proba
float64 0.5
1
| text
stringlengths 16
182k
| timestamp
timestamp[s] | url
stringlengths 15
1.72k
|
---|---|---|---|
0.999375 | I recently was going through some old boxes and came across my old Lionel set I got around 1963. I couldn't resist the erge to set it up and to my surprise it still worked as it did when I got it that christmas, My long winded question is where can I find some info on it?
The engine is a steam type with the number 238 stenciled on the side.
Hello. I can tell you that your set IS from 1963 or 1964. Set #11375 in 1963. Includes a 234W tender with whistle, 6822 searchlight car, a 6465 Lionel Lines tankcar, a 6476 hopper car, a 6414 auto carrier with 4 cars, a 6257 caboose, 1073 transformer, plus track.
If it's a 1964 version, #11460, it still has the 238 loco, the 234W tender with whistle, a 6014 Frisco boxcar, a 6465 Lionel Lines tankcar, a 6142 gondola, a 6176 hopper car, a 6119 DL&W work caboose, a 1073 transformer, and a set of track.
Each set comes with a #147 whistle control. | 2019-04-23T18:28:04 | http://pub28.bravenet.com/forum/static/show.php?usernum=2321686174&frmid=64&msgid=967831&cmd=show |
0.998709 | receiving information from the access device, and transmitting the diagnostic information and the information received from the access device with the diagnostic device over a wireless network to at least one Internet-accessible website.
A telematics method and system includes, and uses, a telematics device with a controller in communication with a diagnostic system configured to receive diagnostic information from a host vehicle; a position-locating system configured to determine location information of the host vehicle; a wireless transceiver configured to transmit and receive information through a wireless network to and from at least one Internet-accessible website; and, a communication interface including at least a short range wireless interface link. The telematics device may be embodied in an access device, which may include the position-locating system. The access device may be a smartphone, or similar device, that retrieves/transmits diagnostic data/information, and other data/information to/from the vehicle via the short range wireless link. The access device performs various telematics device functions; it uses a long range wireless interface to communicate diagnostic and related information to a central host computer, and to receive related information from same.
2. The method of claim 1 wherein the access device comprises a speaker and a microphone.
3. The method of claim 1 wherein the communication interface is a Bluetooth® link.
4. The method of claim 1 wherein the communication interface is an 802.11b link.
5. The method of claim 1 wherein the information received from the access device includes a distress signal input generated from a panic button.
6. The method of claim 1 further comprising transmitting an emergency message that includes the location of the host vehicle and at least a portion of the diagnostic information with the access device through the wireless network to a host computer system in response to receiving a distress signal.
7. The method of claim 2 further comprising transmitting voice signals received from the microphone of the access device and audibly playing voice signals received by the telematics device with the speakers.
transmitting the diagnostic information with the access device over a wireless network to at least one Internet-accessible website.
9. The method of claim 8 wherein the access device is a smart phone.
10. The method of claim 8 wherein the interfacing occurs over a Bluetooth® link.
11. The method of claim 8 wherein the interfacing occurs over an 802.11b link.
transmitting an emergency message that includes the location of the host vehicle and at least a portion of the diagnostic information with the access device through the wireless network to a host computer system in response to receiving the distress signal.
13. The method of claim 8 further comprising performing telematics device features and operations with the access device.
14. The method of claim 13 wherein the access device includes one or more software modules for performing the telematics features.
wherein the access device is configured for transmitting the diagnostic information over a wireless network to at least one Internet-accessible website.
16. The system of claim 15 wherein the access device is a smart phone.
17. The system of claim 15 wherein the access device is configured to perform the interfacing over a Bluetooth® link.
18. The system of claim 15 wherein the access device is configured to perform the interfacing over an 802.11b link.
and wherein the access device is configured for transmitting an emergency message that includes the location of the host vehicle and at least a portion of the diagnostic information with the access device through the wireless network to a host computer system in response to receiving the distress signal.
20. The system of claim 15 wherein the access device is configured for performing telematics device features and operations.
This application is a continuing application of, and claims priority under 35 U.S.C. §120 to, U.S. patent application Ser. No. 11/796,372, which is a continuation-in-part of prior U.S. patent application Ser. No. 10/810,373, now issued as U.S. Pat. No. 7,228,211, filed Mar. 26, 2004, which is (1) a continuation-in-part of prior U.S. patent application Ser. No. 10/431,947, filed May 8, 2003, now issued as U.S. Pat. No. 6,957,133; and (2) a continuation-in-part of prior U.S. patent application Ser. No. 10/447,713, filed May 29, 2003, now issued as U.S. Pat. No. 6,732,031, which is a continuation of prior U.S. patent application Ser. No. 09/776,106, filed Feb. 1, 2001, now issued as U.S. Pat. No. 6,636,790, which claims the benefit of U.S. Provisional Application No. 60/220,986, filed Jul. 25, 2000, U.S. Provisional Application No. 60/222,213, filed Aug. 1, 2000 and U.S. Provisional Application No. 60/222,152, filed Aug. 1, 2000. The contents of the above-listed applications, and patents, are incorporated herein by reference in their entireties.
The invention is generally related to vehicle telematics. In various embodiments, the invention more particularly relates to peripheral access devices operatively associated with vehicle telematics devices and systems to perform many different functions.
Vehicles, such as light-duty cars and trucks and heavy-duty tractor/trailers, can include “telematics” systems that monitor information describing the vehicle's location and diagnostic conditions. Such telematics systems typically include a conventional global positioning system (“GPS”) that receives signals from orbiting satellites and a processor that analyzes these signals to calculate a GPS “fix”. The fix, which features data such as the vehicle's latitude, longitude, altitude, heading, and velocity, typically describes the vehicle's location with an accuracy of about 10 meters or better.
Telematics systems can include circuitry that monitors the host vehicle's diagnostic system. As an example of a diagnostic system, light-duty automobiles and trucks beginning with model year 1996 include an on-board diagnostic (OBD-II) system as mandated by the Environmental Protection Agency (EPA). OBD-II systems typically operate under one of the following communication protocols: J1850 VPW (Ford); J1850 VPWM (General Motors); ISO 9141-2 (most Japanese and European vehicles); Keyword 2000 (some Mercedes and Hyundai vehicles); and CAN (a newer protocol used by many vehicles manufactured after 2004). OBD-II systems monitor the vehicle's electrical, mechanical, and emissions systems and generate data that are processed by a vehicle's engine control unit (ECU) to detect malfunctions or deterioration in performance. The data typically include parameters such as vehicle speed (VSS), engine speed (RPM), engine load (LOAD), and mass air flow (MAF). The ECU can also generate diagnostic trouble codes (DTCs), which are 5-digit codes (e.g., “P0001”) indicating electrical or mechanical problems with the vehicle. Most vehicles manufactured after 1996 include a standardized, serial 16-cavity connector (sometimes referred to herein as an “OBD-II connector”) that makes these data available. The OBD-11 connector serially communicates with the vehicle's ECU and typically lies underneath the vehicle's dashboard.
Heavy-duty trucks typically include a diagnostic system, referred to herein as a “truck diagnostic system”, which is analogous to the OBD-II systems present in light-duty vehicles. Truck diagnostic systems typically operate a communication protocol called J1708/J1587 or J1939 that collects diagnostic information from sensors distributed in the truck, processes this information, and then makes it available through a 6 or 9-pin connector, referred to herein as a “truck diagnostic connector”, which is usually located in the truck's interior.
FIG. 1 is a schematic drawing of an in-vehicle telematics device featuring a wireless modem, GPS, vehicle-communication circuits, and a serial interface for connecting one or more peripheral devices, according to one embodiment of the invention.
FIG. 2 is a schematic drawing of the serial interface of FIG. 1 connecting to peripheral devices including an LCD display and keyboard, a hands-free cellular phone kit, a panic button, a short-range wireless transmitter, and a secondary modem, according to one embodiment of the invention.
FIG. 3 is a semi-schematic drawing of a vehicle's driver and passenger compartments, featuring an in-vehicle telematics device and a peripheral device, according to one embodiment of the invention.
FIG. 4 is a schematic drawing of a vehicle featuring a wireless appliance that communicates with a GPS, a wireless communication network, and an Internet-accessible web site, according to one embodiment of the invention.
FIG. 5A is a semi-schematic drawing of an Internet-accessible web site featuring, respectively, tabs for information relating to diagnostics, location, service records, and text messaging, according to one embodiment of the invention.
FIG. 5B is a semi-schematic drawing of an Internet-accessible web page that links to the web site of FIG. 5A and includes a user interface for sending and receiving text messages, according to one embodiment of the invention.
FIG. 6 is a semi-schematic drawing of an Internet-accessible web page that links to the web site of FIG. 5A and displays a vehicle's diagnostic data monitored by the telematics system of FIG. 1, according to one embodiment of the invention.
FIG. 7 is a semi-schematic drawing of an Internet-accessible web page that links to the web site of FIG. 5A and displays a vehicle's numerical latitude and longitude and a map showing the vehicle's location monitored by the telematics system of FIG. 1, according to one embodiment of the invention.
FIG. 8 is a semi-schematic drawing of an Internet-accessible web page that links to the web site of FIG. 5A and displays a vehicle's service records generated using a data management system for an automotive dealership, according to one embodiment of the present invention.
FIG. 9 is a schematic drawing of the in-vehicle telematics device featuring a wireless modem, GPS, vehicle-communication circuits, and a short-range wireless transmitter, according to one embodiment of the present invention.
FIG. 10 is a schematic drawing of the in-vehicle telematics device featuring a single chipset-based that includes a wireless transmitter, position-locating module, memory, and a microprocessor, vehicle-communication circuits, and a voice interface for transmitting audio information, according to one embodiment of the present invention.
FIG. 11 is a schematic system architecture illustrating various examples of access devices that may communicate with a telematics device in accordance with embodiments of the invention.
FIG. 12 is a schematic system architecture illustrating various examples of sensors that may communicate with a telematics device in accordance with embodiments of the invention.
It is an object of an embodiment of the invention to provide a small-scale, wireless, internet-based telematics system for monitoring and analyzing a vehicle's GPS and diagnostic data. The embodiment of the system includes an in-vehicle telematics device that features a serial interface to one or more peripheral devices, including but not limited to the following: 1) liquid-crystal display (LCD) and keyboard; (2) hands-free cellular telephone kit; 3) panic button; 4) short-range wireless transmitter (e.g., a Bluetooth® or 802.11b transmitter); and 5) a secondary modem (e.g. a satellite modem). In the embodiment, the peripheral devices, which may connect through the serial interface using a universal connector, for example, expand the capabilities of the telematics device to include, among other things, text messaging between a driver and a fleet manager; operation of a cellular telephone in a convenient “hands free” mode; notification of authorities in case of emergency; short-range, high-speed data communication; and world-wide wireless coverage. Embodiments of the invention also provide various access devices and sensors as peripheral devices that operatively interact with in-vehicle telematics systems and devices to perform various functions.
More specifically, in one embodiment, the invention provides an in-vehicle telematics system featuring: 1) a controller; 2) a diagnostic system configured to receive diagnostic information from a host vehicle; 3) a position-locating system configured to determine the host vehicle's location information; 4) a communication interface configured to send additional information to a peripheral system other than the diagnostic position-locating systems; and, 5) a wireless transmitter configured to transmit information through a wireless network to an Internet-accessible website.
In certain embodiments, the peripheral device can be a display, such as an LCD. In this case the controller features machine-readable computer code, e.g., firmware, which controls the display. For example, the computer code can be configured to render a text message on the display. The text message can be sent from the Internet-accessible website, or from a cellular telephone or a personal digital assistant (“PDA”). Preferably the display is configured to mount inside the vehicle. In various embodiments, the peripheral device may include a graphics display.
In other embodiments, the peripheral device features a voice interface that receives audio information and sends the information to the wireless transmitter. For example, the peripheral device can be a hands-free phone kit. The hands-free phone kit can contain a Bluetooth® transmitter configured to send information to and receive information from a user's cellular telephone. Alternatively, the telematics device includes the Bluetooth® transmitter, e.g. it is mounted on an internal circuit board. In still other embodiments, the peripheral device is a short-range wireless transmitter, e.g. a transmitter operating a Bluetooth®, 802.11, part-15, or infrared wireless protocol.
In another embodiment, the peripheral device includes a button (e.g. a “panic button”) that, when depressed, sends a signal through the interface to the controller. Or the peripheral device can be a secondary wireless modem, such as a satellite modem. The interface used in the telematics device may be a serial interface, such as an I<sup>2</sup>C, RS232, RS422, RS485, USB, CAN or SPI serial interface.
In an embodiment, the position-locating system may be a conventional GPS (that interprets satellite signals to determine location) or a network-assisted GPS (that interprets both satellite and terrestrial wireless signals to determine location). The controller may be a microcontroller or a microprocessor, e.g., an ARM7 or ARM9 microprocessor.
In another embodiment, the invention provides an in-vehicle telematics system that features a controller that runs machine-readable computer code configured to receive diagnostic information from a host vehicle and location information from a position-locating system. The controller is additionally configured to receive and send information through a serial interface to a peripheral device other than the diagnostic and position-locating systems. The telematics system uses a wireless transmitter to transmit diagnostic and location information through a wireless network to an Internet-accessible website.
In another embodiment, the invention provides an in-vehicle telematics system that features the above-described components for determining diagnostic and location information combined with a voice interface configured to receive and transmit voice information.
In various embodiments, the same wireless transmitter transmits location information through a wireless network to the Internet-accessible website, and voice information through the same wireless network to an external telephone. Here, the controller further comprises a speech-recognition module, e.g., machine-readable computer code that analyzes a user's speech to determine a telephone number and other commands.
In another embodiment of the invention, the telematics system features a housing that covers the controller and the position-location system, and additionally includes a port that connects to the external peripheral system. In this case, the system can include a cable or a wireless interface that sends information to and receives information from the external peripheral system.
In yet another embodiment of the invention, the invention provides a telematics system that features a short-range wireless transmitter (e.g. a Bluetooth® transmitter) configured to send information to an external peripheral device, and a long-range wireless transmitter (e.g. a cellular modern) configured to transmit information through a wireless network to an Internet-accessible website. The external peripheral device may include a smartphone that has the short-range wireless interface for communicating with the vehicle for retrieving diagnostic information therefrom and for transmitting vehicle commands thereto. The short-range wireless device may be Bluetooth® or Wi-Fi, or other similar technologies. The smart-phone may also include the long-range wireless modem for communicating information and data to a remote host computer. Thus, the smartphone, or similar device, embodies the telematics device functionality, as well as communication capabilities, and transmits and receives vehicle information and data (diagnostic, derived, and other vehicle data and information) to and from the vehicle it is communication with over the short-range wireless communication link. The smartphone device also preferable includes a GPS circuit for position determination purposes. However, to preserve battery life in the smartphone, the telematics device smartphone may use location information transmitted over the short-range wireless link from a separate GPS circuit/device, which receives power from the vehicle.
Various embodiments of the invention have many advantages. In particular, with various embodiments of the invention described herein, different peripheral devices can easily and quickly connect to the telematics device through its serial interface. This means a user can add valuable functionality to the telematics device, and optimize the device for a particular application, in a matter of minutes. For example, using the serial interface, the user can add a simple, LCD display and keyboard. With this, drivers and fleet managers can communicate with text messages to optimize the fleet's efficiency. Or a hands-free cellular telephone kit (e.g., a kit featuring a Bluetooth® module or cradle) can connect through the serial interface to give a driver a safe, convenient way to place cellular phone calls. To even further enhance safety and security, a peripheral device featuring a panic button can connect through the serial interface. Depressing the panic button automatically sends a message to, e.g., a call center, that in turn would notify the appropriate authorities. Peripheral devices running a Bluetooth® or 802.11b wireless protocol can quickly send large amounts of information (e.g., diagnostic information collected and stored over long periods of time) to a proximal hub. And a peripheral device featuring a secondary modem, such as a satellite, GSM/GPRS or CDMA modern, can transmit and receive information in regions in which the primary modem may not operate.
These features, made possible by the serial interface, complement basic advantages provided by the telematics system. For example, embodiments of this system provide wireless, real-time transmission and analysis of GPS and diagnostic data, followed by analysis and display of these data using an Internet-hosted web site. This makes it possible to characterize the vehicle's performance and determine its location in real-time from virtually any location that has Internet access, provided the vehicle being tested includes the below-described telematics system. This information is complementary and, when analyzed together, can improve conventional services such as roadside assistance, vehicle theft notification and recovery, and remote diagnostics. For example, the information can indicate a vehicle's location, its fuel level and battery voltage, and whether or not it has any active DTCs. Using this information, a call center can dispatch a tow truck with the appropriate materials (e.g., extra gasoline or tools required to repair a specific problem) to repair the vehicle accordingly.
Embodiments of the present invention may be useful in a wide range of vehicles. Examples of such vehicles include automobiles and trucks, as well as commercial equipment, medium and heavy-duty trucks, construction vehicles (e.g., front-end loaders, bulldozers, forklifts), powered sport vehicles (e.g., motorboats, motorcycles, all-terrain vehicles, snowmobiles, jet skis, and other powered sport vehicles), collision repair vehicles, marine vehicles, and recreational vehicles. Further, embodiments may be useful in the vehicle care industry.
FIGS. 1 and 2 show schematic drawings of a small-scale telematics device 13 according to an embodiment of the invention that monitors diagnostic and location-based data from a host vehicle and wirelessly transmits these data to an Internet-accessible website. The telematics device 13 features a serial interface 35 that connects to peripheral devices, described in detail below. The serial interface 35 features a connector that mates with an associated connector that is universal to each peripheral device. The telematics device 13 runs firmware, described in more detail below, that recognizes the peripheral device and serially communicates with it so that information can pass across the serial interface 35. The serial interface 35 additionally supplies power and ground so that the peripheral device does not require an additional power supply to operate.
Referring to FIG. 2, for example, peripheral devices according to an embodiment of the invention may include: 1) LCD and keyboard 36a for sending, receiving, and displaying text messages; 2) a hands-free cellular phone kit and voice interface 36b for safe, convenient voice communications; 3) a panic button 36c for sending a short, automated message and location in case of emergency; 4) a short-range, high-bandwidth wireless transmitter 36d operating “Bluetooth®” or 802.11b technology; or 5) a secondary modem 36e, e.g., a cellular or satellite modem.
In addition to the serial interface to peripheral devices 35, the telematics device 13 may feature: 1) a data-generating portion 15 that generates both diagnostic and location-based data; 2) a data-processing portion 17 that processes and wirelessly transmits information; and 3) a power-management portion 19 that supplies power to each circuit element in the device 13.
The circuit elements in each portion 15, 17, 19 may be integrated into small-scale, silicon-based microelectronic devices (e.g., ASICs). This means the entire telematics device 13 may be incorporated into a single “chip set”, described by a reference design, thereby reducing its size, manufacturing cost, and potential post-installation failures.
The data-generating portion 15 may feature a GPS module 20 that receives wireless signals from orbiting GPS satellites through an integrated GPS antenna 21. Once the antenna 21 receives signals from at least three satellites, the GPS module 20 processes them to calculate a GPS “fix” that includes the host vehicle's location-based data, e.g. latitude, longitude, altitude, heading, and velocity. The GPS module 20 calculates location-based data at a programmable interval, e.g., every minute.
The data-generating portion 15 may communicate with the host vehicle through an electrical/mechanical interface 23 that connects to the vehicle's diagnostic connector. As described above, for light-duty vehicles, this connector is an EPA-mandated 16-cavity connector, referred to herein as the OBD-II connector. For heavy-duty trucks, this connector is either a 6 or 9-pin connector, referred to herein as the truck diagnostic connector.
The OBD-II or truck diagnostic connector, may be located underneath the vehicle's steering column, provides direct access to diagnostic data stored in memory in the vehicle's ECU. The entire vehicle-communication circuit 25 manages communication through the electrical/mechanical interface 23 with separate modules 25a-25c for different vehicle buses (e.g., those featured in Ford, GM, Toyota, and heavy-duty trucks). Each module 25a-25e is a separate circuit within the vehicle-communication circuit 25. These circuits, for example, can be integrated into an application-specific integrated circuit (ASIC), or can be included as discrete circuits processed on a printed circuit board.
The vehicle-communication circuit additionally may include logic that detects the communication protocol of the host vehicle, and then selects this protocol to communicate with the vehicle. Once the protocol is selected, the electrical/mechanical interface 23 receives diagnostic data from the vehicle according to a serial protocol dictated by the appropriate vehicle-communication circuit 25. The electrical/mechanical interface 23 passes this information to the data-processing portion 17 for analysis and wireless transmission.
The data-processing portion 17 may feature a 16-bit ARM7 microprocessor 27 that manages communication with each external peripheral device, along with the different elements of the data-generating portion 15. For a peripheral device featuring an LCD display and keyboard, for example, the microprocessor runs firmware that receives and processes an incoming text message, and then displays this text message on the LCD. Conversely, the microprocessor 27 interprets keystrokes from the keyboard, formulates these into a message, and transmits the message through a wireless network, as described in more detail below.
The microprocessor 27 additionally receives and processes diagnostic information from the data-communication circuit 25 and location-based information from the GPS module 20. For example, the microprocessor 27 can process diagnostic data describing the host vehicle's speed, mass air flow, and malfunction indicator light to calculate, respectively, an odometer reading, fuel efficiency, and emission status. These calculations are described in more detail in patent applications entitled “Internet-Based Method for Determining a Vehicle's Fuel Efficiency” (U.S. Pat. No. 6,594,579) and “Wireless Diagnostic System for Characterizing a Vehicle's Exhaust Emissions” (U.S. Pat. No. 6,604,033), the contents of which are incorporated herein by reference.
The microprocessor 27 may store firmware, pre-processed diagnostic data, and/or post-processed diagnostic data in a memory module 29. The memory module 29 also stores a file-managing operating system (e.g., Linux) that runs on the microprocessor 27. During operation, the memory module 29 can additionally function as a “data logger” where both diagnostic and location-based data are captured at high rates (e.g., every 200 milliseconds) and then read out at a later time.
With firmware the microprocessor 27 formats information into unique packets and serially transfers these packets to a wireless modem 31. Each formatted packet includes, e.g., a header that describes its destination and the wireless modern's numerical identity (e.g., its “phone number”) and a payload that includes the information. For example, the packets can include diagnostic or location information, a text message, a short message generated from a panic button that indicates a problem with the user or vehicle. The wireless modem 31 operates on a wireless network (e.g., CDMA, GSM, GPRS, Mobitex, DataTac, ORBCOMM) and transmits the packets through an antenna 33 to the network. The antenna 33 can be an external antenna, or can be embedded into a circuit board or mechanical housing that supports the wireless modem 31. Once transmitted, the packets propagate through the network, which delivers them to an Internet-accessible website, as described in more detail with reference to FIG. 5. In various embodiments, the wireless modem 31 may include or be operatively associated with a wireless transceiver for transmitting or receiving communicated data or other information to/from a given telematics device or system.
The power-management portion 19 of the wireless appliance 13 features a power supply and power-conditioning electronics 39 that receive power from the electrical/mechanical interface 23 and, in turn, supply regulated DC power to circuit elements in the data-generating 15 and data-processing 17 portions, and through the serial interface 35 to the connected peripheral device. In this application, the power-management portion may switch 12 to 14 volts from the vehicle's battery to a lower voltage, e.g., 3.3 to 5 volts, to power the circuit elements and the connected peripheral device. The mechanical interface 23, in turn, attaches to the host vehicle's diagnostic connector, which receives power directly from the vehicle's standard 12-volt battery. An internal battery 41 connects to the power supply and power-conditioning electronics 39 and supplies power in case the telematics device is disconnected from the vehicle's power-supplying diagnostic connector. Additionally, the power supply and power-conditioning electronics 39 continually recharge the internal battery 41 so that it can supply back-up power even after extended use.
FIG. 2 is a schematic drawing of an embodiment that shows the serial interface 35 connected to a variety of peripheral devices 36a-e. Table 1 describes some of the possible peripheral devices 36a-e, the corresponding parameters that are received or transmitted through the serial interface, and the potential applications of these devices. The serial interface supplies power and ground to each peripheral device. For some devices, such as for a hands-free phone kit, these are the only parameters supplied by the serial interface. In this case, the phone kit connects to a user's cellular telephone, which in turn transmits and receives voice calls. In other cases, such as for the LCD and keyboard and secondary modem, the serial interface additionally supplies and receives information (e.g., diagnostic or location information, text messages).
Table 1 is not meant to be exhaustive, and thus peripheral devices not described therein may also connect to the telematics device.
<tables id="TABLE-US-00001" num="00001"><table frame="none" colsep="0" rowsep="0"><tgroup align="left" colsep="0" rowsep="0" cols="3"><colspec colname="1" colwidth="56pt" align="left"/><colspec colname="2" colwidth="105pt" align="left"/><colspec colname="3" colwidth="56pt" align="left"/><thead><row><entry namest="1" nameend="3" align="center" rowsep="1"/></row><row><entry/><entry>Transmitted/Received Serial</entry><entry/></row><row><entry>Device</entry><entry>Information</entry><entry>Application</entry></row><row><entry namest="1" nameend="3" align="center" rowsep="1"/></row></thead><tbody valign="top"><row><entry>LCD and keyboard</entry><entry>location, diagnostics, text messages</entry><entry>fleet management</entry></row><row><entry>hands-free</entry><entry>none</entry><entry>voice calls</entry></row><row><entry>cellular phone</entry><entry/><entry/></row><row><entry>kit</entry><entry/><entry/></row><row><entry>panic button</entry><entry>location, diagnostics, bit stream</entry><entry>vehicle emergency</entry></row><row><entry>high-bandwidth</entry><entry>location, diagnostics, text messages</entry><entry>vehicle repair;</entry></row><row><entry>short-range</entry><entry/><entry>data mining</entry></row><row><entry>transmitter</entry><entry/><entry/></row><row><entry>secondary modem</entry><entry>location, diagnostics, text messages</entry><entry>fleet management;</entry></row><row><entry/><entry/><entry>stolen-vehicle</entry></row><row><entry/><entry/><entry>recovery;</entry></row><row><entry/><entry/><entry>diagnostics</entry></row><row><entry namest="1" nameend="3" align="center" rowsep="1"/></row></tbody></tgroup></table></tables>As shown, Table 1 includes examples of various peripheral devices, the parameters they receive or transmit through the serial interface, and their potential applications.
Each of the peripheral devices 36a-e listed in Table 1 may connect to the telematics device using a standard, 4-pin connector attached to a cable. The connector and cable are designed so to be uniform so that any device that transmits or receives information can connect to and operate with the telematics device. As described above, the pins in the connector supply power, ground, and a serial communication interface that passes information between the telematics device and the peripheral device. The serial interface 35 is controlled by a microprocessor (e.g., an ARM 7 shown in FIG. 1) operating within the telematics device. The ARM 7 runs firmware that recognizes the connected peripheral device, as described in more detail below, and subsequently powers up and begins communicating with the device upon installation.
The serial link for connecting peripheral devices to the serial interface 35 may be a conventional I<sup>2</sup>C bus connected through a 4-pin connection. I<sup>2</sup>C is a 2-wire, synchronous serial communication interface developed by Phillips Semiconductor. With this interface, two wires, serial data (SDA) and serial clock (SCL), carry information between the peripheral device and the telematics device. According to I<sup>2</sup>C, each byte of information put on the SDA line must be 8-bits long, but the number of bytes transmitted per transfer is unrestricted. Using I<sup>2</sup>C, the peripheral device can operate as either a transmitter or receiver. The ARM7 microprocessor controls this connection with an I<sup>2</sup>C transceiver that may be integrated into its circuitry.
Both SDA and SCL are bi-directional lines and connect to a positive supply voltage through a pull-up resistor (which may be between 4.7 k and 10 k). When the bus is free, both lines are high. Each peripheral device connected through I<sup>2</sup>C provides a unique address (generated by, e.g., an EEPROM, RTC or I/O expander) that is recognized by the telematics device. This means, following installation, the telematics device can recognize the attached peripheral device and begin operation without any input from the installer. I<sup>2</sup>C is described in more detail in: http://www.philipslogic.com, the contents of which are incorporated herein by reference.
FIG. 3 of an embodiment shows a schematic drawing of a vehicle 12 that hosts a telematics device 13 that connects to a peripheral device 36 through a cable 37 and serial interface 35. In this application, the peripheral device 36 is a LCD and keyboard mounted on the vehicle's dashboard 38. Once connected during an installation process, the peripheral device 36 transmits a numerical address through the cable 37 to the serial interface 35. A microprocessor in the telematics device interprets the address to recognize the peripheral device, and then begins to communicate.
The telematics device 13 may be installed under the vehicle's dash 38 and is not visible to the user. As described above, the telematics device 13 may connect to an OBD-II connector 34 in the vehicle 12 through a wiring harness 32, and is not in the driver's view. The OBD-II connector 34 powers the telematics device 13 and additionally provides a serial interface to the vehicle's engine computer. Through this interface the telematics device receives diagnostic information from the vehicle's OBD-II system, as is described in detail in the above-referenced patents, the contents of which have been incorporated by reference.
The telematics device 13 receives GPS signals from an antenna 21 mounted in a region, sometimes called the “A pillar”, located proximal to the vehicle's windshield 41. These signals are interpreted by the device and converted into GPS information, e.g. latitude, longitude, altitude, speed, and heading, by a GPS module included in the telematics device. The telematics device transmits GPS and diagnostic information as separate packets through a radio antenna 33, located near the GPS antenna in the vehicle's A pillar, and to a wireless network (e.g., Cingular's Mobitex network). The radio antenna 33 is matched to a frequency supported by the wireless network (e.g., approximately 900 MHz for the Mobitex network). A cabling rig 39 connects both the radio 33 and GPS 21 antennae to the telematics device 13.
The LCD and keyboard, for example, are installed on a front portion of the dash 38 and below the windshield 41, and are positioned so that the driver can easily view messages on the display. Messages can be used for general fleet management, e.g., to notify a fleet manager that a job has been completed, or to schedule an appointment with a customer. In this case, the radio antenna 33 is additionally used to receive and transmit text messages through the wireless network.
FIG. 4 of an embodiment shows a schematic drawing of a telematics system 52 that uses the above-described telematics device 13 to monitor diagnostic and location-based information, and a peripheral device 36 (e.g., an LCD and keyboard) to, for example, display text messages. A fleet manager would use this system, for example, to manage a collection of drivers. The telematics device 13 and peripheral device 36 are installed in a host vehicle 12 as described above. During operation, the telematics device 13 retrieves and formats diagnostic and GPS information and text messages in separate packets and transmits these packets over an airlink 59 to a base station 61 included in a wireless network 54. The packets propagate through the wireless network 54 to a gateway software piece 55 running on a host computer system 57. The host computer system processes and stores information from the packets in a database 63 using the gateway software piece 55. The host computer system 57 additionally hosts a web site 66 that, once accessed, displays the information. A user (e.g. an individual working for a call center) accesses the web site 66 with a secondary computer system 69 through the Internet 67. The host computer system 57 includes a data-processing component 68 that analyzes the location and diagnostic information as described in more detail below.
The host computer system 57 also includes a text messaging-processing component 70 that processes text messages as described in more detail below. Once received by the vehicle, the peripheral device (i.e. and LCD and keyboard) displays the messages for the driver, and additionally allows the driver to send messages back to the fleet manager.
FIG. 5A of an embodiment shows an Internet-accessible web page 66a that allows, e.g., a fleet manager to view GPS and diagnostic information, as well as text messages, for each vehicle in the fleet. The web page 66a connects to the text messaging-processing software component shown in FIG. 4. It would be used, for example, in combination with a vehicle featuring a telematics device and LCD/keyboard peripheral device, such as that shown in FIG. 3.
The web page 66a features tabs 42a-d that link to secondary web pages that display, respectively, vehicle diagnostic information, GPS information and mapping, service records, and text messaging. Each of these web pages is described in detail below.
FIG. 5B of an embodiment, for example, shows a simplified web page 66b that renders when a user clicks the tab 42d labeled “Text Messaging” in the website shown in FIG. 5A. The web page 66b features a window 43 wherein the fleet manager can type in a text message that is then sent through the wireless network and displayed on an LCD for the driver of a particular vehicle. The web page 66b includes a field 44 that lists standard components of the text message, i.e. the destination of the text message, the sender, and the subject of the message. During operation, the fleet manager types the message in the window and wirelessly transmits it to the driver by clicking the “Send” button 46. Similarly, the fleet manager receives incoming text messages in the window 43 by clicking the “Receive” button 48.
The web page 66b shown in FIG. 5B may contain functionality that is consistent with state-of-the-art text messaging software. For example, these pages can link to additional web pages that include software systems for managing the text messages. These software systems include file-management systems for storing and managing incoming and outgoing messages; systems for sending messages to multiple vehicles in the fleet; systems for tracking the status of a message; systems for storing draft and standard, formatted messages (e.g., maps, directions, and standard responses); systems for sending standard messages; and systems for porting information from messages to other applications (using, e.g., Web Services software packages). Other message-processing systems are also within the scope of the invention.
FIG. 6 of an embodiment shows a web page 66c that renders when a user clicks the “Diagnostics” tab 42a on the website shown in FIG. 5A. The web page 66c displays diagnostic data collected from the ECU of a particular vehicle as described above. The web page 66c includes a set of diagnostic data 131 and features fields listing an acronym 132, value and units 134, and brief description 136 for each datum. The web page 66c also includes graphs 138, 139 that plot selected diagnostic data in a time-dependent (graph 139) and histogram (graph 138) formats. Other methods for displaying and processing the diagnostic data are also within the scope of the invention.
During operation of an embodiment, the in-vehicle telematics device automatically transmits a set of diagnostic data 131 at a periodic interval, e.g. every 20 to 40 minutes. The telematics device can also transmit similar data sets at random time intervals in response to a query from the host computer system (sometimes called a “ping”).
Detailed descriptions of these data, and how they can be further analyzed and displayed, are provided in the following patents, the contents of which are incorporated herein by reference: “Wireless Diagnostic System and Method for Monitoring Vehicles” (U.S. Pat. No. 6,636,790); and, “Internet-Based Vehicle-Diagnostic System” (U.S. Pat. No. 6,611,740).
FIG. 7 of an embodiment shows a web page 66d that renders when a user clicks the “Mapping” tab 42b on the website shown in FIG. 5A. The web page 66d displays, respectively, GPS data 154 and a map 158 that together indicate a vehicle's location. In this case, the GPS data 154 include the time and date, the vehicle's latitude, longitude, a “reverse geocode” of these data indicating a corresponding street address, the nearest cross street, and a status of the vehicle's ignition (i.e., “on” or “off” and whether or not the vehicle is parked or moving). The map 158 displays these coordinates in a graphical form relative to an area of, in this case, a few square miles. In some embodiments, the web page 66d is rendered each time the GPS data are periodically transmitted from a vehicle (e.g., every 1-2 minutes) and received by the data-processing component of the website.
Both the map and a database that translates the latitude and longitude into a reverse geocode are hosted by an external computer server and are accessible though an Internet-based protocol, e.g. XML, Web Services, or TCP/IP. Companies such as MapTuit, MapQuest, and NavTech host software that provides maps and databases such as these. Methods for processing location-based data, taken alone or in combination with diagnostic data, are described in detail in the patent application “Wireless, Internet-Based System for Transmitting and Analyzing GPS Data” (U.S. patent application Ser. No. 10/301,010), the contents of which are incorporated herein by reference.
FIG. 8 of an embodiment shows a web page 66e that renders when a user clicks the “Service Records” tab 42c on the website shown in FIG. 5A. The web page 66e displays, respectively, a list of service records 164 for a particular vehicle, and an individual service record 168 that describes a particular example of how the vehicle was repaired. The list of service record 164 shows: 1) the date of the service; 2) a work order number; and, 3) the company providing the service. In addition to this information, the individual service record 168 describes: 1) the type of service; 2) the mechanic that completed the service; 3) the cost of the service; 4) the mileage on the vehicle at the time of the service; and 5) a few comments describing the service.
To display service records like those shown in FIG. 8, the host computer system of an embodiment of the present invention may interface with a data-management system that runs of a computer system at an automotive dealership. Such a system, for example, is the ERA software system developed and marketed by Reynolds and Reynolds, based in Dayton, Ohio. Systems like ERA transfer service records to the host computer system through a variety of means. These include, for example, XML, XML-based Web Services, file transfer protocol (FTP), and email.
The web page can also show service records describing service performed by organizations other than an automotive dealership, e.g., by the vehicle owner or another entity (e.g., Jiffy Lube). These records may be entered by hand into a web page similar to that shown in FIG. 8.
FIGS. 9 and 10 describe alternate embodiments of the invention. These embodiments are based on the telematics device shown in FIG. 1, but include additional hardware components that add functionality to the device. For example, FIG. 9 shows a telematics device 201, similar to the device shown in FIG. 1, which additionally includes a short-range wireless transmitter 200 that sends diagnostic, location, and other information to a remote receiver. The short-range wireless transmitter 200 can be a stand-alone module that attaches to the same circuit board used to support all the components shown in FIG. 9. The remote receiver can be one of the external peripheral devices (such as a display) shown above, or can be a device such as an automotive scan tool, computer system, cellular phone, or PDA. The short-range wireless transmitter 200 may be a high-bandwidth transmitter, e.g., a transmitter using Bluetooth® or 802.11b technology. Alternatively, the short-range wireless transmitter can be a low-bandwidth transmitter, e.g. a transmitter using part-15, infrared, or other optical technology.
FIG. 10 shows alternate embodiments of the telematics device 202 featuring a single chipset 225 that performs multiple functions. The chipset 225, for example, includes a wireless transmitter 231, an ARM microprocessor 227 (which may be an ARM7 or ARM9), a memory module 229, and a position-locating module 220. Each of these components is integrated directly into silicon-based systems on the chipset 225. The components connect to each other through metallization layers in the chipset 225. In addition, the chipset 225 connects to a voice-interface module 210 (e.g., a hands-free interface, including a microphone and a speaker) that receives audio input (e.g. a user's voice) and sends this through the chipset 225 to the wireless transmitter 231 for transmission.
The chipset 225 often runs firmware, stored in the memory module 229 and run on the microprocessor 227, that performs simple voice recognition so that a user can initiate a call, search for and dial a telephone number, and then end a call, all without touching the device. In this capacity the telematics device 202 operates like a cellular telephone integrated with a hands-free phone kit. The wireless transmitter 231 may therefore include a high-bandwidth transmitter, e.g., a transmitter that operates on a CDMA or GSM network. Chipsets such as those manufactured by Qualcomm, e.g., the MSM6025, MSM6050, and the MSM6500, include such wireless transmitters, and can therefore be used in the present invention. These chipsets are described and compared in detail in the following website: http://www.qualcomm.com. The MSM6025 and MSM6050 chipsets operate on both CDMA cellular and CDMA PCS wireless networks, while the MSM6500 operates on these networks and GSM wireless networks. In addition to circuit-switched voice calls, the wireless transmitter 231 can transmit data in the form of packets at speeds up to 307 kbps in mobile environments.
The chipset 225 shown in FIG. 10 determines a location of the host vehicle using the position-locating module 220. In particular, the chipsets described herein may use a position-locating technology developed by Qualcomm called Snap Track/GPSone™, which operates a “network assisted” GPS technology. Snap Track/GPSone™ operates by collecting GPS signals from overlying satellites (like a conventional GPS) and radio signals transmitted from an individual wireless transmitter and base stations (which have known, stationary locations) included in a cellular or PCS wireless network. This information is sent to a position determining entity (“PDE”), which may be typically located in the wireless network and processes the information to calculate an accurate location (e.g., latitude, longitude, and altitude) of the wireless transmitter. Once this information is calculated, the PDE and sends the position back to the wireless transmitter, where the telematics device processes it as described above.
In addition to the above described functions, the chipsets may include modules that support the following applications: playing music and video recordings; recording and replaying audio information; processing images from digital cameras; playing video games; and driving color and black-and-white displays. Each of these applications can be therefore integrated into the various telematics devices and systems described herein.
In various embodiments, and with general reference to FIGS. 11 and 12, one or more types of access devices 1102 and/or one or more types of sensors 1104 may be employed in operative association with one or more vehicle 1101 telematics devices and/or systems 1106, examples of which are described herein. The access devices 1102 may be used as external peripheral devices which are configured for communication with the telematics device 1106 through one or more different types of communication interfaces 1108. Examples of the communication interfaces 1108 include a serial communication interface 1108A (e.g., I<sup>2</sup>C, RS232, RS422, RS485, USB, CAN, SPI, or others), a short range wireless interface 1108B (e.g., transceivers using “Bluetooth®” technology, 802.11a/b/g standard communications, 802.24 standard communications, 802.32 standard communications, “ZigBee” technology, and/or “Wi-Fi” technology, among many others), and/or other communication interfaces 1108C (e.g., parallel port) suitable for sending or receiving data between the access devices 1102 and the telematics device 1106.
As discussed in more detail herein, data communicated between the telematics device 1106 and the access devices 1102 and/or the sensors 1104 may be used to control functions of the devices 1102, 1106 or the vehicle 1101; retrieve or store data; report a detected behavior, condition or characteristic of a device, system, machine, or implement; and/or for a variety of other purposes. In various embodiments, the access devices 1102 and/or sensors 1104 may be equipped or configured for wireless communication, wireline communication, or may have a combination of wireless/wireline capabilities.
In various embodiments, the access devices 1102 and/or sensors 1104 described herein may be installed by an original equipment manufacturer (“OEM”), such as during production of a vehicle 1101, for example, or during initial installation of a telematics device 1106 into the vehicle 1101. Thus, the access devices 1102 and/or sensors 1104 may be installed in operative association with the vehicle 1101 as original equipment manufacturer components. In certain embodiments, the access devices 1102 and/or sensors 1104 described herein may be installed or used in association with the telematics device 1106 in an “after market” setting, such as after a vehicle 1101 has been produced and deployed for a period of time. For example, access devices 1102 and/or sensors 1104 may be installed as after market components on a fleet of vehicles 1101, such as a group of school buses, a fleet of tanker trucks used to transport goods, or a fleet L of rental vehicles.
As shown, the access devices 1102 may include, for example and without limitation: telephones (e.g., wireless phones, wireline phones, cellular phones) 1102A; Internet-enabled phones 1102B; smart phones 1102C; cameras 1102D (e.g., video cameras, digital cameras, web-enabled cameras, Internet protocol video cameras, digital video cameras (still and motion) for obtaining real-time images, camcorders, etc.), personal computer systems 1102E, laptops 1102F, personal digital assistants (PDAs) 1102G, pagers 1102H, displays 1102I (e.g., LCD displays), and/or a variety of other access, display or control devices which can be configured for communication with the telematics device 1106.
Other examples of access devices 1102 that may be configured to interface or communicate with the telematics device 1106 include breathalyzer interfaces 1102J; interfaces to in-vehicle video capture devices 1102K, such as may be used by various law enforcement entities; audio capture devices 1102L (e.g., microphone input); signature pads 1102M for electronic signature capture; active and/or passive RFID scanner technology 1102N; access point or interface for wireless communications 1102O (e.g., 802.11 “hot-spot”); WiFi cameras, telephones, handsets, or other WiFi-enabled devices 1102P; ultra-wide-band (“UWB”) hubs 1102Q; USB cameras, telephones, handsets (audio), or other USB-enabled devices 1102R; identification systems 1102S including card swipe functionality, keypad, biometrics, or barcode readers, such as for identifying or recording vehicle 1101 drivers, cargo contents, deliveries, service calls, and/or other events; collision avoidance devices 1102W; obstacle avoidance devices 1102X; and/or a variety of other suitable types of access devices 1102.
It can be appreciated that the access device 1102 may be any device or appliance that provides one or more of a graphical component, a keyboard, a terminal, or other functionality that permits access to and communication with the telematics device 1106 in the vehicle 1101. The access device 1102, through the communication interface 1108 acting as a bridge, may be used to tap into the existing computing power, data collection capabilities, and/or connectivity functionality of the telematics device 1106.
In certain embodiments, one or more of the access devices 1102 may be configured for voice-over-Internet-protocol (“VoIP”) communications through an Internet, HTTP protocol, or other type of networked medium communication connection established through the telematics device 1106. For example, a cellular phone 1102A may be used to place a VoIP call through wireless communication with the telematics device 1106 through the short range wireless interface 1108B. In another example, a handset for a wireline phone 1102A may be electrically wired and/or mechanically connected to the telematics device 1106 to enable VoIP communications through the serial communication interface 1108A. For example, a USB voice handset of an Internet-enabled phone 1102B may be configured to communicate with a router in the telematics device 1106 and establish a VoIP connection with a phone call recipient through a modem connection of the device 1106. In a like manner, VoIP communications may be received by the telematics device 1106 from a caller outside of the vehicle 1101 and forwarded to a user employing a cellular phone 1102A in the vehicle 1101, for example.
It can be seen that the capability for such VoIP or telephony communications may be provided through the existing Internet or network connection of the telematics device 1106 (e.g., modem connection) and power supplied by the vehicle 1101 in which the telematics device 1104 is installed. In certain embodiments, functions normally performed by the microphone or audio speaker of an access device 1102 may be routed to functionally analogous components within the vehicle 1101. For example, a user may employ a wireless phone 1102A to place a telephony-enabled call through the telematics device 1106, and may use audio speakers within the vehicle 1101 to listen to the recipient of the call. Where appropriate and operationally possible, various functions of the access devices 1102 may be assigned to or performed by functionally analogous devices or components in the vehicle 1101, or by other devices or peripherals connected to the telematics device 1106.
In various embodiments, telephone communications may be forwarded or routed through and by the telematics device 1106 to the access device 1102 (e.g., a wireless phone 1102A). In such embodiments, the communication capability of the telematics device 1106 can place, connect, and/or terminate telephone calls, and the access device 1102 can be configured to operate as a “dumb” terminal for receiving telephone communications. For example, a telephone communication may be facilitated by using a voice channel in the telematics device 1106 which sends the communications back to a voice handset functioning as a dumb terminal. Also, the telematics device 1106 may leverage the antenna, speakers, or other devices in the vehicle 1101 to assist with transmitting and/or receiving such communications.
The benefits of enabling and facilitating VoIP communications through the telematics device 1106 can be appreciated especially in those situations in which a user does not have access to a separate cellular phone 1102A, for example, or otherwise cannot establish communications outside of the vehicle 1101 independently of the operation of the telematics device 1106. Using an existing access device 1102 of a user realizes the benefits of using prestored or previously known information associated with the device 1102 or the user (e.g., others already know the user's telephone number, phone numbers are stored in the telephone, etc.).
In various embodiments, the telematics device 1106 may be configured to transmit position location information (e.g., GPS data) to one or more of the access devices 1102, including access devices 1102 with little or no existing position location functions. In certain embodiments, the access device 1102 (e.g., a wireless phone 1102A) may be operatively associated with a position location transceiver device 1122, which is capable of receiving and processing communicated position location data. The position location device 1122 may be embodied as a module or chip that can be operatively connected to the access device 1102 and configured to function as both a GPS receiver (i.e., for receiving position location information from the telematics device 1104) and a short range wireless transceiver (i.e., for enabling communications such as “Bluetooth®” transmissions with the access device 1102). The position location device 1122 may be configured to interact with a suitable navigation software application, for example, that can be downloaded and stored on the access device 1102 to process position location data communicated by the position location device 1122.
It can be seen that the access device 1102 may be effectively converted into a personal navigation device (“PND”) 1102T for the user. In certain embodiments, the PND 1102T may include one or more maps or other geographical representations stored thereon to provide turn-by-turn navigational functionality for a user. Such maps and geographical representations may be downloaded and stored on the PND 1102T through a network connection with the telematics device 1106, for example, or by retrieving information stored on a secure digital (“SD”) card. In one example of its operation, the PND 1102T may receive position location data communicated by the telematics device 1106, for example, and/or from another source of position location data, via the position location device 1102T. In connection with the navigation software application, and possibly one or more maps stored on the PND 1102T, the PND 1102T may employ a speaker phone capability to announce turn-by-turn navigational directions to a user in the vehicle 1101 (e.g., “turn right in 500 yards”, “turn right now”, etc.).
In various embodiments, one or more types of access devices 1102 can be configured to work in cooperation with the telematics device 1106 to perform various functions in association with different operational features of the vehicle 1101. For example, a smart phone 1102C may be configured with a software application that allows a user to direct the telematics device 1106 to open or close the windows of the vehicle 1101; to lock or unlock the vehicle 1101; and/or, to initiate ignition on or off for the vehicle 1101. As described above, commands communicated from the access device 1102 to the telematics device 1106 may be effected through the short range wireless interface 1108B, for example. In such embodiments, it can be seen that the access device 1102 initiates communication with the telematics device 1106 to issue commands regarding operations or functions to be performed by the vehicle 1101.
Examples of other operations or functions of the vehicle 1101 that can be performed include, without limitation: turn on or off an air conditioning system; initiate or stop a panic alarm; turn on or off interior or exterior lights; perform functions that might otherwise be provided in association with a remote key device for the vehicle 1101, such as remotely turning the vehicle 1101 engine on or off; turn on or off electric seat warmers, window defrosters, or other creature comfort systems; and/or, detect vehicle settings, such as what transmission gear is currently selected for the vehicle 1101.
In another example, an alarm system 1104K installed in the vehicle 1101 may be operated (as a sensor 1104K, for example) by using the access device 1102 to communicate with the telematics device 1106 to issue commands that arm, disarm, activate, deactivate, or perform other functions for the alarm system 1104K. In addition, the access device 1102 working in operative connection with the alarm system 1104K can be configured to communicate or display status information such as whether the alarm system 1104K is currently armed or disarmed, activated or not activated. The alarm system 1104K may also include one or more sensors (e.g., infrared, sonar, optical sensors, etc.) configured to detect the presence or absence of a human, animal or other object or organism in the vehicle 1101, such as a human intruder waiting to highjack the vehicle 1101 once the owner returns and enters the vehicle 1101, for example. The alarm system 1104K may be configured to communicate information indicative of the presence or absence of such organisms or objects to the access device 1102, for example, to alert a user of their presence or absence.
It can be appreciated that communications between the access device 1102 and the telematics device 1106 may be encoded, secured, and/or verified on a one-way or two-way basis to promote ensuring that communications are valid. In addition, applications executed by the access device 1102 may be password-protected to restrict access to only certified users. In certain embodiments, the access device 1102 or the telematics device 1106 may automatically initiate a verification check once the devices 1102, 1106 are sufficiently close in proximity to initiate effective short range wireless communications. The verification check may include comparing an identification number, security device, or token of the access device 1102 against an identification number, security device or token of the telematics device 1106 to confirm that the user is permitted to direct the features or functions of the vehicle 1101.
In one example of the operation and use of the access device 1102, a software application may be provided in association with the device 1102 that directs the vehicle 1101 to start or stop automatically every morning at a predetermined time on one or more predetermined days (e.g., business days such as Monday through Friday). In addition, the telematics device 1106 may be configured to initiate communications with the access device 1102 after a function has been started or completed. For example, once the access device 1102 communicates with the telematics device 1106 to start the vehicle 1101 in the morning, the telematics device 1106 may return a communication to the access device 1102 to confirm that the engine of the vehicle 1101 has been started. The telematics device 1106 may also initiate such confirmation communications through its own wireless modem or other network connection.
In various embodiments, the access device 1102 may be employed to retrieve current or historical data or other information stored by the telematics device 1106. Such data may include, for example, miles per gallon information or a maximum speed achieved within a given time period. In another example, the telematics device 1106 may be configured to permit a user to download a histogram for the most recent trip taken for a vehicle, including a record (e.g., histogram) of every speed that has been attained by the vehicle in the last day, week, month, year, or other time period. In general, any information or data regarding an operational feature, function, or reported malfunction that can be retrieved or stored by the telematics device 1106 can be communicated to the access device 1102. Data or information retrieved from the telematics device 1106 may be stored and/or displayed on the access device 1102. It can be seen that the access device 1102 may be employed as a diagnostic scan tool, for example, in association with receiving, storing, and/or displaying data communicated by the telematics device 1106.
In various embodiments, the access device 1102 may include a general purpose analog or digital I/O peripheral connection module 1102U structured for serial communications (e.g., through DB9, DB25 or USB cables) or parallel data communication. For example, the connection module 1102U may be embodied as a set of screw terminals that allow a user to employ a variety of different kinds of cables, wires, terminals, or other connectors to connect a system, device or appliance to the telematics device 1106. The connection module 1102U thus enables a variety of custom analog or digital applications, devices or systems to be connected for communication of data, information and/or signals with the telematics device 1106.
