proba
float64 0.5
1
| text
stringlengths 16
182k
| timestamp
timestamp[s] | url
stringlengths 15
1.72k
|
---|---|---|---|
0.999999 | Facts: The offender was charged and pleaded guilty to damaging property for breaking a window in his partner’s house. He was convicted and sentenced to one month’s imprisonment. This conviction breached a good behaviour order that was made after he was convicted for assaulting his partner. He was sentenced to six months’ imprisonment, wholly suspended upon complying with a good behaviour order for two years. The good behaviour order was cancelled as a result of the breach and the six months’ suspended sentence was imposed, but was ordered to be served concurrently with another term of imprisonment. The offender successfully appealed this sentence. A sentence of six months’ imprisonment wholly suspended on the condition of a 12-month good behaviour order was imposed on appeal. A good behaviour order for the offence of damaging property was also made.
The offender was subsequently convicted of traffic offences, constituting a breach of both good behaviour orders. As a result, the good behaviour bond imposed for the offence of damaging property was extended for a further 12 months. He was also resentenced to six months’ imprisonment on the assault charge, suspended for a period of 12 months on the conditions of a further good behaviour order for 12 months and 80 hours of community service. This effectively increased the length of the good behaviour orders as well as requiring the offender to perform community service work.
The offender again breached these good behaviour bonds when he was convicted of assault occasioning bodily harm. This conviction arose when the offender choked his partner and threw a chest of drawers that hit her in the head. In relation to this offence, he was sentenced to 18 months’ imprisonment, suspended after nine months with a good behaviour order for two years thereafter.
Issue: How should the offender be resentenced for the final breach of the two good behaviour orders?
The offender suffered a difficult childhood in which he was sexually abused and had great difficulties in school as a result of having ADHD and dyslexia. After leaving school at 14, he was homeless for many years. He also had a long history of drug and alcohol abuse. The offender also suffered from various mental illnesses, including major depressive disorder, borderline personality disorder and antisocial personality traits, for which he was receiving treatment. He had a long criminal history with 122 offences on his criminal record. This reduced towards the time of offending in question and suggested his criminality was abating.
The final breach of the good behaviour orders was serious when considering ‘the offence was a family violence offence committed on a complainant who had been the victim of earlier offences of a similar type committed by [the offender], for which the current Good Behaviour Orders owe their genesis’ (). However, there was a need to take into account the offender’s mental health. Refshauge J considered that ‘the option for rehabilitation can be given greater prominence without minimising the need for some level of special and general deterrence’ ().
Refshauge J cancelled the good behaviour orders in accordance with s 110 of the Crimes (Sentence Administration) Act 2005 (ACT). The conviction of assault occasioning actual bodily harm was confirmed. The offender was convicted to six months’ imprisonment, wholly suspended for a period of two years. A good behaviour order was made for two years with the conditions that the offender would be supervised, must complete 180 hours of community service, and must participate in the Detention Exit Community Mental Health Outreach Program for three months. The conviction for damaging property was also confirmed and the offender was sentenced to one month’s imprisonment, taking into account the time already spent in custody.
Refshauge J concluded by telling the offender, ‘If you are genuine in your efforts, the Court will support you in this, as I hope I have shown you, but if you are not, then you can expect further custodial sentences and a revolving door’ ().
For Refshauge J’s previous decision on appeal, see Guy v Anderson (No 2) ACTSC 245. | 2019-04-26T02:05:55 | http://dfvbenchbook.aija.org.au/act/supreme-court/actsc-237-2015/print |
0.999239 | Following widespread backlash over comments Norm Macdonald made about the #MeToo movement in an interview published Tuesday, the comedian's appearance on "The Tonight Show" has been canceled just one hour before the episode was set to air. And I meet all kinds of women with awful stories of what's happened to them.
Barr, who hired Macdonald to write on her original Roseanne series, lost her comeback series over a racist tweet. Now it's admit wrongdoing and you're finished.
In an interview in which Macdonald seemed to criticize and awkwardly defend everything he was asked about (he talked about how the Constitution was created to survive President Donald Trump, but also said the world was not as bad as he feared it would be with Trump as president), one segment stuck out. Touching on a variety of politically charged issues, Macdonald's controversial opinions on the #MeToo movement, Louis C.K. and Roseanne Barr sparked waves of criticism. In it, he revealed that he served as a friend and confidant for both Roseanne Barr and Louis C.K. in the wake of their career-imploding scandals, the former for her incendiary and racist tweets and the latter for a history of sexual misconduct. In a new interview, he voiced sympathy and support for Roseanne Barr, Louis C.K. and Chris Hardwick, and is now facing the wrath of Twitter and late-night TV execs. People will go, 'What about the victims?' But you know what? And he said, he was very, very broken up about it, he didn't want this, but he said, "I don't know what to do",' Macdonald told Stern. It used to be, "One hundred women can't be lying". Netflix comedy execs Robbie Praw and Lisa Nishimura were recently asked about giving Louis C.K. another special and were barred from answering the question.
During his interview with THR, the comedian said very few people have gone through what Barr and C.K. went through, "losing everything in a day". Senior producers are crying'. In typical dry Macdonald fashion, he then said, "You'd have to have Down syndrome", to not feel sorry for victims.
"I wasn't there, but everything I heard about it was that he did very well", he said.
'I said, "Good Lord, bring them in and let me talk to them". And I said 'Should I not do the show?' And he said. And I said, 'Jimmy I don't want to hurt your show.
Unfortunately, Macdonald may not have helped his case by also telling Stern that he'd "have to have Down syndrome to not feel sorry" for the victims of harassment and adding, "Down syndrome, that's my new word". The first half made me a little nervous but Fonda is a pro and never gets flustered, whether she's talking about her mortality or contemplating Macdonald's bad pickup line. "What the victims went through is disgusting". | 2019-04-24T08:07:36 | http://alongtheboards.com/2018/09/13/norm-macdonalds-appearance-on-the-tonight-show-cancelled.html |
0.999998 | (A) The sentence A is not true.
What I'm now saying is false.
The logical argument here is that we can grammatically assert the sentences above and grammatically apply the predicate “is false” (or “is not true”) to them. However, doesn't that depends on what's meant by the words “we can grammatically assert the sentence”?
is surely not "grammatically acceptable". After all, the words “is not true” are predicated of the words “The sentence A” (or “The sentence”). Thus, what we're really dealing with are the words “The sentence A” (or even the two words “The sentence”).
and leaving the locution there. Surely no teacher of English grammar would accept this sentence on its own.
So perhaps this well-known example from logic is all down to its syntax and not its semantics. And if it's all down to syntax, then one can see why some logicians have seen the sentence as being logically acceptable. That is, it's about the form/syntax of these sentences (as well as the problems/puzzles/paradoxes they create): not their content. Though if that's true, isn't it a sleight of hand to use sentences which appear to have content?
The Liar Paradox isn't about propositional content.
Okay, perhaps the Liar Paradox isn't about propositional content. Though what about the sentence “(A) The sentence A is not true”; which doesn't take exactly the same form as the Liar Paradox? And why isn't the Liar Paradox itself also about propositional or semantic content? Or, at the very least, why isn't content seen as being relevant at all?
I'm lying to you at this very moment in time.
No one will say that the sentence “I'm lying to you at this very moment in time” has no content.
Grammatically speaking, the sentence “I'm lying to you at this very moment in time” is a great sentence - grammatically. We all know what the individual words means and it seems to make sense. However, what is its propositional or semantic content?
The statement “I'm lying to you at this very moment in time” could have propositional or semantic content if the self-accusation of lying refers to other statements the speaker (or liar) had made previously. (Those other sentences would then be false.) However, it's supposed to be a self-referential statement. So what is this man lying about, exactly? He can't be referring to his lying alone because in order to lie, you have to make a claim that's false and also to believe that it's false. Surely the fact is that he's neither lying nor telling the truth.
Mr X is only stating a grammatically-acceptable sentence; though one which has no propositional or semantic content. Therefore he can't be lying or telling the truth.
If the sentence “I'm lying to you at this very moment in time” has no content, then why is it still seen as still being grammatically acceptable?
I'm singing to you at this very moment in time.
These two sentences aren't equivalent. And that's not simply because one is about lying and the other is about singing.
When someone says “I'm singing to you at this very moment in time” he's either lying or telling the truth. (He could be singing those words.) That doesn't work for the sentence “I'm lying to you at this very moment in time”. The sentences have the same grammatical form; though the latter is neither true nor false. The former is either true or false. And even if they have the same grammatical form, one is has a truth-value and the other doesn't. Indeed, despite what was said a moment ago, it can now be argued that it's because of this difference, the two sentences can't have the same grammatical form.
Again, because the sentences “I'm singing to you at this very moment in time” and “I'm lying to you at this very moment in time” have the same shape (or form), that creates problems. They may well have the same grammatical shape. Though one could be true or false and the other is neither true nor false. That difference seems to be clear.
Why is the invariant mass of an electron approximately 9.109×10−31 kilograms?
An answer to the last question would presumably tell us about the interaction of H2O molecules and human skin; as well as facts about brains, central nervous systems, sensory receptors, etc. It would also involve a subjective component as to what it is like to experience something wet.
Liquidity (not wetness), on the other hand, can be explained by science and without recourse to “phenomenal feels” (or experience generally).
Perhaps, it's just a brute fact that H2O molecules giving rise to water because they equal water. In other words, this “brute fact” isn't amenable to an explanation.
Why is water constituted by H2O molecules?
Why do H2O molecules bring about (or cause) water?
Why does the brain/the physical bring about/cause consciousness?
is similar; though certainly not exactly the same. For one, if we have enough H2O molecules, then we have water and can observe water. We can touch, taste and see water when enough H2O molecules are brought together (or found together). We can also see H2O molecules under and microscope.
When we observe brains, on the other hand, we can't touch, taste, or see consciousness. We can experience or our own consciousness; though only from the inside (as it were). So the H2O-water and brain-consciousness questions are similar; though certainly not the same. Nonetheless, it can still be said that the question is bogus even if consciousness has what John Searle calls a “subjective ontology”; whereas water-H2O clearly doesn't. | 2019-04-25T10:33:08 | https://paulaustinmurphypam.blogspot.com/2018/02/bogus-philosophical-questions-logic-and.html |
0.997799 | After Brussels attacks, Republican candidate Ted Cruz proposes police surveillance to stop Muslim radicalisation.
US presidential candidate and Texas senator Ted Cruz says it is time for law enforcement to "patrol and secure Muslim neighbourhoods" in response to the series of deadly attacks in Belgium.
Cruz, who is seeking the nomination in the Republican Party in the United States, said in a statement on Tuesday that authorities should implement the policy before those neighbourhoods "become radicalised".
"We need to immediately halt the flow of refugees from countries with a significant al-Qaeda or ISIS presence," Cruz said, referring to the Islamic State of Iraq and the Levant (ISIL) group.
In a separate statement posted on Facebook, Cruz said "radical Islam is at war with us. And the truth is, we can never hope to defeat this evil so long as we refuse to even name it".
He was also quoted as saying on Fox News television: "ISIS has declared jihad on Europe and on the United States of America. They have declared their intention to murder as many innocents as possible."
Earlier on Tuesday, a series of bomb attacks hit Belgium's capital Brussels killing more than 30 people and wounding about 200 others.
ISIL said it was responsible for carrying out the blasts at Brussels' airport and an underground train.
Cruz' call drew a swift response from Debbie Wasserman Schultz, chairman of the Democratic Party, who called him a "disgrace".
"His comments today were worse than opportunistic and inappropriate politicking in the way of the terrible tragedy in Brussels - they were a shameful display of hate that only serves to foment anger and make the world less secure."
The Council on American-Islamic Relations - the largest Muslim civil rights organisation in the US - also condemned Cruz and called on him to "retract and apologise for his unconstitutional policy proposal".
"Does that mean checkpoints on every corner? Does that mean 'your papers please' requests for anyone who looks stereotypically Muslim?
"Does that mean kicking in the doors of Muslim homes and businesses?" said Ibrahim Hooper, spokesman for the council, in a statement sent to Al Jazeera.
"We're harkening back to the dark days of the 1930s with this kind of mentality. It's unconstitutional. It's un-American and it’s unbefitting someone who's running for our nation's highest office."
Republican presidential frontrunner Donald Trump also reacted to the Brussels attack saying President Barack Obama has been "so weak" that "terror groups are forming and getting stronger". | 2019-04-21T20:45:54 | https://www.aljazeera.com/news/2016/03/cruz-patrol-muslim-neighbourhoods-160322195255592.html |
0.998855 | Every now and then, developers commit mistakes while coding. A mistake in a program or a script is referred to as a bug.
The process of finding and fixing bugs is called debugging and is a normal part of the development process. This section covers tools and techniques that can help you with debugging tasks..
The most basic way to track down errors is by turning on error information in your browser. By default, Internet Explorer shows an error icon in the status bar when an error occurs on the page.
Double-clicking this icon takes you to a dialog box showing information about the specific error that occurred.
Since this icon is easy to overlook, Internet Explorer gives you the option to automatically show the Error dialog box whenever an error occurs.
Unfortunately, since these browsers give no visual indication when an error occurs, you must keep the Console open and watch for errors as your script executes.
Error notifications that show up on Console or through Internet Explorer dialog boxes are the result of both syntax and runtime errors. These error notification include the line number at which the error occurred.
If you are using Firefox, then you can click on the error available in the error console to go to the exact line in the script having error.
By examining the content and order of the alert() as they appear, you can examine the health of your program very easily.
A debugger is an application that places all aspects of script execution under the control of the programmer. Debuggers provide fine-grained control over the state of the script through an interface that allows you to examine and set values as well as control the flow of execution.
Once a script has been loaded into a debugger, it can be run one line at a time or instructed to halt at certain breakpoints. Once execution is halted, the programmer can examine the state of the script and its variables in order to determine if something is amiss. You can also watch variables for changes in their values.
Use plenty of comments. Comments enable you to explain why you wrote the script the way you did and to explain particularly difficult sections of code.
Always use indentation to make your code easy to read. Indenting statements also makes it easier for you to match up beginning and ending tags, curly braces, and other HTML and script elements.
Write modular code. Whenever possible, group your statements into functions. Functions let you group related statements, and test and reuse portions of code with minimal effort.
Be consistent in the way you name your variables and functions. Try using names that are long enough to be meaningful and that describe the contents of the variable or the purpose of the function.
Use consistent syntax when naming variables and functions. In other words, keep them all lowercase or all uppercase; if you prefer Camel-Back notation, use it consistently.
Test long scripts in a modular fashion. In other words, do not try to write the entire script before testing any portion of it. Write a piece and get it to work before adding the next portion of code.
Use descriptive variable and function names and avoid using single-character names.
Watch your quotation marks. Remember that quotation marks are used in pairs around strings and that both quotation marks must be of the same style (either single or double).
Watch your equal signs. You should not used a single = for comparison purpose.
Declare variables explicitly using the var keyword. | 2019-04-21T02:18:15 | http://www.mumbai-academics.com/2018/07/javascript-debugging.html |
0.999606 | Please clarify. Are you looking for a color chart that identifies the symbols? Bucilla uses it's own colors. Each chart will have it's own set of symbols. For example, you might have five different Bucilla kits/patterns. Each one of the five uses black floss. The symbol on each graph for black will probably be different. | 2019-04-25T15:49:15 | https://www.cyberstitchers.com/message_boards/problems/taupe |
0.999998 | For the task, Big Brother launches CBB TV; housemates will take part in their very own TV show. Bianca and Jedward present a home shopping channel called Selling Yourself Short. As part of the task, the presenters must demonstrate and try products on sale. These include: a ‘mystery can’ filled with dog food which the presenters taste, John being waxed using ‘painless wax strips’ and a ‘health smoothie’ with contains mushroom soup, fish sauce, cottage cheese spinach and fermented egg which the presenters taste and pretend to enjoy.
As part of the CBB TV task, housemates take part in CBB TV’s quiz show: Who Is It?. Housemates are lined up behind individual podiums with buzzer. For the first round, housemates are played clips from CBB fans and they must guess who the fans are talking about.
The clip is: ‘This is the biggest game player in the house and is most antagonistic’ Coleen is correct with her answer Jedward. The clip is: ‘This housemate has been cunning and is playing an excellent game’ Jedward are correct with their answer James C.
For the next round, housemates must guess the missing name from viewers’ tweets. The tweet is: ‘Who the hell is voting for XXXX Drip #boring’ Jedward are correct with their answer Bianca.
Day 31: HIGHLIGHTS: John runs out of underwear and Housemates discuss kim. | 2019-04-19T09:25:42 | http://bigbrother247.co.uk/day-31-housemates-take-on-cbbtv-in-latest-task-as-kim-explodes/ |
0.999999 | In short: Facebook entered damage control mode after a top executive attended Judge Brett Kavanaugh's Senate Judiciary Committee confirmation hearing held last month. The company's Global Policy Head, Joel Kaplan, sat at Judge Kavanaugh's side while he was defending himself against accusations of sexual harassment raised by Christine Blasey Ford, a psychology professor at Palo Alto University. Many Facebook employees were disgruntled by the fact, having consequently flooded the company's internal boards with concerns. In a statement released earlier this week, a spokesperson said the firm's "leadership team recognizes that they've made mistakes handling the events" surrounding the Kavanaugh hearing. Judge Kavanaugh was confirmed as the new Associate Justice of the Supreme Court of the United States with a 50-48 vote held yesterday.
Background: As is the case with the majority of American tech giants, Facebook's workforce is predominantly liberal, whereas Judge Kavanaugh's nomination and subsequent appointment to the SCOTUS has been seen as a power play by the GOP due to the 53-year-old's largely conservative views on abortion and presidential powers. Employee activism stemming from Mr. Kaplan's move hence isn't surprising, even though Facebook's executive defended his hearing appearance as a personal decision, describing Judge Kavanaugh, his wife, and their children as family friends. Google also had recent issues with employee activism revolving around the controversial Project Maven and is now once again facing similar problems due to its widely reported ambitions to launch a censored version of Search for China.
Impact: Despite facing some backlash from Facebook employees, Mr. Kaplan's decision may actually help Facebook soften criticism from the political right in the U.S. that claims the Internet juggernaut is biased against conservative views, a notion that it strongly denied on several occasions. The latest development is unlikely to see the company tighten its grasp over its executives as reports suggest that despite acknowledging the aforementioned "mistakes," Facebook remains adamant that all of its employees are free to pursue legitimate political goals in their free time. | 2019-04-18T22:25:32 | https://www.androidheadlines.com/2018/10/facebook-doing-damage-control-after-top-exec-supports-kavanaugh.html |
0.999153 | The only problem is that government has no money. Where will the money to fund the noble goals going to come from? The UPND policies appear so dissapointing, that I have decided to discontinue this column on their policies.
The government has no money??
In 2004, they had $1.7 billion ($1.1 billion from taxes and $0.6 billion from 'donor aid') in income - and that was without taxing the mines.
I would agree that it would be helpful if all the parties included specific policies and at least an estimate of the costs and how it would fit into the general budget.
The Auditor General’s report covering the period 2001 to 2005 reviews that the MMD government has through their various forms of financial mismanagement misappropriation and related irregularities lost 14.7 trillion kwacha of public funds. This money alone could have financed the entire education and health sector. Each Minister and Deputy Minister in this Government has been consuming over 100 million kwacha per month. Each Minister has more than two motor vehicles with over 1 5 million kwacha worthy of fuel and over One million kwacha service costs per motor vehicle They also receive millions of kwacha worth of talk time. Yet they receive tax free salaries and allowances and live in free houses with free water and electricity.free medical services and their children have free education too.
This would need major reform - auditing, budgeting, etc. and would also mean the UPND needs to keep in check rogue elements within it's own party.
I agree with Cho, there is not enough money for everything. If you divide $1.7 billion among 12 million Zambians, that is $142 per Zambian. To be used to pay for education, health, roads, agriculture, defense, etc. Only when the average Zambian starts generating the same income as mid or high level income countries will they be able to afford better services. So the focus should be on business and hence employment growth to enable this higher income.
Which is why the government doesn't pay out $142 to everyone.
The government can use that money in a way that multiplies it's effects on the economy.
They could be building roads, schools, and provide education and healthcare to everyone.
Instead, it is spent on 30 ministries, political positions, boondoggle projects. Minister's emoluments where $300 million in 2004, but the government charged parents for their children's education.
It is not a matter of there being too little money, but of priorities, and the political will to turn away from corruption as a way of running the government and political system.
Only when the average Zambian starts generating the same income as mid or high level income countries will they be able to afford better services.
I disagree. There were better services under UNIP simply because it was government policy to provide everyone with education. It was the neoliberal idea to stop that.
Business does not bring money to Zambia. They only bring enough for their operations, after that they take money out of Zambia if they go untaxed and share no profits. Only some of their costs are actually spent in the country.
Trickle Down economics has failed, and it is time for demand side economists to take over.
"I disagree. There were better services under UNIP simply because it was government policy to provide everyone with education. It was the neoliberal idea to stop that."
Better services under UNIP were provided by drawing off revenue from the mines and running the mines down. This is why the mines had to be privatized, because the government did not have money to rehabilitate them. Using revenue from mines for public services was not sustainable, which was why it was stopped.
"Business does not bring money to Zambia. They only bring enough for their operations, after that they take money out of Zambia if they go untaxed and share no profits. Only some of their costs are actually spent in the country."
Business does bring money to Zambia. Just look at China and see how many jobs foreign investment has created there. So the focus should be on attracting even more business to Zambia.
"The government can use that money in a way that multiplies it's effects on the economy. They could be building roads, schools, and provide education and healthcare to everyone."
There is only so much the government can do. By attracting more business to Zambia, incomes can rise and its spending effects can benefit the population.
If you have greater details on that, that would be great.
The mines never had to be privatized. The UNIP government was forced to privatize because the IMF told them to. There was no other reason.
Remember that many profitable parastatals 'had to be' privatized too.
If you look at the net result, they are going to take far more money out of the country than they have brought in to start their operations. Of course some of the money they make is going to be paid as salaries to workers. However, that would just as true if the state owned the mines.
They are not bringing money to Zambia, they are taking money out of Zambia.
We are exporting $4 billion per year at least in copper and cobalt - and 70% of the population live in less than $1,- per day.
That is not because foreign investors are bringing money to Zambia, that is because foreign investors and mine owners are taking $4 billion (or at least $2.4 billion in profits) out of Zambia.
"If you have greater details on that, that would be great. "
"Zambia nationalized the mines in the 1970's, then drew off revenue to subsidize public services while the mines themselves ran down."
Obviously with the mines run down, it was necessary to borrow from IMF/World Bank to keep the mines operating and to subsidize services. The IMF is not in the business of subsidizing mine operations, so that is why it told Zambia to privatize them. By the way, aid from the IMF is not a right, it does not have to lend to a country if it does not want to.
"If you look at the net result, they are going to take far more money out of the country than they have brought in to start their operations. Of course some of the money they make is going to be paid as salaries to workers."
Not really, if the business environment in a country is attractive, there will be a continuous flow of investment (like China for many decades) into the country from other industries besides mining, some may even set up their headquarters in the country (like Haliburton from Texas to Dubai). Dictating to business what they can or cannot do does not work, they will move to places where it is easier to do business.
"We are exporting $4 billion per year at least in copper and cobalt - and 70% of the population live in less than $1,- per day."
Look at Nigeria, not much difference, their business environment is not developed either.
Look at Japan, not many natural resources, but very rich.
Not really, if the business environment in a country is attractive, there will be a continuous flow of investment (like China for many decades) into the country from other industries besides mining, some may even set up their headquarters in the country (like Haliburton from Texas to Dubai).
Really, yes. Billions of dollars have been taken out of the country by the mining companies, and we are seeing the results in delapidated infrastructure. In 2004, the mining industry paid only 6 million in taxes, but they took out at least $2400 million in provits.
And that is just in one year alone. Since then, prices rose even more, as did their profits. And now, it seems the treasure can only collect $200 million in taxes.
So yes, really, they are taking far more money out of the country than they ever put in. Which is why Zambia remains poor, even when copper makes historic record prices.
Obviously with the mines run down, it was necessary to borrow from IMF/World Bank to keep the mines operating and to subsidize services.
Not at all. There was a lot more going on than the fact that the government subsidized services with profits from the mines.
There was a worldwide econmic recession in the 1970s (caused by the Vietnam War and the oil crisis), which didn't lift until the early 1980s. Copper prices were at record lows, which had nothing to do with how the government used mine profits.
Exactly, my point entirely. Nigeria is also not benefiting from their oil wealth. Look at the poverty in the mining region, and yet they are exporting 10% of the world's oil.
This is what happens when the people do not benefit from their resources - they remain poor. Handing profits to the foreign mining companies does only one thing - it makes the foreign mining companies rich.
And no foreign corporations running their economy. They actively discourage foreign ownership in their country.
"Really, yes. Billions of dollars have been taken out of the country by the mining companies, and we are seeing the results in delapidated infrastructure. In 2004, the mining industry paid only 6 million in taxes, but they took out at least $2400 million in provits."
"Not at all. There was a lot more going on than the fact that the government subsidized services with profits from the mines."
Regardless of what else was going on, one should not expect mine operations at rundown mines to be subsidized by the IMF, these mines were the responsibility of the government which had taken controlling stakes in them.
"And no foreign corporations running their economy. They actively discourage foreign ownership in their country."
"Exactly, my point entirely. Nigeria is also not benefiting from their oil wealth. Look at the poverty in the mining region, and yet they are exporting 10% of the world's oil.
This is what happens when the people do not benefit from their resources - they remain poor. Handing profits to the foreign mining companies does only one thing - it makes the foreign mining companies rich. "
It is not the foreign mining companies that is the problem in Nigeria, it is the way the existing wealth is managed there (the competitiveness factor) that is the problem. | 2019-04-19T00:47:49 | http://www.zambian-economist.com/2008/09/election-2008-upnd-policies-health-2.html |
0.999259 | Home camera What Is A Camera Video Capture Card?
What Is A Camera Video Capture Card?
It is no longer mandatory to acquire a complete system of surveillance before you can connect the security of your home and your home to a digital security system. Your computer, two cameras and a video security shot make the trick. But what is this card that does the system?
Your computer becomes a digital video recorder when you connect a camera or video card. There are several varieties of video capture cards for cameras that are used for multiple purposes, recording a TV show, editing video or capturing different cameras.
Images of TV, video or cameras are transferred to the computer's hard drive, which automatically stores the signals or recordings. Your computer immediately becomes the core of a video surveillance system. Translated simply means that with some cameras and a surveillance camera video capture card, the computer takes a different but important role in your home.
The video capture card is connected to the port of your computer with a USB 2.0 cable and once installed, converts video or cameras into digital format that displays as clear or vivid images on the computer screen. The hardware also serves as an internal web server.
Is the graphics card expensive?
The cost of the video capture card security camera is relative to the target and a $ 1,500 or $ 315 card is worth its price. Penny pinching is excluded if you use all your computer for your video security system. Your choice of graphics card depends also on the functionality you need from your security system. Remember that when you get a grounded monitoring system, which means you get a full package, you'll see something from $ 2,000 to $ 25,000, and it's not the camera installation that passes, contain $ 500 to $ 1,000 per camera.
The cost of video capture card safety camera is peanut compared to the first surveillance kit, including monitors and DVR recorder. In the schedule of things, video capture card is not expensive.
Soon, the video capture card is a technology that makes video surveillance accessible without compromising video quality. Because this simple hardware is the type of plug-and-play installation, there is little problem with configuring the system.
The security of your home and business property can be secured with just a small piece of video capture card surveillance camera, a computer and a number of cameras with different functionalities. | 2019-04-20T09:15:16 | http://www.myadran.info/2017/08/what-is-camera-video-capture-card.html |
0.999911 | He is standing on a pencil.
The flower is in the glass.
You can get into the house through this door.
The cat is drinking from a bowl.
Another very common preposition is "to."
There are hundreds of different prepositions and prepositional phrases. To learn them all will take years of practice. The best way to learn them well is by reading books, magazines, and newspapers. Listening to the radio helps as well. You can also learn about prepositions in class from a teacher, but it's important to realize that it requires a lot of practice and memorization. Some common prepositions are listed below in alphabetical order. I'll add more as I think of them.
about: They read about the car accident in the newspaper.
across: We walked across the street to get a slice of pizza.
across from: Across the street from the park is a hospital.
after: Tom and Sue had some ice cream after dinner.
against: She was so tired that she had to lean against the wall.
along: I noticed a lot of garbage along the side of the highway.
at: He needs to be at work in the afternoon.
before: Tom and Sue bought popcorn before the movie.
behind: What's behind the door?
beneath: Get beneath the covers and keep warm tonight.
beside: I put the shovel beside the fence.
between: B comes between A and C.
by: You should try to be here by 10:00.
down: Let's walk down the street and get some gyros.
for: They work for a big company.
from: Ali moved to Minnesota from Somalia.
in: Now he lives in Minnesota.
in back of: John parked his car in back of the store.
in front of: The sign in front of the store told him to park in back.
into: When we walked into the classroom, we met the teacher.
inside: Is there any food inside the refrigerator?
near: Jorge lives near the place where he works, so he walks to work.
of: There are plenty of apples for everybody to have one.
off: She got off the bus at the corner.
on: Look on the table and you'll see the books.
onto: They walked onto the airplane and sat down.
out: A cat fell out the window, but he survived the fall.
outside: The teachers are talking together outside the classroom.
through: Running through a waterfall is refreshing.
to: Did you go to the store yet?
with: Who did you go to movies with?
or....With whom did you go to the movies?
Click here for more examples of prepositions . | 2019-04-22T06:40:09 | https://learnamericanenglishonline.com/Blue%20Level/B11%20Prepositions.html |
0.999992 | When Is The Soonest Hillary Clinton Could Get Enough Delegates For The Nomination?
The Presidential primaries will be coming to a rapid end, with just 14 more state contests left in May and June for the Democratic candidates. So far since their start on Feb. 1 in Iowa, former Sec. Hillary Clinton has solidified a lead against her opponent, Vermont Sen. Bernie Sanders, in terms of the delegates she has won thus far. As the rest of the contests continue, with a few big delegate-heavy states coming up in Indiana, California, and New Jersey, what's the soonest Hillary Clinton could get the nomination if it were up to delegates alone?
Clinton currently leads Sanders by a wide margin — not one that is impossible to close, but she is ahead in her delegate count nonetheless. So far, Clinton has racked up 1,645 pledged delegates and 520 superdelegates, putting her total number at 2,165 total delegates, with still 14 contests left. The remaining states offer a total of 942 pledged delegates for the Democratic contenders, and Clinton needs 738 more pledged delegates to secure the 2,383 needed for a nomination ahead of the July convention. In that case, she could win the nomination as soon as early June, following contests in Indiana, West Virginia, Kentucky, and Oregon in May. June contests include North Dakota, California, Montana, New Jersey, New Mexico, and South Dakota, all on June 7, and Washington, D.C. on June 14.
The month of May alone offers 228 delegates, but Clinton won't win all of them because they are allocated proportionally.
So, how's she doing in all these states?
Indiana is the next Democratic primary, taking place on May 3. The state has 83 delegates at stake for Democratic candidates, and Clinton has a slight lead in the state. In Indiana, Clinton leads Sanders 47 percent to 43 percent. If she were to win, she would take slightly over half of the state's pledged delegates. As early as November 2015, five of the nine superdelegates from Indiana were supporting Clinton.
The West Virginia primary will take place on May 10, and the state holds 29 delegates. There is little polling data on the state — the most recent is from February. But even with this data, Sanders leads Clinton in West Virginia 57 percent to 29 percent.
Kentucky and Oregon both hold their primaries on May 17, offering 55 and 61 delegates respectively. There is very little polling data on Kentucky, but based on a survey from March, the results show Clinton with a narrow lead in the state of 43 percent to 38 percent. Nineteen percent of voters were undecided at the time of that poll. If Clinton wins in Kentucky, she'll also take about half of its delegates.
On the other hand, Oregon has little to no polling data, so it's unclear what candidate might have the upper hand in the state, but there are 61 delegates at stake.
On June 7, six states will head to the polls, including North Dakota, California, Montana, New Jersey, New Mexico, and South Dakota. This could very well be the day — and it likely will be — when Clinton secures enough delegates to win the nomination.
There are a total 694 delegates at stake on June 7, so even if Clinton won only half of the total voter support on this day, she will have secured the nomination. She's already polling ahead of Sanders in California with 49 percent to his 42 percent. In New Jersey, Clinton leads Sanders 51 percent to 42 percent, and in New Mexico, Clinton leads Sanders 47 percent to 33 percent. There is little to no polling data for the other states.
While Clinton is likely to secure enough delegates by the end of the day on June 7, just like every other primary that has passed, we will not know the outcome until the day is here. All projections and predictions have a margin of error, and you never know how the people will vote until the day comes along. Even so, with her establishment support, which you can see from her superdelegate counts, many of this support will likely remain loyal to her at the convention. Sanders could pull a few upsets along the way, however — it wouldn't be the first time. | 2019-04-21T22:03:03 | https://www.bustle.com/articles/157647-when-is-the-soonest-hillary-clinton-could-get-enough-delegates-for-the-nomination |
0.997522 | 221 Page 153, line 40, leave out from "that" to end of line 2 on page 154 and insert "in relation to all the circumstances relating to the offence or to the offender it would be unjust to do so."
221A Page 154, line 33, leave out "21" and insert "18"
221B Page 154, line 35, leave out "21" and insert "18"
221C Page 155, line 41, leave out "16" and insert "18"
221D Page 155, line 41, leave out "16" and insert "14"
(1) Section 50 of the Mental Health Act 1983 (c. 20) (further provisions as to prisoners under sentence) is amended as follows.
(2) In subsection (1), for "the expiration of that person's sentence" there is substituted "his release date".
"(2) A restriction direction in the case of a person serving a sentence of imprisonment shall cease to have effect, if it has not previously done so, on his release date.
(b) any practice of the Secretary of State in relation to the early release under discretionary powers of persons detained in such a prison or other institution.""
(b) if the Parole Board make a direction or recommendation by virtue of which the patient would become entitled to be released (whether unconditionally or on licence) from any prison or other institution in which he might have been detained if he had not been removed to hospital, the restriction direction or limitation direction shall cease to have effect at the time when he would become entitled to be so released.""
(1) Article 56 of the Mental Health (Northern Ireland) Order 1986 (S.I. 1986/595 (N.I. 4)) (further provisions as to prisoners under sentence) is amended as follows.
(2) In paragraph (1), for "the expiration of that person's sentence" there is substituted "his release date".
(3) In this Article, references to a person's release date are to the day (if any) on which he would be entitled to be released (whether unconditionally or on licence) from any prison or juvenile justice centre in which he might have been detained if the transfer direction had not been given; and in determining that day any powers that would be exercisable by the Sentence Review Commissioners or the Life Sentence Review Commissioners if he were detained in such a prison or juvenile justice centre shall be disregarded.""
the restriction direction shall cease to have effect at the time at which he would become so entitled.""
(b) in the case where he holds a Community licence (within the meaning of Part 3 of the Road Traffic Act 1988 (c. 52)), his Community licence and its counterpart (if any)."
(b) in relation to a Community licence, has the meaning given by section 99B of that Act."
(b) Part 2 of Schedule 7 to the Criminal Justice Act 2003 (breach of requirement of community order).""
(iii) any of sections 216 to 219 of the Criminal Justice Act 2003.""
227 Page 311, line 21, leave out "subsection 3(c)" and insert "in paragraph (c) of the definition of "conviction" in subsection (5)"
"93A In section 106 (interaction of detention and training orders with sentences of detention in a young offender institution), subsections (2) and (3) are omitted."
(b) a sentence of detention under section 219 of the 2003 Act (extended sentence for certain violent or sexual offences: persons under 18).
(b) if not, either as mentioned in paragraph (a) above or, if the court so orders, at the time when the offender would otherwise be released by virtue of subsection (2), (3), (4) or (5) of section 102.
(b) if not, either as mentioned in paragraph (a) above or, if the court so orders, at the time when the offender would otherwise be released under that Chapter.
(4) Where an order under section 102(5) above is made in the case of a person in respect of whom a sentence of detention is to take effect as mentioned in subsection (2)(b) above, the order is to be expressed as an order that the period of detention attributable to the detention and training order is to end at the time determined under section 102(5)(a) or (b) above.
(5) In determining for the purposes of subsection (3)(b) the time when an offender would otherwise be released under Chapter 6 of Part 12 of the 2003 Act, section 236 of that Act (power of Secretary of State to release prisoners on licence before he is required to do so) is to be disregarded.
(6) Where by virtue of subsection (3)(b) above a detention and training order made in the case of a person who is subject to a sentence of detention under section 219 of the 2003 Act is to take effect at the time when he would otherwise be released under Chapter 6 of Part 12 of that Act, any direction by the Parole Board under subsection (2)(b) of section 237 of that Act in respect of him is to be expressed as a direction that the Board would, but for the detention and training order, have directed his release under that section.
he shall be treated for the purposes of the provisions specified in subsection (8) below as if he were subject only to the sentence of detention.
(c) Chapter 6 of Part 12 of the 2003 Act.
(9) Nothing in subsection (7) above shall require the offender to be released in respect of either the order or the sentence unless and until he is required to be released in respect of each of them.""
"109A The Child Support, Pensions and Social Security Act 2000 is amended as follows.
"110A In section 64 (information provision), in subsection (6)(a), after "community orders" there is inserted "(as defined by section 170 of the Criminal Justice Act 2003)"."
"(d) giving effect to suspended sentence orders (as defined by section 181 of the Criminal Justice Act 2003)."
It shall be the duty of the chief officer of each probation area to establish consultation arrangements with local magistrates' courts committees and local communities, to assist the probation service in the performance of its duties of reducing offending and supervising offenders in the community." | 2019-04-22T18:21:34 | https://publications.parliament.uk/pa/ld200203/ldbills/069/amend/ml069-vie.htm |
0.998825 | http://www.NewsAndOpinion.com | How often do we hear politicians, labor bosses, business leaders and other Americans expressing concern about the nation's children and their children? I generally dismiss such concern as disgusting hypocrisy because their actions don't begin to match their words.
If people really cared about the well-being of future generations, what kind of behavior might we expect? To answer, let's use a simple example that can be made as complex as we want it to be.
Pretend there are two farmers who express concern about future prosperity of their children. How might we test their sincerity? Let's say that as winter arrives, both Farmer A and Farmer B have 50 pounds of corn seed. Farmer A uses 40 out his 50 pounds to make popcorn to consume over the winter, leaving him with 10 pounds of seed for spring planting. Farmer B uses only 10 of his 50 pounds for winter popcorn, leaving him with 40 pounds for spring planting. It's a no-brainer to conclude that Farmer B is more serious about the future; he is more willing to make greater sacrifices of current consumption. He has a much higher saving and investment rate.
The nation's gross domestic product (GDP) stands at $10 trillion. The federal government consumes one-fifth, or $2 trillion, of it. State and local governments consume about $1.5 trillion. Some government spending does benefit future generations, such as those spent for national defense, highway construction and public health. Most government spending is for current consumption. The major items are Social Security ($460 billion) and Medicare ($226 billion). Plus, there's pressure for increased current consumption in the form of a massive prescription drug program for senior citizens.
What's the impact of government spending on future generations? More government spending means higher taxes. In turn, higher taxes means less money left in the private sector to be used in many ways, including investment. Less investment means that we bequeath fewer resources to future generations. As a result, future generations will have less wealth.
It's easy for people to feign concern for future generations and at the same time rip them off. Why? Future generations have no representation in Congress, and today's young people who'll face the 2030s Social Security disaster have very little. It's a matter of political expediency.
Imagine the fate of a congressman who says, out of concern for future generations, "I refuse to vote for a massive prescription drug handout for senior citizens." He'll get no support from the beneficiaries of his actions because future generations don't vote and young people don't vote very much. Selfish senior citizens, who vote in large numbers, will trounce him. Plus, what congressman or senior citizen has a stake in what's going to happen in 2030 or 2050? They'll all be dead.
I'm one of today's senior citizens, and what I can't figure out is where the notion came from that just because one is 65 years old one is entitled to use the coercive powers of government to live at the expense of younger people. It surely wasn't a value instilled by our parents.
You say, "Williams, today's seniors are part of the great generation that won World War II, and we owe them something." Yes, they did save the nation from the evil forces of Nazism, but the nation's history is one of great generations since 1776. If anything, today's seniors might be called the nation's most morally corrupt generation, for they have made the greatest contribution toward undermining the founding principles of our nation as expressed in the Declaration of Independence, the Constitution and its Bill of Rights. | 2019-04-22T02:07:26 | http://www.jewishworldreview.com/cols/williams051502.asp |
0.999948 | The language was bellicose, the atmosphere hostile. The statements, sometimes hypocritical.
With less than 24 hours’ public notice, US Rep. David Rouzer convened a “National Agriculture Leaders Roundtable” at the state fairgrounds on Friday morning. To a room packed with contract swine growers, representatives from the USDA, farming interest groups and state elected officials — including several from out-of-state — blamed Smithfield’s continued legal defeats on the media, environmentalists, lawyers and “biased” US District Court Judge Earl Britt.
The National Pork Producers Council, Prestage Farms and the NC Farm Bureau are also major contributors to Rouzer.
It is true that the contract growers will be hurt as Smithfield Foods continues to lose nuisance lawsuits filed against it. But the world’s largest pork producer is not being forced to pull its pigs from these farms; it is choosing to, rather than address the nuisance caused by the open-pit waste lagoons and sprayfield systems.
However, throughout the 90-minute venting session, roundtable participants lodged several allegations that were either not true or lacked context. Policy Watch factchecked the statements and is reporting their veracity here.
Needs context: There is a gag order, but it does not apply to every hog farmer in North Carolina.
In early July, US District Court Senior Judge Early Britt issued a gag order prohibiting people associated with cases — plaintiffs’ and defense attorneys, potential witnesses, and court personnel — from speaking with the media about any information that is not part of the public record. The intent, Britt said in his order, was to avoid tainting future jury pools with “extrajudicial” information.
Misleading: Presumably trial lawyers do live in nice homes, and Michael Kaeske did own a mansion in Dallas, according Dallas magazine. However, Smithfield executives are paid even more handsomely.
According to Securities and Exchange filings and company reports, Wan Long, the CEO of WH Group, the Chinese company that owns Smithfield, earned $291 million in salary and stock options last year. When C. Larry Pope retired in 2015, his payout was $25 million. He was ranked No. 86 on the Forbes list of wealthiest CEOs. In 2014, he was scheduled to earn a $46 million payout (see page 62) as part of the WH Group’s purchase of the company. Four other top executives were projected to receive a combined $54 million merger-related income.
By comparison, many of Smithfield’s contract growers net less than $50,000 a year.
False: A document from 1985 showed that three Duplin County neighbors did indeed complain about Carter’s expansion of his hog farm. The lagoon, the USDA report read, would be 850 feet from one home, and 1,500 feet from 11 others. One neighbor had planned to sell residential lots on land he owned; the lagoon would be adjacent to the acreage.
The jury in the second trial didn’t see this document because it had not been produced via a public records request. The defense did have the document, though, but did not provide it until after the plaintiffs had rested their case.
False: Laws define what constitutes a nuisance, including whether the activity in question aligns with the community’s character. In the city one dog that barks in the backyard might not constitute a nuisance; 30 dogs could, because that would be out of character for an urban area.
According to the NC Law Review, a “plaintiff must demonstrate that (1) the defendant’s use of the property, under the circumstances, constituted an unreasonable invasion or interference with the plaintiff’s use or enjoyment of his property and (2) the plaintiff suffered substantial harm or injury as a result.
If the plaintiffs have “moved to the nuisance,” as Duvall did when he relocated to Washington, DC, they might not have a case. However, here is where the law is open to interpretation. If existing homeowners live in an agricultural area home to a farm of 60 pasture-raised hogs, and then that farm expands to 7,500 hogs, with open-pit waste lagoons, sprayfields and attendant truck traffic, then those residents could have a case.
Zippy Duvall: Farms will not be a nuisance to our Lord.
National Pork Producers Council: These people have moved to the rural area.
Needs context: Many of the neighbors have lived in the area before the farms arrived. Others have lived there while the farms expanded (see explanation above). Still others returned to family land — property they inherited or they already owned — after the farms had been established. Several witnesses who testified in the third lawsuit said the smell was horrific. However, they had purchased property after the farm, and they were not plaintiffs in the suit.
Rep. Dixon: They’re not interested in improving our system. They would have filed for a perrmanent nuisance, but the didn’t. They filed for a temporary nuisance.
Misleading: There are other reasons to file a lawsuit for temporary nuisance rather than a permanent one. First, the statute of limitations — three years — begins to run upon creation of the nuisance, according to USLegal.org.
Some of these farms have been creating a nuisance for longer than three years, but only now are the cases going to trial.
A nuisance is temporary if it is abated — stopped — and it is permanent if abatement is impracticable or impossible. The plaintiffs have charged that the nuisance — odors, flies and other problems associated with open-pit waste lagoons — can be stopped through advanced technology.
There is a financial incentive for temporary nuisance suits. Permanent nuisances are those caused by a single act and damages are assessed once for all injury, USLegal.org explains. But if a continuing nuisance is alleged, then every continuation of the nuisance allows for a separate claim for damages.
According to the Centers for Disease Control and Prevention, Missouri requires advanced waste-management systems and requires an odor management plan for farms with more than 7,000 hogs. Other states, including Oklahoma and Pennsylvania, require odor management plans for all CAFOs. Texas law requires these farms to have an air quality permit. Minnesota limits the amount of hydrogen sulfide that a farm can emit. North Carolina does not regulate these emissions from CAFOs.
Bill Northey, USDA Undersecretary of Farm Production and Conservation: The threat of lawsuits will turn away young people from farming.
Needs context: According to the Washington Post, The number of farmers age 25 to 34 grew 2.2 percent between 2007 and 2012, according to the 2014 USDA census, and many of them are going into sustainable and organic agriculture. In some states, such as California, Nebraska and South Dakota, the number of beginning farmers has grown by 20 percent or more.
The greater challenge is access to land. The same article reported that between 1992 and 2012, the country lost more than 250,000 midsize and small commercial farms, according to the USDA. During that same period, more than 35,000 very large farms started up, and the large farms already in existence consolidated their acreage.
