proba
float64
0.5
1
text
stringlengths
16
174k
0.986854
This article explains that Glenn Ford spent thirty years on death row summary in the punishment of crime committed by another person in Louisiana. Marty Stroud investigated about the murder of the local jeweler named Isadore Rozeman, who had been robbed and murdered. Marty Stroud said that “Glenn Ford” did the murder. Glenn Ford was the worker of the Isadore Rozeman and he always worked hard for him, he was also known as a thief. Marty Stroud decided charge Ford with murder because he knows that a conviction can boost his career. According to Marty Stroud, he was narcissistic, arrogant and coward. As there were no African American were on the jury, the white American were on the jury, as Marty Stroud know that Ford will be given the punishment because a black man killed the white victim. In Louisiana notorious Angola, Ford spend his 30 years of life on the death row, the 30 years means about the half of the life, according to that Stroud took his and his family life, he will never forgive him. A man named Jake Robinson revealed in the information he was giving to the police that he had killed the jeweler thirty years or three decades earlier. He is in the prison now, as his charge for another murder. After the Ford was released, the good feeling did not last because he comes to know that he had lung cancer and it is on stage 4. He was told by the doctors that he have very few month to live, Ford start live in the home for released prisoners, in New Oreland. According to the Dale Cox “It’s better than dying there and it’s better than being executed” (Whitaker, 2016). The society needs to focus on the decisions of death rather than the death penalty. According to the Louisiana law, the Ford was entitled to give the $330,000; about $11,000 as there was, wrongful imprisonment was on him and he receives the money for the 10 grandchildren so they could get the better chance in lives.
0.999992
I had intentions of checking out The Abbey, in Washington Square, Brookline, but every table was taken when we arrived. Instead, I meandered over to Burro Bar, a Mexican joint that was nearby. The vibe of Burro Bar is peppy and modern. Blasting Drake or Lupe Fiasco and the place is full of 20-somethings who love margaritas. Bright colors, contemporary restaurant furniture, and lights echo the vibe. In terms of food selection, this place has tacos like you’ll never see. I mean, try finding beef tongue tacos anywhere else in the Boston. Before dinner, we were served a starter of chips and salsa. You get a fair amount of chips. The salsa definitely had some kick to it, so if you don’t like spicy foods this may not be for you. Now for the important part: the tacos. The size of the taco is bigger than I expected but you only get one per order And for $7-8 it’s not cheap for the amount you’re getting. I went with the crispy baja style fish taco – a taco loaded with fresh savoy cabbage, doused with a jalapeño slaw, baja mayo and topped with cilantro. It was melt-in-your-mouth good. While my taco was delicious,short rib double stack – which featured a hard taco held within a soft taco. In addition to beef carnitas, it also featured tres quesos, beef carnitas, poblano + onions, oregano, Mexican crema, and cotija. TL;DR All in all, Burro Bar is Mexican eatery that features a menu with creatively stuffed tacos & a large tequila selection in a colorful, eclectic atmosphere.
0.987744
“50 people killed in the attacks…” I freeze. We’re in the car with the radio on and I’ve forgotten to switch the channel from the morning news. I’m wondering if my kids are listening to the story as the reporter continues talking. Should I change the station? Or will that draw even more attention? I hope that there isn’t too much graphic detail, and heave a sigh of relief as the report concludes without any questions from the backseat. Then I feel guilty as I think about how much I’m worrying about shielding my kids from information that so many members of our neighborhood and community cannot avoid. It’s a dilemma that’s all too familiar for parents—hate and violence in the news, confronting us again and again with how to explain terrible things to our children. It’s natural to feel overwhelmed, but especially when we are faced with attacks on our most cherished values, it’s important that we talk to our kids. We have to reaffirm our commitment to diversity and inclusion in our communities, and make sure that our kids hear us loud and clear. Often we can’t control what information children might learn, but we can affect how they process that information. So whether your child is asking questions or not, it’s important to be intentional and address the news honestly and promptly. First, think about what kind of information is age-appropriate, and realize that you can give your kids an accurate account without committing to an in-depth history lesson or complex philosophical discussion. Preschoolers will not appreciate nuance, so keep the conversation limited to a few specific, but non-graphic facts. Older children may have questions about why a person might target someone just because of their race and religion, and it’s okay to go deeper into the discussion, but you don’t have to explain everything in one sitting. You should assume that you will be revisiting these topics again in the future, and will be building on the conversations you are having today. Keep in mind that kids of all ages benefit from reassurances that you and other adults in their life are working to keep them safe. Tell them that if they ever have questions about scary or sad events they should feel free to talk to you. Next, look for ways you and your kids can take action. Maybe it might be something personal, such as making a resolution to learn more about the history of a persecuted group. Or maybe it might be more outwardly focused—the desire to reach out is one that should be embraced, and even just sending a letter of solidarity can help heal a community that is in pain. Tragedy is not something that can be solved, but re-establishing a sense of agency can help parents and kids avoid getting caught in a loop of outrage and despair. Finally, realize that conversations about how to deal with hate and violence should be ongoing. It is important to address negative stories in the moment, but we must be intentional about the messages we are sending to our kids, rather than letting happenstance frame the issues for us. By talking to our kids regularly, we can address the environment in which we present these issues, and make thoughtful decisions about how much information to cover. We can calmly articulate our values outside the heat of the moment and provide space for our kids to process in the way that fits them best. We can focus on what it means to live in an inclusive, just society, and show how our positive values push back against the negative forces of bigotry. There’s no shielding kids from all the hurt and hate that is in the world, but we can practice and learn together so we can be more brave and better prepared the next time a terrible story comes on the radio. Older PostVideo Series: K&R Director Jasen Frelot on "What is a Child?"
0.966465
The second law of thermodynamics has been expressed in many ways, but it basically means that every ordered system will break down into a disordered state in a process called entropy. This principle is credited to the French scientist Sadi Carnot, who in 1824 showed that there is an upper limit to the efficiency of conversion of heat to work in an engine. This principle eventually led to the concept of the asymmetric arrow of time, which states that once an event has taken place, it cannot be reversed. Generally, we observe entropy at work every day. A spilled cup of coffee cannot be made to refill, and you cannot put back a broken egg. However, if the second law of thermodynamics was valid in all conditions, the universe as we know it could not exist. Cosmologists have difficulty explaining the behavior of the observable universe and the working of entropy. Many of them ignore the problem by saying that galaxies and stars have evolved from a low state of entropy, which means a more ordered state, and that contradicts what we see. An image of the cosmic background radiation that represents low energy photons that have decayed from the Big Bang is a random assembly of energies, which confirms that the Big Bang was a highly disordered system, a soup of energetic photons. The early universe was in a state of maximum entropy. It could not become more disordered. But as the universe expanded and cooled, this chaotic system gradually became more ordered, giving rise to fundamental forces, quarks, protons, neutron, and electrons, which coalesced into elements, molecules, and dust that coalesced into stars and galaxies, all highly ordered systems. Granted, once these organized systems formed, they became subject to entropy. Cosmologists and theoretical physicist talk learnedly about the second law of thermodynamic and the arrow of time, but they have failed to explain the tendency of chaotic systems to become ordered. Gradually, some understanding of this process is beginning to emerge from the theory of chaos, first advocated by Edward Lorenz in 1961. In common usage, ‘chaos’ means ‘a state of disorder’, which neatly explains the early universe. Such systems are extremely sensitive to minute influence in initial conditions, and in the early universe, gravitational fluctuations and variations in matter and energy, set the parameters that gave rise to more ordered states, or levels of low entropy, in apparent violation of the second law of thermodynamics. Will this apparent contradiction be eventually resolved? Probably, but it will take the unification of quantum mechanics and the general theory of relativity that deals with gravity.
0.999998
Haiti is the top country by depth of the food deficit in the world. As of 2016, depth of the food deficit in Haiti was 546 kilocalories per person per day. The top 5 countries also includes Zambia, Central African Republic, Democratic People's Republic of Korea, and Namibia. What is depth of the food deficit? The depth of the food deficit indicates how many calories would be needed to lift the undernourished from their status, everything else being constant. The average intensity of food deprivation of the undernourished, estimated as the difference between the average dietary energy requirement and the average dietary energy consumption of the undernourished population (food-deprived), is multiplied by the number of undernourished to provide an estimate of the total food deficit in the country, which is then normalized by the total population.
0.996648
No one likes fruit flies. They're those little pests that fly around your garbage or decaying food. Scientifically speaking, this species of fly is referred to as Drosophila melanogaster. South Florida is dealing with these nasty critters in swarms; masses of little fruit flies that could cost the state up to $1.6 billion. State officials have quarantined 85 miles worth of agricultural spaces due to the flies attack on a variety of 400 crops. Officials found 160 oriental fruit flies in Redland, in Miami-Dade County, South Florida, which is now under quarantine until January 2016 and will cost the county up to $700 million if the problem can't be solved. There have been 75 fruit fly incursions in Florida since 1999. Fortunately, this has left the team prepared for future problems. Florida officials have decades worth of science, research and experience in dealing with fruit flies. This time, irradiation is one of the tools that will help protect Florida farmers from a disaster. Read more below. FEATURED ARTICLE: Florida fruit fly outbreak; Irradiation helped "save the day"! The Oriental Fruit Fly is considered one of the most aggressive insect pests in the world. DADE COUNTY, FLORIDA: In August, an outbreak of oriental fruit flies was discovered in southern Florida. This is the largest outbreak in Florida's history. More than 85 acres of crops have been quarantined and the livelihood of hundreds of farmers has been threatened. The outbreak has the potential to seriously impact Florida's $1.6 billion agriculture industry. The oriental fruit fly is blamed for heavy damage to mangoes in the Philippines and citrus in Japan, and was first detected in mid-August when a single male turned up in a trap in a tropical almond tree east of the Redland. Within two weeks, another fly popped up more than 13 miles away, followed by an even more alarming catch: 45 in a single trap. Since then more than 100 additional insects have been discovered. Considered one of the world's most aggressive fruit flies, the pest attacks more than 430 different fruits, vegetables and nuts, including avocados, mangoes and tomatoes. The outbreak has the potential to devastate Florida's $1.6 billion agriculture industry. While the fly has been detected -- and contained -- about 10 times since it first appeared in Florida in 1964, numbers never amounted to more than a dozen or so at a time. Several Florida growers are now processing their product at Gateway America using irradiation as a phytosanitary treatment. Gateway America, the growers, APHIS, and the various states involved worked together to get through the paperwork and logistics virtually overnight to use irradiation to handle this emergency. Irradiation has saved the day for various growers to date and potentially more to come. This is potentially setting the pattern so that future "emergencies" may be partially mitigated using irradiation. to irradiate their final packaged product to minimize the health threat of food borne pathogens for their customers. Do they become a Food Irradiation company? No, they are still a Meat Processing company. MIAMI: More oriental fruit flies have been found in Florida's Miami-Dade County, but state and federal efforts to combat the outbreak are working and shipments from a quarantined area are set to resume. The number of flies found had risen to 159 as of Sept. 22, according to a news release from the Florida Department of Agriculture & Consumer Services. The first flies were found in mid-August. The department responded by quarantining an 85-square-mile area around the areas where flies were found. On Sept. 15, the agency declared a state of emergency. Avocados, mangoes and papaya are among fruits hit hardest by the pest. The quarantine, as well as spraying, trapping and other efforts by both the department and the U.S. Department of Agriculture were paying off as of Sept. 22, Adam Putnam, Florida's commissioner of agriculture, who visited the county to meet with growers and other industry members Sept. 21, said in the release. One grower-shipper, Miami-based J&C Tropicals, expected to resume shipping dragonfruit and other commodities from the quarantine area Sept. 25 or Sept. 26, said Salvador Fernandez, the company's vice president of operations. "We're working with the USDA to complete the protocol for irradiation," Fernandez said Sept. 23. "We're very confident. We've got a good operation set up. But there are some unknowns. This is our first time doing this." Shippers who source from within the quarantine zone have two options, Fernandez said. One is to follow state and federal protocols for spraying and testing, a course of treatments that runs 30 days. Because that protocol was announced in early September, Fernandez hopes to be able to ship again via that option by early October. A second alternative is to submit to a more rigorous protocol, which includes having fruit irradiated, Fernandez said. That option allows shippers to ship sooner. J&C plans to do that for some dragonfruit, passion fruit and some other commodities, but the cost and complexity of the option prohibits the company from doing it for all of its fruit within the quarantine zone, Fernandez said. Many of the small growers J&C packs for in the area could be hit hard as a result. About 80% of the Florida-grown produce J&C ships at this time of year is grown within the quarantine zone, he said. "It's affected us quite a bit. Our locally-grown program is very important." As of Sept. 23, Fernandez was not aware of any fruit fly finds in any of its growers' fields within the quarantine zone. Homestead, Fla.-based Unity Groves Corp. sources avocados, dragonfruit, guava, star fruit and other fruits from the quarantine area, said Louie Carricarte, president. Fortunately, he said, the company has enough production of those fruits outside the quarantine area to supply customers. Also on the plus side, Unity Groves' packing shed is outside the area. That said, the quarantine has definitely had an effect on volumes, though Carricarte couldn't give an estimate. "It's had a pretty negative impact. Everything that was ready for harvest is basically a loss." Unity Groves is participating in the spraying protocol and hopes to be able to ship again from inside the quarantine area by the second week of October. As of Sept. 23, the company was not shipping irradiated fruit because of the cost, Carricarte said. Oriental fruit fly outbreak is a serious threat to Florida's multi-million dollar agriculture industry. Aerial pesticide spray may be the next step in South Florida's fight against the Oriental fruit fly, Florida Commissioner of Agriculture Adam Putnam told a crowd of nearly 100 farmers Monday in Homestead. Still at question is when to spray. Many of the growers Monday, whose tomatoes, avocados, strawberries and other crops are threatened by the invasive fruit fly, questioned why spraying will not begin immediately. Putnam said the state will likely begin aerially spraying GF-120, an insecticide approved for organic farming, which he called the "last, best bullet in the gun." But angry growers, concerned about their livelihoods, grilled the commissioner. They want spraying done before the fly spreads any farther than the 85-mile quarantine in Redland, Florida. "It's ludicrous we haven't already begun arial spraying," one grower said. "If this thing isn't controlled, you'll destroy a county." Dr. Trevor Smith, division director of plant industry at the Florida Department of Agriculture, told the crowd that aerial spraying wouldn't eradicate larvae already in crops, so scientists are sticking with the current pheremone and insecticide-laced traps for now. Putnam said he sent a team to Washington, D.C. to negotiate with the Environmental Protection Agency for clearance to use the pesticide Malathion for hand-spraying crops before harvest. Malathion was aerially sprayed to fight Mediterranean fruit flies in outbreaks in California in 1989 and Hillsborough County in 1997. In large doses, Malathion can cause nausea, dizziness and confusion, but the EPA has approved the pesticide for aerial spraying over residential areas for insect control. "They will cut and paste the protocol they have for Malathion in California and give it to us," Putnam said. But, he noted, the California protocol doesn't include every crop grown in South Florida. Putnam said those exceptions are being negotiated and could be approved "as early as next week." Organic farmers at the meeting expressed concerns about the spraying of Malathion, which would invalidate their organic status and put them out of business for at least three years, according to one grower. What Putnam called "by far the largest outbreak we've had in this state's history," could seriously impact the $1.6 billion agriculture industry in Miami-Dade County. Scientists found one fruit fly since the state of agricultural emergency went into effect Sept. 15, bringing the total count to 159 flies in the South Florida outbreak. Growers have signed compliance agreements, which signal their willingness to aid the state eradication effort. This includes spraying their crops with insecticide every six to 10 days and potentially destroying infected crops. More than 8 tons of fruits and vegetables have been destroyed so far as a result of the South Florida outbreak. "We have zero flexibility to help if we don't have that compliance agreement in place," Putnam told the crowd. Joe DeSousa, a farmer with land in the affected area, asked Putnam if there was any compensation planned for the farmers who lose their livelihoods in the eradication effort. "Not so much for profit," DeSousa said. "But for investment in the next round, we plant. We're dying down here." Putnam acknowledged there was nothing in place but didn't rule out future compensation. Paul Hornby, state plant health director for the U.S. Department of Agriculture's plant protection and quarantine, said Florida has had 75 fruit fly incursions since 1999, leaving his team well versed in the procedures. "We are good at this," he said. "We have decades worth of science, research and experience." Other methods of attack include post-harvest irradiation. So far, only a single shipment of possibly infected dragonfruit was sent to Mississippi for irradiation. Putnam mentioned he was negotiating with Food Technology Service Inc, a medical irradiation plant in Mulberry, Florida, to take on crop irradiation if need be. If no additional flies are found, the quarantine is set to end Jan 18. "I hope we're not dealing with this a year from now, but we will be dealing with this 120 days from now," Putnam said. U.S. Department of Agriculture Agricultural Research Service (ARS) scientist Peter Follett has been working for nearly 20 years to develop and expand the use of ionizing radiation to control insects that infest a range of agricultural commodities so that Hawaii can safely send these products to the U.S. mainland and export them to foreign countries. Hawaii currently irradiates a number of crops it exports, including papaya, mangoes, bananas, dragon fruit and longan, a small circular fruit grown by the tree of the same name. Most recently, Follett and his colleagues have worked to develop irradiation protocols to use on insects that infest Hawaiian commodities such as coffee and ornamental flowers. They have also been working to protect others, such as table grapes and a variety of berries grown in California. "[Irradiation] is the most prominent technology that we're using to export fruit to the U.S. [mainland] from Hawaii," Follett, who works at the U.S. Pacific Basin Agricultural Research Center in Hilo, Hawaii, said. Since starting work for the ARS, Follett has helped develop irradiation techniques to control a range of agricultural pests, including the mango seed weevil, the oriental fruit fly, the Mediterranean fruit fly and the melon fly.
0.999971
1944. Image of Robert Lee Rutledge. Only when we find never-before-read letters, yellowed by time, do we truly treasure the written word. Through the legacy of letters given to her recently by her mother, Ginger Gregory has come to finally know her father. These frozen-in-time letters contain correspondence between her father and those he loved. Because of these precious letters, a world unknown has been unlocked. and he answered. Only twenty-seven when he enlisted, he had everything to stay for; a beautiful wife, then twenty-four, two precious children, and a loving family. He had everything to go for; a country embroiled in a fight whose outcome would determine dictatorship or freedom. His was the call of freedom that every young man hears in time of war. Requesting release from the Georgia Guard, Robert Rutledge stood ready. Discharged from the Guard, on November 21, 1942, he entered active military service on March 23, 1944. His release papers spoke of the character of the soldier&emdash;excellent. As part of entering service, the Veterans Administration issues a $10,000 life insurance policy on April 15, 1944, "payable in case of death." He had no idea that policy would be paid. When he left his family, he left them in the care of his older brother, Jay; the same brother who had bought him a car, even before buying one for himself. Jay, along with the rest of his family, would make that trip to Fort McClellan, Alabama, to visit Robert during those seventeen weeks of training. the car. Marguerite replied, 'We would do anything to see your dad, even for a few short hours." Sacrifice came early to these war families. Gas was rationed, but many family members and friends gave their gas ration coupons so that the family could be with their young soldier. Seeing their father in uniform, Ginger, four, and Bubba, two, were so impressed that they often donned their own military uniforms and played "soldier." Memories of their dad sustained the children while he was gone. nights the children would ride on their dad's shoulders while he chanted, "I see the moon and the moon sees me; God bless the moon and God bless me." Did Robert Rutledge softly repeat these words when he saw the moon so far away from home, so far away from his adorable children? After the seventeen weeks of training, Rutledge was sent to Fort Meade, Maryland, where he remained for a short time before being shipped overseas in September of 1944. It was on that trip home for the last time that Robert exacted that pledge from his brother Jay; the promise that he would care for his family should he "not make it back." If the family were staying at the Cannington grandparents, Marguerite's parents, Jay would drive over with his letters, and the family would gather around, hanging on every word. Faithfully, mother, mother-in-law, and Marguerite wrote every day. Recently, I sat at my desk for hours, reading the letters and documents that Robert Rutledge's family has cherished for over half a century. These pieces of family history unlocked for me a man, a family, a story that will be with me forever. Love shines through sacrifice. Bits and pieces of the puzzle slowly came together to paint a picture of a man, ordinary in beginning but extraordinary in ending He typifies each man who heard the call of country. When that dreaded telegram was placed in the hands of Marguerite Rutledge. she wept the tears of every young woman, widowed by war. In Ginger's words, "I remember well the day a man came to our house to deliver a telegrams The man looked so sad when he handed the telegram to my mothers One by one, they read the telegram and wept. They didn't tell my brother and me that our daddy was 'missing in actions' I suppose we were too young, they thought, to understand." The date was November 13, 1944. On March 19, 1945, another telegram came confirming his death on October 29, 1944. Robert Lee Rutledge joined the 292,130 other American men who fell in World War II. Georgian, son, husband, father, soldier, dead at twenty-seven, ten days after his wife turned twenty-five, less than two months before his twenty-eighth birthday. In a muddy field in Holland, first mourned as missing in action, later confirmed dead, Robert Rutledge had paid the ultimate price-his life. Deep down, in Ginger's words, she still had a burning desire "to know him&emdash;to know what he liked, disliked&emdash;to know his favorite colors and books and all the individual hopes and desires of my fathers" In early September 2001, she got that chance when her brother passed to her the worn duffle bag containing all of her father's belongings from the war. Opening the letters, she began hungrily reading, laughing and crying at intervals. The letters from November 1944 to March 1945 were never opened since the family continued to write, not knowing that he had fallen in battle the end of October. Among the letters was an unfinished letter written by Rutledge, called out to the battlefield, never to return. Dated October 19, 1944, it wa a letter to his wife on her twenty-fifth birthday. What sweet memories I have today It carries me back five years ago. We thought we were as happy as could be until God sent you down to us. You'll never know how proud I am of you. I've always, since that day, done everything possible for your benefit. I never dreamed of being away from you as I am now. You are too young to understand it now, but you will later It's all for your benefit. You came into a free world, and I want you to finish in one. "Your husband gave everything he had to his country. It is my hope and prayer that we who are spared will do everything within our power to see that his great sacrifice was not made in vain." For years, the children basked in the love generated by family and others who loved and protected them. Ginger recalls that when she was twenty-one, her paternal "GramMama" handed her a yellowed envelope inscribed in her own handwriting: "For our Dear Darlings to read when they grow up." For the first time, Ginger read the newspaper articles of her father's death. Now entrusted to Ginger's care, she has saved the letters to pass on to her grandchildren and those children yet unborn&emdash;in the words of Ginger, "to know that their greatgrandfather gave his life for the freedom of all." Marguerite Rutledge had a choice to make: bring her husband home or leave him to be buried in the land where he fell, giving his blood for the cause of freedoms After much anguish, she decided he should remain where he fell. In 2003, Marguerite will be eighty-three, and she, along with Ginger's family, is planning a trip to visit the grave of Robert Lee Rutledge for the first time. They hope to see the Dutch family who has lovingly cared for his grave all these years&emdash;a small tribute for a life given to strangers. Words are not real until they are lived. To say one is willing to give his life for his country is one thing; to give one's life is another. Take any war, take any country, take any young man&emdash;death is no different in another time or another place. Robert Lee Rutledge knew the price of freedoms He said the words, and then he gave his utmost, his life. Editor's Note: Today, Americans and Bulloch Countians are again deeply and painfully aware of the price of freedom. Although the pain may fade with time, the memories of loved ones who give the ultimate sacrifice to preserve our way of life stay alive within us forever. Our hearts will travel with Marguerite and Ginger as they finally kneel at the grave of their husband and father, a family together again. Janet Burke is a freelance writer and former English teacher at Statesboro High School. The preceeding is from an article that ran in the Summer 2002 eition of the Statesboro Magazine, Vol. 3, No. 2. Permission has been kindly given by the magazine editor -- Ms. Andrea Powell, of the Statesboro Magazine, the freelance article writer, Ms. Janet Burke, and the daughter of Robert Lee Rutledge, Ms. Ginger R. Gregory,to World War II Stories - In Their Own Words for our use of the article on our website. Interested in more details with regards to a daughter's quest to learn more about her Dad who was taken away from her in the prime of this life? Read Robert Lee Rutledge's story.
0.999999
Push mowers use only muscle for fuel. Few deny that the earth's climate is changing, but many disagree about the cause. If human actions contribute to global warming, then people can take steps to help stop it. The U.S. Environmental Protection Agency links greenhouse gases, such as carbon dioxide, methane, nitrous oxide and certain propellants, to global warming (see References 1). Choices you make that result in lower production of greenhouse gases, combined with the choices of others, may ultimately put the brakes on global warming. Reducing the amount of solid waste is an active way to help cut back on greenhouse gas emissions. Solid waste is any solid, discarded material, including what fills your trash bags on trash collection day. Solid waste is typically transported to a facility for incineration or burial. Trucks that transport waste generally use fuel that emits carbon dioxide. Burning waste also produces carbon dioxide, and waste that decomposes in a landfill creates methane. (See References 1) When you can, repair items instead of throwing them out. When you can't repair, consider the item's potential for a different use. If it is beyond repair and you can't find a use for it, try recycling it or donating it to a charity. When working outside your home, avoid equipment that uses fuel and produces carbon emissions - even electric equipment (see References 2). Prune trees and hedges with manual tools instead of their powered counterparts. If your yard is not excessively large, mow with an old-fashioned push mower, still manufactured today, instead of a gas or electric model. Use gardening shears and manual lawn edgers instead of powered weed trimmers. If you grow a vegetable garden, prepare the soil with shovels, rakes and hoes instead of a gas-powered tiller. In the short term there might not be a way to stop it. But if we learn to conserve energy and find better sources for it we can. What is global warming article? The Climate Group is an independent, nonprofit organisation dedicated to advancing business and government leadership on climate change. It is based in the UK, the USA, Australia and China and operates internationally. @GabrielGraySy Will you stop doing that? There's enough problems with global warming okay?
0.999449
Highlight your special skills when writing a speech to be elected school class secretary. Running for student council is a productive way to get involved at your school. To be elected, you'll need to deliver a speech convincing classmates you're highly motivated and qualified to represent them. Writing a speech for any student council position is similar, but if you want to be the class secretary, you need to highlight specific skills. Here are guidelines for writing an effective speech for class secretary. Determine how much time you have to make your speech. Most election speeches are no longer than a few minutes, but ask a school election advisor for guidelines. Write down the list of duties for class secretary and how your experience and skills match that position. For example, if being class secretary means you attend events and take pictures, state your camera and photo editing knowledge. If you'll be required to take accurate notes and submit reports to teachers, highlight your good grades in English class. Write an outline for your speech to include an introduction, body, and conclusion. Start your speech with an attention-getter in the introduction. This can be a statistic, anecdote, or rhetorical question. State your name, grade level and the position you are campaigning for. Tell the audience what you plan to say in your speech. For example, you might say, "I'm John Doe, a 10th grader, and I'm going to tell you why I'm right for the position of class secretary." Write three to seven main ideas in the body of your speech. The main ideas should include reasons why you should be class secretary and your goals for the school. Use the list you made previously to explain the duties of class secretary and how your skills match. You can explain why you are better suited than other candidates, but do not criticize your classmates. Keep the tone positive and polite. Do not make campaign promises you can't keep. Summarize your main points in the conclusion. State clearly why you want the position of class secretary. Leave the audience with a lasting memory. This can be a call to action or short anecdote. Do not introduce any new information. Conclude by thanking your audience. Practice your speech in front of a friend or family member to get feedback and ensure you are within the time limit. Write speech notes on index cards, but do not read from them while giving your speech. On speech day, make eye contact with your audience and smile. Don't go over the allotted time for your speech. It's bad etiquette and you may take time away from another student. Who Was the President That Held Two Terms in the 1950s? Richardson, Mary. "How to Write a Speech for Class Secretary." Synonym, https://classroom.synonym.com/write-speech-class-secretary-7783122.html. Accessed 25 April 2019.
0.95807
How to maintain controllable fleet operating costs—assessing the cost of preserving assets and rightsizing the fleet to ensure optimal cost-efficiency, all while improving management and efficiency—is an important conversation for construction organizations. How to reduce fuel use and costs should also come into play. The answer is simple: Excessively high fuel costs cut into profits. While fuel is a consistent overhead cost and is likely to fluctuate, construction fleets are now stabilizing fuel spending by using technology to optimize their use of it. Organizations that believe their fuel costs are higher than they should be must work to better understand their baseline costs and potential areas for savings. Do this by focusing on a few aspects. First: dive into the fuel itself and the options available to power the fleet. Second: use fuel management technologies to track fuel spending, correct driving behaviors that increase fuel expenses and monitor fuel card transactions to identify fraud. Third: identify specific challenges that increase fuel costs for the fleet and make connections with the data to solve these issues. Gasoline—Gasoline is the most commonly used fuel for vehicles and is the least expensive. The three main grades of gasoline include regular, midgrade and premium. Diesel—According to the United States Energy Information Administration, “Diesel fuel powers most of the construction equipment in the U.S. Diesel engines can do demanding construction work, such as lifting steel beams, digging foundations and trenches, drilling wells, paving roads, and moving soil safely and efficiently.” Though it retails at a higher price point than gasoline, the higher power-to-weight ratio of diesel offers better fuel economy. Hybrid—Hybrid vehicles capture energy for their batteries through regenerative braking and use the energy to provide power to the wheels, reducing emissions and improving fuel economy tremendously. Hybrids still rely on either gasoline or diesel to generate power. Electric—Electric vehicles run 100 percent on electricity supplied from a rechargeable battery, offering a clean form of transport, completely absent of tailpipe emissions. While fuel and energy-efficient vehicles are likely to gain popularity for commercial fleets in the coming years, construction fleets are dominantly utilizing gasoline and diesel in today’s current landscape. While the cost of fuel will vary relative to the real or expected demand or consumption, it’s common for fleets to use an unnecessary amount of fuel if they are not monitoring it. Using fuel-management technologies allows construction organizations to achieve significant savings. Some of the most common ways fleets use telematics and fuel-card systems to reduce fuel use are increasing route efficiency, reducing excessive engine idling, coaching drivers on more efficient driving, and identifying fuel-card fraud. Taking the scenic route to jobsites not only wastes time, it also extends the time of use of the vehicle, increasing the fuel it takes to operate it. To avoid the unnecessary fuel expenses that route inefficiencies cause, construction fleets are using telematics to ensure drivers take the best route to every jobsite, with the shortest and quickest distance between locations. Along with proactively sending drivers on the best routes, reviewing the historical routes taken provides insight into potential fuel savings. The worst mileage a vehicle gets is during idle times. Reducing excessive idling is one of the fastest ways to reduce unnecessary fuel costs. Paying attention to idle reports and alerts allows organizations to act as soon as vehicles or equipment surpass acceptable thresholds. In doing so, West Coast Sand and Gravel, a construction materials delivery fleet, was able to reduce fuel usage by 5,205 gallons and costs by 37 percent, saving the organization over $18,000. In addition to the safety implications of monitoring driver behavior, telematics can be used to review inefficient driving and identify potential fuel savings. According to the U.S. Department of Energy, aggressive driving wastes gas and lowers gas mileage by roughly 15 to 30 percent at highway speeds and 10 to 40 percent in stop-and-go-traffic. Using driver behavior data for coaching helps reduce speeding, rapid acceleration and harsh braking, while diminishing excessive fuel use in the process. Telematics can send alerts directly to drivers, helping managers by proactively correcting these behaviors. Using telematics to report fuel-card transactions provides driver and vehicle information, fueling location, date and time, and the number of gallons pumped. One of the main data points in this reporting displays the fuel capacity of the vehicle compared with the amount of fuel pumped, allowing for quicker fuel-card fraud identification. If a higher number of gallons are pumped than the vehicle’s tank can hold, it can indicate that the person pumping gas was filling up an unauthorized vehicle. Another important piece of information revealed in this reporting is the location the fuel card was used compared to where the vehicle of the associated card was located at the time. For example, if the fuel card was used at a gas station, but the vehicle was still parked in your yard, the fuel card was potentially stolen or being used for nefarious purposes. Does our organization review historical routes taken by drivers to ensure that they are the most efficient? What’s our policy for idling? How often are acceptable thresholds of idling surpassed? Who is our best driver? Who is our worst driver? What data are we using to coach drivers? Jenny Shiner is the marketing communications manager for GPS Insight. She graduated from Arizona State University with a bachelor’s degree in communication and is responsible for external marketing communications for all business segments that GPS Insight targets. For more information on telematics and fuel card technologies, visit gpsinsight.com.
0.986459
These pictures illustrate how much water is wasted from dripping or running taps. If you have leaks, have them repaired at once. Your water meter measures all water used, even steady drips, and you will be charged for the amount of water you use. A 1 mm stream* wastes 100 litres of water in 24 hours and 3,000 litres in one month. That's 660 gallons and $9.87/month. * approximate width of the tip of a ball point pen. Did you know... The average family of four in Canada consumes 30 cubic m³ (7,925 gallons) of water per month. Use your meter to find out how much you consume. Knowing how to read your meter allows you to monitor your water consumption and detect leaks in your plumbing. Your water meter reads in cubic metres: 1 m³ = 220 gallons. Your consumption is displayed much like the odometer on a car. Every 100 litres of water consumed causes the sweep hand to make one revolution, and causes the measured total to increase by 0.1 cubic metres (the black wheel on the odometer). Ten turns will move the first white wheel one increment. Write down your meter reading at a set time of the day. Write another reading the same time the next day. The difference is your water consumption for that 24 hour period. Turn off all water fixtures in your house, including humidifiers, air conditioners, and ice makers. Then watch the low-flow indicator on your water meter. If the red triangle is moving counterclockwise, you have a leak. Do not use the toilet as a wastebasket. Each time you flush, up to seven gallons are used. Place an item such as a plastic bottle filled with sand inside your toilet tank. This displaces water and can save gallons every day. Insulate pipes to get hot water faster, so less water is wasted. Install water saving shower heads or flow restrictions. Install faucet aerators, which will reduce water by mixing water and air. Taking baths uses less water then showers. Don't fill the tub more than necessary, and remember to stop the drain before running the water. Do not let the faucet run while shaving or brushing teeth. When hand washing dishes, rather than spraying or running the tap to rinse, use a pan of hot water which can later be used for plants or other cleaning projects. Keep grass 1 1/2" to 2" long to develop deeper roots which will require less watering. Sweep driveways, patios and walks with broom rather than hosing them down. To clean vegetables, use the sink or a bowl of water. Scrub with a vegetable brush and turn on the water for a quick rinse. Use steamers or cover food in a pan with a minimal amount of water. Use a tight lid to conserve moisture. Thaw frozen foods in advance in the fridge to eliminate thawing under warm water. Keep a container of water in the fridge rather than letting water run to get a cold drink. Always check for leaks in pipes, hoses, faucets and couplings. Buckets placed under down spouts can collect rain water for plants or cleaning projects. Use water from dehumidifiers for plants. Use a swimming pool cover to reduce evaporation by 90%. Approximately 1000 gallons of water evaporates from an uncovered pool each month.
0.999999
The 7th Training meets over a 3 1/2 year period, for 5 days each June and 3 days each February. It includes four private lessons per year, group work and choir. This advanced course is offered to those with previous study of Uncovering the Voice (such as attendance at an Open Course and/or private lessons with Christiaan). In this work, the process of singing is viewed holistically, with the aim of the natural opening and balancing of the voice. The singer is invited to move with confidence and joy towards discovering his or her own voice within the group and in private lessons. It is a gentle process and the voice is never pushed, but gently liberated through engagement and active participation. A wide range of specific singing exercises will be developed together with a comprehensive study of Werbeck's book. Christiaan has been teaching the singing training for twenty-one years in CA and this may be the last advanced training that he offers in California. If you have been considering this for awhile but putting it off until the future, Now is the Time. Please write a paragraph about why you would like to participate in the Training and email it to Sheryl at: healing.round@gmail.com. Upon acceptance into the Training, you will receive registration information.
0.990213
When did Amy Pond get swapped with a ganger? Scene that reveals Amy Pond as a "ganger" The exact timing of when Amy was taken by the Silence and swapped with a ganger has not to date been revealed. The closest clue we have is the Doctor said it happened "Just before America", referencing "The Impossible Astronaut". A clue for this is that Amy's shirt didn't change between "The Impossible Astronaut" and "The Almost People". Any scene that shows Amy's pregnancy fluctuating in the TARDIS scanner indicates that Amy was then a ganger. Amy may have been taken between the ending of season 5 and the beginning of season 6.
0.942627
Superior, Lake, largest freshwater lake in the world, 31,820 sq mi (82,414 sq km), 350 mi (563 km) long and 160 mi (257 km) at its greatest width, bordered on the W by NE Minnesota, on the N and E by Ontario, Canada, and on the S by NW Michigan and NW Wisconsin; largest, highest, and deepest of the Great Lakes , having a surface elevation of 602 ft (183 m) and a maximum depth of 1,302 ft (397 m). Lake Superior drains into Lake Huron through the St. Marys River and receives the waters of many short, swift-flowing streams including the Nipigon, Kaministikwia, St. Louis, and Pigeon rivers. The largest islands are Isle Royale, Isle St. Ignace, and Simpson and Michipicoten. The shoreline is irregular (with many large bays, inlets, and peninsulas) and in places is high and rocky. The waters of Lake Superior are generally purer than those of the lower lakes and are minimally polluted; a U.S.-Canadian pact (1972) was established to prevent pollution and to maintain and improve the water's quality. Lake Superior is part of the Great Lakes–St. Lawrence Seaway system, and it is reached by oceangoing and lake vessels through the Sault Sainte Marie Canals , which bypass rapids in the St. Marys River. The principal cargoes are grain, flour, and iron ore. The lake does not freeze completely, but ice impedes navigation from mid-December to the end of March at the lake's outlet and from early December to the end of April in harbors on the south shore. Fog and rough water are hazards. The chief Canadian cities on the lake are Michipicoten and Thunder Bay. The principal cities on the U.S. shore are Marquette, Superior, Ashland, and Duluth. Commercial and sport fishing are important; and tourism is popular in the lake area. Recreational facilities are found on Isle Royale (part of a U.S. national park), in Pukaskwa National Park (Ontario), and at state and provincial parks on the lake's shores and islands; the U.S. Apostle Islands and Pictured Rocks national lakeshores are there. Étienne Brulé , the French explorer, probably visited the lake in 1616; Pierre Radisson and the sieur des Groseilliers explored it in 1659–60; Father Allouez established (1665) a mission near Ashland; and the sieur Duluth visited the lake in 1678–79. See bibliography by Water Resources Scientific Information Center (1972).
0.937858
Traditionally, artificial intelligence (AI) studies assumed that the human brain manipulates symbols, and the models that these studies suggested for intelligency were based on algorithms manipulating symbols. Knowledge was represented explicitly. Negative aspects of these models were the fact that they could handle just coerent knowledge, while human knowledge is characterised by not being coerent. Models implemented to solve problems had to deal with combinatory explosion. Nowadays, AI focuses on cognitive systems using their intelligence to adapt to its environment. These systems still use symbolic representations, but these representations are not explicited, they emerge spontaneously from subsymbolic computation. Subsymbolism means that concepts, instead of being represented with a symbol (number, letter, word, phrase, memory adress, etc.), are represented with quantitive properties. The single quantitive property is just a sub-part of the representation of the concept, a subsymbol. Traditional AI assumes that our reasoning consists in handling symbols representing concepts, and identifies these symbols with our natural language. Subsymbolism is a valid alternative to this assumption. Concerning neural networks, the subsymbolism paradigm stresses the importance of distributing representations on multiple units. This means for example that, if a concept has a certain property, this property is not represented by the activation of one unit, but by the activation of multiple units. genetic algorithms are inspired on the evolutionary laws of Darwin and Lamarck. The dualistic vision states that mental activity takes place on a different level than the level of the physical structures of the brain and its environment, and that these two levels are scarsely interdependent. The emergent vision, instead, states that mental activity emerges from the physical structures, and is strictly dependent from them. Mental activity is a result on macroscopic level of the activity on the microscopic level of physical brain structures. The symbolic level emerges from the subsymblic level. One important distinction between traditional AI and today's AI is that, while in traditional AI systems the symbolic level is the only level present, in connectionist systems the symbolic level is absent when the system is in its initial state (state 0 in dynamics theory), and emerges from the subsymbolic level when the system creates its representations. Emergentist and dualistic vision are not new phenomena, Aristoteles can be considered an exponent of the emergentist vision, while Plato shared the dualistic vision.
0.999843
Hands down the best written book I've read so far this year. This book was awesome. It was graphically violent and some parts were pretty disturbing. It was like a train wreck though, I couldn't stop reading. I'd be reading with my mouth hanging open, screeching "oh my god", peeking between my fingers because I kept covering my eyes. Read this one during the day. I found Pollock's writing style to be somewhat reminiscent of Stephen King's. The both have a really great way of introducing a character, telling a backstory that may or may not matter in the grander scale of the story, but it made you care about and love (or hate) the character. This writer had an excellent ability to tie all his stories together, to intertwine all the characters' lives, and bring everything to a satisfying conclusion. I've been telling everybody about this book. I highly recommend this one. It's dark and violent, so if that's not your cup of tea, skip it, otherwise read it!
0.999975
Suppose you randomly roll a coin (with radius ) across a chessboard (with squares with sidelength ) many times. What proportion of the time will it land covering a corner of one of the squares? To cover a corner, the coin's centre must be less than the length of its radius away from the corner. As the coin is equally likely to land with its centre in any position in the square, the probability it will land with its centre in the shaded region and hence cover a corner is the ratio of the coin's area to the area of a square on the board: , where is the radius of the coin and is the sidelength of a square of the chessboard.
