proba
float64 0.5
1
| text
stringlengths 16
182k
| timestamp
timestamp[s] | url
stringlengths 15
1.72k
|
---|---|---|---|
0.999997 | How can my wife and I invest individually but qualify for EB-5 as a family?
Is it possible for my wife and I to pay $250,000 individually and directly to a regional center to qualify for EB-5 as a family? The reason is that I am not able to transfer the full amount of $500,000 by myself since our country has an outward remittance limit of $250,000 per person, per year. Could the regional center consider the payment received from my wife toward my petition with me as the primary applicant for EB-5 and as her as co-applicant? Are there alternative ways to solve this issue?
It is best to aggregate before you invest, especially if you married in community. Then it is joint property and should qualify you both.
Both of you may not qualify as the principal EB-5 investor with a $250,000 investment. There can be only one EB-5 investor who invests $500,000 in a qualifying regional center project in the U.S. Your wife may gift $250,000 to you or vice versa. The second person who transfers money out the country does not need to be the investor, but you will need to comply with your country's funds transfer rules and properly trace funds. You should work with an EB-5 immigration attorney who will be able to properly structure the transactions and ensure your I-526 complies with USCIS requirements. Your wife and your children under age 21 (if any) can be part of your I-526 petition as derivatives.
If the $500,000 is in your name then you can be the principal applicant. You can transfer $250,000 of these funds and your wife can transfer $250,000 of those funds out of your country. You must follow all applicable laws concerning these transfers.
You could do it that way if structured properly.
Just because both you and your wife must wire separately does not mean you are both investors. There can be only one investor who will become part of the limited partnership in which you will invest. Your wife and children are all part of your investment and the immigration benefit under EB-5 as a derivative family.
The only way this would work is to have you give your wife $250,000 or she gives you $250,000 to be the principal EB-5 applicant/investor. The person transferring the money out of your country does not have to be the investor. An attorney can help you with the paperwork to make sure everything complies with USCIS requirements.
Yes, there are ways to resolve this issue. All investors from your country face this issue; your I-526 attorney will guide you.
A simpler option maybe for either of you to be the primary applicant and let it be known that the husband and wife share income/assets jointly (presuming that is true) and both transfers are part of the same petition. Alternatively, you may be able to file your I-526 with $250,000 and the remaining $250,000 as a promissory note (with the funding schedule detailed above). An experienced EB-5 attorney should be able to guide you through the process.
That should work. Set up an account here or at the regional center. The center should be able to tell you what it will accept.
Generally, a transfer by your wife as co-applicant is acceptable. Advisably, consult an EB-5 attorney for proper arrangement with the regional center.
You need to invest the full requisite minimum investment amount (i.e. $500,000 for TEA and $1 million for non-TEA) before you can file for the EB-5 petition. Either you or your spouse can be the investor and the other will be included in the green card process as a derivative beneficiary. No need to be a co-applicant. You will be included in the green card processing as the immediate family member and will both receive your green cards/lawful permanent residency.
Each EB-5 investor must qualify individually. If you wish to invest as a family, one spouse or the other must loan or gift the funds to the other spouse so that one spouse can make a minimum $500,000 investment. You say your concern is that your country has an outward remittance limit of $250,000 per person, but once those funds are transferred to the U.S., there is nothing that would prevent one spouse or the other from transferring their $250,000 to their spouse so that one spouse would be the principal EB-5 investor to file the petition on Form I-526. No, you cannot have a joint or co-applicant petition. | 2019-04-22T19:56:56 | https://www.eb5investors.com/qa/how-can-my-wife-and-i-each-invest-partially-and-qualify-for-eb-5-as-a-family |
0.999999 | Last summer I was finally able to fulfill a life-long dream of coming to live in Israel, by becoming a part of the Teach And Study Program [TASP].
Through TASP, a program of the City of Tel-Aviv-Yafo and the Los Angeles Jewish Federation, I have been teaching English half-time at an Israeli elementary school, as well as studying for a master's degree in applied linguistics.
I had worked in both Jewish and public schools.But still, I wasn't sure what to expect. In the U.S., there is usually a "honeymoon" period at the beginning of the school year, a period of students following the teacher's every instruction. Then, after about two weeks, the students begin to test the teacher. How would the students test me? How would Ireact? I knew my way around a classroom, or at least an American classroom. I was told that I would be co-teaching for awhile, to get acclimated, a good idea. In my life, I had met Jews from all over the world. Thus, I knew to accept that I would be walking into a classroom culture different to the one I had been used to. I was to teach in a traditionally Mizrachi neighborhood, mostly Iraqi, but also Moroccan, Persian and Yemenite. However, over the past five years many olim hadashim (new immigrants) from the former Soviet Union had moved into the neighborhood. There had been tension between old and new, in the beginning, with the schools not having been able to escape its effects. The situation became more relaxed over the years. Yet, after I was informed of my school's particular history, I was still impressed with the friendships Iwitnessed in the classroom, like the strong bond between fourth-graders like Boris, a new immigrant from Russia, and Lior, a local boy of Persian and Iraqi decent.
Whereas in the U.S., strong friendships are usually found in high school or in college, I found that in Israel, best friends often start off as best friends in first or second grade and last through and beyond service in the IDF [Israeli Defense Forces].
What I have seen take place in the classroom hasbeen highly reflective of the intimacy I see on the streets everyday, very high energy, sometimes very loud and tense, yet always with hearts of gold. In the U.S., children are taught to sit still, be quiet, and try to absorb their teacher's knowledge like a sponge.
Fortunately, the American classroom has been moving away from that approach.
In Israel, the classroom is highly dynamic. Students are often in and out of their seats, sometimes climbing on top of something, but all the while, their minds are moving just as quickly as their bodies, interacting with the teacher, with words and expressions, rarely missing a beat.
The emphasis of the Israeli classroom is to teach the students to think, and to think for themselves.
Teaching and learning are not confined to theclassroom. Teachers and students carry their close relationships intorecess and extracurricular activities, where thinking, and learning,and wondering about the world never cease.
This year, I was particularly affected by anon-going discussion with a fifth-grader of mine, Shlomo, from Russia.
Very interested in learning English, he oftens takes the opportunity to engage me in conversation. I must restrain my desire to take the same opportunity with him in Hebrew, as I remember my purpose.
As each Jewish holiday would approach, Shlomowould ask me if we had Sukkot [or Hanukkah, or Tu b'Shevat, etc.] in America. I would always respond with a smile, "Why, of course, we do," implying that Judaism was not just observed in Israel, the Jewish Homeland.
But when Shlomo approached me, to ask if therewas, in fact, Purim in America, I finally put two and two together.
After a not-so-brief, dumb-founded pause, my response was as follows: "Shlomo, do you remember Purim in Russia?"
I sat down so that it would be easier to look himin the eyes, and continued in Hebrew, "Shlomo, I know that it has been very difficult for Jews in Russia to study Torah, to celebrate the holidays, and sometimes, even to feel Jewish.
"But in the United States, England, Mexico, and Canada, and many other countries, it's much easier.
"That's one of the many reasons why it was important for you and your family to make aliyah." He just looked at me, and said in English, "Yes."
I have enjoyed the rewards of teaching for several years, but have been particularly touched by my Israeli students this year. They have learned from me, and I have learned from them.
From me, they have learned to connect to the rest of the world through the growing international language of English. From them, I have learned what it is like to come to a new country, my home.
This piece originally appeared in the Los Angeles Jewish Journal (June 16, 1998) under the title "Building Bridges Through Teaching," when I was invited to be a guest columnist for the "Federation Matters" weekly column. | 2019-04-20T10:49:17 | http://esseragaroth.blogspot.com/1998/06/ |
0.999999 | "Error","http-nio-8503-exec-9","02/14/19","10:30:04","","(class: cfq2ecfc1993741597$funcGETROLES, method: runFunction signature: (Lcoldfusion/runtime/LocalScope;Ljava/lang/Object;Lcoldfusion/runtime/CFPage;Lcoldfusion/runtime/ArgumentCollection;)Ljava/lang/Object;) Unable to pop operand off an empty stack The specific sequence of files included or processed is: C:\ColdFusion12\cfusion\wwwroot\cf2016\testing\Bugs\queryexecute\repro\q.cfm'' "
"Error","http-nio-8503-exec-7","02/14/19","10:30:04","","Could not initialize class cfq2ecfc1993741597 The specific sequence of files included or processed is: C:\ColdFusion12\cfusion\wwwroot\cf2016\testing\Bugs\queryexecute\repro\q.cfm, line: 1 "
Folks, the bug report says "see attached test case", but I am not finding that anywhere here. Is it that it was missed? or might the be referring to something internal (that we on the outside don't see)? It's important to see a test case of this problem, to understand where and how the bug can happen (because from other discussions in recent days, it seems to be a very specific circumstance, as opposed to ALL uses, that cause queryexecute to fail. If you may correct something about this, please do add a comment so we know when it's done. Thanks.
Also, as that other bug report shows, this is not quite as it was characterized in the title here, as "returning the result from a function in a CFC". That may be how the failed code was being used by whoever filed the bug (I see no indication of who that was), but as I show in cffiddle demo code in that other bug report, it definitely has nothing really to do with CFCs in paticular. | 2019-04-22T16:51:51 | https://www.cfaether.com/go/trackerissue.html?issueKey=CF-4204027&commentID=30547 |
0.999999 | question_answer1) What was the bone of contention between Nizam Ali, the ruler of Hyderabad and the English?
question_answer3) Whom did Sir Charles Napier replace as British resident of Sindh?
question_answer4) When was the East India Company brought under the parliamentary control?
question_answer5) The emergence of British power in India is from the battle of Buxar." Who made this statement?
question_answer7) From which year, did the British start striking Indian coins with the portrait of the British king?
question_answer8) Which building constructed in India by the British was known as White Town?
question_answer10) Who was the founder of the renowned Presidency College (Former Hindu College) of Calcutta?
question_answer11) The first all-Hindi newspaper 'Udanta Martanda' was published from Calcutta in the year 1826. Who was its editor?
question_answer12) Who waas the Nawab of Bengal when Diwani of Bengal, Bihar and Orissa was granted to East India Company?
question_answer13) Eden Gardens of Calcutta was built in 1840. It was named 'Eden' after the name of a sister of a Governor General of India. Who was the Governor General?
question_answer14) Who was the first President of Fort William?
question_answer15) The first Vernacular newspaper of India was published on May 31, 1818 by Carey and Marshman from Serampore. It was in Bengali language. What was its name?
question_answer16) Who was the Governor General who changed the official language of the courts of Justice from Persian to English?
question_answer17) Who was the Scholar who deciphered the ancient Brahmi script for the first time?
question_answer18) Who said, "We have effectively crippled our enemy without making our friends too formidable"?
question_answer19) The first financial bank under European guidelines was established in India in 1770 in Calcutta by Alexander and Co. What was the name of that bank?
question_answer22) Which one of the following Indians was appointed as Deputy Diwan of Bihar?
question_answer23) The ruler of which one of the following slates was removed from power by the British on the pretext of mis-governance?
question_answer24) Who founded the independent state of Awadh?
question_answer25) Who among the following had started the Public Works Department in India in 1848?
question_answer26) Between which stations was the first railway line opened in India?
question_answer30) A single shelf of a good European library was worth the whole native literature of India and Arabia." Who made this statement?
question_answer31) Who started the practice of granting the rights of collecting land revenue to the highest bidder?
question_answer33) Which one of the following settlements did comprise Zamindar as middleman to collect the land revenue?
question_answer34) Who was the Governor General of India at the time of Sindh-annexation?
question_answer35) Who among the following was the advisor of Lord Cornwallis in his judicial reforms?
question_answer36) Who of the following introduced the revenue system called Permanent Settlement?
question_answer37) Who was the father of Civil Service?
question_answer38) Whom did Sir Charles Napier replace as the British resident of Sindh?
question_answer39) Who of the following laid the first rail line in India?
question_answer40) Which one among the following states was first annexed by Lord Dalhousie under the Doctrine of Lapse?
question_answer41) Who was the first Governor General of Bengal?
question_answer42) Who among the following was the first Governor General of India?
question_answer43) Which British Commander was defeated by the Santhals in 1855?
question_answer45) Which Governor General had abolished slavery in India?
question_answer46) Who among the following was the British residence in Awadh at the time of its annexation into British dominion?
question_answer47) Who among the following has been called as a "Heaven Born General"?
question_answer48) Who of the following g was impeached in the British Parliament?
question_answer50) Who among the following formulated and implemented the 'Doctrine of Lapse'?
1. Robert Clive was the first Governor General of Bengal.
2. William Bentinck was the first Governor General of India.
Which of the statements given above is/arc correct?
1. Warren Hastings was the first Governor General of India.
2. Lord Canning was the first Viceroy of India.
question_answer57) Which one of the following statements is not correct?
1. Warren Hastings was the first Governor General who established a regular police force in India on the British pattern.
2. A Supreme Court was established at Calcutta by the Regulating Act, 1773.
3. The lands were surveyed and assessed before being taxed.
question_answer62) In British India, the Home Charge was an important part of Drain of wealth. Which of the following funds constituted home charges?
question_answer63) Which of the following pairs is/are correctly matched?
question_answer64) Which one of the following statements is not a feature of the Permanent Land Settlement?
1. It was introduced in the Ganga valley, tine North West provinces, parts of central India and the Punjab.
2. The revenue settlement under tins system was done with landlords or heads of families who collectively claimed to be landlords of the village or the estate.
3. Under this system, the land revenue was determined on permanent basis.
1. He brought in the separation of revenue administration and civil jurisdiction through the Cornwallis code.
2. He introduced the civil services in India.
3. Subsidiary alliance system was started under his rule.
1. The administrative policies remained same without any major change during this period.
2. The main emphasis of the administration was placed on the maintenance of law and order.
3. In 1772, the Company ended the dual government in Bengal and undertook the administration directly.
Which of the statements given above is/arc incorrect?
1. Cornwallis established a regular police force in India to maintain law and order and Zamindars were relieved from their police work.
2. Indians were excluded from all the superior posts in the police department during 19th century under the British rule.
3. In the beginning, the British police model was followed to organize Indian police.
Which of the following statements is/arc correct?
question_answer72) Consider the following statements regarding Subsidiary Alliances introduced in India by Lord Wellesley.
1. Wellesley followed the policy of the annexation of the territories of previously subordinated rulers.
2. The protected states under the Alliance could not employ any European in their service without the approval of the British.
3. The British promised not to interfere in the internal affairs of the protected states and they often kept it.
4. Though the armies of the protected states were remained but they were to be used by the British.
question_answer73) Which of the following statements regarding Permanent Settlement is/are correct?
1. The Permanent Settlement was introduced in parts of the Madras and Bombay presidencies.
2. The Permanent Settlement created a new class of landlords with hereditary rights on land.
3. The landlords created by the Permanent Settlement could never be removed under any circumstance.
question_answer74) Which one of the following pairs is correctly matched?
question_answer75) Given below are two statements, one labelled as Assertion [A] and the other labelled as Reason [R].
Assertion [A]: With the acquisition of Diwani of Bengal the company directly organised the 'drain of wealth.
Reason [R]: The company began to send to England the revenue of Bengal through what were called 'Investment'.
Assertion [A]: The Doctrine of Lapse was introduced under Lord Dalhousie.
Reason [R]: Many native states lost their suzerainty under Doctrine of Lapse and the deposed leaders led the rebels in their region.
question_answer77) Who was the Governor General of India during the Sepoy mutiny?
question_answer78) Who among the following British persons admitted the Revolt of 1857 as a national revolt?
Assertion [A]: First war of independence broke out in India in 1857, soon after the departure of Lord Dalhousie from India.
Reason [R]: Lord Dalhousie's annexationist policy had caused great discontent.
question_answer80) Which of the following statements about the Hastings Plan of 1772 is/ are correct?
1. Each district was to have a civil and a criminal Court.
2. The Judges were helped by native assessors who were skilled in Hindu and Islamic laws.
3. The Sadar Diwani Adalat was mainly meant to settle mercantile cases exceeding 10,000 in value.
4. These Courts did not put into place any preceding improvements.
Reason (R): Lord Dalhousie s annexationist policy had caused great discontent.
1. It recognised the cultivators as the owner of land.
2. It was a temporary settlement.
3. It was introduced later than the permanent settlement.
question_answer92) Which of the following social reforms is/are associated with Lord William Bentick?
question_answer93) Who among the following Governor Generals created the covenanted Civil Services of India which later came to be known as the Indian Civil services? | 2019-04-26T07:59:00 | https://studyadda.com/question-bank/railways/history/expansion-company-and-bengal-nawabs/east-india-company-and-regional-powers/3321 |
0.99819 | I am reading one of Richard Feynman's books. He was an American Physicist that helped develop the atom bomb.
In this book he mentioned a German technology to thwart Allied mine sweepers called, "shaft passer". My understanding is this shaft passer allowed the underwater mines that were attached to the ocean floor to somehow pass through the cable type mine sweep between two surface ships. Does anyone have any information on this? I would very much appreciate any help on this topic. | 2019-04-19T02:54:17 | https://www.uboat.net/forums/read.php?3,47407,47407 |
0.999998 | Searching for the Best Lawyer for a St. Clair County Shoplifting Case?
Having to appear in a St. Clair County Michigan courtroom for a shoplifting (retail theft or retail fraud) arrest or ticket does not make you a bad person. In fact, retail fraud is regularly prosecuted in St. Clair County Michigan by the St. Clair County Prosecutor's Office and local city/community prosecutors, but it is often only based upon an isolated incident from a momentary lapse in judgment. However, just because retail fraud is routinely prosecuted in St. Clair County courtrooms, it does not mean that there are not serious consequences or that it will not negatively affect your life, because any criminal record for a shoplifting offense can have many damaging long term consequences. The repercussions of a shoplifting conviction may include: the loss of your freedom (serving a period in custody at the discretion of the Judge assigned to your case); probation with many inconvenient and sometimes tough conditions; loss of employment opportunities; professional licensing issues; loss of educational opportunities; steep fines and costs; immigration complications (for persons that are not United States citizens); personal embarrassment/damage to reputation, etc. If you need to appear in any St. Clair County Court for a shoplifting charge, you need great legal representation who will fight to protect you.
First Degree Retail Fraud is a felony charge that carries up to a 5 year maximum prison sentence that is prosecuted when the merchandise involved is $1,000 (one thousand dollars) or more, or if the merchandise involved is $200 (two hundred dollars) or more and the person has a prior theft conviction [the minimum sentence is zero, meaning that any incarceration is solely up to the Judge].
Organized Retail Theft is felony charge that carries up to a 5 year maximum prison sentence that is also subject to applicable habitual offender sentencing provisions [the minimum sentence is zero, meaning that any incarceration is solely up to the Judge]. The charge of Organized Retail Theft is sought by St. Clair County Prosecutors when they have reason to believe that the intent of the accused is to commit a retail fraud and to generate proceeds by reselling the stolen merchandise to another person or business.
Second Degree Retail Fraud is a misdemeanor charge that carries up to a 1 year maximum county jail sentence that is prosecuted when the merchandise involved is at least $200 (two hundred dollars) but less than $1000 (one thousand dollars), or if the merchandise involved is under $200 (two hundred dollars) and the person has a prior theft conviction [the minimum sentence is zero, meaning that any incarceration is solely up to the Judge].
Third Degree Retail Fraud is a misdemeanor charge that carries up to a 93 day maximum county jail sentence that is prosecuted under either State law or local ordinance, when the merchandise involved in the offense is less than $200 (two hundred dollars) [the minimum sentence is zero, meaning that any incarceration is solely up to the Judge].
Removal of a Theft Detection Device is a misdemeanor charges that carries up to a 365 day maximum county jail sentence under State law [again, the minimum sentence is zero, meaning that any incarceration is solely up to the Judge].
Many stores (especially national chain stores) demand that criminal prosecutions occur because they have implemented a loss prevention policy that seeks, through prosecutions, to reduce retail fraud losses, reduce insurance costs, and to deter in store theft. It is not uncommon for many stores in St Clair County to take many hours to train asset protection personnel and to employ expensive theft detection devices to guard against the costs and liabilities associated with shoplifting and other store theft. Even with extensive training and the use of top of the line surveillance equipment, mistakes are still made and persons are still occasionally falsely arrested due to errors in judgment (such as the false identification of a suspect or the false interpretation of a situation), cultural issues, and procedural errors.
If you choose to make a great investment in your future by having attorney Daniel Hilf fully represent you for your St. Clair County shoplifting case, he will obtain all the available discovery materials to fully and properly defend the case, which can include the following: police report(s), loss prevention report(s), witness statement(s), in store video(s), police video(s), photograph(s), statement(s) the police and/or loss prevention claims that you made, etc. After reviewing the discovery materials and fully discussing the case with your attorney, you will have to make a decision to stand trial or to resolve the case through a plea or plea bargain (if a plea bargain is offered). In some cases (depending upon the particular facts and circumstances of the case, your age, and your background) you can avoid having a retail fraud conviction or have your conviction sealed through the plea bargaining process, a plea under advisement, or through a diversion program.
Engage the legal services of lawyer Daniel Hilf to help you make the best out of your bad situation through his legal experience and legal acumen. Again, a shoplifting conviction may cause you future problems, including employment issues, because many prospective employers do not want to risk hiring someone convicted of any type of theft. Lawyer Daniel Hilf is an impassioned criminal defense lawyer with over 20 years of experience inside and outside of courtrooms helping clients obtain great results for shoplifting accusations.
If you have been accused of shoplifting in St. Clair County Michigan, the right time is now to make an impactful decision regarding your legal representation by contacting Hilf & Hilf, PLC for help.
Shoplifting defense in St. Clair County Michigan includes individuals from the following places: The cities of Algonac, Marine City, Marysville, Memphis, Port Huron, Richmond, St. Clair, and Yale; the villages of Capac and Emmett; the townships of Berlin, Brockway, Burtchville, Casco, China, Clay, Clyde, Columbus, Cottrellville, East China, Emmett, Fort Gratiot, Grantm Greenwood, Ira, Kenockee, Kimball, Lynn, Mussey, Port Huron, Riley, St. Clair, and Wales; the communities of Abbottsford, Adair, Allenton, Anchorville, Atkins, Avoca, Avalon Beach, Bedore, Belle River, Berville, Blaine, Broadbridge Station, Brockway, Casco, Cherry Beach, Clays Landing, Columbis, Copeland Corner, Fair Haven, Fargo, Forster, Gardendale, Grande Pointe, Goodells, Hawthorne, Jeddo, Kimball, Keewahdin, Lakeport, Lambs, Lesterville, Maple Leaf, Martindale Beach, Miller, Muirs, Muttonville, North Lakeport, North Street, Pearl Beach, Perch Point, Peters, Pointe aux Tremble, Rattle Run, Riley Center, Riverside, Roberts Landing, Ruby, Sans Souci, Smiths Creek, Snyderville, South Park, Sparlingville, Starville, Tappan, THornton, Wadhams, Wales, and West Tappan.
Shoplifting cases in St. Clair County are fought at the following Court locations: 72nd District Court (at 201 McMorran Boulevard in Port Huron 48060 or at 2088 South Parker in Marine City 48039) and the 31st Circuit Court (at 201 McMorran Boulevard in Port Huron 48060). | 2019-04-19T08:15:42 | https://www.hilfandhilf.com/shoplifting-lawyer-st-clair-county.html |
0.999161 | Are Mormons funny? I guess that depends on what you mean by the question.
Do you mean to ask if Mormons can be amusing to innocent bystanders?
I have evidence. For instance, that huge graffiti inscription on the overpass over the DC Beltway, positioned so that it served as a caption under the vision of the Washington Temple, as it floated in its ethereal whiteness over the intense greenery of the surrounding parks and woods: "Surrender Dorothy!"
Let me explain it to those Mormons who aren't laughing. See, the temple kind of looks like the Emerald City in The Wizard of Oz, and "Surrender Dorothy" is what the Wicked Witch of the West wrote in the sky with smoke coming out of her broom.
OK, let me make it even clearer: This is funny because clearly the Mormons didn't intend their temple to remind anybody of a classic fantasy movie, but once somebody put up the graffiti, it made everybody think of it and laugh.
Except you. Sorry. You're so right. Not funny. Temples are never funny. My mistake.
No, I didn't mean that our temples are somehow like Disneyland, I was talking about architecture, not sacred ... sorry ... yes, I'll go talk to my bishop.
Which, I suppose, answers the other meaning of that question "Are Mormons funny?": Do Mormons have a sense of humor?
Oh, yeah, right. When we're joking among ourselves. But let some outsider joke about us, and it's Not Funny. We can have jokes like: "The Church must be true, or the missionaries would have wrecked it years ago." But let somebody else mock those young men on bicycles, and we grit our teeth, definitely unamused.
There's a third meaning to that question, though: Are Mormons who are trying to be funny successful in their attempts at humor?
Many years ago, when I was an extremely junior editor at BYU Press, a young artist came by to show us his collection of cartoons about Joseph Smith. They were really funny -- like the drawing of Joseph's mother, shouting up the stairs, "Joseph, turn that light out and go to sleep!"
See, that was funny because she didn't realize the Angel Moroni was up there filling the room with ... no. You're so right. Can't be funny. No Mormon could ever laugh at such a cartoon and feel good about it. Never mind that the entire proofreading staff nearly wet their pants reading his cartoons. We all knew -- even the cartoonist knew -- that there was zero chance whatsoever that BYU Press could publish cartoons that some would interpret as mockery of sacred things.
But 32 years later, I still remember. And the cartoonist did OK, even though that collection of cartoons was never published. His name? Calvin Grondahl.
The trouble is that in order to show -- even to ourselves -- how funny we Mormons can be, a Mormon humorist will invariably offend somebody. Keep at it long enough, and you offend everybody. In fact, much Mormon humor is funny precisely because it feels daring, even, potentially, offensive to somebody.
That's how irony works. Half the fun is knowing that some people just aren't going to get it.
So here I am, looking at two comic efforts: One is a genuine documentary in which non-Mormons around the country are asked what they know about Mormons -- you know, the first of the Golden Questions. The caption on the cover, "People say the darndest things about Mormons," tells you pretty much what to expect.
The other is a book of Mormon-centered cartoons, ostensibly in the tradition of Calvin Grondahl. The cartoon on the cover is of an old grandma with a magnifying glass, reading an "extra-large print Book of Mormon." The first page of the Book of Mormon contains the word "I"; the second page, the word "Nephi." That's how large the print is.
And It Came to Laughs: not funny.
To be more specific: American Mormon is pretty funny, though they repeat some footage and people didn't really say that many funny things about us -- mostly just the normal errors. What makes it funny is the deadpan (usually) of the interviewers, and the occasional zinger.
But maybe I'm one of those humorless Mormons, right? I mean, maybe the reason I wasn't rolling in the aisles (well, I saw it at home, and how many aisles can one guy roll in at once? But you know what I mean) was because after all these years of trying to explain things, it's kind of sad that so many people still have no idea who or what we are, or have an idea but it's outdated or flat wrong.
Still -- whatever humorless reservations I might have had now and then, these guys won me over and at the end, as they talked to a couple of Mormon guys in Las Vegas who were actually planning to go on missions, I decided that watching it was worth the time and money. I liked it. It was funny. And if you think it wasn't, tough. Humor is personal, and I'm personally right about this.
And now I'll be more specific about And It Came to Laughs. It is consistently and extremely not funny. But not because it touches on sacred things. Indeed, the only gags that come close to success are the ones that actually take some risks, like the one about Elijah in his fiery chariot being forced to land at Roswell, New Mexico.
And it isn't because of the drawing. Burnett's style is just like that of several cartoonists who are funny. In fact, his clever drawings are the reason I kept turning the pages, hoping that somewhere in the book he'd make me crack a smile.
Noah talks to his sons on the ark, telling Shem to feed the animals, Japheth to give them water, and Ham to ... "well shoot! You know what you need to do."
So it's a poop joke. OK, we were all once third graders, we get poop jokes. But why is this funny? Because it's Ham? Are we supposed to flash back to all the fake "doctrines" we once heard about Ham being the ancestor of African blacks? Oh, yeah, a laff riot. Or was it because Noah can't say poop or any word related to it, so the inability to say it is funny?
To me, it was just sad. Trying so hard, and getting nowhere.
The failure of this book begins with the title. How long did it take you to get the pun? You know, the rhyme? Well, not rhyme, but ... when you hear "And it came to laughs" you're supposed to think of "And it came to pass." Get it? See?
Yeah, I know that "laughs" doesn't sound like "pass," doesn't even rhyme with it. But when you finally do get the connection, it's ... at least amusing, isn't it?
Me neither. Everybody knows that to put "laughs" in the title is a horribly anti-comic thing to do on a book of alleged humor -- it makes the reader practically dare the author to be funny.
As I said, humor is personal. There are doubtless people -- like the editors at Covenant -- who thought this book was side-splittingly funny.
But I'm betting that those of us who once laughed at Grondahl or Benson are not going to take this as a substitute. Indeed, we're far more likely just to say, Man, I miss those old guys who were funny.
I could be wrong. Maybe The Returned Missionary, for instance, is really a good comedy, even if it is hopelessly badly written -- after all, it does have the genuinely funny Kirby Heyborne in the lead. But in my judgment, Heyborne is the only reason this film works at all -- he brings the only touch of reality to the movie, and so, because of him, the film repeatedly manages to survive hideous over-acting by others that makes you want to turn your head away in embarrassment.
But it was a hit! People loved it! People didn't notice or, if they did, care that most of the acting and all of the writing was just ... sad.
Or maybe they just liked Kirby Heyborne -- I know I did, which is why I kept watching this train wreck all the way to the end -- because he really was funny.
So don't get mad at me because I didn't think And It Came to Laughs was amusing -- pity me, because I'm just another of those humorless Mormons who never quite gets the joke. | 2019-04-20T09:10:56 | http://www.nauvoo.com/brotherorson/ |
0.998906 | A 29-year-old Pakistani man, linked to foiled 2009 bomb plot against the New York subway system and other al-Qaeda targets, was sentenced to 40 years in prison Tuesday.
A 29-year-old Pakistani man, linked to a foiled 2009 bomb plot against the New York subway system and other al-Qaeda targets, was sentenced to 40 years in prison Tuesday as renewed terror threats shadowed much of the globe.
Abid Naseer, the eighth al-Qaeda operative to face federal charges with links to the New York plot, also sought to launch an attack against a shopping mall in the United Kingdom.
Naseer's March conviction on charges of providing material support to al-Qaeda and conspiring to use a destructive device in connection with a crime of violence, was aided in part by documents seized in the deadly 2011 raid on Osama bin Laden's compound in Abbottabad, Pakistan.
The case marked the first time material seized in the raid had been offered as evidence in court.
At trial, federal prosecutors asserted that Naseer had been in contact with the same al-Qaeda handler who was providing direction to Najibullah Zazi, one of the leaders of the New York subway bombing cell. Zazi, who pleaded guilty in 2010, testified against Naseer at trial earlier this year.
Federal authorities have described the attempt on the New York subway system as one of the most serious terror plots uncovered since the 9/11 attacks in 2001.
In the British shopping mall plot, prosecutors said Naseer and other associates had been sent from Pakistan to the United Kingdom in 2006 to prepare for an attack. Naseer and his accomplices entered the country on student visas and then quickly dropped out of the university where they had been enrolled.
After returning briefly to Peshawar, Pakistan in 2008, about the same time that Zazi was getting explosives and weapons training there, Naseer went back to the United Kingdom to finish planning for the shopping mall attack in Manchester.
In early April 2009, according to prosecutors, Naseer told his al-Qaeda handler that he was planning a large "wedding'' for the upcoming Easter holiday, coded language for an attack.
The terror threat is once again dominating U.S. and world events, just more than a week after Islamic State operatives launched coordinated attacks in Paris, killing at least 130 people.
And last Friday, 20 people were killed in a terror attack on a western hotel in Mali.
The attacks prompted the U.S. State Department to issue a world-wide travel warning, while local law enforcement authorities across the U.S. were urged to review their plans to guard against mass shooting attacks. | 2019-04-25T22:24:56 | https://www.northjersey.com/story/news/nation/2015/11/24/terror-operative-gets-40-years-bomb-plots/76314356/ |
0.99891 | Trent Reznor On Kanye West: He's "Lost His F**kig Mind"
Add Nine Inch Nails frontman Trent Reznor to the list of rock stars who have nasty things to say about Kanye West.
In the midst of the press run for his band's new EP Bad Witch, Reznor chatted with U.K. publication The Guardian about West's new album Ye, President Donald Trump, and Childish Gambino's politically charged "This Is America" music video.
Reznor also had some harsh words for Trump, saying that artists have a responsibility to speak their mind on certain sociopolitical issues. The band's frontman called Trump's presidency "concerning and infuriating," adding that "the disregard for decency and truth and civility is what’s really disheartening."
Earlier this week, several entertainers including some of hip-hop's finest spoke out against the Trump Administration's zero-tolerance border policy, which separated and detained young children from their parents who entered the U.S. illegally. Yesterday (June 20) President Trump issued an executive order to stop future separations, but said no extraordinary efforts would be made to help return the over 2,000 children already separated from their families. | 2019-04-24T12:32:19 | https://theboombox.com/nine-inch-nails-trent-reznor-says-kanye-west-has-lost-his-fking-mind/ |
0.999279 | George F. Smoot, a co- recipient of this year's Nobel Prize in Physics, was an avid prankster during his student days at the Massachusetts Institute of Technology. But he was not the 5-foot-7-inch Smoot who was rolled end-over-end to measure the length of the Massachusetts Avenue bridge.
That distinction belongs to Oliver R. Smoot Jr., a 1962 MIT graduate, whom George Smoot describes as a distant relative on his website. In October 1958, the Lambda Chi Alpha fraternity used Oliver Smoot, the shortest pledge that fall, to measure the distance across the bridge, the route from the fraternity house in Boston to the main campus in Cambridge. The result: 364.4 smoots -- markings that the fraternity repaints annually.
George Smoot didn't arrive at MIT until a few years later. He earned a bachelor's degree in mathematics and physics in 1966, and a doctorate in physics in 1970. While on the campus, he participated in a number of lesser-known pranks.
``There was this guy in our hall who was pretty obnoxious," he told the Globe during a 1992 interview. ``We knew he was going away, so for two weeks everybody on the hall saved newspapers. We filled his room with newspaper -- filled it completely up. Then we took his refrigerator and laid it on its back and filled it with Jell-O, congealed it, then turned it upright.
``This wasn't science," he said, ``this was war."
For the record, the Lawrence Berkeley National Laboratory reports that George Smoot is about 6 feet tall. | 2019-04-21T23:03:35 | http://archive.boston.com/news/nation/articles/2006/10/04/at_mit_future_nobelist_not_above_a_prank_or_two/ |
0.943274 | Est-il possible d'utiliser Page Builder pour la présentation des produits avec Hikashop ?
ta question n'est pas stupide.
Il n'y a pas de plugin Page Builder CK spécifique à Hikashop, un dev hikashop pourrait peut etre le faire ?
Hello, since I am using HikaShop myself, I tried to have the various modules of HikaShop showing inside a page built by PageBuilder CK, but the information the modules were showing did not update (for example, when I put something in the cart, the module of cart did not update).
I'm now (slowing) setting up Virtuemart , but I'm not meaning now that it works fine, because only after a trial period I will be able to judge it (and I have not even finished to set it up - take into account that I do not do that for living during the day).
I've already tried to set up the e-shop Phocacart , but it did not work at all (it required something from the server which, maybe, there wasn't, and I had no chance to fix that).
I also checked Eshop , only to find out that it is too expensive.
I previously used Ecwid and it was very easy to set, use and manage, but it has one big issue: it takes too much time to load (since it is not Joomla native code but embedded HTML code) and a visitor will see a blank page for a while before that e-shop will suddenly appear, maybe thinking it is just a blank page and closing it (which it is something no e-commerce shop can afford to happen). | 2019-04-21T21:03:55 | https://forum.joomlack.fr/index.php/page-builder-ck/15238-hikashop |
0.998386 | BANGKOK, Thailand - Ten years ago, a plunge in the Thai baht sparked a wave of recessions across Asia's high-flying economies, bankrupting entire nations, putting millions out of work and shaking markets around the world. Some feared that decade of growth would be lost.
Today, the region as a whole has bounced back from the 1997-98 crisis and is better equipped to deal with financial emergencies. Banking is more transparent, corporations are better managed, poverty rates have dropped and the region's collective economic growth has doubled.
Still, the recovery has been uneven. The three countries hit hardest by the crisis that began July 2, 1997 - Thailand, Indonesia and South Korea - have charted sharply divergent paths over the last 10 years, reflecting their differing responses to the crisis and policies since then.
South Korea, which received a humiliating $58 billion bailout arranged by the International Monetary Fund, quickly cleaned up its banking system and started reforming its heavily indebted family-owned conglomerates. The economy shrank and the jobless rate soared, but by 1999 it was robustly growing again.
The crisis, while painful, forced South Korea to make changes that paved the way for more stable long-term growth. Today, it is one of Asia's powerhouses, led by Samsung Electronics Co. - the world's biggest memory chip maker - and Hyundai Motor Co.
Indonesia, however, has struggled. The crisis helped bring about the downfall of former dictator Suharto and greater political freedom, but the economy remains beset by rampant corruption, a weak legal system and limited foreign investment. Economic growth has been ticking along at about 5.5 percent the last two years, but unemployment is rising.
Thailand hovers somewhere in between. Bangkok, where hundreds of skyscrapers froze in mid-construction when the crisis erupted, now has an elevated Skytrain, a subway, a brand new airport and dozens of glitzy malls. Japanese investment has made Thailand a major auto and electronics exporting hub.
But a rise in the baht and political uncertainty caused by a tainted election in 2006 and military coup last September has dragged on growth.
In the wake of the crisis, Thai authorities shut down dozens of insolvent financial firms, vastly improved banking supervision and updated archaic bankruptcy laws. However, it can still take years for creditors to pursue claims, and further reforms of laws governing bankruptcy and repossession of assets from recalcitrant debtors haven't gone beyond the drafting stage.
Investors got a flashback to the 1997 crisis in December when the Thai central bank imposed capital controls in an attempt to weaken the currency, sending stocks plummeting 15 percent in one day and rattling regional markets.
Authorities quickly exempted stocks and foreign direct investment from the rules, helping the market bounce back. Investors were also reassured to know that Thailand had $65 billion in foreign currency reserves, far more than in 1997.
Still, Thailand's bungled effort to impose capital controls underscore the lingering challenges that Asia's emerging economies face in handling international money flows in search of higher returns.
It was the dramatic outflow of funds from Thailand that forced the central bank on July 2, 1997, to finally cut the baht's peg to the dollar, causing the Thai currency to plummet, triggering the crisis.
Unlike today, many Thai companies at that time were burdened with huge dollar-denominated debts. When the local currency plunged, the value of those loans suddenly ballooned in baht terms, forcing many companies to go bankrupt.
That kindled speculative pressures that also forced currencies in Indonesia, Malaysia, the Philippines and South Korea to fall, driving more companies out of business, including one of South Korea's largest conglomerates, the Daewoo Group.
Associated Press Writers Grant Peck in Bangkok, Kelly Olsen in Seoul and Chris Brummitt in Jakarta contributed to this report. | 2019-04-25T13:10:05 | https://www.savannahnow.com/business/2007-06-23/asian-crisis-10-years-later |
0.999999 | Are Supreme Court Justices Mentally Retarded?
The Supreme Court is on a rip against the death penalty, ruling last week that mentally retarded convicts can't be executed and this week that only juries, not judges, can decide the facts that justify imposing death. Neither decision appears to be very good law, but it's the former decision that takes the prize for bad logic and dangerous results.
Justice Paul Stevens wrote the decision in the 6-3 ruling in the case of Atkins v. Virginia, arguing that because in the last few years several states have outlawed the execution of mentally retarded convicts, therefore "it is fair to say that a national consensus has developed against it."
But in the first place, it's not clear that any such "national consensus" exists. Of the 38 states that allow capital punishment, 18 have laws that bar the execution of retardates. That means that 20 states do not have such laws. In other words, the majority of states that practice capital punishment have little or no problem with executing the mentally retarded. Those that do don't always agree as to who's retarded, how to tell, or who should decide. Hence, there is no "national consensus."
In the second place, it's by no means clear what a "national consensus" has to do with whether a practice is constitutional. If there were a "national consensus" that only certain ethnic minority members should be executed, would the Court uphold that? Fifty years ago, when the Warren Court played mumblety-peg with the Constitution, it routinely overrode the existing "national consensus" on a whole series of issues. Many of its decisions were legal garbage, but the whole point of having a Supreme Court composed of unelected judges who hold their seats for life is so they can defy "national consensus" when it violates the Constitution.
But Justice Stevens appealed to the Constitution as well, citing the Eighth Amendment's prohibition of "excessive" bail and fines and "cruel and unusual punishments." But this principle applies to the retarded only if you assume that their culpability in capital crimes is less than that of mentally normal criminals. Justice Stevens merely asserts that such is the case: "Because of their disabilities in areas of reasoning, judgment and control of their impulses, however, they [the retarded] do not act with the level of moral culpability that characterizes the most serious adult criminal conduct."
In most cases involving retarded defendants, that's probably not true. It may be true in cases in which the defendant is so retarded he probably wasn't able to commit the crime at all, but in the case before the Court, of Daryl Renard Atkins, with an IQ of 59, it clearly was not true. Atkins with an accomplice kidnapped a man, robbed him at an ATM machine, and then, as Justice Stevens described the crime, "took him to an isolated location where he was shot eight times and killed." Atkins, in other words, was bright enough to know to try to hide his crime. How is he less culpable than any other murderer?
Of course, if the retarded are "less culpable" than normal people, why are they allowed to be free at all? They're still capable of murdering people, robbing them and causing all sorts of damage and injury. If they're just too dim to avoid doing so, they belong in institutions, not on the streets. Moreover, if mental retardates shouldn't be executed for the capital crimes they commit, why should they be imprisoned? Imprisonment presupposes moral and legal culpability just as much as the death penalty. The logic of the decision points toward the abolition of punishment itself.
The funny part of the Court ruling in the Atkins case is that exempting mental retardates from the death penalty almost necessarily involves using the concept of IQ. For the last few years that concept has been in the doghouse with the Progressive Element because IQ tests suggest the existence of racial differences. Blacks score about 15 points lower on average than whites, and lots of researchers are convinced the differences are genetically based. To avoid dwelling on the rather un-progressive implications of that fact, some educrats have been abandoning IQ tests as "racist," "white supremacist," and all the rest. Now, when such tests seem able to keep murderers and rapists alive, the progressive types have discovered that IQ is useful after all.
