domain
stringlengths 2
38
| text
stringlengths 21
166k
| timestamp
stringlengths 20
20
| url
stringlengths 16
3.61k
| V3
stringclasses 15
values | label
stringclasses 15
values | probability
float64 0.07
1
|
---|---|---|---|---|---|---|
wikipedia
|
↑ His maps are lost but referenced in a letter by his nephew Jacques Noël, dated 1587 and printed by Richard Hakluyt with the Relation of Cartier's third voyage, in The Principall Navigations [...], London, G. Bishop, 1600.
↑ "Exploration — Jacques Cartier". The Historica Dominion Institute. Retrieved November 9, 2009.
↑ No baptismal certificate has been found, but Cartier stated his age in at least three letters. See Marcel Trudel, Histoire de la Nouvelle-France, Fides, vol. 1, p. 68.
|
2019-04-20T13:01:23Z
|
https://pa.wikipedia.org/wiki/%E0%A8%9C%E0%A8%BE%E0%A8%95_%E0%A8%95%E0%A8%BE%E0%A8%B0%E0%A8%A4%E0%A9%80%E0%A8%85%E0%A8%B0
|
Porn
|
Reference
| 0.990153 |
wordpress
|
This entry was posted on 24 November 2013 at 1:51 pm and is filed under Thinking Aloud. You can follow any responses to this entry through the RSS 2.0 feed. You can leave a response, or trackback from your own site.
|
2019-04-23T08:11:16Z
|
https://chrisrust.wordpress.com/2013/11/24/changing-direction/
|
Porn
|
Society
| 0.097854 |
livejournal
|
Пример: Kelly didn’t sleep a wink hoping he would come home soon.
Пример: Adam slept like a log until morning.
Пример: Don’t oversleep! Tomorrow is a great day for us.
Пример: I knew he has some sleeping giants.
Пример: It’s my day off and I want to sleep in, so don’t wake me up please.
Пример: Let me sleep on it.
Пример: The baby was sound asleep.
Пример: My husband is a real heavy sleeper, but I’m a light sleeper. I hear every single rustle.
Пример: We were wide-awake all night.
Пример: I fell into a very light catnap but sudden phone call woke me up.
Пример: Last night I couldn’t fall asleep, so I was tossing and turning till morning.
Пример: I’m really exhausted, so I’m gonna hit the hay now.
Пример: She lost her sleep over the terrible accident with her son.
Пример: Margo loves to have a beauty sleep every day.
|
2019-04-26T11:51:58Z
|
https://karlusha1986.livejournal.com/532250.html
|
Porn
|
Home
| 0.213848 |
wordpress
|
Soapstone smoking pipe in the shape of a bird’s head, possibly a loon.
This soapstone smoking pipe was recovered from the 17th century A.D. Strickler site (36LA3) in Lancaster County, Pennsylvania. There is an engraved silhouette of a bird on the “neck” of the pipe.
|
2019-04-19T18:38:13Z
|
https://virtualcurationmuseum.wordpress.com/digging-up-the-noxious-weed-the-archaeology-of-tobacco-smoking-pipes/susquehannock-indian-smoking-pipes/strickler-pipe/
|
Porn
|
Reference
| 0.379398 |
wired
|
The GeekDad team has been allowed to preview the upcoming Ghostbusters: Sanctum of Slime. The game seems like a great new addition to the Ghostbusters franchise, especially with the inclusion of four-player multiplayer mode. There are new weapons to use, along with your proton packs,__ and __they have added the ability to drive Ecto-1 through the streets and blast ghosts. We cannot wait for the game to be released, on most platforms, March 23rd.
|
2019-04-26T02:37:49Z
|
https://www.wired.com/2011/03/ghostbusters-sanctum-of-slime-wreaks-new-ghostbustin-havoc/
|
Porn
|
Games
| 0.871974 |
wordpress
|
The name of the Forum shall be the Chatsworth Road Area Neighbourhood Forum, referred to in the rest of this constitution as the Forum.
The Forum will pursue its objectives in the area known as The Chatsworth Road Neighbourhood (see map attached) for the benefit of the inhabitants of the area including business operators, properly constituted community and voluntary groups and individual residents.
To prepare in partnership with the local planning authority a neighbourhood plan for the area or in partnership with other forums any wider area.
to foster community spirit and encourage civic pride.
Invite and receive contributions and raise funds where appropriate, to finance the work of the Forum, and to open a bank account to manage such funds.
Take any form of action that is lawful, which is necessary to achieve the objectives of the Forum, including taking out any contracts which it may see fit.
Members will apply for membership and the Management Committee shall have the power to accept members.
The Management Committee may refuse membership, or may terminate or suspend the membership of any member by resolution passed at a Management Committee meeting where it is considered membership would be detrimental to the objectives and activities of the Forum.
Membership is open to all who live in the area of benefit of the Forum.
Membership is open to all business operators in the area of benefit of the Forum – Business operators must nominate up to two people in their membership application to exercise one voting right at Forum meetings as set out in clause 6 of this constitution.
Membership is open to all constituted voluntary and community groups which operate in the area of benefit of the Forum. Voluntary and Community groups must nominate up to two people in their membership application to exercise one voting right at Forum meetings as set out in clause 6 constitution.
Membership is open to elected Council members who represent wards in the area of benefit of the Forum.
Membership shall be drawn from different places in the area of benefit and different sections of the community in the area of benefit.
Any member of the Forum may resign his/her membership by providing the Secretary with written notice.
The forum shall have a minimum of 21 members before any decision on neighbourhood planning may be made. The Secretary shall maintain a register of members at all times and publish this online.
All the members of the Forum shall be invited to general meetings at least four times per year.
For general meeting business to be conducted, a quorum of twenty one 21 members must be present at the meeting.
One of the general meetings of the forum held shall be its annual general meeting (AGM) where the management committee will be elected and a report of activities in relation to each of the Forums objectives by the Chairperson and a statement of income and expenditure will be presented by the Treasurer.
For AGM business to be conducted, a quorum of at least 50% of the membership must be present at the meeting.
All members are entitled to vote at the AGM. Voting shall be made by a show of hands on a majority basis. In the case of a tied vote, the Chairperson or an appointed deputy shall make the final decision.
All members shall be given at least twenty eight (28) days’ notice of when a meeting is due to take place by either e mail or text and all meetings will be publicised on the Forum web site and via notices posted in Homerton Library, Chats Palace , Nye Bevan Community Hall and Wally Foster Community Centre.
Special Meetings may be called from time to time by the Management Committee solely to consider amendments to the constitution or dissolution of the Forum. These shall be subject to the same rules as for conduct of Annual General Meetings.
The Management Committee shall meet at least 6 (six) times a year. Meetings shall enable the Committee members to discuss actions and monitor progress to date, and to consider future developments.
All members shall be given at least fourteen (14) days’ notice of when a meeting by e mail or telephone, or as otherwise agreed at a meeting of the Management Committee.
Five committee members must be present in order for a meeting to take place.
The Forum shall be administered by a management committee of no less than five people and no more than fifteen (15), who must be at least 18 years of age.
Members of the Management Committee will be elected for a period of up to one year, but must stand for re-election at the Forum’s AGM.
The Chair- It shall be the responsibility of the Chairperson to chair all meetings or a designated deputy in his/her absence. And to ensure that meetings are held in accordance with the provisions of the Forum constitution.
The Treasurer – It shall be the responsibility of the Treasurer to ensure that the finance provisions of the constitution (see clause X below are) carried out.
The Secretary – It shall be the responsibility of the Secretary to keep a register of members, ensure that minutes are taken of all Management Committee, Special General and Annual General meetings and that the minutes are accessible to all members via the Forum’s website.
Any money acquired by the Forum, including donations, contributions and bequests, shall be paid into an account operated by the Management Committee in the name of the Forum .
All funds must be applied to the objectives of the Forum and for no other purpose.
Bank accounts shall be opened in the name of the Forum. Any deeds, cheques etc relating to the Forum’s bank account shall be signed by at least two (2) of the following committee members: Chairperson; Treasurer; Secretary.
Any income/expenditure shall be the responsibility of the Treasurer who will be accountable to ensure funds are utilised effectively and that the Forum stays within budget.
Official accounts shall be maintained, and will be examined annually by an independent accountant who is not a member of the Forum.
An annual financial report shall be presented at the AGM. The Forum’s accounting year shall run from 01 April to 31 March.
Any decision to undertake, consult on or submit to the local planning authority for approval any neighbourhood Plan shall be subject to a vote at a General meeting of the forum.
All consultation on the Neighbourhood Plan will be subject to all residents and businesses whether members of the forum or not.
The forum shall set up a website to publicise the neighbourhood planning process, record it and seek views of the public.
The management committee shall be delegated to work with the local planning authority and any independent experts and advisors on the neighbourhood plan as they see fit.
At the discretion of the Forum a “Neighbourhood Plan Team” can be delegated the tasks of preparing the Neighbourhood Plan as outlined in 10a) above.
The membership of this team shall be decided by a full meeting of the forum and the team may co- opt members as it sees fit.
Any changes to this constitution must be agreed by a majority vote at a special general meeting, called specifically for the purpose under the same conditions that apply to Annual General meetings specified above.
the Secretary formally in writing. The Secretary and other officers shall then decide whether to put the proposed amendments to a special general meeting of the Forum for discussion .
returned to their providers or transferred to local charities or similar groups at the discretion of the Management Committee.
|
2019-04-26T17:04:34Z
|
https://chatsworthroadplan.wordpress.com/the-forum-connstitution/
|
Porn
|
Business
| 0.824448 |
wordpress
|
Santa Cruz County is a region shaped by an abundant bay, naturally rich soils, an evolving cultural landscape, an economy rooted in natural resources and something that has tied them all together: Food.
The Santa Cruz Heritage Food Project brings all these components together. This project illuminates the history and culture of Santa Cruz County through the lens of food, which opens up stories of history, culture, geography, and taste. We hope to tell a compelling story that can help millennials living here—like ourselves—link to the history of the County in a way that is accessible and delicious. As part of this effort, we are writing a book to share the information we have gathered. This book, expected in Summer 2017, is full of local history and local historical recipes. It is the book we wanted to read, but could not find on the shelves.
To explore these foods we are looking at how they got here, who cultivated them, how they were used, and how they were/ are grown and produced. We are also researching economic histories, environmental impacts and interesting stories we discover along the way. We don’t intend to highlight everything we come across – only that which we find fascinating, heartwarming, and a value to the community. The project will include a call for recipes and old family stories and pictures that showcase the diverse ways these foods have been used in Santa Cruz. While many local recipe and history books have been written, we see this as a new opportunity to celebrate our food traditions, and unite education with pleasure.
Jody Biergiel Colclough came to Santa Cruz to participate in the organic food movement. After two years on the East coast earning her MS in Food Science, she hurried back to coastal California. In addition to working as an organic certifier, she has sat on the Board of Slow Food Santa Cruz, and spends as much time procuring, preparing and consuming the foods of the region as she can. She gets to indulge her love of reading and history with the Heritage Food Project.
She is researching sugar beets, dry-farmed tomatoes, and poultry for the Project.
Sierra Ryan grew up in Live Oak on land that her family used to farm. After spending six years away to earn her BA and MS, Sierra returned in 2007 ready to become more involved in the community. Her career is focused on water resources, and through that line of work the importance of agriculture – both current and historical – to the region became obvious. While trained as a scientist, Sierra grew up with a love of local history. The Heritage Food Project is an opportunity to explore local history and local agriculture – and indulge in some fine dining at every opportunity.
She is researching apples, brussels sprouts, artichokes, & clams for the Project.
If Liz Birnbaum had a million dollars, she would be doing exactly what she is doing now: living in Santa Cruz, connecting with and working to entertain the community, and biking the coast. Her passion is food, and that has taken the form of food history and community engagement. She works to build community through telling stories about the deeper histories of food through her project, The Curated Feast. She has worked at local organic farming non-profits, on farms, in classrooms, on wilderness trips, and in art galleries through her varied career. She loves funneling some of her energy toward the Heritage Food Project because she keeps finding more stories to unravel.
She is researching wine, wheat, and potatoes for the Project.
Katie (Lang) Hansen is a dietitian who loves all things related to food. She was formerly on the board of Slow Food Santa Cruz and currently is taking a break from her work in diabetes education to stay at home with her toddler.
She is researching berries for the Project.
We are history researchers, but we also have a history as a group. In 2012, Jody Biergiel Colclough and Sierra Ryan founded this project as a way to explore the foods of the region and to share their passion for local food. Sierra was born and raised in Santa Cruz and studies water and wetlands. Jody came to Santa Cruz to participate in the organic food movement.
In 2013, more folks who shared the passion that sparked this venture joined: Liz Birnbaum, Katie Lang, Stephanie Haas, and Jenni Veitch-Olsen came on board to research more crops. Liz was the Chairperson of Slow Food Santa Cruz for 2 years and she has researched and curated several food exhibits, runs The Curated Feast, works to support organic farmers. Katie participated on the Board of Slow Food Santa Cruz, and as a native Santa Cruzan has many local connections to share with the project. Stephanie is an avid home brewer, canner, and blogger. Jenni has graduate level training and university experience in cultural history, is no stranger to archives, public records, historical societies, and brings interviewing experience to the Project.
This project was founded in collaboration with Slow Food Santa Cruz.
We have been greatly helped by a number of local resources, but especially: Ag History Project, the Santa Cruz Public Library, Researchers Anonymous, and the Museum of Art and History.
|
2019-04-23T06:33:13Z
|
https://scheritagefood.wordpress.com/about-the-project/
|
Porn
|
Science
| 0.524765 |
wordpress
|
Sandra Rupp was placed on the THINKERS50 Guru Radar list for the world’s top business thinkers. Support her with a Vote at www.thinkers50.com She is an Executive Coach & Media Presenter at Parthenon Advisors with an MBA from Kellogg. She also studied at Oxford. She also has many years of experience in media, marketing & executive search, working with Fortune 100 companies where she placed some of the world’s top innovators. She has been using Dove since she was born, admires Paul Polman’s work on #Sustainability & is confident she can find 30%+ ladies for his ULE Team. She is even willing to double the size of the team to #PaintItPurple Sandra Rupp’s digital assets are across the web. Yin/Yang.
Sir Martin’s impressive business at WPP Group includes global advertising, digital & consumer insights businesses. Sir Martin & I have shared a few colleagues & clients in common.
“Sandra Rupp is The Feminine Leader Voice.” In 2011 Sandra was placed on the Cover of the Davos Debates Video when she stated “Investing in & Empowering The Feminine Leadership Style is the largest economic opportunity worldwide.” Later that year she was placed on the THINKERS 50 Radar list for World’s Top Business Thinkers. She has been recording videos ever since with her background in Media Presenting, Executive Coaching & Leadership Advisory (MBA Kellogg, studied International Business & Art at Oxford). Sandra is inviting key CEOs to work with her to appoint 30% Women to their CEO Teams & bring two female delegates to World Economic Forum to show the other CEOs how it’s done. Meantime she is inviting all CEOs to interview with her on camera in Naples, FL.
My Goal: to get 30% Women and myself to Davos, and I think these two CEOs are most likely to help me, along with CEOs Paul Polman of Unilever, Michael Dell & Michael Corbat of Citi (we are all interconnected, watch for more videos during #WEF).
CEOs to work with Ms. Rupp as a Leadership Advisor or interview on camera in South Florida please visit www.parthenonadvisors.com Subscribe to social media at www.sandrarupp.com @ExecCareerCoach on Twitter and @CareerExpert on YouTube, Sandra has had Top Videos for #Davos and #WEF four years in a row, and will record a video during DAVOS on the CEOs and the % Ladies at Davos 2015. The list of delegates will be made public on January 14th via the World Economic Forum site and Quartz website. Many thanks to #WEF and to #FT, #FastCompany & all of you for watching! Yin/Yang = 21st Century Success.
|
2019-04-21T08:17:11Z
|
https://sandrarupp.wordpress.com/category/advertising/
|
Porn
|
Business
| 0.767234 |
wordpress
|
Dr Robert Warwick I split my time between running my own organisational development company (Metis Exploration Ltd) and academia. Previously I was Head of Strategic Change for NHS Blood and Transport, a national body within the UK’s healthcare system. I have held senior management roles in occupational health and safety, and prior to the NHS had held a number of consultancy roles. My first degree was in microbiology and virology and I have an MBA. I graduated with a doctorate in management having studied at the Complexity and Management Centre, University of Hertfordshire, UK in 2010. My dissertation was titled The Experience of Policymaking in Healthcare: the interaction of Policy Formulation and Frontline Staff Practice.
Dr Douglas Board I completed 18 years in executive search, including being deputy chairman of a 50 person London-based firm. I set up a new business in career change and was chair of Britain’s largest refugee and asylum charity. I have degrees in mathematics and statistics, and the first ten years of my career was spent as a policy adviser in the Treasury. I graduated with a doctorate in management having studied at the Complexity and Management Centre, University of Hertfordshire, UK in 2010. My dissertation was titled Senior Selection Interviewing:From Individual Skill and Intuition to Habitus and Practice.
|
2019-04-20T00:44:54Z
|
https://leadershipandknowledge.wordpress.com/about-us/
|
Porn
|
Business
| 0.680694 |
wordpress
|
The only thing better than BitTorrent is more BitTorrent, which is why we created BitTorrent Plus. Because we appreciate you, our loyal, dedicated fans, we decided to give away five BitTorrent Plus subscriptions (a $24.95 value each), good for one year, as our way of saying “thank you” for supporting our technology for more than a decade.
To enter for a chance to win a year’s subscription to the finest torrent client around, all you have to do is show your support for BitTorrent somewhere on the Web (see below for details, subject to our contest rules here). You can get up to 4 entries (1 for each task you complete) and winners will be chosen at random from the eligible entries as of 5:00 pm, PST on May 1, 2012. So, the more of a social demon you are, the better your odds. Ready?
2) Like us on Facebook. If you already like our page, simply post a comment.
3) Follow us on Pinterest.
Winners will be contacted on Friday, May 4th. Good luck!
1) You can set up a remote account and access your BitTorrent library anytime, from anywhere, and from any device that has a supported browser.
2) Since Plus supports most popular file formats, you can view your HD content as it was meant to be: in high-definition. That’s like having an HDTV on your computer (plus, it’s much less expensive).
4) Protect your PC and torrent library from viruses. Not all files are safe. With BitTorrent Plus, your torrent content is scanned, keeping your downloads safer from viruses, malware and other threats.
*- Television playback when combined with Apple TV, Xbox, or PS3.
Everything else you need to know about BitTorrent Plus can be found here.
This entry was written by BT, posted on April 25, 2012 at 11:13 am, filed under Uncategorized. Bookmark the permalink. Follow any comments here with the RSS feed for this post. Post a comment or leave a trackback: Trackback URL.
This is a great chance to win Bittorent plus subscription. With increasing scrutiny over torrents, this is what is required by me now. Badly.
Hello, I’m a blind user of a computer and I’ve been really saddend by Torrent’s lack of accessibitly that’s been taken in Torrent? I’m not able to read the main menu bar and I’m unable able to read the what’s new, Can you please pass this on to a Torrent programmer if you arn’t one.
Yes, absolutely. We apologize for the lack of accessibility and will take steps towards correcting this issue.
|
2019-04-19T07:23:50Z
|
https://port6969.wordpress.com/2012/04/25/win-bittorrent-plus-for-a-year/
|
Porn
|
Computers
| 0.096783 |
google
|
2014-12-03 Assigned to I.D. SYSTEMS, INC. reassignment I.D. SYSTEMS, INC. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: EHRMAN, KENNETH S., EHRMAN, MICHAEL L., JAGID, JEFFREY M., LOOSMORE, NATHAN H.
This is Application is a continuation claiming priority under 35 U.S.C. §120 to U.S. patent application Ser. No. 11/019,749, entitled “FULLY AUTOMATED VEHICLE RENTAL SYSTEM,” filed Dec. 21, 2004, which is a divisional application claiming priority under 35 U.S.C. §121 to U.S. Pat. No. 6,898,493, entitled “FULLY AUTOMATED VEHICLE RENTAL SYSTEM,” issued on May 24, 2005, which is a continuation-in-part application claiming priority under 35 U.S.C. §120 to U.S. application Ser. No. 09/315,071, entitled “FULLY AUTOMATED VEHICLE RENTAL SYSTEM,” filed on May 19, 1999, which is not abandoned, all of which are incorporated by reference in their entirety as if fully set forth herein.
This invention relates to system and method for remotely renting a vehicle. In particular, this invention relates to a system and method for remotely enabling a user to gain entry/access to a rental vehicle.
The identified vehicle is located in the lot by the customer and then removed from the rental agency lot with a gate security check at a check-out gate, as assurance that the driver is in fact the authorized lessee or is otherwise authorized to remove the vehicle from the lot. Usually this is affected by comparison of driver identification with a rental agreement or just with the rental agreement information.
When the vehicle is returned to a rental lot (even one from which it did not originate but in which the central data base therein is operationally linked to the original data base computer—i.e., with pre-arranged remote vehicle drop-off) and comes within transmission range from outside of the rental lot, the transmitter/receiver within the vehicle transmits the stored information of odometer reading, fuel level, the correlation identification of car and driver and the exact time of return. No annunciator type devices, as in the prior art are used or are even necessary. Optionally, a personalized “Welcome Back” is activated to greet the driver by name and a rental agency employee (e.g., concierge), inspects the vehicle for damage and hands over a completed final receipt (with all charges and credits), which is calculated and printed while the driver approaches the lot. There is no manual log in and the vehicle actually checks itself in. The central data base, with all available billing and identification information, processes the charges and transmits advice to the transmitter/receiver to remove (or archives for possible future charges resulting from later detected misuse) the correlation between driver and vehicle. The receipt for the vehicle rental charges is automatically printed upon return of the vehicle (and prior to the driver exiting from the vehicle) whereupon the driver is given the receipt by a concierge to complete the entire rental transaction. The driver simply leaves the vehicle wits the keys and walks or is transported away to a desired destination. Aside from the hanging of the various nodes and modules, no construction or modification is required of the existing rental facility such as special lanes and the like.
In accordance with the present invention, in a preferred embodiment there is a backup battery scheme which stores the fuel/odometer translation tables (information used in calculating fuel level and vehicle traveling operation for specific vehicles), odometer reading (ongoing), critical car information, rate information, driver information etc. As a result of use of translation tables (wherein data is stored for a variety of vehicle operation parameters), the device can be moved from car to car, eliminating the need for unique versions. All that is needed is a reprogramming of the device to reconfigure itself with stored parameters to the specific vehicle to which it is being transferred or attached.
As a result of RF transmissions being utilized for communication, there is no necessity for direct sight line for communication (such as with transmitters as used in toll activation devices requiring windshield placement). The devices can be mounted anywhere in the vehicle, thereby reducing installation/removal time and increasing security. The devices are of a small size (4.times.4.times.2″) allowing for ease in hidden placement in the vehicle.
transmitting from the vehicle controller to the on-board computer of the rental vehicle an entry authorization signal instructing the on-board computer to open one or more doors of the rental vehicle permitting a user to enter the rental vehicle.
2. The method of claim 1, further comprising receiving a reservation from the user for a rental vehicle.
3. The method of claim 1, further comprising receiving payment from the user for usage of the rental vehicle.
4. The method of claim 1, the vehicle controller transmitting the entry authorization signal through the bus system of the on-board computer.
the vehicle controller communicating in a second communication protocol with a second on-board computer of a second rental vehicle.
6. The method of claim 5, wherein the first and second rental vehicles are produced by different manufacturers.
7. The method of claim 1, further comprising programming the vehicle controller to communicate with the on-board computer of the rental vehicle using translational tables stored on the vehicle controller, the translational tables comprising vehicle parameters specific to the rental vehicle.
wherein the processor is configured to allow a user to access the rental vehicle upon receiving an access authorization signal.
9. The vehicle controller of claim 8, the processor configured to send a signal to the on-board computer though the bus system to unlock at least one of the doors when the processor receives an access authorization signal.
10. The vehicle controller of claim 8, the processor configured to communicate with the on-board computer of the rental vehicle using any of a plurality of different communication modes.
11. The system of claim 8, the vehicle controller comprising translation tables stored thereon enabling the processor to communicate with the on-board computer of the rental vehicle using any of a plurality of different communication modes.
12. The vehicle controller of claim 8, the connector comprising a J1962 standard connector plug.
13. The vehicle controller of claim 8, wherein the processor can be programmed to communicate with the on-board computer of the rental vehicle using one of a plurality of different communication modes and reprogrammed to communicate with an on-board computer of a different rental vehicle using a different communication mode.
wherein the vehicle controller is configured to allow a user to access the rental vehicle upon receiving an access authorization from the central control station computer via the transceiver.
15. The system of claim 14, wherein the controller is configured to unlock at least one door of the rental vehicle upon receiving an access authorization from the central control station computer via the transceiver.
16. The system of claim 14, the vehicle controller configured to communicate with the on-board computer of the rental vehicle using any of ISO 9141, J1850PWM, and J1850VPW communication modes.
17. The system of claim 16, the vehicle controller comprising translation tables stored thereon enabling the vehicle controller to communicate with the on-board computer of the rental vehicle using any of ISO 9141, J1850PWM, and J1850VPW communication modes.
18. The system of claim 16, wherein the vehicle controller can be programmed to communicate with the on-board computer of the rental vehicle using one of ISO 9141, J1850PWM, and J1850VPW communication modes and reprogrammed to communicate with an on-board computer of a different rental vehicle using a different communication mode.
19. The system of claim 14, wherein the communication between the transceiver and the central control station computer is bidirectional.
20. The system of claim 14, the vehicle controller connected to the bus system of the on-board computer of the rental car.
21. The system of claim 16, the vehicle controller connected to the bus system of the on-board computer of the rental car using a J1962 standard connector plug.
23. The vehicle controller of claim 22, the processor configured to send a signal to the on-board computer to unlock at least one of the doors when the transceiver receives an access authorization message from a central computer remote from the rental vehicle.
24. The vehicle controller of claim 22, the processor configured to communicate with the on-board computer of the rental vehicle using any of ISO 9141, J1850PWM, and J1850VPW communication modes.
25. The system of claim 22, the vehicle controller comprising translation tables stored thereon enabling the processor to communicate with the on-board computer of the rental vehicle using any of ISO 9141, J1850PWM, and J1850VPW communication modes.
26. The vehicle controller of claim 22, the connector comprising a J1962 standard connector plug.
27. The vehicle controller of claim 22, wherein the processor can be programmed to communicate with the on-board computer of the rental vehicle using one of ISO 9141, J1850PWM, and J1850VPW communication modes and reprogrammed to communicate with an on-board computer of a different rental vehicle using a different communication mode.
|
2019-04-23T12:34:31Z
|
https://patents.google.com/patent/US20100217630A1/en
|
Porn
|
Reference
| 0.209346 |
wordpress
|
I’ve commented before on my Dad’s interest in almost everything and here’s a case in point. In August 1954 Dad snapped this picture.
The scene is the River Ouse just on the downstream side of Lewes, county town of East Sussex. The famous cliff is on the right – scene of the awful tragedy of December 1836. Amazingly, it wasn’t so much a cliff collapse as an avalanche of snow which crashed down the cliff destroying a row of cottages and killing eight people.
Let’s lighten the mood. One of my favourite spoof book titles, remembered from childhood was, ‘The Cliff Tragedy’ by Eileen Dover.
And now back to the photo where all looks calm, still and a tad grey on this August 1954 day. Holding centre stage is a sailing barge. I’m sure dad would have taken this shot knowing their days were numbered. Now I’m not an expert on sailing barges – different styles were adopted for specific circumstances in different parts of the country – but I think this is a Thames sailing barge. Do tell me if I’m wrong.
They do still exist although whether any really carry cargo, I don’t know. My dad hired one in 1975 as part of an Industrial Archaeology Course he was running. I was there! We set sail from Malden in Essex.
|
2019-04-21T04:15:48Z
|
https://locksands.wordpress.com/tag/maldon/
|
Porn
|
Recreation
| 0.872878 |
imdb
|
Sam Winchester: Smith. No relation.
I can watch this episode over and over and never get tired of it.
|
2019-04-23T22:53:02Z
|
https://www.imdb.com/title/tt3845910/
|
Porn
|
Reference
| 0.761118 |
wordpress
|
Hi there. My name’s Alan Flanagan, I’m a playwright / journalist / screenwriter / jack-of-all-trades from Ireland, currently living in Toronto Dublin London.
I’ve been writing since as long as I can remember, but more specifically over the past five years I’ve been writing dozens of pieces for radio, short film and theatre. I work as a script editor and one of the lead writers on Big Finish Productions’ radio series Dark Shadows, while recent plays include “Dupont & Davenport” (Ed Fringe 2014), “After/Into” (Theatre 503, 2016), and “I Run, I Sing, I Swim, I Dive” — which won Best Actress at the 2013 International Dublin Gay Theatre Festival.
I also write and direct short films, the most recent of which “The Charm” and “Garvey & Sayers” are currently in post-production.
That said, I’m mainly working on cutting my teeth on television at the moment – figuring out what works, how I work within it, and how I can get better with every script. If you want to have a look at anything I’ve written, just head on over to the scripts section of the site.
I’m currently enjoying my role as Artistic Director of Refractive Lens Theatre, as a programmer for the WildSound short film festival, and when not working, I like kicking back with improv, previously at Second City – where the only limit is your imagination (and the pants-staining terror of live comedy).
You can follow me on Twitter at @alanflanagan, or just keep an eye on here for more focused articles or scripts. Any specific questions, just comment, tweet or drop me an email.
Well done on the piece on Kate Fitzgerald – I saw the piece in the Irish Times and was interested in the story but hadn’t seen the developments since Saturday.
Out of interest, and sorry to be pedantic but I was particularly surprised as you write so well, you wrote the word “lead” as the past tense of “lead” – should this not be “led” ? Or is that an Americanism / Canadianism ?
What’s Toronto like ? Tempted to try it out at some stage.
I wish I could say it was an Americanism or a Canadianism, but it was actually misspelling-ism. I’ve fixed it now, to hide my shame.
Toronto’s a fine city, quite chilly at the moment but full of friendly people, delightfully active little neighbourhoods and a good all-round vibe. THUMBS UP. I’m slowly working my way into the theatre community here as well, hoping to put up three shows in 2012.
So yeah, come on over!
Thanks for this (he said, just seeing it)!
Well done for refusing to cave into the request to whitewash your character, and for naming the theatre company. You are officially one of my heroes!
|
2019-04-21T04:51:41Z
|
https://parallelevision.wordpress.com/about-me/
|
Porn
|
News
| 0.298042 |
wordpress
|
Here’s a small sample of the backgrounds I’ve been painting feverously for my thesis stop-motion film. It’s a staggering amount of work and I have to keep reminding myself that the backgrounds don’t have to be perfect; it’s the animated puppets that will really carry the plot. Some elements of the scenery are missing here — like arms and heads — because I’ve drawn those separately to be animated on another layer. More to come!
|
2019-04-25T15:41:56Z
|
https://samalacoffey.wordpress.com/2011/02/
|
Porn
|
Arts
| 0.939955 |
wordpress
|
An Inner Beauty Blog | BE KIND, for everyone you meet is fighting some sort of battle you know nothing about.
Ever feel like EVERYONE’S married but you? We do! Especially as we creep closer to our 30s and mid 3os it is EVERYWHERE. So we decided to make a video about it. Hope you enjoy!
In case you missed it, here’s the behind the scenes of Hot Topics from last week! Romeo was dressed as Santa Paws now that it’s November and basically Christmas- amirite!?
So thankful that my girl Dom was able to save the day as my guest. She’s a host, attorney and business consultant. GIRL BOSS!!
Romeo is a hard working dog these days guys. From modeling in the streets of Beverly Hills to co-hosting alongside his mama (me!) every Wednesday on “Hot Topics with Alicia & Romeo”… this dog is GOALS. He is so well-behaved, that not even a plate the size of him filled with hot wings can tempt him into misbehaving on-air. What talent!! Click here to watch the behind the scenes taping of our 2nd episode of Hot Topics with guest Mabelynn Capeluj! You can always watch us LIVE on DISH channel 6 in LA as well as on battlecam.com every Wednesday 5pm PST!
You guys, I turn 30 in March. THIRTY YEARS OLD! I’m low-key freaking out about it, but mostly excited. I can’t even describe the feeling. So many emotions. Is this real life? Where has the time gone? And where the heck is my husband?!
I KNOW SOME OF YOU WOMEN CAN RELATE TO THIS FEELING.
So it’s time to answer these questions.
So together with Lindsey Tuer (who was on Coupled with me), we will be posting vlogs every single month answering your questions- sort of like we did with our Coupled Refills!
Lindsey is currently 30 years old and so she knows a thing or two about all these feels! We literally cannot believe how the time flies and all that we’ve learned in our three decades of life. She knows exactly what I’m talking about here…. and I KNOW there are so many of you ladies out there in your 30s who can relate to us too!! We see you!
You’re the hard working woman who supports herself.
You are a single lady at a time where everyone around you is married…or at least coupled.
You’re the very proud auntie to your own biological nieces and nephews, but also to the many adorable babies all your friends are having too.
We know what it’s like to attend engagement parties, bridal showers, bachelorette parties, weddings, baby showers, gender reveal parties and birthday parties for our friends and families, nearly every single weekend since we were 26.
We totally get the anxiousness that comes with aging…like not having those aforementioned things quite yet, but yet definitely having wrinkles and other STUFF going on.
We completely miss the days where we could eat whatever we wanted without worrying; where working out wasn’t THIS hard, where we had more GNO* and less FOMO** because we had more fellow single girlfriends to go out with.
Just to be clear, we are fully aware of the AWESOMENESS that comes with being in your 30s; like knowing exactly who you are. By now, you know what you will never settle on in relationships.
You have more confidence in your career and what you see for yourself.
You’re more selective on who you allow in your life; and more importantly- who you let go of.
You no longer tolerate toxic energy.
You’re more confident in your looks than ever before-and all without trying as hard as we did in our 20s!!! #cleanses #detoxes #30daychallenges – we will do all of these and tell you what works for us.
That’s why we will be calling this series: “Cheers to 30 Years.” The ups, the downs, the boyfriends, the no-boyfriends, the things that have worked for us, the things that didn’t work for us, our tips, tricks, secrets, and how we feel about things going on in the world from our perspective… all of it will be right here. The good, the bad and the ugly!
And there will be wine. Because that’s what people our age do! amirite?
Cheers to what is sure to be a hilarious, deep, honest and candid vlog series from the bottom of our hearts… and wine glasses.
|
2019-04-24T02:24:53Z
|
https://aliciamblanco.wordpress.com/
|
Porn
|
Reference
| 0.22551 |
wordpress
|
This is just a little something I did to get my mind off all the writing stuff for a while. 10 playlists for 10 years of UK top chart singles.
Or, as I like to call it, the chronicle of steady descent of music quality 🙂 We start with Blondie, Jam and Police. By the time it gets to 1989 it’s obvious the British public just gave up. Three top singles of 1989 were by Jive Bunny fer chris’sakes. We desperately needed Nirvana.
1980: Three hits by Blondie; Specials; Jam; Police. Quality stuff. The last hits of ABBA.
1981: Lennon dies in December 80, dominates the charts for two months. Ultravox Vienna is held off number 1 by Shaddap Your Face. Human League saves the year’s honour by trumping Julio Iglesias.
1982: Come on Eileen smashes the records. Kraftwerk. Town Called Malice. Movie songs begin to overtake the charts.
1983: The first unashamedly all-pop chart of the decade. The heaviest song is Billy Jean… by the end of the year the fad for soft, inane reggae seems to addle everyone’s minds.
1984: The year of Frankie Goes to Hollywood. Total dominance: 15 weeks for three songs. Hello and I Just Called To Say I Love You. The year ends with *shudder* Band Aid, foreboding the things to come.
1985: The charts are all over the place, as if Band Aid just exploded throwing shrapnel of sugary pap everywhere. And not a good song in sight.
1986: A bit of respite: some rocky pop from A-Ha, Pet Shop Boys, George Michael goes adult and writes a decent tune. Final Countdown makes everyone bang their heads for the last time.
1988: It’s dancehall all around; nothing here that couldn’t be played in a disco. Stock, Aitken & Waterman expand their Empire of Crap. What’s Enya doing in all this, we will never know.
Although to be fair, the 1970s No 1s were pretty crappy as well. It seems 1979-1981 were the only decent years for the UK charts.
1994, M6 on the cable, all’s right with the world.
A friend’s post on Google+ today worked on me like a Proust’s madeleine, throwing me out on a YouTube journey in search of the French pop music of 1994.
I don’t really remember what was so special about 1994 in my life. I was in the middle of high school, so not my best period. The details are a little hazy. I did listen to a lot of new music back then, that’s for sure.
It was definitely an important year in music. Nirvana Unplugged and Kurt Cobain’s death, of course. The Britpop Wars reach a climax with “Definitely Maybe” and “Parklife”. Bernard Butler leaves Suede. Bristol Sound begins with “Dummy” and “Protection”. “Ill Communication”, “Return of the Space Cowboy”, “Mellow Gold”. “7 Seconds” starts out fun and manages to turn everyone crazy by the end of the year. “Zombie”. “Lion King”.
To me, it was the year I discovered European music outside MTV’s English-dominated scene. I must’ve been spending a lot of time at home, in Warsaw, watching cable TV. It was the heyday of cable: we had all the European channels, MTV Europe, Viva, TV5, RAI, some Spanish and Portuguese stuff I don’t remember that well… the best of those was M6 – and not just because it had certain late night shows of particular interest to 16-year old boy 😉 but because it showcased the best of French music at the time – and what music that was!
I don’t know enough proper musical terms to tell why French pop music was so different from anything else I knew at the time – whether it was a difference in phrasing, use of different instruments, or simply another tradition – but to my ears it was a shock comparable only to my later discovery of J-Pop. It was also the year after my return from school trip to Paris – my first journey “to the West”, so maybe I was just ready to be enamoured with anything French, whatever it was. That one year, 1994, spawned songs which will remain with me for the rest of my days.
Delia Ann Derbyshire started out as a working class girl in bombed-out Coventry, soon to grow into a brilliant mathematician in Cambridge – where only one in ten students were female at the time. But it was her decision to specialise in modern music in 1959 which changed her life – and that of millions of people throughout the world up to this day.
Yasushi Akimoto has learned a lot since his days at Onyanko Club. Like Tsunku, he has created an ever-expanding empire of short-skirted schoolgirls, but the scale of his enterprise is incomparably more vast than anything Hello Project could ever dream of achieving.
AKB48 started out with mere 48 members – by itself a significant number. Now there are clones in Nagoya – SKE48, Osaka – NMB48, Fukuoka – HKT48, an adult clone SDN48, a ‘competition’ clone Nogizaka46.
It has now expanded successfully overseas, something Tsunku failed notably at: there is now JKT48 in Jakarta and TPE48 in Taipei, and a first AKB48 cafe opened in Singapore.
Altogether there are now hundreds of teenage Asian girls prancing around in school uniforms miming catchy tunes on stages all over the Far East. MoMusu may be failing- its latest single failed to top the charts, reaching a mere 2nd place – but the J-pop mega-girlsband dream lives on.
|
2019-04-20T12:45:38Z
|
https://jamescalbraith.wordpress.com/tag/music/
|
Porn
|
Business
| 0.142396 |
tripod
|
"Art, storytelling and humor are wonderful things. In a future when intelligent machines will reason and do our donkey-work, human artists will become the most valued and irreplaceable of professionals-unique in an automated world. Painters, sculptors, writers, actors, architects, animators and even people who can decorate a decent Easter egg will achieve unprecedented fame and fortune."
- Bran Ferren: President Disney Imagineering, R&D, Inc.
|
2019-04-19T06:34:30Z
|
http://stda.tripod.com/team/kevin/kevin.html
|
Porn
|
Arts
| 0.928668 |
wordpress
|
Online resources are crucial for both novice and expert web developers. Read The New York Code & Design Academy’s list of the best free coding resources.
Previous Post #BainExplained: What is True North?
|
2019-04-22T23:58:25Z
|
https://debbiediscovers.wordpress.com/2015/10/01/top-19-websites-for-free-online-coding-resources-nycda/
|
Porn
|
Computers
| 0.938321 |
wordpress
|
There aren’t a lot of men on my list of favourite authors, but this guy is one of the exceptions. I’ve read most of his books many times. They are “comfort books” for me: lovely stories well-told. This is probably my tenth or twelfth re-read of Tigana, and I’m keeping it to read again.
This entry was posted in Biased Opinions, Everything, Reading Books and tagged Barking Back, book review, books, fantasy, fiction, Guy Gavriel Kay, swords and sorcery, Tigana on 13/08/2018 by nissetje.
|
2019-04-23T18:36:44Z
|
https://strongroot.wordpress.com/2018/08/
|
Porn
|
Arts
| 0.941567 |
wordpress
|
Lottery Winners: We’re out of here!
Fifteen police officers, the entire police force in a small Hungarian town, quit immediately after they won a about $15,ooo,ooo in a lottery.
via Ananova – Police force quits after lottery win.
|
2019-04-19T08:40:13Z
|
https://oldstersview.wordpress.com/2009/10/18/lottery-winners-were-out-of-here/
|
Porn
|
News
| 0.465995 |
wikipedia
|
In many economic literature, the term "aftermarket" refers to a secondary market for the goods and services that are 1) complementary or 2) related to its primary market goods (original equipment).
Thus, in many industries, the primary market consists of durable goods, whereas the aftermarket consists of consumable or non-durable products or services.
Accordingly, the "aftermarket goods" mainly include products and services for replacement parts, upgrade, maintenance and enhancement of the use of its original equipment.
There are two essentials of the aftermarket: installed base and lock-in effect.
A certain level of installed base of original equipment customers is necessary for the sufficient demand of aftermarket products.
Therefore, significant installed base normally makes aftermarket profitable as an established installed base is likely to consume the aftermarket products repeatedly over the lifespan of their durable goods.
Lock-in effect or installed-base opportunism refers to the situation where the customers can only consume the aftermarket goods produced by original equipment manufacturer.
These two essentials, installed base and lock-in effect, make aftermarket less volatile relative to primary market and therefore more likely to be profitable.
The most well-known aftermarket strategy model is "Gillette’s razor and blades business model" also known as "freebie marketing" whereby a product is largely discounted or even free as a loss leader in order to increase the sales of its complementary goods.
Often the durable goods are offered at a low price (or even below marginal cost) in order to attract new customers amid competitive primary markets and the loss from the primary market will be rebated by the profits from consumables in aftermarket.
In this case, an established installed base is essential to ensure sustainable business practice.
Tying or bundling of aftermarket products with original equipment also could be the strategies for aftermarket.
There have been a significant number of economic literature discussing about the aftermarket monopolisation after US Supreme Court’s 1992 decision in the case Eastman Kodak Company v. Image Technical Service.
The key issue of the debate is whether the monopolisation in the aftermarket harms customers and social welfare.
The primary market and its aftermarket should be considered as a single joint market since they are to a large extent related; unless both primary and aftermarket are monopolized, there will be no anti-competitive impact in monopolizing either of them.
Even if the supplier is able to charge supra-competitive prices in the aftermarket, these profits should be employed to lower the price of the original equipment in order to attract consumers in its primary market.
In addition, the Chicago school argues that Aftermarket monopolization enables manufacturers to afford investments into quality improvement of their original equipment; consumers may benefit from quality primary goods for lower price and overall economic efficiency therefore increases.
In addition, the post Chicago economists argue that the primary market where the investments costs in original equipment are largely subsidized by the profits from its monopolized aftermarket tend to be anti-competitive as entry into a market will be difficult without installed base.
Although Chicago school economists assumes that theoretically consumers are farsighted and rational, the results of a number of empirical economic literature insist that consumers are in many cases highly myopic towards the sophisticated choices.
Thus, it has been consented now that aftermarket monopolization has potential harms even when consumers are fully informed about the whole lifecycle costs with the competitive primary market.
Following is a list of factors making aftermarket monopolization more harmful.
^ a b c d Vootman, John J (1993). "curbing aftermarket monopolisation". J. Legis.
^ a b Waldman, Michael (2003-01-01). "Durable Goods Theory for Real World Markets". The Journal of Economic Perspectives. 17 (1): 131–154. doi:10.1257/089533003321164985. JSTOR 3216843.
^ a b c Carlton, Dennis W.; Waldman, Michael (2010-04-01). "Competition, Monopoly, and Aftermarkets". Journal of Law, Economics, and Organization. 26 (1): 54–91. doi:10.1093/jleo/ewp006. ISSN 8756-6222.
^ a b Cabral, Luis M. B. (2008-04-01). "Aftermarket Power and Basic Market Competition". Rochester, NY. SSRN 1281912.
^ a b Durable Goods Markets and Aftermarkets. doi:10.1057/9781137336583.0437. Archived from the original on 2016-03-04. Retrieved 2015-11-05.
^ a b c d e f "Developing an Aftermarket Strategy". forio.com. Retrieved 2015-11-05.
^ a b c d e f g Coppi, Lorenzo (2007). "Aftermarket monopolization: the emerging consensus in economics". The Antitrust Bulletin. 52 (1): 53.
^ a b Kattan, Joseph (1993-07-01). "MARKET POWER IN THE PRESENCE OF AN INSTALLED BASE". Antitrust Law Journal. 62 (1): 1–21. JSTOR 40843233.
^ a b c d Jinhyuk, Lee; Jaeok, Park (2014-01-01). "PRICING OF COMPLEMENTARY GOODS AS AN IMPLICIT FINANCIAL ARRANGEMENT". Hitotsubashi Journal of Economics. 55 (2): 207–228.
^ Economides, Nicholas (2014-10-17). "Bundling and Tying". Rochester, NY. SSRN 2511508.
^ "The Inkjet Aftermarket: An Economic Analysis". ResearchGate. Retrieved 2015-11-05.
^ Telser, L. G. (1979-04-01). "A Theory of Monopoly of Complementary Goods". The Journal of Business. 52 (2): 211–230. doi:10.1086/296044. JSTOR 2352194.
This page was last edited on 4 October 2018, at 06:45 (UTC).
|
2019-04-25T16:29:46Z
|
https://en.wikipedia.org/wiki/Aftermarket_(merchandise)
|
Porn
|
Business
| 0.169109 |
wordpress
|
After you’ve been married so many years, your mate knows exactly what buttons to push, and not just in bad ways.
“Hey! Look at the time! It looks like we’ll be near PF Changs for lunch!” said AdventureMan, pretending to be excited. Chinese food is comfort food to me, and he likes it OK, but he is relatively – relative to me – indifferent. And while PF Changs is pretty good, it is also good relative, relative to Pensacola, Navarre, Crestview, Niceville, Destin, Panama City – pretty good. It is a chain, and it is not San Francisco, or Seattle, or other cities where good Chinese food is sought after and valued.
So he feigns excitement, knowing I will happily eat at PF Changs, because relatively speaking, I am yearning for some good Chinese food.
We get there just as the Thanksgiving lunch crowd is beginning to head into the restaurants to take a break from shopping. We are happy; we can see many empty tables still. There are times this restaurant has been so packed that we have chosen to go elsewhere.
“It will be about ten to fifteen minutes before I can get you to a table,” the hostess says, bustling by and barely giving us a glance.
Oh oh. I can see AdventureMan’s testosterone level rising. But he has learned a lot in his years, so he tackles the problem nicely: “But I can see empty tables,” he says, and gestures to the large assortment of empty tables.
She seems annoyed to be interrupted in whatever her busy-ness was, and annoyed at being questioned.
The wait is actually short, and that welcome was the worst part of our meal, and not even that was so bad. Actually, AdventureMan and her had a nice chat while I wandered off to find the ladies room. When I came back, he had been seated, and we quickly ordered a big pot of tea and lunch. It arrived quickly, was hot and beautifully presented, and was delicious, seasoned by our hunger.
Our server was attentive and efficient without being intrusive. He made excellent suggestions and made sure our orders were customized – AdventureMan wanted his extra spicy, and he got lots of fabulous peppers. AdventureMan had Kung Pao Scallops and I had Spicy Chicken. We both had the Hot and Sour Soup, which we thought was pretty good.
I think his was better . . .
I am thankful for a lunch at PF Changs AND I am yearning for Seattle, and the countless places to get authentic and tasty Chinese food.
A BIG Wooo HOOOOO on Qatar for training and implementing a PROFESSIONAL traffic force. Woooo HOOOOO! I can only hope the laws they will enforce include children in the back seats in car seats and seat belts for every passenger. I pray that part of the training included instructions that traffic rules are to be applied equally and fairly against all nationalities, including citizens.
A new highway patrol police force that will augment the efforts of the Ministry of Interior (MoI) in improving road safety will start work in 2014, it was announced at the graduation of the first batch of the force.
Consisting of 50 officers and cadets, the graduation ceremony of the first batch was held at the headquarters of the Traffic Department. The training programme was implemented by the Northwestern University, Chicago.
The team has received specialised training in enforcing traffic laws and booking common violations like tailgating, use of mobile phones, exceeding speed limits and not wearing seat belts.
The officers also acquired advanced skills in investigation of accidents, modern methods to interrogate drivers, preservation of evidence and making specialised reports on accidents.
According to Traffic Department officials, the new force will use both radar and lidar, a device used to monitor speed using laser.
The officers were also trained on skills needed to manually control traffic flow and its mechanisms in addition to the use of tools and methods for data collection.
The initiative was organised in collaboration between the Ministry of Interior and RasGas in the context of the priority given by the MoI and the National Committee for Traffic Safety (NCTS) to ensure responsible and safe driving.
The graduation ceremony was attended by Traffic Department director Brig Mohamed Saad al-Kharji, NCTS secretary Brig Mohamed Abdullah al-Maliki, traffic safety adviser at MoI Ademola Ilori and Brett Doherty, safety, health, environment & quality chief officer, RasGas.
Speaking on the occasion, al-Kharji said that the new force would support the MoI’s efforts in road safety.
He added that the trainees got theoretical and practical lessons on controlling traffic movement on highways, safe parking and stopping of vehicles on highways as well as training on dealing with the public.
Speaking on the sidelines, al-Kharji said that there was a plan to equip traffic police vehicles with speed radars so they could catch violators while on the move.
He thanked RasGas for its collaboration with the MoI in this initiative and said the move would play a proactive role in reducing traffic accidents.
Al-Maliki said that the initiative came as part of NCTS and thanked RasGas and Northwestern University for their support for the initiative.
He awarded trainees with certificates and exchanged mementos with RasGas and Northwestern University. Gifts and appreciation certificates were awarded for lecturers and translators.
Others present on the occasion were RasGas public affairs manager Abdulla Hashim, Security & Emergency services manager Faisal al-Hajiri, road safety adviser John Cling, safety systems head Jive Price, road safety training head at Northwestern University, Antony Patila.
We were leaving a restaurant and AdventureMan started laughing. “You’ve got to see this!” he said, and when I did, I just walked on and left him laughing, but when I got to the car, I had second thoughts, and said “I need to go back and take a picture,” and I was laughing, too.
AdventureMan, get your mind out of the gutter.
He thinks this is hilarious.
“That reindeer is having a very merry Christmas!” chortles AdventureMan.
We love the early service at our church; it is quiet, it is contemplative and focused. It is also the Episcopal service “lite;” with little music we are in and out in an hour. We occasionally go to the commissary after church, and one morning, on our way there, AdventureMan said “how about THERE for breakfast?” and swerved into the parking lot.
CJ’s, at the corner of Garden and Pace, is not undiscovered. We have never walked right in and been seated, there is always a wait, but as early as we go, the wait is not too long. There are seats at the bar almost always, but we prefer to wait for a table. Service is excellent; I don’t know how they serve so many customers so quickly and accurately, but everyone leaves happy.
My photos are not representative of the breakfasts most people were eating because AdventureMan and I try not to pig out. We got the smallest breakfasts. Most people had platters laden with eggs and ham and sausages; this is a breakfast feast.
You can shake some of that sugar off. It’s powdered sugar, so there aren’t so many calories. And I shared half of it with AdventureMan. Oh man, these are beignets! These are like light fluffy yeast doughnuts, so light. . . so delicious. They could become a very bad habit if I don’t exert extreme self discipline.
I know. It’s a lot of food. You should see the other platters, LOL!
CJ’s is a great value for the money. Delicious local foods at reasonable prices.
The truck in front of me (on Davis in Pensacola) looked like a working truck, but it was this sign that caught my eye.
Where is West Ankole, Uganda?
You may think this is ‘just’ a beautiful pecan pie, but it is better than that. This is AdventureMan’s very first pie, ever. He debated even making it for the Great Gathering, because there are so many truly gifted cooks in the family, but in the end, being the courageous soul he is, he tackled it. It looks exactly like the photo of the pie in Southern Living magazine which inspired his effort. I don’t think I have ever seen a more beautiful pecan pie. 🙂 Bravo! Bravo, AdventureMan!
A clean house isn’t just “nice to have,” it’s actually a necessity for good mental and physical health. According to a study published in Time, the Indiana University department of Physical Activity, led by associate professor Nicole Keith, discovered a correlation between clean houses and healthy people.
Researchers tracked the physical health of 998 African Americans between the ages of 49 and 65 — a demographic with a high-risk for heart disease – by comparing their levels of physical activity with the cleanliness of their homes. Those people with the cleanest homes were also the healthiest and most active, according to the study results. In fact, the findings also suggested that encouraging people to maintain their home’s cleanliness may be even more important to their overall health than the walkability of the neighborhood they live in.
And the germy culprits aren’t always where you think they are. Elizabeth Scott, PhD, co-director of the Center for Hygiene and Health in Home and Community at Simmons College in Boston, found staphylococcus bacteria, a common cause of serious skin infections, in 26 percent of the tubs she tested, compared with just 6 percent of garbage cans.
Yes, these statistics provide scientific proof that the mental and health benefits of a clean environment are very real; but, we also look to the renewed energy and happiness our clients describe to us after one of our visits. When we hear our clients use words such as “therapeutic,” “relaxing,” and “motivating” to describe their newly cleaned homes and offices we are reminded that a clean home is truly the embodiment of the science and soul holistic cleaning philosophy we maintain at GreenHouse Eco-Cleaning.
|
2019-04-20T14:37:29Z
|
https://intlxpatr.wordpress.com/2013/11/
|
Porn
|
Society
| 0.738036 |
wordpress
|
This entry was posted on January 3, 2019 at 10:35 pm and is filed under Uncategorized. You can follow any responses to this entry through the RSS 2.0 feed. You can leave a response, or trackback from your own site.
|
2019-04-26T00:00:48Z
|
https://mp3science.wordpress.com/2019/01/03/%E2%99%AB-goodbye-song-jim-redgewell-listen-cdbaby/
|
Porn
|
Reference
| 0.130961 |
tripod
|
In the war of the 16-bit systems, Sega started to get a nice lead over the rival TurboGrafx-16 in the early ninities. With games like the awesome 4 Meg Revenge of Shinobi here it no wonder. The Revenge of Shinobi is the sequel to one of my favourite arcade games and instead of just re-releasing the original Shinobi to the Genesis which would have been fine by me (especially since the NES and SMS versions weren't all that good), Sega makes Revenge of Shinobi (Shinobi II) an exclusive to their new 16-bit machine. Everybody loved the crisp non cartoon like graphics, the unforgettable music and sound effects, plus the challenging game play the series is known for. Revenge of Shinobi was easily one of the best games that year and it's still one of the best games on the Sega Genesis too and I'm going to tell you why.
The story starts off after Joe Musashi of the Stealth Ninja Clan successfully defeats Zeed and his crime syndicate. Zeed however still lived after losing the fight and only grew stronger over time. With Zeed's crime organization more powerful than ever, the all new Neo Zeed soon plots to end the Stealth Ninja clan once and for all. One day Joe Musashi would return to his dojo only to find his master near death and your future wife being held captive by Neo Zeed. With his master now dead and the Stealth in ruins, Joe sets out alone to get his revenge.
Its night time in a crime infested city.
The Revenge of Shinobi is an 8 level mission with 2 stages each and a boss battle. Each level as a certain theme to it like level 1 starts in residential Japan with rival ninjas and samurais as your enemies while level 3 takes place in a training base and now you have to worry about various gunmen and guys with flame throwers. The bosses were not only tough as 2 month old French bread; the bosses were some of the coolest I have ever seen in a game. Who can forget that giant fire breathing dinosaur in level 7? Heck, Sega even included the legendary Spider Man as the Level 6 boss and at one time Sega even had Batman as a enemy too in the rare early editions of the game. Strange but true! Batman was later removed because Sega didn't have the license from DC comics. So how do you know if your copy of ROS is the rare edition? Get good at the game and make it to the boss, that's how.
Maybe you should have killed him in the last game?
Like I said before; this game is really difficult but fortunately for you the Shinobi as some all new powers to master. No longer will only one hit kill you unlike the original thanks to the life bar. Secondly you now have the option to pick the style of magic as well. There are four different spells of magic to use: first there is the electrical force field that blocks you from 4 hits (great for when you get a POW item), the shadow jump can be used to increase your height, the walls of fire attack to clear the screen of weaker enemies or to soften up a boss, and finally the suicide strike that actually ends your current life but it also unleashes a powerful attack in the process. The magic is very limited so you have to be careful when you used it. Another thing to worry about is the limited number of ninja stars the game gives you, using the close range attacks is key to saving your knives.
One thing I noticed right away about the game was its realistic graphics, they were way better than anything out there on the 8-bit NES (which was currently still number 1) at the time. Who could forget that awesome life like introduction and all the realistic characters, if that wasn't enough, the rest of the game backed it up too with no one level looking a like. This game really impressed me with the 16-bit powers of the Sega Genesis and this made millions of NES owners quite jealous.
"If you think the graphics were good wait till you hear the music!" The Genesis itself may not have the best audio in the world but composer Yuzo Koshiro did everything humanly possible to make one of the best soundtracks in a video game and he didn't disappoint. Many of the soundtracks are so good; they could easily be mistaken for something on a CD. The sound effect can be a little scratchy at times but they still sound fantastic as well.
A ninja star is born!
Revenge of Shinobi has all the ingredients of a perfect game but a just a few things are holding it back just a little bit. I kind of miss the 3D bonus games from the first Shinobi and the game does seem a little too slow at times because there is no run option either. These are only minor problems though and Revenge of Shinobi is still a great game that will challenge you and impress you with its amazing presentation in all areas. Cool ninja powers, dangerous locations, big bosses, two different endings, and so much more. "Revenge can be very sweet!"
|
2019-04-25T06:37:01Z
|
http://ryangenno.tripod.com/sub_pages/Revenge.htm
|
Porn
|
Games
| 0.982365 |
wordpress
|
All the acts of our daily lives, whatever they be, if they are done for love of God and to accomplish the task he has given us, can become a source of supernatural life which will have an effect even into eternity. Ah! If people knew how to understand this teaching of Christ, not only would hell have no reason to exist but even purgatory could be suppressed.
Whatever can happen to me in this country where I am going, I ask of you two things: first, to always pray for me, and second, that you not weep over me.
I am convinced that all will be well and I am leaving full of confidence; furthermore, for the salvation of souls, Christ gave his life; why should it be surprising if God asks the same of one or the other of us?
