proba
float64 0.5
1
| text
stringlengths 16
182k
| timestamp
timestamp[s] | url
stringlengths 15
1.72k
|
---|---|---|---|
0.998703 | Why Did Chris Christie Embrace Obamacare's Expansion Of Medicaid?
Many Republicans have never forgiven New Jersey Governor Chris Christie for his effusive praise for President Obama days before the 2012 presidential election. Obama’s leadership, said Christie, had been “outstanding” after Hurricane Sandy. But a less-remarked-upon decision by Gov. Christie—to embrace Obamacare’s expansion of Medicaid—is of much greater policy significance.
As originally enacted in 2010, Obamacare—then known as the “Patient Protection and Affordable Care Act”—required every state to expand its Medicaid program, or face the consequence of having the federal government pull out of the state’s preexisting Medicaid program.
However, in 2012, the Supreme Court determined that this provision in Obamacare exceeded the federal government’s authority. In its opinion in NFIB v. Sebelius, the high court ruled that states must have the option to accept or decline Obamacare’s expansion of Medicaid.
Christie argued that New Jersey taxpayers would save $227 million in 2014, because the federal government’s infusion of Medicaid dollars would pay for uncompensated care for the uninsured, and because some of New Jersey's spending on Medicaid will be replaced by federal spending on Medicaid.
In Christie's best-case scenario, then, it's not so much that New Jersey will spend less, but that the entire country will spend more. Indeed, if you include federal spending, the New Jersey Medicaid expansion will increase U.S. taxpayer liabilities by as much as $25 billion through 2022.
And it's far from clear that Christie will be proven right about Obamacare's fiscal benefits for New Jersey. Through 2022, the Heritage Foundation estimates that Christie’s Medicaid expansion will cost New Jersey taxpayers about $1.2 billion.
Those estimates precede news that the New Jersey Medicaid rolls have increased by over 400,000 since Christie’s decision. That’s 71 percent more than the 233,000 that the expansion was projected to cover in 2012. In April, the Wall Street Journal reported that the state had been "overwhelmed" by the surge in enrollment.
How will Christie debate Hillary on Obamacare?
Chris Christie, it must be said, is no John Kasich, the Ohio governor who like Christie is running for President. Kasich has said that opponents of Obamacare’s Medicaid expansion will rot in hell, and implemented the expansion over the objections of Ohio’s Republican-controlled state legislature. Christie governs a reliably blue state with a Democratic legislature.
Nonetheless, Christie’s decision to expand one of the nation’s largest entitlement programs stands in contrast to his stated desire to reduce entitlement spending. “Every other national priority will be sacrificed, our economic growth will grind to a complete halt and our national security will be put at even greater risk,” said Christie earlier this year, in making the case for entitlement reform. But Medicaid is one of the entitlements causing all of those problems—and Christie expanded it under Obamacare.
Of the 32 million people who were to gain health coverage under Obamacare, half were to get that coverage from the law’s expansion of Medicaid. From a fiscal and coverage standpoint, half of Obamacare consists of its expansion of Medicaid: $824 billion in new spending from 2016 to 2025. In reality, the majority of Obamacare’s spending has come from Medicaid, because the law’s exchanges have performed so poorly.
Christie has repeatedly stated his desire to “repeal and replace Obamacare”—while simultaneously arguing that the half of Obamacare that is its expansion of Medicaid is a good thing. It’s hard to be an effective spokesman for the repeal of Obamacare if you’ve embraced one of the law’s central tenets. It would take Hillary Clinton less than 30 seconds to make mincemeat of Christie’s health care positions, as far as they have been disclosed, in a presidential debate.
Chris Christie has done some good things in his time on the national stage. He has defended the cause of modest entitlement reform when other presidential candidates—like Donald Trump and Mike Huckabee—have opposed reform altogether. He showed that Republicans could win in blue states like New Jersey.
But it’s hard to escape the conclusion that, when it came to Obamacare’s crucial expansion of Medicaid—the most important decision Governors have had to make in the past five years—Gov. Christie chose blue state principles over conservative ones.
INVESTORS’ NOTE: The biggest publicly-traded players in Obamacare’s Medicaid expansion UnitedHealth (NYSE:UNH), Molina (NYSE:MOH), Anthem (NYSE:ANTM), and Centene (NYSE:CNC). | 2019-04-19T18:29:28 | https://www.forbes.com/sites/theapothecary/2015/12/27/why-did-chris-christie-embrace-obamacares-expansion-of-medicaid/ |
0.999937 | 맥신의 미래 노트 :: Blurred lines의 뜻?
