text
stringlengths 16
352k
| source
stringclasses 2
values |
---|---|
giFT — свободный кросс-платформенный демон для работы с файлообменными сетями
GIFT (Gnu) — GNU Image-Finding Tool — программа для поиска изображений
GIFT (Moodle) — текстовый формат для тестов и викторин, используемый программой Moodle | wiki |
Saundra is a given name and may refer to:
Saundra Santiago, American actress most noted for her work on Miami Vice
Saundra Quarterman, American actress most noted for her role on Hangin' with Mr. Cooper
Saundra Edwards, American actress and model
Saundra Smokes, American journalist
Saundra Meyer, American politician | wiki |
Jimmy Jackson, calciatore
Jimmy Jackson, pilota automobilistico | wiki |
Roddy the Roadman is a series of six children's books by British author Phyllis Arkle. Roddy is the workman depicted on the "roadworks ahead" traffic warning sign on British roads; in the stories he comes alive and has numerous adventures.
The first book in the series was published in 1970.
Titles
Roddy the Roadman (1970)
Roddy and the Rustlers (1972)
Roddy on the Motorway (1974)
Roddy on the Canal (1975)
Roddy and the Puma (1979)
Roddy and the Miniature Railway (1980)
External links
British Library
Series of children's books
Children's fiction books
1970 children's books
British picture books | wiki |
Super Bowl II, då kallad The Second AFL-NFL World Championship Game, spelades den 14 januari 1968 på Miami Orange Bowl. NFL-mästarna Green Bay Packers slog AFL-mästarna Oakland Raiders med 33-14.
Källor
02
Sport i Miami
Sportåret 1968
1968 i USA | wiki |
Snowdome is an indoor ski slope in Tamworth, Staffordshire, England.
Snowdome may also refer to:
Snowdome Adelaide, a former indoor ski slope in Adelaide, Australia
Dubai Snowdome, an indoor ski slope in Dubailand, Dubai
"Snowdome" (song), a song by Kaela Kimura
See also
Snow globe, a transparent sphere enclosing a miniaturized scene
Snow Dome (disambiguation) | wiki |
Unzipped may refer to:
Unzipped (film), a 1995 documentary film
Unzipped (TV series), a comedy British television programme
Unzipped, a 2001 television news magazine hosted by Catherine Clark
Unzipped, a monthly gay pornographic magazine owned by LPI Media
Unzipped, a 1999 book by Bronwyn Donaghy
Unzipped: A Toolkit for Life, a 2007 book by Matt Whyman
Unzipped, a 2007 memoir by Suzi Quatro
Unzipped, a 1995 EP by Low Pop Suicide
Unzipped, a 1998 comedy album by Pat Paulsen | wiki |
Live Free or Die is the state motto of the U.S. state of New Hampshire.
Live Free or Die may also refer to the following:
Film
Live Free or Die (2000 film), a 2000 documentary about abortion
Live Free or Die (2006 film), a 2006 comedy movie
Live Free or Die Hard, a 2007 action movie, the fourth in the Die Hard series
Television
"Live Free or Die" (Breaking Bad), an episode from the fifth season of Breaking Bad
"Live Free or Die" (The Sopranos), an episode from the sixth season of The Sopranos
Live Free or Die, a 2014 National Geographic Channel reality television series about people who live off the grid.
Literature
Live Free or Die (1993 novel), a 1990 and 1993 novel by New Hampshire writer Ernest Hebert
Live Free or Die (2010 novel), a 2010 novel by science fiction writer John Ringo | wiki |
A domestic partnership is a relationship, usually between couples, who live together and share a common domestic life, but are not married (to each other or to anyone else). People in domestic partnerships receive legal benefits that guarantee right of survivorship, hospital visitation, and other rights.
The term is not used consistently, which results in some inter-jurisdictional confusion. Some jurisdictions, such as Australia, New Zealand, and the U.S. states of California, Maine, Nevada, Oregon and Washington use the term "domestic partnership" to mean what other jurisdictions call civil union, civil partnership, or registered partnership. Other jurisdictions use the term as it was originally coined, to mean an interpersonal status created by local municipal and county governments, which provides an extremely limited range of rights and responsibilities.
Some legislatures have voluntarily established domestic partnership relations by statute instead of being ordered to do so by a court. Although some jurisdictions have instituted domestic partnerships as a way to recognize same-sex marriage, statutes do exist which provide for recognition of opposite-sex domestic partnerships in many jurisdictions.
In some legal jurisdictions, domestic partners who live together for an extended period of time but are not legally entitled to common-law marriage may be entitled to legal protection in the form of a domestic partnership. Some domestic partners may enter into nonmarital relationship contracts in order to agree, either verbally or in writing, to issues involving property ownership, support obligations, and similar issues common to marriage. (See effects of marriage and palimony.) Beyond agreements, registration of relationships in domestic partnership registries allow for the jurisdiction to formally acknowledge domestic partnerships as valid relationships with limited rights.
Overview
Although the terms are sometimes used interchangeably, a Domestic Partnership, Same Sex Marriage or Civil Union are each separate and distinct legal concepts. The domestic partnership is a legal relationship between two people of the same or opposite sex who live together and share a domestic life, but aren't married or joined by a civil union nor are blood relatives. It may be established by contract between the parties, but more often by registration according to procedures established by a state or municipal government. Benefits granted under a domestic partnership vary among different jurisdictions. Some accord full health benefits, others only a right of visitation. In still other jurisdictions, registered domestic partners are accorded a legal status similar to that of a married person with respect to matters of probate, guardianships, conservatorships, inheritance, protection from abuse, and related matters.
Since the 2015 US Supreme Court's decision legalizing same-sex marriage, there have been fewer US domestic partnerships registered, but in many jurisdictions they are still allowed for couples of the same gender or different genders who don’t want to marry but still would like to be eligible for certain benefits. Many couples opt for a domestic partnership after comparing the potential tax consequences of being married.
In the United States
Origin of term in Californian municipalities
In August 1979, gay rights activist Tom Brougham proposed a new category of relationship called "domestic partnership". Initially, the requirements were that only two people who resided together and were qualified to marry except that they were the same gender. Additional requirements were later added for the partners to maintain mutual financial responsibility and for both to be at least eighteen years old and able to enter into a legal contract.
San Francisco
In 1982, Brougham's definition was modified by Supervisor Harry Britt, a gay man appointed to replace Harvey Milk. Britt's version was adopted and passed by the San Francisco Board of Supervisors, but Dianne Feinstein, mayor of San Francisco at the time, came under intense pressure from the Catholic Church and vetoed the bill. In 1989, a domestic partnership law was adopted in San Francisco. However, voters repealed the domestic partnership law by initiative; a modified version was reinstated by another voter initiative, 1990's Proposition K, also written by Britt.
Currently, the city still offers a domestic partnership status separate and differing in benefits from that offered by the state; city residents can apply for both.
According to the San Francisco Human Rights Commission, "In 1982, the term 'domestic partner' was first used in a lawsuit filed by San Francisco Human Rights Commission employee Larry Brinkin. Mr. Brinkin, then an employee of Southern Pacific Railway, had recently suffered the loss of his partner of eleven years. When he was denied the three days of paid bereavement leave given to married employees, he filed suit with the assistance of the ACLU. Mr. Brinkin lost his case. Despite a great deal of evidence to the contrary, the judge agreed with his employer's claim that there was no way to know if his relationship was legitimate."
Berkeley
In 1983, the City Council of Berkeley, California, under the leadership of Mayor Gus Newport, ordered their Human Relations and Welfare Commission to develop a domestic partnership proposal. The Commission appointed its Vice-Chair, Leland Traiman, a gay activist, to head the Domestic Partner Task Force and draft a policy. Working with Tom Brougham, members of the East Bay Lesbian/Gay Democratic Club, and attorney Matt Coles, the Domestic Partner Task Force drafted what has become the template for domestic partner/civil union policies around the world. The City of Berkeley's Human Relations and Welfare Commission held a public hearing early in 1984 on "Examining the Use of Marriage to Determine Benefits and Liabilities in Berkeley and the Alternatives". A policy was adopted by the Commission and presented to the City Council. A copy was sent to the Berkeley School Board. In July 1984 the City Council voted down the proposal citing financial concerns. On August 1, 1984, the Berkeley School Board enacted the policy by a 4 to 1 vote. The school board motion was made by board member and community activist Ethel Manheimer.
In November 1984, all the city council members up for election who had voted against the policy lost reelection. Progressives from the Berkeley Citizens' Action (BCA) slate who replaced them had voiced strong support for a domestic partner policy. The East Bay Lesbian/Gay Democratic Club had worked hard to elect the BCA Slate. This was the first time domestic partners was a campaign issue. At the first meeting of the new City Council in December 1984, the Berkeley City Council enacted a policy extending employee benefits to unmarried couples of any gender. The first couple to file for benefits under Berkeley's sex-neutral policy were Brougham and his partner Barry Warren.
However, the City Council did not create a registry for domestic partners until 1991. On October 11 of that year, 28 lesbian and gay male couples and one heterosexual couple registered their partnerships. The registry and benefits were also extended to non-resident couples that same year.
West Hollywood
In 1985, West Hollywood city council member John Heilman successfully introduced domestic partner legislation for city residents and employees that was passed by the city council and created the first domestic partnership registry.
Statewide
California
California created the first state-level domestic partnership in the United States in 1999. Effective from January 1, 2020, domestic partnerships will be legally available to all couples consisting of any two people, regardless of gender over 18 years old. The California Governor signed the bill SB-30 into law on July 30, 2019.
On September 4, 2003 the California legislature passed an expanded domestic partnership bill, extending all of the state legal rights and responsibilities of marriage to people in state domestic partnerships. California's comprehensive domestic partner legislation was the first same-sex couples policy in the United States created by a legislature without a court order. The legislation became effective January 1, 2005.
Pre-existing municipal and county domestic partnership ordinances remain in force unless repealed by their local governments. Thus, residents of San Francisco, West Hollywood, and a few other locations may choose between a local domestic partnership, a California domestic partnership, or marriage. Nothing in either the 1999 or 2003 domestic partnership legislation applies to any of the municipal or county domestic partnership ordinances, whose scopes are extremely limited and are not portable outside of the jurisdiction that issued them.
The State of California has developed an Online Self-Help Center that provides resources and information to assist domestic partners in many areas, including filing domestic partnerships, dissolving domestic partnerships, parenting issues, tax issues, and more.
Colorado
Since July 1, 2009 unmarried couples have been legally able to enter a designated beneficiary agreement which will grant them limited rights. A law on civil unions went into effect on May 1, 2013.
District of Columbia
Washington, D.C., has recognized domestic partnerships since 1992. However, Congress prohibited the District from spending any local funds to implement the law. The prohibition was lifted in the federal appropriations act for the District for the 2002 fiscal year. Domestic partnership in the District is open to both same-sex and opposite-sex couples. All couples registered as domestic partners are entitled to the same rights as family members to visit their domestic partners in the hospital and to make decisions concerning the treatment of a domestic partner's remains after the partner's death. The measure also grants District of Columbia government employees rights to a number of benefits. Domestic partners are eligible for health care insurance coverage, can use annual leave or unpaid leave for the birth or adoption of a dependent child or to care for a domestic partner or a partner's dependents, and can make funeral arrangements for a deceased partner. The Domestic Partnership Equality Amendment Act of 2006, D.C. Law 16-79, came into effect on April 4, 2006. This act provides that in almost all cases a domestic partner will have the same rights as a spouse regarding inheritance, probate, guardianship, and other rights traditionally accorded to spouses. D.C. Council on May 6, 2008 approved the addition of 39 new provisions to the city's domestic partners law, bringing the law to a point where same-sex couples who register as domestic partners will receive most, but not quite all, of the rights and benefits of marriage under District law.
Hawaii
Reciprocal beneficiary registration was enacted in 1997. The law took effect on June 1, 1997.
Maine
In April 2004 the legislature passed a domestic partnership bill. The law, which provides same-sex individuals with inheritance rights over their partners' property and guardianship over their deceased partner, went into effect on July 30, 2004. On May 6, 2009, Maine's legislature and governor enacted a law to legalize same-sex marriage, but on November 3, 2009, that law was repealed by voters. Maine legalized same-sex marriage in December 2012.
Maryland
Since July 1, 2008, unmarried couples have been able to enter a designated unregistered beneficiary agreement which will grant them limited rights such as the right to visit one another in the hospital, the right to share a room in a nursing home, and the right to make funeral decisions. A law on same-sex marriage went into effect on January 1, 2013.
Nevada
In Nevada domestic partnerships are granted all the benefits, rights, obligations and/or responsibilities of marriage (for any two adults over 18, regardless of gender) and these have become legally available since October 1, 2009. The act specifically excludes requiring any entity to provide health benefits to domestic partners. In addition, due to vagueness in the verbiage of the act, most companies and entities within Nevada refuse to acknowledge or afford any major benefits or rights to registered domestic partners, leaving legal action as the only avenue to garner individual rights.
New Jersey
Domestic partnerships in New Jersey have been available since July 30, 2004 for same-sex couples, and for opposite-sex couples in which both people are above the age of 62. However, on October 25, 2006, the Supreme Court of New Jersey ruled that under the New Jersey state constitution, the state could not deny the benefits of marriage to same-sex couples, although the court left it up to the legislature whether to call such relationships marriage or to use a different term. Complying with the court's ruling, on December 14, 2006, the New Jersey Legislature passed a bill establishing civil unions for same-sex couples, which was signed into law by the governor on December 21 and came into effect on February 19, 2007.
Oregon
The governor of Oregon, Ted Kulongoski, signed a domestic partnership bill into law on May 9, 2007. Called the Oregon Family Fairness Act, the law would provide several major rights to same-sex couples that were previously only given to married couples, including the ability to file jointly on insurance forms, hospital visitation rights, and rights relating to the deceased partner. The law's initial implementation was delayed by a federal Court, but the injunction was lifted on February 1, 2008 and the law went into effect on February 4.
Washington
In the state of Washington, Governor Christine Gregoire signed into law legislation allowing limited domestic partnership on April 21, 2007. The law, which took effect July 22, 2007 and expanded to all areas except for marriage in 2008 and 2009, permits same-sex couples (as well as heterosexual couples when one individual is at least age 62) to register in a domestic partnership registry that allows couples hospital visitation rights, the ability to authorize autopsies and organ donations, and inheritance rights when there is no will. This follows the 1998 passage of a bill by the Washington State legislature that defined marriage as being between a man and a woman; this legislation was upheld by the Washington State Supreme Court in 2006.
Same-sex marriage was legalized in Washington with effect from December 6, 2012. As a result, the domestic partnership law was amended so that from June 30, 2014, domestic partnerships will be available only when at least one of the partners is sixty-two years of age or older.
Wisconsin
Wisconsin was the first state in the Midwest to legislatively enact same-sex unions. Out of about thirty states that have bans on same-sex marriage and civil unions, Wisconsin was the first (and only) to enact domestic partnerships.
On March 5, 2009 Wisconsin Governor Jim Doyle proposed legislation for same-sex partnerships in Wisconsin.
In June 2009, the Wisconsin State Assembly and Senate both passed the biennial state budget which includes domestic partnership protections for the state's same-sex couples.
On June 29, 2009, Governor Jim Doyle signed the budget, giving final approval to limited domestic partnership benefits for same-sex couples living in Wisconsin.
On July 23, 2009, three members of Wisconsin Family Action filed a petition for an original action in the Wisconsin Supreme Court, seeking a declaration that the domestic partner registry is unconstitutional under the state's Marriage Protection Amendment.
The law went into effect on August 3, 2009.
November 4, 2009: The Wisconsin Supreme Court rejected Appling v. Doyle, Wisconsin Family Action's legal challenge to domestic partnerships.
May 13, 2011: Governor Scott Walker asked to withdraw the state's defense of the domestic partnership registry.
June 20, 2011: Dane County Judge Dan Moeser ruled that the domestic partnership registry does not violate the state constitution, finding that the state "does not recognize domestic partnership in a way that even remotely resembles how the state recognizes marriage".
Wisconsin ended its domestic partnership registry on April 1, 2018.
Other states
Many states recognize through their judicial systems cohabitation agreements and common law partner agreements concluded between two partners in a relationship. These are de facto domestic partnerships that protect both parties and allow for shared property and court recognition of their relationships.
Sometimes adult adoption by gay couples creates a de jure domestic partnership in all 50 states.
Local level
United States Military
On February 11, 2013, Secretary of Defense Leon Panetta submitted a memorandum (subject: Extending Benefits to Same-Sex Domestic Partners of Military Members) that outlined benefits that would be made available to service members in domestic partnerships. The newly listed benefits available to gay and lesbian service members was to include:
Dependant ID Cards
Commissary privileges
Exchange privileges
Morale, Welfare, and Recreation (MWR) privileges
Surveys of Military Families
Quadrennial Quality of Life Review
Emergency Leave
Emergency Leave of Absence
Youth Sponsorship Program
Youth Programs
Family Center Programs
Sexual Assault Counselling Program
Joint Duty Assignments
Exemption from Hostile-Fire Areas
Transportation to and from certain places of employment and on military installations, as well as primary and secondary school for dependants
Authority of Service Secretary to Transport Remains of a Dependant
Disability and Death Compensation: Dependants of Members Held as Captives
Payments to Missing Persons
Space-Available Travel on DoD Aircraft
Child Care
Legal Assistance
Implementation of the plan was cancelled once the Supreme Court handed down its opinion in United States v. Windsor.
In Europe
In France since 1968, article 515-81 of Code civil defines domestic partnership (in French: concubinage or concubinage notoire) as a de facto union between two persons, of different sex or of same sex, characterised by a stable and continuous cohabitation and partnership. The French fiscal administration takes it into account in the calculation of the solidarity tax on wealth but not for other purposes. All children enjoy equal right whether within or outside wedlock. Since 1999 French law also provides for a civil solidarity pact (in French: pacte civil de solidarité, or PACS), a contractual form of civil union between two adults bringing additional rights and responsibilities, but less so than marriage.
Hungary has registered partnerships for same-sex partners, which afford rights similar to marriage. Croatia also had unregistered partnerships until June 2014 when the Croatian parliament passed a law allowing life partnerships for same-sex couples giving them the same rights married couples do have.
In Hungary, since 1995 domestic partnership in the form of unregistered cohabitation offers a limited set of rights compared to marriage in a Civil Code (more in the field of health and pension; but no inheritance), although a growing number of Hungarian couples, both opposite-sex couples and same-sex couples choose this kind of partnership instead of marriage. In April 2009, the Hungarian Parliament passed a Registration Partnership Act 2009 with a vote of 199–159, which provides a registered partnership for same-sex couples with all the benefits and entitlements of marriage (except for marriage itself, adoption, IVF access, taking a partner's surname, parentage and surrogacy). The law was passed in December 2007 by a vote of 110–78, but the Constitutional Court of Hungary was "deeply concerned" that the law was a duplication of opposite-sex marriage benefits and entitlements, so same-sex couples only registration was chosen. Some politicians of the Alliance of Free Democrats and Hungarian Socialist Party parties have argued for the introduction of marriage for same-sex couples. The Registration Partnership Act 2009 came into effect from July 1, 2009.
In Oceania
Australia
Since January 9, 2018 same-sex marriage became legal throughout Australia. Since July 1, 2009, Australia also recognises de facto relationships for all couples of any sex.
Australian Capital Territory (domestic relationship status provided from 1994 and Civil partnership provided since 2008).
Commonwealth (federal Government of Australia provides both a de facto and registered relationship since 2009).
New South Wales (de facto status provided since 1999, expanded further in 2002, 2005 and 2008).
Norfolk Island (de facto status provided from 2006).
Northern Territory (de facto status provided since 2003).
Queensland (de facto status provided since 1999, expanded further in 2002).
South Australia (domestic relationship status provided since 2007).
Tasmania (de facto status provided from 2003, "Registry system/Significant Relationships" provided since 2004) Recognition of same-sex unions in Tasmania
Victoria (domestic relationship status provided since 2001 and a "registry system" has been provided since 2008).
Western Australia (de facto status provided since 2002).
New Zealand
In 2001, the Property (Relationships) Act 1976 was extended to offer partners in unregistered "de facto" relationships similar rights to those of married couples. A de facto relationship is defined as a relationship between two persons living as a couple, who are not married or in a civil union. This applies to both heterosexual and same sex couples. Since 2013, same-sex marriage is legally recognised and performed within New Zealand and still includes unregistered "de facto" relationships similar rights to those of married couples.
See also
Cohabitation
Civil marriage
Civil union
Concubinage
Free union
Common-law marriage
Same-sex marriage
Same-sex marriage in California
References
External links
Same-Sex Marriage, Civil Unions, and Domestic Partnerships topic page from The New York Times
Domestic Partnership, Encyclopædia Britannica
What rights do I have as part of an unmarried couple
Family
Partnerships
State recognition of same-sex relationships | wiki |
A debit is one side of an entry in double-entry bookkeeping, reflecting the amount taken out of an account.
Debit may also refer to:
Finance and accounting
Debit card, a type of payment card
Debit MasterCard, a brand of debit card
Visa Debit, a brand of debit card
Bank account debits tax, an Australian tax
Debit commission, a commission in the Holy Roman Empire
Debit spread, a financial trading concept
Grapes
Debit (grape), a Croatian grape variety
Debit, or Bombino bianco, an Italian grape variety
Other uses
Debits and Credits (book)
"Debits Field", a derisive name for Citi Field
See also
Credit (disambiguation)
Debito Arudou
Debt | wiki |
In Mandaeism, a rahma (; plural form: rahmia ) is a daily devotional prayer that is recited during a specific time of the day or specific day of the week.
Translations
E. S. Drower's version of the Qolasta, the Canonical Prayerbook of the Mandaeans, has 64 rahma prayers translated into English that are numbered from 106 to 169. In Drower's ordering, the rahma prayers directly follow the Asiet Malkia prayer (CP 105), while the Ṭabahatan prayer (CP 170) comes after the rahma prayers.
Part 1 of the Oxford Collection in Mark Lidzbarski's Mandäische Liturgien (1920) contains 60 rahma prayers translated into German that correspond to prayers 106–160 and 165–169 in Drower (1959).
List of rahma prayers
Below, Oxford refers to Lidzbarski's (1920) numbering, while CP refers to Drower's (1959) number.
Hourly prayers
The first 13 prayers are recited during the three times of the day for prayer, which are dawn (sunrise), noontime (the "seventh hour"), and evening (sunset).
Oxford 1.1 (CP 106): opening prayer
Oxford 1.2 (CP 107): dawn prayer
Oxford 1.3 (CP 108): dawn prayer
Oxford 1.4 (CP 109): noontime (seventh hour) prayer
Oxford 1.5 (CP 110)
Oxford 1.6 (CP 111)
Oxford 1.7 (CP 112): opening evening prayer
Rahma prayers recited after incense is offered:
Oxford 1.8 (CP 113): dawn prayer, after incense
Oxford 1.9 (CP 114): dawn prayer, after incense
Oxford 1.10 (CP 115): dawn prayer, after incense
Oxford 1.11 (CP 116): dawn prayer, after incense
Oxford 1.12 (CP 117): noontime (seventh hour) prayer, after incense
Oxford 1.13 (CP 118): evening prayer, after incense
Prayers for the days of the week
There are 6 rahma prayers for each day of the week. Each set consists of alternating long and short prayers (i.e., the 1st prayer is a long one, the 2nd prayer is a short one, while the 3rd prayer is again a long one, etc.).
