 657, 660-61, 15 L.Ed.2d 582 (1966). Because exaggeration, sometimes crossing the line into outright falsehood, is a staple in such campaigns, “consumers” (i.e., affected workers) are on notice that both sides likely will embellish with scant regard for the confining restraints imposed by the truth. See Baumritter Corp. v. NLRB, 386 F.2d 117 (1st Cir.1967) (explaining that inaccuracies are indigenous to campaign propaganda in the labor relations milieu). The acrimonious literature disseminated by both parties indicates that this campaign was no exception to the rule. D Having woven the contextual tapestry against which the Union’s claims must be viewed, we turn now to the octet of factors that typically inform the likelihood of confusion. While the strange configuration of this case renders certain of those factors irrelevant or, at least, difficult to apply — square pegs never fit snugly in round holes — we make the effort in the interest of completeness. Moreover, other relevant circumstances compensate to some degree for this lack of fit and we intersperse them throughout our discussion. We deem such circumstances to be of especially great importance here precisely because this case falls well outside the customary confines of the Lanham Act. 1. Similarity of Marks. The service mark used by Winship is not merely similar; it is identical — a photocopied reproduction. Still, similarity is determined on the basis of the designation’s total effect, see, e.g., Pignons, 657 F.2d at 487 (considering additional, source-identifying words printed on goods and substantial differences in packaging), and infringement “does not exist, though the marks be identical and the goods very similar, when the evidence indicates no [likelihood of confusion].” James Burrough Ltd. v. Sign of the Beefeater, Inc., 540 F.2d 266, 274 (7th Cir.1976). What is more, we have recognized that in certain circumstances otherwise similar marks are not likely to be confused if they are used in conjunction with clearly displayed names, logos or other source-identifying designations of the manufacturer. See Aktiebolaget Electrolux v. Armatron Int’l, Inc., 999 F.2d 1, 4 (1st Cir.1993); Pignons, 657 F.2d at 487. Here, the lengthy propagandists message that Winship printed in large type on the fictitious invoice and the conspicuous, easily identifiable fliers it sent to introduce the letters dilute the inference that might otherwise be drawn from the similarity between the marks. 2. Similarity of Services. Because the parties do not offer competing services, there is no similitude. Furthermore, even if the documents are evaluated in the abstract, we do not think that any reasonable person, viewing them in their entirety and in conjunction with the accompanying materials, would find them similar to IAM’s authentic campaign literature. On the one hand, any similarity to actual IAM materials is limited to the vitriolic tone, the presence of the LAM service mark, and the facsimile signature. On the other hand, unlike any genuine IAM communication, the letters are postdated by a full year and address the employees as if they already had opted in favor of union, representation. The next piece of propaganda (the invoice) contains anti-union messages that are longer and much more prominent than any other text. And, moreover, in stark contrast to handbills distributed by IAM which invariably urged employees to vote “yes” (i.e., for a union), the letters at issue were attached to rabidly anti-union fliers exhorting employees to vote “no” (i.e., against a union). In short, the bogus letters, when compared to the real McCoy, are distinctive in appearance and antithetical in content. Given such gross dissimilarities, it cannot reasonably be inferred that ordinarily prudent workers would be likely to confuse the source of the letters. See Senco Prods., Inc. v. International Union of Elec. Workers, 311 F.Supp. 590, 592 (S.D.Ohio 1970) (finding no likelihood of confusion as to sponsorship of handbills circulated by a union bearing employer trademark in bold print on the first line, followed by union identifiers of equal prominence). 3-5. Channels of Trade and Advertising; Classes of Prospective Purchasers. Following circuit precedent, see Equine Technologies, Inc. v. Equitechnology, Inc., 68 F.3d 542, 546 n. 5 (1st Cir.1995), we address the next three factors in the ensemble. The parties’ channels of trade are widely disparate (reduced to bare essence, IAM sells representational services whereas Winship sells nursing home beds), and there is no evidence that the channels advertising those services are similar. To be sure, as the election campaign picked up steam, both parties propagandized (and, in that sense, advertised) through the same medium (print), and both of them targeted exactly the same narrowly-defined cadre of individuals. The class of prospective purchasers is necessarily restricted to those individuals and is, therefore, identical. Still, that identically does not advance the Union’s cause in the special circumstances of this case. On this point, the requisite inquiry is not limited merely to determining whether the class of prospective purchasers is the same or different. Instead, a court called upon to assay likelihood of confusion must ponder the sophistication of the class, thereby taking account of the context in which the alleged infringer uses the mark. See, e.g., Astra, 718 F.2d at 1206-07; HQ Network Sys. v. Executive Headquarters, 755 F.Supp. 1110, 1118-19 (D.Mass.1991). Here, the organizational effort began in May. Among other things, the Union held open meetings and sent the affected workers periodic “organizing updates.” Thus, by late July — when Winship began to distribute the challenged documents — persons within thé class could not help but know of the ongoing campaign and of its excesses. We must presume that the class members are of normal intelligence, see McLean, 96 U.S. at 251; Church of the Larger Fellowship, Unitarian Universalist v. Conservation Law Found, of New Eng., Inc., 221 U.S.P.Q. 869, 873, 1983 WL 52338 (D.Mass.1983), and the previous months’ electioneering would have given them a certain degree of enforced sophistication. Common sense dictates that this group — above all others— would filter the rivals’ claims through the seine of this knowledge. Cf. Linn, 383 U.S. at 60-62, 86 S.Ct. at 662-63 (discussing the NLRB’s toleration of abusive and inaccurate statements made during organizational campaigns and agreeing that the ultimate appraisal of such statements must be left to the good sense of those voting in the elections). Accordingly, class members were especially unlikely to be misled by Winship’s unauthorized use of the IAM mark. 6. Actual Confusion. IAM proffers Dale Hartford’s affidavit as the mainstay of its case (indeed, its solitary piece of evidence) on the issue of actual confusion. The affidavit states briefly that “several” employees asked whether Hartford had in fact written the letter that bore his signature. It also reports that one employee questioned whether she would be required to pay $300 in dues and a $200 initiation fee. Hartford opines that “these figures seem to have had to have come from [the apocryphal union invoice].” This evidence, standing alone, is insufficient to prove actual confusion. The fundamental problem with the Hartford affidavit is that, even taking its contents as literally true, it does not undermine what is perfectly obvious from a reading of the record: no person of ordinary prudence and normal intelligence, aware of what was happening around her, would have been confused as to the source or sponsorship of the letters. For one thing, the inquiries to which Hartford alludes reveal at most that employees doubted whether he would have written a letter unfavorable to the very cause he had labored to promote. On their face, these inquiries do not evince actual confusion as to the source of the jury-rigged documents. See Restatement (Third) of Unfair Competition § 23 cmt. c (1995) (“Evidence of inquiries by customers as to whether the plaintiff and the defendant are associated ... may not establish the existence of actual confusion if the nature of the inquiries indicates that consumers perceive a difference between the designations and are skeptical of the existence of a connection between the users.”). For another thing, skepticism is particularly rampant — and wise — as to claims made in the course of any organizing drive. In the course of this organizing drive — a struggle which incited more than its share of hyperbole on both sides — class members had ample reason to be skeptical. They must have known that Winship distributed the fliers (which embodied the letters), and they therefore knew that the letters had to be viewed in light of Winship’s motivation. In all events, forewarned is forearmed, see Miguel de Cervantes, Don Quixote de la Mancha (circa 1615), and, here, the Union disseminated literature in the early going predicting that management would stoop to dubious tactics. The question about dues is an even thinner reed. A lone inquiry does not indicate probable confusion of an appreciable number of purchasers. See Mushroom Makers, 580 F.2d at 47. Regardless, this lone inquiry— which questioned the veracity of the prediction concerning union dues — does not indicate confusion as to the source of the fictitious invoice. See Pignons, 657 F.2d at 490 (finding consumer’s letter expressing surprise at perceived affiliation between competing companies “clearly insufficient” to prove actual confusion). The Union strives to persuade us that, no matter how paltry the evidence of actual confusion, it is nonetheless adequate to survive testing on summary judgment where we must accept all reasonable inferences favorable to the nonmovant. We are not convinced. The core purpose of the summary judgment procedure is to “pierce the boilerplate of the pleadings” and evaluate the proof to determine whether a trial will serve any useful purpose. Wynne v. Tufts Univ. Sch. of Med., 976 F.2d 791, 794 (1st Cir.1992), cert. denied, 507 U.S. 1030, 113 S.Ct. 1845, 123 L.Ed.2d 470 (1993). Consequently, summary judgment cannot be sidestepped by pointing to evidence that is merely colorable or suggestive, see, e.g., Mack, 871 F.2d at 181, or evidence that lacks substance, see, e.g., Mesnick v. General Elec. Co., 950 F.2d 816, 822 (1st Cir.1991), cert. denied, 504 U.S. 985, 112 S.Ct. 2965, 119 L.Ed.2d 586 (1992), or evidence that is inherently incredible, see, e.g., United States v. Joost, 92 F.3d 7, 14 (1st Cir.1996). In this instance, the Union submitted no affidavits from any individuals who personally received the campaign literature, and we think that it is inherently implausible to infer from the inquiries described by Hartford that prospective voters actually were confused as to the source of the materials. The summary judgment paradigm requires us to draw and respect only reasonable inferences; we need not infer that which is farfetched or fantastic. See Sheinkopf v. Stone, 927 F.2d 1259, 1262 (1st Cir.1991); Medina-Munoz v. R.J. Reynolds Tobacco Co., 896 F.2d 5, 8 (1st Cir.1990); Raskiewicz v. Town of New Boston, 754 F.2d 38, 45 (1st Cir.), cert. denied, 474 U.S. 845, 106 S.Ct. 135, 88 L.Ed.2d 111 (1985). Here, the face of the documents, the accompanying fliers, the environment in which they were distributed, and the lack of significantly probative evidence of actual confusion combine- to render -unreasonable the inference that IAM would have us draw. 7. Intent. IAM relies heavily on the principle that when an alleged infringer intentionally copies a trademark, it may be presumed that she intended to cause confusion and profit thereby. See Sullivan, 867 F.2d at 34. But the presumption is inapposite in situations where there is no persuasive evidence of any intent to use the mark to suggest official sponsorship. See WCVB-TV, 926 F.2d at 45-46 (attaching considerable importance to the alleged infringers’ contemporaneous offer to broadcast disclaimers, thus making clear that they were not official sponsors of the trademarked product). The template of this ease is similar to that of WCVB-TV. Winship incorporated the bogus documents in fliers prominently displaying anti-union commentary and containing pleas by named managers for votes against unionization. In addition, the fake invoice itself includes what amounts to a conspicuous disclaimer. Under the circumstances, no reasonable factfinder could conclude, notwithstanding Winship’s purposeful misappropriation of the IAM service mark, that the company intended to mislead employees about the source of the handouts. 8. Strength. Under the Lanham Act strong marks enjoy the greatest protection against infringement. See Aktiebolaget, 999 F.2d at 5; Pignons, 657 F.2d at 492. The IAM service mark is robust, having been duly registered and widely promoted for over thirty years. But the muscularity of a mark, in and of itself, does not reheve the mark-holder of the burden to prove a realistic likelihood of confusion. See Aktiebolaget, 999 F.2d at 5; Pignons, 657 F.2d at 492. Because the Union has utterly failed to produce evidence sufficient to meet that burden, see supra, the mark’s strength cannot carry the day. E After giving due weight to each factor and considering the unique circumstances that necessarily inform our analysis, we find no colorable basis for a likelihood of confusion, and, hence, no trialworthy Lanham Act claim. In reaching this conclusion we stress the significance of the factual setting. Here, the ambiance powerfully influenced the impression conveyed by Winship’s unauthorized use of the IAM service mark. The parties’ preparations for the election inflamed the historic enmity between labor and management and colored the communications distributed by both protagonists. The climate inevitably conditioned voters to view with suspicion any claims made by either party about the other. This suspicion peaked shortly before the election, and that is when the offending documents surfaced. Moreover, the documents, when received, were affixed to clearly identifiable management propaganda. These additional, relevant circumstances counsel persuasively against any realistic possibility of confusion as to the source or sponsorship of the mismarked literature. IV. CONCLUSION Considering the record as a whole in the light most favorable to the summary judgment loser, we hold that there is no triable issue of fact as to likelihood of confusion. It is simply inconceivable that employees who received the challenged literature at the height of a fiercely disputed union organizing campaign would, upon even a cursory glance, be apt to believe that IAM either distributed or contributed in any meaningful way to these vociferously anti-union tracts. We add a postscript. The employer wins this appeal, but not our admiration. While we strongly disapprove of Winship’s misappropriation of IAM’s service mark, however, the Union has other available remedies to redress that infraction. See, e.g., Linn, 383 U.S. at 61, 86 S.Ct. at 662 (approving state-law remedy in analogous circumstances). For our part, we are unwilling to stretch the Lanham Act into unfamiliar contours simply for the sake of punishing conduct that we deplore. While we are not willing to venture quite as far into uncharted waters as our concurring colleague — after all, unlike the authorities on which she primarily relies, see post, this case involves neither a political campaign nor a parody — the policy concerns that undergird her views fortify our resolve to hold the line. By like token, the special circumstances that the district court described at length, see IAM, 914 F.Supp. at 653-56 — such as the noncommercial nature of the unauthorized use, the absence of any competition between the parties in the representational services market, and the fact that Winship did not appropriate the mark for use “in connection with” any services of its own— point in the same direction. We need go no further. Affirmed. SARIS, District Judge, concurring. I concur on the ground that Winship Green’s misuse of the union’s trademark in its campaign literature during the union election is not a commercial use of the mark adumbrated by Sections 32 or 43(a) of the Lanham Act, as amended, 15 U.S.C. §§ 1114(1), 1125 (1994). I The union alleges that Winship Green’s use of its trademark during the election violated Sections 32 and 43(a) of the Lanham Act. A Section 32 of the Lanham Act concerns “trademark infringement” and proscribes misuse of another’s registered trademark in commerce “in connection with the sale, offering for sale, distribution, or advertising of any goods or services on or in connection with which such use is likely to cause confusion, or to cause mistake, or to deceive.” 15 U.S.C. § 1114(1)(a) (1994). B Section 43(a) provides broader protection, prohibiting “unfair competition” by use of any mark, registered or not. See Two Pesos, Inc. v. Taco Cabana, Inc., 505 U.S. 763, 768, 112 S.Ct. 2753, 2757, 120 L.Ed.2d 615 (1992). Section 43(a) prohibits two types of activities: “false designations of origin,” 15 U.S.C. § 43(a)(1)(A) (“Prong (A)”) and “false descriptions,” 15 U.S.C. § 43(a)(1)(B) (“Prong (B)”). See Truck Components, Inc. v. K-H Corp., 776 F.Supp. 405, 409 (N.D.Ill.1991); 3 J. Thomas McCarthy, McCarthy on Trademarks and, Unfair Competition § 27.02[3] (3d ed. 1996) (discussing history of the “two prongs” of § 43(a)— § 43(a)(1)(A)) (“trademark infringement”) and § 43(a)(1)(B) (“false advertising”). Prong (A) prohibits false designations of the origin or sponsorship of goods or services. 15 U.S.C. § 1125(a)(1)(A) (1994). Typical claims under prong (A) would involve a new trademark that was confusingly similar to an already established one, or an attempt by a defendant to “palm-off’ its goods as those of a competitor by use of the competitor’s mark. See Truck Components, 776 F.Supp. at 409; McCarthy on Trademarks, supra, at § 27.02[4] (describing these claims as “trademark infringement”). In contrast, the protection under prong (B) is very different. Following its amendment in 1988, prong (B) creates liability for misrepresentations in commercial advertising or promotion as to the “nature, characteristics, qualities or geographic origin” of another person’s goods or services. 15 U.S.C. § 1125(a)(1) (1994); see also Trademark Law Revision Act, Pub.L. 100-667, § 132, 102 Stat. 3946 (1988); U.S. Healthcare, Inc. v. Blue Cross of Greater Philadelphia, 898 F.2d 914, 921 (3d Cir.1990) (discussing effect of 1988 amendment to Lanham Act); McCarthy on Trademarks, supra, at § 27.02[4]. The Senate Committee Report accompanying this amendment explained the need for this addition to the Act as follows: In one important area, however, the courts have refused to apply the section. Based on a 1969 seventh circuit decision, the courts have held that Section 43(a) applies only to misrepresentations about one’s own products and services; it does not extend to misrepresentations about competitor’s products or services. Bernard Food Indus. v. Dietene Co., 415 F.2d 1279, 163 USPQ [264] 265 (7th Cir.1969), cert. denied, 397 U.S. 912, 90 S.Ct. 911, 25 L.Ed.2d 92, 164 USPQ 481 (1970). The committee agrees that this effect is illogical on both practical and public policy levels and that the public policy of deterring acts of unfair competition will be served if Section 43(a) is amended to make clear that misrepresentations about another’s products are as actionable as misrepresentations about one’s own. S.Rep. No. 515, 100th Cong., 2d Sess. (1988), reprinted in 1988 U.S.C.C.A.N. 5577; see also McCarthy on Trademarks, supra, at § 27.02J4] (stating that 1988 amendment codified “two prongs” of § 43(a): “part one relating] to ... unregistered trademark, tradename and trade dress infringement claims, and part two relating] to ... false advertising (as well as trade libel) claims”). Thus, prong (B) prohibits misrepresentations about the quality of a defendant’s own goods — even where the misrepresentations do not tend to confuse its goods with those of a competitor or otherwise misstate the origin of the goods — as well as affirmative misrepresentations about another’s products. Truck Components, 776 F.Supp. at 409 (citing In re Uranium Antitrust Litigation, 473 F.Supp. 393, 408 (N.D.Ill.1979)); see also McCarthy on Trademarks, supra, at § 27.04 (describing elements of prima facie case under prong (B)). II I am in agreement with the majority that the origin and sponsorship of the allegedly infringing documents was never in doubt. With respect to section 43(a) of the Lanham Act, prong (A) is inapplicable because there is no evidence, or even contention, that the company used the union’s mark to deceive bargaining unit members as to the affiliation of the company with the union or as to the sponsorship of its services by the union. Quite the contrary. However, there is evidence that Winship Green used the union’s trademark to misrepresent the characteristics and nature of the union’s services (i.e., the amount of union dues or the purportedly draconian results of failure to pay them), thereby implicating prong (B), governing false descriptions. Cf. Energy Four, Inc. v. Dornier Medical Systems, Inc., 765 F.Supp. 724, 730 (N.D.Ga.1991) (describing cause of action for misrepresentation under Section 43(a)(1)(B) and collecting cases); Brandt Consol., Inc. v. Agrimar Corp., 801 F.Supp. 164, 174 (C.D.Ill.1992) (same); McCarthy on Trademarks, supra, at § 27.04 (same). Because this evidence that the company misrepresented the union’s services may be sufficient for the fact-finder to find confusion as to the “nature, characteristics, [or] qualities” qf the union’s services, I would not allow summary judgment for the company under prong (B) on the ground of a lack of confusion. Ill A firm ground for summary judgment, it seems to me, is that the Lanham Act creates no liability because the deception did not occur in connection with commercial sales or advertising, • as required under the Act, but rather in campaign hand-outs. The Lanham Act protects only against certain commercial uses of trademarks. Section 32 governs the use of a registered mark “in commerce ... in connection with the sale, offering for sale, distribution, or advertising of any goods or services.” 15 U.S.C. § 1114(l)(a) (1994). Section 43(a) is likewise limited to uses of marks “in commerce,” 15 U.S.C. § 1125(a)(1) (1994), which the Act defines as using or displaying a mark in the sale or advertising of goods or services, see 15 U.S.C. § 1127 (1994). And, section 43(a)(1)(B) limits misrepresentation claims to those eases involving “commercial advertising or promotion.” 15 U.S.C. § 1125(a)(1)(B) (1994). While there is no appellate ease directly on point, trial courts have rejected efforts to extend the Lanham Act to cases where the defendant is not using or displaying the trademark in the sale, distribution or advertising of its goods or services. See Lucas-film Ltd. v. High Frontier, 622 F.Supp. 931, 934 n. 2 (D.D.C.1985) (rejecting the claim that advertising companies could be held liable for using the trade name “Star Wars” in the political debate over a national policy because the trademark laws only reach activities in which a trademark is used in connection with selling or advertising services of commercial or noncommercial defendants); Stop the Olympic Prison v. United States Olympic Comm., 489 F.Supp. 1112, 1124 (S.D.N.Y.1980) (expressing serious doubts as to whether the Lanham Act applies to the deceptive use of the Olympic trademark by a group opposing the conversion of Olympic facilities into a prison, in part because “there is no suggestion that the alleged deception was in connection with any goods or services”); Reddy Communications, Inc. v. Environmental Action Found., 477 F.Supp. 936, 946 (D.D.C.1979) (rejecting claim that an environmental group’s caricature of an energy industry service mark violated the Lanham Act where the company failed to prove that the environmental group used the service mark to “identify or promote” the sale of its publications); see generally L.L. Bean, Inc. v. Drake Publishers, Inc. 811 F.2d 26, 32 (1st Cir.1987) (holding under a state anti-dilution state that a parody was not a commercial use of plaintiffs mark because the publisher “did not use Bean’s mark to identify or market goods or services to consumers”), cert. denied, 483 U.S. 1013, 107 S.Ct. 3254, 97 L.Ed.2d 753 (1987). Nonetheless, some forms of union-related activity may constitute commercial sale or advertising that is protected under the Act. See, e.g., Brack Van Houten Holding, Inc. v. Save Brach’s Coalition for Chicago, 856 F.Supp. 472, 475-476 (N.D.Ill.1994) (finding Lanham Act protection applicable where union used company logo in connection with the sale and distribution of its buttons and stickers and solicitation of donations to support the coalition’s opposition to a plant closing and was likely to cause confusion as to the company’s affiliation with, or approval of, defendant’s proposals); Marriott Corp. v. Great Am. Serv. Trades Council, AFL-CIO, 552 F.2d 176, 179 (7th Cir.1977) (rejecting the union’s contention that the National Labor Relations Board had exclusive jurisdiction over an action for trademark infringement arising under the Lanham Act where the union allegedly used the company’s trademark in advertisements which suggested an affiliation between the company and the union in advertising its services to prospective employees). However, such commercial activity is simply not present here. Accordingly, the union’s limited property right, under the Lanham Act against commercial misuse of its trademark is not implicated in this case. See generally Lucasfilm Ltd., 622 F.Supp. at 933 (“It is well established that the property right conferred by a trademark is very limited.”). While the union rightfully complains about the company’s unfair tactics, it must find its federal remedy for deceptive campaign literature under the National Labor Relations Act, 29 U.S.C. §§ 141 et seq. (1994). See Linn v. United Plant Guard Workers of Am., Local 114, 383 U.S. 53, 60, 86 S.Ct. 657, 662, 15 L.Ed.2d 582 (1966) (permitting libel action under state law for defamatory statements published during a union organization campaign and discussing authority of the National Labor Relations Board to set aside elections where “a material fact has been misrepresented in the representation campaign; opportunity for reply has been lacking; and the misrepresentation has had an impact on the free choice of the employees participating in the election”). Because the Court reaches the same conclusion for somewhat different reasons, I join in its judgment. . An IAM official, Dale Hartford, is also a plaintiff, and two affiliates of Winship (Hillhaven Corp. and First Healthcare Corp.) are codefendants. Since the presence of these additional parties does not affect the issues on appeal, we treat the litigation as if it involved only the Union (as plaintiff-appellant) and Winship (as defendantappellee). . Service marks and trademarks function to identify the source of services and goods, respectively. The difference between the two types of marks is not relevant here, and thus we will apply case law involving either form. See Star Fin. Servs., Inc. v. AASTAR Mortgage Corp., 89 F.3d 5, 8 n. 1 (1st Cir.1996); Volkswagenwerk Aktiengesettschaft v. Wheeler, 814 F.2d 812, 815 n. 1 (IstCir. 1987). . The stated amounts are not only apocryphal but also extravagant. During the organizing drive, IAM repeatedly declared that there would be no initiation fee and that no worker's monthly dues would exceed $20. .IAM's complaint also embodied a salmagundi of pendent statelaw claims. The district court dismissed these claims without prejudice coincident with the entry of summary judgment on the federal claims. See IAM, 914 F.Supp. at 656. We understand that the Union is pursuing these claims in a separate state cotut action. Finally, the complaint sought injunctive relief under the Norris-LaGuardia Act, 29 U.S.C. §§ 101-115 (1994), but the Union now concedes the infirmity of this request. . Section 32(1) of the Lanham Act governs infringement claims. It stipulates in pertinent part: Any person who shall, without the consent of the registrant— (a) use in commerce any reproduction, counterfeit, copy, or colorable imitation of a registered mark in connection with the sale, offering for sale, distribution, or advertising of any goods or services on or in connection with which such use is likely to cause confusion, or to cause mistake, or to deceive; ... shall be liable in a civil action by the registrant. ... 15 U.S.C. § 1114(1) (emphasis supplied). Section 43(a) governs unfair competition claims. It stipulates in pertinent part: Any person who, on or in connection with any goods or services, ... uses in commerce any word, term, name, symbol, or device ... or any false designation of origin ... which— (A) is likely to cause confusion, or to cause mistake, or to deceive as to ... the origin, sponsorship, or approval of [such person’s] goods, services, or commercial activities by another person ... shall be liable in a civil action by any person who believes that he or she is or is likely to be damaged by such an act. 15 U.S.C. § 1125(a) (emphasis supplied). . An analogous principle in copyright law is instructive. Absent direct evidence of copyright infringement, a plaintiff must prove "substantial similarity” between the copyrighted and contested materials. See, e.g., NEC Corp. v. Intel Corp., 10 U.S.P.Q.2d 1177, 1183, 1989 WL 67434 (N.D.Cal.1989). The applicable test is "whether the work is recognized by an observer as having been taken from the copyrighted source.” Id., at 1184. Even if a work is copied, however, no copyright infringement exists if substantial changes render the work unrecognizable. See v. Durang, 711 F.2d 141, 142 (9th Cir.1983) (affirming grant of summary judgment for the defendant); NEC Corp., 10 U.S.P.Q.2d at 1186-87; cf. A. Dean Johnson, Music Copyrights: The Need for an Appropriate Fair Use Analysis in Digital Sampling Infringement Suits, 21 Fla.St.U.L.Rev. 135, 158-59 (1993) (noting greater likelihood of fair use in copyright cases if alterations render an original music recording unrecognizable). . For example, one IAM flier of the “when did you stop beating your wife?” variety, asks: "WHAT LIES OR HALF TRUTHS DOPES WINSHIP] PLAN TO SPREAD DURING OUR DEBATE?" The IAM materials also describe anticipated "company tactics” or "tricks” in unflattering terms and warn employees to "LOOK OUT FOR CORPORATE TRAPS.” The Winship literature, discussed above, speaks for itself. . Although Hartford recalled that these statements were made in front of approximately ten other employees at a union meeting, he claimed that he could not locate the list of attendees and, consequently, could not name either the persons who made inquiry of him or those who overheard the queries. . In point of fact, the only such affidavit in the record — that of an employee named Gail Snipe— states unequivocally that she "recognized all of the materials ... to be my employer's campaign materials.” She adds: “The face of the documents as well as the context in which the documents were presented made it clear that the campaign materials were from the employer, not the IAM." . This rebuttable presumption works with maximum efficiency in the commercial setting. There, an infringer typically copies a trademark to palm off her own goods as those of a recognized manufacturer, thereby free riding on the markholder's reputation and goodwill. See generally McCarthy, supra, § 25.01. The presumption works less well in cases that do not involve competitors. . We take no view of the concurring opinion's suggested holding, the grounds on which the district court premised its ruling, or the other theories urged by Winship in support of the judgment below. While the Union's case may be vulnerable on several fronts, the absence of any meaningful confusion renders further comment supererogatory. . Section 32 of the Lanham Act, as amended, states in pertinent part: (1) Any person who shall, without the consent of the registrant— (a) use in commerce any reproduction, counterfeit, copy, or colorable imitation of a registered mark in connection with the sale, offering for sale, distribution, or advertising of any goods or services on or in connection with which such use is likely to cause confusion, or to cause mistake, or to deceive ... shall be liable in a civil action by the registrant for the remedies hereinafter provided.... 15 U.S.C. § 1114(1) (1994). . Section 43(a) of the Lanham Act, as amended, states in pertinent part: § 1125. False designations of origin and false descriptions forbidden (a) Civil action. (1) Any person who, on or in connection with any goods and services, or any container for goods, uses in commerce any word, term, name, symbol, or device, or any combination thereof, or any false designation of origin, false or misleading description of fact, or false or misleading representation of fact, which' — • (A) is likely to cause mistake, or to deceive as to the affiliation, connection, or association of such person with another person, or as to the origin, sponsorship, or approval of his or her goods, services, or commercial activities by another person, or (B) in commercial advertising or promotion, misrepresents the nature, characteristics, qualities, or geographic origin of his or another person's goods, services, or commercial activities. shall be liable in a civil action by any person who believes that he or she is or is likely to be damaged by such act. 15 U.S.C. § 1125(a) (1994) (emphasis in original). . In 1992 Congress redesignated paragraphs (1) and (2) of section 43(a) as subparagraphs (A) and (B). See Oct. 27, 1992, Pub.L. 102-542, § 3(c), 106 Stat. 3568. . 15 U.S.C. § 1127 states in pertinent part: The term "use in commerce" means the bona fide use of a mark in the ordinary course of trade, and not made merely to reserve a right in a mark. For purposes of this chapter, a mark shall be deemed to be in use in commerce— sk -k * * * * (2) on services when it is used or displayed in the sale or advertising of services and the services are rendered in commerce, or the services are rendered in more than one State or in the United States and a foreign country and the person rendering the services is engaged in commerce in connection with the services.
CASELAW
Physical Society of Iran The Physical Society of Iran (PSI) (انجمن فيزيک ايران) is Iran's professional and academic society of physicists. PSI is a non-profit organization aimed at establishing and strengthening scientific contacts between physicists and academic members of the country's institutes of higher education in the field of physics. The society has over 10,000 members inside and outside Iran. In addition to its awards scheme and publications programme, the Physical Society of Iran holds annual conferences in different fields, including optics and condensed matter physics. The society has proved instrumental in improving the state of education and research in physics throughout the country. The society organizes annual meetings. It has also had collaboration with the American Physical Society. In October 2003 APS and PSI jointly sponsored a school/workshop on string theory in Tehran. The society's main journal is the Iranian Journal of Physics Research, which is published via the Isfahan University of Technology Press, and is recognized by the Ministry of Science of Iran. History The Physical Society of Iran was established in 1963 by Iran's elite physicists and engineers. Among the founders was Yusef Sobouti, currently chancellor of IASBS. The first Annual Physics Conference of Iran was inaugurated in 1973 at Sepah Bank's arboretum, followed by Iran's second national conference on Physics the next year at Shahid Beheshti University. Activities of the society suffered a setback during the early years of the revolution. Presidents * Yousef Sobouti (1988–91 and 1996–99) * Reza Mansouri * Hessamaddin Arfaei * Ezatolah Arzi * Hadi Akbarzadeh * Shahin Rouhani * Mohammad Reza Ejtehadi (current) Awards The following are awarded annually by PSI to selected recipients during the Annual Physics Conference awards ceremony: General * The Mahmoud Hessabi Award (جايزه حسابی) * The PSI Award (جايزه انجمن فيزيک ايران) * The Educational Apparatus Award (جايزه ساخت دستگاه آموزشی) * Best Physics Sci-fi Essay Award (جايزه بهترين داستان علمی تخيلی فیزیک) * Best Physics Teacher Award (جايزه دوسالانه دبير فيزيک برگزيده) (bi-annual) * Best Conference Poster Award (جايزه پوستر برگزيده کنفرانس فيزيک) * Best Student Poster Award (جايزه پوستر برگزيده همايش دانشجويی فيزيک)
WIKI
How to take pedals off a bike Like the cleats of our shoes and so many other parts of cycling equipment, the pedals of our bike suffer wear with their use, and we must change them from time to time. In our article today, we will teach you How to take pedals off a bike easily, quickly, and without going to a workshop to do it. If the pedals on your old bike squeak and don’t work as they should, maybe it’s time to change the pedals on your bike. Tools for changing pedals To change the pedals of your bike, we will only need a wrench to loosen the nut corresponding to each of the pedals and some grease for the thread of the new ones. We could also use a fixed measurement wrench, but in that case, it should be the right size to fit the pedals that we will change. It will be enough with: • An old cloth or rag • Bicycle specific mounting grease • Depending on the pedal model, an 8mm Allen wrench or a pedal wrench • Bike pedal shift How to take pedals off a bike If, when installing your pedals, you followed all the advice given above, such as using mounting grease, doing regular maintenance and not over-tightening, removing the pedals from your bike will be sewing and singing. Put the bicycle chain on the large chainring to have more space and avoid hitting your hands. This often happens when the pedals are too tight, and a lot of force is required. First, put the right pedal in the most forward position possible, forming a line parallel to the ground. Use an Allen wrench or a pedal wrench and turn back counterclockwise (in this case counterclockwise). For the left pedal, perform the same maneuver but in reverse. Place the left pedal in the furthest area parallel to the ground and turn the key counterclockwise (in this case, clockwise). Some Tips to follow 1. It is not advisable to use an excessively flat wrench as a cone wrench because it is very fragile, and enough force must be applied to the pedals. 2. First of all, you should know that there is a left pedal and the right pedal. If you try to install the pedal on the opposite side, you can damage the thread. 3. The left usually comes striated on the axis and also often carry the letters r (right or right) and l (left or left) 4. If the pedal is too hard, you can insert a tube into the wrench for more leverage or hold the opposite crank firmly and step on the wrench for more force. 5. The problem comes when removing the old pedals to install the new ones. This is a straightforward process, but if you have never changed the pedals of your bike, you can make some mistakes and damage the thread and even break the crank. Remove bicycle pedal Depending on the pedal model you have on your bike, you will have to use an 8mm Allen wrench or a pedal wrench (15mm socket wrench). It is preferable to use these bike-specific wrenches, but sometimes even a standard spanner can be used. The most important thing to keep in mind is to differentiate between the left and right pedals since the thread of each pedal is different. The right pedal has a regular thread that tightens clockwise, but the left pedal has the reverse thread, and it stretches left. A simple trick so that you never forget how you should tighten the pedals on the bike is to think that the tightening is done in the direction of travel, that is, turning the key towards the front wheel. If you want to loosen the pedals, you must set the key in the opposite direction of travel. With some pedals, it is easy to differentiate, which corresponds to the right and which to the left, but in other models such as Speedplay or spd it is not so bright. But don’t worry, because all the pedals are marked with the letters “r” and “l” which correspond to the English initials of “right” and “left.” How to attach pedals to your bicycle The reason for the pedals to have the same thread direction as the cranks are straightforward. By rotating in the same direction, each time we pedal, we help the pedal to tighten more, and if they turned in the opposite direction, the brakes would loosen with each pedal stroke, and we would have a problem. One “tip” so the pedals don’t get stuck and you can easily remove and put them on, is not to squeeze too hard when installing them, and to use a bit of bicycle-specific mounting grease on the pedal arm. Now let's get down to business: 1. The first thing of all is to make sure that the pedals and threads are very clean and without traces of sand or dust. For this use, an old rag (with one of the kitchen, it can be used). 2. Put some mounting grease on the connecting rod threads. 3. Now insert the pedal marked with the letter “r” into the right crank of the bicycle and rotate clockwise (in this case, it is clockwise). 4. Then insert the pedal marked with the letter “l” into the left crank of the bicycle and rotate in the direction of travel (in this case, it is counterclockwise). 5. To make the tightening, we recommend using specific wrenches; 8mm Allen wrench or 15mm open-end wrench; the tightening torque should be between 35 and 55 nm, although a firm tightening by eye is more than enough and may facilitate disassembly in the future. 6. If you need an exact tightening torque, either because you use a potentiometer, you can use a torque wrench that gives you the tightening torque indicated by the manufacturer. Final Words So, we wanted to give you some simple tips and advice on How to take pedals off a bike so that you can change the pedals of your bicycle yourself with very few tools and in just a few minutes. Leave a Comment shares
ESSENTIALAI-STEM
System Requirements To ensure a smooth experience, considering the following: 1. Hardware Configuration: Verify that your hardware meets the requirements. 2. Prerequisites & Installation: Ensure you have the necessary prerequisites and packages installed on your machine. Hardware Configuration This outlines the necessary hardware specifications for establishing an Airsettle node While there's no specific preference for an operating system, it's advisable to opt for more secure and stable Linux server distributions, such as Ubuntu, rather than desktop operating systems like macOS or Windows. Furthermore, as the network expands, the minimum storage needs will evolve. To ensure a stable operation of a full node, it's recommended to exceed these minimum requirements. Prerequisites & Installation Our node setup manuals are crafted specifically for Linux distributions with apt compatibility, such as Debian. Moreover, deploying nodes on cloud servers has become a standard approach in the industry. Go Installation Guide (Version 1.20+) Step 1: Download the Go Package Firstly, download the Go version 1.20 or higher package. You can get it from the official Go website. For Linux systems, use the following wget command, replacing <version> with the specific version number you want to install (e.g., 1.20.1): wget https://dl.google.com/go/go<version>.linux-amd64.tar.gz Step 2: Extract the TAR File Extract the downloaded tarball to the /usr/local directory. This is the recommended location for Go installations. Run: sudo tar -C /usr/local -xzf go<version>.linux-amd64.tar.gz Step 3: Set Up Environment Variables Add /usr/local/go/bin to the PATH environment variable. You can do this by adding the following line to your $HOME/.profile or $HOME/.bashrc file (depending on your shell): export PATH=$PATH:/usr/local/go/bin After editing the file, apply the changes by running source $HOME/.profile or source $HOME/.bashrc. Step 4: Verify Installation To verify that Go is installed correctly, open a new terminal and run: go version This should display the version of Go that you have installed, confirming the successful installation. Note: Ensure that your system meets the necessary prerequisites for installing Go, such as having a compatible Linux distribution and sufficient user permissions. The process may slightly vary depending on the specific Linux distribution you are using. Install rustc, cargo and rustfmt. curl https://sh.rustup.rs -sSf | sh source $HOME/.cargo/env rustup component add rustfmt When building the master branch, please make sure you are using the latest stable rust version by running: $ rustup update When building a specific release branch, you should check the rust version in ci/rust-version.sh and if necessary, install that version by running: $ rustup install VERSION Note that if this is not the latest rust version on your machine, cargo commands may require an override in order to use the correct version. On Linux systems you may need to install libssl-dev, pkg-config, zlib1g-dev, protobuf etc. On Ubuntu: sudo apt-get update sudo apt-get install libssl-dev libudev-dev pkg-config zlib1g-dev llvm clang cmake make libprotobuf-dev protobuf-compiler On Fedora: sudo dnf install openssl-devel systemd-devel pkg-config zlib-devel llvm clang cmake make protobuf-devel protobuf-compiler perl-core Last updated
ESSENTIALAI-STEM
Air Methods to Report Fourth Quarter and Fiscal Year 2010 Financial Results on Thursday, March 10, 2011 - Business - Press Releases | NBC News DENVER, March 2, 2011 (GLOBE NEWSWIRE) -- Air Methods Corporation (Nasdaq:AIRM) will report financial results for the fourth quarter ended December 31, 2010 after the close of the market on Thursday, March 10, 2011. The Company has scheduled a conference call for Thursday, March 10, 2011 at 4:15 p.m. Eastern to discuss these results. Interested parties can access the call by dialing (877) 883-0656 (domestic) or (706) 643-8826 (international) or by accessing the web cast at www.airmethods.com . A replay of the call will be available at (800) 642-1687 (domestic) or (706) 645-9291 (international), access number 48556578, for 3 days following the call and the web cast can be accessed at www.airmethods.com for 30 days. Air Methods Corporation (www.airmethods.com) is a leader in emergency air medical transportation and medical services. The Hospital Based Services Division is the largest provider of air medical transport services for hospitals. The Community Based Services Division is one of the largest community-based providers of air medical services. The Products Division specializes in the design and manufacture of aeromedical and aerospace technology. The Company's fleet of owned, leased or maintained aircraft features over 300 helicopters and fixed wing aircraft. The Air Methods Corporation logo is available at http://www.globenewswire.com/newsroom/prs/?pkgid=6955. Please contact Christine Clarke at (303) 792-7579 to be included on the Company's fax and/or mailing list. Copyright 2012, GlobeNewswire, Inc. All Rights Reserved Discussion comments Most active discussions Show discussion Microsoft named Satya Nadella on Tuesday as its new chief executive officer. Nadella, who joined the software company 22 years ago, replaces Steve Ballmer.
NEWS-MULTISOURCE
S&P 500, Nasdaq book modest gains, but Dow fizzles to end session in the red The Nasdaq and the S&P 500 finished higher Monday, with the Dow industrials closing fractionally lower as a pair of embattled sectors, technology and energy, drew bidders. The Dow Jones Industrial Average ended down about 5 points, or less than 0.1%, at 21,408, while the S&P 500 index closed with slight gains, up 0.1% at 2,427. The technology sector , meanwhile, led the way higher for the S&P 500, up 0.8%, and also powered the Nasdaq Composite Index's 0.4% climb at 6,176. In corporate news, Abercrombie & Fitch Co. shares lost more than a fifth of their value after the embattled retailer early Monday said it terminated a potential buyout of the company, and Best Buy Co. Inc.'s stock tumbled 6.4% amid worries about heightened competition, highlighting the struggles of brick-and-mortar retailers face.
NEWS-MULTISOURCE
Diplostraca The Diplostraca or Cladocera, commonly known as water fleas, is a superorder of small, mostly freshwater crustaceans, most of which feed on microscopic chunks of organic matter, though some forms are predatory. Over 1000 species have been recognised so far, with many more undescribed. The oldest fossils of diplostracans date to the Jurassic, though their modern morphology suggests that they originated substantially earlier, during the Paleozoic. Some have also adapted to a life in the ocean, the only members of Branchiopoda to do so, though several anostracans live in hypersaline lakes. Most are 0.2 - 6.0 mm long, with a down-turned head with a single median compound eye, and a carapace covering the apparently unsegmented thorax and abdomen. Most species show cyclical parthenogenesis, where asexual reproduction is occasionally supplemented by sexual reproduction, which produces resting eggs that allow the species to survive harsh conditions and disperse to distant habitats. Description They are mostly 0.2 - 6.0 mm long, with the exception of Leptodora, which can be up to 18 mm long. The body is not obviously segmented and bears a folded carapace which covers the thorax and abdomen. The head is angled downwards, and may be separated from the rest of the body by a "cervical sinus" or notch. It bears a single black compound eye, located on the animal's midline, in all but two genera, and often, a single ocellus is present. The head also bears two pairs of antennae – the first antennae are small, unsegmented appendages, while the second antennae are large, segmented, and branched, with powerful muscles. The first antennae bear olfactory setae, while the second are used for swimming by most species. The pattern of setae on the second antennae is useful for identification. The part of the head which projects in front of the first antennae is known as the rostrum or "beak". The mouthparts are small, and consist of an unpaired labrum, a pair of mandibles, a pair of maxillae, and an unpaired labium. They are used to eat "organic detritus of all kinds" and bacteria. The thorax bears five or six pairs of lobed, leaf-like appendages, each with numerous hairs or setae. Carbon dioxide is lost, and oxygen taken up, through the body surface. Lifecycle With the exception of a few purely asexual species, the lifecycle of diplostracans is dominated by asexual reproduction, with occasional periods of sexual reproduction; this is known as cyclical parthenogenesis. When conditions are favourable, reproduction occurs by parthenogenesis for several generations, producing only female clones. As the conditions deteriorate, males are produced, and sexual reproduction occurs. This results in the production of long-lasting dormant eggs. These ephippial eggs can be transported over land by wind, and hatch when they reach favourable conditions, allowing many species to have very wide – even cosmopolitan – distributions. Except for the genus Leptodora, which has a metanauplius stage, a nauplius larval stage is absent in Diplostraca. Evolutionary history Diplostraca are nested within the clam shrimp, being most closely related to the order Cyclestherida, the only living genus of which is Cyclestheria. Though several fossils from the Paleozoic have been claimed to represent fossils of diplostracans, none of these records can be confirmed. The oldest confirmed records of diplostracans are from the Early Jurassic of Asia. Fossils from the Jurassic are assignable to modern as well as extinct groups, indicating that the initial radiation of the group occurred prior to the beginning of the Jurassic, likely during the late Paleozoic. Ecology Most diplostracan species live in fresh water and other inland water bodies, with only eight species being truly oceanic. The marine species are all in the family Podonidae, except for the genus Penilia. Some diplostracans inhabit leaf litter. Taxonomy According to the World Registry of Marine Species, Cladocera is a synonym of the superorder Diplostraca, which is included in the class Branchiopoda. Both names are currently in use. The superorder forms a monophyletic group of 7 orders, about 24 families, and more than 11,000 species. Many more species remain undescribed. The genus Daphnia alone contains around 150 species. Many groups of the water fleas are cryptic species or species flocks. The following families are recognised: Superorder Diplostraca Gerstaecker, 1866 (=Cladocera) * Order Anomopoda G.O. Sars, 1865 * Family Acantholeberidae Smirnov, 1976 * Family Bosminidae Baird, 1845 * Family Chydoridae Dybowski & Grochowski, 1894 * Family Daphniidae Straus, 1820 * Family Dumontiidae Santos-Flores & Dodson, 2003 * Family Eurycercidae Kurz, 1875 * Family Gondwanothrichidae Van Damme, Shiel & Dumont, 2007 * Family Ilyocryptidae Smirnov, 1976 * Family Macrothricidae Norman & Brady, 1867 * Family Moinidae Goulden, 1968 * Family Ophryoxidae Smirnov, 1976 * Order Ctenopoda G.O. Sars, 1865 * Family Holopediidae G.O. Sars, 1865 * Family Pseudopenilidae Korovchinsky & Sergeeva, 2008 * Family Sididae Baird, 1850 * Order Cyclestherida Sars G.O., 1899 * Family Cyclestheriidae Sars G.O., 1899 * Order Haplopoda G.O. Sars, 1865 * Family Leptodoridae Lilljeborg, 1861 * Order Laevicaudata Linder, 1945 * Family Lynceidae Stebbing, 1902 * Order Onychopoda G.O. Sars, 1865 * Family Cercopagididae Mordukhai-Boltovskoi, 1968 * Family Podonidae Mordukhai-Boltovskoi, 1968 * Family Polyphemidae Baird, 1845 * Order Spinicaudata Linder, 1945 * Family Cyzicidae Stebbing, 1910 * Family Eocyzicidae Schwentner, et al., 2020 * Family Leptestheriidae Daday, 1913: 44 * Family Limnadiidae Burmeister, 1843 Etymology The word "Cladocera" derives via Neo-Latin from the Ancient Greek κλάδος (kládos, "branch") and κέρας (kéras, "horn").