In various embodiments, the access device 1102 may be embodied as a message display terminal or mobile data terminal (“MDT”) 1102V which is configured to receive and display data communicated from the telematics device 1106. The MDT 1102V may be a screen display, for example, associated with a telephone, a PDA, a laptop, or another type of access device 1102 having a graphical component. In certain embodiments, the MDT 1102V may be a hardware device which is a one-way display, for example. The MDT 1102V may be electroluminescent and/or include an LCD display.
In various embodiments, a first access device 1102 may serve as an intermediary for communication of data or information to a second access device 1102 or other access devices 1102. For example, an LCD display 11021 connected to the telematics device 1106 may be configured to send substantially identical display information for presentation on the smart phone 1102C of a user, wherein the smart phone 1102C can be configured to receive the display information from the LCD display 11021.
The access device 1102 and telematics device 1106 may also be configured to enable access through the wireless modem or network communication connection of the telematics device 1106, such as to retrieve diagnostic information from a website or web server for display to a user, for example. It can be seen that such embodiments effectively couple a short range wireless communication 1108B between the devices 1102, 1106 with a network medium connection (e.g., Internet or intranet connection) initiated by the telematics device 1106.
In various embodiments, the telematics device 1106 may be configured for communication with one or more sensors 1104 installed on, within, or in association with the vehicle 1101. For example, the sensors 1104 may include, without limitation, pressure transducers 1104A, electrical switches 1104B, mechanical switches 1104C, magnetic switches 1104D, optical sensors 1104E, light detection devices 1104F, sonic detection devices 1104G, sonar systems 1104H, radar systems 11041, proximity sensors 1104) (e.g., for promoting collision avoidance and/or obstacle avoidance), alarm systems 1104K, infrared sensors 1104L, temperature sensors 1104M, air detection sensors 1104N (e.g., for monitoring tail-pipe emissions), or weight measurement devices 1104O. As with the access devices 1102 described above, the sensors 1104 and the telematics device 1106 may be configured for short range wireless communication 1108B, for example, to exchange data or other information. The telematics device 1106 may be configured to trigger an action automatically in connection with operation of the sensors 1104. Such triggered actions may include, for example, one or more of storing data, communicating data, notifying a user of an event (e.g., triggering an alarm), and/or issuing a command or instructions to another device or system.
For example, a temperature sensor 1104M may be placed in a refrigerated truck 1101 to detect temperature in the storage portion of the truck 1101. Temperature data may collected, stored, and/or analyzed at different times or trip milestones for the truck 1101 throughout its trip to ensure that stored food products, for example, do not thaw, spoil or become susceptible to salmonella, bacteria, or other pathogens. In operation, temperature data can be detected by the temperature sensor 1104M and communicated to the telematics device 1106. The telematics device 1106 may store or report the temperature data for further processing by the driver, owner and/or fleet manager for the truck 1101. If the temperature data are outside of a predetermined acceptable range or limit, for example, then an alert or other notification can be generated to communicate the temperature condition in the storage area of the truck 1101. For example, a food carrier may identify a problem if the refrigerator in the truck 1101 is normally at 20 degrees and then rises to 30 degrees. In this example, the food has not yet spoiled, and there may be sufficient time to send another truck to rendezvous with the first truck 1101 and exchange the truckload.
In another example, the vehicle 1101 can be provided with a power take-off (“PTO”) sensor 1104P to detect activation, engagement or other use of a variety of PTO implements. For example, the PTO sensor 1104P may be attached to drill bits, winches, cranes, lifts, shafts, gear drives, spades, buckets, cutting implements, digging implements, earth-moving implements, boring implements, mowers, high-rangers or mechanical arms, dumping implements, mixing implements, fire containment or extinguishing equipment (e.g., water hoses on a fire truck), and/or any other device or system that at least partly employs PTO power to function. In general, any component of a vehicle 1101 that derives or takes-off mechanical power from a main shaft of the vehicle 1101 can be considered a PTO implement. For example, a tractor may be used to mow tracts of grasslands by engaging a PTO shaft to activate the mower cutting blades. The engine of a car may be used, for example, to operate a winch to tow a boat behind the car. The PTO sensor 1104P may detect and communicate data indicative of when the PTO implement is activated, deactivated, and/or operating at less or more than a nominal level. The PTO sensor 1104P may also be configured to detect operating conditions of the PTO implement, such as speed of rotation, duration of use, time of use, and/or location of use, among others.
It can be seen that the various sensors 1104 described herein may be used to detect unauthorized vehicle 1101 access or use. For example, suppose a tractor owned by a utility company is equipped with a mower implement designed for mowing grass and is also equipped with the PTO sensor 1104P. The utility company may detect unauthorized use of the mower if the PTO sensor 1104P senses a shaft turning at a time outside of regular business hours, for example, or at a location not scheduled for mowing activity (e.g., the home of an employee). The PTO sensor 1104P may also be associated with operator identification, such that some operators may be authorized to use certain equipment but not other equipment. For example, driver A may be qualified to drive the vehicle 1101 and use a PTO implement, but driver B may be qualified only to drive the vehicle 1101. Thus, a notification of PTO activation provided by the PTO sensor 1104P through the telematics device 1106 may indicate that an operator has improperly engaged a PTO implement.
In another example, a sonic detector 1104G may be configured to monitor cargo in a container or other storage area of a vehicle 1101. The sonic detector 1104G may be configured to monitor whether load shifting is occurring in a pallet of boxes on a truck. In operation, the sonic detector 1104G may be configured to periodically or repeatedly transmit sound waves to the cargo, and receive reflected sound waves therefrom, to determine if the mass of the cargo has shifted in the storage area. An excessive amount of shift may be reported to the cargo transporter, for example, through communication of the shift indication data from the sonic detector 1104G through the telematics device 1106.
In another example, a school bus 1101 may employ yellow or red flashers, for example, to notify other drivers on the road that students are preparing to board or exit the bus 1101. An optical sensor 1104E may be employed on the bus 1101 to detect whether or not the bus 1101 operator has properly engaged the flashers at a stop. For example, the telematics device 1106 may detect when the bus 1101 is in park with the engine running, or may check GPS data to confirm that the bus 1101 is at or near a scheduled stop. In association with these detected conditions, the optical sensor 1104E may report data to the telematics device 1106 indicative of whether or not the flashers of the bus 1101 have also been engaged.
Other embodiments are also within the scope of the invention. In particular, hardware architectures other than that described above can be used for the telematics device. For example, the ARM7 microprocessor used to run the appliance's firmware could be contained within the GPS module. Or a different microprocessor may be used. Similarly, serial protocols other than I<sup>2</sup>C can be used to communicate with the peripheral devices. These may include USB, CAN, RS485, and/or SPI, for example, among others.
Web pages used to display the data can take many different forms, as can the manner in which the data are displayed, the nature and format of the data, and the computer code used to generate the web pages. In addition, web pages may also be formatted using standard wireless access protocols (WAP) so that they can be accessed using wireless devices such as cellular telephones, personal digital assistants (PDAs), and related devices. In addition, these devices can display text messages sent using the above-described system. In still other embodiments, the above-described system is used to locate vehicle or things other than cars and trucks, such as industrial equipment or shipping containers.
In general, it will be apparent to one of ordinary skill in the art that some of the embodiments as described hereinabove may be implemented in many different embodiments of software, firmware, and hardware in the entities illustrated in the Figures. The actual software code or specialized control hardware used to implement some of the present embodiments is not limiting of the present invention. Thus, the operation and behavior of the embodiments are described without specific reference to the actual software code or specialized hardware components. The absence of such specific references is feasible because it is clearly understood that artisans of ordinary skill would be able to design software and control hardware to implement the embodiments of the present invention based on the description herein with only a reasonable effort and without undue experimentation.
Moreover, the processes associated with some of the present embodiments may be executed by programmable equipment, such as computers. Software that may cause programmable equipment to execute the processes may be stored in any storage device, such as, for example, a computer system (non-volatile) memory, an optical disk, magnetic tape, or magnetic disk. Furthermore, some of the processes may be programmed when the computer system is manufactured or via a computer-readable medium at a later date. Such a medium may include any of the forms listed above with respect to storage devices and may further include, for example, a carrier wave modulated, or otherwise manipulated, to convey instructions that can be read, demodulated/decoded and executed by a computer.
It can be appreciated, for example, that some process aspects described herein may be performed, in certain embodiments, using instructions stored on a computer-readable medium or media that direct a computer system to perform the process aspects. A computer-readable medium can include, for example, memory devices such as diskettes, compact discs of both read-only and read/write varieties, optical disk drives, and hard disk drives. A computer-readable medium can also include memory storage that can be physical, virtual, permanent, temporary, semi-permanent and/or semi-temporary. A computer-readable medium can further include one or more data signals transmitted on one or more carrier waves.
A “computer” or “computer system” may be, for example, a wireless or wireline variety of a microcomputer, minicomputer, laptop, personal data assistant (PDA), wireless e-mail device (e.g., BlackBerry), cellular phone, pager, processor, or any other programmable device, which devices may be capable of configuration for transmitting and receiving data over a network. Computer devices disclosed herein can include memory for storing certain software applications used in obtaining, processing and communicating data. It can be appreciated that such memory can be internal or external. The memory can also include any means for storing software, including a hard disk, an optical disk, floppy disk, ROM (read only memory), RAM (random access memory), PROM (programmable ROM), EEPROM (electrically erasable PROM), and other computer-readable media.
It is to be understood that the figures and descriptions of the embodiments of the present invention have been simplified to illustrate elements that are relevant for a clear understanding of the present invention, while eliminating, for purposes of clarity, other elements. Those of ordinary skill in the art will recognize that these and other elements may be desirable. However, because such elements are well known in the art, and because they do not facilitate a better understanding of the present invention, a discussion of such elements is not provided herein.
In certain embodiments of the present invention disclosed herein, a single component can be replaced by multiple components, and multiple components replaced by a single component, to perform a given function or functions. Except where such substitution would not be operative to practice embodiments of the present invention, such substitution is within the scope of the present invention.
The foregoing description refers to the accompanying drawings that illustrate certain exemplary embodiments of the invention. Those skilled in the art will appreciate that other embodiments of the invention are possible and modifications may be made to the embodiments without departing from the spirit and scope of the invention. Therefore, the examples and illustrations presented in the foregoing detailed description are not necessarily meant to limit the present invention. Rather, the scope of the invention is defined by the appended claims.
Washicko, Paul, Banet, Matthew J., Lowrey, Larkin H., Borrego, Diego A., Wettig, Alan, Link, Charles M. II, Lightner, Bruce Davis, Berkobin, Eric C.
Sponsoring Entity: Verizon Telematics Inc. | 2019-04-24T14:31:54 | https://insight.rpxcorp.com/pat/US20110118934A1 |
0.999932 | What kind of knowledge, skills, and personality traits are common in successful entrepreneurs? originally appeared on Quora - the place to gain and share knowledge, empowering people to learn from others and better understand the world.
The traits that drive startup founders forward are sometimes seen in a negative light.
Entrepreneurs can be seen as aggressive, impatient, hard-headed. And yes, there are plenty of founders who fit that description.
But that's only because entrepreneurs usually have a strong instinct around what products will work for people. They push ahead even when others can't see what they're after.
And not all of the traits that lead to entrepreneurial success are viewed so negatively. In fact, many of the attributes founders tend to share are essential to their success in relating to others and figuring out what people need.
Technology develops at different rates and in different ways around the world. Curiosity about those differences is an important attribute for any entrepreneur.
Each country has their own interesting, unique economy. And although people in China, the U.S., Japan, or Korea have a common set of desires, they also have different business and social climates. So, people in each place tend to come up with solutions that are distinct from other parts of the world.
I'd encourage any budding entrepreneur to take a trip to China and witness how technology is developing there. Absorbing differing ideas and concepts is a valuable experience for a founder.
Entrepreneurs need impatience in order to recognize inefficiencies and capitalize on them.
People often think of impatience as an unsavory personality trait. But it can actually be very beneficial for an entrepreneur who's trying to create a product that solves an inefficient situation.
Part of the reason I started Spin was because I was constantly waiting on Ubers to pick me up and work their way through the traffic around my office. I was impatient, and I decided to craft a solution for my problem rather than waiting around for someone else to solve it.
On some level, most people understand there's a better way to do things. And they'd choose that better way if it were available. Taking action and pursuing that solution is what sets entrepreneurs apart.
It's important for any entrepreneur to have a good network of like-minded people to engage with and use for support. It helps tremendously to have people around you who are constantly looking for and solving problems.
I've noticed that great ideas often come from casual meetings and brainstorming sessions. It's not necessarily one person in a garage coming up with a world-changing idea and then championing it all the way to a multi-million dollar exit.
Being social and developing that group gives you an opportunity to brainstorm and confirm your ideas and concepts with other people.
The basic necessities of a happy life should always be on an entrepreneurs mind. Food, shelter, companionship, entertainment, simplicity--these are all things that people either need or have a strong desire to obtain.
And entrepreneurs have to learn to be perceptive about the problems and inefficiencies around them that relate to human needs.
If you're paying attention to what people require, you can find opportunities to improve their experience and help in their pursuits of those needs. Those are the ideas that people will engage with and come to rely on--the ones that help them obtain the essential things in life.
There are plenty of ways to solve a puzzle. For instance, some people just start picking up pieces and seeing what fits. And that can work, but the task becomes much easier when you begin to think about why each piece fits where it does.
For example, bikeshare companies in China are virtually free because they are largely subsidized by two internet giants--Alibaba and Tencent. But in the U.S., Facebook and Google aren't in the business of funding bikeshare companies.
So, while the general idea of sharing bikes could be transplanted, we knew we had to think about what reasoning would actually make sense in the US. And we eventually had to change the business model to rely more on per-ride revenue.
Every entrepreneur has to find the balance between stubbornness and flexibility.
You have to be stubborn enough to keep persevering and working on your idea, even when people tell you it's silly or you begin to doubt yourself. But you also need to have the flexibility to recognize your first attempt may have been off the mark.
That's happening right now at Spin. We began with bike sharing, but eventually we realized scooters are the better product for American cities. At the outset, we understood the problem, but we didn't have the exact solution nailed down. We're staying flexible enough to recognize a better solution when we see it.
There's nothing wrong with tweaking your idea or pivoting to respond to consumer demands. It's just one of several qualities an entrepreneur can benefit from.
Startup Founders and Entrepreneurs: Which startups were rejected several times by VCs before getting funded?
Technology: What will the tech job landscape look like ten years from now?
Business: What are the biggest lessons you've learned in the corporate world? | 2019-04-21T08:20:22 | https://www.inc.com/quora/6-important-traits-all-successful-entrepreneurs-have-in-common.html |
0.998418 | Yesterday's posting about the new Bobby Campbell cover art for Zen Without Zen Masters by Camden Benares reminded me of something: Robert Anton Wilson praised it highly in the original version of his novel Schroedinger's Cat II: The Trick Top Hat, reprinted in shorter form in the one volume edition of Schroedinger's Cat that's the current version in print.
The original version had a chapter, "Not to Cross," that's chopped out of the later version. It includes a reference to Operation Mindfuck that's on page 171 of the original Pocket paperback.
OM, the chapter explains, is "Wilson's name for the group art-work including the Illuminatus volumes, Dr. Timothy Leary's What Does WoMan Want? Gregory Hill's Principia Discordia and Camden Benares' Zen Without Zen Masters."
Obviously, that puts Benares' book in some pretty heavy company.
As it turns out, Arthur Hlavaty used to correspond with Benares. This interesting blog post reveals that Benares died in 2000 (read the comments after you read Arthur's post).
Oh and hey! Does anyone know anything about Samuel R Delany?
I'm down to my last 2 classes at Temple University and he's my senior capstone creative writing professor.
Delany is a very good, very famous old science fiction writer; I only got to hear him speak once at a convention. He's best known for a massive avante garde novel called "Dhalgren," but I always liked his early stuff, particularly "Babel-17" and his short story collection, "Driftglass." His autobiography also is interesting. His class should be very interesting. Don't know if he ever read "Illuminatus!" or what he thinks of it.
I had never heard of him before, but googled him after a surprisingly interesting first class, and was very impressed by what I found!
What is the significance of the chapter's title?
I know that there is a rule in G Spencer Brown's Laws of form which says "to cross again is not to cross", or something like that, and I recall all the "sub-chapters" in schroedinger's cat being quite short. is there some connection between Laws of Form and OM?
Zen Without Zen Masters internally radiates all of the power of Info-Psychology and Prometheus Rising, if the reader uses heart-based cognition to tap into it. It uses a very Oriental, harmonic, and rhythmic method to produce related effects as those other books. | 2019-04-26T01:40:51 | http://www.rawillumination.net/2013/01/about-camden-benares.html |
0.999996 | Are dogs that are fed from a raised bowl at an increased risk of gastric dilation volvulus (GDV) compared with dogs that are fed from a bowl on the floor?
Raised feeding bowls are available commercially and are sometimes recommended by veterinary nurses to assist elderly arthritic dogs to comfortably access their feed ration. A client with an elderly dog is attending a senior wellbeing clinic and asks for advice on whether they should use one of these feeders. The dog is a large or giant breed dog of the type at increased risk of developing a gastric dilation volvulus.
The literature searches uncovered two papers (Glickman et al. 2000; Pipan et al. 2012) that directly addressed the PICO question. Of these, one of the studies (Pipan et al., 2012) found no significant effect of feeder height on risk of having a GDV episode. One paper (Glickman et al., 2000) found that dogs that were fed from a raised bowl were significantly more likely to present at a clinic with a GDV episode. However, the height of the bowl that increased the risk differed according to whether the dog was a large or giant breed. No studies found a decreased risk of GDV as a consequence of feeding a dog from a raised bowl.
Nb. This study was derived from a larger prospective cohort study carried out by the authors. 1991 dogs initially enrolled on this study; however, for inclusion in the current study, dogs needed to be 6 months or older, and owners needed to have provided vital status information (undefined in the paper) and have completed the detailed questionnaire initially sent out to owners.
Owners were contacted in 1997, 1998, and 1999 to find out if, over the duration of the study, their dog had developed a GDV and if so, whether the dog died or survived.
Outcome Studied: The outcome measure was whether the dog developed an episode of GDV during the course of the study and whether it survived this episode. The study then looked for non-dietary related factors that were associated with an increased risk of developing GDV in the population studied.
Was the food bowl raised?
What was the height of the food bowl?
(relevant to PICO question): Feeding from a raised bowl significantly increased the risk of GDV (adjusted relative risk 2.10, 95% confidence interval: 1.4 – 3.30, P = 0.001).
The relative risk posed by feeding from a raised feeder was 2.17 (95% confidence interval: 1.27 – 3.71; P = 0.01).
4% of the cases of GDV could be attributed to the dog being fed from a raised feeding bowl.
The incidence (± 95% confidence interval) of GDV per 1000 dog years was 18 (12 – 24), for dogs fed from the floor (n = 625).
The incidence (± 95% confidence interval) of GDV per 1000 dog years was 40 (24 – 56) for dogs fed from a raised feeder (n = 264).
The relative risk posed by feeding from a raised feeder was 1.99 (95% confidence interval: 1.00 – 3.95; P = 0.05).
8% of the cases of GDV could be attributed to the dog being fed from a raised feeding bowl.
The incidence (± 95% confidence interval) of GDV per 1000 dog years was 17 (7 – 27) for dogs fed from the floor (n = 341).
The incidence (± 95% confidence interval) of GDV per 1000 dog years was 34 (22 – 46 for dogs fed from a raised feeder (n = 401).
Large breeds: Dogs that were fed from a bowl ≤ 1 foot high (n = 105) were 3.06 times (95% confidence interval: 1.60 – 5.87, P = 0002) more likely than dogs that were not fed from a raised bowl (n = 625) to experience a GDV.
The incidence (± 95% confidence interval) of GDV per 1000 dog years was 56 (26 – 86) for dogs fed from a bowl ≤ 1 foot high.
Dogs that were fed from a bowl > 1 foot high (n = 144) were no more likely to experience a GDV than dogs not fed from a raised bowl (n = 625).
The incidence (± 95% confidence interval) of GDV per 1000 dog years was 29 (- 11 – 47) for dogs fed from a bowl > than 1 foot high.
Dogs that were fed from a bowl ≤ 1 foot high (n = 60) were no more likely to experience a GDV than dogs not fed from a raised bowl (n = 341).
The incidence (± 95% confidence interval) of GDV per 1000 dog years was 15 (- 6 – 36) for dogs fed from a bowl ≤ less than 1 foot high.
Dogs that were fed from a bowl > 1 foot high (n = 324) were 2.29 times (95% confidence interval: 1.15 – 4.58, P = 0.02) more likely than dogs that were not fed from a raised bowl (n = 341) to experience a GDV.
The incidence (± 95% confidence interval) of GDV per 1000 dog years was 39 (25 – 53) for dogs fed from a bowl > 1 foot high.
Limitations: The authors collect data on feeding height at the start of the study (within 30 days of recruiting dogs). No further attempts were made to collect further data on this at regular intervals. Thus, the authors cannot be certain that the dogs were being fed from a height at the time at which it developed a GDV (up to 58 months later). This reduces the ability of the study to detect real effects or meaningfully explain the effects observed.
The total number of dogs lost to follow up is not reported. The authors exclude dogs from the original study that were lost to follow up before at least one follow up questionnaire was completed. However, this is not the same as saying these dogs were not lost to follow up as, for example, if the study was still in operation, why were further questionnaires not completed by these owners? The authors do not report how many dogs recruited to the study, remained with the study until the study ended. Instead they report only median duration of follow up; this is meaningless to assess the number of dogs that remained with the study from recruitment to study end, as the dogs were signed up to the study at different time points. If the dogs that developed GDV and the dogs that didn’t develop a GDV differentially dropped out prematurely, this could introduce a ‘loss to follow up bias’. We know that, by the nature of the recruitment process for the subset of dogs included in this study, that already 13.3% of dogs had been excluded due to lack of follow up data (no follow up questionnaires completed). Therefore, it seems likely that total losses to follow up before the study ended would be higher (and possibly considerably so) but the authors fail to give us the information needed to assess this.
Population: Privately owned dogs (any breed or mix, both sexes, neutered and entire) across a wide geographic area.
The survey was potentially available to English speaking dog owners with access to the internet in any country worldwide.
Of relevance to this PICO, the authors’ asked owners whether the dog was fed from a raised bowl.
(relevant to PICO question): The findings in relation to raised bowl feeding are not reported within the results section. The authors note in the discussion that feeding from a raised bowl was not significantly associated with the risk of developing a GDV.
The incidents of GDV were retrospective so owners may have already taken measures to alter their height from which their dog was fed post-surgery, on the basis of veterinary recommendation or lay research. The authors do not outline whether owners were asked to complete the form on the basis of the height the dog was fed from at the time (or preceding) the GDV or, present time, or not directed as to a time frame to use.
There was no attempt to match control and GDV cases across other dimensions that may have been relevant (e.g. breed, size, and / or age).
Only two studies were identified that addressed the PICO question and these two studies were not in agreement. Thus, the evidence base for answering the question is relatively limited. However, it is pertinent to observe that neither study identified feeding dogs from the floor as a risk factor for GDV. It is also pertinent to note that most studies that investigate risk factors for a GDV have found that there are many factors that have been found to be significantly implicated as associated with an increased risk of GDV. It is beyond the scope of this Knowledge Summary to discuss these but it should be borne in mind by the reader when considering the discussion below and the clinical bottom line provided.
Of the two studies, the Pipan et al. (2012) provides the more impressive sample size for GDV dogs (n = 1114), compared with the Glickman et al. study (n = 98). However, despite this, it is difficult to conclude much about the findings by Pipan et al. (2012). The authors provide scant information to support either how they investigated feeder height as a risk factor or what they found. The only reference by the authors to their findings in relation to the PICO can be found in the discussion section. They provide no numerical information to allow the reader to evaluate this finding (e.g. was there a statistical tendency for the dogs fed from a feeder to have an increased or decreased risk of GDV?).
The study by Glickman et al. (2000) provides more comprehensive statistical reporting of the data relevant to the PICO question, but provides incomplete reporting of the dogs lost to follow up. Follow up losses are likely to be high given that 13.3% of the dogs lost to follow up had already been lost during the primary study that this study data was drawn from. This should be considered as it may severely distort the data if the losses were not randomly distributed across the categories of dogs in relation to this PICO question. In this study, feeding from a raised bowl was identified as a risk factor for both large and giant breed dogs. Furthermore, there was an interaction between feeder height and whether the dog was a large or giant breed dog. Specifically, lower raised feeders (≤ 1 foot) increased the risk for large breed dogs (but not higher raised feeders (> 1 foot), whereas the converse was true for giant breed dogs. The authors provide no explanation for this finding. They do not appear to have examined this finding further in relation to the other data that they collected. For example, does the height of the feeder relative to the height of the dog affect the speed at which the dog is able to consume its ration (fast eating was also identified as a risk factor)? However, caution should be taken in over-interpreting the data as the length of time between owner completing the questionnaire and the dog potentially developing a GDV could be almost five years. Therefore, additional interactions sought between the potential risk factors are problematic as owner feed management practices (e.g. feeder used) may have altered over the period studied. Furthermore, the small numbers of dogs affected by GDV within each sub-category (e.g. large breed dog fed from a raised feeder) could mean that these findings are simply chance findings.
The findings from the Glickman et al. (2000) provide an additional possible explanation for the lack of significance identified by the Pipan et al. (2012). The Glickman et al. (2000) specifically studied eleven ‘at risk’ large and giant breed dogs. Both the control dogs and the GDV dogs were therefore drawn from a similar population of dogs. By splitting the data into large and giant breed dogs they further homogenised the dogs in relation to factors such as height of the dog. By contrast, the Pipan et al. (2012) study used an ad hoc convenience sample of dogs of any type/breed/etc. This lack of relative homogeneity in the study population may have reduced the ability of the study to detect raised feeders as a risk factor for GDV, if the risk posed by feeding from a raised feeder interacted with morphometric measurements such as height of the dog. However, by restricting the population studied to eleven breeds, caution should be exercised in extrapolating the Glickman et al. (2000) findings to other breeds of dogs. The authors do not extend their analysis to look at whether the relevant risk factors identified are present across each breed studied, but this may be due to the small sample size within in each breed of dogs affected by a GDV. There is a need for additional investigation in these areas.
The practical implications of the combined findings are that there is limited evidence in the research area of this PICO. The more convincing of the two studies demonstrates a risk associated with using a raised feeder but only for specific height / size of dog (large versus giant breed) combinations. Neither of the studies found an increased risk associated with feeding from floor height. Consequentially, for the client keen to decrease the risk of their dog developing a GDV, the safest option would be to advise that, in the absence of further research, the dog should be fed from a bowl placed on the floor. If comorbidities exist (e.g. reduced mobility, arthritis) that reduce the ability of the dog to feed from the floor such that feeding from a height is considered beneficial, the practitioner should consider the height of the dog relative to the height of the feeder, and advise accordingly.
Inclusion: Any comparative (control group utilised) study in which the effect of height of the feeder on development of a gastric dilation (+/- volvulus) was investigated. | 2019-04-19T08:20:58 | https://www.veterinaryevidence.org/index.php/ve/article/view/57/126 |
0.999035 | Tool Factory, Inc. has announced the launch of Think About!, its newest program for reading comprehension. Students read, listen, and watch the adventures of Jasmine and Harry as they venture through relevant life situational events such as recycling, gardening, camping, and more. As the short story is played, teachers can choose to have the spoken text accompany the animation, thus strengthening reading skills. They then have the students test their comprehension of the short story using different reinforcement activities based upon the story's conversations and events. Think About! teaches and reinforces reading comprehension skills with various activities based upon each short story, according to the announcement.
A green progress bar allows students to track their progress and reveal the amount of activities they have yet to complete. The program comes with clip art resources for additional class activities or worksheets, as well as an accompanying workbook. Additional workbook support materials provide the stories in a textual format, with supporting classroom activities and lesson plans. Record your voice reading the text of the story then play the recording back while watching the story for complete customization of the program.
* Matching - Match the sentence text, to the picture.
* True False - Questions based on the stories conversation/events.
* Sequencing pictures - Using visual images of the story line, place them in the correct sequence.
* Sequencing text - Using short sentences from the text, place the text in the correct sequential order according to the story line.
* Multiple choice - Given a sentence, choose in the appropriate word that best fits the sentence grammatically.
* Do you remember? - Questions poised not from the stories conversation/events but from the animation itself. Students must learn to pay attention to all detail to answer these questions. | 2019-04-21T04:15:34 | http://www.internetatschools.com/Articles/ReadArticle.aspx?ArticleID=58866 |
0.998125 | Dreamers Are Us: What will happen to DREAMers under President Donald Trump?
What will happen to DREAMers under President Donald Trump?
I had discussed the future of DACA approved DREAMers more than a year ago when Donald Trump started his campaign with a promise to get rid of illegal immigrants. Many folks did not want to believe that Trump could actually deport even DACA approved DREAMers, because they were being fed lies by Democrats and immigration activists (who are already lying again by promising to keep fighting, because that is how they stay in business).
President Donald Trump does not have to do anything to abolish DACA. By simply not renewing Obama's DACA executive order, it will die on its own on January 20, 2017. As of that moment, your protection from deportation will disappear, your employment authorization document (EAD) will become invalid, and you will no longer be able to work legally. Since the Social Security number is just a number and it is given to you for your life (even if you leave America and never come back), it is yours to keep but it is meaningless.
It is likely that your employer may not fully understand that your EAD has become invalid (the authorities will typically do not track them down and let them know and many employers will simply be unaware of the unique situation of DACA recipients), so you might be able to keep your job as long as it is valid, but that will be against the law and may come to hurt you in the future. Using an EAD without authorization will create a huge paper trail at several agencies and if you hope to legalize yourself, it will come to bite you.
Will you be prioritized for deportation? It is not clear how this will play out but now the US Government and all the other agencies have your complete information and fingerprints. It is going to be a lot easier to track you down. And if you are arrested for offenses unrelated to being present illegally, a fingerprint will clearly show that you are also without legal status in the US.
It is very clear that during next four years, even if President Donald Trump does nothing to actually start deporting aliens who are present illegally, he can definitely make life harder. There is no chance that any so-called Comprehensive Immigration Reform or amnesty will pass through Congress (at least till 2018, Republicans will control both houses of Congress). In other words, you will need to go back to working under the table. It is very likely that eVerify may not be used by all employers and many American employers like to hire illegal immigrants so that they can pay them lower wages and avoid taxation.
DACA approved DREAMers who exploited the advanced parole (AP) loophole to clear their entry without inspection (EWI) problem still have time till 1/20/2017 to try to adjust their status through marriage. It will be a lot harder to so after that data so if you do have a relationship with a citizen but not yet married, it is time to get married and file the paperwork.
illegal immigrants can continue to live in the shadows and work in the underground economy. | 2019-04-23T19:03:21 | http://www.dreamersare.us/2016/11/daca-dreamers-trump.html |
0.99843 | The child was admitted to a hospital where doctors found the child's private parts severely infected due to dirty diaper and poor hygiene.
New Delhi: The Delhi Commission For Women has rescued a three-year-old girl, who was allegedly neglected by her alcoholic father and was found lying in her excreta.
The child was admitted to a hospital where doctors found the child's private parts severely infected due to dirty diaper and poor hygiene, the commission said.
Neighbours alleged the father would give the girl liquor in her milk bottle when she would cry for food.
On receiving a complaint on its 181 helpline, the Delhi Commission for Women rescued a three-year-old girl from a room in Prem Nagar on Friday, officials said.
The caller said the girl had not been fed for three days by her father.
Based on the complaint, a team of DCW counsellors rushed to the address and found the minor lying in a pool of her own urine.
She was emaciated and appeared to be severely ill, they added. The DCW counsellors found her father sleeping in the same room, which was littered with empty liquor bottles.
The neighbours said the father was a drunkard and would not wake up for hours even if his daughter cried due to hunger and filth, the women's panel said.
According to the neighbours, the child's mother had died a year ago and the father was a rickshaw puller, they said.
The father would keep the girl alone in the room, whenever he went to work and did not allow the neighbours to help him.
The neighbours said they had seen the father give the girl liquor in a milk bottle, officials said, adding no one seemed to know when and how the man gave food to the child.
When the father was forcibly woken up by the DCW team, he was violent and refused to cooperate in taking the child to a hospital, officials alleged.
Following which, the DCW team then called the police and managed to produce the father and child before the station house officer of Prem Nagar police station.
However, no FIR was registered in the matter, they said.
"She was running high temperature and had injury marks on the body. The child is being treated at the hospital and is under the care and protection of the DCW counsellors. She will be shifted to a shelter home after being discharged," they said.
The women's panel is taking up the matter with the deputy commissioner of police, Rohini, as to why no FIR was registered in the case and the father not arrested, they said.
Officials said the police also helped in the rescue operation. | 2019-04-24T10:55:17 | https://www.news18.com/news/india/delhi-man-gave-liquor-in-milk-bottle-to-3-year-old-daughter-when-she-cried-for-food-2092153.html |
0.999995 | If you were President for the day, what specific policy action would you promote or change to increase the use of accessible technologies in the workplace?
Please choose a conversation question to respond to.
I would do someting to accelerate the change from flourescent light to low flicker LED. The Job Accomodation network lists 15 conditions that can be accomodated by turning off flourescent light including epilepsy, migranes,heart disease, and lupus. It is also known to impact conditions such as attention deficit and autism. I can not work in most large orgsnizations due to the lighting. I had 3 seizures a week while in school, and am now seizure free. | 2019-04-19T05:35:53 | https://www.peatworks.org/policy-matters/if-you-were-president |
0.999418 | the small-scale businesses out there.
select any operating system of your choice including Linux or Windows.
Highly Scalable: Another major benefit of VPS hosting for the small businesses out there is that it turns out to be highly scalable. This implies that you can modify the resources that are allocated to the hosting server without anytime downtime and quite easily. When you first start the business, you might not require a lot of resources. However, as your business grows, you might be required to scale the overall resources that suit your specific needs. Moreover, as your business grows, when you feel that you have ample resources, you can consider scaling down again.
considered highly secure in comparison to any other hosting service provider.
backdoor by reaching out to one client from another.
business and ensure its overall efficiency.
Do you run a website? Running a website is not a cakewalk. Right from its designing to domain registration UAE, maintenance, keeping it up-to-date, protecting its privacy, and so more –you have tons to do when you run a website for marketing your products and services. In addition to all of these, when you own a website, it is vital to creating a strong password that will ensure keeping your site secure and safe.
Make the Passwords Long: Usually, a longer password would take more efforts to get cracked easily. However, the password that you create must also follow the general rules towards making it strong and reliable. The overall length of the password is not enough. You should aim for a password that is at least 8 characters and/or letter long as anything less than this value is too easy to crack. The longer you will keep the passwords, the longer it will take to decode the same.
Do Not Make Use of a Common Phrase: A phenomenon known as “dictionary attack” is one of the main reasons why you should avoid famous, common words or phrases as your site’s passwords. Though passphrases are becoming highly popular as the password options, these are pretty simple to crack by the hackers. The experts caution that algorithms that are used for cracking passwords are well-aware of the common passphrases. Therefore, you must refrain from making use of them.
Test the Given Password: Most of the web portals come with specialized built-in password testing tools while creating one. You can also check out other online password-checking tools that offer reliable services that allow you to check the strength of your site’s password.
Never Reuse the Password: Most of the individuals and even website owners make use of the same passwords for all the given web portals, accounts, and applications. This could, however, turn out to be one of the most dangerous mistakes that you might be committing. Hackers usually maintain a dictionary of the most commonly-used passwords that you could make use of. If it turns out successful for a single site, then your other sites and profiles might be at risk as well. Therefore, you must maintain different strong passwords for different sites and profiles.
Ensure the best protection for your site by maintaining strong passwords, especially when it comes to your domains and hosting. For more top tips about websites, hosting, domain registrations and general internet security, please visit Tasjeel.ae. | 2019-04-18T20:45:34 | http://www.deyloul.net/?cat=1 |
0.996975 | An Offensive Winger is the greatest contributor by far to the wing attack rating.
An Offensive Winger uses both their passing and their wing skill to generate attack strength.
Like Normal wingers and Defensive wingers, they contribute 50% of their Playmaking skill to the midfield rating.
Wing skill is by far the most important skill for an Offensive Winger. However, Offensive Wingers also use their Playmaking, Passing and Defense skills too.
Passing adds to the wing attack ratings of any winger: Offensive, Defensive or Normal. It is difficult to say exactly how much of the wing attack can be creditted to the passing of an offensive winger. There is a rule of thumb that states that about 3-4 levels of passing = 1 level of wing skill.
1. Passing on all Wingers adds to your wing attack rating and not to the central attack rating.
2. Passing is not boosted by playing the Winger "Offensive", like an Offensive IM's passing is boosted. As is stated in the rules: Offensive Winger: More Winger, less Defending.
When playing AOW, the passing skill of your winger has two beneficial effects. First, it helps boost your AOW ratings and second, it boosts the attack ratings of your wing attacks.
Wingers are modest midfielders too. When they are played offensive they use 50% of their Playmaking skill (PM). For this reason, Stamina is important for an Offensive Winger with PM.
Playmaking has two benefits for an offensive winger.
1. Playmaking boosts the teams midfield and delivers potentially more chances for the winger to use their high wing skill to convert into goals.
2. Playmaking indirectly makes-up for the defensive failings of an Offensive Winger by reducing the number of chances that the opponent will receive and potentially score on down that wing side. As the rules state: Offensive Winger: More Winger, less Defending.
Offensive Wingers are an offensive tool. All the skills needed for offense are the skills worth paying for in an offensive winger. However, the rules state "less defending" and do not say "no defending.
The decision to play an Offensive Winger over an Extra IM is a decision to forgoe some midfield contribution for some attack. Having some defence on your Offensive Winger can temper that extra vulnerability.
So, Defense is not worth paying for like Passing or PM is, but it has a value and usually comes free.
When Pressing, the defensive skill of your entire team is added together to determine your Pressing skill rating. For a team that plays 4-5-1 pressing, the defense skill of your Offensive Wingers can be of value.
Teams that are higher-up the food chain and are having to budget their salaries wisely, can look to secondaries on their Offensive Wingers to help keep costs down.
Passing: If your team has hit a wage ceiling for a winger, you can get more wing attack for very little money by having an offensive winger with generous passing. This can save a big team a lot of money.
Playmaking: Everyone wants more possession, but when salaries of IMs start to get too high, the PM contribution of a skilled Offensive Winger is of great help, on the pitch and in the pocketbook.
This page was last edited on 17 May 2012, at 17:14. | 2019-04-25T00:41:25 | https://wiki.hattrick.org/index.php?title=Offensive_winger&action=edit |
0.998194 | Kyusho 5 Element Theory - Why is it still so very important?
It is funny how fast people are to dismiss the knowledge of "old" stating that it has been "debunked" or disproven, when the actual truth is that the knowledge has simply been discarded in light of a different path. The same goes for the Kyusho 5 Element Theory, which in fact belongs to Taoist and Eastern Medicine.
Today many different Kyusho Jitsu instructors who were taught the "old way" not have completely abandoned them for a more modern approach. While I agree with the modern approach aspect I disagree with walking away from the "old ways."
I think that is a mistake and a great disservice to the community.
Kyusho 5 Element Theory - Do they exist?
The Kyusho 5 Element Theory is based on nature. So first lets take a look at this "cycle" that is an explanation for creation.
Within the earth are formed metal ores. [Metals], when cold [at night], cause water to condense and then evaporate in the sun, forming the rain that begins the creative cycle all over again.
The next question is do these "elements" exist in people? The "modern" look at the world and its dependency on chemicals would say no. But lets look shall we?
Fire: The human body produces heat and does so at an even 37 degrees centigrade. When the body overheats or fails to heat death occurs.
Metals: The body contains countless numbers of metals like iron to name only one.
Wood: Fiber which is a requirement of proper body functions is one such example.
Earth: Does the body have "earth" in it? Many will talk about the idea of returning to the ashes up death which is very true. But we are a "carbon" based life form. Carbon is a non metallic element found in the earth.
The POWER of Water. The Black Sea in Constanta Romania.
Water: Do I really need to address this one? Depending on the part of the body the average amount of water will vary, the brain being the highest content. The average seems to change from authority to authority, but let's call it 60%. And considering the average person in the western world is dehydrated you can see an issue I hope.
Now this is all oversimplification. A little research and you will find much more information.
Now each meridian on the body is linked to an organ. And each organ is represented by an element. And these are all grouped in a Yin and Yang sequence. There is a pairing of organs, one yin and one yang, which in turn represent and element and a time of day in which the organ is most active.
Let's take a look at these organs and their groupings.
You will note that each organ has an element association. Now this association is not an absolute! Yes there are people who try to argue against this by saying there is no wood in the liver. And obviously I do not deal with people like this.
The organ however has a "predominance" of one element but contain all elements. This information is a basis for Chinese and other Asian medicines. And these people are far better at promoting "health" than the western medical world is. Western medicine is about disaster relief. Not about prevention. And I speak from personal experience.
On to the Kyusho Jitsu aspects of all of this.
For every positive there must be a negative. That is how our reality works. And like the Yin/Yang symbol, health comes in the balance, not in the extremes. Using the Cycle of Destruction our goal is to take the body to an extreme.
This imbalance can come in the form of brain dysfunction, often times referred to as a knockout. Body dysfunction, the inability to use a limb temporarily. And even death found in the art of Dim Mak.
In the science of pressure point self defense I still teach the Cycle of Destruction and the other "eastern" based principles and methods. I do however associate the western medical view with all this.
Now why do I still teach this way when other have abandoned it? For one it works! Some will say not for the reasons I say it does. Seriously! And if you are right, and I do not think you are, WHAT IS YOUR POINT? Aside from driving your ego.
But far more important is this provides a solid foundation for people to learn. And NOT just gifted visual learners.
But this teaching method helps everyone to learn. Here is a SOLID example of why!
If I was ask you to think about "wood" what do you see? Depending the person is what the answer will be. I tend to see a log for a fire! What do you see?
Now if I ask you to visualize the "occipital nerve" what do you see? For the average person there is no response, they need to look it up. We do not under normal circumstance build an association with the brain teaching this way! So why do people teach exclusively this way? Good question! And yes I do have an opinion on this! Email me if you want to know it!
But if I teach you about the division of the arm as "fire and metal" you can easily build an association in your unconscious mind and then begin to get a result. The result inspires you to learn more, and with this attitude success comes!
And then I will add the other information as the student become ready to learn it! This is what being a "teacher" and not an "instructor" means.
In conclusion I hope you can see the values of still teaching the "traditional" methods and not just the current trends.
I believe teaching this way will include more students becoming successful and continuing their study in the science of pressure point self defense called Kyusho Jitsu.
Did you learn this method of Kyusho or the straight never strike idea? Comment Here.
If you fill out the form below with your name and email address you can really get into the meat of this topic with a FREE copy of one of my Cycle of Destruction Video! No strings, just free!
What if you missed this post?
The "Red Bell" in the bottom right hand corner of your browser will subscribe you to my new posts. This will prevent you from missing important posts and the subsequent free video associated with it!
Please if you enjoy our articles share them with your friends on Social Media! When you do this it brings us more traffic, better rankings on Google and you are rewarded with FREE content and gifts like the Dim Mak Project Video above!
And feel free to comment below my picture.
The Kyusho 5 Element Theory. Do we still need it? There are many Kyusho Jitsu instructors who have abandoned this teaching. Is this a mistake? Learn More. | 2019-04-24T12:00:09 | https://blog.kyushojitsuworld.com/news/kyusho-5-element-theory/ |
0.999999 | These related terms are often used in deliberately confusing and conflicting ways. Here is a set of definitions that will help you sort out the difference.
IMMIGRANT: In popular usage, an "immigrant" is generally understood to be a person who migrates to another country, usually for permanent residence. Under this definition, therefore, an "immigrant" is an alien admitted to the U.S. as a lawful permanent resident. The emphasis in this definition is upon the presumptions that (1) the immigrant followed U.S. laws and procedures in establishing residence in our country; (2) he or she wishes to reside here permanently; and (3) he or she swears allegiance to our country or at least solemnly affirms that he/she will observe and respect our laws and our Constitution.
ALIEN: By contrast, an "alien" is generally understood to be a foreigner -- a person who comes from a foreign country -- who does not owe allegiance to our country.
ILLEGAL ALIEN: An "illegal alien" is a foreigner who (1) does not owe allegiance to our country; and (2) who has violated our laws and customs in establishing residence in our country. He or she is therefore a criminal under applicable U.S. laws.
The term "illegal alien" is used by U.S. citizens who believe that non-citizens entering our country must comply with our immigration laws.
The term "illegal alien" is predicated upon U.S. immigration law which requires foreigners entering the U.S. to comply with our country's rules and laws regarding entry into, and residence within, our country.
UNDOCUMENTED IMMIGRANT: The term "undocumented immigrant" is an oxymoron (the parts conflict). An immigrant is synonymous with "permanent legal resident." The old term for the document authorizing a permanent legal resident is "green card." The term "undocumented" is derived from the accurate term "undocumented aliens" who are often called "border crossers." Proper terms are "illegal alien" or "undocumented alien" but not "undocumented immigrant." Although not commonly used, the term "documented alien" accurately refers to foreign nationals who have an unexpired non-immigrant visa such as H-1B.
Most U.S. citizens do not use the term "undocumented immigrant" and prefer, instead, the more descriptive and accurate term "illegal alien".
The term "undocumented immigrant" is used by those who believe in "open borders", i.e., non-regulation of foreigners entering into and assuming residence in the U.S., including even those foreigners who owe allegiance to a foreign government and/or who may intend harm to the U.S.
Commonly, in U.S. politics and U.S. news stories, the term "alien" is most often used with the modifier "illegal".
By contrast, the term "immigrant" is often deliberately used without a modifier, leaving the impression -- correct or not -- that the immigrant is legally or permissibly in the U.S. under our laws. Of course, this is frequently not the case!
Liberal politicans and news organizations prefer to refer to illegal aliens as "undocumented immigrants" because this term deliberately deflects discussion away from the fact that such individuals are in our country illegally. The term "undocumented immigrant" is designed to deliberately gloss over the fact that such individuals have broken our laws.
Conversely, conservative and libertarian politicians and news organizations tend to refer to illegal aliens as "illegal aliens" which properly keeps the focus of the discussion on the fact that such individuals have broken our laws and are therefore criminals to one degree or another, and that these individuals do not owe allegiance to our country.
In fact, folks who like to use the term undocumented immigrant also tend to believe we should be spending U.S. taxpayer funds to provide illegal aliens (criminals) with health care, social security and in some cases in state tuition at our colleges and universities. They also tend to believe that illegal aliens should be able to obtain U.S. drivers' licenses, open U.S. bank accounts, and be free from arrest and deportation by our police officers. | 2019-04-23T16:39:08 | http://adversity.net/Terms_Definitions/TERMS/Illegal-Undocumented.htm |
0.999999 | It is better to remain silent and be thought a fool than to speak up and remove all doubt" is a coined expression which provides an apt description of those with an inferiority complex.
1) sensitivity to criticism - people tend to perceive commentary or analysis as personal attack.
2) inappropriate response to flattery - some individuals are desperate to hear anything good about themselves and will be constantly fishing for compliments.
3) hypercritical attitude - they took hard for the flaws or shortcomings of others to try to convince them that they really aren't so bad after all.
4) tendency toward blaming - several people project their perceived weaknesses into others to lessen the pain of feeling inferior.
5) feelings of persecution as to avoid personal responsibility for their failure.
6) negative feelings about competition - because deep down they believe they can't win which is a clear evidence of total fiasco or disappointment.
7) tendency toward seclusiveness and timidity - they believe speaking up will only provide an embarrassing demonstration of their dullness and stupidity. | 2019-04-25T01:51:55 | http://storypen.com/cgi-bin/index.pl?poemnumber=389152&sitename=thewriter1193&displaypoem=t&item=last100 |
0.999994 | Q: Is HLC Mindlinx 100% casein free, and not grown on dairy? Second, I heard L-Glutamine can become an excitotoxin if not converted to GABA, a process which most people on the autism spectrum could have trouble with, so I am concerned about giving Mindlinx to my son [who is] on the spectrum.
A. Yes, HLC Mindlinx (and all HLC probiotics) are not derived from dairy, thus are 100% free of casein. Second, every study about the level of amino acids on autistic children shows that they are deficient in glutamine. In addition, the vast majority of autistic children have GI tract issues and glutamine is the most important nutrient for the upper part of the GI tract. This surely indicates that glutamine could be a very important supplement for people who are autistic.
The three amino acids glutamic acid (GA), gamma-aminobutyric acid (GABA), and glutamine (GAM) are closely related and all involved in proper brain function. GA is an excitatory neurotransmitter, GABA is an inhibitory neurotransmitter and GAM controls that GA and GABA are in balance. GAM can be converted to both GA and GABA. If adequate vitamin B6 is not present the conversion from GAM to GABA is inhibited and GA could be upregulated. Other factors, which I am not aware of, could potentially upregulate the conversion from GAm to GA, and GAM, therefore, might not be a beneficial supplement for autistic children. However, I would still like to mention that all studies on amino acids levels show that autistic children are deficient in glutamine.
If you have any concerns, you can start your child on HLC Intensive which does not contain any glutamine and use this product for a month or two for intensive gut repair, then switch to HLC Mindlinx. | 2019-04-24T06:25:54 | http://blog.rockwellnutrition.com/autism-is-hlc-mindlinx-100-casein-free-not-grown-on-dairy-glutamine-excitotoxin/ |
0.999796 | Should I wait to book my flight from Phoenix, AZ (PHX-Sky Harbor Intl.) to Malaga, Spain (AGP-Aeropuerto de Malaga)?
If you are looking to depart on Friday, May 24, 2019, then you are 30 days out from your trip. Based on data we've compiled and corroborated with industry reports, the best time to book is six to twelve weeks before your departure date. Since you have less than six weeks before Friday, May 24, 2019, prices on flights to Malaga, Spain (AGP-Aeropuerto de Malaga) are likely to rise the longer you wait. You should book quickly or choose to travel at a later date when prices aren't as high depending on your flexibility. Keep in mind that this is only based on historical data. The travel industry can be similar to stock markets: historical performance is not predictive of future results, and flight prices can have a mind of their own. We provide the information as is and do not make any guarantees.
Am I getting a good deal considering the average price from Phoenix, AZ (PHX-Sky Harbor Intl.) to Malaga, Spain (AGP-Aeropuerto de Malaga)?
We compiled some data on flights from to Malaga, Spain (AGP-Aeropuerto de Malaga) in our route-specific guide. You can read our guide on finding cheaper flights from Phoenix, AZ (PHX-Sky Harbor Intl.) to Malaga, Spain (AGP-Aeropuerto de Malaga) to see the average price, the standard deviation and the highest and lowest prices we've seen. You'll also be able to see a bunch of other useful data.
Cleverlayover is a flight search engine for cheaper flights. We find savings by looking at all the possible ways to get from your origin to your destination. We'll consider every possible layover, not just the ones the airlines want you to see. For example, if you're flying from Phoenix, AZ (PHX-Sky Harbor Intl.) to Malaga, Spain (AGP-Aeropuerto de Malaga), we'll search for flights from Phoenix, AZ (PHX-Sky Harbor Intl.) to every other airport and then flights from those airports to Malaga, Spain (AGP-Aeropuerto de Malaga). After piecing together those flights, we can find savings that the other search engines don't show you.