Sunday prayers
Oxford 1.14 (CP 119)
Oxford 1.15 (CP 120)
Oxford 1.16 (CP 121)
Oxford 1.17 (CP 122)
Oxford 1.18 (CP 123)
Oxford 1.19 (CP 124)
Monday prayers
Oxford 1.20 (CP 125)
Oxford 1.21 (CP 126)
Oxford 1.22 (CP 127)
Oxford 1.23 (CP 128)
Oxford 1.24 (CP 129)
Oxford 1.25 (CP 130)
Tuesday prayers
Oxford 1.26 (CP 131)
Oxford 1.27 (CP 132)
Oxford 1.28 (CP 133)
Oxford 1.29 (CP 134)
Oxford 1.30 (CP 135)
Oxford 1.31 (CP 136)
Wednesday prayers
Oxford 1.32 (CP 137)
Oxford 1.33 (CP 138)
Oxford 1.34 (CP 139)
Oxford 1.35 (CP 140)
Oxford 1.36 (CP 141)
Oxford 1.37 (CP 142)
Thursday prayers
Oxford 1.38 (CP 143)
Oxford 1.39 (CP 144)
Oxford 1.40 (CP 145)
Oxford 1.41 (CP 146)
Oxford 1.42 (CP 147)
Oxford 1.43 (CP 148)
Friday prayers
Oxford 1.44 (CP 149)
Oxford 1.45 (CP 150)
Oxford 1.46 (CP 151)
Oxford 1.47 (CP 152)
Oxford 1.48 (CP 153)
Oxford 1.49 (CP 154)
Saturday prayers
Oxford 1.50 (CP 155)
Oxford 1.51 (CP 156)
Oxford 1.52 (CP 157)
Oxford 1.53 (CP 158)
Oxford 1.54 (CP 159)
Oxford 1.55 (CP 160)
Saturday evening priest initiation prayers
The 2 prayers for novices in priest initiation ceremonies, recited on Saturday evening (sunset):
CP 161 (not in Lidzbarski)
CP 162 (not in Lidzbarski)
Sunday dawn priest initiation prayers
The 2 prayers for novices in priest initiation ceremonies, recited on Sunday dawn (sunrise):
CP 163 (not in Lidzbarski)
CP 164 (not in Lidzbarski)
"Fruits of Ether" prayers
The last 5 prayers are the prayers for the "Fruit(s) of Ether".
Oxford 1.56 (CP 165)
Oxford 1.57 (CP 166)
Oxford 1.58 (CP 167)
Oxford 1.59 (CP 168)
Oxford 1.60 (CP 169)
See also
Brakha (daily prayer in Mandaeism)
Asiet Malkia
Tabahatan
Qolasta
References
Mandaean prayer
Mandaic words and phrases | wiki |
Inter se (also styled as inter sese) is a Legal Latin phrase that means "[a]mong or between themselves". The phrase is "used to distinguish rights or duties between two or more parties from their rights or duties to others." For example, "The constitutional documents of a company constitute a contract between the company and its shareholders, and between the shareholders inter se." In Australian constitutional law, it refers to matters concerning a dispute between the Commonwealth and one or more of the states concerning the extents of their respective powers.
See also
Exclusive right
Social contract
References
Latin legal terminology
Law of Australia | wiki |
Cycads are seed plants that typically have a stout and woody (ligneous) trunk with a crown of large, hard, stiff, evergreen and (usually) pinnate leaves. The species are dioecious, that is, individual plants of a species are either male or female. Cycads vary in size from having trunks only a few centimeters to several meters tall. They typically grow very slowly and live very long. Because of their superficial resemblance, they are sometimes mistaken for palms or ferns, but they are not closely related to either group.
Cycads are gymnosperms (naked-seeded), meaning their unfertilized seeds are open to the air to be directly fertilized by pollination, as contrasted with angiosperms, which have enclosed seeds with more complex fertilization arrangements. Cycads have very specialized pollinators, usually a specific species of beetle. Both male and female cycads bear cones (strobili), somewhat similar to conifer cones.
Cycads have been reported to fix nitrogen in association with various cyanobacteria living in the roots (the "coralloid" roots). These photosynthetic bacteria produce a neurotoxin called BMAA that is found in the seeds of cycads. This neurotoxin may enter a human food chain as the cycad seeds may be eaten directly as a source of flour by humans or by wild or feral animals such as bats, and humans may eat these animals. It is hypothesized that this is a source of some neurological diseases in humans. Another defence mechanism against herbivores is the accumulation of toxins in seeds and vegetative tissues; through horizontal gene transfer, cycads have acquired a family of genes from a microbial organism, most likely a fungus, which gives them the ability to produce an insecticidal toxin.
Cycads all over the world are in decline, with four species on the brink of extinction and seven species having fewer than 100 plants left in the wild.
Description
Cycads have a cylindrical trunk which usually does not branch. However, some types of cycads, such as Cycas zeylanica, can branch their trunks. The apex of the stem is protected by modified leaves called cataphylls. Leaves grow directly from the trunk, and typically fall when older, leaving a crown of leaves at the top. The leaves grow in a rosette form, with new foliage emerging from the top and center of the crown. The trunk may be buried, so the leaves appear to be emerging from the ground, so the plant appears to be a basal rosette. The leaves are generally large in proportion to the trunk size, and sometimes even larger than the trunk.
The leaves are pinnate (in the form of bird feathers, pinnae), with a central leaf stalk from which parallel "ribs" emerge from each side of the stalk, perpendicular to it. The leaves are typically either compound (the leaf stalk has leaflets emerging from it as "ribs"), or have edges (margins) so deeply cut (incised) so as to appear compound. The Australian genus Bowenia and some Asian species of Cycas, like Cycas multipinnata, Cycas micholitzii and Cycas debaoensis, have leaves that are bipinnate, which means the leaflets each have their own subleaflets, growing in the same form on the leaflet as the leaflets grow on the stalk of the leaf (self-similar geometry).
Confusion with palms
Due to superficial similarities in foliage and plant structure, cycads and palms are often mistaken for each other. They also can occur in similar climates. However, they belong to different phyla and as such are not closely related. The similar structure is the product of convergent evolution.
Beyond those superficial resemblances, there are a number of differences between cycads and palms. For one, both male and female cycads are gymnosperms and bear cones (strobili), while palms are angiosperms and so flower and bear fruit. The mature foliage looks very similar between both groups, but the young emerging leaves of a cycad resemble a fiddlehead fern before they unfold and take their place in the rosette, while the leaves of palms are just small versions of the mature frond. Another difference is in the stem. Both plants leave some scars on the stem below the rosette where there used to be leaves, but the scars of a cycad are helically arranged and small, while the scars of palms are a circle that wraps around the whole stem. The stems of cycads are also in general rougher and shorter than those of palms.
Taxonomy
The two extant families of cycads all belong to the order Cycadales, and are the Cycadaceae and Zamiaceae (including Stangeriaceae). These cycads have changed little since the Jurassic in comparison to some other plant divisions. Five additional families belonging to the Medullosales became extinct by the end of the Paleozoic Era.
Based on genetic studies, cycads are thought to be more closely related to Ginkgo than other living gymnosperms. Both are thought to have diverged from each other during the early Carboniferous.
Classification of the Cycadophyta to the rank of family.
Class Cycadopsida Brongniart 1843
Order Cycadales Persoon ex von Berchtold & Presl 1820
Suborder Cycadineae Stevenson 1992
Family Cycadaceae Persoon 1807
Genus Cycas
Suborder Zamiineae Stevenson 1992
Family Zamiaceae Horaninow 1834
subfamily Diooideae Pilg. 1926
Genus Dioon
subfamily Zamioideae Stevenson 1992
Tribe Encephalarteae Miquel 1861
Genus Macrozamia
Genus Lepidozamia
Genus Encephalartos
Tribe Zamieae Miquel 1861
Genus Bowenia
Genus Ceratozamia
Genus Stangeria
Genus Zamia
Genus Microcycas
Extinct cycad genera:
Antarcticycas Middle Triassic, Antarctica (known from the whole plant)
Ctenis Mesozoic-Paleogene, Worldwide (leaf form genus)
Pseudoctenis (leaf form genus)
Fossil record
The oldest probable cycad foliage is known from the latest Carboniferous-Early Permian of South Korea and China. Unambiguous fossils of cycads are known from the Early-Middle Permian onwards. Cycads were generally uncommon during the Permian. Cycads reached their apex of diversity during the Mesozoic. Although the Mesozoic is sometimes called the "Age of Cycads," the foliage of cycads is very similar to other groups of extinct seed plants, such as Bennettitales and Nilssoniales, that are not closely related, and cycads were probably only a minor component of mid-Mesozoic floras, with Bennettitales and Nilsonniales being more abundant than cycads. The oldest records of the modern genus Cycas are from the Paleogene of East Asia. Fossils assignable to Zamiaceae are known from the Cretaceous, with fossils assignable to living genera of the family known from the Cenozoic.
Distribution
The living cycads are found across much of the subtropical and tropical parts of the world. The greatest diversity occurs in South and Central America. They are also found in Mexico, the Antilles, southeastern United States, Australia, Melanesia, Micronesia, Japan, China, Southeast Asia, Bangladesh, India, Sri Lanka, Madagascar, and southern and tropical Africa, where at least 65 species occur. Some can survive in harsh desert or semi-desert climates (xerophytic), others in wet rain forest conditions, and some in both. Some can grow in sand or even on rock, some in oxygen-poor, swampy, bog-like soils rich in organic material. Some are able to grow in full sun, some in full shade, and some in both. Some are salt tolerant (halophytes).
Species diversity of the extant cycads peaks at 17˚ 15"N and 28˚ 12"S, with a minor peak at the equator. There is therefore not a latitudinal diversity gradient towards the equator but towards the Tropic of Cancer and the Tropic of Capricorn. However, the peak near the northern tropic is largely due to Cycas in Asia and Zamia in the New World, whereas the peak near the southern tropic is due to Cycas again, and also to the diverse genus Encephalartos in southern and central Africa, and Macrozamia in Australia. Thus, the distribution pattern of cycad species with latitude appears to be an artifact of the geographical isolation of the remaining cycad genera and their species, and perhaps because they are partly xerophytic rather than simply tropical.
Cultural significance
In Vanuatu, the cycad is known as namele and is an important symbol of traditional culture. It serves as a powerful taboo sign, and a pair of namele leaves appears on the national flag and coat of arms. Together with the nanggaria plant, another symbol of Vanuatu culture, the namele also gives its name to Nagriamel, an indigenous political movement.
See also
Fossil Cycad National Monument, formerly in the U.S. state of South Dakota
Footnotes
References
External links
Palm Trees, Small Palms, Cycads, Bromeliads and tropical plants site with thousands of large, high quality photos of cycads and associated flora. Includes information on habitat and cultivation.
Hill KD (1998–2004) The Cycad Pages, Royal Botanic Gardens Sydney. http://plantnet.rbgsyd.nsw.gov.au/PlantNet/cycad/index.html
Gymnosperm Database: Cycads
Fairchild Tropical Botanic Garden- one of the largest collection of cycads in the world in Florida, U.S.A.
Palm and Cycad Societies of Australia (PACSOA)
The Cycad Society of South Africa
Cycad nitrogen fixation
Cycad toxicity
The Cult of the Cycads, The New York Times Magazine article on cycad collectorship and cycad smuggling
Dioecious plants
Cisuralian first appearances
Extant Permian first appearances | wiki |
South African may relate to:
The nation of South Africa
South African Airways
South African English
South African people
Languages of South Africa
Southern Africa
See also
South Africa (disambiguation)
Language and nationality disambiguation pages | wiki |
Waxed paper (also wax paper, waxpaper, or paraffin paper) is paper that has been made moisture-proof and grease-proof through the application of wax.
The practice of oiling parchment or paper in order to make it semi-translucent or moisture-proof goes back at least to the Middle Ages. Paper impregnated or coated with purified beeswax was widely used throughout the 19th century to retain or exclude moisture, or to wrap odorous products. Gustave Le Gray introduced the use of waxed paper for photographic negatives in 1851. Natural wax was largely replaced for the making of waxed paper (or paraffine paper) after Herman Frasch developed ways of purifying paraffin and coating paper with it in 1876. Waxed paper is commonly used in cooking for its non-stick properties, and wrapping food for storage, such as cookies, as it keeps water out or in. It is also used in arts and crafts.
Food preparation
Waxed paper is not recommended for baking use in an oven, as it will smoke and explode . Parchment paper is better for this use.
In a microwave, waxed paper can be used to prevent splatters by covering the food when microwave cooking. Since the paper is mostly unaffected by microwaves, it will not heat to the point of combustion under normal usage. This makes waxed paper more functional than plastic wrap which will melt at higher temperatures, or aluminium foil which is not safe for use in most microwave ovens.
Other uses
Safety razor blades are traditionally wrapped in waxed paper to make handling them less dangerous.
From the early 1950s to the mid-1990s, waxed paper was used as a common wrapping for sports card packages (O-Pee-Chee, Topps, Donruss, etc.). It was notorious for leaving wax markings on the back card where the waxed paper was heated to be sealed. Waxed paper was used as a way to keep the enclosed piece of bubble gum protected. In the mid-1990s, sports card manufacturers stopped including pieces of bubble gum in packs of sports cards, thus ending the need for waxed paper packs. Plastic (mylar) or other plastic/paper blends were used from then on.
A version of the paper, trademarked Waxtite, was used to protect early packages of Kellogg's cereal.
Waxed paper is also commonly used to attach pattern pieces to fabric while cutting it for sewing. One presses an iron over the waxed paper briefly and attaches it to the cloth, making it easier to trace while cutting.
Waxed paper's particularly high dielectric strength makes it a practical electrical insulator, although modern materials have surpassed and mostly replaced it. Common applications are coil winding separators and capacitor dielectrics, and other applications requiring resilience against a potential difference up to the order of a few thousand volts per layer.
In photography, waxed paper can be used as a light diffuser. Making waxed paper roses was a hobby among Sri Lankan women.
Environmental issues
There are multiple environmental issues concerned with waxed paper. Though it is biodegradable in its unaltered form, oft-applied additives such as petroleum rid it of that quality. Waxed paper also cannot be recycled.
See also
Greaseproof paper
Glassine
Parchment
Parchment paper (baking)
References
External links
Coated paper
Food preparation utensils | wiki |
Asystole (New Latin, from Greek privative a "not, without" + systolē "contraction") is the absence of ventricular contractions in the context of a lethal heart arrhythmia (in contrast to an induced asystole on a cooled patient on a heart-lung machine and general anesthesia during surgery necessitating stopping the heart). Asystole is the most serious form of cardiac arrest and is usually irreversible. Also referred to as cardiac flatline, asystole is the state of total cessation of electrical activity from the heart, which means no tissue contraction from the heart muscle and therefore no blood flow to the rest of the body.
Asystole should not be confused with very brief pauses in the heart's electrical activity—even those that produce a temporary flatline—that can occur in certain less severe abnormal rhythms. Asystole is different from very fine occurrences of ventricular fibrillation, though both have a poor prognosis, and untreated fine VF will lead to asystole. Faulty wiring, disconnection of electrodes and leads, and power disruptions should be ruled out.
Asystolic patients (as opposed to those with a "shockable rhythm" such as coarse or fine ventricular fibrillation, or unstable ventricular tachycardia that is not producing a pulse, which can potentially be treated with defibrillation) usually present with a very poor prognosis. Asystole is found initially in only about 28% of cardiac arrest cases in hospitalized patients, but only 15% of these survive, even with the benefit of an intensive care unit, with the rate being lower (6%) for those already prescribed drugs for high blood pressure.
Asystole is treated by cardiopulmonary resuscitation (CPR) combined with an intravenous vasopressor such as epinephrine (a.k.a. adrenaline). Sometimes an underlying reversible cause can be detected and treated (the so-called "Hs and Ts", an example of which is hypokalaemia). Several interventions previously recommended—such as defibrillation (known to be ineffective on asystole, but previously performed in case the rhythm was actually very fine ventricular fibrillation) and intravenous atropine—are no longer part of the routine protocols recommended by most major international bodies. 1 mg epinephrine by IV every 3–5 minutes is given for asystole.
Survival rates in a cardiac arrest patient with asystole are much lower than a patient with a rhythm amenable to defibrillation; asystole is itself not a "shockable" rhythm. Even in those cases where an individual suffers a cardiac arrest with asystole and it is converted to a less severe shockable rhythm (ventricular fibrillation, or ventricular tachycardia), this does not necessarily improve the person's chances of survival to discharge from the hospital, though if the case was witnessed by a civilian, or better, a paramedic, who gave good CPR and cardiac drugs, this is an important confounding factor to be considered in certain select cases. Out-of-hospital survival rates (even with emergency intervention) are less than 2 percent.
Cause
Possible underlying causes, which may be treatable and reversible in certain cases, include the Hs and Ts.
Hypovolemia
Hypoxia
Hydrogen ions (acidosis)
Hypothermia
Hyperkalemia or hypokalemia
Toxins (e.g. drug overdose)
Cardiac tamponade
Tension pneumothorax
Thrombosis (myocardial infarction or pulmonary embolism)
While the heart is asystolic, there is no blood flow to the brain unless CPR or internal cardiac massage (when the chest is opened and the heart is manually compressed) is performed, and even then it is a small amount. After many emergency treatments have been applied but the heart is still unresponsive, it is time to consider pronouncing the patient dead. Even in the rare case that a rhythm reappears, if asystole has persisted for fifteen minutes or more, the brain will have been deprived of oxygen long enough to cause severe hypoxic brain damage, resulting in brain death or persistent vegetative state.
See also
Agonal heart rhythm
Ictal asystole
References
External links
Medical aspects of death
Medical emergencies
Causes of death
Cardiac arrhythmia | wiki |
Rock Hall Museum can refer to:
Rock Hall (Lawrence, New York), restored house museum
Rock Hall Museum (Rock Hall, Maryland), a museum in Maryland | wiki |
Flow Rider may refer to:
Flo Rida, an American rapper
A participant in the water sport of flowriding
A water ride developed by Wave Loch for flowriding | wiki |
Casualty of war or Casualties of war may refer to:
Entertainment
Casualties of War, a 1989 film directed by Brian De Palma, and starring Michael J. Fox and Sean Penn
Casualties of War (Doctor Who), a BBC Books original novel written by Steve Emmerson
Casualties of War (album), a 2007 album by Hip Hop supergroup Boot Camp Clik
"Casualties of War" by Eric B. & Rakim
See also
Statistics
Casualties of the 2006 Lebanon War
Casualties of the Iraq War
Casualties of the Second Chechen War
Civilian casualties of the War in Afghanistan (2001–present)
List of wars by death toll
Ottoman casualties of World War I
United States military casualties of war
World War I casualties
World War II casualties
Related terms
Casualty (person)
Civilian casualties
Collateral damage
Conflict epidemiology
Fragging
Friendly fire | wiki |
A trailer light converter is an electrical component used for connecting the wiring of a trailer onto a towing vehicle.
See also
Trailer (vehicle)
Tow hitch
Electrical wiring
Trailer connector
References
Trailers | wiki |
Black-and-white (B&W or B/W) images combine black and white in a continuous spectrum, producing a range of shades of grey.
Media
The history of various visual media began with black and white, and as technology improved, altered to color. However, there are exceptions to this rule, including black-and-white fine art photography, as well as many film motion pictures and art film(s).
Photography
Contemporary use
Since the late 1960s, few mainstream films have been shot in black-and-white. The reasons are frequently commercial, as it is difficult to sell a film for television broadcasting if the film is not in color. 1961 was the last year in which the majority of Hollywood films were released in black and white.
Computing
In computing terminology, black-and-white is sometimes used to refer to a binary image consisting solely of pure black pixels and pure white ones; what would normally be called a black-and-white image, that is, an image containing shades of gray, is referred to in this context as grayscale.
See also
dr5 chrome
List of black-and-white films produced since 1966
Monochromatic color
Panchromatic film
Selective color
References
Black-and-white media
Photographic processes | wiki |
Prime Minister's Questions (PMQs, officially known as Questions to the Prime Minister, while colloquially known as Prime Minister's Question Time) is a constitutional convention in the United Kingdom, currently held as a single session every Wednesday at noon when the House of Commons is sitting, during which the prime minister answers questions from members of Parliament (MPs).The Institute for Government has described PMQs as 'the most distinctive and internationally famous feature of British politics.'
History
Although prime ministers have answered questions in parliament for centuries, until the 1880s, questions to the prime minister were treated the same as questions to other ministers of the Crown: asked without notice, on days when ministers were available, in whatever order MPs rose to ask them. In 1881 fixed time-limits for questions were introduced and questions to the prime minister were moved to the last slot of the day as a courtesy to the 72-year-old prime minister at the time, William Ewart Gladstone, so he could come to the Commons later in the day. In 1953, when Winston Churchill (in his late 70s at the time) was prime minister, it was agreed that questions would be submitted on fixed days (Tuesdays and Thursdays).
A Procedure Committee report in 1959 recommended that questions to the prime minister be taken in two fixed-period, 15-minute slots on Tuesday and Thursday afternoons. The recommendations were put into practice under Harold Macmillan during a successful experiment from 18 July 1961 to the end of the session on 4 August. The very first question was delivered by Labour MP Fenner Brockway, asking to which minister the UK ambassador to South Africa would be responsible. In response to the prime minister's answer, Brockway said "May I express our appreciation of this new arrangement for answering Questions and the hope that it will be convenient for the Prime Minister as well as useful to the House?" PMQs were made permanent in the following parliamentary session, with the first of these on 24 October 1961.
The style and culture of PMQs has changed gradually over time. According to former Speaker Selwyn Lloyd, the now famous disorderly behaviour of MPs during PMQs first arose as a result of the personal animosity between Harold Wilson and Edward Heath; before this PMQs had been lively but comparatively civilised. In the past, prime ministers often opted to transfer questions to the relevant minister, and Leaders of the Opposition did not always take their allocated number of questions in some sessions, sometimes opting not to ask any questions at all. This changed during the premiership of Margaret Thatcher, when the prime minister chose not to transfer any questions to other members of her Cabinet, and Labour leader Neil Kinnock began asking more questions than his predecessors. His successor, John Smith, established the precedent of always taking his full allocation of questions.
One of Tony Blair's first acts as prime minister was to replace the two 15-minute sessions with a single 30-minute session on Wednesdays, initially at 3 p.m. but since 2003 at noon. The allocated number of questions in each session for the Leader of the Opposition was doubled from three to six, and the leader of the third-largest party in the Commons was given two questions as opposed to one question beforehand. The first PMQs to use this new format took place on 21 May 1997.
During the Conservative-Liberal Democrat coalition government from 2010 to 2015, Nick Clegg, the leader of the Liberal Democrats, as a member of the government, did not ask questions during PMQs. Instead, the leader of the second largest parliamentary opposition party at the time, Nigel Dodds of the Democratic Unionist Party (DUP), usually asked a single question later in the session, followed by at least one MP from another party such as the Scottish National Party or Plaid Cymru.
Practice
Backbench MPs wishing to ask a question must enter their names on the Order Paper. The names of entrants are then shuffled in a ballot to produce a random order in which they will be called by the Speaker. The Speaker will then call on MPs to put their questions, usually in an alternating fashion: one MP from the government benches is followed by one from the opposition benches. MPs who are not selected may be chosen to ask a supplementary question if they "catch the eye" of the Speaker, which is done by standing and sitting immediately before the prime minister gives an answer.
The leader of the opposition usually asks six questions at PMQs, either as a whole block or in two separate groups of three. If the first question is asked by a government backbencher, the Leader of the Opposition is the second MP to ask questions. If the first question is asked by an opposition MP, this will be followed by a question from a government MP and then by the questions from the Leader of the Opposition. The leader of the third largest parliamentary party (the Liberal Democrats from 1988 to 2010 and the Scottish National Party from 2015) would then ask two questions.
The first formal question on the Order Paper, posed by simply saying "number one, Mr [Madam] Speaker", is usually to ask the Prime Minister "if he [she] will list his [her] engagements for the day". The prime minister usually replies:
In the Prime Minister's absence the Deputy Prime Minister (or First Secretary of State) usually replies:
The reason for such a question is that, historically, the prime minister may be questioned only as to those matters for which they are directly responsible. Such matters are relatively few in number, because many substantive matters are handled by the other Cabinet ministers. By requiring the prime minister to list his or her engagements, the members may then inquire whether the Prime Minister ought to be engaged in some other activity or be taking some other action.
Before listing the day's engagements, the prime minister sometimes extends condolences or offers congratulations after significant events. During the Iraq War, Tony Blair introduced the practice of naming any British military personnel who had been killed in service since the last time he addressed the House. This practice was continued by Blair's successors as prime minister. After this, the MP may ask a supplementary question about any subject that might occupy the Prime Minister's time. Most MPs table the same engagements question and so after it has been asked for the first time, any other MPs who have tabled the same question are simply called to ask an untabled question, meaning that the Prime Minister will not know what questions will be asked.
Occasionally the first question tabled is on a specific area of policy, not the engagements question. This, though, is quite rare as it would allow the Prime Minister to prepare a response in advance; the non-descript question allows some chance of catching him or her out with an unexpected supplementary question.