Needs context: “Cost-effective” is a relative term. The cost to install a lagoon cover is about $250,000; the covers last about 10 years. And it is true that installing a cover changes the entire waste management structure of a farm, including the sludge application rate because of additional nitrogen that can build up.
Converting to a cover would help offset the cost of closing a lagoon, which is roughly $43,000 an acre, according to NC State University. And converting the methane to energy can also offset some of the operational costs.
Successful Farming magazine detailed how Smithfield “save the worst hog farm in America,” in Missouri, through covered lagoons and biogas. The company’s profits have increased and the herds are healthier.
Needs context: In the 1800s, the Republic of Texas waged war on the Comanche, who were there first. After thousands of its members were slaughtered, the tribe surrendered and was relocated to a reservation in Oklahoma.
Inconclusive: There is no mention of hog farming in the Book of Genesis.
These politicians are playing a dangerous game, undermining the integrity of our judicial system and parading their preference for agribusiness over real farmers and ordinary people. These same politicians have turned a deaf ear to the valid concerns and complaints of residents, cut funding for executive branch agencies that had some authority to regulate the industry, and now have the audacity to complain when those residents sought relief from the only branch of civil society that remained open to them? It’s outrageous.
I am completely embarrassed by our “leadership” in NC. They had a chance to create a win-win solution, and so far have failed miserably. They are not representing the people, they are in it for themselves, and do not want to give up the money they get from big pork. These lawsuits, like Trump’s victory in Washington, are exposing NC’s dirty little secrets. These guys finally got some power, and they have no idea what to do with it! I would say they are incompetent, but that only applies to some. Others know exactly what they’re doing…..protecting their money pipeline! | 2019-04-20T00:19:49 | https://pulse.ncpolicywatch.org/2018/08/06/fact-checking-the-allegations-lodged-about-hog-farms-at-the-national-ag-leaders-roundtable/ |
0.99761 | And while on a roll, here's some very excellent info on how to properly punctuate dialogue (that's people talking to each other). As a writing group, we do a LOT of that, so this is really great for review.
Think about it: there's a pretty boggling array of punctuation marks at our disposal -- not just your run-of-the-mill sentence-enders like periods, question marks, and exclamation points, but slashes and dashes and dots of various sorts. I just used six of them in that first sentence, alone. No wonder some writers think of the whole mess as though it were Dorothy's lions and tigers and bears (oh my!).
Like it or not, punctuation is something you have to master. Think of all those odd marks as your guideposts for your readers.
Punctuation in dialog can be particularly intimidating. Now you're constructing sentences in which characters are speaking sentences of their own! Where do all those punctuation marks go?
Mark pointed at the sky. "It's going to rain."
Here there are two separate actions, treated as two separate sentences. So you punctuate them as such, the only difference being that Mark's speech is indicated by being enclosed in quotation marks.
"It's going to rain," Mark said. Mark pointed at the sky and whispered, "It's going to rain."
It's going to rain, shouted Mark.
"It's going to rain," shouted Mark.
Mark pointed at the sky and shouted, "It's going to rain!"
"It's going to rain!" Mark shouted. "What do we do now?" asked Cindy.
Cindy wondered what they would do now.
What do we do now? Cindy wondered.
Note that, in character dialog, whether internal or spoken, the question mark always falls after the actual question, not after the dialog tag at the end of the sentence. That's because you're relaying Cindy's thoughts, complete with the guideposts that will make them clear to the reader, not actually wondering yourself what the characters will do now -- one hopes.
You have noticed by now that all end punctuation falls inside the closing quotation mark, right?
"It's going to rain," said Mark. Incorrect: "It's going to rain", said Mark.
"I don't like Cindy," Mark said. "I told her it was about to rain, but she turned to Biff and asked him, 'What do we do now?' instead of asking me."
Perhaps Mark has more to say about Cindy; maybe he goes on for several paragraphs, complaining about every little thing about her that annoys him. How to punctuate that? Well, he's still speaking, even though he's speaking so much, it needs to be broken into paragraphs. So, you start out with your opening quotation marks to signal to the reader that somebody's speaking. But when you reach the end of the first paragraph in Mark's tirade, you don't end that paragraph with closing quotation marks. By leaving the closing quotes out, you're telling the reader that Mark has more to say; drop your eyes down to the next paragraph, reader, and you'll read what more there is.
"I don't like Cindy," Mark said. "I told her it was about to rain, but she turned to Biff and asked him, 'What do we do now?' instead of asking me.
"Now, if you ask me, Cindy's a bit snooty. She thinks she's too good for me, that I don't know anything except that it's going to rain. Well, let me tell you, I know a lot more than that!
"I know, for instance, that if it had happened in Antarctica, that rain would have been snow!"
"I don't like Cindy," Mark said. "I told her it was about to rain, but she turned to Biff and asked him, 'What do we do now?' instead of asking me. "Now, if you ask me, Cindy's a bit snooty. She thinks she's too good for me, that I don't know anything except that it's going to rain."
"She's not snooty," Biff said. "She asked me because you don't know anything except when it's going to rain."
"Well, let me tell you, I know a lot more than that!" Mark retorted. "I know, for instance, that if it had happened in Antarctica, that rain would have been snow!
"I also know that you and Cindy are having an affair, and -- "
"Oh, shut up," growled Biff.
Just as you break a big project down into smaller parts to make it more manageable, if you break your dialog sentences down into their separate sections, punctuation isn't so scary, after all. | 2019-04-19T18:17:41 | http://dsw.eq4bits.com/forum/entry.php?26-Punctuating-Dialogue |
0.999747 | The receptive partner should not use facial expressions, nods, body language, "vibes," or any other means to express an opinion or evaluation of what the active partner says.
Whenever either partner does not know what to do next, he raises a hand to get help from the coach.
If the active partner finds he does not understand what he is being asked to do or what the purpose of the instruction is, he should raise his hand for help from the coach. The dyad should not continue while there is confusion about what the active partner should do to comply with an instruction.
If the receptive partner cannot remain neutral about what the active partner says, he should raise his hand for help from the coach.
· "Clarify that", or "Clarify the part about <...>."
· "Give me that again."
· "Say that again, louder."
When the active partner feels he needs to, for whatever reason, he can say, "Give me the instruction again." This is done within an existing communication cycle; it doesn’t mean that they are starting a new cycle.
If the receptive partner is certain that he is in no way caught up with the active partner's process and is certain that he can interact with the active partner without contaminating the active partner's process with his own mental material, he may make up an appropriate query to help arrive quickly at an understanding of what the active partner said. He should keep such queries simple and to the point.
Key information about the dyad instructions and compliance.
It is an instruction directed to the active partner, not a question. It’s not, "What is help?"; it is (You) "Tell me what help is." The instruction should be delivered with the expectation of a compliance. The difference between giving an instruction and asking a question is that an instruction is directed toward the individual. A question tends to go directly to the mind, bypassing the individual.
The instruction is something the active partner can do. If he does not understand what to do, or just can’t do it for whatever reason, it is not a valid instruction for him. The active partner must grasp the meaning of the instruction. If not, he will either go silent or respond with something other than what is intended.
The instruction must be clear to the receptive partner as well. Just saying the words will not work, because he will not know if the active partner complied or not, and he will communicate some of his confusion to him. The receptive partner must know exactly what he wants the active partner to do. Don’t begin a dyad until both partners understand the intent of the instruction. Get help from the coach if either loses this conviction.
The instruction is something from the receptive partner, not from a sheet of paper or part of the receptive partner’s memory storage in his brain. It is a live inquiry.
Give the instruction each time as if it were the first time -- fresh. It is not connected with a previous cycle nor does it anticipate a later cycle.
The active partner does the instruction. The receptive partner does none of it.
The active partner’s response should be due to the fact that he has understood what it is you want.
Fixing up what seems to be a non-compliance to the receptive partner takes some tact. The receptive partner says, "Tell me how that complied with the instruction," in a non-blaming way. Don’t change-over until both are satisfied that an understanding occurred. Ask the coach to help if it starts to get complicated.
The active partner is never wrong (i.e., bad), for not complying with the instruction. Just correct the non-understanding and proceed. Get help from the coach if necessary.
The receptive partner should have the active partner continue explaining about his compliance until the receptive partner is sure he, the receptive partner, understands.
If the active partner says, "I said some things, but I don’t know if I complied with the instruction," the receptive partner accepts that, acknowledges, and give the instruction again.
The receptive partner doesn’t have to agree with the active partner’s communication. He just has to understand it. The receptive partner must see that it is a valid response in the active partner’s estimation and can understand how it is an answer for him.
There is no right answer to the instruction. There is only the receptive partner's understanding of how the active partner sees that his response is a compliance and how the active partner sees that it is a compliance.
If the receptive partner has a lot of unconscious confusion or charge in his own mind or emotions in the area that the instruction addresses, he will have more trouble understanding the active partner’s responses. This will slow down the process, but it can still work.
You intend that another duplicate that same thought in his or her consciousness from you.
The other duplicates the thought. He gets that thought, nothing added on and nothing left off.
It may not be possible to get a communication across. It depends on the receiver as well as the sender. One must be able to tolerate not getting a communication across to another.
Wait until the other is ready – it could be forever..
Find a prior communication that, if told to him first, would enable him to get your main message. There may be more than one prior message required. | 2019-04-20T21:23:43 | http://dyad.org/d04perf.htm |
0.928694 | Why should I use hair clippers?
If you take regular trips to your barber for a haircut, or you take your dog to the groomer on a regular basis for the same purpose, then you will probably notice that the costs of doing so and the hassle involved often make you wonder why you bother doing it at all.
After all, why pay to do something that realistically, you could probably do yourself? By simply buying a pair of high-quality hair clippers, you can do just that. There are thousands of different models out there, so it is just a matter of finding the best hair clippers for the job.
What should I look for in a pair of hair clippers?
Before you can go ahead and buy a pair of hair clippers, there are a few things that you should definitely be keeping in mind, in order to make sure that you are going to get the best results. Here are a few tips.
Purpose – The first thing that you are going to need to do is to decide what it is that you want to use your hair clippers For example, if you want to use it on yourself, then there is no point in getting clippers designed for dogs, and vice versa. If you want precision to be able to cut fades or patterns in the hair, then you will need to keep this in mind too.
Cordless? – Again, this is another important factor to consider. Each has its own benefits. For example, a cordless hair clipper gives you a little more freedom. However, there is the downside that the power may not last as long as you need it to. Equally, a corded hair clipper might be more restrictive, but you don’t have to worry about losing power half way through.
Accessories? – You should always take a look at whether or not the hair clippers that you have chosen comes with accessories or not. Any good pair of clippers will come with accessories like blade guards or different heads to get different results. Always take a look at the item description so that you know what you are actually getting for your money.
If you are just looking for something basic in terms of hair clippers that will simply allow you to properly shave your head, then there are plenty of options that you could consider. This actually makes choosing a pair of clippers more difficult.
Different heads for different styles of cut.
Achieve professional results with very little effort on your part.
Offers the option to cut different styles rather than just an all over shave.
More expensive than a lot of other options on the market at the moment.
Can be a bit too powerful if you are not sure what you are doing.
Ultimately, this is a great option if you have a little extra money to spend. You can guarantee great results every time and save yourself the time and hassle of having to go to the barbers regularly.
The fade is one of the most popular hairstyles for men and has been for quite some time. This stylish look is smart and tidy, and suitable for the workplace as well as being fashionable. What you may not know is that you can achieve this look at home with your own hair clippers.
Memory setting so you don’t have to programme it to your desired length every time.
Durable titanium blades so it will last a long time.
Can be used corded or cordless once it has been charged.
Can be a little on the noisy side.
Can be hard to figure out if you are new to hair clippers.
If you want to achieve a precise fade, then this is a great option to consider, especially with all of the different features that it has to offer.
Taking your dog to the groomer on a regular basis can not only be costly, but it can also be a very traumatic experience for your dog too. It is far more likely that they will be more comfortable at home with you taking care of the clipping responsibilities.
The low noise helps your pet to feel more relaxed and at ease whilst they are being clipped.
The long power supply makes it less likely that you will have to start and stop.
Super sharp blades make it perfect for all coat types.
It is quite expensive compared to some of the budget options.
If you are looking for a high-quality pet hair clipper that will not disappoint, then this is definitely a good option to consider.
All of these clippers are great options, no matter what you are looking for. By following the buying guide, you should be able to make sure that you have gotten the best hair clippers for your needs. | 2019-04-22T19:59:54 | http://bestreviews.co.uk/hair-clippers/ |
0.999316 | + * //What do we know?//: Now we have something on spare. We need to know what we need and we don't.\\ We are given the diameter of the coin, the lenght of the arm (the distance from "eye" to the disk)and what we have just calculated.
+ * //What do we have to find out?//: We are asked to find out the diameter of the coin. | 2019-04-23T05:01:08 | https://www.houspain.com/gttp/doku.php?id=solucion_ejercicio_2_ingles&rev=1493032419&do=diff |
0.999999 | With the survey programme covering five regions of the world, it makes sense to generate a synthesis of results in the five to eight countries per region (Asia and the Pacific, Eastern Europe and Central Asia, Latin America and the Caribbean, Middle East and North Africa, and Sub-Saharan Africa). The reports will look for regional patterns in youth labour market transitions and for distinctions in national policy frameworks that might be transferable between countries.
This report presents the results of the School-to-work transition surveys (SWTS) implemented in six countries in the Eastern Europe and Central Asia region – Armenia, Kyrgyzstan, Republic of Moldova, Russian Federation, the former Yugoslav Republic of Macedonia and Ukraine – in 2012 or 2013. The indicators resulting from the surveys and analysed in this report provide a much more detailed picture of the youth in the labour market in a part of the world where unemployment rates are among the highest in the world.
This report presents the results of the School-to-work transition surveys (SWTS) implemented in five countries in the Asia-Pacific region – Bangladesh, Cambodia, Nepal, Samoa and Viet Nam – in 2012 or 2013. The indicators resulting from the surveys and analysed in this report provide a much more detailed picture of the youth in the labour market in a part of the world where labour market information is sparse and sporadic. Results show that unemployment of young people remains a matter of concern, especially among those with higher education, but that issues relating to the quality of work available to young people are of even greater relevance to the design and implementation of policy interventions.
This report presents the results of the School-to-work transition surveys (SWTS) implemented in eight sub-Saharan African countries – Benin, Liberia, Madagascar, Malawi, the United Republic of Tanzania, Togo, Uganda and Zambia – in 2012 or 2013. Results show that unemployment of young people remains a matter of concern, but that issues relating to the quality of work available to young people are of even greater relevance to the design and implementation of policy interventions. | 2019-04-25T10:48:27 | http://www.ilo.org/employment/areas/youth-employment/work-for-youth/publications/regional-reports/lang--en/index.htm |
0.999999 | Could game consoles officially come to China?
Video game consoles (besides Nintendo's DS) have been banned in China since 2000, but that could be about to change, according to a report from China Daily.
The Chinese news site reported on Monday that China's government ministries conducted surveys and held discussions about the possibility of ending the sale and import ban on game consoles, according to an unnamed source in the Ministry of Culture.
The source reportedly said that it won't be easy to do so, though, "since the ban was issued by seven ministries more than a decade ago."
"All parties" will need to approve of lifting the game console ban, the source reportedly said.
China Daily claimed that the video game console ban was originally enacted "because of fears of the potential harm to the physical and mental development of the young."
That definitely sounds like some doublespeak nonsense though, especially considering that online PC gaming, often regarded as highly addictive, is legal and commonplace in the country.
What seems more likely is that the ban was enacted due to souring relations with Japan, the origin of many video games and game consoles.
Either way, China's decade-old ban on video game consoles appears to have been as effective as America's war on drugs, which is to say not very much at all.
According to reports on China Daily, video game consoles are widely available in China, despite being illegal to import or sell.
Of course, piracy is rampant in the current black market atmosphere, so console makers like Microsoft, Sony and Nintendo don't see a lot of revenue from these sales. That may be part of why the three companies have been trying to get the official ban lifted for years.
Sony Computer Entertainment established a branch in China last June that's reportedly for training and R&D purposes, and Microsoft launched the controller-free Xbox 360 and Windows peripheral Kinect in China in October, though Microsoft's Asia-Pacific Research and Development Group chairman Zhang Yaquin reported that it's not used for gaming there.
And according to a November Tech in Asia report, Sony's PlayStation 3 had received an important certification from the Chinese government, further indication that the game console ban might be ending.
TechRadar inquired with representatives for Xbox, PlayStation and Nintendo to find out if they have any plans to begin expanding into China or if they have been involved in any recent discussions.
A Microsoft spokesperson responded, "We are always evaluating how and where to expand Xbox availability to other parts of the world, but have no additional comment at this time."
The other companies have yet to reply. | 2019-04-26T03:20:36 | https://www.techradar.com/sg/news/gaming/could-game-consoles-officially-come-to-china-1127978 |
0.999009 | Mrs. Carolyn Muir rents charming Maine Gull Cottage for her family and finds that it comes with a resident ghost. Captain Gregg takes a shine to the pretty widow and allows them to stay in his house.
Thanks to Cousin Harriet's gossip, Carolyn's parents get the idea that the Captain is a real man that their daughter is seeing and come for a visit wanting to meet him.
Each of those living at Gull Cottage has their own special Christmas dream thanks to the Captain. In Mrs. Muir's dream the Captain and her confess their love to each other and exchange a kiss.
Q: Is Schooner Bay, Maine a real place?
Pretty widow, her twinkling kids and brash housekeeper (and yapping dog, Scruffy) move into haunted Gull Cottage on Schooner's Bay. The ghost (a salty sea captain with a penchant for hard-shelled sentimentality) grudgingly befriends the glowing Mrs. Muir, and also appears to the kids from time to time and landowner Charles Nelson Reilly. Adapted from the book and 1947 movie with Rex Harrison, this TV series suffers from low-budget-itis (the characters rarely venture outdoors, except in the credits sequence, and when they do they're still stuck in the studio). The two children have very little personality between them--especially compared to, say, the "Family Affair" twins--however the low-keyed "sexual" chemistry between the leads (Hope Lange and Edward Mulhare) is certainly warm, carrying the show through some colorless episodes (such as an embarrassing one wherein pop star Nilsson drops in during a storm to play a little guitar! Egads!). The ghostly comings-and-goings of Captain Gregg are very "Bewitched"-like, and the show ultimately suffers from not utilizing its supernatural theme enough (i.e., too much playing 'catch' in the yard), but Lange and Mulhare make it worthwhile. | 2019-04-26T04:04:05 | https://www.imdb.com/title/tt0062565/ |
0.999781 | Am I suitable for CP work?
I'm new here; I stumbled across the forum a few days ago and, after browsing for several days, decided that I wanted to join the community. I am here seeking advice, however, I do hope that in time I will be able to make my own contributions.
I am currently working as a security officer in a retail store in a busy and relatively rough town (quite severe substance abuse/homelessness problem, high shop theft/violence). The store is based inside of a shopping centre, and I work with PCs/PCSOs/street wardens and security from other stores in a bid to prevent crime in the area.
Whilst I have been in the store for a year, it is my first security job, although I have taken to it very well even if I do say so myself. I've received quite a bit of praise for the work I do and am not ashamed to say it; I make several 'arrests' each week, detect and report thefts that happen on my rest days (I'm the only security officer there) and regularly assist other stores. I've been told that I write good statements, communicate clearly over the radio and handle myself well in confrontations.
The problem I have is that the pay is crap. As you guys will know, the SIA licence is so easy to obtain that as long as you can front the initial cost and count from 1-10, you can work retail security. I know some 'officers' who sit on a podium playing with their phones all day and get paid the same as I do and, well, maybe I'm the fool, but I just can't do that. I need to work hard and do a good job. It must be an ego thing; I couldn't stand the feeling of looking weak/lazy/rubbish at the job. It would kill me!
That said, I've been wondering lately whether CP work would be a natural progression for me, or if, realistically, employers would be looking for those with a police/military background or a more extensive security background instead. Add to that, I am a slim guy who is not physically imposing (although I can handle myself and know when to get aggressive), and I'm thinking that I might struggle to find work. I'm fit as a fiddle, extremely hard working and sharp on the communications/investigative side of things but I get the impression that clients may want a guy with a bit more beef as part of their CP team.
Is it advisable for me to gain more experience before I apply for a CP licence, or will I struggle either way to compete with those of a police/military background?
Apologies for being so long-winded, and thanks in advance to any who reply.
Welcome to CPW, I would seriously consider the fact that you will never work within the CP circuit as you have no experience nor do you have someone to recommend you or better still put you on a team or with a principal.
I’m not saying it will be impossible but it isn’t very plausible, sorry to be the bearer of bad news but it is an honest answer.
My advice would be work within the security sector move on to door supervisor or CCTV operations and see how you get on.
Many thanks for your reply. Despite not being what I wanted to hear, I always appreciate a frank answer. I like the idea of progressing within the security industry but it seems ever so difficult. And sadly, any potential I may (or may not) have means very little when all I can prove on paper is that I've nabbed a few druggies for stealing razors!
Welcome to the forum & hope you find it very informative.
The company you are working for now may be the best place to further your career in security.
Or the shopping centre in which you are working, you could possibly look to move over to the centre rather than within one of the stores.
There are many avenues to try so do not despair at this stage of your career.
Nope. I'll arm wrestle you for a fiver, .... if you accept you won't be in my company.
No one needs to know if you can, "handle yourself" I'm sure you're some pup but you lost me on that.
I've posted similar to this before but thought I'd wheel it out again as you seem a sensible chap and no doubt other newbies are on here and reading this.
Almost everyone new aproaches this from their own point of view, without thinking about why the role really exists, what they have to offer the industry or what can make them stand out from the crowd. They post stuff about being new and inexperienced and wanting to make money or have some excitement, then ask if they'll make it.
CP isn't there as a progression path for guys and gals wanting to move up from guarding or bouncing. At all. You may be in one of those roles and have what it takes for CP, but one doesn't feed the other.
It's a very different role to the others, it takes a certain kind of individual and it takes a lot of training and CPD and most don't make it, either because they don't have the contacts to put them forward or because they're just not cut out for the work, they lack a certain-something, they lack the patience, commitment, the natural quirks that'll see them succeed. It's a very mental role, lots of planning and lots of effort to identify and avoid trouble, if you have to rely on being hard and go hands-on to protect the Principal, you've already failed them as you shouldn't have let the threat get that close in the first place.
People hire you to potentially save their life - if you needed life-saving surgery, would you pick someone who did Security work in the Hospital, was good with a knife and fancied having a go, or would you pick a guy who had years of training and experience and could be vouched for by other guys doing the job already?
If you're a Millionaire VIP and could afford to hire the very best to protect the most important things in their life, themselves and their family, is that you?
If you blagged your way on to a job and found as a result of not knowing what you're doing that someone was seriously injured or killed, how would you feel? Unfortunatly lots of selfish guys out there couldn't care less, are you one of them?
Lots of people don't get it, they like to be able to brag down the pub they're a Bodyguard and like how they can pull women and throw their weight about, they lie on their CV to get roles and they bounce around between jobs when they are constantly found out by those who know what they're doing.
The others, the few who make it, and the few who you should aspire to be like, spend years developing themselves, training, learning. They're professionals in the same way a Doctor or a Pilot is, they have something about them you can't teach, and a massive skill set that took years to aquire and they're the sort of person you'd hire if your life depended on it.
Thanks for the informed reply. | 2019-04-24T14:59:34 | https://www.closeprotectionworld.com/forum/threads/am-i-suitable-for-cp-work.98344/ |
0.99997 | Why would a harpsichordist with a burgeoning career playing pre-classical music begin performing on the modern piano? "I've always felt it was important as an artist to keep growing and changing," states Byron Schenkman, a cofounder of Seattle Baroque and chiefly known as a superb performer on the piano's precursors, the harpsichord and fortepiano. "I want to apply historical performance practice to a modern instrument."
Schenkman recently retired from Seattle Baroque to intensify his focus on the piano, which is louder (due to heavier strings and hammers), tonally richer (thanks in part to a taut soundboard and overlapping strings), and much more touch-sensitive (owing to a complex, finely regulated series of levers). So I expected his new disc, Joseph Haydn: Six Sonatas and an Adagio (Centaur) to sound too heavy and leaden, yet Schenkman's touch remains true to Haydn's spirit: feathery, lithe, and delightfully precise. His CD-release recital includes pieces by Haydn, Beethoven, and Bartók.
Another dazzling pianist, Gonzalo Rubalcaba, has temporarily departed from his usual trio/quartet format to embark on a brief solo tour in support of his new release, Solo (Blue Note). With the entire piano at his command, Rubalcaba burnishes a freely eclectic, often ebulliently festive style that draws on swing, gospel, and bop with the sharp corners and occasionally piquant dissonance of Bartók.
Although superficially separated by genre and geography, the Cuban pianist—who now lives near Miami—shares Schenkman's attention to touch. Notes, chords, and rippling, bravura runs blast or purr or shy away into silence, as if to chase and capture a unique dynamic for every note on the keyboard. | 2019-04-18T21:05:48 | https://www.thestranger.com/seattle/the-score/Content?oid=32109 |
0.999979 | Assume that your experiment has a number of independent variables, and every condition in the experiment is defined by its combination of values on each independent variable. Nesting is a standard method of ordering the conditions according to their combination of values of independent variables (or levels of factors, in slightly different (e.g., SPSS) terminology).
This is called "nesting C in B in A", or A is the highest level, B the second level, and C the third. Note the structure of the factor levels. As the condition index increments, factor C loops through its factor levels each time. The level of factor B only increases every time C has gone through a loop. Factor A only increases once factor B has gone through a loop.
Alternatively to the pseudocode representation of nesting, you can draw a tree diagram with A on the top, with two branches for its levels; then factor B's two branches at the ends of each of A's branches; and then factor C's three branches at the end of each of those branches. Reading off the ends of those branches from left to right gives you the condition number.
The point of this is that if you organize (usually within-subject) data in columns, where the m-th column represents the data from condition m according to a specified nesting structure, statistical software such as SPSS can use this information to know what each column represents. | 2019-04-21T16:49:28 | https://www.tegladwin.com/files/howto/nesting.php |
0.999671 | I was working for a company for 3 months. I had had a couple of informal meetings with my immediate supervisor over lunch (nothing was ever documented in writing that I saw) about how they needed me to improve a couple of performance based issues (which were corrected and no longer an issue before my termination).
However, I was still brought into the owner's office by the owner and my immediate supervisor a couple of weeks later, a couple of days before my 100% company-paid health benefits would have kicked in, and was told that they knew that I was unhappy at the company and that I had the choice to either resign or be let go. I told them that I was not unhappy and had never said that I was, had just been frustrated with how things had been handled regarding certain situations within the company, but had also not made that widely known. That is when the owner told me that if I did not resign, he would say that I was discharged for misconduct and using the internet excessively. I told him that the only times that I had used the internet that I could recall were during my hour lunch break (which was allowed and which my supervisor knew that I was doing), that there may have been a couple of times during the work day when I had sent a personal email, but nothing that had been excessive.
me what he was referring to as far as times I had accessed email or the internet, so all I have to go by is the time stamps on my sent and received personal email account (I did not use the company email system). I had never been warned about my internet usage, and my immediate manager had been aware that I accessed the internet during my lunch break and emailed through my personal email account. She had even instructed me to look up information for personal use during company time on a couple of occasions. Company policy in the handbook states that you can use the internet for personal use, just that if it gets to be excessive then you will be warned. If you do not correct it once you have been warned, then you may be let go. However, I was never warned.
I have already spoken to the unemployment claims representative about all of this but he did not give me any indication one way or the other what his determination would be. It is my opinion that I should be able to receive unemployment because I thought that use of the internet for personal use was okay as long as it was not excessive (per instruction and per company policy), and I was not aware that what I was doing was considered "excessive", so therefore it was not willful misconduct. Am I thinking right?
Comments for Can I unemployment if I have been fired for excessive personal use of the email/computer without prior warning?
The hearing was last friday and I am waiting on the decision in the mail.
Then you should let me know how that decision comes down and the reasoning used in the hearing decision because you would know better than I, your impression about what the hearing officer might find.
I think, even if you didn't sign a social network policy .. it comes down to common sense and what the comment actually was, and whether any similar "reasonable person" (the standard) would of, could of reasonably been expected to know making the comment, whether on a social network .. or not, would/could of caused harm to the employer's business interest.
I was fired for inappropriate comments made on a social networking site that I often went to during the day for information that was related to my job.
Since you already lost the hearing, I'd say none.
Regardless of whether you think you're trying to collect benefits based upon BP wages paid by a different employer, it is the last separation from a job that basically rules over a claim.
The one thing you failed to mention in your "argument" for benefits is what the "inappropriate" comments made on a social network .. where you went to do a part of your job apparently, happened to be.
The employer, and the hearing officer must of thought that whatever they were, any reasonable person would of known they had the potential for causing harm to your employers interest.
Was the social network policy included in the employee handbook? Did you sign an acknowledgement form to prove receipt of said handbook?
And what do you think, was your comment so egregious that if you had a business and one of your employees made it in public .. would you be upset?
Inappropriate, is a strong word and you left us all clueless as to make our own determination about your comments in relationship to that word.
Slam dunk appeals are the rarity. Chances are what most people have .. when they represent themselves effectively .. which includes knowing how to cross examine an employer witness.
I was put on administrative leave without pay for illegal use, misuse of city computers and electronic equipment. All I was doing was looking at various home page news links (i.e. yahoo, msn, bing), job websites for my brother, and sports scores....nothing crazy. I was asked how long was I looking online for and sometimes I would leave the browser open and sometimes would close out the browser so it depends on how much usage I was actually using. Also, I was shown browsing of the internet by my coworkers and seen them do the same. Now I am being put on admin leave and they aren't even being investigated. What should I do??? I need to be paid but don't want loose my job either. I was honest with them during the preliminary investigation and told them that I did use the computer but only for those websites stated earlier. I read the employee regulations and it said that violation of the computers will result in an employee to disciplinary action up to and including termination of employment. Will I be able to recieve unemployment??? If terminated, can I still use them as a past employer???
Guess what would have been more useful in addition to a rundown of what you might have been doing to violate the employer's Internet/computer use policy ..
THE EMPLOYER'S INTERNET/COMPUTER USE POLICY.
As far as being shown that co-workers were also misusing the employer's internet/computers in violation of the policy and that you were unfairly singled out for a "not uniform enforcement of the policy" ..
How will you prove that? Any co-worker's willing to be your witness and admit to their blatant misuse?
You most likely do have good cause to be stressed.
And I'm no resume expert, but depending on how long you worked for them .. I would think a blank spot on your resume would be useless.
If it were me .. I would hire a professional resume service to "minimize" the damage ..
Personally, I cannot write an effective resume for myself .. although I wouldn't find it that hard to do for others.
For myself there's just too much tooting of your own horn that goes on in a resume and I think it's a hard line to walk between bragging and arrogance and confidence and matter of fact presentation of your goals and accomplishments.
In other words .. it's an ego issue.
Me being a funny guy with a great sense of humor and a thick skin, have sent jokes and very innocent pics located on a google search to various people at work from a work computer. They were only intended for the people I sent them to and they in turn found them as funny as I did. Company then used it against me to terminate my employment.
They were sent and received by those they were intended for and no more.
Should I have been terminated or given a warning for this particular incident?
It depends entirely on what the employer's policy states. Use of company internet/email is at the discretion of the employer.
What an employer wouldn't want to do though is not "uniformly enforce" the policy in all instances regardless of who might have broken the rule that everyone was made aware of when they received the employee handbook.
What I'm trying to say is .. since you were fired the most important piece of missing information is the actual rule used to terminate your employment.
I was fired for computer use at work with no prior warning that I could get fired. I signed a paper in my work policy booklet that stated not to go on the internet during work times but it didn't state anything about getting fired for using the computer at work. I was spoken to on June 2nd and advised that they caught me on the computer at times that I shouldn't be and I had signed a form on May 26th stating I knew not to go on the computer. Well on May 28th, I did look at various websites throughout the day and my boss went back and researched what sites I had looked at and printed them out for me to look at and then let me go. Do I stand a chance of getting unemployment based on not being warned that if I did use the internet at work that I could ge fired?
I think if you signed an acknowledgment of receipt of the rule, it should have mentioned the consequence as well. It would be nice to know what state you're in .. some states are bigger sticklers for the details.
What I'd like to see from an employer .. to prove misconduct is something in that policy you signed, that let's the employee know that they were also made aware that a one time violation of the policy would be cause for termination.
Unemployment hearing officers like to know that the employer made an employee "aware a violation of a policy would jeopardize their job".
Since you said the policy you signed for did not mention any consequence, it is reasonable that you would assume it fell under the "progressive discipline policy".
At least .. that's what I think.
Okay, I finally found out what the determination said. It said that I was discharged for violating a known company internet and email policy. That it was a reasonable and well known policy and was thus misconduct. It did not say anything about excessive computer use, just that I violated a company policy. It does not spell out exactly what the policy was, so I am still not sure what "policy" my former employer sent to them.
So for my appeal letter, I should just write that I received my unfavorable determination for the claim that I filed on April 8th and would like to request an appeal hearing. I was not fired for misconduct because company policy stated that personal use of the internet and email systems was permitted. I was never warned or told otherwise.
Think that's sufficient to start? And then in the hearing I can bring up the names and dates of people who told me it was okay, who knew about it, when my manager knew about the different incidents and did not warn me, the other people who accessed company internet and were not disciplined or let go, the company policy, etc?
Your strategy sounds sound, but I feel the need to again say something about the difference between an unemployment appeal letter and an unemployment appeal hearing.
It is of course wise to first check out what a state says the appeal letter must contain, but it does not require you to reveal every detail about the information you will present for the hearing either through testimony, or documentation. You can and should submit documentation as per the instructions on the hearing notice.
An overly detailed appeal letter allows the other side to develop strategies including gathering up the correct witnesses to rebut information you present.
Claimants win when the employer isn't well prepared. An employer or their rep scour your appeal letter for weaknesses in your case. Revealing all details in an appeal letter is sort of like laying your poker hand face up on the table. It helps your opponent determine how they will bet.
So obviously, the statement above wouldn't hold true if when you have irrefutable information to present. If this is the case and you are CERTAIN the state will have no choice, but to find in your favor .. this technique may serve the purpose of actually disuading the other side from even showing up to the hearing .. which could be a good thing.
When a claimant acts as their own legal representative at an unemployment hearing and make no mistake .. you are .. they need to somewhat detach them self from the situation in order to represent them self well. They need to understand what it is they must prove.
LR, I think you have grasped this concept very well and will do well. You may even understand what I'm trying to say here, but I write my answers with the idea that someone not wanting to "ask" a question may get value from it.
When I was hired, I was given a salary lower than expected and was compensated for it by being told that once my 90 day probationary period was over, I would receive 100% company paid health benefits. My discharge came 4 days before my benefits would have come into effect, and at the time of my discharge I had not received any kind of enrollment paperwork, which leads me to believe that all of this was "planned."
Three weeks before my discharge is when my manager took me to lunch and had the talk with me about adjusting how I performed one of my duties. I complied and have proof of this. At the end of the next week, the owner of the company asked me to come into his office and said that he had received a complaint about me from one of the consultants. He asked the consultant to come into the office, and the consultant then said that the only issue he had with me was that I did not remember all of the names of the people at the companies he worked for. Again...not misconduct. However the owner still said that he had to decide whether or not to keep me employed.
The owner then went out of town for a week, coming back the following Monday, and then on that Tuesday I was called into the office around 4:00pm and the discharge in my original post took place.
1) Names of people who used the internet but were not disciplined.
5) Policy that says personal internet usage is okay.
I figure that I have good standing for an appeal because the only internet usage policy I knew of stated that it was allowed, other employees were not disciplined or terminated for their internet usage, there were no clear outlines for internet usage so I did not know that I was stepping out of my boundaries, it did not affect my work, I was not warned about it even though my immediate supervisor had been aware of it for my entire employment, and obviously the employer's disciplinary actions were not uniform company-wide.
I'm thinking on the right track, correct?
I have one word for you, Credibility.
This is what you need to understand about your situation.
You were fired, therefore, at the hearing it is the employer that will have to "sustain the burden" that you were discharged for misconduct .. according to their policies.
If the rule says that you could use company computers for personal use, but that if it became excessive you should be warned .. so you would know your job was in jeopardy if the problem was not corrected. I think you will be okay.
1. Focus on the lack of warning and the policy.
2. Beware that an employer can use computer logs to show excessive use, at least that's what I'd like to see ... how else do they prove something like that .. especially if they have a rule that allows personal use.
3. That conversation you had where you were given the option of quitting and then when you didn't opt for it they said what they intended to do. This is where the credibility comes in. You've never really mentioned what was "frustrating", but this conversation might make the employer's action ring of a retaliatory measure for other issues going on.
I received the determination (finally!) and it was not favorable for me. Evidently the claims adjudicator did not listen to me when I told him about the company policy that okay'd computer usage for personal use. It seems as if he did not listen to what I said at all in the phone interview. Appeal time! I spoke with another claims adjudicator who reviewed the file after the determination was made, and he said that with the information that they had, he probably would have made the same determination (the original claims adjudicator did not document everything that I said during our interview). However, he said that I stood a good chance of turning it around in the appeals process if I was able to convey my information to the referee correctly...showing the company policy that shows that it is okay to use the company internet for personal use and that my manager knew all along that I was and never wrote me up. I just have to figure out how to make it unquestionable that this was not an issue of misconduct. | 2019-04-20T09:17:34 | https://www.unemployment-tips.com/can-i-unemployment-if-i-have-been-fired-for-excessive-personal-use-of-the-emailcomputer-without-prior-warning.html |
0.999251 | Cape Town – You might know them as Acoustic Element, but cousins Callen Petersen and Jody Abel now call themselves ALT EGO.
Wanting to explore a different side to Acoustic Element, they stayed true to the acoustic feel of their instruments whilst exploring the alter ego of their own brand. The result: ALT EGO - a brand new, electrifying dance act, where violin and guitar fuses with electric synths and house beats.
Having dropped their self-titled debut album in June, we chat to the duo about their name change and their new sound.
You guys were Acoustic Element and now you have released a new album under the name ALT EGO - tell us about the change in name and how the new sound differs from the old sound?
Well, Acoustic Element was very much focused on instrumental covers of popular and trending songs. Our ALT EGO sound incorporates concepts from classical songs of old, fuses them with dance music. We still use our acoustic instruments, but we've added some piano, bass guitar and cool electric synths too.
Can you describe your album sound in one sentence?
A combination of house, dance, classical and gypsy music that will take you on a musical journey.
What inspired the album and what do you guys write about?
We were inspired by various experiences, our debut single off the album - Get Wild - speaks to an experience we had in South-East Asia whilst partying in a jungle. We kept the theme of jungle and gypsy going throughout and we really just wanted to get people dancing.
We generally don't write the lyrics, although Callen wrote the lyrics to The Great Pretended and Interstellar. We work on the musical score and those influences were drawn from the various phases we were in whilst recording the album over the 2 years. Generally, some themes involve living in the moment, love, romance and random experiences.
Was there a song on the album that you disagreed about?
Interstellar! But just because we had two different versions where the drops were different.
Embrasse Moi - the studio experience of creating this song was amazing, it features violin, piano, guitar and beatboxing. The concept is really cool - a friend of ours got into the booth and inspiration led him to answering a few questions we asked him. This ended in what is now the rhythmic short worded somewhat nonsensical lyrics to a song! We also used the theme from the beautiful classical piece Adagio in G by Tomaso Albinoni. Interesting fact, the classical theme continues in the outro track of the album, The End.
Something people might not pick up when meeting us or reading about us is that, yes, we are very good boys who play classical instruments and go for runs in the morning, but we party hard, and love going to every underground jol that we are available to. We love techno music - anything with a dirty drop and killer bass!
Holiday! We're off to Amsterdam & Croatia, we're heading to Ultra Europe to go see some of our favourite DJ's live. Then, we have a gig at a very cool club in Sweden called Café Opera. We'll be back at our residency gig at One & Only Hotel's Vista Bar from the last week in July.
For more info visit ALT EGO’s official website, like their Facebook page or follow them on Twitter and Instagram. | 2019-04-22T15:06:53 | https://www.channel24.co.za/Music/News/we-had-a-quickie-with-alt-ego-about-their-new-album-and-sound-20170703 |
0.999429 | Dear Tony: Our strata corporation had a vote at a special general meeting to approve a $100,000 levy to redecorate our two lobbies.
Our strata is two buildings and 167 units in total. When the vote was taken, the chairman declared that the vote had passed and the meeting was terminated. Several owners asked for a secret ballot and requested an exact count, but the chairman refused to permit the secret ballot or take an exact count. Many owners are now challenging the details of the meeting and want to know if we can have this vote again. We barely made a quorum, with 61 units present, and have been advised that we can petition for a meeting to vote on this again. Could you please explain the procedures?
Dear Dave: If a strata corporation passes a three-quarter-vote resolution where less than 50 per cent of the owners vote in favour of the resolution, people who hold at least 25 per cent of the votes may, by written demand, require the strata to hold another general meeting within four weeks and re-vote on the resolution.
In your strata, there are 167 units and, even without an exact count of the votes, with only 61 units present, it is obvious that less than 50 per cent of the owners voted in favour of the resolution, opening the door for a reconsideration.
Twenty-five per cent, or 42 of your owners, could sign to demand another meeting to vote again. Under a reconsideration of a three-quarter vote, the demand must be made within one week of the first meeting, so it is important to have an exact count reported at the meeting or at least a report of the quorum present to calculate the requirements. This is not a vote to defeat the previous vote, it is a new vote and if it does not get three-quarters in favour it is defeated.
If the one-week period has passed, another option is to petition, by 20 per cent of the strata votes, for a special general meeting and have a three-quarter-vote resolution to defeat the previous resolution.
This is not a reconsideration of the vote. However, the strata corporation may, by three-quarter vote, consider cancelling the previous resolution.
Whether an exact count or secret ballot is required, if requested by an owner, is determined in the bylaws of each strata. The Standard Bylaws require a secret ballot if only one eligible voter requests a secret ballot. If an exact count is requested, the count must be announced by the chair and recorded in the minutes of the meeting.
Unfortunately, there are many strata corporations that have removed these provisions when they adopted new bylaw amendments, which may have left the control of the meeting entirely in the hands of the chairperson. To verify what bylaws apply, print the filed bylaws in the Land Title Registry and compare which are in effect, which have been repealed and whether any of the Standard Bylaws have been repealed or amended.
Dave’s strata has retained the Standard Bylaw 27, which requires a secret ballot and exact count if requested. With the Civil Resolution Tribunal on the horizon, strata corporations are going to experience much more scrutiny over their compliance with the Act, regulations and bylaws. | 2019-04-19T07:08:18 | https://www.timescolonist.com/homes/condo-smarts-residents-challenge-vote-on-lobbies-redecoration-1.2034695 |
0.99656 | Summary: As an early step in exploring development of a formal graduate program in nutrition, the Medical College of Wisconsin (MCW) and the University of Wisconsin-Milwaukee (UWM) are sponsoring a CME-CEU program on November 10 which will compare data on nutritional and other interventions for two significant health problems: coronary artery disease and childhood obesity. The November 10 program distinguishes itself, as a conventional medical school-sponsored program, for its multi-disciplinary faculty and its willingness to ask the $64-billion dollar+ question: How do natural and integrated treatments stack up, clinically and financially, compared to conventional approaches alone?
and Costs of Nutrition and Other Therapies.
Nutritional interventions are a special focus, according to conference coordinator, Joseph Weitzer, PhD, a clinical associate professor at the UWM. Says Weitzer: "This conference was initiated as a first step toward addressing the on-going needs of health care providers to better understand the role of nutrition and other therapies in the treatment of disease." In fact, the meeting is a fact-finding event in a broader exploration toward development of a formal, graduate training program in nutrition.
Nutrition is not the only natural approach which will be assessed. Data on exercise and lifestyle interventions with be presented, together with information on conventional approaches such as surgical and pharmacotherapeutics. The multi-disciplinary faculty includes MDs, NDs, PhDs, RNs an MPH and an MD-ND. Says Weitzer: "Speakers are likely to address information about other therapies as well."
Weitzer notes that one source of interest in this CME/CEU offering and the broader exploration development of a graduate nutrition program, was in faculty discussions around public health topics for Wisconsin's population. States Weitzer: "Immediate opportunities became apparent in the area of nutrition." He adds: "We're so ripe for an approach that considers the role of nutrition in hte prevention and treatment of disease."
Weitzer is aware of challenges in adding nutrition to already tight medical school curricula. Yet "allopathic medicine doesn't typically address the culminating, contributing factors to a person's state of disease." He sees the physician playing a critical role in insuring patient involvement in changing behavior: "If we know that the physician is a key element - is who patients seek out for information about their health - then physicians need to be able to provide appropriate education. As they acknowledge their role as educators, the healthcare they offer will continue to evolve."
This conference is viewed as a first step toward addressing what the team views as "the on-going needs of health care providers to better understand the role of nutrition and other therapies in the treatment of disease." Target audience includes MDs, DCs, nurses, nutritionist and physicians assistants.
Asked about distinctions between content on food and on supplementations, Weitzer states: "Supplements will certainly be discussed. It's hard to look at changing diets without focusing on where there are deficiencies and where you'll get your vitamins, minerals and nutrients." He reflects: "This is really a subject of an entire conference."
Randall Lambrecht, PhD, dean of the UWM college of health sciences, kicks off the this inaugural event for this Consortium of Academic Health Centers for Integrative Medicine member institution.
Joseph Pizzorno, ND, founder of Salugenecists and a pioneering researcher on the scientific evidence for nutritional interventions.
A sequence on hyperlipidemia includes two medical doctors, Anthony Pagedas, MD and William Gaertner, MD, and a naturopathic physician, Ryan Bradley, ND, on pharmacotherapeutics, exercise and nutrition, respectively.
A multi-disciplinary group including nurses, medical doctors, public health and an ND will explore the childhood obesity theme. Charged with knitting the program together, and in-laying information on cost, is a medical doctor/naturopathic physician, Marcus Miller, MD, ND, a faculty member at National College of Natural Medicine. The final session is a forum Weitzer will lead on the importance of an ongoing, nutrition-oriented initiative at MCW/UWM.
Comment: My recollection is that one of the earliest reports bemoaning the lack of nutrition education of medical doctors came on the heels of the Flexner Report, nearly 100 years ago. Wrong on nutrition from the starting gate.