Penal experts estimate that about 10 percent of the 3,600 inmates currently under sentence of death may be mentally retarded, which means that some 360 murderers who are not the sharpest tacks in the carpet may someday be able to pay you or your family or someone else or his family a visit. If and when they do, remember who it was that decided these brainless killers are not really to blame for what they are about to do to you. | 2019-04-21T09:03:18 | https://vdare.com/articles/are-supreme-court-justices-mentally-retarded |
0.999936 | MIT Massachusetts Institute of Technology Mechanical engineering graduate Robert G Gottlieb , SM holds at least patents and has made countless contributions to the U.S space program But his most lasting legacy will likely be an adjustable wrench that he invented in Full story Prepositions mit Grammar Mit Bus und Bahn DW Learn Wie kommst du zur Arbeit Ich fahre mit dem Fahrrad. The preposition mit is often used to identify the means or the manner It is also used with means of transport The preposition mit always takes the dative case. Masculine der Bus, der Zug Ich fahre mit dem Bus Ich fahre mit dem Zug. Feminine die U Bahn, die Buslinie Ich fahre mit der U Bahn Ich fahre mit der Buslinie . A list of grammar terms with examples Linguapress Take a Quiz, Test a Language Algorithm MIT Spectrum Jul , Now, a cognitive scientist from MIT is capitalizing on the quiz craze to answer some serious questions about how we acquire language Joshua Hartshorne , a postdoc in MIT s Computational Cognitive Science Group , developed Which English as an effort to map English grammar around the world. Grammar Check Online It s Free Ginger Software Avoid embarrassing mistakes with the world s grammar checker The Ginger Grammar Checker helps you write better English and efficiently corrects texts Based on the context of complete sentences, Ginger Grammar Checker uses patent pending technology to correct grammar mistakes, spelling mistakes and misused words, with unmatched accuracy. An Overview of the Grammar of English MIT CSAIL the grammar also generates most menblobsled event Whether this sort of thing is a syntactic or semantic pragmantic issue is the subject of debate u In general, it is tempting to think that the grammar of noun phrases can be made simpler, and that at least Machines that learn language like kids do MIT News Oct , MIT researchers have developed a semantic parser that closely mimics a child s language acquisition process by observing captioned videos, with no other information, and associates the words with recorded objects and actions, which could enable better human robot interactions. Online Editor Grammar Checker Enter the text that you want to check for grammar, spelling, and punctuation mistakes then click the grey button below Click on underlined words to get a list of proper Sydney Grammar School Sydney Grammar is one of the few institutions in the world that has engaged in such an exercise and was aided by the Mander organ in the Big School A performance has been held every year since by head of practical music studies, Robert Wagner, on the Bach s birthday. Cognitive scientists define critical period news.mit May , Cognitive scientists define critical period for learning language It s been very difficult until now to get all the data you would need to answer this question of how long the critical period lasts, says Josh Tenenbaum, an MIT professor of brain and cognitive sciences and an author of the paper.
Das Buch ist Top, leider fehlte die CD-Rom welche im Einkaufspreis und in der Artikel Beschreibung angegeben wurde.Daher kann ich nur 3 Sterne geben!
Dieses Werk ist umfassend und bietet viele, wirklich viele Übungen. Leider ist sein Layout genauso immens unattraktiv, es macht einfach keinen Spaß mit diesem Buch zu arbeiten. | 2019-04-26T00:26:46 | http://www.creamsari.co/3425066501-grammar-world-mit-cd-rom/ |
0.998863 | Why always getting same minimum value?
I am trying to find minimum value using threads. I am using rand() function but I am always getting the same answer. Following is my code which I retrieved from a book.
From the above two outputs, it is clear that each time, I am running the program, I am getting the same output.
Some body please guide how to generate a different random series of numbers using rand() function?
the whole point of the seed is that it'll give you the same sequence for the same seed. | 2019-04-26T00:05:35 | http://www.cplusplus.com/forum/unices/251104/ |
0.999724 | : Who's got the best price on these? I'm looking for hybrid lights which not everybody stocks. Thanks!
Quinn Violins too. Chris also has slightly better prices, and shipping is free for string orders over $25 or $30 in the US.
: : Who's got the best price on these? I'm looking for hybrid lights which not everybody stocks. Thanks! : Lemur Music stocks them all. (www.lemur-music.com or 1-800-246-BASS) : Quinn Violins too. Chris also has slightly better prices, and shipping is free for string orders over $25 or $30 in the US. | 2019-04-22T13:56:29 | http://www.basslinks.com/webboard/ab_2001_messages/1919.html |
0.998967 | Let?s make this happen RT @maiiconleite: @PearlDrumCorp @CalvinR_Rodgers tour in Brazil?
RT @maiiconleite: @PearlDrumCorp @CalvinR_Rodgers tour in Brazil?
Born from a family of musicians and raised on the South Side of Chicago, Calvin Rodgers took an early liking to the drums, as a kid growing up in church. His father, a well-known songwriter and musician, encouraged his son's gift and immediately began to pour into him by cultivating his gift. Willie Rodgers frequently took young Calvin to late night rehearsals and studio sessions. Calvin would use these opportunities as time to learn and study many of the musicians he admired. As Calvin Rodgers grew, he continued to play in church and with local community choirs throughout city of Chicago.
At 15, when most were still learning their craft, Calvin Rodgers recorded the live CD/Video recording "Hallelujah", with the Grammy nominated choir Ricky Dillard & New G. Shortly thereafter, Calvin caught the attention of Ramsey Lewis, who was spearheading a jazz program throughout Chicago area high schools.
Lewis sent Calvin to study under the tutelage of the drummer for that program, Ernie Adams. Upon graduating, Lewis invited Calvin to join and record with his award-winning group Urban Knights. Simultaneously, Calvin began touring with the very in demand gospel artist, John P.Keee.
Calvin Rodgers was also becoming a regular first call studio session drummer in Chicago, for everything from smooth jazz to radio and television jingles. It was while working as a studio player that Calvin landed the coveted gig as lead drummer for R&B Powerhouse, R. Kelly. This was a valuable experience, but after two years, Calvin had to respond to a higher calling, and return to his gospel roots. Calvin went on to record and tour with gospel giants like Donald Lawrence and Martha Munizzi. Today, his resume boasts most of gospel's elite, spanning from Fred Hammond, Tommy Simms and Marvin Sapp to Israel Houghton, Yolanda Adams and even the legendary gospel group the Clark Sisters.
Calvin Rodgers' hard work, innate talent, and gifted ability has been recognized by artists, producers and musicians around the world, enabling him to also maintain a consistent schedule as a clinician. In 2006, Calvin became a proud endorser of Sabian Cymbals. "I have been searching for a company that is innovative, loyal to ALL of their artists and have the sound I want and need. When I found Sabian, my search was over!".
Calvin Rodgers is currently touring as the Music Director for Grammy Award-winner Fred Hammond. Calvin Rodgers is also producing and writing for a host of gospel artist. In one his most exciting current projects, Calvin is developing a solo CD and an instructional DVD which will tentatively be released in Fall 2009. At the age of 30, Calvin Rodgers continues to grow professionally and spiritually. He is an inspiration to many and a legand to some.
Calvin Rodgers was born into a family of musicians, on the south side of Chicago, Illinois. As a young child, his parents noticed instantly his love for music, and especially his passion for the drums. His father Willie Rodgers, a well-known songwriter and musician, encouraged Calvin's gift and immediately began cultivating it, by pouring into him constantly.
Oftentimes, Calvin's father would take him to late night rehearsals and studio sessions, to offer him the opportunity to watch and learn from the veteran musicians that his dad would often work with. As the years passed, Calvin gained more and more exposure, playing at local churches, with various solo artists, groups and choirs. At the age of 15, while some were yet perfecting their craft, Calvin was granted the honor of playing alongside the recently GRAMMY nominated choir, Ricky Dillard and New Generation Chorale.
The live CD/Video "Hallelujah", was Calvin's first nationally released recording. Shortly thereafter, Calvin's drumming caught the attention of jazz icon, Ramsey Lewis. Lewis was spearheading the inner city music program, Jazz Mentors. This program afforded talented high school musicians the opportunity to be mentored musically, by some of Chicago's finest jazz musicians and teachers. Calvin studied under the tutelage of the drummer for that program, Ernie Adams, for two years. Upon graduating, Lewis invited Calvin to join and record with his award-winning super-group, Urban Knights.
Simultaneously, Calvin began touring with gospel singer and songwriter, John P. Kee. Calvin was also becoming a regular first call studio session drummer in Chicago, for everything from smooth jazz to radio and television jingles. It was while working as a studio player that Calvin met RnB powerhouse, R. Kelly. With over 200+ awards won, including three GRAMMYS, Calvin knew that when Kelly offered him the position as his touring drummer, he couldn't say no.
After two years of touring the U.S. and Europe with R.Kelly, Calvin decided he had to respond to a higher calling, and return to his gospel roots. He accepted a job offer with GRAMMY award winner Fred Hammond, as a music director. As of current, Calvin is now Hammond's lead co-writer and co-producer. Calvin also maintains a steady schedule as a clinician, and a private lesson teacher. Whenever in Chicago, Calvin can be found on the drums at his home church, New Life Covenant. He also serves as a mentor and big brother, to many up and coming drummers and musicians.
His touring and recording resume boasts the likes of such artist as Aretha Franklin, The Isley Brothers, Kirk Franklin, Jonathan Butler, Marvin Sapp, Yolanda Adams, Agnes Monica, Avant, Dionne Warwick, Rachelle Farell, Smokie Norful, Donald Lawrence, Byron Cage, James Fortune, Vashawn Mitchell, T.D. Jakes, George Huff, and many many more. | 2019-04-23T04:30:46 | https://drummerszone.com/artists/calvin-rodgers/12684/profile/ |
0.998474 | Which kind of website must i need?
There a two varieties of websites, standard ones and E-commerce ones (where one can sell things on). You should think whether you wish to actually sell your products or services on the web or whether you need a website to attract prospects.
The amount of pages should i need?
Some web-site designers charge per page. This is the cheaper option in case you only want one or two pages but exactly how many professional websites does one see with a number of pages? Websites could consider looking good and stay very easy to navigate around. Squashing everything on to a couple of pages to save money may not be the most suitable choice.
Get it done professionally or diy?
If you are confident on the pc it could suit you to definitely try it for yourself. This option will probably be cheaper but sometimes ideal consuming and restrictive. Configuring it done professionally (see Web page design in Chorley) might cost more initially and definitely will provide you with a bespoke website that may stand out and be right for you.
Look at the way ahead for your internet site. Soon enough it will undoubtedly need updating, prices and will be offering will alter, info may change, and today's news will become old news. Ideally you must get a package that allows you to edit certain parts in the website yourself (see Web site design in Chorley), this can permit you to always keep your web site current. E-commerce sites should have this choice to let you manage your personal products.
It's really no good having a great website whether it can not be found. Pictures online look great however it is the wording from the site that helps your site get higher on search results. An experienced designer will design your website with this in mind (see Web page design in Chorley). Buy your website working and find out what position your web site comes out in searches naturally before paying out again for SEO (seo) services. | 2019-04-19T16:41:57 | http://webdesignpreston.yolasite.com/ |
0.998945 | In this age of technology, it's not as mandatory to actually work a 9-5 job (or even leave the house, for that matter) to earn income. There are many ways that people with basic computer skills can earn money on the Internet. Does it sound too good to be true? It's really not. One way to earn money on the Internet is by developing your own company, whether it be offering a service or selling your own products.
Creating a Web site is a must for this endeavor. Marketing and promoting your product or service is yet another task. Find your niche. If you like to design and create children's clothing, consider opening an online kids clothing store.
You would first need to apply pictures of your products onto your Web site, detailing product information and sales prices. Subscribe to a payment tool, such as Paypal, as a way for customers to purchase your items online. Adding a shopping cart feature is another consumer-friendly tool. If going into business for yourself is not something you are not willing to risk, there are many work-at-home opportunities listed on the Internet, from data entry jobs to sales.
The most important aspect of choosing such a company to work for is determining their status. Is this a scam? Will they trick me into scamming other innocent people? The best way is to check the company's reputation is through the Better Business Bureau. Freelancing is yet another option to earn money on the Internet.
Perhaps you have a gift for writing or graphic design. Capitalize on this skill by checking freelance sites for work opportunities. This is not as risky as working for yourself in the sense that you are actually getting paid by companies on your terms. However, there may come a point and time when the need for this type of work slows down or even comes to a complete halt.
That is something to consider when planning freelance as a way to earn money on the Internet. Perhaps a very simple way to earn money on the Internet is by acting as an online advertisement. This involves developing a Web site dedicated to a certain subject such as shoes and writing content and adding pictures that will attract visitors to your site. The next step to earning money on the Internet through advertising is to join an affiliate program.
These are companies who will allow you to post links to their sites that feature their sales products which relates to your Web site. When the link on your Web site is clicked and a purchase is made, you will then receive commission from the purchase. The key to success with this endeavor is to develop an attractive and informative Web site on your subject and continue to update and add new content as an incentive for visitors to return. To Your Success. | 2019-04-25T14:21:17 | http://www.gravitatedesignstudio.com/earning_money_on_the_internet_372951a.html |
0.999255 | Why Construct a New Facility in Southern Peru?
In Spanish, "La Joya" translates to "The Jewel" and Moly-Cop's latest grinding media facility in La Joya, Peru is certainly the jewel in the crown of Moly-Cop's international manufacturing facilities since it was fully commissioned in November 2016.
Moly-Cop has operated a grinding media facility in Arequipa, Peru since 1981 with an initial capacity of 10,000 metric tonnes per year. For the past 34 years this operation has gradually increased its grinding media production capacity to 60,000 metric tonnes per year as a consequence of the increasing market demand of the Peruvian mining market for grinding balls. However the continuous market demand in the region and technological advances in the production of grinding media has resulted in Moly-Cop management making the decision to construct the new grinding media facility just 48 km from Arequipa in the town of La Joya.
The location of the site is important, as La-Joya is located close to major southern mining operations and projects such as Freeport’s Cerro Verde mine, the Cuajone and Toquepala operations of SCC, Glencore’s Antapaccay, Hudbay’s Constancia and MMG’s Las Bambas mine. Moly-Cop also operates a plant in Lima that services the central and northern grinding media markets of Peru.
This greenfield project was constructed on a 148,000m² site located in the La Joya District, 48km from Arequipa. Civil works commenced in October 2014, with building construction starting in May 2015. The facility commenced operations in November 2016 and is currently ramping up to its design capacity to manufacture 174,000 metric tonnes per year of grinding media. The facility also has the flexibility for future market growth with space allocated for additional production capacity.
As the new facility is situated in one of the driest environments on the planet, the design of the new facility has incorporated technologies to reduce the water consumption of the plant to the lowest within the Moly-Cop group.
Given its strategic location, the facility is an extremely important supplier of grinding media to customers in southern Peru. Moly-Cop Country Manager for Peru, Javier Castro, says “Moly-Cop has an international supply network of nine grinding media facilities located in key mining regions around the world. The La Joya facility, is a state of the art grinding media facility that will provide us with the capability to not only meet the current market demand, but also the forecasted growth for grinding media in southern Peru over the next five years.” "Due to our close proximity to our customers we can provide a short and responsive supply chain and in market presence for technical after sales support"
The facility will also have a positive impact on the local community. “The facility will be a major employer in the region, both direct and indirectly” says Castro.
on Grinding media supply within Peru? | 2019-04-19T08:25:13 | https://molycop.com/resources/news/lajoya/ |
0.999928 | DETROIT -- Given that he died 30 years ago, at the age of 52, the idea of a Roy Orbison concert is, as the song says, "In Dreams."
But technology has made that particular dream come true.
In Dreams: Roy Orbison in Concert -- The Hologram Tour is gimmicky, schticky and even a bit creepy -- as strange and disquieting as it was entertaining. At the Fox Theatre on Saturday night, Oct. 20, it was also crowd-pleasing, at least to the miniscule but enthusiastic group of fans that turned out. As the first full-scale hologram tour on the road, it also may be a harbinger of things to come; the late rapper Tupac, after all, "played" at Coachella while headbanger hero Ronnie James Dio has toured in Europe. It's a vehicle to bring dead icons back to life, and give their fans another chance to "see" them -- or, in many cases, see them for the first time.
And how you feel about that -- and about Orbison "singing" "Oh, Pretty Woman," "Crying," "Love Hurts," "You Got It" and a dozen other favorites on the Fox stage -- depends on just how much you need to have a "live" experience with those stars again. There was no question the gray-suited, guitar-playing Orbison on Saturday was a projection; The shimmering image was unquestionably flat, especially juxtaposed against the cadre of live musicians -- a small orchestra, mostly of local players, that included with string and brass sections and backup singers. (Only the drummer and conductor tour with the production.) And there were points of the show where the stage lighting made the hologram Orbison opaque, with the other players peeking through his body and undermining the effect.
His appearances, too -- rising from the stage when he arrived and subsequently disappearing in a wisp of smoke -- did not exactly enhance the illusion.
All that said, the performance was unquestionably tight, the live playing impressively synced with the recorded Orbison. The projection even swiveled to look at and acknowledge the other players, occasionally accenting the songs with gestures or hitches of its arms and head. It helped that Orbison was never a particularly physical performer, so more motion wasn't required; A static Elvis Presley, for instance, would be more problematic.
The hour-long show also featured a pair of visual montages that were perhaps more satisfying; As the orchestra played instrumental versions of "You Got It," "Blue Bayou," "Leah" and others, footage of recording sessions, photos and testimonials from U2's Bono and the late Tom Petty put some historical context to what was happening on stage. And the two backup singers delivered "Oobey Doobey" and "In Love" before the hologram returned to close out the night with "I Drove All Night" and "Pretty Woman" -- the latter actually bringing some fans out of their seats.
In the end, the show could only be seen as an ambivalent experience. There was no point where you lost sight of the fact you were watching a projection or that the Orbison before us was in any way "real." His vocals were, as always, wonderful -- but on tape. It was as much and maybe more science experiment than rock 'n' roll show, a clearly heartfelt tribute that teetered on cheapening the legacy of the artist it was honoring. | 2019-04-22T02:47:49 | http://bands.goanddomichigan.com/reviews/review.asp?ID=8412 |
0.999996 | Bollinger Bands are available on most charting software.
They have become popular primarily because they answer a question every investors needs to know: Are prices high or low?
Bollinger Bands were created by John Bollinger, CFA, CMT and published in 1983. They were developed in an effort to create fully-adaptive trading bands.
Bollinger Bands are curves drawn in and around the price structure on a chart that provide a relative definition of high and low. Prices near the upper band are high prices,while prices nrear the lower band are low.
The base of bands is a moving average that is descriptive of the intermediate-term trend. This average is known as the middle band,and its default length is 20 periods.The width of the bands is determined by a measure of volatility,called standard deviation. the data for the volatility calculation is the same data that was used for the moving average. The upper and lower bands are drawn at a default distance of two standard deviations from the average.
Learning how to use Bollinger bands effectively cannot be fully explained in this article. However the following rules serve as a good starting point.
1. Bollinger Bands provide a relative definition of high and low. By definition price is high at the upper band and low at the lower band.
2. That relative definition can be used to compare price action and indicator action to arrive at rigorous buy and sell decisions.
3. Appropriate indicators can be derived from momentum, volume, sentiment, open interest, inter-market data, etc.
4. If more than one indicator is used the indicators should not be directly related to one another. For example, a momentum indicator might complement a volume indicator successfully, but two momentum indicators aren't better than one.
5. Bollinger Bands can be used in pattern recognition to define/clarify pure price patterns such as "M" tops and "W" bottoms, momentum shifts, etc.
6. Tags of the bands are just that, tags not signals. A tag of the upper Bollinger Band is NOT in-and-of-itself a sell signal. A tag of the lower Bollinger Band is NOT in-and-of-itself a buy signal.
7. In trending markets price can, and does, walk up the upper Bollinger Band and down the lower Bollinger Band.
9. The default parameters of 20 periods for the moving average and standard deviation calculations, and two standard deviations for the width of the bands are just that, defaults. The actual parameters needed for any given market/task may be different.
10. The average deployed as the middle Bollinger Band should not be the best one for crossovers. Rather, it should be descriptive of the intermediate-term trend.
11. For consistent price containment: If the average is lengthened the number of standard deviations needs to be increased; from 2 at 20 periods, to 2.1 at 50 periods. Likewise, if the average is shortened the number of standard deviations should be reduced; from 2 at 20 periods, to 1.9 at 10 periods.
12. Traditional Bollinger Bands are based upon a simple moving average. This is because a simple average is used in the standard deviation calculation and we wish to be logically consistent.
13. Exponential Bollinger Bands eliminate sudden changes in the width of the bands caused by large price changes exiting the back of the calculation window. Exponential averages must be used for BOTH the middle band and in the calculation of standard deviation.
16. %b has many uses; among the more important are identification of divergences, pattern recognition and the coding of trading systems using Bollinger Bands.
17. Indicators can be normalized with %b, eliminating fixed thresholds in the process. To do this plot 50-period or longer Bollinger Bands on an indicator and then calculate %b of the indicator.
18. BandWidth tells us how wide the Bollinger Bands are. The raw width is normalized using the middle band. Using the default parameters BandWidth is four times the coefficient of variation.
20. Bollinger Bands can be used on most financial time series, including equities, indices, foreign exchange, commodities, futures, options and bonds.
21. Bollinger Bands can be used on bars of any length, 5 minutes, one hour, daily, weekly, etc. The key is that the bars must contain enough activity to give a robust picture of the price-formation mechanism at work.
22. Bollinger Bands do not provide continuous advice; rather they help indentify setups where the odds may be in your favor.
One of the great joys of having invented an analytical technique such as Bollinger Bands is seeing what other people do with it. These rules covering the use of Bollinger Bands were assembled in response to questions often asked by users and our experience over 25 years of using the bands. While there are many ways to use Bollinger Bands, these rules should serve as a good beginning point.
http://www.bollingerbands.com - Where you can learn more about Bollinger Bands. | 2019-04-26T12:31:51 | http://forum.srilankaequity.com/t17178-bollinger-bands-22-rules |
0.999517 | Sake is one of the most famous Japanese alcoholic beverages recognized world wide. Sake is sometimes compared to beer, since sake is made from fermenting rice, like fermenting grains to make beer. But sake is also known as "rice wine." Is sake similar or different from beer and wine? In this report, sake, wine(red and white), and beer's tastes are analyzed.
Below figures are radar charts comparing white wine, beer, red wine, and sake. The tastes used as axes are astringency, clarity, bitterness, umami, and body. To represent overall taste balance, each category's average are used as taste data.
According to the chart, sake has strong clarity and umami, indicating a refreshing yet smooth taste. White wine has a taste balance with strong clarity with body, meaning it has crisp taste. Red wine has a balance strong in astringency, umami, and body, which shows fullness in its taste. Beer has strong astringency, body and bitterness balance that creates heartiness and rich bitterness to enjoy. In overall taste balance, sake and white wine has similar taste shape with strong clarity and low bitterness. When it comes to taste, sake is closer to white wine than beer and red wine.
Sake pairs well with the Japanese cuisine such as sushi and tempura. So how about the Western cuisine? Since sake has similar taste shape as white wine, one easy guild is to pair food with sake is matching with cuisine that goes well with white wine. | 2019-04-26T08:36:20 | http://mikaku.jp/e/case/taste_watch-201102.html |
0.999999 | What comes after the smiley? Facebook is trying to find out.
Facebook wants an awful lot from its emoticons: They should be able to convey complex emotions, for example, like contemplation, admiration, affirmation, maternal love, determination, devotion, resignation, and gratitude.
But how, in a tiny digital image, do you depict something as subtle as shame as opposed to remorse, or shyness as opposed to modesty? Current emoticons can't do that, or anything close to it. So Facebook has turned to Pixar story illustrator and former storyboard artist at the Wallace and Gromit studio Matt Jones, to help make something entirely new. He's charged, basically, with reinventing the smiley.
Jones was studying facial expressions for his work on a new film by Pete Docter (director of Up and Monsters, Inc.), which takes place in the mind of a young girl coming of age. The film, referred to as The Untitled Pixar Movie That Takes You Inside the Mind, is set for release in June 2015. Pixar is famous for bringing to life inanimate, and even mundane, objects: lamps, cars, a hockey puck. This film required an extra level of emotional detail. A young girl's mental state is a complicated thing.
At the same time, Ekman's protégé, Dacher Keltner, codirector of University of California-Berkeley's Greater Good Science Program, was starting work with Facebook to improve their emoticons. When Keltner heard about the project at Pixar, he approached the company. That's how he found Jones.
Keltner started off by giving Jones some of the classic universal emotions (anger, disgust, fear, happiness, sadness, and surprise) to translate into emoticon-style drawings. He loved what he saw — and decided to up the ante. He handed over Charles Darwin's The Expression of the Emotions in Man and Animals, which Darwin published 13 years after On the Origin of Species. The book explores similarities between human and animal facial movements, in support of Darwin's theory that humans and animals have a common ancestor. It became one of the seminal works on the facial emotive expressions.
Some of Darwin's emotions come with elaborate definitions, but some get descriptions of just two or three words. "It was a good graphic-design cartoon challenge to draw what he was thinking," says Jones. Some of Darwin's findings were too antiquated. For instance, he described the expression of embarrassment as a little cough. "It's very Victorian. If we are embarrassed, these days we are bit broader," Jones says, "especially Americans."
Not all of Darwin's facial expressions are scientifically supported. Research is still being done to show whether the feelings Darwin outlined translate into universal facial movements — Keltner, for his part, added some extra emotions to the list. This leaves Jones, as an artist, exploring the same correlations between feelings and muscle movement as leading psychologists.
"I was skeptical when I handed Matt these emotions, like gratitude, relief, awe, and guilt, which no one has studied," says Keltner. But Jones delivered: "He does simple lines for facial muscle movements, and when you look at them, you just say, 'wow,' because there is so much expressiveness."
"If we can crack a universal language, that will be true success," says Jones. "What we need to aim at is instant readability, just like what we do in cartoons."
Jones' favorites are the faces expressing negative emotions, like disgust, since it's a good chance to "draw a gross cartoon character." By contrast, the positive ones, like maternal love, are subtler and hence more difficult.
You can see the influence of his experience working on films such as Pirates! Band of Misfits at the Wallace and Gromit studios, in the big, googly eyes, wide expressive mouths with teeth, and exaggerated eyebrows. "As long as you have eyebrows, you are safe," he says, a lesson he learned from Gromit, whose rubbery brow was a trademark.
He tried adding noses (for sneering) and shoulders (for shrugging), but they don't quite work on the emoticon scale. Instead of a shrug of the shoulder, he'll use a tilt of the head, a curled bottom lip, or a raised eyebrow.
Keltner has been testing Jones' drawings out on subjects around the world. In a sort of back-to-front approach, he is also translating Jones' simple line drawings back into anatomical coding of real facial movements to see if they work on a human face.
Right now, Jones is experimenting with colors beyond the default yellow used in most other emoticons. He tried "Facebook blue," thinking it might have become familiar enough to users, but said the emoticons just looked like they had hypothermia. He's experimenting with multiple colors: red for anger, green for envy. "But you don't want to offend anyone," he explains. "Colors will be a racial issue."
Jones is considering whether emoticons can be three-dimensionally turned to the side, to indicate things like love or devotion. "Holding your head straight forward is an emotional reflex in itself," he points out. "It's quite rigid and I'm trying to break that." He is considering whether the face has to live within the confines of the circle, or if eyebrows can float above, or tears fly out.
And of course, as a Pixar person, he is pushing for animation. "I love on Facebook when you hit the 'like' button on your iPhone, and the thumb will kind of pulse a little," says Jones. "I'm encouraging them to put movement into the emoticons. Hopefully we can evolve them into living little living characters."
The biggest challenge they are facing is how to simplify and shrink down the illustrations to chat-box size — ultimately, these will be just a few pixels wide. "We are trying to figure out how much looseness we can keep," explains Jones, "so they don't lose the expressions."
Correction: Jones worked on the movie Pirates! Band of Misfits. | 2019-04-24T22:19:36 | https://www.buzzfeednews.com/article/justinesharrock/how-facebook-a-pixar-artist-and-charles-darwin-are-reinventi |
0.999369 | How far would a candidate go to become President of the United States?
In covering the presidential election campaign, star newsmaker Erica Sparks notices that favored candidate Senator Mike Ortiz seems dependent on his wife to an unnatural degree. Celeste Ortiz is a brilliant and glamorous billionaire who—along with her best friend and confidant Lily Lau—has engineered her husband’s meteoric rise. The White House is within their reach. But the more Erica investigates the Ortizes’ strange relationship, the more intrigued she becomes.
Erica begins an investigation. But everyone material to her probe ends up dead. With each death, her foreboding grows. Is she next? And can she find out in time if the country’s beloved candidate is what he seems . . . or a threat to national security?
My thoughts: This is the second book in Lis Wiehl's The Newsmakers' series and I am really enjoying it. It was an interesting book to read during our election this year, though this book was certainly much more dark and cynical than things ever became in real life.
I love Erica and her go-get-em attitude. She is not afraid to go after what she believes in, despite the fact that it often puts her, and in this case her daughter's life, in danger. I loved the balance between the political intrigue and the media manipulation, especially knowing Lis Wiehl's background as legal analyst. It really does make you wonder just how accurate this portrayal really is at times.
While I tend to be a very unpolitical person, I found this book - a book that is all about a presidential election - to be completely captivating. I loved the political intrigue and found myself completely engaged the entire time. Perhaps because I knew it was fiction, perhaps because of the timing, perhaps because I love the series - I don't know, but this was a good book!
This is a fast-paced, suspenseful book. The mystery will keep you on your toes and Erica is one sharp cookie! She is dedicated to her job and believes in journalistic integrity all the way. I cannot wait for the next installment of the series and I love that seems nothing is out of bounds for Lis Wiehl...what will Erica Sparks be investigating next?
Audio thoughts: I really love the way Devon O'Day narrates this series...she just brings Erica and company to life! Her pacing and characterizations are spot on and the tension she adds to her voice leads to the overall suspense of the book. She is the perfect narrator for this series and I hope she continues for as long as this series goes on!
I haven't heard of this series, but it sounds great -- probably more my husband's style than mine, though. I'm with you in that I don't really enjoy books about politics (unless it's in fantasy or sci-fi form). Thanks for sharing!
New one for me and a subject I like very much. Making a note of this one.
Since I read your review of The Newsmakers this and that one have been sitting in my wish list, I am so tempted! | 2019-04-22T00:47:50 | http://alwayswithabook.blogspot.com/2016/11/review-candidate-by-lis-wiehl-audio.html |
0.999901 | What is New Zealand Domain name?
New Zealand domain name is used in URLs to identify specific New Zealand web pages and New Zealand website. Each New Zealand domain locates an individual on the Internet. New Zealand domain is like your own house in the internet world. You can register New Zealand domain name for just few dollars a year.
Allactionhost New Zealand is your best domain services company, you can register New Zealand bulk domains for New Zealand organization to do New Zealand register bulk domains, renew New Zealand company's New Zealand domain names, host New Zealand company's New Zealand domain name by New Zealand domains hosting, register New Zealand domain names for individual person to preform New Zealand register domain name, register New Zealand domain names for New Zealand company to preform New Zealand register domain names, register New Zealand domain names for New Zealand organization to buy New Zealand domains, PHP hosting, register New Zealand bulk domains for individual person to complete New Zealand register bulk domains, register New Zealand bulk domains for New Zealand company to buy New Zealand bulk domains, host personal New Zealand domain name by New Zealand domain hosting, renew New Zealand domain names for individual person New Zealand domain names renewal, renew New Zealand domain names for New Zealand organization New Zealand domain names renewal, host New Zealand domains of New Zealand organization by New Zealand domain names hosting, renew New Zealand bulk domains for New Zealand company to renew New Zealand bulk domains, renew New Zealand bulk domains for personal New Zealand bulk domains, host New Zealand company bulk domain names, renew New Zealand bulk domains for organization New Zealand bulk domains, ASP.net hosting, host New Zealand websites by Microsoft Windows website hosting, transfer New Zealand domain names for company New Zealand domain names, host New Zealand organization's domain names, New Zealand multiple websites hosting, transfer personal New Zealand domain names, DNS hosting, transfer New Zealand domain names for organization New Zealand domain names, transfer New Zealand bulk domains for company New Zealand bulk domains, ASP hosting, transfer New Zealand bulk domains for personal New Zealand bulk domains, transfer New Zealand bulk domains for organization New Zealand bulk domains, buy mail box hosting, host New Zealand websites by Linux website hosting, email hosting, New Zealand ecommerce hosting and cheap New Zealand web hosting packages for New Zealand small to big business.
Why do I need New Zealand Domain for my New Zealand website?
It is important to register New Zealand domain name for your New Zealand website no matter your New Zealand website is for personal, organization or business purposes. New Zealand domain name acts like a brand name for your New Zealand website that provides your New Zealand website an immediate creditability. New Zealand domain name is an essential portion of your internet business and New Zealand ecommerce business.
Allactionhost New Zealand offers best New Zealand domain services for our New Zealand customers such as New Zealand register domains for New Zealand company to preform New Zealand register domain name, New Zealand register domains for organizations to perform New Zealand register domain names, New Zealand register domains for individual person to perform New Zealand register domain name, New Zealand register bulk domains for company New Zealand bulk domain names, New Zealand register bulk domains for New Zealand organization to perform New Zealand register bulk domain names, New Zealand register bulk domains for individual person to buy New Zealand bulk domain names, New Zealand renew domains for New Zealand company to renew New Zealand domain names, New Zealand renew domains for New Zealand organization to renew New Zealand domain names, New Zealand renew domains for individual person to renew New Zealand domain names, free domain name, New Zealand renew bulk domains for New Zealand company to perform New Zealand register bulk domain names, New Zealand domain names search, New Zealand renew bulk domains for organization New Zealand bulk domain names, New Zealand renew bulk domains for personal New Zealand bulk domain names, transfer New Zealand domain names, transfer New Zealand bulk domains, WHOIS New Zealand domain search and New Zealand domain hosting for our New Zealand customers. We offers affordable New Zealand web hosting plans, New Zealand multiple website hosting, emails hosting, database hosting, Linux web hosting, Microsoft web hosting, New Zealand ecommerce hosting, New Zealand web hosting for New Zealand small business and New Zealand web hosting for New Zealand medium business.
How to select New Zealand domain?
Each New Zealand domain name is unique with its own reasons and purposes. You can select the New Zealand domain name according to your own favorite, interest, likeness, preference, business's nature, popularity and publicity. You can register New Zealand domain name for your family, new born baby, kids, pets, business, organization, club, interest, hobbies, friend group, etc. It is advisable to choose a user-friendly, remarkable, memorable and unique New Zealand domain name that you like. After you select the New Zealand domain name, you need to start the New Zealand domain search to check the availability of that specific New Zealand domain name. Once you confirm the availability of that specific New Zealand domain name, you can register New Zealand domains and buy New Zealand domain names.
Allactionhost New Zealand provides different New Zealand web hosting services, New Zealand domain name services and comprehensive New Zealand web hosting solutions like New Zealand domain names register for New Zealand company to complete New Zealand register domain names, New Zealand domain names register for New Zealand organization to complete New Zealand register domain names, New Zealand domains register for individual person to do New Zealand register domain names, emails hosting, New Zealand domain name hosting, free domain name, New Zealand domain name search, New Zealand cheap websites hosting by Linux servers, New Zealand ecommerce hosting, New Zealand domain name transfer, New Zealand bulk domains registration for New Zealand company to conduct New Zealand register bulk domains, New Zealand bulk domain names transfer, database hosting, New Zealand domain hosting by Linux server web hosting, New Zealand domains renewal, buy New Zealand bulk domain names, New Zealand bulk domain names registration for individual person to complete register New Zealand bulk domains, WHOIS New Zealand domains search, New Zealand domain hosting by Microsoft Windows server web hosting, New Zealand bulk domains register for New Zealand organization to do register New Zealand bulk domains, New Zealand bulk domain names hosting, Microsoft Windows hosting, New Zealand bulk domain names search, New Zealand bulk domain names renewal, shared server hosting and dedicated server hosting, New Zealand small business web sites hosting and New Zealand medium business web sites hosting.
How to use my registered New Zealand domain name?
Each New Zealand domain name is unique with its own purposes, meaning, functions and reasons. There are numerous ways to use your own New Zealand domain names such as for business or personal use.
1. 1. Use New Zealand domain name on your own New Zealand website.
You can apply your registered New Zealand domain name for your own New Zealand website. Use your own New Zealand domain name to your New Zealand business website that you can upload your New Zealand products, catalog, services, company's profile and contact details so your customers can find you and study your company details online. You can also apply your own New Zealand domain name for your personal New Zealand website that you can upload your photos and video to share with your friends and relatives. You can also upload your own resumes and personal profile for career purposes at your own New Zealand websites.
2. 2. Personalize email address with own New Zealand domain name.
You can use your registered New Zealand domain name for personalize New Zealand email address such as [email protected]. Personalize email address with own New Zealand domain name gives your company creditability and more professional to use your New Zealand company's custom email address.
Allactionhost New Zealand provides New Zealand cheap domain services and New Zealand complete web hosting solutions that you can host your New Zealand website, register New Zealand domains for organization New Zealand domains, register New Zealand domains for individual person to buy New Zealand domains, register New Zealand domains for New Zealand company to buy New Zealand domain name, cheap New Zealand web hosting plans for New Zealand organization web hosting, register New Zealand bulk domains for New Zealand organization to buy New Zealand bulk domains, register New Zealand bulk domains for individual person to buy New Zealand bulk domains, host New Zealand bulk domain names, host New Zealand ecommerce websites, register New Zealand bulk domains for New Zealand company to buy New Zealand bulk domains, host New Zealand domain names by Linux servers, transfer New Zealand domain names for organization New Zealand domain names, host New Zealand domain names by Microsoft Windows servers, dedicated server hosting, transfer New Zealand domain names for personal New Zealand domain names, affordable New Zealand web hosting plans for New Zealand company web hosting, transfer New Zealand domain names for New Zealand company domain names, New Zealand small business web hosting, transfer New Zealand bulk domains for company New Zealand bulk domains, shared sever hosting, transfer New Zealand bulk domains for company New Zealand bulk domains, free domain names, search New Zealand domains, transfer New Zealand bulk domains for organization New Zealand bulk domains, renew New Zealand domains for organization New Zealand domains, New Zealand medium business web hosting, renew New Zealand domains for personal New Zealand domains, renew New Zealand domains for company New Zealand domains, renew New Zealand bulk domains for organization New Zealand bulk domains, renew New Zealand bulk domains for personal New Zealand bulk domains, budget New Zealand web hosting plans for personal New Zealand web hosting and renew New Zealand bulk domains for personal New Zealand bulk domains.
Can I transfer my New Zealand domain name to different New Zealand domain hosting company?
YES! You can transfer your registered New Zealand domain names to any New Zealand domain hosting company. You need to check with the current New Zealand domain hosting company that hosts your New Zealand domain names how to transfer your registered New Zealand domain names.
You can transfer your New Zealand domain names to allactionhost New Zealand, one of the best international and New Zealand domain services providers. We offer New Zealand domains registration for New Zealand company to buy New Zealand domains, New Zealand domains registration for organization to buy New Zealand domains, New Zealand domains registration for individual person to buy New Zealand domain names, New Zealand bulk domains registration for New Zealand company to buy New Zealand bulk domains, WHOIS New Zealand domain search, New Zealand domain hosting for personal domain names, New Zealand bulk domains registration for New Zealand organization to buy New Zealand bulk domains, New Zealand bulk domains registration for individual person to buy New Zealand bulk domains, New Zealand domains renewal for New Zealand company to renew New Zealand domains, New Zealand domains hosting for New Zealand company domains, New Zealand domains renewal for New Zealand organization to renew New Zealand domains, New Zealand domains renewal for personal New Zealand domains, New Zealand bulk domains renewal for company New Zealand bulk domains, New Zealand bulk domains renewal for New Zealand organization to renew New Zealand bulk domains, New Zealand domain names hosting for New Zealand organization domain names, New Zealand bulk domains renewal for personal New Zealand bulk domains, New Zealand domains transfer for company New Zealand domains, New Zealand domains transfer for organization New Zealand domains, New Zealand domains transfer for personal New Zealand domains, New Zealand bulk domains transfer for company New Zealand bulk domains, New Zealand bulk domains transfer for organization to transfer New Zealand bulk domains, New Zealand bulk domains transfer for personal New Zealand bulk domains and New Zealand domain search.
Other than New Zealand domain services, allactionhost New Zealand provides affordable New Zealand web hosting services for our New Zealand customer with technical support and 24/7 New Zealand web hosting services.
Do I need to renew New Zealand domain name that I registered?
You need to renew New Zealand domain name that you registered every year. Allactionhost New Zealand provides New Zealand domain name renewals that you can manage by 'Manage My Domains'.
Allactionhost New Zealand provides 24/7 web hosting and domain services to our New Zealand customers for them to register New Zealand domain name for New Zealand company to buy New Zealand domain name, New Zealand domain hosting for personal New Zealand domain names, register New Zealand domain name for New Zealand company to buy New Zealand domain names, New Zealand domain name hosting for New Zealand company domain names, register New Zealand domain name for New Zealand organization to buy New Zealand domain names, New Zealand domains hosting for New Zealand organization domain name, buy New Zealand ecommerce hosting, register New Zealand bulk domain names for company New Zealand bulk domain names, register New Zealand bulk domain names for company New Zealand bulk domain names, buy New Zealand web hosting packages for New Zealand company websites, New Zealand bulk domains hosting for New Zealand personal New Zealand domain names, domain register New Zealand bulk domain names for organization New Zealand bulk domain names, New Zealand bulk domain names hosting for New Zealand personal bulk domain names, transfer New Zealand domain name for company New Zealand domain name, order New Zealand web hosting by Linux servers webhosting (Unix servers), transfer New Zealand domain name for company New Zealand domain name, transfer New Zealand domain name for organization New Zealand domain name, purchase New Zealand web hosting by Microsoft Windows servers webhosting, New Zealand bulk domain names hosting for New Zealand organizations domains, transfer New Zealand bulk domain names for company New Zealand bulk domain names, transfer New Zealand bulk domain names for company New Zealand bulk domain names, transfer New Zealand bulk domain names for organization New Zealand bulk domain names, renew New Zealand domain name for company New Zealand domain name, renew New Zealand domain name for New Zealand company to renew New Zealand domain names, renew New Zealand domain name for New Zealand organization to renew New Zealand domains, email hosting, database hosting, buy New Zealand web hosting plans for New Zealand personal website, New Zealand multiple site webhosting, renew New Zealand bulk domain names for company New Zealand bulk domain names, renew New Zealand bulk domain names for company New Zealand bulk domain names, renew New Zealand bulk domain names for organization New Zealand bulk domain names, buy New Zealand web hosting plans for New Zealand organization hosting and purchase SSL certificates.
Should I transfer my registered New Zealand domain before I renew the New Zealand domain?
You should transfer your registered New Zealand domain name to the new New Zealand domain hosting company before you proceed New Zealand domain name renewal.