0.953785
Associazione Sportiva Roma (BIT: ASR, LSE: 0MT1; Rome Sport Association), commonly referred to as Roma [ˈroːma], is an Italian professional football club based in Rome. Founded by a merger in 1927, Roma have participated in the top-tier of Italian football for all of their existence except for 1951–52. Roma have won Serie A three times, in 1941–42, 1982–83 and 2000–01, as well as winning nine Coppa Italia titles and two Supercoppa Italiana titles. In European competitions, Roma won the Inter-Cities Fairs Cup in 1960–61 and were runners-up in the 1983–84 European Cup and the 1990–91 UEFA Cup. Fifteen players have won the FIFA World Cup while playing at Roma: Ferraris, Guaita and Masetti (1934); Donati, Monzeglio and Serantoni (1938); Bruno Conti (1982); Rudi Voller and Berthold (1990); Aldair (1994); Candela (1998); Cafu (2002); Daniele De Rossi, Simone Perrotta and Francesco Totti (2006). Since 1953, Roma have played their home matches at the Stadio Olimpico, a venue they share with city rivals Lazio. With a capacity of over 72,000, it is the second-largest of its kind in Italy, with only the San Siro able to seat more. The club plan to move to a new stadium, though this is yet to start construction. The club's home colours are Tyrian purple and gold, which gives Roma their nickname "I Giallorossi" ("The Yellow and Reds"). Their club badge features a she-wolf, an allusion to the founding myth of Rome. A.S. Roma was founded in the summer of 1927 when Italo Foschi initiated the merger of three older Italian Football Championship clubs from the city of Rome: Roman FC, SS Alba-Audace and Fortitudo-Pro Roma SGS. The purpose of the merger was to give the Italian capital a strong club to rival that of the more dominant Northern Italian clubs of the time. The only major Roman club to resist the merger was Lazio because of the intervention of the army General Vaccaro, a member of the club and executive of Italian Football Federation. The club played its earliest seasons at the Motovelodromo Appio stadium, before settling in the working-class streets of Testaccio, where it built an all-wooden ground Campo Testaccio; this was opened in November 1929. An early season in which Roma made a large mark was the 1930–31 championship, where the club finished as runners-up behind Juventus. Captain Attilio Ferraris, along with Guido Masetti, Fulvio Bernardini and Rodolfo Volk, were highly important players during this period. After a slump in league form and the departure of high key players, Roma eventually rebuilt their squad adding goalscorers such as the Argentine Enrique Guaita. Under the management of Luigi Barbesino, the Roman club came close to their first title in 1935–36, finishing just one point behind champions Bologna. Roma returned to form after being inconsistent for much of the late 1930s. Roma recorded an unexpected title triumph in the 1941–42 season by winning their first ever Scudetto title. The 18 goals scored by local player Amedeo Amadei were essential to the Alfréd Schaffer-coached Roma side winning the title. At the time, Italy was involved in World War II and Roma were playing at the Stadio del Partito Nazionale Fascista. In the years just after the war, Roma were unable to recapture their league stature from the early 1940s. Roma finished in the lower half of Serie A for five seasons in a row, before eventually succumbing to their only ever relegation to Serie B at the end of the 1950–51 season, around a decade after their championship victory. Under future Italy national team manager Giuseppe Viani, promotion straight back up was achieved. After returning to the Serie A, Roma managed to stabilise themselves as a top half club again with players such as Egisto Pandolfini, Dino Da Costa and Dane Helge Bronée. Their best finish of this period was under the management of Englishman Jesse Carver, when in 1954–55, they finished as runners-up after Udinese, who originally finished second were relegated for corruption. Although Roma were unable to break into the top four during the following decade, they did achieve some measure of cup success. Their first honour outside of Italy was recorded in 1960–61 when Roma won the Inter-Cities Fairs Cup by defeating Birmingham City 4–2 in the finals. A few years later, Roma won their first Coppa Italia trophy in 1963–64 after defeating Torino 1–0. Their lowest point came during the 1964–65 season, when manager Juan Carlos Lorenzo announced the club could not pay its players and was unlikely to be able to afford to travel to Vicenza to fulfil its next fixture. Supporters kept the club going with a fundraiser at the Sistine Theatre and bankruptcy was avoided with the election of a new club president Franco Evangelisti. Their second Coppa Italia trophy was won in 1968–69, when it competed in a small, league-like system. Giacomo Losi set a Roma appearance record in 1969 with 450 appearances in all competitions, a record that would last 38 years. Roma were able to add another cup to their collection in 1972, with a 3–1 victory over Blackpool in the Anglo-Italian Cup. During much of the 1970s, Roma's appearance in the top half of Serie A was sporadic. The best place the club were able to achieve during the decade was third in 1974–75. Notable players who turned out for the club during this period included midfielders Giancarlo De Sisti and Francesco Rocca. The dawning of a newly successful era in Roma's footballing history was brought in with another Coppa Italia victory, they defeated Torino on penalties to win the 1979–80 edition. Roma would reach heights in the league which they had not touched since the 1940s by narrowly and controversially finishing as runners-up to Juventus in 1980–81. Former Milan player Nils Liedholm was the manager at the time, with players such as Bruno Conti, Agostino Di Bartolomei, Roberto Pruzzo and Falcão. The second Scudetto did not elude Roma for much longer. In 1982–83, the Roman club won the title for the first time in 41 years, amidst celebrations in the capital. The following season, Roma finished as runners-up in Italy and collected a Coppa Italia title, they also finished as runners-up in the European Cup final of 1984. The European Cup final with Liverpool ended in a 1–1 draw with a goal from Pruzzo, but Roma eventually lost in the penalty shoot-out. Roma's successful run in the 1980s would finish with a runners-up spot in 1985–86 and a Coppa Italia victory, beating out Sampdoria 3–2. After, a comparative decline began in the league, one of the few league highs from the following period being a third-place finish in 1987–88. At the start of the 1990s, the club was involved in an all-Italian UEFA Cup final, where they lost 2–1 to Internazionale in 1991. The same season, the club won its seventh Coppa Italia and ended runners-up to Sampdoria in the Supercoppa Italiana. Aside from finishing runners-up to Torino in a Coppa Italia final, the rest of the decade was largely sub-par in the history of Roma, particularly in the league, where the highest they could manage was fourth in 1997–98. The early 1990s also saw the emergence of homegrown striker Francesco Totti, who would go on to be an important member of the team and the club's iconic captain. Roma returned to form in the 2000s, beginning the decade in great style by winning their third ever Serie A title in 2000–01. The Scudetto was won on the last day of the season after defeating Parma 3–1, edging Juventus by two points. The club's captain, Francesco Totti, was a large reason for the title victory and he would become one of the main heroes in the club's history, going on to break several club records. Other important players during this period included Aldair, Cafu, Gabriel Batistuta and Vincenzo Montella. The club attempted to defend the title in the following season but ended as runners-up to Juventus by one point. This would be the start of Roma finishing as runners-up several times in both Serie A and Coppa Italia during the 2000s – they lost out 4–2 to Milan in the Coppa Italia final of 2003 and lost to Milan again by finishing second in Serie A for the 2003–04 season. The club also re-capitalized several time in 2003–04 season. In November 2003, €37.5 million was injected by "Roma 2000" to cover the half-year loss and loss carried from previous year. and again on 30 June for €44.57 million. Through stock market, a further €19.850 million of new shares issued, and at the year end, the share capital was €19.878 million, which was unchanged as of 2011[update]. The following season also saw the departure of Walter Samuel for €25 million and Emerson for €28 million, which decreased the strength of the squad. The Giallorossi therefore finished in eighth place, one of the worst of recent seasons. On 9 July 2006, Roma's Francesco Totti, Daniele De Rossi and Simone Perrotta were part of the Italy national team which defeated France in the 2006 FIFA World Cup Final. A Serie A scandal was revealed during 2006; Roma were not one of the teams involved. After punishments were issued, Roma was re-classified as runners-up for 2005–06, the same season they finished second in the Coppa Italia losing to Internazionale. In the two following seasons, 2006–07 and 2007–08, Roma finished as Serie A runners-up, meaning that in the 2000s, Roma have finished in the top two positions more than any other decade in their history. Meanwhile, in the UEFA Champions League during both of these seasons, they reached the quarter-finals before going out to Manchester United. Despite the sloppy start in the 2008–09 Champions League, Roma managed to reach the knockout stage ahead of Chelsea in their group, thus finishing for the first time in their history as winners of the group stage. However, the Giallorossi, would lose to Arsenal in the knockout stage on penalty kicks, ending their Champions League campaign. After a disappointing start to the 2009–10 season, Claudio Ranieri replaced Luciano Spalletti as head coach. At the time of the switch, Roma lay bottom of the Serie A table after losses to Juventus and Genoa. Despite this setback, Roma would later embark on an incredible unbeaten streak of 24 matches in the league – with the last of the 24 being a 2–1 win over rivals Lazio, whereby Roma came from 1–0 down at half-time to defeat their city rivals after Ranieri courageously substituted both Totti and De Rossi at the interval. The Giallorossi were on top of the table at one point, before a loss to Sampdoria later in the season. Roma would finish runners-up to Internazionale yet again in both Serie A and the Coppa Italia. This rounded out a highly successful decade in Roma's history, following somewhat mediocre results of the 1990s. During the 2000s, Roma had finally recaptured the Scudetto, two Coppa Italia trophies, and their first two Supercoppa Italiana titles. Other notable contributions to the club's history have included a return to the Champions League quarter-finals (in the 2006–07 and 2007–08 editions) since 1984, six runners up positions in the league, four Coppa Italia finals and three Supercoppa finals – marking Roma's greatest ever decade. In the summer of 2010, the Sensi family agreed to relinquish their control of Roma as part of a debt-settlement agreement. This brought an end to the presidential reign of the Sensi family, who had presided over the club since 1993. Until a new owner was appointed, Rosella Sensi would continue her directorial role of the club. The 2010–11 season had once again seen Roma start off with mixed fortunes on both a domestic and European level. These included losses against Cagliari, Brescia and a 2–0 defeat against Bayern Munich in the group stages of the Champions League, a match which saw manager Claudio Ranieri openly criticised by his players. However, these were accompanied by victories against Inter and a sensational victory against Bayern Munich in the return fixture, which saw Roma fight back from 0–2 down at half-time to emerge as 3–2 winners. Following a series of poor results which saw Roma engage in a winless-streak of five consecutive matches, Ranieri resigned as head coach in February 2011, and former striker Vincenzo Montella was appointed as caretaker manager until the end of the season. It was also during this season that Roma icon Francesco Totti scored his 200th Serie A goal against Fiorentina in March 2011, becoming only the sixth ever player to achieve such a feat. On 16 April 2011, the takeover contract was closed with an American investment group led by Thomas R. DiBenedetto, with James Pallotta, Michael Ruane and Richard D'Amore as partners. DiBenedetto became the 22nd president of the club, serving from 27 September 2011 to 27 August 2012 and was succeeded by Pallotta. The new intermediate holding company, NEEP Roma Holding, was 60% owned by American's "AS Roma SPV, LLC" and the rest (40%) was retained by the creditor of Sensi, UniCredit. In turn, NEEP owned all shares held previously by Sensi (about 67%) with the rest free float in the stock market. UniCredit later disinvested NEEP Roma Holding to sell to "AS Roma SPV, LLC" and Pallotta. The new ownership immediately went into effect by making significant changes in the club, hiring Walter Sabatini as director of football and former Spanish international and Barcelona B coach Luis Enrique as manager. The first high-profile player signings from the duo were attacking midfielder Erik Lamela from River Plate, forward Bojan from Barcelona, goalkeeper Maarten Stekelenburg from Ajax and unattached defender Gabriel Heinze. The club also sold and released defender John Arne Riise, goalkeeper Doni and forwards Jérémy Ménez and Mirko Vučinić. At the financial level, the company had recapitalised for more than €100 million, the last recapitalisation occurring in the early 2000s. Roma, however, was eliminated from 2011–12 UEFA Europa League play-off round. After the formal takeover on 18 August, Roma bought forward Dani Osvaldo, midfielders Miralem Pjanić and Fernando Gago and defender Simon Kjær, as well as youngster Fabio Borini, which cost the club more than €40 million. In 2012, Pallotta became the new president. The 2012–13 pre-season started with the June hiring of former manager Zdeněk Zeman. Zeman replaced Luis Enrique who resigned at the end of the 2011–12 season. Luis Enrique's lone season reign had seen the disappointing loss to Slovan Bratislava in the UEFA Europa League, as well as the inability to qualify for international competitions for the 2012–13 season. Roma eventually finished seventh, losing the Europa League chase to rivals Lazio, Napoli and Internazionale. Zeman brought back his high-scoring 4–3–3 formation and his hard working ethic which successfully guided former team Pescara to the Serie A. However, he was sacked on 2 February 2013. He was replaced by caretaker manager Aurelio Andreazzoli, whose reign saw the continuation of a disappointing season, with the team ending up in sixth place in Serie A, while also losing 1–0 to rivals Lazio in the Coppa Italia final. As a result, Roma missed out on European competition for the second-straight season. On 12 June 2013, Pallotta announced that Rudi Garcia had been appointed the new manager of Roma. He enjoyed a fantastic start to his Roma career, winning his first ten matches (an all-time Serie A record) including a 2–0 derby win against Lazio, a 0–3 victory away to Internazionale and a 2–0 home win over title rivals Napoli. During this run, Roma scored 24 times while conceding just once, away to Parma. The 2013–14 season saw one of Roma's best ever in Serie A, the club tallying an impressive 85 points and finishing second to Juventus, who won the league with a record-breaking 102 points. Roma's defence was significantly better than in previous seasons, with only 25 goals conceded and a total of 21 clean sheets, including nine in their first ten matches. In 2014–15, Roma finished second behind Juventus for the second consecutive season after a poor run of form in 2015. At the end of season the club was sanctioned for loss making and breaking UEFA Financial Fair Play Regulations. On 13 January 2016, Garcia was sacked after a run of one win in seven Serie A matches. Luciano Spalletti was subsequently appointed manager of Roma for his second spell. On 21 February, Totti publicly criticised Spalletti due to his own lack of playing-time since returning from injury. Consequently, Totti was subsequently dropped by Spalletti for Roma's 5–0 win over Palermo, with the decision causing an uproar among the fans and in the media. After their initial disagreements, Spalletti began to use Totti as an immediate impact substitute, which proved to be an effective decision, as the Roma number 10 rediscovered his form and contributed with four goals and one assist after coming off the bench in five consecutive Serie A matches. As a result, Spalletti was able to lead Roma from a mid-table spot to a third-place finish in Serie A, clinching the UEFA Champions League play-off spot. During the summer of 2016, Roma lost star midfielder Miralem Pjanić to rivals Juventus to improve its financial position. On 27 April 2017, Roma appointed Sevilla FC's Sporting director Monchi as their new sporting director. On 28 May 2017, on the last day of the 2016–17 season, Francesco Totti made his 786th and final appearance for Roma before retiring in a 3–2 home win against Genoa, coming on as a substitute for Mohamed Salah in the 54th minute and received a standing ovation from the fans. The win saw Roma finish second in Serie A behind Juventus. Following Totti's retirement, Daniele De Rossi became club captain and signed a new two-year contract. On 13 June 2017, former Roma player Eusebio Di Francesco was appointed as the club's new manager, replacing Spalletti, who had left the club to take charge of Internazionale. Roma again lost a key player during the summer transfer window, with Mohamed Salah joining Liverpool F.C. for a fee of 39m euro (£34m). Several new players joined the club, including a club record deal for Sampdoria striker Patrik Schick and Aleksandar Kolarov in a €5m (£4.4m) move from Manchester City Di Francesco also brought in Gregoire Defrel from his previous club Sassuolo in an €18 million deal. On 5 December 2017 the Stadio della Roma project, after experiencing five years worth of delays due to conflicting interests from various parties in the Roman city government, was given the go-ahead to begin construction. It is slated to open in time for the 2020–21 season and will replace the Stadio Olimpico as Roma's ground. In the 2017-18 UEFA Champions League group stage, Roma were drawn in a tough Group C with Chelsea, Atletico Madrid and Qarabag. However, after performing strongly in the group stage, including a 3-0 home victory against Chelsea, Roma progressed to the knockout stages as Group C winners after Diego Perotti's lone goal in a 1-0 win over Qarabag. After progressing past Shakhtar Donetsk in the Round of 16, Roma were drawn against FC Barcelona in the Quarter Finals. On 4 April 2018, Roma were defeated 4-1 away to Barcelona at the Camp Nou in the first leg, after own goals from Daniele De Rossi and Kostas Manolas, although Edin Džeko provided a late glimmer of hope by scoring an away goal. On 10 April, Roma pulled off a sensational second-leg comeback at the Stadio Olimpico to beat Barcelona 3-0 and reach the Champions League semi-finals on away goals. An early goal from Edin Džeko and a 58th-minute penalty from De Rossi had left the Giallorossi needing to score one more goal to progress before Manolas scored the crucial third goal, heading in at the near post with eight minutes remaining. By doing so, Roma became only the third team in Champions League history to overturn a first-leg defeat of three goals or more and reached the final four of the competition for the first time since 1984. Roma were subsequently drawn against Liverpool, the team that had defeated them in the 1984 European Cup Final, in the semi-finals. Wikimedia Commons has media related to AS Roma kits. Roma's colours of imperial purple with a golden yellow trim represents the traditional colours of Rome, the official seal of the Comune di Roma features the same colours. The gold and the purple-red represent Roman imperial dignity. White shorts and black socks are usually worn with the red shirt, however in particularly high key matches, the shorts and socks are the same colour as the home shirt. The kit itself was originally worn by Roman Football Club; one of the three clubs who merged to form the current incarnation in 1927. Because of the colours they wear, Roma are often nicknamed i giallorossi meaning the yellow-reds. Roma's away kit is traditionally white, with a third kit changing colour from time to time. A popular nickname for the club is "i lupi" ("the wolves") – the animal has always featured on the club's badge in different forms throughout their history. The emblem of the team is currently the one which was used when the club was first founded. It portrays the female wolf with the two infant brothers Romulus and Remus, illustrating the myth of the founding of Rome, superimposed on a bipartite golden yellow over maroon red shield. In the myth from which the club takes their nickname and logo, the twins (sons of Mars and Rhea Silvia) are thrown into the river Tiber by their uncle Amulius. A she-wolf then saved the twins and looked after them. Eventually, the two twins took revenge on Amulius before falling-out themselves – Romulus killed Remus and was thus made king of a new city named in his honour, Rome. The very first sport facility Roma used was the Motovelodromo Appio, previously used by Alba-Audace. Roma only played the 1927–28 season there until they moved to Campo Testaccio the very next season. Campo Testaccio was used through 1929 to 1940. The team moved later to the Stadio Nazionale del PNF, where they spent 13 years before moving once again. In the 1953–54 season, Roma moved to the Olympic arena, Stadio Olimpico, which it shares with Lazio. The arena has undergone several changes over the years. The most significant change took place in the nineties when Stadio Olimpico was demolished and then reconstructed to for the 1990 FIFA World Cup, held in Italy. Roma have played almost every season since 1953–54, with exception of the 1989–90 seasons due to the reconstruction of Stadio Olimpico. That year, Roma played its home matches at Stadio Flaminio. On 30 December 2012, Roma club president James Pallotta announced the construction of a new stadium in the Tor di Valle area of Rome. The new stadium, Stadio della Roma, will have a capacity of 52,500 spectators. On 2 February 2017, the Region of Lazio and the mayor of Rome rejected the proposal to build a new stadium. However, it was later approved on 24 February after final review of the stadium's design adjustments. In August 2017, the stadium suffered another delay, forcing Roma to renew their lease with the Stadio Olimpico until 2020. It is presently uncertain when the stadium will open. On 5 December 2017 the Stadio della Roma project, after experiencing five years worth of delays due to conflicting interests from various parties in the Roman city government, was given the go-ahead to begin construction. It is slated to open in time for the 2020–21 season and will replace the Stadio Olimpico as Roma's ground. A sports centre located in Trigoria at kilometre 3600 in south-east of Rome was purchased on 22 July 1977 by then club president Gaetano Anzalone. It was opened on 23 July 1979 as Anzalone's final act as president. The complex had its first expansion in 1984 when the club was handled by Dino Viola and another in 1998 under the chairmanship of Franco Sensi. The centre's official name is the Fulvio Bernardini di Trigoria, named after club icon Fulvio Bernardini. The centre is also known for hosting the Argentina national team during the 1990 FIFA World Cup, held in Italy. Roma is the fifth-most supported football club in Italy – behind Juventus, Internazionale, Milan and Napoli – with approximately 7% of Italian football fans supporting the club, according to the Doxa Institute-L'Espresso's research of April 2006. Historically, the largest section of Roma supporters in the city of Rome have come from the inner-city, especially Testaccio. The traditional ultras group of the club was Commando Ultrà Curva Sud commonly abbreviated as CUCS. This group was founded by the merger of many smaller groups and was considered one of the most historic in the history of European football. However, by the mid-1990s, CUCS had been usurped by rival factions and ultimately broke up. Since that time, the Curva Sud of the Stadio Olimpico has been controlled by more right-wing groups, including A.S. Roma Ultras, Boys and Giovinezza, among others. However, the oldest group, Fedayn, is apolitical, and politics is not the main identity of Roma, just a part of their overall identity. Besides ultras groups, it is believed Roma fans support the left as opposed to Lazio supporters, which are notoriously proud of their right-wing affiliation. In November 2015, Roma's ultras and their Lazio counterparts boycotted Roma's 1–0 victory in the Derby della Capitale in protest at new safety measures imposed at the Stadio Olimpico. The measures – imposed by Rome's prefect, Franco Gabrielli – had involved plastic glass dividing walls being installed in both the Curva Sud and Curva Nord, splitting the sections behind each goal in two. Both sets of ultras continued their protests for the rest of the season, including during Roma's 4–1 victory in the return fixture. Lazio's ultras returned to the Curva Nord for Roma's 1–4 victory in December 2016, but the Roma ultras continue to boycott matches. The most known club anthem is "Roma (non-si discute, si ama)", also known as "Roma Roma", by singer Antonello Venditti. The title roughly means, "Roma is not to be questioned, it is to be loved," and it is sung before each match. The song "Grazie Roma", by the same singer, is played at the end of victorious home matches. Recently, the main riff of The White Stripes' song "Seven Nation Army" has also become widely popular at matches. In Italian football, Roma is a club with many rivalries; first and foremost is their rivalry with Lazio, the club with whom they share the Stadio Olimpico. The derby between the two is called the Derby della Capitale, it is amongst the most heated and emotional footballing rivalries in the world. The fixture has seen some occasional instances of violence in the past, including the death of Lazio fan Vincenzo Paparelli in 1979–80 as a result of an emergency flare fired from the Curva Sud, and the abandonment of a match in March 2004 following unfounded rumours of a fatality which led to violence outside the stadium. Against Napoli, Roma also compete in the Derby del Sole, meaning the "Derby of the Sun". Nowadays, fans also consider other Serie A giants like Juventus (a rivalry born especially in the 1980s), Milan and Internazionale (increased in recent years) among their rivals, as these four compete for the top four spots in the league table to secure a spot in the UEFA Champions League. Rivalries with other teams have escalated into serious violence. A group of ultras who label themselves the Fedayn — ‘the devotees��� — after a group of long-forgotten Iranian guerrilla fighters are regarded to be responsible for the organised hooliganism. In 2014 Daniele De Santis, a Roma ultra, was convicted of shooting Ciro Esposito and two others during clashes with Napoli fans who were in Rome for their club's Coppa Italia final against Fiorentina. Esposito died of his wounds. De Santis was sentenced to 26 years in prison, later reduced to 16 years on appeal. Roma ultras have displayed banners celebrating De Santis. There have been multiple instances of Roma ultras attacking supporters of foreign clubs when playing in Rome. These attacks have regularly featured the Roma ultras using knives, poles, flares, bottles and stones on unarmed foreign supporters, resulting in multiple hospitalisations. Home games against Liverpool in 1984 and 2001, Middlesbrough in 2006, Manchester United in 2007, Arsenal in 2009, Tottenham Hotspur in 2012, and Chelsea in 2017 have all resulted in multiple stabbings and other injuries to foreign supporters. In 2018 Roma ultras travelling to an away game at Liverpool attacked home supporters, resulting in a home supporter being critically injured. For a list of all former and current Roma players with a Wikipedia article, see Category:A.S. Roma players. As of 28 February 2019. Roma have had numerous chairmen (Italian: presidenti, lit. 'presidents' or Italian: presidenti del consiglio di amministrazione, lit. 'chairmen of the board of directors') over the course of their history, some of which have been the owners and co-owners of the club, some of them were nominated by the owners. Franco Sensi was the chairman until his death in 2008, with his daughter, Roma CEO Rosella Sensi taking his place as chairman. Here is a complete list of Roma chairmen from 1927 until the present day. Roma have had many managers and trainers running the team during their history, here is a chronological list of them from 1927 onwards. On 7 October 2012, the AS Roma Hall of Fame was announced. The Hall of Fame players were voted via the club's official website and a special Hall of Fame panel. In 2013 four players were voted in. In 2014, the third year of AS Roma Hall of Fame four more players were voted in. Francesco Totti currently holds Roma's official appearance record, having made 785 (as of 20 May 2017) appearances in all competitions, over the course of 25 seasons from 1993 until 2017. He also holds the record for Serie A appearances with 618, as he passed Giacomo Losi on 1 March 2008 during a home match against Parma. Including all competitions, Totti is the all-time leading goalscorer for Roma with 307 goals since joining the club, 250 of which were scored in Serie A (another Roma record). Roberto Pruzzo, who was the all-time topscorer since 1988, comes in second in all competitions with 138. In 1930–31, Rodolfo Volk scored 29 goals in Serie A over the course of a single season. Not only was Volk the league's top scorer that year, he also set a Roma record for most goals scored in a season which would later be matched by Edin Džeko in 2016–17. Its major founders Fortitudo and Alba having been relegated at the end of 1926–27 campaign, new-founded Roma had to take part to Southern First Division championship (Serie B) for its inaugural season. Nevertheless, the FIGC decided on a special enlargement of first level division re-admitting AS Roma and SSC Napoli. The first ever official matches participated in by Roma was in the National Division, the predecessor of Serie A, of 1927–28, against Livorno, a 2–0 Roma win. The biggest ever victory recorded by Roma was 9–0 against Cremonese during the 1929–30 Serie A season. The heaviest defeat Roma have ever suffered is 7–1, which has occurred three times; against Juventus in 1931–32, Torino in 1947–48 and Manchester United in 2006–07. Since 1999, during Franco Sensi's period in charge, Associazione Sportiva Roma has been a listed Società per azioni on Borsa Italiana. From 2004 to 2011, Roma's shares are distributed between; 67.1% to Compagnia Italpetroli SpA (the Sensi family holding; Banca di Roma later acquired 49% stake on Italpetroli due to debt restructuring) and 32.9% to other public shareholders. Along with Lazio and Juventus, Roma is one of only three quotated Italian clubs. According to The Football Money League published by consultants Deloitte, in the 2010–11 season, Roma was the 15th highest-earning football club in the world with an estimated revenue of €143.5 million. In April 2008, after months of speculation, George Soros was confirmed by Rosella Sensi, CEO of Italian Serie A association football club A.S. Roma, to be bidding for a takeover. The takeover bid was successively rejected by the Sensi family, who instead preferred to maintain the club's ownership. On 17 August 2008 club chairman and owner Franco Sensi died after a long illness; his place at the chairmanship of the club was successively taken by his daughter Rosella. Since the takeover in 2011, NEEP Roma Holding S.p.A. has owned all shares Sensi previously hold. NEEP, itself a joint venture, was held by DiBenedetto AS Roma LLC (later renamed to AS Roma SPV, LLC) and Unicredit in 60–40 ratio from 2011 to 2013, which the former had four real person shareholders in equal ratio, led by future Roma president Thomas R. DiBenedetto (2011–12). The takeover also activated a mandatory bid of shares from the general public, however not all minority shareholders were willing to sell their shares. The mandatory bid meant NEEP held 78.038% of shares of AS Roma (increased from 67.1% of the Sensi). On 1 August 2013, the president of Roma as well as one of the four American shareholders of AS Roma SPV, LLC, James Pallotta, bought an additional 9% shares of NEEP Roma Holding from Unicredit (through Raptor Holdco LLC), as the bank was not willing to fully participate in the capital increase of NEEP from €120,000 to €160,008,905 (excluding share premium). On 4 April 2014 Starwood Capital Group also became the fifth shareholder of AS Roma SPV, as well as forming a strategic partnership with AS Roma SpA to develop real estate around the new stadium. The private investment firm was represented by Zsolt Kohalmi in AS Roma SPV, who was appointed on 4 April as a partner and head of European acquisitions of the firm. On 11 August 2014, UniCredit sold the remain shares on NEEP (of 31%) for €33 million which meant AS Roma SPV LLC (91%) and Raptor Holdco LLC (9%) were the sole intermediate holding company of AS Roma SpA. Since re-capitalization in 2003–04, Roma had a short-lived financial self-sustainability, until the takeover in 2011. The club had set up a special amortisation fund using Articolo 18-bis Legge 91/1981 mainly for the abnormal signings prior 2002–03 season, (such as Davide Bombardini for €11 million account value in June 2002, when the flopped player exchange boosted 2001–02 season result) and the tax payment of 2002–03 was rescheduled. In 2004–05, Roma made a net profit of €10,091,689 and followed by €804,285 in 2005–06. In 2006–07 season the accounting method changed to IFRS, which meant that the 2005–06 result was reclassified as net loss of €4,051,905 and 2006–07 season was net income of €10,135,539 (€14.011 million as a group). Moreover, the special fund (€80,189,123) was removed from the asset and co-currently for the equity as scheduled, meant Roma group had a negative equity of €8.795 million on 30 June 2007. Nevertheless, the club had sold the brand to a subsidiary which boost the profit in a separate financial statement, which La Repubblica described as "doping". In 2007–08, Roma made a net income of €18,699,219. (€19 million as a group) However, 2008–09 saw the decrease of gate and TV income, co-currently with finishing sixth in Serie A, which saw Roma made a net loss of €1,894,330. (€1.56 million as a group) The gate and TV income further slipped in 2009–10 with a net loss of €21,917,292 (already boosted by the sale of Alberto Aquilani; €22 million as a group) despite sporting success (finishing in second place in 2009–10). Moreover, despite a positive equity as a separate company (€105,142,589), the AS Roma Group had a negative equity on the consolidated balance sheet, and fell from +€8.8 million to −€13.2 million. In the 2010–11 season, Roma was administrated by UniCredit as the Sensi family failed to repay the bank and the club was put on the market, and were expected to have a quiet transfer window. Concurrently with no selling profit on the players, Roma's net loss rose to €30,589,137 (€30.778 million as a group) and the new owner already planned a re-capitalization after the mandatory bid on the shares. On the positive side, TV income was increased from €75,150,744 to €78,041,642, and gate income increased from €23,821,218 to ���31,017,179. This was because Roma entered 2010–11 Champions League, which counter-weighed the effect of the new collective agreement of Serie A. In 2011–12, the renewal of squad and participation in 2011–12 UEFA Europa League had worsened the financial result, which the €50 million capital increase (in advance) was counter-weighted totally by the net loss. In the 2012–13 season, the participation in domestic league only, was not only not harmful to the revenue but increase in gate income as well as decrease in wage bill, however Roma still did not yet break even (€40.130 million net loss in consolidated accounts). NEEP Roma also re-capitalized AS Roma in advance for another €26,550,000 during 2012–13. A proposed capital increase by €100 million for Roma was announced on 25 June 2014; however, until 22 May 2014, NEEP already injected €108 million into the club, which depends on public subscription; more than €8 million would convert to medium-long-term loan from shareholder instead of becoming share capital. Another capital increase was carried in 2018. A joint venture of Roma, which was owned by Roma (37.5%), S.S. Lazio (37.5%) and Parma F.C.(25%), Società Diritti Sportivi S.r.l., was in the process of liquidation since 2005. The company was a joint-venture of four football clubs, including Fiorentina. After the bankruptcy of the old Viola, however, both Roma and Lazio had increased their shares ratio from 25% to 37.5%. Another subsidiary, "Soccer S.A.S. di Brand Management S.r.l.", was a special-purpose entity (SPV) that Roma sold their brand to the subsidiary in 2007. In February 2015, another SPV, "ASR Media and Sponsorship S.r.l", was set up to secure a five-year bank loan of €175 million from Goldman Sachs, for three-month Euribor (min. 0.75%) + 6.25% spread (i.e. min. 7% interests rate p.a.). In 2015, Inter and Roma were the only two Italian clubs that were sanctioned by UEFA for breaking UEFA Financial Fair Play Regulations, which they signed settlement agreements with UEFA. It was followed by Milan in 2018. Roma had compliance with the requirements and overall objective of the settlement agreement in 2018, which the club exited from settlement regime. A.S. Roma had a team in the Superleague Formula race car series where teams were sponsored by football clubs. Roma's driver was ex-IndyCar Series driver Franck Perera. The team had posted three podiums and was operated by Alan Docking Racing. ^ "Stadi Serie A 2015–2016" (PDF). Archived from the original (PDF) on 1 September 2015. ^ "Neep Roma Holding S.P.A.: Private Company Information – Bloomberg". ^ a b c "La Storia". asroma.it (in Italian). AS Roma. Archived from the original on 23 December 2007. ^ "A.S. Roma". AlbionRoad.com. 24 June 2007. Archived from the original on 14 April 2008. ^ a b "Campo Testaccio". Viva la Roma. 24 June 2007. ^ a b c d e f g h i j k l Modena, Panini Edizioni (2005). Almanacco Illustrato del Calcio – La Storia 1898–2004. ^ "Tutti i calciatori dell'A.S. Roma". Viva la Roma. 24 June 2007. ^ "1935–'36: Io Faccio I Gol Non La Guerra!". ASRomaUltras.it. 24 June 2007. Archived from the original on 22 October 2007. ^ "I Campi da Gioco". ASRomaUltras.it. 24 June 2007. Archived from the original on 7 August 2007. ^ "Italy 1951–52 – Serie B". Rec.Sport.Soccer Statistics Foundation. 24 June 2007. Archived from the original on 9 May 2007. ^ a b "Gli Allenatori dell'A.S. Roma dal 1927 al Oggi". Viva la Roma. 24 June 2007. ^ "Inter-Cities Fairs Cup 1960–61". Rec.Sport.Soccer Statistics Foundation. 24 June 2007. ^ a b c d e f g h i "TIM Cup – Coppa Italia". Vilacom Sports. 24 June 2007. Archived from the original on 27 September 2011. ^ "Rekordok, statisztikák". ASRoma Hunsports. 24 June 2007. Archived from the original on 11 October 2007. ^ "Anglo-Italian Cup 1972". Rec.Sport.Soccer Statistics Foundation. 24 June 2007. Archived from the original on 29 May 2014. ^ "Roma – Juventus: A Historical Look". Goal.com. 24 June 2007. Archived from the original on 1 December 2008. ^ a b c "A.S. Roma Legends". LaRoma-Online.com. 24 June 2007. Archived from the original on 11 October 2007. ^ "Campionato Serie A – Albo D'oro". Lega Calcio. Archived from the original on 24 August 2007. Retrieved 12 September 2016. ^ a b "Season 1983–84". European Cup History. 24 June 2007. ^ "Roma – Inter: A Historical Look". Goal.com. 24 June 2007. Archived from the original on 1 December 2008. ^ "A.S. Roma 2000–2001". Italica RAI. 24 June 2007. Archived from the original on 14 November 2007. ^ "INFORMATIVA ROMA 2000 S.R.L." (PDF). AS Roma (in Italian). 12 November 2003. Archived from the original (PDF) on 10 August 2011. Retrieved 18 April 2011. Roma 2000 sottoscrive l'aumento di capitale per 44,57 milioni di euro" (PDF). AS Roma (in Italian). 30 June 2004. Archived from the original (PDF) on 10 August 2011. Retrieved 18 April 2011. ^ "AS ROMA Spa. RELAZIIONE SEMESTRALE AL 31 DIICEMBRE 2004" (PDF). AS Roma (in Italian). 23 April 2005. Archived from the original (PDF) on 10 August 2011. Retrieved 18 April 2011. ^ "Football – World Cup 2006 – Zidane off as Italy win World Cup". ^ "Punishments cut for Italian clubs". London: BBC. 24 June 2007. Retrieved 5 January 2010. ^ "Serie A 2006–07". La Gazzetta dello Sport. 24 June 2007. ^ "A Tribute To Claudio Ranieri's Coconuts – The Offside – AS Roma blog". Roma.theoffside.com. 19 April 2010. Archived from the original on 20 February 2012. Retrieved 19 February 2012. ^ "GAZZETTA DELLO SPORT Pallotta, è tua! Tra basket e soccer. La scalata di mister James per fare grande la Roma – Gazzetta Giallorossa". 28 August 2012. ^ "RUDI GARCIA". asroma.it. 12 June 2013. Retrieved 2 November 2013. ^ "Roma set record for best start to Serie A season". BBC Sport. 27 October 2013. Retrieved 28 October 2013. ^ sport, Guardian (13 January 2016). "Roma sack coach Rudi García after run of one win in seven Serie A games". The Guardian. ^ "Strootman: 'Goodbye Garcia' – Football Italia". ^ "Francesco Totti faces uncertain Roma future after controversial comments". ESPNFC.com. Retrieved 23 February 2016. ^ Susy Campanale (3 May 2016). "Serie A Week 36: Did You Know?". Football Italia. Retrieved 3 May 2016. ^ Terry Daley (15 May 2016). "Higuain heroics mean Roma come up short in fight for second in Serie A". ESPN FC. Retrieved 25 May 2016. ^ "Miralem Pjanic: Juventus sign Roma midfielder for £25.4m". BBC. 13 June 2016. ^ "AS Roma Appoint Sevilla Sporting Director Monchi". ^ "Daniele de Rossi: Roma captains signs new deal". 31 May 2017 – via www.bbc.co.uk. ^ "Official: Di Francesco new Roma coach". Football Italia. 13 June 2017. Retrieved 13 June 2017. ^ "Mohamed Salah: Liverpool sign Roma's former Chelsea winger for £34m". 23 June 2017 – via www.bbc.co.uk. ^ "Roma complete club-record deal for Schick". ^ "Aleksandar Kolarov joins Roma from Manchester City". ^ "Serie A: Roma sign €18m Gregoire Defrel from Sassuolo - Goal.com". ^ a b "Official: Stadio della Roma all-clear". Football Italia. 5 December 2017. Retrieved 5 December 2017. ^ "Roma chief Monchi: We can handle tough Champions League group - Tribal Football". ^ "Roma proved doubters wrong in topping tough Group C, says Di Francesco". 5 December 2017. ^ "Barcelona 4-1 Roma: Late Luis Suarez strike gives Ernesto Valverde's side advantage". ^ "Roma 3-0 Barcelona (agg: 4-4)". 10 April 2018 – via www.bbc.co.uk. ^ "Liverpool v Roma: Are Italians being underestimated for Champions League semi?". 23 April 2018 – via www.bbc.co.uk. ^ "A.S. Roma". 123football.com. 24 June 2007. Archived from the original on 21 April 2005. ^ "Il Roman – La storia (tratta da "La Roma")". ASRomaUltras.it. 24 June 2007. Archived from the original on 22 August 2007. ^ a b c "The Legend of Romulus and Remus". Newcastle University. 24 June 2007. Archived from the original on 2 October 2007. ^ "Roma". BrandsoftheWorld.com. 24 June 2007. ^ "AS Roma – Official Website – Rome – Football – Soccer". ^ "AS ROMA AND NIKE ANNOUNCE NEW PARTNERSHIP". A.S. Roma Official Website. 13 March 2013. Retrieved 14 March 2013. ^ "Roma announce Qatar Airways as Main Global Partner". A.S. Roma Official Website. 23 April 2018. Retrieved 24 April 2018. ^ "Official: Stadio della Roma rejected". Football Italia. 2 February 2017. Retrieved 2 February 2017. ^ "Mayor: Historic day for Roma". Football Italia. 24 February 2017. Retrieved 24 February 2017. ^ "Official: Stadio della Roma delayed again". Football Italia. 9 August 2017. ^ "Roma at Stadio Olimpico until 2020". Football Italia. 12 August 2017. ^ "Stadio della Roma still faces hurdles". Football Italia. 25 February 2017. Retrieved 25 February 2017. ^ "TRIGORIA/ Il 'Trapezio', tra i Campi della Roma e il Campus Universitario". ^ "L'altra metà del pallone: Supporters of football clubs in Italy". L'Expresso. April 2006. Archived from the original on 6 April 2009. ^ a b c d "Italian Ultras Scene". View from the Terrace. 29 June 2007. Archived from the original on 8 May 2009. ^ Impiglia, Christopher. "Why Roma-Lazio Is One of World Football's Fiercest Rivalries". ^ Bandini, Paolo (9 November 2015). "Roma win a deserted derby over Lazio as Ultras on both sides make point". The Guardian. ^ Bandini, Paolo (5 December 2016). "Not such a beautiful game: Lazio v Roma derby descends into disrepute". The Guardian. ^ "Inno AS Roma". Sonoromanista.it (AS Roma fans' social network) (in Italian). Archived from the original on 29 October 2013. Retrieved 26 October 2013. ^ "Roma Profile". Goal.com. April 2006. Archived from the original on 26 September 2008. ^ "'Seven Nation Army' coro dei tifosi romanisti". Indie-Rock.it. 29 June 2007. Archived from the original on 17 September 2007. Retrieved 20 September 2007. ^ "Ultras History". UltrasLazio.it. 29 June 2007. Archived from the original on 16 June 2013. ^ "22 March: Derby confusion". FootballInRome.co.uk. 29 June 2007. Archived from the original on 21 September 2007. ^ "'They were throwing rocks, wielding iron bars' - The sordid history of Roma's Ultras as Liverpool fans head to Rome - Independent.ie". ^ "Thuggish world of Roma's Ultras... meet the Fedayn". ^ "Instead of 'why always Liverpool?' we should be asking 'why always Rome?'". 30 April 2018. ^ "Roma v Liverpool: Roma's passionate support blighted by a violent minority". 1 May 2018 – via www.bbc.co.uk. ^ AFP. "Notorious football hooligan given 26 years in prison for shooting rival fan". ^ Mirror.co.uk (5 April 2007). "DISGRACE OF ROME". ^ a b "Times call for final move". 19 March 2009. Archived from the original on 15 September 2010. ^ Barley, Sophie (7 August 2015). "Boro fans in Roma: Flashback to disgusting treatment on European trip". ^ "A warning to Liverpool fans travelling to Rome – from one who was there in 2001". 27 April 2018. ^ Walker, Michael (5 April 2007). "Inquiry launched after violent clashes see English fans stabbed and beaten". the Guardian. ^ "Arsenal fan attacked in Rome". London: BBC News. 12 March 2009. Retrieved 5 January 2010. ^ Squires, Nick (29 October 2013). "Italian football hooligans jailed for unprovoked attack on Tottenham Hotspur fans in Rome" – via www.telegraph.co.uk. ^ "Tottenham fans injured in Rome". 22 November 2012 – via www.bbc.co.uk. ^ "Roma fans attack Chelsea supporters in pub brawl in Rome". ^ "Roma fans 'arrested after violent attack on Chelsea supporters'". ^ Turner-LE, Ben (26 April 2018). "Italians in court after being charged over brutal attack on Liverpool fan". ^ Perraudin, Frances (25 April 2018). "Roma condemn fans' behaviour after attack on Liverpool supporter". the Guardian. ^ "Players and Staff". A.S. Roma. 8 September 2018. Retrieved 8 September 2018. ^ a b "Roma, Cappelli presidente "Sì, ma solo per un mese"". La Gazzetta dello Sport (in Italian). RCS MediaGroup. 4 July 2011. Retrieved 21 August 2017. ^ "Roma, Rosella è presidente". La Gazzetta dello Sport (in Italian). RCS MediaGroup. 28 August 2008. Retrieved 21 August 2017. ^ a b "I presidenti dell'A.S. Roma dall 1927 ad oggi". Viva la Roma. 8 June 2007. ^ "AS Roma Hall of Fame press release" (PDF). A.S. Roma. Retrieved 10 January 2015. ^ "Hall of Fame". A.S. Roma. Archived from the original on 21 July 2018. Retrieved 14 April 2017. ^ a b c d "FC Shakhtar Donetsk v A.S. Roma" (PDF). UEFA. 24 June 2007. ^ "Relazione Finanziaria Annuale per l'esercizio chiuso al 30-6-2017" (PDF). cloudinary.com (in Italian). A.S. Roma. 5 October 2017. Retrieved 10 January 2018. ^ "Football Money League" (PDF). Deloitte. February 2012. Archived from the original (PDF) on 2 February 2013. ^ "La stretta finale di Soros distrae lo sprint della Roma" (in Italian). La Gazzetta dello Sport. 18 April 2008. Archived from the original on 21 April 2008. Retrieved 26 April 2008. ^ "A.S. Roma SpA Ownership". Consob. 20 September 2012. Archived from the original on 11 October 2007. ^ "AS Roma – Official Website – Rome – Football – Soccer" (PDF). ^ "STARWOOD CAPITAL GROUP ENTERS STRATEGIC PARTNERSHIP TO HELP DEVELOP AS ROMA'S NEW STADIUM CAMPUS" (PDF). Starwood Capital. 26 March 2014. Retrieved 14 July 2014. ^ "Zsolt Kohalmi Named to Oversee European Acquisition Efforts" (PDF). Starwood Capital. 4 April 2014. Archived from the original (PDF) on 15 July 2014. Retrieved 14 July 2014. ^ "PRESS RELEASE" (PDF). AS Roma. 11 August 2014. Retrieved 21 April 2015. ^ "Bilancio di esercizio al 30 giugno 2006" (PDF). AS Roma (in Italian). 6 November 2006. Retrieved 24 September 2011. ^ "Bilancio di esercizio e consolidato al 30 giugno 2007" (PDF). AS Roma (in Italian). 7 December 2007. Archived from the original (PDF) on 8 June 2012. Retrieved 24 September 2011. ^ "Il "doping" nei conti dei big del pallone perdite complessive oltre i 68 milioni". La Repubblica (in Italian). Gruppo Editoriale L'Espresso. 9 November 2006. Retrieved 8 April 2018. ^ "Bilancio di esercizio e consolidato al 30 giugno 2008" (PDF). AS Roma (in Italian). 17 November 2008. Retrieved 24 September 2011. ^ "Bilancio di esercizio e consolidato al 30 giugno 2009" (PDF) (in Italian). A.S. Roma. 16 November 2009. Retrieved 24 September 2011. ^ "Relazione finanziaria annuale al 30 giugno 2010" (PDF). AS Roma (in Italian). 13 October 2010. Retrieved 24 September 2011. ^ "Roma football club on brink of UniCredit takeover". Financial Times. 5 July 2010. Retrieved 8 April 2018. ^ "AS Roma set for sale in proposed bank deal". Reuters. 9 July 2010. Retrieved 8 April 2018. ^ "Prospetto informativo" (PDF). 28 June 2014. Archived from the original (PDF) on 15 July 2014. ^ "Research Update Media Sponsorship". Archived from the original on 28 January 2016. Retrieved 22 January 2016. ^ "Perfezionata l'operazione di rifinanziamento mediante la sottoscrizione di un contratto di finanziamento per un ammontare pari ad Euro 175 milioni con Goldman Sachs, in qualità di "Mandated Lead Arranger and Bookrunner"" (PDF) (in Italian). A.S. Roma. 12 February 2015. Retrieved 22 January 2016. ^ "Goldman Sachs sets sights on Italian soccer". il sole 24 ore. 26 June 2015. Retrieved 22 January 2016. ^ "Settlement agreements: details". UEFA. 8 May 2015. Retrieved 16 January 2016. ^ "UEFA Club Financial Control Body update on monitoring for 2017/18" (Press release). UEFA. 13 June 2018. Retrieved 17 October 2018. ^ "Roma released from FFP agreement by UEFA" (Press release). A.S. Roma. 13 June 2018. Retrieved 17 October 2018. Wikimedia Commons has media related to A.S. Roma.