A similar report comes along every decade. Yet medical educators fail to budge, refuse to prioritize these non-patentable interventions, and chronic disease continues to increase.
This century-old pattern of dismal failure suggests that what we need, in the interest of the public health, is to gather the 126 deans of medical schools in a room and lock them there until they make space in their curricula.
On a deeply personal note: I hold the lack of nutrition training in medical schools accountable for the gawd-awful food choices I had in my recent hospital experience. Had medical doctors learned even the least of the Hippocratic teachings on nutrition, I cannot believe that the deplorable fare which still typifies today's hospital food would be allowed.
i credit MCW and UWM for taking on this challenge and wish them perseverance with their vision and mission. As the I Ching will tell us from time to time, it furthers one to cross the great water.
Disclosure note: As noted, I had the opportunity (and pleasure) to be involved with some of the brainstorming involved with this meeting. | 2019-04-23T10:34:21 | http://theintegratorblog.com/index.php?option=com_content&task=view&id=167&Itemid=189 |
0.999427 | from a script) 64-bit snap-ins Console Taskpads View Extensions Multilanguage User Interface help files MMC 3.0, shipped with Windows Server 2003 R2, Windows Server 2003 SP2, Windows Vista, Windows Server 2008 Does it really make sense to create custom consoles when all of these are already available? Yes No Useful referencesHow to get Kaspersky Security Center 10 trace files Back to "Troubleshooting" Kaspersky Security Center 10 Status: SupportedDatabase UpdateYesSupportYesError fixYes Latest Lists can be exported in both tab and comma delimited text file formats.
whatever version comes with Win2k3... Allow The User To Customize Views: Allow or deny the user the ability to add windows rooted on items in the console. Password Advanced Search Show Threads Show Posts Advanced Search Go to Page... The Toolbar is directly below the Menu Bar.
The [View] menu contains a [Customize...] option for altering the visible portions of the console. Server 2008 R2 Reply Alan says: April 7, 2012 at 19:25 I have had this same problem and have not been able to defrag for several months. I am not able to run Disk Management or Device Manager, I get the following error: Attachment 169153 If I ignore the error I get this: Attachment 169154 The problem signature Sponsor Latest Solutions Apple Photos: Batch Edit Exif Data inc.
To do this type cmd in search, then right click to run as administrator, then SFC /SCANNOW Read here for more information SFC /SCANNOW Command - System File Checker My System Anytime i try to open certain MMC consoles, i get the standard Microsoft Error "Microsoft Management Console has encountered a problem and needs to close...." and all i can do is Reply Don says: June 24, 2010 at 07:10 Thanks For Your Wonderful Solving Idea.This Help Me To Solve This Problem And It Can Release My Headache Right Now… Reply Don says: Via the file association, simply clicking on a MCCD opens it in the MMC application.
Search Engine Optimization by vBSEO 3.6.0 Home Windows Mac iPhone Downloads Tutorials Proposed Solution - Windows, Mac and iPhone Tutorials, Solutions, Tips, News You are here | Home | Solutions | Reply Lore says: March 20, 2015 at 01:26 Tx, you're a lifesaver. That was a simple process.But, where does someone find such strange and useful voodoo? I found out a long time ago, in windows 7, using such a tool for shell themes kills mmc and few other windows services.
The majority of the consoles are divided vertically into two panes. Thanks. The Absolute Essential Items For A MMC Launch MMC: This creates the basic console which is used for all subsequent operations. Either of these methods opens the console in whatever mode it was saved in previously, which leads into the discussion of modes: what is a mode and what modes are available?
Microsoft Management Console Basics The first thing to understand is that a Microsoft Management Console is a host for an administrative tool called a snap-in. Try booting into safe mode and using a snap-in like windows services or event viewer or any of the other administrative tools. You can get errors if you opened an msc in author mode on a 3.0 PC and then try to open that same msc on a 2.0 PC. The easiest method, and the one that ensures that all available options will be visible, is to use the context menus.
Microsoft is in no way affiliated with, nor offers endorsement of, this site. The Toolbar contains an icon to toggle the tree on and off which is quite useful with some snap-ins to increase the viewable area in the details pane. I've tried uninstalling and re-installing the latest version of the Mouse & Keyboard Center but still have the same problem. Reply Arman says: May 15, 2012 at 20:24 Problem solved in less than a minute.
I logged on as a different user and same issue happened. General Discussion Microsoft Management Console has stopped workingHey Guys, when I try to open the "Event Viewer", I got the following error: Microsoft Management Console has stopped working. A console can also be opened to manage a remote computer by using the command line syntax consolename.msc /computer=computername where consolename is the name of the console and computername is the By default, files which use the .msc extension open with the application Microsoft Management Console (MMC). | 2019-04-22T20:12:54 | http://www.sceneadvisor.com/Missouri/ms-management-console-error.html |
0.998744 | Why did their differences matter so much?
Link Whitman has settled into the role of bachelor without ever intending to. Now he's stuck in a dead-end job and, as the next Whitman wedding fast approaches, he is the last one standing. The pressure from his sisters' efforts to play matchmaker is getting hard to bear as Link pulls extra shifts at work, and helps his parents at the Chicory Inn.
All her life, Shayla Michaels has felt as if she straddled two worlds. Her mother's white family labeled her African American father with names Shayla didn't repeat in polite-well, in any company. Her father's family disapproved as well, though they eventually embraced Shayla as their own. After the death of her mother, and her brother Jerry's incarceration, life has left Shayla's father bitter, her niece, Portia, an orphan, and Shayla responsible for them all. She knows God loves them all, but why couldn't people accept each other for what was on the inside? For their hearts?
Everything changes one icy morning when a child runs into the street and Link nearly hits her with his pickup. Soon he is falling in love with the little girl's aunt, Shayla, the beautiful woman who runs Coffee's On, the bakery in Langhorne. Can Shayla and Link overcome society's view of their differences and find true love? Is there hope of changing the sometimes-ugly world around them into something better for them all?
Deborah Raney's novels have won numerous awards including the RITA, National Readers' Choice Award, HOLT Medallion, the Carol Award, and have three times been Christy Award finalists. She and her husband, Ken Raney have traded small-town life in Kansas-the setting of many of Deb's novels-for life in the city of Wichita.
Home at Last is the fifth and final book in the Chicory Inn series. This series about the Whitman family is fantastic. As much as I loved the final book, I hated to see the series end. I had so much fun binge-reading the series. Yet, I think each book could stand alone. But you'd be missing out on some excellent story telling if you skip any of the books. Of the five, I enjoyed this one the most. Deb created a beautiful story that hit on a scenario which has touched many of our lives. As Link and Shayla explore a possible relationship that puts both families on guard, Deb creates a story of overcoming differences in the face of love. That's one thing I like about Deb's writing, she's not afraid to write about troubling issues. Also, she creates believable characters who are in the midst of the challenges of life. In addition, I enjoyed the romance and the family interaction. As Grant and Audrey Whitman are striking out on a new adventure of their own, they're trying to balance life with their adult children. Deb Raney has great insight into being a parent of grown children. The Chicory Inn books will appeal to readers who relate to the grown kids finding their way in life and romance, and the parents who are learning to live in an empty nest (at least most of the time.) I highly recommend Home at Last as well as the first four books, Home to Hickory Lane, Two Roads Home, Another Way Home, and Close to Home. Five stars! I received this book in exchange for a fair review. | 2019-04-24T08:44:21 | https://www.pennyfrostmcginnis.com/2017/03/fiction-review-home-at-last-by-deborah.html |
0.998613 | Google Chrome's "Articles for You"
Does Marfeel Provide Free Apps?
Before Marfeel premium publishers activate the Marfeel CDN package for blazingly fast speed, they might have a few questions.
1 - What is a CDN?
2 - What are the main benefits of activating the Marfeel Premium CDN Package?
a) Server-side device detection is key. What exactly is it?
b) How can I measure my current speed?
3 - I already have a CDN service hired for my website. Why should I change to the Marfeel Premium CDN Package?
4 - Marfeel provides a Premium CDN Package for free. Why?
5 - By activating the Marfeel Premium CDN Package, are the benefits applied to the mobile site or desktop as well?
6 - Will it have any impact on the design of the website?
7 - I also get HTTPS from my hosting provider. Can Marfeel provide it for me too?
a) I am still under HTTP, is that a problem?
8 - How often will my content be updated if I have the Marfeel Premium CDN Package in place?
9 - How can I check the impact of the Marfeel Premium CDN Package once the activation is concluded?
10 - What do I do if I have a problem?
A CDN, or content delivery network, delivers the content from a publisher's website to users in faster and more efficient because it is based on the user's geographic location.
A CDN is made up of a network of servers all over the world called points of presence or POPs. The CDN that is closest to a user is referred to as the edge server. When a user requests content from a website served through a CDN, they're connected to the edge server closest to them. This ensures that the content they are browsing for is served to them the quickest, giving them the best browsing experience possible.
Websites temporarily store (also known as cache) their content on CDNs so that is can be delivered from an edge server much quicker than if it had to be delivered all the way from an origin server. When a user wants to access content from a website or mobile app that uses a CDN to host their content, that user's requests only has to travel to a nearby POP and back, not all the way back to the origin server.
For example, if a user in Portland, Oregan wants to read a site from London, England, and that site uses Fastly as a CDN, that user gets the content from a POP in Seattle instead of the request having to go all the way to the origin server in England and travelling all the way back to Portland.
CDNs also remove and update (also known as purge) content constantly, so that the most up-to-date content is delivered.
Image from Fastly documentation here.
Publishers will get better SEO because they instantly get faster. Activating the Marfeel CDN Package puts publishers in the top 1% of the fastest sites on the web. Because Google is using speed as an SEO ranking signal, this is a real game changer for any publisher.
Getting this type of instantaneous speed is possible through server-side device detection – a feature that's available because Marfeel has a premium account with Fastly, our CDN provider. Fastly is also the same CDN used by the likes of the New York Times, the Guardian, Pinterest, Buzzfeed, and Twitter.
Publishers enjoy image optimization built on the latest tech to further promote speed and optimal smoothness.
Publishers get world-class DDoS protection.
We saved the best for last. Not only does Marfeel cover the cost of the CDN for mobile, but it also a publisher's desktop traffic.
When a user accesses a website, depending on the device they are using, one version of the site (the desktop version or the mobile version) must be rendered. With the Marfeel Premium CDN Package, devices are detected on the server-side.
This means that the right version to display to the user is executed on the first roundtrip and pushed "down the wire," saving several seconds off loading time and getting Marfeel closer to their goal of 0.7s and avoiding two entire round trips, saving you crucial time before the session starts.
Using Google's free online tool, testmysite.withgoogle.com. With Marfeel's infrastructure changes, publishers' mobile sites now score optimally even when testing on 3G connections.
Server-side device detection is one of the main reasons why the Marfeel CDN Premium Package will make you instantly much faster. Being able to detect what version needs to be served to the user on the server-side automatically unblocks a cascade of benefits driven by the improvement in terms of speed. Being faster positions publishers better SEO-wise and will deliver a better UX.
Also, by getting a site that replies faster, your ad performance will also be impacted positively. The Marfeel Premium CDN Package will also get you a PWA just out of the box, and will allow Marfeel to edit the changes on the ads.txt on the Marfeel side, without you doing it manually.
All this will relax your servers and remember, Marfeel is paying for everything – for both the mobile and desktop traffic, so you will be able to save what you were paying for the CDN you may have had before.
Marfeel's focus has always been publisher-first. Any change applied will be implemented thinking about the benefit for publishers first.
Due to Marfeel's scale, we are able to negotiate optimal deals with premium services for our publishers. The CDN is a very expensive service that most publishers wouldn't probably contract on their own.
The improvements that Marfeel achieves in terms of speed and SEO will have its return in better monetization for the publisher, so the investment that Marfeel makes here pays off.
The changes are applied at the domain level, so it means both mobile and desktop will be under the Marfeel CDN and receive the benefits it delivers.
No, neither on desktop or mobile. The design will remain exactly the same, with the only difference being that the site will be faster.
The SSL is managed by Marfeel with Fastly but the origin site must be prepared to support HTTPS (in order to avoid "mixed content errors").
It's ideal if the publisher has their origin over HTTPS and uses a self-generated certificate.
Being under HTTP is not a problem for activating the CDN, but HTTPS has already become an SEO ranking signal by Google, we Marfeel recommends that publishers migrate to HTTPS as soon as they can.
The migration can be done while the Marfeel Premium CDN Package is active, we would just need to coordinate from our end, so we can adjust what is necessary. We at Marfeel can also assist you with this process.
Marfeel honors the max-age and cache-control that the publisher sets on their end. If you don’t set any, the HTML assets will be updated once every minute, so we ensure your content is always up to date.
For more information, see the Marfeel CDN Package Cache Control Values and The Marfeel CDN Package and Cache Control Headers article.
The online Google tool testmysite.withgoogle.com will reflect the improvements in terms of speed a few minutes after the activation of the Marfeel Premium CDN Package and once the DNS is propagated.
From Marfeel, we will also monitor your performance and see how the numbers in SEO and performance are evolving.
You can always contact the Marfeel Customer Success team at [email protected] so they can assist you on resolving any issue or concern you might have. If your request is critical, you can mark it as urgent. For more information on escalating urgent requests, see the Escalate Support Requests to Urgent article.
The Gartner Cool Vendor Logo is a trademark and service mark of Gartner, Inc., and/or its affiliates, and is used herein with permission. All rights reserved. | 2019-04-25T22:06:51 | https://atenea.marfeel.com/atn/marfeel-press/systems-requirements/marfeel-s-content-delivery-network/marfeel-cdn-package-activation-faq |
0.999999 | One of the main paradoxes1 with regards to defamation law is that defamation only happens when a complaint has been made. No complaint, then no tort. Converging criticisms of an individual by several critics can exist at the same time but only the one complained of by a plaintiff is considered defamatory. Who and how many people read an article can be used to amplify the hurt of a plaintiff. In our case, articles were posted online and are considered newly "published" upon being viewed or "downloaded". Free speech and the right to criticise does not mean critics are free to lie. My criticism of defamation law should not be misinterpreted to mean this. As it has been previously put I go as far to say that defamation law exists to prevent a reputation from being damaged by the truth! In Australian defamation law, the truth remains defamatory even when it is proven to be true. A plaintiff can still prevent the truth from damaging their real reputation which is in reality a lie, though they do not get compensated for the damage done by a defamation that is true.
Defamation occurs when and only when a "victim" sues. Prior to this the law is mute on any "offence".
Defamation defences simply limit punishment regardless of truth if it is determined there was no "excuse" to impart it.
Defamation law is bolstered by punitive underpinnings such that it can through fear or reprisal engender censorship and self-censorship.
Defamation law is routinely misused to extort punitive monetary back-downs by a critic to avoid threats of court sanctioned persecution by a plaintiff with greater resources than a defendant (though sometimes this is the other way around).
By reason of the above defamation law is designed to achieve an outcome through exertion of fear of financially punitive and damaging claims.
Defamation law makes it simple for plaintiffs to utilise it for to achieve a collateral purpose such as prevent something from becoming too well known.
Defamation law allows plaintiffs to pick and chose who they claim to be defamed by.
Another of the paradoxes of defamation law is that it brings out the best human traits in some, but also, exposes the worst of human traits in many. We do have reason to admire many people and they know this. Brave and true to their convictions and values they will stand for us and themselves in part. They exemplify the notion of displaying courage in the face of adversity. Others have run screaming in the other direction or ducked out of view trying to hide in the shadows, but we still see them. Is this reaction the fault of defamation law? Yes and No. Yes because of the above, defamation law is no picnic, and no because people are subject to their own fears and weaknesses as well as wary of threats which are real.
upset her so much she left the gallery crying all the way to the train station initially thinking she'd not exhibit at all.
"…We are all in this together and you are not alone. I think we should all stand up against him, spread the word and not let him carry on with his crazy antics."
Tan made other very strong claims about Cripps and insisted that someone must stop him from doing more harm. One of the claims Tan makes is redacted intentionally in the attached image (Fig 1) to protect us from the punitive aims of defamation law….another of defamation law's paradoxes because…We would be sued and forced to prove what Tan had claimed, not Tan herself! This and the other claims made in her long blog posting, as pictured, was available and online from October 2010 until July 2013 when my co-Defendant, Demetrios first contacted Ms Tan. He politely wished to check with her the details on what had happened during her show as circumstances which though different in detail broadly mirrored our experiences in terms of Cripps' behaviours and that we too had written about them on our websites. But, as he warned her, now we were being sued by Cripps. Tan quickly pulled her page (Fig 2), as we might have expected, but what we didn't expect is that she also refused direct communication with us by not responding at all. The only communication came through her husband/partner who made contact (by phone) to relay she was very scared and got most of the information off our websites, despite the fact her complaints detail Cripps' hindrances of her own show, and that she had left the gallery crying. Tan's husband further attempted to appeal to our sympathy that, after all, she "was just starting out"…the conclusion being that we are expendable.
Significantly Tan's "article" and tweeting had been available from October 2010. Cripps served us with a writ on April Fool's Day 2011. Why did he choose to sue us and not Tan? And, why did he choose to sue us so late? Our "articles" were online from September - November 2009 - updated in my case in April 2010. What are Cripps' motives for suing at all? - see defamation law points above to select the probable answer/s.
Cripps is suing us claiming that his business failed because we wrote about him.
However, we wrote about our experiences with Cripps, others with a similar experience of Cripps also wrote about their experiences (such as Dawn Tan and others). Others still relayed their experiences, which are equally as bad, orally. Artist after artist suffered a bad experience and relayed their experience to others. Cripps destroyed his own reputation because of his own poor behaviour and is suing us in order to profit from being a prick. His use of defamation law is a business decision, one he intends to use to paper over his extremely poor business acumen and conduct.
Other people who have experienced Cripps' antics personally or those who directly witnessed his treatment of us, such as Paul Carter and Cripps' numerous staff and volunteers working at his failed gallery have chosen not to come forward for two main reasons, that I can ascertain.
due to their stronger devotion to self-preservation.
If people fear the law or Cripps' reprisal or threats (I'll sue you if you complain, you'll be sacked, given a bad report, will never get another job in this industry again etc., etc) this is understandable, but fear alone is not the only explanation. Not wishing to be involved in unpleasant matters is one we've heard and is an incredibly weak excuse. Not wishing to be professionally exposed is another weak excuse if one has any respect for the profession or others who engage within it. Those of course who continue to personally support Cripps must see his actions as warranted and necessary or why else would they support him? They must simply agree he has a right to behave as he has with artists like us, declaring us racist and getting away with it, due to the continued silence of those who witnessed it. They must agree with his declaration that our exhibition was racist and that his further actions to prevent us access to the gallery we had hired was warranted. They might instead provide support out loyalty to him as a friend? Or, are their fears born of other associations that compel their silence? Perhaps the silence or compliance is out of a duty born of mutual benefit, to him as a provider of services and an income that will enhance their own professional standing, relationships or performance careers?
Ultimately for them it is a question of one's courage and conviction to one's values. For the Dawn Tan's and Paul Carter's of the world it is clear such conviction collapses where there are concerns for self-preservation. It is their lack of action that illuminates and defines the point. Self preservation is their defining value system. I wish them well, they will likely have more success in this world than I will. I do though hope they have imprinted upon their memory the reality that they lacked courage when it truly counted, and see the visually telling metaphor of them wildly running in the opposite direction whilst someone they could have helped was left dangling over a precipice.
Fig 4 - Demetrios Vakras attempts to contact Jacinta Moore ("BawkBawk") who was a recipient of Cripps' "antics" and who commented on Tan's blog above in (Fig 1). | 2019-04-18T20:24:05 | https://leeanneart.blogspot.com/2013/11/paradoxes-courage-cowardice-and-robert.html |
0.999998 | The percentage relationship between the cost of the investment and its earnings.
For instance, John deposits $100 into a savings account for his son. At the end of the year he is paid $10. His rate of return would be 10%. | 2019-04-26T04:38:59 | http://www.rogueinvestor.com/definitions/rate_of_return.html |
0.995874 | There is a lot of opportunity for foreign and multinational companies who want to expand their sales into the North American market. However, along with the opportunity, sales teams can often face barriers when expanding into foreign markets.
Even when a company has a successful inside sales team, there are several reasons why outsourcing to a team within the US can prove more successful and help get an established foothold in a new territory.
We have successfully represented businesses from several European nations as well as South Korea, Israel, and Brazil. These clients represent both established companies, as well as start-ups looking to gain traction in the US and North America, and they have found that outsourcing to our team of callers is a solid investment.
Why does it work so well to outsource?
1. An experienced outsourced team will have the business acumen needed to understand the industries into which they are calling, including the appropriate titles to contact and how to speak to them professionally. There are nuances between industries and having prior experience means knowing who the decision makers are, and what industry language they use and respond to.
2. If a company is new to the N. American market, there is a story that needs to be told about their business strategy and execution. This requires a real conversation at a peer-to-peer level and is helped when the caller understands the current business climate.
3. Language and culture. Even when members of your sales team speak fluent English, they can still face barriers to business development as non-native speakers. There are nuances in delivery and even regional terms that can lead to miscommunication when speaking about complex solutions to business problems.
As a lead generation company that specializes in complex B2B sales, we have been able to use the collective experience of our team to open doors for multinational companies.
When callers have a deep understanding of the industries our clients want to reach, they are able to quickly establish credibility with the market and generate highly qualified, actionable sales leads.
One client, a consulting firm from India, benefitted from our expertise in contacting the appropriate people and setting the appointments needed to get their consultants in-person meetings. The barrier had been making the right connections over the phone and gaining access to key decision makers.
Once the appointments were made by our own business development executives, the in-person meetings proved successful and the company was able to gain significant traction in the US market.
When engaged by a client from Spain that had seen much success in Europe in the eCommerce space, we were able to apply our extensive knowledge of eCommerce solutions to build their sales with eRetailers within the US. Our understanding of the market in North America meant qualified leads for them in a previously untapped market.
Industry terms, hierarchy within an organization, and common business pains differ from country to country, and sometimes even from region to region. When the business development caller has real industry knowledge, their call is more likely to be received well by the prospect. This means more opportunity to qualify leads and make the connections that lead to next steps.
Breaking into new markets, especially those on new continents is a big investment.
Outsourcing to a sales team that can communicate effectively, and that has a deep knowledge of the market into which you are selling can make the difference between rapid growth and failed efforts.
Now in our seventeenth year, we have many examples of helping multi-national and foreign companies with their business development efforts in N. America and would be happy to discuss your sales pipeline needs and JMS Elite capabilities.
Jim Scaparotti has more than 20 years of experience providing executive leadership for sales, lead generation and outsourced telesales services. Jim specializes in helping B2B enterprises find their next sales opportunities. | 2019-04-26T00:23:08 | https://jmselite.com/outsourcing-business-development/ |
0.999086 | How much is Harold Camping Worth?
Harold Camping Net Worth: Harold Camping was an American Christian radio broadcaster, author, and evangelist who had a net worth of $75 million dollars. Harold Camping was born on July 19, 1921 in Boulder, Colorado. He is perhaps best known among non-evangelical Christians as the man who predicted that Jesus Christ would return to Earth on May 21, 2011, whereupon the saved would be taken up to heaven in the rapture, and that there would follow five months of fire, brimstone, and plagues on Earth, with millions of people dying each day, culminating on October 21, 2011, with the final destruction of the world. He had previously predicted that Judgment Day would occur on or about September 6, 1994. Beginning in 1958, he served as president of Family Radio, a California-based radio station group that broadcasts to more than 150 markets in the United States. In October 2011, he retired from active broadcasting following a stroke, but still maintained a role at Family Radio until his death. His failed predictions of the end of the world temporarily gained him a global following and millions of dollars of donations. Camping died on December 15, 2013, as a result of complications from a fall at his home two weeks earlier. | 2019-04-18T19:06:35 | https://www.celebritynetworth.com/richest-celebrities/harold-camping-net-worth/ |
0.998823 | Is there a way to change the name of the ".bzr" folder by some configuration ?
I am trying to set up a repository on a sharepoint server, but it's not allowing this folder name.
I have found a very old post (2009) from someone asking the same thing but the answer was that it would be a nice feature to be added. I am not sure if this has been added to the current version.
Briefly looking into bzrlib/bzrdir.py, it looks like '.bzr' is hard-coded in many places, so the direct answer is: no, this is not supported.
This will require a significant effort to fix in bzr core, not to mention plugins that probably also make the same assumption.
While bzr attempt to support many protocol on a remote server, I've never hear about someone attempting to implement sharepoint support.
Note that if you want to upload a bzr *tree* (as opposed to host a bzr *branch* or repo), you may have better luck with the lp:bzr-upload plugin (you will still need to use some supported protocol but you won't need a '.bzr' directory on the server). The plugin requires a '.bzr-upload.revid' *file* on the server side though, not sure *that* is allowed by sharepoint.
Thank you for your quick reply. The idea to use Sharepoint is the access across the organization of certain files and put them under the version control (not to use the default one from Sharepoint).
The issue is not related to the protocol, is the limitation of Sharepoint that does not allow folders that start with ".". With a possibility to change the name of ".bzr" folder would allow the creation of the folder even on Sharepoint.
Hopefully a configuration could be added in the future to change this name. | 2019-04-18T22:30:26 | https://answers.launchpad.net/bzr/+question/255737 |
0.999969 | A fisherman has told how his brother-in-law twice saved him from drowning, then died in freezing seas himself after suffering a seizure.
Father-of-three Douglas Hook was forced to leave his friend and business partner in icy water and swim four miles to safety after 11 hours in the sea.
The 38-year-old had launched into a new career fishing for whelks with friend John Askey, 31, when tragedy struck.
On 17 June the men, both from Pembroke Dock, west Wales, were on a maiden voyage in Cardigan Bay in their 12-tonne trawler on their first working day together.
The sea was 'as calm as a mill pond' and they were finishing up for the afternoon. But the vessel began taking on water and Mr Hook, who is married to his friend's sister, found himself waist deep and pinned to a wall.
"I would have drowned if John hadn't leapt in and pulled me out," Mr Hook said today.
The boat rapidly capsized and sank, leaving them clinging to an inflatable life-line in freezing seas, hoping someone had seen what happened.
Both men refused to panic and decided to try to swim for shore, occasionally stopping to hug in a bid to keep warm as night fell.
"We talked about all sorts of stuff. We'd joke about how our families were going to kill us when we got home and how it was pretty good going - sinking our new boat the first time we'd taken it out properly.
"It was freezing and I confessed to John that I didn't think I was going to make it."
He also recalled how his brother-in-law saved him for a second time when he slipped under the waves from deep fatigue. "I'd gone numb and just went under. It felt comfortable, like falling asleep, but he grabbed me and we'd go on.
"At one point I started hallucinating. I swore I could see my wife Louise and our baby Grace waving at me from the beach."
Mr Hook said that as the freezing ordeal continued into the late evening his friend suffered a massive fit.
"He'd gone blue, his mouth was foaming and his eyes rolled back in his head," he said.
"I tried rubbing his chest to warm him up. But he'd gone."
He struggled to swim on for two more hours as he held on to his friend's body but eventually realised he couldn't make it. At that point he tied his friend to their emergency buoy and set him adrift.
"I kissed him on the head, held him and said, 'Sorry mate, this hasn't worked out too well for us has it? I'll see you soon'," he said.
Mr Hook successfully undertook the gruelling four-mile swim to shore alone, finally arriving on a beach at around 2.30am.
He then staggered to a road to get help and was taken to hospital suffering from hypothermia. Doctors there had to shock his heart back to life twice.
Speaking in praise of his friend, whose body has still not been recovered, he said: "He was a great friend, someone who had the sea in his veins.
"If it had fins and scales he'd catch it. I've seen him wrestle conger eels with his bare hands before now.
"I don't know why I'm here and not John. I think the freezing temperatures got to him more." | 2019-04-24T19:01:17 | https://www.dailymail.co.uk/news/article-392622/Survivor-recalls-fatal-maiden-voyage.html |
0.987418 | I stumbled across a drawing or two of Superman that made me take notice the other day. What do I like about these images? What do they remind me of? The modern edge of Chris Samnee, angularity reminiscent of Garcia Lopez, a line as bold as Alex Toth's. Nice.
The artist is Evan (Doc) Shaner, who will be drawing some Superman stories in the near future. I look forward to seeing much more from the gentleman!
Sean Howe (author of Marvel Comics: The Untold Story) has uncovered a 1966 audio tape of Stan Lee speaking at Princeton University. I first enjoyed seeing Mr. Lee on a stage at the first Chicago Comicon in 1976 but, of course, 1966 was a lifetime or two before 1976.
In this recording Jack Kirby gets a couple of nice mentions and there are boos when Stan announces that Steve Ditko is leaving Spider-Man. The audio is challenging in places but your patience will pay dividends. As I write this the youtube clip has just 143 views but I expect that count will rise dramatically in short order. You can add one to that count by going right over here.
Nice job, Mark Dos Santos! The gentleman has tapped into a Norman Rockwell vibe with spectacular results. I'm focusing here on a couple of his Batman-related works, but Mr. Dos Santos (an alumnus of The Joe Kubert School) does just as nice a job with the worlds of Sandman and X-Men and Doctor Who. See for yourself over here on the artist's website.
Marvel Comics is releasing a bunch of their comics with variant covers that show the characters as animals. Enjoy Chris Samnee's Wolverine Kitty in the Danger Room down below, and you can see a dozen or two more drawings in this same vein over at the (?) Wired Magazine website.
You can order a print over here from artist J.K. Woodward.
When Mick told me on the phone that he was growing a beard I didn't know what I'd be seeing, but never in one TRILLION years did I expect Wolverine! Move over Hugh Jackman.
Rich Buckler was drawing comics wall to wall back in the 1970s and I remain very fond of his work. I used to own a number of pages of his excellent artwork and I'll show them to you a different day but, for now, I want to bring you up to date on what the gentleman is doing now that he's not drawing for comics anymore.
He paints! I stumbled upon Mr. Buckler's website when researching a different matter and I knew I had to share what I had found. A couple of the paintings are shown on this page and you can see many more over at www.richbuckler.com.
Back in the 1970s, Keith Giffen drew a string of Kamandi issues after Jack Kirby left the title and some of those issues were inked by Mike Royer. I remember liking that artwork as it was published and I have always wanted to own one of those Giffen/Royer pages.
I decided while writing the preceding paragraphs to look up exactly how many of those 1970s Kamandi issues were drawn by the Giffen/Royer team, and the answer surprised me. One! One issue! Kamandi #44 from August 1976 was the one and only, and just eleven pages were devoted to the Kamandi story because there was a Tales of the Great Disaster backup. This accounts for why I've had such difficulty finding one of those pages, but I will keep looking.
That's the fun of collecting. | 2019-04-23T18:40:46 | http://hayfamzone.blogspot.com/2013/12/ |
0.947866 | Easily the cleanest, safest and most convenient way to provide heat where it's needed is with an electric heater that can be portable and effective in producing a lot of heat quickly. This is perfect in most situations, especially in the home and where safety is a major factor.
However, despite the convenience and ease of use, electrically powered heating devices have drawbacks that take the shine off their appeal in some circumstances. This part of the website is here to take a look at the pros and cons of owning and using heaters powered by electricity while providing information and resources as well as some top product reviews to help you decide if this is the kind of heating device that is right for you and your needs.
Most people like to keep things as uncomplicated as possible in their lives. And when it comes to providing warmth where it's needed at home or in the workplace, simply plugging a device into a wall socket then turning it on and walking away is about as simple as it gets.
There is no messy solid fuel to bother about, no gas canisters to hook up or replace when they are depleted, no naked flame to worry mothers of small children and no potentially dangerous emissions to cause health problems. Electric heaters are very simple to use and most people like it that way.
With no flame produced, there is far less to worry about in terms of potential fires being started by inadvertently knocking over the heater. There is far less danger to children who are naturally curious about fires and have a habit of wanting to poke fingers in to see how hot it really is!
While many portable heaters still utilize a heated coil to produce the heat which can potentially set fire to anything flammable that is placed too close to it, in general these devices are about as safe as can be as long as they are not maltreated.
By not needing to burn a flammable fuel to produce the heat, these are also free of any noxious gases that are naturally produced by burning such fuels. This is a big safety issue for many who like to keep all their windows and doors tightly closed to keep the precious heat inside the room they are occupying.
As already mentioned, with no fuel to have to burn to produce heat, there is no mess with "clean" electricity as the power source, at least not at the point of consumption. More about that further down the page.
For parents of families that have the safety of their children in mind as well as the no-mess appeal of an electrically powered heat source, this can be a big plus side when deciding on what kind to buy.
No one likes getting all messy stacking wooden logs for a wood fire or central furnace any more than anyone like the idea of getting covered in black coal dust every time the fire needs refilling. Even less appealing is the cleanup time when all the burned fuel residue and ash needs to be swept up, bagged up and then disposed of.
Lastly, the convenience angle is often the deciding vote when it comes to which type of heat source to buy. Without any of the mess described above and the simple turn on and turn off usability of these devices, there is little more convenient in this area.
That makes an electrical heater very appealing since there is no fuel refill or cleanup afterward to worry about. Just turn it on when it's needed and turn it off when you're done.
No matter how convenient, clean or safe an appliance may be, there are several problems associated with heaters that are powered by electricity. These fall into the categories of economy, ecology and vulnerability as shall be explained below.
Everybody is well aware that the price of power is constantly and relentlessly rising over time with no sight of it ever being reduced. The gap between the cost of some fuels and electricity is getting wider making this an ever more expensive way to provide warmth during the cold winter months in homes and workplaces.
While modern devices are much more efficient than their predecessors, they are still losing ground to modern, more highly efficient burning wood and coal furnaces as central heating systems. It must come to the point where a decision has to be made whether to go for the convenience and other nice things that make electrical heating so appealing, or to add the economy of running such a solution in the home or business budget and weighing up the costs.
As mentioned above in the paragraphs on cleanness, while electrical devices of all kinds may appear perfectly clean when used in the home or other point of consumption, the source of that power is in most cases most definitely not clean. Here is why that is.
The electricity that supplies homes and businesses in civilized locations must be centrally generated at power stations and fed into the local or national power grid. The most common kind of power station burns fossil fuels such as coal, natural gas or oil to drive the turbines that generate the power.
These fuels emit many poisonous, polluting gases that get into the air and water supply. The waste products are dumped in the soil and further poison the land that is meant to feed and support us.
The next most common form of power generating station runs on nuclear fuel to produce electricity. The polluting waste products of these station do not break down readily and are a long term problem for governments of all western civilized countries.
Much lower down in the power generating percentile are those power stations that produce electricity from renewable sources. In the US, less than tem percent of all electricity is generated by renewable sources with the most common of those being hydro-electric stations. Wind and solar farms are way behind despite them being potentially two of the greatest and cheapest resources that we have.
So next time you plug in your electric heater, spare a thought for the source of the power that makes it work. Out of site does not necessarily have to be out of mind.
Lastly, there is a massive drawback from having a home or workplace derive its sole or major source of winter heat and hot water from electrically powered devices. As is happening with greater frequency in modern times, when the grid power goes down during brown- and black-outs if you do not have a backup source, you're going to get cold fast.
Many businesses have a backup diesel gen-set to provide the electricity they need to keep running, but few homes have this luxury. A backup propane heater or solid fuel fireplace with stored fuel in readiness for these inevitable power outages is a sensible move.
While electricity is still the most commonly used power source for providing heat, hot water and somewhere to cook, it has its vulnerabilities in that individual homeowners cannot control when it is being supplied or when it is taken down. This is probably the most important factor to bear in mind when considering your next purchase of a portable heating source whether it's for additional space heating or as a backup in case your home's central system fails. | 2019-04-23T14:05:57 | https://ventlessheating.com/portable-electric-heaters/ |
0.998823 | 1. First prepare the marinated steak. Put the Worcestershire sauce, lemon juice, horseradish, shallot, freshly ground pepper, salt flakes, celery salt, Tabasco and vodka in a bowl and stir to combine.
2. Pour 3 tablespoons of the Bloody Mary mix over the steak and marinate for at least four hours, or ideally overnight, in the refrigerator, turning from time to time.
3. To roast the vegetables, preheat the oven to 190C/gas 5. Place the carrots in a pan of boiling water and blanch for 2-3 minutes, drain and refresh under cold running water to retain their colour.
4. Place the olive oil in a roasting tin and add the garlic, chilli and thyme. Add the carrots, parsnips, shallots and butternut squash and toss well to combine.
5. Season generously with salt and freshly ground pepper and roast in the oven for 40-45 minutes or until the vegetables are completely tender and lightly caramelised, tossing from time to time to ensure they cook evenly. Keep warm until serving.
6. To cook the sauce, combine the remaining Bloody Mary mix with the tomato juice and tomato puree and pour it into a saucepan over a low heat.
7. Simmer gently for 10 minutes. Whisk together the cornflour and water and stir the cornflour paste into the simmering sauce. Cook for 2 minutes to thicken, then fold in the tomatoes and chives. Keep the sauce warm.
8. Preheat the oven to 220C/gas 7 and heat an oven-proof griddle or frying pan on the hob.
9. Remove the steak from the marinade and pat dry. Brush the steak with the olive oil and sear it in the hot griddle pan or frying pan until brown on both sides.
10. Transfer the steak to the oven and cook in the oven for 15 minutes for medium-rare, or to your liking. Remove the steak from the oven and allow to rest in a warm place.
11. Place the steak on a carving board, cut it away from the bone and slice the meat into 2.5cm thick strips. Place on warm plates and spoon the sauce around the meat slices. Serve with the roasted vegetables. | 2019-04-26T07:58:23 | https://goodfood.uktv.co.uk/recipe/bloody-mary-steak-with-roasted-vegetables/ |
0.999994 | Civic quarters in four anti-communist Asian countries observed the fourth Freedom Day on January 23.?
GV. Looking down on the procession.
Fr.V. Boy Scouts in the procession.
Angle V. The float "MISS LIBERTY" the Symbol of Freedom.
SV.Pan. A float caricaturing the Communists.
SV. People carrying a large picture of CHIANG-KAI-SHEK.
SV. Pan. Masqueraders staging Communists Terrorism and clowns on stilts.
Fr.V. Men masquerading as captured Communists.
SV. Man on stilts holding all the "Communists" on a leash.
Background: Civic quarters in four anti-communist Asian countries observed the fourth Freedom Day on January 23. The day is so called because of the return to freedom of 14,000 ex-chinese prisoners of war from Korea in 1945. It was marked on its fourth anniversary in South Vietnam, South Korea, the Philippines and Free China.
In Free China, 10,000 people joined in a giant parade in Taipei, which was sent off with a peal of 23 tolls of the Freedom Bells at the Taipei City Hall. 300 ex-Prisoners of War from the Korean campaign and 200 mainland refugees were among those in the parade. | 2019-04-23T20:06:43 | https://britishpathe.com/video/VLVA3HF93A5WPRAAW33J148HM5Q5Q-TAIWAN-PARADE/query/parade |
0.99998 | A performance of every word of F Scott Fitzgerald's jazz era classic, Gatz lasts a marathon eight hours (with a break for dinner). How do the actors manage it?
On paper it looks like punishment: an eight-hour stage production (albeit with a dinner break) during which the entirety of a novel (albeit The Great Gatsby) is read aloud and the scene shifts, inexplicably, between a 1980s office setting and the jazz era of the original. I go to see Gatz at a theatre in downtown Manhattan, as you might visit a disagreeable relative: expecting discomfort and boredom, but feeling virtuous for making the effort. As the lights go down, virtue gives way to dread.
The idea for the show came to John Collins 10 or so years ago. He is the founding member of the Elevator Repair Service, an experimental theatre company devoted to making unusual work out of what he calls "non-dramatic source material. To take something from one medium and make it work in our medium." At the time, Collins was thinking about creating a puppet show "by finding random objects and sticking eyes on them". Another member of the company happened to be rereading his favourite novel, The Great Gatsby, and, since Collins likes to use whatever is to hand, they started messing around with ideas. Doing a straightforward adaptation was one notion, but then Collins had a brainwave: why not focus on the very thing that most productions would try to disguise: the medium. "We could try to smooth over it by adapting it into a play. Or we could hit that problem head on and try to stage it as a novel. That was exciting."
I mention all this as further evidence of just how unpromising a proposition Gatz is. Once the idea to present it as a novel was in place, Collins and Scott Shepherd, who plays the lead and is hoarse when I speak to him from yet another marathon performance, started rehearsing in the only space available to them, a roughed-up office above a theatre. Something about the setting made sense. And so, bit by bit, a scenario evolved: of a bored office worker, finding the novel in a filing cabinet and getting slowly, inexorably sucked into it over the course of a single working day. The audience watches in real time as he reads it aloud and various colleagues come over, take the book from him and assume characters in the play, switching back and forth between realities. It is an insane idea. It militates against every commercial principle in the book. It is also, as I discovered when I first saw the show in 2010, heart-stoppingly brilliant.
The trepidation of the audience in the first 20 minutes is something everyone in the company is aware of. Collins thinks it actually plays in their favour. Low expectations make the slow realisation that it isn't going to be awful much more powerful. Somewhere around the first hour, as Shepherd's narration gathers pace, you can feel a collective sigh move through the room, and from there on in it's electrifying. His is an extraordinary performance. Such are the physical and mental demands of the role, that the only way he can approach it, Shepherd says, is like a regular day at work. After all, it is set in an office. He cannot process Gatz as a single entity. It is more like performance art than acting.
"The show is so big you can't keep it all in your mind. When I go out at the beginning, I'm not thinking about the end or even chapter two. It's like not looking down from a high ledge. If I start to think of the hours that are ahead, I get overwhelmed.
The original idea was, let's see what happens if we just start reading a book and don't stop. I hang on to that idea so that I don't feel I'm going out there to present, so much as to have another encounter with this book and try to be as open to new meanings in it as possible."
For the last 10 years, the show has been performed on and off at theatres and festivals around the country, and several generations have moved through the cast. Kate Scelsa is one of the original members, and she has a weird time sitting for long stretches on stage without anything to do. She plays a secretary, who assumes various roles, enlivening the scenes with heavy dialogue. A recent graduate, she was an intern when Collins first conceived of the show and, since she answered the phones in real life, he said why not try it on stage? She is subtly hilarious in her cubicle, but what is she actually doing in there the rest of the time, while the action unfolds around her?
Editing her novel, it turns out. "You have to have a strategy," she says. "For Scott [Shepherd] it's one thing, a crazy endurance test, and I don't know how he does it. The rest of us have to have another project going on that has our attention." You simply can't keep up the adrenaline and treat it like a regular performance, she says. And so, during the off-hours backstage, while one actor practises the piano and another looks after her young baby, Scelsa edits her novel for young adults – the difference being that she can also do this on stage. "I feel like my character would be the person in the office who spends time on her laptop doing something else. You can only see me from the shoulders up in my cubicle; so I'm editing my book." (It's called Fans of the Impossible Life; she is looking for a publisher). After seven years of performing the show, the rhythm is so ingrained that Scelsa never misses a cue.
Shepherd, meanwhile, has Gatsby almost entirely by memory. The rest of the cast sometimes challenge him in a game called Test the Freak, where they read out three words at random and see if he can continue. This was put more scarily to the test on stage, says Shepherd, when the book fell apart in his hands one evening. "We've only used two books for this show. One book became so deformed it was held together with duct tape. We had a superstitious attachment to it – the Book – and finally it turned into a taped-together sheaf of papers. Then we had a new book and that started to fall apart. One day, a chunk of chapters went flying out and slammed against the back wall. Fortunately, it was part of the book I'd already read. When they taped it back in, they taped it one page off. The next day I was reading, turned the page and there was a page missing. I had to rely on memory. And I did it."
The show's commercial success has been "shocking to everyone", says Scelsa. It has toured in Australia, Norway and Singapore. The New York run, at the Public theatre, was sold out. At one point, they tried to split the show in two and run it on concurrent evenings, but "it totally backfired", says Ariana Smart-Truman, the producer. "We realised that it's hard for someone to come back two nights in a row. You have to get your babysitter back, find parking again. So people would see part one and say it's terrific, but I'm not coming back. Part one would be full and part two would be half full."
The impact of the show was also squandered. The extraordinary thing about Gatz is that, by the end, a feeling of common cause has arisen between the audience and the cast. You have been through this experience together; a usually private activity, reading, has been turned into a collective one and it is intensely, surprisingly moving. "This is not an experiment to test an audience to see how much they can take," says Collins. "Durational performances have a special appeal, but that's not what we're doing here. The work you're committing yourself to – The Great Gatsby – is worthy of it. It's only as long as it has to be." What's more, he says, "if you want to make something that's exceptionally successful, there have to be some things that are exceptional about it. It has to take risks."
Even after all this time, when Shepherd reaches the end of another epic performance, he hardly knows how he got there. "I can't contain the whole experience in my head at that moment – but I can feel the impact. We've all been there all day. It's a pretty tremendous feeling." Waves of emotion flow up from the audience, so different from their nerves at the start of the show. "It's not as hard as they think it's going to be. It turns out that literature works." | 2019-04-24T00:08:29 | https://www.theguardian.com/stage/2012/apr/29/gatz-greater-gatsby |
0.998822 | A high-strength Saccharomyces boulardii yeast probiotic (with 5 billion organisms per capsule), blended with 3 active herbals for additional digestive and colon health support - clove bud powder, aged garlic extract and olive leaf extract.
Saccharomyces boulardii is a unique, non-pathogenic and tropical yeast (fungus), which can support health in a number of ways. Most notably, it supports gastrointestinal tract function, whether used alone or in combination with other probiotics, by helping to increase intestinal populations of good bacteria and decreasing numbers of disease-causing organisms by competing for space and food.
Unlike most other probiotics which are bacteria based, Saccharomyces boulardii is a yeast, yet it is still classified as a probiotic supplement because its beneficial organisms are able to survive stomach acid and colonise the intestinal tract.
There, they support the growth of friendly bacteria and a healthy balance of gut microflora, digestive health and a strong immune system. Ideal for travel!
Although it is in the same genus as Saccharomyces cerevisiae (baker's, brewer's or dietary yeast), Saccharomyces boulardii is not linked to the Candida species (Candida albicans, tropicalas, etc.), Crohn's disease or any other disease.
How was Saccharomyces boulardii yeast discovered?
