| Hebrew | Greek | English |
| א (Alef) | Αα (alpha) | A (alfa) |
| ב (Bet) | Ββ (beta) | B (bravo) |
| ג (Gimel) | Γγ (gamma) | G (golf) |
| ד (Dalet) | Δδ (delta) | D (delta) |
| ה (He) | Ηη (eta) | E (echo) H (hotel) |
| ו (Vau) | V (victor) W (whiskey) | |
| ז (Zayin) | Ζζ (zeta) | Z (Zulu) |
| ח (Het) | Ͱͱ (Heta) | H (Hotel) |
| ט (Tet) | Θθ (Theta) | T (Tango) |
| י (Yod) | Ιι (Iota) | J (Juliett) |
| כך (Kaf) | Κκ (Kappa) | K (Kilo) |
| ל (Lamedh) | Λλ (Lambda) | L (Lima) |
| מם (Mem) | Μμ (Mü) | M (Mike) |
| נן (nūn) | Νν (Nu) | N (November) |
| ס (Samekh) | Σσς(Sigma) | S (Sierra) |
| ע (Ayin) | Οο (Omicron) | O (Oscar) |
| פף (Pe) | Ππ (Pi) | P (Papa) |
| צץ (Tsadi) | Ϻ (San) | S (Sierra) |
| ק (Qof) | Ϙϙ (Qoppa) | S (Sierra) |
| ר (Resh) | Ρρ (Rho) | R (Romeo) |
| ש (Shin) | Σσς (Sigma) | Sch (Shift) |
| ת (Tav) | Ττ (Tau) | T (Tango) |
| Υυ (Epsilon) | Y (Yankee) | |
| Φφ (Phi) | F (Foxtrot) | |
| Χχ (Chi) | X (X-Ray) | |
| Ψψ (Psi) | ps (Postscript) | |
| Ωω (Omega) | O (Oscar) |
piano imagemap test
Labels
2026-01-14
AlefBet AlphaBet Alfabet (navy flags)
2026-01-11
Das schöne Latein muss gehen
Einige Lateinlehrer_inmen waren damals traurig und wütend.´
Allerdings glaube ich, dass die wenigsten Latein je sinnerfassend lesen erlernten und eine Kultur, die sich vom Kriegsgott Mars (Ares griechisch) ableitet und mit einem Brudermord beginnt von 2 Brüdern, die von einer Wölfin gesäugt wurden, sehr kritisch gesehen werden muß. (Im antiken Griechenland gab es meines nach keine Stadt unter der Schutzherrschaft des Ares, ich glaub nicht einmal Sparta.)
Das Niederbrennen auf die Grundmauern von karthago und Salz in die Erde streuen, gehört eher in die Geschichte der größten Genozide eingereiht und kaum zu den großen Heldentaten.
Ebenso würde heutzutage niemand dem Einsatz der Armee im Inneren (frei: aliae iactae sunt) und Entmächtigung der Demokratischen Instiutionen und Ernnennung zum siegenden Imperator was abgewinnen.
Kaiser Constantin (der Mann der das Christentum legalisierte, hoc signo vice) gründete übrigens Ostrom (Konstantinopel) und vertschaffte dem griechischen Teil des rönischen Reichs noch 1000 weitere Jahre an Lebenszeit. Die Pferderennbahn Hippodrom, die Hagia Sophia, Biblotheken und Theater machten doch einen wesentlich sympathischeren Eindruck als die Arena in Rom.
[Geht bald weiter ...]
2025-12-25
Office web products at different providers
Microsoft Office 365
Google Docs
https://docs.google.com/
https://sheets.google.com/
https://forms.google.com/
https://docs.google.com/videos/
https://docs.google.com/presentation/
https://drive.google.com/
Office Docs for Chrome
https://www.offidocs.com/Opendesk
Nextcloud Office
2025-12-12
DB scenarios with heavy load and a lot of idle time
When it comes to distributing the load between database and application server, web server, and internal report servers, often various approaches were discussed some purely by ideology driven.
Some realistic real world examples:
- Nearly all load should be in the memory of application and web servers
with many dynamic objects, and almost NO load should hammer the database. - Only Entity Framework Core
- No EFCore at all, because only Stroed Procedures can be administrated more secure. and last but not least can guarantee atomicity, fetch of reduced result sets, that you really need and NOT huge views from the entire database.
- Optimized stored procedures with execution plan sniffing will solve heavy load problem.
- Entity Framework Core with stored procedures is also must have for 4.
- EFCore SProcs is only a nuget package of unknown origin, I only trust Microsoft.