얼마전 Robin Thicke의 Blurred lines라는 노래가 빌보드 1위를 차지하며 큰 인기를 끌었습니다.
그 뜻이 궁금하여 찾아보니, 이런 정도로 검색이 되네요.
The term "blurred lines" generally refers to a lack of boundary or distinction between two or more things. In the case of the song, Thicke is referring to the small boundary between love and hate, like and dislike. It is to also signify how it is often hard to figure out if a woman is "into you", because she does not express it clearly.
대략 단어 그대로의 뜻인 '흐릿한 경계선'이 남녀관계에 적용될 때의 이야기 인것 같습니다.
남자가 여자에게 구애를 하면 여자들이 받아주는 것처럼 제스춰를 보이지만 막상 진도를 나가려고 하면 거절하는등 속마음을 알 수 없는 상황을 표현하는듯 합니다.
어떤 사람은 '강간 옹호 노래다' 라고 과격하게 표현하는 사람도 있네요.
한국에서의 어장관리라든지, 썸을 탄다든지 하는것과도 어느정도 비슷한 맥락이네요. 물론 그건 양방향의 이야기이지만요. | 2019-04-19T09:01:49 | http://loveyoumaxin.blogspot.com/2014/03/blurred-lines.html |
0.999914 | Find out who'll be missing when the ITV competition returns.
Dancing on Ice fans will be missing one of the most popular new additions to the rebooted series when the show returns next year.
The ITV reality competition returned earlier this year with a number of format tweaks, including adding Britain's Got Talent brothers Ashley and Jordan Banjo as part of its on-air team.
While Ashley is expected to return for the 2019 series as one of the judges, a spokesperson for the show has confirmed to Digital Spy that Jordan has had to quit as DOI's digital host from the backstage rink.
"Jordan isn't able to return due to scheduling conflicts, and the whole team at Dancing on Ice wishes him well," a Dancing on Ice representative said.
Digital Spy has also learned that there are likely to be additional changes to the on-air team when it comes to the line-up of Dancing on Ice's professionals, but the show isn't ready to confirm anything on that front.
A spokesperson for DOI told us: "We will be confirming our professionals line up in due course."
It was announced last month that original judge Karen Barber will be returning to the series as the head coach, which means another clash with 'Mr Nasty' Jason Gardiner could be in the offing.
The celebrity line-up includes Loose Women star Saira Khan, former Westlife star Brian McFadden, ex-Strictly Come Dancing professional James Jordan and Gemma Collins — the latter of whom Phillip Schofield has praised as a "sensational" booking, if indeed the notorious reality star makes it to the live shows.
Dancing on Ice returns to ITV early next year. | 2019-04-23T22:45:51 | https://www.digitalspy.com/tv/reality-tv/a869195/dancing-on-ice-2019-jordan-banjo-quits/ |
0.999928 | Regarding the front-page article "Monitor Correspondent Wins Pulitzer," April 10: A word of appreciation for the work of David Rohde, who recently won the Pulitzer Prize for international reporting. The importance of Mr. Rohde's discovery - that mass execution of Muslim prisoners took place in Srebrenica last July - should not be underestimated. The exposure of this atrocity was one of the factors that led to US involvement in Bosnia, resulting in the Dayton peace accord and the creation of NATO's international peacekeeping force in Bosnia, known as IFOR. One hopes that the perpetrators of the Srebrenica massacre will be brought to trial before the International War Crimes Tribunal in The Hague. Congratulations to Rohde for his Pulitzer and to the Monitor for maintaining its commitment to international news reporting.
The front-page article " 'Living Wage' Drive Accelerates in Cities," April 10, did not expose clearly enough the absurdity of executives' and economists' claims that low wages will rise sufficiently when "investment revives and the [economic] cycle matures." Real wages are at a 40-year low, not because of short-term fluctuations in economic growth, but because most modern corporations pay little attention to their hourly workers and will do anything (or nothing, when it comes to wage hikes) to maximize profits for shareholders and executives. A higher minimum wage sends some companies to foreign countries in search of cheap labor.
As someone who lives on a minimum-wage salary, I would argue that people with five-figure salaries have little reason to complain about workers' requests for higher wages. The need for a higher minimum wage is an issue that should be taken up by the government at one or more levels. Trusting corporations to take the necessary action will only lead to further inaction and worker abuse.