What is more certain is rather that he will ask us to give our life little by little, drop by drop, in the daily sacrifice of the duties of our state of life… We always have the consolation of being able to join our little daily sacrifices to the great sacrifice of the Cross. We have God with us all day long; what should we fear?
|
2019-04-18T23:11:59Z
|
https://martyrsoflaos.wordpress.com/2017/02/02/week-iii-friday-blessed-vincent-lhenoret-o-m-i-12-03-1921-11-05-1961/
|
Porn
|
Reference
| 0.254344 |
google
|
You may want to take time to read the attached report (with regard to the overcrowding issue). This is the report of the committee tasked with researching the Annandale region and exploring possible solutions to the overcrowding. This report has been submitted to the school board and the non-boundary solutions (which were heavily preferred by the committee, because they help retain the character and diversity of the HS) are being researched by FCPS staff.
|
2019-04-19T01:50:38Z
|
https://sites.google.com/site/edsallpark/announcements/annandaleovercrowdingreport
|
Porn
|
Reference
| 0.640263 |
wordpress
|
Cerevo Inc’s Psycho-Pass Dominator smart toy went on sale on in March and the company recently opened pre-orders for its accompanying protective case and display stand.
The Cerevo Dominator goes above and beyond previous Dominators created by Bandai’s Proplica line and Ichiban Kuji’s release with a camera viewer and wireless LAN capabilities, allowing users to view Crime Coefficients with their smartphone, as well as a special app to view a Public Safety Bureau’s Criminal Investigation Division user interface. Production I.G director Naoyoshi Shiotani and Nitroplus designer Makoto Ishiwata supervised the Dominator’s creation. The motorized transformation from Paralyzer to Eliminator modes marks a first in the world for smart toys. Voice actress Noriko Hidaka recorded 100 voice samples for use.
The replica can be purchased from Cerevo’s website for 79,800 yen (US$682) or the special edition for 89,800 yen (US$768). The protective case costs 12,800 yen (US$118.50) and is completely waterproof and impact resistant. Like the Dominator, it’s also an exact replica of those seen in the anime series.
The display stand is 9,800 yen (US$91) and has a built in AC adapter. Customers can set their Dominator to “Display” mode using the app to pick what mode (Paralyzer or Eliminator) to show off their Dominator.
Check out the Cerevo Store for more products.
|
2019-04-18T13:26:25Z
|
https://japanwebshopping.wordpress.com/tag/cerevo-incs-psycho-pass/
|
Porn
|
Shopping
| 0.942501 |
wordpress
|
★ What are those strange blue objects? Many of the brightest blue images are of a single, unusual, beaded, blue, ring-like galaxy which just happens to line-up behind a giant cluster of galaxies. Cluster galaxies here typically appear yellow and — together with the cluster’s dark matter — act as a gravitational lens. A gravitational lens can create several images of background galaxies, analogous to the many points of light one would see while looking through a wine glass at a distant street light. The distinctive shape of this background galaxy — which is probably just forming — has allowed astronomers to deduce that it has separate images at 4, 10, 11, and 12 o’clock, from the center of the cluster. A blue smudge near the cluster center is likely another image of the same background galaxy. In all, a recent analysis postulated that at least 33 images of 11 separate background galaxies are discernable. This spectacular photo of galaxy cluster CL0024+1654 from the Hubble Space Telescope was taken in November 2004.
August 23, 2015 at 08:57PM ★ Revista MENADEL PSICOLOGÍA Clínica y Transpersonal.
Esta vida entera es como el sueño de una sola noche.
Tout apparaît, vit et disparaît dans la conscience.
Tout est conscience, silence vivant et sans point d’appui, magie inouïe, mystère béni.
qui à chaque instant habite ce corps !
telle est la pratique suprême.
que l’on ne soit que conscience transparente !
tout ce qui survient instant après instant.
(obtenir) ces choses neuves (qui se présentent d’elles-mêmes à chaque instant) !
selon les capacités de ce corps.
★ A curious robot almost completely straddles this rocky little planet. Of course, the planet is really Mars and the robot is the car-sized Curiosity Rover, posing over its recent drilling target in the Marias Pass area of lower Mount Sharp. The 92 images used to assemble the little planet projection, a digitally warped and stitched mosaic covering 360×180 degrees, were taken by the rover’s Mars Hand Lens Imager (MAHLI) during the Curiosity mission sol (martian day) 1065. That corresponds to 2015 August 5, three Earth years since Curiosity landed on the surface of the Red Planet. The composite selfie excludes images that show the rover’s robotic arm and mount of the MAHLI camera itself, but their shadow is visible beneath. Check out this spectacular interactive version of Curiosity’s sol 1065 panorama.
August 22, 2015 at 08:59PM ★ Revista MENADEL PSICOLOGÍA Clínica y Transpersonal.
|
2019-04-20T08:59:04Z
|
https://centromenadel.wordpress.com/category/uncategorized/
|
Porn
|
Science
| 0.877447 |
yahoo
|
Smartsheet Inc. provides cloud-based platform for execution of work. It enables teams and organizations to plan, capture, manage, automate, and report on work. The company offers Smartdashboards that provides the status of work to align individuals, managers, and executives; Smartportals to easily locate and access from any device the resources available for a project without IT assistance; Smartcards to organize, share, and act on workflows; and Smartgrids to keep teams on task by easily tracking multiple moving parts. It also provides Smartprojects; Smartcalendars, which align teams and organizations by connecting deadlines to workflows; Smartforms enables business users to collect information in a structured and consistent format; Smartautomation that automates repetitive processes; and Smartintegrations enable organizations and teams to connect, sync, and extend enterprise applications. In addition, it offers Connectors; and Control Center that enables organizations to achieve consistent work execution. As of January 31, 2019, it served approximately 95,000 customers. The company was founded in 2005 and is headquartered in Bellevue, Washington.
Smartsheet Inc.’s ISS Governance QualityScore as of N/A is N/A. The pillar scores are Audit: N/A; Board: N/A; Shareholder Rights: N/A; Compensation: N/A.
|
2019-04-20T11:41:22Z
|
https://finance.yahoo.com/quote/SMAR/profile?p=SMAR
|
Porn
|
Business
| 0.992391 |
wordpress
|
The Gilets Jaunes are NOT opposed to sacrifices to stop and reverse ecological damage, and in fact favor more radical measures than the government has proposed.
Last month Branko Milanovic published a blog post about the Yellow Vest movement against the fuel tax in France. He was worried–like many analysts–that the uprising proves it will be virtually impossible to roll out the policies necessary to reduce carbon emissions. He’s convinced that people simply won’t accept it.He also took the opportunity to hit out at myself and Kate Raworth. “Proponents of degrowth and those who argue that we need to do something dramatic regarding climate change are singularly coy and shy when it comes to pointing out who is going to bear the costs of these changes. As I mentioned in my discussion with Jason and Kate, if they were serious they should go out and tell Western audiences that their real incomes should be cut in half and also explain to them how that should be accomplished.”Let’s deal with these issues one at a time.First, the Yellow Vests. Don’t get it twisted: the French began rioting not because of the fuel tax as such, but rather because it was extremely regressive. The burden of the tax fell disproportionately on rural and peri-urban workers who, already struggling to make ends meet under a government that is openly disdainful of working class people, were suddenly forced to pay more at the pump simply in order to get to their jobs. Meanwhile, the elites of Paris and other cities, who get to use public transportation, were less affected. The Yellow Vests felt this was unfair. And they are right.The Yellow Vests are not against environmental policy. In fact, they highlight ecology as a top priority, and have even called for stronger climate action, accusing Macron of fiddling around the edges with “piecemeal measures”. Real climate policy, they say, requires widespread economic changes, and should target the real drivers of climate change: rich consumers and, above all, corporations. I agree with them.
It’s not the gas tax that’s the problem. It’s inequality that’s the problem.
It is increasingly apparent that Branko has read very little in the field of post-growth or ecological economics. There are literally hundreds of peer reviewed articles and books that explore exactly the questions he’s asking here-including this new economic model that investigates policies for a de-growth scenario in, of all places, France-and yet it seems Branko can’t be bothered to engage with them.
Post-growth policy begins with the very principle that–as the Yellow Vests themselves have pointed out–should inform all ecological policy: greater equality. Indeed, the post-growth movement has long argued that equality can be a substitute for growth. By sharing what we already have more fairly, we won’t need to plunder the Earth for more.
2. Scale down throughput by introducing progressive taxes on resource use, emissions and waste, or impose caps on these activities and tighten them each year. Require manufacturers to offer extended warranties on all material products in order to encourage longer lifespans. Legislate a “right to repair”, and introduce laws against planned obsolescence. Ban advertising in public spaces, as Sao Paulo and other cities have done. Prevent supermarkets from trashing food, as France and Italyhave done, and impose fees on food waste while banning it from landfills, as South Korea has done. Etc.
Reducing the material throughput of the economy not only takes pressure off ecosystems, it also reduces energy demand, which-as the recent IPCC report points out-makes the transition to renewable energy much more feasible.
Scaling down aggregate economic activity might reduce private riches, but-as I have argued before-it needn’t reduce public wealth.
5. Distribute national income more fairly by introducing either high marginal tax rates on top incomes (like the 80% top marginal tax rate the U.S. averaged from 1943 to 1983), or a maximum wage policy. Roll out a wealth tax, as Thomas Piketty has proposed, and a financial transaction tax. Close down secrecy jurisdictions and introduce a global minimum corporate tax to wipe out tax evasion. Use the proceeds of these taxes, and of the above-mentioned fees on resource use, emissions and waste, to (a) help fund the rapid rollout of renewable energy infrastructure, (b) contribute to a universal basic income, and (c) invest in public goods. Democratise workplaces and encourage co-operative ownership structures for businesses.
Dr. Jason Hickel is an anthropologist, author, and a Fellow of the Royal Society of Arts. He has taught at the London School of Economics, the University of Virginia, and Goldsmiths, University of London, where he convenes the MA in Anthropology and Cultural Politics. He serves on the Labour Party task force on international development, works as Policy Director for /The Rules collective, sits on the Executive Board of Academics Stand Against Poverty (ASAP) and recently joined the International Editorial Advisory Board of Third World Quarterly.
|
2019-04-23T17:50:28Z
|
https://journalworker.wordpress.com/2019/01/25/inequality-and-the-ecological-transition/
|
Porn
|
News
| 0.103464 |
wikipedia
|
Rusyn (Rusyn: русиньска бесїда or русиньскый язык), an aa kent in Inglis as Ruthene (sometimes Ruthenian), is an East Slavic leid variety spoken bi the Rusyns o Eastren Europe. Some linguists treat it as a distinct leid an it haes its ain ISO 639-3 code; some Ukrainian scholars treat it as a dialect o Ukrainian. Each categorisation haes controversial poleetical implications.
↑ Statistical Office of the Slovak Republic. "Population and Housing Census 2011: Table 11. Resident population by nationality - 2011, 2001, 1991" (PDF). Statistical Office of the Slovak Republic. Retrieved 22 March 2012.
↑ Republic of Serbia, Republic Statistical Office (24 December 2002). "Final results of the census 2002" (PDF). Retrieved 16 December 2010.
↑ State Statistics Committee of Ukraine. "About number and composition population of UKRAINE by data All-Ukrainian population census 2001 data". Retrieved 16 December 2010.
↑ "Home" (PDF). Central Statistical Office of Poland. Archived frae the oreeginal (PDF) on 16 January 2013. Retrieved 22 March 2012.
↑ "Republic of Croatia - Central Bureau of Statistics". Crostat. Retrieved 5 September 2010.
↑ "The Statue of the Autonomous Province of Vojvodina". Skupstinavojvodine.gov.rs. Retrieved 2012-08-07.
↑ Alternative names are used in different Ruthenian areas, like руска бешеда, rusinščina or even język łemkowski (in southeastern Poland etc. None of them are more academic than another, due to non-recognition of the language.
This page wis last eeditit on 5 September 2014, at 17:28.
|
2019-04-23T18:39:32Z
|
https://sco.wikipedia.org/wiki/Rusyn_leid
|
Porn
|
Home
| 0.686068 |
google
|
Moorhead band recently went on a trip to Hawaii over spring break. Not only did the group get a great amount of sun, they were also able to create some amazing memories. “I feel more connected to band and the other students because of this trip,” says Stephanie Mcdowell, a sophomore in symphonic band. Mcdowell had a lot of fun playing music at Pearl Harbor, getting to go hiking, and even learning how to hula dance. But of course, you can’t forget about going to the beach! “My favorite part of the trip was getting to see the ocean,” Mcdowell said. Opportunities like this are great to take, because you’re able to bond with the other students, while getting to travel to a place like Hawaii.
|
2019-04-24T18:24:37Z
|
https://sites.google.com/a/thespudnews.org/thespudnews/home/arts-entertainment/mhsbandtravelstohawaii
|
Porn
|
Arts
| 0.442256 |
wordpress
|
I’ve extracted (and edited) yet another pilfered nugget from RoughWaterJohn’s locker.
This entry was posted in Fodder for Thought, On Writing/Speaking, Poetry. Bookmark the permalink.
|
2019-04-19T11:02:01Z
|
https://fodder4thinking.wordpress.com/2011/04/06/on-writing-from-the-heart/
|
Porn
|
Arts
| 0.980835 |
wordpress
|
Russ played soccer. in elementary school. in high school. in college. and even in one old man 6v6 league. Taylor’s uncle Brian played soccer. in elementary school. in high school. in college. and I think he may still play in an old man league. Taylor’s cousins play soccer, beginning at “micro”. So it was only a matter of time before she put on tiny pink shin guards and shiny tiny new cleats and her soccer jersey and joined in the family tradition.
We just have to keep reminding ourselves that this is her first season and she is the youngest on her team…all of her teammates have already played a season. So all things considering, she’s doing just fine. right?
Not bad for her first game.
And you just have to see her in action (and I use the term “action” loosely)…please forgive the videoing skills at the end especially when I had to choose between filming Taylor or the “action”. I particularly like the head bobble…Grammy says that’s how I used to run – I hope that doesn’t mean she has my lack of athleticism.
|
2019-04-21T00:57:13Z
|
https://itdoesntgetbetterthanthis.wordpress.com/2011/03/25/only-a-matter-of-time/
|
Porn
|
Sports
| 0.971283 |
wordpress
|
I was born on 4th April 1902 in Dunstable, Bedfordshire, the third son of Frank Wilson and Alice Elizabeth White and was christened Hugh Brian. At least three and possibly four of my known forebears had lived in Dunstable.
Joseph White’s younger brother Henry possibly lived at the Carpenters Arms in the High Street, Dunstable. Unfortunately nothing is known about him except that he was born in the 18th century and married Mary Wilson. They had five children – Henry, George, Elizabeth, Sarah and Henrietta.
It is through George (1800-1882) that the family has descended. George married Elizabeth Priest (1798-1890) and had six children Henry, James, Henrietta, Elizabeth, George, and Francis Frederic (8.3.1839-10.8.1908) who was my grandfather. George was a builder or carpenter by trade, working from the rear of the premises at the Carpenters Arms. My own father remembered visiting his grandfather there when very young — 3 or 4 years of age, about 1868 or so. The property at some later date was sold to Bennett’s Brewery of Dunstable.
On 24 April 1856 Worthington George Smith (WGS) married Henrietta. They first made their home in Islington, London; in 1885 they moved to The Hawthorns, 121 High Street South, Dunstable. Here WGS continued his archaeological and historical investigations, writing and illustrating numerous book and papers. Henrietta died after a short illness on 23 June 1917. WGS died of pneumonia on 27 October of the same year. Both were buried in the West Street Cemetery, Dunstable.
Francis Frederic married Martha Balderson (15.6.1839-14.5.1922). They had three children – Frank Wilson (31.1.1865-11.2.1951), Arthur Alfred (born 1870) and Ernest Frederick (born 1876 and who was to die five weeks later). Francis was a builder with his business premises in Princes Street where it would appear they lived. He also farmed the area between The Rifle Volunteer” public house and the Dunstable cemetery. He lost £5000 in two lawsuits, as a result of which it would appear the farming enterprise was abandoned, with his building activities suffering too. On his death my father took over.
My father Frank Wilson was also a builder. He lived at 26 Princes Street and later at West Parade off Princes Street, Dunstable. On 6 April 1893 he married Alice Elizabeth Nott at the Parish Church, Harpenden, Hertfordshire They had five children – Frederic Charles (b.1894), Gilbert AIan (1896-Mar 1957), myself, Kathleen Mildred (b.1903), and Marjorie Alice (b.1906).
My mother’s family descended from William Nott whose second son Charles (born 1820) was to marry Sara Weston, who was known as Cherry. The family is first recorded as living on a farm at the rear of Harpenden Church where my mother was born on 2nd June 1865. About this time a move was made to Pollards Farm, Kinsbourne Green, a property leased from Lord Ludlow of Luton Hoo Estate. Charles and Cherry had twelve children, with mother being the sixth born. Three of her elder brothers Henry William (or Harry), Ernest Charles and Francis Robert (or Frank) emigrated to Australia. George Edward was a grocer and provision merchant of 21/22 Charles Street, Tring, Hertfordshire. He died of pneumonia at the age of thirty. Edwin had a firm in Wood Street, London. His son Cecil had a straw hat factory in Guildford Street, Luton. Of the other six I was to know Joseph Newland – Uncle Joe – the best. On the death of his father he took over Pollards Farm, where I was later to spend many of my happy childhood days. At some later date Uncle Joe was to lose the lease on the farm. He went to Canada on a visit and was too late in returning to renew it. I regret I am somewhat hazy as to the sequence of events and dates, but about 1890 or so, mother had a bad fall from a horse and went to family in Australia for two years to recuperate.
About 1908 my father was planning to emigrate to Australia with the family, probably influenced by mothers glowing reports of that country. The business had been sold and we were all set to go when father was taken seriously ill with kidney stones and the move had to be called off.
Having recovered and re-established himself in the building trade, a couple of years later, father went to Canada alone and worked on the Parliament Buildings, Ottawa for a while. (I mention the following as I am very uncertain as to exactly when he went to Canada. It could have been years before, but the odd comment leads me to believe that while he was away we were living at Pollards Farm. The East and West blocks of the buildings were built between 1859 and 1865. Building of the library commenced in 1859; it was redesigned with a wrought iron dome and completed in 1877. After a spectacular fire the dome was rebuilt in 1916. The Central tower – Victoria Tower – was rebuilt starting in 1917 and was renamed the Peace Tower). He possibly visited Vancouver when in Canada.
On his return, we moved to Church Street Station, Dunstable and then to Portland Street, Luton where father continued in the building trade. He was involved in the rebuilding of Luton Town Hall after it had been burnt down in the riots of 1919. About this time we were living at 13 Bury Park Road, Luton. For one reason or another, father gave up building and by 1928 was employed in the Despatch Department of a local straw hat factory. Circa 1945 my parents were living in a rented bungalow on Whipsnade Road, Dunstable. In his younger days, in the 1880s, father was a great amateur cyclist and once won a gold medal.
There was nothing special about my youth. I went to Beech Hill School and liked doing things that all boys do. I played Cowboys and Indians and nearly lost the sight in my left eye when an arrow narrowly missed and hit the bone below. I have retained a faint scar from this injury all my life. I used to like visiting Pollards Farm and the outdoor life.
|
2019-04-24T08:02:34Z
|
https://nippercartoon.wordpress.com/history/
|
Porn
|
Business
| 0.145281 |
google
|
A full-service turn-key in-application commerce solution with fraud detection is disclosed that provides web service interfaces to a commerce system. The in-application solution features fraud detection with user behavior tracking and fraud controls that limit the features that are offered to a user. Fraud detection involves input from the application, the commerce system, or third party systems. User fraud scores are updated frequently as events are processed. Controls are applied to the user account based on the user fraud score and risk classifications for ranges of fraud scores. An in-application solution also features a wallet with a personal threshold for microtransaction spending, limiting the amount that the user is allowed to spend before a wallet is cleared. The wallet is integrated with the fraud detection such that the personal threshold is determined from the user's latest fraud score.
This application claims the benefit of U.S. Provisional Application No. 61/417,063 filed 24 Nov. 2010, entitled “In-Application Commerce System and Method,” which is incorporated herein by reference.
This patent application is related to co-pending U.S. patent application Ser. No. 13/304,171, filed 23 Nov. 2011, and entitled “Modularized In-Application Commerce System and Method” which claims the benefit of U.S. Provisional Application No. 61/417,083 filed 24 Nov. 2010, entitled “Modularized In-Application E-Commerce System and Method”, all of which are incorporated herein by reference.
The present disclosure relates to commerce systems for use in the internet gaming, social networking and virtual world industries. More particularly, the present disclosure relates to a modular in-application e-commerce system and method providing commerce services to online game publishers.
The social gaming industry is making its contribution to the world economy. According to Parks Associates, the social gaming industry will increase its revenue by five times between 2010 and 2015, when it is expected to top $5 billion. Recently, the value of the sale of virtual goods in the online games market has been surpassed by that of social networking sites. This market expects to see an increase in value from $2.2 billion in 2009 to $6 billion before 2014. Each of these applications, which offer at least some free features, offers new opportunities for integrating e-commerce, monetization, and sales and marketing of content and products.
According to media consultant, Dan Taylor, choosing monetization strategies depends on the social game value chain, which can be summarized into 5 phases: idea, balance, goods/currency, payments and commissions. First, the game idea is the foundation of everything else that follows. Publishers with a game idea must evaluate the revenue potential of the game. Once the game has been fleshed out, the next phase of the value chain is game balancing, where game publishers define crucial monetization factors in order to fully develop the virtual economy of the game. Virtual economies function like real world economies, and therefore issues such as supply and demand, inflation, speculation, etc., must be factored in to create a pricing structure that will remain balanced and fair within the game, provide publishers with a decent return for their efforts, and remain attractive to the end user, i.e. cost vs. value. In addition to these variables, developers must also factor in limited offers and promotions that will incentivize users to either play or purchase more, while at the same time, maintaining the delicate balance of their virtual economy.
Virtual economies arise out of interactions among players in the virtual world, usually as they exchange virtual goods and earn valuable objects that provide the participant with both utility and social value. Selling virtual goods within social games has become the dominant business model on social networks because social games can support virtual goods that combine game play benefit with social value.
A virtual economy may also include reward programs. A reward program is a form of a loyalty program. Loyalty programs allow a publisher to identify their customers and reward them as a retention mechanism. An effective reward program also enables the publisher to identify potential best customers and market to them accordingly. The basic principle is that by rewarding the best customers they in turn will continue to reward you with their business as they feel recognized and appreciated. The key objective of loyalty or reward programs is to strengthen the two-way loyalty bond between the publisher and its best customers. Every time a reward program device, most commonly a “reward card” is used, it not only identifies the customer but also links relevant transactions to their record. This data can then be analyzed and used to reward customers with the objective of retaining or growing their profit contribution.
Virtual currency is typically the medium of exchange used for virtual goods. Each game typically has its own nomenclature for its virtual currency (e.g. coinz, tokenz, gcash, etc.) but they all provide a means of exchange allowing users to purchase items. Virtual currency may be purchased with real world currency or earned by obtaining various goals in the application. This exchange takes place in a virtual marketplace (primary market, or game-to-player market) or a virtual auction house (secondary market or player-to-player market).
Once the virtual economy is set, publishers need to build a bridge to “real world” money by providing a payments system. Payments services can be provided by a service provider or directly from the end user themselves. When application publishers choose to receive payment directly, there are a number of “real world” financial elements to be considered, including credit card fraud, charge backs, taxation, and much more. Publishers must manage how they'll aggregate these payments. If they have chosen a service provider to handle this for them, they may choose either a branded or white label payment service.
Commissions refer to the amount of revenue earned by the provider for their services. Commissions are highly dependent upon the title's success and associated volume, not only of active users, but also profits derived from sales of virtual goods.
Once the application publisher determines how the application will be monetized, a specific partner may be chosen to provide the monetization environment. In the social network/free-to-play gaming field, there are generally three unique forms of monetization: offer companies, payment service providers, and technology firms. Each has its own area of specialization, and game developers can mix and match from each provider. Some offer only a niche option, while others can provide a complete turn-key solution. Offer companies may provide a “bare bones” solution, in so much as they only offer one form of monetization—that which arrives via a third party. Examples of offer companies would include Offerpal, SuperRewards, Boomerang Networks, Gratispay or Sponsorpay. This form of monetization focuses only on offering special offers, say an online survey to be filled out in exchange for some form of virtual currency. Offers are an important revenue factor as it helps monetize the portion of users that are not willing to spend real money on their virtual goods and currency purchases. One side effect of employing offers as a form of monetization is that game publishers will be sending players out to a third party, thereby losing the game branded experience. Offer companies clearly brand themselves, and it's here where the actual interaction between player and the monetization business model takes place. This can be at odds with optimizing the user experience, since the buying experience in an in-application e-commerce ecosystem should be as seamless and as simple as possible. While the player should be aware of his/her purchasing capabilities at all times, he/she should only momentarily leave the game to make a purchase without ever feeling as though he/she has actually left the game. In other words, the solution should be wholly integrated into the various parts of the gaming experience. Therefore, offer companies' contribution to in-application monetization only supports a small piece of the value chain.
Payment service providers offer game and social network publishers different pieces of the value chain, but due to their nature do not completely fulfill it. Examples of payment service providers include Chase PaymentTech, NetGiro, and Global Collect. These firms offer application publishers a direct integration of payment methods, i.e. there's no sending players out to a separate location to make the transaction, and then re-routing them back into the game. By using a payment service provider, application publishers can keep players in-house and thereby potentially increase application stickiness as well as ‘time on-site’ or ‘time in-game’. While other companies build their brand by maintaining their own identity throughout the transaction, payment service providers can offer publishers a white label solution, making the technology appear as their own, or remain self-branded. These payment service providers typically are specialized financial transaction experts. Similarly offer companies are strong in the ad-broker business, and offer application publishers only a part of the value chain but do not complete it.
Some software application publishers choose to work with technology providers, such as Playspan, Live Gamer and fatfoogoo. While each of these providers have their own unique set of solutions, essentially, they allow application publishers to do what they do best—develop applications. Technology companies provide publishers with a service that addresses each piece of the value chain. Many of these companies have relationships with selected payment service providers, thereby ensuring financial excellence, as well as offering solutions for game balancing, virtual goods/items store management, virtual currency wallets, detailed analytics and reporting features, and user management. Technology providers free up application publishers to focus on application development, marketing, and balancing their application as it grows with the provided tools.
Like any online merchant, game and other application publishers are especially concerned about limiting their exposure to fraud while offering their players and users the richest, most exciting game experience possible. Online fraud, particularly in the gaming area, comes in many forms, including software piracy, theft of passwords and inventory owned by/assigned to user accounts and payment/commerce related fraud.
A need exists for a system that offers an extensive and comprehensive monetization feature set with optimal fraud detection and management features. Examples of desirable features include detecting, preventing and mitigating fraud, managing the game economy, offering flexible payment methods (e.g. payment using both virtual and real currency from one account) and reverse wallet transactions that offer the greatest protections for the game/application publisher. The present invention provides a solution to these needs and other problems, and offers other advantages over the prior art.
In accordance with one embodiment of the invention, a comprehensive, turn-key, in-application ecommerce system and method is disclosed. Such an in-application ecommerce solution provides functionality for operations ideally suited for the social gaming and network environment, for example, it provides software modules and application programming interfaces (API) configured as web services for monetizing in-application activities such as user account management, fraud detection, wallets, and transaction and payment processing. This functionality can be described from the perspective of operational areas of billing and customer management, store and primary markets, and player-to player (i.e., secondary markets). A preferred embodiment of the present invention provides this functionality in a highly modularized manner such that software application publishers may subscribe to the entire set of features and functionality, or may choose any number and combination of modules that best suits the software application.
Billing and customer management features of the solution span a wide variety of functionality required to support a fully integrated in-application monetization solution. Software application modules that support this functionality include account (e.g. user and subscription) management, customer care, clearing and settlement, fraud prevention, reporting and analytics, messaging, invoicing, tax and global payments. This in-application monetization solution allows users (shoppers) to store their billing related details (e.g., billing address, preferred payment method and details, transaction history) This account profile may also include information like achievements in the game or levels attained. This account enables 1 click/instant checkout or purchase experiences through multiple channels (e.g., online, mobile, tv, etc.). One skilled in the art will recognize upon examining this specification and drawings that additional modules may be included, or that functionality contained in one module may be implemented in another module and still remain within the teachings of the invention.
For the store and primary markets, the features of the preferred embodiment solution span many functional requirements. For example, an application content manager may control the behavior of items through various economic situations such as inflation, artificial scarcity and speculation by creating events that control the item attributes. In addition, a wallet feature allows the user of the software application to pay for items with either virtual currency or real currency (e.g., a credit card) stored in the same account. Player-to-player trading is accommodated by providing roles and a framework for selling and auctioning items from a user's account-based storefront.
Fraud detection and management offers the game or application publisher risk management features that protect them from chargebacks and other losses. Fraud management is based on rules configured by the customer (i.e., the software publisher), user behavior tracking and fraud controls that allow the customer to limit the features, such as payment methods, user roles, offers and content, that are offered to a user based on a user's fraud score, thereby greatly minimizing the opportunity for fraudulent behavior for users with high fraud scores. Fraud detection modules may receive input from the customer/publisher regarding which events to utilize in generating a fraud score. These utilized events may come from the application, the commerce system, or third-party systems. User fraud scores are updated frequently as events are processed by the e-commerce solution. Controls are applied to the user based on the user fraud score and customer-defined risk classifications.
An embodiment of the in-application e-commerce solution invention also features a wallet with a personal threshold for microtransaction spending, limiting the amount that the user is allowed to spend before the system clears the wallet. The wallet is tightly integrated with the fraud detection system and the personal threshold is determined from the user's latest fraud score, allowing microtransactions while limiting the risk of loss to the game or application publisher.
Additional advantages and features of the invention will be set forth in part in the description which follows, and in part, will become apparent to those skilled in the art upon examination of the following or may be learned by practice of the invention.
FIG. 1 illustrates an in-application commerce system in context.
FIG. 2 illustrates the system service architecture of a modularized in-application commerce system.
FIG. 3 illustrates the software architecture for a modularized in-application commerce solution.
FIGS. 4a-4d illustrate some use cases supported by the in-application commerce solution.
FIG. 5 is a screen shot of a User Management module, Account Overview page from the web client application.
FIG. 6 is a screen shot of a User Account Overview details page, showing the various tabbed sections containing the user's account information.
FIG. 7 is a screen shot of a subscription management page which allows a content manager to create a subscription.
FIG. 8 is a screen shot of the portion of a Create a Subscription page allowing the content manager to add a portfolio image to the file.
FIG. 9 is a screen shot of the portion of a Create a Subscription page allowing the content manager to define the purchase procedure for a subscription.
FIG. 10 is a flow chart illustrating the process of determining a risk score contribution based on IP address and credit card information.
FIG. 11 is a flow chart illustrating the process of determining a risk score contribution based on IP address on login and the country settings on a user account.
FIG. 12 is a flow chart illustrating the process of determining a risk score contribution based on customer dispute behavior.
FIG. 13 illustrates the fraud defender module and message feed system.
FIG. 14 is a screen shot of the Risk Class Management page allowing a content manager to set ranges for risk classes.
FIG. 15 is a screen shot of an Economy Management page allowing a content manager to create a set of attributes to define an “event id” that determines the item behavior relative to economy management controls.
FIG. 16 is a screen shot of a Currency Type Management screen allowing a content manager to define attributes of a currency type.
FIG. 17 illustrates the APIs involved in making a purchase in-game, when the wallet does not have sufficient funds.
FIG. 18 is a sequence diagram of the process of funding an account.
FIG. 19 is a sequence diagram of the process of purchasing content.
FIG. 20 is an exemplary process for creating a child account prior to creating a parent account.
FIGS. 21 and 22 illustrate the process flow of reverse wallet functionality.
FIG. 23 is a screen shot of a process of creating parent-child relationships within the web client.
FIG. 24 is a screen mock up for creating a child profile.
FIG. 25 is a screen mockup for assigning permissions to a child account.
FIG. 26 is a screen mockup of a confirmation screen following successful creation of a child account with permissions.
An exemplary system is illustrated in context in FIG. 1. Application users 102, principally those who participate in online games, social networks and virtual worlds 108, access their favorite sites over the internet 104 via an electronic device with internet capabilities. Such an electronic device could be a computing device, such as a personal computer 120, iPad, cell phone 122, personal digital assistant 124 (PDA) or any other device with internet capability. Online games, social networks and virtual worlds 108 have become a huge source of revenue, with participants of even “free” online games spending millions of dollars each year on both virtual and real products. Participants in these applications frequently want to enhance their enjoyment of the experience by purchasing virtual objects that help them achieve a particular standing in the environment, or allow them to achieve some advantage over other participants. For example, a game player may wish to purchase an object, such as a virtual tool or weapon that allows the player to defeat other players in game activities. The application publisher may host its own commerce system allowing participants to purchase virtual or physical objects, or it may wish to access one or more modules of third-party systems. A fully developed ecommerce system 112 may include any number of modules to facilitate such transactions, for instance, modules executing code to perform the functions and features of billing and customer management 114, store and primary market management 116, and player-to-player, or secondary market 118, management.
This exemplary system includes various computers, computing devices or electronic devices, including, for example, end user machines (e.g. personal computer, etc.) 120, 122, 124, a communication network 104 and one or more servers 106, 110 hosting web sites and applications. The computer, computing or electronic device typically includes a memory, a secondary storage device, a processor (central processing unit, or CPU), an input device, a display device, and an output device. The memory may include random access memory (RAM) or similar types of memory. Software applications, stored in the memory or secondary storage for execution by a processor are operatively configured to perform the operations of a preferred embodiment of the system. The software applications may correspond with a single module or any number of modules. Modules are program code or instructions for controlling a computer processor to perform a particular method to implement the features or operations of the system. The modules may also be implemented using program products or a combination of software and specialized hardware components. In addition, the modules may be executed on multiple processors for processing a large number of transactions, if necessary or desired.
The secondary storage device may include a hard disk drive, floppy disk drive, CD-ROM drive, DVD-ROM drive, or other types of non-volatile data storage, and may correspond with the various equipment and modules shown in the figures. The processor may execute the software applications or programs either stored in memory or secondary storage or received from the Internet or other network. The input device may include any device for entering information into computer, such as a keyboard, joy-stick, cursor-control device, or touch-screen. The display device may include any type of device for presenting visual information such as, for example, a computer monitor or flat-screen display. The output device may include any type of device for presenting a hard copy of information, such as a printer, and other types of output devices include speakers or any device for providing information in audio form.
Although the computer or computing device has been described with various components, one skilled in the art will appreciate that such a computer or computing device can contain additional or different components and configurations. In addition, although aspects of an implementation consistent with the system disclosed are described as being stored in memory, one skilled in the art will appreciate that these aspects can also be stored on or read from other types of computer program products or computer-readable media, such as secondary storage devices, including hard disks, floppy disks, or CD-ROM; a non-transitory carrier wave from the Internet or other network; or other forms of RAM or ROM. One skilled in the art would recognize that computational resources may be distributed, and computing devices may be client or server computers. Client computers and devices (e.g. 120, 122, or 124) are those used by end users to access information from a server over a network, such as the Internet 104. Servers are understood to be those computing devices 106, 110 that provide services to other machines, and may be (but are not required to be) dedicated to hosting applications or content to be accessed by any number of client computers. Web servers, application servers and data storage servers may be hosted on the same or different machines 106, 110.
Client computers access features of the system described herein using Web Services. Web services are self-contained, modular business applications that have open, Internet-oriented, standards-based interfaces. According to W3C, the World Wide Web Consortium, a web service is a software system “designed to support interoperable machine-to-machine interaction over a network. It has an interface described in a machine-processable format (specifically web service definition language or WSDL). Other systems interact with the web service in a manner prescribed by its description using Simple Object Access Protocol (SOAP) messages, typically conveyed using hypertext transfer protocol (HTTP) with an Extensible Markup Language (XML) serialization in conjunction with other web-related standards.” Web services are similar to components that can be integrated into more complex distributed applications.
While the system disclosed herein is described in the context of internet gaming, social networking and virtual world applications (collectively referred to as social games), it will be recognized by those skilled in the art that it may be used with other applications as well. Further, while specific modules are described, other modules may be added or deleted without departing from the scope and spirit of the present invention. All examples are offered by way of example and not limitation. It will be understood by those of ordinary skill in the art that the terms “shopper,” “user,” “end user” and “player” are synonymous and are used interchangeably throughout this document, while the terms “customer,” “game publisher,” “publisher,” “administrator” or “administrative user” are also used synonymously and interchangeably.
The three tier structure can also be viewed from a functional perspective, as in FIG. 3. A user interface (UI) layer 302 is exposed to clients and client systems. A store and administrative user interface 302 provides user access to the system for the various administrative tasks associated with the functional modules provided. For example, an administrative user may log into the UI to set up an item or offer, run reports, perform dispute resolution and conduct analysis on offers and users. These examples are offered by way of example and not limitation. One skilled in the art would recognize that many types of functionality could be provided for an application publisher, system administrator or others to perform through a user interface without departing from the scope and spirit of the present invention.
A functional, transaction management layer provides the code required to perform the transactions and store, maintain, access and retrieve data. Also by way of example, these various modules may include user account management 304, subscription management 306, offer and store management 308, item management 312, reputation management 310, an auctioning framework for player-to-player secondary markets 314, reporting & analytics 328, dispute management 330, customer relationship management 332, customer care 334, fraud detection 336, and Clearing, Refunding, Settlement and Invoicing modules 322. A least cost router 324 in part determines the payment forms offered to a particular customer based on a number of factors. The least cost router 324 is discussed in more detail below.
A batch framework 208 supports batch processing of transaction data to provide information to supporting modules, including fraud detection analysis 336, reporting and analytics 328 and customer relationship management 332. A messaging framework 318 supports notification and communications such as email notifications to users acknowledging a purchase. Payment partners 326 are accessed and respond via the open interface middleware discussed above.
The system is designed to support three overarching areas of functionality, namely: billing and subscription management 114; electronic storefront or a primary market 116; and player-to-player trading or a secondary market 118. Application programming interfaces (APIs) provide seamless integration between the system and client applications to enable this functionality. Configuration and set up of this functionality may be accomplished either through APIs or a web client. Each of the areas of functionality, and a preferred embodiment set of modules as well as frameworks are discussed in detail below.
As is illustrated in FIG. 4a , modules that may support the billing and subscription management functionality include account management (user and subscription management) 402, customer care 332, clearing and settlement 322, fraud detection 336, reporting and analytics 328, messaging 318, invoicing 322, least cost routing 324, tax 416 and global payments 326.
An account management module 402 allows game publishers to manage customer lifecycles, including all aspects of billing-relevant characteristics. The system provides a web-based registration process that can be seamlessly integrated with an existing web framework or can be operated on a stand-alone basis. Single sign on adapters allow the registration logic to be embedded in an existing user or community site. This module may use a role-based philosophy, with the defined roles granting a user specific access rights within the application. These functions enable an administrator to review and amend user details as well as activate/deactivate users; view/modify customer profiles; view/modify risk profiles; manage/modify active subscriptions; view customer's action history; contact the customer and more. An Account web-service described in the Web Services section below, provides access to all of the user management functions remotely. These functions can also be exposed to a user with a comprehensive graphical web-user interface.
A screen shot of the Account Overview page of the graphical web user interface is displayed in FIG. 5. The account overview page provides status information on each role created under the account. Roles may be displayed based on user-determined criteria such as role 502, online status 504 and activity status 506. Account detail pages for a particular role 508 may be opened by clicking a “Details” button 510.
Referring to FIG. 6, an User Account Overview page 602 displays a number of tabs providing profile information for the role selected. A game profile tab 604 allows an application administrator to deactivate 606 and reactivate 608 users, and view identities, payment forms, login and subscription history 610. A commerce profile 612 allows the administrator to edit and add an address to a selected user, and view their rating details and risk class (discussed below). This profile contains details on settings, payment forms, login history, role, rating details and buyer, and more. A messaging tab 614 comprises an inbox, trash, compose and sent mail folders that allow the user to send and receive messages. A payout tab 616 provides details on player-to-player trading transactions. A disputes tab (not shown) lists the user's disputes for allowing an administrator to manually evaluate disputes and risk characteristics. A transactions tab 618 provides a comprehensive list of transactions involving the user. For example, user bids, user reverse bids own reverse offers and user offers and auction transactions that are listed on this tab. The User Account Overview page also has a tab for the user's wallet 620, including funding information by real or virtual currency. A list of child accounts 622 (discussed below) related to the user provide transaction history and total spent in time and money. Further, a risk profile tab 624 allows the administrator to view the risk class and fraud points assigned to the user. A customer service agent may also use this tab to make adjustments to the user's risk score.
A subscription management module 306 exposes a branded registration and self-service portal within an existing website, allowing the game operator or publisher to present a variety of different offer possibilities, including: free teaser subscription, compound subscriptions, subscription as a pre-requisite for a premium subscription or a premium content offering; a follow-on offer; promotions; email or in-game notifications; multi-lingual offers; and regional pricing and promotions. In a preferred embodiment, the subscription management module is directly integrated with the payment component, allowing for safe and secure recurring payments across the different payment channels 326. Subscriptions are treated the same as specific offers, products and/or promotions. These subscriptions may be have renewals that are automatically or manually processed.
A customer care or customer support module 332 provides full insight into all relevant platform activity performed by users. Following strict data protection and privacy guidelines the support agent may have access to browsing behavior and all relevant transaction information. Agents may also modify user data, add personal information only visible to the care organization, or active/reactivate users. Agents with additional permissions can also reverse payment transactions, refund the customer or initiate other “goodwill” actions after closing the case. These “goodwill” actions may be crediting the wallet or pro-longating the renewal cycle of a recurring subscription. A ticket system is provided for tracking.
The payment gateway module 322 manages all interfaces to payment providers, price calculation services and in-application delivery functions. It is used in all three use cases whenever a payment is made. The module is directly connected to the transaction management framework 212 through internal APIs and interfaces, and provides a list of all pay-out transactions. Transactions may be manually approved to be paid out to customers and also may be canceled. Transactions may also be handled automatically when a success response is received from a payment partner. By using account based fraud scoring, a risky transaction may be disabled before the user's transaction is passes on the payment partner.
A preferred embodiment of an in application commerce system and method uses a least cost router 324 that allows the game publisher or administrator to set rules based on business logic and requirements, in order to determine what kind of payment options are available to a particular user and/or for a particular item or offer. The payment option configuration is also tied to the fraud module, which allows a user to set rules on payment options based on various fraud indicators, mitigation schemes and risk/fraud scores. All rules may be configured to be specific per game.
The general payment gateway configuration may be overridden on a per offer basis. In other words, a default “all payment forms” may be supported per offer, but if the administrator would like to overrule the gateway configuration, that may be changed and individual payment forms will be selectable. In this way, the administrator may also restrict payment form characteristics for the offer (e.g. surcharge or discount).
Table 1 lists some of the information may be used to configure the payment forms available for a game.
are listed on the payment selection page.
Payment The system name of the payment form.
the payment form is applicable for the market.
payment form should be offered or not.
price, or a flat amount.
Having configured the payment gateway for a particular game, any transaction requested by the game player will offer only those payment options that meet the payment, offer and fraud configuration selected by the user.
The least cost router may also be configured to determine a preferred payment provider. Based on factors such as currency, payment method, amount, country, exchange rates and others, the least cost router can locate the most cost effective payment provider for any transaction and direct the payment transaction to that provider through the global payment framework.
A global payment framework 220 manages all outgoing interfaces (see Table 19, below) to payment providers (including clearing, refunding, charge-backing, settlement and invoicing 222), currency calculation services and in-game delivery functions. It is directly connected to the transaction management framework through internal APIs and interfaces to the reporting database 226.
The payment module 326 manages all outgoing interfaces to payment providers and currency calculation services to handle payments, recurring payments and refunds. It is directly connected to the transaction management framework through internal APIs and interfaces to all relevant back office and reporting tools.
All real-money-relevant payments are handled through the platform. Depending on the type of transaction only a selected choice of payment options is offered to the end-user. The payment module 326 receives the final price from the offer management tool and handles the actual payment process by interacting with external payment systems.
An in-application commerce payment module is extremely flexible in design and can integrate with a large number of different payment providers in parallel 326. A configurable set of rules determines automatically the right provider that should be used for completing the actual transaction. Attributes determining the use of the right payment provider include the transaction value, the region, the risk profile for the particular transaction and customer preferences and can be easily extended if required. An example would be to exclude credit card payments for low transactions values due to the high fee structure or to only allow prepaid payment options if the customer behavior shows a high risk rating.
A payment module 326 also exposes interfaces to reporting 328 and customer care 334 applications in order to give insight into the status of the transaction and allow the triggering of refunds and reverse the purchase if necessary. The payment gateway is highly flexible, capable of supporting many payment methods all over the world, including credit cards, payment enablers (e.g. PayPal, moneybookers, etc.), prepaid cards and mobile payment channels.
The transaction module 322 calculates secondary market revenue shares and triggers correct payout procedures. Receiving dynamic input data from the auctioning module, the tax database and a currency calculation service, the settlement process is executed at predefined times and calculates revenue shares according to pre-defined rules. The rules are defined through a restricted configuration tool that provides the functionality for defining revenue share ratios, price-ranges, minimum prices, payment terms, and settlement periods, etc. as rule-sets for calculating the shares.
Fraud management, detection and control are critical components of any online commerce system. A fraud management, detection and control module 336 (aka fraud defender module) includes internal and external fraud controls that ensure that each transaction is properly authorized by role/risk-class and evaluated against fraud checks to prevent chargebacks and protect customers. It allows the customer to detect and manage fraud across channels and accounts, and to define fraud detection, scoring and controls to suit any kind of rule desired. The customer may configure the system in a way that allows the fraud defender module to control various aspects of the user's commerce experience, including the offers, payment methods and reverse wallet thresholds that are presented to the user.
As will be recognized by one of ordinary skill in the art, the parameters for a fraud detection and management system and method are configurable within the general framework of the fraud defender module. In general, a preferred embodiment of a fraud defender module allows configuration of rules for setting, incrementing and decrementing fraud scores (also referred to as risk score or risk scoring); for tracking user events; for setting and adjusting risk classifications; and for configuring rules and consequences for the results of fraud score/classification evaluation. It will be appreciated by those skilled in the art that incrementing and decrementing of fraud scores can be accomplished by assigning positive and negative fraud points to user accounts based on fraud controls and then summing those fraud points together to arrive at a total fraud score.
A fraud rating, or points, can be attached to virtually any kind of event (e.g. behavior, function or action) that the user is capable of performing internal or external to the platform. As will be described in more detail below, fraud ratings may be configured for commerce platform-related events, game play events, or 3rd party events.
The user (account holder) is typically assigned a risk class and a customer is able to modify the assigned risk class for every account. Manual assignment may override automatic assignments until the manual assignment is lifted. As the user moves through the application the user's risk score is updated frequently, incremented and decremented as the user is involved in any of the configured events, which may or may not adjust the originally assigned risk class. Fraud controls are applied based on the risk classification identified by the user's fraud score in the user account. Fraud results and case management may be fed back into the legacy systems from which the fraud originated. This allows the customer to further refine fraud detection on its site.
The fraud defender module tracks user events and assigns and updates the fraud score per user with any kind of activity or event the user is performing in the application or game, on the commerce platform, or external to both (such as a payment provider detecting fraud on the user's credit card). Examples for increasing a user's fraud score include increases based on information gathered during the credit card registration process, fraud information from a payment partner, chargeback ratios and transaction disputes (discussed further in the paragraphs below and Table 4). Examples of events that may decrement the fraud score making the user less of a risk include game events such as adding new friends, or commerce events such as successful transactions, closing of dispute tickets, wallet turnover, and/or other trust increasing events coming from the application/game itself.
Rules may be configured as a direct consequence to certain events or as the result of the risk classification into which the user's fraud score falls. For direct consequences, purchase transactions may be denied. For example, anyone who is banned or suspended from game play may have purchase transactions denied. Similarly, anyone who in the past was banned or suspended from game play may be assigned fraud points which would result in a higher fraud score after the user account has been reactivated after the ban or suspension has been lifted. Users connecting from a country that is blacklisted or identified as risky, based on the knowledge that fraud is prevalent in transactions from those countries, may be denied purchase transactions. In addition, the system may perform a velocity check, tracking the number of transactions per time frame (i.e. tracking “transaction throttling”) and the amount per transaction and provide an error to the transaction server if certain rules are violated. The rules and results are configurable. Other results may include blocking the account for a particular period of time with an increase in the user's fraud score, denying transactions for blacklisted payment forms, or classifying as a blacklisted error type and increasing the fraud score if payment partners respond with an error on a user's transaction.
Fraud/risk classifications are also configurable. The default risk classes in the system are: no risk, small abnormality, abnormality, risky, fraud most likely. The customer may set the risk classifications as ranges of fraud points and then attach results to them, such as payment forms and user roles. This may be accomplished in the fraud module using fraud management GUIs and APIs (fraud module), or other modules with specific fraud-related rules, such as the Offer and Store Management 308 and Least Cost Router 324 modules.
In a preferred embodiment, the fraud defender module receives event messages from the application, commerce system and 3rd party platforms (such as payment providers) and feeds them into a messaging middleware 318, such as RabbitMQ. Using a messaging middleware allows events to be processed asynchronously at frequent intervals. Users' fraud scores are updated as the messages are processed.
As mentioned above, fraud controls are applied based on the user's fraud score and risk classification level. For example, a user entering the game for the first time may have no history and so begins with a relatively high fraud score and risk classification and is therefore only offered payment methods with the lowest risk (e.g. prepaid debit cards). The user then spends 11 hours in game play, during which time his behavior is tracked as he accumulates tracked play actions over time in the game, adds friends, successfully completes purchase transactions, and/or performs other types of customer-identified and configured events that indicate his propensity for fraud. The tracked events are then used and compared to fraud control rules to update (increment or decrement) the user's fraud score. If his behaviors have lowered his fraud score (i.e., the fraud control rules have decremented fraud points from the user's fraud score), he may be offered additional payment methods and access to additional content areas that are available at the lower risk classification level.
The fraud defender module may work with a least-cost/risk router 324 module that allows the customer to set rules that determine payment types, offers or content to be presented to the user based on various criteria, such as risk class. User behavior may be tracked by the in-application commerce system or by the game application itself, and imported into the in-application commerce system through event messages that are in turn used to further update a fraud score based on fraud controls. Payment methods and transaction limits offered to a user or access to content areas may change as a result of the user's fraud or risk score.
A number of fraud controls may be applied to each transaction, including, for example, usage pattern detection, customer risk classification and payment method restriction by risk class. Each user account is classified by risk class based on automated tests of user specific data as well as through user behavior. For example, during the account registration process 702, as shown in FIG. 7, the platform checks the user's Internet Protocol (IP) address 704, and uses it to perform several checks 706. The first process checks to see if there are other accounts already available within the system using the same credit card 708. If multiple users are using the same credit card, those users will be set to have the same fraud class (all using the highest fraud class of the impacted user accounts 714). Second, it is used for matching of geo-location to account address 710 and payment method address country 712 information. In this exemplary scheme, ten fraud points are added 718 to those accounts where the IP address does not match the country on the account or payment method, while matches result in no additional fraud points 716. Additionally, as illustrated in FIG. 8, for each login 802 via SOAP the IP address is retrieved 804 and is compared to the billing/payment address (if available). The correspondence is on a per-country basis between the declared address and the reported IP address. Values may be checked per login. If a person with a Canadian billing address logs in 5 times from an IP address in Canada and 15 times from the United States of America it would be a 75% ratio. Fraud points 806 are added to the profile when login events occur where the country settings 808 on the user account address do not match the country identified by the IP address identification. No additional fraud points are added if a match 810 occurs. Additionally, the IP address may be used for 3rd party event sourcing. The fraud system is capable of supporting externally triggered fraud events like error messages from payment partners or client related events or fraud/risk scores.
In a preferred embodiment, default risk classes may be set up. In a five level schema those default classes may be: no risk, small abnormality, abnormality, risky, fraud most likely. On the Risk Classes tab of the Risk Class Management Page 902 shown in FIG. 9, risk classes 904 are defined according to application needs by setting ranges of risk points 906 for each of the default risk classes. Alternatively, the administrator may set risk classes according to game requirements. For each risk class, the administrator may associate selected payment forms 908 and user roles 910, as shown in FIG. 10 as well as the additional user-specific classification conditions, which are offered by way of example and not limitation, described in Table 3.
FIG. 11 is a screen shot of the Configuration Tab 1104 on a Risk Class Management Page 1102. Administrators may create a test case for determining risk, such as the “purchases” test case 1105 displayed. This process is further illustrated in FIG. 12 and described below.
Exemplary variables for calculating user activity-driven fraud classification are provided in Table 4, below. The process illustrated in FIG. 12 1202 provides a risk score based on the ratio between chargebacks, refunds and total disputes. The dispute ratio refers to the total number of disputes opened by the user compared to the total number of items purchased. If a user purchases 10 items and opens 3 disputes it gives a dispute ratio of 30%. A disputes/total purchases ratio test compares the number of open disputes to the total purchases 1204 and assigns a risk score. A chargeback/disputes ratio compares the number of open disputes to the total number of disputes 1206. Fraud risk points 1210 may then be added to the user's risk profile or overall fraud score according to the application's preferred business logic 1208. For example, when either disputes ratio 1204, 1206 is less than 80% then the business logic 1208 adds 15 points 1210 to the user's fraud score. Similarly, a disputes ratio between 80% and 95% the business logic 1212 adds 10 points 1214, and with a dispute ratio greater than 95% the business logic 1216 adds 5 points 1218.
disputes, it gives a dispute ratio of 30%.
(non-resolved) disputes to the total number of purchases.
The system further provides a near real time fraud check and batch 208 processing of events. A dedicated fraud batch 208 job analyzes credit card registration and payment events, runs the automated tests for the users who have triggered an event and updates the risk score and risk class of the user accordingly. The batch 208 job may be run at any frequency; typically one minute to keep the user risk scores as current as possible.
As discussed above, fraud scores allow the game publisher to limit the payment methods, transaction limits, offers and content available to a customer. These restrictions involve comparing the risk score of the shopper (user) with an acceptable value. The point of comparison and acceptable risk scores or ranges may be configured by an application administrator. When the shopper begins to purchase an item, the transaction server receives the shopper's risk score and an available list of payment forms. The system may use a least cost router, which determines the optimized payment form due to price point and country. In this case, only those optimized payment forms available to the shopper's risk score are presented to the user.
Transaction limits are also imposed by the shopper's fraud or risk score. Fraud defender tracks the amount per transaction and provides an error to the transaction server if certain rules are violated. Fraud defender returns only time value for how long the account is blocked for further purchases. As a precondition, velocity rules may be defined on limiting the maximum amount per transaction. When the shopper begins the purchase process, the transaction server hands over the details (e.g. price, type, etc.) and the shopper information to the fraud defender message queue. The transaction server checks the fraud score and continues with the checkout if the score is below (or exceeds) a threshold level. If not, the transaction server prompts an error notification and updates transaction history.
Similarly, based on the fraud score, the transaction server will disable certain products, bundles and/or subscription plans. This requires that the effective offers have risk scores or ranges attached that define allowance for purchase. When the shopper (user) performs the purchase process, the transaction server receives the risk score for the shopper and compares it to the allowed risk score for the offer s/he is attempting to purchase. If the shopper's risk score is in the “allowed” range, the transaction server continues to checkout. The point of comparison is configurable. If the shopper's risk score is outside of the “allowed” range, the transaction server prompts an error message, the purchase transaction is aborted and transaction history is updated.
FIG. 13 illustrates an exemplary fraud defender module and messaging system setup. The transaction server 1302 handles all transactions for game purchasing. Event messages are sent to a message queue 1304, where they are retrieved by the fraud server 1306. The fraud defender server includes a fraud database 1308. The fraud defender server is service oriented with interface definitions, with CRUD (Create, Read, Update and Delete) operations for each service. Table provides some exemplary web service calls for a fraud detector module. The events that are sent back to the transaction server from the fraud module may include the fraud score (for example, the account id, the fraud score and the date); the transaction limit (e.g. the account id and the time the transaction was denied); and the purchase limit (e.g. account id, max price for the transaction and the time the purchase was limited). Those skilled in the art will recognize that there are many events that could be defined based on the fraud defender so far described, and would include others without departing from the scope and spirit of the described system.
A reporting and analytics module may be designed for a game publisher depending on its requirements. Data is duplicated from the master database to the slave database to avoid any performance loss through report queries. Both standard and ad hoc reporting is available. It will be appreciated by those skilled in the art that reporting may also be accomplished with a set of predefined reports. As an admin, a user, is allowed to define any type for the existing reports (data aggregation, frequency, etc.) The lowest increment in a report ideally is 1 hour. As such this reporting process may be performed asynchronously and may run on the same database as the application with minimal potential performance impact. Messaging is provided for notification and communication. A tax engine is also provided to accommodate all tax requirements.
Store and primary market modules include offer and store management 308, inventory/item management 312, economy management 422, discovery & presentation 424.
An offer and store management module 308 provides the end-user presentation functionality and handles everything concerning the management and presentation of the store elements and inventory. All management and UI functions may be available via APIs and via a web-based presentation layer. From a functional perspective, all features described can be presented across different browsers, presentation layers or as content-feed for in-application discovery clients.
A preferred embodiment of an offer and store management module allows client (such as a game publisher) developers and even players (for the player-to-player use case) to set up their own stores to present and merchandise the articles they want to sell.
Using the web-client, users can customize their stores with a title, an intro-text, activate certain community features or modify the store's look and feel using a WYSIWYG (what-you-see-is-what-you-get) editor. This allows real-time editing of the shop-window and gives users a great set of tools to manage and merchandise their products. Depending on the product category and the application configuration, the system can dynamically present the right attribute fields to be completed by the content manager.
Alternatively, or in addition to the web-client, a content catalogue API may be used to manage the inventory and all of its attributes remotely. Example attributes are: article title, article category (item/service/currency, etc), article description, game server, tags and keywords, reselling options. Independent of the article, the content manager can also define pricing and auctioning models or combination and the delivery options, such as: auctioning model (auction/buy now/reverse auction), number of articles, auctioning period, delivery period, accepted payment methods (relevant for real money trading). This is established through the definition of event identifiers or “event IDs”. Event IDs are pre-defined sets of offer attributes that can be assigned to a specific product or a set of products. They allow efficient management of many different products and offers simultaneously. More about event IDs is provided in reference to economy management, below.
A key function of a content manager may be to oversee the control of the in-application economy 422. Leveraging the reporting and analytics tools 328, the content manager can identify potentially problematic economic behavior problems. Typical economic problems associated with an in-application economy are inflation, artificial scarcity and speculation. Preventing and controlling inflation are crucial when dealing with virtual currencies. Inflation is caused by a fast-growing supply of the available currency, therefore, it is important to watch and control the total amount of virtual currency available to users. Artificial scarcity occurs once the secondary marketplace reaches a critical mass and some people attempt to exploit the economy by artificially shorting the supply of certain scarce goods to maximize their personal revenue. Scarcity may be controlled by controlling the amount of available articles of a particular kind, controlling re-selling capabilities, the lifetime of items and by tracking user patterns and purchase behavior. Speculation is not necessarily a bad thing, but if it gets out of hand, the practice may be stemmed by binding certain items to a particular user, either permanently or for a specific period.
To control undesirable economic events, economy-related information and parameters are separated into a set of attributes called an event. An event may be assigned to every product item template and defines how the item will be handled in the primary and secondary market with regard to scarcity, pre-conditions, cool down periods, and other economic events. In this way, the economy is controlled by defining the availability of items within the markets and whether the items are allowed to be resold, etc. The behavior of a huge number of items may be changed simply by changing the set of attributes (events).
Events may be created using a user interface 1402 provided in the economy management module, through a set of APIs, or by bulk upload. As illustrated in FIG. 14, the fields described in Table 5 define an event.
increment to bid a minimum of $2.