Saccharomyces boulardii yeast was first isolated from lychee and mangosteen fruit in the 1920s by a French scientist called Henri Boulard. He had observed natives of Southeast Asia chewing the skin of these fruits to help control cholera.
How is Saccharomyces boulardii yeast thought to work?
by supporting the health and integrity of intestinal mucosa.
It is a hardy, acid-resistant, temperature-tolerant micro-organism.
Cloves are the dried flower bud of the evergreen tree, Eugenia aromatica. The tree is indigenous to the Maluka Islands of Indonesia, but cloves actually also grow naturally in India, the West Indies, Tanzania, Sri Lanka, Brazil and Madagascar.
Both Indian and Chinese traditional medicine have made extensive use of cloves and clove oil for thousands of years. For example, to support everything from healthy digestion (including gastrointestinal enzyme secretions) to oral health. The sweet aroma of cloves is due to eugenol, an essential oil found in them. Cloves also contain good levels of antioxidants, vitamins and minerals, such as potassium, manganese, iron, selenium, magnesium, vitamin A, beta-carotene. vitamin K, vitamin B1 (thiamin), vitamin B6 (pyridoxine), vitamin C and riboflavin.
Used for more than 4,000 years as a natural herbal remedy, garlic is a broad-spectrum herb that offers a wide range of potential health benefits, largely due to its antioxidant sulphur compounds. Aged garlic, in particular, contains beneficial, water-soluble sulphur compounds called S-allyl mercaptocysteine (SAMC) and S-allyl cysteine (SAC) - powerful antioxidants not present in fresh garlic, which have high bioavailability with 98% absorption into the blood.
The extract is used to support gastointestinal cleansing and function, as well as to support yeast balance in the body. It is produced by extracting and ageing fresh garlic at room temperature for 20 months, which results in antioxidant levels that are higher than those in fresh garlic. The process also converts garlic's more unstable substances, which are generally not available to the body (such as its odour-generating compound oxidant allicin), to more stable, bioavailable and health-promoting substances. Also present are some oil-soluble sulphur compounds, flavonoids, a phenol allixin and other nutrients (including selenium).
There is nothing new about olives or olive oil - both have been used for thousands of years for culinary purposes. What is newsworthy, however, is olive leaf extract. This ancient remedy has recently been re-discovered by natural health practitioners, particularly in terms of offering possible support for gastrointestinal health and yeast balance in the body. While research continues to be undertaken in Europe and the USA on the specific health benefits of this extract, many of its actions are attributed to the presence of a biologically active compound called elenolic acid. This antioxidant supports a healthy balance of gut flora and the immune system.
Ingredients: Saccharomyces Boulardii Powder, Capsule Shell: Hydroxypropyl Methylcellulose (HPMC) (Vegetarian), Clove Bud Powder, Garlic Extract, Olive Leaf Extract, Anti-Caking Agent: Magnesium Stearate (Vegetable Source).
Source of Saccharomyces boulardii: Lychee or mangosteen.
1 capsule to be taken 1 to 3 times per day, before meals or as advised. Up to 6 capsules can be taken per day.
BACTOhamony is stable at room temperature, but may be refrigerated to preserve freshness.
A high-strength probiotic yeast to support the colonic and intestinal systems. Ideal for use following antibiotics, travelling abroad and after colonic hydrotherapy treatments. | 2019-04-19T00:58:20 | http://mybodhishop.com/BACTOharmony-saccharomyces-boulardii-probiotic-yeast-plus-herbals.html |
0.999949 | My employer is sponsoring most of the tuition and fees for my master's degree (in aerospace engineering), including required textbooks. Thus, it is unethical and against policy for me to sell those books once I'm done with the corresponding courses. Specifically, the policy is that I cannot "make a profit on" them, but other than that I am free to do with them as I please. I find that having the physical book is helpful when I'm taking the course, but afterwards if I need to reference it a digital copy will suffice. And while having my office/residence full of these high-level materials certainly makes me feel good about myself, it's not practical. Thus, what can I do with these textbooks that will have the biggest, most positive impact on academia?
As an academic librarian, I am frequently asked similar questions. First, please don't just drop them off at the library. Unwanted donations are a significant problem at libraries—it's very difficult to recycle books, so libraries end up having to pay to get rid of books we don't need, on top of the time and effort it takes to deal with a big pile of books on our doorstep.
Do feel free to contact a librarian to see if they would be interested, but be prepared for the answer to be no: textbooks, which change edition quickly and tend to be most useful only to people taking specific classes, are fairly low on the list for most libraries. Some large university libraries do have policies of obtaining a copy of every required textbook, but they will already have a mechanism for purchasing those in a timely manner. If you do go this route, please also be as tentative as possible in your offer: Librarians also tend to dislike telling people "no", so if you push, the librarian is likely to take your books and then quietly dumpster them.
There are some charities that take donations of (some) books. Our library uses Better World Books, which I believe is currently accepting recent textbooks, and you could also look around for programs close to your home.
If you don't care about keeping any value within academia, you could offer the books for pick-up through something like Craig's List. Whether people want your books for study or a book art program or as kindling for their wood-burning stove, the books will at least have value beyond gathering dust in a box in your closet.
If you want to recycle some or all of your books, you will need to deconstruct them first, or locate a service that specializes in books (these are very hard to find, and may have a charge). If you want to do it yourself, a box cutter or utility knife to cut the pages out works pretty well. The pages can go to any paper recycling service. The cover itself may also be recyclable, but any glue and/or stitching will probably need to go into the trash. You probably shouldn't compost the books, as page coatings and inks can be toxic.
You should be able to work out a solution both parties are happy with pretty easily. The obvious one is to sell the books and then give your employer the profits. If they don't care, you can also pocket the profits yourself, perhaps recycle the books or donate them to your university's library.
Give them to the professor. It is often useful to be able to lend the course book to future students who cannot afford the books.
Seeing if the library will take them is also a good choice, as mentioned in this answer, but they may not take them as mentioned here. Overall I think the professor can do the most good with them. He can lend the to the library, or sometimes the school office, for short term loans, give them to students for an entire semester, or decide that the library is the best place and donate them.
I'm not sure if this kind of donation is available in other countries, but in my country (Vietnam), there is an organization collects donated English textbooks from the US and ship to libraries in universities in our country. This solves the need of English textbooks in poor and developing countries.
You can visit Vietnam Book Drive if you are interested in this idea.
Disclaimer: I used to work here as a webmaster a couple years ago.
Keep those books that you believe will be valuable as reference material; donate the rest to the university library where you are earning your degree. You know that particular institution uses those particular books. Students less fortunate than you will be able to check them out of the library rather than buying them.
Put them in a bookcase in your office and use them as desk references. Textbooks are valuable resources. You become familiar with them. So good to retain them. Have your assistant order bookcase if needed.
Box them and store them.
Give them to the company/site library.
Give them away to other students, professors, etc.
The reason for the priority is that the company funded your education and you are most familiar with the books. So the most fitting is for you to retain them.
Finally something about this question strikes me as strange. As if you want the $$. Or don't appreciate the company funded education. Or have a pointed aversion to physical texts.
This is a Canadian charitable organization ("B corporation" whatever that means) which distributes textbooks. 50% of the books go to university libraries in Africa, 20% are resold cheaply to fund the other operations, and 30% are recycled as paper (if they don't meet criteria for use or have no demand or whatever).
Now, they operate mostly in Canada and Michigan - but they're (also) based on people who volunteer to be "drop points", so that might be flexible.
Caveat: I've never lived in Canada nor the US; and my textbooks were semester-long loans from my alma mater's library - so I never actually had the opportunity to donate to "Textbooks for Change" myself. I just noticed their existence and they seem like a nice initiative.
Provided you clear it with the appropriate person, sell the books and give the proceeds - in your name and/or in the name of your employer - to a good cause run by your university: scholarship fund etc.
If there are graduate students or PhD studens working as TAs at the university, they might have use for it when teaching.
I recall teaching a class as a post-doc, and had difficulties finding the book I was supposed to be teaching on (I did of course not want to buy it with my private money). There might even be a small collection of course books available to TAs, so your book might be a good addition there.
Some colleges & universities have "textbook libraries", separate from the main academic library, that will accept donations of textbooks. In later semesters, these libraries then lend the textbooks back out to students for whom buying the textbooks would present a financial hardship.
Such initiatives can be difficult to track down, as they're often run on a volunteer basis. To find whether your institution has such a program, search on Google for "[institution name] textbook library", or make inquiries at the dean of students' office, the academic library, the office of financial aid, and/or the student government association.
Another answer referenced using them for "kindling". Finding some way to recycle the paper may also be good. But don't give the books to someone else who will benefit from their text.
"afterwards if I need to reference it a digital copy will suffice."
If you're keeping a digital copy, then you shouldn't be giving away the separate physical copy, because that is essentially resulting in two different copies being used by two different people when the publisher as only paid for one user. This might violate some actual copyright law, usage agreement, etc. But even if a legal loophole causes this to not be technically illegal, such duplication basically violates the spirit of the idea of having the publisher (and, down the line, the author) being paid for each user of the book.
As long as you're (sometimes) using a digital copy, the bundled physical copy should remain unused (shelved, destroyed, whatever).
Not the answer you're looking for? Browse other questions tagged graduate-school united-states students books engineering or ask your own question.
As a self-learner, what to do with books providing exercises but not solutions?
What can I do with a book summary?
Can I pursue a new Master's in another country, while I'm pursuing one?
Years ago, a professor agreed to write a LOR, but never sent it. Therefore, I'm not accepted in any school. What can I do?
If the professor is teaching in a way that I don't like, what should I do?
I feel like my research is stalled because of a lack of available mentors and my lab situation isn't conducive to research. What are my options?
Is there something I could do considering I'm not really happy with my master's thesis?
How to deal with advisors who seem to not like me? | 2019-04-20T06:32:38 | https://academia.stackexchange.com/questions/123244/what-can-i-do-with-like-new-recent-edition-textbooks-that-im-not-allowed-to-se/123297 |
0.99894 | The Spanish language was born in these monasteries, San Millán Suso and Yuso, and they form an important part of the history of humanity. Because of the identification and inter-relationship of the two monasteries with elements of the Mozarabic, Visigothic, medieval, Renaissance and Baroque styles, the architecture and the natural landscape bring together highly significant periods in the history of Spain.
In the mid-6th century the holy San Millán settled at a site, now known as the Suso Monastery, on the flanks of the Cogolla or Distercios hills, where he was joined by other eremitic monks to found the Cogolla Community. During the lifetime of the saint a small monastery was built on the hillside in Visigothic style. This was enlarged in the 7th century by the construction of a porch or hall up against the caves, in which to receive pilgrims. The church was rebuilt in 929, during the reign of García Sanchez of Navarre and Castille, in Mozarabic style and King Sancho Abarca and his wife, Doña Urraca, attended its dedication in 984.
The Codex Aemilianensis 60 was written in the Suso scriptorium in the 9th and 10th centuries by one of the monks, who added marginal notes in Castilian and Basque, along with a prayer in Castilian, to clarify passages in the Latin text: this is the first known example of written Spanish.
After the church was damaged by fire in the early 11th century it was restored by King Sancho the Great, with some modifications such as the orientation of the church and the building of a chapel to house the recumbent statue of San Millán.
King Garcia Sanchez of Najera ordered the building of the Suso Monastery in 1503, and work began the following year, starting with the church (built within sight of the older monastery), the two cloisters, sacristy, chapter house, library, gallery, and rooms. The north wall of the church was rebuilt alter collapsing in 1595, and in the century that followed the ensemble was extended with the addition of the facade of the church, tower, porter's lodge, main entrance, and abbot's chamber, to the plans of the architect Juan de Raón. The monastery consists of a series of hermits' caves, a church, and an entrance porch or narthex. The caves, originally used by the monks, are cut into the southern slope of the mountain. They form the northern boundary of the church, consisting of twin aisles and five bays. Elements of Romanesque building of the Visigothic period are still clearly visible, including some striking capitals. The Mozarabic arches preserve the identity of the earlier structure. On the south facade there is a series of portals added during the reconstruction, one of which is named after Gonzalo de Berceo, as it was here that he composed his seminal poetry.
Archaeological excavations in advance of consolidation work on the west side of the church have revealed the foundations of a number of the other monastery buildings and the sites of the caves used by the original eremitic monks on the hillside above and around the church.
The main buildings of the Yuso Monastery, next to the modern village and below the Suso Monastery, cluster around a small cloister known as the Canons' Cloister (Patio de la Luna) and the main cloister, named after San Millán. The latter is two-storeyed, the lower part being open and roofed with star-ribbed vaulting and the upper part closed (now housing the museum). To the west lie the imposing Monarch's Chamber and the great main staircase. The well proportioned church, reached through a fine Baroque portal to the north of the cloister, is rectangular in plan, with a central nave and three aisles and six bays separated by cylindrical columns;there is a lofty choir at the east end. This is separated from the nave by two screens, the outer in wrought iron and of superlative workmanship, and the inner an ornate Baroque masterpiece by Francisco Bisou (1767). On the east are the former chapter house (now the sacristy), an elegant Baroque chamber, with the impressive library of the monastery on its upper floor. Finally, the austere but well-proportioned refectory, with the more ornate Abbot's Chamber above, lie on the south side. Access to the monastery is through a monumental gate to a spacious courtyard and through an ornately decorated archway. | 2019-04-24T12:07:39 | https://1citytravel.com/post/view/627/san-millan-yuso-and-suso-monasteries |
0.999811 | I wrote about Autism Speaks a few weeks ago, and my email box has been lively with parents telling me to "check my facts" or sorrowfully wanting correct my ""unsound and terribly flawed" information.
One of the issues with Autism Speaks is that they define Autism as tragedy. Then, when confronted by autistics who are clearly not tragic, they respond, "Well your autism is not like our autism," or "you are not like our children."
No true Scotsman is an informal fallacy, an ad hoc attempt to retain an unreasoned assertion. When faced with a counterexample to a universal claim ("no Scotsman would do such a thing"), rather than denying the counterexample or rejecting the original claim, this fallacy modifies the subject of the assertion to exclude the specific case or others like it by rhetoric, without reference to any specific objective rule ("no true Scotsman would do such a thing").
Person B: "But my uncle Angus likes sugar with his porridge."
Person A: "Ah yes, but no true Scotsman puts sugar on his porridge."
That's how Autism Speaks deals with autistic people.
Autistic person says: I can!
It allows them to dismiss autistic critics as not relevant or not the people they are working to "save."
There are, of course, parents who are struggling, but lots of parent groups recognize that the diversity of the autistic spectrum is a strength, a way to build a movement, rather than a threat to fundraising based on sorrow. | 2019-04-22T04:38:37 | http://www.thismess.net/2015/09/autism-speaks-and-no-true-scotsman.html |
0.998538 | An applied force affects the motion of an object. An applied force can be a push, pull, or dragging on an object.
The push can come from direct contact, like when objects collide or from a force field like magnetism. The pull seems to only come from a field at a distance, like gravity or magnetism. Dragging can occur when sliding an object over the surface of another.
The action from a force can cause an object to move or speed up (accelerate), to slow down (decelerate), to stop, or to change direction. Since any change in velocity is considered acceleration, it can be said that a force on an object results in the acceleration of an object.
How can a force accelerate an object?
How can a force slow down an object?
When can a force cause an object to change directions?
When a force acts on an object that is stationary or not moving, the force will cause the object to move, provided there are no other forces preventing that movement. If you throw a ball, you are pushing on it to start its movement. If you drop an object, the force of gravity causes it to move.
If an object is initially stationary, it accelerates when it starts to move. Acceleration is the change in velocity over a period of time. The object is going from v = 0 to some other speed or velocity.
Likewise, if an object is already moving and a force is applied in the same direction, the object will speed up or accelerate. For example, a gust of wind can speed up a sailboat.
As long as the force is applied to a given object, it will to accelerate. Once the force is withdrawn, the object will continue to move at a constant velocity, according to the Law of Inertia.
If an object is moving and there is an applied force in the opposite direction of the motion, the object will decelerate or slow down. If you throw a ball up at a given velocity, it will slow down as it travels upward due to the force of gravity. Likewise, an airplane will decelerate if flying into a strong headwind.
A decelerating force can cause a moving object to stop. This can be seen when you apply the brakes on your car.
A force applied at an angle to the direction of motion of an object can cause it to change direction. A side wind will cause an airplane to change its direction.
It is possible that the object keeps going at the same speed, if the force is applied perpendicular to the direction of motion. But the velocity of the the object changes. Speed is how fast the object is going, while velocity is speed plus direction.
A force is a push, pull, or dragging on an object that affects its motion. The push can come from direct contact, like when objects collide or from a force field. The pull seems to only come from a field at a distance. The action from a force can cause an object to accelerate, to decelerate, to stop or to change direction.
Since any change in velocity is considered acceleration, it can be said that a force on an object results in the acceleration of an object.
Become a positive force in your community. | 2019-04-20T19:12:35 | https://www.school-for-champions.com/science/force_motion.htm |
0.997952 | Check: With a successful Climb check, you can advance up, down, or across a slope, wall, or other steep incline (or even across a ceiling, provided it has handholds) at one-quarter your normal speed. A slope is considered to be any incline at an angle measuring less than 60 degrees; a wall is any incline at an angle measuring 60 degrees or more.
10 A surface with ledges to hold on to and stand on, such as a very rough wall or a ship's rigging.
20 An uneven surface with narrow handholds and footholds, such as a typical wall in a dungeon.
30 An overhang or ceiling with handholds only.
— A perfectly smooth, flat vertical (or inverted) surface cannot be climbed.
You need both hands free to climb, but you may cling to a wall with one hand while you cast a spell or take some other action that requires only one hand. While climbing, you can't move to avoid a blow, so you lose your Dexterity bonus to AC (if any). You also can't use a shield while climbing. Anytime you take damage while climbing, make a Climb check against the DC of the slope or wall. Failure means you fall from your current height and sustain the appropriate falling damage.
Make Your Own Handholds and Footholds: You can make your own handholds and footholds by pounding pitons into a wall. Doing so takes 1 minute per piton, and one piton is needed per 5 feet of distance. As with any surface that offers handholds and footholds, a wall with pitons in it has a DC of 15. In the same way, a climber with a handaxe or similar implement can cut handholds in an ice wall.
Catch Yourself When Falling: It's practically impossible to catch yourself on a wall while falling, yet if you wish to attempt such a difficult task, you can make a Climb check (DC = wall's DC + 20) to do so. It's much easier to catch yourself on a slope (DC = slope's DC + 10).
Catch a Falling Character While Climbing: If someone climbing above you or adjacent to you falls, you can attempt to catch the falling character if he or she is within your reach. Doing so requires a successful melee touch attack against the falling character (though he or she can voluntarily forego any Dexterity bonus to AC if desired). If you hit, you must immediately attempt a Climb check (DC = wall's DC + 10). Success indicates that you catch the falling character, but his total weight, including equipment, cannot exceed your heavy load limit or you automatically fall. If you fail your Climb check by 4 or less, you fail to stop the character's fall but don't lose your grip on the wall. If you fail by 5 or more, you fail to stop the character's fall and begin falling as well.
If you have the Athletic feat, you get a bonus on Climb checks (see Feats). | 2019-04-19T23:04:48 | http://pathfinder.d20srd.org/coreRulebook/skills/climb.html |
0.999985 | Will tax be payable once we move out?
Question I have owned a buy-to-let property for four years. However I've recently re-mortgaged the buy-to-let property and realised that we might need to move in genuinely for a few years and move on to a bigger house later. After living in the property for one year and we move out, will I have to pay capital gains tax?
If the house genuinely becomes your principal private residence (PPR) then you will be exempt from capital gains tax on the eventual sale of the house for: (a) the one year period you actually lived in the house as your PPR; plus (b) the last 18 months of ownership (unless this overlaps with the one year); plus (c) you will be eligible for lettings relief for the period the house was rented out (unless it overlaps with the 18 months). The rest of the capital gain will be chargeable on you. | 2019-04-26T03:57:08 | https://www.property-tax-portal.co.uk/taxquestion325.shtml |
0.999921 | In a stand mixer fitted with the dough hook, mix the yeast with the water and 1 teaspoon of the sugar. Let stand until foamy, 10 minutes. Beat in the remaining sugar, 3/4 cup of the butter and the milk, eggs and kosher salt. At low speed, stir in the 7 1/2 cups of flour until the dough comes together; add more flour by the tablespoon, if necessary. Mix at medium speed until the dough forms a loose ball around the hook, 3 minutes. Brush a large bowl with some of the melted butter. Transfer the dough to the bowl and cover with plastic wrap. Let stand in a warm spot until doubled in bulk, 1 1/2 hours.
Preheat the oven to 375° and line 2 baking sheets with parchment paper. Scrape the dough out onto a lightly floured work surface and shape it into a 9-by-16-inch rectangle. Using a floured knife, cut the dough lengthwise into 3 strips, then cut each strip crosswise into 12 small strips. Working with 1 piece at a time, fold it unevenly so the top half slightly overlaps the bottom half. Tuck the overhang under and place the roll seam side down on a baking sheet. Repeat with the remaining dough, forming 2 rows of 9 rolls on each baking sheet. Each roll should just touch its neighbors, but leave about 4 inches between the rows.
Bake the rolls for about 18 minutes, until browned; rotate the baking sheets from top to bottom and front to back halfway through baking. Immediately brush the rolls with the remaining melted butter and sprinkle with sea salt. Transfer the rolls to a rack and let cool for 15 minutes before serving. To reheat, toast in a 350? oven for about 10 minutes.
The fully formed unbaked rolls can be frozen for up to 1 month. Bake from frozen. | 2019-04-20T01:29:01 | https://www.foodandwine.com/recipes/parker-house-rolls-Alex-Guarnaschelli |
0.998612 | Be it employee feedback or customer feedback or feedback of event participants, some people hate to collect them. Are these people apprehensive of criticisms and reluctant to take corrective measures?
Not always. Sometimes people hate to collect feedback because be it employees or customers or event participants, there is a propensity to give feedback for wrong reasons.
There is no reason to hold expensive B2B events for collecting wrong feedback that is mostly useless and contribute nothing to business development.
Collection and storage of feedback is not a daunting task anymore. The priority is to focus on the right feedback. Before we discuss it, let us take a quick tour of the latest event tech tools that can simplify the process of feedback collection.
Events or conferences can leverage the Audience Response System (ARS) to enhance engagement, facilitate networking and get real-time feedback.
Recently, we at e2m.live conducted Polls-Enterprise Scalability Test which produced wonderful results.
There are high-performing event tech tools to gather feedback from the audience.
1: Specific Feedback Leave No Doubt: We don’t need round-about or ambiguous feedback. Better to ask simple and closed-ended questions.
Other than literary events or social or environmental awareness campaigns, there is no point asking open-ended questions to event participants.
Constructive Actions: Specific feedback can prompt businesses to update their products or services and can also help them improve their sales and promotional activities.
2: On-time Feedback or No Feedback: There are 3 critical stages of event feedback- pre-event, in-event and post-event feedback.
Businesses should decide the time to collect feedback based on their goals.
For example, event planners should collect pre-event feedback to help organizers hold events that target groups of participants can never resist to join.
Similarly, event organizers can opt for in-event feedback to rate events.
Constructive Actions: On-time feedback can help businesses boost the satisfaction level of event participants and get positive reviews. Businesses should know why and when to collect feedback.
3: Candid Feedback is Productive: Biased questions can lead to wrong data. Similarly, biased answer options can also generate false data.
Candid feedback is the most productive one. Sometimes, candid feedback can make people uncomfortable. However, there is no use to turn a blind eye on grey spots.
Constructive Actions: Candid feedback can help businesses come out of inertia, introspect and take constructive measures to repair loopholes and excel clients’ expectations.
4: Feedback Must be Goal-oriented: Event planning or event organizing companies need to collect feedback on event staff, event volunteers, event seating arrangements, cooling/ heating systems, event menus, overall hygiene, sessions, speakers, exhibitor/ vendor stalls and event tech tools like venue locators and gamification and AR.
Similarly, businesses can seek goal-oriented feedback from in-house conferences or conventions and also from training sessions.
Constructive Actions: Goal-oriented feedback is the easiest to be implemented. They are like fast food- need a minimum preparation time and can be used almost immediately.
5: Feedback should be Future-oriented: One simple step to get over from the hangover of negative feedback is to focus on the fact that what has happened, has happened.
Past is past. Rather, focus on how feedback can help organize events more successfully in the future.
Lessons learned can be implemented in the days to come. We do not have time-machines to revisit the past and rectify mistakes.
Constructive Actions: Insights gained from feedback can help set valuable guidelines. Businesses can implement them for their own use or can use them to offer consultation services.
Event tech tools are helping businesses to collect valuable feedback from attendees. Millions of happy customers are using app suites like e2m.live to grow their businesses.
Write to us and discuss business requirements with our proficient representatives. Let us take steps to make the most of B2B events and earn maximum ROI. | 2019-04-24T03:56:24 | https://e2m.live/blog/event-feedback-that-prompts-constructive-actions/ |
0.9995 | How do I install VAC v4.0 on Windows 2000?
How will the problems be judged?
During the contest, only the approved languages (IBM Visual Age C/C++, IBM Java, and Borland Delphi) will be available as programming languages (Microsoft Visual C/C++, and GNU C/C++ will NOT be available). The Internet will NOT be accessible. If anyone has any software requests (such as favorite editors), please send e-mail to [email protected]. As new items are defined as available, I will list them here.
The schedule now has the Coates Computer Lab reserver Friday from 4:30 PM until 10:00 PM (there will be a couple of other things during that time to tear you away). You will also have the practice contest Saturday morning.
10) How do I install VAC v4.0 on Windows 2000?
Visit http://www7.software.ibm.com/vad.nsf/Data/Document0963?OpenDocument&mast=3&p=1&BCT=5&Footer=1. Follow the instructions on that page (accept all defaults for the install, say "Yes" to the proxy question and restart the machine).
Visit http://www-4.ibm.com/software/ad/vacpp/service/csd.html and download the "Download (53546K)" in the "Fixpak 2 for VisualAge C++ Professional for Windows v4.0" section at the top of the page.
This Fix Pack will allow you to actually run the VAC v4.0 IDE on Windows 2000.
Unzip and install the Fix Pack 2 file (run the setup.exe from the .zip file).
11) How will the problems be judged?
When a team "Test"'s a file using the PC2 client or when a judge receives a submission and is going to judge it, the following two scripts get run. The first one sets things up and then calls the second one to do the actual compilation. The actual output from the compilation will be judged visually by a human judge, comparing a team's output with sample output. | 2019-04-26T05:36:41 | https://acm2000.scusa.lsu.edu/faq.html |
0.999648 | Goal of the Project: the goal of the project is to explore the possibilities of building networks in Nengo and running them on SpiNNaker on a robot, so to have an embodied autonomous robotic agent controlled by a SNN performing a task in the environment.
Neural processing is performed by a 4-chip SpiNNaker board, offering a digital event-driven platform that can interpret incoming events and translate them into neural spike trains. Each SpiNNaker chip is equipped with 1Gbit SDRAM and 18 programmable ARM968 cores embedded in a configurable packet-switched asynchronous network-on-chip, based on an on-chip Multicast (MC) Router capable handling one-to-many communication of spikes (packets) very efficiently, and linked to 6 neighbour chips through asynchronous links.
The system is designed to scale up to 65536 chips (each consuming 1W maximum) and a million cores, offering a flexible, power-efficient platform for large-scale real-time modelling. Each SpiNNaker chip natively responds to events occurring in the network, and is therefore able to process information arriving from event based sensors (or send it to actuators) attached to its asynchronous links.
In this work we use a 4 chip SpiNNaker board, which overall has a top consumption of 5W: 4W chips + 1W infrastructure.
We have expanded the representational powers of the NEF/SpiNNaker to 2D inputs/outputs. By doing so a large variety of models become available for exploration.
The most basic 2D dynamical model to be implemented is the oscillator (Cyclic Attractor). The following video shows how to build an oscillator in Nengo, compile it and run it on SpiNNaker, and visualizing the results back in Nengo.
The video above shows the level of integration in the Nengo/SpiNNaker toolchain by simulating a single oscillator (200 neurons) fed with a pulse at 5sec by a 2D communication channel.
The network is composed by 100 encoding neurons (Population A), 200 neurons of the oscillator stage (Population B), 100 neurons for the communication channel output population and 100 decoding neurons, where firing rates are unconstrained in the range 100-200 Hz. The model uses 5 cores, each modelling 100 neurons.
The network represented in the figure below has been used to control the robot, while switching in between two states: exploration and returning home.
The current state (behaviour) of the robot is represented in the state population, which acts as an integrator (working memory) which is able to maintain the current state over time with no additional input. The position integrator population maintains the position of the agent by 2D integrating the neural driving commands sent to the motors.
If the robot is in the explore state it can be driven using the commands in Nengo, which are then sent as 2D values to the explore population on the SpiNNaker board, which outputs the driving commands to the motors by passing through the laptop's wifi.
If the robot is in the return home state the driving commands are controlled by the return population, which tries to compensate the value in the position population by sending negative drive commands.
The robot is controlled by a SpiNNaker board connected to a laptop, sending and receiving messages to/from the robot/spiNNaker board through ethernet (cable+wifi).
The movie shows the robot performing the task as the state is switch from controlled exploration to autonomous return home behaviours. All computation is done in neurons.
The model uses 3000 neurons over 27 cores, firing 11.75 Mspikes/sec (~65Hz MFR).
The video shows the model running on SpiNNaker and communicating with the Nengo interface. It can be noted that the position integrator is not so stable, and that leads the robot to return to the wrong starting position when the model is embodied.
The model is composed by 5000 neurons and 2.95M synapses on 49 cores. In this model the SpiNNaker board is for the first time mounted directly on top of the robot and controls its motor directly. Communication from Nengo to SpiNNaker (driving commands, visualizing neural responses) is done through wifi. SpiNNaker is therefore able to send and receive inputs/commands directly from/to the robot.
The mobile robot used in this project is a custom developed omni-directional mobile platform of 26cm diameter, with embedded low-level motor control and elementary sensory systems. An on-board ARM7 microcontroller for robot control receives desired motion commands in x and y direction and rotation through a UART communication interface, and continuously adapts three motor control signals (PD-control) to achieve the desired velocities. The robot’s integrated sensors include wheel encoders for position estimates, a 9 DOF inertial measurement unit (3xAccelerometer, 3xGyroscope, and 3xCompass) and a simple bump-sensor ring which triggers binary contact switches upon contact with objects in the environment. The integrated battery pack allows up to 8h of autonomous robot operation; powering robot and spiNNaker simultaneously we estimate an autonomous run time of about 4h.
SpiNNaker communicates with the robot through a small customized interface board with an ARM Cortext microcontroller that translates spiNNaker packages into robot commands and vice versa. The interface board is currently under improvement to allow higher data rates, such that event based sensory systems (such as silicon retinas or cochleae) can get interfaced directly to spiNNaker. The overall system is stand-alone autonomous (no PC in the loop).
The work in the project has built the basis for the integration of complex Nengo models onto robots controlled by SpiNNaker by testing various models. It also is the basis for the SpiNNaker/Robot/Nengo integration as shown in the Place Cells on Nengo on SpiNNaker on Omnibot and in the Sensing and Escape projects. | 2019-04-21T10:42:37 | http://neuromorphs.net/nm/wiki/act12/results/OmniSpiNN |
0.997 | "The present work contains the first critical edition of John Buridan's Questiones longe super Librum Perihermeneias Aristotilis.
Now we should have to answer the question: when were the questions on Perihermeneias written? Little is known about the chronology of Buridan's works. Even a relative date is difficult to establish. However, some remarks can be made. First, there is the fact that the questions on Perihermeneias are quoted several times in Tractatus I of the Summule (4), in a way that makes it highly probable that the Summule were written after the Questiones on Perihermeneias (5). Now, according to professor Pinborg the first lectura of the Summule may be dated as early as the late 1320es (6), that is at the very beginning of Buridan's career as a teacher of philosophy at the university of Paris. This may be an indication for an early date of the Questiones on Perihermeneias, possibly as early as 1325.
Another argument in favour of an early date of the tract is based on the content of the work. Doctrinal analysis of the work shows that most subjects treated in the Questiones on Perihermeneias can also be found in other works of Buridan's in a more elaborate way. The work as a whole seems to show an early stage of Buridan's doctrinal development.
Unfortunately, this argument is not as strong as it seems, since the superficial way in which some subjects are discussed in the work may be related to the character of the tract: the questions on the Logica vetus were probably presented to the students in an early stage of their philosophical training.
Thus, there is not much certainty about the date of the questions on Perihermeneias. There are some reasons to believe that we have to deal with an early work of Buridan. Although, taken separately, none of these reasons is in itself sufficient, I am inclined to consider the work as an early tract.
(5) Summule I.3.3: Ad tertiam dubitationem ego tractavi expresse et diffuse I. Perihermeneias in &a questione, ad quam recurrat qui voluit.
(6) Jan Pinborg, The Summule, Tractatis I De Introductionibus. in: The Logic of John Buridan (1976) pp. 71-90.
(7)p. 6,8. The short version gives an explicit reference to the third question of this tract.
(8) p. 52,36; p. 71,34.
(9) p. 35,4 p. 41,11+14+21; p. 58, 27; p. 68, 36.
(10) Edmond Faral, "Jean Buridan: Maître és arts de l'Université de Paris," Histoire Littéraire de la France 28 (1949), 462-605 (separate edition 1950).
From: Ria van der Lecq, "Introduction" to: Quaestiones longe super Librum Perihermeneias. Nijmegen: Ingenium Publishers 1983.
"The commentary edited here is a question-commentary. This means that -- like most commentaries of its kind -- it offers the reader little help to understand Aristotle's text. Or to put the same in another manner: Though we find a considerable number of references to the Topics we could remove practically all the references and still have almost the same commentary. Or again: Nearly all the questions are occasioned by a section of Aristotle's text, but the discussions take place within a purely medieval frame-work.
We find, however, three references to littera (i.e. Aristotle's text) which are most naturally taken to mean that our work presupposes an exposition of the text.(11) These references need not mean that there was ever a 'published' literal-commentary on Aristotle's Topics by Buridan. Yet it has been argued convincingly by Christoph Flüeler(12) that Buridan's habit was to go through a prescribed text by expounding it and discussing questions on it within the same period, though the exposition of the text might proceed at a quicker pace than the disputation of questions. This will mean that the present work originally did not stand alone, but had an explanation of the text as its background. No trace seems to be left of such an exposition of Aristotle's Topics by Buridan, and perhaps it was never written down, but only spoken in the class-room.
Flüeler further argues that all or most of Buridan's commentaries have come down to us as students' reportations of oral lectures and not in Flüelera form finished by Buridan himself.(13) This seems to hold true of the present work: In I qu. 5, arg. 1a we read: sicut hen dicebatur; in IV qu. 4 arg. 3b: sicut hodie dicebatur; in V qu. 2 arg. 4a: sicut dicebam heri; and in I qu. 17, dist. I: descriptiones horum sunt vobis satis notae. Such phrases are more naturally said in an oral lecture than written in a finished text. Inevitably this leads to the question: Has the student reported the lecture in the classroom, as it was spoken, or has he later written down a full text on the basis of notes taken in the class-room? Flüeler argues convincingly(14) for the existence of reportations written down in a complete form in the class-room, but certainly we cannot consider it to be proved that all reportations were made in that way. It is hardly possible to decide the question concerning our commentary, but when reading it we should keep in mind that there probably is, so to speak, a 'mediator' between Buridan and us.
Any reader of our commentary will quickly notice that it does not pay equal regard to all eight books of Aristotle's Topics. The questions on book I take up about one third of the work, and the same is true about the questions on book II. The remaining books are then dealt with quickly in the last third of the commentary. This selective attitude to Aristotle's text is one which our work shares with other commentaries from the same period.(15) If we compare with the much bigger number of questions in the commentaries from the 13th century by Boethius de Dacia(16) and Radulphus Brito(17) we cannot avoid the impression that Aristotle's Topics interested the authors of the 14th century much less than it did earlier commentators. Or perhaps we could say that the logic of the 14th century followed a course of development of its own, and was to a lesser degree directly inspired by a reading of Aristotle than the logic of the 13th century.
(11) I qu. 15; lI qu. 10; VIII qu. I.
(12) Christoph Flüeler, From Oral Lecture to Written Commentaries: John Buridan's Commentaries on Aristotle's Metaphysics. In Medieval analyses in language and cognition. Acts of the Symposium: The Copenhagen School of Medieval Philosophy. Edited by Ebbesen Sten and Friedman Russell L. Copenhagen: Royal Danish Academy of Sciences and Letters 1999, 502-510.
(14) Flüeler 1999, 507-511; 516; 518.
(15) Cf. Niels Jørgen Green-Pedersen, The Tradition of the Topics. The Commentaries on Aristotle's and Boethius's 'Topics'. München-Wien, Philosophia, 1984, 89-90; 392-399.
(16) Boethius de Dacia, Topica - Opuscola. Edited by N. J. Green-Pedersen and J. Pinborg,. Corpus Philosophorum Danicorum Medii Aevi V, 1-2. Hauniae Societas Linguae et Litteraturam Danicarum/Gad 1976, 2, 461-466.
(17) Cf. Jan Pinborg, "Die Logik der Modistae". Studia Mediewistyczne 16 (1975), 82-86.
(18) Boethius de Dacia 1976, 2, 462; Pinborg 1975, 83-84 (Radulphus Brito).
(19) Cf. Iohannes Buridanus, Quaestiones Elenchorum, 8.4.3, P. 35; 9.3.2.1, p. 38.
(20) Cf. Johannes Buridanus, De Practica Sophismatum, 64; 73-74; cf. the next section of this introduction.
(21) Cf. Iohannes Buridanus, De Practica Sophismatum, 79-80; 90; cf. the next section of this introduction.
From: Niels Jørgen Green-Pedersen, "Introduction" to: Johannes Buridanus, Quaestiones Topicorum, Turnhout, Brepols 2008.
"The treatment of the problem of the insolubilia may give us some evidence for a relative date of the Questiones elencorum. The subject is discussed in question 19 of the present work. Someone who is not familiar with the discussions on paradoxes may wonder why the subject is treated here at all. Question 19 is one of the few questions in this work that contain no reference at all to Aristotle's text and at first sight it seems to have no connection with the subject of fallacies.
The reason that the subject is discussed here is that paradoxes were very often considered as originating from the fallacy secundum quid et simpliciter.(14) From that point of view an insoluble proposition, like 'Sortes dicit falsum', supposing that Sortes says no other proposition than this one, is neither simpliciter false nor simpliciter true, and therefore it deserves the same treatment as the proposition about the black man with the white teeth. For the sake of clearness: Buridan has never defended this opinion himself. According to him the proposition 'Sortes dicit falsum', where 'falsum' refers to the proposition itself, is simply false.
7.7.1: Some people have advanced the following view (and it was my opinion too at one time): Even if the only thing that the proposition signifies or asserts, simply in virtue of the meanings of its terms, is that every proposition is false, nevertheless every proposition, by its very form, signifies or asserts itself to be true, and as a result any proposition that either directly or indirectly asserts itself to be false, is false (transl. Hughes,(15) ital. ours).
Let us follow G.E. Hughes(17) in referring to this theory (viz. that every proposition signifies its own truth) as the meaning theory.
7.7.2: one that is quite close to the truth. According to it every proposition virtually implies a second proposition in which the subject would stand for the original proposition and the predicate 'true' would be affirmed of it.
Following Hughes we shall refer to this theory (viz. that every proposition implies its own truth) as the entailment theory. This introduction is not the right place for a detailed study of Buridan's solution of the problem of paradoxes. What matters for our purpose here is that he first presents an opinion of which he says that he had that opinion too at one time.
Et sit prima suppositio quod omnis propositio de significatione forrnali significat se esse veram. Et ideo quia consequens includitur in antecedente, quaelibet propositio implicat se esse veram, nam omnis propositio est affirmativa vel negativa. Modo quaelibet illarum significat se esse veram vel saltem ad quamlibet illarum sequitur eam esse veram.
From this passage we may conclude that when writing the Questiones Elencorum he had no objections against the meaning theory, although he preferred the entailment theory himself.
Another text where the subject is discussed can be found in Buridan's commentary on Aristotle's Metaphysics. In book VI question 11 the author argues that some people suppose that every affirmative proposition formally signifies that in every way the facts are as it says they are (qualitercumque significat esse ita est).(18) Now 'that in every way the facts are as the proposition says they are' is considered a truth condition of an affirmative proposition. So it may be assumed that Buridan here refers to the opinion that every affirmative proposition formally signifies that this proposition itself is true: the meaning theory. According to Buridan the defenders of this opinion see the truth but they do not see it completely. Strictly speaking this opinion is not correct (iste modus loquendi vel non est verus vel non est proprius). He politely rejects this opinion with the same arguments as in the Sophismata, although in the Sophismata he seems to be more convinced of his being in the right. In the commentary on the Metaphysics as well as in chapter VIII of the Sophismata his objection against the opinion that every proposition signifies itself to be true is that in this opinion the signification of e.g. 'a man is an animal' would be "that a man is an animal' is true', that is, if the expression 'itself to be true' (se esse veram) is taken materially. This is incorrect, because according to Buridan in the Sophismata, "that a man is an animal' is true' is a proposition about second intentions, whereas the original proposition 'a man is an animal' is a proposition about first intentions. In other words, as formulated in the commentary on the Metaphysics, 'equus est asinus' does not signify the proposition 'a horse is a donkey'; it only signifies horses and donkeys. If the expression 'itself to be true' or 'that a horse is a donkey' is taken not materially but significatively, the opinion would not be correct either, because in that case ' that a horse is a donkey' would not refer to anything (pro nullo supponit), since there is no such thing as a horse being a donkey, and in just the same way there neither is nor can be such a thing as that proposition being true. Now something that does not and cannot exist cannot be signified or asserted, according to Buridan. The vocal proposition 'homo est asinus' signifies the corresponding mental proposition, but in reality outside the mind it only signifies men and donkeys and nothing else. From Buridan's discussion in the commentary on the Metaphysics and the Sophismata it can be concluded that this account holds for propositions that cannot possibly be true, like 'equus est asinus' and for insoluble propositions, like 'every proposition is false'. What does hold for every proposition is that it implies its own truth (comm. onMetaphysics: tamen ad omnem propositionem de mundo sequitur quod ipsa est vera), if at any rate it is formulated (saltem si formaretur).
It is clear that Buridan's theory as well as the arguments he uses to defend it are very similar in the Sophismata and in the commentary on the Metaphysics. The treatment in the Sophismata seems to be more formal, but that can be explained from the context in which the problem is discussed. Chapter VIII of the Sophismata is a logical treatise about the solution of insolubilia, whereas the subject in the commentary on the Metaphysics is the truth conditions of propositions in general and the question whether a proposition can be true and false at the same time.
It is clear that in this connection Buridan 'defends' the opinion he rejects in chapter VIII of the Sophismata and in the commentary on the Metaphysics: the meaning theory.
(14) For a historical survey: P. V. Spade, Insolubilia, in: Cambridge History of Later Medieval Philosophy, Cambridge 1982, pp. 246-253.
(15) G.E. Hughes, John Buridan on Self-reference, Chapter Eight of Buridan's Sophismata, translated with an Introduction and a philosophical Commentary, Cambridge 1982.
(16) Miss Fabienne Pironet is preparing a new critical edition of this text. The Latin text has been taken from her manuscript, which she was so kind as to make available.
(17) Op. cit., p. 106.
(18) A more literal translation of the expression 'qualitercumque significat esse ita est' would be: howsoever it signifies, so it is. However, we prefer the translation given by G.E. Hughes, op.cit., p. 48.
(20) This conclusion is confirmed by Fabienne Pironet: John Buridan on the Liar Paradox in: Klaus Jacobi (hrsg.) Argumentationstheorie, Scholastische Forschungen zu den logischen und semantischen Regeln korrekten Folgerns, Leiden 1993, 293-300. Miss Pironet's study does not include the Questions Elencorum.
From: Ria van der Lecq and H.A.G. Braakhuis, "Introduction" to: Johannes Buridanus, Quaestiones Elencorum, Nijmegen, Ingenium Publishers 1994. | 2019-04-26T02:42:18 | https://www.historyoflogic.com/buridan-logic-two.htm |
0.973895 | In summary, while Beard's (1993b) methods were followed as closely as possible, the results of this exercise do not support the Primatomorpha hypothesis. This is true even when bats are removed from the analysis so that the competing Volitantia hypothesis cannot possibly be supported (Analysis 3). When the results of these phylogenetic analyses are considered together with the results of the character analyses conducted by Hamrick et al. (1999), Sargis (2002d), Stafford and Thorington (1998), and Szalay and Lucas (1993, 1996), as well as the phylogenetic analyses of Bloch et al. (2002), Kriz and Hamrick (2001), Shoshani and McKenna (1998), and Silcox (2001a,b, 2002), the Primatomorpha hypothesis must be rejected. Analysis 2 does, however, support Volitantia (Figures 4 and 5), and this hypothesis has been further corroborated by the character analyses of Hamrick et al. (1999), Stafford and Thorington (1998), Szalay and Lucas (1993, 1996), and Thewissen and Babcock (1992), as well as the phylogenetic analyses of Bloch et al. (2002), Kriz and Hamrick (2001), Shoshani and McKenna (1998), and Silcox (2001a,b, 2002). Based on morphological evidence, therefore, it would appear that the sister taxon of Dermoptera is Chiroptera, not Primates (Bloch et al., 2002; Johnson and Kirsch, 1993; Kriz and Hamrick, 2001; Novacek, 1982, 1986, 1989, 1990, 1992, 1993, 1994; Novacek and Wyss, 1986; Novacek et al., 1988; Sargis, 2002d; Shoshani and McKenna, 1998; Silcox, 2001a,b, 2002; Simmons, 1995; Simmons and Quinn, 1994; Szalay, 1977; Szalay and Lucas, 1993, 1996; Thewissen and Babcock, 1991, 1992, 1993; Wible, 1993; Wible and Covert, 1987; Wible and Novacek, 1988; contra Beard, 1989, 1993a,b; McKenna and Bell, 1997). Again, it seems that Primatomorpha represents an unnatural grouping (see previous section; Sargis, 2002d).