You can transfer your New Zealand domain name to allactionhost New Zealand. Allactionhost New Zealand offers different affordable New Zealand domain hosting plans that will suit your needs and budget. Besides, Allactionhost New Zealand provides web hosting and domain services including register New Zealand domain names for New Zealand organization to buy New Zealand domains, database hosting for New Zealand customers, register New Zealand domain names for New Zealand company to buy New Zealand domains, register New Zealand domain names for individual person to buy New Zealand domain names, New Zealand web hosting plans for New Zealand organization website and domain hosting, register New Zealand bulk domain names for New Zealand organization to do New Zealand register bulk domain names, application hosting for New Zealand customers, register New Zealand bulk domain names for individual person to buy New Zealand bulk domain names, New Zealand multiple website hosting, register New Zealand bulk domain names for New Zealand company to complete New Zealand register bulk domain names, New Zealand web hosting by Microsoft Windows servers hosting, New Zealand multiple websites hosting, transfer New Zealand domain names for organization New Zealand domains, New Zealand web hosting by Linux servers hosting (Unix servers), transfer New Zealand domain names for personal New Zealand domains, New Zealand ecommerce hosting, transfer New Zealand domain names for New Zealand company to transfer New Zealand domains, mail boxes hosting for New Zealand customers, transfer New Zealand bulk domain names for New Zealand organization to complete New Zealand register bulk domain names, SSL certificates, transfer New Zealand bulk domain names for individual person to transfer New Zealand bulk domain names, transfer New Zealand bulk domain names for New Zealand company to transfer New Zealand bulk domain names, New Zealand web hosting plans for New Zealand personal website and domain hosting, renew New Zealand domain names for New Zealand organization to renew New Zealand domain names, New Zealand web hosting plans for hosting of New Zealand company website and domain name, renew New Zealand domain names for individual person to renew New Zealand domains, renew New Zealand domain names for New Zealand company to renew New Zealand domain names, renew New Zealand bulk domain names for organization New Zealand bulk domain names, email hosting for New Zealand customers, renew New Zealand bulk domain names for New Zealand company to renew New Zealand bulk domain names, renew New Zealand bulk domain names for individual person to complete New Zealand bulk domain names renewal and 24/7 New Zealand web hosting.
What is WHOIS New Zealand domain name search?
When you do WHOIS (who is) New Zealand domains search, you can find the information and technical details of that specific New Zealand domain. WHOIS information includes the New Zealand domain name registration date; the owner's name and address of the New Zealand domain name; physical address, contact phone number, and email address of the New Zealand domain's administrator; server settings of the New Zealand domain name; technical details of the New Zealand domain name; and billing contacts of the New Zealand domain name.
You can perform New Zealand domains search and WHOIS New Zealand domain names search at allactionhost New Zealand. Allactionhost New Zealand offers New Zealand web hosting services and New Zealand domains services like New Zealand register domain names for New Zealand company to register New Zealand domain names, New Zealand web hosting by Microsoft Windows servers, New Zealand register domain names for New Zealand organization to register New Zealand domain names, New Zealand web hosting plans for New Zealand organization web hosting, New Zealand register domain names for individual person to register New Zealand domain names, New Zealand ecommerce hosting, New Zealand register bulk domain names for New Zealand company to perform New Zealand register bulk domain names, New Zealand multiple website hosting, New Zealand register bulk domain names for New Zealand organization to perform New Zealand register bulk domain names, New Zealand websites hosting for medium business web hosting, New Zealand register bulk domain names for individual person to buy New Zealand bulk domain names, database hosting, New Zealand transfer domain names for company New Zealand domain names, New Zealand web hosting by Linux servers (Unix servers), New Zealand transfer domain names for organization New Zealand domain names, SSL certificates, application hosting, New Zealand transfer domain names for personal New Zealand domain names, New Zealand transfer bulk domain names for company New Zealand bulk domain names, New Zealand transfer bulk domain names for organization New Zealand bulk domain names, New Zealand transfer bulk domain names for personal New Zealand bulk domain names, New Zealand web hosting packages for New Zealand small business web hosting, New Zealand renew domain names for company New Zealand domain names, New Zealand renew domain names for organization New Zealand domain names, New Zealand renew domain names for individual person to renew New Zealand domains, New Zealand web hosting packages for New Zealand company web hosting, New Zealand renew bulk domain names for company New Zealand bulk domain names, New Zealand web hosting plans for New Zealand personal web hosting, free domains, email hosting, New Zealand renew bulk domain names for New Zealand organization to renew New Zealand bulk domain names, mail boxes hosting and New Zealand renew bulk domain names for personal New Zealand bulk domain names.
What is New Zealand domain name hosting?
New Zealand domain name hosting is to host New Zealand domain name for individuals, companies, and organization. It is also known as New Zealand domain hosting or DNS hosting. After you register New Zealand domain name, it is necessary for you to a New Zealand web hosting provider with New Zealand domain hosting to host your own New Zealand domain name.
Allactionhost New Zealand provides complete New Zealand domain services for our New Zealand customers such as New Zealand domain hosting for New Zealand company to host New Zealand domain names, New Zealand domain names registration for New Zealand company to buy New Zealand domain names, New Zealand bulk domain names transfer for New Zealand company to transfer New Zealand bulk domain names, New Zealand domain names renewal for company New Zealand domain names, New Zealand bulk domain names renewal for New Zealand company to renew New Zealand bulk domain names, New Zealand domain names transfer for company New Zealand domain names, New Zealand bulk domain names registration for New Zealand company to buy New Zealand bulk domain names, New Zealand domain names hosting for New Zealand organization to host New Zealand domain names, New Zealand bulk domain names registration for New Zealand organization to buy New Zealand bulk domain names, New Zealand domain names registration for New Zealand organization to buy New Zealand domain names, New Zealand domain names renewal for New Zealand organization to renew New Zealand domain names, New Zealand bulk domain names transfer for organization New Zealand bulk domain names, New Zealand domain names transfer for organization New Zealand domain names, New Zealand bulk domain names renewal for New Zealand organization to renew New Zealand bulk domain names, New Zealand domains hosting for individual person to host New Zealand domain names, New Zealand bulk domain names registration for individual person to host New Zealand bulk domain names, New Zealand domain names transfer for personal New Zealand domain names, New Zealand bulk domain names transfer for personal New Zealand bulk domain names, New Zealand domain names registration for individual person to buy New Zealand domain names, New Zealand domain names renewal for individual person to renew New Zealand domain names, New Zealand bulk domain names renewal for personal New Zealand bulk domain names, free domain name, New Zealand domain search and WHOIS New Zealand domain names search.
Allactionhost New Zealand also provide New Zealand web hosting services and complete New Zealand web hosting solutions such as New Zealand web hosting plans for New Zealand personal web hosting, mail boxes hosting, email hosting, New Zealand web hosting by Linux servers (Unix servers), New Zealand ecommerce hosting, New Zealand web hosting plans for New Zealand company web hosting, New Zealand multiple website hosting, New Zealand web hosting by Microsoft Windows servers, New Zealand web hosting plans for New Zealand organization web hosting, SSL certificates, application hosting and database hosting.
Useful Website Hosting Information : What is New Zealand Domain name? Why do I need New Zealand Domain for my New Zealand website? How to select New Zealand domain? How to use my registered New Zealand domain name? Can I transfer my New Zealand domain name to different New Zealand domain hosting company? Do I need to renew New Zealand domain name that I registered? Should I transfer my registered New Zealand domain before I renew the New Zealand domain? What is WHOIS New Zealand domain name search? What is New Zealand domain name hosting? | 2019-04-25T14:29:47 | http://www.allactionhost.com/en-nz/domains |
0.999719 | Question: We have a high deductible health plan (HDHP) with an imbedded deductible of $2,000 and a $4,000 maximum, meaning each person has to meet an individual deductible. Would an employee be able to contribute the single maximum to his or her health savings account (HSA) even though he or she has family coverage in this case?
Minimum annual deductible, self-only coverage — 2015: $1,300; 2014: $1,250.
Minimum annual deductible, family coverage — 2015: $2,600; 2014: $2,500.
Maximum out-of-pocket limit, self-only coverage — 2015: $6,450; 2014: $6,350.
Maximum out-of-pocket limit, family coverage — 2015: $12,900; 2014: $12,700.
Regarding your question, if the HDHP begins paying benefits for any family member (including the employee) after the person satisfies $2,000 of the annual deductible, the HDHP is not a qualifying HDHP. Taxpayers (employees) enrolled in non-qualifying HDHPs are not eligible to make HSA contributions (or to have employer HSA contributions made on their behalf).
Family plans that do not meet the high deductible rules. There are some family plans that have deductibles for both the family as a whole and for individual family members. Under these plans, if you meet the individual deductible for one family member, you do not have to meet the higher annual deductible amount for the family. If either the deductible for the family as a whole or the deductible for an individual family member is below the minimum annual deductible for family coverage, the plan does not qualify as an HDHP.
Example: You have family health insurance coverage in 2012. The annual deductible for the family plan is $3,500. This plan also has an individual deductible of $1,500 for each family member. The plan does not qualify as an HDHP because the deductible for an individual family member is below the minimum annual deductible ($2,400) for family coverage. | 2019-04-21T14:05:17 | https://www.thinkhr.com/blog/from-the-hotline-hsa-individual-deductible/ |
0.998906 | Looking for a little advice on my extremely young, ambitious and arguably naive idea..
I have an idea in which I would love to pursue but I need to find the right locations on extending my knowledge and where to look for this knowledge, any opinions on the idea itself are of course welcome - burn my idea down to the ground if you will! I must know the flaws/big hurdles. Suggestions of type of people to recruit would also be of use..
I'd like to create a platform which promotes people to become prosumers of energy, renewable energy. Enabling people to buy/sell electrons in real time. I want this platform to encourage the adoption of renewables within households and encourage the creation of smart micro grids and all the suppliers of renewable energy systems, smart metres, batteries, ect. From an app, you can monitor your energy trading, this app being on the blockchain network (bringing all the benefits everyone is already aware of). Wrapped around this app would be some sort of artificial intelligence (a loose term I know) but some sort of algorithm, that if the prosumer so wishes, to allow to control their energy trade. For example, predicting future energy consumption within your household, and energy consumption of neighbours, allow energy to be bought and sold at the most efficient times. For example, if you're going on vacation you can sell all your energy to others, earning £££ whilst you're away. This platform would be in connection to the prosumers smart metre and hopefully one day the prosumers household battery (E.g. Tesla Powerwall) should the future bend this way..
I remember some chats around this exact idea in 2014... Check this: http://gridsingularity.com/ http://www.electron.org.uk https://powerledger.io I'm sure there are more projects working around this idea. They are in early stage prototypes usually, but in 2014 it was just thoughts. Now it starts to become a reality.
Yes there's a few energy market projects and at least on that has transacted on the live chain with live power. | 2019-04-22T14:07:04 | https://forum.ethereum.org/discussion/comment/68728/ |
0.999939 | How to check 3D congruence by comparing the shape of "elements-lines"
Regard a straight line from somewhere near the center of the shell to the outline to mark out the place of an "element".
The isoline drawings on the following pages have been completed with a number of such "elements". Equal numbers show where equal "elements" where found on both "upper" and "lower" parts of the arching.
To find out where equal "elements" are positioned one has to start marking out the place for one of them by drawing a straight line (marking out the place of the cross section to be checked). The location of an other one has to be searched for. The cross sectional shape of elements are equal when the distances between a number of intersection points with the isolines following on each other coincid with those already marked on the paper. Each isoline represent a very special height on the surface of the shell. The arcshape of an "element" that can be constructed is determined by the location of the intersection points of "the element line" with the "isolines".
1. Hold a piece of paper close to a drawn "element line" and mark the points of intersecting isolines on the edge of the paper.
2. Move the edge of the piece of paper around the isoline drawing in order to find the place where these marks coincid (intersect) with the isolines. When this happens an equal "element" has been found.
It is possible to find an almost countless number of such congruent pair of "element-lines" based upon the 3D geometry described on the previous pages.
This figure has no real violin isoline layout. It's only shown to illustrate the "element" congruence more obvious.
The figure shows the iso line layout for a computer calculated arching shape with equal width for "upper and "lower" part.
There is complete congruence of shape in each quarter (90 dgre sectors). The layout is completed with "elements" (straight lines) marking the place of 3 different cross sections in each quarter, which are equal in shape (congruent).
The figure shows computer calculated "iso lines" based upon the described 2D and 3D geometry, after the rotation of the main geometric layouts have taken place.
These iso lines are comparable to the measured ones by Möckel. (Stradivarius and Guarnmeri del Gesu).
The straight (1...4) equal numbered "elements" mark the exact places on the arching surface that are congruent. So the number 2 "elements" in the "upper part " are congruent to the number 2 in the "lower part" in spite of a different (wider-smaller) layout of the isolines.
The left figure shows the measured belly in its state of condition. In spite of the hand made shape it is easy to find congruent "elements" in and between both "upper" and "lower" part of the arching, here marked with equal line numbers.
The right figure shows the measured back in its state of condition.
This figure shows Sacconis attemt to construct a 3D model by 2D geometric layout for a "belly" arching shape .
It seems obvious that it is a 2D-construction since all intersection points are positioned on circular arcs intersecting straight lines.
The figure is divided into 4 sectors marked by the 4 congruent shaped "elements" on the surface. Within the waist sector circumscribed by these 4 element lines there is complete congruence of shape not only comparing left and right but also up and down.. The dividing angle marksout the image line of the congruent picture.
It is not possible to find any connection between the "upper" and "lower" sectors.
The center of the "element" image is not in the center of the arching shape.
No equal "elements" can be found covering the "upper" and "lower" parts of the shell. Only a limited sector in the "waist" has this quality.
This figure shows Sacconis attemt to construct a 3D model by 2D geometric layouts for a "back" arching shape of an average Stradivarius violin.
The picture is divided into 4 sectors marked by the 4 congruent shaped "beams" on the surface. Within the waist sector circumscribed by these 4 line there is complete congruence of shape not only comparing left and right but also up and down.. The dividing angle marks out the image line of the congruent picture. | 2019-04-20T04:17:33 | http://www.zuger.se/construction%20isoline.html |
0.999969 | Этинилэстрадиол and breastfeeding. Are they compatible?
Этинилэстрадиол is Ethinylestradiol in Cyrillic. | 2019-04-18T20:33:04 | http://e-lactancia.org/breastfeeding/etinilestradiol/writing/ |
0.999979 | Swedish actress Alicia Vikander has revealed she once received a letter from a 12-year-old fan that was ''drenched in perfume''.
Alicia Vikander once received a fan letter that was ''drenched in perfume''.
The 29-year-old actress - who is married to fellow Hollywood star Michael Fassbender - has revealed that the weirdest gift she's ever received from a fan came from a 12-year-old male admirer, who admitted she made him feel ''funny inside''.
Despite this, Alicia has also admitted to having behaved in a peculiar fashion in the presence of one of her own celebrity heroes, French actress Isabelle Huppert.
Asked if she's ever freaked out about meeting another celebrity, the Academy Award-winning star confessed to BuzzFeed: ''Yes, I have! I met Isabelle Huppert at the Oscars, and I was with one of my best girlfriends who was next to me, and she was like, 'Oh my God, you literally couldn't get a word out.' I was so nervous, but she was very sweet.
Meanwhile, Alicia recently revealed her love for the 'Tomb Raider' video games, admitting she would lose track of time as she tried to navigate her way to the end.
The Swedish star said: ''I went back and played the rebooted [Lara Croft] games now, before making this film, and I was really excited. | 2019-04-18T16:22:21 | http://www.contactmusic.net/alicia-vikander/news/alicia-vikander-received-a-fan-letter-drenched-in-perfume_6030520 |
0.998956 | Beijing has been issued its first ever red alert over smog levels, with schools closing and construction work put on hold. Expected to continue for the next three days, it's the highest warning level possible for pollution at more than 24 times safe levels.
The pollution levels in Chinese cities have been high for several years -- Zhong Nanshan, president of the Chinese Medical Association, warned that air pollution could become China's biggest issue back in 2012. But why exactly is pollution so bad in China? And what steps are being taken to combat the issue?
Pollution is measured by levels of 'PM' -- particulate matter. PM is a microscopic matter suspended in the atmosphere, mainly generated by coal combustion in power plants, the heating of homes and energy supplies. The specific type of PM so prevalent in Beijing is called PM 2.5, particulate matter with a diameter of 2.5 micrometers or less. The fine particles of PM 2.5 are considered particularly dangerous because, once inhaled, they sit deep inside the lungs.
China's air pollution problem has a number of causes: coal-burning power stations, construction sites and car emissions. The climate in the region doesn't help either -- often humid and with little wind, which further aggravates the pollution problem.
High levels of pollution can cause a broad range of health issue -- respiratory problems like asthma and bronchitis, shortness of breath and painful breathing. More serious conditions such as lung cancer and heart disease have also been linked to pollution.
Cancer Research UK describes air pollution as being "associated with an increased risk of lung cancer". The charity also cites the International Agency for Research on Cancer, which stated in 2013 that outdoor pollution can cause cancer. And PM 2.5, which is so prevalent in Chinese cities, was also found to cause cancer. The youngest victim of lung cancer in China was only eight years old -- a diagnosis that was attributed to air pollution.
A study by Berkeley Earth claimed that air pollution in China kills around 4,000 people per day -- that's 17 percent of all deaths in China. Linking causes of death to pollution is complicated, however -- many diseases linked to poor air quality are prevalent even without the added pollution.
Back in 2012, Nanshan stressed that further transparency was needed, urging the Chinese government to invest in more research. And steps have been taken to address the problem. Sulphur dioxide emissions and acid rainfall have fallen in frequency and severity after power plants were required to adopt new technology in 2006. And, in Beijing, cars with odd and even number plates can be banned from driving on consecutive days.
Smaller sanctions have been put into place, too -- in September 2015 Beijing's industrial facilities were shut down and cars banned from the road in order to celebrate the anniversary of the end of World War II.
Nicknamed 'Parade Blue', the aim was to achieve perfectly blue skies before a parade took place -- and it worked. Whether or not the Chinese government will choose to put such sanctions in place permanently is yet to be seen. | 2019-04-21T01:22:32 | https://www.wired.co.uk/article/beijing-smog-red-alert-pollution-china |
0.999937 | I'm thinking about how large exchanges handles customer deposits, it appears there are two available solutions, one is to use external notification apis, like blockchain.info 's notification api, another is run a full node and use the walletnotify feature. Since the first approach brings dependency to an third party service, also, it does not support testnet notification, which we use during development, so I'm trying to run a full node. My question is how scalable is it? Suppose there are 10,000 users, and platform must support add more addresses for a user, say in average each user generate 10 addresses, that's 100,000 address to watch. If I add those 100,000 address as watch only to the full node and enables walletnotify, is that a good way to handle it? Will there be any technical issues?
Using walletnotify has proven to work and is used by a lot of scalable apps today. I would not rely on it completely though. walletnotify's job is to execute a shell command every time it receives a wallet transaction. This means data is flowing between processes, which does not make me entirely comfortable as a developer. After all, it only takes one error for someone to be missing their funds.
I would recommend not only using walletnotify, but to also check X blocks after Y minutes. You can keep track of blocks passed and if any transactions were not processed by walletnotify, your cronjob of checking transactions will recover the transaction. You can use listsinceblock RPC command and keep track of the block height each time you check transactions. You could store transactions processed in a DB somewhere.
After all, this is a financial application so I think a backup check is vital.
Probably there's no technical problems and its highly depending on your server.
if your server is having no issues so nothing to worry about.
I have tried to send 1000 request to bitcoin-core server in the same time with a basic server and everything is worked great.
Also you can get like more than one bitcoin core server and deal the requests to these servers.
Since the time taken to process a given request will be greater than zero milliseconds, there will come a point where enough requests will result in the CPU reaching 100% utilisation, or you might hit I/O or network bounds first, but in whatever case when you find a bottleneck what you will need to do is split the workload up among multiple machines using some sort of load balancing schema.
Not the answer you're looking for? Browse other questions tagged transactions wallet full-node wallet-notify or ask your own question.
Running a Full Node through VPN?
Should I use a full node as my main wallet?
Can a bad actor omit an unspent address from a pruned chain?
Which cryptocurrency server software supports the walletnotify feature?
How can a pruned node be classed a full node without the full blockchain? | 2019-04-22T04:29:36 | https://bitcoin.stackexchange.com/questions/63505/how-is-scalability-of-walletnotify-of-the-full-node-wallet |
0.998378 | On June 8, 2017, I was part of a Roundtable at the Conference #NudgeInFrance held in Paris by Nudge France on 'The Limits of Nudge: Ethics & Manipulation'. Together with Cass Sunstein, Anne-Lise Sibony and Mariam Chammat we had a lively discussion led by Elsa Savourey from NudgeFrance. Prior to the panel we were send some questions for reflections, my notes on which I thought was worth sharing for those who couldn't attend, or was too busy listening to make their own notes. The notes will be shared over the next couple of days.
Elsa: As an introductory question: is nudge always “for good”? Are there nudges "for bad"? Are such considerations in relation to good or bad nudges integrated in the definition of what is a nudge?
Pelle: A nudge is defined as a psychological function of any attempt at influencing people’s judgment, choice or behaviour in a predictable way, that is (1) made possible because of cognitive limitations, biases, routines, and habits in individual and social decision-making posing barriers for people to perform rationally in their own self-declared interests, and which (2) works by making use of those limitations, biases, routines, and habits as integral parts of such attempts, see (Hansen 2016). In particular, this implies that a nudge is intended to cause a behavioural effect independently of (i) forbidding or adding any rationally relevant choice options; (ii) changing incentives, whether regarded in terms of time, trouble, social sanctions, economic and so forth, or (iii) providing hitherto unkown factual information and rational argumentation.
From this it is seen that the definition does not imply any normative criteria for an aspect of an intervention to qualify as a nudge. It includes interventions that may usually be evaluated as “nudges for good”, e.g. decreasing the unit size of cakes served at a buffet to reduce intake of sugar and fat; as well as interventions that may usually be evaluated as “for bad”, e.g. increasing the unit size of cakes served at a buffet to increase intake of sugar and fat. Both interventions utilize behaviour changing functions that qualify as nudges.
Elsa: Nudge plays to mostly unconscious factors. Aren't people who are nudged just manipulated into a given choice?
Pelle: First, I have to say that I’m not sure that I agree with the premise of this question. I think it is a widespread misunderstanding that Nudges mostly play on unconscious factors. It’s not a coincidence that many people tend to think this. First of all, many academics talk straightforward about cognitive bias and heuristics as unconsciously influencing our behaviour. Second, some of the most memorable behavioural insights from behavioural economics and cognitive- and social psychology are those that really surprise and fascinate us – and those insights that really surprise and fascinate us are typically those that influences our behaviour in a way we may label “unconscious”. Hence, due to availability bias, they are the examples that come to our mind when we happen to think about what characterizes nudges.
However, from a scientific point of view we should be more careful when we describe how nudges work. As Cass described it in his keynote, dual process theories often explain their findings in terms of system 1 and system 2 cognitive processes. System 2 processes are what we call ‘reflective’, and as such they are consciously accessible to our inner experience by definition. This leads many people to believe that System 1 processes must be unconscious. But if you listened carefully to Cass he did not characterise system 1 processes as unconscious as such, but – quite correctly – characterized system 1 processes as automatic and intuitive, where automatic means non-intentional. And here is the important point: that cognitive processes are automatic and intuitive doesn’t imply that they are unconscious in the sense that they are invisible to our ‘inner eye’.
The substitution heuristic provides an example of this. We often answer a complex question by answering a similar, but simpler one. On an everyday basis this usually works quite fine for our purposes, but it always comes at the cost of precision and correctness. Now, while the substitution heuristic is automatic, we can actually recognise it from our experience; and knowing of the heuristic and attending to our thinking we may even experience it as it happens and decide to reject the result of our own thinking. It’s not that it’s possible for us to do this all the time. It requires way too much effort and attention. But it is possible, which shows us, that we can actually experience, monitor and sometimes even override some of our automatic processes. They are not necessarily ‘unconscious’, but they are often non-conscious.
So that was the premise. What about the question? "Aren't people who are nudged just manipulated into a given choice?"
Now, we just drew a distinction between automatic and reflective processes based on Kahneman’s Dual Systems Theory. Following our earlier paper “Nudge and The Manipulation of Choice” (Hansen & Jespersen 2013) this distinction may also be used to distinguish between ‘choices’ and ‘behaviour’, such that choices are by necessity behaviours resulting from reflective processes, while behaviours caused mainly by automatic processes cannot be described as such (even though this is usually done in the micro-economic lingo that underpins most discussions of nudges and behavioural insights).
Of course, this is a conceptual distinction and thus it runs the danger of simplifying too much. Yet, I believe that it does improve what we can articulate about the ethics of nudge, since this distinction makes it clear that not all nudges are aimed at influencing choices as such.
From an ethical perspective this is an important point. Core concepts of ethics such as ‘responsibility’ presuppose agency and are thus tied to the category of choices. From an ethical point of view then, nudges aimed at influencing choices should be carefully considered as they result in those nudged obtaining responsibilities. In particular, if nudges are about manipulation, then we have a problem since this would mean that we could be manipulating people into making choices for which they, and not us, have the responsibility. Yet, it should be noticed from the outset, that nudges aimed at influencing choices, although most relevant from an ethical point of view, are only a sub-category of nudges aimed at influencing behaviours more generally and as such any conclusions pertaining to the former does not necessarily generalise to the latter.
Still, the main question hinges on whether nudges are manipulative as such. In order to answer that question we need to draw an additional distinction.
This is the distinction between what we have called epistemic transparent and non-transparent nudges; a distinction aimed at distinguishing between the manipulative uses of nudges from other types of uses, see (Hansen & Jespersen 2013). Also, it is coined to capture the general intuition referred to by Thaler and Sunstein’s when they say that an attempt at influencing other people’s behaviour, including choices, may be objectionable, “because it is invisible and thus impossible to monitor” (Thaler & Sunstein 2008, 246).
how is the intervention supposed to nudge my behaviour ( that is the transparency of the individual nudge function as a means).
A non-transparent nudge, on the other hand, will be defined as a nudge working in a way that those nudged cannot reconstruct the architect, intention, or the means by which behavioural change is pursued.
A couple of points for those of you who want to dig further into this definition: The notion of transparency defined here is very close to what Luc Bovens refers to as “token interference transparency” in (Bovens 2008) although the present notion is more specific. Also, for those of you interested in ethics and philosophy, you may notice, that since subjects should be able to infer these three things as a result of the intervention, a transparent nudge is defined in such a way that it qualifies as a basic speech act providing what (Austin 1962) called ‘uptake’. Finally, for those of you more interested in ethics and the applied aspects of behavioural science, you should notice that epistemic transparency may vary according to the epistemic competencies of those nudged, i.e. epistemic transparency is defined as an empirical, and not a normative concept.
Returning to the argument: defined as such, a transparent nudge is by necessity not a case of manipulation, when we understand by “manipulation” the psychological sense of the concept that is relevant for a discussion of ethics; that is, manipulation in the sense of intending to change the perception, choices or behaviour of others through underhanded deceptive, or even abusive tactics.
Thus, to the extent that a nudge is transparent people are not being manipulated into a behaviour, let alone a choice.
Elsa: How then do we determine whether a nudge is ethical or not?
The answer to this question will be posted in the near future. Sign up for news, if you don't want to miss it.
Austin, J.L. (1962) How to Do Things With Words. Cambridge (Mass.) 1962, paperback: Harvard University Press, 2nd edition, 2005.
Luc Bovens (2008) 'The Ethics of Nudge', in Till Grüne-Yanoff and Sven O. Hansson (eds) Preference Change: Approaches from Philosophy, Economics and Psychology (Berlin and New York: Springer, Theo- ry and Decision Library A, 2008). | 2019-04-26T08:16:49 | https://www.pelleonline.org/behaviour/notes-on-the-limits-of-nudge-ethics-manipulation |
0.999538 | Thaw pastry according to package instructions. Preheat oven to 400°F. Line 2 baking trays with parchment paper and set aside.
In a medium sized bowl, stir together 1/2 cup cream cheese, bacon, herbs, garlic and jalapenos; season with salt and pepper to taste.
Dust your work surface with flour, roll out first pastry block into a 9 x 9-inch square. Cut pastry into 12, 3x 3-inch squares. Cut each square on a diagonal into triangles.
Fill the center of each triangle with 1 tsp. of jalapeno mixture. Starting from the top of the triangle, fold pastry over filling and fold sides towards the center. Close and seal any holes in the pastry. Pinch sides to create a football shape. Transfer to lined tray.
Bake for 12-15 minutes until puffed and golden. Repeat steps with second pastry block while pastry is baking.
Warm 3 tbsp. cream cheese and pipe laces onto baked pastry. Serve warm and enjoy! | 2019-04-20T10:44:29 | https://tenderflake.ca/recipe/jalape%C3%B1o-pastry-poppers |
0.999729 | There are a number of ways to improve the performance of LINQ to SQL queries.
You might wonder what happens in a multithreaded environment. What if two threads (e.g., from two different client requests) instantiate their own instances of MyDataContext and start executing queries at the same time? Fortunately, everything works correctly because MetaModel instances are thread-safe. I've used this technique in a large CRM application that uses LINQ to SQL almost entirely for data access: the system has over 500 users and has been running without trouble since early 2008. (Without this optimization, some queries were simply too slow for LINQ to SQL to be viable).
Note that although MetaModel (MappingSource) instances are thread-safe, the same is not true for DataContext instances. You cannot share a single DataContext instance between multiple threads, or things will go terribly wrong! (And not that you'd want to: doing so would mean taking on unpleasant concurrency issues that are otherwise handled very well by SQL Server itself, through its transaction isolation level semantics).
Ordinarily, LINQ to SQL must translate LINQ queries to SQL every time a query executes; this involves recursing the expression tree that makes up the query in several stages. It sounds worse than it is: the computation cost is not enormous in the overall scheme of things (certainly not as big as the cost of building an AttributeMappingSource when lots of entities are involved). Nonetheless, you can avoid paying the price on each query execution by precompiling the query using the CompiledQuery class.
Finally, there are some queries for which LINQ to SQL producesless-than-ideal SQL. Furthermore, some SQL queries need optimization hints to get the best performance, and optimization hints are impossible with LINQ to SQL alone. A compromise in these situations is to encapsulate the difficult part of the query in a table-valued function, and then map this function into your typed DataContext class. You can then run LINQ queries over this function, and the queries will be translated to SQL and execute on the server. So, in effect, you're mix SQL and LINQ to SQL in the same query. | 2019-04-21T00:54:06 | http://www.albahari.com/nutshell/speedinguplinqtosql.aspx |
0.999278 | Ends up Throwing error on OfType()0Is a WCF service right for my requirements?0WCF Webhook Service, How to convert POST message stream into useful data?0IIS returns 404 on WCF Actions Hot Network Is there any alternative to the "sed -i" command in Solaris? It will give you a hint of which tokens the parser was expecting. I've found yy_stack_print but it only prints numbers and requires 2 arguments which I don't how how to obtain.
The syntax is as follows: php artisan route:list [options] share|improve this answer answered Oct 12 '15 at 11:00 Tim 3,9221948 add a comment| up vote 0 down vote Get current route You signed out in another tab or window. Join them; it only takes a minute: Sign up How to use yyerror to tell more about parsing errors up vote 2 down vote favorite 1 So I've written all the When must I use #!/bin/bash and when #!/bin/sh?
Why is the spacesuit design so strange in Sunshine? The reason for that is you usually need files and line numbers when doing BDD/TDD. collectd member tokkee commented Apr 14, 2015 You will need bison (instead of byacc) when building from a Git checkout. This happens when the input contains constructions that are very deeply nested.
Traditionally yyerror returns an int that is always ignored, but this is purely for historical reasons, and void is preferable since it more accurately describes the return type for yyerror. Why does the material for space elevators have to be really strong? What is that the specific meaning of "Everyone, but everyone, will be there."? The first step compiles the extra information into the grammar; the second step enables the output.
What's the difference between continuous and piecewise continuous functions? An action in the grammar can also explicitly proclaim an error, using the macro YYERROR (see section Special Features for Use in Actions). Logical fallacy: X is bad, Y is worse, thus X is not bad With the passing of Thai King Bhumibol, are there any customs/etiquette as a traveler I should be aware In the terminal you do not such a request.
Now off to try it! asked 4 years ago viewed 4381 times active 3 years ago Related 3Is there rule of thumb for catching errors in Lex/Yacc parsing?2How to make Bison not exit when it calls Next: Action Features, Previous: Lexical, Up: Interface [Contents][Index] www.delorie.com/gnu/docs/bison/bison_76.html search Buy the book! How do computers remember where they store things?
Join them; it only takes a minute: Sign up Bison error output up vote 2 down vote favorite I'm using Bison and I've generated a quite complex grammar. Cyberpunk story: Black samurai, skateboarding courier, Mafia selling pizza and Sumerian goddess as a computer virus Translating "machines" and "people" Possible battery solutions for 1000mAh capacity and >10 year life? Unless POSIX and Yacc portability matter to you, this is the preferred solution. In the United States is racial, ethnic, or national preference an acceptable hiring practice for departments or companies in some situations?
The parser can detect one other kind of error: memory exhaustion. share|improve this answer answered Aug 4 '11 at 21:50 Alek 2,4161332 add a comment| up vote 2 down vote If you set the global variable yydebug to a nonzero value, bison share|improve this answer answered Oct 12 '15 at 7:47 Viktor 349115 You're probably right that that is the mistake I'm making somewhere in my code, but I want Artisan I am making absolutely no actions when a grammar is encountered.
Why would a password requirement prohibit a number in the last character? When you participate in BDD you actually want to watch the bindings fail first. If you are not afraid to use possible-changing internals, you can access the parser state stack via the yyss(topmost) and yyssp(current item) variables, the value stack is represented by the yyvs Truth in numbers How would they learn astronomy, those who don't see the stars?
Already have an account? Terms Privacy Security Status Help You can't perform that action at this time. Obviously, in location tracking pure parsers, yyerror should have an access to the current location. What does a well diversified self-managed investment portfolio look like?
What sense of "hack" is involved in five hacks for using coffee filters? Terms Privacy Security Status Help You can't perform that action at this time. From the Bison 2.4.3 manual: §8.2 Tracing Your Parser If a Bison grammar compiles properly but doesn’t do what you want when it runs, the yydebug parser-trace feature can help you Is there any way to ask Bison to output the rule that failed to match and the token that is a problem?
One is to instrument your lexical analyzer so it prints out the tokens it finds as it returns them to the parser proper. the option -t, --debug Use the -t option when you run Bison (see Chapter 9 [Invoking Bison], page 117). There are several means to enable compilation of trace facilities: the macro YYDEBUG Define the macro YYDEBUG to a nonzero value when you compile the parser. | 2019-04-24T00:29:37 | http://new-contents.com/Texas/error-verbose.html |
0.992093 | This project came out of an interest in developing bird monitoring devices which could be set out in the field in a similar manner to trail cameras, but instead of recording images they would record sound. Physically, devices like this already exist, but at the time we started this there was not anything commercially available to accurately analyze the recorded data algorithmically. Ultimately we were interested in classifying such recordings in two ways: what (in particular what birds) are making sounds, and where was the sound being made. This part of the project is an attempt at the latter classification.
The sound data I am working with was created by a friend. He set two microphones one meter apart from each other, then moved along a grid playing a recorded robin call at each grid point. I do not currently have the true classifications of the location of each call, but knowing the general setup have been attempting to see if I can find techniques that result in plausible locations.
This python script is a work in progress - eventually I would like it to do a rudimentary job of determining location information of sounds from stereo recordings. Currently it needs more refining and testing. The script makes use of several python libraries including scipy and sci-kits.audiolab. Since I am still working out the details, there are a couple of small things hard-coded in the script that should be adjusted if it were to be run fresh and/or with different audio files.
A recording my friend Hugh created for testing/developing the script. Recorded with two microphones 1 meter apart, he moved along a grid in a room playing a recorded robin call at each grid point.
So far I have spent most of my time on this project trying to develop a sense of how the signals change as the location of the calls vary. My first attempts were based on the idea that the sound would be reaching the two microphones at different times and so if I compared the correlation between the signals and varied the offset of one of the channels, there should be a higher correlation at the offset corresponding to the difference in distances between the microphones and the sound source.
Below are charts showing the results of the process on sounds from several different grid points. I varied the offsets through a range that should encompass the maximum possible range of offsets given that the microphones were 1 meter apart. I am not sure yet how this data should be interpreted. I believe repeating this process with a new set of recordings should help show what patterns may be useful. For instance: Is the shape of how the correlations change with offsets useful? Why does the correlation vary with that frequency? Does the peak correlation correspond accurately to the actual distance offset of the sound with respect to the microphones?
While trying to determine whether this approach would be useful, I was curious to see how the shift in offsets would effect how I experienced the sounds. While listening to the unprocessed recording, I was able to hear changes in the location of the sound as it moved through the different grid points. What would happen if I took the left and right channels and offset them programmatically? It turns out that by shifting the offsets and re-playing, I was unable to detect much of a difference. However, I repeated the experiment but adjusted the volume of the channels without adjusting the offset. With adjusted volumes I did perceive a difference in where it seemed like the sound originated. This suggests that comparing relative volume of the channels may be a good alternate strategy for locating the sound position.
Correlation comparison experiments: What do the correlation graphs look like when correlating a channel offset against itself? | 2019-04-23T22:03:32 | http://jrgoff.com/programming/sound_finder/soundfinder.html |
0.999331 | For the purpose of this article, I am only looking into the meter-less M3, M2 and M4 (not the M4-2/P). The later film M's (5, 6, 7 and MP) are also not considered here. For me, the "classic" M-Leica's were the M3, M2 and M4 proper. Many swear by the M6 and MP (out of my league), of course, but I had decided they are not for me. The M5 was poorly made by Leica standards, and I feel the M4-2 and M4-P are subpar to the M4. As many will tell you though, there are no bad Leica's - so keep that in mind too.
There is so much buzz out there about models and the serial numbers attached to them. There is a lot to this, as some have different options based on year - and as you'll see, serial numbers cross many models. I use the Camera Quest site to get an idea when the camera was actually built, then correlate that too what was good/bad about those years. But for a brief history, here's a very high level run-down of model, years, viewfinder stats and serial start numbers to approximate end.
Frame Selector Lever - added in 1955 to the M3 serial 785,801 and up.
Button Rewind - Early M2's had a button rewind (to release the spool) and no self-timer. M2 serials 947,501 and up were updated to have a lever release and timer.
Black Paint - The M2/M3 mainly came in chromed brass. Only a handful of black paint variations were ever released.
That's a myth. People will try to charge you more, saying Leica was at the peak of their craftsmanship, but that is complete hogwash. In my research, I was considering the full span of 1954-1975 serials.
CLA (Clean, Lube, Adjust) - you can have a local (trusted) shop do this in the $100-$200 range.
Black Repaint - A popular thing to do with these old Leica's is to get them repainted. I was really interested in this as well - but boy, does this pack on a premium price. An M3 in chrome, no CLA goes for $500-$700. If it's been repainted, you suddenly are looking at the $1600-$2400 range. Add a CLA and it goes up again. You can have a repaint done on your own from a trusted specialist - but expect a 6-9 month turn around. Yes, that was in months. It'll cost you around $650-$850 to have it properly repainted (de-chromed, de-dinged?) - but that's a hell of a lot cheaper than getting one already done.
Original Black Paint - You are going to spend over $10,000 for this. There were only a handful of M2/M3's made in black paint and they are rare to come by.
Leatherette - some real beaters have it completely missing. You can do it yourself for $15 (leatherette) to $50 (real leather) to $75 (exotic animal leather) - so no need to send out for this service.
L Seal - this is a little seal on the top screw of the mount with an "L" on it. This means the camera is in original condition - the way it left the factory. This is one you do not replace. It's a mark of authenticity of condition.
Finder Window - Yep, even these can be replaced / upgraded and are usually noted. If the one you are considering has a cracked / dim finder, check out the cost to fix. It may be less than you think.
Curtain - You do want to make sure this is in good shape. They are about $80-$100 to replace.
If you pick up a fixer-upper for say, $500, get it repainted for $750, then CLA'd for another $100 - you're looking at $1350 (and a 6-9 month wait). If you want it now, be prepared to spend over $2000 for a complete proper repaint and CLA. Or just CLA it and you're all in for a $500-$700 range. Remember, some of these have been sitting for years, so I highly recommend at least a CLA.
For my latest purchase, I went with a 1961 M3 in excellent mechanical condition and, aside from the leather (see image above), virtually ding-free. Mr. Ye is performing a complete refurbish to body, glass and leather as well as the full CLA (no paint). I'll show you the finished product when it comes in next week - but I basically picked this up for a song.
OK, so now you know what to look for. So, where do you find it? You can walk into a local shop - and they may have one there. Awesome! This is the best of all worlds as you can hold it, hug it, shoot it, and see what you are really dealing with.
I also find it much easier to haggle with someone in person. I've used Green Mountain Photo of Vermont (Leica M2) and Hunt's Photo NH (Hasselblad 500c) with great success. My new local friend is Youxin Ye of YYe Camera (Leica M3) out of MA.
Then there are the large online sellers, like B&H, KEH, Camera West and Tamarkin to name a few. I've used them all at one point and you can really get some nice deals. I spent a lot of evenings on their sites, watching the "new" vintage M's roll in and drooling over all the variations.
I would check these lists first thing in the morning, on lunch and after work, hoping to catch something perfect. I tend to stick to "Buy it Now" as the auctions can be tedious and annoying for me. But this is where I also began to notice the trends in marking up CLA / black paint to some astronomical proportions.
You won't see a ton that fit that range at first, but trust me, be patient. They do pop up. Anyhow, once one of these would meet my criteria, I would then dig into it to see the details and really look at the condition. If all of that was suitable, I'd dig into the seller to see their ratings and feedback. Zero feedback meant no deal on my end. I like to see them in the hundreds or thousands to be honest. I tend to be a little more picky on that end when dealing with this much money.
If you want to see what trending prices are, simply check the "Show Only: Sold Listings" box on the bottom left column. This will give you an idea what the last specific configurations went for - be it CLA'd, painted, "beat to hell" or what have you.
Do your research, and put many options in your watch list so you can really compare. If it sells out from under you, it wasn't meant to be. Don't sweat it - another WILL come. Reach out to local shops with what you are looking for - they can sometimes find things you can't. I had Hunt, Green Mountain and KEH on the lookout for me too. They'd fire off occasional emails to me with new inventory M3 bodies as they rolled in (if they met my requirements).
After all my research and seeing what was (not) out there on eBay or any of the online specialty shops, I decided to go with Youxin Ye. He offered the full refurbish of a mechanically sound M3 at exactly the right price for me. He's just down the road (well, a handful of roads) and I can easily bring it to him for any future adjustments, or if desired, painting. Basically, I am ending up with an M3 that will look like it just came off the shelf in 1961. It'll have everything on my wish-list, and nothing more. And seriously, what more could I hope for? | 2019-04-24T18:29:51 | https://www.raylarose.com/words/leica-buying-vintage-film-cameras |
0.9992 | ERROR: [XFORM 203-103] Array 'data.V' (...): partitioned elements number (1536) has exeeded the threshold (1024), which may cause long run-time.
ERROR: [HLS 200-70] Pre-synthesis failed.
Is there a solution for this kind of limit/threshold?
@scampbell It'd be nice to have the option to disable a bunch of these HLS "sanity check" errors. Sometimes an operation that looks like a really bad idea is deliberate because I'm experimenting with designs or trying to fill an FPGA.
@gdg In my experience, pushing parallelism too far in HLS (1536 elements at once is definitely too far) just results in a huge and slow block. I would say that HLS really excels at 1 - 30 parallel tasks. Once you get above about 30 the design becomes so large that your clock speed drops dramatically (and/or resource consumption rises dramatically) and it makes more sense to just run a simpler block at a higher clock speed to compensate.
The issue here is that in 2016.x there was no limit to the partitioning. However, what was happening is that due to complete partitioning, the size of the registers and control logic grew very large. So much so that the designs were not meeting timing in the device due to routing. Because of this, a limit was placed in 2017.x for 1024 maximum elements.