Settings Make the settings for the attribute set active.
Quantity Quantity of an item a user can buy. Blank for unlimited.
Ancillary modules and administrative tools are provided in a preferred embodiment of a modularized in-application commerce system and method. These tools allow the game publisher to optimize the user experience and include, by way of example and not limitation, dispute management 330, and customer relationship management 332.
A player-to-player trading use case allows application participants to set themselves up as merchants, create a store and offers, and buy and sell items in a secondary marketplace. Components of a secondary market use case are illustrated in FIG. 4c . Exemplary modules for this use case include an auction module 314, real money trading/virtual money trading module 430, community management module 432 and reputation management module 310. In addition, the secondary marketplace leverages various other components of the overall system, including account/user management modules 402; inventory modules 312, offer and store management modules 308; economy management modules 422, and others.
Auctioning and transaction management 314 are backend component modules with standardized interfaces to the presentation layer and to a number of internal and external remote systems, including data warehouse systems and payment gateway. The platform supports all auction mechanisms and is optimized to support the specific requirements of dealing with intangible goods and virtual services. Table 6 describes the different types of auctioning models.
The community management 432 and reputation management 310 modules support an efficient marketplace by allowing participants to rate other participants in their role as either a buyer or seller, depending on the user's role in the transaction. The ratings system is specifically tailored to correspond with the needs and requirements of dealing with intangible goods and services. Users wishing to rate another user's role in a transaction may rate it on several levels, according to game requirements. For example, a seller rating may include the following rating levels: ‘Met expectations,’ ‘on time delivery,’ ‘price/quality ratio’ and ‘shop here again.’Information about the transaction may be provided in a list and comments section. Generally, users are rated under their game or application identity. In order to sharpen the actual message expressed through the rating, every user is assigned an overall rating value, endorsements by users as well as a more granular rating scale. In addition, the platform adds automatic ratings in case dispute cases are opened or any other type of repeated misuse is being recorded.
Additional community management 432 features include profile pages, where users can present themselves, their preferences, characters and interests; messaging and instant messaging (IM), for communication between players (supported by external email notifications) or through instant messaging services (e.g. Skype, Yahoo, MSN, etc) that are integrated into the platform; a blogging system so users can launch their own blogs; and a calendar that acts as a filter instrument to display ending auctions and community elements where merchants can mark the dates for events.
Transaction management and processing 212 is an underlying framework interfacing with a significant number of components and systems, including the auction module, the rating logic, the payment and the fulfillment components. It logs every step as a basis for reporting and customer care purposes.
Payment 326, settlement and fulfillment manage outgoing interfaces to payment providers, currency calculation services and in-application delivery functions. It is directly connected to the transaction management framework through internal APIs and interfaces to all relevant back-end and reporting tools. These APIs are described in Table 25, below.
The secondary market modules also interact directly with the clearing and settlement module 322 to calculate revenue shares and trigger correct payout procedures. Receiving dynamic input data from the auctioning component, the tax database 416 and a currency calculation service, the settlement process is run at predefined times and calculates revenue shares according to pre-defined rules. The rules are defined using a restricted configuration tool, allowing defining revenue share ratios, price ranges, payment terms, and settlement periods, etc, as a rule-set for calculating shares.
After successful calculation of the revenue shares the payout can either be verified and approved by authorized personnel or directly transmitted to the parties eligible to receive the funds. The process is completed by updating the status of the process in the transaction history and by automatically and dynamically generating a proper invoice 324 in pdf form.
Secondary markets are enabled for trading in virtual currency as well as real money 430. Trading with both real and virtual currency through the wallet is described below. The wallet is the safest payment option, as the wallet has already been funded when the purchase is made. When trading with real money, buyers may choose from among the payment providers subscribed to by the platform's payment gateway, or a third party gateway with which the platform is integrated. There are some disadvantages to trading with real money. The fraud risks are higher compared to wallet transactions where the real money purchase has already been fulfilled. The purchase flow is asymmetric and may take longer or the buyer may not complete the purchase flow. In addition, there is a risk of money laundering if a cash-out option is offered.
Offer management and content delivery is realized by a set of APIs as is depicted in FIGS. 15 and 16. The player or person's account must identify him as a “merchant” 1504 in order to sell items. A player wanting to sell one or more of his virtual assets can do this by creating an offer from his account inventory or by creating his own store. The platform checks 1508 via API if the declared item for sale is still in the player's possession. In a preferred embodiment, the item is locked as long as the offer is valid, for seamless and rapid delivery after the trading has been completed. After receiving a successful reply from the in-application commerce platform (IAC) 1506, the auction is set to “active” 1512. A potential consumer is now able to purchase this content item. After the transaction has ended, the platform 1506 verifies again 1510 if (a) the Merchant and consumer have valid accounts, and (b) the object for sale is still in the possession of the merchant. Thereafter, the platform prompts the payment order to the buyer. This step is processed automatically if a wallet is being used. The platform executes the payment process based on the selected payment form. After getting a positive acknowledgement form the payment partner, the IAC starts the entitlement process through an API.
To secure a real money transfer, the platform can offer an escrow service to mitigate the risk of fraud, outstanding delivery or a mismatch of described and delivered quality of items. The platform does this by integrating with a third party escrow provider which safely holds a consumer's payment in a trust account until the entire transaction is completed. Since the consumer pays the escrow and not the merchant, the escrow service can withhold payment until the in-game component has been delivered. Once this has been verified, the escrow provider releases the payment to the merchant. The same result may be achieved using the in-application commerce system wallet, however, holding and withdrawing real money from a wallet might require a banking license.
After a user buys an item, the auction is finished and post-purchase notification services are initiated to inform the buyer and the merchant that the transaction is complete. At this time, the buyer may select “escrow” to begin the escrow process described above, which may involve a small fee to be paid to the escrow provider. If the buyer does not wish to use the escrow services, the payment process continues to completion. The system then sends a notification to the merchant, who reads the message in his inbox or external mail and clicks the embedded link to get information about the successful auction and the delivery process is completed.
FIG. 16 illustrates the payment and settlement process. Clearing and settlement in a secondary market is accomplished with the in-application commerce system acting as the intermediary between the buyer and the seller. The system handles all payments and disputes. The settlement process is executed after the dispute period has passed and both parties have confirmed the successful delivery of the article or the provision of the service. Referring to FIG. 16, the merchant (a private person or player) is registered on the in-application commerce platform and creates an offer 1606. A potential buyer 1602 searches, finds and buys (places a bid) on the offer 1608. The IAC platform fulfills the transaction and begins the post purchase processes. The buyer 1610 selects the dedicated payment form (which can be restricted based on offer filtering and risk class) and provides payment form details to the payment partner 1604. The buyer confirms payment 1612 and executes payment (synchronously or asynchronously) and notifies the IAC platform that the transaction has completed successfully. The IAC platform performs the clearing process 1614, calculating the total merchant and client payout per month. After manual approval the system informs the merchant/client of the payout for the billing cycle and creates a pdf formatted invoice including transaction details 1616. The system informs the payment partner to pay out the dedicated revenue share to the merchant. Based on the payment partner, the merchant may have to accept payment before the transaction is complete. The payment partner then informs IAC about the successful payment. The system closes the transaction in the platform.
Settlement occurs after the buyer has paid for an article. During the 28 days immediately following the transaction (the grace period), the consumer may open a dispute to initiate a transaction rollback. All disputes and chargebacks must be closed by the end of that grace period. The system pays out all revenues through the payment transfer providers (e.g. PayPal or Moneybookers) to authorized users. The system generates a detailed report to be downloaded or accessed through an API. Players and merchants need to register their payout method before any revenues are paid out. Only one payment transfer provider may be attached per account. The attachment requires a preceding authentication process where the merchant must needs to authenticate his account.
All transactions in the secondary market are stored and accessed based on their post settlement status. Statuses include merchant not cashout certified; no merchant contact data available; payout pending through provider; provider failed and rollback status. Either the platform or the application publisher may serve as the Merchant of Record (owner of all payment contracts) in all transactions completed by end users. The dedicated party will be responsible for the clearing and settlement of all transactions as well as the payment of customer's share of the revenue to the customer as specified in the integration agreement. The clearing period may vary among payment forms and clients.
A wallet 434 and currency management 436 module provides payment services across all use cases in the in-application commerce system. In a gaming environment, both real money and virtual money may be used to purchase real or virtual items. In a preferred embodiment, the in-application commerce system provides both a user interface and APIs that allow an application administrator to create and define currency types. FIG. 17 is a screen shot of the user interface used for currency type management 1702. Currency may be created by choosing a currency title 1704 and creating a description and setting attributes 1706 such as lifetime, presentation order and if it should be activated or be an in-game currency. The content manager may also define whether it should be payable in real money and if it should be tradable in a player-to-player environment. Currency may be assigned to a category/item class by choosing the Assign Currency tab. Business logic for currency behavior may be created and assigned to the currency.
Within the application commerce system, currency types are configurable to meet application requirements. For instance, certain in-application purchases may only be made through “platinum” coins sourcing from a real-money exchange whereas other articles may be bought with “gold” coins that have been awarded for achievements within the application, or “green” coins funded through online time. Application administrators may also define different types of points as currency, for example, loyalty points earned for repeat purchasing or duration of play, promotional points redeemed through a marketing campaign or premium points used to create tiered service models. These different currency types can be flexibly defined by a currency administrator and configured to have clear exchange rates between real money and the different types of virtual currency. Virtual currency can be created and defined by providing information such as that described in Table 7.
The administrator may also manage exchange rates between real money values and a virtual currency or between different virtual currencies. For example, an exchange rate for a single virtual currency entity can be defined in relation to one unit of a real money currency (e.g. 0.5 US Dollars). Exchange rate between virtual currencies may be achieved through a catalog administration/offer management tool by defining currency packages that can be traded against other types of virtual currency units.
An offer management tool allows administrators to set a relational dependency between item classes and virtual currency types. This allows the administrator to steer the offering and to define if certain item classes (e.g. items, coins, service, etc.) can be bought by real-money currency and/or a specific virtual currency or a combination of both. The offer management system also supports bundling for recurring wallet funding and combined pricing where offers are priced in multiple virtual currencies.
Wallet management involves managing the user's balances, including funding flows with multiple payment providers, real-money cash-out and synchronization with existing wallet systems. The under-18 user segment is an important market segment that is challenging to monetize because of their lack of access to convenient payment methods like credit cards. A preferred embodiment allows parents to create and authorize multiple child accounts to use their balance, set spending limits and view purchase activity. In addition, offer management allows the publisher to make use of in-store cards or electronic vouchers that can be purchased with cash or by a parent to fund a child's wallet account.
The wallet exposes a set of interfaces allowing external components to trigger adding or deducting funds from the wallet. These “external components” could be the in-application ecommerce system's transaction management backend but also any other application-server or external payment or transaction processing solution. To optimize the user-experience, every request to the wallet is verified for sufficient funds before a transaction process is initiated.
The wallet is additionally designed to allow converting virtual currencies into real money and trigger a payout to the customer via approved channels. Real money cashout is an optional wallet component and built in a way to minimize all related financial risks. This includes a sophisticated exchange rate management and a set of tools to identify and prevent cases of money laundering, fraud, arbitrage management and inflation. As for the other wallet components, the cashout function is configurable with a set of rules, allowing, for example, to cash out only certain types of virtual currencies, introduce a minimum threshold for a payout, etc.
Wallets containing virtual currency may be funded by credit card or loyalty programs, or may be acquired in-game. Since the value of virtual currency may change over time and for liability purposes, value is tracked using the first-in-first-out (FIFO) (first in, first out) accounting method. Access to virtual currency is handled in a manner similar to a credit card or bank account. When the user submits an authorization request to pay by virtual currency, a hold is put on the appropriate number of virtual points. This process segregates the authorized funds until the item has been paid for or the order has been canceled and the funds released. It also prevents the user from inadvertently “double spending” the virtual currency.
A virtual currency exchange service allows a real world currency value to be associated with every unit of virtual currency. This allows the commerce platform to display the transaction currency/virtual currency to the user, but base its calculation for costing, tax, shipping and margins on the real world currency. The real world value can be passed to the appropriate commerce engines to complete the necessary calculation.
Attaching the real world currency also allows the fraud engines to perform as they do based on the applicable real world currency and it also allows for additional rules to be formulated that center around the virtual currency. Completing chargebacks, returns and refunds are based on the real world currency versus the virtual currency but present some challenges when crediting virtual currency to the users payment account.
In all situations the application chooses which value is displayed or if both are. For instance, where virtual currency is being used to complete the transaction it may be desirable to display the virtual currency value of the transaction and not the real world value as the shopper may not distinguish between the two, but in a fraud detection scenario viewing both currencies may be beneficial to a person analyzing the account in a fraud detection process.
To deal with the issues of changing value of virtual currency the wallet will put a date time stamp with the transaction. First in-first out (FIFO) accounting policies are then applied, which require the system to scroll through the virtual currency tables to pull the “oldest” currency for redemption. Furthermore, it also require the system to “put back” in a chargeback, return and refund scenario, the aged currency so it is compliant with the FIFO scenario as the currency being returned may have a different value than the currency currently in the wallet.
As was discussed earlier, virtual currency is often purchased with real world value or currency. Because of this, policies are required for accurately accounting for inventory and transactions related to virtual currency. For example, in the United States of America, state laws require companies with remaining account balances to escheat to the state after a number of years of inactivity.
Wallets may be funded with real or virtual currency; however, only virtual currency wallets may store virtual currency. Currency types may be mixed within the account, but not within a wallet. The system also supports funding via gift card or retail cash card. Wallets containing virtual currency may be funded by credit card or other payment method, or may be funded with currency acquired by loyalty programs or game play. Since the value of virtual currency may change over time and for liability purposes, value is tracked using the FIFO (first in, first out) accounting method.
In addition to virtual currency, the system supports the storage and handling of real-money stored value in multiple currencies. To comply with legal and financial requirements, the storage of real-money values has essential impact on multiple functions and use cases, including currency and exchange rate management, tracking and reporting, chargebacks, refunds, customer care and anti-fraud management. To accommodate these requirements, exchange rates for real-money currencies are fetched directly and real-time from payment partners' central currency database. Storing value entities according to FIFO principles, as discussed above, ensures tracking of the actual real-money value in relation to the actual transactions, enabling correct revenue recognition and financial reporting. Chargebacks are calculated according to the actual currency value at the time of the transaction. In a preferred embodiment, a customer may request a refund or rollback of a virtual transaction by viewing transaction history and choosing to request a refund or report a problem with a particular transaction.
To limit the potential of internal fraud, the customer care tool 332 allows administrators to restrict access to real-money refunds to selected or few Customer Service Representative. Based on the respective access rights, a particular selected Customer Service Representative can view account-related information, view transaction-related information, view and manage purchases (e.g. accept refunds, goodwill funding, etc.), view and manage fraud and chargeback cases, and edit wallet accounts (change default billing and shipping address). The Fraud module 336 manages fraud at both the transaction and account level, enabling mitigation of fraud risks when storing real-money value. Internal APIs perform balance updates after a purchase is made or a chargeback is performed. In addition, if game commerce account-level fraud systems track chargebacks, the fraud systems are updated after a chargeback is credited to a user account.
In a preferred embodiment, the account system interacts with three systems: the social game application, ecommerce and in-application storefronts, and billing and customer management systems. The application may be integrated with the wallet account system through a standard set of Wallet Web Services, implemented through SOAP web services. The communication from and to the web services is achieved over the HTTPS (secure HTTP) protocol, and data is passed in XML format.
The trading platform (ecommerce and in-application storefronts) provides a comprehensive and robust platform to design and manage both primary stores and secondary market merchant stores and accounts. Both primary and secondary market modules may be integrated with the wallet account system for buying and selling purposes. The wallet is also easily integrated into third party store components or existing commerce infrastructure modules.
For handling real money transactions as either stored value or as virtual currency exchange, the wallet is integrated with a billing and payment system (i.e., the order management system). This can be a platform-related system or a third party integration.
The wallet management system enables application publishers to execute multiple business rules to fund or debit participant's wallet account (at both the user account and the identity/character levels) through several virtual currencies as part of game-play. Funding functionality is supported by the wallet web services. To fund the wallet, at least the following parameters must be provided: account id (for user/player/identity), currency id (for currency type), order id (generated for every transaction), amount, keeping class (defines if the amount should be credited or debited) and security key (authenticates the publisher).
Based on the SOAP/XML response, a success notification response or an error message will be returned (e.g. invalid currency id, not allowed, account disabled, account ID wrong, etc.). The secondary marketplace component allows players to buy and sell in-application items, virtual currency, and services. A merchant who is selling a digital product can receive his purchase price as virtual currency. Based on the existing currency types, the middleware will debit the buyer's account fund in the merchant's wallet account. Currency may be purchased for real money based on the exchange rate between virtual currency and real-money the system will manage the transaction. To maximize revenues and optimize the user experience, the wallet may be configured with a default billing and shipping address to enable accelerated checkout process with a single click purchase. Coupons may also be used to load the wallet. If a transaction detects that there is not sufficient currency in the wallet account, the system enables consumers to easily add funds.
The wallet can also be debited from within the game. This can be achieved by invoking the same web services as the account funding process with different parameters. To debit the wallet, at least the following parameters should be provided: account id, currency id, amount and keeping class (debit or credit). The platform supports an authorization call to pre-check if sufficient funds are available and to reserve a certain amount before fulfilling the purchase. This is especially relevant if the purchase process is asynchronous (accommodates related processes like credibility checks, address validation, etc.). A second API call allows settling the authorized amount to continue the purchase process or to free up the reserved amount. If a user tries to buy or pay for an article or service through the secondary marketplace the system simply tries to debit the wallet, because it already knows which currency type needs to be charged. If the wallet account does not have enough of the required currency, the application developer can enable purchase of additional currency (based on the settled exchange rate), which can be initiated manually (by the player) or automatically (by the application).
Regardless of the services offered in the application, the most efficient way of handling a high volume of low-value transactions is to introduce a virtual currency and related exchange. A wallet/virtual currency can be used to handle micro-transactions within the game, allowing players to accumulate a considerable amount of virtual currency, which can then be exchanged into a real-world currency.
To discourage money laundering, inflation and arbitrage a management, it is necessary to keep exchange rates between virtual currencies and real money stable or at least in tight control. To eliminate any of those risks, the game's payment mechanism can be designed as a “walled garden” allowing the purchase of virtual currency but not allowing cash-out back to real money currency.
However, for some games and applications, it is important to provide users with the ability to convert virtual currency into real money (e.g. for user generated content). Since the system can identify the exact origin of every virtual currency piece, it is possible to allow the conversion of the certain currency-types only (e.g. the currency entities that the user accumulates through in-application trading). The exact settings can be defined through an administration tool An administrator can limit currency types allowed to cash-out and set the exact exchange rate between the virtual currency and the real money currency to counterbalance potential inflationary trends.
4 for 500 points. The Game storefront is embedded entirely within their desktop game client.
FIG. 18 illustrates the high level architecture and modules/services used in performing the depicted functions. Players 1802 interact with the game client 1804 on a computing device such as a PC or phone. Players 1802 access the in-game commerce account interface 1806 using their single-sign on credentials. The player locates the offer 1832 for Game Points and selects it for purchase 1834. The item service 1836 provides the game producer with the ability to set offers for points in any desired package amount. Game accounts are funded by purchasing Game Points with real money using an API 1810 that interfaces the game backend 1808 with the in-game commerce purchase service 1812. Credit card transactions are processed through the payment module to the payment provider 1818. These transactions require APIs that authorize 1814 (funds are available and held until purchase) and commit 1816 the payment. Upon commit, Wallet Service APIs apply the purchased points to the user's Game Points wallet and update the points balance 1820. Notification is sent to the in-game commerce messaging service 1830 to send an email 1828 to the player to confirm the transaction.
Referring now to FIG. 19, Pete the Player 1802 wishes to purchase additional Game Points for future use. From within the Game desktop client 1804 he goes to the in-game storefront and selects the $5 point package. The client makes a request to the secure back-end 1808 which initiates a payment 1902 using Pete's stored VISA card information. The payments engine 1902 submits the transaction to the payment provider 1818 for authorization. After receiving a successful response, the Game back-end then credits Pete's wallet 1826 using the Wallet API 1820 which triggers a confirmation email 1828. The Game back-end 1808 completes the transaction by calling the confirm Payment API 1904. Pete now has access to the 500 Game Points he purchased and has been charged $5 on his VISA. With Game Points in his wallet, Pete may now purchase content in-game.
FIG. 20 illustrates a purchase from within the game play. From the Game in-game storefront, players 1802 can purchase content ranging from enhanced gameplay features to weapons and armor using Game Points. Pete would like to purchase a horse for his Game character to get around the world faster. He navigates to the in-game storefront on the Game client 1804. The Game back-end 1806 retrieves the list of available offers from the ItemService 1836 which applies the configured filtering rules for Pete's character's level and account status. Pete selects the horse offering for 700 Game Points 1904. The Game back-end 1808 activates the wallet web service 1826 to check Pete's account balance 1824 and determines that he doesn't have sufficient Game Points, so he is offered the option to purchase 500 Game Points for $5. After his account has been funded, the back-end submits the purchase to the ItemService using buyOffer 1834 which debits 1822 700 Game Points from his wallet 1826. Upon receiving the success response, the Game back-end delivers the item to his account 2002. Pete now has the horse in his inventory and has the remaining 200 Game Points in his wallet.
A reverse wallet accommodates microtransactions for real money. With a reverse wallet, every shopper account gets a personal threshold assigned which defines how much money s/he is allowed to spend in advance before the system clears the wallet. The threshold is based on the shopper's behavior and may be adjusted frequently. Clearing of the wallet may be initiated by time or by exceeding the threshold. With an accurate personal profile and threshold, micro-transactions with price-points below 1 USD/EUR are possible and convenient.
The in-application system and method reverse wallet provides a system and method capable of assigning a personal threshold per user and wallet. The fraud defender system influences the threshold of the account holder directly by increasing or decreasing the threshold depending on various configurable factors. Both real and virtual currencies are supported. In addition, the threshold may be managed with an administrator console and per API on an account level and in general. The system supports multiple payment methods (i.e. credit/debit cards, PayPal, Click&Buy, etc) with an option for a credit wallet. It should be configurable to support reverse and top wallet per client. This means that this functionality can be disabled for particular users(shoppers) or according to the fraud score associated with the user account. If its disabled, the user is only able to load the wallet first before he/she can spend the virtual funds.
Describing the reverse wallet in terms of an exemplary use case of debiting the wallet, the primary actors are the commerce platform, the shopper/end user, a threshold engine and a customer service representative (CSR). The commerce platform takes orders and contains business rules regarding when an order is released for fulfillment. The shoppers place orders on the site. They pay using payment methods, such as credit cards, Paypal, etc., request refunds and make cancellations. The threshold engine calculates the threshold based on the shopper's fraud or risk score and the values allowed for particular risk categories as determined by the administrator. A CSR may become involved with the process, performing actions on the shopper's behalf.
A wallet should be enabled for both real and virtual currency and the user registered, with payment details available and stored. The thresholds should be assigned for each risk class, and not exceeded for the shopper's account. An example is provided in FIGS. 21 and 22. Referring to these figures, the shopper indicates that s/he wishes to make a purchase with real currency 2102. The system checks the threshold for the shopper's risk class 2104. If the purchase price does not exceed the threshold, the system debits the wallet 2106 and completes the purchase 2108. The system then performs post-purchase events, such as displaying a thank you page, sending an on Delivery notification (see Table 18), updating shopper inventory, updating transaction history creating an event for the fraud server and adjusting the personal threshold as required 2202.
If the threshold is not sufficient to cover the purchase price, the system notifies the shopper that the personal threshold has been exceeded 2110. Options are offered the shopper to proceed with the sale 2112, and the user selects the desired one. Options to be presented to the user are configurable. Exemplary options include cancelling the transaction 2114, settling the wallet (the system calculates the difference and offers the shopper the option of settling) 2116, and loading the wallet (the shopper is offered the opportunity to load more than the personal threshold to the wallet 2118). If the shopper chooses either to settle or to load the wallet, the system checks to see if payment details are available 2120. If not, the user selects the payment method and provides payment details 2122. Otherwise, the shopper completes the purchase 2202 and the system performs post purchase events 2204. Exceeding the threshold and the subsequent options may trigger an increase in the fraud score of the shopper.
If a user is not registered, s/he may provide account details to create an account. The system may check the IP address to see if it is already attached to an existing account, and if it is, whether the account is active or inactive. After the account details are submitted, the system creates an account and sends the user an email with an activation link. The user is redirected to an account activation page. The shopping continues with the registration process by providing additional account information such as billing address and payment details. If the payment details are in use and assigned to another account, the system will increase the user's fraud score resulting in a low threshold.
Microtransaction debits of wallets with positive balances are available when the threshold assigned to the shopper based on the shopper's risk score is exceeded. After a user selects an item to purchase and clicks a “buy” button to complete the purchase, the system checks to see if the shopper has exceeded his threshold, and, if he has, the shopper is notified about the threshold limit violation. The system may automatically fulfill the purchase, clear and debit wallet transactions in chronological order, and then performs post-transaction processing 2202. If payment details are missing, the purchase may be cancelled, or the shopper will be afforded a chance to add the payment details 2212. If payment details are not correct, for example, if the shopper's credit card has expired, the shopper is afforded a chance to correct the details or select another method, and proceed with the process.
A virtual money wallet may be debited for microtransactions using reverse wallets as well, using a process similar to that used to debit a real money wallet. One click purchases for virtual microtransactions may be processed instantly. However, if a user selects an item which will exceed the threshold, the user is notified that the purchase will violate the threshold limit. As with real money, the shopper may be offered an alternative, in this case the ability to select a more expensive virtual currency package as proposed. If the shopper doesn't intervene, the system automatically fulfills the purchase. This means that when the shopper doesn't do anything, the purchase of virtual currency is fulfilled. It will be appreciated that the shopper must confirm to clear the wallet. The shopper is also able to cancel the transaction and select another offer which does not hit or exceed this personal threshold. The system clears and debits the wallet in chronological order and updates the fraud score and sets OnDeliveryNotification call. If payment details are missing, the user may cancel the purchase or supply the missing details. If the purchase is cancelled, the system will change the status of the transaction and update the user's fraud score. If the user provides the payment details, the system stores the details for future purchases and automatically fulfills the purchase. The system then clears and debits the wallet in chronological order, updates the fraud score and sets the OnDelivery Notification call. If the payment details are not correct, for example, if the credit card has expired, the system receives a credit card expiration error response and makes a second attempt using an expiration date in the future (e.g. stored value plus 3 years). If the transaction is successful, the system automatically fulfills the purchase, clears and debits the wallet in chronological order, updates the fraud score and sets the on Delivery notification. If the payment details are not correct, but are provided by the shopper or a different payment method is selected, the system presents the terms and conditions for user acceptance, stores the details for future use and completes the process as above. As such the virtual wallets are always cleared with each transaction. In the case that the shopper wants to purchase an offer that crosses the threshold and the system prompts him to clear the wallet, the system will clear threshold and completes the purchase of the offer in a single step (from shopper point of view).
A real money reverse wallet may be cleared automatically by time or by detecting an exceeded threshold. A time period may be defined in which all wallets need to be cleared. When that time expires, the system automatically fulfills purchases to clear the wallet for any account/wallet with a negative balance. A purchase confirmation is sent by email to the shopper. The system clears the wallet and updates the fraud score. An on Delivery notification call is then sent. If payment details are missing or are not correct, the transactions proceed similar to the transactions above for debiting the real money wallet when insufficient funding is available.
Some features may be alternatively performed by a customer service agent (CSA). As was mentioned above, fraud scores are updated frequently as per the rules configured by the game publisher. As the scores are updated, the threshold is updated to the threshold configured for the fraud classification identified by the user's fraud score. However, the threshold for registered users may also be updated by a CSA. The CSA may log into an administration tool, and increase or decrease the threshold. The system captures information regarding the change, such as the name of the CSA, a timestamp for the change, the previous and new thresholds, and a reason for making the change. As soon as the CSA saves the changes, the new threshold becomes available for the user. The CSA may also manually initiate a wallet clearance.
Players and purchasers under the age of 18 are an important market segment that is challenging to monetize because of their lack of access to convenient payment methods like a credit card. To facilitate responsible application participation by children, accounts may be set up with parent-child relationships. This is particularly important for accounts on gaming sites, which allow parents to constrain their child's time and money spending. The parent-child controls allow the parent to control financial and operational details of the child's interaction with the game. In one representative environment for an in game commerce system, parent-child relationships apply to both user accounts and wallet functionality. Parent-child account relationships empower parents to control the online time budget of their children and control their child's real money spending within an online game. The owner of the parent account is empowered to define an exact rule set applicable to one or more related child accounts. This control can be achieved through various features, including determining which currency the child is allowed to use. In this parent-child relationship, various limits can be set for the child account, including: the maximum amount per month s/he can spend, maximum amount per transaction, whether the parent wallet is automatically refunded if a balance is insufficient, and the time budget allowable for the child to consume within a particular time frame. Additionally, the parent has total insight into the transactions, login history and the online time of the child account and can prohibit access or spending allowance at any time.
FIG. 23 illustrates one embodiment of a process flow for creating the parent-child account relationships. To create the relationship, a child account must exist 2302. A parent may log in and create his/her own account 2304 and then search for the child's account by nickname, or other identifier 2306. The parent (or other appropriate adult, generally someone over the age of 18) sends an invitation with a message to the child, who will get an invitation in his inbox 2310. The child may either accept 2314 or decline 2316 the invitation. If the child accepts the invitation, the parent may then define rules for the child's accounts using their settings screens.
The message sent by the parent 2308 may be a personal message or an external message. A personal message may contain a message directly from the parent to the child and a standard explanation about the parent-child relationship. A button on the message allows the child to confirm or reject the invitation. Clicking the button opens the personal message editor, and the child may create a response message to return to his/her parent. An external message contains the personal message of the parent and a standard explanation about the parent-child relationship. It also contains a link to confirm and a link to reject the invitation. Clicking the link directs the user to his or her message editor where he may compose a return comment. Various fields, such as the receiver and subject fields, may be prepopulated when the child clicks the button or link.
FIGS. 24 to 26 illustrate an account settings page used to set up a parent-child relationship and configure the child's account as desired by the parent. In a preferred embodiment system, a “Settings” tab contains all the features required to configure child accounts with parental controls. For example, the first section 2402 allows the parent to enter the identifying information for the child. The next section 2502 allows the parent to set rule-based permissions, including amounts per transaction and per month 2504, and the cumulative length of time the child is allowed to spend playing the game each day or over the weekend 2506. An age restriction setting 2508 allows the parent to set or disable payment forms by country. The final section 2510 allows the user setting up the account to send a personalized message 2508 with the notification. FIG. 26 illustrates a notification of a successfully configured child account.
Those skilled in the art will recognize that there are alternative process flows for setting up parent-child relationships and alternative features may be added for which parents would control the in-application behavior of their children. For example, a parent account may be created before the child account. In this scenario, the parent account is already activated. The parent creates a child account and defines permissions for that account. The parent may send an optional notification message to the child account. The parent may create additional child accounts, if required, and assign permissions for those accounts.
This parent-child relationship defines the use of the wallet of the parent account. No fund mergers or user control are fulfilled. Depending on the applied business logic, if a child account already has a wallet fund, it may be used before the parent wallet is debited. In addition to defining the time the child is allowed to spend in the online game per day and/or per month, the parent account owner may also assign a set of permission/rating roles on a child account level. These roles limit the type of content the child account owner is allowed to access. Finally, the parent-account owner is allowed at any given time to change the defined budget (time and/or money) or cancel the relationship altogether. Any of these changes will cause the dedicated history to be stored and made accessible in the activity section of the parent's account. If the relationship is canceled, the child account owner will receive notice through a personal and an external message.
The child account owner may use the parent's wallet account after consuming the balance of his own wallet, depending on application settings. All transactions are stored in the child's transaction history. Transactions charged to the parent account wallet are identified as such on the activity history.
An admin user interface has a view to a wallet balance including all child account transactions. The same detail as the parent account owner is presented in his web client account. In addition, a tab “Child Account History” lists the complete login and online time history structured in the same detail as the parent account owner in his/her web client account. The admin may change child account permissions and login rules on behalf of the parent account owner. Additionally, the parent-child relationship may be canceled via this view as well.
Because of its highly modularized nature and comprehensive set of web services, an in-application commerce system and method allows the application publisher a great deal of flexibility in choosing the services that best suit its implementation. For example, if a publisher only required use of the wallet functionalities, the wallet, user management, reporting, customer care and wallet configuration modules and services would be enabled. A publisher wishing to implement an online store with a world class payment gateway would have the following modules enabled: user management/account system, payment gateway and taxation, primary market store, reporting/analytics and clearing, settlement, and invoicing.
Web services provide a standard framework for distributed systems to communicate with each other. A preferred embodiment of an in-application ecommerce system and method exposes a large number of interfaces to the application. These interfaces can be grouped according to the general type of service they support. For example, services that facilitate account management include account service, inventory service, wallet service, messaging service and mail service. Services supporting storefront management include item service and search service, and services supporting purchasing include trading service, purchase service, post purchase service, fraud service and settlement service. Web services for processing payments may include adapters for each payment provider according to system requirements. Each will be discussed further below.
All access to web-services preferably requires encryption in the form of secure socket layer (SSL), IP whitelisting or a dedicated virtual private network (VPN). Test systems may use a self-signed certificate that the application adds to their certificate store in order to access the environment. System to system authentication for all the application platform web-services follows a generic pattern. Each web service request includes a “key” element with the parameters such as those listed in Table 8. Only the “key” attribute is required, but it's strongly recommended that the optional parameters be provided to enhance traceability of transactions for fraud detection and system debug purposes.
key.accountId No String The system account ID of the caller.
Configured when the system is setup.
An account service offers a variety of services, including, but not limited to, create user accounts, activate/deactivate users, view or modify customer profiles, view or modify risk profiles, upgrade user accounts to merchant accounts (for player-to-player trading). A remote account services module may require the use of a key to be used when calling the services via account services APIs. All requests are handled via web services (WSDL and SOAP).
The account service is used to manage user profiles within the application platform. An account profile exists in the platform for all users including: system accounts (storefront servers, client back-end servers), back-office users (customer care users and system administrators), and consumers. Consumer accounts may have one or more identities in their account profile that can be used to represent sub-accounts within your applications. For example, an identity might exist for each avatar owned by a player.
An Account Service manages user profiles, including system accounts, such as storefront servers and client back-end server accounts, back-office user accounts including customer care user and system administrator accounts, and consumer accounts. Consumer accounts may have one or more identities in their account profile that can be used to represent sub-accounts within your applications. For example, an identity might exist for each avatar owned by a player.
A number of methods are used in a preferred embodiment of an Account Service and are listed in Table 9.
getAccountDetails Fetches the account details of a user.
define his default address for express checkout.
details for particular user account.
confirmMember Call to authenticate and activate user account.
details of a particular or group of accounts.
An Admin service manages client configurations. Admin Services methods are described in Table 10, below.
setProperty Manage all client configs.
An Admin web service manages access to web services. Admin Web Services methods are described in Table 11, below.
Several methods are provided for performing customer service operations and are described in Table 12, below.
findOfferDetail Retrieve all available details of a specific offer (eg.
Several methods are provided for performing fraud service operations and are described in Table 13, below.
The inventory service is used to add or delete items from the inventory of items offered for sale and are detailed in Table 14 below.
The item service is used to create and manage item offers and some representative methods are listed in Table 15 below.
The Mail Service delivers external email and methods associated therewith are listed below in Table 16.
Messaging services create and retrieve messages for an account or identity and some of the methods are listed below in Table 17.
The Notification Callback Web Service is an interface provided by the application system in order to receive notification of purchases made in the in-application commerce platform. Methods for this web service are listed in Table 18 below. In order to use this functionality, the application provider is required to implement and host a server offering a Notification API.
The following situation provides an example of the Notification service. Jane wants to purchase a sword for her Quest character. She visits the Quest website and selects the sword she wants. She has sufficient wallet balance, so the Quest system immediately calls the purchaseOffer method on the in-application commerce platform.
Upon successful completion of the purchase, the in-application commerce platform generates a web service call to the Quest servers to notify them of the transaction using a manually configured security key.
The payment provider service provides web service interfaces between the in-application commerce system and payment providers and some representative methods are listed below in Table 19.
The PostPurchase services methods listed in Table 20 provide functionality to complete a purchase transaction, such as confirming that a virtual item purchased by one player from another has reached the purchasing player's account and delivering merchant and buyer ratings. These services are primarily used for the secondary market, completing transactions between players.
The web service reporting service retrieves bulk data for reporting according to application requirements and some representative methods are listed in Table 21 below.
Search services allow searches on payments, transactions, offers, inventory, order details and player stores from the application to the in-application ecommerce system and method. Some representative methods for the search service are listed below in Table 22.
The platform waits 28 days before collecting the revenues from all payment enablers, in order to clear all disputes before the revenue split is cleared and settled. Players need to register their payout method (e.g. PayPal) before any revenues are shared. Table 23 below lists several settlement related methods.
The subscription service methods works with game subscriptions by storing and retrieving subscription status for every participant with a subscription. Some representative methods for this service are listed in Table 24 below.
The Trading Service methods listed in Table 25 support the player-to-player market transactions.
The Wallet Service with the methods listed in Table 26 is used to directly manage a user's wallet balances. The wallet balance is updated whenever a purchase is made using the storefront web services. This service is used for when you wish to directly manage a customer's balances. For example, to provide bonus points for referring a friend. SSL is required by the interface unless some other network level encryption or private connection is in place.
master account is hold by client.
Internal APIs communicate data among modules. Following in Table 27 is a list of internal APIs used in a preferred embodiment of an in application commerce system and method.
It is to be understood that even though numerous characteristics and advantages of various embodiments of the present invention have been set forth in the foregoing description, together with details of the structure and function of various embodiments of the invention, this disclosure is illustrative only, and changes may be made in detail, especially in matters of structure and arrangement of parts within the principles of the present invention to the full extent indicated by the broad general meaning of the terms in which the appended claims are expressed. For example, the particular elements may vary depending on the particular provider systems used, such that different communication protocols may be organized or designed differently while maintaining substantially the same functionality and without departing from the scope and spirit of the present invention.
applying application fraud controls in near real time to limit the features available to users within the risk classification, for subsequent user transactions, in response to the updated fraud score and the risk classification, the controls applied to at least one of the following application features available to the user: (i) offers, (ii) allowed payment types and (iii) reverse wallet thresholds, the application fraud controls changable in near real time as the user interacts with the internet-accessible on-line application.
2. The in-application fraud prevention, management and control system of claim 1 wherein the internet-accessible on-line application comprises a game application and wherein event messages received at the communications module comprise at least game play and game commerce events.
3. The in-application fraud prevention, management and control system of claim 1 wherein the particular user behavior occurring in the internet-accessible on-line application comprises adding a new friend within the on-line application such that one of the fraud events comprises assigning negative fraud points to the user account when a received event message indicates that a new friend was added within the on-line application.
4. The in-application fraud prevention, management and control system of claim 1 wherein the particular user behavior occurring in the internet-accessible on-line application comprises accumulated actions over time within the internet-accessible on-line application such that one of the fraud events comprises assigning negative fraud points to the user account when a received event message indicates that the particular user has accumulated actions over time within the internet-accessible on-line application.
5. The in-application fraud prevention, management and control system of claim 1 wherein the particular user behavior occurring in the internet-accessible on-line application comprises a past suspension from the internet-accessible on-line application such that one of the fraud events comprises assigning negative fraud points to the user account when a received event message indicates that a reactivated user was previously suspended from the internet-accessible on-line application.
6. The in-application fraud prevention, management and control system of claim 1 wherein the particular user behavior occurring in the internet-accessible on-line application comprises a suspension from the internet-accessible on-line application such that one of the fraud events comprises assigning positive fraud points to the user account when a received event message indicates that a user was suspended from the internet-accessible on-line application.
7. The in-application fraud prevention, management and control system of claim 1 wherein the particular user behavior occurring in the internet-accessible on-line application comprises a disputes to total purchases ratio such that one of the fraud events comprises assigning positive fraud points to the user account when a received event message indicates that a user has dispute to total purchases ratio that indicates a higher risk than other users of the internet-accessible on-line application.
8. The in-application fraud prevention, management and control system of claim 1 wherein the particular user behavior occurring in the internet-accessible on-line application comprises a chargebacks to disputes ratio such that one of the fraud events comprises assigning positive fraud points to the user account when a received event message indicates that a user has a chargebacks to dispute ratio that indicates a higher risk than other users of the internet-accessible on-line application.
9. The in-application fraud prevention, management and control system of claim 1 wherein the fraud defender module contains program code stored in memory which when executed by the processor in the server causes the server to assign negative fraud points to the user account when a commerce event indicates a successful transaction occurring in the wallet.
10. The in-application fraud prevention, management and control system of claim 1 wherein the fraud defender module contains program code stored in memory which when executed by the processor in the server causes the server to: (i) receive a third party payment partners error response associated with a transaction on the user account and (ii) assign fraud points to the user account based on the received error response.
11. The in-application fraud prevention, management and control system of claim 1 wherein the fraud defender module contains program code stored in memory which when executed by the processor in the server causes the server to assign a particular risk class to the user account based on the fraud score and to limit the user account based on the assigned risk class to a limited number of particular payment forms.
12. The in-application fraud prevention, management and control system of claim 1 wherein the fraud defender module contains program code stored in memory which when executed by the processor in the server causes the server to assign a particular risk class to the user account based on the fraud score and to limit the user account based on the assigned risk class to a particular user role.
13. The in-application e-commerce system of claim 1 wherein the user account further comprises a wallet with a personal threshold for spending that the user is allowed to spend in advance before the system clears the wallet and wherein the fraud defender module contains program code stored in memory which when executed by the processor in the server causes the server to update the personal threshold based on changes to the fraud score for the user account.
14. The in-application e-commerce system of claim 13 further comprising a wallet module containing program code stored in memory which when executed by the processor in the server causes the server to: (i) receive a transaction request with an amount for a micropayment on a shopper order in the in-application e-commerce system, and (ii) debit the wallet based on a determining that the received transaction request amount is below the personal threshold.
15. The in-application e-commerce system of claim 13 further comprising a wallet module containing program code stored in memory which when executed by the processor in the server causes the server to: (i) receive a transaction request with an amount for a micropayment on a shopper order in the in-application e-commerce system, and (ii) notify the user that the personal threshold would be exceeded based on a determining that the received transaction request amount is above the personal threshold.
16. The in-application e-commerce system of claim 15 wherein the wallet module contains program code stored in memory which when executed by the processor in the server causes the server to load the wallet with an amount that exceeds the personal threshold based upon the user responding to a notification that the personal threshold would be exceeded.
17. The in-application e-commerce system of claim 13 further comprising a wallet module containing program code stored in memory which when executed by the processor in the server causes the server to clear the wallet once spending in the wallet has exceeded the personal threshold.
18. The in-application e-commerce system of claim 1 further comprising updating the risk classification applicable to the user in near real time as the user interacts with the internet-accessible on-line application in response to events communicated by the communications.
applying fraud controls in near real time to limit the features of the internet application available to users within a risk classification, for the user's subsequent interaction with the internet application based on the user's updated fraud score and risk classification, where the controls are applied to at least one of the following features available to the user: (i) offers, (ii) allowed payment types and (iii) reverse wallet thresholds, the fraud controls changable in near real time as the user interacts with the internet application.
20. The method of claim 19 wherein the particular user behavior occurring in the internet application comprises adding a new friend within the on-line application and wherein the assigning step comprises assigning negative fraud points to the user account when a received event message indicates that a new friend was added within the internet application.
21. The method of claim 19 wherein the particular user behavior occurring in the internet application comprises accumulated actions over time within the internet application and wherein the assigning step comprises assigning negative fraud points to the user account when a received event message indicates that the particular user has accumulated actions over time within the internet application.
22. The method of claim 19 wherein the particular user behavior occurring in the internet application comprises a past suspension from the internet application and wherein the assigning step comprises assigning negative fraud points to the user account when a received event message indicates that a reactivated user was previously suspended from the internet application.
23. The method of claim 19 wherein the particular user behavior occurring in the internet application comprises a suspension from the internet application and wherein the assigning step comprises assigning positive fraud points to the user account when a received event message indicates that a user was suspended from the internet application.
24. The method of claim 19 wherein the particular user behavior occurring in the internet application comprises a disputes to total purchases ratio and wherein the assigning step comprises assigning positive fraud points to the user account when a received event message indicates that a user has dispute to total purchases ratio that indicates a higher risk than other users of the internet application.
25. The method of claim 19 wherein the particular user behavior occurring in the internet application comprises a chargebacks to disputes ratio and wherein the assigning step comprises assigning positive fraud points to the user account when a received event message indicates that a user has a chargebacks to dispute ratio that indicates a higher risk than other users of the internet application.
26. The method of claim 19 the user account further comprises a wallet and wherein the assigning step comprises assigning negative fraud points to the user account when a commerce event indicates a successful transaction occurs in the wallet.
27. The method of claim 19 the user account further comprising a step of receiving a third party payment partners error response associated with a transaction on the user account and wherein the assigning step comprises assigning negative fraud points to the user account based on the received error response.
28. The method of claim 19 the user account further comprising a step of assigning a particular risk class to the user account based on the fraud score.
29. The method of claim 28 the user account further comprising a step of limiting the user account based on the assigned risk class to a limited number of particular payment forms.
30. The method of claim 28 the user account further comprising a step of limiting the user account based on the assigned risk class to a particular user role.
31. The method of claim 28 the user account further comprising a step of limiting the user account based on the assigned risk class to one of: wallet transaction limits, particular storefront offers, and particular content available in the internet application.
32. The method of claim 19 wherein the user account further comprises a wallet with a personal threshold for spending that the user is allowed to spend in advance before the system clears the wallet and further comprising a step of updating the personal threshold based on changes to the fraud score for the user account.
debiting the wallet based on a determining that the received transaction request amount is below the personal threshold.
notifying the user that the personal threshold would be exceeded based on a determining that the received transaction request amount is above the personal threshold.
35. The method of claim 34 further comprising a step of loading the wallet with an amount that exceeds the personal threshold based upon the user responding to a notification that the personal threshold would be exceeded.
36. The method of claim 32 further comprising a step of clearing the wallet once spending in the wallet has exceeded the personal threshold.
Aria Gaming Solutions, Web pages retrieved from URL:http://www.ariasystems.com. Retrieved on Nov. 22, 2011.
Livegamer Web Pages Retrieved from URL:http://www.livegamer.com. Retrieved on Nov. 22, 2011.
Lurie, Mark, Online Gaming Frauds, https://web.archive.org/web/20111108153006/http://rsi4u.org/onlinegamingfrauds/, Oct. 1, 2010.
PlaySpan, Inc. Web Pages. Retrieved from URL:https://developer.playspan.com. Retrieved on Nov. 22, 2011.
Vindicia Web Pages. Retrieved from URL:http://www.vindicia.com. Retrieved on Nov. 22, 2011.
|
2019-04-19T15:54:23Z
|
https://patents.google.com/patent/US9785988B2/en
|
Porn
|
Business
| 0.29377 |
wordpress
|
I’d like to propose my assumption that there is absolutely no way to prepare for the insanity that is the German supermarket. Before coming here, I heard it all–Have the proper euro denomination! Weigh your fruit before you check out! If you don’t buy food before Sunday, you will starve! Seemed simple enough; I felt pretty darn confident.
Nothing. Ever. Goes. As. Planned. Ever.
Most meat is mystery meat. Sure, Schinken is ham and Prosciutto is, well, Prosciutto, but it’s hard to pick from 8 different things called “Rotfleisch,” and contrary to what I though earlier, “Bierwurst” only contains beer if you yourself provide said alcohol.
You have to go through a turnstile to enter the market. Can’t escape!
With a basket full of food, I was ready to brave the checkout. I unloaded the basket and nervously awaited my turn. All of a sudden, the cashier turned to me and spoke at 100 mph (should I be using kph?).
I have to…put..something…back, maybe? Oooh, basket. Should I leave my stuff? I guess…*awkward American walks halfway across store and back* Nice! Crisis averted! Everything costs €9,40? Good thing I only have a €10 note! No bags? Oops. My minuscule backpack fit about half of my stuff. Fortunately, no one tried to steal all the groceries I had to carry back home in my arms. My dignity should repair itself soon.
I’ll shift gears a bit. Speaking of shifting gears, I found something today on my way to the history museum that does that pretty well!
My hosts invited me to a dinner party with their friends later, provided I could help cook the meal. I threw together some American-bought chocolate chip cookie mix [Leah and Ophelia (their daughters) were quite smitten with them]. Their guests were a German-Italian couple (their names escape me at the moment; I will edit when I relearn them)–the woman was working on learning German, and the man was an architect (he threatened to leave the room when Matthias and Leah proceeded to put ketchup on their pasta).
We spent close to 5 hours talking about EVERYTHING: differences between Italy, Germany, and the US; electric vehicles; education; the future; sunshine. Leah and I played “Was ist das?”, in which she would point at something and I would tell her “was das ist.” She is a good teacher; she was not afraid to let me know if what I said was not deutlich (Word of the day! In this case, it refers to the clarity/closeness to native German pronunciation of the words I said).
|
2019-04-22T16:40:00Z
|
https://carolynwozniak.wordpress.com/2013/06/01/food-for-the-soul/
|
Porn
|
Shopping
| 0.160691 |
wordpress
|
Our mail address is POB 3437, Eugene Oregon 97403-9701, and our email address is poempnw@gmail.com. You can also leave comments and queries here on the website.
Get in touch with us to talk about how you can be involved in the project, or support our mission. We’re looking for donors of all ages and incomes in the greater Eugene area who believe that the downtown deserves a museum to house the culturally diverse arts, indigenous, historical and contemporary, of Oregon, the Pacific Northwest, and the Pacific Rim.
Interested in helping… Please let me know how I can help..
|
2019-04-18T10:47:13Z
|
https://poempnw.wordpress.com/contact-us/
|
Porn
|
Arts
| 0.829753 |
wordpress
|
Up and running this coming weekend (>10/25/18) with design concepts in the pursuit of fishing and more. Check them out and take part in the purchase of decals & more designed by my son, Tony Muncy.
The other day, I mistakenly described numerous nests high in the trees as Eagle’s nests. I had seen several Eagles gliding amongst these trees and perched atop these trees. More knowledgeable birders than I, knew these nests were a Heron Rookery. Today, I ventured back out to the area. I could not get any closer, but I had a slightly more powerful lens and I was able to capture a few pics of the Heron as they hunkered down atop the nests and other Heron arrived with what appeared to be food. The quality of the images isn’t great, but you can see the Heron are indeed occupying the nests.
For most places in the northern latitudes, Summer is an evaporating memory. That fading light, beautiful sunsets, and a bit of warmth left to the day….that was a Summer’s evening fishing. It felt so good…so healthy. Now the holidays loom and then that long ride through the Winter…patience in the Pacific NW.
|
2019-04-26T06:03:19Z
|
https://swittersb.wordpress.com/tag/pacific-nw/
|
Porn
|
Recreation
| 0.569268 |
typepad
|
Some time ago I did a tour of Exeter bridges for the Devon Buildings Group. I put together a set of notes which can be downloaded from here if you wish to make the tour yourself.
If you would like it as an ePub so you can read it on your phone then this link is best.
Some notes on bridge engineering were prepared for a meeting in 2008 and can be downloaded as an epub from here.
|
2019-04-23T23:02:50Z
|
https://billharvey.typepad.com/arches/2014/09/index.html
|
Porn
|
Reference
| 0.351232 |
newgrounds
|
Remix of the Ice Chapel and Phendrana Drift Depths themes from Metroid Prime.
Thanks to Step for some of the choir, strings and percussion/fx, and to him and Darren Kerwin for suggestions and help along the way as well as starting the project for which I made the track.
This would be excellent for a Metroid Prime HD remake!
As ViciousVolk put it, you made it yours.
the sounds are balanced, and pleasant. you may have just remade an already existing song, but you were able to make it yours. well done!
Hey, I remember these songs!... granted, I was playing it on the "Trilogy" set thingy so it's not really sentimental, but I really do like you guys' version. No suggestions, it's becoming more and more abundantly clear how little I know about music on a daily basis.
|
2019-04-22T14:40:35Z
|
https://www.newgrounds.com/audio/listen/511708
|
Porn
|
Games
| 0.753067 |
wikipedia
|
Tequiraca–Canichana is a possible language family proposed in Kaufman (1994) uniting two erstwhile language isolates, Canichana of Bolivia and Tequiraca of Peru, both of which are either extinct or nearly so. The proposal is not included in Campbell & Grondona (2012).
This page was last edited on 1 February 2019, at 21:17 (UTC).
|
2019-04-24T03:34:07Z
|
https://en.wikipedia.org/wiki/Tequiraca%E2%80%93Canichana_languages
|
Porn
|
Reference
| 0.624033 |
livejournal
|
Peter Jackson has announced he will remake 1954 classic The Dam Busters, the BBC reports.
One wonders if the dog gets to keep his name.
I wouldn't be surprised if it changes.
Yeah, if it were anyone but Jackson, I'd not even question it. (the original version had it changed to Trigger for the US release) I'd not put it past him, though, to throw a disclaimer at the front saying, "It didn't mean to them then what it means to us now. Deal."
AFAIK it was, in fact, the actual name of the squadron mascot.
|
2019-04-23T18:17:34Z
|
https://zonereyrie.livejournal.com/618807.html
|
Porn
|
Reference
| 0.610336 |
wordpress
|
valise | Thoughts On "S"
S’s first and last known kills are with his poisonous pen. This seems significant.
His first kill after receiving the valise with the poisons and its companion pen is in the streets of El H–. As he flees to the harbor, an assailant emerges from a dark alcove and seizes S, kicking away the valise and drawing a knife across S’s neck. S breaks free, time begins to slow, and the pen appears in his hand and he strikes out with it (p255). In a feral fight for survival, S stabs his attacker repeatedly in the neck until he is dead.
His last known kill is the Governor of the Territory, whom we now know is Pfeifer. On p353, S opens his valise and removes what he needs before hiding the case in the trunk of a tree. We learn later that one of the things he needs is his pen. One nick from the pen’s nib could stop the paralyzed man’s lungs (p362). And then finally, after struggling with just what to do with Pfeifer, he does, however, relish yet again the feeling of nib piercing skin, that tiny punch through a trivial dermal defense (p367).
Though presumably other Agents met their fate from the same nib’s puncture, nowhere in Ship of Theseus is it mentioned. In fact, the only time the the poison pen is mentioned at all is when S receives it in the valise (p247) and when he uses it twice to kill.
The pen is made, in whole or in part, with mother-of-pearl (p247). The use of pearl is always extremely significant in any story with J.J. Abrams behind it. Typically it represents the most important thing to be sought, but with it comes a crisis of faith attached on whether it is worth pursuing – on whether the choice to do the right thing is worth it any more. In LOST, John Locke faced just such a moment in a newly discovered Dharma station called The Pearl.
S’s choice to kill Pfeifer with the pen is followed by several metaphors of spiritual death (a magpie dies as he is fleeing the guard, the ship is destroyed when he finally finds it, and he wakes up in the Winter City). It is only later, as he prepares to confront Vevoda, that he chooses a different path.
What do you see as the significance of the poison pen?
What is Happening April 28-30?
The normally quiet and otherwise innocuous twitter accounts of @EricHusch and @JenTheUndergrad erupted this past week with a —conversation indicating the Eric received more money from SERIN and a single round-trip ticket to NYC for next Monday, April 28. It looks like something may be happening. Given the recent clues about the valise stolen from FXC at Grand Central Terminal prior to 1949, it could be that we get a peek inside!
Some of the postcards appear to be those that Brazil distributed at the 1939 World’s Fair in New York City. Interesting.
Next Wednesday, April 30, is the 75th Anniversary of the 1939 World’s Fair in New York City. And Eric Husch is leaving Prague on April 28, courtesy of the Serin Institute, to come to New York City.
This means Eric will likely be in town on the anniversary. Will he meet someone on April 30 on the old fairgrounds, now Flushing Meadows Corona Park? Perhaps at the (former) sight of the sundial (link courtesy of @JillAggieArg)?
Surely it is no coincidence that the press kits pointing to the 1939 World’s Fair in NYC, the 75th anniversary next week, and Eric Husch’s trip to NYC next week all occur so close together?
This seems to indicate that Eric is to meet with someone (SERIN?) in the park at 7pm ET Wednesday, April 30th.
April 29 was an oddly uneventful day. No meetings with SERIN. Eric checked in with Jen via twitter since his phone is apparently unable to call Prague. He checked in from Grand Central, the New York Public Library, Bryant Park (next to the library), Washington Square Park, and Little Italy. Not sure if this is a way to kill time or walk us through Straka-related items? Washington Square Park is right next to Washington & Greene Streets – a nod to the titular 11th book by V.M. Straka. Is it also a reference to The Square (Straka’s 3rd book?) His trip to Grand Central could refer to The Winged Shoes of Emydio Alves since the GCT has a statue of Mercury on top. The library? Maybe this hearkens back to Doug Dorst’s tweet that the answers we seek may be found at the library.
Tomorrow seems to be the big day – but not until 7pm ET (1900 hours). What will Eric be doing until then? What will happen at the meeting in Flushing Meadows?
KEY STOLEN. ASSUME BAG GONE. I FAILED.
AVOID GRAND CENTRAL. KEY STOLEN. ASSUME BAG GONE. I FAILED.
What exactly happened? How was the key stolen? What happened to the bag? Was it the valise?
The answers below may be apocryphal. They were all derived from various Twitter accounts which may or may not be in-game.
We now know some of the answers to these questions. And it appears the theft took place under the four quartets of time in Grand Central Terminal.
A story has surfaced, provided by the same source as the recent alternate endings to Chapter 10 and the page from The Winged Shoes of Emydio Alves. The story appears to be from an Agent of Vevoda. If you doubt its validity, please consider that it has also been posted in French and over at @SFiles22.
I am not proud of what I have done or who I have become. Straka believes or believed, however you want to look at it, that everything can be rewritten, everything can be reborn. I’m not so sure.
There are threads that, when pulled, may unravel the entire tapestry. I, unknowingly, pulled such a thread. Then in my efforts to put it all back together I have become so entangled that I can barely move.
Let me explain. In order to see the birds it is necessary to become part of the silence, and I was very good at it. Somewhere in Time, I waited beside the clock with four faces and the Nightingale approached.
I had invested years of my life in reliable, unquestioning service. And I continued that service. I waited for the Nightingale to look away and I stole a key, part her soul, before fading back into the silence. I had done this before to various people in various ways. This time I made the mistake of looking back and seeing what I left behind.
As fate would have it, I was to deliver the key and the bag we had taken to the Château. But I remembered the Nightingale’s panic and my curiosity got the better of me. I opened the bag.
It is one thing to see a book, just one story bound up and hidden. It is quite another to see an entire life all at once. Pictures, letters, notes, histories, stories. I still haven’t read them all. But I began to see the birds for what they were, struggling and floundering as their ships filled with water. Fighting to reveal truth to the world in any way they could. Trying to keep those at the top from crushing those on the bottom. Fighting to change the world.
But what I have done can not be rewritten by what I do now. I have killed in cold blood. I have murdered, poisoned, even killed by defenestration, all for the man in the Château. Yet the blood is not on his hands. It is on mine.
All I can do is let you peak into the stolen bag in hopes that you may preserve at least some of it.
