964 resultados para 1ST RECORD
Resumo:
A prisoner interrogation report dated 27 May 1918. The report reads: "I. PRISONER X. 1st. Battalion, 272 Res. Rogt., 82d Res. 1. CIRCUMSTANCES OF CAPTURE; Captured, while attempting to raid our trenches, at point 1719 at about 7A.M. 2. INFORMATION OBTAINED FROM PRISONER (a) Between point 1814 and point 175242 the German trenches appear to be held by three companies, each numbering 3 platoons, each platoon numbering about 40 men. Each company has 4 light machine guns in the first lines, these machine guns distributed along the first trench (one of them in particular is located at bond in hostile trench at point 17215 and another at about 17245. Each company, furthermore, has one platoon (weak in numbers) in support in the ravine north of Cantigny. These platoons are in dugouts dug into the side of the hill approximately between points 28215 and 2223. Each of these support platoons has two light machine guns at its disposal. Company commanders dugout is at some point along the line of dugouts occupied by the support platoons. Another company commander's dugout (Co.3) is at point 1815 about 15 meters behind the German trench which runs along the edge of the town of Cantigny. There is a communication trench between the cemetery at 2018 and the front line at 18179. It is believed that there is a machine gun at point 17245 kept in a dugout dug under the road. The reserve battalion is believed to be at a fairly great distance from the front (near Bouillancourt). The prisoner, on the other hand, states that it may have been moved up."
Resumo:
A price list form for the Alberta Liquor Control Board from 1 January 1925. The price list includes "General Information" in regards to permits for individuals and special permits. The alcohol is then listed by category for pricing: Scotch Whisky, Irish Whisky, Rye Whisky, Bourbon Whisky, Rum, Gin, Brandy, Port, Native Wine, Italian (Type) Wines, Sherry, Claret, Burgundy, White Wine, Sparkling Wine, Vermouth, Cocktails, Liqueurs, Champagne, Bitters, Ale and Stout, Chinese Liquors.
Resumo:
A report for 1 April 1969 to 31 March 1970 by the Liquor Control Board of Ontario. The report consists of following: Sales, Winers, Personnel, Stores, Permits, and Financial Statements.
Resumo:
A minute book for Grantham Township, Ontario. It records the proceedings of meetings from 1818-1854 and the names of parish and town officers from 1818 to 1842. Names include: Chisholm, Ball, Steele, TenBroeck, Shipman, Laraway, McKerney, Adams, Pawling, Merritt, Rolls, Robertson, Lampman, Phelps, Darling. Also notes the laws agreed upon for the period, mainly dealing with livestock.
Resumo:
Appointment of William Woodruff to be Ensign in the 1st Regiment of Lincoln Militia in the Niagara District. This is signed by Francis Gore, Lieutenant Governor of the Province of Upper Canada. The document is quite stained and watermarked. The text is not affected, Nov. 5, 1815.
Resumo:
Family record copied from the family bible. This 1 page, single sided note was in an envelope and gives date and places of births and marriage, but it doesn’t provide any last names, n.d.
Resumo:
Family Record of the Clement Family (1 printed page) listing Clement family members born from 1750 – 1808, n.d.
Resumo:
Family Record of the Clement Family (1 printed page) exactly as above, but printed on fabric, n.d.
Resumo:
List of the number of loads dredged by Smiley’s Dredge since the 1st of October along the Welland Railway. This is addressed to S.D. Woodruff and signed by James Woodall of Lock No. 1. There are holes and stains in the document. Text is not affected, Jan. 12, 1859.
Resumo:
Appointment of John B. Parkynn [Parkin] (J.P. Bradley’s brother) to be an Ensign of the 1st Company of the Royal Quebec Volunteers. This is signed by the Governor General, the Earl of Gosford and Governor General, Secretary J. Walcott, Nov. 27, 1837.