If Volitantia is better supported by morphological studies than Primatomorpha, then what is the sister taxon to Volitantia? Shoshani and McKenna's (1998) analysis supported a Volitantia-Euprimates clade, but Analysis 2 of this study supported a Volitantia-Scandentia clade (Figures 4 and 5). The latter clade has also been supported by the analyses of Silcox (2001a,b, 2002) and Bloch et al. (2002).
The most significant problem with the morphological support of Volitantia is that molecular studies have continually rejected this clade (Adkins and Honeycutt, 1991, 1993; Allard et al., 1996; Cronin and Sarich, 1980; Honeycutt and Adkins, 1993; Liu and Miyamoto, 1999; Liu et al., 2001; Murphy et al., 2001a,b; Porter et al., 1996; Waddell et al., 1999). It is, of course, possible that dermopterans and chiropterans evolved their similarities independently (see above), so Volitantia may represent an unnatural grouping based on convergent, rather than homologous, characters (Sargis, 2002d).
While a Scandentia-Euprimates clade has been supported by cranial evidence (Kay et al., 1992; Wible and Covert, 1987; Wible and Novacek, 1988), such a clade is not supported by this analysis of postcranial data. Alternatively, molecular evidence has repeatedly supported a Scandentia-Dermoptera clade (Liu and Miyamoto, 1999; Liu et al., 2001; Madsen et al., 2001; Murphy et al., 2001a,b) with Primates as the sister taxon to this clade (Figure 1D; Liu and Miyamoto, 1999; Liu et al., 2001; Murphy et al., 2001a,b). A Scandentia-Dermoptera clade is also supported by postcranial evidence when Chiroptera is removed from the analysis (Analysis 3; Figure 6). This clade is supported by craniodental evidence as well, but only when Chiroptera is removed from the phylogenetic analysis (Bloch et al., 2002; Silcox, personal communication). The most probable sister taxon of Dermoptera, therefore, may be Scandentia rather than either Primates or Chiroptera.
The relationship of plesiadapiforms to Euprimates could not be fully assessed here because of missing data in fossil plesiadapiforms, as well as the fact that only postcranial data were analyzed. In recent studies that included craniodental evidence, however, a Plesiadapiformes-Euprimates clade (i.e., Primates, sensu lato) was supported (Bloch et al., 2002; Silcox, 2001a,b, 2002). Plesiadapiforms should, therefore, be included in Primates rather than Dermoptera (Bloch et al., 2002; Silcox, 2001a,b, 2002).
Finally, the inclusion of Ptilocercus in these analyses had significant effects on the results. For instance, when Ptilocercus is used to represent Scandentia in Beard's (1993b) analysis (Analysis 1), the molecular concept of Euarchonta is supported (Figure 3; Table 4), whereas this clade was not supported when Beard (1993b) used Tupaia to represent Scandentia (Figure 2). The inclusion of Ptilocercus also resulted in the identification of morphological synapomor-phies for a Dermoptera-Scandentia clade (Table 4), a grouping previously supported only by molecular evidence. Hence, in studies of primate supraordinal relationships that include comparisons of postcranial characters to those in tupaiids, Ptilocercus should certainly be included in the analysis (Sargis, 2000, 2002a,b,d). Similarly, if tupaiids are chosen as an outgroup in primate phylogenetic analyses that include postcranial evidence, then Ptilocercus should be used as the outgroup because its attributes are more conservative for Scandentia (Sargis, 2000, 2002a,b,d). | 2019-04-23T08:12:53 | https://www.fossilhunters.xyz/placental-mammals/conclusions-1.html |
0.988961 | The human noroviruses are a highly diverse group of viruses with a single-stranded RNA genome encoding a single major structural protein (VP1), which has a hypervariable domain (P2 domain) as the most exposed part of the virion. The noroviruses are classified on the basis of nucleotide sequence diversity in the VP1-encoding ORF2 gene, which divides the majority of human noroviruses into two genogroups (GI and GII). GII-4 noroviruses are the major aetiological agent of outbreaks of gastroenteritis around the world. During a winter season the diversity among the GII-4 noroviruses has been shown to fluctuate, driving the appearance of new virus variants in the population. We have previously shown that sequence data and in silico modelling experiments suggest there are two surface-exposed sites (site A and site B) in the hypervariable P2 domain. We predict these sites may form a functional variant-specific epitope that evolves under selective pressure from the host immune response and gives rise to antibody escape mutants.
In this paper, we describe the construction of recombinant baculoviruses to express VLPs representing one pre-epidemic and one epidemic variant of GII-4 noroviruses, and the production of monoclonal antibodies against them. We use these novel reagents to provide evidence that site A and site B form a conformational, variant-specific, surface-exposed site on the GII-4 norovirus capsid that is involved in antibody binding.
As predicted by our earlier study, significant amino acid changes at site A and site B give rise to GII-4 norovirus epidemic variants that are antibody escape mutants.
The ability of RNA viruses to maintain plasticity as well as functionality in their genome has been well documented as a survival mechanism, allowing RNA viruses to adapt to changes in their environment, maintaining fitness in the viral population . Mutation in vivo can have a number of effects including increasing the virulence of a virus or acquisition of antiviral resistance [3, 4]. An important consequence of the accumulation of point mutations in viral structural proteins is the rise of antibody escape mutants [5–7]. RNA viruses generate this diversity in their genome via the lack of fidelity of the viral RNA-dependent RNA polymerase (RdRp), and the mutants with most increased fitness are selected from the progeny by environmental factors such as the host immune response.
Norovirus is a genus in the Caliciviridae family, that includes pathogens of humans and animals . Human noroviruses are a highly diverse group of viruses with a single-stranded RNA genome made up of three open reading frames (ORFs), . Noroviruses are classified on the basis of nucleotide sequence diversity in the ORF2 gene, which divides the majority of human noroviruses into two genogroups (GI and GII) and approximately 19 genetic clusters within them . The genogroup II-genotype 4 (GII-4) noroviruses have been the dominant circulating strain since the early 1990s , and in 2002 a variant GII-4 norovirus emerged that caused unusually high numbers of outbreaks of gastroenteritis in the summer of 2002, and epidemic gastroenteritis around the world in the winter of 2002/2003 . This variant possessed a 3 nucleotide (nt) insertion in the hypervariable P2 domain of the VP1 protein at position 6265. This epidemiological pattern was repeated in 2006 when another novel GII-4 norovirus variant emerged, however, no insertions or deletions were observed in the genome of this virus (J Gray, personal communication).
Noroviruses are the major aetiological agent of outbreaks of gastroenteritis in the community and in semi-closed settings around the world. During a winter season (September-March), the diversity among the GII-4 noroviruses has been shown to fluctuate, driving the appearance of new virus variants in the population . Studies of the genetic diversity of these viruses have shown that new GII-4 variants appear periodically in the population following evolution of the viruses along neutral networks, and that accumulation of mutations in the hypervariable P2 domain results in antibody escape mutant viruses which go on to cause epidemic gastroenteritis [14–16].
Computer modelling experiments have previously suggested that there are two 3-amino acid motifs (site A and site B) in the hypervariable P2 domain that define the appearance of epidemiologically significant GII-4 variant norovirus strains . Based on these observations, we predicted that these two motifs may be a functional variant-specific epitope that evolves under selective pressure from the host immune response and give rise to antibody escape mutants.
Due to the lack of a tissue culture system and suitable animal models in which to study noroviruses, we synthesised recombinant virus-like particles (VLPs) using a baculovirus expression system based on previously described methods [18, 19]. These VLPs were used to generate monoclonal antibodies (mAbs) in order to test the functionality of site A and site B. We use these novel reagents to provide evidence that site A and site B form a conformational, variant-specific, surface-exposed site on the GII-4 norovirus capsid that is involved in antibody binding, and that as predicted, significant amino acid changes at site A and site B give rise to GII-4 norovirus epidemic variants that represent antibody escape mutants.
Wild-type VLPs were purified from recombinant baculovirus-infected Sf9 cells and were analysed by EM (Figure 1(d)). Negative staining of preparations showed intact VLPs had formed for both strains, and no significant morphological variation was observed within the VLP preparations (Figure 1(d)). Particles were 30-35 nm in diameter, and the surface structure of the particles could be visualised at high magnification (Figure 1(d)). The VLPs were morphologically indistinguishable from native norovirus virions found in clinical specimens, but >10-fold more VLPs were observed per viewing field than are typically observed in clinical specimens.
GII-4 Norovirus Major Sturctural Protein. (a) Schematic representing the norovirus VP1 protein, highlighting the hypervariable P2 domain and putative epitopes Site A and Site B (as described in Allen et al., 2008). (b) Table showing amino acid variation at Site A and Site B in the period 1999-2006, as previously described in (Allen et al., 2008). Strains used in the work described here are highlighted. (c) Model of the norovirus VP1 P domain showing the location of Site A and Site B in the three-dimensional protein (structure from Cao et al., 2007). (d) Electron micrograph showing GII-4v2 VLPs purified from Sf 9 cells, the morphology of which is representative for all VLPs described here. Magnification is 105 000× and VLPs are stained with 1.5% phosphotungstic acid. Scale bar is 100 nm.
The two wild-type expressing plasmid constructs pRN-GII4v0 and pRN-GII4v2 were modified by PCR site directed mutagenesis so that the ORF2 encoded a VP1 protein that was identical to either the GII-4v0 or GII-4v2 parental protein except at either of the putative epitope positions 296-298 (site A) or positions 393-395 (site B), where the protein would be of the heterologous (non-parental) strain (Figure 2). Successful mutagenesis at the target site without alteration of the remaining norovirus insert was confirmed through sequence analysis (data not shown).
Schematic representation of norovirus protein coding region of pRN16 constructs expressing wild-type and hybrid VLPs. Following construction of plasmids pRN-GII4v0 and pRN-GII4v2 expressing wild-type GII-4v0 and GII-4v2 VLPs, respectively, these plasmid constructs were modified by site directed mutagenesis at either putative epitope site A (nt 886-891, aa 296-298), or putative epitope site B (nt 1176-1182, aa 383-395) to generate plasmid constructs that expressed hybrid VLPs. The schematic shows a representation of the region of the plasmid encoding norovirus structural proteins (3'UTR and remainder of plasmid not shown for clarity). PCR mutagenesis was used to generate plasmid constructs that encoded an ORF2 identical to either GII-4v0 or GII-4v2, except at either site A or site B, which was modified to be as equivalent to that position in the heterologous variant. The resulting expressed VP1 protein was a hybrid of the two variants, and so the VLP formed from the hybrid VP1 was antigenically hybrid. Plasmid construct names are given on the left, whilst the hybrid VLPs are represented with VLP names next to them on the right. All GII-4v0 derived regions are shown in solid black, all GII-4v2 derived regions are shown in hatched lines.
All four hybrid VLP-expressing recombinant baculoviruses efficiently expressed VP1 (data not shown). Further, EM analysis of GII4v0/A2B0, GII4v0/A0B2 and GII4v2/A2B0 VLPs formed by mutant recombinant VP1 proteins were morphologically indistinguishable from wild-type VLPs (data not shown). However, the hybrid construct pRN-GII4v2/A0B2 did not form VLPs, despite expressing VP1 (data not shown), therefore the hybrid VLP GII-4v2/A0B2 was not available for subsequent work.
In addition to the hybrid VLPs described above, a reverse mutant construct, pRN-GII4v0/A0B0R, was also generated by back mutation of the hybrid construct pRN-GII4v0/A0B2 by site-directed mutagenesis (Figure 2). This reverted the amino acid sequence at the site B from STA (GII-4v2) back to N~N (GII-4v0). This plasmid was sequenced to confirm the mutation at the target site had taken place, and that no changes had taken place in the rest of the insert (data not shown). The plasmid was used as described to produce recombinant baculoviruses and produce the VLP GII-4v0/A0B0R.
Mice were inoculated with either GII-4v0 VLPs or GII-4v2 VLPs, and five monoclonal antibodies were fully characterised for their isotype, titre and binding specificity (Table 1). Test bleeds from both GII-4v0 and GII-4v2 inoculated mice prior to fusion showed that only a low level of cross-reactivity with the heterologous antigen by ELISA (data not shown).
1Titres were determined by serial dilution between 1:10 and 1:10 000 000 in an EIA. Titres were taken as the reciprocal of the last dilution to give an optical density >0.5 at 450 nm.
Three anti--GII-4v0 mAbs (mAbGII4v0.5, mAbGII4v0.8, mAbGII4v0.10) and two anti-GII-4v2 mAbs (mAbGII4v2.5, mAbGII4v2.6) were characterised for reactivity, isotype and titre. The ability of the five mAbs to recognise their respective homologous antigen that had been chemically denatured was also assessed by ELISA.
Urea treatment of the homologous antigen significantly reduced recognition of the epitope by all of the monoclonal antibodies (Table 1), and urea treatment of the heterologous antigen did not confer recognition (data not shown).
Each of the three anti-GII-4v0 mAbs displayed a slightly different binding pattern, although the data suggested that all three mAbs recognised an epitope formed or influenced by both site A and site B (Figure 3(a)).
Average percent reduction in binding of (a) anti-GII-4v0 and (b) anti-GII-4v2 mAbs to wild-type and mutant VLPs in a cross adsorption ELISA. As described in the Materials and Methods, each mAb was pre-incubated in a blocking step with the antigen indicated on the x-axis, before being transferred to a microtitre plate coated with antigen homologous to the mAbs being tested. Percent reduction in binding was then calculated using a PBS control. Cross absorption assays were repeated 3 times independently and the average data is presented here with bars showing the standard error of the mean. Cartoons representing the antigenic structure of the antigen (as described in Figure 2) are shown above the bars (with corresponding labels below the bars). All mAbs were used at 1:10 000 dilution, except mAbGII4v0.5, which was used at 1:1000.
More than 75% reduction in binding of mAbGII4v0.5 to its homologous antigen (GII-4v0) was observed following blocking with the homologous antigen, whereas no reduction in binding was observed following incubation with the heterologous antigen (GII-4v2). Following replacement of GII-4v0 site A with the heterologous GII-4v2 site A, VLP GII-4v0/A2B0 failed to block any of the binding of mAbGII4v0.5 to its homologous antigen, demonstrating that site A is essential for mAb recognition of the antigen. When the GII-4v0 site B was replaced with the GII-4v2 site B, VLP GII-4v0/A0B2, reduced binding to the GII-4v0 antigen by ~19% indicating that when the homologous site A was intact, partial mAb recognition occurred, but without the corresponding homologous site B, mAb recognition was impaired. Similarly, substitution of the heterologous site B in the GII-4v2 with the GII-4v0 site B (VLP GII-4v2/A2B0) was not sufficient for recognition of this hybrid VLP by mAbGII4v0.5. Importantly, restoring site B to the VLP GII-4v0/A0B2 was sufficient to restore wild-type levels of binding, to >70% reduction.
A 25% reduction in binding was observed following blocking of mAbGII4v0.8 with the homologous GII-4v0 VLP, compared to only 5% reduction in binding following blocking with the heterologous GII-4v2 VLP. Blocking with any one of the three hybrid VLPs resulted in ≤10% reduction in binding; the highest level of reduction following blocking among these VLPs was with the GII-4v2/A2B0 VLP which displays site B from the homologous (GII-4v0) antigen, thereby indicating that mAbGII4v0.8 was able to partially recognise site B, but that complete recognition required the homologous site A to be displayed concurrently. Blocking with the reverse mutant VLP GII-4/A0B0Rrestored binding reduction to 27%, comparable to blocking levels by wild-type GII-4v0. This further supports the observation that both homologous site A and site B must be displayed simultaneously on the virus surface for mAb recognition.
Approximately 68% of mAbGII4v0.10 binding was reduced following blocking by GII4v0 VLP, and only one tenth of this reduction in binding observed following blocking with GII-4v2 VLP. Blocking with any one of the three hybrid VLPs resulted in ≤10% reduction in binding; again the highest level of reduction following blocking with a hybrid VLP was with the GII-4v2/A2B0 VLP which displays site B from the homologous (GII-4v0) antigen, suggesting a role for site B in mAb recognition. Blocking with the reverse mutant VLP GII-4/A0B0Rrestored binding reduction to levels comparable to blocking levels by wild-type GII-4v0, of approximately 70% reduction. This confirmed that both homologous site A and site B must be present for mAb recognition of the antigen.
Both anti-GII-4v2 mAbs behaved the same in competition immunoassays (Figure 3(b)). Blocking of both mAbs with the homologous GII-4v2 antigen resulted in >85% reduction in binding in both mAbs, and blocking with the heterologous GII-4v0 antigen resulted in <2.5% reduction in both mAbs. When blocking was performed using one of the two GII-4v0-derived hybrid VLPs (GII-4v0/A2B0, or, GII-4v0/A0B2), or the reverse mutant VLP, <7.5% reduction in binding was observed in both anti-GII-4v2 mAbs. In contrast, blocking with the hybrid VLP GII-4v2/A2B0 (which is all GII-4v2 except at site B) produced reduction in binding equivalent to that observed with the GII-4v2 antigen of >80% reduction. These data indicated that both the anti-GII-4v2 mAbs recognised an epitope that is variant specific, but is not formed of either site A or site B, alone or in combination.
Efforts to identify sites on the norovirus capsid involved in antibody binding have been hampered by the lack of a cell culture system for human noroviruses , and therefore epitope mapping studies using infectious virus have not been possible. Here we have used VLPs synthesised in the baculovirus expression system (BES) as a surrogate for infectious virus in a mutagenesis study to identify sites on the GII-4 norovirus capsid important in antibody recognition. Previous work has shown that when VLPs expressed in the BES were compared with VLPs expressed in a mammalian recombinant protein expression system, no discernable differences in the biochemistry or structure of the two differently expressed VLPs were observed .
The data presented here show the expression of high yields of VLPs representing two norovirus strains, one from each of the previously identified neutral networks: (i) pre-2002 epidemic, and (ii) 2002 epidemic-200 . These VLPs were used to immunize mice to produce monoclonal antibodies against these strains.
Both the anti-GII-4v0 and anti-GII-4v2 polyclonal antibody responses were generally specific for the homologous antigen, but a low level of cross-reactivity was observed (data not shown). Cross-reactivity is expected in polyclonal serum because the different antibodies present recognise a range of different epitopes, and have different affinities; therefore polyclonal antibodies will, at least in part, recognise a heterologous antigen. However, following sub-cloning by limiting dilution, cross-reactivity was lost as mAbs were isolated. This confirmed the specificity of these antibodies for a single GII-4 norovirus variant strain through recognition of an epitope that was unique to that variant norovirus and offered no cross-reactivity between other GII-4 norovirus variants.
The absence of any cross-reactivity in the EIA between the mAbs and their heterologous antigen also showed that the mAbs were not recognising epitopes from baculovirus proteins or from Sf9 cell-derived proteins. Both antigen preparations were made in the same protein expression system and purified in the same way. Therefore any baculovirus or cell-derived proteins that co-purified with the VLPs were present in both the GII-4v0 and the GII-4v2 VLP preparations used in the immunization of the mice and in the preparation used as antigen in the EIA. Thus any mAb reacting to a baculovirus or cell-derived protein would react equally with both antigen preparations. This is not the case, with all mAbs displaying specificity for the homologous antigen preparation, thereby demonstrating that all five mAbs were raised against norovirus proteins and not baculovirus or insect cell proteins.
Urea treatment of both GII-4v0 and GII-4v2 VLPs revealed the three anti-GII-4v0 mAbs recognised a conformational epitope, whereas the anti-GII-4v2 mAbs recognised a partially conformational epitope (Table 1). Treatment of a macromolecular protein with a chaotropic agent such as 8 M urea will denature the three-dimensional structure of the protein by disrupting the non-covalent intra-molecular interactions such as hydrogen bonding and van der Waals forces. If the mAbs recognised a linear epitope, binding would remain unaffected following chaotropic treatment. However, the epitope recognised by the mAbs must be conformational, as the level of mAb binding to the antigen was reduced following denaturing treatment of the antigen. Demonstrating that the mAbs recognised conformational epitopes was important because site A and site B identified by sequence analysis were shown to be surface exposed loop structures on the virus surface separated by 100 amino acid residues in the linear protein, but in close proximity in the three-dimensional protein (Figure 1(a) &1(c)). Therefore, it was expected that any antibodies raised against these sites would, at least in part, recognise the conformation of the surface structure at these positions, which is why it was important that VLPs were used as the immunogen rather than linear VP1 protein. This was corroborated through the failure to detect a VP1 band in western blots (data not shown).
Site-directed mutagenesis was used to modify the norovirus ORF2 gene in the plasmids pRN-GII4v0 and pRN-GII4v2 at putative epitopes site A (aa296-298) or site B (aa393-395). The aim was to generate both GII-4v0 and GII-4v2 hybrid VLPs which displayed either an heterologous site A or site B. It was predicted that the changes engineered at site A or site B would differently affect the ability of mAbs to recognise the antigen, and so demonstrate the roles of site A and site B as surface-exposed sites involved in antibody binding.
The three hybrid VLPs that were isolated were found to be morphologically indistinguishable from wild-type VLPs as determined by EM, demonstrating that the mutagenesis had no adverse effect on the structural integrity of the VLP. The exception was the hybrid VLP expressed from the recombinant baculovirus BAC-GIIv2/A0B2, which despite expressing VP1 to high levels, did not form VLPs. As no coding errors were observed in the ORF2 gene, and a high level of protein expression was observed by SDS-PAGE, the lack of VLP formation was not due to truncation of the protein, failure of the baculovirus and expression vector to undergo recombination, or failure of the recombinant baculovirus to express the protein. Therefore, it seems most likely that the mutations engineered in the P2 domain were structurally unfavourable and that they either perturb the correct conformation of the protein or interfered with the subunit-subunit interactions, thus precluding particle formation.
It was predicted that the mAbs raised against the GII-4v0 and the GII-4v2 antigens would recognise a site formed of both site A and site B, or would recognise a site formed of one of these sites alone. This was tested in a cross absorption EIA using wild-type VLPs, hybrid VLPs, the reverse mutant VLP and the five mAbs.
All three anti-GII-4v0 mAbs recognised an antigenic region formed or influenced directly by both site A and site B, as replacement of either of these sites abolished recognition of the GII-4v0 antigen by the mAbs. This observation was supported by the data from the reverse mutant VLP. The GII-4v0/A0B2 VLP failed to block binding of the anti-GII-4v0 mAbs to the GII-4v0 antigen, but reverse mutation of site B in this antigen back to GII-4v0 concurrently restored the ability of the antigen to block mAb binding. The conclusion that the anti-GII-4v0 mAbs require both site A and site B for antibody binding reflects predictions made using bioinformatics data . It was noted that epidemiologically significant variant strains appeared in the population following a cluster transition event in which biochemically significant amino acid substitutions (or insertions/deletions) were observed at site A and site B concurrently which itself suggested that both site A and site B are required for defining epidemiologically important strains and allowing GII-4 noroviruses to evade immunity existing in the population.
The back mutation of the hybrid GII-4v0/A0B2 at site B created the VLP GII-4v0/A0B0Rthat had twice undergone site-directed mutagenesis at site B, so that it was structurally and antigenically identical to the wild-type GII-4v0 antigen. This experiment confirmed: (i) that the site-directed mutagenesis process had no effect on the integrity of the antigenic properties of the particle, other than those created by the targeted mutation, and, (ii) that recognition of an unrecognised hybrid antigen by a mAb could be restored by replacement of the mutated site, thus demonstrating that the mutated site was necessary for antibody recognition of the antigen.
The anti-GII-4v2 mAbs recognised only the GII-4v2 VLP and the GII-4v2/A2B0 VLP, therefore demonstrating that these mAbs recognise either an epitope that is dependent on site A being in the structural context of the GII-4v2 antigen, but is independent of site B, or, an epitope that is formed of neither site A nor site B. The former is difficult to evaluate because the VLP GII-4v2/A0B2 was not available, but the latter could be investigated by construction of a GII-4v2 hybrid VLP with site A and site B from GII-4v0, which if recognised by the mAbs, would demonstrate that the mAbs bind a site that is neither site A nor site B. Conversely, if such a VLP was not recognised, this would demonstrate that site A and site B were important for antibody binding, and more detailed mutagenesis studies where individual amino acid residues in the GII-4v2 VLP were mutated would aid in revealing the residues critical for antibody recognition. Whether the five mAbs described here recognise the same or different epitopes remains to be tested in blocking EIAs.
In this study, we have used several well characterised experimental systems in conjunction with in silico models, to identify sites on the GII-4 norovirus capsid that are important in antibody recognition. The use of antigenically hybrid VLPs to study capsid-antibody interactions was used as a surrogate for infectious virus because there is no cell culture system available for these viruses, and our approach of systematic mutation of VLPs led to the identification of two 3aa sites on the surface of the capsid required for antibody binding. Whether the regions identified in this work represent neutralisisng epitopes remains to be investigated, but these investigations remain hampered by the lack of a replicative in vitro system or suitable animal model. It would also be interesting to determine whether the mAbs described here could interfere with the ability of VLPs to interact with histo-blood group antigens (HBGAs) when used in a VLP-HBGA binding assay .
Two faecal specimens were selected from outbreaks that had been characterised by PCR as being caused by a GII-4 norovirus at the Enteric Virus Unit, Centre for Infections, Health Protection Agency, London, UK. The two viruses were: (i) a GII-4 norovirus circulating before the 2002 epidemic, classified as a variant 0 (GII-4v0) virus; and, (ii) a GII-4 norovirus circulating after the 2002 epidemic, and classified as a variant 2 (GII-4v2) virus. Samples were prepared as 10% suspensions in balanced salt solution (Medium 199, Sigma, Dorset, UK) prior to nucleic acid extraction.
Total nucleic acid was extracted from a 250 μl aliquot of the 10% faecal suspension using a guanadinium isothiocyanate/silica method as previously described . Extracted nucleic acid was incubated at 42°C for 60 minutes with 50 pmol of poly(T)-TVN primer in Tris-HCl buffer, pH8.3, 5 mM MgCl2, 1 mM each dNTP, and 200 U SuperScript® III reverse transcriptase (Invitrogen, Paisley, UK).
The genes ORF2 and ORF3 encoding the major structural protein VP1 and the minor structural protein VP2, respectively, and the 3' untranslated region (3'UTR), were amplified by PCR using primers ORF1/2-F1 and TVN-linker. The resulting amplicon 3'ORF1+ORF2+ORF3+3'UTR, was either 2513 bp or 2516 bp in length, depending on the strain. Reactions were performed using High Fidelity PCR System (Roche Diagnostics Ltd, Burgess Hill, UK). PCR amplified amplicons were purified either from solution using Montage® PCR Filter Units (Millipore, Watford, UK), or from agarose gels using Geneclean® Spin Kit (Qbiogene, Cambridge, UK). Both were used as according to manufacturers' instructions.
Sequencing PCR was performed using 10 pmol of primer and 100 fmol template DNA. All sequencing was performed using GenomeLab™ DTCS - Quick Start Kit (Beckman Coulter, High Wycombe, UK) according to the manufacturer's instructions, and a CEQ8000 automated sequencer (Beckman Coulter).
Nucleotide sequence contigs were generated from trace data using the Assembler tool in BioNumerics v3.5 (Applied Maths, Kortrijk, Belgium). Multiple alignment and phylogenetic analysis was performed using appropriate algorithms in BioNumerics v3.5 (Applied Maths). Amino acid sequence data was deduced from nucleotide data and analysed using BioEdit , and also using BioNumerics v3.5 (Applied Maths).
Each of the purified 3'ORF1+ORF2+ORF3+3'UTR amplicons was cloned into the vector pCR2.1-TOPO® (Invitrogen) according to the manufacturer's instruction. The 3'ORF1+ORF2+ORF3+3'UTR amplicon was then modified by PCR using primers deigned to: (i) remove the partial 3'ORF1 sequence at the 5' end of the amplicon; (ii) include two restriction enzyme sites at each end of the amplicons in order to allow for directional cloning into vector pRN16; and, (iii) modify the translation initiation context of ORF2 to match that of the baculovirus polyhedrin gene (PH). The GII-4v0 amplicon was modified as follows: 5'-A-Stu I-Sac I-PH-ORF2-ORF3-3'UTR-Xba I-Stu I-A-3'. The GII-4v2 amplicon was modified as follows: 5'-A-Stu I-Kpn I-PH-ORF2-ORF3-3'UTR-Xba I-Stu I-A-3'. The vector pRN16 contains a region of the Autographa californica nuclear polyhedrosis virus (AcMNPV) around the polyhedrin gene (ORF7 (735)) which overlaps the essential ORF8 (1629) gene. pRN16 was produced by ligating the Bst XI/Hin dIII polyhedrin promoter-polylinker fragment from pAcCL29.1 into Bst XI/Hin dIII cut pBacPAK8 (BD Clontech). After digestion of both inserts and vector pRN16 with the appropriate restriction enzymes ligation was performed using T4 DNA ligase (Fermentas, York) to produce the plasmids pRN-GII4v0 and pRN-GII4v2.
Positive clones were grown overnight in a 50 ml LB broth culture containing 50 μg/ml ampicillin, and the plasmid isolated using a plasmid preparation kit (Plasmid Midi Kit, QIAGEN, West Sussex, or SNAP Midi-Prep Kit, Invitrogen) according to the manufacturer's instructions.
Wild-type sequences for GII-4v0 and GII-4v2 VLPs were mutated in the P2 domain at site previously identified as forming a putative epitope (Figure 1(a)-(c)). Plasmids pRN-GII4v0 and pRN-GII4v2 were mutated in a site specific mutagenic PCR reaction at either a 9 nt site at positions 886-894 (site A), or a 6 or 9 nt site (depending on the strain) at positions 1176-1182 (site B) from the GII-4v0 sequence to the GII-4v2 sequence, or vice versa (Figure 2). For this, the GeneTailor Site-Directed Mutagenesis System (Invitrogen) was used according to manufacturer's instruction, using a touchdown PCR method to mutate and amplify the plasmids. Mutated plasmids were transformed into DH5αT1RE. coli cells (Invitrogen) and purified using SNAP Midi Prep Kit (Invitrogen) according to manufacturer's instruction.
Purified plasmids were used to generate recombinant baculoviruses as has been previously described . Following recombination, a clonal population of recombinant baculoviruses was obtained by plaque purification. The resulting recombinant baculoviruses expressed either GII-4v0 VLPs (BAC-GIIv0) or GII-4v2 VLPs (BAC-GIIv2). Plaque purified viruses were used to seed stock cultures of each virus, and these stocks were titred by plaque assay.
Suspension cultures of Sf 9 cells were infected with either BAC-GII4v0 or BAC-GII4v2 at a moi of 2-3 and incubated at 28°C for 48-72 hours. Virus-like particles were purified from the intracellular phase by treatment with phosphate buffer containing 1% IGEPAL (Sigma Aldrich) and sequential centrifugation steps for clarification, and finally through 15%-60% sucrose cushions to concentrate the VLPs. Fractions were collected and analysed by SDS-PAGE on a 12% polyacrylamide gel (NuPAGE kit (Invitrogen), according to manufacturer's instruction) and electron microscopy (EM).
BALB/c mice were inoculated subcutaneously with 100 μg of either wild-type GII-4v0 or wild-type GII-4v2 VLPs in Freunds incomplete adjuvant in order to produce mAbs. After boosting the mice fortnightly on a further four occasions, the spleen cells were harvested and fused with mouse myeloma cells (NSI) by standard procedures .
The fused cells were dispensed into 96 well tissue culture plates and cultured in RPMI1640+GlutaMAX media (Invitrogen), supplemented with 2% hypoxanthine-thymidine (HT) (Invitrogen), 1% oxaloacetate-pyruvate-insulin (OPI) (Sigma) and 1% antibiotic-antimycotic (AbAm) (Invitrogen). Ten to 14 days post fusion, supernatants from the fusions were tested for antibodies to GII-4v0 and GII-4v2 by EIA as described below. Hybridomas secreting norovirus variant-specific antibodies were then cloned twice by limiting dilution.
Microtiter plates (Greiner Bio-One, Stonehouse) were coated with either GII-4v0 or GII-4v2 VLPs at a concentration of 1 μg/ml diluted in PBS + 0.08% azide at 4°C. A 100 μl aliquot of test supernatants were diluted between 1 in 100 and 1 in 10000000 in PBST, and detection was performed using a rabbit anti-Mouse IgG-HRP conjugate antibody (Dako, Cambridgeshire) at 1 in 4000 dilution in conjugate diluent (Microimmune) and TMB Substrate (Europa Bioproducts, Cambridge).
A 100 μl sample of culture supernatant from each hybridoma was added to coated microtiter plates and antibody isotype determined using a goat anti-mouse IgG1a, IgG2a, IgG2b, IgG2c, IgG3 or IgM (Jackson Laboratories, Maine, USA) antibody, diluted 1 in 2000 in conjugate diluent (Microimmune). Detection was performed using rabbit anti-goat HRP-conjugate diluted 1 in 20000 in conjugate diluent (Microimmune) containing mouse serum (Sigma-Aldrich, Dorset, UK) and TMB Substrate (Europa Bioproducts).
The EIA was performed as described above, but before the addition of the mAb to the plate, the VLP antigen bound to the plate surface was treated with either 8 M urea in PBS or PBS for 1 hour at room temperature. Wells were then washed 3 times with PBST and the EIA performed as described above.
In the competitive immunoassay, monoclonal antibodies were diluted in PBS 1 in 1000 - 1 in 10000 and pre-incubated with either the homologous or heterologous wild-type VLP at a concentration of 1 μg/ml, one of the antigenically hybrid VLPs at 1 μg/ml, or PBST as a control. Pre-incubated monoclonal antibodies were then added to microtiter plates coated with 1 μg/ml of the homologous antigen (as described above) to which the monoclonal antibody was raised. The monoclonal antibody was then allowed to attach, and detected with an anti-mouse HRP conjugate antibody in an EIA as described above. Results are shown as per cent reduction in binding of mAb to homologous antigen (ODtest) compared to level of binding in PBST control (ODPBST): % reduction in binding = ([ODPBST - ODtest]/ODPBST) × 100.
The authors are grateful to Ian Jones (University of Reading) for the gift of BAC10:KO1629 and pAcCL29.1. This work was supported by the European Commission, DG Research Quality of Life Program, under the 6th Framework (EVENT;SP22-CT-2004-502571).
DJA participated in the design of the experiments, conducted the experiments, and drafted the manuscript. RN participated in the design of the experiments, provided reagents and expertise for production of the VLPs, and editing of the manuscript. DS participated in the design of the experiments, provided reagents and expertise for production of the monoclonal antibodies, and editing of the manuscript. JJG participated in the design and coordination of the study, analysis of the data and editing of the manuscript. PR provided reagents, participated in the coordination of the study and editing of the manuscript. MIG participated in the design and coordination of the study, analysis of the data and drafting and editing of the manuscript. All authors read and approved the final manuscript. | 2019-04-19T04:37:31 | https://virologyj.biomedcentral.com/articles/10.1186/1743-422X-6-150 |
0.99896 | It's not just a trench or a peacoat... it's both. I like the belt and the length and will be stalking it in my local store when winter items begin getting marked down.
In real life, it's long sleeved. (Who rolls up coat sleeves anyway?) And it's soft and would look great with a bright scarf.
How fancy would this look with a cocktail dress?
I like this coat (especially for $39) and it would be great for weekends with jeans and tennis shoes. | 2019-04-25T20:05:23 | http://www.cardiganjunkie.com/2010/12/baby-its-cold-outside.html |
0.999999 | The Gods do not forget. And by and by, Zeus wanted to punish Epimetheus for his misdeeds. So he fashioned a woman of clay and gave her the name Pandora.
Context : In the middle of moving a camp I stumbled onto another. | 2019-04-24T22:43:39 | https://www.dayztv.com/video/dayz-the-raid-62-she-who-brings-gifts/ |
0.999999 | The facilities were tired and lacked comfort. Not enough crockery and cutlery. Furniture and bed not very comfortable and cottage in need of a good spring clean.
The current hearing is inadequate. More than one loo roll, I expect to bring or buy provisions, but one loo roll? Put in some comfy chairs, the seating in there is uncomfortable to say the least Up to date information about the area, village, cottage, nearby attractions. Information that is two years old is neither useful nor shows anyone having a thought for the guests At first glance the cottage appeared clean until I used the hoover and moved the chairs, not sure how long the rubbish and stain had been there but I would say at least some months, same under the bed Where is the nearest shop that is noted in the information as 2 miles away? Or is that as the crow flies? I would expect Wi-fi especially as the pub next door gets excellent reception, I know it is not part of the package so this is a suggestion.
We were thrilled by the cottage , lovely and clean , crisp , fluffy towels , more than enough for our stay . The garden was quite big , and our little dog enjoyed watching the birds / bats fly past . Pooley Bridge is only afew minutes drive away , and is a must to visit . We felt right at home . The Village of Dacre was very quiet and peaceful , lovely smell of log burners floated round . The Horse and Farrier pub was next door , very close by but no noise or problems . Dog friendly and nice atmosphere . Ok to take dogs in if you want a meal or snack you just sit in the bar area . The Restaurent part is 'nt dog friendly , which is fine . The facilities at the cottage were very good , kitchen very adequate and clean , bathroom was lovely and fresh with modern fittings . The staircase was abit querky , had to be careful not to bang your head at the bottom of the stairs , but it was all party of the cottages charm .Would certainly stay again , a very good base for the surrounding areas , plus we had glorious sunny days and cool mornings/ evenings but we had a great time . It made our Wedding Anniversary treat a delight , thank you .
What I liked: - idyllic location - character cottage - lots of walks on the doorstep or close by - nice pub right next door What I didn’t like: - the bed was one of the most uncomfortable I’ve slept on in years, too small, horrible mattress and cheap uncomfortable pillows lead to restless sleep - insufficient provision of towels and limited toilet rolls provided - no off road parking as advertised (unless you drive a very small car) - not properly clean But most of all, what really upset me was when the builders arrived early on Wednesday morning expecting access to put up scaffolding to the side of the building. According to what I heard, access had been agreed with the owners and we were only staying there - so it was nothing to do with us. It is totally unacceptable and disrespectful to have not been informed beforehand and to confirm that it wasn’t an issue. Will never return to this cottage and will never book a holiday through Sykes Cottages ever again. Anyone staying in the next few weeks can look forward to a holiday with builders on site!
Only thing was the flies in the cottage done my head in lost count how many i killed.
Desperately in need of some TLC eg exterior paintwork and attention to the garden - it wouldn't cost much to plant a few flowers and some climbing roses, clematis and honeysuckle would have made all the difference. I felt it let the village down :-( However, beautiful location and very accessible.
We still enjoyed our holiday and will continue to book with Sykes, but not at this cottage, it was not for us. We have always found great accommodation at Sykes I will just have to be careful where I book. I am sure most people would have a wonderful time at the Old School.House, Favre is a lovely village and the village pup is great.
Would highly recommend as good base for travelling around.
We really enjoyed sitting by the log burner. Nice garden too with great views of the surrounding hills. Unfortunately the pub next door was closed for refurbishment when we stayed but the cottage is in a good location to easily get to Pooley Bridge and Penrith.
however this was soon to be changed ! On checking the only bed we discovered that the mattress cover was extremely soiled and only covered with a very thin fitted sheet. This called some distress because it is only a one bedroomed property. After spending a night sleeping on the floor the next day we found spare blankets to cover the offending cover. As it was a weekend and knowing the owner was abroad we were restricted in our options but our eyes were opened to other unhealthy cleanliness points. the outside of the toilet pan were heavily urine stained and covered with a thick layer of grime and dust. The bathroom sink appeared clean but under the lip of the sink was a lump of blue toothpaste which had dried on the surface. Under the sink was a waste bin which was covered in thick dust and cannot be claimed as a minor discrecretion but an accumulation over a long period as well as lumps of dust/dirt around it and stretching as far as the sink pedestal. The blind in the lounge area had obviously not been cleaned for some considerable time as could be exampled by the cobwebs and dust clinging to them. There are many more examples of inadequate cleaning (ie dog hairs covering the door mat ), of what otherwise could have been a totally acceptable cottage.We did not wish to spend our limited time in Cumbria by contacting Sykes but have taken photographs of our observations should anyone need to see them. We have used holiday cottages all over the country for many years & feel that 'School House' did not reach anywhere near the standards required for renters or we probably feel Sykes Cottages.
Just spent another wonderful week at this cottage, our forth year in a row. The cottage is very comfortable and cosy with a log burner. Lovely garden for our two dogs and the pub next door run by Susi and barmaid Fran was very homely and welcoming and dog friendly. Looking forward to our next visit!
Lovely place for a romantic getaway. Light and welcoming with everything you need to relax. We will be going back soon.
Cosy, well equipped, dog friendly, good size garden, satelite tv, dog friendly pub next door that serves fab food and real ales. Sleepy village, church is worth a visit, ideal for Pooley Bridge, Ullswater and Steamers. Down side was that there were very few logs/kindling/fire lighters for burner and bearing in mind there are few shops and the amount paid to rent cottage a few more logs etc would not have broke the bank. The bedroom floor sloped badly so the bed was very uncomfortable as the blood rushed to your head so we had to sleep with pillows opposite end to headboard.The bedroom & bathroom heaters didnt come on before bed and on a morning so it was cold at these times and could not find the timer to adjust settings. There is no WiFi and no signal on most mobile networks due to hills so if your wanting to stay in touch with anyone bear this in mind! These little things just took the edge off our stay considering we paid nearly £300!! That said we did enjoy our stay but once these problems are reviewed it would rate from very good to excellent.
lovely cottage, Ideal for a couple, very well maintained. Great pub next door which is also dog friendly. Great location but easy to get to nearby main routes. Would recommend it to anyone.
This charming, well-presented detached cottage is in the small village of Dacre, superbly located in the Lake District National Park, within 2 miles of Ullswater, regarded by many as the most beautiful lake in England.
Built in the 18th century as the village school, this quaint cottage near Ullswater has many original features and provides warm, cosy accommodation, perfect for couples wishing to enjoy the woodburning stove and generous garden.
This Ullswater cottage has one bedroom with original beams and a pitched ceiling, and an open plan living area with kitchen, dining area and a sitting area with beams and a woodburning stove housed in an inglenook fireplace.
The spacious lawned garden outside your Ullswater cottage provides a perfect place to plan your activities while catching the morning sun, or to unwind after a long day.
The tiny village of Dacre is steeped in history with an ancient church and even its own castle!
Not forgetting, of course, the local tavern, conveniently situated next door to this Ullswater cottage, which welcomes visitors with cask ales and traditional bar food.
You will find pubs offering a wider menu in nearby Pooley Bridge.
With Ullswater a short drive away guests can take in the beauty of the lake by embarking on a cruise on one of the Ullswater Steamers.
For the more experienced mountaineer Helvellyn, the third highest mountain in England, is close to hand and of course, the notorious Striding Edge - not for the faint hearted!
A 20 minute drive away is the bustling town of Keswick, situated on the shores of Derwentwater.
This Ullswater cottage is a perfect base for couples, any time of the year.
Note: Stairs in the cottage are narrow and steep. | 2019-04-20T07:19:01 | https://www.sykescottages.co.uk/cottage/Lake-District-Cumbria-The-Lake-District-Newbiggin/The-School-House-15290.html |
0.999978 | Visible Ink Press : Which actor won a best-supporting actor role for 1990's Glory?
Which actor won a best-supporting actor role for 1990's Glory?
He attended Fordham University as a pre-med student but switched to theater after auditioning for a Eugene O'Neal play and unexpectedly winning the part.
His early career included stage work and a role on the popular television medical drama St. Elsewhere.
Among his other movies are Cry Freedom (1987), Malcolm X (1992), and Training Day (2001).
Also a movie director, he co-produced the 2007 movie The Great Debaters with Oprah Winfrey.
Denzel Hayes Washington was born on December 28, 1954, in Mt. Vernon, New York. He attended an upstate private high school, the Oakland Academy, and then entered Fordham University as a pre#med major. Washington did not originally intend to become an actor, but when he auditioned for the lead role in a student production of Eugene O'Neill's The Emperor Jones, he won the part over theater majors. His performance in that play, and later in a production of Othello, led his drama instructor to encourage Washington to pursue an acting career.
Washington's first major role was in the off#Broadway drama A Soldier's Story; Washington recreated his role when the play was adapted into a motion picture in 1984. He played Dr. Phillip Chandler on the television series St. Elsewhere and appeared in a string of films, including Carbon Copy (1981), Cry Freedom (in which he portrayed South African activist Steven Biko; 1987), The Mighty Quinn (1989), Glory (1989), Mo' Better Blues (1990), Mississippi Masala (1992), Malcolm X (1992), Devil in a Blue Dress (1995), He Got Game (1998), The Hurricane (1999), and Training Day (2001).
Washington has expanded his role to that of director in the films Antwone Fisher (2002), and The Great Debaters (2007), which he co-produced with Oprah Winfrey. His latest films include The Book of Eli and Unstoppable, both released in 2010.
Washington's numerous awards include an Oscar for best supporting actor in Glory in 1990; several Golden Globes as well as the Silver Beard Award from the Berlin International Film Festival in 1993, the Image Award from the NAACP in 1999 for outstanding actor in the film The Hurricane (based on a true story about the life of incarcerated boxer Rubin Carter), and for his performance in The Great Debaters in 2007, and an Oscar for best actor in 2002 for his performance in the film Training Day, which also earned best actor awards from the Los Angeles Film Critics Association and the American Film Institute. Washington returned to the stage in 2010 and won a Tony Award for his performance in the play Fences. | 2019-04-23T14:10:18 | https://www.visibleinkpress.com/flashcard.php?id=1491 |
0.999031 | - **7)** Type "default" (all lowercase) into the "Name" text field, or click the magnifying glass button and select "default" from the provided list of [[predefined animation names]]. If you are creating this animation for a character, you will want to use "idle" for the name. + **7)** Type "default" (all lowercase) into the "Name" text field, or click the magnifying glass button and select "default" from the provided list of [[predefined animation names]]. If you are creating this animation for a character, you will want to use "idle" (also all lowercase) for the name. | 2019-04-23T00:46:56 | https://www.rpginabox.com/docs/doku.php?id=floating_anim_tutorial&rev=1499795355&do=diff |
0.997666 | I'm in the process of researching and collecting data on home automation.
What type of camera system can do this? I've seen an X10 Video that does everything, except it sends data to a TV, not a PC.
Also - I've seen the X10.XRay Vision USB Kit which converts Video to USB, and its wireless. But i wanted this to be wired: http://www.letsautomate.com/10865.cfm?