We built cleverlayover to radically optimize travel booking: we simplify the process by revealing the most cost-effective layovers, and we display search results from low-cost carriers that are not partnered with the major airlines to give travelers a broader range of flight combinations. Cleverlayover isn’t just a search engine to find more affordable flights; it’s a tool for experiencing travel in the best way possible. We'll search the cheapest route from Phoenix, AZ (PHX-Sky Harbor Intl.) to Malaga, Spain (AGP-Aeropuerto de Malaga). Begin your travel with Cleverlayover to make the most of your trip. | 2019-04-24T13:54:48 | https://www.cleverlayover.com/flights/PHX-Phoenix-Sky-Harbor/AGP-Malaga/cheapest/30/37/1/0/0 |
0.999987 | "Tory sticks to Tory: Whig sticks to Whig: the Reformer sticks neither to himself nor to any body else. It is no wonder he comes to the ground with all his schemes and castlebuilding. A house divided against itself cannot stand. It is a pity, but it cannot be helped. A Reformer is necessarily and naturally a Marplot, for the foregoing and the following reasons. First, he does not very well know that he would be at. Secondly, if he did, he does not care very much about it. Thirdly, he is governed habitually by a spirit of contradiction, and it is always wise beyond what is practicable. He is a bad tool to work with; a part of a machine that never fits it place; he cannot be trained to discipline, for he follows his own idle humours, or drilled into an obedience to orders, for the first principle of his mind is the supremacy of conscience, and the independent right of private judgment. A man to be a Reformer must be more influenced by imagination and reason than by received opinions or sensible impressions. With him ideas bear sway over things; the possible is of more value than the real; that which is not, is better than that which is. He is by the supposition of a speculative (and somewhat fantastical) character; but there is no end of possible speculations, of imaginary questions, and nice distinctions; or if there were, he would not willingly come to it; he would still prefer living in the world of his own ideas, be for raising some new objection, and starting some new chimera, and never be satisfied with any plan that he found he could realise. Bring him to a fixed point, and his occupation would be gone. A Reformer never is -- but always to be blest, in the accomplishment of his airy hopes and shifting schemes of progressive perfectibility. Let him have the plaything of his fancy, and he will spoil it, like the child that makes a hole in its drum; set some brilliant illusion before his streaming eyes, and he will lay violent hands upon it, like little wanton boys that play with air-bubbles. Give him one thing, and he asks for another; like the dog in the fable, he loses the substance for the shadow: offer him a great good, and he will not stretch out his hand to take it, unless it were the greatest possible good. And then who is to determine what is the greatest possible good? Among a thousand pragmatical speculators, there will be a thousand opinions on this subject; and the more they differ, the less will they be inclined to give way or compromise the matter. With each of these, his self-opinion is the first thing to be attended to; his understanding must be satisfied in the first place, or he will not budge an inch; he cannot for the world give up a principle to a party. ... a patriot of this stamp is really indifferent about every thing but what he cannot have; instead of making his opinion between two things, a good or an evil, within his reach, our exquisite Sir sets up a third thing as the object of his choice, with some impossible condition annexed to it, -- to dream, to talk, to write, to be meddlesome and troublesome about, to serve him for a topic of captious discontent or vague declamation, and which if he saw any hopes for cordial agreement or practical co-operation to carry it into effect, he would instantly contrive to mar, and split it into a thousand factions, doubts, and scruples, to make it an impossibility for any thing ever to be done for the good of mankind, which is merely the plaything of his theoretical imbecility and active impertinence! ... [Then there is the type of reformer who] in a spirit of envy and ignorance, quarrels with all those who are labouring at the same oar, lays about him like mad, runs a-muck at every one who has done, or is likely to do, anything to promote the common object, and with his desperate club dashes out his neighbour's brains, and thinks he has done a good piece of service to the cause, because he has glutted his own ill-humour and self-will, which he mistakes for the love of liberty and a zeal for truth! Others, not able to do mischief enough singly, club their senseless contradictions and unmanageable humours together, turn their attention to cabal and chicane, get into committees, make speeches, move or second resolutions, dictate to their followers, set up for the heads of a party, in opposition to another party; abuse, vilify, expose, betray, counteract and undermine each other in every way, and throw the game into the hands of the common enemy, who laughs in his sleeve, and watches them and their little perverse pettifogging passion at work for him, from the high tower of his pride and strength! If an honest and able man arises among them, they grow jealous of him, and would rather, in the petty ostracism of their minds, that their cause should fail, than that another should have the credit of bringing it to a triumphant conclusion. They criticise his conduct, carp at his talent, denounce his friends, suspect his motives, and do not rest, till by completely disgusting him with the name of Reform and Reformers, they have made him what they wish, a traitor and deserter from a cause that no man can serve! This is just what they like -- they satisfy their malice, they have to find out a new leader, and the cause is to begin again! So it was, and so it will be, ... a rope of sand against a rock of marble -- with no center of gravity, but a collection of atoms whirled about in empty spaces by their own levity, or jostling together by numberless points of repulsion, and tossed with all their officious projects and airy predictions by the first breath of caprice or shock of power, in that Limbo of Vanity, where embryo statesman and drivelling legislators dance the hays of Reform, 'perpetual circle, multiform and mix, and hinder all things,' proud of the exclusive purity of their own motives, and the unattainable perfection of their own plans!" | 2019-04-25T02:03:00 | http://blupete.com/Commentary/ReformerFeb'01.htm |
0.999078 | Fans of the Maple Leafs and Marlies should note that John Carlson, Jay Beagle and Braden Holtby will all have their names on two great hockey trophies.
Of course, they've just won the Stanley Cup with the Washington Capitals.
And in 2010, they won the Calder Cup with the Hershey Bears -- the top farm team of the Capitals.
The Toronto Marlies are one win away from the Calder Cup -- the first in franchise history. Could come as early as Tuesday. They lead the Texas Stars three games to two, with Game 6 Tuesday and Game 7 Thursday, if necessary. Both at the Ricoh Coliseum, 7 p.m.
One of the narratives with farm teams is that winning breeds winning. Young players learn how to win and what it takes to win, and bring it with them to the NHL.
The Leafs, of course, hope that an organizational Calder Cup win would be followed a lot quicker with a Stanley Cup than the Capitals' eight-year span. But really, the jury is out on what winning the Cup at one level means to the next.
-The 2015-16 champs were the Lake Erie Monsters (Josh Anderson, Oliver Bjorkstrand, Zach Werenski), the top team of the Columbus Blue Jackets. Are the Jackets a team on the rise? Or one that can't get out of the first round?
-The 2014-15 champs were the Manchester Monarchs (Derek Forbort, Kevin Gravel), then the top farm team of the Los Angeles Kings, who haven't fared so well lately.
-The '13-14 champs were the Texas Stars (Radek Faska), whose parent team in Dallas has underperformed lately.
-The '12-13 champs were the Grand Rapids Griffiths (Danny DeKeyser, Luke Glendenning), whose parent team in Detroit is becoming accustomed to missing the playoffs rather than being in them.
-The '11-12 champion Norfolk Admirals did a splendid job of providing the Tampa Bay Lightning with both great young players (Tyler Johnson, Ondrej Palat, Alex Killorn) but also its current coach (Jon Cooper). They've been to the Stanley Cup final, but haven't won it.
-The '10-'11 success of the Binghamton Senators (Mike Hoffman) translated to some good years by Ottawa, but no Cup.
What does it all mean? I suppose it means what you want it to mean. Certainly it means to the players what they want it to mean. It's all about winning. Playing championship hockey in June beats golfing in May. Winning beats losing.
GOT A QUESTION? Email me at [email protected] and I'll answer it in the mailbag. | 2019-04-24T22:51:43 | https://www.thestar.com/amp/sports/breakaway_blog/2018/06/11/marlies-are-one-win-away-from-the-calder-cup.html |
0.997219 | From the selection list, choose the unit that corresponds to the value you want to convert, in this case 'Parsec [pc]'.
With this calculator, it is possible to enter the value to be converted together with the original measurement unit; for example, '24 Parsec'. In so doing, either the full name of the unit or its abbreviation can be usedas an example, either 'Parsec' or 'pc'. Then, the calculator determines the category of the measurement unit of measure that is to be converted, in this case 'Distance'. After that, it converts the entered value into all of the appropriate units known to it. In the resulting list, you will be sure also to find the conversion you originally sought. Alternatively, the value to be converted can be entered as follows: '45 Parsec to Attometre' or '53 pc -> am' or '6 pc = am'. For this alternative, the calculator also figures out immediately into which unit the original value is specifically to be converted. Regardless which of these possibilities one uses, it saves one the cumbersome search for the appropriate listing in long selection lists with myriad categories and countless supported units. All of that is taken over for us by the calculator and it gets the job done in a fraction of a second.
Furthermore, the calculator makes it possible to use mathematical expressions. As a result, not only can numbers be reckoned with one another, such as, for example, '(77 * 12) pc'. But different units of measurement can also be coupled with one another directly in the conversion. That could, for example, look like this: '24 Parsec + 72 Attometre' or '58mm x 27cm x 35dm = ? cm^3'. The units of measure combined in this way naturally have to fit together and make sense in the combination in question. | 2019-04-21T16:16:18 | https://www.convert-measurement-units.com/convert+Parsec+to+Attometre.php |
0.998605 | Smoking, of course, damages the lungs and blood vessels, and contributes to an array of health problems, but nicotine — the calming chemical that cigarettes deliver — might actually be good for the aging brain.
Smokers, for example, are less likely to develop Alzheimer's disease — a phenomenon that has long puzzled scientists because smoking contributes to cardiovascular disease, which strongly increases the risk of Alzheimer's.
But closer investigation revealed that smoking doesn't confer the protection; nicotine does.
A study of Alzheimer's patients showed that those who wore nicotine patches were better able to remember and pay attention than those who didn't. Another study showed that nicotine boosted cognitive function in older people who didn't have Alzheimer's, but were showing signs of age-related mental decline.
Nicotine also seems to protect against Parkinson's disease, in which the death of cells in a small area of the brain results in tremors, impairing movement and as well as cognitive difficulties.
So what's going on? How does the dreaded addictive component of cigarettes produce health benefits?
For starters, nicotine by itself isn't very addictive at all, according to Dr. Paul Newhouse, the director of Vanderbilt University's Center for Cognitive Medicine. Nicotine seems to require assistance from other substances found in tobacco to get people hooked.
"People won't smoke without nicotine in cigarettes, but they won't take nicotine by itself," said Newhouse, who has done extensive research into beneficial effects of nicotine on the brain. "Nicotine is not reinforcing enough. That's why FDA agreed nicotine could be sold over the counter. No one wants to take it because it's not pleasant enough by itself. And it's hard to get animals to self-administer nicotine the way they will with cocaine."
Nicotine is chemically similar to acetylcholine, a neurotransmitter in the brain that declines in Alzheimer's disease. Drugs such as Aricept help people with Alzheimer's by boosting brain levels of acetylcholine. Apparently, nicotine binds to the receptors in the brain normally occupied by acetylcholine, which benefits people who need more, but it has no apparent effect on those who don't.
"Nicotine doesn't appear to enhance normal people," Newhouse said, "but in people who show some degree of cognitive impairment, nicotine appears to produce a modest but measurable effect on cognitive function, particularly in areas of attention and, to some extent, memory."
Newhouse and his colleagues are testing nicotine to see if it improves other cognitive problems like the mental fogginess known as "chemo brain" that afflicts cancer patients undergoing chemotherapy. They've also started a study of adults with Down syndrome, who almost always develop Alzheimer's disease by the time they reach middle age. Even people with HIV, which appears to cause accelerated cognitive decline, may benefit.
What makes nicotine especially attractive as a treatment is the fact it causes virtually no side effects, according to Newhouse.
"It seems very safe even in nonsmokers," he said. "In our studies we find it actually reduces blood pressure chronically. And there were no addiction or withdrawal problems, and nobody started smoking cigarettes. The risk of addiction to nicotine alone is virtually nil." | 2019-04-25T22:01:17 | http://www.tampabay.com/news/health/study-finds-nicotine-safe-helps-in-alzheimers-parkinsons/2175396 |
0.998972 | A person close to Hillary offers this spin at the end of the campaign: That in the waning days of her fight, people "finally got to know" the real Hillary, that she "broke through" the cartoon image that has dogged her for the past 16 years.
I'm also told, as others have already reported, that in her speech tonight Hillary will congratulate Obama on winning his delegate majority--but will stop short of actually conceding to him. She will apparently vow to "take her pledged delegates to the convention" in the name of universal health care and other issues she cares about. The speech will be "neither fish nor fowl" says this person. | 2019-04-25T15:51:44 | https://newrepublic.com/article/42189/silver-lining |
0.986012 | Is Grandma's Linux called Mac OS X?
Is it fair to label Mac OS X as "Grandma's Linux?" I think it is.
This morning I came across an interesting post by Dwight Silverman (TechBlog). Here Dwight is thoughts related to the trouble he encountered trying to get VMware Tools to run on Ubuntu loaded into a Fusion virtual machine on a Mac.
In Windows, this process is automatic -- an installer drops VMware Tools into place, you reboot the virtual machine, and you're done. It also works that way in some versions of Linux.
But not in Ubuntu. Despite the fact that this is a very popular Linux distribution, the Tools installer won't run. You must open a terminal window and, using a command line, unpack the Tools package, find the install script, invoke it via another text command, then hit Enter through more than a dozen prompts. This ends in a recompiling of the Linux kernel and, finally, a reboot.
The part that I find interesting is the "Grandma's linux is called Mac OS X" bit. Not because it's likely to be controversial but because I've come to the same conclusion over the past few months too.
I have the belief that there's no such thing as a one-size-fits-all OS. For the most part Windows continues to dominate, although it's hard to say how much of that is due to the fact that it fits most of the people most of the time and how much of it is down to people assuming that Windows is something that comes with a PC. I also worry that Windows is becoming too Mac-like and that will mean that power-users could be alienated and turn elsewhere. Over the past 12 months Mac OS has seen a significant upturn in users while we're now seeing Linux distros shipped on OEM PCs. A real choice now exists, and that's a good thing. But there's a deeper issue here, and these are marketing and the communities behind the operating systems.
When you consider Mac and Windows, the incentive for Microsoft and Apple to get as many platforms running their respective operating systems is clear enough - The Mighty Dollar. But for Linux platforms the incentive to push the platform isn't as clear cut. While distros such as Ubuntu try to make the Linux experience as easy and as pain-free as possible, this view isn't shared across the whole community. Many believe that in order to make Linux ready for prime time distros will have to become more like Windows and Mac OS, and that is seen as a bad thing. I agree, it would be a bad thing; fortunately there is a distro to suit all tastes. Linux could well be the one-size-fits-all OS, with different distros serving different needs.
But what about Jim's feeling that "Grandma's linux is called Mac OS X?" You know, I think he has a point. For too long Linux has been branded as very little more than an alternative to Windows and a way to get out from under the thumb of the man. That might be the case, but it's hardly a selling point. Also, as Mac hardware has become cheaper and is now enjoying greater popularity, a more mainstream alternative to Windows is now available. When I ask people why they bought their first Mac, invariably the main reason stated is ease of use. This tells me that it's now power users or those who like delving deep into an OS who are buying into the Mac ecosystem, it's the basic users with more disposable cash who are making the switch. Mac OS is Grandma's Linux, as long as Grandma has that kind of money to spend. In a way Apple has stolen the Linux battle cries ("It's simple to use," "It's not made by Microsoft" and "It's more secure than Windows") and thrown millions of dollars in ad money to get the message out there than the only real alternative to Windows is Mac. The main barrier to Linux becoming mainstream is no longer Microsoft, it's Apple. | 2019-04-22T17:26:30 | https://www.zdnet.com/article/is-grandmas-linux-called-mac-os-x/ |
0.999998 | Nokia's ongoing tax dispute with Indian authorities has put an end to its plans to transfer a local smartphone factory over to Microsoft, as the software maker finalizes its takeover of the Finnish company's devices and services business..
Microsoft's roughly US$7 billion acquisition of Nokia's phone business is set to close on Friday.
The factory in Chennai in south India was among Nokia assets frozen by Indian federal authorities in a dispute over taxes for mobile phone software licenses. Production at the factory was allowed to continue.
A Nokia spokeswoman said Thursday that it was decided that the factory will not be part of the deal for now and the company will instead enter into a services contract with Microsoft.
The plan is an interim measure until the tax matter is resolved, she said. She declined to comment on recent reports that Nokia was planning to sell the factory, dismissing them as speculation.
Microsoft said Monday that its agreement with Nokia had been modified to exclude a factory in South Korea which will continue with Nokia. Twenty-one Nokia employees in China will now join Microsoft to work on mobile phones.
Nokia had offered to deposit into an escrow account an amount larger than the US$340 million tax claim, but the Delhi High Court asked it to hike that figure by another $570 million toward possible future tax liabilities, as a condition to release the factory. The court had earlier released the company's bank accounts in India.
The company also faces a sales tax claim from the state of Tamil Nadu where the factory is located. Nokia has contested the claim in the local High Court, stating that no sales tax can be levied on exported products. The state government claimed that devices made at the factory were not exported but were instead sold domestically.
Microsoft said it had no comment on the news about the Nokia plant in India. | 2019-04-26T09:41:20 | https://www.cio.co.nz/article/543606/nokia_won_t_hand_india_smartphone_factory_over_microsoft/ |
0.999998 | Let me set the context: almost exactly one year ago, I attended MIT’s Lavender Graduation, a celebration of MIT’s LGBTQ+ community amid the broader pomp and circumstance of commencement. I sat among a small group of MBA graduates, years into our careers, surrounded by dozens of undergraduates, just preparing to embark on their professional lives.
The speaker, a senior leader in the MIT administration, spent her speech delineating the pain of being queer in college — bullying, high rates of suicide, etc. — and lauded us students for managing these personal “adversities” while succeeding in an academically rigorous environment.
I left the event feeling immensely frustrated, but I couldn’t immediately put my finger on why. As I reflected, I discovered what was underneath my reaction. My frustration came from recognizing that the speaker’s address inadvertently implied a false and disabling message — the same message that I had told myself when I graduated from college a decade ago.
In my first real post-college job, I hid inside the cubicle walls, working over-hard to prove my worth, hoping that eventually — once I had impressed everyone and maybe even gotten a promotion — then, maybe, I could come out and, maybe, it wouldn’t hurt my chances at success too, too much.
will limit their ability to achieve professional success.
Why blend the personal and professional when you can keep them safely distinct and separate?
But, over my career, I’ve managed to shed my hesitancy of bringing “my gay” to work. And while I’ve outwardly become comfortable telling colleagues that I’m gay, I’ve inwardly advanced my understanding of how being gay makes me an indispensable employee.
Being LGBTQ can grant you advantages in resilience, creativity, network-bridging, customer empathy, and effectiveness. Turns out: these are the exact traits businesses need to grow and thrive.
1. Being queer builds resilience. Almost every day, I come out: to my dentist, to my waiter, to a colleague, to the stranger who observes my husband & I exchanging a brief handclasp on the subway. Being gay is not something you can tell about me from a distance. It’s not something you can tell about me from working alongside me. It’s something you learn about me when you observe my husband and I together, or when I tell you.
Living in the relatively liberal bubble of Boston, rarely do I face disapproval or bigotry when I tell someone I’m gay. But I do encounter surprise. I do encounter momentary discomfort and over-correction. And I still carry my childhood with me, when there were no TV characters with whom I could relate, when my church community expected me to marry a woman, and when I felt my friends would abandon me if they knew my deep dark secret.
Given this baggage, I still take a deep breath and my gut still wrenches a bit each time I come out, even though I’ve been doing it for over a decade. But after surviving thousands of big (my parents) and small (my dentist) coming out moments, I can weather a little stress and/or rejection.
This involuntary daily practice of vulnerability has built up rippling resilience muscles.
Organizations looking for employees who can take a risk, rebound and iterate in the face of failure, or lead the turnaround of a struggling team, need resilient leaders. Being queer builds such resilience. Bring that to work with you.
2. Being queer makes you a master of customer empathy. I spent 21 years as a straight man. I was careful not to show affection for other guys. I never told anyone of my feelings. I dated women. I pledged a fraternity. Through this, I became a highly skilled actor. Not a stage actor; a life actor: my public persona was a well-orchestrated act.
Through this, I honed a robust ability to exercise empathy. To fit in, I needed to observe carefully, empathize deeply, and mimic believably. It’s no surprise research finds non-heterosexuals have statistically significant creative advantages in theater.
I learned to study the language, the behavioral mannerisms, the habits, the preferences, and the media consumption of my “peers.” Over the years, this fit-in-quickly tactical pattern has allowed me to fluidly move between groups. In college, I could jump from nerdy mock trialers, to hippy ultimate Frisbee players, to macho fraternity bros. Professionally, I’ve transitioned from politics to nonprofits to for-profit tech.
Call me a chameleon, but enormous amounts of empathy underpin this ability to shift between wildly divergent groups. To fit in, I must empathize deeply and then fully connect.
At the core of running a successful business is a deep commitment to understanding “the customer” — their needs, passions, hobbies, wallet-size, etc. Disruption arrives when upstarts recognize the incumbents have lost track of their customers and/or there’s a niche customer-set being underserved by the current offerings.
Startups and large enterprises alike need employees who are relentless in their quest to empathize and connect with their customers. Being queer makes you a master of customer empathy. Bring that to work with you.
3. Being queer allows you to cultivate innovation and creativity. As I mentioned above, being able to easily jump between wildly divergent groups has given me an extremely diverse social network. My friends include actors, elected officials, oil & gas engineers, clergy, microbiologists, musicians, philanthropic leaders, farmers, and on.
Have you heard of William Dawes? Perhaps not… How about Paul Revere? They had the same mission, on the same day: ride from Boston and alert as many people as possible that the British were coming. They both alerted hundreds of people. William Dawes even rode further than Paul Revere.
But Revere’s message spread, because Revere had a more diverse social network. Dawes’ message fell into an echo chamber: he told people who knew each other, and they told each other. Whereas Revere told people who didn’t know each other, and they spread the message through their respective networks.
Serving as a “bridge” among diverse groups of people can aid in the dissemination of information. It also improves your ability to aggregate information across multiple domains.
It gives you access to diverse perspectives and problem-solving approaches (which heightens your likelihood of solving complex problems), and — ultimately — it makes you more creative.
As Walter Isaacson argues, innovation comes from collaboration around a collection of ideas from the past. The greater diversity across your social network, the greater the set of possible recombinations of ideas you have access to.
Having access to diverse perspectives is great, but being able to full-heartedly deploy these perspectives gives you uncanny creativity muscles. That code-switching ability I developed as a closeted, gay high schooler now allows me to escape the I-have-a-hammer-and-every-problem-is-a-nail trap — instead, I’m at ease flexing between academic disciplines, mental models, and business tactics.
Growing businesses need to infuse innovation and creativity into their DNA: if you don’t adapt and evolve, you die. Being queer allows you to cultivate this needed innovation and creativity. Bring that to work with you.
4. Being queer can radiate effectiveness and efficiency. Effectiveness is identifying and executing on the right thing. Efficiency is getting the right thing done quickly and consistently. Both are critical to realizing business success.
At the heart of both effectiveness and efficiency is trust. Research suggests that teams with higher levels of trust execute faster. Essentially, trust eliminates fruitless friction during execution.
Almost paradoxically, trust also engenders the type of healthy friction that drives effectiveness. Leaders who live in echo chambers are leaders destined for failure. Leaders who encourage debate and invite others to challenge their assumptions create teams that are more likely to predict roadblocks, anticipate their competition’s responses, and pick the best options from a broad field of possibilities. These types of transparent, healthily dissonant interactions emerge most readily within an environment exuding trust.
You can’t build a trust-filled workplace by dictating it from above, but you can lead by example. Trust grows from the relationships colleagues build with each other, one by one. And, ultimately, trust can only emerge amid vulnerability and authenticity.
When one person fully reveals themselves to another, and the other embraces that revelation with care and confidence: trust grows.
When working as a consultant, I opened my client kick-off meetings by describing how grappling with my sexual orientation led to my career choices and skills. It was a raw and honest story, and it often led to deep conversations with clients about why they chose their own work. These conversations built immediate trust and rapport, and allowed us to drive toward faster and more meaningful results.
Workplaces in which authenticity and vulnerability thrive are rare. Vulnerability can be messy, uncomfortable, inefficient and even destructive, so many businesses resist inviting vulnerability into their cultures. But those that pull it off see their employees grow personally, professionally, and into more effective, efficient, and trusting teams.
Being queer gives you the power to kindle the authentic conversations that build such teams. Bring that to work with you.
Advice to LGBTQ professionals: embrace the professional super-muscles that being queer has granted you. Your sexual orientation is not a side project to “deal with” separate from your professional or academic aspirations — rather, it’s deeply connected to your skills, perspectives, and mental models. Seek out employers who will respect you and allow you to use your whole self to deliver meaningful results.
Advice to employers: hire people based on their skills and experience (not their sexual orientation), but recognize that the personal experience of being LGBTQ may have granted such candidates powerful professional gifts. Recruit queer people and ensure your workplace invites them to be authentically themselves — your business might just grow faster, stronger, and deeper because of it. | 2019-04-24T06:00:50 | https://queerlife.me/2017/12/bring-gay-work-day/ |
0.999348 | Okay, so let's familiarize ourselves a bit with sous vide cooking. Sous vide is a method of cooking foods in vacuumed or seal tight plastic bags. The foods are then submerged in water that is temperature controlled, often cooking in this water bath for a long period of time compared to traditional methods. Despite the lengthy cooking times, the beauty of sous vide cooking is that the foods are cooked evenly where moisture is retailed and the internal temp is ideal without over cooking the exterior.
For awhile, I've coveted a sous vide ever since a co-worker had me try his roast beef sandwich which he made via sous vide. It wasn't until my trip to Seattle a couple months ago, I met the folks of SousVide Supreme. I was curious about a home sous vide system, as my only experience was in a commercial kitchen setting. We partnered up and I got a SousVide Supreme system to explore the world of sous vide cooking at home.
The system is extremely light - it's essentially a stainless steel water bath vessel where the water can be set to your preferred temperature for various types of foods. Using it is even easier. Simply fill up with water to at least the minimum fill line. Using the keypad on the front, set the temperature (in either Fahrenheit or Celsius) and place the cover on. Meanwhile, you can place your food or ingredients in a food safe plastic bag and vacuum seal it to remove as much air as possible. Once the water reaches your desired temperature, it will sound off an alarm and you can then submerge your vacuum sealed foods right into the water. The cover goes back on and depending on what you are cooking and at what temperature your water has been set to, you let it cook for however long. Not sure what temperature to set the water to or even how long to keep your foods in a water bath? No worries... the system comes with a recipe booklet and a cooking guide for all types of items that can be cooked via sous vide. And if you happen to lose the guide, the website has the info available too!
After the lengthy cooking, I sliced the roast and popped it into the broiler for some additional color. This was simply optional but for presentation purposes, it nice to show off some color. With this as a success using an already packaged up pot roast, I set off to do my own pot roast and vacuum sealing it myself as well.
The end result? In both cases - with the store bought and homemade - the pot roast came out extremely tender but did not fall apart like traditional pot roast. Instead, the roast retained it's shape perfect. Because the roasts were vacuum sealed, there was no moisture lost even with long hours of cooking. The vacuum seal also intensify the flavors of the marinade into the roast, making it extremely flavorful.
In a small bowl, combine the first 5 ingredients.
Rub the roast with the mixture and place in a large gallon (3.8 liter) cooking pouch or food safe vacuum sealable bag. Vacuum seal according to manufacturer's directions.
Submerge the vacuum sealed roast in the water and cook for 15-17 hours.
Remove from the pouch and pat dry.
Transfer the roast onto a broiler pan and broil for 1-2 minutes or until desired color is reached.
I've actually never eaten anything sous vide before but I know on TOP CHEF they're always cooking this way, lol!
Great blog, I stumbled across this by accident while looking for a few ideas for sous vide pot roast.
But there's one suggestion I wanted to offer. The reason why your sous vide pot roasts held their shape and weren't fall-apart like a typical pot roast is because they were not cooked for long enough.
For a traditional pot roast cooked at a higher temperature, ~3 hours is sufficient to braise down the connective tissue. But at a lower temperature like 140F, hydrolization of the collagen takes much longer. It's typical in braised beef sous vide recipes with temperatures in the 130-150F range to cook for more like 72 hours. At these temperatures you'll end up with beef that's both on the rarer side and still fork-tender.
But, if you liked the result, that's the only thing that matters. | 2019-04-23T16:03:08 | https://www.whatscookinchicago.com/2014/11/sous-vide-pot-roast.html |
0.999999 | trying to better understand the Lyme disease Western blot test.
What laboratory techniques are used to carry out the assay?
What are the CDC criteria for a "positive" test?
Although some of the medical jargon associated with immunology can be a little overwhelming, the scientific principles behind these tests are not difficult to grasp. The following article is offered as a primer in the techniques and interpretation of Western blotting, and should help most patients navigate their way through some of the medical and scientific terminology associated with the assay.
First of all, it should be noted that the Western blot is usually performed as a follow-up to an ELISA test, which is the most commonly employed initial test for Lyme disease. "ELISA" is an acronym for "enzyme-linked immunosorbent assay." There are ELISA tests and Western blots for many infectious agents; for example, the usual testing regime for HIV is also an initial ELISA followed by a confirmatory Western blot.
Both the ELISA and the Western blot are "indirect" tests -- that is, they measure the immune system's response to an infectious agent rather than looking for components of the agent itself.
incubated with diluted preparations of the patient's serum. If antibodies to the organism are present in the patient's blood, they will bind to the antigen.
These bound antibodies can then be detected when a second solution, which contains antibodies to human antibodies, is added to the preparation. Linked to these second antibodies is an enzyme which changes color when a certain chemical is added to the mix.
Although the methodology is somewhat complicated, the basic principle is simple: the test looks for antibodies in the patient's serum that react to the antigens present in Borrelia burgdorferi. If such antibodies exist in the patient's blood, that is an indication that the patient has been previously exposed to B. burgdorferi.
However, many different species of bacteria can share common proteins. Most Lyme disease ELISA's use sonicated whole Borrelia burgdorferi -- that is, they take a bunch of B. burgdorferi cells and break them down with high frequency sound waves, then use the resulting smear as the antigen in the test. It is possible that a given patient's serum can react with the B. burgdorferi preparation even if the patient hasn't been exposed to Bb, perhaps because Bb shares proteins with another infectious agent that the patient's immune system *has* encountered. For example, some patients with periodontal disease, which is sometimes associated with an oral spirochete, might test positive on a Lyme ELISA, because their sera will react to components of Bb (like the flagellar protein, which is shared by many spirochetes) even though they themselves have never been infected with Bb. Therefore, some positive Lyme disease ELISA results can be "false" positives.
To distinguish the false positives from the true positives, a more specific laboratory technique, known as immunoblotting, is used.
and a Southern blot, which does the same for DNA sequences.
In a Western blot, the testing laboratory looks for antibodies directed against a wide range of Bb proteins.
This is done by first disrupting Bb cells with an electrical current and then "blotting" the separated proteins onto a paper or nylon sheet. The current causes the proteins to separate according to their particle weights, measured in kilodaltons (kDa).
From here on, the procedure is similar to the ELISA -- the various Bb antigens are exposed to the patient's serum, and reactivity is measured the same way (by linking an enzyme to a second antibody that reacts to the human antibodies).
If the patient has antibody to a specific Bb protein, a "band" will form at a specific place on the immunoblot. For example, if a patient has antibody directed against outer surface protein A (OspA) of Bb, there will be a WB band at 31 kDa. By looking at the band pattern of patient's WB results, the lab can determine if the patient's immune response is specific for Bb.
Here's where all the problems come in. Until recently, there has never been an agreed-upon standard for what constitutes a positive WB. Different laboratories have used different antigen preparations (say, different strains of Bb) to run the test and have also interpreted results differently.
others might require more or fewer.
Some felt that certain bands should be given more priority than others.
In late 1994, the Centers for Disease Control and Prevention (CDC) convened a meeting in Dearborn, Michigan in an attempt to get everybody on the same page, so that there would be some consistency from lab to lab in the methodology and reporting of Western blot results.
Before we get to the recommendations that resulted from this meeting, we need to understand one more facet of the human immune response. Many patients have noticed that their Western blot report usually contains two parts: IgM and IgG. These are immunoglobulins (antibody proteins) produced by the immune system to fight infection.
Some patients might already have an IgM response at the time of the EM rash; IgG response, according to the traditional model, tends to start several weeks after infection and peak months or even years later. In some patients, the IgM response can remain elevated; in others it might decline, regardless of whether or not treatment is successful.
Similarly, IgG response can remain strong or decline with time, again regardless of treatment. Most WB results report separate IgM and IgG band patterns and the criteria for a positive result are different for the two immunoglobulins.
that the IgG immune response will persist in an infected patient.
the possibility that strain variations in Bb might produce unusual banding patterns.
For IgM, 2 of the following three bands: OspC (22-25), 39 and 41.
For IgG, 5 of the following ten bands: 18, OspC (22-25), 28, 30, 39, 41, 45, 58, 66 and 93.
followed by the OspC band and/or the one at 39.
The OspC and 39 kDa band are highly specific for Bb, while the 41 kDa band isn't. That's why the 41 by itself isn't considered adequate. Here's the rub, though: the CDC doesn't want the IgM criteria being used for any patient that has been sick for more than about six weeks. The thinking here is that by this time an IgG response should have kicked in and the IgM criteria, because they require fewer bands, are not appropriate for patients with later disease.
A number of criticisms have been offered of the CDC criteria since their adoption in 1994.
The first is centered on the CDC's failure to make any qualitative distinction among the various bands that can show up on a patient's Western blot.
A number of Lyme disease researchers feel that different bands on a WB have different relative importance -- that "all bands are not created equal."
many patients with Lyme disease will show reactive bands at, say, 60 and/or 66 kDa. However, these correspond to common proteins in many bacteria, not just Borrelia burgdorferi, and so are of limited diagnostic usefulness, especially in the absence of other, more species-specific bands. The band at 41 kDa corresponds to Bb's flagella (the whip like organelles used for locomotion -- Bb has several) is one of the earliest to show up on the Western blots of Lyme disease patients. But for some reason it is also the most commonly appearing band in control subjects. This may be due to the fact that many people are exposed to spirochetes at some time in their lives and so their sera might cross react with this protein.
39 or OspC (anywhere between 22 and 25).
Many Lyme disease scientists believe that any patient whose IgG Western blot exhibits bands at, say, any three (or even two) of these locations almost certainly has Lyme disease, regardless of whether or not any other bands are present. They feel that these bands on a Lyme Western blot are simply more meaningful than other, less specific ones and that a rational interpretation of a WB result should take this into account. Unfortunately, this does not often happen, and will happen even less with the new CDC criteria.
A second criticism of the CDC Western blot criteria is that they fail to include the 31 and 34 kDa bands.
This does indeed seem like an odd decision, since antibodies with these molecular weights correspond to the OspA and OspB proteins of B. burgdorferi, which are considered to be among the most species-specific proteins of the organism.
So why didn't Dressler et al. include them?
Answer: These bands tend to appear late if at all in Lyme disease patients, and did not show up with great frequency in the patients that the Dressler et al. group studied (though they did show up sometimes). As a result, they weren't deemed to have much diagnostic value and didn't find their way onto the CDC hot list.
their presence is hardly meaningless.
Thus, many Lyme disease experts believe it is a serious mistake to exclude these two antibody proteins from the list of significant bands. The CDC's decision to do so seems particularly strange in light of the fact that it is the OspA component of Bb that is being used as the stimulating antigen in the ongoing experimental Lyme disease vaccine trials. As one immunologist remarked shortly after the 1994 CDC conference, "If OspA is so unimportant, then why the heck are we vaccinating people with it?"
Finally, it is important to keep in mind that no matter how carefully the Western blot test is carried out and interpreted, its usefulness, like that of all tests that measure B. burgdorferi antibodies, is ultimately contingent on the reliability of the human immune response as an indicator of exposure to B. burgdorferi. There are several scenarios in which the lack of a detectable antibody response may falsely suggest a lack of B. burgdorferi infection.
First, it is well established that early subcurative treatment of Lyme disease can abrogate the human immune response to B. burgdorferi . Although this is not thought to be a common phenomenon, a recent comparative trial for the treatment of erythema migrans found that a majority of patients who failed early treatment and suffered clinical relapse were seronegative at the time of relapse . Even treatment for disseminated Lyme disease, in which the patient's IgG immune response was previously well-established, can render a patient seronegative after treatment despite post-treatment culture-positivity for B. burgdorferi [5, 6].
In addition, patients with Lyme disease may not test positive for exposure to B. burgdorferi because their antibodies to the organism are bound up in immune complexes . Once steps are taken to dissociate these immune complexes, free antibody can be detected; however, this is not routinely done when performing serologic tests for Lyme disease.
Finally, an indeterminate number of patients with late Lyme disease are simply seronegative for unknown reasons . The actual percentage of such cases as a proportion of all Lyme disease cases is impossible to estimate, since most studies of late Lyme disease enroll only seropositive patients, which tends to reinforce the circular and erroneous notion that virtually all patients with late Lyme disease are seropositive.
It should also be noted that a positive Western blot is not necessarily an indication of active Lyme disease. A patient's immune response to B. burgdorferi can remain intact long after curative treatment for a Lyme infection; therefore, the results of a Western blot assay should always be interpreted in the context of the total clinical picture.
Addendum by Joachim Gruber: Carl Brenner is one of 2 patients who sit on the National Institute of Allergy and Infectious Diseases (NIAID) Advisory Committee for Clinical Studies on Chronic Lyme (information from Ramp S, The dirty truth behind Lyme disease research, Lyme Times 26,7, 1999).
Proceedings of the Second National Conference on Serologic Diagnosis of Lyme Disease, October 27-29, 1994.
Dressler F, Whalen JA, Reinhardt BN, Steere AC. Western blotting in the serodiagnosis of Lyme disease. J Infect Dis 1993;167:392-400.
Dattwyler RJ, Volkman DJ, Luft BJ et al. Seronegative Lyme disease: dissociation of specific T- and B-lymphocyte responses to Borrelia burgdorferi . N Engl J Med 1988;319:1441-6.
Luft BJ, Dattwyler RJ, Johnson RC et al. Azithromycin compared with amoxicillin in the treatment of erythema migrans. Ann Intern Med 1996;124:785-91.
Häupl T, Hahn G, Rittig M, et al. Persistence of Borrelia burgdorferi in ligamentous tissue from a patient with chronic Lyme borreliosis. Arth Rheum 1993;36:1621-6.
Preac-Mursic V, Marget W, Busch U, Pleterski Rigler D, Hagl S. Kill kinetics of Borrelia burgdorferi and bacterial findings in relation to the treatment of Lyme borreliosis. Infection 1996;24:9-18.
Schutzer SE, Coyle PK, Belman AL, et al. Sequestration of antibody to Borrelia burgdorferi in immune complexes in seronegative Lyme disease. Lancet 1990;335:312-5.
Home Version: February 6, 2000. | 2019-04-19T00:24:41 | http://www.lymenet.de/labtests/brenner.htm |
0.999989 | I'm finishing my Degree in Web technology. I have tutored in many subjects before but I prefer math and English overall.
Personal Statement : I'm finishing my Degree in Web technology. I have tutored in many subjects before but I prefer math and English overall. | 2019-04-25T20:55:14 | http://www.tutoringservices.com/teachers-Roxboro-NC |
0.999693 | "Paris" was the band that I started with Glenn Cornick after I left Fleetwood Mac. I had wanted to try doing some heavier rock , like Led Zeppelin was doing at the time. During the last six months of 1974 , while touring with FM , I had been spending a lot of my off time talking to Jimmy Robinson who was an engineer that we had met while working either at Larrabee Studios , or (more likely) the Record Plant studio in LA. I think it was Jimmy who suggested Thom Mooney , who he knew. (ex-Nazz and Todd Rundgren drummer). Glenn Cornick was also between bands , and since we knew each other pretty well (he had been married to an ex girlfriend of mine , Judy Wong) I asked him if he wanted to start a hard rock trio.
I think Glenn and I came up with the name "Paris". For one thing , I had lived and worked in the actual city of Paris (the French one , not Tennessee) and Glenn Cornick and I had first met when he was playing a gig there with Jethro Tull. Also , by the name Paris , we wanted to imply that , although this would be a "hard rock" trio , it would have a certain level of refinement and not just be" headbangers " Glenn and I both wanted to do something along the lines of what Led Zeppelin was doing. I personally wanted to rock a little harder than I had been able to do with Fleetwood Mac. Lucky for me, Fleetwood Mac was taking off at the time with the "White" album , which would contain their 1st ever # 1 single. That meant that there was a fair amount of interest in me as an ex FM member.
John Carter at Capitol records was the one who finally bit the bullet (after a couple of passes) and gave us a demo budget. Capitol liked the demo and Al Cory decided to sign us. That was about the last of the smart moves Paris ever made. We cut the record up at the Record Plant studios in Sausalito CA , a beautiful location by the bay, in the "pit" , which was a studio built especially for Sly Stone by the Record Plant owners, Chris Stone and Gary Kellgren. The "pit" was very unusual at the time ; it had no glass wall between the control room and the players space as was customary (and necessary because of leakage). The walls- floor to ceiling- were carpeted in bright maroon plush , and you could play or sing plugged in "direct" into the console while you were lying down.
The "pit" also had a couple of bedrooms with microphone jacks in the head boards , so Sly, or whoever was in the bed could do vocals while under the covers. It really was the height of '70's "over the topness"... Once I woke up and the clock said "2". I thought, "oh , I'm late , it's 2pm and we better get started". I peeked ouside for a minute, and realized it was 2 am , not 2pm. I had been asleep for 24 hours. Yes, there were lots of drugs at those sessions. I especially remember a Bayer aspirin bottle full of coke, that was constantly replenished ( from the album budget !!). And Gary Kellgren was a big fan of nitrous oxide , of which there were tanks aplenty.
Every so often a little opium would appear from somewhere. In 1975, Sausalito California was overrun with drug dealers. It was still considered fashionable and chic to do coke. If you didn't pull out your little bottle and offer some around, you were considered to be rude and ungracious. Half the time I didn't know what day, or what hour of the day, or even what month it was. Let me be clear here; Glenn Cornick never did drugs, that I know of. Neither did Thom Mooney. I was a bit more prudish than some of the real " heroic imbibers" ( who I won't name) . I was a "nothing till after the 5 o'clock cocktail hour" type of guy. Maybe that's one reason why I'm still alive... In retrospect , with Paris , I was in too much of a hurry . We probably should have let the band develop a little further , tour constantly, and find an audience.
As it happened, Hunt Sales came down with a case of Bells Palsy (which paralyzes your face muscles), and we had to go on a long break. In that interval, I wrote "French Kiss"...and Paris just sort of faded. If the 2nd Paris album "Big Towne 2061" had done a little better, and/or we had stayed on the road.... who knows.......?
On June 7th 2012, Bob Welch, died of a self-inflicted gunshot wound, police said. He was 65.
All songs written by Bob Welch, except where noted. | 2019-04-25T06:23:07 | https://therockasteria.blogspot.com/2018/06/paris-big-towne-2061-1976-us-uk.html |
0.999007 | Let’s expand the question with a concrete example. An easy and common goal that people have is understanding their website traffic. In this example, we want to determine what is going on when there is a significant change in website traffic. As in: what circumstances are leading to the change in traffic.
Each sample in our dataset will represent one page visit and contains information from the server that generated the page and the client that is visiting the page.
We will use a variation of permutation testing and marginal effects analysis to help us determine 1) the impact each categorical dimension has on the global aggregate and 2) the impact that the change in each dimension has on the global aggregate.
To determine each country’s impact on the actual average PLT (page load time) of the website, we will iterate through each country and estimate the global average PLT and the global COUNT with that country excluded from the data. We then compare the estimated values against their real values to determine the perceived change from the global aggregate that each row is providing. We refer to the perceived change as the row impact and will use it to figure out which rows are likely candidates for investigation.
This query will return a table with each row representing the average page load time from each country and how many visits came from a country from the past hour.
Now we have our rows sorted by absolute impact, where the impact is the measure of how much each row is affecting the global aggregate had that row been excluded from the data.
We see a dip in website traffic and want to understand which country (or countries) it is coming from.
Specifically - we will take the time period over where we see the dip and compare it to a relevant time period of the same length. For example, if we see a dip in the last hour, we can take the last hour of data and compare it against data from a day ago or a week ago of the same duration (1 hour) and ask what has changed.
Again, we start by taking one dimension (country) and examining the data to see if there are any leads.
The higher the absolute value of the impact, the more effect that row has had on the global aggregates. The sign of the impact indicates which direction the row is pulling the aggregate.
Using impact as a ranking of which rows are affecting the global (and by how much) is useful, but we can further break down why each row is affecting the global aggregate.
Determining the above values for each row lets us understand if the row is affecting the global aggregate through its change in value, through a change in presence (higher or lower row count) or a combination of both.
The most straight-forward situation is when a particular row’s value suddenly becomes more costly - maybe a particular page became more expensive to compute. Had all other rows remained unchanged, this would show up as a raise in the global average.
Alternatively, a row may have a lowered sample count (perhaps a new bug is manifesting during page generation), leading to a decrease in its presence inside the global population. If that row had a low aggregate, the end result would be that the global average raised, but the only thing that has changed was the row’s count.
Similarly, an increase in presence (due to uncontrolled XHR requests, f.e.) could account for a decrease in the global average if a low cost endpoint is being hit.
It’s important to note that in the above interpretations, the effect of any given row can be masked by changes in other rows. Impact analysis lets us examine how any row’s change is affecting the global, despite the change in other rows.
Using the above methods, one can create estimates of how the values inside underlying distributions are shaping the global aggregates, giving insight into the makeup of a distribution in a single time period or the way a distribution has changed over two time periods.
This particular technique only works for aggregates that can be unrolled, such as AVG, SUM and COUNT. Percentile aggregates can not easily be merged / unmerged without a full histogram available. | 2019-04-21T04:28:24 | https://logv.org/categorical-attribution.html |
0.998238 | As the name implies, The Skyscraper Museum in New York City celebrates modern skyscrapers. This institution educates visitors about contemporary architecture that now seems to dominate nearly all major cities worldwide. Quite naturally, the museum focuses heavily on iconic skyscrapers that define the legendary skyline of NYC. Click to book your NYC Downtown Hop-On Hop-Off Bus Tour.
Established in 1996, The Skyscraper Museum was relocated several times in its early years. In fact, the fledgeling organisation occupied four different buildings in a time span of only six years. Some of the museum's notable homes included the Bankers Trust Building, which is considered an excellent example of early Art Deco architecture in NYC. While using this property, the museum hosted the Building the Empire State exhibit for approximately a year. At the beginning of the 21st century, The Skyscraper Museum relocated into a former shop. However, the tragic events during the September 11th attacks eventually forced the organisation to find a new home. In 2004, the institution finally settled into a mixed-used skyscraper that overlooks the beautiful New York Harbor and Hudson River. Occupying the first level of a 38-level building, The Skyscraper Museum has about 5,000 square feet of gallery space. Skidmore, Owings & Merrill is the architectural firm that's credited with designing the permanent home of the museum. Click to book your NYC Downtown Hop-On Hop-Off Bus Tour.
The permanent exhibit at The Skyscraper Museum includes the Manhattan Mini Models. This handcrafted wooden installation comprises realistic skyscrapers that actually line most of Manhattan. Hailing from Arizona, Michael Chesko was absolutely fascinated by the urban layout of the Big Apple. This artisan spent countless hours on the current miniature models that form the core collection of the museum. Fortunately, he was generous enough to donate the models to an organisation that celebrates the rich architecture of one of the world's greatest cities. The Skyscraper Museum also has some architectural models of other notable landmarks all over the world. Visitors might be particularly drawn to the World Trade Center installations that now pay tribute to the great skyscrapers that were destroyed on 9/11/2001. The museum has plenty of other educational presentations and resources on high-rise buildings in NYC and other major metropolitan areas worldwide. Guests might have some fun comparing the various technical specifications and other facts relating to modern skyscrapers. The temporary exhibits at The Skyscraper Museum usually focus on future projects that will likely transform the field of architecture and construction. In previous years, the museum has captured the excitement of events that lead to the erection of jaw-dropping landmarks in the Middle East and Asia.
The Skyscraper Museum has a prime location in the The Battery City district of Lower Manhattan. This vibrant neighbourhood is primarily known for its luxurious residential properties and office buildings that support a thriving financial sector. The Battery City also boasts some of the best waterfront promenades in all of New York City. Wagner Park and South Cove Park overlook the scenic Hudson River and skyline of Jersey City, NJ. There are several NYC subway stations that are conveniently located within a few blocks of The Skyscraper Museum. Situated between The Battery and Bowling Green Park, the Bowling Green station gets service from the 4 and 5 lines. At the Rector Street station, you can ride the R and W trains. At Whitehall Street and South Ferry, transfers are available between the subway and Staten Island Ferry. Metropolitan Transportation Authority (MTA) buses make multiple stops near The Skyscraper Museum, particularly along Battery Place. Parking at the museum is not available, but you should be able to find some indoor garages in the areas between Wall Street and the World Trade Center.
Click here to visit The Skyscraper Museum official website. | 2019-04-22T19:14:51 | https://www.newyorkjourney.com/skyscraper-museum.htm |
0.999634 | Which Mac for my needs?
1.) Some word processing...nothing extensive.
2.) Internet access via cable modem.
3.) The ablity to transfer files from the internet to the mac then to my Apple II's either by disk or serial cable.
I have been looking at picking up a Mac LCII(III) or a Color Classic II. Will these do what I want or is there a better choice?
The first question that comes to my mind is, what are your internet needs with the machine? I do see there's a 68k version of the iCab browser, or is email your only concern? I'm wondering if your cable ISP is going to work with any of those machines.
The first question that comes to my mind is, what are your internet needs with the machine?
Email, a little browsing and the ability to download either Mac or apple II files.
I'm wondering if your cable ISP is going to work with any of those machines.
I hope so, but my experience with the internet is all based on microsoft machines so I honestly don't know....hoping someone here can set me straight on what is possible with the older Mac's.
Macs of that vintage are not much use on the internet anymore. If your web use is exceedingly limited and light weight you may get by with it. Pretty much anything pre-Windows 95/98 and pre-Mac OS 8.6 is going to be a bit difficult. PPC and Carbonlib make life much easier.
Seeing as the Color Classic II only sold in Asia, i don't think you'll have an easy time finding one. In all honesty, I can't see doing anything on the internet before Mac OS 8. OS 8 was the beginning of the "modern" classic OS in appearence, but also because Apple included the software and utilities that made it easy to get online. In that case, I would suggest something with a 68040 processor so you can run OS 8. My suggestion would be a Quadra 800. I have one and used it for a LONG time as my main computer and it never let me down. Even under OS 8 it is very fast. I'm not even kidding when I say it wasn't until my MacBook Pro that I felt like I was using a machine that ran its OS well. On the other hand, its still VERY obsolete. If you need use of floppy disks and whatnot, I would suggest getting a beige Powermac G3 since it would still have a floppy drive and all the old serial and localtalk ports as well as ethernet for your cable internet. I don't know if your emulation card works in them though. If I were in the same situation as you, I would buy a newer machine to use for internet and then pick up an older machine to use the emulation card in. If you live near me you can come by the house and pick up all the Macintosh LC II's you want.
I am looking at an LC II (complete system & software) and a Color Classic (also complete) for sale on Ebay to use with the IIe emulation card. The cost would run around 125.00 including shipping, not sure if this is a good price or not? Also is there any reasons to pick one over the other?
There are quite a few AF members in the PA region. Even Tom, the site owner, lives in PA. Somebody not too far from you should have something you need for very cheap.
$125 for an LCII !!?
Better yet: check out this PowerBook: 333MHz G3 processor, 384MB RAM, 40GB HD, 14" screen at 1024x768 resolution. I am *not* the seller.
Compare that to your LCII: 16MHz 68020 processor, 10MB max RAM, shipped with 40MB HD (largest SCSI I know of was 36GB, but I don't think the LCII would see more that 2GB), external monitor required at 640x480 max resolution.
A few more pluses: the PowerBook has built-in modem, Ethernet and USB; internal optical drive; much more portable; OS X capable (up to Panther without third-party help).
I think I know where I'd shop.
I have a couple of beige Power Macs that my wife has been bugging me to get rid of. I've got a 9600/200 and a Beige G3 (w/500 mhz G4 upgrade) that I would let go for far less than $125. And I'm in PA (Pittsburgh metro area).
I would thoroughly recommend an OS X capable Mac if you want to be on the net at all. OS 9 internet is a bugbear to set up and full of kludges and workarounds when you get there.
With that in mind, and your requirement 3.) above, I would go for a beige G3 desktop, or a Wallstreet G3 series laptop. Both of these can run OSX and classic MacOS 8.6 to 9.2., and have serial ports. Later Macs do away with the ports, and earlier ones won't run OS X (easily).
The offer above with the G4 upgrade included is a bargain.
With that much grunt you could easily run a IIe emulator in software, and wait around for a cheap LC that can take the IIe card. $125 for any LC is a joke.
I don't know the range of models with available IIe emulator card, but I don't think it is many. If you have to have that, seems like you need two machines- one for that and maybe the word processing, and one for dealing with the net. Obsolete Mac hardware is pretty cheap, depending. You ought to be able to score that LCII for next to nothing. I just bought a Sawtooth G4 for pretty much nothing from my university surplus. It is very satisfying to use in the $/fahrvergnügen units, and has nil trouble with any task I have asked of it.
an LC II (complete system & software) and a Color Classic (also complete) for sale on Ebay to use with the IIe emulation card. The cost would run around 125.00 including shipping, not sure if this is a good price or not? Also is there any reasons to pick one over the other?
Not clear - is this price each, or total for both? Be aware that these machines are now so old they are in "collector" territory, and their prices bear no relation to what they are "worth" per se, as functioning computers.