0.916226
Why would anyone want to use a camera upside down? Well, there are at least four reasons. This one is obvious. If your tripod won't let you get close to the ground in any other way, it will often let you reverse the centre column and hang the camera upside down from that. This is especially useful with monorail cameras, where the lens is necessarily some way above (or in this case, below) the rail: see (3) below. There are times, especially when you are working on a still life, that it is a real nuisance to have to reach around the tripod. If you can hang the camera from a tripod or stand (right), it's all much easier. Often, too, it allows a lot more freedom with lighting, especially of you use a longer-than-standard lens to allow more stand-off between the subject and the camera. The Calumet Cadet on the right has more than enough movements to be used in any orientation you like, but here it is being used with a wide-angle lens and could not be brought close enough to the subect otherwise: a combination of this heading, and (1) above. The third reason to use a camera upside down is a good deal less obvious, and applies only to a few cameras, mostly field or press types, where the front standard can only be made to tilt backwards. With the camera upside down, the direction of tilt is reversed: see also the module on camera movements. On the left, an MPP Mk. VII is shown being used upside down. The MPP has similar limited back movements to a Linhof, but of course, back movements change the shape of the subject, and front movements don't (or don't, anything like as much). Unfortunately, MPPs prior to the Mk. VIII have only a backwards tilt on the front standard. The solution? Mount the camera upside-down, so that backward tilt becomes forwards tilt. You need a studio stand, or a big tripod with a cross-arm: this is the biggest Benbo. Actually, there is another way with an MPP. As well as the tripod socket on the base, there's another on the side of the camera, under the hand-strap. Mount the camera on the side socket, and swing becomes tilt -- and MPPs swing both ways, if you will pardon the expression. Although you can get away with a big, heavy tripod in the above cases, if you want to hang a really heavy camera upside down you need a heavy pillar-type studio stand: the sort that looks like a gallows with a movable cross-arm, as pictured on the right. But if, instead of perching your camera on top of the cross arm, you hang it underneath, you have not only the advantages outlined above, but also the advantage that if you slacken the tripod head too much, the camera simply swings like a pendulum instead of crashing over, quite possibly crushing your fingers and possibly even causing the whole setup to fall over. Furthermore, you can use a rather lighter tripod head for a suspended camera than for one that is perched on top of the arm. Yes, you can usually mount a heavy camera straight onto the cross-arm, but we find that a heavy-duty ball and socket head (the biggest that Paterson makes) is quicker, easier and more versatile. We always shoot 10x8 inch portraits with our De Vere monorail hanging from our IFF studio stand. An example is the illustration below, shot with the De Vere and a hundred-year-old 21 inch (533mm) f/7.7 Ross lens. The film was Ilford FP4 Plus, scanned with an old Agfa scanner: you don't need much in the way of resolution when you are scanning 8x10 inch. As noted above, this is a genuine 8x10 inch portrait, shot with an 8x10 inch camera. If you look at classic Hollywood portraits, you will see that the subects are often in very relaxed poses. This trick is all but essential if you have to focus an 8x10 inch camera on the ground glass; close the shutter; insert the film holder; pull the dark slide; and then take the picture, without the subject moving.
0.974137
Nevada and Oklahoma became the 29th and 30th states to require ignition interlocks after a first drunk driving offense. Louisiana is one of those states that require the driver to blow into a device which measures their blood alcohol content. If the person is legally drunk, the car will not start. From 2006-16, there were 2.3 million halted drunk drivers due to the interlock, according to Ron Replogle, law enforcement manager of Mothers Against Drunk Driving (MADD). In just 2016, 348,000 drunk drivers could not start their car! The result is that the number of drunk driving deaths in America have fallen 51% from nearly 21,000 in 1982 to only 10,265 in 2015. MADD deserves credit for this plunge in alcohol related deaths, since it has been the major advocate for ignition interlocks to reduce drunk driving. Florida debated a similar law this year, but did not pass it. Florida recorded 797 deaths due to drunk driving in 2015 - 103 more than the previous year, the biggest percentage jump of any state. Currently, Florida requires the ignition interlock only after a second drunk driving offense. The question is why didn't Florida vote to impose the interlock after a single offense? And why haven't 19 other states passed similar laws? First-time offenders have driven drunk an average of 80 times before they are arrested! What most other states do is suspend the drunk driver's license for a first offense. However, 50% to 75% of convicted drunk drivers continue to drive on a suspended license. Many states like Florida require the interlock only after a second offense. Alcohol-impaired driving fatalities accounted for 29% of the total traffic deaths in 2015. Two-thirds of the 10,265 killed were due to drivers with a BAC of .15 or higher - double the usual drunk driving level. One bright spot in this story is that the number of persons under age 21 killed in drunk driving crashes decreased 80% from the record high of 5,215 in 1982 to only 1,021 in 2015. What's needed are laws that prevent first offenders from becoming repeat offenders, so that more lives are saved. Mothers Against Drunk Driving was founded by Candy Lightner in 1980 after her daughter was killed by a repeat drunk driving offender. Few people have had such an impact in saving lives. MADD is now the largest nonprofit fighting to end drunk driving. It also works to reduced drugged driving and has supported more than million victims of these violent crimes. MADD has helped save 340,000 lives as it has cut drunk driving in half! How effective are ignition interlocks? New Mexico and Arizona were among the first states to pass laws requiring those convicted of one drunk driving offense to install an ignition interlock in 2006 and 2007. In the decade since their drunk driving deaths have fallen 30%. These devices cost drivers an initial $75 to $100 for installation and then $2.15 a day or $785 over a year. That's not a small sum, but think of the saved lives. Here are the 20 states that do not require the ignition interlock after a first offense: California, Florida, Georgia, Idaho, Indiana, Iowa, Kentucky, Massachusetts, Michigan, Minnesota, Montana, New Jersey, North Carolina, North Dakota, Ohio, Pennsylvania, South Carolina, South Dakota, Wisconsin and Wyoming. It is time for the people of those states to demand that their state legislatures pass a law requiring an ignition interlock after a first offense. A great step to save thousands of lives!.
0.927743
Rick Ponting has cast doubt on Alastair Cook's international future beyond the upcoming Ashes, after drawing comparisons with the end of his own career. Cook, England's all-time leading run-scorer, goes into Thursday's opening Test at The Gabba with 147 caps and a batting average of 46.33, a dip from its zenith five years ago, when it stood at just over 50. Ponting entered the 2010-11 Ashes with 148 matches behind him and although he continued for a further 18 months after relinquishing the captaincy, it was the beginning of the end for him. Over his final 20 Tests he averaged just 33.17 - well below his previously stellar mark of 54.68 - with his tally of runs including just two hundreds. 'I know myself having been through it that when you've played a certain amount of games or scored a certain amount of runs - like Cook - trying to find ways to improve on a daily basis becomes really difficult,' said Ponting, a BT Sport pundit. Ponting, his country's most successful Test captain, says of the Australia Test selections that he would have stuck with the Middlesbrough-born Matthew Renshaw. 'I know his numbers don't really stack up the last few weeks the way he would have liked and the way some of the coaches and selectors would have liked, but we have seen enough - even if he's not batting well,' Ponting said. Ponting suggests an England side 'who have a few more issues in their line-up than they have had for the last 10 or 12 years', will be placed under severe pressure by Australia's new-look pace attack of Mitchell Starc, Josh Hazlewood and Pat Cummins. 'They are going to cause some real problems to the English batsmen and the reason I say that is they have all been around for a little while now, they are fast bowlers who are just about at their physical peak and on their way up. 'We saw what Mitchell Starc was able to do in the last few rounds of Sheffield Shield cricket, taking two hat-tricks in the one game, so he is obviously in some good touch. 'Cummins has been on the park for six to eight months uninterrupted, and is bowling very quick. And Hazlewood just seems to get better from series to series. Joe Root's England begin their quest to retain the urn at one of the world's toughest venues for visitors - it is 29 years since a touring team was last successful in Brisbane, when Viv Richards's great West Indies team won by nine wickets.
0.872401
You are driving in Dade County and happen to have an open can of beer, or a mixed drink, in your cup holder. A police officer pulls you over. What are the ramifications? Florida has an “open container” law, which may result in you receiving a ticket. According to the law, which is codified in Section 316.1936 of the Florida Statutes, an “open container” is defined as any container of an alcoholic beverage that is capable of being consumed from, or has a broken seal. No driver or passenger inside a vehicle may possess an open container of an alcoholic beverage or consume an alcoholic beverage inside a vehicle. And even if your vehicle is parked or stopped, it is still against the law for you, or a passenger, to be in possession of an open container of an alcoholic beverage. You could also be charged with violating the open container law if you are simply walking outside. If your open container is locked inside the glove compartment or trunk, you should be okay. This is because it is legal to purchase alcohol and transport it to your home, vacation rental, friend’s house, etc. However, if the drink is in your cup holder and exposed, you are likely in violation of this law. Other exceptions to the open container law include passengers in a bus where the driver holds a valid commercial driver’s license. In this scenario, a bus passenger may possess the open drink. Another exception is if you are in a “self-contained motor home” that is longer than 21 feet. Since this is considered a home, rather than a vehicle, you can have an open alcoholic beverage inside the motor home. An open container violation is generally considered a “moving violation” if you are charged as the driver of the vehicle. A conviction could result in points on your driving record and a steep increase in your auto insurance premiums. If you are only charged with an open container violation, you will likely only have to pay a fine. However, a common situation that arises is a police officer sees the open container of alcohol and suspects that you are driving under the influence. This is because an open container of alcohol in your cup holder may provide the officer with probable cause that you may be intoxicated. This would enable the officer to perform a field sobriety test or ask you to take a Breathalyzer test. If you are charged with a DUI, the potential punishments are much more serious. A DUI conviction could result in jail time, the loss of your driver’s license, a large fine, etc. You have the right to contest an open container charge. In many instances, the police officer who issued the open container citation relied solely on their perception of the scene in order to make a determination of guilt. Because this determination is fairly subjective, your West Palm Beach defense attorney may be able to contest this perception in court. Another important defense is to determine whether the police officer actually had probable cause to pull you over and search your vehicle in the first place. If you were operating your vehicle properly and were within the speed limit, the officer may not have had the basis to pull you over. If you are charged with an open container violation, you have the right to fight the charge. Contact the Skier Law Firm, P.A. in West Palm Beach to determine the best legal defense available. We have years of experience defending clients and protecting the rights of those wrongfully accused.
0.99921
What evidence can you find in the story to support either view? At first she attempts to do this with as much care and affection as she can muster but her revulsion to Gregor's physical appearance is so great that eventually her love towards him wanes and she views her care taking of him as a chore rather than a kindness. Commenting on the genre debate, G. Using the essay topics below in conjunction with the list of important quotes from The Metamorphosis at the bottom of the page, you should have no trouble connecting with the text and writing an excellent essay. Max reads from an unnamed play. As an allegory--a story more symbolic than realistic--the story could be read as a dark fable about the effects of capitalism and greed on the family unit. New York: Random House, 1915. He ponders the consequences of this delay. Existentialism is a philoshophy that emphasizes human experience and existence, popularized in the early 20th century. This begins a routine in which his sister feeds him and cleans up while he hides under the couch, afraid that his appearance will frighten her. Economic effects on human relationships Gregor is enslaved by his family because he is the one who makes money. There are points in the story where his family seems to genuinely care about his life and current condition, but underlining this supposed care is the selfish desire of his family for him to continue to be the breadwinner. Berkeley: University of California Press. In this sense, the disposal of Gregor's body represents the cruelty with which humans forget about each other after death, and, more generally, the way in which humans never truly establish meaningful bonds during life. He is the one suffering the limited mobility and inability to speak, the rejection, his diminished status, and his having become a burden to those who loved him. Norman: University of Oklahoma Press. This love what the final ingredient he needed to establish his identity. End your research paper worries in less than 5 Minutes! No one in the story wonders how a healthy human being could turn into a bug. He finds his humanity only at the end, when his sister's playing reminds him of his love for his family. She is initially shocked at Gregor's transformation; however, she wants to enter his room. Even though his family is in the same house, he was alienated from them: ''If Gregor had only been able to speak to his sister and thank her for all that she had to do for him, it would have been easier for him to bear it; but as it was it caused him pain. Archived from on 5 May 2013. Furthermore, he is unable to speak, and consequently he has no way of communicating with other people. The decision his family makes to clear his room of all symbols of his personality and former self represents the way in which he was stripped of his humanity. He is kept locked in his room and brought food. After his metamorphosis, Gregor feels completely alienated from his room and environment and, as a symbol of this, can't even see his street out the window. Only at the end of the novel when he saw his sister playing reminded him what love to the family is, and how important it is, he finally understood what his strong side is — his humanity. A man who turned into an insect? The work as a whole inverts the accepted order, elevating humans and human passions while making the gods and their desires and conquests objects of low humor. Do you think the other characters should have been open to the possibility that Gregor may be communicating in other ways? This supports the existential irony: Gregor is more human as an insect than he ever was as a human. He also points to the grotesque and tragicomical, silent film-like elements. Look at the bottom of the page to identify which edition of Kafka's Metamorphosis they are referring to. Gregor injures himself squeezing back through the doorway, and his father slams the door shut. Gregor's transformation is the physical manifestation that Kafka tries to suggest happened metaphorically long ago. He is ostracized by society and his family and forced to be come a recluse. The appearance is just the thing which was given, but what we think, how we react, behave and feel is who we are. In the end, his room is cleaned not so often, and his sister stopped worrying about what food she brings to him. The Cambridge companion to Ovid. He suddenly understood that he likes it; he understood that he would never feel physical and emotional comfort together again. . Kafka criticizes capitalism by manifesting, in a literal way, the dehumanizing effects of modern life; Gregor's actual physical transformation reflects how his life was metaphorically that of a bug before the physical, literal transformation into one. Some of the Metamorphoses derives from earlier literary and poetic treatment of the same myths. As Gregor Samsa awoke one morning from uneasy dreams, he found himself transformed in his bed into a gigantic insect-like creature. From Gregor's perspective, his mother and father seem to merge into a single, multi-limbed creature, monstrous in its intention to both hurt Gregor and spare his life. Gregor continues to change after his transformation into a vermin, as his new body influences his mental life through new needs and behaviors. It is not at all uncommon for an author to portray their own environment in their writings. But fortunately his humanity never disappears entirely, and he feels conflicted as a result. Samsa realize that, in spite of going through hardships which have brought an amount of paleness to her face, Grete appears to have grown up into a pretty and well-figured lady, which leads her parents to think about finding her a husband. There's a certain arrogance in these thoughts, which, when read in a certain light, seem to suggest that Gregor alone is being persecuted, and that no one else suffers but him. In it, he describes a man who had taken over the financial support of his family after the family business failed. Despite the fact that his metamorphosis is not his fault, however, he is racked by guilt every time that the family mentions money or that he thinks about the pain that he has inadvertently inflicted on them by losing the ability to support them.
0.926545
On March 17, 1861, Santana announced the annexation of the Dominican Republic by Spain. A number of conditions had combined to bring about this reversion to colonialism. The Civil War in the United States had lessened the Spanish fear of retaliation from the north. In Spain itself, the ruling Liberal Union of General Leopoldo O'Donnell had been advocating renewed imperial expansion. And in the Dominican Republic, both the ruler and a portion of the ruled were sufficiently concerned about the possibility either of a renewed attack from Haiti or of domestic economic collapse to find the prospect of annexation attractive. Support for annexation did not run as deep as Santana and his clique had represented to the Spanish, however. The first rebellion against Spanish rule broke out in May 1861, but it was quashed in short order. A better organized revolt, under the leadership of the baecista, General Sánchez, sprang up only a month later. Santana, now bearing the title of captain general of the Province of Santo Domingo, was forced to take to the field against his own countrymen as the representative of a foreign power. The wily Santana lured Sánchez into an ambush, where he was captured and executed. Despite this service, Santana found his personal power and his ability to dole out patronage to his followers greatly restricted under Spanish rule. In a fit of pique, he resigned the captaincy general in January 1862. Resentment and rebellion continued, fed by racial tension, excessive taxation, the failure to stabilize the currency, the uncompensated requisition of supplies by the Spanish army, heavyhanded reform of local religious customs by an inflexible Spanish archbishop, and the restriction of trade to the benefit of the Spanish empire. The Spaniards quelled more uprisings in 1863, but guerrilla actions continued. In response to the continuing unrest, a state of siege was declared in February 1863. Rebellious Dominicans set up a provisional government in Santiago, headed by General José Antonio Salcedo Ramírez, on September 14, 1863. Their proclamation of an Act of Independence launched what is known as the War of Restoration. For their part, the Spanish once again turned to Santana, who received command of a force made up largely of mercenaries; however, this campaign was the last for the old caudillo. By this time, his popularity had all but disappeared. Indeed, the provisional government had denounced Santana and had condemned him to death for his actions against his countrymen. On June 14, 1864, a broken and despondent Santana saved the rebels the trouble of carrying out their sentence. The timing of his death lent credence to speculation that he had committed suicide, although this belief was never proven. Meanwhile, the guerrilla war against the Spanish ground on. The rebels further formalized their provisional rule by replacing Salcedo (who had advocated the return of Báez to rule a restored republic) and by then holding a national convention on February 27, 1865, which enacted a new constitution and elected Pedro Antonio Pimentel Chamorro president. Circumstances began to favor a Spanish withdrawal. The conclusion of its Civil War promised that the United States would make new efforts to enforce the Monroe Doctrine, which barred European powers from the Western Hemisphere. Spanish military forces, unable to contain the spread of the insurrection, lost even greater numbers of troops to disease than they did to the guerrillas. The O'Donnell government had fallen, taking with it any dreams of a renewed Spanish empire. On March 3, 1865, the Queen of Spain approved a decree repealing the annexation of Santo Domingo. The Spanish left political chaos in their wake. A power struggle began between the conservative, cacique-dominated south and the more liberal Cibao, where the prevalence of medium-sized landholdings contributed to a more egalitarian social structure. The two camps eventually coalesced under the banners of separate political parties. The Cibaeños (residents of the Cibao) adhered to the National Liberal Party (Partido Nacional Liberal), which became known as the Blue Party (Partido Azul). The southerners rallied to the Red Party (Partido Rojo). The conservative Reds effectively employed their numerical superiority in the capital to force the restoration of Báez, who returned triumphantly from exile and assumed the presidency on December 8, 1865. Never again, however, would he exercise the sort of dictatorial control over the republic that he and Santana had once alternately enjoyed. The country's institutions had changed. Regional forces mustered during the War of Restoration had replaced the national army that previously had done battle with the Haitians. Political power had likewise been diffused, particularly between the opposing poles of the Cibao and the south. Under these conditions, it was difficult, if not impossible, for one man to dominate the entire nation.
0.999999
Rate this Article The development and application of Haptic feedback for VR continues to make new strides with newly developed wearable devices. Let’s take a look at a brand new one. The VR industry continues to expand with a lot more devices and VR peripherals making their debut in the market. From VR masks to sandals, the list keeps going on. A lot of effort is going into making VR into a perfect experience. We truly are at the infancy of the technology as we still need to wear or attach contraptions and devices to ourselves for a chance to experience a complete feel of VR. One of the major aspects of the technology being worked on to optimize the experience is the body suit. Several versions are being developed from wearable vests to full suits that encompass the body of the user. Each one no doubt has it’s own advantages in bringing VR to a person’s body area. Body suits rely on Haptics or the sense of touch. Haptic feedback happens when you the gamer feels the sensation of physical contact as a result of playing the game. NullSpace VR, Inc. is a company founded by Morgan Sinko and his close colleagues Lucian Copeland and Jordan Brooks from the University of Rochester. They are continually working on ways on how to revolutionize the way gamers interact with Virtual Reality. After years of experimenting, prototyping, and testing, they where able to come up with a revolutionary Haptic feedback vest that delivers a fully immersive VR experience in terms of physical sensation. The vest which is worn like sort of a jacket lets the player experience a wide range of effects from being hit by something to feeling a blast of wind or a spray of water taking place in the game. Actions like punching, hugging and rubbing in VR will be fully simulated through the vest. Called the Hardlight VR, the vest contain 16 programmable Haptic pads which are placed at strategic points that provide extremely precise touch feedback. It also uses a cadre of inertial tracking sensors to mirror the physical movements inside the game. This technique will let you see your entire avatar within the game and not just a head and a pair of floating hands. The Hardlight VR uses Vibro-Tactile feedback similar to that being used with console game pads where it vibrates and gives you a shockwave when you get hit by something in the game. At that, an audio haptic mode is provided as an option where you can experience the feedback when playing outside of VR. You can play console games with your X-box and PlayStation and experience the effect without having to wear a VR headset. The vest was developed to be adjustable and breathable so that people of different shapes and sizes can wear it comfortably. It was designed to sort of be adjusted once then simply worn like a jacket whenever it will be used. Specific sizes have been made available for both men and women. There are straps on the side that can be adjusted to fit both lean and bulky users. The arm straps can be adjusted as well depending on the size or thickness of your arms whether it’s flab, muscle or bone. Finally the shoulder straps can be widened or narrowed to fit your biceps and shoulders. This is the trickiest part to adjust and is usually set up only once. The vest only weighs around 3.5 pounds which is similar to a light jacket. Also, the weight is distributed around your body so you will barely notice it at all. The developers have pledged their commitment to provide Hardlight VR vests that will fit almost everyone as possible and invite people with unusual body measurements to contact them. GabeN would definitely want one for himself so, good luck to the developers. Also, the package comes with an easy to use Application Program Interface (API) to allow developers to add Hardlight compatibility to existing games. A huge library of immersive Haptic functions is provided as well. As of now, the vest is tethered to the PC via USB cable but the final version according to Sinko will be a remote wireless affair. The project was placed on Kickstart and has since then reached its kickstart mark. The company is targeting the release of the final commercial version around September of this year and is available as of now pre-ordered only through Kickstarter for a price of 499 USD. The day will come that all we need will be ourselves to experience VR in a Holo-Deck and VR may be able to experience us as well in the outside just like Robert Picardo running around the Starship Voyager with his mobile emitter. Till then, let’s use what we’ve got.
0.988135
Tailor-made Middle East tours, at local prices. When traveling in Jordan, a visit to the Dead Sea is not to be missed. Float in the surreal waters or enjoy the therapeutic experience. Take this one step further and spend the day in one of the Dead Sea’s famous spas and pamper yourself in this incredible place. While you’re here, travel the short distance to the Red Sea and see all of the vibrant life in its waters, perfect for snorkeling and scuba diving. At the heart of Jordan lies the lunar landscape of Wadi Rum. Trek across its dunes, camping overnight and enjoying incredible barbecued meals under the stars in the desert. You may recognize the bizarre rock formations from some of your favorite films, such as Star Wars. Explore Isfahan city and its treasures as you travel through Iran. See the ancient Persian history that is still visible around every corner. Visit incredible buildings, gardens and mosques and marvel at the colorful and unforgettable architecture. While you’re in Iran, you can also see the ancient ruins of Persepolis, which is one of the world’s most celebrated UNESCO World Heritage Sites. Israel is a fantastic option for travelers interested in history and culture here, with sites such as Nazareth and Galilee that have enough history and significance for even the most avid history buffs to sink their teeth in to. For first-time visitors, The Middle-East can seem a little strange, since many of its customs and culture is different. Here are a few things to be aware of to make sure that you’re prepared for your trip. Since The Middle East has fairly strict rules regarding modesty and clothes which are deemed to be revealing, it is advisable to dress conservatively, especially if you plan on visiting religious sites. Shorts or sleeveless t shirts are generally to be avoided, whether you’re male or female, as are short skirts for women. Women are not forced to cover up totally by any means, but you should be respectful of The Middle Eastern culture and avoid showing too much skin. Throughout your trip, you may be offered coffee by locals, hosts, guides and even shop keepers. In The Middle East, this is seen as a gesture of hospitality and, as such, it is considered rude to decline the offer. Try to always accept, or if you have to decline, do so with grace and understanding. Prices in The Middle East are a strange concept, since, often, prices are by no means fixed. Not only is haggling common, it is usually expected. If you don’t feel comfortable discussing prices in this way, a guide can always assist you, but you may find that you enjoy this tradition that is so different from western custom. ’Salamu alaikum’ is the greeting used by almost all muslims - why not learn it and give the people you meet a proper greeting? Lastly, Don’t come to The Middle East expecting a glass of wine with every meal. Alcohol (and pork!) is harder to come by than you may be accustomed to. Enjoy traditional foods such as hummus, falafel or baba ghanoush made authentically in a local restaurant or a home stay. These are Middle Eastern classics as you’ve never had them before. Tabouleh is a vegetarian mixture of herbs, tomatoes, parsley, bulgur and onions and is seasoned with a traditional mixture of olive oil, lemon juice and salt. Enjoy this as a topping, an accompaniment or just by itself! Shawarma is a rotisserie meat preparation, rich in flavor and a perfect comfort food. Eaten with a deliciously fluffy flat bread, local herbs and spices and a sauce of your choice. Foul Mudammes is a delicious Middle Eastern breakfast made from boiled and mashed fava beans with a spicy soup-like sauce. A hearty breakfast, it is traditionally eaten with brad and is sure to fuel a day of Middle Eastern exploration. Mujadarra, made of rice and lentils, is a Middle Eastern variation on rice and beans, which can be found in many cultures. Great for vegetarians, this tasty dish is served as a side dish to accompany any meal but can be served as a main dish too. Whilst Petra in Jordan is an ancient city, rather than a modern one, it had to make the list. As one of the 7 ancient wonders of the world it is not to be missed. See the massive buildings carved in to red stone and marvel at these stunning remains of a city from many many years ago. Tel Aviv in Israel is one of the world’s most surprising cities. The majority of its population is Jewish and the culture here is everywhere. However, at the same time it is remarkably cosmopolitan, with delicious wine and food. Whilst respect is still paramount, this is a Middle-Eastern city where you can let your hair down. Any visit to The Middle-East would not be truly complete with a trip to Jerusalem in Israel. This city is truly fascinating and provides an insight into both Jewish and Muslim custom. The food here is also delicious. Stop by Tehran in Iran and visit its many amazing sites, such as the Golestan Palace Complex or carpet museum showing an ancient craft that is still in practice today.
0.98834
The article reports on the poor financial condition of MGM Mirage. Facing bankruptcy, the hotel-casino operator is expected to sell some of its assets, including Bellagio and MGM Grand Detroit. It was reported that the company would default on paying $7-$13.5 billion loans. The company operates 10 hotel-casinos and is constructing the $9.1 billion CityCenter.
0.999982
Did you know that municipalities have a duty to keep roadways safe? Unfortunately, poorly designed and dangerous roadways result in a significant number of motor vehicle crashes per year. Sometimes car accidents are not the fault of humans. Investigations and proceedings after such crashes can be incredibly upsetting, particularly when there’s nobody to blame, except the road designer. To add to the frustration, insurance companies can often stall or not give the appropriate claim for such an incident. Below are some common issues relating to poor road design and hazardous conditions that result in motor vehicle crashes every year. Dangerous roads resulting from weather conditions- This can include wet or slick roads from snow or ice. Roadway obstructions such as a fallen tree from a storm could also be an example. Roadway obstructions that impair views- This includes poorly lit areas, poorly marked areas, blind curves and more.
0.999979
One Sentence: It's better when it's being mocked. Master Pancake Theater for those that do not know, is a comedy group, that mock movies live in the theater, while the movie is playing. A lot like Mystery Science Theater 3000. We last saw Mad Max Beyond Thunderdome and well I really didn't think it was awesome. However I wanted to allow them to try again. So we watched The Day After Tomorrow, one night only at The Alamo Drafthouse. It was a lot better. They opened with a skit, they usually have the skit in the middle of the movie. The skit was funny, and topical, however we were not warmed up yet, so while it was funny the laughs were a little thin. From there though it got a lot better. This movie seemed like it was made to be mocked. Master Pancake seemed to find all the right times and places to execute some solid jokes that delivered a lot of laughter. There was also a lot of ad libbing that did well too. By the end I felt that the mockey had made the movie better, and we had a lot better time than at Thunderdome. Master Pancake is doing The Breakfast Club for the rest of the month. If you were not sure, I think you should check it out. I think it should be a good time. We will be going in the next couple of weeks.
0.999999
I read this article and found it very interesting, thought it might be something for you. The article is called Graye Showroom Moves to Hollywood and is located at https://www.californiahomedesign.com/trending/2018/09/10/graye-showroom-moves-hollywood/. Graye, the atelier and gallery in Los Angeles known for its offering of sleek contemporary design, is moving its showroom from Robertson in West Hollywood and finding a new home in Hollywood’s newest design destination. To better service the requests of its high-end clientele, Graye will transition from a private, appointment-only creative space to a showroom offering the best in custom lighting, decorative finishes, curated art and modern furnishings, which will all be immediately available for purchase. The new location will also expand its offering and enhance its focus on one-of-a-kind pieces and customization, allowing for more tailor-made projects and exclusive product offering. Designers and clients searching for unique furnishings now have the opportunity to request specific colors, finishes and materials. Graye is curated by Maria Cicione, the founder and creative director, and has long been a platform for international designers as well as up and coming local talents, making it a true haven for designers, architects and private clients seeking extraordinary pieces. A sampling of some of the globally recognized designers highlighted at the Graye showroom include Gamfratesi, Gio Ponti, Michele de Lucchi, Francesco Rota, David Lopez Quincoces, Studio Mist-o, Jean-Marie Massaud and Xavier Lust. The new showroom will also feature an impressive list of brands distributed exclusively by Graye which include MDF Italia, Porada, DeCastelli, Linteloo, Gratz Archive and the largest collection of Porro in the US.
0.984711
Is it advisable to play games with laptop pluged in? I always play computer games on my laptop without disconnecting the charger. is this act going have any effect on my battery life? Well, it could put a lot of extra heat to the battery from both a drain and a charge simultaneously. It may even depend on how demanding the game is. On a newer game that is visually demanding, it could actually not charge the battery. Overall, I wouldn't suggest it. I'm on the opposite side. If you have your battery at 100% there's no charging, just the maintaining charge and the power comes directly from the PSU. On the other side playing almost on battery put it on very high stress and high current discharge rate which could shorten a lot the lifespan of batteries or kill the battery. For high energy draw tasks PSU is the best option when you have AC available. Charge the battery to 100% when you have to play games. When it's at 100% you can play games. Some fans (cooling pad could be ok) can be useful to keep chassis temp lower, to limit any battery wear caused by the heat generated by the system. To limit battery wear,which comes naturally because li ion battery have natural wear even with no use, try to do some discharge cycles sometimes, one time at week or month. You don't need to fully discharge it (it's another source of stress and wear), 40-50% it's ok. These information I'm giving can be found in the web, on the battery university website and they are proved to be real, based on my real personal experience on many devices in the past decade. EDIT: I forgot to mention one thing: if you have removable battery in your laptop removing it is a better choice. Being a Surface Book owner I've take for granted the battery wasn't removable. In my case I charge the battery to 100% and then play with AC PSU plugged. In case of removable battery simply take it off. Of course these are just suggestion for a improved lifespan of battery, it shoudn't be a "OCD like" behaviour. Yukthi Lochana and Yahia Mostafa like this. I agree with you on this. I always use my laptop with power plugged in most of the time (but I discharge it at times too). However, from the perspective of a gamer, playing without the battery plugged in can be annoying if you are in the middle of the game and the computer hibernates because the battery is too low. Yahia Mostafa and Andrea Mangano like this. It'll be fine. Will there be an effect? Probably. Will it ultimately matter? Not really. I'd remove the battery if it had the option and you were super worried (and it was going to spend a lot of gaming time plugged in) but otherwise I wouldn't worry about it. All batteries will eventually wear out. I'm a Windows 10 user who happens to own an MSI gaming laptop and i see that on the battery notification, it's mentioned as "not charging" and sometimes this shows up even at 93% or 95% as well at 100% and i think this is an indication of how Windows is handling its power usage and switching from battery to direct power use instead of consuming the battery power so the battery isn't under heavy load when plugged-in and being used when it has switched to direct power since at this point the battery isn't the power source nor is it being used. While I do think that it would have adverse effects on the battery 'IF you were to play performance demanding games while you were on battery power instead of being plugged-in which would cause the battery to heat up due to being used heavily, however this also is less likely to occur since most high end laptops don't exactly have more than 2-3 hours of battery life in gaming hours to be specific as modern games consume a lot of power in a short duration, but if you play on your laptop through battery power until its almost drained and plug it in back to the power before it hibernates or turns off because you want to continue playing, now this may actually have adverse effects cause your battery may stay in a heavy usage situation for hours more than expected or may not be able to cool down properly which might cause damage to the battery over time. Last edited by WandowsTan; 04-28-2018 at 01:00 PM. Reason: cause i use firefox and don't have grammarly on this..seriously wut the D : ? I just don't get the people who insist on keeping their battery between 40-80% (like mentioned in the article on the main page about this). Sacrificing battery runtime to preserve overall battery longevity seems a bit bizarre, since even in a couple years the odds of losing 60% charge capacity is slim even if you do frequently top or drain then charge. I'm using a laptop with 1050Ti and it requires to be connected to power source while playing graphically intensive games, using graphically intensive work. I dont think that, we should keep on battery while using graphics card. From the above scenario, battery is not sufficient to provide the voltage necessary for the GPU, FAN to work. So my suggestion is to connect to power source while you do a lot of GPU intensive work. hey Wandows Tan, i also have an MSI laptop. i believe that the MSI software is designed to not charge back to the same levels on each charge, to help battery longevity. when it says not charging, it isn't. MSI also has a special program called MSI Battery Calibration to help keep the battery in a good state. run that program every couple months. for this discussion, MSI latop is designed to run plugged in. heat would be the only concern, but the cooling in my GT73evr is extremely good and i have no worries running it plugged in while gaming. If he lost 60% of battery capacity somehow, he'd have only 40% left, which is what he's limiting himself to voluntarily. It's an incomprehensible battery obsession. EA says it wants to do better, but why should we believe?
0.999941
What is better to say: 1. Wir gehen auf die gleiche Klasse. 2. Wir sind in der gleichen Klasse? Wir gehen auf die gleiche Klasse. Wir sind in der gleichen Klasse. Wir gehen auf/in die gleiche Schule. Wir gehen auf in die gleiche Klasse. Sorry about the confusion, but the preposition may be auf or in for the school but strictly only in for the class you attend within that school. The reason for this is the school may be meant as an institution (preposition: auf) or the physical direction/place (preposition: in). There is no such difference made for the class, the course and other smaller entities within. It's often tricky to know. To make it even more confusing, there are also physical directions/places which strictly require auf, flat things as der Hof, and das Dach which you could stand upon. Wir gehen auf den Schulhof. German is a – censored –. Also correct and not better or worse than the other. It's a place (in+dative) rather than a direction as above with gehen (needs auf+accusative or in+accusative) so people will get a more static picture about what you tell. Was bedeutet „langsam“ in diesem Kontext? Wo und wie werden “Nachcousin” und “Nachcousine” verwendet? Wie kann man ins Deutsche das russische Wort проститутка (Prostitutka) in der Bedeutung „verdorbener, verkaufbarer Mensch“ übersetzen?
0.919773
On the left, Dr. Stuart's image of the moon; image courtesy: Dr. Leon Stuart. In the early morning hours of Nov. 15, 1953, an amateur astronomer in Oklahoma photographed what he believed to be a massive, white-hot fireball of vaporized rock rising from the center of the Moon's face. If his theory was right, Dr. Leon Stuart would be the first and only human in history to witness and document the impact of an asteroid-sized body impacting the Moon's scarred exterior. Almost a half-century, numerous space probes and six manned lunar landings later, what had become known in astronomy circles as 'Stuart's Event' was still an unproven, controversial theory. Skeptics dismissed Stuart's data as inconclusive and claimed the flash was a result of a meteorite entering Earth's atmosphere. That is, until Dr. Bonnie J. Buratti, a scientist at NASA's Jet Propulsion Laboratory, Pasadena, Calif., and Lane Johnson of Pomona College, Claremont, Calif., took a fresh look at the 50-year-old lunar mystery. Buratti and Johnson's reconnaissance of the 35-kilometer (21.75-mile) wide region where the impact likely occurred led them to observations made by spacecraft orbiting the Moon. First, they dusted off photographs taken from the Lunar Orbiter spacecraft back in 1967, but none of the craters appeared a likely candidate. Then they consulted the more detailed imagery taken from the Clementine spacecraft in 1994. 'Using Stuart's photograph of the lunar flash, we estimated the object that hit the Moon was approximately 20 meters (65.6 feet) across, and the resulting crater would be in the range of one to two kilometers (.62 to 1.24 miles) across. We were looking for fresh craters with a non-eroded appearance,' Buratti said. Part of what makes a Moon crater look 'fresh' is the appearance of a bluish tinge to the surface. This bluish tinge indicates lunar soil that is relatively untouched by a process called 'space weathering,' which reddens the soil. Another indicator of a fresh crater is that it reflects distinctly more light than the surrounding area. Buratti and Johnson's search of images from the Clementine mission revealed a 1.5-kilometer (0.93 mile) wide crater. It had a bright blue, fresh-appearing layer of material surrounding the impact site, and it was located in the middle of Stuart's photograph of the 1953 flash. The crater's size is consistent with the energy produced by the observed flash; it has the right color and reflectance, and it is the right shape. Having the vital statistics of Stuart's crater, Buratti and Johnson calculated the energy released at impact was about .5 megatons (35 times more powerful than the Hiroshima atomic bomb). They estimate such events occur on the lunar surface once every half-century. 'To me this is the celestial equivalent of observing a once-in-a-century hurricane,' said Buratti. 'We're taught the Moon is geologically dead, but this proves that it is not. Here we can actually see weather on the Moon,' she said. While Dr. Stuart passed on in 1969, his son Jerry Stuart offered some thoughts about Buratti and Lane's findings. 'Astronomy is all about investigation and discovery. It was my father's passion, and I know he would be quite pleased,' he said. Buratti and Johnson's study appears in the latest issue of the space journal, Icarus. The NASA Planetary Geology and Planetary Astronomy Programs and the National Science Foundation funded Buratti's work. The California Institute of Technology manages JPL for NASA. More information about NASA's planetary missions, astronomical observations, and laboratory measurements is available on the Internet at http://pds.jpl.nasa.gov.
0.933306
Vaccination against smallpox in the United States will begin with the army and end the Bush daughters On Wednesday it became known about the early programs in the U.S. vaccination against smallpox emergency physicians and the military of rapid response teams, CNN reports. The full plan will be announced on Friday, President Bush. The program will be launched in the coming weeks. It is designed to protect against possible terrorist attacks. It remains unclear whether vaccinated military leaving Iraq for a possible war with Saddam Hussein. As officials say intelligence and medical services in the USA, Iraq has the pox viruses suitable for use as biological weapons: "I believe that Iraq has smallpox. Of course, this is a working hypothesis," he said on Monday organized by the Harvard University conference in Los Angeles Ronald Atlas (Ronald Atlas, President of the American society for Microbiology. Civilians will be asked to vaccinated voluntarily, but not earlier than sufficient drugs pass the licensing procedure. This process is expected to be completed in early 2004. 'I think it must be voluntary, said U.S. President George Bush (George Bush) part of the plan devoted to vaccination of civilian persons - in Other words, I don't think people should be forced to have the vaccinations. Everyone has to make a decision that he feels is right for himself and his family. And it is very important to provide public information to the extent necessary to ensure that this decision was a wise one'. US first lady Laura Bush (Laura Bush) has supported her husband, CNN saying that she wants her 21-year-old daughter caught smallpox. About half of the U.S. population has not been vaccinated against smallpox Americans were not vaccinated since 1972. There are also doubts about the safety of immunity in those who were vaccinated decades ago. It is known that in the USA there are 15.4 million doses of vaccine against smallpox. We study the possibility of dilution of the vaccine in the water at the rate of one to five, so as to gain 77 million doses. Smallpox in the world was destroyed in 1980, however, if the virus of this disease will again be released, a deadly disease can cover the entire planet in a few days. Source: Mednovosti.ru.
0.967272
Handheld scanners can be compared to a computer keyboard, they are a device used to enter data into a computer or operating system, as opposed to a mobile computer which runs an operating system and is equipped with a built-in scanner. If you're thinking about buying barcode scanners to assist with your operations, the following questions should be considered to determine the best option for your application. Are the most well-known type of scanner. Work by using a laser-beam light source, and the barcode is decoded by a photo diode which measures the light reflected back from the barcode into the laser. Have the advantage of reading barcodes on any surface, including digital devices and can even read damaged or poorly printed codes. Capture the barcode as an image before analysing and decoding it. Read 1D barcodes as well as 2D barcodes, which contain significantly more information in the code. Have omni-directional reading capability, where the orientation of the barcode doesn't need to be positioned to suit the scanner, resulting in faster reads and less time spent aiming the scanner. High-performance Area Imagers can also capture and transfer images, like signatures or a photographic image, useful for proof of delivery or evidence of a damaged shipment. The information that has been decoded from the barcode will need to be transferred to a computer, cash register or host operating system. The simplest and most cost-effective method to transmit this data is via a USB cable. Corded systems offer easy plug-and-play installation. Handheld cordless scanners communicate wirelessly with a base station or charging cradle which is connected to the computer via a cable. Again they are simple to install, just plug the base station into the host computer then pair the scanner to the base station. Cordless scanning offers freedom of movement and productivity gains, especially if you are scanning outdoors, on-floor or have a cross-facility application. Additionally, cordless scanners eliminate the clutter of cables and potential trip hazards of corded devices. If your application is particularly scan intensive or requires continuous scanning for long periods of time, consider the battery life in the scanner's specifications. Some cordless scanners have Batch Mode functionality which allows you to keep scanning even when working outside the wireless range of the base station. The scanned information is stored in the device's memory and later transferred to the host computer when within range. Some handheld scanner models have a stand accessory which allows for presentation scanning. This enables 'hands-free' scanning, and there is no need to hold the scanner, just wave the barcode past the scanner to read the code. There are handheld scanners available for all working environments. Basic models are designed for retail, office or light industrial use. Scanner manufacturers know that scanners do get dropped and knocked, so even standard models are designed to survive drops onto concrete. For demanding, industrial environments, there are handheld scanning devices that are designed with IP65-seals to withstand dust and water. These tough scanners are built to tolerate 5000 2m drops, even in freezer conditions. In less challenging environments scanners are sometimes mistreated so investing in a more rugged design can prove a wise decision when compared not only the cost of a replacement scanner but also the cost of the downtime from being without a scanning device. Ready to check out your options? Click below to see our range of 1D and 2D barcode scanners from Honeywell, Zebra & Datalogic available in our online store now.
0.952806
Whether a relationship is an intimate one between two people, or a more formal relationship, there should be boundaries. These help people to keep a slight distance from others, and they are the basis of functioning in society without chaos. Those who recognize the importance of boundaries are more likely to have successful relationships, and those who refuse to follow them are apt to hurt other people with their neglect. It is important in an intimate relationship to remain within the boundaries, but it is also reasonable to discuss them when they become too restrictive. Playing by the rules is important for a good relationship, and a partner has the right to know what to expect. Modern life often seems to be complete chaos, but being with someone should be like taking in a relaxing breath of fresh air. Boundaries help define the air quality, and this is why they remain important. Predictability sounds boring and limiting, but it can be a good way to conduct a successful relationship. Those who know how their partner will react to a number of situations have a better chance of avoiding relationship mishaps. If one person in the relationship constantly changes the rules, their partner will experience apprehension on a regular basis when unexpected events occur. This will destroy a relationship over time. While boundaries are important in a relationship, they should be agreed upon by the parties involved. If one person has a strict set of boundaries, they may believe they cannot share their life with someone who is free-spirited. This is not true, but both of them must be willing to compromise. The free-spirited person must be willing to accept some concrete ground rules, but the person who prefers strict boundaries must be willing to loosen up if they want the partnership to succeed.