Lastly - what would be a good starter system? I think X10 does everything I need, except everyone is saying that it will be obsolete in a matter of years.
Have you found a weatherproof USB webcam? You might be better off looking at "proper" cameras; either traditional composite video cameras or an IP camera. Henry's is a good source of hardware and advice (http://www.henrys.co.uk/electronics.htm).
Zoneminder can do what you want: http://www.zoneminder.com for Linux.
Have you looked into HomeHub.
This is exactly the kind of application HomeHub has been designed for. Currently it allows you to hook up most types of Webcam and will allow you to record images from it on motion as video or still images. You can also access the live feed from the camera from anywhere over the internet using the secure remote access facility.
HomeHub also supports X10 which as you correctly say will allow you to do just about about anything and is pretty cheap. Yes, it will eventually become obsolete when it is replaced by other "better?" technologies such as Z-wave and Zigbee. However, at the moment these devices are not readily available in the UK and pretty poorly supported.
HomeHub has been designed from the outset to support many different technologies and protocols and as soon as devices emerge for these in the UK we will add support for them. | 2019-04-23T12:24:34 | https://www.automatedhome.co.uk/vbulletin/showthread.php?450-Security-Camera-to-PC-via-USB&s=31b8e885fea5e728e01edd29c7065f7d |
0.998778 | We replaced one server running ESXi 5.5 with a new one with a fresh install of 6.5 I copied all the VM folders to a NAS datastore from older host. Then copied to new host when it was ready. No problems.
For our other server, we were going to also add storage. Before any work, it had two 1.2tb 10K SAS drives in RAID 0 configuration and ESXi was booting off of a partition.
The server had redundant SD card slots (unused), so I installed ESXi 6.5 to SD cards and set server to boot from there. Added two more drives and reconfigured all four drives in RAID 10.
I cannot copy VM folders from NAS datastore to local datastore. I get error that file/folder already exists.
Then I noticed that while I added the datastore and it showed 2.4tb capacity, it shows 930GB of space is provisioned. That's the amount of space that was in use on old server BEFORE I did anything. I reconfigured RAID, so I expect that the drives were completely wiped.
I initially though there was some leftover data on the drives, but I'm sure that's not it. I get same issue if I try to copy a VM file folder to a local datastore on a different ESXi host (different volume UUID).
I'm not sure what I'm missing, but I've been at this for many hours now.
Okay everyone, here is the answer: Pay for VMWare Essentials. This is not a sales pitch, just the reality.
I installed the vCenter and added the hosts to it. I added the VMs to the host while keeping them on the NAS datastore. Then I chose migrate and transferred their storage location from the NAS datastore to the direct-attached datastore. No issues.
As I've read elsewhere, manually moving/copying files is generally a bad idea within datastores.
We're using the free demo of vCenter, but an essentials license for three years is under $700. I spent at least half that much in labor time messing around with this trying to avoid having to buy vCenter. We instructed our purchasing department to get us a license.
I think the issue must be with the VM file copies. I attached a separate NAS file system. When I try to copy a VM file folder from one NAS to another NAS datastore I get the same issue: file or folder already exists. And the volume ID is whatever I'm trying to copy it to.
Sorry...but what did you mean by copy ? Why not use vMotion ?
We are using a free license, so we do not have access to the storage api's. We have two main servers one for each project in our development office, and it's hard to justify even the basic license. I simply right click to a folder in the datastore browser, and copy to another location.
What is the make of the server? What made / model of the RAID card?
@adrian_ych - We are using free licenses for our two servers. This is a development office with one server for each of the two projects here. By "copy" I mean I opened the datastore browser and right-clicked on a folder of VM files and chose copy. Then pasted into another datastore for backup.
@Harry Lui - It's a Dell r720xd with a PERC H710 RAID card. There is fast and slow initialization and I tried both of them. I've reconfigured the disks to RAID5 also and got the same result. They're back into RAID10 now. | 2019-04-20T22:19:00 | https://community.spiceworks.com/topic/1980762-esxi-6-5-datastore-issues-after-raid-reconfiguration |
0.999807 | The story I am about to relate may be of no historical significance, but it furnishes an illustration of the courage and endurance of the women who first visited these shores.
It will be remembered that the third voyage of Cartier, in 1541, was made under Sieur de Roberval, whom Francis the First appointed the first Viceroy of Canada. He was a wealthy French noble of a most determined and cruel disposition. His niece, Marguerite de Roberval, was a member of his household. She was a bright young girl, full of the spirit of adventure of the age, and such a favorite with her uncle that he consented to her accompanying him upon the voyage. Like many another maiden in like circumstances, Marguerite had for some time, unknown to her uncle, been receiving the attention of a poor young cavalier whose love was not unrequited. He could not bear the thought of being separated from his sweetheart, so he managed to enlist as a volunteer with Roberval, and sailed in the same ship with him and his niece. In the course of the voyage the lovers' secret was discovered, and Roberval's affection for his niece gave way to a vengeance cruel and in-human. Off the coast of Newfoundland was an island called the Isle of Demons, supposed to be the abode of evil spirits. Turning a deaf ear to the supplications of the frightened girl, the cruel monster deposited her upon this lonely shore with no other companion to share her solitude than an old nurse. With scant provisions, four guns, and a limited supply of ammunition, he left her to her fate. Her lover was powerless to stay the hand of Roberval, and as the ship was getting under way again, strapping his gun and a quantity of ammunition to his back, he leaped into the sea and with sturdy strokes soon rejoined the heart-broken Marguerite.
In vain they hoped and prayed that their pitiable plight might move the stony heart of the Governor. He never returned. Marguerite and her lover went through the form of marriage as best they could without the aid of a priest. Did ever a couple begin housekeeping under such trying circumstances? They built themselves a rude hut. The wild fowl and fish furnished their table, and from the skins of wild animals they provided them-selves with clothing to resist the cold of the approaching winter.
In the following summer Marguerite became a mother and devoted most of her time to caring for her baby. Her husband had hoped that the cruel uncle would return to relieve their suffering, and the bitter disappointment he experienced crushed his spirit. Grieving over the suffering of his loving wife, he sickened and died. The baby did not long survive him, and the faithful old nurse also succumbed. In the lonely forest this brave young woman knelt beside the graves she had made with her own hands and prayed for strength and courage to bear' up under her heavy burden. Only a few months before, she was the moving spirit in the castle of the "little King of Vimeu," as her uncle was called, and no luxury was denied her. She was his favorite and had often accompanied him upon his hunting expeditions, where fortunately she had become an expert with the arquebuse. His love had changed to hatred. The gayety of the Court was now replaced by the dreadful solitude of this lonely isle. Want and privation, discomfort and fear now con-fronted her, and the three fresh mounds, bathed with her scalding tears, warned her that she, too, was likely very soon to join the only human beings who had shared her misery. Then there would be no tender hands to caress her in her last hours. She did not yield to these despairing thoughts, but deter-mined to meet her fate with a bold front. For eighteen long and dreary months she wandered about the shores straining her eyes for a glimpse of a sail. Three or four times relief seemed at hand as a white speck appearing upon the horizon soon disclosed the dimensions of a ship, only to melt away again, leaving her more lonely than before. The third winter was almost upon her when she again espied a welcome sail. How was she to lure the ship to this dreaded shore the supposed home of mischief-making demons? Mustering all her strength for one final effort, she sacrificed her little store of fuel that she had painfully gathered from the forest and built a huge fire, in the hope that the smoke would attract the attention of the strangers. Nearer and nearer came the boat, a fisherman's barque. With frantic gestures she signaled for help. The fishermen drew near enough to descry a lonely figure, clad in skins of wild animals, wildly gesticulating as she ran along the shore. In doubt as to whether this was a human being or a dreaded spirit, they concluded to solve the mystery and land upon the island, and thus was Marguerite rescued from her perilous situation and shortly afterwards was returned to France after an absence of nearly three years.
Do the annals of any history furnish a more pathetic or a more impressive tale than this? The courage that will lead battalions to the cannon's mouth might well waver when con-fronted with the terrors of the awful exile of this brave young girl. The strength that will carry hardened soldiers through a protracted battle would in most instances succumb to the long months of solitary suffering such as was endured by Marguerite de Roberval.
* Some historians regard this narrative of Marguerite de Roberval as pure fiction, but as careful an investigator as Parkman does not hesitate to accept the story as one of the actual events of our early history. | 2019-04-21T22:08:26 | http://canadiangenealogy.net/heroines/marguerite_de_roberval.htm |
0.999996 | The Church of Scientology has switched strategy to focus on drawing in famous names from Eastern Europe and Asia, according to a new book.
In Battleship Scientology: Exposing L.Ron Hubbard's Dangerous Religion by Tony Ortega and Paulette Cooper, Ortega claims that 'second generation celebrities' are shunning the religion known for having hefty membership costs and other negative associations including mysterious deaths, because they 'have less to prove'.
With actress Leah Remini recently being the most outspoken against the organization she was a member of for 35 years, less people in the US entertainment industry are willing to attach their name to Scientology according to long-time former members.
So the sect founded by American science fiction author L. Ron Hubbard has set its sights on Bollywood, including Indian actress Sheena Chohan, 31, and Mexican singer Michael Ronda, 22, who this month was scheduled to perform at a Celebrity Centre graduation ceremony, The New York Post reports.
'The method for recruiting overseas is that somebody from the US or England will go to countries where they already have business ties and introduce Scientology to their connections,' Fifty-year member Geoff Levin, who left in 2017, told the Post.
Scientology was popularized by stars like Tom Cruise, John Travolta and Kirstie Alley but it more of a taboo subject these days according to Levin.
Speaking of how the focus used to be on recruiting US-based stars for the religion, Levin recalled how Scientology tents would be on film sets such as Cruise's 2005 Steven Spielberg-directed motion picture War of the Worlds.
But the man who worked with the late founder for some time, has now claimed Scientology has been 'declining for the last 20 years'.
There has been a positive response outside of Hollywood, Scientology's former Church of Scientology executive Mike Rinder told the Post.
'There are places where they are having success. One is Taiwan. The others are Eastern Europe and Russia,' Rinder said.
With King of Queens start Remini actively speaking in public about defecting and promoting her TV show Scientology and the Aftermath, targeting stars such as ex-member director Paul Haggis for membership, may have backfired.
'They have created their own nightmare with their reliance on celebrities. You have Leah and Paul turning around [in their beliefs] for all the world to see,' Rinder added.
A church spokesperson denied the idea they have ditched Hollywood because of a bad reputation and insisted they're expanding.
Explaining that it has been practiced in 'Russia, other Eastern European countries as well as in Asia for decades' the spokesperson said it is 'growing around the world'.
'Since 2016, we have opened 16 new churches' and 'launched . . . our own TV network,' the spokesperson told the Post.
Rinder however claimed it was all a guise. | 2019-04-25T03:15:21 | https://culteducation.com/group/1284-scientology/34627-scientology-is-allegedly-remedying-20-year-decline-by-targeting-bollywood-and-eastern-european-stars-after-young-hollywood-ditched-association-with-religion-due-to-bad-publicity.html |
0.998038 | The recently exposed Ponzi scheme by Bernard Madoff is named after Charles Ponzi, an immigrant to the United States, who ran his swindle in 1920, based supposedly on profits from postal reply coupons. He took in a great deal of money for those days that was partly spent on high living. After less than a year he was exposed by a newspaper, and spent many years in jail before being deported back to Italy. In a Ponzi scheme, investors in a fund typically receive good rates of return on their investments for a while because they are paid with new monies that are invested in the fund. Even when such funds do not make bad investments, or when managers do not spend a lot on themselves and their families, Ponzi funds must attract new investors at a rapid rate in order to pay good returns to prior investors. With wasted spending and bad investments, the required growth rate in new monies is even higher. Since high growth rates of new investments are hard to maintain over time, eventually Ponzi funds collapse. Then comes the day of reckoning as investors are shocked to discover that they have been duped, and have lost most or all of what they invested. Ponzi-type swindles probably go back to Greek and Roman times Over 50 years ago I had a wealthy uncle who invested with an individual who seemed to be doing remarkably well with a secretive investment strategy: he paid high returns in the form of monthly dividends, and allowed people to withdraw their investments. My uncle not only increased his investment, but advised other family members and friends to do the same (my father was either smart or lucky enough not to do so). After a couple of years the manager vanished, and investors lost all they had given him. It turned out that he was paying these good dividends not from returns on his investments, but from the new funds he was raising- a typical Ponzi scheme. While he did not lose most of his considerable wealth, my uncle went into a year-long depression after he found out he had been "taken". What was unusual about Madoff's swindle is that it continued for over two decades, and was the largest Ponzi scheme ever uncovered, with perhaps $50 billion lost or missing. It was also the first fully international Ponzi scheme, with investors from Europe, the Middle East, and China, as well as mainly from the US. One hedge fund, the Fairfield Greenwich Group, put over $7 billion into Madoff's fund, and encouraged others to invest in it as well. Bernard Madoff is a 70 year old apparently affable but retiring, person who did not live especially lavishly. He was very active in Jewish circles, so that, many of his investors were wealthy Jews, such as Jeffrey Katzenberg, Steven Spielberg, and Mortimer Zuckerman, and Jewish organizations, including the Eli Weisel Foundation and Yeshiva University. The enormous scope of Madoff's swindle raises two obvious questions 1) how could this scheme go on for so long without being exposed, and 2) how could so many sophisticated individuals be taken in by a fund that provided almost no information on how it was able to achieve consistent returns of from 8-13 per cent for many years during both good and bad times? In regard to the first question, various hedge fund managers were puzzled by how Madoff could make such consistently high returns with the information provided about what he did. Apparently, one claim was that he placed both put and call options on say the S&P 100 index. That might make money when stocks are falling rapidly, but the fund should have lost money on average during the mainly good years of the scheme's existence. One former hedge fund manager, Harry Markopolos, reported him for a decade to the SEC and also to state regulatory bodies. The SEC conducted some rather superficial investigations, but nothing much came of them-the SEC is now looking into why the swindle was not discovered much earlier. I believe this is another illustration of what has happened frequently, namely, that regulators too get caught in the hype surrounding an investor, or the economic viability of different banks. Of course, it is well documented that after a catastrophic event, many "obvious" signs are discovered that if taken seriously could have prevented the event. For example, after 9/11 it was revealed that the FBI did not investigate carefully warnings that some major terrorist act was being planned. This was also the case with the Japanese attack on Pearl Harbor. Roberta Wohlstetter in her outstanding book, Pearl Harbor: Warning and Decision, explains why the Japanese plan to attack Pearl Harbor was not discovered despite the considerable prior intelligence about their plans for an attack. This is also the case with the Madoff swindle, which makes it more puzzling. Why did many sophisticated individuals, funds, and other organizations entrust so much money to his management, and to management by various intermediaries, without doing any significant amount of due diligence? Part of the answer is that these individuals are not sophisticated in financial matters, and each successive set of investors assumed that previous investors had done some investigation. This led to an example of "information cascades", where private information is revealed sequentially over time to different individuals. Later participants can be badly misled if the information of earlier participants is far from accurate. Moreover, Madoff had developed an outstanding reputation. He was a respected member of the financial community and exclusive social circles, and a former president of the Nasdaq Stock Market. He helped pioneer electronic trading of stocks, and continued this profitable stock trading business while independently building up his asset management business. He did not let everyone invest with him, so that those who were accepted felt privileged. His activities went on for so long without exposure that newer and older investors alike considered his investments to be legitimate, even if secretive. He bolstered his clients' confidence by quickly refunding investments to anyone who asked. Stock markets are not fully efficient, and a small number of investors, such as Warren Buffet, can consistently do better than the major indices over very long time periods. However, markets are sufficiently efficient that such a record is extremely difficult to maintain. It takes very many years to establish a good investment track record that is due to skill instead of a good record due to plain luck. The numerous investors not well versed in financial matters have great difficulty appreciating that there are no magical or secretive ways to consistently beat the market. This is why when anyone asks me for advice, I recommend buying a diversified portfolio of stocks and other assets that controls risk while providing decent returns. Some money managers may be able to beat that in the long run, but it is extremely difficult to discover who they are. As a result, most investors looking for exceptional returns are likely to be taken for a ride either by charlatans, or by lucky fund managers whose luck eventually runs out.
A ``person who did not live especially lavishly''? A $7M apartment in NY, a $9M mansion in Palm Beach, a $3M beach house in Montauk, a 55 foot fishing boat, a yacht moored in the south of France, and half ownership of a $28M private plane?
I agree with diversification in general, with the addition of not letting diversification becoming substitute for spending some time and effort trying to understand each investment.
Dear Gary, if it turns out to be true, that on November 7th, 2005 the SEC has received a very detailed complaint about what is going on I think the SEC is liable for the scam. I do not expect investors to continue to have any faith in US capital markets and their regulators if us government turns away investors with their claims by saying it is your fold. Not acting on such a detailed complaint is a crime.
An innate proclivity to commit the "denial of the antecedent" fallacy on a regular basis pragmatically requires education to tame.
The media, an instrument of education for the masses, unfortunately isn't interested in spreading the wisdom of efficient market theory. "Mad Money" and trading tool infomercials spouting technical analysis nonsense are the ruling religion of the day.
Keep the good faith. Fight the good fight. Your blog is a step in the right direction.
–æ—Ç–ª–∏—á–Ω–æ. –≤—ã—Ä–∞–∂–µ–Ω–∏–µ –º–æ–∏—Ö –º—ã—Å–ª–µ–π –ø–æ –ø–æ–≤–æ–¥—É –≤ —Å–ª–æ–≤–∞—Ö.
I think a lot of investors are willing to outsource their investment decisions and not ask questions so long as the returns are good. And even when the returns are good, investors will push their managers if they discover that their neighbor is somehow doing even better. The good news is that the current economic situation and the Madoff revelations will compel people to act more responsibly. Investors must always be active and involved in their own investments. And investors need to make sure that their own greed does not overpower their need for security.
As for Madoff, what interests me is not that he ran a Ponzi scheme, but rather how he ended up running a Ponzi scheme. Coming from his background, I have a hard time believing that he decided from the start to create a massive Ponzi scheme that he knew would eventually blow up and ruin his good name. I think he started off doing a typical hedge fund. When times weren't so good, he sold some of the invested assets to fund overinflated returns to his investors, expecting that to attract new investors whose money he could use to reconstitute the sold assets. In other words, he may have been borrowing a page from Keynes -- when times are tough, sell assets and pay out good returns; when times are good, pay out lower returns and use the remainder to repurchase the assets.
Looks good on paper, except we all know that it just doesn't work. Selling assets when times are bad and buying assets when times are good is generally a losing "sell low, buy high" strategy to begin with. And investors don't stop demanding high returns just because the market improves.
Of course, it may be that Madoff intended to start a Ponzi scheme from the start, thinking that he had found a way to create one that would not crash and burn like all those before it. But he just doesn't seem to fit that profile to me. We shall see.
This will undoubtedly prompt a new outcry for heavier regulation of Wall Street. Maybe some of that is necessary. But as I see it, what’s mainly needed is a heavy dose of caveat emptor. As Dr. Becker points out, the warning signs were there. I think that there’s a limit on how far government can go in preventing people from doing stupid things (or making stupid omissions).
Media reports indicate that the auditing of the fund was inadequate. Adequate auditing seems to me to be the best way to ensure that funds are going to investments, rather than to a Ponzi scheme. I’m not sure what regulations are in place to see to it that an auditor is up to the job on the scale required, but perhaps they need to be augmented (or put in place, if they don’t already exist).
The knee-jerk reaction to this scandal along with all the others will be to add layer upon layer of new regulation.
While the new regulation may do an adequate job of correcting prior problems there will always be guys just a little smarter (maybe) and a little more dishonest (always) than the next guy.
The fact that wealthy individuals lost money is not a shock. Making money and keeping money are two different skills.
Did Madoff really think he would get away with that? I mean, he must have known that one day, sooner or later, or even very later, people would find out and send him to jail. If I devised a Ponzi scheme, I would try to get as much money as possible in a short period and then travel to a sunny country without extraditon to the US or elsewhere. But living in New York for years, knowing that every minute someone could find out, that you would go to jail for the rest of your life and lose all what you have?
I admit, that is psychology, not economics; but for me this remains the real enigma.
The market IS NOT efficient. Example: well published results (see, most recently, Andrew Lo's book 'Hedge Funds') show the very simple technical strategy of longing each day's biggest positive movers and shorting the biggest decliners would have delivered SPECTACULAR returns in the 80's and 90's accounting for transaction costs and risk. And that the opportunity declined to zero in the late 90's and 00's. This is one of many technical strategies with similar return behavior in recent decades. There was an inefficiency in the market, and investors gradually discovered it and exploited it away. But over decades, not the much shorter timescales needed to justify idiotic and poorly informed 'the market is efficient!' statements that regularly spout from academic mouths. Is any of this ever acknowledged? What about strong return performance of funds like Renaissance and Goldman's Global Alpha (which, even including recent terrible performance, still destroys the market even on a risk-adjusted basis)? The market is in a state of some inefficiency, enough so that a number of investors (not just Buffet) can regularly beat it, but not enough that the average investor can. Agreed that it takes years of investment performance (and details beyond just yearly return) to tell the difference between luck and skill in investment success - this central fact is the reason swindlers can succeed, and that is what should be emphasized to investors if one wants to capture the real truth of the situation. Saying 'the market is efficient!' as well just spreads poor understanding and suggests those who work at generating returns in the market are all swindlers. They're not.
I agree with James Markels above. Although it's just a hunch, I'm guessing that Madoff probably ran an ordinary business for quite some time, and then only needed to start scheming when things went bad. I wouldn't be surprised if he told himself that when he turned things around, he'd make up the money he lost. Typical gambler mentality - need more money to win back what you lost already.
Diversification wouldn't have protected an investor from grievous declines this year. The only strategy that would have done that (other than staying in cash) is hedging. John Hussman, Ph.D., of Hussman funds hedged his Strategic Growth Fund, and so shielded his investors from the worst of the market declines.
Under your theory that anybody who consistently beats the market must be a scam artist, how do you know that Warren Buffet or any other money manager with consistent good results is not scamming?
Madoff was in business for almost 50 years and for most of it he was managing other people's money and providing good but not spectacular returns. For a great many investors, those facts alone would have provided a great deal of comfort.The huge amount of 20-20 hindsight being exhibited now by many is totally unconvincing.
It is also not clear what exactly would have been discovered by an SEC investigation. He clearly had money under management. The question is whether he had sufficient funds to cover all the amounts reported in the statements he issued to his investors. If he had enough funds to cover the amounts he reported he was managing, how would the SEC or nay other investigator have discovered that he was telling his investors (collectively) that he was managing a much larger amount than the amount he was reporting?
"Ponzi Schemes", in the heart of the legitimate financial world? Looks like someone has taken a page from the "American Gospel of Success" - "There's a sucker born every minute" and why do you think it's called "SPECULATION".
The problem is clearly a lack of transparency that the SEC was supposed to provide.
And now the Financial Investment Banks that have taken money from the Nationally sponsored Bailout do not wish to report how that money is being used.
When are we going to learn and force these guys to toe the line and operate in the National Interest?
Aaah yes......... "transparency". And to think I used to read CPA generated 10Q and K's.......... what are those worth today????????? In an "efficient market?"
Anon., Guilt and Innocence has nothing to do with it. A few need to be tarred and feathered and run out of town on a rail as a warning to others. Justice works in strange ways at times.
This is not the largest Ponzi scheme. That title would have to go to Social Security.
On a separate note, for smaller than Madoff investors I recommend Bernstein's book, "The Intelligent Asset Allocator". Pretty much agrees with Prof Becker.
Not to excuse Madoff but it is interesting to consider what constitutes a Ponzi scheme; is it intent?
Consider Amazon operated at a loss for years, ostensibly plowing all of its revenue into buying market share and striving to preempt competition while its stock rose on expectations of profits certain to come as its founder indicated would be the case. But suppose his model was flawed and Amazon went down as did so many other dot coms?
Then with the dot com frenzy in full swing, WERE there hucksters who had no intent of ever being profitable and intentionally just sold a story, churned some dollars for a while (as was, apparently, part of AOL's "business plan" for a while) go public and "diversify" the capital raised.
Or, more topically, did very savvy investment bankers REALLY think that they HAD invented something that made the "old" 5 : 1 lending ratio obsolete and that going out to 30 : 1 was a viable business practice?
Or? By offering returns far above the historical norm to their investors for selling what MANY insiders MUST have KNOWN was junk also guilty of running illegal Ponzi schemes? Or where they just frisky young capitalists willing to take just a bit more risk in order to maximize returns for their stockholders? Did they think they could reduce their exposure to risk, IF, or before asset prices flattened or fell?
By comparison, did Madoff, think, or hope that after "buying customers" with high returns and getting his fund to some size that he could catch up by lowering returns while maintaining most of his client base? Probably not, and I assume there are some rules against running funds in a manner that returns more than was earned in a given year.
But what of those lending at 30 : 1? That would make 5% loans yield something like 150% on equity. Would a CPA using generally accepted principles endorse such returns as "earnings?" or denounce them as lucky winnings from wild-azzed gambling? or outright fraud?
Èíòåðåñòíûé, ïîëåçíûé è ïðîñòîé ïîñò! Ðåñïåêò! | 2019-04-23T04:07:22 | https://www.becker-posner-blog.com/2008/12/the-madoff-ponzi-scheme-becker.html |
0.999227 | where and standard errors are in parentheses. Test the joint significance of the regression.
Standard errors are in parentheses. Assuming . Test the joint significance of the regression.
Find the value of at which the function is maximised.
Find the value of at which the function is minimised.
Test the hypothesis that the marginal effect of w.r.t is zero when .
Test the hypothesis the marginal effect of w.r.t is zero when .
where standard errors are in parentheses and RSS=7.36. Calculate the RSS of a model which imposes the hypothesis that the coefficient in is unity.
where standard errors are in parentheses and RSS=7.36. Imposing the hypothesis that the coefficient on is unity and is zero yielded a RSS of 7.95. Calculate the value of the test for the hypothesis.
Using the result given the earlier question regarding earnings equation for the sample of 2714 individual young workers in the U.S. [National Longitudinal Survey of Youth 1979 (NLSY79)], calculate the value of (3 decimal places).
Using the result given the earlier question regarding earnings equation for the sample of 2714 individual young workers in the U.S. [National Longitudinal Survey of Youth 1979 (NLSY79)], calculate the value of (2 decimal places).
Using the result given the earlier question regarding earnings equation for the sample of 2714 individual young workers in the U.S. [National Longitudinal Survey of Youth 1979 (NLSY79)], which of the following is the best interpretation of the coefficient on the variable .
On average females earn 25.1% less than males, holding all else constant.
On average females earn 28.9% less than males, holding all else constant.
On average females earn $0.289 less than males, holding all else constant.
On average females earn 0.289% less than males, holding all else constant.
On average females earn $28.9 less than males, holding all else constant.
Using the result given the earlier question regarding earnings equation for the sample of 2714 individual young workers in the U.S. [National Longitudinal Survey of Youth 1979 (NLSY79)], if the variable is replaced by the variable . Which of the following statements would be correct interpretation of the coefficient on .
On average males earn 0.251% more than females, holding all else constant.
On average males earn 33.5% more than females, holding all else constant.
On average males earn 28.9% more than females, holding all else constant.
On average males earn $28.9 more than females, holding all else constant.
On average males earn 25.1% more than females, holding all else constant.
A 1 unit increase in schooling increases expected earnings by 8.5%, holding all else constant.
A 1 unit increase in schooling increases expected earnings by 8.2%, holding all else constant.
A 1 unit increase in schooling increases expected earnings by 0.082%, holding all else constant.
A 1% increase in schooling increases expected earnings by 0.082%, holding all else constant.
A 1% increase in schooling increases expected earnings by 8.2%, holding all else constant.
Using the result given the earlier question regarding earnings equation for the sample of 2714 individual young workers in the U.S. [National Longitudinal Survey of Youth 1979 (NLSY79)], suppose you drop the variable ethnic3 and instead include the variable ethnic1. What would be the coefficient estimates on the variables ethnic1 and ethnic2. | 2019-04-26T10:30:22 | https://warwick.ac.uk/about/london/study/warwick-summer-school/courses/econometrics/quizquestions/multipleregression/ |
0.999999 | AP - The judge in the Michael Jackson molestation trial Thursday spared jurors from seeing a graphic piece of evidence when he barred prosecutors from showing photographs of the pop star's genitalia.
AP - Bo Bice might have lost out to Carrie Underwood on the "American Idol" finale, but the one who's really upset is Corey Clark.
AP - With nearly 30 million people watching the "American Idol" finale on Fox, broadcast television networks ended a season that gave everybody something to brag about — except NBC.
AP - Mariah Carey is celebrating her Sweet Sixteenth. The diva notched her 16th No. 1 hit on the Billboard Top 100 singles chart this week with the ballad "We Belong Together," off the album "The Emancipation of Mimi," which has sold more than 2 million copies after less than two months on the charts.
AP - Get ready for Tommy Lee as an undergrad, two separate dance contests and apprentice rock stars, apprentice chefs, apprentice fashion designers, apprentice scholars, apprentice slackers and apprentice Hiltons.
E! Online - Quentin Tarantino and Robert Rodriguez are in the house. Make that Grind House.
AdWeek.com - A handful of particularly big gainers, with revenue growth of 20 percent or more, were what drove the top 60 regional agencies in the U.S. to post slightly better overall revenue growth than that of Adweek's 33 graded national shops in 2004.
Playbill - It was a novel, a film and a TV series, and now The Ghost & Mrs. Muir is a stage musical, beginning previews in Los Angeles May 26 toward and opening June 3. James Barbour and Lynne Wintersteller star in the title roles.
E! Online - The Force--let alone common sense--was definitely not with them.
AP - Simon Callow, Jane Horrocks and other celebrities will perform for Queen Elizabeth II at a concert marking the 60th anniversary of the end of World War II.
AP - Authorities have arrested two Chechen citizens in France and the Netherlands in connection with the November slaying of Dutch filmmaker Theo van Gogh, prosecutors said Thursday.
AP - In a new interview, Angelina Jolie says she "thinks the world" of Brad Pitt — but never slept with him.
AP - Nearly 36 years after a man was stabbed to death during a Rolling Stones concert at Altamont Speedway, investigators have closed the case, dismissing a theory that a second Hells Angel took part in the killing.
Reuters - Indian-born international filmmaker Ismail Merchant died suddenly on Wednesday in a London hospital, a spokesman for his London office said.
Reuters - Chevy Chase is zooming back to the big screen for his first studio feature since 2002's "Orange County."
Reuters - Miramax Films golden children Quentin Tarantino and Robert Rodriguez are teaming up to make a film for the new company established by the studio's founders, Bob and Harvey Weinstein.
E! Online - This week, Carey scored her 16th number one single on Billboard's Hot 100 with "We Belong Together"--putting her in rarefied company.
E! Online - Garth Brooks has got a good thing going--his engagement to fellow country star Trisha Yearwood.
AP - Saxophones were an informal trademark for America's first rock 'n' roll president, but a new exhibit at Bill Clinton's library shows a much broader range of musical connections, from Bono to B.B. King, even from an Eritrean lute to a Czech recorder.
Reuters - Mariah Carey notched her 16th No. 1 on the Billboard Hot 100 singles chart Thursday with "We Belong Together," ending the four-week reign of Gwen Stefani's "Hollaback Girl."
AP - Shortly after Carrie Underwood was named the new "American Idol," she was greeted by an enthusiastic and important fan: A top executive at the company that will put out her first recording.
AP - Live Aid founders Bob Geldof and Midge Ure confirmed Thursday they are planning a star-studded concert to fight poverty in Africa — but insisted it wouldn't be Live Aid II. | 2019-04-22T15:57:57 | http://powerasp.net/news/entertainment-news-2005-05-27.asp |
0.999996 | The practice of focusing extra attention on 'C/D borderline' pupils in order to improve a school's GCSE results may be widespread. But at what cost?
The words come easily to the teacher as he describes what happened at the school where he was working last year. "Appalling", "unbelievable" and "ruthless" are among those he chooses to sum up measures the comprehensive, in London, put in place in a bid to raise its GCSE results.
And yet he is merely describing a practice – taken in this case to the extreme – that appears to have been tacitly encouraged in many schools for years.
The practice is for schools – sometimes acting on the advice of government agencies and consultants – to focus extra resources, time and attention on groups of middle-ability pupils whose achievements are most likely to help them rise up the league tables, impress inspectors, hit improvement targets and, in some cases, avoid closure.
In the process, higher- and lower-ability youngsters can receive less support because their results are less likely to affect the school's published scores, it is widely claimed.
This extra emphasis given to middle-ability students who are believed to be on the cusp of achieving five A*-Cs at GCSE, including English and maths – the threshold measure around which league tables centre – has been criticised by all three major parties.
The education secretary, Michael Gove, has spoken out against it, and reportedly promised last year to reform league tables to stop it happening. But are the days of schools lavishing extra attention on pupils who are often known simply as "C/D borderliners" really about to end?
The teacher got in touch to complain about a series of decisions his school's leadership, working with private consultants, was making to try to bring about much-needed gains in the proportion of pupils achieving five A*-Cs at GCSE, including English and maths. The school was towards the bottom of national league tables. | 2019-04-21T22:44:49 | http://www.youris.com/picked_up/schools_focusing_attention_on_middleability_pupils_to_boost_results.kl |
0.998831 | A new study presents a simple way to deal with out-of-control raccoon populations: scare their appetite away with the sound of barking dogs.
Raccoons on B.C.'s Gulf Islands have been living the good life for more than a century, ever since their natural predators were hunted off the islands by humans.
The raccoons spend day and night on the shoreline, gorging on seafood, which has had a detrimental effect on the intertidal ecosystem.
But in a study published Wednesday in Nature Communications, one ecologist presents a simple solution: scare the raccoons' appetite away with the sound of barking dogs.
"We found that raccoons substantially reduce their foraging when they're perceiving the presence of scary dogs all around them," said University of Victoria PhD candidate Justin Suraci.
The lead author of the study found that the beach came back to life after the raccoons became more wary of the open landscape.
"They spend 66 per cent less time on the shoreline eating, and that reduction in their feeding was sufficient to have a huge benefit for the crabs and fish that they eat."
Ecologists have suggested for years that the fear of large predators could have a positive effect on ecosystems. The theory is that by keeping their prey in check, predators can protect the plants and smaller animals that their prey eat.
Suraci saw an opportunity to test this theory when he noticed raccoons on the Gulf Islands spent a lot of their time gorging on seafood because they had little to fear.
"Some of these beaches on the Gulf Islands are simply loaded with raccoons," he said.
"They barely ever look up from foraging."
Suraci and his colleagues set up five speakers on several beaches and played various sounds, ranging from barking dogs to sea lion sounds. They found that while the raccoons ignored the sea lion sounds and continued eating, they reacted immediately to the perceived presence of dogs.
"Our research definitely supports the idea that the natural re-colonization of large carnivores should be supported," said Suraci.
He says this is the first time the role of large carnivore fear in food webs has been demonstrated in an experiment.
The perceived presence of dogs, triggered by barking sounds, may be enough to scare the raccoons for a few months, but they will soon overcome that fear said Suraci.
"They're going to realize that bark has no bite eventually and they're going to start ignoring it."
Long term change would require the actual reintroduction of the raccoon's natural predators, like cougars, wolves or bears, he said.
"There are potentially some short term targeted management applications you can do with just the sound of fear, but essentially if you want to do long term ecosystem restoration, you're going to really have to actually bring the large carnivores back."
Ecologists often point to the reintroduction of wolves in Yellowstone National Park as an example of how carnivores can rejuvenate an ecosystem. The wolves kept the elk population in check, which in turn gave the overeaten vegetation a chance to recover, according to Suraci.
Local residents may not like the idea of cougars coming back to inhabited parts of the island, but Suraci says people can look to Europe for examples of success. Wolf and bear populations there are starting to recover after centuries of hunting.
"Through proper outreach and education, the local communities are dealing with them quite well," he said.
"I think similar things could happen here in the Gulf Islands."
To listen to the full interview, click the link labelled: Scaring raccoons is good for the ecosystem says research. | 2019-04-18T15:54:19 | https://www.cbc.ca/news/canada/british-columbia/scaring-raccoons-with-barking-dog-sounds-brings-gulf-island-ecosystem-back-to-life-1.3465730 |
0.998428 | Before the year began, Milkway Manufacturing estimated that manufacturing overhead for the year would be $175, 500 and that 26,000 direct labor hours would be worked. Actual results for the year included the following: Actual manufacturing overhead cost $182, 300 Actual direct labor hours 20, 800 If the company allocates manufacturing overhead based on direct labor hours, the manufacturing overhead for the year would have been (Round intermediary calculations to the nearest cent.) $41, 900 overallocated. $41, 900 underallocated. $6, 800 underallocated. $6, 800 overallocated. | 2019-04-18T17:16:12 | https://www.transtutors.com/questions/before-the-year-began-milkway-manufacturing-estimated-that-manufacturing-overhead-fo-2577674.htm |
0.999384 | The following items can be freely accessed by prospective and new users of any version of Exl-Plan.
Download a 90-page manual for all versions/editions of Exl-Plan (other than Basic and Free) as a Word DOC inside MANUALEXL.ZIP (160k). Alternatively, view/download it as an Acrobat PDF MANUALEXL.PDF (490k) - you will need Acrobat Reader - or view it as a web page.
Exl-Plan Basic is supplied with a separate 100-page manual ( MANUAL_EXL-PLAN_BASIC.PDF - 871k) which can also be viewed online as web pages.
Exl-Plan Free is supplied with a separate 95-page manual ( MANUAL_EXL-PLAN_FREE.PDF - 1000k) which can also be viewed as web pages.
A comprehensive Business Plan Guide and Template is included with all versions of Exl-Plan.
Note: Copies of manuals (in Word or PDF format) are included in the download files for all versions of Exl-Plan.
This handy Quick Start Guide will lead you through installing, running and exploring Exl-Plan.
The following online How to .. tutorials are relevant to all versions of Exl-Plan and Cashflow Plan. They are based on the Super version (US/Canadian edition) of Exl-Plan. Bear in mind that this is one of the more powerful and comprehensive versions - Free, Basic, Micro, Lite and Pro are (much) less elaborate while Super Plus, Ultra and Ultra Plus are more detailed.
The tutorials have been based on Excel 5, 7, 8, 95, 97, 2000, XP and 2003. If using Excel 2007, 2010, 2013, 2016, see Frequently Asked Questions for Using Excel 2007, 2010, 2013, 2016 for more information.
Set Up Excel (2 min.); Enable macros before loading Exl-Plan. If using Excel 2007, 2010, 2013, 2016, it is important that you review the Frequently Asked Questions for Using Excel 2007, 2010, 2013, 2016.
Get the Basics (4 min.): View the key elements of Exl-Plan.
Get Started (6 min.): Set up and enter assumptions.
Generate 5-Year Projections (11 min.): Enter detailed assumptions.
Copies of tutorials are included in the download files for all versions of Exl-Plan.
We offer comprehensive support to purchasers of Exl-Plan. Aside from giving assistance on specific issues relating to the installation and use of Exl-Plan, we also provide general guidance on expanding Exl-Plan or using it for more specialized or less conventional applications.
Your copy of Exl-Plan includes a 90-page manual (Word or PDF format) for all versions of Exl-Plan. It can be found inside the EX* folder and accessed via the Start > Programs > Exl-Plan menu.
If you need help with 'getting started', refer to the topic/section entitled "Using Exl-Plan".
If you need help with entering assumptions, check the "Guidance on Entering Assumptions" topic/appendix.
If you need help with expanding Exl-Plan, refer to "Changing Exl-Plan".
Exl-Plan also includes a series of Flash-based tutorials (running for 19 minutes) covering setting up Excel, getting started, the basics and using Quik-Plan. These can be accessed via the Start, Programs, Exl-Plan menu.
Refer to the accompanying README.DOC file which will be found inside Exl-Plan's folder (i.e. EX*).
Look through the extensive Frequently Asked Questions for Users.
Tip: Once this page loads, use your browser's Find facility to search it for relevant key words.
If none of the foregoing sources resolve the issue, contact us by fax or phone or use this Contact Form. The Contact Form is the best route on account of time zone differences etc. - we strive to respond to all support queries within 24 hours. When first making contact, you should provide some reference to your purchase e.g. date, order number, purchase service and so on.
Refer to Installation & Running Notes and the online tutorials above.
Review Loading & Running Problems at the Frequently Asked Questions for Newcomers and, if using Excel 2007, 2010, 2013, 2016, the Frequently Asked Questions for Using Excel 2007, 2010, 2013, 2016.
If Exl-Plan partly installs, you may be able to access the README.DOC file inside Exl-Plan's folder (i.e. EXL*).
Your registered user name and/or organization.
Your current version of Exl-Plan (i.e. Basic, Micro, Lite etc.).
Approximate date (or serial number) of the invoice/delivery note or confirmation email sent by us when you originally purchased Exl-Plan.
The desired version of Exl-Plan.
Get full details about trading up here. You can also use the above procedure to make a free switch to the latest release of your current version of Exl-Plan.
Your copy of Exl-Plan includes a 95-page manual (PDF format). It can be found inside the EX* folder and accessed via the Start > Programs > Exl-Plan menu.
Exl-Plan also includes a series of Flash-based tutorials (running for 12 minutes) covering setting up Excel, getting started and the basics of using Exl-Plan. These can be accessed via the Start, Programs, Exl-Plan menu.
If you still have a difficulty, use the Contact Form and we may be able to give additional help. | 2019-04-20T10:37:49 | http://ftp.planware.org/exlsupport.htm |
0.999123 | A court's heard Coleen Rooney was subjected to a blackmail plot involving hundreds of personal photos on her stolen camera.
Jennifer Green, 25, and Steven Malcolm, 42, both from Manchester, are accused of demanding the cash from the celebrity wife of Manchester United and England striker Wayne Rooney.
Both defendants were arrested after Coleen Rooney's mobile phone went missing while at a concert at the MEN Arena in Manchester in May 2010.
Green, of Heaton Park Road, and Malcolm, of Silkin Close, both deny blackmail and handling stolen goods.
Green's partner, Lee Platt, has already admitted handling stolen goods and blackmail, the jury heard.
Malcolm walked into the foyer of the Marriott Hotel and identified himself to the undercover officer, the court was told.
He handed over the folder of photographs and the camera memory card - and was promptly arrested, the jury heard.
Shortly after, Green and Platt were then "desperately'' calling his mobile phone and they were "starting to panic'' with "three-way traffic'' between their mobile phones, but they were getting no response from Malcolm, who told police he was acting on instruction from his "bosses'', the court was told.
Platt later pleaded guilty to the charges but Green gave a "no comment'' interview to police after her arrest.
The jury was told it was not known whether the Samsung digital camera was stolen from Mrs Rooney's person or from the private box she had been in at the MEN arena while watching a Black Eyed Peas concert on May 24, 2010.
After a telephone call to Manchester United, Mr Stretford was made aware of the demands for the return of the camera and spoke to the man named as "Liam Price''.
In a statement read to the court Mr Stretford said during the phone call Price told him he "wanted to do the right thing'' after buying the camera for between £200 and £300 either from a pawn shop or off eBay.
Mr Stretford offered to buy it from them plus expenses for any inconvenience, but then there was a demand for more money. "He told me he thought it was worth a lot more and he said £1,000,'' Mr Stretford said in his statement. I told him he was being very silly and I would call the police if he continued this line."
The court heard Hello magazine was contacted on September 7, 2010, by Liam Price who spoke to Rosie Nixon, an assistant editor at the publication.
The conversation was tape recorded and played to the jury.
The jury then heard from the undercover officer, given the pseudonym 'Pc James'.
Pc James said there was a discussion with Liam Price, who the prosecution say in the conversation with the officer was actually Steven Malcolm, the man on trial, where £5,000 was demanded because the cash would have to be split between three or four people. The two then agreed to meet the next day for the exchange of cash for the camera at the Marriott Hotel in Manchester City Centre, where Malcolm was arrested. | 2019-04-22T04:53:03 | https://www.capitalfm.com/manchester/radio/news/local/two-court-over-rooney-blackmail/ |
0.99842 | 1. Preheat oven to 400 degrees. Lightly fry mushrooms in a skillet in hot oil for 2-3 minutes, cap side down.
2. Arrange the mushrooms in a 9x13-inch baking dish with cap side down.
3. In a small bowl, mix together garlic, butter, thyme, garlic powder, lemon juice, salt and pepper. Spoon the mixture on each mushroom. Lightly press the breadcrumbs on top.
4. Either refrigerate for later use or bake immediately in the oven for 15 minutes or golden around the top. | 2019-04-20T06:43:44 | http://www.cookingwithcrevolyn.com/2014/11/roasted-mushrooms-with-garlic-and-thyme.html |
0.962497 | a. Two 90mm wheels that each contain a built-in BLDC motor. The power rating for each motor is 550W and the voltage rating is 24V.
b. Approximately 24V battery in 6 series 2 parallel (6S2P) configuration.
Using the formula P = IV, the max total current usage per motor would be 22.917A.
Does the weight of the person riding the skateboard affect any of the parameters for the project?
Does an ESC that is rated for 6S(24v) and 30A suffice?
Say my project requires a maximum of 30A (an example), what's the difference between using a 40A ESC and a 100A ESC?
Not the ones you have stated. The cargo weight effects the acceleration at any fixed power setting. It also effects the maximum speed you can go uphill at any fixed power setting.
You say the maximum operating point is 24 V and 23 A, so a 24 V and 30 A rating should suffice, if the specs you quoted really are the worst case.
Say my project requires a maximum of 30A (an example), whats the difference between if i use a 40A ESC and a 100A ESC?
Each should be able to handle the problem. The higher power unit will likely be larger, heavier, more expensive, and possibly less efficient at low power levels.
Acceleration current is I=(Vavg)/Rdc (motor coils) is up to 10x max rated (e.g.10x22.9A= 229A on full start.
From Physics, F=ma, so mass certainly affects acceleration and heat loss when it starts at 5500 watts and reduces to 550w rating at some speed and load due to generated back EMF. Obviously, it cannot dissipate 5kW very long without overheating. The ESC job for a propeller is much lower mass.
Sounds big, but you must work out the weight, size and heat loss of battery capacity, ESC and motor for heat rise.
About 250% You need to control 230A worst case unless you get better specs.
