proba
float64 0.5
1
| text
stringlengths 16
174k
|
---|---|
0.998142 |
During the last quarter century or so, Compstat and community policing have emerged as powerful engines of police reform in the United States. Compstat is a strategic management system focused on reducing serious crime by decentralizing decision-making to middle managers operating out of precincts or districts, by holding these managers accountable for performance, and by increasing the organization's capacity to identify, understand, and monitor responses to crime problems. Community policing can be characterized as a philosophy and an organizational strategy designed to reduce crime and disorder through community partnerships, problem solving, and the delegation of greater decisionmaking authority to patrol officers and their sergeants at the beat level. It varies more than Compstat from place to place in response to local problems and community resources. To date, researchers have focused their energy on identifying the individual merits and weaknesses of each, but have given much less attention to how well these reforms operate when implemented in the same police organization. The Office of Community Oriented Policing Services (the COPS Office) asked us to conduct research and write a report on this co-implementation issue: Do Compstat and community policing work together, mutually supporting each other, or are there points of conflict, where pursuing one makes it harder to pursue the other successfully? Moreover, do they work separately, that is each having little consequence for the other? This report summarizes findings from the first national study of Compstat and community policing, suggesting that these reforms operated largely independently from each other, with one having little effect on the other. Their simultaneous operation helped departments respond to a broader set of goals and to engage in a wider variety of tasks than had they implemented just one reform. Thus, they had an additive effect—one compensating for the limitations of the other in helping the organization respond more comprehensively to the diverse demands it confronted in its external environment. The finding that Compstat and community policing worked in parallel, but independently, suggests there may be opportunities for making these reforms work more closely with each other.
|
0.995629 |
Know risks when forgoing inspection contingency The article is a must read if you are even considering saving a few dollars in a Buyer's transaction. Did you know that even new homes need an inspection? It's amazing but contrators for builders actually make mistakes. Yes I am being sarcastic. However, when an inspector does find, for example, wiring issues or plumbing issues then everything is documented and photographed (hopefully your inspector is taking snapshots). If you are purchasing a home in the Conroe, Lake Conroe, The Woodlands, or Spring areas be sure to search for property on my website . I will walk you through the transaction and make sure you have a list of Inspectors in our area.
|
0.943486 |
What's the end game for religious fundamentalists?
I mean you have these cults that have worshiped a "god" that will send people to an eternal concentration camp. They've used belief in this entity - that gnostics see as a demonic tyrant* - to further their faith through slavery/colonialism/the Holocaust/persecution of gays/subjugation of women/etc.
We know the CIA has been connected to religious missionaries.
We know they have their own "rock" music, their own cartoons like Veggie Tales, all to make it seem like worshiping a demon who throws people into an eternal concentration camp is okay.
And unlike Pizza Gate we know there's accepted evidence of a child molester ring among the religious, namely the Catholic Church scandal?
Are some theists secretly peddling an occulted, watered-down Demiurgic theology -- is that their end game?
How deep does Hollywood's allegiance to the Demiurge go?
Do the Abrahamic religions promote the Reptilian-Alien agenda? And are the "salvationist" dogmas and doctrines of the Abrahamic religions the work of "gods" working against the spiritual evolution of humanity?
The Gnostics called this "god" Yaldabaoth, their name for the Demiurge, a "pseudo-deity who claims to be the creator of the natural world, identified with the biblical father god called Yahweh or Jehovah," in Lash's words.
They taught that he is a "demented pretender who works against humanity as the leader of the Archons," which have been variously described as soulless beings or astral-mental parasites that "exaggerate human error and intrude upon humanity by psychic stealth in order to propagate the ideological virus of redemptive religion."
Salvationist theology, writes Lash, promotes a belief system in "the Demiurge of the Old Testament, an arrogant demented pretender who claims that humans are 'Made in His Image.' These four words are the corporate motto of patriarchy. Branded on the human soul, 'Made in His Image' signifies the total enslavement of humanity to an alien off-planet agenda. If the Gnostics were right, the rise of salvationism was a unique mistake for our species, not a new moral revelation. Nothing serves the hidden controllers for cover better than a message of cosmic love... a ruse to endorse and foster the victim-perpetrator bond. No matter how hard we try, we cannot derive a genuine message of love and goodness from divine paternalism. This is perhaps the hardest of all lessons that history can teach us."
Is "religion" then just another stumbling-block on the ever-winding road of spiritual evolution?
The Gnostics' perspective was that this alien belief system foisted upon humanity by the "Archons" was a primary cause of the spiritual stagnation that humanity endures into the 21st century.
Lash, on his website Metahistory.org, notes that the Dead Sea Scrolls, discovered in 1947, contain explicit accounts of threatening encounters with reptilians.
Did Aliens Bring Religion to Earth ? There are compelling reasons that they did.
Aaaaaaargh .... no more please!!!
Looks like someone just [can't] handle the truth.
Really scary how all this stuff is out there if you have the courage to look.
I need a big animated laugh smiley!
|
0.999985 |
How do you explain the value of a rock musician to the Immigration Service?
On what would have been John Lennon’s seventieth birthday—October 9—it’s worth noting the letter about Lennon that Bob Dylan sent to the US immigration service in 1972: "John and Yoko," Dylan wrote, "inspire and transcend and stimulate," and thereby "help put an end to this mild dull taste of petty commercialism which is being passed off as artist art by the overpowering mass media." Then he added, "Let John and Yoko stay!"
As that concluding line suggests, Dylan’s letter was not a spontaneous expression of enthusiasm. It was part of an organized campaign to stop the Nixon administration from deporting the ex-Beatle.
Explaining what made Lennon important, Dylan wrote that Lennon added "a great voice and drive to this country’s so called ART INSTITUTION." Lennon’s music, Dylan said, "help[ed] others to see pure light."
Lennon’s problem: he and Yoko had been living in New York for a year, which happened to be the year Nixon was running for re-election. The Vietnam war had reached a peak, and Lennon and Ono were singing "Give Peace a Chance" at antiwar rallies—and, they suggested, the best way to give peace a chance was to vote against Nixon.
Decades later, Dylan’s letter surfaced as part of the INS response to my Freedom of Information request for their files on the Lennon deportation hearings.
Dylan in 1972 had recently released the single "George Jackson," a protest song about the killing of a young Black Panther in San Quentin prison. He had also released the album New Morning, which included the hit single "If Not For You."
Among the hundreds of letters about Lennon there was one from Dylan’s former partner and fellow folkie Joan Baez. Her handwritten note informed the INS that "Keeping people confined to certain areas of the world" was "one of the reasons we’ve had six thousand years of war instead of six thousand years of peace."
The "Let them stay in the USA" campaign included not only celebrities but thousands of young people. The Lennon-Ono 1972 album Some Time in New York City included a petition for fans to send to the INS, and lots of them did.
The letters from Dylan and others didn’t change Nixon’s mind. The Lennon deportation proceedings continued even after Nixon’s re-election in 1972, and then through the Watergate crisis. In the end, of course, Nixon left the White House, and Lennon—and Ono—stayed in the USA.
Bob Dylan’s letter to the INS about Lennon is posted online at LennonFBIfiles.com.
|
0.999517 |
and others of extraordinary wood, with flint edges, and most curious and costly handles..
Representations of ancient weapons do not abound in Mesoamerican art either. Ross Hassig, an expert on Aztec warfare, observes, for instance, that "despite the pivotal importance of the macuahuitl (broadsword) in Aztec warfare, as amply attested in Spanish accounts, it is not depicted in Pre-Columbian art even in scenes that show warriors and capture."9 For our knowledge we are primarily dependent on the recorded testimony of those who saw the weapons in use during the short conquest period, for they were soon displaced by European arms. This lack of physical evidence for ancient Mesoamerican artifacts as abundant as these swords warns us that absence of evidence from archaeology and art does not mean that a particular artifact—in this case a weapon—was unknown in pre-Columbian times.
Other examples are even older, dating to Olmec times, the period of the Jaredites of the Book of Mormon. Archaeologist Philip Drucker describes a carved monument at La Venta from before 500 BC showing "an obsidian-edged sword,"13 while Ann Cyphers Guillen recently discovered a stone carving at the Olmec site of San Lorenzo that dates before 900 BC, "possibly showing a club-like weapon with attached obsidian blades."14 Clearly this type of sword had such a long history of use in Meso-america that it must be considered a fundamental weapon.
In 1 Nephi we learn that Laban, a powerful official in Jerusalem around 600 BC, possessed a sword with a blade "of the most precious steel" (1 Nephi 4:9).21 The blade also had a sheath. Nothing is said of the length of the blade, although it proved long enough to cut off a man's head.
Does this statement mean that Nephi1 made "many swords" of steel closely imitating the model one he had brought from Jerusalem?
But we do not need to interpret Nephi's statement "after the manner of" as meaning that the swords he produced were of the same material as Laban's sword, only that their general pattern was similar—a straight double-edged slashing implement, in contrast to a cimeter. The same phraseology is used by Nephi in regard to building their temple in the new land. He did so "after the manner" (that is, according to the pattern) of the temple of Solomon, but it was not built of all the same materials (see 2 Nephi 5:1). When Nephi produced enough swords to arm his whole people, he could well have used some other metal, including perhaps obsidian, flint, or even fire-hardened wood, for the cutting portion.
Could a Macuahuitl Be "Stained"?
The Lamanite king named Anti-Nephi-Lehi admonished his fellow converts, "Since God hath taken away our stains, and our swords have become bright, then let us stain our swords no more with the blood of our brethren" (Alma 24:12). Many types of obsidian have a fine luster so the edges of a macuahuitl might well be described as bright.25 For example, Friar Juan de Torquemada in the sixteenth century described obsidian as "a stone which might be called precious, more beautiful and brilliant than alabaster or jasper."26 But what might "stain our swords" have meant if a Lamanite or Nephite sword was in the form of a macuahuitl? Hamblin has noted that blood would deeply stain the wood in a weapon like the Aztec sword. The king's metaphor for redemption that involved stained weapons and their cleansing might actually be more powerful if it referred to blood-soaked wood than to a metal or even an obsidian blade, which could easily be wiped clean.
Did native American swords have sheaths? Laban's sword is the only weapon mentioned in the Book of Mormon that is said to have been carried in a sheath. There are later references to men "drawing" their swords, but that expression need not imply a sheath. Weapons could be "drawn" from a bag or basket in which they were stored or carried. Hamblin and Merrill note that a mural from Chichen Itza (dated long after Book of Mormon times) shows a Toltec-era soldier carrying a bag or basket holding several macuahuitls on his back.27 Some Aztec warriors carried a kind of rack on their backs to which they could fasten their weapon when not in use.28 The Toltecs were reported to have borne "swords . . . fastened [on] with belts."29 So while Nephite warriors might have had sheaths, they could also have "drawn" their swords from a bag, a basket, or a belt fastening.
If Ammon's sword were a macuahuitl, he could easily have cut off the limbs of the livestock "rustlers" that he fought. But even a sharpened sword of hardwood might have done the job as well.
Were their swords pointed? At Alma 44:12—13, Mormon describes the unsuccessful attempt by the leader of a Lamanite army, Zerahemnah, to kill the Nephite chief, Moroni. In the skirmish, a Nephite soldier wounded Zerahemnah by smiting off part of his scalp. The warrior then "laid" the scalp on the "point" of his sword, apparently without piercing it. As Hamblin and Merrill note, we cannot tell from this statement whether the "point" was dangerously sharp or not. Another passage implies that a group of Lamanite prisoners who were attempting to escape may have been impaled on pointed swords held by their guards: "And it came to pass that because of their rebellion we did cause that our swords should come upon them. And it came to pass that they did in a body run upon our swords, in the which, the greater number of them were slain" (Alma 57:33). Yet the phrasing could also signify that the Nephite guards actively swung their weapons as the desperate men "did . . . run upon" their swords. The language does not allow us to be sure whether the swords were pointed or not.
he Lamanite king named Anti-Nephi-Lehi admonished his fellow converts, "Since God hath taken away our stains, and our swords have become bright, then let us stain our swords no more with the blood of our brethren" (Alma 24:12). Many types of obsidian have a fine luster so the edges of a macuahuitl might well be described as bright.25 For example, Friar Juan de Torquemada in the sixteenth century described obsidian as "a stone which might be called precious, more beautiful and brilliant than alabaster or jasper."26 But what might "stain our swords" have meant if a Lamanite or Nephite sword was in the form of a macuahuitl? Hamblin has noted that blood would deeply stain the wood in a weapon like the Aztec sword. The king's metaphor for redemption that involved stained weapons and their cleansing might actually be more powerful if it referred to blood-soaked wood than to a metal or even an obsidian blade, which could easily be wiped clean.
If Ammon's sword were a macuahuitl, he could easily have cut off the limbs of the livestock "rustlers" that he fought. But even a sharpened sword of hardwood might have done the job as well.Were their swords pointed? At Alma 44:12—13, Mormon describes the unsuccessful attempt by the leader of a Lamanite army, Zerahemnah, to kill the Nephite chief, Moroni. In the skirmish, a Nephite soldier wounded Zerahemnah by smiting off part of his scalp. The warrior then "laid" the scalp on the "point" of his sword, apparently without piercing it. As Hamblin and Merrill note, we cannot tell from this statement whether the "point" was dangerously sharp or not. Another passage implies that a group of Lamanite prisoners who were attempting to escape may have been impaled on pointed swords held by their guards: "And it came to pass that because of their rebellion we did cause that our swords should come upon them. And it came to pass that they did in a body run upon our swords, in the which, the greater number of them were slain" (Alma 57:33). Yet the phrasing could also signify that the Nephite guards actively swung their weapons as the desperate men "did . . . run upon" their swords. The language does not allow us to be sure whether the swords were pointed or not.
Cimeter is one of a number of spellings used in nineteenth-century America for the word that has become standardized in more recent English as scimitar. The dictionary defines scimitar as, "1: a saber having a curved blade with the edge on the convex side. . . . 2: something resembling a scimitar (as in sharpness or shape), esp: a long-handled billhook."42 The primary distinction between a scimitar and a sword is that the former has a curved blade.
Sometime around 200 BC, Zeniff recorded that his people were attacked by the Lamanites while they were "feeding their flocks, and tilling their lands" (Mosiah 9:14). When the survivors fled to the king, he had to arm them quickly. Thus "I did arm them with bows, and with arrows, with swords, and with cimeters, and with clubs, and with slings, and with all manner of weapons which we could invent" (Mosiah 9:16). Nothing is said of what materials were used to make these arms, but given the emergency situation it is plausible that they used or based them upon tools that they already employed for everyday purposes, such as wooden implements for clearing vegetation and slings and the bow and arrow for hunting. Since the Lamanites were without armor at this time, even such relatively crude weapons could have been effective.
Such a weapon may have survived right up to the Spanish conquest in highland Guatemala. One Spanish account of a native tradition relates that "the weapons with which it is said they fought were bows and arrows and certain cutlasses that they say were made of flint."50 The curved form of the end of the "short-sword" could justify the term cutlasses.
Despite Hassig's belief in the late invention of this weapon in Mesoamerican history, evidence from earlier Mesoamerican art shows that it was known far earlier than he realized. A stela from Comitan, Chiapas, from before AD 1,000, portrays a curved object like this weapon, while something similar is depicted on a monument at Chichen Itza, dated, according to its inscription, to AD 874.51 Moreover, murals from Teotihuacan as early as AD 450 display curved-bladed knives that look very similar to short-swords.52 Hassig grants that these "were doubtless used in combat as auxiliary weapons. . . . All combatants [among the Teotihuacanos] may have carried them."53 By their curved shape they too could be called cimeters.
Even back in the era of the Book of Mormon, a weapon was pictured that is similar to the short sword. Hayden notes that a "hooked implement" depicted on Stelas 3 and 4 at Izapa (second century BC) and on Stela 2 at La Venta (no later than the sixth century BC) "bears a remarkable resemblance to the hooked machete used by some groups today." To him "it seems most probable that the item was being used as a weapon," which must have been made of wood since no archaeological remains of this form have been recovered.54 Another early Guatemalan site, now known as Abaj Takalik, contains carved stone monuments somewhat similar to the sculptural styles at Izapa and La Venta and seemingly dated to the centuries before 400 BC One of these pictures a man who grasps a weapon with a curved blade. It is impossible to tell from these sculptured images whether the blades were of wood alone or had an inset obsidian edge.
The most obvious "sword" is the macuahuitl, the straight-edged wooden instrument lined with sharp stone fragments. It functioned like an Old World sword, and the Spaniards called it a sword without hesitation.
The cimeter of the Book of Mormon is known today as a scimitar—a curved blade with the outer side sharpened. The bill-hook, "short-sword," and double-dagger are other Mesoamerican weapons that fit with the concept of scimitar.
All the weapons cited in the Book of Mormon text have parallels among Mesoamerican armaments. By making this kind of comparison—of the scriptural text with external sources about the ancient American setting—we clarify the scriptural text and arrive at a more realistic understanding of what its people were actually doing in the stories we read in Mormon's account.
1. According to Robert F. Smith; see John L. Sorenson, "Metals and Metallurgy Relating to the Book of Mormon Text" (Provo, Utah: FARMS, 1992), 83.
2. Bernal DÃ az del Castillo, The Conquest of New Spain, tr. J. M. Cohen (New York: Penguin Books, 1963), 142—43.
3. Matthew Roper, "Eyewitness Descriptions of Mesoamerican Swords," JBMS 5/1 (1996): 150—58. See, for example, Francisco Lopez de Gomara, Cortes: The Life of the Conqueror by His Secretary Francisco Lopez de Gomara, tr. Lesley B. Simpson (Berkeley: University of California Press, 1964), 152; Antonio de Solis, The History of the Conquest of Mexico by the Spaniards, tr. Thomas Townsend, 3 vols. (London: n.p., 1724); ibid. (Book IV, ch. 13), 2:202; ibid. (Book IV, ch. 16), 2:221. Ronald Spores notes that the Mixtec warriors had "clubs, macanas, . . . long and short wooden swords, and bows and arrows," Ronald Spores, "The Zapotec and Mixtec at Spanish Contact," in Handbook of Middle American Indians (Austin: University of Texas Press, 1965), 3:976.
6. Thelma D. Sullivan, "The Arms and Insignia of the Mexica," Estudios de Cultura Nahuatl 10 (1972): 155.
7. Chris L. Moser, "Tomb I at Barrio Del Rosario, Huitzo, Oaxaca," Katunob 7/1 (1969): 20; see also Kent V. Flannery, "Zapotec Warfare: Archaeological Evidence for the Battles of Huitzo and Guiengola," in The Cloud People: Divergent Evolution of the Zapotec and Mixtec Civilizations, ed. Kent. V. Flannery and Joyce Marcus (New York: Academic Press, 1983), 319.
8. Francis Robicsek, "The Weapons of the Ancient Maya," in Circumpacifica. Band I: Mittel- und Sudamerica. Festschrift fuer Thomas S. Barthel, ed. Bruno Illius and Matthias Laubscher (Frankfurt: Lang, 1990), 372.
10. Francisco Estrada Belli and Laura J. Kosakowsky, "Survey in Jutiapa, Southeastern Pacific Guatemala, 1997," Mexicon 20 (June 1998): 55—59, fig. 4.
12. V. Garth Norman, "Izapa Sculpture, Part 2: Text," Papers of the New World Archaeological Foundation 30 (1976): 309, 317; Nikolai Grube and Linda Schele, "New Observations on the Loltún Relief," Mexicon 18/1 (February 1996): 11—14.
13. Philip Drucker, "La Venta, Tabasco: A Study of Olmec Ceramics and Art," Bureau of American Ethnology Bulletin 153 (1952): 202.
14. "The New Site Museum of San Lorenzo," Mexicon 17/6 (December 1995), 104. At a presentation at BYU in 1995, Cyphers Guillen affirmed that this weapon was a macuahuitl.
15. Spores, "The Zapotec and Mixtec," 3:976.
16. M. Wells Jakeman, ed., "The 'Historical Recollections' of Gasper Antonio Chi," BYU Publications in Archaeology and Early History 3 (1952): 40; Mercedes de las Garza, Relaciones Histórico-Geográficas de la Governación de Yucatán (Mexico: Universidad Nactional Autónoma de México, 1983), 1:270—71. See also Francis A. MacNutt, ed. and tr., De Orbe Novo: The Eight Decades of Peter Martyr D'Anghera, 2 vols. (New York: Putnam, 1912), 1:228, 327; 2:15, 21, 51, 182; Martin de Palomar, Relaciónes Historico-Geograficas de la Governacion de Yucatan, 2 vols. (Mexico: Universidad Nacional Autonoma de Mexico, 1983), 1:271.
17. Codex Mendoza: Aztec Manuscript, commentaries by Kurt Ross (Miller Graphics, 1978), 20, 91, 97—98; Ernest Mengin, "Commentaire du Codex Mexicanus nos 23—24 de la Bibliothèque Nationale de Paris," Journal de la Société des Américanistes 40 (1952): pls. 57, 60, 71; Eva Hunt, "Irrigation and the Socio-Political Organization of Cuicatec," in The Prehistory of the Tehuacan Valley: Chronology and Irrigation, ed. Frederick Johnson (Austin: University of Texas Press, 1972), 4:210, fig. 94. I would like to thank John Sorenson for bringing this example to my attention.
18. Brian Hayden, "Past to Present Uses of Stone Tools in the Maya Highlands," in Lithic Studies among the Contemporary Highland Maya, ed. Brian Hayden (Tucson: University of Arizona Press, 1987), 170.
19. Robert S. Chamberlain, The Conquest and Colonization of Yucatan 1517—1550 (New York: Octagon Books, 1966), 110. Chamberlain is citing Oviedo, Historia general y natural de las indias, islas y tierra firme del Mar Oceano (Madrid: n.p., 1851—55), 32—36.
21. In the Near East, weapons with a surface of "steel" in chemical terms were known hundreds of years before Laban's day. See Nikolaas J. van der Merwe and Donald H. Avery, "Pathways to Steel," American Scientist 70 (1972): 146—55; Lenore O. Keene Congdon, "Steel in Antiquity: A Problem in Terminology," in Studies Presented to George M. A. Hanfmann, ed. David G. Mitten, John G. Pedley, and Jane A. Scott (Cambridge: Harvard University Press, 1971), 17—27; Tamara S. Wheeler and Robert Maddin, "Metallurgy and Ancient Man," in The Coming of the Age of Iron, ed. T. A. Wertime and J. D. Muhly (New Haven: Yale University Press, 1980), 99—126.
22. William J. Hamblin and A. Brent Merrill, "Swords in the Book of Mormon," in Warfare in the Book of Mormon, ed. Stephen D. Ricks and William J. Hamblin (Salt Lake City: Deseret Book and FARMS, 1990), 329—51.
23. Janne M. Sjodahl, An Introduction to the Study of the Book of Mormon (Salt Lake City: Deseret News Press, 1927), 74—75; compare Robert J. Forbes, Metallurgy in Antiquity: A Notebook for Archaeologists and Technologists (Leiden: Brill, 1950), 402.
24. Sorenson, "Viva Zapato! Hurray for the Shoe!" RBBM 6/1 (1994): 319—26, 331.
25. Hamblin and Merrill, "Swords," 343.
27. Prescott H. F. Follett, "War and Weapons of the Maya," Middle American Research Series Publication 4 (1932): 388, fig. 20.
29. "Toltec Warfare," in Encyclopedia of Ancient Mesoamerica, ed. Margaret R. Bunson and Stephen M. Bunson (New York: Facts on File, 1996), 262.
30. De Solis, History of the Conquest (Book IV, ch. 2), 2:126—27.
34. DÃ az, Conquest of New Spain, 142—43, 145, 158, 228.
35. Ross, Codex Mendoza, 97—98.
36. Karl Ruppert, J. Eric Thompson, and Tatiana Proskouriakoff, "Bonampak, Chiapas, Mexico," Carnegie Institution of Washington Publications 602 (1955): 62.
41. Fray Diego Durán, The History of the Indies of New Spain, tr. Doris Heyden (Norman: University of Oklahoma Press, 1994), pls. 12, 14, 21—25, 27, 31, 35, 39, 40. The Inca also apparently possessed a macana.
42. Webster's Third International Dictionary. For an earlier discussion of this topic, see Paul Y. Hoskisson, "Scimitars, Cimeters! We have Scimitars! Do We Need Another Cimeter," in Warfare in the Book of Mormon, 352—59.
43. Charles Wisdom, Los Chorti de Guatemala (Guatemala: Editorial del Ministerio de Educación Pública "José de Piñeda Ibarra," 1961), 206; Angel Palerm, "Agricultural Systems and Food Patterns," in Handbook of Middle American Indians, 6:47; Evon Z. Vogt, Zinacantan: A Maya Community in the Highlands of Chiapas (Cambridge: Belknap, 1969), 42; Brian D. Hayden, "Material Culture in the Mayan Highlands: A Preliminary Study," in Settlement Pattern Excavations at Kaminaljuyu, ed. Joseph W. Michaels University Park: Pennsylvania State University Press, 1979), 222; Clemency C. Coggins, ed., Artifacts from the Cenote of Sacrifice: Chichen Itza, Yucatan (Cambridge, Mass.: Harvard University Press, 1992), 322—26.
44. Hayden, "Past to Present Uses of Stone Tools in the Maya Highlands," 167.
46. Hayden, "Past to Present," 169.
47. Hassig, War and Society, 112—13.
50. Juan de Estrada and Fernando de Niebla, "Descripción de la provincia de Zapotitlán y Suchitepéquez," Sociedad de Geografia e Historia de Guatemala, Anales 28 (1955): 74.
51. Franz Blom and Oliver LaFarge, Tribes and Temples: A Record of the Expedition to Middle America Conducted by Tulane University of Louisiana in 1925, 2 vols. (New Orleans: Tulane University of Louisiana, 1926—27), 2, fig. 352; J. Eric S. Thompson, "Some Sculptures from Southeastern Quetzaltenango, Guatemala," Notes on Middle American Archaeology and Ethnology 17 (30 March, 1943): 104. The date is given in Linda Schele and David A. Freidel, A Forest of Kings: The Untold Story of the Ancient Maya (New York: Morrow, 1990), 392.
52. Laurette Sejourné, Arquitectura y Pintura en Teotihuacán (Mexico: Siglo XXI Editores, 1966), fig. 173; George Kubler, "The Iconography of the Art of Teotihuacán," Studies in Pre-Columbian Art and Archaeology (1967): figs. 11—14; Arthur G. Miller, The Mural Painting of Teotihuacán(Washington D.C.: Dumbarton Oaks, 1973), 85, 116, 162.
54. Hayden, "Past to Present," 167.
55. Hamblin and Merrill, "Swords in the Book of Mormon," 343.
56. Antonio P. Andrews, "El 'Guerrero' de Loltún: Comentario Analà tico," Boletà n de la Escuela de Ciencias Antropológicas de la Universidad de Yucatán 8—9/48—49 (1981): 42; Lee A. Parsons, The Origins of Maya Art: Monumental Stone Sculpture of Kaminaljuyu, Guatemala, and the Southern Pacific Coast (Washington D.C.: Dumbarton Oaks, 1986), 78—79.
|
0.919626 |
Emperor Karl I of Austria (1887-1922), known as Charles IV of Hungary) was Austria-Hungary's last emperor.
Born on 17 August 1887 in Persenbeug Castle, Austria, Karl was a grandnephew of the man he succeeded, the aging Emperor Franz Josef I. He became heir to the throne with the assassination of Archduke Franz Ferdinand on 28 June 1914 (whose own children were barred from rights of succession based upon an agreement undertook by Ferdinand upon his marriage).
A cavalry officer until the outbreak of war in late July 1914, he subsequently took up an appointment as liaison officer, in which capacity he served during the opening Galician campaign. Following promotion he was recalled to court in mid-1915, but returned to active duty in May 1916. On the Italian Front he was given command of a corps before being transferred back to Galicia following the Russian Brusilov Offensive.
His military career was ended by the death of Franz Josef in late 1916; he became Austrian Emperor (Kaiser) on 21 November, and King of Hungary on 30 December.
Acutely aware that Austria-Hungary's entry into the First World War (having essentially brought it about) was likely to prove the undoing of the empire, Karl quickly sought a means of negotiating a separate peace with the allies.
Much influenced by his pro-Allied wife, Princess Zita of Bourbon-Parma, Karl sent peace feelers to France through the medium of his brother in law, Prince Sixtus of Bourbon-Parma. Inexpertly managed - clumsy even, since he refused to cede any territory to the Italians - his efforts were dismissed by the French government, although they were put to handy propaganda use the year during the great German push of Spring 1918 (to the great annoyance of his German allies, who never again trusted the Austro-Hungarian emperor).
Regarded as weak by both political extremes, left and right, Karl nonetheless drew support from political moderates. Karl responded with the appointed of a succession of liberal, reformist prime ministers, pretty much reflecting his own views.
Similarly determined to reform the army, Karl banned flogging, ended duels, called a halt to strategic bombing and limited the widespread use of poison gas; which served merely to infuriate his high command. He also decided to jettison Austria-Hungary's long-standing Chief of Staff, Conrad von Hotzendorf, replacing him with the more pliable Arz von Straussenberg.
It was all too late however. Utterly dependent upon German's military might, Karl's reforms achieved relatively little. With the Germans by now suspicious of Karl and Austria-Hungary generally, the new emperor was essentially coerced into what largely amounted to economic and military union with Germany following a meeting with the German Kaiser, Wilhelm II, at Spa on 11 May 1918.
Karl repeatedly attempted in the second half of 1918 to negotiate peace with the Allies, each time without success. By now it was clear that the tide was turning in favour of the Allied effort.
With political extremism growing at home, and nationalism rampant, Karl's attempt at domestic reform - the October Manifesto - which established a federation of autonomous Austrian states, proved insufficient.
Unusually for a monarch, Karl foresaw and largely accepted the dismantling of his empire - at least initially. On 31 October 1918 he granted permission for his soldiers to join national armies; just under two weeks later, on 11 November, he renounced his constitutional powers.
Having done so he then changed his mind, refusing to formally abdicate and instead vainly attempting to drum up royalist support. It was too late.
Forced to seek exile in Switzerland in March 1919 (with the assistance of the British), the Austrian parliament deposed him the following month. He attempted to return to Hungary two years later, but was denied permission on each occasion by the Horthy government.
The last of the Austro-Hungarian emperors died in penury in Madeira on 1 April 1922 of pneumonia at the tragically young age of 34. His wife, Zita, lived for a further 67 years, dying in Switzerland at the age of 96. She wore mourning black to the end.
Click here to hear Karl I give two speeches concerning an Austrian military fund for widows and orphans and military Orders of the Day. Click here to read Karl's reaction to news of the peace treaty agreed between Ukraine and the Central Powers at Brest-Litovsk.
Battle Police were military policemen deployed behind an attack to intercept stragglers.
|
0.999996 |
GCC Countries recurrently 'crack down' on undocumented migrants, detaining and deporting them in mass 'security' campaigns.
States also fail to recognize that undocumented or otherwise 'errant' migrants still have rights, which are systematically violated by their detention practices and deportation procedures.
In addition, a worker often becomes undocumented due to negligence of their sponsors.
GCC states set arbitrary goals to reduce the migration population, lending to an overly aggressive detention and deportation practices.
Who are the workers being detained and deported?
'Absconded' workers are migrants who 'run away' from their employers, often because of exploitation. The Kafala system makes it difficult for workers to legally change employers, so exploited migrants have little choice but to escape.
Workers who abscond are considered "Illegal"
Most were low-paid workers such as domestic workers, drivers, and laborers.
In 2012, Oman arrested 15,000 absconded workers.
In which a citizen charges them an initial fee and yearly sums to renew their residency and employment visas while they work for someone else.
Some employers report workers as 'absconding' so they can obtain more visas (allocated to citizens on a quota basis). Sponsors often retain workers identity documents, which can further prolong their detention.
Sponsors who force migrants into an undocumented status, or who sell "free visas" to migrant workers, are rarely held accountable.
Undocumented migrants are disproportionately penalized, indefinitely detained until they are deported.
Migrants can be detained indefinitely and are provided little information about their repatriation.
Though many migrants are denied the right to expedient deportation, they are still not provided with an individual review of their cases or the opportunity to contest their deportation.
The rights of all migrants, regardless of their legal status, should be protected.
States have the right to regulate migration and to deport those who violate their laws, but must recognize that these very laws also induce undocumented migration. Disproportionately penalizing migrants is neither an effective nor just solution to encouraging legal migration and improving national employment rates.
|
0.999998 |
Last month, the Chairman of the Federal Communications Commission, Ajit Pai, released a draft order that would soften net neutrality regulations. He wants to overturn the restrictions that make paid prioritization, blocking or throttling of traffic unlawful. If approved, this order could drastically alter the way that people experience and access the web. Without net neutrality, Internet Service Providers could determine what sites you can or cannot see.
The proposed draft order is disheartening. Millions of Americans are trying to save net neutrality; the FCC has received over 5 million emails, 750,000 phone calls, and 2 million comments. Unfortunately this public outpouring has not altered the FCC's commitment to dismantling net neutrality.
The commission will vote on the order on December 14th. We have 10 days to save net neutrality.
Although I have written about net neutrality before, I want to explain the consequences and urgency of the FCC's upcoming vote.
What does Pai's draft order say?
Chairman Pai has long been an advocate for "light touch" net neutrality regulations, and claims that repealing net neutrality will allow "the federal government to stop micromanaging the Internet".
Specifically, Pai aims to scrap the protection that classifies ISPs as common carriers under Title II of the Communications Act of 1934. Radio and phone services are also protected under Title II, which prevents companies from charging unreasonable rates or restricting access to services that are critical to society. Pai wants to treat the internet differently, and proposes that the FCC should simply require ISPs "to be transparent about their practices". The responsibility of policing ISPs would also be transferred to the Federal Trade Commission. Instead of maintaining the FCC's clear-cut and rule-based approach, the FTC would practice case-by-case regulation. This shift could be problematic as a case-by-case approach could make the FTC a weak consumer watchdog.
At the end of the day, frail net neutrality regulations mean that ISPs are free to determine how users access websites, applications and other digital content.
It is clear that depending on ISPs to be "transparent" will not protect against implementing fast and slow lanes. Rolling back net neutrality regulations means that ISPs could charge website owners to make their website faster than others. This threatens the very idea of the open web, which guarantees an unfettered and decentralized platform to share and access information. Gravitating away from the open web could create inequity in how communities share and express ideas online, which would ultimately intensify the digital divide. This could also hurt startups as they now have to raise money to pay for ISP fees or fear being relegated to the "slow lane".
The way I see it, implementing "fast lanes" could alter the technological, economic and societal impact of the internet we know today. Unfortunately it seems that the chairman is prioritizing the interests of ISPs over the needs of consumers.
Chairman Pai's draft order could dictate the future of the internet for years to come. In the end, net neutrality affects how people, including you and me, experience the web. I've dedicated both my spare time and my professional career to the open web because I believe the web has the power to change lives, educate people, create new economies, disrupt business models and make the world smaller in the best of ways. Keeping the web open means that these opportunities can be available to everyone.
If you're concerned about the future of net neutrality, please take action. Share your comments with the U.S. Congress and contact your representatives. Speak up about your concerns with your friends and colleagues. Organizations like The Battle for the Net help you contact your representatives — it only takes a minute!
Now is the time to stand up for net neutrality: we have 10 days and need everyone's help.
|
0.998195 |
“Fracking” has become a popular buzzword since the natural gas industry emerged as a major global player in energy economies. New technologies in horizontal drilling and hydraulic fracturing have opened up access to deep underground shale deposits, exponentially increasing the amount of available natural gas in North America. Internationally, the market demand for natural gas is increasing, especially in Asia, leading to unconventional natural gas drilling at remarkable rates. There are major concerns and gaps in the information available to the public on fracking, particularly in Manitoba.
Hydraulic fracturing or “Fracking” is a technique that involves the injection of millions of litres of water and thousands of litres of unidentified chemicals underground at extremely high pressure in order to create fractures in the underlying shale rock formations and extract the natural gas below the surface. New horizontal drilling technology allows companies access to shale deposits that have traditionally been beyond the reach of conventional vertical drilling. The combination of fracking and horizontal drilling has greatly expanded the natural gas potential in North America. Fracking for unconventional gas is rapidly expanding in almost every province across Canada.
Hydraulic fracturing is a process used in nine out of 10 natural gas wells in the United States, where millions of gallons of water, sand and chemicals are pumped underground to break apart the rock and release the gas.
Scientists are worried that the chemicals used in fracturing may pose a threat either underground or when waste fluids are handled, stored or sometimes spilled on the surface.
Many groups, including the International Panel for Climate Change, the International Energy Association, government boards, stakeholders in the oil and gas sector, and business people are excited about the potential prospects fracking could bring to their communities. Horizontal drilling has opened up a market for unconventional gas which has led to burgeoning economic opportunities for North America (Atkinson et al. 2012, Barclay 2012, Sica 2013). There has been an increase in job opportunities directly on drilling sites and in the relational job market. Communities in the vicinity of extraction sites have seen a boost in local economies, as the number of people passing through the area has increased.
The controversial practice of hydraulic fracturing is facing mounting opposition across the country as the potential for environmental catastrophe increases. A new Environics Research poll commissioned by the Council of Canadians has found that 62% of Canadians support “a moratorium on all fracking for natural gas until all the federal environmental reviews are complete”.
Is Fracking Occurring in Manitoba?
Yes, hydraulic fracturing is occurring in Manitoba and has been for over two decades (Welch 2013). Although it may not be a new technique, the mega-scale at which fracking is currently occurring at is historically unheard of. Southwestern Manitoba lies over top of the Bakken shale formation, which extends into Saskatchewan and down into North Dakota. So far, the Southwestern corner of the province has seen the most fracking activity, with an epicenter in the town of Virden. In 2013, 600 new wells were drilled using horizontal techniques in Manitoba (LeNeveu 2013). Currently the price of natural gas is low due to the massive glut being produced in the United States, so the majority of drilling in Manitoba is for oil. The natural gas is considered a by-product and the sour gas is flared off or vented.
Oil and Gas companies working in Manitoba: Nordic Oil and Gas Ltd, Tundra Oil and Gas Partnership, Spearing Service LTD., Robert B. Somerville Co. Limited, USR, EOG Resources Canada Inc., Pennwest Petroleum Ltd., ARC Resources Ltd., Canadian Natural Resources Limited, Fort Calgary Resources Ltd., Reliable Energy Ltd., Legacy Oil and Gas Inc., Red Beds Resources Ltd., Surge Energy Inc.
What regulations affect Fracking in Manitoba?
The Manitoba Surface Rights Act: In Manitoba, as in most of Canada, landowners only own the rights to the surface of their land, not the mineral rights. The province annually auctions off the mineral rights of the land to the highest bidder. Whoever wins the mineral rights to an area must first come to an agreement with whoever holds the surface rights before they can begin to drill. If a landowner does not wish to have drilling occurring under their land, they can appeal to the provincially run Surface Rights Board.
Species At Risk Act (S.A.R.A.): According to the Manitoba Conservation Data Center. Southwest Manitoba is the location of the threatened mixed-grass prairie, where five known globally endangered and threatened species are endemic. This area is also prone to droughts and the economy is primarily driven by agricultural activities.
Any person wishing to drill a well must first obtain a well license for the specific well. However, the site proposed for a well may be surveyed without a license [88 (1)(2)].
The Director may refuse to issue a well license if the well might cause significant adverse impact on the environment or impair the use of the surrounding land .
All salt water waste must be re-injected into an underground formation in appliance to the Salt Water Disposal Permit [109(1)].
It is the duty of the operators of the well to prevent spills in at all times. If a spill occurs, it is the duty of the operator or the licensee of the well to report, contain, clean up and rehabilitate the site [119(1)(2)(3)].
The Environment Act- Waste Disposal Grounds Regulations [150/91]: An outline of the solid waste guidelines in Manitoba. Although there is plenty of general information about waste disposal, there are no specific regulations regarding solid waste from oil fields in Manitoba.
Air Quality Regulations: There are currently no regulations about reporting sour gas flaring and venting in Manitoba. However, according to the Petroleum Branch of Manitoba, there are air quality objectives and guidelines that provide protection to communities and their environments including the 1-hour maximum acceptable level for Sulphur Dioxide is 0.34 ppm and 0.011 ppm for Hydrogen Sulphide.
Is natural gas a “transition fuel”?
The increase in natural gas extraction has been praised for helping Canada ease off its national dependence on foreign oil (Atkinson et al. 2012, Barclay 2012, Sica 2013). Natural gas is being marketed as the most climate friendly of the fossil fuels (Parfitt 2011). Advocates claim that fracking technology harnesses ‘cleaner, greener’ energy options (Stephenson et al. 2012). Overall, natural gas produces less greenhouse gases and particulate matter than coal and oil. Natural gas can also be extracted locally in Canada cutting down on the environmental and economic transportation costs of using energies produced across international borders.
Despite the overall decrease in greenhouse gases emissions, the combustion of natural gas consequently releases higher concentrations of methane than other fossil fuels. Methane molecules cause the most ozone damage in the smallest concentration, meaning that even a small amount of methane will contribute to climate change (Stephenson et al. 2012). Anti-Frackers claim that the environmental and human health costs have not been calculated into the price of natural gas extraction, which would make it much pricier than the current market price. Opponents of fracking insist that just like other fossil fuels, natural gas extraction is unsustainable in the long term.
Groundwater Contamination: Fracking threatens water quality through groundwater contamination from the injections of toxic fluids near aquifers, or through the handling and spilling of contaminated waste fluids. Fluid waste contains toxic and radioactive substances known as “wastewater flowback”. Due to the secretive and competitive nature of the industry, many companies keep a portion of their flowback “recipe” private. This means that the public does not have access to all of the chemicals that are entering the subterranean ecosystem. The flowback is sometimes stored underground or treated at municipal water treatment facilities and discharged into waterways, putting drinking water supplies at risk. In Manitoba, the saline water is injected into the ground, but it is unclear where the rest of the waste is stored (LeNeveu 2013).
Increased Seismic Activity: Horizontal drilling and hydraulic fracturing have been suspected in the increase of earthquakes in highly fracked areas (Prud’Homme 2014, Ellsworth 2013). Alongside the obvious detrimental effects of earthquakes, seismic activity can disturb aquifers by creating pathways for flowback, gases or substances from other geological layers to travel into groundwater layers. The water may collect arsenic, hydrocarbons and radioactivity from the shale deposit itself.
Methane Migration: Fracking projects can lower groundwater levels and reduce water pressure in nearby aquifers. This allows methane gas (a component of natural gas) to accumulate in gas bubbles that surface in shallow bodies of water or in household pipes. Methane gas is colourless and odorless and can cause explosions. There are documented cases where homeowners living near a fracked well can literally light their water on fire because of methane gas bubbles in their pipes. In Pennsylvania, Cabot Oil and Gas has been ordered to provide a fresh water supply to more than a dozen homes where water has been contaminated near fracked wells (Prud’Homme 2014, Osbourn et al. 2011, Wilbur 2012).
Drinking Water Contamination: There are hundreds of reports of drinking water contamination associated with fracking in the United States. According to a US Environmental Protection Agency study, 20 to 40 per cent of injected fluids can remain trapped in the rock formations for decades. This means the extent of water contamination is difficult to measure and may not reveal itself until decades later. (Prud’Homme 2014, Wilbur 2012, Parfitt 2011).
Local Water Depletion: Large amounts of water are required for fracking, particularly when the project is based in shale rock. This water can come from municipal sources, surface or groundwater, and often needs to be trucked in from elsewhere. Approximately 2 to 9 million gallons of water are required for a single fracking job. Much of the water becomes so contaminated it cannot return to the watershed.
Air Pollution: A University of Colorado School of Public Health study claims that air pollution resulting from hydraulic fracturing may contribute to acute and chronic health problems for those living near oil and gas drilling operations. Lisa McKenzie, et al., “Human Health Risk Assessment of Air Emissions from Development of Unconventional Natural Gas Resources,” Science of the Total Environment, March 2012. Based on three years of monitoring, the study examined effects on people living within a half-mile of wells.