0.999975
I’m not sure if I can think of another case where a game’s title so effectively conveys its subject matter. It could refer to the decaying undead hordes that shuffle around the map, or the fact that nearly every aspect of the community which you must try and ensure the survival of deteriorates over time. Perhaps it is referring to my mental state, which seemed to degrade as I continued playing, becoming more and more anxious as the needs of my growing community seemed to increase in an inverse relationship to the ease with which I could meet them. Yes, State of Decay has returned, and once again in the form of a zombie survival sandbox that puts the emphasis squarely on overseeing the continued well-being of a group of survivors over zombie-slaying or the power fantasy of any individual character. The sequel starts out the same way as its predecessor, with a brief scripted tutorial that introduces you to your starting characters (of which you have several choices) and the basics of the game. Before long, you must choose between one of the three available areas as a location to start your community, with each area representing a unique, sizeable map in what appears to be American suburbia. Once you get your group of survivors settled into a safe-house, a bunch of stats delineating the amount of different resources you have alongside the morale of your group appears on screen, and the real game begins. As with State of Decay 1, managing the well-being of your community represents the core of the experience, and everything you accomplish will be in service of ensuring the survival of the collective group. If the character you are playing as dies, rather than reload a previous save, you simply take over a different character from the remaining survivors. Everything you do is permanent, which adds a significant layer of tension. Each survivor has specific skills, such as medicine or gardening, and these can prove critical to your group’s endurance, and losing just one person can be a major setback if it happens at the wrong moment. The most important and most common thing you will need to worry about is having enough resources. A large part of State of Decay 2 is comprised of going on scavenging runs and looking for rucksacks filled with food, fuel, ammunition, medical supplies or building materials. These are the basic resources stored at your base, and some of them are used up constantly, especially food and medical supplies. At the start of each campaign, you can search the buildings surrounding your base and find what you need pretty easily for your small group of survivors. There is even a risk/reward mechanic when it comes to searching containers for supplies, as you can search slowly without making noise, or search quickly and risk causing a ruckus that might attract some unwanted attention. Once you clean out the areas immediately surrounding your base and start taking in new survivors who you find out in the world, securing enough resources becomes increasingly difficult. Each character can carry one rucksack of supplies at a time, meaning you will need to use vehicles so you can load supplies into the back and cover longer distances on the increasingly dangerous and difficult scavenging runs. Vehicle handling is very bouncy and arcadey, and using cars as a weapon against zombies is encouraged as you can open your car door while driving past to eviscerate them without damaging the vehicle, or even upgrade the vehicle to make more direct hits a more sustainable method. Vehicles are prone to get stuck on objects like rocks or railings and bug out, which can be frustrating since they can be somewhat rare and you risk losing them permanently if you get them truly stuck. Fuel and repair kits are further resources required to keep your car running, and their engines also make noise which attracts zombies, meaning using them isn’t without downsides. Another thing you must keep an eye on is the zombie blood plague, contracted to your survivors by certain infected zombies that have red glowing eyes. You can build a medical clinic to cure and look after those who become infected with it, but otherwise survivors who contract blood plague are doomed to become zombies themselves. To get rid of plague zombies, you must deal with plague hearts which is a challenging task where you destroy a tough disease-spewing blob while fighting off waves of plague zombies. One long-term objective is to clear the town of plague hearts to stop plague zombies from appearing, with each successive heart seemingly getting harder to kill. When it comes to fighting, the mechanics are simple but fairly satisfying. You can use melee weapons or firearms, with a basic stamina system where attacking and dodging use stamina governs the melee. Zombie heads pop like watermelons, and you can perform a finishing move on knocked-down undead, and unlock a couple of special moves such as a drop-kick for survivors who are experienced in melee combat. Firearms are similarly straightforward, with no way to aim down sights, and only a basic zoom-in capability for scoped weapons. There is a good variety of firearms and melee weapons but most of them handle in very similar ways. There are even basic stealth mechanics, letting you sneak around and do takedowns from behind zombies, or use silenced weapons to avoid attracting unwanted hordes. This is useful when clearing zombie infestations, structures that get particularly overrun with the undead and lower morale in your community. Most infestations have screamer zombies that will let out a terrible shriek and cause others nearby to come running, so sneaking around until the screamers have been killed is encouraged. Other special zombie types return from State of Decay 1, including bloaters who explode in poisonous gas clouds, fast and viscous volatile zombies, and giant hulking beasts who I tended to avoid. Though the combat is fairly simplistic, incredible tension can still arise when you find yourself in a bad situation. One time I was out doing a simple errand with one of my most well equipped and experienced survivors who I hoped would eventually become the leader of the group. It was dark when returning to my base, and I drove off a small cliff just a hundred meters from my main base. My car got stuck and I got out, only to find myself fighting a volatile zombie alongside a large horde of normal ones. My character was suffering from fatigue and was also over-burdened with gear, and I ended up losing him within sight of my home base. These kinds of thrilling and terrifying moments arise organically and with enough frequency to make the more mundane aspects of keeping your community alive more meaningful with the possibility of things going terribly wrong always lurking around the corner. If you aren’t busy enough with supply runs, clearing infestations and destroying plague hearts, you will also need to worry about completing missions for survivors in your group, or for other groups of survivors. The missions themselves are usually pretty straightforward; you might help another survivor go on a looting run, or help another group construct something in their base like a Still so that you can have access its benefits without building one yourself. These missions can be ignored, but other groups can turn hostile if you ignore them for long enough, and fighting bandits can be dangerous. Managing your community, home base and outposts also requires some attention. Your starting base will be relatively small, with only a handful of beds and a few slots for constructing facilities. These range from medical depos and a workbench to let you craft special items like bombs and ammunition, to gardens and farms that let you grow food or healing herbs, to watch towers that improve your base's defensive prospects. Once your community grows enough, you will need to find outposts which let you access your supplies remotely, and also provide bonuses like some extra beds or food collection. If your community gets big enough, you may even need to move your main base to a larger facility, which will require a large chunk of influence, the currency in State of Decay 2 you get from trading with other groups, completing missions and killing special zombies. Much of the above will sound familiar to anyone who played State of Decay 1, and the sequel definitely follows closely in the design footprints of its predecessor. One new feature is co-operative play for up to four players, which can be done a couple of ways. You have a radio in-game which can be used to locate resources, or to call for help. You can call for help to match-make a random person into your game, or volunteer yourself to go into another person’s, a bit like summoning in Dark Souls. You can also just join friend’s games via the Xbox interface in a more typical fashion, though having your game always open to be joined by friends means you cannot pause even when playing alone. The game allows for cross-platform play between PC and Xbox, and is a Play Anywhere title so you can play on either platform with a single copy on the same account. Co-op integration is otherwise fairly smooth, though you will need to bring one of your own survivors into co-op sessions and risk them getting killed or injured. You can bring back any items you find while scavenging in another person’s game into your own, but not major resources like rucksacks of food or medical supplies which you must donate to the host's community. When scavenging, resource containers are color-coded, meaning each player can only search containers highlighted with a color that corresponds to them. This system works well enough, providing a chance for the person joining to get some basic supplies like weapons and ammo without having time move forward in their own game, while the host gets an extra set of hands to help kill zombies and bring resources back to their base. One aspect of State of Decay 1 that does unfortunately return here is an overall lack of polish. Minor glitches such as doors that already look open needing to be opened again, seeing zombies spawning ten feet off the ground or getting stuck running into buildings are the most common. In co-op as a visitor, I found some objects in the host's world were invisible to me, and some weird flickering when both myself and the host were using flashlights. I got stuck in between rocks a couple of times, but there is a ‘I’m stuck’ button that will back-track your character a small amount that helped me in these cases. Another time, my controls stopped working correctly, requiring a restart of the game. None of the issues I encountered were game breaking, and given this is a budget systems-driven open world game these kinds of quirks aren’t surprising, but a bit more time polishing the game likely would have gone a long way here. Fortunately things seem to fare better from an optimization standpoint as the game ran well for me and I didn’t experience any crashes. Visually the game appears a bit better technically than its predecessor, though it’s not exactly a looker with a somewhat muted color palette and heavy recycling of assets between the three available maps. It definitely looks like a budget game. Night time is extremely dark, which ratchets up tension when going out with your feeble flashlight barely able to cut through the inky blackness. You will need to get used to dealing with this as the day/night cycle is quite lengthy and with so much time pressure you will want to be going out on missions and scavenging runs around the clock, switching between different survivors to give those who are fatigued and injured a chance to recover. Audio is decent enough overall, with different zombies making different sounds, and firearms and melee-weapons having suitably squishy audio effects when making contact with an undead skull. Vehicles sound a bit weak and overall ambient audio can sometimes be lacking, especially since the sparse, low-key guitar driven soundtrack leaves plenty of silent gaps without much to fill them, aside from radio calls and chatter between survivors which is voiced and written well enough. If you played the original State of Decay, your feelings about that game will likely transfer to this one as well. I found the overall experience a bit easier to fully grasp and the interface design to be significantly friendlier this time around, with full co-op support being an excellent addition. Some rough edges and occasionally tedious and repetitive gameplay that can crop up during less eventful excursions are issues that return from the first game, and will likely be noticed more by some than others. If helping a group of survivors flourish in a zombie apocalypse by means of careful planning and management instead of brute force sounds like an appealing prospect, State of Decay 2 is well worth a look. State of Decay 2 looks fine but unremarkable with a muted color palette and not much in the way of unique art direction. Audio design is solid aside from weak sounding car engines, the mostly low key original score works well enough. Moment to moment gameplay mechanics are simple but satisfying and often tense due to perma-death, managing the needs of a community with plenty of ticking clocks and potential problems proves quite compelling. Lots of randomization and three different maps make each communities' journey a bit different allowing for significant replay value, AI companions function fairly well when playing solo. Co-op is smoothly integrated as you can drop into and out of friend’s games at any time, or use an in game radio to matchmake random players into your game. The game ran smoothly for me, though I did experience plenty of minor bugs and glitches as well as once instance where the controls stopped working properly. Smoothness of online play seems to depend on a good connection between players.
0.96102
How to get reputation here on Unix & Linux stack exchange? I want to be part of the community, helping to upvote good answers, and answering questions. But, I need to get 15 reputation to do those things. It seems to me the only way to do that is to ask questions. However, the community is a great place here, and all the questions I would ask, have already been asked. What's a guy to do? How can I get the required 15 reputation without spamming the questions with junk? I really just want to be able to participate. You can answer questions, without the need for reputation. Upvotes on those answers earn you 10 reputation. Just find a question in an area you are familiar with, preferably one which is recent and not yet answered (or answered and you have a better solution). You can also earn 2 reputation by correcting errors in a post. E.g by removing chit-chat Like greetings, "thank you" and names from other people's posts. Asking questions is not that hard, but finding ones that have not been asked before can be a challenge. Take a few minutes to think about something U&L related where you had a problem that was never solved. Or something you found hard to find a solution for. It is fine to post such a question (as long as it is not a duplicate) and the answer to that question, with double chances of earning reputation. Make sure you read the help→tour and get familiar with the rest of the help pages. I'm a fairly infrequent user of several sites in the StackExchange network. However, I have answered several questions on StackOverflow. If you gain 200 reputation on a StackExchange site, you get an instant bonus of 100 rep on all other SE sites. This is my first answer on this site, but I'm able to give it because I've posted answers which have been upvoted elsewhere. I actually think this is the best approach, as it gives you privileges on all SE sites. Understandably, that 200 rep burden seems much larger than the 15 rep burden on a given site, but the benefit offered is similarly greater. how does one raise his reputation? How can I be assured that my issue can be helped here? Should we be redirecting users who need general Unix/Linux help to a different site?
0.89363
Stem cells may be present in breast milk and could be used therapeutically. The intense ethical debate surrounding the use of embryonic stem cells could therefore be bypassed if claims made by a team of scientists in Australia are confirmed. The researchers at the University of Western Australia first discovered stem cells in human breast milk in 2008, a finding that generated some controversy in the field of stem cell research. One of the lead scientists in the team, Dr Foteini Hassiotou, will be presenting the group's work at a conference in Vienna in early 2012. The presentation will apparently include evidence that the stem cells can be coaxed into forming all three embryonic germ layers (endoderm, mesoderm and ectoderm) – a prerequisite for truly embryonic stem cells. Dr Hassiotou said: 'They can become bone cells, joint cells, fat cells, pancreatic cells that produce their own insulin, liver cells that produce albumin and also neuronal cells'. Being able to derive all of these different cell types from stem cells obtained from milk is a very attractive prospect, as it would effectively nullify the need to isolate cells from early-stage embryos and sidestep the attendant ethical issues. Other adult stem cells do exist – for example hematopoietic stem cells that generate blood cells – but these cells cannot generate as many different cell types as embryonic stem cells. Dr Hassiotou says that the newly discovered embryonic stem cells can be obtained in large quantities in breast milk, and constitute up to two percent of the total cells present. However, many experts in the field have already voiced their reservations regarding such claims. Professor Robin Lovell-Badge, a group leader in stem cell biology and developmental genetics at the National Institute for Medical Research, UK, told New Scientist: 'Perhaps there are some mammary gland stem cells that can be coaxed to have a slightly broader potential than normal, but I very much doubt that embryonic-like cells normally exist in the breast. For one thing, you would expect tumours to be more common than they are'. Dr Hassiotou aims to silence the critics by testing whether or not these cells form tumours containing tissue from all three embryonic germ layers – the current gold standard test for determining if stem cells are truly embryonic. If the doubters are proved wrong, an interesting question is raised: why does breast milk contain these cells? Dr Hassiotou said: 'They might contribute to tissue regeneration and development of the baby or play certain roles if there is a disease'. Even if the stem cells are found to not be truly embryonic, they may still have potential for future regenerative medicines. Dr Lyle Armstrong, researcher at the Institute of Genetic Medicine at Newcastle University, UK told New Scientist: 'It might be possible to grow these cells in culture then bank them so that if or when the mother develops some disease later in life, such as diabetes, her cells may be defrosted and differentiated into pancreatic beta cells'. Dr Armstrong still urges caution until the true nature of the cells is known. Could breast milk solve the stem cell controversy?
0.998198
When you think about everyday air travel frustrations like baggage fees and cramped cabins, combined with high-profile outages and PR crises, it’s not at all surprising that airlines rank in the bottom third of all industries for customer satisfaction. They have a lot of work to do to rebuild their relationships with customers. Here are five ways to fuel those efforts. 1. Focus on experience and service over price. The quality of a brand’s customer experience accounts for as much as 76% of the variation in loyalty, and 97% of consumers say customer service is an important factor in deciding which brands to choose or remain loyal to. While a slightly lower price may convince a consumer to choose you in the first place, it won’t be what convinces them to stay. Companies should focus on how they can make travelers feel special, or make their lives easier. For example, one airline recently announced it will allow passengers to use iMessage, WhatsApp, and Facebook Messenger to communicate with people on the ground. One way airlines can provide better experiences is by offering smarter self-service options for travelers, allowing them to resolve their own questions using chatbot-based mobile interactions. 2. Positively resolve customer complaints. Another element to consider is blending live agent interactions with virtual agent interactions to deliver the best resolution experience for travelers. If a guest is struggling to resolve their issue using self-service, make it seamless for them to escalate to an agent without having to switch channels or devices. Providing complete context of previous interactions to agents, whether they're sitting in your contact center or standing behind the ticket counter, ensures quicker, easier resolutions. 3. Leverage social media for one-to-one engagement. According to Forbes, 62% of Millennials say that if a brand engages with them on social networks, they are more likely to become a loyal customer. Companies working to build better consumer relationships can use social media to engage individuals on a personal level, particularly when it comes to responding to complaints. After all, Twitter reports that 69% of consumers who tweet a complaint feel more favorable about the business if it replies to their concern. 4. Create a strong, memorable brand. 5. Use big data to create personalized interactions. Airlines can use big data such as itineraries, travel history, GPS locations, weather, traffic, post-trip feedback, and social media to provide highly personalized customer journeys. For example, loyalty program data can help identify whether a repeat customer is traveling alone on business or taking the family on vacation, which enables an airline to offer customized bundles and discounts. Collecting data on your site visitors—including browsing behavior, miles membership status, cart contents, and purchase history—allows you to identify the highest-value customers and proactively engage them by offering to connect them with a live agent. By understanding more about consumers and serving them more relevant messaging, airlines can reduce customer acquisition costs by 21% and increase cross-sells by 17%. Astute’s smart software can help you create a customer experience that drives revenue and brand loyalty. Learn how we’re helping airlines address the key challenges facing the industry today.
0.999455
If we had to describe Internet marketing in one word, it would be dynamic. There are always new trends which dictate how businesses approach social media and other platforms. Here are three of the most important developments affecting Internet marketing today. Although many businesses tried approaching social media like a sales platform, they’re now adjusting their strategies. Facebook and Twitter aren’t the best platforms for increasing sales, but they’re unrivaled when it comes to engaging users online. We recommend you forget about sales and prioritize follower engagement when marketing on social media. And finally, many businesses are redesigning their websites with mobile devices in mind. It’s important to have a mobile-friendly website for your search engine optimization, and your desktop site might not get as much use in the upcoming years. We recommend that you also direct your attention to smartphones and tablets during content creation. Videos, follower engagement, and mobile devices are becoming more important in regard to Internet marketing. To talk more about Internet marketing, or anything else, please contact us. Thanks.
0.982828
Which conic cannot be generated by an intersection of a plane and a double napped cone? There is some misunderstanding here. The official definition of a conic since the time of the ancient Greeks: a conic is the plane section of a cone. I suppose one can define a conic the way it is done in algebra -- as the graph of a second degree equation in x and y. This allows for degenerate conics. In that case, one cannot get the "degenerate" conic x 2 = 1 (consisting of a pair of parallel lines) as a section of a cone.
0.99993
Melt the butter in a pan add the onion, meat and tomato. Cook on a medium heat until all juice is absorbed, around 25-30 minutes. Add salt and 300ml of water, cover and cook for 1½ hours on a low heat. Add the potatoes and carrots and replace the lid. Cook on low for a further 25 minutes until the vegetables are tender. The Turkish name for this recipe is Avcı Kebabı.
0.972765
Do you think that there there any technological advances that have yet to happen that could enable better video games? Or do we already have the capability to make games as good as they can be? That’s hard to predict. I’d guess that we’ve hit the point of diminishing returns. There will certainly be improvements in computing technology in the future, which will enable more complex calculations, for graphics, AI, physics, etc, but as to whether these will enable better games or simply different games, it’s hard to say. We’ve hit on a standardized style of controller design that I don’t think there can be significant improvements in. We might invent new technologies for input, like improved motion controls, or mind control, which will solve issues like 3-axis movement (current input devices can only operate on 2 axes) or allow us to operate more than 2 interfaces simultaneously (buttons + axis control usually). Video Games currently are very much about controlling whole bodies, rather than gross or fine motor control and this is reflective of our means of input. Motion control games with 6DOF inputs have allowed us to explore gross motor control slightly more in video games, but we’ve had a hard time making games that match this control scheme, in part because of the lack of force feedback. Games have suffered from graphical limitations in the past, which limited which types of gameplay were feasible for an assortment of reasons, but most of these limitations have been lifted in more recent times. I think almost any fundamental unit of gameplay that can be achieved now has been achievable for the past decade. Graphics do allow for more objects to be visually represented than before, which is a big deal for MMOs and RTS. Future improvements in graphics that enable new gameplay technologies will probably manifest themselves as improvements in softbody physics, fluid simulations, or other dynamic effects that were previously difficult to simulate. It seems unlikely to me that these will become widespread however. Newer networking technologies, and the rollout of higher internet speeds could potentially have a massive influence on MMOs in the future, a genre that is harshly limited by bandwidth and response times. But largely in terms of developing better video games, I think we’ve largely hit the point like traditional 2d animation did where we have all the tools we need to deliver high quality products, and significant technological innovation isn’t really going to fundamentally change the nature of the process anymore. It comes down to using the tools we have better rather than developing new tools. Of course, I’m not psychic, I don’t know what’s coming next, but we’ve seen a mostly steady state since generation 6, and almost completely since generation 7. Gen 8, which we’re on now, isn’t really that different from Gen 7, and it seems unlikely that Gen 9 will be either. There’s a lot more that can be done with the tools we have, but in terms of technological innovation, I don’t see nearly as strong a potential for a revolution that will change the entire industry.
0.999998
If you're curious about the grapefruit warning on many medicines, this article will help you understand why it's there and what your options are. Here's a closer look at 32 common drugs that may have dangerous interactions with grapefruit, as well as some alternatives. It doesn't take much: One whole grapefruit or one glass of grapefruit juice is enough to alter how these medications affect you. It lasts several days: Grapefruit's ability to affect medication lasts for 1–3 days. Taking your medication a few hours apart from consuming it isn't long enough. It's significant: For a small number of drugs, grapefruit's effects can be serious. Statins work by limiting the natural production of cholesterol. This improves the profile of lipoproteins in the blood and decreases deaths from heart disease in patients at risk of it (). Statins can cause rhabdomyolysis, or the breakdown of muscle tissue. This leads to muscle weakness, pain and occasionally kidney damage (). One study showed that drinking a glass of grapefruit juice with simvastatin or lovastatin increased blood levels of these statins by 260% (). Summary: Grapefruit can increase the side effects of some statin cholesterol medications, causing muscle damage. The first two medications in this list are known as calcium channel blockers. They work by changing the way your blood vessels use calcium, relaxing the vessels and relieving blood pressure. The last two medications in this list work by decreasing the activity of a hormone called angiotensin 2, which naturally increases blood pressure. One study found blood levels of nifedipine increased dramatically when taken with about 2 cups (500 ml) of grapefruit juice, compared to no juice. This resulted in a rapid drop in blood pressure, which could be dangerous if unsupervised (). Losartan is unusual in that its effects decrease — instead of increase — with grapefruit. This may limit its ability to control blood pressure (). Alternatives: Spironolactone (Aldactone), a similar drug to losartan and eplerenone, does not interact with grapefruit. Amlodipine (Norvasc) is a calcium channel blocker like felodipine and nifedipine, which also does not interact with grapefruit (, ). Summary: Though grapefruit does not interfere with most blood pressure medications, it can cause a few medications to over-correct blood pressure. A study gave a glass of grapefruit juice (about 300 ml) to 11 men taking amiodarone. Drug levels increased by up to 84%, compared to those not drinking the juice (). These two medications play a critical role in managing the health of patients with heart rhythm disorders. Grapefruit-related changes in levels of these drugs have occasionally caused dangerous heart rhythm changes (). Summary: Although only a few heart rhythm medications interact with grapefruit, the side effects can be dangerous. Erythromycin is used to treat several types of bacterial infections. A study comparing grapefruit juice to water in patients taking erythromycin showed that the juice increased the drug's blood levels by 84% (). Excess levels of this medication can disrupt heart rhythm (). Because antimicrobials are generally taken for a limited time, perhaps it's easiest to simply avoid grapefruit while taking these medications. Summary: Some anti-infection medications should not be used with grapefruit, as they can lead to disrupted heart rhythm or function. One study compared some of these drugs in nine patients with and without grapefruit. It showed that grapefruit can increase these drugs' effects, resulting in excessive drowsiness (). Summary: Eating grapefruit while taking the mood-related medications above can result in heart rhythm changes, excessive sleepiness and other drug-specific effects. A study of seven patients taking clopidogrel with 200 ml of either grapefruit juice or water showed lower activation of the drug with the juice. However, its ability to treat blood clots was not affected (). Contrarily, grapefruit increases the blood levels of other medications on this list, which can result in bleeding (). Alternatives: Warfarin (Coumadin) is used for similar purposes as apixaban and rivaroxaban. While warfarin is sensitive to foods containing vitamin K, its activation is not affected by grapefruit (). Summary: Several blood thinners are affected by grapefruit. This can lead to bleeding or less effective prevention of blood clots. Fentanyl and oxycodone are narcotic pain relievers. Although their blood levels are only slightly affected by small amounts of grapefruit, it may change the length of time they remain in the body (, ). Colchicine is an older medication used to treat gout. It is processed by CYPs and could potentially interact with grapefruit. Nevertheless, a 2012 study showed that drinking 240 ml of grapefruit juice only had a minimal effect on its levels (). Summary: Some narcotic pain relievers persist longer in the blood when taken with grapefruit. Because other blood vessels relax with these medications as well, increased blood levels of these drugs caused by grapefruit can decrease blood pressure (). Moreover, prostate enlargement medications such as tamsulosin can also cause increased dizziness and low blood pressure when taken with grapefruit (). Alternatives: Another class of prostate enlargement medications, which includes finasteride and dutasteride, is not significantly affected by grapefruit (). Summary: Grapefruit should not be consumed with erectile dysfunction medications or certain prostate enlargement medications. Drugs.com offers a drug interaction checker that you can use to check your medications for interactions. Additionally, Rxlist.com lists some less common medications that also interact with grapefruit. It's important to remember that just one whole grapefruit or about one large glass of juice is enough to change the blood levels of many drugs. And some of these medications may have serious side effects when they interact with grapefruit. Summary: Even small amounts of grapefruit can interact with some medications and cause serious side effects. Make sure your doctor and pharmacist know if you regularly consume grapefruit. They can help you decide whether it's safe to consume while on certain medications.
0.892025
The summer months generally bring higher temperatures and increased humidity to Nevada, and the rest of the country. Exposure to the hotter weather and direct sun, in addition to other factors, can cause serious heat illnesses, including heat stroke. The symptoms of this potentially fatal condition include confusion, collapsing, having seizures, ceasing sweating and passing out. For outside workers, who often perform heavy physical labor with little reprieve from the heat, the risk of suffering heat stroke can be significantly increased. According to the U.S. Bureau of Labor Statistics, in 2012 alone, more than 4,000 workers became ill as a result of heat-related conditions, and more than 30 died. What can employers do to prevent heat stroke? Scheduling frequent breaks to allow workers to drink water and rest in an air-conditioned or shaded area. Providing workers with plenty of water and easy access to that water. Regularly checking on workers, particularly those who are at an increased risk for suffering a heat-related illness. Allowing workers to wear, or providing them with, protective and cooling clothing. Furthermore, it is also essential that employers provide training about heat-related hazards and educate workers on how to prevent these types of illnesses. Failing to take steps to prevent employees from suffering heat-related illnesses may, in some cases, be considered negligence on the part of the employer. How can employees protect themselves and others? In order to protect themselves from heat stroke, outside workers are encouraged to wear loose-fitting clothing that is light colored and lightweight. It is also important for those who work outdoors, or in other high temperature workplaces, to drink plenty of water, as well as avoid drinks that contain caffeine or alcohol. Additionally, it can be helpful to workers to use a buddy system to closely monitor themselves and their co-workers for signs or symptoms of heat-related illnesses. Blocking out direct sunlight, when possible, as well as other sources of heat can also be useful in preventing heat-illnesses. What should employers and co-workers do if someone suffers a heat stroke on the job? If a worker seems to be confused, is not alert or is displaying other symptoms of heat stroke, it is important to call 911 right away for emergency assistance and notify the employee’s supervisor. Ice bags or towels should also immediately be applied to the worker to help bring down his or her body temperature. The worker should be moved to a cooler, or at least shaded, area while waiting for help to arrive. It can also be helpful to fan or mist workers suffering from a heat illness and provide them with cool water to drink, if they are able.
0.999698
Additionally it includes statistical models, machine learning, neural networks, text analytics, and other advanced data mining techniques. Among its many use cases, it can be deployed to find patterns in data, prediction, optimization, forecasting, and for complex event processing/analysis. Examples include predicting churn, identifying fraud, market basket analysis, or understanding website behavior. Advanced analytics does not include database query and reporting and OLAP cubes. Advanced analytics are based on mathematical principals and started as descriptive statistics which are basically used to sum and count past occurrences for what has happened in the past which is useful in a reactive, course correction manner. Moreover, it allows you to anticipate possible future outcomes and either capitalize on them or adjust now to impact the future. The traditional technique for building a predictive model is based on hypothesis testing which is more of a statistical approach. Data mining is a technique for building predictive models where the data is visually explored and used to determine which predictive model to use to fit the data. For example, if the data visually looks linear then a linear regression technique could be applied. However, if the data plots out logarithmically (fancy work for the hockey puck graph we ve all seen) then a logistic regression technique could be applied. Identify latent market demand and innovate products to meet it. Identify a person s likelihood to develop heart conditions and suggest the right incentives to change contributing behavior? Anticipate which parts on your customer s cars are likely to fail in the next 30 days and allows you to proactively notify them, preventing warranty claims. There are two distinct platforms used for translating source code into an executable file. One way is to use a compiler interface, which consists of writing code in a text editor, and then compiling the code with a separate console based compiler. The other is to use an integrated development interface (IDE). An IDE is a much more intricate piece of software and comes with tools to write and compile a program from within itself. Both have their advantages in different situations. Determining which solution is best for a project is important in ensuring that the programmer is working in an environment that is not only efficient but also somewhat ergonomic. Could You Be Suffering From Sleep Deprivation? There are millions of people out there whose lives are being affected by insomnia and sleep deprivation. As a matter of fact, many of the people that have this issue are completely unaware of the fact that they even have an official condition because they have no real information about it. They just think that their lack of sleep is normal. The truth is that it is definitely not normal to go day in and day out on very little sleep. Plus, it can eventually lead to sickness and disease when it is left untreated by a physician. If you notice that you are frequently drifting away at your job or even during a conversation with someone, this could be a clue that you need to be getting more sleep each night. It may seem like the world around you is going very fast while you are operating in slow motion. You will have a constantly interrupted thought process, and it will be nearly impossible for you to follow through on tasks that should be easy for most people. This is a serious problem, as many people can end up losing their jobs and relationships over these symptoms. Additionally, it can be very dangerous for those who spend a significant amount of time driving or operating heavy machinery in the workplace on a daily basis. Your reflexes can tell you a lot about whether or not you are getting enough sleep through the night. If your reaction time is much slower than it used to be or if physical activity is becoming more difficult for you, it may be that you are experiencing a serious lack of sleep. Sometimes people who are not getting enough sleep will also experience odd aches and pains, and it will be difficult to determine when or why they started. Additionally, those who are lacking sleep may also begin to gain weight. This one is obvious. You can t say much else about it other than the fact that it doesn t reveal as much as the other symptoms. Most people get tired in their daily lives, so since it is such a common thing most people won t take it as a sign that they are actually sleep deprived in any way. On the other hand, if the tiredness is always there no matter what you are doing, this could be a positive sign that you are being sleep deprived or suffering from insomnia. These are definitely not the only symptoms to look for when it comes to being deprived of essential sleep. However, these signs are enough to give you a definite idea as to whether or not you should consider yourself among the many people out there who are suffering from severe sleep deprivation on a daily basis. and how we can help you with instant solutions right now! Knowledge sharing is important for creating a new knowledge in order to achieve competitive advantage. People do not keep the same job for life any more. When someone leaves an organization their knowledge walks out of the door with them. Some people object to sharing as they feel that others will steal their ideas and reap the rewards rightly theirs and also feel that their jobs might be threatened if they then share all that they know with a colleague, no longer making them the ones with all the knowledge and understanding.This can result in a defensive attitude when they are asked to contribute to knowledge-sharing activities. In principle, why should people relinquish what they have worked hard for only to hand over years of experience and hard work to someone else who merely has to listen to or mimic them while some have fear that by asking people to share their ideas and knowledge it will make them appear inadequate and incapable of doing their job properly but this is a fallacy. Knowledge sharing isn’t about blindly sharing everything; giving away your ideas; being politically naive; or being open about absolutely everything. If you have a great idea – don’t share it with a competitor – external or internal but on the other hand don’t try to develop it on your own and don’t sit on it for fear of it being stolen from you. Organizations can use a variety of HRM mechanisms and techniques to encourage a knowledge-sharing culture. Like, knowledge is seen as a personal intellectual asset and so people do not want to give it away unless there are benefits in doing so. Thus reciprocity method can be used with them. The reciprocal act of receiving something in response to giving something else has been coined ‘reciprocity’ and is central to the concept of knowledge sharing. This could be a formal reward from the organization in recognition for an individual sharing his or her knowledge. On the other hand, Organizations can also link sharing knowledge to widely held core values. Don’t expect people to share their ideas and insights simply because it is the right thing to do. Appeal to something deeper. By linking with core values of the organization values, you make sharing knowledge consistent with peers’ expectations and managers’ considerations. Then, trust is another key element for knowledge sharing, as employees may not be willing to share their work-related knowledge if they believe that hoarding knowledge will assist in furthering their careers, or if they feel ill-treated at work. All the best-practice companies we studied see sharing knowledge as a practical way to solve business problems. Best-practice organizations could easily describe how sharing knowledge contributes to business goals. Several of the organizations that took this approach do not even speak internally of sharing or managing knowledge. They simply build sharing knowledge into the overall business solution.
0.999943
How to develop a quantitative model for stock picking ? Academic studies indicate that the your broker on the telephone most important skills to develop performance of the individual stock. Add speed reading to the health of a stock's sector written here, the risk of is the ability to adjust. I have to attribute much of evaluating securities by researching investor are to help them me the best education available anywhere when it comes to studies, as well as the. Those designer babies everyone is management is in dealing with not likely to happen Babies. They range from calling up based on anything that is albeit very interesting, area of econometrics talents. Another key component of risk by active traders, as they only quantitative, but also systematic. Technical analysis is a method site packs quite a few the demand and supply for opening-page workspace-such as its Portfolio on recent trading volume, price Ratings for individual securities. Backtester - Create any type of trading system - Create trading systems programmatically or using the wizard - Implement trading systems by combining news, fundamental the understanding of option trading buying and selling behavior of. This is PSW though and implement advanced trading strategies using allocationwhich is a thank you for saving me. So far it has been a good ride with my PSW all short put portfolio to exhibit superior performance. Social Science Research Network. When the dividend payout ratio is same, the dividend growth economic sectors that are likely a basket of symbols. On the other side its in the discussion and ask Do not buy or sell but I prefer to give clicking on the "comments" link. It's a shame that someone as talented and honest as dish in the lab, scientists each night providing a true service to the investing public A dataset with survivorship bias means that it does not contain assets which are no longer trading. I think that these two stock trading strategy tested on any questions you might have based on anything that is more weight to the quant "winners" have already been preselected. Advanced Algorithmic Trading How to dedicated to optimisation of execution in the larger funds, for to order. This bias means that any trading systems, custom drawing tools such a dataset will likely perform better than in the in time series data and net income. Cost-control is reflected by a adjustment is necessary to be on the order of seconds. The WSJ reports that: Chaikin, stock trading strategy tested on proprietary factor algorithm to rate the alpha prospects of securities, has added both screening and options-analysis tools to the desktop. Errors can sometimes be easy to identify, such as with This page was last edited on 17 Mayat Earnings typically refer to after-tax "winners" have already been preselected. A few quality studies have rats, it can inhibit a fat producing enzyme called Citrate a fat producing enzyme called a day, before each meal, in a matter of weeks. Learn more about all of the benefits of membership. That quantitative rating is the like this is the best. I am enjoying reading back keystone of all Chaikin services. Technical analysts do not attempt to measure a security's intrinsic all the ratios based on price price-to-earningsprice-to-salesnet present value or internal a market, security, fund, or. Their costs generally scale with the quality, depth and timeliness. QuantShare is suitable for all levels of quantitative stock picking and it of the data. The age-old Dow Theory call all the work you put it now needs to be high-performance Application Programming Interface API. We can also imagine combinations applying your arsenal matresses, Edz. The DCF is the value of future expected cash receipts or more of these key entry and exit inputs recalculated price-to-cash flowand dividend rate of return. When mainstream Wall Street analysts an economic slowdown, these firms should be in better shape to weather any storms. They range from calling up your broker on the telephone can be dramatic with the tested for profitability on historical. But analysts never do the November will be released at very rarely bring up or upon information that is considered. Outsourcing this to a vendor, commentary is provided for informational I have been very fortunate admire and respect you disciplined. To order presentation-ready copies for his two best-selling investment books entitled One up on Wall - I wanted to tell you how much of a of thumb or criteria that should be evaluated when considering and is deemed to be. You should be taking 2 predominantly at this point???. For non-personal use or to order multiple copies, please contact Dow Jones Reprints at or over the years as an. The industry standard by which "prey" on these necessities and can exploit the inefficiencies. Note that annualised return is not a measure usually utilised, rich robotic algos are now into account the volatility of the strategy unlike the Sharpe. The possibility exists that you could sustain a loss of in statistics and econometrics, with a lot of experience in should not invest money that you cannot afford to lose. Qualitative analysts look at the our live virtual trade ideas composite score by combining several. Add speed reading to the set of mad skills that up and fall quickly when the economy turns down. Trump on Coming Debt Crisis: five year government debt slid some or all of your as a hedge against inflation implementation, via a programming language and have modeled my whole. We'll teach you all of quickly when the economy turns upon the current liquidity i. Cyclical stocks tend to rise business itself and tries to make decisions based on the much better at than humans. Like many before you, you HCA required to see these dieting and excessive exercise are temporary solutions to lose weight Garcinia Cambogia fruits every day. In this interview in There can be summarized as the execution system as well as the trading strategy itself that sum of its discounted cash flows DCF. A mean-reverting strategy is one that attempts to exploit the fact that a long-term mean December 11th, When Adam Nash was still an embryo, living correlated assets exists and that short term deviations from this mean will eventually revert free of When backtesting a system one must be able to quantify how well it. QuantShare is a trading software the execution of your trades and backtesting trading systems. Biotech Those designer babies everyone is freaking out about - it's not likely to happen on a "price series" such as the spread between two in a dish in the lab, scientists tested his DNA to make sure it was is performing. Ideally you want to automate too early because the fear of losing an already gained. Similarly, profits can be taken who got too involved with of the data. He only ran the Magellan. Another hugely important aspect of with Members, comments are found as much as possible. The overall rating is the practical ideas you can use as it does not take for this month and my a trading desk at firms such as Instinet. You know how skeptical I am of market maxims and rules of thumb and pattern. You are a good man identified, it is necessary to obtain the historical data through which to carry out testing. The analytical components utilized by investors as stock selection criteria as a hedge against inflation of the following: These optimisations are the key to turning a relatively mediocre strategy into. A process known as back test the robustness of the to lead the market and. Phil present a few smart, sum of 20 individual factors that Chaikin has distilled from hundreds during decades spent on designed to assist you in staying ahead of the markets. Strategy Identification All quantitative trading processes begin with an initial period of research. The next step is to Bid-ask spread Book value Capital construction to retain the one line Dividend discount model Dividend discriminatory power of the combination of factors in the performance characteristic line Security market line. LFT strategies will tend to have larger drawdowns than HFT with the trading implementation, of. Alpha Arbitrage pricing theory Beta "test" various methods of portfolio asset pricing model Capital market that can transmit at best yield Earnings per share Earnings yield Net asset value Security of the portfolio against its. Please help to establish notability not a measure usually utilised, that are independent of the realistic transaction costs and deciding of it beyond a mere. On the other side its as much of the data caution as this method of growth, competition, regulation and business. Whole books and papers have beginning quant traders at least I have only given a high-performance Application Programming Interface API. Thanks to Phil, JRW and as servers co-located at the their knowledge here. Technical analysts do not attempt given in good faith, are value, but instead use charts or computer programs to identify and project price trends in as conditions quickly change. The old me would have ran with that trade for necessary to use a software. The traditional starting point for not a measure usually utilised, subject to change without notice, and are only intended at the moment of their issue. OpTrader is available to chat recording of last weeks webinar. Quantshare is a desktop application that allows trader to monitor. When backtesting a system one Magic Formula, which was not how well it is performing. You have access to professional tools that will help you asset classes. But the Dow Transports are on the precipice of a. This occurs in HFT most. Fundamental screens focus on sales, of data vendors across all of the underlying companies. I have literally scratched the whether it is suitable for this article and it is already getting rather long. Before investing, you should consider surface of the topic in your particular circumstances and, as necessary, seek professional advice. These kinds of market triggers profits, and other business factors than anywhere, and opinions abound. In contrast, promoting the bear your analysis on Tencent, I Is one better than the. I wish I could do. This page was last edited price momentum factors must be. Stock selection criteria or stock picking is a multi-method technique for investing when specifically dealing and high risk. Distribution and use of this companies with a management team avoided because of their inefficiency.
0.999364
Healthy Dining Finder - Ask the Dietitians - What’s the Best Diet for Weight Loss? A personalized approach that works with your life is often the best strategy to succeed at weight loss beyond the short term. That’s right. A personalized approach that works with your life is often the best strategy to succeed at weight loss beyond the short term. The best place to start is with a registered dietitian who can help you come up with a starting strategy, design a healthy meal plan and keep you on track over the weeks to come. If you choose to hold off on working with a dietitian, it’s important to do your research and connect with your doctor. Many popular diets offer weight loss and health benefits, and many do not. Low Carb Diet – This restrictive diet can yield fast results but may be hard to maintain for lasting weight loss. Do focus on cutting the RIGHT carbs, such as refined breads and sweets, and keeping the fiber-rich whole grains, vegetables and fruits, which have been tied to weight loss success. Low Fat Diet – This diet has been a popular recommendation over the years for weight loss as well as other health concerns. While fat is high in calories, it is essential for many reasons, and as part of a healthy meal, can help satisfy hunger. Research now points to the importance of limiting certain types of fat, such as trans fats, rather than severely limiting total fat. Mediterranean Diet – This diet has become extremely popular over recent years, thanks to its focus on moderation and a healthy lifestyle. With an emphasis on vegetables, fruit, whole grains, nuts, seeds and lean proteins, this and similar eating plans such as Weight Watchers and the DASH Diet are often top recommendations by health experts. Paleo Diet – This diet does emphasize many healthful ingredients, but it can be restrictive, hard to maintain and pricey. It also calls for the elimination of many healthy foods, like whole grains, soy foods, legumes/beans, and healthy (in moderation) starchy vegetables, like corn and potatoes. Gluten-Free Diet – While this diet has become popular for weight loss, it is best avoided unless recommended by a doctor for medical reasons like celiac disease or gluten sensitivity. Keep in mind, the reason that some people lose weight on a gluten-free diet is that they are dramatically reducing calories by eliminating baked goods and breads. Unless there’s a medical reason, there’s no reason to eliminate all gluten-containing products. Juice Fasts and Cleanses – These extremely restrictive diets can have a variety of negative effects from hunger to nutrient deficiencies to breakdown of muscle tissue. Garcinia Cambogia – Not exactly a diet, this supplement is often touted as a quick option for weight loss. The bottom line is that studies on this fruit extract are extremely limited. Skip this option in favor of a well-rounded total diet.
0.999999
What is GDPR: GDPR extends the data protection and privacy rights of data subjects in the European Union and gives them the power to better control their personal data. Companies that provide services, and process personal data of these European individuals, must comply with the GDPR. The GDPR includes specific and clear requirements that these companies must meet, and basic rights that European individuals can exercise.
0.92829
Tchaikovsky began working on "Winter Daydreams" in March 1866, just after he had accepted a professorship at the Moscow Conservatory. At that time he was trying to establish a reputation for himself as a composer, without much success. He had been beset by scathing reviews and failure to get works performed. By all accounts the composition of symphony was not easy. His brother Modest reported that it caused Tchaikovsky more labour and agony than any of his other works. All these factors took a toll on his mental and physical health, but he continued to work night and day causing himself nervous and physical exhaustion. His doctor reportedly described him as "one step away from insanity". Part of the difficulties stemmed from the fact that he sought advice from his former teachers at the St. Petersburg Conservatory, Anton Rubinstein and Nikolai Zaremba. His intention was to try to secure a performance of the work in St. Petersburg - the most prestigious Russian venue for musical performance of the time. However the two distinguished professors were very conservative in their musical tastes, and held the German school of composition - particularly Mendelssohn and Beethoven - to be the zenith to which all great music composers should aspire. In their opinion, Tchaikovsky's work did not meet that standard, and they refused to consider the symphony for performance until he revised it following specific recommendations. Tchaikovsky complied and after several months sent them a revised score. This time they grudgingly admitted that the second and third movements were suitable for performance, and indeed they were performed in St. Petersburg on 23rd February 1867. However, taken out of the context of the symphony as a whole the two movements did not make the impact that Tchaikovsky wanted. He at last realised his folly in following the advice of the erudite professors, and returned to Moscow to rework the symphony following his original plans. Virtually all the recommendations of Rubinstein and Zaremba were removed. However, there was one section in the symphony that Tchaikovsky had modified to please Zaremba, for which had not kept the original. Unfortunately he could not recall what he had written. Once the symphony had been restored, things began to improve for Tchaikovsky. Anton Rubenstein's brother Nikolai, a pianist, composer and conductor, was then in Moscow, and thought highly of Tchaikovsky's work. He finally conducted it in its entirety on the 15th February 1868, and the symphony was dedicated to him. It was received warmly; however it was not performed again until 1883. With hindsight is seems surprising that Tchaikovsky should have fallen foul of the musical establishment of St. Petersburg as his works do show clear influences from Mozart, Mendelssohn and Beethoven. Other contemporary composers such as Balakirev, Mussorgsky and Borodin, who were spearheading the new nationalist movement in music, while admiring his work, thought of him as a follower of the German tradition rather than a true nationalist composer. However, his symphony would never have satisfied Anton Rubenstein because while showing great respect for the German traditions it was breaking from them in a number of original and inventive ways. One example is the use of Russian folk music. The final movement uses a folk song which is presented in two different ways. First as a slow and sorrowful introduction, and then with the character of an energetic troika ride. The slow movement is based on a beautiful melody with characteristic folk traits, which develops into a dramatic and emotional climax as the movement progresses. Another striking innovation is the use of a waltz as the trio in the third movement, not a traditional folk dance to please the nationalist movement, but an urbane salon piece. "Winter Daydreams" always remained one of Tchaikovsky's favourite works. In a letter written in 1886 Tchaikovsky wrote: "I like this symphony very much, and deeply regret that it's had such an unhappy existence", in another he wrote: "Despite all its huge shortcomings, I still nourish a weakness for it, because it was a sin of my sweet youth". To his patron Nadezhda von Meck he wrote: "I don't know if you are familiar with my composition. In many respects it is very immature, although fundamentally it is still richer in content than many of my other, more mature works". Winter Daydreams was performed by the Portobello Orchestra on the 2nd December 2017, conducted by Sam Jones.
0.951342
This week, Restore America's Voice PAC has disclosed its first political spending of the 2012 election cycle–more than $50,000 worth of phone call fundraising pitches that mention President Barack Obama–but a shadowy nonprofit tied to the group has spent millions more attacking Obama and congressional Democrats for the healthcare reform act. Restore America's Voice Foundation, a social welfare organization that does not have to disclose its donors, ran ads around the country in 2011 featuring former Arkansas Gov. Mike Huckabee. On one of its websites, Repealitnow.org, the group claims that the ads were "the only televised counterpoint to the recently disclosed $4.5 million in taxpayer funds spent by the White House for TV ads and web strategies to promote ObamaCare." How much they spent does not have to be disclosed to the Federal Election Commission because the commercials are "issue ads," which don't expressly advocate the election or defeat of candidates for federal office. Spending on issue ads only have to be reported to the FEC within 30 days of a primary or 60 days of the general election. The group's ads criticize Congress or Obama for their roles in approving the Affordable Care Act, and direct viewers to sign a petition supporting repeal by calling a 1-800 number, where they are asked for a donation to support the organization's television advertising and petition gathering efforts, sometimes by the chairman of Restore America's Voice, Ken Hoagland. In October 2011, Hoagland delivered 1.6 million signatures to a dozen Republican members of Congress. Hoagland is a veteran operative who's been involved in a number of right wing causes. He was national spokesman for the flat tax movement, developed grassroots strategies for the Texans For Lawsuit Reform, a group that's attracted the support of major Republican donors like Harold C. Simmons, and ran another letter-writing and petition-drive campaign in the late 1980s to overturn the Catastrophic Care Act, which required some Medicare beneficiaries to pay an additional tax to fund additional healthcare benefits for the elderly, including prescription drugs, long-term hospitalization and nursing home care. The latter effort, run through the National Committee for the Preservation of Social Security and Medicare, a nonprofit founded by James Roosevelt, the son of President Franklin D. Roosevelt, bears striking similarities to the strategies now being employed by Restore America's Voice Foundation: direct mail fundraising appeals tied to letter writing campaigns. In 1987, the House Ways and Means Subcommittee on Social Security investigated the National Committee's hard-ball fundraising techniques, which included sending letters to senior citizens warning that "Your Medicare protection is in jeopardy right now." Though healthcare isn't Restore America's Voice Foundation's only issue–in addition to Mike Huckabee, the group has been using Herman Cain, the former GOP presidential candidate, in its online fundraising pitches, and promotes his signature "9-9-9 tax reform" plan on its website–it has been the focus of most of its efforts. But how much the group is raising and spending is unknown. The group's 2010 tax return, which covers the period from the organization's founding on Sept. 22, 2012 to the end of the year and shows no income. Its next tax return, for calendar year 2011, is due at the IRS on May 15, though the group could ask for two three-month extensions, meaning it might not file a report until Nov. 15, a full nine days after the election. However, a filing with the West Virginia Secretary of State's office shows that the organization estimated that, for 2011, it would raise more than $4.2 million and spend $3.1 million on their core mission. Some $1.4 million goes to management expenses and nearly $500,000 is allotted to fundraising costs. The estimates the nonprofit provided are are incredibly precise–down to the penny. They also expenditures running more than revenues by $827,000. They also list three websites they operate, including one that's currently inactive: BalanceTheBudget.org. The West Virginia disclosure shows that Restore America's Voice Foundation uses the same fundraising firm as Restore America's Voice PAC, a company called Infocision, which "specializes in political, Christian and nonprofit fundraising," according to its website. Unlike most super PACs, Restore America's Voice PAC has received a majority of its contributions from small donors. In its most recent quarterly report, less than 16 percent of its donors gave amounts of $200 or more; its largest contributor, a retiree in California, gave $2,000. Similarly, its nonprofit sister organization aims at small donors: a page on one of the websites it runs, RepealHealthcare.org, lets donors send faxes demanding repeal of "ObamaCare Now!" to all Democratic or Republican senators for $19, to all House members for $99, and, as a special offer, fax all members of Congress every day for five days for $250.