At times of national or personal tragedy or crisis, PMQs have been temporarily suspended. The last such suspension occurred on 25 February 2009 when the Speaker, at the request of Prime Minister Gordon Brown, suspended the Commons as a mark of respect following the unexpected death of Opposition leader David Cameron's son. Prime Minister's Questions was also suspended following the sudden death of the leader of the Labour Party, John Smith, in 1994.
PMQs has been filmed since 1989, and has been broadcast live since 1990. It is broadcast live in the United Kingdom on the BBC Two and BBC Parliament television channels. It is also broadcast outside the United Kingdom, most notably on the international pay television network BBC World News and the US cable network C-SPAN.
Absence of the Prime Minister or Leader of the Opposition
If the prime minister is away on official business when PMQs is scheduled, their role is usually filled by the deputy prime minister or first secretary of state. If these offices are not occupied or the deputy prime minister is not available, the next most senior member of the Cabinet will receive questions (such as the first secretary of state or the deputy leader of the government party). In the absence of the Leader of the Opposition, the opposition questions will be usually led by the next highest-ranking member of the Shadow Cabinet. From 1992 to 2020, a convention was in place that if either the prime minister or the leader of the Opposition is absent, the other faction would nominate someone to stand, meaning that both sides were stood in for. This precedent was broken at Keir Starmer's first PMQs as leader of the Opposition, as Prime Minister Boris Johnson was hospitalised due to illness with COVID-19. Dominic Raab, as first secretary of state, stood in for Johnson. On 16 September 2020, a member of Starmer's household displayed COVID-19 symptoms, meaning he was self-isolating. As a result, Deputy Leader of the Labour Party and Shadow First Secretary of State Angela Rayner stood in for him putting questions to Johnson. Before 1992, the replacement would often question the prime minister or vice versa. For example, Roy Hattersley, the deputy leader of the Labour Party between 1983 and 1992, stood in for Neil Kinnock facing Margaret Thatcher on 38 occasions between February 1984 and July 1990.
Boris Johnson also became the first prime minister to answer PMQs outside the chamber virtually after having been told to isolate after meeting with Lee Anderson who later tested positive for COVID-19. Keir Starmer became the first leader of the opposition to ask questions remotely a month later after a member of his office staff contracted COVID-19.
During the Cameron–Clegg coalition, Nick Clegg answered 15 PMQs and William Hague twice, all opposite Harriet Harman. Harman had previously in her capacity as the Deputy Leader of the Labour Party and de facto Deputy Prime Minister, answered PMQs for Gordon Brown on 10 occasions between April 2008 and March 2010, all opposite William Hague. During the Second Cameron ministry, George Osborne answered three times, opposite Angela Eagle. In the Second May ministry, Damian Green replied twice, opposite Emily Thornberry, while David Lidington did so six times, opposite Thornberry and Rebecca Long-Bailey. On 2 October 2019, Diane Abbott became the first Black MP to stand for PMQs and ask the six main questions when she challenged the foreign secretary, Dominic Raab, in his capacity as first secretary of state.
Leaders at the dispatch box since 1961
The most high-profile contributors at Prime Minister's Questions are the prime minister and the leader of the Opposition, who speak opposite each other at the dispatch box. Regular, fixed sessions have taken place since 1961, and the list below outlines the prime ministers since 1961 and Opposition party leaders they faced across the floor of the House of Commons, as well as the secondary opposition leader since 1997 (usually the leader of third largest party within the House of Commons):
Media coverage
In the United Kingdom, Prime Minister's Questions is broadcast live via cameras within the Press Gallery inside the House of Commons on domestic national television channels BBC Two, the BBC News Channel, BBC Parliament and Sky News. It is also broadcast live on the national radio station BBC Radio 5 Live.
In the United States, Prime Minister's Questions is broadcast live on the national C-SPAN television network. C-SPAN also has an archive of Prime Minister's Questions coverage going back to 1989 when it was first televised. There is no live radio coverage of Prime Minister's Questions in that country.
Prime Minister's Questions has been spoofed on the American late-night television sketch comedy Saturday Night Live.
In a C-SPAN interview in 1991, shortly after the network started to broadcast PMQs, US President George H. W. Bush said, "I count my blessings for the fact I don't have to go into that pit that John Major stands in, nose-to-nose with the opposition, all yelling at each other."
Worldwide, Prime Minister's Questions is broadcast live via the official British Parliament website parliamentlive.tv, in visual and audio form.
Notes
References
Further reading
Ayesha Hazarika, Tom Hamilton (2018): Punch and Judy Politics. An Insiders´ Guide to Prime Minister´s Questions. Bitback Publishing. ISBN 978-1785901843
External links
Parliament of the United Kingdom
Westminster system
British Prime Minister's Office
Weekly events
Political events in the United Kingdom
Debates in the House of Commons of the United Kingdom
Democracy | wiki |
Stremovo (în ) este un sat în comuna Kărdjali, regiunea Kărdjali, Bulgaria.
Demografie
La recensământul din 2011, populația satului Stremovo era de locuitori. Din punct de vedere etnic, majoritatea locuitorilor (%) erau turci. Pentru % din locuitori nu este cunoscută apartenența etnică.
Note
Sate din regiunea Kărdjali | wiki |
Flyme may refer to:
Flyme (Villa Air), Maldivian airline launched in 2011
FlyMe, former low-cost airline based in Gothenburg, Sweden
Flyme OS, firmware for smartphones by Meizu, based on Android
See also
FlyMex, charter airline based in Mexico
Fly Me, United States–Filipino sexploitation film
Lyme (disambiguation) | wiki |
Frohes Fest (German for "Merry Celebration" in relation to a Christmas celebration) is the second studio album released by the Neue Deutsche Härte band Unheilig. It was released in 2002 in two versions, a standard one-disc edition and a limited two-disc edition (which includes the Tannenbaum EP as a bonus disc).
The album has several traditional German Christmas songs, including the popular "O Tannenbaum" and "Stille Nacht, heilige Nacht".
Track listing
Frohes Fest
Tannenbaum EP
2002 Christmas albums
Christmas albums by German artists
2002 EPs
Unheilig albums
German-language albums | wiki |
Ocean of Fear: Worst Shark Attack Ever is a 2007 made-for-television documentary film that launched the 20th anniversary of the Discovery Channel's Shark Week of 2007. It recounts the sinking of the USS Indianapolis. The show initially aired on July 29, 2007, on the eve of the anniversary of the ship’s sinking in 1945.
The show investigated the shark attacks that occurred when the USS Indianapolis sank. Hundreds of crew that survived were stranded in the water for four days before rescue. In that time many of the survivors endured constant shark attacks. The Discovery Channel hired George H. Burgess, a renowned investigator in shark attacks, to determine, "why the sharks attacked the way they did," and to "investigate the survival strategies of the men in the water, including those who fought the sharks."
Cast and crew
The cast and crew of Ocean of Fear included these people:
Richard Bedser, Director
Peter Miller, Editor
Malcolm Mclean, Director of Photography
Charlotte Wheaton, Line Producer
Richard Dreyfuss, Narrator. Dreyfuss starred in the film Jaws as Matt Hooper.
Antony Edridge, Captain Charles Butler McVay III
Simon Lee Phillips, Marine Giles McCoy
Ryan McCluskey, Ensign Harlan Twible
Philip Rosch, Dr Lewis Haynes
Chris Mack, Cozell Smith
Greg Wohead, Joseph Dronet
Tim Beckmann, Woody James
Philip Bulcock, Jim Newhall
Robert Gill, Father Conway
Ian Colquhoun, A Scottish actor who played the part of a wounded sailor.
David Smallbone, Harry
John Warman, Interviewer / Investigator
Historical basis
Ocean of Fear is centered on the sinking of the USS Indianapolis, which had been torpedoed by Japanese submarine I-58 on July 30, 1945 in the Philippine Sea. Of the estimated 900 men who survived the attack, only 317 were rescued after four days in shark infested waters. The Discovery Channel describes the event as "the worst shark attack in history." Surviving members of the crew attended a special screening in New York City on 18 July 2007. According to the accounts of the surviving crew, most of the men died of either exhaustion, exposure to the elements, or drinking the ocean water, not from shark attacks. However, this incident is still one of the worst cases of sharks feeding on humans.
See also
Shark Week
Blood in the Water
Megalodon: The Monster Shark Lives
Capsized: Blood in the Water
References
External links
USS Indianapolis Survivors Organization
Discovery Channel original programming | wiki |
A cleanup clause is a contractual provision in a loan agreement which provides that all loans must be repaid within a specified period, after which no further loans will be made available to the debtor for a specified "cleanup" period.
It may also refer to revolving line of credit. A lender may require a cleanup period annually, for example a borrower may have to pay down the balance to zero for 30 days.
Contract clauses | wiki |
Identification tag may refer to:
Dog tag, an identification tag used by the military
Microchip implant (animal) or radio identification tag, a scanner-readable microchip implanted into livestock and pets for identification
Pet tag, a small flat tag worn on pets' collars or harnesses
Toe tag, identification tag used on the big toe of a dead person in a morgue
Personal badge | wiki |
The South Two River is a tributary of the Two River of Minnesota, United States. It is part of the Mississippi River watershed.
The South Two River rises east of Albany at the outlet of Schwinghamer Lake and flows northeast past Holdingford. Near Bowlus it joins the North Two River to form the Two River, which continues to the Mississippi.
See also
List of rivers of Minnesota
References
Minnesota Watersheds
USGS Geographic Names Information Service
USGS Hydrologic Unit Map - State of Minnesota (1974)
Rivers of Minnesota
Tributaries of the Mississippi River
Rivers of Stearns County, Minnesota
Rivers of Morrison County, Minnesota | wiki |
Cyperus endlichii is a species of sedge that is native to northern and north eastern areas of Tanzania.
The species was first formally described by the botanist Georg Kükenthal in 1925.
See also
List of Cyperus species
References
endlichii
Plants described in 1925
Taxa named by Georg Kükenthal
Flora of Tanzania | wiki |
Robert or Rob Bell may refer to:
Arts and entertainment
Robert Charles Bell (engraver) (1806–1872), Scottish engraver
Robert Anning Bell (1863–1933), English artist and designer
Robert Bell (artist and curator) (1946–2018), Australian artist and curator
Robert "Kool" Bell (born 1950), American singer, songwriter, and bassist with Kool & the Gang
Robert Bell, musician and bassist with The Blue Nile
Rob Bell (TV presenter) (born 1979), British TV presenter
Authors and editors
Robert Bell (writer) (1800–1867), Irish journalist & editor
Robert Charles Bell (1917–2002), author of several books on board games
Rob Bell (Robert Holmes Bell Jr., born 1970), American author, Christian speaker and pastor
Law
Robert C. Bell (1880–1964), U.S. federal judge
Robert M. Bell (born 1943), Chief Judge of the Maryland Court of Appeals
Robert Holmes Bell (born 1944), U.S. federal judge
Robert D. Bell (born 1967), justice of the Oklahoma Court of Civil Appeals
Politics
Robert Bell (Speaker) (died 1577), British statesman
Robert Bell (died 1639) (1589–1639), English landowner and politician
Robert Bell (Lanark County politician) (1808–1894), Canadian legislator
Robert Bell (Ottawa politician) (1821–1873), Canadian legislator
Robert Bell (Toronto politician) (1827–1883), Orangeman and legislator in Ontario, Canada
Robert Duncan Bell (1878–1953), acting governor of Bombay during the British Raj, 1937
Robert Bell (Minnesota politician) (1926–2014), Minnesota politician
Robert Bell (Australian politician) (1950–2001), Australian politician
Robert Christopher Bell or Chris Bell (born 1959), U.S. Representative from Texas
Rob Bell (Virginia politician) (born 1967), member of the Virginia House of Delegates
Science
Robert Bell (geologist) (1841–1917), Canadian geologist
Robert Bell (Irish geologist) (1864–1934), Northern Irish amateur geologist
Robert E. Bell (1914–2006), American archaeologist
Robert Edward Bell (1918–1992), Canadian nuclear physicist and principal of McGill University
Robert James Bell (born 1975), known as Dr Rob, scientist, and host of Australian children's television programme Scope
Sports
Robert William Bell (1875–1950), England international rugby player
Bunny Bell (Robert Bell, 1911–1988), English footballer who played for Tranmere Rovers and Everton
Bobby Bell (Scottish footballer) (Robert McDicken Bell, 1934–2007), association football player for various English and Scottish clubs
Robert Lee Bell Jr. (Bobby Bell, born 1940), American football player
Rob Bell (baseball) (Robert Allen Bell, born 1977), US Major League/Minor League baseball player
Robert Bell (racing driver) (born 1979), British racing driver
Others
Robert Bell (publisher) (1732–1784), American printer and publisher
Robert Bell (priest) (1808–1883), Archdeacon of Cashel
Robert Bell (physician) (1845–1926), British physician and medical writer
Robert J. T. Bell (1876–1963), Scottish mathematician
Robert Huntley Bell (born 1946), American academic
See also
Bob Bell (disambiguation) | wiki |
.ke is het achtervoegsel van domeinen van websites uit Kenia.
Registratie op het derde niveau onder de volgende secondleveldomeinen:
.co.ke - voor ondernemingen
.or.ke - voor non-profitorganisaties
.ne.ke - voor netwerkorganisaties
.go.ke - voor overheidsinstanties (aanvullende registratie-eisen).
.ac.ke - voor instellingen binnen het hoger onderwijs (aanvullende registratie-eisen).
.sc.ke - voor lager en middelbaar onderwijs (aanvullende registratie-eisen).
Zie ook
Lijst van topleveldomeinen op het internet
ISO 3166-2:KE
Externe link
IANA info
Ke
Media in Kenia | wiki |
The Women's duet event at the 2012 Summer Olympics in London, United Kingdom, took place at the Aquatics Centre from 5 to 7 August.
The preliminary phase consisted of a technical routine and a free routine. The scores from the two routines were added together and the top 12 duets qualified for the final.
The final consisted of one free routine, the score from the final free routine was added to the score from the preliminary technical routine to decide the overall winners.
Schedule
All times are UTC+1
Results
Qualification
Final
References
2012
2012 in women's sport
Women's events at the 2012 Summer Olympics | wiki |
In computing, just-in-time (JIT) compilation (also dynamic translation or run-time compilations) is a way of executing computer code that involves compilation during execution of a program (at run time) rather than before execution. This may consist of source code translation but is more commonly bytecode translation to machine code, which is then executed directly. A system implementing a JIT compiler typically continuously analyses the code being executed and identifies parts of the code where the speedup gained from compilation or recompilation would outweigh the overhead of compiling that code.
JIT compilation is a combination of the two traditional approaches to translation to machine code—ahead-of-time compilation (AOT), and interpretation—and combines some advantages and drawbacks of both. Roughly, JIT compilation combines the speed of compiled code with the flexibility of interpretation, with the overhead of an interpreter and the additional overhead of compiling and linking (not just interpreting). JIT compilation is a form of dynamic compilation, and allows adaptive optimization such as dynamic recompilation and microarchitecture-specific speedups. Interpretation and JIT compilation are particularly suited for dynamic programming languages, as the runtime system can handle late-bound data types and enforce security guarantees.
History
The earliest published JIT compiler is generally attributed to work on LISP by John McCarthy in 1960. In his seminal paper Recursive functions of symbolic expressions and their computation by machine, Part I, he mentions functions that are translated during runtime, thereby sparing the need to save the compiler output to punch cards (although this would be more accurately known as a "Compile and go system"). Another early example was by Ken Thompson, who in 1968 gave one of the first applications of regular expressions, here for pattern matching in the text editor QED. For speed, Thompson implemented regular expression matching by JITing to IBM 7094 code on the Compatible Time-Sharing System. An influential technique for deriving compiled code from interpretation was pioneered by James G. Mitchell in 1970, which he implemented for the experimental language LC².
Smalltalk (c. 1983) pioneered new aspects of JIT compilations. For example, translation to machine code was done on demand, and the result was cached for later use. When memory became scarce, the system would delete some of this code and regenerate it when it was needed again. Sun's Self language improved these techniques extensively and was at one point the fastest Smalltalk system in the world, achieving up to half the speed of optimized C but with a fully object-oriented language.
Self was abandoned by Sun, but the research went into the Java language. The term "Just-in-time compilation" was borrowed from the manufacturing term "Just in time" and popularized by Java, with James Gosling using the term from 1993. Currently JITing is used by most implementations of the Java Virtual Machine, as HotSpot builds on, and extensively uses, this research base.
The HP project Dynamo was an experimental JIT compiler where the 'bytecode' format and the machine code format were the same; the system turned PA-6000 machine code into PA-8000 machine code. Counterintuitively, this resulted in speed ups, in some cases of 30% since doing this permitted optimizations at the machine code level, for example, inlining code for better cache usage and optimizations of calls to dynamic libraries and many other run-time optimizations which conventional compilers are not able to attempt.
In November 2020, PHP 8.0 introduced a JIT compiler.
Design
In a bytecode-compiled system, source code is translated to an intermediate representation known as bytecode. Bytecode is not the machine code for any particular computer, and may be portable among computer architectures. The bytecode may then be interpreted by, or run on a virtual machine. The JIT compiler reads the bytecodes in many sections (or in full, rarely) and compiles them dynamically into machine code so the program can run faster. This can be done per-file, per-function or even on any arbitrary code fragment; the code can be compiled when it is about to be executed (hence the name "just-in-time"), and then cached and reused later without needing to be recompiled.
By contrast, a traditional interpreted virtual machine will simply interpret the bytecode, generally with much lower performance. Some interpreters even interpret source code, without the step of first compiling to bytecode, with even worse performance. Statically-compiled code or native code is compiled prior to deployment. A dynamic compilation environment is one in which the compiler can be used during execution. A common goal of using JIT techniques is to reach or surpass the performance of static compilation, while maintaining the advantages of bytecode interpretation: Much of the "heavy lifting" of parsing the original source code and performing basic optimization is often handled at compile time, prior to deployment: compilation from bytecode to machine code is much faster than compiling from source. The deployed bytecode is portable, unlike native code. Since the runtime has control over the compilation, like interpreted bytecode, it can run in a secure sandbox. Compilers from bytecode to machine code are easier to write, because the portable bytecode compiler has already done much of the work.
JIT code generally offers far better performance than interpreters. In addition, it can in some cases offer better performance than static compilation, as many optimizations are only feasible at run-time:
The compilation can be optimized to the targeted CPU and the operating system model where the application runs. For example, JIT can choose SSE2 vector CPU instructions when it detects that the CPU supports them. To obtain this level of optimization specificity with a static compiler, one must either compile a binary for each intended platform/architecture, or else include multiple versions of portions of the code within a single binary.
The system is able to collect statistics about how the program is actually running in the environment it is in, and it can rearrange and recompile for optimum performance. However, some static compilers can also take profile information as input.
The system can do global code optimizations (e.g. inlining of library functions) without losing the advantages of dynamic linking and without the overheads inherent to static compilers and linkers. Specifically, when doing global inline substitutions, a static compilation process may need run-time checks and ensure that a virtual call would occur if the actual class of the object overrides the inlined method, and boundary condition checks on array accesses may need to be processed within loops. With just-in-time compilation in many cases this processing can be moved out of loops, often giving large increases of speed.
Although this is possible with statically compiled garbage collected languages, a bytecode system can more easily rearrange executed code for better cache utilization.
Because a JIT must render and execute a native binary image at runtime, true machine-code JITs necessitate platforms that allow for data to be executed at runtime, making using such JITs on a Harvard architecture-based machine impossible; the same can be said for certain operating systems and virtual machines as well. However, a special type of "JIT" may potentially not target the physical machine's CPU architecture, but rather an optimized VM bytecode where limitations on raw machine code prevail, especially where that bytecode's VM eventually leverages a JIT to native code.
Performance
JIT causes a slight to noticeable delay in the initial execution of an application, due to the time taken to load and compile the bytecode. Sometimes this delay is called "startup time delay" or "warm-up time". In general, the more optimization JIT performs, the better the code it will generate, but the initial delay will also increase. A JIT compiler therefore has to make a trade-off between the compilation time and the quality of the code it hopes to generate. Startup time can include increased IO-bound operations in addition to JIT compilation: for example, the rt.jar class data file for the Java Virtual Machine (JVM) is 40 MB and the JVM must seek a lot of data in this contextually huge file.
One possible optimization, used by Sun's HotSpot Java Virtual Machine, is to combine interpretation and JIT compilation. The application code is initially interpreted, but the JVM monitors which sequences of bytecode are frequently executed and translates them to machine code for direct execution on the hardware. For bytecode which is executed only a few times, this saves the compilation time and reduces the initial latency; for frequently executed bytecode, JIT compilation is used to run at high speed, after an initial phase of slow interpretation. Additionally, since a program spends most time executing a minority of its code, the reduced compilation time is significant. Finally, during the initial code interpretation, execution statistics can be collected before compilation, which helps to perform better optimization.
The correct tradeoff can vary due to circumstances. For example, Sun's Java Virtual Machine has two major modes—client and server. In client mode, minimal compilation and optimization is performed, to reduce startup time. In server mode, extensive compilation and optimization is performed, to maximize performance once the application is running by sacrificing startup time. Other Java just-in-time compilers have used a runtime measurement of the number of times a method has executed combined with the bytecode size of a method as a heuristic to decide when to compile. Still another uses the number of times executed combined with the detection of loops. In general, it is much harder to accurately predict which methods to optimize in short-running applications than in long-running ones.
Native Image Generator (Ngen) by Microsoft is another approach at reducing the initial delay. Ngen pre-compiles (or "pre-JITs") bytecode in a Common Intermediate Language image into machine native code. As a result, no runtime compilation is needed. .NET Framework 2.0 shipped with Visual Studio 2005 runs Ngen on all of the Microsoft library DLLs right after the installation. Pre-jitting provides a way to improve the startup time. However, the quality of code it generates might not be as good as the one that is JITed, for the same reasons why code compiled statically, without profile-guided optimization, cannot be as good as JIT compiled code in the extreme case: the lack of profiling data to drive, for instance, inline caching.
There also exist Java implementations that combine an AOT (ahead-of-time) compiler with either a JIT compiler (Excelsior JET) or interpreter (GNU Compiler for Java).
JIT compilation may not reliably achieve its goal, namely entering a steady state of improved performance after a short initial warmup period. Across eight different virtual machines, measured six widely-used microbenchmarks which are commonly used by virtual machine implementors as optimisation targets, running them repeatedly within a single process execution. On Linux, they found that 8.7% to 9.6% of process executions failed to reach a steady state of performance, 16.7% to 17.9% entered a steady state of reduced performance after a warmup period, and 56.5% pairings of a specific virtual machine running a specific benchmark failed to consistently see a steady-state non-degradation of performance across multiple executions (i.e., at least one execution failed to reach a steady state or saw reduced performance in the steady state). Even where an improved steady-state was reached, it sometimes took many hundreds of iterations. instead focused on the HotSpot virtual machine but with a much wider array of benchmarks, finding that 10.9% of process executions failed to reach a steady state of performance, and 43.5% of benchmarks did not consistently attain a steady state across multiple executions.
Security
JIT compilation fundamentally uses executable data, and thus poses security challenges and possible exploits.
Implementation of JIT compilation consists of compiling source code or byte code to machine code and executing it. This is generally done directly in memory: the JIT compiler outputs the machine code directly into memory and immediately executes it, rather than outputting it to disk and then invoking the code as a separate program, as in usual ahead of time compilation. In modern architectures this runs into a problem due to executable space protection: arbitrary memory cannot be executed, as otherwise there is a potential security hole. Thus memory must be marked as executable; for security reasons this should be done after the code has been written to memory, and marked read-only, as writable/executable memory is a security hole (see W^X). For instance Firefox's JIT compiler for Javascript introduced this protection in a release version with Firefox 46.
JIT spraying is a class of computer security exploits that use JIT compilation for heap spraying: the resulting memory is then executable, which allows an exploit if execution can be moved into the heap.
Uses
JIT compilation can be applied to some programs, or can be used for certain capacities, particularly dynamic capacities such as regular expressions. For example, a text editor may compile a regular expression provided at runtime to machine code to allow faster matching: this cannot be done ahead of time, as the pattern is only provided at runtime. Several modern runtime environments rely on JIT compilation for high-speed code execution, including most implementations of Java, together with Microsoft's .NET. Similarly, many regular-expression libraries feature JIT compilation of regular expressions, either to bytecode or to machine code. JIT compilation is also used in some emulators, in order to translate machine code from one CPU architecture to another.