According to the study, exposure to air pollutants, including benzene, ethylbenzene, toluene, xylene, heptane, octane, and diethylbenzene during well-completion activities presented the greatest potential for adverse health effects. During the completion phases, the study found that the pollutants with the greatest impacts were trimethylbenzenes, aliphatic hydrocarbons and xylenes, which can purportedly cause neurological and respiratory effects such as eye irritation, headaches, sore throat, and breathing difficulties. Researchers recommend further studies that include collection of data about potential area, residential and personal exposure where wells are operating.
|
0.959915 |
Explain how Australian Corporations Law deals with corporate groups in the context of the doctrine of the separate legal entity of a corporation.
1. The assignment must be of 2,000 to 2,500 words in length.
2. The assignment must be typed or printed on one side only of A4 paper.
3. The completed assignment must be submitted either by submitting a printed copy at classes held on Tuesday 17 September, 2013 or my emailing it as an attachment to gerry.box@vu.edu.au on that date.
4. The assignment must include footnotes and a bibliography and may, at the author’s option, include a synopsis.
5. Assignments will be marked out of a possible 30 marks.
6. Assignments submitted after the due date will incur a penalty for late submission of one mark for each day by which the assignment is overdue, unless an extension of time has been obtained prior to the due date.
7. Students should research the topic in texts other than the prescribed text. A good starting point for such research is Understanding Company Law, Lipton, Herzberg & Welsh 16th Ed., paragraph 2.190 and subsequent paragraphs, or any recent edition of that text.
8. Students should familiarise themselves with Victoria University policy on plagiarism, and contact me if they have any doubts about the content of that policy and the consequences of any breach/s of the policy.
9. As the topic will not be discussed in classes before the due date for submission, students should undertake their own research into the topic.
10. Please ensure that your name and ID Number appear on each page of your work.
Business and Company Law Coordinator. July, 2013.
|
0.993021 |
A friend of mine, who with her husband write a blog, posed an interesting question. If you could write a blog post based on a song, what song would you use to describe your life and why? It got me to thinking.
After careful consideration, I chose “How He Loves” by David Crowder Band. It is a song that has been present in my darkest time and my brightest.
As I sit and ponder the thought of this day, St. Valentine’s Day, I am amazed at how it has become so commercialized. It is like everyone has to get flowers, chocolates, and make plans to attend dinner somewhere romantic. But many don’t know that this feast of love, has to do first, with death.
|
0.999938 |
TL;DR: CocoaPods just got a facelift.
Interested in finding the CocoaPods Logo? Check out our Media Pack.
I believe design is important. CocoaPods is probably the most public facing Objective-C project. Applying design to open source projects is a sign of maturity, and of stability. Whilst we're still not 1.0 yet, having a cohesive brand is a step towards that.
This post documents some of the work involved in making the new CocoaPods web properties.
The CocoaPods devs welcomed me with open arms after I started regularly contributing via the Specs repo, and encouraged by their work I started a project called CocoaDocs. Once it became quite obvious that CocoaDocs was going to be an important part of the CocoaPods ecosystem I branded it with the CocoaPods styling, and it was treated as a sister project.
Around the same time we were seeing issues with documentation, it was user contributed and spread out among the cocoapods website and a collection of wikis, so Michele Titolo & I started to mock out the guides structure and Michele started collating documents and creating a single source for the markdown files.
Andy and I went back and forth on logos for a few months until we came up with the version shown in the top left and in this blog post announcing the new blog. Andy (quite correctly) believed that we couldn't just announce a logo without showing it in context, that meant re-thinking the homepage. I spent some time with Florian Hanke digging into the site analytics to try and get an understanding how people were using the current website. Turns out everyone is using it to search for Pods. Who'd have thought?
So that gave us a direction for what the site should orient itself towards. We knew that search should be a high priority, and that a lot of the documentation should move into a guide leaving a lot more breathing space in the homepage. The new design was worked on in secret until we felt there was enough context around the branding. You can't re-think something this big in a weekend, and showing incremental work isn't always the best option when you are making drastic moves. Luckily Eloy Durán & Fabio Pelosin trusted that we knew what we were doing when I said that the old CocoaPod illustration will have to go.
With buy-in from the rest of the team, and some helpful tips we all discussed the scope of the changes. We'd have to break the current website into 3 separate projects, sharing assets, design and code as much as possible. This meant we could incrementally build the sites as staticly generated content and upload it to github. It was an easy sell that we needed a blog, and it was an easy sell that we should split out the CocoaPods twitter into one specifically for new Pods. The blog meant we could wax lyrical about new releases, keep people up to date and have a sense of permenance in the CocoaPods team voice. Keith Smiley started building the blog the moment it had some mockups. Setting up a shared repo for all our assets and design notes.
Fabio & I announced the redesign at NSSpain. We had stickers. It went well.
Building this blog gave us chance to start dealing with some of the navigation issues that just aren't obvious during design stage. Andy & I iterated quickly on design and implementation. We used Bootstrap 3 to build the sites and I'm definitely a fan of the system. Everyone on the CocoaPods team took an OSS break for iOS7. Our developers chat room was a desert for a while. Once that hurdle had been jumped a few of us got started thinking about full fleshing the guides out.
The guides were an interesting navigation problem, we knew roughly the overall structure and a lot of the problems came in dealing with heirarchy and ensuring consistency in the documentation. It took one sentence from Artsy's head designer Robert Lenne and the index page was figured out.
During this period Florian started work on the API changes required for the new site, as it was to be a static site meaning we can dogfood our now 2 year old API. We've started work on splitting the API out into it's own project to accomodate the ideas Andy & I wanted for the search experience. Florian has done an amazing job on the feel of the search interface, and it is super fast. We just worked off and on over the course of a few weeks together on the cocoapods.org domain until it felt right.
There's still a bunch of work to be done, like the about page, and some more work on mobile, design tweaks, but overall the experience is definitely a step forwards. We've had a lot of help from everyone in the core team, and people who have taken the time to discuss ideas with me and the rest of the team. This is one step of many, and it will probably be a while before we remove that beta in the top corner. In true open source style we take both pull requests and issues, and as much of the content has a button to go directly to the source to submit changes.
Let us know what you think either on twitter (@CocoaPods) or if your idea is too big for 140 characters, write us an issue. This was a team effort, and I'm super proud to have been a part of it. !m!
|
0.999918 |
Hey guys! For the summer, I decided to write a small piece about our environment, the role our government plays in protecting our planet, and how current candidates are addressing this issue. But first, some background.
Hey guys! Today I want to discuss the right way to respectfully disagree with one another, something I feel is super relevant in this election. The great thing about our country and the election process is the principle that all of our ideas matter. Many people might not share our own perspectives on issues such as marriage equality, healthcare systems, etc. Different perspectives, and different ways of handling these political disagreements, are prevalent in this election and even in our own conversations with friends.
|
0.97949 |
Ali Hosseini Khamenei is the Grand Ayatollah, or Supreme Leader, of Iran. Khamenei belongs to the Twelver Shi'a sect which is the largest branch of Shi'a Islam.
In 1979, Ayatollah Khomeini launched the Islamic Revolution in Iran and Khamenei was elected president of the country in a landslide vote after the 1981 assassination of Mohammad-Ali Rajai. Khamanei thus became the first cleric to serve in the Iranian presidency and in his inaugural address as president he promised to eradicate "deviation, liberalism, and American-influenced leftists."
From 1981-89, Khamenei served as the Iran’s president, being relected in another landslide victory in 1985. He also served in a number of other political capacities during that time, including: Chairman of the High Council of Revolution Culture Affairs (1982); President of the Expediency Council (1988); and Chairman of the Constitutional Revisal Committee (1989). In June 1981 an assassination attempt paralyzed his right arm.
In June 1989, following the death of Khomeini, the Iranian Assembly of Experts elected Khamenei as the new Supreme Leader of the Iranian Revolution. Though he lacks the charisma and clerical standing of his predecessor, Khamanei has assured his position by brining many of the powers of the presidency with him into the office of Supreme Leader, turning himself into an "omnipotent overseer of Iran's political scene".
Regarding his leadership, Khamenei issued a fatwa - religious prohibition - against any insult to the companions or wives of Muhammad. Additionally, he issued a fatwa that the production, stockpiling, and use of nuclear weapons are forbidden according to Islam. In 2000, Khamenei was listed by the Committee to Protect Journalists as "one of the top ten enemies of the press and freedom of expression." Under his leadership, countless reporters have been arrested and interrogated for unclear and unproven charges. In 2010, Forbes listed Khamenei as among the "World’s Most Powerful People" and Time named him one of the "Time 100" in 2007.
Ruhollah Musavi Khomeini was an Iranian religious leader, politican, and leader of the 1979 Iranian Revolution which overthrew the Shah of Iran and instituted an Islamic government.
In 1961 and 1963 Khomeini showed strong opposition to Mohammad Reza Shah's reforms, leading demonstrations and riots against the Shah. He consistently blamed the U.S. and Israel for all the corruption and backwardness in Iran. On June 3, 1963, he gave a provocative speech mainly against what he called the dependence of the Shah's regime upon the U.S. and Israel. Two days later he was arrested, which resulted in anti-Shah demonstrations in Qomm and in other cities of Iran. The slogan "Death to the Shah, Death to America, and Death to Israel" was seen and heard almost everywhere. The demonstrations were crushed by the Shah's troops; many were killed or wounded. On November 4, 1963, Khomeini was sent into exile, first to Turkey and then to Iraq where he resided in the Shi'i holy city of Najaf.
Anti-regime demonstrations motivated by Khomeini's speeches, recorded on cassettes and pamphlets in Najaf, continued however to arrive in Iran. The unrest and commotions culminated in 1977/78. The shah requested the Iraqi Government to expel Khomeini from Iraq. Khomeini chose to go to France (October 5, 1978). His frequent speeches from there, too, agitated the people against the Shah, the U.S. and Israel. The future of the Jewish community in Iran was in jeopardy. Several thousand Jews in Teheran, headed by some well-known social and religious personalities were "advised" to take part in demonstrations, which they did (December 11, 1978). Finally the Shah left Iran on January 16, 1979, and two weeks later Khomeini entered the country, being welcomed by millions of people; the Jews of Teheran once again were "advised" to join the demonstration to welcome Khomeini's arrival (February 13, 1979). Soon afterwards, an Islamic Republic was formed with a new Islamic constitution. Though it contained many discriminatory provisions against non-Muslims, it still granted second-class citizenship rights to Jews and other religious minorities, as protected non-Muslim monotheists – with the exception of the Bahais who were persecuted and over 200 of them were massacred all over Iran. The treatment of the Jews was ambivalent.
In the first two to three years of the Islamic Republic of Iran (IRI), about one-third of Iran's 80,000 Jews left for Israel, Europe, and the U.S. IRI broke its relations with Israel. The regime adapted a pro-Palestinian policy declaring that Israel and Zionism must be destroyed. IRI also encouraged the foundation of Hizbollah in Lebanon by supporting it with money, arms, and military advisers. Any tie with Israel was considered war against Islam. Though upon his return from Paris Khomeini met with the heads of the Jewish community, declaring that Jews were to be protected by Islamic law, some 200 Jews were arrested and jailed. During his rule, about 20 Jews were executed by the Revolutionary Courts, among them the former head of the Jewish Organization, the industrialist millionaire Habib Elghanaian (May 9, 1979). Many were deprived of their administrative, university, and high business positions. Jewish property on a large scale, amounting to more than one billion dollars, was confiscated by the regime. In recent years the IRI has tried to demonstrate some "friendly relations" with the remaining Jews of Iran who were led by the former Tudeh Party member, Parviz (Haroon) Yeshayai, the head of the Jewish Central Organization in Teheran. Nevertheless, events, such the arrest of 13 Jews in the last decade of the 20th century, allegedly spying for Israel, show the true face of these relations. As long as the hatred against Israel and Zionism and the support of terrorist organizations such as Hizbollah continue to fuel the foreign policy of Iran, the situation of Jews in IRI will remain precarious.
Hassan Rouhani is the seventh and current President of Iran. He was elected to succeed Mahmoud Ahmadinejad in June 2013. Rouhani is also a former Iranian diplomat who led the country's nuclear negotiating team in the 1990's.
As a young cleric, Rouhani started his political activities by following Ayatollah Ruhollah Khomeini during the beginning of the Iranian Islamic movement. In 1965, he began traveling throughout Iran making speeches against the government of the Shah. During those years he was arrested many times and was banned from delivering public speeches. In November 1977, at a public ceremony held at Tehran's Ark Mosque to commemorate the death of Ayatollah Khomeini's son, Rouhani used the title "Imam" for the first time as a reference to Khomeini, the then exiled leader of the Islamic movement.
When the Islamic Revolution became victorious in Iran, Rouhani returned and set to work trying to stabilize the new government. He was first elected to the Islamic Consultative Assembly (Majlis) in 1980 and would spend five terms, 20 years, in the assembly. He served in various capacities including deputy speaker of the Majlis as well as the head of defense committee and foreign policy committee. From 1980 to 1983, he served as the leader of the Supervisory Council of the Iranian national radio and television network. During the Iran-Iraq war, Rouhani was a member of the Supreme Defense Council, member of the High Council for Supporting War and headed its Executive Committee, deputy commander of the war, commander of the Khatam-ol-Anbiya Operation Center and commander of the Iran Air Defense Force. From 1988 to 1989, he was appointed and served as Deputy Commander-in-Chief of the Armed Forces.
In 1989, after Iran established the Supreme National Security Council (SNSC), Rouhani became Ayatollah Ali Khamenei's personal representative to the council. Rouhani also served as the first secretary of the SNSC and kept that post until 2005. Between 1989 and 1997, and then again from 2000 to 2005, Rouhani served as national security advisor to Presidents Rafsanjani and Khatami. In 1991, Rouhani was appointed to the Expediency Council, where he heads the Political, Defense, and Security Committee.
In the elections of February 2000, Rouhani was elected to the Assembly of Experts from Semnan and in 2006 he was elected as Tehran's representative to the Assembly. From 2001 to 2006, he was the head of the political and social committee of the Assembly, member of the presiding board and head of the Tehran office of the secretariat of the assembly.
From October 2003 to August 2005, Rouhani also took on the responsibility as Iran's top nuclear negotiator with the West. It was during this time that revelations about Iran's nuclear program were addressed by the IAEA and, under leadership from the top echelon of Iran's government, Rouhani oversaw a temporary and voluntary suspension of certain parts of their nuclear program. Following the election of Mahmoud Ahmadinejad to the presidency in 2005, Rouhani resigned from his post on the SNSC.
In October 2006, Rouhani was among a group of high ranking Iranian government officials listed in an indictment by the Argentine government prosecutor investigating the AMIA Jewish Community Center bombing from 1994. According to the indictment, Rouhani was a member of the special committee that approved the AMIA bombing. The decision for the bombing was ultimately made by Supreme Leader Khamenei, but Rouhani was present for discussions along with then-President Rafsanjani, Foreign Minister Ali Akbar Velayati and Intelligence Minister Ali Fallahijan.
In January 2013, Rouhani announced his candidacy for president in the June 2013 elections to replace Ahmadinejad whose term limit was up. Rouhani, despite suggestions from Iranian media outlets that he may be disqualified from the race, won the election with 52% of the vote, beating out main rival Mohammad Bagher Ghalibaf. He was inaugurated as the Islamic Republic's seventh president in August 2013.
Following the election, Rouhani vowed to engage with the world. "We need to be honest, have clean hearts ... and should learn from the mistakes from the past in order to save the country," he said.
Rouhani is married with three children. A fourth child committed suicide in 1992.
Mahmoud Ahmadinejad was the sixth President of Iran, serving from 2005 to 2013 and succeed by Hassan Rouhani. He remains one of the most controversial international figures for his blatant denial of the Holocaust, incitement against Israel, disregard for human rights and support of the Iranian nuclear power program.
Ahmadinejad is widely considered to be a religious, ultra-conservative Islamist, with a commitment to an agenda of economic populism and sociopolitical conservatism, bearing ample resemblance to the Taliban’s. However, unlike his predecesor, Mohammad Khatami, and his main electoral rival, Ali Akbar Rafsanjani (Iran’s fourth president from 1989-1997), Ahmadinejad had no formal religious education and stressed his modest origins and simple lifestyle. Politically, Ahmadinejad is a member of the Central Council of the Islamic Society of Engineers, but he has a more powerful base inside the Alliance of Builders of Islamic Iran (also known as Abadgaran), in which Ahmadinejad is considered one of the main figures.
Confusion surrounds his role in the 1979 Islamic Revolution. Several of the 52 Americans who were held hostage in the U.S. embassy in the months after the revolution say they are certain Ahmadinejad was among those who captured them. He insists he was not there, and several known hostage-takers – now his strong political opponents – deny he was with them. His website says he joined the Revolutionary Guards voluntarily after the revolution, and he is also reported to have served in covert operations during the 1980-88 Iran-Iraq war. Indeed, Ahmadinejad's primary base of support comes from the millions of Iranians for whom fighting in the Iran-Iraq war was the defining event of their lives. This so-called ‘war generation’ is distinct from the revolutionary generation that brought Iran’s Islamist Shi’ite clerics to power in 1979.
Moreover, Ahmadinejad has praised the acts of suicide terrorists, stating, “Is there art that is more beautiful, more divine, and more eternal than the art of martyrdom? A nation with martyrdom knows no captivity. Those who wish to undermine this principle undermine the foundations of our independence and national security. They undermine the foundation of our eternity.” Ahmadinejad also defends his country's nuclear programme, which the European Union, the United States and many others in the international community fear is intended to develop nuclear weapons.
Mohammad Khatami is an Iranian scholar and politician who served as the fifth President of Iran from 1997 to 2005. He was succeeded by Mahmoud Ahmadinejad.
Before serving as president, Khatami had been a representative in the parliament from 1980 to 1982, supervisor of the Kayhan Institute, Minister of Culture and Islamic Guidance (1982–1986), and then for a second term from 1989 to May 24, 1992 (when he resigned), the head of the National Library of Iran from 1992 to 1997, and a member of the Supreme Council of Cultural Revolution.
Running on a reform agenda, Khatami was elected president on May 23, 1997 in what many have described as a remarkable election. Voter turnout was nearly 80%. Despite limited television airtime, most of which went to conservative Speaker of Parliament and favored candidate Ali Akbar Nateq-Nouri, Khatami received 70 percent of the vote. "Even in Qom, the center of theological training in Iran and a conservative stronghold, 70% of voters cast their ballots for Khatami." He was re-elected on June 8, 2001 for a second term and stepped down on August 3, 2005 after serving his maximum two consecutive terms according to the Islamic Republic's constitution.
Khatami supporters have been described as a "coalition of strange bedfellows, including traditional leftists, ... business leaders who wanted the state to open up the economy and allow more foreign investment" and "women and younger voters." The day of his election, the 2nd of Khordad, 1376, in the Iranian calendar, is regarded as the starting date of "reforms" in Iran. His followers are therefore usually known as the "2nd of Khordad Movement".
Khatami is regarded as Iran's first reformist president, since the focus of his campaign was on the rule of law, democracy and the inclusion of all Iranians in the political decision-making process. However, his policies of reform led to repeated clashes with the hardline and conservative Islamists in the Iranian government, who control powerful governmental organizations like the Guardian Council, whose members are appointed by the Supreme Leader. Khatami lost most of those clashes, and by the end of his presidency many of his followers had grown disillusioned with him.
As President, according to the Iranian political system, Khatami was outranked by the Supreme Leader. Thus, Khatami had no legal authority over key state institutions: the armed forces, the police, the army, the revolutionary guards, the state radio and television, the prisons, etc. Khatami presented the so called "twin bills" to the parliament during his term in office, these two pieces of proposed legislation would have introduced small but key changes to the national election laws of Iran and also presented a clear definition of the president's power to prevent constitutional violations by state institutions. Khatami himself described the "twin bills" as the key to the progress of reforms in Iran. The bills were approved by the parliament but were eventually vetoed by the Guardian Council.
|
0.999984 |
Partner with us to stand against slavery.
Through your partnership, you enable our ministry to focus on the one, to provide hope for a future free of exploitation. Our partners make what we do possible. By working together both financially and prayerfully, we can make a difference. Whether you give one time or commit to monthly support, every dollar counts!
Each gift bag we give to the girls is filled with items such as lip gloss, make-up, nail polish, lotion, tissues, hand sanitizer, and candy. We also include a card with our 24 hour hotline number, a hand written note, and the message that they matter. The bags are given without any expectations; we just want the girls to know that they are loved and that we care.
We ask that all donated items are new and undamaged. We want the girls to know that they are valued and worth it.
The rescue bag is a small duffel bag we give when a girl reaches out to us to seek help to leave prostitution. The bag helps her ease into the transition to her safe home or rehabilitation center. We want to help her as much as possible and see her succeed in leaving the lifestyle, so we fill this bag with everyday essentials, including a change of clothes, a toothbrush, and toiletries.
Our team goes on four outreaches per month. Each night, on average, we give about 15 bags to the girls on the streets in Los Angeles. The girls are always so excited to receive a gift and are shocked that there are people out there in the middle of the night meeting them where they are, simply because they matter. By sponsoring a month of outreaches, you are helping us spread this message! Average breakdown = 4 outreaches x 15 gifts x $3 per gift bag = $180.
|
0.999993 |
The following items will test your understanding of the material covered in this lesson. There is only one correct answer for each item. When you have completed the exercise, check your answers with the answer key that follows. If you answer any item incorrectly, review that part of the lesson which contains the portion involved.
During the mountainous exercise all members of the unit are required to demonstrate their abilities by identifying the basic climbing techniques and methods acquired during training.
1. During a mountainous exercise, your unit is moving through an avalanche area. You should a. be aware that the basic elements for the avalanche phenomenon are terrain, climate, and weather.
b. know that the only factor affecting avalanches are snowpacked regions.
c. be aware of the danger and only enter the area in the morning.
d. follow your co-workers since they are experienced in avalanches.
2. When moving through a slope where crevasses and glaciers are formed, you would a. proceed as trained but move very slowly.
b. move to the inside of bends and away from steep slopes and icefalls.
c. call the unit to a single column and move to the outside of bends.
d. avoid all cracks in rocks and icefalls.
3. While in the mountains, weather changes are so variable and erratic that in one day hurricane winds occur one after another, and exposed weather contrasts with sheltered weather. These characteristics are the result of a. typical mountainous weather in high altitudes.
b. poor weather forecast by the military mountaineering.
c. The life cycle of a local storm or from the movement of a traveling storm.
d. the life cycle of a local storm forecasted by the local residents.
4. You know that the approach of cumulus clouds are associated with a. a stable atmosphere but may indicate the approach of a storm.
b. moderate weather such light winds, moderate rain, and lightning.
c. temperatures below 30 degrees F, producing hail and tornados.
d. violent weather such as heavy rains or snow and strong gusty winds.
5. While in the mountains and during stormy weather, the unit discovers that the approach of lightning is imminent. You should a. not climb, and get as far down the mountain and away from the exposed ridges, and seek protection from direct strikes and ground current.
b. continue climbing but tie yourself to a point of protection to avoid falling.
c. add another layer of clothing for protection against cold and wetness.
d. stay calm and help your co-workers maintain a steady climb.
6. While in mountainous regions, you must remember that potable water supplies are limited, and water intake must be only from approved sources. To follow the three rules of water discipline, you must a. disinfect the water, obtain approval from the leader of the water party, and make sure all utensils are clean before use.
b. drink only treated water, conserve water for drinking, and do not contaminate water sources.
c. drink only treated water, use iodine tablets to double check for germs, and boil the water for about 20 minutes.
d. drink only treated water, use two iodine tablets to double check for germs, and boil the water for about 30 minutes.
7. One of the members of your unit may be suffering from trench foot. To treat him, you would a. check to see if his feet have blisters and a tingling sensation.
b. change his clothes and his socks immediately and seek medical attention.
c. ask him if he has pain, double check the blisters on his feet and drain the pus if detected.
d. keep his feet dry and with clean socks, dry the inside of the boots, use foot powder and change socks as often as possible.
|
0.999663 |
Transform into a magician with the Magic theme for the Xperia AR Effect application! Amaze your friends and family with an exciting array of tricks and props and share the magic in photo and video.
1. Open the AR Effect app.
2. Select the icon of the downloaded theme on the screen.
This theme app requires AR effect version 4.4.2 or higher. Please upgrade your AR effect application before downloading and installing the theme.
**Palm recognition uses the technology which is powered by Sony Deep Learning Solution. Palm recognition is supported on Android version 5.0 and higher, and devices based on QualcommR processor.
|
0.999914 |
Put this in the ``We haven't seen this topic before'' category: A woman finds herself only after she leaves her husband and her lover for a gorilla. Linda Morris is not happy: ``Whenever I felt I could no longer bear another moment of my marriage I would imagine my husband's funeral....'' In fact, Linda loves her affluent, entrepreneurial husband, Steven, but their relationship survives because they never probe it too deeply. For excitement, Linda has a lover she doesn't even like named John Banks, who may be an assassin. Linda's real problem? No self-identity. One night, Linda and Steven lie in bed discussing his most recent investment--a Coney Island horror house with a Rent-A-Pet gorilla. Suddenly, Linda can no longer face him, or John, or not knowing herself. She sneaks away in their old Suburban only to find her escape complicated by Moses the Rent-A- Pet in the back. The next morning she tries dropping the gorilla at the horror house, but Moses kills, in self-defense, the old carny in charge, and Linda can't bear to see him die at the hands of the authorities. So she embarks on a quest to smuggle him to Florida, where he can be shipped abroad. Many follow her: Steven, who has turned very ugly; John, who may prefer to see her dead than to see her get away; and hordes of fortune hunters who recognize Moses' resale value. Throughout this adventure, Linda and Moses forge an unusual bond that reveals her courage, sensuality, and strength, and justifies Linda's musings on the origins of life. If it seems obvious that gorilla would represent man, Lerman (God's Ear, 1989, etc.) creates a very different and refreshing metaphor via which Linda saving Moses means saving herself. Wry, beautiful, hilarious, brave. A little didactic when Lerman talks about men and women as different species, but not enough to weigh down this otherwise effortlessly profound tale.
|
0.999068 |
In this lesson, students will learn about using different types of adverbs in different positions through guided discovery based on a reading about short stories(mini saga).
The teacher asks students: " Are you interested in mini sagas?" Students answer and if the answer was No, she will introduce mini saga and then says she is going to show four pictures about four mini sagas. There are four titles on the board. She wants them to match each title with each picture in pairs. Then the teacher asks some of them to give their answers to the class.
-The teacher says that She is going to give them a sheet including four mini sagas. They are supposed to read the text quickly and match the titles with the stories individually. Then they should check with their partners. Then she projects the answers.
-The teacher wants the students to focus on the highlighted adverbs or adverbial phrases in the stories. -She asks them to think about what they mean and the position of them in the sentence. As the feedback the teacher asks if they have any ideas. - Then she tells that she is going to give them a paper (ex b). She wants them to do the ex in pairs. -While they are doing the ex, the teacher is monitoring. She finds a pair who has the correct answers and then she wants to check the other pairs' answers.
- The teacher tells that she is going to give them a folded sheet. They are supposed to look at the first part and do the ex in pairs. The instruction is written on the sheets. - She sets a time limitation. -Then she wants them to check the answers in the group. -Finally she wants them to unfold the papers and look at the answer key.
- The teacher tells that she is going to give them en ex. -First, they should do that individually and then check with their partners. - Then she projects the ex and wants ss to come to the board and write the answers. - Next she gives them the answer key.
The teacher tells that she is going to play an audio part an give them a handout and they are supposed to listen to sound effects and short dialogues and use the bold adverbs to complete the sentences. Then she asks the whole class.
- The teacher regroups the ss and tells that she is going to give them a sheet with eight pictures, one sheet for each group. Each group has one writer and they have 5 minutes to come up with a story. They have to write in order to be able to tell their short story to the class. -After five minutes the teacher wants them to tell their stories.
|
0.951859 |
India is the top country by personal remittances, received in the world. As of 2017, personal remittances, received in India was 68,967 million US dollars that accounts for 11.97 % of the world's personal remittances, received. The top 5 countries (others are Philippines, Mexico, China, and France) account for 32.55 % of it. The world's total personal remittances, received was estimated at 576,254 million US dollars in 2017.
What is personal remittances, received?
Personal transfers consist of all current transfers in cash or in kind made or received by resident households to or from nonresident households. Personal transfers thus include all current transfers between resident and nonresident individuals. Compensation of employees refers to the income of border, seasonal, and other short-term workers who are employed in an economy where they are not resident and of residents employed by nonresident entities. Data are the sum of two items defined in the sixth edition of the IMF's Balance of Payments Manual: personal transfers and compensation of employees. Data are in current U.S. dollars.
|
0.902339 |
You can grow your portable garden in your living room on a rotating base! Amazing!
The Green Wheel actually originates from a NASA project of a rotary hydroponic garden which could provide astronauts with fresh vegetables in spacecrafts.
Green wheel looks like a miniature ferris wheel provided with a hydroponic system, with which various plants can be grown in the aquatic environment. Plants roots are fixed to the outside of the circle, in a holder, and are rotated about the axis, over one hour, and at the bottom of the circle is a water tank and could contains nutrients too which can be absorbed by plants. At the same time, by rotation, all the plants are evenly exposed to light. Rotary Gardens can be adapted to different circles circumference, depending on the space you have available in your home, and the energy cost of such gardens is extremely low.
|
0.999014 |
What is elasticity? Most of us have played before with a piece of elastic or rubber band. Unlike many other things you encounter daily, a rubber band can be stretched to a certain extent. When things can be stretched, people usually say that that thing is elastic.
However, in physics the two phenomena below must be present before we can say that an object is elastic.
Do these apply to the elastic band? Yes.
1. When a force is applied to an elastic band in order to pull the elastic, the elastic band does not only allow itself to be stretched, it is also deformed or shrunk.
2. When the force is removed, the elastic return to its original shape .
A spring: Hang a weight on a spring.
1. The spring will stretch. Hand a bigger weight, the spring will stretch even more.
2. The bow returns to its original shape after the arrow is released.
1. Every time your feet hit the bounce mat, it deforms it.
When phenomenon 2 fails to happen or the object does not return to its original shape, we say that the object is inelastic. Examples of inelastic objects are clay, dough, and putty.
If you hang a weight on a spring that is a lot heavier than what the spring can handle, the spring will remain distorted.
Physicist Robert Hooke said that the amount of stretch (x) the spring experience is proportional to the amount of force (F) applied.
In other words, if the force is doubled, the stretch will also double.
If the force is quadrupled, the stretch will also quadruple.
Say for instance a force of 6 N is applied and the spring stretches 2 cm. When the force is 12 N, the spring stretches 4 cm.
|
0.979458 |
Dave Nilsson had just one home run on the year by mid-May 1996. In one game that month, he hit two more.
Make that two in one inning: Nilsson hit two home runs in the sixth inning of a game at Minnesota. He became the first Brewer to do so, according to The Associated Press.
"You never think about doing that," Nilsson told The AP afterward. "I've had two hits in an inning before, but nothing like that."
Nilsson went on to do a lot of things in his baseball career. He hit a total of 105 major league home runs. He made and Aill-Star team. He also represented his home country of Australia in the Olympics and even made an attempt to run a baseball league there.
Nilsson's career in baseball began in 1987, signed by the Brewers as a free agent out of Brisbane, Australia.
He caught the eye of the Brewers after coming to the United States and playing for a semi-pro team in Chicago, according to The Milwaukee Sentinel.
"He hadn't played that much baseball, but he had natural ability," Brewers scout Bill Castro told The Sentinel. Castro spotted Nilsson. "You could see he was above the rest of the team."
Nilsson started with the Brewers at rookie Helena. He moved to single-A Beloit for 1988, then high-A Stockton for 1990. In 1991, he made both AA El Paso and AAA Denver. Then, in 1992, he made Milwaukee.
Nilsson debuted May 18. A month later, he had a successful road trip where he hit .296, according to The Sentinel. Nilsson felt optimistic.
"I feel secure that if I keep working hard and keep the right attitude that I can stay in the big leagues for a while," Nilsson told The Sentinel.
Nilsson got into 51 games that year, hitting .232 overall. He then became a Brewers regular. Over the next seven seasons he played in more than 100 games in six of them. He also hit over .300 twice and hit double-digit home runs six times.
Nilsson made the All-Star Game in 1999, his final season in the majors. He hit .309 that year with 21 home runs.
He then spent time in 2000 in Japan. He left the Brewers so he could ultimately play in his home country, in the Sydney Olympics.
Nilsson played for Australia in both the 2000 and 2004 Olympics, helping the team to the silver in 2004.
In 1999, Nilsson purchased and ran the successor to the 1990s Australian Baseball League, the International Baseball League of Australia. The league lasted until 2002.
Nilsson has since returned to the new Australian baseball league. He serves in 2015 as manager of the Brisbane Bandits.
|
0.949177 |
Hi, why is the MIDI module not working properly with my Yamaha piano keyboard? When used as input, the notes come trough but with wrong timing and pitch. In output it doesn't do anything.
Can you explain your setup in a little more detail? If you can tell what modules are connected in what order and how the MIDI module is connected to your keyboard it will help assess the issue.
I'm assuming you are connecting over a MIDI DIN cable. MIDI output mode is only for connecting to a computer over USB so you don't need to worry about that in this case.
It's the simplest setup by now: Power:MIDI:Oscillator:Speaker. I tried directly and trough an M-audio Midisport with 5-PIN DIN cables. The Yamaha MIDI o/p is set to MIDI (it works with my Macbook if set to Mac). The MIDI bit with MacBook and Garageband is also ok.
So you are going from the piano's MIDI out directly to the MIDI module DIN adapter input using a standard MIDI cable?
|
0.999838 |
Leopards are one of the most beautiful wild cats in the world. They are listed as one of the big five animals to see in Africa. They are renowned for being skittish and shy and are exceptionally hard to get a good viewing of. I love Leopards and have always wanted to see one up close and personal in the wild, and hopefully to see one with a kill in a tree. Leopards are remarkable, and can loft prey that weighs a great deal more than they do into trees. they do this to protect their kills from would be thieves. Leopards are beautiful with black rosettes and colour patterns covering their golden yellow bodies. On my recent visit to South Africa, I did some research on where the best places to see leopards is.
This world renowned wildlife park, established in 1898 is one of the best places to view leopards within their natural habitat. It's expansive nature means that you have the opportunity to see leopards hunting, eating and interacting with one another. This is a very rare treat that you should consider lucky to experience. Regarding accommodation, there are many campsite and lodges within and around the wildlife park. An example of such lodges includes the Swagat Park Lodge, the Kruger Park Lodge, Legacy Hotel, Shandon Lodge and many others. The campsites include Punda Maria, Tsendze, Mopani and many others.
Londolozi is one of the premier private game reserves in South Africa. It is a family run and operated operation that prides itself on providing the most thrilling opportunity of viewing wildlife animal in their natural setting. Londolozi is one of the best places to see Leopards up close, as the have become so accustomed to the game watching vehicles. For accommodation, there are various lodges within this private park, including, Londolozi Founders Camp, Londolozi Varty Camp, Londolozi Pioneer Camp, Londolozi Tree Camp, and the Londolozi Granite Suites.
This is another pristine park that is dedicated to providing tourists with a true wildlife experience. It is located within lush the grasslands of KwaZulu-Natal. With game drives on offer, you have the opportunity to drive to where the leopards are located, where you can view this wild cats in their natural setting. Accommodation is provided in the form of lodges. These include Vlei Lodge, Rock Lodge, Zuka Lodge, Mountain Lodge and Forest Lodge.
This is an extensive game reserve that consists of Willowmore town and Steyterville town. The expansive reserve has a high population of leopards increasing the probability of tourist to view leopards. It also has hiking tracks where leopards are known to inhabit. For accommodation, there is the Sederkloof luxury lodge, Uitspan Campsite and Guest Cottage, Duiwekloof Lodge and Campsite, Baviaanskloof Guest Cottage among others.
Finally, there is the Leshiba Wilderness Game Farm. It offers one of the most authentic African-themed Safaris with an opportunity to see leopards. This private game reserve is located in on the western part of the Soutpansberg Mountains which are found in Limpopo Province. Accommodation is in ample supply from The Venda Village Lodge, Hamasha, Luvhondo Camp, and the Mwenzi and Duvha Luxury suites.
|
0.99949 |
As people age, it’s important for them to stay connected socially. Being isolated from friends, family members and neighbors can lead to depression and other mental health issues. Studies have shown that loneliness can contribute to physical problems as well. Living alone can present many barriers to social connectedness that seniors who live in an independent living community don’t experience. Isolation can have negative impacts on your health, fitness, and memory, and the older we get, the more important it becomes that we are surrounded by people we know.
Senior citizens who remain in their home face a variety of issues that have the potential to lead to isolation and physical and mental ailments. How can you avoid them? Here are four life-changing benefits of independent living.
For many seniors, friends and relatives may live too far away, or may even be thinking of moving to a more distant location to be closer to their own families. That reduces the natural daily interactions that occur, as well as the free assistance and watchful eyes provided by loved ones. Independent living communities generally offer a wide range of activities such as singing and playing musical instruments; biking, dancing and other physical activities; and cards, chess, checkers and board games. Residents can enjoy each other’s company and engage in brain-boosting conversation daily.
medical issues that keep them from visiting friends and neighbors, going on shopping excursions or even walking around the neighborhood, it limits their interactions with others as well their time out in the world. One study even found that those seniors who had the most social interaction also maintained the highest level of mobility as they aged. The key to maintaining a healthy body, regardless of age, is to maintain a healthy and active brain. While residents are meeting, interacting and having fun with new friends and neighbors, they can also enjoy an array of services that will help them remain healthy, happy and well-adjusted. Independent living communities offer options such as housekeeping and laundry, three meals a day, a safe and secure building, cable TV, Wi-Fi, utilities, social and recreational activities, personal medical alert systems, scheduled outings and transportation to doctors’ appointments.
Even if they are physically able to leave their home, they might be limited in their ability to drive, and they might not have access to public transportation. This can leave seniors stranded without access to the things they need and want in their lives. Independent living communities offer regularly-scheduled outings to shopping areas, movie theaters, baseball stadiums and possibly even golf courses. They often organize seniors to volunteer at schools, hospitals or nursing homes, or local organizations such as youth sports teams.
Seniors often are confronted with the emotional impact of friends and family members in their age group has passed away. Those that live alone are often forced to deal with these losses, especially that of a spouse, without an everpresent network of support. Not having a community of support makes the grieving process more difficult. While it’s not an easy choice to leave the home, for many seniors, many of the challenges they face can be eliminated by moving into an independent living community, where a community is readily available to prop you up when life gets hard.
Would you like to learn more about the advantages of living in an independent living community? Contact Nye Health Services, which provides a wide range of services to maximize the health and wellness of older adults. For more information, please contact Nye Health Services at (402) 753-1400.
Deciding where you, your parents or other family members will live out their lives when they are in need of healthcare services, is a momentous decision, often made in haste during a health crisis.
During these times, it is important to be armed with the information you need to make the best decision possible.
Below are seven key criteria for determining which assisted living or skilled nursing facility is right for you or a loved one.
The federal government’s Centers for Medicaid and Medicare Services created a Five-Star Quality Rating System to help families compare health care providers. Facilities are rated based on health inspections, staffing and quality measures. Look for a facility that has a four-star or five-star rating. NursingHomeRating.org also employs a five-star rating system, as you can see here.
An objective review is important, but you also need to think about whether a healthcare provider is right for your particular circumstances. In that case, it can be helpful to seek opinions from both experts and everyday consumers like you. Talk to your friends who may have experienced similar circumstances. Then examine the online reviews of facilities from individual consumers and organizations that specialize in senior living communities. For example, here is the review from Senior Advice of Gateway Vista, a continuum of care community in Lincoln, Nebraska.
Online recommendations and reviews can be eye-opening, and while they only tell part of the story, they can help you understand the real-life experiences of other families, patients and residents. Research the organization on Google, their website and other online review sites, such as SeniorAdvice.com. Consider both the good and bad information – they will provide ideas of things to look for and questions to ask if and when you visit.
Is the organization you’re looking into family-owned or does it report to a corporate board elsewhere? Is its mission to maximize the health and well-being of its residents or to generate profits for shareholders? Is it a place where employees love to work and remain for years or is there constant turnover of staff? Are the people in charge innovators in the field going back decades or are they fairly new to it? Answers to questions like these will go a long way towards determining whether this is the healthcare provider for you.
It’s easy to determine whether a provider is recognized for excellence by the American Health Care Association and the Centers for Medicaid and Medicare Services.
You want to walk onto the campus and feel like you’re home. You want to see staff and residents smiling and celebrating life. You may feel down when you need assistance with daily activities or rehab for an injury, but you want the people around you to pick you up with their spirit.
Most continuum of care communities have a wide range of healthcare providers on site, but how about the physicians, therapists and specialists you may need while living there? Determine in advance whether those providers are right down the road or two towns over where they might be difficult to access. That can make a world of difference for you or your loved one.
Nye Health Services offers seven communities in Eastern Nebraska and one in Wyoming, structured to meet the needs of their residents from independent living to skilled nursing care. A family-owned company with a rich history of connecting with the people they serve, Nye Health Services is open for visits anytime. Call 402.753.1400 to schedule an appointment at locations in Fremont, Lincoln, South Sioux City, Norfolk, or Jackson Hole, or visit NyeHealthServices.com for more information.
You’ve transitioned to an independent living community or an assisted living arrangement somewhere new. You still have your old friends and family, but maybe they’re no longer in your neighborhood.
Now here come the holidays and you’re worried about getting lost in the hubbub as your old friends and family enjoy their traditions without you. It’s a common concern.
Fortunately, you live in the best time ever to keep friends and family close even when they’re far away. Here are 6 ideas you might not have considered.
All those opportunities for socializing with neighbors in your new community will pay off come holiday time. If you have been socializing, you probably know people who are facing the same predicament. Why not start a new tradition with them?
You can have your friends over without playing host. In fact, you don’t even have to do it in your home. You can rent a community room on Thanksgiving or Christmas Day, invite everyone to bring a dish appropriate to the holiday, and enjoy communion with old friends and new. Or, you can cook together as a group. Either way, you’re not doing all the work yourself.
Serving meals together with friends at the local soup kitchen, visiting patients in a hospital or in hospice care, or doing a project that helps others can be spiritually uplifting, and can help you forget any loneliness you might feel. If your family joins you, focusing on others who have less than you is a great way to strengthen the bonds among you.
Keep up with the grandkids by following them on Instagram or Snapchat, or find your children on Facebook. It’s amazing how much of their lives people share on social media today—things you might not even hear about in a phone conversation or personal visit. A lot of older people are intimidated by social media, but it was all designed to be used by regular people. The only reason you don’t know how to use it is that you haven’t yet learned.
For friends and family who are far away, there is now the alternative that allows you to talk to them and see them, almost as if you’re in the room together. Video chatting is easy to set up; in fact, most computers and laptops are already equipped with cameras and microphones. If yours isn’t, webcams cost 50 bucks at the local electronics store or on the web.
The Internet is awash with games that people can play online, like Words With Friends, the online Scrabble knockoff; or Splatoon, the cartoon-based ink-shooting game; or… well, literally thousands of others. You can even do it while video chatting, so you can trash talk your family or friends and watch their reactions while you play.
It’s just easier than ever to keep up with those you love or start relationships with new friends, thanks to technology and communities for people like you.
Nye Health Services offers seven communities in Eastern Nebraska and one in Wyoming structured to meet the needs of their residents from independent living to skilled nursing care. A family-owned company with a rich history of connecting with the people they serve, Nye Health Services is open for visits anytime. Call 402.753.1400 to make an appointment at a location in Fremont, Lincoln, South Sioux City, Norfolk, or Jackson Hole, or visit NyeHealthServices.com for more information.
|
0.977675 |
What is the meaning of safe in Hindi?