Resumo:
UANL
Resumo:
UANL
Resumo:
Introduction: Bien que l'importance de transférer les données de la recherche à la pratique a été largement démontrée, ce processus est toujours lent et fait face à plusieurs défis tels que la conceptualisation des évidences, la validité interne et externe de la recherche scientifique et les coûts élevés de la collecte de grandes quantités de données axées sur le patient. Les dossiers dentaires des patients contiennent des renseignements valables qui donneraient aux chercheurs cliniques une opportunité d'utiliser un large éventail d'informations quantitatives ou qualitatives. La standardisation du dossier clinique permettrait d’échanger et de réutiliser des données dans différents domaines de recherche. Objectifs: Le but de cette étude était de concevoir un dossier patient axé sur la recherche dans le domaine de la prosthodontie amovible à la clinique de premier cycle de l’Université de Montréal. Méthodes: Cette étude a utilisé des méthodes de recherche-action avec 4 étapes séquentielles : l'identification des problèmes, la collecte et l'interprétation des données, la planification et l’évaluation de l'action. Les participants de l'étude (n=14) incluaient des professeurs, des chercheurs cliniques et des instructeurs cliniques dans le domaine de la prosthodontie amovible. La collecte des données a été menée à l’aide d’une revue de littérature ciblée et complète sur les résultats en prosthodontie ainsi que par le biais de discussions de groupes et d’entrevues. Les données qualitatives ont été analysées en utilisant QDA Miner 3.2.3. Résultats: Les participants de l'étude ont soulevé plusieurs points absents au formulaire actuel de prosthodontie à la clinique de premier cycle. Ils ont partagé leurs idées pour la conception d'un nouveau dossier-patient basé sur 3 objectifs principaux: les objectifs cliniques, éducatifs et de recherche. Les principaux sujets d’intérêt en prosthodontie amovibles, les instruments appropriés ainsi que les paramètres cliniques ont été sélectionnés par le groupe de recherche. Ces résultats ont été intégrés dans un nouveau formulaire basé sur cette consultation. La pertinence du nouveau formulaire a été évaluée par le même groupe d'experts et les modifications requises ont été effectuées. Les participants de l'étude ont convenu que le cycle de recherche-action doit être poursuivi afin d'évaluer la faisabilité d’implémentation de ce dossier modifié dans un cadre universitaire. Conclusion: Cette étude est une première étape pour développer une base de données dans le domaine de la prothodontie amovible. La recherche-action est une méthode de recherche utile dans ce processus, et les éducateurs académiques sont bien placés pour mener ce type de recherche.
Resumo:
With this document, we provide a compilation of in-depth discussions on some of the most current security issues in distributed systems. The six contributions have been collected and presented at the 1st Kassel Student Workshop on Security in Distributed Systems (KaSWoSDS’08). We are pleased to present a collection of papers not only shedding light on the theoretical aspects of their topics, but also being accompanied with elaborate practical examples. In Chapter 1, Stephan Opfer discusses Viruses, one of the oldest threats to system security. For years there has been an arms race between virus producers and anti-virus software providers, with no end in sight. Stefan Triller demonstrates how malicious code can be injected in a target process using a buffer overflow in Chapter 2. Websites usually store their data and user information in data bases. Like buffer overflows, the possibilities of performing SQL injection attacks targeting such data bases are left open by unwary programmers. Stephan Scheuermann gives us a deeper insight into the mechanisms behind such attacks in Chapter 3. Cross-site scripting (XSS) is a method to insert malicious code into websites viewed by other users. Michael Blumenstein explains this issue in Chapter 4. Code can be injected in other websites via XSS attacks in order to spy out data of internet users, spoofing subsumes all methods that directly involve taking on a false identity. In Chapter 5, Till Amma shows us different ways how this can be done and how it is prevented. Last but not least, cryptographic methods are used to encode confidential data in a way that even if it got in the wrong hands, the culprits cannot decode it. Over the centuries, many different ciphers have been developed, applied, and finally broken. Ilhan Glogic sketches this history in Chapter 6.
Resumo:
Sota els auspicis de la col·lecció Es Frares, l'Ajuntament de Lloret de Mar vol recopilar i salvaguardar els testimonis de la història de la vila amb la intenció de fer arribar aquest patrimoni cultural construit al llarg de generacions a la seva població. Prova d'aquest interés són les anteriors publicacions com "La bòbila romana de Fenals (Lloret de Mar)" o el que es presenta en aquesta ocasió, El fons municipal en pergamí de l'angiga universitat de Lloret de Mar