This is why you should not try to learn Physics more before trying to design something.
Others with far more design skill than you in China and have had millions of skateboards recalled and lawsuits due to fires.
You've had a few cautionary warnings, but let's add another: Large lithium ion battery packs are effectively firebombs if mistreated and you must as a result treat this project with great respect. You need to make sure your battery charge and protection circuits are up to snuff and you should probably use thermal protection and possibly even heat sink your batteries. Regardless of what you build, treat it with great respect and caution.
a. 2 90mm wheels that contains a built in BLDC motor in each. The power rating for each motor is 550W and the voltage rating is 24V.
Your motors are wheel motors so they're hopefully high torque, but it wouldn't hurt to mention the kV rating.
That is a serious, high powered battery pack. You need to make every effort to ensure that it is charged properly, not overcharged or over discharged or discharged at too great a rate, that it does not overheat, is not punctured and is able to dissipate power. Making sure it is shock isolated, mechanically secure and isolated from moisture would be wise. When building it's enclosure/shroud, put thought into how the battery case will vent if it does explode.
Yeaaarp. Note that you don't necessarily have to run them at absolute full blast.
Yes, this will affect your max velocity, your velocity of maximum efficiency, and how hard the motor has to work to maintain any given velocity.
-ESCs with built-on waterblocks or heatsink and fan arrangements are readily available, and you may want to consider closed loop water cooling. Whatever your cooling arrangement, you not only want to keep ESCs cool to improve efficiency, but you should also ensure that they are not transferring their thermals to the battery pack.
Switching regulators have efficiency curves and some types have lower efficiency at low load, so depending on the regulator, using an overpowered regulator may cause your efficiency to suffer. Find efficiency curves on datasheets or manually test it. Ideally your motor's maximum efficiency range should be close to intended operating speed and the ESC should have either a flat efficiency curve, or be close to max efficiency at the drive current required to pull the skateboard under intended circumstances.
A final note about the battery packs, if you can find flat ones with just a single layer of batteries you can probably cool them more easily.
Not the answer you're looking for? Browse other questions tagged power brushless-dc-motor motor-controller remote-control torque or ask your own question.
Extra Shottky Flyback Diodes on FET-based BLDC Motor Driver?
I want to make an RC skateboard that can easily take my weight and move me around. How do I go about deciding the electric power system? | 2019-04-24T08:13:54 | https://electronics.stackexchange.com/questions/395832/difference-between-lower-and-higher-current-rated-escs-and-electric-skateboard-q |
0.99997 | What Impacts Storage Array IOPS?
Here's what you need to know when it comes to input/output operations per second in physical storage.
Storage performance is an increasingly important consideration for companies that are buying new storage. For those new to storage, input/output operations per second (IOPS) is often a primary consideration. There are some important factors that impact the overall IOPS capabilities of a storage array.
While perusing the Web sites and marketing materials for storage vendors, customers will often run across the IOPS metric. IOPS is basically a performance component that indicates how many individual reads and writes a disk can handle. For example, a typical SATA disk can do about 70 IOPS. It's important to note that IOPS values are impacted dramatically by other factors. For example, when using a RAID 6 configuration, every write operation to an array actually requires 6 I/Os -- or 6 IOPS -- thanks to the need to write multiple copies of parity information. As such, suppose an array supports a maximum of 1,200 IOPS and it's configured with RAID 6. Assuming that there are 100 percent writes on this fictional array, that would mean that only about 200 actual I/O operations could be supported.
...and it becomes very apparent that vendor IOPS claims require very, very careful scrutiny.
Reads aren't generally impacted by RAID overhead, so arrays almost always perform better when there are more reads. So, in order to buy storage that has the right performance characteristics, it's really important to have a rough idea of the read/write ratio, especially if you're using RAID so that you can buy storage with enough IOPS to support needs. When you look at vendor-provided stats, make sure that you're looking at real-world figures that have some basis in reality.
When it comes to traditional hard disks, IOPS is also impacted by the way that data is being written to the disk. Because hard disks spin really fast and use read and write heads that float over the disk platters, IOPS is maximized on hard disks when applications use sequential I/O patterns. Think of it like painting a line on a highway. The paint trunk just drives down the road with the pain nozzle engaged. It's an efficient method.
Now, suppose that paint truck was forced to just paint short lines in random locations all over the county and it had to write those lines in a specific order. As you can imagine, the process would take much longer to execute. The same hold true for random I/O on hard disks. Because the read/write heads and platters need to constantly realign, random I/O can also reduce overall IOPS potential.
As you are reviewing different storage products and the listed IOPS claims, bear in mind that other storage factors -- RAID level, block size, and I/O patterns -- can have a dramatic impact on overall array performance. | 2019-04-24T17:09:03 | https://esj.com/articles/2014/05/05/storage-array-iops.aspx |
0.998522 | It Was 40 Years Ago Today (almost) when Helen Halmay interviewed the Beatles before their only San Diego concert (August 28, 1965, at Balboa Stadium). Halmay, who was 20 at the time, says she has a few regrets.
"Nobody who interviewed them asked for their autograph.... I had never been to a press conference before. I didn't know I didn't need tickets since I was with the press. After the press conference, we went out and went in through the gates. I thought, 'By God, if I bought tickets, I'm going to use them.' Do you know how much those tickets would be worth if I had saved them?"
Of the 28,000 tickets available, fewer than 18,000 were sold for $3.50 and $5.50. The Beatles reportedly earned $50,000; promoters, $6000.
What questions did reporters ask the Beatles?
"People tended to ask them what they thought of San Diego. That was really dumb. They had never been here before, and they had just gotten off the bus. My one question was 'What's your favorite American TV show?' I think they said The Man from U.N.C.L.E."
Halmay, who was the society editor for the weekly La Mesa Scout, says she "asked my owner/editor/publisher if I could cover it. He said, 'None of our readers are interested in the Beatles.' " Halmay got permission to go (off the job) and bought her own film to take pictures.
"They are not very exciting. It just shows them sitting in a row at a table." She says all four were heavy smokers. "I guess I've forgotten how much people used to smoke in those days."
As it was with Balboa Stadium, Halmay says the La Mesa Scout "...never made it out of the '70s." | 2019-04-26T00:16:02 | https://m.sandiegoreader.com/news/2005/aug/18/it-was-40-years-ago-today/ |
0.999938 | What is a Provenance and why do I need one?
I have attempted to insure my painting as a separate item and the insurance company has asked me to provide a provenance. What is a provenance and where do I get one?
A provenance certificate or statement is handy if you are insuring or re-selling a painting (eg at auction or privately). It is just a history of the work – ie who painted it, who has owned it over the years - and would probably include receipts of purchase and other supportive material.
Sometimes it will list where the painting has been exhibited and possibly provide extra information about its particular story, which might make it more valuable (ie if it were selected for a prestigious exhibition at, say, the Gallery of NSW) or in an artist’s retrospective exhibition or a travelling show. It is also a guard against forgeries (though what’s to stop someone forging a certificate I have no idea!).
In the case of your painting I imagine that the artist (or his/her agent) would have issued you with a receipt and the artist would have signed the painting. That should really be sufficient proof of ownership and authenticity. (It would also be a good idea to include a photograph and description, including frame, for your insurers).
Should your insurers require additional information about your painting I suggest that you contact the gallery where you purchased it and ask for a simple statement of your transaction. If you purchased it direct from the artist he or she should supply a similar statement.
For insurance purposes you may wish to check the current value of your painting. Sometimes that will be more than you paid for it or less (sorry, you don't want to hear that!). Check recent auctions to see selling prices of comparable works by the same artist but also consider replacement costs (ask your gallery or the artist). Then I guess you will weigh up the cost of insurance premiums against that information.
When we had our gallery, Port Douglas Gallery of Fine Art, in addition to a receipt, we would issue purchasers with a certificate which described the size and medium of the work, as well as its title. Also, as a caution to the new owner, a clause that copyright laws applied to the work was included, and the client was provided with a copy of the artist’s CV. I think we also noted whether freight and freight insurance were required. That was also useful for our own records.
If the painting subsequently changed hands several times, those transactions could have been added to the information that we provided, thus adding up to a solid 'provenance' for the painting.
I hope that helps you - and will satisfy your insurer!
Thanks for asking the question ; I hope the answer will also be of interest to others.
Pleased with the information. Never thought or considered insuring my works.
Good point and super explanation.
In your interesting article about the Golden Spiral, you've mentioned that the total spiral length = 1.618 or thereabouts if the height of the initial rectangle is 1. There seems to be some error here. If the height, as you say, is 1 unit then the length of the spiral should be Pi/(2(1-k)) where k ~ 0.618 which would make the total length about 4.112398 units and this is not too difficult to prove. Here's a simple proof: Length of the spiral in the first square = 2Pi*1/4 = Pi/2. In the second square it would be = Pi*k/2 where k = 1 - (1+V5)/2~0.618. The total length of the spiral = (Pi/2)1+k+k^2+...=(Pi/2)(1/(1-k)= 4.112 approximately.
As far as I understand what you're trying to do, it's to get the length of an infinite number of half semi-circumferences, all scaled down by a factor of (Phi - 1 ~ 0.618), right?
If you take a golden rectangle (1 x Phi) and draw an square (1 X 1) inside this rectangle, then you have the original golden rectangle divide in one square (1 x 1) and other golden rectangle ((Phi - 1) x 1), you can repeat this procedure with the new golden rectangle and always you get the same composition a square with a golden rectangle; now, if we pay attention to the scalation factor between each rectangle, it's easy to demonstrate that this factor is Phi - 1 always.
golden spiral length = a0 + a1 + a2 + a3 + . . . + an + . . . + until you get tired.
until the end of this era.
I stand corrected in the calculation submitted. The length will, in fact, be half of 4.1120...i.e. 2.05602 for if the side of the square is 1 unit then the radius = 1/2 and thus length of spiral = 2*Pi*r/4(1-k) = Pi/4(1-k)=2.05602 approxly.
I must confess to not being a mathematician. From a practical, artist's point of view the 1:1.618 works fine. Have you tried to construct a rectangle or spiral using the proportions mentioned? The golden mean is a well tested theory but you may well be right in your calculations.
Any other maths whizzes like to join in this discussion?
Thanks for taking the time to contribute.
I have looked at art work on this site and can't find out how to buy and for what price.
Without a basic price guide what is one to guesstimate for costs. My clients would not want to deal with such unknowns.
price range for 11 X 17 or 24 X 36?
Which artist or artworks are you interested in purchasing?
There are a number of contact forms on the site, including one on the left in the navigation bar, so the best thing is to fill in one of those forms and I shall pass your enquiry on immediately to the artist concerned if I can't answer your query myself.
but most artists are making new work all the time so we can send you up-to-the minute information if you tell us the sort of work that you are looking for and a rough idea of your price range.
Hi I live near Townsville and have opened an on-line boutique selling second hand and vintage designer fashion. I'm looking into millinery but a lot of feathers aren't up to scratch and I would like to create something a little more interesting.
So I would like to look into silk feathers, developing and painting my own unique feathers for hats and fascinators etc. if you already know someone who does this that would be fantastic! But if not...where do I start?
Is it best I find an artist to work with or learn the art of silk painting my self? Is there anyone in the Townsville area I could contact? Any information would be wonderful.
I am just getting into millinery and looking for a reliable supplier for feathers, veiling etc. I'm kinda lost on the internet. Any ideas would be appreciated.
If you need a couple of sites to check out on feather dyeing try www.flyangleronline.com or ginabellousdolls.com. Both of these will show you how to dye feathers in the microwave.
You need to use hot water dyes either Jacquard acid dyes or Rit which is now available in Spotlight. Both of these work really well.You have to break down the natural oils which are in the feathers.
If you are using off the ground eg chook feathers it pays to put them into a freeze for a couple of week just bag and tag. This will kill any mites. Also silver fish love fresh feathers I mean ones that have not been dyed.
For some other ideas you can sticky tape and spray with spray paint. I just use the ones from Bunnings or there are others like the design master range.
You can also acid your feathers by dropping them into a bath of good bleach but don't leave them there too long as you will have a stick left(ostrich feather come up the best).
When you have the right effect you need to run them under cold water to get the bleach out and stop it working.
I am a fulltime milliner in Rockhampton and have been doing a lot of my own dyeing, aciding and feather work for the past 6 years. Also if your feathers are not the best you might need to find yourself a different supplier. Also nothing a bit of cutting, trimming and manipulation will not fix. just think outside the box. sometimes you need the whole chook to get a look.
There are some great suppliers on ebay for feathers.
There is a ton of info on how to dye feathers on the internet.
Look for info from folks who tie fishing flies. They are experts at getting consistent color and their directions are precise.
Emma, sorry to say that my experiment with dyeing feathers was not successful. I used my normal fibre reactive dyes but didn't take into consideration the wax / oil that is on the feathers and this, of course, resisted the water-based dye.
Maybe people who dye feathers successfully use something like hair dyes?
Sorry I couldn't help. Have you looked at the commercial dyed feathers on sale via the internet? They mostly look very glamorous.
Good luck - let us know how you get on and how your business is going?
That's a great idea! I am sure that feathers will add to the interest of your vintage clothing.
However I think that it would be so difficult to make feathers out of silk and really, Nature does a pretty good job.
I googled 'dyed feathers' and found a couple of really good sites that sell a variety of feathers from quite large birds such as ostriches to much smaller ones. I think that the fibre reactive dyes that I use on silk would work on feathers. I shall see if I can find some on the beach and try it out for you.
Maybe you could get feathers from a bird or wildlife park - imagine how stunning lorikeet feathers would be!
Your idea of using dyed and painted silk in your business sounds excellent. Painting with dyes is great fun and I expect that your local arts group would have a teacher available.
I plan to write a small e-book about silk painting so that might interest you when it is done. So check out this site in a couple of months - I shall let people know via the newsletter too, so maybe fill in the little form in the nav bar if you would like to receive that.
I would like to know where, in the Cairns area, are various Art Courses held?
Of course there are also classes at TAFE and JCU but maybe you mean hobby-type ones rather than certificate or degree ones?
Cairns Regional Gallery regularly holds workshops in conjunction with exhibitions as well as a children's programme. Good luck! | 2019-04-19T11:26:01 | https://www.art-in-tropical-australia.com/your-questions-archived.html |
0.998937 | Summary: On her first day at her new boarding school, Paige discovers a mysterious little kitten in the building. When she befriends her, she has no idea of the magic that will now be coming her way.
With her parents going off to work in Dubai for a year, 9 year old Paige is rather reluctantly packed off to boarding school. It's a big change for her, but meeting new best friends and room-mates Shannon and Summer on her first day helps her settle in quickly. Then there's the mysterious little kitten, Velvet, that keeps popping up all over the place, even though no pets are allowed at the school, and no one quite knows where she is coming from. When extraordinary things start happening whenever she is around, the three girls start wondering whether Velvet might even be a bit magical, and that's where the fun really begins. When the school comes under threat, can Velvet help them save the day?
It would be hard to read this book and not think of the obvious comparisons to the Harry Potter series. Charm Hall, like Hogwarts, is a British boarding school, where magical things happen to otherwise normal kids, and there are lots of adventures afoot. I didn't think this book was as enchanting as Harry, nor does it have any danger, thrills or the potential to turn into a multi-billion-pound industry, but it was certainly very sweet. I think the book would appeal to a younger audience, and isn't as unisex as Harry (the boarding school is all girls, 99% of the other characters are female too). It also had a touch of Enid Blyton to it, as Charm Hall in some ways resembles a Mallory Towers for the 21st century.
The book is quite ordinary in lots of ways - the plot is fine if a little predictable though there is some suspense towards the end. However the characters of the girls don't seem to have that much, well, character. Then again, at 130 spaced pages including some pictures, it is quite a short book anyway, so you can't expect all that much. What the book does have going for it, however, is that it is book one in a series which means you can gradually build up the characters and the themes over a few books as readers get in to them. Definitely readable, I think junior school girls might like this one.
Thank you to Hodder for supplying this book.
For another tale of friendship, secrets and mysterious goings on, readers might enjoy Secrets, Lies and My Sister Kate while if it's fantasy you like, The Invisible Girl is also worth a look. Or if you like the idea of a series of books about the same characters who you can really get to know, the Stage School set could be another one to pick up.
You can read more book reviews or buy The Magic Begins (Charm Hall) by Tabitha Black at Amazon.com.
This page was last modified on 16 April 2018, at 15:58. | 2019-04-22T18:42:09 | http://www.thebookbag.co.uk/reviews/index.php?title=The_Magic_Begins_(Charm_Hall)_by_Tabitha_Black&action=history |
0.997551 | Q: What is the origin of the term "Lady of the Lilies"?
A: The expression "Lady of the Lilies" has its roots in the Canticle of Canticles (2:2). Starting in the tenth century, symbols of the Canticle were applied to Mary. One of these symbols was the lily, standing for perfect beauty and purity. The expression lilium inter spinas taken from the Canticle (2:2) was introduced in the litany of Loreto (1578) and in the Little Office of the Immaculata (by A. Rodriguez, 1617). | 2019-04-19T00:27:27 | https://www.udayton.edu/imri/mary/l/lady-of-the-lillies-origins-of.php |
0.998612 | Hi. I'm still alive, just mostly buried until a giant pile of notes and textbooks and study guides, swimming in a pool of my own tears. See also: Exam week.
This weekend wasn't super exciting, except for that Ken and I got to see my brother's a cappella group, After the Bar, perform as the opening act for Keystone A Cappella. It was really fun, and I was the world's proudest big sister ever.
The best part is that it is easily distinguishable from our floor, which was not the case with our former table.
Apparently, having our table delivered was entirely exhausting, because I went back to sleep for another 2 hours before heading out to Starbucks. I set up camp there and didn't leave for 7 hours, minus the 30 minutes I took to eat dinner with Ken at Chipotle. My friend, Julianne, came to study with me and she reminded me that yes, I do have friends in med school. She is pretty much the best and I need to hug her to thank her for her friendship and sanity-saving this weekend.
Med Student 1: Med Student 2 came over and was freaking out because she can't figure out how to turn this light on.
Me: I know, she was under the table for awhile trying to fix it.
Med Student 3: That could be a mitigating factor.
See also: How many med students does it take to screw in a lightbulb?
Med Student 1: Are there educational goals?
The rest of Sunday was spent studying, again until almost 4 am, which resulted in sleeping until 10 am today, and subsequently missing my appointment to get my car's oil changed and figure out why the engine light randomly lit up. Because that's what I needed this week.
Anyway, this weekend, my brain felt totally overwhelmed and overly full. There were many times I wanted to give up. There were many times that for an hour or two, I did give up. I just closed my notes, picked up my knitting, and watched an entire episode of something without trying to also outline something or cram information into my brain. During exam weeks, if you were to ask me how I was liking medical school, I'd probably tell you that it sucked, I hated it, and that I wished I could just go back to my office job where someone paid me to essentially organize large piles of paper while drinking coffee made by the office Keurig. If you asked me whether you should consider going to medical school, I would probably tell you to have your head examined and to pick something that was less expensive, less time consuming, and less stressful. When I left the library yesterday, I wanted to run screaming from the building and not look back.
That all sounds pretty terrible, huh?
I have to keep reminding myself that about a year ago, I was waiting for secondary applications for medical school and was hoping and praying to any deity that would listen that I would eventually be accepted somewhere. I slept, ate, and breathed med school applications. Whether I would be accepted consumed my every waking thought, and probably most of my dreams as well. When I was finally accepted in February, it was a huge weight that lifted off of my shoulders, if only momentarily, to be replaced with the much heavier load of, "Oh God, I'm going to go to med school." Regardless, I was finally getting to achieve this dream.
When people say, "Living the dream!" it's often sarcastically. You can almost hear the eye roll, the exasperation, the wish to be anywhere else, doing anything else. In fact today, I said to a classmate, "Yup, just living' the dream," and she chided me saying, "You should be more excited about it!"
You know what? She's right. All 162 of us in this class are living the dream. The dream that at some point, none of us knew would be a reality. Out of over 5,000 applicants, we are part of the 3% that made the cut. There are plenty of people out there waiting for another admissions cycle, praying and hoping that they too can get to live their dream of becoming a physician. Sure, the dream may certainly feel misguided at times, and this week, I kind of feel like I'm living a nightmare instead of a dream, but this is it. This is what I wanted. For better or worse.
Eventually, Friday will come, I will take my exam from 8-12, and then I will go home and collapse into bed. Then I will reset my life and we will start this entire thing all over again. In a mere 60 days, we'll take our final exam for the first semester of our medical school careers, and then we'll be 1/8 of the way to being doctors. This is not a drill!
We are all living the dream... or a reasonable approximation thereof. I have to remind myself how damn lucky I am to be able to say that. It truly is a privilege, and I hope that all of you can say that you too, are living your dream.
Oh I loooove the table!! | 2019-04-21T18:34:23 | http://www.mindovermotherblog.com/2014/10/living-dream-or-some-reasonable.html |
0.999999 | Moss's Egg. Task -1- Find the area of the shaded region inside the two circles shown below. The two large circles have a radius of 6cm.
The area of the small circle can therefore be calculated using the formula indicated: , where A equals the area and r is the radius. Thus: A = (32) = 9 � 28.3 cm2 Task -2- The same circles are shown below. Find the area and perimeter of the triangle ABC. a) In order to determine the area of triangle ABC, we must adopt the formula: , where b is the base and h is the perpendicular height. From the information we are given, we know that the base of the triangle is 6 cm in length, as we know that this is the diameter of the small circle and that the base extends to its ends (A to B).
Linear Function: y=ax+b First, I use two points of (1955, 609) and (1985, 1070) from the given data to find the parameters of the function. I chose these two points because they are the only two combinations that are all integers, which will be easier to calculate. 609=1955a+b 1070=1985a+b Finding value a and b by using simultaneous equation: 1070=1985a+b - 609=1955a+b ________________________________ 461= 30a a = ?15.37 b = 609-1955�15.37=29439.35 Which gives the equation of y=15.37x-29439.35 as below: Graph 2: Population of China 1950~1995 with linear function It appears to be rather fit to the coordinates.
Math IA -Modelling Population Growth in China.
It is of course not perfectly linear because the growth of a population would not be perfectly linear. This data is close to linear but it is not perfectly linear. A linear function is plausible. This is a graph with the data points on it as well as a linear function: y = 15.496x - 29690.2501 The function of the parent linear function is If in the TI-84 calculator you do a linear regression. You first need to put all the data from the years 1950 to 1995 into L1 and the corresponding population data into L2. After you have put the data in the L1 and L2 lists. After the data has been entered into the lists.
Math Portfolio - The Koch snowflake investigation.
On the middle part an equilateral triangle is drawn. And this continues in the following stages. Below are the values for the first 4 diagrams, . n Nn Ln Pn An 0 3 1 3 1 12 4 0.57735 2 48 0.64150 3 192 0.67001 (5 s.f) Number of sides Initially there is an equilateral triangle at stage n=0, each of those sides is divided into 3 sides. And there is another equilateral triangle created at the center points. Thus from that I can conclude that each side becomes from sides. as the diagrams are given to us, for the first 4 stages I counted the sides.
tn), it is clear that a quadratic equation is formed by this relation, because the second differences are constant and not zero. n tn First differences Second differences Third differences 1 1 / / / 2 3 2 / / 3 6 3 1 / 4 10 4 1 0 5 15 5 1 0 6 21 6 1 0 7 28 7 1 0 8 36 8 1 0 Let f equal the value of tn . Consider any quadratic equation which can be represented as.
Stellar Numbers Portfolio. The simplest example of these is square numbers, but over the course of this investigation, both triangular numbers and stellar numbers will be looked at in greater depth.
Complete the triangular numbers sequence with three more terms. The given diagrams for the problem were through and are shown below. The next three terms needed to complete the diagram are through . These are illustrated in the pictures below. The white lines on bottom of each diagram are the dots that need to be added to go from one triangular number to the next. Question 2 Find a general statement that represents the nth triangular number in terms of n When completing different trials in attempts to find the general term for Triangular Numbers, the following information was determined.
Logarithms. In this investigation, the use of the properties of logarithms will be used to identify patterns, relationships, and limits of logarithms and sequences.
A geometric sequence is a sequence whose consecutive terms are multiplied by a fixed, non-zero real number called a common ratio. Therefore, to prove that the sequence is indeed, geometric, the common ratio must be found. When the sequence is examined closely, you will notice that the log number remains the same throughout the sequence and that it is the base of the logarithm that changes with every term. Understanding this, you can use the bases to find the common ratio of the sequence by dividing the consecutive terms by the terms preceding them.
Modelling Probabilities in Tennis. In this investigation I shall examine the possibilities for modelling the probabilities in tennis matches of varying complexity.
Let X denote the number of points scored by A. We can now state that: and therefore that: . We can hence easily calculate the probability distribution for all possibly values of X: x P(X=x) 0 0.000017 1 0.000339 2 0.003048 3 0.016258 4 0.056902 5 0.136565 6 0.227608 7 0.260123 8 0.195092 9 0.086708 10 0.017342 This can be presented as a histogram: This shows that the modal score will be 7, with the highest individual probability. Based on the binomial distribution, we can also calculate the expected value and standard distribution: Based on this we can see that most scores fall between 4 and 8, with the mean score being 6.6667.
Stellar numbers and triangular numbers. Find an expression for the 6-stellar number at stage s7. Find a general statement for the 6-stellar number at stage sn in terms of n.
are numbers that can be displayed in the form of a triangular pattern composed of evenly spaced dots. This can be seen below. TASK 1: Complete the triangular number sequence with three more terms. Find a general statement that represents the nth triangular number in terms of n. Given the fact that our current sequence is 1, 3, 6, 10, 15... we need to find the nth term. Looking at the sequence, we see that there difference between each term increases by 1 so for example the difference between u1 and u2 is 2 and the difference between u2 and u3 is 3.
In this task, we are required to investigate the mathematical patterns within systems of linear equations. We need to concept of matrices and algebraic equations in this task.
To check the solution The solution of this 2�2 system of linear equations is unique. 1. Substituting into equation (1): The solution is x = -1, y = 2. 2. ( Substituting into equation (1): The solution is x = -1, y = 2. 3. Substituting into equation (2): The solution is x = -1, y = 2. 4. (2) �: (3) - (1): Substituting into equation (1): The solution is x = -1, y = 2. 5. Substituting into equation (1): The solution is x = -1, y = 2. From the five 2�2 system of linear equations I have investigated, all of them have a unique solution of x = -1, y = 2.
An investigation of different functions that best model the population of China.
The year will be represented by x and the population will be represented by y There are restrictions that also need to be set; the year as well as the population can never be anything below 0. My parameter for time will be that for each year, "t" will equal the number of years after 1950. Therefore, for 1950, "t" will equal 0, for 1955 "t" will equal 5 and so on. Below is a graph that plots the above data points.
Math portfolio stellar numbers. This assessment will investigate geometric shapes that lead to special numbers.
Expressing this mathematically, Rn = Since Rn=2Tn one can substitute Rn in order to get Tn, 2Tn= 2Tn=n(n+1) Tn= Thus it seems like a general statement that represents the nth triangular number in terms of n. After investigating the triangular shapes, more complex Stellar shapes will be investigated. And so forth... Each star has a number of vertices these will be labelled p. Every value of p leads to P-Stellar number, labelled Sn. In this case it is a 6-stellar number.
Mathematics SL Parellels and Parallelograms. This task will consider the number of parallelograms formed by intersecting m horizontal parallel lines with n parallel transversals; we are to deduce a formula that will satisfy the above.
and (Distance from tip in centimeters). The table below shows these variables. variable - Guide Number from the tip 1 2 3 4 5 6 7 8 variable - Distance from the tip (cm) 10 23 38 55 74 96 120 149 The constraints or parameters for the two variables are: * variable parameter = 1 ? ? 8 * variable parameter = 10 ? ? 149 Furthermore, the variable, is the Independent Variable, and the variable is the Dependant Variable. Table 1, which gives the distances for each of the line guides from the tip of Leo's fishing rod, is plotted on the graph below: I will consider the variables as a sequence, and from there I shall calculate the polynomial equation modeling this situation.
(IB) diploma students are required to take at least one course in mathematics. This furthers your IB education in two major ways: it teaches you to think critically about problems - even those you encounter outside mathematics - and it enhances your international credentials, since maths is a true lingua franca.
That said, between the symbols and greek letters, there's still a lot of English to be written. If your writing needs a bit of help, never fear. You can brush up with Marked by Teachers' collection of IB mathematics papers. Study the teacher-marked and peer-reviewed assignments to learn how to write papers that earn top marks. Before long, excellent writing will come naturally to you.
IB students who excel in maths will find themselves well-placed to choose a universitydegree from within the physical sciences or mathematical and computer sciences. | 2019-04-18T16:29:51 | http://www.markedbyteachers.com/international-baccalaureate/maths/?essay_length=295 |
0.999554 | Have you ever handled a similar case before?
The field of criminal law is vast and no two cases are exactly alike. While you may have been arrested for something relatively common, like shoplifting, that doesn't mean that other shoplifting cases are exactly identical to yours. You'll want to try to find a criminal law attorney who has successfully handled cases that are as close to your case as possible. A lawyer who handles mainly drug possession charges can still help you with a shoplifting charge, but he or she will have less experience with the portions of the law that are relevant to your case.
What kind of costs will there be? There may be costs for a good defense beyond simply paying your criminal law attorney. Your best chance may be to pay for your attorney to hire a private detective or to pay for an expert witness to take the stand on your behalf. Such things don't come cheap and may actually cost more than what you eventually pay your attorney. He or she should be able to give you a good idea as to exactly what sort of expenses you should expect to pay for your case.
Is a plea bargain the best choice? Even if you did nothing wrong, sometimes the best choice is to agree to plead guilty to a lesser charge in exchange for a greatly reduced sentence. This obviously isn't fair, but can be the best thing to do if there's enough evidence to make it look like you did something even though you're innocent. A successful plea by you and your criminal law attorney can do things like eliminate the chance of having a felony conviction on your record and keep you from having to serve an extended prison sentence. It will also allow you to get on with your life without having to incur significant debt to pay for your defense. | 2019-04-21T02:57:05 | http://allquotable.com/2017/06/23/3-vital-questions-to-ask-before-hiring-a-criminal-law-attorney/ |
0.999999 | Why do some Bibles say 'Canaanites' in Zechariah 14:21, while other say 'traders' or 'merchants'?
Zechariah 14:21 (KJV): Yea, every pot in Jerusalem and in Judah shall be holiness unto the LORD of hosts: and all they that sacrifice shall come and take of them, and seethe therein: and in that day there shall be no more the Canaanite in the house of the LORD of hosts.
Zechariah 14:21 (NAB): And every pot in Jerusalem and in Judah shall be holy to the LORD of hosts; and all who come to sacrifice shall take them and cook in them. On that day there shall no longer be any merchant in the house of the LORD of hosts.
What do the LXX and MT say? If they differ, what may be the underlying reason?
At the time Zechariah was written, the likelihood of Canaanites in the Jerusalem temple seems quite remote.
The LXX has Χαναναία in Zechariah 14:21, with other forms of the same word found many times elsewhere in the Old Testament, and also once in the New, Matthew 15:22, where the KJV has the same word as the LXX (Strong's G5478).
Looking further at the instances in the LXX (canonical books), it almost disappears after the book of Judges, where it appears in Proverbs 31:24 (KJV as "merchant"), 2 Samuel 23:8 (KJV as "Tachmonite"), 2 Samuel 24:7 (KJV as "the Canaanites"), Hosea 4:18 (obscure connection to the KJV text), Obadiah 1:20 (KJV as "the Canaanites"), Zechariah 11:11 (obscure connection in KJV text as "the poor" of the flock, but the NASB has a footnote "sheep dealers"); and Zechariah 14:21 (KJV as "Canaanite").
The fact that usage of the word dwindles to a trickle beyond Judges, indicates to me that the people group who were once referred to as Χαναναία in the LXX, must have all but disappeared from the land.
From the evidence available to me, the word is best translated Canaanite, and any other rendering would require a footnote to provide some reason for not doing so.
Based on some feedback in the comments, I thought I'd have a closer look at why Χαναναία appears in Hosea, Obadiah and Zechariah. Are the prophets using the word to refer to people they've encountered, or to a people group who have historically been the very antithesis of what God wants Israel to be?
They chose Canaanites to fornicate with, prostituting themselves. They delighted in the indignity of their snorting.
It is a direct reference to Israel's willingness, historically -- from the very beginning of her journey into Canaan, even up until the time of Hosea -- to be wooed and ravished by the god's of Canaan instead of remaining faithful to the Lord.
The context of Χαναναία, here, is: the land that was promised to Israel as a possession, "that of the Canaanites", the people of the Captivity would return to re-possess. As for those who had interfered with the assignment/charge given to Israel to go in and possess the land, "the day of the LORD" was nigh upon them.
At the shattering [of Beauty] in that day, even the Canaanites will understand that the sheepfold is protected, because of the word (Logos) of the Lord.
Then "The LORD will be king over the whole earth. On that day there will be one LORD, and his name the only name.".
Jerusalem will be raised up high, and will be forever secure.
Dreadful plagues and panic will strike the nations, but those who survive will come annually to Jerusalem to celebrate the Feast of Tabernacles.
Those who refuse to come will suffer great drought.
Zechariah 14:21 concludes this vision of the future: "there will no longer be a Canaanite in the house of the LORD Almighty."
The impression I get from the usage of Χαναναία in these verses is: Canaanites (Χαναναία) are those whose hearts are set on rebellion against God's rule and authority, who would persist with, and/or encourage others to persist with, the abominable behaviour that caused the land of Canaan to spew its people out.
The reason there will no longer be a Canaanite in the house of the Lord is: if he be of a Canaanite heart, then his refusal to come will see him destroyed by the plagues and panic and drought of the day of the Lord. If, however, his Canaanite heart were converted and he come to Jerusalem to worship the Lord and to celebrate the Feast of Tabernacles, then he would no longer be of a Canaanite heart, i.e. not a Canaanite.
Not the answer you're looking for? Browse other questions tagged zechariah or ask your own question.
Does “first” demand a “second” in Zechariah 12:7? | 2019-04-25T06:16:12 | https://hermeneutics.stackexchange.com/questions/20645/why-do-some-bibles-say-canaanites-in-zechariah-1421-while-other-say-traders |
0.999999 | The problem statements in this research are formulated as follows: (1) How are museums as tourist attractions in Ubud area, from the perspective of operators? (2) How are museums as tourist attractions in Ubud area, from the perspective of visitors? (3) How is the relationship between museums and other tourism components when examined from the role of museums as cultural tourism attractions in Ubud area?. This research on museums was conducted in the Ubud area because Ubud has made museums as the cultural tourism attractions in the area, which include the Blanco Museum, Museum Puri Lukisan, Agung Rai Museum of Art (ARMA), the Rudana Museum, and Neka Art Museum. This research is based on the theories of museum management, marketing, and theories on cultural tourism attraction. | 2019-04-18T15:11:14 | https://www.morebooks.de/store/gb/book/museums-as-cultural-tourism-attractions-in-ubud-bali-indonesia/isbn/978-620-2-30706-2 |
0.99966 | Wash the turkey both inside and out. Mix all ingredients together and put the turkey inside in a big pot for 12 hours (overnight). Make sure to press down on some of the oranges and lemons to get the juices going. Try to put the whole thing in the frig if possible. If you can't, please put lots of ice in the water to keep the turkey cold overnight.
Calculate the time that it will take the turkey to cook in the oven (18 minutes per pound). So if the turkey is 20 pounds you will have 360 minutes of cooking time. Add 30 minutes for resting the turkey. In this example it will mean 6.5 hours. Thus start the cooking 6.5 hours prior to your expected serving time. Don't worry if you are off 15, 20 minutes each way.
In the morning about 30 minutes prior to the start time prepare the turkey for cooking. Take the turkey out of the brine and wash it once again. Bring 4 sticks of butter to room temperature. Mix 6 sprigs of thyme and 2 sprigs of rosemary chopped in to the butter. Add the salt, black pepper, and the red peppers and mix it with the butter mix. Chop the garlic as well and add that to the butter mix. Start to cut the skin of the turkey with 1 inch holes and try to stuff as much of this butter mixture under the skin as possible. I probably do this in approximately 8-12 different parts of the turkey. The left over butter mixture I rub it all over the turkey.
Cut the apple in to quarters, same with the onion. Cut the celery in to 1.5 inch sticks and stuff it inside the turkey with the left over 2 sprigs of rosemary and thyme as well. Don't worry, when the turkey is done will throw away the veggies from inside the cavity?
When done take out the turkey and take all the stuffing out of the cavity and toss it as it was just there for flavoring. Put the turkey on the plate that you are going to use for serving and let it rest for minimum 20 minutes preferably 30-40 minutes. The turkey is really still cooking at this time. | 2019-04-20T15:13:02 | http://cookbook.armenians.com/viewrecipe.php?id=124&category=Poultry |
0.998897 | Justin Lagat poses the question, just who is the best Kenyan athlete of 2013? There are so many to choose from in a year where Kenyan athletes shined.
For a Kenyan athlete and a fan of Kenyan runners, 2013 has been another great year with great moments to remember and cherish. Such moments happened during the world championships in Moscow, during the IAAF Diamonds League series and world challenge events, on the roads during the world's major city marathons and on other gold and silver label road races across the world.
Starting with the world championships in Moscow, Milka Chemos' win, when she led two other Kenyans to take the podium positions in the women's 3000m steeple chase competition, was probably the best of the moments there as it ushered in a new era where Kenyan women began showing a strong capability of following in their male counter part's dominance in the 3000m steeple chase event. Eunice Sum's surprise win in the women's 800m event was another great moment. The best the Kenyans expected from her was a bronze medal; and even that appeared to have been too much of an expectation given the strong field she was running with in the finals. Edna Kiplagat's win in the women's marathon was also great, only that it was expected.
Kenyan men were also great in Moscow, but were expected by Kenyans to do a little more than they did. The men's 800m and marathon events were not good. However, some of the men's performances were great. Such moments included Ezekiel Kemboi's win in the men's 3000m steeple chase where he led Conseslus Kipruto, who later won the IAAF Diamond League trophy for the event, to a 1 -2 podium positions for Kenya. It has always remained a puzzle as to why Ezekiel Kemboi may be beaten at other competitions, including the Kenyan trials, but not in the world's major events like the Olympics and world championships; especially when he adopts a new hair-cut before the finals. Is it the hair-cut? One would wonder.
Asbel Kiprop was also amazing this year and got much admiration by Kenyan fans not only when he won a gold medal in Moscow, but during the amazing run he ran in Monaco. His time of 3:27:71 made him the fourth fastest man in history in the 1500m event. That event will be remembered also due to Mo Farah completing second in an impressive time of 3:28, even when he was best known for specializing in the 5,000m and 10,000m events. Now, many people keep wondering whether he is doing the right thing in deciding to run marathon in 2014.
Talking of marathons, perhaps there were even greater moments for Kenyan athletes here than there were on the track. To others, Wilson Kipsang's world record in Berlin was the greatest moment. Wilson had been hinting on his intention to do that for a while. He missed it by a whisker in Frankfurt, in 2011. His focus on the record and his determination finally enabled him do it this year and this inspired many.
To others, it is hard to rate Wilson's achievement against that of Priscah Jeptoo who won both the London and the New York city marathons, including the overall WMM trophy. Even to me, I'm confused on telling whose achievement was really the greatest this year. Priscah was focused and prepared to win London marathon from last year September when I interviewed her for RunBlogRun. Everything finally went according to her plans, perhaps even better.
Dennis Kimetto is another athlete that made Kenyans proud by winning both Tokyo and Chicago marathons. The latter win was even more exciting after he ran some parts of the race under world record pace propably making Wilson Kipsang seat on the edge of a chair as he watched him threatened to break his new world record within such a short span. Everyone agrees that Dennis Kimetto is the most promising athlete and many look forward to watching him race next year.
Four of the fastest times this year in marathon came from Kenyan athletes. Most of the big marathons across the world had majority of the top ten finishers being Kenyans. Khon Kaen International marathon in Thailand had all the top ten finishers being Kenyans. The same happened in Kigali Peace Race in Rwanda. Only one Ethiopian in 5th position prevented a similar scenario in Gunsan Saemangeum, Korea and one Tanzanian also in 5th position prevented the same happening in Kilimanjaro Marathon in Tanzania.
As the year comes to a close, I have much to reflect on, smile about and celebrate as one of the Kenyan athletes.
Merry Christmas and Happy New Year to all the readers who have been enjoying my columns and encouraging me to give them more stories regardingKenyan athletes and running in Kenya. | 2019-04-18T16:47:09 | http://www.runblogrun.com/2013/12/flash-back-wonderful-moments-for-kenyan-athletes-in-2013-by-justin-lagat.html |
0.999874 | The small community of Thousand Oaks, Calif., is mourning the victims of the mass shooting at the Borderline Bar & Grill, holding a candlelight vigil Thursday night to help relatives and loved ones cope with their sudden and staggering loss.
"Tonight we are a hurting city," Thousand Oaks Mayor Andy Fox told a large crowd at the Thousand Oaks Civic Arts Plaza. "But we are a community of love, of compassion and of unity. We're also a community of hope."
Hundreds of people gathered for the vigil at the Fred Kavli Theatre; other services were held at Pepperdine University and California Lutheran University — two schools with students who had gone to "College Country Night" at the Borderline on Wednesday.
"Our hearts are broken with the news of this profound loss," read a statement from Pepperdine University.
"I was just walking on campus. There's just people straight up, like, crying, and I've just never seen anything like that," student Douglas Liu told Doualy Xaykaothao, who was reporting for NPR. "And everyone is just so depressed."
Liu shared a class with Pepperdine student Alaina Housley, 18, who died in the shooting. The two were tennis partners, Xaykaothao reports.
Justin Meek, a recent graduate of California Lutheran, also died in the country music club and bar.
The assailant, Ian David Long, 28, is believed to have shot and killed himself in an office near the entrance to the country dance club. But he did so after opening fire on scores of defenseless patrons and employees — killing 12 people, including 54-year-old Sgt. Ron Helus, who was among the first to enter the venue after reports of gunshots were reported.
The day after the violence, the Thousand Oaks community also turned out to line the route of a procession that took Helus' body to the medical examiner's office. People stood along the roadside and on bridges as a convoy of law enforcement vehicles escorted the procession.
Long had been at the center of a call to police about a disturbance in April, when a crisis intervention team and a mental health specialist visited his family's house. That episode ended with the team clearing Long.
On Thursday, the Department of Veterans Affairs said in a statement that Long, who was a Marine veteran, "was not enrolled in VA health care at any time."
But President Trump suggested Friday that Long had suffered from post-traumatic stress disorder without offering evidence, claiming that "a lot of people say he had the PTSD" and calling Long "a very sick puppy."
Trump was speaking with reporters outside the White House on Friday morning when he was asked how gun policy might help reduce the number of mass shootings. The president said he viewed it as a mental health issue and that Long's history is now being scrutinized.
As Thousand Oaks comes to grips with its losses, the town and the surrounding area are also dealing with another challenge: A pair of wildfires — the Woolsey and Hill fires — have grown quickly over the past 24 hours, prompting evacuation orders and the opening of emergency shelters.
Thousand Oaks announced that City Hall is closed to the public on Friday, "as we address fire-related issues."
The blazes also forced Pepperdine, which had remained open on the morning after the shooting, is closed on Friday, and the school issued a shelter-in-place order, warning students and staff at its Malibu campus that it was probably safer to remain on school grounds than to try to leave.
Cal Lutheran and another nearby school, California State University Channel Islands, also closed their campuses on Friday due to the fires.
As the LAist website reports, "Students at Cal Lutheran had been working on a production of the play Columbinus," about the 1999 Columbine High School shooting in Colorado. The first performance, which was set for Thursday, was canceled; it's now uncertain when the show might open. Copyright 2018 NPR. To see more, visit http://www.npr.org/. | 2019-04-20T16:57:41 | http://wlrh.org/NPR-News/hurting-city-thousand-oaks-grieves-victims-borderline-shooting |
0.997918 | Resistance to stress is often heterogeneous among individuals within a population, which helps protect against intermittent stress (bet hedging). This is also the case for heat shock resistance in the budding yeast Saccharomyces cerevisiae. Interestingly, the resistance appears to be continuously distributed (vs. binary, switch-like) and correlated with replicative age (vs. random). Older, slower-growing cells are more resistant than younger, faster-growing ones. Is there a fitness benefit to age-correlated stress resistance?
Here this hypothesis is explored using a simple agent-based model, which simulates a population of individual cells that grow and replicate. Cells age by accumulating damage, which lowers their growth rate. They synthesize trehalose at a metabolic cost, which helps protect against heat shock. Proteins Tsl1 and Tps3 (trehalose synthase complex regulatory subunit TSL1 and TPS3) represent the trehalose synthesis complex and they are expressed using constant, age-dependent and stochastic terms. The model was constrained by calibration and comparison to data from the literature, including individual-based observations obtained using high-throughput microscopy and flow cytometry. A heterogeneity network was developed, which highlights the predominant sources and pathways of resistance heterogeneity. To determine the best trehalose synthesis strategy, model strains with different Tsl1/Tps3 expression parameters were placed in competition in an environment with intermittent heat shocks.
For high severities and low frequencies of heat shock, the winning strain used an age-dependent bet hedging strategy, which shows that there can be a benefit to age-correlated stress resistance. The study also illustrates the utility of combining individual-based observations and modeling to understand mechanisms underlying population heterogeneity, and the effect on fitness.
There is increasing appreciation for individuality of microbes [1, 2]. Even populations grown up from a single cell, in a constant environment can exhibit significant phenotypic heterogeneity in gene expression, protein content and physiology. Individual heterogeneity can be important to population fitness by allowing different functions (e.g. C and N fixation in filamentous cyanobacteria) and survival in a fluctuating environment. One prominent example is bacterial persistence, where a typical population contains a small fraction of slow- or non-growing “persister” cells that are not killed by antibiotics [3, 4]. Cells switch between normal and persister states in a random, binary (switch-like) manner. The ability to resist stress comes at a cost (typically reduced rates of growth or reproduction). For intermittent stress, there is an advantage to maintaining heterogeneity among individuals in a population in terms of tradeoffs between performance and survival (i.e. an insurance mechanism referred to as bet hedging [3, 5]).