WIKI
prao81 (1) [Avatar] Offline #1 Does spring aspectj ltw not work with multiple class loaders? I have my an ear which has the war class loader policy as module, which effectively means that the app and the dependent projecs are loaded by the parent class loader , while the web module is loaded by the web class loader which is a child of the parent. During LTW I notice that the classes in my dependent projects are not woven? On further investigation I have looked at the various load time weaver classes (WebSphereLoadTimeWeaver) and it looks as if the transformation of the class loader is applied only to the default class loader , which invariably is the one associated with the thread which is the web class loader. How do I get this to work with multiple class loaders? I could change the war class loader policy to application but this is not allowed in my org. I also tried implementing LoadTimeWeavingConfigurer and invoking the WebSphereLoadTimeWeaver by passing in the required class loader, but any given point the LTW can only transform a single class loader. Is that correct?
ESSENTIALAI-STEM
A Basic Introduction To Python 3 A while back I was introduced to what has become my #1 favorite programming/scripting language: Python. It’s difficult for a language developer to come up with something that’s both powerful and easy to write, something that flows naturally and allows you to focus on what’s important in your code. Python does this beautifully. It makes just the right kinds of assumptions, allowing you to focus more on what your program should do instead of exactly how it should be done. There’s no worrying about memory management, variable typing, or those blasted semicolons, you just keep your mind on the logic of your application. Python takes some pretty big departures from some of the more traditional languages like C/C++, fitting in better with the dynamic languages like Ruby, Smalltalk, and even Javascript. The ability to quickly and easily finish complex tasks in Python has even been the subject of some great web comics. Note – Python is an interpreted language, the interpreter can be downloaded here. All examples in this guide are written for Python 3.0 which is NOT fully backward-compatible with prior versions. If you’re having trouble running the examples, check your Python version. Running the examples I’ll include various examples throughout this guide. Once you’ve got the Python 3 interpreter installed (make sure it’s Python 3), code can be run in two ways: Script file You can copy/paste the complete text of the example code into a text file. Python files typically end in .py. Open your command prompt and run the Python executable followed by the name of the file. On my Linux machine, I run: This should be roughly the same on Windows and Mac as well, though you may have to specify the full path to the Python interpreter, such as Interactive Interpreter Python can also be run in interactive mode, where you can type in commands one at a time to see how it responds. This can be very useful in troubleshooting, or in trying out new things. Run the Python executable on its own, without any script file, and it will open up the interactive prompt. Python interactive interpreter Ctrl + D will exit the interpreter. Whitespace One of the most unusual aspects of Python is its use of whitespace to indicate blocks of code. Instead of begin and end, or grouping by brackets, Python uses the amount of indentation to tell how to handle blocks of code for looping and such. To many people coming from other programming languages, this seems like insanity. Once you get used to the idea, however, it becomes quite natural and forces your code to be clear and readable. We all indent code blocks anyway (or at least should) so it just makes sense for the language to understand that statements all lined up together are part of the same block. As an added benefit, Python is not picky about just how much you like to indent, or even whether you prefer tabs or spaces. You can use a tab, a space, two spaces, 137 spaces, Python doesn’t care. All you need to do is be consistent. It will check your code and see “The first code block is indented by 4 spaces, so I’ll assume each other block is indented by another 4 spaces” or whatever the case may be. As long as you’re consistent in the way you indent your code, Python is flexible enough to understand. The following example may help clear things up. Code Breakdown: The while loop tells Python to run the following block of code as long as certain conditions are true. In this case, the condition is that x is less than 10. It will continue to loop over that block until x hits 10. The x += 1 translates to x = x + 1 or "make x larger by 1". Notice the final line does not get run until the while loop is finished. Python sees the indented lines, and treats those as the group of code to be run on each trip through the while loop. The final line is not indented with the others, so Python does not act on it until the while loop is finished. Dynamic Typing Python does not require you to define what type of data will be in a variable. You can put an integer, a string, a decimal, anything you want into a variable without having to tell Python what it is. Python will figure out, based on what you assign, what type of data that variable should hold. The following example should demonstrate: Which gives us the output below Example of Python's dynamic typing Data Structures The three data structures you'll most commonly use in python are • Lists • Tuples • Dictionaries Lists are a lot like arrays in some other languages. They're a one-dimensional sequence of items (though technically you can give them as many dimensions as you like). Each item in that list can be changed, moved, and removed at will without having to recreate the list, and without causing any change to the other items. Lists can contain any Python object, whether it be a number, a string, even other lists. The following code shows some basic usage of lists. Tuples I won't be covering tuples much, as they won't be used it our example program and they're similar to lists in many ways. Tuples, like lists, are a series of items grouped together. The difference is that tuples are not mutable. You cannot make in-place changes to the items in a tuple, you must re-create the tuple. This means no "append" or "pop" or other things that directly make changes to the contents of the tuple. If it helps, you can think of tuples as a read-only list (though that's really not very accurate). Dictionaries These, I love. When I was first taught about dictionaries, I remember thinking something along the lines of "Well.. I GUESS that could be useful... sometimes". Within a week, I used them every chance I got. In Python, dictionaries are key:value pairs. It's kinda like a list except that each item has two parts, a key and a value. In the following example, I'm going to make a dictionary to hold information about myself. A few things should be clear from the example. First, dictionaries can mix and match data of any type. Your keys and values can be of anything. You can even get really crazy and put things like functions inside dictionaries, but that's way beyond the scope of this guide. Second, dictionaries are mutable. You can add and remove items on the fly without recreating the dictionary or affecting other items. If you're still not sure of the usefulness of dictionaries, consider using them to track a user's settings. You could have a dictionary called settings and store things like username, ip address, and screen resolution. Any time you need to reference that data, you can just pull it from settings["username"], or whatever other key you've specified. Bring it all home Now we're going to get to the real action, creating a useful Python 3.0 program. What this program will do is take a number representing money, and tell you how much pocket change would make that amount. It's a pretty common coding exercise and is a good way to demonstrate the concepts we've covered so far. I should tell you now that this program is NOT going to be written in the "best" way, my aim is to write it using the most basic concepts and operations possible. There are several "better" ways to write this, such using functions and the modulus operator, and including error checking, but this version should be pretty easy to understand. Code Breakdown: We're using input to get an amount of money in from the command line. Python assumes that what is being entered is a string of text, as opposed to a number, so we've got to tell it to convert that input into a usable number. We could have left the number alone (ie 15.95) but instead we converted it to pennies (multiplying by 100) to make the maths simpler so we wouldn't have to worry about decimal points. Next, we create a dictionary to hold the results of our computing. If this were a more complex program, we could pass that dictionary around to our functions, classes, etc without worrying about keeping track of separate variables for each type of coin. After that comes the real work - the act of splitting our money total into individual coins. This program uses a while loop to keep cycling until we have no money left from our original input. Each trip through the loop looks at the amount of money, subtracts the largest coin it can, and restarts the loop. Instead of doing subtractions over and over, this program would likely be much more efficient if we had used the modulus operator, but the subtraction is easier to understand. Once we're finished with the loop, all that's left to do is display our results. Python is capable of FAR more than I could possibly cover here, but I hope I've been able to demonstrate the basics of how it works, and how it can be used to quickly and easily create tools that would be much more complicated in a less intuitive language. 3 comments 1. I am just getting into Python (no real programming experience, attending a VB.Net class (Don’t like it) right now. Python looks so much better to me. I really like this program, thank you for the easy to understand explanation. 1. I’ve never tried VB, but I’ve dabbled in C#. After Python, C# always felt to me like trying to run through a field full of knee-high wet grass. Glad you found some useful info here, I’d like to continue with more in-depth info (functions, for loops, etc) if more people enjoy the article. Good luck with Python, I’m sure you’ll enjoy it. 2. Hi, I liked reading your feeling about python, because they echoed mine when ten years ago I firstly got hooked by this language. As part of my job I keep reading about new languages, but never found one as elegant as python (apart from haskell, which unfortunately is not so suitable for practical use). One small suggestion : in your last code sample, I think you can omit the continue statement at the end of each elif branch, since the branches are exclusive. Ciao —— FB Comments are closed.
ESSENTIALAI-STEM
Biotechnological applications of Candida antarctica lipase A: State-of-the-art Pablo Dominguez de Maria, Chiara Carboni-Oerlemans, Bernard Tuin, Gerrald Bargeman, Ab van der Meer, Robert van Gemert Research output: Contribution to journalArticleAcademic 194 Citations (Scopus) 4 Downloads (Pure) Abstract The yeast Candida antarctica produces two different lipases, lipases A and B. While lipase B (CAL-B) is probably the mostly employed hydrolase in the biocatalysis field, the use of the lipase A (CAL-A) has been rather scarce and consequently its tridimensional structure has not been elucidated yet. However, CAL-A is a useful biocatalyst with many different applications that have been described especially in the last few years. Its attractiveness results from its unique features among hydrolases: the high thermostability, allowing operation at T > 90 °C; the ability to accept tertiary and sterically hindered alcohols, which has recently been attributed to the existence of a specific aminoacidic sequence in the active site; the sn-2 recognition in hydrolysis of triglycerides; the selectivity towards trans-fatty acids; the stability in the acidic pH range. Furthermore, it is considered to be an excellent biocatalyst for the asymmetric synthesis of amino acids/amino esters, due to its chemoselectivity towards amine groups. Considering all these aspects, in the present review, the origin, the properties and the applications of the CAL-A are briefly described and discussed, pointing out the unique characteristics of this biocatalyst. Original languageEnglish Pages (from-to)36-46 JournalJournal of molecular catalysis. B: Enzymatic Volume37 Issue number1-6 DOIs Publication statusPublished - 2005 Fingerprint Dive into the research topics of 'Biotechnological applications of Candida antarctica lipase A: State-of-the-art'. Together they form a unique fingerprint. Cite this
ESSENTIALAI-STEM
StrToIntEx function Converts a string representing a decimal or hexadecimal number to an integer. Syntax BOOL StrToIntEx( _In_  PCTSTR     pszString,       STIF_FLAGS dwFlags, _Out_ int        *piRet ); Parameters pszString [in] Type: PCTSTR A pointer to the null-terminated string to be converted. For further details concerning the valid forms of the string, see the Remarks section. dwFlags Type: STIF_FLAGS One of the following values that specify how pszString should be parsed for its conversion to an integer. STIF_DEFAULT The string at pszString contains the representation of a decimal value. STIF_SUPPORT_HEX The string at pszString contains the representation of either a decimal or hexadecimal value. Note that in hexadecimal representations, the characters A-F are case-insensitive. piRet [out] Type: int* A pointer to an int that receives the converted string. For instance, in the case of the string "123", the integer pointed to by this value receives the integer value 123. If this function returns FALSE, this value is undefined. If the value returned is too large to be contained in a variable of type int, this parameter contains the 32 low-order bits of the value. Any high-order bits beyond that are lost. Return value Type: BOOL Returns TRUE if the string is converted; otherwise FALSE. Remarks The string pointed to by the pszString parameter must have one of the following forms to be parsed successfully. • This form is accepted as a decimal value under either flag. (optional white space)(optional sign)(one or more decimal digits) • These forms are required for hexadecimal values when the STIF_SUPPORT_HEX flag is passed. (optional white space)(optional sign)0x(one or more hexadecimal digits) (optional white space)(optional sign)0X(one or more hexadecimal digits) The optional sign can be the character '-' or '+'; if omitted, the sign is assumed to be positive. Note  If the value is parsed as hexadecimal, the optional sign is ignored, even if it is a '-' character. For example, the string "-0x1" is parsed as 1 instead of -1.   If the string pointed to by pszString contains an invalid character, that character is considered the end of the string to be converted and the remainder is ignored. For instance, given the invalid hexadecimal string "0x00am123", StrToIntEx only recognizes "0x00a", converts it to the integer value 10, and returns TRUE. Requirements Minimum supported client Windows 2000 Professional, Windows XP [desktop apps only] Minimum supported server Windows 2000 Server [desktop apps only] Header Shlwapi.h Library Shlwapi.lib DLL Shlwapi.dll (version 4.71 or later) Unicode and ANSI names StrToIntExW (Unicode) and StrToIntExA (ANSI)     Show:
ESSENTIALAI-STEM
Page:Blackwood's Magazine volume 137.djvu/598 594 == FORTUNE'S WHEEL. – PART II. == CHAPTER IV. – A PLEASANT SURPRISE. seems a pity that the novelist cannot introduce something like the chorus of the Greek play, or refer the reader to explanations in an appendix, for the succinct narration of those preliminary details which are indispensable to the understanding of his story. But sooner or later the reader must be troubled with them, and it is as well to trouble him soon and get it over. Born to a long pedigree and a broad inheritance of barren acres seriously embarrassed, David Moray, as a very young man, had been offered a chance of pushing his fortunes in the Tropics. It was a time when the oriental pagoda-trees bore richer fruit than now, or at least when there were far fewer Europeans to shake them. If there were grander prizes to be gained, there were greater dangers and hardships to be faced when the adventurer turned aside from the beaten tracks. Resolute, persevering, and prematurely self-reliant, young Moray was as much tempted by the hazards as by the prizes. His father, with the proverbial caution of the Scot, waited till his son had a certain experience. Then an additional mortgage on the Glenconan estates furnished him with a moderate capital. Perhaps the old gentleman might have been less freehanded had he known more of his son's disposition. David's daring speculations would have made his father shudder. The young adventurer had taken good introductions with him, and his pleasant ways made him powerful friends among members of the great English firms in the ports of China and the Malay Peninsula. He was always a welcome guest at their tables; he might apparently have lived in luxurious free quarters for the duration of his natural life. Those of the merchants who were sportsmen had him in special affection ; and nowhere are friendships more quickly cemented than in sporting-parties in the solitudes of the rice -swamps or the jungles. But Moray was the last man in the world to "sorn," as they say in Scotland – that is, to sponge upon friends. He was too full of energy, too set upon arriving at his ends, too home-sick, we may add – though the word scarcely expresses our meaning – to linger on the circuitous road that was to lead him back to Glenconan and a competency. Recreation in the way of wild sports came to him naturally; for the rest, he never relaxed when he could help it, save when there was nothing profitable to be done, or else to serve some definite purpose. Those pleasant evenings over the social board formed business as well as friendly connections. The chats at the bivouac by the forest-fire suggested many a topic of commercial interest. A partner of no firm in particular, Moray became the ally and agent of many besides the one that had trained him. The custom regulations of China were severe; the contraband trade was immensely lucrative; European opinion was sufficiently lax on the subject: and yet there were many gainful affairs that were too compromising to be lightly undertaken by the old established houses. Not a few of these transactions were put in Moray's way, when he had once given guarantees of his discretion and enterprise. No one cared
WIKI
Authors Top If you have a few years of experience in Computer Science or research, and you’re interested in sharing that experience with the community, have a look at our Contribution Guidelines. 1. Introduction Computer networks let us transfer data from one device to another. For a successful data transfer, it’s required that the target system receives the same data sent by the source system. However, data may get corrupted while being transferred from one node to another. Cyclic Redundancy Checks (CRC) and Checksums are two popular mechanisms to detect data corruption. In this article, we’ll discuss these two popular techniques, how they work, and their merits and demerits. 2. Types of Errors Data corruption errors are classified based on the number of bits altered during transmission. An alteration can happen due to interference, which can change the shape of the signal.  These errors are classified into two categories. 2.1. Single-Bit Error A Single-Bit error occurs when there’s a change in one bit in a data byte:   2.2. Burst Error A Burst error occurs when there’s a change in more than one bit in a data byte:   3. What’s a Cyclic Redundancy Check? A Cyclic Redundancy Check (CRC) is an error-detecting code that lets us detect accidental changes to the transmitted data. Let’s define what these words refer to: • Cyclic: based on cyclic codes from where CRC derives this term • Redundancy: the check value that’s added to the data to verify its correctness At its destination, the incoming data is divided by the check value (divisor). If the remainder is zero, then the data unit is assumed to be valid and accepted. A non-zero remainder indicates that data is corrupted and should be rejected. The CRC checker at the transmitter and the CRC generator at the receiver function the same. 3.1. How Does CRC Work? CRC works based on the modulo-2 division, where addition is performed by an exclusive-OR operation. In an exclusive-OR operation, the subtraction operation is identical to the addition operation. This means adding two one bits results in 0, as in 1+1=0. Besides, in CRC, a sequence of redundant bits is appended to the end of the transmitted data unit. This is also known as the CRC remainder. Thus, the resulting data unit becomes exactly divisible by a pre-determined binary number (divisor). The divisor in the CRC generator is represented by an algebraic polynomial. A string of 0s and 1s are expressed as the polynomial with coefficients of 0 and 1. The power of each term in the polynomial refers to the position of the bit, and the corresponding coefficient reflects the value of the bit (0 or 1). A polynomial is represented by removing all terms with zero coefficients. Let’s explain the computation with an example for both the sender and receiver sides. 3.2. CRC Computation at Sender Side In this example, we’ll encode a 14-bit message with a three-bit CRC, with a polynomial x3 + x + 1. A 3rd-degree polynomial has four coefficients (1x3 + 0x2 + 1x + 1). In this case, the coefficients are 1, 0, 1, and 1. The result of the calculation is three bits long. Let’s start with the message that needs to be sent:  11010011101100 Here’s the first calculation for computing a three-bit CRC: 11010011101100 000 <--- Data padded by 3 bits of 0s on the right side 1011 <--- Divisor (4 bits) = x³ + x + 1 ------------------ 01100011101100 000 <--- Result Now, let’s show the complete computation: 11010011101100 000 <--- Data padded by three bits of 0s on the right side 1011 <--- Divisor (four bits) = x³ + x + 1 01100011101100 000 <--- Result (First four bits are XORed with the divisor, rest of the bits are unchanged) 1011 <--- Divisor ... 00111011101100 000 1011 00010111101100 000 1011 00000001101100 000 <--- Divisor moves over to align with the next 1 in the dividend (since quotient for that step was zero) 1011 00000000110100 000 1011 00000000011000 000 1011 00000000001110 000 1011 00000000000101 000 101 1 ----------------- 00000000000000 100 <--- remainder (three bits). Division algorithm stops here as dividend is equal to zero. 3.3. CRC Computation at Receiver Side The validity of a received message can easily be verified by performing the above calculation again, this time with the check value added instead of zeroes. The remainder should equal zero if there are no detectable errors. 11010011101100 100 <--- Input with the check value 1011 <--- Divisor 01100011101100 100 <--- Result 1011 <--- Divisor 00111011101100 100 ...... 00000000001110 100 1011 00000000000101 100 101 1 ------------------ 00000000000000 000 <--- Remainder The remainder value 0 indicates the received data is correct and can be accepted. Let’s now take an example where the received data has some transmission error and one bit has flipped. Thus, the exclusive-OR operation generates a non-zero remainder: 11010011101101 100 <--- input with check value 1011 <--- divisor 01100011101101 100 <--- result 1011 <--- divisor ... 00111011101101 100 ...... 00000000001111 100 1011 00000000000100 100 101 1 ------------------ 00000000000001 000 1 011 ------------------ 00000000000000 011 <--- remainder 4. What Is a Checksum? A checksum is another error-detecting technique that validates the integrity of the transmitted data. A checksum value consists of a sequence of numbers and letters.  To calculate a checksum, we run a program that puts that file through a hash function. The frequently used algorithms are MD5, SHA-1, SHA-256, and SHA-512. The hash function takes the input and produces a string of a fixed length. For the same input, the hash function always returns the same checksum value. However, the checksum value varies greatly if there’s a slight change in the input data. 4.1. How to Calculate a Checksum? There are several ways to calculate the checksum of a file. For instance, most programming languages provide APIs that can compute checksums. Most operating systems also offer utilities that can quickly compute the checksum value. For example, Linux provides the cksum utility to calculate the checksum of a file. In Windows, PowerShell provides the Get-FileHash command to calculate the checksum of a file: Get-FileHash C:\baeldung\Hello.txt The Get-FileHash output includes the algorithm name, the checksum value, and the file location: Algorithm Hash Path --------- ---- ---- SHA256 45356929829DC9FDED17E755DB91B93C25A4ED3FB9D60D92D4BD1E935A0ECC75 C:\baeldung\Hello.txt The above PowerShell command calculates the checksum of the Hello.txt file. By default, it uses the SHA256 algorithm. To use another algorithm, we can specify it by using the -Algorithm argument: Get-FileHash C:\baeldung\Hello.txt -Algorithm SHA512 The get-FileHash output shows the modified algorithm name and the checksum value for the same file: Algorithm Hash Path --------- ---- ---- SHA512 3B6FC410AAC9453DF953A84E806FF789A88549AD35DBB6EA30C832AF32316AC4832... C:\baeldung\Hello.txt 5. Summary Let’s summarize the comparison between CRC and Checksum on various aspects: Area CRC Checksum Purpose To detect data transmission errors between source and target machines. Software applications use the checksum to calculate data integrity Error Detection Capable of detecting double-digit errors Can detect single-bit errors Complexity Uses complex functions to detect errors Uses relatively less complex functions Reliability More reliable than a checksum due to the mathematical formula it employs to calculate the CRC Less reliable than CRC Existence Relatively new – an improvement over checksum The checksum is an old concept 6. Conclusion In this article, we discussed two major error-detecting techniques used during data transmission. First, we started with CRC and explained how it works. We then talked about Checksum and showed several means to calculate it. Finally, we provided a quick summary of some key attributes of CRC and Checksum. Authors Bottom If you have a few years of experience in Computer Science or research, and you’re interested in sharing that experience with the community, have a look at our Contribution Guidelines. Comments are closed on this article!
ESSENTIALAI-STEM
Ebola Viral Disease Outbreak — West Africa, 2014 Meredith G. Dixon, MD; Ilana J. Schafer, DVM Disclosures Morbidity and Mortality Weekly Report. 2014;63(25):548-551.  In This Article Characteristics of EVD EVD is characterized by the sudden onset of fever and malaise, accompanied by other nonspecific signs and symptoms such as myalgia, headache, vomiting, and diarrhea. Among EVD patients, 30%–50% experience hemorrhagic symptoms.[4] In severe and fatal forms, multiorgan dysfunction, including hepatic damage, renal failure, and central nervous system involvement occur, leading to shock and death. The first two Ebolavirus species were initially recognized in 1976 during simultaneous outbreaks in Sudan (Sudan ebolavirus) and Zaïre (now Democratic Republic of the Congo) (Zaïre ebolavirus)[5] Since 1976, there have been more than 20 EVD outbreaks across Central Africa, with the majority caused by Ebola virus (species Zaïre ebolavirus), which historically has demonstrated the highest case-fatality rate (up to 90%).[3] The wildlife reservoir has not been definitively ascertained; however, evidence supports fruit bats as one reservoir.[6] The virus initially is spread to the human population after contact with infected wildlife and is then spread person-to-person through direct contact with body fluids such as, but not limited to, blood, urine, sweat, semen, and breast milk. The incubation period is 2–21 days. Patients can transmit the virus while febrile and through later stages of disease, as well as postmortem, when persons contact the body during funeral preparations. Additionally, the virus has been isolated in semen for as many as 61 days after illness onset. Diagnosis is made most commonly through detection of Ebola virus RNA or Ebola virus antibodies in blood.[5] Testing in this outbreak is being performed by Institut Pasteur, the European Mobile Laboratory, and CDC in Guinea; by the Kenema Government Hospital Viral Hemorrhagic Fever Laboratory in Sierra Leone; and by the Liberia Institute of Biomedical Research. Patient care is supportive; there is no approved treatment known to be effective against Ebola virus. Clinical support consists of aggressive volume and electrolyte management, oral and intravenous nutrition, and medications to control fever and gastrointestinal distress, as well as to treat pain, anxiety, and agitation.[4,5] Diagnosis and treatment of concomitant infections and superinfections, including malaria and typhoid, also are important aspects of patient care.[4] Keys to controlling EVD outbreaks include 1) active case identification and isolation of patients from the community to prevent continued virus spread; 2) identifying contacts of ill or deceased persons and tracking the contacts daily for the entire incubation period of 21 days; 3) investigation of retrospective and current cases to document all historic and ongoing chains of virus transmission; 4) identifying deaths in the community and using safe burial practices; and 5) daily reporting of cases.[4,7,8] Education of health-care workers regarding safe infection-control practices, including appropriate use of personal protective equipment, is essential to protect them and their patients because health-care–associated transmission has played a part in transmission during previous outbreaks.[4,9] processing....
ESSENTIALAI-STEM
Page:Democratic Ideals and Reality (1919).djvu/32 20 there are those who would have us say that the experts whom we have for the time being installed in some of the high offices should be succeeded henceforth by experts, and that our prejudice is antiquated. None the less even in war time Britain has returned to a Civilian Minister for War! The fact is, of course, that the inefficiencies of the normally working British Constitution are merely the obverse of the truth that democracy is incompatible with the organisation necessary for war against autocracies. When the present Chilian Minister first came to England he was entertained by some members of the House of Commons. Referring to the Mother of Parliaments, as seen from the far Pacific, and to the chronic grumbling in regard to Parliamentary government which he found on his arrival in London, he exclaimed, 'You forget that one of the chief functions of Parliaments is to prevent things being done!' The thought of the organiser is essentially strategical, whereas that of the true democrat is ethical. The organiser is thinking how to use men; but the democrat is thinking of the rights of men, which rights are so many rocks in the way of the organiser. Undoubtedly the organiser must be a master, for, given the waywardness of human nature and the
WIKI
validate_context_set March 26, 2020 Contributors Name validate_context_set — Create or set a validation context keypair determined by key Synopsis #include "validate.h" | void **validate_context_set** ( | vctx, |   | |   | which, |   | |   | key, |   | |   | value); |   | validate_context * <var class="pdparam">vctx</var>; int <var class="pdparam">which</var>; const char * <var class="pdparam">key</var>; const char * <var class="pdparam">value</var>; Description Create or set a validation context keypair determined by key. Parameters vctx The validation context. For documentation of this data structure see “validate_context”. which An integer, typically VCTX_MESS or VCTX_CONN, which determines which dictionary to consult: the connection context or the message context dictionary. key The key to create or set. value The associated value. Return Values This function returns void. Note If either key or value is NULL, this function will log something like this: "Attempt to set null key or value in validate context connection dictionary." Threading It is legal to call this function in any thread. See Also validate_context_exists, validate_context_exists_and_get, validate_context_get, validate_context_delete, validate_context_init, and validate_context_destroy.
ESSENTIALAI-STEM
Wikipedia:Articles for deletion/Take Me Out To A Cubs Game The result was merge to Chicago_Cubs. MBisanz talk 09:51, 30 November 2008 (UTC) Take Me Out To A Cubs Game * ( [ delete] ) – (View AfD) (View log) Delete. Many sports teams come out with compilation CDs like this. I don't see what makes this album in particular notable. No independent sources that I could find, just those that sell the CD. Wolfer68 (talk) 20:05, 25 November 2008 (UTC) * Merge with Chicago Cubs or Delete - Might be worth transfering the songs over to the main Chicago Cubs page, but doesnt require an entire article. BritishWatcher (talk) 20:26, 25 November 2008 (UTC) * Merge. More appropriate to merge with the Chicago Cubs article since it clearly doesn't have enough to stand on its own. --Amwestover (talk|contrib) 21:28, 25 November 2008 (UTC) * Keep I just added a few basic facts. This is an officially licensed MLB product. I have found a couple of references to the album of minor importance (below). I don't usually do AFD responses for albums, but something seems wrong about not WP:PRESERVEing this information. * http://www.cubworld.com/product/TAKE1/Take_Me_Out_To_A_Cubs_Game_Music_CD.html * http://nearlynextyear.windycitizen.com/2008/09/20/more-cubs-music-take-me-out-to-a-cubs-game * Comment: Preservation can also be accomplished by merging the important and notable material from the article with a more significant article, like what BritishWatcher and myself are suggesting. --Amwestover (talk|contrib) 04:59, 26 November 2008 (UTC) * I don't think the details of the album are appropriate for the Cubs article. I wish I could find better media references, but I am still hesitant to delete this information. This is a compilation album of several notable songs.--TonyTheTiger (t/c/bio/WP:CHICAGO/WP:LOTM) 07:49, 27 November 2008 (UTC) * Note: This debate has been included in the list of Albums and songs-related deletion discussions. -- • Gene93k (talk) 02:16, 26 November 2008 (UTC) * Note: This debate has been included in the list of Chicago-related deletion discussions. -- • Gene93k (talk) 02:16, 26 November 2008 (UTC) * Merge with Chicago Cubs or Delete: doesn't require it's own article. JamesBurns (talk) 01:59, 28 November 2008 (UTC) * Merge - to Chicago_Cubs. Doesn't seem to be enough to stand on its own but a 100th anniversary recording ought to be mentioned in the team's article. Otto4711 (talk) 02:46, 28 November 2008 (UTC)
WIKI
Nutritional tips to reduce the risk of infections for those with an impaired immune system The immune system protects against infections and diseases. However, it may not work as well during and after cancer treatment. On this page: > Who’s at increased risk? > What you can do > Hygienic food measures > Foods to avoid Treatments such as chemotherapy reduce the growth and division of cancer cells but may also affect normal cells. Some of these normal cells, such as white blood cells, are an important part of the immune system. If the immune system works less well, your defences decrease, and you become more at risk of infections. Who is at increased risk? Some cancers, including leukaemia and other blood cancers, are treated with intensive chemotherapy. This means that the patients receive an extra high dose and/or a longer course of chemotherapy. This reduces the number of white blood cells in the body, which leads to reduced resistance to infection. This is also referred to as ‘the dip’ after chemotherapy. During this period there is a higher risk of catching an infection, this includes infections that can be caught from food. A hygienic diet (see below) is recommended for these patients. Following strict hygiene practices during food preparation may also be necessary if medicines that reduce resistance to infections are used after a stem cell transplant. These patients are at greater risk of an infection, including those from food (such as salmonella). Situations when there is reduced immunity: • The ‘dip’ after chemotherapy. For example, when the white blood cell (leucocyte) count is lowered. • During and after chemotherapy and/or radiation, defences may be impaired, and the risk of infections is increased. • The use of medication that suppresses the immune system. What can I do? • Eating well and staying active during treatment can help your immune system function properly. • The best way to support the immune system is to ensure that your diet provides all the necessary nutrients and contains enough energy and protein. For further guidance, it’s best to speak to your doctor or dietitian. Hygienic food measures How can I prepare food hygienically? • Wash your hands before preparing and eating a meal. • Change your tea, hand, and dishcloths/towel daily. Wash them at a minimum of 60 degrees. • Use clean kitchen utensils such as serving spoons and chopping boards. • Wash vegetables and fruit well under running water. Make sure that fruit and vegetables are fresh and undamaged. • Cook meat, fish, chicken, and eggs thoroughly. • Reheat any previously made dishes thoroughly. Don’t reheat dishes more than once. • Keep raw food away from the prepared food. Do not use chopping boards, knives, and other utensils that have come into contact with raw food or any other food. • Defrost frozen meat in the refrigerator or the microwave. Rinse away the moisture that forms when defrosting, and wipe away any spilt thawing liquid with paper towels. Which foods should I avoid? Raw products more often contain harmful bacteria. It is therefore best to avoid the following foods: • Raw or partly raw meat or meat products, such as steak, roast beef, carpaccio, roulade, steak tartare, raw ham, Parma ham, and chorizo. If you cook these products thoroughly you can eat them. • Liver sausage, liver pate and pate. • Raw fish, such as raw tuna, and sushi or sashimi made with raw fish. You can eat pre-packed sour herring from a jar or pot because it has been heated. • Pre-packaged smoked fish such as trout and mackerel. This also applies to vacuum packaging. If you cook the fish thoroughly, you can eat it. Pre-packed smoked salmon is okay to eat if eaten within 24hrs of opening. • Raw shellfish, such as oysters and mussels. • Raw milk and soft cheese made from raw milk (this will state “unpasteurised” or “raw milk” on the package). You can eat hard cheeses and blue cheese made from pasteurised milk if stored at a maximum of 4⁰C for a maximum of 4 days. You can drink pasteurised milk (most milk is pasteurised). • Raw/soft-boiled eggs. The yolk must be solid if you want to eat eggs. • Raw sprouts such as bean sprouts and garden cress. • Probiotics such as Yakult, Actimel, and Activia. With probiotics, the type of bacteria is clearly stated on the packaging. The lactic acid bacteria (Lactobacillus Bulgaricus and Streptococcus thermophilus) contained in yoghurt are not probiotics. That’s why you can eat yoghurt. Where next? > Order a free copy of our eat well during cancer guide > Stay active during cancer In association with NIHR cancer and nutrition collaboration logo   British Dietetic Association logo
ESSENTIALAI-STEM
Mark Ferguson (news presenter) Mark Ferguson (born 22 February 1966) is an Australian television news presenter, who currently presents Seven News in Sydney on weeknights. He was previously a senior news presenter with Nine News Sydney. Career After working with regional stations in New South Wales and Queensland, Ferguson joined the Seven Network in 1989 and reported for a number of Seven News programs, including 11AM and Hinch. He moved to Sydney in 1991, before moving to the Nine Network in 1992. At Nine he became London correspondent and reported from the UK on a number of major stories including the death of Princess Diana. In 1997, he returned to Sydney as a reporter and in 2001 became a presenter, initially on the National Nine Early News at 6 am, and later the National Nine Morning News at 11 am. In 2003, he became the weekend presenter of National Nine News Sydney, occasionally filling in for Jim Waley on weeknights whenever required. He presented the flagship 6:00 pm weeknight news in Waley's absence in the final quarter of 2003 when he took leave to battle skin cancer, and during the 2004–2005 non-ratings period, in which the 2004 Boxing Day tsunami disaster in south-east Asia occurred. His efforts during this coverage, which drew high ratings for Nine, saw him retain the main weeknight presenting role on a permanent basis, replacing Waley, under whom the bulletin had retained a comfortable ratings lead following the retirement of Brian Henderson in 2002. However, due to dwindling ratings at the Nine Network, Ferguson was replaced by Peter Overton in January 2009 and demoted back to his former weekend presenting role. In July 2009, it was revealed that Ferguson would move to Seven News from October. Ferguson, who had been with Nine for 17 years, was removed immediately from the weekend bulletin, and was replaced by Georgie Gardner. He continued to present the news on This Afternoon, and then on Nine Afternoon News until September 2009. In September 2009, he signed off Nine News for the final time, after more than 17 years with the network. He then presented the weekend bulletin on Seven News Sydney, replacing Chris Bath who took over from Ian Ross. Ferguson also presented Sunday Night while Chris Bath was at the 2012 London Olympics. In January 2014, Ferguson was appointed weeknight presenter for Seven News Sydney replacing Chris Bath.
WIKI
Tata BP Says India Solar Bids Don't `Have Grip' on Real Technology Costs Bidders in India ’s first solar auction have committed to building plants at unviable rates because they don’t understand the costs of the technology, Tata BP Solar Ltd. said. The government, expected to award the next round of licenses later this year, should select bids closest to the average to weed out unrealistically low ones, said Anil Patni, deputy general manager of the photovoltaic equipment maker. Tata BP Solar is jointly owned by BP Plc and Tata Power Co., India’s largest non-state power producer. India selected developers that offered the deepest discounts to the rate at which they’ll sell their electricity to ensure it wouldn’t over-subsidize the sector. European governments, including Spain and Germany , have had to curb solar subsidies that set off a boom of investment and spiraling state renewable-energy costs. The auction should’ve worked “by the textbook,” Patni told the Noppen India Solar Energy Summit in New Delhi today. “The problem is the market doesn’t really have a grip on the real numbers” because the technology is new. In the December auction, the lowest solar photovoltaic bid price came in at 10.95 rupees (24 cents) a kilowatt-hour and the lowest solar thermal bid was 10.49 rupees a kilowatt-hour, offering discounts of more than 30 percent to government- proposed rates. Abengoa SA , which has built plants in Spain and the U.S., and Acme Group , constructing a 10-megawatt solar thermal plant in India, were among the companies that lost out in the bidding. Capital expenditure costs didn’t fall at the same rate during that time period to justify those discounts, Patni said. If companies quoting bids closest to the average had been selected, projects would be committed to sell their power at about 15 rupees a kilowatt-hour, Patni said. “This is a tariff that’s still viable” and would also make projects more likely to obtain funding from banks, he said. To contact the reporter on this story: Natalie Obiko Pearson in Mumbai at npearson7@bloomberg.net . To contact the editor responsible for this story: Reed Landberg at landberg@bloomberg.net .
NEWS-MULTISOURCE
Habaneceres Habaneceres is a Cuban documentary film, directed in 2001 by Luis Leonel León. The documentary received awards at film festivals and was selected by the Cuban Film Press Association, affiliated with the International Federation of Film Press (FIPRESCI), as the best film of 2001 in its genre. Plot The film's protagonist is Havana, used by the filmmaker in a symbolic way to expose the "material and spiritual crisis of the end of the century and the beginning of the new century" in Cuba, through the testimonies of four Havana creators: playwright Alberto Pedro, filmmaker Fernando Pérez, singer-songwriter Carlos Varela and writer Leonardo Padura, who share nostalgia, regrets and longings for their city and their country; and relate fragments of their experiences, from the happiest to the most terrible moments, such as the Mariel exodus, the Maleconazo and the balseros' crisis, key events in the history of the Cuban Revolution. Alberto Pedro says "We conduct ourselves inside the deterioration as if we were in Paris. Each one of us has a city inside", while Fernando Pérez warns that "no collective dream, no utopia is realized if it is not formed by the yearnings of each individual", quoting Ho Chi Min: "Never has the dawn been closer than when the night has been darkest." Production The documentary, which was the practical part of the graduation thesis of its scriptwriter and director, was shot with a non-professional camera in Havana's neighborhoods and municipalities such as Arroyo Naranjo, El Vedado, La Víbora, Mantilla, Old Havana, Centro Habana, among others, and uses archive images and fragments of the films Madagascar (1994) and Life Is to Whistle by Fernando Pérez to emphasize its intellectual or ideological montage. Release Its premiere was in August 2001 at the Riviera movie theater in El Vedado, in the club that singer-songwriter Gerardo Alfonso had at the time. It was later screened at La Rampa, at the closing ceremony of the Cine Plaza National Film and Video Festival, where it won the Grand Documentary Award. Because of its critical approach, the film was censored on Cuban television. León declared that Cuban authorities also "wanted to eliminate it from the Havana International Film Festival" in December 2001. "But they had the bad luck that filmmaker Fernando Perez was involved in the festival that year and said, very bravely, if they removed it he would be forced to resign from the festival because he could not support such an action against a film where he not only participated, but where he expressed himself against censorship. Fernando thus put them up against the wall. In the end they allowed it to be shown at the festival, but with a trick: they didn't let it compete, they assigned it to a selection called Made in Cuba and screened it only two or three times at inaccessible times and in small theaters". In 2003 it was screened at the Chaplin Hall (Cinemateca de Cuba) during the II Muestra Nacional de Nuevos Realizadores ICAIC, where it won the Jury's Special Prize. Outside the island, it has been screened at the Casa de América in Madrid, the Instituto de Estudios Hispánicos de Canarias, the Filmoteca Española, the University of La Laguna and other cultural and academic centers in Spain, Europe, Latin America and the United States. Miami television stations such as América TeVé (channel 41) and Radio y Televisión Martí have broadcast it preceded by interviews with its director. Reception In the essay "Insurgencia, dinámica y potestad del cine joven en Cuba", included in the book "Conquistando la utopía: El ICAIC y la Revolución 50 años después", a compilation of texts published by Ediciones ICAIC, film critic and journalist Joel del Río cites Habaneceres as one of the "essential works of young Cuban cinema" and places it among the films of the time that express "disenchantment, pessimism and anti-utopia" in the sociopolitical context. Habaneceres, according to writer and journalist Grethel Delgado, is "a documentary that goes beyond the precincts of the genre and navigates in video art, in the image that creatively narrates beyond the testimonial, the document. It shows this city of more than 500 years with the VHS filter, like those childhood videos where we sing 'happy birthday', that we watch when nostalgia presses, and where we look for the neighbor who left, died or forgot. In the voice of the creators of the island Leon transports us to a myriad of sensations, colors, smells and sadness, so that if you are in that specific state of sensitivity, you may end up crying. I have done it and it has been an act of cleansing. With a special force, the faces of those listless but sometimes smiling habaneros, who are happy in a strange way, impossible to define, are fixed in the memory. The eyes of the little girl looking down from a balcony, like two promises, also stick in our minds. Where is that woman now, one might ask. The magic of cinema, which stops everything in the image". In the essay "La Habana, imagen y escritura", film critic Gustavo Arcos states: "Another perspective will be assumed by the young Luis Leonel León in his melancholic and award-winning documentary, Habaneceres (2001). His proposal resorts to a more traditional visual language that concentrates its attention not so much on formal experimentation as on the testimonies of the four interviewed figures to give an image no less dramatic or unreal of Havana, that image that somehow idealized by nostalgia and the passage of time, survives in the memory of those who inhabit it, provoking a curious and inevitable conflict between the past and the present, between desire and reality, a chimerical fight against the demons of oblivion". Essayist and film critic Juan Antonio García Borrero wrote in 2011: "cities impose on us their own ways of expressing themselves. Or their own metalanguage, describing that which will always be beyond what conventional language can apprehend. I think a bit of this is said in Luis Leonel León's beautiful documentary Habaneceres: the interviewees agree in feeling fascination for something we have not seen, but in any case we have (pre)felt, or continue to sense in its illuminating mystery.". In the program "En profundidad" of Radio y Televisión Martí, journalist Alfredo Jacomino interviews Leon and assures that the filmmaker "did not live Havana in its splendor, he could not witness the charm (neither of the store nor of the adjective) and yet he loves it. And he who loves something, even if it is old and battered, deserves a bow". Awards * Best Documentary of the Year. Cuban Association of the Cinematographic Press, 2001. * Documentary Grand Prize. Cine Plaza National Film and Video Festival, 2001. * First Prize. Imago Festival, 2001. * Special Award. Almacén de la Imagen Festival of Camagüey, 2001. * Special Jury Award. II National Exhibition of New Filmmakers ICAIC, 2003. * Made in Cuba Selection of the 23rd International Festival of New Latin American Cinema of Havana, 2001. * Selection Horizontes del Sur Festival. La Havane: dans la litterature, le cinema, et les arts visuels contemporains, France, 2002. * Official Selection Festival of Alternative Cuban Cimena, Little Havana, Miami, 2003.
WIKI
Page:Ballinger Price--The Happy Venture.djvu/177 Rh "No," Ken said, between his teeth. "No, Phil. Oh, no, no!" He got up and shook himself. "Go to bed, now, and sleep. The idea of sitting up with a beastly cold candle!" He kissed her abruptly and unexpectedly and stalked out at the door, a weary, disheveled figure, in the first pale, fog-burdened gleam of dawn. It was some time after the Flying Dutchman parted her one insufficient mooring-rope before Kirk realized that the sound of the water about her had changed from a slap to a gliding ripple. There was no longer the short tug and lurch as she pulled at her painter and fell back; there was no longer the tide sound about the gaunt piles of the wharf. Kirk, a little apprehensive, stumbled aft and felt for the stern-line. It gave in his hand, and the slack, wet length of it flew suddenly aboard, smacking his face with its cold and slimy end. He knew, then, what had happened, but he felt sure that the boat must still be very near the wharf—perhaps drifting up to the rocky shore between the piers. He clutched the gunwale and shouted: "Ken! Oh, Ken!"