That said, the CC would be a handy little package to set up as a IIe card host. A nice compact all-in-one with its own colour monitor.
A non-collector price for a working LC II should be more like $12.50. The CC is so sought after that unfortunately they are probably all going for collector prices. If that price is for both machines, it's probably around what you'd expect to pay.
The software is easily obtained, as are keyboards and mice, so don't worry about looking for either as a complete package, as long as they're guaranteed working. It's the "complete package, original software, boxes and manuals" listings that the collectors are after, and bid up.
I have accepted iantm more than fair offer so that will take care of a Mac for the net.
pmjett...Yep, I love my old hardware! My Apple IIc and IIgs are sitting side by side in my study and I still enjoy using them...christ were they bullet proof! The Mac Color Classic I am leaning toward is more for interest and a little fun.
DrBunsen...the Color Classic I am looking at includes the keyboard, mouse and software. The base cost (shipping included) without any bids would run me one hunderd and ten dollars...again without any other bids. Since this is a new interst of mine I have no feel for what the value of the Color Classic is as an old computer or as a collectors item.
Hey, this has turned into a fun thread. It's like royalty has shown up in the village with money to throw around. Since we're all turning out our closets, I've got 3 Beige G3's, 3 B&W's, a 9600 w/450G4, 2 Classic II's, a 6500 w/400G3, a 5500, and a 6100 w/240G3. Hmm, I know there's more... I don't think I could wrestle the DA G4 away from my wife, nor the core duo mini she's borrowing. Shipping from Hawaii ain't too bad. It could always be sent on the slow boat to save on shipping.
Haha, ya just a bit of a drive. My parents used to live in Monessen PA just 45 min south of Pittsburgh and we used to make that drive every year. I like it a lot up there.
well, I am in Southeastern CT - but if you find your way here, ive got a 9600/200, a 333mhz G3 tower, an LC, ..ummm-- and I cant really remember what else - about 15 68K machines - you could take what you wanted.
Your Internet machine should be ad lib., according to pocket, taste and your choice of advice.
The Apple IIe card-bearing machine must be one with an LC PDS slot and 4MB or more of RAM, running an OS with which you can turn off File Sharing and 32-bit addressing, ie System 7.5 max. That limits you to the LC II or a Colour Classic. It also needs that you partition an internal hard drive anew with 10MB max. for the IIe (ProDOS) environment and the rest for the host Mac, or use an external hard drive for the Apple IIe environment.
Yep, it's personal preference from here. If I had the budget for it I'd personally go for the CC every time But yes, they'll both do what you want. Good luck.
On the suggestion of a friend I stopped by Penn State University salvage this morning. Looking around I found a number of Macs, most looked like they had been beat hard, but among them was a nice clean Mac Color Classic. For twenty bucks I took a chance and grabbed it. I figured the drive would be wiped, but to my surprize it had OS 7.6.1 installed and a few other programs including a word processor.
The only problem I noticed after messing with it for a bit was that it did not keep time correctly when powered down. I am assuming that it will be an easy fix when I take it apart to clean it up and install my IIe card. This is one neat little PC!!
The only problem I noticed after messing with it for a bit was that it did not keep time correctly when powered down. I am assuming that it will be an easy fix when I take it apart to clean it up and install my IIe card.
that's my fave OS of all time. you can get the appearance extension from OS8 to give it some depth. if you're really lucky, you'll find out what "Bluets and Granola Bars, Make a chewy snack" actually means. | 2019-04-25T09:56:19 | https://www.applefritter.com/comment/49101 |
0.999999 | Are Smart People Getting Smarter?
1) Scores have increased the most on the problem-solving portion of intelligence tests.
2) Verbal intelligence has remained relatively flat, while non-verbal scores continue to rise.
3) Performance gains have occurred across all age groups.
4) The rise in scores exists primarily on those tests with content that does not appear to be easily learned.
What's puzzling about this increase in general intelligence is that it appears where we'd least expect it. While one might assume that IQ scores could increase over time in terms of crystallized intelligence – the part of the test that measures particular kinds of knowledge, such as being able to count or vocabulary words – it's actually increased on measures of fluid intelligence, which is the ability to solve abstract problems. This has led some psychologists, such as Ian Dreary, to conclude that "large differences in scores [between generations] are demonstrated in just those situations where similarity would be expected." Flynn, meanwhile, marveled at the magical constancy of the effect: "It's as if some unseen hand is propelling scores upward," he wrote.
There is, of course, no unseen hand. In recent years, many psychologists have embraced the "multiplicity hypothesis" which argues that the Flynn effect is explained by a long list of factors, such as improvements in early education (especially for girls), removal of lead paint, increased sophistication of tests, better test taking attitudes and adequate nutrition.
However, despite the flurry of interest in the Flynn effect, one lingering question has remained unanswered: Does the effect apply to everyone? More specifically, does it apply to the right tail of the ability distribution, or those 5 percent of individuals who score highest on the IQ test? What makes this mystery particularly noteworthy is that many of the explanations for the Flynn effect seem particularly relevant to the left side of the bell curve, or those with below average scores. This suggests that most of the intelligence gains have come from solving low hanging fruit, fixing those glaring societal inequalities that meant millions of children lacked access to adequate food, education and medical care. Since we've made progress on these problems, one might suppose that the Flynn effect would start to fade, at least in developed nations. (All the low hanging fruit is gone, as Tyler Cowen might say.) Sure enough, some studies have concluded that the Flynn effect has begun to disappear in Denmark, Norway and Britain.
In other words, the Flynn effect doesn't appear to be solely caused by rising scores among the lowest quartile. Rather, it seems to be just as prevalent among the top 5 percent. The smartest are getting smarter.
Rowe and Rodgers (2002) noted that “If the rising mean were driven by the smart getting smarter, then the change might reflect the introduction of some qualitatively novel form of environmental stimulation. If the overall distribution increased in pace, the cause would lie in processes that affected everyone equally.” We find the rising mean of the entire distribution is partly driven by the smart getting smarter. This suggests some form of environmental stimulation may be at work in the right tail.
The question, of course, is what this stimulation might consist of? It obviously has to be extremely widespread, since the IQ gains exist at the population level. One frequently cited factor is the increasing complexity of entertainment, which might enhance abstract problem solving skills. (As Flynn himself noted, "The very fact that children are better and better at IQ test problems logically entails that they have learned at least that kind of problem-solving skill better, and it must have been learned somewhere.") This suggests that, because people are now forced to make sense of Lost or the Harry Potter series or World of Warcraft, they're also better able to handle hard logic puzzles. (The effect is probably indirect, with the difficult forms of culture enhancing working memory and the allocation of attention.) As Steven Johnson argued, everything bad is good for us, especially when the bad stuff has lots of minor characters and subplots. HBO is a cognitive workout.
That said, environmental stimulation remains an incomplete explanation. Even for those on the right side of the curve, intelligence gains probably have many distinct causes, from the complexity of The Wire to the social multiplier effect, which is the tendency of smart people to hang out with other smart people. (In this sense, gifted programs in schools might help drive IQ gains among the top five percent. The Internet probably helps, too.) The question, of course, is whether such factors have really changed over time. Has it gotten easier for smart people to interact with each other? Are those on the right side of the IQ distribution now more likely to have children together? Would the Flynn effect be even larger if we did more of [fill in the blank]? These questions have no easy answers, but at least we now know that they need to be answered.
In the meantime, it's wise to be modest about what we know about population changes in IQ over time; the Flynn effect remains a paradox. As Flynn himself observed, "No one knows which role IQ gains over time will eventually play." | 2019-04-26T06:32:19 | https://www.wired.com/2011/08/are-smart-people-getting-smarter/ |
0.999176 | UP Advertising, LLC is an advertising agency founded in 2013 with the aim of connecting the different brands with the Hispanic market, helping to generate their communication in a correct way with the target public through different media.
With 6 years in the market and more than 17 years of experience UP Advertising, LLC is the premier agency of Atlanta in uniting the American culture with the Hispanic by offering the best of each of them.
For its founders, Alejandra Pelaez and Felipe Uribe, its main objective is to ensure that both small and large companies understand the value of the Hispanic market and communicate correctly with it.
"UP Advertising is a young brand that seeks to keep growing and positioning itself in the market, we have the energy to bring its brand to life!"
We’re set up to deliver smart ideas that drive our clients’ businesses, regardless of channel or geography. And because we can create what we conceive, our ideas turn out just as we imagined them.
A smart marketing strategy is the foundation for all effective marketing projects. Your brand is your promise to your customer. We will find an effective brand strategy to give you an edge to stand out in increasingly competitive markets.
CONTENT CREATION: Creating custom visuals and copy to engage your audiences.
PUBLISHING: Posting daily content and monitoring audience reactions.
STRATEGY: Using data and best practices to accomplish your objectives.
COMMUNITY MANAGEMENT: Responding to and engaging with fans and followers.
We build websites that make a great brand impression, provide a positive user experience and drive visitors to engage with your company.
Everyone Knows the design is not only about how it looks, it is about how it works. We can design project following your mock-ups, or develop the full UI from scratch.
We will create an idea; develop a script, produce, shoot, edit and deliver an effective and powerful short form commercial or a long form infomercial. With our experience and knowledge you can be assured of a great production with a strong call to action.
UP advertising is a full-services advertising, marketing strategy and brand design agency. We have the knowledge and expertise to help you connect your brand with the right target. We provide custom solutions the deepen the relationship between you and your customers.
Alejandra Peláez, managing partner at UP Advertising, brings 10 years of experience in marketing to the U.S. Hispanic market. She founded UP Advertising after a stint at Coca-Cola, where she developed and lead the shopper marketing program for Hispanic markets in 2013.
As partner of business strategy at UP Advertising, she is in charge of executing the creative process, developing multiplatform marketing programs and crafting Brand development strategies.
Felipe Uribe, partner and director of accounts at UP Advertising, brings more tan 12 years of experience in marketing and sales. He has extensive knowledge in customer engagement and advertising in the U.S. And South America.
Edith Cisneros graduated from Kennesaw State University with a Bachelor's in Business Administration and Marketing concentration. With over 6 years experience as a marketing manager, Edith enjoys implementing impactful cross-channel marketing campaigns that remain sensitive to the client's audience. Giving the best customer service and results are always top priority.
In her native Bogotá, Colombia, Camila is in her senior year at the Jorge Tadeo Lozano's University, majoring in Graphic Design. Her experience as visual communicator has given her an expertise in branding and illustration.
Attended The Benemérita Universidad Autónoma de Puebla, México with specialization in Design and Marketing.
His constant participation and collaboration in institutional, professional and social projects, have given him experience in Branding, Packing, Sign and Illustration, which will help accomplish the success of your objectives and brand positioning.
I'm Camilo Martínez, IT Tech at Minutos de Dios University and web developer since 2015. Always passionate about the IT world; particularly drawn by the development and design of web platforms.
Publicist of the Catholic University of Manizales, passionate about good ideas and creative work. A person with experience in the conceptual and graphic field who sees advertising and design as a means to break the boundaries and build new ways of communication. For Lucas, discipline and perseverance are the main keys to this process and he knows that in every project you have to give his best to achieve the objectives and obtain excellent results.
He is a music lover. He likes to travel, soccer and the ocean.
His source of inspiration is his family and his blindly believes that whoever does good things, only good things await them.
Pulina Montoya Alvarez, her hometown,Medellín, Colombia, she is studying her sixth semester of Business Administration at Eafit University with emphasis on Marketing. She is organized, punctual with talent to organize agendas and she is an event planner. Also, she is Interested in social media management.
Ana earned a Studied Business Administration at the University of Guadalajara, in Gudalajara Mexico. She moved to Atlanta, Georgia in 1996. One of her goals was to learn English and improve her career. She fell in love with the city and decided to stay and make Atlanta her new home. Ana is fluent in English and Spanish with a vast knowledge of the Hispanic Community and their needs. She found a good fit at UP Advertising as a translator and communicator. Ana loves to be with her family including her dog. One of her hobbies is to travel and visit new places. She also enjoys learning about different cultures and their traditions. This has make her feel very proud of her roots.
We develop the key messaging you need for your brand to be successful.
Taking brands to new heights is what we do best. Find out what we can do for you. Drop us a line or give us a call and let us know what´s on your mind. | 2019-04-25T02:02:19 | http://www.upatlanta.com/ |
0.999276 | Goal 1: All students are Capable Learners who transfer their prior learning to new demands, in and out of school.
Objective 5: All students will graduate and be well-prepared for their future as measured by the District graduate survey as well as career and college readiness data.
Parkway's 2012 graduation rate was 96.1%.
We administer a survey to all 12th grade students during the week of graduation. A follow up survey is given to those same students 180 days later. A second follow-up survey will be administered four years after graduation.
The standards measured by the ACT predictive of future student success in college and career are called the College Readiness Benchmarks. The graph display indicates that our students are exceeding Missouri and national averages in all tested content areas as measured by the percentage of students meeting or exceeding the ACT Benchmark Score. While college readiness performance is strongest in English, our students are exceeding national and state averages at the greatest rate in both math and science.
Graduation is symbolic of a terrific achievement and accomplishment, but a diploma by itself does not guarantee future success. In order for the Parkway School District to meet its mission of ensuring that all students are capable learners who understand and respond to an ever-changing world, the district must not only ensure that all students receive a Parkway diploma but are also prepared to transfer their learning to new demands in and out of school. | 2019-04-21T02:59:38 | http://www.pkwy.k12.mo.us/edline/dashboard/mo1_5.cfm |
0.996365 | Does anyone know how far the pivot arm travels from clutch not engaged (as in foot off the pedal) to clutch engaged (as in foot on the pedal and the pedal depressed)?
By pivot arm, are you talking about the clutch fork?
I see no one answered this question. I can't answer it either, but curious as to why you are asking?
Mike, where were you meaning from? The inner face where the throwout bearing clips in or the outer end where the adjusting rod goes through?
I am referring to the distance the pivot arm moves from just off the pressure plate to full engagement. I was asking because I am running a hydraulic clutch system that I fabricated. It uses a Wilwood master cylinder connected to the clutch pedal via an adjustable rod and a slave cylinder down on the trans. You push the clutch and it depresses the piston in the MC which in turn forces fluid into the slave cylinder pulling (in my case) a rod that is attached to the pivot arm.
I was having some issues getting enough clearance and enough pressure plate engagement. I have overcome this for now by removing a stop I built and now it works adequately.
You have any pics of your install? I did the same thing and am struggling with disengagement as well as high pedal effort.
Here is a pic of the slave cylinder. I will have to look for other pictures (I know I have). I am running a Wilwood MC connected to the pedal by a rod. This MC pushes fluid to the slave cylinder which in turn pulls the pivot arm. I recently discovered a couple of things, first was that I did not have enough pedal travel to fully engage/move the slave/pivot arm. So I removed the stop I had made completely and now I have a significant amount more of pedal travel and disengagement but still not enough IMO. The second thing I discovered was that due to the angle of my rod coming off of the pedal I really was at a mechanical disadvantage; meaning that I have to have the clutch pedal adjusted to the top (as in near the dash) in order to get enough travel of the rod to activate the slave cylinder.
My intention is to modify the arm with a pivot arm coming off of it so that pressure is applied to the rod in a "straight in" angle for a longer period of time. See the attached picture of the pedals, this is off another car but you can see the lever on the clutch pedal that demonstrates what I am talking about.
Thanks I am using a similar setup. I have a borg and beck 3 finger PP, so I am going to reinstall the overcenter spring and rebleed the system and see what happens.
I am using a diagram style PP but I need more travel of the pedal/rod to get the TB and PP to over center for ease of holding the clutch.
Have you thought about drilling a hole closer to the TB end, and connecting there? Would increase mechanical advantage, and increase fork travel on TB end, but also pedal effort.
I did think of that but I wanted to keep the mechanical advantage on the arm and the pivot ball aspect. I haven't dug too deep into it yet, weather has turned to crap here (cold and snow) and I am neck deep into fixing some things on one of my trucks (01 Ram 4x4). I will get back to it relatively soon. I intend to use the same system on my 70 Road Runner. | 2019-04-21T01:04:54 | http://www.cuda-challenger.com/cc/index.php?topic=122084.msg1181812 |
0.999664 | SHOULD I TAILOR THE SPEECH FOR THE TYPE OF AUDIENCE?
If you simply want to give a pretty good presentation, don't waste time trying to figure out how to tailor your speech to your audience in terms of stories versus facts. Audiences around the world are all the same: they want stories that involve relevant ideas and facts that affect them. If all you do is present the facts, ma'am, there is an excellent chance your speech will come up short—and be incredibly boring and instantly forgotten.
It is true that different audiences will tell you they like different styles as far as facts versus concepts versus stories. Ignore them. You do, however, want to tailor your messages to your audience; so by all means, do some research and find out what messages your audience is interested in, what questions they need answers to, and what problems they have that you might be able to solve. Then give them a presentation that is focused on a handful of messages that are important to them and to you, a story for each, and the most essential relevant facts. I know you've heard that one size doesn't fit all, but in this case, it really does. Messages may differ from audience to audience, but the best way to tailor your speech to an audience really does not change. | 2019-04-23T21:11:38 | https://www.oreilly.com/library/view/how-to-give/9780470597149/ch03.html |
0.998829 | The classic dish is updated by adding oven-roasted tomatoes, mushrooms, and onions to deepen the flavors. What to drink: A soft, fruity Sangiovese.
Preheat oven to 400°F. Combine plum tomatoes, mushrooms, and onion in large bowl. Add 3 tablespoons oil and vinegar; toss to blend. Sprinkle generously with salt and pepper. Spread vegetable mixture in single layer on large rimmed baking sheet. Roast until onion slices are golden brown and all vegetables are tender, stirring frequently, about 50 minutes. Remove from oven and set aside. Reduce oven temperature to 350°F.
Sprinkle chicken with salt, pepper, and 1 tablespoon rosemary. Heat remaining 2 tablespoons oil in heavy large deep ovenproof skillet over medium-high heat. Add chicken and sauté until golden brown, about 6 minutes per side. Transfer chicken to bowl. Add wine to skillet and boil until wine is reduced by half, scraping up browned bits, about 1 minute. Stir in canned tomatoes with juice, then broth and bring to boil. Reduce heat to medium and simmer 10 minutes to blend flavors. Return chicken to sauce in skillet. Place skillet in oven and roast uncovered until chicken is cooked through and juices run clear when pierced with knife, about 25 minutes. Remove skillet from oven. Stir in roasted vegetables, remaining 1/2 tablespoon rosemary, half of basil, and half of capers. Simmer over medium heat until vegetables are heated through. Season with salt and pepper.
Place pasta in large shallow bowl. Top with chicken and sauce. Sprinkle remaining basil and capers over.
I thought this recipe was great. I used a couple of suggestions from other reviewers and other cacciatore recipes, such as adding green pepper, some garlic, and some black Spanish olives. Also, I used skinless, boneless chicken thighs, because that's what I had bought before looking for recipes. For the garlic, I just put a few cloves in their husks in to roast with the veggies, and then squeezed out the roasted garlic. The only things I would do differently next time are: 1) wait till about half way through to add peppers to the roasting veggies, so they will be less well done; and 2) cut the large slices of onion into quarters before roasting. I found the larger strings of onion rings hard to eat and not the right size with the other vegetables. I might also add some wedges of fennel to the roasted veggies, because, why not? The main thing that's great about this recipe is the roasted veggies. The tomatoes turn out like a tomato paste, but with much better flavor. I didn't think it lacked salt, as some people have said, and didn't season in the last step either, because I figured that the olives would add some saltiness.
Awesome. A fair amount of work, but roasting the veggies ( a favorite technique of mine for making cooking salsas and for tomato sauce. ). Here it added an intensity of flavor that elevated this dish to a new plateau. One caveat. I cut this recipe I half, and because my wife is no fan of onions, I cut the onion to one large 3/8 inch slice and one smal 1/4 inch slice, I found this to be plenty for 14 ounces of chicken. Half a large red onion would have been to much for me as much as I love onions. Cooking times were spot on. As for those who found this bland ? I found it earthy and rich with flavor of the wine, mushrooms , herbs , tomato and the chicken. I liked the way baking it preserved the crispy skin developed during the sauté process. No garlic needed (and I love that too) .
This turned out amazing! I added Balsamix vinegar. Would def cook this again! A big hit in my house, even with the kids.
Unquestionably the best cacciatore that I have ever had. What really makes this recipe is Rosemary and the red wine. Added four cloves of garlic & two small semi hot peppers to the roasted vegetables. Would not have roasted them, but was baking a pie at the same time. Grilled the chicken before adding to veggies. Yummy!
Terrific. The secret is to spread vegetables for roasting out in ONE layer in two sheet pans. That way they caramelize instead of steaming. Agree with other reviewers that one should attend to the three places where salt is indicated. I used boneless thighs instead of chicken pieces. Try this with Dreamfields low glycemic index penne. And yes it is even better the next day.
I made this recipe recipe for a big family dinner, and it was a dissapointment. The one high point was the roasted veggies; that was a plus compared to using only canned tomatoes. Downsides? Not enough salt, no garlic, no bell pepper and overall weak flavor. I made a second batch for wife and I adding items above, plus some balsamic vinegar and more basil; that was good. I won't make this recipe again.
When reducing the wine, I added 4 anchovy fillets and let them melt into the wine/canned tomatoes/broth mixture. And I added six chopped Kalamata olives at the end along with the rosemary, basil and capers. This is a great recipe - perhaps a bit more work than I thought, but worth it.
This is one of my favorite recipes. I do make three small changes that I feel enhance the flavour. I brine the chicken, toss in a parmasen rind to the tomato sauce, and when it is finished cooking I mix in a tablespoon or more (depending on the taste) of a purchased basil pesto. Oh, I also use Osso pasta but that dosen't really count as a change.
Made this recipe and I could have licked the bowl it was so good. I made one altercation and that was adding 6 Spanish olives at the end as I like olives with my cacciatore. Not sure why other reviewers said it needed salt. It was perfectly seasoned and I wouldn't change a thing. Also, the recipe calls for salt and pepper 3 times. Maybe they glazed over those steps? Just to close, this recipe tastes like it is out of a high end Italian restaurant. Definitely making again.
Only in the magical and mystifying world of Epicurious does this recipe qualify as "quick and easy." It takes two hours to make and it is in no way worth the time. Skip it.
This recipe provided the bones of an excellent cacciatore. We used our own frozen heirloom tomatoes(plum & mixture of green zebras, persimmon, zapotecs), deboned chicken breasts and thighs cut into slices, and roasted whole garlic cloves with the vegetables. We also served the cacciatore over spaghetti squash from our garden. We started the dish early in the day so that by the time we served it around 7pm, the flavors had married which made for a delectable dinner party!
I don't usually write reviews, but read them everytime I try a new recipe. I doubled this recipe for a larger group, used half fresh tomatoes, half green pepper, added the black olives another reviewer suggested. It was very good the first night, but the leftovers the second night were fabulous. If I make this again for entertaining (which I undoubtedly will), I would make it the day before and let the flavors blend. I've made other cacciatore recipes but none as good as this one.
This recipe was fabulous. I made it exactly as is and it couldn't have been tastier.
There were a couple things that I did differently: 1) I used two boneless/skinless breasts and five boneless/skinless thighs (seasoned with one garlic clove, rosemary, basil, pepper and season salt) 2) I used one each: red, yellow, orange bell peppers and omitted the plum tomatoes 3) I used half of a large Walla Walla sweet onion 4) I didn't have red wine so I used white cooking wine 5) Instead of Sherry wine vinegar I used just plain red wine vinegar 6) I did it all on the stove top since I didn't have a pan that can go in the oven. I sliced the chicken into strips, covered with seasoning and then placed in the pan with hot olive oil. I let the chicken cook until it was almost done and then placed in a bowl. I followed the directions for the sauce. While the sauce was coming to a boil and simmering, I sauteed the veggies in another pan. Added it all together when it was ready. It definitely cut down on the original cooking time! It was delicious and I am so glad that I added the things I did, definitely brought out more flavors. Plus, they were ingredients that my dad puts in his recipe - and his is the best chicken cacciatore I've ever had!
I thought this was just perfectly delicious. The seared chicken was incredibly flavorful, and I wanted to fight my husband for the roasted vegetables. We served it without pasta to save calories but did not miss it at all. Completely worth the time and definitely a keeper!
The recipe was a lot of work with little pay off. Reached for the salt as soon as it hit the table. It lacks flavor.
Brings back strong memories of the Chicken Cacciatore my father used to make. Delicious!
Finally swung at this one. Now that its a hot summer day, I used my charcoal grill instead of the oven for all prep other than the finishing steps (chix in sauce in oven, then on the stove once the veggies are added back just before serving). The roasted flavors were great. I followed the rule that you never cook with wine you don't enjoy drinking. Would that contribute to some of the bad experiences others have had? I also added some garlic slivers to the wine as it reduced. Couldn't cook the dish without some garlic. I used three cloves. Also, had to hunt around for the Sherry Vinegar as given the underwhealming experience some have noted here I was not going to assume that Sherry Cooking Wine would substitute. We will definitely enjoy this one again. Next time instead of using boneless skinless thighs I may mix in some breast meet. BTW, I salted the chix and let it sit in the fridge for several hours before cooking. Prior to putting the chix on the grill I rinsed off the "stale" salt and started over with fresh salt and pepper as it went over the fire.
followed the recipe to a T and honestly, the flavours are so dead I might as well have cooked it in the microwave from a frozen dinner pack. It didn't taste like something home made, fresh, bright flavours etc. Just boring and dead on the palette. Will never make again. | 2019-04-21T18:31:08 | https://www.epicurious.com/recipes/food/views/Chicken-Cacciatore-231738 |
0.999999 | Saturday brings the rematch between pound-for-pound king Floyd Mayweather (46-0, 26 KOs) and hard-charging challenger Marcos Maidana (35-4, 31 KOs). In their first fight in May, Maidana had significant success early on by pushing Mayweather against the ropes and landing his overhand right in close quarters. By the second half of the bout, Mayweather kept the action in the center of the ring and consistently landed the better punches. Mayweather wound up winning the match by a majority decision, and he deserved the nod. However, boxing fans were unaccustomed to seeing Mayweather take the type of punishment that he did against Maidana.
For the rematch, Maidana has emphasized better conditioning and a lighter fight-night weight. Maidana and his trainer Robert Garcia believe that these changes will give their team a better chance to win a decision. On the Mayweather side, Floyd's trainer and father, Floyd Mayweather Sr., has suggested that they also will use different tactics in the rematch but Floyd Senior has been coy about specifics. (I would imagine that a major change would involve staying off of the ropes).
Will Maidana's improved conditioning be the final piece of the puzzle for him to earn a victory over the sport's best or will Mayweather's intelligence, accuracy and adaptability be enough to keep him on top of the boxing world? Read below for the keys to the fight. My prediction will be at the end of the article.
1. What can Maidana do in the center of the ring?
It's pretty clear that Mayweather will try to keep the fight in the center of the ring. In the second half of their fight in May, it was Mayweather who had more answers from distance. From range, Maidana was able to land some jabs but he couldn't consistently connect with power shots.
For Maidana to have a prayer of winning a decision (he still has the crushing right hand that can knock anyone out at welterweight), he's going to have to figure out how to hit Mayweather at mid-range and from distance. His best approach will be to vary his attack – he’ll need to use his whole arsenal, including feints, jabs (to the head and body) lead right hands and the occasional left hook, to have some success.
I'm sure that Maidana will still look to push Mayweather to the ropes and/or get him in close range whenever possible, but Mayweather will try to limit these opportunities. Without sustained effectiveness from the outside, it will be very tough for Maidana to win a decision.
2. Does Floyd still have his legs?
At 37 and with 46 professional fights under his belt, can Floyd still maneuver himself around the ring to avoid trouble the way that he did earlier in his career? On paper, Maidana seemed like a fairly easy opponent for Mayweather. A straight-line fighter with a limited arsenal, Maidana was the type of foe that Floyd should have been able to defeat with his superior athleticism and ring generalship. However, that certainly wasn't the case early in their first fight.
For Mayweather to win the rematch more comfortably than he did in May, he needs to reduce Maidana's punch volume and take away his best weapons – by that I mean anything from close range. Mayweather can best do that by staying away from the ropes and using the ring to his advantage. When Maidana has to track down an opponent, he can look ordinary. But with a willing fighter standing in front of him, Maidana morphs into a beast. I'm sure that Floyd and his camp know these things but can Mayweather still execute such an athletic game plan at his advanced ring age? If not, he is in for a dogfight, like their first match.
Yes, Floyd got beat up pretty badly on the ropes during the first third of their fight in May. Part of that can be attributed to Maidana's fearlessness, unrelenting pressure and odd-angled power shots. However, I also believe that Floyd went to ropes on purpose. He thought that he could hurt Maidana coming in and that success in this area would dissuade the Argentine from mounting an aggressive attack later on in the fight; he wanted to beat Maidana at his own game. Obviously, that approach wasn't altogether successful. Mayweather ate a ton of flush shots in the first four rounds, something that he certainly looks to avoid.
In the second half of the fight, Mayweather did a fine job of spinning out of trouble along the ropes, demonstrating that it wasn't just Maidana trapping him there. Floyd could get away from Maidana when he wanted to; his insistence on fighting toe-to-toe early enabled many of those successful moments from Maidana. So, let's credit Maidana for landing a lot of hard shots in the first fight, but let's also attribute some of that success to a rare case of poor tactics from Mayweather.
For the rematch, Maidana has talked about pacing himself better throughout the fight. The punch stat numbers from their first match showed a noticeable drop-off in activity after the first six rounds. In assessing his performance from May, Maidana correctly realized that his conditioning was one area that he could certainly improve upon in the rematch.
I expect that we will see far less grappling and fewer clinches along the ropes on Saturday. In theory, that should be beneficial to Mayweather. However, if Maidana can retain his firepower in the second half of the fight, then it's certainly possible that the complexion of the rematch will be significantly different from their first meeting.
The one piece of coherent advice that I heard from Floyd Mayweather Sr. during the first fight was "Keep going underneath." And frankly, Mayweather's body shots were devastating and may have had as much to do with Maidana's drop in effectiveness in the later rounds than any potential conditioning issues. In the rematch, I expect to see Mayweather continue to go the body with jabs, right hands and left hooks. Maidana does have the heart of a true warrior, but not always the physique. Mayweather will keep going to the body, but will Maidana be able to take those shots better in the rematch?
Maidana is a vicious body puncher at close range. Maidana's left hook to the body was a real weapon early in their first fight. Although Mayweather took those punches pretty well, Maidana should keep going to the body on Saturday whenever he gets a chance. At 37, who knows when Mayweather's body might betray him and punishing him downstairs will be great way to find out.
Part of what makes Mayweather so tough to beat is that he is always the better conditioned fighter. He almost always gets stronger as fights progress. He looks for signs of degradation in his opponents' conditioning and after spotting them he starts to unload more of his offensive arsenal, providing yet even more complications for his foes.
For Maidana to win on the cards, he must maintain his work rate and pressure throughout 12 rounds. He can't conserve energy and fight in 45-second spurts, which he has often done against other opponents. But can Maidana successfully close the conditioning gap? Can he still be a factor late in the fight? Will he have enough left to win the championship rounds? He'll have to make a marked improvement in his conditioning from the first fight to beat Mayweather late in the match.
There are a number of factors to consider for the rematch: 1. Floyd may have overlooked Maidana in their first fight and/or Maidana's pressure and determination surprised him. 2. Maidana has vastly improved under Robert Garcia. 3. Floyd was able to adapt fairly well to Maidana in the second half of the bout. 4. Mayweather most likely won't spend as much time at close range as he did in May. 5. Floyd is 37 and not getting any younger.
My prediction will ultimately be splitting the difference of these countervailing trends. I think that Mayweather pulls the fight out with superior accuracy in the center of the ring and sharper punching. However, I'm not sure that he will be able to keep Maidana away from him for 12 rounds. Ultimately, Mayweather's tactical changes from the first fight, superior hand speed and punch placement will lead him to victory.
Floyd Mayweather defeats Marcos Maidana 116-112, or 8 rounds to 4. | 2019-04-25T17:56:23 | http://www.saturdaynightboxing.com/2014/09/mayweather-maidana-ii-keys-to-fight.html |
0.999982 | Which is a problem. NS was not the entire core of Naruto; really what killed Naruto was the Last/SP trying to force nH into being "the core." However, for Boruto BS is the core. The story is in-theory; Bolt training under Sasuke to take his place, and be the supporting shadow for Salad who dream is to be the next Hokage. Since that is the dream/goal of the main character. However, that has not been the focus on the manga (or the anime but we are focusing on the manga here). What has been the focus of the manga has been setting up the next generation's SNS conflict. Why are they doing this? Like I say, because Bolt nearly completed his dream in movie. So they should now be focusing on Salad's journey to become hokage, but because she is the daughter of Sakura they don't. So instead, just in case she becomes unpopular and replaced by the clone they started up Neo-SNS to replace it as "the core of the story."
And these people have the gall to say "It is not a romance manga." Could have fooled me. They made a whole movie about one girl and her love and all these men all of a sudden wanting her...everything literally revolved around her. Even how "suddenly Sakura is Hinata's best girl friend."
"Not a romance manga" my foot.
I said this before. They NEED a justification of that "Hinata fan-fiction" of a movie when its very existence undermines and destroys the factors and arguments that they make up in their heads and threw at us at every turn; That Hinata is Naruto's SOULMATE and that they were destined to be together since her very introduction and that Naruto always loved her over that "prudish w*#&e" Sakura Haruno.(*sarcasm*) But the movie's very existence blows a hole of epic proportions into that argument and proves either way Naruto had NO DEVELOPMENT with Hinata until this point because why else does this movie exist?
If Naruto is not a romance manga why does this movie need to focus on how he is now full of thoughts of Hinata and wants to "bam bam her" only then? Because then, they admit the movie was a pointless retcon and waste of time since they say Naruto never needed that development with Hinata for the relationship to blossom, but the movie says other wise, now doesn't it? In that very movie it ADMITS Naruto never gave Hinata any thoughts until this point. So, is the movie "NECESSARY or UNNECESSARY for NaruHina's romance?" The Hinata fanatics won't answer.
But if Naruto WAS a romance manga then, AGAIN why does that movie need to be made to give Naruto and Hinata romantic development? Why does that movie show case how Naruto and Hinata fall in love in the span of a few days instead of being SO IN LOVE for all the years they have been together like NH cultists claim? Because then they'd be admitting; NaruSaku- Always there, NaruHina- Nil. In the manga, whom does Naruto spend time with when he's not working? Sakura. Whom did he tell his zombie father was his girlfriend pretty much when they reunite? Sakura. whose relationship does Minato x Kushina, Jiraiya x Tsunade, and Obito x Rin resemble? Naruto and Sakura. But if it was suppose to be Hinata, why wasn't it drawn or presented in the the manga directly? Again why was this movie even made? So does Naruto love Sakura or Hinata in the manga? The Hinata fanatics remain silent.
As you have said yourself James, the NaruHina fanatics want to have it both ways, but they can't because saying one thing debunks the other thing. They say Naruto is not a romance manga, but then that admits Naruto was never in love with Hinata to begin with and that movie was NEEDED to actually start their relationship. But then that is also ADMITTING "what were we arguing for all this time?" because that is admitting NaruSaku was the dominant romance for all those years the manga was published and that Naruto's feelings for Sakura were always there whereas He did not notice Hinata until the movie but they can't ADMIT THAT since Hinata is Naruto's "one and and only true love" you see, and then that turns on its head again with "Why is that movie canon and necessary, why is that movie canon and necessary?"
So then they delude themselves into the argument that Naruto is not a "romance manga" but all we have to do to destroy their minds is ask " so Naruto never loved Hinata then and that movie was needed to to justify their romance?"
and then they will go: I NEVER SAID THAT!!!!!!!!!
and then we will just keep pushing: So why does Naruto need to take til that movie to admit he loves Hinata? Does that mean he only loved Sakura until that point?
And they scream : THAT IS NOT WHAT I MEANT!!!!!!!!
And then we go: So did Naruto love Sakura or Hinata for all of the manga then? Either answer, I ask again, why was that movie made or even needed for Naruto and Hinata if they are so in love as you say?
Edited by Phantom_999, 05 January 2019 - 04:56 AM.
As you have said yourself James, the NaruHina fanatics want to have it both ways, but they can't because saying one thing debunks another thing. They say Naruto is not a romance manga, but then that admits Naruto was never in love with Hinata to begin with and that movie was NEEDED to actually start their relationship. But then that is also ADMITTING "what were we arguing for all this time?" because that is admitting NaruSaku was the dominant romance for all those years the manga was published and that Naruto's feelings for Sakura were always there whereas He did not notice Hinata until the movie but they can't ADMIT THAT since Hinata is Naruto's "one and and only true love" you see, and then that turns on its head again with "Why is that movie canon and necessary, why is that movie canon and necessary?"
So you see they delude themselves into the argument that Naruto is not a "romance manga" but all we have to do to destroy their minds is ask " so Naruto never loved Hinata then and that movie was needed to to justify their romance?"
Oh it is such a delicious irony. The one thing that makes NH canon is the very thing that destroys what little they had in the manga. Its mere existence destroys the very notion that NH was a possibility. I once said that the only way SS and NH could be canon is it would have to be one of the biggest retcons in anime/manga history and I was not wrong.
The movie counteracts and even destroys the very scene that NH fans hold so dear...the Pein Arc confession. To them, this was such a monumental moment. Hinata confessed her feelings to Naruto....and according to the movie not only did Naruto not understand the entire scene, but he forgot about it and never even cared about Hinata for 2 years.
Naruto the Last if proof that NH is and always will be a retcon. Canon means very little when fan don't believe it. Canon is a trophy made of aluminum foil that crumples under its own strain. If any development between Naruto and Hinata exists...Naruto the Last says "That's not important." If it was, Naruto would not have ignored Hinata for years like he did. I don't care how "oblivious to love" people claim he is, but no one is that stupid.
"Naruto and Hinata getting together has proof in the manga"
Well, then why make the movie? If it was so obvious, then maybe Naruto the Last should have been about something else.
"Naruto and Hinata got development in the manga"
Naruto the Last says Naruto didn't care about it.
"Naruto is stupid when it comes to love."
So does that mean you are admitting the Hinata confession meant nothing cause Naruto thought she meant food? Naruto the Last seems to think so.
"Naruto loves Hinata with all his heart and he would do anything for her."
Except walk her home at night letting her go by herself and not actually care about her.
Sakura: "Hey Naruto, maybe you should ask to walk Hinata home?"
That scene just sums up NH so well. As cringe as the movie is, it blatantly says "Naruto didn't give a crap about Hinata or her love in the manga until someone else told him to care about it." Sakura, Shikamaru, even the villain Toneri; all had to persuade Naruto to look in Hinata's direction. Her love is so pathetic that not even Naruto could see it. How obvious can they truly say it is when even the main character, who that love is for, is so oblivious to it all. I mean, I could understand if they were being really subtle and not being open about it, but Hinata's confessed right to his face...AND HE STILL IGNORED HER.....FOR 2 YEARS.
The proenders have a choice. Either Naruto the Last is canon and Naruto is brainwashed to love Hinata or Naruto the Last is not canon and NH is a retcon. Either way, it does not look good for NH being a believable love story. So the proenders are right. NH is obvious.....obviously a retcon to force push a pairing to try and get people to buy more Naruto stuff.
And while I don't think NS could have saved the ending overall...it would have made things a lot better for not only Naruto, but Sakura as well. She would have shown to let go of her silly crush and actually grow up. This is why the characters had to regress in their mind and development because there is no way any female would be this dumb to date a man like Sasuke after what he did or even any female still be attracted to a man who pays her no attention for 2 years.
So in conclusion, NS would not have saved the ending or what damage was done in the war arc, but the manga still would have been far better off than what we have now and MAYBE people would have had a chance to forgive the mistakes. Now the mistakes keep piling.
Naruto is not a romance manga, but it is not a shounen either. It is just a pile of mud. It doesn't know what it wants to be anymore. It is trying so hard to cram so much into one story.
If this is supposed to be a shounen, it has too much romance as a focus and not enough good shounen morals that teach to young kids.
If this is supposed to be a romance manga, it has too little romance to justify why the characters got with who they did get with.
Naruto the Last makes a great shojo though if you ignored 15 years of the manga and Hinata is the main character.
Edited by James S Cassidy, 19 December 2018 - 05:37 PM.
Yeah Oblivious to love he is, the guy that flirts and blushes around the "girl of his affections" | 2019-04-23T20:32:14 | http://www.narusaku.com/index.php?s=a5ab621bf91d02847df1dba9ae9d07c0&showtopic=16469&page=2 |
0.999999 | Malcolm Turnbull put the Liberal leadership on the line over climate change before the forthcoming round of climate talks in Copenhagen - and lost.
I think the pummeling should be starting soon on obama.
All this time, for years and years, the believers have been telling us how much money is behind the skeptics, when all that time, it was actually the believers who were rolling in BILLIONS from governments and institutions from around the world.
According to one of the documents hacked from his center, between 2000 and 2006 Mr. Jones was the recipient (or co-recipient) of some $19 million worth of research grants, a sixfold increase over what he'd been awarded in the 1990s.
Thus, the European Commission's most recent appropriation for climate research comes to nearly $3 billion, and that's not counting funds from the EU's member governments.
In the U.S., the House intends to spend $1.3 billion on NASA's climate efforts, $400 million on NOAA's, and another $300 million for the National Science Foundation.
The amount of money pouring into the GW hoax is amazing....and they want more...trillions in fact, to save the world.
They are still going to try. They aren't even going to kiss us before OR after f'ing us.
Claims that climate change is accelerating are bizarre. There is general support for the assertion that GATA has increased about 1.5 degrees Fahrenheit since the middle of the 19th century. The quality of the data is poor, though, and because the changes are small, it is easy to nudge such data a few tenths of a degree in any direction. Several of the emails from the University of East Anglia's Climate Research Unit (CRU) that have caused such a public ruckus dealt with how to do this so as to maximize apparent changes.
In one of the more telling disclosures from last week, a computer programmer writes of the CRU's temperature database: "I am very sorry to report that the rest of the databases seems to be in nearly as poor a state as Australia was. . . . Aarrggghhh! There truly is no end in sight. . . . We can have a proper result, but only by including a load of garbage!"
Yeah, but umm... his title doesn't say "climate scientist" so umm, he isn't qualified! *chuckle* sorry, I had to.
Unimpressed by the news is David Holland of Northampton, a grandfather with a background in electrical engineering, who is seeking prosecution of the CRU scientists involved in suppressing and even destroying climate data in violation of Britain's information disclosure laws.
Mr. Holland filed a complaint with the Information Commissioner's Office last week after the leaked e-mails included several Freedom of Information requests he himself had submitted to the CRU, requests that went nowhere, and the CRU scientists' private responses to them.
(CNSNews.com) – Sen. James Inhofe (R-Okla.), ranking member of the Senate Committee on Environment and Public Works, is calling on Chairman Barbara Boxer (D-Calif.) to conduct hearings on a possible conspiracy between some of the world’s most prominent climatologists to, among other things, manipulate data on so-called global warming.
How can she have any credibility left if she ignores this? The EPA has based their finding on the CRU and so has her committee.
“This is a difficult issue for many liberals, many Australians, but most people who doubt the science also know that it makes sense to take out insurance . . . to manage the risk and to give the planet the benefit of the doubt until any risk is either averted or proven wrong,” Mr Turnbull said.
In other words - Bah, forget the very real possibility that the entire thing is a total scam, and live like cavemen for a few generations, under an all powerful, controlling government, then... if things turn out okay, and this was just a scam, your great grand children can try to rebuild your country.
This was the actual plan that was projected. | 2019-04-23T09:00:23 | http://www.city-data.com/forum/politics-other-controversies/821635-hacked-emails-gw-advocacy-group-hide-58.html |
0.997999 | Have you made Boiled Apple Dumplings?
2. Blend butter or lard into flour, add salt and baking powder, mix well.
3. Moisten with milk, using more or less than called for, to make a soft dough, one that will roll nicely without being sticky.
4. Roll to about 1/2-inch thickness and cut into rounds the size of a saucer.
5. Place an apple in the center of each round, filling center with sugar and a little cinnamon.
6. Wrip dough around apple, seal and tie each dumpling in a floured cloth bag.
7. Plunge immediately into boiling water and boil 30 minutes.
This recipe contains potential food allergens and will effect people with Wheat, Milk, Butter, Gluten, Fructose Malabsorption, Apple allergies. | 2019-04-24T08:20:18 | http://www.recipekey.com/therecipes/Boiled-Apple-Dumplings |
0.999998 | What Is The Origin Of The Planet Earth?
The planet Earth is composed of four interacting components; namely, the rockosphere, atmosphere, hydrosphere, and biosphere. These component parts of the planet were formed one after the other.
Geologists believed that the young proto-planet was molten mainly because of the extreme heat generated by the accretion of materials as it grew, as well as the heat generated by radioactive materials.
Even today, the Earth collides with about 100 million "shooting stars" and unaccounted millions of micro-meteorites every day. Taken all together, these collisions add more that 2 million tons of matter to the earth each year. If this has been going on for about 4.6 billion years, the amount of matter added is equivalent equivalent to about a layer 10 feet deep over the planet's surface.
As the hot and molten proto-planet orbited through space, eventually surface layer cooled off and solidified to form a thin layer, the Earth's crust (or the primordial rockosphere); while the inner portion of the planet remained hot and molten. Since temperature increases with depth, thermal convection currents of molten materials (magma) persisted within (similar to convection currents in a cauldron of boilinfg water. In the weaker and fractured segments of the crust, the magma was extruded. And so the earth passed through an extensive period of volcanic activity.
For thousands of years, the volcanoes ejected lava and tons of gases such as superheated steam, hydrogen sulfide, carbon monoxide, and other volcanic gases. Because of the Earth's gravity, these gases formed the first Earthly primordial atmosphere.
Some geologists believe that the young planet was initially enveloped by gases which are left-over materials of the cosmic cloud; gases like hydrogen, helium, methane, ammonia, and miniscule amounts of the inert gases neon, argon, and xenon. When the young sun started radiating energy, it blew off most of these materials enveloping the planet. Thus, the young Earth was initially devoid of an enveloping atmosphere.
The Earth continued to cool off as it orbited around the sun. Occasionally, the water vapor in the atmosphere would condense to form rain drops which would evaporate as it fell on the hot Earth's surface. Eventually the Earth's surface cooled off sufficiently and the liquid water slowly accumulated to form pools, then lakes, and eventually oceans of water. Thus, from the Earth's interior, gases were ejected to form the atmosphere; and from the atmosphere, liquid water precipitated to form the hydrosphere.
The composition of the primordial atmosphere was unlie the present. Nitrogen was in the form of ammonia (NH3); carbon was in the form of methane (CH4), and there was hydrogen sulfide (H2S). There was no molecular oxygen (O2). Some geologists refer to the primordial atmosphere as a "reducing atmosphere."
For about 8 billion years, the rockosphere, the atmosphere, and the hydrosphere interacted chemically. From that interaction evolved the biosphere about 2 to 3 billion years ago in the primeval ocean of the young earth. Since then, the four Earth spheres have continuously interacted resulting in the recycling of matter. | 2019-04-19T04:35:36 | http://www.infobarrel.com/What_Is_The_Origin_Of_The_Planet_Earth |
0.999999 | RM2.5b to RM2.7b price tag for SPLASH acceptable to shareholders?
Maintain neutral: A source told The Straits Times last Friday that the federal and Selangor state governments have agreed to a RM2.5 billion to RM2.7 billion price tag for the takeover of Syarikat Pengeluar Air Sungai Selangor Sdn Bhd (SPLASH), the last water treatment concessionaire to be taken over and consolidated under the state’s water operator Air Selangor. According to the latest news, the deadline for negotiations is now set for Aug 10. The news article did not provide any additional details of the valuation basis; it was 1 times price-to-book value (P/BV) for past takeovers.
The source said the federal government has committed to fork out RM1.9 billion (70% to 76% of price tag), leaving the Selangor state government with RM600 million to RM800 million or 24% to 30% of the unconfirmed valuation range for SPLASH. However, Water, Land and Natural Resources Minister Dr Xavier Jayakumar immediately refuted these claims of the federal government’s role. In 2017 (pre change in government), a similar ratio of valuation top-up was proposed but fell through, exacerbated by political differences/issues.
The unofficial takeover value range in the news report lacked details in terms of valuation basis and breakdown (equity and asset value); the last rejected takeover offer in 2013 valued SPLASH at RM1.8 billion in its entirety, comprising RM251 million equity value at 12% return on equity and RM1.6 billion asset value. Based on the value range cited in the article, the implied P/BV multiple of 0.83 to 0.89 times FY16 and 0.77 to 0.83 times FY17 for SPLASH is lower than the 1 times P/BV benchmarked for past successful water asset takeovers.
On the surface, this news indeed appears positive as the valuation range is over 10 times the RM251 million amount that SPLASH’s shareholders were supposed to receive from the last offer made in November 2013. Recall that the last offer translated into a mere 0.1 times P/BV multiple for SPLASH. However, the response by the water minister last Friday refuting the valuation top-up scenario by the federal government pours cold water on sentiments, in our view; the source of funding has been a major hurdle to the Selangor state’s past takeover deals. | 2019-04-24T22:31:20 | https://www.theedgemarkets.com/article/rm25b-rm27b-price-tag-splash-acceptable-shareholders |
0.999989 | Will Kohl’s Deliver Improved Profitability in Fiscal 2019?
Amazon (NASDAQ:AMZN)has taken another huge step towards becoming an omnichannel retailer. The Seattle-based firm has expanded its alliance with Kohl's (NYSE:KSS).Source: Shutterstock Under the terms of the deal, customers may return the items they purchased on Amazon at all Kohl's stores. Previously, the service was only available at 100 Kohl's stores. * 10 Stocks to Sell Before They Give Back 2019 Gains Although the impact of the deal on Amazon stock remains unknown, the move makes buying producvts on Amazon more like making in-store purchases. It also could eventually enable Amazon to greatly expand its physical-store footprint.InvestorPlace - Stock Market News, Stock Advice & Trading Tips Returns at Kohl's Could Lead to Something BiggerKohl's already sells some items from Amazon in about 200 of its stores. Moreover, some Kohl's stores have an Amazon Smart Home Experience, which places the Alexa smart-speaker ecosystem on display. Now, with all Kohl's stores accepting Amazon returns, Amazon will be able to provide more personalized service to its customers. Consumers tend to feel dissatisfaction with a company when they return items, so adding a personal touch when returns are made can help a company avoid losing customers.However, I think the announcement speaks to a goal that's more directly critical to both AMZN and Amazon stock. Last year, Amazon launched Prime Wardrobe, a "try before you buy" clothing service. The service meets the needs of customers who want to feel and try on clothes before buying them. It also helps AMZN compete with firms such as Stitch Fix (NASDAQ:SFIX). Stitch Fix, another "try before you buy" outfit, uses artificial intelligence (AI) to determine individuals' clothing preferences.Still, some still might feel more comfortable buying clothes at a physical store. Consequently, an expanded alliance between AMZN and KSS or an outright buyout of Kohl's by Amazon would be a logical step for Amazon. Such a step would bring Amazon's Echo, returns, and clothing sales to over 1,100 stores across 49 states. It would also make Amazon a true omnichannel retailer in more areas. Furthermore, since consumers consider both Amazon and Kohl's "discounters," such a merger would likely be a better fit for Amazon than its acquisition of Whole Foods has been. Retail Profits Don't Affect Amazon Stock MuchHowever, the Whole Foods deal should lead investors to question the extent to which a merger with KSS will help Amazon stock. The single-digit revenue growth of Whole Foods falls short of the growth of other parts of AMZN. Likewise, the owners of Amazon stock would have to realize that an acquisition of Kohl's would further slow Amazon's revenue increases.Moreover, despite the massive revenues that AMZN obtains from its retail business, the company earns most of its profit from its cloud business, Amazon Web Services (AWS). As a result, I do not see how any additional deals with Kohl's will help Amazon stock. Concluding Thoughts on Amazon StockAmazon's decision to accept returns at more Kohl's stores will make consumers view Amazon as more of an omnichannel retailer. The deal will also enable AMZN to provide an increased level of personal service to its customers. By buying KSS, AMZN would boost Prime Wardrobe and become one of the larger clothing retailers.However, for all of the buzz and revenue such moves generate, yesterday's deal increases the attractiveness of KSS stock more than AMZN stock. An acquisition of Kohl's by AMZN will likely not produce the massive profit increases which is important for the owners of of Amazon stock. AWS affects AMZN's profits much more than its retail business, and that will remain the case, no matter what happens between Amazon and Kohl's.Prime shoppers have a lot to smile about in the wake of the deepening alliance between AMZN and Kohl's. Prime Wardrobe customers and the owners of KSS stock may have more reasons to rejoice in the future. However, for the holders of Amazon stock, this deal should elicit little more than a yawn.As of this writing, Will Healy did not hold a position in any of the aforementioned stocks. You can follow Will on Twitter at @HealyWriting. More From InvestorPlace * 2 Toxic Pot Stocks You Should Avoid * 10 Oversold Stocks to Run From * 7 Red-Hot E-Commerce Stocks to Consider * 4 Stocks Surging on Earnings Surprises Compare Brokers The post The New Kohl's Deal Probably Won't Affect Amazon Stock Significantly appeared first on InvestorPlace.