Regarding the article "Are G-Rated Movies Too Much for Young Kids?" April 15: I have worked for more than 11 years in the management of movie theaters. My experience has taught me that there hasn't been a movie made that is appropriate for everyone. G-rated movies are suitable for most kids, but not all. Some children are more sensitive to frightening scenes or are more easily influenced by what they see on the big screen than others.
The question is, does the rating system have to take into account the mentality of every child? There are too many variables to do this. The rating system provides guidelines to parents. It cannot endorse a specific film for a specific child.
If your children are sensitive to what they see, you should find out what is in the movie before your kids see it. You can do this by calling the theater and asking specific questions about the content of the movie. Movie reviews also offer valuable information. Of course, the best system of all is to see the movie yourself before you take the children.
Your letters are welcome. For publication they must be signed and include your address and telephone number. Only a selection can be published and none acknowledged. All letters are subject to editing. Letters should be addressed to "Readers Write" and may be sent by mail to One Norway St., Boston, MA 02115, by fax to 617-450-2317, or by Internet e-mail (200 words maximum) to [email protected].
'Living wage' bill gets vetoed in Washington, D.C. | 2019-04-21T04:18:12 | https://www.csmonitor.com/1996/0424/042496.opin.letters.3.html |
0.998938 | In Home Hairdresser in South Africa before I go into the points to help you choose your hairdresser, I should first outline the definition of what is a mobile hairdresser? A Mobile Hair Stylist is a hairdresser who usually works for his or herself visiting clients at their homes or place of work, or any other agreed venue and does not operate from a fixed hair salon or beauty shop.
In Home Hairdresser in before I go into the points to help you choose your hairdresser, I should first outline the definition of what is a mobile hairdresser? A In Home Hair Stylist is a hairdresser who usually works for his or herself visiting clients at their homes or place of work, or any other agreed venue and does not operate from a fixed hair salon or beauty shop. | 2019-04-19T22:57:10 | https://www.princeimperial.co.za/tag/natural-hair-salons-near-me-and-in-home-hairdresser/ |
0.999971 | Is Stephen Harper's terror bill really popular with Canadians?
If you saw a Globe and Mail headline from last week, you may have been left with the impression that Bill C-51 is a "political juggernaut."
Peter MacKay saw it -- Canada's justice minister has been flaunting the poll as evidence that the public overwhelmingly "supports these new measures."
Even though the vaguely-worded bill has been blasted by former prime ministers, Supreme Court justices and a parade of security and legal experts for expanding police powers without oversight and threatening the basic freedoms and civil liberties of Canadians, the Globe's report on an Angus Reid poll found that four in five Canadians support the terror bill -- while an additional 36% say it doesn't "go far enough."
But even more extraordinary than that -- less than 24 hours later, the Globe published an editorial expressing skepticism about their own report and urged Canadians to ask "a lot more questions."
"What does 'promote terrorism' actually mean?" the Globe's editorial asked. And "are Canadians aware of the lengthy history of intelligence agencies, in this country and elsewhere, overtstepping their mandates?"
"Sixty-nine per cent of poll respondents said 'there should be additional oversight to ensure the police agencies do not go overboard with these new powers.' Should Canadians insist on those safeguards? Or would it be wiser to pass the bill into law without additional oversight, and hope for the best?
There is more to Bill C-51 than the political selling points highlighted by the pollsters. The legislation is too vague and too broad. Canadians should be asking a lot more questions."
What's more, if you read past the headline numbers in Angus Reid's report, the public's level of concern varies by age.
But who knows what any of this actually means?
How representative is this of public opinion? What do people think who've actually read a news story about the bill? Do these numbers reflect a broad public that isn't very informed on the debate, or a pool of poll respondents who don't closely follow the news?
Suddenly, the bill no longer looks like a "political juggernaut."
At the very least, we can say this: on the surface, Canadians seem to be as concerned about privacy and civil liberties as they are about security. So is it still a good idea for the Conservatives to rush through new powers without a full and open public debate?
As CBC's At Issue panel recently noted, the Tories attempts to ram through new terror laws by shutting down debate could easily alienate Canadian conservatives who criticize 'big government' and value civil liberties and freedom of speech.
Yet Stephen Harper's Conservatives continue to insist that no new oversight is needed for their newly-expanded powers.
Photo: PMWebPhotos. Used under Creative Commons licenses. | 2019-04-24T04:15:03 | https://nb.pressprogress.ca/en/post/why-stephen-harpers-terror-bill-may-not-be-popular-he-thinks |
0.999982 | This page tells you how to distribute a Unity SpatialOS game via Steam, using the Steamworks SDK to authenticate a player.