In your example, 1536 elements * 18 bits = 27,648 registers. That is a very large number. For example, in the mid-range Zynq device, that is about 10% of the available registers in the device. And, more importantly, partitioning completely implies that you will be operating on 1536 fixed point values simultaneously. Is that truly the case?
We do not have a method right now to turn this off, but are evaluating that for a future release.
@scampbell, the number of registers is prohibitive indeed (a lot of multiplexers as well, I assume), but I was trying a first, rough, and greedy synthesis.
I may try a little of design-space exploration (modify the code) to workaround the issue.
Having that limit removed (or as a parameter) would help though.
What about partitioning that array so that BlockRam can still be used? I think maybe the key here will be how many fixed point "words" you can operate on simultaneously.
@scampbell, completely removing the BRAM in the design is one of the goals of my experiments. BRAMs have higher access latency of registers (apparently). What do you think?
I am not sure I agree with that. HLS usually configures the Bram to be 1 cycle address, and the next data. And a register would be similar in that new data being written in is available on the output the next cycle. So, latency of an individual "word" I don't think is any different.
However, the main limitation of Bram is the number of ports, so the number of simultaneous words that can be read/written is limited by that. With dual-port memory we can expand that to two words at the same time per Bram, but still, it would take several (many) cycles to access them all. This would increase the latency of the entire design then.
You are right too to mention multiplexing in the complete partitioning option if you still wanted an addressable sort of access to the memory. I do not think this is the best use of partitioning though as you would really want to use it for creating parallel operations on those words not for just changing where those words are stored.
You could place these elements into a LutRam using a resource directive. However, maybe a big advantage of Bram is that it is paired with the DSP-48's. Since many designs typically perform some math operations on the data, the placement/routing convenience of this is very beneficial as compared to the placement and routing of the Registers and Muxes all over the FPGA fabric.
OK, I hope this helps?
In the context of latency constrained applications, I want to investigate a little more the pros and cons of BRAMs and registers. You most likely are 100% correct and I agree with all of the rest you said and keep it in mind.
If I have any significant results BRAM vs registers I will post it.
I also recommend reviewing array partitioning and array reshaping to get around this limitation.
Why do we need an array so large?
@chrisz, the code is part of a convolution algorithm. Feature patches are stored in arrays and passed down to a pipeline of kernels (matrix multiplication, sum-reduce, etc).
This was a day-zero attempt to synthesize the code using only registers. | 2019-04-19T12:38:27 | https://forums.xilinx.com/t5/Vivado-High-Level-Synthesis-HLS/ARRAY-PARTITION-COMPLETE-has-exceeded-the-threshold-1024/td-p/862145 |
0.998838 | "Think of two of your favourite films. Can you write a plot synopsis of each in just one sentence?"
1. Woman has to repel one man, chooses wrong man, eventually likes right man, while friends and relatives have varying degrees of success in love.
2. Wussy woman who can't say no and is obsessed with wrong man eventually falls in love with someone she likes to argue with who helps her learn to stand up for herself. | 2019-04-21T08:27:45 | https://www.jaxburgoyne.com/1yr-scratch-pad/july-28th |
0.999998 | by ROBBY DOUTHITT & r & & r & & lt;span class= "dropcap " & W & lt;/span & hile John Stockton was dishing out passes for Gonzaga Prep in the late '70s and Mark Rypien was throwing game-winning touchdowns for Shadle Park in the early '80s, a future telecaster for ESPN's SportsCenter, Neil Everett, was over at Lewis and Clark high school, playing football, basketball and listening, as he recalls, to Ted Nugent a lot.
Everett, who graduated from LC in 1980, will be among the guests at Gonzaga University's Coaches vs. Cancer event this Saturday. The annual fundraiser, a golf tournament and a black-tie dinner at the Davenport Hotel, all hosted by Mark and Marcy Few, has raised nearly $3 million to help fight cancer since its inaugural year in 2002; it has been voted by readers of The Inlander as Spokane's best charity event for two years running.
The sportscaster, though, has a much more personal connection to Coaches vs. Cancer than just simply being from Spokane. Everett's mother, Jackie Robertson, was a teacher at the Spokane continuation school, now known as Havermale High. In 1983, at Deaconess Hospital, she died from cancer, and the Havermale library remains dedicated to her memory.
"I am only who I am today because of her," Everett says.
The perks of his job include appearances in SportsCenter commercials with the likes of tennis legend Roger Federer. Everett has also had the opportunity to have dinner with his childhood hero, Bill Walton -- and to work with people he says are some of the most talented in all television.
But for somebody who works in television, Everett doesn't watch much of it. In fact, Everett says he doesn't even really watch the Olympics.
"I'm just not that all geeked up on them," Everett says. "Yeah, I'm interested in what [Michael] Phelps does and if the U.S. basketball team falls on its face, but I couldn't tell you the name of one gymnast."
& lt;span class= "dropcap " & A & lt;/span & n ESPN sportscaster who doesn't watch a lot of television and isn't enthusiastic about the Olympics? Everett (full name, in case you're checking your LC yearbook, Neil Everett Morfitt) is definitely honest.
He's also honest about the problems facing sports. He believes there is a growing disconnect between athletes and fans, mostly because many athletes have an arrogant sense of entitlement and because it's just become too expensive to go see a live sporting event. Steroid controversies aren't helping either.
But still he loves coming into work every day at the center of sports journalism.
The only drawbacks: Sometimes he has to talk about Brett Favre too much, and he no longer gets to live in Hawaii, where his road to ESPN first began.
After graduating from University of Oregon with a degree in journalism, Everett took a job as a sports information director at Hawaii Pacific University in 1985. He eventually worked his way up to assistant athletic director, while "dabbling" in sports news at a local TV station.
Then he got a call from an agent who wanted to represent him.
"I told the agent, 'Look, I live in Hawaii, the only thing you can do for me is get me an audition with ESPN,'" says Everett.
The agent eventually came through. In Everett's first audition, he says he talked too much about surfing and sumo wrestling and not enough about mainland sports. No job offer. He came home devastated.
He didn't give up, though, and landed a second tryout. That time, he came prepared and nailed it. In 2000, he was hired.
The most surprising thing about working on SportsCenter, Everett says, is the lack of ego around the office.
"On the surface, with all the talent around, you might think the opposite. But everybody is so comfortable and confident in their own skin," says Everett. "They've reached the zenith of sportscasting, so there's no hidden desires to try to get ahead of the next guy."
& lt;span class= "dropcap " & E & lt;/span & verett did have one desire, and he didn't hide it much -- to get to star in one of ESPN's hilarious promo commercials, which often feature famous athletes.
"Those commercials are a huge deal," Everett says. "Whenever I would go home, all anybody would ever say to me was, 'When are you going to be in a commercial?'"
Over the years, Everett has made a name for himself on the 11 pm edition of SportsCenter while giving subtle shout-outs to his past. He starts every show with the Hawaiian greeting, "Howzit" (slang for "How's it going?"), and constantly refers to Gonzaga as "America's team."
Although Everett came of age in Spokane, Hawaii is truly his home, he says. He does have fond memories of the Lilac City, though -- especially Expo '74. That's when -- and this is true -- Ted Nugent was given the key to the city. | 2019-04-25T19:45:44 | https://www.inlander.com/spokane/sportscaster-vs-cancer/Content?oid=2181499 |
0.997884 | Mark Zuckerberg told lawmakers he was among the 87 million Facebook users whose data was improperly shared with a political consultancy, but rejected suggestions that users do not have enough control over their data on the world's largest social media network.
His admission that his own data made its way into the hands of Cambridge Analytica laid bare that even the company's technologically adept founder and chief executive was unable to protect his own information from parties seeking to exploit it.
That underscores the problem Facebook has in persuading lawmakers that users can safeguard their own information if they carefully manage their personal settings and that further legislation governing Facebook's use of data is unnecessary.
"Every time that someone chooses to share something on Facebook ... there is a control. Right there. Not buried in the settings somewhere but right there," the 33-year-old internet billionaire told the U.S. House of Representatives Energy and Commerce Committee.
Yet, when asked if his data had been improperly used, he replied: "Yes." He gave no further details.
The problem of data privacy dominated the hearing, which was more focussed and antagonistic than a hearing the day before in front of two Senate committees.
Wearing a dark suit and tie and prefacing almost every remark with "Congressman" or "Congresswoman," Zuckerberg appeared even more controlled than he did on Tuesday, as he refrained from cracking jokes and flashed few smiles.
"How can consumers have control over their data when Facebook does not have control over the data?" asked Representative Frank Pallone of New Jersey, the ranking Democrat on the Energy and Commerce committee, at the beginning of the hearing.
Zuckerberg repeatedly defended the company's practices, saying that users have control over their own data and decide what to share.
He said he was not familiar with so-called "shadow profiles," which media reports have described as collections of data about users that they have no knowledge of or control over. He also said Facebook does not collect information from users' verbal conversations through mobile devices' microphones.
However, in a series of questions on how people can remove data from Facebook, Zuckerberg said that Facebook does "collect data on people who are not signed up for Facebook for security purposes."
He had no response when asked how a person who is not a Facebook member can remove information without first signing up for the service.
Zuckerberg was on Capitol Hill for the second time in two days to answer questions about data privacy in the wake of revelations last month that millions of users' personal information was wrongly harvested from the website by Cambridge Analytica, a political consultancy that has counted U.S. President Donald Trump's election campaign among its clients.
The latest estimate of affected users is up to 87 million.
The data was improperly shared with Cambridge Analytica by an academic who gathered data on users and their friends through a questionnaire app on Facebook.
Facebook has since shut off the ability of apps to gather such data, but Zuckerberg said on Wednesday it will take "many months" to complete an audit of other apps to determine if they also improperly used data.
The House hearing followed a five-hour questioning by U.S. Senators on Tuesday, in which Zuckerberg made no further promises to support new legislation or change how the social network does business.
Facebook shares were up 1.5 per cent on Wednesday after dips earlier in the day. They posted their biggest daily gain in nearly two years on Tuesday as Zuckerberg managed to deter any specific discussion about new regulations that might hamper Facebook's ability to sell ads tailored to users' profiles.
"It is inevitable that there will need to be some regulation" of internet firms, Zuckerberg said on Wednesday, but he again steered away from any specifics.
Some lawmakers grew frustrated at their limit of four minutes each to press Zuckerberg on specifics, and chastised the billionaire at times for offering up rehearsed platitudes about valuing user privacy.
"I can't let you filibuster right now," Republican Representative Marsha Blackburn said at one point. She cut Zuckerberg off a number of times.
Bobby Rush, an Illinois Democratic congressman, was in the process of asking Zuckerberg when he learnt that Facebook allowed advertisers prevent ads from being shown to certain minority groups, a possible violation of civil rights laws. He was cut off.
“I am indeed wary that you are only acting now out of concern for your brand and are making changes that should have been made long ago,” said Democratic Representative Paul Tonko. | 2019-04-22T10:35:07 | https://www.reseller.co.nz/article/636056/facebook-ceo-claims-own-data-shared-by-cambridge-analytica/ |
0.999993 | What kind of spin can flexible packaging put on the "circular economy"?
For years, sustainability has become an increasingly important aspect of packaging. The latest significant development in sustainability has been the concept of the circular economy. As applied to packaging, simply put, this involves planning every aspect of packaging—materials, design, conversion techniques, distribution, use and recovery—with an eye toward minimizing consumption of materials and energy, and maximizing reuse. To be truly effective, a circular economy requires participation by everyone in the supply chain, including: packaging materials suppliers, converters, product manufacturers, retailers, consumers, and recyclers.
With flexible packaging, especially for food, users face a unique set of challenges in participating in the circular economy.
One of the biggest such challenges is that in most cases, truly closed-loop recycling—i.e., making food packaging into more food packaging—is not an option. With few exceptions, Food and Drug Administration regulations prohibit recycled material from being used in food-contact packaging.
Even if recycled material could be used for food, flexible packaging has some inherent disadvantages. Many flexible films used for food consist of multiple layers of different polymers, such as polyethylene terephthalate (PET) and ethylene vinyl alcohol (EVOH). Recycling different polymers together is impossible when, as often happens, they have incompatible molecular structures. Also, most recycling centers are not set up to process flexible packaging; their machinery can only handle rigid plastics.
However, bulk flexible packaging, such as intermediate bulk containers (IBCs) and bag-in-box, has a big advantage when it comes to the circular economy—and its manufacturers and users are in a position to minimize or overcome its disadvantages.
A major aspect of the circular economy is energy consumption. A big part of that is minimizing fuel used for transportation, by cutting down on distances—and weight. The latter is an ongoing, inherent advantage of bulk flexible packaging. It is lighter and takes up less space than almost all rigid bulk packaging alternatives, meaning that more product can be delivered per tankload of fuel. And because it is almost always one-way packaging, there are no transportation return costs.
IBCs are used almost exclusively for industrial applications. In the food sector, this means delivering bulk loads of liquid, semi-viscous, or powdered ingredients to food processing plants. (Bag-in-box often is also used this way, to deliver smaller loads.) This means the supply and return chains can be more tightly controlled than with consumer products. It is therefore easier for suppliers and their industrial customers to make sure that used flexible packaging gets collected and delivered to a recycling facility that is equipped to handle it.
When the flexible material is monolayer, or consists of multiple layers that are chemically compatible, recycling is relatively straightforward. Even some film structures that comprise incompatible materials can be processed with a "compatibilizer" chemical such as DuPont's Fusabond.
Because of FDA regulations, most resin recycled from flexible material cannot be processed into material intended for food contact. However, it will be available for non-food end uses such as shipping bags, sacks of fertilizer and other farming/gardening materials, newspaper bags, etc. This does not quite close the circle perfectly, but it comes much closer to the "circular economy" model than simply landfilling the discarded material.
For more information about smart flexible packaging choices, download our Bag-In-Box brochure today. | 2019-04-21T03:10:22 | https://info.cdf1.com/cdf-blog/exploring-the-role-of-flexible-packaging-in-a-circular-economy |
0.999999 | This article is from the source ' bbc ' and was first published or seen on July 24, 2007 03:50 (UTC) . It will not be checked again for changes.
The government is expected to announce plans to spend billions of pounds to remove bottlenecks on the rail network. The transport secretary has set out plans to spend billions of pounds to ease overcrowding on trains.
Measures to increase capacity to cope with growing passenger numbers are also set to be in a White Paper unveiled by new Transport Secretary Ruth Kelly. Ruth Kelly said £10bn would be invested by 2014 to increase services and make trains longer as she outlined the government's rail strategy to MPs.
There are likely to be details of 1,300 new carriages on the network - 300 more than first announced earlier this year. She said by 2030 she wanted the railway network to carry twice the number of passengers and freight.
Station improvements Ms Kelly said £600m would be spent on tackling "bottlenecks" at Birmingham and Reading and there would be 1,300 new carriages to ease overcrowding.
It is set to give the go-ahead for the delayed £3.5bn upgrade of the crowded cross-London line. A £5.5bn north-south cross-London Thameslink project was given the go-ahead and Ms Kelly said by 2014, the aim was that 92.6% of trains would run on time - currently the figure is 88%.
Ms Kelly may announce that the limit on rises for advance saver fares of 1% above inflation will be removed. She told MPs that the government had drawn up "the most ambitious strategy for growth on the railways in over 50 years".
Platform extensions, longer trains and the possible reopening of disused lines could also feature in the White Paper. "Our challenge today is not about managing decline," she said.
Although the punctuality of trains has improved overcrowding is still a problem.
He told BBC Radio 4's Today programme that the funding for longer trains could be expected to come from growing passenger revenues, with government support needed for many of the other planned improvements.
"Instead, it's about how we can build on this solid progress to provide a railway that carries more passengers, on more and better trains and on more frequent, reliable, safe and affordable service."
While government money for the railways will amount to £15.3bn between 2009 and 2014, passenger fares are expected to make up £39.2bn in the same period.
Ms Kelly also there would be a "radical simplification" of the fares structure with rises in saver fares capped at 1% above inflation.
For the Tories, Theresa Villiers said it was another "false dawn" for the £15bn Crossrail scheme - a proposed high-speed rail link from Berkshire to Essex via central London - saying it was "getting more distant by the day".
She added that while Ms Kelly had claimed "real acheivements" overcrowded trains were packed so tight "it would be a criminal offence to transport animals in the same conditions".
And she said it "seems extraordinary" that the government had not made more mention of Crossrail in the paper.
Ms Kelly said the government was committed to Crossrail and was currently trying to "pin down" private sector funding, to match government funding.
But passenger groups have been angered that some train companies have raised off-peak prices by up to 20%, and the system of franchising routes has come under criticism. But passenger groups have been angered that some train companies have raised off-peak prices by up to 20%, and the system of franchising routes has come under criticism.
Bob Crow, general secretary of the RMT union, said passengers were "already paying through the nose to subsidise the profit habits of fat-cat franchisees and train-leasing companies".
BBC transport correspondent Tom Symonds says the announcement may disappoint those hoping for bigger thinking on the future of the railways, such as plans for a new high-speed rail link between London and Scotland.
Brian Cooke, chairman of London TravelWatch, which represents the interests of passengers, said extra capacity was urgently needed in the capital.
"Over 70% of all national rail journeys are to, or through, London. London's rail travellers pay the highest fares and London's train operators are paying the highest premiums to the government for running train services," he said.
"London's train services are the most overcrowded, with use of rail in London growing much faster than projected."
Shadow Transport Secretary Theresa Villiers said nothing had changed under the new prime minister, Gordon Brown.
"There'll be a lot of hype and spin about the future of the railways to disguise a series of reheated announcements that are years later than promised," she said.
"If they do announce progress on the Thameslink 2000 of course that would be welcome but the project is already 7 years late.
"This government has broken so many transport promises in the past, why should anyone believe them now?" | 2019-04-26T12:45:14 | https://www.newssniffer.co.uk/articles/56157/diff/2/3 |
0.999839 | Que (1): Select the group of words that is most nearly similar in meaning to the most top Idiom/Phrase in capital letters.
[A] Utmost hatred for someone.
[C] To twist hair into a particular shape.
[B] There are many large shops in a Oxford Street.
[C] There are many large shops in an Oxford Street.
[D] There are many large shops in the Oxford Street.
Que (3): Complete the following sentence by inserting a suitable “Preposition“ form the given alternatives.
Que (5): Choose an appropriate word from the alternatives given to supply a “Conjunction“ for completing the following sentence.
“He acts ___________ he were already the boss”.
Que (6): Select the word that is most nearly “Opposite“ in meaning to the word in capital letters.
Que (7): Identify the correct “Indirect expression“ of the above imperative.
He says to us, “Keep the gate closed”.
[A] He says us to keep the gate closed.
[B] He says to keep the gate closed.
[D] He asked that we were supposed to close the gate.
“I remember them taking me to the zoo”.
[A] They remember taking me to the zoo.
[B] I remember them taken to the zoo by them.
He tried / hardly to / win the race.
Que (10): In which of the following sentences the use of the idiom ‘at sixes and sevens‘ is not appropriate ?
[A] He apologized because the house was at sixes and sevens.
[B] Our teacher had just moved in to a new classroom, and she was still at sixes and sevens.
[D] The dog’s barking kept the Browns at sixes and sevens with their neighbors for months.
[B] Somebody shall clean the room.
[C] Somebody later is going to clean the room.
[D] Somebody must clean it later.
My parents are watching the kids.
[A] The kids are watched at by my parents.
[B] The kids were watched by my parents.
The facts of the case were obscured by the speech of the defense counsel.
One who is gifted with several talents.
He said, “Alas! I am ruined.” What is the INDIRECT SPEECH of the above sentence ?
[A] He said that he was ruined.
Que(17) : Which of the following word is not its own SINGULAR ?
Que(18) : What is the antonyms for “CULPABLE“.
Que(19) : Which of the following has the CORRECT SPELLING ?
[A] The sceneries here are not good .
[C] We have received no information.
[D] He provided the blinds with food.
We had dinner in ______ most expensive restaurant.
(2) He had leave of four days.
(3) He had leave for four days.
(4) He had four days leave.
Que(25) : He said to me, “Go home”.
Which of the following sentence correctly expresses the above sentence in INDIRECT SPEECH ?
[B] He told, Go home !
Que(26) : They are playing ______ Cricket.
Que(27) : Musicians mind are attuned _______ music.
Fill in the blank with one of the following PREPOSITION.
Que(29) : Which of the following is not a CONJUNCTION ?
Que(30) : “Shun the dangerous path”.
What is the PASSIVE form of the above sentence ? | 2019-04-22T15:09:19 | https://cggkquiz.in/2015/10/english-grammar-competitive-exam-questions-and-answers-quiz.html |
0.999994 | Euro 2016 final: Griezmann vs Ronaldo… Which No 7 is No 1?
Griezmann, 25, is the tournament's top scorer bidding to deliver success for the home nation in his first major international final.
Ronaldo wept teenage tears after Portugal's 1-0 loss to Greece in the Euro 2004 final and at 31, he knows he may not get a better chance of success with his country.
"Euro 2004 was special -- I was just 19 and it was my first tournament," Ronaldo said after scoring a magnificent header in Portugal's 2-0 semi-final win over Wales.
"Now we are in the final again and we hope we will win it. I hope that we'll be smiling and that it will be tears of joy in the end."
Griezmann has already had a tearful tournament exit, having cried on the pitch at Rio de Janeiro's Maracana after France lost to Germany in the 2014 World Cup quarter-finals.
He appeared close to tears again six weeks ago following Atletico Madrid's Champions League final defeat by Real Madrid, in which he blasted a second-half penalty against the bar.
"He's a great player," said France coach Didier Deschamps. "In this Euro, he's been decisive for us. He can score, and he can help others score."
Disappointing in France's opening 2-1 win over Romania, Griezmann came off the bench to head in a crucial late goal in the 2-0 defeat of Albania.
Paul Pogba went into the tournament as the heir apparent to Michel Platini and Zinedine Zidane. But L'Equipe newspaper dubbed the team the "Griezmann Generation" following the defeat of Germany.
Ronaldo's goal against Wales saw him equal Platini's record of nine goals in Euro finals, but whereas it took the Frenchman one tournament to set his mark, it has taken the Portugal captain four to equal it.
He was widely ridiculed for accusing Iceland -- population 330,000 -- of having a "small mentality" after the 1-1 draw between the teams and then slammed a penalty against the post as Portugal drew 0-0 with Austria.
But he scored twice in the 3-3 draw with Hungary that secured Portugal's last 16 place and after two games without a goal, he settled the semi-final against Wales with a goal and an assist for Nani.
With his great rival Lionel Messi's Argentina career up in the air -- the Barcelona star announced his international retirement following a defeat on penalties by Chile in the Copa America final -- Ronaldo has an extra incentive to win on Sunday.
Lead Portugal to a first major title, and a fourth Ballon d'Or -- the prize he covets above almost all others -- would swim tantalisingly into view. | 2019-04-20T17:03:48 | https://www.emirates247.com/sports/euro-2016-final-griezmann-vs-ronaldo-which-no-7-is-no-1-2016-07-09-1.635186 |
0.999996 | Why was the Federal government's assumption of state debt so significant?
The significance of this act was its importance in the Hamilton-Jefferson debate. Basically, Hamilton's idea was that of a large, strong, federal government. Jefferson and his supporters favored a weaker, de-centralized, and (in most cases) a state based government. Hamilton won this round by "federalizing" what had been Revolutionary war (and subsequent) debt.
The assumption of the states' debt meant that there would be one large centralized "national" debt, instead of 13 smaller ones. It was much easier for lenders, foreign as well as domestic, to monitor and deal with one federal debt, which had earlier been incurred by the states mainly to fight the Revolution, and to operate until the "United States" got going.
Yes, the states later incurred their own state debts, but for local matters, (usually) funded by "local" citizens. These debts were much smaller than the "national" debt that had been undertaken to fight the Revolution. By repaying the national debt promptly and in full, America established the credit it needed to fight future wars and to deal with other national emergencies.
There was one other thing. The federal responsibility to pay off the central debt was accompanied its control over most revenue sources, mainly tariffs and excise taxes (income taxes were permanently established in 1913, over a century later). | 2019-04-18T21:23:40 | https://history.stackexchange.com/questions/50962/why-was-the-federal-governments-assumption-of-state-debt-so-significant |
0.998971 | Does diplomacy with Tehran have a good chance to resolve the Iranian nuclear threat? The Obama administration thinks so, which is why Washington has doubled down on an interim agreement with the Iranian regime that provides it with substantial sanctions relief. But a recent fiasco concerning Iran’s aborted role in talks over Syria’s civil war presents a significant reason for doubt about the president’s strategy: Iranian diplomats frequently use talks to get what they want without making any substantive concessions to their counterparts.
The debacle with Syria unfolded in the wake of continuing opposition by the Obama administration to congressional efforts to strengthen sanctions on Iran should negotiations fail. In fact, White House Press Secretary Jay Carney suggested that supporters of sanctions were advocating “a march to war,” and that negotiations with Iran held the potential for “a peaceful solution that prevents Iran from obtaining a nuclear weapon.” But Iranian leaders may not view diplomacy in quite the same way — and the case of Syria illustrates why.
Since the United States and its allies are largely unwilling to use force to drive Syrian dictator Bashar al-Assad from power, global powers are trying to end the civil war through negotiations that include both the Assad regime and Syrian opposition forces. Many world leaders, including United Nations Secretary-General Ban Ki-moon, believed the success of talks depended on including Assad’s closest ally: Iran.
Therefore, Ban — reportedly with the support of U.S. Secretary of State John Kerry — tried to secure Iran’s participation in talks that would take place in Geneva. But to ensure that Tehran would not exploit its attendance by attempting to obstruct diplomatic progress and thereby strengthen Assad, the Obama administration conditioned Tehran’s presence on its support for a 2012 international agreement known as the Geneva Communiqué, which calls for a new government in Syria.
In private talks with Iranian Foreign Minister Mohammad Javad Zarif, Ban reportedly thought he had secured Iran’s oral agreement to endorse the Geneva Communiqué. Then, as the talks approached, Ban rushed to invite Iran to attend the negotiations — only to see Tehran fail to support the Geneva Communiqué in public. Ban’s spokesman said that the “oral understanding” that Iran had given to Ban “was to be followed by a written understanding. That didn’t happen.” The U.S. was embarrassed, the Syrian opposition was outraged and threatened to stay away from the talks, and Ban, under U.S. pressure, withdrew Iran’s invitation.
Tehran exploited its adversaries’ diplomatic weakness by using the well-worn tactic of offering private promises one day and failing to deliver the next. As the Obama administration and Ban’s team apparently failed to stay on the same page tactically, Ban swallowed Iran’s bait and provided the regime with the legitimacy of an invitation to the talks, thinking that Iran would follow through on its promises. Iran pocketed the legitimacy and then pulled the rug out from under Ban and the U.S. by refusing to publicly commit to the Geneva Communiqué. The United States and the U.N., looked naïve and incompetent, while Iran — after years of increasing international isolation for its pursuit of nuclear weapons and sponsorship of terror — was able to portray itself as the aggrieved party.
Iran’s skilled outmaneuvering of its interlocutors–over mere negotiations over an invitation to other negotiations — raises a troubling question: Why should we assume that, when the stakes are much higher for all sides, America will successfully be able to use diplomacy to convince Iran to abandon its nuclear weapons ambitions?
The Obama administration continues to negotiate with Iran, and perhaps it should. However, when considering when to talk — and when to stop talking and step up the pressure — policymakers should recognize not only that diplomacy is unlikely to succeed in addressing the Iranian threat, but that it has real perils. These perils include the risk of the unacceptable—but very possible — outcome that Tehran will exploit negotiations to outsmart its diplomatic adversaries, escape the grasp of sanctions, and become a nuclear weapons state.
Alan Goldsmith covers policy and Washington Outreach for United Against Nuclear Iran and the Counter Extremism Project. He served as a professional staff member for the House Foreign Affairs Committee from 2007 to 2013. His views are his own. | 2019-04-21T04:20:01 | https://blogs.timesofisrael.com/the-perils-of-negotiating-with-iran/ |
0.999993 | Given the public-private mix of the Greek health system, the purpose of this study was to assess whether variations in the utilisation of health services, both primary and inpatient care, were associated with underlying health care needs and/or various socio-economic factors.
Data was obtained from a representative sample (N = 1426) residing in the broader Athens area (response rate 70.6%). Perceived health-related quality of life (HRQOL), as measured by the physical and mental summary component scores of the SF-36 Health Survey, was used as a proxy of health care need. Health care utilization was measured by a) last-month visits to public sector physicians, b) last-month visits to private sector physicians, c) last-year visits to hospital emergency departments and d) last-year hospital admissions. Statistical analysis involved the implementation of logistic regression models.
Health care need was the factor most strongly associated with all measures of health care utilization, except for visits to public physicians. Women, elderly, less wealthy and individuals of lower physical health status visited physicians contracted to their insurance fund (public sector). Women, well educated and those once again of lower physical health status were more likely to visit private providers. Visits to hospital emergency departments and hospital admissions were related to need and no socio-economic factor was related to the use of those types of care.
This study has demonstrated a positive relationship between health care need and utilisation of health services within a mixed public-private health care system. Concurrently, interesting differences are evident in the utilization of various types of services. The results have potential implications in health policy-making and particularly in the proper allocation of scarce health resources.
Several studies have identified perceived health status or health-related quality of life (HRQOL) as a very important predictor of health service utilization [1–7]. Furthermore, many studies provide evidence that demographic characteristics also affect health care need and utilization. Specifically, women report poorer health and use primary health services more often than men, have higher rates of hospitalisation and surgery and increased total expenditures, whereas men are less likely to receive preventive medical services [3, 6, 8, 9]. Age is positively related to hospital admissions , and also to an above average length of stay, increased utilization of services and, overall, to greater need . Regarding men, marital status and specifically married, in a de facto relationship or divorced, was found to be positively associated with a first or further visits to a GP [3, 4].
Other studies have focused on the extent to which socio-economic differences affect the use of health services. Individuals with a lower level of education make fewer visits to specialists [11, 12]. Contrarily, those with a higher education or income, after adjustment for socio-demographic and need variables [1, 4, 13], demonstrate an increased likelihood of accessing GP services or making at least one visit to a specialist. Morris reports a pro-rich inequality in all types of hospital care and a pro-poor inequality in GP visits. Furthermore, an inverse income relationship has been observed with respect to needed, but not sought, medical care, with the proportion of individuals not seeking needed medical care increasing significantly in lower income groups . On the other hand, visit delay and/or cancellation, and underutilization of physician services were more evident in younger individuals, low-income and economically troubled, in chronic medical conditions or in individuals without a regular source of care or a physical care discount card .
Many studies have examined the influence, on service utilization, of factors such as race/ethnicity or community area (rural/urban), with the latter differentiating access in favour of urban area residents . In the UK, it has been shown that Indians use more GP services than other minorities. Moreover children and young people from all minority ethnic groups make lower use of outpatient and inpatient services compared to white children and young people, and these differences persisted after controlling for socio-economic and health status variables [17, 18].
The purpose of this study was to examine if demographic, socio-economic and need characteristics of individuals influenced their use of the following health services: visits to public sector physicians, visits to private sector physicians, visits to hospital emergency outpatient departments and admissions to hospitals. In addition we attempted to identify factors that differentiate the use of public and private services. Based on previous research it was hypothesized that need factors ranked as the most important determinant of health care use. Concerning the different use of public and private services, it was assumed that socio-economic factors played an important role. This study contributes to the available literature as it investigates variations in health care service utilization in Greece, by using SF-36 Summary Scores, instead of the usual eight subscales, as proxies of health care needs. The results have potential health policy and planning implications and could support administrators in their difficult task of properly allocating health resources.
Self-assessed health status was measured with the SF-36 Health Survey, a generic instrument constructed to be a brief alternative in health policy evaluations, general population surveys, clinical research and practice. It is the most widely used measure of self-perceived health with the aim of assessing concepts representing basic human values relevant to health status and well-being. The SF-36 has proven useful in comparing general and specific populations and for assessing the impact of disease and treatments on patients' perceived health state and quality of life . The SF-36 is a multi-item questionnaire comprised of eight scales: Physical Functioning (PF), Role limitations due to Physical problems (RP), Bodily Pain (BP), General Health (GH), Vitality (VT), Social Functioning (SF), Role limitations due to Emotional problems (RE) and Mental Health (MH) .
Factor analytic studies have shown that the physical and mental summary factors account for 80%–85% of the reliable variance in the eight scales, leading eventually to the construction of two summary scores for physical and mental HRQOL. The use of summary scores provides the advantage of requiring fewer statistical comparisons in order to analyze SF-36 results, while not forfeiting the discrimination potential between physical and mental health status and outcomes. The two summary scores are usually normalized to a mean value of 50 and a standard deviation of 10 [20, 21]. In a recent study in Greece, the SF-36 was validated and the results were comparable to those from studies in other European countries and the USA . In a subsequent Greek study, the validity of the Physical Component Summary (PCS) and Mental Component Summary (MCS) scores was also established .
The National Health System (ESY) in Greece was established in 1983 with an axiomatic aim to provide coverage for the entire population. It has evolved during the 1980s, and this is reflected by a substantial increase in public resources (e.g. beds, health centres and medical personnel) . Meanwhile, the private sector, with a great tradition in Greece, managed to find ways to increase its market share by setting up diagnostic centres and investing in expensive medical technology . Given also the increased number of physicians in Greece (physicians per 1000 individuals: 2.0 (1974), 2.8 (1983), 3.9 (1993) and 4.5 (2000)) , the Greek health care system continued to expand and became a typical example of a mixed (public-private) system .
The Greek health care system provides full coverage to the entire population, but at the same time has observed an increased use of the private sector. Access to all public services is free and there are no fees at the point of use, whereas the private sector requires out of pocket payments. Differences, between more and less prosperous insurance funds, concerning the extent and quality of services provided are evident. Health care services in Greece are basically provided by: a) the National Health System (public hospitals and health centres in rural and semi-urban areas) b) health units of Health Insurance Funds (health centres with salaried physicians or contracted physicians working in the private sector) and c) the private sector (hospitals, diagnostic centres, and private practitioners).
Health insurance funds are public schemes financed by employees, employers and the public budget. In Greece it is mandatory for the entire workforce (including their families) to be insured according to professional status, via one of 32 different health insurance funds . It is worth mentioning that Greece spends 9.4% of its GDP on health, 59.1% of which is public expenditure coming from general taxation and social insurance contributions . The rest is covered by private sources and mainly out of pocket payments, which confirms the noteworthy growth of the private sector . Even after twenty years and a number of attempts to reform it, the Greek health care system remains fragmented in terms of coverage, and quite distanced from its principles of equity and efficiency .
The study involved a stratified sample of residents of the broader Athens area, where approximately 35% of the Greek population lives. Institutionalized people were excluded. Participants were chosen proportionally to the population size, according to a three-staged sampling methodology. Specifically, in the first stage a random sample of 84 blocks of residences were selected according to information from the 1991 national census. In the second stage, households were selected from every block by systematic sampling. In the third stage, a participant (> 18 years) was chosen from every household by simple random sampling. Totally, 1007 out of 1426 candidates (response rate 70.6%) agreed to participate, constituting a representative sample of the population living in this particular area.
Participants were interviewed and the survey included the SF-36 and various health service utilization and socio-demographic questions. The necessary approval for carrying out this study has been provided by the Review Board of the Hellenic Open University. Physical and mental health summary scores, calculated and presented in previous work, were used as a proxy of health need. Principal Component Analysis was conducted to extract two components, which were subsequently rotated to an orthogonal simple structure using the Varimax method in order to facilitate comparisons with published results and simplify interpretation .
Health service utilization was measured by the visits: a) to public sector physicians within the last month b) to private sector physicians within the last month, c) to hospital emergency outpatient departments within the last year and by d) admissions to hospitals within the last year. Dependent variables were dichotomised to 0,1 values (0 → non use and 1 → use). Independent variables were grouped into three clusters, specifically i) demographic: age (continuous), gender (1 = male, 0 = women), marital status (dummy variable with reference category singles: 1 = married, 2 = divorced, 3 = widowed), ii) socio-economic: education level (1 = primary, 2 = secondary, 3 = lyceum, 4 = university), net monthly family income (continuous) and self-owned or rented residence (dummy variable with reference category residence freely provided) and iii) a proxy measure of need variable: SF-36 PCS and MCS scores. Only the variables demonstrating statistical significance (P < 0.05) were included.
Multivariate logistic regression models were implemented, one for each type of service, in order to determine predictors of health service utilization. Initially, access to health services was assessed and particularly the characteristics of those using the services compared to those not, and secondly the frequency of health service use, i.e. characteristics of those having used the services once compared to those using them more frequently. As Andersen and Newman , underline "it makes considerable difference whether we are studying initial contact during a given period or whether we are studying the number of services received in a given period of time". There is no clear perception on how frequent and non-frequent users should be distinguished, as they are defined arbitrarily and there is a lack of consensus in the literature .
Subsequently, we explored different predicting factors for the use of public, compared to private, services. Separate regression models were employed for primary and secondary services. The independent variables remained the same as in the analysis previously mentioned. The dependent variables were binary variables with 0, 1 values (0 → use of private services and 1 → use of public services). All statistical analyses were undertaken using SPSS v13.0.
Out of 1007 participants, 53.4% were women and the entire sample, with a mean age of 45 years, is classified into six age groups. Detailed socio-economic characteristics are provided in table 1. Four hundred fifty seven individuals had utilized at least one of the four types of health services, implying that 42.4% of the sample was considered as "users" (at least once) of public or private health services. Specifically, 26.5% of them used services affiliated to health insurance funds and 67.6% were one-time users. Accordingly, 13.9% of the participants had visited a private doctor and 64.9% of them were one-time users. The mean annual admission rates to emergency departments and to hospitals were 12.4% and 12.2% respectively, with 9.7% and 10.3% admitted at least once.
Upon initial investigation of the socio-economic characteristics of users and non-users (table 2), we observed that the users assessed that their general health was worse than that of non-users. At the same time their mental health, and even more so their physical health, was significantly lower. Women reported poorer physical and mental health compared to men (48.7% and 48.1% against 51.3% and 52.1%). Furthermore, an inverse relationship was witnessed between physical and mental health and age. Primary school graduates, the widowed and those with monthly family income less than 440 euros reported the poorest physical and mental health. Comparing physical and mental health of users and non-users (table 2) to that of the entire sample (table 1), users of all age groups -as it was expected- reported worse physical and mental health scores, with the exception of those aged 25–34 and 55–64. The same applies for all levels of education except in the case of high school graduates who report better mental health. In the case of marital status, it is the widowed (users) that report, once again, better mental health.
Given the four types of health service utilization designated in this study, we used regression models combining both public and private sector users, in order to determine the best predictors of utilization. Utilization of primary health services (table 3) appears to depend on demographic variables (13.8%), minimally on need variables (1%) and not at all on socio-economic factors. Women, elderly and those with worse physical health were more likely to use primary health services. Following this, separate models were implemented for public and private primary care users, and this resulted in various interesting observations.
Table 4 shows the regression model for last-month use of insurance fund primary services, which explained 18.2% of the variance. Demographic variables predicted 11.9% of the variation, socio-economic variables contributed with a further 2.3% to the explanation of health service utilization and health status, as measured by PCS and MCS scores, predicted a further 4.4%. More specifically, it appears that women utilized significantly more primary services, provided by health funds, than men. The elderly were 26.6% more likely to use these services, whereas wealthier people reported lower use. As for self-perceived health status, we observed that those with lower PCS scores were more likely to use health insurance services than individuals with higher PCS scores. Concerning visits to private physicians, within the context of primary health care, the regression model (table 3) explained only 13% of the variation. This figure is broken down to 7.9%, 3.0% and 2.1% variation explained by health status, socio-economic and demographic factors respectively. Women were more likely to visit private physicians. People with higher education were about 42% more likely to use primary health services from the private sector. Individuals with higher PCS scores were less likely to have consulted a private doctor within the last month.
Table 5 shows the regression model for the utilization of emergency department services and, in this case, only health status explained the variation. A trend was evident individuals with lower PCS and MCS summary scores reported higher use of emergency departments within the last year. The regression model for hospital admissions, shown also in table 4, predicted only 12.3% of the variation, with 10.1% predicted by health status and the remaining 2.2% by age. Specifically, age was related with admission and the elderly were more likely to be admitted, but after adjusting for health status, age was marginally not statistically significant. People with low PCS and MCS summary scores demonstrated a higher likelihood of having been admitted to a hospital within the last year.
In the previous analysis, regression models were implemented to distinguish between users and non-users in an attempt to examine possible socioeconomic barriers to initial care seeking. Another basic element, in this study, is the frequency of use for those making at least one visit, and the identification of predictors of the number of subsequent visits . In the context of primary care, we classified people into two groups, those making one visit and those making more, and this was chosen because those who had made one visit to public and private sector physicians constituted 67.6% and 64.9% of the sample respectively. An inverse relationship was evident between family income and more than one visit to public sector physicians working for health insurance funds (table 6). Less wealthy and people with poorer mental health were associated with a higher likelihood of having made more than one visit. The regression model for subsequent visits to providers of the private sector resulted in statistical insignificance.
The logistic regression model in table 7 focuses on the factors associated with utilization of public vs private primary health care services. Demographic variables explain only 7.8% of the total variance, and the addition of socioeconomic variables increases the explained proportion significantly to 16.9%. Married people were more likely to visit doctors affiliated to their insurance funds. More educated and wealthier people show higher likelihood to contact private doctors rather than their insurance fund doctors. The logistic regression model concerning hospitalization in public, compared to private, hospitals explains 44.8% of the total variance. Demographic, socioeconomic and health status variables contribute 19.5%, 21.6% and 3.7% respectively. Married, divorced and widowed are more likely (than singles), to be admitted to private (rather than to public) hospitals. The elderly show a significantly higher likelihood of being admitted to public hospitals. Indeed, the risk of being admitted to public hospitals increases 98% with age. Contrarily, as net monthly family income increases, people make more admissions to private hospitals. Finally people with higher MCS scores -better mental health- use the private hospitals more.
In this study we investigated the impact of demographic, socio-economic and need factors on the utilization of health services. The data showed that self-perceived health status -as a proxy measure of need- is the most important contributor to the utilization variance for three of the designated services (private physician, emergency departments and hospital admissions), a finding which is consistent with many previous studies [1–7]. Demographic variables such as age and gender were most strongly associated with visits to public (provided by health insurance funds) sector physicians. Socio-economic variables such as income and education did not have a statistically significant relationship with utilization, particularly in the case of secondary health services.
The results of the study seem to suggest the existence of equity in the use of primary health care services. Demographic and, to a lesser degree, need factors affected utilisation and no socio-economic gradient was apparent. Things were slightly different when the public and primary sectors were analysed separately, but once again inequity is not implied. Use of primary health services, provided by health insurance funds, was made according to demographic, socioeconomic and health care need variables. Women, elderly, less wealthy individuals and people with a lower physical health status visited their insurance fund physicians more. Demographic variables were the most important contributors and this may be explained by the fact that women reported higher consumption due to their increased awareness of health problems and symptoms when assessing their health status . Furthermore age is a factor inversely linked to health, therefore elderly -a high-risk group from the aspect of health status and economic welfare- seek more public primary services, which are free at the point of use.