- Can you search git please: https://github.com/verdie-g/StoredProcedureEFCore
Ah, origin seems to be very clear for me. - This package is archived since 22.10. MS can do it directly:
https://stackoverflow.com/questions/28599404/how-to-run-stored-procedures-in-entity-framework-core - Reducing wait time of (dead-)locks in case of only read access
by uncommittable reads, that totally avoid table and row locks - Fast memcaches to partially buffer the database
only write-through works
must implement lazy loading strategies
clever buffering, instead fully write through - ...
but not in scenario 2.
If you want for your external business application in a scenario 2 (most cloud databases are optimized on relational data and databases are stored often on a seperated optimized disk in raw format, so this is already a performance advantage to c:\*.mdf;*,ldf, where all windows services and system programs permantly have high IO, see https://youtu.be/ybNXf4t4zT4)
then contact cloud pilots to see your database in azured mediterranean sea or tech racer to get more amazon power, instead under heavy violent high-pressure thunderstorms.
If you like more european clouds, I found https://clouding.io/ in Barcelona and transfered Paris amazon location to it. Spanish cloud in Madrid and US in west virginia is still amazon.
You know why?
Because a lot of companies with 1-2 business application mostley hammer their own database from inside and produce them self a lot of traffic and database load, because they want to keep their business important.
Moving an application and database to the cloud is truly truthfulness,because it allows you to better understand attitudes of customers, internal users and bots, who visit your application. A realisitc view is better to plan for the future and rethink strategies of re-.growing your business. If you want to make direct SQL-Queries like in scenario 1 from your local network, you could easy build a VPN to synced database in the cloud.
If you want to grow, you can dynamically and quickly scale up CPUs, memory, and disk space in the cloud.
2025-12-02
Trump already might have replaced some content of 20th G20 Summit with Ads for 21st G20 Summit in Trump National Doral Miami
The 20th G20 Summit 2025 just took place on November 22-23, 2025, in Johannesburg, South Africa. Guests were United Arab Emirates. A photo gallery under a Creative Commons license is available on Wikipedia: https://commons.wikimedia.org/wiki/Category:2025_G20_Johannesburg_summit
The next G20 Summit (the 21st since G20 inception) will be organized in USA Miami at Trump National Doral Miami on December 14-15, 2026.
The G20 website, https://g20.org/, was immediately taken over by US President Trump, who runs advertisements for the next 2026 #G20 #MiamiSummit. Content from this year's G20 Summit moved to Wikipedia and other websites.
G20 2025 page listed on Wikipedia as being added active on November 27th https://de.wikipedia.org/wiki/G20-Gipfel_in_Johannesburg_2025#Weblinks referring to https://g20.org/wp-content/uploads/2025/11/2025-G20-Summit-Declaration.pdf is already offline.
A replacement page is available here: https://brics-plus-analytics.org/g20-leaders-adopt-summit-declaration/ but the generated document appears to have been quickly recreated using Adobe Publisher without document properties:
since Google cache is now only for internal use by Google developers, unfortunately,
2025-11-25
A simple piano image map with javascript in blog header
see blog header, or https://area23.at/piano/
I don't have good enough piano notes, can someone help with sounds / samples?
other urls
2025-11-22
Conext of Putin in german media
Before 2016 Russia Today RT wanted to win more left wing activists for Putins (Kremlins) Propaganda, see: https://www.youtube.com/watch?v=1JmV-6zMbs4
From 2013-2016 Julian Assange & Edward Snowden where shown at intro of RTs Going Underground.
Berthold Kohler, November 21, 2025 Reading time: 2 min.
Is Trump listening to the Europeans? If not, then they must support Ukraine so that it can remain the first bulwark in the defense of Europe against Russian imperialism.
|
Berthold Kohler, November 21, 2025 Reading time: 2 min. The White House's claim that the so-called peace plan for Ukraine is not only good for Russia, but also for the Ukrainians, is cynical enough to come straight from the Kremlin, as are the 28 points of the document. They represent a complete capitulation not only of Ukraine, but also of the free West to the aggressor. The American president is now seriously issuing an ultimatum not to Moscow to end its war of aggression—as he once did, only to let it expire without consequence—but to the invaded nation The Europeans were surprised by the pact. |
Swedish Prime Minister Ulf Kristersson warns against strategic impatience in the West and calls for a tougher European response to Russian hybrid attacks. "Russia is no harder to read than before the invasion. Many should have taken Putin more seriously, especially in Germany. Moscow is agitating directly and through proxies to sow uncertainty. In the Ukraine war, the Kremlin is counting on our impatience. On us saying: 'This war cannot be won.' Or: 'We need the money for social programs.' He hopes time will work in his favor – and that we won't use frozen Russian assets," Kristersson told Der Spiegel.