A common implementation of JIT compilation is to first have AOT compilation to bytecode (virtual machine code), known as bytecode compilation, and then have JIT compilation to machine code (dynamic compilation), rather than interpretation of the bytecode. This improves the runtime performance compared to interpretation, at the cost of lag due to compilation. JIT compilers translate continuously, as with interpreters, but caching of compiled code minimizes lag on future execution of the same code during a given run. Since only part of the program is compiled, there is significantly less lag than if the entire program were compiled prior to execution.
See also
Binary translation
Common Language Runtime
Dynamic compilation
GNU lightning
LLVM
OVPsim
Self-modifying code
Tracing just-in-time compilation
Transmeta Crusoe
Notes
References
Bibliography
External links
Free Online Dictionary of Computing entry
Mozilla Nanojit : A small, cross-platform C++ library that emits machine code. It is used as the JIT for the Mozilla Tamarin and SpiderMonkey Javascript engines.
Profiling Runtime Generated and Interpreted Code using the VTune Performance Analyzer
Compiler construction
Emulation software
Virtualization | wiki |
The point of sale (POS) or point of purchase (POP) is the time and place at which a retail transaction is completed. At the point of sale, the merchant calculates the amount owed by the customer, indicates that amount, may prepare an invoice for the customer (which may be a cash register printout), and indicates the options for the customer to make payment. It is also the point at which a customer makes a payment to the merchant in exchange for goods or after provision of a service. After receiving payment, the merchant may issue a receipt for the transaction, which is usually printed but can also be dispensed with or sent electronically.
To calculate the amount owed by a customer, the merchant may use various devices such as weighing scales, barcode scanners, and cash registers (or the more advanced "POS cash registers", which are sometimes also called "POS systems"). To make a payment, payment terminals, touch screens, and other hardware and software options are available.
The point of sale is often referred to as the point of service because it is not just a point of sale but also a point of return or customer order. POS terminal software may also include features for additional functionality, such as inventory management, CRM, financials, or warehousing.
Businesses are increasingly adopting POS systems, and one of the most obvious and compelling reasons is that a POS system eliminates the need for price tags. Selling prices are linked to the product code of an item when adding stock, so the cashier merely scans this code to process a sale. If there is a price change, this can also be easily done through the inventory window. Other advantages include the ability to implement various types of discounts, a loyalty scheme for customers, and more efficient stock control. These features are typical of almost all modern ePOS systems.
Terminology
Retailers and marketers will often refer to the area around the checkout instead as the point of purchase (POP) when they are discussing it from the customer's perspective. This is particularly the case when planning and designing the area as well as when considering a marketing strategy and offers.
Some point of sale vendors refer to their POS system as "retail management system" which is a more appropriate term, since this software is not just for processing sales but comes with many other capabilities, such as inventory management, membership system, supplier record, bookkeeping, issuing of purchase orders, quotations and stock transfers, hide barcode label creation, sale reporting and in some cases remote outlets networking or linkage, to name some major ones.
Nevertheless, it is the term POS system rather than retail management system that is in vogue among both end-users and vendors.
The basic, fundamental definition of a POS System, is a system which allows the processing and recording of transactions between a company and their consumers, at the time in which goods and/or services are purchased.
History
Software before the 1990s
Early electronic cash registers (ECR) were controlled with proprietary software and were limited in function and communication capability. In August 1973, IBM released the IBM 3650 and 3660 store systems that were, in essence, a mainframe computer used as a store controller that could control up to 128 IBM 3653/3663 point of sale registers. This system was the first commercial use of client-server technology, peer-to-peer communications, local area network (LAN) simultaneous backup, and remote initialization. By mid-1974, it was installed in Pathmark stores in New Jersey and Dillard's department stores.
One of the first microprocessor-controlled cash register systems was built by William Brobeck and Associates in 1974, for McDonald's Restaurants. It used the Intel 8008, an early microprocessor (forerunner to the Intel 8088 processor used in the original IBM Personal Computer). Each station in the restaurant had its own device which displayed the entire order for a customer — for example, [2] Vanilla Shake, [1] Large Fries, [3] BigMac — using numeric keys and a button for every menu item. By pressing the [Grill] button, a second or third order could be worked on while the first transaction was in progress. When the customer was ready to pay, the [Total] button would calculate the bill, including sales tax for almost any jurisdiction in the United States. This made it accurate for McDonald's and very convenient for the servers and provided the restaurant owner with a check on the amount that should be in the cash drawers. Up to eight devices were connected to one of two interconnected computers so that printed reports, prices, and taxes could be handled from any desired device by putting it into Manager Mode. In addition to the error-correcting memory, accuracy was enhanced by having three copies of all important data with many numbers stored only as multiples of 3. Should one computer fail, the other could handle the entire store.
In 1986, Gene Mosher introduced the first graphical point of sale software featuring a touchscreen interface under the ViewTouch trademark on the 16-bit Atari 520ST color computer. It featured a color touchscreen widget-driven interface that allowed configuration of widgets representing menu items without low level programming. The ViewTouch point of sale software was first demonstrated in public at Fall Comdex, 1986, in Las Vegas Nevada to large crowds visiting the Atari Computer booth. This was the first commercially available POS system with a widget-driven color graphic touch screen interface and was installed in several restaurants in the US and Canada.
In 1986, IBM introduced its 468x series of POS equipment based on Digital Research's Concurrent DOS 286 and FlexOS 1.xx, a modular real-time multi-tasking multi-user operating system.
Modern software (post-1990s)
A wide range of POS applications have been developed on platforms such as Windows and Unix. The availability of local processing power, local data storage, networking, and graphical user interface made it possible to develop flexible and highly functional POS systems. Cost of such systems has also declined, as all the components can now be purchased off-the-shelf.
In 1993, IBM adopted FlexOS 2.32 as the basis of their IBM 4690 OS in their 469x series of POS terminals. This was developed up to 2014 when it was sold to Toshiba, who continued to support it up to at least 2017.
With increased options for commodity hardware and a more competitive market, the 1990s saw increased attention paid to the user interaction between store employees and POS systems. Touchscreens and larger displays became widely available in the 1990s, offering an alternative to limited displays like two-line VFDs used in the IBM 4683. The performance of the employees using the POS devices, a controllable cost for the business, depends upon the ease of learning, ease of use, and level of employee experience with it. Although experienced employees work more quickly with mechanically keyed entry, some systems favoured adopting GUI technology for ease of learning or for ergonomic factors.
The key requirements that must be met by modern POS systems include high and consistent operating speed, reliability, ease of use, remote supportability, low cost, and rich functionality. Retailers can reasonably expect to acquire such systems (including hardware) for about $4000 US (as of 2009) per checkout lane.
Reliability depends not wholly on the developer but at times on the compatibility between a database and an OS version. For example, the widely used Microsoft Access database system had a compatibility issue when Windows XP machines were updated to a newer version of Windows. Microsoft offered no immediate solution. Some businesses were severely disrupted in the process, and many downgraded back to Windows XP for a quick resolution. Other companies utilized community support, for a registry tweak solution has been found for this.
POS systems are one of the most complex software systems available because of the features that are required by different end users. Many POS systems are software suites that include sale, inventory, stock counting, vendor ordering, customer loyalty and reporting modules. Sometimes purchase ordering, stock transferring, quotation issuing, barcode creating, bookkeeping or even accounting capabilities are included. Each of these modules is interlinked if they are to serve their practical purpose and maximize their usability.
For instance, the sale window is immediately updated on a new member entry through the membership window because of this interlinking. Similarly, when a sale transaction is made, any purchase by a member is on record for the membership window to report providing information like payment type, goods purchased, date of purchase and points accumulated. Comprehensive analysis performed by a POS machine may need to process several qualities about a single product, like selling price, balance, average cost, quantity sold, description and department. Highly complex programming is involved (and possibly considerable computer resources) to generate such extensive analyses.
POS systems are designed not only to serve the retail, wholesale and hospitality industries as historically is the case. Currently POS systems are also used in goods and property leasing businesses, equipment repair shops, healthcare management, ticketing offices such as cinemas and sports facilities and many other operations where capabilities such as the following are required: processing monetary transactions, allocation and scheduling of facilities, keeping record and scheduling services rendered to customers, tracking of goods and processes (repair or manufacture), invoicing and tracking of debts and outstanding payments.
Different customers have different expectations within each trade. The reporting functionality alone is subject to so many demands, especially from those in the retail/wholesale industry. To cite special requirements, some business's goods may include perishables and hence the inventory system must be capable of prompting the admin and cashier on expiring or expired products. Some retail businesses require the system to store credit for their customers, credit which can be used subsequently to pay for goods. A few companies expect the POS system to behave like a full-fledged inventory management system, including the ability to provide FIFO (First In First Out) and LIFO (Last In First Out), reports of their goods for accounting and tax purposes.
In the hospitality industry, POS system capabilities can also diverge significantly. For instance, while a restaurant is typically concerned about how the sale window functions: whether it has functionality such as creating item buttons, various discounts, adding a service charge, holding of receipts, queuing, table service as well as takeaways, merging and splitting of a receipt. These capabilities may be insufficient for a spa or slimming center which would require, in addition, a scheduling window with historical records of customers' attendance and their special requirements.
A POS system can be made to serve different purposes to different end users depending on their business processes. Often an off-the-shelf POS system is inadequate for customers. Some customization is required, and this is why a POS system can become very complex. The complexity of a mature POS system extends to remote networking or interlinking between remote outlets and the HQ such that updating both ways is possible. Some POS systems offer the linking of web-based orders to their sale window. Even when local networking is only required (as in the case of a high-traffic supermarket), there is the ever-present challenge for the developer to keep most if not all of their POS stations running. This puts high demand not just on software coding but also designing the whole system covering how individual stations and the network work together, and special consideration for the performance capability and usage of databases. Due to such complexity, bugs and errors encountered in POS systems are frequent.
With regards to databases, POS systems are very demanding on their performance because of numerous submissions and retrievals of data - required for correct sequencing the receipt number, checking various discounts, membership, calculating subtotal, so forth - just to process a single sale transaction. The immediacy required of the system on the sale window such as may be observed at a checkout counter in a supermarket cannot be compromised. This places much stress on individual enterprise databases if there are just several tens of thousands of sale records in the database. Enterprise database Microsoft SQL Server, for example, has been known to freeze up (including the OS) entirely for many minutes under such conditions showing a "Timeout Expired" error message. Even a lighter database like Microsoft Access will slow to a crawl over time if the problem of database bloating is not foreseen and managed by the system automatically. Therefore, the need to do extensive testing, debugging and improvisation of solutions to preempt failure of a database before commercial implementation complicates the development.
POS system accuracy is demanding, given that monetary transactions are involved continuously not only via the sale window but also at the back end through the receiving and inputting of goods into the inventory. Calculations required are not always straightforward. There may be many discounts and deals that are unique to specific products, and the POS machine must quickly process the differences and the effect on pricing. There is much complexity in the programming of such operations, especially when no error in calculation can be allowed.
Other requirements include that the system must have functionality for membership discount and points accumulation/usage, quantity and promotional discounts, mix and match offers, cash rounding up, invoice/delivery-order issuance with outstanding amount. It should enable a user to adjust the inventory of each product based on physical count, track expiry of perishable goods, change pricing, provide audit trail when modification of inventory records is performed, be capable of multiple outlet functionality, control of stocks from HQ, doubling as an invoicing system, just to name some.
It is clear that POS system is a term that implies a wide range of capabilities depending on the end-user requirements. POS system review websites cannot be expected to cover most let alone all the features. Unless one is a developer, it is unrealistic to expect the reviewer to know all the aspects of a POS system. For instance, a POS system might work smoothly on a test database during the review but not when the database grows significantly in size over months of usage. And this is only one among many hidden critical functionality issues of a POS system.
Hardware interface standardization (post-1980s)
Vendors and retailers are working to standardize development of computerized POS systems and simplify interconnecting POS devices. Two such initiatives were OPOS and JavaPOS, both of which conform to the UnifiedPOS standard led by The National Retail Foundation.
OPOS (OLE for POS) was the first commonly adopted standard and was created by Microsoft, NCR Corporation, Epson and Fujitsu-ICL. OPOS is a COM-based interface compatible with all COM-enabled programming languages for Microsoft Windows. OPOS was first released in 1996. JavaPOS was developed by Sun Microsystems, IBM, and NCR Corporation in 1997 and first released in 1999. JavaPOS is for Java what OPOS is for Windows, and thus largely platform independent.
There are several communication ways POS systems use to control peripherals such as:
Logic Controls \ BemaTech
Epson Esc/POS
UTC Standard
UTC Enhanced
AEDEX
ICD 2002
Ultimate
CD 5220
DSP-800
ADM 787/788
HP
There are also nearly as many proprietary protocols as there are companies making POS peripherals. Most POS peripherals, such as displays and printers, support several of these command protocols to work with many different brands of POS terminals and computers.
User interface design
The design of the sale window is the most important one for the user. This user interface is highly critical when compared to those in other software packages such as word editors or spreadsheet programs where the speed of navigation is not so crucial for business performance.
For businesses at prime locations where real estate is at a premium, it can be common to see a queue of customers. The faster a sale is completed the shorter the queue time which improves customer satisfaction, the less space it takes, which benefits shoppers and staff. High-traffic operations such as grocery outlets and cafes need to process sales quickly at the sales counter so the UI flow is often designed with as few popups or other interruptions to ensure the operator isn't distracted and the transaction can be processed as quickly as possible.
Although improving the ergonomics is possible, a clean, fast-paced look may come at the expense of sacrificing functions that are often wanted by end-users such as discounts, access to commission earned screens, membership and loyalty schemes can involve looking at a different function of the POS to ensure the point of sale screen contains only what a cashier needs at their disposal to serve customers.
Cloud-based (post-2000s)
The advent of cloud computing has given birth to the possibility of electronic point of sale (EPOS) systems to be deployed as software as a service, which can be accessed directly from the Internet using any internet browser. Using the previous advances in the communication protocols for POS's control of hardware, cloud-based POS systems are independent from platform and operating system limitations. EPOS systems based in the cloud (most small-business POS today) are generally subscription-based, which includes ongoing customer support.
Compared to regular cash registers (which tend to be significantly cheaper but only process sales and prints receipts), POS systems include automatic updating of the inventory library stock levels when selling products, real-time reports accessible from a remote computer, staff timesheets and a customer library with loyalty features.
Cloud-based POS systems are also created to be compatible with a wide range of POS hardware and sometimes tablets such as Apple's iPad. Thus cloud-based POS also helped expand POS systems to mobile devices, such as tablet computers or smartphones.
These devices can also act as barcode readers using a built-in camera and as payment terminals using built-in NFC technology or an external payment card reader. A number of POS companies built their software specifically to be cloud-based. Other businesses who launched pre-2000s have since adapted their software to evolving technology.
Cloud-based POS systems are different from traditional POS largely because user data, including sales and inventory, are not stored locally, but in a remote server. The POS system is also not run locally, so there is no installation required.
Depending on the POS vendor and the terms of contract, compared to traditional on-premises POS installation, the software is more likely to be continually updated by the developer with more useful features and better performance in terms of computer resources at the remote server and in terms of fewer bugs and errors.
Other advantages of a cloud-based POS are instant centralization of data (important especially to chain stores), ability to access data from anywhere there is internet connection, and lower start-up costs.
Cloud based POS requires an internet connection. For this reason it important to use a device with 3G connectivity in case the device's primary internet goes down. In addition to being significantly less expensive than traditional legacy point of sale systems, the real strength of a cloud based point of sale system is that there are many developers creating software applications for cloud-based POS. Cloud-based POS systems are often described as future proof as new applications are constantly being conceived and built.
A number of noted emerging cloud-based POS systems came on the scene less than a decade or even half a decade back. These systems are usually designed for restaurants, small and medium-sized retail operations with fairly simple sale processes as can be culled from POS system review sites. It appears from such software reviews that enterprise-level cloud-based POS systems are currently lacking in the market. "Enterprise-level" here means that the inventory should be capable of handling a large number of records, such as required by grocery stores and supermarkets. It can also mean that the system software and cloud server must be capable of generating reports such as analytics of sale against inventory for both a single and multiple outlets that are interlinked for administration by the headquarters of the business operation.
POS vendors of such cloud based systems should also have a strong contingency plan for the breakdown of their remote server such as represented by fail-over server support. Sometimes a major data center can fail completely, such as in a fire. On-premises installations are therefore sometimes seen alongside cloud-based implementation to preempt such incidents, especially for businesses with high traffic. The on-premises installations may not have the most up-to-date inventory and membership information.
For such contingency, a more innovative though highly complex approach for the developer is to have a trimmed down version of the POS system installed on the cashier computer at the outlet. On a daily basis the latest inventory and membership information from the remote server is automatically updated into the local database. Thus should the remote server fail, the cashier can switch over to the local sale window without disrupting sales. When the remote server is restored and the cashier switches over to the cloud system, the locally processed sale records are then automatically submitted to the remote system, thus maintaining the integrity of the remote database.
Although cloud-based POS systems save the end-user startup cost and technical challenges in maintaining an otherwise on-premises installation, there is a risk that if the cloud-based vendor closes down it may result in more immediate termination of services for the end-user compared to the case of a traditional full on-premises POS system where it can still run without the vendor.
Another consideration is that a cloud-based POS system actually exposes business data to service providers - the hosting service company and the POS vendor which have access to both the application and database. The importance of securing critical business information such as supplier names, top selling items, customer relationship processes cannot be underestimated given that sometimes the few key success factors or trade secrets of a business are actually accessible through the POS system. This security and privacy concern is an ongoing issue in cloud computing.
Retail industry
The retail industry is one of the predominant users of POS terminals. A retail point of sale system typically includes a cash register (which in recent times comprises a computer, monitor, cash drawer, receipt printer, customer display and a barcode scanner) and the majority of retail POS systems also include a debit/credit card reader. It can also include a conveyor belt, checkout divider, weight scale, integrated credit card processing system, a signature capture device and a customer pin pad device. While the system may include a keyboard and mouse, more and more POS monitors use touch-screen technology for ease of use, and a computer is built into the monitor chassis for what is referred to as an all-in-one unit. All-in-one POS units liberate counter space for the retailer. The POS system software can typically handle a myriad of customer based functions such as sales, returns, exchanges, layaways, gift cards, gift registries, customer loyalty programs, promotions, discounts and much more. POS software can also allow for functions such as pre-planned promotional sales, manufacturer coupon validation, foreign currency handling and multiple payment types.
The POS unit handles the sales to the consumer but it is only one part of the entire POS system used in a retail business. "Back-office" computers typically handle other functions of the POS system such as inventory control, purchasing, receiving and transferring of products to and from other locations. Other typical functions of a POS system are: store sales information for enabling customer returns, reporting purposes, sales trends and cost/price/profit analysis. Customer information may be stored for receivables management, marketing purposes and specific buying analysis. Many retail POS systems include an accounting interface that "feeds" sales and cost of goods information to independent accounting applications.
A multiple point of sale system used by big retailers like supermarkets and department stores has a far more demanding database and software architecture than that of a single station seen in small retail outlets. A supermarket with high traffic cannot afford a systemic failure, hence each point of sale station should not only be very robust both in terms of software, database and hardware specifications but also designed in such a way as to prevent causing a systemic failure - such as may happen through the use of a single central database for operations.
At the same time updating between multiple stations and the back end administrative computer should be capable of being efficiently performed, so that on one hand either at the start of the day or at any time each station will have the latest inventory to process all items for sale, while on the other hand at the end of the day the back end administrative computer can be updated in terms of all sale records.
This gets even more complicated when there is a membership system requiring real-time two-way updating of membership points between sale stations and the back end administrative computer.
Retail operations such as hardware stores, lumber yards, electronics stores and so-called multifaceted superstores need specialized additional features compared to other stores. POS software in these cases handles special orders, purchase orders, repair orders, service and rental programs as well as typical point of sale functions. Rugged hardware is required for point of sale systems used in outdoor environments. Wireless devices, battery powered devices, all-in-one units, and Internet-ready machines are typical in this industry.
Recently new applications have been introduced, enabling POS transactions to be conducted using mobile phones and tablets. According to a recent study, mobile POS (mPOS) terminals are expected to replace the contemporary payment techniques because of various features including mobility, upfront low cost investment and better user experience.
In the mid-2000s, the blind community in the United States engaged in structured negotiations to ensure that retail point of sale devices had tactile keypads. Without keys that can be felt, a blind person cannot independently enter her or his PIN. In the mid-2000s retailers began using "flat screen" or "signature capture" devices that eliminated tactile keypads. Blind people were forced to share their confidential PIN with store clerks to use their debit and other PIN-based cards. The blind community reached agreement with Walmart, Target, CVS and eight other retailers that required real physical keys so blind people could use the devices.
Physical configuration
Early stores typically kept merchandise behind a counter. Staff would fetch items for customers to prevent the opportunity for theft and sales would be made at the same counter. Self-service grocery stores such as Piggly Wiggly, beginning in 1916, allowed customers to fetch their own items and pass the point of sale enroute to the exit.
Many stores have a number of checkout stations. Some stations may have an automated cashier (self-checkout). Express lanes might limit the type of payment, or number or type of goods, to expedite service. If each checkout station has a separate queue, customers have to guess which line will move the fastest, to minimize their wait times. They are often frustrated to be wrong or be stuck behind another customer who encounters a problem or who takes excessive time to check out. Some stores use a single, much longer but faster-moving line, that is served by multiple registers, which produces the same average wait time, but reduces the frustration and variance in wait time from person to person. Regardless of the configuration, checkout lines usually pass by impulse buy items to grab the attention of otherwise idle customers.
Hospitality industry
Hospitality point of sale systems are computerized systems incorporating registers, computers and peripheral equipment, usually on a computer network to be used in restaurants, hair salons or hotels. Like other point of sale systems, these systems track sales, labor, payroll and can generate records used in accounting and bookkeeping. They may be accessed remotely by restaurant corporate offices, troubleshooters and other authorized parties.
Point of sale systems have revolutionized the restaurant industry, particularly in the fast food sector. In the most recent technologies, registers are computers, sometimes with touch screens. The registers connect to a server, often referred to as a "store controller" or a "central control unit". Printers and monitors are also found on the network. Additionally, remote servers can connect to store networks and monitor sales and other store data.
Typical restaurant POS software is able to create and print guest checks, print orders to kitchens and bars for preparation, process credit cards and other payment cards, and run reports. In addition, some systems implement wireless pagers and electronic signature-capture devices.
In the fast food industry, displays may be at the front counter, or configured for drive-through or walk-through cashiering and order taking. Front counter registers allow taking and serving orders at the same terminal, while drive-through registers allow orders to be taken at one or more drive-through windows, to be cashiered and served at another. In addition to registers, drive-through and kitchen displays are used to view orders. Once orders appear they may be deleted or recalled by the touch interface or by bump bars. Drive-through systems are often enhanced by the use of drive-through wireless (or headset) intercoms. The efficiency of such systems allows decreased service times and increased efficiency of orders.
Another innovation in technology for the restaurant industry is wireless POS. Many restaurants with high volume use wireless handheld POS to collect orders which are sent to a server. The server sends required information to the kitchen in real time. Wireless systems consist of drive-through microphones and speakers (often one speaker will serve both purposes), which are wired to a "base station" or "center module." This, in turn, will broadcast to headsets. Headsets may be an all-in-one headset, or one connected to a belt pack.
With the development of the mobile technology, Cloud-based POS system are also put forward to increase the efficiency of some restaurants, integrated with some latest software services such as scan QR code to order by customers themselves. It leads to a new style of offline restaurants dine-in.
In hotels, POS software allows for transfer of meal charges from dining room to guest room with a button or two. It may also need to be integrated with property management software.
Newer, more sophisticated systems are departing from the central database "file server" type system and going to what is called a "cluster database". This eliminates any crashing or system downtime that can be associated with the back office file server. This technology allows 100% of the information to not only be stored, but also pulled from the local terminal, thus eliminating the need to rely on a separate server for the system to operate.