WIKI
Page:Collier's New Encyclopedia v. 02.djvu/497 LEFT CHARLES THE BOLD 433 CHARLESTON his family. Chilperic II., King of the Franks, refusing to acknowledge Charles Martel as mayor of the palace, the lat- ter deposed him, and set Clothaire IV. in his place. After the death of Clothaire he restored Chilperic, and subsequently placed Thierri on the throne. Charles Martel rendered his rule famous by the great victory which he gained in Octo- ber, 732, over the Saracens, near Tours, from which he acquired the name of Martel, signifying hammer. He died in ^ 741. Charlemagne was his grandson. CHARLES THE BOLD, Duke of Bur- gundy, son of Philip the Good and Isa- bella of Portugal, was born at Dijon, Nov. 10, 1433. While his father yet lived Charles left Burgundy, and form- ing an alliance with some of the grreat French nobles for the purpose of pre- serving the power of the feudal nobil- ity, he marched on Paris with 20,000 men, defeated Louis XI. at Montlheri, ajid won the counties of Boulogne, Guines, and Ponthieu. Succeeding his father in 1467, he commenced his reign by severe repression of the citizens of Liege and Ghent. In 1468 he married Margaret of York, sister of Edward IV. of England. Liege having rebelled, the duke stormed and sacked the town. In 1470 the war with France was re- newed, and though the duke was forced to sue for a truce he soon took up arms anew, and, crossing the Somme, stormed and fired the city of Nesle. Louis mean- while involved him in greater embar- rassments by exciting against him Aus- tria and the Swiss. Charles, ever ready to take up a quarrel, threw himself on Germany with characteristic fury, and lost 10 months in a futile siege of Neuss. He was successful, however, in conquer- ing Lorraine from Duke Rene. Charles now turned his arms against the Swiss, took the city of Granson, putting 800 men to the sword. But this cruelty was speedily avenged by the descent of a Swiss army, which at the first shock routed the duke's forces at Granson, March 3, 1476. Mad with rage and shame Charles gathered another army, invaded Switzerland, and was again de- feated with great loss at Morat. The Swiss, led by the Duke of Lorraine, now undertook the reconquest of Lorraine, and obtained possession of the city of Nancy. Charles marched to recover it, but was utterly routed and himself slain, in 1477. CHARLES CITY, a city of Iowa, the county-seat of Floyd co. It is on the Illinois Central, and the Chicago, Mil- waukee, and St. Paul railroads, and on Cedar river. Its industries, which are important, include the manufacture of store fixtures, gasoline traction and sta- tionary engines, wood furnishings, fur- niture, etc. It is an important shippftig point for live stock, dairy products, nursery stock, and poultry. The city has a public library, an opera house, a home for the aged, and parks, and is the seat of Charles City College. Pop. (1910) 5,892; (.1920) 7,350. CHARLESTON, a city of Illinois, the county-seat of Coles co. It is on the Cleveland, Cincinnati, Chicago, and St. Louis, and the Toledo, St. Louis, and Western railroads. The city is the cen- ter of an important oil, gas, and coal region, and there are manufactures of flour, brooms, stoves, and tiles. It is the seat of the Eastern Illinois Normal School, and has a court house, parks, and a Carnegie library. Pop. (1910) 5,884; (1920) 6,615. CHARLESTON, a city, port of entry, and county-seat of Charleston co., S. C. ; the first city in population and impor- tance in the State, situated at the con- fluence of the Ashley and Cooper rivers, 7 miles from the ocean. Charleston has one of the safest and most commodious harbors in the United States, with a depth at the inner harbor of over 40 feet and 22 feet at low water on the bar. It is_ defended by Forts Sumter and Moultrie and Batteries Sergt. Jas- per and Capron. Two bridges connect the city with the W. shore of the Ashley river. Area, 5% square miles; pop. (1910) 58,833; (1920) 67,957. Topography. — The city is built on a peninsula at an average elevation of 8 to 10 feet above high water. The streets are generally at right angles, and four. King and Meeting streets, and Rutledge and Ashley avenues, run N. and S. the entire length of the city. The former is the principal retail street. At its S. extremity is a beautiful park, named White Point Garden, and to the E. of this is the Battery, a broad esplanade, 1,500 feet long, and affording a grand view of the harbor and forts. The pub- lic buildings are grouped about the in- tersection of Meeting and Broad streets, and consist of the court house, a substan- tial brick building; the City Hall, an im- posing structure, entered by a double flight of steps, and the new Postoffice, a magnificent four-story building of Caro- lina granite, with a tower and all modern appliances, costing about $500,000. The United States Custom house, near Mar- ket wharf on the Cooper river, is a mag- nificent building, having cost $3,000,000. In front of the City Hall is Washington Park, containing two handsome foun-
WIKI
Duke of Gloucester Duke of Gloucester is a British royal title (after Gloucester), often conferred on one of the sons of the reigning monarch. The first four creations were in the Peerage of England and the last in the Peerage of the United Kingdom; the current creation carries with it the subsidiary titles of Earl of Ulster and Baron Culloden. The title was first conferred on Thomas of Woodstock, the thirteenth child of King Edward III. The title became extinct at his death, as it did upon the death of the duke of the second creation, Humphrey of Lancaster, fourth son of King Henry IV. The title was next conferred on Richard, brother to King Edward IV. When Richard himself became king, the dukedom merged into the crown. After Richard's death, the title was considered ominous, since the first three such dukes had all died without issue to inherit their titles. The title was not awarded for over 150 years: the next to receive the dukedom was the son of King Charles I, Henry Stuart, upon whose death the title again became extinct. Prince William, son of the future Queen Anne, was styled "Duke of Gloucester" for his whole life (1689–1700), but was never formally created duke. Frederick, Prince of Wales, was styled "Duke of Gloucester" from 1718–1726, but was then created Duke of Edinburgh rather than of Gloucester. There was next a creation of a double dukedom (not two dukedoms) for the brother of King George III, Prince William Henry, his proper title becoming "Duke of Gloucester and Edinburgh". The fifth and most recent creation was for Prince Henry, third son of King George V, styled as His Royal Highness The Duke of Gloucester. Upon Prince Henry's death, the dukedom was inherited by his only surviving son Prince Richard, who still holds the title. The heir-apparent to the title is Alexander Windsor, styled Earl of Ulster. The next in the line of succession is the Earl of Ulster's son Xan Windsor, known by his grandfather's third title of Lord Culloden. The royal dukedom will devolve into an ordinary one when inherited by Alexander Windsor; as a great-grandson of a sovereign he is not entitled to royal style, and will be styled as His Grace The Duke of Gloucester. First creation, 1385–1397 * Thomas of Woodstock House of Plantagenet 1385–1397 also: Duke of Aumale (1385–1397), Earl of Essex (1376–1397), Earl of Buckingham (1377) * ThomasWoodstock.jpg * 7 January 1355 Woodstock Palace son of Edward III of England and Queen Philippa * Eleanor de Bohun 1376 5 children * 8 September 1397 Calais aged 42 * colspan=5|Thomas of Woodstock's son died two years after his father, but never succeeded to his titles except that of Earl of Buckingham. At the time of Thomas's death, he was regarded as a traitor and thus his titles were forfeit after his murder (except Earl of Buckingham). His son had no issue and his male line died out in 1399. * colspan=5|Thomas of Woodstock's son died two years after his father, but never succeeded to his titles except that of Earl of Buckingham. At the time of Thomas's death, he was regarded as a traitor and thus his titles were forfeit after his murder (except Earl of Buckingham). His son had no issue and his male line died out in 1399. * } Second creation, 1414–1447 * Humphrey of Lancaster House of Lancaster 1414–1447 also: Earl of Pembroke (1414) * HumphreyGloucester.jpg * 3 October 1390 Lancaster Castle son of Henry IV of England and Mary de Bohun * Jacqueline, Countess of Hainaut 1422–1428 (annulled) 1 child (stillborn) Eleanor de Cobham 1428–1441 (annulled) 2 children * 23 February 1447 Bury St Edmunds aged 56 * colspan=5|Before marrying Humphrey, Eleanor de Cobham was his mistress. At the time of Humphrey's 1447 death, he had two children, Arthur and Antigone. However, both children were born before his marriage to Eleanor and were thus illegitimate and could not succeed to his titles; so, accordingly, all his titles became extinct on his death. * colspan=5|Before marrying Humphrey, Eleanor de Cobham was his mistress. At the time of Humphrey's 1447 death, he had two children, Arthur and Antigone. However, both children were born before his marriage to Eleanor and were thus illegitimate and could not succeed to his titles; so, accordingly, all his titles became extinct on his death. * } Third creation, 1461 * Richard Plantagenet House of York 1461–1483 * King Richard III.jpg * 2 October 1452 Fotheringhay Castle, Oundle son of Richard, Duke of York and Cecily Neville * Anne Neville 1472–1485 (her death) 1 child * 22 August 1485 Bosworth Field aged 32 * colspan=5|Richard succeeded as Richard III in 1483 upon his nephew's disappearance, and his titles merged with the crown. * colspan=5|Richard succeeded as Richard III in 1483 upon his nephew's disappearance, and his titles merged with the crown. * } Fourth creation, 1659 * Henry Stuart House of Stuart 1659–1660 also: Earl of Cambridge (1659) * Jan Boeckhorst - Prince Henry (1640–1660), Duke of Gloucester.jpg * 8 July 1640 Oatlands Palace, Oatlands son of King Charles I and Queen Henrietta Maria * Never married * 18 September 1660 Whitehall, London aged 20 * colspan=5|Henry Stuart had no children and all his titles became extinct on his death. * } * } Only styled, 1689 * Prince William House of Oldenburg 1689–1700 * PrinceWilliamDukeOfGloucester.jpg * 24 July 1689 Hampton Court Palace, London son of Queen Anne and Prince George * Never married * 30 July 1700 Windsor Castle, Windsor aged 11 * } Only styled, 1717 * Prince Frederick House of Hanover 1717–1726 * Frederick Prince of Wales.jpg * 1 February 1707 Leineschloss, Hanover son of King George II and Queen Caroline * Princess Augusta of Saxe-Gotha 17 April 1736 9 children * 31 March 1751 Leicester House, London aged 44 * } Prince Frederick became Duke of Edinburgh in 1726 and then Prince of Wales in 1729. Fifth creation, 1928 Also: Earl of Ulster and Baron Culloden (1928) * Prince Henry House of Windsor 1928–1974 * Prince Henry, Duke of Gloucester.jpg * 31 March 1900 York Cottage, Sandringham son of King George V and Queen Mary * Lady Alice Montagu Douglas Scott 6 November 1935 2 children * 10 June 1974 Barnwell Manor, Barnwell aged 74 * Prince Richard House of Windsor 1974–present * Duke of Gloucester (Grand Prior).jpg * 26 August 1944 St. Matthew's Nursing Home, Northampton son of Prince Henry and Princess Alice * Birgitte van Deurs Henriksen 8 June 1972 3 children * – now 79 years, 327 days old * – now 79 years, 327 days old * } Line of succession * Coronet of a Child of the Sovereign.svg Prince Henry, Duke of Gloucester (1900–1974) * Coronet of a Grandchild of the Sovereign.svg Prince William of Gloucester (1941–1972) * Coronet of a Grandchild of the Sovereign.svg Prince Richard, Duke of Gloucester (born 1944) * (1) Alexander Windsor, Earl of Ulster (born 1974) * (2) Xan Windsor, Lord Culloden (born 2007)
WIKI
Hoven, Denmark Hoven, Denmark is a small village in west-central Denmark, with a population of 214 (1 January 2024), on the Jutland Peninsula. It is located in Ringkøbing-Skjern Municipality, Central Denmark Region, southwest of Herning at an elevation of 20 metres. Hoven Church is a Middle Age Church originally in Romanesque style. The old schoolhouse in Hoven is now a museum.
WIKI
Sun. Dec 10th, 2023 Effects of Black Pepper and L-theanine with Caffeine     based on the findings it appears there are cognitive-enhancing outcomes of caffeine. Now Caffeine feels good to most of us, starts most of us up…. But some of us have a little trouble sleeping when caffeine is introduced into our diet.  It appears these study’s show caffeine has cognitive-enhancing outcomes. Other Studies included in this article point to Black peppers ability to counteract the bad effects of caffeine.  Also another Study GABA and L-theanine mixture Improves REM Sleep, Antidepressant, and Mood-stabilizing Study Says shows that mixing L-Theanine with Gaba improves mood and sleep. The Cognitive-Enhancing Outcomes of Caffeine and L-theanine: A Systematic Review Abstract Attention-deficit hyperactivity disorder (ADHD) affects multiple cognitive domains, including impaired attention, hyperactivity, and increased impulsivity. According to the CDC, 9.4% of children between 2 and 17 years old have been diagnosed with ADHD. Neurotransmitters such as noradrenaline and dopamine have been suggested as crucial players in the pathophysiology of ADHD and are often targets of modern medication. Adenosine receptors types A1 and A2a in the brain are inhibited by caffeine: a stimulant known to augment attention by increasing cholinergic and dopaminergic transmission. The cognitive function of attention is also enhanced by the amino acid: L-theanine. The mechanism of action is that it behaves like a glutamate reuptake inhibitor while also acting in the hippocampus as a competitive low-affinity glutamate receptor antagonist. It’s also shown to have a neuroprotective effect by its action on the gamma aminobutyric acid (GABA)-A receptors. Our systematic review investigates the literature and clinical trials on the cognitive-enhancing effects of caffeine and L-theanine. Keywords: adhd; caffeine; green tea; l-theanine; l-theanine and caffeine; matcha; memory reconsolidation; mental cognition. L-theanine partially counteracts caffeine-induced sleep disturbances in rats Abstract L-theanine has been reported to inhibit the excitatory effects of caffeine. The present study examined the effects of L-theanine on caffeine-induced sleep disturbances in rats. Rats received the following drug pairings: saline and saline (Control), 7.5 mg/kg caffeine and saline, or 7.5 mg/kg of caffeine followed by various doses of L-theanine (22.5, 37.5, 75, or 150 mg/kg). Vigilance states were divided into: wakefulness (W), transition to slow-wave sleep (tSWS), slow-wave sleep (SWS), and rapid-eye-movement sleep (REMS). Caffeine significantly increased the duration of W and decreased the duration of SWS and REMS compared to the Control. Although L-theanine failed to reverse the caffeine-induced W increase, at 22.5 and 37.5 mg/kg (but not at 75 and 150 mg/kg), it significantly reversed caffeine-induced decreases in SWS. In conclusion, low doses of L-theanine can partially reverse caffeine-induced reductions in SWS; however, effects of L-theanine on caffeine-induced insomnia do not appear to increase dose-dependently. Effect of Black Pepper ( Piper nigrum) Extract on Caffeine-Induced Sleep Disruption and Excitation in Mice Abstract Sleep is one of the most essential factors required to maintain good health. However, the global prevalence of insomnia is increasing, and caffeine intake is a major trigger. The objective of this study was to investigate the inhibitory effect of black pepper, Piper nigrum extract (PE), on caffeine-induced sleep disruption and excitation in mice. Caffeine significantly decreased sleep duration in the pentobarbital-induced sleep test. It also resulted in a significant increase in sleep onset and a decrease in non-rapid eye movement sleep. Moreover, in an open-field test, caffeine-treated mice exhibited a significantly increased time in the center zone and total distance traveled. However, the co-administration of caffeine and PE did not result in similar arousal activities. Thus, our results suggest that PE can be used as a potential therapeutic agent to treat sleep problems and excitatory status associated with caffeine intake. References 1. apalka GM. Practical Resources for the Mental Health Professional. Academic Press; 2010. Nutritional and Herbal Therapies for Children and Adolescents. 2. Inhibition by theanine of binding of [3H]AMPA, [3H]kainate, and [3H]MDL 105,519 to glutamate receptors. Kakuda T, Nozawa A, Sugimoto A, Niino H. https://pubmed.ncbi.nlm.nih.gov/12596867/ Biosci Biotechnol Biochem. 2002;66:2683–2686. – PubMed 3. Involvement of GABA(A) receptors in the neuroprotective effect of theanine on focal cerebral ischemia in mice. Egashira N, Hayakawa K, Osajima M, Mishima K, Iwasaki K, Oishi R, Fujiwara M. https://www.sciencedirect.com/science/article/pii/S1347861319342082. J Pharmacol Sci. 2007;105:211–214. – PubMed 4. Acute effects of tea constituents L-theanine, caffeine, and epigallocatechin gallate on cognitive function and mood: a systematic review and meta-analysis. Camfield DA, Stough C, Farrimond J, Scholey AB. https://pubmed.ncbi.nlm.nih.gov/24946991/ Nutr Rev. 2014;72:507–522. – PubMed 5. Diagnostic and statistical manual of mental disorders: DSM-5™ (5th ed.) [ Sep; 2021 ];https://psycnet.apa.org/record/2013-14907-000 2013 6. GABA and l-theanine mixture decreases sleep latency and improves NREM sleep. 7. Kim S, Jo K, Hong KB, Han SH, Suh HJ.Pharm Biol. 2019 Dec;57(1):65-73. doi: 10.1080/13880209.2018.1557698.PMID: 30707852 Free PMC article. 8. Ingestion of green tea with lowered caffeine improves sleep quality of the elderly via suppression of stress. 9. Unno K, Noda S, Kawasaki Y, Yamada H, Morita A, Iguchi K, Nakamura Y.J Clin Biochem Nutr. 2017 Nov;61(3):210-216. doi: 10.3164/jcbn.17-6. Epub 2017 Sep 5.PMID: 29203963 Free PMC article. 10. Sleep in elite athletes and nutritional interventions to enhance sleep. 11. Halson SL.Sports Med. 2014 May;44 Suppl 1(Suppl 1):S13-23. doi: 10.1007/s40279-014-0147-0.PMID: 24791913 Free PMC article. Review. 12. l-theanine attenuates abstinence signs in morphine-dependent rhesus monkeys and elicits anxiolytic-like activity in mice. 13. Wise LE, Premaratne ID, Gamage TF, Lichtman AH, Hughes LD, Harris LS, Aceto MD.Pharmacol Biochem Behav. 2012 Dec;103(2):245-52. doi: 10.1016/j.pbb.2012.08.008. Epub 2012 Aug 23.PMID: 22935630 Free PMC article. 14. Effect of Black Pepper (Piper nigrum) Extract on Caffeine-Induced Sleep Disruption and Excitation in Mice. Yoon M, Jung J, Kim M, Lee C, Cho S, Um M.Nutrients. 2022 May 27;14(11):2249. doi: 10.3390/nu14112249.PMID: 35684048 Free PMC article. 15. Effects of L-theanine-caffeine combination on sustained attention and inhibitory control among children with ADHD: a proof-of-concept neuroimaging RCT. Kahathuduwa CN, Wakefield S, West BD, Blume J, Dassanayake TL, Weerasinghe VS, Mastergeorge A.Sci Rep. 2020 Aug 4;10(1):13072. doi: 10.1038/s41598-020-70037-7.PMID: 32753637 Free PMC article. Clinical Trial. 16. GABA and l-theanine mixture decreases sleep latency and improves NREM sleep. Kim S, Jo K, Hong KB, Han SH, Suh HJ.Pharm Biol. 2019 Dec;57(1):65-73. doi: 10.1080/13880209.2018.1557698.PMID: 30707852 Free PMC article. 17. Ingestion of green tea with lowered caffeine improves sleep quality of the elderly via suppression of stress. Unno K, Noda S, Kawasaki Y, Yamada H, Morita A, Iguchi K, Nakamura Y.J Clin Biochem Nutr. 2017 Nov;61(3):210-216. doi: 10.3164/jcbn.17-6. Epub 2017 Sep 5.PMID: 29203963 Free PMC article. 18. Sleep in elite athletes and nutritional interventions to enhance sleep. Halson SL.Sports Med. 2014 May;44 Suppl 1(Suppl 1):S13-23. doi: 10.1007/s40279-014-0147-0.         https://pubmed.ncbi.nlm.nih.gov/35111479/ https://pubmed.ncbi.nlm.nih.gov/35684048/
ESSENTIALAI-STEM
The Dependence of Convective Core Overshooting on Stellar Mass: A Semi-empirical Determination Using the Diffusive Approach with Two Different Element Mixtures DOI:  10.3847/1538-4357/aa8770 Publication date:  01/11/2017 Main author:  Claret, Antonio IAA authors:  Claret, Antonio Authors:  Claret, Antonio;Torres, Guillermo Journal:  The Astrophysical Journal Refereed:  Yes Publication type:  Article Volume:  849 Pages:  18 Abstract:  Convective core overshooting has a strong influence on the evolution of stars of moderate and high mass. Studies of double-lined eclipsing binaries and stellar oscillations have renewed interest in the possible dependence of overshooting on stellar mass, which has been poorly constrained by observations so far. Here, we have used a sample of 29 well-studied double-lined eclipsing binaries in key locations of the H─R diagram to establish the explicit dependence of {f}<SUB>{ov</SUB>} on mass, where {f}<SUB>{ov</SUB>} is the free parameter in the diffusive approximation to overshooting. Measurements of the masses, radii, and temperatures of the binary components were compared against stellar evolution calculations based on the MESA code to infer semi-empirical values of {f}<SUB>{ov</SUB>} for each component. We find a clear mass-dependence such that {f}<SUB>{ov</SUB>} rises sharply from zero in the range 1.2{--}2.0 {M}<SUB>ȯ </SUB>, and levels off thereafter up to the 4.4 {M}<SUB>ȯ </SUB> limit of our sample. Tests with two different element mixtures indicate the trend is the same, and we find it to also be qualitatively similar to the one established in our previous study with the classical step-function implementation of overshooting characterized by the free parameter {α }<SUB>{ov</SUB>}. Based on these measurements, we infer an approximate relationship between the two overshooting parameters of {α }<SUB>{ov</SUB>}/{f}<SUB>{ov</SUB>}=11.36+/- 0.22, with a possible dependence on stellar properties. Database:  ADS URL:  https://ui.adsabs.harvard.edu/#abs/2017ApJ...849...18C/abstract ADS Bibcode:  2017ApJ...849...18C Keywords:  binaries: eclipsing;convection;stars: evolution;stars: interiors
ESSENTIALAI-STEM
Peter Kerr (water polo) Peter Kerr, AM, is an Australian water polo sports official best known for taking the Judge's Oath at the 2000 Summer Olympics in Sydney. He also was an official for the water polo events at the 1996 Summer Olympics in Atlanta, along with being a referee at the 2000 Games in Sydney. Kerr served as section manager of the Australian team for the 1988 Summer Olympics in Seoul. A lawyer from Sydney, Kerr serves as president of Australian Water Polo, Inc., a position he has held since 1996. In 2008, he was named a Member of the Order of Australia for "service to water polo as a player, referee, coach and administrator, and to the community, particularly through executive positions with a range of sporting and charitable organisations ". In 2011, he was inducted into the Water Polo Australia Hall of Fame.
WIKI
RPT-JGB short-sellers in grip of short squeeze fear as BOJ deadline looms (Repeats Wednesday story with no changes) * Short-squeeze feared on 2-year JGBs in Thursday auction * 2-year bonds are scarce as BOJ owns 87 percent on them * Traders fear chaotic volatility at the short end By Hideyuki Sano TOKYO, Sept 14 (Reuters) - The Bank of Japan faces an early test of the limits of its radical stimulus programme on Thursday, when a small corner of the Japanese bond market may run out of bonds to sell, forcing those shorting the debt into a “squeeze,” scrambling to buy them at any price. The crunch could come in a 2.5 trillion yen ($24 billion) 352nd issue of two-year Japanese government bonds (JGBs) expiring next May. Though it is only a small part of the $10 trillion JGB market, two-year bonds are dominated by the central bank’s massive asset purchases and could offer global investors a glimpse of what might happen when the Bank of Japan (BOJ) runs out of policy options. The BOJ has been buying bonds of all maturities since 2013 as part of measures aimed at spurring economic activity. Three years later the economy is still floundering and the BOJ’s bond purchases have siphoned liquidity out of the market to the point where it now owns 87 percent of two-year bonds, making it one of the scarcest JGBs for investors. “Clearly the shortage of certain JGB issues exemplifies falling liquidity in the market. And it will only get worse,” said Naoya Oshikubo, a yen rates strategist at Barclays. This scarcity affects short sellers who borrow JGBs and then sell them, with a view to buying them back at a profit when they have to deliver on the trade. With virtually no two-year bonds on offer, these short sellers have been relying on a BOJ lending scheme since July 5 that allows them to borrow bonds from any particular issue for up to 50 business days. The problem is that the 50-day deadline passed on Wednesday and Thursday’s auction will be on the 51st business day, meaning some borrowers can no longer rely on the BOJ’s scheme. Short sellers may have to buy back the bonds at a prohibitively high price. Or they could rely on another BOJ special scheme that allows them to keep borrowing - at a very high cost - for another 21 days. This suggests an instant scarcity of the debt on Thursday and chaotic moves in one- and two-year notes. The Bank of Japan could not be immediately reached. Any immediate impact will likely be limited to this slice of the market, but it is a problem that the Bank of Japan will face across the curve if it continues its bond buying, market players say. Central bank Governor Haruhiko Kuroda insists there are no limits on the BOJ’s policy, but the bank’s 80 trillion yen a year of JGB purchases means it now owns almost 40 percent of JGBs. That is expected to rise above 50 percent next year and to 75 percent by 2020. “It’s impossible for the BOJ to increase buying in two-year bonds. Even if you want to buy two-year JGBs, there aren’t bonds available for you,” said Tadashi Matsukawa, head of fixed income investments at PineBridge Investments in Tokyo. The shortage of short-term bonds gives a twist to the Bank of Japan’s reported plan to try to steepen the yield curve to reduce the damage to financial institutions from the BOJ’s negative interest rates. A steeper curve helps banks’ loan business because they borrow short-term and lend long-term. The most obvious way for the BOJ to steepen the yield curve would be to increase buying in short-term notes while reducing purchases of long-dated bonds, but that move would worsen the chronic scarcity of some two-year bond issues. Given the risk of further deterioration in liquidity, some market players also expect the BOJ to relax its bond lending scheme at its next policy meeting on Sept 20-21. Sources have told Reuters in recent days that the BOJ will consider making negative interest rates the centrepiece of future monetary easing and are mulling ways to widen the gap between short- and long-term interest rates. ($1 = 103.1700 yen) (Additional reporting by senior IFR analyst Takahiro Okamoto; Editing by Eric Meijer and Nachum Kaplan)
NEWS-MULTISOURCE
Stalin and Lenin are the two main cults that redefined Russia’s culture. The Lenin cult was an organization of the political class that was anchored on dictatorship. The working class held more power than others. Unlike the Stalin cult, each leader was portrayed as a true Leninist characterized by the rejection of religion and observation of dictatorship. The Stalin cult, on the other hand, centered on propaganda. The media, in particular, played a vital role in popularizing Stalin’s image across the country. Unlike the Lenin cult, Stalin was the focal point through which all loyal leaders redeemed their power. For instance, leaders had to worship Stalin than they did with their respective religions. Moreover, in both cults, political power was perceived as more important than religion.
FINEWEB-EDU
Odo the Good Marquis Odo (or Eudes) the Good Marquis (fl. 11th century), sometimes called Odobonus, was a Norman or Lombard nobleman who ruled an unknown region of southern Italy. He married Emma, a daughter of Robert Guiscard, and they had at least three sons, Tancred and William, both famous crusaders, and Robert, as well as a daughter (name unknown) who married Richard of Salerno. Odo is known only in connection to his wife and sons. Name and nickname The only source to give Tancred's father the name Odo is Orderic Vitalis, who, like Ralph of Caen, believes him to be a brother-in-law and not son-in-law of Guiscard. In one passage he writes that, seeing his end coming, "the magnanimous Robert [Guiscard], duke, count, etc., called around him Odo the Good, the marquis, his sister's [husband], and other relatives and nobles". When Orderic later lists the crusaders of 1096, he mentions "Tancred, son of the marquis Odo the Good". Orderic's known erudition, and his contemporaneity with Tancred, make his testimony the best available on the latter's paternity. Only on the parentage of Odo's wife, Emma, does Orderic seem mistaken. Since Tancred and his brother William were both young at the time of the First Crusade, it is unlikely that their mother could have been a daughter of Tancred's namesake, Tancred of Hauteville. Evelyn Jamison identifies Tancred's father with the margrave Odobonus who witnessed a document issued by Count Roger I of Sicily at Palermo in 1094 and with the Odobonus Marchisus who appears in a lawsuit of 1097, now archived at Agrigento. A third reference, to Othonus, who commanded a division of Count Roger's at Taormina in 1078, may also be to Tancred's father. Paulin Paris suggested that Tancred's father's real name was the Arabic Maḳrīzī, corrupted into Marchisus. He argued that Tancred's father was in fact a south Italian Arab and put forward as his evidence the Chanson d'Antioche (c. 1180), which calls Tancred fils a l'Asacant and fils a l'Amirant (son of the emir). This theory does not have wide support. Jamison suggests that Tancred is so-called simply because he knew Arabic. Rank of marquis There are many sources that identify Tancred's father as a margrave (Latin marchio or marchisus, whence marquis), but do not name him. The rank of marquis was unknown in Normandy at the time and this suggests that Odo was Italian, possibly a Sicilian or Lombard, although the title was most common in northern Italy. Some north Italians are known to have settled in the south with the Normans. Many sources also identify a brother of Tancred's named William who was also a "marquis's son". According to William of Tyre, "Tancred [was] the son of William the Marquis", but the Latin word filium (son) is probably an error by later copyists where originally it read fratrem (brother). That Tancred possessed a brother named William is affirmed by the Gesta Dei per Francos, which records a "William, son of the marquis, brother of Tancred" among the followers of their uncle, Bohemond of Taranto, on the First Crusade. In that same document Tancred is referred to only as "the marquis's son". Robert the Monk, listing the crusaders who accompanied Bohemond, mentions "the most noble princes, namely Tancred, his [i.e., Bohemond's] nephew and the marquis's son. . .", confirming his father's rank but not his name. The archbishop Baldric of Dol records, with more proper Latin, that Tancred was Robert Guiscard's grandson and the son of a marquis. He also calls Tancred's brother William a marquis (marchisus). Guibert of Nogent, expressing some doubt that he has all his information correct, says that Tancred was the son of a certain marquis, accompanied his uncle Bohemond on the First Crusade, and that his brother William accompanied Hugh the Great. Marriage and sons There are other sources pertinent to the identity of Tancred's father, since they mention his relation to Bohemond through the latter's sister Emma. Albert of Aix, a contemporary, confirms that Tancred was a son of Bohemond's sister, but does not mention either his father or brother. He does, however, mention that Roger of Salerno was a "son of Tancred's sister", who must therefore have been the wife of Richard of Salerno. Marino Sanuto the Elder records that Tancred was Bohemond's "nephew by his sister". Two sources contradict the former, erroneously making Tancred a cousin and not a nephew of Bohemond, but do not name his father. The Gesta Francorum Iherusalem peregrinantium of Fulcher of Chartres calls him "Bohemond's cousin" and Jacques de Vitry refers to "Bohemond with his cousin Tancred". Tancred's earliest biography, Ralph of Caen's Gesta Tancredi (Deeds of Tancred), praises him as "the most famous son of a famous lineage, [having] choice parents, the margrave and Emma". He was "the son indeed of a father not in the least ignoble", even though this father remains unnamed by Ralph and most other authors. Throughout the Gesta Ralph calls Tancred Marchisides, using the Greek suffix -ides, meaning "son of", thus "son of the marquis". Elsewhere he lumps together Tancred and Bohemond as Wiscardides ("sons/descendants of Guiscard"), even though he mistakenly believed Emma to have been a sister and not a daughter of Robert Guiscard. He also gives Tancred a brother named Robert, otherwise unknown: "the Guiscardids, Tancred and his brothers William and Robert".
WIKI
Talk:Chess Opening Theory/1. e4/1...e5/2. Nf3/2...Nc6/3. Bc4/3...Nf6/4. Ng5/4...d5/5. exd5/5...Nxd5/6. Nxf7 why ? Why are there more details (more follow-up moves) concerning this very variant on the much more general page [/4. Ng5] than here? MFH (discuss • contribs) 01:35, 19 February 2023 (UTC)
WIKI
George Woodcock George Woodcock (May 8, 1912 – January 28, 1995) was a Canadian writer of political biography and history, an anarchist thinker, a philosopher, an essayist and literary critic. He was also a poet and published several volumes of travel writing. In 1959 he was the founding editor of the journal Canadian Literature which was the first academic journal specifically dedicated to Canadian writing. He is most commonly known outside Canada for his book Anarchism: A History of Libertarian Ideas and Movements (1962). Life Woodcock was born in Winnipeg, Manitoba, but moved with his parents to England at an early age, attending Sir William Borlase's Grammar School in Marlow and Morley College. Though his family was quite poor, Woodcock's grandfather offered to pay his tuition if he went to Cambridge University which he turned down due to the condition that he undertake seminary training for the Anglican clergy. Instead, he took a job as a clerk at the Great Western Railway and it was there that he first became interested in anarchism. He was to remain an anarchist for the rest of his life, writing several books on the subject, including Anarchism, the anthology The Anarchist Reader (1977), and biographies of Pierre-Joseph Proudhon, William Godwin, Oscar Wilde and Peter Kropotkin. It was during these years that he met several prominent literary figures, including T. S. Eliot and Aldous Huxley, and forging a particularly close relationship with the art theorist Herbert Read. Woodcock's first published work was The White Island, a collection of poetry, which was issued by Fortune Press in 1940. Woodcock spent World War II working as a conscientious objector on a farm in Essex, and in 1949, moved to British Columbia. "As a proponent of civil disobedience in accordance with Henry David Thoreau, he followed the principles of Leo Tolstoy, M.K. Gandhi and Dr. Martin Luther King, Jr. As a pacifist, he dismissed the "folly" of revolutionary violence while emphasizing the need for the convergence of ends and means to prevent a new authoritarianism." At Camp Angel in Oregon, a camp for conscientious objectors, he was a founder of the Untide Press, which sought to bring poetry to the public in an inexpensive but attractive format. Following the war, he returned to Canada, eventually settling in Vancouver, British Columbia. In 1955, he took a post in the English department of the University of British Columbia, where he stayed until the 1970s. Around this time he started to write more prolifically, producing several travel books and collections of poetry, as well as the works on anarchism for which he is best known in collaboration with Ivan Avakumović. Towards the end of his life, Woodcock became increasingly interested in what he saw as the plight of Tibetans. He traveled to India, studied Buddhism, became friends with the Dalai Lama and established the Tibetan Refugee Aid Society. With Inge, his wife, Woodcock established Canada India Village Aid, which sponsors self-help projects in rural India. Both organizations exemplify Woodcock's ideal of voluntary cooperation between peoples across national boundaries. George and Inge also established a program to support professional Canadian writers. The Woodcock Fund, which began in 1989, provides financial assistance to writers in mid-book-project who face an unforeseen financial need that threatens the completion of their book. The Fund is available to writers of fiction, creative non-fiction, plays, and poetry. The Woodcocks helped create an endowment for the program in excess of two million dollars. The Woodcock Fund program is administered by the Writers' Trust of Canada and by March 2012 had distributed $887,273 to 180 Canadian writers. George Woodcock died at his home in Vancouver, British Columbia, Canada, on January 28, 1995. Orwell Woodcock first came to know George Orwell after they had a public disagreement in the pages of the Partisan Review. In his "London Letter" published in the March–April 1942 issue of the review, Orwell had written that in the context of a war against fascism, pacifism was "objectively pro-fascist". As the founder and editor of Now, an "anti-war paper" which Orwell had mentioned in his article as an example of publications that published contributions by both pacifists and fascists, Woodcock took exception to this. Woodcock stated that "the review had abandoned its position as an independent forum", and was now "the cultural review of the British Anarchist movement". Despite this difference, the two became good friends and kept up a correspondence until Orwell's death, and Now would publish Orwell's article "How the Poor Die" in its November 6, 1946 issue. Woodcock and Orwell would both also be active members of the Freedom Defence Committee. Woodcock later wrote The Crystal Spirit (1966), a critical study of Orwell and his work which won a Governor General's Award. The title is taken from the last line of the poem written by Orwell in memory of the Italian militiaman he met in Barcelona in December 1936 during the Spanish Civil War, a meeting Orwell describes in the opening lines to Homage to Catalonia (1938). Recognition Woodcock was honoured with several awards, including a Fellowship of the Royal Society of Canada in 1968, the UBC Medal for Popular Biography in 1973 and 1976, and the Molson Prize in 1973. In 1970, he received an honorary doctorate from Sir George Williams University, which later became Concordia University. However, he only accepted awards given by his peers, refusing several awards given by the Canadian state, including the Order of Canada. The one exception was the award of the Freedom of the City of Vancouver, which he accepted in 1994. He is the subject of a biography, The Gentle Anarchist: A Life of George Woodcock (1998) by George Fetherling, and a documentary George Woodcock: Anarchist of Cherry Street by Tom Shandel and Alan Twigg. Selected bibliography * Anarchy or Chaos – 1944 * William Godwin: A biographical study – 1946 * The Incomparable Aphra – 1948 * The Anarchist Prince: A Biographical Study of Peter Kropotkin – 1950 (with Ivan Avakumović) * Ravens and Prophets – 1952 * Pierre-Joseph Proudhon – 1956 * To the City of the Dead: An Account of Travels in Mexico – 1957 * Incas and Other Men: Travels in the Andes – 1959 * Anarchism: A History of Libertarian Ideas and Movements – 1962 * Faces of India: A Travel Narrative – 1964 * Asia, Gods and Cities: Aden to Tokyo – 1966 * The Crystal Spirit: A Study of George Orwell – 1966 * The Greeks in India – 1966 * Kerala: A Portrait of the Malabar Coast – 1967 * The Doukhobors – 1968 (with Ivan Avakumovic) * Henry Walter Bates: Naturalist of the Amazons – 1969 * The British in the Far East – 1969 * The British in the Middle East – 1970 * The Hudson's Bay Company – 1970 * Canada and the Canadians – 1970 * Into Tibet: The Early British Explorers – 1971 * Victoria – 1971 * Gandhi – Fontana Modern Masters, 1972 * Dawn and the Darkest Hour: A Study of Aldous Huxley – 1972 * The Rejection of Politics and Other Essays on Canada, Canadians, Anarchism and the World – 1972 * Herbert Read: The Stream and the Source – 1973 * Who Killed the British Empire?: An Inquest – 1974 * Amor de Cosmos: Journalist and Reformer – 1975 * Gabriel Dumont: The Métis Chief and his Lost World – 1975 * South Sea Journey – 1976 * Peoples of the Coast: The Indians of the Pacific Northwest – 1977 * The Anarchist Reader – 1977 (editor) * Anima, or, Swann Grown Old: A Cycle of Poems – 1977 * Two Plays – 1977 * Thomas Merton Monk And Poet – A Critical Study – 1978 * The World of Canadian Writing: Critiques and Recollections – 1980 * 100 Great Canadians – 1980 * Confederation Betrayed! – 1981 * The Meeting of Time and Space: Regionalism in Canadian Literature – 1981 * Taking it to the Letter – 1981 * Letter to the Past: An Autobiography – 1982 * Orwell's Message: 1984 & the Present – 1984 * Strange Bedfellows: The State and the Arts in Canada – 1985 * The University of British Columbia: A Souvenir – 1986 (with Tim Fitzharris) * Northern Spring: The Flowering of Canadian Literature in English – 1987 * Caves in the Desert: Travels in China – 1988 * The Purdy-Woodcock Letters: Selected Correspondence, 1964–1984 – 1988 * William Godwin: A Biographical Study – 1989 * A Social History of Canada – 1989 * Powers of Observation – 1989 * Oscar Wilde: The Double Image – 1989 * The Century that Made Us: Canada 1814–1914 – 1989 * British Columbia: A History of the Province – 1990 * Tolstoy at Yasnaya Polyana & Other Poems – 1991 * Anarchism and Anarchists: Essays – 1992 * The Cherry Tree on Cherry Street: And Other Poems – 1994 * Marvellous Century: Archaic Man and the Awakening of Reason – 2005
WIKI
User:Lucian Virgil Lucian Virgil (born June 03, 1978 in Bacau) is a Romanian Economist. He attended Academy of Economic Studies in Bucharest where he learned the art of bookkeeping. Interests Football, Cooking,
WIKI
LLMs for HPC Large Language Models (LLMs) are increasingly demonstrating their ability to improve the software development process. Because of this there has been a recent explosion in tools and research that target integrating LLMs into code development processes and even creating new types of tools. Incorporating these approaches into HPC, parallel, and scientific code development has the potential to drastically improve the quality and quantity of software in these fields moving forward. However, HPC code has different concerns and priorities than other areas of computer science, such as a larger emphasis on performance, parallelism, and fidelity. Likewise special attention is needed when designing LLM-based tools for HPC, so that these priorities remain integral in the design. Our research focuses on evaluating the state-of-the-practice when applying LLMs to parallel coding tasks, improving LLMs at these tasks, and creating LLM-powered developer tools for HPC. These projects can be found in several of our recent publications [1-4] and the Parallel Code Foundry github organization. ParEval: Evaluating LLM Capabilities for Parallel Code Generation A crucial step towards creating HPC-specific LLMs is being able to evaluate an LLM’s capabilities on HPC tasks. It is further helpful to identify the shortcomings of current state-of-the-art models to find areas where improvement is needed. In order to conduct this evaluation we created the ParEval benchmark. ParEval is a set of 420 code generation problems ranging across 7 execution models and 12 different computational problem types. Alongside ParEval we also introduced novel metrics for understanding the runtime performance and scaling behavior of LLM generated code. The plot on the right shows the ParEval pass@1 scores for both serial and parallel code generation for several state-of-the-art open and closed-source LLMs. ParEval Results A higher pass@1 score indicates the model more frequently generates correct code across the benchmark. We immediately see that, while some models are better than others, all of the LLMs are much worse at generating parallel code than they are serial. Unfortunately, we also observe that commercial LLMs generate parallel code much better than open-source LLMs. This motivates the need for open-source LLMs that can generate parallel code well and can compete with commercial models. An up-to-date list of model scores is available on the ParEval Leaderboard. You can find more details on ParEval and an extensive analysis of the results in our HPDC ‘24 paper “Can Large Language Models Write Parallel Code?” [4]. The prompts and source code for ParEval are available at github.com/parallelcodefoundry/ParEval. Improving LLMs for HPC Tasks Based on the results across the ParEval benchmark we know that current state-of-the-art LLMs are bad at generating correct and efficient parallel code. To address these shortcomings we have introduced two fine-tuning methodologies for creating HPC-specific code LLMs [1,3] and aligning the output space of current code LLMs with performance so that they generate faster code [2]. The first of these efforts introduced HPC-Coder, an LLM fine-tuned on HPC data and evaluated on several HPC development tasks. We demonstrated how fine-tuning existing code LLMs on large datasets of HPC code can improve their ability to write HPC and parallel code. This fine-tuned model was further evaluated on the tasks of labeling for-loops with OpenMP pragmas and predicting performance regressions across git commits. You can read more about how HPC-Coder was trained and evaluated in our ISC ‘24 paper “HPC-Coder: Modeling Parallel Programs using Large Language Models” [3]. Developers most often parallelize code to obtain better performance meaning parallel code that is correct, but inefficient is not of much use. RLPF Since ParEval showed us that LLMs can often generate inefficient parallel code we developed a technique called RLPF for fine-tuning LLMs to generate faster code. RLPF is inspired by the popularity of reinforcement learning human feedback (RLHF) where reinforcement learning (RL) is used to align LLMs with human preferred outputs. We adapt this approach to use RL to align code LLMs with faster outputs. An overview of our RLPF approach is displayed on the left. We were able to accomplish this by combining a large coding contest dataset with synthetically generated data to obtain a large, general performance dataset. Reward Model Using this data we trained a code performance reward model and used it, in conjunction with performance tests, as a reward function in our RL training. An overview of the reward model training is depicted on the right. RLPF fine-tuning was able to improve the expected performance of generated code from the Deepseek Coder LLMs across a variety of tasks. You can read more about RLPF and find a detailed analysis of our results in our arxiv paper “Performance-Aligned LLMs for Generating Fast Code” [2]. In this paper we further explored other performance alignment fine-tuning methods and also evaluated the LLMs on their performance optimization capabilities. Related Publications [1] Daniel Nichols et al, "Modeling Parallel Programs using Large Language Models", Proceedings of the International Conference for High Performance Computing, Networking, Storage and Analysis, SC ’23, November 2023 [2] Daniel Nichols et al, "Performance-Aligned LLMs for Generating Fast Code", arXiv. 2404.18864. [3] Daniel Nichols et al, "HPC-Coder: Modeling Parallel Programs using Large Language Models", [4] Daniel Nichols et al, "Can Large Language Models Write Parallel Code?", Proceedings of the 33rd International Symposium on High-Performance Parallel and Distributed Computing
ESSENTIALAI-STEM
Jury picked for trial of Trump campaign boss Paul Manafort A jury of six men and six women was selected Tuesday for the federal criminal trial of former Trump presidential campaign chief Paul Manafort slightly less than four hours after it began. Opening arguments in the case were scheduled to begin later Tuesday afternoon in U.S. District Court in Alexandria, Va., after the jury, along with three female alternates and one male alternate, receive instructions in their duties by the trial judge. Jury selection began Tuesday morning after Manafort, 69, was brought to court from a jail where he is being held without bail on charges lodged by special counsel Robert Mueller related to the money he made consulting for a pro-Russia political party in Ukraine from 2005 to 2014. The longtime Republican lobbyist — who is accused of multiple counts of bank fraud and tax crimes that could send him to prison for decades if he is convicted — traded his jailhouse jumpsuit for a black suit, white dress shirt and silver tie before he walked into the dimly lit courtroom. He has pleaded not guilty in the case. Prosecutors and defense lawyers had in total 20 "strikes" that they could use to eliminate potential jurors from the pool of 65 or so who were questioned by both sides and Judge T.S. Ellis III on Tuesday. They used nearly all of those strikes in a series of rounds, during which Ellis became noticeably impatient with how long each side was taking to decide whom to eliminate. "Let''s expedite this now," Ellis urged the lawyers at one point.  Just before the jury selection process began, Manafort turned around while seated at the defense team's table and gave his wife Kathleen a slight smile and a wink of his eye before about 65 potential jurors were led into the room. "Nothing you do as an American citizen is more important than jury duty," Ellis told that group of mostly white area residents. Outside the courthouse, about a dozen protesters heralded the beginning of the trial. They held signs calling Manafort a "traitor" and taunting: "Trump wouldn't do time for you." "Was the $18K karaoke machine worth it?" asked one sign held by a protester, a reference to Manafort's purchase of a singalong machine for his Hamptons beach home with some of the $60 million or so he allegedly squirreled away in offshore bank accounts and did not report to the IRS. "Resist thin-skinned demagogues," another sign suggested. Manafort's case, the first brought by Mueller to go to trial, has received heavy media attention, because of his role in the Trump campaign, and because of speculation that the special counsel is using the charges to "squeeze" Manafort into cooperating with a probe of President Donald Trump. Trump's lawyer, Rudy Giuliani, told CNN on Monday that Manafort "has no information incriminating of the president." "I know that for a fact," Giuliani said. "They can squeeze him — he doesn't know anything." The would-be jurors previously had submitted answers to written questions about their awareness of the case against Manafort, which is unrelated to his work leading the Trump campaign for three months in 2016. Nearly 40 prospective jurors had been booted from the pool because of the answers they gave. Ellis on Tuesday asked the remaining group how many of them had a connection to either the U.S. Justice Department or the U.S. attorney's office, the prosecuting agencies for the federal government. Nine people raised their hands, but each of them told the judge under questioning that they would not be influenced by their connections. When one woman among the group anticipated Ellis asking her if she could be fair before the judge could get the question fully out, Ellis quipped, "I know I'm predictable." "My wife says it's one of my only virtues," he added. Ellis, prosecutors and Manafort's defense lawyers then began questioning individual jurors after 10 a.m. The questions posed and answers given were not audible to others in the courtroom because of a white-noise machine activated whenever one of the jurors was called up to the judge and lawyers. Manafort is scheduled to go on trial in federal court in Washington in September on separate charges that are also related to his work in Ukraine.