Epilog
Believe me - or not - I wasn't quiet happy, when Edward Snowden turned to Russia...
and I'm not happy either, when conservative quality media begin to gain tendencies for Putin & Russia1
2025-10-21
Steuer- und Gebührenerhöhungen aufgrund steigender Sozialvericherungs- und Pensionskosten in Österreich
Um das #Budget zu #sanieren, veranlasste diese Regierung 2025 folgende Gesetze:
Kapitalertragssteuer #KEST Erhöhung von 20% auf für Spareinlagen 25% für Wertpapiere EU 27.5% Wertpapiere USA 12.5% fließen nach Österreich, US-Steueranteil fließt zu US-treasury
#Krankenversicherung für ASVG, GSVG und BSVG #Pensionisten von 5,1% auf 6%. #Umwidmungzuschlag #Umsatzsteuergesetz 1994 Umsatzsteuer für Kleinstunternehmer < 55.000€ von 20% auf 0%
#Einkommensteuergesetz 1988 #Grunderwerbssteuergesetz 1987 #Bundesabgabenordnung #Stifungseingangssteuergesetz #Glückspielgesetz #Gebührengeset von 1957 Führerscheine von 60,5€ auf 90€ Zulassungsscheine von 119€ auf 178€ Personalausweise und Reisespässe dürften nicht wesentlich teurer werden, da eine wesentliche Verteuerung bereits gekippt wurde
#Motorbezogene Steuer je nach Motorisierung und Gewicht (nur bei Elektormotoren) des Fahrzeuges.
Ausgaben in Mio € +%Δ PV Mio € +Δ% gesamt Jahr Pension / 5 anno SV all / 5 anno 1980 5.469 9.437 1985 8.385 53,32% 13.931 47,62% 1990 11.784 40,54% 18.402 32,09% 1995 16.438 39,49% 24.863 35,11% 2000 20.360 23,86% 29.692 19,42% 2005 24.149 18,61% 34.764 17,08% 2010 32.895 36,22% 42.888 23,37% 2015 40.256 22,38% 74.590 73,92% 2020 47.261 17,40% 82.389 10,46% 2024 63.585 34,54% 93.093 12,99%
Im Vergleich dazu Mindestsicherung und Sozialhilfe
OENB Report BIP
2025-10-20
Die Anzahl der Anordnungen der Elemente einer endlichen Menge
Prolog
Wenn Studenten im Sommersemster 1992 in der Vorlesung Graphentheorie und Kombinatorik von Prof. Gerd Baron lauter wurden, nebenbei am Laptop für andere Übungen zu koodieren begannen oder sich zu unterhalten oder zu Essen begannen, dann wiederholte Professor Baron mit lauter Stimme:
Wir haben hier ein Universum und es geht um
die Anzahl der Anordnungen der Elemente einer endlichen Menge.
We have a universe here and
it's all about of the number of combinations of items in a finite set.
Professor Baron war für die Entstehung der Vorlesung + Übung Graphentheorie und Kombinatorik als zusätliches Fach zu Analysis, Algebra und linearer Algebra für Informatiker mitentscheidend. Prof. Baron war der Meinung, dass Graphentheorie (inklusive gewichteter Pfade + Adjazenzmatrix Darstellung) für Informatiker wegen Verständnis von Routing Tabellen ip routing graph und Suche nach dem kürzestem Routing Pfad und Algorithmen wie dem traveling salesmen essentliell seien und Kombinatorik für Informatiker wegen oft vieler fast gleichwertiger Lösungsmöglichkeiten essentiell sei:
In den Jahren 2021-2023 [ CV ] implementierte ich nach der Idea von Georg Toth mit ihm gemeinsam SUPU (SUdocu PUzzle). Für das Feature "Game Automation", wo der Computer die Hälte des Spielbretts automatisch vorlegt und der Spieler nur noch die obere Hälfte selbst setzen muss. brauchte ich eine heuristischen einfachen, aber genügend performanten Algorithmus mit lauter unterschiedlichen Kombinationen pro Durchlauf für den Computer und ich erinnerte mich an Professor Baron.