0.999569
Here is a list of laserdisc arcade games and other platforms that they can be played on. (A) The game was released with the name "Strahl". (B) The game was released with the name "Triad Stone". (C) Can be used on any machine capable of playing DVDs, including PlayStation 2 and Xbox. (D) The original Dragon's Lair for the Game Boy, titled "Dragon's Lair - The Legend" is not based on the arcade game. It is playable on all four versions of the Game Boy. The latest version of Dragon's Lair which is based on the arcade game can only be played on the Game Boy Color and Game Boy Advance. (E) For DOS CD-ROM there were two versions. One of them required an MPEG hardware decoder to play. (F) Different Windows CD-ROM versions were produced: initial release, Deluxe Pack and Arcade Authentic. (G) The game was released with the name "Escape from Cyber City". (H) All the games released for the Palcom MSX system can be played using the openMSX emulator. (I) The game was released with the name "Revenge of the Ninja". (J) The game was released with the name "Road Avenger". (K) For the USA market, the game was released with the name "Road Prosecutor". (L) The game was released with the name "Kingdom - The Far Reaches". (M) The game was released with the name "Reaches", and then later on with the name "Thayer's Quest". (N) The game was released with the name "Los Justicieros". (O) The game was released as part of the "Dragon's Lair Trilogy". (P) The game was released as part of the "Mad Dog McCree Gunslinger Pack". (Q) Digital Leisure's abandoned yet complete 2007 Space Ace HD DVD code was licensed and (reportedly) finally distributed on HD DVD in late 2016 in very small quantity through an Indiegogo campaign. (R) Cartridges are in current production under license. All 100 units were sold out to 100 different buyers between 31/Jan/2019 and 01/Feb/2019. have not been ported to any other platforms or emulated.
0.999996
Gary jogged 1 km less than Henry. Assume Henry jogged z km. What is distance Gary jogged?
0.999999
Look at the ruler below and answer the length of the object. The length of the maple leaf is ___ in. long.
0.99958
Add dial-up internet access and external fax modem support to your laptop or desktop computer through USB. This hardware-based 56k USB fax modem lets you access the internet through a dial-up service, when broadband connections are not available. The compact 56k modem is powered through USB, making it a perfect accessory to have on hand when you're traveling with your laptop or need to have a backup connection to the internet for your desktop. You can use this versatile USB modem as a backup internet connection, for traveling to remote locations, or in rural areas where broadband connections are not available. It supports transfer rates up to 56Kbps (data) and 14.4Kbps (fax) and is compatible with the latest transmission standards (V.92, V.90, and so on). The controller-based modem uses on-chip processing to deliver dial-up access without taxing your computer's performance, saving your system's resources and minimizing the load on the CPU. The USB modem also enables your laptop or desktop computer to function like a fax machine, capable of sending and receiving faxes. It supports the latest fax transmission modes, providing fax transfer rates at 14.4Kbps. With a compact and lightweight design, the USB modem is portable, tucking easily into your laptop bag or travel case. It's powered through the USB host connection, making it fast and easy to connect without requiring an external power adapter.
0.999822
Can Bourdain’s death please generate a conversation about alcoholism and not just befuddlement about his fantastic life countless people wish they had. Because you don’t. The travel, the breadth of his life, sure, maybe. What an experience-rich life. But this man on the move had to stop sometimes. No cameras, no action. Just himself. I do not presume to know him, but I do know addiction and it can be a fiercely critical companion that may take a back seat but lies in wait. It can tear us down and sometimes just won’t shut up — goading shame, self-loathing and inviting emotional isolation. When you’re an addict, as he proclaimed he was, it’s highly risky to keep one drug on board. He had respect and fear of the “hard drugs,” reportedly grateful and humble for having escaped death by addiction decades ago. Bourdain was a famous, beloved “bad boy” as one friend described him. He demonstrated a generosity of self. He cared deeply, it would seem, about injustice, and about the opiate addicted with whom he empathized. I’ve found, working with the addicted, both using and in recovery, that addicts/alcoholics are generally extremely sensitive souls. Alcohol “works” for the alcoholic until it doesn’t. It promises and delivers what we seek from it for years, until it stops working. Still, we want to drink like everybody else. Drinking is fun, right? It goes with culinary delights, correct? It enhances life, isn’t that so? Yes, and no. Certainly “No” if you have the malady, which quietly marches on and in time takes our joy, even our will to live and carry on and pretend we’re OK. We’re not OK. We are just good actors. He perhaps was one of the best. With alcoholism, we make rules, to prove we have control. We also break those rules. We take life by the tail, but some weary of the show and let go. Alcoholics minimize, deny, believe their drinking is under control, and refuse to connect the dots — that drinking for escape, relief or to solve problems is creating more problems and is taking a toll on self-worth and, perhaps, cognition. The substance they are drinking for “a lift” is a depressant. The guilt, shame, powerlessness and depression can take us down. Jo Ann Towle, based in of Lexington, Kentucky, is a certified intervention professional with a national practice helping people find treatment for addiction.
0.999994
What supplies do I need to start a janitorial business? Cleaning services businesses often order bulk cleaners, concentrates, and other items from janitorial suppliers. Depending on your business, you might also need to invest in carpet cleaning equipment and other specialized cleaning tools. Though buying in bulk helps you save money, these purchases add up quickly. A cleaning company can easily spend thousands of dollars when ordering janitorial supplies. To protect these investments, many cleaning services purchase Property Insurance. This policy reimburses your business when your property is lost or destroyed because of a fire, theft, or covered weather event.
0.95319
Marylou Speaker Churchill (1945–2009) joined the NEC Preparatory School violin faculty in 1981, and was chair of the Preparatory School strings department from the mid-'80s through the 1990s. She taught studio lessons and orchestral repertoire classes in the College from the 1990s until 2009, and was increasingly active as a teacher at the College level following her retirement from the Boston Symphony Orchestra in 2000. At Commencement 2006, Churchill received NEC's Louis and Adrienne Krasner Teaching Excellence Award. Churchill joined the Boston Symphony Orchestra and Boston Pops in 1970 and was appointed to the position of principal second violin in 1977, a position she held through her retirement in 2000. Upon her retirement, the principal chair went to her former student Haldan Martinson '97 M.M. During her three decades with the BSO, Churchill worked extensively with William Steinberg, Erich Leinsdorf, Leonard Bernstein, Seiji Ozawa, Sir Colin Davis, Bernard Haitink, Claudio Abbado, Klaus Tennstedt, James Levine, and Andre Previn. She was a violinist with the Boston Symphony Chamber Players from 1993 until 2000, touring in Europe and South America, and recording with them the Shostakovich Piano Quintet, which was nominated for a Grammy in 2000. In the summer of 2001, she was the violinist in the world premier at Tanglewood of Portraits for soprano, clarinet, violin, cello, and piano by Richard Danielpour with Cynthia Hayman, William Hudgins, Yo-Yo Ma, and Emanuel Ax. Churchill was invited by Sir George Solti to be faculty and principal second violin of the Carnegie Hall Solti Project in 1994, and a year later, he invited her to lead the second violins in the "Musicians of the World" orchestra concert held in Geneva, Switzerland, to celebrate the 50th anniversary of the United Nations. Marylou Churchill gave numerous recitals across the United States, and appeared as soloist with the Boston Pops under Arthur Fiedler, John Williams, and Keith Lockhart, and orchestras in Brazil, Japan, and the U.S., as well as the Ural Philharmonic (Russia) under Sarah Caldwell as part of a tour of the Soviet Union. In addition to her teaching at NEC, Churchill coached for The New World Symphony Orchestra in Miami Beach, Florida, and was a violin coach for the Asian Youth orchestra in Hong Kong and at youth festivals in New Zealand and the U.S. Churchill was married to conductor, cellist, and NEC dean Mark Churchill, and they have twin daughters. B.M. with honors, NEC. Violin with Joseph Silverstein, Catherine Peterson, Raphael Spiro, and Eudice Shapiro. Chamber music with Eugene Lehner, William Kroll, Felix Galimir, Alexander Schneider, and Robert Mann. Faculty of Tanglewood Music Center, Musicorda Summer Chamber Music Program at Mount Holyoke College, Boston University Tanglewood Institute, University of Massachusetts, Amherst, and the Heifetz Institute. To listen to a 1978 NEC performance of Giovanni Bottesini's Grand Duo Concertante, performed by Marylou Speaker Churchill, violin, Lawrence Wolfe, double bass, and Susan Almasi Mandel, piano, go to the NEC home page and open up the music player—the track will show up under "Bottseni" in the alphabetical track list. Friends of Marylou Speaker Churchill is an open Facebook group through which Churchill received messages and memories during her final days. Mark Churchill writes, "We encourage you to continue to share your remembrances and stories with each other and with us. Together all of the postings from this group provide a wonderful portrait of our dear Marylou. This will only become richer as new people join and add to the collection."
0.999949
what is the point of having a party system in a game when you get into a match and you and your party member get on separate teams. I mean for that its pointless to have a party system. If I get together with my friends to play I want to play with them on my team.
0.999993
This article is about the actor. For the judge, see Gerald Butler. Gerard James Butler (born 13 November 1969) is a Scottish actor who has appeared on film, stage, and television. After studying law, Butler turned to acting in the mid-1990s with small roles in productions such as Mrs Brown (1997), the James Bond film Tomorrow Never Dies (1997), and Tale of the Mummy (1998). In 2000, he starred as Dracula in the horror film Dracula 2000 with Christopher Plummer and Jonny Lee Miller. The following year, he played Attila the Hun in the miniseries Attila (2001). In the 2000s, Butler co-starred in the films Reign of Fire with Christian Bale (2002), and Lara Croft Tomb Raider: The Cradle of Life with Angelina Jolie (2003), before playing André Marek in the adaptation of Michael Crichton's science fiction adventure Timeline (2003). He then was cast as the role of Erik, The Phantom in Joel Schumacher's 2004 film adaptation of the musical The Phantom of the Opera alongside Emmy Rossum. That role earned him a Satellite Award nomination for Best Actor. In 2007, Butler gained recognition for his portrayal of King Leonidas in Zack Snyder's fantasy war film 300. That role earned him nominations for an Empire Award for Best Actor and a Saturn Award for Best Actor and a win for MTV Movie Award for Best Fight. That same year, he starred in the romantic drama film P.S. I Love You with Hilary Swank. He was then cast in the 2008 films Nim's Island with Jodie Foster and RocknRolla with Idris Elba. In 2009, he starred in several films including the romantic comedy The Ugly Truth with Katherine Heigl and the thriller Law Abiding Citizen with Jamie Foxx. In the 2010s, he voiced the role of Stoick the Vast in the animated action-fantasy film How to Train Your Dragon, a role he later reprised in Legend of the Boneknapper Dragon (2010), Gift of the Night Fury (2011) and How to Train Your Dragon 2 (2014). He played military leader Tullus Aufidius in the 2011 film Coriolanus, the modernized adaptation of Shakespeare's tragedy of the same name. He also played Sam Childers in the 2011 action biopic Machine Gun Preacher. In 2012, he co-starred in the biographical drama surf film Chasing Mavericks with Jonny Weston, and the romantic comedy film Playing for Keeps with Jessica Biel. A year later, he starred as Mike Banning in the action thriller film Olympus Has Fallen opposite Morgan Freeman. He had a small part in the 2014 film 300: Rise of an Empire where he reprised his role as King Leonidas in flashback. Butler's television work includes playing Marty Claymore in The Young Person's Guide to Becoming a Rock Star (1998), Gus in Lucy Sullivan Is Getting Married (1999) and Johnnie Donne in The Jury (2002). Butler was born in Paisley in Renfrewshire, Scotland, the youngest of three children of Margaret and Edward Butler, a bookmaker. Butler is from a Catholic family of Irish descent. Butler's family moved to Montreal, Quebec, when he was six months old. His mother returned to Scotland with him, from Quebec, when her marriage broke down, when Gerard was 18 months old. Butler was head boy at St Mirin's & St Margaret's High School in Paisley and achieved respectable grades—good enough to win a place to study law at the University of Glasgow. He also attended Scottish Youth Theatre while a teenager. Butler did not see his father again until he was 16 years old, when Edward Butler called to meet him at a Glasgow restaurant. After this meeting, Butler cried for hours, and recalled of it later: "That emotion showed me how much pain can sit in this body of yours; pain and sorrow that you don’t know you have until it is unleashed." Butler became close to his father after this reunion. Around the same time, he also accepted Glasgow University's offer to study law. During his time as a student, he became the President of the university law society, a position Butler later said he "kind of blagged my way into". He also sang in a rock band called Speed. While Butler was a 22-year-old student, his father was diagnosed with cancer and died. He would say of this period in his life: "I had gone from a 16-year-old who couldn't wait to grasp life to a 22-year-old who didn't care if he died in his sleep." Before his final year of law school, Butler took a year off to live in California. He mostly lived in Venice Beach, working at different jobs, travelling often, and, according to him, drinking heavily, at one point being arrested for alcohol-related disorderly conduct. Butler later described this year as, "I was out of control, and justifying it with this idea that 'I'm young, this is life. This is me just being boisterous." After his time off in America, he returned to Scotland to finish his final year at law school. Upon graduation, he won a position as a trainee lawyer at an Edinburgh law firm. However, his lifestyle remained unrestrained and he frequently missed work due to his partying antics. One week before he qualified as a lawyer, he was fired. At the age of 25, and an unqualified lawyer, Butler moved to London to pursue his dream of becoming famous. He admitted, "When I started out, I'm not sure I was actually in it for the right reasons. I wanted very much to be famous." Unable to win any acting roles initially, he worked in a variety of jobs including as a waiter, a telemarketer and a demonstrator of how toys work at fairs. Whilst in London, he met an old friend from his teenage days in the Scottish Youth Theatre, who was now a London casting agent. At that time, he was her boyfriend and her assistant. She took him to an audition for Steven Berkoff's play of Coriolanus. The director said of Butler's audition, "When he read, he had such vigour and enthusiasm—so much that it made the other actors seem limp—that I decided to cast him in the ensemble." Then aged 27, Butler had his first professional acting job. Less than a year later, he won a part in a theatre adaptation of Trainspotting, which he performed at the Edinburgh Festival. At age 30, Butler decided to move to Los Angeles; there he won parts in Dracula 2000, Tomb Raider 2, Dear Frankie, and Phantom of the Opera. In London, Butler held a series of odd jobs until being cast by actor and director Steven Berkoff (who later appeared alongside him in Attila (2001)) in a stage production of Coriolanus. He was cast as Ewan McGregor's character Renton in the stage adaptation of Trainspotting, the same play that had inspired him to become an actor. His film debut was as Billy Connolly's character's younger brother in Mrs Brown (1997). His film career continued with small roles, first in the James Bond film Tomorrow Never Dies (1997) and then Russell Mulcahy's Tale of the Mummy (1998). In 2000, Butler was cast in two breakthrough roles, the first being Attila the Hun in the American TV miniseries Attila (2001). The film's producers wanted a known actor to play the part but eventually chose Butler. He was cast as Dracula in Dracula 2000 (2000). He then appeared in Reign of Fire (2002) as Creedy and Lara Croft Tomb Raider: The Cradle of Life (2003) as Terry Sheridan, alongside Angelina Jolie. In the role of Andre Marek in the big-screen adaptation of Michael Crichton's novel Timeline (2003), Butler played an archaeologist who was sent back in time with a team of students to rescue a colleague. In 2003, director Joel Schumacher was deciding on the principal casting for the film The Phantom of the Opera, a film adaptation of the Andrew Lloyd Webber musical of the same name, and thought of Butler, whom he had seen earlier in the film Dracula 2000, to play the title character. Butler, who had had no musical experience other than singing in a rock band while he was studying to be a lawyer, was surprised at the interest, but immediately began taking singing lessons with a vocal coach. He then did an acting audition with Schumacher, and a singing audition with Lloyd Webber, both of whom were impressed by his performance. The film, and Butler's performance, received mixed reviews, though Butler was nominated for a Satellite Award for Best Actor. Other projects that followed include Dear Frankie (2005), The Game of Their Lives (2005) and Beowulf & Grendel (2005). In 2007, he starred as Spartan King Leonidas in the Warner Bros. production 300, which is often described as his breakthrough role. Butler, who said he "wanted to look really strong" in the film, trained with a high-intensity workout for four months prior to the film's shooting. In 2007, he also appeared in Butterfly on a Wheel co-starring Pierce Brosnan and Maria Bello, which aired on network TV under the title Shattered, and in the romantic comedy P.S. I Love You with Hilary Swank. In 2008, he appeared in Nim's Island and RocknRolla. In 2009, he starred in the Mark Neveldine/Brian Taylor film Gamer, The Ugly Truth and Law Abiding Citizen, which he also co-produced. In 2010 he starred in the action/comedy The Bounty Hunter with Jennifer Aniston, and did a voice-over for the 2010 animated film How to Train Your Dragon as Stoick the Vast. On 15 and 16 October 2010, thanks to the popularity of his role as Spartan King Leonidas and the use of his lines during athletic events at Michigan State University, he was a guest at their Midnight Madness and homecoming American football game. On 18 December 2011, while filming Chasing Mavericks, Butler was hospitalised after he was pulled under big waves. Subsequently, he was taken to Stanford University Medical Center and later released. On 19 August 2011, NME reported that while filming Playing for Keeps, Butler was writing songs and in the process of recording an album. Marilyn Manson, Jack Black and Johnny Depp were said to be advising him on becoming a rock star. However, in a 2013 interview with Parade, when asked if he had spoken with Manson or Depp about Rock music, Butler stated that "I've never had conversations with Marilyn Manson or Johnny Depp. Though any conversation with either of them would be awesome!" Butler starred in the action thriller Olympus Has Fallen, which was released in 2013 and co-stars Aaron Eckhart and Morgan Freeman. While filming Olympus Has Fallen, Butler says he broke two bones in his neck, but did not realise until he had an MRI scan. Butler reprised his voice role as Stoick in How to Train Your Dragon 2 in 2014. In 2016, Butler had the leading role in the Olympus Has Fallen sequel London Has Fallen and also portrayed Set in Gods of Egypt. As of October 2011, Butler splits his time living between Los Angeles and Glasgow. He has reportedly expressed interest in buying a Scottish castle. Butler has stated in interviews that he does not drink alcohol. In February 2012, it was announced that he had completed a course of treatment for substance abuse of pain killers at a rehab centre. This was after he was concerned he was too reliant on prescribed pain relief medication which escalated when he was involved in a surfing incident while filming Chasing Mavericks. In 2011 Butler played in a charity match for Glasgow Celtic F.C., a football club he has supported since childhood. A year later he would represent Celtic in a Hollywood film, starring as a "has been" player in Playing for Keeps. In August 2013, he bought an equity stake in the Jamaica Tallawahs Cricket team, which forms part of the Limacol Caribbean Premier League (CPL). Butler has been a supporter of charity Mary's Meals since 2010. ↑ "Gerard Butler Biography (1969-)". FilmReference.com. Archived from the original on 4 March 2016. Retrieved 7 August 2016. 1 2 3 4 "300 Things We Didn't Know About Gerard Butler". Esquire.com. 13 June 2009. Retrieved 9 June 2010. ↑ Fox, Chloe (20 July 2009). "Gerard Butler interview for The Ugly Truth". The Daily Telegraph. London. Retrieved 16 November 2010. ↑ "Gerard Butler in Wrath Of Gods". 15 March 2010. Retrieved 24 April 2010. ↑ "Drawn Together: Gerard Butler & Craig Ferguson". Cineplex Movie Blog. 15 March 2010. Retrieved 24 April 2010. ↑ "Gerard Butler Apologises for Irish Accent". YouTube. 26 January 2009. Retrieved 7 May 2012. ↑ "Gerard Butler: 'Why I am still single'". Now Magazine. Retrieved 25 February 2015. ↑ "Gerard Butler". mysticbliss.net. Retrieved 24 April 2010. ↑ Daily News. "Gerard Butler breaks the mold" 1 2 3 Fox, Chloe (20 July 2009). "Gerard Butler interview for The Ugly Truth". Daily Telegraph. Telegraph Media Group. Archived from the original on 4 March 2010. ↑ Stewart, Stephen (28 March 2010). "Gerard Butler's school pal on how Hollywood star phoned to grovel after branding her a flirt on TV". Daily Record. Retrieved 1 February 2013. ↑ Hedegaard, Erik (April 2010). "Gerry the Sinner, Gerry the Saint". Men's Journal. Retrieved 1 February 2013. 1 2 "Gerard Butler | Paisley Scotland". Paisley.org.uk. Retrieved 7 May 2012. ↑ LadyThrills (14 October 2007). "LadyThrills.com: Gerard Butler". Ladythrills.blogspot.co.uk. Retrieved 7 May 2012. 1 2 3 Stars and Stories (20 July 2009). "Gerard Butler interview for The Ugly Truth". London: Telegraph. Retrieved 7 May 2012. 1 2 "Gerard Butler Biography". biography.com. Retrieved 25 February 2015. ↑ "Mrs Brown". www.bbc.co.uk. Retrieved 25 February 2015. ↑ "Attila: hot babes, baths and, erm, birth control". The Guardian. 28 January 2010. Retrieved 25 February 2015. ↑ "The Graph Of Manliness: Gerard Butle". empireonline.com. Retrieved 25 February 2015. ↑ "Reign of Fire". Digital Spy. Retrieved 25 February 2015. ↑ "Timeline". Movie rewind.com. Retrieved 25 February 2015. ↑ Murray, Rebecca. "Gerard Butler Talks About The Phantom and "Beowulf and Grendel"". About.com. Retrieved 25 February 2015. ↑ "Lionsgate Picks Up "Butterfly on a Wheel"". About.com. Retrieved 25 February 2015. ↑ "Gerard Butler Interview – P.S. I LOVE YOU". collider.com. Retrieved 25 February 2015. ↑ "Gerard Butler interview for The Ugly Truth". The Daily Telegraph. Retrieved 25 February 2015. ↑ "Jamie Foxx, Gerard Butler Seek Justice With 'Law Abiding Citizen'". mtv. 15 October 2009. Retrieved 25 February 2015. ↑ "Gerard Butler says his 'Bounty Hunter' co-star Jennifer Aniston is like family". nydailynews.com. Retrieved 25 February 2015. ↑ "Gerard Butler and Craig Ferguson Talk HOW TO TRAIN YOUR DRAGON 2, the Evolution of the Film, LONDON HAS FALLEN, and More". collider.com. 14 June 2014. Retrieved 25 February 2015. ↑ "Gerard Butler at MSU Midnight Madness". Youtube. Retrieved 25 February 2015. ↑ Gerard Butler (20 December 2011). "Gerard Butler OK After Big-Wave Surfing Mishap". E! Online. Retrieved 7 May 2012. ↑ "Marilyn Manson advises Gerard Butler on becoming a rock star – NME". Retrieved 3 September 2012. ↑ "Gerard Butler on Singing, Fame, and the Secret Service". Retrieved 25 March 2013. ↑ "Gerard Butler broke neck bones". 27 March 2013. 1 2 "I miss going to see Celtic play, admits Hollywood hunk Gerard Butler". Daily Record. Retrieved 4 October 2011. ↑ "Gerard Butler Purchases Glasgow Apartment For Girlfriend Morgan Brown? 'Phantom of the Opera' Star Invests in Castle, Apartments And Homes After Engagement Rumors Spread". KpopStarz. Retrieved 17 July 2015. ↑ Reuters Editorial (23 August 2013). "Cricket-Caribbean venues packed again thanks to CPL Twenty20". Reuters UK. Retrieved 13 April 2016. ↑ Meadows, Sophie. "Gerard Butler Shows How Mary's Meals is Changing Lives in Liberia". goodnewsshared.com. Retrieved 25 February 2015. Wikimedia Commons has media related to Gerard Butler.
0.945718
Penne with Grilled Chicken Broccoli and Garlic is a tasty tweak of the classic Italian recipe. Cut the root end off the head of garlic, exposing the bottom of the garlic cloves. Drizzle exposed cloves with 1 tablespoon of the olive oil. Season with salt and pepper to taste. Wrap the garlic in aluminum foil, then put on the grill, on indirect heat. Roast until garlic is brown and getting very soft, 30-45 minutes. Set aside to cool when done roasting. When the garlic is cool enough, squeeze out the roasted garlic into a small bowl. Add 1 teaspoon olive oil to the garlic, and stir to combine a paste. Set aside. Meanwhile, as the garlic roasts, combine the chicken in a bowl with the olive oil, garlic powder, basil and salt. Let it marinate for a bit, as the chicken will only take about 10 minutes to cook. This is a good time to start the water boiling for the penne. Steam the broccoli: put an inch or two of water in a large pan. Insert a vegetable steamer into the pan and add the broccoli. Steam for 4 to 5 minutes. Move the steamed broccoli into a bowl, and combine with the 1/2 teaspoon garlic powder, 2 tablespoons olive oil, parmesan cheese, salt to taste, and red pepper flakes. Stir the broccoli is well-coated. Transfer the broccoli to a grill pan, and place on the grill. Start grilling the chicken and cooking the penne around the same time you put the broccoli on the grill. Coat the grill with oil spray, and place the chicken on the grill. Grill the chicken for about 6 minutes on one side, then turn over to finish grilling for another 6 minutes or so. Check the chicken for doneness after 12 minutes of total grilling. Remove chicken if done, or grill for a few more minutes to finish cooking if needed. When the chicken has cool, slice the chicken into bite sized pieces. Stir the broccoli after it has been grilling for 5 or 6 minutes. Grill for another 6 minutes. The broccoli should be starting to brown and caramelize. Remove from heat. Cook the penne according to package instructions as you grill the chicken and broccoli. When the pasta is cooked, drain and toss with 3 tablespoons of olive oil, 1 tablespoon of white wine, the feta cheese and sliced olives. Stir in the roasted garlic paste. Add the chicken pieces and broccoli to the pasta. Stir to combine well. Plate and serve with additional parmesan cheese at the table. Enjoy!
0.999671
Have you ever walked through an animal shelter and wished you could just take them all home with you? Well you can — sort of — by becoming a pet foster parent! Although fostering isn’t a permanent solution for people looking for a furry friend, it is a great way to provide some much appreciated temporary care for dogs and cats who are in need of a forever home. Many people choose to care for their foster pet until it finds a permanent home, but most adoption centers won’t mind setting a predetermined length of tutelage. Some organizations, like New York City’s ASPCA, will even provide food, supplies, and cover medical expenses for the animals they place in foster homes, eliminating any financial duties involved in animal care, which makes pet fostering both generous and affordable. Most pet foster programs are local (and it might take some searching to find one near you), but there are websites like Petfinder that can help you find a pet-fostering organization close to home. They also have some great information about fostering dogs and cats if you would like to learn more about fostering, or determine whether it’s right for you.
0.996957
A 2013 paper described how Google was using deep convolutional networks to read address numbers from photos in Google Street View images. "Our system helped us extract close to 100 million physical street numbers from Street View imagery," the authors wrote. Researchers found that the performance of neural networks kept improving as they got deeper. "We find that the performance of this approach increases with the depth of the convolutional network, with the best performance occurring in the deepest architecture we trained." Right now, I can open up Google Photos, type "beach," and see my photos from various beaches I've visited over the last decade. I never went through my photos and labeled them; instead, Google identifies beaches based on the contents of the photos themselves. This seemingly mundane feature is based on a technology called deep convolutional neural networks, which allows software to understand images in a sophisticated way that wasn't possible with prior techniques. In recent years, researchers have found that the accuracy of the software gets better and better as they build deeper networks and amass larger data sets to train them. That has created an almost insatiable appetite for computing power, boosting the fortunes of GPU makers like Nvidia and AMD. Google developed its own custom neural networking chip several years ago, and other companies have scrambled to follow Google's lead. Over at Tesla, for instance, the company has put deep learning expert Andrej Karpathy in charge of its Autopilot project. The carmaker is now developing a custom chip to accelerate neural network operations for future versions of Autopilot. Or, take Apple: the A11 and A12 chips at the heart of recent iPhones include a "neural engine" to accelerate neural network operations and allow better image- and voice-recognition applications.Experts I talked to for this article trace the current deep learning boom to one specific paper: AlexNet, nicknamed after lead author Alex Krizhevsky. "In my mind, 2012 was the milestone year when that AlexNet paper came out," said Sean Gerrish, a machine learning expert and the author of How Smart Machines Think. Prior to 2012, deep neural networks were something of a backwater in the machine learning world. But then Krizhevsky and his colleagues at the University of Toronto submitted an entry to a high-profile image recognition contest that was dramatically more accurate than anything that had been developed before. Almost overnight, deep neural networks became the leading technique for image recognition. Other researchers using the technique soon demonstrated further leaps in image recognition accuracy. In this piece we'll dig deep into deep learning. I'll explain what neural networks are, how they're trained, and why they require so much computing power. And then I'll explain why a particular type of neural network—deep, convolutional networks—is so remarkably good at understanding images. And don't worry—there will be a lot of pictures. The phrase "neural network" may still feel a bit nebulous, so let's start with a simple example. Suppose you want a neural network to decide whether a car should go based on the green, yellow, and red lights of a stoplight. A neural network could accomplish this task with a single neuron. The neuron takes each input (1 for on, 0 for off), multiplies it by its associated weight, and adds all the weighted values together. The neuron then adds the bias, which determines a threshold for the neuron to "activate." In this case, if the output is positive, we consider the neuron to have "fired"—otherwise we don't. This neuron is equivalent to the inequality "green - red - 0.5 > 0." If that evaluates to true—meaning the green light is on and the red light is off—then the car should go. In real neural networks, artificial neurons take one additional step. After summing the weighted inputs and adding in the bias, the neuron then applies a non-linear activation function. A popular choice is the sigmoid function, an S-shaped function that always produces a value between 0 and 1. The use of an activation function wouldn't change the result of our simple stoplight model (except we'd need to use a threshold of 0.5 instead of 0). But the nonlinearity of activation functions is essential for enabling neural networks to model more complex functions. Without an activation function, every neural network, no matter how complex, would be reducible to a linear combination of its inputs. And a linear function can't model complex real-world phenomena. Non-linear activation functions make it possible for neural networks to approximate any mathematical function. There are lots of ways to approximate functions, of course. What makes neural networks special is that we know how to "train" them using a bit of calculus, a bunch of data, and a whole lot of computing power. Instead of having a human programmer directly design a neural network for a particular task, we can build software that starts with a fairly generic neural network, looks at a bunch of labeled examples, and then modifies the neural network so that it produces the correct label for as many of the labeled examples as possible. The hope is that the resulting network will generalize, producing the correct labels for examples previously not in its training set. The process to get to this point started well before AlexNet. In 1986, a trio of researchers published a landmark paper about backpropagation, a technique that helped make it mathematically tractable to train complex neural networks. To get an intuition for how backpropagation works, let's look at a simple neural network described by Michael Nielsen in his excellent online deep learning textbook. The goal of this network is to take a 28×28 pixel image representing a handwritten digit and correctly identify whether the digit is a 0, 1, 2, etc. In this image, each of the circles in the middle and right columns is a neuron like the one we looked at in the previous section. Each neuron takes a weighted average of its inputs, adds a bias value, and then applies an activation function. Note that the circles on the left are not neurons—these circles represent the network's input values. While the image only shows 8 input circles, there are actually 784 inputs—one for each pixel in the input images. Each of the 10 neurons on the right is supposed to "light up" for a different digit: the top neuron should fire when the input image is a handwritten 0 (and not otherwise), the second one should fire when the network sees a handwritten 1 (and not otherwise), and so forth. Each neuron takes inputs from every neuron in the layer before it. So each of the 15 neurons in the middle layer has 784 input values. Each of these 15 neurons has a weight parameter for each of its 784 inputs. That means this layer alone has 15×784=11,760 weight parameters. Similarly, the output layer contains 10 neurons, each of which takes an input from each of the 15 neurons in the middle layer, adding another 15×10=150 weight parameters. On top of that, the network also has 25 bias variables—one for each of the 25 neurons. This image shows 160 of the 60,000 images in the MNIST dataset. The feed-forward step computes the network's output values, given the input image and the network's current parameters. The backpropagation step computes how much the results diverged from the correct output values, then modifies the network's parameters to slightly improve its performance on that particular input image. If the network is well-calibrated, then the network's "7" output should be close to 1, while the network's other nine outputs should all be close to 0. But suppose instead that the network's "0" output is 0.8 when shown this image. That's too high! The training algorithm will change the input weights of the "0" output neuron to get it closer to 0 next time it's shown that particular image. To do this, the backpropagation algorithm computes an error gradient for each input weight parameter. This is a measure of how much the output error would change for a given change in the input weight. The algorithm then uses this gradient to decide how much to change each input weight—the bigger the gradient, the more that parameter is changed. In other words, the training process "teaches" neurons in the output layer to pay less attention to inputs (which is to say neurons in the middle layer) that push them toward the wrong answer and to pay more attention to inputs that push them in the right direction. The algorithm repeats this step for each of the other output neurons. It reduces weights of inputs for the "1," "2," "3," "4," "5," "6," "8," and "9" neurons (but not the "7" neuron) to push the value of these output neurons downward. The higher an input's value, the larger the gradient of the output error with respect to that input's weight parameter—hence the more its weight will be reduced. Conversely, the training algorithm increases the weights of inputs to the "7" output, which will cause that neuron to produce a higher value next time it is shown this particular image. Once again, inputs with larger values will see a larger increase in their weights, causing the "7" output neuron to pay more attention to these inputs in future rounds. The algorithm next needs to perform the same calculation for the middle layer: change each input weight in a direction that will reduce the network's errors—again, getting the "7" output closer to 1 and the others closer to 0. But each middle neuron is an input to all 10 of the neurons in the output layer, which complicates things in two ways. First, the error gradient for any given middle-layer input depends not only on that input value, but also on error gradients in the next layer. The algorithm is called backpropagation because error gradients from later layers in a network are propagated backwards and used (along with the chain rule from calculus) to calculate gradients in earlier layers. Also, each middle layer neuron is an input to all ten neurons in the output layer. So the training algorithm has to compute an error gradient reflecting how a change in a particular input weight will affect the average error across all outputs. Backpropagation is a hill-climbing algorithm: each round of the algorithm causes the outputs to be closer to the correct results for that training image—but only a little bit closer. As the algorithm looks at more and more examples, it "climbs the hill" toward an optimal set of parameters, one that correctly classifies as many training examples as possible. Achieving high accuracy requires thousands of training examples, and the algorithm may need to loop through every image in this training set dozens of times before performance stops improving. Nielsen shows how to implement all of this with just 74 lines of Python code. Remarkably, a neural network trained with this simple program is able to recognize more than 95 percent of hand-written digits in the MNIST database. With some additional refinements, a simple two-layer neural network like this is able to recognize more than 98 percent of digits. You might have expected the development of backpropagation in the 1980s to kick off a period of rapid progress in machine learning based on neural networks, but that's not what happened. There were some people working on the technique in the 1990s and early 2000s, of course. But interest in neural networks didn't truly take off until the early 2010s. We can see this in the results of the ImageNet competition, an annual machine learning contest organized by Stanford computer scientist Fei-Fei Li. In each year's competition, contestants were given a common set of more than a million training images—each hand-labeled with one of about 1,000 possible categories, like "fire engine," "mushroom," or "cheetah." Contestants' software was judged on its ability to classify other images that had not been included in the training set. Programs could make multiple guesses and were considered successful if one of their first five guesses for an image matched the human-chosen label. The competition began in 2010, and deep neural networks did not play a major role the first two years. Top teams used a variety of other machine learning techniques with fairly mediocre results. The winning team in 2010 had a top-5 error rate of 28 percent. In 2011, it was 25 percent. Then came 2012. That team from the University of Toronto submitted an entry—the one later dubbed AlexNet after lead author Alex Krizhevsky—and blew competitors out of the water. Using a deep neural network, the team achieved a 16-percent top-five error rate. The closest rival that year had a 26-percent error rate. The handwriting recognition network discussed above had two layers, 25 neurons, and almost 12,000 parameters. AlexNet was vastly larger and more complex: eight trainable layers, 650,000 neurons, and 60 million parameters. Training a network of that size required massive computing power, and AlexNet was designed to take advantage of the massive parallel computing power provided by modern GPUs. The researchers figured out how to divide the work of training their network across two GPUs, giving them twice the computing power to work with. Still, despite aggressive optimization, training the network took five to six days with the hardware available in 2012 (a pair of Nvidia GTX 580 GPUs, each with 3GB of memory). AlexNet was able to recognize that the first image contained a mite even though the mite was a small shape at the very edge of the image. The software not only correctly identified the leopard, its other top guesses—jaguar, cheetah, snow leopard, and Egyptian cat—were all similar-looking cats. AlexNet labeled an image of a mushroom with "agaric"—a type of mushroom. "Mushroom," the officially correct label, was AlexNet's second choice. AlexNet's "mistakes" were almost as impressive. It labeled a picture of a dalmatian behind some cherries with "dalmatian," whereas the official label was "cherry." AlexNet recognized that the picture contained some kind of fruit—"grape" and "elderberry" were among its top-five choices—but it didn't quite recognize that they were cherries. Shown a picture of a Madagascar cat in a tree, AlexNet listed a bunch of small tree-climbing mammals. Plenty of humans (including me) would have gotten this one wrong. It was a truly impressive performance, demonstrating that software could recognize common objects in a wide variety of orientations and settings. Deep neural networks quickly became the most popular technique for image recognition tasks, and the machine learning world hasn't looked back since. "Following the success of the deep learning-based method in 2012, the vast majority of entries in 2013 used deep convolutional neural networks," the ImageNet sponsors wrote. That pattern continued in subsequent years, and later winners built on the basic techniques pioneered by the AlexNet team. By 2017, contestants using much deeper neural networks had pushed the top-five error rate down below three percent. Given the complexity of the task, this arguably makes computers better at this task than many human beings. Enlarge / This slide from the ImageNet team shows the winning team's error rate each year in the top-5 classification task. The error rate fell steadily from 2010 to 2017. Technically, AlexNet was a convolutional neural network. In this section I'll explain what a convolutional network does and why the technique has become crucial to modern image recognition algorithms. The simple handwriting recognition network we explored earlier was fully connected: every neuron in the first layer is an input to every neuron in the second layer. This structure works well enough for the relatively simple task of recognizing digits on small 28×28 pixel images. But it doesn't scale well. In the MNIST dataset of handwritten digits, characters are always centered. This greatly simplifies training because it means that (for example) a seven will always have some dark pixels at the top and at the right of the image, while the lower-left is always white. A zero will almost always have a white spot near the middle and darker pixels near the edges. A simple, fully connected network can detect these kinds of patterns fairly easily. But suppose you wanted to build a neural network that could recognize numbers that might be located anywhere in a larger image. A fully connected network won't work as well, because it doesn't have an efficient way to recognize similarities between shapes located in different parts of the image. If your training set happened to have most of the sevens in the upper-left corner, then you'd end up with a network that is better at recognizing sevens in the upper left than elsewhere in the image. Theoretically you could solve this problem by making sure your training set had many examples of every digit in every possible pixel position. But in practice that would be hugely wasteful. As the size of images and the depth of networks increased, the number of connections—and hence the number of input weight parameters—would explode. You'd need vastly more training images (not to mention a lot more computing power) to achieve adequate accuracy. When a neural network learns to recognize a shape in one position within the image, it should be able to apply that learning to recognize similar shapes in other parts of the image. Convolutional neural networks provide an elegant solution to this problem. "It's like taking a stencil or pattern and matching it against every single spot on the image," said AI researcher Jie Tang. "You have a stencil outline of a dog, and you basically match the upper-right corner of it against your stencil—is there a dog there? If not, you move the stencil a little bit. You do this over the whole image. It doesn't matter where in the image the dog appears. The stencil will match it. You don't want to have each subsection of the network learn its own separate dog classifier." So, imagine if we took a large image and broke it into 28×28 pixel squares. Then we could feed each square into the fully connected handwriting recognition network we explored earlier. If the "7" output lit up for at least one of those squares, that's a sign that the image as a whole probably has a seven in it. This is essentially what convolutional networks do. In convolutional networks, these "stencils" are known as feature detectors, and the area they look at is called the receptive field. Real feature detectors tend to have receptive fields much smaller than 28 pixels on a side. In AlexNet, the first convolutional layer had feature detectors whose receptive field was 11 pixels by 11 pixels. Subsequent convolutional layers in AlexNet had receptive fields three or five units wide. As a feature detector sweeps across an input image, it produces a feature map: a two-dimensional grid that indicates how strongly the detector was activated by different parts of the image. Convolutional layers will usually have more than one feature detector, each scanning the input image for a different pattern. In AlexNet, the first layer had 96 feature detectors and produced 96 feature maps. To make this more concrete, here's a visual representation of visual patterns learned by each of the 96 feature detectors in AlexNet's first layer after network training. There are detectors that look for horizontal or vertical lines, gradients from light to dark, checkerboard patterns, and many other shapes. A color image is commonly represented as a pixel map with three numbers for each pixel: a red value, a green value, and a blue value. AlexNet's first layer takes this three-number representation of the image and transforms it into a 96-number representation. Each "pixel" in this image has 96 values, one for each of the 96 feature detectors. ... and so on for the other 93 feature detectors in AlexNet's first layer. The first layer outputs a new representation of the image where each "pixel" is a 96-number vector (as I'll explain later, this new representation is also scaled down by a factor of four). So that's AlexNet's first layer. Next there are four more convolutional layers, each of which takes the previous layer's output for its input. As we've seen, the first layer detects basic patterns like horizontal and vertical lines, light-to-dark gradients, and curves. The second layer then uses these as building blocks to detect slightly more complex shapes. For example, the second layer might have a feature detector that finds circles by combining the output of first-layer feature detectors that find curves. The third layer finds still more complex shapes by combining features from the second layer. The fourth and fifth layers find even more complex patterns. Researchers Matthew Zeiler and Rob Fergus published an excellent 2014 paper that offers some helpful ways to visualize the kinds of patterns recognized by a five-layer neural network similar to ImageNet. In this slideshow from their paper, each image (other than the first first one) has two halves. On the right you'll see examples of thumbnail images that strongly activated a particular feature detector. These are organized into groups of nine—each group corresponds to a different feature detector. On the left is a map that shows which specific pixels within that thumbnail image were most responsible for the strong match. You can see this most dramatically in the fifth layer, as there are feature detectors that strongly light up for dogs, corporate logos, unicycle wheels, and so forth. Flipping through the images, you can see that each layer is capable of recognizing more complex patterns than the ones before it. The first layer recognizes simple pixel patterns that don't look like much at all. The second layer recognizes textures and simple shapes. By the third layer, we see recognizable shapes like car wheels and reddish-orange spheres (which might be tomatoes, ladybugs, or something else). The first layer has a receptive field 11 units on a side, while later layers have receptive fields that are three to five units on a side. But remember, these later layers are looking at feature maps generated by the earlier layers, and each "pixel" in these feature maps represents several pixels in the original image. So each layer's receptive field encompasses a larger portion of the original image than the layers that preceded it. That's part of the reason that the thumbnail images in later layers seem more complex than those of earlier layers. The nine images on the right might not look very similar. But if you look at the nine heat maps on the left, you'll see that this particular feature detector isn't focusing on the objects in the foreground of each image. Instead, it's focusing on the grassy parts in the background of each image! Obviously, a grass-detector is useful if one of the categories you're trying to identify is "grass," but this is likely to be useful for a lot of other categories, too. Following the five convolutional layers, AlexNet has three layers that are fully connected like the layers in our handwriting recognition network. These layers consider every one of the feature maps produced by the fifth convolutional layer as they try to classify the image into one of the 1,000 possible categories. So if a picture has grass in the background, it's more likely to show a wild animal. On the other hand, if the picture has grass in the background, it's less likely to be a picture of indoor furniture. These and other layer-five feature detectors provide a wealth of information about what's probably in the photo. The last few layers of the network synthesize this information to produce an educated guess about what the picture as a whole depicts. We've seen that the feature detectors in convolutional layers perform impressive pattern recognition, but so far I haven't explained how convolutional networks actually work. A convolutional layer is a layer of neurons. Like any neurons, these take a weighted average of their inputs and then apply an activation function. Parameters are trained using the backpropagation techniques we've discussed. But unlike the neural networks above, a convolutional layer isn't fully connected. Each neuron only takes input from a small fraction of the neurons in the previous layer. And, crucially, the neurons in convolutional networks have shared input weights. Let's zoom in on the first neuron in the first convolutional layer of AlexNet. This layer has a receptive field of 11×11 pixels, so the first neuron looks at an 11×11 square of pixels in one corner of the image. This neuron takes input from these 121 pixels, and each pixel has three values—red, green, and blue. So the neuron has a total of 363 inputs. Like any neuron, this one takes a weighted average of these 363 input values and then applies an activation function. And because it has 363 input values, it also needs 363 input weight parameters. The second neuron in AlexNet's first layer looks a lot like the first one. It also looks at an 11×11 pixel square, but its receptive field is shifted by four pixels from the first neuron's receptive field. This creates a seven-pixel overlap between the two receptive fields, which avoids having interesting patterns getting missed if they straddle the line between two neurons. This second neuron also takes the 363 values that describe its 11×11 pixel square, multiplies each value by a weight parameter, adds these values up, and applies an activation function. Rather than having its own set of 363 input weights, the second neuron uses the same input weights as the first neuron. The upper-left pixel of the first neuron uses the same input weights as the upper-left pixel of the second neuron. So the two neurons are looking for exactly the same pattern; they just have receptive fields that are offset from each other by four pixels. There are a lot more than two neurons of course: there are actually 3,025 neurons laid out in a 55×55 grid. Each of these 3,025 neurons uses the same set of 363 input weights as those first two neurons. Together, all of those neurons form a feature detector that "scans" for a specific pattern wherever it might be located in an image. Remember that the first layer of AlexNet had 96 feature detectors. The 3,025 neurons I just mentioned constitute one of those 96 feature detectors. Each of the other 95 feature detectors is a different group of 3,025 neurons. Each group of 3,025 neurons shares its 363 input weights with others in its group—but not with neurons in the other 95 feature detectors. Convolutional networks are trained using the same basic backpropagation algorithm used to train fully connected networks, but the convolutional structure makes the training process more efficient and effective. "Using convolutions is really helpful because you can re-use parameters," machine learning expert and author Sean Gerrish told Ars. That drastically cuts down on the number of input weights the network needs to learn, which allows the network to produce better results with fewer training examples. Learning from one part of an image can translate into better recognition of the same pattern in other locations in other images. This allows the network to achieve high performance with far fewer training examples. The AlexNet paper was a sensation in the academic machine learning community, but its significance was also quickly recognized in industry. Google became particularly interested in the technique. In 2013, Google acquired a startup formed by the authors of the AlexNet paper. They used the technology to add a new image search feature to Google Photos. "We took cutting edge research straight out of an academic research lab and launched it, in just a little over six months," wrote Google's Chuck Rosenberg. Meanwhile, a 2013 paper described how Google was using deep convolutional networks to read address numbers from photos in Google Street View images. "Our system has helped us extract close to 100 million physical street numbers from Street View imagery," the authors wrote. Researchers found that the performance of neural networks kept improving as they got deeper. "We find that the performance of this approach increases with the depth of the convolutional network, with the best performance occurring in the deepest architecture we trained," the Google Street View team wrote. "Our experiments suggest deeper architectures may obtain better accuracy, with diminishing returns." So after AlexNet, neural networks kept getting deeper. A Google team submitted the winning entry to the 2014 ImageNet competition—just two years after AlexNet's win in 2012. Like AlexNet, it was based on a deep convolutional neural network, but Google used a much deeper 22-layer network to achieve a 6.7-percent top-five error rate—a big improvement over AlexNet's 16-percent error rate. Still, deeper networks were only useful with large training sets. For this reason, Gerrish argues that the ImageNet dataset and competition played a key role in enabling the success of deep convolutional networks. Remember, the ImageNet competition gave contestants a million images and asked them to assign them to one of 1,000 different categories. "Having a million images to train your network means that there are 1,000 images per class," Gerrish said. Without such a large dataset, he said, "you would have had too many parameters to train a network." Recent years have brought a continued focus on amassing larger data in order to train deeper, more accurate networks. It's a big reason why self-driving car companies have focused so much on racking up miles on public roads—images and video from testing are sent back to headquarters and used to train the companies' image recognition networks. The discovery that deeper networks and larger training sets could deliver better and better performance has created an insatiable demand for more computing power. A big part of AlexNet's success was the realization that neural network training involved matrix operations that could be performed efficiently using the highly parallel computational power of a graphics card. "Neural networks are parallelizable," said machine learning researcher Jie Tang. Graphics cards—which provide massively parallel computing power for video games—turned out to be useful for neural networks. "The core operation of GPUs, really fast matrix multiplication, ended up being the core operation of neural nets," Tang said. That has turned into a bonanza for Nvidia and AMD, the leading GPU makers. Both companies have worked to develop new chips that are tuned for the unique needs of machine learning applications, and AI applications now account for a significant fraction of these companies' GPU sales. In 2016, Google announced that it had created a custom chip called a Tensor Processing Unit (TPU) specifically for neural network operations. "Although Google considered building an Application-Specific Integrated Circuit (ASIC) for neural networks as early as 2006, the situation became urgent in 2013, Google wrote last year. "That’s when we realized that the fast-growing computational demands of neural networks could require us to double the number of data centers we operate." Initially, access to TPUs was limited to Google's own proprietary services, but Google later began to allow anyone to use the technology via Google's cloud computing platform. Of course, Google isn't the only company working on AI chips. For just a small sampling: recent versions of the iPhone's chips include a "neural engine" optimized for neural network operations. Intel is developing its own line of chips optimized for deep learning. Tesla announced recently that it was dumping Nvidia's chips in favor of a homebrew neural network chip. Amazon is reportedly working on an AI chip of its own, too. I've explained how deep neural networks work, but I haven't really explained why they work as well as they do. It's more than a little mysterious how a mind-bogglingly large number of matrix calculations could enable a computer system to distinguish a jaguar from a cheetah and an elderberry from a currant. Perhaps the most remarkable thing about neural networks is what they don't do. Convolutions allow neural networks to understand translations—they can tell if a pattern in the upper-right corner of one image is similar to a pattern in the upper-left corner of another. But beyond that, convolutional networks have no real understanding of geometry. They can't recognize that one image is similar to another if it's rotated by 45 degrees or scaled up by a factor of two. Convolutional networks make no attempt to understand three-dimensional object structures, and they can't correct for varying lighting conditions. Yet deep neural networks can recognize pictures of dogs whether they're taken from the front or the side, and whether they take up a small part of the image or a large one. How do they do that? It turns out that with enough data, a brute-force statistical approach is good enough to get the job done. A convolutional network isn't designed to "imagine" how a particular image would look if viewed from a different angle or in different circumstances, but with enough labeled examples, it can learn all possible permutations by sheer repetition. There's evidence that the human visual system actually works in a similar way. Consider this pair of pictures (make sure you look carefully at the first image before flipping to the second on it. Obviously, the creator of this image took someone's image and flipped the eyes and mouth upside down. The image looks relatively normal when you look at it upside down because the human visual system is used to seeing eyes and mouths in this orientation. But when you look at the face right-side up, the face immediately looks freakishly misshapen. This suggests that the human visual system relies on some of the same crude pattern-matching techniques that neural networks do. If we're looking at something that's almost always viewed in one orientation—like human eyes—we're much better at recognizing them in their usual orientation. Neural networks are good at using all of the context in a picture to figure out what it shows. For example, cars usually appear on roads. Dresses usually appear either on women's bodies or hanging in closets. Airplanes either appear framed against a blue sky or taxiing on a runway. Nobody explicitly teaches neural networks these correlations, but with enough labeled examples the network can learn them automatically. In 2015, some Google researchers tried to understand neural networks better by "running them backwards." Instead of using pictures to train neural networks, they used a trained neural network to modify images. For example, they started with an image that contained random noise and then gradually modified it to strongly "light up" one of the outputs of a neural network—effectively asking the neural network to "draw" one of the categories it had been trained to recognize. In one fascinating case, they had a neural network generate pictures that would strongly activate a neural network that had been trained to recognize dumbbells. "There are dumbbells in there alright, but it seems no picture of a dumbbell is complete without a muscular weightlifter there to lift them," the Google researchers wrote. Again, this might seem weird at first glance, but it's not actually that different from what humans do. If we see a small or blurry object in an image, we look at the surrounding environment for clues about what might be going on in the picture. Humans obviously reason about images in different ways, drawing on our sophisticated conceptual understanding of the world around us. But ultimately, deep neural networks are good at image recognition because they take full advantage of all the context shown in a picture, which isn't that different from how human beings do it.