NEWS-MULTISOURCE
Chambers–Morgan Farm The Chambers–Morgan Farm is a historic farm and national historic district located near White Store, Anson County, North Carolina, United States. It includes four contributing buildings, three contributing sites, and six contributing structures. They include the Greek Revival style Chambers–Morgan House (1829); blacksmith shop, "light house", car shed (1930s), two corn cribs (c. 1910), barn (c. 1910), cemetery (1830–1866), well, pump house (c. 1940), two ponds, and the farm landscape. It was listed on the National Register of Historic Places in 1996.
WIKI
does python support call by reference Does Python support call by reference? In Python, there is no direct support for call by reference. However, it supports passing objects by reference. What is call by reference? Call by reference is a method in which the reference (address) of the variable is passed to the function, and any changes made to the value of the parameter inside the function will reflect in the original variable. What is passing objects by reference? Passing objects by reference means that a reference (address) to the object is passed to the function, and any changes made to the object inside the function will reflect in the original object. How does Python support passing objects by reference? In Python, everything is an object. When an object is passed to a function, a reference to the object is passed. The reference is a pointer to the memory location of the object. def change_list(a_list): a_list.append(4) my_list = [1, 2, 3] change_list(my_list) print(my_list) # Output: [1, 2, 3, 4] In the above code, we passed a list object to the function change_list(). Inside the function, we appended another element to the list. This change is reflected in the original list because we passed the reference to the list object. What about immutable objects? Immutable objects, such as strings and tuples, cannot be changed once they are created. So, passing them by reference does not make sense. However, we can still simulate call by reference for immutable objects by wrapping them in a mutable container, such as a list or a dictionary. def change_string(a_list): a_list[0] = "new string" my_string = "old string" string_list = [my_string] change_string(string_list) my_string = string_list[0] print(my_string) # Output: "new string" In the above code, we passed a list containing a string object to the function change_string(). Inside the function, we changed the first element of the list to a new string. This change is reflected in the original string because we wrapped it in a mutable container.
ESSENTIALAI-STEM
How do I convert a Word document to Excel online? How do I convert a Word document to Excel online? How To Convert Word To Excel Online 1. Access the Smallpdf Document Converter. 2. Upload the Word file, wait for the initial Word to PDF conversion. 3. Download the file, upload it to the tool again. 4. Now, choose the option to convert it to Excel. 5. And that’s it—download your Excel sheets to view, analyze and edit. How do I convert a Word document into Excel? Replies (1)  1. Open the Word document you want to convert to an Excel worksheet and click File or Office Button > Save As. 2. Select a location you want to put and select Plain Text from the drop down list of Save as Type. 3. Click Save, then click OK to close the File Conversion dialog. 4. Now open Excel and select Data. How do I convert a Word document to Excel and keep formatting? Select a cell in the spreadsheet, and then press the Ctrl + V hotkey to paste the table. Then you can click a Ctrl box to open further pasting options, as in the snapshot directly below. You can select either a Keep Source Formatting or Match Destination Formatting option. How do you export Microsoft Word to excel? How to export word doc to excel. Click Copy on the Standard toolbar. Switch to your Microsoft Excel worksheet. Click in the upper-left corner of the worksheet area where you want to paste the table. Cells from the copied table replace any existing cells in the area. Click Paste . To adjust the formatting, click Paste Options next to the data,… How do I convert an Excel file into word? Inserting an Excel Chart into Word In Excel, click a chart to select it, and then press Ctrl + C to copy it. In Word, press Ctrl + V to paste the chart. Choose your paste options. Click Chart (linked to Excel data) so that the chart will be updated when the Excel file is updated. How to export Excel to word? Copy the Excel data. In Excel, click and drag to select the content you’d like to put in the Word document, and then press Ctrl+C. • In Word, paste the Excel data. • Choose your paste option. • Click Keep Source Formatting to use the Excel table style. • Click Match Destination Table Style to use the Word table style. • Create a linked Excel table. • How do you transfer a word table to excel? Open a new or existing document in Microsoft Word. Click the “Insert” tab > Locate the “Tables” group. Select the “Table” icon > Choose the “Insert Table…” option. Set the “Number of columns,” “Number of rows,” and “AutoFit behavior” to your desired specifications > Click [OK].
ESSENTIALAI-STEM
Page:Cornelia Meigs--The Pool of Stars.djvu/217 day be friends. It was a close-pressing throng as she came to the entrance of the main building where she must go in, so that she had to mount slowly, step by step, to the door. She could look back, down the straight walk, under the arch, through the great gate opposite to where, far beyond, a similar group was pressing into a similar doorway. For a fleeting second she felt a little lonely, a little homesick, before such sensations were carried away in the rush of excited thought of all that was in store for her. She was glad that she could still see David's red head from afar and that it was the last thing of which she caught a glimpse, just as the hastening crowd swept her across the threshold and into a new world.
WIKI
28 Jan 2020 How to Keep Your Website Secure Against Brute Force Attacks Article by Miguel Santico Graphics Design by Kirsten Tumbokon The internet and its growth over the years have led to a new avenue for a crime. Cybercrime is so rampant that in the UK, it accounts for over 50% of criminal activity. According to the University of Maryland, computers and networks are attacked at least once every 39 seconds. Another statistic from Imperva’s 2019 Cyberthreat Defense Report states that 78% of the organizations that were surveyed were affected by a successful cyberattack in 2018. With a threat as constant and persistent as cyber-attacks, website security is an absolute must. One of the most common kinds of cyber attacks is the brute force attack, which was said by SC magazine, a cyber-security source, to have increased by 400% in 2017. This alarming number makes brute force attacks one of the top priority cybercrimes to be wary of. This article tackles what a brute force attack is, why it’s important to know what it is, how it happens, and how to prevent it from happening to your website. What is a Brute Force Attack? A brute force attack is the simplest method to gain access to a website, server, or anything password protected. This is a method where hackers make repetitive successive attempts of trying various password combinations to try and break into a website. It is a trial and error hacking approach. According to Techopedia, the reason behind the term brute force attack is the amount of effort and resources that go into this method. It takes time, force, and tools to properly launch a brute force attack. Trying to hack into a friend’s Facebook account by guessing his password, for example, can be considered a brute force attack. How Brute Force Attack Happens Although it is the simplest hacking method, it is not something that can be done by just anyone. Since most websites or servers require passwords that are at least eight characters long, there are enough password combinations to make the hacking process last longer than a lifetime. So although it is the simplest hacking method, it still takes knowledge and skill to execute. Hackers make use of computers and supercomputers to write code and can develop powerful computing engines via software that function as password breaking or cracking programs. These programs and engines are what make it possible to make a successful brute force attack. Computers can reduce hacking time significantly, but the process would still take longer than a lifetime. With supercomputers though, brute force attacks can happen within a minute. In light of the fact that hackers invest time, effort and resources into brute force attacks and that they happen on a daily basis, it is important to take the necessary precautions that can help prevent these attacks from happening to your website. Below are 7 things you can and should do to protect your website from brute force attacks. 7 Ways to Prevent Brute Force Attacks 1. Lengthen Your Password How to Fight Brute Force Attacks - Lengthen Your Password Image There’s a reason why most websites require you to come up with a password that is at least 8 characters long. Compared to a password that is just 5 or 6 characters long, the number of possible combinations with an 8-character long password is naturally greater. This makes the process of brute force attacks harder and more time consuming, making it more difficult for hackers to become successful in their attempt to break into your website. The longer the password, the better. 2. Increase Password Complexity How to Secure Your Website Against Brute Force Attacks | Increase Password Complexity Image Having a lengthy password, however, isn’t an end-all solution. A password might be long, but if it is as simple as ‘password1234,’ then it is more likely for hackers to be able to break into a website. Of course, this is a terrible example, but the fact is that there are still people out there who use passwords as predictable and lazy as that. To create a more complex password, be sure to make use of both lower and upper case letters, numbers and special characters. This delays the hacking process and makes it more difficult because the characters you use are not typical and obvious. 3. Limit Login Attempts Limit Login Attempts Image This is one of the most effective ways to prevent brute force attacks from happening to your website. It prohibits hackers from being able to make an infinite amount of attempts, disabling them from even having the chance to hack into your website. After a certain amount of failed login attempts, your website should block the IP address that made those attempts. This puts hackers in cuffs because although they might have the tools to break into your website, they will no longer have the opportunity to use those tools. 4. Limit Access Limit Access Image Even more effective is giving website access to only those who you trust or work with. By not allowing hackers to make a single attempt at logging into your website, it cuts them off at the start. This can be done by modifying the .htacess file in your WordPress site. The purpose is to allow only certain IP addresses to have access to wp-admin, meaning only those you choose to allow to log in to the website can do so. 5. Make Use of Captcha Make Use of Captcha Image We have all experienced Captcha while trying to access a website. It might be a little troublesome for those who are trying to log in or gain access, but that’s exactly what website owners installed it for. The reason that we have to prove through Captcha that we really are human and not robots is that the purpose of Captcha is to prevent bots from executing automated scripts mainly used in brute force attacks. 6. Two Factor Authentication Two Factor Authentication Two Factor Authentication provides an additional layer of defence behind passwords. These are the personal questions that come up after entering the correct username and password like, ‘What was the name of your first pet?’ This is a great weapon to arm your website with to fight against brute force attacks because although hackers might have the tools to crack your password, it is almost impossible for them to correctly guess something that is personal to you. 7. Engage a Professional Web Development Agency Engage a Professional Web Development Agency Web development agencies are greatly aware and familiar with brute force attacks and malware in general. With experience and knowledge in anything web, they are experts in identifying, preventing and managing brute force attacks and more. Investing in the security advice and solutions that a professional web development agency can offer will result in the safety of your website and its thriving. How Verz Can Help You Against Brute Force Attacks With 10 years of web experience, Verz Design is more than capable of dealing with brute force attacks – we are professionals. With Verz vSecure, you can rest assured that your website is protected 24/7 by top-notch security. It is a strong wall of defence against malware threats and specifically, brute force attacks. We consider ourselves experts in dealing with malware and guarantee only the best defence against brute force attacks. Learn more about Verz vSecure and put your heavy defence today! Call us at 6841 1680 or email us at [email protected] for a free consultation!
ESSENTIALAI-STEM
She Loves You (The Twilight Singers album) She Loves You is the third full-length album by The Twilight Singers and their first covers album. It contains covers from various kinds of music, ranging from jazz and blues to soul and R&B to rock and trip hop, and by artists John Coltrane, Skip James, Marvin Gaye, Mary J. Blige, Fleetwood Mac and Björk. She Loves You was released in 2004 by One Little Indian Records. Food and music website Turntable Kitchen describes The Twilight Singers' takes on the source material as "lusty, smoky and simmering." Track listing * 1) "Feeling of Gaze" (Hope Sandoval) - 2:21 * 2) "Too Tough to Die" (Martina Topley-Bird) - 4:02 * 3) "Hyperballad" (Björk) - 4:56 * 4) "Strange Fruit" (Billie Holiday) - 3:29 * 5) "What Makes You Think You're the One" (Lindsey Buckingham) - 3:46 * 6) "Real Love" (Mary J. Blige) - 4:25 * 7) "Hard Time Killing Floor" (Skip James) - 3:15 * 8) "A Love Supreme" (John Coltrane) - 2:03 * 9) "Please Stay (Once You Go Away)" (Marvin Gaye) - 4:03 * 10) "Black Is the Color of My True Love's Hair" (Traditional, arrangement Dulli) - 4:25 * 11) "Summertime" (George Gershwin) - 2:54 * 12) "Her Majesty" (Beatles) (bonus on LP release) Personnel * Greg Dulli – vocals (all songs), guitar (1, 2, 3, 4, 5, 6, 7, 8, 9, 10), piano (1, 5, 6, 9, 10), bass (3), drums (3), dobro (7), keyboards (11), melodica (11) * Manuel Agnelli - guitar (11) * Joshua Blanchard - loops (6, 9) * Scott Ford - bass (2, 4, 8, 9, 10) * Dave Hillis - Producer/Engineer, guitar (3) * Mark Lanegan - vocals (3, 4, 6, 7, 8) * Bobby Macintyre - drums (2, 4, 5, 6, 8, 9), percussion (3), vocals (6, 9) * Molly McGuire - vocals (10) * John Nooney - piano (2, 4), keyboards (3), rhodes (8, 9) * Mathias Schneeberger - Rhodes (10) * Jon Skibic - guitars (2, 3, 4, 5, 6, 8, 9, 10), lapsteel (6), vocals (9), percussion (10) * Helen Storer - vocals (3) * Michael Sullivan - bass (5, 6) * Jesse Tobias - dobro (7) * Brian Young - drums/percussion (10)
WIKI
Phaeochlaena solilucis Phaeochlaena solilucis is a moth of the family Notodontidae. It is found in Brazil, Bolivia, Ecuador and Colombia.
WIKI
Vatican hits back at Turkey for calling pope 'crusader' YEREVAN (Reuters) - The Vatican hit back on Sunday at Turkey’s depiction of Pope Francis as having a “crusader mentality” after he used the word genocide to describe the massacre of 1.5 million Armenians a century ago. “The pope is on no crusade. He is not trying to organize wars or build walls but he wants to build bridges,” spokesman Father Federico Lombardi told reporters. “He has not said a word against the Turkish people.” Addressing Armenia’s president, the government and diplomats on Friday, Francis departed from his prepared text to use the word “genocide”, a description that infuriated Turkey when he first used it a year ago. Turkey’s deputy prime minister Nurettin Canikli said on Saturday it was “very unfortunate” the pope had used the word, adding: “It is unfortunately possible to see all the reflections and traces of crusader mentality in the actions of the papacy and the pope.” Francis first used the word last year in a ceremony at the Vatican. An infuriated Turkey responded by recalling its ambassador to the Vatican and keeping him away for 10 months. The word appeared again in a joint declaration signed at the end of the trip by the pope and the head of the Armenian Church, using the same phrase that riled Turkey last year. Turkey accepts that many Christian Armenians living in the Ottoman Empire were killed in clashes with Ottoman forces during World War One, but contests the figures and denies that the killings were systematically orchestrated and constitute a genocide. It also says many Muslim Turks perished at that time. On Sunday morning, at the last main event of his three-day trip to Armenia, Francis again made reference to the massacre, paying homage to “the many victims of hatred who suffered and gave their lives for the faith”. The pope was a guest in a Christian liturgy presided over by Catholicos Karekin II, head of the Armenian Apostolic Church, which split from Rome over a theological dispute in the fifth century and is part of the Oriental Orthodox Churches. Francis sat to one side as Karekin led an elaborate service filled with chanting in the compound at Holy Etchmiadzin, the headquarters of the Armenian Church near Yerevan. The pope has urged Armenia and Turkey to seek reconciliation and to shun “the illusory power of vengeance”. The dispute about the massacres and differences over Yerevan’s support of the ethnic Armenian enclave of Nagorno-Karabakh in Azerbaijan, have led to fraught relations that include closed borders and a lack of diplomatic ties. At the trip’s last stop on Sunday before the pope was due to fly back to Rome, the two religious leaders released doves from a monastery near the Turkish border as a symbol of their hopes for peace between the countries. Reporting by Philip Pullella; Editing by Digby Lidstone
NEWS-MULTISOURCE
Talk:Bon-Bon Blanco Namida no Hurricane Shouldn't someone add that "Namida no Hurricane" was used as the 2nd GetBackers ending theme? (It's an anime, for those who don't know) * Yes, and that "someone" should be you. Also, sign your posts. <IP_ADDRESS> (talk) 18:33, 3 February 2009 (UTC)
WIKI
User:CharlieBlair/sandbox Charlie Blair (born March 31st 2006) whose real name is Sean Blair, is a music producer. He was born in Edinburgh, Scotland. Charlie first started producing his own music on June 1st 2021 and was inspired to by Laura Branigan and Mallrat.
WIKI
Adaptogens are Nature's Powerful Remedy You Didn't Know You Needed Adaptogens // Photo Credit: eskymaks/iStock/Getty Images Plus It should come as no surprise to learn that people are turning to wellness-related offerings to help deal with the mental and physical pressures of everyday life. Adaptogens, herbs and plants such as ashwagandha, ginseng, and reishi mushrooms that support the adrenal system, are making headlines thanks to their ability to help combat stress, balance hormones, boost immunity, improve energy, and more. It also doesn’t hurt that the supplements market is exploding. In fact, the global dietary supplements market is expected to reach $278.02 billion by 2024. These buzzy ingredients are turning up in powders, pills, and liquids. “A big consumer trend we are seeing is centered around natural, functional ingredients from the earth,” says Bella Tumini, senior brand manager for Suja, an organic, cold-pressed, and non-GMO beverage company. “Adaptogens are unique, highly functional ingredients used in ancient eastern medicine that are adaptable to each person’s individual needs. As an example, for one person, an adaptogen could help with stress, for another person that same adaptogen could help with fatigue.” Skincare manufacturers are also looking to these herbs to tackle a slew of skincare issues. “Adaptogens are a hot topic in skincare, because they can help promote or restore normal physiological functioning by increasing the body’s ability to resist damaging effects due to stress and environmental pollution,” says Ashley Stowers, account executive and national educator for CelleClé As more and more spa-goers seek to incorporate adaptogens into their diets, it’s important to keep in mind that the research is still somewhat limited, despite them having been used medicinally throughout the centuries. According to Como Shambhala’s Eve Persak, they should be treated as respectfully as any medication. She notes that the verdict is still out on how exactly they work, all of the body systems they affect, how they may interact with medications and other supplements, how to adjust dosage, and what side effects or allergic reactions they may cause. As a result, she recommends speaking with a healthcare provider first and always including them on any intake forms when meeting with medical clinicians, pharmacists, or dietitians. She also suggests starting with a modest dose and opting for a whole herb preparation, such as a tea or powder, which tends to offer a milder potency. Capsules often offer a more concentrated form. At Como Shambhala, Persak and her colleagues who practice Oriental Medicine and Ayurveda sometimes incorporate adaptogens into their care. “However, this is done in a bespoke, prescriptive fashion, rather than a broad collective recommendation,” says Persak. RELATED STORIES How Adaptogenic Herbs Benefit the Body The Wellness Ingredient Your Spa is Missing The Inside Scoop on Ingestible Beauty Suggested Articles The popular beauty retailer has introduced four major criteria CBD brands must meet to be sold at Sephora stores. Millennium Systems is furthering its high standards of security by becoming HIPAA compliant. 72 percent of AAFPRS members reported patients seeking cosmetic procedures to look better for their selfies.
ESSENTIALAI-STEM
0 votes 0answers 27 views HD serial at /dev/disk/by-id I am building a function that has to read the HD serial number, and it cannot run external applications or require root privileges. I am aware that I can list the contents of this folder: ... 0 votes 1answer 71 views Remove persistent devices from file browser list In my file browser, it lists all the drives and devices available for browsing. There is one that is from another OS installation, and i want to remove it from the list. Hiding devices using ... 0 votes 1answer 123 views How can I detect unknown/unapproved devices with udev? I'm designing a security sensitive setup for a client. The situation is as follows: Sensitive information has to be stored on a server that might be accessed by unauthorized personnel. There is no ... 2 votes 1answer 1k views udev rule group ownership not working I have added a udev rule for my Arduino, but the symlink gets the ownership "root root" instead of "root dialout". $ cat /etc/udev/rules.d/47-Arduino.rules SUBSYSTEM=="usb", ATTR{idVendor}=="2341", ... 1 vote 1answer 2k views /dev/sdb2: No such file or directory I was trying to add a swap partition in my secondary drive, I created the partition space with fdisk and when running mkswap I was greeted with an error: $ sudo mkswap -c /dev/sdb2 /dev/sdb2: No such ... 4 votes 2answers 1k views Rebuild /dev accidentally deleted How to rebuild /dev on an ubuntu lucid where all files in /dev were accidentally deleted ? MAKEDEV std and MAKEDEV pty aren't enough, which isn't surprising on a system under udev. I haven't reboot ...
ESSENTIALAI-STEM
Internet Explorer is no longer supported. Many things will still work, but your experience will be degraded and some things won't function. Please use a modern browser such as Edge, Chrome, or Firefox. Acquire Server Acquires a server from a resource pool defined by a server role. Script usage: Acquire-Server( [Role: <text>], [ServerName: <text>], [Verbose: <true/false>] ); This operation may be prefixed with Core::, although this is a built-in namespace and isn't really necessary. Arguments: NameFormatScript UsageUsage Notes Server role text Role A server role that defines the list of servers to be used as the source of the pool. Server name output text ServerName Log verbose true/false Verbose Example: # acquires a server associated with the build-servers role Acquire-Server( Role: build-servers, ServerName => $AcquiredServerName ); for server $AcquiredServerName { Log-Information Acquired server: $ServerName; }
ESSENTIALAI-STEM
Is the Apple Watch Milanese Band Waterproof? Apple Watch waterproof The Apple Watch Milanese Band is one of the most popular bands for the Apple Watch. It is made of stainless steel and has a mesh design, making it very lightweight. The Apple Watch Milanese band is not waterproof, meaning it will be damaged if submerged in water. This is because the Milanese loop is made of metal mesh, not rubber. The mesh will rust when exposed to water, which can then cause the band to break. Apple states that using the Milanese Band on your Apple Watch should be removed before showering, bathing, or swimming. Some people have found ways to make their bands waterproof using a clear sealant or silicone, but these are not endorsed by Apple and may void your warranty. Why is the Milanese Loop not water-resistant? The Milanese Loop is not water resistant because the metal band can rust. This is because the band is made of steel and not coated with any protective material. The Milanese Loop was designed to be a stylish alternative to the traditional watch bands, but it lacks one crucial characteristic - water resistance. The Milanese Loop, while very aesthetically pleasing, has a significant drawback: it cannot withstand anything more than a light rain shower or washing hands. Can you sweat in the Milanese Loop? The Milanese Loop is a trendy Apple Watch band. A metal band wraps around the wrist and fastens with a magnetic closure. You can sweat in the Milanese Loop, but you won't be able to submerge it in water. This is because the Milanese Loop has a stainless steel mesh that will rust if submerged in water or exposed to sweat for too long. Does the Apple Milanese loop tarnish? This is a question that many people have asked, and the answer is yes, it tarnishes. The material used to make the Milanese loop is stainless steel, which can quickly tarnish. The tarnishing process can happen when the band gets wet or when it comes in contact with sweat or lotions. You can also use this ULTRAVUE Watch Cleaning Kit - Cleans All Watches for your Apple Watch. WHAT ARE THE BEST WATERPROOF BANDS FOR YOUR APPLE WATCH?  The following are some bands you can use together with your device while swimming or doing beach activities.  DUAL COLOR SPORT BAND FOR APPLE WATCH - Made of soft silicone material with breathable ventilation channels, it handles any activity by reducing moisture build-up while staying comfortable and secure around your wrist. NYLON SPORT LOOP FOR APPLE WATCH - Lightweight and breathable, with more than 500 threads of 100% durable nylon intertwined together, this carefully woven Nylon Sport Loop for your Apple Watch is impervious to both tears and abrasions   If you found any of this helpful, please share this post to spread the value to other Apple Watch users. Subscribe to our newsletter to learn more about your Apple Watch and receive exclusive deals when our store is having a sale.  *This post contains affiliate links, so we may earn a small commission when you make a purchase through links on our site at no additional cost to you. Leave a comment Please note, comments must be approved before they are published This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
ESSENTIALAI-STEM
دانلود مقاله ISI انگلیسی شماره 10006 عنوان فارسی مقاله پتانسیل الکترواستاتیک بر سطح ضد اسکالانت اصلاح شده (CaCO3 (104 : یک مطالعه شبیه سازی مولکولی کد مقاله سال انتشار مقاله انگلیسی ترجمه فارسی تعداد کلمات 10006 2009 11 صفحه PDF سفارش دهید 4503 کلمه خرید مقاله پس از پرداخت، فوراً می توانید مقاله را دانلود فرمایید. عنوان انگلیسی Electrostatic potential on anti-scalants modified CaCO3 (104) surface: A molecular simulation study منبع Publisher : Elsevier - Science Direct (الزویر - ساینس دایرکت) Journal : Desalination, , Volume 238, Issues 1–3, March 2009, Pages 246-256 کلمات کلیدی - شبیه سازی مولکولی -     مکانیسم های ضد پوسته پوسته شدن -     پتانسیل الکترواستاتیک -     کلسیت - کلمات کلیدی انگلیسی Molecular simulation, Anti-scaling mechanism, Electrostatic potential, Calcite, پیش نمایش مقاله پیش نمایش مقاله پتانسیل الکترواستاتیک بر سطح ضد اسکالانت اصلاح شده (CaCO3 (104 : یک مطالعه شبیه سازی مولکولی چکیده انگلیسی Molecular dynamics simulation and Density Functional Theory were used to investigate the adsorption of two kinds of anti-scalant, ethane diphosphonic acid (EDPA) and polyether polyamino methylene phosphonate (PAPEMP), on the calcite (104) surface in order to increase the level of understanding of the anti-scaling mechanism in membrane processes for water desalination. Calculation results show that the performance of an anti-scalant is mainly determined by the negative electrostatic potential presented on the anti-scalant modified scale surface. A negative electrostatic potential on the scale surface can prevent not only the agglomeration of scale nuclei in the concentrate but also the precipitation of scale nuclei on the membrane surface. Phosphonate groups in 1,1-EDPA are bifunctional since they simultaneously satisfy the requirements for the electrostatic potential distribution and for the adsorption stability on the scale surface. As concerns PAPEMP, the above requirements are fulfilled respectively by different functional groups, i.e. ether groups and phosphonate groups. To simplify the role of functional groups in the anti-scaling mechanism means that the performance of an anti-scalant can be optimized by the combination of specific functional groups; furthermore, these functional groups can also be adjusted with respect to different scale surfaces. مقدمه انگلیسی Supersaturation in concentrate is inevitable due to the permeate withdrawal and concentration polarization in membrane applications involved in the desalination of sea water or brackish water. Scaling of some sparingly soluble salts (CaCO3, BaSO4, CaF2) occurs especially at high permeate fluxes and at low cross-flow velocities, which may cause permanent damage to the membrane. While the scale in the bulk solution can be removed from membrane modules by applying cross-flow operation mode, it is physically and chemically difficult to clean the scale precipitated on the membrane surface. Although some approaches, including anti-scalant addition, backflushing and chemical cleaning, have already been developed to prevent or mitigate the scaling on the membrane [1–9], such a problem is far from being satisfactorily solved. The supersaturated concentrate is thermodynamically unstable. When scale nuclei appear in a concentrate due to the increase in salt concentration, they may either stay in the bulk solution or precipitate onto the membrane surface. The scale nuclei on the membrane surface grow into scale which results in an irreversible membrane blockage. It is believed that preventing the nucleation in the concentrate and the nuclei precipitation on the membrane surface should be the key factors to extend the operation period of a membrane module. Many anti-scalants have been developed for this purpose. Scaling in a membrane involved water process can be partly suppressed by introducing a small quantity of anti-scalants. Some commonly used anti-scalants include ethane diphosphonic acid, polyether polyamino methylene phosphonate, acrylic acid-maleic acid copolymer (AA-MA) and so on. Several metal ions also have a certain inhibiting effect on the scaling potential among which Zn2+ was experimentally proved superior to any other applied ion species [10]. As a whole, the anti-scaling performance of polymers mentioned above is usually better than that of metal ions. Up to now, the understanding of anti-scaling mechanism remains semi-empirical. Many antiscalants developed in the laboratory are far less effective than expected when they are used in industrial applications. Some generally accepted anti-scaling mechanisms are as follows: C Formation of complexes between the antiscalant and ions makes the concentrate stable at a higher supersaturated level. C Adsorption of anti-scalants on the scale surface causes defects during the growth of scale nuclei, which weakens the mechanical strength of the scale. C A certain electrostatic potential is presented on the anti-scalant modified nuclei surface, and the agglomeration among crystal nuclei is therefore suppressed by electrostatic repulsion. The above concepts are subject to some limitations. Since the formation of complexes should satisfy a certain stoichiometric ratio, a common dosage of anti-scalants at the ppm level can hardly reduce the degree of supersaturation of concentrate dramatically. Besides, instead of considering the interaction between the membrane and anti-scalant modified scale, the available mechanisms only deal with the situation in the bulk phase of the concentrate. Apparently, study on the anti-scaling mechanism at the molecular level might be more instructive; unfortunately, only very limited work in this aspect can be found [11–15]. Most of it was focused on the adsorption behavior of antiscalants on the scale surface, and the authors came to nearly the same conclusions. It was suggested that the matching between the functional groups of an anti-scalant and the ion spacing on the scale surface should favor a strong docking of anti-scalants on the specific positions by electrostatic force and hydrogen bonding. Furthermore, the adsorption heat of anti-scalants on the scale surface was considered vital to their performance. نتیجه گیری انگلیسی A negative electrostatic potential presented on the anti-scalant modified scale surface plays an important role in the anti-scaling mechanism, and it can prevent not only the agglomeration among scale nuclei but also the precipitation of scale nnuclei on the membrane surface. Besides, the heat of adsorption of an anti-scalant on the scale surface is only one of the necessary conditions for prejudging its performance. In the case of 1,1- EDPA adsorption, a negative electrostatic potential on the calcite surface is realized by the statistically dominant orientation of phosphonate groups. In the meantime, the same function group also guarantees the adsorption stability of 1,1- EDPA. As for PAPEMP adsorption, the negative electrostatic potential on the calcite surface is provided by an ether group consisted of long chain which is fastened on the calcite surface by phosphonate groups. The above difference represents two strategies of developing anti-scalants. خرید مقاله پس از پرداخت، فوراً می توانید مقاله را دانلود فرمایید.
ESSENTIALAI-STEM
A relaxin-like peptide purified from radial nerves induces oocyte maturation and ovulation in the starfish, Asterina pectinifera Masatoshi Mita, Michiyasu Yoshikuni, Kaoru Ohno, Yasushi Shibata, Bindhu Paul-Prasanth, Suthasinee Pitchayawasin, Minoru Isobe, Yoshitaka Nagaham Research output: Contribution to journalArticlepeer-review 107 Citations (Scopus) Abstract Gonad-stimulating substance (GSS) of starfish is the only known invertebrate peptide hormone responsible for final gamete maturation, rendering it functionally analogous to the vertebrate luteinizing hormone (LH). Here, we purified GSS of starfish, Asterina pectinifera, from radial nerves and determined its amino acid sequence. The purified GSS was a heterodimer composed of 2 different peptides, A and B chains, with disulfide cross-linkages. Based on its cysteine motif, starfish GSS was classified as a member of the insulin/insulin-like growth factor (IGF)/relaxin superfamily. The cDNA of GSS encodes a preprohormone sequence with a C peptide between the A and B chains. Phylogenetic analyses revealed that starfish GSS was a relaxin-like peptide. Chemically synthesized GSS induced not only oocyte maturation and ovulation in isolated ovarian fragments, but also unique spawning behavior, followed by release of gametes shortly after the injection. Importantly, the action of the synthetic GSS on oocyte maturation and ovulation was mediated through the production of cAMP by isolated ovarian follicle cells, thereby producing the maturation-inducing hormone of this species, 1-methyladenine. In situ hybridization showed the transcription of GSS to occur in the periphery of radial nerves at the side of tube feet. Together, the structure, sequence, and mode of signal transduction strongly suggest that GSS is closely related to the vertebrate relaxin. Original languageEnglish Pages (from-to)9507-9512 Number of pages6 JournalProceedings of the National Academy of Sciences of the United States of America Volume106 Issue number23 DOIs Publication statusPublished - Jun 9 2009 All Science Journal Classification (ASJC) codes • General Fingerprint Dive into the research topics of 'A relaxin-like peptide purified from radial nerves induces oocyte maturation and ovulation in the starfish, Asterina pectinifera'. Together they form a unique fingerprint. Cite this
ESSENTIALAI-STEM
Late to the recursion game. Ok, confession time: every once in a while, you find out something that apparently everyone except for you knows about (I’m looking at you, pronunciation-of-rendezvous).  This time, I totally missed out on recursion in the course of teaching myself how to program.  For those in the same boat as me, this means you can call a function inside the same function.  So long as you specify a base case (and make sure you reach this base case), you can get a reasonable answer. In the course of rectifying this, I’ve written two toy programs.  The first is very un-mathy, but essentially solves the game “TextTwist“. First I use recursion to find all possible substrings of a collection of letters, then I import an English dictionary (thank you, Python!), and check these substrings against the dictionary to come up with a list of English-language words.  See below for the print-out. The dictionary I am using is a little bit generous with what it allows as a word, but I'd rather err on the side of being thorough in this case. The second program I wrote was in MATLAB, and the code is a little cleaner, so I can in fact post it here.  It uses recursion to again generate the Sierpinski gasket from the flurry of fractal posts I had earlier, though this is a deterministic approach.  What it does is takes a column of points determining the vertices of a triangle (or any other shape), then for each point, returns a column determining the points of a triangle whose vertices are halfway to the previous vertex, and halfway to the next vertex.  The code may be easier to read, noticing especially that I call gasket on the third to last line: function [A,B] = gasket(X,Y,N) %returns the coordinates of the vertices for a Sierpinski gasket with N %iterations m = size(X,1)-1; A = []; B = []; for k = 1:m-1 A = [A,[X(cmod(k,m),:);(X(cmod(k+1,m),:)+X(cmod(k,m),:))/2;(X(cmod(k-1,m),:)+X(cmod(k,m),:))/2;X(cmod(k,m),:)]]; B = [B,[Y(cmod(k,m),:);(Y(cmod(k+1,m),:)+Y(cmod(k,m),:))/2;(Y(cmod(k-1,m),:)+Y(cmod(k,m),:))/2;Y(cmod(k,m),:)]]; end if N~=1 [A,B] = gasket(A,B,N-1); end end The function “cmod” just changes the “mod” function so that “cmod(m,m) = m” instead of the usual behavior where “mod(m,m) = 1″.  Running this code with N = 8, we get the following image: Noticeably cleaner than at least some of the randomly generated fractals from earlier, and at the very least faster.  After 8 iterations, there are 3^8 = 6561 triangles, and for each we store 4 pairs of numbers to generate a triangle (I am calling the “line” command, which means I need to specify that the start and end points are the same), so the total number of numbers I store is 52,488, compared to 100,000 for this much lower resolution version from earlier.  Also, I can start with any set of points I want with this program, so here is a belated Valentine for everyone: It is somewhat hard to find interesting, mostly convex parametric curves, ok? Hausdorff dimension II I left off yesterday asking how to measure a surface (something sort of 2-dimensional) in 3-space, and noting that Lebesgue measure would give this set 0 area.  This is where Hausdorff measure comes in.  There is in fact a continuum of Hausdorff measures, one for each real number.  First it is helpful to define the diameter of a set, which is just the farthest distance apart of two points in the set.  For a circle, the diameter is the usual definition.  Also, we’ll denote the diameter of a set U by |U|. The construction of the measure is typically described in two steps: Suppose we are trying to find the m-dimensional Hausdorff measure of a set U.  Then in the first step, we cover U by sets no larger than some number, d, and look at the sum of the diameters of these sets raised to the mth power. The smallest (well, infimum) of these coverings will be the number we associate with the parameter d.  In the second step, we let d go to zero.  The Hausdorff measure is the limit, if it exists.  In symbols, Two sets with (approximately) the same diameter, indicated with the red line. H^m_d(U) = inf \sum_{k = 1}^{\infty} |U_k|^m, where |U_k| < d for each k.  Then H^m(U) = \lim_{d \to 0} H^m_d(U).  There is an easy result (see, for example, Falconer’s “Geometry of Fractal Sets“) that says that for any set U, there is a unique value, called the Hausdorff dimension of U so that H^m(U) = \infty \text{ if } 0 \leq d < \dim U and H^d(E) = 0 \text{ if } \dim U< s < \infty.  Note that the Hausdorff measure might be 0 or infinite, but this number will still exist. We should also note that: 1. Nowhere in the definition did I use anything but distance, making all these concepts valid in metric spaces, as well as in Euclidean (vector) spaces. 2. Nowhere in the definition did I require the Hausdorff dimension to be an integer. Expanding on this second point brings us into discussing fractals, which I have discussed a bit in the past week, but have not defined.  One reason for this is that I have not seen a great definition.  Self similarity is important, as is having a Hausdorff dimension different from its topological dimension.  At the very least, any self similar set whose Hausdorff dimension is not an integer would be given “fractal” status, though this would miss many good examples.  In any case, for any self similar set, the Hausdorff dimension is log(m)/log(s), where m is the number of copies at each step, and s is the (linear) scaling factor. So if you view the real plane as a self similar set taken by starting with a square, then dividing it into four squares, and then each of those into four squares, and so on, then the number of copies is 4 and the scaling factor is 2 (Remember, it is the linear scaling factor! Each side is half the length it used to be.), so the Hausdorff dimension is log(4)/log(2), which is precisely 2, since \log{4}/\log{2} = \log{2^2}/\log{2} = 2\log{2}/\log{2}. I have printed below two more examples of fractals and their dimensions.  Thanks to Leonid Kovalev for pointing out how to generate the Sierpinski carpet.  Also see this great wikipedia post for a much more complete list of fractals and their dimensions. Dimension log(3)/log(2). Has dimension log(8)/log(3) = 3*log(2)/log(3). Fractal followup followup Again, after yesterday’s post (which was a response to the post of two days ago), I found a few more cool things with this method of generating fractals.  In particular, we take our point x and a random vertex v, then move our point to ax + bv.  To get the Sierpinski carpet, we have a = 2, b = 2.  To get the sets from yesterday, I used a = 1/(n-1), b = (n-2)/(n-1), where n was the number of vertices.  Today, I share some pictures using a = k/(n-1), b = (n-k-1)/(n-1).  I am not sure whether each of these is a fractal (though I suspect they are), but there is something going on (note- Leonid Kovalev pointed out yesterday that Jeremy Tyson and Jang-Mei Wu have a paper (pdf link) investigating sets generated like this): 5 vertices, with k = 2. Used 500,000 points for this one, I think most of the pentagon is meant to be in the set... 6 vertices, with k = 2. 7 vertices, with k = 2. Looks a little like the chainring on my bike... 16 vertices, k = 1   16 vertices, k = 2 16 vertices, k = 3 16 vertices, k = 4 Randomness Followup Starting with four vertices. In yesterday’s post a fractal was made by repeatedly moving a point halfway to a randomly selected vertex of a triangle, and I noted that the same magic does not happen with four vertices.  How young and foolish I was then! Playing with the code a bit, I found that you may instead 1. Start with a point x inside a regular n-gon. 2. Choose a random vertex v. 3. Move your point to the point (x+(n-2)v)/(n-1)). 4. Repeat. Notice that if n was 3, we get the recipe for the Sierpinski triangle (aka carpet, aka gasket) from yesterday.  Also, if n is 2, then you get a single point (which, ok, is a fractal in that it is self similar, but sort of sucks).  I haven’t checked, but it looks like the Hausdorff dimension of the fractal produced starting with n vertices is something like ln(n)/ln(n-1).  More on calculating that later. Anyways, here is the MATLAB code for creating these fractals, and pictures of a few of them. function gasketn(rad,n,d,sides) %creates a fractal with radius rad, n points, each point of size d, and %"sides" sides. gasketn(1,100000,1,3) creates a Sierpinski gasket. t = linspace(0,2*pi,sides+1); x = [rad*cos(t),rad]; y = [rad*sin(t),0]; point = zeros(n,2); vert = randi(sides,n,1); for j = 2:n point(j,:) = point(j-1,:)/(sides-1) + (sides-2)*[x(vert(j)),y(vert(j))]/(sides-1); end scatter(point(:,1),point(:,2),d,'k','filled') axis off end Starting with five vertices.   Six vertices!   Twelve vertices! And now this is getting silly...