For eukaryotic microbes, the budding yeast Saccharomyces cerevisiae (S. cervisiae) is a model organism for studying individual heterogeneity and aging and longevity [1, 6]. Various mechanisms, including stochastic variability in regulatory pathways and production/destruction of mRNAs, and deterministic asynchronicity in cell cycle or replicative age, lead to heterogeneity in protein content and stress resistance in clonal populations [1, 7–12]. For example, copper resistance is heterogeneous and related to cell cycle and replicative age . Intrinsic and induced expression of heat shock proteins and resistance is heterogeneous [11, 14]. Expression of Tsl1, used in the synthesis of trehalose (an alpha-linked disaccharide of glucose that enhances thermotolerance, reduces aggregation of denatured proteins and protects against oxidative damage), and heat shock resistance are heterogeneous and correlated with replicative age . Natural yeast (i.e. not S. cervisiae) populations were found to have heterogeneous resistance to copper, lead and sulfur dioxide, and this phenotypic heterogeneity is a beneficial and evolvable trait . Unlike in bacteria, heat shock resistance in yeast is graded, continuous (vs. binary) and correlated with replicative age (vs. random).
The benefit of random heterogeneous expression of a stress-response factor has been demonstrated experimentally and computationally for S. cervisiae. Levy et al. hypothesized that correlating heat shock resistance with age provides an added benefit. The idea is that older, slower-growing cells are better candidates for being stress resistant because they contribute relatively less to the population growth. Is there a fitness benefit to age-correlated (vs. random) stress resistance?
This hypothesis is explored here using modeling, an approach that has been applied previously to explore the role of heterogeneity [5, 17]. The general strategy is to develop a mathematical model that includes the relevant mechanisms, and then perform numerical competition experiments to see if the age-correlated resistance trait is beneficial. Such competition and/or evolutionary optimization simulations have been used previously to determine optimal traits/parameters [18–20]. There are many potential model formulations and associated parameter sets for simulating replication, aging, resistance, etc. (reviewed below). To ensure some degree of realism, we constrain the model by calibration and comparison to relevant observations from the literature. We use agent-based modeling (ABM, aka individual-based modeling, IBM), rather than the more common population-level modeling approach [18–22]. An ABM is appropriate in this case, because it can resolve the continuous/graded distribution of various individual properties (e.g., protein levels, growth rate, resistance), and model outputs can be compared directly to the individual-based observations that are used to constrain the model [15, 23]. The model simulates intracellular mechanisms and the cell behavior emerges (systems biology). Then, it simulates many such cells and the population behavior emerges (systems ecology). This multi-level approach has been referred to as 'systems bioecology’ [19–21].
We describe the model and compare it to data from the literature, which shows that it is generally consistent with the observed patterns. A heterogeneity network is developed, which highlights the predominant sources and pathways of resistance heterogeneity. Then we perform competition experiments with strains that have different Tsl1/Tps3 expression strategies in an environment with intermittent heat shocks. For conditions with high severity and low frequency of heat shocks, an age-dependent bet hedging strategy is most beneficial, which supports the hypothesis of a fitness benefit of age-correlated stress resistance.
The model is relatively simple and resolves only those mechanisms necessary for exploring the hypothesis and comparison to the relevant data. Yeast cells take up glucose (G, g L-1) and convert it to biomass (Figure 1). Three forms of biomass are considered, including structural (m X , g dry cell-1), damaged (m D , g dry cell-1) and trehalose (m T , g dry cell-1). The total biomass (m, g dry cell-1) is the sum of these components (m = m X + m D + m T ). Structural biomass becomes damaged. A fraction of biomass is synthesized as trehalose. The model tracks the age or number of divisions in terms of bud scars (n B ). A population of individual cells is simulated using an agent-based approach.
Model schematic. Symbols: G = glucose, m X = structural mass, m D = damaged mass, m T = trehalose mass and n B = number of bud scars.
A number of metabolism models for S. cervisiae have been developed ranging from simple Monod-type growth equations to more detailed kinetic models that resolve intracellular mechanisms up to dynamic/kinetic implementations genome-scale network reconstructions [24–28].
where μ m,g (day-1) is the maximum growth rate, K g (g L-1) is the half-saturation constant for glucose, K d is the half-saturation constant and n d is the exponent for damage. The model dynamically simulates the extracellular glucose concentration considering inflow and washout (for continuous culture simulations) and uptake by the cells (see Additional file 1: SI text for details).
Cell division in S. cervisiae is via the asymmetrical budding process, where a larger mother cell gives birth to a smaller daughter cell. With subsequent births, the mother’s size increases and it accumulates bud scars and damage (see below). A number of cell cycle and replication models for S. cervisiae have been developed [29, 30].
Here, the model of Vanoni et al. is adopted. Briefly, two cell cycle phases are simulated, unbudded and budding. Budding starts at a threshold budding size (m b ), which increases from a specified daughter cell value (m b,0 ) by a factor ( a m b m n B - 1 ) with each generation. Division occurs at a threshold replication size (m r ), which is proportional to the budding size (m r = f m,r m b ). The daughter gets the mass synthesized during the budding phase. The mother gains a bud scar and preferentially retains the damage (see below). Individual phenotypic heterogeneity is introduced by randomizing the budding size. At birth, the daughter’s budding size is drawn from a global truncated normal distribution with specified mean and coefficient of variation (CV) . A truncated distribution is used to prevent unrealistic values (e.g., m b,0 < 0). This process introduces non-heritable phenotypic heterogeneity, so values are drawn from a global distribution (vs. one with the mean based on the mother).
Aging in S. cervisiae is due to a number of mechanisms, including accumulation of extrachromosomal DNA circles (ERCs) and oxidative damage (e.g., carbonylation) to proteins . At division, this damage is preferentially retained by the mother cell, although the ability to do so diminishes with replicative age [33, 34]. In addition, the mother cell has higher reactive oxygen species (ROS) and protein damage rates and lower damaged protein degradation rates [35, 36]. Trehalose protects against ROS damage to proteins . Several generic models of aging have been presented [18, 34]. Specifically for S. cervisiae, Hirsch developed a model where cells accumulate a senescence factor at a constant rate and partitions it asymmetrically at division. The growth rate decreases with increasing amount of this senescence factor. More mechanistic models that explicitly represent ROS, the damage reaction with a protein (citrate synthase) and repair reaction with a heat shock protein (Hsp90) have been presented .
The present model considers the production of damaged mass (m D ) from structural mass (m X ) in a first-order manner, at a damage rate that increases with age ( k d = a d n B b d ). At division, the damage mass is preferentially retained by the mother, based on a split fraction (s d ).
Trehalose serves as storage carbohydrate and stress protectant [40–42]. Synthesis is highest during the stationary phase and in response to stress (incl. heat), but trehalose also accumulates under normal, non-stressed conditions [42–44]. Trehalose is synthesized by a trimeric protein complex made up of Tps1 and Tps2, and interchangeable Tps3 or Tsl1 [45, 46]. Genes involved in trehalose synthesis are induced by heat shock [46, 47]. In addition, the expression is negatively correlated with growth rate and has a stochastic component [15, 47]. Tsl1 and Tps3 promoters share a common regulatory element (stress-responsive element, STRE), but their expression can differ [9, 10, 46]. Trehalose (or more generally carbohydrate storage) has been included in metabolic models of S. cervisiae[24, 25, 48].
where f m,s is the maximum fraction, K s (mmol L-1) is the half-saturation constant and n s is the exponent for trehalose synthesis.
where e c,Tsl1 (mol L-1) is the magnitude of constant expression, e a,Tsl1 (mol L-1) is the magnitude of damage or age-dependent expression, K Tsl1 is a half-saturation constant and f r,Tsl1 is a randomization factor. Note that expression is a function of the combined effect of constant, age-dependent and stochastic terms, with their relative contribution depending on the assigned parameter values. The randomization factor (f r,Tsl1 ) is varied by drawing from a global truncated normal distribution with mean of 1.0 and specified CV, following the same approach used for m b,0 (see above). An equivalent formulation is used for Tps3.
Heat causes denaturation of proteins and there are a number of mechanisms that can prevent this. Trehalose stabilizes proteins during heat shock . Other factors include various heat shock proteins, whose intrinsic (i.e. without heat shock) expression is also heterogeneous and correlated with heat shock resistance [11, 14].
where K h is the half-saturation constant for heat shock tolerance. K h is the fraction of trehalose required to achieve a tolerance of 0.5. When a heat shock is applied, all cells with H t < H a die. H a can be adjusted to reflect different experimental conditions.
The model includes a number of deterministic sources of heterogeneity, like the uneven split of damage among mother and daughter at replication. Also, the budding mass threshold (m b,0 ) and Tsl1 and Tps3 expression factors (f r,Tsl1 and f r,Tps3 ) are varied stochastically, as described above. However, in reality there are numerous other mechanisms (e.g., stochastic expression of all genes) that contribute to heterogeneity in cellular processes [1, 7–12]. To account for this, the maximum growth rate (μ m,g ) and damage exponent (n d ) parameters are also randomized (following the same approach used for m b,0 ).
The model simulates individual yeast cells using an agent-based approach [18–22]. Each agent stores the cell state variables (e.g., m X , see Figure 1) and those parameters that are varied at the individual level (e.g., m b,0 ). For continuous culture simulations, the model includes stochastic washout of cells from the reactor (see Additional file 1: SI text for details). Differential equations (e.g., Eq. 1) are solved using an explicit numerical integration method. The model is implemented in the IAM framework [19, 20], and the source code is available from the corresponding author.
For some experiments the model explicitly simulates each individual cell. This includes the microcolony experiments that have ~105 colonies of up to ~100 cells for a total of 107 cells (e.g. Additional file 1: Figure S1B). However, for liquid cultures with larger populations, including the competition experiments, this is not feasible. For example, a 300-mL culture with a cell density of 2.6 × 108 cells mL-1 contains 7.9 × 1010 cells. Using the present model, simulating that many cells for 20 days would take approximately 15 years of CPU time and 18 PB of RAM memory. As is common in microbe ABMs, for liquid culture, the model simulates super-individuals, which are representative of a number of real individuals . Minimum/maximum numbers of agents are specified, and when the number of agents drop/rises below/above this, agents are split/combined (see Additional file 1: SI text for details). The number of agents, or the computational resolution, is set sufficiently high so that the model produces robust and reproducible results over multiple runs with different seed values for the random number generator.
This application is especially challenging from a computational perspective, because of the focus on small fractions of the population. For example, in one experiment by Levy et al. , 0.1% of the population was sorted out using flow cytometry and the growth rate distribution of that fraction was computed (Additional file 1: Figure S1I). In order for the model to adequately resolve the heterogeneity of such a small fraction of the population, it needs to have a very large number of agents.
The model was constrained by calibration and comparison to relevant observations from the literature. Several parameters were calibrated within the available literature range with the help of an automated optimization routine (see Additional file 1: SI text, Table S1, Figures S1&2). Model simulations followed the actual experimental protocols as described in the respective literature references, which could be quite involved. For example, one experiment by Levy et al. included growing cells in liquid suspension, sub-sampling based on Tsl1 expression, growing again in liquid suspension, randomly sub-sampling, growing as microcolonies, and estimating the growth rate of each microcolony based on the change in colony area (Additional file 1: Figure S1J). The resulting calibrated model is then used without any further changes to explore the underlying mechanisms and fitness effect of heterogeneous, age-correlated heat shock resistance.
To understand how heterogeneity is produced and how it propagates through the population, we developed a heterogeneity network (Figure 2F). The nodes in the network represent individual state variables (e.g. m D ), calculated variables (e.g. μ) and processes (e.g. unequal split of damage, node DAM), and the links represent causal relationships. For example, DAM causes heterogeneity in m D , which in turn causes heterogeneity in m (via mass summation, node m), μ (via Eq. 2), and e Tsl1 and e Tps3 (via Eq. 4). By turning off the heterogeneity at a node or link in the network and examining the resulting reduction in heterogeneity at a downstream node, the heterogeneity can be mapped onto the network (see Results section).
Model-data comparison and heterogeneity source and pathway analysis. (A) Damage (m D /m) vs. age (n B ). Data from . (B) Tsl1 expression (e Tsl1 ) distribution of cells. (C) Age (n B ) vs. Tsl1 expression (e Tsl1 ). (D) Heat shock survival of various Tsl1-sorted fractions. Data from . “a.u.” is arbitrary units. (E) Distribution of heat shock tolerance for base case and various diagnostic simulations (e.g. “dam” has equal damage partitioning, s d = 0.5). (F) Heterogeneity network. Line weight indicates contribution of node or link to overall heterogeneity in heat shock tolerance (based on variance of normalized H t , e.g., panel E). For details of experiments used to generate the data the reader is referred to the source publications.
To explore the role of the age-correlated resistance trait on the fitness of the yeast, numerical (i.e. simulations) competition experiments were performed. Cells were grown in a glucose-limited chemostat with constant dilution rate (D = 0.15 h-1), a set-up similar to the one used in a previous experimental study that examined the effect of mild heat shock (28 > 36°C) on S. cervisiae growth rate and gene expression . The culture was subjected to heat shocks at specified heat shock severity (H a ) and frequency (F h , h-1). A number of model strains with different Tsl1/Tps3 expression parameters were developed. For Tsl1, e c,Tsl1 controls constant expression, e a,Tsl1 controls age-dependent expression, and f r,Tsl1,CV controls stochasticity. Tsl1 and Tps3 are considered separately in the model to allow for comparison to data (Figure 2), but their effect on trehalose synthesis is identical (Eq. 3) and a strain with a high Tsl1 parameter (e.g., e c,Tsl1 ) behaves the same as a strain with an equivalently high Tps3 parameter (i.e., e c,Tps3 ). Therefore, the Tsl1 and Tps3 parameters were varied together (e.g., the ratio e c,Tps3 / e c,Tsl1 is held constant). We created 1,000 model strains, with 10 variants for each Tsl1 parameter. Doing a single simulation with all strains was not feasible. Therefore, a tournament-style competition was used. In each round, 10 strains were randomly selected and placed in competition. The winner of each match advanced to the next round and the process was repeated until one strain was left. For each condition (H a , F h ), the optimal bet hedging strategy/parameters emerged as the winner. The experiment is implicitly constrained by the metabolic cost of trehalose synthesis (reduced synthesis of structural biomass, Eq. 1a), which is traded off against the benefit of higher heat shock survival.
The model was calibrated to observations from the literature with the help of an automatic calibration routine. The database is comprised of 15 datasets [9, 10, 15, 33, 41, 43–45, 49]. The reader is referred to the original publications for experimental protocols and details. This database characterizes the relevant features of the system, including the distribution of growth rates, damage accumulation with age, Tsl1 and Tps3 expression levels, distribution of Tsl1 expression, age vs. Tsl1 expression, age distribution for all and top 1% of Tsl1 expressing cells, Tsl1 expression vs. growth rate, growth rate distributions for all, top 1% and 0.1% of Tsl1 expressing cells, trehalose content, trehalose in wild type vs. Tsl1 knockout, survival vs. Tsl1 expression, and survival vs. growth rate for wild type and Tsl1 knockout strains. Discussion of all datasets is provided in the SI and a selected subset are discussed here.
Oxidative protein damage (carbonyl levels) was observed to increase with age (bud scars), and the model reproduces this general pattern (Figure 2A). The observations suggest a step-wise increase whereas the model exhibits a more linear shape. The reason for the discrepancy is unclear. The observations are from a single study and it would be useful to obtain additional observations to confirm the shape. Damage mass increases with age due to preferential inheritance by the mother and an increase of damage rate with age. The expression of Tsl1, observed with flow cytometry and green fluorescent protein (GFP) fused to Tsl1, was quite heterogeneous (Figure 2B). The modeled Tsl1 distribution was not as spread out as the observations, for example, the data extended into the negative range (presumably a measurement error at low Tsl1 levels), whereas the model restricted Tsl1 to the positive values. The heterogeneity in Tsl1 is a function of the stochastic component and the amount of Tsl1 expression that is damage correlated (Eq. 4). Applying the bud scar stain WGA-TRITC and passing cells through the flow cytometer showed that Tsl1 expression increased with age (Figure 2C). The model also shows an increase. However, for an unknown reason it over-predicts the age in the 0.03 Tsl1 bin. When Tsl1-sorted sub-populations were heat shocked, survival correlated positively with Tsl1 expression (Figure 2D). Again, the model reproduces the general increase, but it differs in the 0–0.1% Tsl1 bin. This narrow bin includes the fewest cells and is most susceptible to stochastic variability (observations and model). Overall, the model does not capture all features of the data, but it reproduced the main patterns, including an increase of damage with age, heterogeneous Tsl1 expression, and correlation of age and survival with Tsl1 expression.
We constructed a heterogeneity network (Figure 2F), which defines how heterogeneity can be produced and propagate through the population. In the present model, all heterogeneity originates at replication. The model does not consider other sources of heterogeneity, like stochastic differentiation at other times (i.e. in between replication events) or heterogeneity in the environment. There are a number of deterministic and stochastic sources of heterogeneity associated with replication (grey nodes in Figure 2F). For example, the scarring process produces heterogeneity in bud scars (n B ) in a deterministic manner, while the expression of Tsl1 is varied randomly (f r,Tsl1 ). Despite the numerous sources of heterogeneity, replication does not completely randomize or “reset” the cells, and the model allows for inter-generation memory. For example, bud scars and damage – and thus also the growth rate – are heritable (Additional file 1: Figures S1A&S3).
Where does the heterogeneity in survival originate? Sequentially removing sources and examining the resulting reduction of heterogeneity in heat shock tolerance showed that the scarring and unequal division of damage processes are the predominant sources (Figure 2E). But there are many ways the heterogeneity can go from these sources to heat shock tolerance. How does it propagate through the network? Systematically eliminating heterogeneity at links and nodes in the network (e.g., use population-average e S in Eq. 3) allowed us to map the heterogeneity onto the network. This showed that heterogeneity travels along multiple pathways, but predominantly from scarring to damage to Tps3 expression to trehalose and heat shock tolerance, a deterministic pathway that leads to age-correlated stress resistance.
The model did not capture all features of the data, but it reproduced the major patterns observed in the relevant datasets. It was then used as an experimental system to explore the hypothesis outlined in the introduction. To determine the best Tsl1/Tps3 expression strategy we performed tournament-style competition experiments between 1,000 strains with different expression parameters (e c,Tsl1 , e a,Tsl1 , f r,Tsl1,CV ) in continuous culture with intermittent heat shocks. Figure 3A shows the results from one simulation at intermediate heat shock severity and frequency. One strain clearly outcompeted the others over the course of the experiment.
Numerical competition experiments. (A) Example of one simulation at intermediate heat shock severity and frequency (H a = 0.7, F h = 0.14 d-1). Cell density of 10 competitors. Abrupt drops in concentrations correspond to heat shocks. (B) Summary of tournament-style competitions. Optimal Tsl1/Tps3 expression parameters for a number of (B1) heat shock severities (H a varies, F h = 0.14 d-1) and (B2) frequencies (H a = 0.7, F h varies). Constant: e c,Tsl1 in μM, Age-dependent: e a,Tsl1 in μM, Stochastic: f r,Tsl1 / 10. Symbols are mean +/- one standard deviation of ten replicate experiments.
We performed a number of experiments at various heat shock severities (H a ) and frequencies (F h ), ranging from no heat stress (H a = F h = 0) to the maximum heat stress the yeast can survive (Figure 3B). When no heat shocks were applied, the winning strain had no constant or age-dependent terms. It did have a stochastic term, but this is simply due to the neutrality of the parameter when constant and age-dependent terms are zero (i.e., then the stochastic parameter does not affect the expression, Eq. 4). At lower heat shock severities, the winning strategy was to express Tsl1/Tps3 in a constant manner without heterogeneity (Figure 3B1). It only takes a small amount of trehalose to survive these heat shocks and it is best to have all cells synthesize this amount. Adding heterogenity would result in some cells being killed by heat shock, which would not be beneficial, a finding consistent with previous studies . Since heterogeneity cannot be avoided with age-dependent expression, constant expression is the better strategy in this case. At higher severities, the amount of trehalose required to survive the heat shocks becomes larger and a bet hedging strategy becomes beneficial. That is, the average amount of trehalose is below what is required to survive the heat shocks, but it is heterogeneous and some cells have sufficient trehalose to survive the heat shocks, and this prevents the population from being wiped out. Under such conditions, the model predicted that age-dependent expression is better. This can be explained, as suggested in the Introduction, by the fact that the older cells contribute less to the population growth, and eliminating them is less detrimental to population growth (Additional file 1: Figure S11). If age-dependent expression is excluded (e a,Tsl1 = 0), the winning strain has constant and stochastic expression terms (Additional file 1: Figure S10). The heterogeneity introduced through the deterministic aging process is sub-optimal and it is beneficial to add more via the stochastic term. At lower heat shock frequencies, the winning strategy was age-dependent bet hedging, whereas at higher frequencies constant expression without heterogeneity was better (Figure 3B2). At lower frequencies, the growth period in between the heat shocks is relatively long and reducing the average trehalose production (as is achieved using a bet hedging strategy) is beneficial. At higher frequencies, a bet hedging strategy is not advantageous, because too many cells are lost through the frequent heat shocks.
These experiments were performed with a model designed with equations based on our current understanding of the underlying mechanisms, a parameter set that is generally consistent with the literature and main patterns consistent with observations. However, we cannot rule out that there is not another model formulation (i.e. different equations) or parameter set that produces an equal-quality calibration but a different result or conclusion about the fitness effect of age-correlated heat shock resistance. This is a common problem in model prediction and has been referred to as “equifinality” , and it can be addressed to some extent by varying model formulations [18, 34] and/or parameters . The present model is computationally very demanding. Nonetheless, we used an automated optimization routine that allows for alternate parameter values, and two runs produced essentially the same parameter set, which provides some additional support for the robustness of our conclusions.
This study explored the ecological role of heterogeneous, age-correlated heat shock resistance in S. cervisiae. A simple model was constructed based on our current understanding of the underlying mechanisms, and comparison to relevant data shows it is consistent with observed patterns. Competition experiments with strains that have different stress protectant synthesis strategies shows that, for high severities and low frequencies of heat shock, an age-dependent bet hedging strategy is best. This supports the hypothesis that age-correlated resistance is more beneficial than random resistance. Although the model is specific to heat shock resistance in S. cervisiae, trehalose is produced by many different organisms and also protects against other forms of stress (e.g., ethanol, ), so our results have broader relevance. However, there are also cases where resistance is negatively correlated with age (i.e., younger cells are more resistant), like Sod1p-mediated copper resistance , so these results cannot be generalized to all types of stress.
The finding that it is advantageous for older cells to invest in increasing stress tolerance has implication for understanding aging and longevity- two very different things, with different selective forces acting . Longevity is a highly adaptive trait and it is generally considered that genes promoting longer lifespan do so by improving somatic resistance in unfavorable conditions . Our results provide a clear example of how such a mechanism could operate.
Our model was designed specifically for exploring the role of age-correlated heat shock resistance in S. cervisiae. For that purpose it was kept as simple as possible, while still including the relevant mechanisms. This naturally limits the model’s applicability to other questions, although it should be useful for exploring other features related to aging, heterogeneity and stress resistance. For example, with minimal changes (i.e. Eq. 4), the present model could be used to predict expression of other proteins. The model can also serve as a stepping stone for further model development. A lot more is known about the various mechanisms involved in the problem and this knowledge is sufficient to support the development of a more detailed model. It would be interesting to bring in more mechanistically-detailed models of gene transcription and expression noise [7, 8, 12], more detailed and/or genome-scale metabolism [24, 26–28] and cell cycle control . Sub-genome scale combined signaling, gene expression and metabolism models have been developed . It seems that several pieces are in place to support the development of such a model, which would require a large community effort (as was done for the latest metabolic network reconstruction, ), but it would be worth it.
This study combined individual-based observations (IBO) and modeling (IBM) to understand mechanisms underlying population heterogeneity, and the effect on fitness . Individual-based observation and experimental technologies are advancing rapidly and are generating large amount of novel data [15, 52]. These data are different from traditional population-level observations, which were amenable to analysis using traditional population-level models, and they require new methods and models. Our study illustrates the utility of combining IBM and IBO. The IBOs of Levy et al. were used to constrain the individual-level processes in the IBM. The IBM, in turn, put the IBOs into ecological context.
This paper presents the use of a multi-scale modeling approach to investigate the role of an intracellular mechanism in the ecological fitness of an organism. Covering multiple levels of organization is a general problem in the biological sciences. Several systems approaches have been developed to address this challenge [53, 54]. The approach used here, “systems bioecology”, combines systems biology and systems ecology [19–21]. The idea is conceptually quite simple. First, the intracellular states and mechanisms of microorganisms are explicitly simulated (systems biology). Then, whole populations of these individual microbes are simulated directly using agent-based modeling (ABM), including their interaction with the environment (systems ecology). This general approach may be applicable to other questions involving the role of intracellular mechanisms at the ecosystem scale.
Thanks to Sasha Levy for help interpreting his data and Kieran Smallbone for helpful advice on yeast metabolism modeling. Two anonymous reviewers provided constructive criticism. Funding is provided by NSF IOS-1121233.
FLH and JAB designed the experiment. FLH and NDF performed the research. FLH and JAB wrote the paper. All authors read and approved the final manuscript. | 2019-04-20T22:51:17 | https://bmcsystbiol.biomedcentral.com/articles/10.1186/1752-0509-8-18 |
0.99793 | Are there any venues in this area that offer afternoon options for music, concerts, plays, ballet, etc. as an alternative to late evening performances? It would be great to have some options for folks like me who prefer not to venture to unfamiliar areas at night, or whose schedules make evening attendance impractical.
Sure. Just check the schedules. Lots of matinees.
Yes - the Broadway series at DPAC usually has Saturday and Sunday matinee options, and most of the shows I've seen at Progress/Duke Energy/Memorial Auditorium in Raleigh also have weekend matinee options. Also, pretty much anything targeted to kids will have a weekend daytime performance.
The symphony also does Friday noon concerts several times a year. | 2019-04-26T08:20:47 | http://www.city-data.com/forum/raleigh-durham-chapel-hill-cary/1975317-matinee-entertainment-cultural-resources.html |
0.9981 | Gaining/losing weight. It's been my albatross since I was about 11 years old. Throughout the decades, I tried many approaches in order to maintain a healthy weight. None successfully for any extended period of time. I'm 5'7", so that's not a big frame to carry heavy weight, eh? I won't go into how the excess weight affected me, still does, but those who have struggled with their weight understand and that's all that's important to me, really. Those who have not struggled would never understand anyways. Enough said.
In September/2013, I saw two programs on PBS. Rather than try to explain how I lost weight and got in the best shape I've been in for a long time...long enough that I don't remember when...I'll refer you to the videos I watched. I don't know how long they'll be online, so, if you're interested, check them out. The first one is: Eat, Fast, And Live Longer. If this doesn't work or they've taken the video down, here's another site for the video. The second video is: The Truth About Exercise. Again here's another site for the video, if the first site doesn't work. Dr. Mosley, who is a physician and a journalist, is from England and has a family history of bad health, with most males in his family line dying by age 72. He also has a book titled, "The Fast Diet", which he wrote with Mimi Spencer, author and journalist. The book is nowhere as good as the videos, so watch the videos first, buy the book second, if you're interested. It's good because it has some meal plans.
Finding the words to express what I'm feeling about this is hard. What I can say? To have a system that works without the struggle or boredom of some other "diets" or the restrictions they impose has been a game changer. After talking to some of the researchers about weight loss, Dr. Mosley would say, "I'm not going to do that.". Regardless of health benefits. I identified immediately with him when he'd say that because that's what I thought, as well. The down side? I have to buy new clothes. I only have a few pair of jeans that still fit me and a hand full of shirts. For my nephew's wedding this September, I have to buy new clothes. Makes me damn happy.
For any of you who may be reading this and who have struggled with, or are still struggling with, your weight, check it out. I realize there's no "one size fits all" when it comes to this weight thing. We're all individuals with this issue. For me, this works. I'm truly grateful that I met up with Dr. Mosley. It's changed my life, as silly as that sounds. If it works for you, I'll be happy for you. If not, I understand that, too. And wish you well in your search. It took me 54 years.
To close, I've chosen a tune that has significant memories for me that I want to share with y'all once again, "Midnight Walker" by Davy Spillane on what I consider to be one of the sweetest sounding instruments on the planet, the Irish uillean pipes. | 2019-04-23T16:08:33 | http://www.patricklyford.com/2014/04/getting-healthythe-fast-diet-by-michael.html |
0.999404 | There isn't any reason why commercials directing should have anything to do with race, but with so few black directors in the business - who comes readily to mind besides Paul Hunter? - the arrival of Chris Robinson, with a string of hip-hop video hits behind him, makes one wonder if he can escape the marketing ghetto politely filed under "urban." In his favor, surely, is the fact that he's at an A-list company like Partizan, where, as far as Robinson and Partizan executive producer Steve Dickstein are concerned, race will not be much of an issue. "Look at Tarsem," says Robinson. "He's an amazing director. I'm not sure what race he is. Who cares what race he is?" Adds Dickstein, "We never had directorial categories here, like automotive or tabletop. We just have directors. I look at Chris as a director who's black - not a black director. There's a depth to his work that transcends any genre. "
"It'll take time to be judged as just a filmmaker," admits the 31-year-old Robinson. "We're still dealing with that in our culture in America, learning to judge people by the merit of what they do. Make no mistake, before anything I'm Chris Robinson the black man. That's just a truth, and I'm very proud of that. But if you put the reel up, it should be, 'Hey, that's a good filmmaker,' or 'That's a funny filmmaker.' Not, 'That's a black filmmaker.' "
If you put the reel up, Robinson's work is impressive indeed. Nevertheless, he comes out of the largely segregated world of hip-hop video, and his first commercial, for And 1 and Fallon/Minneapolis, starring NBA wunderkind Kevin Garnett, is more or less a hip-hop video, with beats by none other than Timbaland. Which is partly why Robinson got the gig. He's the kind of guy who's on a first-letter basis with people like P. Diddy, and, as he puts it, "I could just pick up the phone and call Timbaland."
"It's true this whole And 1 thing came about because of a certain credibility Chris has with rappers and musicians, but the idea, which is bold in its expression, is told with an amazing sense of humanity and emotion," says Dickstein. As Robinson explains, "If you put classical music behind this commercial you'd still have a story about Kevin Garnett's psyche and his journey from being a kid in South Carolina who was in trouble with the police and whose mom burned his jersey 'cause she didn't want him to play basketball. It's a story about his life - but his life happens to have a hip-hop soundtrack to it."
As does Robinson's, of course. He grew up in Baltimore and later moved to California where he enrolled at Foothill Junior College and played nose guard on the football team. It was there that he "got bit by the film bug," he says. "I always wanted to have a camera in my hand." He started making small-time videos for friends and eventually got a break with Profile Records, then home to Run DMC, for a video for a rapper known as Smooth Da Hustler, around 1993. "When I came in, the groundwork really wasn't set for hip-hop videos," he recalls. "The guys that I looked up to were Mark Romanek, David Fincher and Jean-Baptiste Mondino. But my biggest influence at the time, just to be a filmmaker and believe that it could be done, was Spike Lee. He's a shining example that you could actually do it." Hip-hop video-wise, "after Hype Williams raised the bar, ever since it's been on," says Robinson. "This is what we aspire to, the mini movie. To those artists who want to be innovative, we can say, 'Come on, let's do it.' Everybody's pushing the envelope now. They want more."
And they're getting it. To those of us with only a casual hip-hop acquaintance, who tend to stereotype it as a tediously repetitive boast-and-bling thing, Robinson's videos are a pleasant surprise. He's got dialogue, humor and plenty of snappy narrative and great-looking film. Standouts on the reel include P. Diddy's "Bad Boy For Life," in which Sean Combs and his retinue move into a house in the white suburbs and scandalize the neighbors, only to be scandalized in turn by tattooed white skate punks. The Busta Rhymes/P. Diddy collaboration "Pass the Courvoisier" lives up to the mini-movie moniker with a perfectly controlled blend of humor, action and style. Cypress Hill's rap-metal "Trouble" is a brilliantly evocative tale of a man facing his many inner demons. Moreover, Robinson can jump genres with ease, well beyond the R&B clips he's done for Alicia Keys, Ginuwine and others. He not only shot the recent Dave Navarro "Hungry (Empty Girl)," with Carmen Electra as a robot, but, as unlikely as it may seem, he did Mandy Moore's teen-fluff hit "Candy." "I got a little diversity happening," he laughs.
May it keep on happening. "We're looking at work for him right now that's outside the urban market, because people are recognizing him as a talent, not as a black talent," claims Dickstein. Robinson himself is cautiously optimistic. "When you can really be judged just on the content of your character, it'll be a different world we live in. But the world is changing for the better, slowly but surely. Everything else follows suit." | 2019-04-25T16:29:12 | https://adage.com/article/tech-page/crossover-artist/92149 |
0.999999 | Why has it worked all of these years and then stopped when the update was applied on the date I posted the original message? I'm not having any problems with anything else. It's just this program after it updated. I guess I'm stuck with it until my subscription expires unless I uninstall it and use another program. This program has never given me any problems until this started which was April 8th. Would I loose to much security if I went back to the version I was using before April 8 and disable application updates?
My pc is infected by .moresa extension. I think it is due to STOP encrypter. Are there any ways I can decrypt my files?
@GT500 Would using Scheduled Tasks to run something to REG ADD the relevant flags as soon as the system is booted, or maybe as the user logs on work? I suppose it depends when the EAM GUI code actually starts to execute?
How do I decrypt my files with .moresa extension? I did some research and found out that .moresa is due to STOP encrypter but I am not sure.
If you ever find out what actually encrypted the files, then that's what we need to figure out if there's a way to recover files. Once we have that, our malware analysts can pick it apart to figure out how it encrypts files, and try to see if there is anything that would allow for easy decryption. It's possible they were left there in the hopes that a user might accidentally infect their Windows system as well. It's also possible that the attacker wasn't actually aware of what kind of system they had gained access to and simply copied a number of things that they may need while decrypting files, or that they just have a standard toolkit that they copy to compromised systems/devices and just copy everything instead of only what they need.
There is currently no known way to decrypt files that have been encrypted by the Dharma/Cezar ransomware without first obtaining the private key from the criminals who created/distributed the ransomware.
This is GlobeImposter 2.0: https://id-ransomware.malwarehunterteam.com/identify.php?case=75b7f1dad42e21336ac7a051236ae6d39d47ba63 Unfortunately there is no known way to decrypt files that have been encrypted by GlobeImposter 2.0 without first obtaining the private key from the criminals who made/distributed the ransomware. Also, note that the server was more than likely infected when an attacker brute forced an RDP (Remote Desktop) password. I'll leave a few steps below for getting started dealing with RDP compromise. First I recommend temporarily disabling all port rules in your firewall (closing all open ports) until you can do a full audit of your firewall configuration and determine which ports need to remain open. There are some basic recommendations below to help get you started with the port audit. If you are managing a company network, then some form of IPS/IDS is highly recommended to monitor the network for intrusions. If you already have such a system in place, then I recommend a full audit of any rules you have configured to make sure that the device is providing adequate monitoring. It is also recommended to have someone with penetration testing experience verify that the IPS/IDS is properly alerting when there are intrusion attempts. Also, quickly change all passwords on any workstations and/or servers that are connected to the same network as the compromised system. Also be sure to change passwords on any online accounts, as well as any routers or switches (or other devices that have network-accessible administration functions). I recommend that every account have a different password, that passwords be no shorter than 25 characters and be made up of a random combination of uppercase letters, lowercase letters, numbers, and symbols. Obviously passwords like that are difficult (if not impossible) to remember, so a password manager may be required in order to aid in managing passwords. KeePass is probably the simplest password manager, and stores password databases locally instead of on some "cloud" server. If something capable of automatically filling in passwords (or sharing passwords between multiple devices/users) is necessary then there are reasonable passwords managers from LastPass, bitwarden, 1Password, Dashlane, etc. Note that unlike KeePass, these password managers work as extensions added to web browsers (or apps on mobile phones), and they store password databases online. When auditing your firewall configuration and preparing to reopen ports, I recommend never opening ports globally unless absolutely necessary. I also recommend requiring anyone who needs access to sensitive services (RDP, Windows Networking, etc) to connect to the network via a VPN so that you don't have to open ports for those services in the firewall, and then only open the VPN port in the firewall for IP addresses that need access to it. If someone who needs access has a dynamic IP, then many firewalls these days support something like Single Packet Authorization or Port Knocking to dynamically open ports for unknown IP addresses.
Please, do you have any tool for decryption of. Promok infected files? | 2019-04-23T14:53:07 | https://support.emsisoft.com/index.php?app=core&module=system&controller=notifications&do=followers&follow_app=forums&follow_area=topic&follow_id=12173 |
0.998242 | Since starting my own law office in Milwaukee, WI, I have made it my goal to give each of my client's a tailored approach to their financial goals. I have made sure to focus my practice on the "little guy", only dealing with bankruptcy, debtor's rights, and foreclosure defenses. I pride himself on making connections with all of my clients and my office staff claims I have an "obsession" with returning client messages in 24 hours or less. In my free time I enjoy spending time with my children, reading English and Roman History and being a historical re-enactor in theater recitations from the colonial period.
A: It's 6 years from the time of default. However, you may be liable for the debt incurred by your wife. Call a consumer lawyer in Wisconsin and get a free consultation.
Q. How do I get a satisfaction letter from a plaintiff that is no longer in business???
A: You're going to need to file a motion with the court. You will need to explain (and show) how the plaintiff is no longer in business and that the judgment should be listed as satisfied. You may want to retain a lawyer to help you, as you are going to need to file a number of different documents with the court.
Q. Is it possible to dispute my credit report? Something about it is wrong, there must be a mistake. What should I do?
A: You certainly have a right to dispute the incorrect information under the Fair Credit Reporting Act. The credit reporting agency (and the company putting the incorrect information on), must investigate your dispute and get back to you in 30 days. Contact a Wisconsin consumer lawyer and get a free consultation. They can help you.
Q. How much time must a creditor give to a debtor to cure a default?
A: No, you won't go to jail. Because if your card/bank authorizes the transaction, you'll then owe the bank all that money. They'll freeze your accounts and probably sue you for the money. Don't be stupid; don't do it.
A: Get a copy of the documents to a consumer lawyer - most of them in Wisconsin offer free consultations. They'll be happy to answer your questions.
Q. Is it legal for a credit card company to close my account?
A: Depends on the reason they're closing it. Did they explain why?
A: You may have a case for an "illegal repossession" and be entitled to get the vehicle back -- AND return of all the money you paid on the car. Contact a local consumer lawyer that specializes in repossession cases and request a free consultation.
Q. Is it a good idea to opt out of a class action settlement notice you get in the mail?
A: You really need to talk with a lawyer about that, before making a decision. It will turn on the nature of the class and the type/strength of individual claims you have. | 2019-04-21T10:27:47 | https://lawyers.justia.com/lawyer/nathan-deladurantey-855244 |
0.999352 | Bournemouth manager Eddie Howe applauded full debutant Yann Kermorgant after the striker netted a fantastic hat-trick as the Cherries beat Doncaster Rovers 5-0.
Kermorgant, a £400,000 January recruit from Charlton, scored twice in the opening 45 minutes before completing a perfect display with a third midway through the second half.
Harry Arter added two goals of his own in the second half, as the Cherries completed their first league double of the season.
Howe was ecstatic at his recent signing's strikes and how the Frenchman, in his fifth appearance for Bournemouth, adds a new style to the Cherries' play.
"Yann added a different dimension like you hope he would," Howe explained. "He's technically very good, we didn't want to bring in a one-dimensional player.
"Although he is a tall lad, he is technically very good and can play with his feet and he is good with his chest and he'll fit our style of play which we felt was very important.
"The really important goals from my perspective are his aerial presence from headers, which is something we've lacked this season, and those were two headed goals of high quality."
Kermorgant opened the goal scoring feast in the 26th minute when he volleyed under Doncaster goalkeeper Sam Johnstone.
He added a second a minute before half-time when he nodded in Simon Francis' hung cross, before completing his first career hat-trick with another powerful header.
Arter completed the rout with two drilled efforts after the break, to give the Cherries their second win of 2014.
Doncaster manager Paul Dickov could not hide his disappointment after the heavy defeat had left his team deep in relegation trouble.
Dickov said: "Our performance was unacceptable from start to finish. We have 13 games left and they are massive games.
"I have to apologise to our fans. They've come a long way and we have let them down.
"I am all the more disappointed before I felt we had a chance of getting something out of this match but we had to change our gameplan early in the match and never recovered.
"We were all over the place defensively. Bournemouth's front two caused us all sorts of problems.
"We need to get back to the standards we have set ourselves earlier in the season because we have taken a hammering.
"We were over-run in midfield, defended too deep and could never pose a threat in attack.
"We have had two long journeys in a week and lost them both but the truth of the matter is Bournemouth were a hell of a lot better than us." | 2019-04-19T06:34:11 | https://www.efl.com/news/2014/march/bournemouth-boss-eddie-howe-praises-yann-kermorgant-hat-trick/ |
0.999997 | A SELF-PROCLAIMED 'meninist' has sparked fury after going on an anti-tampon rant – during which he demanded that women learn to 'control their bladders'.
Outraged by a tweet calling for the end of tampon tax, 19-year-old Ryan Williams took to social media to share his views on feminine hygiene products.
The photography student, from Canvey Island, Essex, believes tampons are a 'luxury item', saying: "If a woman 'cannot hold in her period until she gets to a toilet' then it is her problem, not the taxpayer's."
Since sharing his controversial views yesterday evening, Ryan - who describes himself as a "politician and youth adults spokesperson" online - has seen his tweet shared by 1,965 people and liked by 1,938.
Ryan, who studies in Norwich, explained: "I saw a post about ending the tampon tax and I was so annoyed I had to have my say.
"People are saying tampons shouldn't be taxed because they are a necessity but why can't those women just learn to control their bladders?
"If they are going to bleed then they should wait until they get to the toilet. It's all about self-control.
"If you can't control your bladder then that's not the taxpayers' problem. I don't urinate everywhere and expect free nappies.
"If you make tampons free where do you draw the line? They'll be going about petitioning for toilet roll to be free next.
"I think women who want an end on tampon tax are just cheapskates."
Has he gone too far?
The teen, who has been with girlfriend Clare Kennedy, also 19, for 15 months, even set up a poll to find out how many people would support him.
But Ryan was shocked to find that 87 per cent of those who have responded to the poll think tampons should be free – and only 13 per cent agree women should 'hold their bladders'.
Since sharing his controversial views, Ryan has been criticised for his lack of knowledge of the female anatomy and claims he has even received death threats from feminists.
Ryan said: "The tweet has completely blown up and the responses I have had are absolutely stupid.
"I can't believe that 87 per cent of people think tampons should be free – it is ludicrous.
"People have told me that I must have skipped biology lessons but I don't understand how that is relevant. I have even had death threats.
"People are saying it isn't dirty, it's natural but urine and faeces are natural and still dirty. It's utter hypocrisy.
"Some people have started comparing me to Donald Trump but there is absolutely no comparison – to Zac Efron, yes, but not to Donald Trump."
Although he has received a lot of negative responses Ryan is glad he has gone viral because he feels his post will serve as a 'real eye opener'.
The student, who was also an avid Brexit campaigner - but has since admitted he regrets his vote - feels it has all been worth it for the messages of support he has received from a lot of other men.
Ryan said: "Even with the negative comments and death threats I am glad so many people have shared my tweet.
"I have had a lot of messages from men saying I am right. I think it has been a real eye-opener for them." | 2019-04-25T05:02:14 | https://www.thesun.co.uk/news/2011394/teenager-sparks-outrage-with-tirade-against-tampon-tax-as-he-tells-women-to-control-their-bladders/ |
0.999999 | In a nutshell: Valuable art was stolen in the Netherlands. The art was found by intelligence agencies in Ukraine. Spies determined that Oleh Tyahnybok has some of the work.
Oleg Tyahnybok can be seen below doing the Nazi salute (wrong hand), and also shaking hands with Biden.
Tyahnybok and the rest of his party are Nazis. We are doing business with them. That we are doing business with them is not new, but that they also deal in stolen art is the story here.
Some others who are photographed dealing with the Nazi thieves include: German minister of foreign affairs Frank-Walter Steinmeier, Canadian Foreign Minister John Baird, John Kerry, Joe Biden, John McCain, and Hillary Clinton.
All have backed these Nazis who are trying to ransom Dutch artwork back to Netherlands.
I do not know if this was reported this hour, but here goes: Some of the artwork is damaged because the thieves rolled the paintings and caused much damage. The cost of restoration + ransom is not worth it. | 2019-04-20T22:59:41 | https://michaelyon-online.com/u-s-and-others-working-with-nazis-dealing-in-stolen-art.htm |
0.999 | While 50 hours is a long time, the piano is played sitting down. It might be more impressive if he had to hold a heavy instrument in the air for that length of time. Are there any endurance records for playing an accordion or a sousaphone?
It would be most impressive if he had played the piano in a marching band. | 2019-04-24T05:49:18 | http://www.weirduniverse.net/blog/comments/professor_burt_endurance_pianist |
0.999941 | After seven years in Beijing as a staff writer for The New Yorker, Hessler (River Town) moved with his wife and twin daughters to Cairo in 2011 just as Egypt’s version of the Arab Spring was unfolding. The protests in Tahrir Square in early 2011 resulted in the resignation of President Hosni Mubarak and a period of instability leading to the ascendancy of the Muslim Brotherhood through parliamentary elections and Mohamed Morsi as president in June 2012. Hessler takes readers on a fascinating journey up and down the Nile to bear witness to the effects of these political upheavals on average Egyptians, including his Arabic tutor, an entrepreneurial garbage collector, a gay interpreter, and local officials. Along the way, he also visits Egyptologists at archaeological sites, particularly Abydos and Amarna, where he gains perspective on current events culminating in the military suppression of the Brotherhood and overthrow of Morsi by General el-Sisi on July 3, 2013, himself elected president on May 29, 2014. Through all of this, little changes for ordinary citizens within the constraints of Egyptian societal traditions. VERDICT This is writing at its best and highly recommended for anyone interested in Egypt, modern or ancient. | 2019-04-18T14:52:59 | https://www.wmclark.com/library-journal-gives-the-buried-by-peter-hessler-a-starred-review/ |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.