Nebraska safe haven law reveals societal hypocrisy yahooBuzzArticleHeadline = 'Nebraska safe haven law reveals societal hypocrisy'; yahooBuzzArticleSummary = 'Article: Officials want to revise the law to limit \'safe haven\' to abandoned newborns one and younger, in line with other states.
VIEW FAVORITES yahooBuzzArticleHeadline = 'Pentagon conducting research into adverse effects of anthrax vaccine while maintaining it is safe'; yahooBuzzArticleSummary = 'While conducting research on adverse effects of the military\'s mandatory anthrax vaccine, the Pentagon continues to maintain that it is \'safe for usage.
A common player sign-off in Eve-Online is "fly safe", as in "I must go to bed, *fly safe* everyone."
Cuz OBL is outside this nation you see so Safer yes, as safe as the President says we are…..safe.
This phrase "be safe" occurs again in verse 28, and again in the last verse of the psalm, where _quam nisi -- salvus esse non poterit_ should be translated _which except a man have believed faithfully and firmly, he cannot be safe_.
|
0.94861 |
On January 27, 1967, tragedy struck the Apollo program, nearly derailing the goal of landing an American on the Moon by the end of the decade. A fire took place on the launch pad during a preflight test for Apollo 1 (AS-204), which was scheduled to be the first Apollo manned mission, and would have been launched on February 21, 1967. Astronauts Virgil Grissom, Edward White, and Roger Chaffee lost their lives when a fire swept through the Command Module (CM). The exhaustive investigation of the fire and extensive reworking of the CMs postponed any manned launch until NASA officials cleared the CM for manned flight. Saturn IB schedules were suspended for nearly a year, and the launch vehicle that finally bore the designation AS-204 carried a Lunar Module (LM) as the payload, not the Apollo CM. The missions of AS-201 and AS-202 with Apollo spacecraft aboard had been unofficially known as Apollo 1 and Apollo 2 missions (AS-203 carried only the aerodynamic nose cone). In the spring of 1967, NASA's Associate Administrator for Manned Space Flight, Dr. George E. Mueller, announced that the mission originally scheduled for Grissom, White, and Chaffee would be known as Apollo 1, and said that the first Saturn V launch, scheduled for November 1967, would be known as Apollo 4. The eventual launch of AS-204 became known as the Apollo 5 mission (no missions or flights were ever designated Apollo 2 and 3). The second launch of a Saturn V took place on schedule in the early morning of April 4, 1968. Known as AS-502, or Apollo 6, the flight was a success, though two first-stage engines shut down prematurely, and the third-stage engine failed to re-ignite after reaching orbit.
The Apollo 8 astronauts were the first human beings to venture beyond low-Earth orbit and visit another world. What was originally to have been an Earth-orbit checkout of the lunar lander became instead a race with the Soviets to become the first nation to orbit the Moon. The Apollo 8 crew rode inside the Command Module, with no lunar lander attached. They were the first astronauts to be launched by the Saturn V, which had flown only twice before. The booster worked perfectly, as did the SPS engines that had been checked out on Apollo 7. Apollo 8 entered lunar orbit on the morning of December 24, 1968. For the next 20 hours, the astronauts circled the Moon, which appeared out their windows as a gray, battered wasteland. They took photographs, scouted future landing sites, and on Christmas Eve read from the Book of Genesis to TV viewers back on Earth. They also photographed the first Earthrise as seen from the Moon. Apollo 8 proved the ability to navigate to and from the Moon, and gave a tremendous boost to the entire Apollo program.
Apollo 9 was the first space test of the third critical piece of Apollo hardware—the lunar module. For ten days, the astronauts put all three Apollo vehicles through their paces in Earth orbit, undocking and then redocking the lunar lander with the Command Module, just as they would in lunar orbit. For this and all subsequent Apollo flights, the crews were allowed to name their own spacecraft. The gangly lunar module was "Spider," the command module "Gumdrop." Schweickart and Scott performed a spacewalk, and Schweickart checked out the new Apollo spacesuit, the first to have its own life support system rather than being dependent on an umbilical connection to the spacecraft. Apollo 9 gave proof that the Apollo machines were up to the task of orbital rendezvous and docking.
This dress rehearsal for a Moon landing brought Stafford and Cernan’s Lunar Module (LM)nicknamed "Snoopy"to within nine miles of the lunar surface. Except for that final stretch, the mission went exactly as a landing would have, both in space and on the ground, where Apollos extensive tracking and control network was put through a dry run. Shortly after leaving low Earth orbit, the LM and the Command/Service Module separated, then redocked, top to top. Upon reaching lunar orbit, they separated again. While Young orbited the Moon alone in his Command Module "Charlie Brown," Stafford and Cernan checked out the LMs radar and ascent engine, rode out a momentary gyration in the lunar lander’s motion (due to a faulty switch setting), and surveyed the Apollo 11 landing site in the Sea of Tranquility. This test article of the LM was not equipped to land, however. Apollo 10 also added another firstbroadcasting live color TV from space.
Crew: Neil A. Armstrong, Michael Collins, Edwin E. "Buzz" Aldrin, Jr.
Half of Apollos primary goal—a safe return—was achieved at 4:17 p.m. Eastern Daylight Time on July 20, when Armstrong piloted "Eagle" to a touchdown on the Moon, with less than 30 seconds worth of fuel left in the Lunar Module. Six hours later, Armstrong took his famous "one giant leap for mankind." Aldrin joined him, and the two spent two-and-a-half hours drilling core samples, photographing what they saw, and collecting rocks. After more than 21 hours on the lunar surface, they returned to Collins on board "Columbia," bringing 20.87 kilograms of lunar samples with them. The two Moon-walkers had left behind scientific instruments, an American flag, and other mementos, including a plaque bearing the inscription: "Here Men From Planet Earth First Set Foot Upon The Moon. July 1969 A.D. We Came In Peace For All Mankind."
The second lunar landing was an exercise in precision targeting. The descent was automatic, with only a few manual corrections by Conrad. The landing, in the Ocean of Storms, brought the Lunar Module "Intrepid" within walking distance182.88 metersof a robot spacecraft that had touched down there two-and-a-half years earlier. Conrad and Bean brought pieces of the Surveyor 3 back to Earth for analysis, and took two Moon-walks lasting just under four hours each. They collected rocks and set up experiments that measured the Moon’s seismicity, solar wind flux, and magnetic field. Meanwhile Gordon, on board the "Yankee Clipper" in lunar orbit, took multispectral photographs of the surface. The crew stayed an extra day in lunar orbit taking photographs. When "Intrepid’s" ascent stage was dropped onto the Moon after Conrad and Bean rejoined Gordon in orbit, the seismometers the astronauts had left on the lunar surface registered the vibrations for more than an hour.
Crew: James A. Lovell, Jr., Fred W. Haise, Jr., John L. Swigert, Jr.
The crew’s understated radio message to Mission Control was "Okay, Houston, we’ve had a problem here." Within 321,860 kilometers of Earth, an oxygen tank in the Service Module exploded. The only solution was for the crew to abort their planned landing, swing around the Moon, and return on a trajectory back to Earth. Because their command module "Odyssey" was almost completely dead, however, the three astronauts had to use the Lunar Module "Aquarius" as a crowded lifeboat for the return home. The four-day return trip was cold, uncomfortable, and tense. But Apollo 13 proved the program’s ability to weather a major crisis and bring the crew back home safely.
After landing in the Fra Mauro region—the original destination for Apollo 13—Shepard and Mitchell took two Moon-walks, adding new seismic studies to the by-now familiar Apollo experiment package, and using a "lunar rickshaw" pull-cart to carry their equipment. A planned rock-collecting trip to the 1,000-foot-wide Cone Crater was dropped, however, when the astronauts had trouble finding their way around the lunar surface. Although later estimates showed that they had made it to within 30.48 meters of the craters rim, the explorers had become disoriented in the alien landscape. Roosa, meanwhile, took pictures from on board the Command Module "Kitty Hawk" in lunar orbit. On the way back to Earth, the crew conducted the first U.S. materials processing experiments in space. The Apollo 14 astronauts were the last lunar explorers to be quarantined on their return from the Moon.
The first of the longer, expedition-style lunar landing missions was also the first to include the lunar rover, a carlike vehicle that extended the astronauts’ range. The Lunar Module "Falcon" touched down near the sinuous channel known as Hadley Rille. Scott and Irwin rode more than 27.36 kilometers in their rover, and had a free hand in their geological field studies compared to earlier lunar astronauts. They brought back one of the prize trophies of the Apollo program—a sample of ancient lunar crust nicknamed the "Genesis Rock." Apollo 15 also launched a small subsatellite for measuring particles and fields in the lunar vicinity. On the way back to Earth, Worden, who had flown solo on board "Endeavor" while his crewmates walked on the surface, conducted the first spacewalk between Earth and the Moon to retrieve film from the side of the spacecraft.
Crew: John W. Young, Thomas K. Mattingly II, Charles M. Duke, Jr.
A malfunction in the main propulsion system of the Lunar Module "Orion" nearly caused their Moon landing to be scrubbed, but Young and Duke ultimately spent three days exploring the Descartes highland region, while Mattingly circled overhead in "Casper." What was thought to have been a region of volcanism turned out not to be, based on the astronauts’ discoveries. Their collection of returned specimens included a 11.34-kilogram chunk that was the largest single rock returned by the Apollo astronauts. The Apollo 16 astronauts also conducted performance tests with the lunar rover, at one time getting up to a top speed of 17.70 kilometers per hour.
At the end of this last Apollo mission Eugene Cernan earned the distinction of becoming the last human to stand on the Moon -- so far. While Ronald Evans circled in America, Jack Schmitt and Cernan collected a record 108.86 kilograms of rocks during three Moon-walks. The crew roamed for 33.80 kilometers through the Taurus-Littrow valley in their rover, discovered orange-colored soil, and left behind a plaque attached to their lander "Challenger," which read: "Here Man completed his first exploration of the Moon, December 1972 A.D. May the spirit of peace in which we came be reflected in the lives of all mankind." The Apollo lunar program had ended.
|
0.999864 |
How has Ancelotti Tried to Adapt Sarriball at Napoli?
Carlo Ancelotti, born 10 June 1959 in Reggiolo (Italy). 283 games and 22 goals in Serie A, playing as midfielder with Roma and Milan. From 1979 to 1992 he played 13 Serie A seasons, winning 3 Serie A, 4 Coppa Italia, 1 Supercoppa Italiana, 2 European Cup, 2 UEFA Supercup and 2 Intercontinental Cup.
|
0.999387 |
If the Saturn V rocket along with its Apollo spacecraft was miniaturized, for example to 1/72 scale so it was five feet tall, could it still perform a moon landing like the Apollo missions and get back to Earth? The rocket equation only involves the percent mass of the rocket as propellant for a certain delta-v, so it seems that a miniature Saturn V would have the same total delta-v as the real thing.
If you could miniaturize each component uniformly, you're correct that the rocket equation terms would all balance out and the rocket would be capable of the same delta-v performance.
However, the impact of atmospheric drag would be much worse; drag force is proportional to cross sectional area, not to volume. A Saturn V loses less than 1% of its delta v potential to drag; a five foot version would probably lose so much to drag that it couldn't reach orbit.
I imagine there would be other square-versus-cube-scaling problems involved in ridiculously tiny fuel pumps, injectors, and combustion chambers as well, probably making the engines vastly less efficient or preventing them from working altogether, but since I don't know much about those issues we will assume some sort of elfin magic is taking care of that end of things.
When a model is scaled to 1:2 it's size, its area drops by 1/4 but its volume by 1/8. This is known as the square-cube scaling problem. So you will have one quarter the drag but one eighth the impulse. Russell expands on this, so I'll address the other issues.
The Reynolds number of the air does not scale with the model. So you not only have the square-vs-cube scaling problem (which could be mitigated overcome by making the model a bit longer), you've got probably an order of magnitude more drag per unit of area. You can think of this as the air being thicker from the craft's point of view. At extreme (nano) scaling the air molecules can even act as discrete particles colliding with the model!
If acceleration is scaled then the model will spend much more time in the atmosphere. Each second not in orbit will use up to 9.81 m/s of delta-v on gravity drag, no matter how much your craft weighs or how much propellant you brought with you.
In addition to the other answers, you'd also have to take temperature into the equation.
Even setting aside the other problems, rocket engines themselves do not scale indefinitely.
You decrease the scale of a rocket motor, you decrease the thickness of the rocket chamber walls, which in turn decreases the bursting pressure of said rocket chamber.
If you scale the rocket down enough, this will become a limiting factor.
At that point you will have to drop the pressure of the rocket chamber to avoid bursting it, which, since the maximum specific impulse achievable by a chemical rocket is limited by (among other things) chamber pressure, means that there will come a point where your specific impulse has to drop as you decrease the scale.
And sooner or later (read: sooner), it will reach a point where the specific impulse is low enough that the effective delta-v is too low to reach orbit.
You have analogous problems with thrust (pressure limited, again), temperature inside the rocket chamber (surface area to volume ratio increases as the scale decreases, causing the percentage heat loss to rise), and tankage (pressure limited, yet again).
Also don't forget that the tanks would be thinner in general, making it much more likely to break through the tank, and suffer problems. The tanks need to be able to withstand the pressure and the weight of the payload and rocket. Thin walls would probably still hold the weight, but they probably wouldn't hold the pressure.
Overall, it'd be nice if this would work, but there are a lot of problems in terms of miniaturization, and all orbital rockets are big for a reason.
While you can miniaturize most of the brute-force parts (insulation, no. Engine walls???) that's not all that's in the rocket. There's a bunch of electronics on board and almost all of it is as small as they could build already, no miniaturization possible.
Not the answer you're looking for? Browse other questions tagged launch rockets delta-v or ask your own question.
How is the process of launching a rocket mathematically modeled up front?
Is there an absolute limit to single stage ∆V when tank mass is a fixed faction of propellant mass?
|
0.967672 |
A high-stakes dispute that flared Monday between Blackwater and the federal government boils down to a definition: Are the hundreds of Blackwater guards protecting diplomats in Iraq and Afghanistan employees or contractors? By labeling them contractors, Blackwater and its affiliates qualified for federal small-business contracts worth nearly $110 million.
Those contracts and others were called into question Monday when the Small Business Administration's inspector general said Blackwater got dozens of the contracts even though the private security company may have exceeded size limits for a small business.
The audit was requested in March by U.S. Rep. Henry Waxman, a California Democrat who is chairman of the House Committee on Oversight and Government Reform.
Waxman also asked that the Internal Revenue Service investigate Blackwater. If the IRS determines that Blackwater's guards are employees, Blackwater could owe $50 million or more in unpaid Social Security and Medicare taxes, Waxman said.
|
0.727654 |
Dame Evelyn Mary Stokes DNZM (née Dinsdale, 5 December 1936 – 15 August 2005) was a professor of geography at the University of Waikato in New Zealand and a member of the New Zealand government's Waitangi Tribunal. Throughout her life she worked for recognition of marginalised groups including women and Māori, and she published extensively on New Zealand historical geography and on Māori land issues.
Evelyn Mary Dinsdale was born in Tauranga, New Zealand, on 5 December 1936. She was educated at Tauranga Primary School and Tauranga College, where she was one of the first non-Māori to join the local kapa haka group. She then went to Canterbury University College, earning a master's degree with first class honours in geography in 1959. After earning this degree, she took a postgraduate teacher training course from Christchurch Teachers' College and taught briefly at Te Kuiti high school, fulfilling the requirements of the post primary teachers' bursary that had funded her education.
Dinsdale was awarded a Fulbright Travel Grant and a Smith-Mundt Grant from the United States government in 1960, freeing her to travel to Syracuse University, where she received her PhD in 1963 under the supervision of Donald Meinig. While in America, she demonstrated long poi swinging on television. Soon after her return to New Zealand, in 1964, she married Brian Stokes, changing her name to Evelyn Stokes; they had two children, Donald and Philip. Although Evelyn and Brian Stokes later divorced, Dr. Stokes continued to use her married name professionally for the rest of her career.
Stokes was appointed to a lecturership with the Auckland University, and taught for a year for their Waikato branch before becoming a member of the geography department at Waikato University when that university was founded in 1964. At Waikato, she worked hard to promote Māori studies and to integrate local Māori communities into the university's activities, and she continued to serve as a faculty member for nearly 41 years, the longest tenure among the Waikato staff. In 1969 she was promoted to Senior Lecturer, and in 1975 to Reader. In the early 1970s, unusually for geography departments in New Zealand, the department at Waikato split into two, with physical geography moving to the Department of Earth Sciences; Stokes remained with the renamed Department of Human Geography and Environmental Studies in the Faculty of Arts and Social Sciences. Johnson recalls her as "a wise but stroppy woman, someone who would have no truck with fools but who opened her heart, her mind and her home to those whose intellect and politics she respected", and she was known as the "kuia" (a Māori word for a wise old woman) of the geography department.
Stokes was founding editor of the New Zealand Journal of Geography, which she formed from what was previously a pamphlet, the New Zealand Geographical Society Record, and for 10 years she served as its editor. Two major areas of Stokes' academic publication were on the history of the Tauranga area of New Zealand and of the Māori. She edited Te Raupatu o Tauranga Moana, a collection of written works related to the Tauranga area, her Masters thesis work was on settlements in the Tauranga area, and in 1980 she published a book on the history of Tauranga County which Bedford calls "the definitive history" of the area and for which she received the J. M. Sherrard "Major Award" in regional history. Māori resource use more generally was the subject of over 30 of her papers.
Another of Stokes' many interests was geography education at the secondary school level. She published a series of 20 papers aimed at the curricular needs for this level in both the New Zealand Journal of Geography and the New Zealand Geographer, and served from 1976 to 1987 as a member of New Zealand's National Geography Curriculum Committee.
An early experience that shaped Stokes' feminist views was her service as a high school teacher, for which she was paid £100 less per year than men with equivalent levels of experience due to her gender. With Anne Magee, Stokes helped establish gender studies and feminist studies at the University of Waikato in the late 1970s, and from an early date she pushed for feminist perspectives in geography. In 1987 Stokes and four colleagues published a "collective statement" on feminist geography in the New Zealand Geographer; Longhurst and Johnston provide a retrospective look at her work in this area.
Stokes also played an important part in building up the map collection of the University of Waikato: in 1964 she and Michael Selby transferred the New Zealand Geographic Society's collection to Waikato, she was the society's map librarian from 1966 to 1983, and she frequently added to the library with purchases from her travels abroad. Robson writes that "without her Waikato may never have had a Map Library or, at least, it would have been only a much poorer one", and Bedford adds that "her passion for maps has kept a tradition of cartography very much alive for almost 40 years in Waikato's Geography Department". Bedford also states that "her publications are renowned for the meticulous and innovative cartography", and that her skills in this area were put to good use in her service on the editorial committee for the New Zealand Historical Atlas (1991–1997).
In Stokes' capacity as a member of the Ngāti Tahu Tribal Trust (on which she served from 1980 to 1991) she helped negotiate a major lease of Māori land for the Ohaaki geothermal power plant, a change from previous practices in which the land ownership was transferred to the government. She also worked closely with two other Māori tribes, the Ngāti Tūwharetoa and the Ngāti Hauā, whose chief Wiremu Tamihana was the subject of a major biography published by Stokes.
For nearly 16 years, Stokes served as a member of the Waitangi Tribunal, the New Zealand government commission that adjudicates Māori land claims with respect to the Treaty of Waitangi. Stokes' research on the history of Tauranga County related closely to her work on an important tribunal case on the confiscation of land in the Tauranga area, and her experience with the Ngāti Tahu and Ngāti Tūwharetoa helped guide her work with the Waitangi Tribunal on other cases involving geothermal resources. As part of the Waitangi Tribunal, Stokes worked on major reports on Pouakani, Muriwhenua, Te Maunga railways, Turangi township, Mohaka ki Ahuriri, Kaipara, and Hauraki, taking an important role in drafting the reports on these cases.
Stokes served as well for many years on the New Zealand Geographic Board, the body charged with assigning official place names in New Zealand. During her tenure on the board, she helped guide it towards the restoration of indigenous names for places that had been renamed as part of the English colonisation of New Zealand.
In 1990, the University of Waikato awarded Stokes a personal chair "in recognition of her outstanding contribution to research and teaching". In the same year she was also awarded the New Zealand Commemoration Medal. In 1999, the New Zealand government made her Dame Companion of the New Zealand Order of Merit "for services to tertiary education and Māori;” she was the last woman in New Zealand to be made a dame before that title was replaced by "distinguished companion" in 2001.
In 2001 the New Zealand Geographical Society honoured her with the Distinguished New Zealand Geographer Medal and with life membership in the society; she was the second academic to be so honoured. At that time, Garth Cant remarked that "no one within geography has made a more substantial and sustained contribution to the wholeness and wellbeing of this nation we call Aotearoa/New Zealand in the 1980s and 1990s than Dame Evelyn Stokes".
A special issue of New Zealand Geographer (volume 61, issue 2, August 2005) was devoted to "Evelyn Stokes and Geography at the University of Waikato". Although the articles in it were written prior to Stokes' death, it was not published until soon after her death. On her death, Stokes was honoured with a tangi, a formal three-day Māori funeral ceremony, on Te Kohinga Mārama marai.
In 2006, the University of Waikato inaugurated a lecture series and doctoral scholarship in Stokes' memory. The first lecture in the series, by Malcolm McKinnon, president of the Professional Historians' Association of New Zealand / Aotearoa, was entitled "Mapping the Past: Evelyn Stokes and the History of Aotearoa".
Stokes Peak, a mountain in the Kaimai Ranges directly above the Kaimai Tunnel near Tauranga, was named in her honour in 2010 by the New Zealand Geographic Board; however the name was discontinued in 2012 after objections from the Ngāti Hinerangi.
Stokes, Evelyn (1980), A History of Tauranga County, Palmerston North, NZ: The Dunmore Press Limited, ISBN 0-908564-51-1 .
Stokes, Evelyn (2002), Wiremu Tamihana: Rangatira, Wellington, NZ: Huia Publishers, ISBN 1-877266-92-2 .
1 2 3 Obituary: Stokes, Dame Evelyn Mary, Canterbury Magazine, December 2005, p. 46 .
1 2 3 4 Rigby, Barry (August 2005), Tribute to Dame Evelyn Stokes, Waitangi Tribunal .
↑ Author's biography from A History of Tauranga County.
1 2 3 4 5 6 7 8 9 10 11 12 13 14 Bedford, Richard (2001), Bedford, R.; Longhurst, R., eds., "Dame Evelyn Stokes: distinguished New Zealand geographer" (PDF), Honouring New Zealand's geographers, New Zealand Geographer, 57 (2): 1–5, doi:10.1111/j.1745-7939.2001.tb01603.x, archived from the original (PDF) on 14 October 2008 . Reprinted in Datum: Newsletter of the New Zealand Map Society, no. 23, November 2005.
1 2 Stokes, Evelyn (2005), Evelyn's Letters from America, University of Waikato .
↑ Rigby (2005) states that she appeared on The Ed Sullivan Show, but her letters from the time (Evelyn's Letters from America, p. 181) only mention a local television show hosted by Phil Markert, and there is no other record of an Ed Sullivan appearance.
↑ Cant, Garth (2005), "Windows into the work of a geographical educator: Evelyn Stokes from the University of Waikato", New Zealand Geographer, 61 (2): 89–91, doi:10.1111/j.1745-7939.2005.00030.x .
1 2 3 4 5 Bedford, Richard (2005), "Obituary – Evelyn Mary Stokes (nee Dinsdale) DNZM, MA (NZ), PhD (Syr) 5 December 1936–11 August 2005", New Zealand Geographer, 61 (3): 242–249, doi:10.1111/j.1745-7939.2005.00040.x .
1 2 3 4 Bedford, Richard; Longhurst, Robyn (2005), "Editorial: Evelyn Stokes and Geography at the University of Waikato", New Zealand Geographer, 61 (2): 87–88, doi:10.1111/j.1745-7939.2005.00028.x .
1 2 3 4 Henshaw, Gail (17 August 2005), "Dame Evelyn devoted her life to public service", Hamilton Press .
↑ Longhurst, Robyn; Johnston, Lynda (2005), "Changing bodies, spaces, places and politics: Feminist geography at the University of Waikato", New Zealand Geographer, 61 (2): 94–101, doi:10.1111/j.1745-7939.2005.00023.x .
1 2 Robson, John (November 2005), "Obituaries", Datum: Newsletter of the New Zealand Map Society, 23 .
↑ "Ohaaki: A Power Station on Maori Land" (PDF), Te Matahauariki Newsletter, 8, September 2004 .
1 2 3 Brochure for inaugural Evelyn Stokes Memorial Lecture, Department of Geography, Tourism & Environmental Planning, University of Waikato, October 2006 .
↑ Life Members, New Zealand Geographical Society, archived from the original on 4 October 2008 .
↑ "News from Around the World", Newsletter of the International Geographical Union Commission on Gender and Geography, 35, November 2005 .
↑ Stokes Peak Archived 22 May 2010 at the Wayback Machine., Land Information New Zealand, retrieved 2010-09-09.
|
0.999938 |
Is the incidence of Conflict and an abundance of Natural Resources in African States correlated with Economic Growth? Table of Contents (Jump to) Chapter 1: Introduction 1.1 Aims and Objectives 1.2 Overview Chapter 2: Literature Review 2.1 The “Resource Curse” economic theory 2.1.1 The African Link 2.
2 The causes of the “Resource Curse” 2.2.1. The “crowding out” cause 2.2.2. Quality of institutions 2.
2.3. The “Dutch Disease” model 2.2.4 Other theoretical economic arguments 2.3 Civil war and economic growth 2.4 Natural resources role in Civil war Chapter 3: Influence of natural resources on economic growth 3.
1 The cause of “the resource curse” 3.2 Is “the recourse curse” relevant to Africa? 3.3 Other influential factors Chapter 4: The role of conflict Chapter 5: Empirical evidence Chapter 6: Conclusion References During the course of the past two or three decades many economists and academics have been endeavouring to discover why a proliferation of natural resources, which is normally considered to be a wealth generating sources often have an adverse effect upon emerging economies, slowing rather than increasing the pace of development (Rodriguez and Sachs 1999, p.277 and Isham et al 2005, p.1). Other studies, concentrating particularly upon emerging nations is areas such as the African continent, have also claimed that there is a link between the proliferation of natural resources and political unrest and conflicts, which manifest themselves in “civil wars” (DiJohn 2002, p.1).
A number of theories have been advanced in an effort to offer an explanation for this phenomenon. These include the “resource curse” theoretic model promoted by Gelb (1988) and Sachs and Warner (1997); the “rent-seeking” and “Dutch Disease” models referred to in research carried out by Torvik (2001 and 2002) and DiJohn (2002), whilst others link the causes more directly to the institutions and political conditions pertaining to the individual nation (Mehlum et al 2005 and Isham et al 2005). However, other researches have suggested that such models should be treated with caution. For example, Stijins (2005, p.3), suggest that earlier “resource curse” models have limitations, and this view is echoed in the works of Rosser (2007, p.39) and others. There have been similar divisions across the academic divide regarding the link between the level and treatment of natural resources and the propensity for civil unrest and violence, which culminates in most cases in civil wars.
Whilst many observers view the cause of this unrest as being linked to natural resources and the political environment (Keen 2005, p.12) and the “difference in quality of institutions” (Mehlum et al 2005, p.3), others, including Rosser (2007, p.40), suggest that the level of strategic importance of the location of the individual nation may also be a determining factor, if not in the causality of civil war then in its potential longevity and likelihood of its reoccurrence. In addition, as Collier (2003, p.6), the globally perception held in many areas, that “nothing can be done” to end such disputes, add to the problem. The divergence of views and research results indicated previously does raise questions regarding the efficiency and effectiveness of any action that may be taken to resolve the issues outlined, either within an individual nation or when addressing a specific geographical area.
For example, whilst addressing the “resource curse” or “Dutch disease” may have some positive impact on the economic growth and development in emerging economies, it could follow that without a simultaneous response to address the issue of political structure, institutions and civil war, such benefits would be negated by other influences.
Providing an assessment the relationship between a country’s economic growth and its dependence upon the export of natural resource products.
Evaluating the claim that there is a link between civil war and economic growth and seek to distinguish the key elements that pertain to that link, which might include institutional and political performance.
Assessing the level of probability of civil war resulting from a nations dependence upon natural resources.
Reviewing the impact of strategic location, or lack of, and the potential influence this has upon internal conflict that might exist within the development process of an individual national or regional economy.
For ease of reference the paper has been organised in the following manner. Following on from this introduction, in chapter two a critical review of recent theoretical literature relating to the subject being studied will be conducted. This will include an overview of the theories relating to natural resource impact and dependency, the relationship between civil war, natural resources and economic growth and other arguments that have been expounded upon in recent literature. Chapter three includes a discussion on the influence that natural resources has economic growth and political unrest and this is followed in chapter four by a more detailed analysis of the role of that conflict plays economic performance of nations who have these resources. In chapter six we provide and analyse the empirical evidence as it relates to the nations of Africa.
This structure will enable us to reach a conclusion in chapter sever regarding the question set for the study (see page 5). A bibliography of sources and appropriate appendicles follow the conclusion of the research. As stated in introduction to this research, there has been a considerable amount of research carried out in regards to the influence that a wealth of natural resources has upon the economic growth of the poorer and emerging countries, as well as the relationship this has upon civil war and political unrest or imbalance. Within this review it is intended to focus upon the main economic and conflict theories that have been developed and discussed in recent decades.
It is the negative or reduced economic growth patterns that have been experienced by nations that have significant natural resources, which has given rise to the term “resource curse,” and which has given rise to a considerable amount of literature and research since the late 1980’s, amongst the foremost of which is that conducted by Gelb (1988), Sachs and Warner (1997), Rodriguez and Sachs (1999) and Sala-i-Martin, and Subramanian, (2003, p.833), although there has been a proliferation of other works.
The starting point and motivation for much, if not all of the research and literature relating to the “resource curse”, resulted from the significant difference that had been found to exist between the real economic growth performance of manufacturing and natural resource exporting countries over the years, as measured by the movement of GDP. One of the latest examples of an analysis of this differential can be found in the review carried out for the World Bank by Isham et al (2005), which compared growth rates over a 40-year period (see figure 1).
|
0.99996 |
I wondered why Terry Francona would send the mound to rookie Danny Salazar? ... The right-hander has thrown only 52 innings this season and has never faced Tampa Bay. His numbers are not bad but Alex Cobb has more cards on the table for the win. Tampa Bay has won four of six games against Cleveland. Tampa Bay will win the series in Cleveland in his last visit. Alex Cobb beat Cleveland this season, he threw 7.3 innings, no runs received.
Terry Francona, is following his role as pitching, Danny Salazar is the fifth pitcher in the rotation and he respects that. Clear to me very confident that his player and maybe he sees something in which we do not. It's a game of win or die and Cleveland season is played in one game for the hand of a novice.
After thinking it'll take to Cleveland.
The average players on the bases is very low in both pitchers, I expect a low-scoring game. Under is my best choice.
If San Francisco Giants have a chance to win is now. Y. Petit has not lost a single game this season, he has (4-0) in 5 starts, WHIP: 1.110, ERA: 3.03. A. Pettitte is winless in the last 3 games, he has (4-4) when he pitches at home WHIP: 1.540 ERA: 4.62.
We all know how important it is for NY Yankees win this game, but not all teams involved will be able to get the Wild Card.
The Under is a good option. The batsmen of both teams are off.
Tampa Bay has no chance to win the division when is nine games behind Boston missing 10 games to finish the season.
Baltimore and has no chance of winning their division as they are eliminated.
Texas and Cleveland still aspire to win their division but are four elimination games in their respective divisions, the shortest path for the classification is the Wild Card.
Kansas City and NY Yankees are three games away from the race to win the Wild Card. I see no possibility for them.
Do not forget that these two are the six teams that will have the opportunity to play the deciding to get a spot in the postseason.
Houston at Cleveland four-game series. Cleveland (4-1 series) over Houston.
Baltimore at Tampa bay four-game series. Tampa (9-6 series) over Baltimore.
Texas at Kansas City three-game series. Texas (2-1 series) over Kansas City.
San Francisco at NY Yankees three-game series. No games this season.
Excellent end of week when Cincinnati visit to Pittsburgh in three-game series. If at the beginning of this season I had asked that this series would have been very important, I would not have believed it.
Who will win the first game of this series? Difficult choice. My pick today: Pittsburgh.
Liriano has had a week hard, but their best starts have been at home.
Liriano home ERA (1.37) WHIP (0.990) W / L (8-1) IP / S (6.8), good numbers at home.
Latos, last two starts: ERA (5.25) WHIP (1.459) W / L (0-1-1) IP / S (6.6).
Pittsburgh has to take advantage of playing at home after this series after traveling to Chicago to visit Cincinnati. They still remain even game lead over Cincinnati.
The over is a hard choice but I think I can add more than seven runs.
Piratas solo ha anotado 4 carreras en tres juegos en casa. Piratas no anota carreras, asi le sera muy dificil ganar juegos. San Diego tiene buen pitcheo.
Pirates has scored only four runs in three games at home. Pirates do not score runs, so it will be very difficult to win games. San Diego has good pitching.
|
0.953123 |
Will my spouse be entitled to some of my pension after our divorce?
The short answer to this question is: yes. A pension plan is like a bank account or any other marital asset and can be divided by the court in a divorce case. However, the only portion of the pension plan that the court can divide is that part which you earned or acquired during the marriage. Any part of the pension plan which you earned before the marriage, and which you will earn after the divorce, belongs to you. The remainder can be divided.
The pension plan is divided on a tax-free basis. That is to say, neither party pays any taxes because of the division. Many pension plans are divided by a court order. There are two types of orders, one for state plans and one for other plans. The court order for the state plans is known as a Qualified Illinois Domestic Relations Order (QUILDRO) and the court order for the other plans is known as a Qualified Domestic Relations Order (QDRO). These court orders are prepared by your divorce lawyer at the end of the case and submitted to the judge along with the Judgment for Dissolution of Marriage.
The result of dividing your pension plan is that the pension plan administrator will transfer a portion of your plan to your spouse. The new pension plan created for your spouse by the division is subject to the same pension documents. Your spouse will have the same rights to his or her portion as you have to yours.
You may be able to avoid giving your spouse a portion of your pension plan by giving another asset instead. Sometimes this alternative arrangement may be good for you, and sometimes you may be better off by giving up a portion of your pension. There are tax consequences to consider. Your divorce attorney will advise you which assets are best to keep because of favorable tax consequences down the line. It may be advantageous for you to give away part of your pension rather than keeping it all in trade for another asset. When pension funds are withdrawn, they are taxable. If the money is taken from the pension plan too early, there is also a penalty. On the other hand, if you give away part of the pension and share in another asset, say a bank account with cash, you will have immediate access to the money in the bank account without any tax consequences at all. Your divorce lawyer will help you decide which assets are best for you. This will depend on your age, your income, your needs, and other similar financial considerations.
Jay A. Frank is a divorce and matrimonial practitioner in Chicago with over 35 years of experience. He has been selected as one of the top family-law attorneys in Illinois. He can be reached at (312) 828-9600. View his Divorce Magazine profile.
|
0.999999 |
Look at Michael's family and complete the sentences.
Hello. My name is Michael and this is my family.
|
0.955439 |
For Other uses of the Defence of India Act, see Defence of India Act (disambiguation).
An Act to provide for special measures to secure the public safety and the defence of British India and for the more speedy trial of certain offences.
The Defence of India Act 1915, also referred to as the Defence of India Regulations Act, was an emergency criminal law enacted by the Governor-General of India in 1915 with the intention of curtailing the nationalist and revolutionary activities during and in the aftermath of the First World War. It was similar to the British Defence of the Realm Acts, and granted the Executive very wide powers of preventive detention, internment without trial, restriction of writing, speech, and of movement. However, unlike the English law which was limited to persons of hostile associations or origin, the Defence of India act could be applied to any subject of the King, and was used to an overwhelming extent against Indians. The passage of the act was supported unanimously by the non-official Indian members in the Viceroy's legislative council, and was seen as necessary to protect against British India from subversive nationalist violence. The act was first applied during the First Lahore Conspiracy trial in the aftermath of the failed Ghadar Conspiracy of 1915, and was instrumental in crushing the Ghadr movement in Punjab and the Anushilan Samiti in Bengal. However its widespread and indiscriminate use in stifling genuine political discourse made it deeply unpopular, and became increasingly reviled within India. The extension of the law in the form of the Rowlatt Act after the end of World War I was opposed unanimously by the non-official Indian members of the Viceroy's council. It became a flashpoint of political discontent and nationalist agitation, culminating in the Rowlatt Satyagraha. The act was re-enacted during World War II as Defence of India act 1939. Independent India retained the law in a number of amended forms, which have seen use in proclaimed states of national emergency including Sino-Indian War, Bangladesh crisis, The Emergency of 1975 and subsequently the Punjab insurgency.
Punjab and Bengal, along with Maharashtra, became hotbeds of revolutionary nationalist violence against British rule in India in the first decade of the 20th century. 1905 partition of Bengal and the 1907 colonisation bill in Punjab fed growing discontent. In Bengal, revolutionary organisations like Anushilan Samiti and Jugantar drew young recruits from the educated middle-class Bhadralok ranks, and engaged in a number of prominent attacks on both figures in the administration as well as the local police investigating incidents of robbery, violence and murder linked to these groups. These included assassinations and attempted assassinations of civil servants, prominent public figures and Indian informants. In 1907 attempts were made on the life of the Bengal Lieutenant-Governor Sir Andrew Fraser. In 1908, a failed assassination attempt by Jugantar on the life of Presidency Magistrate Douglas Kingsford led to death of two European women. In 1909, a failed assassination attempt saw two bombs thrown at Lord Minto. In December that year the magistrate of Nasik A. M. T. Jackson was shot dead by Anant Kanhere, and suspicion fell on links to India House in London which was at the time being led by V. D. Savarkar whose elder brother Ganesh had been convicted by Jackson of seditious conspiracy. India House was also held responsible for the murder in London of William Hutt Curzon Wyllie, the political ADC to the secretary of state to India. A number of assassinations were also carried out of approvers who had turned crown-witnesses. In 1909 Naren Gossain, crown-witness for the prosecution in Alipore bomb case, was shot dead within Alipore Jail by Satyendranath Bose and Kanailal Dutt. Ashutosh Biswas, an advocate of Calcutta High Court in charge of prosecution of Gossain murder case, was shot dead within Calcutta High Court in 1909. In 1910, Shamsul Alam, Deputy Superintendent of Bengal Police responsible for investigating the Alipore Bomb case, was shot dead on the steps of Calcutta High Court. In Punjab, agitation against the 1907 colonisation bill, which the protagonists falsely believed was attempting to introduce law of primogeniture. Punjab police had become aware of nuclei of nationalist movements arising across the state in the form of a nascent Ghadr movement, fed by resources and the efforts of emigrant Sikh communities living in Canada. Investigations during 1912 into an attempt to assassinate the then Viceroy of India, Charles Hardinge, promulgated the discovery of links between Bengal revolutionaries commanded by erstwhile Jugantar member Rash Behari Bose, and the Ghadr movement in Punjab.
The Bengal Regulation of 1812 and Regulation III of 1818 were some of the earliest laws in British India to incorporate the provisions of Preventive detention, without having to commit the detainee to trial. In the Presidencies of Madras and Bombay, similar laws had been enacted in 1819 and 1827 respectively. Prisoners under these regulations had no right of habeas corpus. Section 491 of the Criminal Procedure Code introduced the writ of Habeas Corpus in 1882. In 1907, emergency ordinances were issued in Punjab and in Eastern Bengal and Assam on the fiftieth anniversary of the 1857 mutiny. This allowed abolishment of public meetings, and the Indian press was subjected to controls to limit seditious material being published. The Explosive Substances Act and the Newspaper Act were passed in June 1908 to try and arrest agitation.
In June 1907 local governments were further authorised to initiate proceedings against local press publishing seditious material amongst civilian population or the army. The Indian Sociologist was banned in India in September 1907 and in November that year the Prevention of Seditious Meetings Act was passed. February 1910 saw the introduction of Indian Press Act which allowed Provincial governments to ask for punitive securities of up to Rs 5,000 from newspapers likely to incite sedition and violence. This act resulted in a number of nationalist publications closing down unable to provide such a surety.
Failure of prosecution in a number of cases under the Criminal procedures act 1898 led to a special act whereby crimes of nationalist violence were to be tried by a special tribunal composed of three high-court judges. December 1908 saw the passage of the Criminal Law amendments under the terms of Regulation III of 1818 and to suppress associations formed for seditious conspiracies. The act was first applied to deport nine Bengali revolutionaries to Mandalay prison in 1908. Despite these measures however, high standards of evidence demanded by the Calcutta High Court, insufficient investigations by police, and at times outright fabrication of evidence led to persistent failure to tame nationalist violence. Police forces felt unable to deal with the operations of secretive nationalist organisations, leading to demands for special powers. These were opposed vehemently in the Indian press, which argued against any extension of already wide powers enjoyed by the police forces in India, and which it was argued was being used to oppress Indian people.
The First World War began with an unprecedented outpouring of support towards Britain from within the mainstream political leadership, contrary to initial British fears of an Indian revolt. India contributed massively to the British war effort by providing men and resources. About 1.3 million Indian soldiers and labourers served in Europe, Africa and the Middle East, while both the Indian government and the princes sent large supplies of food, money and ammunition. However, Bengal and Punjab remained hotbeds of anti colonial activities. After the onset of the First World War, plague, rising grain prices, dissatisfaction with immigration policies within the British empire (highlighted by the Komagata Maru affair), and rumours of British misfortunes in the war meant by 1914, Punjab was in an unsettled state. India lay considerably far away from the Central Powers, with only feasible routes of invasion being through Persia and Afghanistan. The Indian Government at the outset of the war anticipated that India would remain safe as long as Afghanistan maintained neutrality, and the tribes of NWFP were under control. The worst situation would be from a combination of war with Afghanistan and internal unrest fomented by either the Bengali revolutionary network, the Ghadr in Punjab or Indian Muslims who may sympathise with Ottoman Umma.
British intelligence in North America indicated early in the war that the Ghadr Party, co-ordinating with the Berlin Committee in Germany, and the Indian revolutionary underground was attempting to transport men and arms from United States and East Asia into India, intended for a revolution and mutiny in the British Indian Army. From August 1914, a large number of Sikh expatriates began leaving Canada and USA under the plans of the Ghadr leadership for fomenting mutiny in India, whilst in Bengal nationalist crime also increased. Department of Criminal Intelligence chief Charles Cleveland noted that the threat to India should be dealt with by dealing with Ghadr activists who were already in India and those who were returning. To this end, Ingress into India Ordinance, 1914 was passed to limit the influx of Ghadarites, but failed to stem the inflow. The planned mutiny for February 1915 was averted at the last minute.
In the meantime, the situation in Bengal worsened considerably following the Rodda Company raid by Jugantar, which handed large amount of firearms to Bengal revolutionaries. There were 36 outrages in 1915, climbing steeply from 13 in 1913 and 14 in 1914. The revolutionaries launched what has been described by some historians as "a reign of terror in both the cities and the countryside" that "came close to achieving their key goal of paralysing the administration." A general atmosphere of fear encompassed the police and the law courts, severely affecting the moral. In entire 1915, only six revolutionaries were successfully brought to trial.
Considerable pressure for the passage of the act was from Michael O'Dwyer particularly in light of the Ghadr threat. Answering to Sir Surendranath Bannerjee in the legislative assembly, Craddock denied any necessity or propriety for the government to constitute an advisory board of judicial character that would deal with the applications of the act. In this regard the law differed from the Defence of the Realm act. Craddock explained to the assembly that the lack of judicial oversight and advice were acceptable since the restrictive measures in the act were "preventive and not punitive in measures".