UPDATE: There are clues that Eric Husch has been summoned by SERIN to visit NYC on Monday, April 28. Has he been summoned to be allowed a peek inside the valise?
S.’s valise seems central to the story in Ship of Theseus. An entire chapter – over 50 pages – centers itself around the acquisition of this case. Once S. arrives at the storehouse at El H—, time seems to slow down as we wait for the valise’s arrival. This post is about the details that surround this waiting period, which seem to be deliberately placed here for our rumination.
As S. waits for the valise, we hear the sounds of the aeroplanes above. We experience the tremors of nearby explosions and see dust coming down from above.
The valise appears to rise from the lowest level of the storehouse. Osfour refers to the storehouse as the place where you meet the people you’re here to meet and a safe place for beautiful things (p240).
Immediately prior to the valise’s presentation, Osfour says Time twice. On the surface, this appears to be because Osfour is impatiently waiting for Abdim to arrive with the valise. However, Time is capitalized often throughout Ship of Theseus and seems an important word here. It is the last spoken word we hear before the valise arrives.
Osfour led S. all the way hear from the water’s edge, and dies trying to return S. to his boat. It is Osfour that utters the words Time twice before the valise arrives. Osfour, in Arabic, means simply bird.
The person who actually brings the valise to S. is named Abdim. This seems a direct reference to Abdim’s Stork. Is this a stork delivering new life to S.? Additionally, Doug Dorst tweeted a mysterious chord which appears to be known as ABDIM (A flat diminished).
Here music is connected to the gift of the valise.
As the explosions get closer, S. ponders the similarities between this valise and Stenfalk’s. S. has a “Ship of Theseus” moment as he questions whether or not this valise could possibly be the same valise.
S. remembers Khatef Zelh telling him that the woman in the old picture (Samar, or Sola) ran off with a sailor. S. asks Khatef Zelh if the sailor’s name was Sobreiro. Khatef Zelh replies He was, in some of the books anyway. In addition, Sola is pictured alongside a book that S. suspects is The Archer’s Tales.
The book appears to be in the picture with Sola/Samar. And as S. leaves, he shouts back to Khatef Zelh to be on the lookout for the book – to keep it safe – because it is so important.
Inside the valise is a “black fountain pen inlaid with mother-of-pearl.” Ironically, S. uses the pen as a weapon to deliver poison. S. notices that “In bright light, it would be beautiful.” But it is not yet in bright light, so it is not yet beautiful. S. goes on to use the pen to deliver poisons. Only later, we think, does S. learn to use the pen for words instead of poisons in order to change the world. It is then that the pen finds the light and becomes beautiful.
The pen and its use parallels Vevoda. Vevoda uses the substance to make weapons and kill. Once S. begins to write in the orlop, the buckets of ink provided may very well be made from the same substance. Instead of killing, though, the substance becomes the ink where everything is rewritten. Reborn.
As we wait on what otherwise would be a simple suitcase, we have many important characters, events, and items of interest. The recently reveals p268 of The Winged Shoes of Emydio Alves refers to his valise as His soul, his work. Throughout the book, S. struggles with whether or not he has the free will to make his own choices. Yes, the valise full of photographs and instructions and poisons and darts and the pen were given to him, but no one told him what to do with them. As The Lady on Obsidian island told him, You have choices to make about how – and even whether – you will live.
The valise somehow represents S. himself – his very soul. He can choose to take the substances of the earth and use them for evil – or he can make other choices. What we see in Ship of Theseus are the choices S. makes.
LOST has an episode in Season 1 entitled Whatever the Case May Be. It is all about a (strong) suitcase that contains several items, including something mysterious belonging to Kate Austen. We discover that the case represents Kate’s soul.
In the margins on p240, as Osfour says This is the place where you meet the people you’re here to meet, Eric underlines these words and asks Jen to meet him at the movie Shadow of a Doubt. This movie was both set and filmed in the city of Santa Rosa, California. In LOST, Hurley spends time in the Santa Rosa Mental Health Institute where he meets Leonard. Leonard gives Hurley “the numbers” – 4, 8, 15, 16, 23, 42. Santa Rosa (the rose) seems to be used by J.J. to indicate important places where important things are bestowed on another.
On April 10th at 8:14pm GMT, user @mcrinitus posted this picture of p268 of The Winged Shoes of Emydio Alves.
This phrase is in Coriolis (p. 464). And in Winged Shoes (p. 268).
The Caduceus gives life to those that are dead, but it stands for so much more.
|
2019-04-23T10:42:25Z
|
https://whoisstraka.wordpress.com/tag/valise/
|
Porn
|
Reference
| 0.667983 |
wikipedia
|
For other uses, see Eos (disambiguation).
In Greek mythology, Eos (/ˈiːɒs/; Ionic and Homeric Greek Ἠώς Ēōs, Attic Ἕως Éōs, "dawn", pronounced [ɛːɔ̌ːs] or [héɔːs]; Aeolic Αὔως Aúōs, Doric Ἀώς Āṓs) is a Titaness and the goddess of the dawn, who rose each morning from her home at the edge of the Oceanus.
Eos is cognate to the Vedic goddess Ushas, Lithuanian goddess Aušrinė, and Roman goddess Aurora (Old Latin Ausosa), all three of whom are also goddesses of the dawn. All four are considered derivatives of the Proto-Indo-European stem *h₂ewsṓs (later *Ausṓs), "dawn", a stem that also gave rise to Proto-Germanic *Austrō, Old Germanic *Ōstara and Old English Ēostre / Ēastre. This agreement leads to the reconstruction of a Proto-Indo-European dawn goddess.
Eos was the daughter of the Titans Hyperion, a bringer of light, the One Above, Who Travels High Above the Earth and of Theia, The Divine, also called Euryphaessa, "wide-shining" and Aethra, "bright sky". She was the sister of Helios, god of the sun and Selene, goddess of the moon, "who shine upon all that are on earth and upon the deathless gods who live in the wide heaven". The generation of Titans preceded all the familiar deities of Olympus who largely supplanted them. In some accounts, Eos' father was called Pallas.
Eos married the Titan Astraeus ("of the Stars") and became the mother of the Anemoi ("winds") namely Zephyrus, Boreas, Notus and Eurus; the Morning Star, Eosphoros (Lucifer); the Astra ("stars") and the virgin goddess of justice, Astrae ("starry one"). Her other notable offspring were Memnon and Emathion by the Trojan prince, Tithonus. Sometimes, Hesperus, Phaethon and Tithonus (different from the lover) were called the children of Eos by the Athenian prince, Cephalus.
The dawn goddess Eos was almost always described with rosy fingers (ῥοδοδάκτυλος, rhododáktylos) or rosy forearms (ῥοδόπηχυς, rhodópēkhys) as she opened the gates of heaven for the Sun to rise. In Homer, her saffron-coloured robe is embroidered or woven with flowers; rosy-fingered and with golden arms, she is pictured on Attic vases as a beautiful woman, crowned with a tiara or diadem and with the large white-feathered wings of a bird.
"But soon as early Dawn appeared, the rosy-fingered, then gathered the folk about the pyre of glorious Hector."
"That brightest of stars appeared, Eosphoros, that most often heralds the light of early-rising Dawn (Eos Erigeneia)."
"And after these Erigeneia ["Early-born"] bore the star Eosphoros ("Dawn-bringer"), and the gleaming stars with which heaven is crowned."
Eos' team of horses pull her chariot across the sky and are named in the Odyssey as "Firebright" and "Daybright". While Quintus pictured her exulting in her heart over the radiant horses (Lampus and Phaëton) that drew her chariot, amidst the bright-haired Horae, the feminine Hours, climbing the arc of heaven and scattering sparks of fire.
Eos, the rosy-fingered, saffron-robed and golden-throned goddess, who goes up to Olympus to announce the light to the immortals, fell in love several times. According to Pseudo-Apollodorus, it was the jealous Aphrodite who cursed her to be perpetually in love and have an unsatisfiable sexual desire because once had Eos lain with Aphrodite's sweetheart Ares, the god of war. This caused her to abduct a number of handsome young men, most notably Cephalus, Tithonus, Orion, and Cleitus. The good-looking Cleitus was made immortal by her. She also asked for Tithonus to be made immortal, but forgot to ask for eternal youth, which resulted in him living forever as a helpless old man.
According to Hesiod, by Tithonus, Eos had two sons, Memnon and Emathion. Memnon fought among the Trojans in the Trojan War and was slain. Her image with the dead Memnon across her knees, like Thetis with the dead Achilles are icons that inspired the Christian Pietà.
The abduction of Cephalus had special appeal for an Athenian audience because Cephalus was a local boy, and so this myth element appeared frequently in Attic vase-paintings and was exported with them. In the literary myths, Eos kidnapped Cephalus when he was hunting and took him to Syria.
The second-century CE traveller Pausanias was informed that the abductor of Cephalus was Hemera, goddess of Day. Although Cephalus was already married to Procris, Eos bore him three sons, including Phaeton and Hesperus, but he then began pining for Procris, causing a disgruntled Eos to return him to her and put a curse on them.
In Hyginus' report, Cephalus accidentally killed Procris some time later after he mistook her for an animal while hunting.
In Ovid's account, Procris, a jealous wife, was spying on him and heard him singing to the wind, but thought he was serenading his ex-lover Eos.
"[Eos addresses Zeus :] ‘Least I may be of all the goddesses the golden heavens hold--in all the world my shrines are rarest.’"
Ovid may therefore have known of at least two such shrines.
Among the Etruscans, the generative dawn-goddess was Thesan. Depictions of the dawn-goddess with a young lover became popular in Etruria in the fifth century, probably inspired by imported Greek vase-painting. Though Etruscans preferred to show the goddess as a nurturer (Kourotrophos) rather than an abductor of young men, the late Archaic sculptural acroterion from Etruscan Cære, now in Berlin, showing the goddess in archaic running pose adapted from the Greeks, and bearing a boy in her arms, has commonly been identified as Eos and Cephalus. On an Etruscan mirror Thesan is shown carrying off a young man, whose name is inscribed as Tinthu.
The Roman equivalent of Eos is Aurora, also a cognate showing the characteristic Latin rhotacism. Dawn became associated in Roman cult with Matuta, later known as Mater Matuta. She was also associated with the sea harbors and ports, and had a temple on the Forum Boarium. On June 11, the Matralia was celebrated at that temple in honor of Mater Matuta; this festival was only for women during their first marriage.
^ Nonnus: "Eos had just shaken off the wing of carefree sleep (Hypnos) and opened the gates of sunrise, leaving the lightbringing couch of Kephalos." (Dionysiaca 27. 1f, in A.L. Rouse's translation).
^ Mary R. Lefkowitz, "'Predatory' Goddesses" Hesperia 71.4 (October 2002, pp. 325-344) p. 326.
^ Pausanias remarking on the subjects shown in the Royal Stoa, Athens (i.3.1) and on the throne of Apollo at Amyklai (iii.18.10ff).
^ Marilyn Y. Goldberg, "The 'Eos and Kephalos' from Cære: Its Subject and Date" American Journal of Archæology 91.4 (October 1987, pp. 605-614) p 607.
^ Goldberg 1987:605-614 casts doubt on the boy's identification, in the context of Etruscan and Greek abduction motifs.
^ Noted by Goldberg 1987: in I. Mayer-Prokop, Die gravierten etruskischen Griffspiegel archaischen Stils (Heidelberg) 1966, fig. 61.
Hesiod, Theogony from The Homeric Hymns and Homerica with an English Translation by Hugh G. Evelyn-White, Cambridge, MA., Harvard University Press; London, William Heinemann Ltd. 1914. Online version at the Perseus Digital Library. Greek text available from the same website.
The Homeric Hymns and Homerica with an English Translation by Hugh G. Evelyn-White. Homeric Hymns. Cambridge, MA., Harvard University Press; London, William Heinemann Ltd. 1914. Online version at the Perseus Digital Library. Greek text available from the same website.
|
2019-04-18T19:10:05Z
|
https://en.m.wikipedia.org/wiki/Eos
|
Porn
|
Reference
| 0.260067 |
wordpress
|
That was a quote from Bill Gates’ book, “The Road Ahead”, published in 1996.
I thought it was fitting for this post, after recently coming across a feature article from a magazine (PC Magazine) dating back to June 1998. Describing their predictions for computing in the years 2001 and 2010, let’s see what was accurate, delayed, and just didn’t happen.
In Part 1 of the series, I’ll be covering processors, home network devices, the TV PC, and digital video.
Long since discontinued, BackOffice was a suite of server orientated products in combination with Windows NT aimed at business. Originally released with Windows NT 3.5 Server included, the final version had Windows 2000 Server.
This particular version is 2.0 released in April 1996, and was the last to include Windows NT 3.51, just four months prior to NT 4.0. I grabbed this copy among some other newer versions of BackOffice from the same seller. The postage was pricey given their size and weight, though finding complete copies of these isn’t that easy.
My first experience of the internet arose from a newly formed internet cafe, down in the beach-side suburb of Glenelg in Adelaide. It was 1994 and I recall attempting to view as many web pages as possible given it was charged by the hour for the privilege. The cafe was using 486 PCs running Windows for Workgroups, with Netscape Navigator 2.0 as the web browser of choice. Although a number of people had connected to BBS since the 1980s, the internet in the form of the World Wide Web was still rather primitive at the time and largely mysterious.
|
2019-04-24T16:50:06Z
|
https://socket3.wordpress.com/2017/06/
|
Porn
|
Business
| 0.578358 |
starbulletin
|
KGMB-TV, which signed on as Hawaii's first television station in 1952, has been sold for $40 million in a cash deal to HITV Operating Co. Inc., a subsidiary of Virginia-based MCG Capital Corp.
Michael McHugh, managing director of MCG Capital, said by e-mail that HITV is a Delaware company "formed for the sole purpose of acquiring the station." He did not elaborate on the new owners' plans for the Hawaii station, and could not be reached by telephone last night.
MCG is a publicly traded company that lends to and invests in private firms in media and technology, seeking income and capital gains, according to Bloomberg News.
1977: Purchased by Iowa-based Lee Enterprises Inc.
2000: Purchased by Indiana-based Emmis Communications Corp.
2007: Purchased by Virginia-based MCG Capital Inc. subsidiary HITV Operating Co. Inc.
* The Hawaii Broadcasting System also owned KGMB-AM radio, now known as KSSK-AM 590, and KPUA-AM in Hilo, now 670 on the dial. Heftel bought the TV and radio stations, which he sold after his election to Congress. The stations have not been jointly owned since 1977.
The KGMB deal includes 41,000 square feet of land at 1534 Kapiolani Blvd., where the station is located, plus other station facilities including neighbor-island satellite stations, equipment and its broadcast licenses. The land was assessed at $6.7 million in 2005.
The deal, which requires approval from the Federal Communications Commission, is expected to close in the first half of this year.
KGMB has 98 employees, who began hearing about the station's sale through news reports early yesterday afternoon.
Rick Blangiardi, Emmis Hawaii market senior vice president and general manager, later led a staff meeting.
"We've been in conversations with the MCG people since last fall," he told the Star-Bulletin.
"I was very encouraged by the things that they had to say, regarding, first and foremost, our employees, and secondly, about enhancing our competitive position in the Hawaii market."
He was also a key player in Emmis' sale of KHON to affiliates of the Blackstone Group, a private equity firm, and a company now known as Montecito Broadcast Group LLC, based in California. He described this transaction as different.
"This is not part of being swept up into some group (of stations). ... This is a very singular focus on KGMB," he said.
"This is being done by design, if you will, with respect to them really committing resources to our television station."
Emmis purchased KHON and three mainland TV stations in 1998 from SF Broadcasting, controlled by USA Networks Inc.
Emmis then purchased KGMB in 2000 as part of a 15-station deal and was allowed to own two top-rated Honolulu TV stations under waivers from the FCC, a decision media watchdogs criticized.
When Montecito officials took possession of the stations in January 2006, they announced sweeping job cuts at KHON and its new sister stations.
Blangiardi resigned his role at KHON to lead KGMB and steward it through the sale. Seven other managers left KHON in the following weeks.
Emmis announced its intention to sell its 16 television stations in May 2005, to focus on its core radio and publishing operations.
"The sale of KGMB will bring us one step closer to completing the orderly divestiture of our television assets," Emmis Chairman and CEO Jeff Smulyan said in a statement. Emmis has one remaining station, WVUE-TV in New Orleans.
Having KGMB for sale for so long was wearing, Blangiardi said.
"This has been a very long, arduous process, having a for-sale sign out, all the while working constantly to overcome uncertainty, rumors and whatever -- and yet drive performance and do the things that have been accomplished here."
The deal took so long to achieve because of "the Hawaii thing," he said.
"We didn't get packaged in with a group. This was an a la carte offering that, at the end of the day with cash flows, it hasn't been the most robust broadcast market -- and this was not a cheap price tag."
The buyer "had to want to do business in Hawaii and be willing to embrace our market and its uniqueness and all that comes with that," Blangiardi said.
The Office of Hawaiian Affairs was among the interested parties last year, but the agency's board voted down a proposal to explore a purchase.
Blangiardi also tried to put together a deal to purchase the station.
"I was only given permission late in the game to try to acquire KGMB," receiving the go-ahead Oct. 23.
He spoke with local and mainland investors and had retained the services of merchant bank Sennet Capital and Daniels & Associates LP, specialists in mergers and acquisitions, to raise additional money and try to "put the right debt and equity components together -- and honestly, we were almost there."
His negotiations with Emmis' potential buyers had to be at arm's length, as a result.
Given the circumstances, he has not spoken with MCG about staying on to lead the station, "but I would like to think that's a possibility," Blangiardi said.
|
2019-04-22T12:27:15Z
|
http://archives.starbulletin.com/2007/02/21/news/story01.html
|
Porn
|
Business
| 0.638846 |
wordpress
|
Nikola Tesla is considered one of the most innovative and mysterious men who ever lived. If Tesla hadn’t invented and researched everything he did in his time, our technology today would be considerably worse. But is there something more to Tesla? Did he in fact have contact with Aliens as he publicly proclaimed? He is one of the most amazing inventors our civilization has ever known his knowledge and ideas went far and beyond what was known and accepted in his lifetime.
Nikola Tesla has been credited with creating much of the technology that we today take pretty much for granted. Without the incredible ideas and inventions of Tesla we would not have radio, TV, AC electricity, the Tesla Coil, fluorescent lighting, neon lights, radio controlled devices, robotics, X-rays, radar, microwave and dozens of other amazing inventions that make our lives AWESOME.
But Tesla didn’t stop there, he was into the incredible secrets of flight and antigravity which led him to register a patent in 1928, number 1,655,144 for a flying machine that resembled both a helicopter and an airplane. Before his death, Tesla had developed the blueprints for the propulsion system of his aircraft. He called it “SPACE DRIVE” or the anti-electromagnetic field propulsion system. Interestingly, according to William R. Lyne in “Occult Ether Physics”, in a conference that Tesla had prepared for the Migrant Welfare Institute on May 12, 1938, he spoke about the Dynamic Theory of Gravity.
Lyne investigated further and analyzed Tesla’s claims and writings, discovering complete statements and texts regarding the discoveries but the sources and texts were very limited since Tesla’s papers are stored in government vaults for reasons of national security.
What Tesla was talking about here was unlimited energy, free energy that came directly from the environment. Mysteriously, all of these incredible discoveries that have to do with FREE ENERGY have been property of the Government, which apparently has made sure for the documents to remain far from the public and the media. Tesla was actually speaking about the conversion of energy into something much greater… “electropulsion”, used to control a weaker gravity force accomplishing more work in the same amount of time but producing more.
Getting back to Tesla and Antigravity and his incredible UFO or IFO. Tesla discovered that the electrostatic emission surface of a conductor will always concentrate where the surface is curved, or where it has an edge. While steeper the curve, or corner, the higher the concentration of electron emission is. Tesla also noted that an electrostatic charge will flow over the surface of a conductor rather than penetrate it. This is refered to as the Faraday effect or skin effect discovered by Michael Faraday.
According to UFO reports, the inside of these “vehicles” is composed of circular channels or columns which go through the center of the craft. These serve, as a superstructure for the rest of the disk-shaped object and carry a high voltage and a high frequency coil. It is believed to be a resonant transformer which gives electrostatic and electromagnetic load to the craft and its polarity. The coil inside the craft is what we know today as a Tesla Coil invented by Nikola Tesla in 1891.
It is believed that when the vacuum is created in one hemisphere of the craft atmospheric pressure can travel through the tube, driving some kind of electric generator turbine. Some reports say that “aliens” use this system as stationary power plants to generate electrical energy on their planets as well.
← Females in the Infantry? Er…Yes, actually.
|
2019-04-20T19:12:59Z
|
https://sladisworld.wordpress.com/2016/08/05/did-nikola-tesla-discover-the-secrets-of-antigravity/
|
Porn
|
Science
| 0.676734 |
wordpress
|
I am a watercolorist that lives in the beautiful Pacific Northwest. I pretty much live, breathe, and watercolor. My primary specialty is abstract watercolor portraits. I commission work for painting engagement, wedding, pregnancy, new baby, birthday, anniversary, etc…or “just because” paintings. You can visit my portfolio at http://www.watercolorcreationsgallery.com to see additional paintings. I also paint landscape, florals, animals, and just about anything else. I fell in love with watercolors; the way the paint moves and flows. There are no two paintings alike. Often the imperfections of watercolors are what I fall in love with in a painting…perhaps a drop of paint that splattered unintentionally, or color that changed when sprayed with water. You can find me on Facebook at: https://m.facebook.com/Watercolorcreationsgallerybykathleen/. You may also follow me on Instagram at @lifeinwatercolorblog. I love what I do and hope that others find joy in my paintings. I welcome you to join me in my journey and life, love, family, and faith in watercolor.
|
2019-04-20T02:12:13Z
|
https://lifeinwatercolordotcom.wordpress.com/about/
|
Porn
|
Arts
| 0.982042 |
wordpress
|
Join me. Come out as a Daughter of Gaia!
a day of surrender to the Source of your being.
|
2019-04-23T15:50:57Z
|
https://toniroberts.wordpress.com/tag/the-soul/
|
Porn
|
Home
| 0.301327 |
wordpress
|
As long as sun will shine.
R.I.P. and deep thanks to our elder Pete Seeger, who just passed on at age 94, in late January of 2014. They say he was chopping wood just 10 days before he died.
Pete Seeger wielded folk music as a guerrilla tool to create a better world. His legacy spreads around campfires and along picket lines still, and on the sloop Clearwater (where a number of my students did environmental education internships). His powerful banjo inscription: “This machine surrounds hate and forces it to surrender,” is, in my opinion, a sign of wisdom, showing a way to make deep and lasting change from a place of positive, inviting joy rather than from angry confrontation.
What an example of a life well lived.
Sing on, sir – sing on. And we will too.
|
2019-04-19T07:16:00Z
|
https://indigenize.wordpress.com/tag/social-change/
|
Porn
|
Arts
| 0.969123 |
livejournal
|
We had been noticing that the hot water was becoming limited. It would get really hot, then cut out. Usually, you should be able to just turn it off, then on again, and it should resume heating; but now you'd have to leave it off for 10 minutes. Then a half hour. Then longer.
Remember that this is a tankless. The water flows through copper tubing over the gas flame and is quickly heated as it's being used. There is a sensor on the line which indicates whether the water has gotten too hot and sends this info to a computer chip which shuts it down.
Well, there had been a water leak on top of the heater, about 3 inches above it. Serious leak - the CPVC pipe had split. I replaced it, but the heater got pretty well soaked. I removed the batteries and thoroughly dried it out before attempting to use it again, but that was when the symptoms started. Or at least when they became really noticible and quantifiable. I'm thinking now, though, that water getting too hot may have been what made the pipe split.
I got really daring and took the front cover off. (WARNING: no user-servicible parts inside!) Looked it over. Turn on water, it sparks. No gas. How about this? I'll bet that's the heat sensor - what happens if I disconnect it? Many, many trips up and down the stairs.
I had long since lost the name and number of the on-line guy I got it from, but searching online got me to Omega2000, and I tried to find a diagram or something which would explain the workings of the things. Eventually I found the phone number and called, and sure enough it was the same person. I remembered him. His name is George, and he's Japanese. His English is rocky, but he knows his product, and to give him his due, he spent an hour and a half on the phone with me, having me try various things, testing different components. This is two years after I bought the thing. I'm not sure I like the tankless, it has it's problems, but I certainly have gotten my money's worth. He could have told me to take a flying leap.
He finally said that since I couldn't turn off the gas to just the heater, he couldn't have me take apart the solonoid to make sure that part worked. So I went out and bought parts, shut off the gas to the house, and installed a gas shut-off valve. Then tried to take the solonoid out. It wasn't cooperating. The screws just chewed up.
When Dale got home from work, we took the whole blinkin' thing apart, then drilled out the screws. Broke 5 drill bits. With the exposed solonoid in my hand, I could plug it in, trip the switch, and determine that indeed the plunger inside retracts as it's supposed to.
The next morning, I bought bolts to replace the screws, and we put it back together. It still didn't work: no surprise, since every part had been tested and was found to work. Which means that the only part left that can be bad is the computer chip.
I called George, told him my findings, and asked him whether I had put the spring back in right. He kind of had a fit. "No, no, no! You shouldn't have taken the whole thing apart! It it isn't back together right, you could have a bad accident! I'm going to send you a new gas assembly. Send me your address."
I reminded him that the part that was probably bad was the computer chip and that I was willing to buy one, so he told me where to find the parts list on the internet site. The computer chip is $50. The gas assembly which he is sending me (free) is $60. I paid the $20 for 3-day shipping. Probably will come on Monday.
At least I'm now confident that we will have hot water again at least by this time next week. It really shouldn't be difficult to put it back together now that I know what I'm doing.
|
2019-04-18T18:57:06Z
|
https://mother2012.livejournal.com/246819.html
|
Porn
|
Society
| 0.338976 |
wordpress
|
To some there are two separate thoughts, the clause following the word “State” is an independent sentence. To others, the clause after the word “State” is dependent on what precedes it. There is a recognition that militias were not well-funded, were temporal in nature, would rely on citizens to bring their weapons from home. At the time there was also a reluctance to grant too much power to the Federal government. The Constitution funded a navy, but not an army. Militias counter-balanced a strong Federal government and left power by rights and in weaponry with the citizens of the States. The drafters could have raised maintaining Arms for hunting, or for protection of ones home, but it was unnecessary. The Amendment only addresses the maintenance of Arms in the context of militias. Had the drafters wanted the second clause to stand on its own, it could have done so. They did not.
Justice Scalia is a literalist. He believes, as do some fundamentalists about religious texts, that the Constitution should be read literally. It should respect the original thinking of its creators. It is an organic document, but not one that develops beyond what was intended by the Founders.
It is fair to say, none of the Founders could have imagined assault weapons. The country was new and fragile, and they were concerned about foreign powers. Local militias would do. No citizen had a means for mass killing.
Today we are a nation with well armed National Guards, police and military that could end life on earth. No matter how many assault weapons are amassed by citizen militias or vigilantes, they would not come close to the military power of the Federal Government. Assault weapons are not protecting individual Americans from their own government, even for those few who think that having assault weapons is necessary to do so. Unfortunately, the Federal Government is more likely to bore them to death.
Citizens at the time the Constitution was drafted had guns. They were muskets. If a mass killing weapon was requisite to be held by the people the Constitution could have provided that the right of the people to artillery not be infringed. Did the drafters intend that each citizen keep a cannon in their home, or trail one behind their horse, to protect them from their neighbors and criminals. If they did, no one seem to take them up on it. A simple one shot gun would suffice.
It might not be fair to be so literal and limit the Second Amendment to a one shot gun. Realistically, it may be all that is needed to hunt, or for protection, assuming you are well trained in usage of the weapon. Three rounds should be more than enough for the public to have. If we cannot agree to make illegal the ownership, possession and usage of a semi-automatic weapon or other automatic weapon using more than three rounds, then we should take the Constitution literally and only permit muskets.
In addition, we might want to impose strict liability for ownership, possession and usage of such weapons by other than law enforcement. Damages awarded could not be covered by insurance or other indemnity. This might seem unfair because self-defense is a valid defense and the weapon might have been stolen or used without the owner’s permission. However, any defense would allow continued usage and the exceptions would soon swallow the rule. Damages would not be excusable in bankruptcy and all of the liable person’s property or income could be attached or garnished. We are pretty tough about forgiveness of college loans. We could be as tough here. Maybe our kids will live long enough to incur this debt.
I have been thinking about this word.
Daily I hear about how the “markets” will react to what the European Central Bank or Federal Reserve is or is not doing to stem the latest and continuing fiscal crisis through monetary policy. Apart from the fact that such monetary solutions are now deficient I am unsure who these “markets” are. Do they have a homogenous interest or are they a multitude of differing interests? If the latter, are policymakers trying to please only a few, perhaps the more political or economically influential? If so, who are they? If interests are varied, how can you please them all and why try? The media never answers these and other questions. In their defense the human brain can only get the head around a certain number of variations before it all becomes gray matter. Nonetheless, this simplification and distortion has a huge impact on economic perception and policy.
It is no different when it comes to terrorism. I often think of Al Qaeda as the doctor’s equivalent of allergies or asthma. You are having trouble breathing and you know its not COPD. You are not sure of the cause and neither is the doctor, so he or she says that you probably have asthma or an allergy. Asthma and allergies are real and identifiable, but is it beneficial to classify that which is unknown under one title just for convenience. There is a fair amount of such aggregation in medicine. Terrorism is no different. Al Qaeda is such a bogeyman. Clearly there are known elements of Al Qaeda and the nuances of it in different countries are known to intelligence officials. Nonetheless when a terrorist event is in doubt classifying it as Al Qaeda is easier. By aggregating even a disaggregated but linked network, it commands more attention than a few splinter separatists, nationalists, criminals, acting locally for local reasons. Even in a connected world, size of problem matters if attention is to be commanded and sustained.
I recently came across a Supply Chain financial study that is being undertaken by Rainforest Alliance a non-profit (rainforest-alliance.org) that promotes sustainable agriculture, forestry, and eco-tourism through certification of consumer produce of companies that have adopted auditable sustainable policies. They work with the Forest Stewardship Council. The study that they are doing with CitiFoundation, financial institutions and development organization aims to enhance financing of the supply chains that are sustainable. They should be commended for thinking outside the NGO box and involving for-profit entities in sustainability problem-solving. While the study is at a formative stage it thus far seems to be viewing the issue from a financial institution’s point of view: aggregation. Financial institutions need scale and administrative efficiency to creat a viable product beyond micro-finance and micro-insurance. They prefer turnkey operations through a reliable group that can verify, audit and organize the non-financial solutions to the problem. Accordingly, cooperatives and distributors become the likely customer rather than a subsistence farmer. There are economic benefits to this, but there is also a social cost. There are socio-economic and health benefits to development, but development already implies that someone wishes to be developed. They are often asked later in a study if at all. The study groups recognizes that local buy-in is an issue, as this is a top down rather than bottom up project. Climate change is an aggregated problem often missed by someone just trying to feed their family. There may be ways to do both which could be positive development, but even positive development can alter a culture. Not everyone wishes to be aggregated.
Insurance is another example of aggregation. The law of large numbers is at the heart of it. The premise is risk is economically transferable by aggregating a large volume of homogenous risks. Individuals or businesses that do not have the financial resources to self-insure can pay a relatively nominal premium and be covered for certain fortuitous events that befall them. A few decades ago larger companies realized that they could insure their own risks and get a tax deduction by forming captives. More recently protected cell companies or risk retention groups have also been employed. Insureds realized that if they organized into larger groups through associations or purchasing groups they would have more leverage to obtain better terms from insurers. The ongoing reform of the US healthcare system, being all about insurance, is all about aggregation. The Supreme Court pretended not to understand this. Health insurers and hospitals are aggregating (merging) to reduce the leverage of health exchanges. To big to fail is not the mantra here. The wrinkle, at least as far as healthcare in the US is concerned, is that the supply of doctors is not aggregating as fast as the demand. Some are folding into hospital practice to be sustainable. Others may decide they don’t want to participate in the system (especially Medicare). Then what? They are the content in a field of distributors.
I spent most of my career as a corporate insurance lawyer. I have never believed in the law of large numbers outside of catastrophes. Some risks are truly better than others. Insurers try to find and retain these risks. Policyholders tend to stay with the same insurer and insurers know this. Increasingly computer analytics are being used to find these risks. In some sense this is an aggregation, but one that I believe will ultimately lead to disaggregation. Analytics can be used by the consumer and eventually will. At some point, I think insurers will be aggregated into mere capital companies and maybe absorbed by banks (although there are major regulatory and operational roadblocks at present). Banks of course are the ultimate aggregators. They pay you no interest on the money they borrow from you on deposit all the while not lending to viable businesses and threatening the financial well-being of countries through their trading platforms.
The U.S. Supreme Court is a political institution, but conservative or liberal, tries not to appear to be so. This is particularly difficult when the issue is the constitutionality of a major piece of legislation that impacts all residents in the U.S.. So-called Obamacare is a misnomer. It is a regulation of health insurance not of healthcare. It provides more insurance benefits, reduces limitations on insurance coverage and increases the amount of people with access to the insurance system on a mandatory basis with some exceptions. The nature of insurance is that contingencies that may occur in the future are paid for by premiums by all insureds in the present, regardless of whether they are actually using the coverage. Healthcare is unique in that all humans will get sick at some point in their life and will need the benefit of it, often at costs that they could not afford without insurance coverage. To produce the funds to meet such a individual contingency you need a large pool of individuals (or groups), many of whom are healthy and do not presently need the coverage, to contribute in advance and for many years. Without this there would not be sufficient funds to pay for catastrophic care, thus an individual mandate is necessary to keep the insurance system and healthcare system that relies upon it, solvent. The catastrophic care required by a minority of individuals drives the cost of the entire system. Obamacare decided not to directly address the cost of healthcare, and catastrophic care in particular, because it would have involved combating the well funded and influential medical profession, hospitals, the pharmaceutical industry and labor tied to the current system, without a concentrated well funded lobby in opposition. Business is split on the issue and individuals do not have concentrated lobbying power. Addressing access to health insurance was relatively easier and that is principally what Obamacare is about.
The Justices recognize that Congress has the power under the interstate commerce clause to regulate insurance. Under the McCarran-Ferguson Act it permitted States to regulate it when it chose not to. Accordingly, apart from self-insured health plans which are subject to Federal ERISA restraints, and the Federal Medicare and military programs, States principally regulate health insurance. So-called Obamacare changed some of the benefits and limitations in these regulated insurance plans, but to sustain the system, it gave insurers a reliable group of new individuals who either could choose to pay premiums for health insurance or pay a penalty. The question that Justices Kennedy, Chief Justice Roberts and other raised was whether Congress could constitutionally mandate that someone who was doing nothing by choice could be mandated to do something. In short, could they be required to purchase health insurance or incur a penalty (or tax) if they did not have it or want it. Another way of asking this question is could Congress preclude individuals from doing nothing. Asked in this manner the answer is simply yes. Under the Securities laws for instance, a material misrepresentation occurs by omission, as well as by comission. Manufacturers cannot produce dangerous products and release them into commerce without warning or recall. Simply doing nothing is something Congress can prevent if it impacts interstate commerce. The point that the Solicitor General was trying to make in an otherwise muddled argument to the Court, was that there is a national scheme of insurance regulation of health insurance and because people who will eventually use the health system are factored into insurer or self-insurer reserves to pay for all individual future coverage, they are in fact part of interstate commerce regardless of when or if they buy health insurance. It is a unique and self-limiting product. The Solicitor General made the point that purportedly was not in contest, that if the individuals would be mandated to make the purchase just as they were about to use the healtcare system then no one would question the constitutionality of this aspect of the law. Insurance cannot work that way because premiums must be paid in advance and invested to grow in order to have the funds to pay for all individual contingencies that will arise in the future. A point of sale process would lead to insolvency. Congress understood this when it wrote the law and the individual mandate was a rational exercise of Congressional power to preclude inaction which would be detrimental to interstate commerce.
I tend to believe all the Justices understand this. Clearly Justices Ginsberg, Kagan, Breyer and Sottomayor understand it as they kept tying to help the belaboured Solicitor General out by making arguments he needed to make. Chief Justice Roberts who was impressive in decorum and questioning, asked about burial insurance which has a few elements similar to health insurance, but is critically dissimilar: it does not require repetitive use and is non-catastrophic. Like auto insurance it does not need the extensive reserve build-up period as does health insurance. Justice Alito also understood the insurance agrument, although he is likely to find fault with the legislation. Justice Scalia would probably be better served if he did not speak, as his examples were sophomoric.
The critical Justice is presumed to be Justice Kennedy. To me he seems to appreciate two critical aspects of this part of the case and of the entire case. The first is the political aspect. The Supreme Court must give deference to Congress. I believe he and the other Justices recognize that after the so-called Bush-Gore decision, the Court’s reputation as a perceived independent apolitical body could be severely damaged if their decision in this case is is close and ideologically biased. It is not just the Administration that carries a heavy burden in this case. The Court could be perceived to be partial and in turn would deprive millions of people health insurance in doing so. Justice Kennedy has concerns about liberty, but our government was founded on the basis of life, liberty and the pursuit of happiness. You do not get to liberty if you are dead or incapacitated because you did not have health insurance to provide you with healthcare to survive. More important, from a business standpoint it will be difficult to unwind much of this law as systems are already or will soon be in place. The scheduled implementation of the law was a gambit by the Administration to retard such judicial action, as well as to allow for administrative implementation. The second critical aspect, is to give the Court cover to find this constitutional, by describing how this is a limited use of Congress’ enumerated power under the interstate commerce clause, so that Justice Scalia’s broccoli will not be regulated in the future. The Solicitor General perhaps eventually came to understand this half-way through his argument,but was not pounding this home. Fortunately, I think Justice Kenney is wise enough to reach a decision finding limitation without having to rely on the Solicitor General’s performance. The Court knows, that if the election gives Republican’s a majority in both Houses and elects their candidate as President, the next Congress and Administration will amend or scrap the law, making this decision moot.
We will know in June.
|
2019-04-21T05:06:44Z
|
https://quiklaw.wordpress.com/category/insurance/
|
Porn
|
Recreation
| 0.137553 |
wordpress
|
This entry is available at Inside Higher Ed as well.
In the context of some intense debates about tenure in the University of Wisconsin System, and at UW-Madison, I’ve been acquiring some interesting information and views about tenure and related governance matters in Canada vs Wisconsin. Reflections and data have been kindly provided by Canadian leaders representing faculty and university administrative bodies, both nationally and in select universities.
Why focus on this issue in comparative perspective? First, leading Canadian universities (UBC, Toronto, Waterloo, McGill) have been poaching faculty from UW and could increasingly do so if proposed changes to tenure do not match existing standards/AAUP guidelines. Second, looking at different systems in a comparative way helps you realize what is working well here in WI, but also what might need to be changed, especially if higher education governance becomes more politicized in Wisconsin (as it has been in states like North Carolina).
In the end, no tenured faculty in Canadian universities (including 100% of our peers, the ones poaching our faculty) lose tenure except for engaging in serious forms of unethical behavior (i.e. ‘due cause’). Exigency-related rules do apply but it has not happened, to date, for all sorts of reasons. And if exigency-related layoffs of tenured faculty were to be proposed, it happens at a broader university-scale and the guidelines typically state that a task-force is to be appointed with diverse membership and/or it can only happen in specified ways.
The UW Board of Regents equivalent in Canadian universities does not need to sign off on program-related changes like the Board of Regents does here. So decisions on closure or redundancy are senate decisions (i.e. the locus of engagement and control is intra-institutional in nature). And in unionized environments, redundancy procedure, after senate has declared program closure, etc., are governed by collective agreement processes. In general the UW Board of Regents here in WI has not been too involved in the fine-grained details of program-related decisions or the funding of centers – they approve what has come up via shared governance pathways. But they could, in the future, become far more active and micro-management in orientation.
UW-Madison governed by 21-member Board of Trustees, including 11 members appointed by the Governor, with no Senate confirmation. Remaining 10 members represent UW-Madison constituencies (faculty, staff, classified staff, alumni, WARF). All remaining UW campuses governed by the current Board of Regents.
would have brought us half way to to this level of board autonomy vs the current system, though this proposed approach to governance should have also been applied to the UW System more generally and not just UW-Madison.
Thus, what you see is a relatively more autonomous/less politicized university and higher ed governance system in Canada; one where the norms of tenure and academic freedom are sometimes constructed via agreements but often are just part of institutional-organizational culture. The faculty trust the system more, I would say, than they do here now in what could become, if we don’t watch out, a hyper-politicized context. And they do so partly because of the unionized context, the codified agreements, and the fact the premier (governor equivalent) and the ruling party (or parties) tend to be much more hands-off. Increasingly, in Canada, governments through sector-wide bargaining or recalibrating funding formula, or setting tuition fee parameters, are exercising more hands on approaches. Budgets are, of course, political, but they’re just budgets for the most part and they don’t embed policy matters re tenure into budgetary processes in Canada like it has been happening here. It’s a more deliberative context: not perfect, this said, just more deliberative in structure.
The short-term take-away: don’t have unclear terms and procedures in a context where the potential exists for an increasingly more politicized and micro-management-oriented Board of Regents. Maintain tenure standards at UW-Madison and other universities in the UW System that match, in spirit and meaning, what they were before policy changes were injected into the Spring 2015 Wisconsin state budget. Faculty should not lose tenure except for ‘due cause’, as per AAUP guidelines. If program closure occurs after careful consideration by university-specific governance bodies, tenured faculty should have the right to shift to the unit of their choice, or become a professor of the school or college they are affiliated with. It is a clear and straightforward definition of tenure, and academic freedom, that helped make the US university system so well known, globally, for the production of innovative forms of knowledge. Unclear terms and procedures re. tenure has serious potential to destabilize the foundation of the entire system. And Canadian universities, not to mention hundreds of other US universities, will be salivating if this occurs.
The medium-term take-away: think about the potential role of faculty senates in future debates/steps. And think about tenure and shared governance in the context of the overall governance of the UW System (incl. what has been happening, and what should be happening). In my mind we have a legacy-based governance system that does not reflect the new realities of fiscal (tuition as a majority funding stream), economic (a globalizing knowledge economy), academic, and societal contexts. An unraveling of tenure in the next year will be a proxy indicator the entire UW System governance structure needs to be rethought.
We are, arguably, at risk of seeing the convergence of a legacy-based governance system with a more forceful and explicit political agenda – and this is not beneficial for a world-class university, and a world-class multi-campus state university system, in the 21st century. Anchor tenure, tightly.
week 7: I truly agree with how the University of Wisconsin feels that “faculty should not lose tenure except for ‘due cause’, as per AAUP guidelines”. As I have noticed through other articles that tenure in the University is becoming and issue and professors are losing their job for no apparent reason except to be replaced by someone that the universities can pay less money, which is unfair to the professor who has provided the institutions years of services. So I am glad to know that a University somewhere has mandated a clause to prevent professors from losing their position. Wisconsin University feels that “tenured faculty should have the right to shift to the unit of their choice, or become a professor of the school or college they are affiliated with”. Which means that if that position changes the professor has the opportunity to move to a different depart in the school or college they are associated among. The definition can’t be anymore straightforward and clear regarding tenure, and academic freedom “unclear terms and procedures regarding tenure have serious potential to destabilize the foundation of the entire system”. I couldn’t agree more with this analysis. Tenure, and academic freedom is exemplified in this article.
|
2019-04-25T00:19:59Z
|
https://globalhighered.wordpress.com/2015/10/22/reflections-on-tenure-in-canada-vs-wisconsin/
|
Porn
|
Reference
| 0.189269 |
wordpress
|
Will UFC veteran Stephan Bonnar be released if he loses to Krzysztof Soszynski at UFC 110?
Stephan “The American Psycho” Bonnar might be best known for his all out battle with Forrest Griffin at the 1st ever The Ultimate Fighter finale. Since his hard fought decision loss to Griffin back in 2005, Bonnar has gone 5-5 in his UFC career beating the likes of Keith Jardine, James Irvin and Eric Schafer. Bonnar has only ever lost to tough competitors such as Rashad Evans, Mark Coleman, Jon “Bones” Jones and obviously Forrest Griffin (twice). So why does Stephan Bonnar really need this win over the very tough Canadian Krzysztof Soszynski?
Although going 5-5 in the UFC as well as only losing to tough competition, the UFC generally has a three strike and your out policy and Bonnar has lost his last two fights. Those fights being to up and comer Jon Jones as well as MMA veteran Mark Coleman. Krzysztof Soszynski poses a lot of threats to the UFC veteran and could very easily hand Bonnar his walking papers. Let’s hope that his famous career launching fight with Griffin will keep around a little longer.
UFC 108 has a stacked card and will be available January 2nd, 2020 on PPV. As usual, I will only be predicting the results of the main card as well as the two preliminary fights being shown on Spike TV. Plain and simple.
So there are my predictions, plain and simple.
For those of you who don’t know, I also write on Aaron Tru’s website. You can check out my work aswell as others MMA writers/interviewers work at http://www.MMAPrime.tv . Be sure to stop by for all the latest news in MMA.
As usual, I will only be giving out my predictions for the main card. So here they are, plain and simple.
There you have em, plain and simple.
Shane Carwin out of Limbo?
Shane Carwin announced early this morning on his official website ( http://www.shane-carwin.com/profile/ShaneCarwin ) today that he now has an opponent aswell as a date. Soon after posting his statement MMA Junkie reported that there has been talk about a potential Interim title bout between Carwin and Frank Mir for UFC 111 in Newark, NJ on March 27th. This makes a lot of sense aswell because of Frank Mir’s dominant performance over French kickboxer Cheick Kongo at UFC 107. Shane Carwin even had nice words to say about his Mir’s performance.
“A win like Frank had last night surely propels him to share the top of the division with Nog, Cain and myself. If beating Kongo was enough to propel Cain to number two contender status, destroying Kongo might edge Cain out. What is more compelling is that Mir made it our of that fight injury free so not only is he at the top of the division he is likely ready to fight sooner then later”.
“The main question I am getting is would I fight Frank? The answer is easy YES. I am not a fighter who decides who he fights, I fight who I am told to fight. I like it that way, I am not trying to build a legacy I am trying to fight the best fighters in the World and determine where I fit in. Mir is a Multiple time Champion, who has been counted out more then Mike Tyson to only find himself right back at the top. He is a LEGEND of the sport and I would be honored to fight him”.
It’s easy to agree that Frank Mir is worthy of being at the top of the division and in an essence, his dominant performance over Kongo stopped the heavyweight divisions stalemate and has again made this division exciting. Would the fans like to see Carwin vs Mir? Hell yeah, that would be a great fight. It would be great to see the change in Mir and how Carwin would handle the well-rounded Mir. Although even after an Interim Champion is crowned, the victor would most likely have to fight the victor of the Nogueira/ Velasquez fight before getting to the ill Brock Lesnar. Let’s hope these men sign the contract and fight the honest fight aswell as a speedy recovery from Brock Lesnar.
My good buddy and MMA reporter Aaron Tru was just trying to surprise MMA fighter Frank Trigg and he ends up getting pushed. Hard job being an MMA reporter.
|
2019-04-23T10:20:25Z
|
https://thatmmaguy.wordpress.com/2009/12/
|
Porn
|
Sports
| 0.786462 |
utoronto
|
April 2019 Update: We recently learned that Statistics Canada made a coding error in the reporting of responses to questions about food insecurity on the 2015-16 Canadian Community Health Survey. Because of this error, the results we released in December 2018 underestimate the extent of the food insecurity in 2015-16. We are working now to redo our analyses and will post corrected results as soon as possible.
|
2019-04-21T04:11:53Z
|
https://proof.utoronto.ca/resources/1516-graphic-series/
|
Porn
|
Health
| 0.972563 |
wordpress
|
Went to Home Depot today and picked up a bunch of paint chips then played around with color combinations, shapes, sizes, etc. for a while. Some people can do this mentally using only a color wheel. I like to be able to move things around physically. This way, sometimes I accidentally come across a combination that I wouldn’t have mentally.
Note the differences in color placement, complexity of pattern etc.
This is what I’ve figured out so far using part of a fairly traditional star pattern – it’s often used on its own as a nine block quilt with border though.
The positioning of color makes a dramatic difference. I used to spend hours with Mom in fabric stores going over different color combinations, getting swatches, laying them out on the floor, switching around and around. Fortunately, she has an excellent eye for color and design.
How does this translate to knitting? Looks like this particular pattern should be relatively easy. Let’s say we’re going for big and bold – 9×9 inch overall squares done 9 times with a great (as yet unvisualized border).
9 inch square = 9, 3″ squares.
There is absolutely NO chance that I would knit each smaller square individually. Some probably would, but not this girl!
Mind you, this is most definitely still a work in progress… but… I would probably start with the top right corner and Color D (darker of the two). Work 1.5 inches across in D, start color C, knit 1.5 inches, switch to color B, knit 3 inches, then do the first part in reverse for 3 inches length. End on WS row. Knit 3 inches Color B, 3 inches color A, 3 more inches color B for total of 3 inches in length. End on WS row. Then do the top part in reverse for the bottom 3 inches.
If I were in a ‘fancy’ mood, I may even do a fairly tight lace stitch for A and D. Or maybe a cross wise cable criss crossing in square A.
In order to keep the motivation level up, I might graft each square together as completed. Otherwise, graft squares when all nine are completed. As this would be a fairly large project, feeling a grafted border would work best. Or, leave border off for a bit smaller quilt.
On the other hand… I’m a huge fan of Kaffe Fassett’s knitting. His knit coat is one item that would probably transfer fairly well to a quilt project. He also has several knit quilts that are breath taking.
This entry was posted in Knitting and tagged 9 patch knit quilt, 9 patch quilt, knit fabric, knitting quilt, monochromatic design. Bookmark the permalink.
Same here, pictures aren’t shown… Project sounds great though!
I can’t see your pictures! Waaaaaaaaahhhh!
Hey, thanks for stopping by my blog! I don’t think I’m really busy, I just think I take pictures of too many things… or maybe I am busy and in denial, lol.
|
2019-04-21T15:23:17Z
|
https://redfear.wordpress.com/2008/11/16/more-monochromatic-knit-quilt/
|
Porn
|
Home
| 0.933235 |
wordpress
|
Heh. It’s soooo Sorkin! So…the character’s a Republican, sort of?
Sam Waterson and Jane Fonda! He’s identified with TV viewers as a big lib from “Law and Order” – i have no idea what his real politics are. He does TV commercials for that Evil Wall Street, after all.
Jane Fonda – probably nobody has stronger nutcase-liberal street cred this side of Bill Ayers. Of course, her former husband Ted Turner probably gives her a little insight into how a network president would behave. Especially if he is cutthroat and a bit nuts.
And around it, the classic Sorkin “below decks” young staff people. It’s a formula of his since “Sports Night,” but it works. I swear that show was one of the best ever on TV. And “The West Wing” was darned close, until the suits threw Sorkin under the bus.
You are currently browsing the The Old Gray Cat blog archives for April, 2012.
|
2019-04-25T14:35:16Z
|
https://jdwaggoner.wordpress.com/2012/04/page/2/
|
Porn
|
Sports
| 0.519936 |
wordpress
|
Studies have also shown some benefits for other forms of anxiety, such as social anxiety disorder (SAD) and post-traumatic stress disorder (PTSD). CBD may also help treat anxiety-induced insomnia.
In 2011, a human study on CBD and its effects on SAD was published in the Journal of Psychopharmacology. Participants were given either an oral dose of 400 milligrams of CBD or a placebo. The results showed that those who took the CBD dose experienced overall reduced anxiety levels.
CBD has also been studied in other neurological disorders. A 2016 study found some antipsychotic benefits of CBD in schizophrenia. The authors indicated a preference for CBD over antipsychotic drugs, which are known to cause significant debilitating side effects.
With all the toxins we are exposed to every day, detoxing is a must.
There’s arsenic in rice, lead in water, mercury in fish, and new research shows there is more weed killer than certain vitamins in kids’ cereal.
Our bodies need help handling this daily onslaught of toxic chemicals. The good news is you can support detox starting in the kitchen.
These superfoods either bind to the toxin so it can be removed, or they support the function of your liver, so it can efficiently act as a toxin filter.
And your body needs the help. Testing shows that the average person has over 200 toxic chemicals in their blood.
Detoxing can give you more energy, support your heart, clear out the brain fog and set you up for a long, healthy life.
Too many smoothies try to trick you with sky high sugar content and questionable ingredients, but not this amazing chocolate almond smoothie.
Hidden inside this decadent chocolate shake are all the healthy superfoods you need for energy to conquer your day.
It’s secretly packed with good-for-you greens. But you’ll never be able to tell because all you’ll taste is velvety chocolate with a hint of nutty flavor.
Have kids who won’t eat their greens? This delicious smoothie will trick their taste buds, making greens a tasty treat. They’ll never know.
And it’s free of toxic pesticides, GMOs or anything artificial. It’s just pure goodness in every chocolatey sip. Enjoy!
With every breath we take, and in countless ways throughout each day, we are exposed to toxic chemicals and heavy metals, which can have devastating consequences for our health.
It’s no wonder that health gurus and medical professionals recommend detoxing the body. And zeolite is a master detoxifier of toxins.
But I’m often asked which is better, liquid zeolite or powdered zeolite? So, we’ve put together all the ways liquid zeolite is the best choice.
The benefits of ridding your body of toxins are vast and life changing. You can experience more energy, better sleep, clean out brain fog and much more.
With up to 1 in 8 women expected to be diagnosed with invasive breast cancer in their lives, very few families are unaffected by its destructive wake.
Breast Cancer Awareness Month is an important time to honor those affected. This includes creating awareness on how people can reduce their risk.
In honor of ‘Pink October’ we’re sharing a simple method you can use or teach your loved ones to decrease the risk of breast cancer.
Remarkably, this vitamin doesn’t just play a role in reducing risk, it may also increase the likelihood of surviving breast cancer.
Research also shows that women with high levels of this vitamin were twice as likely to survive as women with low levels of the vitamin.
Inflammation can cause or contribute to the lingering effects of an old injury, wear and tear on the body, or even soreness after intense workouts.
It happens when the immune system is triggered to go into overdrive, and it’s made worse by age, the foods we eat and other factors.
But increasingly, an extract from hemp is showing that it can calm and cool the fires of inflammation, which can add up to real relief.
Hemp extract contains powerful compounds including cannabinoids, terpenes, and flavonoids that work to balance the body.
It is often said that “every adversity has within it the seeds of an equivalent or greater benefit.” Whenever you are faced with a setback ask yourself what you could do to turn it around. Better still, ask yourself how you can benefit from the setback, which direction do you want to go. It may sound ridiculous, but you can benefit from a setback if you change your perspective. You will realize that there is nothing so bad you cannot use it for some good and that there is no situation that is totally hopeless. I have had many times when I have turned a “bad” situation into one that benefits me. It’s a matter of attitude.
It was a delight to visit with Eddie Stone personally and to hear the knowledge and wisdom he has for business, for nutrition and for networking. I was able to visit and listen in to conversations where he shared how the body works with bad foods and then good nutrition and how it helps us to have better health and a better lifestyle.
We made a recording of Eddie’s presentation that we want to share with you. It’s not the best recording but we did the best that we could on such short notice. Next time, maybe you can join with us in person.
We are delighted to share this presentation to you to enjoy, learn and to decide to join with 2Konnect and join with Touchstone Essentials. Please enjoy.
Get together with the one that shared this link with you and get the answers about how to join, how to get healthy and how to earn some serious money for a better lifestyle and life.
|
2019-04-22T14:26:17Z
|
https://2konnectkares.wordpress.com/tag/touchstone-essentials/
|
Porn
|
Health
| 0.192569 |
yahoo
|
15%63°53°Night - Cloudy. Winds from ENE to E at 6 to 7 mph (9.7 to 11.3 kph). The overnight low will be 56 °F (13.3 °C).Cloudy with a high of 63 °F (17.2 °C). Winds variable at 5 to 15 mph (8.0 to 24.1 kph).
Tonight - Cloudy. Winds from ENE to E at 6 to 7 mph (9.7 to 11.3 kph). The overnight low will be 56 °F (13.3 °C).
Today - Cloudy with a high of 63 °F (17.2 °C). Winds variable at 5 to 15 mph (8.0 to 24.1 kph).
|
2019-04-20T23:23:07Z
|
https://www.yahoo.com/news/weather/france/midi-pyrenees/fenouillet-590799
|
Porn
|
Reference
| 0.223289 |
wordpress
|
It’s the last day of the year… I just made some tea and I’m listening to the Top 2000 on Radio 2 (The Top 2000 is an annual marathon radio program in The Netherlands, that plays the 2000 most popular songs of all time, from Christmas through New Year’s Eve). It’s rainy and windy outside and ‘Dancing Queen’ is playing on the radio. I’m looking back at the past year. It’s been a year with ups and downs, but I’m grateful for all the great memories 2017 brought.
We’re programmed to reflect back on the year. Where were you a year ago? What were the best moments in the past year? What have you achieved? Are you happier now than you were a year ago? What do you feel grateful for?
At night people gather to celebrate, dance, drink and be happy. There’s a collective feeling of things coming to an end and a feeling of a new beginning; expectations are high. At midnight we’ll ring in the new year with fireworks and champagne. It’ll be the 1st of January…the start of a new year… Apart from sore heads, eyes being sensitive to light and family obligations waiting, is this day any different from other days? If you think about it it’s just another day.
It’s funny how we all let time dictate our lives. We’ll get running for another year…365 days, 52 weeks, 12 months to fulfill the dreams and to accomplish the goals we’ve set for ourselves on New Year’s Eve to find ourselves in the same setting again next year… ringing in the new year with fireworks and champagne. It’s a really strange global tradition if you think about it.
In reality, New Year’s Eve is just the same as every other night of the year, but as it’s such a big global event, it’s something that connects us all. We all make it a special night and make it meaningful. I’m doing the same thing. I don’t need a big celebration but personally I do think that new year’s eve can make a difference. It’s a good moment to use the vibe to make some positive changes and set some realistic goals. I like the feeling of a fresh start in the new year to work towards my dreams.
Over to you, thank you for reading and sharing the blogs this year and thank you to all who’ve been supporting Robb’s music!
Happy New Year to everyone and I hope that 2018 brings you everything you wish for!
Tomorrow we all have a new year, make it a good one!
This entry was posted in Uncategorized and tagged #Acoustic, #Singer-Songwriter, Acoustic Music, Behind the scenes, Belfast, Happy New Year, Ireland, Music, Mysteries of the Heart, Northern Ireland, Robb Murphy on 31 December 2017 by Kirsten.
|
2019-04-25T08:54:39Z
|
https://writtenbehindthescenes.wordpress.com/2017/12/31/happy-new-year-2/
|
Porn
|
Society
| 0.305994 |
wordpress
|
This is the 8th year the Marine and Freshwater Research Institute participates in the International Summer Survey in Nordic Seas (IESSNS) along with vessels from Norway, Faroe Islands, and Greenland.
We left Reykjavík in the evening of July 3, heading northwest. Ahead are 30 days at sea where we will sample 80 stations and sail 6000 nmi.
|
2019-04-18T22:34:45Z
|
https://pelagicecosystemsurvey.wordpress.com/about/
|
Porn
|
Science
| 0.768434 |
wordpress
|
The Painted Man by Peter V. Brett – I’ve spoken about this book a lot – you can read my review here. Waterstones were doing a special edition paperback for £2.99, so now I finally have my own copy!
11.22.63 by Stephen King – this one from the charity shop, practically brand new and only £1. It’s all about time travel and trying to prevent the assassination of JFK – which occurred on the eponymous date.