Note that, in order to integrate your game with Steam, you’ll need to acquire the means to publish a game on Steam, and pass the Steam Direct process.
Submit your game to Steam Direct and complete the process.
You’ll be given an AppID once you’ve completed the Steam Direct process.
Generate a Steam Web API key by following these instructions.
Get in touch: ask us to add your AppID and Web API key to your project.
Only send this information privately to Improbable staff. Don’t post your AppID or WebAPI key publicly.
In this step, you’ll implement a simple version of Steam integration that lets you launch Unity clients using Steam.
In your SpatialOS project, install Steamworks.NET into your workers/unity project by following these instructions.
// Return steam access token as a hexadecimal string.
UnityClients can only be started from Steam and nowhere else.
The Launcher will no longer work.
To fix these problems, you can wrap the Steam logic in a check for a command-line argument: steamClient. This argument will be present when you launch a client from Steam. But it won’t be there when you launch a client from the Launcher, or when you run UnityWorkers.
// Safely call StartGameWithSteamAuthentication() after Steamworks has been initialised.
Find the zipped version of the client executable called UnityClient@<your-target-platform>.zip in <spatialos-project-root>/build/assembly/worker, and unzip it.
Upload the unzipped content to SteamPipe using the ContentBuilder.
For details on how to do this, see the SteamPipe documentation. 0. On the Steamworks App Admin page, navigate to Installation > General. 0. Create a new Launch Option with the following settings: * Executable: Your client executable, for example [email protected] or [email protected]. * Arguments: +appName <your SpatialOS project name> +assetDatabaseStrategy Streaming +steamClient true * +appName needs to be set to your SpatialOS project name, as specified in your spatialos.json. * +assetDatabaseStrategy Streaming specifies that entity prefabs loaded as part of your project assemblies will be downloaded to the game client at runtime. * +steamClient true means that clients launched from Steam will use Steam authentication, using the logic you implemented in step 3 above.
If you want a deployment to use Steam authentication, you must tag the deployment with the string you entered for Configuration.SpatialOsApplication.DeploymentTag in step 2.3 above (steam_deployment by default).
You’ve now successfully integrated your game with Steam!
To generate and manage access keys which will allow you to distribute your game, take a look at the SteamWorks packages documentation. | 2019-04-20T18:50:10 | https://docs.improbable.io/reference/12.1/unitysdk/customize/steam |
0.99861 | Aretha Franklin's Impact on Dance Music Over The Years - Pop It Records - NEW MUSIC EVERYDAY!
The irony is that Aretha Franklin’s disco album was a flop. Released in 1979 at the twilight of the disco era, La Diva was a commercial failure, selling less than 100,000 copies in the United States and standing as the lowest charting album of Franklin’s long and illustrious tenure at Atlantic Records.
But there was another dance subgenre coming down the pipeline, and Aretha and the soul genre she presided over as queen would become one of its primary vocal and spiritual influences. House music was just beginning its rise in the late '70s and early '80s, getting play at soon-to-be iconic venues like The Loft and Paradise Garage in Manhattan and The Warehouse in Chicago. It was in these clubs where producers — many of them young, black, gay and raised on church music — were forming the house sound, using emerging synth and drum machine technology to create the tracks and beat patterns that served as house music’s skeletal structure.
DJs like David Mancuso, Larry Levan and Frankie Knuckles didn't sing, but they had deep and impeccable taste and access to technology that allowed them to remix tracks by almost any recorded artist. Given the choice, they went with the best: Aretha.
Mancuso regularly dropped her 1968 hit “Ain’t No Way” during his sets at The Loft, setting the mood with the sultry 1968 slow jam about love and heartache. Levan dropped myriad Aretha tracks from the '60s and '70s into his mixes, lifting crowds with his driving beats and Franklin's soaring vocals while also working in music by many of the soul singers working under Aretha's influence. At his early days at The Warehouse, Knuckles played downtempo selections from the Franklin’s catalog in the morning after epic all night sets. "Frankie was a huge fan and adored her immensely," says Frederick Dunson of the Frankie Knuckles Foundation. Knuckles’ favorite Aretha track was “Ain’t No Way,” as it reminded him of this mother.