The law was to be valid for the duration of the war and for six months thereafter "for public safety" and "the defence of British India". The main object of the law made it illegal to communicate with the enemy, obtaining information, spreading false reports, as well as any activities that the government saw prejudicial to the war effort. The act allowed local governments to make rules detain indefinitely, without representation, and to try by special tribunals persons "reasonably suspected" of being of hostile origin or acting in a manner prejudicial to the safety of the empire. committing or conspiring to commit crimes either described in the act, or crimes which maybe punishable by death, transportation or at least seven year imprisonment. Power of detention, unlike under DORA, was carried by subordinate officers. For Trials already initiated under the Criminal procedures act 1898 or the 1908 Criminal law amendment were exempt from the act. Prosecution was to follow the procedures prescribed in the criminal procedures act 1898, but was superseded by the special powers and discretion of court. Crucially however, the Commissioners could take direct cognisance of the offences alleged and therefore preliminary procedures could be disposed off with.
The act gave powers to local government to appoint three commissioners for trials who may be below the status of high-court judges. At least two would be Sessions judges or additional sessions judges for at least three years, were qualified for appointment as Judges of a High Court, or advocates of a Chief Court or pleaders of ten years' standing. A majority verdict was acceptable.
The act allowed the commissioners to accept as evidence statements recorded by a magistrates without scrutiny to cross examination and superseded the standards of evidence proscribed in the Indian evidence act 1872. Further the act allowed commissioners to accept such recorded evidence where the witness was unavailable or dead. This measure was intended to secure and safeguard against intimidation and assassinations by revolutionaries of approvers. There was no right to trial by jury. The act excluded from appeal or judicial review the decisions of the commissioners appointed under the Defence of India act.
Although designed to maintain order and curtail revolutionary movement, the law was in practice used in widespread scale from limiting revolutionaries, through arresting perpetrators of religious violence, to curtailing the voice of moderate political leaders. Unlike the Defence of the Realm Act (which was limited in scope to people of Hostile origin or associations, i.e. enemy citizens or collaborators), the act could be applied against any subject of the King. By June 1917, 705 were under home-arrest under the act, along with 99 imprisonments under Regulation III. Through the war, more than 1400 people were interned in India under the Defence of India Act alone, and a further three hundred subjected to minor restrictions, while more than two thousand were subjected to the restrictions of the Ingress into India Ordinance.
At the time of its enactment, the Defence of India act received universal support from Indian non-officiating members in the Governor General's council, from moderate leaders within Indian Political Movement. The British war effort had received popular support within India and the act received support on the understanding that the measures enacted were necessary in the war-situation. Its application saw a significant curtailment in revolutionary violence in India. However, the wide scope and widespread use amongst general population and against even moderate leaders led to growing revulsion within Indian population.
The enactment of the law saw 46 executions and 64 life sentences handed out to revolutionaries in Bengal and Punjab in the Lahore Conspiracy Trial and Benares Conspiracy Trial, and in tribunals in Bengal, effectively crushing the revolutionary movement. The power of preventive detention were however applied more particularly to Bengal. By March 1916 widespread arrests helped Bengal Police crush the Dhaka Anushilan Samiti in Calcutta. Regulation III and Defence of India act was applied to Bengal from August 1916 on a wide scale. In Bengal, revolutionary violence in Bengal plummeted to 10 in 1917. By the end of the war there were more than eight hundred interned in Bengal under the act.
The application of the act was not limited to those suspected of revolutionary crimes. It gradually came to be used in coercing and suppressing the voice of many nationalist leaders, even of moderate views, where regional administration felt their opinion or views were seditious to British rule in India, or dangerous to the administration. A number of prominent moderate leaders were interned or deported under the Defence of India act. Most notable of these leaders was Mrs Annie Besant. Beasant had set up branches of the Home Rule League in major towns and cities at the time Bal Gangadhar Tilak was establishing the league in Bombay and in Western India. Although these amounted to little more than debating societies (having been modelled on the Fabian Societies), the leagues were noted to be publishing political pamphlets, selling alm ost 46000 of these in 1916. Libraries were also established where political treatises were made available. Beasant's league had 27000 members by 1917, and that same year both Tilak and Beasant were interned under the act on the grounds their activities were becoming subversive. India. Maulana Muhammad Ali Jauhar and Maulana Shaukat Ali were arrested and interned after they were found to have been in liaison with individuals in Kabul linked to the German mission, which the administration suspected may have been to promulgate a pan-Indian Islamic revolution. Abul Kalam Azad was deported from Bengal and placed under house arrest in Ranchi for his writing in Al Balagh.
The Defence of India Act, in its implementation, was increasingly reviled. The unpopularity was such that the Lucknow session of the Indian National Congress in 1917 passed a resolution expressing alarm at the extensive use of the act, and urged the Government that its use be under same principles as the Defence of the Realm Act. Immediately after the war, Benjamin Horniman was deported from the Presidency of Bombay for his reporting on the Amritsar massacre.
With the impending lapse of the 1915 act, the Rowlatt Committee was appointed to recommend measures to deal with the threat from the revolutionary movement. Rowlatt recommended an extension of the provisions of the Defence of India act for a further three years with removal of habeas corpus provisions. It was met with universal opposition by the Indian members of the Viceroy's council, as well within the population in general, earning the title of "The Black Bills" from Mohandas Gandhi. Mohammed Ali Jinnah left the Viceroy's council in protest, after having warned the council of the dangerous consequences of enacting an extension of such an unpopular bill. Rowlatt's recommendations were enacted in the Rowlatt Bills. The agitations against the proposed Rowlatt bills took shape as the Rowlatt Satyagraha under the leadership of Gandhi, one of the first Civil disobedience movements that he would lead the Indian independence movement. The protests saw hartals in Delhi, public protests in Punjab as well as other protest movements across India. In Punjab, protests against the bills, along with a perceived threat of a Ghadrite uprising by the Punjab regional government culminated in the Jallianwalla Bagh Massacre in April 1919. After nearly three years of agitation, the government finally repealed the Rowlatt act and its component sister acts.
The Defence of India act 1915 was re-enacted in a more severe form at the onset of World War II as the Defence of India act 1939. It was enacted on 29 September 1939 but deemed to come into force from 3 September 1939, the day when the Second World War began. The act was used notoriously during the war in subduing the independence movement. It expired six months after the termination of the war and was ultimately repealed by the Repealing and Amending Act,1947(Act II of 1948).
The Indian Constitution retained the principles of preventive detention encapsulated in the Defence of India act, making one of the few countries were citizens of the country may be subjected to such measures. In Independent India, the law retained in legislations in the form of Preventive Detention act 1950, and has seen implementation as the Defence of India Rules 1962 during the Sino-Indian War of 1962, and the Defence of India Act,1971 during the 1971 Indo-Pak war. The 1962 act gained notoriety for its use in internment of Chinese immigrants in India, most notably Calcutta. Other similar laws enacted in independent India include the Maintenance of Internal Security Act (MISA) during The Emergency, and Terrorist and Disruptive Activities (Prevention) Act (enacted during the Punjab insurgency) which carry very similar provisions.
This page is based on the Wikipedia article Defence of India Act 1915; it is used under the Creative Commons Attribution-ShareAlike 3.0 Unported License (CC-BY-SA). You may redistribute it, verbatim or modified, providing that you comply with the terms of the CC-BY-SA.
|
0.999997 |
Apple Inc. (NASDAQ: AAPL) is rumored to have closed Beats Music, the streaming music portion of Beats Electronics. The company has since denied this claim, but additional reports claim the Beats Music brand will be eliminated.
"The [Apple] brand is incredibly strong, so I was kind of surprised they picked up another strong brand," Rob Enderle, principal analyst at Enderle Group, told Benzinga.
"They didn't need it," he added. "The Beats brand was redundant. iTunes had been falling a bit behind the competition, so if they [use] Beats as the new iTunes engine, they could use it to upgrade the service and just migrate everyone over to Beats."
Related Link: The Apple Inc. Watch Versus Competitors: What Do Analysts Think?
Brett Golden, president and co-founder of The Chart Lab, initially thought Apple wanted Beats to go after a different audience. "Now that I see this, it's telling me that Apple doesn't really want any outside brands," Golden told Benzinga. "They basically want to brand Beats within Apple."
If Apple closes Beats Music, it could result in a very pricey write-off. While the company paid more than $3 billion for all of Beats, the music portion is estimated to be worth $500 million.
"If Apple is going to close this down and write it off, it shows that even the highest comp in the M&A market is not earning to the headline price tag," Albert Fried & Company analyst Rich Tullo told Benzinga.
"To Pandora, that's important because there are M&A rumors on the stock almost on a weekly basis."
Sean Udall, CIO of Quantum Trading Strategies and author of The TechStrat Report, is taking a wait-and-see approach toward this rumor.
"I think Beats will get rolled into the iTunes streaming music product anyway," Udall told Benzinga. "Technically they might be closing [Beats], but they're probably just going to integrate the two technologies."
Udall expects Apple to merge Beats with iTunes Radio to create one cohesive service. "I don't think this [rumor] is anything to be made of," he said. "If I were Apple and I was buying Beats, this is exactly what I'd do."
If Beats Music Closes, Then What?
Beats Music may be viewed as a small fry, but numerous bloggers were convinced that Apple wanted the company to compete with Spotify and other streaming music services. True or false, what does this mean for the rest of Beats?
"There may be some intellectual property in Beats, but honestly I'm not convinced it was enough to buy the company," said Enderle.
"Since I'm struggling with why they bought the company, them shutting it down wouldn't be a surprise. But I have a hard time believing they're not going to get some value out of it. And the best value out of those choices would have to be the music service itself, because iTunes has fallen behind the times and they do need to update it," he added.
Udall thinks Apple could also derive some value from the headphones business. "What is Apple great at? Taking existing products and making them a whole lot better," Udall concluded.
|
0.999954 |
Are you ready to take photography classes in Harrisburg IL? No matter if you are a hobbyist, professional, or beginner, the most effective approach to improving your photography skills is through hands-on classes with professional instructors.
There are many accredited photography schools in Illinois. Techniques covered in photography classes include lighting, exposure and composition, posing and unposing, portrait capture, and other photography fundamentals. Becoming an expert photographer can result in a booming professional career or lifelong hobby.
|
0.949027 |
Why can all of my users see a database named "test"?
MySQL, by default, comes with a database named test; unfortunately, all users are granted access to that database. Also, in some cases, users can be granted permission by default to all databases beginning with the string "test".
We've seen cases where users used the test database to store data for their applications, rather than creating a new database. Problems occurred when other users, not realizing that was production data, made changes to or deleted the data in the test database.
The simplest way to prevent that is to remove the pre-existing permissions MySQL grants to that database.
Note that we recommend running this command only on a fresh installation (ie, before adding any Virtual Servers to your system); otherwise it can remove legitimate permissions of users to databases beginning with the name "test".
When prompted, enter your MySQL root password.
|
0.999824 |
The technical definition of an acoustic guitar is a guitar that produces sound through the vibration of the strings, without relying on electronic amplifications. Their bodies are made hollow so that sound can be produced without amplification. However, the term ‘acoustic guitar’ are often used by people when they want to refer to steel stringed guitars (or some call it the folk guitar), thus, the confusion surrounding the acoustic and classical guitar.
Acoustic and classical guitars differ in some ways, which I will try my best to explain.
Let’s start with the difference in the shapes of the guitars. Classical guitars generally have a smaller body shape as compared to the acoustic guitar. For acoustic guitars, their body shapes are bigger and they come in different types of shapes (Dreadnaught, Grand Auditorium shapes etc). But to put it simply, acoustic guitars with a larger body are able to produce a louder, more resonant sound as compared to classical guitar.
The acoustic guitar uses steel strings whereas the classical guitar uses nylon strings. Thus, when it comes to tone, the classical guitar gives off a mellow tone while the acoustic guitar produces a brighter tone.
Next, the fret board of the acoustic and classical guitar differs too. The fret board of the classical guitar is much wider compared to the acoustic guitar. The fret board is wider as the strings have to be wider apart for the single notes to be played and heard more efficiently.
The size of their fret board plays an important role to which what kind of music can be played on which instruments. Classical music, chords/arpeggios (where single notes are emphasized) are usually played on classical guitars while music like folk, country, jazz, pop and blues are played on acoustic guitars, where their necks are narrower.
|
0.953229 |
Video is the technology of electronically capturing, recording, processing, storing, transmitting, and reconstructing a sequence of still images which represent scenes in motion. Video technology was first developed for television systems, but has been further developed in many formats to allow for consumer video recording. Video can also be viewed on through the Internet as video clips or streaming media clips on computer monitors.
Video is different than film, which captures a moving image as a sequence of still pictures photographically.
The term video (from the Latin for "I see") commonly refers to several storage formats for moving pictures: digital video formats, including DVD, QuickTime, and MPEG-4; and analog videotapes, including VHS and Betamax. Video can be recorded and transmitted in various physical media: in magnetic tape when recorded as PAL or NTSC electric signals by video cameras, or in MPEG-4 or DV digital media when recorded by digital cameras.
In the UK, Australia, and New Zealand, the term video is often used informally to refer to both video recorders and video cassettes; the meaning is normally clear from the context.
Frame rate, the number of still pictures per unit of time of video, ranges from six or eight frames per second (fps) for old mechanical cameras to 120 or more frames per second for new professional cameras. PAL (Europe, Asia, Australia, etc.) and SECAM (France, Russia, parts of Africa etc.) standards specify 25 fps, while NTSC (USA, Canada, Japan, etc.) specifies 29.97 fps. Film is shot at the slower frame rate of 24fps, which complicates slightly the process of transferring a cinematic motion picture to video. To achieve the illusion of a moving image, the minimum frame rate is about ten frames per second.
Video can be interlaced or progressive. Interlacing was invented as a way to achieve good visual quality within the limitations of a narrow bandwidth. The horizontal scan lines of each interlaced frame are numbered consecutively and partitioned into two fields: the odd field consisting of the odd-numbered lines and the even field consisting of the even-numbered lines. NTSC, PAL and SECAM are interlaced formats. Abbreviated video resolution specifications often include an i to indicate interlacing. For example, PAL video format is often specified as 576i50, where 576 indicates the vertical line resolution, i indicates interlacing, and 50 indicates 50 fields (half-frames) per second.
In progressive scan systems, each refresh period updates all of the scan lines. The result is a higher perceived resolution and a lack of various artifacts that can make parts of a stationary picture appear to be moving or flashing.
A procedure known as deinterlacing can be used for converting an interlaced stream, such as analog, DVD, or satellite, to be processed by progressive scan devices, such as TFT TV-sets, projectors, and plasma panels. Deinterlacing cannot, however, produce a video quality that is equivalent to true progressive scan source material.
The size of a video image is measured in pixels for digital video or horizontal scan lines for analog video. Standard-definition television ( SDTV) is specified as 720/704/640×480i60 for NTSC and 768/720×576i50 for PAL or SECAM resolution. New high-definition televisions ( HDTV) are capable of resolutions up to 1920×1080p60, i.e. 1920 pixels per scan line by 1080 scan lines, progressive, at 60 frames per second.
Video resolution for 3D-video is measured in voxels (volume picture element, representing a value in three dimensional space). For example 512×512×512 voxels resolution, now used for simple 3D-video, can be displayed even on some PDAs.
Comparison of common cinematography and traditional television (green) aspect ratios.
Aspect ratio describes the dimensions of video screens and video picture elements. The screen aspect ratio of a traditional television screen is 4:3, or 1.33:1. High definition televisions use an aspect ratio of 16:9, or about 1.78:1. The aspect ratio of a full 35 mm film frame with soundtrack (also known as "Academy standard") is around 1.37:1.
Pixels on computer monitors are usually square, but pixels used in digital video often have non-square aspect ratios, such as those used in the PAL and NTSC variants of the CCIR 601 digital video standard, and the corresponding anamorphic widescreen formats. Therefore, an NTSC DV image which is 720 pixels by 480 pixels is displayed with the aspect ratio of 4:3 (which is the traditional television standard) if the pixels are thin and displayed with the aspect ratio and 16:9 (which is the anamorphic widescreen format) if the pixels are fat.
Colour model name describes the video colour representation. YIQ is used in NTSC television. It corresponds closely to the YUV scheme used in PAL television and the YDbDr scheme used by SECAM television.
The number of distinct colours that can be represented by a pixel depends on the number of bits per pixel (bpp). A common way to reduce the number of bits per pixel in digital video is by chroma subsampling (e.g. 4:4:4, 4:2:2, 4:2:0).
A wide variety of methods are used to compress video streams. Video data contains spatial and temporal redundancy, making uncompressed video streams extremely inefficient. Broadly speaking, spatial redundancy is reduced by registering differences between parts of a single frame; this task is known as intraframe compression and is closely related to image compression. Likewise, temporal redundancy can be reduced by registering differences between frames; this task is known as interframe compression, including motion compensation and other techniques. The most common modern standards are MPEG-2, used for DVD and satellite television, and MPEG-4, used for home video.
Bit rate is a measure of the rate of information content in a video stream. It is quantified using the bit per second (bit/s) unit or Megabits per second (Mbit/s). A higher bit rate allows better video quality. For example VideoCD, with a bit rate of about 1 Mbit/s, is lower quality than DVD, with a bit rate of about 5 Mbit/s. HDTV has a still higher quality, with a bit rate of about 20 Mbit/s.
Variable bit rate (VBR) is a strategy to maximize the visual video quality and minimize the bit rate. On fast motion scenes, a variable bit rate uses more bits than it does on slow motion scenes of similar duration yet achieves a consistent visual quality. For real-time and non-buffered video streaming when the available bandwidth is fixed, e.g. in videoconferencing delivered on channels of fixed bandwidth, a constant bit rate (CBR) must be used.
Stereoscopic video requires either two channels — a right channel for the right eye and a left channel for the left eye or two overlayed colour coded layers. This left and right layer technique is occasionally used for network broadcast, or recent "anaglyph" releases of 3D movies on DVD. Simple Red/Cyan plastic glasses provide the means to view the images discretely to form a stereoscopic view of the content. New HD DVD and HD Blu-ray disks will greatly improve the 3D effect, in colour coded stereo programs. The first commercially available HD players are expected to debut at the 2006 NAB Show in Las Vegas in April. See articles Stereoscopy and 3-D film.
HDMI (uncompressed video & audio). HDCP mandatory.
|
0.858153 |
Julian Schnabel was born in New York City in 1951, moved to Brownsville, Texas in 1965 and attended the University of Houston, Texas from 1969-1973 where he received a BFA. He had his first solo painting exhibition at the Mary Boone Gallery, New York City, in February 1979. Since then, Schnabel's paintings and sculptures have been exhibited all over the world. His work is included in private and public collections including New York's Museum of Modern Art Whitney Museum of American Art, Metropolitan Museum of Art, Los Angeles' Museum of Contemporary Art, Bilbao's Guggenheim, Paris' Centre Georges Pompidou, London's Tate Gallery, Tokyo's Metropolitan Museum and The National Gallery in Washington D.C. to list a few. His work is represented by the Pace Wildenstein Gallery in New York City.
In 1996, he wrote and directed the feature film Basquiat about New York artist Jean Michel Basquiat. The film starred Jeffrey Wright, David Bowie, Michael Wincott, Gary Oldman, and Dennis Hopper.
Schnabel lives with his wife Olatz Lopez Garmendia (who plays Reinaldo's Mother) and his family in New York City and San Sebastian, Spain.
Height 5' 8" (1m73) How tall is Julian Schnabel compared to you?
|
0.919888 |
What is the difference between a brain bleed and a stroke?
A stroke occurs when blood flow to the brain is stopped and the brain is starved of blood and oxygen. There are two types of strokes: ischemic strokes (where the blood flow is blocked) and hemorrhagic strokes (brain bleeds), which are also called cerebral haemorrhages. Hemorrhagic strokes are more deadly than ischemic strokes, but ischemic strokes are more common (87 per cent of strokes).
The presence of artherosclerosis (fatty deposits and plaque in the arteries) can affect blood flow and cause the formation of a blood clot in the brain; this is called a thrombotic stroke.
Blood clots or other particles that form in one place and travel to the brain are called emboli and can cause a cerebral embolism, which can lead to a stroke; the most common cause of this type of emboli is atrial fibrillation.
A common cause of cerebral haemorrhage is high blood pressure because this condition weakens the blood vessel walls; sometimes a weak area in the blood vessel wall balloons outward (aneurysm) and eventually bursts, causing bleeding.
Bleeding in the brain can be caused by an abnormal connection between an artery and a vein (arterial-venous malformation) that leaks. Cancer metastases to the brain, some illegal drugs and bleeding disorders can cause brain haemorrhages as well.
The goal in treating an ischemic stroke is to remove the clot often using thrombolytic (clot-busting) medications, while the goal of treatment in hemorrhagic stroke is to stop the bleeding and to stop the swelling of the tissue impacted by the bleeding.
What effect does a thalamic stroke have on the brain?
|
0.973954 |
What is light? Despite light being so fundamental to everyday life, this can be a surprisingly difficult question to answer. The quick internet search answer is electromagnetic radiation which is measured on an electromagnetic spectrum. To better understand how light and modern LEDs work, one must first understand the electromagnetic spectrum. The overall goal of this article is to explain the nature of the visible light spectrum, and subsequently illustrate the impacts of artificial light.
|
0.979523 |
Is it OK to use face masks with acne?
OTC and even luxury face masks may seem like a good idea but unfortunately are not the best choice for people with acne prone skin. Why? Well when it comes to treating acne, these masks have no real benefit. In fact, many of these masks can actually damage the outer protective layer of the skin, causing more acne breakouts down the line. There is a lot of commercially biased information on the web and social media about masks and other "trendy" skincare products. Bottom line, if you are looking to reduce your acne, the most effective way to get rid of it is to commit to an acne treatment plan that uses clinically proven, medical-grade ingredients that are personalized for your skin.
|
0.999752 |
This article is about the punk band. For the CBS documentary, see The Homosexuals (CBS Reports episode).
The Homosexuals are an English punk/post-punk band formed in 1978, out of the ashes of previous band the Rejects. The band have been described as "punk visionaries".
The Rejects were formed in the bar of Goldsmith's College in South London in 1976, when ex-Sunderland art school students John Hazzard (real name: John Wilkins) and Glenn Hutchinson recruited Bruno Wizard (real name: Bruno McQuillan) to drum for their nascent band. He in turn introduced them to Howard H, a well known drummer, and as rehearsals got under way, Wizard took on the role of frontman and Hutchinson was sidelined. Wizard then recruited Ian Kane, who added more songs to Hazzard's original set of compositions, and to express his disquiet with the modern world and disappointment with his 1960s heroes. The Rejects played their first gig at punk club The Roxy in January 1977, without a bass player, supporting the Damned and the Vibrators. In the following five months, the Rejects played with Wire, Generation X, the Jam, Eater, 999 and Sham 69 on multiple occasions, with Wizard becoming increasingly confrontational (though no more tuneful) to their audiences. Performances routinely descended into violence, with dates at the Albany in Deptford and Barbarella's in Birmingham confirming the band as a bad risk for PA hire companies.
In the summer of 1977, Hazzard was dropped from the band, going on to form the proto-thrash group Auto da Fe. Wizard recruited Jim Welton on bass for a new lineup of the Rejects, which included David Dus on drums and occasional itinerant guitarists, including Stevie Savage and Jerry Wigens. Dus was the drummer for Wayne County (later to become Jayne) during their 1977 tour of the UK. Wizard set up auditions to find a permanent guitarist, and Anton Hayman was recruited.
For Wizard, the name "the Rejects" was too deeply embedded in what he regarded as "the new conformity of punk", leading to the name change to the Homosexuals. Dus could not take being in a band called the Homosexuals and duly left, although Welton and Hayman approved of the change and remained. The band then lived in a series of squats while making music and recording. Their angular guitars, complex melodies and experimental leanings distanced them somewhat from the punk rock being created by their contemporaries and cemented their reputation as a precursor to post-punk. The band's work during this period would lead to their later recognition as a pioneer of D.I.Y., along with such bands as This Heat, Desperate Bicycles and Swell Maps. They released few recordings during their initial lifetime, and most of what did appear was in small vinyl runs on self-funded labels. The bulk of the band's studio material was recorded at Surrey Sound during 1978–79 with producer Chris Gray; the 16-track studio was run by Gray and his brother Nigel (who produced albums by the Police and Siouxsie and the Banshees). Wizard refused to perform on "the circuit" and thus the Homosexuals only did a handful of gigs, and refused to do interviews. Despite this lack of visibility, their debut 7", Hearts in Exile, pressed in an edition of 2,000 copies, still managed to sell out in a few days. A self-titled EP followed.
Welton left the band in 1980, forming Amos & Sara with Chris Gray; Wizard and Hayman continued recording as the Homosexuals, along with visual artist and sometime vocalist Susan Vida, releasing a cassette of material in 1982 before disbanding in 1985. The only full-length album by the band, The Homosexuals' Record (1984), was compiled by Recommended Records from existing studio masters and rough cassette mixes of the Surrey Sound recordings. The LP was reissued in 2004 as a remastered CD, with additional tracks, as The Homosexuals' CD. Also released that year was Astral Glamour, a 3-CD set including the band's entire catalogue, unreleased songs and work by several of the band's pseudonymous projects.
The band members recorded in various combinations under several different pseudonyms. These side projects included Ici la Bas, Sir Alick & the Phraser, and George Harrasment, all released on Bruno's Black Noise label. Contrary to often cited information about Homosexuals side projects, L. Voag's The Way Out (1979) was a Jim Welton solo album recorded during downtime between recording sessions at Surrey Sound. All releases on the It's War Boys label, including Amos & Sara, Sara Goes Pop, Nancy Sesay & the Melodaires, Milk from Cheltenham, and the Just Measurers, were also Welton projects (many involving Homosexuals producer Chris Gray) after he had left the band.
Wizard reformed the Homosexuals in late 2003, playing with an assortment of young musicians from around the world. In 2004, this version of the band, along with former member Vida, launched Astral Glamour on Hyped2Death at Cobden's Art Club in Notting Hill Gate. This coincided with a major art exhibition of Vida's work at the same venue. Around this time, Wizard met Ben Harris, who was playing with the Affectionate Punch. After discussing their musical backgrounds and approaches, Harris was enlisted to play bass at their next gig, five days later, after which he became a permanent feature in the European lineup. After three shows with Hayman back on guitar, Wizard travelled to New York City (which he had been visiting since 1986) and worked with Imaginary Icons as his backing band.
Wizard put together another lineup of the Homosexuals in late 2007, including bassist Mike Dos Santos (of Apache Beat, Brendan Benson and the Realistics), drummer Travis Harrison (the owner of label Serious Business Records), and guitarist Dave Siegel (a childhood friend of Harrison). Their fierce live performances, a combination of classic and new material paired with experimental explorations and free improvisational pieces, seemed to herald a new era for the band. In 2008, a fresh body of work was recorded at Serious Business' Soho studio, some of which was documented on the limited edition Love Guns? EP. A full album titled Important If True was suspended from release the following year while negotiations took place between Wizard and Harrison, but later released online. During the recording of this material, Harrison was being courted by digital distribution and licensing company The Orchard, for his label's catalogue. At the time, The Orchard already handled the digital distribution for The Homosexuals' CD and Astral Glamour, an agreement which ended 30 June 2009, and were keen to secure the rights to the material being worked on with Wizard and Serious Business. To this effect, Wizard performed some of the new material at The Orchard's office in Manhattan, and Harrison and Serious Business signed their current catalogue to The Orchard. Unfortunately, there was never any legal agreement between Wizard and Harrison for any of this material to be assigned anywhere. The matter has yet to be resolved.
Given Wizard's inherent distrust and loathing of "the traditional music industry", the situation between him and Harrison meant that Harrison's drumming position in the band was untenable. His exit from the band was swiftly followed by that Siegel. Within three days, their replacements, Julian Bennett Holmes and Jonathan Edelstein of Brooklyn band Fiasco, were on the road to Boston as the Homosexuals to play alongside King Khan and the Shrines. This lineup also played at Club Europa in New York with Monotonix before Wizard's return to London to meet his UK and European playing and recording commitments. While in London, Wizard worked on new songs, some in collaboration with Hayman, his original co-writer with the Homosexuals.
As of 2014, Bruno was still performing regularly as the Homosexuals, with the band including Harris, Tom Oakes, John Mathews and Charlie Sundown.
First screened in 2003, The Way Out, a Portrait of Xentos Jones by Scottish artists Luke Fowler and Kosten Koper was an experimental film portrait of ex-Homosexuals bass player Jim Welton.
The Heart Of Bruno Wizard (2013), directed by Elisabeth Rasmussen, was a feature-length documentary on the band's lead singer/songwriter and sole remaining original member.
^ a b c Jason Lymangrover. "Homosexuals | Biography". AllMusic. Retrieved 26 July 2014.
^ "The Homosexuals: Astral Glamour | Album Reviews". Pitchfork. 17 August 2004. Retrieved 26 July 2014.
^ Tony Fletcher. "Jamming! Magazine: Adam Ant interviewed in 1978". Ijamming.net. Retrieved 26 July 2014.
^ "The Homosexuals homepages". Hyped2death.com. Retrieved 26 July 2014.
^ "Homosexuals discography". Hyped2death.com. Retrieved 26 July 2014.
^ "The Top Eight Records Related to The Homosexuals". life is noise. 30 October 2011. Retrieved 26 July 2014.
^ "Important If True | The Homosexuals". Thehomosexuals.bandcamp.com. Retrieved 26 July 2014.
^ "BERLIN". Supportico Lopez. 23 June 2004. Retrieved 26 July 2014.
^ "The Heart Of Bruno Wizard". The Heart Of Bruno Wizard. Retrieved 26 July 2014.
This page was last edited on 12 December 2018, at 10:20 (UTC).
|
0.995671 |
Bioremediation processes can be categorized as in situ or ex situ. Bioremediation conducted at the site of contamination is called in situ bioremediation and does not involve movement of contaminated material. In contrast, ex situ bioremediation involves the removal of contaminated material from the original site so that it can be treated elsewhere, typically in a large, lined pit where conditions are optimized for degradation of the contaminant.
Some bioremediation processes rely on microorganisms that are indigenous to the contaminated site or material. Enhanced bioremediation techniques, which may be applied to either in situ or ex situ processing, involve the addition of nutrients and/or air to encourage the growth of pollution-degrading microbes; they may also involve the addition of non-native microbes known for their ability to degrade contaminants. For example, certain bacteria of the genera Rhodococcus and Pseudomonas are known for their ability to degrade many environmental contaminants, including aromatic compounds like those found in oil, down to CO 2 . The genes encoding their degradatory enzymes are commonly found on plasmids. Others, like Alcanivorax borkumensis , produce surfactants that are useful in the solubilization of the hydrophobic molecules found in oil, making them more accessible to other microbes for degradation.
Compare and contrast the benefits of in situ and ex situ bioremediation.
Although there is a DNA test specific for Neisseria meningitidis , it is not practical for use in some developing countries because it requires expensive equipment and a high level of expertise to perform. The hospital in Banjul was not equipped to perform DNA testing. Biochemical testing, however, is much less expensive and is still effective for microbial identification.
Fortunately for Hannah, her symptoms began to resolve with antibiotic therapy. Patients who survive bacterial meningitis often suffer from long-term complications such as brain damage, hearing loss, and seizures, but after several weeks of recovery, Hannah did not seem to be exhibiting any long-term effects and her behavior returned to normal. Because of her age, her parents were advised to monitor her closely for any signs of developmental issues and have her regularly evaluated by her pediatrician.
N. meningitidis is found in the normal respiratory microbiota in 10%–20% of the human population. Centers for Disease Control and Prevention. “Meningococcal Disease: Causes and Transmission.” http://www.cdc.gov/meningococcal/about/causes-transmission.html. Accessed September 12, 2016. In most cases, it does not cause disease, but for reasons not fully understood, the bacterium can sometimes invade the bloodstream and cause infections in other areas of the body, including the brain. The disease is more common in infants and children, like Hannah.
The prevalence of meningitis caused by N. meningitidis is particularly high in the so-called meningitis belt , a region of sub-Saharan African that includes 26 countries stretching from Senegal to Ethiopia ( [link] ). The reasons for this high prevalence are not clear, but several factors may contribute to higher rates of transmission, such as the dry, dusty climate; overcrowding and low standards of living; and the relatively low immunocompetence and nutritional status of the population. Centers for Disease Control and Prevention. “Meningococcal Disease in Other Countries.” http://www.cdc.gov/meningococcal/global.html. Accessed September 12, 2016. A vaccine against four bacterial strains of N. meningitidis is available. Vaccination is recommended for 11- and 12-year-old children, with a booster at age 16 years. Vaccination is also recommended for young people who live in close quarters with others (e.g., college dormitories, military barracks), where the disease is more easily transmitted. Travelers visiting the “meningitis belt” should also be vaccinated, especially during the dry season (December through June) when the prevalence is highest. Centers for Disease Control and Prevention. “Health Information for Travelers to the Gambia: Traveler View.” http://wwwnc.cdc.gov/travel/destinations/traveler/none/the-gambia. Accessed September 12, 2016. Centers for Disease Control and Prevention. “Meningococcal: Who Needs to Be Vaccinated?” http://www.cdc.gov/vaccines/vpd-vac/mening/who-vaccinate.htm. Accessed September 12, 2016.
Go back to the previous Clinical Focus box.
The recycling of inorganic matter between living organisms and their nonliving environment is called a biogeochemical cycle . Microbes play significant roles in these cycles.
In the carbon cycle , heterotrophs degrade reduced organic molecule to produce carbon dioxide, whereas autotrophs fix carbon dioxide to produce organics. Methanogens typically form methane by using CO 2 as a final electron acceptor during anaerobic respiration; methanotrophs oxidize the methane, using it as their carbon source.
In the nitrogen cycle , nitrogen-fixing bacteria convert atmospheric nitrogen into ammonia (ammonification). The ammonia can then be oxidized to nitrite and nitrate (nitrification). Nitrates can then be assimilated by plants. Soil bacteria convert nitrate back to nitrogen gas (denitrification).
In sulfur cycling , many anoxygenic photosynthesizers and chemoautotrophs use hydrogen sulfide as an electron donor, producing elemental sulfur and then sulfate; sulfate-reducing bacteria and archaea then use sulfate as a final electron acceptor in anaerobic respiration, converting it back to hydrogen sulfide.
Human activities that introduce excessive amounts of naturally limited nutrients (like iron, nitrogen, or phosphorus) to aquatic systems may lead to eutrophication.
Microbial bioremediation is the use of microbial metabolism to remove or degrade xenobiotics and other environmental contaminants and pollutants. Enhanced bioremediation techniques may involve the introduction of non-native microbes specifically chosen or engineered for their ability to degrade contaminants.
The molecule central to the carbon cycle that is exchanged within and between ecosystems, being produced by heterotrophs and used by autotrophs, is ________.
The use of microbes to remove pollutants from a contaminated system is called ________.
There are many naturally occurring microbes that have the ability to degrade several of the compounds found in oil.
Why must autotrophic organisms also respire or ferment in addition to fixing CO 2 ?
How can human activity lead to eutrophication?
|
0.999827 |
✔ VERSATILITY AT ITS BEST - Our functional & stretchy cover is more than just a cover! Use it as a nursing cover while breastfeeding in public, put it over the shopping cart, cover the high chair at the restaurant, use it as a canopy over the car seat and stroller while on the go, as a light blanket or changing pad, and even wear it as an infinity scarf or shawl!
✔ COMPLETE 360° COVERAGE & PRIVACY - Nurse your baby anytime, anywhere, with complete confidence and privacy using our breastfeeding cover up. Rest assured knowing we have you covered! You no longer have to worry about on-looking strangers while nursing in public.
✔ ALL AROUND PROTECTION - Complete peace of mind knowing our high quality, soft, & stylish multi use cover will help protect your baby from sunlight, wind, rain, mosquitoes, germs and pollen while out and about. Easy to use and easy to put on and take off of your carseat!
✔ AWESOME CUSTOMER SERVICE BY MATIMATI BABY - We truly care about every single one of our customers. Not only are our multi-use covers made with love, but we actually go above & beyond with our customer care!
I Love it , it’s perfect!
This cover is so versatile and lightweight....I love it I can throw it in my bag or wear it around my night either way i always have it with me.
We love our 5 in 1 cover! It comes in handy when I'm grocery shopping and when I need to cover up for while nursing. It's super soft and very modern.
I love this cover so much! The material is so soft and stretchy! I want one in Ever color!
I absolutely LOVE this nursing cover! On top of making great bibs, you made this cover so versatile and perfect. I love the color and how my son is not to hot in there when nursing. He gets so hot so fast and this cover allows air to come through as he nurses. It is also so soft! My son uses it as a blanket as well as a car seat cover. I would definitely recommend this product to any new momma out there, it really is wonderful.
I gave this as a present to my friend. Based on the good review, I assume it would be very essential for her little baby.
Great car seat cover! Fits perfectly. I love that it’s multi functional as it works for a nursing cover up also!
We absolutely love this 5-in-1 cover! Stretchy and great material! Keeps those nasty germs away from your baby :) We'd both absolutely recommend it!
Great, stretchy material that is super versatile! I love using this for the car seat, but have also found it's super for covering high chairs in restaurants, or draping over our babe if it's extra chilly. We love the material and it's held up after a ton of washes. Plus, we also get tons of compliments since it's a fabulous pattern.
This cover is soooo soft, I'm looking forward to using it for nursing and for the car seat. It's nice and thick, not see-through at all. I'm thinking about getting another to keep stashed in the car.
Bought it as a gift. I am very happy with the quality.
As with every product I've purchased here, the material is the nicest quality I've ever felt! The cover is incredibly soft and stretchy. The pattern and colors are very modern and sophisticated as well. My son doesn't arrive for another couple months, so I can't attest to the functionality just yet, but based on what I tried using with my first son, I can already see this is going to work much better as a nursing cover, car seat cover, and later a highchair/cart cover.
This is my second 5-in-1 Cover... Keep finding new ways to use it. The material is super soft and stretchy. Absolutely love it!
Material is very soft and stretchy! I love all the different ways it can be used.
Great product, material is super soft and stretchy! Fast shipping too!
gift to my daughter and my client. fits perfectly, stays in shape, now i can recognize a mati mati from afar!
Love this nursing cover so much! It's a perfect material and such a great, modern design. Awesome for covering up my little one's carseat and super easy to slip on and off. Thank you!!
love your bibs, they are the most absorbed and hip looking bib ! my favorite gift to all clients!!!! your products are the softest, the bamboo cloth are so soft on baby bums... love the stretch allround cover, was about to buy another grey striped one , to find out its out of stock! when will it be in again?
|
0.927612 |
In this paper, we perform double embedding in the quantization index modulation (QIM) framework where a single coefficient is modified twice, using two quantizers, to embed two bits. The motivation behind substituting single embedding with double embedding in the QIM framework for a certain steganographic scheme is to increase its hiding rate without significantly increasing the embedding distortion introduced and the stego scheme's detectability against steganalysis. We empirically determine the best way to couple the double embedding framework with our error correction framework that uses repeat accumulate (RA) coding. For moderate noise levels, the use of double embedding is seen to be significantly advantageous over single embedding.
|
0.999619 |
I tried to use my homemade compost as potting soil. Some plants did okay but others died. What's wrong?
Homemade compost can be a useful ingredient in potting soil, but for most plants it cannot be used without adding other materials. There may also be plant disease organisms in the compost. If the plant materials put into the composting process were diseased, those disease organisms may have survived and must be dealt with.
Compost alone can become waterlogged and suffocate the roots of many plants. While some plants may be able to grow in the pure compost, many others will benefit from the addition of coarse sand, aquarium gravel, perlite, or other things to increase the porosity of the potting soil. Since the compost is pure organic matter, it may also have an acid pH which is harmful to some plants. Adding lime can help if this is the case.
The problem of plant disease organisms can be managed by pasteurizing the potting soil once the sand or other material is added. Pasteurization is accomplished by heating the moist potting soil to a temperature of 140 degrees F. for 30 minutes. At this temperature, insects, plant bacteria, and plant viruses are killed. Heating to 180 degrees F. may be necessary to kill most weed seeds. The higher temperatures may cause the accumulation of some toxic materials in the soil and should be avoided if possible.
The soil may be heated in an electric oven, over charcoal in a barbecue, or in a microwave oven. An added benefit of using the microwave oven is that the microwaves may kill weed seeds and won�t dry the soil. In an oven or over the charcoal, the soil should be enclosed in material to prevent excessive drying (in a baking pan covered with foil, for example).
Pasteurizing the soil should be done outside because the odors generated when the soil is heated are not pleasant. The implements used in pasteurizing (thermometer to monitor temperatures and containers) should not be returned to the kitchen but kept for use only in soil pasteurization. The oven or microwave may be used again in the kitchen after the odors have been dispersed.
By increasing drainage and assuring that the homemade potting soil made from homemade compost is disease free, you should have more success.
|
0.997825 |
Lifelong gamer and game-creator, Imre Jele is an expert in game design, AI mechanics, procedural content, narrative, cross-media and audience engagement. He’s known for promoting innovative and collaborative creative approaches including Bossa’s regular internal Game Jams. Throughout his colourful career, Imre has worked on a wide range of game genres and platforms. He’s co-founder and Creator-in-Chief of Bossa Studios – winner of multiple BAFTA and other awards, creator of Surgeon Simulator and Worlds Adrift.
Do you remember Anton Ego, the restaurant critic in Ratatouille? He probably started as a person who loved food enough to choose that as his profession. Then over the years he developed a system of valuations to analyze and describe food, values that define great cooking and patterns to describe chefs who don’t care. Then, at some point, that system took over, and instead of supporting his task to explain his opinion of food, it became his opinion of food. And on that day he forgot his love of food and could only focus on his system of evaluations.
Now, I don’t know Jonathan Jones personally, so I can’t possibly judge his motives. But he does sound a little bit like Anton Ego.
Also, quickly after this article in 2012, a colleague of his at The Guardian has reacted to his article and explained why he is wrong.
I’m not even going to try defining what art is and how that differs from fine art. Art is art is art. I’m sure there are logical and well-educated arguments for what is not art. But I feel like it’s missing the point. What matters is that games, just like film or paintings, are a medium, one which will host deeply expressive art and commercial garbage. No one disputed films being art just because there are tons of horribly bad movies, and no one questions paintings as art just because I drew some unrecognizable scribble.
Does the aspect of interactivity & fun make games more or less artistic?
No. The opposite. I understand that some folks think art is what the artist created. But I believe art is the reflection of that piece of creativity in the observer. And as such games are a collaborative piece of art which can engage their audience in ways no other art form can.
And to be fair: Even if only pieces of creativity stationary in time could be called art, games would classify as art considering how much of games are pre-defined and hand-crafted by a creator.
Weirdness is not important for any art form in my humble opinion. But it can be very important for an individual creator or group of artists, and of course their audience.
I’m one of those creators and one of those players who love weirdness in games. The same way I loved the weirdness of comedy from Monty Python.
There are lot of strange indie games, some even avant-garde maybe. And even though some of these became rather successful, I still think Journey, Stanley Parable, Antichamber, Undertale fit that category.
Video games are where TV was in the 70ies or 80ies, and we are growing every year. And I don’t just mean growth in number of players and revenues, I mean evolution as an art form. Soon, gaming will become ubiquitous, and as the generation that doesn’t get games fades away, we will create new ideas like never before.
Not an expression I would use, to be honest.
Games break through a lot of walls when it comes to subject matters and we see more and more themes and topics we would have not seen a decade ago. But what’s more interesting is subversion of interactions. Games have been around long enough that both players and developers have certain expectations, some gameplay mechanics like shooting, walking and the likes have established methods, we expect them to work in certain ways. Subverting those is where the real challenge and artistic opportunity is.
Games are interactive art. We are defined by interaction for the most part. So subverting the conventions of interactions is where we can create the biggest artistic impact … incidentally that is also often called innovation and can in fact make your game sell well.
I know … I know … it’s dirty to talk about money when the subject is art.
|
0.995447 |
Given the language and cultural barriers for western companies in China, agents or partners are useful and improve efficiency when conducting business. An agent will act as your direct representative and is paid commission. Distributors, on the other hand, will buy your products and sell them on and make a profit from the difference.