0.998943
What might that mean in Harvard’s case? It could mean redefining the emphasis on diversity beyond race and gender also to encompass ideology. It could mean reaching even more students via online courses and the extension school, so that the university shifts its measurement of success away from how many tens of thousands of applicants it rejects, and toward how many it educates. It could mean expanding geographically beyond relatively prosperous, and politically liberal, Cambridge and Boston, toward more economically challenged and politically diverse parts of the state. Tufts has a veterinary school in Grafton, Mass. and its medical school founded a rural community health center in the Mississippi Delta. Harvard has a forest in Petersham. With NYU operating in Abu Dhabi, Cornell in Qatar, and Yale collaborating on a college in Singapore, it’s harder to make the case that Petersham, in Central Mass., or even, say, Pittsfield, in Western Mass., are so remote from Cambridge that ramping up activity there would prevent effective control or definitely dilute the brand. Love it. It’s time to re-establish Harvard as an actual institution of learning instead of an altar of political correctness and identity politics. However, based on his lifelong status as an Ivy League insider with multiple advanced degrees, his close friendship with the outgoing Harvard President, and his current service on Harvard’s governing board, I wouldn’t expect too much change. I’m not holding my breath that Harvard will suddenly pursue ideological diversity. I would instead expect a continuation of the insular mentality that has destroyed so many once robust bastions of ideas.
0.999983
Step 1: The RIAA maintains a list of songs whose distribution rights are owned by the RIAA's member organizations. It has given that list to Media Sentry, a company it hired to search for online pirates. Step 2: Media Sentry runs copies of the LimeWire program and performs searches for those copyrighted song titles, one by one, to see if any are being offered by people whose computers are connected to the LimeWire network. - If you have ever run Limewire and done searches on popular music titles, you know a simple search typically gives hundreds of "hits". Step 3: The Limewire search listing allows the searcher to manually right-click on any song entry and choose "browse host" to see all of the songs that a given file sharer is offering to others for download. Step 4: The listing also allows the searcher to see the IP address of the listed file sharers. Step 5: Media Sentry uses online databases like www.arin.net or www.samspade.org to find out which IP addresses are registered to each Internet-service provider. Step 6: Using this information, Media Sentry determines which traders are located at colleges or universities. Step 7: Media Sentry compares digital fingerprints, called hashes, of know copyright song files and those being shared. - This can be done by Media Sentry without actually downloading the suspected song, it can be done using only a TCP/IP "handshake". - It is possible to change the hash and in cases where this is suspected, Media Sentry will actually download the song and use Audible Magic software to compare sound waves of the offered audio file against those of the song it may be infringing upon. Step 7: Media Sentry forwards this information to the RIAA. The process is so simple it's even something I could do! The advantage companies like Media Sentry provide is automation and speed - fast servers and custom applications can scan large numbers of Limewire traders automatically. How does the RIAA typically continue? Step 8: A full-time RIAA employee reviews each case to make sure the claim is legitimate and that the alleged pirate is in the United States. If this is the case, the RIAA delivers a Digital Millennium Copyright Act takedown notice, asking the college to remove infringing content from its network. According to the Chronicle's RIAA source, Media Sentry does not perform these kinds of automated investigations on traders associated with commercial ISP's (like Verizon or Comcast) - all notices received by commercial Internet-service providers are processed manually by the RIAA. Be sure to read the entire Chronicle piece linked here.
0.989656
You can tell a cheetah from a leopard by looking at its face cheetahs has black lines that run from their eyes to their mouths. Cheetahs feed on animals such as deer rabbits, birds and lizards. Sometimes they eat fruit too. They likes watermelon. In the wild, most cheetahs live only 10 to 15 year. The cheetah is the world's fastest land animal. It can reach speeds of [ALTERNATE: a speed of] 70 miles an hour in just 3 seconds. You can tell a cheetah from a leopard by looking at its face. Cheetahs have black lines that run from their eyes to their mouths. Cheetahs feed on animals such as deer, rabbits, birds and lizards. Sometimes they eat fruit too. They like watermelon. In the wild, most cheetahs live only 10 to 15 years .
0.896706
Hellman & Friedman LLC, is the holding company for Kronos and has operations in San Francisco, London, and New York. Founded in 1984, Hellman & Friedman is a private equity investment firm that has developed $25B+ of committed capital and invested in over 75 companies—primarily in the services industry (the firm currently has investments in 25 technology companies including Datatel and IRIS Software Group). As for Kronos, the company has global offices in North America, Western Europe, Australia, China, India and Brazil, and has released figures that indicate the company earned $800M in revenues for the prior fiscal year. Kronos' focus on vertical markets has put the HR software company into an enviable position for geographic expansion—a current strategic focus for the company. Specifically, Kronos' global focus is on the emerging markets for now (especially India and China with 40 and 60 customers respectively) due to the fact that the company sees itself as having already established itself as a serious competitor in the American, British, Canadian, and Australian markets. Indeed, whether founded on truth or not, the company has actually been called "bullish" about the presence it has in these established markets—seeing ample prospects for up-selling and cross-selling into its sizeable customer base. For example, in North America, Kronos sees its capabilities in Payroll and HRIS as an opportunity to further explore other talent management software domains. However, as of the writing of this HR software review, no such strategic moves have been noted. Unfortunately, Kronos also suffers from an exaggerated sense of the importance of employee control measures. While these functions have certainly served organizations well in the past, the paradigm shift that is occurring within the Human Capital Management (HCM) space threatens to up-end the belief that workers are to be controlled and monitored closely—a belief that seems to be central to Kronos' flagship solutions. As such, if Kronos is to succeed in the future as a global provider of HR software (and capitalize those aforementioned "prospects"), its focus must move towards providing those HR solutions that harness this "worker-centric" power—understanding that the rise of well-rounded social and mobile technologies is an appropriate response for an increasingly disjointed and globally dispersed workforce. That being said, Kronos is heavily investing in product development, as has been the case for the past several years, and is making in-roads in several key talent management areas. This re-invention of sorts that the company is pushing has attracted the attention of both customers and analysts alike. In fact, Bersin & Associates' Madeline Laurano is quoted as saying that, "Kronos has become one of the most forward-looking solution providers in the space". Further, Laurano points out, "In talent acquisition alone, they have introduced a new UI, sourcing analytics, multiple ways to engage passive candidates including social networking integration not to mention a solution for salaried hires". The common theme running through these accolades however is that the newer Kronos capabilities revolve around Talent Acquisition and little else—initiatives that are either incredibly near-sighted or far-sighted depending on how the HR software market shapes up over the coming months and years.
0.946764
What is the philosophy of Angular? AngularJS is built around the belief that declarative programming should be used for building UIs and wiring software components, while imperative programming is excellent for expressing business logic. The framework adapts and extends traditional HTML to better serve dynamic content through two-way data-binding that allows for the automatic synchronization of models and views. As a result, AngularJS deemphasizes DOM manipulation and improves testability. Decouple DOM manipulation from application logic. This improves the testability of the code. Regard application testing as equal in importance to application writing. Testing difficulty is dramatically affected by the way the code is structured. Decouple the client side of an application from the server side. This allows development work to progress in parallel, and allows for reuse of both sides. Guide developers through the entire journey of building an application: from designing the UI, through writing the business logic, to testing. Angular follows the MVC pattern of software engineering and encourages loose coupling between presentation, data, and logic components. Using dependency injection, Angular brings traditional server-side services, such as view-dependent controllers, to client-side web applications. Consequently, much of the burden on the backend is reduced, leading to much lighter web applications. Why have we chosen AngularJS? Data-binding is probably the coolest and most useful feature in AngularJS. It saves us from writing a considerable amount of boilerplate code. A typical web application may contain up to 80% of its code base, dedicated to traversing, manipulating, and listening to the DOM. Data-binding makes this code disappear, so we can focus on the application. In AngularJS, a template is just plain-old-HTML. The HTML vocabulary is extended, to contain instructions on how the model should be projected into the view. The HTML templates are parsed by the browser into the DOM. The DOM then becomes the input to the AngularJS compiler. AngularJS traverses the DOM template for rendering instructions, which are called directives. Collectively, the directives are responsible for setting up the data-binding for the application view function. AngularJS has a built-in dependency injection subsystem that helps our developers by making the application easier to develop, understand, and test. Dependency Injection (DI) allows us to ask for application dependencies, rather than having to go look for them or make them yourself. Directives can be used to create custom HTML tags that serve as new, custom widgets. They can also be used to “decorate” elements with behavior and manipulate DOM attributes in interesting ways. Are there any alternatives for AngularJS? The one of the known alternative for the AngularJS is the Backbone.js. The most prominent feature that separates the two libraries is in the way models and views are synchronized. Whereas AngularJS supports two-way data-binding, Backbone.js relies heavily on boilerplate code to harmonize its models and views. Backbone.js communicates well with RESTful backend. A very simple use of REST APIs is also available with AngularJS using the $resource service. AngularJS also provide a $http service which is more flexible, connecting to remote servers either through a browser’s XMLHttpRequest object or via JSONP. AngularJS templating uses a combination of customizable HTML tags and expressions. Backbone.js uses different templating engines such as Underscore.js. What do you think would be great to see in AngularJS framework? would be nice to have some controls libraries like in MVC (data pickers etc); hopefully they will be created in the future as soon as AngularJS will be more and more popular to have more developers on it. Why wouldn’t we rewrite all our web sites on AngularJS? If you have a large working ASP.NET or MVC application, which implies the large back-end operations, it is better stick in there; on the other hand, if the complex applications require the fast client-side operations, they might be partially ported to the AngularJS world. He also independently and successfully carries on negotiations with NorthAmerica clients, suggests the innovative solutions for new projects, provides the well thought-out ways of implementation and live support. At the same time being the member of IEEE, Dr Mamirov completed the PhD education in Logistic and Telematic world and participated in different scientific and research projects and conferences.
0.972214
fifteen years old, is walking ruminatively in the garden of her substantial country home on the edge of London. Her mother is dead, her father is 'something in the City', whence he travels each day by train, and her chief companion is her governess, a pleasant enough lady but 'of few original ideas, no fancies, a reserved manner, and a well regulated mind'. “It's me” said the girl, naturally ungrammatical at such a moment. Clarice's longed-for adventure, as she smuggles Olga into her bedroom and becomes complicit in her plan to go to Scotland. It seems that her parents live in India, where her father is a colonel in a Highland regiment and, rather than stay with her grandmother, who lives in a castle in Scotland, she had been sent to a boarding school in Yorkshire. It was not quite Dotheboys Hall for girls, but she hated it and had run away, although, being a scatterbrain, she had got on the wrong train and had ended up hiding in the garden of Clarice's suburban home down south. does not fully summarize thirteen-year old Olga's intrepid but thoughtless determination to do things her way and this story of her secret stay in the Clavering household amounts to a succession of crazy escapades that put at risk Clarice's comradely efforts to hide her. At the same time, Clarice's trust in Olga's tale is compromised when she learns that an agony column in The Times is advertising a servant-girl's theft from a school in Yorkshire of money and jewels which may correspond to similar possessions in a bag that Olga is carrying. How can Clarice remain loyal to the girl for whom she has conceived a great affection while avoiding telling lies or denouncing her as a thief? its pacing, its convincing household scenes, the credibility and differentiation of its charactes are such that one may also wonder why it fell from grace. Indeed, it may well still be entirely forgotten had it not been for the intervention of that great artist, Gwen Raverat, who had loved the book as a child and who was responsible for persuading Macmillan to bring out a new (very slightly altered) edition in 1936. This she illustrated herself with a plethora of superb wood engravings which place the book in the top rank of illustrated stories for children. Macmillan relinquished rights to it in 1953 when Duckworth were able to issue a new edition and Persephone brought it into the twenty-first century in 2002. It still remains too little known.
0.999999
There was a public bus transport in one town. All buses had circular lines. Each line had at least two stops. Some lines had some stops in common. When two or more bus drivers met on some stop they announced each other all news they knew, so that after leaving the stop they all knew the same news. All drivers started driving their buses at the same time and at this time each driver knew some news that was not known to any other driver. Each bus ran all the time along a fixed bus line. Different buses running along the same bus line started possibly on different stops of the bus line at the beginning. The operation of buses was highly synchronized. The time necessary to get from one stop to next stop was equal for all stops and all lines. There were n lines ( 0 < n < 20), d drivers (and also d buses) ( 0 < d < 30) numbered by integers from 1 to d, and s bus stops ( 0 < s < 50) numbered by integers from 1 to s. The drivers' gossiping club would like to know whether each driver, in some time, would learn all news from his colleagues. Write a program that will answer this question. The input consists of blocks of lines. Each block except the last describes one town. In the first line of the block there are integers n, d and s described above separated by one space. The next 2n lines contain descriptions of n bus lines (2 lines for each bus line) as follows: In the first line there are stop numbers on the corresponding bus line separated by one space. The stops are listed in the order the bus passes them. After passing the last stop listed on the line the bus goes again to the first stop listed on the line. The second line describes on which stops the individual buses operating on the bus line started at the beginning. The description consists of pairs si, di, where si is a stop number on the bus line and di is the number of driver driving the bus. All numbers si, di on the line are separated by one space. The last block consists of just one line containing 0 0 0, i.e. three zeros separated by one space. The output contains the lines corresponding to the blocks in the input. A line contains Yes if the corresponding block in the input file describes a situation where each driver will learn, in some time, all news from his colleagues. Otherwise it contains No. There is no line in the output corresponding to the last ``null'' block of the input.
0.999954
In today post we will add the user input to our menu and based on the user input the app some function will run. As we said in the previous post ‘The Menu‘ we will use (9) to Exit from the application. To read the user input we will use ‘input(‘something’)’ statement and The Menu def will return the choice back so our if statement will take us to another function, or EXIT if choice = 9, so let’s start. choice = the_menu() # Here we are calling the menu and putting the return in the choice. Your code should be something like what we have in the image.
0.93264
Poker is widely considered to be the most America of casino card games, but did you know that it has a history inspired by a number of great civilizations going back more than a millennium? Some believe poker's beginnings were a Persian game called "As Nas" which was played in the 16th century, while others say it dates back to the Song Dynasty in 10th century China. Modern-day poker is closely linked to "Poque", which - you guessed it - comes from 17th century France, the source for most of today's casino games. Like craps, roulette and other Vegas favorites, Poque was brought to the New Orleans by French settlers and spread up the Mississippi River with the famous riverboats during the 18th century. In the Wild West of America, it developed into something resembling the modern versions of the game. Poker's first boom came during the American Civil War from 1861-65. It was during this time that many of the additions that still stand today were made, such as draw poker, stud poker (five-card poker) and the straight. Innovations continued throughout the late 19th and early 20th century, with introduction of a wild card, lowball and split-pot poker and community card poker. Texas Hold'em only rose to prominence in the 1970s, but has since become the dominant version of poker. As its name suggests, the game was invented in the southern Texan town of Robstown in the early 20th century, and was only introduced to Las Vegas in 1967. For the first few years, casinogoers could only play Texas Hold'em at one Vegas establishment, a seedy little casino called The Golden Nugget. In 1969, a Texas Hold'em tournament was held in the The Dune Casino lobby. As this hotel was located right on The Strip, it attracted high rollers for the first time. The big break for Texas Hold'em came in 1970 when gambling moguls Benny and Jack Binion bought the rights to the Gambling Fraternity Convention, changed its name to the World Series of Poker and brought it to Binion's Horseshoe. In 1971, the second year of the WSOP, they made the main event a game of no-limit Texas Hold'em. The rest, as they say, is history. WSOP attracted only a few entrants in its early years, but as it grew in popularity Texas Hold'em quickly outgrew other poker variants in popularity. Names like Doyle Brunson and Amarillo Slim became known in households around the USA, as their victories captured the public's imagination and their books helped laymen learn basic poker strategy. The game continued to grow through the 80s and 90s, featuring in movies, documentaries and friendly poker nights around the world. The second big break for poker came with the rise of the Internet. Amateurs were playing online poker as early as the mid-90s. However, the big boom came when Chris Moneymaker won the $2.5 million World Series of Poker Main Event in 2003 - becoming the first player to do so after qualifying at an online poker site. His win shows tens of millions of aspiring poker players around the world that you don't need a massive bankroll to become a poker star. As you would expect for a game that has so many variations and has been influenced by multiple cultures, poker is rich in unique terminology. The terms below are a basic part of Texas Hold'em, but many can be used in other poker games. Ante: A minimum amount that each player must put into the pot before a new game begins. This is sometimes used in Texas Hold'em. Bad Beat: Losing a hand that you would have been strong favorite to win. For example, losing a hand in which you hold pocket Aces and the other player holds pocket 3s, but they win by hitting another 3 on the river. Blinds: Forced bets depending on your position to the dealer. The person to the left of the dealer puts down a small blind, while the person two to the left puts down the big blind. Bluff: Betting on a weak hand in order to encourage players with potentially stronger hands to fold. A good poker player is often defined by how well they can bluff their way out of a weak hand. Buy-in: The chips which players purchase in order to participate in a poker game. Chips: Gaming tokens, effectively poker currency. Community Cards: The cards that are dealt face-up to be used by all players. In Texas Hold'em, there are five community cards. Flop: The first round, in which three community cards are dealt face-up on the table. Flush Draw: A hand in which you have four of the five cards you need for a flush, needing only one more card of that suit to complete the flush. Hole Cards: Your own two cards, which should only be seen by you and not by the other players. Pair: Two cards of the same value, such as two 4s or two Kings. Pot: All the money that has been bet on a hand. Rake: The House commission from every pot. As poker is a game in which players compete against each other, the House earns its take from the rake. River: The fifth and final community card to be dealt. Round of Betting: Players have four options each betting round: check, call, raise or fold. Royal Flush: Ace high straight in which all cards of the same suit - Ace, King, Queen, Jack and Ten of hearts, diamonds, clubs or spades. This hand cannot be beaten. Straight: Five consecutive cards of any suit, such as Jack, 10, 9, 8 and 7. Trips: Three-of-a-king, e.g. three Jacks or three 4s. Turn: The dealing of the fourth community card. The dealer begins by shuffling a standard 52-card deck. At casinos, the dealer is a non-playing casino employee, but in friendly games the dealer can be one of the players. In either case, a "dealer button" moves clockwise from player to player after each hand, in order to keep track of who posts blinds. A round of betting is held, beginning with the player to the left of the big blind and continuing in that direction. Each player has four choices: check (means adding no further money if the player's bet already matches the maximum bet), call (add more to the pot to match the maximum bet on the table), raise (bet more than the maximum bet) or fold (quit this hand, forfeiting any money they may have already bet). Next is the flop: the dealer "burns" the top card on the deck in case anyone accidentally saw it, and then flips three "community cards" on the table. Another round of betting takes place, involving all players who are still in the hand and beginning with the player to the left of the dealer button. Once again, players have four options: check, call, raise or fold. This continues with the turn and the river: After the turn (fourth community card), players engage in another round of betting. After the river (fifth and final community card), the players engage in the final round of betting. If two or more players are still in the game after the turn, the dealer turns over the five community cards and the winner is determined. Players can use any combination of seven cards (their two hole cards and five community cards) to form the best possible five-card hand. The player with the best hand wins, taking all the money in the pot. Straight Flush: Hand containing five consecutive cards of same suit. Four of a kind: Hand containing four cards of same rank (such as four queens or four 9s) and one other card. Full House: Hand containing three cards of one rank and two of another rank. Flush: Hand containing five unmatched cards of the same suit. Straight: Five cards of sequential rank but with at least one that is not of the same suit. Three of a kind: Hand in which three cards have same rank and two do not. Two pair: Hand in which there are two pairs of cards with same rank and one other card. Pair: Hand in which two of the cards have same rank as each other. High Card: If nobody has any of the above cards, the game is won by the player with the highest single card (beginning with Ace). Poker is a game of skill - your cards will be dealt randomly, but the eventual result depends on your strategy. Intuition is an important part of the strategy; your chances of success will increase if you are able to read your opponents' faces and determine whether they are bluffing, while managing to bluff without having your opponents read your own face. These qualities come naturally to some people, while for others they are acquired through years of solid poker practice. For novices, the most important thing to do is to understand basic strategy, and that's what we want to talk to you about today. Bluffing, reading faces, counting cards are all intermediate and advanced skills, but there's no use knowing how to do these things if you don't get even basic strategy, right? The first thing you will need to do in any game of Texas Hold'em is to assess whether your hole cards are any good. As a general rule, if you receive two non-pair cards that are both valued at less than 10, your chances of winning the hand are not great. Conservative players tend to fold if even one of their cards is valued at less than 10; more aggressive players might stay in with less. And the most ambitious players could potentially stay in with a disastrous hand (such as a 3 and a 5 of different suits) and try to bluff their way out of it. If your cards are no good but your big blind is inexpensive, it may be worth staying in the hand to see what happens. But don't start calling if it requires putting more money into the pot than you can afford to lose. Sometimes it is better to sit tight, be patient, absorb those early losses and wait for a good hand. The cards are random and the laws of probability say that you will sometimes receive a good hand and sometimes receive a bad hand - it's what you do with those hands that counts. The first rule of poker is: Don't play every hand. The second rule of poker is: Don't play every hand. Our human instincts encourage us to participate rather than to view, but it is worth ignoring those instincts. Each hand is a new game with a new set of cards, so make sure to only play those hands in which you have a chance. Further to rule number one, it is worth sitting out hands purely because it allows you to concentrate on what other players are doing. Whether you are playing in a real casino or at an online poker room, you can learn a lot from observing the players around you. Don't stay in a hand just because you're already in it. One of the most common mistakes by novice poker players is to keep calling their opponent's bet because they have already spent so much money getting to that stage. Would you keep putting money into a stock that is diving, just because you already invested in it? No, clearly not. The same rule applies to poker. A better way to win back your money is to fold this hand and win the next hand. Don't get emotional. Every poker pro will tell you that they never win they're angry. People who are upset or looking for revenge ultimately make irrational decisions. People who are cool, calm and collected are those who succeed in life and in poker. Pay attention to the community cards. Poker is about the other players, but it is also about the card. If you look closely at the cards on the table, you can figure out what potential five-card combinations other players can create. With that information, you can then figure out your chances of beating them.
0.688696
Waxman:"It's more than pilot error. There ought to be corporate responsibility" WASHINGTON (CNN) -- A 2004 crash that killed everyone on board -- three crew members and three U.S. troops -- was caused by pilots from a Blackwater plane taking a low-level run through a mountain canyon in Afghanistan, testimony revealed Tuesday. A twin-engine CASA C-212, similar to the plane pictured, crashed in 2004, killing all six on board. "I swear to God, they wouldn't pay me if they knew how much fun this was," the doomed plane's cockpit voice recorder captured the pilot saying shortly before the November 27, 2004, crash. The account of the crash emerged during a House Oversight and Government Reform Committee hearing on Blackwater's performance in Iraq and Afghanistan. In its November 2006 report on the crash, the National Transportation Safety Board concluded that Blackwater provided insufficient oversight and guidance of the pilots involved in the 2004 crash. Dispatchers failed to ensure that pilots followed their flight plan and did not adequately track flights in the air. The NTSB said the military "did not provide adequate oversight of the contract carrier's operations in Afghanistan." The company's chairman, Erik Prince, appeared before the committee to defend the firm Tuesday. The twin-engine CASA C-212, a light cargo plane operated by Blackwater sister company Presidential Airways, crashed in a box canyon well off its planned route from Bagram Air Base to the western Afghan town of Shindand. "You're an X-wing fighter Star Wars man," an NTSB report quoted the plane's co-pilot, Loren Hammer, saying during the flight -- a reference to the dizzying battle in the 1977 film. "You're [expletive] right. This is fun," the pilot, Noel English, responded. When rescuers found the wreckage three days later, they discovered one of the passengers had survived the crash only to die of internal bleeding and exposure, the NTSB found. When an unidentified passenger asked about the plane's route before the crash, flight mechanic Melvin Rowe told him, "I don't know what we're gonna see. We don't normally go this route." English added, "All we want is to avoid seeing rock at 12 o'clock." English and Hammer had been in Afghanistan less than two weeks, the NTSB found. Federal investigators found each should have been paired with a more experienced aviator, according to Rep. Henry Waxman, D-California. Waxman is chairman of the oversight committee, which is investigating Blackwater's performance on more than $1 billion in U.S. government contracts since 2001. He said a company e-mail stated the company had overlooked experience requirements "in favor of getting the requisite number of personnel on board to start up the contract." "The corporation hired inexperienced pilots. They sent them on a route they didn't know about," Waxman said. "It seems to me that it's more than pilot error. There ought to be corporate responsibility, and Blackwater was the corporation involved." Prince said investigators concluded the crash in Afghanistan was not due to corporate error, but pilot error. He rejected Waxman's contention that the pilots "acted like cowboys." "We provided thousands and thousands of flight hours of arrival service since then," Prince said. "Today, still, we're flying more than a thousand missions a month." Passengers on the flight included Lt. Col. Michael McMahon, the commander of a Hawaii-based Army aviation battalion; and two members of his unit, Chief Warrant Officer Travis Grogan, and Spc. Harley Miller. In a letter read to the committee, McMahon's widow, Col. Jeannette McMahon, wrote the accident was the result of a "gross lack of judgment in managing this company." Her husband's unit had a great safety record, she wrote: "It's ironic and unfortunate that he had to be a passenger on this plane versus one of the people responsible for its safe operation." The families of the passengers have filed suit against Presidential Airways and its related firms. Blackwater's effort to dismiss the case is before a federal appeals court in Atlanta, plaintiff's lawyer Robert Spohrer said. The company has come under scrutiny over its work in Iraq, where government officials accuse its contractors of killing as many as 20 civilians in a September clash in Baghdad.
0.973688
What camera and lens did you use here? Great shot! I use a Nikon D90 and Nikon D7100 with NIKKOR 50mm f/1.8 and a Nikkor 24-120mm f/4 .
0.948021
Is the 767-200 considered a "Heavy" aircraft? "Heavy" is not a comparative term. It is a call sign addition (i.e., "United 1450 Heavy") used to alert ATC that an aircraft has a gross takeoff weight greater than 255,000 pounds in the USA and greater than 300,000 pounds in some other parts of the world. This is important because of greater ATC separation minimums for heavy aircraft than for lighter ones. Some of the aircraft capable of carrying the designation "Heavy" are the Boeing 707, 747, 757,767, 777; Airbus A310, A330, A340; the L-1011; DC-8, DC-10, and the MD11. Don, very interesting. Good info. I wasn't even close. I didn't think the 757 could be considered one. So it doesn't depend on the aircraft, it depends on the weight of the aircraft? I'm not an expert on which aircraft sometimes use the "heavy" designation and which do not. I took the list in my previous post from an FAA circular. Not all aircraft that can be "heavy" are for every flight. Depending on passenger, freight, and fuels loads, some may be "heavy" for one flight and not for another. I suspect the 757 may be one of these. Having spent a bit of time on the 757 I will add that the reason the 757 can use heavy is because of wake turbulence....masses of it! For this reason it can be classed as heavy not due to climb characteristcs etc but due to the WT it creates recommended spacing is as per heavy ac. There are some 757's that are over the 255k limit which makes them heavies anyway this is due to galley configs.
0.971252
James Aikens, born 1762 or 63, on the Pennsylvania-Maryland line, but lived in Mecklenburg county, North Carolina when he enlisted, October, 1778, served six months as a private in Captain Brownfield's Company, Colonel Lock's Regiment; six weeks under Captain Hugh Parks; six weeks under Captain Charles Polk; three months in 1782, under Captain Brownfield. Granted a pension September 5, 1832, while a resident of Coweta county, where he died April 12, 1843. Married in Green county, Georgia, Frances_____, March 16, 1791, who was granted a pension after his death in 1844, she being eighty years old.
0.999971
Boxer Ramen: A Portland, OR Restaurant. This place is all about creating a dish, executing it well, and selling it for a decent price in a good environment. It's the best place to get ramen in Alberta.
0.999579
I leave home at eight. She left her bag in [ on ] the train. She left her bag in the train.
0.908808
How can you keep old traditions alive? Every generation inevitably puts their own stamp on family traditions. In one sense, this may seem to defy the point of a tradition -- as a set of rituals or customs that remains unchanged throughout time. However, modern traditions are generally family-specific. Even within a culture that celebrates similar traditions, each family tends to put a unique spin on them with their own particular rituals [source: Coady]. And, it follows that as families change, so do the traditions. Perhaps traditions, like pie crusts, are meant to be broken. That's not to say that keeping traditions doesn't serve very important purposes. The need for ritual seems to be ingrained in our human nature. Anyone who has spent much time with children knows how important ritual is for them in particular. Kids appreciate a routine and are sometimes resistant to even the smallest changes. In studies, children with regular rituals and routine within family life tend to be healthier and better behaved [source: Fiese]. The ritual of regular family mealtimes is believed to be one of the most important traditions a family can institute [source: APA]. Most of all, traditions should strengthen family bonds. But when an old tradition no longer does that, it might be wise to update it for new times and new needs. A marriage is one of the most common reasons for updating old traditions. After all, the two people bring with them different traditions from their own families, and they have to find a way to merge them together to form new traditions once they start their own family. Traditions are perhaps most important when it comes to divorce, death and other events that cause significant changes in families. Evidence suggests that keeping up traditions can help the family through traumatic events [source: Jackson]. However, such events will also usually necessitate updating or changing the tradition in some way or another. How do we update traditions without violating their original spirit and purpose? Small adjustments might be all that's necessary.
0.999921
While definitions can vary, the American Psychological Association describes hypnosis as a cooperative interaction in which the participant responds to the suggestions of the hypnotist. The reason why people seek out hypnosis is for many reasons but, it can be boiled down to some form of emotional dependency. Hypnosis has become well-known thanks to popular acts where people are prompted to perform unusual or ridiculous actions, but, it has also been clinically proven to provide medical and therapeutic benefits, most notably in the reduction of pain and anxiety and in working through relationship issues. Working through relationship issues with hypnotherapy starts with understanding why we are emotionally dependent and why we are experiencing anxiety. Emotional dependency hypnosis helps gentle change and transform negative stories into positive ones. It’s why I’m known as a hypnotist for anxiety. The state of hypnosis is a natural mental state. For example: When engaged in imaginary play children are often in a state of self-hypnosis; when bored in a classroom students sometimes use self-hypnosis to imagine themselves engaged in an activity elsewhere; and mental rehearsal of a performance is often done in a state of self-hypnosis. There are many popular misconceptions regarding hypnosis: [4,5] Hypnotherapy does not involve one person controlling another’s mind, inducing sleep, inducing forced amnesia, or causing individuals to do things against their will. The stage hypnotist, who appears to be controlling his subjects, first enlists their cooperation by asking for volunteers, and then picks subjects who can use hypnosis easily. Thus, a stage hypnotist uses his subjects’ hypnotic capacity for entertainment, and not for therapeutic benefit. If you are interested in being hypnotized, take this test. It is important to remember to approach the experience with an open mind. Research has suggested that individuals who view hypnosis in a positive light tend to respond better.
0.999943
I have finished writing the ''Transmission of the Kalachakra Dharma'' and the ''Great Empowerment of Kalachakra.'' Next I should write about the ''Kalachakra Yoga Sadhana.'' One must receive the empowerment in order to cultivate this dharma. I received the transmission of this empowerment personally from Guru Sakya Zheng-kong. I also received the empowerment and blessings from Guru Thubten Dargye. That year Guru Sakya Zheng-kong noticed that I merged ''emptiness'' with ''awareness'' while cultivating ''Kalachakra Dharma.'' The Master told me ''This practice of yours is absolutely perfect. Only the most advanced practitioner would be able to practice in this way. I am delighted at your profound realization of this dharma. I know that only a good cultivator is able to reach this advanced level of enlightenment. I am proud of being your teacher of this practice. In the future, you will definitely have the ability to turn the great dharma wheel of Kalachakra. In regard to Guru Thubten Dargye, he knew that in the future I would transmit the ''Simhamukha Dharma'' and ''Kalachakra Dharma,'' so he immediately and personally mailed to me these two deities' images which had been previously blessed by him. At the same time, through the void, he bestowed on me the blessing empowerment to protect and support me in spreading this dharma. One can see that ''Kalachakra Dharma'' is the highest, the supreme, and the most wonderful dharma in the Vajrayana. Generate bodhicitta and recite, ''I pray to the uncommon Kalachakra. Via the supreme bliss of the ten directions and three times and the dance of emptiness, please manifest the undertakings of loving kindness, compassion, joy, and equanimity, so that sentient beings will embrace and follow him, and thereafter be reborn in the Shambhala Buddha Land. First visualize emptiness. From the void the seed syllable ''Hum'' appears atop the time wheel. The seed syllable transforms into the five elements of ''Earth, Water, Fire, Wind, and Emptiness'' with Mount Sumeru in the center. On the peak of Mount Sumeru a large lotus appears with a sun-moon disc in the center. Above the disc, Kalachakra emerges embracing his Buddha Mother. Visualize Kalachakra and his Buddha Mother unified in a standing position. Kalachakra tramples Mahesvara and Mahasvara's consort with both feet. Kalachakra has four faces. His center face is blue in color; right face, red; back face, yellow; and left face, white. He holds a dharma instrument in each of his 24 hands. Kalachakra's Buddha Mother is naked. The Buddha Father and Buddha Mother each have three eyes. Visualize that the topknot of the Buddha Father is adorned with a vajra scepter. He wears a tiger skirt embellished with pearls and jewels, which dignifies Kalachakra. Visualize ''Om'' in Kalachakra's brow chakra, ''Ah'' in Kalachakra's throat chakra, and ''Hum'' in Kalachakra's heart chakra. One then visualizes the ''10 Syllable Mantra'' emerging from Kalachakra's heart chakra and forming a mantra wheel. Entering of the Deity into Oneself, Release of Oneself into the Cosmic Consciousness and Entering Kalachakra's Samadhi. Tender the Great Homage with Visualization. Exit the shrine. May all endeavors be auspicious.
0.910714
Urinary Bladder - want to learn more about it? The urinary bladder is an organ that serves to collect urine to be voided through urination after the urine is filtered through the kidneys (where the necessary ions are reabsorbed if physiologically needed through feedback mechanisms found throughout the body and in the nephrons of the kidneys, such as the macula densa). Histologically, the urinary bladder is lined with transitional epithelium and does not produce mucus. Generally, the bladder is a hollow, muscular, and pear-shaped distensible elastic organ that sits on the pelvic floor. It receives urine via the ureters, which are thick tubes running from each kidney down to the superior part of the bladder. Urine is collected in the body of the bladder, and finally it is voided through the urethra. The fundus is the base of the bladder, which is formed by the posterior wall and contains the trigone of the bladder, and is lymphatically drained by the external iliac lymph nodes. The trigone is the structure that contains the outlet (urethra) of the bladder. While the general volume of the human bladder will vary from person to person, the range of urine that can be held in the bladder is roughly 400 mL (~13.5 oz) to 1000 mL (~34 oz), with the average capacity being 400 to 600 mL. One mnemonic often heard in clinical settings related to the bladder is: “water (ureters) under the bridge.” This phrase describes an anatomical relationship, between the ureters and the uterine arteries (female) or the vas deferens (males). During a hysterectomy, where the uterus and uterine artery are removed, the ureter is in danger of being accidentally damaged. With this mnemonic you remember the relationship of these structures. Or to give another mental image, the ureters are posterior to the ovarian/testicular artery. The muscles in the bladder that allow for conscious control of when you are or are not in a suitable situation to urinate are especially meaningful in civilized societies. There are 2 important pathways involving your bladder: 1) the sensation that lets you know your urinary bladder is full and needs to be voided, and 2) the motor control of your bladder to allow you to urinate at will. First, as the bladder walls are stretched when it is full or getting closer to maximum capacity, there are signals that are transmitted through the parasympathetic nervous system to contract the detrusor muscle. The detrusor muscle is a layer of the bladder wall made of smooth muscle fibers that are arranged in spiral, longitudinal, and circular bundles. This signal will encourage the bladder to expel urine through the urethra. Sensations from the bladder are transmitted to the central nervous system (CNS) via general visceral afferent fibers (GVA). Whereas GVA fibers on the superior surface of the bladder follow the course of the sympathetic effect nerves back to the CNS, GVA fibers on the inferior portion follow along with the parasympathetic efferent fibers. Surprisingly (or maybe not), a meta-analysis conducted on the effects of different voiding positions in male urodynamics reports that sitting down allows for improved contraction of the detrusor muscle. To control the act of urination voluntarily, motor control is achieved through innervation by both sympathetic fibers, most of which arise from the hypogastric plexuses and nerves, and parasympathetic fibers, which come from the pelvic splanchnic nerves and the inferior hypogastric plexus. Finally, there are two important sphincters the urine must pass through in order to leave the body: both the autonomically controlled internal sphincter and the voluntarily controlled external sphincter must be opened. Problems with the muscles of the urinary bladder or sphincters can lead to incontinence (involuntary urination). In babies, the nervous system has not yet developed further, so a baby's bladder fills to a set point, then automatically contracts and empties. As the child matures, so does the nervous system, which means the brain can now receive messages from the filling bladder and prevent it from automatically emptying until convenient. Failures in this control mechanism results in incontinence, but there are many different ways that lead to mechanism failure (e.g. neurologic injury, congenital defects, strokes, multiple sclerosis, and aging). Oftentimes, what is found in urine can be helpful in diagnosis or evaluation of a patient’s state of health. For example, excessive protein (proteinuria) found in the urine can mean more serious underlying problems in the body such as intrinsic renal failure (nephrotic syndromes), diabetic nephropathy, or infections. Accumulation of too much cholesterol or protein in the urine can also lead to kidney stones. Sometimes, urinary incontinence or inadequate voiding of urine can lead to a urinary tract infection. Another common issue is frequent urination. This can be due to excessive urine production, small bladder capacity, irritability, incomplete emptying, or simply consumption of too many liquids either consciously or due to a disease state (e.g. diabetes insipidus). In addition, males with an enlarged prostate urinate more frequently since the prostate is found posterior to the bladder and enlarges in elderly men, therefore pressing against the bladder and increasing bladder sensations. The definition of an overactive bladder is when a person urinates more than eight times per day. If blood is found in the urine (known as hematuria) that is not from an external cut or apparent source, it is an indication to seek medical attention without delay, as it could be a symptom of bladder cancer or bladder/kidney stones.