Nach einem Treffen mit meinem alten Freund, dem Mathematik- und Physikprofessor Michael F. (der ebenfalls im Finanzsektor in der Londoner City tätig war), und unserem Gespräch über invertierbare Matrizen, wurde ich nachts mit einigen technischen Hilfsmittlen penetriert und äußerte meine Idee laut. Anstatt die Information jedoch nur Unbekannten (vielleicht russischen oder rechtsextremen Spionen) zukommen zu lassen, verfasste ich diesen Artikel, damit jeder, auch alle Partner in den USA, davon Kenntnis nimmt.
Einfachste Art AES nach oben zu skalieren:
Kombinieren mehrerer Blockciphers mit Permutation
Verschlüsselung: plain text ⟶ 3DES PBox → AES → 2-fish ⟶ cipher bytes
Entschlüsselung: cipher bytes ⟶ 2-fish → AES → 3DES SBox ⟶ plain text
plain text ⟶ AES ⟶ 2-fish⟶ 3DES PBox (scrambled) ⟶ base64 ⟶ cipher ascii
Entschlüsselung: (zuerst base64 oder uudecode und dann symmetrische Entschlüsselung)
cipher ascii⟶ base64 ⟶ 3DES SBox(scrambled) → 2-fish→ AES ⟶ plain text
Man kann jetzt natürlich durch Enumerierung der einzelnen Symmetrischen Cipher Algorithmen eine Pipe skizzieren:
3DES = 0x1
AES = 0x2
2Fish = 0x4
Serpent = 0x8
Hexedezimal 0x148 für Verschlüsseln bedeuted 0x841 für Entschlüsseln.
plain ⟶ (3DES→2Fish→Serpent) ⟶⟶ encrypted
encrypted ⟶ (Serpent→2Fish→3DES) ⟶ plain
Beispiele für Kombinationen von mehreren symmetrischen Ciffrier-Algoríthmen:
Mathematisches Lemma (Funktionentheorie) lautet in etwa:
Angenommen, es ∃ ein-ein-deutige deterministische umkehrbare Funktionen, wo es zu jeder Funktion y=F(x,...) eine entsprechende Umkehrfunktion x =f(y,..) gibt =>,
dann ∃ zur Funktionenkette y = F( G( H( I( J( K( L( M( N(x, ...)))))))))
die Umkehrfunktion x = n( m( l( k( j( i( h( g( f(y,...))))))))).
| Ansatz eines mathematischen Beweises |
Man kann jede Abbildung von ascii8 → ascii8
immer auch als Matrix vom R256 ➝ R256 betrachten.
Man kann jede Abbildung von ascii8 → ascii8
immer auch als Matrix vom R256 ➝ R256 betrachten.8-fache umkehrbare blockweise ver-/ent-schlüsselnde Funktionskette:
Probier einmal mein Online Webformular aus:
https://area23.at/net/Crypt/CoolCrypt.aspx
Github repository: github.com/heinrichelsigan/area23.at/
Ein einfacher Matrixverschlüsselungsalgorithmus von mir selbst:
Ich habe einen einfachen symmetrischen Matrixverschlüsselungsalgorithmus gefunden, der als einfache symmetrische Chiffre funktioniert mit NxN-Matrix-Transformation, nachdem ich diese Frage hier auf math.stackexchange.com/questions/4915786/ gestellt hatte.
Später entwickelte ich einen sehr einfachen Blockchiffre-Algorithmus namens ZenMatrix (um zu zeigen, dass ich selbst eine sehr einfache symmetrische Blockchiffre für die Ver- und Entschlüsselung schreiben kann)
R3 ➝ R3: v(3) x M(3,3) = v(3)
⎡ 1 ⎤ ⎡ 0 1 0 ⎤ ⎡ 2 ⎤
⎢ 2 ⎥ x ⎢ 0 0 1 ⎥ = ⎢ 3 ⎥
⎣ 3 ⎦ ⎣ 1 0 0 ⎦ ⎣ 1 ⎦
Inverse Matrix für umgekehrte symmetrische Verschlüsselung wäre:⎡ 2 ⎤ ⎡ 0 0 1 ⎤ ⎡ 1 ⎤
⎢ 3 ⎥ x ⎢ 1 0 0 ⎥ = ⎢ 2 ⎥
⎣ 1 ⎦ ⎣ 0 1 0 ⎦ ⎣ 3 ⎦
Ich habe einen einfachen symmetrischen Matrixverschlüsselungsalgorithmus gefunden, der als einfache symmetrische Chiffre funktioniert mit NxN-Matrix-Transformation, nachdem ich diese Frage hier auf math.stackexchange.com/questions/4915786/ gestellt hatte.