Kohl’s will be accepting Amazon returns in all of its stores across the country, starting this July. As of today, only 100 Kohl's stores have this option. Yahoo Finance's Jen Rogers, Myles Udland, Brian Sozzi and Brian Cheung discuss. | 2019-04-25T22:25:37 | https://finance.yahoo.com/quote/KSS/?p=KSS |
0.999979 | Write a 300 500 short essay by responding to the following prompt: What benefits will your college education provide you in your personal and professional lives?
Previous Previous post: In this passage , the author discusses between several women who fought for the right to vote . How did these women differ in their approaches to achieving suffrages? In what way were these women connected ? | 2019-04-22T08:35:54 | https://www.premiumresearchwriters.com/write-a-300-500-short-essay-by-responding-to-the-following-prompt-what-benefits-will-your-college-education-provide-you-in-your-personal-and-professional-lives/ |
0.999078 | Let's begin with a simple analogy to help you understand classes and their contents. Suppose you want to drive a car and make it go faster by pressing down on its accelerator pedal. What must happen before you can do this? Well, before you can drive a car, someone has to design it. A car typically begins as engineering drawings, similar to the blueprints used to design a house. These engineering drawings include the design for an accelerator pedal to make the car go faster. The pedal "hides" the complex mechanisms that actually make the car go faster, just as the brake pedal "hides" the mechanisms that slow the car and the steering wheel "hides" the mechanisms that turn the car. This enables people with little or no knowledge of how engines work to drive a car easily.
Unfortunately, you can't drive the engineering drawings of a car. Before you can drive a car, it must be built from the engineering drawings that describe it. A completed car will have an actual accelerator pedal to make the car go faster, but even that's not enough—the car will not accelerate on its own, so the driver must press the accelerator pedal.
Now let's use our car example to introduce the key programming concepts of this section. Performing a task in an application requires a method. The method describes the mechanisms that actually perform its tasks. The method hides from its user the complex tasks that it performs, just as the accelerator pedal of a car hides from the driver the complex mechanisms of making the car go faster.
In C#, we begin by creating an application unit called a class to house (among other things) a method, just as a car's engineering drawings house (among other things) the design of an accelerator pedal. In a class, you provide one or more methods that are designed to perform the class's tasks. For example, a class that represents a bank account might contain one method to deposit money in an account, another to withdraw money from an account and a third to inquire what the current account balance is.
Just as you cannot drive an engineering drawing of a car, you cannot "drive" a class. Just as someone has to build a car from its engineering drawings before you can actually drive it, you must build an object of a class before you can make an application perform the tasks the class describes. That's one reason C# is known as an object-oriented programming language.
When you drive a car, pressing its gas pedal sends a message to the car to perform a task—make the car go faster. Similarly, you send messages to an object—each message is known as a method call and tells a method of the object to perform its task.
Thus far, we've used the car analogy to introduce classes, objects and methods. In addition to a car's capabilities, it also has many attributes, such as its color, the number of doors, the amount of gas in its tank, its current speed and its total miles driven (i.e., its odometer reading). Like the car's capabilities, these attributes are represented as part of a car's design in its engineering diagrams. As you drive a car, these attributes are always associated with the car. Every car maintains its own attributes. For example, each car knows how much gas is in its own gas tank, but not how much is in the tanks of other cars. Similarly, an object has attributes that are carried with the object as it's used in an application. These attributes are specified as part of the object's class. For example, a bank-account object has a balance attribute that represents the amount of money in the account. Each bank-account object knows the balance in the account it represents, but not the balances of the other accounts in the bank. Attributes are specified by the class's instance variables.
Notice that these attributes are not necessarily accessible directly. The car manufacturer does not want drivers to take apart the car's engine to observe the amount of gas in its tank. Instead, the driver can check the fuel gauge on the dashboard. The bank does not want its customers to walk into the vault to count the amount of money in an account. Instead, the customers talk to a bank teller or check personalized online bank accounts. Similarly, you do not need to have access to an object's instance variables in order to use them. You can use the properties of an object. Properties contain get accessors for reading the values of variables, and set accessors for storing values into them. | 2019-04-21T01:28:15 | http://www.informit.com/articles/article.aspx?p=1705441&seqNum=2 |
0.999085 | I am currently trying out the trial version to see any features which meet my requirement. Some feature I am looking for is to open a PDF document and display to the Android device and do some annotation on to it. At the moment, I can create a document and draw something on to it and save the document.
1) Loading PDF on to the screen either as an Image or on PDF viewer.
2) Loading Slide to the screen either as an image or some viewer. | 2019-04-19T15:37:10 | https://www.syncfusion.com/forums/124111/is-there-a-way-to-display-pdf-in-a-view-eg-pdfview-and-presentation-slide-as-well |
0.999996 | I summarise the points he spoke in a voice choked with emotion.
1. Dr Kalam used to receive costly gifts whenever he went abroad as it is customary for many nations to give gifts to the visiting Heads of State.
Refusing the gift would become an insult to the nation and an embarrassment for India.
So, he received them and on his return, Dr Kalam asked the gifts to be photographed and then catalogued and handed over to the archives.
Afterwards, he never even looked at them. He did not take even a pencil from the gifts received when he left Rashtrapathi Bhavan.
2. In 2002, the year Dr Kalam took over, the Ramadan month came in July-August.
It was a regular practice for the President to host an iftar party.
Dr Kalam asked Mr Nair why he should host a party to people who are already well fed and asked him to find out how much would be the cost.
Mr Nair told it would cost around Rs. 22 lakhs.
Dr Kalam asked him to donate that amount to a few selected orphanages in the form of food, dresses and blankets.
The selection of orphanages was left to a team in Rashtrapathi Bhavan and Dr Kalam had no role in it.
After the selection was made, Dr Kalam asked Mr Nair to come inside his room and gave him a cheque for Rs 1 lakh.
He said that he was giving some amount from his personal savings and this should not be informed to anyone.
Mr Nair was so shocked that he said "Sir, I will go outside and tell everyone . People should know that here is a man who not only donated what he should have spent but he is giving his own money also".
Dr Kalam though he was a devout Muslim did not have Iftar parties in the years in which he was the President.
3. Dr Kalam did not like "Yes Sir" type of people.
"Do you agree?" Mr Nair said "
No Sir, I do not agree with you".
The Chief Justice was shocked and could not believe his ears.
It was impossible for a civil servant to disagree with the President and that too so openly.
Mr Nair told him that the President would question him afterwards why he disagreed and if the reason was logical 99% he would change his mind.
4. Dr Kalam invited 50 of his relatives to come to Delhi and they all stayed in Rashtrapathi Bhavan.
He organised a bus for them to go around the city which was paid for by him.
No official car was used. All their stay and food was calculated as per the instructions of Dr Kalam and the bill came to Rs 2 lakhs which he paid.
In the history of this country no one has done it.
Now, wait for the climax, Dr Kalam's elder brother stayed with him in his room for the entire one week as Dr Kalam wanted his brother to stay with him.
When they left, Dr Kalam wanted to pay rent for that room also.
Imagine the President of a country paying rent for the room in which he is staying.
This was any way not agreed to by the staff who thought the honesty was getting too much to handle!!!.
5. When Kalam Sir was to leave Rashtrapathi Bhavan at the end of his tenure, every staff member went and met him and paid their respects.
Mr Nair went to him alone as his wife had fractured her leg and was confined to bed. Dr Kalam asked why his wife did not come. He replied that she was in bed due to an accident.
Next day, Mr.Nair saw lot of policemen around his house and asked what had happened.
They said that the President of India was coming to visit him in his house. He came and met his wife and chatted for some time.
Mr Nair says that no president of any country would visit a civil servant's house and that too on such a simple pretext.
The younger brother of APJ Abdul Kalam runs an umbrella repairing shop.
When Mr. Nair met him during Kalam�s funeral, he touched his feet, in token of respect for both Mr. Nair and Brother.
Such information should be widely shared on social media as mainstream media will not show this because it doesn't carry the so-called GB TRP value. | 2019-04-22T06:09:46 | http://dharmaraja.org/other.php?id=996 |
0.650184 | According to example given in documentation of DataGrid? method filter is intended for client side data filtering. However, I don't see why it can't be used for server side filtering as well.
The only problem that I run into was that isRender parameter passed in query is undefined which is causing PHP function json_decode to fails parsing JSON string.
Very simple patch is needed to overcome the problem. I prefer the DataGrid2.patch of two given patches.
PHP is fine with setting isRender to either false or null. As far as I can see it makes no difference to DataGrid? as well since both methods relaying on isRender parameter, _onFetchBegin and _onFetchComplete, are checking only if there is property isRender in request object.
DataGrid.patch (712 bytes) - added by Goran Miskovic 9 years ago.
DataGrid2.patch (609 bytes) - added by Goran Miskovic 9 years ago. | 2019-04-21T18:12:07 | https://bugs.dojotoolkit.org/ticket/10845 |
0.996308 | Are the airports technological innovations just a fairy tale?
According to some, the technological environment of airport systems could be compared to Alice's Wonderland.
What with "all cloud" data storage, the beacon magic wand and the panacea of digital identity technology, it's not easy for airport decision-makers to keep a cool head. Each of these technologies (which are not really new or innovative) add value, even if only partially in certain cases, as part of an integrated vision which will take time to emerge along the airline industry's value chain.
In the meantime, big data which is more qualitative than quantitative, the hyper-convergence of infrastructures and the increasing automation with e-gates and baggage drop-off systems is a wave which is currently gathering momentum. It's no fairytale; real-life innovations are finally taking off at the airport. | 2019-04-23T22:38:58 | http://www.resa.aero/are-technological-innovations-at-airports-just-a-fairy-tale |
0.999836 | I followed this recipe of beef vindaloo, last night, triple checking everything written there. Since I don't have a spice grinder, I put the chopped onions, chopped tomatoes, salt and spices in a mixie and converted it into a fine paste. Then poured it into a container which had 1kg cleaned beef pieces, poured 250ml of vinegar (the recipe says 250ml for 0.5kg beef, but I felt pouring 500ml for 1kg of beef is too much).
It's been marinated in a fridge overnight. Today morning the beef seems a bit tough when I squeeze it. I thought it's supposed to turn tender.
Anyway, now the recipe asks me to use the marinade for frying the beef a bit. This confuses me.
How is beef going to get fried (even though there will be 8tbsp of oil), when the marinade contains a good amount of water from the tomatoes and onions?
Every other recipe I have known, the tomatoes are only added after the frying takes place. I've never known tomatoes being used in marination. Is this really something that works?
Every other recipe calls for the onions to be fried along with the spices. Is onion really blended into a paste and used for marination?
Now that I have a rather large quantity of marinade full of onion and tomato, will that ruin the taste of the curry because the onion paste might not actually get fried?
Should I (instead of trying to fry the marinade), take some fresh onions, chop them up with some ginger and garlic and fry them in oil until golden brown, and take the beef pieces separately and fry it for a while (until the outsides are brown) with the onions, ginger and garlic and later add the entire marinade to make a curry?
Somehow I feel that if I just follow the rest of the recipe on that page, the curry will get messed up.
Using less vinegar in the marinade: is the purpose of the marinade to infuse the beef with flavor and tenderize it? Or is it mainly (or additionally) to apply a coating/paste/sauce to the surface of the beef, that is expected to stay on the meat, to a certain extent? Keep in mind a "tenderized" meat isn't going to semi-dissolve in the marinade when raw as much as the protein structures are going to react a bit differently when cooked. You probably aren't going to be able to tell by touch. A more "liquid" marinade might be more effective in penetrating beyond the surface of the beef and interacting with the meat on the interior. It might be better, not worse, to have a more "liquid" marinade.
"How is the beef going to get fried" - the frying immerses the beef in a very hot substance, and the heat, while reacting more to the surface of the meat, texture-wise, will eventually transfer to the interior of the meat. Let's put it this way - if you didn't use any marinade, at all, how could any meat cook via frying unless it was ground beef disbursed as crumbles? Clearly, the frying process doesn't have to actually touch all parts of the beef to cook it. Similarly, if there is a coating, depending on how well that coating adhere's to the meat, the meat beneath it will still cook, just from all the heat being applied.
Blending the onions obviously infuses the marinade with more of the flavor. It seems like other recipes want minimal onion flavor infused into the marinade, but instead want to use onion as part of the dish, with the onion getting marinade flavor infused into it. Not that I have anything against more onion flavor in marinades, but that doesn't seem to be what they were shooting for with this dish. However, having said that, if don't like pieces of onion and prefer the marinade with more of an onion flavor, then you've stumbled onto a recipe variation that better suits what you like. No rule against that.
Again, I think the tomatoes being added later is more an artifact of the recipe being a mixed meat and vegetable dish, and the desire to have tomatoes, in that form. I think there are probably dishes that use tomato as part of a marinade, and there's no reason not to if you want your meat infused with that flavor, but, again, that is quite different than meat that is infused without it and accompanied by tomatoes. Tomatoes work fine as a marinade component when you want that tomato flavor, though, as Jefromi mentions, often tomato paste is used if that flavor is desired, instead, since fresh or canned tomatoes have so much water content, which dilutes that tomato "flavor."
Sometimes you see variations on dishes that are not traditional or classic takes on dishes, but, rather, what the person posting likes, themselves. As far as "ruining" the dish, if you are after a more classic take, and this is a modified version (think of all the "Americanized" Chinese and Mexican dishes there are out there - perfectly fine..... unless you are craving the original, classical, authentically ethnic style), then it's going to seem "ruined" to you. If you like this take, and it's quite different from the classical style, then it's different, not ruined, because the ultimate measure of "ruined" or not is how it tastes, to you.
Certainly, if you have something in mind, use that to assess, more than the title, whether you want to try that recipe, or create some hybrid of that recipe and another.
When my town rapidly ran out of Chinese eateries that made kung pao exactly as I like it, I had to search. If a recipe had an abundance of hoisin sauce, instead of a little, and did not have Chinese black vinegar in the cooking sauce, I knew that was not what I wanted, so I skipped trying those, regardless of descriptions or relative fame of the sources. Because I knew that was key to whether I liked a version or not.
tl;dr there is more than one way to cook food, it sounds like you're used to a specifc pattern, but it's not the only one. I'd personally encourage you to try the recipe as-is before you leap to judgment.
(1) It says sauté, not fry, and that will work fine. You should probably shake off excess marinade, and avoid crowding the pan too much. The water will boil and spatter, but the meat will cook and brown. This will be easier if you use the right amount of liquid, though. I see that you reduced the amount of vinegar. You should probably have stuck to the recipe, or replaced the vinegar with water if you wanted to reduce the vinegar flavor.
(2) Sure, you can use tomato sauce/paste in a marinade if you want. It'll impart a bit of tomato flavor to the meat, maybe. The recipe also isn't 100% clear, but does later say "add the reserved masala water", so I think it's also having you use the marinade as the sauce, and the tomato will certainly be obvious enough there.
(3) Yes, you can also use raw onions in marinades. Same note here about how it appears it also ultimately gets cooked into the dish.
(4) It's hard to answer, because I don't really understand why you think this would ruin the dish. The meat has some raw tomato and onion in a marinade, then it gets cooked. You also put raw tomato and onion into the dish, and then cook them. Everything ends up cooked. Not fried, but frying is not the only way to cook food.
(5) I mean, you could do that, and it'd probably be good too, but that's not what this recipe says to do, so it'd be a somewhat different dish. One of the main characteristics of this recipe is that it produces a smooth sauce, with all the flavors blended together: all the spices, the tomato, the onion, everything. There are no noticeable pieces of onion (or garlic or ginger), but the flavor's in it.
Not the answer you're looking for? Browse other questions tagged frying beef marinade curry spicy-hot or ask your own question.
How to make boiled and partially fried vegetables palatable?
Olive oil vs almond oil for frying ground beef? | 2019-04-19T23:09:23 | https://cooking.stackexchange.com/questions/84699/how-to-proceed-when-you-have-a-marinade-of-beef-in-spices-tomato-vinegar-and-o |
0.999999 | Assisted suicide: Is it an act of compassion?
Euthanasia: A doctor is allowed by law to end a person's life by a painless means, as long as the patient and their family agree.
Voluntary: When euthanasia is conducted with consent. Voluntary euthanasia is currently legal in Belgium, Luxembourg, The Netherlands, Switzerland, and the states of Oregon and Washington in the U.S.
Non-voluntary: When euthanasia is conducted on a person who is unable to consent due to their current health condition. In this scenario the decision is made by another appropriate person, on behalf of the patient, based on their quality of life and suffering.
Involuntary: When euthanasia is performed on a person who would be able to provide informed consent, but does not, either because they do not want to die, or because they were not asked. This is called murder, as it's often against the patients will.
Active euthanasia is when someone uses lethal substances or forces to end a patient's life, whether by the patient or somebody else.
"Intentionally helping a person commit suicide by providing drugs for self-administration, at that person's voluntary and competent request."
Some definitions include the words, "in order to relieve intractable (persistent, unstoppable) suffering."
In many countries, including the U.S., a patient can refuse treatment that is recommended by a health professional, as long as they have been properly informed and are "of sound mind."
"I will neither give a deadly drug to anybody who asked for it, nor will I make a suggestion to this effect."
"If it is given me to save a life, all thanks. But it may also be within my power to take a life; this awesome responsibility must be faced with great humbleness and awareness of my own frailty."
Physician-assisted suicide became legal in Switzerland in 1937, as long as the doctor ending the patient's life had nothing to gain.
The Terri Schiavo case galvanized public opinion in Florida and the U.S. Schiavo had a cardiac arrest in 1990, and spent 15 years in a vegetative state before her husband's request to allow her to pass was granted.
The case involved various decisions, appeals, motions, petitions, and court hearings over a number of years before the decision was made to disconnect Schiavo's life support in 2005.
The doctor's role: Health care professionals may be unwilling to compromise their professional roles, especially in the light of the Hippocratic Oath.
Moral and religious arguments: Several faiths see euthanasia as a form of murder and morally unacceptable. Suicide, too, is "illegal" in some religions. Morally, there is an argument that euthanasia will weaken society's respect for the sanctity of life.
It is also a political issue. Gallup's 2017 poll found that almost 9 out of 10 liberals are in favor, compared with 79 percent of moderates and 60 percent of conservatives.
Nordqvist, Christian. "What are euthanasia and assisted suicide?." Medical News Today. MediLexicon, Intl., 17 Dec. 2018. Web. | 2019-04-25T12:26:17 | https://www.medicalnewstoday.com/articles/182951.php |
0.999266 | Take a Course or Self-Study?
It is important to get into the right frame of mind as you start your studies. It's not about merely achieving your APICS certification. Achieving your APICS certification is about career advancement. Isn't that why you want to be certified? Your career advancement will be determined by your success in making dramatic and positive change to the work environment and this will be based on how well you can combine your knowledge into the complexities of a dynamic company. This level of performance goes way beyond the achievement of your APICS certification, which can be viewed as merely your ticket to entry to play in this profession. So, the right frame of mind to begin your studies is to commit to studying OPS-MATH and the body of knowledge as defined by the Exam Content Manual (ECM). When you do you will find that you are better prepared for the certification exams and leading workplace improvements.
What is the minimum I need to do to get by?
Attending class is enough to pass the exam.
I only need to study the materials provided by the course.
I will do what another person did to pass the exam.
APICS generally updates their courseware and materials annually and are released in December or January for the new calendar year. These updates could be major or minor and the student may contact APICS for the latest update information. Be aware of the dates or revisions of the study materials you use and their applicability to the current Exam Content Manual.
APICS publishes separate ECM's for CPIM and CSCP. The importance of this document to your studies cannot be over-emphasized and you must own it, read it, and follow it. It includes an outline, vocabulary, and exact references from which they will derive certification exam questions. The material in these references will far exceed what is covered in a course because the body of knowledge is so large. This manual forms the basis for your studies per the Examination Procedures Bulletins. At this writing it is included in the purchase of the CSCP Learning System. For CPIM the applicable portions of the ECM are included with the purchase of CPIM course Participant Guide. For example, if you purchase the MPR Course Participant Guide you would get the portion of the ECM that applies to MPR only - not the entire ECM for CPIM. Contact APICS to learn if they are still offering the ECM with these materials.
APICS publishes separate bulletins for CPIM and CSCP and for North America and International. It includes important information on the exams such as cost, number of questions, passing score, procedures, and other helpful information. The Bulletins state that exam questions are derived from the Exam Content Manual. They are available as a free download from the APICS website.
The APICS Dictionary is a primary reference for study for the CPIM and CSCP certifications. You must have one. At this writing, the APICS policy is to provide APICS members with a free dictionary. This includes new versions as they are released. They are not provided automatically. Order from APICS and indicate this is your free copy. Check with APICS for their current policy on providing the APICS Dictionary for free to members and any applicable shipping charges. Sometimes the APICS Dictionary is included with a course so you should check with your course provider.
This is largely dependent on the students personal preference and self-confidence in using self-study to pass an exam. Online courses may be either self-study, instructor facilitated, or parts of both (blended).
Does not negate the need for self-study. You have class time plus study time.
The value of your APICS certification usually far exceeds the cost of obtaining it. Here are some ideas for reducing the cost.
Use the FREE Budget & ROI spreadsheet to calculate your budget & ROI.
Employers may pay for or reimburse at least part of the cost.
Self study. This is your lowest cost option.
Ask your employer to fund a library of self-study materials that many could use. Companies that won't reimburse expenses may find that this is a good compromise between the cost and education they want their employees to have. Often, managers can approve the cost of books more easily than they can the cost of sending people to courses. Self-study using company purchased materials.
Use OPS-MATH to learn the math you need. Self studying text-based math can be very time consuming and frustrating. OPS-MATH vs text-based. It can help avoid exam retake fees. You can answer many non-math questions when you understand the math, planning hierarchy, terminology and data relationships that are in the OPS-MATH exercises.
Study the references listed in the ECM.
Use OPS-MATH to learn the math you need. Self studying text-based math can be very time consuming and frustrating. OPS-MATH vs text-based. It can help avoid the exam retake fee. You can answer many non-math questions when you understand the math, planning hierarchy, terminology and data relationships that are in the OPS-MATH exercises.
You may purchase the printed Participant Guide for the course but you should know that this is meant to assist the instructor-led course. As a "guide" it lacks a lot of the details that are covered by the instructor. You will find that it is very abbreviated compared to the reference books listed in the ECM. At this writing the CPIM Course Participant Guides are not listed in the ECM as references.
Compared to CPIM, the courseware printed material for CSCP is very large and thorough. The CSCP Learning System contains many resources including on-line resources.
Purchase the current year CSCP Learning System from the approved APICS supplier. For most people, the CSCP Learning System will negate the need to purchase the textbooks listed in the ECM.
Use OPS-MATH to learn the math you need. Self studying text-based math can be very time consuming and frustrating. OPS-MATH vs text-based. It can help avoid the exam retake fee. At this writing, the North American exam retake price for CSCP is $450.00. You can answer many non-math questions when you understand the math, planning hierarchy, terminology and data relationships that are in the OPS-MATH exercises.
The lower cost of used and out-of-date CSCP materials is an enticement to many. Blogs are filled with people offering them and others asking if they will be successful if they purchase out-of-date materials. As an APICS certified master instructor for CSCP, here are my thoughts for using out-of-date CSCP materials.
Purchasing out-of-date materials often does not include the online materials, which have likely expired. You are giving up a lot.
You are taking a financial risk because if you don't pass the exam, your best recourse is to purchase the current year CSCP Learning System plus you will have to pay the exam retake fee.
Don't be influenced by others who have said "I used out-of-date materials and I passed." That was them and you are you. Perhaps the other person had a lot of experience or education and has very good test taking skills. You need to make an assessment of your ability to pass the exam with out-of-date materials. You may not be hearing about the people who purchased out-of-date materials and did not pass the exam.
Never use materials that are more than one year out-of-date. Two or three minor updates may add up to a large update.
Never use materials that are older than when a major update to the material was made. If a major update was made this year, don't use last year's material.
Bloom's Taxonomy is a list of descriptive words that courseware developers use to write courseware goals and objectives. APICS uses the six levels described in the cognitive domain of Bloom's Taxonomy. The key to these levels is that they rank from the lowest levels of cognitive learning to the highest. APICS targets certification exams to be, on the whole, at the Application level. This means that exams test your ability to not only know the material, but to apply it in a variety of situations. This is why APICS exams are perceived as difficult. Individual test questions may come from any of the six levels, but, on the whole, exam takers must be able to apply their knowledge. While your memory of facts will serve you well on the exam, on the whole, the exam does not target your ability to remember facts, which is in the lowest level of Knowledge. Knowing this means you need to target your study at least to the Analysis level to compensate for the questions in the lower levels. You are encouraged to view this list of verbs for each of the levels, which is on the Clemson University website.
© Copyright Jack A. Wetzel 2016. All Rights Reserved. | 2019-04-22T06:23:42 | http://www.opsmath.com/study_tips.html |
0.999793 | Who Does Tulsi Gabbard Represent?
As a resident of Maui who is active in my community, I am very invested in how the people of Kauai, Maui, Molokai, Lanai, the Big Island, and rural/suburban Oahu are represented. Per the Cook Partisan Index, we are the more "Democratic" of Hawaii's two Congressional districts (never having elected a Republican), and also the most progressive, sending representatives such as Patsy Mink, Daniel Akaka, and Mazie Hirono to our nation's capitol over the last forty-five years.
It could also be argued that my county - Maui - is not only the most progressive in the state, but also the nation. In 2008, when Dennis Kucinich ran for President, his best showing in any Democratic contest was in the Hawaii caucus, and the only county in the country that he won was Maui County.
So I was not surprised when Bernie Sanders won our state presidential preference poll this March with a 70% majority, taking 62% of the votes in the first District, and 75% in the second. And it's appropriate that our Congresswoman Tulsi Gabbard supports Bernie Sanders.
Support for Sanders, however, does not mean that Congresswoman Gabbard represents us. When comparing her voting record with our strongly democratic district, Progressive Punch gave Gabbard an F, while it gave straight A's to Hawaii Senators Mazie Hirono and Brian Schatz (Bernie Sanders received an A as well).
In fact, the Congresswoman's statements and actions over the last two years raise quite a few questions about how committed she is to fighting for our district's values.
1. Why is Tulsi Gabbard so friendly with a Republican billionaire?
Adelson gave "more than any other GOP-aligned donor" (twice the amount given by David Koch) to fund the 2014 Republican takeover of the Senate.
Two days before she led a rally on May 7 for Bernie Sanders in California, Gabbard received the Champion of Freedom award at a gala in New York City, which was co-hosted and sponsored by Sheldon Adelson and his wife Miriam.
2. Why does Tulsi Gabbard use Republican talking points to criticize prominent Democrats in conservative venues?
Gabbard has received favorable coverage from Fox News, the National Review and other conservative media outlets. She's also been the only Democrat at Republican functions and activities.
"This is not just about words. It's not about semantics. It's really about having a real, true understanding of who our enemy is and how important that is, that we have to understand what their motivation is and what their ideology is -- the radical Islamic ideology that is fueling them."
"If that's really the cause, then the solution would be just to give them a trophy, give them a hug, give them a good-paying job, $10,000, and a skateboard so they can go and get their thrills and say, 'OK, great, they are going to be happy and they won't be fighting anymore.'"
After Gabbard made her statements, she was invited to expound on her criticisms of President Obama with prominent Republicans at the conservative American Enterprise Institute's exclusive annual retreat at a luxury resort in Georgia.
While I believe that no elected official should be above critique - lest we devolve into a cult of personality over substance -- our district elected President Obama with a 70% majority, and a respectful discussion in an appropriate forum reflects both our district and Hawaiian values.
3. Why does Tulsi Gabbard support anti-immigrant and anti-refugee policies?
The second Congressional District of Hawaii is known for aloha, acceptance, and support of diversity. Our district's first representative was Patsy Mink, the first woman of color in Congress. Thirty years later, we sent Mazie Hirono, a Buddhist and an immigrant, to DC. And Congresswoman Gabbard herself was the first Hindu in Congress.
As a progressive, and as stated on his website, Bernie Sanders "opposes Republican-led efforts to block Syrian refugees from coming to the US and says the US, Europe, and the Persian gulf states have a moral obligation to welcome Syrian refugees."
Yet on November 19, 2015, Gabbard voted with 46 Democrats and 242 Republicans to pass HR 4038 - the American SAFE Act of 2015, to institute a stronger screening process for refugees from Iraq and Syria who apply for admission to the U.S.
More recently, Gabbard seems to be modifying her views on international policy and inclusiveness, presenting a message of aloha and progressive anti-war values in her March video supporting Bernie Sanders, "The Cost of War."
Which leads me to a fourth question: What does Tulsi Gabbard really stand for?
As the mother of two sons who are old enough to join the military and are voting for the first time this election, these questions are not theoretical. They require answers -- not carefully-crafted imagery.
Shay Chan Hodges is the author of Lean On and Lead, Mothering and Work in the 21st Century Economy. She is a resident of the 2nd Congressional District in Hawaii, has pulled nomination papers to run for the US House of Representatives, but has not yet filed. She will continue to ask questions about our representatives in DC throughout this election season. | 2019-04-22T12:54:14 | https://www.huffpost.com/entry/three-questions-about-tulsi_b_10212942 |
0.999958 | Just 48 hours after the Champions League draw, Mourinho was sacked and replaced with former striker Ole Gunnar Solskjaer . Angel Di Maria also makes the XI in the number 10 role, and he will have a point to prove against his former club having become one of the most high-profile United flops in recent years during one unhappy and unsuccessful season at Old Trafford.
So no, because at the beginning (of the season) it (his style of football) worked. I am anxious about my team, the performance, but my job is always at risk. 24, 11:30 a.m. ET; ESPN+). English football's national stadium remains the temporary home of Tottenham where the north London club beat Leicester 3-1 in Sunday's other game.
Asked if the victory was ideal preparation for facing PSG, Solskjaer said: 'Yes, I would have to say so because it's a tough place to come. "We have to wait". My feeling is that it will be very hard for him to feature in Manchester. The Uruguay forward has scored 21 in 25 appearances this season - only Kylian Mbappé has managed more in Ligue 1 - and if he is ruled out Tuchel will be hugely reliant on the France worldwide to carry the mantle against United .
Itoje suffered the injury during Saturday's 32-20 victory over defending champions Ireland, with referee Jerome Garces initially fearing he had broken his leg. "He's in your face, he's someone teams do not want to play against". Itoje was seen on crutches as England celebrated on the pitch after fears he had picked up a serious injury when he was cleared from a ruck by Peter O' Mahoney.
Ex-England captain Gary Lineker and a user thought to be French footballer Kylian Mbappe have donated to a campaign set up by the family of missing pilot David Ibbotson. The last few weeks have been extremely hard for Cardiff City after the disappearance and death of their new signing Emiliano Sala , who the Bluebirds broke their transfer record in order to bring to the club.
Graeme McDowell sits three shots off the lead after the opening round of the AT&T Pebble Beach Pro-Am in California. On this day 19 years ago, February 7, 2000, Tiger Woods remarkably overcame a seven-shot deficit with seven holes to play to defeat Matt Gogel in the AT&T Pebble Beach National Pro-Am and claim his sixth consecutive PGA Tour victory.
I didn't know it. "He said he was going to Paris but Hong Kong is far away, I need to download Instagram". Mendy responded by saying: 'Every time I am with my phone I am on Instagram or Twitter and [so] now I need to be careful. Manchester City are now at the top of the table, but Liverpool have a game's advantage after Guardiola's side played against Everton on Wednesday night.
We are working quickly to identify the extent of the infection and will have more information when further test results are returned today. Only two events have cancelled the Cheltenham Festival in the past; the 2001 foot-and-mouth crisis, and the second World War.
Bill Polian helped founder Charlie Ebersol create the league. The opening weekend of the Alliance of American Football 's (AAF) inaugural season concludes with two more games on Sunday, Feb. The AAF has implemented a rule that says defenses will only be able to rush a maximum of five players on blitzes, in an effort to promote more offense.
The morale-boosting victory for New Zealand came after being whipped 4-1 by India in the earlier one-day worldwide series. Kuldeep Yadav has been brought in place of Yuzvendra Chahal. Requiring 16 runs from the last over, Karthik scored a couple of runs on the first two balls. India were eyeing a first-ever T20I series win in New Zealand following a 4-1 triumph in the five-match One-Day International series.
He is averaging 12.1 points per game and hitting 38.8 percent of his 3-point attempts this season for the Pistons. Milwaukee Bucks reportedly trade Thon Maker for Stanley Johnson ( read here): I rounded up the key details surrounding the Bucks' reported trade with the Pistons, as Milwaukee swapped out Thon Maker for Stanley Johnson.
In between, Krunal also got a controversial wicket, that of Daryl Mitchell (1), who fell prey to an umpiring howler, when "Hotspot" showed a clear inside edge onto the pads. The third and final match of the T20I series will be played in Hamilton on Sunday. India would like to continue their unbeaten winning streak in T20Is.
Mata is out of contract at the end of the season and although negotiations with the club have been going on since a year ago, the Spaniard, who arrived from Chelsea in 2014, is yet to agree a new deal. He came to the dressing room. Who I meet and when I meet people is not really up for me to tell. All in all, Martial is a player that Old Trafford has always loved and antics like these are a positive sign as to what he'll be able to achieve in the period of time that he has freshly extended.
For many, the acquisition of Brandon Manning was the tipping point, and a loss to the last-place Detroit Red Wings just put it over the edge. The Oilers are by no means out of the playoff hunt, but they appear to be trending in the wrong direction.
Sam Johnson cut the deficit after Finn Russell broke free and brilliantly picked out his teammate to score. Take two, this time a 5m scrum for the home side but Ireland withstood everything they threw at them through 25 phases with Stockdale denying Tommy Seymour out wide and Cian Healy strong a number of times before Simon Berghan spilled it and O'Brien pounced.
That was what everything was about when you were a player. Trent Alexander-Arnold, Jordan Henderson and Gini Wijnaldum are all back training with the first team - although the game may come too soon for all three to be considered in the starting line up.
Jorge Alfaro is also going to the Marlins and he's been a solid catcher for the Phillies . Philadelphia was nearing the finish line in a deal with the Marlins for catcher J.T. Alfaro struck out in 40 percent of his at bats last season while walking just 18 times in 377 plate appearances. Defensively, Realmuto committed just seven errors in 879 chances behind the plate for a.992 fielding mark and threw out 25 of 53 players attempting to steal a base (32 percent).
I think it's fair to say that Toronto got the best player in the trade. Any player put on the market by then can suit up for Toronto in the playoffs as long as they are signed on or before the last day of the NBA's regular season. It is unclear how Toronto will manage minutes in the frontcourt with Gasol, Ibaka and breakout star Pascal Siakam . The Sixers made a big move to get Tobias Harris and the Bucks made a big trade to get Nikola Mirotic.
The France midfielder, who has garnered so much domestic and worldwide recognition for his ability and achievements in the past few years, has suffered slightly this season from a positional change. Great news for Chelsea fans, but Fabregas also dropped the bombshell that Hazard has always said he likes Real. "I think that Gonzalo is suitable for my football".
The Indians compiled a 186-189 record under Robinson, who finished with a.294 careers average including 586 home runs and 2,943 hits. "The Cleveland Indians organization is deeply saddened by the passing of baseball legend Frank Robinson ".
After landing in Phoenix, Ellington and his agent are reportedly working with the Suns toward his release, which would likely come in the form of a buyout, in order to join a playoff contender. His smile with missing teeth will not be forgotten. He will make $6.27 million this season and will then become a free agent. The Suns personnel department is headed by former Heat forward.
The group in late 2018 wrote to Billy Bean, an Major League Baseball vice resident and special assistant to the commissioner, about misconceptions perpetuated by the term "disabled list", conflating an injured individual with a healthy disabled person and suggesting disabled people are unfit to play sports.
The centre is located in the west of Rio de Janeiro , and according to the city's fire department ten lives have been lost. Tributes from other clubs were quick to come in. I'm left in disbelief, but praying for everyone. Globo TV broadcast aerial footage of the fire, which it said had been brought under control after it burned for two hours.
Antetokounmpo was pretty happy with his slick move: "I'm playing mind games", he jokingly said . After Johnson asked if he was sure, James replied: "I'm very sure of that". Later on in the draft, Antetokounmpo drafted James' Klutch Sports teammate Ben Simmons to his roster and even apologized to James because he knew James wanted Simmons.
Jose Mourinho's December sacking was followed by the surprise appointment of Solskjaer until the end of the campaign. "Phil knows what it takes to be a Manchester United player, he has won the Premier League , FA Cup and Europa League and is now one of the senior players within the team", the Norwegian said .
Fultz had a tumultuous time in Philadelphia where he dealt with a hitch in his jump shot, a couple of injuries and a fair amount of underachievement. "There's a real possibility he's played his last game with the 76ers". Fultz appeared in just 33 games since the 76ers took him first overall, and hasn't played this season since November 19 as he deals with thoracic outlet syndrome .
Grizzlies center Marc Gasol is reportedly headed to the Raptors in a four-player deal. Gasol, 34, is averaging 15.7 points, 8.6 rebounds and a career-high 4.7 assists (which ranks second among National Basketball Association centers, trailing only Nikola Jokic's 7.7).
The Bucks are sending forward Stanley Johnson - who they acquired Wednesday in a trade with the Detroit Pistons - and big man Jason Smith , according to ESPN's Adrian Wojnarowski and Zach Lowe . His best season with the Pistons may well have come when he was a rookie. Johnson, 22, is averaging 7.5 points and 3.6 rebounds in his fourth season and becomes a restricted free agent in 2019.
The Yankees enter spring training with an already crowded outfield featuring Judge, Giancarlo Stanton , Brett Gardner , Jacoby Ellsbury and Aaron Hicks . "Obviously [Harper] is a great player". Yankees third baseman Miguel Andujar and shortstop Didi Gregorius were being honored alongside Boone at Tuesday's awards dinner.
This Topic is Missing Your Voice. . More coaches will be named in the coming weeks. The press conference is scheduled for Thursday, February 7, at 1 PM CT in Arlington, TX at Globe Life Park. "If it wasn't, I wouldn't do it", Stoops told KWTV. Stoops led the Oklahoma Sooners to an Orange Bowl victory and a national championship in 2000. I thought one of the best things I ever did in my career was getting my first staff together at OU.
According to NBC10 Boston's Perry Russom, when asked Thursday if he planned to go to the White House this year, Brady declined to give an answer. After three quarters of confusion and midfield stalling, Tom Brady finally found a grove on the game-winning drive (his sixth in Super Bowls) in the fourth quarter, breaking a 3-3 tie.
Suarez played 24 minutes as a substitute in the 3-1 defeat at Manchester City last weekend and then headed to the club's training ground the following morning for an extended individual session with Emery's backroom staff. "I work over anything other criticism can do to me, the work in the present and future can change our way". "Just a few weeks ago, (Manchester) United were obviously behind us but it's happened and it's something we have to deal with".
The Bulls looked to the future on Wednesday night when they acquired Wizards small forward Otto Porter Jr .in exchange for Jabari Parker , Bobby Portis and a future second round pick. Parker landed on the second unit but didn't showcase much defensive effort early in the season. The 23-year-old Portis is averaging career highs in points (14.1), rebounds (7.3) and 3-point shooting (37.5 percent).
Rugby Australia previously vowed to recognise the ban should the NRL impose it, and the English Super League has also promised to honour any ban imposed on Barba. This means the 29-year-old's professional sporting career could well be over. Player misbehaviour will again be on the agenda when the ARL Commission meets for the first time in 2019 at Rugby League Central on Wednesday. | 2019-04-22T06:02:19 | http://instanthealthyliving.com/sport/?page=54 |
0.998817 | Our client is a leading manufacturer of long-range wireless communications equipment which empowers companies to grow profitable alarm monitoring businesses and government agencies to enhance security anywhere in the world. Service providers, installers, and government agencies rely on our client’s solutions to deliver superior reliability, performance, and scalability through groundbreaking, easy-to-deploy mesh radio technologies that will never sunset. Customers benefit from differentiated life safety, property, and asset protection solutions that meet stringent commercial and government requirements.
They currently have an opening for a sales representative who will cover a New England territory. With a title of Regional Sales Manager, the sales representative will be responsible for all sales and marketing programs for the six New England states and will ensure sales goals are achieved. S/he will strengthen existing dealer relationships while proactively pursuing new dealer opportunities as well.
Meet or exceed revenue and sales quotas.
Complete sales proposals for new prospective dealers.
Generate revenue by calling/prospecting for new customers (lead follow-ups, prospecting, qualifying).
Prospect for new dealer opportunities in the field by proactively setting up meetings, facilitating and presenting the benefits of their solutions.
Perform outbound calling to existing customers in order to inform them of new products, continuously build the relationship, and demonstrate the value of all products.
Meet face-to-face with existing dealers to demonstrate new products, sell the value of technical services support and maintenance; and present the value-added marketing resources and tools.
Provide input in developing sales channel support tools and market planning and implementation activities for the region.
Update and maintain on a timely basis Salesforce.com with accurate customer and pipeline information.
Support participation in events and promotions.
Conduct technical sales presentations and product demonstrations.
Actively participate in regional industry events as well as direct business development events as required.
The individual must possess the following knowledge, skills and abilities and be able to explain and demonstrate that he or she can perform the essential functions of the job, with or without reasonable accommodation, using some combination of skills and abilities.
Exposure to technical system products, preferably in security or wireless markets.
Sales skills, excellent overall business skills, and good negotiating skills.
Proven strong telesales/phone skills including strong prospecting and cold calling skills.
Ability to work effectively and collaboratively with all business partners.
High level of proficiency in all Microsoft Office products (Outlook, Word, Excel, PowerPoint) and sales software.
Excellent professional communication skills and appropriate grammar as related to utilizing communication tools including but not limited to business correspondence, email, and telephone calls.
A Bachelor’s Degree or equivalent experience is required.
A minimum of 3 years sales experience.
Selling security or wireless products a plus but not a must.
A competitive compensation with a base salary, commission and bonus is projected at $100,000 for the first year. All business expenses (mileage, travel, etc.) are paid; full company benefits. | 2019-04-21T02:06:44 | http://www.smsearch.com/job-listings/sales-rep-boston-north-security/ |
0.999995 | The commission that you earn depends on if the visitor signs up, and if they convert to a subscribing customer.
Monthly Subscriptions: You earn 50% of the first month payment for each subscription created.
Annual Subscriptions: You earn 20% of the first annual payment for each subscription created. | 2019-04-24T10:05:36 | http://affiliate.sellerlabs.com/faq.php |
0.997491 | Were the Patriots justified in throwing the tea overboard?
The Patriots’ decision to throw the tea overboard may have been considered extreme, but they needed to get their point across to the British. They tried time and time again to tell the British that in order to be fairly taxed, they would need representation, but the British did not listen. They looked at it as a game and rather than actually solving the problem, they would have a new tax for every one that was taken away. Before the American Revolution and the taxation without representation, most of the patriots were loyal to Great Britain and respected their laws ("American Loyalists."). However, after they felt disrespected, they formed the Sons of Liberty and began to rebel.
The East India Company was given a charter by British Parliament on December 31, 1600. It was given to help with long distance trades of items such as tea and spices. The Americans were buying less tea due to the Tea Act of 1767, which negatively affected the East India Company. (ABC-CLIO, 2015).
The Sons of Liberty were a very influential group in the events leading up to the American Revolution. They became official during the Stamp Act process. They were representatives of many classes of the Patriots who wanted to rebel against British’s rule. They were constantly trying to prove their loyalty. Members of the Sons of Liberty included Samuel Adams, Benedict Arnold, Benjamin Edes, John Hancock, Patrick Henry, John Lamb, Joseph Warren, Paul Revere, William Mackay, Alexander McDougall, James Otis, Jr., Benjamin Rush, Isaac Sears, Haym Solomon, James Swan, Charles Thomson, Thomas Young, Marinus Willett, and Oliver Wolcott. (SOCIALIST REVIEW).
The image to the right is artwork created by W. D. Cooper in 1789. It is called The Boston Tea Party. It portrays the Patriots as Mohawk Indians, which is significant because at the time they were a symbol of freedom.
The painting above is called “The Destruction of Tea at the Boston Harbor” and was painted by Nathaniel Currier in 1846. It portrays the scene of the patriots throwing the tea overboard and once again the patriots are drawn as Native Americans.
1."American Loyalists." American Loyalists. N.p., n.d. Web. 07 Dec. 2015.
Summary/ How it relates to the project: I liked this source because it is a British source. This might allow me to get some information with a different point of view than an American source. This source does not only talk about the Boston Tea Party which is also good because it allows me to learn about background information that lead up to the Boston Tea Party.
2. SOCIALIST REVIEW. "Boston, 16 December 1773." Boston, 16 December 1773. N.p., n.d. Web. 07 Dec. 2015.
Summary/ How it relates to the project: This is a very good source because it is British so it gives a different view. It gives background on the Sons of Liberty which will be very useful in my presentation. I like how it includes the author and he gives a bit of background about what he learned about the Sons of Liberty in school as a child. This source is from a Socialist newspaper in Great Britain which means that there will most likely be some type of bias.
3. Source: "John Adams: quote on the Boston Tea Party." American History. ABC-CLIO, 2015. Web. 7 Dec. 2015.
4. Source: "Boston Tea Party." Photos/Illustrations. Library of Congress. American History. ABC-CLIO, 2015. Web. 7 Dec. 2015.
Summary/ How it relates to the project: This is an illustration of the Boston Tea Party that was painted around 1789. It is an interesting perception of what happened. The patriots are portrayed as as Mohawk Indians which were a symbol of freedom at the time.
5. Source: "East India Company." American History. ABC-CLIO, 2015. Web. 7 Dec. 2015.
Summary/ How it relates to the project: This is a very informative article about the East India Company. It is not bias and simply gives background on the East India Company which pretty much explains the role of the East India Company during the Boston Tea Party. This comes from an educational database.
6. Source: "Boston Tea Party." Photos/Illustrations. Library of Congress. American History. ABC-CLIO, 2015. Web. 7 Dec. 2015.
Summary/ How it relates to the project: This is another illustration that I will be including in my presentation. It portrays the scene of the patriots throwing the tea overboard the ship and once again the patriots are drawn as Native Americans. This comes from ABC-CLIO database.
7. Source: "Boston Tea Party." American History. ABC-CLIO, 2015. Web. 7 Dec. 2015.
Summary/ How it relates to the project: This source contains very good information about the Boston Tea Party. It includes details that were not included in the other two sources. It also briefly talks about how the patriots interpret the actions of the British. It may be slightly bias based on who wrote it and who the author thought was right. This website was found on an educational database. | 2019-04-20T03:17:48 | https://www.smore.com/1bb3w |
0.999957 | In a nutshell: This Samsung Series 5 is a good compromise if you're looking for a cheap 40 inch TV, but be warned that picture quality isn't the best.
When it comes to looks, the UE40EH5000 is a story of two halves. From the front it looks fantastic, with a narrow glossy black bezel and a convenient round stand. But peer round the side and you'll notice unattractive bulges at the back, making it look dated. This is in fact one of the thickest TVs currently in the shops, measuring 93mm deep.
The reason for the bulges is that this is an LED TV with direct LED backlighting. It makes the TV deeper than others, but unless you go looking for it, you probably won't notice.
This TV uses a PVA LCD panel with poor viewing angles and poor response times. The poor viewing angles mean that you'll get notice colour distortion and milkiness in the picture unless you're sitting right in front of it.
The poor response time manifests itself when there's any fast action on screen, such as in a movie or sport.
These factors are also present in the 32 inch version, but they are more noticeable in the 40 inch model.
The TV has stereo speakers with 2 x 10W power. In common with most other Samsung TVs it features SRS TheatreSound, which helps to avoid volume fluctuations and dynamically adjusts dialogue to ensure it can be clearly understood. This may sound good in theory, but in practice the small size of the speakers mean that bass is absent, making movies sound dull.
For a TV at this price, we'd expect better connectivity, though as it's not a Smart TV, there's no need for an internet connection. With only 2 HDMI ports, there could be problems if you plan to use this TV with satellite, a DVD player and a games console. But there is support for component input, composite input, digital audio out and a headphone.
Freeview HD is present, and also a handy USB port.
To be honest, we preferred the 32 inch version of the EH5000 series. With a smaller screen the picture defects were less apparent, and the keen pricing put us in a forgiving mood. Still, there aren't many 40 inch screens available for under £400, so if that's what you're looking for, you could certainly do worse than the Samsung UE40EH5000.
How to set up wireless headphones?
How do i get netflex on my tv?
Not so sure about the picture defects, seems ok but reason i am here is looking for an answer as to why it has an internet connection ? it wont upgrade firmware via internet so why does it have the connection ? goes through an on screen menu that tells me i am connected but to where and why .... lol .
Going to attempt to ask Samsung that very question .
Also the tv is a pain when connected via surround sound without using the toslink ,common prob with Samsung ,why should i have to pay for a lead to keep my auld faithful stereo in the family ?
Connected it via an av scart but the tv does not sense hdmi inputs and switch sound ,so cable box and tv need a lot of tlc and expence to keep them and hifi together as a coherent team ,overall a pain and about to enter the realms of service menu to shoe sound in to the equation properly but overall not a bad buy ,cheep and cheerful .
Its low on power use and picture is ok and will prob last 10 years .
just need to know why they bothered with an internet connection ....!!!!!
I bought this TV because we used about 13 of them in a gallery I worked at. They got moved around an awful lot, in and out of vans, in exhibitions, back into storage, etc and we never had one fail (over 3 years).
Hooked up to a �30 raspberry PI2 running OSMC - makes it better than almost any "smart TV" out there.
The fact that you can power the PI from the USB on the TV makes it the perfect solution. Control the TV via an app for android, iphone, etc - full remote control and the ability to watch youtube, movies, iplayer, etc - indeed way more functionality and scope that TVs five times the price.
Don't listen to the haters, this is a *superb* tv for the money.
Very happy with the TV, my only complaint is that I wanted to view programmes from my Samsung galaxy tablet on it. Have connected them with cable and adapter, but can't get it to work.
Got this TV 2 weeks ago. Got it for �269 from Very. Had it for my bedroom and I got the Samsung BD-H6500 Blu Ray for �99 which has made it into a smart TV. I can't fault it. It's for my bedroom and now I can't wait for bed!!
motion blur, especially watching football, is poor. i guess 100hz isnt fast enough??
Just got this TV for �270 from Hughes. Amazing TV only, can't complain about anything yet, it has been a week, but still impressed!
I bought the 5000r version it says it has 100 motion clarity rate.. besides who wants to watch a 40inch tv closer than 3ft?...in that case do you think the viewing angle does play a huge role ?
I bought this model in spite of some negative reviews and am delighted with it. I find no sign sign of motion blur, one of the biggest criticisms in reviews. Very good value. As for your reviewer saying the back of the set looks dated, who sits watching the rear?
if u cant see the motion blur U NEED GLASSES!!! LOL.
no blur , ignore the trolls ! | 2019-04-25T06:15:26 | http://www.s21.com/samsung-ue40eh5000.php |
0.999999 | Here is the next episode of the weekly e-Learning Lingo Podcast Series where we explore the jargon used by e-Learning professionals and training managers. This week's word is: Communities of Interest.
Here is the next episode of the weekly e-Learning Lingo Podcast Series where we explore the jargon used by e-Learning professionals and training managers. This week's word is: Dynamic Capabilities.
Here is the next episode of the weekly e-Learning Lingo Podcast Series where we explore the jargon used by e-Learning professionals and training managers. This week's word is: Core Capabilities.
Here is the next episode of the weekly e-Learning Lingo Podcast Series where we explore the jargon used by e-Learning professionals and training managers. This week's word is: Value Proposition.