Tablet POS systems popular for retail solutions are now available for the restaurant industry. Initially these systems were not sophisticated and many of the early systems did not support a remote printer in the kitchen. Tablet systems today are being used in all types of restaurants including table service operations. Most tablet systems upload all information to the Internet so managers and owners can view reports from anywhere with a password and Internet connection. Smartphone Internet access has made alerts and reports from the POS very accessible. Tablets have helped create the Mobile POS system, and Mobile POS applications also include payments, loyalty, online ordering, table side ordering by staff and table top ordering by customers. Regarding the payments, mobile POS can accept all kinds of payment methods from contactless cards, EMV chip-enabled cards, and mobile NFC enabled cards. Mobile POS (AKA mPOS) is growing quickly with new developers entering the market almost on a daily basis.
With the proliferation of low-priced touchscreen tablet computers, more restaurants have implemented self-ordering through a tablet POS placed permanently on every table. Customers can browse through the menu on the tablet and place their orders which are then sent to the kitchen. Most restaurants that have iPad self-order menus include photos of the dishes so guests can easily choose what they want to order. This apparently improves service and saves manpower on the part of the restaurant. However this depends on how intelligently the system has been programmed to be.
As a case in point, some self-ordering systems not requiring staff assistance may not properly recognize a subsequent order from the same customer at a table. As a result, the customer is left waiting and wondering why his second order of food and drink is not being served.
Another example of how intelligent the system can be, is whether an order that has been placed but not yet been processed by the kitchen can be modified by the customer through the tablet POS. For such an unprocessed order the customer should be given the option to easily retrieve the order and modify it on the tablet POS. When the order is being processed this function should be automatically disabled.
Self-ordering systems are not always free completely from intervention by the staff and for some good reasons. For example, some restaurants require that items selected by the customers be attended to and can only be placed by the waiter who has the password required to do so. This prevents fake orders - such as may be entered by playful kids - and subsequent dispute on the items ordered. If alcoholic beverages are ordered, it is necessary for the waiter to verify the customer's age before sending the order.
The technical specifications for implementing such self-ordering system are more demanding than a single cashier-controlled POS station. On the software and hardware side each tablet on a customer table has to be networked to the cashier POS station and the kitchen computer so that both are continually updated on orders placed. The common database that serves this network must also be capable of serving many concurrent users - cashier, customers, kitchen and perhaps a drink bar.
It is to be noted by developers that some databases such as popularly-used Microsoft Access may have the specifications that it is capable of usage by multiple concurrent users. However, under the stress of a POS system, they can fail miserably resulting in constant errors and corruption of data.
POS systems are often designed for a variety of clients, and can be programmed by the end users to suit their needs. Some large clients write their own specifications for vendors to implement. In some cases, POS systems are sold and supported by third-party distributors, while in other cases they are sold and supported directly by the vendor.
The selection of a restaurant POS system is critical to the restaurant's daily operation and is a major investment that the restaurant's management and staff must endure for many years. The restaurant POS system interfaces with all phases of the restaurant operation, and with everyone that is involved with the restaurant including guests, suppliers, employees, managers and owners. The selection of a restaurant POS system is a complex process that should be undertaken by the restaurant owner and not delegated to an employee. The purchase process can be summarized in three steps: Design, Compare and Negotiate. The Design step requires research to determine which restaurant POS features are needed for the restaurant operation. With this information the restaurant owner or manager can Compare various restaurant POS solutions to determine which POS systems meet their requirements. The final step is to Negotiate the price, payment terms, included training, initial warranty and ongoing support costs.
Accounting forensics
POS systems record sales for business and tax purposes. Illegal software dubbed "zappers" can be used on POS devices to falsify these records with a view to evading the payment of taxes.
In some countries, legislation is being introduced to make cash register systems more secure. For example, the French treasury is estimated to be failing to collect approximately €14 billion of VAT revenue each year. The Finance Bill of 2016 was intended to address some of this loss by making it compulsory for taxpayers to operate on “secure systems”. Therefore, from 1 January 2018, all retail businesses in France are required to record customer payments using certified secure accounting software or cash register systems.
A certified cash register system must provide for the (i) incommutable, (ii) security and (iii) storage and archiving of data. All businesses required to comply must obtain a certificate from the cash register system provider which certifies that the system meets these requirements. This is because VAT taxpayers may need to provide a certificate to the tax authorities showing that their cash management system fulfills the new requirements.
If the business cannot provide this certificate to the tax authorities, they may be fined. And, if the tax authorities can demonstrate fraudulent use of the system, both the business and the software provider can face tax penalties, fines, and criminal sanctions. Certification can be obtained either from: a body accredited by the French Accreditation Committee (Comité français d’accréditation or COFRAC) or the software provider of the cash register system.
Security
Despite the more advanced technology of a POS system as compared to a simple cash register, the POS system is still vulnerable to employee theft through the sales window. A dishonest cashier at a retail outlet can collude with a friend who pretends to be an ordinary customer. During checkout, the cashier can bypass scanning certain items or enter a lower quantity for some items thus profiting from the "free" goods.
The ability of a POS system to void a closed sale receipt for refund purpose without needing a password from an authorized superior also represents a security loophole. Even a function to issue a receipt with a negative amount which can be useful under certain circumstances, can be exploited by a cashier to easily lift money from the cash drawer.
To prevent such employee theft, it is crucial for a POS system to provide an admin window for the supervisor or administrator to generate and inspect a daily list of sale receipts, especially pertaining to the frequency of cancelled receipts before completion, refunded receipts and negative receipts. This is one effective way to alert the company to any suspicious activity - such as a high number of cancelled sales by a certain cashier - that may be occurring, and to take monitoring action.
To further deter employee theft, the sales counter should also be equipped with a closed-circuit television camera pointed at the POS system to monitor and record all activities.
At the back end, price and other changes like discounts to inventory items through the administration module should be secured with passwords provided to trusted administrators. Any changes made should also be logged and capable of being subsequently retrieved for inspection.
The sale records and inventory are important to the business because they provide useful information to the company in terms of customer preferences, customer membership particulars, what are the top selling products, who are the vendors and what margins the company is getting from them, the company monthly total revenue and cost, among others.
It is important that reports on these matters generated at the administrative back end be restricted to trusted personnel. The database from which these reports are generated should be secured via passwords or via encryption of data stored in the database to prevent copying or tampering.
Despite all such precautions, the POS system can never be entirely watertight in security from internal misuse if a clever, dishonest employee knows how to exploit many of its otherwise useful capabilities.
News reports on POS system hacking show that hackers are more interested in stealing credit card information than anything else. The ease and advantage offered by the ability of a POS system to integrate credit card processing thus have a downside. In 2011, hackers were able to steal credit card data from 80,000 customers because Subway's security and POS configuration standards for PCI compliance - which governs credit card and debit card payment systems security - were "directly and blatantly disregarded" by Subway franchisees.
In June 2016, several hundred of Wendy's fast food restaurants had their POS systems hacked by illegally installed malware. The report goes on to say that "the number of franchise restaurants impacted by these cyber security attacks is now expected to be considerably higher than the 300 restaurants already implicated" and that the "hackers made hundreds of thousands of fraudulent purchases on credit and debit cards issued by various financial institutions after breaching Wendy's computer systems late last year".
These exploits by hackers could only be made possible because payment cards were processed through the POS system allowing the malware to either intercept card data during processing or steal and transmit unencrypted card data that is stored in the system database.
In April 2017, security researchers identified critical vulnerabilities in point of sale systems developed by SAP and Oracle and commented, “POS systems are plagued by vulnerabilities, and incidents occurred because their security drawbacks came under the spotlight.” If successfully exploited, these vulnerabilities provide a perpetrator with access to every legitimate function of the system, such as changing prices, and remotely starting and stopping terminals. To illustrate the attack vector, the researchers used the example of hacking POS to change the price of a MacBook to $1. The security issues were reported to the vendor, and a patch was released soon after the notification. Oracle confirmed security bug affects over 300,000 Oracle POS Systems
In some countries, credit and debit cards are only processed via payment terminals. Thus one may see quite a number of such terminals for different cards cluttering up a sale counter. This inconvenience is offset by the fact that credit and debit card data is far less vulnerable to hackers, unlike when payment cards are processed through the POS system where security is contingent upon the actions taken by end-users and developers.
With the launch of mobile payment, particularly Android Pay and Apple Pay in 2015, it is expected that because of its greater convenience coupled with good security features, this would eventually eclipse other types of payment services including the use of payment terminals. For mobile payment to go fully mainstream, mobile devices like smartphones that are NFC-enabled must first become universal. This would be a matter of several years from the time of this writing (2017) as more and more models of new smartphones are expected to become NFC-enabled for such a purpose. For instance, iPhone 6 is fully NFC-enabled for mobile payment while iPhone 5 and older models are not. The aforesaid disastrous security risks connected with processing payment card usage through a POS system would then be greatly diminished.
See also
EFTPOS
ISO 8583
JavaPOS
Point of sale companies category
Comparison of shopping cart software: may or may not work together with EPOS software
Point of sale display
Point of Sale Malware
Payment terminal
POSXML
Self checkout
Standard Interchange Language
UnifiedPOS
Back-office Software
Windows Embedded Industry (formerly Windows Embedded POSReady), an operating system largely used on POS machines
Split payment
References
External links
Retail store elements
Payment systems
Retail point of sale systems
American inventions
20th-century inventions | wiki |
The Sendai Girls Junior Championship is a women's professional wrestling championship, the secondary singles championship in Sendai Girls' Pro Wrestling. As of , , overall there have been a total of eight reigns shared between eight different champions, and two vacancies. The title is currently vacant.
Reigns
Combined reigns
References
External links
Sendai Girls' Pro Wrestling official site, in Japanese
Purolove site, in German
Women's professional wrestling championships
Professional wrestling in Japan | wiki |
Governor Oxenden may refer to:
George Oxenden (governor) (1620–1669), 1st Governor of the Bombay Presidency
Sir Henry Oxenden, 3rd Baronet (1645–1709), English Deputy-Governor of Bombay of East India Company from 1677 to 1681 | wiki |
Diurnal ("daily") may refer to:
General
Diurnal cycle, any pattern that recurs daily
Diurnality, the behavior of animals and plants that are active in the daytime
Diurnal phase shift, a phase shift of electromagnetic signals
Diurnal temperature variation, a cycle of daily temperature change
Astronomy
Diurnal arc, the time (expressed in right ascension) that it takes a planet etc. to move from its rising to its setting point
Diurnal motion, the apparent motion of stars around the Earth
Astrology
Diurnal chart, a chart for a given date, based on the natal chart
Diurnal planet, a planet in a sect for which the Sun is above the horizon
Diurnal sign, a sign in the zodiac
See also
Diurnality
Salisbury Diurnal | wiki |
In particle physics, a radiative process refers to one elementary particle emitting another and continuing to exist. This typically happens when a fermion emits a boson such as a gluon or photon.
See also
Bremsstrahlung
Radiation
Particle physics | wiki |
Unissued stock is stock that has been authorized in a company's charter, but has never been sold. It differs from Treasury stock (in the UK, Treasury shares, as treasury stock means something else), in that treasury stock has been issued, and bought back by the company, whereas unissued stock has never been issued.
Corporate law | wiki |
A consumer is person or group that uses products.
Consumer or Consumers may also refer to:
Consumer (food chain), an organism that lives off other organisms
Consumers Distributing, a retail store chain
The Consumers, a punk rock band active from 1977 to 1978 | wiki |
Dark Fields may refer to:
Darkfield, Logitek's name for a type of sensor used on an optical mouse
Dark field, a type of illumination used in dark field microscopy
The Dark Fields , a 2001 novel by Alan Glynn
Dark Fields (2006 film), a horror film directed by Mark McNabb and Al Randall
Dark Fields (2009 film), a horror film directed by Douglas Shulze
The Dark Fields, the original name of the 2011 film Limitless, based on the novel
Dark Fields (album), a 1997 album by Show of Hands
See also
Dark (disambiguation)
Field (disambiguation) | wiki |
Popcorn seasoning is any ingredient used to add flavor to popcorn. In the United States, popcorn seasoning is mass-produced by several companies for commercial and consumer use. Popcorn seasonings may be used to enhance the flavor of popcorn, and some are used to add a buttery flavor to popcorn. Significant amounts are often used to ensure the adequate flavoring of popcorn, due to popcorn's low density. It is also sometimes utilized to add coloring to popcorn. Some popcorn seasoning may contain monosodium glutamate. Some specialty products exist in unique flavors, such as chocolate and bubble gum. Some popcorn seasoning products may be referred to as popcorn salt.
Some oils used to cook popcorn contain popcorn seasonings mixed within the oil, and may be referred to as popcorn seasoning oils or liquid popcorn seasoning.
Since the 1960s, American movie theaters have commonly used the seasoning Flavacol–made up of salt, butter flavoring, and artificial colors–to enhance their popcorn.
Formulation
Dry popcorn seasoning may be finely granulated to enable even dispersion when placed upon popcorn. Common homemade popcorn seasoning ingredients include salt and melted butter.
Popcorn seasoning is sometimes used within machines that are utilized to produce large quantities of popcorn for consumer purchase.
In the 1950s in the United States, many commercial oil-based popcorn seasonings were produced with a coconut oil base, and also utilized artificial coloring.
See also
Butter salt
Condiment
List of dried foods
List of spice mixes
Molly McButter
References
Further reading
Condiments
Dried foods
Popcorn | wiki |
The Marangál na Dalit ng̃ Katagalugan (English title: Honorable Hymn of the Tagalog Nation/People) is a song of the Philippine Revolution composed in November 1896 by Julio Nakpil at the request of Andres Bonifacio as the anthem of the revolutionary Tagalog Republic. However, this nascent revolutionary government was displaced and superseded by a succession of revolutionary governments headed by Emilio Aguinaldo and the composition known today as Lupang Hinirang became the national anthem of the Republic of the Philippines.
History
Nakpil was requested by Andres Bonifacio to compose a national anthem for his conceptual Filipino nation-state as realized through the Katipunan as its revolutionary government, of which he was the President ("Pangulo"). This concept of the Filipino nation was called the Haring Bayang Katagalugan ("Sovereign Tagalog Nation/People", or "Sovereign Nation of the Tagalog People"), also known as the Republika ng Katagalugan ("Republic of the Tagalog Nation/People", simplified in other languages as "Tagalog Republic"), with "sovereign nation" and "republic" being used interchangeably, and "Tagalog" etc. being used in place of "Filipino", etc.
The song was first performed in Bonifacio's camp in Balara in November 1896. The form chosen by Nakpil, the dalit, was traditionally a sung prayer or supplication. Later, Nakpil sent a copy of the Himno Nacional to Bonifacio, who was then in Cavite, together with a letter to him dated January 30, 1897. Bonifacio acknowledged this in a reply letter dated February 13.
However, in an ensuing power struggle involving Bonifacio and the Magdalo and Magdiwang factions of the Katipunan in Cavite, the Katipunan revolutionary government was displaced and superseded by a succession of revolutionary governments headed by Emilio Aguinaldo, and Bonifacio was eventually executed by that government on May 7.
Lyrics
The following lyrics follow Nakpil's handwritten notes, marked with "Balara - Nov. 1896. The English translations are tentative and for the purposes of the article.
Nakpil's reconstructed sheet music indicates further repetition of some words, thus:
Nakpil's notes include other verses, also marked as "Balara - Nov. 1896", but without sheet music, so it is unclear if these are additional, draft, or variant verses, or what words are supposed to repeat.
Replacement
Nakpil recalled decades later that even after Bonifacio's death, the song was still being played in Cavite and Laguna as late as 1898. After the Aguinaldo was chosen over Bonifacio as President in the Tejeros Convention elections held on March 22, 1897. On June 5, after Julian Felipe went to Aguinaldo bearing a letter of introduction from Mariano Trias, he was asked to compose a different march to be played at the declaration of independence ceremonies planned for June 11. On that date, after Felipe played the march he had drafted, tentatively titled Marcha Filipina Magdalo, on the piano for Aguinaldo and other top revolutionary leaders and, after discussion between them and other top generals, Aguinaldo accepted Felipe's composition as the Marcha Nacional Filipina. Felipe's piece, with added lyrics derived from the Spanish-language poem Filipinas by Jose Palma from 1899, is still the current official national anthem under the title Lupang Hinirang ("Chosen Land").
Later years
In 1903, Nakpil extended the anthem as an instrumental tribute to Jose Rizal under the title “Salve, Patria” ("Hail, Fatherland"). The only surviving copies of the original score were destroyed in 1945, during the Battle of Manila. The version which survives today was reconstructed by Nakpil from memory as a piece for piano years later.
Its use was likely revived by Macario Sakay, a compatriot of Bonifacio and Nakpil who revived and continued the Katipunan and the Tagalog Republic from 1902 to 1906, years after the end of Aguinaldo's final Republic (the "First Philippine Republic").
The piece has described by historians as "very solemn, almost mournful" while other historians have opined that the lyrics and music do not quite seem to match each other, but the music is less obviously derivative of foreign pieces compared to Felipe's composition.
In modern media
The song appears in a 1993 biopic of Macario Sakay, titled Sakay''.
The song was recorded by the folk music duo Inang Laya in 1996 but only the first verse.
See also
Lupang Hinirang
Dalit (poem)
Tagalog Republic
References
External links
Bonifacio's April 1897 letter to Nakpil thanking him for the Himno Nacional
Tagalog-language songs
Historical national anthems
1896 songs
Asian anthems
Philippine anthems | wiki |
The 1868 United States presidential election in Ohio was held on November 3, 1868 as part of the 1868 United States presidential election. State voters chose 21 electors to the Electoral College, who voted for president and vice president.
Ohio was won by the Republican Party candidate, Ohio native and General Ulysses S. Grant, who won the state with 54.00% of the popular vote. The Democratic Party candidate, Horatio Seymour, garnered 46.00% of the popular vote.
Results
Results by county
See also
United States presidential elections in Ohio
References
Ohio
1868
1868 Ohio elections | wiki |
Infrared is electromagnetic radiation with longer wavelengths than those of visible light, extending from the nominal red edge of the visible spectrum.
Infrared may also refer to:
Infrared spectroscopy, a subset of spectroscopy
Consumer infrared, as used in wireless remote controls, keyboards, and other devices
Infrared (record label), a UK-based record label
"Infra-Red" (Placebo song)
Infra-Red (Three Days Grace song)
"Infrared" (Pusha T song)
"Infrared" (Vybz Kartel & Masicka song)
See also
Infrared Data Association (IrDA) | wiki |
L’aérogramme ou diagramme de Refsdal est un graphique représentant un profil vertical de l’atmosphère. Il a pour abscisse et pour ordonnée avec la température et la pression.
Notes et références
Voir aussi
Article connexe
Glossaire de la météorologie
Circulation atmosphérique | wiki |
In cooking, coddled eggs are eggs that have been cracked into a ramekin or another small container, placed in a water bath or bain-marie and gently or lightly cooked just below boiling temperature. They can be partially cooked, mostly cooked, or hardly cooked at all (as in the eggs used to make Caesar salad dressing, which is only slightly poached for a thicker end-product). Poached eggs are similar to coddled eggs but cooked by submersion in water, rather than being placed in a water bath.
Method
The egg is broken into an , porcelain cup or ramekin with a lid, and cooked using a bain-marie. The inside of the egg coddler is first buttered to flavor the egg and allow it to be removed more easily. A raw egg (sometimes with additional flavorings) is broken into the coddler, which is then placed in a pan of near-boiling water for 7 to 8 minutes to achieve a solid white and runny yolk.
Manufacture
Coddlers may have been manufactured by Royal Worcester since at least the 1890s. Many companies now make egg coddlers, some of which are collectors’ items.
Possible risks
Coddled eggs do not always reach temperatures required to sterilize potential contaminants and pathogens.
In the United States, eggs have around a 1 in 30,000 risk of exposure to salmonella and other bacteria. Using fresh eggs that have been washed and kept refrigerated, or pasteurized eggs is recommended to minimize the risk. According to the United States Department of Health and Human Services, eggs should be cooked until both the white and the yolk are firm, and the water temperature should be . Children, the elderly, and persons with compromised immune systems are advised against eating lightly cooked eggs because of the risk of exposure to salmonella infection.
In the UK, according to the NHS, raw or lightly cooked eggs bearing the lion mark can be safely eaten by pregnant women, infants and children, and the elderly.
See also
Boiled egg
Egg cup
List of egg dishes
Poached egg
References
External links
Collectors' information
Egg dishes | wiki |
Points West may refer to:
BBC Points West, the BBC's regional TV news programme for the West of England
Points West (film), a 1929 silent film western | wiki |
Jean Kirkpatrick may refer to:
Jeane Kirkpatrick (1926–2006), American diplomat
Jean Kirkpatrick (sociologist) (1926–2006), who founded Women For Sobriety | wiki |
Cat Dreams is a 2009 children's picture book by Ursula K. Le Guin and illustrated by S D Schindler. It is about a cat that has a nap, dreams of fantastical kitty things, like raining mice, is startled awake, then finds a nice human lap to snooze on.
Reception
Kirkus Reviews wrote of Cat Dreams "Easy rhyming text will be quickly memorized, but the realistic, full-bleed watercolor illustrations will keep youngsters turning the pages.", and concluded "A perfect fit for storytimes on cats, naps and dreams."
Cat Dreams has also been reviewed by Publishers Weekly, Common Sense Media, Children's Book and Media Review, Booklist, School Library Journal, and Horn Book Guides.
References
External links
Library holdings of Cat Dreams
2009 children's books
American picture books
Books about cats
Works by Ursula K. Le Guin
Orchard Books books | wiki |
Cactus fries are a food originating in the Southwestern United States. They are typically prepared from prickly pear cactus segments which have had the needles removed, and which are then sliced, battered, and deep fried.
See also
Nopales
Cuisine of the Southwestern United States
Fried cassava
French fries
Fried sweet potato
References
Further reading
Cuisine of the Southwestern United States
Deep fried foods | wiki |
Destry Rides Again is a 1939 western film starring James Stewart.
Destry Rides Again may also refer to:
Destry Rides Again (1932 film), starring Tom Mix
Destry Rides Again (Randy Weston album)
Destry Rides Again (Roland Hanna album)
Destry Rides Again (musical), by Harold Rome and Leonard Gershe
Destry Rides Again (novel), by Max Brand
See also
Destry (disambiguation) | wiki |
The Peugeot Type 125 was a midrange car from Peugeot produced in 1910. In less than a year of production, 150 units were built at their Audincourt factory. The car was billed as sporty; top speed from the 1.1 L engine was .
References
Peugeot Car Models from 1910-1949
Histomobile page on Type 125
Type 125
Cars introduced in 1910 | wiki |
Hookerian is an eponymous adjective and may refer to:
Joseph Dalton Hooker (1817–1911), British botanist and explorer
Richard Hooker (1554–1600), Anglican priest and influential theologian | wiki |
"Cutting off one's nose to spite one's face" is an expression used to describe a needlessly self-destructive overreaction to a problem: "Don't cut off your nose to spite your face" is a warning against acting out of pique, or against pursuing revenge in a way that would damage oneself more than the object of one's anger.
Origins
It was not uncommon in the Middle Ages for a person to cut off the nose of another for various reasons, including punishment from the state, or as an act of revenge. In particular, the English Saint Ebbe was said to have severed her own nose to dissuade violation by Viking raiders. Cognitive scientist Steven Pinker notes that the phrase may have originated from this practice, as at this time "cutting off someone's nose was the prototypical act of spite."
The expression has since become a blanket term for (often unwise) self-destructive actions motivated purely by anger or desire for revenge. For example, if a man was angered by his wife, he might burn down their house to punish her; however, burning down her house would also mean burning down his, along with all of their possessions.
In the 1796 edition of Francis Grose's Classical Dictionary of the Vulgar Tongue, "He cut off his nose to be revenged of his face" is said to apply to "one who, to be revenged on his neighbor, has materially injured himself."
See also
Rhinectomy, the removal of the nose
Appeal to spite
Inequity aversion
References
English-language idioms
Proverbs | wiki |
Diospyros pyrrhocarpa is a tree in the family Ebenaceae. It grows up to tall. Twigs dry greyish to brownish. Inflorescences bear up to three flowers. The fruits are roundish to ovoid-ellipsoid, up to in diameter. The specific epithet is from the Greek meaning "fiery red or yellow fruits". Habitat is lowland mixed dipterocarp forests. D. pyrrhocarpa is found from the Andaman and Nicobar Islands to the Philippines. In Cebu and Negros Regions in the Philippines, the tree is commonly known as Kunalum.