Später entwickelte ich einen sehr einfachen Blockchiffre-Algorithmus namens ZenMatrix (um zu zeigen, dass ich selbst eine sehr einfache symmetrische Blockchiffre für die Ver- und Entschlüsselung schreiben kann)
Es stehen nun weitere symmetrische Verschlüsselungsalgorithmen zur Verfügung!
Zuerst wollte ich die symmetrische Verschlüsselungspipeline nur mit AES, Blowfish, 2-Fish, 3-DES und ZenMatrix realisieren. Dann stieß ich jedoch auf die Legion von Bouncy-Castle, die mehrere Verschlüsselungen in einer Open-Source-Bibliothek anbietet, die auch hier auf GitHub verfügbar ist: https://github.com/bcgit. Daraufhin habe ich Area23.At.Mono mit dem Bouncy-Castle-Wrapper für 3DES, 2FISH, 3FISH, AES, Rijndael (entspricht AES) und Serpent neu geschrieben.
Später fügte ich der symmetrischen Verschlüsselungspipeline die folgenden Algorithmen hinzu, da ich sie im Bouncy-Castle-Paket gesehen hatte: Camellia, Cast[56], Gost28147, Idea, RC[26], RC532, Seed, Skipjack, Tea, Tnepres und XTea.
PermAgainCrypt [WinForm Demo]
Ich schrieb eine einfache WinForm-Anwendung mit reduziertem Framework-Code, um die grundlegende SymmCipher-Pipe-Verschlüsselung zu verstehen. Sie ist hier auf GitHub zu finden: https://github.com/heinrichelsigan/PermAgainCrypt
Wie viele Variationen sind möglich?
Bei zwei symmetrischen Verschlüsselungsalgorithmen
ohne Wiederverwendung wäre der Wert 2! = 2,
bei Wiederverwendung (z. B. Blowfish => Blowfish =>) 2² = 4.
Bei acht symmetrischen Verschlüsselungsalgorithmen ohne Wiederverwendung wäre der Wert 8! = 40,320, bei Wiederverwendung 8⁸ = 16,777,216.
In der oben beschriebenen symmetrischen Verschlüsselungspipeline mit nun 21 symmetrischen Verschlüsselungsalgorithmen wäre der Wert 2¹⁸ = 37,822,859,361,
da die Pipeline-Länge auf acht Stufen begrenzt ist.
Warum veröffentliche ich diesen Artikel?
Leider neige ich seit meiner Diagnose einer schizoaffektiven Störung im Jahr 2007 manchmal dazu, laut zu sprechen und habe oft Angst, abgehört zu werden. Selbst größere Unternehmen, bei denen ich angestellt war (ich habe ihnen seit 2007 von meinem Problem erzählt), meinten, ich hätte in diesem Fall nicht gegen die Vorschriften verstoßen, da ich davon ausgehe, dass wir hier nicht die DDR mit der Stasi haben und das laute Wiederholen von Betrugserkennungsregeln zu Hause kein Verbrechen ist. Einmal fühlte ich mich sehr unwohl und sprach laut meine Idee für ein besseres AES aus. Um zu vermeiden, dass nur einige Leute sie verstehen würden, schrieb ich einen einfachen Prototyp und schickte diesen Artikel dann an alte Freunde, die in US-Unternehmen arbeiten.
2025-10-17
Always less liberal democracy in west to Russia
Totalitarian in western democracies & partners:
- Trump fires as angry chief employees
- Reduce state employees of opposition
- Reduce old but still active judges of opposition
- Close fake printmedia, like CumHürriet (Erdogan),
or critizing print media like Orban. - Propagate smoking weed or drinking 3 beers as more criminal,
then crucial violence against civilist.
Totalitarian in Russia:
- Kill a highly deserving and respected army general Alexander Iwanowitsch Lebed with a ready to go from FSB, crash his helicopter because he is running as an opposition politician and is popular with the people.
Maybe his helicopter crashed just like that by ransomware. - Change the constitution, so that Putin can become president as many times as he wants, but not 3 periods continously.
- If chess world champion Garry Kimovich Kasparov demonstrates with a few old intellectuals against that constitutional change, then throw him in jail for three weeks on suspicion of terrorism.
- Use dioxin against the new Ukrainian president during the first orange revolution. if Ukraine wants to turn more to Europe.
- Invade Crimea if Ukraine wants another time to be nearer to EU and hold a quick refverendum vote. while many Russian soldiers in civilian clothes cross the border into Crimea and keep watch.
- Expropriate oligarchs, if they want to form left-liberal parties against Putin and put them in prison.
- Kill agents with plutonium, that want to flee to the west.