The Magicians by Lev Grossman – described as ‘Harry Potter for grown ups’. Yes. Yes, and yes!
The Raven Boys by Maggie Stiefvater – I have actually never really read the blurb for this one… I just kept seeing it everywhere and it has a pretty cool cover. That is quite honestly the only reason I ordered it.
The Maze Runner by James Dashner – I added this to my TBR list when looking through the Dystopian genre on Goodreads. It claims that if you loved The Hunger Games, you’ll love this – but I think they say that for every YA Dystopian novel these days. We shall see!
Ready Player One by Robert Cline – this one sounds so cool – like a mix of Tron and Blade Runner!
What have you received to read this week?
After finishing Mass Effect 3, I really wanted to read some sci-fi. So I went down to my local library, and browsed the (rather pathetic) sci-fi and fantasy section. I came back with four fantasy books, and just one sci-fi. Luckily, one of the fantasy books was this one, because it was amazing. I was first drawn in by the cover – rather mysterious – and then the blurb.
The entire concept of demons (or ‘corelings’) springing up out of the earth after the sun has set – or even when it is dark enough during the day, caused by storms and the like – really interested me. The people of this fantasy world live in fear of the dark, because there is actually something out there, and to prevent demon attacks they must ward their homes, businesses, cities etc, or travellers must create ward circles in which to hide at night. But the wards can be easily disturbed – washed away by rain, covered by snow or leaves, even just a person treading on one of the wards can break the circle. Everyone lives in constant fear, and no-one has the means, or courage, to face up to the demons. That is until Arlen finds a warded spear in the ruins of an ancient city, and using murals and the spear itself begins to recreate the wards, even going to far as tattooing his entire body – hence the ‘Painted’ or ‘Warded Man’.
I have to admit when I first opened the book and read that the main protagonist was a ten-year old boy, my heart sunk a little. I often get annoyed by such young protagonists, but Arlen really surprised me. He was clever and a realist, and very, very determined. And his transformation into the Painted Man was fantastic – strengthened by past losses, and desperate to not turn into his father. In fact, all three of the protagonists were very likeable and it was interesting to follow them from their pre-teens (or earlier, in Rojer’s case), to adulthood. I like Leesha for her sense of morals and her determination to live her life as she wanted.
Often with fantasy novels, the authors understandably want to create something new, a new world, but some times it can get very complicated. The Warding system was very understandable, and I can’t wait to find out more of its back story, along with the history of the Core and corelings – which I hope will be coming up in the next two books.
I really loved the pacing of the book. Brett didn’t switch between POVs too quickly, nor too slowly. It felt like just as something big was building up for each character, the POV would switch, which definitely kept me reading to find out what happened next. The action scenes were brilliant and fast paced.
As much as I love fantasy, I haven’t found too many series that have really gripped me. The Lord of the Rings and A Song of Ice and Fire go without saying, but I feel this series (trilogy?) could soon join them. I will definitely be looking out for book two, and book three when it is published – apparently February 2013.
|
2019-04-23T23:14:35Z
|
https://rinnreads.wordpress.com/tag/the-warded-man/
|
Porn
|
Reference
| 0.205452 |
wordpress
|
Visiting an optometrist for a yearly exam is vital to healthy eyes that last a lifetime. The overall goal of a visit is to make sure patients can see clearly by ensuring there refractive error is correct and their eyes are healthy. If a patient needs vision correction (refractive eye care), we define their individual needs. There is more than one way to see well.
Someone with Emmetropia wouldn’t need glasses to see long distances. Light rays are accurately focused on the retina in this normal refractive condition.
If a patient can’t see long distances, they may have Myopia, commonly described as being nearsighted. When this happens, the natural lens, cornea and/or shape of the eye cause light rays to focus in front of the retina. This patient will need to wear glasses for crisp distance vision, but most of the time will not need them for reading.
If they can see for miles and miles, these patients may not realize they need glasses until they are older. Hyperopia (farsighted vision) is caused when the natural lens, cornea and/or shape of the eye causes light rays to be focused behind the retina. Because of the eyes natural ability to focus, farsighted people may not need glasses until they are older. This patient needs glasses for reading. As a precaution, it is important to dilate children for their exams because they can “focus over” this type of prescription, making it difficult to find the correct prescription.
This is a little more difficult. The cornea is shaped more like a football having two curvatures instead of one like a basketball. This causes light rays to focus at different places in front of and/or behind the retina.
Sadly, not everything gets better with age. As eyes get older, the ciliary body becomes tired of focusing thousands of times a day and stop working. Changes in the lens and the little strings that support the lens (zonules) decrease the eyes ability to focus. An Emmetropic patient could still see great at a distance but will now need reading glasses. The Myopic patient will still need glasses for distance, but if they want to leave their glasses on for reading they will need bifocals. The Hyperopic patient that could focus over their prescription previously, will now need glasses to see near and far.
With more than one way to see clearly, patients can choose from a diverse collection of frames and lenses if they choose to wear glasses, or opt for contacts or surgical options. Today’s frames and lenses are not only stylish, but also made with nearer materials that can make even thicker prescriptions thin. Contact lenses sit directly on the cornea and can be a solution for almost all prescriptions. If a patient has a more permanent solution in mind, laser vision correction (LASIK) is an option. Other surgical (but reversible) options include Intacs Cornea Implants and implantable contact lenses.
The team at Antietam Eye can help determine the best solution for you. While we can’t predict your future, we can be part of your plan to see it as if it were crystal clear.
|
2019-04-21T02:59:56Z
|
https://antietameye.wordpress.com/2016/09/20/your-future-could-be-crystal-clear/
|
Porn
|
Health
| 0.138835 |
iastate
|
CORRECTED TO ADD FIRE WEATHER SECTION.
WITH A SEVERE THUNDERSTORM WATCH FOR WILLIAMSON AND LEE COUNTIES.
AND WINDS WILL BE 20 TO 25 MPH.
|
2019-04-21T18:42:57Z
|
http://mesonet.agron.iastate.edu/wx/afos/p.php?pil=AFDEWX&e=201212250938
|
Porn
|
News
| 0.417491 |
bravenet
|
Dell printer helps us to make our work easy to do, it is very useful. But sometimes it also creates some problem during its process. You can find out much technical support team. But you will never get service like us. To connect with us, just give a call to Dell Printer Support Canada: 1-855-253-4222 and get the best solution for your query.
|
2019-04-19T12:41:39Z
|
http://pub48.bravenet.com/forum/static/show.php?usernum=4087972527&frmid=2755&msgid=1154062&cmd=show
|
Porn
|
Computers
| 0.711614 |
wordpress
|
← ELLEN IS NICKI MINAJ FOR HALLOWEEN!
Selena Gomez covers the December/January 2014 issue of Teen Vogue . In the interview, Selena talks about her friend Taylor Swift and how they are different. Selena and Taylor sat next to each other at the MTV VMAs. Selena also talks about being a hopeless romantic and eating junk food.
You can view the slide show of Selena’s cover shoot here .
Selena was photographed by Giampaolo Sgura for Teen Vogue .
She talks about her Stars Dance tour in the cover shoot video.
She says two of the dancers on her tour have been her friends for years. She also picks up the phone and calls Taylor Swift.
|
2019-04-20T02:58:09Z
|
https://finejoeyoung.wordpress.com/2013/11/06/selena-gomez-covers-decemberjanuary-2014-issue-of-teenvogue/?share=google-plus-1
|
Porn
|
Arts
| 0.659249 |
wordpress
|
Amateur photographer in pursuit of the perfect light.
Discover the visions of 37 award-winning street photographers—urban poetry, silent cityscapes and beauty in the everyday from all over the world.
Norwegian photographer Stig Havard Dirdal created another viral Christmas card by recreating Rembrandt’s famous painting, ‘The Anatomy Lesson of Dr. Nicholaes Tulp.’ Ingeniously, he created the costumes using materials found at his local IKEA.
This list contains plenty of the things you would expect– song, dance, festivals, crafts and arts. But it also contains many more unusual, protection-worthy practices which are on the brink of destruction.
From butts to flowers on fire, the best photos of 2017.
A look back at 2017 in photographs.
Stunning aerial images of sports from 2017.
Because penguins can be pranksters and prancers to lighten the mood.
Our best images of women in sport for 2017.
|
2019-04-21T09:15:25Z
|
https://asthelightgoesin.wordpress.com/author/juliofaro/
|
Porn
|
Sports
| 0.697318 |
wordpress
|
MOX: How to Rid the World of Swiss Bankers Once and For All?
Right to Clean Water, Air, & Land for Current & Future Generations?
Nuclear Power and Water: In a Hot, Dry, World, Nuclear Doesn’t Work! Plus it Pollutes Water!
Sustainable Society, What can you do?
Nuclear Power? Is it Sustainable?
|
2019-04-19T20:41:40Z
|
https://miningawareness.wordpress.com/2014/06/
|
Porn
|
Society
| 0.779911 |
webs
|
It was pleasantly warm that day in May. Trees blossomed and birds sang their flirtatious spring songs. Hues of different green smiled up at the bright light in corners of small hidden squares, climbing up white trellis attached to high walls. My favourite hideaway was the Place de Furstenberg, around the corner from Rue Jacob, in the heart of St Germain. I would sit on a bench listening to the down-and-outs debating philosophy and inhaling the calm of the morning.
It was about eleven. Madame Janin, busy changing her window display of wooden draught boards, carefully placing Kings and Queens on the Victorian Chess Board, waved as I passed her shop on my way to La Palette.
I noticed a gathering of longhaired students, some wearing denim flares, crochet tops and platform shoes, while others sported the usual black leather jackets. They were hovering on the corner of Rue de Seine with Jacques Caillot in front of my café. I pushed past to get to my usual table on the pavement. There were only six outside with two bistro red and beige cane chairs to each table. Two to the left of the entrance and four to the right. I sat on the left because it was easier to get into conversation with interesting persons unknown.
I sat watching the crowd as I sipped my espresso and dunked my crisp croissant, a la Francaise, into the black sensual hot liquid. 'What are all these students doing here?' I wondered. The old Parisian streets were so narrow that, as the noisy excitable crowd swelled, some of the students trod on my toes. I got up and moved inside to finish my morning breakfast ritual.
'What's all the excitement about, Gerard?' The Patron shrugged his broad shoulders and seemed in an abnormally sullen mood. More regulars came in, complaining the students were shouting and getting out of hand. Something serious was happening..
The Patron looked worried because there was hardly any room in the front part of the café. By now, the back room, usually empty at 11.30, was overflowing. His regulars were engulfed by people off the street escaping the growing mass of angry students who were, by now, prominently displaying red banners and flags.
I decided to leave but found I couldn't. I was trapped between the zinc bar and the human wall blocking the café entrance. I glanced at my new glittering Bueche Girod watch. The hands winked at me. They knew I had to get to the Restaurant des Beaux-Arts by Noon to meet someone special.
It would normally take five minutes. Up the Rue de Seine, second left into the Rue des Beaux-Arts. There, on the corner opposite the Arts School in the Rue Bonaparte. Being English, I was always on time but I could see from the window the crowd was spreading like ants up and down the street and, from past experience, I did not want to be another ant.
How I hated angry crowds. Last year I had accidentally been caught up in a Spanish workers' riot in front of the Town Hall in Barcelona. Just before the shops closed, I witnessed overturned burning cars and exploding Molotov cocktails. I had been trapped lying in darkness on the cool floor of an antique print shop for about three hours. The shouting and screaming outside was daunting. When all was quiet, the proprietor opened the iron gates and motioned me to flee via the winding back streets back to my hotel. Soon after that I got caught in a sudden human stampede of faceless raging beings running downhill and thrown to the ground losing my left shoe. No, I didn't want a replica of that dramatic experience a year later.
"District 6 Riot Branch?' I heard the Patron ask. I watched his facial expressions and hand gestures. "Gerard Le Vigne, Patron of La Palette here. What's this demonstration all about? It's getting out of hand here, in the Rue de Seine. Am I speaking to Inspector Maigret?' More gesticulations and shrugging and then, "No, I can't believe it! How many? What are you doing about that amount of students?" I watched as he digested the information. Silence, "'Where?" more silence, "Ca, alors!"
It transpired the students at the Sorbonne had taken over the building led by a German nicknamed 'Dany le Rouge' who had incited students to take action against the administration of the entire university system. Daniel Cohn-Bendit, his real name, was anti De Gaulle and had inspired students to march in the streets that day. They had been joined by art students to march to Les Beaux Arts. The streets at this junction were too narrow for the gendarmes to intervene. Trying to prevent a stampede, the police were lined up nearby, in the Quai Malaquais along the banks of the Seine.
I gave up the idea of lunch. The Patron made the decision to lock the door. 'This is an historic day.' he announced. 'It's the beginning of a Cultural Revolution. Let's celebrate. Drinks on the house!' We all cheered and toasted the students' courage shouting, "Liberte."
Events during May and early June escalated from what began as a small student gathering into a massive full scale attack against the De Gaullist Right Wing Regime. Students, backed by Jean Louis Barraut and other actors, would take over the Teatre National Populaire (TNP), young philosophers, such as Levy, would voice their opinions and workers would flood into Paris together with mercenaries (Katangais) from Katanga (Belgium Congo) called in by political agitators. A cultural revolution had ignited.
I would read about these events, as they happened in Le Monde, Paris Match and the satire magazine Le Canard Enchaine. The Art School would become the centre of activity. Students would take over the building and lock the massive ornate gates. A whole art department (Atelier Populaire) would be set up to run off thousands of co-operative broad sheets using simple silkscreen and stencilling techniques. The designs and slogans would be seen all over walls throughout the capital.
I was after all an Outsider, a mere observer, but I sympathised with their plight for freedom of thought and speech and an end to university red tape and bureaucracy.
After a month or so the revolution ended as quickly as it had begun. The events passed into the annals of French social and political history. But the implications of what had happened carried on throughout university circles. Discussions continued in Les Deux Magots, Café de Flore and other Left Bank intellectual cafes for years to come.
I was glad to have witnessed that first day and felt the intensity of the moment. Thirty seven years later, these crude posters are to be found in museums such as the Smithsonian in Washington and the Bibliotheque National, as part of an important Cultural Revolution. Today the event is simply referred to as 'Paris, May 1968' I even had an original poster book of some of the artwork in my commercial picture library and archive Retrograph Archive in London.
Published in Thirty Seven Stories, Biscuit Jar publication, Brighton 2005 page 26 has a misspelling of my name!!
|
2019-04-22T00:16:50Z
|
https://autobiograpy-memoir.webs.com/parismay1968.htm
|
Porn
|
Recreation
| 0.81031 |
wordpress
|
Yep, my top bucket list item was to write a novel. But before this video was uploaded, I’ve done something unthinkable. I started writing the novel.
I’m not allowed to reveal it (under my own terms), but I can give away one hint: it is based on the fairytale Beauty and the Beast, which is one of my favourite fairytales.
I’m so excited about it, even though I have I only wrote five full chapters because I’m finally doing something that I love.
Sorry for the short post. I promise that I’ll update you when I can. Until then, keep dreaming and believing.
Author SezPosted on February 13, 2016 February 12, 2016 Categories actingmylife, Blogs, Books/Novels, dreams, Literature2 Comments on Goal Achieved?!
Happy New Year, all your lovely readers!
Hope you are enjoying your 2016 so far (even though it’s in melted snow).
For me, a New Year is all about changes and adventure. It is also a exciting moment, were you want to plan to achieve new aims and what you are looking forward to.
Since I started my channel last September, I have been obsessed with recording and making videos. However, I’ve been bad with uploading new vlogs lately because I was on a break from Drama school and have been catching with friends before I return for the Spring term. So to discipline myself as well as targeting to stay on top of my classwork, I have decided to span two weeks by uploading a video one week and a post the next. This will mean that it’ll give me time to prepare for a new video on my channel, but still keep active on my blog – just a week apart from each other.
Aside from the schedule, I want to be able to do collaborations with other YouTubers and share some of my hidden talents (which I’m going to reveal, until I show them to you).
Yesterday, I have started a free course on the Future Learn website. This course is called Explore Animation, where participants can learn how to create stop motion, 2D, big-scale and CGI animation. I have already completed week 1 and working my way to week 2; it’s a four week course, so it’s not long before I will complete the course.
But, I am keen to learn more online courses. Not just from the creative side, but from the historical and biological ones too as I am keen to to learn more about my four favourite subjects, which are Literature, History, Biology and of course, Performing Arts.
After last year’s amazing holiday, I am very excited (as always) to return to the festival. We haven’t booked yet, but I am excited to see everyone again and participate in old and new lessons, such as the Comedy Improvisation. If I return, it’ll be my sixth year (which I still cannot believe!). So, it will be a absolute, but spiritual shocker.
However, I have been planning of what will happen next year and my first choice is to stay on and do their top up year BA Hons Degree course. I have heard good reviews about the course and it excites me to learn more about the Performing Arts Industry, through the eyes of my school. But if it doesn’t work out, I’ll properly find a job.
They say that everything happens for a reason, and for me, (not matter what happens) I’ll survive.
I love reading books from each category and by my favourite authors. From them, I’ve been inspired to dream to write a duet novel. However despite my one of my main, big dreams, I have also wanted to be a joint author, share ideas and write a novel with my favourite author/s. I think it’ll be interesting and really, really fun. It will be an honour to work with these amazing people.
So, here they are my top five authors who I want to write a joint novel with.
Helen Fielding – I love all her Bridget Jones works (I’ll be publishing her latest Bridget Jones novel very soon); her writings have a lot of charm, character and creativity.
Zoe Sugg – Girl Online was a huge favourite of mine; I became over excited by Zoe’s wonderful story setting and characters.
Philippa Gregory – I love Philippa’s Historic stories, mostly her Medieval and Tudor series – they are truly remarkable.
Robin Maxwell – I adored Jane: the Woman who Loved Tarzan – it is wonderfully and thoughtfully written, which made me smile.
Holly Smale – Like Helen Fielding, Holly’s Geek Girl series have made me uplifted with laughter; it is also very powerful and beautiful.
Should I Publish a Novel?
Lately, something’s been on my mind. I don’t know why but I just have to get this thought out of my mind.
What story should I publish? Should I publish something from that’s already on my blog (like the Waiting For a Rainbow series)? Or should I start from scratch?
Should I find an agent or self-publish?
If I do find an agent, should I go with one or vary a little?
So that’s my aspiration on publishing and my thoughts about it.
Bit of a strange post but that’s me; I post a lot of strange posts.
Author SezPosted on July 25, 2015 July 25, 2015 Categories Books/Novels, dreamsTags Achievements, Aspirations, Books1 Comment on Should I Publish a Novel?
|
2019-04-23T00:46:08Z
|
https://actingmylife.wordpress.com/category/dreams-2/
|
Porn
|
Arts
| 0.760585 |
wordpress
|
ASEAN or Association of Southeast Asian Nations is a regional intergovernmental organization comprising ten Southeast Asian countries, which promotes intergovernmental cooperation and facilitates economic, political, security, military, educational, and sociocultural integration among its members and other Asian states. (Wikipedia).
ASEAN was established on 8 August 1967 in Bangkok by the five original member countries: Indonesia, Malaysia, Philippines, Singapore, and Thailand. Brunei Darussalam joined on 8 January 1984, Vietnam on 28 July 1995, Laos and Myanmar on 23 July 1997, and Cambodia on 30 April 1999.
If you are an engineer of the ASEAN member countries, you can register to become an ASEAN Engineer (AER) or an ASEAN Chartered Professional Engineer.
Greater avenue for sharing of knowledge, expertise and technology.
Wider networking and strategic alliances.
More potential for research and development.
To exchange information in order to promote adoption of best practices on standards and qualifications.
The ASEAN Chartered Professional Engineer Coordinating Committee (ACPECC) established as an overseeing body at regional level and comprise of one appointed representative from each Monitoring Committee (MC) of the participating ASEAN Member States. ACPECC have the authority to confer and withdraw the title of ASEAN Chartered Professional Engineer (ACPE).
I encourage all ASEAN member Engineers especially expats to be registered and be recognized in the ASEAN and Global community.
I myself is proud to be both an ASEAN Engineer and an ASEAN Chartered Professional Engineer. If you are interested, need to upgrade your career and wanted to be recognized, keep posted. I will have separate blog post on how to become one. Soon!
This entry was posted in Chartership, Engineer, Professional, Qatar, Work and tagged ACPE, ACPE Engineer, AER, ASEAN, ASEAN Chartered Professional Engineer, ASEAN Engineer, Chartership, Engineer, Engineering Registration, OFW, Pinoy, Pinoy Engineer, PinoyExpat, Professional, Qatar. Bookmark the permalink.
|
2019-04-20T04:51:09Z
|
https://whatiloveandlive4.wordpress.com/2018/10/31/are-you-an-asean-engineer/
|
Porn
|
Business
| 0.731036 |
tripod
|
To get rid of income taxes join the Philoeconopolist Party and elect 290 new members to the U.S.
legislation with a required 2/3rds vote in both the House and the Senate. We can do it !!!
|
2019-04-26T14:18:16Z
|
http://philoeconopolist.tripod.com/AIT/chap6.html
|
Porn
|
Reference
| 0.454566 |
wordpress
|
via LYING TO LEVESON | PRESS GANG.
This entry was posted in Mahzer Mahmood by peterjukes. Bookmark the permalink.
|
2019-04-24T16:34:17Z
|
https://fothom.wordpress.com/2014/11/11/lying-to-leveson-press-gang/
|
Porn
|
Reference
| 0.645164 |
wanadoo
|
Put the verb in brackets into the correct form, infinitive or -ing. Type your answer, then press "Check". If you need help, you can click on the "Hint" button to get a free letter.
|
2019-04-19T15:04:43Z
|
http://perso.wanadoo.es/autoenglish/gr.infing.i.htm
|
Porn
|
Reference
| 0.402393 |
wordpress
|
This entry was posted on August 13, 2010 at 4:49 pm and is filed under Material Handling. You can follow any responses to this entry through the RSS 2.0 feed. You can leave a response, or trackback from your own site.
|
2019-04-26T02:52:49Z
|
https://atlaseq.wordpress.com/2010/08/13/keeping-insects-out-of-warehouses-and-factories/
|
Porn
|
Business
| 0.6956 |
wordpress
|
Mister and I, happily living life!
Today Deborah from The Monster In Your Closet posed a question on her facebook page asking, “If you could choose ONE of your blog posts you’d want to be read far and wide, which would it be?” The first post that jumped to mind was the “Letter to my Daughter…” that I wrote to Megan. Deb asked for us to link our posts under her question, and after I did I realized that I haven’t written anything for the blog in quite some time… Yikes! Not only has Deb prompted me to repost the blog I wrote to Megan on my own facebook page, but also to blog for a bit today. Thanks for the motivation, Deb!
I haven’t been blogging lately, but that’s simply because I’ve been living. I used to say that “life gets in the way”, but until recently I didn’t realize how horribly wrong that statement is. I love my life, and it’s certainly not in the way of anything!! I find myself annoyed at times because I can’t get to the computer to check email, facebook notifications, or blog. I’m too busy helping Mister build our HAM shack/Hobby room. We’ve been too busy reorganizing the garage, and I have a special project that I’m working on for Mister, and those things have had to take priority.
Wait, what?! I’m annoyed that I’m living life and its keeping me from sitting in front of a computer for hours?! Oh. My. Goodness. Last week this thought snuck up one me, and I felt like DiNozzo getting hit upside the head by Jethro Gibbs. Doing these projects and things around the house is me living my life. And I’m enjoying it fully! Blogging about it is just a bonus, and something I do purely for myself. I’ve no right to put pressure on myself, and beat myself up for not getting to blogging in what I consider a timely manner. What a silly thought, and yet something that I was allowing to make me feel very badly.
Having shared this little revelation, something that I’m sure most people are already aware of and face-palming themselves on my behalf, let me just say that I do have some blog posts to catch up on. And, they aren’t deeply profound. (Another pressure I add to myself.) They’re just posts about me, and Mister, and the kids, as we go about our simple life. And, when I have a moment, I’ll get to writing them. I can’t wait to share the project I’m working on for Mister, but that’s been incredibly time-consuming and will not be done for awhile. I also need to do the last Garage post, because that has been completely finished for a couple of weeks now. And it’s beautiful!!
Until then, I hope that you, too, are living your life and enjoying it! It’s our Dash, we have to make the most of it!!
Love your blog, Christine. So glad that “Running From Hell” connected our pages on FB … (I’m the Messy Room gal.) I find it very interesting that this post grapples with “living life” and “posting blogs” as if they are in opposition. THAT was the LAST post I put in the Messy Room … months ago! The tide has been out and I am getting ready to ride the wave back in. If it wasn’t for the “in–out” of the flow (DASH intentional) we wouldn’t have anything to say. IMO 🙂 (I TOO saw Deb’s post about choosing one blog post.) Great shot of you and Mister!
I, too, am so glad that El connected our pages! I loved the blog you wrote, and I need to remember to not let the ever elusive “they” put restrictions/pressures on me! Thanks so much for the wonderful comment, and the link you posted!!
|
2019-04-24T06:55:36Z
|
https://brilliantlyred.wordpress.com/2012/02/02/life-getting-in-the-way/
|
Porn
|
Home
| 0.130668 |
wordpress
|
You want to be with me?
If you met yourself walking down the street, would you be interested in that person? Would you like to take yourself out for a drink, or maybe take you home to have a little more of an intimate encounter? After a few days would you still want to be with you?
If you are anything like me, you might take a second glance. You may even say hi to yourself, but out for drinks? Bringing that person into your home? That is a little more complicated.
Just so we are clear, I’m not talking about liking the fake you. I’m talking about the real one. The one currently still in her pajamas. The one that can be laughing one minute and crying the next. The one who yells at her kids. The one who hates his job. The ugly one.
There are a lot of things that are out of your control. You may not be perfect, but you can become someone you like. You can also learn to like the person you are. Best of all, you can have a good time doing it. At least I hope so. I’m not my favorite person either, so I hope you don’t mind me tagging along on this journey to wanting to be with ourselves.
Once a week I’ll be posting on this topic. Unless I am hormonal, or pessimistic, or lazy…or busy making excuses. Okay, I’ll post if you show up. We have to like each other while we learn to like ourselves.
I should have mentioned, but you can’t just go the day without writing. That would be too easy. You have to write at least one post on which ever day you choose to do this, and if you think you’re really good, you should also read and comment on other’s blogs. Have fun!
|
2019-04-25T12:07:45Z
|
https://hobbling.wordpress.com/tag/fashion/
|
Porn
|
Recreation
| 0.354664 |
google
|
本発明は情報処理装置、情報処理方法及び情報処理システムに関し、特に、IEEE1394等のインタフェースで接続される情報処理装置に用いて好適なものである。 The present invention is an information processing apparatus, an information processing method and an information processing system, in particular, is suitable for use in an information processing device connected with an interface such as IEEE1394.
従来、複数の機器同士をIEEE1394インターフェースで接続する場合、例えば、プリンタとホスト(パーソナルコンピュータ、デジタルカメラなど)をIEEE1394インターフェースで接続する場合、そのデータ転送方法として同期転送(アイソクロナス転送)と非同期転送(アシンク転送)の2種類が用いられている。 Conventionally, when connecting multiple devices together with IEEE1394 interface, for example, to connect the printer and the host (personal computer, digital camera, etc.) with IEEE1394 interface, synchronous transfer (isochronous transfer) as the method of data transfer and asynchronous transfer ( two Ashinku transfer) is used.
前記同期転送は、時間的に同期を取ることができ、一定時間のデータ量を規定することができる利点がある。 The synchronous transfer is temporally can be synchronized, there is the advantage that it is possible to define the amount of data for a certain time. しかしながら、同期転送を行うためには、同期を取るための同期パケット(サイクルスタートパケット)を定期的に送信するサイクルマスタがバスのノード内に必要となる。 However, in order to perform a synchronous transfer, the cycle master transmits the synchronization packet for synchronization (the cycle start packet) periodically becomes necessary in a node of the bus.
それに対し、非同期転送は、時間的なデータ量を一定にすることができないが、サイクルマスタが不要なので、サイクルマスタを内蔵しないようにすることでプリンタ等の機器のコストを低く押さえることができる。 In contrast, asynchronous transfer is not possible to a constant temporal data amount, since the cycle master is not required, it is possible to maintain low costs of equipment such as a printer by not incorporating a cycle master.
そこで、デジタルカメラのようなコンシューマー向けの機器に関しても、サイクルマスタ機能を搭載しないようにしてコストダウンを図るようにすることが考えられる。 Therefore, with regard consumer devices such as digital cameras, it is conceivable to make cost reduction so as not equipped with the cycle master function.
サイクルマスタ機能を持たない機器同士が接続されても、そのバス内の他のノードにサイクルマスタ機能を持つノードが必要となる。 It is connected between devices that do not have a cycle master function, a node having the cycle master function to the other nodes in the bus is required. しかし、バス内においてサイクルマスタ機能を持たない機器同士が接続される可能性も考えられる。 However, it is considered possible that between devices without a cycle master function in the bus are connected. このような場合、サイクルマスタが存在しないためにデータ転送自体を行うことができず、したがって、情報が得られないので印字を行うことができなくなってしまう問題があった。 In such cases, it is impossible to transfer data itself because there is no cycle master, therefore, information had become impossible to perform printing problem because not obtained.
本発明は前述の問題点にかんがみ、サイクルマスタ機能を持たない機器同士を接続した場合、あるいはバス内にサイクルマスタが存在しない場合でも、データ転送を行うことができるようにすることを目的とする。 In view of the problems described above, when the connecting devices to each other without a cycle master function, or the bus even when the cycle master is not present, and an object thereof to be able to transfer data .
本発明の情報処理装置は、シリアスバスに接続される情報処理装置であって、特定の要求を前記シリアルバスに送信する送信手段と、前記特定の要求に対応する応答に基づいて、同期転送を行うのに必要なサイクルマスタが前記シリアルバスにあるかどうかを判定する判定手段と、前記サイクルマスタが前記シリアルバスにあると前記判定手段により判定された場合に、機器との間で行うデータ転送モードとして同期転送を選択し、前記サイクルマスタが前記シリアルバスにないと前記判定手段により判定された場合に、機器との間で行うデータ転送モードとして非同期転送を選択する制御手段とを有することを特徴とする。 The information processing apparatus of the present invention is an information processing apparatus connected to the serial bus, and transmitting means for transmitting a specific request to the serial bus, based on a response corresponding to the specific request, the synchronous transfer If the cycle master required to perform is determined the whether a determination unit configured to determine whether a serial bus, by the determination unit and the cycle master is in the serial bus, the data transfer performed with the device select synchronous transfer as mode, when the cycle master is determined by the determining means that there is no the serial bus, that a control means for selecting an asynchronous transfer as data transfer mode performed with the equipment and features.
また、本発明の情報処理装置の他の特徴とするところは、シリアルバスに接続される情報処理装置であって、前記シリアルバスに、特定の要求を送信する送信手段と、前記特定の要求に対応する前記シリアルバスにおけるバスマネージャからの応答に基づいて、同期転送を行うのに必要なサイクルマスタ機能があるかどうかを判定する判定手段と、前記判定手段による判定結果に従って、同期転送及び非同期転送を含む複数の転送モードの中から、前記転送先の機器との間でデータ転送をする場合の転送モードを選択する選択手段とを有することを特徴とする。 It is another feature of the information processing apparatus of the present invention is an information processing apparatus connected to a serial bus, said serial bus, and transmitting means for transmitting a specific request, to the particular requirements based on the response from the bus manager in a corresponding one of said serial bus, determination means for determining whether there is a cycle master functions necessary to carry out the synchronous transfer, according to the determination result by the determining means, synchronous transfer and asynchronous transfer from among a plurality of transfer modes including, characterized by having a selection means for selecting a transfer mode when the data transfer with the transfer destination device.
本発明の情報処理方法は、シリアスバスを介して接続される複数の機器間で行われる情報の転送を制御する情報処理方法であって、特定の要求を前記シリアルバスに送信する送信ステップと、前記特定の要求に対応する応答に基づいて、同期転送を行うのに必要なサイクルマスタが前記シリアルバスにあるかどうかを判定する判定ステップと、前記サイクルマスタが前記シリアルバスにあると前記判定ステップで判定された場合に、複数の機器間のデータ転送に同期転送を選択し、前記サイクルマスタが前記シリアルバスにないと前記判定ステップで判定された場合に、複数の機器間のデータ転送に非同期転送を選択する制御ステップとを有することを特徴とする。 An information processing method of the present invention is an information processing method for controlling the transfer of information between a plurality of devices connected via a serial bus, a transmission step of transmitting a specific request to the serial bus, based on the response corresponding to the specific request, the determination step that the cycle master needed to perform synchronous transfer and whether determination step of determining in said serial bus, the cycle master is in the serial bus when in is determined by selecting the synchronous transfer to the data transfer between a plurality of devices, wherein when the cycle master is determined in the determination step not to the serial bus, the asynchronous data transfer between a plurality of devices and having a control step of selecting a transfer.
また、本発明の情報処理方法の他の特徴とするところは、シリアルバスに接続される情報処理装置を制御する情報処理方法であって、前記シリアルバスに、特定の要求を送信する送信ステップと、前記特定の要求に対応する前記シリアルバスにおけるバスマネージャからの応答に基づいて、同期転送を行うのに必要なサイクルマスタ機能があるかどうかを判定する判定ステップと、前記判定ステップによる判定結果に従って、同期転送及び非同期転送を含む複数の転送モードの中から、前記転送先の機器との間でデータ転送をする場合の転送モードを選択する選択ステップとを有することを特徴とする。 It is another feature of the information processing method of the present invention is an information processing method for controlling an information processing apparatus connected to a serial bus, said serial bus, a transmission step of transmitting a specific request , based on the response from the bus manager in the serial bus corresponding to the specific request, a determination step whether a cycle master functions necessary to carry out the synchronous transfer, according to the determination result by the determination step , from among a plurality of transfer modes including a synchronous transfer and asynchronous transfer, and having a selection step of selecting the transfer mode when the data transfer with the transfer destination device.
本発明の情報処理システムは、シリアスバスを介して接続される複数の機器間で行われる情報の転送を制御する情報処理システムであって、特定の要求を前記シリアルバスに送信する送信手段と、前記特定の要求に対応する応答に基づいて、同期転送を行うのに必要なサイクルマスタが前記シリアルバスにあるかどうかを判定する判定手段と、前記サイクルマスタが前記シリアルバスにあると前記判定手段により判定された場合に、複数の機器間のデータ転送に同期転送を選択し、前記サイクルマスタが前記シリアルバスにないと前記判定手段により判定された場合に、複数の機器間のデータ転送に非同期転送を選択する制御手段とを有することを特徴とする。 The information processing system of the present invention is an information processing system for controlling the transfer of information between a plurality of devices connected via a serial bus, and transmitting means for transmitting a specific request to the serial bus, based on the response corresponding to the specific request, and determination means for determining whether the cycle master needed to perform synchronous transfer in the serial bus, the determination means that there the cycle master on the serial bus when it is determined by, select synchronous transfer for data transfer between a plurality of devices, wherein when the cycle master is determined by the determining means that there is no the serial bus, the asynchronous data transfer between a plurality of devices and having a control means for selecting a transfer.
本発明は前記技術手段を有するので、サイクルマスタが存在する場合には同期転送が選択されてデータ転送が行われる。 Since the present invention has the technical means, a synchronous transfer is selected if the cycle master is present data transfer is performed. また、サイクルマスタが存在しない場合には非同期転送が選択されて非同期によるデータ転送が行われることにより、サイクルマスタ機能を持たない機器同士が接続されてもデータ転送を行うことを行うことができるようになる。 In addition, by the data transfer by the asynchronous it is made asynchronous transfer is selected and if there is no cycle master, so that it is possible to perform also is connected to between devices without a cycle master function transfers data become.
図1は、1394ネットワークの一例である。 Figure 1 is an example of a 1394 network. 各ノードは、ワークステーション1(コンピュータ)を中心に、ビデオカメラ2、レーザービームプリンタ3、スキャナ4、インクジェットプリンタ4で構成され、ノード間は1394シリアルバスのケーブル6で結ばれている。 Each node about the workstation 1 (computer), a video camera 2, a laser beam printer 3, a scanner 4, is constituted by an ink jet printer 4, between the nodes are connected by the 1394 serial bus cable 6. この例の場合、ワークステーション1からプリンタ3(5)、スキャナ4からワークステーション1、スキャナ4からプリンタ3(5)、ビデオカメラ2からワークステーション1、ビデオカメラ2からプリンタ3(5)等のデータ入出力が考えられる。 In this example, the printer from the workstation 1 3 (5), the scanner 4 workstation 1, the printer 3 from the scanner 4 (5), from the video camera 2 workstation 1, the video camera 2 printer 3 (5), such as data input and output is considered.
家庭用デジタルVTRやDVDの登場も伴って、ビデオデータやオーディオデータなどのリアルタイムでかつ高情報量のデータ転送のサポートが必要になっている。 The advent of home digital VTR and DVD be accompanied, it has become necessary real time and support of data transfer of high information content, such as video data and audio data. こういったビデオデータやオーディオデータをリアルタイムで転送し、パソコン(PC)に取り込んだり、またはその他のデジタル機器に転送を行うには、必要な転送機能を備えた高速データ転送可能なインタフェースが必要になってくるものであり、そういった観点から開発されたインタフェースがIEEE1394−1995(High Performance Serial Bus)(以下、1394シリアルバスとする)である。 Transfer the these video data and audio data in real time, or capture to a personal computer (PC), or to carry out the transfer of other digital devices, the need is high-speed data transfer can interface with the necessary transfer function are those made come, an interface that has been developed from such a viewpoint IEEE1394-1995 (High Performance serial bus) (hereinafter referred to as 1394 serial bus).
図2に、1394シリアルバスを用いて構成されるネットワーク・システムの例を示す。 Figure 2 shows an example of a network system constructed by using 1394 serial buses. このシステムは機器A,B,C,D,E,F,G,Hを備えており、A−B間、A−C間、B−D間、D−E間、C−F間、C−G間、及びC−H間をそれぞれ1394シリアルバスのツイスト・ペア・ケーブルで接続されている。 The system equipment A, B, includes C, D, E, F, G, and H, between A-B, between A-C, between B-D, between D-E, between C-F, C inter -G, and C-H between the are connected by a 1394 serial bus twisted pair cables respectively. この機器A〜Hは例としてPC、デジタルVTR、DVD、デジタルカメラ、ハードディスク、モニタ等である。 The device A~H the PC as an example, a digital VTR, DVD, digital camera, hard disk, a monitor or the like.
各機器間の接続方式は、ディジーチェーン方式とノード分岐方式とを混在可能としたものであり、自由度の高い接続が可能である。 Connection method between devices is one which enables mix and daisy chain system and a node branch method, it is possible to highly flexible connections.
また、各機器は各自固有のIDを有し、それぞれが認識し合うことによって1394シリアルバスで接続された範囲において、1つのネットワークを構成している。 Also, each device has its own unique ID, in the connection range with the 1394 serial bus by each mutually recognize constitute a single network.
各デジタル機器間をそれぞれ1本の1394シリアルバスケーブルで順次接続するだけで、それぞれの機器が中継の役割を行い、全体として1つのネットワークを構成するものである。 Only sequentially connects each digital devices in each one of the 1394 serial bus cable, in which each device performs the role of relay, constituting a single network as a whole. また、1394シリアルバスの特徴でもある、Plug&Play機能でケーブルを機器に接続した時点で自動で機器の認識や接続状況などを認識する機能を有している。 It is also a 1394 serial bus feature has the function of recognizing such recognition and connection status of the device automatically upon connecting the cable to the equipment Plug & Play function.
また、図2に示したようなシステムにおいて、ネットワークからある機器が削除されたり、または新たに追加されたときなど、自動的にバスリセットを行い、それまでのネットワーク構成をリセットしてから、新たなネットワークの再構築を行う。 Further, in the system as shown in FIG. 2, such as when a device from a network is added or removed, or new, from automatically performs bus reset, to reset the network configuration until then, new carry out the reconstruction of a network. この機能によって、その時々のネットワークの構成を常時設定、認識することができる。 This feature can be the moment of the network configuration always setting, recognize.
また、データ転送速度は、100/200/400Mbpsと備えており、上位の転送速度を持つ機器が下位の転送速度をサポートし、互換をとるようになっている。 The data transfer speed is provided with the 100/200 / 400Mbps, a device having a transfer rate of higher-order support lower transfer rate, so that the take-compatible.
データ転送モードとしては、コントロール信号などの非同期データ(Asynchronousデータ:以下Asyncデータ)を転送するAsynchronous転送モード、リアルタイムなビデオデータやオーディオデータ等の同期データ(Isochronousデータ:以下Isoデータ)を転送するIsochronous転送モードがある。 As data transfer modes, asynchronous data such as control signals (Asynchronous Data: less Async data) Asynchronous transfer mode for transferring real-time video data and audio data of synchronous data: Isochronous to transfer (Isochronous data Iso data hereinafter) there is a transfer mode. このAsyncデータとIsoデータは各サイクル(通常1サイクル125μS)の中において、サイクル開始を示すサイクル・スタート・パケット(CSP)の転送に続き、Isoデータの転送を優先しつつサイクル内で混在して転送される。 In Within this Async data and Iso data each cycle (usually one cycle 125 .mu.s), following the transfer of a cycle start packet indicating the cycle start (CSP), mixed in a cycle while giving priority to the transfer of Iso data It is transferred.
次に、図3に1394シリアルバスの構成要素を示す。 Next, FIG. 3 shows the components of the 1394 serial bus.
1394シリアルバスは全体としてレイヤ(階層)構造で構成されている。 1394 serial bus is composed of the layer (hierarchical) structure as a whole. 図3に示したように、最もハード的なのが1394シリアルバスのケーブルであり、そのケーブルのコネクタが接続されるコネクタポートがあり、その上にハードウェアとしてフィジカル・レイヤとリンク・レイヤがある。 As shown in FIG. 3, the most hardware the case for the 1394 serial bus cable, there is a connector port of the connector of the cable is connected, there is a physical layer and link layer hardware thereon.
ハードウェア部は実施的なインターフェイスチップの部分であり、そのうちフィジカル・レイヤは符号化やコネクタ関連の制御等を行い、リンク・レイヤはパケット転送やサイクルタイムの制御等を行う。 Hardware unit is a moiety of the Substantial interface chip, of which the physical layer performs coding and connector related control and the like, the link layer performs control of packet transfer and cycle time.
ファームウェア部のトランザクション・レイヤは、転送(トランザクション)すべきデータの管理を行い、ReadやWriteといった命令を出す。 Transaction layer of firmware unit performs the management of transfer (transaction) should do data, issues a command such as Read and Write. マネージメント・レイヤは、接続されている各機器の接続状況やIDの管理を行い、ネットワークの構成を管理する部分である。 Management Layer performs the connected management connection status and ID of each device is a part for managing the configuration of the network.
このハードウェアとファームウェアまでが実質上の1394シリアルバスの構成である。 Until the hardware and firmware are 1394 serial bus configuration substantially.
また、ソフトウェア部のアプリケーション・レイヤは使うソフトによって異なり、インタフェース上にどのようにデータをのせるか規定する部分であり、AVプロトコルなどのプロトコルによって規定されている。 Also, unlike the soft application layer used in the software section, a portion defining whether put how data on the interface is defined by a protocol such as an AV protocol.
以上が1394シリアルバスの構成である。 The above is the configuration of the 1394 serial bus.
次に、図4に1394シリアルバスにおけるアドレス空間の図を示す。 Next, FIG. 4 shows a diagram of the address space in the 1394 serial bus.
1394シリアルバスに接続された各機器(ノード)には必ず各ノード固有の、64ビットアドレスを持たせておく。 Always in the node-specific to each device connected to the 1394 serial bus (node), advance to have a 64-bit address. そしてこのアドレスをROMに格納しておくことで、自分や相手のノードアドレスを常時認識では、相手を指定した通信も行える。 And by storing this address in ROM, and in constantly recognize the node address of his or recipient, capable also communicate to the specified destination.
1394シリアルバスのアドレッシングは、IEEE1212規格に準じた方式であり、アドレス設定は、最初の10bitがバスの番号の指定用に、次の6bitがノードID番号の指定用に使われる。 1394 serial bus addressing is a scheme according to the IEEE1212 standard, address settings, for the designation of the first 10bit is the bus number, the next 6bit is used for the specified node ID number.
それぞれの機器内で使用できる48ビットのアドレスについても20ビットと28ビットに分けられ、256Mバイト単位の構造を持って利用される。 Also divided into 20 bits and 28 bits for 48-bit address that can be used within each device are utilized with the structure of the 256M bytes.
最初の20ビットの0〜0xFFFFDの部分はメモリ空間と呼ばれる。 Portion of 0~0xFFFFD the first 20 bits is called a memory space.
0xFFFFEの部分はプライベート空間と呼ばれ、機器内で自由に利用できるアドレスである。 Part of 0xFFFFE is referred to as a private space is an address freely available in the equipment.
0xFFFFFの部分はレジスタ空間と呼ばれ、バスに接続された機器間で共通な情報が置かれ、各機器間のコミュニケーションに使われる。 Portion of 0xFFFFF, called register space, common information between devices connected to the bus is placed, is used for communication between devices.
レジスタ空間の最初の512バイトには、CSRアーキテクチャのコアになるレジスタ(CSRコア)がある。 The first 512 bytes of the register space, there is a register (CSR core) comprising the core of the CSR architecture.
次の512バイトにはシリアルバスのレジスタがある。 In the next 512 bytes there is a serial bus register.
その次の1024バイトにはConfiguration ROMが置かれる。 That the next 1024 bytes Configuration ROM is placed. 残りはユニット空間で機器固有のレジスタがある。 Remainder have device-specific register unit space.
一般的には異種バスシステムの設計の簡略化のため、ノードは初期ユニット空間の最初の2048バイトだけを使うべきであり、この結果としてCSRアーキテクチャの核(CSRコア)、シリアルバスのレジスタ、Configurration ROMと、ユニット空間の最初の2048バイトの合わせて4096バイトで構成することが望ましい。 Because the general simplicity of design different bus systems, nodes should use only the first 2048 bytes of the initial unit space, nuclear (CSR core) of the CSR architecture as a result, the serial bus register, Configurration and ROM, it is desirable that the fit of the first 2048 bytes of the unit space consist of 4096 bytes.
以上が1394シリアルバスの技術の概要である。 The above is the outline of the 1394 serial bus technology.
次に、1394シリアルバスの特徴といえる技術の部分を、より詳細に説明する。 Next, a portion of the techniques can be said that characteristics of the 1394 serial bus will be described in more detail.
図5に1394シリアルバス・ケーブルの断面図を示す。 Figure 5 shows a cross-sectional view of a 1394 serial bus cable.
1394シリアルバスで接続ケーブル内に、2組のツイストペア信号線の他に、電源ラインを設けている。 In the connecting cable 1394 serial bus, in addition to the two pairs of twisted pair signal lines is provided with a power line. これによって、電源を持たない機器や、故障により電圧低下した機器等にも電力の供給が可能になっている。 Thus, and equipment having no power, which enables the supply of electric power to the voltage reduced equipment due to a fault.
電源線内を流れる電源の電圧は8〜40V、電流は最大電流DC1.5Aは規定されている。 Supply voltage flowing within the power supply line 8~40V, current maximum current DC1.5A is defined.
1394シリアルバスで採用されている、データ転送フォーマットのDS−Link符号化方式を説明するための図を図6に示す。 Adopted by the 1394 serial bus, a diagram for explaining a DS-Link coding method for data transfer format shown in FIG.
1394シリアルバスでは、DS−Link(Data/Strobe Link)符号化方式が採用されている。 The 1394 serial bus, DS-Link (Data / Strobe Link) coding method is employed. このDS−Link符号化方式は、高速なシリアルデータ通信に適しており、この構成は、2本の信号線を必要とする。 The DS-Link coding method is suitable for high-speed serial data communication, this arrangement requires two signal lines. より対線のうち1本に主となるデータを送り、他方のより対線にはストローブ信号を送る構成になっている。 Send data to the main more one of the twisted pair has a configuration to send a strobe signal to the other twisted pair.
受信側では、この通信されるデータと、ストローブとの排他的論理和をとることによってクロックを再現できる。 On the receiving side, the data to be the communication can be reproduced clock by taking the exclusive OR of the strobe.
このDS−Link符号化方式を用いるメリットとして、他のシリアルデータ転送方式に比べて転送効率が高いこと、PLL回路が不要となるのでコントローラLSIの回路規模を小さくできること、更には、転送すべきデータが無いときにアイドル状態であることを示す情報を送る必要が無いので、各機器のトランシーバ回路をスリープ状態にすることができることによって、消費電力の低減が図れる、などが挙げられる。 As advantages of using the DS-Link coding method, the higher transfer efficiency than other serial data transfer method, it is possible to reduce the circuit scale of a controller LSI because PLL circuit is not necessary, furthermore, the data to be transferred it is not necessary to send information indicating the idle state when there is no, by being able to the transceiver circuit of each device to sleep, reduction in power consumption can be reduced, and the like.
1394シリアルバスでは、接続されている各機器(ノード)にはノードIDが与えられ、ネットワーク構成として認識されている。 The 1394 serial bus, each device being connected (node) is given a node ID, which is recognized as a network configuration.
このネットワーク構成に変化があったとき、例えばノードの挿抜や電源のON/OFFなどによるノード数の増減などによって変化が生じて、新たなネットワーク構成を認識する必要があるとき、変化を検知した各ノードはバス上にバスリセット信号を送信して、新たなネットワーク構成を認識するモードに入る。 When there is a change in the network configuration, for example, it varies depending on the node insertion or power ON / OFF, etc. the number of nodes increases or decreases due to occur, it is necessary to recognize a new network construction, the detected change node sends a bus reset signal onto the bus, enter the recognized mode a new network configuration. このときの変化の検知方法は、1394ポート基盤上でのバイアス電圧の変化を検知することによって行われる。 Method of detecting a change in this case is performed by detecting a change in bias voltage on 1394 port basis.
あるノードからバスリセット信号が伝達されて、各ノードのフィジカルレイヤはこのバスリセット信号を受けると同時にリンクレイヤにバスリセットの発生を伝達し、かつ他のノードにバスリセット信号を伝達する。 And a bus reset signal from a certain node is transmitted, the physical layer of each node transmits a bus reset occurs at the same time the link layer receives this bus reset signal, and transmits a bus reset signal to another node. 最終的にすべてのノードがバスリセット信号を検知した後、バスリセットが起動となる。 When all the nodes have detected the bus reset signal, the bus reset is started.
バスリセットは、先に述べたようなケーブル抜挿や、ネットワーク異常等によるハード検出による起動と、プロトコルからのホスト制御などによってフィジカルレイヤに直接命令を出すことによっても起動する。 Bus reset, a cable 抜挿 and as previously described, the activation by the hard detecting by the network abnormality, also activated by issuing a direct instruction to the physical layer, such as by a host control from the protocol.
また、バスリセットが起動するとデータ転送は一時中断され、この間のデータ転送は待たされ、終了後、新しいネットワーク構成のもとで再開される。 Moreover, a bus reset is activated data transfer is suspended, during which the data transfer is kept waiting, after completion, it is resumed under the new network configuration.
以上がバスリセットのシーケンスである。 The above is a sequence of bus reset.
バスリセットの後、各ノードは新しいネットワーク構成を構築するために、各ノードにIDを与える動作に入る。 After the bus reset, since each node to build a new network configuration, put into operation to provide an ID to each node. このときの、バスリセットからノードID決定までの一般的なシーケンスを図7、図8、図9のフローチャートを用いて説明する。 In this case, 7 a general sequence from the bus reset to node ID determination, FIG. 8, will be described with reference to the flowchart of FIG.
図7のフローチャートは、バスリセットの発生からノードIDが決定し、データ転送が行えるようになるまでの、一連のバスの作業を示してある。 The flowchart of FIG. 7, the node ID from the occurrence of the bus reset are determined, until the allow data transfer, there is shown a working set of buses.
まず、ステップS101として、ネットワーク内にバスリセットが発生することを常時監視していて、ここでノードの電源ON/OFFなどでバスリセットが発生するとステップS102に移る。 First, in step S101, have constantly monitors that the bus reset in the network is generated, the procedure proceeds to step S102 when the bus reset occurs, etc. Here nodes of the power ON / OFF.
ステップS102では、ネットワークがリセットされた状態から、新たなネットワークの接続状況を知るために、直接接続されている各ノード間において親子関係の宣言がなされる。 In step S102, the state of the network is reset, in order to know the connection status of a new network, the declaration of parent-child relationships between nodes that are directly connected are made. ステップS103として、すべてのノード間で親子関係が決定すると、ステップS104として一つのルートが決定する。 As step S103, the parent-child relationships between all the nodes as determined, one root is decided in step S104. すべてのノード間で親子関係が決定するまで、ステップS102の親子関係の宣言を行い、またルートも決定されない。 Between all nodes to parent-child relationship is determined, to declare parent-child relation in step S102, also not be determined route.
ステップS104でルートが決定されると、次はステップS105として、各ノードにIDを与えるノードIDの設定作業が行われる。 When the route is determined in the step S104, next in step S105, setting operation of the node ID to be given an ID to each node is performed. 所定のノード順序で、ノードIDの設定が行われ、すべてのノードにIDが与えられるまで繰り返し設定作業が行われ、最終的にステップS106としてすべてのノードにIDを設定し終えたら、新しいネットワーク構成がすべてのノードにおいて認識されたので、ステップS107としてノード間のデータ転送が行える状態となり、データ転送が開始される。 In a predetermined node sequence, set the node ID is performed, repeatedly setting work until ID is given to all nodes is performed, finally After configuring the ID to all the nodes in step S106, the new network configuration since There was recognized in all of the nodes, a state capable of performing data transfer between the nodes in step S107, the data transfer is started.
このステップS107の状態になると、再びバスリセットが発生するのを監視するモードに入り、バスリセットが発生したらステップS101からステップS106までの設定作業が繰り返し行われる。 When a state of the step S107, re-enter the mode for monitoring the bus reset occurs, the setting operation from step S101 When the bus reset occurs until step S106 is repeated.
以上が、図7のフローチャートの説明であるが、図7のフローチャートのバスリセットからルート決定までの部分と、ルート決定後からID設定終了までの手順をより詳しくフローチャート図に表したものを、図8及び図9にそれぞれ示す。 Is is a description of the flowchart of FIG. 7, the portion to the root determined from the bus reset in the flow chart of FIG 7, those illustrated in the flow chart in more detail the procedure from post route determination to the ID setting completion, FIG least It is shown in 8 and 9.
まず、図8のフローチャートの説明を行う。 First, a description of the flowchart of FIG.
ステップS201としてバスリセットが発生すると、ネットワーク構成は一旦リセットされる。 When the bus reset occurs in step S201, the network configuration is once reset. なお、ステップS201としてバスリセットが発生するのを常に監視している。 Note that constantly monitors the bus reset occurs in step S201.
次に、ステップS202として、リセットされたネットワークの接続状況を再認識する作業の第一歩として、各機器にリーフ(ノード)であることを示すフラグを立てておく。 Next, in step S202, as a first step of the re-recognized work the connection status of the reset network, previously sets a flag indicating a leaf (node) to each device. 更に、ステップS203として各機器が自分の持つポートがいくつ他ノードと接続されているのかを調べる。 Furthermore, each device in step S203 it is checked whether the connected port having the he a number other nodes.
ステップS204のポート数の結果に応じて、これから親子関係の宣言を始めていくために、未定義(親子関係が決定させてない)ポートの数を調べる。 Depending on the number of ports of the step S204, in order to go from now start the declaration of parent-child relationship, (not a parent-child relationship is not allowed to determine) undefined determine the number of ports. バスリセットの直後はポート数=未定義ポート数であるが、親子関係が決定されていくにしたがって、ステップS204で検知する未定義ポートの数は変化していくものである。 Just after the bus reset is = number of undefined ports ports, according to the parent-child relationship will be determined, the number of undefined ports is detected in step S204 are those will change.
まず、バスリセットの直後、はじめに親子関係の宣言を行えるのはリーフに限られている。 First, immediately after the bus reset, to perform the declaration of the parent-child relationship in the beginning is limited to the leaf. リーフであるというのはステップS203のポート数の確認で知ることができる。 Because a leaf can be known by confirming the number of ports step S203. リーフは、ステップS205として、自分に接続されているノードに対して、「自分は子、相手は親」と宣言し動作を終了する。 Leaf, as a step S205, to the nodes that are connected to their own, "my child, partner parent" to end the declaration work with.
ステップS203でポート数が複数ありブランチと認識したノードは、バスリセットの直後はステップS204で未定義ポート数〉1ということなので、ステップS206へと移り、まずブランチというフラグが立てられ、ステップS207でリーフから親子関係宣言で「親」の受付をするために待つ。 Node ports recognizes the plurality there branch at step S203, since immediately after the bus reset, such that the number of undefined ports> 1 at step S204, proceeds to step S206, first flag that branch erected, at step S207 wait for the acceptance of the "parent" in the parent-child relationship declaration from the leaf.
リーフが親子関係の宣言を行い、ステップS207でそれを受けたブランチは適宜ステップS204の未定義ポート数の確認を行い、未定義ポート数が1になっていれば残っているポートに接続されているノードに対して、ステップS205の「自分が子」の宣言をすることが可能になる。 Leaf to declare parent-child relationships, branch confirms the number of undefined ports appropriate step S204 that received it in step S207, and is connected to the port number of undefined ports is still if set to 1 respect are the nodes, it is possible to the declaration of "I child" in step S205.
2度目以降、ステップS204で未定義ポート数を確認しても2以上あるブランチに対しては、再度ステップS207でリーフ又は他のブランチからの「親」の受付をするために待つ。 After the second time, for the branches that are two or more even to confirm the number of undefined ports at step S204, wait to the acceptance of the "parent" from the leaf or another branch in step S207 again.
最終的に、いずれか1つのブランチ、又は例外的にリーフ(子宣言を行えるのにすばやく動作しなかった為)がステップS204の未定義ポート数の結果としてゼロになったら、これにてネットワーク全体の親子関係の宣言が終了したものであり、未定義ポート数がゼロ(すべて親のポートとして決定)になった唯一のノードはステップS208としてルートのフラグが立てられ、ステップS209としてルートとしての認識がなされる。 Once Finally, one of the branches, or (because did not work quickly to perform a child declaration) exceptionally leaf becomes zero as a result of the number of undefined ports in step S204, the entire network in which are those parent-child relationship declaration of finished, only node number of undefined ports is zero (all determined as the parent port) route is flagged as step S208, recognized as the root in step S209 It is made.
このようにして、図8に示したバスリセットから、ネットワーク内すべてのノード間における親子関係の宣言までが終了する。 In this way, the bus reset as shown in FIG. 8, until the declaration of parent-child relationship between the network in all nodes is completed.
次に、図9のフローチャートについて説明する。 It will be explained next in FIG.
まず、図8までのシーケンスでリーフ、ブランチ、ルートという各ノードのフラグの情報が設定されているので、これを元にして、ステップS301でそれぞれ分類する。 First, the leaf of a sequence of up to 8, branch, since flag information for each node is set as the root, which based on a classified respectively in step S301.
各ノードにIDを与える作業として、最初にIDの設定を行うことができるのはリーフからである。 As a work giving an ID to each node, is the leaf of the first can set the ID. リーフ→ブランチ→ルートの順で若い番号(ノード番号=0〜)からIDの設定がなされていく。 Leaf → branch → root of the order in the young number (node number = 0) from the ID setting is going to be made.