Utilisation of private services was also affected by socio-demographic and need factors. Women, well educated and those once again of lower physical health status were more likely to visit private providers. It was expected that economic factors like income would affect utilisation of private physicians, which involves out of pocket payments. However, this was not confirmed by our study as opposed to an earlier study in Italy , where a linear relationship between the level of income and private utilization was observed. A possible explanation, in our case, is the underestimation of income. One third of the sample had not reported income. Even people who did may have underestimated it because the Greek population is often reluctant to answer these kinds of questions.
Another noteworthy fact is that the independent variables in the regression model (table 4) explain only a low portion of utilisation of private primary services. Besides the underestimation of income mentioned previously, another reason could be the small proportion of users having visited a private physician (14.0%), since the sample comprises an overall healthy population. An interesting topic for future research is the users' satisfaction from public primary services and if quality variations actually directed them towards private physicians. An important implication, which will be discussed subsequently, is that low-income individuals use primary private services as well.
Visits to hospital emergency departments and hospital admissions were related to health care needs, and no socio-economic factor characterized the use of those types of care. As reported in an earlier study, hospital utilization and the volume of inpatient services were significantly influenced by medical needs or as Andersen explains, hospital services received in response to serious problems and conditions would be primarily explained by need and demographic characteristics. The small amount of variance explained here implies the coexistence of other factors (e.g. lifestyle) that could affect the utilization of these health services, and this itself is another issue for future research.
Upon examining the number of visits, no socio-economic influence was revealed. The poorer and those with worse mental health visited more frequently physicians linked to their health insurance fund. Other studies [3, 4] have shown that people with higher education visited specialists more frequently or that they were more frequently referred to one. Socio-economic variations in the utilization of specialist services seem to be well-established in health systems in which referrals to specialists are made by primary physicians who play an important role in follow-up visits and hospital admissions. The structure of the Greek health system is different, primary health services concern mainly specialist services, which people choose freely without a referral.
Patients' preferences, awareness of their medical profile, availability of services and their expectations are important factors in seeking referred health care, mainly from specialists, in many European countries. Higher educated or wealthier individuals have different attitudes about the potential benefits, so they are more motivated to request specialist care . In the Greek health system there is no observed inequality in access or frequent use, but patients' expectations, awareness of their condition and educational level consist basic factors in tackling a health problem within a complex mixed public-private health system.
After studying the different use of public/private services (table 7), a pro-rich inequality was observed. This does not contradict what has been previously mentioned about the use of private services only (table 4), where the effect of income is not evident, most likely because the respondents are homogenous (i.e. users of private services). Contrarily, income is important when the combined (public/private) users are studied. People better off in respect to education and income levels were more likely to use private health services. Results from another study in Greece reported that the two higher income groups spend approximately the same amount of money as the others combined. This inequality becomes more severe when low-income people are forced to use needed health services from the private sector (because of the incomplete network of public primary health services, long waiting lists, "under the table" payments and low quality of provided services) burdening their limited family budget.
Low-income individuals have greater health care needs expressed by lower physical and mental summary scores, and further supported by research in western European countries showing that morbidity and mortality risks are higher in lower socioeconomic groups . Although it seems that low-income individuals generally use health services, it is apparent that they are not exclusive users of the public services, but they are often forced to use private health services as well. This implies inequity in the distribution of care since the consumption of private health services is not limited to the higher incomes, but is extended to the lower ones as well, thus giving rise to issues of horizontal and vertical inequity. A possible explanation could be the inadequate public financing. Greece has the lowest percentage of public health expenditures among the EU countries. According to OECD data in 2002 , total health expenditures per capita were 1814$, of which public health expenditures per capita were only 960$. On the contrary, private expenditures are the highest among the EU countries, and this means that the income, in all socio-economic classes, is burdened for the use of health services.
Another possible explanation is the structural problems of the system. The large number of health insurance funds and the different range of health services they cover is the most typical characteristic in this case. More specifically, wealthier funds cover a large range of services, provide a better set of inpatient services or, in many instances, offer reimbursement when individuals purchase from private providers. Often, people insured by the most prosperous health insurance funds (approximately 10% of the insured population) are covered, to a large extent, for hospitalization in prestigious private hospitals, for all illnesses, specialized operations and examinations . This unequal distribution of provided health services, within the public sector, constitutes a structural weakness of the Greek health system, which the private sector exploits.
In spite of social insurance coverage of Greek citizens, the use of private services is extensive throughout the country. This could be attributed also to the absence of the "family doctor" in Greece, and the inability to select the desired physician in primary and secondary health care. The absence of the family doctor affects the delivery of care, access and the referrals to the health system. This results in patients accessing secondary care based on their own initiative. The adoption of a gate keeping system could result in a link between primary and secondary care, and an effective patient transfer. Moreover it could give emphasis to issues such as prevention and over-consumption (especially of hospital care), which pose a great burden on the health system . On the other hand, insurance funds covering people of low income are either incapable of fulfilling their needs, or they provide lower quality health care, in conjunction to long waiting lists, all of which affect the degree of satisfaction. Overall, a significant personal cost is created for the users, who are forced to turn to the private sector and spend a large part of their income. This implies that a more complete and satisfactory network of services could result in lower use of the private sector.
Finally, two limitations should be briefly underlined. First, this study concerned the broader Athens area, the capital of Greece, where medical personnel is more experienced and better equipped technologically, and consequently more specialised health services are available. The heterogeneous dispersion of resources in relation to the population throughout the country reflects an unequal availability of health services, which is expected to be more intense in rural areas. So the first restriction reflects lack of data on the pattern of use of the rural population. Another limitation, reported also in a study by Morris , was the fact that utilization measures were zero-one variables for four defined types of use and there was no information on the quality of provided services.
This study has demonstrated a positive relationship between health need and the utilisation of health services under a mixed public-private funded health care system. Health need, defined by self-perceived health status, was the most important determinant for visiting public or private sector physicians, emergency departments and admissions to the hospitals. Moreover, health need and low income were the main factors influencing subsequent visits to public sector physicians. Concerning the use of public vs private services, we observed that socio-economic characteristics of individuals were the main determinants. People with higher education and income levels used more private sector services, although they were not the exclusive users, since low-income groups used private services as well. In Greece, it seems that access into the health system is relatively easy. However the aim is to access a complete, uniform and satisfying public health system with respect to the quality and the extent of provided services. Despite 25 years of Greek NHS reform, this target has not yet been achieved.
Collection of data for this study was supported by grants from the Greek Ministry of Health and Social Solidarity.
We are grateful to our colleagues Dr. Fotios Anagnostopoulos for statistical assistance in preparation of this manuscript and Mr. Nick Kontodimopoulos for useful comments in an early version of this paper.
EP has participated in the design of the study, the statistical analysis, the interpretation of the results and drafted the manuscript. DN conceived the study, interpreted the results and made refinements of the manuscript. Both authors have read and approved the final manuscript. | 2019-04-20T08:30:51 | https://bmchealthservres.biomedcentral.com.preview-live.oscarjournals.springer.com/articles/10.1186/1472-6963-6-146 |
0.99908 | Demonstrator loses hand at Paris ‘yellow vest’ march In Rome, tens of thousands of people took to the streets to protest the course of Italy's populist government. The protester attempted to pick up a rubber pellet grenade and it exploded in his hand, French media report.
Quebec prosecutors had asked that Bissonnette serve consecutive sentences for each charge, for a total of 150 years in prison without parole.
Boufeldja Benabdallah, president of the mosque that was attacked, said community members were "stunned" by the decision and felt the judge was more concerned about the dignity of the killer than that of the victims and their families. The defence argued the sentences should be served concurrently, which would have made him eligible for parole after 25 years.
"It's very hard, I would imagine, to really find true closure on a day like today", she said, adding that people's hearts were with the families of the victims and the entire Quebec City mosque community.
At the start of his trial in 2017, he said he had been suicidal, "swept away by fear and by awful despair", and deeply regretted his "unforgivable" actions. More than 50 people were at the Islamic Cultural Centre in January 2017 when he began shooting during evening prayers.
Six men were killed and five injured.
In pleading guilty, Bissonnette expressed shame and remorse for his actions but offered no clear explanation of why he did it.
He told police investigators that he believed a terrorist attack was imminent and felt he "had to do something". He painted Bissonnette as a calculated killer who was "looking for glory" and targeted a group of people based on bigotry and hatred.
Bissonnette's lawyers had argued that if he was sentenced to 25 years consecutively for each murder it would amount to death by incarceration. | 2019-04-24T14:55:32 | http://nhltradereport.com/2019/02/10/gunman-in-quebec-mosque-shooting-sentenced-to-life-in-prison.html |
0.999142 | If you've been following developments related to the TransPacific Partnership, or #TPP, you probably saw the contradicting headlines on your social media.
For those that don't know, TPP is a trade agreement originally being negotiated between 12 countries with the US leading the very secretive process, now with 11 countries since, under Donald Trump, the new US administration has decided to withdraw.
Aggressively promoted by Hillary Clinton while she was US Secretary Of State, who called it 'the gold standard in trade deals', has also been called 'NAFTA on steroids' by many activists opposing the agreement.
Among other things, agreement has provisions opposing public ownership in general on 'principle' as barriers to the free market, demanding that publicly owned utilities like Canada Post and CBC exist solely for profit.
Negotiations between the remaining countries continued last week at the Asia Pacific (APEC) Summit in Danang Vietnam. After the conclusion of the APEC Summit on Friday, Nov. 10, representatives for all the remaining countries announced that they had reached an agreement on the 'core elements' of the deal, but Canadian Prime Minister Trudeau also announced that Canada is not signing the agreement itself in it's current form.
Major media outlets seem divided on how to interpret this turn of events, but seem to agree that strong, single focus narratives were the way to go.
The National Post headline for the article last updated Nov. 11, 2017, reads 'Canada's Decision To Decline TPP Agreement Shouldn't Be A Surprise, Trudeau Says', focuses mostly on the existing points of disagreement, while the Global News headline following the conclusion of the same event read 'Canada And 10 Other Countries Officially Announce Agreement On TPP.', centered on the agreement in principle to continue negotiations.
TPP is still being negotiated, it has not been stopped, it is actually closer to becoming a reality than it was before. | 2019-04-20T08:29:13 | http://mediacoop.ca/story/crossed-wires/36628 |
0.997977 | What things should I consider before buying a Spa?
There are many models of spas to choose from, but when selecting a spa you should consider your own personal needs. You need to consider whether your spa is going to be used for hydrotherapy, a place to relax with friends and family, or for entertaining. Spas are not a one size fits all product, there aremodels to suit from the tallest to the shortest person and models to suit lifestyle choice.Nature Spa carries the largest range of Australian made spas, so choosing the right one is made even easier, but you should still test the spa for comfort. The most important points to consider are, checking that the seats provide you with comfortable support.You should nothave to slide down into the spa as you would do in a normal bath. When sitting in any of the seats in the spa, the water should reach shoulder level. If it doesn't, you will not get the full hydrotherapy impact. Stay in the spa for at least 5 minutes. At the end of that time, you will know whether the seating and jet configurations are comfortable.
Why should I buy an Australian Made Spa?
Spas come in a range of prices and configurations, however you should also consider the after sales service of your spa. Being able to source the service and spare parts locally is an important consideration when choosing your spa. Nature Spa a Just Spas distributor carry only the top brands of Australian made spas, as they realise the importance of having a local Spa Warranty. Spas manufactured in Australia ensure that you receive a guaranteed National factory backed customer care program for your spa.
A product warranty is an agreement between you and the manufacturer on the performance and reliability of your spa. Spas purchased from Just Spas are supported by the Australian Manufacturers Warranty.
Do I need to install any Plumbing?
No. All portable spas are filled using a normal garden hose.
How often do I need to clean the Water?
Proper water maintenance is crucial to your spa experience. Maintenance Procedures are not difficult and take up very little time.
Nature Spa will provide you with their registered NO CHLORINE sanitiser, to keep your spa in top condition. The Nature Spa System is environmentally friendly, the water stays fresh longer and can be disposed of on the grass or garden.
Contrary to what some Spa Outlets will tell you, all spas require a sanitiser to remove micro-organisms and keep the water fresh and clean. Even if a Ozone Purification System is fitted to your spa.
Some Spa Outlets will try and convince you that Salt Chlorinators are more beneficial than normal spa sanitiser. The reality is, that Salt Chlorinators turn the salt into Chlorine which can become unstable in the higher temperatures required for Spas. The temperature fluctuation in a spa using a Salt Chlorinator can also cause over chlorination which can attack the PVC components in the spa.
Salt water pool systems or salt chlorine generators, do not replace chlorine. Salt water pool systems work by producing chlorine, and all chlorine introduced by any method makes hypochlorous acid. Pool Owners are beginning to recognize that salt water systems are no easier to maintain that pools using chlorine, as they still need to maintain the water chemistry just as they would with any other form of chlorine sanitisation. Other problems with salt are how to dispose of it safely and corrosion to components. Disposing of the salt is not easy, it has to go somewhere and this cannot be on your garden. Salt system owners have also reported significant damage and repair bills due to corrosion caused by their salt systems.
An added protection in the Just Spas range of spas, is the Microban Filter. The fabric in the filters have been infused with Microban® technology which inhibits the growth of bacteria on the surface. When microbes come into contact with the surface of the filter, the Microban® technology penetrates the cell wall of the micro-organism and disrupts the cell function, which in turn disables the micro-organism ability to function, grow and reproduce. This technology provides you with an added level of cleanliness for your spa.
Hydrotherapy is the use of water to revitalise, maintain, and restore health.
Wikipedia - Hydrotherapy, formerly called Hydropathy, involves the use of water for pain-relief and treating illness. The term hydrotherapy itself is synonymous with the term water cure as it was originally marketed by practitioners and promoters in the 1800s. Many medical practioners and specialists today, will recommend hydrotherapy for all types of rehabilitation. When used in conjunction with the jets and the warm water in a spa, the healing properties intensify and your spa becomes the perfect place to rejuvenate those overworked muscles or help relieve the pain associated with other ailments. Hydrotherapy is also perfect for relaxation, and therefore your spa becomes the perfect tool to relieve stress.
What is the purpose of a circulation pump?
The purpose of a circulation pump is to obtain the maximum filtration of the water in your spa, with the greatest energy efficiency. The high flow, low amperage draw circulation pumps used in the Just Spas range of spas provide maximum flow with whisper quiet operation, whilst drawing only .6 of an amp - that's equivalent to the power needed to illuminate less than a 100 watt light globe. This pump also has the highest 8-1/2 Star Energy Efficiency rating and has been rated as the best performing pump in the industry.
How long before I want to use the Spa should I heat it?
The Balboa Control systems on all the Just Spas range of spas, keep your spas hot and ready to use whenever you are. These control systems come with an economy mode setting to reduce heating costs, and can be programmed to come on at designated times to suit usage. With unparalleled system reliability, these control systems come with a Patented chemical-resistant Titanium heater element and sensor. An extra control panel can also be purchased and installed inside your house for even easier operation.
What surface does the spa need to sit on?
Your spa needs a good solid foundation. If the foundation is inadequate, it may shift or settle after the spa is in place causing stress to the shell. For further information on the placement of your spa, download our Pre Delivery Guide under customer care.
Does my spa need to be wired to the house?
Yes, your portable spa will need to be hardwired to the house supply. You will need to contact your local Electrician. Speak to Nature Spa and we can advise on the best connection method.
You are welcomed and invited to inspect and test all our Spas in our recently extended showroom at 10 Machinery Drv Warana.
We love to meet the customers and provide a spa that will give them many years of joy and happiness without harsh chemicals. | 2019-04-18T12:16:51 | https://sunshinecoastspas.com.au/index.php/spa-faq-s/purchasing-a-spa |
0.999999 | Provide a summary of each article. Compare and contrast the risk perceptions presented in each article. Identify any environmental stressors that are related to the environmental risk. Conclude with a discussion of your own risk perception of the issue. Explain your stance and be sure to cite appropriate sources. This should not be strictly based on your opinion.
Climate change is certainly an environment concept and topic that carries with it strong feelings on both sides of the issue. There are many in the scientific community that feel that climate change is the single most important environmental threat to the earth today, and that if it is not dealt with in a positive manner, serious repercussions will certainly exist for future generations. There are others, however, that feel the current evidence related to climate change does not support such a serious reaction and that there are more important and potentially devastating environmental issues that should be dealt with by the global community. The purpose of this brief review is to illustrate that basis for both of these opinions, while highlighting the seriousness of climate change, no matter whether the risk to the world is high or low. The overarching issue is whether or not humans are causing climate change, as if they are not, then little we are doing today can really impact the future of climate control issues. If, however, humans are causing such harmful climate related issues, then now would be the time to reverse course. | 2019-04-18T22:56:45 | https://brainmass.com/psychology/nature-nurture-debate/environmental-risk-perception-journals-review-592404 |
0.999114 | Converting Hong Kong tsun to Japanese bu value in the length units scale.
TOGGLE : from Japanese bu into Hong Kong tsun in the other way around.
Convert length measuring units between Hong Kong tsun (寸) and Japanese bu (分) but in the other reverse direction from Japanese bu into Hong Kong tsun.
This online length from 寸 into 分 converter is a handy tool not just for certified or experienced professionals.
12.26 分 is converted to 1 of what?
The Japanese bu unit number 12.26 分 converts to 1 寸, one Hong Kong tsun. It is the EQUAL length value of 1 Hong Kong tsun but in the Japanese bu length unit alternative.
How to convert 2 Hong Kong tsun (寸) into Japanese bu (分)? Is there a calculation formula?
1. in practicing Hong Kong tsun and Japanese bu ( 寸 vs. 分 ) values exchange.
How many Japanese bu of length are in 1 Hong Kong tsun? The answer is: The change of 1 寸 ( Hong Kong tsun ) unit of length measure equals = to 12.26 分 ( Japanese bu ) as the equivalent measure for the same length type.
In principle with any measuring task, switched on professional people always ensure, and their success depends on, they get the most precise conversion results everywhere and every-time. Not only whenever possible, it's always so. Often having only a good idea ( or more ideas ) might not be perfect nor good enough solution. If there is an exact known measure in 寸 - Hong Kong tsun for length amount, the rule is that the Hong Kong tsun number gets converted into 分 - Japanese bu or any other length unit absolutely exactly.
Conversion for how many Japanese bu ( 分 ) of length are contained in a Hong Kong tsun ( 1 寸 ). Or, how much in Japanese bu of length is in 1 Hong Kong tsun? To link to this length Hong Kong tsun to Japanese bu online converter simply cut and paste the following.
The link to this tool will appear as: length from Hong Kong tsun (寸) to Japanese bu (分) conversion.
The length converter from 寸 ( Hong Kong tsun ) measure to 分 ( Japanese bu ) equivalent. | 2019-04-21T14:24:44 | https://www.traditionaloven.com/tutorials/distance/convert-hong-kong-tsun-unit-to-japan-bu-unit.html |
0.998473 | So the Juan Carlos Osorio to New York drama has finally played out with yesterday's press conference to announce the 11th head coach in the history of the MetroStars/Red Bulls history.
Apparently New York has given up their 2008 1st round pick, their 3rd round pick in 2011, and cash to pry Osorio away from the Chicago Fire.
Osorio has a history with the club as he was an assistant with the MetroStars earlier in his career. And he obviously had some pretty good success with Chicago last season.
- Soccer by Ives is saying that both John Spencer and Paul Mariner have interviewed for the Chicago Fire job. I think either guy would be a solid hire. But, I think Mariner is a guy that will be a success whenever he gets a head coaching job. He would be my guy if I were calling the shots in Chicago.
- MLS has unveiled their competition guidelines and schedule for 2008. And here is Steven Goff's take on the news. I can't say that the continued grandfathering of the Donovan, Johnson, and Ruiz contracts is surprising. But, I do think it makes MLS look bad.
- A media member with a positive article about a soccer stadium project? Is that legal?
- If Miami gets another kick at the MLS can , it will be a joke. There are about 20 or so markets that I'd put a pro soccer team ahead of Miami. And it's not just soccer, Miami is a pretty bad sports town in general outside of hosting big events like the Super Bowl.
- Are stories like this one examples of soccer really growing up in this country? I think so. | 2019-04-23T04:09:46 | https://www.soccersam.com/blog/santa-gives-the-red-bulls-a-coach |
0.999546 | One of two missions competing to launch under NASA's New Frontiers program is the Comet Astrobiology Exploration Sample Return Mission (CAESAR). This spacecraft would launch to Comet 67P/Churyumov-Gerasimenko in 2024, scoop up a small sample of comet dust and pebbles from its surface, and return the sample to Earth in 2038.
THE WOODLANDS, Texas — Should NASA send a quadcopter to explore the Saturn moon Titan, or launch a spacecraft to fetch a sample from a comet? Only one of these space missions will be selected to launch in the mid-2020s, and the competition is on as the two science teams strive to make a compelling case for their out-of-this-world ideas.
The two mission concepts were selected from 12 proposals as the finalists for NASA's New Frontiers program, which conducts medium-cost robotic space exploration missions (like Juno and New Horizons) capped at $1 billion.
One of the proposed missions, called Dragonfly, aims to send a quadcopter to Saturn's largest moon, Titan. NASA's Cassini mission and the European Space Agency's Huygens probe have shown that Titan could potentially host extraterrestrial life, and Dragonfly would further explore that possibility. Its design would enable it to both fly around in Titan's atmosphere and land on its surface. "This particular vehicle has the opportunity to make many hops and move to several locations and continue on with its chemical analysis," Green said.
The other proposed mission is the Comet Astrobiology Exploration Sample Return Mission (CAESAR). This mission would send a spacecraft "to an old friend," Comet 67P, "a fabulous comet we probably know the most about because of Rosetta," Green said. (Rosetta was a European Space Agency spacecraft that studied Comet 67P from 2014 to 2016.) Much like NASA's OSIRIS-REx mission to an asteroid, CAESAR would scoop up a sample without landing on the comet and return approximately 2.8 ounces (80 grams) of comet dust to Earth.
Another NASA mission concept competing for the opportunity to launch in 2024 or 2025 is Dragonfly, a robotic rotorcraft that would explore Saturn's largest moon, Titan.
While the Dragonfly mission would be the first of its kind in that it would fly a drone on another world, NASA has done a comet-sample-return mission before. The Stardust mission brought back samples of Comet Wild 2 in 2006. However, Green pointed out that a comet-sample-return mission has been an important priority in the decadal survey, a publication by the National Academy of Sciences that guides NASA's decisions when it comes to selecting missions.
For the rest of the year, the Dragonfly and CAESAR teams will be working hard to fine-tune their mission plans by "taking input from evaluations, mitigating risks and coming up with ways that they can improve their proposals," Green said. The winning team will see their mission launch in 2024 or 2025. May the best mission win! | 2019-04-22T18:37:16 | https://www.space.com/40052-titan-quadcopter-comet-sample-mission-nasa-choice.html |
0.99857 | What would Van Morrison be like if he had been born Chinese, in the later part of the 20th century and lived in Malaysia? I'm almost certain, he would be somewhat like Pete Teo.
Rustic Living for Urbanites is a self funded, independent effort recorded with world class musicians and producer and in analogue format at that. For these reasons alone, the album should be worth a listen. Top that with beautifully arranged exotic instruments (the chinese erhu and malaysian percussions) and you have a singer songwriter album like no other.
A look at the track list and you'll realise the pattern of songs about Marianne. 3 to be exact and it tells a story of youthful exhilaration (Arms of Marianne), melancholic reflection (the achingly haunted Marianne Called) and implosive closure (Hush Marianne). in between, are insightful songs of a troubadour lifestyle and vision.
Each track has its own romantic angle, take for instance the most mainstream piece, Jesselton Tonight, which shimmers, sweeps and shakes and juxtapose it with Alive and Free, a tamed, troubled beast of a song.
Pete Teo's music is an acquired taste. at first listen, Malaysians may find his accent rather crude and gritty, but foreigners may simply find it eclectic. After a few spins, the lyrics, poise and warmth of the music grows on you. | 2019-04-23T02:58:56 | http://thisguysplace.tripod.com/peterusticreview.htm |
0.999944 | Ionic Article: What is Apache Cordova?
Ionic’s primary role in the application development space is to provide consistent, platform-specific user interface components, but how does one take their application and transform it into something that can be submitted to the various app stores? That is where Apache Cordova steps into the development flow. Let’s explore what Apache Cordova is and how it interacts with Ionic. So what is Apache Cordova?
Developers are often confused by the difference between Apache Cordova and PhoneGap. In order to clear up this confusion, we need to understand the origins of this project. In late 2008, several engineers from Nitobi, a web development company from Canada, attended an iPhone development camp at the Adobe offices in San Francisco. They explored the idea of using the native WebView as a shell to run their web applications in a native environment. The experiment worked. Over the next few months, they expanded their efforts and were able to leverage this solution to create a framework. They named the project PhoneGap since it allowed web developers the ability to bridge the gap between their web apps and the device’s native capabilities. The project continued to mature, and more plugins were created, enabling more functionality to be accessed on the phone. Other contributors joined the effort, expanding the number of mobile platforms it supported.
In 2011, Adobe bought Nitobi, and the PhoneGap framework was donated to the Apache Foundation. The project was eventually renamed Cordova (which is actually the street name of Nitobi’s office in Vancouver, Canada).
Since there is both Apache Cordova and Adobe PhoneGap, it is quite easy to confuse the projects. This naming issue can be a source of frustration when researching an issue during development and having to search using both Cordova and PhoneGap as keywords to find the solutions, or even reading the proper documentation, as the two projects are so intertwined.
A good way to understand the difference is to think about how Apple has its Safari browser, but it is based on the open source WebKit engine. The same is true here: Cordova is the open source version of the framework, while PhoneGap is the Adobe-branded version. In the end, there is little difference between the two efforts. There are some slight differences in the command-line interfaces, but the functionality is the same. The only thing you cannot do is mix the two projects in the same application. While not as dangerous as when the Ghostbusters crossed their streams, using both Cordova and PhoneGap in the same project will produce nothing but trouble.
The main difference between the projects is that Adobe has some paid services under the PhoneGap brand, most notably the PhoneGap Build service. This is a hosted service that enables you to have your application compiled into native binaries remotely, eliminating the need to install each mobile platform’s SDKs locally. The PhoneGap command line interface tool (CLI) has the ability to utilize this service, while the Cordova CLI does not.
Since the beginning of Ionic, Cordova has been an integral part of the project. While Cordova provides the solutions to use native mobile functionality and to create fully native applications, it doesn't include a UI SDK. With over 100 UI components, plus navigation and platform-specific styling, Ionic allows you to develop high performing, native-like apps.
So, leveraging Cordova permits us to take our web application and have it become a native application that we can then submit to the app stores. Now, Cordova is not the only solution for this. Ionic has recently been developing what you might call the next generation of Cordova, Capacitor. Scheduled to be released in 2109, that effort looks to improve upon the foundations of Cordova, but that is left for another article. Hopefully, you have an understanding of what Cordova is and how it plays within the Ionic development ecosystem. | 2019-04-26T03:54:47 | https://ionicframework.com/enterprise/resources/articles/what-is-apache-cordova |
0.97968 | When do you need to build a podium?
A podium is defined as a platform that is raised above existing surroundings so that it gives prominence to the person or persons on it. While "podia" also refer to the objects behind which speakers stand to deliver lectures, the question of how to build a wooden podium here should only come from people who want to build a temporary stage that will create a necessary platform for speakers or other events that are one-off affairs. Maybe it is an election rally, an event to honor someone, or just a gathering of likeminded people. Such podiums are also needed for large musical shows and media events, but their construction would quite often involve more sturdy materials like steel or aluminum and would seem more semi-permanent in nature.
You would need to define the size of the podium by finding out the maximum number of people that will be on it at any given time, the actions they will be performing, and also the size of the audience expected. If seating arrangements are being made on the podium, you would need to have sufficient room for the chairs and spaces to move around them. Space for tables or other equipment like sound or lighting would also have to be made.
Mark out the podium area on the ground at the location decided for the podium. You would need to create a basic framework to support the stage and take all the weight of the people, furniture and equipment on it. You cannot go wrong if you use 4 X 4s of timber as posts to act as columns to support the structure. Normally podiums would not be more than 3 or 4 feet in height and you would probably need the 4x4s to be a length of about six to seven feet if they are to be embedded in the ground. Mark out a grid of 3 feet by 3 feet within the podium area and dig holes 2 to 3 feet deep which can take the 4×4 posts. Put the posts into the ground and fill them up properly till the posts hold firm. Concreting these bases can make the structure safer, though it is not strictly necessary. If the ground is firm enough, just creating the framework should be good enough and you need not embed the posts in the ground. The posts can then be as long as the proposed height. Connect all the posts in the shorter direction with planks of 6 inch by 1 inch so that the top of the planks and posts are at the same level at the top. Use similar planks in the longer to connect the posts and plank structure with planks laid flat. This will form the basic structure and now for the flooring of the podium.
Flooring of the podium can be done with plywood or other material. Just see that it is strong enough to take the anticipated traffic. Using readymade steel plates is quite common, as they are easy to rent out and can be easily laid down and removed. They would however require some sort of matting or carpet to deaden the noise that can be created by people walking over them. Some podiums may need to be given some protection from the sun, if events are being held in the daytime, then a separate structure to hold up the sun shade may be necessary.
If the height of the podium is increased, you may need to brace the vertical posts at intervals so that the structure has more strength and can take any horizontal forces. This can also help to take care of wind forces which can affect podiums because of the openness of the structure. Make sure that your podium has provision for fire extinguishers as the wooden nature of the podium makes it a fire hazard. Position sufficient sand buckets all around the podium before the start of the event. How to build a podium would have you making provision for electrical connection for the audio and other equipment and lighting where necessary. You need to make sure that all such wiring is done in suitable shielded cabling and with no open wires.
Provision has to be made for sufficient means of entry to the podium top in the form of temporary stairs and there must be a sufficient number of these both in the front and at the sides and back. Ensure that these have handrails which can help the elderly. During construction it must be kept in mind that the structure would have to be dismantled and connections made should be such that can be easily removed while at the same time give the necessary strength during the use of the podium. | 2019-04-26T06:04:39 | https://www.brighthubengineering.com/structural-engineering/89813-how-to-build-a-temporary-wooden-podium/ |
0.998785 | Binary options facilitate people to a great extent to earn money through an unusual source. This source of income was introduced to people in 2008, and it is now used around the globe without any problems around. There are numerous options that these companies offer where people can invest their money to gain profits. Are Binary Options Helpful?The binary options are helpful or not? is the question. The main thing to consider in this respect is to surf the World Wide Web to know about the company where you want to invest. You must remember that this is a type of betting where you predict about the price of a certain commodity. If the price reaches on or above the desired position, you win the bets and get the money that the company has offered. So, a person, who wants to bet on a certain product, has to be pretty careful about the process before finally going for betting.Read Reviews:As there are a number of binary options trading companies working in the market, you have to be pretty careful in the selection of one of them. Reading reviews or getting a word of mouth from the company related people can be of immense help for you. This is the simplest way that may be employed to get information about the right company that has developed a worth in the market and whose platform may be employed to make your work, of the selection of a feasible company, easier.Read Reviews about the Most Lucrative Binary Options:The company related people or its employees have more knowledge about the recent promotional offers. So, it will be a significant step if you turn your attention towards the reviews of the company’s employees. These people are in a better position to explain the most lucrative binary options that the company offers. Read Reviews to Know About Types of Binary Options:As there are any kinds of binary options, it is but natural for people to get knowledge about all the options available for them. The best way to do so is to Google these two words so that to find out the total number of available options. People tell about their experience of winning or losing at certain platform or on certain types of commodities, currencies or stock indices. Now, it is up to you to find out the commodities about which most of the views are positive. This will ensure that they get knowledge about different types of options that are accessible by them. Numerous people have entered their reviews which may be positive or negative. You have to read most of them. If you find a certain number of reviews in favor of a certain commodity or stock exchange asset, you may start getting more and more information about it through different sources like newspapers, magazines, World Wide Web, and so on. This way, you will be able to detect the best possible options in the market.
Rate this article: Are Binary Options Reviews Helpful? | 2019-04-19T16:18:17 | http://actuafreearticles.com/article191360.html |
0.999999 | Video of EVERY 2018 15" MacBook Pro compared for Video Editing!
Whether you use Final Cut Pro, Premiere, or Resolve, video editing is most likely the most intensive use of your machine's graphics card, CPU, and RAM. This video gives a comparison between the machines when benchmarked and tested in various situations.
Max Yuryev is known for publishing videos where he tests the latest gear, whether it's cameras or Macs. The 2018 MacBook Pros were released recently, and there were several issues with regards to over-heating and the machines using less of the GPU and CPU to reduce the thermal build up inside the casing.
Apple fixed it by releasing a patch update, but it's quite strange to think the largest tech company in the world, with a trillion dollar market cap, didn't do sufficient testing. When it comes to pro gear, testing is one of the most important parts of the development, and they should be doing more than what's needed before releasing it to its massive user base. It's for professionals. It should just work, or that's what Apple used to say. There has been a backlash on most social networks, but it seems as if the patch they released with an update fixed the thermal issues.
Final Cut Pro renders quicker in most instances, but there is almost no difference in time when comparing the three different Macs Yuryev tested. It's an Apple-developed application and workflow, so it's understandable for them to optimize the application to run as smoothly as possible.
Adobe Premiere Pro is the laggard here, and there is no comparison when it comes to render times. It's a known fact that Adobe's video editing software takes longer, with all three the machines, which again, render at roughly the same speeds.
Resolve is almost rendering at the same speeds as Final Cut across the board, which is quite impressive.
I usually go for the top spec machine. But in this instance, I tend to agree with Yuryev on what machine is best for video editing, especially if you're doing so on Premiere Pro like I do. The 2.2 GHz clock speed with the i7 six-core processor, 32 GBs of RAM, and the AMD Radeon Pro 560X GPU will do nicely.
I always find this stuff humorous, are people really editing video on laptops?
What a weird thing to shame people for. You know it's not uncommon.
I'm not trying to shame people, but if you were editing any volume of video why would you not be on a dedicated workstation suited to the task.
Why is it shame? He’s prob speaking from experience. In the broadcast film world nobody is cutting on laptops. It’s not even an option given the ports that are required for a pro suite.
Youtubers sure, wedding guys ya, but editing has many tiers and he’s not wrong. Nor is it shaming.
Yeah post houses, broadcasters and production companies are using workstations. Couldn't imagine anybody getting work done without them!
Plenty of Preditors need to have a laptop to cut down, transcode and export packages ready for a final edit back at base. Certain reality TV shows needs this for a tight turn around, since the producers/camera ops on set already know what's going to make the cut.
In fact if I've been cutting on a MacBook Pro for a couple weeks/months, I'll find it hard to get back to a desktop. I've once put an iMac into Target Display mode so I could use my laptop to cut on a larger screen.
Yes they do. Have been doing this for a long time. Right now I am for months away from home and I could not bring my iMac.
And I just remember. I was doing a VFX compositing job for a tv movie on my laptop partly. Mainly because I was on the road.
cool thanks for the response. I've never really known a pro editor who likes to do the bulk of their editing on a laptop. Assemblies yes, but the actual get your hands dirty work the scenes to dealth (frame FKING) is done in the suite.
I've never liked cutting on laptops despite the convenience, i feel like my best work needs a comfortable setting from which to do the work.
What planet do you live on? It's now the norm. And it will become the norm even more as powerful tech shrinks in volume.
It’s the norm where? On youtube maybe. Also the norm is avid media composer, but youtubers don’t use it.
Traditional film and tv editing are all done on desktops. They’re almost all cut on Media Composer as well. Not only do desktops have better components needed to cut higher quality footage, but they have the ports essential for the monitors that go hand in hand with it.
So depending on your editing perspective laptops can be completely irrelevant as a post production workhorse.
I work in it, we don’t use laptops. But to add to that, most certainly don’t use FCPX.
Smaller doesn’t always mean better, especially in a pro environment.
Nobody doubts that a desktop is much more capable. But when you're on the road you cannot always bring your big machine.
And although I agree with you that most postproduction houses work on desktops (and AVID) I know a few editors that edit movies (for cinema) on their laptops because they start to edit in the hotelroom while the film is still being shot. So the director can make changes to the shooting schedule as long as it is possible and not too cost intensive.
I never got in FCPX because I hate the whole "library" thing (but I hate it with any app). I directed a commercials for a few years and on those it was rather standard to have a mobile editing workstation on set to see if everything fits. Editing was done on Avid or FCPX.
So I guess it depends what you do. And what you define as norm. And for youtubers are a new niche which established its own norms. And to them it might be relevant.
I agree with that, also with films being cut on laptops. I would categorize that as assembly though and it's more to do with showing the director the coverage or scenes are working so they can do pickups if need be.
The actual massive amounts of work are done back in a proper suite.
I've done both, on set rough assemblies for directors, but most of that gets completely blown away when we sit down to actually start CUTTING principle photography.
Agreed its' made it easier to do this and shouldn't be overlooked as a tool for that. | 2019-04-21T20:22:42 | https://fstoppers.com/video-editing/comparing-all-2018-macbook-pro-15-inch-laptops-video-editing-275351?utm_source=FS_RSS&utm_medium=RSS&utm_campaign=Author_RSS |
0.994915 | Part two of Naomi Klein's report on the events that triggered a momentous new kind of politics in Argentina.
Up until quite recently, Argentina pursued a policy of official amnesia when it came to the crimes of the Dirty War. Sure, the human rights non-governmental organisations still issued numerous scathing reports, the Mothers of the Plaza de Mayo still marched and the children of disappeared parents still showed up, from time to time, outside the homes of ex-military figures to throw red paint. But before the Argentinazo, most middle-class Argentinians regarded such actions as macabre rituals from a bygone era. Hadn't these people received the memo? The country had "moved on" - or at least it was supposed to have done, according to former president Carlos Menem.
Menem, a Ferrari-driving free-marketeer who is Argentina's very own morphing of Margaret Thatcher and John Gotti, was first elected in 1989, with the economy in recession and inflation soaring. Claiming that many of Argentina's economic troubles stemmed from botched attempts by his predecessor to bring to justice the generals of the Dirty War, Menem offered an alternative approach: instead of going backwards into the hell of unmarked graves and the lies of the past, he said, Argentinians should wipe the slate clean, join the global economy and then put all of their energy into the pursuit of economic growth.
After pardoning the generals, Menem launched a zealous programme of what here in Latin America is called "neo-liberalism": that is, mass privatisations, public sector layoffs, labour market "flexibilisation" and corporate incentives. He slashed federal meals programmes, cut the national unemployment fund by almost 80%, laid off hundreds of thousands of state employees and made many strikes illegal. Menem dubbed this rapid free-market makeover "surgery without anaesthesia", and assured voters that, once the short-term pain subsided, Argentina would be, in the words of one of his advertising campaigns, "born again".
The middle-class residents of Buenos Aires, many of them ashamed of their own complicity or complacency during the Dirty War, enthusiastically embraced the idea of living in a shiny new country without a past. "Don't get involved," the mantra of the terror years, gave way seamlessly to "Look out for Number One", the mantra of high capitalism, in whose cause neighbours are competitors and the market is put before all else, including the quest for justice and the rebuilding of shattered communities. In the years that followed, 1990s Buenos Aires went on a career and consumerism jag that would put the most shopaholic, workaholic New Yorker or Londoner to shame. According to government data, between 1993 and 1998, total household spending increased by $42bn, while spending on imported goods doubled over the same high-rolling five years, from $15bn in 1993 to $30bn in 1998.
In the swanky neighbourhoods of Recoleta and Palermo, residents bought not only the latest imported electronics and designer fashions, but also new faces and new bodies - Buenos Aires soon rivalled Rio de Janeiro as a capital of cosmetic surgery, with one plastic surgeon alone boasting 30,000 clients. Argentinians clearly wanted to be remade, just like their country - and like their president, who himself disappeared periodically, to reappear later with his face stretched taut and claiming that he had been stung by a bee.
The masks and disguises of the 1990s looked remarkably lifelike for a while. The national GDP increased by 60% over the decade and foreign investment poured in. But, just as Enron's stockholders did not care to look too closely at the books so long as their profits were going up, Argentina's foreign investors and lenders somehow failed to see that Menem's lean, mean government was $80bn deeper in debt in 1999 than the 1989 government had been. Or that, thanks largely to layoffs at privatised firms, unemployment had soared from 6.5% in 1989 to 20% in 2000.
In short, "Menem's Miracle", as Time gushingly called it, was a mirage. The wealth flowing in 1990s Argentina was a combination of speculative finance and one-off sales: the phone company, the oil company, the rails, the airline. After the initial cash infusion and greased palms, what was left was a hollowed-out country, costly basic services and a working class that wasn't working. It also left behind it a wild west-style deregulated financial sector that allowed Argentina's richest families to move $140bn in private wealth into foreign bank accounts - more than either the national GDP or the foreign debt.
As Argentina's wealth disappeared, destined for bank accounts in Miami and stock exchanges in Milan, the collective amnesia of the Menem years wore off, too. Today, almost 20 years after the junta's dictatorship ended and with the old military generals dead or dying, the ghosts of the 30,000 disappeared have suddenly reappeared. They now haunt every aspect of the country's present crisis. In the months after the Argentinazo, the past seemed so present that it was as if time itself had collapsed and the state terror had been committed only yesterday. In the courts and on the streets, a national debate erupted not only about how so many had got away with murder, but also about the reasons why the terror had occurred in the first place: why did those 30,000 people die? In whose interest were they killed? And what was the connection between those deaths and the free-market policies that had failed the country so spectacularly?
Back when students and union members were being thrown into green Ford Falcons and driven to clandestine torture centres, there was little time for such questions about root causes and economic interests. During the terror years, Argentinian activists had a single overarching preoccupation - staying alive. When groups such as Amnesty International began to intervene on their behalf, they, too, were preoccupied with day-to-day survival. Investigators would trace the missing people and then petition for their release, or at least for confirmation of their deaths.
There were, however, a few exceptions, individuals who were able to see that the generals had an economic plan as aggressive as their social and political ones. In 1976 and 1977 - the first two years of junta rule, when the terror was at its bloodiest and most barbaric - the generals introduced an economic "restructuring" programme that was to be a foretaste of today's cut-throat corporate globalisation. The average national wage was slashed in half, social spending drastically reduced and price controls removed. The generals were rewarded handsomely for these measures: in those same two years, Argentina received more than $2bn in foreign loans, more than the country had received in all of the previous six years combined. By the time the generals gave back the country in 1983, they had increased the national foreign debt from $7bn to $43bn.
On March 24 1977, a year after the coup, Argentinian investigative journalist Rodolfo Walsh published an Open Letter From A Writer To The Military Junta - it was destined to become one the most famous pieces of writing in modern Latin American letters. In it, Walsh, a member of the Montoneros youth movement, broke with official press censorship by launching a righteous and detailed account of the generals' terror campaign. But there was a second half to the Open Letter which, according to Walsh's biographer, Michael McCaughan, was suppressed by the Montoneros leadership, many of whom, though militant in their tactics, were not as focused as Walsh on economics. The missing half, just published in McCaughan's book, True Crimes, shifted the focus from the military's human rights abuses to its economic programme, with Walsh declaring - somewhat heretically - that the terror was not "the greatest suffering inflicted on the Argentinian people, not the worst violation of human rights which you have committed. It is in the economic policy of this government where one discovers not only the explanation of the crimes, but a greater atrocity which punishes millions of human beings through planned misery."