ESSENTIALAI-STEM
Talk:List of Soul Reapers in Bleach/Archive 2 Styles I, and probly a bunch of other people, have heard that each division has a certain style, for example, like I'm pretty sure that 11th divison, or maybe it was 12th divisoon, anyway. Has a style focused on combat, had I'm sure you guys can find all the styles and add them to this article. Uzumaki Dude (wasn't sighned in and didn't feel like going back and starting this typing over again) —Preceding unsigned comment added by <IP_ADDRESS> (talk) 09:13, 25 November 2007 (UTC) * So because you and a bunch of other people have heard some speculations you're telling us to find and investigate these speculations and add them for you? Have you even bothered to do a little research yourself? Honestly, I can't believe the arrogance. Anyway, saying that each and every division has its own function is pure speculation, so the answer on my behalf is no. -Twsl (talk) 10:35, 25 November 2007 (UTC) Minor Edits for the Lts. I did some minor edits down to Komamura. Most of it was grammar corrections, in the hope that the article reads better, but I also took out some things I thought were misleading. For example, under Hinamori, I took out the line: "She greatly admires her former captain, Sōsuke Aizen, whom she became a shinigami just to serve under..." Although Aizen provided her with motivation to do her best as a student, he was not the reason she became a shinigami. She had already decided that much even before she met him. --Talchum 21:51, 2 December 2007 (UTC) Whose idea was it? We all had a character vote from Artist Formly Known, and it seems that we've just merged without coming to a final decision! According to what I read, the votes we made were that Jushiro and Soifon would be keeps, and not merged. Now, I want to know the idiot who merged them. We all discussed this in "List of Bleach Characters", now I want to know happened. I thought people would come to a agreement before things were merged... RedEyesMetal 11:41, 4 December 2007 (UTC) Agreed! The merge is messy and of poor quality. As well, the images should be re-uploaded with fair use images (or whatever it's called) as the page was very well done before with appropiate images. <IP_ADDRESS> (talk) 19:59, 9 December 2007 (UTC) * The images were removed as required by Wikipedia policies regarding Non-Free images. They will not be coming back. See WP:NFCC. The mergers were properly done as per Wikipedia's WP:FICTION requirements, the relevant style guides, and the trends seen in AfD. Clean up is still needed, of course, but the merges were appropriate. AnmaFinotera (talk) 20:03, 9 December 2007 (UTC) The images I feel can be justified, so let's not be stating things that aren't absolute. As for the merge, I think we can offer more than enough reason why they need to be reversed. The article was jsut fine before as were all the seperate pages for the merged chars. Please don't be changing things without a heads up. —Preceding unsigned comment added by <IP_ADDRESS> (talk) 20:13, 9 December 2007 (UTC) * No they can not. Read the policy. This is a wide sweeping decision that has affected MANY articles, including character articles. AnmaFinotera (talk) 21:46, 9 December 2007 (UTC) * I just read it. Could you be more specific? This has several times been disputed in the past, and I still haven't seen a satisfactory answer.--Marhawkman (talk) 13:55, 16 December 2007 (UTC) Merging MADNESS All this merging are so stupid. Six months ago, wikipedia was much better. Now we have: a lot less information and messy long articles like this one.. for what? Less articles. Wow, nice deal guys.. Lord Air (talk) 02:37, 10 December 2007 (UTC) * Find enough coverage in reliable, verifiable secondary sources (conception, development, merchandise, critical reception or commentary) to satisfy Notability (fiction), and we'll gladly recreate the articles. Until then, our hands are tied. Sephiroth BCR ( Converse ) 02:43, 10 December 2007 (UTC) I agree completely with Lord Air. I originally came to this page to vouch for a separate character page for Ayasegawa Yumichika like the one Ikkaku Madarame currently has. Yumichka may be less powerful that Ikkaku but he's almost ALWAYS with him. They're practically (work) partners. It's like having a page for only ONE of the main characters in Dragnet. If this merging silliness keeps up, one day we might not have a page for Abarai Renji. <IP_ADDRESS> (talk) 13:41, 10 December 2007 (UTC) * This happens because people keep forgetting that it is permissable to split articles into sections. Then they go nuts if one of the sections isn't individually notable.--Marhawkman (talk) 13:52, 16 December 2007 (UTC) I agree. I think more characters should have their own pages. By merging everything, the main pages get way too cluttered and people who have slow computers, such as myself, have a hard time viewing the articles since they take so long to load. Not only that, but it also makes it possible to put in much more detailed information about the characters as well as more pictures. Trying to cram all of this on just one page is ridiculous. Especially with how many characters Bleach has. Mokae (talk) 12:50, 8 February 2008 (UTC) Yes, espically Momo Hinamori, she plays a huge part, espically wen it comes to Toushiro Hitsugaya! -CaptinAsagi--CaptinAsagi (talk) 02:01, 25 March 2008 (UTC) I personally must agree with Sephiroth BCR. Firstly, Momo Hinamori might be "notable" with just BLEACH, but looking at Wikipedia, as an encyclopedia, that might not be appropriate notability-wise, you know? I mean, separate character pages would be completely appropriate in Bleach Wikia, but there's not much Kubo's said about these characters and there's also not very much secondary sources have said (critical reception). Note here, I'm basically repeating what Sephiroth BCR said, because it's logical. But please, please do not recreate the articles before we get an understanding here, one way or another. IceUnshattered (talk) 00:45, 6 June 2008 (UTC) Bootleg data Ok, I've added twice some informations concerning Sasakibe and Oomaeda, and they are deleted after some minutes. Those informations were taken from Karaburi's bootleg I stoped trying to add those infos 'cause I wasn't sure if they were canon, BUT the spoilers of this week chapter (the Hitsugaya one) confirms the bootleg data since it reveals Hitsugaya has a grandmother (just like the bootleg said) and the name of the district where he used to live in Rukongai (ALSO exactly like the bootleg said). I will wait until the RAW is out, of course, but if the spoilers are correct, then we can assume the bootleg infos are canon? - <IP_ADDRESS> (talk) 17:36, 13 December 2007 (UTC) * Wikipedia does not link to, nor rely on illegal content, period. That includes Bootlegs and illegal uploading of copyrighted info. If you can't watch it on Japanese TV, wait for someone who can to add something or wait for the official English translationAnmaFinotera (talk) 17:58, 13 December 2007 (UTC) * If a pure text translation is ilegal because it holds coprighted information, then wikipedia is ilegal as well. - <IP_ADDRESS> (talk) 18:32, 13 December 2007 (UTC) * That argument makes no sense at all. Bootlegs are illegal copies of copyrighted material and the translations done are not professional translations, but fansubs. English licensed editions are legally allowed copies and can be used for sourcing. Someone in Japan who understands Japanese and watches the series could also, conceivable, note what the episode contains, but bootleg transations should never be linked to or used as a reliable primary source. AnmaFinotera (talk) 18:52, 13 December 2007 (UTC) * If this bootleg is ilegal, then tell me why there was three color pages made by Tite Kubo in the chapter 285 announcing it (ok, I wait until you find it). Yeah, the bootleg is officialy called Bleach OFFICIAL Bootleg: KaraBuri Plus... launched by JUMP COMICS, signed by TITE KUBO. I would put a link to the whole RAW of "KaraBuri", so you could at least have some idea of what you are talking about, but I believe it would be ilegal :/ * And about using only official translation, not fansubs... well, as far as I know, EVERY SINGLE information about Bleach concerning the story after the volume 22 is based on fansub translations, since they were not released officialy in english yet. - Access Timeco (talk) 00:44, 14 December 2007 (UTC) * Regardless of what it comes from, it's not important in the list. Concise is better. — Someguy0830 (T | C) 02:05, 14 December 2007 (UTC) * Aside the conflict about sources, the information you added in that was reverted was very trivial. It doesn't help much at all the understanding of the character especially considering their roles are minor in the series so info on them should be shorter compared to the major players in the story. Your wording as well for one of the edits makes it feel speculatory and is thus just original research, which is removed upon sight. Fox816 (talk) 02:37, 14 December 2007 (UTC) Those are better points. Thanks, guys. I still disagree, since they are characters we have almost no information at all, so it would be good to have a minimum amount of data about them (and, yeah, I believe they are informations more useful than "his power level is..."). - Access Timeco (talk) 12:31, 14 December 2007 (UTC) Doubt of the validity of information Now I may have just been unattentive, but I do not recall anywhere in the manga or anime where Komamura released his shikai, and this article does not give me any hint as to when/where he did, though it states it as a fact. If he actually did release it in the manga/anime, then ignore this. If it was in some other media, could someone provide the source of this information? Thanks. <IP_ADDRESS> (talk) 11:52, 27 December 2007 (UTC) * Fight with Aizen. Think it's in the databooks, too. — Trust not the Penguin (T | C) 22:38, 27 December 2007 (UTC) Not just then. Komamura also used it to fight against Kenpachi Zeraki. That was towards the end of the "rescue Rukia" storyline.--Marhawkman (talk) 11:39, 28 December 2007 (UTC) Individual Images How come that individual photos of characters are not wanted?Could not the group photos and individual images be used?Earthbendingmaster (talk) 00:19, 4 January 2008 (UTC) —Preceding unsigned comment added by Earthbendingmaster (talk • contribs) 00:12, 4 January 2008 (UTC) * Theres something called non free content, and fair use rationales. See WP:NFC, and if you want more please ask me.-- Hana ichi 02:49, 4 January 2008 (UTC) * There's a big dispute regarding non-free images in character lists. In order to have images put up and comply with Wikipedia policy we have to use a limited number of images to identify characters and only characters of certain importance and notability should be given attention to (unless a group image can be provided). In this case we have a group image that can suffice Wiki Policy as well as identifying all the Shinigami Captains and Lieutenants. Before the switch we had individual Squad photos of Cpt. and Lt. taken from the 3rd Endings which featured all 13 squads respectively. I uploaded just about all of them so believe me when I say that having to take them down was heartbreaking. This was done in anticpation of enforcement of the policy regarding non-free content which usually leads to "article stripping" then tough negotiations that can sometimes get heated. That's why we have to stick with the group photos. I'm looking for others that are less "crowded" and fit the article better than the ones we have now. Fox816 (talk) 03:30, 4 January 2008 (UTC) * Ok, but isn't there a photo of the 13th division captain?Earthbendingmaster (talk) 23:17, 4 January 2008 (UTC) * Hmm...there was but it looks like it got deleted. I apologize for not taking notice. I was intending on re-uploading Squad 13's picture from the 3rd Ending OP where Kiyone and Sentaro are also pictured as well. I'm going to wait though since there's been some recent activity regarding Lists and NFC policy. Several character list articles have been stripped of almost all images. I don't want to upload something that I'll need to speedy tag later. Fox816 (talk) 20:15, 6 January 2008 (UTC) Annoying Once again, this is an anime article where people have jumped to conclusions just because they saw a 2 second clip(anime) or saw a picture(manga) of a happening. What is this about the 2nd squad leuitenent's shikai form being "weak" just because Ichigo punched through it? Its absolutely ridiculous how the community constantly jumps to conclusions like this. If Ichigo were to accidently drop his sword at one point, people would jump onto wikipedia and say "Ichigo is known throughout teh ENTIRE series to be clumsy and a butter-fingers, as shown in ONE episode/manga." Whoever keeps making these silly exagurations needs to stop and just leave the community. —Preceding unsigned comment added by <IP_ADDRESS> (talk) 07:40, 6 January 2008 (UTC) First off, the 2nd squad vice captain didn't exactly get the spot because of his power. he got it because of his family. Second, you're right, it just seems like that and without a source it can't be exactly proven... --KaidenShiba 00:14, 21 January 2008 (UTC) * You would have to have some basis of determining strength and that guy is the only person in the series to have his zanpakto broken by having it be hit by an unarmed shinigami. His was a pathetic showing of strength and he would have to do more than just defeat an adjucah or two to redeem himself. He's gonna get wrecked by fraccion in the upcomming karakura rumble the guy is garbage. <IP_ADDRESS> (talk) 11:31, 28 May 2008 (UTC) Merge I have suggested merging Hanataro Yamada with this article. What does everyone think?Earthbendingmaster (talk) 16:08, 8 January 2008 (UTC) * KeepI think it's stupid. Hanataro plays an important role and deserves his own page considering lesser characters have their own pages. Plus, there would be no real benefit to merging the article. This page is big already and it'd just be more stuff to scroll through. It's fine the way it is. EvilBrak (talk) 20:19, 8 January 2008 (UTC) * Merge - In-universe, plot, and minor character. <IP_ADDRESS> (talk) 21:09, 9 January 2008 (UTC) * Merge but shorten - He plays a minor role in the series. His info will have be to trimmed down to only the necessary informative bits as the shinigami article is long enough as it is. Fox816 (talk) 21:18, 9 January 2008 (UTC) * Merge - In-universe, fancruft, plot, no out-of-universe, and he's a minor character. Remove minor tidbits during merge. Artist Formerly Known As Whocares (talk) 21:23, 9 January 2008 (UTC) * Keep - important character. I challenge other editors to point out the 'fancruft', and if successful, I will remove it. -- Ynhockey (Talk) 21:32, 9 January 2008 (UTC) * Aside the Powers and Abilities section, basically everything. The Synoposis and the Character Outline can all be summed up in one paragraph. Aside the plot ties in the Character Outline, the points discussed such as with his name and face is speculation and fancruft respectively. There really isn't much left if you take all that out. Fox816 (talk) 05:27, 10 January 2008 (UTC) * Keep -important character in the rescue arcHana-kun (talk) 06:48, 10 January 2008 (UTC) * Comment - Ahem, important? Hello, Yumichika probably appeared as much as Hanataro and got merged. However, same point whatever. There is no real world information. As much as Hanataro is significant, he doesn't stand a chance if someone decides to AFD the article (you guys should know who). If Nnoitra, Ulquiorra, Grimmjow and Szayel gets merged, we would basically have no choice except merge Hanataro.-- Hana ichi 11:26, 10 January 2008 (UTC) * Merge - I gotta say, while Hanataro's a fairly significant character...he hasn't really DONE anything in so long. He showed up for like one chapter in Hueco Mundo but got chopped up for some reason right afterwards. Unless he, for some reason, does something important by the end of this arc, there's no reason for him to have his own article. Viewtiful Rekk (talk) 10:52, 26 January 2008 (UTC) Keep I do not believe Hanataro should be merged since he did provide an important role, and he has recently come back in the manga. Also to comment on the previous comment, I do not believe Yumichika deserved to be merged, and he should probably get his article back. —Preceding unsigned comment added by <IP_ADDRESS> (talk) 03:31, 12 January 2008 (UTC) Unseated Shinigami Is it worth including a small section for the mention of unseated shinigami under the ranking system? As is, it seems to imply that there are only 20 shinigami (i.e. the seated officers) per division. We know for a fact that Rukia--despite her obvious talent--is an unseated, because Byakuya explains that he used his influence to keep her unranked and "out of danger." I was under the impression that Maki and Zennosuke were also unseated, as further examples. 11th Division is sure to be full of common foot soldiers and I don't think that even Mayuri could get away with turning seated officers into walking bombs. -- Son Goharotto (talk) 21:56, 8 January 2008 (UTC) * That's true. It would be worth adding that small bit in there. We don't need anything extensive at all. Actually it'd probably be best to just tack it onto the Seated Members section (e.g. Rename to Seated and Unseated Members). At best for the Unseated section, it would only be around a few sentences which isn't worth it being individual. Fox816 (talk) 21:22, 9 January 2008 (UTC) * All right, I tacked on a couple sentences that should suffice. -- Son Goharotto (talk) 17:08, 10 January 2008 (UTC) Merge I have suggested merging Rangiku Matsumoto and Hanataro Yamada into this article.What does everyone think?Earthbendingmaster (talk) 03:47, 10 January 2008 (UTC) * Why? There's enough information in its page to merit its own article, all be it, that it needs editing to conform with Wiki. Neovu79 (talk) 04:53, 10 January 2008 (UTC) * Oppose. -- Ynhockey (Talk) 11:36, 10 January 2008 (UTC) * Well, I will remove the merge off Rangiku Matsumoto, but I do believe Hanataro Yamada needs to be merged.Earthbendingmaster (talk) 16:56, 10 January 2008 (UTC) I am glad you decided agreed to keep Rangiku, but I believe we should not merge Hanataro because he was important earlier in the series and he recently came back in the manga. I also believe the merging of the Soul Reaper's articles should stop because I think enough has been done. In fact, I think the merging has been overdone because I believe certain characters, such as Izuru and Yumichika deserved to keep their articles. —Preceding unsigned comment added by <IP_ADDRESS> (talk) 03:37, 12 January 2008 (UTC) * I agree with you on a lot of characters that got merged but Hanataro I don't. More important characters got merged and if those espada articles get merged than Hanataro Yamada definately needs to be merged. Earthbendingmaster (talk) 15:23, 12 January 2008 (UTC) * Oppose.-- Hanatarou maybe but not Rangiku! She helps Hitsugaya in the SS arc, she fights against the Bounto in the Bount arc and she helped in the fight against the Arrancar.Archer of destiny (talk) 23:44, 31 January 2008 (UTC) Gin Ichimaru What happened to his article? I'm assuming it got deleted, however, the information is strangely nowhere to be found. Fox816 (talk) 00:29, 11 January 2008 (UTC) * His article did not get deleted. Go here. Earthbendingmaster (talk) 03:52, 11 January 2008 (UTC) * Actually, his article was deleted. However, the deleting admin restored it after the confusion was cleared up. — Trust not the Penguin (T | C) 06:26, 11 January 2008 (UTC) * Ah, that's good. I was trying to figure out if by chance the information was lost if there was someway to recover or piece it all back. Fox816 (talk) 06:37, 11 January 2008 (UTC) * Well, this just goes to show you that having an article in more or less the same state (wording-wise) for a year and a half can come back and bite you in the ass. — Trust not the Penguin (T | C) 06:45, 11 January 2008 (UTC) Unohana note I recently added a short sentence about Unohana being one of the four captains sent to hueco mundo...but it was deleted. Seeing that the other three captains (in their respective articles) have covered that fact, i dont' see reson for not adding the information, it surely is important. —Preceding unsigned comment added by Yomerodes (talk • contribs) 22:49, 12 January 2008 (UTC) * It is because the other three have articles that that particular detail is covered in their articles. Since Unohana is stuck on a list, where plot synopsis is out of place and unneeded, the fact that she went to Hueco Mundo goes unmentioned. If she were to die in Hueco Mundo, then it would be mentioned. Not until then though. ~SnapperTo 22:58, 12 January 2008 (UTC) Merge 2 Sorry to start this discussion again. Merge of Hanataro Yamada. Please put support/merge or oppose/keep below. Earth bending master 22:01, 23 January 2008 (UTC) * Support, the Hanataro article fails WP:FICT and can not establish notability on its own. It should be merged into the list. AnmaFinotera (talk) 22:37, 23 January 2008 (UTC) * Support, I agree, Hanataro hasen't done much of anything to help the team since he healed Renji in the Soul Soceity arc.Ultimaterasengan (talk) 23:22, 23 January 2008 (UTC) * Support, popularity does not equal notability. Son Goharotto (talk) 15:10, 24 January 2008 (UTC) * Relisted to generate a more thorough discussion so that consensus may be reached. Please add new comments below this notice. Thanks, Earth bending master 04:45, 25 January 2008 (UTC) * Support - Despite he being a "main character" in the Soul Society arc, he hasn't done anything much recently other then falling on himself. Not enough notability to warrant his own article. Probably on the same level as Ulquiorra.-- Hana ichi 06:28, 25 January 2008 (UTC) * Support As well, a trimming of information would be in good order to make it fit well. Fox816 (talk) 06:47, 25 January 2008 (UTC) * Consensus reached Discussion closed. Thanks everyone. Earth bending master 17:59, 25 January 2008 (UTC) Help I need help with the special characters. Could someone help me? Earth bending master 18:06, 25 January 2008 (UTC) * I should point out that merge discussions generally take longer than two days. Then again, I do not particularly care so long as adequate support exists. As for your question, you'll need to be more specific. — Trust not the Penguin (T | C) 05:43, 26 January 2008 (UTC) * Technically, it's been a bit longer than two days. I think the one discussion would have sufficed. ~SnapperTo 06:01, 26 January 2008 (UTC) * Japanese characters and the long Japanese vowel in Hanataro's name. The o. Earth bending master 14:19, 26 January 2008 (UTC) * Click that little "help" link next to the characters if you can't see them. If you can see them, copy the entire article and just trim as necessary to perform the merge. — Trust not the Penguin (T | C) 18:23, 26 January 2008 (UTC) * I'll copy-edit to merge the article. If there are any elements deemed important that I left out then feel free to readd. I'll also go ahead and redirect Hanataro's page as well. Fox816 (talk) 18:57, 26 January 2008 (UTC) Article Rename and Expansion Per the merge discussions at the main character list, merging this article into that list was declined by consensus. During that discussion, one idea that came up was to expand this article to encompass all of the Soul Society characters and rename the article to reflect that. This would help with the growing size issues of the main list, particularly with the other merge suggestions heading towards passing, and would give this article a greater breath of coverage. It also would make it better for readers to look up all of the Soul Society info in one place. Ideally, the article would start with a proper lead that includes a summary discussion of the Soul Society, then break out into sections on the shinigami and others. Please post below with an oppose/support style comment for this suggestion, along with your comments about the idea and why you support/oppose. AnmaFinotera (talk) 12:42, 25 January 2008 (UTC) * Oppose - I initially backed the idea of a renaming but after rethinking the process and outcome I decided against it. As good of intention as it is, we would be overstepping our boundaries by trying to simply too much. Soul reapers compose the vast majority of notable characters within the Soul Society. Hardly are there any others so they'd fit better with the general list. As well with expansion, the shinigami list article is already at 61k. Considering how much info we'd have to place in it would just push the article over what's acceptable and we'd need to severely trim or separate eventually. Fox816 (talk) 16:49, 25 January 2008 (UTC) * Support If all the soul socitey members were directed here, it would solve the constant AFDing of Soul Society's article, because, of course, it would be merged here. Sasuke9031 (talk) 02:47, 27 January 2008 (UTC) * Comment: Size comes to me as a concern. Will we trim down the amount of info in all articles getting merged? And if so, to what extent? Also, what will we name this new article, Shinigami (Bleach) or Soul Society? Artist Formerly Known As Whocares (talk) 20:40, 30 January 2008 (UTC) * Response: I thought it would be more like List of Soul Society Characters or something... Sasuke9031 (talk) 21:32, 30 January 2008 (UTC) * Response: What do you mean? Do you mean putting all the captains and lieutenants on one page? That would make it way easier to look up Gotei 13.Archer of destiny (talk) 23:41, 31 January 2008 (UTC) * Response: The Captains and Lieutenants are already on one page, minus the ones capable of retaining individual articles. What else would be listed in the renamed page exactly aside the Soul Society characters listed in the general listing? Just adding the Soul Society article alone wouldn't be good enough reason to complicate the page (i.e. Having general info about the Soul Society then a list of characters, then descrip of Shinigami with a listing of the characters, etc...) Not only would size be an issue but the whole format would be rather undesirable. Shinigami are a stand alone by themselves and other Soul Society dwellers that aren't soul reapers play minor roles. The Vizard could be included in a general page of 'Other Races' or something along those lines where the Quincy and Bounts could be merged as well. Fox816 (talk) 01:01, 1 February 2008 (UTC) * Oppose: That would make the article quite confusing and crowded. I think it's fine the way it is now.04:57, 1 February 2008 (UTC) * If you wouldn't mind signing your comments, because then I can know who stands where. I myself shared the same opinions regarding merging during the Itachi debate, but now this seems like the best decision. All it needs to pass WP:SIZE is a few modifications regarding clean-up and OR, and then merging the soul society characters here should be fine. Sasuke9031 (talk) 03:02, 7 February 2008 (UTC) * Comment The Soul Society characters are really fine where they are. For the most part they're minor so there's no need to do a whole revamp just to include such a small group. Where they are now is appropriate. In terms of inclusion of the Soul Society info, that article has been merged into the main Bleach article so that's not anymore a problem. We have to be careful not to bite off more than we can chew by trying to simplify things far too much than they need to be. Fox816 (talk) 03:09, 7 February 2008 (UTC) Shūsuke Amagai I want to ask everyone's opinion on this, should "Shūsuke Amagai" be listed as the new 3rd division captain? Supposely he is going to appear in a filler arc in the anime in April, but I personally feel that he shouldn't since a new captain is too big of a thing that will affect the article. A reader might read this and think that this is happening in the manga too and I want to remind everyone that only the stuff that appears on the manga should be consider to be canon and that this character is probably something that the producers on the anime came up with and didnt even tell Kubo about it.<IP_ADDRESS> (talk) 07:55, 27 March 2008 (UTC) * Your opinion is noted, but if you're going to act like it's such a tragedy, then complain about the anime-only third seat in the same section, Maki in the 11th, and the five or so in the "Other" section. Arbitrarily picking the one that annoys you the most won't fly. In any case, never before have we avoided adding anime-only characters (Bount) and we're not doing it now simply because they're playing a little closer to the street, so to speak. — Trust not the Penguin (T | C) 07:59, 27 March 2008 (UTC) * The reason why I didn't care about a character like Maki is because she wouldn't affect the story as a whole, for all we know theres probably ten Maki in the 11th division, but there can only be one captain in a division and by the way i think the 3rd seat guy shouldn't be there either. <IP_ADDRESS> (talk) 08:14, 27 March 2008 (UTC) * Again, if you're only going to complain because of the severity of the supposed "slight" this fictional character is making, then you have no argument. We're not removing him simply because they're pushing it. — Trust not the Penguin (T | C) 08:18, 27 March 2008 (UTC) * Fine, I'll won't change anything but those two better get killed before Kubo shows the REAL new 3rd captain, and there better be a clear note that these two characters are only in the anime.<IP_ADDRESS> (talk) 08:25, 27 March 2008 (UTC) * "anime-exclusive filler", clear cut. And what if they don't die, hmm? — Trust not the Penguin (T | C) 08:28, 27 March 2008 (UTC) * I'll see how I feel then, but seriously this better not affect the manga stuff when it gets turned into anime, i mean just look at the latest manga chapter, no trace of this guy anywhere.<IP_ADDRESS> (talk) 08:35, 27 March 2008 (UTC) * No trace of any third division guy, you mean. The anime is not going to do something that will conflict with the manga's storyline unless they have a way to back out of it or, more likely, have Kubo's permission. You don't add a character to a story that the original author could very easily add themselves without their consent. ~SnapperTo 16:20, 27 March 2008 (UTC) Amagai is the new 3rd division captain. You don't get to try to exclude him from an article simply because he is from an anime-exclusive arc. Second, you seem to imply that we care how you "feel" about him after the end of the arc. So long as Kubo doesn't come out and say directly "Shusuke Amagai does not exist, the episodes you saw in the anime were a mirage" or something to that effect, we don't : ( Lastly, he's definitely not going to be in any of the latest manga chapters, seeing as though they're flashbacks and he's, y'know, new. <IP_ADDRESS> (talk) 15:00, 16 May 2008 (UTC) * Shouldn't it be mentioned atleast that studio pierott doesn't even intend to have this arc fit into the storyline at all. I mean they even said it takes place in another timeline at the beginning of the arc. You don't have to go as far as saying until kubo says it doesn't count it does count because pierott themselves are saying it doesn't count. Not to mention a whole bunch of details that don't add up and conflict with what we know <IP_ADDRESS> (talk) 11:08, 28 May 2008 (UTC) Gin as 5th Do we really need to list Gin as a former Lieutenant of the 5th division, i mean if we are going to get technical we should list Aizen as a Lieutenant as well right? <IP_ADDRESS> (talk) 07:21, 30 March 2008 (UTC) * Last I saw, we did have Aizen listed as a former Lieutenant. --erachima formerly tjstrf 07:31, 30 March 2008 (UTC) * Are we putting Captains where they were when they were Lieutenant i know that Gin is there but what about Aizen as the former 5th Lt and Urahara as the former 2nd division Lieutenant under Yoruichi i mean got to keep it consistant either have all or noneWhiteStrike (talk) 12:46, 8 April 2008 (UTC) * It's rather pointless to be listing Aizen as former lieutenant since he would, basically, be listed under himself. And Urahara was third seat, not lieutenant. If we list his former position, we might as well list Renji and Izuru as former members of fifth division, Iba as a former member of eleventh, and so on in that fashion. ~SnapperTo 22:59, 8 April 2008 (UTC) * Also, Urahara was the 3rd seat, not the lieutenant. — Trust not the Penguin (T | C) 23:08, 8 April 2008 (UTC) Lisa as former Lieutenant of Squad 8? I'm not seeing how it can be assumed the girl seen with Kyoraku in chapter 316 is Lisa when it could just as easily be Nanao. * One, they dress differently. Nanao wears different glasses and her hakama isn't a skirt. Two, chapter -107 proves it with the color spread. — Trust not the Penguin (T | C) 01:27, 5 April 2008 (UTC) Muguruma Kensei as 9th Division Captain? Given that the 11th Division Captain was absent during Urahara's inauguration, I think it is safe to say that Muguruma Kensei was the previous 9th Division Captain.02:36, 6 April 2008 (UTC) * 6th is also unaccounted for, though it's probably the old dude in the scarf. In any case, process of elimination hasn't quite leveled out yet, so saying he's the ninth, while most likely true, cannot be properly sourced. — Trust not the Penguin (T | C) 03:03, 6 April 2008 (UTC) * There was no one present for the tenth division either. While I agree with the above that the old one with the scarf is likely the sixth division captain (that's likely Byakuya to the left as his lieutenant), it's speculation until it's either pointed out or we can see the division logo on the back of his haori. Sephiroth BCR ( Converse ) 07:41, 6 April 2008 (UTC) Magato and Shuusuke Picture Would it be apporiate to upload a picture of the fillers charcter since we already have one for Han'tao?--Numyht (talk) 19:09, 24 April 2008 (UTC) * I agree about adding a picture that includes both the Captain and 3rd seat of the 3rd division, will look for one that has both of them or one that has them two plus Kira and add them if no one has any complains. WhiteStrike (talk) 08:09, 29 April 2008 (UTC) * found a good picture with all three and just added it. WhiteStrike (talk) 19:50, 30 May 2008 (UTC) Tsukabishi Tessai I think we should create a new section for the Kidou Corps as it has been revealed that Tsukabishi Tessai is a former shinigami.Erik-the-red (talk) 14:09, 16 May 2008 (UTC) * That seems like a fitting thing to do, and Hachigen could also be included. As of right now, though, perhaps we should include those two in the "Other" section, since the Kidou Corps has so little available information and there is not a separate listing or special mention for the Covert Ops. Lore aura (talk) 16:54, 17 May 2008 (UTC) * There is no seperate mention for the covert ops brigade but then all of it's notable members were also in the gotei 13's 2nd Division not true for the kidou corps —Preceding unsigned comment added by <IP_ADDRESS> (talk) 10:53, 28 May 2008 (UTC) * Eh, excuse me, <IP_ADDRESS>, I didn't quite understand that fully. Are you stating that all of the imporant members in the Onmitsukido/stealth force/cover ops (whatever they're really called) were also members of the 2nd division? So that would put them in the main Gotei 13 listing, correct? I agree with Lore Aura. Right now, since there really aren't so many people we know in the Kido Corps and there's not much info released, we should just put Hachigen and Tessai into the "Other" shinigami. That sounds good for now. And, if we get enough info, we can make a separate section for those Kido Corps. Sound fine to me. IceUnshattered (talk) 00:49, 6 June 2008 (UTC) Special forces (or whatever) are completely separate from the 2nd division, in theory. However, sometimes the 2nd division captain also gets leadership of that group, which means that the two really become more or less one and the same. —Preceding unsigned comment added by <IP_ADDRESS> (talk) 07:35, 9 June 2008 (UTC) Changing/Deleting Information Based on Personal Preference I would like to address the changing/deleting of portions of this article based on what I believe to be personal preference rather than accurate information. Several times I have seen the character Senna, the shinigami who appears in the Bleach movie, as well as other movie-based characters, removed from the list. I can only assume this is being done by someone who simply does not care for the movie and I disagree with this. Whether one cares for a movie or for the animated filler arcs is hardly the point of this article. An encyclopedia is for information and like it or not, the characters exist. Seeing as there are other non-canon characters still listed in the article, it would go along the same line that movie characters should be added as well. Regardless as to whether an individual believes a certain character is important or not, the standards should be kept across the board and not bent and changed at the whims of one person. Senna, as a character, played a pivotal role in the plot of the movie, at least as significant as some of the other filler-based characters who are still listed among the "other" shinigami and this should be recognized whether individuals LIKE her character or not. —Preceding unsigned comment added by <IP_ADDRESS> (talk) 18:30, 9 June 2008 (UTC) I believe that if characters such as Ran'tao, Enryu and Kenryu, and Ashido are mentioned in this article, then Senna has a place too. If you are going by the fact that 'she's not canon, etc etc', then in the same vein, those ones should be deleted also, because they too are not canon. Within the movie, she was quite important, and she, even though being the Memory Rosary, was also a Shinigami at the time. She has as much right as the other characters previously mentioned to be upon this page. An encyclopedia is for information; and whether one likes the movie/character and thinks the character is a valid character or not should not come into any realm of consideration here. This is a response to the comment on the editing page "characters whose status as inconsequential has not been refuted on the talk page". Thank you. --Lorelei<IP_ADDRESS> (talk) 18:32, 9 June 2008 (UTC) Honestly, why even bother have Senna's name be directed to the list of Shinigami if her name isnt even listed? And why not? Does she not have her own Zanpakutou with unique abilities? Does she not play a major role in the movie? You will give a small person like Kenryu a spot then Senna had beter get one as well. I was coming here hoping to see some info on her zanpakutou and i was greatly dissapointed to see that she wasnt listed. Also since the english movie is coming out on the 11th and the 12th i wanted to know who would be voice acting her. Naturally since she wasnt listed i had to go to another article and look up a few different female voice actors for bleach. Thanks alot. so for the sake of taking your Bleach article up a notch you should just add her. What harm will it do? I mean this IS an encyclopedia, they need to expand. * List of Bleach characters. ~SnapperTo 18:35, 9 June 2008 (UTC) Pictures Why were the pictures for ashido and ran'tao deleted. I dont remember there being a discussion about it can they plase be re-instated ,they were notable character who while did not rate their own article did deserve to have their image nex to them. <IP_ADDRESS> (talk) 19:28, 12 June 2008 (UTC) For the convenience of all readers, could you proof-read your posts so they utilize proper grammar, spelling, and punctuation? And, I don't believe they were totally notable. Ran'tao was just a character in a filler arc, and Ashido didn't contribute significantly to the plot at all (he was also anime-exclusive). I support the deltion of Ashido's image, but I'm willing to discuss replacing Ran'tao's, as she did play a part in the Bount Assault on Soul Society filler arc. IceUnshattered (talk) 22:58, 14 June 2008 (UTC) PLEASE BRING BACK THE PHOTOS OF THE OFFICERS!!!!!!! <IP_ADDRESS> (talk) 05:59, 1 July 2008 (UTC) 2nd div vice captain Gegetsuburi transforms into an over sized spiked ball and chain. Its special abilities, if any, are unknown, as he is quickly dispatched by Ichigo Kurosaki during his first activation of it. It doesn't seem to be particularly sturdy, as Ichigo was able to shatter the spiked ball with a single, barehanded punch; however, considering that Ichigo is capable of fighting on par with captain-level shinigami, this may not be indicative of its actual strength. what would be indicitive of his strength? He didnt get the position due to his capability or competance and he fought against the main character and if that isn't a reliable reference point nothing is so I am going to be bold and remove that mention. <IP_ADDRESS> (talk) 02:32, 24 March 2008 (UTC) Your typical lieutenant generally has a fifth as much power as Ichigo had by that point. (I think.) So, yeah. If that's true, then it really wouldn't be surprising that the shikai broke. —Preceding unsigned comment added by <IP_ADDRESS> (talk) 07:39, 9 June 2008 (UTC) She should totaly have he owne page! Deffenitly! It's easier that way, -CaptinAsagi--CaptinAsagi (talk) 01:53, 16 July 2008 (UTC) 4th Division 3rd Seat why is he not listed among the Shinigami in the 4th Division? he actually has more lines of speech than Sasakibe (1st Div Lieutenant) does, so why? oh, don't ask me for his name. i keep forgetting. -_- if you need a reference, please check chapter 179 of the manga. he's the blond guy in glasses.--Chemicalist (talk) 07:40, 27 March 2008 (UTC) * Lieutenants are more important simply by virtue of rank, less speaking lines or no. Iemura (that's close), is just a bit of comic relief. — Trust not the Penguin (T | C) 07:48, 27 March 2008 (UTC) * But this page is entitled "List of Soul Reapers in Bleach". That implies a certain level of totality. He does have many lines, and is of moderate importance in some scenes; and as he appears in the anime in some speaking roles, he merits inclusion I believe. Here's the kanji of his name: 伊江村八十千和(いえむらやそちか). Confirmation is in one of the omake endings, not sure which, but the first one where he's seen writing on the ryoka invasion. —Preceding unsigned comment added by Asbartle (talk • contribs) 16:01, 8 July 2008 (UTC) Yachiru Kusajishi I think Yachiru should have a page. Yachiru plays an important comical role in both the omake and anime series. She is always seen around Zaraki Kenpachi and he appears quite often. She also plays a role in the SS arc as she leads Orihime, Uryu, Ganju and Aramaki to the execution site to save Rukia. There is a quite a lot of information on her including: * Her hyper-active personality * The nick-names she uses for different people * Her release of spirit energy when angry or annoyed * Her powers as a Shinigami (like her incredible strength and speed) * Her past with Zaraki Kenpachi * Her past with Ikkaku Madarame and Yumichika * Her habits and mistakes. * Being president of Shinigami Woman's Association * Her cravings for candy * and more Please post a support or oppose. Archer of destiny (talk) 23:38, 31 January 2008 (UTC) * Unfortunately that's all in-universe information. To be able to justify keeping a separate article we need out-of-universe info such as but not limited to : Character design, notes from the creator or director, real world impact if any, popularity, etc...Fox816 (talk) 01:06, 1 February 2008 (UTC) * Completely Oppose, no real world notability and would fails WP:FICT.AnmaFinotera (talk) 01:25, 1 February 2008 (UTC) Okay! I just wanted to know. Thanks for replying! Case closed. Archer of destiny (talk) 04:55, 1 February 2008 (UTC) Wasn't there a picture or list of the captains' number characters and their English translations? NBK1122 (talk) 05:02, 5 March 2008 (UTC) Didn't Kubo say sometime recently that he wanted to extend Yachiru's character? Also, look at WP:FICT, her plot significance means nothing. <IP_ADDRESS> (talk) 15:01, 16 May 2008 (UTC) He did? Could you cite that, direct me to a page? Sounds interesting. If you can find a citation, that might be nice to throw into her current section. IceUnshattered (talk) 00:53, 6 June 2008 (UTC) * Sort through the old diffs, it was the same jump issue where he said he wanted to explain more about Zaraki Stardust Dragon 15:34, 18 July 2008 (UTC) She should totaly have he owne page! Deffenitly! It's easier that way, -CaptinAsagi--CaptinAsagi (talk) 01:53, 16 July 2008 (UTC) Ashido's last name I don't remember him mentioning his last name in the anime and since he does not appear in the manga can someone tell me where they got it from WhiteStrike (talk) 13:04, 5 April 2008 (UTC) * Read the hidden comments. * — Trust not the Penguin (T | C) 15:41, 5 April 2008 (UTC) * — Trust not the Penguin (T | C) 15:41, 5 April 2008 (UTC) * And how are we to know that it's not just some twat posting original research? Moreover, why are we constantly taking the position of the j-wiki's bitch? Stardust Dragon 15:31, 18 July 2008 (UTC) Error in Information Under the section refering to Captains. It said "With one exception (Kenpachi Zaraki), all captains are able to perform the bankai of their zanpakutō". That's false, only 5 captains have been known to use bankai. Byakuya Kuchiki, Sajin Komamura, Kaname Tōsen, Tōshirō Hitsugaya, Mayuri Kurotsuchi are the only captains able to do bankai, the rest can only do shikai, with the exception of Kenpachi Zaraki. Please make the change. —Preceding unsigned comment added by Striker0704 (talk • contribs) 05:59, 7 July 2008 (UTC) Kenpachi does use a shikai constantly,as he is unable to seal his zanpakuto. And also every captain of the Gotei 13 knows how to use bankai, the only loophole that had ever been present is none other than the current Kenpachi, just because the others havent had to use it dosent mean they dont have one.(this can be confermend here)as well as many other times in the series. Grimmjow E6 (talk) 19:30, 11 July 2008 (UTC) it says they have achieved it, not used it, dork. Stardust Dragon 22:44, 18 July 2008 (UTC) Merging Alright, I want to talk about merging Rangiku Matsumoto and Soifon's articles. Thoughts? Del rayo (talk) 22:17, 30 March 2008 (UTC) * NO, I though that we had finally reach a point that all this merging was gonna stop. I'm still against merging Matsumoto and i have heard some good arguments on why we are keeping Soifon and it looks like some more of her background may be shown during the turning back the pendulum chapters, so my vote is no WhiteStrike (talk) 06:07, 30 April 2008 (UTC) I think Soifon should be kept seperate theres obvious new info thats about to show in the manga there is not point in mergin her now. I think its should be put back but thats just my opinion...(Eliteguard91 (talk) 17:49, 30 June 2008 (UTC)) * ...what info? Soifon hasn't been given any special focus. By your rationale all the articles should be separated again.—Loveはドコ? (talk • contribs) 17:55, 30 June 2008 (UTC) I'm merely stating that in the coming chapters there might be new information to come. I never said that all articles should be seperated. (Eliteguard91 (talk) 19:55, 2 July 2008 (UTC)) WP:CRYSTAL Stardust Dragon 04:55, 30 July 2008 (UTC) Characters to add back I admit it, adding the scientists and the Gatekeepers back was over the top. But I still think a case could be made for the other three. As outlined in an edit summary, Maki Maki joins the protagonists' group, and the other two had fights and zanpakuto, especially Jirobo, who is a major fight in the Soul Society arc. My attempts to justify my decision to do this were met by a revert, a pointer to a discussion that's been closed for ages and is more about merging than anything, and an extremely condescending message on my talkpage. Please give an explanation beyond "lol shorter" before talking down to me. Thanks. PS, Speaking of Jirobo, anyone know his seiyuu? Belgium EO (talk) 01:09, 8 June 2008 (UTC) * Jirobo's fight didn't last very long and it was more of a filler than anything notable. He's never seen again. On top of that, Uryu removed his soul reaper powers permanently, not temporarily as listed, basically doing to him what Byakuya did to Ichigo when they first met. There's little if anything to have him here. The same with Enjoji, short and filler. Out of the three, the only one that has some kind of reasonable chance of staying is Maki just because he stayed with the group and seen more than the other two. His role is very minor as well and he holds no importance at all in the series. It's all fancrufty just to keep them. Fox816 (talk) 01:47, 8 June 2008 (UTC) * We don't cover very minor characters that have no importance to the plot. See WP:WEIGHT and WP:NOT. Sephiroth BCR ( Converse ) 06:12, 10 June 2008 (UTC) * Point taken. Backing off. Thank you for actually being polite on this subject. Belgium EO (talk) 18:35, 10 June 2008 (UTC) If we end up deleting the Zanpakuto list, we should give Jirobo a small mention, I think, just to preserve his zanpakuto's information. Stardust Dragon 15:28, 18 July 2008 (UTC) Random question: where's Saido Eikichirou? He's an anime only character, appearing to confront Rukia just prior to the battle with Grand Fisher at the cemetery. —Preceding unsigned comment added by <IP_ADDRESS> (talk) 12:00, 22 July 2008 (UTC) * Not notable. Also, he was the cancer that is killing Bleach anime. Stardust Dragon 05:47, 23 July 2008 (UTC) Kibune Makoto Kibune is the 3rd squad's 3rd seat. Not "Kifune". Both the arc's promotional artwork and the anime itself call him "Kibune". The "Kifune" that is seen in the fansub text is an error. The only Kifune is "Hikifune", squad 12's former captain (before Urahara). Keep Makoto as "Makoto Kibune". There is no reason to keep calling him Kifune. —Preceding unsigned comment added by <IP_ADDRESS> (talk) 22:35, 28 July 2008 (UTC) Furthermore, 貴船 translates to きぶね, not きふね. If you can't read Japanese, then please do not edit information regarding it. ぶ is Fu. Thus, it's Kifune. Stardust Dragon 18:24, 29 July 2008 (UTC) * No offense, but you just owned yourself. ぶ is bu. See the dakuten? And <IP_ADDRESS>—according to JWPce, 貴船 can be both Kifune and Kibune.—Loveはドコ? (talk • contribs) 18:27, 29 July 2008 (UTC) * God, you're right, sorry, didn't notice it. Stardust Dragon 18:39, 29 July 2008 (UTC) * I still stand by my earlier assertion that we should just change his name to Kiqune to avoid these sort of "NOT KIBUNE, KIFUNE" and vice versa conflicts. Stardust Dragon 19:30, 29 July 2008 (UTC) Speaking of Japanese, is it okay if I did Amagai's release command in Hiragana? I'm pretty sure the kanji in the name itself are right, but the release commands have been inconsistent in what they use. Stardust Dragon 21:08, 31 July 2008 (UTC) Zanpakutō How come there's no article on Zanpakutō? DragonStylin (talk) 02:34, 1 August 2008 (UTC) * It was deemed not notable enough and was deleted. And it's not like we have articles for Quincy crosses, Bount dolls, and bakkōtō.