References
pyrrhocarpa
Plants described in 1861
Flora of the Andaman Islands
Flora of the Nicobar Islands
Trees of Thailand
Trees of Malesia
Taxa named by Friedrich Anton Wilhelm Miquel | wiki |
Notices of violation are issued from Code Enforcement by local cities or towns when properties may be contrary to local codes and regulation, vehicles are substandard, inoperable or may have constituted a public nuisance. The ordinances under which violation notices or statements are performed vary from one country to another and between cities within a country or states.
Buildings
When property owners or tenants are found as violating some code rules depending on area, they are given notices of violation, following which they have thirty to sixty days to correct the violation in question. Should the violation not be addressed or corrected within these time periods, or should other violations happen, the properties may be (though are not always) condemned by the Code Regulations, by health department or by building inspections workers/officials. This is when businesses (better known as commercial property), school/college properties or residences (houses, apartments, townhouses, etc.) are marked not suitable for human occupancy, not safe or dangerous.
Many cities and countries perform a violation notice on construction projects if/when they are not safe, are without a (proper) permit by which the construction can be approved or if the site contractors violate the license for which they are performing the construction work, for which case these licenses and permits may be revoked (taken away).
Vehicles
Vehicles that are substandard, not operable or are obsolete are classified by some regions as "junk". Other reasons are vehicles still operable at the time, although abandoned for prolonged times, traffic citations/tickets and other violations. Abandoned vehicles, although still operable, are often issued violation notices; if/when owners of these vehicles do not comply to get the vehicles removed from questionable areas, they can (will sometimes) be towed. Sometimes, however, prior warnings will not be sent to vehicle owners.
See also
Condemned property
Local ordinance
Property management
Salvage title
References
Legal doctrines and principles
Ordinance | wiki |
A leakage occurs when fluid is lost through a leak.
Leakage may also refer to:
Leakage (chemistry), a process in which material is lost through holes or defects in containers
Leakage (economics)
Carbon leakage or emissions leakage, whereby another country increases its greenhouse gas emissions in response to a unilateral climate policy
Leakage (electronics)
Crosstalk (electronics), also known as Leakage, where signals are picked up by an unintended device
Spill (audio), where audio from one source is picked up by a microphone intended for a different source
Leakage (machine learning)
Leakage (semiconductors)
Leakage (retail)
Leakage effect, the loss of tourist revenue from a country
Memory leak, in computer science
Spectral leakage, in signal processing
Similar uses
Fecal incontinence
Urinary incontinence
See also
Leak (disambiguation)
ja:リーク電流 | wiki |
Superstar Dogs: Countdown to Crufts is a game show that aired on Channel 4 from 17 February to 6 March 2014 and was hosted by John Barrowman.
External links
2014 British television series debuts
2014 British television series endings
Channel 4 game shows
Crufts | wiki |
Freezing rain is rain maintained at temperatures below freezing by the ambient air mass that causes freezing on contact with surfaces. Unlike a mixture of rain and snow or ice pellets, freezing rain is made entirely of liquid droplets. The raindrops become supercooled while passing through a sub-freezing layer of air hundreds of meters above the ground, and then freeze upon impact with any surface they encounter, including the ground, trees, electrical wires, aircraft, and automobiles. The resulting ice, called glaze ice, can accumulate to a thickness of several centimeters and cover all exposed surfaces. The METAR code for freezing rain is FZRA.
A storm that produces a significant thickness of glaze ice from freezing rain is often referred to as an ice storm. Although these storms are not particularly violent, freezing rain is notorious for causing travel problems on roadways, breaking tree limbs, and downing power lines from the weight of accumulating ice. Downed power lines cause power outages in affected areas while accumulated ice can also pose significant overhead hazards. It is also known for being extremely dangerous to aircraft since the ice can effectively 'remould' the shape of the airfoil and flight control surfaces. (See atmospheric icing.)
Mechanism
Freezing rain is often associated with the approach of a warm front, when subfreezing air (temperatures at or below freezing) is trapped in the lowest levels of the atmosphere while warm air advects is aloft. This happens, for instance, when a low pressure system moves from the Mississippi River Valley toward the Appalachian Mountains and the Saint Lawrence River Valley of North America during the cold season, with a strong high pressure system sitting further east. This setup is known as cold-air damming, and is characterized by very cold and dry air at the surface within the region of high pressure. The warm air from the Gulf of Mexico is often the fuel for freezing precipitation.
Freezing rain develops when falling snow encounters a layer of warm air aloft, typically around the level, causing the snow to melt and become rain. As the rain continues to fall, it passes through a layer of subfreezing air just above the surface and cools to a temperature below freezing (). If this layer of subfreezing air is sufficiently deep, the raindrops may have time to freeze into ice pellets (sleet) before reaching the ground. However, if the subfreezing layer of air at the surface is very shallow, the rain drops falling through it will not have time to freeze and they will hit the ground as supercooled rain. When these supercooled drops make contact with the ground, power lines, tree branches, aircraft, or anything else below , a portion of the drops instantly freezes, forming a thin film of ice, hence freezing rain. The specific physical process by which this occurs is called nucleation.
Observations
Surface observations by manned or automatic stations are the only direct confirmation of freezing rain. One can never see directly freezing rain, rain, or snow on any type of weather radar, whether Doppler or conventional. It is possible, however, to estimate the area covered by freezing rain with radar indirectly.
The intensity of the radar echoes (reflectivity) is proportional to the form (water or ice) of the precipitation and its diameter. In fact, rain has much stronger reflective power than snow, but its diameter is much smaller. So, the reflectivity of rain coming from melted snow is only slightly higher. In the layer where the snow is melting, however, the wet flakes still have a large diameter and are coated with water, so the radar returns are much stronger.
The presence of this brightband indicates the presence of a warm layer above ground where snow can melt. This could be producing rain on the ground or the possibility of freezing rain if the temperature is below freezing. The accompanying image shows how such an artifact can be located with a cross-section through radar data. The height and slope of the brightband will give clues to the extent of the region where melting is occurring. Then, it is possible to associate this clue with surface observations and numerical prediction models to produce output such as the ones seen on television weather programs, where radar echoes are shown distinctly as rain, mixed, and snow precipitations.
Effects
At ground level
Freezing rain often causes major power outages by forming glaze ice. When the freezing rain or drizzle is light and not prolonged, the ice formed is thin and usually causes only minor damage (relieving trees of their dead branches, etc.). When large quantities accumulate, however, it is one of the most dangerous types of winter hazard. When the ice layer exceeds approximately , tree limbs with branches heavily coated in ice can break off under the enormous weight and fall onto power lines. Windy conditions and lightning, when present, will exacerbate the damage. Power lines coated with ice become extremely heavy, causing support poles, insulators and lines to break. The ice that forms on roadways makes vehicle travel dangerous. Unlike snow, wet ice provides almost no traction, and vehicles will slide even on gentle slopes. Because freezing rain does not hit the ground as an ice pellet (called "sleet") but still as a rain droplet, it conforms to the shape of the ground, or object such as a tree branch or car. This makes one thick layer of ice, often called "glaze".
Freezing rain and glaze ice on a large scale is called an ice storm. Effects on plants can be severe, as they cannot support the weight of the ice. Trees may snap as they are dormant and fragile during winter weather. Pine trees are also victims of ice storms as their needles will catch the ice, but not be able to support the weight. In February 1994, a severe ice storm caused over $1 billion in damage in the Southern United States, primarily in Mississippi, Tennessee, Alabama, and Western North Carolina, especially the Appalachians. One particularly severe ice storm struck eastern Canada and northern parts of New York and New England in the North American ice storm of 1998.
Aircraft
Freezing rain is considered to be an extreme hazard to aircraft, as it causes very rapid structural icing, freezing necessary components. Most helicopters and small airplanes lack the necessary deicing equipment to fly in freezing rain of any intensity, and heavy freezing rain can overwhelm even the most sophisticated deicing systems on large airplanes. Icing can increase an aircraft's weight but not typically enough to cause a hazard. The main danger comes from the ice changing the shape of its airfoils.
This will reduce lift and increase drag. All three factors increase stalling speed and reduce aircraft performance, making it very difficult to climb or even maintain altitude.
An aircraft can most easily avoid freezing rain by moving into warmer air. Under most conditions, this would require aircraft to descend, which it can usually do safely and easily even with a moderate accumulation of structural ice. However, freezing rain is accompanied by a temperature inversion aloft, meaning that aircraft are required to climb to move into warmer air, which is a potentially difficult and dangerous task with even a small amount of ice accumulation.
For example, in 1994, American Eagle Flight 4184 encountered heavy air traffic and poor weather that postponed the arrival of this flight at Chicago's O'Hare International Airport, where it was to have landed en route from Indianapolis, Indiana. The ATR-72, a twin-engine turboprop carrying 68 people, entered a holding pattern southeast of O'Hare. As the plane circled, supercooled cloud droplets, freezing rain or freezing drizzle formed a ridge of ice on the upper surface of its wings, eventually causing the aircraft's autopilot to suddenly disconnect and the pilots to lose control. The ATR disintegrated on impact with a field below; all passengers and crew were killed.
See also
Black ice
Freezing drizzle
Hail
Ice pellets
Ice storm
Icing conditions
List of ice storms
References
External links
Graphic Explanation
Precipitation
Weather hazards
Snow or ice weather phenomena
Road hazards | wiki |
Teachers are people who help students to acquire knowledge, competence or virtue.
Teachers may also refer to:
Arts, entertainment and media
Film and television
Teachers (film), a 1984 American satirical comedy-drama
Teachers TV, a British TV channel and website 2005–2011
Teachers (British TV series), a comedy-drama series 2001–2004
Teachers (2006 TV series), an American version of the British series
Teachers (2016 TV series), an American sitcom on TV Land based on a web series
"Teachers", an episode of New Girl (season 4)
Music
"Teachers", a song by Leonard Cohen from the 1967 album Songs of Leonard Cohen
"Teachers", a song by Daft Punk from the 1997 album Homework
"Teachers", a song by P.O.D. from the 2006 album Testify
Other uses
Teacher's Highland Cream, a blended Scotch whisky
Teachers Building Society is a mutual British financial institution
Teachers RFC, a Bermudan rugby club
See also
Educators (TV series)
Ontario Teachers' Pension Plan, or Ontario Teachers'
Teacher (disambiguation) | wiki |
Duck soup may refer to:
Duck Soup (1933 film), starring the Marx Brothers
Duck Soup (1927 film), featuring Laurel and Hardy
Oritang, Korean duck soup
"Duck Soup", an episode of Even Stevens
"Duck Soup", a song by Baba Brooks
Noble, a production studio whose previous names include "Duck Soup Producktions" and "Duck Soup Studios"
See also
Czernina, Polish duck blood soup
Duck soup noodles, Malaysian
Duck Soup to Nuts, a 1944 Warner Bros. animated short
"Duct Soup", a 1997 episode of the television series Red Dwarf | wiki |
Corn poppy with lamb () is a dish commonly used by Aegean coast and Aegean Sea islands Turkish and Greek people.
Ingredients typically include corn poppy, lamb chunks, onion, juice of half a lemon, flour, butter and salt.
See also
List of lamb dishes
References
External links
https://archive.today/20140126120707/http://www.sihirliyemek.com/kuzu-etli-gelincik-tarifi/
Greek cuisine
Turkish cuisine
Lamb dishes
Cretan cuisine | wiki |
Word of Honor may refer to:
Word of Honor (1981 film), a 1981 film co-written by David Ackles
Word of Honor (novel), a 1985 novel by Nelson DeMille
Word of Honor (2003 film), a 2003 film starring Don Johnson and based on the DeMille novel
Word of Honor (TV series), a 2021 streaming Chinese TV series adaption of the novel Tian Ya Ke by Priest
See also
Palabra de honor, a 1939 Argentine comedy film by Luis Cesar Amadori
Palabra de honor (album), a 1984 album by Luis Miguel Gallego Basteri | wiki |
Lucy Beale is a fictional character from the BBC soap opera EastEnders. The character was played by Eva Brittin-Snell (from 1993 to 1996), Casey Anne Rothery (from 1996 until 2004), Melissa Suffield (from 2004 to 2010), and Hetti Bywater (from 2012 to 2015). Lucy was introduced in December 1993 as the baby daughter of Ian (Adam Woodyatt) and Cindy Beale (Michelle Collins). She was the twin sister of Peter Beale (Thomas Law/Ben Hardy/Dayle Hudson), and had three half siblings, older brother Steven Beale (Aaron Sidwell), younger sister Cindy Williams (Mimi Keene) and younger brother Bobby Beale (Eliot Carrington/Clay Milner Russell).
From 2004, when the role was recast to the older Suffield, storylines featuring Lucy focused upon her teenage rebellion. In 2010, Suffield left EastEnders, after she was allegedly axed due to "unruly behaviour." On 14 November 2011, it was announced Lucy would be returning in 2012 with Bywater taking over the role. She returned on 12 January 2012. Her storylines have included teenage pregnancy, abortion, cheating in her exams, struggling to cope when Ian has a mental breakdown and runs away, feuding, taking over Ian's businesses, and multiple relationships, including an affair with her best friend's father, Max Branning (Jake Wood).
On 21 February 2014, it was announced that Lucy would be murdered, starting a dark chapter for the Beale family and a whodunit storyline that would run until the show's 30th anniversary in February 2015 when the identity of the murderer would be revealed. The "Who Killed Lucy Beale?" storyline was billed as the soap's biggest whodunnit, and was EastEnders''' biggest marketing campaign to date. Bywater returned in a flashback episode on 19 February 2015 to explore unanswered questions about the night Lucy died. The same episode revealed that Lucy's 10-year-old half-brother Bobby was her killer, after 10 months of secrecy regarding her demise. The character reappeared as hallucinations in 2019 and 2020, portrayed by a body double and using archive footage.
Storylines
1993–2010
Lucy and her twin brother Peter Beale (Francis Brittin-Snell) are born in December 1993, to Ian (Adam Woodyatt) and Cindy Beale (Michelle Collins). The twins are born on the same day Ian's father, Pete Beale (Peter Dean), dies in a car accident with his girlfriend, Rose Chapman (Petra Markham). In 1996, Cindy hires a hitman to kill Ian, but he survives and fearing she will be arrested, she goes on the run with Peter and her eldest son, Steven Beale (Stuart Stevens), and she is unable to get Lucy. Ian hires a private investigator, who locates Cindy in Italy and Ian, his stepfather Phil Mitchell (Steve McFadden) and Phil's brother Grant Mitchell (Ross Kemp), go to Italy and take Steven and Peter (now played by Stuart Stevens). Cindy returns to Walford with her boyfriend, Nick Holland (Dominic Taylor), and she wins custody of Steven, Lucy and Peter (now played by Joseph Shade), but is arrested for attempted murder and is remanded in custody, so the children stay with Ian. In November 1998, Cindy dies of complications after giving birth to hers and Nick's daughter Cindy Williams (Eva Wortley and Cydney Parker), who is Lucy's younger half-sister. Steven, Lucy and Peter grow up with various stepmothers: Mel Healy (Tamzin Outhwaite) splits from Ian straight after marrying him in Millennium Eve due to her finding out Lucy was not sick with cancer as initially feared and in July 2003, Ian's wife Laura Beale (Hannah Waterman) gives birth to hers and Ian's son, Bobby Beale (Kevin Curran), who is Lucy and Peter's younger half-brother, and they separate when Ian denies paternity, but she later dies in March 2004. Ian meets Jane Collins (Laurie Brett) at a fair, but Lucy and Peter struggle to bond with her due to Ian's past relationships, but are persuaded by Ian's aunt, Pauline Fowler (Wendy Richard) to give her a chance. Lucy and Peter are both picked on by twins Demi Miller (Shana Swash) and Darren Miller (Charlie G. Hawkins).
Progressing into her teens, Lucy becomes rebellious—stealing, smoking, drinking alcohol, lying, playing truant from school, being surly to Ian and Jane, and taking an interest in boys. Things worsen when Ian employs Craig Dixon (Rory Jennings) in his chip shop. Lucy and Craig are attracted to one another, and despite Craig being five years older than Lucy, they begin dating. Craig is a bad influence on Lucy, and upon discovering their relationship, Ian warns Craig away. Lucy runs away with Craig, unperturbed that he carries a gun and assaulted Patrick Trueman (Rudolph Walker). However, when he tries to press her for sex, she panics and returns to Walford, telling Ian that Craig assaulted Patrick. Craig is arrested for attempted murder; however, Lucy keeps his gun, which he had stashed in her bag.
In 2007, Lucy is contacted by a person claiming to be Cindy. It transpires that Steven (now played by Aaron Sidwell) was posing as Cindy to terrorise and kidnap Ian, blaming him for Cindy's death. Steven holds Ian hostage for weeks, while moving in with the Beale family. The situation ends when Steven accidentally shoots Jane with Craig's gun. Ian gets Steven psychiatric help and allows him to live with them, to Lucy's delight. In early 2008, Ian and Lucy argue about a destructive house party Lucy had in his absence. Lucy slaps Ian and he slaps her back; and she runs away. The Beales search for Lucy for weeks, before it is revealed that Steven has been hiding her, turning her against Ian and convincing her to move to France, so he can usurp her place in Ian's affections. Ian discovers the truth and convinces Lucy to come home and banishes Steven.
Lucy stays with Jane's brother Christian Clarke (John Partridge) briefly, has a relationship with an older boy, Olly Greenwood (Bart Edwards), decides to take the contraceptive pill and engages in blackmail to earn money. Lucy has sex with Leon Small (Sam Attwater) and gets pregnant; unaware of this, Leon dumps Lucy for Zsa Zsa Carter (Emer Kenny). Not ready to be a mother, Lucy asks Jane to adopt her baby and Jane agrees. Ian, however, is concerned that Jane manipulated Lucy to allow her to adopt the baby as she cannot have one of her own. He makes Lucy watch a video of a woman giving birth and persuades her to have an abortion. They agree to tell Jane that she miscarried.
Lucy receives excellent grades in her GCSEs, having paid Adam Best (David Proud) to help her cheat. When the school question the authenticity of her exam results, she admits that she cheated and is told to retake her final year. Lucy decides not to and goes to her grandmother Bev Williams (Diane Langton) in Devon.
2012–2014
Lucy returns to Walford for the funeral of Pat Evans (Pam St Clement) and is angry to find that Ian is engaged to Mandy Salter (Nicola Stapleton). Lucy dislikes Mandy and tries to stop her marrying Ian. She sabotages Mandy's wedding dress, sets her up, and tries to poison Bobby (now played by Alex Francis) against her, all unsuccessfully. Having noticed Whitney Dean's (Shona McGarty) attraction to Tyler Moon (Tony Discipline), Lucy causes trouble by upset by sleeping with him. Lucy and Whitney are antagonistic but eventually make amends because they are both friends with Lauren Branning (Jacqueline Jossa). On Mandy and Ian's wedding day, Lucy gives Ian an ultimatum: her or Mandy. She is distraught when he chooses Mandy but Mandy is unhappy and admits she does not love Ian and leaves. Ian has a nervous breakdown and disappears, leaving Bobby with Lucy. Following her father's disappearance, Lucy struggles to keep his businesses afloat and has trouble with Derek Branning (Jamie Foreman) who repeatedly steals money from the café and chip shop. Derek's son, Joey Branning (David Witts), tricks Derek to give him money, which he returns to Lucy. Joey and Lucy like each other and star dating. Lucy decides she does not need Ian and renames the café "Cindy's". Lauren discovers that Ian is homeless but Lucy refuses to see him. Lauren's parents bring Ian back to Walford, and when Lucy opens the door, she slams it in his face. However, Sharon Rickman (Letitia Dean) convinces her to give Ian another chance and she agrees, providing that the businesses and properties are transferred to her so she will never be in that situation again. Ian agrees and signs the agreement. He eventually returns to work and Lucy promises to be there for him. Joey kisses Whitney, angering her. Eventually, Lauren urges Whitney to tell Lucy, and Lucy breaks up with Joey briefly. They reconcile, despite Joey not having feelings for her. Joey says that it will never work and leaves her. Lucy worries when she finds a lump in her breast, but it is benign.
Joey starts dating Lauren, his cousin. Lucy is jealous and splits them up by spiking Lauren's drink with vodka, making Joey believe that Lauren is drinking excessively. Lucy is opposed to Ian's plans to open a restaurant, worried he cannot cope. When Lauren applies for a job as a waitress, Lucy deliberately sets Joey up as Lauren's test customer, hoping she will fail. Although Whitney is chosen, she withdraws her application so Lauren gets the job but is soon sacked. Lucy provokes Lauren, who punches Lucy and smashes the café window. Lauren is arrested but Lucy decides not to press charges. Ian steals cheques from the business account to pay for his new restaurant; Lucy believes that Janine Butcher (Charlie Brooks) supplied the extra money. When she discovers the truth, she has a vicious row with Ian, which is interrupted by Peter's (now played by Ben Hardy) return to Walford.
Lucy gets upset when Joey insists that they do not have a future together and Ian takes advantage of this, manipulating her into signing a contract that gives control of the businesses back to him. When Lucy discovers what has happened, she and Ian argue and she goes to work for Janine. Lucy develops a rivalry with her colleague, Danny Pennant (Gary Lucy), and they use dirty tactics against each other to gain commission on their pay. However, Lucy discovers Danny is squatting in one of Janine's flats as he is homeless. Danny pleads with Lucy not to tell and she agrees but warns him that she now has power over him. Lucy is pleased when Ian invites his girlfriend, Denise Fox (Diane Parish) and Lucy's half-sister Cindy (now played by Mimi Keene) to move in. Lucy and Lauren start up their own letting agents company, called LB Lettings.
Lucy is revealed to be having a sexual affair with her best friend Lauren's father, Max. After secretly texting each other, Lucy meets with Max in a hotel and the pair sleep together. Lucy also has sex with newcomer Lee Carter (Danny-Boy Hatchard). He wants to begin a relationship but Lucy is more interested in Max who she continues to sleep with in secret. Lucy and Max have sex in a hotel again, but when Lee compliments her looks, Lucy realises that Lee cares about her and Max is just using her for sex. Lucy is devastated, however, when she sees Lee kissing Whitney. Lucy is shaken when Max shows her photographs of them kissing outside the flats and reveals that someone e-mailed them to him. Lucy swears she knows nothing about it. Ian begins to show how proud he is of Lucy and her new business, infuriating Cindy. Lucy later spots Lee and Whitney kissing again but meets him in the restaurant to have sex. Lucy breaks down, however, and Lee comforts her. Unbeknownst to Lee and Lucy, Jake sees them through the window. Cindy tells Ian that Lucy was arrested for shoplifting in Devon and is hiding something in her jewellery box. Worried, Ian and Jane open the box, and to their horror, find a bag of cocaine. After being chased out of the restaurant, Lucy angrily shouts at Ian, saying she wishes he was not her father. Ian tells Lucy that she is his favourite child but Peter overhears and leaves in shock. Lucy follows but cannot find him. Shortly after, Lucy gets a text message and leaves the Square.
The next day, Lucy's body is found on Walford Common after having been murdered the previous night. That afternoon, police officers DC Emma Summerhayes (Anna Acton) and DS Cameron Bryant (Glen Wallace) tell Ian that Lucy is dead. Ian identifies her body at Walford mortuary. Her funeral takes place, and the police continue to investigate her murder. When Peter proposes to Lauren, he confesses that he supplied drugs to Lucy. After the proposal, Lee finds a video that proves Lauren has given a false alibi.
Max, his daughters and Emma are invited for Christmas Day at Ian's. Cindy receives, as a present from a mysterious sender, Lucy's jewellery box. Who it could be and the reason why worries the Beales and their guests. Emma, no longer on the case officially, soon discovers who she thinks killed Lucy and confronts the killer. Before reporting them, Emma is accidentally run over and dies from a brain bleed. Lauren uses Emma's case notes and becomes suspicious as to who killed her. Lauren discovers Lucy was killed at home and writes this in a card to Ian and Jane. Peter, after being told by Lauren that Lucy was killed at home, accuses Ian and Jane but Ian believes Jane is responsible, but realises that her story does not add up and that she is covering for Bobby (now played by Eliot Carrington). Jane explains that she found Lucy on the floor in the living room with Bobby holding her jewellery box—having hit her over the head—and that Bobby does not know he killed her. The Beales agree to keep it a secret from him. It also transpires that Lucy had been writing a letter to Ian shortly before Bobby hit her, telling her father to wake her when he returns home, that she has resolved to change and she loves him. Bobby gave the letter to Cindy, who gave it to Ian.