Walsh once again offered a catalogue of crimes: "Freezing wages with rifle butts while prices rise at bayonet point, abolishing all forms of collective bargaining, prohibiting assemblies and internal commissions, extending working days, raising unemployment ... an economic policy dictated by the International Monetary Fund, following a recipe applied indiscriminately in Zaire or Chile, in Uruguay or Indonesia." Minutes after posting copies of his letter, Walsh was ambushed by police and shot dead on the streets of Buenos Aires.
Harder to kill, however, has been Walsh's description of an economic logic that outlived the dictatorship, a logic that guided the scalpel of Menem's surgery without anaesthetic and that still continues to guide every IMF mission to Argentina, which always seem to call for more cuts to healthcare and education, higher fees for basic services, more bank foreclosures on mortgages. But Walsh didn't call it "good governance" or "fiscal prudence" or "being globally competitive" - he called it "planned misery".
Walsh understood that the generals were not waging a war "on terror" but a war on any barrier to the accumulation of wealth by foreign investors and their local beneficiaries. He is proved more prescient every day. Civil trials continue to unearth fresh evidence that foreign corporations collaborated closely with the junta in its extermination of the union movement in the 1970s. For example, last December a federal prosecutor filed a criminal complaint against Ford Argentina (a subsidiary of Ford), alleging that the company had inside one of its factory compounds a military detention centre where union organisers were taken. "Ford [Argentina] and its executives colluded in the kidnapping of its own workers and I think they should be held accountable for that," says Pedro Troiani, a former Ford assembly line worker who has testified that soldiers kidnapped and beat him inside the factory walls. Mercedes-Benz (now a subsidiary of DaimlerChrysler) is facing a similar investigation in both Germany and Argentina, which stems from allegations that it collaborated with the military in the 1970s to purge one of its plants of union militants, giving names and addresses of 16 workers who were later "disappeared", 14 of them never to be seen again. Both Ford and Mercedes-Benz deny that their executives played any role in any of the deaths.
And then, of course, there is the case of Gustavo Benedetto. On the face of it, there is nothing to connect Benedetto's murder to the past and there is no comparison between the repression during the Argentinazo and the terror of the Dirty War. Yet the Benedetto case highlights the changing role of the military, the state and financial interests, and the current role of ex-military officers.
In the 1970s, Jorge Varando, the man accused of Benedetto's murder, worked for a military regime that opened up Argentina's banking sector to private banks. In 2001, with the military downsized along with the rest of the public sector, he worked directly for one of those very banks. The fear is that the grand achievement of two decades of democracy is only that the middleman has been cut out and that repression has been privatised. Now Argentina's banks and corporations are guarded by units of armed former military officers, who protect them against public protesters, raising difficult questions about the compromises that were made in the country's transition from dictatorship to democracy.
Today, the history of that transition is being rewritten on the streets. There is no neat "before" and "after" the dictatorship. The dictatorship's project is instead emerging as a process: the generals prepped the patient, then Menem performed "the surgery". The junta did more than disappear the union organisers who might have fought the mass layoffs and the socialists who might have refused to implement the IMF's latest austerity plan. The great success of the Dirty War was the culture of fear and individualism that it left behind in neighbourhoods such as La Tablada, where Gustavo Benedetto grew up.
The generals understood that the true obstacle to complete social control was not leftist rebels, but the very presence of tight-knit communities and civil society. Which is why they set out to "disappear" the public sphere itself. On the first day of the 1976 coup, the military banned all "public spectacles", from carnivals to theatre to horse races. Public squares were strictly reserved for shows of military strength and the only communal experience permitted was football. At the same time, the military launched a campaign to turn the entire population into snitches: state-run newspapers were packed with announcements reminding citizens that it was their civic duty to report anyone who seemed to be doing anything "subversive".
And when the population had retreated into their homes, the economic project of the dictatorship could be continued and deepened by successive civilian governments without even having to resort to messy repression - at least until recently.
In the 1970s, when the Mothers of the Plaza de Mayo began searching for their missing loved ones, it was common for these brave women to say that their children were innocents, that they were "doing nothing" when they were taken. Today, the Mothers lead demonstrations against the IMF, talk about "economic terrorism" and proudly declare that their children were indeed doing something when they were kidnapped - they were political activists trying to save the country from the planned misery that began under the dictatorship and only deepened under democracy.
In the rubble that was left of Argentina after December 2001, something extraordinary started to happen: neighbours poked their heads out of their apartments and houses, and, in the absence of a political leadership or a party to make sense of the spontaneous explosion of which they had been a part, they began to talk to each other. To think together. By late January 2002, there were already some 250 "asambleas barriales" (neighbourhood assemblies) in downtown Buenos Aires alone. The streets, parks and plazas were filled with meetings, as people stayed up late into the night, planning, arguing, testifying, voting.
Many of those first assemblies were more like group therapy than political meetings. Participants spoke about their experience of isolation in a city of 11 million. Academics and shopkeepers apologised for not watching out for each other, publicity managers admitted that they used to look down on unemployed factory workers, assuming that they deserved their plight, never thinking that the crisis would reach the bank accounts of the cosmopolitan middle class.
And these apologies for present-day wrongs soon gave way to tearful confessions about events dating back to the dictatorship. A housewife would stand up and publicly admit that, three decades earlier, when she heard yet another story about someone's brother or husband being disappeared, she had learned to close her heart to the suffering, telling herself "Por algo será" - it must have been for something.
Most assemblies began, in the face of so much planned misery, to plan something else: joy, solidarity, another kind of economy. Soup kitchens were opened, job banks and trading clubs formed. In the past year, between 130 and 150 factories, bankrupt and abandoned by their owners, have been taken over by their workers and turned into cooperatives or collectives. At tractor plants, supermarkets, printing houses, aluminium factories and pizza parlours, decisions about company policy are now made in open assemblies, and profits are split equally among the workers.
In recent months, the "fabricas tomadas" (literally, "taken factories") have begun to network among themselves and are beginning to plan an informal "solidarity economy": garment workers from an occupied factory, for example, sew sheets for an occupied health clinic; a supermarket in Rosario, turned into a workers' cooperative, sells pasta from an occupied pasta factory; occupied bakeries are building ovens with tiles from an occupied ceramic plant. "I feel like the dictatorship is finally ending," one asamblista told me when I first arrived in Buenos Aires. "It's like I've been locked in my house for 25 years and now I am finally outside."
Rodolfo Walsh estimated that it would take 20 or 30 years before the effects of the terror campaign would wear off and Argentinians would at last be ready to fight for economic and social justice again. That was a little more than 25 years ago. So I couldn't help thinking of Walsh when I met Gabriela Mitidieri, a self-confident high-school student who, except for her politics, would fit right in at an audition for Fame Academy 2. Mitidieri was born in 1984, the first full year of elected government in Argentina after the dictatorship. "I am the daughter of democracy," she says, with a slight edge of 18-year-old sarcasm. "That means I have a special responsibility."
That responsibility, as she sees it, is vast - finally to free the country from the economic policies that survived the transition from military to civilian rule. Yet she seems undaunted by the task, or at least unafraid. Gaby, as she is called by friends and family, charges off to demonstrations wearing low-slung cargo pants and her brother's Blink 182 knapsack; she holds placards with black-painted fingernails and she stares down police lines with eyes dusted in blue sparkles. Her parents don't share her fearlessness. When the streets of Buenos Aires exploded in the 2001 Argentinazo, the modest Mitidieri home was experiencing an explosion of its own. The conflict was over whether or not the then 17-year-old Gaby would be allowed to join the demonstrations. Gaby was determined to go to the Plaza - "I just couldn't stand to be one of those people who watches the world through a TV screen," she says today. Her father, a survivor of the Dirty War, during which he had been kidnapped and tortured, physically blocked Gaby's way to the door, while she shouted that he, of all people, should understand why she needed to be in the streets. Sergio Mitidieri was unmoved - he had been Gaby's age when he first got involved in student politics and his youth hadn't saved him or his friends, many of whom were killed in the concentration camps.
Like many of his generation, Mitidieri did not return to political activism after the generals retreated. The terror of those years stayed with him, robbing him of the outspoken confidence of his student days - for years, he told Gaby that the scars on his back and shoulders were from sporting injuries. Today, he still doesn't like to talk about the past; he keeps his head down and works hard to support his wife and four children. Gaby says that her father's fear - "He lives with the idea of death hanging over his head" - means that the dictatorship, whether imposed by external terror or internal fear, is still gripping the country. "When I first found out about what happened to my father," Gaby says, "I kept asking myself, 'Why did he live? Why did they let him survive?' Then I read 1984 and I realised that he and the others survived to keep the fear alive, and to remind the entire population of the fear. My father is living proof of that."
But sitting in the Mitidieri home on the first anniversary of the Argentinazo, it struck me that Gaby, the self-proclaimed daughter of democracy, might just be underestimating democracy's contagious power. In 2002, when she announced on the morning of December 19 that she was joining the anniversary demonstrations, her mother quietly helped her pack her knapsack: water, a cellphone, a lemon (it helps mitigate the effects of teargas). She even lent Gaby a headscarf. And Gaby's father watched them pack, looking worried, but also proud.
That evening, the local neighbourhood assembly called for everyone to come out of their houses with their pots and pans to celebrate the day, one year earlier, when something happened to change Argentina (though still no one can explain exactly what that was). And a strange thing happened: Gaby's parents showed up. They hung around on the edges of the gathering, they didn't talk to anyone - but they were there.
"We still have fear," Sergio Mitidieri told me, "but we have anger, too. It's better to fight in the streets than to be quiet at home. Gaby taught me that."
· Naomi Klein, 2003. Additional research by Dawn Makinson and Joseph Huff-Hannon. Naomi Klein is the author of No Logo and Fences And Windows. She is working on a documentary in Argentina. | 2019-04-24T14:50:34 | https://www.theguardian.com/world/2003/jan/25/argentina.weekend72 |
0.99989 | Just going out on a limb here, but we could probably all use a morality upgrade. Say you've told a lie in your life. Or you don't volunteer as much as you should (i.e., at all). Or you just feel bad about a fight you had with a good friend. We're here to help you clean your conscience, be a better person, and—when all else fails—learn how to let yourself off the hook.
According to a study from the University of Notre Dame, adults who were instructed to "speak honestly and sincerely, not only about big things but also small things," were less likely to suffer from nausea, sore throats, or headaches than the participants in a control group (which is what researchers call the rest of us, who lie through our teeth).
You haven't spoken to your college roommate since she said A. J. was the best Backstreet Boy (when it was Nick Carter, obvi), and you miss her. Start by emailing that you've been thinking of her and would love to meet for coffee. If she agrees, choose a coffee shop that's convenient for her, get there early, and start with the apology. "'I'm sorry' goes a long way, but it won't relieve the burden," says Susan Campbell, a coauthor of Five-Minute Relationship Repair (New World Library). Ask how your actions made her feel, and—here's the critical part—really "listen to her answer." If necessary, apologize one more time. If that doesn't do the job, your old friend is made of stone.
As Elton John told us (and Mary J. Blige later reminded us), "sorry" seems to be the hardest word. We can't say it for you, but we can help you say it better. "It's a core skill that's rarely taught," says Frederic Luskin, the director of the Stanford University Forgiveness Projects, which studies the psychological and health benefits of forgiveness.
Keep it simple and you won't lose your nerve or kick off a new fight. Say these three sentences verbatim: "I'm sorry. I messed up. Is there any way I can make it up to you?"
Well, you asked. Now you've got to do it. Be prepared to cancel your evening plans, take someone's whiny four-year-old for an afternoon—whatever it's going to take.
"Be careful not to let someone bring up mistakes you made in the past," says Luskin. "You have every right to say, 'It's over and done with—we finished that. Let's deal with the present.'"
If you have a big mouth, guess what? That's not a secret, either. "As long as you can recognize when you've erred in a way that needs to be addressed, remember that everyone who knows and loves you knows you're flawed—you're the only one make-believing you're perfect."
"Put a reasonable time limit on self-criticism. Mull it over for two weeks and recognize that you screwed up. Then be proud that you dealt with it, you didn't run from it, and now you don't need it anymore."
"Be careful with perfectionism," says Luskin. "Think of a good quality you possess to balance out each negative thought—and remember that it's a true testament of character to take the opportunity to learn from your mistakes and failures."
Not all charities were created equal, nor do they distribute resources equally. We asked ethicist Peter Singer for guidance on giving. "GiveWell is an excellent site for researching charities," he says. Singer himself donates primarily to three. "Oxfam is an advocate for the poor, and the poor need advocates. The Against Malaria Foundation distributes bed nets that protect against malaria. And Mercy for Animals' undercover investigations have enabled people to see what factory farming is really like. Every person who boycotts factory-farmed animal products is reducing suffering."
What's your advice to someone who wants to volunteer but doesn't have time? "You can make a huge difference even if it's an hour a month. In the philanthropic community, a lot of organizations are really small, and the common thread is that they're on a tight budget, so any service helps. Volunteer your services around whatever it is that you're good at. I know a woman who is a really good writer and has a head for numbers, so she writes grants for a small organization. Ninety-five percent of the hours she gives are from home. It's her way of giving back. Another example is tutoring a young child. Kids nowadays get tutored over Skype. To know that the child actually succeeded at that test or that quiz because you were a part of it? It's very, very fulfilling."
If more people thought about volunteering as a means to happiness, would they do more of it? "It's not just about happiness. It's fulfilling in a deep way, and it gets you to connect with people you might not otherwise connect with, and see parts of society you might not see otherwise. My kids and I serve many times in a food line here in Seattle, and it's really not just about the service that we're providing. It's the humanity of connecting over these people's stories and understanding who they are and how they are in the circumstances that they are in. Those are the really meaningful moments."
Any advice on making time to volunteer? "Put it on your calendar and commit to it—it's easier to commit a month ahead. The night before, you'll think, Oh, my gosh, how in the world am I going to do that tomorrow? Until the minute I drive up to the place, I feel like I'm too busy for this. The minute you cross the threshold into the actual work, you think, Why didn't I put this on my calendar four times this month? When it tugs at your heart and brings up your enthusiasm, it stays alive for you, and you start to see where your talents meet the world's needs."
Living "the good life" means something very different when you're talking with the world's most renowned moral philosopher, Peter Singer, a professor of bioethics at Princeton University and the author of The Most Good You Can Do (Yale University Press).
What is the secret to doing good? "It's doing something to help people living in extreme poverty. Realize it's our good luck that we happen to be living in an affluent country and having a comfortable life, and other people just don't have the opportunity to live the way that we do."
You've called for giving to the poor over other causes, but what about the argument that people should give to causes they're passionate about? "Yes, this is something you're passionate about, but that's not the only thing to think about. Think about how much difference you're making in the world and say, 'I will still give to the cause that I feel connected to, but I'm also going to do the most good.'"
You've said "doing the most good" doesn't include giving money to the arts. What did you mean by that? "I'm not convinced that giving to an already wealthy opera house or concert hall or museum makes a significant difference. I could imagine supporting arts in disadvantaged communities and giving to people to express themselves artistically."
What is the biggest ethical dilemma that you face? "I think long and hard each year about how much I'm giving. I started off many years ago giving 10 percent of my income, and then as I got more comfortable I went up to 20 to 25 percent. I'm generally around a third, but I realize I could give more. So each year I think about what I can do in that direction, and there is always some conundrum because there is always a trade-off. Some people will see living an ethical life as involving sacrifice, but they are thinking of sacrifice in narrow terms. I would rather take a broader view and say that all the evidence shows that people who are generous and give to charity are actually happier with their lives. They are more fulfilled. Surely that's what is really important, not how many zeros we have in our bank account."
Are we still allowed to buy nice things? "I know people who like to spend on luxuries, and if they are buying an expensive pair of shoes or a bag, that is money that could have gone to help someone who needs to get food on the table for her family. So they tax themselves—they note down how much they spent this month and give that same sum to effective charities. It makes people feel better and enables them to start giving."
"Eating ethically" is not code for kale salads massaged by Buddhist monks. Mark Bittman, the author of Food Matters: A Guide to Conscious Eating (Simon & Schuster), has advice on how to make sure your dinner isn't destroying the planet.
What does it mean to eat ethically?
"Food should be nutritious, affordable, and green—that is, it should minimize environmental impact. And the humans and animals involved in its production, sale, or consumption should be treated with respect."
What should we do to eat ethically?
"Eat more plants. Even if they are farmed industrially, they use far fewer resources than animal products. Seven or eight years ago, I started eating a strict vegan diet of only unprocessed plant foods during the day. I eat nuts, grains, legumes, vegetables, and fruits from the time I get up until dinnertime, and then I eat whatever I like at dinner."
So we don't have to be vegans?
"Not at all. There is plenty of meat that is sustainable and responsible nowadays. Farmers' markets are great because you can ask questions about the meat, like where it came from. Always engage in conversation. If I find a good source of meat, I buy lots of it and keep it in my freezer."
What do we do when we eat out?
"Cross your fingers? I mean, there's no reason for a restaurant to tell you the truth. A lot of restaurants will say their chicken was hatched and raised humanely or that it's wild salmon, but there's no way for you to know for sure. If a restaurant has an impeccable reputation, Chez Panisse [in Berkeley] for example, then I think you can rest assured. There are restaurants like that in every city." | 2019-04-21T20:26:14 | https://www.allure.com/story/guide-to-becoming-a-better-person |
0.776324 | Al's jaw dropped, he didn't remove The Sorting Hat from his head or get off the stool until Uncle Neville, Professor Longbottom prodded him.
The sea of silver and green ties at the cheering Slytherin table mocked him. He would have a green and silver tie awaiting him in the dungeon. Silver and green? He had specifically asked The Hat to put him in Ravenclaw with Rose and their new friend Scorpius. Dad said he could tell The Hat what house he wanted, but The Hat had refused to listen to him. What was his family going to think?
Al sat at the very end of the Slytherin table. He was the only Slytherin in his family, except for Auntie Andromeda—at least she would be pleased. He didn't even know anyone in Slytherin! He had cousins in every other house, but now he was alone. Maybe he should pretend to be happy.
He turned to the boy next to him and extended his hand. "Al Potter."
The boy shook his hand firmly. "Wilhelm Krum, but everybody calls me Wil."
The food appeared on the table and everybody tucked in enthusiastically. No matter the table, Hogwarts' food was brilliant!
With full stomachs, Al and Wil followed their Prefects—neither of them could remember their names yet—to the dungeon. Al did manage to hear the password for the sliding door, which might be good for tomorrow.
When they entered the Common Room, the Prefects were listing rules and things, but Al couldn't listen. The green-tinted moonlight shining through the portholes in the walls made silver shadows on the floor. The beautiful dance of the silver and green shadows enthralled Al—until a merman peeked through the window, startling him. Al hurried to catch up with the other first years.
The large four-poster beds with lush green hangings and silver ties, reminded Al of mooncalves dancing on the grass, which he had seen once with Aunt Luna.
Al chose the bed next to Wil. Their trunks and other things scurried across the room to the beds their owners had chosen.
"Wicked!" Wil enthused. Al was pretty impressed, too.
Hedwig II hooted loudly at Al. "Just a minute, Hedy, I have to write the letter before you can deliver it."
Al began the letter to his parents. Soon he would know what his family thought of his being Sorted into Slytherin.
After a luxurious night's sleep in his comfy new bed, Al put on his green and silver tie and went to breakfast with Wil, both pleased to find the Great Hall all by themselves.
Hedy, Errol II, and a struggling Pig brought packages. From his parents, Al received a green and silver striped jersey; from Grandma and Grandpa, a green jumper with silver trim; and from Aunt Hermione and Uncle Ron (probably mostly Aunt Hermione) The History of Slytherin House and Famous Slytherins. Al didn't need to read his letters to know everyone was fine with his being in Slytherin.
After breakfast, Rose caught up to Al in the Entrance Hall. With hands on her hips, she demanded, "I thought you were going to tell The Hat you wanted Ravenclaw!"
"I did! The Hat didn't listen!"
Rose snorted. "Ravenclaw is brilliant! There's the best door knocker ever! It asks us questions, and we have to answer correctly so the door will let us into the Common Room. We get to learn things all the time, and the older students help, too!"
Al rolled his eyes at his cousin. He'd strangle that bloody door knocker! Al was thrilled he was Slytherin. | 2019-04-25T20:39:28 | https://mollywheezy.livejournal.com/64259.html |
0.999876 | Is there a correlation between rising secularism and improved quality of life?
Some propose that secularism will continue to rise as people achieve a higher level of security and happiness. In countries such as Japan and Sweden secularism enjoys a high level of existence. The quality of life in these developed countries is among the highest of the industrialized world. So if people feel secure in their daily lives are they less apt to harbor religious convictions? In countries where economic development remains healthy and constant should it be surprising that secularism also experiences growth? Could it be said that religion oftentimes is a crutch for the poor and ignorant of the underdeveloped world?
While a 'food bank' can help with the problem of 'food', being dependent upon this as the 'only' solution might be dysfunctional. Learning how to grow food, trade for it, raise animals when possible, etc, can put us back into our roots as creators.
Give a man a fish and he will eat for a day... but give him a fishing rod and he'll break it and use it for firewood.
...The real bugger is that religious inspired hope is still better than no hope at all.
Rj, in a contest between your theory and my reality, your theory loses.
During my years in Catholicism, which included twelve years in Catholic schools, I heard many times that life on earth is nothing and life in Heaven is everything.
In that kind of talk, where do you see any hope?
In a contest between your reality and my reality, your reality might win.
The fly in your ointment is that I bet that those who actually believe that in practice are few and far between. And I grew up surrounded by Catholics. In fact, most of my neighborhood friends were Catholics. I don't believe any of actually believed that.
U, with only a belief supporting your belief, the fly is in your ointment.
I would say that education level is coincident with secularism, and that the quality of life is usually higher when a majority of the people are well educated. There could be a decent study in that hypothesis. I would start by examining the education levels of certain countries, ranging from highest quality of life, to lowest. Then by conducting a survey in these countries, thereby ascertaining the levels of religiosity in these areas to see how it corresponds.
The well educated societies of Sweden and Japan, being predominantly secular, seem to indicate that education and secularism walk hand in hand, with religion falling behind. It is interesting that catholicism and protestantism are supposedly on the rise in Brazil and certain other South American countries. Brazil is economically much healthier of late and this tends to make one wonder if the premise holds true in all cases.
How many large corporations are setting up shop in these South American countries? Considering what happened to Argentina with the rise of crony capitalism, I think that a sudden rise in economic wealth doesn't necessarily correlate the rise of catholicism and protestantism. Sweden, Switzerland, and Japan are long established wealth centers, and also have a long history of secularism. It's best not to count the chickens in the incubator.
yes; this will answer your question too: https://www.youtube.com/watch?v=mbef07aQtB8&list=PLFB06B91A407F... excellent 2:19 long video.
In my experience, theism offers a fertile ground for atheist production. If the 'known' atheists left, I expect that the 'quiet ones' would fill the void very quickly, and the 'new ones' would be create a deep revolutionary movement.
Intuitively it makes sense...but you'd have to do a lot of investigation and sound statistical analysis to work it out. I would imagine you would need a pretty large team working round the clock for a pretty long time to say this with confidence assuming intellectual integrity and all. So who's going to give it a go?
That's what established records are for. The data has already been collected, so it just waits for some undergrad to write his/her thesis on it. | 2019-04-26T00:48:18 | http://www.thinkatheist.com/forum/topics/is-there-a-correlation-between-rising-secularism-and-improved?commentId=1982180%3AComment%3A1410590 |
0.998646 | DESCRIPTION (provided by applicant): HCV infections are a prevalent and growing health problem. It is estimated that as many as 2% of the US population, and 2.5% of the population world-wide, are infected by HCV. The disease currently causes 15,000 deaths/year in US alone, a number that is predicted to increase three-fold by 2010. Treatment options for HCV infected patients are quite limited, and none of the currently available treatments has a better than 50% probability of eliminating the infection from the patient. Consequently, there is a significant, and immediate unmet medial need for new and better drugs for the treatment of HCV infections. The cyclic peptides constitute a class of compounds that have made crucial contributions human health. These compounds have a considerable presence in several therapeutic areas, ranging from infectious diseases, to cancer and even autoimmune disorders. The discovery of the immunomodulatory cyclic peptide Cyclosporin A (CsA) 50 years ago had a truly profound impact and literally ushered in the era of modern transplantation medicine. Although cyclic peptides often are very efficient drugs, they are also complex natural product molecules (isolated from bacteria and fungi) and as such, they are difficult and expensive to synthesize and/or modify with conventional, synthetic chemistry-based methodologies. Consequently, currently used cyclic peptide-based drugs are either native compounds or native compounds with minor modifications. The vast majority of these compounds have not been optimized for human use and, consequently, the full potential of cyclic peptides, as human therapeutics, has not been explored. The overall goal of the project outlined in this proposal is to use a novel genetic engineering approach that allows cost-effective generation and production of both modified and new cyclic peptides, to generate new and improved anti-HCV drug candidates. The established immunomodulatory drug CsA, a compound with a wide range of pharmacological activities that includes anti-HCV activity, will be used as engineering template. The project involves development of methodologies and a set of genetic tools that allows introduction of modifications to the structure of native CsA by engineering the non-ribosomal peptide synthetase (NRPS) complex responsible its synthesis, in the producer organism Tolypocladium inflatum. Successful implementation of the envisioned genetic engineering approach will not only allow preparation of the envisioned novel anti-HCV drug candidate(s), but also compounds for other therapeutic applications, such as antifungal and antiparasitical compounds and perhaps even derivatives that retain the excellent immunomodulatory properties of native CsA, but not the nephrotoxicity. PUBLIC HEALTH RELEVANCE: Hepatitis C virus (HCV) constitutes a significant and rapidly growing health problem world-wide. HCV infections are associated with considerable morbitity and mortality and existing therapies allows no more than a 50% probability of eliminating the virus form an infected patient. The principal aim of the proposed project is to use a novel genetic engineering approach to develop new, efficacious and well-tolerated drugs for the treatment of HCV infections. | 2019-04-18T16:33:11 | https://sbirsource.com/sbir/awards/98515-generation-of-novel-hcv-drugs-through-engineereing-of-the-cssa-gene |
0.998703 | Blood group, ABO: The major human blood group system. The ABO type of a person depends on the presence or absence of two genes, A and B. These genes determine the configuration of the red blood cell surface. A person who has two A genes has red blood cells of type A. A person who has two B genes has red cells of type B. If the person has one A and one B gene, the red cells are type AB. If the person has neither the A nor the B gene, the red cells are type O. It is essential to match the ABO status of both donor and recipient in blood transfusions and organ transplants. | 2019-04-19T04:36:44 | https://www.medicinenet.com/script/main/art.asp?articlekey=6686 |
0.998466 | How smoking affects the heart with information on cardiovascular diseases.
Cardiovascular disease is a term that is used to describe a number of different diseases that affect the heart and the circulatory system, in particular the heart, the arteries and the blood vessels. In general terms, cardiovascular diseases are caused by an insufficient blood flow and supply through the arteries to the heart, brain and other organs of the body.
The reduced blood supply is caused as the main arteries become clogged up and narrow due to the build up of fatty deposits in the walls of the arteries. This is a process that will develop over a long period of time, although it usually starts when people are in their teens and there are several factors that may speed up the process and therefore put some people at a higher risk of suffering from a cardiovascular disease.
Cardiovascular diseases include heart attack, atherosclerosis, stroke, angina, peripheral vascular disease, coronary heart disease, high blood pressure and aorta aneurysm.
What are the risk factors of cardiovascular disease?
All of these risks can be controlled or modified, in which case the risk of suffering from cardiovascular disease can be greatly reduced.
Smoking is the biggest risk factor out of all of the above and also contributes to the increase of some of the other factors.
Smoking accelerates the process of atherosclerosis, or the build up of fatty deposits and cholesterol in the arteries. Each time a person smokes a cigarette, the blood vessels become sticky from the chemicals in the tobacco smoke and this leads to fat collecting and sticking to the artery walls. Most of the other cardiovascular diseases and coronary heart diseases are caused by the progression of atherosclerosis.
Likewise, smoking also increases blood pressure and the heart rate, which means that the body will need more oxygen. The heart will have to work faster to obtain the necessary oxygen, which is in poor supply due to the effects of the carbon monoxide from the tobacco smoke and this will therefore lead to stress on the heart, which could cause angina or a sudden heart attack.
Not only this, but smoking decreases a person's tolerance to exercise, which would keep the heart strong, and it also increases the tendency for the blood to clot due to an increase in the levels of fibrinogen, a protein that can cause the blood to clot.
The heart is a really powerful and probably the most important muscle in the body. Blood from the heart and the lungs is pumped through the arteries to the capillaries and into the veins (blood vessels), which in turn are directed back to the heart and the lungs.
Oxygen is carried in the blood and is circulated around the whole of the body, nourishing the cells as it goes. A person needs a healthy supply of oxygen in order to stay healthy. Therefore if blood circulation is restricted or reduced, so is the amount of oxygen travelling around the body, which can result in any one of a number of cardiovascular diseases.
Atherosclerosis is the progressive thickening and hardening of the arteries through which the blood flows. Over time, fatty deposits, called plaques and cholesterol, build up in the arteries making them narrower and therefore restrict the flow of the blood to the brain, heart and the rest of the body.
Atherosclerosis is the underlying cause of heart attacks, strokes, heart diseases and most other cardiovascular diseases.
Poisons and toxins in the tobacco smoke that enter the blood greatly contribute to and accelerate the build up of the plaque and smoking also raises the blood cholesterol levels.
When the process of atherosclerosis is so severe that it causes a blockage in the main artery that leads to the heart, a heart attack can occur. This is because blood and oxygen cannot pass through, a clot may form and the heart subsequently dies as a result. The risk of a heart attack is also increased from other effects of smoking as smoking robs the body of oxygen. As carbon monoxide enters the body when a person smokes a cigarette it attaches itself more easily to the blood cells than oxygen does thus depleting the oxygen supply even more.
Angina is caused when the blood supply to the heart is interrupted. This is usually caused by physical exercise but can also be caused by smoking. The result is a tightness and pain of the chest. Angina does not cause death as a heart attack may.
Cigarette smoking puts people at a higher risk of suffering a stroke. A stroke occurs when there is a lack of blood and oxygen reaching the brain or if an artery ruptures and blood escapes into the brain.
Lack of oxygen to the brain is caused by atherosclerosis in the main artery that leads to the brain, which restricts the blood flow and therefore the amount of oxygen that is carried with it. As the blood flow is restricted due to the fatty deposit build up, which narrows the arteries, a blood clot may form and a stroke will result as the tissues around the brain are starved of oxygen.
A stroke may also be caused by high blood pressure, which is in turn increased by smoking. The nicotine in the tobacco smoke causes the blood pressure to rise and this can result in heart failure as well.
This is the narrowing of the arteries that lead to the hands and feet due to the process of atherosclerosis. The result is a reduced blood supply and poor blood circulation to these areas, which may cause pain whilst walking and at worst may lead to amputation. 90% of sufferers of this disease are smokers.
Coronary heart disease is the leading cause of death in the US, Australia and in the UK.
Strokes are the third leading cause of death.
Nearly 40% of people who die from smoking, die from some form of cardiovascular disease.
Smoking increases the risk of a heart attack by up to six times.
Women over 35 who use the contraceptive pill and smoke are at a high risk of suffering from heart disease.
Smoking increases the risk of a stroke by a third.
Heavy smokers are at a much higher risk of suffering from all the above diseases.
The development of atherosclerosis is increased by 50% in smokers.
Heart disease from smoking is increased in people under the age of 45.
Peripheral vascular disease risk is increased by 16 times in smokers.
The risk of cardiovascular disease increases with exposure to tobacco smoke.
The effects and benefits of giving up smoking on the cardiovascular system are immediate and greatly reduce the risk of suffering any one of these diseases.
If a smoker quits smoking, after 15 years he has the same risk of suffering from heart disease as a non-smoker.
Once a smoker stops smoking atherosclerosis is slowed down, the blood is less likely to clot and oxygen and blood can pass through the arteries more freely and more easily, which relieves stress on the heart.
Cholesterol levels are also reduced, which will slow the build up of cholesterol in the arteries and there will be much less carbon monoxide in the body, which means a greater supply of oxygen.
Blood pressure decreases and a person will find it much easier and more pleasurable to exercise, which will keep the heart as well as the rest of the body healthy. | 2019-04-23T09:52:43 | https://www.helpwithsmoking.com/smoking-and-the-heart.php |
0.998615 | The U.S. Attorney's office in Washington Thursday appeared to back off its claim that a suspect said to be social media friends with Pittsburgh synagogue shooting suspect Robert Bowers stated online that the massacre "was just a dry run for things to come."
But federal prosecutors still want Jeffrey R. Clark behind bars.
The clarification came in a pretrial detention memo filed after an NBC News analysis published Wednesday revealed that Clark posed that statement Oct. 26 — a day before the synagogue attack in Pittsburgh. The post rather was likely referring to the pipe bombs that were mailed to various high-profile critics of the Trump administration, the FBI filing indicated.
Clark, 30, was charged on Nov. 9 with transportation of a firearm across state lines and possession of illegal, high capacity magazines intended for use with AR-15 weapons after a search of his residence in Washington, D.C., turned up the items, according to an FBI affidavit.
The suspect lives with his father and sister, and the bureau described him as a neo-Nazi who praised Bowers as a "hero." Bowers has pleaded not guilty to federal hate crime charges. The FBI said Clark posted on conservative social media site Gab that the synagogue victims "deserved exactly what happened to them and so much worse." His Gab account has since been deleted.
But the Thursday court filing by the U.S. Attorney's Office appeared to acknowledge that the "dry run" remark was a response to the Oct. 26 arrest of Cesar Sayoc, who is alleged to have mailed pipe bombs to several critics of President Donald Trump. In fact, the filing states that the remark was posted "on or about October 26," a day before the synagogue tragedy.
Still, the U.S. attorney argued, "The court should not view this statement as simple hyperbole."
Prosecutors also said that the FBI's interpretation of an image posted to Clark's account Oct. 26 was "incorrect." The FBI affidavit described it as "a picture of Robert Bowers, armed with a gun, splattered in what appears to be blood."
But NBC News discovered it's actually a known alt-right meme.
The FBI said in its original affidavit that that "dry run" statement "implies that Jeffery Clark did know more about the attack in the Tree-of-Life synagogue, and that there was more to come."
The NBC News analysis could not verify that Clark ever posted that Bowers was a hero or that the victims deserved their fate. But it did appear, in fact, that he and Bowers followed each other on Gab — without any known interaction.
The U.S. Attorney's Office in Washington had no comment. A public defender listed as representing Clark did not respond to NBC News' inquiries. | 2019-04-20T08:56:44 | https://www.nbcnews.com/news/crime-courts/feds-backs-claim-man-said-synagogue-attack-was-dry-run-n936991 |
0.998885 | Fresh salads like this are very good in days when I want to suppress my appetite or have a good nutritive snack on the go or between meals.
I just prepare it for 2 or 3 days and add the dressing before eating.
4) Black and green olives.
5) Sliced green and red bell pepper.
1) 4 table spoons olive oil.
2) 1 teaspoon dry basil.
3) 1 lemon juiced .
4) 2 tablespoons white vinegar.
Mix all the ingredients together and add the dressing just before serving it. | 2019-04-22T08:53:57 | http://www.sweetmothertobe.com/salads-appetizers/delicious-summer-salad |
0.999897 | Google*Inc. is testing technology that will find the location of people using its mobile mapping service, even if the phone making the connection isn't equipped with a GPS receiver.
Following you I climb The Mountain (View).
The tracking system isn't set up to collect a user's phone number or any other personal information that would reveal a person's identity, said Steve Lee, product manager for Google's mobile maps. As a safeguard, the feature can be turned off at any time by clicking on a link in the help menu.
Those assurances probably will alleviate privacy concerns raised about the new service, analyst Greg Sterling of Sterling Market Intelligence said.
After trying out "My Location" on a BlackBerry device, Sterling predicted people will embrace it. He called it "an incremental improvement but still meaningful."
Unlike GPS, Google's tracking feature works while handsets are indoors. "My Location" also drains less power from a phone's battery than a GPS receiver does.
On the downside, Google's service isn't as precise as GPS. In most instances, Google hopes to get within one-quarter to three miles of a user's location -- close enough to provide helpful "neighborhood-level" information, Lee said.
The database that identifies the location of a mobile phone is still under construction, so the service still sometimes draws a blank. The company expects to fill in the holes as more people use the service, Lee said.
The tracking system's database currently spans more than 20 countries, including United States, much of Europe, Australia, New Zealand, the Russian Federation and Taiwan. It doesn't work in China or Japan. | 2019-04-22T00:57:29 | http://www.madisonavenuejournal.com/2007/11/29/googlecan_see_me/ |
0.999996 | Overridden. Converts the SampleRange object to its equivalent sample range string representation.
The string corresponding to the SampleRange object. | 2019-04-19T03:16:46 | https://www.leadtools.com/help/leadtools/v20/dh/ji/samplerange-tostring.html |
0.99875 | Who is Jesus addressing in John 13:27?
Is Jesus directing His words towards (a) Judas, (b) Satan, or (c) both? How can we draw a definite conclusion here?
21 After saying these things, Jesus was troubled in his spirit, and testified, “Truly, truly, I say to you, one of you will betray me.” 22 The disciples looked at one another, uncertain of whom he spoke. 23 One of his disciples, whom Jesus loved, was reclining at table at Jesus’ side, 24 so Simon Peter motioned to him to ask Jesus of whom he was speaking. 25 So that disciple, leaning back against Jesus, said to him, “Lord, who is it?” 26 Jesus answered, “It is he to whom I will give this morsel of bread when I have dipped it.” So when he had dipped the morsel, he gave it to Judas, the son of Simon Iscariot. 27 Then after he had taken the morsel, Satan entered into him. Jesus said to him, “What you are going to do, do quickly.” 28 Now no one at the table knew why he said this to him. 29 Some thought that, because Judas had the moneybag, Jesus was telling him, “Buy what we need for the feast,” or that he should give something to the poor. 30 So, after receiving the morsel of bread, he immediately went out. And it was night.
We may not be able to draw a "definite conclusion," as you put it.
And Jesus answered and said unto him, "Get thee behind me, Satan: for it is written, Thou shalt worship the Lord thy God, and him only shalt thou serve" (my italics).
But Jesus turned, and said unto Peter, Get thee behind me, Satan: thou art an offence unto me: for thou savourest not the things that be of God, but those that be of men (Matthew 16:22 KJV with my italics).
In fairness to Peter, notice that when Jesus turned to rebuke Peter for suggesting he could sidestep the cross which loomed before him, he "looked on his disciples" and not just Peter. Peter may have been the first and only disciple who protested Jesus' insistence on going to Jerusalem to be killed, but I'm quite certain the other disciples were on the same wavelength with Peter (see Matthew 17:23 NKJV).
"Get thee behind me, Satan."
Jesus did not say this, however. For one thing, Jesus had not been conversing with Judas one-on-one prior to announcing one of the twelve disciples would betray him. Furthermore, had the disciples put two and two together when Jesus spoke to Judas, they would likely have prevented Judas from leaving the upper room.
I've always wondered why the disciple whom Jesus loved (viz., John, the son of Zebedee), the one who asked Jesus who the betrayer was, did not seem to make the connection between Jesus' sharing of the sop with Judas (which Jesus said he would) and Judas being the betrayer.
thought that, because Judas had the moneybag, Jesus was telling him, “Buy what we need for the feast,” or that he should give something to the poor. So, after receiving the morsel of bread, he immediately went out. And it was night" (John 13:29-30).
Perhaps John and the other disciples were a bit slow on the uptake, but notice that Judas hightailed it out of there immediately, before the disciples had time to process what had just happened.
In conclusion, I think it highly unlikely that Jesus addressed Satan only. I think it more likely that Jesus addressed both Satan and Judas, even though Jesus did not address Judas as Satan, as he had addressed Peter some time before this incident occurred.
Now while they were staying in Galilee, Jesus said to them, "The Son of Man is about to be betrayed into the hands of men, and they will kill Him, and the third day He will be raised up." And they were exceedingly sorrowful (Matthew 17:22-23).
1 Cor 11:27 comes to mind here: "Who eats...unworthily will be guilty of sinning against the body and blood of the Lord"--which Judas was.
Jesus's divine prescience ("what you are about to do") rules out the betrayal being a commandment of God.
John 6:70, "have I not chosen you 12, yet one of you is a devil" as well as 13:18 ("I know those I have chosen") shows that Judas was plotting against God's plan quite knowingly.
But there was a clear moment in time when "Satan entered" Judas; the spirit of illogical (this could never work out well for Judas) self-direction takes him over. I think Jesus had to be addressing both.
Not the answer you're looking for? Browse other questions tagged john jesus satan judas or ask your own question.
Does Scripture imply that Judas knew that the high-priests and elders' goal was to have Jesus killed?
Are Simon the Pharisee (in Luke) and Simon the leper (in other Gospels) the same person?
In John 13 did Christ reveal the betrayer Judas only to the disciple whom he loved?
Does John 13 refer to the Lord's supper?
Why did Christ wash Judas feet in John 13:5?
Is John 12:3 an allusion to Song of Solomon 1:12?
In John 13:26 is Judas supposed to represent Judah? | 2019-04-23T20:13:40 | https://hermeneutics.stackexchange.com/questions/20258/who-is-jesus-addressing-in-john-1327 |
0.998841 | How could this blog's ID be celebrated?
up to 2012 our ID building social business (celebrating 20000 alumni of journals, JobsComps, dvds and books of Muhammad Yunus): celebrated how Bangladeshi Muslims and village mothers had prepared the way since 1972 - inviting worldwide millennials to celebrate wmen4empowerment to end poverty- since 2013 POP celebrations with Koreans, global social health networkers and Franciscans have explained how MarySearch invites all women and hopefully most millennial men to sustain the human race's new millennium. Can educators of every culture (eg gandhi, mandela, King -you tell us) help 4 hemispheres and 2 genders of us all to see that 2030now's twin goals of end poverty and map sustainability are natural win-wins?
In 2011, we had problems beyond Grameen, The problem of microcredit: The press were very critical of microcredit in 2011. Lots of stories came, lots of accusations came; it became a global phenomenon as if microcredit is about to disappear, which luckily is not the case. We have explained to people what was the problem, it was a localized problem in India, not a general problem. Now things have subsided , microcrwdit can move ahead stronger than ever.
So we need to put things in perspective. Have we come to an end of one human civilization? That one built on a particular framework which we can now see that not only doesn’t solve problems, itself doesn’t function – it causes a crisis that is unmanageable . The present system has brought the problems of climate change, problems of poverty, problems of poor health – all the massive problems that we have been talking about.
So now the fundamental issues suggest this structure cannot remain in place. So 2012 has to address all these issues : can we end one civilisation and at same time start building a new one? What will be the building blocks of this new system? One of the building blocks we offer from our side which we have been doing for several years is the idea of expanding the capitalist structure. We have to put in the building block of social business – another kind of business – the obsession with money cannot just continue- we need to become conscious of the society, of other people in our individual lives which is missing in the present system. So that’s what we need to bring in very consciously in 2012 – the building block of Social Business. We have to make it recognisable, make it attractive, make it functioning all over the world – not just in 1 country or 2 countries – we should be working in at least 50 countries -taking root this year, so at least two or 3 social business are functioning. We have to move on from achievements of 2011 of Social Business to a 2012 level where it will be feasible, it will give hopes to people, it will excite the young generation, To the young people of the world : yes you don’t have to inherit a crumbling structure, we can build a new structure and this is within our means and capacity to do. That’s what we want to do, so 2012 will be the year for young people, for creativity , the year of social business .We have lots of actions lined up for 2012 –as far as Social Business is concerned. We need you to get involved in Social Business, each one of us can create Social Business by creating ideas, by bringing new designs for SB. Once we can put the design in place, we can go into actions. Today some structures are already emerging, and 2012 will give them more shape. So that they can be functioning.