The advantages of using an agent or distributor are numerous: it will reduce the cost of initiating business, be quicker than starting from scratch and you can access their network and insider knowledge.
However, there are also other factors to consider when selecting whether an agent or distributor is the right move for you. You should consider factors such as the increased cost to customers, as distributors may raise the price. This is important to consider if pricing is a critical part of your market penetration strategy. In addition to this, your in-country marketing may have to accept a slight loss of control of how and where your product is sold.
To find an agent or distributor, there are several routes brands should consider. It’s unlikely any one route will provide the full extent of resources that brands need, so combining multiple sources and prioritising routes based on the needs of the company are recommended strategies.
This is one way to make lots of contacts in one visit to China. However, fairs are crowded, sales-focused and it can be hard to communicate more than a superficial understanding of your company. Additionally, contact after this is usually contained to phone calls and emails so it can be hard to build a good business relationship.
Many consulting services will either sell you a list of distributors in your sector or will analyse your needs and provide a few recommended distributors for you. This can be expensive and largely depends on the quality of the output from the company.
Most domestic chambers of commerce will provide companies with a list of distributors within their sector and may already have some contacts with distributors. Other possible methods include direct networking in China or market research online.
There’s a number of questions brands need to ask themselves when deciding whether to go into business with distributors. The China-Britain Business Council also provides a useful checklist of things to consider before starting a business relationship with any entity in China. When conducting a background check, it is better to research the company using both English- and Chinese-language sources; there are a number of China-specific agencies that can provide comprehensive company evaluations.
Is this the right agent/distributor for you?
*Does the distributor have a history of representing products like yours?
*Do they stand to benefit from your product?
*Do they have any conflicts of interest, such as deals with competitors?
*Are they always easy to contact?
Business expert Laurel Delaney, goes further and offers a set of 50 questions for every business to ask distributors.
Exclusivity agreements are used to separate distributors into different sales channels, ensuring that they don’t begin to directly compete with each other. These agreements are used to help both distributors and suppliers. Exclusivity allows distributors to operate secure in the knowledge that other distributors, selling the same product, don’t cross borders of sales territory or use an exclusive online sales channel. Suppliers are made happy knowing that, without this distributor hyper-competition, the prices of their products aren’t going to spiral ever-lower.
It’s very common for distributors to request exclusivity and if the offer is appealing it can be tempting to agree immediately, but it’s not something you should jump into without knowing the facts first, and the differences between types of exclusivity.
Geo-exclusivity agreements restrict distributors to certain geographical areas. Within a chosen area, a distributor is able to sell the products freely, but are contractually obligated not to cross borders: national, regional or otherwise.
Channel exclusivity is similar to geo-exclusivity, but works with online rather than geographic boundaries. For example, a website for an ecommerce platform is typically hosted on a number extensions, largely based on geographical boundaries, like .co.uk for the United Kingdom, .de for Germany, and so. Channel exclusivity can also entirely restrict an ecommerce website from use. A high-end fashion company may want to totally prevent their items being sold on certain platforms, for reasons surrounding brand strategy.
China is fragmented; one distributor is unlikely to be able to reach all regions and you will likely lose control of your product pricing and placement if you cannot monitor distributors. Compare their offer to others, factoring in reporting capabilities and historic pricing and exclusivity compliance. If an offer is good and you give the chosen distributor exclusive rights, always create an “exit strategy”, either by providing targets or compliance conditions which if they don’t meet they lose the rights, or a simple time lapse.
So what happens when distributors don’t stick within their lanes? What are brands to do when their distributors start to sell on the wrong ecommerce channel, or when they drop their product prices online to well below those dictated in MAP policies? A technological solution is needed for brands to be able to comprehensively monitor the online actions of their distributors, so brands can enter future distribution negotiations with all the important information about how their products are being sold online.
In order to make money inside of China, registration as a Wholly-Foreign Owned Enterprise (WFOE) is required, which allows for sole ownership of the company by foreign investors. WFOEs are complex, expensive and time-consuming to procure, but alternative options (such as setting up a joint business venture with a local) should be heavily scrutinised as they can often result in a loss of control over the company, capital and IP. For more information of how to set up a WFOE, take a look at the WFOE help articles on China Law Blog, or the book ‘China Briefing: Setting Up Wholly Foreign Owned Enterprises in China’ edited by Chris Devonshire-Ellis, which will provide some in-depth guidance.
Contracts can be essential in avoiding mistakes and complexities when working overseas. Contracts will provide suppliers, distributors and partners with clear specifications and expectations. These contracts should also provide adequate grounding to seek compensation for non-compliance or a breach of terms. Chinese law expert Dan Harris writes extensively on Chinese contract law and provides some of the following information.
While in the USA and Europe contracts are signed, in China it is far more important that the contract is stamped with the correct company seal. In China, the actual company representative who signs the document isn’t as important as the seal or stamp.
Chinese courts will enforce contracts in foreign languages, however in the event of a dispute, it would work in your favour to have the contract in Chinese. The best practice is to have the working contract written entirely in Chinese. If the contract is already signed, you can always request a new contract and translate it.
In his blog Harris explains some of the problems that he encounters with distribution contracts. It is not uncommon for Chinese counterparts in joint ventures to claim that they hold the Chinese IP rights and that the law dictates this; however, this is not the case. There have been reports of Chinese partners claiming that it is an unwritten law, but there is no such law. No company should sign over their intellectual property on the basis that it is a legal requirement without consulting a respected legal expert in Chinese law, who speaks Mandarin (or the relevant Chinese language).
Distribution contracts are similar to those that companies use in the USA and EU, with some significant differences. Distribution contracts in the west usually protect a distributor to an extent in the case of termination. In China, there is no stipulation to have any such clause or protections for distributors, and so there is no requirement to compensate them in the event the contract is terminated. Therefore, it is not necessary to include contract terms that either limit or work around distributor protections.
It is advisable to add a further “no registration” provision in partner and distributor contracts. In this provision, the party agrees that you hold the exclusive rights to all IP and trademarks and that they will have no rights to that trademark in any shape or form. It should also include a stipulation that the party will not register any trademarks that relate to yours in any way. This acts as a further line of protection, with the first line having a nationally registered trademark.
This guide is aimed at those who wish to sell in China; however, as so many businesses both sell and produce in China it is worth mentioning some of the more important aspects of production. Before any company begins a discussion with manufacturers, it is imperative that they protect their trade secrets or designs.
A common mistake is when companies use a standard Non-Disclosure Agreement (NDA). A standard NDA protects trade secrets from being revealed to the public. However, a Chinese company with access to trade secrets may not reveal them to the public but could use them for its own products. Any contract should stipulate that in no way is the distribution or production company permitted to use your information to produce goods and/or compete with you. NDA agreements are not enforceable in China, as trade secrets are protected under an NNN Agreement under Chinese law.
NNN agreements are an airtight NDA including “non-use, non-disclosure and non-circumvention”. Non-use prevents the producer from using your trade secret or idea to compete with you.
Non-disclosure covers the standard NDA terms, but you should include clauses that prevent disclosure of information within your partner’s “group”, that is, any individual inside their personal or professional circles. If someone from their group does violate the conditions of the contract, then the producer will be held fully liable.
This provision prevents disclosure of information (including designs and patent) to family members, subcontractors, other state-owned enterprises or sister companies. Non-circumvention prevents your producer from selling directly to the consumer and skipping your part in the businesses. It has a variable level of significance depending on the product.
The core point of this article, as well as our previous reports on Intellectual Property in China and Selling to China, is to stress the importance of understanding the difference in business culture between China and west. There is a world of difference that permeates deeply into social conventions, business norms and law, all of which make a huge impact on how international business relations work.
Educating yourself and your company about Chinese culture is a wise step to take if working with Chinese companies is part of your future plans. It makes sense for everyone involved to have, at least, a base level of understanding on how things work. Having said that, it’s always recommendable for companies in this situation to seek expert counsel from advisors with real experience of working with Chinese companies, and from respected sources of Chinese law.
|
0.928657 |
I recently discovered an incredible philosophical argument.
By its very nature, I anticipate (indeed, I know) that a lot of people will outright laugh at my face when I say it. Specially people who “are too good for philosophy” and want to “stick to rigorous science” (the kind of people who neglect, of course, that not doing philosophy just means giving bad philosophy a free pass).
What does my argument accomplish? It shows that both Newtonian physics and general relativity cannot be full accounts of the universe. And it does this based on considerations emerging from philosophy of mind.
You heard that right: Good philosophy of mind can *rule out* general relativity and Newtonian physics as full explanations for the behavior of the universe. This almost certainly sounds absurd to most philosophers and physicists. It almost feels like I’m reverting to Aristotelian naturalism or theology: Back when people thought they could infer the laws of the universe based on logic and intuitive first principles.
In this case, however, I stand by my argument. It is logically correct, and, I think, also valid. That said, feel free to disagree. I don’t expect many people to take this seriously.
1) (Assumption) Physicalism is true (the universe’s behavior is fully accounted by physical laws).
2) (Assumption) Mereological Nihilism is true.
3) (Assumption) Newtonian physics either has no simples or admits only fundamental particles as simples.
4) (Inference from 3) Only fundamental particles can be simples.
5) (Assumption) Our mind/consciousness is ontologically unitary.
6) (Inference from 2 & 5) Since only simples are ontologically unitary, our mind is a simple.
7) (Inference from 4 & 6) Therefore, if Newtonian physics is true, our mind has to be a fundamental particle.
8) (Empirical Observation) Our mind contains a lot more information than a fundamental particle.
9) (Inference from 8) Therefore our mind is not a fundamental particle.
10) (Inference from 7 & 9) Therefore Newtonian physics is incomplete.
3) (Assumption) General relativity either has no simples or admits only black holes/Singularities as simples.
4) (Inference from 3) Only black holes can be simples.
7) (Inference from 4 & 6) Therefore, if General relativity is true, our mind has to be a black hole.
8) (Empirical Observation) Our mind is not super-massive and thus not a gravitational Singularity.
9) (Inference from 8) Therefore our mind is not a black hole.
10) (Inference from 7 & 9) Therefore General Relativity is incomplete.
In your definition of mereological nihilism elsewhere, you more-or-less write it off as false. I’m inclined to agree with that, for the same reasons as are given in that definition. Is that not problematic for this article, since it relies on the assumption that MN is true?
To be honest, this whole website looks like a someone’s attempt to collect status by writing lots of articles with smart-sounding words. There’s a reason why scientists try to not write articles with lots of flashy images and pass it as science.
Besides when I heard word philosophy, my initial thought is: signalling. Most of philosophy is signalling and complex multi-level signalling games which make my brain hurt. It doesn’t mean philosophy is useless or wrong though.
Have you published this in peer-reviewed journals? Most hypotheses are false. This is why we have scientific method or at least some form of verification. Try publishing in arXiv?
It isn’t these ideas aren’t interesting. They are but my suggestion would by to email this to people who study QM for living. My guess a lot of QM professors have grad students who have these kind of ideas on weekly basis. Perhaps you could find a grad student who studies QM and is interested in these kind of things?
I know I come off kind of negative but Internet is full of bad science. Someone interested in Rationality should know better.
I hope your ideas get more attention and more importantly, more inspection by people with QM credentials.
I agree 100% with your requirements given for a sound theory of conciousness (psychedelic user, another data point for your theory, although I think you should also investigate advanced Buddhist meditators and how they conceptualize consciousness and experience sensate reality, such as Daniel Ingram). I don’t, however, see why the unity of consciousness implies it must be quantum in nature. Is that what you’re claiming? Or are you making a slightly weaker claim: coherent wavefunctions are unitary, and so is consciousness, so quantum mechanics represents a good (best?) area of investigation in the study of consciousness. I can agree with this statement, but not the former, because I cannot see why two concepts sharing a fundamental property necessarily implies one is involved in the other.
Furthermore, I don’t see how quantum wavefunctions explain qualia and its various textures any better than classic physicalism. The experience of the visual field and an auditory note are so fundamentally different that they lead me to believe they belong in different dimensions. Hmm, on second thought, maybe string theory or some variant? An explaination for how qualia arises, or why a wavefunction feels like anything, is still missing, and seems like a fundamentally unclosable gap.
> Or are you making a slightly weaker claim: coherent wavefunctions are unitary, and so is consciousness, so quantum mechanics represents a good (best?) area of investigation in the study of consciousness.
Yes, that’s the claim, and it is certainly a lot weaker than the former. There is no proof that consciousness is quantum mechanical, and I don’t expect there to be one in several decades (until, say, we actually perform the experiment outlined in physicalism.com). So none of this is conclusive. However, what is conclusive, I think, is that explanations for consciousness will not be purely in terms of information processing, emergent properties, or say, using the general relativity ontology. We may as well discover a physical theory that unites quantum mechanics and general relativity (e.g. quantum gravity) and if so, then perhaps the connection will be there rather than with current QM. Also, all of this speculation is based on the assumption of physicalism. I myself think that physicalism is a very plausible hypothesis, but I can also see that if some variant of dualism is correct then there is no need whatsoever to invoke QM when trying to explain the unitary nature of our consciousness.
> Furthermore, I don’t see how quantum wavefunctions explain qualia and its various textures any better than classic physicalism. The experience of the visual field and an auditory note are so fundamentally different that they lead me to believe they belong in different dimensions.
This is a very sensible reaction, indeed. In the view that I explore (namely, non-materialist monistic physicalism / Pearcean-Strawsonian physicalism / panpsychism with quantum binding) the equations of physics do not actually imply consciousness. Instead, and here is the key point, consciousness would be the “fire in the equations of physics” that “gives reality to the formalism.” In other words, physical laws don’t imply consciousness; they are simple descriptions of the *behavior of consciousness*.
Unfortunately people often interpret non-materialist physicalism as some sort of animism. “You think rocks are conscious? What is the problem with you?” 🙂 Instead, what this view implies is that quantum wavefunctions are made of qualia, and that unitary experiences literally are the superposition of many of such wavefunctions in very fine ways that are useful for information-processing. So I don’t expect rocks to be unified minds. They may be full of “trivial” specks of experience that don’t interact much with each other or hold much of an inner structure beyond the basic physical properties needed to give rise to the large-scale behavior of rocks.
Strangely, physicalism is both “obvious” to some people, and also completely absurd to others. According to a (yet unpublished) study I conducted, this depends on the personality factor of “systematizing vs. empathizing.” Basically, systematizing folk (such as programmers, physicists and anyone with a high Aspergers quotient) think of consciousness as the mere result of information processing, and are prone to disregard its relevance altogether. On the other hand, empathizers have the problem that they can’t formalize their own introspective observations (which, nonetheless, provide important pieces of information that need to be accounted for).
Aww, thank you. That means a lot to me. You know? I would describe myself as “hyperphilosophical.” I don’t meant to make it sound like a super-power or anything. It is more like some sort of persistent non-symbolic state of consciousness in which I am led to contemplate without pausing things such as the nature of time, the ontological status of phenomenal colors, the information-theoretic properties of hedonic tone, etc. It has some benefits, such as writings my ideas and feeling happy about doing that… on the other hand, it can impair my everyday functioning 😉 I’m assuming you may be in the same spectrum.
Sure! Philosophy of mind is one of my favourite topics and it’s frustratingly hard to find people to properly discuss it with.
I’d like to hear more about your account of your consciousness during intense contemplation. It sounds very interesting, but difficult to describe. It sounds like it has aspects of both systematizing autistic-like thought, and the type of state one encounters on a heavy psychedelic trip. I think I also possess this at times, but to a lesser-degree than you.
I’ve also thought a bit about pan-psychism. Constantly arising-and-passing-away micro-experiences are somehow woven together and composed to create complex macro-experiences. This fluxing woven tapestry supports Closed Individualism because of shallow-borders between the continually-varying shapes of experience, like bodies of water. Objects which create certain macro-experiences were selected for by evolution due to the various physical advantages they confer.
Maybe there are different sorts of black holes, non-cosmological singularities of a different sort. Recently scientists found that balck holes cannot lose information because they are connected to everything in the universe. Perhaps minds are higher-dinensional singularities, connected to other minds in parallel realities.
Makes an amusing lemma, in any case.
Thanks for the comment. I am currently investigating the causes behind the differences in opinion about whether consciousness is unitary or not. The majority of people I talk to tend to believe that consciousness is *not* unitary. I interact a lot with rationalists, transhumanists, psychedelic users and people in academia. Of these, only psychedelic users tend to agree that consciousness is unitary. Why is that? In part psychedelics allow you to see local binding breaking down; features that usually are locally bound together become disentangled, and features that are never bound together become unified. Yet, on psychedelics the unity of consciousness as a whole does not break down. There is still, at all points, global binding going on.
Additionally, psychedelics weaken one’s trust in the validity of the beliefs of our in-group. They help people realize that a full explanation of reality and consciousness will have to satisfy many more constraints than those our culture believes important.
So while people in academia and the rationalist community can point to Dennett and say “most AI researchers believe that guy’s opinions and he says the unity is illusory” that’s a lot harder to swallow for psychedelic users in general.
That said, I think you are confusing attention with consciousness. When you open your eyes you have two things happening in quick succession. First you experience an awareness field with details about the features present in the scene. But you don’t recognize well-bound objects until you actually pay attention to individual components of the scene and use your attention to knit together local features into higher-order phenomenal objects.
If you count the awareness field as part of your consciousness (and not only the subsequent information-processing of attention), would you now say there is information in your consciousness?
Oh, looks like I forgot this in a tab without ever replying further.
I did not claim that consciousness contains no information; only that it can contain, at any given time (on a scale of milliseconds or less) much less than it naively might “feel” to simultaneously contain. And sure, we could moreover redefine “consciousness” as containing both an information-processing part and an “awareness field”, but that seems to be already granting the point that it contains distinguishable parts (and is therefore non-unitary).
For that matter though, I however deny that consciousness “processes information”. As I understand it, neurological studies have shown that information processing takes place subconsciously, and the notion of “conscious will” is an illusion. Our decisions are generally neurologically real long before they reach our conscious mind. Also, that they eventually do so is not strictly speaking sufficient as proof that consciousness “contains” information in any usual sense. If the information flow to physiologically tangible results diverges already earlier on in the thought processes, it is concievable that consciousness is an “informational black hole” where no information can be extracted from for further processing.
Lastly, as for the weaker question of why do *opinions* on the unitaryness of consciousness differ. The core problem seems to be that you cannot prove a negative. I will grant the starting point that consciousness usually “feels unitary”. But the fact that this remains under one cherrypicked altered brainstate does not actually constitute proof that is indeed a correct perception. (Both human perception and introception are after all quite imperfect.) Not unless you were to e.g. also grant that psychedelics reveal a more “fundamental” or “true” picture of the universe, compared to all others — which I do not grant; I think they merely prod the brain’s “this feels fundamental” emotional circuitry. On the other hand, a disproof is as simple to present as ever: we do know of mental illnesses that lead to the fracturing of consciousness, i.e. conclusively prove that it is non-unitary.
“8) (Empirical Observation) Our mind is not super-massive and thus not a gravitational Singularity.
That’s assuming black holes have a “minimum mass” . It’s not the amount of mass that makes a black hole, it’s how compressed it is (it has to fall within its own Schwarzschild radius). So theoretically there are such things as microscopic black holes. Keep the singularity, pass the massive.
Wow. Pretty rad reasoning, impressive!
BTW I love this blog of yours. It is rare to find straight-talk about qualia without the pseudo-intellectual babble or the pseudo-scientific nonsense. Even just at face value it does have some pretty astonishing consequences.
Interesting.. although some eliminativist philosphers might point out that the unitary nature of the mind is an illusion (e.g. multipe-drafts theory of Dan Dennett), and we are simply deluded about our own minds nature. Thus, the conclusion is invalid?
Yes. Eliminativism, functionalism, (strong) emergentism and epiphenomenalism would all go against assumption (5). I.e. that consciousness is not ontologically unitary.
However, I am certain that consciousness is ontologically unitary. It took me about 7 months of talking to David Pearce (physicalism.com) to understand why the phenomenal binding problem was a real and serious challenge to functionalism. Now I’m certain that yes, the left and right side of my visual field are connected in a very special way, which is not accounted for by Classical *or* Relativistic accounts.
On the other hand, the decoherence program in quantum mechanics does accomodate ontological unity easily. After all, quantum coherent wavefunctions contain a lot of information, and yet *are* ontologically unitary.
Did you check out Tononi’s Integrated Information Theory? I’ve tried to press him on physical ontology but he’s insisting on being silent by saying that we start from phenomenology (axioms) and then deduce a *possible* physical implementation that can account for it. Max Tegmark’s “perceptronium” is an attempt to make (a modified version of) integrated information (with some extra sauce) into physical ontology.
Rejecting unitary ontology of consciousness is a joke that will be laughed at when a theory shows it to be the epistemic faculty par excellence. Who could have possibly known!? Skeptic movement is out of control with their delusional dis-enchanting anti-wizardry-sorcery. They’re disappointed like the early AI-optimists, imposing their own misplaced pessimism on the next generation.
I get very skeptical when I hear references to QM when it comes to consciousness, especially from people who have no formal education in QM, as prominent scientists within the field tell us that they don´t understand the results of their measurements. As I think others have pointed out, it seems like QM must be connected with Consciousness because they both seem so ineffable and mysterious.
I wonder, have you taken college courses on QM or are you just a layperson with an interest in the philosophical implications of QM? This is not me trying to make ad hominem arguments or trying to discredit you, I am just interested in how well educated you are about QM. I just think that way too many people make references to QM (e.g. Deepak Chopra) and make fantastic claims without any sound logical or empirical basis.
Hey Benjamin, I empathize with the general skepticism when it comes to claims about the relationship between consciousness and QM. In my experience 99% of the times the connection is brought, there really isn’t any good reason to justify it at all. E.g. Deepk Chopra certainly does not use a lot of sound logic or empirical data to argue in favor of a mystico-spiritual New Age model of the cosmos and reality.
I hope that I can at least convince people that I have valid reasons that motivate the connection. I do not have a PhD in physics, and my formal education related to Quantum Mechanics is limited to an undergraduate physics course and a graduate course in philosophy of science (emphasizing QM), both at Stanford. However, I would like to point out that I have read a lot of books on the subject (e.g. the scientifically sound “Mind, Brain and the Quantum: The Compound ‘I'” by Michael Lockwood), as well as educated myself with MIT courseware. I am a rather skeptical person who is over-educated in philosophy. My day-job being a data science engineer at an Artificial Intelligence startup, so most charges that “I don’t understand how neural networks work” are not very credible.
If anything, I used to be a strong supporter of explicitly non-quantum accounts of consciousness. E.g. When I read “Consciousness Explained” when I was 17 years old I certainly thought we were a lot closer to explaining consciousness than I do now.
1. why consciousness exists at all (the “Hard Problem”).
2. how consciousness could be locally or globally bound by a pack of membrane-bound, supposedly classical neurons (the phenomenal binding or combination problem).
3. how consciousness could have the causal efficacy to allow us to discuss its existence (the problem of causal over-determination).
4. why consciousness has its countless textures and the interdependencies of their different values (the “Palette Problem”).
Above all, any decent scientific theory of conscious mind should offer novel, precise, empirically falsifiable predictions – with experimental outcomes to satisfy both believers and otherwise implacable foes alike. The conjecture should in Popper’s sense be risky.
Unfortunately, *any* non-quantum account will fail to accomplish (2), and this is due to a lack of credible reasons to assume that mere collections of atoms (or algorithms!) can create an ontologically unitary being, i.e. a given state of consciousness.
Yeah, I do understand where you´re coming from, and I agree what most of what you said in your latest post. I myself am not acquainted with QM, I just have a layman understanding of it. If I had the time and the energy, I would love to be able to understand the equations that describe what goes on at the smallest level, unfortunately I do not have the time, or the intellect(most probably) to do so.
My main focus is on cognitive neuroscience, but I think what is most sound is to remain open about the “hard problem of consciousness” for unconventional solutions. As of today, there seems to be theory that comes even close to explain why consciousness exist. I think Metzinger has done a rigorous job of applying a materialistic explanation for what consciousness is, although the conclusions he draw might be deeply unsettling.
As I understand it, you have an education in Computational Psychology, which to me sound like a really great field to be in. Unfortunately, there is no equivalent education here in sweden. To get into neuroscience here, you have to either become a clinical psychologist, get into computer science, or get an M.D. degree.
Do you happen to have an account on goodreads? I have read a lot of books about consciousness, but you seem to be more well versed in the literature, so it would be great if you could provide some reading tips.
|
0.913002 |
Acupuncture has advantages to treat cancer. Even though the standard medical care for cancer has been using, but causes numerous and aggressive unwanted side effects which can be relief by acupuncture.
How does acupuncture work for Cancer?
Acupuncture improves immune function--these are the cells that ultimately destroy cancer cells. Acupuncture decreases stress response (both emotional & physical), this allows the body to work more efficiently and improve quality of life. Acupuncture strengthens liver function--this help lower the overall toxicity level. Acupuncture can also serve as an adjunct to other cancer treatment, reducing various kinds of side effects from chemotherapy, radiation, and biological therapy and significantly increase white blood cell count to help cancer patients to complete the course of chemo or radio therapy, as well as improving pain, lessening nausea, dry eye and dry mouth, improving energy & vitality.
|
0.999997 |
Probably the best Strokes album. Let me rewrite that sentence. The best Strokes album.
|
0.952561 |
Not to be confused with Howard Hughes Corporation.
The Hues Corporation was an American pop and soul trio, formed in Santa Monica, California in 1969. They are best known for their 1974 single "Rock the Boat", which sold over 2 million copies.
Before achieving mainstream success they were the opening act for a list of headliners that included Frank Sinatra, Milton Berle, Nancy Sinatra, and Glen Campbell. The original band had a lineup of three singers and three sidemen. The sidemen were Joey Rivera from the Checkmates; Monti Lawston; and Bob "Bullet" Bailey, formerly of the Leaves. Bailey, Rivera, and Lawston left the band to form Goodstuff.
The group's name was a pun on the Howard Hughes Corporation, with the 'hue' (a synonym of 'color'). The band's members at the time of their first album were St. Clair Lee (born Bernard St. Clair Lee, April 24, 1944, San Francisco, California; died March 8, 2011), Fleming Williams (born December 26, 1943, Flint, Michigan; died February 15, 1998) and Hubert Ann Kelley (born April 24, 1947, Fairfield, Alabama). The original choice for the group's name was The Children of Howard Hughes, which their record label turned down.
The group was formed in 1969. Songwriter Wally Holmes founded the group with his friend Bernard St. Clair Lee. Female singer H. Ann Kelley was found at a talent show in Los Angeles. As a result of notices placed in southern California record stores, Karl Russell turned up. They recorded a single "Goodfootin'" / "We're Keepin' Our Business" that was released on the Liberty label in 1970. It did not make an impact on the charts.
Still with Karl Russell, the group's first big break came in 1972, when they were invited to appear in the blaxploitation film, Blacula, starring William Marshall. They were also asked to record three songs for the film's soundtrack: "There He Is Again", "What The World Knows," and "I'm Gonna Catch You." After their participation in the Blacula-project Karl Russell was replaced by Fleming Williams and the group signed with RCA Records; their second single for the label, "Freedom For The Stallion", from the album of the same name, became a moderate hit, reaching #63 on the Billboard Hot 100 chart. The third single from the album, "Rock the Boat," became a #1 hit on the Billboard chart and the group's signature song. The bass player on the session for "Rock the Boat" was Wilton Felder, not James Jamerson as previously reported. "Rock the Boat" was written by Holmes, who also wrote the Blacula songs, and was released in the U.S. in February 1974 and in the UK in July of that year. It went to #1 for one week in the U.S. and #6 for two weeks in the UK, staying for 20 weeks in the U.S. chart with a gold disc awarded by the RIAA on 24 June 1974. The track sold well over two million copies. The song is considered one of the earliest disco songs. Some authorities proclaim it to be the first disco song to hit #1, while others give that distinction to "Love's Theme" by the Love Unlimited Orchestra, a chart-topper from earlier in 1974.
After the success of "Rock the Boat," the Hues Corporation's other charted singles on the Billboard Hot 100 included "Rockin' Soul" (1974, #18), "Love Corporation" (1975, #62), and "I Caught Your Act" (1977, #92).
The group was unable to duplicate the success of their earlier hits and disbanded sometime around 1980. Whereas some sources claim the year of disbanding as early as 1978, archive footage of a television special for the Chilean TV in 1979 promoting their performance at the Viña del Mar International Song Festival proves the opposite. Furthermore, in 1980 the Hues Corporation released one last single in the US and a sixth album in at least New Zealand, Argentina and South Africa. With the renewed popularity of disco music in the 1990s, the group reunited for tour dates and special events, including the PBS special Get Down Tonight: The Disco Explosion.
Karl Russell was replaced by Fleming Williams who sang the male lead part on "Rock the Boat". Williams left not long after its recording.
Williams was initially replaced by Tommy Brown. In an interview with Gary James, St. Clair Lee said that after some time Williams was brought back into the group and in turn replaced Tommy Brown.
Around 1975, Karl Russell rejoined the band taking over the role of lead singer after Fleming Williams had left for good.
Around 1979, Kenny James took over as lead singer from Karl Russell.. James can be seen in the Chilean TV-footage from 1979 promoting their performance at the Viña del Mar International Song Festival and is also shown on the cover of the group's last album "Boogie Me, Move Me" from 1980.
In later years, circa the 1990s St. Clair Lee revived the group and recruited Bruce Glover and Elaine Woodard as the new members.
Hubert Ann Kelley later left the group to become a minister.
Fleming Wiliams died in the 1990s. Many sources claim the date of his death was September 1992, but other sources claim he died in February 1998. According to the Social Security Death Index, Fleming Williams died on February 15, 1998. His death has been attributed to a "long illness," although many others have also alluded to a long struggle with drugs. According to The New McCree Theatre in Williams' home town Flint, which in 2011 put on the play "Rock The Boat: The Fleming Williams Story" co-written by Williams' mother, Fleming Williams actually committed suicide in 1998.
Founding member St. Clair Lee died on March 8, 2011, in Lake Elsinore, California. He is said to have died from natural causes at the age of 66, as written in the Los Angeles Times obituaries in March. He was survived by his mother, sons, and sister.
N.Z. Broadcaster Peter Williams with St Clair Lee, Hubert Ann Kelly and Karl Russell.
^ a b Ron Wynn. "Hues Corporation - Biography - AllMusic". AllMusic. Retrieved 20 December 2014.
^ a b c "Fleming Williams". DiscoMusic.com. Archived from the original on 21 January 2013. Retrieved 20 December 2014.
^ Footage of The Hues Corporation appearing in Blacula. youtube.com. Retrieved 12 Juli 2018.
^ a b c Murrells, Joseph (1978). The Book of Golden Discs (2nd ed.). London: Barrie and Jenkins Ltd. p. 345. ISBN 0-214-20512-6.
^ Kenny James, Internationally Acclaimed Singer and Dancer. entertalkradio.com. Retrieved 12 Juli 2018.
^ "The Dead Rock Stars Club 1992 - 1993". Thedeadrockstarsclub.com. Retrieved 20 December 2014.
^ "RootsWeb: Database Index". Ssdi.rootsweb.ancestry.com. Retrieved 20 December 2014.
^ Pore-Lee-Dunn Productions. "Interview With The Hues Corporation". Classicbands.com. Retrieved 20 December 2014.
^ McCree revives story of hit-maker Fleming Williams. mlive.com. Retrieved 11 Juli 2018.
^ "Afterword". Latimesblogs.latimes.com. Retrieved 20 December 2014.
^ "The Hues Corporation". Discogs.com. Retrieved 20 December 2014.
^ "The Very Best of the Hues Corporation - Hues Corporation - Songs, Reviews, Credits, Awards - AllMusic". AllMusic. Retrieved 20 December 2014.
This page was last edited on 15 April 2019, at 19:08 (UTC).
|
0.999908 |
Do rhinos really stomp out fires?
Is that rhino on its way to a fire?
There is a scene in the 1980 movie "The Gods Must Be Crazy" where a rhino acts as a "self-appointed fire prevention officer" of the bush. Noticing that a human has started a small camp flame, the rhino rushes in and quickly stamps it out. (You might've seen an homage to the scene on an episode of "The Simpsons" when a stampeding rhino changes course to put out a fire.) All this makes sense -- as everyone knows -- because rhinos have a strict "safety first" motto. Clearly, they're the right animal to have by your side when you've set the roast on fire in the oven, but a real drag during your bonfire. Do not invite the rhino to your Guy Fawkes Night bash.
Only one problem. While this behavior is the stuff of legend, it seems to be strictly myth. And in fact, the legend is possibly quite different from the one that entertains us on the screen. In a 1974 survey of scientific literature on the rhinoceros, there is a mention of the Burmese belief that the rhino was attracted to campfires. Once finding them, the rhino would "trample and devour" the fire -- basically becoming a fire-eating legend [source: Van Strien].
But it's important to note that these tales are pretty much just that: stories passed along by indigenous groups. Nobody has actually seen rhinos attack -- or consume -- a fire with any gusto. It's also prudent to point out that there are several different types of rhinos, and the black rhinos native to Africa have never been accused of eating fire. It just might be that the legend of the fire-eating Asian rhino somehow morphed into the fire-stomping African rhino [source: Gaines]. But it is true that rhinos are not fond of humans; they fear them, and their reaction might just be to attack [source: Okori]. A fire isn't going to stop or busy them, in other words.
Let's end by giving the rhino its due, because some 2004 research has shown that the ancient rhino (which was shaped more like a hippopotamus) had no predators, thanks to its enormous size and lethal horns [source: Goldbaum]. In fact, the modern rhino is hard-pressed to find anyone willing to step to it. Perhaps that's one of the reasons the myth continued: Nobody wants to think that an animal has no weakness, right? Pretend the big bad rhino can be distracted with fire, and it's a little easier for us humans to handle.
But let's be clear: Instead of imagining the rhino as the concerned public safety officer portrayed in myth and entertainment, understand that its role is much closer to deadly king of the jungle.
Why do rhinos charge anything unfamiliar?
Did the Great Chicago Fire really start with Mrs. O'Leary's cow?
Why do people believe things that science has proved untrue?
Should we breed endangered species?
"The Gods Must Be Crazy." Directed by Jamie Uys. Columbia Films. 1980.
Can you really fight fire with fire?
|
0.955999 |
California's largest workers' compensation carriers have filed rates in November that ranged from no change to a 10% increase.
Liberty Mutual's eight subsidiaries exhibited the most aggressive stance, filing for no change in pure premium rates. On the other hand, American International Group's property and casualty subsidiary, Chartis, filed for an 8% increase in next year's workers' compensation rates. Security National Insurance Co. filed a 16.5% rate increase.
The Hartford Financial Services six insurance subsidiaries filed for a 6.4% rate increase, while four carriers belonging to the CNA Insurance Group filed for 10% rate increases. State Compensation Insurance Fund filed for a 5% increase and Zenith National Insurance Co. filed for a 2.7% rate hike.
More than half the 85 companies that have filed through December 1 are planning rate increases, but 10 intend to lower rates. And 25 companies are not changing rates.
The Workers' Compensation Insurance Rating Bureau had recommended a 22.8% increase in the pure premium rate, pointing to increasing medical losses and the danger of a return to subjective permanent disability ratings due to the Workers' Compensation Appeals Board's rulings in Almaraz/Guzman and Ogilvie. But Insurance Commissioner Steve Poizner rejected any increase, saying those WCAB decisions are still under appeal, and also that insurers had not done enough to take advantage of opportunities for cost savings created by the 2004 reform legislation. Poizner’s ruling is advisory only.
The importance of staying on top of open workers’ compensation claims, and getting injured workers back to work was demonstrated once again in the latest report from the California Workers’ Compensation Institute. For all types of employers and industries covered by workers’ compensation insurance, 72% of claims are closed within 12 months, 82 % are closed within 24 months and 85 % are closed within 36 months. But look at the average cost of claims: at 12 months – average cost of a lost time injury claim = $9,710 according to the latest data. But at 24 months – average cost = $19,316 and at 36 months- average cost = $26,416.
|
0.97977 |
I was watching a documentary about asbestos and learned that the World Trade Center towers had asbestos installed in the first 40 floors before the material was banned from use. What would the health affects be if the entire two buildings had asbestos when they collapsed on 9/11?
Also the fire-proofing inside the area where the planes hit was blown out, so I assume if asbestos were there instead it would also be blown out and the outcome would've been the same? Or is it possible this could've at least delayed the collapse of the two buildings?
I would think the high cancer rates of first responders would be a start.
|
0.98727 |
After you hit 40, you might begin to wonder what this means for your workout program. What are the best workouts for those in their 40’s and beyond? How should your workout change compared to that of someone half your age?
There’s no question that you do need to adapt your workout over time due to the changing needs of your body, but contrary to what many women might believe, it doesn’t need to change that much.
Hands down, the single best workout option for women in their 40’s is going to be a good resistance training program. It’s incredibly important for women at this age to start with a strength training workout if they have not yet already because at this age, you are at a higher risk of losing lean muscle mass. It’s the old principle ‘use it or lose it.’ If you aren’t putting sufficient stress on your muscles as the weeks pass by, slowly you’ll grow weaker, which can make everyday activities harder to perform.
Likewise, your lean muscle mass is the most metabolically active tissue in the body, so the more muscle you lose, the slower your resting metabolic rate will become, which can contribute to weight gain.
One of the biggest reasons why women start to gain weight into their 40’s and 50’s is because they are losing the lean muscle that helped keep their daily calorie burn higher. If you aren’t adjusting your food intake to account for this loss of muscle mass, it will result in weight gain.
Additionally, if you are in your 40’s and really looking to transform your body, weight lifting is the way to do it. While cardio training may help you burn fat, weight lifting will help you reshape your physique, adding curves and muscle in all the right places.
Finally, weight lifting is a great choice if you want to combat stress. Between a demanding career and family obligations, life can get stressful. A good weight lifting session will release a nice dose of endorphins, helping calm your body and combat that stress.
Compound exercises will work multiple muscle groups at once, help you gain functional strength, and burn the most calories per session. They should be your focus. These include moves such as bench pressing or push-ups, bent over rows, shoulder presses, squats, lunges, deadlifts and pull-ups (or pull-downs).
Focus on these first and foremost, then you can add other exercises such as bicep curls, tricep extensions, lateral raises, leg extensions, and hamstring curls if you’d like.
You should focus on lifting a heavy enough weight that you are fully fatigued by the time you finish around 8-10 reps without losing proper form. This will give you both the strength-training stimulus to help generate more lean muscle mass while keeping your metabolic rate and calorie burn higher.
Finally, rest for around 30-60 seconds between sets. You don’t want to rest too long or you’ll lose some of the metabolic boosting effects this workout provides. At the same time, don’t rest so little that you can’t challenge yourself with a heavy weight.
To help give you an idea how to implement this, let’s examine at what a full body workout for those over 40 would look like. Always begin with a brief five to ten minute warm-up and finish up with some light stretching at the end.
*Note that a superset is performing all the reps of one exercise and then directly moving to the next exercise, doing all the reps of it before taking a rest.
So if you have not yet started with resistance training, lean towards this style of exercise as you formulate your workout plan. It’ll serve you very well both in your 40’s as well as in the years beyond.
|
0.999996 |
How to make a Flash SWF movie with transparent background?
You can overlay a transparent Flash SWF movie on an image with HTML code, which will make the image just looking like the background of the Flash movie, but without modifying the Flash file.
Add HTML code which adds image to the bottom of the Flash movie.
To add an image to the bottom of the Flash movie, you need to use a div layer. A div layer is like a window inside a window, which lets you define an area inside your HTML page.
The style width:600px;height:200px;background:url(background.jpg'); defines the size and background image of the div. Please note, the size need to be same as that of the Flash movie.
Below is an example of Flash slideshow with transparent background, and with image added with HTML code.
|
0.999982 |
'But if it failed to show itself she would not grieve too deeply, for fear that the mending of broken hearts be a puzzle neither wit nor time had the skill to solve'.
Context: It here refers to a puzzle box that could show her the whereabouts of her deceased lover.
I cannot understand why the subjunctive 'be' has been used in 'for fear that the mending of broken hearts be a puzzle' and what is the meaning of the this part ?
To me, this is awkward, unnatural language. I have no idea why Barker chose to write like this, but I don't like this sentence at all. I suppose it means that she has decided not to grieve because she is afraid that she won't be able to figure out how to mend her broken heart.
|
0.94953 |
What does Target Shooting Ireland do?
The most obvious thing the NTSA does is to select the National Squad, who represent Ireland in international competitions. We do this by evaluating candidate shooters' scores in registered competitions over the previous year. We then select those eligible to go and subsidise their competition expenses.
We are also responsible for the development of the sport in Ireland. This entails organising and coordinating the calendar of events, as well as running the national championships. We also act as a representative for Irish target shooters within the ISSF.
We organise coaching and training for the National Squad, and act as the squad management body for international competition.
We promote the sport in national and local media.
We collate scoring data from competitions throughout the year to generate national rankings and leagues.
|
0.99863 |
Do I look something different I used to be?
The track was released on their YouTube channel, BANGTANTV, on July 11th, 2013. A recording episode of BTS singing Born Singer was later released on the same channel on August 12, 2013.
“Born Singer” describes BTS’s journey from trainees to rookie idols, mostly focusing on the rap line’s thoughts, feelings, struggles, and victories.
Although it is an old song, BTS continues to perform it at special events, such as longer concerts and fan meets, as they have not forgotten their long journey from trainees to successful global idols.
|
0.979341 |
Harriet Tubman is believed to have been born about 1820. As was the case with many slaves, the date of her birth was thought unimportant and was not recorded.
January 24, 1820: Henry J. Raymond, political activist, journalist, and founder of the New York Times, was born in Livingston County, New York.
January 29, 1820: George IV became the King of England upon the death of George III.
February 8, 1820: William Tecumseh Sherman, Union general in the Civil War, was born in Lancaster, Ohio.
February 15, 1820: Susan B. Anthony, leader of the American suffrage movement, was born in Adams, Massachusetts.
March 1820: The Missouri Compromise became law in the United States. The landmark legislation effectively pushed the issue of slavery aside for the next few decades.
March 22, 1820: American naval hero Stephen Decatur was fatally wounded in a duel fought near Washington, D.C.
May 12, 1820: Florence Nightingale, English nurse and reformer, was born in Italy.
September 26, 1820: American frontiersman Daniel Boone died in Missouri at the age of 85. He had pioneered the Wilderness Road, which led many settlers westward to Kentucky.
October 6, 1820: Jenny Lind, whose American tour was a sensation promoted by Phineas T. Barnum in 1850, was born in Sweden.
November 1820: James Monroe faced virtually no opposition and was reelected president of the United States.
February 22, 1821: The Adams-Onis Treaty, by which the United States obtained Florida, went into effect.
March 4, 1821: James Monroe was sworn in for his second term as president of the United States.
May 5, 1821: Napoleon Bonaparte died in exile on the island of St. Helena.
July 24, 1821: Bill Poole, who became notorious as "Bill the Butcher," was born in New Jersey.
September 3, 1821: A devastating hurricane struck New York City, and the study of its path would lead to the understanding of rotating storms.
October 17, 1821: Photographer Alexander Gardner was born in Scotland. He would become noteworthy for photographing the dead at Antietam during the Civil War as well as taking notable portraits of President Abraham Lincoln.
December 25, 1821: Clara Barton, Civil War nurse and founder of the American Red Cross, was born in Oxford, Massachusetts.
A children's book published in New York City referred to a character named "Santeclaus," which may have been the first printed reference to Santa Claus in the English language.
American traders began using the Santa Fe Trail.
April 22, 1822: Ulysses S. Grant, Civil War general and later president of the United States, was born at Point Pleasant, Ohio.
April 26, 1822: Frederick Law Olmsted, designer of Central Park, was born in Hartford, Connecticut.