ステップS302としてネットワーク内に存在するリーフの数N(Nは自然数)を設定する。 The number N of leaves present in the network as a step S302 (N is a natural number) is set. この後、ステップS303として各自リーフがルートに対して、IDを与えるように要求する。 Thereafter, the leaf is their relative route in step S303, the request to provide the ID. この要求が複数ある場合には、ルートはステップS304としてアービトレーション(1つに調停する作業)を行い、ステップS305として勝ったノード1つにID番号を与え、負けたノードには失敗の結果通知を行う。 If this request is more, the root performs arbitration (task to arbitrate one) Step S304, given the ID number to one node 1 won as step S305, the failure of the result notification to the losing node do.
ステップS306としてID取得が失敗に終わったリーフは、再度ID要求を出し、同様の作業を繰り返す。 Leaf ID acquired in step S306 has failed issues an ID request again to repeat the same operation. IDを取得できたリーフからステップS307として、そのノードのID情報をブロードキャストで全ノードに転送する。 Step S307 from the leaf was acquired ID, and transfers the ID information of the node to all nodes in the broadcast. 1ノードID情報のブロードキャストが終わると、ステップS308として残りのリーフの数が1つ減らされる。 When the broadcast of the first node ID information is completed, the number of remaining leaves is decremented by one in step S308. ここで、ステップS309として、この残りのリーフの数が1以上ある時はステップS303のID要求の作業からを繰り返し行い、最終的にすべてのリーフがID情報をブロードキャストすると、ステップS309がN=0となり、次はブランチのID設定に移る。 Here, as a step S309, performs repeat operations of ID request in step S303 when the number of remaining leaves is 1 or more, when finally all the leaves have broadcast the ID information, step S309 is N = 0 next, next moves to the ID setting of the branch.
ブランチのID設定もリーフの時と同様に行われる。 Branch of the ID setting is performed in the same manner as in the case of the leaf.
まず、ステップS310としてネットワーク内に存在するブランチの数M(Mは自然数)を設定する。 First, the number M of branches in the network as a step S310 (M is a natural number) is set. この後、ステップS311として各自ブランチがルートに対して、IDを与えるように要求する。 After this, branch each the root in step S311, and requests to provide ID. これに対してルートは、ステップS312としてアービトレーションを行い、勝ったブランチから順にリーフに与え終わった次の若い番号から与えいく。 Root performs the arbitration as a step S312, will give from young number from the winning branches of the following you have finished given to the leaf in order for this.
ステップS313として、ルートは要求を出したブランチにID情報又は失敗結果を通知し、ステップS314としてID取得が失敗に終わったブランチは、再度ID要求を出し、同様の作業を繰り返す。 Step S313, the root informs the ID information or failure result to the branch that issued the request, branch ID acquisition has failed as a step S314, the issues an ID request again to repeat the same operation. IDを取得できたブランチからステップS315として、そのノードのID情報をブロードキャストで全ノードに転送する。 Step S315 from the branch was acquired ID, and transfers the ID information of the node to all nodes in the broadcast. 1ノードID情報のブロードキャストが終わると、ステップS316として残りのブランチの数が1つ減らされる。 When the broadcast of the first node ID information is complete, the number of remaining branches is decremented by one in step S316.
ここで、ステップS317として、この残りのブランチの数が1以上ある時はステップS311のID要求の作業からを繰り返し、最終的にすべてのブランチがID情報をブロードキャストするまで行われる。 Here, as a step S317, the number of remaining branch Repeat operations ID request in step S311 when there one or more, ultimately all the branches is performed until the broadcast ID information. すべてのブランチがノードIDを取得すると、ステップS317はM=0となり、ブランチのID取得モードも終了する。 When all the branches acquire the node ID, step S317 is M = 0, and the even ID acquisition mode branch ends.
ここまで終了すると、最終的にID情報を取得していないノードはルートのみなので、ステップS318として与えない番号で最も若い番号を自分のID番号と設定し、ステップS319としてルートのID情報をブロードキャストする。 When finished so far, eventually node that does not obtain the ID information so routes such only sets the lowest number in numbers not provided as step S318 and its own ID number, and broadcasts the ID information of the root in step S319 .
以上で、図9に示したように、親子関係が決定した後から、すべてのノードのIDが設定されるまでの手順が終了する。 Above, as shown in FIG. 9, from after the parent-child relationship is determined, the procedure up to the ID of all the nodes are set is completed.
次に、一例として図10に示した実際のネットワークにおける動作を図12を参照しながら説明する。 Next, the operation in the actual network shown in FIG. 10 will be described with reference to FIG. 12 as an example.
図10の説明として、(ルート)ノードBの下位にはノードAとノードCが直接接続されており、更にノードCの下位にはノードDが直接接続されており、更にノードDの下位にはノードEとノードFが直接接続された階層構造になっている。 As described in FIG. 10, the lower (root) node B is connected the node A and the node C is directly is connected to the lower further node C node D directly, the subordinate further node D node E and the node F is in the directly connected hierarchy. この、階層構造やルートノード、ノードIDを決定する手順を以下で説明する。 This will be described hierarchical structure and the root node, a procedure for determining the node ID below.
バスリセットがされた後、まず各ノードの接続状況を認識するために、各ノードの直接接続されているポート間において、親子関係の宣言がなされる。 After the bus reset is, first to recognize the connection state of each node, between ports that are directly connected at each node, the declaration of parent-child relationship is made. この親子とは親側が階層構造で上位となり、子側が下位となると言うことができる。 This parent-child and parent side becomes higher in the hierarchy, the child side can be said to be lower.
図10では、バスリセットの後、最初に親子関係の宣言を行ったのはノードAである。 In Figure 10, after the bus reset, it went declaration of first parent-child relationship is a node A. 基本的にノードの1つのポートにのみ接続があるノード(リーフと呼ぶ)から親子関係の宣言を行うことができる。 It is possible to perform the declaration of parent-child relation from there is essentially connected to only one port of the node node (called a leaf).
これは自分には1ポートの接続のみということをまず知ることができるので、これによってネットワークの端であることを認識し、その中で早く動作を行ったノードから親子関係が決定されていく。 Since this can know first that only the connection of one port to you, thereby recognizing that it is the end of the network, the parent-child relationship will be determined from the node performing the operation faster therein. こうして親子関係の宣言を行った側(A−B間ではノードA)のポートが子と設定され、相手側(ノードB)のポートが親と設定される。 Thus set the port child of (node A between A-B) side was declaration of parent-child relationship, the port of the mating (Node B) is set as a parent. こうして、ノードA−B間では子−親、ノードE−D間で子−親、ノードF−D間で子−親と決定される。 Thus, in between the nodes A-B child - parent, child between nodes E-D - parent, child between nodes F-D - is determined as the parent.
更に1階層あがって、今度は複数個接続ポートを持つノード(ブランチと呼ぶ)のうち、他ノードからの親子関係の宣言を受けたものから順次、更に上位に親子関係の宣言を行っていく。 Further up one level, this time among nodes (referred to as branch) having a plurality connection port, sequentially from those that received the declaration of parent-child relation from another node, intended to make the declaration of parent-child relationships further higher. 図10ではまずノードDがD−E間、D−F間と親子関係が決定した後、ノードCに対する親子関係の宣言を行っており、その結果ノードD−C間で子−親と決定している。 Between the 10 first node D D-E, after determining the parent-child relationship and between D-F, and to declare parent-child relationship to node C, the result node D-C between a child - to determine the parent ing.
ノードDから親子関係の宣言を受けたノードCは、もう一つのポートに接続されているノードBに対して親子関係の宣言を行っている。 Node C which has received the declaration of parent-child relation from the node D has to declare the parent-child relationship to node B, which is connected to another port. これによってノードC−B間で子−親と決定している。 This child between nodes C-B - are determined with the parent.
このようにして、図10のような階層構造が構成され、最終的に接続されているすべてのポートにおいて親となったノードBが、ルートノードと決定された。 In this manner, the hierarchical structure as shown in FIG. 10 is configured, in all ports that are ultimately connected to a node B which has become parent, is determined as the root node. ルートは1つのネットワーク構成中に一つしか存在しないものである。 Routes are those that do not only one present in the structure one network.
なお、この図10においてノードBがルートノードと決定されたが、これはノードAから親子関係宣言を受けたノードBが、他のノードに対して親子関係宣言を早いタイミングで行っていれば、ルートノードは他ノードに移っていたこともあり得る。 Although Node B in FIG. 10 is determined to be the root node, which is node B that received the parent-child relationship declaration from node A, if performed at an earlier timing a parent-child relationship declaration to the other node, the root node may also be had moved to another node. すなわち、伝達されるタイミングによってはどのノードもルートノードとなる可能性があり、同じネットワーク構成でもルートノードは一定とは限らない。 That is, there can be a any node the root node depending on the timing to be transmitted, the root node even in the same network configuration is not necessarily constant.
ルートノードが決定すると、次は各ノードIDを決定するモードに入る。 When the root node is determined, next enters a mode of determining each node ID. ここではすべてのノードが、決定した自分のノードIDを他のすべてのノードに通知する(プロードキャスト機能)。 Here, all the nodes, to notify the determined its own node ID to all other nodes (up load cast function).
自己ID情報は、自分のノード番号、接続されている位置の情報、持っているポートの数、接続のあるポートの数、各ポートの親子関係の情報等を含んでいる。 Self ID information includes own node number, information of the position to which it is connected, the number of ports that have, the number of ports that are connected, the information of the parent-child relationship of each port.
ノードID番号の割り振りの手順としては、まず1つのポートにのみ接続があるノード(リーフ)から起動することができ、この中から順にノード番号=0、1、2、、と割り当てられる。 The procedure of allocation of the node ID numbers can be started from there is first connected to only one port nodes (leaves) assigned from the node number = 0, 1, 2 ,, in order.
ノードIDを手にしたノードは、ノード番号を含む情報をブロードキャストで各ノードに送信する。 Nodes in hand node ID transmits the information including the node number to each node by broadcasting. これによって、そのID番号は『割り当て済み』であることが認識される。 Thus, the ID number is recognized to be "assigned".
すべてのリーフが自己ノードIDを取得し終わると、次はブランチへ移りリーフに引き続いたノードID番号が各ノードに割り当てられる。 All leaves the finishes acquiring the self node ID, following the node ID numbers subsequent to the leaf moves to the branch is allocated to each node. リーフと同様に、ノードID番号が割り当てられたブランチから順次ノードID情報をブロードキャストし、最後にルートノードが自己ID情報をブロードキャストする。 As with the leaves, broadcast sequentially node ID information from the branch node ID number is assigned, the last root node broadcasts self-ID information. すなわち、常にルートは最大のノードID番号を所有するものである。 That is always the root is to own the largest node ID number.
以上のようにして、階層構造全体のノードIDの割り当てが終わり、ネットワーク構成が再構築され、バスの初期化作業が完了する。 As described above, the end is assigned a node ID of the overall hierarchical structure, the network configuration is reconstructed, the initialization operations of the bus is completed.
《ノード管理のための制御情報》 "Control information for the node management"
ノード管理のためのCSRアーキテクチャの基本的な機能として、図4に示したCSRコアがレジスタ上に存在する。 As a basic function of the CSR architecture for node management, CSR core as shown in FIG. 4 is present on the register.
それらのレジスタの位置と機能を図11に示すが、図中のオフセットは0xFFFFF0000000からの相対位置である。 The positions and functions of the registers are shown in FIG. 11, the offset in the figure are relative to the 0XFFFFF0000000.
CSRアーキテクチャでは、0xFFFFF0000200からシリアルバスに関するレジスタが配置されていて、それらのレジスタの位置と機能を図12に示す。 In the CSR architecture, it is disposed a register serial bus related from 0XFFFFF0000200, shown in Figure 12 the positions and functions of the registers.
また、0xFFFFF0000800から始まる場所には、シリアルバスのノード資源に関する情報が配置されていて、それらのレジスタの位置と機能を図13に示す。 Also, the location starting at 0XFFFFF0000800, be arranged information about the node resources of the serial bus, indicating the positions and functions of the registers in FIG. 13.
CSRアーキテクチャでは、各ノードの機能を表すためConfiguration ROMを持っているが、このROMには最小形式と一般形式があり、xFFFFF0000400から配置される。 In the CSR architecture, but has the Configuration ROM for representing functions of the respective nodes, this ROM has a minimum format and a general format, are arranged from XFFFFF0000400.
最小形式では、図14のようにベンダIDを表しているだけであり、このIDは24ビットで表される全世界で固有の数値である。 The minimum format is only represent vendor ID as shown in Figure 14, the ID is the unique number worldwide represented by 24 bits.
一般形式では、図15のような形式でノードに関する情報を持っているが、この場合のベンダIDはroot_directoryに持つことができる。 In general form, but have information about the node in the format shown in FIG. 15, the vendor ID in this case you can have the root_directory.
また、bus_info_blockとroot_leafには、ベンダIDを含んだ64ビットの全世界で固有な装置番号を持っている。 In addition, the bus_info_block and root_leaf is, has a unique device number in the whole world of 64-bit, including the vendor ID.
この装置番号は、バスリセットなどの再構成後に継続してノードを認識するために使用する。 The device number is used to recognize the node to continue after reconstitution such as a bus reset.
IEEE1394バスのプロトコルは、図3に示すようにフィジカルレイヤ、リンクレイヤ、トランザクションレイヤから構成されている。 IEEE1394 bus protocols, the physical layer as shown in FIG. 3, the link layer, and a transaction layer.
この中でのバス管理は、CSRアーキテクチャに基づいたノードの制御とバス資源管理の為の基本的な機能を提供している。 Bus management in this provides a basic function for control and bus resource management node based on the CSR architecture.
バス管理を行うノードはバス上で唯一存在して動作するもので、このバス管理ノードはシリアルバス上の他のノードに管理可能を提供するが、この管理機能にはサイクルマスタの制御や、性能の最適化、電源管理、伝送速度管理、構成管理などがある。 Node that performs bus management intended to operate only present on the bus, but the bus management node to provide manageable to other nodes on the serial bus, control of the cycle master to the management function, performance optimization, power management, transmission speed management, and the like configuration management.
バス管理機能は大きく分けて、バスマネージャ、アイソクロノスリソースマネージャと、ノード制御の三つの機能から構成される。 Bus management functions are roughly divided into a bus manager configured isochronous resource manager, the three functions of node control.
はじめにノード制御とは、CSRによってフィジカルレイヤ、リンクレイヤ、トランザクションレイヤ、アプリケーションでのノード間通信を可能にする管理機能である。 The First node control is a physical layer, link layer, the transaction layer, management functions that enable communication between nodes in the application by the CSR.
次に、アイソクロノスリソースマネージャとは、シリアルバス上で同期型のデータ転送を行うために必要となる管理機能で、アイソクロノスデータの転送帯域幅とチャネル番号の割り付けを管理するものである。 Next, the isochronous resource manager, the management function required for performing synchronous data transfer on the serial bus, manages the allocation of transmission bandwidth and a channel number of the isochronous data. この管理を行うノードはバス上に唯一存在するもので、バスの初期化フェーズ後にアイソクロノスリソースマネージャ機能を持ったノードの中から動的に選出される。 The management node to perform intended to only present on the bus, is dynamically selected from nodes having the isochronous resource manager function after the bus initialization phase.
また、このノードはバスマネージャノードの決定を行うものでもあるが、バス上にバスマネージャのノードが存在しない構成では、電源管理やサイクルマスタの制御のようなバスマネージャの一部の機能をアイソクロノスリソースマネージャノードが行う。 Although this node is also intended the determination of the bus manager node, in the configuration in which the nodes of the bus manager on the bus does not exist, the isochronous part of the functions of the bus manager, such as control of the power management and cycle master resource manager node performs.
更にバスマネージャとは、アプリケーションに対するバス制御のインターフェイスを提供するサービスを行う管理機能であり、その制御インターフェイスにはシリアルバス制御要求(SB_CONTROL.request)、シリアルバス・イベント制御確認(SB_CONTROL.confirmation)、シリアルバス・イベント通知(SB_EVENT.indication)がある。 Furthermore the bus manager, a management function of performing a service for providing a bus control interface to an application, in its control interface serial bus control request (SB_CONTROL.request), serial bus event control confirmation (SB_CONTROL.confirmation), there is a serial bus event notification (SB_EVENT.indication).
SB_CONTROL. SB_CONTROL. requestは、バスのリセット、バスの初期化、バスの状態情報などをアプリケーションからバス管理に要求する場合に利用するものであり、図27において、SB_CONTROL. request the bus reset, bus initialization, which uses when requesting the like from the application to the bus management status information of the bus, in FIG. 27, SB_CONTROL. reqで示される。 It indicated by req.
SB_CONTROL. SB_CONTROL. confirmationは、SB_CONTROL. confirmation is, SB_CONTROL. requestの結果は、バスマネージャからアプリケーションに確認通知するものであり、図27において、SB_CONTROL. The results of the request is for acknowledgment from the bus manager to the application, in FIG. 27, SB_CONTROL. confで示される。 Indicated by conf.
SB_EVENT. SB_EVENT. indicationは、バスマネージャからアプリケーションに対して非同期に発生するイベントを通知する為のものであり、図27において、SB_EVENT. indication is intended to notify the events that occur asynchronously to the application from the bus manager, in FIG. 27, SB_EVENT. indで示される。 Represented by the ind.
IEEE1394でのデータ転送は、周期的に送信する必要のある同期データ(アイソクロナス・パケット)と、任意のタイミングでのデータ送受信が許容される非同期データ(アシンクロナス・パケット)とが同時に存在し、なおかつ同期転送データのリアルタイム性を保証している。 Data transfer in the IEEE1394 is provided with a synchronous data needs to be sent periodically (isochronous packet), and asynchronous data (asynchronous packet) which transmit and receive data at any time is allowed to exist simultaneously, yet synchronized It guarantees the real-time transfer data.
データ転送では、転送に先立ってバス使用権を要求し使用承諾件を得るために、バス・アービトレーションを行う。 In the data transfer, in order to obtain the consent matter use to request a bus use right prior to the transfer, it performs bus arbitration.
アシンクロナス転送においては、送信ノードIDと受信ノードIDが転送データと一緒にパケット・データとして送られるが、受信ノードは自分のIDを確認してパケットを受け取るとアクノリッジ信号を送信ノードに返すことで、一つのトランザクショが完了する。 In asynchronous transfer, the reception node ID and the transmission node ID are sent as the packet data with the transfer data, the receiving node by returning to the sending node an acknowledge signal upon receiving a packet to check their ID, one of the transaction is completed.
アイソクロナス転送においては、送信ノード側で伝送速度と一緒にアイソクロノス・チャネルを要求し、チャネルIDが転送データと一緒にパケットデータとして送られ、受信ノード側では自分が欲しいチャネルIDを確認してデータパケットを受け取る。 In isochronous transfer, requests the isochronous channel with a transmission rate at the transmission node side, the channel ID is sent with transfer data as packet data, the receiving node side checks the they want channel ID data receive the packet.
必要となるチャネル数と伝送速度はアプリケーションレイヤで決定される。 Transmission speed and number of channels required is determined by the application layer.
これらのデータ転送プロトコルは、フィジカルレイヤ、リンクレイヤ、トランザクションレイヤの三つのレイヤによって定義される。 These data transfer protocol is defined by the physical layer, link layer, three layers of the transaction layer.
フィジカルレイヤは、バスとの物理的・電気的インターフェイスや、ノード接続の自動認識、バス上のノード間のバス使用権(バス・アービトレーション)などを行う。 Physical layer performs and physical and electrical interface with the bus, automatic recognition of node connection, bus use right among nodes on the bus, etc. (bus arbitration).
リンクレイヤは、アドレッシング、データチェック、パケット送受信、そしてアイソクロナス転送の為のサイクル制御を行う。 Link layer performs addressing, data checking, packet transmission and reception, and the cycle control for isochronous transfer.
トランザクションレイヤは、アシンクロナス・データに関する処理を行う。 The transaction layer performs the processing relating to asynchronous data.
以下に各レイヤにおける処理について説明する。 Hereinafter, the processing in each layer will be described.
フィジカルレイヤにおける、バス・アービトレーションを説明するための図として図16にバス使用要求、図17にバス使用許可の図を示し、以下これを用いて説明する。 In physical layer, bus arbitration bus request 16 as a diagram for explaining a shows a view of the bus grant 17 will be described with reference to this following.
アービトレーションが始まると、1つもしくは複数のノードが親ノードに向かって、それぞれバス使用権の要求を発する。 When arbitration starts, one or more nodes towards the parent nodes, respectively issues a request for bus access. 図16のノードCとノードFがバス使用権の要求を発しているノードである。 Nodes C and F in FIG. 16 is a node that the requesting bus access. これを受けた親ノード(図16ではノードA)は更に親ノードに向かって、バス使用権の要求を発する(中継する)。 The parent node having received the (in FIG. 16 node A) is further toward the parent node issues a request for bus access (relays). この要求は最終的に調停を行うルートに届けられる。 This request is delivered to the root to perform the final arbitration.
バス使用要求を受けたルートノードは、どのノードにバスを使用させるかを決める。 The root node having received the bus use request, determines whether to use the bus to which the node. この調停作業はルートノードのみが行えるものであり、調停によって勝ったノードにはバスの使用許可を与える。 The arbitration work are those that can be performed only root node, to the winning node by arbitration gives permission to use the bus.
図17では、ノードCに使用許可が与えられ、ノードFの使用は拒否された図である。 In Figure 17, given the use permission to the node C, which is a diagram used rejected node F. アービトレーションに負けたノードに対してはDP(data prefix)パケットを送り、拒否されたことを知らせる。 Sends a DP (data prefix) packet to nodes that lost the arbitration, it notifies that it has been rejected. 拒否されたノードのバス使用要求は次回のアービトレーションまで待たされる。 Bus use request of the denied node is to wait until the next arbitration.
以上のようにして、アービトレーションに勝ってバスの使用許可を得たノードは、以降データの転送を開始できる。 As described above, the node to obtain permission to use the bus wins the arbitration, can start data transfer thereafter.
ここで、アービトレーションの一連の流れをフローチャート図18に示して、説明する。 Here, it indicates the sequential flow of arbitration in flowchart 18 will be described.
ノードがデータ転送を開始できる為には、バスがアイドル状態であることが必要である。 Node to be able to initiate data transfer, it is necessary that the bus is idle. 先に行われていたデータ転送が終了して、現在バスが空き状態であることを認識するためには、各転送モードで個別に設定されている所定のアイドル時間ギャップ長(例.サブアクション・ギャップ)を経過する事によって、各ノードは自分の転送が開始できると判断する。 And previously performed have data transfer is completed, in order to recognize that the current bus is idle for a predetermined idle time gap length is set individually for each transfer mode (eg. Subaction by the expiration of gap), each node determines that your transfer can be started.
ステップS401として、Asyncデータ、Isoデータ等それぞれ転送するデータに応じた所定のギャップ長が得られたか判断する。 Step S401, Async data, it is determined whether a predetermined gap length corresponding to data to be transferred respectively Iso data, etc. are obtained. 所定のギャップ長が得られない限り、転送を開始するために必要なバス使用権の要求はできないので、所定のギャップ長が得られるまで待つ。 As long as the predetermined gap length is not obtained, since the bus access request can not necessary to start the transfer, wait until the predetermined gap length is obtained.
ステップS401で所定のギャップ長が得られたら、ステップS402として転送すべきデータがあるか判断し、ある場合はステップS403として転送するためにバスを確保するよう、バス使用権の要求をルートに対して発する。 When the predetermined gap length is obtained in step S401, it is determined whether there is data to be transferred in step S402, so as to secure the bus in order to transfer as step S403 if there, to route the request for bus use right emitted by. このときの、バス使用権の要求を表す信号の伝達は、図16、図17に示したように、ネットワーク内各機器を中継しながら、最終的にルートに届けられる。 In this case, transmission of a signal representative of a request for bus use right, as shown in FIG. 16, FIG. 17, while relaying the respective devices in the network, and finally delivered to the root. ステップS402で転送するデータがない場合は、そのまま待機する。 If there is no data to be transferred in step S402, it waits as it is.
次に、ステップS404として、ステップ403のバス使用要求を1つ以上ルートが受信したら、ルートはステップS405として使用要求を出したノードの数を調べる。 Next, in step S404, When the bus use request at step 403 one or more routes received route examines the number of nodes that issued the use request in step S405. ステップS405での選択値がノード数=1(使用権要求を出したノードは1つ)だったら、そのノードに直後のバス使用許可が与えられることとなる。 You were selected value is the number of nodes = 1 (the node that issued the access request is one) at step S405, and thus be given the bus use permission immediately after the node.
ステップS405での選択値がノード数〉1(使用要求を出したノードは複数)だったら、ルートはステップS406として使用許可を与えるノードを1つに決定する調停作業を行う。 Selection value number of nodes> 1 at step S405 (the node that issued the use request s) you were, root performs arbitration operations to determine the node which gives permission to use in step S406 into one. この調停作業は公平なものであり、毎回同じノードばかりが許可を得る様なことはなく、平等に権利を与えていくような構成となっている。 The arbitration work are merely fair, never like just the same node every time obtain permission, it has become such as go entitled equally configuration.
ステップS407として、ステップS406で使用要求を出した複数ノードの中からルートが調停して使用許可を得た1つのノードと、敗れたその他のノードに分ける選択を行う。 Step S407, it performs the one node route to obtain permission to use arbitrates among the plurality of nodes that issued the use request at step S406, the selection divided into defeated other nodes. ここで、調停されて使用許可を得た1つのノード、またはステップS405の選択値から使用要求ノード数=1で調停無しに使用許可を得たノードには、ステップS408として、ルートはそのノードに対して許可信号を送る。 Wherein one node to obtain permission to use is arbitrated or node to obtain permission to use without mediation by use request node number = 1 from the selection value in step S405, as the step S408, the route to the node send an authorization signal for.
許可信号を得たノードは、受け取った直後に転送すべきデータ(パケット)を転送開始する。 Nodes permission signal, the data to be transferred (packet) starts forwarding immediately after receiving. また、ステップS406の調停で敗れて、バス使用が許可されなかったノードにはステップS409としてルートから、アービトレーション失敗を示すDP(data prefix)パケットを送られ、これを受け取ったノードは再度転送を行うためのバス使用要求を出すため、ステップS401まで戻り、所定ギャップ長が得られるまで待機する。 Further, losing the arbitration of step S406, the root in step S409 the node bus is not permitted, sent a DP (data prefix) packet indicating an arbitration failure, it performs again forwarded node having received this to issue a bus use request for, it returns to step S401, and waits until the predetermined gap length is obtained.
以上がアービトレーションの流れを説明した、フローチャート図18の説明である。 Above it has been described the flow of the arbitration, a description of flowchart 18.
トランザクションの種類には、リード・トランザクション、ライト・トランザクション、ロック・トランザクションの3種類がある。 The types of transaction, there is a read transaction, write transaction, three types of lock transactions.
リード・トランザクションでは、イニシエータ(要求ノード)がターゲット(応答ノード)の特定アドレスのメモリのデータを読み取る。 The read transaction, an initiator (requesting node) reads data in the memory at a specific address of the target (response node).
ライト・トランザクションでは、イニシエータがターゲットの特定アドレスのメモリにデータを書き込む。 In a write transaction, the initiator writes data into a memory of a specific address of the target.
ロック・トランザクションでは、イニシエータからターゲットに参照データと更新データを転送し、その参照データとターゲットのアドレスのデータを組み合わせて処理を行い、ターゲットの指定されたアドレスのデータを更新する。 The lock transaction, and transfers reference data and update data from the initiator to the target, it performs processing by combining the data of the address of the reference data and the target, and updates the data in the specified address of the target.
図19は、トランザクションレイヤにおけるCSRアーキテクチャに基づいた、読み出し(リード)、書き込み(ライト)、ロックの各コマンドの要求・応答プロトコルについて示したもので、図に示した要求・通知・応答・確認はトランザクションレイヤでのサービス単位になっている。 Figure 19 is based on the CSR architecture in the transaction layer, read (read), which was shown for writing (write), the lock request-response protocol for each command, request and notification, response and confirmation shown in FIG. It has become the service units in the transaction layer.
トランザクション要求(TR_DATA.request)は、応答ノードに対するパケットの転送、トランザクション通知(TR_DATA.indication)は応答ノードに要求が届いたことの通知、トランザクション応答(TR_DATA.response)はアクノリッジの送信、トランザクション確認(TR_DATA.confirmation)はアクノリッジの受信である。 Transaction request (TR_DATA.Request), the transfer of the packet to the responding node, transaction notification (TR_DATA.Indication) notification of that arrived request responding node, transaction response (TR_DATA.Response) is the acknowledge sending a transaction confirmation ( TR_DATA.confirmation) is the received acknowledge.
図20は、リンクレイヤにおけるサービスを示した図で、応答ノードに対するパケットの転送を要求するリンク要求(LK_DATA.request)、応答ノードにパケット受信を通知するリンク通知(LK_DATA.indication)、応答ノードからのアクノリッジ送信のリンク応答(LK_DATA.response)、要求ノードのアクノリッジ送信のリンク確認(LK_DATA.confirmation)のサービス単位に分けられる。 Figure 20 is a diagram showing a service in the link layer, the link to request the transfer of packets to the response node request (LK_DATA.request), link notification to notify the packet reception to the response node (LK_DATA.indication), from the response node acknowledge transmission link response (LK_DATA.response), it is divided into service units link confirmation of acknowledgment transmission (LK_DATA.confirmation) of the requesting node.
一つのパケット転送プロセスはサブアクションと呼ばれ、アシンクロナス・サブアクションとアイソクロナス・サブアクションの2つの種類がある。 One packet transfer process is called sub-action, there are two types of asynchronous sub-action and an isochronous sub-action.
各サブアクションの動作について、以下に説明する。 The operation of each sub-actions will be described below.
アシンクロナス・サブアクションは、非同期データ転送である。 Asynchronous sub-action is an asynchronous data transfer. 図21にアシンクロナス転送における時間的な遷移状態を示す。 Figure 21 shows a temporal transition state in the asynchronous transfer. 図21の最初のサブアクション・ギャップは、バスのアイドル状態を示すものである。 The first subaction gap in Fig. 21 shows the idle state of the bus. このアイドル時間が一定値になった時点で、転送を希望するノードはバスが使用できると判断して、バス獲得のためのアービトレーションを実行する。 When this idle time reaches a predetermined value, a node wishing to transfer judges that the bus can be used to perform the arbitration for bus acquisition.
アービトレーションでバスの使用許可を得ると、次にデータの転送がパケット形式で実行される。 Upon obtaining permission to use the bus arbitration, then the data transfer is performed in a packet format. データ転送後、受信したノードは転送されたデータに対しての受信結果のack(受信確認用返送コード)をack gapという短いギャップの後、返送して応答するか、応答パケットを送ることによって転送が完了する。 After data transfer, the received node after a short gap called ack gap a reception result ack (reception confirmation return code) with respect to the transferred data, or to respond by returning the transfer by sending a response packet There is completed. ackは4ビットの情報と4ビットのチェックサムからなり、成功か、ビジー状態か、ペンディング状態であるかといった情報を含み、すぐに送信元にノードに返送される。 ack consists of 4-bit information and 4-bit checksum, or success, busy or includes information such as whether a pending state, and is sent back to the node to the sender immediately.
次に、図22にアシンクロナス転送のパケットフォーマットの例を示す。 Next, an example of a packet format of the asynchronous transmission is shown in Figure 22.
パケットには、データ部及び誤り訂正用のデータCRCの他にはヘッダ部があり、そのヘッダ部には図22に示したような、目的ノードID、ソースノードID、転送データ長さや各種コードなどが書き込まれ、転送が行われる。 The packet, in addition to the data and a data CRC for error correction is a header section, its header portion as shown in FIG. 22, a destination node ID, source node ID, transfer data length and various codes such as is written, the transfer is performed.
また、アシンクロナス転送は自己ノードから相手ノードへの1対1の通信である。 Further, the asynchronous transfer is one-to-one communication from a self node to the destination node. 転送元ノードから転送されたパケットは、ネットワーク中の各ノードに行き渡るが、自分宛てのアドレス以外のものは無視されるので、宛先の1つのノードのみが読込むことになる。 Packet transferred from the source node is spread to each node in the network, since it is ignored other than the address of the destined, only one node of the destination is read.
以上がアシンクロナス転送の説明である。 The above is the description of asynchronous transfer.
アイソクロナス・サブアクションは同期データ転送である。 Isochronous sub-action is a synchronous data transfer. 1394シリアルバスの最大の特徴であるともいえるこのアイソクロナス転送は、特にVIDEO映像データや音声データといったマルチメディアデータなど、リアルタイムな転送を必要とするデータの転送に適した転送モードである。 The isochronous transfer is also said to be the greatest feature of the 1394 serial bus, such as in particular multimedia data such as VIDEO video data and audio data, it is a transfer mode suitable for transfer of data requiring real-time transfer.
また、アシンクロナス転送(非同期)が1対1の転送であったのに対し、このアイソクロナス転送はブロードキャスト機能によって、転送元の1つのノードから他のすべてのノードへ一様に転送される。 Further, asynchronous transfer (asynchronous) whereas was one-to-one transfer, the isochronous transfer broadcast function is uniformly transferred from one node of the transfer source to all other nodes.
図23は、アイソクロナス転送における時間的な遷移状態を示す図である。 Figure 23 is a diagram showing the temporal transition state in the isochronous transfer.
アイソクロナス転送は、バス上一定時間毎に実行される。 Isochronous transfer is executed on every predetermined time bus. この時間間隔をアイソクロナスサイクルと呼ぶ。 This time interval is referred to as isochronous cycle. アイソクロナスサイクル時間は、125μSである。 Isochronous cycle time is 125μS. この各サイクルの開始時間を示し、各ノードの時間調整を行う役割を担っているのがサイクル・スタート・パケットである。 It indicates the start time of each cycle, a cycle start packet that has a role of performing time adjustment for each node.
サイクル・スタート・パケットを送信するのは、サイクル・マスタと呼ばれるノードであり、1つ前のサイクル内の転送終了後、所定のアイドル期間(サブアクションギャップ)を経た後、本サイクルの開始を告げるサイクル・スタート・パケットを送信する。 Sending cycle start packet is a node called cycle master, after completion transfer in the previous cycle, after a predetermined idle period (subaction gap), mark the start of the cycle to send a cycle start packet. このサイクル・スタート・パケットの送信される時間間隔が125μSとなる。 Submit The time interval of the cycle-start packet is 125 .mu.s.
また、図23にチャネルA、チャネルB、チャネルCと示したように、1サイクル内において複数種のパケットがチャネルIDをそれぞれ与えられることによって、区別して転送できる。 Further, as shown in FIG. 23 channel A, channel B, a channel C, by a plurality of types of packets are given a channel ID, respectively in one cycle, can be transferred to distinguish. これによって同時に複数ノード間でのリアルタイムな転送が可能であり、また、受信するノードでは自分が欲しいチャネルIDのデータのみを取り込む。 This is possible real-time transfer between multiple nodes simultaneously and captures only data they want channel ID is a node that receives. このチャネルIDは送信先のアドレスを表すものではなく、データに対する論理的な番号を与えているに過ぎない。 The channel ID does not represent the address of the destination, only giving a logical number to data. よって、あるパケットの送信は1つの送信元ノードから他のすべてのノードに行き渡る、ブロードキャストで転送されることになる。 Therefore, the transmission of a packet is spread from one source node to all other nodes will be transferred in the broadcast.
アイソクロナス転送のパケット送信に先立って、アシンクロナス転送同様アービトレーションが行われる。 Prior to the packet transmission of isochronous transfer, asynchronous transfer similar arbitration is performed. しかし、アシンクロナス転送のように1対1の通信ではないので、アイソクロナス転送にはack(受信確認用返信コード)は存在しない。 However, because it is not a one-to-one communication like the asynchronous transfer, the isochronous transfer ack (acknowledgment reply code) is absent.
また、図23に示したios gap(アイソクロナスギャップ)とは、アイソクロナス転送を行う前にバスが空き状態であると確認するために必要なアイドル期間を表している。 Further, the ios gap (isochronous gap) shown in FIG. 23, the bus represents the idle period necessary for confirming that the idle state prior to performing isochronous transfer. この所定のアイドル期間を経過すると、アイソクロナス転送を行いたいノードはバスが空いていると判断し、転送前のアービトレーションを行うことができる。 After a lapse of the predetermined idle period, the node wants to isochronous transfer determines that the vacant bus can perform arbitration before transfer.
次に、図24にアイソクロナス転送のパケットフォーマットの例を示し、説明する。 Next, an example of a packet format of isochronous transfer in FIG. 24 will be described.
各チャネルに分かれた、各種のパケットにはそれぞれデータ部及び誤り訂正用のデータCRCの他にヘッダ部があり、そのヘッダ部には図24に示したような、転送データ長やチャネルNO、その他各種コード及び誤り訂正用のヘッダCRCなどが書き込まれ、転送が行われる。 Divided into each channel, there is in addition to the header portion of each of the various types of the packet data and a data CRC for error correction, it is in the header portion as shown in FIG. 24, the transfer data length, channel NO, other various codes and header CRC for error correction is written, the transfer is performed.
以上がアイソクロナス転送の説明である。 The above is the description of the isochronous transfer.
それぞれのパケットフォーマットにおける、パケットフィールドの詳細について図25に示す。 In each packet format, details of the packet field shown in FIG. 25.
実際の1394シリアルバス上の転送では、アイソクロナス転送と、アシンクロナス転送は混在できる。 The actual 1394 on the serial bus transfer, and isochronous transfer, an asynchronous transfer can be mixed. その時の、アイソクロナス転送とアシンクロナス転送が混在した、バス上の転送状態の時間的な遷移の様子を表した図を図26に示す。 At that time, isochronous transfer and asynchronous transfer are mixed shows a diagram showing a state of temporal transition of the transfer status on the bus in FIG. 26.
アイソクロナス転送はアシンクロナス転送より優先して実行される。 Isochronous transfer is executed in preference to asynchronous transfer. その理由は、サイクル・スタート・パケットの後、アシンクロナス転送を起動するために必要なアイドル期間のギャップ長(サブアクションギャップ)よりも短いギャップ長(アイソクロナスギャップ)で、アイソクロナス転送を起動できるからである。 The reason is that after the cycle start packet is in the gap length of the idle period necessary for starting the asynchronous transfer shorter gap length than (subaction gap) (isochronous gap), because it activates the isochronous transfer . したがって、アシンクロナス転送より、アイソクロナス転送は優先して実行されることとなる。 Therefore, from the asynchronous transfer, isochronous transfer and thus it is executed with priority.
図26に示した、一般的なバスサイクルにおいて、サイクル#mのスタート時にサイクル・スタート・パケットがサイクル・マスタから各ノードに転送される。 Shown in FIG. 26, in a general bus cycle, the cycle start packet at the start of a cycle #m is transferred from the cycle master to each node. これによって、各ノードで時刻調整を行い、所定のアイドル期間(アイソクロナスギャップ)を待ってからアイソクロナス転送を行うべきノードはアービトレーションを行い、パケット転送に入る。 This performs time adjustment on each node, the node should perform the isochronous transfer after waiting a predetermined idle period (isochronous gap) arbitrates, enter the packet transfer. 図26ではチャネルeとチャネルsとチャネルkが順にアイソクロナス転送されている。 Channel e and channel s and a channel k in FIG. 26 are sequentially isochronous transfer.
このアービトレーションからパケット転送までの動作を、与えられているチャネル分繰り返し行った後、サイクル#mにおけるアイソクロナス転送がすべて終了したら、アシンクロナス転送を行うことができるようになる。 The operation from the arbitration to the packet transfer, after channels repeatedly being given, if the isochronous transfer is completed all of the cycles #m, it is possible to perform the asynchronous transfer.
アイドル時間がアシンクロナス転送が可能なサブアクションギャップに達する事によって、アシンクロナス転送を行いたいノードはアービトレーションの実行に移れると判断する。 By idle time reaches the sub-action gap that can be asynchronous transfer, the node you want to asynchronous transfer determines that Utsureru the execution of the arbitration.
ただし、アシンクロナス転送が行える期間は、アイソクロナス転送終了後から、次のサイクル・スタート・パケットを転送すべき時間(cycle synch)までの間にアシンクロナス転送を起動するためのサブアクションギャップが得られた場合に限っている。 However, a period that allows the asynchronous transfer is from after the end of the isochronous transfer, if the subaction gap for starting the asynchronous transfer until time to be transferred to the next cycle start packet (cycle synch) was obtained It is limited to.
図26のサイクル#mでは3つのチャネル分のアイソクロナス転送と、その後アシンクロナス転送(含むack)が2パケット(パケット1、パケット2)転送されている。 And isochronous transfer cycle three channels in #m in FIG. 26, then asynchronous transfer (including ack) are two packets (packet 1, packet 2) are transferred. このアシンクロナスパケット2の後は、サイクルm+1をスタートすべき時間(cycle synch)にいたるので、サイクル#mでの転送はここまでで終わる。 After this asynchronous packet 2, since the leading time should start cycle m + 1 (cycle synch), transfer in cycle #m ends up here.
ただし、非同期または同期転送動作中に次のサイクル・スタート・パケットを送信すべき時間(cycle synch)に至ったとしたら、無理に中断せず、その転送が終了した後のアイドル期間を待ってから次サイクルのサイクル・スタート・パケットを送信する。 However, the following from waiting for the asynchronous or if we the next cycle start packet came in time to be transmitted (cycle synch) during synchronous transfer operation, without forcibly interrupted, the idle period after the transfer is completed to send a cycle start packet of the cycle. すなわち、1つのサイクルが125μS以上続いたときは、その分次サイクルは基準の125μSより短縮されたとする。 That is, one cycle time lasted more than 125μS shall be that amount next cycle was shortened from 125μS criteria. このようにアイソクロナス・サイクルは125μSを基準に超過、短縮し得るものである。 Thus isochronous cycle exceeds a reference to 125 .mu.s, it is capable of shortening.
しかし、アイソクロナス転送はリアルタイム転送を維持するために毎サイクル必要であれば必ず実行され、アシンクロナス転送はサイクル時間が短縮されたことによって次以降のサイクルにまわされることもある。 However, the isochronous transfer is always executed if each cycle required to maintain real-time transfer, asynchronous transfer is sometimes routed to the next subsequent cycle by the cycle time is shortened.
図27は、IEEE1394のプロトコルアーキテクチャ図である。 Figure 27 is a protocol architecture diagram of IEEE1394. この図において、各レイヤ間のサービス、特にアプリケーションレイヤーと、トランザクションレイヤー、リンクレイヤーの間のサービスについて説明する。 In this figure, the service between the layers, and in particular the application layer, the transaction layer, for service between link layer will be described. 矢印は各レイヤー間のサービスを示す。 The arrow indicates the service between each layer.
TR_DATA. TR_DATA. requestは、データ・トランザクションサービスを示す。 request shows a data-transaction services. アプリケーションまたはバス管理は、このサービスを用いてWRITE、READ、LOCKのデータトランザクションを開始するものであり、図27において、TR_DATA reqで示される。 Application or bus management, WRITE using this service, READ, is intended to initiate a data transaction LOCK, 27, represented by TR DATA req.
TR_DATA. TR_DATA. confirmationは、トランザクション完了確認サービスを示す。 confirmation indicates the transaction completion confirmation service. トランザクション・データ・リクエスト完了時、トランザクションレイヤーは、このサービスを用いて、リクエスト側ノードにトランザクションの完了を通信するものであり、図27において、TR_DATA confで示される。 Upon completion transaction data request, the transaction layer, using this service, which communicates the completion of the transaction to the requesting node, in FIG. 27, represented by TR DATA conf.
TR_DATA. TR_DATA. indicationは、トランザクション・リクエスト受信表示サービスを示す。 indication shows the transaction request receiving and displaying service. トランザクションレイヤーは、このサービスを用いて、トランザクションリクエストを受信したことをアプリケーション・ノード・コントローラ、バス・マネージャに表示する。 Transaction layer, using this service, and displays the reception of the transaction request application node controller, the bus manager. これは、図27において、TR_DATA. This is because, in FIG. 27, TR DATA. indで示される。 Represented by the ind.
TR_DATA. TR_DATA. responseは、トランザクション・データ応答サービスを示す。 response shows the transaction data response service. トランザクションレイヤーは、このサービスを用いて、受信したパケットに応答し、トランザクションを完了させる。 Transaction layer, using this service, in response to the received packet, to complete the transaction. これは、図27において、TR_DATA. This is because, in FIG. 27, TR DATA. respで示される。 Indicated by the resp.
LK_ISO_CONTOROL. LK_ISO_CONTOROL. requestは、アイソクロナス制御リクエストサービスを示す。 request shows the isochronous control request service. アプリケーションレイヤーは、このサービスを使って、リンクレイヤーにアイソクロナスチャンネルのリストを通信する。 Application layer can use this service, to communicate the list of isochronous channel to the link layer. これは、図27において、LK_ISO_CONT. This is because, in FIG. 27, LK_ISO_CONT. reqで示される。 It indicated by req.
LK_CYCLE. LK_CYCLE. indicationは、サイクル同期化表示サービスを示す。 indication shows the cycle synchronization display service. リンクレイヤーは、このサービスを用いて、アプリケーションレイヤーにサイクル同期化イベントを表示する。 Link layer uses the service, and displays the cycle synchronization event in the application layer. これは、図27において、LK_CYCLE. This is because, in FIG. 27, LK_CYCLE. indで示される。 Represented by the ind.
LK_ISO. LK_ISO. requestは、アイソクロナスリクエストサービスを示す。 request shows an isochronous request service. アプリケーションレイヤーは、このサービスを用いて、リンクレイヤーに1個のアイソクロナスパケットをバスに送信するようにリクエストする。 Application layer uses this service, one isochronous packet to the link layer requests to be sent to the bus. これは、図27において、LK_ISO. This is because, in FIG. 27, LK_ISO. reqで示される。 It indicated by req.
LK_ISO. LK_ISO. indicationは、アイソクロナス表示サービスを示す。 indication shows the isochronous display service. リンクレイヤーは、このサービスを用いて、アプリケーションレイヤーにアイソクロナスパケットを受信したことを表示する。 Link layer uses the service, and displays the reception of the isochronous packet to the application layer. これは、図27において、LK_ISO. This is because, in FIG. 27, LK_ISO. indで示される。 Represented by the ind.
図28、図29は、例えばPCのようなホスト(転送元ノード)から、アイソクロナスデータ転送を用いて印字データをプリンタ(転送先ノード)に転送する際の、ホスト側における印字シーケンスを示したフローチャートである。 Figure 28, Figure 29, for example, from a host (the source node), such as a PC, for transferring the print data using the isochronous data transfer to the printer (the destination node), the flow chart showing the printing sequence in the host it is. ホスト側で印字データ転送処理が始まるとき、まずホスト側は、ターゲットとなるプリンタにログインしなければならない。 When the print data transfer processing on the host side is started, the first host must log in to the printer as a target.
1394プリンタへのログインは、まずプリンタのログインレジスタをリードトランザクションにより読み取り(ステップ2001)、ログインレジスタの値よりログイン可否を判定し(ステップ2002)、ロックトランザクションにより、プリンタのログインレジスタを変更して(ステップ2003)ログインする。 Logging into 1394 printer is first read by a log register read transaction printer (step 2001), determines the login permission than the value of the log register (step 2002), by the lock transaction, change the login register printer ( step 2003) to login. ログインレジスタの値により現在ログイン不可能であれば、アプリケーションにその旨を通知し、データ転送処理を終了する。 If the current login not the value of the log register, and notifies the application, the data transfer process ends.
ログイン処理が正常に終了したら、次にリードトランザクションにより、プリンタのコンフィギュレーションROM中のプリンタ種別を読み(ステップ2004)、出力先のプリンタ種別を判定する。 When finished the login processing is successful, the next read transaction, read the printer type in the configuration ROM of the printer (step 2004) and determines the printer type of destination. 次に、ISOデータを転送可能かどうかをチェックする。 Next, check whether it is possible to transfer the ISO data. このチェックの結果、ISOデータを転送可能であれば、ホスト側は、このプリンタ種別により、アイソクロナスリソースマネージャーに対して要求する帯域幅を判定する。 The result of this check, forwards if the ISO data, the host side, this printer type, determines the bandwidth requests the isochronous resource manager.
帯域幅変更の目的は、1394ネットワーク全体のデータ転送帯域の最適化である。 The purpose of the bandwidth change is the optimization of the data transfer bandwidth of the entire 1394 network. 1394のアイソクロナス転送におけるプリントアウト処理の場合、プリンタのプリントアウト能力以上のデータ転送が可能である。 For print-out processing in the 1394 isochronous transfer, it is possible printout capacity or more data transfer printer. またアイソクロナス転送は、転送データをプリンタがそのまま受けなければならない(パケットごとにエラー、リトライを繰り返すことができない)という性格上、データ転送能力をプリントアウト能力に応じて定めなければならない。 The isochronous transfer, the printer must undergo as they transfer data (error per packet, can not be repeated retry) of the nature, shall be determined in accordance with the data transfer capability to print out capability.
例えばレーザビームプリンタとインクジェットプリンタでは、一般にプリントアウト能力に差があるため、本実施例のばあい、ホスト側がプリンタ側のレジスタを読み取り、レーザービームプリンタなら5M/s、インクジェットプリンタなら2M/sのように、アイソクロナスリソースマネージャに要求するデータ転送帯域幅を定める。 For example, in a laser beam printer and ink jet printer, generally due to differences in the print-out ability, in the present embodiment, the host side reads the register on the printer side, if a laser beam printer 5M / s, if the ink jet printer of 2M / s as described above, determine the data transfer bandwidth required for isochronous resource manager.
さらに、プリンタの種別により帯域幅を決定する他に、転送データがカラーであるか、モノクロであるか、など転送データ量に影響するパラメータも参照して、プリンタのプリントアウト能力を超えない最適なデータ転送帯域を確保しようとすることにより、1394ネットワーク全体のデータ転送帯域幅を最適に使用できる。 Furthermore, in addition to determining the bandwidth according to the type of printer, or transfer data is a color or a monochrome, etc. See also parameters affecting the amount of transfer data, optimal not exceeding printout capability of the printer by attempting to ensure the data transfer bandwidth, optimal use of data transfer bandwidth of the entire 1394 network.
具体的には、カラー印刷を行う場合は大量のデータを必要とするので、カラー印刷を行う際は、モノクロ印刷を行うより大きな帯域幅が設定される。 Specifically, since it requires a large amount of data when performing color printing, when performing color printing, a large bandwidth is set from performing monochrome printing. また、モノクロデータはスピードを重視するため高速に印刷し、カラーデータは品位を重視するため低速に印刷する場合には、モノクロデータを転送する際には、カラーデータを転送する際より大きな帯域幅が設定される。 Further, the monochrome data is printed at a high speed to emphasize speed, if the color data is to be printed on low speed to emphasize quality, when transferring the monochrome data, greater bandwidth than when transferring color data There is set.
帯域幅の決定に際しては、プリンタ種別を判定するのみならず、同一機種の場合でもドライバの設定(ドラフトモード、ファインモード)等により変更することが考えられる。 In determining the bandwidth not only determines the printer type, setting even if the driver of the same model (draft mode, fine mode) is conceivable to change the like. その場合、アイソクロナスデータ転送に使用する帯域幅を獲得するには、まず始めにアイソクロナスリソースマネージャーから、リードトランザクションにより、現在割り当て可能な帯域幅の最大値を読み取る(ステップ2010)。 In this case, to acquire the bandwidth used for isochronous data transfer, the isochronous resource manager First, the read transaction reads the maximum value of the current allocatable bandwidth (step 2010).
次に、前記ステップ2004〜2009において決定された要求帯域幅を、前記ステップ2009で読み取った割り当て可能帯域幅と比較する(ステップ2011)。 Then, the determined requested bandwidth in step 2004 to 2009, compared to the allocatable bandwidth read in step 2009 (step 2011). 割り当て可能であれば、ロックトランザクションにより、アイソクロナスリソースマネージャーから要求帯域幅を獲得する(ステップ2012)。 Assignment possible, by the lock transaction to obtain the requested bandwidth from the isochronous resource manager (step 2012). もし要求帯域幅が獲得できなければ、アプリケーションにその旨を通知し、データ転送処理を終了する。 If it can not acquire the requested bandwidth, and notifies the application, the data transfer process ends.
帯域幅を獲得したら、次にアイソクロナス転送のための、チャンネル番号決定処理を行う。 After acquiring the bandwidth, for isochronous transfer then the channel number determination processing. まず、アイソクロナスリソースマネージャーからリードトランザクションにより、現在のチャンネル番号使用状態を読み取る(ステップ2013)。 First, the read transaction from an isochronous resource manager reads the current channel number used state (step 2013). 次に、未使用チャンネル番号があるかどうかを調べ(ステップ2014)、もし未使用チャンネル番号があれば、ロックトランザクションにより、アイソクロナスリソースマネージャーからチャンネル番号を獲得する(ステップ2015)。 Next, determine whether there is an unused channel number (step 2014), if there is an unused channel number, the lock transaction, acquire a channel number from an isochronous resource manager (step 2015). もし未使用チャンネル番号がなければ、アプリケーションにその旨を通知し、データ転送処理を終了する。 If there is an unused channel number, and notifies the application, the data transfer process ends.
転送元ノード(この場合PC)は、アイソクロナスリソースマネージャーから帯域幅、チャンネル番号を獲得した後、チャンネル番号を転送先ノード(この場合プリンタ)のチャンネル番号レジスタに、ライトトランザクションを用いて書き込み、通知する(ステップ2016)。 Forwarding node (in this case PC), the bandwidth from the isochronous resource manager, after obtaining the channel number, the channel number in the channel number register of the transfer destination node (in this case the printer), written using a write transaction, to notify (step 2016).
さらに、前記と同様に、プリント開始を転送先ノードのプリント開始レジスタに、ライトトランザクションを用いてプリント開始ビットを書き込み、通知して(ステップ2017)、アイソクロナスデータ転送を開始する(ステップ2018)。 Furthermore, similar to the above, the print start register in the destination node the print start, writes the print start bit with a write transaction, and notifies (step 2017), and starts the isochronous data transfer (step 2018).
アイソクロナスデータ転送が終了したら(ステップ2019)、プリント終了を転送先ノードに通知する。 When the isochronous data transfer is completed (step 2019), the printing completion notifying the destination node. この処理は転送先ノードのプリント開始レジスタに、ライトトランザクションを用いてプリント終了ビットを書き込むことによってなされる(ステップ2020)。 This process is done by writing to the print start register the destination node, a print termination bits using a write transaction (step 2020).
ステップ2005の判定でISOデータの転送が可能でない場合、ステップ2021へ進み、BJC−1394であるかどうかをチェックする。 If not, the transfer of ISO data is determined in step 2005, the process proceeds to step 2021 to check whether the BJC-1394. このチェックの結果、BJC−1394であれば、ステップ2022へ進んでBJプリンタ用データの非同期転送パケットサイズを設定する。 The result of this check, if the BJC-1394, sets the asynchronous transfer packet size of the data for BJ printer proceeds to step 2022.
また、ステップ2021のチェックの結果がBJC−1394でない場合にはステップ2023へ進み、LBP−1394であるかどうかをチェックする。 Further, as a result of the check in step 2021 if not BJC-1394 proceeds to step 2023 to check whether the LBP-1394. そして、LBP−1394であれば、ステップ2024へ進み、LBPプリンタ用データの非同期転送パケットサイズを設定する。 Then, if the LBP-1394, the process proceeds to step 2024 to set the asynchronous transfer packet size of the data for LBP printer.
本実施形態においては、前述のようにして、それぞれのプリンタに適した非同期パケットのデータサイズを、ステップ2022、ステップ2022で決めることができる。 In the present embodiment, as described above, the data size of the asynchronous packet that is suitable for each printer, step 2022 may be determined in step 2022.
次に、プリント開始を通知し(ステップ2025)、その後、非同期データの転送を開始する(ステップ2026)。 Next, notifies the print start (step 2025), then it starts the transfer of asynchronous data (step 2026). そして、次のステップ2027でASYNCデータの転送を終了したら、次に、ステップ2028でプリント終了を通知する。 Then, when finished the transfer of ASYNC data in the following step 2027, then informs the print end at step 2028.
ステップ2005のISOデータ転送が可能であるかどうかの判定は、バス上にサイクルマスタがあるかどうかで判定される。 Determining whether ISO data transfer is possible in step 2005 is determined by whether there is a cycle master on the bus. サイクルマスタの有無は、図27のSB_CONT confによって情報を得ることができる。 The presence or absence of cycle master can obtain information by SB_CONT conf in Figure 27.
図30は第1の出力装置の構成を示す断面図であり、例えばレーザビームプリンタ(LBP)の場合を示す。 Figure 30 is a sectional view showing a configuration of a first output device, for example, shows the case of a laser beam printer (LBP).
図30において、2000はLBP本体であり、外部に接続されているホストコンピュータから供給される印刷情報(文字コード等)やフォーム情報あるいはマクロ命令等を入力して記憶するとともに、それらの情報に従って対応する文字パターンやフォームパターン等を作成し、記録媒体である記録紙等に像を形成する。 In Figure 30, 2000 is a LBP main body stores by entering external to the printing information supplied from a host computer connected (character code), form information or macro instructions, etc., corresponding according to their information create a character pattern or form pattern or the like which forms an image on a recording sheet such as a recording medium.
2001は操作のためのスイッチおよびLED表示器等が配されている操作パネル、2012はLBP本体2000全体の制御およびホストコンピュータから供給される文字情報等を解析するプリンタ制御ユニットである。 2001 switch and the operation panel LED display and the like are arranged for the operation, 2012 denotes a printer control unit for analyzing the character information and the like supplied from LBP main body 2000 overall control and host computer. このプリンタ制御ユニット2012は、主に文字情報を対応する文字パターンのビデオ信号に変換してレーザドライバ2002に出力する。 The printer control unit 2012 mainly converts the character information into a video signal of a corresponding character pattern to a laser driver 2002.
レーザドライバ2002は半導体レーザ2003を駆動するための回路であり、入力されたビデオ信号に応じて半導体レーザ2003から発射されるレーザ光2004をオン・オフ切り換えする。 The laser driver 2002 is a circuit for driving a semiconductor laser 2003, on-off switches the laser beam 2004 emitted from the semiconductor laser 2003 in accordance with the input video signal. レーザ光2004は回転多面鏡2005で左右方向に振らされて静電ドラム2006上を走査露光する。 The laser beam 2004 scans and exposes on an electrostatic drum 2006 is swung to the right and left by a rotary polygon mirror 2005.
これにより、静電ドラム2006上には文字パターンの静電潜像が形成されることになる。 Thereby, the electrostatic latent image of a character pattern is formed on the electrostatic drum 2006. この潜像は、静電ドラム2006周囲に配設された現像ユニット2007により現像された後、記録紙に転写される。 This latent image is developed by a developing unit 2007 arranged around the electrostatic drum 2006 is transferred onto the recording sheet. この記録紙にはカットシートを用い、カットシート記録紙はLBP2000に装着した用紙カセット2008に収納され、給紙ローラ2009および搬送ローラ2010と搬送ローラ2011とにより、装置内に取り込まれて、静電ドラム2006に供給される。 Cut sheets are used as recording paper, cut sheet recording papers are stored in the sheet cassette 2008 mounted on LBP2000, by a paper feed roller 2009 and conveying rollers 2010 and conveying rollers 2011, and incorporated into the device, electrostatic It is supplied to the drum 2006. また、LBP本体2000には、図示しないカードスロットを少なくとも1個以上備え、内蔵フォントに加えてオプションフォントカード、言語系の異なる制御カード(エミュレーションカード)を接続できるように構成されている。 Further, the LBP main body 2000 includes at least one or more card slots (not shown), optional font card in addition to built-in font, and is configured to connect of a different language system control card (emulation card).