Events that we have designed in past will continue in a stronger way. First of all in beginning year National University of Singapore organising SB forum for the region. We will bring people together right form the beginning of the year to see where we stand and what needs to be done. All of you are invited to come and join us in Singapore at end of February. So this is the first one we see on the agenda. The next one we see is in Japan in July – the social business forum Asia that is organised by Fuzhou University – a very important forum bring business leaders, youth across region and policy makers , academics to get together to see where we take social business in Asia. Then the global social business summit- the fourth summit (the 4th one) will be taking place in Vienna in first week of november. We look forward to seeing you there with lot of ideas, concrete ideas not just coming to listen- we will have a large display room to see what we can do for employment generation , addressing climate and environmental issue – many things we want to do. So all these thing will take positions, there are many initiatives coming from many countries. We are also looking forward to Social Business tours – first Social Business tour of Africa on millennium goals- and we would like this to extend to North Africa and Middle East and other regions. We want to connect concrete action plans across the countries we go to. – and connect young people and business ceos so that these contacts can start a whole series of Social Business all around of us. We want to make 2012 a memorable year for SB, really giving a big push in terms of thinking, actions, connecting new partners. In terms of exploring possibilities, We don’t want to get caught up in sad news, all the difficulties of economy, all the depressing thoughts of unemployment. We want to bring out the entrepreneurial ability of people rather than just waiting for getting a job. We will have to see who wants to be job seekers or job givers. Definitely Social Business opens up the possibility t many people can be job givers.
Emphasising participation of young people in large numbers in an active way.
We need to focus on priority areas job creation and entrepreneurial activity because unemployment has created crisis around young people everywhere, So this is a good time to see that unemployment can be overcome- we would like in the new civilisation we want to build, unemployment should be a word of the past. It should be banished . We see it as the very nature of people to keep themselves busy, keep themselves utilized- there is no reason why an active human creative human being should be unemployed and not able to exercise her or his own creativity through life.
Focusing on achieving the 8 goals, you can pick one of them or part of them and see concrete examples of creations of that. We will be bringing technology, creating new technology and creative power to address those problems. This is the beginning of a complete action so that we build up a massive solutions infrastructure.
So these are 2012 challenges to the world altogether . Keep in touch – we wish a fantastic year for all of us not just us in this conversation but the whole world. We cannot just go on the way it was , we have the power to change the world and we must do it, we must change the world, this is our task, and we will accomplish it by making 2012 the year we make the building block we are looking for, and we can present it to the whole world as social business. We wish you a happy new year and a very successful new year.
please tell me if you would like an invitation to co-blog jobslearning.net which MOOCs, investor models, prof trusts empower millennials jobs, end poverty?
In many countries the rich pay for any healthcare they want, while the mass public service is inefficient, failing to reach people who need it most. The big empty space between the two can be filled by social business.
Social Business can also play a role in improving the healthcare infrastructure. GH s already in the process of setting up nursing colleges top train girls from Grameen Bank families . Bangladesh has an enormous shortage of nursing professionals. There is no reason why vast numbers of girls should be sitting around in the villages while these attractive job opportunities go unfilled. Nursing colleges run as social businesses can bridge this void.
Many other segments of healthcare are appropriate for building successful social businesses : nutrition, water , energy, health insurance, health education and training, eye care, mother and child care, diagnostic services and so on.
Social Business is a way of putting the most powerful technologies to work. Our world is in possession of amazing technologies that are growing fast and more powerful every day. All this technology is owned and controlled by profit-making businesses. All they use this technology for is to make more money, because that is the shareholders mandate. Imagine what we can achieve if e use this same technology to solve the problems of the people!
Viewed more broadly, technology is simply a kind of vehicle. One can drive it to any desired destination. Since the present owners want to travel to the peaks of profit-making, technology takes them there. If somebody else decides to use the existing technology to end poverty, it will take the owner in that direction. If another owner wants to use it to end diseases, the technology will go there. The choice is ours. The only problem is that the present theoretical framework under which capitalism operates does not give this choice. The inclusion of social business creates this choice.
One more point to ponder: there is actually no need to choose. using technology for new purpose doesn’t make it less effective for serving a different purposes. Actually, it is the other way round. The more diverse uses we make of technology, the more powerful it gets. Using technology for solving social problems will not reduce its effectiveness for making money, but rather enhance it.
The owners of social business can direct the power of technology to solve the growing list of social and economic problems, and get quick results. And in the process. they will generate even more technological idea for future generations of scientists and engineers to develop. The world of social business will benefit not only the poor but all of humanity.
Once the concept of social business becomes widely known, creative people will come forward with attractive designs for social business. Young people will develop business pans to address the most difficult social problems through social business. The wonderful promise of social business makes it all the more important we redefine and broaden our present economic framework. We need a new way of thinking about economics that is mot prone t creating series of crosses; instead it should be capable of ending the crises once and for all. Now is the time for bold and creative thinking - we need to move fast, as the world is changing fast.
Community Actvists: Beyond Wall Street" | 2019-04-18T20:30:45 | http://marysearch.blogspot.com/ |
0.999684 | In many countries women are allowed to take maternity leave from their jobs during the first month after the birth of their baby. Do advantages outweigh disadvantages?
1. Men and women employed in full-time jobs have to share evenly household chores and caring for children at home. Do you agree or disagree with this statement?
2. Nowadays people becoming parents later in life. Some think it is not a good development for the family and for the country. Why is this happening and what are the possible consequences of that for the family and the society?
Being a mother is a milestone for many women in the course of life, which means that the long term nurturing and caring of the unborn babies finally bear fruit. Though I am not a feminist, I suppose it is very necessary for female to take a maternity leave in the wake of delivery.
Being temporarily off work means the newly mothers can have a time to recover from their delivery. The birth of a baby indicates the painstaking care from his/her mother, which is quite arduous and energy-consuming. With the maternity leave, mothers can enjoy the professional health care in some well-equipped hospitals or be soundly taken care of by their family, guaranteeing that they can recuperate from this strenuous process soon.
Besides, the maternity leave can also make it possible that father, mother and the newly-born baby share good quality family time. The birth of the baby means the completion of a new family and every member of the family is indispensable during this time. If women are deprived of the maternity leave, not only their babies cannot be taken care of, but also it leaves an emotional isolation, thereby making the family less closely-knit.
There are, of course, some problems for women to take the maternity leave. The elevation of female status and their competitiveness in workplace render them to be irreplaceable to some extent. Although the maternity leave is not long, it is still likely to bring about the managerial problems to the companies and organizations where they work.
1. Being a mother is a milestone for many women in the course of life, which means that the long term nurturing and caring of the unborn babies finally bear fruit.
2. Though I am not a feminist, I suppose it is very necessary for female to take a maternity leave in the wake of delivery.
3. With the maternity leave, mothers can enjoy the professional health care in some well-equipped hospitals or be soundly taken care of by their family, guaranteeing that they can recuperate from this strenuous process soon.
4. If women are deprived of the maternity leave, not only their babies cannot be taken care of, but also it leaves an emotional isolation, thereby making the family less closely-knit.
5. it is still likely to bring about the managerial problems to the companies and organizations where they work. | 2019-04-20T00:23:36 | http://ielts.sljy.com/changshi33885.html |
0.999928 | Can't believe I didn't post this story before. A Charlie Brown Christmas 30 minute television special has been my favorite holiday show since it's debut in 1965. Of course I am not alone, who doesn't love this show?
I just discovered that there is a book detailing the creation and production of this iconic tv show.
Bringing the Peanuts characters to television was not an easy task. The strip's creators, with funding from sponsor Coca-Cola, presented the CBS network with an idea for a Christmas television special starring Schulz's characters.
The production was done on a shoestring budget, resulting in a somewhat choppy animation style and, from a technical standpoint, poorly mixed sound. With the exception of the actors who voiced Charlie Brown (Peter Robbins) and Lucy (Tracy Stratford), none of the children had any experience doing voice work.
This was especially challenging for Kathy Steinberg, who voiced Sally: she was too young to read and needed to be cued line by line during the soundtrack recording. The technical issues are in evidence on the show's audio track, which to some may seem noticeably choppy and poorly enunciated.
One of the more noticeable quirks in the special include a shot in which Schroeder abruptly stops playing the piano, but several of the characters continue dancing for a couple of seconds. (Who knew that was a mistake??) Melendez said he remained somewhat embarrassed to see the show repeated every year with all its problems, but Schulz vetoed his idea of "fixing" the program years later.
50% of the televisions in the United States were tuned to the first broadcast. A Charlie Brown Christmas won an Emmy and a Peabody award, and is a timeless Christmas holiday classic.
The success of the animated special, A Charlie Brown Christmas has given rise to the animated holiday special. Now there are about 10 classic animated holiday specials that sprung from this iconic show.
The musical soundtrack to A Charlie Brown Christmas, by jazz composer Vince Guaraldi, has become as well-known as the story itself. In particular, the instrumental "Linus and Lucy" has come to be regarded as the signature musical theme of the Peanuts specials.
Additionally "Christmas Time is Here" has become a popular Christmas tune. A soundtrack album for the special was released by Fantasy Records and remains a perennial best-seller. The popularity of the special is rumored to have practically eliminated the popularity of the aluminum Christmas tree.
A popular fad between 1958 and 1965, but because of the negative publicity the trees received in A Charlie Brown Christmas, quickly fell out of favor.
By 1967, just two years after the special aired, they were no longer being regularly manufactured.
Best x-mas record Vince Guaraldi trio.
Thank you so much for researching and saying where you got the info. I used it on my site since I was covering this today. So I have linked to your site. | 2019-04-23T21:05:22 | http://www.retrokimmer.com/2010/12/charlie-brown-christmas-premiered-dec-9.html |
0.998878 | ;;In a previous post I deleted, I was trying to find a good way to ensure the minimal parsimonious Voice-Leading (VL) between a sequence of chords.
;;In this post I will try to explain my second attempt.
;;; Please note the use of the replace-map function ensuring that no movement will be greater than a tritone away. This means that a movement like "C to G" (7 semitones) will be convertet in a G to C (5 semitones). This ensure a modulo 12 (octave constraint) reduction of all the material and also a constraint in terms of the size of the movements that will not exceed 6 semitones.
Hope it help some VL efforts.
Then in the window choose "No Syntax Highlighting"
Thanks for sharing these codes. So I'm trying to understand if the following approach could work - it seems to work for your example (but not for every progression).
can generate one of two options. The second one is obviously better since it uses a common tone. Even with ambitus-chord I'm not able to make it work consistently.
If you have any thoughts I'd be happy to hear them.
My question is why does it produce two variants and how can one make sure it always chooses the shortest path?
To me it seems like the second option is the correct one since the total half steps between all the voices is 6 (b-c, g-f, c-a) and in the first the total half steps between the voices is 8. | 2019-04-19T20:43:09 | https://opusmodus.com/forums/topic/998-parsimonious-voice-leading-again-attempts-to-provide-an-algorithm/?tab=comments |
0.999999 | Practice the word 'I' by saying, reading and writing it. 1. Tap the add button. 2. Tap the mic and read the word. 3. Tap the T and find the letter on the keyboard to spell the word. 4. Tap the pencil to find the word and circle it. 5. Tap the pencil and write the word on the line. 6. Tap the pencil and write the word in 3 different colours. 7. Tap the tick when you have finished. | 2019-04-26T00:26:18 | https://app.seesaw.me/activities/y5nvgb/i-am-learning-the-word-i |
0.999717 | While players have rights, they also have responsibilities to themselves, their teammates, competitors, coaches/officials, parents, and spectators. In short, they must strive to 'Honor the game' through superior sportsmanship and personal integrity.
One: A young athlete 'Honors the Game' of lacrosse. He/she values the rich tradition of his/her sport and works to honor the spirit as well as the letter of its rules.
Two: A young athlete honors his/herself. This is achieved by continuously working to improve themselves and trying their hardest regardless of the outcome of the game/season.
Three: A young athlete honors their teammates. This is achieved by being supportive of one's teammates regardless of physical ability, game performance, or game outcome. Positive comments or "put-ups" are encouraged while "put-downs" are not tolerated.
Four: A young athlete honors their competitors and recognizes that a worthy opponent will push him/her and his/her team to do their best.
Five: A young athlete honors their coaches. He/she understands the important role that coaches play and strives to show them respect. This includes respecting their instructions and huddling and listening quietly when a meeting is called.
Six: A young athlete honors referees/officials. He/she understands the important role that officials play and strives to show them respect even when he/she disagrees with their decisions. This is a Zero Tolerance Policy issue and is an important part of honoring the game.
Seven: A young athlete honors his/her parents and family. Playing lacrosse is a privilege made possible by the support of one's parents and family. Show appreciation for the time, financial, and emotional commitments your family makes. These include: driving to practices and games, attending/cheering at practices and games, paying for equipment, and supporting you in your efforts to continually improve yourself.
Eight: A young athlete honors practice as a time to improve both themselves and their teammates. While practices should be fun, mischievous behavior or "fooling around" is disruptive and disrespectful to your coaches and teammates.
Nine: A young athlete learns to win graciously. This is an important component of honoring one's competitors.
Ten: A young athlete learns to lose with dignity. While winning is generally more fun than losing, it is important to remember that winning is a by-product of a number of other goals. We play lacrosse to have fun and improve ourselves physically, mentally, and conscientiously. Sometimes the greatest lessons are learned in losing efforts. Regardless of outcome, a young athlete tries his/her hardest, improves his/her mastery of the game, and plays according to the spirit as well as the letter of its rules. | 2019-04-22T13:56:03 | http://brooklineyouthlacrosse.org/Page.asp?n=17696&org=M.BROOKLINEYOUTHLACROSSE.ORG |
0.999994 | Is my conversion goal working and can I edit it?
The Conversion goals page allows you to review each goal and track the goal type, status, and the number of conversions.
The status of the conversion goal which can be either - active or paused. There is no delete but you can pause conversion goals. When a goal is paused, Bing Ads stops counting conversions for that conversion goal.
Yes. In the table, hover over the Status, click the arrow that appears, and then select Enable or Pause.
What it is: The name of the conversion goal.
Can I edit it: Yes. Click Edit and then Edit goal. Please note that after you choose a name for your conversion goal, the same name may not be used again in the future.
What it is: This is the conversion goal type, which can be destination URL, duration, pages viewed per visit, event, or mobile app install. You define the type when you create the conversion goal.
Can I edit it: Yes. Click Edit and then Edit goal. The edit only applies to the conversion goal going forward and doesn't impact the conversion goal data before the edit.
What it is: It determines if the goal applies to all accounts or a specific account.
Can I edit it: No. Once you set sharing, you can't change it. If you want to change the sharing scope, you need to create a new conversion goal and pause the old one.
No recent conversions: Bing Ads has seen your UET tag, but haven't recorded any conversions in the last 7 days. This is most likely because you either have created the goal incorrectly, have not tagged your entire website, especially the pages that have the conversion action or you don't have any users converting on your site.
Recording conversions: Bing Ads has seen your UET tag and has recorded conversions within the last 7 days.
Note that the Unverified and Tag inactive statuses do not apply to Mobile App Install type goals.
What it is: The name of the UET tag associated with this goal. Click on View tag to see the UET tag tracking code.
What it is: This shows the number of conversions for this goal for the selected date range. You can change the date range in the upper right corner of the page.
What it is: This shows the overall revenue tracked for this goal for the selected date range. You can change the date range in the upper right corner of the page. | 2019-04-20T06:36:27 | http://help.bingads.microsoft.com/apex/index/3/en/56693 |
0.997631 | 1.1 What is a program?
A program is typically defined as a sequence of instructions for a computer to carry out in order to do a particular job, but this is perhaps a rather simplistic definition. You can also look at it another way and say that a program is a model of some aspect of the real world which you can use to mimic the behaviour of the real world. The more accurate the model is the better the results you can expect to get. For example, a program to calculate a companys payroll is modelling aspects of the real world such as income tax legislation. A program to forecast the weather is modelling atmospheric conditions such as temperature, pressure and humidity. And a program such as the word processor Im using to write this book is modelling things like letters, words, lines and paragraphs. Inside the computer all these things are represented as patterns of 0s and 1s but programs manipulate them in such a way as to make these patterns behave like the things they are supposed to represent. A program is not just a sequence of instructions; instead, it models objects in the real world in such a way as to mimic the behaviour you would expect from those objects as they interact in the real world. This is the basis of the object-oriented approach to programming, where the program is regarded as a collection of interacting objects rather than just a featureless sequence of instructions.
In this book youre going to learn how to write programs in Ada, a general purpose programming language originally commissioned by the US Department of Defense. The first standard for the Ada language was finalised in 1983 and was later revised to produce a new updated standard in 1995. The earlier version is now known as Ada 83 and the later version (the one covered in this book) as Ada 95. Ada programs use a somewhat stilted kind of formal English in order to specify the operations you want the computer to perform. You provide some declarations which specify the objects that the program is going to deal with. You also provide a sequence of statements specifying the actions you want performed on those objects and the computer will perform them in order, one after the other. A set of declarations together with a sequence of statements like this makes up a procedure which you invent a name for. For example, you might write a procedure which clears the screen and call it Clear_Screen.
Computers do not understand Ada directly; the text of your procedure (the source code) must first of all be translated (compiled) into an internal form by an Ada compiler. The compiler protects you against your own stupidity by detecting a lot of common errors such as those which arise from typing mistakes, and these must be corrected before you can go any further. Once a procedure has been compiled successfully it is added to your program library. Whenever you want to perform that sequence of statements you can just refer to the procedure by the name youve given it. For example, you might write another procedure which needs to clear the screen before displaying something on it. All it would have to do would be to call on the services of the existing Clear_Screen procedure. This means that you dont have to rewrite things youve already written, which reduces the amount of work you have to do both in writing the programs and in testing them to make sure they work properly. You can also make use of procedures written by other people without having to know all the details of how they work.
The next step for turning your procedure from a library unit into a working program is to link it (also referred to as building or binding it). This combines it with any other library units it refers to. In addition to any library units you may have written, the Ada language specification defines a number of standard library units that all Ada systems must provide (e.g. operations like input and output) and it is quite likely that your procedure will have used one or more of these, either directly or indirectly. The linker takes your procedure, any library units it refers to, any others that they refer to and so on, and binds them all together into a single executable program which you can then run.
Of course it is quite possible (almost inevitable, as you will discover!) that the program wont work the way you expected; the compiler isnt omniscient, so the fact that your program compiled successfully just means that its a valid Ada program. It doesnt guarantee that its the particular Ada program you expected it to be, and its up to you to test it thoroughly to make sure it behaves the way you intended it to. You might hope for a program which displays a five times table but end up with a program that displays the number 5 over and over again, in which case its back to the drawing board: youll need to track down the errors (known as bugs in the trade), correct them, recompile, relink, and try again.
Writing a program which produces the right answers from sensible input is only part of the story. You also need to make sure that it still behaves sensibly with nonsensical input. For example, the program might expect you to type in a number; what happens if you type in your name instead? If the program responds with an error message, ignores the erroneous input and carries on working, fine. If the program crashes (i.e. halts unexpectedly), this is not so good. You may never get the result that the program is supposed to produce. Even worse, the program might get stuck in an infinite loop where it just ends up doing the same thing over and over again until it is forcibly halted.
Writing a program which does what its supposed to do is only part of the story. Once youve got the program working someone will usually think of some extra feature that would be incredibly useful or some improvement to what it already does that will make it easier to use. These sorts of changes come under the heading of program maintenance. Most real-world programs are hundreds of thousands of lines long and will be in use for about five years before being replaced. Over a five year period, maintenance will typically cost about four times as much as developing the original program and will involve writing as many lines of code as there were in the original, either as additions to or replacements for lines in the original. More programmers are employed maintaining existing code than writing new code. How easy is it going to be to make maintenance changes to your program? What if its someone else who has to make the changes rather than you, the original author?
Obviously readability is a major factor in determining how easy it is to maintain a program. You need to be able to read and understand what the program does in order to change it. As I said earlier, Ada programs are written using a somewhat stilted formal English. Writing a program is in many ways just like writing an essay. It can be well- presented and well-structured or it can be a tangled rambling mess. If you want other people to be able to understand what its all about (or even yourself in six months time!) you need to make an effort to present the program so that its structure and meaning is easy to understand. If you dont, youll end up thinking what on earth does this bit do? and wasting a lot of time trying to understand whats going on.
Maintainability is a measure of how easy it is to change a program. Ideally a single change should involve changing just one part of the program. If you have to alter several parts of the program to effect the change theres a risk that youll forget to change some of them or that youll make a mistake in some places but not in others. For example, consider a payroll program that can handle up to 100 employees. If the number of employees expands, the program will need changing to handle (say) 200 employees. If there is a single line in the program that says that the number of employees is 100 and the rest of the program refers to the number of employees rather than using the number 100 then there will be no problem. If, however, the value 100 appears as a magic number throughout the program, every single occurrence of 100 will need changing to 200. The chances of missing one are fairly high. Worse, some places where 100 is used might be involved in calculating percentages, or it might refer to the number of pennies in a pound, and we might accidentally end up with 200 pence to the pound or percentages calculated wrongly. And what about the places where the magic number 99 appears? Should 99 be changed to 199 throughout, or rather, to the number of employees - 1?
Another situation that arises quite often is the need to make the program work on several different systems. A program should ideally be portable from one system to another; all you do is recompile it and, hey presto, it works! Unfortunately life is rarely that simple; there are usually differences from one system to another such as the size of the largest possible number that can be handled or the capabilities of the display screen. Although you can avoid assuming that your program is running on a system which has particular characteristics it will sometimes be impossible to eliminate system-specific dependencies. About the only thing youll be able to to do in such situations is to gather together all the system-specific parts of the program so that its easy to locate them and change them.
After writing a few programs you normally discover that a lot of the time youre doing the same old thing that you did before, at least in places. Input and output; sorting collections of data into order; trying to find things in a collection; there are dozens of common features shared by different programs. After a while a sensation of d�j� vu comes upon you and you realise youve done it all before. The second time you do it better and/or faster than the first time. The third time you do it better and/or faster than the second. The fourth time you start yawning. How easy is it to reuse what youve already written and rewritten? Ada provides some mechanisms which allow you to write software which is flexible enough that you can reuse it fairly easily in a variety of different situations. Learning to make the most of these mechanisms is always useful but it becomes a necessity as soon as programs start to go above a few thousand lines of code in size.
Adas reuse mechanisms are based on separating specifications from implementations. All you need to use an existing procedure is a specification which gives its name and describes what it does; you dont need to know anything about the implementation, i.e. how it works. This is a bit like driving a car; you dont need to know how an engine or a gearbox works in order to drive, you just have to know what the various controls do. You can take the analogy further: the people who build the car dont need to know how to manufacture the individual components like pistons and fuel pumps that go into it. They just need to know how to assemble these components to produce the car as a finished product. One of the most important aspects of becoming a proficient Ada programmer is learning what components are already available and how to assemble them to provide larger components or finished products.
This separation also enhances maintainability and portability. As long as all you rely on when you use something is a specification of what it does, it is easy to change how it does it. This can be done behind the scenes with no visible effects other than the need to take any existing programs which rely on the specification and relink them so that they use the new implementation. Portability is also aided by the fact that you can say this procedure clears the screen as a specification but then provide different implementations for different systems with different types of screen.
It is quite common for collections of related procedures to be useful in a wide variety of situations. To avoid programmers having to reinvent the wheel every time they sit down to write a program, a collection of related procedures, data type declarations and the like can be put together into a package and added to the library as a single unit. This is useful for defining classes of objects as described earlier. For example, packs of playing cards are a class of objects which could be defined by a package. The package could contain some declarations for data types like Card and Pack together with a set of procedures defining the things you can reasonably expect to do with a pack of cards (shuffle the pack, deal a card, replace a card at the bottom of the pack, and so on). If you hide the implementation details such as the internal representation of a card or a pack of cards, users are only able to do things that are provided for in the package specification and things which you would not reasonably expect them to be able to do (such as manufacturing extra aces at will or dealing cards from the bottom of the pack) are prohibited.
What you end up with is an abstract data type. Abstract data types provide no information about their internal implementation; instead, all you know is the set of permissible values of the type and the operations that can be performed on them. This is just like the way that numbers are handled in a computer. You dont usually have access to the internal representation of numbers in the computers memory; all you know about is the visible representation of numbers like 3.1416 and the fact that you can perform operations like addition and subtraction on them. Ada packages provide the mechanism by which programmers can define their own abstract data types.
One of the things that hinders reuse in most programming languages is that algorithms (methods of solving a problem) are usually intertwined with the type of data that they deal with. For example, a procedure which sorts a list of numbers into ascending order will normally need changing if you want to sort a list of names instead. Even if the changes are straightforward, this means that the source code for the procedure must be available for it to be changed. Commercially available software is not generally supplied in source form so that trade secrets can be preserved and copyright enforced, so this can mean reinventing the wheel yet again.
Ada allows you to separate algorithms from the data they deal with by allowing you to write generic library units. For example, in order to sort a collection of data all you really need to know is how to compare data items with each other to discover if they need reordering and how to move them to the correct position in the collection if they are out of order. The same algorithm can be used regardless of whether youre sorting numbers or names as long as these conditions are met. Ada allows you to write a generic sorting procedure which, given a data type which satisfies the requirements of the algorithm, will sort a collection of items of that type. All you have to do to be able to use it to sort items of a particular type is to specify the item type to be used and the method for comparing two items. You can use the same algorithm over and over again for different types of data without the need to modify it in any way.
Another obstacle to reuse and maintenance is when you have some existing code that almost but not quite meets your requirements. The ideal solution is to use the existing code but extend it and modify its behaviour where necessary to fit your requirements. For example, you might want a program which can deal with different types of bank accounts such as current accounts and savings accounts. Using conventional programming techniques it will need major surgery whenever a new type of bank account is introduced that behaves slightly differently from other account types, such as an interest-bearing bank account. Object-oriented programming introduces the notion of inheritance to overcome this problem. Using inheritance all you have to do is to say that this new type of bank account is the same as that old type of account but with the following differences. The new bank account inherits all the characteristics of the existing account type, modifying or extending those characteristics where necessary. A minimum of new code needs to be written, which speeds up development and simplifies testing and debugging.
A related problem is dealing with those situations where the different types of account behave differently. Normally this involves checking the type of account at each point in the program where different behaviour is possible and then choosing the behaviour appropriate to that account type. A new account type will therefore involve a number of modifications at different places in the program with the associated risk of missing a change or changing something incorrectly. Inheritance guarantees that all bank accounts will share certain common characteristics such as the ability to deposit and withdraw money. New types of bank account will either inherit the existing behaviour or provide a replacement for it. In either case it will still be possible to perform those operations. Polymorphism reflects the ability to provide different implementations of the same operation for different types and to select the correct behaviour automatically for the actual type of object being dealt with. Rather than seeing a program as a set of procedures which manipulate data, you can look at it as a set of objects which you can ask to perform particular operations. Each object responds to a request to perform a particular operation by executing the version of the operation which is appropriate for it. You dont have to check what type of account youre dealing with when you say deposit some money; instead, you tell the account that you want to deposit some money and it does it in the way thats appropriate for the type of account that it is. As a result, you wont need to change any existing code when you introduce a new type of account. | 2019-04-18T19:08:04 | https://www.adaic.org/resources/add_content/docs/craft/html/ch01.htm |
0.987974 | The spot price for a barrel of West Texas Intermediate (WTI) crude oil rose from $11 at the end of 1998 to $140 in June 2008. It then fell to $42 in January 2009 as the Global Financial Crisis intensified. It recovered to $113 by April 2011, fell again to $33 in February 2016, rose to over $80 in May 2018, and fell below $50 by the end of 2018. How do oil prices affect the U.S. economy? Have these effects changed since U.S. oil production has soared after the Global Financial Crisis (GFC) (see Figure).
Many argue that negative oil shocks should reduce output in oil-importing countries such as the U.S. or Japan. On the supply side, oil is a factor of production, and an exogenous decrease in oil supply will decrease productivity. Higher energy costs may also decrease capital formation and long run supply. On the demand side, the price elasticity of demand for oil is low and price increases will not cause spending on oil to fall much. Higher oil prices act as a tax on consumers and firms. As oil prices increase, they will reduce spending on other goods and services. In the energy sector, firms producing oil should benefit from higher prices.
The IMF (2014), using its G20 economic model, reported that oil price increases after the GFC would disrupt the macroeconomies of oil-importing countries. It predicted that a 20 percent increase in oil prices would raise inflation in advanced economies by between 0.5 and 0.8 percentage points, lower GDP by between 0.4 and 1.9 percent, and decrease aggregate equity prices by between 3 and 8 percent.
This paper examines how oil prices affect equity prices. One difficulty when investigating this question is that not only can oil prices affect the economy but weakness in the global economy can depress oil prices. In economic jargon, oil prices are endogenous. This paper uses three different strategies to decompose oil price changes into those driven by global demand factors and those driven by oil supply factors.
Using all three approaches, the results indicate that oil price increases driven by demand and supply factors raised returns on energy sector stocks such as oil and gas production and distribution both before and after the GFC and lowered returns on consumer stocks such as hotels, airlines, restaurants, bars, and retail stores; however, consumer stocks appeared to be harmed less by higher oil prices after the GFC.
Before the GFC many other stocks and the overall stock market were harmed by higher oil prices. After the crisis, however, very few stocks were harmed and aggregate stocks even benefited from higher oil prices. Supply-driven oil price increases in particular lowered U.S. stock returns before the crisis in sectors including industrial machinery, industrial engineering, chemicals, and marine transport but raised them in these sectors after the crisis. Overall, these findings contradict the predictions of the IMF (2014) that higher oil prices will harm the U.S. macroeconomy and lower U.S. stock prices after the GFC.
A finding by Melek (2018) could explain why higher oil prices are good for the industrial machinery sector after the crisis but not before. She reported that increased investment by oil producing firms triggered more investment by non-oil producing firms after the Shale Revolution in America but not before.
Black (1987, pp. 113) observed that "The sector-by-sector behavior of stocks is useful in predicting sector-by-sector changes in output, profits, or investment. When stocks in a given sector go up, more often than not that sector will show a rise in sales, earnings, and outlays for plant and equipment." Future research should investigate how oil price changes affected sectoral output, profits, and investment before and after the Global Financial Crisis. It should also investigate whether consumers' marginal propensity to spend windfall gains from lower oil prices has decreased after the crisis. Finally, it should investigate the mechanisms causing increased investment by oil producing companies to trigger investment by non-oil producing companies after the shale boom (see Melek, 2018).
Black, F. 1987. Business Cycles and Equilibrium. Basil Blackwell, New York.
IMF. 2014. World Economic Outlook. Legacies, Clouds, Uncertainties. International Monetary Fund, Washington.
Melek, N.C., 2018. The response of U.S. investment to oil price shocks: Does the shale boom matter? Economic Review, Federal Reserve Bank of Kansas City forthcoming. | 2019-04-20T13:13:43 | https://www.rieti.go.jp/en/publications/nts/19e003.html |
0.99996 | For the sake of a better review, I have written two different reviews of Megatokyo. This one reviews the span of early comics in which Rodney Caston was the co-writer of Megatokyo. The other follows the time period after Piro and Largo split up, leaving all art, plot, and humor to Fred.
Megatokyo begins as a typical webcomic. Here you have your lazy and drunk gamer who speaks in l33t, your wimpy otaku, and a bunch of insane Japanese cultural points and things like anime and games to be the blunt of the jokes. However, the series works well with what it is given, and creates a quite enjoyable webcomic from it.
While the plot may seem rather cliched for a webcomic, the writers pull off gaming jokes that you expect Tycho and Gabe would have done to death really well. You can practically see the clashing ideas of Fred and Rodney as their characters go through their crazy adventures. Largo does or says something stupid, while Piro acts as his foil and makes us laugh at it. Occasionally, the roles are switched, but the jokes generally stay in predictable territory. Even though the jokes never go beyond any realms we haven't seen before, their delivery and inside perspective make this a joy for otaku and gamers. Of course, as the comic progresses, we begin to find mor original comics. Instead of following the story all of the time, we are treated to random (and often comical) looks into the lives of the writers. In addition, things like a rather amusing Penny Arcade parody sneak in there as well. Then, of course, there is "Shirt Guy Dom." Dom Nguyen is a friend of Piro and Largo who helps out with Megatokyo and occasionally...draws stick comics with a trackball when Piro can't draw something that day. While Fred, Rodney, the general readership, and even Dom himself considers these to be the most powerful image of evil in the universe, these comics are undoubtedly some of the funniest in all of Megatokyo. Dom simply writes about events in his life, but his blatant self-parody makes the horrible artwork that much more amusing.
As for art, there is a single major difference in Megatokyo from most other webcomics. Fred draws his comics in pencil, traces them in pencil, and then scans them into the computer where he fixes them up. So, his final drawings end up as pencil drawings, a quite unusual approach for a comic. Nevertheless, his art has a very clear and expressive style. In addition, his experience as an architect allows for him to create very realistic-looking buildings and such. The panel layout begins with a simple yet effective 4-panel square layout, but moves to a harder-to-read, but more expressive manga one later on. Fred creates a pseudo-manga that does not look like an imitation. The influence is there, but almost never overwhelms the reader. There are some problems with his art, though. As good as he is with architecture, Gallagher still has trouble with human anatomy and facial structure. Luckily, his skills progress quickly throughout the comic.
Megatokyo is a very simple webcomic at the "Largo Era" stage. Piro's art is gaining skill, while the two work together well to make jokes that are both absurd and clever. This can make mainstream viewers laugh, while true nerds will find the workings of Piro and Largo's world to be even funnier. Megatokyo volumes 1 and 2 are a great buy for fans of webcomics, and extras like commentary on the bottoms of all of the 4-panel strips make it even more enjoyable. | 2019-04-19T10:19:23 | https://anigamers.com/2007/05/review-megatokyo-largo-era.html |
0.999956 | Has Intel changed the face of security?
How much security can you fit on a chip?
Intel surprised everyone last week, with the announcement that it is to buy security company McAfee.
The deal might look like a mis-match - why would a microprocessor company want a security software company? - but Intel's explanation of making security a ‘third pillar' of computing, alongside internet connectivity and energy efficiency, is at least a step in the right direction.
The current model of computer security, of, mainly, only trying to secure a perimeter and block already identified threats, is generally agreed to be inadequate to keep up with the emerging threat landscape, especially as the first two pillars of connectivity and low power consumption increase the ubiquity of processing power and diversify the IT infrastructure. Intel's move to inject security expertise into the heart of computing, assuming that is the plan, seems like a move that in principal could have wide-ranging impact across the whole security spectrum.
Non-security companies buying security companies is nothing new, of course. EMC bought RSA in 2006, and on the same day as the Intel announcement, HP bought application security specialist Fortify Software. The difference, for the most part though, is that previous acquisitions in the field have tended toward a more obvious fit - EMC uses RSA's encryption to secure data stored on its systems; Fortify Software sits in a very specific niche, which will add another arm to HP's services offerings.
With Intel and McAfee, its hard to see how there will be any initial gains from the deal, and how exactly Intel plans to use McAfee's expertise in the long run. McAfee will continue to operate as a wholly-owned subsidiary, which will provide continuity to its customers, but in the long run, Intel and McAfee presumably will need to create some fundamental changes in the way security is brought to the table. Intel has a huge R&D spend, and a depth of expertise that not many companies can match, but it is still likely to be a very big task to bring software execution to processor hardware, particularly around areas like frequency of updates. How much security can be done ‘on the chip' and whether that aim is technically achievable, remains to be seen. | 2019-04-18T13:29:57 | http://www.itp.net/581517-has-intel-changed-the-face-of-security |
0.999697 | What criteria should I consider when determining the hardware specs for a disk imaging station?
Reader B - old SATA (internal) device, refurbished to USB.
Again this resulted in a 601.7 MB ISO image, again with no indication of read errors in the ddrescue log. MD5 checksum was (again) 82603be06a8142aad1dfaa9e1279371f.
Then by chance I discovered some text files in the image file weren’t readable, so I did a third try, now again with reader A.
This resulted in a 660.9 MB ISO file. Again no errors in the ddrescue log; MD5 checksum is 24f0f746d0817121253c6b1242d4246e. After mounting the image, the text files that were problematic in the earlier images were normally readable.
Result was identical to result of attempt 3!
So summarising, 2 runs of ddrescue (using 2 different USB readers) resulted in exactly the same error, whereas the remaining 2 runs (again using 2 different readers) completed fine. So what’s going on here!?
I repeated this 4 times, using both readers A and B, plugging them into different USB slots. In each case the result was 24f0f746d0817121253c6b1242d4246e, which is identical to the hash I got for the ISO in attempts 3 and 4 (confirming these images are correct).
Which corresponds to the value of the intact image.
But why is this happening in the first place?!
Ddrescue can’t know if the data are really good or if the hardware is lying about it.
(Third column is size of CD in bytes).
This does not guarantee the image is correct, but it will detect missing blocks of data.
I also ran some cursory checks with isovfy and isoinfo, but the output of those tools turned out to be identical for both faulty and intact images, so they’re probably not very helpful for this sort of error.
I’m curious how other people/memory institutions are dealing with this. Any thoughts / suggestions are welcome!
Final update to the above: by now I'm fairly sure the issue was simply caused by hardware failure of my machine, which went in full meltdown mode earlier this week (harddisk buggered up, BIOS inaccessible).
First of all, over the weekend I ran ddrescue 100 times on the same CD, and then calculated md5 checksums for each created image. I repeated this for the readom tool (which uses a library that is specifically made for extracting data from optical media).
This resulted in 200 images that were all completely identical, so it doesn’t really help in solving this mystery!
Every so often this results in different values, but in every single case I've seen so far the culprit was lsblk reporting a wrong (too small) value. The actual images (produced using readom) turned out to be OK in every case. Stranger still, repeating the lsblk call manually after the imaging script had finished usually resulted in the correct size. So it looks like the source of the error is somehow hardware-related (e.g. a faulty USB host controller interface on my test machine).
Actually this only makes things more scary, because it means that the information that the OS is getting from the attached hardware is inherently unreliable. I suppose this means that even checksums may be unreliable here. E.g. imagine that due to hardware failure the OS cannot "see" the last 50 MB of a CD, and that this happens both during the creation of a disk image and then again during the calculation of the checksum on the physical disk. In that case the checksum will be identical to the one of the ISO image, but the image would still be incomplete. | 2019-04-20T10:16:46 | http://qanda.digipres.org/1076/incomplete-image-after-imaging-rom-prevent-and-detect-this |
0.999134 | Agile Central: WSAPI - Why should we generate a Read Only API Key?
When creating or modifying an API Key, you have two options: Read-Only vs. Full-Access key.
What is the difference and what is the purpose of these two types of keys?
In order to appreciate the two types of keys, you need to consider their purpose. The purpose of an API Key is to serve as alternative to the credentials of a certain username. In addition the key will not expire.
- Your key is hijacked or stolen.
- The client software has code problems resulting in wrong updates within Agile Central.
If your key has Full-Access then such situations may result in harmful updates to Agile Central on behalf of your username.
Therefore, a more secure practice is for you to generate a Read-Only key and share that key with the client software. A Read-Only key is only able to extract information from Agile Central, but not make any updates. In terms of WSAPI: It can only use the Read endpoints (via the http/s GET method) , but has no access to the Create/Copy/Delete/Update endpoints.
A natural question will be: So, what should we do if the client software also needs to update Agile Central with some information?
The best and most secure practice in this situation will not be for you to generate and share a Full-Access Key. It will be best to share two keys with the app, one for Read-Only, the other for Full-Access. The client app may want to use the Read-Only key for its reads and the Full-Access key for its updates. If possible, an even better approach for the client app is to make a Read phase and perform all the readings using the Read-Only key, then make an Update phase where making all the updates using the Full-Access key. This may not always be possible, but a good design will take all that into account. If the client app is developed with such two phases then it can take even more secure measures when performing the second Update phase.
The two (Read-Only and Full-Access) keys may be of the same username or not. In essence you may want to allow the app the minimal access required to perform what it needs. When giving away the key/keys to your app/s you may want to consider tracking its updates within Agile Central. The Revision History is normally a place where you can find what updates took place to the artifacts and on who's behalf. You may want to provide a key to a username that you will then more easily track.
API Keys are essentially usernames who are used by client programs. You need to be preemptive about securing their access and minimizing potential harm they may cause. A Read-Only key is allowing you an extra security measure to prevent harmful updates within Agile Central. Some apps will only read information - provide them only with a Read-Only key. For those apps who need to make updates into Agile Central: consider splitting them to two apps or two phases for Read , then Write. The Write phase/app will require a Full-Access key, but it can be of a different (possibly designated) username. | 2019-04-19T18:40:06 | https://comm.support.ca.com/kb/agile-central-wsapi-why-should-we-generate-a-read-only-api-key/kb000098242 |
0.999674 | A fundamental task for a streaming application is to read data from an external source, and convert it to a structured format suitable for processing by the rest of the application. In Streams, this usually means using one of our adaptor operators (such as TCPSource or FileSource), which converts the data from an external format into tuples.
Reading from an external source—such as the network or filesystem—is often a performance bottleneck. When source operators are the performance bottleneck for a streaming application, we have a tendency to blame the reading from the external source. But, that is not always the case. Particularly for large tuples which have many attributes, the actual performance bottleneck can be parsing.
The type ManyAttributes contains 100 attributes in total, with 50 rstring and 50 float64 attributes. While this tuple type is contrived, it is similar to tuples from the telecomunnications domain (representing call detail records) and from customer analytics (representing a customer profile).
Our goal is to read tuples of this type from a CSV file, demonstrate that it is the tuple parsing and creation that is the bottleneck, and improve its performance through parallelism.
Reads a line of text from the file data.csv.
Tokenizes that line of text in CSV format.
Constructs a tuple out of each field extracted from the line of CSV.
It is points 2 and 3 that are the expensive parts, as we will see in the next section. The average time to process a 1.4 GB file (1 million discrete lines with 100 fields each) over 5 runs using this method is about 70 seconds. This invocation of the FileSource is our performance baseline; we want to beat 70 seconds.
Technically, this invocation of FileSource still does do some parsing, but it does significantly less: it converts a single line of CSV text into a single tuple which contains a single line of text. This process is significantly less work than parsing out the full tuple of ManyAttributes, but we still have to process the entire file.
The time it takes this invocation of FileSource to process the same 1.4 GB file, averaged over 5 runs, is about 1.5 seconds. This is only about 2% of the time it takes to process the file and create ManyAttribute tuples, which is about 70 seconds. Because the only difference between these two invocations is the parsing and tuple creation, we can conclude that when we invoke the FileSource operator with ManyAttributes, no more than 2% of its total processing time is taken up by the actual file reading. Most of it, about 98%, is consumed by parsing and tuple creation.
What this also tells us is that if we can separate the file reading from the parsing and tuple creation, we have a great opportunity for improving performance.