Get the &amp;amp;amp;amp;amp;lt;a href=&amp;amp;amp;amp;amp;quot;http://www.widgetbox.com/widget/shoutlist-icons&amp;amp;amp;amp;amp;quot;&amp;amp;amp;amp;amp;gt;Shout List Icons&amp;amp;amp;amp;amp;lt;/a&amp;amp;amp;amp;amp;gt; widget and many other &amp;amp;amp;amp;amp;lt;a href=&amp;amp;amp;amp;amp;quot;http://www.widgetbox.com/galleryhome/&amp;amp;amp;amp;amp;quot;&amp;amp;amp;amp;amp;gt;great free widgets&amp;amp;amp;amp;amp;lt;/a&amp;amp;amp;amp;amp;gt; at &amp;amp;amp;amp;amp;lt;a href=&amp;amp;amp;amp;amp;quot;http://www.widgetbox.com&amp;amp;amp;amp;amp;quot;&amp;amp;amp;amp;amp;gt;Widgetbox&amp;amp;amp;amp;amp;lt;/a&amp;amp;amp;amp;amp;gt;!
Here is the next episode of the weekly e-Learning Lingo Podcast Series where we explore the jargon used by e-Learning professionals and training managers. This week's word is about a type of knowledge management: Explicit Knowledge.
Get the &amp;amp;amp;amp;amp;amp;amp;amp;lt;a href=&amp;amp;amp;amp;amp;amp;amp;amp;quot;http://www.widgetbox.com/widget/shoutlist-icons&amp;amp;amp;amp;amp;amp;amp;amp;quot;&amp;amp;amp;amp;amp;amp;amp;amp;gt;Shout List Icons&amp;amp;amp;amp;amp;amp;amp;amp;lt;/a&amp;amp;amp;amp;amp;amp;amp;amp;gt; widget and many other &amp;amp;amp;amp;amp;amp;amp;amp;lt;a href=&amp;amp;amp;amp;amp;amp;amp;amp;quot;http://www.widgetbox.com/galleryhome/&amp;amp;amp;amp;amp;amp;amp;amp;quot;&amp;amp;amp;amp;amp;amp;amp;amp;gt;great free widgets&amp;amp;amp;amp;amp;amp;amp;amp;lt;/a&amp;amp;amp;amp;amp;amp;amp;amp;gt; at &amp;amp;amp;amp;amp;amp;amp;amp;lt;a href=&amp;amp;amp;amp;amp;amp;amp;amp;quot;http://www.widgetbox.com&amp;amp;amp;amp;amp;amp;amp;amp;quot;&amp;amp;amp;amp;amp;amp;amp;amp;gt;Widgetbox&amp;amp;amp;amp;amp;amp;amp;amp;lt;/a&amp;amp;amp;amp;amp;amp;amp;amp;gt;!
Here is the next episode of the weekly e-Learning Lingo Podcast Series where we explore the jargon used by e-Learning professionals and training managers. This week's word is about a theory used in e-Learning theory: Business Process Engineering.
Get the &amp;amp;amp;amp;amp;amp;amp;lt;a href=&amp;amp;amp;amp;amp;amp;amp;quot;http://www.widgetbox.com/widget/shoutlist-icons&amp;amp;amp;amp;amp;amp;amp;quot;&amp;amp;amp;amp;amp;amp;amp;gt;Shout List Icons&amp;amp;amp;amp;amp;amp;amp;lt;/a&amp;amp;amp;amp;amp;amp;amp;gt; widget and many other &amp;amp;amp;amp;amp;amp;amp;lt;a href=&amp;amp;amp;amp;amp;amp;amp;quot;http://www.widgetbox.com/galleryhome/&amp;amp;amp;amp;amp;amp;amp;quot;&amp;amp;amp;amp;amp;amp;amp;gt;great free widgets&amp;amp;amp;amp;amp;amp;amp;lt;/a&amp;amp;amp;amp;amp;amp;amp;gt; at &amp;amp;amp;amp;amp;amp;amp;lt;a href=&amp;amp;amp;amp;amp;amp;amp;quot;http://www.widgetbox.com&amp;amp;amp;amp;amp;amp;amp;quot;&amp;amp;amp;amp;amp;amp;amp;gt;Widgetbox&amp;amp;amp;amp;amp;amp;amp;lt;/a&amp;amp;amp;amp;amp;amp;amp;gt;! | 2019-04-25T22:40:31 | https://boggse-learningchronicle.typepad.com/elearning_lingo_podcast/knowledge_management_/ |
0.999952 | Fresh Air or Hot Air?
A new vision for education reform--and nagging questions about whether it can work.
It's been a good week for Randi Weingarten. In a speech Tuesday morning at the National Press Club, the president of the American Federation of Teachers (AFT) voiced support for some major education reforms--most notably, tying students' test scores to teacher evaluations and making it easier to fire bad teachers. And the speech is already garnering a lot of positive buzz: Secretary of Education Arne Duncan, who stopped by the event, praised her for "showing courage," and New York Times columnist Bob Herbert said that her proposals, if implemented, would "represent a significant, good-faith effort [for teachers' unions] to cooperate more fully with state officials and school administrators in the monumental job of improving public school education."
Indeed, Weingarten's speech marks something of a policy shift for unions--and it comes at a critical time in education reform. Applications for Race to the Top (RTTT) are due on January 19, and the heftiest requirement for shares of the $4.35-billion pie is improving teacher quality. Many local teachers' unions have made news by bucking their states' applications, and Weingarten's speech--"to the nation," as the AFT website hyped it--does its part to stomp out the bad press and show that her union wants to work closely, and harmoniously, with state departments of education.
--Which test scores should be used to judge a teacher's performance?
Weingarten proposed using "[s]tudent test scores based on valid and reliable assessments"--along with other measures of progress--in teacher evaluations. (She didn't say how heavily scores should be used, relative to the other measures.) But what tests are the most "valid and reliable"? A front-page story in yesterday’s New York Times notes that many states have softened the requirements on exams meant to determine whether students are ready to graduate high school, and Arne Duncan has criticized increasingly weak assessments of student progress as a "race to the bottom." Next month, the National Governors Association and Council of Chief State School Officers will release the much-anticipated results of the Common Core Standards project, which will propose national benchmarks for math and reading. Will new tests based on these standards--if states even agree to adopt them--be the assessments Weingarten referred to? Or should they be the NAEP exams? Or some other measure? It's unclear. And, adding to the confusion, Weingarten disqualified comparing the test results of a current class of students with those of a previous year's, which The Washington Post noted "would appear to disqualify much, perhaps most, of the currently available state testing data from use in evaluation."
--What about the weight given to teacher seniority?
Weingarten said the union will work with Ken Feinberg, who oversaw the September 11 Victim Compensation Fund and currently serves as Obama's "compensation czar," to create a "fair, efficient protocol for adjudicating questions of teacher discipline and, when called for, teacher removal." It's a no-brainer that the union should support firing teachers who've engaged in misconduct. Weingarten also said she wants to use improved evaluations to determine "who shouldn't be in the classroom at all." (She didn't elaborate on what time frame struggling teachers should be given in which to improve before facing dismissal. She did tell Bob Herbert that even tenured teachers should be let go if they're not up to snuff.) But she didn't address the serious problems with seniority policies, which unions notoriously cling to. In many school districts, teachers are given top priority in hiring based on years of service, not whether they're the most effective educators. They can even bump junior teachers out of jobs, and, when it comes to budget-related lay-offs, districts often follow a "first-hired, first-fired" mantra. Perhaps Weingarten was hinting at the need to fix these problems when she said that new teacher evaluations should be used in "employment decisions." But this is no time to be vague: Improving teacher evaluations and due process must happen in conjunction with changes to seniority policies.
Weingarten said new teacher evaluations should create "a system that would inform tenure, employment decisions and due process proceedings." But she didn't explicitly support tying teachers' salaries to their work in the classroom (although she did praise New Haven, Connecticut, for recently agreeing to a school-by-school performance pay scheme). In too many school districts, teachers are paid relative to their seniority, not ability, and performance pay has long been a sticking point for unions in discussions about education reform. (Most notably, an audience of union members booed then-presidential candidate Obama in July 2008 for supporting the idea.) A critical aspect of promoting teacher quality must be rewarding those who are best at their jobs.
Nowhere in the speech did Weingarten explain how exactly her proposals would be put into place. Will AFT affiliates be instructed to endorse them? Or will they have the option of doing so? How long will it take to get any of this off the ground (for instance, when will Feinberg be done developing the due process protocol)?
--And what about that other teachers' union?
Weingarten said that she had written to several organizations asking them to join the AFT in improving labor-government relations in education policy discussions. Not on the list? The National Education Association (NEA), the country's other (and largest) teachers' union. The broad success of Weingarten's proposals depends on all unions agreeing to shift their stances--and the NEA isn't ready to do that. Segun Eubanks, director of teacher quality for the NEA, told me that, while his union generally endorses Weingarten's speech and "support[s] experimentation," it maintains "a formal position of opposition against using state standardized test scores for teacher evaluations."
Weingarten deserves praise for her progressive speech, but I'm saving thunderous applause until the outstanding questions about her proposals get answered. | 2019-04-22T10:45:37 | https://newrepublic.com/article/72423/fresh-air-or-hot-air |
0.997112 | a very complex concept which can have many interpretations. In this context we will assume it signifies the "why" (origin - past) or "wherefore" (purpose - future) of life, but in a way our answer also may explain us the "what" (definition - present).
in this context it normally means our present being here on earth, but this may be generalized to include life as a particular type of organization and development characterizing biological organisms, and even more universally as organization and development in general.
intuitively, a system, configuration or "state-of-affairs" is fit if it is likely that that configuration will still be around in the future. The more likely we are to encounter that system, the more fit it is. Though there are many ways to be fit, depending on the exact situation, we may say that fit systems tend to be intrinsically stable, adapted and adapting to their surroundings, capable of further growth and development, and/or capable of being (re)produced in great quantities.
Fitness is the most important and tricky term of the answer to define. It can only be defined in terms which are not obvious themselves, and so need further definitions, and so on. One can hope that after a few rounds of definitions, the meaning will become sufficiently intuitive to be satisfactory for most readers. The whole of Principia Cybernetica Web can be viewed as an attempt to provide a sufficiently extensive semantic networks of concepts clarifying concepts (such as "fitness").
this should be obvious enough. The use of the term "increase" implies that the concept to which it is attributed, "fitness", is to some degree quantifiable (see e.g. a definition in terms of transition probabilities). Note, however, that it is everything but obvious how to do this: fitness is difficult to measure, and is relative, depending on situation, environment and moment in time. At the very least, we assume that there exists a partial ordering, i.e. some configurations are more fit than others. A more general form of the answer is "not to decrease fitness": in some circumstances it may be good enough to keep fitness the way it is. Increase of fitness determines a preferred direction of evolution.
We may conclude by paraphrasing the answer in the following way: the purpose of (living) organization is to continuously increase future probabilities of encountering this same type of organization. The argumentation for this can be found in the variation and selection principles of evolution.
The above definition has been criticized as being overly reductionist, trying to reduce higher, "spiritual" meanings to mere biology. Although the concept of fitness originated in biology, its meaning here is much wider. It can be argued that our higher mental faculties and values are direct extensions of the general concept of fitness.
"Self-actualization", Maslow's term for maximally developing all our potentialities, and thus reaching the highest level of psychological health and awareness, is merely the implementation of fitness increase in the mental domain (see my paper on Maslow). Similarly, it can be argued that happiness is a direct sign that we have managed to improve our fitness. Thus, if people say that the meaning of life is to "learn and develop", "actualize our potentialities", "improve the balance of pleasure and pain", "enjoy ourselves" or "simply be happy", they are expressing a more limited version of the answer above (limited in the sense that it is more difficult to apply to non-human life, and does not take into account other aspects of life).
On the other hand, people who express the belief that the meaning of life is to "love and be loved", or "promote cooperation and togetherness" are expressing the importance of our social needs, which are another component of fitness. Indeed, fitness for individuals requires fitness for the group to which these individuals belong, and this implies cooperation and "love" rather than selfishness and hostility.
Even those people who state that "life has no meaning" do not contradict the present definition. Indeed, if "meaning" is seen in the restricted sense of a fixed, external purpose, then life has no meaning. "Increasing fitness" is not a goal explicitly imposed by some God, but rather the "implicit goal" governing all of evolution. There are an infinite number of ways in which fitness can be increased, so we cannot say that life necessarily has to move to one end state rather than another. Most changes are initially blind. It is just that some directions (those that decrease fitness) are likely to be eliminated sooner or later by selection.
We remain free in choosing which of the directions we will take: goals or values are not imposed on us. The fitness criterion is merely a guideline to help us choose those most likely to prolong and develop life. But the final decision will depend on our our personal circumstances, and therefore requires reflection. In that sense, the present answer also encompasses the answers of those people who state that the meaning of life is "a personal choice", "to be found within oneself", or even "to ask the question 'What is the meaning of life?'".
configurations that have a minimal fitness. Below a certain fitness treshold, phenomena are so variable, or fleeting that they cannot be observed in any objective manner, and have no causal influence on anything else, so we might as well say that they don't exist. Examples are "virtual particles" in quantum field theories.
fit models or representations of fit configurations. Phenomena with low fitness are too unstable to allow reliable models (see previous paragraph). Good models should satisfy some additional criteria in order to be fit themselves.
by doing things that increase our own long-term fitness, taking into account the fitness of the systems (society, ecosystems) to which we belong. Enhancing long-term fitness is the fundamental good, or basic value of our philosophical system.
Rephrasing 'The meaning of life is to increase fitness', Comment by Daghon D.
what's life, Confirmation by Kattie Godwin-cole. | 2019-04-19T05:15:36 | http://pespmc1.vub.ac.be/MEANLIFE.html |
0.992738 | Ever have one of those days where nothing seems to go right? Well, lets take it up a notch. How about one of those days where nothing seems to go?
I woke up late. Two and a half hours late, in fact. I missed the first two hours of a three hour shift at work. Luckily, there weren't very many people there for help today, so I didn't fell *too* bad. Breakfast at 12:30 is pretty common for a Saturday these days. That's what happens when you work in the morning and never wake up with enough time to breath, let alone eat, before work.
And I think that was the single biggest accomplishment of my day. I can't seem to concentrate, so I sat mindlessly in front of my computer for a while. Computer games bring pleasure, but they don't bring happiness. I did a little shopping, because my roommate wanted a ride to WalMart. Buying stuff might distract the mind and is even pleasurable to some people. But it doesn't bring happiness. I tried stopping by Megan's place, but she wasn't home. Perhaps I'll go again. I need to ask her a couple things. Part of me knows that I don't really want to hear the answers, but I gotta know. So that definitely won't make me happy.
Regrets are kinda funny. You make a decision that is, for whatever reason, the best decision at the time, and later you wish that you hadn't. Quite often, if put in the same situation, it's obvious that the same decision would be made again (even though it may cause more regrets).
I don't think I expected to regret it so much, though. Every time I think back on it, what hurts even more than not following through is knowing that I couldn't even if I tried again. And what hurts more still is that I regret not doing it. Five minutes in extreme pain, and it could've been done. Five minutes and I wouldn't have to deal with this day to day. Five minutes, and I couldn't do it.
As I sat there trying to get the courage (or cowardice) to do it, I realized that I really didn't want to die. The problem was that I also didn't want to live. How can somebody cope with those polar opposites? The natural man will do anything to stay alive, but the spirit will do anything to not. The realization of that moment was that I didn't want to die, I wanted to have not lived at all.
Aren't you supposed to look back on moments like that and feel lucky to be alive? Isn't the last-minute realization that you don't want to die supposed to make you love life? Why do I so often look back and wish that I'd done differently? I know that I don't have the strength or weakness to do it now. Why did I have to come so close and stare it straight in the face only to back down? Why do I have to live with these regrets? | 2019-04-23T08:14:01 | http://petiejoe.com/RAM/index.php?date=20040207 |
0.999998 | When does a picture generate far more than a thousand words? When it is a photo of two young women representing two different Middle Eastern nations. And one of those nations is Israel.
Ask Sarah Idan, Miss Iraq, and Adar Gandelsman, Miss Israel. The two Miss Universe contestants, representing two countries with no diplomatic ties and a difficult history, took a selfie together before the pageant competition this November in Las Vegas — in which Iraq was competing for the first time in 45 years.
Each young woman posted the photo on Instagram. And now what began as a Vegas quick pic has become anything but fleeting, as Idan faces online criticism and real-life physical threats, which she says have led her family in Iraq to flee the country for their safety.
When the online world crosses into real life, a photo can often have lasting consequences. And when global politics reaches the ground level, the personal act no longer exists. Two young women become vessels for bigger messages and broader conversations. Whether they choose to be or not.
“The aim of the photo was an expression of hope for world peace,” Idan wrote on Instagram after a social media furor erupted in reaction to the selfie.
We tend to talk about geopolitics in sweeping statements, stripped of the complexity possessed by individual lives. We deploy grand adjectives that describe nameless, faceless people engaged in nameless, faceless acts.
But all politics is personal. And in the era of the selfie, the personal goes global in an instant, puncturing the impersonality of headlines. Along the way it also can generate an international uproar, offer a venue for political statements and capture worldwide attention.
Two young people from the same region don’t get to be two young people taking a picture at an international event; they are compelled to stand for causes and peoples larger, greater and more subject to others’ interpretation than any one person can be.
Idan’s message of peace could be seen as political on multiple levels.
Idan, who grew up in Iraq but now lives in the United States, was already making history entering the competition in the first place. She offered the world a striking image of a nation that has endured so much bloodshed and destruction in the past decade, a country so many outside its borders know only for its pain and loss.
It’s also a country many who know it recognize for the resilience and strength of its citizens. Spend even a moment in Iraq and you will see the courage its mothers and fathers possess as they try to shepherd families through conflict and upheaval.
And yet now Idan is a symbol of something else: the aspiring singer and songwriter is becoming a Rorschach test for her fellow Iraqi citizens, for an international media which is closely following her story and, most to the point of this piece, for her judges and jury on social media, which continues to weigh in on her decision to take the picture in the first place.
Those angry about the photo see her as a traitor to the Palestinian cause. Those who applaud see her as a messenger for peace. Those in the media flocking to share her experience see her as a great story that captures the region’s complexity and contradictions.
“It’s an honor to be the first woman woman in over 40 years…representing in miss universe 2017,” Idan wrote in early November in a post for Facebook. But now that joy has given way to fear as an online mob, quick to react and even faster to weigh in, condemns her act.
None of this changes the fact that two young people standing up for their fellow citizens don’t get to be just two young people experiencing a spontaneous moment. Crowdsourced judgment comes swiftly and brutally. And, in this case, it creates security threats for a young woman who thought she was just taking a photo.
If only peace were as contagious and as quick to spread as the sharing of a selfie. | 2019-04-21T00:10:52 | http://gaylelemmon.com/2017/12/19/cnn-if-only-peace-were-as-easy-to-share-as-a-selfie |
0.998779 | 1. What happens as Stanley drives home from Camp Green Lake?
(a) Stanley gets car sick.
(b) The lawyer stops for ice cream.
(c) It rains over Green Lake.
(d) Stanley and Zero make a friendship pact.
2. What makes Stanley think there isn't much hope at the top of the mountain?
(b) The lack of animals.
(d) The lack of vegetation.
3. What does Zero offer Stanley while they are under the boat?
4. What encourages Stanley on through the desert when he is alone?
(a) The fact that he no longer has to dig.
(b) The rock that looks like a thumbs up.
(c) He is scared of Mr. Sir catching him.
(d) He hasn't found Zero's body yet.
5. What killed Kate Barlow?
6. What is Stanley's biggest fear about dying?
(b) How hard it would be on his parents.
(c) What is after this life.
(d) What would happen to Zero.
7. What does Stanley do when Mr. Sir fills his canteen again the first time?
(b) Gives it to Zigzag.
(c) Uses it to make a mud pie.
8. What does Mr. Pendanski do to break up the fight between Zigzag and Stanley?
(b) Starts hitting the kids.
(d) Throws water on them.
9. What does Mr. Sir do when he finally decides to fill Stanley's canteen?
(a) Sticks his fingers in it.
(b) Gives it to X-Ray.
(c) Goes into the truck where Stanley can't see it.
10. What is Zero doing while he and Stanley are trapped in the hole covered in deadly creatures?
(b) Singing the lullaby his mother and Stanley both sang.
11. What does Stanley do when Zero gives out while they are climbing the side of the mountain?
(a) Stops to rest with Zero.
(c) Pushes him over the side of the mountain.
(d) Tells him to wait there.
12. What does Stanley tell Zero the onion is that they find atop the mountain?
(b) A hot fudge sundae.
13. In Part 2, Chapter 35, what does Stanley tell Zero that they need to do?
(b) Go back to camp.
(c) Got to the mountain.
(d) Go find outside help.
14. Who does Pendanski blame the fight between Zigzag and Standley on?
15. What does everyone call Brian when he comes to camp?
1. What name does Stanley find on the upside-down object he finds while walking in the desert alone?
2. What was it that had made Gladys Tennyson's daughter sick?
3. What stops the warden from taking the large metal case from the boys in Part 2, Chapter 45?
4. What does Zero figure out in his head to be 46?
5. What does Zigzag accuse Stanley of treating Zero like?
More summaries and resources for teaching or studying Holes.
Holes from BookRags. (c)2019 BookRags, Inc. All rights reserved. | 2019-04-25T01:29:03 | http://www.bookrags.com/lessonplan/holes/test2.html |
0.999808 | When troubled teen Sean Anderson (Josh Hutcherson) - an avid 'Vernian' knowledgeable in all of Jules Verne's works - receives an encrypted message, he reluctantly accepts decoding help from his mom's boyfriend Hank (Dwayne Johnson). They decipher the signal as possibly coming from Sean's grandfather (Michael Caine) - on Verne's legendary Mysterious Island. He and Hank take off on an adventure into the middle of the Pacific Ocean.
Michael Caine flying atop a giant bee; pocket-sized elephants, a gigantic sea-snake with a 1,000 watt smile, a gold-spewing mountain and The Rock singing What a Wonderful World are among the incongruous and colourful elements of this fantasy adventure sequel that loosely uses Jules Verne's sci-fi novels as its inspiration.
It's a likeable film that speeds along with a happy rush and is filled with grandiose, imaginative ideas not only those plucked from its well credentialed source materials that are woven into the storyline. Adventure, action, fantasy, humour, romance and family values are meshed together in one compelling hit.
Using the sophisticated technology later used on Avatar, Journey to the Center of the Earth in 2008 was the first live-action film shot in 3D, with the filmmakers making the most of the opportunity with novelty items - like spitting toothpaste in our face. This time, the 3D is used in a far more sophisticated way, enhancing the narrative with its exotic, tropical settings and fantastical creatures that the protagonist and his motley crew encounter.
Michael Caine is a welcome presence after flying through the eye of a hurricane to the rainbow-filled paradise with waterfalls, volcanoes, giant butterflies, flowers and contrary beasts; he is in very good form. But it is Johnson who delivers the surprises, displaying his soft side - and a most amenable one at that.
Badged for cred with the name and fame of storyteller Jules Verne, this new adventure for Sean (Josh Hutcherson) involves all the magic tricks of a Hollywood adventure aimed at younger audiences - not toddlers, of course, but teenagers. Like Sean, they would be transported into the fantasy with ease ... and in 3D to boot. Sean gets instant approval in the film's opening sequence for his disregard for property and peace as he races his track bike across private gardens and into a swimming pool, after breaking in to a satellite facility. That's the place to boost a signal and receive secret messages from mysterious places.
With Sean's father dead, Sean has only Hank (Dwayne Johnson) as a male role model, since his grandfather (Michael Caine) has been missing for two years. But despite some initial friction between them, Hank underwrites Sean's adventure to find the mysterious island - and goes along as major back-up. They team up with low-rent chopper pilot Gabato (Luis Guzman) and his pretty daughter Kailani (Vanessa Hudgens) and head for the location of the magical island.
The main adventure incorporates many smaller ones; not only do the disparate group stumble onto giant lizard's eggs - guarded by a giant lizard of course - but they meet huge bees they can fly on, chased by massive and hungry birds, only to discover that, ooops, the island is sinking back into the sea, well ahead of schedule.
There is humour and danger, spectacular fantasy landscapes and the eccentricity of grandpa as Michael Caine relishes the role of a mischievous relic. Most of the problems are easily solved (too easily perhaps) and Sean seems to have an annoyingly complete knowledge of tectonic plates, physics and natural history, which he uses to explain stuff that happens.
Pleasant enough but lacking the grounding (even with Caine in tow) that would give the film some badly needed edge, the entire adventure is based on perfunctory elements that seem shallow and artificial.
But then this is an escapist movie in which we are all encouraged just to have fun. Any interest in the great novels of Jules Verne that rubs off is accidental. | 2019-04-19T00:17:13 | http://www.urbancinefile.com.au/home/view.asp?a=18415&s=Reviews |
0.998816 | Not enough people watch the Paralympics. Paralympians are world class athletes who have not only risen to the top of their respective sports, but have overcome physical, social and societal adversity in the process. They deserve an audience.
One of the biggest hurdles to people watching the Paralympics in Canada is actually quite simple – most of it isn’t even broadcast on TV. At the previous Winter Paralympics in 2014, less than 10% of the events were shown on TV. So even if someone wanted to support Canada’s Paralympians, it wasn’t actually available on their TV sets.
The challenge was to find a way to get Canada’s Paralympians the coverage they deserved, outside of traditional broadcasting. In a world where Facebook and Twitter are two of the biggest national media channels, everyone is a broadcaster. The idea was to turn passionate fans into a network of Paralympics broadcasters.
The “Become a Broadcaster” app was created, allowing fans to sign up in advance to broadcast livestreams of Paralympic events directly to their Facebook or Twitter feeds. Livestreams happen all the time, but creating an app that allowed fans to sign up to automatically livestream an upcoming event was something that had never been done before. This was a first-of-its-kind initiative.
Our app was for those who had already witnessed the greatness of Canada’s Paralympic athletes and would want to share this experience with others. The strategy was built around identifying these advocates and getting them to sign up. The team broke this task into three distinct tasks: 1) Find optimal candidates, 2) Get them to the Become a Broadcaster site, and 3) Make participation easy.
A list of criteria for optimal candidates was created, which included following Canada’s Paralympians on social, visiting the Canadian Paralympic website, or seeking out Paralympic content. From there, a complementary media plan was developed to target and re-target these candidates at times and in places they would be most receptive to the campaign message. Finally, once on the Become a Broadcaster site, sign up was as easy as possible with a streamlined and intuitive user flow.
The campaign launched the week preceding Opening Ceremony, when conversation, enthusiasm and interest was at its peak. Three online videos were created, each showcasing a different Canadian Paralympian and the incredible odds they needed to overcome to achieve athletic greatness. Static social posts and online banners were targeted to optimal candidates, driving them to the site. Paid media was complemented by a robust earned media push urging Paralympic fans to sign up to become broadcasters.
The objective was to get Canadian Paralympians the coverage they deserved outside of traditional TV broadcasting, and that’s exactly what the campaign achieved. Canadian Paralympians went from minimal coverage to having thousands of individual broadcasters. Using the first of its kind livestreaming app, fans of the Canadian Paralympics signed up to broadcast over 22,000 events, which led to over 990,000 video broadcast views. For some context, this initiative alone generated 15,843 hours of online viewership, an increase of 11,464% compared to the previous Winter Paralympics. Additionally, the campaign generated over 76 million social impressions, an increase of 2,084% compared to the 2014 Sochi Winter Paralympic Games. By giving people a whole new way to watch the Paralympics, this campaign made the 2018 Paralympic Winter Games the most watched in Canadian history. | 2019-04-19T20:13:00 | https://awards.strategyonline.ca/winners/winner/2018/?e=63070&w=The+Paralympic+Network+ |
0.999884 | Can I Use a Kitchen Faucet in the Bath?
Many attractive kitchen faucets have features you don't normally find on bathroom faucets, including swiveling spouts and attached spray hoses. While there is no design rule that prohibits using a kitchen faucet in the bathroom, it must be a physical match for the sink. You may be able to install your favorite kitchen faucet in the bathroom without a hitch or you may have to modify the sink.
Kitchen faucets can have one handle or two, depending on the type of valve mechanism inside. The supply tubes for single-handled faucets connect to the faucet near the base of the spout, and when you install the faucet, you feed both tubes through a common hole in the center of the sink. Double-handled faucet supply tubes, on the other hand, often connect to the handles, which are spaced 8 inches from each other. If the handles are attached to the faucet body, this spacing cannot be changed. Some faucets have flexible hoses to connect the handles to the spout, allowing you to change this spacing.
Bathroom sinks come in a variety of shapes, and they are usually made of plastic, metal or porcelain. When the holes for the faucet are pre-made, the spacing between them is usually 4 inches. You can buy bathroom sinks with one central hole for installation of a single-handle faucet or without any holes at all so that you can make your own. The back rim of a bathroom sink is usually smaller than that of a kitchen sink, and it curves with the contours of the sink, making it inappropriate for a larger faucet.
The determination of whether a kitchen faucet will fit on a bathroom sink depends on the type of faucet, its shape and the spacing of the holes on the sink on which you want to install it. A single-handle faucet won't work, even with an appropriate hole in the sink, if the base is rigid and the wrong shape. Similarly, a double-handle faucet with a rigid base won't work on a porcelain sink with pre-made holes. The kitchen faucets most likely to work in the bathroom are single-handled models with a small base and double-handled models with flexible hoses connecting the handles to the spout.
Don't try to modify the holes on a porcelain sink. The sink will probably crack before you make any headway with your drill. If you decide to modify the holes on any other type of sink, make sure the faucet fits on the rim before you do. If the base hangs over the edge, it is not only unsightly, it also makes the faucet unstable. If the spout swivels, measure its length and compare the measurement to the sink dimensions. If the spout is too long, it will hang over the counter. | 2019-04-23T00:08:55 | https://www.ehow.com/info_7840843_can-use-kitchen-faucet-bath.html |
0.999999 | Famous American actress Maggie Grace,which played the role of Shannon in the movie "Lost", purposefully moved to its goal. Her career as a film actress began when she was sixteen. Then she only occasionally appeared in commercials. Now Maggie Grace - a demanded actress, who works on the same set with the world's stars of cinematography. How did her career develop? What is Maggie Grace doing now? About this and many other things - in the article.
Born Margaret Grace Denig (this is a real nameactress) September 21, 1983 in a small town called Worthington in Ohio. The parents of Maggie - Rick and Valinne Denig - had their own jewelry business, so their three children (Margaret was the second child) did not need anything. Maggie Grace attended a Christian school until the ninth grade, then moved to the Thomas Worthington Secondary School. There the girl began to study in a theatrical circle - she played in school plays.
When Maggie turned sixteen, her parentsdivorced. The girl had to leave school and change her place of residence - she moved with her mother to Los Angeles. Her brother Ian and sister Marissa stayed to live with their father. In their lives, little has changed, and Maggie had to start all over again. In addition, very often they were in a difficult financial situation - they rented a house, bought only the most necessary food. It was not easy for the girl, but it was this test of fate that tempered her character, helped define the goal in life and gave her the strength to achieve it.
Upon arrival in Los Angeles, Maggie Grace,the filmography of which already has many interesting works, just started to look for its door to the cinema. She immediately found herself an agent and enrolled in a circle of acting skills. The first time she was invited to shoot in advertising, but the girl did not disdain this work - took up everything that gave her the fate. Soon she was invited to a role in the youth film "Rachel's Room." The picture told of the things that happened in the bedroom of a young teenage girl.
The second notable work of Maggie was the role ina movie based on real events. "Murder in Greenwich" - the so-called picture in which the directors tried to reproduce the terrible event that occurred - the murder of the fifteen-year-old girl Martha Moxley. For the role in this film, Maggie Grace was nominated for the Young Actor Award.
Only a year after filming in the "Murder in Greenwich" Maggie received a prominent role in the film "Twentieth Mile". Here, the actress brilliantly played the grim oddish daughter Wendy Cryson and Tom Selleck.
And a year later, when Maggie celebratedtwenty-one-year old, she gained true fame. Her birthday was celebrated on the set of the movie "Lost" in Hawaii. She got the role of the rich pampered beauty Shannon Rutherford, who was on a desert island along with other survivors of the plane crash.
Work in such a picture was for a beginneractress real luck and brought her fame and recognition. For a long time, Maggie could not get used to everyone's attention. Fans often turned to her, like her heroine Shannon, which misled the girl, but then she got used to it.
In Hawaii, Maggie found herself a new hobby - surfing.The first wave hit the actress, the board hit her hard. Dozens of bruises and abrasions remained on the feet, but Maggie was not worried about this, since, in her opinion, it's impossible to be shot in the jungle and remain unharmed. Still the actress dreams to jump with a parachute and has not made it till now only because directors forbid to expose a life of danger. Drive, adrenaline and speed - that's what attracts a young girl. That's the kind she is - Maggie Grace!
In 2006, the actress played in the movie "A girl from the suburbs." She was lucky enough to play on one set with Alec Baldwin and Sarah Michelle Gellar.
In 2007, she participated in the filming of the painting "Life by Jane Austen."
The year 2008 presented the audience with a new film work with Maggie's participation. This is the thriller "The Hostage", where she played with Liam Neeson.
Not so long ago I went to American TV screensmodern adaptation of "Alice in Wonderland" by Lewis Carroll, in which Maggie Grace played. In "Twilight" actress was the role of Irina. She also starred in the films "Knight of the Day" and "Flight Lessons" with Cameron Diaz and Tom Cruise.
For some time the media disseminated information about thethe fact that Maggie Grace and Ian Somerhalder (a colleague in the shootings of Lost, who played Maggie's half-brother) meet. Young people in every possible way denied this fact.
Now Maggie, she said, is free.She thinks she's too busy for a relationship. The only man she spends time with is Roux's cat, whom she and Ian found in the jungle during the filming of The Lost. | 2019-04-22T18:00:18 | https://fehrplay.com/iskusstvo-i-razvlecheniya/56791-amerikanskaya-aktrisa-meggi-greys-filmografiya-i-fakty-iz-zhizni.html |
0.99981 | What would be the implication of deleting a company code? I have 3 company codes with one acting as the paying company code. I want to transfer all the bank data to specific company codes then delete the paying one. How to I handle this? Regards.
What software program are you using? If this is internal code, the talk to your IT staff. You may also want to check with the accounting department for any legal issues in case of an audit.
Sorry but I have not worked with SAP to give a educated response. I do not know if it needs to remain for retrieving historical data. From personal experience one of our staff had a similar situation. For our obsolete divisions and warehouses they removed them from the validation file, this way you could place a new order for them. The problem we face it the definition of the code was in the same file as well. So go back to an order from 5 years ago and it has warehouse code 71. Hopefully you have an employee who still remembers what it was. More so, someone does not set it up again with a new definition thinking it is not in use because it's not in the validation file. | 2019-04-20T20:38:52 | https://itknowledgeexchange.techtarget.com/itanswers/deleting-a-company-code/ |
0.999998 | TL;DR If you're using Authentic8 Silo, you are safe from the FREAK attack. Last week, the discovery of the FREAK attack against SSL/TLS was publicly announced. FREAK is one of several serious attacks against SSL/TLS -- the encryption protocol securing most Internet communications. Other major bugs and attacks in recent years include BEAST, CRIME, Heartbleed, and POODLE.
Hackers are always looking for ways to break encryption and get access to our most valuable information. Fortunately, the good guys on the Internet are also vigilant in finding and fixing bugs and flaws in TLS. In this case it was Karthikeyan Bhargavan from INRIA in Paris and the miTLS team, who discovered the FREAK attack. If you're interested in a technical discussion of how the FREAK attack works, check out Matthew Green's write up and the research team's SmackTLS site.
A web server that accepts the weaker RSA_EXPORT ciphers.
Fortunately, if you use Authentic8 Silo, you don't have to worry about the FREAK attack. Silo is tougher to MiTM, does not accept RSA_EXPORT ciphers, and is not susceptible to the bug that allows an attacker to force RSA_EXPORT ciphers.
A bad guy trying to use the FREAK attack has to get between your web browser and the website you are trying to visit. Usually, when launching the MiTM step, the attacker will strike at the weakest point, which is either your laptop or your WiFi network, especially if you're using public WiFi like a coffee shop or hotel. When you use Silo, your web browser is running on our infrastructure in the cloud, not on the user’s machine. Getting between Silo and a website is hard because Authentic8 “moves the middle."
The FREAK attack only works on browsers that are vulnerable to a bug that allows the attacker to force the downgraded RSA_EXPORT ciphers. The RSA_EXPORT ciphers weaken the TLS encryption, which enables an attacker to crack the encryption using inexpensive cloud compute resources. Nadia Heninger at the University of Pennsylvania has done researching showing how RSA_EXPORT ciphers can be cracked in about 7.5 hours for a cost of about $104 using AWS EC2 instances -- very cheap compared to the value of the data that can be siphoned off. Silo and our implementation of TLS does not accept weak ciphers like RSA_EXPORT and nor is it susceptible to the vulnerability that can force the browser to use the weak cipher.
What about the web sites that allow weak ciphers like RSA_EXPORT?
The third component of the FREAK attack is all the websites out on the Internet that have been configured to offer and accept weak ciphers like RSA_EXPORT. These vulnerable sites are not configured following best practices for security. The freakattack.com web site is tracking and reporting on these sites. Hopefully, the media attention around FREAK will get these companies to pay attention and improve their security.
If there’s one thing that’s clear, it’s that hackers will continue to find ways to undermine the security foundations of the web. We wrote about the shifting focus of attackers to target Internet infrastructure. These exploits will continue and the pressure on IT to keep up is immense. By using Silo, you keep all web-based code execution at arms length. It's our job to keep the infrastructure secure, freeing your people to do their job.
While there is no silver bullet, Silo evens the playing field by giving businesses an always current, centralized point of command and control for their online activity. | 2019-04-24T20:00:38 | https://authentic8.blog/freak-attack-unearths-yet-another-ssl-vulnerability/ |
0.999679 | Here's today's political quiz question: what do these five states - Rhode Island, Vermont, California, Connecticut, and Maine - have in common? Yes they are blue states ruled by Democrats, but that's not all. These are some of the states that use the least amount of coal - 2 percent or less- for electric power.
In fact, almost all of the states that are politically liberal and vote unfailingly Democratic are low coal use states. For instance, Washington, New York, New Jersey and Oregon are also in the top ten states least reliant on coal. Only conservative Idaho is a red state in the bottom 10 states of coal power reliance.
Meanwhile, the heavy coal using states bleed red. West Virginia, Kentucky and Wyoming are all states that get about 90 percent of their electric power from coal. Missouri, Utah, Indiana, and North Dakota also get more than 75 percent of their electricity from coal. See table.
Mr. Obama announced last week the toughest environmental regulations ever against coal. This is part of the president's war on coal that he announced when he was running for president in 2008. He has long admitted these policies to reduce emissions from coal burning electric power plants by one-third below 2005 levels by 2030 will "bankrupt" the coal industry. In a September 2008 interview with San Francisco Chronicle, Obama declared, “If somebody wants to build a coal-powered plant, they can. It’s just that it will bankrupt them because they’re going to be charged a huge sum for all that greenhouse gas that’s being emitted.” Well, it's working. Coal towns are being vaporized across America and coal companies are going out of business.
But the pain from the new EPA rules won't be evenly distributed across America. Far from it. A 2014 study by The Heritage Foundation scholars Nick Loris and Filip Jolevski find that 19 out of the 20 congressional districts most severely impacted in terms of manufacturing jobs losses in 2023 are in the Midwest- thanks to higher energy costs. In addition, the coal producing states like West Virginia and Wyoming will see significant job losses tied directly to coal production.. In 2023 alone, manufacturing jobs losses attributable to the new regulations are predicted to total 336,000. The liberal coastal states will feel relatively modest jobs losses because they rely less on manufacturing.
Nationwide, the costs will be about $100 billion a year throughout the 2015-2023 phase-in period or a reduction in GDP by about one-half percentage point, , –An average family of four will experience increased an income loss of about $1,200 a year by 2023. . Yes, Obama's policies that have had such a crushing effect on middle income family finances are about to get a whole lot worse.
Would Senator Barbra Boxer (D-CA) and Senator Sheldon Whitehouse (D- RI), two of the biggest cheerleaders for the new regulations, be so euphoric if their voters were paying these massive costs for their green agenda? But the east and west coast green snobs can live with raising costs and unemployment in "fly over country."
It's time to label the Obama green policies what they truly are: steep taxes on red state America. By the way, many purple states like Pennsylvania, Ohio and Virginia also get hammered by Obama's climate change agenda.
The de facto tax that Mr. Obama wants to impose on American coal is doubly dastardly because it's impact will be felt hardest in relatively poorer states. And because Census Bureau data confirms that poor households spend 4 times more of their income on energy than rich families, the Obama policy will make income inequality much worse. But of course the upper crust Manhattan liberals who fund the Sierra Club and Obama and profess to care so much about the poor, can live with that. So much for "environmental justice."
Maybe all of this pain would be worth it if somehow these policies were going to reduce global carbon emissions and stop global warming as Mr. Obama assures us the will. They won't. New data tells the opposite tale. China and India are adding coal plants on a massive scale. Worldwide at least 1,000 new coal plants are planned.
According to data from the U.S. Energy Information Administration, for every unit of reduction in U.S. coal power capacity from 2011-2040, China and India alone will add more than 14 units. Even if the U.S. cut coal use to zero over the next 25 years, global emissions from coal will rise sharply. By 2040, China’s coal power capacity alone will be nearly 4 times the current U.S. capacity! So the Obama plan is all pain no gain. It would be like trying to reduce unwanted pregnancies in the third world by having Americans use more birth control. Stupid.
But back to the Obama assault on red and purple states. Let's hope the voters get the message that Mr. Obama's green energy policies are directed at their jobs and their paychecks. Most people in blue states and the workers around the rest of the world won't feel a thing. This is fair? | 2019-04-21T12:19:49 | https://www.forbes.com/sites/stevemoore/2015/08/07/170/ |
0.999798 | What were the topics of former Symposiums? Are there indeed still presentation materials / audiotapes / full-blown, written-out speeches and the like kicking around in the archives somewhere?
It might be worthwhile to see former Symposium agendas to ascertain if there is a progression or a formative pattern that either existed before, whether planned or by accident; and to decide if a progression of educational presentations - a logical progression - might not be in order.
Having been involved in years past with a particular set of denominations and having been an integral part of their planning, our approach was always to establish the educational premise for our annual Convention, and proceed from there. Let me give you an example so that it's not as vague as it reads to me right now.
We were / are Calvinists, which means that we hold to certain basic truths that issued forth from the Protestant Reformation. For the sake of this example, we held to five positions concerning how men are saved. Therefore, the theme for the first five years was, in turn, each of the five positions classically known as the tenets of Calvinism.
That's not to say that each year's Convention dealt only with one thing - that simply wasn't so. No matter how much you may like chocolate pie, eating chocolate pie for three meals and three snacks a day for a week will make you pretty sick of chocolate pie. And the same is true with having the doctrine of total depravity for three meals and three snacks a day for a week. So we altered our diet a bit by including presentations of biographies, historical events worthy of note (and interesting to hear told), as well as being deluged with total depravity (or at least the teaching thereon).
So perhaps the format could include an in-depth study of the history of Myer's flag signals; the development of the flags themselves; the art of recording the messages sent via that means, including the method of recording and the importance or vital nature of maintaining the records of those transmitted messages; its impact on reenacting life today; a presentation of signaling done at a reenacting event (through a video, perhaps); ways in which the Signal Corps plays and has played a vital part in Civil War reenactments; the biography of a Civil War Signal Corps signaler; and so on.
Frankly, that's probably been done to death already, but it serves my purpooses of illustration.
Perhaps those interested should weigh in on what they'd like to hear at a Symposium - topics, specific questions they may have that have gone unanswered until now, and so on. | 2019-04-25T16:31:16 | http://www.cwoodcock.com/forum/db_TalkToMeV2.cgi?forum_name=scard&message_number=330&pid= |
0.998801 | What is the DOJ and the FBI hiding?
Former Mexican President Enrique Peña Nieto took a $100 million bribe from international drug traffickers ,acocrding to a witness at the trial of Joaquín Guzmán Loera, the infamous crime lord known as El Chapo.
The stunning testimony was delivered Tuesday in a New York courtroom by Alex Cifuentes Villa, a Colombian drug lord who worked closely with Mr. Guzmán from 2007 to 2013, when they were hiding from the authorities at one of the kingpin’s remote ranches in the Sierra Madre mountains.
“Mr. Guzmán paid a bribe of $100 million to President Peña Nieto?” Jeffrey Lichtman, one of Mr. Guzmán’s lawyers asked Mr. Cifuentes during cross-examination.
The bribe was delivered to Mr. Peña Nieto through an intermediary, according to Mr. Cifuentes.
While other witnesses at Mr. Guzmán’s trial in Federal District Court in Brooklyn have testified about payoffs from traffickers to the Mexican police and public officials, the revelations about Mr. Peña Nieto were the most egregious allegations yet. If true, they suggest that corruption by drug cartels had reached into the highest level of Mexico’s political establishment.
From the start of the trial in November, there were lurid hints that top Mexican leaders might have been compromised by dirty money. In his opening statement, Mr. Lichtman claimed his client had been framed for years by a conspiracy hatched by his partner, Ismael Zambada García, in league with “crooked” American drug agents and a “completely corrupt” Mexican government, including two of its presidents.
At the time, Mr. Peña Nieto released a statement calling Mr. Lichtman’s claims false. The judge in the case, Brian M. Cogan, later cautioned Mr. Lichtman against making promises to the jury that the evidence in the case would not support.
Then, as the first week of the trial came to an end, Mr. Guzmán’s lawyers informed Judge Cogan at a sidebar conference that a coming witness, Jesus Zambada García, Ismael Zambada’s brother, would testify, if asked, that two Mexican presidents had taken bribes from the Sinaloa drug cartel.
But Judge Cogan forbade the testimony, citing the embarrassment it would cause to unnamed “individuals and entities” who were not directly involved in the case.
Until Monday, the most prominent Mexican official accused of taking bribes was Genaro García Luna, the country’s former public security director. When Jesus Zambada testified in November, he told jurors that he had met twice with Mr. García Luna in a restaurant and both times gave him a briefcase stuffed with at least $3 million in cash. | 2019-04-20T12:24:01 | http://www.standupamericaus.org/sua/the-new-york-times-el-chapo-trial-former-mexican-president-pena-nieto-took-100-million-bribe-witness-says/ |
0.99786 | In rodents. cannabis usually decreases aggressiveness and fighting, even at doses which do not produce marked sedation, although under some unusual conditions (extreme cold, or starvation, for example) and severe chronic drug administration regimes some increase in fighting has been noted.112,541,559,605 Cannabis has also been shown to reduce aggressiveness in monkeys.246 Generalizations which can be made from these animal studies to humans are, of course, limited.
Many of the Eastern studies discussed in the section under Adverse Psychological Reactions. describe occasional impulsive anti-social or violent dcts in certain chronic cannabis users. Most often. such behaviour is associated with acute psychotic reactions, usually in severely disturbed individuals. The incidence of such behaviour in even chronic cannabis users is reportedly very low. On the other hand. Eastern observers often report a high incidence of petty crime among certain chronic users in the lower strata of society.
Other investigators have come to similar conclusions regarding Wolff's report,232,321 and it would appear that it provides little scientifically documented evidence regarding the alleged association between cannabis and crime.
Bromberg's studies were among the first systematic investigations of cannabis and crime in the North American literature. Although some correlation was observed between cannabis use and minor offences, no cases of murder or sexual crime due to cannabis were established. Bromberg concluded that there was no relationship between marijuana use and violent crime and challenged the validity of inaccurate case reports released to the general press by the United States Bureau of Narcotics.85,86,87 Some of these cases were later presented again by Munch,456 and these reports have recently been critically reviewed by Kaplan321 and Goode.232 Blumer reported that marijuana-using juveniles were much less likely to be involved in anti-social and criminal behaviour than groups who preferred alcohol. He also indicated a tendency for delinquent activities to decrease as individuals shifted from alcohol-preferring groups to the marijuana subculture. On the other hand, Blumer also points out that some delinquents in his study used marijuana to ease anxiety and to fortify themselves for premeditated criminal acts.61 Other drugs including amphetamines, barbiturates and alcohol are also commonly used for this purpose.
The 1969 Woodstock Music Festival is often noted in discussions of cannabis and aggression. Cannabis was reportedly used by the vast majority of the nearly one-half million participants. Police indicate that no fighting or violent behaviour was detected.169,609 The significance of this happening, of course. is difficult to interpret because of the unique set and setting associated with the event. Other such festivals have not been as peaceful.
Some statistical studies in the past literature have shown a correlation between cannabis use and other minor criminal behaviour. Many reports of drugs and crime have included drug offences in with other violations and the data are, consequently, difficult to interpret. Reports of cannabis consumption among criminals, and the incidence of other crime among individuals arrested for drug offences, also suggest some statistical relationship. A causal effect has not been demonstrated, however, and a number of important psychological and socioeconomic variables complicate the interpretation of these data.
The briefs presented to the Commission by the Royal Canadian Mounted Police and the Solicitor-General's department dealt at considerable length with the alleged association of illegal drug use and criminal behaviour in Canada.532,533 It was suggested that the use of drugs such as cannabis is, or will be, related to subsequent non-drug criminal activity. Of 239 cases during 1969 and 1970 relating drugs and other crime, provided to the Commission by the R.C.M. Police, 72 involved cannabis alone. (Alcohol-related crimes are generally not recorded.) Five of the 239 cases note crimes committed under the influence of cannabis two crimes of violence, three crimes against property. An additional 33 cases report convictions for possession of cannabis, where the accused had prior records for other crimes. Another 16 cases involved persons arrested for non-drug crimes, but who were found to be in possession of cannabis at the time of their arrest. Six persons told police they committed property crimes in order to obtain cannabis, and another three, charged with non-drug crimes, admitted to the prior use of cannabis. Nine cases involved crimes of violence in connection with trafficking in cannabis. Reports of violence within the illicit drug market in Canada have been received by the Commission from other sources also, and similar examples were discussed by Cooper."' Apart from these few isolated cases, the R.C.M. Police said that even though they "...lack evidence of crime committed in Canada by cannabis users" such data is available from other societies. We have been unable to find scientific documentation of a criminogenic effect in the international literature.
There is no scientific evidence that cannabis use, itself, is significantly responsible for the commission of other forms of criminal behaviour. While individuals with a delinquent or anti-social background have, in the past, apparently, been more likely to use cannabis than other individuals, the social situation has changed rapidly in North America. Few crimes committed under the influence of cannabis have been adequately documented, and a causal relationship between the use of the drug and other illegal behaviour has not been established. It may well be that an individual who is inclined to commit one illegal act (for example, a drug offence) may also be more likely than average to transgress in other areas as well. Some observers feel that the lessening of inhibitions often reported with cannabis use might, in certain predisposed individuals. increase the likelihood of anti-social behaviour. In addition, some criminal individuals might use cannabis or other drugs to lessen anxiety and give courage before a premeditated illegal venture.
Aggression may occur as a component of an acute adverse reaction in some instances, but such cases are apparently rare. | 2019-04-21T12:31:03 | http://www.druglibrary.org/schaffer/Library/studies/ledain/lcd2h.htm |
0.999999 | As we get new requests for AI Lab and FPGA Expansion Pack in more geographical regions like China, we are receiving feedback (and complaints) about latency and responsiveness. In anticipation of an upcoming event involving AI Lab, we ran a series of simple networking tests to determine the latency, bandwidth and in general, real-life responsiveness of the interaction via web VNC.
TL;DR version: If you want a responsive VNC session to a cloud server, low latency seems more important than bandwidth.
For UDP, we were particularly interested in the jitter(delay) as that seemed to be the main cause of lags in VNC.
For VNC, we used a web-based VNC client called novnc. For some reason (someone maybe please explain this to me) that it is more responsive than conventional VNC tools like RealVNC or TightVNC.
Here are the results for bandwidth. A final score was derived by adding up rankings A and B. So the lower the score the better.
While the numbers gave an idea of relative speed/latency, we wanted to experience the latency and responsiveness first-hand. So we fired up VNC, logged on to the servers and recorded videos of the VNC session. You can gauge for yourself if Seoul was indeed faster than US East, etc.
Our experience (which can be seen from the videos) is that interactivity is highly related to jitter rate. While Singapore and US servers had the similar bandwidth values, the responsiveness of the Singapore server was much poorer compared to the US servers.
There were actually not much differences between the Seoul and Tokyo servers in terms of responsiveness. But it seemed faster to upload/download files to the Tokyo servers as the bandwidth seemed higher. When comparing Tokyo to US servers, the Tokyo server felt more responsive than the US servers, perhaps due to higher bandwidth.