- Support Assad and Muammar al-Gaddafi in the Arab Spring by advising them to fake soldiers as even more radical ISIS jihadists. (ISIS never fighted Assad or Hezbollah or Revolutionary guards, only Kurds and FSA). Give your partners air support and carry out brutal ground-to-air attacks.
- After your German supporters (only some not all former SED and few far right) push Bibi and Erdogan out of the western circle, threaten them, but say you mean well. Have the German supporters attempt a coup against Erdogan after he shoots down a MIG or even a stealth SU-57 in Turkish airspace.
- Murder Kazakh ambassador Rakhat Aliyev in prison in Vienna because he disloyally wanted more support from the West.
- Make Europe 99,7% gas dependent on Russia.
- Transfer frozen Gazprom Assets from the City of London to the moscow stock exchange.
- Have a local female politician threaten the former tourism djinn and current Bonesman Skeleton, telling him to be careful not to lose his two sexy legs, because exiled russian businessman like him.
Conclusio:
The idea from Putin as strong man, who takes, what ever he wants efficient persistent, stubborn brutal without remorse and the disgust with democratic political correctness and human rights unfortunately make Putin's image impersonate mainly in the West and turn some (not all) honest republicans into reptilian shotgun outlaws.Epilog:
I have seen at least zero Putin mania.
Putin says "NJET 100%" and plays so long power games, even help warlords,
"I want even have other business partners, but you are important".
2025-10-13
EU Charter of Fundamental Rights
Article 1 - Human dignity
It results that none of the rights laid down in this Charter may be used to harm the dignity of another person, and that the dignity of the human person is part of the substance of the rights laid down in this Charter. It must therefore be respected, even where a right is restricted.
Article 2 - Right to life
1. Everyone has the right to life2. No one shall be condemned to the death penalty, or executed.
Article 3 - Right to integrity of the person
1. Everyone has the right to respect for his or her physical and mental integrity.2. In the fields of medicine and biology, the following must be respected in particular:
(a) the free and informed consent of the person concerned, according to the procedures laid down by law;
(b) the prohibition of eugenic practices, in particular those aiming at the selection of persons;
(c) the prohibition on making the human body and its parts as such a source of financial gain;
(d) the prohibition of the reproductive cloning of human beings.
Article 4 - Prohibition of torture and inhuman or degrading treatment or punishment
No one shall be subjected to torture or to inhuman or degrading treatment or punishment.Article 5 - Slavery / Forced Labour
1. No one shall be held in slavery or servitude.2. No one shall be required to perform forced or compulsory labour.
3. Trafficking in human beings is prohibited.
Article 6 - Right to liberty and security
Everyone has the right to liberty and security of person.Article 7 - Respect for private and family life
Everyone has the right to respect for his or her private and family life, home and communications.Article 8 - Protection of personal data
1. Everyone has the right to the protection of personal data concerning him or her.2. Such data must be processed fairly for specified purposes and on the basis of the consent of the person concerned or some other legitimate basis laid down by law. Everyone has the right of access to data which has been collected concerning him or her, and the right to have it rectified.
3. Compliance with these rules shall be subject to control by an independent authority.
Article 9 - Right to marry and right to found a family
The right to marry and the right to found a family shall be guaranteed in accordance with the national laws governing the exercise of these rights.Article 10 - Freedom of thought, conscience and religion
1. Everyone has the right to freedom of thought, conscience and religion. This right includes freedom to change religion or belief and freedom, either alone or in community with others and in public or in private, to manifest religion or belief, in worship, teaching, practice and observance.2. The right to conscientious objection is recognised, in accordance with the national laws governing the exercise of this right.
Article 11 - Freedom of expression and information
1. Everyone has the right to freedom of expression. This right shall include freedom to hold opinions and to receive and impart information and ideas without interference by public authority and regardless of frontiers.2. The freedom and pluralism of the media shall be respected.
Article 12 - Freedom of assembly and of association
1. Everyone has the right to freedom of peaceful assembly and to freedom of association at all levels, in particular in political, trade union and civic matters, which implies the right of everyone to form and to join trade unions for the protection of his or her interests.2. Political parties at Union level contribute to expressing the political will of the citizens of the Union.
Article 13 - Freedom of the arts and sciences
The arts and scientific research shall be free of constraint. Academic freedom shall be respected.Article 14 - Right to education
1. Everyone has the right to education and to have access to vocational and continuing training.2. This right includes the possibility to receive free compulsory education.