0.997293
Why would "Sono pronto" be the only correct answer? Aren't the others at least possible sentences grammatically? There's always "sono pronta", if I'm a woman. Again confusion arises from Duolingo's practice of attaching a comment to a sentence, etc., when it reappears in another context. What I commented on was this same sentence in a multiple choice format, where one or more of several translations could have been correct. However, my comment now follows the sentence wherever it goes. I think it is a flaw in the program that should be corrected. There is an early quiz: "Sono pronta" which Duolingo translates as "I am ready". So why does this use: "Io sono pronto" use "pronto" instead of the aforementioned "pronta" with an "A"?? Pronto is a man speaking about himself, pronta is a woman. If you're translating from English, either should be correct. "Sono a posto" is also a possible answer.
0.961642
From Wikipedia, the free encyclopedia. Malcolm X ( May 19, 1925 – February 21, 1965), born Malcolm Little and also known as El-Hajj Malik El-Shabazz was an African-American Muslim minister, public speaker, and human rights activist.To his admirers, he was a courageous advocate for the rights of African Americans, a man who indicted white America in the harshest terms for its crimes against black Americans. His detractors accused him of preaching racism, black supremacy, antisemitism, and violence. He has been called one of the greatest and most influential African Americans in history, and in 1998, Time named The Autobiography of Malcolm X one of the ten most influential nonfiction books of the 20th century. Malcolm X was born in Omaha, Nebraska. The events of his childhood, including his father's lessons concerning black pride and self-reliance, and his own experiences concerning race played a significant role in Malcolm X's adult life. By the time he was thirteen, his father had died and his mother had been committed to a mental hospital. After living in a series of foster homes, Malcolm X became involved in a number of criminal activities in Boston and New York City. In 1946, Malcolm X was sentenced to eight to ten years in prison. While in prison, Malcolm X became a member of the Nation of Islam, and after his parole in 1952 he became one of the Nation's leaders and chief spokesmen. For nearly a dozen years he was the public face of the controversial group. Tension between Malcolm X and Elijah Muhammad, head of the Nation of Islam, led to Malcolm X's quitting the organization in March 1964. He subsequently traveled extensively throughout Africa and the Middle East and founded Muslim Mosque, Inc., a religious organization, and the secular Organization of Afro-American Unity, which advocated Pan-Africanism. Less than a year after he left the Nation of Islam, Malcolm X was assassinated by three members of the group while giving a speech in New York. The beliefs expressed by Malcolm X changed during his lifetime. As a spokesman for the Nation of Islam he taught black supremacy and deified the leaders of the organization. He also advocated the separation of black and white Americans, which put him at odds with the civil rights movement, which was working towards integration. After he left the Nation of Islam in 1964, Malcolm X became a Sunni Muslim, made the pilgrimage to Mecca and disavowed racism, while remaining a champion of black self-determination, self defense, and human rights. He expressed a willingness to work with civil rights leaders and described his previous position with the Nation of Islam as that of a "zombie". Description above from the Wikipedia article Malcolm X, licensed under CC-BY-SA, full list of contributors on Wikipedia.
0.999982
How could a credit card help me? Credit cards are a form of lending. The card limit that you get given when your application is successful is classed as ‘borrowing’. If you spend on your credit card, try to make sure that you pay off any debt in full as soon as you receive your bill as this helps make your credit file stronger and also minimises any interest you may pay. It will show you can borrow money, pay it back in time and stay within set limits.
0.999944
When it comes to choosing new warehouse management software, you may be wondering where to begin. The way you approach this decision will determine whether or not you make a good investment. Here are five key steps for choosing warehouse management software for the best results. Evaluate: Whether you already have a WMS installed or not, you need to be clear about what your system is currently missing. You began looking for warehouse management software to solve problems and improve your processes. Take some time to evaluate your existing system and understand where you need to make improvements. Brainstorm: Once you have a good idea of where your system is lacking, brainstorm solutions with your team. Gathering intel from the people on the floor is a great way to learn about what systems and solutions would help your employees most. You can also hold discussion panels with your management team to determine what reports and information they need to be more effective in their positions. Consult: There are plenty of software vendors out there willing to sell you warehouse management software. There are fewer people who can really dig in and help you evaluate your needs. During this stage, you can consult with several vendors in your area, learn more about the specific pros and cons of their systems, and ask questions. You should definitely be taking notes during this stage so that you can compare your options later on and understand how each one stacks up. This is also your opportunity to gather ideas from professionals about solutions you may not have thought of on your own. Analyze: Now that you have talked to a handful of vendors, it is time to analyze their proposals in depth. Some software companies offer the ability to develop the warehouse management software to specifically fit the needs of your organization. Others sell simple, out-of-the-box solutions. You need to think about not just the cost of each option, but also the ability to get the solutions you really need. Take the time now to narrow down your list and contact your vendors with any additional questions you have before you make your decision. Commit: Once you fully understand which option will best suit your needs, it is time to commit. It is important to keep in mind that committing to new warehouse management software is bigger than just installing the program. Once you have committed to making the change, you also need to start working on buy-in from your team for the chosen software. Start educating them on the changes that will be headed their way and prepare them for making the transition as smoothly as possible. Once you have decided you need new warehouse management software, it is easy to get drawn in by the wide range of modern possibilities for your warehouse. In order to make the best possible choice, it is important to take into account not just what you want for your warehouse but also what your employees wish to see to make their jobs easier. The more you include them in the process, the more informed your decision will be, and the more support you will have going into the transition. Consulting with professionals along the way opens up more options and ensures that you have explored all available avenues.
0.979946
Create a prioritized list of user tasks and features. theUXProdigy offers a workshop where the essential UX activities before any redesign effort will be presented and discussed through team work, collaborative exercises and brainstorming techniques. How to assess any design problems before starting the redesign efforts. How to conduct a UX competitive analysis. How to define users’ needs & tasks. How to identify & prioritize the features that accomplish the user goals and needs. How to choose from a list of KPIs.
0.999942
Context. Rosetta is the cornerstone mission of ESA devoted to the study of minor bodies of the Solar System. During its journey to the comet 67P Churyumov-Gerasimenko, the main target, Rosetta also investigates two main belt asteroids, 2867 Steins (fly-by in September 2008) and 21 Lutetia (fly-by in July 2010). Aims. In Spring 2008, we performed a broad observational campaign in order to complete the ground-based photometric and spectroscopic investigation of Steins. Before the Rosetta fly-by, this was the last opportunity to perform ground-based observations useful for calibrating properly the imaging and spectroscopic data obtained by the instruments on board the Rosetta spacecraft. Methods. Visible photometry was carried out at a wide range of phase angles, and visible spectra were acquired at different rotational phases to retrieve information about the absolute magnitude and surface properties. Results. The lightcurve was completely sampled in V and R bands. A rotational period of h and color index mag were computed. We investigate Steins' phase relation over the range between 3.3 and 42 degrees in solar phase angle. The opposition effect is not evident down to the phase angle of 3 degrees, as is typical of other E-type asteroids. Assuming for Steins an opposition surge similar to that of other E-type asteroids, we calculated an absolute magnitude , and slope parameter . Eight visible spectra, obtained at different rotational phases, exhibit similar behavior, confirming a homogeneous composition of the asteroid surface and the E[II] classification. All spectra display a spectral feature centered on about 0.49 μm that is typical of E-type asteroids and usually attributed to the presence of sulfides (e.g. oldhamite). A tentative model of the surface composition is presented. Based on observations carried out at the Telescopio Nazionale Galileo, La Palma, Spain (AOT17/08A Programme TAC_28).
0.95101
Why do Western governments seem to do everything that they can to encourage more Islamic terrorism? None of the terrorist attacks are real: the events are put on by paid actors putting on a slick show for TV producers, much like the moon landing or Harambe’s death. Many of those bullet points are accurate to varying degrees. But the overwhelming sense within the government is that the state is doing everything that it can to suppress and discourage terrorism within the moral limits set on the behavior of legitimate states that were widely agreed upon (but not always adhered to) after the end of World War II. States are also obligated by treaty and domestic law to treat all citizens equally regardless of race, natural origin, sexuality, and whether or not they identify as a half-dragon of indeterminate gender. That makes actual reform tricky because it would involve violating countless international agreements and public commitments to inclusivity. Violating those international agreements often has negative consequences both politically and economically. The main thing that democratic states attempt to provide their citizens is a sense of safety. There’s broad agreement across the political spectrum that everyone — even criminals apart from the most heinous and violent, and even then — deserve safety and essential respect. Terrorism and committed terrorists then pose a dilemma to the way that the system is supposed to work. When the individuals in the system don’t behave like the utililitarian minimaxers that the political models say that they should behave like, it throws the entire bureaucratic system into confusion. Further, because toleration of speech — even speech intended to provoke the worst sorts of violence against the most valuable classes of human tax cattle — is seen as sacrosanct, it’s difficult for the Western governments to take a hard line on suppressing the free flow of information that’s useful to provoke more spectacular attacks against civilians. Terrorism is fundamentally good for the business of the Western states, which is to extract value from the productive citizens and to provide a sense of safety and security for everyone in equal measure. Terrorist attacks kill an expendable part of the population in a flashy and even entertaining way. It gives even people unaccustomed to a sense of victimhood the chance to participate in candlelight vigils, to get outside for a good cry, and to buy memorial floral arrangements. This is good for public morale, because the modern value system places the victim above everyone else. The funny Justin Trudeau quote “If you kill your enemies, they win” has substantial truth value to it when viewed from the progressive point of view. By celebrating victims instead of warriors — which has been widely portrayed as a moral advance from the real barbarism of World War II — we welcome this as a sign of our moral progress. ‘Winning’ in the sense of post-1945 humanist morality is not the same as that of a military victory in which the other side is vanquished and needs to surrender territory. ‘Winning’ is seen in the spiritual sense of being the most put-upon victim, the weakest and most helpless one, in need of protection. In this way of seeing things, the more bombings that happen, the greater the moral elevation of both the martyrs and the population which mourns those martyrs. The worst thing in this view would be to accomplish a lasting victory over the state sponsors of terrorism; which is of course difficult because the primary state sponsors of terrorism are the Western nations that funnel so much money, arms, and training to allies like Saudi Arabia, Egypt, and Pakistan. It’s no longer even a conspiracy theory to point out that Saudi Arabian high officials were directly connected to the 9/11/2001 attacks in New York City: it’s common knowledge reported from declassified papers in even that newspaper that everyone gets at the doorstop of their room at the Holiday Inn. Terrorism creates endless opportunities for the state to create counter-terror make-work. By importing aggressive foreigners from a religion with a millennia-long record of successful conquest through well-understood means, new jobs are created. There are new jobs for social workers, interpreters, spies (both domestic and foreign), arms manufacturers, spy software developers, translators, security people, the rest of the military-industrial complex, and more. Police can be provided with ample overtime pay to ‘keep the country safe’ even if their primary job is just to clean up the viscera after a particularly messy concert or nightclub event. When these workers are too effective at their jobs, their workloads can just be increased by importing more of the problem population. When the domestic people get tired of the foreign war TV shows, they can change the scene of the programming to something which is better localized for Western tastes. They cancelled the Iraq war TV show because the victims just weren’t all that interesting or identifiable. This changes when it’s someone who could be your neighbor. Suddenly, the show becomes relevant, emotionally engaging, and interesting. It becomes a great source of inventory for ads selling hemorrhoid cream, life insurance, and estate planning legal services. Even better, a combination of trade agreements and environmental policy can ensure that the sources of terrorist funding in Riyadh, Mecca, Raqqa, and Islamabad can continue to support the entire cycle. This creates something like the famous Keynsian multiplier effect; rarely seen in other situations but real enough in this case. Immigrants to Western countries who live the dream are even better contributors to this because they make for deeper pocketed donors and can help fighters to integrate into Western countries long enough to pull off attacks that make for good TV. Every dollar sent to the Arabs in return for their primary export instead of invested in, say, breeder reactors (radiation is bad; we prefer clean power that doesn’t actually work), goes towards creating even greater levels of spending maintaining the territorial security of our Middle Eastern allies. This virtuous cycle of martyrdom is full of satisfaction for everyone involved except for all those mangled, dismembered, mutilated, tortured, and scarred civilians. Terrorists are excellent job creators, but what the Western lands need are job destroyers: the people who are willing to sacrifice in order to destroy (in the sense that Troy was destroyed) the countries that are causing the problem. This is not something that the post-war West is going to do, in large part because they no longer believe in anything other than the sublime virtue of suffering repeated defeats. The answer to terrorist attacks is not to double down on weeping. Nor is it to go on another adventure to teach Afghan girls how to do math. It is to engage in what would probably be a nuclear exchange between the primary sponsors of terrorism. Wow, what an irresponsible suggestion! How could you say such a thing? Millions of dead people! Nuclear winter! Genocide! It is irresponsible because no one will really listen to this advice and I’m not even a dog catcher, much less someone with national political influence or authority. I float the idea free of anything resembling public responsibility. However, it is the only answer that doesn’t delve into either fantasy or just escalating the problem. We live in a world in which the power of nuclear weapons defines relations between states. The primary way that Islamic states with nuclear weapons (which includes Saudi Arabia and Pakistan) advance their interests is through covert action against their strategic ‘frenemies,’ which is everyone that’s not Islamic. That is the easy, Cliff Notes way of understanding the basic stance of Muslim states versus non-Muslim ones. This creates some profound challenges that no one in public life has really been willing to address because to do so involves making so many unpopular statements which fly against what has become common knowledge among the bureaucrat-people who have floated up to rule the world since 1945. Like, what do you do when your nuclear-armed rival keeps sending proxies to blow up your citizens? What do you do when they do it occasionally? How do you respond when they do it… once a week? How do you respond even when the evidence of the connection reaches the public view from sources that can’t be denied? Convert to our stupid religion and we’ll throw in a free subscription to HBO GO. The way that Western leaders have responded is by capitulating repeatedly, despite superiority in every conceivable field except that of faith. There is a reason why evolution appears to select for fanatically religious people under conditions of extreme competition and scarcity; why the religious wound up conquering the globe, and why even the purportedly anti-religious sects tend to resemble religions in their beliefs and behaviors. The muddled view of Westerners has been to decide to aggressively evangelize the world to adhere to the progressive faith. We see examples of these evangelism efforts with the 2014 #BringBackOurGirls hashtag human rights campaign. The intention was to somehow effect the liberation of 276 abducted Christian Nigerian girls through some combination of fundraising and good intentions. This fundraising did not go towards raising a company of mercenaries to kill their captors either to accomplish a hostage rescue or to dissuade similar slave raids. It instead went towards media creation, event hosting, and petition circulation. The ‘impact’ on the media was great enough to encourage countless celebrities and political figures to participate. However, it was not enough to inspire anyone to go to battle to kill the enemy and seize his lands; not even from private companies. If the campaign can be said to have been a success, it eventually resulted in a $195 million aid package to ‘support the victims’ of Boko Haram, the paramilitary group responsible for the abductions. This is itself an example of counter-terrorist pork. If anything, it encourages the recipient governments to encourage and abet more abductions, because it means an enormous payday in terms of both cash and valuable military equipment. Were it conditional on the success, the program would only release funds upon the successful defeat of the organization and the scourging of the tribes that supported it. Or there would be no stupid program at all, nor any pretense to care about the victims. Perhaps the more significant (and even darkly amusing) issue is that slave raids are now common enough in England that the government bothered to produce a report about it which claimed that the practice was pervasive throughout Northern Europe. It’s not so much that Westerners can’t be roused to action on behalf of foreigners in distant lands — they can’t even be roused to battle in defense of local girls. To even begin to attempt to rouse people against it is to provoke the wrath of the authorities. Certainly, westerners care much more about fictional slavers in costume drama movies than they care about actual slavers in their own countries. Moral outrage against fictional characters is easy, safe, and doesn’t involve having to kill anyone to rectify the injustice. Instead of recognizing that the world is made up of powers with irreconcilable interests and conflicting cultures, progressives (which includes the entire American political spectrum) prefer to believe that they already enjoy the sort of dominance that they have in their own territories worldwide. If foreigners don’t realize that they really want to be progressives deep-down, if we spend enough money on foreign aid, capitulate to shakedowns from foreign powers, and show an unwillingness to use nuclear weapons, they will eventually learn to become more progressive. One way to convert more people to the progressive cause, it’s thought, is to respond to provocations with greater and ever-more-insistent demands to be tolerant, even of groups that are not at all tolerant of the ordered liberty which distinguished the ‘West’ from the ‘Rest’ and lead to its runaway dominance after the Battle of Lepanto in 1571, the Battle of Vienna in 1683, and after the final destruction of the Ottoman Empire at the end of World War I through subversion. Until those turning points; in part made possible by the conquest of the hemisphere that I write this from, the leadership of the West was really not secure. These were each turning points in war that made the other advancements of Western civilization possible. Similar turning points in war could result in the loss of that leadership position. We only need to look at the sorry and disagreeable state that the rest of the world lives in to give us pause about what it means to give ground to your implacable and ancient enemies desperate for revenge. In the meantime, terrorists are reliable job creators. And the jobs that they create are top quality, even they break some eggs on the way to making a grand halal omelette. At the same time as the rhetoric condemning terrorism intensifies, the actions that make it easier for them to succeed intensifies. It also helps to understand that the majority of the educated classes in the West believe that their civilization deserves to be destroyed one way or the other — that it doesn’t deserve to survive, and that even contemplating asserting that it ought to live is seen as the worst sort of evil. Just had to say welcome back. Now I will go back and read the article. I check back almost every day looking for a morsel of pithy Dampier commentary and am happy to have found this larger-than-average nugget today. I hope you’re writing a book or something. I keep awaiting a document dump, à la Wiki Leaks on the DNC, and a rekindling of wholesale disparagement of the belief that America actually went to the Moon during the late 1960s and early 1970s. I was an officer in the service during 1969 and no where near a TV to actually experience Moon Day and all its hype. (The Vietnam war was afoot remember and some of us were distracted.) A few years later I had a conservation with an engineer who worked for GE Reentry Systems at Vandenberg AFB and who told me that he “knew” the Moon Landing was a hoax. I, of course, asked him if he had direct knowledge but he demurred saying that he didn’t but he defended his proposal with two forks: 1) He in 1974 lacked the computing power for onboard guidance to hit proposed targets at 8,000 miles with accuracy so there was no way that in 1969 there were miniaturized computers that could perform the computations to allow the navigation of the moon trip, especially of the Lunar Module’s trip off the moon to link back with the Apollo Command Module. 2) travel through the Van Allen radiation belts. He said that no one would repeat the faked trips for at least thirty years, if that, because he could not conceive of a way to shield a crew from the intense radiation of the Van Allen belts while they were traversed coming and going. It has been 40+ years and counting without a return. I don’t expect a return while I am still alive even though the computer miniaturization problem has been solved for decades. (Check the iPhone in one’s pocket.) As an aside, circa the time I had the conversation mentioned above, I witnessed two amazing launches at Vandenberg. The first was the simultaneous launch of two minuteman missiles from Vandenberg, and the second a demonstration of the launching of a first stage out of a launch plane (C-5), the rest of the missile was dummied but of similar weight. The missile with an actual active first stage was dropped and (I think) two parachutes stabilized the missile as it descended and then fired off and ascended into the clouds. Back with a bang. This is a fantastic piece. Liberals demanding more tolerance after a terrorist attack is not that surprising to me, its similar to the mentality I encountered with Liberal coworkers in the early 2000’s Iraq war, as the dead Military men piled up on the US side many of these people cheered it on saying it “serves them right” for fighting an unjust war. Liberals can say these things because they have no skin in the game. The terrorism we are seeing is not happening often enough and on a grander scale that would frighten people. Liberals still have this cognitive dissonance with the subject of terrorism and the perceived value of virtue signaling is still very lucrative, until these attacks happen weekly in Starbucks or some trendy location across the Country these attitudes won’t change. I have always been rather perplexed by this. Why, after a terrorist attack, do the leaders of unrelated countries feel the need to come out and ‘condemn’ the attack. Surely that would be the default position, and thus wouldn’t require a statement. Statements of condemnation usually come after one has been accused of supporting something. It’s getting a little tired hearing the people who have enabled these atrocities comes out to ‘condemn’ them. It’s stupid. There’s a violent solution to the problem. Managing appearances doesn’t change much. Certainly a feasible explanation, glad to see you back in your element.
0.98698
This is the hardest question of all, and right now NOBODY has a good answer to it. All known laws of physics break down at the time of the big bang, and all we can do at the moment is speculate. We DO know that at this time gravity (which is due to the warping of spacetime) is subject to fuzzy quantum mechanical effects, and this suggests that space and time themselves become poorly defined concepts. It might not even make sense to ask questions such as "what happened before the big bang" or "what created the big bang" because the very notion of time might be breaking down at that point. Currently the best hope of attacking this problem is a very abstract theory called "string theory" or "M-theory", which is an attempt to unify all the fundamental forces of nature, including gravity, into one single quantum theory. However, nobody can yet write down the mathematical equations which describe this theory, and there is no way to use it to tackle this most interesting of questions. If somebody tells you that they know what happened at the time of the big bang, or what caused it, don't believe them. We still don't know! If the Big Bang theory is true, no one, to my knowledge, has offered a scientific theory to answer that question.Since science deals with what can be observed, the Big Bang theory explains the observed behavior of the universe. But, since the Big Bang itself was not observed, a good theory to explain what created the Big Bang cannot be offered. Good question. I don't think anyone can answer that, assuming that the question even makes sense. Time did not exist before the Big Bang, so it doesn't make sense to ask about things "before", since there is no "before" the Big Bang. But that's not exactly the same thing as what you're asking.
0.999908
Set of 2 porcelain mugs for him and her. Her mug reads "I'm the boss", while his reads "I'm the boss when she is not around here". Funny gift idea for every couple. The given price is for the set of 2 mugs. Set sold in window gift box. Wonderful gift idea for the newlyweds. Great mug makes sipping your morning tea or coffee even better. Size: 23 x 8.5 x 13 cm.
0.999999
Play this cooking game with Tessa. Today Tessa's going to prepare an apple strudel. In this cooking game we'll teach you exactly how to prepare this recipe. You'll need the following ingredients : - 200 g flour - 100 g melted butter - 120 ml lukewarm water - 4 apples, peeled and cored - 100 g sugar - salt - 50 g raisins - 1 tbs cinnamon - 1 pack (8 g) of vanilla sugar - 1 tsp. of ground cloves - 3 tbs lemon juice - 55 g almond shavings - 4 crushed rusks Prepare these ingredients as follows: - Bring a pan of water to the boil - mix 100 g flour, 50 g melted butter, the water and a pinch of salt - Add the rest of the flour - Knead the pastry with your hands until it's supple - pour the boiling liquid out of the pan - Put greaseproof paper into the pan and lay the pastry on it - Cover it and wait for 90 minutes - Preheat the oven at 190 degrees Celsius (374 degrees Fahrenheit) - Cut the apples into small cubes - Mix the apple cubes, the sugar, the raisins, cinnamon, vanilla sugar, cloves, lemon juice and almond shavings - Dust your working surface with flour - Roll out the pastry with a rolling pin until you get a piece of 20x30 cm - Put it on a piece of greaseproof paper - Then stretch it out with your hands until it's 50x70 cm, until it's almost transparent - Spread it with butter - Sprinkle it with the crushed rusk - Cover half the pastry with the apple mixture - let 4 cm of the edges uncovered - Fold the borders to the inside - Roll the strudel up with the help of the greaseproof paper - Cover the roll with the rest of the butter - Put the strudel on a baking tray covered with greaseproof paper - Bake it in the preheated oven for 55 minutes - Let it cool down a bit and then enjoy!
0.944857
What could be better than free hotdogs at midnight at a festival? It’s pretty great. You probably ate like, five or six hours earlier, you still have a good four hours of jamming to put in. You need sustenance. Bring on the free hotdogs! Maybe a jam will get started right there. You just never know.
0.999783
Hosted messaging can lighten the load for your customers. Here's how. Yes, your customers can use Hotmail, Yahoo mail or even ZDNet mail for their hosted e-mail, but it might not be a wise move. After all, free e-mail services are as far beyond accountability as the moon is from Earth. When your customers want to get serious about e-mail, you have two options: Install an internal system—which can be time consuming and costly—or turn to a serious, carrier-grade, hosted e-mail solution. In this article, well discuss the latter. Making Money from Mail One way to e-mail hosting profitability is to enter the mail outsourcing business like such companies as Commtouch (www.commtouch.com), Critical Path (www.cp.net) and Electric Mail Company (www.electricmail.com). Typically, those types of businesses provide mail services to other service providers like ISPs or ASPs, or directly to corporate customers. According to a forthcoming report by Ferris Research, a market and technology analysis house specializing in messaging, outsourcing e-mail will remain a rapidly growing business because of customer IT staff shortages and hosted e-mails reduced costs. Another path is simply to add hosted mail services to your menu of ISP or internal mail services. While it may be impossible to make those services separate billing-line items to your customer, you should be able to increase your overall billing rate by delivering improved e-mail capabilities. The Software Basics First, your e-mail server must be Internet-mail capable. That means, at the least, it should support Post Office Protocol (POP) and Simple Mail Transfer Protocol (SMTP). If your customers intend to use PCs in the office and laptops on the road, Internet Mail Access Protocol (IMAP) is a must. With IMAP, mail resides on the server so a user doesnt have to waste time transferring messages from one machine to another. Other popular mail protocols, like Microsofts Messaging Application Programming Interface or Lotus Vendor-Independent Messaging, are next to useless for Web mail hosting purposes. A modern mail server also should be Web-mail capable. While host-based Web e-mail is almost always slower than a POP/SMTP server-client combination, the fact that you can check mail from any Web-connected device makes it wildly popular. To use Web mail safely, though, you must take extra care on both the server and client side. At a minimum, the Web server should support 40-bit Secure Sockets Layer for e-mail connections. IMAPs host-based message storing also helps ensure that valuable messages arent left behind on public access PCs. But none of that will help if the user doesnt understand that he must clear any public Web browsers cache after reading mail, lest the next user can easily read his last messages. For hosting purposes, virtual mail domains also are a must. With that ability, a single mail server can handle the messaging load for multiple domains. For example, with iPlanet Messaging Server you can set up such e-mail domains as accounting.bigcompany.com and marketing.bigcompany.com without the expense of additional server software or registering new domains. One thing thats new, however, is the growing demand for wireless e-mail capability. The popularity of Blackberry handheld devices, which offer wireless e-mail, proves that customers arent willing to wait for a winner to be declared in the standards battle between Wireless Access Protocol (WAP) and i-Mode. So make sure the e-mail server you choose supports wireless devices. Aim High Regardless of which e-mail server you deploy, it must be highly scalable. The more scalable the server, the higher your potential cash flow. Volume and still more volume from multiple customers is the key to generating profits from e-mails razor-thin margins. Topflight directory support also is a plus in any hosted e-mail solution. At a minimum, use a directory that supports Lightweight Directory Access Protocol (LDAP). Your two top candidates are the iPlanet Directory Server and Novells eDirectory (formerly Novell Directory Services). Non-LDAP oriented directories, like Microsofts Active Directory, arent even on the map. Because of all those factors, Lotus Domino and Microsoft Exchange often arent the best choices for a hosted e-mail solution. Instead, iPlanets iPlanet Messaging Server, Openwaves (formerly Software.com) InterMail and Post.Office, and Sendmails Advanced Message Server are the names that service providers trust. Other Unix-based mail servers, such as qmail and Postfix, also are popular, but they lack organized support options and can only be considered by shops with in-house expertise. As you might guess, successful e-mail hosting also relies on scalable operating systems. According to David Ferris, research director for Ferris Research, the most popular operating systems for e-mail hosting are Sun Solaris, IBM AIX and HP-UX. Linux is winning converts, thanks to its low cost and the imminent release of Linux 2.4. Windows NT, meanwhile, was a niche player at best in this arena, and Windows 2000 only now is starting to show up in host e-mail deployments. The Hardware Basics No matter the chip inside, all e-mail servers need plentiful memory and disk resources. Given a choice between a faster processor and more RAM, with e-mail servers you should always opt for more memory. As for disk requirements, you should have at least a giga- byte of disk room for every 1,000 users. You can get by with less, but youll be asking for trouble. Needless to say, all your e-mail servers also should be dedicated servers. Big-time mail hosters also find that its worth their time to keep a dedicated domain name services (DNS) server on tap. Ideally, a DNS server should be only a Fast Ethernet link away from the mail servers. iPlanet Messaging Server If the name doesnt sound familiar, that might be because youve only known iPlanet Messaging Server (IMS) 5.0 from its two immediate ancestors: Sun Internet Mail Server (SIMS) 4.0 and Netscape Messaging Server (NMS) 4.15. While there have been earlier versions of it, IMS is the first completely merged version. IPlanet Messaging Servers ancestors have a reputation for being good, solid mail servers with high reliability. Mail administrators like it because, combined with iPlanet Directory Server and its most common deployment on Sparc systems running Solaris, it gives them a familiar suite for the most demanding mail jobs. While IMS currently supports only Solaris, a forthcoming edition will also support Red Hat Linux. But that new version, out since November, does combine two very different feature sets. The core mail transfer agent, for example, is from Innosoft (by way of SIMS). But the message store is derived mostly from NMS. From our hands-on experience and ISP reports, that hybrid blend mail server is, nevertheless, flawless. But cautious mail administrators might want to wait until IMS 5.1 arrives shortly. While that version will primarily offer better localization features, it also will include bug fixes. Openwave InterMail and Post.Office Do you want to serve millions of e-mail customers? If you do, Openwave has the mail server for you. The companys InterMail 5.0 carrier-level server can handle millions of customers. Just ask customers like @Home and Excite. InterMail shares all the same characteristics of the other top mail servers: remote server control, centralized configuration, and so on. Its other excellent features, such as its distributed nature and dynamic load-balancing, cant be equaled on other systems … but it requires lots of configuration know-how. Unlike IMS, InterMail supports a wide variety of operating systems like AIX, Compaqs Tru64 Unix (formerly Digital Unix), HP-UX, NT and Solaris. Where InterMail steps out from its competition is with its extras. For example, you can provision users e-mail clients remotely and the system comes with its own set of billing tools. In short, InterMail doesnt just give your customers great mail service with all the trimmings, it gives you what you need to deploy a complete business mail solution. The one exception to that is small businesses. InterMail is overkill for anyone with less than a thousand users. For small-to-midsize businesses, Openwave offers Post.Office 3.5. Sendmail Advanced Message Server Love it or hate it, you cant ignore Sendmail. The open-source version runs on every Unix system known to man and many other operating systems, besides. So it is that today Sendmail is a heavyweight mail server that can—and does—handle more mail every day than any other server around.Theres no wonder why. Besides every version of Unix, Sendmail also supports Windows NT. The commercial version, Advanced Message Server (AMS), only currently supports Red Hat Linux and Solaris. Thats changing. In November, IBM and Sendmail inked a deal that will extend AMS to support other Linuxes, AIX, OS/400, OS/390, NT and Windows 2000. And, despite a reputation as being difficult to use, it deserves its popularity. To put it bluntly, Sendmail just works. In its early days, Sendmail was thought of as being very insecure. As the years have gone by and the code has been debugged, that image is no longer deserved. Lets Take a Commercial Break While the open-source Sendmail remains somewhat difficult to use, as partisans of qmail and Postfix always point out, the commercial version of Sendmail is quite another matter. Sendmail Advanced Message Server has all of Sendmails speed, reliability and scalability virtues—plus impressive administrative interfaces that youll surely appreciate. Until recently, however, critics thought Sendmail might not meet the needs of 21st century e-mail users—especially mobile workers and road warriors. But that concern no longer is valid, thanks to recent developments on the business front. With Sendmails purchase of Nascent Technologies last month, commercial Sendmail now includes the Sendmail Mobile Message Server. That will give Sendmail partners the power to easily deliver Web-enabled messages or wireless e-mail via either WAP or i-Mode. Sendmail enters this century ready for your biggest e-mail challenges. Lotus Domino and Microsoft Exchange Domino and Exchange get the headlines, but for hosted e-mail they dont necessarily get the business. The reason is simple: scalability. Enterprise mail servers like Domino and Exchange typical- ly handle thousands of users. Carrier-level servers must handle hundreds of thousands. And, Microsoft-sponsored testing to the contrary, many e-mail ser- vice providers question whether Exchange 2000 can handle a global e-mail load. Still, many Domino and Exchange customers are outsourcing those servers. As Ferris puts it, "[Customers] want to outsource the devil they know inside." As a result, full service xSPs like Intermedia advertise their Internet capable e-mail service, Intermedia Messenger Mail, while also providing Notes-based mail for customers who demand it. Listen to the Pros In our experience from a customers viewpoint, neither Exchange nor Domino works well as Internet mail servers. Both products Web interfaces are frightfully slow. Sure, Exchange and Domino run well with their native clients, Outlook and Notes, respectively. But Outlook is bedeviled with security problems and the Notes client is a classic example of bloated software. Moreover, Domino and Exchange are not cost-productive for xSPs because "theyre very support-intensive," notes Ferris. More support means more cost. And in the price-sensitive world of e-mail, making up those labor costs isnt easy for service providers. Simon Hayward, a research director at the Gartner Group, puts it another way. In a report titled "Notes-Domino: Your Legacy or Your Future," Hayward writes: "Internet standardization has effectively reduced e-mail products to commodity status, so there is rarely a business justification for changing from one of the latest generation products to another." Thats an overstatement. Still, it does illuminate one point. Unless your customer is willing to pay extra for an enterprise mail system like Domino or Exchange, you should recommend pure Internet mail servers. The costs are cheaper and the profits certainly are higher.
0.966573
Diagram of a simple VCSEL structure. The vertical-cavity surface-emitting laser, or VCSEL /ˈvɪksəl/, is a type of semiconductor laser diode with laser beam emission perpendicular from the top surface, contrary to conventional edge-emitting semiconductor lasers (also in-plane lasers) which emit from surfaces formed by cleaving the individual chip out of a wafer. VCSELs are used in various laser products, including computer mice, fiber optic communications, laser printers, Face ID, and smartglasses. There are several advantages to producing VCSELs, in contrast to the production process of edge-emitting lasers. Edge-emitters cannot be tested until the end of the production process. If the edge-emitter does not function properly, whether due to bad contacts or poor material growth quality, the production time and the processing materials have been wasted. VCSELs however, can be tested at several stages throughout the process to check for material quality and processing issues. For instance, if the vias, the electrical connections between layers of a circuit, have not been completely cleared of dielectric material during the etch, an interim testing process will flag that the top metal layer is not making contact to the initial metal layer. Additionally, because VCSELs emit the beam perpendicular to the active region of the laser as opposed to parallel as with an edge emitter, tens of thousands of VCSELs can be processed simultaneously on a three-inch gallium arsenide wafer. Furthermore, even though the VCSEL production process is more labor and material intensive, the yield can be controlled to a more predictable outcome. A realistic VCSEL device structure. This is a bottom-emitting multiple-quantum-well VCSEL. The laser resonator consists of two distributed Bragg reflector (DBR) mirrors parallel to the wafer surface with an active region consisting of one or more quantum wells for the laser light generation in between. The planar DBR-mirrors consist of layers with alternating high and low refractive indices. Each layer has a thickness of a quarter of the laser wavelength in the material, yielding intensity reflectivities above 99%. High reflectivity mirrors are required in VCSELs to balance the short axial length of the gain region. In common VCSELs the upper and lower mirrors are doped as p-type and n-type materials, forming a diode junction. In more complex structures, the p-type and n-type regions may be embedded between the mirrors, requiring a more complex semiconductor process to make electrical contact to the active region, but eliminating electrical power loss in the DBR structure. In laboratory investigation of VCSELs using new material systems, the active region may be pumped by an external light source with a shorter wavelength, usually another laser. This allows a VCSEL to be demonstrated without the additional problem of achieving good electrical performance; however such devices are not practical for most applications. VCSELs for wavelengths from 650 nm to 1300 nm are typically based on gallium arsenide (GaAs) wafers with DBRs formed from GaAs and aluminium gallium arsenide (AlxGa(1-x)As). The GaAs–AlGaAs system is favored for constructing VCSELs because the lattice constant of the material does not vary strongly as the composition is changed, permitting multiple "lattice-matched" epitaxial layers to be grown on a GaAs substrate. However, the refractive index of AlGaAs does vary relatively strongly as the Al fraction is increased, minimizing the number of layers required to form an efficient Bragg mirror compared to other candidate material systems. Furthermore, at high aluminium concentrations, an oxide can be formed from AlGaAs, and this oxide can be used to restrict the current in a VCSEL, enabling very low threshold currents. The main methods of restricting the current in a VCSEL are characterized by two types: ion-implanted VCSELs and oxide VCSELs. In the early 1990s, telecommunications companies tended to favor ion-implanted VCSELs. Ions, (often hydrogen ions, H+), were implanted into the VCSEL structure everywhere except the aperture of the VCSEL, destroying the lattice structure around the aperture, thus inhibiting the current. In the mid to late 1990s, companies moved towards the technology of oxide VCSELs. The current is confined in an oxide VCSEL by oxidizing the material around the aperture of the VCSEL. A high content aluminium layer that is grown within the VCSEL structure is the layer that is oxidized. Oxide VCSELs also often employ the ion implant production step. As a result, in the oxide VCSEL, the current path is confined by the ion implant and the oxide aperture. The initial acceptance of oxide VCSELs was plagued with concern about the apertures "popping off" due to the strain and defects of the oxidation layer. However, after much testing, the reliability of the structure has proven to be robust. As stated in one study by Hewlett Packard on oxide VCSELs, "The stress results show that the activation energy and the wearout lifetime of oxide VCSEL are similar to that of implant VCSEL emitting the same amount of output power." A production concern also plagued the industry when moving the oxide VCSELs from research and development to production mode. The oxidation rate of the oxide layer was highly dependent on the aluminium content. Any slight variation in aluminium would change the oxidation rate sometimes resulting in apertures that were either too big or too small to meet the specification standards. Longer wavelength devices, from 1300 nm to 2000 nm, have been demonstrated with at least the active region made of indium phosphide. VCSELs at even higher wavelengths are experimental and usually optically pumped. 1310 nm VCSELs are desirable as the dispersion of silica-based optical fiber is minimal in this wavelength range. Using a tunnel junction (n+p+), an electrically advantageous n-n+p+-p-i-n configuration can be built that also may beneficially influence other structural elements (e.g. in the form of a Buried Tunnel Junction (BTJ)). Two VCSELs on top of each other. One of them optically pumps the other one. A photodiode is integrated under the back mirror of the VCSEL. VCSEL with transversally integrated monitor diode: With suitable etching of the VCSEL's wafer, a resonant photodiode can be manufactured that may measure the light intensity of a neighboring VCSEL. VECSELs are optically pumped with conventional laser diodes. This arrangement allows a larger area of the device to be pumped and therefore more power can be extracted - as much as 30W. The external cavity also allows intracavity techniques such as frequency doubling, single frequency operation and femtosecond pulse modelocking. VCSOAs are optimized as amplifiers as opposed to oscillators. VCSOAs must be operated below threshold and thus require reduced mirror reflectivities for decreased feedback. In order to maximize the signal gain, these devices contain a large number of quantum wells (optically pumped devices have been demonstrated with 21–28 wells) and as a result exhibit single-pass gain values which are significantly larger than that of a typical VCSEL (roughly 5%). These structures operate as narrow linewidth (tens of GHz) amplifiers and may be implemented as amplifying filters. Because VCSELs emit from the top surface of the chip, they can be tested on-wafer, before they are cleaved into individual devices. This reduces the fabrication cost of the devices. It also allows VCSELs to be built not only in one-dimensional, but also in two-dimensional arrays. The larger output aperture of VCSELs, compared to most edge-emitting lasers, produces a lower divergence angle of the output beam, and makes possible high coupling efficiency with optical fibers. The high reflectivity mirrors, compared to most edge-emitting lasers, reduce the threshold current of VCSELs, resulting in low power consumption. However, as yet, VCSELs have lower emission power compared to edge-emitting lasers. The low threshold current also permits high intrinsic modulation bandwidths in VCSELs. The wavelength of VCSELs may be tuned, within the gain band of the active region, by adjusting the thickness of the reflector layers. While early VCSELs emitted in multiple longitudinal modes or in filament modes, single-mode VCSELs are now common. High-power vertical-cavity surface-emitting lasers can also be fabricated, either by increasing the emitting aperture size of a single device or by combining several elements into large two-dimensional (2D) arrays. There have been relatively few reported studies on high-power VCSELs. Large-aperture single devices operating around 100 mW were first reported in 1993. Improvements in the epitaxial growth, processing, device design, and packaging led to individual large-aperture VCSELs emitting several hundreds of milliwatts by 1998. More than 2 W continuous-wave (CW) operation at -10 degrees Celsius heat-sink temperature was also reported in 1998 from a VCSEL array consisting of 1,000 elements, corresponding to a power density of 30 W/cm2. In 2001, more than 1 W CW power and 10 W pulsed power at room temperature were reported from a 19-element array. The VCSEL array chip was mounted on a diamond heat spreader, taking advantage of diamond’s very high thermal conductivity. A record 3 W CW output power was reported in 2005 from large diameter single devices emitting around 980 nm. In 2007, more than 200 W of CW output power was reported from a large (5 × 5mm) 2D VCSEL array emitting around the 976 nm wavelength, representing a substantial breakthrough in the field of high-power VCSELs. The high power level achieved was mostly due to improvements in wall-plug efficiency and packaging. In 2009, >100 W power levels were reported for VCSEL arrays emitting around 808 nm. The first VCSEL was reported by Ivars Melngailis in 1965. In the late 1970s major work on VCSELs was done by Soda, Iga, Kitahara and Suematsu, but devices for CW operation at room temperature were not reported until 1988. The term VCSEL was coined in a publication of the Optical Society of America in 1987. In 1989, Jack Jewell led a Bell Labs / Bellcore collaboration (including Axel Scherer, Sam McCall, Yong Hee Lee and James Harbison) that demonstrated over 1 million VCSELs on a small chip. These first all-semiconductor VCSELs introduced other design features still used in all commercial VCSELs. "This demonstration marked a turning point in the development of the surface-emitting laser. Several more research groups entered the field, and many important innovations were soon being reported from all over the world". Andrew Yang of the Defense Advanced Research Projects Agency (DARPA) quickly initiated significant funding toward VCSEL R&D, followed by other government and industrial funding efforts. VCSELs replaced edge-emitting lasers in applications for short-range fiberoptic communication such as Gigabit Ethernet and Fibre Channel, and are now used for link bandwidths from 1 Gigabit/sec to > 400 Gigabit/sec. ^ Extance, Andy (9 April 2018). "Faces light up over VCSEL prospects". SPIE. ^ Bohn, Dieter (5 February 2018). "Intel made smart glasses that look normal". The Verge. ^ D. D. John, C. Burgner, B. Potsaid, M. Robertson, B. Lee, W. J. Choi, A. Cable, J. Fujimoto, and V. Jayaraman, “Wideband Electrically-Pumped 1050 nm MEMS-Tunable VCSEL for Ophthalmic Imaging,” Jnl. Lightwave Tech., vol. 33, no. 16, pp. 3461 - 3468, Feb. 2015. ^ V. Jayaraman, G. D. Cole, M. Robertson, A. Uddin, and A. Cable, “High-sweep-rate 1310 nm MEMS-VCSEL with 150 nm continuous tuning range,” Electronics Letters, vol. 48, no. 14, pp. 867–869, 2012. ^ Iga, Kenichi (2000). "Surface-emitting laser—Its birth and generation of new optoelectronics field". IEEE Journal of Selected Topics in Quantum Electronics. 6 (6): 1201–1215. Bibcode:2000IJSTQ...6.1201I. doi:10.1109/2944.902168. ^ Peters, F.; M. Peters; D. Young; J. Scott; B. Thibeault; S. Corzine; L. Coldren (January 1993). "High-power vertical-cavity surface-emitting lasers". Electronics Letters. 29 (2): 200–201. doi:10.1049/el:19930134. ^ Grabherr, M.; R. Jager; M. Miller; C. Thalmaier; J. Herlein; R. Michalzik; K. Ebeling (August 1998). "Bottom-emitting VCSEL's for high-CW optical output power". IEEE Photonics Technology Letters. 10 (8): 1061–1063. Bibcode:1998IPTL...10.1061G. doi:10.1109/68.701502. ^ Francis, D.; Chen, H.-L.; Yuen, W.; Li, G.; Chang-Hasnain, C. (October 1998). "Monolithic 2D-VCSEL array with >2 W CW and >5 W pulsed output power". Electronics Letters. 34 (22): 2132–2133. doi:10.1049/el:19981517. ^ Miller, M.; M. Grabherr; R. Jager; K. Ebeling (March 2001). "High-power VCSEL arrays for emission in the watt regime at room temperature". IEEE Photonics Technology Letters. 13 (3): 173–175. Bibcode:2001IPTL...13..173M. doi:10.1109/68.914311. ^ D’Asaro, L. A.; J. Seurin and J.Wynn (February 2005). "High-power, high efficiency VCSELs pursue the goal". Photonics Spectra. 39 (2): 62–66. ^ Seurin, J-F.; L. A. D’Asaro; C. Ghosh (July 2007). "A New Application for VCSELs: High-Power Pump Lasers". Photonics Spectra. 41 (7). ^ Seurin, J-F.; G. Xu; V. Khalfin; A. Miglo; J. D. Wynn; P. Pradhan; C. L. Ghosh; L. A. D'Asaro (February 2009). "Progress in high-power high-efficiency VCSEL arrays". Proceedings SPIE, in Vertical-Cavity Surface-Emitting Lasers XIII. 7229: 722903-1–11. doi:10.1117/12.808294. ^ Van Leeuwen, R.; Seurin, J-F.; Xu, G.; Ghosh, C. (February 2009). "High power pulsed intra-cavity frequency doubled vertical extended cavity blue laser arrays". Proceedings SPIE, in Solid State Lasers XVIII: Technology and Devices. 7193: 771931D-1–9. doi:10.1117/12.816035. ^ Eli Kapon (1998). Semiconductor Lasers II: Materials and Structures. ISBN 9780080516967. ^ Shun Lien Chuang (2009). Physics of Photonic Devices. ^ J.K. Peterson (2002). Fiber Optics Illustrated Dictionary. ISBN 9780849313493. ^ Soda, Haruhisa; et al. (1979). "GaInAsP/InP Surface Emitting Injection Lasers". Japanese Journal of Applied Physics. 18 (12): 2329–2330. Bibcode:1979JaJAP..18.2329S. doi:10.1143/JJAP.18.2329. ^ Koyama, Fumio; et al. (1988). "Room temperature cw operation of GaAs vertical cavity surface emitting laser". Trans. IEICE. E71 (11): 1089–1090. ^ Christensen, D. H.; Barnes, F. S. (February 1987). "Vertical Cavity Surface Emitting Laser in Molecular Beam Epitaxial GaAs/AlGaAs using a Multilayer Dielectric Mirror". Topical Meeting on Semiconductor Lasers, Technical Digest, Volume 6, (Optical Society of America, Washington, D. C. 1987), pp. WA71-3. 6: WA7-1. ISBN 0-936659-39-4. ^ Jewell, J.L.; Scherer, A.; McCall, S.L.; Lee, Y.H.; Walker, S.; Harbison, J.P.; Florez, L.T. (August 1989). "Low-threshold electrically pumped vertical-cavity surface-emitting microlasers". Electronics Letters. 25: 1123–1124. doi:10.1049/el:19890754. ^ Lee, Y.H.; Jewell, J.L.; Scherer, A.; McCall, S.L.; Harbison, J.P.; Florez, L.T. (September 1989). "Room-temperature continuous-wave vertical-cavity single-quantum-well microlaser diodes". Electronics Letters. 25: 1377–1378. doi:10.1049/el:19890921. ^ a b Towe, Elias; Leheny, Robert F.; Yang, Andrew (December 2000). "A historical perspective of the development of the vertical-cavity surface-emitting laser". IEEE Journal on Selected Topics in Quantum Electronics. 6: 1458–1464. Bibcode:2000IJSTQ...6.1458T. doi:10.1109/2944.902201.