As the '80s progressed and house music jumped the Atlantic to Europe, where the genre fractured and mutated into strains like acid and progressive, DJs in the states were drawing from the Christian hymns of their youth with the expansion of the gospel house subgenre. This style cemented the notion of the club night as spiritual experience, with DJs bringing crowds on sonic journeys that lifted them towards spiritual ecstasy. The First Lady of Soul was a natural fit for the scene, and it wasn't only the old stuff DJs were pulling from, incorporating funky early '80s Aretha cuts like "Get It Right," "Freeway of Love," and "Who’s Zoomin' Who?" alongside Franklin's music from earlier eras.
It was only a matter of time before Aretha herself got in the game. Recognizing her crossover appeal in the dance world, Aretha called up the era’s star producers to help deliver her to clubland. In 1994, Franklin recorded a cover of “A Deeper Love,” a track originally by David Cole and Robert Clivillés, the masterminds behind C&C Music Factory. Clivillés and Cole produced Aretha’s take of "A Deeper Love," which skyrocketed to the top spot on the U.S. dance charts and also hit #30 on the soul singles chart and No. 63 on the Hot 100. (“My memory of Aretha Franklin is, “You got two takes boys and I'm done,’” Clivillés says of working with Franklin on the track.) “A Deeper Love” was the lead single from Franklin’s Greatest Hits (1980-1994) collection, with a rework by the era’s star remixer David Morales earning the song traction in the clubs while helping push Franklin to newer, younger audiences.
Check out some of Franklin's biggest dance tracks below.
“A Deeper Love” was a grand example of the era’s bombastic diva house genre, with singers on many of the era’s biggest diva house hits – Black Box’s “Strike It Up,” C+C Music Factory’s “Gonna Make You Sweat (Everybody Dance Now”) – indebted to Franklin’s guttural vocal stylings in the way all soul music was post-Aretha. Although some critics dismissed diva house as mainstream fare designed for women, at its core the anthemic genre was about power, with singers like Martha Wash and Loleatta Holloway delivering mighty vocals they seemed to be summoning from the depths of their body and soul.
In 1998, Franklin once again called upon Morales to remix her “Here We Go Again.” His rework came out as part of a collection that also included remixes by New York duo Razor N’ Guido. Morales, who specialized in remixing tracks by pop divas like Mariah Carey and Whitney Houston, pushed this new Aretha music into the worldwide club scene, landing it amongst the gay community that frequented clubs and worldwide circuit parties.
With the evolution of dance music in the last two decades, Franklin’s voice has shown up in genres she may not have been able to even imagine when she was recording the originals during the pre-computer era. Zeds Dead used the vocals and melody from 1968’s “I Say a Little Prayer” (itself a cover of the 1967 Dionne Warwick hit) in their 2012 track “Coffee Break.” The track – which borrows its title from the song lyrics “and all through my coffee break time” – brings Aretha into the world of bass and crunchy dub, demonstrating the breadth of her influence and the agility of her vocals to work in even the unlikeliest places.
Indeed “the Queen of Soul” wasn’t just a title, but a way to qualify the life force Aretha Franklin infused into her music through her miracle of a voice. It’s a voice that has extended across eras and genres, serving as a way for Aretha herself to reach new audiences while also becoming a tool for DJs and producers to infuse some soul into computer-made productions. So with today’s passing of Aretha Franklin, perhaps the best eulogy the dance world can offer is to keep doing what it has done since the beginning – dropping Aretha’s music, feeling her spirit reach out to yours and allowing yourself, however briefly, to be lifted. | 2019-04-23T20:06:10 | https://www.popitrecords.net/aretha-franklins-impact-on-dance-music-over-the-years/ |
0.99999 | This article contains an image that some may find disturbing.
Running. This word, synonymous with everyone for a sports activity that requires a certain amount of endurance and physical capability. To me, it means so much more.
There is a love-hate relationship whenever it comes to sports in Singapore, especially running. People with busy lives would see it as an act of healthy living, and do it for the sake of keeping healthy and striking bucket lists off by completing a marathon once in their life. Those bordering on the edge of insanity do it for more than living; bragging rights, personal bests, medals, finisher tees and even podium positions.
For me? Running edges on irrationality and a particular quest. A quest to live. A quest to be better than who I am today, and what I was yesterday and many yesterdays that have passed.
Growing up as a primary school student, I hated sports and any activity that required me to have a certain level of physical endurance. That resulted in my obesity and chubbiness at a young age.
When we’re at that age, we are ignorant of things that happen beyond our scope of understanding. Things like cancer, life and death, and also sometimes, our future.