3. The freedom to found educational establishments with due respect for democratic principles and the right of parents to ensure the education and teaching of their children in conformity with their religious, philosophical and pedagogical convictions shall be respected, in accordance with the national laws governing the exercise of such freedom and right.
Article 15 - Freedom to choose a job and right to engage in work
1. Everyone has the right to engage in work and to pursue a freely chosen or accepted occupation.2. Every citizen of the Union has the freedom to seek employment, to work, to exercise the right of establishment and to provide services inany Member State
3. Nationals of third countries who are authorised to work in the territories of the Member States are entitled to working conditions equivalent to those of citizens of the Union.
Article 16 - Freedom to conduct a business
The freedom to conduct a business in accordance with Union law and national laws and practices is recognised.Article 17 - Right to property
1. Everyone has the right to own, use, dispose of and bequeath his or her lawfully acquired possessions. No one may be deprived of his or her possessions, except in the public interest and in the cases and under the conditions provided for by law, subject to fair compensation being paid in good time for their loss. The use of property may be regulated by law in so far as is necessary for the general interest.2. Intellectual property shall be protected.
Article 18 - Right to asylum
The right to asylum shall be guaranteed with due respect for the rules of the Geneva Convention of 28 July 1951 and the Protocol of 31 January 1967 relating to the status of refugees and in accordance with the Treaty on European Union and the Treaty on the Functioning of the European Union (hereinafter referred to as 'the Treaties').Article 19 - Protection in the event of removal, expulsion or extradition
1. Collective expulsions are prohibited.2. No one may be removed, expelled or extradited to a State where there is a serious risk that he or she would be subjected to the death penalty, torture or other inhuman or degrading treatment or punishment.
Article 20 - Equality before the law
Everyone is equal before the law.Article 21 - Non-discrimination
1. Any discrimination based on any ground such as sex, race, colour, ethnic or social origin, genetic features, language, religion or belief, political or any other opinion, membership of a national minority, property, birth, disability, age or sexual orientation shall be prohibited.2. Within the scope of application of the Treaties and without prejudice to any of their specific provisions, any discrimination on grounds of nationality shall be prohibited.
Article 22 - Cultural, religious and linguistic diversity
The Union shall respect cultural, religious and linguistic diversity.Article 23 - Equality between women and men
Equality between women and men must be ensured in all areas, including employment, work and pay. The principle of equality shall not prevent the maintenance or adoption of measures providing for specific advantages in favour of the under-represented sex.Article 24 - The rights of the child
1. Children shall have the right to such protection and care as is necessary for their well-being. They may express their views freely. Such views shall be taken into consideration on matters which concern them in accordance with their age and maturity.2. In all actions relating to children, whether taken by public authorities or private institutions, the child's best interests must be a primary consideration.
3. Every child shall have the right to maintain on a regular basis a personal relationship and direct contact with both his or her parents, unless that is contrary to his or her interests.
Article 25 - The rights of the elderly
The Union recognises and respects the rights of the elderly to lead a life of dignity and independence and to participate in social and cultural life.Article 26 - Integration of persons with disabilities
The Union recognises and respects the right of persons with disabilities to benefit from measures designed to ensure their independence, social and occupational integration and participation in the life of the community.Article 27 - Workers' right to information and consultation within the undertaking
Workers or their representatives must, at the appropriate levels, be guaranteed information and consultation in good time in the cases and under the conditions provided for by Union law and national laws and practices. Everyone is equal before the law.Article 28 - Right of collective bargaining and action
Workers and employers, or their respective organisations, have, in accordance with Union law and national laws and practices, the right to negotiate and conclude collective agreements at the appropriate levels and, in cases of conflicts of interest, to take collective action to defend their interests, including strike action.Article 29 - Right of access to placement services
Everyone has the right of access to a free placement service.Article 30 - Protection in the event of unjustified dismissal
Every worker has the right to protection against unjustified dismissal, in accordance with Union law and national laws and practices.Article 31 - Fair and just working conditions
1. Every worker has the right to working conditions which respect his or her health, safety and dignity.2. Every worker has the right to limitation of maximum working hours, to daily and weekly rest periods and to an annual period of paid leave.
Article 32 - Prohibition of child labour and protection of young people at work
The employment of children is prohibited. The minimum age of admission to employment may not be lower than the minimum school-leaving age, without prejudice to such rules as may be more favourable to young people and except for limited derogations. Young people admitted to work must have working conditions appropriate to their age and be protected against economic exploitation and any work likely to harm their safety, health or physical, mental, moral or social development or to interfere with their education.Article 33 - Family and professional life
1. The family shall enjoy legal, economic and social protection.2. To reconcile family and professional life, everyone shall have the right to protection from dismissal for a reason connected with maternity and the right to paid maternity leave and to parental leave following the birth or adoption of a child.