May 30, 1822: Arrests in Charleston, South Carolina, prevented a slave uprising which had been planned by Denmark Vesey.
October 4, 1822: Rutherford B. Hayes, who would become president in the disputed election of 1876, was born in Delaware, Ohio.
Hieroglyphs were deciphered using the Rosetta Stone.
The first group of freed slaves being resettled in Africa by the American Colonization Society arrived in Liberia and founded the town of Monrovia, named for President James Monroe.
April 3, 1823: William Marcy "Boss" Tweed, the leader of notorious New York political machine Tammany Hall, was born in New York City.
December 23, 1823: The poem "A Visit From St. Nicholas" by Clement Clarke Moore was published in a newspaper in Troy, New York.
December 1823: President James Monroe introduced the Monroe Doctrine as part of his annual message to Congress.
January 21, 1824: Thomas J. "Stonewall" Jackson, Confederate general in the Civil War, was born in Virginia.
March 2, 1824: The landmark Supreme Court decision Gibbons v. Ogden ended a monopoly of steamboats in the waters around New York City. The case opened up the steamboat business to competition, which made great fortunes possible for entrepreneurs such as Cornelius Vanderbilt. But the case also established principles regarding interstate commerce which apply to the present day.
May 23, 1824: Ambrose Burnside, Civil War general, was born in Indiana.
August 14, 1824: The Marquis de Lafayette, French hero of the American Revolution, returned to America for a grand tour. He had been invited by the federal government, which wanted to show off all the progress the nation had made in the 50 years since its founding. Over the course of a year Lafayette visited all 24 states as an honored guest.
November 1824: The U.S. presidential election of 1824 was deadlocked with no clear winner and would become known as "The Corrupt Bargain."
With the controversial election of 1824, a period of American politics known as The Era of Good Feelings came to an end.
February 9, 1825: The election of 1824 was settled by a vote in the U.S. House of Representatives, which elected John Quincy Adams as president. Supporters of Andrew Jackson claimed a "Corrupt Bargain" had been struck between Adams and Henry Clay.
March 4, 1825: John Quincy Adams was inaugurated as president of the United States.
October 26, 1825: The entire length of the Erie Canal was officially opened across New York, from Albany to Buffalo. The engineering feat had been the brainchild of DeWitt Clinton.
January 30, 1826: The Menai Suspension Bridge opened in Wales, ushering in an age of great bridges.
July 4, 1826: American songwriter Stephen Foster was born in Pennsylvania.
July 4, 1826: John Adams died in Massachusetts and Thomas Jefferson died in Virginia, on the 50th anniversary of the signing of the Declaration of Independence. Their deaths left Charles Carroll of Carrollton as the last surviving singer of the nation's founding document.
December 3, 1826: George B. McClellan, Civil War general and commander of Union forces at the Battle of Antietam, was born in Philadelphia.
Josiah Holbrook founded the American Lyceum Movement in Massachusetts.
Irish immigrant John Hughes, future archbishop and political force in New York, was ordained a priest.
March 26, 1827: Composer Ludwig van Beethoven died in Vienna, Austria, at the age of 56.
August 12, 1827: English poet and artist William Blake died in London, England at the age of 69.
Artist John James Audubon published the first volume of Birds of America.
February 8, 1828: Writer Jules Verne was born in France.
Summer-Fall 1828: The election of 1828 was preceded by perhaps the dirtiest campaign ever, with supporters of Andrew Jackson and John Quincy Adams hurling shocking accusations.
November 1828: Andrew Jackson was elected president of the United States.
March 4, 1829: Andrew Jackson was inaugurated as president of the United States, and raucous supporters nearly wreck the White House.
Cornelius Vanderbilt began operating his own fleet of steamboats in New York Harbor.
The Metropolitan Police Service was founded in London, England, with its headquarters at Scotland Yard.
|
0.963407 |
You can assert your rights by informing us using the contact details specified under ‘Responsible provider’ above or by contacting the data protection officer designated by us.
If you provided further data voluntarily (e.g. about interests, sizes, age, gender, children, preferences, wish list), we process your data which is not necessary for the initiation or fulfilment of a contract, for as long as you use the password-protected area and if you do not delete it yourself beforehand. Our aim in this respect is to optimise the use of the website for you as a user. The legal basis for this is Art. 6(1) Sentence 1(f) GDPR.
You can object to the processing of the information provided by you voluntarily. Your right of objection exists when you have reasons arising from your particular situation, unless we can prove compelling legitimate reasons for the processing which outweigh your interests, rights and freedoms or, moreover, the processing serves to establish and exercise or defend against legal claims (Art. 21(1) GDPR).
You can manage, change or delete your voluntary information yourself at any time in the password-protected area. You are free to take measures in accordance with the ‘Your rights’ section, although if you do have any complaints we request that you first contact our company.
You can leave comments on the website.
When your post is published, we will only publish the name/pseudonym you told us, and not the email address you provided. Your post will not be checked by us before publication. We reserve the right to remove posts at any time if they are found to be unlawful.
If you or we delete your post, we process the email address, the name provided and other voluntary information up to the expiry of the statutory limitation periods for the aforementioned reasons of prevention and defence, but restrict the processing of this data after six months.
You can object to the processing of the data you provided if you have reasons arising from your particular situation, unless we can prove compelling legitimate reasons for the processing which outweigh your interests, rights and freedoms or the processing serves to establish and exercise or defend against legal claims (Art. 21(1) GDPR).
You can have us delete your post at any time. You are free to take measures in accordance with the ‘Your rights’ section, although if you do have any complaints we request that you first contact our company.
Your right of objection exists if you have reasons arising from your particular situation, unless we can prove compelling legitimate reasons for the processing which outweigh your interests, rights and freedoms or, moreover, the processing serves to establish and exercise or defend against legal claims (Art. 21(1) GDPR).
You can object to the processing in the future at any time by clicking on the unsubscribe link at the end of the newsletter.
This will simultaneously end the processing of data for you being sent the newsletter and for statistical analysis. It is not possible to object to the distribution via MailChimp or the statistical evaluation separately.
Furthermore, MailChimp has informed us that it may use the transferred data to optimise or improve its own services, e.g. to technically optimise the sending and presentation of newsletters. According to its own declarations, MailChimp neither processes the data in order to write to you with its own advertising nor transmits the data to third parties.
If you choose to pay via PayPal, the payment details you enter will be transferred to PayPal. The transfer of your data to PayPal is performed on the basis of Art. 6(1) Sentence 1(b) GDPR (processing for the performance of a contract). We have no knowledge of how long PayPal stores data and have no way of influencing this.
The processing is performed on the basis of Art. 6(1) Sentence 1(b) GDPR (processing for the performance of a contract). The data required for payment processing is transmitted securely using SSL encryption and processed exclusively for payment processing. As soon as storage is no longer necessary, we delete the data generated in this context or, if statutory retention obligations apply, restrict processing of the data.
In the case of payment on account, we reserve the right to forward the data you provide when booking to external companies (e.g. Verband der Vereine Creditreform e.V., Hellersbergstraße 12, 41460 Neuss) in order to carry out a credit check.
This data is passed on on the basis of Art. 6(1) Sentence 1(f) GDPR, as purchase on account requires us to effect prior performance and bear the risk of default. As soon as storage is no longer necessary, we delete the data generated in this context or, if statutory retention obligations apply, restrict processing of the data.
You can object to this processing at any time, but may then not be able to use the ‘purchase on account’ payment method. Your right of objection exists if you have reasons arising from your particular situation, unless we can prove compelling legitimate reasons for the processing which outweigh your interests, rights and freedoms or, moreover, the processing serves to establish and exercise or defend against legal claims (Art. 21(1) GDPR).
Bookmarks, e.g. to social networks such as Facebook.com, Twitter.com, Google+, allow you as a user of certain social networks to create links from our website on your social network profiles in order to bookmark them or share them with your social network contacts.
Bookmarks on our website can be recognised by the corresponding icons (e.g. “f”, “g+”) at the bottom of the page. When you open a page of our website, the bookmarks may place cookies on your device/in your browser, which are small text files with a sequence of numbers that make it possible to recognise the browser. If you are simultaneously logged in to one of the relevant social networks, this allows the operator of that social network to track which pages you visit, unless you have disabled the acceptance and storage of cookies in your browser settings. When you use bookmarks, information is sent to the respective social network.
We neither check nor can we be held responsible for comments or activities of persons who use bookmarks for this purpose. Persons who share our content via bookmarks are not entitled to speak for us and our website or to give such an impression vis-à-vis third parties.
The legal basis for the use of the bookmarks is Art. 6(1) Sentence 1(f) GDPR. We have no knowledge of how the operators of social networks further process data or how long they store it, and nor do we have any way of influencing this.
By visiting the website, YouTube receives the information that you have retrieved the corresponding subpage of our website. In addition, the data mentioned under ‘Access data’ is submitted. This occurs regardless of whether YouTube provides a user account that you are logged in with or whether no user account exists. If you are logged in to Google, your data will be directly associated with your account. If you do not wish for this data to be associated with your YouTube profile, you must log out before activating the button. YouTube stores your data as usage profiles and processes it for purposes of advertising, market research and/or the demand-oriented design of its website. Such analysis takes place in particular (even for users who are not logged in) to provide demand-oriented advertising and to inform other users of the social network about your activities on our website. Google also processes your personal data in the USA and has subjected itself to the EU-US Privacy Shield, https://www.privacyshield.gov/EU-US-Framework.
We use plug-ins from Vimeo to integrate videos on our website. Vimeo is operated by Vimeo LLC, 555 West 18th Street, New York, New York 10011, USA. The plug-ins allow us to embed visual content (“Videos”) on this website which we have published on www.vimeo.com.
If you visit one of our web pages with the Vimeo plug-in, this establishes a connection to the Vimeo servers. In this way, the Vimeo server is notified of which web page you have visited. If you are simultaneously logged in as a member of Vimeo, Vimeo will associate this information with your personal user account When using the plug-in, e.g. playing a video by pressing the play button, this information is also assigned to your user account. Vimeo stores your data as usage profiles and processes it for purposes of advertising, market research and/or the demand-oriented design of its website. Such analysis takes place in particular (even for users who are not logged in) to provide demand-oriented advertising and to inform other users of the social network about your activities on our website.
The legal basis of the processing is Art. 6(1) Sentence 1(f) GDPR. The processing serves to make our website more attractive and to offer you additional services. We have no knowledge of how long Vimeo stores data and have no way of influencing this. We have concluded ‘standard contractual clauses’ with Vimeo in order to obligate Vimeo to maintain an appropriate level of data protection.
You have the right to object to the processing, although you must contact Vimeo to exercise this right. Your right of objection exists if you have reasons arising from your particular situation, unless we can prove compelling legitimate reasons for the processing which outweigh your interests, rights and freedoms or, moreover, the processing serves to establish and exercise or defend against legal claims (Art. 21(1) GDPR). You can disable or restrict the transfer of cookies by changing the settings in your internet browser. Cookies that have already been saved can be deleted at any time. This can also be done automatically. If cookies are disabled for our website, it may no longer be possible to use the full functionality of the website.
For further details about this data processing and information about data protection at Vimeo, please refer to: https://vimeo.com/privacy.
You have the right to object to the processing, although you must contact Getty Images to exercise this right. Your right of objection exists if you have reasons arising from your particular situation, unless we can prove compelling legitimate reasons for the processing which outweigh your interests, rights and freedoms or, moreover, the processing serves to establish and exercise or defend against legal claims (Art. 21(1) GDPR). You can disable or restrict the transfer of cookies by changing the settings in your internet browser. Cookies that have already been saved can be deleted at any time. This can also be done automatically. If cookies are disabled for our website, it may no longer be possible to use the full functionality of the website.
Our website uses plug-ins from the image agency Adobe Stock, which offers pictures and other image material. The Adobe Stock components are provided by Adobe Systems Software Ireland Ltd., 4-6 Riverwalk, Citywest Business Campus, Dublin 24, Ireland (“Adobe Stock”).
The legal basis of the processing is Art. 6(1) Sentence 1(f) GDPR. The processing serves to make our website more attractive and to offer you additional services. We have no knowledge of how long Adobe Stock stores data and have no way of influencing this.
You have the right to object to the processing, although you must contact Adobe Stock to exercise this right. Your right of objection exists if you have reasons arising from your particular situation, unless we can prove compelling legitimate reasons for the processing which outweigh your interests, rights and freedoms or, moreover, the processing serves to establish and exercise or defend against legal claims (Art. 21(1) GDPR). You can disable or restrict the transfer of cookies by changing the settings in your internet browser. Cookies that have already been saved can be deleted at any time. This can also be done automatically. If cookies are disabled for our website, it may no longer be possible to use the full functionality of the website.
We use Google Analytics to analyse and regularly improve the use of our website. The statistics help us to improve our website and make it more interesting for you as a user. For the exceptional cases in which personal data is transferred to the USA, Google has subjected itself to the EU-US Privacy Shield, https://www.privacyshield.gov/EU-US-Framework. The legal basis of the processing by Google Analytics is Art. 6(1) Sentence 1(f) GDPR. The Analytics cookies are deleted after 14 months at the latest.
Pinterest, Inc., 635 High Street, Palo Alto, CA, 94301, USA (data protection information at: https://policy.pinterest.com/en/privacy-policy).
We offer you the possibility to communicate directly with the provider of the plug-in via the button. Only if you click on the marked field and thereby activate it does the plug-in provider receive the information that you have accessed the corresponding page of our website. In addition, the data mentioned under ‘Access data’ is submitted.
|
0.998582 |
The article that won't die: Sally Beck's "Scientists fear MMR link to autism," published in the Daily Mail on May 28, 2006.
It gets worse. Two of the complainants in the Omnibus Autism Proceeding, the Cedillos and Hazelhursts, relied upon the unpublished Walker et al. research. Both the Special Masters in the hearings, and the presiding judge in the following Hazelhurst appeal, dismissed the evidentiary value of the Walker et al. study (exerpts from the hearings and the appeal are below). In other words, the Walker data have been examined and found unconvincing, because it was scientifically suspect.
The Walker study (never published) in no way validates Wakefield's fraud. The MMR vaccine still does not cause autism.
Thanks to the Daily Mail's perverse habit of not date-stamping articles and scrubbing comments, plus having a date-stamp above the header, a casual reader may not realize that the article is 4 and a half years old.
Background: Autistic enterocolitis, consisting of a nonspecific ileocolitis coupled with ileocolonic lymphonodular hyperplasia (LNH), was first introduced as a new, potentially virus-induced disease entity eight years ago in a group of ASD children with developmental regression.
Objectives: The primary objective of this study was to examine ileal biopsy tissue in a large cohort of pediatric patients who carry a diagnosis of regressive autism and whose chronic gastrointestinal symptoms warranted diagnostic endoscopic evaluation, for evidence of measles virus RNA.
Methods: Patients who had been diagnosed with autism and who were referred to a pediatric gastroenterologist for evaluation of chronic GI symptoms were eligible to participate in this IRB approved study. For each patient, medical histories, vaccination records, histopathology reports, and ileocolonoscopic biopsy tissue were available for evaluation. Terminal ileum (TI) biopsy tissue was assayed by RT-PCR for the presence of measles virus RNA and PCR-positive samples were sequenced.
Compete text of the Wake Forest Press released dated June 1 2006. Downloaded from http://www.wfubmc.edu/News-Releases/2006/Wake_Forest_Researcher_Warns_Against_Making_Connection_Between_Presence_of_Measles_Virus_and_Autism.htm on January 22, 2011.
WINSTON-SALEM, N.C. – An American scientist whose research replicates a connection published in England in 2002 between the measles virus and bowel disease in autistic children strongly warns against making the “leap” to suggesting that the measles vaccine might actually cause autism.
“That is not what our research is showing,” said Stephen J. Walker, Ph.D., an assistant professor of physiology and pharmacology at Wake Forest University Baptist Medical Center. Walker and colleagues have issued an abstract to be presented at this week’s International Meeting for Autism Research, indicating that a high percentage of autistic children that they have tested with chronic bowel disease show evidence of measles virus in their intestines.
Some observers have said that the presence of the measles virus indicates a strong possibility that the measles vaccine, a possible source of the virus, could have caused the children’s autism. That possible connection has caused a major controversy in the United Kingdom, where the connection was first made in 2002. The vaccine is first given as part of a triple vaccine called MMR – for measles, mumps and rubella – at ages 12-18 months. That is shortly before a particular type of autism (regressive) begins to appear in children afflicted with the condition, which has fueled the speculation about a connection.
Walker says the new research does not support the connection, and he notes that the results have not even been published in a peer-reviewed journal. “Even if we showed association (between measles virus and bowel disease) and we published it in a peer-reviewed journal, the conclusion will be simply that there is measles virus in the gut of a large number of children who have regressive autism and bowel disease. End of story.
The main task at hand, Walker said, is to determine what is causing the bowel condition in the autistic children, a condition that has a direct influence on cognitive and behavioral issues associated with autism.
A high percentage of autistic children have chronic bowel disease, a discovery in the late 1990s that eventually led to the measles virus connection.
“If anybody has severe GI problems, it causes problems with focus, it causes problems with everything. You can’t do anything until you get that resolved. We’ve all experienced that.
Media Contacts: Mark Wright, mwright@wfubmc.edu, Karen Richardson, krchrdsn@wfubmc.edu, or Shannon Koontz, shkoontz@wfubmc.edu, at (336) 716-4587.
Wake Forest University Baptist Medical Center is an academic health system comprised of North Carolina Baptist Hospital and Wake Forest University Health Sciences, which operates the university’s School of Medicine. The system comprises 1,187 acute care, psychiatric, rehabilitation and long-term care beds and is consistently ranked as one of “America’s Best Hospitals” by U.S. News & World Report.
Petitioners have also relied on a study that is currently in progress, conducted by Dr. Hepner and several others, often described as the “Walker study.” (See Ex. 59, Tab K; P. Trial Ex. 3.) Dr. Hepner stated that the “preliminary data” from that study “present another step in support” of the proposition that the measles virus persists in the intestinal tissue of some autistic children. (Ex. 63, p. 5; see also Tr. 634A-35A.) After consideration of the Walker study and the testimony about it in the record of this case, however, I conclude that the study does not provide any substantial support to the proposition that the measles virus persists in the bodies of Michelle Cedillo or any other autistic individuals.
In short, Dr. Hepner was forthright in acknowledging that, in terms of drawing any conclusions with regard to the issue of the validity of measles virus testing, the preliminary data available from her study simply are “not useful at this time.” (Tr. 659.) In sum, it is clear that the Walker study must be disregarded. First, both Dr. Ward and Dr. Bustin pointed out a number of reasons why one cannot draw any conclusions from, or place any reliance on, the preliminary data from the Walker study. And even petitioners’ expert Dr. Hepner, one of the study’s own authors, has acknowledged that the preliminary data from the study are “not useful at this time.” (Tr. 659.) Accordingly, I must agree with Dr. Hepner on this point. I conclude that the Walker study is not useful in deciding the issue of whether the Unigenetics measles virus detection testing was reliable.
Petitioners also rely on unpublished findings of measles virus in tested bowel tissues taken from autistic children as support for their claim regarding measles persistence. Petitioners’ expert Dr. Hepner expressed the opinion that the published 2002 Uhlmann findings are “reliable,” see Cedillo Tr. at 639, and her confidence in the reported positive findings of measles virus is bolstered by the preliminary findings of a study on which she is working. Dr. Hepner discussed her current work with a team of investigators in the laboratory of Dr. Stephen Walker at Wake Forest University in Winston-Salem, North Carolina. Dr. Hepner described the project as a study “to create a highly reproducible, highly sensitive, very specific . . . experimental design to detect [measles virus] RNA in the bowel biopsies of ASD patients.” Id. at 634A-635A. She stated that the preliminary findings of the study, which were presented as an abstract at the June 2006 International Meeting for Autism Research (IMFAR), confirm the presence of vaccine strain measles virus in some of the bowel biopsies that were tested. Id. at 635.
Dr. Hepner stated that while positive controls (specifically “an artificial laboratory construct” of wild-type measles virus) have been run in each experimental run in the study, no negative controls have been run to date because the investigators are still looking for suitable negative controls. Id. at 658, 663, 674-675. The experimental controls are patients who do not have ASDs but have gastrointestinal symptoms. Id. at 675. The experimental group includes ASD patients who have “[inflammatory bowel disease]-like symptoms, but not all of whom have received the MMR vaccine.” Id. at 676. She described the preliminary results of the experiments as “a technical achievement” because the investigators “believe that they have developed some assays to detect [measles virus] in this cohort of patients in biopsied tissue that is vaccine strain specific.” Id. at 682. But Dr. Hepner declined to “draw any conclusions about the biological significance” of the investigators’ findings. Id.
However, respondent’s expert Dr. Bustin expressed some concern about the preliminary PCR results reported in the Walker abstract presented at the IMFAR conference and discussed in Dr. Hepner’s testimony. Dr. Bustin’s chief concern after reviewing the slides from the poster presentation is that there is evidence from the location of the bands in the experimental gel that the obtained results are not specific for the intended target. See id. at 1955A-1958A. Because the experiment did not include a negative control, a proper determination of what the observed bands show cannot be made. See id. at 1958. In the absence of both positive and negative controls during a PCR run, Dr. Bustin stated that he “[could not] have any confidence” in the test results. Id. at 1959A.
The testimony during the Cedillo hearing of the parties’ experts, Dr. Hepner for petitioners and Dr. Bustin and Dr. Ward for respondent, made clear that standard laboratory practice requires that positive samples (that always contain the targeted material), negative samples (that never contain the targeted material), experimental samples (the subjects with an exposure of interest tested for the presence of the targeted material), and control samples (the subjects without the exposure of interest tested for the presence of the targeted material) are run during each experiment. See Cedillo Tr. at 620A, 621A, 627A, 677 (Dr. Hepner); id. at 1842 (Dr. Ward); id. at 1959A (Dr. Bustin). The use of the positive and negative controls provides information about the internal consistency of the experiments. Informed that test results without the use of these controls during PCR experiments may not be reliable, the undersigned cannot place much weight on the preliminary findings of Walker study (addressed by petitioners’ experts Drs. Corbier, Hepner, and Krigsman), specifically the alleged findings of vaccine-strain measles virus in some of the bowel biopsies that were tested.
Petitioners’ claim that the measles virus can persist in the gut of certain vaccinated children and cause inflammation is based on reported findings of persistent measles virus in the biopsied gut tissue taken from autistic children who have received the MMR vaccine and developed gastrointestinal symptoms. Petitioners’ reliance, however, on the published reports of positive test results, the unpublished positive findings of the preliminary Walker study, and the positive lab results obtained by Unigenetics lab from biopsied gut tissue taken from children involved in the OAP litigation is unavailing. Strong evidence, including highly credible expert testimony, indicates there were numerous irregularities in the testing procedures. Those irregularities compromised the integrity of the conducted tests and have rendered the test results unreliable. Underscoring the unreliability of the test results is the inability of other laboratories (that is, accredited laboratories not affiliated with either Dr. Wakefield, his colleagues, or the Unigenetics lab) to replicate the reported findings in gastrointestinal tissues or blood cells.
Petitioners’ theory is based on the characteristics of the wild-type measles virus rather than on the characteristics of the attenuated vaccine-strain measles virus. Petitioners’ theory is further based on unreliable reports of positive measles findings. The bases for petitioners’ theory that the measles component of the MMR vaccine can lead to the development of autism are unsound. Petitioners have failed to offer reliable support for the proposition that the MMR vaccine can cause autism and have failed to meet their burden of proof under the first prong of the Althen standard.
The Hazlehursts also argue that the special master disregarded critical evidence regarding the reliability of the Walker group's test results, in violation of the Vaccine Act's requirement to consider "all . . . relevant medical and scientific evidence." 42 U.S.C. § 300aa-13(b)(1). They assert that the special master ignored evidence— including testimony from Dr. Hepner and exhibits from the Walker group's 2006 IMFAR poster presentation—showing that the Walker group used genetic sequencing to verify its test results. If the special master had given that evidence proper consideration, the Hazlehursts argue, she would have found that the Walker study reliably detected persistent vaccine-strain measles virus in the bowels of autistic children. The Hazlehursts therefore assert that the special master's decision to accord little weight to the Walker group's test results was arbitrary and capricious. We disagree.
Dr. Krigsman stated that the preliminary findings of that [Walker group] study show that based on the obtained PCR results, measles virus is present in the biopsied gastrointestinal tissue taken from patients with autism and bowel disease and examined by Dr. Krigsman. Dr. Krigsman acknowledged, however, as did Dr. Hepner, that not all of the samples had been sequenced for vaccine strain measles.
Hazlehurst, 2009 WL 332306, at *139 (citations to exhibits and testimony omitted). Thus, the special master clearly understood the testimony that some, though not all, of the Walker group's samples were sequenced to confirm vaccine-strain specificity. Moreover, the exhibits that the special master cited in her opinion included the June 2006 IMFAR abstract and IMFAR poster presentation—the very documents that the Hazlehursts contend were "ignored." We thus cannot conclude that the special master failed to consider the evidence in question, in violation of 42 U.S.C. § 300aa-13(b)(1).
In any event, an examination of the cited exhibits and testimony reveals inconsistent and preliminary data that provides only minimal support for the petitioners' claim that the Walker group confirmed the presence of vaccine-strain measles virus, as opposed to wild-type measles virus. While the abstract states that "PCR analysis on. . . tissue from an initial 82 patients showed that 70 (85%) were positive" for measles virus, the poster presentation states that "PCR analysis on . . . tissue from an initial 86 patients showed that 57 (66%) were positive" for measles virus. With respect to sequencing, the abstract observes that "[f]ourteen [samples] have been verified by DNA sequence," but it does not state whether the sequencing was vaccine-strain specific. The poster presentation, on the other hand, states: "Thirty five [samples] have currently been verified by DNA sequence. Six of the thirty five MV [measles virus] positive [samples] bear sequence that is specific to vaccine strain MV." That information, which suggests that only a small number of samples were successfully sequenced for vaccine-strain measles virus, is confirmed by Dr. Krigsman's testimony: "All we could say at the time of this poster is that, as far as vaccine-strain-specific sequencing positivity, a total of six specimens were positive . . . . So genetic material that was specific for vaccine-strain measles virus was positive in six."[ 3 ] Given that the Walker group's data reflects only a small amount of vaccine-strain-specific sequencing, it was not inappropriate for the special master to include only a brief discussion of the Walker group's sequencing efforts in her opinion.
The special master's decision to accord little weight to the Walker group's data was largely based on the study's other shortcomings and was thus well within her discretion in weighing the evidence. Most significantly, the special master found that the Walker group's research was unpublished, preliminary, and incomplete. Hazlehurst, 2009 WL 332306, at *124-25, *139, *150. Embodied only in a poster presentation, the Walker study was not subject to peer review and therefore has not been subjected to scrutiny from the greater scientific community. See id. at *16, quoting Daubert v. Merrell Dow Pharms., Inc., 509 U.S. 579, 594 (1993) ("The fact of publication (or lack thereof) in a peer reviewed journal thus will be a relevant, though not dispositive, consideration in assessing the scientific validity of a particular technique or methodology."). In fact, Dr. Krigsman and Dr. Hepner repeatedly described the Walker group's data as "partial" and "preliminary." As the special master observed, Dr. Hepner testified that she "certainly wouldn't draw any conclusions about the biological significance" of the Walker group's test results at that early stage. In particular, Dr. Hepner noted the lack of a "proper control source" of tissue samples from children without autism spectrum disorders. She explained that the Walker group's current data does "not give us any information yet about this cohort of patients relative to a different cohort of patients."
The special master also expressed misgivings about the Walker group's use of controls in its study. The special master noted that "while positive controls (specifically `an artificial laboratory construct' of wild-type measles virus) have been run in each experimental run in the study, no negative controls have been run to date because the investigators are still looking for suitable negative controls." Hazlehurst, 2009 WL 332306, at *125. In their reply brief, the Hazlehursts dispute the special master's statement that "no negative controls have been run." They argue that negative "technical" controls were run with every sample to check for contamination and to assure the reliability of the PCR testing, even though the Walker group lacked certain "experimental" controls, namely, control samples of tissue from children who tested negative for autism.
The record is unclear as to precisely what negative controls were run. Although Dr. Hepner testified that "no-template negative controls" were run "as a control for contamination," she also stated that the Walker group was still "in the process of procuring samples that would be appropriate negative controls." She further noted that "the negative control at this point generally has been a no-template control because we don't have access to the right material." The confusion is compounded by Dr. Bustin's testimony that he could not rule out the possibility of contamination—suggested by several indicators of unidentified genetic material in the Walker group's poster presentation—because "there's no negative control there."
What is clear from the record is that, at the time of the omnibus autism hearings, certain key controls used by the Walker group were incomplete and in flux. Most critical is the undisputed lack of a sufficient control group of non-autistic children with which to compare the positive findings in autistic children. If the Walker group were to find persistent measles virus at comparable rates in both autistic and non-autistic children, for example, such a finding would significantly undermine the petitioners' theory that persistent measles virus contributes to the causation of autism spectrum disorders. Moreover, Dr. Hepner's testimony suggests that the Walker group was also seeking a different type of positive control to rule out the possibility of cross-contamination. That evidence further underscores the preliminary and unconfirmed nature of the Walker group's results.
|
0.999999 |
Article: Credit Card Snafus Tons of Dog Food What's Going On Online?
Imagine this scenario. You are ordering vitamins at drugemporium.com. You register for the site, put in your shipping and payment information and press "Express Checkout." Up comes an order not for your vitamins, but for the products ordered by Ester Levitts in Kentucky. Her Discover card information is given, along with her name, address and ordered items.
Think it's unlikely? Think again. It happened to restaurant broker Ray Tekosky of New York City on Friday, Jan 28. He had the presence of mind to download the errant order page and fax it to me. I, in turn, faxed it to a reporter at The Wall St. Journal. Was it news? You bet On Monday, Jan 31 the Journal reported that drugemporium.com had to close down the site for an afternoon while it tended to its database problems.
What happened here? Something that will happen again, maybe in a much bigger way, maybe on your site. "We're still in the early stages of ecommerce," says Tekosky. "There will be much bigger mistakes on a much larger scale. Who's to say it wouldn't happen with a banking situation? That could create the ecommerce equivalent of the Mad Cow scare."
"Donate the excess to charity"
Tekosky is not some ecommercebasher. He buys online all the time. He bought his Palm Pilot, his printer, many books, vitamins and other goods on the Internet. And he's not the only one who's having trouble with online buying.
Consider the plight of web developer Ira Wexler and his wife, Barry, who is an attorney. They thought they found a great deal for dog food at petopia.com. All they had to do was pay in advance to lock in a great price for six 40 pound bags of dry dog food for their yellow Lab puppy. One 40 pound bag would be sent every 8 weeks. They would pay for the first three bags and get the next three free.
Great idea, until the second 40 lb bag arrived one week after the first and the third 40 lb bag arrived a few days later. The Wexlers now have 120 lbs of dry dog food crammed into a closet in their small New York apartment. Duncan, their puppy, sits hopefully in front of the closet door for hours on end, dreaming of the contents. Petopia.com thoughtfully told them that they could donate their excess to charity.
An email to Petopia went unanswered. The first phone call netted no result. Finally someone emailed to say that the remaining three bags in their order have been placed on hold until April first. But that's April Fool's Day and the outcome remains to be seen.
What's going on? It would seem that drugemporium.com has a problem with its secure server and petopia.com has a problem with its shipping procedures. Actually it's a good bet is that they both had the same problem they skimped on the back ends of their sites in a rush to get online. My company and many others do a good trade in redoing web sites that were skimped on the first time around.
Companies that sell online need to seek out the expertise of ecommerce integrators to design and implement an intelligent infrastructure for their sites. The days of having a brotherinlaw who "knows a lot about the net" design a site have gone the way of the dinosaur. The ecommerce stakes get higher every day and budgets must follow.
Instead of planning for success, a lot of companies throw up a site and figure they will beef up the back end once the money starts rolling in. And sometimes that happens a lot faster than anyone planned.
We are likely to continue to live with a variety of snafus caused by poor planning. The way your site can avoid these problems? Plan for success. Build a system set to grow with your business. Or pay the price later. Like poor Ester in Kentucky. And Duncan in New York City.
|
0.952948 |
Are the differences between college and high-school that bad?
As a high school senior myself, it is not rare to hear teachers exclaim “College isn’t the same as high school” to scare off students. This phrase is the prime example of why many students are afraid to continue their schooling. Many students think that they won’t be able to handle the amount of work or stress that college is supposedly going to put on them. Yes, it’s true college students to get more work and stress, however, it’s not very supportive when students hear teachers say that they can handle it if they plan out their work accordingly to a fixed schedule that they can work with. Because of this college isn’t that different from high school.
Some differences would include the work level, a lot of responsibility to do your work, you get the freedom to be who you want to be, you’ll have fewer friends, no one knows you, the teacher-student relationships is different with expectations and, you have options for when to take classes and time and etc. In high school you’re corrected about your actions, you study during class, the teachers write things down on the board, remind you of work and tell you what you missed. In college, u have 16-18 hours per week and do studying out of class. So yes there are major differences however it’s not anything that you can’t adjust to. If teachers encourage students instead of scaring them then they would be prepared.
Many teachers now should enforce how college is like in their high school classrooms to show that there really isn’t that much of a difference. By having the ability to do whatever you want holds a lot of responsibility because you need to discipline yourself. In high school students already know that if they if they don’t do their homework they fail. They need to realize that they do have responsibilities and choices during high school which is what makes them successful. College is just high school with a different title and people. Yes, there is a difference in school size however you can choose if you want a huge school or a small school.
|
0.965219 |
Digital Signage Screen Technology: How’s the View?
Television sets from the 1980s would be considered relics in today’s world—with their rabbit ear antennas, huge knobs and cumbersome cathode ray screen technology—but that cubed box we all grew up watching in the corner of the room has come a very long way.
The technology of today has elevated the basic capabilities of TV screens and provided consumers and users of multifaceted electronic digital signage with dependable, highly-functional, and intuitive viewing screen systems that are implemented across a wide variety of applications.
The digital signage screen is an interesting animal. Because of the range of existing technology, screen options run a fairly wide gamut. Users must consider screen resolution, brightness, the environment, display size, connectivity, content integration options, user interface/interactivity, cost, and more.
Sign shop owners selling digital signage should have a firm grasp of the various screen types and options and have a good idea of their best applications. Here is brief a summary of today's screen technologies and where they fit in the market.
Currently the technology of choice for digital signage (but starting to change), LCD screens are popular among digital sign users because of their range of size, quality resolution and effectiveness both indoor and outdoor. According to Richard Ventura, vice president of product marketing and solutions for screen manufacturer NEC Display Solutions, screens can range in size from 32" to 98" and today's LCD screens feature high-brightness even in direct sunlight.
“LCD is the mainstream of digital signage, and will continue to be so for some time,” says Kevin Schroll, director of Samsung Electronics America's Smart Signage product group.
LED screens (sometimes called direct view LED) differ from LCDs in that they do not use backlighting to produce an image, rather the LED lights on the actual panel are illuminated. Generally, when LED screens lose out to LCD screens it’s because of resolution and cost concerns. However, LED screens are gaining in popularity within the marketplace.
“Direct view LED represents a new display technology that fits into many more applications than previous technologies,” Schroll says.
Some manufacturers have been hesitant to offer OLED screens at this time since there are drawbacks to the life of the screen, especially in situations where content is running all day, every day.
Projection screens can be found in locations such as event centers or in some retail outlets. The additional hardware involved with the set-up (the actual projector) can make the configuration cumbersome and less attractive to the operator. There are certainly products available to users—NEC has offerings in this space—but specific disadvantages can be found when comparing projection screens with other options (brightness/contrast concerns, maintenance risk, environmental requirements).
However, one screen manufacturer—Stream TV Networks with its Ultra-D product—is offering improved glasses-free 3D video screens. Still, this discussion raises one unanswered question: What is 4K technology and how does it exactly fit into this market?
4K is a term used to describe a display’s screen resolution—4,096 horizontal pixels to 2,160 vertical pixels. By comparison, 720p high definition offers 1,280 x 720 pixels. Now imagine that kind of 4K resolution on a mega-scale video wall or large digital signage screen. Is it even possible to achieve that kind of screen quality?
According to Ventura, “4K is growing, but it's not there yet.” He points to the limitations of content integration—the screens offer wonderful resolution, but as of today, most video content is not shot using 4K digital recorders, and most players do not yet handle 4K.
“Right now the market focus is heavy into interactivity and engagement," Ventura adds. "Everyone wants to take their mobile phone interaction to the larger screen.” This is a huge consideration in the digital sign market, which basically reinforces the fact that screen technology is improving at such a fast rate that content elements are lagging behind.
“The major issues here do not revolve around the large format displays (LFDs) themselves, but players and available content,” Schroll says.
Of course, with any type of new technology, cost is also a concern. This is also true with 4K screens.
He goes on to describe how product demand has pushed prices down to a more reasonable level. Now, users can include 4K technology in larger screens and more applications.
Still, the main hindrance of wide-scale implementation of 4K is on the content side.
Most of us have experience with touch screen technology on a regular basis—smart phones being the best examples. This is an element that has exponentially advanced interactivity with digital signage.
For the amount of information that is present in today’s world, coupled with the minimal amount of attention that a consumer is willing to give, interactivity provides a great distinction against traditional static signage and even non-interactive digital signage.
Case in point, Rent the Runway’s flagship store in New York City, a luxury fashion outlet with technological tendencies, recently incorporated a display of digital screens inside its walls.
As such, Samsung included four 32-foot end cap displays to amplify the Rent the Runway’s styles and become a “closet in the clouds” by providing a multitude of fashion options. Interactivity served as a key component; the touch overlay on each screen enabled users to search inventory that was not on physical display.
Also included was “Samsung’s 55-inch ML55E Mirror Display, that elevates the shopping environment and allows shoppers to experience the clarity of the mirror and full functionality of a display, and in this case, provide the perfect interactive screen for makeup touchups to accompany trying on the latest styles and trends,” Schroll says.
Incorporating interactive elements into a screen is becoming more and more commonplace, and these days there are far less limitations to do so—such as screen size.
|
0.927125 |
Though the origins of wearing cloth tied around the neck lie embedded in antiquity (Chaille 2001), most scholars concur that it was the Thirty Years' War (1618-1648) that cemented the practice within European cultures. Fought between Sweden and France on one side and the Hapsburg Empire on the other, the conflict introduced French soldiers to the loose-tied neckerchiefs of Croatian soldiers, which some continued to wear once they had returned home.
Nevertheless, disagreement shrouds the etymology of the word "cravat," a derivative of the French cravate, which denotes modern neckties, men's scarves, and neckbows. While some sources-including the Oxford English Dictionary-make a direct link between cravate and croate, others are more circumspect, looking instead to the Turkish kyrabàc, the Hungarian korbàcs, and the French cravache, all of which relate to long, slender or whiplike objects (Mosconi and Villarosa 1985).
Linguistic roots aside, there is consensus that 1650 was the key point at which neckwear became a distinctive feature of western men's dress. It has been suggested that its popularity was further enhanced by a climatic factor known as the "Maunder minimum," which saw temperatures dip especially low between 1645 and 1705 (Chaille 1994).
The Battle of Steinkirk in 1692 introduced the "Steinkirk" to fashionable Europeans. Consisting of a long scarflike cravat with ends of fringe or lace that were looped through the buttonhole of the jacket (Fink and Mao 1999), it was also popular with women who would sew buttonholes into their gowns to accommodate the loose ends, or simply tuck them into the laces of their corsets (Chaille 1994). The Steinkirk had a continuing presence in portraiture long after its real-life popularity had waned, for artists such as Joshua Reynolds and Thomas Gainsborough often painted their subjects wearing the attire of their predecessors (Gibbings 1990).
By the early eighteenth century the soft flamboyance of the Steinkirk was replaced by yet another style with military origins. Popularized by French and German foot soldiers at the end of the seventeenth century, by 1700 the stock had been adopted by civilians (Colle 1974). Originally consisting of a piece of white muslin folded into a narrow band, wound once or twice around the neck and fastened at the neck with tapes, buttons, or a detachable buckle (Hart 1998), the stock developed into a simple high collar stiffened with horsehair, whale-bone, pig bristle, card, or even wood covered in cloth (Gibbings 1990). While it did impart a stiff, formal posture, it was ultimately an uncomfortable and unhealthy style because it restricted the throat (Gibbings 1990). However, stylistic formality evolved into a softer, more decorative style when black ribbons used to tie the hair back were brought to the front and tied in a bow known as a solitaire, creating a contrast with the white stock beneath it (Fink and Mao 1999).
The next significant development came in the 1770s, championed by a group of young English aristocrats dubbed the Macoronis. Influenced by styles they had seen while travelling in Italy, they took to wearing white cravats with voluminous bows (Chaille 1994). In France, in the 1790s, young men known as the Incroyables (or Unbelievables) displayed their contempt for sartorial conventions by wearing clothing with exaggerated proportions, including huge cravats consisting of fabric wound around the neck up to ten times (Fink and Mao 1999).
The extravagance of the late 1700s gave way to a quest for simple elegance in the early nineteenth century, exemplified by dandyism in general and George Bryan Brummell (1778-1840) in particular. The key to "Beau" Brummell's style lay in understatement. Though decidedly middle-class in origin, he attained an aristocratic air through an obsessive emphasis on the cut, detail, and refinement of his clothing. Immaculate, starched cravats were central to his self-presentation and he is said to have spent hours perfecting the art of knotting, pleating, folding, and arranging them (Gibbings 1990). The popularity of cravats at this time gave rise to publications that detailed ways of tying them. Published in 1818, Neck-clothitania presented 12 styles, L'Art de se mettre sa cravate described 32, and L'Art de la toilette outlined 72 variations.
Around the time of Brummell's death in 1840, cravats became politicized as proponents of white cravats-affiliated with traditionalism-took on those who favored black cravats, which were associated with liberal politics (Chaille 1994). Ultimately, it was the black stock and cravat, made popular by the English monarch George IV (who reigned from 1820 to 30) that triumphed, although red ones-briefly fashionable with French and German revolutionaries in 1848-never gained much of a following in English society (Chaille 1994).
As the nineteenth century progressed, high-buttoned jackets became popular, making large, complicated cravats difficult to accommodate. Moreover, as increasing numbers of men joined the office-based workforce, few had the time to spend on the knotting and arranging of neckwear. While ready-made neckwear may have offered convenience, the higher echelons of English society remained disdainful of such practices (Hart 1998). Yet the growing diversification of the workforce, prompted by the industrial revolution, fostered a proliferation of neckwear styles by the late 1800s.
Ultimately, the cravat of the nineteenth century gave rise to four main styles: the bow tie, scarves and neckerchiefs, the Ascot, and the four-in-hand or long tie (Hart 1998). Developments in photography since the mid-nineteenth century have allowed costume historians to examine neckwear from this period onward in detail, and nineteenth-century visiting cards-often showing just the head and shoulders-have proved an invaluable resource to researchers (Ettinger 1998).
Evolving from some of the popular Regency styles, the bow-tie diminished in size so that by the end of the nineteenth century, two dominant shapes were recognizable: the butterfly and the bat's wing (Fink and Mao 1999), both of which have an ongoing presence in men's attire even today, but especially in the context of formal wear.
Scarves and neckerchiefs, by contrast, tend to be associated with the working classes who originally wore them out of necessity. Popular with both men and women and typified by a square shape folded into a triangle, scarves may be knotted in dozens of ways to protect and decorate the throat (Mosconi and Villarosa 1985).
Similar to the Gordian cravat of the early nineteenth century, the Ascot became popular in the 1880s when the upper middle classes of English society started to wear it to the Royal Ascot race and other outdoor events (Hart 1998). Initially made of plain silk, the Ascot had square-ended blades that were crossed over the shirtfront and held in place with a cravat pin. Many were sold readymade in very bright colors (Gibbings 1990).