図31は本実施形態のLBPの構成を説明するブロック図である。 Figure 31 is a block diagram illustrating the configuration of the LBP of the present embodiment.
プリンタ2000において、12はプリンタCPUで、ROM13のプログラム用ROMに記憶された制御プログラム等或いは外部メモリ14に記憶された制御プログラム等に基づいてシステムバス15に接続される各種のデバイスとのアクセスを総括的に制御し、印刷部インタフェース16を介して接続される印刷部(プリンタエンジン)17に出力情報としての画像信号を出力する。 In the printer 2000, numeral 12 denotes a printer CPU, and access to various devices connected to the system bus 15 based on the program ROM in the stored control program and the like, or a control program stored in the external memory 14 such as the ROM13 generically it controls, and outputs an image signal as output information to a printing unit (printer engine) 17 connected via a printing unit interface 16.
また、このROM13のプログラムROMには、制御プログラムが記憶されている。 The program ROM of the ROM 13, the control program is stored. ROM13のフォント用ROMには上記出力情報を生成する際に使用するフォントデータ等を記憶し、ROM13のデータ用ROMにはハードディスク等の外部メモリ14が無いプリンタの場合には、ホストコンピュータ上で利用される情報等を記憶している。 A font ROM of ROM13 stores font data and the like used upon generating the output information, if the printer has no external memory 14 such as a hard disk in the data ROM of the ROM13 is used on the host computer stores information and the like to be.
なお、プリンタの各種情報は本実施形態の場合は1394インターフェースである入力部18を介して外部機器からアクセスすることが可能である。 The various information of the printer in the case of the present embodiment can be accessed from an external device via the input unit 18 is a 1394 interface. これら情報には、用紙カセット2008の紙残量警告などの情報が含まれる。 These information includes information such as Kamizan amount warning of the paper cassette 2008. これら情報のアクセスについては後述のプリンタ側1394シリアルバスインターフェースの構成で、シリアルバス用コンフィギュレーションROMならびにステータスレジスタの項目で説明する。 To access this information in the printer 1394 of the serial bus interface configuration will be described later, it is explained in the section of the configuration ROM and the status register for the serial bus.
19はCPU12の主メモリ、ワークエリア等として機能するRAMで、図示しない増設ポートに接続されるオプションRAMによりメモリ容量を拡張することができるように構成されている。 19 a main memory of CPU 12, a RAM that functions as a work area or the like, and is configured to be able to by an optional RAM connected to an expansion port (not shown) to expand the memory capacity. なお、RAM19は、出力情報展開領域、環境データ格納領域、NVRAM等に用いられる。 Incidentally, RAM 19 is used as an output information expansion area, environment data storage area, an NVRAM, or the like. 前述したハードディスク(HD)、ICカード等の外部メモリ14は、ディスクコントローラ(DKC)20によりアクセスを制御される。 Above a hard disk (HD), an external memory 14 such as an IC card is controlled access by a disk controller (DKC) 20. 外部メモリ14は、オプションとして接続され、フォントデータ、エミュレーションプログラム、フォームデータ等を記憶する。 The external memory 14 is connected as an option, and stores font data, emulation programs, form data, and the like. また、18は前述した操作パネルで操作のためのスイッチおよびLED表示器等が配されている。 Further, 18 is a switch and LED indicator for operation in the operation panel described above are arranged.
また、前述した外部メモリは1個に限らず、少なくとも1個以上備え、内蔵フォントに加えてオプションフォントカード、言語系の異なるプリンタ制御言語を解釈するプログラムを格納した外部メモリを複数接続できるように構成されていても良い。 Further, the external memory described above is not limited to one, comprising at least one or more, optional font card in addition to built-in font, an external memories storing programs for interpreting printer control languages of different language systems to allow multiple connections it may be configured. さらに、図示しないNVRAMを有し、操作パネル2001からのプリンタモード設定情報を記憶するようにしても良い。 Furthermore, an NVRAM (not shown) may be adopted to store printer mode setting information from the operation panel 2001.
図32は、本実施形態の第2の出力装置の構成を示す外観図であり、たとえばインクジェット記録装置の場合を示す。 Figure 32 is an external view showing a configuration of a second output apparatus of the present embodiment, for example, shows a case of an inkjet recording apparatus.
図32において駆動モータ2213の正逆回転に連動して駆動力伝達ギヤ2211、2209を介して回転するリードスクリュー2205のガイド溝2204に対して係合するキャリッジHCはピン(図示しない)を有し、矢印a,b方向に往復移動される。 The carriage HC is engaged with a guide groove 2204 of a lead screw 2205 which rotates via driving force transmission gears 2211,2209 in conjunction with normal and reverse rotation of a driving motor 2213 in FIG. 32 has a pin (not shown) , arrow a, and is reciprocally moved in the b direction. このキャリッジHCにはインクカートリッジIJCが搭載されている。 Ink cartridge IJC is mounted on this carriage HC.
このプリンタ用のIJCとして装着可能なものには、カラーインクを具備したカラーインクジェットカートリッジCIJCと、ブラックインクのみを具備したモノクロインクジェットカートリッジMIJCが用意されている。 This capable mounted as the IJC for the printer, a color ink jet cartridge CIJC provided with the color ink, monochrome ink jet cartridge MIJC are prepared equipped only black ink. 2202は紙押さえ板であり、キャリッジ移動方向にわたって紙をプラテン2200に対して押圧する。 2202 is a paper pressing plate, which presses a paper sheet against a platen 2200 over the carriage movement direction. 2207、2208はフォトカプラでキャリッジのレバー2206のこの行きでの存在を確認して、モータ2213の回転方向切り替えを行うためのホームポジション検出手段として機能する。 2207 and 2208 are recognizing the presence of a go of the carriage lever 2206 photocouplers serving as home position detection means for performing rotation direction switching motor 2213.
また、本プリンタには自動的に複数枚の紙を給紙可能とするオートシートフィーダが装着されている。 Also, the auto sheet feeder is mounted to automatically allow feeding a plurality of paper in the printer. 現在印字されている、すなわちプラテン上にある紙が排紙されようとする際、オートシートフィーダは次の紙をプリンタの給紙挿入口にガイドする。 When the currently printed, that is, paper is on the platen about to be discharged, the auto sheet feeder guides the next sheet of paper in the paper feed insertion port of the printer. プリンタは排紙後、給紙挿入口のペーパーセンサにより紙を検出すると、次の紙をプラテンにセットするべく給紙を行う。 After the printer discharge detects the paper by the paper sensor in the paper sheet insertion slot, it performs sheet feeding so as to set the next sheet of paper to the platen.
オートシートフィーダーのペーパートレイには紙残量センサが装着されており、シートフィーダーにセットされている紙量が所定の量よりも減少した場合には、センサーが反応する。 In a paper tray of the auto sheet feeder is mounted is Kamizanryou sensor, if the paper weight is set in the sheet feeder is decreased below a predetermined amount, the sensor reacts.
2216は記録ヘッドの全面をキャップするキャップ部材2222支持する部材、2215はこのキャップ内を吸引する吸引手段でキャップ内開口2223を介して記録ヘッドの吸引回復を行う。 2216 members for capping member 2222 support for capping the entire surface of the recording head, 2215 performs suction recovery of the recording head via a cap opening 2223 in suction means for sucking the inside of the cap. 2217はクリーニングブレードで部材2219により前後方向に移動可能となる。 2217 becomes movable by member 2219 in the longitudinal direction of the cleaning blade. 2218は本体支持板で上記2217、2219を支持する。 2218 for supporting the 2217,2219 in main body support plate. 2212は吸引回復の吸引を開始するためのレバーであり、キャリッジと係合するカム2220の移動に伴って移動し、駆動モーターからの駆動力がクラッチ切り替え等の公知の伝達手段で移動制御される。 2212 is a lever for starting the suction of the suction recovery, and moves upon movement of a cam 2220 engaged with the carriage, the driving force from the driving motor is controlled to move by a known transmitting means such as clutch switching .
これらのキャッピング、クリーニング、吸引回復はキャリッジがホームポジション側領域に来たときにリードスクリュー2205の作用によってそれらの対応位置で所望の処理が行われる様に構成されているが周知のタイミングで所望動作を行うように構成されていればよい。 These capping, cleaning desired operating carriage at known timings but desired processing at corresponding positions are configured as performed by the action of the lead screw 2205 when it came to the home position side region only it needs to be configured to perform.
図33は、図32に示した出力装置の制御構成を説明するためのブロック図である。 Figure 33 is a block diagram illustrating the control configuration of the output device shown in FIG. 32.
図33において2300はホストコンピュータの記録信号を入力するインターフェース部、2301はMPU、2302は前記MPU2301が実行する制御プログラムやホスト印刷情報を格納するROM、2303はDRAMで各種データ(上記記録信号やヘッドに供給される記録データ等)を保存しておく。 Interface 2300 for inputting a recording signal of the host computer 33, 2301 MPU, 2302 stores a control program and a host print information the MPU2301 performs ROM, 2303 various data (the recording signal and head DRAM keep a record data, etc.) supplied to the.
2304は記録ヘッド2308に対する出力データの供給制御を行うゲートアレーでインターフェース2300、MPU2301、DRAM2303間のデータの転送制御も行う。 2304 also performs data transfer control among the interface 2300, MPU2301, DRAM2303 gate array for controlling the supply of the output data to the printhead 2308. 2310は前記記録ヘッド2308を搬送するためのキャリアモータ、2309は記録用紙搬送のための搬送モータ、2305は前記記録ヘッドを駆動するヘッドドライバ、2307は前記キャリアモータ2310を駆動するモータドライバである。 2310 carrier motor for conveying the recording head 2308, 2309 conveying motor for the recording paper transport, 2305 a head driver for driving the recording head, 2307 denotes a motor driver for driving the carrier motor 2310.
このように構成された上記記録装置において1394インターフェース2300を介して後述するホストコンピュータより入力情報が入力されると、ゲートアレー2304とMPU2301との間で入力情報がプリント用の出力情報に変換される。 If the input information from the host computer to be described later via the 1394 interface 2300 in such constructed the recording apparatus is inputted, the input information is converted into output information for printing between the gate array 2304 and MPU2301 . そしてモータドライバ2306、2307が駆動されると共にヘッドドライバ2305に送られた出力情報に従って記録ヘッドが駆動され印字が実行される。 The motor driver 2306 and 2307 the recording head in accordance with the output information sent to the head driver 2305 while being driven is driven printing is performed.
なお、プリンタの各種情報は1394インターフェース2300を介して外部機器からアクセスすることが可能である。 The various information of the printer is able to access from the external apparatus via the 1394 interface 2300. これら情報には、前述のように本プリンタのHCに装着可能なヘッドの内、装着されているヘッドIJCの種類、またオートシートフィーダーの紙残量警告などの情報が含まれる。 These information, among the head attachable to HC of the printer as described above, the type of head IJC that is mounted, also includes information such as Kamizan amount warnings auto sheet feeder. これら情報のアクセスについては後述のプリンタ側1394シリアルバスインターフェースの構成で、コンフィギュレーションROMならびにステータスレジスタの項目で後述する。 To access this information in the printer 1394 of the serial bus interface configuration will be described later, it will be described later in the item of the configuration ROM and status registers.
本実施形態の第1の出力装置であるLBP、第2の出力装置であるインクジェットプリンタはIEEE1394シリアルバスを用いて機器間の接続が行われる。 LBP is a first output device of the present embodiment, an inkjet printer, which is the second output device is connected between the devices using the IEEE1394 serial bus is carried out. 各装置におけるこのシリアルバスのインターフェースを行うブロック(以下1394I/Fブロック)は、LBPにおいては図31中の入力部18であり、インクジェットプリンタにおいては図33中のインターフェースブロック2300である。 Block for this serial bus interface in each device (hereinafter 1394 I / F block), in the LBP an input unit 18 in FIG. 31, in the ink jet printer is an interface block 2300 in FIG. 33.
次に、1394I/Fブロックの構成について説明する。 Next, the configuration of the 1394 I / F block. なお、LBP、インクジェットプリンタ共に本ブロックの基本構成は同様である為、本説明は両プリンタに当てはまる。 Incidentally, LBP, the basic configuration of the present block to the inkjet printer both because the same, this description applies to both the printer. またプリンタ毎の固有な部分については随時説明する。 Also for the specific part of each printer will be described from time to time.
図34は1394I/Fブロックの基本構成ブロック図である。 Figure 34 is a basic configuration block diagram of a 1394 I / F block.
図中2402は1394シリアルバスを直接ドライブするフィジカルレイヤー制御IC(PHYIC)であり、前述の〈IEEE1394の技術の概要〉におけるフィジカルレイヤの機能を実現する。 Figure 2402 is a physical layer control IC for driving the 1394 serial bus directly (PHY IC), implements the functions of the physical layer in the <Outline of IEEE1394 technology> above. 主な機能としては、バスイニシャル化とアービトレーション、送信データ符号のエンコード/デコード、ケーブル通電状態の監視ならびに負荷終端用電源の供給(アクティブ接続認識用)、リンクレイヤICとのインターフェースである。 The main features, bus initialization of the arbitration, (for active connection recognition) supply of encoding / decoding of transmission data code, the power supply monitoring and load end of the cable energized, an interface with a link layer IC.
2401はプリンタ本体とのインターフェースを行い、PHYICのデータ転送をコントロールするリンクレイヤー制御IC(LINKIC)であり、前述の〈IEEE1394の技術の概要〉におけるリンクレイヤの機能を実現する。 2401 performs an interface with the printer body, a link layer control IC that controls data transfer PHYIC (LINKIC), to implement the functions of the link layer in the <Outline of IEEE1394 technology> above.
本ICが備える主な機能としてはPHYICを介する送信/受信データを一時格納する送受信FIFO、送信データのパケット化機能、PHYICが受信データが本ノードアドレス、またはアイソクロナス転送データの場合は割り当てられたチャンネル向けのものであるかの判定機能、またそのデータのエラーチェックを行うレシーバー機能、そしてプリンタ本体とのインターフェースを行う機能がある。 The main reception FIFO for temporarily storing transmit / receive data via the PHY IC as function, packet function, PHY IC is received data present node address of the transmission data or the channel assigned in the case of isochronous transfer data, the present IC is provided of decision function is of directed, also it has its receiver function performs error checking data, and functions for interfacing with the printer body.
図中2403はコンフィギュレーションROMであり、各機器固有の識別、通信条件等が格納されている。 Figure 2403 is a configuration ROM, the device-specific identification, such as a communication condition is stored. 本ROMのデータフォーマットはIEEE1394規格で定められたフォーマットに準じているが、機器固有のデータはLBP、インクジェットプリンタそれぞれに固有のものが用意されている。 Data format of the ROM is that in accordance with the format prescribed by IEEE1394 standard, device-specific data LBP, and each ink-jet printer are a variety of specific. 図35に本実施形態のLBPのコンフィギュレーションROMの規納データ2501と、本実施形態のインクジェットプリンタのコンフィギュレーションROMの規納データ2502を示す。 And Tadashiosame data 2501 of the configuration ROM of the LBP of the present embodiment in FIG. 35 shows a Tadashiosame data 2502 of the configuration ROM of the ink jet printer of this embodiment.
〈IEEE1394の技術の概要〉で説明したように、1394シリアルバスのアドレス設定のうち、最後の28ビットはシリアルバスに接続される他のデバイスからアクセス可能な、各機器の固有データの領域として確保されている。 As described in <Outline of IEEE1394 technology>, of the 1394 serial bus address setting, the last 28 bits are accessible from other devices connected to the serial bus, provided as an area of specific data for each device It is. 図36はこの28ビットのアドレス空間を本実施形態のLBPの場合とインクジェットプリンタの場合で表した図である。 Figure 36 is a diagram showing the address space of the 28 bits in the case where the ink jet printer LBP of the present embodiment. 前述のコンフィギュレーションROMは図中400番地から800番地の領域に配置されている。 Aforementioned configuration ROM is arranged in the region of 800 from address 400 address in FIG.
800番地以降の領域は各プリンタ本体の固有の動作に関連するレジスタが配置されている。 Region of 800 address later are disposed registers associated with specific behavior of each printer. これらレジスタは物理的にはそれぞれのプリンタの制御部分(インクジェットプリンタの場合)は図中のゲートアレー、LBPの場合は図中のCPUの中に配置される。 (Case of an inkjet printer) Each of these registers is to physically control portion of the printer gate array in the drawing, in the case of LBP is disposed within the CPU in FIG.
両プリンタ共通のレジスタとしては1020番地から始まる4つのレジスタがある。 As both the printer common register has four registers beginning with address 1020.
channelレジスタはそれぞれのプリンターホスト間でアイソクロナスデータ転送を行う際にアロケートされたチャネル番号を格納するレジスタ、P_statusレジスタはプリンタの基本動作ステータスが検知可能なレジスタ、print_loginレジスタはホストによりそれぞれのプリンタに対してログインし、本プリンタのリソースを確保するためにアクセスする際、ログインビットをセットするためのレジスタ、そしてprint_startレジスタはプリントデータの転送開始・終了に際し、ホストがビットセットするレジスタである。 channel register stores the channel number which is allocated when performing isochronous data transfer between the respective printer host registers, p_status registers basic operation status is detectable register of the printer, Print_login register for each of the printer by the host Log Te, when accessing to ensure the resources of the printer, a register for setting the log bit and upon print_start register transfer start and end of the print data is a register that the host bit set.
本実施形態のインクジェットプリンタ、LBPの場合、アドレス1000番地以降にプリンタの動作状態がモニタ可能であるステータスレジスタ群、または制御可能であるコントロールレジスタ群が配置されている。 For inkjet printers, LBP of the present embodiment, the status register group operation status of the printer to address 1000 or later can be monitored, or controllable control registers are are arranged. 図中にはこれらレジスタ群の一部を表示している。 Displaying some of these registers in the figure.
本実施形態のインクジェットプリンタの場合、例えばアドレス1002番地のhead_IDレジスタではプリンタのヘッドとして装着されている記録ヘッドの種類に関する情報が格納されている(本例ではカラーヘッドCIJCの場合は1、モノクロヘッドの場合は0となる)。 For ink-jet printer of the present embodiment, for example, 1 in the case of the color head CIJC the kind information is stored about the (in this example of a recording head that is mounted as a head of a printer is head_ID register address address 1002, the monochrome head It becomes zero in the case of). また、1003番地には現在のプリンタ動作ステータスが表示されるが、本レジスタのビット0(P_low)はオートシートフィーダーにセットされている紙量の残量検出センサの値が表示される。 Further, the address 1003 is the current printer operational status is displayed, bit 0 of this register (P_low) the value of the remaining amount detection sensor of the paper amount set in the auto sheet feeder is displayed. オートシートフィーダの紙残量があらかじめ設定された量より低くなった場合はこの値が1にセットされる。 If Kamizan amount of auto sheet feeder is lower than the amount that has been preset this value is set to 1.
本実施形態のLBPの場合、例えばアドレス1010番地には現在の用紙カセット1228のステータスが表示されるが、本レジスタのビット0(Tray_low)は用紙カセットにセットされている紙量の残量検出センサの値が表示される。 For LBP of the present embodiment, for example, the address address 1010 status of the current sheet cassette 1228 is displayed, the remaining amount detecting sensor of this register bit 0 (Tray_low) paper weight that is set in the paper cassette the value is displayed. この紙残量があらかじめ設定された量より低くなった場合はこの値が1にセットされる。 If this Kamizan amount is lower than the amount that has been preset this value is set to 1.
以降、プリンタの印字処理についてフローチャートに従って詳細に説明する。 It will hereinafter be described in detail with reference to the flowchart for the printing process of the printer. 図37は印字処理を示したフローチャートで、ステップS4001で初期化を行う。 Figure 37 is a flow chart showing the print processing, the initialization is carried out in step S4001. 初期化は印字に必要なフラグレジスタ、1394インターフェースの初期化、プリンタの初期化処理を行う。 Initialization is done flag register necessary for printing, the initialization of the 1394 interface, the initialization process of the printer.
次に、ステップS4002へ進み、印字の開始を示すフラグレジスタprint. Then, the process proceeds to step S4002, the flag register print indicating the start of printing. startがオンであるかどうかをチェックする。 start to check whether it is turned on. print. print. startフラグレジスタはホストPCから送られる非同期コマンドパケットでオン、オフされ印字イメージデータを受信できる状態であるかどうかを示す。 start flag register indicates on an asynchronous command packet sent from the host PC, whether the state can receive off by print image data.
print. print. startがオンであればステップS4003へ進み、ISOデータであるかどうかを判定する。 start the process proceeds to step S4003 if it is on, it determines whether it is the ISO data. この判定の結果、ISOデータであればステップS4004は進み、ISOデータ処理を行う。 The result of this determination, if the ISO data step S4004 proceeds performs ISO data processing. ISOデータ処理(ISOパケット処理)は、ホストPCから送られてくるイメージデータをアイソクロナスパケットデータとして1394インターフェースを介して受け取る処理で、図41で詳細に説明する。 ISO data processing (ISO packet processing) is the image data sent from a host PC in the process of receiving through the 1394 interface as an isochronous packet data, is described in detail in FIG. 41.
一方、ステップS4003の判定の結果がISOデータでない場合には、ステップS4005へ進み、ASYNCデータ処理を行う。 On the other hand, the result of the determination in step S4003 is if not ISO data, the process proceeds to step S4005, performs ASYNC data processing. ASYNCデータ処理は、ホストPCから送られてくるイメージデータをアシクロナスパケットデータとして1394インターフェースから受け取る処理であり、図43で詳細に説明する。 ASYNC data processing is a process of receiving from the 1394 interface image data sent from a host PC as acyclonucleotides eggplant packet data will be described in more detail in Figure 43.
ステップS4002でprint. print in step S4002. startがオンでなければステップS4006へ進み、非同期パケット処理(ASYNCパケット処理)を行う。 start proceeds to step S4006 if not on, asynchronous packet processing (ASYNC packet processing). 非同期パケット処理は、ホストPCから送られるコマンドのためのパケットデータでプリンタ内の情報設定や1394インタフェースの設定を行ったり、印字の開始、終了を指示する処理であり、詳細は図38で説明する。 Asynchronous packet processing, or perform setting or settings 1394 interface in the printer in packet data for the commands sent from the host PC, the start of printing, a process for instructing termination, details will be described in FIG. 38 .
図38は、ASYNCパケット処理を示したフローチャートで、ホストPCからの情報の設定、印字の開始終了の指示を行う書き込み(writeトランザクション)処理、プリンタの設定情報をホストが読み込む(readトランザクション)処理、ホストPCからのデータの交換を行うlockトタンザクションを行う。 Figure 38 is a flow chart showing the ASYNC packet processing, setting information from the host PC, writing for instructing start and end of print (write transaction) processing, the setting information of the printer host reads (read transaction) processing, performing a lock galvanized iron the action to carry out the exchange of data from the host PC. まずステップS4011でTR_DATA. First TR_DATA in step S4011. indがセットされたかどうかをチェックする。 ind to check whether it has been set.
TR_DATA. TR_DATA. indはトランザクションレイアでトランザクションレイアに非同期パケット受け取られたことを示している。 ind indicates that received asynchronous packet to the transaction Leia the transaction Leia. ステップS4011で非同期パケットが無ければ、ステップS4019へ進み、戻りとなる。 Without asynchronous packet in step S4011, the flow advances to step S4019, the return. この場合非同期パケットが無かったためになにも行わなかったことを示している。 In this case it shows that no nothing for asynchronous packet was not. ステップS4011で非同期パケットがあればステップS4012へ進み、非同期パケットをトランザクションレイアから受け取る。 In step S4011 proceeds to step S4012 if there is an asynchronous packet, receives an asynchronous packet from the transaction Leia. パケット一般形式は図24で示される。 Packet general form is shown in Figure 24.
次に、ステップS4013へ進み、パケットがwriteトランザクションであるかどうかをチェックする。 Next, the process proceeds to step S4013, the packet to check whether it is a write transaction. パケットがどのトランザクションであるかはパケット内のtcodeにセットされる。 The packet is any transaction is set to tcode in the packet. 図24、図25に示す。 Figure 24, is shown in Figure 25. writeトランザクションであるかどうかは、このtcodeにセットされた値で判定され、writeトランザクションの指示であればステップS4014へ進み、writeトランザクション処理を行う。 Whether a write transaction, is determined by the value set in this tcode, if an instruction in the write transaction proceeds to step S4014, it performs write transaction processing. writeトランザクション処理はプリンタのユニット空間に情報を書き込む処理で、図39で詳細に説明する。 write transaction processing in the processing for writing information to the unit space of the printer, it will be described in more detail in Figure 39.
次に、戻りとなる。 Then, the return. ステップS4013でwriteトランザクションでなければステップS4015へ進み、readトランザクションかどうかをチェックする。 If a write transaction in step S4013 proceeds to step S4015, to check whether or not the read transaction. このチェックも非同期パケット内のtcodeの値で行われる。 This check is also performed by the value of tcode in asynchronous packet. readトランザクションであればステップS4016へ進み、readトランザクションの処理を行う。 If the read transaction proceeds to step S4016, it performs the processing of the read transaction.
readトランザクション処理は、プリンタのコンフィグレーションROM、ユニット空間に設定された値をアドレスとして指定して、ホストPCが読み込むための処理で、ホストPCから指定されたアドレスのデータを応答パケットとしてホストへ返送する。 read transaction processing, returns to specify the configuration of the printer ROM, and a value set in the unit space as an address, the processing for reading the host PC, the host data of the address specified by the host PC as a response packet to. 図40でreadトランザクションについて説明する。 For read transactions will be described with reference to FIG. 40. 次に、戻りとなる。 Then, the return.
一方、ステップS4015でreadトランザクションでなければ、ステップS4017へ進み、lockトランザクションかどうかをチェックする。 On the other hand, if it is not read transaction in step S4015, the process proceeds to step S4017, to check whether or not the lock transaction. このチェックも非同期パケット内のtcodeの値で行われる。 This check is also performed by the value of tcode in asynchronous packet. また、lockトランザクションであればステップS4018へ進み、lockトランザクションの処理を行う。 Further, if the lock transaction proceeds to step S4018, it performs the processing of lock transaction.
lockトランザクションは、ホストPCから書き込むデータと元のデータとを受け取り、元データの値が正しければ書き込みデータとの交換、設定を行う処理である。 lock transaction receives the data and the original data to be written from the host PC, if it is correct the original data exchange with the write data, a process for setting. 次に、戻りとなる。 Then, the return.
図39はwriteトランザクション処理を示したフローチャートでプリンタのユニット空間への書き込み処理を表す。 Figure 39 represents the process of writing to the unit space of the printer in flow chart showing a write transaction processing. ステップS4021で非同期パケットのdestination offsetがprint. destination offset of the asynchronous packet is print in step S4021. loginを示しているかどうかをチェックする。 To check whether or not the show the login.
非同期パケットは図22に示されdestination offsetにはアドレスがセットされる。 Asynchronous packets to destination offset shown in FIG. 22 address is set. このアドレスがプリンタのユニット空間の特定のアドレスを示しており、このアドレスによりホストPCからの指定内容を知ることができる。 This address indicates a specific address of the unit space of the printer, it is possible to know the specified contents from the host PC by this address. print. print. loginはホストPCがプリンタに対して印字を行う際にまず初めの処理として行われあるホストPCが特定のプリンタを使用するための宣言となる。 login is the declaration to the host PC that performed as the first place the process when the host PC to print to the printer to use a particular printer.
正しく宣言されたプリンタは以降宣言したホストのコマンドに対してのみ応答する。 Only responds to properly declared printer of the host that declaration after the command. これはプリンタが複数のホストから同時に指示を受けないようにするためである。 This is because the printer is prevented had instructions simultaneously from multiple hosts. ステップS4021でdestination offsetがprint. destination offset is print in step S4021. loginを示していればステップS4022へ進み、すでにprint. If shows the login process proceeds to step S4022, already print. loginがオンであるかどうかをチェックする。 login to check whether it is turned on. すでにloginされている場合このパケットは無効であるためステップS4023へ進み、invaildを設定する。 Already this packet if it is login proceeds to step S4023 because it is invalid, sets the invaild.
次に、ステップS40214へ進み、invaildの認識パケットを送信し、戻りとなる。 Then, the process proceeds to step S40214, and sends the recognized packet invaild, the return. ステップS4022でprint. print in step S4022. loginがオンでなければ、ステップS4024へ進み、login_IDをセットする。 If the login is not turned on, the process proceeds to step S4024, to set the login_ID. login_IDは非同期パケット図22のdestination_IDで示されるホストのIDノード番号である。 login_ID is an ID node number of hosts represented by destination_ID asynchronous packet Figure 22. 以降の非同期パケット処理ではlogin_IDと等しいIDのホストPCのパケットのみを処理する。 Later is an asynchronous packet processing processes only packets the host PC equal ID and login_id.
次に、ステップS4025へ進み、print. Next, the process proceeds to step S4025, print. loginをオンとする。 To turn on the login. 正しくloginできたのでステップS4026へ進み、vaildを設定する。 Properly so I was able to login the process proceeds to step S4026, to set a vaild. 次に、ステップS40214へ進み、vaildの認識パケットを送信し、戻りとなる。 Then, the process proceeds to step S40214, and sends the recognized packet vaild, the return. ステップS4021でdestination offsetがprint. destination offset is print in step S4021. loginでない場合、ステップS4027へ進み、print. If this is not the login, the process proceeds to step S4027, print. loginがオンであるかどうかをチェックする。 login to check whether it is turned on. print. print. loginがオンでない場合loginしていないのにlogin以外のパケットが送られてきたことになるので、ステップS4029へ進み、invaildを設定する。 Since the login will be is to not login if it is not on the packet other than the login has been sent, the process proceeds to step S4029, to set the invaild.
次に、ステップS40214へ進み、invaildの認識パケットを送信し、戻りとなる。 Then, the process proceeds to step S40214, and sends the recognized packet invaild, the return. ステップS4027でprint. print in step S4027. loginがオンならばステップS4028へ進み、パケット図22のsource_IDとlogin_IDが等しいかをチェックする。 login is if turned proceeds to step S4028, it is checked whether source_ID and login_ID packets Figure 22 are equal. 等しくない場合loginしたホスト以外からのパケットであるため無効となりステップS4029へ進み、invaildを設定する。 If not equal the packet from other than the host that login for the process proceeds to step S4029 becomes invalid, it sets the invaild.
次に、ステップS40214へ進み、invaildの認識パケットを送信し、戻りとなる。 Then, the process proceeds to step S40214, and sends the recognized packet invaild, the return. ステップS4028でsource_IDとlogin_IDが等しい場合、ステップS40210へ進み、destination offsetがchannelを示しているかどうかをチェックする。 If source_ID and login_ID are equal in step S4028, the flow advances to step S40210, destination offset is checked whether shows channel. channelはアイソクロナスパケットの転送で使用されるchannel番号を示している。 channel indicates the channel number used for transmission of isochronous packets.
channelであればステップS40211へ進み、channel NOをセットする。 If the channel proceeds to step S40211, to set the channel NO. 次に、有効なパケットだったのでステップS40213へ進み、vaildを設定する。 Then, because it was valid packet proceeds to step S40213, it sets the vaild.
次に、ステップS40214へ進み、vaildの認識パケットを送信し、戻りとなる。 Then, the process proceeds to step S40214, and sends the recognized packet vaild, the return. ステップS40210でchannelの指定でない場合、ステップS40212へ進み、destination offsetがprint. If this is not the designated channel in step S40210, the process proceeds to step S40212, destination offset the print. startを示しているかどうかをチェックする。 To check whether the shows start. print. print. startであればステップS40212へ進み、print. If the start the process proceeds to step S40212, print. startをセットする。 To set the start. ステップS40213へ進み、vaildを設定する。 The process proceeds to step S40213, to set a vaild. 次に、ステップS40214へ進み、vaildの認識パケットを送信し、戻りとなる。 Then, the process proceeds to step S40214, and sends the recognized packet vaild, the return.
図40はreadトランザクション処理を示したフローチャートでまず、ステップS4031でdestination offsetで示されるアドレスからdata_length図22で示される大きさのデータをdata_fieldで示される領域にセットしたパケットを作成する。 Figure 40 is first in the flow chart showing the read transaction processing, to create a packet set in a region indicated the size of the data shown from the address indicated by the destination offset in step S4031 in data_length diagram 22 in data_field. つぎに作成したパケットを指示されたホストに送信する。 Then transmitted to the host instructed to have created packet.
以上図38から図40で非同期パケット(ASYNCパケット)に対する処理を説明した。 It described a process for the asynchronous packet (ASYNC packet) in Fig. 38 Fig. 40 from above. これらのパケットによりイメージデータを受け取る間での各種設定処理が実行される。 Various setting process between receiving the image data by these packets is performed.
図41は同期パケット(ISOパケット)処理の詳細を示したフローチャートでホストPCからイメージのデータをアイソクロナスパケットとして受け取り印字の動作を行う。 Figure 41 performs the operation of receiving the print data of the image from the host PC a flow chart showing details of the synchronization packet (ISO packet) processing as an isochronous packet. ISOパケットの処理はprint. Processing of the ISO packet is print. startがセットされた後行われ、まずステップS4041でprint. start been conducted after it has been set, first print in step S4041. readyフラグをセットする。 To set the ready flag. print. print. readyフラグはアイソクロナスパケットの受け取り準備が完了したことを示し、印字が行えることを示している。 ready flag indicates that preparation for the reception of the isochronous packet has been completed, indicating that printing can be performed.
次に、ステップS4042へ進み、LK_DATA. Next, the process proceeds to step S4042, LK_DATA. indがセットされたかどうかをチェックする。 ind to check whether it has been set. LK_DATA. LK_DATA. indは図27で示されたリンクレイアがアイソクロナスパケットを受け取ったかどうかを示している。 ind link Leia shown in FIG. 27 indicates whether the received isochronous packet. アイソクロナスパケットが受け取られるとLK_DATA. If the isochronous packet is received LK_DATA. indがセットされる。 ind is set. ステップS4042でLK_DATA. LK_DATA in step S4042. indがセットされていなければ、ステップS4043へ進み、非同期パケットを受けているかどうかをチェックする。 If ind is not set, the process proceeds to step S4043, to check whether the received asynchronous packet.
このチェックはTR_DATA. This check is TR_DATA. indで行われ、同期パケット処理中の非同期パケットの受け取りは行わないため、TR_DATA. Because place in ind, receipt of an asynchronous packet in the synchronous packet processing is not performed, TR DATA. indがオンであればステップS4044へ進み、invaildを設定する。 ind is if it is on the process proceeds to step S4044, to set the invaild. 次に、ステップS4045へ進み、invaildの認識パケットを送信する。 Then, the process proceeds to step S4045, and transmits the recognition packets invaild. 次に、ステップS4046へ進み、印字データの作成処理を行う。 Then, the process proceeds to step S4046, performs processing of creating the print data.
印字データの作成処理はインクエジェットプリンタであれば1ラインに印字するイメージデータをヘッドの形式に合わせて展開する。 Process of creating the print data to expand to fit the image data to be printed on one line if the ink d jet printer in the form of the head. LBPのようなページプリンタでは1ページ分の印字データをページメモリに展開する。 In the page printer, such as the LBP to expand the print data of one page in the page memory. 次に、ステップS4047へ進み、packet. Next, the process proceeds to step S4047, packet. lastがオンかどうかをチェックする。 last it is checked whether or not on. packet. packet. lastホストとPCから送られてくるISOパケットの最終パケットであるかどうかを示したフラグで、packet. last host and a flag showing whether the last packet of the sent come ISO packet from PC, packet. lastがオンでなければステップS4042へ戻り繰り返しとなる。 last is repeatedly returns to step S4042 if it is not turned on.
ステップS4048でpacket. packet in step S4048. lastがオンならばステップS4048へ進み、print. last is if turned on the process proceeds to step S4048, print. readyフラグをリセットし戻りとなる。 ready flag becomes reset to return to. ステップS4042でLK_DATA. LK_DATA in step S4042. indがセットされていなければステップS40410へ進み、ISOパケットを取得する。 ind advances to step S40410 if it is not set, to get the ISO packet.
アイソクロナスパケットは図24に示される。 Isochronous packet is shown in Figure 24. ステップS40410で受け取ったISOパケットのイメージデータ部分data_filed図24を一時的蓄えるバッファにセットする。 Set temporarily storing buffer image data portion data_filed Figure 24 ISO packet received in step S40410. data_filedに格納されているデータが印字のイメジデータになる。 Data stored in data_filed is Imeji data printing. 次に、ステップS40412へ進み、最終のISOパケットであるかどうかをチェックする。 Next, the process proceeds to step S40412, to check whether it is the last of the ISO packet. この判定はアイソクロナスパケット図24のsyにセットされた値で行われ、判定することができる。 This determination is performed in the value set in the sy of the isochronous packet 24, it can be determined.
ホストPCは最終のISOパケットには他のパケットとは異なる値をsyに設定する。 The host PC is the final ISO packet set different values for sy from the other packets. ステップS40412で最終パケットでなければステップS4042へ戻り、繰り返しとなる。 If the last packet returns to step S4042 at step S40412, the repetition. ステップS40412で最終パケットであればステップS40413へ進み、packe. If it is the last packet proceeds to step S40413 in step S40412, packe. lastをオンとしステップS4042へ戻り、繰り返しとなる。 last ON and switching back to step S4042, the repetition.
図42に印字データの作成処理のフローチャートを示す。 Figure 42 shows a flowchart of the creation process of the print data. まずステップS4051でLK_DATA. First LK_DATA in step S4051. indがオンかどうかをチェックする。 ind it is checked whether or not on. オンであればISOパケットがあるので印字データ作成処理を中断して戻りとなる。 Because if ON is ISO packet becomes the return interrupt the print data creation processing. ステップS4051でLK_DATA. LK_DATA in step S4051. indがオンでなければ、ステップS4053へ進み、TR_DATA. If ind is not on, the process proceeds to step S4053, TR_DATA. indがオンかどうかをチェックする。 ind it is checked whether or not on. オンであればASYNCパケットがあるので印字データ作成処理を中断して戻りとなる。 Because if ON is ASYNC packet becomes the return interrupt the print data creation processing.
ステップS4053でTR_DATA. TR_DATA in step S4053. indがオンでなければステップS4054へ進み、バッファ内にイメージデータがあるかどうかをチェックする。 ind advances to step S4054 if it is not turned on, to check whether there is image data in the buffer. データがなければ戻りとなる。 If there is no data the return. ステップS4054でデータがあれば、ステップS4055へ進み、バッファからデータを取り出す。 If there is data in step S4054, the flow advances to step S4055, retrieving data from the buffer. バッファから取り出されたデータはイメージのデータとラインフィードなどの各種データから厚生される。 Data retrieved from the buffer is welfare from various data such as image data and line feed. ステップS4056でコマンドかどうかを判定し、コマンドであればステップS4057へ進み、各種コマンドの処理を実行する。 It determines whether the command in step S4056, if the command proceeds to step S4057, executes the processing of various commands.
次に、ステップS4051へ戻り繰り返しとなる。 Then, the repeated returns to step S4051. ステップS4056でコマンド以外の場合ステップS4058へ進み、イメージデータの処理を行う。 If other than the command proceeds to step S4058 at step S4056, it performs the processing of image data. イメージデータの処理で印字できるデータへの加工が行われる。 Processing into data that can be printed in the processing of the image data. 次に、ステップS4051へ進み、繰り返しとなる。 Next, the process proceeds to step S4051, the repetition.
図43は非同期データ処理(ASYNCデータ)処理の詳細を示したフローチャートであり、ホストPCからイメージのデータをアシンクロナスパケットとして受け取り印字の動作を行う。 Figure 43 is a flow chart showing an asynchronous data processing (ASYNC data) processing details, the operation of receiving the print data of the image as an asynchronous packet from the host PC.
ASYNCデータの処理は、print. Processing of ASYNC data, print. startがセットされた後は、まず、ステップS4061でprint. After the start has been set, first, print in step S4061. readyフラグをセットする。 To set the ready flag. 前記print. The print. readyフラグは、アシンクロナスデータの受け取り準備が完了したことを示し、印字が行えることを示している。 ready flag indicates that the preparation for the reception of the asynchronous data has been completed, indicating that printing can be performed.
次に、ステップS4062へ進み、TR_DATA. Next, the process proceeds to step S4062, TR_DATA. indがセットされたかどうかをチェックする。 ind to check whether it has been set. TR_DATA. TR_DATA. indは、図27で示されたトランザクションレイヤがアシンクロナスパケットを受け取ったかどうかを示している。 ind, the transaction layer shown in FIG. 27 indicates whether the received asynchronous packet. アシンクロナスパケットを受け取られると、TR_DATA. When received the asynchronous packet, TR DATA. indがセットされる。 ind is set.
ステップS4062でTR_DATA. TR_DATA in step S4062. indがセットされていなければ、ステップS4063へ進み、印字データの作成処理を行う。 If ind has been set, the process proceeds to step S4063, it performs the process of creating the print data. 印字データの作成処理は、インクジェットプリンタであれば、1ラインに印字するイメージデータをヘッドの形式に合わせて展開する。 Process of creating the print data, if the ink-jet printer, to expand the combined image data to be printed on one line in the form of a head. また、LBPのようなページプリンタであれば、1ページ分の印字データをページメモリに展開する。 Further, if the page printer such as LBP, deploying one page of print data in the page memory.
次に、ステップS4064へ進み、packet. Next, the process proceeds to step S4064, packet. lastがオンかどうかをチェックする。 last it is checked whether or not on. packet. packet. lastは、ホストPCから送られてくるASYNCパケットの最終パケットであるかどうかを示したフラグで、packet. last is a flag showing whether the final packet of the ASYNC packet transmitted from the host PC, packet. lastがオンでなければ、ステップS4062に戻り繰り返しとなる。 If the last is on, the repeated returns to the step S4062.
ステップS4064のチェックでpacket. packet in the check of step S4064. lastがオンならば、ステップS4065に進み、print. If the last is on, the process proceeds to step S4065, print. readyフラグをリセットして戻りとなる。 A return to reset the ready flag.
また、ステップS4062でTR_DATA. In addition, TR_DATA in step S4062. indがセットされていなければ、ステップS4066へ進み、ASYNCパケットを取得する。 If ind is not set, the process proceeds to step S4066, acquires the ASYNC packet. アシンクロナスパケットは、図22に示される。 Asynchronous packet is shown in Figure 22.
次に、ステップS4067へ進み、validの認識パケットを送信する。 Then, the process proceeds to step S4067, and transmits the recognition packet valid. ステップS4068で受け取ったASYNCパケットのイメージデータ部分data_filed(図22)を一時的に蓄えるバッファにセットする。 Storing image data portion data_filed of ASYNC packet received in step S4068 (Fig. 22) temporarily sets a buffer. data_filedに格納されているデータ印字のイメージデータになる。 Made in the image data of the data printing that is stored in the data_filed.
次に、ステップS4069へ進み、最終のASYNCパケットであるかどうかをチェックする。 Then, the process proceeds to step S4069, checks whether the last ASYNC packet. ステップS4069のチェックの結果、最終パケットでなければ、ステップS4062へ戻り、繰り返しとなる。 As a result of the check in step S4069, if the last packet, the process returns to step S4062, the repetition. また、ステップS4069のチェックの結果が最終パケットであればステップS4070へ進み、packet. Further, as a result of the check in step S4069 proceeds to step S4070 if it is the last packet, packet. lastをオンとしてステップS4062へ戻り、繰り返しとなる。 The last as on return to step S4062, the repetition.
以上、図41、図42及び図43の処理によりホストPCから送られてくるISOパケット、ASYNCパケットを処理しイメージデータと各種コマンドの処理を行って印字を実行する。 Above, Figure 41, executes the printing performed by the processing of FIGS. 42 and 43 ISO packet transmitted from the host PC, to process the ASYNC packet processing of the image data and various commands.
本発明は複数の機器(例えば、ホストコンピュータ、インタフェース機器、リーダ、プリンタ等)から構成されるシステムに適用しても1つの機器からなる装置に適用しても良い。 The present invention is a plurality of devices (e.g., host computer, interface device, reader, printer, etc.) may be applied from the applying composed from one equipment unit to a system constituted.
また、前述した実施形態の機能を実現するように各種のデバイスを動作させるように、前記各種デバイスと接続された装置あるいはシステム内のコンピュータに対し、前記実施形態の機能を実現するためのソフトウェアのプログラムコードを供給し、そのシステムあるいは装置のコンピュータ(CPUあるいはMPU)に格納されたプログラムに従って前記各種デバイスを動作させることによって実施したものも、本発明の範疇に含まれる。 Further, to operate the various devices to realize the functions of the above, with respect to the various devices and connected devices or computers in the system, the software for realizing the functions of the embodiments supplying the program code, even those implemented by operating the various devices in accordance with the system or apparatus of a computer program stored in the (CPU or MPU), are included in the scope of the present invention.
また、この場合、前記ソフトウェアのプログラムコード自体が前述した実施形態の機能を実現することになり、そのプログラムコード自体、およびそのプログラムコードをコンピュータに供給するための手段、例えばかかるプログラムコードを格納した記憶媒体は本発明を構成する。 In this case, the program code itself of the software realizes the functions of the above, and stores the program codes themselves and means for supplying the program code to the computer, for example, the program code storage medium constitute the present invention. かかるプログラムコードを記憶する記憶媒体としては、例えばフロッピーディスク、ハードディスク、光ディスク、光磁気ディスク、CD−ROM、磁気テープ、不揮発性のメモリカード、ROM等を用いることができる。 As the storage medium for storing the program code may be, for example, a floppy disk, a hard disk, optical disk, CD-ROM, magnetic tape, nonvolatile memory card, a ROM or the like.
また、コンピュータが供給されたプログラムコードを実行することにより、前述の実施形態の機能が実現されるだけでなく、そのプログラムコードがコンピュータにおいて稼働しているOS(オペレーティングシステム)あるいは他のアプリケーションソフト等の共同して前述の実施形態の機能が実現される場合にもかかるプログラムコードは本発明の実施形態に含まれることは言うまでもない。 Further, by executing the program codes by the computer is supplied, not only the functions of the embodiments mentioned above are realized, OS (operating system) program code running in the computer or another application software or the like program code according even if jointly functions of the foregoing embodiments of the realized be included in embodiments of the present invention of course.
さらに、供給されたプログラムコードがコンピュータの機能拡張ボードやコンピュータに接続された機能拡張ユニットに備わるメモリに格納された後、そのプログラムコードの指示に基づいてその機能拡張ボードや機能拡張ユニットに備わるCPU等が実際の処理の一部または全部を行い、その処理によって前述した実施形態の機能が実現される場合にも本発明に含まれることは言うまでもない。 Furthermore, after the supplied program code is stored in a memory provided in a function expansion unit connected to a function expansion board of a computer or computer, the function expansion board or function expansion unit based on instructions of the program code CPU running on the computer performs part or all of the actual processing so it is needless to say that are included in the present invention when the functions of the above-described embodiments are realized by those processes.
本発明は、サイクルマスタの判定方法には限定されるものではない。 The present invention is not limited to the method of determining the cycle master. また、本発明は1394と呼ばれるインターフェース以外のインターフェース、例えば、USBと呼ばれるインターフェースでも適用できる。 Further, the present invention is an interface other than the interface called 1394, for example, can be applied at interface called USB. また、同期転送を行う場合に、同期転送のためのパケットを一定時間間隔で転送するインターフェースであれば、全て本発明を適用することができる。 Further, when the synchronous transfer, if an interface for transferring packets for synchronous transfer at fixed time intervals, can be applied to this invention.
本発明は前述したように、本発明によれば、 シリアルバス上にサイクルマスタとなるノードが存在する場合には同期転送でデータ転送を行い、また、サイクルマスタとなるノードが存在しない場合には非同期転送でデータ転送を行うようにすることができる。 The invention as described above, according to the present invention, data is transferred in the synchronous transfer if the node to be the cycle master on the serial bus is present, and if there is no node to be the cycle master it is possible to perform data transfer in the asynchronous transfer. これにより、サイクルマスタを内蔵しない機器同士が接続されてもデータ転送を行うことができるので、サイクルマスタを内蔵しない機器同士が接続されてしまう場合に生じる不都合を考慮することなく、サイクルマスタ機能を省略することができる。 Thus, it is possible to perform even the data transfer is connected between devices without integral cycle master, without considering the disadvantages that arise when between devices without integral cycle master will be connected, the cycle master function it can be omitted. したがって、例えば、プリンタにサイクルマスタ機能を内蔵しないようにすることで、プリンタのコストを低く押さえることが可能となる。 Thus, for example, by preventing an internal cycle master function to the printer, it is possible to suppress the cost of the printer low.
【図1】本発明の実施形態を示し、機器接続の構成を示した図である。 shows an embodiment of the present invention and shows the configuration of the device connection.
【図2】本発明の実施形態を示し、ネットワークの構成を示した図である。 Figure 2 shows an embodiment of the present invention and shows the configuration of the network.
【図3】本発明の実施形態を示し、1394シリアルバスの構成要素を示した図である。 Figure 3 shows an embodiment of the present invention and shows the components of the 1394 serial bus.
【図4】本発明の実施形態を示し、1394シリアルバスのアドレス空間を示した図である。 Figure 4 shows an embodiment of the present invention and shows the 1394 serial bus address space.
【図5】本発明の実施形態を示し、1394シリアルバス・ケーブルの断面を示した図である。 Figure 5 shows an embodiment of the present invention and shows a cross section of the 1394 serial bus cable.
【図6】本発明の実施形態を示し、DS−L ink符号か方式を示した図である。 6 shows an embodiment of the present invention and shows the DS-L ink code or method.
【図7】本発明の実施形態を示し、バスリセットからノードID決定までのシーケンスを示した図である。 7 shows an embodiment of the present invention and shows a sequence from the bus reset to node ID determination.
【図8】本発明の実施形態を示し、バスリセットからノードID決定までのシーケンスを示した図である。 8 shows an embodiment of the present invention and shows a sequence from the bus reset to node ID determination.
【図9】本発明の実施形態を示し、バスリセットからノードID決定までのシーケンスを示した図である。 9 shows an embodiment of the present invention and shows a sequence from the bus reset to node ID determination.
【図10】本発明の実施形態を示し、ネットワークの動作を示した図である。 [Figure 10] shows an embodiment of the present invention and shows the operation of the network.
【図11】本発明の実施形態を示し、CSRアーキテクチャの機能を示した図である。 11 shows an embodiment of the present invention and shows the function of the CSR architecture.
【図12】本発明の実施形態を示し、シリアルバスに関するレジスタを示した図である。 [Figure 12] shows an embodiment of the present invention and shows the registers related to the serial bus.
【図13】本発明の実施形態を示し、シリアルバスのノード資源に関するレジスタを示した図である。 [Figure 13] shows an embodiment of the present invention and shows the registers related to node resources of the serial bus.
【図14】本発明の実施形態を示し、シリアルバスのConfiguration Romの最小形式を示した図である。 [Figure 14] shows an embodiment of the present invention and shows the minimum format of the serial bus Configuration Rom.
【図15】本発明の実施形態を示し、シリアルバスのConfiguration Romの一般形式を示した図である。 [Figure 15] shows an embodiment of the present invention and shows the general form of the serial bus Configuration Rom.
【図16】本発明の実施形態を示し、シリアルバスのバス使用要求を示した図である。 [Figure 16] shows an embodiment of the present invention and shows a bus use request of a serial bus.
【図17】本発明の実施形態を示し、シリアルバスのバス使用許可を示した図である。 [Figure 17] shows an embodiment of the present invention and shows the bus use permission of the serial bus.
【図18】本発明の実施形態を示し、シリアルバスのアービトレーションの流れを示したフローチャートである。 [Figure 18] shows an embodiment of the present invention, is a flowchart showing the flow of the serial bus arbitration.
【図19】本発明の実施形態を示し、シリアルバスのトランザクションレイアのサービスを示した図である。 [Figure 19] shows an embodiment of the present invention and shows a service transaction Leia serial bus.
【図20】本発明の実施形態を示し、シリアルバスのリンクレイアのサービスを示した図である。 [Figure 20] shows an embodiment of the present invention and shows the service serial bus link Leia.
【図21】本発明の実施形態を示し、アシンクロナス転送の遷移状態を示した図である。 [Figure 21] shows an embodiment of the present invention and shows a transition state of the asynchronous transfer.
【図22】本発明の実施形態を示し、アシンクロナス転送のパケットフォーマットを示した図である。 [Figure 22] shows an embodiment of the present invention and shows a packet format of the asynchronous transfer.
【図23】本発明の実施形態を示し、アイソクロナス転送の遷移状態を示した図である。 [Figure 23] shows an embodiment of the present invention and shows a transition state of isochronous transfer.
【図24】本発明の実施形態を示し、アイソクロナス転送のパケットフォーマットを示した図である。 [Figure 24] shows an embodiment of the present invention and shows the packet format of isochronous transfer.
【図25】本発明の実施形態を示し、アイソクロナス転送のパケットフォーマットのフィールドの詳細を示した図である。 [Figure 25] shows an embodiment of the present invention and shows the details of the fields in the packet format of isochronous transfer.
【図26】本発明の実施形態を示し、アシンクロナス転送、アイソクロナス転送が混在した場合の遷移状態を示した図である。 [Figure 26] shows an embodiment of the present invention, asynchronous transfer is a diagram isochronous transfer is a transition state when mixed.
【図27】本発明の実施形態を示し、IEEE1394のプロトコルアーキテクチャを示した図である。 [Figure 27] shows an embodiment of the present invention and shows the IEEE1394 protocol architecture.
【図28】本発明の実施形態を示し、ホスト側での印字シーケンスを示すフローチャートである。 [Figure 28] shows an embodiment of the present invention, is a flow chart showing the printing sequence on the host side.
【図29】本発明の実施形態を示し、ホスト側での印字シーケンスを示すフローチャートである。 [Figure 29] shows an embodiment of the present invention, is a flow chart showing the printing sequence on the host side.
【図30】本発明の実施形態を示し、出力装置LBPの構成を示した図である。 [Figure 30] shows an embodiment of the present invention and shows a configuration of an output device LBP.
【図31】本発明の実施形態を示し、出力装置LBPの構成を示したブロック図である。 [Figure 31] shows an embodiment of the present invention, is a block diagram showing a configuration of an output device LBP.
【図32】本発明の実施形態を示し、インクジェット出力装置の構成を示した図である。 [Figure 32] shows an embodiment of the present invention and shows the configuration of the ink jet output apparatus.
【図33】本発明の実施形態を示し、インクジェット出力装置の構成を示したブロック図である。 [Figure 33] shows an embodiment of the present invention, is a block diagram showing the configuration of the ink jet output apparatus.
【図34】本発明の実施形態を示し、1394I/Fの基 本構成を示したブロック図である。 [Figure 34] shows an embodiment of the present invention, is a block diagram showing the basic configuration of the 1394 I / F.
【図35】本発明の実施形態を示し、Configuration Rom格納データの構成を示した図である。 [Figure 35] shows an embodiment of the present invention and shows the configuration of Configuration Rom storing data.
【図36】本発明の実施形態を示し、Configuration Rom格納データの構成を示した図である。 [Figure 36] shows an embodiment of the present invention and shows the configuration of Configuration Rom storing data.
【図37】本発明の実施形態を示し、プリンタ側での印字処理を示したフローチャートである。 [Figure 37] shows an embodiment of the present invention, is a flow chart showing the print processing in the printer side.
【図38】本発明の実施形態を示し、ASYNCパケット処理を示したフローチャートである。 [Figure 38] shows an embodiment of the present invention, is a flowchart showing the ASYNC packet processing.
【図39】本発明の実施形態を示し、Writeトランザクション処理を示したフローチャートである。 [Figure 39] shows an embodiment of the present invention, is a flowchart showing a Write transaction processing.
【図40】本発明の実施形態を示し、Readトランザクション処理を示したフローチャートである。 [Figure 40] shows an embodiment of the present invention, is a flowchart showing a Read transaction processing.
【図41】本発明の実施形態を示し、ISOパケット処理を示したフローチャートである。 [Figure 41] shows an embodiment of the present invention, is a flowchart showing the ISO packet processing.
【図42】本発明の実施形態を示し、印字データ作成処理を示したフローチャートである。 [Figure 42] shows an embodiment of the present invention, is a flowchart showing the print data creation processing.
【図43】本発明の実施形態を示し、ASYNCデータ処理を示したフローチャートである。 [Figure 43] shows an embodiment of the present invention, is a flowchart showing the ASYNC data processing.
前記サイクルマスタが前記シリアルバスにあると前記判定手段により判定された場合に、機器との間で行うデータ転送モードとして同期転送を選択し、前記サイクルマスタが前記シリアルバスにないと前記判定手段により判定された場合に、機器との間で行うデータ転送モードとして非同期転送を選択する制御手段とを有することを特徴とする情報処理装置。 When the cycle master is determined by the determination it means to be in the serial bus, select the synchronous transfer as data transfer mode performed with the equipment, by the determination unit and the cycle master is not in the serial bus If it is determined, the information processing apparatus characterized by a control means for selecting an asynchronous transfer as data transfer mode performed with the equipment.
前記取得手段により取得される前記機器の種別に従って、同期転送でデータ転送が行われる場合の帯域幅を設定する第1の設定手段とを有することを特徴とする請求項1に記載の情報処理装置。 According to a type of the device to be acquired by the acquisition unit, the information processing apparatus according to claim 1, characterized in that it comprises a first setting means for setting the bandwidth in the case where the data transfer synchronous transfer takes place .
前記取得手段により取得される前記機器の種別に従って、非同期転送でデータ転送が行われる場合のパケットサイズを設定する第2の設定手段を有することを特徴とする請求項2に記載の情報処理装置。 According to a type of the device to be acquired by the acquisition unit, the information processing apparatus according to claim 2, characterized in that it comprises a second setting means for setting a packet size when data is transferred in the asynchronous transfer.
前記サイクルマスタは、同期転送を行うために必要な同期パケットを定期的に送るノードであることを特徴とする請求項1乃至3のいずれか1項に記載の情報処理装置。 The cycle master information processing apparatus according to any one of claims 1 to 3, characterized in that a node sends periodically a synchronization packet required to perform isochronous transfer.
前記判定手段による判定結果に従って、同期転送及び非同期転送を含む複数の転送モードの中から、前記転送先の機器との間でデータ転送をする場合の転送モードを選択する選択手段とを有することを特徴とする情報処理装置。 According to the determination result by the determination means, that from a plurality of transfer modes including a synchronous transfer and asynchronous transfer, and a selection means for selecting a transfer mode when the data transfer with the transfer destination device the information processing apparatus according to claim.
前記サイクルマスタが前記シリアルバスにあると前記判定ステップで判定された場合に、複数の機器間のデータ転送に同期転送を選択し、前記サイクルマスタが前記シリアルバスにないと前記判定ステップで判定された場合に、複数の機器間のデータ転送に非同期転送を選択する制御ステップとを有することを特徴とする情報処理方法。 When the cycle master is determined in said determining step to be in the serial bus, select the synchronous transfer to the data transfer between a plurality of devices, the cycle master is determined in the determination step not to the serial bus when the information processing method characterized by a control step of selecting an asynchronous transfer for data transfer between a plurality of devices.