The Parse operator from the Standard SPL Toolkit allows us to parse and create tuples in a separate operator. The Parse operator converts a stream of binary data into tuples. But, a problem we have is that the Parse operator is stateful. The Parse operator expects a stream of tuples which just contain blobs of data. The actual tuples it parses can go across the boundaries of an arbitrary number of tuples with blobs of data.
Reads the file, line-by-line, producing one tuple for each line.
Adds the end-line character, "\n", back onto the line, so that it can be correctly re-parsed.
Converts the rstring that represents the line of the CSV file into a blob.
Parses each blob, which represents exactly one line from the CSV file, into exactly one tuple.
Performs the previous point in parallel, with the amount of parallelism controlled by the submission-time value "parallelism".
This performance graph also contains the prior two sequential results for comparison. (FileSourceOnly is our performance baseline; it’s the time we want to beat. FileSourceString is the cost of just reading the file; it’s the time we can’t beat.) Before we discuss these results, we should make a few notes about the experimental setup. The machine these experiments were executed on is a system that has 2 processors, each with 4 cores. Each core can support 2 threads each, which means that the operating systems sees 16 logical processors. However, as the system only has 8 physical cores, compute-intensive tasks will tend to not scale all the way to using all 16 logical processors. All SPL programs were run in standalone mode, which means that all parallelism was achieved using threads.
The first thing we can see looking at the data is that using 1 and 2 threads for ParallelParse is actually slower than FileSourceOnly. This result is due to the fact that we must copy the rstring into a blob. However, this conversion cost is fixed (that is, it does not scale with the number of parallel copies of Parse), which means that as we increase the parallelism, ParallelParse is eventually faster than FileSourceOnly. Once ParallelParse uses 8 threads, it takes about 26 seconds to complete, which is about 2.7 times faster than FileSourceOnly. Past 8 threads, scalability levels off, but this is likely due the limitations of our hardware, as explained above. With access to more parallel hardware, we could probably scale more.
First, we define a new composite operator, ParallelMerge. This operator puts tuples back into order, based on the key attribute provided to it when it is invoked.
In the same operator we use to perform the rstring to blob conversion, we also maintain a sequence number. We will use this sequence number to remember what the order the lines of text were in the file. Every line gets a sequence number that is 1 more than the one before it.
Parse our blobs in parallel as before, but now the tuple we produce is not just ManyAttributes, but ManyAttributes and a uint64 attribute named seqno.
Pass our out-of-order tuples to ParallelMerge, telling it to use the seqno attribute to put our tuples back in order.
At 8 threads, ParallelParseOrdered takes about 31.5 seconds to process the entire 1.4 GB file, compared to ParallelParse’s 26 seconds, which is about 17% slower. However, it is still about 2.2 times faster than FileSourceOnly.
By separating the reading of data from an external source from its parsing, we open the possibility to speedup the process through parallelism. In Streams, we can achieve this speedup through the Parse operator and parallelism. The stream programming model itself also aids us, because it makes it easy to decompose our problem into independent parts that we can parallelize easily.
The SPL source code and scripts used to run the experiments are publicly available at https://github.com/IBMStreams/samples/tree/master/Performance/ParallelParse.
1 comment on"Parallelized File Processing with the Parse Operator"
Another option is to use AdaptiveParser – fast, stateless open source toolkit from IBMStreams github repository. | 2019-04-23T00:25:23 | https://developer.ibm.com/streamsdev/docs/parallelized-file-processing-parse-operator/ |
0.999995 | This article outlines these potential complications and their main treatments.
Heart disease is a term used to describe a number of diseases that affect the heart. These diseases include arrhythmias (heart rhythm problems), heart infections, congenital heart defects (heart problems from birth), and blood vessel problems like coronary artery disease.
Heart disease - particularly heart disease that narrows or blocks blood vessels - can lead to heart attack, angina (chest pain), and stroke.
What's the link between heart disease and rheumatoid arthritis?
Research has shown that people with rheumatoid arthritis are not likely to live as long as others. Rheumatoid arthritis patients also have a higher risk of death. Heart disease is largely to blame for the high death rates among rheumatoid arthritis patients.
Doctors are unclear about how rheumatoid arthritis increases the risk of heart disease. Many researchers believe that inflammation - which causes rheumatoid arthritis - is also responsible for heart disease.
Chest pain or discomfort, also called angina, is the most common symptom of heart disease. This pain happens when your heart does not get enough blood or oxygen.
Making healthy lifestyle choices is the best way to prevent and treat heart disease. If you have rheumatoid arthritis, stay active and eat heart-healthy foods to protect yourself from heart disease. A healthy diet and regular exercise can treat heart disease just as it treats rheumatoid arthritis.
If you develop heart disease and lifestyle changes are not enough, your doctor may prescribe medications to lower blood pressure or reduce cholesterol levels.
If you spot any signs of heart disease, see your doctor immediately. Let your doctor know which medications you are taking for rheumatoid arthritis, as some heart disease drugs can interfere with these medications.
Lung disease is a term used to describe any disease or condition that happens in the lungs or affects proper lung function.
The three main types of lung disease include airway diseases, lung tissue diseases and lung circulation diseases.
Airway diseases are diseases that block the tubes, or airways, that carry gases to the lungs. In most cases, airway diseases lead to narrowed or blocked airways. Examples of airway diseases include asthma, emphysema and chronic bronchitis.
Lung tissue diseases can change the structure of lung tissue, making it harder for the lungs to take in oxygen and release carbon dioxide. Examples of lung tissue diseases include pulmonary fibrosis and sarcoidosis.
Lung circulation diseases cause problems - such as clotting, scarring and inflammation - in the blood vessels, making it harder for the lungs to absorb oxygen and release carbon dioxide.
What's the link between lung disease and rheumatoid arthritis?
The inflammation caused by rheumatoid arthritis can lead to all types of lung disease.
Inflammation can affect the lining of the lungs (pleurisy), which causes a sharp pain while breathing. When the lining of the lungs becomes inflamed, fluid also can build up around the lungs, causing shortness of breath.
Rheumatoid arthritis is known to cause scarring inside the lungs. Lung scarring may cause shortness of breath, chronic dry cough, fatigue, weakness and a loss of appetite.
Rheumatoid arthritis medications have been known also to cause lung problems. Methotrexate (sold as Rheumatrex and Trexall) is the most commonly used disease-modifying antirheumatic drug (DMARD) for rheumatoid arthritis. In some patients, methotrexate has been linked to lung damage.
What are the signs and symptoms of lung disease?
How is lung disease treated?
Your treatment will depend on the type of lung disease you have. But because you have rheumatoid arthritis, the first goal may be to control inflammation, especially because inflammation is likely to blame for your lung condition.
You may be prescribed inhaled medication that opens your airways. You may need to drain fluid around the lungs. Your doctor may prescribe other medications to reduce scarring. However, scarring cannot be reversed. So take action early by seeing your doctor as soon as you experience symptoms of lung disease. Early treatment can prevent and slow down damage.
Although it is not common, vasculitis is a serious complication of rheumatoid arthritis. Vasculitis happens when the blood vessels become inflamed. The blood vessels may weaken, become larger, or narrow. These problems make it harder for blood to flow properly through the blood vessels. In some cases, blood flow may stop completely.
What's the link between vasculitis and rheumatoid arthritis?
Not all patients with rheumatoid arthritis are at risk of vasculitis. This blood flow problem most often happens to patients with severe long-term rheumatoid arthritis.
Smoking is also associated with vasculitis in people with rheumatoid arthritis.
What are the signs and symptoms of vasculitis?
Vasculitis can affect the vessels that carry blood to and from the skin on the fingertips and around the nails. When this happens, patients may develop small pits in the fingertips, or painful and red sores around the nails.
When larger blood vessels are involved, a larger painful rash can form on the legs. If the skin becomes very inflamed, ulcers can form, increasing the risk of infection.
Vasculitis also can affect the nerves. Nerve damage can lead to loss of sensation, numbness, tingling and weakness or function loss of the hands or feet.
Since vasculitis may be a sign of increased inflammation caused by rheumatoid arthritis, treating vasculitis often involves controlling rheumatoid arthritis. Drugs that reduce the joint pain and swelling of rheumatoid arthritis can also control symptoms of vasculitis.
Sjögren's syndrome is an inflammatory condition that generally affects the tear and saliva glands.
Although doctors and scientists do not know what causes Sjögren's syndrome, it is thought to be an autoimmune disorder, meaning the body's immune system mistakenly attacks its own healthy tissues.
In patients with Sjögren's syndrome, the tear and saliva glands become inflamed. This inflammation causes decreased levels of tears and saliva, causing dry eyes and dry mouth.
Research has suggested that some genetic factors and perhaps some viral infections put people at risk for Sjögren's syndrome.
What's the link between Sjögren's syndrome and rheumatoid arthritis?
Like most complications of rheumatoid arthritis, Sjögren's syndrome is the result of inflammation. In the case of Sjögren's syndrome, the inflammation spreads to the tear and saliva glands.
About half of people with Sjögren's syndrome also have rheumatoid arthritis or a similar disease, such as lupus.
What are the signs and symptoms of Sjögren's syndrome?
Drugs used in the treatment of rheumatoid arthritis and lupus may also be used in some patients with Sjögren's syndrome.
Plaquinel (hydroxychloroquine) may be used to relieve joint pain and reduce rash.
Corticosteroids like Deltasone (prednisone) and immunosuppressive drugs - such as Rheumatrex (methotrexate), Imuran (azathioprine), Cellcept (mycophenolate), and Cytoxan (cyclophosphamide) - may be used in severe cases when patients are experiencing fever, rashes, abdominal pain, lung problems or kidney problems.
As cavities and tooth loss can occur as the result of Sjögren's syndrome, patients should regularly see their dentist.
If dry eyes are your problem, see an ophthalmologist (eye doctor) on a regular basis. An eye doctor can check for signs of corneal damage.
People with anemia have low levels of hemoglobin - a protein in red blood cells that carries oxygen throughout the body. For some people, anemia is a short-term problem that can be fixed through a quick diet change. For others, anemia is a chronic condition and may be the result of another health problem, such as rheumatoid arthritis. In severe cases of anemia, patients may feel tired or have shortness of breath, making it hard to complete daily tasks.
What's the link between anemia and rheumatoid arthritis?
The most common problem for rheumatoid arthritis patients is joint pain and swelling. The second most common problem is anemia. In fact, research shows that as many as 60 percent of rheumatoid arthritis patients have anemia.
The inflammation of rheumatoid arthritis is one cause of anemia. When tissue becomes inflamed, it can affect a variety of processes involved in carrying oxygen to organs and other tissues.
Many rheumatoid arthritis patients develop anemia because they have iron deficiency (low levels of iron in the body). If you do not have enough iron, your body cannot make the hemoglobin that allows red blood cells to carry oxygen. As a result, you may develop anemia, leaving you tired and short of breath.
Iron deficiency is often caused by menstrual bleeding, digestive tract bleeding or problems getting iron from inside the bone marrow into the red blood cells.
Some rheumatoid arthritis drugs - specifically non-steroidal anti-inflammatory drugs (NSAIDs) and prednisone - have been shown to cause digestive tract bleeding. As such, they can play a role in anemia among rheumatoid arthritis patients.
At first, anemia does not have obvious symptoms. If you have rheumatoid arthritis, the best way to find out if you are anemic is to talk with your doctor about your blood count and changes in hemoglobin.
In many cases, patients may need only change their diet or take iron supplements to treat their anemia.
Research has shown that certain medications are effective for reducing anemia in rheumatoid arthritis patients. Some of these drugs are used to treat rheumatoid arthritis, while others trigger the production of red blood cells.
Osteoporosis is a condition that causes the bones to become thin and weak. That is, the bones become less dense, increasing the risk of fracture.
Osteoporosis is the most common type of bone disease. It affects both men and women. However, in the United States, approximately one out of five women over the age of 50 suffer from osteoporosis.
What's the link between osteoporosis and rheumatoid arthritis?
According to research, people with rheumatoid arthritis have an increased risk of bone loss and fracture.
The increased risk of osteoporosis among rheumatoid arthritis patients is due to many factors. First, glucocorticoid drugs used in the treatment of rheumatoid arthritis can cause bone loss.
Inactivity is another cause of osteoporosis among arthritis patients. The pain and loss of function in rheumatoid arthritis can make it difficult for patients to stay active. Over time, inactivity can lead to bone loss.
As bone loss is often strongest around joints most affected by rheumatoid arthritis, some researchers believe that osteoporosis may be directly caused by rheumatoid arthritis itself.
What are the signs and symptoms of osteoporosis?
hunched posture or kyphosis, which is also known as "dowager's hump"
Treating osteoporosis in people with rheumatoid arthritis is more or less the same as treating the condition in people without rheumatoid arthritis.
Nutrition plays a key role in osteoporosis treatment. People with the condition, or those who are at risk, should eat foods with high amounts of calcium and vitamin D, such as low-fat dairy products; dark green, leafy vegetables; and calcium-fortified products.
Physical activity is also an important part of fighting osteoporosis. Activities that make you work against gravity - such as walking, climbing stairs, weight training, and dancing - can help your bones become stronger.
Infections occur when tiny microorganisms get into a body part or tissues. These microorganisms invade and multiply, causing damage to various tissues. Eventually, infection gives rise to disease symptoms.
Infections are caused by a variety of microorganisms, including viruses, bacteria, prions and viroids. Larger parasites and fungi can also cause infections.
The human body fights infections with the immune system, which usually triggers inflammation - a key characteristic of rheumatoid arthritis.
What's the link between infection and rheumatoid arthritis?
Infections are associated with rheumatoid arthritis in a couple ways.
First, some studies have shown that certain drugs used to treat rheumatoid arthritis may increase the risk of infection. Specifically, biological agents - such as TNF inhibitors and IL-6 inhibitors - are associated with a serious risk of infections from bacteria, viruses and fungi.
Second, rheumatoid arthritis patients have a higher risk of infections, regardless of the medication they are taking. Studies have shown high rates of infections complicating rheumatoid arthritis.
Research has suggested that the increased risk of infection among arthritis patients may be due to the disease process itself. That is, the inflammation of rheumatoid arthritis may play a role in infection, or vice versa.
The type of treatment you receive will depend on the type of microorganism that has caused your illness.
Antibiotics are drugs used to treat bacterial infections. There are many specific kinds of antibiotics designed to fight specific classes of bacteria.
Viral infections cannot be treated by antibiotics. Instead, antivirals are used. Some antiviral drugs have been developed, but many viruses are very difficult to treat. Such viruses include AIDS, herpes, hepatitis B, hepatitis C and the flu.
What do I do if I'm experiencing complications of rheumatoid arthritis?
If you start to experience symptoms associated with these complications of arthritis, talk to your doctor immediately. The sooner your doctor knows about a health problem, the sooner she can take action to control symptoms and prevent potentially life-threatening health problems.
Mayo Clinic, "Rheumatoid Arthritis: Complications" U.S. National Library of Medicine, "Rheumatoid Arthritis" University of Maryland Medical Center, "Rheumatoid arthritis - Complications" Arthritis Foundation, "Rheumatoid Arthritis and Heart Disease" U.S. National Library of Medicine, "Coronary heart disease" MedlinePlus, "Lung disease" Mayo Clinic, "Can rheumatoid arthritis affect your lungs?" Cleveland Clinic, "Rheumatoid Vasculitis" American College of Rheumatology, "Sjögren's Syndrome" Anemia.org, "Handout: Anemia & Rheumatoid Arthritis" Mayo Clinic, "Iron deficiency anemia" U.S. National Library of Medicine, "Osteoporosis" NIH Osteoporosis and Related Bone Diseases National Resource Center, "What People with Rheumatoid Arthritis Need to Know about Osteoporosis" | 2019-04-22T19:58:42 | https://feeds.rxwiki.com/feature-article/rheumatoid-arthritis-complications-explained |
0.997878 | What Is Mortgage in Huntsville, Alabama?
A mortgage in Huntsville, Alabama is a real estate lien placed on somebody's property in exchange for a loan, normally taken out for the purpose of purchasing the property in the first place. The majority of American home-buyers use a mortgage to finance their purchase, since few individuals have the cash on hand to pay for a house in one lump sum. The mortgage will call for several payments over time.
Purchasing anything on credit in Huntsville, Alabama will end up costing more than the purchase price, because lenders charge interest on their loans - this is what makes the business profitable. For many homebuyers, however, this is a fair tradeoff.
How Can I Get A Mortgage in Huntsville, Alabama?
Many Huntsville mortgages are obtained from banks, and before providing such a large amount of credit, the bank will require you to present a credit report, an accounting of your debts and assets, your employment history, and proof of your current income, among other things. In Huntsville, Alabama you will probably also be required to make a down payment, which is normally a relatively small percentage of the home's purchase price. Before you consider buying a home you should estimate the possible down payment you will have to pay, and have significantly more money than that amount saved up, to prevent the down payment from putting a major strain on you finances.
It may take anywhere from days to months for your mortgage to be approved, so you should plan ahead. There are a few various interest schemes that a Huntsville, Alabama lender may use on its mortgage. First, there are fixed-rade mortgages, that have the same interest rate throughout the entire life of the loan (though this might change if you refinance).
Some mortgages have adjustable rates, which, by their terms, allow the bank to increase or decrease the interest rate later on. These often start with an attractively low interest rate, which slowly increases over the life of the loan, and you may end up paying more in the long run. There are distinct advantages and disadvantages to these systems, and you should speak with a financial adviser to learn more.
How Can A Huntsville, Alabama Mortgage Lawyer Help?
For most people, purchasing a home is the most important financial decision, and one of the most important life decisions that they will make. It should not be made lightly. It may be a good idea to speak with a Huntsville, Alabama real estate lawyer if any term contained in the mortgage (after you have thoroughly read it, of course) is not clear to you. | 2019-04-24T16:49:29 | https://bankruptcyattorneys.legalmatch.com/AL/Huntsville/mortgage-lawyers.html |
0.999867 | Here I present you with a sample menu for 1800 calorie for weight loss with varied options in lunch and dinner so that you may not be fed up with your 1800 calorie diet menu. You should drink water before and between meals when you follow 1800 calorie diet.
Breakfast: a cup of skim milk (200 ml), wholegrain breakfast cereal (40 grams) and 2 kiwis.
Lunch (Option 1): tea and toast bread (50 grams) with a little olive oil (5 grams) and a few thin slices of low-fat cottage cheese and fresh tomato.
Lunch (Option 2): Spinach salad – (90 gram spinach, 100 gram of natural tomato, 20 gram of Parmesan cheese, 60 grams of mushrooms and a tablespoon of olive oil for dressing and a glass of fresh juice.
Snack: A tea or infusion, 15 grams of walnuts and a pear.
Dinner (Option 1): Sautéed vegetables in wok – half tomato, zucchini (60 grams), green beans (20 grams), olive oil for cooking (5 grams) and a tablespoon of soy sauce.
Dinner (Option 1): Omelet with herbs cooked in olive oil, a slice of bread and a low-fat fruit yogurt.
Breakfast: A cup of skim milk (200 ml), whole wheat toast (50 grams) with a tablespoon of olive oil and a banana.
Lunch (Option 1): A fat plain yogurt with three tablespoons of oatmeal and some raspberries.
apple, pepper, a tablespoon of olive oil and a little soy sauce.
Lunch (Option 3): Salmon Papillote – Fresh salmon (150 grams), seasoned with pepper and lemon and cooked in papillote without oil. You can also add two slices of steamed potato or a vegetables of liking.
Dinner (Option 2): Skewer chicken curry – Chicken (100 grams) and vegetables to taste to fill skewers.
Breakfast: Yogurt with oatmeal and fruit pieces.
Lunch (Option 1): An infusion, some whole wheat toast (50 grams) with a tablespoon of olive oil and tomato and a tangerine.
Lunch (Option 3): Chickpea salad and couscous – Chickpeas (50 grams), couscous (20 grams), mixed lettuce (80 grams), tomatoes (80 grams), cucumber (60 grams), onion (30 grams) and a tablespoon of olive oil.
Snack: Orange juice and whole wheat toast (50 grams) with half tablespoon of oil and oregano.
Dinner: Boiled potatoes – potato (150 grams), carrots (80 grams), green beans (50 grams), an egg and a tablespoon of olive oil and a yogurt.
Breakfast: A glass of skim milk (200 ml), wholegrain breakfast cereal (50 grams) and a few pieces of pineapple.
Lunch: Whole wheat bread Toast (60 grams) with a little olive oil (5 grams) and a few thin slices of low- fat cottage cheese and fresh tomato and an orange.
Snack: A yogurt with two tablespoons of oatmeal.
Please, visit http://janusfitness.com/1800-calorie-diet-for-women/ in order to find more plan for rest of the days. | 2019-04-20T10:17:19 | http://freespaceway.com/womendiet/?clickref=1011luf2BeW |
0.999998 | How do I add more conference chair managers in easychair?
I am the "first president" of a conference, and I would like to add another president to handle other areas of administration, such as updating our license. How do I add another chair? It does not seem as easy as adding another CFP administrator.
I am recreating an internal ERP tool to manage the user license, sales and customer information for a 3D CAD desktop software. Therefore, something similar to a management portal for Autodesk employees to manage user licenses for the different products they have (Maya, 3dsmax, AutoCAD, etc.). We have a legacy dongle security hardware that must be maintained for older users, but we will also implement the cloud so that we can transition from an old business model to a new one.
A simple case is that the user has problems assigning a license to someone on their computer.
Note 1: 90% of the user base has 3 licenses in a team of 4 people. While we have a few companies with 100 or more licenses.
Note 2: The dongle assignment does not give permission for the user to use software, it is used for technical support and it decides if that license is entitled to support or if the dongle was stolen.
Note 3: The license will be implemented in the cloud, but I still do not have information about it. What will be displayed will also be included in that screen.
Note4: There is a multitude of products under a dongle hardware and also my company will have a cloud license (in development). The hard part is that, since we have users and inherited data, I can not simplify the data structure and these fields because we can not change the current hardware of the dongle in the market, since they do not have bidirectional communication with the database and the dongle I need to work with what I have so that the impact is minimal when implementing the new system.
I understand the purpose of password managers and the fact that there seems to be compensation to accept, but hey, I think that compensation is unacceptable and I wonder if there is a way to avoid it. A password manager introduces a single point of failure, and that single point of failure is also quite fragile: it is the user's machine. And we know that once the machine is compromised, you can no longer trust it, and the damage can potentially affect all the data on that machine, so why should we accept to store? everyone Of our credentials at such a fragile point of failure? I bet the NSA does not have password managers that allow access to thousands of passwords from a single computer, right? There must be some alternative methods to manage the passwords or at least mitigate in some way the only point of failure they introduce.
Many people not only need to store their own passwords, but also the passwords of other people, such as customer passwords (for work), or the passwords of some family members (to provide assistance, etc.). Some accounts are accessed daily, some must only be accessed from time to time and there may be accounts in your password manager that you do not even remember having had. So, why should we accept to put everyone is at risk? Only one infection is needed and hundreds of accounts can be compromised. All accounts: not only your accounts, but also those of others. It is a recipe for a great disaster.
You might think that once your machine is compromised, it will be damaged anyway, so avoiding the single point of failure is not as important as it may seem, but think about it: for the sake of discussion, consider the differences between storing all your passwords in a password manager on your computer and storing them on paper. Ignore the fact that the sheet of paper presents other threats and only concentrate on the consequences if your computer becomes infected. If your machine gets infected and uses a password manager that contains all your passwords, the attacker can get them all. But if your machine gets infected and you're just writing passwords on a piece of paper, what can the attacker steal? Only the passwords that you type between the time of infection and when you discover the infection. Therefore, only some of the passwords will be stolen, not all. Therefore, it seems possible to mitigate the problems related to this single point of failure.
I tried to think of some solutions. I'm not sure if 2FA could really help in case the local machine is compromised, so I'm not sure if online password managers can help more than locals in this regard. I'm afraid not. A possible solution could be to use several databases in the password manager, with different passwords, so that even if a master password is stolen (and the corresponding database), the passwords contained in the other databases will be secure . The different databases could group the passwords according to the frequency of use, the date of the last use or the importance (the PayPal account in a database different from StackExchange) or the property (the accounts of the clients are maintained separated from mine). However, it is not clear which is the best way to group passwords, and soon it becomes quite cumbersome, which leads to remembering several secure master passwords. Another solution might involve some type of obfuscation (made to measure) added to the security by design already provided by the password manager, which I guess would work against most infections (non-targeted attacks). For example, the combination of obfuscation with multiple databases could be done by generating the password for each database with something like master_password_for_DB = hash (DB_name + supermaster_password), so you do not have to remember many master passwords. Of course, this only works because of the darkness, that is, if nobody but me knows the method. Another solution could be to store everything in a separate device configured specifically for managing passwords (like a phone with connectivity turned off), but that's also going to present some pretty big problems: write a secure master password every time it is done on the device Laptop is more difficult, and there is no way to copy it and paste it into the computer, so you will probably have to read it (a security weakness) and write it down (a nuisance).
Seriously, I do not think I have other ideas at this time.
What is the purpose of the lock and unlock function in password managers?
I'm afraid this could be a very stupid question, but I can not think of an explanation. Password managers (keepass, etc.) often have a button that allows you to "lock" the database, so if you need a password, you must unlock it again by entering the master password. The database could also be blocked automatically after some time, or when the screen saver is started, etc.
It is clear why you should unlock the database the first time you use it after turning on the computer, because it is encrypted. But, why should you block / unblock it later? The first thing that comes to my mind is "what happens if an attacker accesses your computer while it is on and you are absent", but for that matter there should be a screen blocker, otherwise, it is screwed anyway . It also does not seem to prevent problems with malware or cold start attacks.
What threat are you trying to mitigate then? I can only think that it can be useful to protect against a very low level attacker without any skills, in case you leave your computer and forget to lock the screen. This type of attacker could take a look (and read your administrator's unlocked password information) but could not install malware or compromise the machine in any other way. Or maybe I'm missing something. | 2019-04-23T17:54:55 | https://proxies123.com/tag/managers/ |
0.999986 | Perfect! How about a slightly more complicated example with INSERT INTO?
We've created another table called ProjectWorktime. It has the following columns: ProjectId and AvgWorktime.
Your task is to use the table Allocation and insert the average total number of hours spent by employees on each project into the new table ProjectWorktime. Insert the ProjectId and the average HoursSpent. Additionally, do not insert any data for ProjectId = 1.
First, count the total number of hours spent by each employee on each project which ID is not 1. Then, insert into ProjectWorktime table the average total number of hours spent on each project. | 2019-04-24T22:17:05 | https://academy.vertabelo.com/course/ms-sql-recursive-queries/final-quiz/quiz/insert-into-with-cte |
0.997443 | Poison Dart Frogs Might Make Good Medicine : Shots - Health News The toxin comes from tiny frogs in Colombia — the ones that pack a punch on the tip of poison darts. In the past, research on toxins like this has led to some pretty amazing drug discoveries.
The skin of the golden poison dart frog, Phyllobates terribilis, secretes a deadly poison that might lead to a better understanding of how to treat malfunctions of the human nervous system.
The golden poison dart frog is about an inch long and banana yellow. By some estimates, the skin of one little frog contains enough toxin to kill 10 adult men.
"Oh yeah, it's one of the more lethal poisons on the planet," says Justin Du Bois, a synthetic chemist at Stanford University.
The substance is called batrachotoxin (buh-TRAK-uh-TOX-in), and tiny amounts of it can be deadly if it makes it into a victim's bloodstream. It's what some indigenous groups in Colombia's lowland rain forest would use to tip their blow darts.
And, as Du Bois and his colleagues write Thursday in the journal Science, they figured out how to make it in the lab in 24 steps. Why on Earth would anyone want to do that?
"Well, it turns out it's a fantastic research tool for figuring out how nerves conduct electricity," Du Bois says, "and we're very interested in that fundamental process."
Once inside a victim, the compound embeds itself in certain proteins that are responsible for conducting electrical impulses through the nerves and muscles, including the heart. By disrupting that process, it can cause paralysis and a heart attack. But studying the poison's mode of action could also lead to a deeper understanding of the role electrical impulses play in fundamental processes like heart function and the sensation of pain.
"There are very few molecules like this that we're aware of," Du Bois says, "and we would like to really understand how it works."
And maybe — just maybe — some version could be developed into a useful drug. Du Bois points out a few rare diseases that involve malfunction in the same proteins that this toxin acts on; one such disorder prevents a person from feeling any pain at all.
"You could literally run a knife through their hand and they wouldn't feel a thing," Du Bois says. Some of the same proteins are involved in a condition that's sometimes called "Man on Fire syndrome," because people who have it experience frequent pain and burning.
"Molecules like batrachotoxin are essentially a key into mechanisms of how our nervous system works," says Toto Olivera, a biochemist and neuroscientist with the Howard Hughes Medical Institute who is based at the University of Utah. The more specific the compound is, and the more potent, he says, then "sometimes, the greater the insight that you can gain."
There's a long list of nasty toxins that, with a few tweaks in the lab, have proved useful for human health, Olivera points out. Take curare, for example. The poison from tropical plants is now used as a muscle relaxant during some kinds of surgeries.
Olivera's lab found that the venom that certain sea snails — Conus magus — use to paralyze fish also acts on an important mechanism in the human body's communication of pain. That led to the development of a painkiller that is now used in patients who have become tolerant to morphine.
"Sometimes, you can add one atom to a compound and totally change how it acts," says Becca Tarvin, a doctoral student in evolutionary biology at the University of Texas, Austin. She studies the toxins of poison dart frogs and just got back from a trip to Colombia.
Tarvin says the various species of poison dart frogs contain at least 500 different toxins. She knows firsthand how some of these toxins feel once they're in your system; she and a field assistant once licked a few of the milder frogs, to see how they differed.
"One just tasted like sushi, like raw fish," she says. "The other one had kind of a bitter flavor that stayed in your mouth. But the last one I tasted, it tasted bitter at first. And then I could tell on my tongue the area that had touched the frog and the feeling kept spreading until my mouth was kind of numb."
Out of those 500 toxins, scientists know the biological activity of about 60.
"So, being able to synthesize any of these compounds is super important in figuring out how they work and how they could be developed as drugs," Tarvin says.
But another reason it's important to synthesize these compounds, the scientists say, is that they are getting harder and harder to find in nature. A lot of these frogs are endangered.
"Because of that," Tarvin says, "our chances of finding these toxins and these frogs before they're gone is low." | 2019-04-26T14:37:50 | https://www.npr.org/sections/health-shots/2016/11/17/502324984/chemists-recreate-deadly-frog-poison-in-the-lab |
0.999999 | Glass ceiling - does it exist?
Christina Fry will remember the day when she photocopied an article from the Cosmopolitan Magazine about a glass ceiling that many women still confront at some stage of their career, and handed it over to one of the senior managers at Air Products. It was the day that still makes her laugh and reminds her about the times when the issue of women\\$quot;s career opportunities was a very sensitive topic.
\\$quot;When I first joined Air Products, there was a senior manager who had been headhunted to the company couple of months before I joined,\\$quot; tells Christina.
\\$quot;He used to stop by my desk on his way in to his office and enquire how I was getting on. I felt I could talk to him quite informally and he seemed genuinely interested in my views as a young female engineer.
\\$quot;I remember that there was an article in the Cosmopolitan Magazine about the \\$quot;˜glass ceiling\\$quot; for women, and about the fact that when women arrive to a certain level they don\\$quot;t progress much higher. So I photocopied it and put in on his desk.
\\$quot;And he just looked at me and said: \\$quot;˜Well if you put it like that I can understand it completely\\$quot;.
Why teach a tortoise to run when you can take a rabbit in the first place?
But does the glass ceiling really exist? I spoke to a number of women, and although none of them had reached board level (yet), they had all already attained a very high level within their companies.
Christina has been working for Air Products UK for 16 years and held various positions from process engineering to her recent promotion to UK EHS Team Lead for Merchant Gases and Healthcare. She started her career in the nuclear industry but soon left to pursue a career within the mainstream chemical engineering in the gases industry.
\\$quot;When people asked me in the pub what I did for a living, whilst working within the nuclear sector, the conversation always ended very quickly,\\$quot; she laughed.
Christina is also a leader of Air Products\\$quot; EHS global diversity team and says they have very good discussions on minority issues. She continued: \\$quot;In America they actually elect what is called a \\$quot;˜diversity slate\\$quot; and they have an incentive for the managers to select somebody who is a minority. That is illegal in Europe.
Also the Head of Linde Global Homecare, Dr Carla Kriwet, is not a big fan of special programmes encouraging or helping women to join the \\$quot;˜club\\$quot;. In fact she thinks that those kinds of programmes are nonsense. She said: \\$quot;For me it would not work. I would not work for a company who would say that because you are a woman you have especially good chances. I would think what rubbish.
\\$quot;I always seek to work for a company where I have a sincere feeling that performance counts. I want to be selected because I am the best for the job. When you see an environment where something else but the overall principle of performance weighs more, then I would start getting doubtful.
So what about career opportunities for women? Well, according to Christina they are very good within Air Products. She says this is partly to do with the fact that the company has a wide portfolio of businesses. However, women still represent a significant minority and may miss a great career opportunity within the industry due to lack of knowledge.
\\$quot;I left Boston Consulting because I wanted to have an operational business responsibility. I wanted to be more than an advisor. I wanted to see the bottom-line at the end of each month and feel responsible for it.
\\$quot;What is interesting in the gases industry is the variety of applications, not the technology itself but the new developments in food, electronics, steel etc. In mature businesses, better use of gases can develop them and actually lead to a real step change. It is still possible to optimise the steel world for example. That for me is very fascinating.
\\$quot;Healthcare is one of the most attractive growth markets for gases. Firstly because of demographic trends; ageing population, and secondly because of social trends; the baby boom generation who now gets through retirement doesn\\$quot;t accept second standard healthcare services.
Christina also finds the variety of applications fascinating and she feels the industrial gases industry is an area she can whole-heartedly support.
She said: \\$quot;Industrial gases is a very clean and environmentally friendly business and as a young engineer I felt I could whole-heartedly support it.
\\$quot;Now when I am learning more about packaged gases, I am surprised how little of the actual business mechanics I understand. I don\\$quot;t need to know all that but its very enlightening when you have been working with one kind of business for years and then when moving into something new you realise how much new information you need to pick up.
Whether people who enter the industrial gases business enters it by accident or not, they all seem to thoroughly fall for it, and stay.
Carla has been working for Linde for three years; two years as the Head of Corporate Strategy and since last year she has been responsible for Linde\\$quot;s global homecare operations. Her career has taken her from ABB India to Boston Consulting based in London.
\\$quot;I do not wish to remain in the same job for the next 15 years; I am still wanting to climb and do more. I had a recent promotion but for me it\\$quot;s a stepping-stone to the next position,\\$quot; Christina says.
\\$quot;In a few years time the question for me is, do I stay within the EHS function and try to grow based on my area of competence or do I make that leap to an unrelated job. I think that\\$quot;s the question you need to ask through your career rather than assume that you are going to develop one straight-line path. You always need to keep looking what the opportunities are.
\\$quot;Being a plant manager somewhere is not something I have direct experience of, such a move might be seen as a risk, but I know I would do a good job. And some risks are worth taking.
Carla on the other hand has had her operational responsibility only for a year but although she says her business segment with €200m sales is still small, she believes there are a lot of opportunities to make her segment and role bigger. \\$quot;I am getting a lot of support from the organisation, and this helps me to grow the homecare business, both organically and via acquisitions.
\\$quot;Compared to other gases areas, my business segment is still developing, and there are lots of opportunities. We just have to get the right competence on board and just do it.
\\$quot;That is my short-term career plan. Long term, I don\\$quot;t know,\\$quot; she sighs. \\$quot;But I need the challenge, the opportunity to learn and I need to see that I can advance. If these three are somehow met I would be happy, and motivated to continue.
\\$quot;I can also see the BOC \\$quot;“ Linde deal creating more opportunities. There\\$quot;s a lot of learning we can get from BOC, also in the homecare field. I am sure that we will not only benefit from their experiences, but also from their geographic presence. Whilst we are still undertaking our first researches in Asia, they are already there.
Undoubtedly both women have had a very successful and bright career so far. However, neither of them have yet reached their final goal and they are eager to achieve more and keep on climbing the ladder. | 2019-04-19T16:48:19 | https://www.gasworld.com/glass-ceiling-does-it-exist/926.article |
0.999876 | Journalist: Hi! May I ask you some questions?
Journalist: In what way is your school different from others?
Head Teacher: __6__ A few children are physically disabled and some others have learning difficulties. We have faster and slower learners.
Journalist: And is yours the only school like this?
Head Teacher: __7__ Disabled children were usually sent to special schools. They grew up in a different world.
Head Teacher: We realized disabled children had no knowledge of children in ordinary schools. The opposite was also true. But all human beings should grow together.
Journalist: Do the slower learners hold up the faster learners?
Head Teacher: ___9___ For some classes, they are separated. In other classes they work together.
Head Teacher: Well. The faster become skilled as teachers when helping the slower. Thus the faster learners also do a task more quickly and better.
Head Teacher: You are welcome.
A.Our school is for all children.
B.Well, ours is the only school built for disabled children.
D.What made you decide to start this new school?
G.Where do they have class?
11.I once watched _____ one-act play, which was played by ___ 11-year-old boy. | 2019-04-26T08:06:16 | http://www.jxenglish.com/testpaper/practice/testpaper_18567.html |
0.999189 | ARTICLE CORRECTION/NOTATION: The cemetery clean-up mentioned about Bachelors Grove cemetery was organized by the Grove Restoration Project and not John Stephenson. Also, there was not 100 volunteers present as stated and less than a handful of John Stephenson's web site members were present during the event.
Paranormal investigator John Stephenson knows you can't catch a ghost with a couple of garbage bags and a yard rake.
So why did the Frankfort resident recently travel to Bachelor's Grove Cemetery near Midlothian, which is considered by many to be a prime place to spot a specter, carrying the aforementioned household items instead of his usual assortment of electronic ghost-hunting gadgets?
To grab garbage, not ghosts.
"I grew up out here, and Bachelor's Grove has been in bad shape since I was a kid," Stephenson said. "It just bugs me. It always has, so I've always gone out there with garbage bags and picked up stuff just on my own."
During a recent weekend excursion to the famous graveyard, Stephenson and nearly 100* other paranormal investigators went to work picking up beer cans, cigarette butts and other garbage in an effort to clean up the cemetery and restore it to its former glory.
"I just don't like the way Bachelor's Grove looks," he said. "It's just terrible. It's a graveyard; it deserves some sort of respect, but no one will take care of it."
"I have 500-plus members," he said. "I put out a global post, and I got a massive response. I even had people contacting me from Germany wanting to know how they could help."
The cemetery has become something of a Midwest legend over the years. People have claimed to spot everything from phantom farmhouses and two-headed monsters to mysterious blue lights and shadows that sulk between the fallen tombstones and broken trees.
"It's been paranormal since the 70s, but to be honest, I don't know why," Stephenson said. "I think the (disheveled state of the cemetery) might make it worse. Kids go in there and break tombstones and steal them. I know if I was a spirit, I'd be a little [ticked] off."
For ghost hunter Rhonda Schienle, of Northwest Indiana Indiana Ghost Trackers, Inc., cleaning up the graveyard seemed like a natural extension of the group's normal paranormal outings.
"Our mission statement is to be community-involved," she said. "We want to not only educate the community about the paranormal and get the word out, but we want to be involved in the community, as well, so this is one area where we know we can go out and help."
Cook County is responsible for Bachelor's Grove. County authorities responsible for its upkeep did not return calls for comment last week.
Schienle said the experience was wrought with mixed emotions.
"There was just something very serene about the area," she said. "At first, it was very breathtaking for me, but then to see what I saw when I got in there, I was heartbroken. I went from reverence to disgust."
"I was so heartbroken to see someone had taken a spray can and wrote on a tombstone," she said. "People want to go to cemeteries and pay their respects and not have the tombstones broken or vandalized."
At the end of the day, Schienle said she was shocked to see how much junk they'd accumulated.
"When we were done, we had a couple dozen trash bags," she said. "There was quite a bit. I was impressed."
But picking up a few bags of trash is just the beginning, said Stephenson.
"I've got power, now," he said. "I've got 500-plus people who'll jump when I say something, which is pretty cool, so I've been utilizing them as my own little army. We might start an entire project. There's abandoned graveyards all over the place."
Jason Freeman can be reached at [email protected] (708) 802-8808.
Bachelor's Grove Cemetery, which is located in the Rubio Woods Forest Preserve near Midlothian and Oak Forest, can trace its roots to the European settlers who first tamed the area in the mid-1800s.
The old Midlothian Turnpike, the only road leading to the graveyard, was closed in the 1960s, making the secluded cemetery the perfect place for teens to hang out after dark without being spotted. Vandalism was common, and today, only 20 tombstones remain of the roughly 200 that once rose from the graveyard's grounds. The others have either been stolen or knocked over.
Some graves were dug up, and others lost to time as the grass grew over any indication that a marker was once there. Trees fell and crushed the surrounding gates. The cemetery entrance sign was stolen. Beer cans, cigarette butts and other assorted garbage became typical sights. The vandalism, say may paranormal investigators, stirred up the vengeance of angry spirits.
Are these claims true? That's exactly the question hundreds of paranormal research teams have been trying to answer since the 1970s. | 2019-04-26T02:20:00 | http://www.bachelorsgrove.com/newspapers/ghost-hunters-clean-up-bachelor-s-grove |
0.99831 | Thecenturyfoundation's interactive graph and data of "125 Diverse-by-Design Charter Schools" is a scattergeo, showing D. The x-axis shows values from 0 to 0. The y-axis shows values from 0 to 0. This visualization has the following annotation: Note: Red markers indicate strong commitment to diversity <br> and orange markers indicate a visible commitment to diversity. | 2019-04-22T08:23:07 | https://plot.ly/~thecenturyfoundation/436.embed |
0.999999 | The following table shows the airlines, flight times and days of travel for flights from Jabalpur to Gwalior.
Return Route: Gwalior to Jabalpur flights.
Destination airport details: Gwalior Airport. | 2019-04-21T00:47:27 | https://www.indiainternalflights.com/JabalpurtoGwalior.php |
0.998491 | I use a computer with two video cards. The primary desktop for all work on card 1 and the secondary card for the Overview Window. However, I have to place the Overview Window onto that 2nd screen manually upon each restart of CP. Is there any way to automatically place the Window on monitor 2 instead of it always coming up as the same monitor of the CP application window?
I use 2 monitors on one video card. No matter how I arrange the desktops (primary,secondary) and position CamPermanent and the overview window, it is always well positioned after restart. CamPermanent saves the position of every window and re-position it at startup.
So I guess in your case it is different, because of the 2 physical video cards.
The file settings.dat saves the position of the main window (<FORMPOS>-1088,530</FORMPOS> <FORMSIZE>800,450</FORMSIZE>).
And in the used *.cam file, there is the postion of the overview window saved (<COLLWINDOWPOS>-1115,53</COLLWINDOWPOS> COLLWINDOWSIZE>640,400</COLLWINDOWSIZE>).
These values could be edited by hand. But normally this is not necessary, because the program saves and restores the correct positions.
Perhaps in your case a tool, like Winsize 2, could help. This tool saves and restores positions of windows. | 2019-04-24T12:48:44 | http://www.crazypixels.com/forum/viewtopic.php?f=3&t=5255&p=8017 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.