—Loveはドコ? (talk • contribs) 02:41, 1 August 2008 (UTC) Thats why weapon usage and abilities I think should go to the characters that use the weapons and not in another page when their weapons are already mentioned in their character biography......,Grimmjow E6 (talk) 15:40, 3 August 2008 (UTC). * It already is. If anyone's interested in the old Zanpakuto list that was on that page, I've recreated it on a userpage here. Stardust Dragon 17:05, 3 August 2008 (UTC) Shinigami I noticed that there are several shinigami (gate keepers and seat ranked shinigami to be precise) missing from this list, such as Ikkanzaka (Jiroubo's brother) and Jiroubo hamself, so I wanted to know if we should add them or if this list only mentions certain characters. I just don't want to be told later "You shouldn't have added him/her, they aren't important enough". --Superneoking (talk) 01:16, 28 July 2008 (UTC) * The list is getting long, so lesser-seen/minor characters are excluded to save space. They would inevitably be removed again were you to add them back. ~SnapperTo 04:44, 28 July 2008 (UTC) * I think Jirobo should be added in by virtue of preserving information of his zanpakuto, since that list is gone. I've said this for a while, but noone's noticed it yet. Stardust Dragon 20:21, 28 July 2008 (UTC) * Having Zanpakuto info doesn't make him a notable character, as he still appears only the once. ~SnapperTo 21:06, 28 July 2008 (UTC) * I don't much care for his character, it's more information on zanpakuto I'm looking to keep. But still, we keep completely useless lieutenants like Chojiro and Kiyone/Sentaro in the list, I see no reason why three sentences can't be devoted to Jirobo. If not this, does anyone have a link to an old diff of the Zanpakuto page so I can copy the list to a userpage? Stardust Dragon 19:29, 29 July 2008 (UTC) * Lieutenants are kept because they're lieutenants, and their absence would be odd. Random seated officers who only appear aren't in the same boat. Anyway here's his zanpakuto info. ~SnapperTo 19:58, 29 July 2008 (UTC) * It makes sense in that respect, I guess. Thanks for the link... now gimme a few minutes to whip up an ol' userpage... Stardust Dragon 20:08, 29 July 2008 (UTC) It says that "Their bodies are composed of ectoplasm which mimics normal human anatomy. " when infact their bodies are composed of spirit particles. --SchmoozingWouter (talk) 19:57, 7 August 2008 (UTC) i just dont see why they start on a character's history/discription/zanpakto and they dont finish it like soifon's zanpakto —Preceding unsigned comment added by <IP_ADDRESS> (talk) 23:39, 21 August 2008 (UTC) Yumichika's new attack Ok, recently revealed in the manga, he has a new attack known as "Ruriiro Kujaku" activated by the command: "Split and deviate". The attack seems to bind the opponent in stems?, that have flowers on them, and apparently as the flowers grow they suck the opponents soul power. Should this be added under his name? ~ Hyakurei (talk) 13:37, 8 August 2008 (UTC) * added. Sui get su 22:04, 8 August 2008 (UTC) * I think this is what Sakikurue is supposed to do; rather, this is the technique we saw him using against Shuhei back in Soul Society. We just didn't get to see the whole attack. Sui get su 22:04, 8 August 2008 (UTC) So its not his Bankai? —Preceding unsigned comment added by Flatbush756 (talk • contribs) 23:04, 8 August 2008 (UTC) * Every time someone uses bankai in the series, you get a "BANKAI!" before it actually occurs. sephiroth bcr ( converse ) 23:23, 8 August 2008 (UTC) * So true. :D ~ Hyakurei (talk) 23:50, 8 August 2008 (UTC) * Wish it was his bankai tho Sui get su 16:44, 9 August 2008 (UTC) As of chapter 322 he can be seen eating one of those flowers, could it be that these flowers restore his power somewhat? If you recall the battle between him and hisagi, he appeared as energetic as ever afterwards, while fightning someone who can be considered at least equal (being a vice-captain as well). So, should we mention this or is this matter too vague at the moment? twsl ► Talk 13:20, 22 August 2008 (UTC) * Far too vague. King Zeal (talk) 14:54, 22 August 2008 (UTC) * Just put that it lets him restore his reiatsu somehow. <IP_ADDRESS> (talk) 18:43, 22 August 2008 (UTC) Article becoming less useful There have been many things removed from this article. I can no longer reference back Zanpakuto names and/or abilities back to its owner and a lot of pictures and media have been removed. All in all, I'd say you guys tossed out way too much in an effort to make this article useful. Merging in articles about other Soul reapers into this one will result in the loss of a great deal more information. I think this is a mistake. —Preceding unsigned comment added by <IP_ADDRESS> (talk) 20:13, 28 August 2008 (UTC) * Wabisuke like that? Sui get su 02:56, 1 September 2008 (UTC) Wabisuke Current information on wabisuke, vice-captain kira's zanpakuto, is incorrect. In Issue 323 of the manga, it shows that the reason for wabisuke's shape having the hook at the end, is to be able to decapitate the opponent who is now so heave that he collapses and bows his head, and not for the fact that it causes them to bow their heads. Kira could be seen doing this to Abirama in the final page of the issue. Would someone please correct this, as unfortunately i am currently unable to create a log in. - Phoenix559 <IP_ADDRESS> (talk) 07:38, 29 August 2008 (UTC) * That is not an "error", it is an update. But semantic hair-splitting aside, I'll add it as soon as I read the chapter myself. Give me a minute. --erachima talk 07:42, 29 August 2008 (UTC) * Using it for that purpose once doesn't mean that it was the intended use. Nothing in the article says anything about the hook's actual purpose and it should stay that way. Sui get su 05:46, 31 August 2008 (UTC) * Did you miss the "You asked 'what can I do with this strange blade?'" dialog, I take it? --erachima talk 06:07, 31 August 2008 (UTC) * I can get high by sniffing an Expo marker, doesn't mean it's the intended purpose. Sui get su 02:54, 1 September 2008 (UTC) Edit request rePlease remove from the lead. Having the menu so limited makes it hard to see who is where or even who is listed, making the menu less than useful to anyone who isn't already a fan of the series who would know where everyone "should" be and makes the menu nearly useless for navigating the articles. List of Naruto characters is a larger featured list and does not use such a limit, and I can see no valid or value in doing so here. -- AnmaFinotera (talk · contribs) 13:41, 11 September 2008 (UTC) * Actually the list of Naruto characters does use a TOClimit of three just like this page. The value of the limit is that it allows us to create anchors for redirects to specific character sections without having sixty-eight TOC entries, a number that will go up even more if/when we take out the "former officers" sections. --erachima talk 23:14, 11 September 2008 (UTC) * How will it grow if there are less sections? I didn't realize Naruto had any TOC limit, since you could actually see the main characters in the list. I just don't see how the limit is useful or helpful at all. Right now you can not find a single character in the menu, you have to scroll/page down. That is not helpful to any readers, but particularly to those who may not be very familiar with the series. -- AnmaFinotera (talk · contribs) 23:20, 11 September 2008 (UTC) * If we take out the "former officers" subsections they'll be replaced by at least one and sometimes two or three subsections for the individual characters there listed, so we'll end up with even more sections than we have now. * Unfortunately, while I agree that the ToC should show the major characters, I don't have any concrete suggestions for how to fix the problem on this page, since it stems from Bleach having way too many characters to easily present. Perhaps the more basic problem could be solved by rearranging the main List of Bleach characters? If we were to include brief individual entries for the guys listed in the characters section of the main Bleach page and the more significant secondary characters like Kenpachi, Gin, and Grimmjow, we could then cover the characters that the average reader would be looking for in one spot. The navigation issues with these character lists would then be less likely to cause problems. (Note, however, that this would probably require splitting off yet another secondary character list to hold the miscellaneous guys like humans and non-shinigami SS dwellers.) --erachima talk 23:44, 11 September 2008 (UTC) * Ugh, the current state of List of Bleach characters is awful. Arrange it like List of Naruto characters or find a similar method that doesn't focus solely on race, which isn't a good way to present it to an average reader (the current state of the list is incomphrensible to an average reader). And FYI, having tertiary lists on minor characters has been basically shot down as violating WP:WEIGHT in recent months, and Visoreds and List of Bounts in Bleach are AfD bait in this regard. Making more of those isn't the solution to our current predicament. Foremost, finding a better way to organize List of Bleach characters would help us in organizing the rest of the lists. sephiroth bcr ( converse ) 06:34, 12 September 2008 (UTC) * Well, my apologies to the prescriptionists (who apparently don't understand what WP:UNDUE refers to in the first place, if they're using that as the basis for their argument), but Bleach has a lot of significant characters, since Kubo uses two or three or eight people to fill each secondary cast slot that one character would usually have. I'm toying with a potential layout for the main list right now, by the way, and I'll present that for you guys to look at soon. --erachima talk 07:16, 12 September 2008 (UTC) Edit request 2 Change the english of Yumichika's release command from "Rip With Insanity" to "split and deviate," please. <IP_ADDRESS> (talk) 05:00, 12 September 2008 (UTC) * Why? -- AnmaFinotera (talk · contribs) 05:26, 12 September 2008 (UTC) * Because that's what he says in the English adaptations? Sui get su 14:02, 12 September 2008 (UTC) * I couldn't remember what it said, hence my checking. :) Thats another problem with our list...no idea when any of these folks show up due to the over focus on in-universe writing. -- AnmaFinotera (talk · contribs) 17:43, 12 September 2008 (UTC) * Agreed. We need to add at least some shit in each section saying what these people do in the series. Sui get su 22:54, 12 September 2008 (UTC) Shūhei Hisagi's release At the end issue 324 of the manga, Hisagi released his sword for the first time. Shouldn't it be added to the List of Soul Reapers page? —Preceding unsigned comment added by Milkmantruck (talk • contribs) 10:49, September 5, 2008 Although we now know its name and how it appears in shikai, its purpose has not yet been revealed. I propose we wait until its purpose is shown, and then add it to Shuhei's section of the List of Soul Reapers page. Omiclock (talk) 17:10, 5 September 2008 (UTC) * We couldnt add it anyway... The page has been full protected for some reason... Not really seeing the edit disputes that forced the issue though... -- Ghost Stalker (Got a present for ya! | Mission Log) 17:33, 5 September 2008 (UTC) * It was fully protected because of the daily, and sometimes hourly, edit warring over the issue of former/current officers, spelling, etc. -- AnmaFinotera (talk · contribs) 18:09, 5 September 2008 (UTC) * Looks like we're in for a long protection then. Anyways, zanpakuto should be included regardless of whether or not we know what they do, as per Chojiro, Isane, Omaeda, Enryu, Kyoraku, Ukitake, Iba, Matsumoto... need I go on? Sui get su 23:00, 5 September 2008 (UTC) 9th division lieutenant Shuuhei Hisagi release his zanpakuto on the command 'reap' followed by its name 'Kazeshini' 'Kaze' means wind or air and 'Shini' means death or die. it is a wind-type zanpakuto that comes in a pair. it looks like two windmills connected by chain and each windmill has two rotating blades on them. Hisagi is the third in Soul Society who owns a zanpakuto that becomes a pair after its shikai release, the other two are 13th division captain Ukitake Juushirou and 8th division captain Kyouraku Shunsui. --RazielMakenshi (talk) 10:24, 6 September 2008 (UTC) * Except here we write grammatically correct and coherent phrases into our encyclopedia, not random OR and unneeded detail. Sui get su 01:40, 7 September 2008 (UTC) I agree with Suigetsu, it's gonna take at least one more week to find out what it actually does, so there's the lack of updated information right there. —Preceding unsigned comment added by Milkmantruck (talk • contribs) 18:13, 6 September 2008 (UTC) * To be honest, I doubt we're gonna get to see anything spectacular. Most likely it'll be a half-assed release like Matsumoto's and Iba's were, where we're left with hardly a clue as to what it does. Sui get su 01:42, 7 September 2008 (UTC) * Nah, this time the plot is focused around his fight, so we should get to see something... —Preceding unsigned comment added by Milkmantruck (talk • contribs) 18:13, 7 September 2008 (UTC) * No new abilities as per next chapter spoiler. <IP_ADDRESS> (talk) 00:08, 12 September 2008 (UTC) all he seems capable of doing with kazeshini is slice through things with ease, it's clearly a dierect attack type zanpoktou. —Preceding unsigned comment added by Kazeshini (talk • contribs) 22:04, 12 September 2008 (UTC) Kazeshini might not have any particular special ability, but it's fast and extremely sharp, and its path seems to be difficult to predict. And I think it deserves a mention somewhere that Shuhei doesn't like it because it's shaped like something meant to take life. Also, I find it odd that no one's mentioned that the armband on his right arm is a seal, he was on the losing end until he snapped it off. Akke Bandvagn (talk) 08:46, 13 September 2008 (UTC) * Seal? All we know so far is that it's explodes. Any power-suppressing ability it may have is at this point speculative. --erachima talk 08:50, 13 September 2008 (UTC) * I went back and checked, and you're right, it does explode, I just never caught it was the armband that exploded. And in that light I suppose I misinterpreted the things that gave Shuhei the upper hand in the fight. I realize I'm sometimes missing little details because I read a little too fast, thanks for correcting me^^ Akke Bandvagn (talk) 10:48, 13 September 2008 (UTC) * I think that he also mentions that the blades, once thrown, can move on their own, making their arcs unpredictable. Plus, I personally would describe them more as a pair of kama, each with two blades curving both directions. —Preceding unsigned comment added by <IP_ADDRESS> (talk • contribs) 03:27, 14 September 2008(UTC) * The blades never moves on their own, check it again and you'll notice how he always has a hand on the chain and makes a movement with it whenever one of the thrown blades changes direction. The kama description is good though there's probably something else it resembles more, but I'm no expert on weapons so I'll keep quiet. It fits with the 'reap' release command though, since a kama are a type of sickle. * Also, on a nitpicking level, I noticed Shuhei's article said he only had a matching armband on his right arm while it's obvious in the latest chapters that he them on both arms, but the left one is usually covered by the vice-captain badge. I dunno if it's been visible before though. Akke Bandvagn (talk) 19:48, 15 September 2008 (UTC) I need some help! I attempted to research the kanji for Kazeshini and it's release command, but the RAW I managed to get was a little small so I couldn't decipher the smallest print. The release command is 刈れ (karire), but there was a kana beside it, denoting pronouncication, that I couldn't read. Can someone else get a better view of it so we can get the correct command? Akke Bandvagn (talk) 15:49, 18 September 2008 (UTC) Unprotected I've lifted the indefinite full protection of this page since it's been in place too long for a case where there does not appear to be a particular bone of contention under discussion here. The discussion about inclusion a few sections up looks amicable enough and has hopefully moved far enough to produce a useful onward trajectory for the article. Splash - tk 19:40, 17 September 2008 (UTC) Good picture to add Just stumbled upon this. --Piotr Konieczny aka Prokonsul Piotrus 06:56, 18 September 2008 (UTC) * It's out-of-date, it still lists Ichimaru, Tosen and Aizen as captains. —Preceding unsigned comment added by Milkmantruck (talk • contribs) 13:15, 18 September 2008 (UTC) * Doesn't matter, the images on the page do so as well. (Also, if you wish to get technical, Aizen and Gin haven't been replaced yet and still hold their captain titles. The most recent guidebook listed the two as merely "missing". Tosen is officially out though.) More to the point, that image should not be included because it blatantly fails WP:NFCC and is a lousier representation of the character designs and personalities than the current group images. —Preceding unsigned comment added by Erachima (talk • contribs) 08:24, September 18, 2008 * Seconded...it is not a good image to use and fails WP:NFCC as even if the source could be verified, it would have to be reduced to the point of uselessness to be used under a valid fair use claim. -- AnmaFinotera (talk · contribs) 14:10, 18 September 2008 (UTC) * How does it violate NFCC? It's as fair use as anything else, and much more encyclopedic (chart showing most important SR personnel) than a few screenshots showing only a few of them.--Piotr Konieczny aka Prokonsul Piotrus 17:17, 18 September 2008 (UTC) * Because it's actually 26 different images all put together. Unless this was created by Studio Pierrot (which seems unlikely), such a collage is discouraged by WP:NFC. ~SnapperTo 17:44, 18 September 2008 (UTC) * Yep, user-generated image collages can only be used to demonstrate specific points about change in visual presentation that are discussed in the text. It would also be impossible to source all the screenshots in it, and it's not that good of quality anyway. --erachima talk 22:26, 18 September 2008 (UTC) Edit request 3 From episode 187: his zanpakuto is called Daichimaru and is released using the command "rock". He's not mute, he just doesn't speak frequently because his voice sounds as if he had inhaled some helium. --<IP_ADDRESS> (talk) 22:02, 12 September 2008 (UTC) * Get the kanji for the name and the hiragana for "rock." Sui get su 22:55, 12 September 2008 (UTC) * Zanpakuto (Daichimaru; だいちまる) release command "Rock" (ゆらす, yurasu) WhiteStrike (talk) 22:31, 14 September 2008 (UTC) * Zanpakuto names are never written in hiragana, unless I missed something. The command is fine. <IP_ADDRESS> (talk) 18:52, 15 September 2008 (UTC) * Daichimaru means "the land", probably referring to the rock-like structures he can make. Skeletawn (talk) 02:48, 17 September 2008 (UTC) * I don't get how the kanji translates with the "the" article, though. Could we have gotten it wrong? <IP_ADDRESS> (talk) 17:41, 21 September 2008 (UTC) * Oh yeah, and I think "yurasu" should be "yurase." <IP_ADDRESS> (talk) 17:41, 21 September 2008 (UTC) Amagai not in manga? I have been following the manga feverishly and I have not yet come across him nor his "story line" as stated in the article. He also is not shown as the captains defending fake Karakura. Can anyone reconfirm this or negate my query by adding said chapter he is featured in Bleach manga? If not May I request to add to his status as "Anime only" character? <IP_ADDRESS> (talk) 11:55, 20 September 2008 (UTC) * "Shūsuke Amagai is introduced as the captain of the 3rd Division during season eight of the anime." ~SnapperTo 18:33, 20 September 2008 (UTC) * Then wouldn't it be more correct by stating the fact that he is a "anime only" character as opposed to generalizing him and grouping him with manga ones. I've done some digging and sure he does appear as a 3rd row captain and on his own anime-filler story arc but he does not appear in the original canon. To which I assume that manga-purist would want to be pointed out <IP_ADDRESS> (talk) 05:05, 21 September 2008 (UTC) * The characters are not grouped by "manga" nor "anime" only. They are characters period and it is noted that he appears in the anime and I've added an additional not to further clarify he does not appear in the manga. -- AnmaFinotera (talk · contribs) 05:35, 21 September 2008 (UTC) * Whilst it is true that characters are not grouped via manga or anime, he is in a unique position as being the only "captain" to be picked as compared to other anime only characters. Although pre-edit would have confused other readers, such as i, at least a mention would clarify and make it known that he is so. With that I am grateful for the clarification but would it also be possible mention the same thing for Mikoto Kibune? Thanks again for the outstanding work compiling these info. <IP_ADDRESS> (talk) 17:13, 21 September 2008 (UTC) * I'm not sure being picked out of a patrol group is unique in Kibune's case, as he's just a 3rd seat. I think it's mentioned that he comes with Amagai, or that Amagai brought Kibune with him, etc. Sui get su 18:01, 23 September 2008 (UTC) Officer/Former Officer issue Why are we even attempting to divide each list into "officer" and "former officer"? It seems like an extremely unnecessary division, and does not appear to be in keeping with any other featured character list. Stepping outside of anime (as we only have one FL char list), List of Meerkat Manor meerkats does not sort itself into dead meerkats and living ones. I suggest we get rid of the entire "former" subdivision, and simply put the officers in a neutral order for each division by the order they are introduced. Let the prose handle their move from current to end and thereafter. We also need to work on the general format, such as the voice notes, to be more like List of Naruto characters where in the anime voices are noted at the end to ensure undue weight is not being given to the anime over the manga. -- AnmaFinotera (talk · contribs) 00:47, 30 August 2008 (UTC) * It started because some of the characters were introduced as former officers. Urahara and Yoruichi have never been officers within the actual course of the story, only prior to it. Then, when Aizen and co. defected, it was expanded to include them, and now to the vizard and Captain Filler. * But the whole list needs rewritten anyway, so that's the least of our current concerns. --erachima talk 02:13, 30 August 2008 (UTC) * A single FA doesn't translate into particularly widespread precedent in the first place though. --erachima talk 03:54, 30 August 2008 (UTC) * True, but it is a good model to follow considering the amount of reviewing, discussion, etc it has received. We can also look at featured TV character lists, which also do not do the kind of sorting. -- AnmaFinotera (talk · contribs) 04:00, 30 August 2008 (UTC) Why not split into former officers and current officers? Although I, for one, think that keeping the page as it is would be the best option... maybe put them in a different order, but still. —Preceding unsigned comment added by Milkmantruck (talk • contribs) 15:53, 5 September 2008 (UTC) * Because the division is not a very good one. Throughout the series, some stop being officers and some seems to fairly subjective as people can't even agree if dying makes you a "former" officer or not. It also seems to be completely unnecessary. We already have the list divided by divisions, and I think that's sufficient enough. Put each division in order of appearance or in order of rank, and leave it at that. -- AnmaFinotera (talk · contribs) 15:58, 5 September 2008 (UTC) * Oh, NOW I understand what you mean. However, it should at least say which is the current captain or lieutenant in brackets or something, just to clarify things. But what if the position is vacant? —Preceding unsigned comment added by Milkmantruck (talk • contribs) 13:13, September 6, 2008 * No, not really. This isn't supposed to be a chapter by chapter update or guide; but an overview. If the position is vacant, it isn't listed. This list should just list each notable person in each group with the appropriately written, out-of-universe summary and referencing. -- AnmaFinotera (talk · contribs) 19:29, 6 September 2008 (UTC) * Well, then, the article won't provide much updated information, will it? —Preceding unsigned comment added by Milkmantruck (talk • contribs) 18:13, 7 September 2008 (UTC) Protection Although Collectonian's reasons were perfectly valid, I don't think protecting the page will fix anything unless we discuss what we need to fix. The former officer stuff is a steaming pile of horse shit that needs to go if people are going to try to put Kifune in there repeatedly. My position is this: Dying in the middle of a story arc makes you (deceased), not "former." "Former" should refer to those that defected or were otherwise replaced. That means the dead ones get a (deceased) tag, and the alive and defected (or replaced) ones go in Former Officers because their position is no longer theirs. Still, one user repeatedly edit warring to get his way does not equate to full protection. I think it'd be a lot more efficient if we just unprotected the page, see if he keeps adding it, and if he does, just block him so the rest of the contributive editors can continue to improve this page. <IP_ADDRESS> (talk) 01:31, 11 September 2008 (UTC) * I agree this needs to actually be discussed before we attempt unprotection. We need to come to a consensus regarding the listings and former officers. As already noted, I favor removing the whole system of marking officers as "former/current" as I feel it goes against other featured lists and what is the standard. We don't mark folks as "dead/alive" so I see no real valid reason to do the same here. -- AnmaFinotera (talk · contribs) 01:35, 11 September 2008 (UTC) * The whole "former" thing is silly. You have a section header (by division) and you list characters. For the third division, it would be Gin --> Kira --> Rose --> Amagai --> Kifune (unless you have a "Visored" section in the article). sephiroth bcr ( converse ) 02:08, 11 September 2008 (UTC) * When I first added the "Former officer" section I meant for it to be used as Suigetsu described: only for defected or replaced officers. I have no attachment to the practice, but I don't like the organization by division either. Doing so causes some characters, such as Aizen, to be listed twice, and it would necessitate reorganizing the list if a character is ever transferred to a different division. A more simplistic method would simply be listing them all alphabetically or, to divvy it up somewhat, by highest rank achieved, with "X is the Y of Zth division" introing each bio. ~SnapperTo 03:37, 11 September 2008 (UTC) * No reason for Aizen to be listed twice. He isn't an officer, should he should be moved. Maybe an odd comparison, but that was a minor issue at List of Meerkat Manor meerkats, in which meerkats are arranged by group. If a meerkat moved, once it was clear it was long term/permanent, they were moved to their current/final group. I think the same thing would be fine here. Aizen isn't an officer anymore, so he doesn't need listing in his former division. -- AnmaFinotera (talk · contribs) 03:40, 11 September 2008 (UTC) * Why would Aizen be listed twice? He's only seen in the 5th division. By the way, this is Suigetsu, and I don't know why it signed me as an IP user in the OP. <IP_ADDRESS> (talk) 13:06, 11 September 2008 (UTC) * He's currently listed under 5th division and under other. It would be much easier to see that if it weren't for that very limited menu. That limit seriously needs to come off there and let it be a normal menu. -- AnmaFinotera (talk · contribs) 13:39, 11 September 2008 (UTC) * He isnt listed under "Other" though, last I checked... Only 5th Division... But I agree, removing the ToC limit would help in seeing who is actually listed on this page. -- Ghost Stalker (Got a present for ya! | Mission Log) 16:22, 11 September 2008 (UTC) * I'm gonna get the kanji for Enryu's zanpakuto and Amagai's bankai so we can get someone to add it in while it's still protected. Anyone know the kanji for "en" and "ku" in "Gouenkaku?" <IP_ADDRESS> (talk) 17:21, 11 September 2008 (UTC) * My mistake; I meant to say Gin. He's listed under 3rd and 5th Division. Aizen used to be listed twice, once as lieutenant of 5th Division and again as captain of 5th Division. ~SnapperTo 18:23, 11 September 2008 (UTC) * So who wants to request unprotection for me? Too lazy to do it myself. <IP_ADDRESS> (talk) 20:52, 11 September 2008 (UTC) * Until it is clear there is consensus, I don't think it should be submitted yet. -- AnmaFinotera (talk · contribs) 23:01, 11 September 2008 (UTC) * No one's voiced dissent so far. If someone keeps it up, just have an admin ban him. We shouldn't have to let the article suffer because of one random loser edit warring to get his way. <IP_ADDRESS> (talk) 23:28, 11 September 2008 (UTC) * Couldn't we list the characters under squads, and for those who are no longer part of a squad, we could put them in their own subsection? * Eg 3rd Squad Izuru. * No mention of Ichimaru Gin. * Each character who is currently in a squad would be listed in their current squad (And in the body of text, we can mention if they used to be in another squad). * Former officers * Ichimaru Gin (and others who are no longer in a squad, in alphabetical order). Kimera757 (talk) 02:13, 17 September 2008 (UTC) * That's what is being done now and what is being argued needs to be changed. -- AnmaFinotera (talk · contribs) 02:28, 17 September 2008 (UTC) * Just wondering, can anyone make a user subpage with this page in the format that some users want it changed to? I would rather see how the entire page looks before I make a choice. --Skunkboy74 (talk) 04:09, 18 September 2008 (UTC) * Basically it would be just the squads list, without the "former" stuff and the only others would be those who were not officers in the series, rather than being a catch all for "former" and "dead" officers. -- AnmaFinotera (talk · contribs) 01:19, 21 September 2008 (UTC) Can we agree that for the time being, we should NOT list Kibune as a "former officer?" That seems to be what people are getting at, not one person has argued otherwise (some people have edited though) Sui get su 02:16, 21 September 2008 (UTC) Is something like this what we're trying to do, here? <IP_ADDRESS> (talk) 16:01, 21 September 2008 (UTC) * I think so...looks about right. No former/past officers at all, just officers in their appropriate section, and others reserved for non-officers. -- AnmaFinotera (talk · contribs) 19:24, 21 September 2008 (UTC) * I'll copy it as soon as I get a thumbs-up from someone that can determine if we're in agreement on this. <IP_ADDRESS> (talk) 19:45, 21 September 2008 (UTC) * Sounds good to me, just uh, log in first :P -- AnmaFinotera (talk · contribs) 23:46, 21 September 2008 (UTC) * Was gonna do it, but someone beat me to it. Copied it anyways because there were a few minor differences. Sui get su 02:50, 22 September 2008 (UTC) * Do you guys think we could add their current ranks right below their names like in the userpage? It really made it easier to navigate, at least to me. Akke Bandvagn (talk) 19:51, 24 September 2008 (UTC)
WIKI
Jeremiah Castille Jeremiah Castille (born January 15, 1961) is a former American professional football cornerback from the University of Alabama, Castille was selected by the Tampa Bay Buccaneers in the third round of the 1983 NFL Draft. He played in six seasons in the NFL -- from 1983-1988 for the Buccaneers and Denver Broncos. Castille's best season as a pro was in 1985, when he recorded 7 interceptions. He finished his career with 14 interceptions, which he returned for 207 yards. He also had 3 fumble recoveries. Castille played college football for the Alabama Crimson Tide and was on the last team coached by Bear Bryant. Castille was a pallbearer at Bryant's funeral on January 28, 1983. Castille played for Alabama from 1979–1982, recording a school record 16 interceptions and making the College Football All-America Team in 1982. In the 1982 Liberty Bowl at the end of the season, Castille intercepted three passes in a 21–15 win and was selected as the game's MVP. While playing for the Broncos during the 1987 AFC Championship Game versus the Cleveland Browns, Castille is remembered for stripping the ball from Browns' running back Earnest Byner and recovering it in a play called "The Fumble". He also recorded an interception in Super Bowl XXII, although this is not as widely remembered because his team ended up losing 42–10. Two of Castille's sons, Tim and Simeon, also played in the NFL after playing college football at Alabama. His third son Caleb walked on at Alabama before quitting football to chase his dream of becoming a professional actor and starring as Jeremiah's teammate at Alabama, Tony Nathan in the movie Woodlawn.
WIKI
Talk:Reyan Check the name of Company! According to information from NHTSA full name of this company is: "Rayen Vehicle Manufacturing Co (RVMCO)" wtih WMI = NA6. Not Reyan, but Rayen! Please check it. Eliaua (talk) 07:15, 23 September 2016 (UTC) * this article is about a person; not a company; I have deleted the tags and replaced them with a biography tag. --FeanorStar7 10:21, 17 July 2018 (UTC) Change Name of Article I feel the article should be changed to "Reyan Najmi" since just "Reyan" seems to vague, many other people may have to same name. Does anybody else think the article name should be changed? — Preceding unsigned comment added by OkayKenji (talk • contribs) 00:49, 18 July 2018 (UTC) * I requested it to be moved. OkayKenji (talk page) 09:43, 9 January 2020 (UTC) Requested move 9 January 2020 The result of the move request was: No consensus, and present name is appropriate for the car manufacturer. (non-admin closure) Cwmhiraeth (talk) 14:12, 17 January 2020 (UTC) Reyan → Reyan Najmi – "Reyan Najmi" seems to be his full name. Can't find sources that show "Reyan" only refers to him. Thinking this may be a controversial move because the article has been this title for 10+ years. WP:PRECISE and WP:ATDAB OkayKenji (talk page) 09:42, 9 January 2020 (UTC) * Support per nom. We can turn Reyan into a disambig, as there seems to be a couple different people with "Reyan" as last name or first name.--Ortizesp (talk) 14:20, 9 January 2020 (UTC) * OPpose. Article is about a vehicle manufacturing company. I'm not sure who Reyan Najmi is, but he doesn't show up on any Google results so I assume that was a hoax and I've restored the prior version of the article. &mdash; Amakuru (talk) 11:22, 17 January 2020 (UTC) * Update: I see there is a person meeting the description: but I see no evidence of notability. It may be that the car manufacturer isn't notable either, but they were the topic of this article up until an unexplained IP change in 2018, so that's how it should stay. &mdash; Amakuru (talk) 11:25, 17 January 2020 (UTC)
WIKI
Abstract A method is presented to predict fatigue life which explicitly accounts for specimen specific damage histories and the statistical distribution of quasi-static tensile strengths. First a 'critical element' is identified as that portion of the composite which controls failure, and the stress on that element is monitored. Then a cumulative damage model based on the remaining strength of the critical element, is used to extract an 'intrinsic' S-N curve for the critical element fatigue response from the fatigue data and the stress history. Using unidirectional specimens, such an intrinsic S-N curve was derived, and subsequent fatigue predictions were vastly improved over the traditional S-N curve. Fatigue tests on (90 degrees/0 degrees)(s) crossply materials were then run and lives predicted based on the intrinsic S-N curve with no adjustable parameters. The agreement between experiment and prediction validates the method. This method may have application in real-time durability evaluation of individual composite components using real-time stiffness to continuously evaluate remaining life during service. (C) 1997 Elsevier Science Ltd. Details Actions
ESSENTIALAI-STEM
User:Sabkat2017/L7 craft beer Description The L7 is the only beer that produces the Marsinne brewery. This craft beer is available in bottle of 33c. There is no paper label on the bottle but only incrustation to be as ecological as possible. L7 begins with a slightly bitter floral and fruity taste from the hops followed by a smooth and round transition to a sweeter taste from the malt. The number 7 comes from the 3 grains (2 malts and a wheat) and the 3 hops (2 aromatic and 1 bitter) and the special spice called the "L7 touch". The result is a full-bodied, light amber featuring a floral and citrus notes. The brewery and the brewers The brewery is located in the the farm-castle of Marsinne, located in the village hesbignon of Couthuin In Belgium.The brewers today in Belgium are Tanguy van der Eecken et Nicolas Declercq. However, it is Alexandre Tilmans, the Belgian graduated from Solvay Business School, who is developing the business of L7 in South Africa, more precisely in Cape Town. The sustainability This is a natural and sustainable beer. No chemicals, colorants, flavoring or preservatives are added to this beer. This beer and its brewery has high standards of environmental responsibility and sustainability to their production. This includes reducing waste in the brewery (energy-water-etc.), reusing the yeast and having bottle labels printed directly onto the bottle by using eco-friendly techniques. The art scene In South Africa, this craft beer is associated with South African artists, designers, local cinema production and culture. They work with galleries, independent movie theaters, live music venues and conference centers. They are also sponsor and supporter of the Baz-Art NGO. Source and external link Official English Website
WIKI
File:Easternsuburbsplaque.jpg Summary Photograph of Institution of Engineers Australia plaque at Martin Place Railway Station recognising the construction of the Eastern Suburbs Railway Line in Sydney. Photograph taken by myself on Sunday the 20th of May, 2007. Ajayvius 11:11, 20 May 2007 (UTC)
WIKI
Page:United States Statutes at Large Volume 38 Part 1.djvu/1392 oxlvr INDEX. Lead——Continued. P¤Z¤· Leaves of Absence, P¤·€¤· duty on, not specially provided for ... 129 appropriation for employees, Government ores; determination ...,.,.., 128 Printing Office ... 68, 671 delivery in bond to smelter; liquida~ allowed permanent employees of Departtion ,...,,,. . ,,,..,..., 128 ment of Agriculture in msular pos- 41 ° .,,,_,. . ...,.., 129 sessions .. . 4 ,,..,,. . .., 129 division of, allowed homestead entrymen reg? .. 118 after establishing residence. 704 refuse, run into bars, etc 129 Lebanon, Ind., _ scrap ...,... . ... 129 deficiency appropriation for public buildsheets .,... . .. . . 129 i ¢r. . . 10, 562 shot ...,,. 129 Lebanon, IKy., Colored Baivtist Church, white ..,.. . ... 118 piyment of Court of C aims findings to. . . 971 wire .,..,, 129 Le non, Ky., First Presbyterian Church, Lead Arsenates, pzyment of Court of Claims findings to 970 appropriation for preventing sale, etc., of Le non, Ky., Saint Augu,sz·ine's Roman L d P adulterated, etc .. 440, 1112 Chuzclg an 970 ea igments, yment o ourt o dmgs' to duty on .. 118 Legnon, Mo., Leads for Pencils, deficiency appropriation for public buildduty on .. 151 ing. . .. 562 Leadmlle Natixmal Forest, Colo., Lebanon, Pa. appropriation for maintenance, etc., of. 427, 1097 condemned cannon granted to. . . 1208, 1215 Legf To acco, Lebanon, Tenn., uty on .. 132 appro riation for public building .. 612 · Leaman, William P., Lecture Lyceums, payment of Court of Claims findings to ad- special tax not applicable to .. 752 ministrator of ... 974 Ledger Paper, Leases, Alaska Coal Deposits, duty on. ... 146 provisions for 742 Lee, Honorable Blair, Leather, deficiency appropriation for expenses. 574 duty on, bags 150 Lee, Jane T., baskets. 150 payment of Court of Claims findings to belts ... .. . 150 admiuistrix of ..,. . 969 card cases ... .. 150 Leech Lake Indian Reservation, Minn., enameled upholstery ... 150 appropriation for hospital for Chippewa glove ... . .. 150 Indians at Red Lake Reservation, glove tranks .,. . . ... 150 or ... , ...,,,,, 592 gloves, glacé finish. 150 Leeches, jewel boxes ... 150 on free list ..,,,., 159 manufactures of, not specially provided Leesburg, Va., for ... . ..., 150 deficiency appropriation for public buildmen’s gloves, not specially provided for. . 150 ing __,,.,,,,,,,,,,,____,___________ 562 pianoforte and piano action 150 Lefme, yar,/’ P°€k°*P°°k¤ ~·---·· · ·-·-···—·-·····--·· 150 payment of Court of Claims Endings to r><>¤f<¤1¤<>¤ ·-·-· - --~-·-·-- 150 sdmmisnsm of ,., ses 82;tCl1(flB. . E ., E . . . Le,/hmkyl, William, °nb0’§;’s mtr °“ ····•·· · ········ · ··‘···· 158 deficiency appropriation for refund to . 317 compressed . . . . . 158 Legggljb · · · pted from income tax. ., . ... 167 i‘m°“§;’?“‘ T"? if ?Fi’T*?i‘?.?T E{°??T’T'·;’ i 1: {E3 i¤·=<»¤··> ima shrewd ¤» Mme ¤¤ not specially provided for .. 158 _ pmvm°n°‘ *‘‘· ‘ ··‘·····***·’·*·•· 167 sadd es and saddlery ... . 159 L¢9¢”w‘”·$._ _ _ shoe laces ______________________________ 153 aplpropnatron for secretaries 443, 1117 shoe uppers, etc ____ _ __________________ 158 or clerks at . . . 444, 1117 Shoes ___________________________ _ _______ 158 for interpreters to. . 444, 1117 Leathers, Alfred, Legishtwe, Ljxecuttve, Expenses, payment of Court of Claims findings to ad- appropriation for legislative expenses. . . 454, 997 ministratrix of . 969 or Senator ... , ... Z ... 454, 997 Leavenworth, Karts., automobiles for Vrce President and appropriation for expenses, Volunteer Speaker. ., 457 Soldiers ’ Home. . .. 41, 640, 851 fo1‘ Capitol p0l1C¢; .. . 458, 1000 for penitentiary, construction. 51,651,865 for Jo1nt_ Committee on Printing; Confor penitentiary, maintenance. 55, 655, 868 gressional Directory. 458, 1(X)0 deficiency appropriation for penitentiary, for ouse of Representatives 458,1001 maintenance. 222, 323, 572 "during the session " to mean 115 days 461 Leases, “during the semion " to mean 208 days 1003 duty on ar1:i.tieia.l, for millinery ornaments. 148 for Lrbrary of Congrem . ..,. 462, 1004 buchu . 117 for Botanic Garden . 464, 1006 coca .. . ,,, 117 for executive expenses . . ... 464, 1007 dried . . . . . . 116 for President . ’. . 464, 1007 gentian ... . ,... 117 for Vice President . .. 464, 1007 on free list, crude, drugs, not specially pro- for E;ecutive_0f!ice 464, 1007 vided for ... . .. 157 for Civil Service Commission . . . 465, 1007
WIKI
Page:Journal history of the Twenty-ninth Ohio veteran volunteers, 1861-1865.djvu/143 with his regiment and drive and keep away this force, which was accomplished without loss. The command camped for the night near Buckhead church December 12th to December 20th inclusive, a substantial line of works was thrown up for the protection of the command from the artillery of the enemy, and in addition to this two forts, with thirteen embrasures in the aggregate, were constructed by the command. The working parties on Fort No. 2 were under the command of Captain Kreicler, One Hundred and Forty-seventh Pennsylvania volunteers, and those on Fort No. 3 under command of Captain E. B. Woodbury, Twenty-ninth Ohio volunteers. Both these officers and the men under their command are deserving of praise for the energy and perseverance manifested in the prosecution of the duty assigned them. "December 21st, the enemy having evacuated their position the night previous, their works were occupied at an early hour by the skirmishers of the division, and by sunrise the city of Savannah was entered and occupied, this brigade being in line in the advance into the city. Soon after reaching the city, the Twenty-eighth Pennsylvania and Twenty-ninth Ohio volunteers, under command of Colonel John Flynn, were, by order of the commanding-general of division, through Captain Veale, aide-de-camp, dispatched to occupy Fort Jackson and the smaller forts and batteries near it. The possession of the forts and other works was gained with but slight resistance. "Inventory of ordnance and ordnance stores captured by the Twenty-ninth Ohio volunteers and the Twenty-eighth Pennsylvania in Fort Jackson and other forts on the Savannah river: Forty-four thirty-two-pounders, two ten-inch Columbiads, twenty eight-inch Columbiads, two
WIKI
freeCodeCamp Challenge Guide: Problem 64: Odd period square roots Problem 64: Odd period square roots Solutions Solution 1 (Click to Show/Hide) function oddPeriodSqrts(n) { function getPeriod(num) { let period = 0; let m = 0; let d = 1; let a = Math.floor(Math.sqrt(num)); const a0 = a; while (2 * a0 !== a) { m = d * a - m; d = Math.floor((num - m ** 2) / d); a = Math.floor((Math.sqrt(num) + m) / d); period++; } return period; } function isPerfectSquare(num) { return Number.isInteger(Math.sqrt(num)); } let counter = 0; for (let i = 2; i <= n; i++) { if (!isPerfectSquare(i)) { if (getPeriod(i) % 2 !== 0) { counter++; } } } return counter; }
ESSENTIALAI-STEM
The association between the metabolic syndrome and peripheral, but not coronary, artery disease is partly mediated by endothelial dysfunction: the CODAM study. M. Jacobs*, M.M.J. van Greevenbroek, C.J.H. van der Kallen, I. Ferreira, E.E. Blaak, E.J. Feskens, E.H. Jansen, C.G. Schalkwijk, C.D.A. Stehouwer *Corresponding author for this work Research output: Contribution to journalArticleAcademicpeer-review Abstract Eur J Clin Invest 2010 ABSTRACT: Background The metabolic syndrome is associated with coronary artery disease (CAD) and with peripheral artery disease (PAD), but the underlying mechanisms explaining these associations have not yet been completely clarified. The aim was to investigate (i) whether endothelial dysfunction can explain the association between the metabolic syndrome and CAD and/or the severity of PAD, as measured by the ankle-arm index (AAIx); and (ii) whether any such mediation is independent of that from low-grade inflammation. Materials and methods We studied 539 subjects (232 men) aged 59.4 +/- 6.9 years, with an increased risk of type 2 diabetes and cardiovascular diseases. Endothelial dysfunction and inflammation scores were calculated from three markers of endothelial dysfunction (soluble E-selectin, soluble vascular cell adhesion molecule-1 and von Willebrand factor) and six of inflammation (C-reactive protein, interleukin 6, soluble intercellular adhesion molecule-1, serum amyloid A, ceruloplasmin and haptoglobin). The association between the metabolic syndrome and CAD and/or PAD, and the mediating role of endothelial dysfunction herein was examined with logistic and linear regression analyses, all adjusted for age, sex and smoking. Results Subjects with the metabolic syndrome (n = 289; 54%) had higher prevalence of CAD [OR (95%CI) = 1.75 (1.14; 2.69)] and lower AAIx [beta (95% CI) = -0.036 (-0.056; -0.016)]. Endothelial dysfunction explained 6% of the association between the metabolic syndrome and CAD, and 19% of the association with AAIx, whereas low-grade inflammation explained 26% and 28% of these associations, respectively. Together, the two scores explained 24% and 36% of the association between the metabolic syndrome and CAD and AAIx, respectively. Conclusions Endothelial dysfunction explains part of the association between the metabolic syndrome and the severity of PAD, but is not involved in the association between the metabolic syndrome and CAD. This indicates that the pathophysiologies of coronary and peripheral artery disease are essentially distinct. Original languageEnglish Pages (from-to)167-175 JournalEuropean Journal of Clinical Investigation Volume41 Issue number2 DOIs Publication statusPublished - 1 Jan 2011 Fingerprint Dive into the research topics of 'The association between the metabolic syndrome and peripheral, but not coronary, artery disease is partly mediated by endothelial dysfunction: the CODAM study.'. Together they form a unique fingerprint. Cite this
ESSENTIALAI-STEM
Lee Wing Yan Lee Wing Yan (born 28 April 1997) is a Hongkonger footballer who plays as a midfielder for Hong Kong Women League club Happy Valley AA and the Hong Kong women's national team. International career Lee Wing Yan represented Hong Kong at the 2013 AFC U-16 Women's Championship qualification, two AFC U-19 Women's Championship qualification editions (2013 and 2015), the 2017 EAFF E-1 Football Championship, the 2018 AFC Women's Asian Cup qualification, the 2018 Asian Games and the 2020 AFC Women's Olympic Qualifying Tournament.
WIKI
A David Darling planetocentric and planetographic coordinates Planetocentric and planetographic coordinates are two systems in which the positions of features on the surface of a near-spherical body such as a planet or satellite may be recorded. Specific terms are used when referring to familiar bodies: heliocentric and heliographic coordinates for the Sun; selenocentric and selenographic for the Moon; geocentric and geographic for Earth; areocentric and areographic for Mars; zenocentric and zenographic for Jupiter; saturnicentric and saturnigraphic for Saturn; and so forth.   Planetocentric coordinates are referred to the equatorial plane of the body concerned and are much used in the calculations of celestial mechanics. Planetocentric longitude is measured around the equator of the body from a prime meridian defined and adopted by international agreement. (The prime meridian may be referred to a visible feature in the case of a solid-surfaced body such as Mars, but in the case of a gaseous planet such as Jupiter it is a purely hypothetical concept.) Planetocentric latitude is measured in an arc above or below the equator of the object in the usual way.   Planetographic coordinates are used for observations of the surface features of those planets whose figures are not truly spherical, but oblate. They are referred to the mean surface of the planet, and are the coordinates actually determined by observation. They can readily be converted to planetocentric coordinates if required. As the oblate planets are symmetrical about their axes of rotation, there is little difference in practice between planetocentric and planetographic longitudes. However, the differences between planetocentric and planetographic latitudes are quite significant for very oblate bodies such as Jupiter and Saturn.