AWS seemed to throttle or cap the bandwidth as you hit a certain limit. We experienced a notable slowdown in responsiveness as we were doing bandwidth tests with the US server.
Latency matters a lot when you are using an interactive VNC session on AI Lab. Plunify Cloud uses a browser-based VNC client to access the server and the bandwidth requirements are pretty low. While monitoring using “Network” on Chrome’s devtools, it uses between 1 to 10Kb for each packet.
We hope these give our AI Lab users a better understanding of what affects the latency. If you would like to try out AI Lab, feel free to register an account.
Enter your email address and have the latest mix of FPGA, cloud and Machine Learning delivered straight to your inbox. | 2019-04-26T14:28:14 | https://support.plunify.com/en/2018/09/05/performance-of-vnc-on-aws-servers-from-within-china/ |
0.999999 | A report was submitted this week to Congress by a team that has come to be know as 'Team B II', made up of highly accomplished civilian and military national security professionals and sourced by the Center for Security Policy. Their report, Shariah: The Threat to America, was released yesterday during a press conference at the United States Capitol in Washington D.C., serving host to national and local media sources and supported by Representative Trent Franks (R-AZ), Representative, Michele Bachmann (R-MN) and Representative Pete Hoekstra (R-MI). We highly encourage you to read the report, send it to your contacts, and stay up with current events related to this topic.
The team includes such figures as R. James Woolsey, former Director of Central Intelligence; Lieutenant General William G. Boykin, former Deputy Undersecretary of Defense for Intelligence; Lieutenant General Edward Soyster, former Director for Defense Intelligence Agency; Andrew C. McCarthy, former Assistant United States Attorney and Prosecutor of the Blind Sheikh; Joseph E. Schmitz, former Inspector General of the Department of Defense.
That report, produced by the Center for Security Policy was entitled, 'Shariah, The Threat to America' and a copy of it can be viewed and downloaded at www.shariahthethreat.com or on The Oak Initiative Website. The leaders of the Team B II project published an op-ed in the Washington Times two nights ago summarizing the historical significance of "Team B" as well as the new movement surfacing and beginning in America today. That article can be found at http://www.washingtontimes.com/news/2010/sep/14/needed-a-second-opinion-on-shariah/. A piece of the press release can be seen at http://www.youtube.com/securefreedom.
We would like to stress the importance of the ability of citizens to know this information. Americans need access to this report, and we need your help to provide it. We highly encourage you to study this report and use this tool to help educate those around you, especially your leaders. This information is available online to anyone. At this point, Americans must be made aware of the threat, and given practical steps toward a solution. Please push this out to all of your contacts. This is a grassroots war; a war which can only be won at the local level. We would like to keep you involved as much as possible with the national movement to protect our country.
'America is "under attack" by a non-violent "stealth jihad," a panel of national security analysts warned in a new report that claimed fundamentalists are trying to bring Islamic law known as "Shariah" to the United States. | 2019-04-26T06:23:28 | http://www.theoakinitiative.org/sharia-threat-report |
0.999992 | How does a product owner or development team create the vision of their product? Do they just sit and hope an idea pops in their head? Of course not. They use a series of techniques that help them inspire their creativity to get the juices flowing.
When a customer wants a new product, they often have no idea what they want to product to look like, or do. They just know they want it to do something. And it isn't any easier for the development team. The team is left in a position where the customer is either unsure or unclear, and the team is left to figure out how to make it work.
Developing the product vision is a time of discovery, when the team gains as much knowledge as it can about the product, and then doing some experiments to see what sticks.
Remember being in college and working in a study group? You need an idea for a project, but have absolutely no clue what to do. So, everyone gets together, grabs some pizzas, and they brainstorm. They throw out ideas, and hopefully one of them will stick. It works the same way for software development teams.
The most important part of this process is gaining the knowledge needed to throw out ideas that could stick. With this knowledge, a team can build prototypes and mock-ups, and test them to see which of them will work, or "stick."
Prototypes are cheap to build, and easy to throw away. But they bring so much to the table. They help the team imagine what the product should be doing, or what it should look like. They help the team understand what technology may be needed, and if new architecture is required. Basically, the prototype will tell the team whether the product is viable or not, and whether it is financially worth the risk and undertaking.
Experimenting is obviously a key part of developing a product vision, and it is important to experiment in the most organized way possible. The most effective experimentation plan is called the Deming Cycle.
The Deming Cycle is a four-step process, also referred to as PDCA, Plan-Do-Check-Act. It is an iterative process that allows for continuous improvement of products and processes.
This is also known as trial an error, something that every inventor does. Failing is a necessary part of succeeding. Think of Babe Ruth and all of his strikeouts. Or think of Thomas Edison, and all the times he failed before he finally succeeded.
Using a persona helps you select your target customer. If you were on a product team that wants to make hair accessories for teenage girls, you would use a persona of a teenage girl when thinking about the product. You want to be in her shoes -- your target customer. It's almost as if you are acting, or playing a role.
When teams use personas, they make them as real as possible. They name them. They have jobs, or friends, or kids, or whatever it is that will make them relevant to the product. With the right personas, the team can learn how the product will influence a persona's life.
This is done with consumption maps. One map would be an activity done without the product, and the other, with the product in use (in whatever form is envisioned). Using this model can help the team determine whether there is value in the product, or if there are other aspects of the product that would be more successful.
Another effective way to determine whether a product or feature will be valuable is to build a vision box. A vision box is a Scrum invention in which a mock-up of the product package is made. The team chooses a product name and three points that will help in the selling of the product, then places that information on the front of the box. The vision box should remain visible to the team, somewhere in the common work space. This way, when walking by or talking to a team member, seeing the vision box might inspire an idea.
A trade journal review is another method. In this method, the team will write a mock journal article detailing what they would like to read about the product when it is introduced. It is a great team activity that requires a lot of creativity and vision.
Let's use the iPhone again as our example.
Basic functions are what make the phone work. It must power up and turn off, and it must make and receive calls. It must send and receive text messages. That is all that is needed for a phone to be a phone. Of course, these basics are pretty boring, and a customer would likely get bored with such a product.
Performance functions are what make the basic functions work better. A phone must make and receive calls, but the performance can be increased to make those happen quicker. Apple introduced iMessage; an adjunct to text messaging and it was incredibly well received.
Delighter functions are just what they sound like. They delight the customer. An attractive design gets people excited. Being able to personalize the phone with colors and cases is exciting. These can be features that the customer has requested, or features the team envisions. These are also the features that give the product an advantage over its competitors. For example, when Siri was introduced for the iPhone, it was a huge delighter for consumers.
The problems that teams have are to find a way to bundle all three together in a way that the customer sees nothing but maximum benefit. The Kano Model can be used with both the product vision and the product backlog.
It is important to note that the Kano Model states that, over time, delighters will become performance features, and performance features will become basic features. This is why companies must constantly find new delighters to add to the product.
1 – Must-Be Quality – These attributes are taken for granted by consumers and, if not included, the consumer will be unhappy.
2 – One-Dimensional Quality – These attributes make consumers happy when they are fulfilled, and unhappy when they are not.
3 – Attractive Quality – These attributes make people happy, but if they don't happen, people are not unhappy.
4 – Indifferent Quality – These attributes are neither good nor bad, and the customer doesn't care either way.
5 – Reverse Quality – These attributes are the ones that cause unhappiness with some consumers, proving that not all consumers are alike.
As more and more product features and incremental updates are released, product visioning actually decreases. However, the product still needs goals and for the creative process to continue. This can happen with a road map. The product road map lets the Scrum development team continue to find goals for future products, and they can view it as a map.
The product road map is a Scrum artifact that demonstrates how the product will most likely move across the upcoming new product iterations, which allows the team to form a dialogue with the stakeholders.
The road map lets companies coordinate the development and introduction of products that are related -- for example, a product line. The product road map should be simple, and state the launch date, the targeted consumers, and the top five features. The rest of the details aren't necessary at this stage, and will be discovered in the product backlog.
The product road map isn't a guarantee, and it isn't actual market research. It is simply how the team sees the product evolving over time, based on what they know at that given time. Product road maps can and do change and evolve, as new information is learned.
The road map shouldn't be built until the product has been launched. It makes no sense to waste the time building out a years-long road map, if the product never becomes reality.
When making the map, include all relevant people, which will include the development team and other stakeholders. And the map should cover a realistic amount of time. Do not do a five-year road map when a six-month one would be more helpful.
As a product matures, it might add variants to address different needs of the consumer. For example, Microsoft offers its Office Suite for Home, Professional, and Student. This addresses the needs of the different customers and users who utilize the product.
However, having too many variants can make it more difficult to develop updates that are functional for all variants. It can also be overwhelming for the market, and can led to a bloated product portfolio, which is often very expensive.
It might seem strange, but some teams begin the product development process without a vision. This is most common when customers request specific features but fail to see how those features connect.
A product development cannot begin without a vision. Work with the customer to build a vision, even if they don't believe one is needed, for instance, for a small feature. Seeing the vision will help them ensure the new feature will be a useful one.
The product vision can detail the future product, but it is entirely possible that future product never comes true. Actually carrying the vision into a product can cause a failed product.
Nobody has a crystal ball. No one can be 100 percent right, 100 percent of the time. When developing a vision, a Scrum team must look into the future and decide what it thinks a product could do and what it could look like. This is obviously not easy, and the only thing we can be certain of is uncertainty. There is no research that can tell you with 100 percent accuracy that a product or idea will be a success. Approximately 25 percent to 45 percent of new products fail, and behind each of them was a product vision and a team that believed in it.
Product managers and development teams must remember that they don't know it all. Development teams are obviously up to date on most technological advances, but customers and users might not be. Don't take a chance and make a product too complicated, just because you think you know what the customer will want.
We all get there. We get stuck. We overthink to the point that we forget what we were thinking about to begin with. You do not want to do this with the product vision. Too much research can cause the team to get stuck and fail to make progress.
Too much research can also be a waste of time and money, and could end up without a deliverable product. It is important to understand the customer and the market, but not to the extent that the development team's vision is overlooked or forgotten.
Analysis paralysis happens when teams care too much about being safe. Risks must be taken (and mitigated as much as possible), even if the company is against it. Things will not always go right the first time.
Analysis paralysis can be prevented by visioning as little as possible, getting the product to market as soon as possible, and then waiting for customer and user feedback, and going from there. The feedback, whether good or bad, will be a great jumping off point for additional market research.
On the other side, some companies don't do enough research, and rely on their tech know-how to develop the product. This is dangerous, because the company could completely shut itself off from the market.
Companies cannot depend entirely on their own intuition or the intelligence and knowledge of their developers. They may think they know what their customer wants, but research is required. Otherwise, the company could spend time and money making a product nobody will buy. The customers and users should always be a part of the visioning and development process.
Well, sometimes it is. Big sunrises are beautiful. Big ice cream cones are delicious. But big product launches can be scary and incredibly risky. Big launches are expensive and very time consuming, and they can result in a huge failure.
Avoid this trap by doing a smaller launch, or an earlier launch, with subsequent frequent launches. It is better to have a small launch and learn from the customer feedback, than it is to have a huge launch and a huge failure.
A vision board is a great way for a team to look at ideas and add new ones. It allows team members to capture their visions and place them on the board for all to see. All you need is a whiteboard and various colors of whiteboard markers. The vision board will be broken into five groups.
1. The Vision Statement – The statement that clearly describes the vision. This goes at the top of the board.
2. The Target Group – This describes the target market that the product is addressing. The board should list who the users and customers are most likely to be.
3. Needs and Wants – This is the problem that the product is solving. It should list each problem and how the product will solve it. It can also list how the customer gains from the product, and why the customer would want to buy and use it.
4. Product – This should be a list of three to five items that make the product unique, and stand out from competitors. Start with the most important and most valuable, and go down the list from there.
5. Product Value – Why the product is a worthwhile investment for the company, and how the goals will be achieved. Some possible goals could be how to increase sales, enter a new market, reduce costs, develop new brands, or ways to get an advantage over competitors.
What makes a good product vision? In the end, it comes down to asking some important questions.
1. Does the vision answer a question or solve a problem?
This should be the first question every product manager asks. What is the product going to do? What problem is the product going to solve? Will this product be valuable? If these questions cannot be answered, then the manager must go back to the vision board.
2. Does the vision align with the values of the company?
The product vision statement must align somewhat with the overall strategy of the company. The company must provide the framework that the product will follow, and be willing and able to back it up, if necessary.
3. Can the vision be tested?
Is the vision something that can be tested, using known assumptions of current consumer needs? It is important to have some testable information. This prevents a company from developing a product that no one wants or needs.
4. Can the vision evolve?
The initial product vision might be too broad or vague in the beginning, and that is okay. It will evolve and become more directed with time. Customer feedback is a particularly important part of this process, and will help determining how the product should evolve.
5. Where will the product vision be in five years?
Five years is a long time, but it is a good idea to be able to think about how the product could evolve over a long period of time. Does the product even exist in five years? If the vision solves a problem now, will it still be able to solve that problem in five years? Of course this should only be done for products that have such a long lifecycle.
6. What does the user think?
Product visions can't only be about the company and the customer. Never forget to include the person who is actually using the product. Ignoring the wants and needs of the user will only hurt the customer. Can you imagine Microsoft completely developing Word without doing consumer product testing throughout the process?
The most important thing for the Scrum team is that they have a shared vision of what the future product will look like. The vision should be realistic and focused on the next upcoming product release. It can be helpful to ask customers and users to attend the spring review meetings so they can understand the vision, as well, and give their feedback. Keep the vision board current and visible at all times.
Do the products follow shared goals?
How will the goals be achieved and who will achieve them?
The product vision must be so clear that everyone is able to understand it. This means that management must understand it, stakeholders must understand it, and every last member of the team must understand it. | 2019-04-23T02:17:00 | https://www.universalclass.com/articles/business/how-to-create-a-successful-product-vision.htm |
0.999999 | The short answered to the above question is yes. Of course it is yes. A life with disabilities is still a life. Such a life still has the potential to make wonderful memories. Moreover, given the fast advancements of science, there is hope for any health challenge in the nearest future. A mobility impairment is probably the most challenging type of disability. Basically, you can see and hear other people leading what you think are normal lives, yet you feel that you cannot do the same. The fact is that no one can do everything. A person may be able to walk, but they might not be able to paint, to sing or to make friends for that matter. There are countless disabled people who can live each day to the fullest whereas other seemingly healthy people are fighting chronic depressions. We all have our crosses to bear. The important thing in life is to overcome what we see as shortcomings and to make the best out of each day. In what follows, we will give you a few ideas that we hope will show you that life can be as beautiful as you want it to be, regardless of your disabilities.
In the last few decades, innovation infiltrated all fields of our life. Basically due to countless innovations, any activity can be performed a lot easier than it was performed in the past. For example, climbing the stairs is no longer an issue for disabled people, as long as they install a stair lift in their home. However, the best innovation for people with mobility impairments is the mobility scooter. Unlike a classic wheelchair, a mobility scooter allows even people with limited strength to go wherever they please. If you acquire such a device, your world will no longer be limited to your home. Without requiring any assistance, with a mobility scooter, you can go shopping, you can take your pet for a walk in the park and you can visit your friends and family. If you are unfamiliar with these vehicles, view this mobility scooter reviews site for more information.
The reason why we emphasized the utility of a mobility scooter is due to the fact that it allows disabled people to extend their comfort zones. A lot of mobility challenged people make the mistake of isolating themselves in their homes. They feel helpless and pitiful. If you are in this situation, you should know that you are only pitiful in your own eyes. If you go outside, expand your horizons and try to live each day to the fullest, not only will you not be pitiful, but you will be an inspiration. There are so many people who let each day pass by without doing anything special. They have the advantage of counting on their legs, yet their broken spirit is a far greater disability than any mobility impairment. Don’t allow yourself to be a broken spirit, but go outside and inspire others to live a beautiful life. Enroll in sports for the disabled, join book clubs, turn your hobbies into art and become the best version of yourself that you can possibly be. | 2019-04-18T22:27:04 | https://www.blogsavenue.com/can-you-live-each-day-to-the-fullest-when-you-have-mobility-impairments/ |
0.997116 | Do you want to know how to file articles of incorporation? Well, the first question may actually be, what are articles of incorporation? The articles of incorporation is a document that establishes a corporation as its own entity, and it is often considered the first step in creating a new business. It is important to ensure that you have filed your company's articles of incorporation properly and in a timely fashion, as the approval time may vary from state to state, and it is required before you can take additional steps in the establishment of your business.
While the articles of incorporation become a public document, and therefore includes important information about the company, there is not a formalized format to which the document needs to adhere. Should you choose to do so, you can find any number of pre-written forms online that allow you to simply enter in the specifics regarding your company. Additionally, many states provide forms that you can obtain from the secretary of state, which can easily be filled out.
As the articles of incorporation are not necessarily terribly formal or complex in terms of what needs to be included and how one goes about filing them, it is often easy enough to print out, complete and send in the proper forms on your own. However, as requirements do vary from state to state, particularly regarding the specificity of the statement regarding the purpose of the company, consulting with a legal expert for some guidance can never hurt. This is especially true if your business is going to have a lot of complexities, such as the number of people involved and with what rights, etc. However, should you not wish to invest the money in an attorney, but want to ensure that your articles of incorporation are well-written, with all the required information, you can hire a document specialist who will oversee the creation and filing of your articles of incorporation.
Additionally, when including the name of your company on your articles of incorporation, you will also want to ensure that you have done your due diligence to ensure that there is not another company already registered with that name. It is also worth noting that even if a company does not share the exact name, if it is similar enough to potentially create confusion, the secretary of state may choose to not approve the articles of incorporation. Having your articles of incorporation denied will only create delays in being able to move forward with the establishment of your company, so you will want to ensure that you do not miss this step! Fortunately, it is easy enough to do a search, online and within your state, of registered business names to ensure that your perfect company name has not already been snagged by someone else.
Some additional things to keep in mind as you prepare to file your articles of incorporation are the filing fees. Many states do require that companies submit a filing fee, upon submitting their articles of incorporation. The fees vary from state to state, so you will want to confirm with the state in which you will be doing business, as to the fees involved.
If you need help with filing articles of incorporation, you can post your legal need on UpCounsel’s marketplace. UpCounsel accepts only the top 5 percent of lawyers to its site. Lawyers on UpCounsel come from law schools such as Harvard Law and Yale Law and average 14 years of legal experience, including work with or on behalf of companies like Google, Menlo Ventures, and Airbnb. | 2019-04-21T10:20:46 | https://www.upcounsel.com/file-articles-of-incorporation |
0.999998 | Hah! See? Game stuff! I made that. Made what? A bunch of boring text on a still-more-boring console window? Mike, you’re losing your touch. I weep for the future; specifically, yours. Honestly now… No! No no! This is actually version 0.0000001 of my super RPG game idea! It’s just the battle system so far, but I determined that that would be the best place to start.
I know it doesn’t look like much right now, but there’s a lot going on under the hood. A little while back I posted a picture of a proposed code architecture diagram. I’ve since made some changes to that design and then (or, at the same time) turned that spec into a working implementation. TL/DR: I have a working turn-based RPG battle system here.
Right now I just have some characters in a battle scene (me and my friends Abe and Damon versus a bat, a robot and a wad of gunk) with placeholder AI that makes random decisions based on their available skills. So, no; you can’t play it at the moment… You just watch the exchange of the characters whacking each other with random attacks.
Wow. Random crap going on, and you can’t even control it. Some game, Mike. Way to go. Seriously, who gave this guy a college degree? I know what you’re thinking, but… This is actually very important in a not-very-obvious way. See, I need to make sure that the attacks and their effects–not just damage, but other effects, like flying, regenerating health, shields–actually work correctly, and so far they do. I even have a move that, when used, coats the battle floor with ice, making it hard to do melee attacks. Once I have most of the attack types in, I plan on using this console program to run simulations of battle scenarios to find out things like “are these enemies too hard? Do the heroes fail too often? Or maybe certain attacks are way too potent or weak?” That kind of stuff’s for later, but it’s in my mind.
So yeah; there’s a lot brewing.. I just need to be more diligent with setting aside time to work on this. I do like it; it doesn’t feel like a chore. But it’s a challenge, and after a long day of work, I don’t necessarily like challenges! But if I can drag myself to the gym–something I don’t particularly enjoy–then I can sure find time to wedge this cool stuff in.
This entry was posted in Developing, Video Games by mikebelotti. Bookmark the permalink. | 2019-04-20T02:58:16 | https://www.mikebelotti.com/blog/wp/?p=18 |
0.999994 | If I need help filling out the forms, what should I do?
If you need help completing the forms, or if you have questions about the complaint process, you may contact the Human Rights Commission.
Does it cost anything to file a human rights complaint?
There is no cost to file a complaint, respond to a complaint, or to participate in an investigation, settlement negotiations or a panel hearing.
You do not need to have a lawyer. However, both the person making a complaint (the Complainant) and the person or organization a complaint is against (the Respondent) may hire a lawyer. If you hire a lawyer, it is at your own expense.
My complaint is against more than one person or organization. What should I do?
It is possible to make a complaint against more than one Respondent. There is space on the complaint form for more than one Respondent. If your complaint involves more than one Respondent, write the name of each Respondent in the area provided on the complaint form.
Yes. You can file a complaint on behalf of another person. The Executive Director may require the consent of the other person.
What result can I expect from my complaint?
Your complaint may also be settled or dismissed because it lacks merit.
Is all the information I give to the Human Rights Commission given to the other parties?
Both the Respondent and Complainant are entitled to see all information provided by the parties involved in the complaint, except contact information. A Complainant or Respondent may request that certain information be kept confidential.
If I don't want to continue with my complaint, what can I do?
If you decide you do not want to continue the complaint process, you may withdraw your complaint. You must tell the Commission, in writing, that you want to withdraw the complaint. This can be done at any time, until a human rights panel has made a decision on the complaint.
How long does a human rights complaint take?
On average, a complaint takes less than one year from the time the complaint has been filed to the point of resolution. However, complaints that require a public hearing usually take longer.
Will my complaint be sent to a public hearing?
Complaints are not sent to a public hearing automatically. If no settlement is possible, and after investigating a complaint, the Executive Director may recommend to the Chair that a complaint be sent to a hearing. The Executive Director he may dismiss or discontinue the complaint. The Chair may also decide to send a complaint to a hearing after a review of the Executive Director's decision to dismiss or discontinue a complaint.
Where does the funding come from for the day-to-day operations of the Commission?
The PEI Human Rights Commission is an independent corporate body that receives all its funding from money appropriated by the Legislature. The funding is by way of an annual operating grant through the Office of the Attorney General. | 2019-04-22T21:54:59 | http://www.gov.pe.ca/humanrights/index.php3?number=1005905&lang=E |
0.999995 | I'm growing 2 kinds of cucumbers, one is a pickling type (can't remember the exact name), the other is called "straight eight". They both have prickly spines on them, what is causing this?
Your cucumbers are perfectly normal. Wear gloves when you harvest them and try not to get pricked. Cucumbers are generally divided into two groups-pickling types and slicing types. These groups are based on shape and color. The pickling types tend to be the short and stocky varieties. They usually have dark green midsections and are a lighter green color on the ends. They are covered in prickly little spines-either black or white in color, and are thicker skinned than the slicing types.
The next time you're at the grocery store, take a look at the cucumbers in the produce department and compare them to the jarred pickles in the condiment aisle. You'll notice that the cucumbers in the produce section are long and a deep, uniformly deep green color. They are also straight and round, the perfect shape for slicing. Cucumbers in the produce section look smooth, but they also have spines (white), which were removed for your convenience in preparation for transport to the grocery store.
If you look at the jarred pickles, the "spine scars" are easy to see on the skin. The spines on pickling cucumbers tend to be shorter and broader so they leave bigger scars.
The real curiosity is why cucumber plants developed spiny fruits in the first place. In the animal kingdom, spines develop a means of protection. It would be interesting (to me, anyway) to know more about why the cucumber developed spiny fruit. Incidentally, sea cucumbers are related to spiny sea urchins, yet they rarely have spines.
You asked about the prickly spikes on cukes. That is simply the way that they grow. Kind of like the thorns on rose bushes. Cukes are from the same family of plants as melon and squashes, like pumpkin. If you grow any of these plants you will find the prickles somewhere on the plant--most of the time on the stem. My suggestion for when you harvest your cukes is to wear a pair of gloves. Also if you look carefully at your cukes, you will see that the prickles tend to be on the middle part of the cuke.
If you are careful, you can pick the cukes by the ends to avoid the prickles getting into your hand. This takes patience and a bit of practice.
Once you have harvested your cukes, if you are going to use them for pickles or want to eat them with the skins on, you can take a butter knife and LIGHTLY score the prickles off. some folks just pickle them with the prickles on because the pickling solution is acidic and will eventually make the prickles fall off. That is up to you. Hope this helped.
Yes, I remember when we grew cucumbers that they had some spines...but they weren't real bad and since I most always peel a cuke, it doesn't matter. Perhaps the ones sold in the grocery have been rubbed down.
I never really noticed those prinkly things before too much so I guess they never bothered me!
I wouldn't worry about it and enjoy those fresh cucumbers. We didn't plant a garden this year due to the yard getting too shady but my husband will re-locate it next year and then I can enjoy our fresh homegrown produce again. I absolutely love cucumbers and even tho I'm buying them in the store, I make cucumber salad quite a bit....the marinated kind with onion and vinegar....even our daughter loves it. She likes vinegar-y things just like we do.
genetics! depending on what type of cucumber you've grown you can have outright spikes growing on them. gherkins are really spikey. peeling gets rid of the stickers and if you pickle them whole then canning process gets rid of them. | 2019-04-25T13:44:56 | https://www.thriftyfun.com/tf50842211.tip.html |
0.999998 | write one paragraph for each question. I will send you the PowerPoint that may help to answer the questions.
For each of the following situations, assign a low, moderate, or high impact level for the loss of confidentiality, availability, and integrity, respectively. Justify your answers.
1) The University of New Haven’s public information Web server.
2) The University of New Haven’s Student Registration information.
3) A local law enforcement organization’s public information and confidential tip line Web server.
4) An information system used by the University of New Haven’s Human Resources department for employee information and for routine administrative information. Assess the impact for the two data sets separately and the information system as a whole.
5) The sewage treatment plant in West Haven contains a SCADA (supervisory control and data acquisition) system controlling the treatment of wastewater for the city of West Haven and for a portion of New Haven. The SCADA system contains both real-time sensor data and routine administrative information. Assess the impact for the two data sets separately and the information system as a whole. | 2019-04-24T07:01:15 | https://essaygarage.com/2017/04/24/cia-impact/ |
0.999957 | This is the first post. Please populate content here. This is the first post. | 2019-04-19T18:33:08 | http://www.sportcourtwi.com/news |
0.998489 | CNET también está disponible en español, Don't show this again, The following announcements took place today, VocalTec introduced IP telephony in 1995 with software that allowed a PC user with a microphone and speaker at&t iphone screen protectors to make phone calls, But that paradigm has shifted as the technology gains legitimacy in the eyes of the traditional telecommunications business, "PC-to-PC [conversation] is not what Internet telephony is anymore," said Elon Ganor, chairman and chief executive of VocalTec, "It's really a telecom business, Most carriers will offer IP services over their own backbone."..
CNET también está disponible en español. Don't show this again. In a nutshell, the TiVo app--which works with smartphones and tablets--lets you control, search, browse, explore, and comment on Facebook and Twitter all without interrupting the programming currently playing on your TiVo box. (Check my coverage of the iOS app to see all that it can do.). All you need to do to get it up and running is download the free app from the Android market, connect to the network your TiVo is on, and enter your Media Access Key, which you can get from your online account info or from your TiVo's settings menus.
The announcement was made during Google's annual conference for software developers, I/O, being held Thursday and Friday in San Francisco, Google I/O is one of the biggest events at&t iphone screen protectors for the company as its shares the latest developments in its world-leading Android mobile operating system, Google has been increasingly ambitious about expanding its scope of products beyond its juggernaut search engine, Its search and advertising business is still the most dominant in the world, making more than $50 billion a year, But as the Internet evolves, CEO Larry Page has been looking for new future revenue streams, The company has made big bets in everything from smartphones to wearable devices to driverless cars..
Other than these two factors, any problem that SBC faces will be faced byevery other company in the telecommunications arena, Governali said. SBC's difficulties will also affect "virtually all sectors oftelecommunications" including local and long distance, voice and data,incumbent and competitive, and wireline and wireless divisions, saidDeutsche Banc Alex Brown analyst Gary Jacobi, who reiterated a "strong buy"rating. When SBC is compared to peers, it comes out on top. It belongs to aselect category of telecommunications companies, the RBOCs, that includesBellSouth, Qwest and Verizon. | 2019-04-24T07:09:43 | http://www.italiasiamonoi.it/at-t-iphone-screen-protectors-en-i10036.html |
0.999785 | In autumn 2014, EPRI held an event with several device vendors to demonstrate the interoperability of DNP3 Secure Authentication stacks, both version 2 and version 5 (versions 1, 3 and 4 were intermediate versions that were never part of IEEE-1815). A complete report is available here but the TL;DR is that SAv2 and SAv5 can coexist with DNP3 without SA as well as with each other; that different implementations interoperate almost seamlessly; and that implementation choices that are pretty well universal are to exclude support for asymmetric keys and to exclude multi-user support.
There is much to be said about the merits of Secure Authentication, and the EPRI report discusses those merits in some detail. What they really showed in this event, though, is that the vendors that participated are ready for wide deployment of SAv5.
One thing that was clearly missing – and pretty much kicked off on the spot – was a protocol to manage Update Keys.
DNP3 is a SCADA protocol. As such, it is not geared towards key management and large parts of the behind-the-scenes stuff that is needed to bootstrap Secure Authentication is largely unspecified.
This means that different vendors come up with different solutions, often geared towards their own tools and not always completely thought through. This could rapidly become a problem for users, especially as SA becomes more popular.
To mitigate this potential problem, EPRI and some of the vendors present – most notably Triangle MicroWorks – started work on the DNP3 Key Management Protocol.
At this point, it looks like it will become a non-normative annex to the next edition of IEEE 1815. That means it will become an optional addition to DNP3, which in turn means it will take quite some time before enough vendors implement it to be useful – unless, of course, utilities start pushing hard for it, or there is a strong regulatory mandate, neither of which seems very likely at the moment.
Aside from conformance tests, there was a strong focus on security at F2F2014, and there will likely be a strong focus on it again for F2F2015.
For one thing, there was a potential low-bandwidth denial-of-service attack that was made possible through an “extension” of the specification: a variable-sized object (octet strings) could have zero-length (for zero-length strings) and would then be encoded without using any bytes in the message – which potentially allowed either a master or an outstation to send a very small packet with seemingly thousands of empty objects, resulting in a near-endless loop.
The hole was plugged by simply clearly stating that this is not allowed: zero-length strings with existing means are not supported by the protocol. According to how you interpret the existing specification, this was already the case, but now it’s explicit.
To allow for zero-length strings, quite a few changes to the protocol were proposed, ranging from the introduction of iterators (that would have been nice) to Pascal-style strings. In the end, most of the proposals died on the table, and only the Pascal-style strings remained. Authoring the technical bulletin that specified the new object (and continued participation in the tech committee) earned me the right to vote, which is also nice.
Many other discussions about security occurred, but I think F2F2015 will be far more interesting in that regard.
Robus made far fewer waves than I had expected, with only one CERT advisory for Modbus and another for a protocol I had never heard of (Telegyr 8979). I had expected Modbus to present a number of easy targets, as there are many, many ad-hoc implementations.
OpenDNP3 is the only Open Source DNP3 implementation worth its salt. It describes itself as the “de facto reference implementation of IEEE 1815-2012”. It is maintained by Adam Crain (the same Adam Crain who is behind project Robus), who has been adding TLS and DNP3 SAv5 support to his stack, which means there will soon be an Open Source DNP3 SA implementation.
I’ve only looked at DNP3 here, but using DNP3 as an indicator, it looks like the industry is becoming more security-aware.
This does not mean that we’re out of the woods, though: there are still devices being developed today that expect their configuration tool to authenticate the user (and do not check username/password themselves) – which basically shows that not all developers understand what this is about, which means we still have some work to do. | 2019-04-19T10:18:20 | https://rlc.vlinder.ca/blog/2015/10/progress-in-dnp3-security/ |
0.999999 | Does this article seem more relevant today then back when he first wrote it?
As the new U.S. administration prepares to take office amid grave financial and international crises, it may seem counterintuitive to argue that the very unsettled nature of the international system generates a unique opportunity for creative diplomacy.
That opportunity involves a seeming contradiction. On one level, the financial collapse represents a major blow to the standing of the United States. While American political judgments have often proved controversial, the American prescription for a world financial order has generally been unchallenged. Now disillusionment with the United States' management of it is widespread.
At the same time, the magnitude of the debacle makes it impossible for the rest of the world to shelter any longer behind American predominance or American failings.
Every country will have to reassess its own contribution to the prevailing crisis. Each will seek to make itself independent, to the greatest possible degree, of the conditions that produced the collapse; at the same time, each will be obliged to face the reality that its dilemmas can be mastered only by common action.
Even the most affluent countries will confront shrinking resources. Each will have to redefine its national priorities. An international order will emerge if a system of compatible priorities comes into being. It will fragment disastrously if the various priorities cannot be reconciled.
The nadir of the existing international financial system coincides with simultaneous political crises around the globe. Never have so many transformations occurred at the same time in so many different parts of the world and been made globally accessible via instantaneous communication. The alternative to a new international order is chaos.
The financial and political crises are, in fact, closely related partly because, during the period of economic exuberance, a gap had opened up between the economic and the political organization of the world.
The economic world has been globalized. Its institutions have a global reach and have operated by maxims that assumed a self-regulating global market.
The financial collapse exposed the mirage. It made evident the absence of global institutions to cushion the shock and to reverse the trend. Inevitably, when the affected publics turned to their national political institutions, these were driven principally by domestic politics, not considerations of world order.
Could you post the link? The reason why I'm asking is b/c I want to post it on another MB, and they have rules to do such.
A report based on declassified documents suggests that the Nixon and Ford administrations, angry with the shah for his support for raising oil prices, worked to curb his ambitions. | 2019-04-22T00:31:50 | https://forum.prisonplanet.com/index.php?topic=103927.0 |
0.999998 | <p>A fun and friendly introduction to the Spanish language. The course will cover pronunciation, understanding and development of vocabulary, basic reading and conversation. Some homework is involved.
A fun and friendly introduction to the Spanish language. The course will cover pronunciation, understanding and development of vocabulary, basic reading and conversation. Some homework is involved. | 2019-04-21T20:36:49 | https://www.byroncollege.org.au/course/SpanishBeginners |
0.99998 | Is Alexander greater with sideburns? or without?
The ancient Greeks might have had a word for sideburns, or at least a way to describe them. In America they were known as side-whiskers until the 1860s. Beards were getting to be more fashionable than they had been in the early part of the century, and some men saw an opportunity to use facial hair for an expression of style.
One such man was a Union general in the Civil War. He was Ambrose Burnside, and he knew how to rock side whiskers. He grew them long and thick, just like Martin Van Buren did a couple decades earlier, but he linked them in the middle with a thick moustache. His baldness is probably what made the effect all the more striking. It was so striking, in fact, that the style was named after him. People took his name, shifted the syllables, and Burnside became sideburn.
After the Civil War, Burnside went on to serve as governor of Rhode Island, and later senator, until his death in 1881, at age 57. Still, the sideburn thrived. The term caught on, and men continued to wear sideburns throughout the Victorian and Edwardian eras. They moved from a somewhat bold fashion statement to take on a more conservative, even stuffy association. Young men started shaving their faces, and were more inclined to wear just a trim moustache, if any facial hair at all. Beards didn’t completely disappear in America, of course, but their prominence did fade.
They faded for a while, at least. By 1960, the conservative look had become the clean-shaven one, and wearing a beard was a little bit more bold. The counterculture of the 1960s embraced facial hair, as well as longer hair on men’s heads, and it was often derided for it. Facial hair, like wild, unkempt hair, was a sign of rebellion. A popular joke in the 1960s went, “What do you call a hippie with a haircut? The defendant.” As the cultural tumult of the 1960s calmed down, so did the hairstyles, but sideburns were quite common throughout the 1970s. They never really came back in fashion in full force, especially during the relatively hairless 1980s, but in recent years, they’re increasingly common.
The funny thing is that facial hair that would have been considered safe and conservative is often derided as having a hipster cachet today. But wait another twenty years and today’s young, bearded men (whether they’re hipsters or not) will still be sporting their “hipster beards”, setting themselves apart from the rebellious youths of the 2030s, who will no doubt be making a radical fashion statement with a clean shave every morning! | 2019-04-18T22:58:04 | http://www.trueorbetter.com/2019/01/sideburns.html |
0.999998 | Cancer and heart disease were not major diseases in human history until the past 40 to 50 years. True, there are many factors that did not exist before this time, such as radiation, new chemicals and toxins. Now, a re-examination of a doctor's work in the 1930s gives us a plausible theory that explains how our diet, specifically the rise in carbohydrate consumption and the distortion of essential fatty acids, are the primary causes of cancer and heart disease, while the other factors are secondary in nature.
In The Hidden Story of Cancer, written by Brian Peskin and Amid Habib, the authors outline the incredible work of Dr. Otto Warburg, a German scientist in the 1930s who realized that hypoxia (lack of oxygen) was the fundamental reason cells became cancerous. The technology of biochemistry was not sophisticated enough at that time to know the actual mechanisms, but now there is enough evidence to know exactly what is going on and how it connects to heart disease, in addition to a host of other health problems.
I was fortunate enough to hear Brian speak in Marin County, Calif., this summer. I will try to summarize the main points from his presentation in this article.
Some of the most critical ingredients for our cells' metabolic needs are the essential fatty acids. Most of the metabolic work happens in the cell membrane or the organelle membranes; most significantly the mitochondria. Membranes are made up of lipid bi-layers. Embedded into this lipid bi-layer are the proteins and carbohydrates that control what comes and goes into and out of the cell or organelles. The proper function of the membrane depends greatly on the particular fatty acids that make up the lipid bi-layer. Saturated fatty acids are structurally more rigid, while polyunsaturated fatty acids are more flexible.
The nature of the membrane's rigidity or flexibility will determine how well the cell performs basic metabolic tasks such as respiration; i.e., the process by which oxygen is transformed into adenosine triphosphate (ATP), the chemical currency of energy for all life on this planet. If the cell can't utilize the oxygen efficiently, it will convert from respiration over to fermentation in order to produce energy. This is much less efficient, and the cell's intelligence is also lost in the process.
This is how a normal cell turns into a cancer cell, according to Dr. Warburg, the Nobel Prize-winning scientist. His later work confirmed that the mechanisms were particular to essential fatty acids. It is important to note that it is the cell's ability to incorporate oxygen that is lacking, rather than the oxygen itself. Thus, there can be lung or blood cancer developing in the presence of oxygen because the cell has lost the ability to utilize that oxygen for respiration.
What is critical to understand is the differentiation between real, pure, unadulterated oils and those oils that have been disturbed in some way. Processed oils will alter their ability to function properly in the cell. They may provide a longer shelf life or become a solid at room temperature so that one can bake better cakes with them, but they are not what nature intended. These adulterated oils have been inserted into the food chain most aggressively post-World War II and have made their way into our cell membranes. We know them mostly as trans fats or hydrogenated fats, but these are not the only names used or ways to modify these oils.
When the cell incorporates altered omega-6, i.e. linoleic acid (LA), into its membrane it alters its ability to utilize oxygen. When a cholesterol molecule binds to a modified LA, it becomes the plaque that blocks arteries. Cholesterol that binds unadulterated omega-6 fatty acids does what it is supposed to do, which is to help repair damaged tissue.
Cholesterol itself is not the issue; the oxidized LA to which the cholesterol binds is the issue. Going after cholesterol is like going after the cab driver who was unwittingly transporting the bank robbers. Or more accurately, going after all cab drivers to stop all bank robberies.
This may come as a big shock. Fish oil is not a good source of omega-3. Here is the reasoning. There is an important distinction between parent omega-3 fatty acids and their derivatives. Alpha-linolenic acid (ALA) is the parent molecule that gets transformed into DHA and EPA, the derivative molecules that are commonly referred to as omega-3 oils and the main constituents of fish oil.
The problem is that only a very small percentage of the parent ALA gets converted. Most of it stays unconverted. So we overdose on the derivatives when we take fish oil, at the expense of not getting the parent oil. There is more to the fish oil story, and I will refer the reader to Brian Peskin's articles, which can be found at www.brianpeskin.com, for additional information on the subject.
When a cell doesn't get enough oxygen, due to the lack of proper essential fatty acids (EFAs), the cell shuts down respiration and starts fermenting sugars. This explains how carbohydrates feed the cancer. Fermenting cells need sugars, instead of protein or fat for fuel. This is another explanation of how the modern diet, with its exponential consumption of sugars compared to our evolutionary history, fuels cancer.
The mechanism for heart disease and stroke was alluded to above. Cholesterol molecules form esters with EFAs. If the EFA is adulterated or oxidized, it does not perform its normal function and instead becomes the main building block of plaque that clogs arteries and causes inflammation. In addition, glucose sticks to proteins in the blood (glycosylation). These glycosylated proteins are sticky and slow down the blood flow through the capillaries and veins, preventing oxygenation. It has been shown that people with diabetes have higher rates of cancer and mortality due to cancer, as compared to those without diabetics. The strongest correlation was for pancreatic cancer. Notably, it has been found that the higher the fasting glucose one has, the higher the risk for cancer.
There is more. The role inflammation plays in both cancer and heart disease is prominent and EFAs are also at the root of it. Linoleic acid is the source building block for the powerful anti-inflammatory prostaglandin E (PGE). Linoleic acid is also the building block of prostacyclin, an anti-aggretory agent or blood thinner. It is also one of the body's natural steroids.
Of course, one solution is to stop ingesting the bad oils and begin eating the oils we do need. Without going into the details, the ratio of omega-6 to omega-3 is roughly 1-2.5:1. This depends on the individual circumstances. One can use cold-pressed, organic, raw safflower, sunflower or sesame for the LA and flaxseed oil (also cold-pressed, organic and unprocessed) for the ALA. Peskin doesn't like olive oil (oleic acid) because it can overpower the good oils when processed LA is present. Warburg also emphasized consuming enough minerals and protein to ensure enough functioning hemoglobin to carry oxygen to the cells, in addition to the proper EFAs and low levels of glucose.
In conclusion, the work of Warburg as explained by Peskin and Habib offers a cogent and powerful perspective on the mechanism of cancer, heart disease and inflammation. It cannot be ignored in light of the abysmal progress that has been made the past 40 years on these conditions. The hypothesis is simple and fundamentally sound, and must be reconsidered.
With apologies to Michael Pollan (author, columnist, activist, journalism professor and director of the Knight Program in Science and Environmental Journalism at the University of California, Berkeley), I started this paper with a pithy one-liner to emphasize we should make sure the food we eat is in the form in which it has always been. If it's an animal, make sure the animal has been eating the food it was intended to eat. If we do this, cells will get what they need to function optimally. | 2019-04-19T15:25:06 | https://www.acupuncturetoday.com/mpacms/at/article.php?id=31878 |
0.999267 | This article is about the 1957 song. For the 1953 rag, see Let's Have a Party (rag). For the album by The Rivieras, see Let's Have a Party (album).
(1960) "Let's Have a Party"
(1960) "Happy, Happy Birthday Baby"
"Let's Have a Party" is a 1957 song written by Jessie Mae Robinson and recorded by Elvis Presley for the movie Loving You. Wanda Jackson recorded the song for her first album, Wanda Jackson, released in 1958. The song was released as a single by Jackson in 1960 and entered the UK chart on 1 September of that year, spending eight weeks there and reaching #32; it also reached #37 on the Billboard Hot 100 in 1960. The Jackson version was later featured in the 1989 film Dead Poets Society. Paul McCartney also recorded and released the song (under the title "Party") on his 1999 Run Devil Run album. His original song "Run Devil Run", on the album of the same name, also has a similar melody.[citation needed] A cover of "Let's Have a Party" by Sonia was released in 2010.
The song was included under the title "Party" in the Broadway musical Million Dollar Quartet, which opened in New York in April 2010. It was sung by Robert Britton Lyons, portraying Carl Perkins, as well as by the company of the show, and was covered by Robert Britton Lyons and the company on the Million Dollar Quartet original Broadway cast recording.
In T. Rex's 1972 concert film Born to Boogie, Marc Bolan and Ringo Starr attempt to recite one of the lyrics from the song ("some people like to rock, some people like to roll, but movin' and a-groovin's gonna satisfy my soul"). However, they break into laughter each time.
Led Zeppelin also played this song live during their live sets of "Whole Lotta Love"; an example of this practice can be found on their live album How the West Was Won.
English glam rock band Mud covered the song for their 1975 album Mud Rock Volume 2.
Rock and roll band Dr. Feelgood covered the song on their 1978 album Private Practice.
^ "Wanda Jackson Discography, part one". Praguefrank's Country Music Discographies. Retrieved 17 December 2013.
^ Whitburn, Joel (2011). Top Pop Singles 1955–2010. Record Research, Inc. p. 440. ISBN 0-89820-188-8.
^ "UK Singles chart positions - Wanda Jackson". Polyhex.net. Retrieved 2011-05-07.
^ "Billboard chart positions - singles". allmusic. Retrieved 2011-05-07.
^ "Dead Poets Society (1989) : Soundtracks". IMDb.com. Retrieved 2016-09-26.
^ Zielinski, Peter James (April 12, 2010). "Photo Coverage: Million Dollar Quartet Opens on Broadway". Retrieved 7 May 2011.
^ Stephen Thomas Erlewine. "How the West Was Won - Led Zeppelin | Songs, Reviews, Credits". AllMusic. Retrieved 2016-09-26.
^ Dave Thompson. "Mud Rock, Vol. 2 - Mud | Songs, Reviews, Credits". AllMusic. Retrieved 2016-09-26.
^ Stephen Thomas Erlewine. "Private Practice - Dr. Feelgood | Songs, Reviews, Credits". AllMusic. Retrieved 2016-09-26.
"Silver Threads and Golden Needles"
"You Can't Have My Love"
"Riot in Cell Block Number 9"
"In the Middle of a Heartache"
"The Box It Came In"
"Tears Will Be the Chaser for Your Wine"
"A Woman Lives for Love"
"What in the World's Come Over You"
"You Know I'm No Good" | 2019-04-26T08:30:41 | https://wiki2.org/en/Let%27s_Have_a_Party |
0.999988 | My guest this week is Barry Libenson, Global Chief Information Officer of Experian. During our interview Barry and I discuss what Experian is doing with innovation and his role in it.
The importance of portability and use of portable containers for Azure and AWS using Cassandra, PostgreSQL, or MySQL or one of the more portable container.
Barry Libenson is Chief Information Officer (CIO), with responsibility for the design and delivery of Experian’s global technology strategy. Prior to joining Experian in June 2015, he was CIO of Safeway in North America. Earlier in his career, Barry held CIO positions at Land O’Lakes and Ingersoll Rand. Barry has a BA in Computer Science from Colgate University, and a MBA from Duke University. He was also one of the first employees at Oracle when they were only a $19 million dollar company.
[00:00:30] That whole question sort of, I mean what we're doing is really focused on how we speed up the pace of innovation and deliver you know an evolving way of working with customers. You know the historical, we kind of coming from a place where the historical way of delivering out locations to customers is being turned on its head in a number of different areas both in terms of sort of you know software as a service but also in terms of how information is consumed and a lot of what we're doing at Experian right now the emphasis is on addressing those two primary customer concerns. You know, the way they want to consume information and the speed at which we can deliver it to them and that's a challenge I think for everyone right now and something very much that's on the forefront for us.
So your customers are asking about how you can consume, how they can consume information, ways they can consume information and then and the speed? Those are like two of the key pieces they're asking for Experian? Is that, did I summarize that correctly?
Barry: Yeah and I'll give you a very specific set of examples.
[00:02:00] The first is that you know if you think back ten years ago everybody was pretty much delivering technology the same way with a few very very few exceptions, whether you know if you were an Oracle customer, an SAP customer, an Experian customer, a People Soft customer, it really didn't matter. You essentially paid the, you paid the software company and then they in turn delivered a software package to you that you installed and interfaced with that to run your business. The first big shift that you know we've been seeing steadily gaining traction is the whole software as a service model. People just simply don't want to consume, they don't want to buy applications. They want to pay by the drink. They want somebody else to run the application for them. They don't want to have to worry about what hardware it runs on.
[00:03:00] They don't want to have deal with any of that. They simply want to know that they're going to get the capabilities that they need when they need them and that they're willing to pay for that but instead of spending tens of millions of dollars up front they'd rather pay for it as they consume it and you know, you saw companies like Service Now and Salesforce.com and some sort of early trailblazers in the SASS world, we're very much embracing you know that as a delivery model for our customers but so with a certain set of customers that i would say will always consume our technology through an application for various reasons but we also have a whole series of customers now who are consuming the services that we provide as a service as opposed to installing an application. The second big shift is this whole API and microservices economy.
[00:04:00] So historically speaking you know companies like Experian or Oracle or anyone else whether it was, whether we were delivering the service to you in the cloud or whether we were delivering it to you as a, whether we're delivering the data to you you know in an application or you know through the cloud or on prim we were dictating the terms and conditions under which that data was delivered. The new model and it's interesting to sort of talk about one of the key drivers behind this which I'll come to in a second is this whole idea of setting up microservices in an API layer that allows people to connect to your services but only consume what they want. So if all you want is a single data element you can ask for that and the application or the API or the microservice will deliver just that piece of information.
[00:05:00] It won't deliver more than that or less than that and you can be very prescriptive about what you're asking for and what that allows people to do is create applications that they want to build using your, using our data to make better decisions and that's a big shift as well. One of the key drivers behind that has sort of been this whole internet of things. You know if you've got a thermostat in your house or an alarm system or solar panels or garage door opener, all of these things that connect on the network in your house or out in the world most of those have an API so that you can write your own interfaces to them and things of that nature and that model is very much carrying over into the enterprise software space as well where people are saying hey look, I don't want you know terabytes or you know big voluminous amounts of information.
[00:05:30] I just want these five or six pieces of information on Barry or on Mike or something like that and so just give me a simple model for getting just what I need. Those are the two big shifts that I would say we're seeing in, those are two of the big shifts that we're seeing in the market that's driven a lot of changes inside of Experian in terms of how we deliver capability.
[00:06:00] Yeah. It absolutely makes sense and I have, I want to come back to that the microservices API piece for a second but you know I would like to start at the beginning and I would like to give our listeners, because we have listeners that of some guys that are just starting out as CIOs, some that are, so just getting started in their career, some that are mid career and some that I run into and this is very frequent are just really wanting to completely reboot who they are as a CIO and what they deliver to their organizations and maybe what we could start with where, how did, what did you trajectory look like? Like where, can you bring us back to like maybe college and like what does your trajectory look like to the point you're at today?
Yeah. So I'm going to be dating myself here which is okay but I mean my undergraduate degree is in computer science.
[00:07:30] So I got my undergraduate degree in computer science from Colgate University in New York back in the day when it was feasible for you to know everything there was to know about technology. So we're going back to the early 1980's here, late '70's, early '80's where you know there was three programming languages, a limited amount of hardware and you know basically you could learn or sort of know every programming language there was to know and you know that's sort of evolved. My first job out of college was as a software developer for Data General in Westborough, Massachusetts. I wrote code for four or five years basically in the mini computer world. From there moved into more of a sort of what I'll call a business liaison role where I was still at Data General but my primary role was to be the interface between engineering and the marketing organization and specific customers.
[00:08:00] So I worked very closely with General Electric, Westinghouse at the time, a number of other very large enterprise accounts and the challenge always was how do you find somebody who can sort of bridge the gap between the engineers and the sales organization to ensure that you know that what we're building is in the sweet spot of what the customer is looking for? From there I worked for a number of startup companies including having the privilege of being employee number 190 at Oracle back in the late '80's.
Barry: So I was bouncing between the West Coast and the East Coast. I was living in Boston at the time but was frequently in California. Oracle was a 19 million dollar a year company when I joined.
[00:09:30] So it gives you a sense for the changes that have occurred and then I spent about three and a half years at Oracle, then went and ran a software company in northern Virginia for about 11 years which ultimately I ended up selling and then took on the role of I was original the vice president of e-business for Ingersoll Rand. Ingersoll Rand being one of the you know very large diversified manufacturer, very much bricks and mortar at the time. This is sort of like 2000, you know right around 2000, 2001 and very much felt the need to move more into a digital economy, I was sort of tasked with driving that initiative. About six months after joining the company took on the role of chief information officer, spent about eight year at Ingersoll Rand as the CIO then went to Land O'Lakes, was the CIO at Land O'Lakes the butter or the diary and seed what most people don't realize is how big Land O'Lakes actually is. They own Purina feed.