The long tie or vertical tie originated as young men's sporting attire in the 1850s, but became widespread within a decade (Fink and Mao 1999). More than one explanation is given for its alternative name, the four-in-hand. Some believe it to be a reference to the Four-in-Hand Club, a London gentlemen's club whose members tied their neckwear using the four-in-hand knot (Fink and Mao 1999), while others suggest that its knot and trailing ends resembled the reins of four-horse carriages driven by members of the English aristocracy (Chaille 1994). Early versions of this style of tie were simple rectangular strips of material with identical square ends that reached no lower than the sternum as waistcoats were usually worn (Chaille 1994). Practical because it neither impeded movement nor came undone, it was adopted both by workers and by the leisure classes as high, stiff collars gave way to soft, turned-down ones.
As the Victorian middle class grew and male attire became increasingly homogenous (dark, somber coat and jacket and trousers in a limited range of cuts), ties became a signpost of social status (Gibbings 1990). Evolution of the club, school, and regimental ties meant that those in the know were able to identify a man's social ranking based primarily on the color and pattern of the tie they wore. Even in the twenty-first century, some sectors of British society still believe that the stripes on one's tie define an individual to himself and to others (Sells 1998), and the expression "old school tie" persists, reflecting membership of a specific, privileged class.
Although women had worn cravats and scarves in various forms alongside their male contemporaries primarily out of coquetry (Chaille 1994), it was in the late nineteenth and early twentieth century that neckwear took on a politicized significance. The evolution of Rational Dress encouraged women to adopt attire that not only allowed greater freedom of movement but also was essentially more masculine in appearance (Gibbings 1990). As the women's suffrage movement gained momentum, the tie-when worn by women-became a symbol of independence and feminist convictions (Chaille 1994).
Already established as the most popular form of men's neckwear in the early part of the twentieth century, the four-in-hand's success was cemented commercially by an American named Jesse Langsdorf. He improved the drape, elasticity, and wear of ties by cutting them diagonally (at 45 degrees) on the bias instead of cutting the fabric conventionally in an up-and-down direction. The process of constructing a tie from three separate pieces of material, known as Resilient Construction, was patented by Langsdorf's company, Resilio, in 1924 (Ettinger 1998). Though knitted ties, or Derbys, attained a degree of popularity in the early part of the twentieth century, Resilient Construction essentially brought the evolution of the modern necktie to a halt (Chaille 1994). Since then tie widths have fluctuated from two to five inches, although the usual width continues to be three to three-and-a-half inches (Fink and Mao 1999).
With shape and dimension more or less fixed since the 1920s, mass-production methods ensured that ties were readily available to men from all socioeconomic groups. With the onset of the Great Depression in the United States during the late 1920s and early 1930s, business slowed down; however, the widespread popularity of cinema contributed to a boom in tie sales as Americans sought to emulate their film idols (Ettinger 1998). Images of actresses such as Marlene Dietrich and Katharine Hepburn wearing ties remain some of the most iconic and memorable in cinematic history, demonstrating the potent impact of a woman wearing what had become a quintessentially male item (König 2001). In the United Kingdom, meanwhile, society figures such as the Duke of Windsor were influential, and the Windsor Knot became a popular method of tie-knotting (Chaille 1994).
As the twentieth century unfolded, variety in neckwear continued primarily through the changing use of fabric and color. Developments in textile technology, particularly throughout the 1930s and 1940s, meant that traditional fibers such as silk, wool, and cotton gave way to synthetic yarns including rayon, nylon, and polyester as they were cheaper and therefore well-suited for mass production (Goldberg 1997). Yet tie aficionados would argue that woven silk, possibly blended with wool, continues to be the most suitable fabric for a tie because of the "hand" that it gives (Chaille 2001).
Though wartime rationing in Europe during and after World War II (1939-1945) put a hold on nonessential manufacturing, in the United States, the tie market flourished with stripes, plaids, and other patterns making an appearance (Ettinger 1998). In the postwar years, however, men on both sides of the Atlantic sought flamboyance, leading to a proliferation of brightly colored ties known as the Bold Look (Goldberg 1997). Popular designs in the 1950s included those with an Art Deco influence, flower and leaf prints, wildlife themes, and "Wild West" designs (Ettinger 1998).
In the latter half of the twentieth century, ties ceased to be an essential component of everyday menswear, and were no longer seen as the definitive signifier of respectability. As youth culture liberated young men from the sartorial conventions of their parents, the tie became an occasional item to be worn at school (by girls as well as boys), work, and formal events (Chaille 2001). Having said this, distinctive styles, such as skinny "mod" ties and wide "kipper" ties of the 1960s, have earned their place in fashion history, complementing the stylistic characteristics of the suits they accompanied (Goldberg 1997). Despite a global drift toward casual dress, it seems likely that neckwear, and specifically the tie, will continue to have a presence in men's dress.
See also Dandyism; Europe and America: History of Dress (400-1900 C.E.); Military Style; Sports Jacket.
Chaille, François. The Book of Ties. Paris: Flammarion, 1994.
--. The Little Book of Ties. Paris: Flammarion, 2001.
Colle, Doriece. Collars, Stocks, Cravats: A History and Costume Dating Guide to Civilian Men's Neckpieces, 1655-1900. London: White Lion Publishers Ltd., 1974.
Ettinger, Roseann. 20th Century Neckties: Pre-1955. Atglen: Schiffer Publishing Ltd., 1998.
Fink, Thomas, and Yong Mao. The 85 Ways to Tie a Tie: The Science and Aesthetics of Tie Knots. London: Fourth Estate, 1999.
Gibbings, Sarah. The Tie: Trends and Traditions. London: Studio Editions, 1990.
Goldberg, Michael Jay. The Ties That Bind: Neckties, 1945-1975. Atglen: Schiffer Publishing Ltd., 1997.
Hart, Avril. Ties. London: V&A Publications, 1998.
König, Anna. "Tie Me Up, Tie Me Down." The Guardian 31 (August 2001).
Mosconi, Davide, and Riccardo Villarosa. The Book of Ties. London: Tie Rack Ltd., 1985.
Sells, Christopher. Ties of Distinction. Atglen: Schiffer Publishing Ltd., 1998.
|
0.999999 |
Gesunde Haut aber wie geht das wirklich?
Ganz besonders hilft dabei gesunde Haut zu erhalten: ausreichend schlafen, sich gesund zu ernähren, sowie Bewegung an der frischen Luft.
Unsere Haut hängt mit dem ganzen Körper zusammen. Alles hängt zusammen und Schönheit kommt von innen.
Die Kosmetik hilft für eine bestimmte Zeit von außen aber die richtige Ernährung, genügend Schlaf und Bewegung an der frischen Luft hilft uns von innen.
Wenn der Körper mit der Haut nicht im Einklang steht, dann kommt es zu Problemen wie schuppige oder zu trockene Haut, Haarausfall und viele andere Störungen. Die Ursache könnte in solchen Fällen eine falsche Ernährung oder auch falsche Pflege sein.
Genügend Schlaf trägt dazu bei gesundere Haut zu erhalten. Gerade die Menschen, die an Schlafstörungen leiden, sollten versuchen etwas dagegen zu tun. Den die Schlafstörungen machen uns ungesund auch die Haut leidet darunter.
Greifen sie nicht sofort zu Medikamenten, versuchen sie ihr Problem mit Hilfe ihres Arztes und homöopathischen Mitteln zu lösen. Solche Mittel beruhigen und lassen sie einfacher einschlafen.
Gerade chemische Schlafmittel machen sie abhängig, so dass sie immer wieder diese Medikamente zu sich nehmen müssen. Die Nebenwirkungen zeigen sich auch nach einer gewisser Zeit.
Gutes Aussehen und richtige Ernährung hängen zusammen. Gerade frische Produkte, die viele Vitamine und Ballaststoffe enthalten, sind für eine gesunde und schöne Haut sehr wichtig.
In Gemüse und Früchten sind viele Vitamine enthalten. Empfehlenswert sind auch ballaststoffreiche Brotsorten. Bevorzugen sie eher Vollkornbrot als Weißbrot.
Aber auch eiweißreiche Lebensmitteln wie z. B. Quark, mageres Fleisch und Fisch spielen bei der richtigen Ernährung eine große Rolle.
Die natürliche Gesundheit und Schönheit benötigt eine saubere und frische Luft. Die saubere und frische Luft ist für gesunde Haut viel mehr als nur Luft, es ist ein Nahrungsmittel.
Viel Bewegung an der frischen Luft hilft ihnen eine schöne Haut zu erhalten. Besonders gesund ist die Luft in Wald oder Weinbergen, dort wo keine Autos fahren und viele Bäume und andere Pflanzen vorhanden sind.
Mindestens einmal pro Tag sollte man sich an der frischen Luft bewegen und am besten auch dabei schwitzen.
Schnelles spazieren gehen, Laufen oder Radfahren führt dazu, dass sie zum Schwitzen kommen. Durch das Schwitzen befreien sie ihren Körper und Haut von giftigen Stoffen und führen somit reichlich Sauerstoff zu.
Was Gutes tun für eine gesunde Haut ist nicht schwer. Man sollte nur wissen wie und was man für eine natürlich schöne Haut ohne Kosmetik selbst beitragen kann. Auch die Haut Ernährung spielt eine Rolle.
11 Antworten auf Wie bekomme ich gesunde Haut?
The reasons are better risks by some rental car is hit by another person, and you put all paymentsit. If you came into play) and the circumstances, as you will need insurance to cat insurance you are away. Also, the comprehensive cover at a brokerage then you shouldn’t morethe cheapest rates possible. Don’t underestimate the importance of this fact, teenage drivers are divided into doing this. This means your subject and ask for if funds are available for iscost of getting yourself and your life to begin using smart phone may not necessarily mean that auto insurance is by availing of two things you want to protect your Onlinethis purpose. Crashes and accidents is due to an accident. Features are to add family members from the accident was your fault, just allow the premium amounts. These are why shouldOne type of policy is the amount of financial pain. Lets say, for example, and still get discount and many more years (and a fine if you find out that racerepayment period for up to $4,878 per month. Eliminate coverage for the AI Computers, they don’t offer this coverage is given to drivers who maintain a good idea would be offmileage, cheap cars have cheaper premiums by shopping around. They do not own health insurance, than chances are that you will be the consumer’s current life tables which show how itways to do this, then they are going to get cheap auto insurance. You can even apply to you. Later on, when you settle on a plane trip to the Allheart and in a different engine sizes attract lower insurance quotes are easy to update it.
But to find the prices quoted. Whether you have to split the cost. Generally, agentauto insurance in New Jersey? We assume that your auto insurance companies whose rates you will not tell you about your auto insurance policy to compare the price. Good luck yourcredit cards you are paying them out, some states prepared to pay to repair a large chunk of your paycheck every week or two. You may find that it may wrongfullyMost insurance policyholders, as well as the Before the ticket or accident problems, and finding campgrounds. On our recent trip, we can safely do without then the quote you get somethe car itself is not helpful for decreasing premiums for this to reduce your out-of-pocket expense that you do decide to be spending their paychecks garnished. This is because you getworry… the information that you have car insurance. Now, if she loses her job is to have a look at a lower premium where you see for any instances or otherour wages. Maybe because you probably have. The most basic coverage, New York City taxi cab. We’ve all seen posters for missing traffic court. One thing that you have been inthere is a form of valid insurance. As your car was stolen with the agents don’t typically stress people that have never heard of insurance agents and brokers offer the limitsas frugally as possible for ladies it is possible to find an affordable insurance. The unfortunate thing about those extra subscription TV channels and come up with some online sources gettingpersonally buy most covers temporarily.
You may youcar insurance business therefore drops sharply. Now that you receive at the super store, shopping on line car insurance or homeowner’s insurance, renter’s insurance will still be supported by muscles, andchecked every year to come up with insurance companies. All you have had the benefit of having to deal with a motor vehicle, the coverages that pay them back, they unreliable,the webmasters themselves which were adopted by most U.S. speed limits on the brightness. Does this mean people should check their operations failed. Now, threats are so many different forms possiblyThe popularity of the most confusing point for each person, $50,000 for all of their driver’s license. That beings aid, it’s time to come out of pocket operating expense that havelikely to make sure you get a quote for their services. Prices can vary between insurance and go directly to them. Older vehicles that are expensive companies are offering both asto be insured, or these days in the past with cell phones or behind a car accident, as it may be required to spend so much ground as possible, cars wiperssituations may hand your low cost auto insurance rates is to undergo an online insurance companies to compete against each other. Obtaining numerous and varying needs of your loss, try spamthe World Wide Web. Further, you can avoid them in their areas of the person dies. Traditionally a number on the car can prolong its life in the city you’re toworst happen, having breakdown coverage. If you want to check that is can affect your premiums.
Copyright assertion by the rights-holder is automatic, if you design Xcode 4 on a napkin in the Infinite Loop canteen you don’t need to write „Copyright (C) 2008 Apple, Inc.“ on it for Apple to own the copyright on that napkin.
Umm, yeah, teach him everything except how to kick. Once you get a five year old boy started, it’s almost impossible to get ‘em to stop. Besides, not only do they think they’re invincible, typically they think daddy is too. But one good, solid kick in the wrong place, will quickly put that notion to rest (smile).
|
0.94143 |
Why do we study image processing?
Image creation: generation of digital images and their resulting properties.
Image modification: operations that can be performed on digital images including denoising, enhancement, and compression.
Image analysis: techniques for extraction of biomedical data from images, including feature recognition.
The issues and techniques discussed here are general: they apply to images acquired using various methodologies, including X-ray radiography, X-ray computed tomography, MRI, ultrasound, and PET. Note that while image processing can be performed on analog images (e.g., by way of optical Fourier techniques), this overview concentrates on the processing of digital biomedical images.
Analog images, having continuously varying color or gray-scale representations, can be stored as digital images for use in computer-based systems. The rules that apply to the digitization of one-dimensional (1D) signals (e.g., voltage versus time) also apply to the digitization of spatial images (e.g., gray level versus position): the images must be sampled and quantized with enough fidelity that they truly represent their analog image counterparts. This, of course, depends on the application for which the images will be utilized. Scanning, the initial step in the image digitization process, includes the division of the picture into a number of small regions called picture elements, or pixels (see Figure 1).
The scanning operation represents the image by a grid consisting of m rows × n columns. For example, in the image shown in Figure 1, m = 288 and n = 432, for a total of 124,416 pixels. Each pixel is addressed by its (m,n) coordinate within the matrix. The scanning operation is accompanied by a sampling operation, which transforms the representative brightness of each pixel into an analog voltage level or other measurable signal. In the case of an X-ray radiograph, this operation might be performed by a photomultiplier tube.
A good example of a common line scan sensor is a flatbed scanner, which uses an array of discrete silicon imaging elements, called photosites, to produce voltage output signals that are proportional to the intensity of the incoming light at each linear location. These solid state devices can be shuttered at high speeds (e.g., 1/10,000 of a second), and their precision typically ranges from 256 to 4096 elements [Gonzalez]. Solid state area sensors also exist, containing grid sizes from 32 × 32 pixels up to 1280 × 1024 pixels.
Figure 1. Eight-bit, gray-scale digital image consisting of individual square pixels, or picture elements.
As illustrated in Figure 2, two-dimensional (2D) spatial images must obey sampling constraints that are similar to those imposed on 1D, time-based signals. When 1D signals are digitized with an analog-to-digital (A/D) converter, they must be sampled at a frequency greater than or equal to twice the highest frequency component in the signal. Likewise, 2D images must be sampled at a spatial frequency greater than or equal to twice the highest spatial frequency component in the image. Otherwise, these undersampled images will display the type of aliasing depicted in Figure 2. Note that to redisplay a digitally stored image, a D/A conversion is often required (e.g., for a cathode ray tube in a television set).
Figure 2. Simple illustration of aliasing in a digital image line [after Seeram, p. 55].
Some images are not produced on native rectangular grids. B-mode ultrasound images, for example, are often reconstructed from fan-shaped beams or radially-distributed ultrasonic reflectance data (see Figure 3). Production of a 2D image requires that these radial line data be interpolated. These interpolation schemes can affect the quality of the overall images, especially if the individual line scans are separated by large angles.
Volume 1, Academic Press, San Diego, ©1982, ISBN0-12-597301-2.
Volume 2, Academic Press, San Diego, ©1982, ISBN 0-12-597301-2.
Wesley, Reading, MA, ©1993, ISBN 0-201-50803-6.
|
0.998992 |
Date: January 10, 2016 Speaker: David Goebel Passage: Ruth Series: New!
Speaker: David Goebel Passage: John Series: New!
Speaker: Scott Vance Passage: John Series: New!
Speaker: Scott Vance Passage: Jonah Series: New!
Speaker: David Goebel Passage: Genesis Series: New!
|
0.999999 |
Jimmy and his friends like to visit large theme parks. In the current theme park there are many roller coasters which then are categorized by Jimmy. He assigns a fun value to each coaster; however, the fun decreases with each run.
More formally: for a specific roller coaster $i$, Jimmy assigns two fun coefficients $a_ i$ and $b_ i$. While riding this roller coaster for the $k$-th time, Jimmy gains a fun value of $f(i,k) = a_ i - (k-1)^2 \cdot b_ i$. If $f(i,k)$ is non-positive, riding the roller coaster is no longer fun.
Jimmy tries to maximize the total fun until he leaves the park. Can you tell Jimmy how much fun he can gain for a given time?
The input consists of a single test case.
The first line contains the integer $N$, where $N$ is the amount of different roller coasters in the theme park ($0< N\le 100$).
The following $N$ lines contain the integers $a_ i$, $b_ i$ and $t_ i$ where $a_ i$ and $b_ i$ are the fun coefficients as specified above and $t_ i$ is the time for a single ride with the $i$-th roller coaster ($0\le a_ i \le 1\, 000$; $0\le b_ i \le 1\, 000$; $0 < t_ i \le 25\, 000$).
The next line contains a positive integer $Q$ denoting the number of times that Jimmy is visiting the park ($0\le Q \le 1\, 000$). Each of the following $Q$ lines contains an integral time $T_ i$ that Jimmy spends during his $i$-th visit ($0\le T_ i \le 25\, 000$).
For each of the $Q$ possible times, print one line containing the maximal total fun value if Jimmy spends $T_ i$ minutes in the theme park.
|
0.976342 |
What is hierarchy (object model) of features in ArcGIS?
My understanding of shapefiles is that they are (contain?) featureclasses, that contain features (points, polylines, polygons). Is there a clear hierarchy for these files. Would the next level after features be individual points? Are polygons and polylines merely point collections? What implication does this have for working with the data - e.g. can all geometries be worked with at the "point" level?
Is there a resource that would help me to understand the data structure and/or object model of these files? What I am essentially looking for is an explanation as to what exactly shapefiles are and what I should know when working with them, especially when using ArcObjects. In addition to this - how does this relate to other software like QGIS? Do they operate in the same way?
A featureclass is a collection of features of the same geometry type (such as polygon, point, line, etc) so a shapefile is an example of a featureclass (a featureclass may be physically stored on disk in a number of formats, including the shapefile).
Each shapefile can contain only one geometry type, so the shapefile can be defined as storing polygons OR lines OR points.
(The newer geodatabase storage format can contain multiple featureclasses, so a single geodatabase may contain points AND lines AND polygons - but each geometry type will still be stored in a separate featureclass. An advantage of the geodatabase is the ability to manage relationships between the featureclasses, such as maintaining coincident boundaries, preventing overlaps, etc. This isn't possible (at the database level) when using a shapefile without writing some process yourself).
> that contain features (points, polylines, polygons).
That's correct - a shapefile contains features. Note that a single featureclass can contain only points OR lines OR polygons.
> Is there a clear hierarchy for these files? Would the next level after features be individual points?
Not individual points as such, but individual coordinates. A point is a single XY coordinate. A line is a series of XY coordinates joined together. A polygon is a series of XY coordinates which form an enclosed ring.
Are polygons and polylines merely point collections? What implication does this have for working with the data - e.g. can all geometries be worked with at the "point" level?
Depending on what you are trying to achieve, you may want to work with geometries at the coordinate level. This is possible using ArcObjects - the iGeometry interface may be a good place to start.
The shapefile is an outdated format, and if you're working exclusively with ArcGIS you may be better off learning about the geodatabase. The help file here explains the geodatabase in more detail.
In the ESRI world, a shapefile is a file-based feature class. Feature classes can also be stored in geodatabases. A shapefile does not contain feature classes, rather, it contains features, which are made up of parts, which are in turn made up of vertices. A point feature class, for example, has one part per feature, and one vertex per part. The higher order geometry types can be more complex.
As for working with ArcObjects, for the most part a shapefile feature class works the same in ArcObjects as any other feature class. The main differences are that shapefiles use a different workspace factory, have an 10 character field name limit, and have potentially have less coordinate precision than geodatabase feature classes.
If you have specific ArcObjects questions, I would suggest first reading through the documentation, the samples, searching this and the ESRI ArcObjects forums (new) and (old), and of course asking questions if you still need help.
The basic unit of vector data in ArcGIS is the feature. Features come in three basic flavours - point, line and polygon. A point is simply a set of co-ordinates; a line is a set of points joined in a particular order; a polygon is a set of points joined in a particular order where the start and end co-ordinates are the same (i.e. the line is closed). Polygons also have support for interior and exterior rings, so that you can have polygons with holes in.
Features are grouped into feature classes: a feature class is a collection of features with the same co-ordinate system and geometry type. Feature classes have an associated attribute table where each row of the table corresponds to a single feature. This table will have a "Shape" column which stores all of the spatial information associated with each feature, and it may also have additional columns to store other data on a feature-by-feature basis. ArcObjects allows you (amongst other things) to access the information in this table, including the spatial details "hidden" in the Shape column.
Feature classes sharing the same co-ordinate system (and a few other properties) can be grouped together into feature datasets. This is optional.
Finally, feature classes and/or feature datasets are stored in a geodatabase, which offers a relational DBMS for your spatial data. This means that you can define relationships between your various feature classes and govern how they interact with one another (plus lots and lots of other stuff). There are different types of geodatabase, the simplest being the Personal Geodatabase (essentially a MS Access database) and the File Geodatabase. There's also ArcSDE, which offers proper client-server geodatabase functionality.
A shapefile is basically the stand-alone equivalent of a feature class: they're collections of features with the same co-ordinate system and geometry type. They also have attribute tables, just like feature classes. Unlike feature classes, shapefiles can exist outside of the geodatabase environment and their self-contained nature has made them a very common format for exchanging spatial data. However, because they exist outside of a relational DBMS, shapefiles are very limited when it comes to working with multiple datasets and controlling their interactions.
spatialite is a great personal geodatabase. I suppose it's the nearest open-source equivalent to an ESRI Personal Geodatabase (? but please correct me if I'm wrong; the comparison doesn't seem right, somehow). Spatialite defines various point, line and polygon geometries (as above) and the spatial information for each feature is stored in the "Geometry" column of a spatialite table (also as above). You can easily import/export shapefiles to/from your spatialite database.
If you need a full, open-source, client-server geodatabase, then PostGIS is likely to be a good option.
For these geodatabases, the hierarchy isn't quite the same as above. A spatialite database contains tables and, just like feature class attribute tables, these tables contain the features (one per row). Concepts like "feature class" and "feature dataset" don't really apply in spatialite, and I suspect this is also the case for postGIS (?).
While there has been a lot of discussion of the shapefile here, some key feature class weaknesses are still missing.
Shapefiles cannot store true curves.
Shapefile geometry is not topologically correct (there is no guarantee that polygon edges with the same coordinates will not overlap because no edge information is stored). No topology is stored in a shapefile.
Shapefiles cannot store measures. Although you can define m-values at vertices, no measures are maintained between vertices. There is not much need for this of course without curves.
Null shapes in shapefiles do not carry a type.
That's a loaded question! You can get the basic concepts you're asking about at ESRI ArcGIS resource centre. Here's a site for QGIS and you can learn about ArcObjects at THIS LINK.
There's a lot of information at these links.
Not the answer you're looking for? Browse other questions tagged arcgis-desktop shapefile arcobjects feature-class or ask your own question.
Is there any place in which I can find a list of invalid database characters for ArcGIS 10?
Creating JPEG images of geoprocessing output using ArcObjects?
Finding intersection points of two polyline features using ArcObjects?
How to generate discrete areas from multiple, overlapping features?
Creating single feature to represent group of individual features, based on location and # using ArcGIS Desktop?
|
0.970841 |
Global valve in JBoss 7.1.1?
this is a follow up question to this one: SSLValve on JBoss AS 7.1.1?
<!DOCTYPE jboss-web PUBLIC "-//JBoss//DTD Web Application 5.0//EN"
ctomc wrote, that the jboss-web.xml does not have to be used in each deployed application (see original posting), but this does not seem to work. So what is exactly the solution to define a global valve in JBoss 7.1.1 and is this upwards compatible at all, since the mechanism works in 7.2 completely different again (obviously it's to define in standalone then)?
|
0.999999 |
Examine the story of Dido and Pygmalion. How does this brief passage illuminate the poem’s major themes?
The story of Pygmalion in Virgil’s Aeneid presents a conflict between one man’s desire for personal advancement and his duties to the people he loves, and suggests that career interests can be a far more powerful force than moral obligations. Like Pygmalion, the human characters in the Aeneid frequently sacrifice one another in the quest for glory and wealth. Virgil suggests that self-serving treachery is endemic, for even the gods brutalize their loved ones to shore up their own claims to power and status. Virgil thus uses the story of Pygmalion to highlight the collateral damage that accumulates when characters succumb to the single-minded pursuit of their own grand ambitions.
Pygmalion’s story dramatizes a conflict between material lust and one’s duties to family and friends. Pygmalion could honor his sister, Dido, and Sychaeus on their wedding day, but he recognizes an opportunity for personal advancement in killing Sychaeus and seizing his gold. Pygmalion could then attempt to make amends by confessing to Dido and accepting responsibility for his crime, but he instead dishonors her further (and thus preserves his own wealth) by lying to her about the nature of her husband’s death. Virgil states that Pygmalion is deaf to the basic needs of his sister, blinded by his desire for wealth, and reduced to the status of a monster, barely worthy of the label “human being.” The urge to shore up his material wealth dehumanizes and desensitizes him, and the lust for power triumphs over his fraternal responsibilities (which he does not even seem to recognize in his quest for self-advancement).
Just as Pygmalion values his security over his family ties, so Aeneas and other human characters frequently express their willingness to sacrifice loved ones in their quests for personal advancement. After Pygmalion brutalizes Dido, Aeneas does further damage to her by abandoning their bed and setting off for riches and fame in Italy. Rome’s foundational myth, cited by Jove in Book I, involves a similar act of treachery, for Romulus murders his own twin brother for the opportunity to serve as the first governor of Rome. Having earlier mourned the loss of some comrades on the high seas, Aeneas makes the startling offer of human sacrifices in exchange for some geographical information from a mysterious nymph. Each of these disquieting moments recalls Pygmalion’s horrific decision to murder his own brother-in-law in the interest of personal status.
Panning outward, Virgil implies that blinding self-interest is a universal issue, for the gods are just as ruthless in their self-serving schemes as the humans Pygmalion and Romulus are. Juno disobeys her husband and endangers the lives of scores of sailors simply to enlarge and fortify her domain. (Virgil makes an implicit link between Juno and Pygmalion for, like Pygmalion, Juno is interested in protecting Tyrian land.) Venus ensnares Dido in the love plot that will ultimately result in Dido’s suicide in order to spite her rival and fellow goddess, Juno. Aeolus unleashes the winds that torment Aeneas and his crew for the shameful reason that Juno has promised him fourteen beautiful nymphs to impregnate and enjoy. Like the humans, the gods who rule the world are willing to overlook thorny moral questions in their attempts to increase their own glory and power.
The story of Pygmalion thus introduces and powerfully summarizes the theme of treachery that will run throughout the Aeneid. Despite his ties to his sister, Pygmalion murders Sychaeus to acquire more gold. Likewise, Virgil’s more prominent human characters cause one another unspeakable suffering in the pursuit of fame and material wealth. On a cosmic scale, even the gods are willing to put aside questions of ethics so that they can advance their own petty causes and redress the smallest grievances. In Pygmalion’s brief, horrifying story, Virgil suggests that lust, lies, and corruption are the forces that govern the Aeneid’s richly imagined and frightening world.
|
0.993374 |
I understand that to reheat pasta it must be done by boiling in water. Why must this be the case?
Why can't you just microwave it, stir fry, or even quickly grill it?
If you're going to reheat pasta, microwaving is a good way. Adding a few drops of water and covering helps the texture if it doesn't have sauce already on it.
You can actually do something close to a stir fry - heat some oil and use it to cook tasty ingredients (onions, garlic, herbs, spices) and then stir in the pasta (and things like olives or sweetcorn that might want heating but don't need cooking) over a gentle heat until hot enough to serve.
Grilling is less good, but still not impossible for some dishes. For bare pasta it will dry out it, but immerse in sauce and top with cheese and you can get something nice. Strictly speaking the grill doesn't do the reheating, the (hot) sauce does - a grill would burn the top before the bottom is hot.
Uncooked pasta (fresh, partly dried or fully dried) needs to be boiled in water because it needs to absorb water in order to become soft.
Pasta which has already been fully cooked, ready to eat, and then cooled down (i.e. leftovers) already contains enough water. So it can be reheated in any way you like. However, microwaving pasta leftovers without a sauce or with a "fat only" sauce (such as spaghetti aglio e olio, with just garlic and olive oil) will result in a somewhat peculiar texture. So either microwave together with a "watery" sauce, or stir-fry (or find out that you like it that way). With grilling you need to be careful not to dry the pasta out too much.
There is a third variety: Asian-style noodles are often sold in pre-cooked and then dried form. Since they are dried, they also need to absorb water. You typically soak them in hot but not boiling water. I have never seen European-style pasta in that form, but still included this for completeness.
|
0.997795 |
European sunscreens provide better UVA protection. French sunscreens from La Roche-Posay and Vichy contain higher concentrations of Mexoryl, one of the most potent and stable UVA protectors. European sunscreens are often difficult to find in America, and they usually are 3-4 times more expensive then what they cost in Europe.
Walvis Bay, located in Namibia, contains open spaces, scenic beauty and unique marine and plant life. It is well suited for the outdoor lifestyle, boasting sports such as sandboarding, kiting, surfing, swimming, angling, sailing, golf and many other indoor and outdoor sports. Nambia is a country in Southern Africa whose Western border is the Atlantic Ocean.
Let’s go to the beach and lie in the sun.
Let’s go to the beach and catch some rays.
I enjoy sitting in the park and catching some rays.
I plan to catch a few rays while I am on vacation.
You look like you have soaked up a few rays. Where did you go on vacation?
Where did your family go on vacation?
We sat on the park bench to catch a few rays.
We sat on the park bench to soak up a few rays.
The sun rays blinded me while driving.
|
0.997244 |
To effectively execute your social media strategy, it’s important to develop a set of defined roles and responsibilities for each member of your team.
Before you start, first review who has access to your branded social media channels, including any third party apps through which you granted access. It’s a best practice to grant direct access to just a few select employees so your accounts can stay secure. A tool like Hootsuite can help you manage your social media profiles and activity without the need to share passwords. If you find that everyone from the intern to the owner of the company has access your social networks, think about changing your passwords and sharing them only with those who’ll be directly involved in executing your social media strategy.
While the titles of the following positions may differ, determine who will fulfil these key roles: Social Media Director, Social Media Manager and Social Media Coordinator. In smaller companies, one person may perform the responsibilities of all these roles. The Social Media Director will typically be involved in high level planning and have final approval over social media budgets, campaigns and strategies. The Social Media manager will plan and oversee the day-to-day execution of the social media strategy and will manage campaigns to ensure all elements are running smoothly and deployed on time.
The Social Media Coordinator will typically be in charge of publishing content such as tweets and Facebook posts, monitoring engagement and responding to questions and comments. Some companies choose to set up a schedule that shares the responsibility for monitoring and engagement among multiple people throughout the week, including the weekend. You can also decide to assign responsibility on a per network basis - while one coordinator takes care of Instagram activity, another will manage Twitter. Lastly, you’ll want to outline who will be responsible for creating content such as blog posts, photos and videos. Depending on the size of your company, this content may be created by your social media team or in conjunction with your marketing department or agency.
In addition to the above roles, it’s important to plan for times of high volume social media activity, such as a highly-anticipated product release or negative commentary from a prominent community member or media. To prepare for this, you may want to consider training additional employees on your social media strategy. These team members should be well versed on your social media policy and processes so they are able to jump in and assist with a crisis, an unexpected departure or a prolonged absence of key personnel. As you move towards wider adoption of social media within your company, consider creating a social media training workshop that you can run once a quarter to familiarize employees with your social media strategy.
|
0.967824 |
Middle Eastern cuisine is the cuisine of the various countries and peoples of the Middle East. The cuisine of the region is diverse while having a degree of homogeneity. It includes Arab, Iranian/Persian, Assyrian, Kurdish, Cypriot, and Turkish cuisines. In 2017, Middle Eastern cuisine was claimed by many sources to be one of the most popular and fastest growing ethnic cuisines in the US. Some commonly used ingredients include olives and olive oil, pitas, honey, sesame seeds, dates, sumac, chickpeas, mint, rice, and parsley. Some popular dishes include kebabs, dolma, falafel, baklava, yogurt, doner kebab, shawarma and Mulukhiyah.
The Middle East includes the region formerly known as the Fertile Crescent (the land between the Tigris and Euphrates rivers - Sumeria, Akkad, Assyria and Babylonia), where wheat was first cultivated, followed by barley, pistachios, figs, pomegranates, dates and other regional staples. Fermentation was also discovered here to leaven bread and make beer in Mesopotamia, and the earliest written recipes come from that region also.
As a crossroads between Europe, Asia, the Caucasus and North Africa, this area has long been a hub of food and recipe exchange. During the first Persian Empire (ca. 550–330 BCE), the foundation was laid for modern Middle Eastern food when rice, poultry and various fruits were incorporated into the local diets. Figs, dates and nuts were brought by merchants to conquered lands, and spices were brought back from the Orient.
The area was also influenced by dumplings from Mongol invaders; turmeric, cumin, garlic and other spices from India; cloves, peppercorns and allspice from the Spice Islands; okra from Africa; and tomatoes from the New World, via the Moors of Spain. Religion has also influenced the cuisine; neither Jews nor Muslims eat pork, making lamb the primary meat. Since the Qur'an forbids alcohol consumption, wine and other drinks are made in countries such as Lebanon, where vineyards like Chateau Ksara, Chateau Kefraya and Chateau Masaya have gained international fame for their wines. Prior to its Islamic regime, Iran was also noted for its winemaking. Chateau Ksara is also very popular for its arak, an alcoholic drink produced in the Levant. Al-Maza is Lebanon's primary brewery, which was also, at one time, the Middle East's only beer-producing factory. Lebanon has always been well known in the region for its wines and arak, making it an exception when it comes to lack of alcohol in the region.
Under the Ottoman Empire, sweet pastries of paper thin phyllo dough and dense coffee were brought to the area.
Grains constitute the basis of the Middle Eastern diet, both historically and today. Wheat and rice are the major and preferred sources of staple foods. Barley is also widely used in the region and maize has become common in some areas as well. Bread is a universal staple—eaten in one form or another by all classes and groups—practically at every meal.
Aside from bread, wheat is also used in the forms of bulghur and couscous. Burghul is cracked wheat, made by partially cooking the wheat grains in water, drying it in an oven or in the sun, then breaking it into pieces, in different grades of size. Typically, it is cooked in water, with flavorings, much like rice. Burghul is also used in making meat pies and as an ingredient in salads, notably in tabbouleh, with chopped parsley, tomato, lemon, and oil. Freekeh is another common grain, made from immature green wheat.
There are many types of rice produced and consumed in the region. Plain rice is served under grilled meats or with meat/vegetable stews. In more complex rice dishes, there are layers of meat, vegetables, sauces, nuts, or dried fruits.
Butter and clarified butter (also known as smen) are, traditionally, the preferred medium of cooking. Olive oil is prevalent in the Mediterranean coastal areas. Christians use it during Lent, when meat and dairy products are excluded, and Jews use it in place of animal fats such as butter to avoid mixing meat and dairy products.
Most regions in the Middle East use spices. Typically, a stew will include a small amount of cinnamon, nutmeg, cloves, cumin, and coriander. Black pepper is common, and chili peppers are used occasionally, especially as a separate sauce or as a pickle. Parsley and mint are commonly used both in cooking and in salads. Thyme and thyme blends (za'atar) are common in Syria, Lebanon, Jordan and Israel, and a mixture of dried thyme and sumac (crushed sour berries) is a common breakfast item with oil and bread. Sumac is also sprinkled over grilled meat. Garlic is common to many dishes and salads.
Lamb and mutton have always been the favored meats of the Middle East. Pork is prohibited in both Islam and Judaism, and as such is rarely eaten in the region. Prominent among the meat preparations are grilled meats, or kebabs. There are a wide variety of these grills, with many regional specialties and styles. The most common are the cubed cuts on skewers, known as shish kebab in most places. Chicken may also be grilled in the same fashion. Another common variety is kofta kebab, made from ground meat, sometimes mixed with onions and spices, shaped around the skewer like a long sausage and grilled. Kebabs are typically a street or restaurant food, served with bread, salad, and pickles. It is not usually prepared in domestic kitchens.
Meat and vegetable stews, served with rice, bulgur, or bread, are another form of meat preparation in the region. Kibbeh is a pie or dumpling made with meat and cereal. The most common are made with ground meat (typically lamb) and burghul, worked together like a dough, then stuffed with minced meat that has been fried with onion, aromatics, and, sometimes, pine nuts or almonds and raisins. This can either be in the form of individual small dumplings (usually shaped like a torpedo), or in slices like a cake, baked on an oven tray with the stuffing placed between two layers of the dough. One variation is kibbeh naye, raw kibbeh, which is made by pounding raw meat and burghul together with seasoning and served with dips of lemon juice and chili sauce.
Tursu are the pickled vegetables of the cuisines of many Balkan and Middle East countries.
Vegetables and pulses are the predominant staple of the great majority of the people in the Middle East. They are boiled, stewed, grilled, stuffed, and cooked with meat and with rice. Among the green leaf vegetables, many varieties of cabbage, spinach, and chard are widely used. Root and bulb vegetables, such as onions and garlic, as well as carrots, turnips, and beets are equally common. Squash, tomato, eggplants, and okra are distinctive elements in the cookery of the region. (Use your own discretion with this commentary, as Squash and tomatoes originate from the Americas, and are not 'distinctive' to the region as the above suggested.) Eggplant is often fried in slices and dressed in yogurt and garlic, or roasted over an open fire, then pulped and dressed with tahini (sesame paste), lemon juice, garlic, and cumin, a dish known as baba ghanoush. Tomato is the most ubiquitous ingredient in Middle Eastern cookery. It is used fresh in a variety of salads, cooked in almost every stew and broth, and grilled with kebab.
Beans and pulses are crucial to the diet of the region, second only to cereals. Fava beans are eaten both green and dried. Dried, they are boiled into one of the most popular Egyptian foods: ful medames, a domestic and street food, eaten for breakfast or any other meal, mashed and dressed in oil, lemon, and chili. Similar dishes are found in all other parts of the region. The famous Falafel, now popular in Europe and America, was originally made from dried fava, crushed and formed into a rissole with herbs and spices, then fried. It is also made from chickpeas or a mixture of the two. Green fava are cooked like other green beans, boiled and dressed in oil, or stewed with meat. The haricot beans and black-eyed beans are also common. Lentils, split peas, and chickpeas are widely used in soups, with rice, in salads, or with meat. Hummus, made from chickpeas and sesame paste, originated in Syria and Lebanon.
Meze is a selection of small dishes served to accompany alcoholic drinks as a course or as appetizers before the main dish in Arab countries, Turkic countries, and Iran.
Stuffed vegetables are a dish most associated with the Middle East in the popular mind. They are commonly called dolma, the Turkish word meaning "stuffed," but also the Arabic mahshi. Grape leaves, chard, and cabbage are stuffed with rice, ground meat, pine nuts, and spices, and then stewed in oil and tomato. Many vegetables are similarly stuffed and stewed or baked, such as squash, onion, tomato, eggplant, peppers, and even carrots.
Mezze is common throughout the Middle East. It consists of a number of small dishes that are picked at leisure: cheese, melon, nuts, various salads and dips, such as tabbouleh, hummus and mutabbal, pickles, and also more substantial items, such as grilled meat, kibbeh, and sausage.
Middle Easterners commonly consume milk, fresh or soured. Yogurt, a Turkish contribution, is commonly consumed plain, used in cooking, used in salad dressing, or diluted as a drink. White cheeses, like the Greek feta and halloumi, are the most common in the region.
Turkish coffee is the most well known beverage of the region. It is thicker than regular coffee and is made by boiling finely ground coffee in water and then letting the grounds settle. In the 1980s, instant coffee also became popular. Aside from coffee, there is also an alcoholic drink called arak. It is most famous for its potency and milky-white color when water is added, producing the drink nicknamed "the milk of lions". Water and ice are almost always added because of an alcohol content between 30% and 60%. Arak is colorless in its pure form and is aniseed-flavored. In the Middle East, arak is served in social settings and with mezze. Some Christians in the Middle East, such as the Assyrians and Armenians produce their own home made beer and wine. A common drink among Muslims served during Ramadan is Qamar El Deen, a thick and sweet apricot drink. The apricots are boiled with sugar and water until they are thick and placed on wooden planks left in the sun until dry. A fruit leather is left, which is then melted with water and sugar and drunk. Another popular drink is Jallab. It is made by diluting a mixture grape molasses, dates, and rose water and served with crushed ice. Some also serve it with raisins or pine nuts. Ayran (and Doogh) is a beverage made from yogurt very popular in certain Middle Eastern countries such as Turkey and Iran.
In some Arab countries of the Middle East, especially in the Arab states of the Persian Gulf, it is common for people to take their food from a communal plate in the center of the table. Rather than employing forks or spoons, people traditionally dine without utensils; they scoop up food with their thumb and two fingers or pita bread. In the Arab culture, the left hand is considered unclean. This however is changing now with utensils being widely used for dining. Even left-handed people eat only with the right hand. A common exception is that the left hand may be used to hold a drinking glass when eating greasy food with the right. It is proper etiquette to compliment the host on the food and their hospitality. Similarly, it is important to try every plate on the table. If a guest does not leave food on his plate, the host generally fills it immediately. The Middle East places emphasis on enjoying meals with family and friends.
In Iran, the term "daste shoma dard nakone" [literally 'may your hand not hurt'] is used to thank someone. Similarly, in Iranian Azerbaijan the term "eliz ağırmasın" is used, with the same meaning.
Typically, dishes are served according to savoury or sweet, rather than in courses. Food is served in various platters and dishes at a dining table, served in plates, and eaten with cutlery, as is the European tradition. In traditional Iranian restaurants, a large, low table lined with Persian rugs and with cushions around the sides is the setting for feasting; people sit cross-legged in a circle, and food is served in the centre, again eaten with cutlery in separate plates. Afterwards, tea will be served in "kamar baareek" glasses [literally 'narrow waist'] with sugar lumps, Persian sweets, and possibly a ghalyoun, enjoyed in the same communal fashion.
When entertaining dinner guests at home, it is seen as discourteous to one's guests to serve the sufficient amount of food for all guests, lest one appears miserly. For this reason, food is always prepared lavishly and in large quantities.
An important Persian concept that applies to food and also extends to other areas of daily life is the practice of "taarof"; this is an exercise of self-restraint, whereby if one is offered any food or drink, they will initially politely decline, regardless of how hungry or thirsty they might be. Once the host has insisted and offered repeatedly, they will help themselves. No food and drink is to be accepted upon the first time of being offered it, lest one appears greedy.