ESSENTIALAI-STEM
Talk:HP 2133 Mini-Note PC Not qualified as a Linux device Otherwise, we will need to say every single x86, and in fact, many cell phones that can run Linux, and other Unix servers as Linux device. Raysonho (talk) 18:00, 7 June 2008 (UTC) * The device SELLS with Linux preinstalled, which qualifies for a template inclusion. Third opinion requested. --Kozuch (talk) 14:50, 14 June 2008 (UTC) * Well, maybe we should do that? If it runs linux, then it's a linux based device, right? --causa sui talk 19:43, 14 June 2008 (UTC) * It is a Windows device then, as it has Windows preinstalled. I don't think a laptop (or computer) should be grouped in this kind of "XYZ-device". 99.9% laptops on today's market can be shipped with any OS that runs on x86. If there is demand, there can be laptops preinstalled with Solaris, and even QNX or VxWorks. However, it's marketing more than anything else as there is nothing special with the device itself. --Raysonho (talk) 23:23, 14 June 2008 (UTC) * says it is preinstalled with Linux? Which is correct? --causa sui talk 23:49, 14 June 2008 (UTC) * It is preinstalled with Win XP or Vista, together with Linux being an option to the users when they order the machine. --Raysonho (talk) 01:28, 15 June 2008 (UTC) * There is 11 more devices like this HP netbook in the laptop section of Template:Linux devices. Why dont you have problems with them too then? --Kozuch (talk) 00:25, 15 June 2008 (UTC) * I will cleanup the template itself, but it's the first step to clean up the article page. --Raysonho (talk) 01:28, 15 June 2008 (UTC) * I am affraid you will not reach consensus here.--Kozuch (talk) 18:49, 15 June 2008 (UTC) Third opinion Template is appropriate as the device ships with Linux 1 and is stated to be for Linux at the product specification on the manufacturer website.2. Species8473 (talk) 02:29, 15 June 2008 (UTC) * There are 6 models of HP 2133 shipping with Windows XP or Vista, while only 2 with Linux preinstalled. See the comparison page. I don't see why we need to emphasis Linux while ignoring Windows. And, as I mentioned above, over 99.9% of the laptops are shipped with either Windows or Linux, there is nothing special about the hardware. --Raysonho (talk) 02:51, 15 June 2008 (UTC) * Following two editors on the template talk page rules section, all products that are shipped with Linux can be added. If you don't agree with that, I believe it's best you take it there. As it would influence many other products having the template as well. Windows doesn't have to be ignored, there is nothing against adding a template for that as well. Species8473 (talk) 03:44, 15 June 2008 (UTC) * Of course I will cleanup the template page -- see the discussion in the Not qualified as a Linux device section. Now you see a problem of adding the template for Windows?? It tells us that the HP 2133 is NOT designed for Linux, it's just another laptop model that the manufactor ships Linux with some models. And, there are only 2 models that are shipped with Linux, which makes it less important. * Further, all general purpose computers can run Linux, but without Linux the machine can be installed with Windows or Solaris and still work perfectly well. I don't understand why we should group all kinds of laptops and desktops and servers as "Linux Devices" and add all of them into the template. But to maintain an unbiased WP:NPOV if we add this huge list as Linux Devices, we will also add the same list (may be a bigger list, as Windows supports more laptop models) as Windows Devices. --Raysonho (talk) 15:26, 15 June 2008 (UTC) * As already said, feel free to start similar "Windows laptops" template. However, I guess you will fail to do so because it is way too general topic and therefore, it would make no sense to start such a template. Isnt it just enough when various Wikipedia articles say MS Windows is market dominant (and therefore ships with 90+% of laptops or desktop computers)?--Kozuch (talk) 18:55, 15 June 2008 (UTC) * Windows is market dominant has nothing to do with not adding a template for it. But my initial reason is exactly what you just said: "because it is way too general topic". We don't need to group all personal computers into a template and say that they are personal computers. And again, what is the value of the template to the reader?? --Raysonho (talk) 14:02, 16 June 2008 (UTC) * HP identifies the product as being a Linux mini-notebook1 There are other HP notebooks listed as certified for Linux, but they cannot be bought bundled with Linux.2 On that topic, the range of Linux bundled products for another PC builder (second in market share after HP 3) is limited to four products 4. * The initial reason for removal was stated in part to be that it is not a "Linux based device".5 HP does state it to be a Linux mini-notebook.1 * On the point of it being a way too general topic, the two biggest players in the market have only a very limited range of Linux bundled notebooks. * The value of navigational templates such as this one is that readers can browse to articles on similar topics. In this case they may be interested in other Linux based notebooks and products. * I find the point that the template is making the article busy unconvincing. As similar templates are used on many important wikipedia articles.1 2 3 4 That really is a personal opinion. * After further exploration my non-binding third opinion remains that the template is appropriate. Species8473 (talk) 16:25, 16 June 2008 (UTC) * Perhaps a Linux devices category would be a better solution here? As it is very true that the list has the potential of becoming quite big. While leaving out devices even though they are stated to be for Linux by the manufacturer and sold with Linux seems unsettling too. It exists here, so use that and drop the template? Species8473 (talk) 01:11, 16 June 2008 (UTC) * Sure the template can become very big. But today, it is not big yet. So what is the question again? Also FYI, the page sits in the cat you name for weeks already.--Kozuch (talk) 11:44, 16 June 2008 (UTC) * It appears there is no official policy on templates, but what we do have Navigational_templates states they "should be kept small in size". If the template is to stay, it could very much use some with clear guidelines for inclusion. Until the latter has been achieved the Template_talk:Linux_devices consensus that products shipped with Linux should best be followed. And that would be the only thing relevant to this talk page. I maintain to be of opinion that the template currently is appropriate for this article, for the reasons stated in the first line of this section. Species8473 (talk) 12:34, 16 June 2008 (UTC) * IMO, adding the template makes the page too "busy". It's not news that laptops can run Linux. And, if a laptop computer that ships with Linux can be added to the template, then most HP, Sun, IBM, Dell server/computer Wikipedia articles should be added as well. And even thinkpad laptops should be added as the manufactor ships some model with Linux. How big do you think the list is???? --Raysonho (talk) 14:02, 16 June 2008 (UTC) * I have made a copy of this at Template_talk:Linux_devices and replied there. Species8473 (talk) 15:08, 16 June 2008 (UTC) "Linux open source drivers" is full of BS VIA has been steadily releasing more and more of its chipset specifications along with even its padlock spec, and even without that linux does support almost every VIA chipset; and for the GPUs there's OpenChrome & other community drivers... As for the wireless I wouldn't know myself but the bcm43xx driver should be mature now. Jorophose (talk) 00:05, 28 July 2008 (UTC) Linux open source drivers Reviewers have noticed that HP choose hardware that is not best suited to Linux enthusiasts. The hardware HP choose to build Mini-Note doesn't have open source Linux drivers. HP choose VIA as it's platform. VIA graphics chip needs proprietary Linux drivers and Broadcom wireless chips also. This is an issue for Linux enthusiasts and who like to install different Linux distribution (other than HP provided SLED) because the hardware doesn't work out of the box manually installing drivers (a task really hard for not experienced users). (added for historic purposes) Changed "Successors" to "Similar products from HP" The Mini 1000 is meant for a different market segmentsource so it can't really be called a successor. --Edward Sandstig (talk) 02:37, 25 December 2008 (UTC) * A very fair point, especially given the 2140's just come out and is more reasonably called a successor. Speaking of which, I'm not sure how to rework the article to better include that. <IP_ADDRESS> (talk) 19:58, 6 January 2009 (UTC) * The 2140 doesn't seem to be a clear-cut improvement over the 2133. It's larger, heavier, and has an inferior screen resolution compared to the 2133. And almost double the starting price compared to the low-end 2133. —Preceding unsigned comment added by <IP_ADDRESS> (talk) 14:16, 3 May 2009 (UTC) HP Mini Note 2140 Additions There doesn't appear to be a dedicated page for the 2140 and there should be. The 2140 and 2133 are closely related, but apart from the physical resemblances they are quite different internally. The Mini-Note 2133 page should remain that. I suggest that a new 2140 page is created and that the 2133 page references the new one. —Preceding unsigned comment added by <IP_ADDRESS> (talk • contribs) * Taking a look at the the service manual (which is shared between them) they seem pretty damn similar to me internally as well as externally. The only significant changes are the better processor/chipset and screen. IMO that isn't significant enough to justify a seperate article. We don't have seperate articles for all the different EEEPC models for example. * I would however suggest moving this page to a more general title and giving the new model equal treatment to the old model. Plugwash (talk) 10:50, 14 February 2009 (UTC) Clarification on screen resolution, XP ACPI compatibility I recently purchased a "low-end" 2133 (the one that comes with a 4 gb SSD drive, SUSE Linux, 512 mb ram and 1 ghz CPU). This unit has a screen resolution of 1280 x 768. HP's spec sheet (13009_div.pdf) for the 2133 does list an alternative or optional screen (1024 x 600), perhaps also having a different backlight (LED vs CCFL). Does anyone know which 2133 models do indeed have the lower resolution screen? Or do all 2133's have the 1280 x 768 screen? Also, I have replaced my 4 gb SSD drive with a 160 gb hard drive, and have installed XP-pro SP3, but can't get the ACPI component to work. Does anyone know if there are valid XP ACPI drivers for the 2133? —Preceding unsigned comment added by <IP_ADDRESS> (talk) 14:05, 3 May 2009 (UTC)
WIKI
Assume-Guarantee Synthesis Krishnendu Chatterjee and Thomas A. Henzinger The classical synthesis problem for reactive systems asks, given a proponent process A and an opponent process B, to refine A so that the closed-loop system A||B satisfies a given specification p. The solution of this problem requires the computation of a winning strategy for proponent A in a game against opponent B. We define and study the co-synthesis problem, where the proponent A consists itself of two independent processes, A=A1||A2, with specifications p1and p2, and the goal is to refine both A1 and A2 so that A1||A2||B satisfies p1∧p2. For example, if the opponent B is a fair scheduler for the two processes A1 and A2, and p-i specifies the requirements of mutual exclusion for A-i (e.g., starvation freedom), then the co-synthesis problem asks for the automatic synthesis of a mutual-exclusion protocol. We show that co-synthesis defined classically, with the processes A1 and A2 either collaborating or competing, does not capture desirable solutions. Instead, the proper formulation of co-synthesis is the one where process A1 competes with A2 but not at the price of violating p1, and vice versa. We call this assume-guarantee synthesis and show that it can be solved by computing secure-equilibrium strategies. In particular, from mutual-exclusion requirements the assume-guarantee synthesis algorithm automatically computes Peterson's protocol. Proceedings of the 13th International Conference on Tools and Algorithms for the Construction and Analysis of Systems (TACAS), Lecture Notes in Computer Science 4424, Springer, 2007, pp. 261-275. Download inofficial, sometimes updated PostScript / PDF document. © 2007 Springer.
ESSENTIALAI-STEM
Design Patterns - Strategy Decouple algorithm execution and algorithm selection for maintanaible code Hello, my friends! This is the second post in the series about Design Patterns in Python. So, first things first: what are design patterns? Design patterns are abstractions. The abstractions or concepts encompass a particular implementation that solves a known, frequent problem while developing software. Compiling these abstractions and giving them proper names, makes it easier for us, as developers to communicate, express intent, and convey complex interactions between our code with a single name. Knowing these patterns will allow you to express yourself better with your fellow developers 💪. Remember: design patterns are recipes. They are general and should serve as a guide. Today we are going to talk about the Strategy Pattern. Strategy Pattern Like we did in our first post of the series, let's start with a scenario. A concrete scenario helps us visualize how these patterns are useful. I will reuse our first scenario - the bookstore. Our first problem was that we had to convert our objects - pure python objects to JSON representations, so we could integration our Awesome Bookstore to a big e-commerce player. Let's recall our POPO (Plain Old Python Objects) - modeled as dataclasses for brevity. # models.py from dataclasses import dataclass from typing import List @dataclass class Customer: name: str status: str # can be `normal` or `VIP # for brevity we are considering address to be the state where the customer lives # possible values: state-1, state-2 and state-3 address: str @dataclass class Author: name: str lives_in: str @dataclass class Publisher: name: str company_number: str @dataclass class Book: title: str author: List[Author] genre: str weight: int # in grams # this of course is a simplification because prices are usually handled in Decimal price: float Our problem today is that we need to calculate the final price for our customers, once they finalize the checkout in our store. Depending on their status (customer status) - we want to give them discounts and apply different shipping fees. Consider the following rules: 1. Customers can be of two types: normal and VIP.VIP` customers are indeed very important for us because they buy a lot from us. This type of customer gets 50% off in their shipping fees 2. Shipping fees depend on the state and weight of the book for any kind of customer. The prices for shipping per state and kilograms are listed below: # this per 1000 grams STATE_SHIPPING_PRICES = { "state-1": 10, "state-2": 12, "state-3": 25 } Simple idea 1 To kick things off, we can do it the simplest way possible. Basically, check if the customer is VIP and calculate their shipping price differently. Should be straightforward. Imagine we have some code, that given a cart, returns the total price of the shopping cart. def get_cart(): # dummy function that retrieves a static shopping cart with some books george = Customer(name="George", status="normal", address="state-1") daniel = Author(name="Daniel Higginbotham", lives_in="USA") russ = Author(name="Russ Olsen", lives_in="USA") book1 = Book( name="Clojure for the Brave and True", author=[daniel], genre="Computer Science", weight=200, price=19.99) book2 = Book( name="Getting Clojure", author=[russ], genre="Computer Science", weight=200, price=19.99) return {"books": [book1, book2], "customer": george} Using the function above, we can construct a list of books to be purchased and who is our customer. In this case - the customer, me, is a non-VIP customer living in state-1. This means that the shipping fee is 10 moneys per kilogram. If I'm purchasing 2 books of 200g each, it means that we have 400g total weight. Doing quick math here we should charge me 4 moneys in shipping fees. Let's implement that in the easiest way possible: def calculate_total(books, customer): total_book_price = sum([book.price for book in books]) total_weight = sum([book.weight for book in books]) total_shipping_price = total_weight * STATE_SHIPPING_PRICES[customer.address] if customer.is_vip: total_shipping_price = total_shipping_price * 0.5 # 50% discount return total_book_price + total_shipping_price Python is really expressive, so it seems easy, huh? The problem starts when there are a lot of variations for price calculations, which makes this hard to calculate and maintain. See the if clause? There is where our headache begins, when the product department decides to implement discounts at book prices for other types of customers, or if they introduce a new type of super-vip customer, that can get 100% discount at shipping prices. All of this starts to get messy fast. That's where the strategy pattern is useful - implementing variations of the same algorithm with different objects and contexts (keep in mind that Python has functions as first-class citiziens, meaning you can pass functions around, simplifying how to implement the strategy pattern - I'll show both ways). Refactoring this into a strategy A strategy is an object that has a single execute method and performs an algorithm - a series of steps, that might return or not return anything. The only real constraint is that the parameters needed by this algorithm are common among different objects. So - let's imagine that we first refactor our code to split the logic between calculating totals and shipping fees in two functions: def calculate_shipping_total(books, customer): total_weight = sum([book.weight for book in books]) total_shipping_price = total_weight * STATE_SHIPPING_PRICES[customer.address] if customer.is_vip: total_shipping_price = total_shipping_price * 0.5 # 50% discount return total_shipping_price def calculate_total(books, customer): total_book_price = sum([book.price for book in books]) total_weight = sum([book.weight for book in books]) total_shipping_price = calculate_shipping_total(books, customer) return total_book_price + total_shipping_price As you can see, a common signature between the functions starts to emerge. To accurately calculate prices we need both the list of books being purchased and the customer, right? In order to make this more flexible - let's implement a strategy, instead of having a hardcoded algorithm, like the one shown in calculate_shipping_total. class ShippingStrategy: """ Object responsible to calculate the total price of shipping, given a customer and a list of books and their weights. """ def execute(self, books, customer): raise NotImplementedError This is our first strategy. The skeleton. Let's say that we have a default strategy, with no discounts and our discounted one. class DefaultShippingStrategy: """ Object responsible to calculate the total price of shipping, given a customer and a list of books and their weights. """ def execute(self, books, customer): total_weight = sum([book.weight for book in books]) total_shipping_price = total_weight * STATE_SHIPPING_PRICES[customer.address] return total_shipping_price class DiscountedShippingStrategy: def execute(self, books, customer): total_weight = sum([book.weight for book in books]) total_shipping_price = total_weight * STATE_SHIPPING_PRICES[customer.address] return total_shipping_price * 0.5 Tie it all together Ok, cool, we have two strategies. But how can we effectively use it? We need a way to figure out which strategy to apply dynamically. And that is basically it. def which_strategy(customer): if customer.is_vip: return DiscountedShippingStrategy() return DefaultShippingStrategy() def calculate_total(books, customer): shipping_strategy = which_strategy(customer) total_book_price = sum([book.price for book in books]) total_weight = sum([book.weight for book in books]) total_shipping_price = shipping_strategy.execute(books, customer) return total_book_price + total_shipping_price See that instead of using multiple, complicated if statements in calculate_total function, we delegated all the shipping calculation responsibility to other objects, that are self-contained and execute only one thing. The catch here is to abstract our different algorithms in different objects and using a method or a function to determine the strategy for us, given a set of parameters. Separating the execution of the strategy from its choice allows us to have methods with single responsibilities, that are easier to test, easier to extend and maintain. With Strategy we can have several different forms of calculating shipping - without creating a monster function that has all the possible shipping variations you will find around. Functional bonus round In Python, we have functions as first class citizens. That means we can pass around functions to functions. That means we don't need an extra object and an extra concept to wrap our shipping fee logic. Instead, we can basically return functions from other functions and directly use them as needed. The same constraint applies: their signatures should be the same. def discounted_strategy(books, customer): # implement our code # ... return total_shipping * 0.5 def default_strategy(books, customer); # implement our code # ... return total_shipping def which_strategy(customer): # this returns different functions based on our customers input if customer.is_vip: return discounted_strategy return default_strategy def calculate_total(books, customer): shipping_strategy = which_strategy(customer) total_book_price = sum([book.price for book in books]) total_weight = sum([book.weight for book in books]) # directly execute the function return to us from `which_strategy` total_shipping_price = shipping_strategy(books, customer) return total_book_price + total_shipping_price Recap 1. Design patterns are abstractions and guidelines. Use them to communicate complex ideas with your fellow teammates effectively. 2. The Strategy Pattern allows us to execute different algorithms to solve a problem during runtime, based on a strategy selection method 3. Strategy decouples finding the method from its execution 4. The example gave in this post is extremly simple and we might not even need a strategy pattern for this use case. Use your best sense to determine when these rules and choices frequently change or you want a clear separation of concern. Resources Comments (2) Rodrigo's photo Clear and concise explanation, good job
ESSENTIALAI-STEM
Bombing at Wedding Kills at Least 30 in Turkey ANKARA, Turkey — A bomb attack targeting an outdoor wedding party in southeastern Turkey killed at least 30 people and wounded 94 others, the authorities said Sunday. Deputy Prime Minister Mehmet Simsek said the “barbaric” attack in the city of Gaziantep, near the border with Syria, on Saturday appeared to be a suicide bombing. Other officials said it could have been carried out by either Kurdish militants or Islamic State extremists. Photographs taken after the explosion showed several bodies covered with white sheets as a crowd gathered nearby. Early on Sunday, the Gaziantep governor’s office raised the death toll to 30 from 22. It said the number of wounded remained at 94. Turkey has been rocked by a wave of attacks in the past year that have been claimed by Kurdish militants linked to the outlawed Kurdistan Workers’ Party — known by its acronym, P.K.K. — or have been attributed to the Islamic State, also known as ISIS or ISIL. In June, assailants suspected of being Islamic State militants attacked Istanbul’s main airport with guns and bombs, killing more than 40 people. The attack on the wedding came as the country was still reeling from a failed coup attempt last month, which the government has accused Fethullah Gulen, a Muslim cleric based in the United States, and his followers of plotting. Earlier this week, a string of bombings blamed on the P.K.K. that targeted the police and soldiers killed at least a dozen people. A fragile peace between the group and the government collapsed last year, leading to a resumption of the three-decade conflict. In an interview with NTV television, Mr. Simsek called the bombing a “barbaric attack” and said multiple terrorist groups were targeting Turkey. “ God willing, we will overcome,” he said. Mr. Simsek later went to Gaziantep along with the country’s health minister to visit the wounded and see the site of the attack. “This is a massacre of unprecedented cruelty and barbarism,” he told reporters there. He said it was too soon to say who was behind the attack. Prime Minister Binali Yildirim condemned the bombing, saying it had turned “a wedding party into a place of mourning.” “No matter what this treacherous terror organization is called, we as the people, the state, and the government will pursue our determined struggle against it,” he said. A brief statement from the governor’s office in Gaziantep said the bombing struck the wedding in the Sahinbey district at 10:50 p.m. The statement condemned the “treacherous” attack, but did not provide additional details. Mehmet Tascioglu, a local journalist, said on NTV television that a huge explosion could be heard in many parts of the city. In Gaziantep, the police sealed off the site of the attack and forensic teams began investigating. Hundreds of residents gathered near the site, chanting “God is great” as well as slogans denouncing terrorist attacks.
NEWS-MULTISOURCE
When Would a Dentist Recommend a Dental Cleaning? Deep Cleaning Safford, AZ Getting a dental cleaning twice a year goes a long way toward preventing tooth decay. It is a procedure involving the removal of plaque and tartar from tooth surfaces. Plaque is a thin, sticky film created by oral bacteria. It contains bacteria and tooth-destroying acids. It hardens into tartar when left on teeth surfaces for a few days. Plaque can be removed by brushing and flossing, but getting rid of tartar is not as easy. Tartar is too hard to be removed by the bristles of a toothbrush. A tool called a scaler needs to be used to scrape it off. Why a dentist might recommend a dental cleaning Dental cleanings help to protect teeth against the two most common issues, which are tooth decay and gum disease. The American Dental Association recommends getting your teeth cleaned at least two times per year, but more visits might be recommended if the dentist feels they would be beneficial to you. Reasons why a dentist might recommend getting a dental cleaning include: Tooth decay Dental cleaning helps to protect teeth against decay, so a dentist might recommend the procedure if they determine the patient’s teeth are particularly vulnerable to decay. Getting rid of tartar deposits on teeth limits the hiding spaces bacteria can hide. It makes it easier to remove the acids created by oral bacteria before they cause damage to tooth structures. Cleanings are sometimes followed up with fluoride treatments for those who are susceptible to tooth decay. Gum disease The first stage of gum disease is called gingivitis and it can be reversed with good oral hygiene and dental cleanings. Gum disease is caused by plaque and tartar getting into gum pockets. This leads to an immune system response that causes inflammation and irritation of the gum tissues. Over time, this irritation leads to permanent damage to gum and bone structures that support teeth. Patients who have been diagnosed with gum disease are typically advised to come in for a dental cleaning more than two times per year. The dentist might also recommend deep cleanings or laser cleanings to remove tartar trapped in gum pockets. Badly-stained teeth Dental cleaning also provides some aesthetic benefits. Tartar has a yellowish/brownish color, and it is more prone to staining than real teeth. Most of the stains you see on a person’s teeth form on tartar deposits on their teeth. Dental cleanings help to get rid of most surface stains on a person’s teeth. Teeth cleaning will not get rid of discoloration in a tooth’s inner layers, though. Professional teeth whitening treatments can be used to bleach away deep stains in a tooth, and cleaning a patient’s teeth before whitening treatments leads to better results. Ready to schedule a dental cleaning? Next to brushing and flossing, regular dental cleanings are the third most important thing you can do to keep your teeth and gums healthy. Call or visit our Safford clinic to set up an appointment for a dental cleaning. Request an appointment here: https://DesertBloomDentistry.com or call Desert Bloom Dentistry at (928) 428-1617 for an appointment in our Safford office. Check out what others are saying about our dental services on Yelp: Dental Cleaning and Examinations in Safford, AZ. Related Posts The FAQs Of A Deep Teeth Cleaning Deep teeth cleaning is typically performed as a treatment for gum disease. It is a comprehensive type of teeth cleaning that also involves cleaning teeth roots and gum pockets. Removing tartar and the bacteria from these areas can reverse the early stages of the infection, and it can help manage and control its more advanced… What Does A General Dentist Do? Wondering if you should choose a general dentist as your next dental professional? Keep in mind that choosing a new dentist is like choosing a new health care professional, as general dentists are your go-to professionals whenever you are in need of any type of dental care. If you need more detailed dental work, then… 5 Ways To Prepare For Dental Veneers Considering dental veneers? Read on to learn about how to prepare for getting dental veneers. The procedure for dental veneers is minimally invasive and does not require much preparation. However, there are some ways to help ensure the process goes well and to minimize the anxiety that patients often experience before their visit to have… 4 Benefits Of Teeth Whitening In addition to making your teeth look nice, teeth whitening products bring several benefits to your oral health and mental well-being. Whitening products may include toothpaste, gels, and strips that are placed over the teeth. Whitening procedures can be done at home or at a dental facility.The more obvious effect of teeth whitening is a…
ESSENTIALAI-STEM
UPDATE 1-Canada government to fast track infrastructure investments in Alberta (Adds details from press conference, background on pipelines) By Euan Rocha and Nia Williams CALGARY, Feb 3 (Reuters) - Canada is committed to fast-tracking infrastructure investments in the province of Alberta that is reeling from the global slump in energy prices, Canadian Prime Minister Justin Trudeau said on Wednesday. Canada stands ready to provide up to C$250 million to the province in the form of advance fiscal stabilization payments, said Trudeau, who spoke at a news conference with Alberta Premier Rachel Notley. “We know these are challenging times for Alberta and Albertans, and I reiterate that the government of Canada is committed to being there for the people of this province,” he said. Trudeau said that he and Notley agreed Canada must get Alberta’s resources to market in responsible and sustainable ways, but he stopped short of stating his government would back TransCanada’s Corp’s Energy East pipeline project, in the event that it clears the National Energy Board’s review. Energy East, which would take up to 1.1 million barrels of oil per day from Alberta and Saskatchewan to Canada’s east coast, faces increasing problems as environmental and aboriginal groups ramp up protests. Last month, the influential mayor of Montreal and leaders representing 81 nearby municipalities said that they opposed the project because of environmental and economic concerns. TransCanada and Alberta’s landlocked oil sands industry are looking to it to reach international markets after President Barack Obama rejected TransCanada’s Keystone XL pipeline project to the United States last year. Trudeau blamed the lack of movement on pipeline projects on his predecessor Stephen Harper’s Conservative government, which had been in power for nearly a decade before Trudeau took office in late 2015. The Conservatives had argued strongly in favour of Keystone XL, but Trudeau said their approach had marginalized community concerns and ignored environmental science, leading to a lack of headway on pipeline projects. “A responsible government is a referee that ensures a level playing field so that everyone understands what is going on, and is not simply a cheerleader for projects because cheerleaders do not score goals, and for 10 years nothing got built,” he said. (Reporting by Nia Williams and Euan Rocha; Editing by Sandra Maler and Andrew Hay)
NEWS-MULTISOURCE
Within the private confines of their home, away from the prying eyes of co-workers lurking nearby, the average user of a home PC figures they can surf the internet without worrying about intruders. Spyware and Viruses are all that concern them, the installation of malware protection enough to ward off any stress about their computer’s vulnerability. Yet, no matter how much we caution users against leaving their computers unprotected from malware, those pests are not the only threat to which your attention should be turned. Many home networks remain susceptible to the ill intentions of unwanted visitors. Piggybacking ranks as one of the most common offenses, the term referring to the unauthorized use of bandwidth by an outside party. With a wireless connection, piggybackers access an unsecured network, using it as if it were their own. While piggybacking is a relatively mild transgression, usually committed by a struggling college undergrad who can’t afford internet service, it can impact the availability of bandwidth on your network — resulting in a slow response time when using the internet. The more serious violations of network security occur when an intruder invades your network for the express purpose of retrieving private information. Housed on your network are files of all sorts, personal data that you wish to secure against snoops and thieves. Without ample safeguards in place, unauthorized users can ferret sensitive information from your network and use it for their own design. Many people unwittingly leave their networks open, unaware that they’re leaving themselves subject to the unwelcome motives of the internet’s less scrupulous population. Protecting yourself against these incursions is paramount, and one of the most effective ways to do so is the establishment of a firewall. Firewalls do exactly what the term suggests, erecting a wall of protection that shields your network from outsiders, blocking entry to those who haven’t been granted authorization. They can be implemented through software or hardware, to varying degrees, depending on just how secure you want to be. For those looking to set up a firewall on their network, here are a couple free solutions that I like: Comodo Firewall, Zonealarm Free. Creating a firewall can be an involving process. If not properly configured, your firewall will leave you no more protected than you were before its installation. Should you have any questions on how to build one, feel free to give our office a call. We are here to help you. Source by Joshua Holder Reader Interactions %d bloggers like this:
ESSENTIALAI-STEM
Muscle pain, also called myalgia, is experienced by many. The most common cause of localized muscle pain is overuse or injury of a muscle (strain). On the other hand, viral infections like influenza (the “flu”) may cause systemic muscle pain, as can taking certain medications or having a disease like fibromyalgia or hypothyroidism.1 Muscle pain can feel different—aching, cramping, stabbing, or burning—depending on what’s behind it. In the end, diagnosing the reason for your muscle pain requires a medical history, physical examination, and sometimes, blood and/or imaging tests. Rarely, a muscle biopsy is required.   Once diagnosed, your doctor will devise a treatment plan—one that will hopefully give you the relief you deserve.   Note: Muscle pain in infants and children may have different causes than in adults; this article focuses on the latter.   systemic muscle pain causes Illustration by Alexandra Gordon, Verywell Causes Due to the numerous potential causes of muscle pain, it’s easiest to divide them into two categories—those related to localized muscle pain and those that lead to systemic muscle pain.   Localized Muscle Pain Localized muscle pain refers to pain that is focal, or centered around one muscle or group of muscles.     Muscle Strain A muscle (or group of muscles) can become overused, injured, or inflamed as a result of strenuous exercise and/or sudden movement. For example, when pushing off suddenly to jump during a basketball game, an athlete may overstretch or tear (strain) their calf muscle.   Muscle strains often cause a sudden sharp or tearing sensation, sometimes accompanied by swelling or bruising.2   Muscle Cramp or Spasms   A muscle cramp or spasm is a contraction or tightening of a muscle that is not under your control. A classic example is a charley horse, in which your calf muscle squeezes on its own, causing a sudden, intense pain. Once the muscle relaxes (usually within seconds), your calf often feels sore.   It’s unclear what exactly causes muscles to cramp, but experts suspect a multitude of triggers, such as: • Improper stretching • Muscle fatigue • Exercising in extreme heat • Dehydration • Depletion of salt and electrolytes   Muscle cramps may also occur with various underlying diseases, including cirrhosis and peripheral artery disease.3   Muscle Contusion   A muscle contusion (bruise) may occur as a result of a direct blow against the muscle—for example, from falling onto a hard surface or getting hit during a sports game. This direct blow (or series of blows) essentially crushes the muscle fibers and surrounding connective tissue. In addition to muscle pain, the skin around the painful muscle may become swollen and discolored. Moreover, a person may experience stiffness and weakness of the affected area, and in some cases, a hematoma (a collection of blood) forms around the injured muscle.2     Myofascial Pain Syndrome   Myofascial pain syndrome (MPS) is a pain disorder caused by trigger points within a muscle or group of muscles.4 These trigger points, which feel like tiny knots underneath the skin, are essentially tights bands of muscle and/or fascia (the tissue that surrounds muscles). Trigger points may be tender to the touch and refer pain to other areas of the body.   A common location for trigger points is in your upper trapezius muscles (situated at the back of your neck above each shoulder). These trapezius trigger points may cause a deep aching and/or burning headache that is felt in the back or side of the head.     Compartment Syndrome   Compartment syndrome is an uncommon disorder that occurs when pressure build-ups within a “compartment” or group of muscles.   There are two types of compartment syndromes:5   • With acute compartment syndrome, muscle pain develops suddenly and is extreme, constant, and often described as a deep ache or burn. Neurological symptoms like numbness or tingling may also occur with this serious condition. • With chronic compartment syndrome, muscle pain comes on gradually during exercise. The classic case is a young runner who notes an aching, squeezing, tight, or cramping pain in the lower leg after running for a specific amount of time. Unlike acute compartment syndrome, the pain of chronic compartment syndrome goes away with rest, usually within 30 minutes.   Pyomyositis   Pyomyositis is a rare, pus-containing infection of muscle (usually from Staphylococcus aureus) that causes cramping muscle pain within a single muscle group, most commonly the thigh, calf, or buttock muscles.   As the infection progresses (approximately two weeks after the onset of the cramping pain), a fever often develops, and the muscle becomes exquisitely tender and swollen. At this time, an abscess (a collection of pus) may be visible within the muscle.   If not treated, the infection can spread to other organs, like the heart, lungs, and brain.6   Systemic Muscle Pain Systemic muscle pain, which is felt all over your body, is often related to an infection, medication side effect, or underlying illness.   Infection   Several types of infections, especially viral, may cause muscle pain. Perhaps the most common infectious cause is influenza, commonly known as “the flu.”   Besides diffuse muscle or body aches, other potential symptoms of influenza include fever/feeling feverish, chills, headache, cough, sore throat, runny/stuffy nose, and unusual fatigue.7 Vomiting and/or diarrhea may also occur, although this is more common in children than adults.   Other infections that may cause muscle pain include:1     Medication   One common medication that may cause mild-to-moderate muscle aches and weakness as a side effect is a statin, which is used to lower cholesterol. If muscle aches do occur with a statin, they generally begin within six months of starting the drug and resolve within approximately two months (on average) of stopping the drug.8   Besides statins, other medications associated with muscle pain include:     Fibromyalgia   Fibromyalgia is a chronic pain disorder that causes widespread muscle pain, often described as aching, sore, stiff, burning, or throbbing.   In addition to muscle pain, people with fibromyalgia also may experience sleep problems, fatigue, headache, “crawling” sensations on their skin, morning stiffness, brain fog, and anxiety.11     Myalgic Encephalomyelitis/Chronic Fatigue Syndrome (ME/CFS)   Chronic fatigue syndrome, also known as myalgic encephalomyelitis/chronic fatigue syndrome (ME/CFS), is a disorder that causes a person to experience overwhelming fatigue that is often worsened with physical or mental activity, yet not improved with rest.   In addition to debilitating pain, many people with chronic fatigue syndrome report diffuse muscle and joint aches, as well as concentration and memory problems, sore throat, and/or feeling dizzy or lightheaded when standing up.12   The ambiguous nature of fibromyalgia and ME/CFS symptoms is, in part, why these conditions are quite difficult to diagnose. source :https://www.verywellhealth.com/muscle-pain-what-you-should-know-190093
ESSENTIALAI-STEM
News Deeply News Deeply is an online journalism and technology company, based in New York City, specializing in single-issue news websites and building online databases of stakeholders. Its flagship site, Syria Deeply, was founded by Lara Setrakian and Azeo Fables in 2012 to cover the Syrian Civil War. On May 15, 2018, News Deeply merged Syria Deeply into the broader Peacebuilding Deeply. Since 2012, the company built and operated seven other sites with similar single-issue formats: Malnutrition Deeply, Oceans Deeply, Refugees Deeply, Water Deeply, Women's Advancement Deeply, Arctic Deeply and Ebola Deeply . News Deeply has ceased publishing content on any of its sites. Ebola Deeply officially stopped publishing soon after Guinea was declared free of ebola in December, 2015. In 2018, three other News Deeply sites stopped publishing: Oceans Deeply, Malnutrition Deeply and Peacebuilding Deeply. Since then, all of News Deeply's sites have "paused regular publication ". The last article posted to any News Deeply site was to Refugees Deeply on April 1, 2019. History News Deeply started with Syria Deeply, a project stemming from the shortcomings founder Lara Setrakian perceived in news coverage of the Syrian Civil War. She had been reporting on the region for major news outlets ABC News and Bloomberg News but wanted a centralized platform that engaged in journalism only on that subject, and one which emphasized design and user experience. When Syria Deeply launched, the only contributors who were paid were those based in Syria whose safety was under threat. News Deeply is a benefit corporation based in New York City, although its reporters, editors, and other staff are located around the world. Its funding comes from multiple sources: grant funding from foundations, live event sales, content syndication, sponsorships like that of the World Policy Institute, and it has received $2.5 million in venture capital. Setrakian has expressed her intention to continue pursuing new "Deeply" projects, and told Fast Company some potential topics include Pakistan, Congo, Myanmar, and human trafficking, all of which are important but underrepresented or poorly covered by mainstream news outlets. However, in September, 2018 Fast Company reported that News Deeply was closing multiple sites, including Oceans Deeply, Malnutrition Deeply, and Peacebuilding Deeply. Since then, News Deeply site has "paused publication" on all of its news sites. Syria Deeply Syria Deeply was the first News Deeply site. Journalist Lara Setrakian had been covering the Syrian conflict for major news organizations and set out to create the site as a more consistent and centralized source of news on the subject. Setrakian had grown frustrated with the way a news consumer had to try to bring together small pieces of information from multiple sources, and had the idea for a more focused resource. The site took form following a meeting with crowdsourcing and citizen journalism company Ushahidi, where she expressed her wish: ''we could build a proper landing page for the Syria story that was modular, that had a Ushahidi map, that has a great Twitter box, that had some original content." According to Setrakian, design is a very important part of the project: "this is the age of the UX designer. News has a big data problem -- there is so much content from so many places. Organizing information has become a major challenge and an opportunity to leap ahead with innovative news design." The layout of the home page forgoes traditional navigation tools and the hierarchical structure of topics and sub-topics commonly used on news websites, presenting content in a flatter style of presentation. , 25% of the site's content was original text, audio, or video news, while 75% is static or automated content. Parts of the site functioned as journalism communities, providing means for reporters to collaborate and share information about developments. In 2013 it won a National Press Foundation award for 2013 Excellence in Online Journalism. Mashable called it "one of the go-to resources for information and context on the growing conflict". Arctic Deeply Arctic Deeply was an English-language web portal for news about climate change launched in 2015. It was intended to be the second News Deeply site, following the success of Syria Deeply, but was preempted by Ebola Deeply after the Ebola outbreak, and Water Deeply, due to the 2012–2013 North American drought. It included a mix of original news, static content, and aggregated stories. According to managing editor Hannah Hoag, the site was less about breaking news and "more about the connections between issues that have previously been treated on their own." Its operations were based in Canada, and it formed partnerships with the Canadian think tank the Centre for International Governance Innovation and OpenCanada, an international affairs publication. it was also sponsored by the New York-based World Policy Institute. For distribution, it formed partnerships with Huffington Post and the Associated Press. Refugees Deeply Refugees Deeply focused on forced migration issues worldwide. The Managing Editor was Charlotte Alfred, and Senior Editors, Daniel Howden and Preethi Nallu. Oceans Deeply Oceans Deeply focused on Ocean health worldwide. It was managed by Executive Environment Editor Todd Woody, a veteran environmental journalist who was previously editorial director for environment at TakePart, a digital magazine owned by Participant Media. The Managing Editor was Jessica Leber. Water Deeply Water Deeply was dedicated to covering the water crises in California and the American West. Tara Lohan was the Managing Editor. Women's Advancement Deeply Women's Economic Advancement covered the issues that impact female populations in the developing world. The Managing Editor was Megan Clement.
WIKI
Where is the location of a given object? Which objects are used as the holder of sensors in the smart home environment? Which devices (e.g. sensors) are attached to a NodeHolder? Which objects are there in a smart home environment? Which objects are the interest of the observation process? This pattern relies on both the SSN ontology and DUL in order to represent an object in the context of Smart Home. Using this model we categorize the objects in to two groups of Smart Objects and NodeHolder based on the reason behind their existance in a smart home. Due to usual difficulties to install sensors in a smart home environment it is common that some other objects (i.e. NodeHolder) are used to attache sensors on so as to observe the situation of other objects (i.e. SmartObject) specifically for the configuration planner. Using this pattern we are able to diffrentiate between these two types of objects. This pattern also allows us to extend the definition of an object's properties in the context of smart home. The properties of a SmartObject which are the interest of the sensing process can be defined as either a subclass of the class http://purl.oclc.org/NET/ssnx/ssn#Property (e.g. the temperature of a stove) or as part of the smart object (e.g. the door of a friedge)
ESSENTIALAI-STEM
Prussian National Monument for the Liberation Wars The Prussian National Monument for the Liberation Wars (Preußisches Nationaldenkmal für die Befreiungskriege) is a war memorial in Berlin, Germany, dedicated in 1821. Built by the Prussian king during the sectionalism before the Unification of Germany it is the principal German monument to the Prussian soldiers and other citizens who died in or else dedicated their health and wealth for the Liberation Wars (Befreiungskriege) fought at the end of the Wars of the Sixth and in that of the Seventh Coalition against France in the course of the Napoleonic Wars. Frederick William III of Prussia initiated its construction and commissioned the Prussian Karl Friedrich Schinkel who made it an important piece of art in cast iron, his last piece of Romantic Neo-Gothic architecture and an expression of the post-Napoleonic poverty and material sobriety in the liberated countries. The monument is located on the Kreuzberg hill in the Victoria Park in the Tempelhofer Vorstadt, a region within Berlin's borough of Friedrichshain-Kreuzberg. The monument was conceived at a time of deteriorating relations between the reactionaries and the reformers of the civic movement within Prussia. The monument is of cast iron, a technique en vogue at the time. Its younger socket brick building is faced with grey Silesian granite and was designed by the Prussian architect Heinrich Strack and realised by the Prussian engineer Johann Wilhelm Schwedler. Its centerpiece is a tapering turret of 60 Prussian feet (18.83 m), resembling the spire tops of Gothic churches. Dedication On the eastern side of the monument under the memorial inscription for the Battle of Großgörschen (aka Lützen) there is the dedication: "The King to the People, which at his call magnanimously offered its wealth and blood for the Fatherland, to the Fallen in memoriam, to the Living with acknowledgement, to Future Generations for emulation." This dedication was authored by August Boeckh, a member of the philosophical class of the Prussian Academy of Sciences commissioned to write it. Frederick William III had rejected three alternative proposals by the philosophical class. This dedication may be considered problematic, inasmuch as it was not the king who had called his people, but the stubborn people, commoners, lower-ranking bureaucrats, military men, and members of the nobility who had stolen a march on the king. People who had earlier welcomed and benefited from Napoleon's reforms and who, like those in other nations had been inspired by his earlier "Republican" ideals of emancipating commoners as citizens, started to resist when he betrayed these ideals by making himself Emperor, levying burdensome compulsory contributions for his projects designed to aggrandize himself and his family, impoverishing not only his own people, but those of other nations, and above all bringing about the deaths of thousands in seemingly unending wars. At the same time the blocus, a measure against free trade, unfairly enforced favorable exchange rates of most European nations toward France while at the same time attempting to eliminate their far more profitable trade with Great Britain. In 1813 the defeated and intimidated king, forced into a coalition with France since 1812, against the will of his people refused the risky attempt to shake off the French supremacy in the wake of Napoleon's defeats in Russia. Ludwig Yorck, commanding the Prussian units supporting the French, had declared their neutrality towards the Russians without royal accord. In early 1813 irregular units, guerrillas lacking royal sanction, began to form, swearing their allegiance to the German Fatherland rather than to the king. On 7 February 1813 the East Prussian estates unanimously voted for financing, recruiting, and equipping a militia army (Landwehr) of 20,000 men, plus 10,000 in reserve, out of their funds, following a proposal designed by Yorck, Clausewitz, and Stein. The hesitant king could not stop this anymore, but was forced to enact it on March 17 in his address entitled An mein Volk ("To My People"). However, this civic act of initiating Prussia's participation in the War of the Sixth Coalition was distasteful to the monarch, who again and again delayed implementing his promise of 22 May 1815 to introduce a parliament and a constitution for the entire kingdom. Rather, the monarchs allied against Napoleon subsequently granted themselves the right to suppress the rights previously granted to the citizens and to reverse all the reforms which had done away with feudalism. On 21 March 1819, Frederick William even forbade his subjects to address any further petitions for him to fulfill his promise. The reaction prevailed against the patriotic zeal of the populace. Alternative names The ponderous officialese name evoked many alternative names developed for the monument. Other names are Nationaldenkmal zur Erinnerung an die Befreiungskriege/Freiheitskriege (i.e. national monument in memory of the liberation/liberty wars, a more extended version), Befreiungsdenkmal (i.e. liberation monument), Kreuzbergdenkmal (i.e. Kreuzberg monument, however, there are at least five more monuments on the Kreuzberg sparsed in Victoria Park, which covers most of that hill), Kriegsdenkmal auf dem Kreuzberge (war monument on the Kreuzberg, somewhat indifferentiated), National-Monument, Schinkeldenkmal (i.e. Schinkel monument, however, it is not a monument of Schinkel, but one by Schinkel), Siegesdenkmal (i.e. victory monument), Volksdenkmal auf dem Tempelhofer Berge (people's monument on the Tempelhof hill, however, it was the king's monument, with statues displaying the faces of many royal siblings, and the hill had been renamed by the king into Kreuzberg in 1821). Location The monument is located on the 66 m top of the Kreuzberg in the Tempelhofer Vorstadt. Between 1888 and 1894 the Victoria Park (Viktoriapark) was laid out around the monument. The monument, topped by an iron cross, became name-giving for the hill it stands on, before mostly called Tempelhofer Berg, but also denoted by many other names in its history. Hundred years after the inauguration of the monument, the VIth borough of Berlin, established on 1 October 1920 and provisionally named Hallesches Tor, was renamed into Kreuzberg on 27 September 1921. History The monument by Karl Friedrich Schinkel has been called the «relatively modest outcome of grandiose plans». This is because the monument resembles the spire top of an earlier project by Schinkel, a national memorial church with the working title Nationaldom designed in summer 1814, and a second draft in January 1815. However, like many other projects the memorial church never materialised due to lacking money. The compulsory contributions to France (thaler 41.73 million [=154.5 million Francs] alone by the Treaty of Tilsit ), levied during its supremacy, which Prussia could mostly only raise by way of credit from various creditors, French and of other nations, heavily weighed as debts to be amortised and serviced on the budgets of municipalities, cities, states and other corporations until the 1870s. Already in late 1813 other projects for monuments had been launched by Ernst Moritz Arndt, Karl Sieveking, Johann Heinrich von Dannecker, Leo von Klenze, Friedrich Weinbrenner. Schinkel considered for his project to ask the magistrate (city government) of Berlin to build a memorial. So like jumping the ship also the initiative for a war memorial did not originate with the king. On 17 March 1813, when the king had jumped on the bandwagon for the liberation wars, he established the military decoration of the Iron Cross, backdated to March 10, late Queen Louise's birthday. He commissioned Schinkel to design the Iron Cross after a royal sketch. The Iron Cross was a decoration of a new kind, available for every soldier, who had turned from subjects of different estate status into citizens by the establishment of the Prussian citizenship in 1810, therefore there were no status barriers to get the Iron Cross. On 26 June 1818 Schinkel commissioned the Royal Prussian Iron Foundry (Königlich Preußische Eisengießerei) to cast the pieces for the monument, including its statues. The foundry estimated costs of thaler 20,646. After negotiations on 27 August 1818 the merchant Gottfried Wilhelm August Tietz, the farming burgher Johann Friedrich Götze and Christian Weimar (Weymann) sold the top of the Götze'scher Berg (today's Kreuzberg) measuring 1.5 Prussian Morgen (2,839.83 m2) and an access road branching off from Methfesselstraße. On 4 September 1818 the king approved the stipulated price of thaler 1,100 and an additional 400 as compensation for fixtures. The adjacent land, measuring 72 Morgen (18.38 ha), remained property of Götze, Tietz and Weimar. The king confirmed the price. Duke Charles of Mecklenburg arranged the laying of the foundation stone for 19 September 1818, attended - among others - by Tzar Alexander I, Christian Daniel Rauch and Schinkel. An iron cast memorial medal was issued on that occasion and the proceeds were used for war invalids. A bit northeast of the monument, deeper on the slope thus not blocking the view, a guard's house was erected after Schinkel's design in 1821. It was a brick structure in Gothic Revival style adorned with a Lombard band all around beneath the eaves of the flat pyramidal roof. On 1 January 1822 the invalid Martin Herborn moved in, employed to guard the monument. By the end of the 19th century a milk bar (Milchkuranstalt) moved in. The abandoned building was demolished in the 1950s, its site is now used by a ball playing cage. For the inauguration of the monument Frederick William III chose the 30 March 1821, the seventh anniversary of the conquest of the Montmartre in the Battle of Paris. The inauguration was attended by the royal family, the Prussian generality, the senior pastors of all Protestant congregations of Berlin, and as guests by Grand Duke Nicholas of Russia and his wife Alexandra Feodorovna (Charlotte of Prussia), as well as by thousands of other spectators. Court preacher Bishop Rulemann Friedrich Eylert held an inaugural prayer. The national monument is crowned by an Iron Cross. On the occasion of the inauguration the king renamed Götze'scher Berg into Kreuzberg (i.e. cross mountain) after the Iron Cross topping the monument. The monument is adorned with twelve statues symbolising twelve major battles of the Liberation Wars, however, at the inauguration only two of the statues had been installed, and two others were represented by plaster models painted like cast iron. On December 27 altogether six statues had been installed, the other followed over time (two on 15 January 1823, one on 22 December 1823, another on 10 March 1825, on 17 June 1826 the last two. The monument's front side was directed northeastwards to the Hallesches Tor (Halle Gate). On 1 December 1829 Frederick William III asked Schinkel for proposals how to improve the visibility of the monument. Schinkel's ideas, a socket or an encircling structure were never realised. Schinkel had proposed to enlarge the tiny monument's plot (a radius of 53 Prussian feet; 16.634 m) by buying an additional circular spread of 150 to 200 Prussian feet (47.08 to 62.77 m) around the monument, however, all rejected as too costly. The southerly adjacent land had meanwhile been bought by the Gericke brothers, who planned to develop the area and opened the amusement park Tivoli right south of the monument. On 6 August 1848 people gathered at the monument demonstrating for the unification of Germany, rendering homage to Archduke John of Austria as regent of the to-be-unified Empire, flagging the monument with the union tricolour of Black-Red-Gold, much opposed by the various Prussian nationalist formations. Between 1857 and 1859 Tivoli brewery established on the site of the former amusement park south of the monument and its access from Methfesselstraße. In 1875 Johann Heinrich Strack proposed a socket building to elevate the monument, and King William I of Prussia, in personal union also German Emperor, ordered its realisation in 1878. Johann Wilhelm Schwedler carried out the plans. On 29 August 1878 he elevated the monument, weighing 3,800 Zentner (1900 kg), with hydraulical pumps. On 3 September the monument was turned by 21° with its front into the axis of the Großbeerenstraße, before on 25 October the monument was set to rest on the new socket building. The octagonal, 8 m, crenellated bastion-like socket building is adorned with Silesian granite and sandstone covering the brick substructures. A northerly outside staircase provides the access to the elevated level. However, Strack's projected flight of stairs from the monument all the way down to Großbeerenstraße was again refused as too costly. In 1879 Guido von Madai, president of the royal police, decreed a maximum height of buildings in the adjacent streets to uphold the visibility of the monument. The ordinance, however, was annulled by the groundbreaking 1882 "Kreuzberg judgement" of the Prussian Royal administrative court, stating that the police had exceeded its authority to ensure public security. On 14 December 1887 the city of Berlin acquired 8.5 ha of unbuilt land from several owners, mostly north and west of the monument. Right adjacent to the south the brewery (merged into Schultheiss in 1891), and in the east and northeast villas remained. On 28 June 1888 the city parliament decided for City Garden Director Hermann Mächtig's design for Victoria Park, including a waterfall between monument and Großbeerenstraße. The monument was included in the Nazi plans for rebuilding Berlin, but only preparations materialised. Ernst Sagebiel oriented his Tempelhof Airport building towards the monument so that the central hall's front on the forecourt of the airport and one edge of the monument's octagonal groundplan are parallel. As seen from the monument today's Platz der Luftbrücke in front of the airport opens as a square, encircled by buildings of similar heights except for the taller central hall of the airport (mostly realised). The then planned axis consisting of a promenade and series of waterfalls cascading down the Kreuzberg hill towards the square was never realised, the interjacent block of houses remained untouched. In 1944 British bombing left behind a wake of devastation leading from one block north up the Großbeerenstraße, over the waterfall to the monument, blasting away the southern edge of the octagonal socket structure then used as a safe place for casts of various sculptures, such as the Quadriga of the Brandenburg Gate. Also the villas northeast of the monument were destroyed. The casts were relocated from the open socket building in the late 1940s. In November 1958 the smashed southern edge of the socket octagon was reconstructed. Starting in 1979 the monument was renovated and reopened on 31 October 1986 before the 750th anniversary of the first mention of Berlin in 1987. It underwent a thorough restoration between 1995 and 2000. The brick building of an abandoned public toilet was refurbished and opened in 2011 as a little café. Design It is said that due to the influence of Crown Prince Frederick William (IV) Schinkel's design in Gothic Revival style prevailed over another in rather classicist forms. The monument was decided to be made from cast iron. The, renowned for its Berlin Iron Jewellery (Eisenkunstguss, Fer de Berlin) produced all the parts of the monument. Frederick William III popularised cast iron by using it himself for decoration and table ware. The groundplan of the monument is a Greek cross with its arms being of equal length but shorter than the width of their ends. Its twelve edges are each dedicated to one battle of the Liberation Wars. The somewhat wider ends of the four arms are reserved for the four main battles with golden inscriptions. Each of the twelve outward edges bears an inscription with the name and date of the battle topped by a little socket displaying an Iron Cross. Above each socket is a niche with the iron cast statue of a genius symbolising with their decoration and accessories the respective battle. The niches are in the actual structure of the monument tapering off to the top crowned again by an Iron Cross. Originally Christian Daniel Rauch and Christian Friedrich Tieck had been commissioned to design and model each six statues. However, both were too busy and partially not in Berlin so that the creation of the statues was always on delay. Therefore, Ludwig Wilhelm Wichmann was additionally appointed to model some of the genii after Rauch's and Tieck's designs. As a guideline for the designs of the genii Schinkel recommended frescos by Pietro Perugino in the audience hall of the Collegio del Cambio in Perugia. Table of the genii The informations in the table follow Nungesser. The table starts with the genius shown on the front side, first seen when arriving on the monument platform, and then continues clockwise: Other Prussian Monuments for the Liberation Wars Since early 1817 a series of, partially pyramidal, war monuments, each topped by an Iron Cross had been already realised in Großbeeren, Dennewitz, Großgörschen, at the Katzbach near Wahlstatt (all in 1817), as well as in Haynau and La Belle Alliance (both in 1818). The National Monument for the Liberation Wars, though built later than the others, was considered the mother of all other earlier memorials for the Liberation Wars, More monuments for the Liberation Wars topped by an Iron Cross, not always from cast iron, but sandstone followed in Greifswald, Krefeld, Minden, Elsfleth, Breslau and on the Drachenfels (1857). Other monuments on the Kreuzberg Other monuments on the Kreuzberg are: * Two herms of "poets and singers of German patriotism". * Monument of Heinrich von Kleist, 1898 by Karl Pracht, aluminum replica on the Kreuzberg, marble original preserved in the schoolyard of Leibniz-Gymnasium * Monument of Friedrich Rückert, 1899 by Ferdinand Lepcke, replica on the Kreuzberg (meanwhile stolen), original preserved in the schoolyard of Leibniz-Gymnasium * Monument of Robert Zeller (1892–1898 lord mayor of Berlin ), 1904 by Otto Lessing, with the pertaining bust lost in WW II * Memorial for the eastern German Homeland (Mahnmal für die ostdeutsche Heimat, Ostlandkreuz; August 1952), a 8 m cross of pine wood with a crown of thorns of barbed wire * Memorial stone for the 17 June 1953 (Gedenkstein 17. Juni 1953), set in August 1953 at the Homeland memorial cross, in honour of the victims of the communist suppression of the Uprising of 1953 in East Germany. There are more monuments in the park, but rather on street level, and not on the Kreuzberg, such as the well known The rare haul (1896 by Ernst Herter), a herm to Ludwig Uhland (1899 by Max Kruse, aluminum replica) or the monument to the raped women.