[00:10:30] They're the largest distributor of feed in the United States, owned by half of Syngenta, and Monsanto, and their own line of their own brand and then from there went to Safeway which is the second largest grocery retailer in the United States, spent about two years there. Safeway was acquired by Cerberus and was going to be merging with Albertsons. Not something that was particularly appealing to me and that's when I came to Experian about two years ago. So I've always found technology to be absolutely fascinating. I'm very fortunate. I wasn't good enough to be a professional athlete at anything, so I think I have probably what I consider you know one of the best jobs out there. I'm doing something I really enjoy, getting to work with great people and you know getting to play around with the same kind of stuff that I would enjoy playing around with whether I was getting paid to do it or not. So it's a really fortunate situation for me.
[00:11:00] Well I'm really glad you shared that because I really like the people to kind of see kind of the lens of the trajectory of growth because what is one of the themes that we talk about is innovation and I like to break it into offense and defense and it's interesting, as soon as we jumped on our conversation you are completely you know offense. You're talking about customers. You're talking about delivering value to customers and you know I didn't prep you for that. We didn't like rehearse this at all.
[00:11:30] It's just the kind of the gear you went to and I like that because, but I also there's two different types of innovation and I want to get back to APIs and microservices in a second but I, but how do you, you know if you were in a room with a hundred CIOs and they're asking you questions about how you add value to the business do you break it down into offense or defense or how would you answer that question of how you think about how they should think about adding value to the business? What question would be the one that you would say they'd need to ask themselves?
[00:12:30] Yeah, it's a really interesting point and I think it's almost an evolutionary part of the process of me getting to, you know, to doing the job that I do. There's been a couple of things that have changed pretty dramatically over the last 20 years or so in terms of the role of the CIO in an organization. When I started doing this my job was to keep the lights on, make sure that the factory systems were operating, make sure that the financial systems were operational, make sure that everybody's laptops and desktop machines were running smoothly but we, you know nobody really perceived technology as a growth engine or as an enabler. You know and some companies did but a lot of companies did not. As a matter of fact I would say there are still companies today that don't but the vast majority of successful companies and companies that are growing obviously recognize how critical technology is, in terms of being a differentiator and an enabler.
[00:13:30] I think what every good CIO, well first of all the first part of that what I described the keeping the lights on that's become the new table stakes. I mean if you can't do that odds are you're not going to be successful with the other pieces and to some degree that's stuff gotten a little easier because the underlying technology's improved. I mean the hardware platforms have been simplified. There's more commodity hardware out there that things operate on. The software application world has gotten better. You have more SASS based solutions that make a CIO's job easier because they're not over, you know they're not necessarily responsible for running everything any longer. So that piece you'd better be able to do and there's really not a lot of conversation now.
[00:14:30] If you've got a company that's doing a monolithic ERP implementation you know that's sort of a different story and then you probably want to make sure you've got somebody on staff that's been through something like that, because it's non trivial but the real piece and the part of the job that I think is the most enjoyable is the working with my peers you know at the senior levels of the company to understand what the overall corporate strategy is and to talk about how we're going to use technology as a differentiator to drive our growth and to provide customers with a better experience and everything we do, you know we don't do technology for the sake of technology any more. I mean we, I have a personal role to make sure that the rest of the organization is well educated in the direction that technology's going and the capabilities that it can deliver but one of my other primary responsibilities and I think the responsibility of any good CIO is to understand the overall enterprise strategy and figure out where technology is going to play a critical role in enabling that and helping exceed expectations both of the business and of customers.
[00:15:30] You know almost everything we're doing inside the organization right now has either two components. One is either to try to take cost out and complexity out of how we operate the business but the second is how do we speed up innovation, how do we provide a better experience to customers. How do we make sure that we're, you know we're preforming in an agile way so that we can respond to feedback or threats more quickly then we were previously able to do? So it's really sort of that two prong strategy, you know driving innovation but also effectively managing cost at the same time as you're sort of keeping everything operational at the same time.
Bill: Can someone take, can you innovate by taking cost out? Like, do you, have you seen that? Like, reducing complexity seems to me a part of a unique capability that could be seen as innovative but is that how Experian and how you would look at potentially adding a lot of value from the CIO perspective?
Yeah. I don't think that, I mean that I think that they're, let's put it this way, they're definitely not mutually exclusive. I do believe that you know the reason that we want to take cost out is not so that it flows necessarily to the bottom line. It's so that we have it to reinvest in other areas. I mean you know we spend you know the same type of percentage of revenue on innovation and technology that most companies would that are technology companies but a much, I would really like to see that spend allocated largely towards innovation and growth and not towards support and running the mothership and complexity is, complexity drives that cost up. The more variations of platforms that you have the more different languages you use, the more different database or back end technology you have in place the less money you have to spend on innovating and driving growth because that complexity just inherently drives cost.
[00:18:00] I mean if you think about it, you know if I had one database provider instead of five I could get leverage with that one and potentially save a good deal of money but instead the spend is spent over five different providers and you can well imagine in a multi billion dollar company that takes on new, you know new, a dimension all its own because we're not just talking about databases. We're talking about programming languages. We're talking about hardware. We're talking about co-location facilities, data centers. You know, a lot of that you know complexity and by the way you know complexity's probably not the right word. The right word is probably more diversity because it's not that this stuff is overly complex. It's just you know there's just too many to choose, you know we just have so many to choose from that it adds to the cost drivers. That's, so I wouldn't, I don't want to make it sound like it's overly complex because it's not. It's just overly variable I guess.
[00:19:00] You know I do like the word complexity though because I think some culturally some organizations aren't ready for the CIO to play offense with innovation. They're still leaning into marketing and sales and such and so I often say to the CIO that they can be very very successful with their lens into the defense areas or into supporting offense and driving out complexity because like you said it adds that undue burden, but I like your point about being able to reinvest that into innovation and that kind of leads me to my next question because I know you have a very robust innovation lab at Experian and when I was talking to Eric Hallar a couple months ago he mentioned that he sort of has, he sort of meets with different business leaders and I never asked him about how you interact with the innovation lab. Maybe you could take a few minutes just to explain how that works within your, for you and within the organization's innovation lab.
[00:19:30] Yeah. I'm so glad you brought that up because Eric and I are super tight. I mean Eric's one of my closest friends inside the company and so I'm down in San Diego on a regular basis and I invite Eric. I almost view Eric and his team as an extension of my team. So for example I'm going up to Microsoft for a briefing next month and the first person I reached out to was Eric to say hey I'm going up to Microsoft. Do you want to, you know is there somebody from your team that you want to send with my team you know when I go up with them or do you want to come and same thing, I mean Eric and I you know have made joint calls at Cisco and Oracle and I mean we have a very close relationship and my team works very closely with his team. So my organization plays sort of two roles in conjunction with Eric's team.
[00:20:30] So you know what Eric's team is, Eric's team is kind of like the incubator in a think tank on behalf of the, on behalf of Experian and by the way Eric has teams that are geographically dispersed around the world. He's got, you know his biggest organization was in San Diego but he also has a team down in Brazil and he has a team in the U.K. as well all of whom do, provide a very similar function which is to work very very closely with our largest customers to sort of understand the technology that they're looking for what problems they're trying to solve and Eric and his collection of really smart PHDs sort of look at ways of applying technology like block chain or sort of using cellular phone data to help with fraud detection and you know a whole bunch of really cool sort of incubated ... Yeah.
[00:21:30] So what my team does is a couple things. One you know if Eric's having any kind of an issue inside the company, getting the technology that he needs or the support he needs, I'm the first guy he reaches out to. I mean I talked to Eric actually over the weekend because off the record just between us apparently some of my guys removed administrator access from a couple of his guys and that was a real problem. It turns out that it just, it was a, it wasn't intentional. We had, it had timed out and so we just needed to re-enable them but we provide them with their sandboxes, their hardware environments. We support them in terms of anything they need from an infrastructure perspective and we also work collaboratively with them to try to determine certain standards. So for example when we needed to pick a hadoop platform the first, you know one of the first people I reached out to was Eric to sort of say hey which, you know which of the hadoop distributions have you guys worked with?
[00:22:00] Do you have a particular one that you're you know that you like better than the others so that before we start to drive a standard we make sure that we're you know working with your team to not upset the alpa card. So it's a very very collaborative and by the way my chief enterprise architect also spends a lot of time in San Diego working with Eric and his team. I mean it's we're really you know my team is pretty much an extension of his and his is pretty much an extension of mine. I would say that as far as organization, and by the way Eric and I report to the same guy. We both report in to the chief operating officer.
So we're under the same umbrella as well. So it's a you know it's a really good relationship and we work on a lot of stuff together inside the organization.
[00:23:00] So when you guys are looking at ways, so he's, is he essentially floating amongst the business departments to look at ways to the customers are looking to consume information and looking at speed of the two major points you brought up earlier and then he's taking those back and then your, are you actually trying to figure out ways to kind of integrate what their findings are so it can scale across the whole organization? Is that a correct assumption?
[00:24:00] Yeah. Most of, a lot of what Eric's team focuses on is analytics and sort of looking at ways to solve complex math problems or technical or decisioning problems. So Eric's team tends to focus less on sort of like, like my team you know my organization was the one that said hey look we need to create an API hub for the enterprise so that we have a better way of sharing information both internally and externally. That's not something that Eric's team would do. On the other hand Eric's team came up with this really cool thing that we call mobile prequalification that he probably talked to you about. You know my team wouldn't come up with that. His, you know we provide, we help facilitate it by providing the environment that he needs to run it and to make sure that the network, our network is configured to allow them to operate that way but that's sort of the idea generation for that product came out of Eric's organization. Not out of mine.
[00:24:30] Okay. Okay. Excellent and so that leads me to the API piece. So I'm sure you've read the book Exponential Organizations by Salim and if you haven't and serendipitously it was interesting because one of the sections about the CIO is the use of APIs moving forward and specifically for the reason you mentioned which is the enabler to data access and that, so how did you come up with this idea of the API hub and how does it frame your thinking now moving forward with either how your organization consumes from others or how you're providing that to your customers?
[00:28:00] Okay. You asked a really good question about the whole API component. So let me give you the background sort of how that came to be because it's kind of a interesting story. So when I joined Experian two years ago one of the first things I noticed was you know we have enormous amounts of information that we either subscribe to or we get from the financial institutions but one way or another we, we are constantly getting, adding new data sources and adding to the data sources we have and well the data is all pretty much owned by Experian. We have multiple lines of business inside the company and as a result of our growth through acquisition we have a number, you know these data sources may reside or may get loaded into Oracle or DB2 or SQL server, any number of different data back end platforms and then there are, there's quite a diversity of data schemas in terms of how the data's stored.
[00:29:00] The issue with that was that if, you're in one part of Experian and you want access to a certain data source you could, you know we can give you access but the problem was the data schema, the complexity of how the data is stored made it very difficult for people to share information internally and so and the other issue was that as we started to consolidate these data sources onto a common set of platforms you ran the risk of breaking a whole bunch of interfaces and so the first idea was we're going to create an API hub that all of the lines of business can leverage to register entry points so that people can access their information internally, so that I'm in the credit services organization and somebody in the decision analytics organization wants to access my information I'm going to give them a bunch of API methods, entry points and microservices to get at that data so that I don't have to be engineers to help them write their code.
[00:30:30] Oh and by the way if I decide ultimately that I'm going to change from Oracle or DB2 or SQL server to hadoop or some other backend platform their code won't break because if they use an API hub to gain access to it and I change out the backend it doesn't change the API. It only changes the you know where the hub the data's stored and as long as we don't deprecate those API calls everything will be great. So the idea was to set up an environment that would allow to help accelerate innovation inside of Experian but by providing a set of microservices and API methods for sharing data internally. When and that was received you know very well. Everybody sort of agreed yeah this is something that would be really helpful to have. Then as we started to talk about it more and more I started, we started to hear not only was this something that would be useful internally but we started to hear that our customers would be very interested to having access to the information themselves that way as opposed to programmatically.
[00:31:00] They want to write their own applications and their own programs and they may only care about the specific data elements. So if we gave them an API entry point for doing that they wouldn't you know it would give them another way of accessing the information the way they want to instead of the way we want to dictate it to them. So there was actually two use cases that were originally identified for the API hub that we stood up but the original driver was to help drive innovation internally and then a secondary output was that you know customers we started to hear from some of the largest financial institutions that they were really interested in accessing the information through microservices as opposed to through an application portfolio.
So microservices allow you to not necessarily need to have a fleet of engineers trying recode, or coders trying to recode these changes but they can subscribe to the service they want and so you were trying to eliminate friction within cross departments needing access to this? Is that correct?
[00:32:30] Absolutely. Yeah. Your, that's exactly right. Right now the way a lot of people build applications is like totally different from, you know when I went to college you know you learn FORTRAN or C++ or PL1 or whatever the language was Dejor, and you know you had to write all of these services internally yourselves. I mean writing you now know you couldn't build a distributed application unless you were a PHD in computer science and you certainly weren't going to have a set of you know, the first inclination of these types of services was things like DCOM and Publish and Subscribe and CORBA, all the old sort of 1980's 1990's distributed computed models that were the precursor to APIs and microservices. The problem was that a lot of that stuff really struggled to get traction because it was so difficult to use. If you fast forward to where we are now these services now are very you know we have the internet which can be used as a connection mechanism over a secure socket layer.
[00:33:30] You don't you know, people are learning how to write these kinds of programs right out of school. Today I would say and I don't mean this in a negative way at all but today a software developer in many cases their job is to assemble the pieces and put them together. It's not necessarily to write code the same way and the more microservices and the more out of the box capabilities that you give to them that they can connect to or use the less code they have to write and so there is sort of this big movement towards and that's a big part of this whole push around things like platform as a service whether it's you know the AWS platform or the Azure platform or the Google platform. I mean there's underlying technology that runs in all of these platform is a service environments but the real objective is to make people more productive more quickly so that they're not having to write as much code. They're more sort of assembling Lego blocks as opposed to building the Lego blocks themselves.
[00:34:30] Yeah. I love that analogy about Lego blocks and it was I think you're, I mean you're right on. I was just with a CIO the other day and they were subscribing to APIs. They're putting an instance of SQL in the cloud in Microsoft's platform as a service and they want to subscribe to data coming from NIH because that data is needed for their customers and I love the way he was thinking about it and it's completely to develop a new revenue stream for that customer that needs data from NIH couples with theirs that this as an association provides and it's really combining point one point A and point B from two different sources. So I love how this Lego block mentality that you have because I do believe that is a real nice way for the CIO to add tremendous value because you said you were going to go to Microsoft, right, and you said you're going to be going there to kind of get an overview of their new capabilities? Is that the way what I heard earlier?
[00:35:00] Yeah. We're doing, it's just sort of, I mean we typically do sort of the you know our year is that we're on a March fiscal year. So at the beginning of each fiscal year we tend to go the meet with our largest technology partners just to understand sort of what their road map looks like. So we've got meetings with Microsoft to go over their roadmap for the next couple of years to make sure we understand how it's going to sort of interface with our roadmap.
[00:35:30] So if a CIO wanted to build microservices this capability this API development capability within their organization and they didn't necessarily have the full resources of Experian at their disposal what would be a good question that you could, that they could ask regarding their team that's number one, to see to find out what the skill gaps are that they would need and then what would be a good question that you could ask either for AWS or Dejor to really start the process of building that capability within their organization?
[00:36:30] Well I think the first thing you need to ask yourself in any corporation is do you have, you know do you have people that thing this way or sort of understand the need to build component ties a technology stack. In other words you know I'll give, the simplest example that I give people from microservice is the spell checking. You know, ten years ago if you wanted a spell, If you were building an application and it needed a spellchecker what did it do? You wrote a spell checker or you embedded a spell checker into your application as a piece of code. Today I can't help but think that nobody would ever want to build a spellchecker. You would want a basically, I mean the only thing that a spellchecker needs is you submit a word to it and it can only return, it returns either it's spelled correctly or it's spelled incorrectly and if it's spelled incorrectly it may give you a list of suggested words that you can replace it with.
[00:37:30] That's all a spellchecker does. That the perfect, that's, it's a perfect example of a very simple microservice that somebody could write. You pass it one thing and it returns a yes or no and in an array of suggestions in the event that the result was negative. That, now the, but the question sort of that I think any organization needs to ask itself is does, you know if you were building an application would you use microservices to achieve that result or would you write your own piece of code and if the organization comes back and says oh we'd write our own piece of code every single time then you don't have people that are sort of thinking with the right mentality for building a distributed application or building out a set of services. So I think the first thing you need to do is sort of access your organization and say you know see does it have the right thought process in place and the right skill set to do this kind of, to build things this way?
[00:38:30] So I think that's step one. Step two is sort of identifying you know you really need to, you do need to make some choices and I think that the question so for example we've selected Red Hat's OpenShift platform as our standard development stack for building applications on any platform. So it doesn't matter whether you're building in an AWS, in Azure, the Google Cloud, on prim, in co-location facility, you have to use containers and you have to use OpenShift as your platform because what that does is it gives us complete portability of the applications that we build so that we can run them anywhere we want whenever we want but as a, you know as somebody, now we picked Red Hat's OpenShift because it met most of our requirements but there are numerous other platforms that you could choose to do the same thing.
[00:40:00] I think that if you determine that you have an organization that's capable of doing this you need to pick the platform that you're going to standardize on as an organization in order to drive this type of process going forward. So whether it's Pivotal Labs, whether it's Red Hat, whether it's Mirantis, I mean they all have ppen stack implementations. You need to identify what your open stack implementation is going to be or what your platform's going to be so that you're not, you don't have you know five different parts of an organization all going off in directions. I mean they all may have the best of intentions and trying to do the right thing but I have a very big, having worked at very large companies and having run several software companies myself I'm pretty to me standards is a really big deal because it's, without standards you know complexity starts you know you'll end up with a lot of variation in how things are done which often reduces efficiency and drives cost up. So you know the two important things are capabilities and then picking the technology stack that you're going to execute with.
[00:40:30] Well we came, we sort of circled back around to complexity again and I know you didn't like the word originally but coming back to standards and making a choice in selection about the standard and, like you were saying earlier you're executing on this microservices vision on this API vision based on clearly the set of capabilities that you've put in place plus the set of tools and standards you've settled on. So when you're going out to Microsoft you're not asking them, you're saying this is what we've picked as a set of tools, now how do these tools work on your platform of the service for example versus going out with the reverse conversation?
[00:41:30] Yeah. I think that's a maturity question. I think that's, it's a good observation and a good point. I think it speaks to sort where you're at in the maturity curve of going forward. I'm sure that, by the way we did do the other previously. I mean I, we didn't, you know I wouldn't be arrogant enough to think that we do what the best platform was without doing any due diligence or research. So you know before we picked for example OpenShift you know we looked at every other, you know we looked at a lot of other options and considered them and we sort of decided that OpenShift was the best open stack platform for us but one of the things, and we've been very very clear with Amazon and with Microsoft that you know we are not going to be using native platform services. We're going to be using OpenShift on your platform because we want portability.
[00:42:30] We don't want lock, we don't want to end up locked in by using native services and they've now heard that from so many customers that they support all of the common suite of tools on their platform. So you can get Kubernetes, you can get [inaudible 00:41:57] containers. You can get any version of OpenShift that you would like and it will run on virtually every one of these major cloud provider's platforms because enough customers like us sort of said hey, we love what you're doing but we don't want to get locked in to a particular platform. So for example we don't want our software developers using DynaDB on the Amazon platform because DynaDB is native to AWS and while it has a whole bunch of great capabilities and it's really easy to use and it's really fast the second you committee to using DynaDB you lose the portability and you can't, you wouldn't be able to move something for example to Azure if it had DynaDB code embedded in it.
[00:43:30] So instead we basically have said you've got to use something like Cassandra or Postgres or MySQL or one of the more portable container, you know [inaudible 00:42:53] into a volume that's not a native service but that is portable. So yeah when we go, when we talk to Microsoft now or when we talk to Amazon or when we talk to Google it's more about tell us about the tools that are, that you have on the platform. Tell us about what you're building this platform across all the other cloud platforms. You know, what, where are you, you know where are you headed from a disaster recovery and business continuity perspective, how, what can we expect from a reliability standpoint? I mean we, in our business we obviously are looking a minimum of four 9's, preferably five 9's of uptime guarantee. You know, those kinds of things. Those are more of the types of conversations then, hey tell about your, you know tell us what are the differences between Azure and Amazon.
[00:44:00] Do you ultimately have the vision of being able to move between these different cloud environments with this containerized approach, like is it unreal or is it too big of a jump to say that you would want to be able to move a workload from like Azure to AWS in the future or is that too big of a leap?
Barry: No. That is not only aspirational. It is a requirement.
[00:44:30] We are incredibly prescriptive about the tools and the technology and the way applications are built so that it's a build anywhere, deploy anywhere type of model so that not only do we, we're getting the developers to focus on building what I would call truly native based cloud applications. So not only should they be able to be run on and moved from Amazon to Azure or visa-versa, we should be able to with a click of a button move them from Amazon to our own data center, from our own data center to Azure or as we need incremental capacity have certain components that can be run in the cloud as well as on prim.
[00:46:00] So we may actually, in some cases we have one application right now that the lion's share of processing actually occurs in the cloud but a big chunk of the application is actually still running on prem and the reason we built it that way is because it's got a lot of seasonality to it and we didn't want to have, if we had to invest in all of the hardware stack that was necessary to run it during peak 90% of the time that hardware would be sitting around and be idle or not necessarily consumed or we would have to put another workload on it whereas if we built it as a hybrid application where some of it's running in the cloud and some of it's running on prim as we need incremental capacity it can auto scale in the cloud so that if all of a sudden it's Christmas time and the utilization goes up in order of magnitude the cloud provider will automatically burst the capacity to meet our demand without us having to do anything whereas if it's running in my, if that chunk of it's running in my data center or our data center all of a sudden I get a phone call in the middle of the night saying we need to spend a million dollars to buy a bunch of additional blades to support the fraud application that's running McKenny because it's about to hit its limitation. Those are not phone calls we like getting. So you know this hybrid cloud development gives us a lot of bursting capacity that we didn't previously have.
[00:46:30] Well I love this conversation because it's essentially I feel that it's kind of the tip of the spear from a lot of conversations that a lot of people listening is you know what's possible and what are the guys that are, kind of the biggest problems having to face right now and I imagine with having that portability between clouds is not just the marketing pitch but something that you're going to, you're really forcing the vendors to make real by your requests and are you also requiring these workloads to stay in the U.S. or stay in North America? Is that something that falls under you?
Yeah. It varies. So we operate around the world and every country has different data residency laws. So in some case, so for example U.S. Data all reside in the U.S. They're not prescriptive about whether it runs in our data center or somebody else's data center but it does have to reside in the U.S. Other countries are not as restrictive about data residency. So for example India currently does not have a data residency law. So we can run our India bureau out of the United Kingdom.
[00:48:00] Now those things, the challenge for us is those are subject to change which is another reason why application portability is so critical because if we build out an applications that servicing a certain geography and it's running in one part of the world and all of a sudden a legislative law or a regulatory requirement comes forward that says hey that data all has to reside in Columbia or in Argentina or and it's currently not there. You can't it can't take you know months and months to move it and it can't cost millions and millions of dollars. So this model of using containers and having portable hybrid applications gives us the ability to not have to worry about data residency laws that potentially change on a regular basis.
[00:49:00] I love that. Well I want to respect the time. I think we're coming up close to the hour that we had scheduled together Barry and I. I really appreciate you for your time and your wisdom you're sharing with all of the people that are going to be hearing this episode and just one final question for you is and this, taking a shot in the dark here but I think it would be, you're going to give us an interesting answer is so you worked with Oracle when they were only a 19 million dollar company and I'd love to know what the most, what the best lesson that you've learned from your time with Oracle or for that matter if you've met Larry Ellison what you've learned from him and then and also like what else has been sort of the mantra that you have, has stayed with you through you career either through mentors or such that you can share with the audience as we wrap up?
[00:50:00] Yeah. I mean I do know Larry and did, have been fortunate over the last 30 plus years to get to interface with him and have also been very close with Oracle in virtually every one of my jobs either both in terms of their application stack as well as technical stake and have quite a few friends there still. Larry has and always will be one of the most brilliant people I think I've ever been fortunate enough to get to meet. The truth is it's very difficult to embellish a Larry Ellison story because there are so many of them and a lot of them there's always, there's quite a bit of truth to many of them but Larry was has and always been one of the greatest technology visionaries I, you know I've ever known.
[00:51:00] The thing, one of the most key takeaways for me from the early days you know back in the '80's at Oracle is Larry is one of the most fierce competitors I, probably is the most fierce competitor I've ever met in my life and when, you know there was, when Oracle was a small company there were quite a few database companies that were still you know in play. You had you know Ingres and Informix and Sybase and it was fascinating to sort of watch Larry's approach, systematic approach to competing and systematically taking out the competition sort of one by one with just an unbelievably relentless focus on the task at hand and you know I learned a great deal from that kind of you know perseverance and that single focus that I think has been useful to me throughout my career. You know, failure was never an option when you were at Oracle and it was a brutal culture but a tremendous learning experience.
[00:51:30] Tremendous number of brilliant technology people but you know that single focus of the company, the company's ability to sort of bring everybody together moving in one direction simultaneously was extraordinarily effective in terms of allowing the company to grow and become what I believe it's become today which is you know one of the largest technology companies in the world and you know the people that are you know the people that are most responsible for that in my mind are Larry and Sassa. You know two people I have an enormous amount of respect for.
Well I appreciate that and as we get wrapped up is there anything about that you wanted to let people know as far as how to reach you or anything in particular? Any ways that people can reach out if they have follow up questions for or clarifications of something you said?
Barry: Yeah. The best approach, I mean I'm on Linkedin. There's only one Barry Levinson on Linkedin to the best of my knowledge.
[00:52:30] It's and you know I do check my, I do you know check for activity almost on a daily basis. Happy to interact or you know exchange information with anybody you know through Linkedin that wants to you know keep the dialogue going.
[00:53:00] Well that's great and I'm going to put links to, I know you've written an API piece recently. I'm going to put links to that on the show notes, things to connect with you on Linkedin. Also more information about Experian, Experian's data labs, etc but I do appreciate you to your commitment to sharing your wisdom which is completely you know very very deep well of knowledge that goes you know back to the beginning of prior the real internet starting in '95. So it's quite a bit for people to learn from this today. I know I learned quite a bit as well and thank you for your time.
Barry: No, I appreciate it and I'm going to try not to feel old now.
[00:53:30] Well I think we need wisdom in these days as things get fast we definitely need people that have been there through it all because that is more wisdom than anything else needed at this point in time. So thank you.
Barry: Appreciate it. Great. Okay.
This entry was posted in Blog, podcast and tagged Big Data, Bill Murphy, CIO, creativity, data, Exponential Technologies, innovation, IT, leadership, RedZone, Redzone Podcast, RedZone Technologies, risk, security, Tech Experts, technology on July 7, 2017 by Bill Murphy. | 2019-04-25T18:48:08 | http://www.redzonetech.net/blog/barry-libenson-cio/ |
0.999947 | "I felt if I wasn't going to be captain I would have to be stripped of it - I felt if I got a sniff and some momentum I would be able to do something different."
Jason Holder admits his over-rate ban for the third Test is 'very frustrating' but has refused to criticise the umpires.
Jason Holder told Sky Sports Cricket that Windies have "surprised" England during their Test series win in the Caribbean - and how he is now intent on taking his side top of the Test rankings.
Holder has captained Windies into an unassailable 2-0 lead in the series but will miss the final match in St Lucia, live on Sky Sports Cricket from Saturday, due to an over-rate offence, a decision the 27-year-old - who will be replaced as skipper by Kraigg Brathwaite - admits is "frustrating".
The Barbadian's side batted for 131 overs in their first innings on a spicy Antigua pitch in the second Test - Darren Bravo digging in for 50 from 216 balls - with England lasting a combined 103.1 in both as they tumbled to a 10-wicket defeat, a week after going down by 381 runs in Barbados.
Holder feels that with battling batsmen, a "fiery" pace attack and a young squad that there is no reason Windies cannot surge up the rankings from their current position of eighth.
Michael Atherton describes Holder's ban for an over-rate offence as 'ridiculous', but Nasser Hussain understands why the ICC has enforced it.
"I think the entire England side has been a bit surprised, more so with the consistency we have played with," Holder told Sky Sports' Michael Atherton ahead of the third Test in Gros Islet.
"Before we succumbed to pressure - you felt that if you bogged down the West Indies team as a batting unit, you may be able to get under their skin and get wickets, so what we have spoken about a lot is not having wickets fall in clusters.
"A tactic I probably picked up from Joe [Root] was that he had long spells with Jimmy [James Anderson] and Stokesy [Ben Stokes] when they probably felt that if they picked up one, they could get two or three quickly.
"[The fact that didn't happen] was a turning point and hopefully this victory - clinching a series against a side ranked higher than us - can be a turning point for this young team's career.
"I feel we can go to the very top - if you look at the ages of the guys in this team, we are very young and if we can continue in this vein over the next two or three years I don't see why we can't be No 1.
"It will take a lot of hard work and we need to be honest about where we are and where we need to be. If we plot a clear path as a unit and individuals, nothing is stopping us from being the No 1 in the world.
"We are trying to get fiery fast bowlers back into West Indies cricket.
"Shannon Gabriel has been around for a while but it's good to see Alzarri Joseph coming through and we have Oshane Thomas on the sidelines waiting for his opportunity. I also see one or two others in the region who can potentially get into the Test side."
Joe Root was dismissed by a brutal delivery from Alzarri Joseph in Antigua.
Holder's side suffered heavy Test series defeats in India and Bangladesh before Christmas - the latter without the skipper due to a shoulder injury - and had won only two of their previous 15 Test series before knocking off Root's England this winter.
But the all-rounder says he has never considered "throwing in the towel" and quitting as captain as he always felt he was the right man to lift Windies out of the doldrums.
"I knew it was going to be difficult - maybe not this difficult - and that there would be some pushback from fans and people around West Indies cricket," Holder added, reflecting on becoming captain at the age of 23.
"But I knew I had what it takes to lead as I have been leading sides for as far back as I can remember. I led plenty of Barbados sides in youth cricket, had the opportunity to captain the West Indies U19 team in spurts - I have always been seen in a leadership role.
"Honestly, I didn't expect to captain Windies at 23 years of age and I have had some really tough days but I have just tried to be as positive as I can and draw on people close to me for guidance. Team-mates have also helped me out a lot.
"When I first took up the captaincy I felt as though I was getting distracted by stuff off the field and tried so hard to get the players in their comfort zone and keep them happy.
"I probably lost sight of my actual role in the team and felt my performances were a bit stagnant.
Jason Holder says Windies legends, including Clive Lloyd and Desmond Haynes, inspire him to 'build a legacy' during his time as captain.
"I got to a point where I said to the lads: 'Look, we have all signed contracts to play for West Indies so that means we are committed to playing for West Indies and might as well get on with it and play cricket'. From then, I started focusing a lot more on my cricket and trying to lead by example.
Windies' player pool would be deeper if Holder's fellow Barbadian all-rounders, Chris Jordan and Jofra Archer, were available - Jordan has played 74 games across all formats for England, while Archer is on the verge of qualifying for his adopted country ahead of the World Cup.
Holder hopes Windies' upturn as a Test nation can help end the talent drain from the Caribbean.
I’d say it was probably one of the best moments of being captain so far, more so to see where we have come from, remembering the hard times and being able to overcome them.
"It's a bit disappointing knowing these guys who have grown up with you and who can have a serious impact on West Indies cricket have gone to English cricket," he added.
"But I can't fault people for their personal decisions. Everyone has to make a decision based on their personality and what they want. I respect them and still love them the same way.
"People like Jofra and Chris are exceptional cricketers - I have had little conversations with Jofra but it seems like his mind is pretty clear.
"I feel a bit sorry for Chris who burst on the county scene but is now not playing a lot for England. I could definitely see him fitting into the West Indies set-up.
"Hopefully the West Indies Cricket Board can find ways to keep players in our system.
The ECB's new managing director Ashley Giles describes Jofra Archer as an 'exciting cricketer' who could challenge for a place in England's World Cup squad.
"I think we would all agree the English system is a little more settled and you have a lot more security within it but I think lots of young players look for the easy way out.
"I think the West Indies system has improved leaps and bounds - there is a long way to go but hopefully with us doing a bit better in terms of our performances we can bring more respectability back to West Indies cricket and bring sponsors to inject some capital in." | 2019-04-22T16:01:34 | https://www.skysports.com/cricket/news/12174/11631438/jason-holder-says-england-surprised-by-windies-wants-to-take-his-side-top-of-test-rankings |
0.998816 | I'm an Electrical Engineer of 20+ years and just discovered the Arduino platform a few months ago. Needless to say I fell in love with it and am now hooked on projects. For Christmas this year, I wanted to make some very heart-felt, one-of-a-kind gifts for my parents. For my Mother, it was definately a 'one-of' clock design. I was not concerned with keeping up with daylight savings time or leap years - simply accurately keep the day of week and time.
How to generate the clock pulses in a unique but accurate manner though? Sure I could use a fancy embedded clock IC or the common 32,768 crystal oscillator, but I wanted something different than the rest. I started using a 555 timer to output a steady 100Hz square wave. This worked pretty well but I was losing about 1 second per hour. No problem - I just wrote an algorithm to correct the missing second in software. I was happy. Then I discovered that although the Arduino's internal timer was not totally reliable for time keeping, the analog PWM outputs did have a very steady square wave of 490Hz. The duty cycle is determined by the value written to the analog pin. (i.e. - 0 is zero volts, 127 is a 50% duty cycle, 255 is a logic high/5V).
I decided to try the PWM analog output wired directly to the interrupt pin 2 and it worked great! Plus, it kept up perfectly with my computer's real time clock to the second without need for software compensation. I've been running it for days now and it continues to perform just as I had hoped....all with one wire and some code.
The finished gift will have Eagle CAD custom PCB's for the power supply and logic, housed in a plexiglass enclosure. The entire theme is ice blue LED lighting to simulate an analog clock. While the enclosure has a white on blue LCD displaying the day, time, and room temperature, a serial cable connects from the project box to the actual clock. Using a 12 bit decade counter, a servo, and lots of blue LED's I am lighting the appropriate hour segments on a custom-designed analog clock face printed on plexiglass. The servo is mounted in the center of the clock face and has an armature attached with an LED mounted to light up the minutes behind the glass. (each minute the servo turns 6 degrees, lighting up the appropriate minute). I hope to have it finished soon and will make a video of the final product....I hope she loves it !!
Simple Arduino wiring diagram and demo code to make your own clock using this method. Also a link to Circuit Lab demonstrating how to use the 555 timer @ 100Hz method if you so choose.
I tried to use this clock with a project I'm working on. The only differance I really noticed was that I'm running an UNO and that I'm running at 9600 baud. I'm very new at this so I may have done something else wrong that I don't even realize but anyway the end result is that my clock gains about 17 seconds every hour. Any suggestions? I'm working on getting my code transfered to this PC so I can post it but in the mean time was wondering if my baud rate would have any effect.
OK, some differences were found that I forgot to mention (my fault) between different arduino boards. I have only tried this with success with the mega2560 and the ATMega328-based Nano v3.0.
On the mega2560, which is the board that I developed my uber clock upon, a few of the first analog pins DO have PWM output ability. For that board, my interrupt routine was counting only the RISING clock signals @ 490hz. When I ported the code to the nano, I realized that it did not have the same PWM on analog 0 as the mega did. So I kept the same interrupt pin (D2, int 0) and moved the masterClock pulses to D3 on the nano.
Then another issue appeared. When counting RISING clock edges @ 490hz on the nano, my clock was almost double speed! So I changed the interrupt to look for CHANGE in clock signal instead of RISING and changed the frequency (number of clock CHANGES) to 979, or 0 thru 979 which = 980. I had to change the frequency not because the PWM signal was 980hz on the nano, but because I was now counting any CHANGE in PWM signal. So either a low to high OR a high to low clock edge would invoke the interrupt. WHY this worked I still am puzzled about.
Your serial port baud rate should not affect the clock at all btw.
Here's some example code (just the basics) of what I did differently when using the nano. The same might apply to your UNO board.
This got the nano keeping EXACT time with my PC's real time clock, which is very hard to believe, but I have the results to prove it !
Here is another thing to try IF you have an oscilloscope (don't have mine yet). Perfrom the same analogWrite(pin, 127) on any PWM pin and note the frequency. It SHOULD be 490hz on all boards but I could be wrong. So, say the UNO's PWM freq is a bit different ... then you would need to adjust your clock pulse counts to match.
I'll be adding a guide in the next day or two on getting results with the infamouse JY-MCU cheap bluetooth breakout board. I finally have code for the radio that is reliable, allows for board programming with AT commands, and also provides 2-way communication.
I'm trying to create the same results u have to make the led blink, in this case switch a relay on and off to the timing to the second.
So far It just stays on.
Ahan ahan just use the internal interrupt based on a timer to accomplish the same, and I am not an electrical engineer but mechanical... This intractable should be deleted.
I don't really see the point of this. The PWM is directly divided out of the main system clock. You can just program the interrupt registers to do the exact same thing without having to touch hardware.
I discovered that my Arduino nano is actually producing 490.03Hz. So that means that every 2592 seconds, I need to skip 1 second to keep the clock accurate. Still, not bad at all for not using an RTC.
This means that if the main CPU clock drifts (which as sadly we all know it does), then the exact timing of the PWM timers will drift proportionately. This would explain why some people are seeing different exact speeds of their PWM output: it's no more frequency-controlled than the main CPU speed, and people are having to make small adjustments and compensations for their particular device and environment.
So basically my question is this: do you have a link for any documentation showing where the timebase of the ATmega PWM timers comes from, whether divided from CPU clock or otherwise? Thanks! I'm very interested in how we can improve the stability and accuracy of Arduino clocks, and this is a clever idea to pursue!
Don't you lose time as soon as you power it off?
I'm also a 20+yr Electrical & Embedded Software Engineer who loves Arduino, and I'm working on using one for a simple project at work. I needed a reasonably accurate periodic interrupt timer, so I did something similar to what you did, but instead of using PWM output command (which only works on certain pins and at a fixed rate), I used the tone() command on Digital pin 4 and wired it to Digital pin 3.
I use attachInterrupt() for interrupt#1 (on pin#3). The tone() command can be of whatever frequency that I need - there's no need to be locked into the 490Hz interrupts. Note that the tone() command has a lower limit of about 31 Hz on my board from what I've read. I've been using a tone() of 8000Hz successfully on an Arduino Uno board. I don't know what the upper limit is, but it will depend on how much code is in the interrupt service routine and the crystal.
Brian, has the tone command been keeping time properly for you since your post?
I may be a little late to the party, but my curiosity was stroked by the mechanical side of your project. I am very intreged by your armature with the LED. Could you explain how you went about that? Also I thought servos were not accurate enough for something like a clock. I mean accuracy as far as being off a fraction of a degree after so many movements. Seems like you would have to have some method of checking it's position to ensure accuracy?
The servo I used only turns 180 degrees. The servo's 'data' line does communicate back to the arduino to report it's position in degrees. One minute on the clock equated to 6 degrees on the servo. The armature attached to the servo has 2 LED's, one at each end. This allow me to use the servo as a 360 degree minute hand on the clock.
When the armature reaches 31 minues past the hour, it returns to it's zero degree start position and the other LED lights up. This allows the servo to again go through it's 0 - 180 degree cycle and thus the 'illusion' that the minute hand is now moving from 31 minutes to the top of the hour. Then the whole process repeats again.
For this project the servo position was amazingly accurate enough. If I had required smaller increments in movement, like 1 - 3 degrees then it would not have worked out so great. But the 6 degrees of movement every minute was accurate enough to land the LED on the correct minute marker on the face of the clock.
So to sum it up, as long as you have the armature well calibrated/adjusted when assembling it, the movement should remain accurate due to the servo's communication with the arduino. The finished clock is still keeping accurate time without the need for adjustments after over 6 months of continuous operation. | 2019-04-25T05:01:43 | https://www.instructables.com/id/Make-an-accurate-Arduino-clock-using-only-one-wire/ |
0.836069 | The monkey was presented with six different movie clips when sitting with the head fixed. No food reward was presented. While the monkey was performing the task, ECoG data and eye-tracking data were recorded simultaneously. There was no motion tracking. | 2019-04-21T18:33:58 | http://neurotycho.org/emotional-movie-task |
0.999983 | What is LeBron James' Contract?
Find out the details of LeBron's three-year, $100 million deal with the Cavs.
LeBron James could hit free agency this summer which would once again make him the most sought after player on the market.
As speculation swirls over James's decision to stay in Cleveland or find a new home, the Cavaliers found a way back in 2016 to keep him around for a few more years.
James currently has a three-year deal, which he signed in August 2016.
After leading the Cavs to their first title in franchise history that summer, the forward became an unrestricted free agent. However, he inked a three-year, $100 million deal to stay with the Cavaliers.
In the 2016-17 season, James earned a starting salary of $30.9 million, making him the highest-paid NBA player for the first time in his career. He took home $33.3 million for the 2017-18 season.
James has an option worth $35.6 million for next season. Whether or not he chooses to exercise that option or hit free agency remains unknown.
If he chooses to return to the Cavs in 2018, James will become an unrestricted free agent in 2019.
The Cleveland native spent the first seven years of his career with the Cavs before playing for the Heat from 2009-2014. Miami won back-to-back championships in 2012 and 2013 with James at the helm.
When James left Miami and returned to Cleveland in 2014, he signed a two-year contract with an option to opt out in 2015. James then exercised that opt out and signed a new two-year contract with an option to opt out in 2016 summer, which he exercised. | 2019-04-19T03:06:49 | https://www.si.com/nba/2018/lebron-james-contract-cleveland-cavaliers |
0.9914 | The familiar description of love found in Paul's letter to the church in Corinth is often read at weddings. However, in 1 Corinthians 13 we find no mention of a particular "other" whom we are to love. Neither is there any reference to an exclusive relationship. Instead, Paul's description of love stands firmly in the context of community life, meant to inform a follower of Jesus concerning their posture toward others in the faith community and beyond.
Let's take a look at three of the characteristics found here (verse 5): 1) love is not self-seeking, 2) love is not easily angered or provoked, and 3) love does not keep a record of wrongs. These are all stated negatively, a technique which helps us to recognize what is missing or distorted. However, negative descriptions have their limitations, because they fail to give us a means whereby we can imagine what something actually looks like. So, let us identify the positive side of each of these statements. Love is not self-seeking; instead, it seeks the good of others. Love is not easily provoked or angered, not irritable; instead, it is patient, kind, and gracious. Love does not keep an account of wrongs, is not resentful; instead, love is merciful and forgiving, moving toward justice and not punishment or revenge.
I would like to offer three examples of this three-part description of love: a love which seeks the good of others, which is not easily angered, which is not resentful.
ONE: The first is from the New Testament and it is the well-known story of the good Samaritan, or in more colloquial terms, the good "bad guy." You can read the story in Luke 10. In response to the question, "Who is my neighbor?" Jesus tells a story about a man who on a journey. He is attacked by thieves who rob him, beat him, and leave him bleeding and wounded by the side of the road. A priest whose job is to be a mediator between God and humanity, comes by, but when he sees the bloody body, he distances himself and keeps on walking. A Levite whose life is given to serving God in the holy temple, happens to walks by. He also avoids the wounded man and hurries on. Then a Samaritan, a "bad guy" by Jewish standards, happens on the scene. When he sees the beaten traveler, he stops and attends to his wounds, then takes him to an inn and cares for him. When he has to leave, he pays the innkeeper to continue caring for the man, promising to pay any further expenses the next time he comes through town. In this story, the "bad guy" is the one identified as the good neighbor, much to the chagrin of Jesus's Jewish listeners.
In this story, the Samaritan does not concern himself primarily with his own agenda. He is not obsessed with avoiding situations which might render him "unclean" or infringe on his own business plans. He puts aside his own interests and makes the good of another his priority. He is not irritated or angered by the inconvenience or cost of helping the unfortunate man. Neither does he keep a record of all that he will spend in the process. There is no mention of demanding repayment. There is only a supposed "bad guy," most likely considered an enemy by the very man he is helping, showing love to someone in need.
TWO: For the second example of love in action, I turn to a set of laws in Leviticus 19. Here, we come across a paraphrase of the Decalogue found in Exodus 20, commonly known as the ten commandments. The list in Exodus is concise and to the point (mostly prohibitions) but in Leviticus 19, some additional details are included. Both passages mention honouring ones father and mother, keeping the sabbath, not making idols to worship, and restricting sexual acts which take advantage of the vulnerable. But there is a lot more detail to some of the other directives.
Where Exodus says, "Do not murder," Leviticus 19 reads: "Do not harbor a deep hatred for any of your relatives. If your neighbor is doing something wrong, correct him or else you could be held responsible for his sin. Do not seek revenge or hold a grudge against any of your people. Instead, love your neighbor as you love yourself, for I am the Eternal One" (Lev. 19:17-18). Instead of a prohibition against murder, we find a command to love your neighbor, to seek the good of your neighbor, to avoid seeking revenge or keeping account of wrongs, to let anger and hatred go. Because this is how the Eternal One has acted toward his people.
In Exodus 20 we read, "Do not steal." Leviticus 19 says: "Do not mistreat your neighbor or steal from him. Do not keep the payment of a hired hand overnight, but compensate him for work at the end of the day" (Lev. 19:13). "When you harvest the crops of your land, do not gather the grain all the way to the edges of your fields or pick up what was overlooked during the first round of harvesting. Likewise do not strip the vines bare in your vineyard or gather the fallen grapes. Leave the fallen fruit and some grapes on the vine for the poor and strangers living among you; for I am the Eternal your God" (Lev. 19:9-10). In addition to a ban on stealing, there is a call to take care of ones employees, not withholding wages, thereby creating a scenario whereby it would be difficult for them to get daily food and supplies. There is also a call to generosity, to look out for the good of others who live among them, to resist the impulse to squeeze every last bit of value from their crops. Instead, they are to leave grapes on the vine and grain in the field so that others may glean it and not go hungry. Because the Eternal One acts generously toward his people.
In Exodus we read, "Do not give false witness against your neighbor." Leviticus adds a bit of nuance to this directive: "In a court of law, do what is just, not unjust. Do not favor one side or the other, the poor or the wealthy; instead, judge your neighbor fairly. Do not go around spreading malicious lies about other people. Do not take a stand that would endanger your neighbor's life. I am the Eternal One" (Lev. 19:15). Here, the motivations behind lying and favoritism are exposed. Again, one is not to look out for ones own interests alone, but seek the good of the other, making sure that words one speaks and the stance one takes on certain issues do not put someone in harm's way. For the Eternal One speaks truth and proclaims justice for all.
The final directive in Exodus 20 is against envy: "Do not covet your neighbor's things." Leviticus turns this prohibition inside out when it says, "You must treat the outsider as one of your native-born people - as a full citizen - and you are to love him in the same way you love yourself; for remember, you were once strangers living in Egypt. I am the Eternal One, your God" (Lev. 19:33-34). Hospitality is the opposite of envy. Instead of desiring what others have, a person is to make what they have available to others, even strangers. By doing this, they seek the good of others instead of focusing solely on their own interests. Hospitality to outsiders requires gracious kindness and a refusal to keep count of every little thing that is being given, never expecting repayment. Because this is the kind of hospitality given by the Eternal One to his people.
These words in Leviticus are a precursor to Jesus's re-framing of the law in Matthew 5. Speaking to the crowds, Jesus cites the familiar directive, 'do not murder," then proceeds to tell people that this means they are not to be angry or contemptuous against someone. Then Jesus interprets "do not commit adultery" to mean removing the lust in ones own heart. In both Leviticus and in Jesus's teaching, we notice that following God is much more than abiding by a list of prohibitions. God invites people to dwell with him because he loves them. In turn, people are invited to become lovers, of God and of their neighbor. Love is an orientation of the heart which seeks the good of the other, even when it is costly.
THREE: The third example of a love which seeks the good of others, is not easily provoked to anger, and does not seek to exact punishment or revenge comes from the Young Chippewayan Band, an indigenous group of people who were displaced over a century ago. In 1876, Chief Chippewayan signed onto Treaty 6 with the Canadian government. As a result, 77 square kilometers of land near Laird, Saskatchewan were designated to the Stoney Knoll (Young Chippewayan) Band. But dwindling buffalo herds and other factors beyond their control made it impossible to sustain life there. The band was forced to leave the land in search of food. Just 21 years later, the Canadian government gave the land to the Mennonites to settle.
Now, 120 years later, the Mennonite and Lutheran communities are working with the descendants of the Young Chippewayan Band toward a land claim settlement. Perhaps most importantly, the two groups (settlers and indigenous people) have developed an understanding of each others' plight. One Young Chippewayan said: "There is a trust, a mutual respect, an understanding. The understanding is: 'Look, we do have a grievance, but it is not to displace yourselves.' Why would a people that were displaced want to displace somebody else? That's not the case." The growing friendships between the Young Chippewayans and the people of Laird are characterized by hospitality, humility, listening, and seeking the good of the other. There is no anger, no quest for vengeance, only patience, gracious kindness, and a desire to move forward together in seeking to right a wrong. This, my friends, is what love looks like. | 2019-04-21T20:21:12 | https://formation.vineyard.ca/index.php?action=post;topic=422.0;num_replies=0 |
0.999999 | Signed binary two's complement number 1011 0101 converted to decimal system (base ten) signed integer = 75. How to convert a signed binary two's complement: 1011 0101(2) to an integer in decimal system (in base 10) 1. Is this a positive or a negative number? In a signed binary two's complement, first bit (the leftmost) indicates the sign, 1 = negative, 0 = positive. 1011 0101 is the binary representation of a negative integer, on 8 bits. 2. Get the binary representation in one's complement: * Run this step only if the number is negative * Subtract 1 from the binary initial number: 1011 0101 - 1 = 1011 0100 2. Get the binary representation of the positive (unsigned) number: * Run this step only if the number is negative * Flip all the bits in the signed binary one's complement representation (reverse the digits) - replace the bits set on 1 with 0s and the bits on 0 with 1s: !(1011 0100) = 0100 1011 3. Map the unsigned binary number's digits versus the corresponding powers of 2 that their place value represent: 27 0 26 1 25 0 24 0 23 1 22 0 21 1 20 1 4. Multiply each bit by its corresponding power of 2 and add all the terms up: 0100 1011(2) = (0 × 27 + 1 × 26 + 0 × 25 + 0 × 24 + 1 × 23 + 0 × 22 + 1 × 21 + 1 × 20)(10) = (0 + 64 + 0 + 0 + 8 + 0 + 2 + 1)(10) = (64 + 8 + 2 + 1)(10) = 75(10) 5. If needed, adjust the sign of the integer number by the first digit (leftmost) of the signed binary: 1011 0101(2) = -75(10) Conclusion: Number 1011 0101(2) converted from signed binary two's complement representation to an integer in decimal system (in base 10): 1011 0101(2) = -75(10) Spaces used to group numbers digits: for binary, by 4.
1011 0101 is the binary representation of a negative integer, on 8 bits. | 2019-04-20T18:56:15 | http://binary-system.base-conversion.ro/binary-two-complement-converted-to-signed-integer-in-decimal-system.php?binary_two_complement=10110101&signed_integer_number_base_ten=-75 |
0.998578 | Transliterated version of Gujarati below the Gujarati and English translated versions.
And take special care that it never will burn out.
Others can't hurt them, trusting God they don't have doubt. . . . .
The Lord is everything, He understands all things in all ways.
At His feet you offer now, all your love and your self with joy.
And this gift to Him never ever do default . . . . . . . . . . . . . . . . .
Happiness and sorrow are the gifts He bestows on us all.
Why should we fear a thing when God is Protector eternal?
The Master's candor and sincerity you'll have no doubt. . . . . . .
Beloved, my mind and intellect are dirty and impure.
Moreover, with this mind, this body is dirty for sure.
We must trust in God for our sins to wash out . . . . . . . . . . . . .
Everything eventually gets destroyed so why be unhappy?
And sometimes, everything will increase so why be so happy?
And with firmness never let it sway about . . . . . . . . . . . . . . .
Sukha ke duahkha de temaan taarun hida chhe, hati chhe taaro rakshaka pachhi shi bika chhe?
Saghalun gate-tale to ye duahkha shun?
sagalun rahe-vadhe to ye sukhashun? | 2019-04-18T14:25:26 | http://poweroflovetemple.org/ForeverKindletheFlame.html |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.