In 2016, over two years after Lucy's murder, Bobby is convicted of the crime and sentenced to three years imprisonment. Bobby (now portrayed by Clay Milner Russell) is released after three years, in 2019, and struggles with his guilt; in the Beale house, he begins seeing visions of Lucy.
Casting and development
As a baby and toddler, Lucy was played by Eva Brittin-Snell for the first three years. Casey Anne Rothery took over the role in 1996 and played Lucy for nearly eight years. In August 2004 it was announced that Rothery, along with Joseph Shade, who played Lucy's twin brother Peter Beale, had been axed from EastEnders as producers were looking to mature the characters. The actors were told days before filming their final scenes that they would be leaving. Rothery's family were said to be furious, with a family friend telling The People, "It was a bolt out of the blue. She is devastated and has been in tears. To be booted out without any warning is a real kick in the teeth. She rang her dad in tears. He phoned soap bosses to complain and they admitted they could have handled things a lot better." An EastEnders spokesperson said, "Joseph and Casey Anne have done a fantastic job. They're written into EastEnders history and everyone will miss them." Casey's final episode aired on 21 September 2004. It was later announced that young actress Melissa Suffield would take over the role, and she first appeared on 28 October 2004. In March 2010, Suffield said that she wished "people didn't think I was like [Lucy] in real life because I'm not."
In 2010, Lucy was involved in a pregnancy storyline, on which Suffield said "I'm excited about the storyline because it's something brilliant to get my teeth into. I love playing 'bitch Lucy', but you'll soon see a completely different side to her." The storyline involved Lucy offering to have the baby so that it could be brought up by Ian and her step mother Jane (Laurie Brett). An Albert Square insider said: "Lucy's run rings around her father Ian and stepmum Jane for years. Lucy falls pregnant just at a time when Jane's desperate for a child of her own. Jane believes that the baby could be the solution to her dream of having a baby with Ian.
In May 2010 it was announced that Suffield had been axed from the show allegedly due to "unruly behaviour" off-set. In June it was reported that the character would be recast. Suffield left the show on 27 August 2010. In February 2011 an EastEnders spokesperson said that no decision on Lucy's recasting had been made. On 14 November 2011, it was announced the character would be returning to EastEnders in January 2012 with Hetti Bywater taking over the role. Of her casting, Bywater said "I'm really excited to be joining such an iconic show as EastEnders, especially becoming part of the Beale household. I'm looking forward to find out what's in store for Lucy and seeing what she's going to get up to when she returns to Walford." After seeing Bywater's first episode, Melissa Suffield said that she has moved on from EastEnders and also wished Bywater good luck in the role. Bywater expressed that she would like Peter Beale to return to the show, with Thomas Law playing him.
Departure and cameo appearances
On 21 February 2014, it was revealed that Hetti Bywater would leave the show, ending in a "raw", "emotional" and "gritty" storyline, with the character being killed off in the spring. The storyline was somewhat foreshadowed by new executive producer Dominic Treadwell-Collins stating at an EastEnders press event in December 2013 that "there's a big, big Beale story that will hit around Easter and keep going until the anniversary." Treadwell-Collins also stated that it would give Adam Woodyatt (who plays Lucy's father Ian Beale) "a big chance to shine" throughout the storyline. In the episode dated 18 April 2014, Lucy's lifeless body lay on Walford Common, beginning the storyline.
It was revealed on 19 February 2015 that Lucy was in fact killed by her younger brother, Bobby. Ian initially believes that Jane killed her, but it is later revealed that Jane covered for Bobby by placing Lucy's body on Walford Common. Jane reveals to Ian, Peter and Cindy that Bobby is unaware he killed her, and instead believes that she was killed when she headed out later that night in a mugging.
The character of Bobby was reintroduced in 2019, having been imprisoned for Lucy's murder for three years, with Clay Milner Russell in the role. Writers chose to explore Bobby's guilt over Lucy's murder and struggle adapting back to Walford, following his return. As part of the storyline, the character of Lucy was reintroduced for a cameo appearance. Bywater did not reprise the role for the appearance, and a body double was hired instead.
Other appearances
Suffield appears as Lucy in the online spin-off, EastEnders: E20, in 2010, and Bywater portrays the character in the Children in Need 2014 special, "The Ghosts of Ian Beale", with other women from Ian Beale's past in a concussion-related flashback, shown on 14 November 2014. Bywater also appears as Lucy in the online exclusive clip, called "Under Suspicion", which sees Jay Brown (Jamie Borthwick) under questioning by the police.
Reception
In July 2007, Gareth McLean of The Guardian lamented the lack of strong female characters in EastEnders, noting that Lucy "is yet to come into her own". Fellow Guardian critic Grace Dent commented on the repetitive nature of EastEnders storylines by comparing Lucy's relationship with Jane to the fraught mother-daughter bond between Kat (Jessie Wallace) and Zoe Slater (Michelle Ryan). Lucy was used by Jane Simon of the Daily Mirror to highlight a trend in the soap for husbands to prioritise their "Chavvy girlfriends" over their "doting wives", with the critic noting: "With Max (Jake Wood) and Rob (Stuart Laing) choosing Stacey and Dawn (Kara Tointon) over Tanya (Jo Joyner) and May (Amanda Drew), the feckless males of Albert Square are clearly voting with their, er, feet. No wonder Lucy Beale has started swigging alcopops on a park bench with a bunch of hoodies. By this time next week she'll have got herself a tattoo, a Staffordshire bull terrier and a chartered accountant lover."
When Lucy's brother Steven returned to the show, took Ian hostage and shot Jane, Digital Spy's Dek Hogan noted that: "Throughout all of this, credit has to be given to young Melissa Suffield whose role as Lucy has been pivotal. She's done an excellent job as the confused rebellious teenager and hints of Cindy have shone through." Suffield was nominated 'Best Child Actor' in the 2008 Digital Spy awards, but lost to Hollyoaks' Ellis Hollins.
When EastEnders embarked upon a storyline which saw Lucy's peer Whitney Dean (Shona McGarty) abused by the ephebophile Tony King (Chris Coghill), the Daily Mirror's Tony Stewart questioned whether viewers would take the plot seriously, given the "sexually precocious" nature of the soap's storylines, and the fact that only recently, Lucy, who is just a year younger than Whitney, had almost given her virginity to her older boyfriend. When Tony began to groom Lucy's friend Lauren, the Mirror's Maeve Quigley commented: "It's just a pity really that Tony didn't decide to turn his attentions to Lucy Beale instead – he would be minus a vital piece of his anatomy and his wallet by now."
The 2010 storyline in which Lucy falls pregnant and Ian tries to scare her into having an abortion by showing her a DVD of childbirth borrowed from one of his employees prompted a complaint to Ofcom from the woman featured giving birth in the footage shown, alleging "that her privacy and that of her baby son had been infringed by the broadcast of two EastEnders episodes." After investigation from Ofcom, the complaint was not upheld as the footage was in the public domain as part of a National Childbirth Trust DVD.
Bywater's portrayal of Lucy won her the 'Best Newcomer' award at the 2012 Inside Soap'' Awards.
The episode immediately following Lucy's death earned a nomination for the "Best Single Episode" award at The British Soap Awards 2014, entitled "Lucy's death: The Aftermath".
See also
List of EastEnders characters (1993)
List of EastEnders: E20 characters
List of soap opera villains
"Who Killed Lucy Beale?"
References
External links
Fictional twins
Child characters in television
Television characters introduced in 1993
Fictional female businesspeople
Fictional waiting staff
Fictional drug addicts
Fictional cocaine users
Sororicide in fiction
Fictional cyberbullies
Fictional blackmailers
Fictional bullies
Fictional ghosts
Female characters in television
Female villains
Crossover characters in television
Beale family (EastEnders)
Teenage characters in television
Fictional murdered people | wiki |
JIT or Jit may refer to:
Just-in-time compilation
Just-in-time manufacturing
Jhulelal Institute of Technology, Nagpur University, India
Joint investigation team, investigating cross-border crime
Jit, a style of Zimbabwean dance music
Jit (film), a 1990 Zimbabwean film
Jit, Qalqilya, a Palestinian town in the West Bank
See also
Just in Time (disambiguation) | wiki |
Dine Brands Global Inc. is a publicly traded food and beverage company based in Glendale, California. Founded in 1958 as IHOP, it operates franchised and corporate owned full-service restaurants including two restaurant concepts, Applebee's Neighborhood Grill & Bar and International House of Pancakes (IHOP).
History
In the late 1950s, Al Lapin Jr. formed a new holding company for the International House of Pancakes chain called International Industries. Eventually the holding company consisted of International House of Pancakes, Orange Julius, Love's Wood Pit Barbecue, Golden Cup Coffee Shops, The Original House of Pies, Wil Wright's Ice Cream Shoppes, and Copper Penny Coffee Shops.
In 1976, International Industries was renamed to IHOP, Inc; and IHOP Corporation was founded as a new holding firm for IHOP, Love's, and OHOP (which was later sold shortly after). In 1979, it was purchased by Wienerwald Holding, the owners of Wienerwald and Lum's chains. Who later declared bankruptcy, and sold IHOP Corp to SVIDO in 1983; who hadn't been involved in the restaurant business prior.
In 1987, IHOP was purchased by a investment group led by Richard K. Herzer; returning IHOP's ownership by an American company. Four years later, the company went public for the first time since 1979.
In 2007, IHOP Corp announced it would be acquiring Applebee's International for approximately $2.1 billion. Following the closing, IHOP Corporation was renamed to DineEquity Inc.; and subsequently announced it would franchise most of Applebee's 500 company-owned locations, and undertake a plan to revitalize the chain's brand and concept.
In 2018, it was renamed to Dine Brands Global.
As of December 31, 2019, Dine Brands had 3,628 restaurants including 1,787 Applebee's and 1,841 IHOP restaurants, including 69 Applebee's that are company owned, 161 IHOP restaurants that are owned by area licensees and 3,398 franchised restaurants including 1,718 Applebee's and 1,680 IHOP restaurants.
In December 2022, they acquired Fuzzy's Taco Shop for $80 million in cash, adding 138 restaurants in 18 states.
References
External links
Companies listed on the New York Stock Exchange
Multinational food companies
Restaurant groups in the United States
Food and drink companies of the United States
Companies based in Glendale, California
1958 establishments in California
Food and drink companies established in 1958
American companies established in 1958 | wiki |
2022 Adelaide International may refer to:
2022 Adelaide International 1, an ATP 250 and WTA 500 tournament
2022 Adelaide International 2, an ATP 250 and WTA 250 tournament created after several tournaments cancelled by the COVID-19 pandemic | wiki |
Хайатт:
Хайатт, Джон — Джон Хайатт (англ. John Hiatt) — американский рок-гитарист, пианист, певец, автор песен
Хайатт, Шана — Шана Хайатт (англ. Shana Hiatt) — американская фотомодель, актриса, телеведущая и игрок в покер
Хайатт — сеть отелей высшего класса, базирующаяся в Чикаго, США. | wiki |
The Continental Congress was initially a convention of delegates from several British American colonies at the height of the American Revolution era, who spoke and acted collectively for the people of the Thirteen Colonies that ultimately became the United States of America. The term mostly refers to the First Continental Congress of 1774 and the Second Continental Congress of 1775–1781. More broadly, it also refers to the Congress of the Confederation of 1781–1789, thus covering the entire period the Continental Congress served as the chief legislative and executive body of the U.S. government.
The unicameral Congress of the Confederation, officially styled "The United States in Congress Assembled," was composed of delegates elected by the legislature of the various states. The Confederation Congress was the immediate successor to the Second Continental Congress; and delegates to it were similarly chosen. Many of the delegates to the initial 1775 session of the Second Continental Congress had also attended the previous First Continental Congress. Altogether, The Biographical Directory of the United States Congress lists 343 men who served as delegates to the Continental Congress in three incarnations from 1774 to 1789; also listed are another 90 persons who were elected as delegates but never served.
Background
Convened in response to the Intolerable Acts passed by the British Parliament earlier that year, the 56 delegates to the First Continental Congress sought to help repair the frayed relationship between the British government and its American colonies. They passed the Continental Association, an economic boycott of Great Britain, and petitioned the king for a redress of grievances. They also resolved to reconvene in May 1775 if necessary.
Delegates from the various colonies did indeed reconvene for a Second Continental Congress as scheduled, but by the time they gathered, the Revolutionary War had begun. Moderates in the Congress still hoped that the colonies could be reconciled with Great Britain, but a movement towards independence steadily gained ground. At this juncture Congress simultaneously sent an Olive Branch Petition to King George III, hoping for a rapprochement, and issued a Declaration of the Causes and Necessity of Taking Up Arms, which contained the words "Our cause is just. Our union is perfect... being with one mind resolved to die freemen rather than to live slaves...".
Congress functioned as a de facto national government from the outset by establishing the Continental Army, directing strategy, and appointing diplomats. It eventually adopted the Lee Resolution which established the new country on July 2, 1776, and it agreed to the Declaration of Independence two days later.
Afterward, the Congress functioned as the provisional government of the United States through March 1, 1781. During this period, in addition to successfully managing the war effort, its primary achievements included: drafting the Articles of Confederation, the first U.S. Constitution; securing diplomatic recognition and support from foreign nations; and resolving state land claims west of the Appalachian Mountains. When the Articles of Confederation came into force on March 1, 1781, after being ratified by all 13 states, the Continental Congress became the Congress of the Confederation, which helped guide the new nation through the final stages of the Revolutionary War. Under the Articles, the Confederation Congress had limited power. It could declare war, sign treaties, and settle disputes between the states. It could also borrow or print money, but did not have the power to tax; nor could it compel the individual states to comply with its decisions. It convened in eight sessions (a ninth failed to achieve a quorum) prior to being supplanted in 1789, when the United States Congress became the nation's legislative branch of government under a new Constitution.
Article V of the Articles of Confederation
Article V of the Articles of Confederation for the annual election of delegates to Congress by legislatures of the various states to terms that commenced on the first Monday in November, in every year. Each state could send 2–7 delegates, and no person was permitted to serve as a delegate for more than three years within a span of six years. State legislatures also had the authority to recall or to replace its delegates at any time. Prior to 1781, delegates to the Continental Congress served at the pleasure of the state legislature that commissioned them; neither term limits nor specific start–end–date of service existed.
Elected delegates who participated
The following tables list the 343 people who served in Congress: 1st Continental, 2nd Continental, or Confederation, between 1774 and 1789, as well as the year(s) of their active participation.
Connecticut
Delaware
Georgia
Maryland
Massachusetts
New Hampshire
New Jersey
New York
North Carolina
Pennsylvania
Rhode Island
South Carolina
Virginia
Elected delegates who did not participate
The following table lists the 90 people who were elected to Congress: 1st Continental, 2nd Continental, or Confederation, between 1774 and 1789, but who did not participate, as well as the year(s) of their election.
See also
Founding Fathers of the United States, includes a listing of which Founding Fathers signed one or more of the era's formative state documents
Journals of the Continental Congress
Charles Thomson, secretary of the Continental Congress
History of the United States (1776–1789)
Perpetual Union
Notes
References
Further reading
Garraty, John A.; Carnes, Mark C., gen. eds. (1999, 2002 supplement). American National Biography. 24 volumes. New York, New York: Oxford University Press (for the American Council of Learned Societies). . Official website .
Continental Congress
Continental Congress
18th century-related lists | wiki |
Player vs Environment eller PvE innebär att man i ett datorspel (ofta ett Massively multiplayer online role-playing game eller en Multi User Dungeon) slåss mot datorstyrda fiender. Motsatsen till player versus environment är Player versus player även kallat PvP.
Datorspelstermer | wiki |
A blend is a mixture of two or more fibers. In yarn spinning, different compositions, lengths, diameters, or colors may be combined to create a blend. Blended textiles are fabrics or yarns produced with a combination of two or more types of different fibers, or yarns to obtain desired traits and aesthetics. Blending is possible at various stages of textile manufacturing. The term, blend, refers to spun fibers or a fabric composed of such fibers. There are several synonymous terms: a combination yarn is made up of two strands of different fibers twisted together to form a ply; a mixture or mixed cloth refers to blended cloths in which different types of yarns are used in warp and weft sides.
Union or union fabric was a 19th century term for a blended fabric. It is no longer used.
History
Blending in textiles is an old practice which became more widespread after around 1980. Recognizing the growing popularity of blends, the Wool Bureau introduced the "Wool blend" mark in 1970 for blends containing a high percentage of wool. Viyella was the first branded blended textile, and it is the oldest blended flannel structure. It features a twill weave of wool and cotton, and due to the cotton content, it can be washed more easily than an all-wool flannel.
An admixture of silk and cotton from Hindustan called Mashru is one of the earliest forms of "mixed cloth," . In the 12th century A.D., the industry was under the influence of Muslims. While Muslim men were not allowed to wear pure silk due to a religious admonition, a silk-and-cotton blend they made was permitted. It was known as "Mashru." Mashru was the name given to a group of mixed fabrics. Mashru is an Arabic word that literally means "permitted."
Siamoise was a 17th-century cotton and linen material.
Fibers for blends
Spun fibers
Any fiber has the potential to contribute to a blended fabric depending upon the intended use. Continuous testing is carried out to determine the best fiber blends and the percentages that are best suited to specific uses. Polyester is the most frequently used synthetic fibre, it has earned the name, "workhorse" fiber of the industry. The staple form of the Polyester fibers has been referred as "big mixer" because of its compatibility in blending. Polyester imparts many properties without affecting the properties of other fibers.
Bicomponent fibers
Bicomponent fiber are the fibers produced by mixing two different polymers to achieve the properties of both fibers. For example, Polyester and Nylon may be mixed together in extrusion. The polymers in the bicomponent may have entirely different physical and chemical properties.
Advantages
Products with blends, mixtures, and combinations may have properties that differ from those obtained with a single fiber. Blending may add value and may reduce the cost of the product. For example, cotton is most often mixed with other fibers, particularly synthetics. This blending can be used to make cotton-like fabrics with improved functionality such as wrinkle resistance and dimensional stability. The addition of spandex to cotton improves the stretch of the product.
Spinning advantages
Uniformity
Blending is also used to describe the process of combining small amounts of the same fibers from various lots to produce a uniform result. The process is known as "blending" in spinning. The blending of similar kinds of fibers or different fibers is possible at various stages of yarn spinning, such as the blow room, draw frame, and roving.
Spinning weak fibers
Blending helps in spinning those fibers which are weak and difficult to spin. For example, milkweed fibers lack strength and cohesion.
Core spun yarns
In core spun yarns; a filament yarn is wrapped with staple fibers. Spandex filament may be wrapped with cotton fibers to form a core spun yarn. These yarns are called "composite yarns."
Functional advantages
Comfort
Blends help in reducing the discomfort of certain synthetic clothing. Synthetic fibers, such as polyester, have a moisture regain rate of only 0.4'0.8 percent. Poor absorbency reduces the comfort of clothing that comes into direct contact with the skin. Blending polyester with absorbent fibers such as cotton improves the wearing comfort. Polyester-cotton blended clothing is more comfortable to wear in humid climates than polyester alone.
A heavy pair of jeans made of 100% cotton that weigh can be cut down to , without compromising durability, by changing the composition to a blend of polyester 50% with cotton or nylon 20%.
Aesthetic advantages
Blends help to create a variety of aesthetic effects.:
Plated fabrics
Blending is also used to create many weaving and knitting structures, such as plated fabrics.
Burnt out patterns
Devoré is a pattern-making technique that involves dissolving cellulosic fibers in acids. Typically, a polyester-cotton blend is used for this purpose.
Heather or melange fabrics
Heather is a term used to describe a color effect created by combining two or more different colored fibers or yarns in a fabric. Grey melange, marl and gaspe are examples of blending fibers and yarns.
Cross-dyed fabrics
Blends are also used for cross-dyed fabrics. When dyeing fabric with two different classes of dyes in a blend, it is possible to dye both parts in completely different colors. It is called "cross-dyeing."
Economical products
Besides contributing to comfort and functionality, blends can produce economical materials.
Camel hair can be blended with sheep wool. Camel hair provides warmth without adding weight, and it is finer and more expensive than cotton, so a camelhair-sheepwool blend produces a lighter and warmer blend than sheepwool alone.
Cotton is frequently blended with polyester; the blend is more economical than a 100% cotton product.
Cashmere (an expensive wool) and sheep wool are sometimes blended together to make the product cost-effective.
Nonwoven fabric advantages
Nonwoven fabrics of various types can be manufactured using a blending process. A polyester and viscose blend is used in baby wipes. For different items, distinct weight ratios are used.
See also
Heather (fabric)
Technical textile
References
Textiles
Textile techniques | wiki |
.md er et nationalt topdomæne der er reserveret til Moldova.
md
he:סיומת אינטרנט#טבלת סיומות המדינות | wiki |
Iŋ (minuscule iŋ) est un digramme de l'alphabet latin composé d'un I et d'un Eng (Ŋ).
Linguistique
En bassa, le digramme « iŋ » note la voyelle nasalisée. La lettre I cédille (I̧) peut avoir la même utilisation.
Représentation informatique
Comme la majorité des digrammes, il n'existe aucun encodage de Iŋ sous un seul signe, il est toujours réalisé en accolant un I et un Ŋ.
Notes et références
Articles connexes
Digramme
Lettres supplémentaires de l'alphabet latin
Digramme latin | wiki |
Richard Small may refer to:
Richard Small (horse trainer) (1945–2014), American horse racing trainer
Richard H. Small (born 1935), American scientist in the field of electroacoustics
Richard Small (cricketer) (born 1938), New Zealand cricketer | wiki |
Mohun ist der Familienname folgender Personen:
Charles Mohun, 4. Baron Mohun (~1675–1712), britischer Politiker
John de Mohun, 2. Baron Mohun (1320–1376), englischer Adliger und Militär
Michael Mohun (~1625–1684), britischer Schauspieler
William de Mohun, 1. Earl of Somerset († um 1145), englischer Adliger | wiki |
Oŋ (minuscule oŋ) est un digramme de l'alphabet latin composé d'un O et d'un Eng (Ŋ).
Linguistique
En bassa, le digramme « oŋ » note la voyelle nasalisée. La lettre O cédille (O̧) peut avoir la même utilisation.
Représentation informatique
Comme la majorité des digrammes, il n'existe aucun encodage de Oŋ sous un seul signe, il est toujours réalisé en accolant un O et un Ŋ.
Notes et références
Articles connexes
Digramme
Lettres supplémentaires de l'alphabet latin
Digramme latin | wiki |
Uŋ (minuscule uŋ) est un digramme de l'alphabet latin composé d'un U et d'un Eng (Ŋ).
Linguistique
En bassa, le digramme « uŋ » note la voyelle nasalisée. La lettre U cédille (U̧) peut avoir la même utilisation.
Représentation informatique
Comme la majorité des digrammes, il n'existe aucun encodage de Uŋ sous un seul signe, il est toujours réalisé en accolant un U et un Ŋ.
Notes et références
Articles connexes
Digramme
Lettres supplémentaires de l'alphabet latin
Digramme latin | wiki |
The foot-poundal (symbol: ft-pdl) is a unit of energy, introduced in 1879, that is part of the Absolute English system of units, which itself is a coherent subsystem of the foot–pound–second system.
The foot-poundal is equal to 1/32.174049 that of the more commonly used foot-pound force.
Conversions
1 foot-poundal is equivalent to:
0.031081 ft•lbf
0.0421401100938048 J (exactly)
421401.100938048 erg (exactly)
0.0004 BTUIT
0.010065 calIT or 0.000 010 65 "food calorie" (kcal or Cal)
0.37297 inch-pound force (in•lbf)
5.96752 inch-ounce force (in•ozf)
See also
Poundal
Foot-pound force
Pound-force
Slug (unit)
Units of energy
Footnotes
Units of energy
Units of torque
Imperial units | wiki |
Ɛŋ (minuscule ɛŋ) est un digramme de l'alphabet latin composé d'un E ouvert (Ɛ) et d'un Eng (Ŋ).
Linguistique
En bassa, le digramme « ɛŋ » note la voyelle nasalisée. La lettre Ɛ cédille (Ɛ̧) peut avoir la même utilisation.
Représentation informatique
Comme la majorité des digrammes, il n'existe aucun encodage de Ɛŋ sous un seul signe, il est toujours réalisé en accolant un Ɛ et un Ŋ.