WIKI
Kaliadeh Palace Kaliadeh Palace is a palace located on the banks of Shipra in Ujjain, Madhya Pradesh. It is one of the most famous historical landmarks of Ujjain. Once recorded as beautiful temple of the Sun on thebanks of River Shipra with two tanks named Surya Kunda and Brahma Kunda. The palace was built by the Sultan of Mandu in 1458 A.D. during the time of Mahmud Khilji. The central dome of the palace is a beautiful example of Persian architecture, and the Persian inscriptions here record the visits of Emperor Akbar and Jehangir to this palace. The palace was damaged by Pindaris during the Pindari war but was restored by Maharaja Sir Madho Rao Scindia of Gwalior in 1920.
WIKI
Considered the greatest figure in German literature in the modern era, Johann Wolfgang von Goethe's writings have become synonymous with the Romantic movement in Europe. Born into the German bourgeoisie in Frankfurt, Goethe's comfortable life definitely influenced his writing, and the security it offered gave him the foundation in which to carry out his studies and begin his writings. As a young man, Goethe's education led him on a path into studying law, and for a while he left his lofty literary ideas behind, favoring pastoral dramas and racy poetry. The law degree remained unfinished, however, when Goethe suffered heartbreak and rejection, a bout of tuburculosis, and an emotional breakdown. He returned home, where he underwent a radical conversion as an evangelical Christian. Out of this came more writing, and the first strains of Faust. Goethe's writings include novels, stories, plays, and poems. His epic poem Faust is considered as brilliant and influential as Milton's Paradise Lost or Dante's Inferno. Many of his works have been adapted for stage performances, including more than 10 different operas based on Faust, and his ideals and concepts have been drawn on by many philosophers. As well as writing, Goethe worked as a statesman, a scientist, a theatre critic and director, and enjoyed creating art in his spare time. More about Johann Wolfgang von Goethe
FINEWEB-EDU
Ravindra Kaushik Ravindra Kaushik (11 April 1952 – 21 November 2001) was an Indian Research and Analysis Wing agent who spied for India from 1975 until captured in 1983. Also known as The Black Tiger, he is considered as one of India's greatest spies. He penetrated the Pakistan Army and reached the rank of major. Early life Ravindra Kaushik was born in Sri Ganganagar, Rajasthan on 11 April, 1952. His father, J. M. Kaushik, was an Indian Air Force officer; his mother Amla Devi died in 2006. He graduated from S. D. Bihani P. G. College, Sri Ganganagar, earning a B.Com and was involved with theatre acting and debates while in college when he was recruited by the R&AW. Recruitment in Research and Analysis Wing Kaushik was trained in Delhi for two years to be an undercover Operative in Pakistan. He was also trained to live life as a Muslim and was taught the Urdu language. Being from Sri Ganganagar, a city near Rajasthan's border with Punjab, he was well versed in Punjabi, which is widely understood in Punjab (India) and Pakistan as well. In 1975, at the age of 23, he was sent to Pakistan. Activities in Pakistan Kaushik converted to Islam, underwent circumcision and was given the cover name "Nabi Ahmed Shakir". After successfully getting admission in Karachi University, he completed his LL.B. After his graduation, he joined the Pakistan Army as a commissioned officer and was eventually promoted to the rank of major. He married a local girl named Amaanat and fathered a boy, who died in 2012–2013. From 1979 to 1983, Kaushik worked as a Pakistani army officer, sending valuable information to India's R&AW. He was given the title of 'Black Tiger' by the Prime Minister of India Indira Gandhi. Very little to no information about him is available on the internet. Death and aftermath In September 1983, R&AW sent a low-level operative, Inyat Masih, to get in touch with Kaushik. But Masih was exposed by Joint Counter-intelligence Bureau of Pakistan's Inter-Services Intelligence and blew Kaushik's cover. Kaushik was captured, and tortured for two years at an interrogation center in Sialkot. He was sentenced to death in 1985; his sentence was later commuted to a life term by the Supreme Court of Pakistan. He was kept in various jails in various cities, including Sialkot, Kot Lakhpat and in Mianwali jail for 16 years. He managed to secretly send letters to his family in India, which revealed his poor health and the trauma he faced in Pakistani jails. In one of his letters, he wrote:"Kya Bharat jaise bade desh ke liye kurbani dene waalon ko yahi milta hai?" (Is this what people who sacrifice their lives for a big country like India get?)" In November 2001, he died of pulmonary tuberculosis and heart disease in Central Jail Mianwali in Pakistan. According to Ravindra's family, the Indian government had refused to recognise him and had made no effort to help him. Ravindra's family claimed that the storyline of the famous Bollywood film Ek Tha Tiger released in 2012 was based on the life of Ravindra, and asked for credit in the movie titles for Ravindra. But the director Kabir Khan denied their claim. Romeo Akbar Walter, a 2019 Indian film written and directed by Robbie Grewal is loosely based on his activities in Pakistan. John Abraham plays the role of Rehamatullah Khan, based on Ravindra Kaushik, in the film.
WIKI
Ground Station – Bluetooth Bridge Getting Started To get started, download an Android ground station that supports Bluetooth. Two popular options are Andropilot and Droidplanner. We’ve had better luck getting a quick connection on Andropilot. Install one of these and make sure it’s configured to use Bluetooth. Now power on the Bluetooth Bridge and turn on Bluetooth on your Android device. Scan for new devices and select to pair the device titled ‘Event38’. If it doesn’t pair right away, try turning off Bluetooth and then turning it back on and trying again. When it’s successfully paired, power on your APM-powered vehicle. Make sure the green LED on your vehicle’s telemetry modem turns solid green, this should happen within 30 seconds of powering on. This indicates that the two radios hear each other and are ready to communicate. Now load up the ground station you downloaded earlier and try to connect. After a few seconds data from the vehicle should start streaming through, you’re ready to go! Charging To charge, turn the Bluetooth Bridge off and plug in the USB cable. The battery is very large so give it plenty of time, as much as 10 hours. The charger will automatically stop charging when the battery is full, though the blue LED may not turn off. With a full charge, you should be able to use the Bridge continuously for over 10 hours. LED Status ColorMeaning Flashing GreenPower On, High Charge Flashing YellowPower On, Medium Charge Flashing RedPower On, Less Than 30 Minutes of Charge Remaining Solid BlueOn External Power, Charging   Changing Radio Settings The easiest way to change your radio’s settings is to connect to the bridge using bluetooth on a laptop or PC with Mission Planner loaded. Then in Mission Planner, select the COM port associated with your Bluetooth Connection and select 9600 as the baud rate (note some users have reported working with different baud rates, so try 57600 if that doesn’t work). Now go to the Initial Setup tab and open the 3DR Radio menu. Now click Load Settings, the settings from the Bluetooth Bridge’s radio should populate after a few seconds. If you power on the other radio, you can make changes to the remote radio simultaneously as long as they can currently make a connection. Troubleshooting   Bluetooth won’t pair. Make sure you’re using an Android device and that it meets the requirements of the ground station software you’re using. Try turning off and on both the Bluetooth Bridge and your device’s Bluetooth option. Make sure your device supports Bluetooth 2.0 or later. The green LED on my telemetry module doesn’t turn solid green. First, check that the radio module is the same frequency band as the Bluetooth Bridge you ordered. If it is, did you make any changes to the radio’s settings like changing the net ID? Our radios ship with the latest version of SiK Firmware and the default settings and will work with factory default 3DR Radios and RFD900 radios. If you’ve changed any settings in your radio, the easiest thing to do is to change those settings back to default, then update the Bluetooth Bridge radio and your vehicle telemetry radio at the same time once they can connect on the default settings. I accidentally left the Bluetooth Bridge on all night, what should I do now? The Bridge will automatically go into deep sleep mode when the battery voltage reaches a critical level. Just turn the device off and plug it in to start recharging the battery. When I walk around with my Android device, I lose connection with my vehicle. If you walk outside of the Bluetooth radio’s range, the connection will terminate. Bluetooth range is up to 50 feet but can be less depending on the device and background noise. By installing a Bluetooth management app called Bluetooth Auto Connect, we’ve found that the connection can be immediately re-established once you walk back into range. I can’t upgrade my telemetry radio’s firmware To upgrade the firmware, you’ll need to connect directly to the telemetry radio, bypassing the bluetooth module. You’ll need an FTDI cable with the VCC pin removed or disconnected to do this. Open the case and disconnect the two solder bridges between the bluetooth module and the telemetry radio with a soldering iron. Then plug in to the FTDI port nearest to the telemetry radio, power on the battery and load firmware like normal at 57600 baud after reading the radio settings to check the connection has been established. The easiest way to make the connection is using a strip of 0.1″ male headers with one pin (VCC) removed. Insert them into the FTDI cable on the long side and insert the short side into the holes on the board. Angle the connector 20-30 degrees to one side so the pins make contact with the metallic sides of the holes.
ESSENTIALAI-STEM
Busa Busa or BUSA may refer to: * Busa language (Mande), Africa * Busa language (Papuan), New Guinea * British Underwater Sports Association * British Universities Sports Association, a former British organisation succeeded in 2008 by the British Universities and Colleges Sport * Buša cattle, Bos brachyeros europeus * Busa (surname), a surname (including a list of people with the name)
WIKI
-- Shell Profit Beats Estimates as Asset Sales Target Raised Royal Dutch Shell Plc (RDSA) , Europe ’s biggest oil company, reported first-quarter earnings that beat estimates, and raised a target for asset sales this year. Excluding one-time items and inventory changes, Shell posted profit of $7.28 billion, compared with the $6.7 billion average estimate of eight analysts surveyed by Bloomberg. The shares rose the most since November in London trading. Chief Executive Officer Peter Voser said asset sales this year will probably be in excess of $4 billion, compared with earlier expectations of $2 billion to $3 billion. The company generated additional cash in the quarter from new projects in Canada’s Athabasca oil sands and Qatar as Brent crude traded 12 percent higher than a year earlier. “The record result in upstream was driven by volumes from the growth projects,” said Stuart Joyner, an analyst at Investec Securities Ltd. in London . Shell’s Class A shares gained 3.2 percent to 2,195.5 pence in London. The stock is down 7.4 percent this year. Net income of $8.72 billion compared with profit of $8.78 billion a year earlier, The Hague-based Shell said today in a statement. About $2.4 billion of assets were sold during the quarter. The company is the first of Europe’s biggest oil producers to publish earnings; Total SA and BP Plc release results on April 27 and May 1, respectively. The U.S.’s Exxon Mobil Corp. will report today. Brent Gains Brent crude averaged $118.45 a barrel in the first quarter, compared with $105.52 a year earlier. That helped counter a decline in U.S. natural-gas prices, which sank to their lowest quarterly average in 10 years. “Energy demand fundamentals are robust, but with near-term volatility in energy prices as a result of economic and political events,” Voser said. Shell agreed to sell 15 percent of its Prelude LNG venture off Australia to Korea Gas Corp. (036460) and CPC Corp. of Taiwan, on top of the 17.5 percent offered to Japan’s Inpex Corp. (1605) The combined 32.5 percent interest was worth about $500 million at the end of March, Shell said. It also completed sales of liquefied petroleum gas operations in the Asia-Pacific region and filling stations in North America and Africa . Higher Output Oil and gas production rose to 3.55 million barrels a day from 3.50 million barrels a year earlier. Shell plans to raise output to about 4 million barrels a day as soon as 2017. Voser agreed in February to raise the dividend this year for the first time since 2009 on a forecast for a 50 percent increase in cash flow from operations through 2015. The company has boosted output at its oil-sands project in Canada ’s Alberta region and expects its Pearl gas-to-liquids venture in Qatar to reach full capacity by the middle of the year. Shell is also expanding in East Africa, where it agreed to buy Cove Energy Plc this week for about $1.8 billion. Cove has a stake in a gas block off Mozambique, which may connect to a proposed liquefied natural gas plant that would process the fuel for Asian markets. Shell, the world’s largest LNG supplier, has interests in about a quarter of the LNG ships in operation. Shell forecast global LNG supply would rise to more than 500 million tons a year, up from 240 million tons now, Chief Financial Officer Simon Henry told investors. The company plans to maintain its market share, which is about 8.8 percent. LNG prices have been supported by an increase in Asian imports as Japan shut down nuclear reactors in the wake of the Fukushima disaster last year. Shell increased LNG sales 17 percent to 5.2 million tons in the quarter from last year. “The refining activities still made losses of about $200 million, while trading and chemicals performed like last year,” Jean-Charles Lacoste, an analyst at Credit Agricole Cheuvreux SA, wrote in an e-mailed report. Of the 29 analysts that cover Shell, 17 recommend buying the shares, 11 have hold ratings and one advises selling. To contact the reporter on this story: Eduard Gismatullin in London at egismatullin@bloomberg.net To contact the editor responsible for this story: Will Kennedy at wkennedy3@bloomberg.net
NEWS-MULTISOURCE
Spring Boot upload file with ajax example 2016-04-18 23:02 Last blog Spring Boot upload file with form example shows how to upload file with form. As we all know upload file with Ajax can improves user experience. Today I will show you how to upload file with Ajax. Same as last blog we use jsp as page. You can click here to learn how to use jsp in Spring Boot. Project Structure ├─main │ ├─java │ │ └─com │ │ └─henryxi │ │ └─upload │ │ └─ajax │ │ SampleUploadController.java │ │ │ └─resources │ │ application.properties │ │ │ └─META-INF │ └─resources │ │ jquery.1.12.0.js │ │ │ └─WEB-INF │ └─jsp │ upload.jsp The dependencies in pom file and configurations in application.properties are same as Spring Boot upload file with form example. To use ajax upload file you need add jquery in the META_INF/resource folder. Following paths in Spring Boot defined as default resource directories. • /META-INF/resources/ • /resources/ • /static/ • /public/ Here we use /META-INF/resources/ as static resource directory. jsp file <%@ page language="java" contentType="text/html; charset=UTF-8" pageEncoding="UTF-8" %> <!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd"> <html> <head> <meta http-equiv="Content-Type" content="text/html; charset=UTF-8"> <title>upload file</title> </head> <body> <script type="application/javascript" src="jquery.1.12.0.js"></script> <input type="file" id="file" name="file"> <input id="uploadBtn" type="button" value="upload"> <div id="content"></div> <script type="application/javascript"> $('#uploadBtn').click(function () { var formData = new FormData(); formData.append('file', $('#file')[0].files[0]); $.ajax({ url: 'upload', type: 'POST', data: formData, processData: false, // tell jQuery not to process the data contentType: false, // tell jQuery not to set contentType success: function (data) { $('#content').html(data); } }); }); </script> </body> </html> Run main method and visit http://localhost:8080 then choose file and upload. You can see the name and content of the file. As you can see Ajax is more friendly then form submit.
ESSENTIALAI-STEM
robloach/component-installer This package is abandoned and no longer maintained. The author suggests using the oomphinc/composer-installers-extender package instead. Allows installation of Components via Composer. Installs: 4 967 663 Dependents: 149 Suggesters: 12 Security: 0 Stars: 284 Watchers: 19 Forks: 33 Open Issues: 30 Language:JavaScript Type:composer-plugin 0.2.3 2015-08-10 12:35 UTC README Component Installer has been deprecated. Use one of the following projects instead: Example composer require oomphinc/composer-installers-extender "extra": { "installer-types": ["component"], "installer-paths": { "components/{$name}/": ["type:component"] } } Component Installer for Composer Build Status Allows installation of Components via Composer. Install composer require robloach/component-installer { "require": { "robloach/component-installer": "*" } } Usage To install a Component with Composer, add the Component to your composer.json require key. The following will install jQuery and normalize.css: composer require components/jquery composer require components/normalize.css { "require": { "components/jquery": "2.*", "components/normalize.css": "3.*", "robloach/component-installer": "*" } } Using the Component The easiest approach is to use the Component statically. Just reference the Components manually using a script or link tag: <script src="components/jquery/jquery.js"></script> <link href="components/normalize/normalize.css" rel="stylesheet"> For complex projects, a RequireJS configuration is available, which allows autoloading scripts only when needed. A require.css file is also compiled, including all Component stylesheets: <!DOCTYPE html> <html> <head> <link href="components/require.css" rel="stylesheet" type="text/css"> <script src="components/require.js"></script> </head> <body> <h1>jQuery+RequireJS Component Installer Sample Page</h1> <script> require(['jquery'], function($) { $('body').css('background-color', 'green'); }); </script> </body> </html> Configuration There are a number of ways to alter how Components are installed and used. Installation Directory It is possible to switch where Components are installed by changing the component-dir option in your root composer.json's config. The following will install jQuery to public/jquery rather than components/jquery: { "require": { "components/jquery": "*" }, "config": { "component-dir": "public" } } Defaults to components. Base URL While component-dir depicts where the Components will be installed, component-baseurl tells RequireJS the base path that will use when attempting to load the scripts in the web browser. It is important to make sure the component-baseurl points to the component-dir when loaded externally. See more about baseUrl in the RequireJS documentation. { "require": { "components/jquery": "*" }, "config": { "component-dir": "public/assets", "component-baseurl": "/assets" } } Defaults to components. Assetic filters { "require": { "components/jquery": "*" }, "config": { "component-dir": "public/assets", "component-baseurl": "/assets", "component-scriptFilters": { "\\Assetic\\Filter\\GoogleClosure\\CompilerApiFilter": [] }, "component-styleFilters": { "\\Assetic\\Filter\\CssImportFilter": [] } } } Creating a Component To set up a Component to be installed with Component Installer, have it require the package robloach/component-installer and set the type to component, but it is not necessary: { "name": "components/bootstrap", "type": "component", "require": { "robloach/component-installer": "*" }, "extra": { "component": { "scripts": [ "js/bootstrap.js" ], "styles": [ "css/bootstrap.css" ], "files": [ "img/*.png", "js/bootstrap.min.js", "css/bootstrap.min.css" ] } } } • scripts - List of all the JavaScript files that will be concatenated together and processed when loading the Component. • styles - List of all the CSS files that should be concatenated together into the final require.css file. • files - Any additional file assets that should be copied into the Component directory. Component Name Components can provide their own Component name. The following will install jQuery to components/myownjquery rather than components/jquery: { "name": "components/jquery", "type": "component", "extra": { "component": { "name": "myownjquery" } } } Defaults to the package name, without the vendor. RequireJS Configuration Components can alter how RequireJS registers and interacts with them by changing some of the configuration options: { "name": "components/backbone", "type": "component", "require": { "components/underscore": "*" }, "extra": { "component": { "shim": { "deps": ["underscore", "jquery"], "exports": "Backbone" }, "config": { "color": "blue" } } }, "config": { "component": { "waitSeconds": 5 } } } Current available RequireJS options for individual packages include: • shim • config • Anything that's passed through config.component is sent to Require.js Packages Without Composer Support Using repositories in composer.json allows use of Component Installer in packages that don't explicitly provide their own composer.json. In the following example, we define use of html5shiv: { "require": { "afarkas/html5shiv": "3.6.*" }, "repositories": [ { "type": "package", "package": { "name": "afarkas/html5shiv", "type": "component", "version": "3.6.2", "dist": { "url": "https://github.com/aFarkas/html5shiv/archive/3.6.2.zip", "type": "zip" }, "source": { "url": "https://github.com/aFarkas/html5shiv.git", "type": "git", "reference": "3.6.2" }, "extra": { "component": { "scripts": [ "dist/html5shiv.js" ] } }, "require": { "robloach/component-installer": "*" } } } ] } Packages Without Component Support In composer.json Using extra in composer.json allows use of Component Installer in packages that don't explicitly provide support for component, but do ship with their own composer.json. Using extra with packages that ship with Component Installer, will override component's settings for that package. { "require": { "datatables/datatables": "~1.10" }, "extra": { "component": { "datatables/datatables": { "scripts": [ "media/js/jquery.dataTables.js" ], "styles": [ "media/css/jquery.dataTables.css" ], "files": [ "media/js/jquery.dataTables.min.js", "media/css/jquery.dataTables.min.css", "media/images/*.png" ] } } } } Not Invented Here There are many other amazing projects from which Component Installer was inspired. It is encouraged to take a look at some of the other great package management systems: License Component Installer is licensed under the MIT License - see LICENSE.md for details.
ESSENTIALAI-STEM
One of the easy ways to lose weight is to plan your meals ahead of time to ensure that you are less likely to make an unhealthy last minute meal choice. You still can enjoy healthy fats by consuming olive, salmon & walnuts to satisfy that craving. Skipping meals causes your body to go into a fat-storing starvation mode, which lowers your metabolism and make burning calories a challenge. For example, try to eat oatmeals in the morning, it will prevent you from gorging on oily and unhealthy food in the afternoon. The oils that are available in these foods actually promotes weight loss by keeping metabolism high and being easily digestible. Instead, have regular meals (4-5 a day) whilst snacking on healthy items (fruits!) often to keep metabolism high. Your body only chooses to retain water for later if you have been depriving yourself from sufficient hydration. Also, drinks like fruit juice is best taken in the morning during breakfast as juices are usually packed with high levels of sugar. Instead, make time for exercising or meditation as such activities help release endorphins to keep stress level down. So, to prevent water retention, please drink more than enough water, it is one of the easy ways to lose weight. Best diet weight loss books youtube Diet high blood pressure cholesterol Fat burning supplements for working out Comments 1. mcmaxmud Whilst they might be fairly super my height is 5.10??and weight more critical now and in the future. 24.05.2014 2. RESAD Losing small amounts of weight such as ten pounds hunting for the who took the. 24.05.2014 top
ESSENTIALAI-STEM
Page:Hofstede de Groot catalogue raisonné, Volume 4, 1912.djvu/131 xni JACOB VAN RUISDAEL 117 355. A Waterfall. Sm. 163, and Suppl. 95. Two tree-trunks lie on a rocky bank to the left. Beyond them stands a pine tree. Farther away is a building on a hill-top. The other side is wooded, with pines and other trees. Rainy sky. Canvas, 27 inches by 22 inches. In the collection of Sir Charles Bagot, Bart., 1835 (Sm.). Sale. Sir C. Bagot, London, June 17, 1836 G8o : 175., Mackenzie). 356. A Hill Landscape with a Waterfall. The water rushes down between rocks in front. On the rocks are felled firs, with two figures. Silvery tone. Canvas, 26 inches by 22 inches. Sale. Baroness de Pagniet, Utrecht, July 26, 1836, No. 22 (570 florins, Velthoven for Tuyll). 357. A Hill Landscape with a Waterfall in front. On a hill in the middle distance is a cottage. Canvas, 26 inches by 22 inches. Sale. Baroness de Pagniet, Utrecht, July 26, 1836, No. 23 (1080 florins, Bunton). 358. A Waterfall in a Hill Landscape. Sm. Suppl. 39. The cataract is divided in the centre by a jutting rock and, falling in foam, spreads over the foreground. On the rugged bank to the right is a leaf- less beech. Across the stream is a mountain thickly clothed with bushy trees, amid which rises a castle tower. On a hill to the left is a clump of trees ; on a lonely road near it are a man and a boy, seen from the back ; beyond them is a third figure. Evening. Canvas, 27 inches by 21^ inches. Sale. Thomas Clutterbuck, London, 1837 Gioo : 5 : 6). 358^. A Hill Landscape with a Fine Waterfall in front. Men and horses. Canvas, 40^ inches by 37 inches. Sale.]. Nepveu and A. Zalm, Amsterdam, April 3, 1837, No. 56 (20 florins, Keyzer). 359. A Waterfall. Sm. Suppl. 70. From the right of a hilly land- scape, a river flows placidly through the centre and falls in two branches amid rocks to the left, and then along the foreground. A long plank bridge, supported on rocks, crosses the fall. A man with a bundle on his back walks over the bridge ; on the bank are three figures. The distance is; well wooded. On the right is a view of an open moor with two cottages. Rainy sky. Canvas, 29^ inches by 36^ inches. Sale. John Dean Thompson, London, 1838 (.268 : i6s., Nieuwenhuys). 360. A Waterfall in a Wooded Landscape. Sm. 273, and Suppl. 86. A river, flowing diagonally from the left, falls in a cascade in front. Three trees, one of them withered, stand on a high bank near the
WIKI
Jeanne Hachette Jeanne Laisné, also known as Jeanne Fourquet in the 16th century and better known as Jeanne Hachette is an emblematic figure in the history of the French city of Beauvais' resistance to the siege laid by Charles the Bold, Duke of Burgundy. She is said to have helped to repel a Burgundian attack on the town of Beauvais with a hatchet and, in popular history, has been elevated to the rank of French heroine. She was born in Beauvais, around 1454, and died on an unknown date. The details of her life and even the fact of her existence, have been the subject of debate among historians, although several contemporaneous documents refer to her existence. Life story and the siege of Beauvais Jeanne Laisné is said to have been born in what is now rue Jeanne-Hachette in the city of Beauvais. She was the daughter of Mathieu Laisnéa, a bourgeois and, according to some historians, a former senior officer of the palace guards of Louis XI who was killed at the battle of Montlhéry. However, popular tradition has it that Jeanne used her mother's name. The siege of Beauvais in 1472 was a military operation launched by Charles the Bold against the King of France, Louis XI, following the latter's breach of the agreements concluded at Péronne in 1468. Charles had superior financial resources, more soldiers and better artillery than Louis XI, but his troops were harassed by the royal army and exhausted themselves by attacking small strongholds before turning to the much larger town of Beauvais. Charles laid siege to Beauvais on June 27, 1472. During a Burgundian attack on July 22, Jeanne Laisné is said to have wielded an ax in order to push back a Burgundian who had planted a flag upon the battlements. Axe in hand, Jeanne flung herself upon him, hurled him into the moat, tore down the flag, and revived the flagging courage of the defenders. Emboldened, the women of the city brought powder and weapons to the fighters and may also have fought on the ramparts. Thus the 80,000 Burgundian attackers were repulsed on July 22, and the advance of Charles the Bold was prevented outright. Louis XI's well organised army had already succeeded in cutting the Burgundians' supply lines. Nevertheless, the citizens of Beauvais were forced to defend their city for almost a month and, in the end, forced the enemy to retreat. This success demonstrated that the bourgeoisie, including women, could organise a defense of a royal city without the support of the royal army. In gratitude for this heroic deed, Louis XI allowed the city of Beauvais to form a municipal corporation and exempted it from taxes. He also praised the heroic efforts of the women of Beauvais and allowed them to wear whatever clothes and ornaments they liked, regardless of rank (despite the laws that permitted certain attire to be worn only by noble women). He also instituted a procession in Beauvais to celebrate its victory over the Burgundians. On this occasion, women were to precede men in the procession. These authorisations were directly given, first in June 1473, by order of Louis XI. He also authorised the marriage of Jeanne to her chosen lover, Colin Pilon, while also bestowing favours on them. Debate about the existence of Jeanne Hachette At the time of the canonisation of Joan of Arc in 1920, interest in the deeds of Jeanne Hachette was reactivated by republicans wishing to promote secularism – Jeanne Hachette offered a non-denominational counterpart to Joan of Arc. Historians agreed that the action of the women of Beauvais was decisive in obtaining victory, but, beginning in the 19th century, some historians (mainly those with religious leanings ) questioned the authenticity of the exploits attributed specifically to Jeanne Hachette. In an article entitled "The rumors of history. Jeanne Hachette" and appearing in the newspaper L'Assemblée nationale on February 19, 1850, the scholar, Paulin Paris, denied the existence of Jeanne Hachette. He asserted, incorrectly, that no 15th century author spoke of her and that the first work to reporting on her exploits was the History of Navarre by André Favin, published in 1612. In reality, the name of Jeanne Laisné and descriptions of her exploits are found in several authoritative documents from the 15th century. These include historical accounts written soon after the siege of Beauvais and, in particular, the reliable chronicle by Robert Gaguin, Compendium super Francorum gestis (1497). In addition, several royal proclamations (lettres patentes) attest to the reality of the military exploits of the women of Beauvais and, indeed, to Jeanne's very existence. The most pertinent of these are the letters patent of Louis XI sent in 1474 that explicitly refer to Jeanne Laisné, laud her exploits and authorize her marriage to Colin Pilon. A decree by Louis XI's financial officials, issued a short time later, gives substance to this royal proclamation by exempting the couple (both of whom are named explicitly) from present or future royal taxes. Legacy * A statue of Jeanne Hachette was unveiled on July 6, 1851. During the inauguration ceremony, the Beauvais poet, Fanny Dénoix des Vergnes (1798-1879) read her poem, Jeanne Hachette, or the siege of Beauvais. * Famous transformation playing cards decks are named after Jeanne Hachette and feature her as the queen of spade: The blue version printed by Grimaud in 1860 and the red version printed by Formmann in 1872. * Every year, on the last weekend of June, the Jeanne Hachette Festival (or Assault Festivals) are organized, which consist of parades in period costumes, organized by the association Les Amis des Fêtes Jeanne Hachette. * She is the tragic figure in the play by the Marquis de Sade, Jeanne Laisné ou le siège de Beauvais published in 1813. It has never been performed. * She was portrayed in the French film Le Miracle des loups (1924) of Raymond Bernard. * Max Ernst made a collage Jeanne Hachette et Charles le Téméraire in 1927, now in the Cleveland Museum of Art (as Jean Hatchet and Charles the Bold). * The knight Jenavelle Rolantir who appears in Elf Saga: Doomsday (2014) by Joseph Robert Lewis is inspired by various French heroes, including Roland and Jeanne Hachette.
WIKI
User:RandomMusicXD RandomMusicXD is an intelligent girl living in the town of Battle Creek, MI and attends one of the worst school districts in the area but succeeds to still do well. RandomMusicXD first started off as,"MusicLover=D" on a site called SodaHead.com, then to,"Music Lover ~Queen Of Sarcasm~, but is now mysteriously hidden under the name of,"RandomMusicXD" RandomMusicXD has accounts of these five that are seldomly used; SodaHead, Deviantart, Twitter, BBC 1xtra, and currently Wikipedia. My purpose of being here is to tell you all of the things I've encountered during a surf of the interwebz. :D After all of the experiences I've encountered I've been so cynical towards the internet and real life, thank you, Jackarses!
WIKI
{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2019,5,9]],"date-time":"2019-05-09T01:43:23Z","timestamp":1557366203679},"reference-count":28,"publisher":"Frontiers Media SA","content-domain":{"domain":["frontiersin.org"],"crossmark-restriction":true},"short-container-title":["Front. Robot. AI"],"DOI":"10.3389\/frobt.2016.00063","type":"journal-article","created":{"date-parts":[[2016,10,18]],"date-time":"2016-10-18T12:10:10Z","timestamp":1476792610000},"update-policy":"http:\/\/dx.doi.org\/10.3389\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Development of a Multi-functional Soft Robot (SNUMAX) and Performance in RoboSoft Grand Challenge"],"prefix":"10.3389","volume":"3","author":[{"given":"Jun-Young","family":"Lee","sequence":"first","affiliation":[]},{"given":"Brian Byunghyun","family":"Kang","sequence":"additional","affiliation":[]},{"given":"Dae-Young","family":"Lee","sequence":"additional","affiliation":[]},{"given":"Sang-Min","family":"Baek","sequence":"additional","affiliation":[]},{"given":"Woong-Bae","family":"Kim","sequence":"additional","affiliation":[]},{"given":"Woo-Young","family":"Choi","sequence":"additional","affiliation":[]},{"given":"Jeong-Ryul","family":"Song","sequence":"additional","affiliation":[]},{"given":"Hyeong-Joon","family":"Joo","sequence":"additional","affiliation":[]},{"given":"Daegeun","family":"Park","sequence":"additional","affiliation":[]},{"given":"Kyu-Jin","family":"Cho","sequence":"additional","affiliation":[]}],"member":"1965","published-online":{"date-parts":[[2016,10,18]]},"reference":[{"key":"B1","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1109\/MRA.2008.927979","article-title":"Soft robotics","volume":"15","author":"Albu-Schaffer","year":"2008","journal-title":"IEEE Robot. Autom. Mag."},{"key":"B2","doi-asserted-by":"publisher","first-page":"341","DOI":"10.1109\/TRO.2011.2171093","article-title":"A positive pressure universal gripper based on the jamming of granular material","volume":"28","author":"Amend","year":"2012","journal-title":"IEEE Trans. Robot."},{"key":"B3","doi-asserted-by":"publisher","first-page":"730","DOI":"10.1109\/TMECH.2013.2253615","article-title":"Quattroped: a leg\u2013wheel transformable robot","volume":"19","author":"Chen","year":"2014","journal-title":"IEEE ASME Trans. Mechatron."},{"key":"B4","doi-asserted-by":"publisher","first-page":"1255","DOI":"10.1007\/s12541-012-0168-2","article-title":"Design and analysis of a stiffness adjustable structure using an endoskeleton","volume":"13","author":"Huh","year":"2012","journal-title":"Int. J. Precis. Eng. Manuf."},{"key":"B5","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1109\/MRA.2014.2362863","article-title":"Exo-glove: a wearable robot for the hand with a soft tendon routing system","volume":"22","author":"In","year":"2015","journal-title":"IEEE Robot. Autom. Mag."},{"key":"B6","author":"Jiang","first-page":"2922","year":"2012","article-title":"\u201cDesign of a variable stiffness flexible manipulator with composite granular jamming and membrane coupling,\u201d"},{"key":"B7","author":"Kang","first-page":"3750","year":"2016","article-title":"\u201cDevelopment of a polymer-based tendon-driven wearable robotic hand,\u201d"},{"key":"B8","doi-asserted-by":"publisher","first-page":"287","DOI":"10.1016\/j.tibtech.2013.03.002","article-title":"Soft robotics: a bioinspired evolution in robotics","volume":"31","author":"Kim","year":"2013a","journal-title":"Trends Biotechnol."},{"key":"B9","doi-asserted-by":"publisher","first-page":"1031","DOI":"10.1109\/TRO.2013.2256313","article-title":"A novel layer jamming mechanism with tunable stiffness capability for minimally invasive surgery","volume":"29","author":"Kim","year":"2013b","journal-title":"IEEE Trans. Robot."},{"key":"B10","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1109\/TRO.2007.909786","article-title":"Smooth vertical surface climbing with directional adhesion","volume":"24","author":"Kim","year":"2008","journal-title":"IEEE Trans. Robot."},{"key":"B11","author":"Lee","year":"2013a","article-title":"\u201cThe deformable wheel robot using magic-ball origami structure,\u201d","DOI":"10.1115\/DETC2013-13016","doi-asserted-by":"crossref"},{"key":"B12","author":"Lee","first-page":"313","year":"2013b","article-title":"\u201cFabrication of origami structure using pattern enclosed composite (PEC),\u201d"},{"key":"B13","author":"Lee","first-page":"2565","year":"2014","article-title":"\u201cFabrication of origami wheel using pattern embedded fabric and its application to a deformable mobile robot,\u201d"},{"key":"B14","author":"Liu","first-page":"3692","year":"2008","article-title":"Multisensory five-finger dexterous hand: the DLR\/HIT hand II"},{"key":"B15","doi-asserted-by":"publisher","first-page":"205","DOI":"10.1002\/adma.201203002","article-title":"Robotic tentacles with three-dimensional mobility based on flexible elastomers","volume":"25","author":"Martinez","year":"2013","journal-title":"Adv. Mater."},{"key":"B16","doi-asserted-by":"publisher","first-page":"400","DOI":"10.1038\/536400a","article-title":"Robotics: generation soft","volume":"536","author":"Mazzolai","year":"2016","journal-title":"Nature"},{"key":"B17","doi-asserted-by":"publisher","first-page":"252","DOI":"10.20965\/jrm.2007.p0252","article-title":"Development of transformable mobile robot with mechanism of variable wheel diameter","volume":"19","author":"Nagatani","year":"2007","journal-title":"JRM"},{"key":"B18","doi-asserted-by":"publisher","first-page":"10768","DOI":"10.1038\/srep10768","article-title":"Microrobotic tentacles with spiral bending capability based on shape-engineered elastomeric microtubes","volume":"5","author":"Paek","year":"2015","journal-title":"Sci. Rep."},{"key":"B19","doi-asserted-by":"publisher","first-page":"36002","DOI":"10.1088\/1748-3182\/9\/3\/036002","article-title":"Design of a variable-stiffness flapping mechanism for maximizing the thrust of a bio-inspired underwater robot","volume":"9","author":"Park","year":"2014","journal-title":"Bioinspir. Biomim."},{"key":"B20","doi-asserted-by":"publisher","first-page":"35008","DOI":"10.1088\/1748-3190\/10\/3\/035008","article-title":"A bioinspired soft manipulator for minimally invasive surgery","volume":"10","author":"Ranzani","year":"2015","journal-title":"Bioinspir. Biomim."},{"key":"B21","doi-asserted-by":"publisher","first-page":"25006","DOI":"10.1088\/1748-3182\/7\/2\/025006","article-title":"A 3D steady-state model of a tendon-driven continuum soft manipulator inspired by the octopus arm","volume":"7","author":"Renda","year":"2012","journal-title":"Bioinspir. Biomim."},{"key":"B22","author":"RoboSoft CA","year":"2016","journal-title":"RoboSoft Grand Challenge"},{"key":"B23","doi-asserted-by":"publisher","first-page":"467","DOI":"10.1038\/nature14543","article-title":"Design, fabrication and control of soft robots","volume":"521","author":"Rus","year":"2015","journal-title":"Nature"},{"key":"B24","author":"Santiago","first-page":"1","year":"2015","article-title":"\u201cContinuum robots for space applications based on layer-jamming scales with stiffening capability,\u201d"},{"key":"B25","author":"Shadow Robot Company","year":"2016","journal-title":"Shadow Dexterous Hand\u2122"},{"key":"B26","author":"She","first-page":"4165","year":"2015","article-title":"\u201cA transformable wheel robot with a passive leg,\u201d"},{"key":"B27","author":"Soft Robotics Inc","year":"2016","journal-title":"Soft Robotic Grippers"},{"key":"B28","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1089\/soro.2013.0003","article-title":"A journal of soft robotics: why now?","volume":"1","author":"Trimmer","year":"2014","journal-title":"Soft Robot."}],"container-title":["Frontiers in Robotics and AI"],"original-title":[],"link":[{"URL":"http:\/\/journal.frontiersin.org\/article\/10.3389\/frobt.2016.00063\/full","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,25]],"date-time":"2017-06-25T01:25:40Z","timestamp":1498353940000},"score":1.0,"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,10,18]]},"references-count":28,"URL":"http:\/\/dx.doi.org\/10.3389\/frobt.2016.00063","relation":{"cites":[]},"ISSN":["2296-9144"],"issn-type":[{"value":"2296-9144","type":"electronic"}]}}
ESSENTIALAI-STEM
Page:Hero of Ballinacrazy.pdf/3 3 That I took from the peg my deceased lady’s leg, (dear. For to lather my live one when lazy, When I lived, &c. Then I pick’d up rich old Mother Hazy, dear, (Blaze dear; She’d a cough, and employ’d Doctor But some drops that he gave, dropp’d her, into her grave, (dear, And her cash made me very soon aisy, When I lived, &c. Then says I to old’ Father O’Mazy dear, Don’t my weddings and funerals please you, dear? Ouch! says he, you blackguard, betwixt church and churchyard, Why you never will let me be aisy, dear When I lived, &c. Och! woman! I live but to please, you, dear, I’m the hero of Ballinacrazy, dear! I’ll marry you all, lean, fat, short, and tall, One after the other to please you, dear. When I lived, &c.
WIKI