Article 34 - Social security and social assistance
1. The Union recognises and respects the entitlement to social security benefits and social services providing protection in cases such as maternity, illness, industrial accidents, dependency or old age, and in the case of loss of employment, in accordance with the rules laid down by Union law and national laws and practices.2. Everyone residing and moving legally within the European Union is entitled to social security benefits and social advantages in accordance with Union law and national laws and practices.
3. In order to combat social exclusion and poverty, the Union recognises and respects the right to social and housing assistance so as to ensure a decent existence for all those who lack sufficient resources, in accordance with the rules laid down by Union law and national laws and practices.
Article 35 - Health care
Everyone has the right of access to preventive health care and the right to benefit from medical treatment under the conditions established by national laws and practices. A high level of human health protection shall be ensured in the definition and implementation of all Union policies and activities.Article 36 - Access to services of general economic interest
The Union recognises and respects access to services of general economic interest as provided for in national laws and practices, in accordance with the Treaties, in order to promote the social and territorial cohesion of the Union.Article 37 - Environmental protection
A high level of environmental protection and the improvement of the quality of the environment must be integrated into the policies of the Union and ensured in accordance with the principle of sustainable development.Article 38 - Consumer protection
Union policies shall ensure a high level of consumer protection.Article 39 - Right to vote and to stand as a candidate at elections to the European Parliament
1. Every citizen of the Union has the right to vote and to stand as a candidate at elections to the European Parliament in the Member State in which he or she resides, under the same conditions as nationals of that State.2. Members of the European Parliament shall be elected by direct universal suffrage in a free and secret ballot.
Article 40 - Right to vote and to stand as a candidate at municipal elections
Every citizen of the Union has the right to vote and to stand as a candidate at municipal elections in the Member State in which he or she resides under the same conditions as nationals of that State.Article 41 - Right to good administration
1. Every person has the right to have his or her affairs handled impartially, fairly and within a reasonable time by the institutions, bodies, offices and agencies of the Union.2. This right includes:
(a) the right of every person to be heard, before any individual measure which would affect him or her adversely is taken;
(b) the right of every person to have access to his or her file, while respecting the legitimate interests of confidentiality and of professional and business secrecy;
(c) the obligation of the administration to give reasons for its decisions.
3. Every person has the right to have the Union make good any damage caused by its institutions or by its servants in the performance of their duties, in accordance with the general principles common to the laws of the Member States.4. Every person may write to the institutions of the Union in one of the languages of the Treaties and must have an answer in the same language.
Article 42 - Right of access to documents
Any citizen of the Union, and any natural or legal person residing or having its registered office in a Member State, has a right of access to documents of the institutions, bodies, offices and agencies of the Union, whatever their medium.Article 43 - European Ombudsman
Any citizen of the Union and any natural or legal person residing or having its registered office in a Member State has the right to refer to the European Ombudsman cases of maladministration in the activities of the institutions, bodies, offices or agencies of the Union, with the exception of the Court of Justice of the European Union acting in its judicial role.Article 44 - Right to petition
Any citizen of the Union and any natural or legal person residing or having its registered office in a Member State has the right to petition the European Parliament.Article 45 - Freedom of movement and of residence
1. Every citizen of the Union has the right to move and reside freely within the territory of the Member States.2. Freedom of movement and residence may be granted, in accordance with the Treaties, to nationals of third countries legally resident in the territory of a Member State.
Article 46 - Diplomatic and consular protection
Every citizen of the Union shall, in the territory of a third country in which the Member State of which he or she is a national is not represented, be entitled to protection by the diplomatic or consular authorities of any Member State, on the same conditions as the nationals of that Member State.2025-10-02
x86_64 and aarch64 arm cpu bugs
bhi
cpu_meltdown
eibrs_pbrsb
itlb_multihit
its
l1tf
gather_data_sampling
ghostwrite
indirect_target_selection
itlb_multihit
mds
mmio_stale_data
reg_file_data_sampling
retbleed
rfds
spec_rstack_overflow
spec_store_bypass
spectre_v1
spectre_v2
spec_store_bypass
srbds
swapgs
tsx_async_abort
2025-09-12
Exception handling in C#, Java, C++
C#
Java
C++
In C++ bad_cast, bad_alloc, bad_function_call, logic_error & runtime_error extend from exception.
Most common Exceptions in C++ extend from logic_error & runtime_error.b.