データ転送の転送先の機器の種別に従って、同期転送でデータ転送が行われる場合の帯域幅を設定する第1の設定ステップを有することを特徴とする請求項6に記載の情報処理方法。 According to a type of transfer destination device of the data transfer, the information processing method according to claim 6, characterized in that it comprises a first setting step of setting a bandwidth when the data transfer is performed synchronous transfer.
データ転送の転送先の機器の種別に従って、非同期転送でデータ転送が行われる場合のパケットサイズを設定する第2の設定ステップを有することを特徴とする請求項7に記載の情報処理方法。 According to a type of transfer destination device of the data transfer, the information processing method according to claim 7, characterized in that it comprises a second setting step of setting a packet size when data is transferred in the asynchronous transfer.
前記サイクルマスタは、同期転送を行うために必要な同期パケットを定期的に送るノードであることを特徴とする請求項6乃至8のいずれか1項に記載の情報処理方法。 The cycle master, an information processing method according to any one of claims 6 to 8, characterized in that a node sends periodically a synchronization packet required to perform isochronous transfer.
前記判定ステップによる判定結果に従って、同期転送及び非同期転送を含む複数の転送モードの中から、前記転送先の機器との間でデータ転送をする場合の転送モードを選択する選択ステップとを有することを特徴とする情報処理方法。 According to the determination result by the determination step, further comprising a selection step of selecting the transfer mode when the data transfer between the from among a plurality of transfer modes including a synchronous transfer and asynchronous transfer, and the transfer destination device information processing method according to claim.
前記サイクルマスタが前記シリアルバスにあると前記判定手段により判定された場合に、複数の機器間のデータ転送に同期転送を選択し、前記サイクルマスタが前記シリアルバスにないと前記判定手段により判定された場合に、複数の機器間のデータ転送に非同期転送を選択する制御手段とを有することを特徴とする情報処理システム。 When the cycle master is determined by the determination means to be in the serial bus, select the synchronous transfer to the data transfer between a plurality of devices, the cycle master is determined by the determination means that there is no the serial bus when the information processing system characterized by a control means for selecting an asynchronous transfer for data transfer between a plurality of devices.
前記取得手段により取得される前記機器の種別に従って、同期転送でデータ転送が行われる場合の帯域幅を設定する第1の設定手段とを有することを特徴とする請求項11に記載の情報処理システム。 According to a type of the device to be acquired by the acquisition unit, the information processing system according to claim 11, characterized in that it comprises a first setting means for setting a bandwidth when the data transfer is performed synchronous transfer .
前記取得手段により取得される前記機器の種別に従って、非同期転送でデータ転送が行われる場合のパケットサイズを設定する第2の設定手段を有することを特徴とする請求項12に記載の情報処理システム。 According to a type of the device to be acquired by the acquisition unit, the information processing system according to claim 12, characterized in that it comprises a second setting means for setting a packet size when data is transferred in the asynchronous transfer.
前記サイクルマスタは、同期転送を行うために必要な同期パケットを定期的に送るノードであることを特徴とする請求項11乃至13のいずれか1項に記載の情報処理システム。 The cycle master information processing system according to any one of claims 11 to 13, characterized in that a node sends periodically a synchronization packet required to perform isochronous transfer.
DE60029096T2 (en) * 2000-07-19 2007-01-18 Bull S.A. A method for remote execution of certain operations of a host system in a satellite system and related communication system.
|
2019-04-20T11:24:07Z
|
https://patents.google.com/patent/JP3927647B2/en
|
Porn
|
Computers
| 0.340896 |
wordpress
|
Who’s afraid of educated Arabs?
It has long been the case that Israel’s Arab students have performed significantly worse than their Jewish peers. The reasons for the gaps range from socio-economic disadvantages (more than half of Arab families are below the poverty line, more than three times the rate of Jewish families), to cultural biases in the standardized curricula (more lessons on Jewish heritage and religion), to the hard fact of unequal budget allocations – the state invests roughly $200 per Arab pupil annually, versus $1,000 per Jewish pupil.
However, the sharp decline in Arab students’ performance, especially as the Jewish sector remains consistent, is cause for new concern and demands action.
The figures are telling. This month, Haaretz reported on an Education Ministry study showing that in 2008, only 31.94 percent of Arab pupils passed their matriculation exams. In comparison, 59.7 percent of Jewish students passed. Even more striking is the sharp drop that took place over two years: In 2006, 50.7 percent of Arab high-schoolers qualified for matriculation certificates. Additionally, those who pass score lower than the national average on both these and the psychometric tests required for university or college admission, and as a result, 45 percent of Arab applicants are not accepted to higher education programs. Currently Arabs account for only 10 percent of students in bachelor’s programs around the country.
An international study last year allowed for a comparison between Israel’s Arab students and those in neighboring Arabic-speaking countries. The results suggested that Arab pupils in Israel might do better in a school system suited to their cultural, historical and linguistic needs.
The Trends in International Mathematics and Science Study (TIMSS) showed that Israeli pupils ranked 24th and 25th in math and science, respectively, out of the 49 participating countries across the globe. But the breakdown between Jewish and Arab students revealed vast differences. Israel’s Arab students, taken alone, scored below worldwide averages, equivalent to 37th in science and 34th in math. Compared with the last TIMSS test in 2003, Jewish students’ scores fell slightly, but Arab students’ scores fell dramatically.
Meanwhile, students in neighboring Arab countries scored higher than Israel’s Arabs in both math (Lebanon, Jordan and Syria, among others) and science (Bahrain, Syria, Tunisia and Oman, among others).
Although last year’s drop was precipitous, it was likely caused by a combination of factors that, if not dealt with, and fast, mean that we can expect to see performance continue to fall. One key problem is the physicial conditions in which Arab children study. In March, the state comptroller found that the Arab sector lacked 1,082 classrooms at the start of the 2007-08 school year.
The situation is unquestionably bad, yet one needn’t reinvent the wheel to make significant improvements. In 2008, the last education minister, Yuli Tamir, had a team of Arab civil society representatives (including Dirasat, the organization I head) and Education Ministry officials produce a detailed plan and budget for improving Arab education. They have yet to be implemented.
It would seem that as long as Arab educators, academics and policymakers are excluded from planning, there will be no improvement. The Arab minority constitutes nearly 20 percent of Israel’s population, but has little to no real influence over its own education policy, budgets, standards or curricula.
The creation of a professional Arab pedagogic council to address Arab education in Israel, in cooperation with the Education Ministry, has been proposed more than once by Arab education administrators and leaders, and the 2004 Dovrat report on education even alluded to such an idea. But the ministry has yet to consider the proposal seriously. Granting Arab society increased influence over children’s education is apparently viewed as anathema by the Israeli public.
For years, the state-religious school system – which has no shortage of conflicts with the mainstream public – has been granted its own pedagogic council that decides on a vast range of substantial educational issues. Much like the state-religious schools, Arab society is not asking to separate from the public education system in Israel, but rather to tailor its own education system to the unique identity, culture, language and history of the country’s Arab citizens.
Education should take precedence in any society, as a means of providing students with the academic tools to succeed and be productive, upstanding members of society, who can be proud of their unique identities – Jews and Arabs alike. It is sad to think that Israeli officials’ fear of granting the Arab community meaningful influence could cause the continued deterioration of its educational system – which will in turn perpetuate social injustices, alienation and exclusion, and could lead to civil unrest.
Yousef T. Jabareen is a law lecturer, and founding director of Dirasat, the Arab Center for Law and Policy, based in Nazareth.
The Israeli navy has intercepted an aid ship on its way to Gaza, pro-Palestinian activists say.
Members of the US-based Free Gaza Movement, who were on board the boat, said on Tuesday the Israeli navy threatened to open fire unless they turned the boat around.
The Israeli government denied any threats were made, or that any shots were fired, but said they warned the boat not to cross into Gazan waters.
The boat had set off from Cyprus on Monday, carrying humanitarian supplies for Gaza, which remains under an Israeli blockade.
Speaking to Al Jazeera, Caoimhe Butterly, a spokesperson for the Free Gaza movement, said: “This is the third humanitarian relief boat and solidarity mission that has been aggressively stopped by the Israeli army.
“The humanitarian situation is at crisis point. There has been a systematic and deliberate destruction of the humanitarian infrastructure of Gaza.
“We were taking medical supplies and medical equipment and limited amounts of building material … although $4 bn has been pledged to the Gaza Strip for reconstruction … no cement or building supplies are allowed in as a result of the siege.
“We need to up the ante and to mount more actions and convoys of this nature,” she said.
Obama and Netanyahu meeting at the White House.Zimbio.
U.S. President Barack Obama declared after the crucial talks with Israeli the Prime Minister Binyamin Netanyahu the last two weeks at the White House that , the Israeli settlements in the Palestinian territories should be “stopped”, and reiterated the call for a solution to the Israeli-Palestinian conflict based on the two states. He said “I think it’s not only in the interest of Palestinians but also in the interest of the Israelis,United States and the international community to find a solution on the basis of the two countries”.
Meanwhile, Obama said he would decide at the end of this year, whether Iran is serious in the talks on its nuclear program or not. “We will not talk forever”, with the Iranians. “I expect that if we start talks soon, shortly after the Iranian elections, we will have a good impression after the end of the year on whether talks were progressing in the right direction”.
In the first reaction to Obama’s statement, the Palestinian presidency: Obam’s declarations are encouraging, but expressed disappointment over the remarks of the Israeli Prime Minister Benjamin Netanyahu.
He added “We are waiting for President Abbas to meet with Obama for the reality of the situation until after the development of Palestinian and Arab policy”.
Prior to the commencement of the movement of Obama’s administration to revive the stalled peace process, say analysts, that the halo of the tension that surrounded the meeting, exaggerated, and that Netanyahu, like all other heads of the Israeli governments, in a position not only enables him to cope with the most important ally of the Jewish state, in return for his cooperation with the American administration in its quest moving towards the peace process yield results.
Solution of establishing a Palestinian state on the Palestinian occupied territories by Israel in 1967, meets the international consensus, even among the majority of Israelis, according to opinion polls. Obama’s administration is pushing, and his predecessor, former President George Bush, in order to reach a two-state solution, is the focus of efforts by the United States to achieve peace between the two sides.
Netanyahu, who leads the right-wing coalition, rejects the principle of establishing a Palestinian state, on the grounds that an independent Palestinian state would be a threat to the security of Israel, and noted that any Palestinian entity must have sovereign powers which are limited and have no army.
The U.S Administration assured since taking office in Last January, it’s based on the resolution of the two states live in peace side by side.
And since taking office six weeks ago, he promised to hold talks with the Palestinians on a the path of economic and political security.
Netanyahu described the attempts to reach a final agreement at the present time as “misleading” and “useless,” arguing that the priorities should be limited to the administrative capacity-building and economic security of the Palestinians, and to deal with Iran, which he sees an obstacle in any peace efforts of the region.
Netanyahu sees that for Washington to achieve its goals in the region, passes through the curbing Iran’s nuclear ambitions and geopolitical aspirations, prior looking in the Palestinian Israeli conflict.
And he based his claims on the Arab consensus that curbing the Islamic Republic of priorities, in view of the threats posed on the stability of the region.
Iran’s support for the “Hamas” movement, which controls the Gaza Strip, provide a sufficient justification for Netanyahu for refusing to move forward in the peace process, and even the removal of Iran aside.
For his part, Obama will argue that the rally of world to confront Iran’s aspirations will require the dissolution of the Palestinian-Israeli conflict, in the first place.
Indeed,The Obama’s administrations adopted the option of diplomacy to resolve the crisis over Iran’s nuclear program, but it did not enact the sanctions, if the government of Iran intransigence.
The Israeli government has demanded Washington to set a timetable for Iran to respond to international demands, in an attempt to prevent them from gaining more time to increase its nuclear capabilities. Netanyahu has repeatedly warned of Israel is ready to strike nuclear facilities if diplomacy failed.
Obama agreed with the leaders of Israel that the offer of negotiations will not be open to no end to the Islamic Republic, but he will give more time to get a chance success of diplomacy to take a serious part this time.
Israel agreed not to launch an attack on Iran, such as consultation with the U.S. ally, had warned the military and security leaders that military action will only further destabilize the region.
Obama says that the Department continue to expand settlements in the West Bank, and the movement of the Jewish state to expand the scope of its control over East Jerusalem, has undermined the stability and opportunities for moving the peace process.
Israeli governments have not responded to international appeals to stop the expansion of Jewish settlements.
And the Israeli prime minster wonders of the urgency to declare a Palestinian state, amid a rift, it is hoped, in the fabric of Palestine, where the lack of Palestinian Authority President Mahmoud Abbas, the political power to be a partner in peace.
The opinion poll showed that Abbas, whose mandate expired last January, Hamas will lose face in case of an election now.
Prompted the Israeli military campaign on the sector at the beginning of the year, the Palestinian-Israeli conflict, to the priority the Bush administration, blockade imposed by Israel on Gaza, as well as fighting in Palestinian politics, has prevented the arrival of 4.5 billion dollars, provided by donor countries for the reconstruction of the sector.
Israel’s prime minister has said that Jewish settlements in the occupied West Bank will continue to be expanded.
“I have no intention to construct new settlements,” Binyamin Netanyahu was quoted by officials as telling his cabinet on Sunday.
“… but it makes no sense to ask us not to answer to the needs of natural growth and to stop all construction,” he added.
Barack Obama, the US president, pressed Netanyahu to halt all settlement activity when the two men met in Washington last week.
About 500,000 Jews live in settlement blocs and smaller outposts built in the West Bank and Arab East Jerusalem, territory captured by Israel in the 1967 Middle East War.
Netanyahu also told the cabinet that the government would move settlers living in the outposts it considers to be illegal under Israeli law.
Last week an outpost near the town of Ramallah was demolished and Ehud Barak, the defence minister, told reporters that Israel was planning to dismantle 22 others.
However, the Peace Now group says that more than 50 outposts have been erected since March 2001 and more than 100 are currently in existence.
All settlements are considered illegal under international law and US and European negotiators see them as a major obstacle to achieving a peace deal with the Palestinians.
“What we are interested in seeing is that Israel should implement its obligations under the road map, which includes halting settlement activity and expansion in all its forms,” Mohammed Shatayyeh, the Palestinian public works and housing minister, said on Sunday.
He said that if Israel wanted to show it was serious about peace talks with the Palestinians then it should stop providing utilities, such as water and electricity, to settlements and deny them state funding.
But Mark Regev, an Israeli government spokesman, said the fate of existing settlements should be decided at any such negotiations.”In the interim period, we have to allow normal life in those communities to continue,” he said.
Yesha, the main Israeli setttler organisation, criticised Netanyahu’s comments, saying that he “should respect the wishes of voters who voted en masse for parties that are in favour of continuing construction in Judea and Samaria,” as Israelis refer to the West Bank.
At Sunday’s cabinet meeting, ministers also approved a draft law banning commemoration of the Naqba, or “catastrophe” as it is referred to by Arabs, when hundreds of thousands of Palestinians left their homes during the creation of Israel in 1948.
The draft law is scheduled to be submitted for parliamentary approval next week and will propose punishment of up to three years in prison, an official told the AFP news agency.
The law was brought forward at the instigation of the ultra-nationalist Yisrael Beitenu party of Avigdor Lieberman, the foreign minister.
Yisrael Beitenu, Israel’s third biggest party with 15 of the 120 seats in parliament, targeted Israel’s Arab minority during this year’s election campaign, adopting the slogan “No Citizenship Without Loyalty.”About 1.2 million Palestinians live inside Israel.
They are descended from 160,000 Palestinians who remained on their land after the establishment of Israel in 1948.
Easing the siege or passing the buck?
Rupa Huq no longer “supporter” of anti-Palestinian group.
Engaged couple's Gaza home destroyed just three weeks before their wedding.
College accepted large sum from entrepreneur and politician George Weidenfeld.
Israel's siege means that young people in Gaza have no future.
Not even Israel advocates want his plan to see the light of day.
|
2019-04-25T04:00:26Z
|
https://3071km.wordpress.com/category/uncategorized/
|
Porn
|
Science
| 0.369011 |
tripod
|
KSHE Now in their 35th year! KSHE95 in St. Louis, Missouri plays great Classic Rock music. The format has remained virtually unchanged since beginning in the fall of 1967. Check out the KSHE Klassics show every Sunday morning from eight until noon with the U-Man. This show features artists and songs from The Klassics List.
KWK 106FM This site contains a lot of information about KWK 106FM, a now defunct classic rock station in St. Louis Missouri.
101 KGB This is one of the top classic rock stations in the San Diego area.
KHITS 96 If you grew up listening to St. Louis radio over the years, this is the station for you. They have many well known St. Louis air personalities working at the station like, Mark Klose, Radio Rich Dalton, J.C. Corcoran, John Ulett, and more. They also regularly play a good number of the classic rock songs on The Klassics List.
KQRS Radio 92, from Minneapolis, Minnesota. They have a great "Homegrown" show featuring local bands from the area. They recently featured Gypsy on the show and the group performed a couple of acoustic numbers.
K-ROCK Edmonton, Alberta, Canada. This station was recommended to me by the station's webmaster.
The Bear 104FM Wichita Falls, Texas. This station was recommended to me by one of the station's listeners. After checking out their site, it is obvious they play some great classic rock music.
WDVE FM Pittsburgh, Pennsylvania USA This station comes recommended by a friend on the internet.
100.7FM - KGMO Cape Girardeau, Missouri USA I only hear this station when I drive to St. Louis, but every time I listen, I have heard several classic rock songs from The Klassics List.
98.5FM - WNCX Cleveland's Classic Rock Station - Cleveland, Ohio USA A friend of mine who lives in the Cleveland, Ohio area has sent me a number of tapes from this station. Every morning, they carry The Howard Stern Show and then play classic rock music the rest of the day. Michael Stanley is on in the afternoons from 3 pm - 7 pm.
Classic Rock 92.5FM KZPS Dallas, Texas USA This is the place for classic rock songs from the sixties and seventies in Dallas/Ft. Worth, Texas.
KGON Classic Rock 92.3FM Portland, Oregon USA Another great classic rock station.
CFJB - Rock 95 95.7, rocking Barrie, Ontario.
KLOS 95.5 in Los Angeles, "Southern California's best rock."
KMGN - The Mountain 93.9, northern Arizona's home of Classic Rock, from Flagstaff.
KSAN 107.7, broadcasting live from San Mateo, California.
KTGL 92.9, for all of Lincoln, Nebraska.
KZEL 96.1, Oregon's Classic Rock, from Eugene Oregon.
WSTZ - Z106 106.7, rocking all of Jackson, Mississippi.
ShoutCast A friend of mine told me about this site. If you are interested in setting up your very own radio station broadcasting on the internet, this site has the software to do it. They also have a variety of links to "stations", some of which feature classic rock music.
Reel Radio While not an actual radio station, this site has airchecks from a large variety of radio stations across North America. The airchecks can be downloaded and played using Real Audio Player. You'll find airchecks from the sixties and seventies from Wolfman Jack, WLS, and more. If you are searching for a particular DJ or station, this site is definitely worth checking out.
List of Radio Stations Another great site for locating radio stations throughout North America and Canada.
Copyright © 1996-2012 Rock Classics. All rights reserved.
|
2019-04-20T14:31:25Z
|
http://rockclassics.tripod.com/stations.html
|
Porn
|
Home
| 0.094125 |
wordpress
|
Minor bragging first of all.
A bit of whining. Its impossible to get an instance for any Vanilla content at the moment, even at 3.45am so my planed post on another of my favourite old world instances will have to wait until they either upgrade their servers or kick some Horde off it.
Finally, what is it with people sending dragons and orphans through the mail service. Perhaps more importantly which is worse? cramming a small scared but curious orphan into a padded envelope or squishing up a rather large and fire breathing dragon into one. I’m tending toward the orphan because we already know Brann is slightly crazy but what on earth was the matron thinking.
Oh and Oracle hatchling > all. Even though he has fangs, what looks like someone else’s bones as a facial decoration and a tendency to eat bugs between meals.
Now dont get me wrong, I love pvp as much as the next person, but I really dont understand the mentality of people who just hang out at zones 50 levels lower than those they should be questing, killing greys. Today we visited Tarren Mill to discover a lv 70 hunter running around killing npcs and baby horde. Then we moved to STV to start doing Tamung’s weapon quest and low and behold there is another 70, a warrior this time again killing lowbies.
Which leads me to the reason for this post. Someone posted whilst ranting on the official forums that people who gank lowbies all have sucky arena ratings and fail at fighting their own levels so take out their lack of epeen on lv 20s. Now I tend to take everything i read on said forums with a pinch of salt, after all people are usually too busy complaining, fighting or trying to protect their own bruised egos but that one comment got me thinking. Luckily I keep a stack of postit notes by the computer and I made a note of all their names and checked their amoury profiles… would you believe it… their average rating was 1300 in 2 v 2.
On a slightly more bragging note, we had our first proper pvp today. Running around in 1000 needles finishing a couple of quests a lv 41 squid mage decided to be a hero and try and aoe two little orcs. He died and gave 3 honor points, my first 3 to be exact. Your first always needs to be immortalised in print so hello Sötsomsocker.
I have to admit the reason I dont lowbie gank is simply because you look so stupid when it all goes wrong. When your target/s fight back, kite you to guards, produce 70s out of the bushes or anything else sneaky. On the other hand, managing to be a lowbie who successfully kills a skull by clever use of terrain/tactics/pots is one great feeling.
|
2019-04-19T08:20:56Z
|
https://harpysnest.wordpress.com/category/bragging/
|
Porn
|
Games
| 0.433017 |
indiana
|
Dirlam, Joel B. and Kahn, Alfred E. (1953) "Integration and Dissolution of the A & P Company," Indiana Law Journal: Vol. 29 : Iss. 1 , Article 1.
|
2019-04-25T10:17:56Z
|
https://www.repository.law.indiana.edu/ilj/vol29/iss1/1/
|
Porn
|
Business
| 0.859663 |
wordpress
|
Back in 2016, I didn’t think I could write a book like Riverland. Before that, I knew I never would. Then, in 2016 and 2017, I did (over and over again) — with the help and encouragement of many. … I rewrote it until I could tell Eleanor and Mike’s story in a way that was real and true.
In a little over a week, Riverland goes out in the world — my first middle grade novel. A portal fantasy about stories and sisterhood, surviving a violent household, magic and dreams, reality and truth, a pony made out of old towels, a beach glass and driftwood heron, and monsters.
It’s a first for me in many ways, and it was far from easy to write. I hope that it lasts. I hope that it’s there for those who need it. I hope for everyone reading it that the adventure running through the book puts something good in the world.
The short version is this: Riverland is going so save some kids (and adults). That’s because it uses fantasy to portray an all-too-recognizable kind of household: a place where anger rules, and kids learn to hide themselves from it.
Booklist gave Riverland a Star!: “A narrative that challenges the stereotypical stories of domestic violence, this is painful and heartwarming all at once in its portrayal of two sisters creating their own magic and protecting one another. The latest from award-winning Wilde is a must-read for upper-middle-graders looking not just for a magical quest but also for lyrical writing and a beautiful story, too.” and Publisher’s Weekly also had lovely things to say -“Wilde skillfully blurs the lines of fantasy and reality in a haunting middle grade story of sisters connected through trauma and a shared mythology….“. As did BCCB (“Wilde concocts a heartbreakingly anxious story… The lens of house magic … allows the story to avoid a preachy tone while still accurately depicting the hurdles a child in a stifling household must face. “).
And I’m weaving a book tour between several teaching events — I hope you’ll come out to see me in any of these places, or share the word with people you know there!
April 9 – 7pm – Doylestown PA – Doylestown Bookstore – Riverland launch party with Cordelia Jensen! 7pm (And there’s still time to preorder and get personalized shenanigans) . RSVP here! We’re dreaming up some great surprises, there will absolutely be cupcakes and you might win a witchball!
If you want to read about “The Magic and Science of Glass” in Riverland, I have a post up at the fabulous SteaMG.org – Middle Grade Sci-fi Authors Alliance. More posts will be appearing at Nerdy Book Club, YAYOMG!, Barnes & Noble Kids, and The Washington Post over the course of the next few weeks.
A book like this didn’t happen overnight. There’s a LOT to talk about and it’s hard to navigate solo. I’m so grateful already to those of you who are there, reaching out, sharing your thoughts on the book, and sharing the book with others. Keep me posted if you’re near where I’ll be! I would love to see you.
|
2019-04-22T08:15:03Z
|
https://franwilde.wordpress.com/2019/03/31/9-days-to-go-links-to-events-glass-magic-a-draft-reading-guide-for-riverland/
|
Porn
|
Kids
| 0.870302 |
wordpress
|
Weekly Famitsu – September 16, 1994 | Yomuka!
This week’s issue covers the MOTHER 2 Pre-release Party attended by all staff involved in the game. This time the article is not an interview, but a description of the event.
A pre-release party for MOTHER 2 took place on August 24 in a hotel in downtown Tokyo. This, of course, was to celebrate the August 27th release of MOTHER 2: Giygas Strikes Back. Those involved with the production of MOTHER 2, including the scenario director, copywriter Shigesato Itoi, gathered at the hotel for the event.
Itoi was the first to speak. In front of the production staff of 40 he said, “Sorry for the wait, everyone. People have said a lot of things to me over the past five years, but the delay is all the staff’s fault. (laughs) Please show your appreciation today for all their hard work.” His speech was both funny and heartfelt.
Next was Nintendo’s Shigeru Miyamoto, who holds the title of MOTHER 2 supervisor.
The party was a standing dinner, so there was a friendly atmosphere the entire time. All kinds of people surrounded Itoi that night–even Chunsoft president Koichi Nakamura went to offer him some congratulatory words.
In any case, MOTHER 2 is finally on store shelves. Itoi should be breathing a sigh of relief right about now!
Shigesato Itoi talks about the joy of finishing MOTHER 2. Must have been one difficulty after the next.
HAL Laboratory President Satoru Iwata attended as the Programming Director. He commented that the staff kept a good attitude as production went on.
Shigeru Miyamoto from Nintendo was a supervisor this time around. Much like a remote control, he provided lots of advice to the production staff.
Itoi's wife Kanako Higuchi joined in as well. She stood out from the crowd as much as you'd expect. We're curious about their conversation that night. Wonder if she's played MOTHER 2?
Even Koichi Nakamura had a chat with Itoi. Maybe they'll be rivals in seeing which becomes more popular: MOTHER 2 or Kamaitachi no Yoru.
Miyamoto and Higuchi right after taking a commemorative photo together. Miyamoto looks so bashful.
Clay figurines of the MOTHER 2 characters were on display in one corner of the room. It seems the team really enjoyed producing the game if they took it so far as to make these.
Everyone in this picture had some kind of role developing MOTHER 2. It was a fairly big crowd of various people from Nintendo, APE, and HAL Laboratory.
Seeing as it was immediately before the release of the game, there were plenty of attendees seeing the game for the first time at the venue.
Photographic evidence that the official M2 clay figures probably smell of stinky cigarette smoke. Thanks for posting these!
Ahahaha, sommmmebody sells things on eeeBaaay!
Dungeon man’s dad!!!!!!!!! My favorite!!!!!
Thanks, as always, for translating Chewy. I love reading these!
Hi! I’m going to be receiving the magazine that lady is holding, in a few months. I know there is a Mother 2 advertisement in it, but I don’t know much else about it. Is there any other significance that I should know about? Thanks!
|
2019-04-21T05:09:06Z
|
https://yomuka.wordpress.com/2011/12/29/weekly-famitsu-september-16-1994/
|
Porn
|
Business
| 0.529332 |
wikipedia
|
Fons Photo by Roy Kerwood. Previously uploaded to en: with same image name May 11 2006.
11:34, 6 Martii 2011 420 × 378 (119 chiliocteti) Sir James rotated.
22:50, 9 Novembris 2010 402 × 433 (56 chiliocteti) GabeMc Gimped the pic, cleaned up the background, gave a better crop.
|
2019-04-23T16:52:30Z
|
Porn
|
Recreation
| 0.187029 |
|
wordpress
|
Asma Jahangir’s victory in the Supreme Court Bar Association elections is a momentous event in the country’s political and legal landscape. Even the worst of her critics grudgingly admit that her principled stance has remained consistent in a country where intellectual honesty and integrity are in short supply. More importantly, her reasoned approach to recent bouts of judicial activism has been a source of strength for stakeholders in the democratic process. Almost every progressive Pakistani has been overjoyed with her election as head of a professional body which was on the verge of losing its credibility due to indulgence in partisan politics.
Asma Jahangir’s victory in the Supreme Court Bar Association elections is a major development in the legal and judicial history of Pakistan. She is the first woman to hold this office, and a progressive rights activist as well. Her struggles against injustice, discrimination and oppression have spanned over nearly forty years and are globally acclaimed. PTH wishes her all success and hopes that she is able to fulfil the mandate for which she has been elected: To transform the apex Bar into a professional, neutral and non-partisan body and operating at a healthy distance from the judges. At last some sanity might prevail. This take by lubp is worth a read.
While much of Pakistan’s civil society celebrated a famous victory in the restoration of the judges it continued to display suicidal indifference to the existential threat to itself.
It was hoped by many that the electronic media following its exponential growth during the last few years would take stock of its roles and responsibilities. However, the years 2007 and 2008 were not the best of times for such an introspection to materialise into a self-regulation process. Authoritarian or transitional environments are not conducive to a culture of informed debate and the evolution of sound regulatory regimes. Nevertheless, there have been scattered noises and appeals by many observers, analysts and concerned citizens even within the media community.
The triumph of a popular movement on March 16 has marked a new beginning. The retreat of an intransigent government and the wise response by the PML-N and the lawyers averted a major crisis that could have been violent, and also a potential recipe for harming the parliamentary system in its infancy. There was a sigh of relief among the public for a long-standing issue appeared to have been resolved. This has been a monumental achievement by all standards.
|
2019-04-23T04:43:37Z
|
https://pakteahouse.wordpress.com/tag/lawyers/
|
Porn
|
Society
| 0.854133 |
wordpress
|
This album is part one of a three-part set of releases. I write this on the eve of the record’s release. Follow this link to tune in alongside my commentary.
Overall: 73/90. This record has its strengths across the board. I’ve never seen an artist go down this route of reinterpreting, “recycling,” one’s past recordings. It’s both a treat for fans and an opportunity to bring consonance to the ever-evolving style of music NSN produces. While some of these songs are bogged down by comparison, this album stands quite well on its own. I highly anticipate volumes two and three in the near future.
|
2019-04-25T22:47:35Z
|
https://blakeguthrie.wordpress.com/tag/never-shout-never/
|
Porn
|
News
| 0.559987 |
wordpress
|
a. The materials on Bellmore Group’s web site are provided “as is”. Bellmore Group makes no warranties, expressed or implied, and hereby disclaims and negates all other warranties, including without limitation, implied warranties or conditions of merchantability, fitness for a particular purpose, or non-infringement of intellectual property or other violation of rights. Further, Bellmore Group does not warrant or make any representations concerning the accuracy, likely results, or reliability of the use of the materials on its Internet web site or otherwise relating to such materials or on any sites linked to this site.
In no event shall Bellmore Group or its suppliers be liable for any damages (including, without limitation, damages for loss of data or profit, or due to business interruption,) arising out of the use or inability to use the materials on Bellmore Group’s Internet site, even if Bellmore Group or a Bellmore Group authorized representative has been notified orally or in writing of the possibility of such damage. Because some jurisdictions do not allow limitations on implied warranties, or limitations of liability for consequential or incidental damages, these limitations may not apply to you.
The materials appearing on Bellmore Group’s web site could include technical, typographical, or photographic errors. Bellmore Group does not warrant that any of the materials on its web site are accurate, complete, or current. Bellmore Group may make changes to the materials contained on its web site at any time without notice. Bellmore Group does not, however, make any commitment to update the materials.
Bellmore Group has not reviewed all of the sites linked to its Internet web site and is not responsible for the contents of any such linked site. The inclusion of any link does not imply endorsement by Bellmore Group of the site. Use of any such linked web site is at the user’s own risk.
Any claim relating to Bellmore Group’s web site shall be governed by the laws without regard to its conflict of law provisions.
|
2019-04-24T04:05:55Z
|
https://bellmoregroup.wordpress.com/2011/11/15/terms-condition-of-use-for-bellmore-group-management-services-tokyo-japan/
|
Porn
|
Business
| 0.251881 |
wordpress
|
Spicy's Sweet Treats | For all sweet-tooths and bookworms.
For all sweet-tooths and bookworms.
So I’ve been getting back into wattpad lately. I have so many good books in my library, it’d be a shame not to read through ’em. But that got me thinking, how does everyone feel about a Wattpad Wowzers (couldn’t think of a better word lol) segment? It’ll probably be longer so I can catch it up to the others, though.
As some of you may know, I’m an active member of Tapas, a site I use to post my novels. One of them was lucky enough to get noticed by staff after it was first published! That was a nice time, and really gave my content a boost in views and subscribers. But what you may not know is that book has been through a long journey.
Hey there, back for another drop of Lezhin goods. These two are for all ages, and I always have a blast with them.
In addition, I’ll be including some updates on Lezhin as a whole for those of you who don’t want to pull out cash for creators. But first, let’s get on to the comics!
In one of my uni’s writing classes, the professor let us go wild. So I took the opportunity to craft some kind of prompt. Feel free to comment your interpretations!
Wow I am on a roll today! I’m back with another round of recommendations, this time from Webtoons. One a fantasy and the other a sci-fi. With that, let’s begin!
Back at it again, with another healthy batch of book promotions! As always, it’ll be one novel and one comic. Both are good reads for different reasons, and I’m excited to share them!
I’m starting to get the hang of these! This issue will feature two series of All-Audience comics that kept me on the edge of my seat and are now completed.
Haha, I felt like doing this again because my library is getting large. This’ll feature two M-rated comics that always keep me on the edge of my seat, but are somewhat undiscovered. Here we go!
Glad to be back after another stressful term at uni. Along the way, I found some more great finds on Tapas. Just like before, I’ll give one of each kind of story I enjoyed: comics and novels. With that said, lets get started!
Supporting artists is one of my favorite past times, especially when I can read them online. Lezhin fits both of these requirements, in addition to having a huge selection of comics. Among the hundreds of stories, I come to present a pair who caught my interest almost immediately. Depending on your tastes, they’ll be worth your bucks.
|
2019-04-26T14:49:27Z
|
https://spicysweetsblog.wordpress.com/
|
Porn
|
Arts
| 0.082397 |
wordpress
|
I found some great new online coupon deals and sites, and I hope that this new collection will help you in the upcoming Christmas Season!
Dealnews seems pretty sweet. When I first came to the site, it automatically recognized my geolocation and provided a tab for me to search local deals online. You can take that functionality as a somewhat “glorified” Groupon of sort, but it provides more than what Groupon would normally offer. 2 Thumbs up!
Why pay retail? Exactly… Gottadeal is dead on that. Briefly checking out the functionality, the product offers, and hottest deals, I think that this can give cats like Retailmenot and Dealnews a run for its money. It looks and feels very functional and pretty easy to navigate to find what you’re looking for, especially if you can’t find it at the aforementioned sites.
This site is squeaky clean and very easy to look at. I mean very easy. Navigation is tight and product displays are pretty well thought out. Now, when it comes to products, is it the site that most people would want to search first and foremost? Maybe, maybe not. But it’s definitely worth a second look!
Couponwinner is strictly a coup0n-based site, like CouponNinja, Couponmoms, etc. I like the fact that it’s pretty intuitive when it comes to categorical searches, and the hierarchical tabs make it easy to navigate what kind of coupons you are searching for.
|
2019-04-23T00:05:04Z
|
https://yourpersonalshopping.wordpress.com/tag/online-coupons/
|
Porn
|
Shopping
| 0.71639 |
wordpress
|
Attorneys frequently ask me questions about facial recognition software and about new surveillance technologies. NACDL is offering training programs on each of these topics.
On September 18, 2018, from 11:00 am to 12:30 pm, NACDL will host a free webinar about the practices, risks, and limitations of emerging facial recognition technology. With an increasing number of police departments across the country turning to unregulated, untested, and flawed facial recognition technology to identify suspects, it is vital that defenders understand the technology, its limitations, and how to challenge its use in their cases. This webinar will explore these issues with the Georgetown Law Center of Privacy and Technology’s Clare Garvie, Bronx Defender’s Kaitlyn Jackson, and computer scientist Joshua Kroll. This webinar is supported by Grant No. 2013-MU-BX-K014 awarded by the Bureau of Justice Assistance. For more information and registration details, click here.
On November 29-30, 2018, NACDL and the Berkeley Center on Law and Technology (BCLT) will co-sponsor a free CLE at the University of California Berkeley School of Law. Advanced technologies are revolutionizing how the government investigates, charges, and prosecutes criminal cases. What issues do they raise under federal law and the Fourth Amendment, and how can defense lawyers keep pace? “It’s Complicated: Combatting the Surveillance State in Criminal Proceedings” will equip defenders with the tools to recognize and defend cases involving digital searches, advanced surveillance tools, technologies, and programs. For more information and registration details, click here.
NACDL’s Fourth Amendment Center now offers direct assistance to defense lawyers handling cases involving new technologies and tactics that may infringe on privacy rights of Americans. The Center’s staff is available to help members of the defense bar in bringing new Fourth Amendment challenges, providing a range of support from training and resources to expert consultation and direct litigation, all free of charge.
New law enforcement technologies: predictive policing, facial recognition/biometric identification, and drone/aerial surveillance.
Defense lawyers with cases involving any of these or other issues are encouraged to contact NACDL’s Fourth Amendment Center. The Center assists attorneys who are members or non-members of NACDL. The Center is available to provide consultations and litigation resources as well as direct assistance in support of a defendant’s claims. Specifically, the Center may assist in motion practice, preparation for suppression hearings, as well as appellate strategy, brief writing, and oral argument. The Center also provides group trainings for defense lawyers around the country and upon request.
The NC Office of Indigent Defense Services will offer a series of free presentations on digital evidence that are designed to enhance the knowledge of criminal defense attorneys. Available for CLE credit, these programs will occur at lunchtime in various locations around central North Carolina. Participants receiving CLE credit will be billed $3.50 per credit hour by the NC State Bar.
The first program in the series will begin at 12:15 pm on Friday, Nov. 3, 2017 at the Johnston County Courthouse in Smithfield, NC. Part II is planned for January in Alamance County and Part III is planned for February in Pitt County. Details will be posted about those programs when they are finalized.
During the first in the Digital Evidence Series, Larry Daniel will cover techniques for locating cell phones, including call detail records, drive testing, Google location services, E-911 Records, Phone Based Location, and Find my iPhone. He will cover how records are obtained and limitations of each technique. Information on how cell phones work will be covered to aid in understanding how cell towers are used to determine location. Case examples will be used to demonstrate the limitations to these techniques.
Contact Sarah.R.Olson@nccourts.org if you have questions.
Larry Daniel began performing computer forensics in 2001. He holds numerous certifications in computer, cell phone and GPS forensics including the Encase Certified Examiner (EnCE), Access Data Certified Examiner (ACE), Digital Forensics Certified Practitioner (DFCP), Blackthorn 2 Certified Examiner (BCE), the Access Data Mobile Examiner (AME), Certified Telecommunications Network Specialist (CTNS), Certified Wireless Analysis (CWA) and Certified Telecommunications Analyst (CTA).
Mr. Daniel has provided computer and cellular phone and cellular tower technology in hundreds of criminal and civil cases. Additionally, he has qualified and testified as a computer forensic expert, a cellular phone forensics expert, a GPS forensics expert and a cellular technology expert over 50 times in state and federal courts.
He has provided training via presentations and continuing legal education over 75 times for attorneys, prosecutors, judges, and law enforcement, as well as presenting at such conferences as the Department of Defense Cyber Crime Conference, the Computer Enterprise and Investigations Conference, the American College of Forensic Examiners and the National Association of Criminal Defense Lawyers. He is co-author of the book, “Digital Forensics for Legal Professionals, Understanding digital evidence from the warrant to the courtroom” 2011, Syngress. Larry’s latest book is “Cell Phone Location Evidence for Legal Professionals, Understanding Cell Phone Location Evidence From the Warrant to the Courtroom”, Academic Press.
Law enforcement agencies nationwide have been secretly using IMSI (international mobile subscriber identity) catchers to track suspects through their cell phones. Typically this surveillance occurs without a warrant or court order. Also called “Stingray,” this device tracks cell phones using the radiofrequency signals radiating from the phone. The device is a shoebox-sized receptor that mimics a cell phone tower and tricks the cell phone into transferring its location and other information to the surveillance device. Its ability to be concealed and its mobility allow police officers to track suspects in many situations and also in real time. Compared to the traditional method of subpoenaing a suspect’s phone records and tracing the call locations accordingly, this technology allows law enforcement much broader real-time locating and tracking capability. Stingray is also capable of connecting to bystanders’ cell phones near the targeted cell phone and relaying their locations and private information back to the investigating agency.
According to records obtained by the American Civil Liberties Union, police departments in Wilmington, Durham, and Charlotte have been appropriated funds for purchasing Stingray equipment. Use of Stingray by the Wilmington Police Department has been the subject of investigation by local media outlets as covered here, here, and here. However, Stingray’s manufacturer, the Harris Corporation, requires purchasing agencies to sign a nondisclosure agreement which prevents the law enforcement agency from disclosing how the instrument works or whether the department is using it for surveillance. In Florida, law enforcement officers have hidden the use of Stingrays from courts by stating that a suspect’s location information was obtained from a “confidential source” rather than saying it was obtained through use of a Stingray.
The ACLU of Northern California has created a guide to inform defense attorneys about the Fourth Amendment implications of this controversial device and to explain how law enforcement agencies are currently using Stingray to track suspects. To learn more about Stingray’s functionality, how to identify when Stingray has been used in a case, and potential legal arguments, click here to read the ACLU Guide for Criminal Defense Attorneys.
With the recent U.S. Supreme Court decision Riley v. California, the topic of cell phone forensics is on the mind of many attorneys. Cell tower location tracking is a related area where investigators gather information about a cell phone’s location using data from cellular towers contained in phone records. Attorneys should be aware that location tracking through cell tower data is a questionable practice, as explained in these recent articles in The New Yorker and The Washington Post.
Proponents of cell tower location tracking explain that when a phone call is made through a cell phone, the phone sends out a radiofrequency signal to the “nearest” tower. Investigators will look at phone records to see which tower the phone connected to at a specific time. Once they have located the individual tower that facilitated a particular call, investigators will determine the geographical range of that tower and conclude that the phone and therefore the person using the phone were within that tower’s range at the time the call was made. Triangulation or the use of three different calls or cell towers to create an overlapping area similar to a Venn diagram that produces a smaller potential location, is more reliable than the single tower method. However, triangulation data or GPS data (which could potentially give an exact location) often is not available. Police frequently trace the phone call, find the tower, determine its range, and see if the suspect’s cellular phone data places him at or near the crime scene at the relevant time.
Cellular communications experts explain that tracking a phone’s location based on its connection to cell towers is not so simple. The proposition that a cell phone will connect to the nearest tower is not accurate. There are many complex, proprietary algorithms that a cellular company’s control center uses to decide which tower gets the call. Cell towers’ ranges can vary from several square miles in urban areas to in excess of 20 square miles in rural areas. Geography, network congestion, weather, height of the tower, and many other factors can affect which cell tower picks up a call. For these reasons, claiming that a person is within a specific radius of a certain cell tower is not possible with the current technology.
On May 28, 2014, Lisa Marie Roberts was released from prison in Oregon. She had been in custody since pleading guilty to manslaughter in 2004. When Roberts’s trial attorney learned that the state’s evidence included the pinpointing of Roberts’s location at the time of the crime using cellular tower data, he urged her to take a plea. The prosecution claimed that Roberts’s cellular phone records placed her specifically in Kelley Point Park at the time they believe the victim’s body was dumped there. Investigators used the aforementioned technique of tracing phone calls made by Roberts that day to show that not only was her alibi not credible, but also that she was exactly in the location where the body was found. On appeal, the defense’s expert testified that the notion that the nearest tower to a cell phone is per se the one that facilitates the call is not testable, reliable, or provable science.
The appellate court decided that it was because of this flawed evidence that the trial attorney encouraged Ms. Roberts to take the deal, without which she would not have plead guilty to a crime she says she did not commit. This myth of the police’s ability to track missing persons or suspects by their cellular phone by using only single tower data is commonly accepted and unchallenged by defense counsel. Attorneys should consider consulting with a cell tower forensics expert to determine the reliability of this evidence and whether this evidence can either locate the defendant at the scene of the crime or support an alibi.
To read Ms. Roberts’s granted Habeas Corpus Motion for Ineffective Assistance of Counsel, click here.
|
2019-04-19T16:33:55Z
|
https://ncforensics.wordpress.com/category/digital-forensics/
|
Porn
|
Computers
| 0.929404 |
wordpress
|
It starts tomorrow... get some!
The official first day of Ponce’s Vlog series begins tomorrow. Lots of goodies in store including Ponces, Word of the Day, Poetry, Behind the scenes clips from our Mime Book shoot and other things we’ve been working on, and much more. The plan is to have a new Ponce vlog up every Wednesday. Every Monday will be a free for all kinda day where we put up whatever we feel like. Also, along with the Ponce Vlogs will be SAP’s Kitchen, where you get to see SAP cook some of those delicious meals Ponce keeps posting on his twitter page. The Vlog and Kitchen videos will Link to each other.
In the meantime, we just put up Ponce’s take on the “Unforgivable” videos. It’s Ponce in adlib mode at a friend’s house and he had everyone on the floor doing this so we thought we would share it with you guys. It’s at the bottom of this post.
Thanks for all your support. We have a lot of good news coming soon so stay tuned. If you have twitter accounts and facebooks, please feel free to add us. And if you would like to join our official fansite, it’s called the Mingle Mob. All links below.
TSHIRTS HOODIES STICKERS AND MORE!
|
2019-04-18T14:36:29Z
|
https://theperryboys.wordpress.com/2010/02/09/ponce-vlogs-start-tomorrow-and/
|
Porn
|
Arts
| 0.445258 |
wordpress
|
Wants to understand God’s love more deeply.
Wants to find God, but doesn’t realize you’ll have to let go of yourself in the process.
Is too busy with ministry and life that you’ve lost sight of God.
Is passionate about adoption. This book opened my heart to adoption, and now I could see myself one day adopting.
Believes the lie that marriage will solve all your problems, this book will show you the truth.
Doesn’t understand why God gives you certain desires in your heart.
Sara learned that she had a lot of ideas about God that were not actually who God really was. All of her pain that she went through, revealed the ways in which she saw God that did not line up with scripture.
God will use every pain, hardship, and struggle for his glory. For Sara, he used her barrenness to lead her closer to his heart. God can do the same thing for you.
However you are struggling today, know that God will use this to bring him glory. You may never understand the “why” questions. Why did this happen? Why did God let it happen? Why me? But trust in God, and know that he makes beautiful things out of all our pains.
|
2019-04-20T02:23:26Z
|
https://joypedrow.wordpress.com/2014/11/08/exciting-news-every-bitter-thing-is-sweet-book-review/
|
Porn
|
Reference
| 0.178567 |
wordpress
|
The Bellingham Herald is running a story on the International Longshore and Warehouse Union [ILWU] protests and blockades at the Port of Longview, WA and on BNSF rail lines after labor disputes with EGT Development.
EGT—a multinational corporation—publicly promised Cowlitz County that “200 workers will be employed during construction [of a grain terminal] and the facility will employ 50 full-time workers when complete.” Such promises garnered EGT local support in Cowlitz County, additional land, as well as taxpayer subsidies for constructing the terminal.
While comments on message boards tend to focus on the angry protests of the ILWU, the history behind what is happening in Longview parallels concerns that citizens have expressed towards the proposed Gateway Pacific Coal Export Terminal and the promises made towards jobs and anticipated tax revenue.
Jobs – The ILWU are protesting because EGT did not keep their promise of local jobs. Rather, EGT imported the majority of its construction crews from out of state, despite Cowlitz County having hundreds of skilled union building trades workers with high unemployment rates.
Once the terminal was operational, EGT broke contract with ILWU and instead hired non-union workers to save money. This action was later followed by hiring out-of-state union members to run the terminal, which essentially pitted labor unions against each other, while still leaving Cowlitz County without their promised jobs.
Tax Revenue – EGT also received taxpayer subsidies to build the terminal, not to mention the decrease in anticipated tax revenue based on cheap labor practices.
To sum up: a taxpayer-subsidized international conglomerate, which is operating on public property, is suing the public so it can avoid paying the area’s standard wages and undercut its competitors that do. Then, it exacerbated tensions with the local labor community by importing union workers from another jurisdiction to cross the picket lines.
We’ll follow this post soon with more details regarding our concerns over SSA Marine’s promise of construction and longshoreman jobs, as well as information about why we anticipate that the permitting of GPT will bring an enormous taxpayer expense to our state that far exceeds any cost benefits we’ve heard in favor of the project.
It’s amusing how two writers can go to the same Northwest Business Club luncheon lecture and come away with different reports.
The headline in the Bellingham Herald, “Cherry Point Cargo Terminal Could Help Fund Rail Upgrades”, should read, “Taxpayers to Pay through Nose for BNSF/China Coal Train.” Journalist John Stark wrote that transportation experts Jim Miller of the Whatcom Council of Governments (WCOG) and Bruce Agnew, Executive Director of the Cascadia Center for Regional Development in Everett, were encouraged by the prospect of a Cargo (sic) Coal Terminal at Cherry Point. It could provide political and financial impetus to help pay for needed rail improvements through Whatcom County and could help focus state and federal attention on transportation needs here. How sweet.
Throughout, Stark’s article deemphasized the darker aspects of the situation and both men’s comments — that despite the fact that there is a shorter, albeit more costly route through Montana, the coal trains will travel through Bellingham and that state and local officials can’t do anything about it. Agnew stated “the coal train need not be disruptive to traffic, passenger rail or other freight shippers if massive investments are made in upgrading the system.” Boosters at heart, neither Miller nor Agnew did not emphasize, nor did Stark choose to report, how disruptive the increase in rail traffic would be to street and highway transportation or how massive our public investment would be in order to relieve that congestion. Stark also failed to report Agnew’s assessment of future demands for railroad support to Boeing, to Tesoro in Anacortes, and other industries along the North Sound rail corridor? The cost for needed improvements and additional siding to accommodate this growth, including Amtrak, is several billion dollars.
Stark painted a problem free picture. Even though it is like pulling teeth to get the experts to focus on a reality which fades, victim to their allegiance to corporate conformity, WCOG & the Cascadia Center, both publicly funded agencies, have an obligation to honestly identify the true cost to be paid by the public for a new commerce corridor through Whatcom and Skagit Counties and the entire coal train route. While Congress is trying to cut trillions from the US budget GPT analysts stick their official heads in the sand.
Stark, not one to let the cat out of the bag side tracked to a questioner in the audience who challenged the $32 million state subsidy for Amtrak while completely ignoring a pertinent follow up by Mark Nelson, City Club’s preeminent inquisitor, who queried whether a farm land route through the South Fork Valley and eastern Whatcom County would be a viable alternative for BNSF. To which both experts reluctantly confessed, absolutely in the affirmative.
Given Governor Gregoire’s position that coal is going to be shipped to Asia one way or another, the question is who pays?
|
2019-04-19T06:35:09Z
|
https://safeguardthesouthfork.wordpress.com/category/taxpayer-expense/
|
Porn
|
Business
| 0.701183 |
wordpress
|
Today while visiting a gift shop on vacation, my children spotted a machine that transforms pennies into souvenirs.
We stood there, staring at the intricate gears through the glass cover, trying to figure out exactly how the machine worked. “Do you have two quarters?” my middle child asked, already knowing that few things in life are free. Normally, my stock answer is “Sorry, love, not today,” but I remembered a bag of change I tossed in my purse as we were leaving for our trip.
They all gathered around the machine, added their quarters and watched the penny move through the various slots.
“Look! This is so cool!” Their excitement of seeing the souvenir penny was shared by others walking by.
As my children turned to explore other parts of the gift shop, I lingered behind to do an act of kindness for the next child who wanted a souvenir penny. I left all the coins needed in the push tray.
May you be inspired to look for simple ways to make someone else smile! Be blessed!
Today as I was surfing my Twitter feed during lunch, I saw the COOLEST post from one of my followers @mrbadura. (No, that’s not a paradox – tech geeks will understand just how uplifting it is to peruse great ideas of others at just the tap of a social media icon.) The topic was #bookitforward and the post, originally shared by @terrieichholz described the bewilderment and excitement of her daughter receiving a book from a friend with no pretense. No expectation of reciprocity. A book given just because.
I am passionate about writing. Back in the day (referencing my college life 20+ years ago), I had my own journal of poetry where I would express myself through prose and rhymed couplets. I even had one of my poems published in our university’s literary magazine my freshman year – such a thrill for a beginning writer! Today I decided to #BookItForward by blessing our school’s reading specialist with a book of poetry she could enjoy and share with others.
No obligation. No expectation for a gift in return. Just a simple note to say “Thanks” for all she does for our students on campus.
I’m also paying it forward by spending some of my learning time volunteering with the VSTE Conference Committee, greeting conference attendees with a friendly smile as they check in.
I’m encouraging anyone who receives a RAK to tweet a picture on Twitter using the hashtag #vste14. When the conference concludes, I will edit this blog to show the fun pictures people post.
Be inspired to be kind to others this week. Small RAKs matter!
|
2019-04-25T00:03:22Z
|
https://celebratekindness.wordpress.com/2014/12/
|
Porn
|
Reference
| 0.345097 |
wordpress
|
This entry was posted on February 4, 2008 at 7:35 pm and is filed under "Across The Universe", NASA, The Beatles, Uncategorized. You can follow any responses to this entry through the RSS 2.0 feed. Responses are currently closed, but you can trackback from your own site.
|
2019-04-21T00:21:21Z
|
https://reneeashleybaker.wordpress.com/2008/02/04/previewhistory-across-the-universe/
|
Porn
|
Arts
| 0.854662 |
wordpress
|
I need to find some other way to express myself creatively. I have a yearning to poor myself into something, a project, a book, anything. I don’t know where to start. I’ve downloaded all sorts of software to get the creative juices going, but I am still stuck. Writer’s block in a major way. I have nothing. Nada. No ideas. How can I push through this to get to another plane of thought which will lead to my releasing my built-up creativity?
This entry was posted in Blogging, Books, Home Repair, Writing and tagged book idea, Project, Writing. Bookmark the permalink.
There are a lot of things you can do about this: You could listen to music and try to write a scene around the song. Maybe it is in the background at a restaurant/store a character is at. Think about what type of a person would listen to the song, what they would do as listening to it (sing, hum bob head). One thing I do is think of it like a movie scene, this really helps me. Listen to the song and think of what type of a scene would it be in (action, intimate, suspense, thriller etc) and write a scene to it. Some people suggest setting a timer for 10 minutes and writing even if you can’t find anything to write about and eventually you will find something.
Think of random things. And even if you don’t like the scene, the characters or something about it, you can always take fragments of it and use for something else. You also have a lot of tags. Try looking at them and imagine a scene of someone out in nature, someone that really likes reading and collects old books or someone that works in marketing using social networking only and is extremely socially awkward face to face.
Thanks, I appreciate the suggestions and will give them a try.
Hi! I just thought that I would drop in with a few suggestions.
It’s a really great list of classics and loved books, not all of them necessarily ancient. If you are looking to do something artistic, it might a good idea to start life drawing, perhaps sit next to a window and sketch what you see. Do it once a week and then, over a time, see how well you have done! You could always write a short story or novel, get a deviantart account or learn how to cook!
If you need ideas with writing, the best thing to do is to choose a word each day and write exactly 100 words containing the theme of that word. It’s a great way to start thinking and really devote yourself to something.
I am using Freemind and Freeplane to stir some thoughts about words and everything connected to them. Thanks for the suggestions.
|
2019-04-20T08:25:45Z
|
https://paledot.wordpress.com/2011/04/30/i-need-a-book-idea-or-a-project/
|
Porn
|
Arts
| 0.879542 |
sfgate
|
Sufferers of chronic or painful illnesses had something to rejoice about in 1996. After years of debate, California voters passed an initiative known as the Compassionate Use Act, creating criminal defenses against prosecution for crimes like the use and cultivation of marijuana for medical purposes.
In the years since the legalization, there has been a sort of “green rush” on medical marijuana. There are now more than 1,000 marijuana dispensaries in the Los Angeles-area alone. If you are interested in starting your own medical grow operation, this article is intended to provide a broad overview of the main issues you will need to consider.
The main prerequisite to starting your own grow operation is that you have a doctor’s recommendation for the medical use of cannabis. Once you have been recommended marijuana by a doctor, you are allowed to possess and cultivate marijuana for your own medical needs. You should then immediately apply for a medical marijuana identification card. The purpose of this card, which is issued by the California Department of Health, is to advise law enforcement that you are part of California’s Medical Marijuana Program, and therefore hopefully prevent you from getting arrested for possessing weed. There is a small fee to get the card; the fee averages about $50.
The basic rule of thumb is that you can grow as much as you legitimately need to treat the medical condition for which you have the doctor’s recommendation. The California Attorney General’s guidelines are six mature plants or 12 immature plants.
But what if you want to start a larger grow operation? Can multiple patients combine their needs and resources and have a single grow for all of them? The answer is YES! These are called “cooperatives” (or sometimes “collectives”) under California law, and they are perfectly legal, provided they operate within certain parameters. As is the case when growing for your own personal use, a collective grow operation should grow no more than is medically necessary for the members of the cooperative. However, there is no limit to the number of people who can be members, and not all members have to participate in the actual cultivation.
A medical marijuana dispensary must be organized as a non-profit. Although some dispensaries have been set up as other types of business entities, such as sole proprietorships or partnerships, this is not advisable – a non-profit is the only form that is recognized as legal under California law for this type of business. Non-profits are subject to specific laws and regulations, so it is important that you consult with a business attorney in your area.
You may have heard the mantra that the three most important things in real estate are “location, location, location!” This is doubly true when it comes to medical marijuana dispensaries. A complex patchwork of state, county, and local regulations all come into play. The state, as well as most counties, regulate where a dispensary can operate. Some counties have banned new dispensaries from opening altogether. A helpful list of city and county ordinances has been compiled by Americans for Safe Access, and is available here.
In addition to applying for your business license and making sure your storefront complies with all state and local laws, it is especially important that you take care not to disturb your neighbors. According to California NORML, neighborhood complaints are the number one cause of police raids.
If you are renting rather than buying, you’ll need to make sure that your landlord is up to speed and is okay with what you are doing. The last thing you want to do is get all set up and then evicted!
Because of the complexity of these issues, consultation with an experienced attorney is highly recommended.
Finally, it cannot be stressed enough that although growing, using, and providing medical marijuana is legal under California Law, it is all still entirely illegal under federal marijuana law. While the current administration has made statements to the effect that they will not go after marijuana operations that are legal in their respective states, the feds continue to harass and shut down dispensaries and criminally prosecute growers and providers. Federal criminal penalties are extremely harsh, and the feds have practically unlimited resources at their disposal. Tread carefully! To avoid attracting the attention of the feds, your organization should keep a low profile, and make sure that everything you do complies with California law. Compliance with California marijuana law will not help you in the unfortunate event that you get hauled into federal court, but it may help prevent you from coming to the attention of the feds in the first place.
|
2019-04-24T05:07:40Z
|
https://blog.sfgate.com/smellthetruth/2013/12/21/california-medical-marijuana-laws-starting-a-grow-collective-and-dispensary/
|
Porn
|
Business
| 0.137403 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.