Notes et références
Articles connexes
Digramme
Lettres supplémentaires de l'alphabet latin
Digramme latin | wiki |
Thalamophyllia tenuescens est une espèce de coraux appartenant à la famille des Caryophylliidae.
Description et caractéristiques
Habitat et répartition
Liens externes
Notes et références
Caryophylliidae | wiki |
Pascula is een geslacht van weekdieren uit de klasse van de Gastropoda (slakken).
Soorten
Pascula citrica (Dall, 1908)
Pascula darrosensis (E. A. Smith, 1884)
Pascula muricata (Reeve, 1846)
Pascula ochrostoma (Blainville, 1832)
Pascula ozenneana (Crosse, 1861)
Pascula rufonotata (Carpenter, 1864)
Pascula submissa (E. A. Smith, 1903)
Muricidae | wiki |
William Linder (born 1886) was an American Negro league pitcher in the 1920s.
A native of Tennessee, Linder played for the Kansas City Monarchs in 1922. In three recorded games, he posted a 5.06 ERA over 10.2 innings.
References
External links
and Seamheads
1886 births
Date of birth missing
Year of death missing
Place of birth missing
Place of death missing
Kansas City Monarchs players | wiki |
The Island of Frozen Seas is the second album of Thorgal, a European comic book series, written by a Belgian writer Jean Van Hamme and the Polish graphic artist Grzegorz Rosiński. It was first published in 1980 by Le Lombard under the title L'lle des Mers Gelees. It continues the story characters of Thorgal Aegirsson, Aaricia, Gandalf the Mad, and Slivia.
Summary
The story opens with a pre-wedding ceremony held for Thorgal and Aaricia. Although Gandalf the Mad has accepted Thorgal, tensions are still high between Thorgal and Bjorn, Gandalf's son, who still resents Thorgal and sees him as a rival to Gandalf's throne. When Aaricia is suddenly carried off by an eagle and apparently kidnapped, the Vikings rush into pursuit. While they follow a mysterious "ship with no sails", which only Thorgal has seen and identified as Aaricia's kidnapper, they find themselves on the freezing northern seas, unprepared for the weather and without supplies. Lost and desperate, they accuse Thorgal of leading them into a trap, and they leave him and Bjorn in a small boat to fend for themselves. Minutes later, they are attacked by the "ship with no sails" and taken into captivity. Once they awake, a crazed Bjorn attacks Thorgal but falls off the boat onto ice.
A starving and exhausted Thorgal finds himself on the coast of an island, where he befriends the locals. They tell him that they are enslaved by the "Lords" and forced to work in mines. From the description of one of them, the Lord of the Eagles, Thorgal realizes he has found Aaricia's kidnapper, and sets off to find him. He is joined by Bjorn, who also survived. They find the Lord, but before Thorgal can find anything out, Bjorn kills the Lord. Bjorn is then attacked and killed by the eagles. When Thorgal takes off the Lord's helm, he finds that the Lord is in fact a woman, who reveals to him that she is Silva's daughter and tells Thorgal where to find her before she dies.
Thorgal enters Silva's palace and finds Aaricia. The palace looks like the inside of a space ship, and also has hallways filled with bodies in pods. When Thorgal finds Silvia, she explains to him that she kidnapped Aaricia to force him to come to the palace and marry her daughter and ensure the survival of their people. She tells him that Thorgal and her are one of the last descendants of a race of technologically advanced people, who left Earth centuries earlier after a massive cataclysm of their homeland. They were forced to return to Earth in search of new energy sources, but their ship was damaged during landing and they were unable to repair it. Posing as gods, they enslaved the native inhabitants of the island and forced them to work in coal mines. Thorgal is incredulous, but accepts Silvia's story after she tells him all hope is lost and he is free to go with Aaricia.
Thorgal and the locals free the enslaved miners, including the Vikings. They leave the island to go back to their home. Thorgal makes a decision to forget about his origins and live a peaceful life with his wife.
Arc significance
In this book, Silvia tells Thorgal he is one of the last descendants of a group of technologically advanced people who left Earth centuries earlier, after their own home was destroyed in a massive cataclysm. They came back to Earth in search of new energy sources, but their ship was damaged and they were forced to stay on Earth. They began dying of a mysterious illness, and Thorgal was born aboard a sinking ship during his parents' unsuccessful attempt to get off the island.
Silvia's "palace" on the Island of Frozen seas is actually the wreckage of the spaceship used by Thorgal's ancestors on their doomed trip to Earth.
External links
Official website
List of comics, cover gallery
Fantasy comics
Belgian comics titles
Thorgal | wiki |
Lake Union is a freshwater lake located entirely within the city limits of Seattle, Washington, United States. It is a major part of the Lake Washington Ship Canal, which carries fresh water from the much larger Lake Washington on the east to Puget Sound on the west. The easternmost point of the lake is the Ship Canal Bridge, which carries Interstate 5 over the eastern arm of the lake and separates Lake Union from Portage Bay. Lake Union is the namesake of the neighborhoods located on three of its shores: Eastlake, Westlake and South Lake Union. Notable destinations on the lake include Lake Union Park, the Museum of History & Industry (MOHAI), and the Center for Wooden Boats on the southern shore and Gas Works Park on the northern shore.
The Aurora Bridge (officially the George Washington Memorial Bridge) carries State Route 99 over the western arm of Lake Union. The Aurora Bridge is so named because it carries Aurora Ave N down the western side of the lake. Lake Union's westernmost point can be considered the Fremont Cut, which is located just west of the Aurora Bridge and is spanned by the Fremont Bridge. The Fremont Bridge carries Fremont Ave N between the neighborhoods of Fremont and Queen Anne and separates Lake Union from the rest of the Lake Washington Ship Canal to the west.
History
A glacial lake, its basin was dug 12,000 years ago by the Vashon glacier, which also created Lake Washington and Seattle's Green, Bitter, and Haller Lakes.
Name
Lake Union received its present name from Thomas Mercer, who in 1854 correctly predicted that canals would someday join Lake Washington to Puget Sound in a "union of waters." The Duwamish called it – comparing it with what is now known as Lake Washington – "Small Lake" or "Little Lake" (Lushootseed: XáXu7cHoo or Ha-AH-Chu, literally "small great-amount-of-water," the diminutive form of the word used for Lake Washington). In Chinook, an intertribal trading language, it was called Tenas Chuck ("small water").
Geography
Several Seattle neighborhoods take their name from the lake: Eastlake, Westlake, Northlake, and South Lake Union; and three major streets are named in relation to it: Westlake Avenue, which runs along its western shore from Downtown to the Fremont Bridge; Eastlake Avenue, which runs along its eastern shore from Cascade to the University District, and Northlake Way, which runs along its northern shore from the University District past Gas Works Park to the edge of Fremont.
Industry
Boeing began production on Lake Union in 1916, there had a hanger assembled the company's first product B & W Seaplane. Shipyards, wharfs, and sawmills have also dotted the shore.
Recreation
Lake Union's proximity to and scenic views of the central Seattle and University District skylines make it a popular recreational spot. Seaplanes operated by Kenmore Air and Seattle Seaplanes land and take off from the lake throughout the day. Pleasure boats from Lake Washington pass through on their way to Puget Sound. The Center for Wooden Boats holds a yearly wooden boat festival, while the annual Seattle Boat Show at the end of January demonstrates seacraft for sale on actual waters, in addition to its displays in the concourse of Lumen Field. The world-famous Duck Dodge sailboat races are run on Lake Union each Tuesday during the summer. Rowers in sweep and sculling boats use the lake year-round. Paddle boarding and kayaking are also popular on this lake.
Parks
Gas Works Park is the largest park on Lake Union and the most popular for Seattleites and visitors. It is the venue for summer concerts and Seattle's major Fourth of July fireworks show. Other parks ring the lake, clockwise around the compass from Gas Works which is nearly due north: North Passage Point Park, South Passage Point Park, Fairview Park, Terry Pettus Park, and South Lake Union Park.
Floating homes
Floating homes line the east and west sides of Lake Union. In Sleepless in Seattle, the character played by Tom Hanks lived on one of these homes.
Connections to other bodies of water
Part of the Lake Washington Ship Canal system, water flows into the lake from Lake Washington through the Montlake Cut, and out via the Fremont Cut on its way to Puget Sound. Before construction of the canal, Lake Union emptied into Salmon Bay via a creek which followed roughly the same course as the Fremont Cut does today.
Salinity
Because of the connection via the Hiram M. Chittenden Locks to the salt water of Puget Sound, the water is brackish to a certain extent, which increases in the summer as the inflow rate from Lake Washington decreases and the locks open more frequently for pleasure craft.
Competitive rowing
Lake Union is home to several rowing centers and teams, including Holy Names Academy Crew, Lake Union Crew, Lake Washington Rowing Club and Pocock Rowing Center, all members of USRowing. Also rowing out of bodies of water attached to Lake Union are the Seattle Rowing Center and the Conibear Shellhouse, serving the Washington Huskies.
Seaplane base
Lake Union is home to two seaplane bases: Kenmore Air Harbor Seaplane Base , and Seattle Seaplanes , located one nautical mile (1.85 km) north of the central business district of Seattle.
References
External links
Houseboats
Union
Union
Landforms of Seattle | wiki |
Melanosis is a form of hyperpigmentation associated with increased melanin.
It can also refer to:
Melanism
Ocular melanosis
Smoker's melanosis
Oral melanosis
Riehl melanosis
See also
List of cutaneous conditions
References
External links
Dermatologic terminology | wiki |
Life Family established on the west side of Austin, TX. The church was started in 2005 by pastor Randy Phillips. newspaper=Austin American-Statesman|date=7 February 2005}}</ref> who is also a member of the musical group Phillips, Craig and Dean. The church has approximately 3,500 congregants.
References
External links
Official website
Churches in Austin, Texas | wiki |
The State Treasurer of Michigan functions as the chief financial officer for the U.S. state of Michigan. The State Treasurer oversees the collection, investment, and disbursement of all state monies, and also administers major tax laws, safeguards the credit of the state, and distributes revenue sharing monies to local units of government. It is an unelected office within the executive branch.
The current state treasurer is Rachael A. Eubanks, who was appointed by Governor Gretchen Whitmer in January 2019.
List of State Treasurers of Michigan
Notes
Citations
Bibliography
Source: Michigan Manual 2003-2004, Chapter IV, Former Officials of Michigan
External links
Michigan Department of Treasury | wiki |
West Beacon is the prominent western peak, rising to 2,345 m in Beacon Heights, in the Quartermain Mountains, Victoria Land. The name "Beacon Height West" was first used by the Discovery expedition (1901–04). The name was shortened by the New Zealand Geological Survey Antarctic Expedition (NZGSAE), 1958–59.
Mountains of Victoria Land
Scott Coast | wiki |
Elegiac Stanzas is a poem by William Wordsworth, originally published in Poems, in Two Volumes (1807). Its full title is "Elegiac Stanzas, Suggested by a Picture of Peele Castle in a Storm, Painted by Sir George Beaumont."
Notes
1807 poems
Poetry by William Wordsworth | wiki |
Singapore Standard may refer to:
Singapore Standard (regulatory policy), the standards used for industrial activities in Singapore
Singapore Standard Time
Singapore Tiger Standard, a defunct English language newspaper in Singapore
Standard Singapore English, see Singapore English | wiki |
The Language of Music is a 1959 book about music by the critic and musician Deryck Cooke.
Reception
Robert M. Wallace reviewed The Language of Music in The Nation.
The Language of Music is an often cited representative of the expressionist theory of art. No systematic experimental study of Cooke's theory has emerged relating it to musical education, but one pilot study showed that for 22 non-musician students, his characterizations of musical phrases were not experienced. The philosopher Douglas Hofstadter writes that The Language of Music is, "A valuable start down what is sure to be a long hard road to understanding music and the human mind."
References
Bibliography
Books
Journals
1959 non-fiction books
Books by Deryck Cooke
English-language books
Music books | wiki |
The alcohol laws of Hong Kong are consistent with those of most common law jurisdictions, but the sale of alcohol is more liberal than countries like Canada. It is strict when compared to China (prior to 2006) and Macau where there is no legal drinking age.
Alcohol sales
Alcohol is available at licensed restaurants (any size), bars, clubs and many food retailers (mostly supermarkets). The Liquor Licensing Board of Hong Kong is responsible for licensing of alcohol serving establishments.
For consumption on-premises
The sale of liquor on a premises for consumption on that premises is not subject to any restriction on sale hours unless a special condition limiting hours is imposed by the Liquor Licensing Board on the liquor licence Cap 109 B laws of Hong Kong reg 17.
There are further restrictions if the premises are employing persons under the drinking age therein as to when they can work. There is no age restriction on drinking at a private residence or on drinking age at locations that are not the subject of liquor licenses. No licensee shall permit any person under the age of 18 years to drink any intoxicating liquor on any licensed premises - under Regulation 28.
Drinking age
There is no legal drinking age set in Hong Kong, however, with the effect of the "Dutiable Commodities (Amendment) Ordinance 2018" (Cap. 109 Hong Kong Law) since 30 November 2018, sale or supply of alcohol / intoxicating liquor to minors (aged below 18) in the course of business is prohibited. The maximum fine for selling or supplying intoxicating liquor to a minor, or selling intoxicating liquor via vending machines, is HK$50,000 on summary conviction. Those who obstruct inspectors during enforcement are liable to a maximum fine of HK$10,000 on summary conviction.
Drunk driving
The law against what is known as drink driving, impaired driving in Hong Kong is strictly enforced. Hong Kong's maximum blood alcohol level (BAL) is 55 mg of alcohol per 100 ml of blood, or 0.22 mg alcohol per litre breath alcohol content (BrAC).
With effect from 9 February 2009, police officers in uniform can require a person who is driving or attempting to drive a vehicle on a road to conduct a breath test without the need for reasonable suspicion. In the new random breath test operations, the Police will use pre-screening devices to conduct the test to reduce delay and inconvenience to drivers.
Fines for drivers found impaired:
Maximum fine of HK$25,000 and imprisonment for 3 years
Disqualification from driving for not less than 3 months on first conviction and not less than 2 years on second or subsequent conviction
Mandated to attend a driving improvement course
Incur 10 driving offence points
(The same penalty applies for failing to provide specimens for breath, blood or urine tests without reasonable excuse).
Source: Transport Department
References
External links
Liquor Licensing Board of Hong Kong
Tobacco and Alcohol Control Office, Department of Health, The Government of the Hong Kong Special Administrative Region
Alcohol law in Hong Kong | wiki |
A clamp is a fastening device used to hold or secure objects tightly together to prevent movement or separation through the application of inward pressure. In the United Kingdom the term cramp is often used instead when the tool is for temporary use for positioning components during construction and woodworking; thus a G cramp or a sash clamp but a wheel clamp or a surgical clamp.
There are many types of clamps available for many different purposes. Some are temporary, as used to position components while fixing them together, others are intended to be permanent. In the field of animal husbandry, using a clamp to attach an animal to a stationary object is known as "rounded clamping." A physical clamp of this type is also used to refer to an obscure investment banking term, "fund clamps." Anything that performs the action of clamping may be called a clamp, so this gives rise to a wide variety of terms across many fields.
Types
Temporary
These clamps (or cramps) are used to position components temporarily for various tasks:
Band clamp or web clamp
Bar clamp, F-clamp or sliding clamp (upper left in the top photo)
Cardellini clamp – jaw-style clamp that clamps onto round, square, or rectangular tubing; or onto flat objects, such as dimensional lumber or plywood sheets—to mount motion picture lights, or grip equipment such as gobo heads
C-clamp (also G-clamp or G-cramp) (lower centre in the top photo)
Flooring clamp A carpenter's clamp used to cramp up floorboards prior to fixing.
Forked clamp stainless steel for ST ground glass joints with/without setscrew. Sizes for: ST 14, 19, 24, 29 and 45.
Gripe (a specialized clamp, tightened with a wedge, for holding strakes in position when building a clinker boat)
Hand clamp
Handscrew (upper right in the top photo)
Holdfast, a bench clamp for holding things to a bench top or side The bench forms the fixed jaw.
Magnetic clamp (see Magnetic base)
Mitre clamp
Pipe clamp (top of the top photo)
Sash clamp (a specialized, long form of bar clamp)
Set screw
Spring clamp (first item of third row in photo)
Speed clamp
Step clamp, a type of serrated-edged clamp used in conjunction with step blocks when machining or milling parts in metalworking
Toggle clamp
Toolmakers' clamp (a smaller, precision version of the handscrew, all in steel)
Pinch Dog (a small "staple" shaped device, designed to straddle a joint, and pull the joint tightly together during the glue up process)
Clip hangers are a subset of clothes hangers
Permanent
Hose clamp
Marman clamp
Wire rope clamp
Joiner's dog
Medical
There are various kinds of surgical clamps:
Foerster clamp
Hemostatic clamp
Pennington clamp
Gomco clamp
Mogen clamp
Bone clamp
Serrefine
Other
Castration clamp
Wheel clamp
Pandrol clip
Tube clamp (name for the different clamps used in a tube and clamp scaffold)
Nipple clamp
Gallery
See also
Fixture
Vise
References
Further reading
Patrick Spielman (1986). Gluing and Clamping: A Woodworker’s Handbook. Sterling Publishing.
Lee Jesberger (2007). Pro Woodworking Tips
Woodworking hand tools
Metalworking hand tools
Articles containing video clips | wiki |
Strafe refers to strafing, the military practice of attacking ground targets from low-flying aircraft.
Strafe may also refer to:
Strafe (Transformers), character from the Transformers series
Strafe (video game), 2017 video game
Strafe (band), hip-hop group
See also
Strafing (video games), the act of moving sideways in a video game, typically either in relation to an enemy or the game's camera | wiki |
Hemoptysis is the coughing up of blood or blood-stained mucus from the bronchi, larynx, trachea, or lungs. In other words, it is the airway bleeding. This can occur with lung cancer, infections such as tuberculosis, bronchitis, or pneumonia, and certain cardiovascular conditions. Hemoptysis is considered massive at . In such cases, there are always severe injuries. The primary danger comes from choking, rather than blood loss.
Diagnosis
Past history, history of present illness, family history
history of tuberculosis, bronchiectasis, chronic bronchitis, mitral stenosis, etc.
history of cigarette smoking, occupational diseases by exposure to silica dust, etc.
Blood
duration, frequency, amount
Amounts of blood: large amounts of blood, or is there blood-streaked sputum
Probable source of bleeding: Is the blood coughed up, or vomited?
Bloody sputum
color, characters: blood-streaked, fresh blood, frothy pink, bloody gelatinous.
Accompanying symptoms
fever, chest pain, coughing, purulent sputum, mucocutaneous bleeding, jaundice.
Imaging examination
chest X-ray, CT scan and 3D reconstruction images or CT virtual bronchoscopy, bronchial angiography.
Laboratory tests
blood test: WBC
Sputum: cells and bacterial examinations, sputum culture
Bronchial fiber endoscopy
Differential diagnosis
The most common causes for hemoptysis in adults are chest infections such as bronchitis or pneumonia. In children, hemoptysis is commonly caused by the presence of a foreign body in the airway. Other common causes include lung cancers and tuberculosis. Less common causes include aspergilloma, bronchiectasis, coccidioidomycosis, pulmonary embolism, pneumonic plague, and cystic fibrosis. Rarer causes include hereditary hemorrhagic telangiectasia (HHT or Rendu-Osler-Weber syndrome), Goodpasture's syndrome, and granulomatosis with polyangiitis. A rare cause of hemoptysis in women is endometriosis, which leads to intermittent hemoptysis coinciding with menstrual periods in 7% of women with thoracic endometriosis syndrome. Hemoptysis may be exacerbated or even caused by overtreatment with anticoagulant drugs such as warfarin.
Blood-laced mucus from the sinus or nose area can sometimes be misidentified as symptomatic of hemoptysis (such secretions can be a sign of nasal or sinus cancer, but also a sinus infection). Extensive non-respiratory injury can also cause one to cough up blood. Cardiac causes like congestive heart failure and mitral stenosis should be ruled out.The origin of blood can be identified by observing its color. Bright-red, foamy blood comes from the respiratory tract, whereas dark-red, coffee-colored blood comes from the gastrointestinal tract. Sometimes hemoptysis may be rust-colored.
Lung cancer, including both non-small cell lung carcinoma and small cell lung carcinoma.
Sarcoidosis
Aspergilloma
Tuberculosis
Histoplasmosis
Pneumonia
Pulmonary edema
Endometriosis and thoracic endometriosis syndrome
Foreign body aspiration and aspiration pneumonia
Goodpasture's syndrome
Microscopic polyangiitis
Granulomatosis with polyangiitis
Eosinophilic granulomatosis with polyangiitis
Bronchitis
Bronchiectasis
Pulmonary embolism
Anticoagulant use
Trauma
Lung abscess
Mitral stenosis
Tropical pulmonary eosinophilia
Bleeding disorders
Hughes-Stovin syndrome and other variants of Behçet's disease
Pulmonary arteriovenous malformations
Massive hemoptysis and mortality
Although there are reports that the fatality rate is as high as 80%, the in-hospital mortality rate for hospitalized hemoptysis patients is 2669/28539=9.4%, calculated from the data in the article by Kinoshita et al. This is probably the most reasonable figure considering the overwhelming number of cases.
The general definition of massive hemoptysis is more than 200 ml within 24 hours, but there is a wide range in the literature (100-600 ml). Considering that the total volume of the tracheal and bronchial lumen is about 150 cc, it may be reasonable to define massive hemoptysis as 200 ml, which is a little more than 150 ml, in terms of setting the threshold for fatal hemoptysis. More than 400ml/day is not adequate for screening purposes.
Treatment
Treatment depends on the underlying cause. Treatments include iced saline, and topical vasoconstrictors such as adrenalin or vasopressin. Tranexamic acid was proved to improve in-hospital mortality. Selective bronchial intubation can be used to collapse the lung that is bleeding. Also, endobronchial tamponade can be used. Laser photocoagulation can be used to stop bleeding during bronchoscopy. Angiography of bronchial arteries can be performed to locate the bleeding, and it can often be embolized. Bronchial artery embolization (BAE) is the first line treatment nowadays. Surgical option is usually the last resort and can involve removal of a lung lobe or removal of the entire lung. Cough suppressants can increase the risk of choking.
References
Further reading
External links
Bleeding
Respiratory diseases
Symptoms and signs: Respiratory system | wiki |
Hakkloa is a regulated lake in Nordmarka in Oslo, Norway. Hakkloa drains through the river Hakkloelva to the lake Bjørnsjøen, and further to Skjærsjøen and Maridalsvannet.
References
Lakes of Oslo | wiki |
In pleading, a general denial is a denial that relates to all allegations which are not otherwise pleaded to. Many legal systems provide that in a statement of defense, any allegation made by the plaintiff which is not traversed (i.e. specifically denied or "not-admitted") is deemed to have been admitted by the defendants. Accordingly, it became common practice to add a general denial at the end of a statement of defense to make sure that nothing was accidentally admitted in this fashion.
In English law, the usual form of general denial was normally phrased:
"Except as hereinbefore expressly admitted or not-admitted, each and every paragraph of the statement of claim is denied as if set out herein seriatim."
References
Civil procedure | wiki |
A contract of sale, sales contract, sales order, or contract for sale is a legal contract for the purchase of assets (goods or property) by a buyer (or purchaser) from a seller (or vendor) for an agreed upon value in money (or money equivalent).
An obvious ancient practice of exchange, in many common law jurisdictions, it is now governed by statutory law. See commercial law.
Contracts of sale involving goods are governed by Article 2 of the Uniform Commercial Code in most jurisdictions in the United States and Canada. However in Quebec, such contracts are governed by the Civil Code of Quebec as a nominate contract in the book on the law of obligations. In some Muslim countries it is governed by sharia (Islamic law); however, many Muslim countries apply other law to contacts (e.g. the Egyptian Civil Code, based on the Napoleonic Code, which beyond its application in Egypt serves as the model for the civil codes of several other Arab states).
A contract of sale lays out the terms of a transaction of goods or services, identifying the goods sold, listing delivery instructions, inspection period, any warranties and details of payment.
See also
Contract for future sale
Denmark
Danish Sale of Goods Act
United Kingdom
Sale of Goods Act 1893
Sale of Goods Act 1979
Consumer Rights Act 2015
Bill of sale
Part exchange
Tendering
Implied condition
References
Contract law
Sales | wiki |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.