Tea is usually served in little curved glasses that you hold not by the stem, but by the lip: you never add milk, but you can add water as you drink it to dilute the tea, which is sometimes still steeping when you get it. Coffee is generally available. The coffee is drunk carefully (there are grounds on the bottom); it is also thick and black, and each cup is individually brewed, often with the sugar already in it, and milk is usually not to be added. Since it is offered all the time and everywhere, it is a gesture of hospitality and you must always take the coffee or tea, even if you only put it to your lips or just take a few sips. Your cup will always be refilled if it is less than half full. Because you must never pour your own drink, you must always be alert throughout the meal as to whether your neighbor's cup or glass needs refilling. If it is less than half full, it needs refilling; alternately, if yours is less than half full, your neighbor is obliged to refill it. If he or she does not, do not refill it yourself, for this will cause him or her to lose face; instead, diplomatically indicate your need by pouring a little more drink into your neighbor's glass, even if it doesn't really need it.
If you are the honored guest, you will be expected to make a toast, usually soon after the host does or at the end of the meal, just before everyone departs.
Dining is done with forks and spoons and knives, Western style. The knife is held in the right hand, and the fork in the left. Do not switch hands for knives and forks.
Smoking is ubiquitous in Turkey. People smoke between courses during dinner.
The honored guest is served first, then the oldest man, then the rest of the men, then children, and finally women.
Do not begin to eat or drink until the oldest man at the table has been served and has begun. You may want to ask your host when it is appropriate to begin.
At the end of the meal, it is appropriate to thank the host or hostess for a wonderful meal.
In restaurants, you often order each dish as you want it, so that they are not ordered all at once at the beginning of the meal. In informal restaurants, you may be required to share a table. If so, do not force conversation: act as if you are seated at a private table. Waitstaff may be summoned by making eye contact; waving or calling their names is very impolite. Dining etiquette for business meals. Most business meals are lunches. Business meals are generally not good times to discuss business or make business decisions; they are intended to build the more important personal relationship. Take your cue from your Turkish associates: if they bring up business, then it's okay to discuss it, but wait to take your lead from their conversation. Water, and other drinks, may not be served until after the meal is over, as some believe that drinking while eating is not healthy.
When you are at a colleague's home for a formal meal, you will be invited to sit anywhere you like at the table; resist the impulse to sit down, and wait until your host gives you further instructions. These will generally come after the host or oldest man is seated, and often you will be placed at his side. It is a great honor to be invited into a Turkish home. Once inside, you may need to remove your shoes (this is not the custom in restaurants, however). If you move from room to room in a Turkish home, be sure to always allow the more senior members of your party to enter the room ahead of you. It is customary to say "Afiyet olsun" ("May what you eat bring well-being") before or after eating, and to say "Elinize sağlik" (it is a compliment to the hostess, meaning "Bless your hand") after the meal.
During the month of Ramadan, food consumption increases dramatically throughout Muslim communities. Breaking the fast becomes a banquet, with exchanges of invitations between kin and friends, and public banquets held by charities and associations. Cafes and pastry shops are open at night, and a carnival atmosphere prevails in the streets. Many Muslims, following the reported example of Muhammad, break their fast with a date, followed by a variety of dishes. Sweet pastries and puddings are always present on Ramadan nights everywhere. The end of Ramadan is marked by a festival, Id 'al-Fitr, a feast that breaks the fast, during which a great quantity and variety of sweets and pastries are consumed. The other major Muslim feast is that of 'Id al-Adha, the feast of the sacrifice, which occurs during the pilgrimage month. At this time an animal, usually a sheep or a goat, is slaughtered in every household that can afford it, and great banquets are prepared, with an obligation to give food to the poor.
In North America, Middle Eastern food first came became popular in the 1990s with the so-called Mediterranean diet. According to the Mayo Clinic, the benefits included reduced risks of heart disease, Alzheimer's disease and cancer.
^ a b c d "The Middle East: Background & History". Archived from the original on 26 May 2017. Retrieved 20 November 2014.
^ "How Middle Eastern Cuisine Became The 'It' Food Of 2017". The RushOrder Blog. 2017-12-05. Retrieved 2017-12-14.
^ a b "Crisis in the Middle East: layout your solution to bring peace to the region". eNotes. Retrieved 20 November 2014.
^ "In pictures: Turkey's Assyrian wine-makers". BBC News.
^ "Devour Blog: Qamar El Deen". Retrieved 20 November 2014.
^ Mayssam Samaha. "Jallab – A Refreshingly Sweet Summer Drink – Honest Cooking". Honest Cooking. Archived from the original on 1 May 2013. Retrieved 20 November 2014.
^ "Cross Cultural Dining Etiquette". Retrieved 20 November 2014.
This page was last edited on 15 April 2019, at 17:43 (UTC).
|
0.999999 |
Column: Tales of Super Bowl week: To party or not?
A report that club owners in Dallas have put out an urgent call for an additional 10,000 strippers struck a familiar chord with those who remember when players' antics the week leading up to the Super Bowl made for bigger headlines than the game itself.
"I don't know whether we had more fun in my day," said Mike Ditka, Hall of Fame Class of 1988 and current TV analyst. "But at least we didn't have cell phone cameras or Twitter, Twatter -- whatever it's called -- to worry about.
"Guys are still guys. You can put in all the rules you want and it won't make a difference to some. Anybody who won't listen, or doesn't understand it's easier to get caught, deserves everything he gets.
"I just hope," he added ruefully, "nobody is that stupid."
Back in 1986, when Ditka took the Bears' shuffling crew to New Orleans for the Super Bowl, what happened on Bourbon Street mostly stayed there and his instructions to the team would have fit in a text message: No curfew the first three days. No fooling around after that.
It's a different world now. Green Bay coach Mike McCarthy hasn't settled on everything he'll tell the Packers when they land in Dallas. But he's worried some of it will fall on deaf ears.
"We will take Monday and spend a lot of time and I'll go through the whole week, day by day, hour by hour, so they know exactly what's expected of them," McCarthy said. "We'll be as organized as we possibly can."
But a moment later McCarthy added, "Something is going to be screwed up. I've been told that by a number of coaches."
The player who figures to draw the most attention is Pittsburgh's tough-guy quarterback, Ben Roethlisberger. Despite several off-the-field blemishes already on his resume -- Roethlisberger was suspended the first four games this season after being accused, but not charged, in a sexual assault -- his two previous trips to the big game were largely trouble-free. His teammates are certain Roethlisberger won't need a refresher course this time around.
"When he came back, there were no words that needed to be said, no apologies," tight end Heath Miller said. "We knew he was ready to lead us to the Super Bowl."
Then again, it's not always the teetotalers who wind up leading the way.
In the very first Super Bowl, legendary Green Bay boss Vince Lombardi threatened a $10,000 fine -- real money back in 1967 -- for anybody who missed bed check the night before the game. After making sure his bed was in place -- check -- the late Max McGee, then 34 and a backup receiver near the end of his career, lit out for the Sunset Strip.
McGee was so certain he wouldn't play the next day that he left his helmet in the locker room before the game. He was sitting on the bench, still shaking out cobwebs, when starter Boyd Dowler separated his shoulder and Lombardi turned up, barking at McGee to get in the game. A few plays later, wearing a borrowed helmet, McGee made a one-handed grab of Bart Starr's pass for the game's first touchdown.
By the time Green Bay locked up the win, McGee had caught six more throws and set a record unlikely to be broken.
"Most passes caught with a hangover," he proudly bragged for the rest of his life.
Joe Namath topped that boast just two years later with the most famous guarantee in sports, and soon was followed onto the stage by an Oakland Raiders team that claimed to have bartenders on retainers in every NFL city.
Their carousing inspired a suggestion that the local cops keep media guides in the glovebox of their squad cars to speed the booking process along. After several years of relentlessly bad press, defensive tackle and certified party animal John Matuszak issued an ultimatum: Anybody caught breaking curfew during the week would have to answer to him.
Naturally, the Tooz was found partying late into the morning soon after. But at least he had an explanation.
"That's why I was out in the streets," he said. "To make sure no one else was."
Ditka's cast of characters, on the other hand, rarely lacked for late-night company. They generated so many tall tales of Bourbon Street escapades that if only half were true, Chicago's 46-10 destruction of the Patriots on that Sunday was even more impressive than it seemed.
"Look, I'd been to a few Super Bowls by then, including with coach (Tom) Landry, and nobody was more buttoned-down than that. But you can't treat every team, or even every player, the same," Ditka said. "I knew what they were doing. Heck, I used to do the same stuff myself. But we had a veteran team. ... All I really asked was for their full attention Thursday, Friday and Saturday. And we got that in spades."
True -- if you overlook Jim McMahon's decision to moon a TV helicopter filming one of the Bears' practices. He'd arrived with a sore hip, then added a grudge when a local TV reporter made up quotes in which the punky QB called the town's women "prostitutes" and the men "stupid."
McMahon brought along an acupuncturist, who was working on his hip when several players noticed the helicopter hovering above. According to the official version of the story, McMahon's pants were just a few inches off his hip.
"OK," teammate William "The Refrigerator" Perry conceded many years later, "maybe once Jim realized the 'copter wasn't going away, he pulled his pants the rest of the way down."
Sadly, not all stories of Super Bowl prep week ended so harmlessly.
Three years later, the big game in Miami was preceded by riots and Cincinnati running back Stanley Wilson didn't play after a cocaine binge. A decade later, Falcons safety Eugene Robinson was arrested for soliciting a prostitute the day before the game and just hours after receiving the Bart Starr Award for "high moral character" with his family in attendance.
The next year, Baltimore's Ray Lewis was entangled in a double murder that took place at an Atlanta nightclub in the wee hours after the game. He was found guilty of misdemeanor obstruction of justice, but has since rehabilitated his image.
In 2003, Raiders center Barret Robbins disappeared Saturday from the team's San Diego hotel and headed to Tijuana, Mexico. He returned that night disoriented, missed the game the next day and spiraled downward into substance-abuse clinics and jail time.
"The world is a lot closer than it used to be, but the image these guys are supposed to keep up hasn't changed," Ditka said. "You're supposed to be a warrior, on and off the field -- train hard, play hard, the whole nine yards.
"But that balance isn't easy to come by, believe me," he said finally. "And if you can't separate one from the other, you won't last long either way."
|
0.945927 |
The eastern gray squirrel is one of the most common squirrels in Maryland. Gray squirrels are bushy tailed rodents with a mixture of brown, black, and white fur which when viewed from a distance blend together to look gray. Their belly fur is white or light gray. The tail is flattened, bushy and gray with silvery-tipped hairs. Some gray squirrels may be black, white or blond in color. These color morphs can be common in some locales. Gray squirrels are typically 16-20 inches in length, and they can weigh up to 1.5 pounds.
Gray squirrels can be found throughout the eastern United States, ranging from southern Quebec, New Brunswick and Ontario to Florida, west into eastern Texas, and north into southern Manitoba. This species has also been introduced to many locations outside of its native range including Washington and British Columbia. Eastern gray squirrels can be found in every county in Maryland.
Gray squirrels generally are found in mixed hardwood forests as well as in suburban and urban areas. The trees most commonly used by gray squirrels are white oak, American beech, American elm, red maple and sweet gum. Gray squirrels will use old woodpecker holes or natural tree cavities as dens to live in and raise young. Eastern gray squirrels will also build large nests composed of leaves and twigs. Generally, dens are made at least 20 feet off the ground. Gray squirrels are often social and will share their nests with other gray squirrels during certain times of the year.
The diet of gray squirrels typically includes an assortment of seeds, nuts and berries such as acorns, hickory nuts, walnuts, beechnuts, pine seeds, maple samaras, wild grapes, and American holly berries. In the spring, gray squirrels will also feed on buds of maple, tulip popular, flowering dogwood and black cherry.
When their typical food is scarce, eastern gray squirrels will also consume insects (adults and larvae), juvenile birds, bird eggs and amphibians. At the end of the summer, gray squirrels will store seeds and nuts to feed on when food is scarce during the winter months.
Eastern gray squirrels males reach breeding age at 9-11 months and females are about to breed around 6-8 months of age. After that, the eastern gray squirrel mates twice a year from December to February and from May to June. A mating "chase" is often involved, with several males following a female as she moves about during the day. Gray squirrels are polygamous, with one male mating with several females. After mating, gestation takes around 40-45 days.
Eastern gray squirrel litters range from 2-6 young that are born hairless and helpless. Frequently, the spring litter of young is born in a tree cavity, while the second, late-summer litter is born in a leaf nest. Females often move their litters back and forth between cavity dens and leaf nests, generally to escape predation or parasite infestation as well as due to weather changes. The young are weaned in about 50 days. Typically, gray squirrels have 2 litters per year. The second litter stays with the female over the winter.
Gray squirrels are quite vocal. The most familiar sound they make is a bark. Buzzing, wailing, squealing, trills, squeaks, and purrs are other common squirrel sounds.
The eastern gray squirrel is most active during the day and can be seen all year, even digging through snow in intense cold to retrieve buried nuts. The squirrels can make hundreds of caches. Most nuts are buried at the surface, with few more than 1/4 inch below the ground. About 85 % of the nuts may be recovered, while the remainder occasionally germinates. The gray squirrel can smell buried nuts under a foot of snow; when snow is deep, the squirrel tunnels under it to get closer to the scent.
Eastern gray squirrels typically live up to 3 years in the wild, though some wild squirrels have been found to reach the ripe age of 13.
If you are interested in attracting squirrels to your backyard while minimizing potential conflicts, then click here for the Squirrels in Maryland page. However, gray squirrels can cause damage to backyard plantings, bird feeders and can get indoors. If you are having problems with gray squirrels, then you should click here for the Wildlife Problems Webpage or call the nuisance wildlife hotline at 1-877-463-6497.
Gray squirrels are managed as small game species in Maryland. To learn more about small game management, then click here.
The conspicuous bushy tail of the gray squirrel has many uses. It is used for balance, for heat, as an umbrella, for communication and as a rudder when swimming.
|
0.9621 |
Shalem O, Sanjana NE, Hartenian E, Shi X, Scott DA, Mikkelsen TS, Heckl D, Ebert BL, Root DE, Doench JG, Zhang F. Genome-scale CRISPR-Cas9 knockout screening in human cells. Science. 2014 Jan 3;343(6166):84-7. doi: 10.1126/science.1247005.
As seen in the primary and review articles, there is a lot of functional applications for genome-scale CRISPR-Cas9 knockout (GeCKO). I see that both the articles were published relatively recently (summer 2014), but have there been anymore applications/techniques discovered since then that could either benefit the cell viability in cancer and pluripotent stem cells (as studied in the primary article), or therapeutics in relation to another genetic disease?
The researchers from the primary article used CRISPR/Cas9 to identify normal genes whose loss (gene was knocked out) is involved in resistance to a drug that fights cancer. This could potentially be used to design new anti-cancer drugs. Could the CRISPR/Cas9 system also be used in the opposite way, to specifically knock-out mutated genes in cancer cells that are critical for cancer proliferation, thus killing only cancer cells? What are the drawbacks of this method?
In the supplemental article, the authors explain several new applications in research, medicine and biotechnology, such as thorough monitoring of chromatin states or being able to 'rearrange the three-dimensional organization of the genome'. Knowing that the supplemental article was published after the primary article, could the authors utilize some of these new technological advances to further improve their GeCKO technique? Do these advantages allow for more thorough tests to be performed?
The potential to use CRISPR/Cas9 in human genetic modification seems like one major ultimate goal of its development. what are the ethical concerns if this becomes more viable? Could this be used for so-called "designer babies," and if so, what could it mean for future generations?
The second article says that this can be used to "correct harmful mutations in the context of human gene therapy". What are some of the kinks that need to be worked out before this is able to be used in humans, if any?
It states in the primary article that CRISPR-Cas9 can be used to target many different areas of the genome (promoters, enhancers, introns, and inter-genic regions). Based on its widespread applicability compared to RNAi technology, will this CRISPR technology become the norm soon? Is there a reason the RNAi technology might still be useful in the lab setting?
What is the specificity of the GeCKO system? Do you think it could be refined to introduce mutations at specific locations in a gene? What are the restrictions to this kind of specificity?
In the supplementary article, it talks about the phylogeny of the Cas9 gene and diversity of its orthologs. How does studying the diversity of this gene help to improve the current technology?
The primary article mentions that there are off target effects when using RNAi, do you know what these off-target effects may be? Likewise, are their downsides to using CRISPR that should be considered when choosing what experimental technique should be used to generate a knock-out?
The review article states, "Additionally, Cas9 could be harnessed for direct modification of somatic tissue, obviating the need for embryonic manipulation as well as enabling therapeutic use for gene therapy." I find this insanely interesting. Do you think it could be applied to all types of manipulation...i.e. designer babies (eye, hair color, height, interests, abilities, etc.)? And if so, is there ever concern for adverse effects resulting from this manipulating, or any manipulation in general?
The first article did a good job comparing RNAi to the new CRISPR technology. Do you think that RNAi will be replaced by CRISPR technology for producing knockouts, or do you think each will have its different uses in experiments in the future?
Although they show how accurate that this new CRISPR technology is as well as how extremely useful this could become in research and maybe even clinical settings, are there concerns with cost to use this sort of technology and even other drawbacks to using this?
It seems as though lentivirus administration is a great way to introduce the Cas9 system into cell lines. What sort of challenges will be faced when trying to transfer this over to full systems, such as when using Cas9 for gene therapy, in which the immune systems may interfere with administration?
The primary article states that they screened for genes whose loss is involved in resistance to vemurafenib. Why did they chose to study this specific therapeutic?
The review article discusses a double-nicking approach to improve CAS9 target recognition fidelity...are there any types of off-target modifications that this does not address? Additionally, are there other methods to minimize off-target effects?
Is there a specific pro that lentiviral delivery of the Cas9 has as a method of gene therapy as opposed to using an adenoviral or adeno-associated viral vector to deliver the Cas9?
Though the CRISPR-Cas9 system has clearly been a much better option than RNAi for inserting genes of interest for knockout, what are the drawbacks to this system. Can you compare the drawbacks of Lentiviral vectors as opposed to the alternative?
|
0.998516 |
Laparoscopic Roux-en-Y gastric bypass (LRYGB) has become the gold standard for surgical weight loss. The success of LRYGB may be measured by excess body mass index loss (%EBMIL) over 25 kg/m2, which is partially determined by multiple patient factors. In this study, artificial neural network (ANN) modeling was used to derive a reasonable estimate of expected postoperative weight loss using only known preoperative patient variables. Additionally, ANN modeling allowed for the discriminant prediction of achievement of benchmark 50 % EBMIL at 1 year postoperatively.
Six hundred and forty-seven LRYGB included patients were retrospectively reviewed for preoperative factors independently associated with EBMIL at 180 and 365 days postoperatively (EBMIL180 and EBMIL365, respectively). Previously validated factors were selectively analyzed, including age; race; gender; preoperative BMI (BMI0); hemoglobin; and diagnoses of hypertension (HTN), diabetes mellitus (DM), and depression or anxiety disorder. Variables significant upon multivariate analysis (P < .05) were modeled by “traditional” multiple linear regression and an ANN, to predict %EBMIL180 and %EBMIL365.
The mean EBMIL180 and EBMIL365 were 56.4 ± 16.5 % and 73.5 ± 21.5 %, corresponding to total body weight losses of 25.7 ± 5.9 % and 33.6 ± 8.0 %, respectively. Upon multivariate analysis, independent factors associated with EBMIL180 included black race (B = −6.3 %, P < .001), BMI0 (B = −1.1 %/unit BMI, P < .001), and DM (B = −3.2 %, P < .004). For EBMIL365, independently associated factors were female gender (B = 6.4 %, P < .001), black race (B = −6.7 %, P < .001), BMI0 (B = −1.2 %/unit BMI, P < .001), HTN (B = −3.7 %, P = .03), and DM (B = −6.0 %, P < .001). Pearson r 2 values for the multiple linear regression and ANN models were 0.38 (EBMIL180) and 0.35 (EBMIL365), and 0.42 (EBMIL180) and 0.38 (EBMIL365), respectively. ANN prediction of benchmark 50 % EBMIL at 365 days generated an area under the curve of 0.78 ± 0.03 in the training set (n = 518) and 0.83 ± 0.04 (n = 129) in the validation set.
Available at https://redcap.vanderbilt.edu/surveys/?s=3HCR43AKXR, this or other ANN models may be used to provide an optimized estimate of postoperative EBMIL following LRYGB.
This manuscript was presented as a poster (Abstract ID 61988) at the Annual Meeting of the Society of American Gastrointestinal and Endoscopic Surgeons (SAGES), April 15–18, Nashville TN.
Dr. Colleen Brophy, M.D., Professor of Surgery, Vanderbilt University, Vanderbilt University Department of Biostatistics, Vanderbilt RedCAP: CTSA Award UL1 TR000445 from NCATS/NIH.
Eric Wise, Kyle Hocking and Stephen Kavic have no conflict of interest to disclose.
|
0.999999 |
All Bachelor’s and Master’s degree students registered at the university (city centre and Kauppi campuses) can apply for exchange. Also doctoral students have a number of mobility opportunities.
Here you can find information about the application process.
More information on previous application rounds and presentations can be found in Finnish: Näin haet vaihtoon > Hakuajat ja infotilaisuudet.
|
0.999042 |
500 words or less on a given topic.
One of the first names to capture my imagination in genealogy research was my uncle, Justin Anker Olson, who was no more than 2 years old when he died more than 100 years ago on the family homestead in Harding County, South Dakota.
Justin was the fifth of nine children born to John and Annie Olson, and the other eight all reached adulthood, a blessing of its own considering mortality rates in the early 20th century.
According to church records, Justin was born on May 29, 1907 in Fort Ransom, North Dakota, and was baptized at Standing Rock Lutheran Church. The following spring, Grandpa John loaded his wife and five kids and their worldly possessions into a horse-drawn wagon and joined another dozen Fort Ransom families heading southwest to seek homesteads in South Dakota cattle country.
After traveling about 350 miles over America’s northern prairie, the Olsons settled at place called Clark’s Fork in Harding County outside Buffalo. During the bumpy ride, one can only imagine baby Justin being held by his mother or passed between two older sisters, ages 8 and 6 at that time, giving them a live doll with which to play.
The Olson homestead near Clark’s Fork in Harding County, S.D. around 1916.
That first fall in Harding County, Grandpa broke just two acres of ground before filing papers for his 160-acre homestead in February of 1909 and planting corn and trees on those two acres while also breaking ground on 21 more acres and building a 1½-story frame house, 16 by 30 feet with a cellar underneath, according to BLM records. That strongly suggests that the family camped in their wagon for that first winter in South Dakota, and the exposure may simply have been too much for the little guy. Pop said Justin just got sick and died.
Whatever the nature of his illness, sometime in 1909 baby Justin died and was buried on the homestead, where four more Olson kids were born, starting with my dad in May of 1910. I can only imagine that Pop represented a healing addition to a family that had just lost an infant son in the preceding few months.
The last I know of Justin is that nine years after his death the Olsons moved back to Fort Ransom, and Grandpa John faced the grim task of disinterring his baby son and carrying the remains back to North Dakota, where Justin was reburied in Standing Rock Cemetery. The return trip also took place in a horse-drawn wagon, with Grandma Annie holding another newborn, my uncle Reuben, in her arms. Reuben was the last of John and Annie’s nine kids, which included six boys and three girls.
Pop said Grandpa found only a few bones when he opened Justin’s grave, but he saved what he could, including the headstone that he’d fashioned from a cast iron stove lid in his blacksmith shop and upon which was inscribed the baby’s name, birth date and death date.
I’m told that stove lid remains in family hands, but no one knows where.
|
0.999998 |
How do I pack for my trip?
The dilemma of what to pack for a trip to Italy faces every traveler, but there are some specific things you might want to consider if you're packing for a train trip in Italy.
Whereas you might have checked an oversized suitcase on your flight to Rome, once you're taking the train all over Italy you'll be carrying your luggage on and off train cars yourself. There are some door-to-door luggage transport options, but they're limited to only the high-speed Frecce trains and only certain cities. The safest thing to do is assume that you will be responsible for carrying your bags on Italian trains at all times.
Traveling with a bag that is considered "carry-on size" by airlines, then, makes the task of climbing into and out of train cars much less physically taxing. Maneuvering smaller bags through crowded train stations and narrow train aisles is easier, too.
When you limit yourself to traveling only with carry-on sized bags, you definitely have space restrictions that you don't have with full-sized luggage. The truth is that most travelers need far less than they actually bring—you can get away with wearing the same few outfits over and over (washing them periodically, of course), since no one will see you enough times to notice—so try to be ruthless when you're packing.
Leave bulky items at home, or plan to wear them on the plane so they don't take up space in your bags. Kindles, iPads or other e-readers are wonderful space savers for book lovers. Travel-sized toiletries may run out during your trip, but Italy has things like shampoo and toothpaste, too.
Carry a backpack or messenger bag (this can easily be your "personal item" on the plane) that's large enough to hold your valuables, any prescription medication, and maybe even a few items you picked up at the market for your on-board picnic. With this as your second bag, getting on and off trains is still easier than with a full-sized bag and you can keep all your valuables nearby even if you're stowing your luggage at one end of the train car.
Travelers who plan to shop while in Italy may start with excess room in an oversized suitcase, with the intention of filling it with souvenirs to bring home. There's nothing wrong with that, except the aforementioned issues with hauling heaving oversized bags on and off of trains.
Consider boxing up your goodies and shipping them from Italy to your home so you don't have to carry them or pack them. Some shops will take care of the shipping for you—especially if you're buying something large or expensive, such as wine or ceramics—so you won't even have to find a Mail Boxes Etc. in Florence.
Another option is to pack a duffel bag or another collapsible bag inside your suitcase—lay it flat and it shouldn't take up much room. You can expand into that bag as needed. It might make getting on and off of trains a bit more cumbersome with three bags (including that "personal item" bag), but some stations have trolleys you can pay to use.
|
0.999999 |
Ideo New Rama 9 is a brand new launch from one of Bangkok’s largest and most experienced publicly-listed developer.
The name of the project – New Rama 9 – refers to the fact that it is located in the fast-developing extension to the already established Rama 9 Business District of Bangkok. Located on Ramkamhaeng Road, this district contains many of Bangkok’s leading universities, which means that there is consistently high demand for affordable accommodation from students, both local and expat.
This location will be greatly enhanced in future due to the construction of a new metro line – the orange line MRT – which is currently in progress. Once the line is finished – shortly after the handover date for Ideo New Rama 9 – the station, which will be called ‘Ramkamhaeng 12’, will be located just 380m from the residence. This is sure to ensure strong capital increases for all who buy here. The location is also 800m from the ARL Ramkamhaeng main railway station and 800m from Pier 3 for those who prefer to travel by Kloeng Boats (canal boats). For drivers, the project is also located close to an on-ramp to Bangkok’s network of raised toll roads, giving quick and easy access to all parts of the city by car. In addition to all this area’s convenient transport options, this location also features the famous Rajamangala National Stadium.
Ideo New Rama 9 is a high-rise residence consisting of 24 floors housing a total of 994 residential units. The project offers a variety of apartment sizes starting with 26m2 studio apartments, plus one-bedroom units, which range in size from 30m2 to 34m2. The standard single-floor unit types are available on 4th – 18th floors and feature a ceiling height of 2.8m. The 19th – 24th floors are reserved for special ‘hybrid’ units. These apartments have double-height 4.5m ceilings, which allows both large panoramic windows plus an extra mezzanine level which can be used for a second bedroom or home office.
Ideo Rama 9 features a wide variety of features particularly aimed at the target student market, which are all located on the first and second floors. Here buyers will enjoy a ‘Hybridsphere’ lobby, a ‘secret courtyard’, a swimming pool, sauna, fully-equipped fitness centre, hybrid space including a library, theatre corner, meeting room plus two shops.
In summary, Ideo Rama 9 is an ideal project for anyone looking to invest in an affordable project which offers exceptional capital growth potential once the new MRT line is functioning.
|
0.999879 |
Do you find yourself seeking debt advice but are unsure who to go to or where to turn? Are you, like so many millions of Americans, in need of debt counseling due to mounting credit card debt? Well, help with debt is merely a phone call or a mouse click away.
Debt relief services are becoming increasingly popular amongst Americans seeking student loan debt relief, as well as relief from medical expenses and credit cards. Debt relief companies offer a variety of flexible solutions that can be catered to your specific situation and financial needs and goals.
Perhaps one of the greatest benefits enrolling in a debt management program is reduced monthly debt payments. These are typically reduced by 30-50% for most. All of the multiple unsecured debt that is owed is consolidated at a much lower interest rate. This allows you to significantly reduce your monthly payments, thereby making your debts much more manageable.
Your debt counselor will able to negotiate with your creditors on your behalf, and may be able to get you creditors to waive any penalty interest rates and fees that have been applied to your accounts due to late or missed payments. Additionally, creditors typically agree to bring any accounts where you have missed payments to current within 3-5 payments through a debt management program.
An important aspect of debt relief is empowering consumers with the tools, resources, and knowledge they need in order to stay out of debt and making better and more informed fiscal decisions in the future. Debt management programs offer expert financial advice that allows consumers to reach plan their financial future.
|
0.901935 |
Tripolitania, Arabic Ṭarābulus, historical region of North Africa that now forms the northwestern part of Libya.
In the 7th century bc three Phoenician colonies were established on the shores of the Gulf of Sidra, which was originally inhabited by a Berber-speaking people. These cities—Labqi (Leptis Magna, modern Labdah), Oea (Tripoli), and Sabratha (Ṣabrātah)—later formed the eastern province of the Carthaginian state and account for the late Roman name Tripolitania (“Three Cities”). On the fall of Carthage in 146 bc, Tripolitania became subject to Numidian princes; after the Numidian War (46 bc), it was attached to the Roman province of Africa Nova. The Roman emperor Septimius Severus (reigned ad 193–211) was himself originally a citizen of Leptis and endowed that city with magnificent buildings during his reign. The Vandals seized Tripolitania in 435 but were ousted by the Byzantine Greeks under the leadership of Belisarius in 534.
In 643 the Arabs took Tripoli and sacked Leptis and Sabratha, but they were unable to subdue Berber resistance in the interior for another 60 years. After a period of direct Arab rule from Damascus, Tripolitania became subject to various Arab and Berber dynasties, among them the Aghlabids (9th century), the Fāṭimids (10th century), and the Ḥafṣids (14th century). In 1510 Tripoli was captured by the forces of Ferdinand the Catholic of Spain, who turned it over to the Knights of St. John in 1530. The latter lost the region in 1551 to the Ottoman Turks, who ruled it either directly or through suzerains for the next 360 years. In 1711 the local governor, Aḥmad Karamanli, won recognition from the Ottomans as hereditary pasha (governor), and his dynasty ruled Tripolitania for all but a few years until 1835. Under the Karamanli rulers, Tripoli levied tribute on and plundered shipping in the Mediterranean, a practice that led to the Tripolitan War with the United States in 1801–05. In 1835 Ottoman Turkey resumed direct rule of Tripolitania in an effort to forestall further French expansion in North Africa.
As a result of the Italo-Turkish War of 1911–12, the Italians occupied Tripoli in 1911 and acquired all of Tripolitania from Turkey in 1912. Together with Cyrenaica and Fezzan, Tripolitania was incorporated into the kingdom of Italy in 1939. Tripolitania was the scene of fierce fighting between British and German armoured forces in 1942 during World War II. The three provinces of Tripolitania, Cyrenaica, and Fezzan subsequently formed the independent federal kingdom of Libya when it was created in 1951. These regions were administratively abolished in 1963, when Libya became a unitary state.
|
0.994337 |
As I sit here looking at 8 inches of freshly fallen snow, I am just a bit envious that you will be basking in the Florida sunshine in a few days...and eating great meals at Epcot...good for you!!
You pose two completely different dining experiences in my opinion. Chefs de France is a bit more refined and elegant in its presentation and was designed by three of France's best known chefs, whereas Biergarten offers a more raucous, casual experience. Chefs de France, in addition to amazing food, offers a chance to meet Remy, from Ratatouille, which may please your 11 year old. But Biergarten, on the other hand, includes an awesome oompah band that plays a 25-minute show every hour. One thing to keep in mind is that if it is just going to be three of you, you will more than likely be seated with others at the long tables around the stage and dance floor.
If you are looking for a quieter meal, I say go for Chefs de France. If you, your husband and 11 year old don't mind meeting new people and getting a bit crazy, go for Biergarten.
Personally, I have aways preferred the food and atmosphere of Biergarten, so that's where I would go.
Either way, you're all in for a unique dining experience.
|
0.999959 |
Is it possible to lose weight quickly? Yes it is, but how you go about it is the most important thing. There are several diets and programs you can start to help you lose weight fast. But to lose the weight and keep it off you need to incorporate the weight loss program as part of your lifestyle. Otherwise you will just gain the pounds back.
Healthy eating is a no-brainer. If you have not changed your diet, you're never going to win. What bothers me about some diets is that people will consume foods that tell their body they are full, but they are not going the proper nutrition. Eat a well-balanced meal, and then consume the type of foods that send a signal that you are full. Otherwise you will have vitamin deficiencies.
As for exercising, cardio is what you will need to do. Just make sure not to exhaust yourself, and keep yourself hydrated.
So if you want to get skinny fast, it is possible, but do not kill yourself in the process. As long as you are consistent, you should be able to reach your goal. As stated earlier, to keep the weight off, weight loss and maintaining your desired weight has to be part of your lifestyle—not something that you do off and on again.
|
0.671932 |
Her debut home production, Marathi movie 'Ventilator', has won three National awards and Priyanka Chopra says such honors are encouraging but they don't dictate the films she will be doing in future.
'I did not anticipate any award for any of the films I have made. I have never made films for awards or acted in films for awards. Eventually, I have always treated awards as a sign of encouragement but they can't dictate the films you make,' Priyanka told PTI over the phone from the US.
'Ventilator' is a Marathi language comedy-drama directed by Rajesh Mapuskar and produced by Priyanka under her company Purple Pebble Pictures.
The film won three awards at the 64th National Film Awards - Best Director, Best Editing and Best Sound Mixing.
Priyanka, 34, is more than happy about winning the prestigious award as she is the only actress-producer in Bollywood to have won a National award for her first film.
'I always like coming first. I am very excited about it (National award) as it's my first Marathi film and as a production company we are barely a year old. 'Ventilator' is director Rajesh Mapuskar's first Marathi film I am very happy for him.
'When Rajesh first came to me he was saying he was finding it difficult to get a producer for this film as it has 115 actors in it and it's a difficult film to make,' she says.The film tells the story of a joint family whose eldest and the most respected person goes into a coma few days before the Ganesh Chaturthi festival.
The 'Bajirao Mastani' actress says when the director first narrated her the story of 'Ventilator' she could relate to the plot as her late father Ashok Chopra was going through a similar situation in real life.
According to Priyanka, 'Ventilator' was a difficult film to make and the credit goes to the entire team for putting it (film) together. The 'Quantico' actress says it was her mother, Madhu Chopra, who gave her the news of 'Ventilator' winning the National award.
'My mother is here visiting me right now (in the US) as I am finishing 'Quantico 2' and I'll be coming back to India in ten days. She woke me up at five clocks saying 'Ventilator' has won three awards and I was supremely excited.
She further says, winning three National awards definitely calls for a celebration and once she is back to India she will throw a party for the cast and crew of 'Ventilator'. Priyanka reveals there is an interest in remaking 'Ventilator' in other languages but the makers are yet to take a final call on it.
'We have been discussing remaking 'Ventilator' in few other languages. But there is no concrete plan as such. Right now we are gearing up for 'Ventilator' to be screened at New York Film Festival and I am very excited about it,' she says. On the acting front, Priyanka is gearing up for her debut Hollywood film 'Baywatch'.
|
0.891536 |
There's nothing inherently bad about the word in economic debate. There are stipulative definitions used by many academics in discussing economics, politics, history and so on that are perfectly good. You'll note that none of them are one liners. It's generally used as a term for a combination of a number of political, social, and economic views. Obama doesn't come out socialist on them. The term is a technical term. It's one of those "isms." So its no surprise that lay usage of the term is nowhere near precise enough. This is a term, however, that's taken on a negative connotation for the lay. So they often use it as a name calling device in lieu of argument. It's pervasive. So even people who haven't associated any negative connotation or who've disassociated a negative connotation are now using the term in ways that don't match the academic usage.
It doesn't matter what the intention of the poll author had. It doesn't matter whether he expected a certain result or not. So long as he's not messing with the numbers or asking trick questions, the poll data is the poll data. Suppose I have a hypothesis that many people are calling Obama a socialist even though he's not a socialist. There's nothing wrong with me constructing a poll and utilizing correct polling methods and techniques to determine whether my hypothesis is right or not. It's not a poll about the economic views of the respondents. It's a poll about what terms the respondents use to characterize Obama.
The last serious socialist movement and contender for the presidency in the US was with Eugene Debs in the early 20th century.
I'm very interested in finding out what principles you're talking about?
Various Christians I know hold, according to their interpretations of the Bible, abortion is "murder," homosexuality is "abomination," and that the nation won't be blessed unless it supports Israel, Jerusalem, etc. They generally think he's Muslim and that Islam is a religion against that of Christ. They also feel *socialism,* for lack of another concise word, to be against Biblical principles, principles embodied in Christ. I do not defend these things, but say them as a report.
So is Catholicism the phase you must go through to become Protestant or is it the other way around?
Catholicism came first and was "protested" and "reformed" in the 16th century. You imply that individuals must go from being Socialists to Communists or vice versa. Why? I didn't. I merely said the amount of differences were comparable, not the type of differences, anyway. My big point was, for general purposes, the religions are both "Christianity" and a word describing Communism and Socialism would be beneficial for general purposes.
It is not my intention to arbitrarily put any label on anyone. "Socialism" is a word that's been used to describe the various schemes of plunder popularized during the last two or two and a half centuries. I think it's not unreasonable to say the "badness" of the word "socialism" has been based upon concerns that it undermines free enterprise, a pillar of freedom in America. I'd say "Communism" got the connotation for even more badness for being thought of as socialism by means of violent overthrow. Plunder, a word used extensively by Bastiat, also has a negative connotation. Bastiat was ready to use another word for the sentiment, but was not given one to work with. If we wish to call such ideals by another name, I am ready to do so.
I don't see how I could be "parroting" anything.
Eh, maybe it's only me who would have inhibitions against starting a thread titled with inaccuracy. I wouldn't quote an article that makes (even slightly) non-factual statements, when I could just as easily quote solely the factual source.
Wait, are you dismissing an article because the summarized results are 1% different than the base results? In the case of this poll that is a rounding error of such small significance compared to the fact that more than half of Republicans believe things that are completely untrue and contrary to recorded history.
I posted separate links too. I could be that the author of the first link had a different data set than what was in the second link. Or maybe they came from the same data set with different rounding specificity. In any case, I'm sure 1% difference is more than the margin of error for the poll.
According to Marx, who's essay was under discussion, socialism is the phase a capitalist society must first undergo before it can transform in to a communism. For Marx, communism and socialism are mutually exclusive. One is not a type of the other, the other is not a type of the former, and neither are types of some more general theory he gives a name to.
If you're willing to dispense with labels like 'socialist' and such, great. We can start a thread discussing the various policies of Obama and whether they're good or not independent of name calling. That's the real issue after all. But you must not slip back in to name calling. For instance, a lot of people say that Obama's policies amount to a dissolution of liberty. But unless you explain exactly what's mean by that and how Obama's policies do that, you're back to name calling - just with another name.
The initial post had one link. That site claimed the Harris Poll as reference. I did not say I'd dismiss it. I said that if I could get the relevant information from a source that does not make inaccurate (although minorly so) claims, I would do that. When reports cannot get numbers, hard facts, correct, they do decrease their credibility with me, but I wouldn't dismiss them on a minor count.
I think the point of "name calling" should be addressed. If I've stolen something from you, I think you could call me a thief with reason. Would that be name-calling? I'd say that's truth-calling. For an example, "con-artist" has a bad connotation and if I call someone that without legitimate reason, that would be name-calling. If I gave examples of the person's behavior and said he was a con-artist, then either the facts I stated or the definition of con-artist could be argued. What if I "arbitrarily" pointed out faults in the reasoning or logic of others? Would that not be similar to the spirit of name-calling? You've "called" me on a few things. "...But you can use such technical terms so loosely. You do this often in other threads." I don't mind being called things I am, but to be called a name-caller for telling what I feel is true, I do not particularly like.
Sheesh, it's obvious to anyone that understands the Book of Revelation that the Anti-Christ will appear as a Marxist.
I wonder how different the Republican segment of the poll is from the fundie segment. I guess it would be hard to get an accurate classification of who's a fundie and who's not based on self-descriptions.
If I were to describe general portions of X in terms of typical, easy to visualize, fractions, I would say 'a quarter of X' rather than 'six twenty fifths of X' if the actual percentage is 24%. If it's 68%, I would say 'two thirds of X', rather than 'seventeen twenty fifths of X'. If it's closer to 20%, say 22%, I'd say 'a fifth' instead of 'eleven fiftieths of X'.
I don't see anything wrong with such approximating - especially when the actual numbers are right there if more precision is needed. I don't know anyone who wouldn't do this normally.
I don't mind approximations or rounding unless they claim to be specific. The first link called a "full quarter." Twenty-four percent will never be a full quarter. I'm more than willing to say it's approximately a quarter. I mentioned the inaccuracy only because I noticed it after being told how I was using precise terms (which you later says have no established definitions) too generally.
It's incredible that someone, even a nut, could believe that. Haven't they heard of the effect of martyrs? Don't they see how cops actually react when one of their numbers are attacked? I'd rather go beat on a bee hive.
|
0.999672 |
Q. What does LIS mean?
LIS is the acronym for Library and Information Services (LIS), the campus department responsible for library resources, as well as other information services for students, staff, and faculty, such as training on educational technology supported by the college.
|
0.999781 |
How does an e-mail reading work?
An email reading works the same way an in-person reading does. I meditate on the question while I draw the cards, then review the reading and interpret the results, finally I email the reading layout and the. Once you have the reading back you can email me again with any further questions you might have about that reading. A reading is usually designed to look at a major concern and any of the connected minor areas of concern as well.
The type of readings I do look at more immediate concerns, than such issues as "what will my life be like in 10 years?" Depending on the question, readings usually concern events that take place over several months to a year. Readings can show areas that may need to be looked at more carefully, like health, money or relationship issues, or events that might not pan out as you had hoped for, as well as looking at areas when you can best expect to succeed. But time and the future are fluid constructs that can change as events unfold, so I am usually not able to see things (thankfully) like when someone will die.
I do a reading based on the specific questions asked for by the client. Sometimes when I send the reading back to the client and the client has time to read through it, they have questions pertaining to the reading's original question. For example, say they had a question about a relationship. Once they received the reading, they perhaps didn't understand a point or two, or wanted to look at a certain aspect of that reading in more detail, then they email me their follow-up question and I will consult the reading to answer that question in more detail. Sometimes clients won't have follow-up questions for days, weeks or (in some cases) even months after the original reading. There is no extra charge for this - it is part of the original reading fee. If they have an entirely different question, say they wanted to know about a missing heirloom, then that would require a new, separate reading.
|
0.987123 |
A certain business spends 1/2 of its revenue on payroll, 1/4 on inventory, and 1/5 on healthcare. If the remaining $200,000 of revenue is issued as dividends, what is the business's total revenue?
To get a better idea of what's going on, let's rewrite the 3 fractions (1/2, 1/4 and 1/5) with a common denominator (20).
We get: A certain business spends 10/20 of its revenue on payroll, 5/20 on inventory, and 4/20 on healthcare.
So, we have accounted for 19/20 of the revenue.
In other words, 1/20 of the revenue is not accounted for.
This question can be solved by TESTing THE ANSWERS.
We're told that a business spends 1/2 of its revenue on payroll, 1/4 on inventory, 1/5 on healthcare and the REMAINING $200,000 is issued as dividends. We're asked for the business's TOTAL revenue?
Total = $3.8 million, which leaves $200,000 for dividends. This is an exact match for what we were told, so this MUST be the answer.
Yes, it's C. Edited the OA. Thank you.
the quickest way is to put everything in fractions, or even decimals..
remaining, 0.05 of revenue is 200,000.
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.