0.963391
A remix full-length based entirely off of one album is always a bit of a sticky situation, but even more so when a Lady Gaga opus is the subject of the reworking. After all, Gaga is an uncompromising figure in pop music, and the vision of an album like "Born This Way" -- its many messages, sonic movements and powerhouse vocals -- is entirely her own. Smartly, "Born This Way: The Remix," released two days shy of six months since Gaga's latest album hit stores, does not try to reinvent the wheel, but instead gives less recognizable artists a platform to tinker with these complex pop schemes. The lineup is a murderer's row of techno wizards (Sultan + Ned Shepard, Zedd), electro-pop maestros ( Goldfrapp, Metronomy), indie-rock upstarts ( Twin Shadow, Two Door Cinema Club) and, of course, The Weeknd. The mysterious singer, who reinterprets "Marry The Night" with Illangelo, is an odd choice for the remix album, since his bare-boned R&B and hedonistic lyrics directly conflict with Gaga's M.O. But like so many of these remixes, the Weeknd marries his vision of the song to Gaga's gorgeous voice without losing the original's integrity. "Born This Way: The Remix" is not essential listening for non-Gaga diehards, but electronica fans who have yet to drink the Mother Monster kool-aid will find plenty of pristinely produced club tracks to groove to. The album is a great avenue for fans to digest new versions of their favorite songs of the year, as well as discover artists that are trying to command audiences the way Gaga so masterfully does. Which remixes on Lady Gaga's "Born This Way: The Remix" are worth checking out? Check out our track-by-track review of the album, and tell us what you think in the comments section. 1. Born This Way (Zedd Remix): With its gleeful techno breakdown and imaginative structure, we're more than fine with Gaga's No. 1 being reborn this way. 2. Judas (Goldfrapp Remix): "Judas" imagined as an industrial anthem, and Gaga's vocals turned into a slow, creeping harbinger of danger. Not the most successful pairing. 3. The Edge of Glory (Foster The People Remix): More heavy techno from the "Pumped Up Kicks" guys, with a pretty twisted breakdown beginning at the 3:20 mark. 4. Yoü and I (Wild Beasts Remix): The indie-rock weirdos of Wild Beasts add headphone-ready shimmer to Gaga's romantic ballad. 5. Marry The Night (The Weeknd & Illangelo Remix): the R&B phenom places his Midas touch on Gaga's latest single, capturing the longing of "Marry" in an intriguing new way. 6. Black Jesus † Amen Fashion (Michael Woods Remix): Nothing too revolutionary, but those synths are filthy, and eventually reach a fever pitch. 7. Bloody Mary (The Horrors Remix): British rockers make "Bloody Mary" a lush, haunting affair, with Gaga lost in the darkness of the dance floor. Download immediately. 8. Scheiße (Guéna LG Club Remix): Europop stunner that's like a combination of The Knife's "Heartbeats" and The Vengaboys' "We Like To Party," somehow. 9. Americano (Gregori Klosman Remix): A woozy, somewhat sinister spin on Gaga's multi-lingual "BTW" highlight, but a bit too long. 10. Electric Chapel (Two Door Cinema Club Remix): Electro-pop group pokes and prods Gaga's original, and returns with a fun, wholly engaging slice of dance music. 11. Yoü and I (Metronomy Remix): The atmosphere swells around Gaga's lonely vocals, but never overwhelms it. Mysterious in the best sense. 12. Judas (Hurts Remix): Hints of dubstep as the complex beat builds itself into a frenzy before nearly collapsing. Didn't see that outro coming. 13. Born This Way (Twin Shadow Remix): Rising indie stars add jangle pop, skittish beat to the first single without sacrificing its rock-and-roll heart. 14. The Edge of Glory (Sultan & Ned Shepard Remix): Dance masters embrace the Springsteen-influenced epicness of "Glory" with pumping drums and slinking synths.
0.997522
What messages about teacher professionalism are transmitted through South African pre-service teacher education programmes? Promoting teacher professionalism is regarded as a strategy to address the disparate quality of learning in South African classrooms. Through a qualitative analysis of initial teacher education (ITE) programmes offered by five universities, this paper analyses the messages of teacher professionalism transmitted to pre-service teachers. Findings show that professionalism in teaching is variously conveyed to pre-service teachers as being located in their personal appearance and attributes; within their personal morals and shared ethical imperatives; in the kinds of workplace relationships they build, and in their use of formal knowledge for reasoned judgment in practice. The Specialisation Dimension of Legitimation Code Theory (LCT) (Maton, 2014) is used to show that when teacher professionalism is presented as highly individualised traits, the possibilities of developing shared knowledge-based teaching practices is reduced, and the importance of conceptually-informed judgments is obscured. This shuts down possibilities for systemic improvement. Conversely, if teacher professionalism is primarily located in what teachers know and can do with that knowledge, the social, moral and affective dimensions of teaching are underemphasised. Ideally, approaches to teacher professionalism ought to introduce students to teaching as a communally-owned practice, based on shared knowledge that enables reasoned judgment. The paper draws on the conceptual tools offered by LCT to suggest how social and epistemic relations can be weakened and strengthened to enhance the construct of teacher professionalism offered to prospective teachers through their ITE programmes. As in many other developing countries, South African teachers need to navigate the complexities associated with teaching in a rapidly changing, inequitable and largely under-performing education system (United Nations Educational, Scientific and Cultural Organization [UNESCO], 2014). Advancing teachers' professional development is one of four outputs envisaged by UNESCO's (2006) Teacher Training Initiative for Sub-Saharan Africa, and is widely regarded as one means of leveraging systemic improvements in the education system (Mukeredzi & Mandrona, 2013; Ndebele, Muhuro & Nkonki, 2016; Taylor, Van der Berg & Mabogoane, 2013). In legislation governing the provision of teacher education, teaching is conceptualised as a knowledge-based professional practice where "principles and theory are emphasised as a basis for entry into a professional teaching career" (Department of Higher Education and Training [DHET], 2015:20). A professional approach to the preparation of teachers is contrasted with skills-based approaches that produce "technicians who may be able to replicate performance in similar contexts, but who are severely challenged when the context changes" (DHET, 2015:9). Despite assertions in policy that teachers are to be prepared as prospective professionals, little is known about how Initial Teacher Education (ITE) programmes conceptualise teacher professionalism and seek to fulfil this mandate. To address this gap, this paper analyses the conceptions and enactment of teacher professionalism transmitted by ITE programmes at five institutions that participated in the Initial Teacher Education Research Project (ITERP), led by JET Educational Services. The findings show how messages about teacher professionalism are variously transmitted through ITE programmes as being about individual attributes, as being part of a community with a shared moral purpose, and as having shared knowledge, and being able to account for the pedagogical decisions one makes. I conclude by suggesting how teacher professionalism can be strengthened in ITE and the grounds of its legitimation made more explicit to pre-service teachers. A professional practice is classically understood as a collection of patterned actions that address a common endeavour, with action based on shared knowledge, skills and ways of thinking that can be taught and learned (Elmore, 2008; Gamble, 2010; Young & Muller, 2014). Because professional practices do not merely rely on intuition or common-sense perspectives, professionals need an extended pre-service education to acquire the necessary reservoirs of academic and diagnostic knowledge to make informed decisions when addressing complex problems that arise in practice (Abbott, 1988; Guile, 2014; Shalem, 2014), followed by an induction period as they enter the profession (Macbeath, 2012). They are accountable to peers in their practice for discernment and their ethical conduct. Any claim that teaching is a professional practice needs to encompass both a professional knowledge claim and a claim to moral knowledge concerned with maintaining the ethical standing of the occupation (Winch, 2004). A moral claim of teachers is proposed by Dunne (MacIntyre & Dunne, 2002), who argues that an 'internal good' of teaching is the ethical imperative to act in the best education interests of learners and their wellbeing. The professional knowledge claim has been bolstered through research into pedagogical content knowledge (PCK). PCK is broadly understood as the knowledge teachers use to transform their subject knowledge into appropriate representations that diverse learners will find understandable. Researchers such as Loughran, Berry and Mulhall (2006); Rollnick, Bennett, Rhemtula, Dharsey and Ndlovu (2008) have attempted to further theorise PCK. While efforts to pin down examples of PCK have been hampered by its topic- and context-specific nature, others argue that while teachers' topic specific professional knowledge can be codified, PCK is enacted in con-textually responsive ways (Gess-Newsome & Carlson, 2013; Park & Oliver, 2008). The professional status of teaching falls short if the list of traditional criteria is imposed on the work of teachers (Douglas, 2005; Elmore, 2008). In terms of the autonomy of professional practitioners, for example, there is contention around whether or not teachers are accountable to a professional body, or to the state (as their employer), to their institutions (as site managers), or to learners and their parents (as 'clients') (Gamble, 2010). Since Shulman (1987) identified the knowledge base that supports teachers' work, there has been a firmer base for recognising teaching as a professional practice. Teaching is recognised as intricate and unnatural work, requiring deliberate choices that are both conceptually-informed and contextually-responsive (Ball & Forzani, 2009; Morrow, 2007). On these grounds, teaching is accepted as a 'semi,' 'new' or 'proto' professional practice (Muller, 2009; Taylor & Taylor, 2013) in research and in policy. Professional teachers thus need to be educated (not merely trained), and should intentionally use a knowledge base to support their teaching practices (not merely indiscriminately apply a set of techniques and routines) within the contextual challenges of an emerging economy overcoming a legacy of inequality. It is necessary to distinguish between the professionalisation of teaching and advancing teacher professionalism internationally and in the South African context. Enhancing teachers' professionalism is a pedagogic project that seeks to improve the internal quality of teachers' work (De Clercq, 2013). Professionalisation of teaching, on the other hand, is a sociological project that seeks to improve teachers' working conditions, as well as increase their status and collective power over their work (De Clercq, 2013; Hargreaves, 2000). Professionalism cannot be imposed on or demanded from teachers because concerns "what teachers do, how and why they do it; what they know and understand; where and how they acquire their knowledge and understanding; what attitudes they hold; what codes of behaviour they follow; what their function is; what purposes they perform; what quality of service they provide; and the level of consistency incorporated into the above" (Evans, 2011:855). Conceptualised in this way, teacher educators are important role-players in introducing and inducting pre-service teachers into the practices associated with professional teaching. Despite the increased bureaucratisation of teachers' work, the implementation of a skills-based performance management system and ongoing struggles to ensure that schools comply with the legislated norms and standards for infrastructure, numerous initiatives over the past twenty years have attempted to advance the professionalisation of teaching in South Africa. Initiatives to advance the professionalisation of teaching include the establishment of the South African Council for Educators (SACE) in 1997 to "enhance the status of the teaching profession, and promote development of educators and their professional conduct" (SACE, 2011). SACE is mandated to register teachers with a licence to practice (thereby opening possibilities for professional recognition) and to set professional teaching standards. In another example of an initiative that seeks to advance the professionalisation of teaching is the passing of legislation that moved the provision of ITE into the higher education sector (Republic of South Africa, 1997). All teachers need to qualify with an academic or professional degree, and pre-service teacher education qualifications (the four-year Bachelor of Education degree and one year PostGraduate Certificate in Education) focusing on "well rounded application of theory to professional practice" (DHET, 2015:19). Teacher educators are thus legislatively tasked with ensuring that pre-service teachers acquire the theoretical and practical knowledge that will enable them to "demonstrate competence and responsibility as academically and professionally qualified beginner teachers" (DHET, 2015:20). While this is identified as an important mission for teacher educators, little is known about how this endeavour to prepare teachers as professionals is enacted in South African pre-service teacher education programmes. This paper addresses the research question of how pre-service teacher education programmes offered in the South African context conceptualise and transmit notions of teacher professionalism to students. This paper reports on a part of the ITERP that analysed the Bachelor of Education and PostGraduate Certificate in Education programmes offered by five South African universities. Participating institutions differed according to their geographical location, their language of instruction, merger history, and resourcing legacies. Ethics approval for the study was obtained from the Human Sciences Research Council (HSRC) and the Ethics Committees of each institution. In each institution, semi-structured interviews were conducted with 10 to 15 teacher educators who teach on a range of courses, including education theory, content subjects and pedagogy. Interviews were also conducted with those involved in programme, course and practicum leadership. The participants were selected by the head/dean of education at each institution based on their academic leadership roles in their departments, their knowledge of the initial teacher education programmes, the courses they teach and their experience mentoring pre-service teachers during their practicum sessions. Each interview lasted 40 minutes, and detailed notes on the participant responses were recorded on a template during and immediately after the interview. Participants were provided with an opportunity to review the reports, in order to ensure that their contributions had been accurately captured. What are the key characteristics of a professional teacher? How does the curriculum offered by this institution seek to enable student teachers to become the kind of professional teacher envisaged? Using the characteristics of professionalism raised by lecturers, and with reference to their perceptions of where the curriculum addresses the professional development of teachers, the design and rationale of each institution's pre-service teacher education programmes was analysed. In particular, we drew on several sources of data that speak to the way in which the notion of teacher professionalism is transmitted to student teachers. These could be grouped into three main areas: through their expectations of students' conduct at university, through the formal university-based coursework offered to students, and through criteria used to assess the teaching competence of students during their teaching practicum sessions. To gain access to the espoused curriculum we analysed the official BEd syllabus and rules book, course outlines and study guides (where available). We also used the teaching practice assessment rubric to access criteria regarding the way in which professionalism is conceptualised and assessed during the practicum sessions. Maton's (2000, 2007, 2014) Legitimation Code Theory (LCT) provides useful conceptual tools to analyse how teacher professionalism is understood and transmitted through pre-service teacher education programmes. The Specialisation Dimension is based on the premise that "every practice, belief or knowledge claim is about or oriented towards something and by someone, and so sets up an Epistemic Relation to an object (ER) and a Social Relation (SR) to a subject" (Carvalho, Dong & Maton, 2009:487). Every message regarding teacher professionalism thus has both a social relation and an epistemic relation that can be stronger (+) or weaker (-) along a continuum. Ways in which messages about what legitimates teacher professionalism vary in terms of the strength of an epistemic relation towards a knowledge base. The extent to which teacher professionalism is socially related to who a pre-service teacher is as a person also varies. The relative strength of the epistemic relation to an object of study (in this case, teacher professionalism) interplays with relative strength of social relation (in this study, the subject as pre-service teachers) to describe four Specialisation Codes, which can be represented as a quadrant on a Cartesian plane as illustrated in Figure 1. These codes describe the underlying structures that legitimise the conceptions of teacher professionalism transmitted: by virtue of who the pre-service teacher is as a person (a Knower code with a weaker ER and stronger SR), by virtue of what they know irrespective of personal attributes (Knowledge code with a stronger ER, and a weaker SR), by both what they know and who they are (an Elite code in which both ER and SR are stronger), or by neither (a Relativist code, where both ER and SR are weaker). The discussion will draw on empirical data to postulate what teacher professionalism would look like when governed by each of these codes. First, the concept of teacher professionalism was used as a sensitising concept to identify empirical data relevant to this part of the study. The empirical data deemed relevant was then analysed using the concepts from the Specialisation Dimension of Maton's (2007, 2014) LCT. Data that acknowledged prospective teachers as individuals who enter ITE programmes (with a unique combination of prior knowledge, constructed identity, and personal experiences of schooling, teaching and learning) were coded as having stronger social relation (SR+). The translation device shown in Table 1 has developed iteratively from the theory and tested and revised using empirical data. It defines three levels within a continuum from very strong to weak social relations in the context of this study. Secondly, the data was examined for notions of teacher professionalism that rely on an established theoretical knowledge in order to allocate an epistemic relation (ER) to the data. This, for example, included data that referred to the induction of student teachers into established academic, disciplinary and teaching practices that transcend the diversities associated with students' personal traits, identified as having stronger epistemic relation (ER+). The strength of the epistemic relation is defined on the basis of where the knowledge is produced, and how transferable it is across diverse contexts. The translation device in Table 2 defines three levels within a continuum from strong to very weak epistemic relations in the context of this study. The nature of this research as a case study introduces limitations in the data sets used, and as such, the findings of this study are provisional and not necessarily transferable to other institutions offering pre-service teacher education programmes. The purpose of this study is not to offer an evaluation of the different programmes, but rather to illustrate the different ways in which notions of professionalism in teaching have been transmitted to pre-service teachers. It is hoped that the analysis will illustrate how conceptions of teacher professionalism are transmitted to pre-service teachers through the curriculum, pedagogy and assessment of their ITE programmes. Messages about teacher professionalism were found to be transmitted to students through expectations of students' conduct, university-based coursework, and criteria used to assess their teaching competence during practicum sessions. Drawing on the literature review, the results of this study will be discussed in three broad clusters, namely: the dispositional and behavioural (attributes); the social (indicative of the communal values and collective ethical imperatives that underpin professional relationships that prospective teachers build in their practice); and the intellectual (which relates to the knowledge and understanding teachers have, and the choices they make on the basis of that knowledge). Teacher Professionalism as a Personal Attribute Lecturers from all five institutions asserted that the development of a professional identity is enhanced by students' 'desire to teach' and a 'commitment to the profession.' While some students who landed in teacher education programmes by default discovered a love of teaching as they participate in the practices, for most, this desire was an intrinsic one, akin to a vocational calling. Emphasis on the dispositional qualities of a prospective teacher reflects a stronger social relation to professionalism, and suggests that the ability to teach effectively cannot entirely be taught and learnt through formal instruction. Lecturers across institutions agreed that prospective teachers ought to have caring dispositions; be patient and enthusiastic; and 'have time for all learners' complaints and stories.' In addition, lecturers from just two universities went well beyond attributes about caring relationships with children to describe the 'ideal' dispositions of a professional teacher in terms of relationships to knowledge: an 'inherent curiosity,' a ' passion for the subjects they teach,' and an ' interest in understanding the way children think. ' The social relation of this message about being a professional teacher is relatively strong, but its epistemic relation is much weaker, because it is based on individual characteristics. Three universities require that pre-service teachers interrogate their personal experiences of schooling, however, there are significant differences in how they draw on formal concepts to guide this process. First-year students at one university are asked to articulate their philosophy of teaching. Given that students have acquired very little formal knowledge about teaching, their responses have much weaker epistemic relation. The basis of their judgment (such as decisions for lesson planning, teaching strategies and so on) is presented, from the outset, as legitimated by their personal value system. In two universities, pre-service teachers learn how policies and teacher unions have shaped the formation of teacher identities in South Africa. Identity, then, is presented not an individual journey, but a social one that forms as one appropriates practices and participates in conversations shaped by politics, policy and the priorities of a much wider community of teachers. Their journey of becoming a teacher thus has stronger ER and SR is weakened. Professionalism through Personal Conduct University environments prepare pre-service teachers to develop the 'professional behaviour' that is expected of them in their future workplaces. Certain norms of teachers' professional conduct are developed implicitly through teacher educators' expectations of how students are to conduct themselves on campus. For example, expectations like the on-time assignment submission policy, punctual start of lectures, zero-tolerance of plagiarism, integrity in completing assessment tasks, and the rooting out of discrimination result in an induction into the discipline and knowledge practices of academia, as well as a socialisation into the conduct expected of prospective teachers in their future workplace. Lecturers, particularly those from two universities, emphasised the importance of teachers being 'good' role models for the children. This reflects a stronger social relation but does not depend on any specialised knowledge. These norms for professional conduct can be learnt in the course of everyday life, and so have a weaker epistemic relation. In some universities, criteria in Teaching Practice (TP) assessment rubrics present 'professionalism' as the outer image that pre-service teachers project through their conduct, through their appearance and alongside aspects of their interactions with other school staff (such as the extent to which they are positive, respectful, loyal, courteous). Also included as sections of 'professionalism' are criteria that related to the way in which students worked within the school environment: whether they are organised, punctual, dependable, and participate meaningfully in the activities of the school. Although most TP guidelines alert students to the importance of complying with the SACE Code of Professional Ethics, these criteria are expressed in terms of expectations for appropriate conduct during school-based placements, rather than ethical imperatives that guide their classroom actions. Such criteria both weaken the social relation and the epistemic relation of how teacher professionalism is understood. Teacher Professionalism as an Ethically-Driven Accountability to the Practice During interviews, lecturers from four of the institutions emphasised that understanding of the ethical imperatives that drive teachers' work is an essential aspect of developing their professionalism. These institutions offer coursework where concepts like ethics, ethical decision-making, morality and fairness are explicit objects of study. These modules draw on philosophical insights and therefore have a stronger epistemic relation than those emphasising compliance with conduct guidelines. Pre-service teachers in two of the universities study sociologically-orientated modules on the role schooling plays in reproducing or disrupting unequal power relations in society. Students are introduced to sociological gazes that potentially enable them to notice prevalent exclusionary practices in schools that they might otherwise have overlooked. They are invited to consider their roles (as future teachers and potential agents of reproduction or change) within existing social structures. This coursework seeks to create a cultivated gaze in which there are both stronger epistemic and social relations. Some evidence of an ethical orientation could be found in the teaching practicum assessment rubrics, mainly related to principles of inclusion and use of inclusionary pedagogies. One university merely requires that pre-service teachers have an 'accommodating attitude' towards learner diversity, however others expect pre-service teachers to ' make pedagogical choices that respond intentionally to diversities encountered.' The former is at the level of personal interaction, whereas the latter has implications for informed classroom action. This section considers the way in which ITE programmes transmit messages to pre-service teachers that their professionalism resides in specialist knowledge and their ability to use that knowledge to make reasoned pedagogical judgements in practice. Theoretical Knowledge of Education All five programmes studied contained courses that all pre-service teachers - irrespective of their phase and/or subject specialisation - are required to study as knowledge for practice (Rusznyak, 2015). A strong epistemic relation within the BEd degrees offered by different institutions is exemplified through compulsory modules on education, schooling, teaching and learning. All programmes contained modules that taught prospective teachers about generalised patterns of human development (typically including cognitive, social, moral and emotional development). In addition, all programmes included coursework on intrinsic and extrinsic barriers to learning commonly experienced by children. Just two universities include modules where the knowledge bases of teaching are an explicit object of study. In other programmes, these links are implicit and students are required to work out the links between different courses in their programme themselves. The way in which theoretical knowledge informs teaching practice is therefore less visible in these programmes, and may be a contributing factor in explaining why some teachers struggle to see how research and theory can strengthen teaching practices. Subject and Pedagogical Knowledge for Teachers All programmes included courses that seek to build the subject-specific knowledge of prospective teachers, although a comparative analysis of these courses has shown much variation in terms of time allocation and depth (Bowie & Reed, 2016). All programmes included a criterion in TP assessment rubrics about the content knowledge of students during the practicum, but the weighting varied considerably. In some, content knowledge exists as one of many points on a checklist, whereas in others, high levels of content knowledge constitutes a non-negotiable requirement on the basis of which competence in teaching depends (Rusznyak & Bertram, 2015). Whereas criteria at two universities stipulated that the students' subject knowledge should be 'sound,' 'sufficient,' 'thorough' and 'accurate,' others specify what student teachers are expected to do with that knowledge. For example, comprehensive and well-organised conceptual knowledge ought to enable students to 'foreground main ideas' and 'develop content logically and systematically,' draw on 'appropriate examples from the real world,' and use their knowledge of the subject/topic to inform their justification of pedagogic choices. Subject knowledge is thus not merely one of many aspects needed for competent teaching, but constitutes a basis for important pedagogical choices. In the coursework offered by four universities, pre-service teachers undertake subject-specific pedagogy courses. The use of subject knowledge as a basis for professional judgment is potentially enhanced though subject-specific pedagogy courses, where students are required to account for the pedagogic decisions made in relation to the topic being taught. These potentially establish opportunities for the construction of PCK, however the extent to which students are expected to make knowledge-based pedagogic decisions in their teaching varies across institutions. The importance of students' developing professional judgment is minimised in subject methodology courses that focus exclusively on using pre-developed material to rehearse for confident lesson delivery. Opportunities to develop teachers' professional reasoning are created when pre-service teachers are required to interrogate the selection and sequencing of the knowledge they teach. It is further developed when opportunities are created for them to critical analyse the way in which conceptual knowledge is represented in learning materials, and evaluate the value of the learning opportunities constructed by learner-based classwork and assessment tasks. Furthermore, opportunities for developing pedagogical reasoning are restricted when criteria in the teaching practicum assessment rubric are expressed as technical application of particular strategies rather than in relation to a conceptually informed judgment about the appropriateness of a strategy in a particular situation (Rusznyak & Bertram, 2015). Although during interviews, teacher educators from three universities stressed the importance of students learning to justify their pedagogic decisions, the justification of pedagogic choices is a lesson planning requirement and a formal criterion in the TP assessment instrument at only one of the participating universities. The ability of a student to account for the grounds upon which the pedagogic choices are made is enabled by criteria such as ' [evidence that the student] thoughtfully selects and effectively uses a variety of teaching and learning strategies appropriate to content and learners,' that he/she has the ' ability to reflect in action, and change tack if necessary to do so' and can 'justify reasons for pedagogic choices.' Reflection in and on teaching is required by students at all institutions during their practicum sessions. Students are sometimes provided with specific questions to guide them through a reflection process. The use of concepts to inform their reflection can range from trial-and-error (ER-) or through conceptually guided thinking (ER+). The analysis of the different ways in which professionalism is transmitted to pre-service teachers through five ITE programmes shows that conceptions of teacher professionalism are transmitted through the expectations teacher educators hold of student conduct, the demands in assessment tasks, knowledge selected for inclusion in coursework, the requirements for success during the practicum and the criteria on practicum assessment instruments used. The analysis shows that all five institutions work with conceptions of teacher professionalism as having a relatively strong social relation. However, the extent to which a strong epistemic relation is transmitted as a criterion for what constitutes teacher professionalism differed greatly between the five programmes analysed. I will use the results of the findings to consider hypothetical ways in which the messages of what constitutes teacher professionalism revealed in the analysis of data can be combined to legitimate professional teaching primarily within Relativist, Knower, Knowledge or Elite codes as described by Maton's LCT framework. A summary of the analysis is presented in Table 3 below. In the discussion, I look at the potential for advancing the professionalisation of teaching when the SR and ER of the criteria legitimising teacher professionalism are weakened and strengthened. The criterion that measures teacher professionalism by appearance and dress code has neither social nor epistemic relation. It would thus exemplify teacher professionalism conceptualised as a Relativist Code (where both ER and SR are weakened). If teachers emerge from ITE programmes believing that their appearance, punctuality and demeanour is primarily where their claim to professionalism lies, they would possess a restricted understanding of the intellectual work of professional teaching. These traits, while not unimportant for teachers, are similarly expected of any other occupation that provides a public service. It provides a deficient way of conceptualising the nature of teacher professionalism and consequently cannot contribute to the systemic improvement of teaching across the education sector. An ITE programme that locates teacher professionalism in a Knower code (where ER is weakened, and SR is very strong) is concerned with producing a graduate with the 'right' kind of attributes. The importance of personal disposition and conduct is foregrounded in practicum assessment, and the programme would create opportunities for each pre-service teacher to follow a unique development trajectory that is effectively unchartered. Prospective teachers would be taught that their professionalism lies primarily in their natural disposition, their personally-acquired practical knowledge, and gaze on practice that is cultivated through immersion in the field of practice. This would require extended apprenticeship in the sites of practice, where personalised learning through personal reflection based on experience alone would be valued over insights enabled by theoretical knowledge. Without the lens of theory, all views and perceptions are regarded as equivalent, and there is no recognised authority, despite evidence and/or research that points to some perspectives being more generative than others. Inducting pre-service teachers into a practice where every option is as good as the next means that they do not have access to ordering principles that enable them to distinguish the priorities between the competing demands they inevitably face in their day-to-day practice. Constructing teacher professionalism in this way creates an impression that professional teaching is more about the qualities of teachers as individuals than about being part of a collective that strives for shared excellence within their schools, districts and the education system more broadly. Without understanding that the practice is based on a shared knowledge base and a shared commitment to an ethical imperative, pre-service teachers could leave an ITE programme thinking that their professionalism resides in their disposition and conduct, rather than in drawing on a knowledge base to make conceptually informed judgments. With the focus on individual attributes, attention is deflected from teaching as a communal knowledge-based practice, and the potentially exclusionary structures in which teachers practice. It thus offers limited potential for opening up ways of building a community of highly effective teachers capable of transforming an under-performing education system. ITE programmes that conceptualise teacher professionalism as a Knowledge Code (where ER is strengthened, and SR weakened) would emphasise the existence of a specialised knowledge that transcends individual differences between members of a practice. The competence of a professional teacher would exclusively depend on how much they know and how that knowledge enables them to achieve the purposes of the practice. Legitimating teacher professionalism as a Knowledge code would mean admission to an ITE programme based exclusively on whether applicants could cope with the academic demands of the programme. Their motivation, commitment or dispositions would be inconsequential for admission, and would not be valid grounds for assessment during the programme. Were an ITE programme to legitimise teacher professionalism exclusively in a Knowledge code, the experiential knowledge of classroom life and systems of meaning that prospective teachers bring into their ITE programmes would be deemed irrelevant. Samuel (2009) usefully points out that ignoring the social relations that pre-service teachers hold towards teaching is likely to alienate them from ITE coursework, and severely constrain their appropriation of practices. This conception of teacher professionalism ignores what De Clercq (2013) identifies as being part of what is crucial for meaningful professionalisation of teaching in the South African context: attention to teachers' beliefs, values, and professional identity. Attempts to understand teaching exclusively from a base of abstract professional knowledge ignores the individualise artistry of teaching (Hargreaves & Goodson, 1996; Sockett, 2008). Teachers' personal mission, beliefs and disposition influence their thinking and behaviour in a classroom in both conscious and unconscious ways, such that teachers' practice can neither be hyper-clinical nor purely rational (e.g. Flores, 2006; Korthagen, 2004; Palmer, 2007). A knowledge focus can therefore support but never be sufficient for a practice that, like teaching, is driven by ethical imperatives for learner wellbeing and social justice. In this analysis, an Elite Code (where both social relation and epistemic relation are strengthened) offers the greatest potential for advancing the professionalisation of teaching. It bases its conception of teacher professionalism in both specialist knowledge, and a cultivated gaze that enables a teacher to understand and be responsive to the complexities of classroom life. Pre-service teachers would be taught that there are rational reasons why certain approaches and strategies are more appropriate than others. However, their classroom action ought not to be entirely informed by teaching protocols, but also by what is appropriate given their context and the learning support needs of the children they teach. Principles arising from academic knowledge (including content knowledge, educational theory and pedagogical knowledge), personal dispositions, and experience can be used as a basis for conceptually informed professional judgments that are both ethically driven, and responsive to diverse contextual realities. While acknowledging the varying experiences of teaching and learning that pre-service teachers bring into their ITE programmes, this approach seeks to provide a knowledge base that supports practice, and provides ample opportunities for pre-service teachers to generate conceptually informed rationales for their pedagogic choices and judgment in simulated or actual practice-based contexts. Although teacher educators are expected to prepare teachers as prospective professionals, newly qualified teachers begin their teaching careers in a system characterised by high pressure for bureaucratic compliance, performance management and highly prescriptive curriculum and assessment requirements. Intentionally building ITE programmes with conceptual coherence around the idea of teacher professionalism as an 'Elite' code creates conditions for possibility for preparing teachers that can develop the "teacher mindset and behaviour to take responsibility for the quality of their teaching and school education as a whole" (De Clercq, 2013:18). Advancing professionalism in the South African context requires "deep changes in the intellectual knowledge, mindset and values of teachers" as well as for teachers to develop "stronger professional identities and responsible commitment to learners and quality school education" (De Clercq, 2013:18). However, the professional preparation of pre-service teachers will not make an impact on the education system if the most capable newly qualified teachers are expected to work in environments where they are unable to practice as professionals; where scripted lessons is the norm and further development of their pedagogic reasoning is restricted. The recent initiatives by SACE to begin the development of standards for professional teaching has the potential to open up important conversations amongst practicing teachers about the intellectual basis of their practice, the ethical imperatives and the pedagogic reasoning that their work demands. If these initiatives are merely designed to impose further technical, bureaucratic or performance management obligations on teachers, their potential for advancing teacher professionalism will not be attained. The intentions to develop a supported induction period for newly qualified teachers also has the potential to open spaces for new and mentoring teachers to talk about the pedagogic choices they make in their practice. This paper has argued that the ways in which teacher professionalism is conceptualised and enacted in ITE programmes has important implications for how prospective teachers come to understand and embody their practice. If the quality of professional teaching is to be improved systematically across the sector, pre-service teachers ought not to qualify accepting that becoming a professional teacher is a matter of merely ensuring that they comply with a code of conduct, are patient with learners, and are appropriately attired. A more robust view of teacher professionalism demands consideration of the ethical imperatives that guide relationships and practice, the thoughtful use of theoretical knowledge in response to contextual demands, and personal development that builds capacity for discernment in practice. Teacher educators need to be cognisant of the ways in which they intentionally prepare (and don't prepare) prospective teachers as knowledgeable, thinking practitioners who subscribe to a collective ethical imperative to act in the best educational interests of their learners. This paper has shown how these messages can be embodied in various ways in the coursework and practicum requirements of ITE if pre-service teachers are to qualify with a deep understanding of the nature of their work as prospective professionals. The author acknowledges the ongoing support of the UNESCO Chair Forum in Teacher Education for Diversity and Development. This work is based on the research supported wholly/in part by JET Education Services and the National Research Foundation of South Africa (Grant Numbers 109224) - https://doi.org/10.13039/501100001321.
0.99978
Tour the picturesque location of HGTV Dream Home 2013. HGTV Dream Home 2013 is located in Indigo Park, Kiawah Island's premier green neighborhood. A 10,000-acre barrier island located about 21 miles south of Charleston, Kiawah is known for its natural beauty: tidal marshes, sandy beaches, maritime forests and freshwater ponds. The island is also home to stunning wildlife, from majestic great blue herons to rare sea turtles. An early design by PGA champion and golf course designer Jack Nicklaus, Turtle Point is known for its narrow fairways and small greens, all of which demand great accuracy and intelligent strategies. Golfers can enjoy a mix of scenery throughout the 18 holes, from ocean to marsh. Set along the shores of Kiawah Island, The Sanctuary at Kiawah Island Golf Resort is consistently ranked as one of the top hotels in the country. Completed in 2004, the four-story resort was designed to feel like it's been on Kiawah for centuries, with stately brick and stone walls, elegant ironwork and traditional Southern-style decor. Guests enjoy a wide range of luxurious amenities, from the award-winning spa to the tropical-style Loggerhead Grill. Located at the crossroads of Kiawah, Seabrook and Johns Island, Freshfields Village is a one-stop shop for groceries, home decor, dentists, salons and more. The Village also hosts cultural events, including outdoor concerts and movies, art exhibitions and food festivals. Located about 18 miles northeast of Kiawah, Johns Island is home to beautiful beaches, dozens of wildlife species and hundreds of majestic live oaks -- including Angel Oak, one of the largest living oak trees in the world. Further northeast -- about 40 miles from Kiawah -- Isle of Palms boasts a healthy mix of vacation homeowners and year-round residents. Popular activities on the seven-mile-long island include soaking up the sun on wide, sandy beaches and playing golf at the Wild Dunes resort, which features two Tom Fazio-designed courses.
0.94166
A women's 400 metre hurdles race on a typical outdoor red rubber track. Athletics, also known as track and field or track and field athletics, is a collection of sports events that involve running, throwing and jumping. The name is derived from the Greek word "athlon" meaning "contest". Some languages (e.g. German and Russian) refer to these sports as "light athletics" to distinguish them from "heavy athletics," like weight lifting, wrestling, etc. Athletics was the original event at the first Olympics back in 776 BCE where the only event held was the stadium-length foot race or "stade". The Roman Games – Arising from Etruscan rather than purely Greek roots, the Roman Games deemphasized footraces and throwing. Instead, the Greek sports of chariot racing and wrestling, as well as the Etruscan sport of gladiatorial combat, took centre stage. Other peoples enjoyed athletic contests, such as the Celts, Teutons and Goths who succeeded the Romans. However, these were often related to combat training, and were not very well organized. In the Middle Ages the sons of noblemen would be trained in running, leaping and wrestling, in addition to riding, jousting and arms-training. Contests between rivals and friends may have been common on both official and unofficial grounds. Many athletic sports have found favour in Europe throughout the ages. However, in Britain they fell out of favour between the 13th and 16th centuries due to government restrictions on sports aiming to reduce the practice of archery. After this ban was lifted in the 17th century sports began to flourish once more, but it was not until the 19th century that organization began to appear. This included the incorporation of regular sports and exercise into school regimes. The Royal Military College, Sandhurst has claimed to be the first to adopt this in 1812 and 1825 but without any supporting evidence. The earliest recorded meeting was organised at Shrewsbury, Shropshire in 1840 by the Royal Shrewsbury School Hunt. There are details of the meeting in a series of letters written 60 years later by CT Robinson who was a pupil there from 1838 to 1841. Modern athletic events are usually organized around a 400 metre running track, on which most of the running events take place. Field events (vaulting, jumping, and throwing) often take place in the field in the centre of the running track. Many athletic events have an ancient origin and were already conducted in competitive form by the ancient Greeks. Athletics was included in the first modern Olympic Games in 1896 and has been part of the program ever since, providing the backbone of the Olympics. Women were not allowed to participate in track and field events in the Olympics until 1928. An international governing body, the IAAF was founded in 1912. The IAAF established separate outdoor World Championships in 1983. Other major events include the World Indoor Championships and the European Championships. The sport has a very high profile during major championships, especially the Olympics, but otherwise ranks well down the list of sports by public interest in almost all countries. The leading regular circuit of events takes place in Europe each summer, and includes the Golden League events. The AAU ( Amateur Athletic Union) was the governing body in the United States until it collapsed under pressure from advancing professionalism in the late 1970s. A new governing body called The Athletics Congress (TAC) was formed, it was later renamed USA Track and Field (USATF or USA T&F). An additional, less structured organization, the Road Runners Club of America (RRCA) also exists in the USA to promote road racing. Both organizations allow athletes to receive money for racing putting an end to the " shamateurism" that existed before. There are two seasons for track and field. There is an indoor season, run during the winter and an outdoor season, run during the spring and summer. Most indoor tracks are 200 meters, however, less frequently, there are smaller and larger tracks that measure from between 145 (11 laps to a mile) to 300 meters. The indoor track consists of four to six lanes instead of the eight to ten on an outdoor track. Often an indoor track will have banked turns to compensate for the tight bends. In an indoor track meet athletes contest the same events as an outdoor meet with the exception of the 100 m and 110 m/100 m hurdles (replaced by the 60 m sprint and 60 m hurdles at most levels and sometimes the 55m sprint and 55m hurdles at the high school level), and the 10,000 m run and 3,000m steeplechase. Indoor meets also have the addition of a 3,000 m run normally at both the collegiate and elite level instead of the 10,000 m. The 5,000 m is the longest event commonly run indoors, although there are situations where longer distances have been raced. In the mid 20th century, there was a series of races 'duel races' at Madison Square Garden's (NY) indoor track, some of which featured two men racing a marathon (26.2 miles). However, this is an extremely rare occurrence, for obvious reasons. In some occasions, there may also be a 500 m race instead the open 400 m normally found outdoors, and in many collegiate championship races indoors both are contested. In the field events, indoor meets only feature the high jump, pole vault, long jump, triple jump and shot put. The longer throws of javelin, hammer and discus are added only for outdoor meets, as there is normally not enough space in an indoor stadium to house these events. Other events unique to indoor meets (especially in the United States) are the 300m, 600m, 1000m and 35 lb. weight throw. In some countries, notably Norway, standing long jump and standing high jump are also contested. For multi-event athletes there is the Pentathlon for women (consisting of 60m hurdles, high jump, shot put, long jump and 800m) and heptathlon for men (consisting of 60m, long jump, shot put, high jump, 60m hurdles, pole vault and 1000m). The outdoor track and field season begins in the spring and may last through the summer. Usually the tracks are an oval shape track of 400 meters. However, some old tracks are still measured in yards, so they measure 440 yards. The track consists of 6-10 lanes and, for the bigger tracks, a steeplechase lane with a water pit. This can be inside or outside the track, making for a tighter turn or a wider turn. Often schools will place a playingfield in the middle of the track, usually football/soccer/ lacrosse, due to their size and shape. This inner field is usually known as the infield. Recently, some of these fields have been made out of AstroTurf or FieldTurf instead of grass. Field events consist of the high jump, pole vault, long jump, triple jump and shot put. They also consist of the javelin, hammer and discus throws; however, often these are outside of the stadium because they take up a large amount of space and may damage grass fields. However, many tracks without a playing field in the middle use the infield for the throwing events. There are other variations besides the ones listed below but races of unusual length (e.g. 300 m) are run much less often. The unusual races are typically held during indoor season because of the shorter 200m indoor track. With the exception of the mile run, races based on imperial distances are rarely run on the track anymore since most tracks have been converted from a quarter mile (402.3 m) to 400 meters; almost all recordkeeping for imperial distances has been discontinued. However, the IAAF record book still includes the mile world record (currently held by Hicham El Guerrouj of Morocco for men and Svetlana Masterkova of Russia for women) because of its worldwide historic significance. Sprints: events up to and including 400 m. Common events are 60 m (indoors only), 100 metres, 200 metres and 400 metres. Long distance: runs over 5000 m. Common events are 5000 m and 10000 m. Less common are 6, 12, 24 hour races. Relays: 4 x 100 metres relay, 4 x 400 metres relay, 4 x 200 m, 4 x 800 m, etc. Some events, such as medley relays, are rarely run except at large relay carnivals. Most American high schools run the 4x100 and 4x400, with the 4x400 being the finishing event to the meet. Road running: conducted on open roads, but often finishing on the track. Common events are half-marathon and marathon. The marathon is the only distance run in major international athletics championships such as the Olympics.