As I entered my teenage years, I started to become more self-conscious. I started to realise every change on my body, and was always wishing I looked a little bit more handsome than that guy who has all the girls at school swooning over.
Then, there was one particular change that made a huge impact on my life, even until now. ‘Cold sores’ and ‘white patches’ started appearing on my body, especially on my thighs, hips and back.
I initially thought these ‘odd patches’ were nothing more than puberty taking charge of my body, but I was so wrong.
Those sores started to graduate into fungus-like plagues and scars on the majority of my thighs and hips. My skin started to flake and became overly sensitive and extremely dry—like the Sahara Desert. The white patches on my body multiplied faster than you can say cell division.
Following the advice of my aunt, I went to the doctors to find out what I really had.
After a few weeks of going back and forth with several consultations, blood tests and biopsies, I finally had a semblance of what I was suffering from.
I guessed my aunt thought I was too young to understand and kept it from me, passing it off as a severe form of psoriasis or ezcema and only wanted the best for me. I went through several sessions of phototherapy—a therapy that involves being in a chamber where UV lights penetrate your skin.
My skin seemed to get better with each session, but the side effects were obvious. I hated going to each and every session because it was troublesome to travel to after school. I was missing classes and couldn’t do the things I wanted to do like playing games and hanging out with my friends. I suffered from fatigue, migraines, and my skin started becoming extremely sensitive.
All of that happened while I was still just a teenage boy, and I thought nothing of it. I decided not to go ahead with the sessions as that took the life out of me. I brushed my condition off as something that would get better and disappear with age.
I continued to do what I love; I played hockey for the school and national teams, and did well enough in my O-levels to get into the polytechnic and course that I wanted, and life picked up for awhile.
I felt that life was only just beginning.
Exempted from NS—Am I a ‘lower-class citizen’?
Polytechnic was a blast. I made friends who even till today, are the bestest ones I can ever ask for. I went through experiences that I will go through again in an instant if I can rewind time.
After graduation from polytechnic, I was preparing for my next stage of life—National Service. I had high hopes and expectations for myself; to serve the country I was born in and that has given me so many opportunities, and to also give back to my father who has sacrificed much for my well being.
The first hiccup occurred during the compulsory medical check up at CMPB (Central Manpower Base). The medical officer wanted to give me a PES D and go for further check-ups at a doctor to make sure that I can serve, but I refused and begged for him to give me a better PES status. Maybe it was my ego, or maybe pride, but I didn’t care about my skin condition. I just didn’t want to be judged as a person attempting to escape military service.
All was well, until the month before my enlistment date.
My mother being the worrywart she was, came to me in tears telling me to go back to the doctors as she didn’t want to see me suffer. Upon her request, I went through the same troublesome processes again—consultation, biopsies, blood tests, and finally, I got my diagnosis.
It was from this diagnosis that finally revealed that my condition has advanced to a stage where it was cancerous. Even so, I wasn’t bothered by what I heard, and I just wanted to continue with my life.
Everything happened in an instant and things started moving very quickly. On the same day of the diagnosis, I received a doctor’s letter stating that I was unfit for military service due to a life-threatening condition.
Majority of guys at that age would be joyous to be exempted from NS. They’d feel happy for not having to ‘waste two years of their lives’ doing something they never wanted, but I was devastated. My future plans got derailed, and I didn’t know what I wanted to do with my life.
I felt like a totally different person as compared to others, and I felt like a lower-class citizen. What kind of stories would I have to share with friends and family in the future?
For a while, I felt really lost. I was dejected and I wished I knew people who was in the same boat as me, feeling what I felt.
I was physically fit, but medically unfit—a term that a majority of people in Singapore fail to understand.
I get questions like “you run so much, why cannot serve?!”, and “you run so many marathons, chao keng ah?!”.
It was so hard to have to explain the situation to others when I was already finding it hard to accept it myself.
After a long and hard struggle with myself, and with constant support from my closest friends and family, I came to terms that I will never be ‘normal’. I realised I was born this way, and everything happens for a reason, and that we just have to understand and respect that particular reason, no matter what it may be.
I took a gap year from the everyday stresses of life to find out what I really wanted to do. I worked part-time, travelled, relaxed, played games, but most importantly, I continued with my passion—running.
Things started to fall into place. I got accepted into university and was the very first batch of full-time students in SUSS. I completed more marathons, races, and became faster and better. I found a part-time job which paid well and made friends with some amazing colleagues and bosses that I will never forget.
People who don’t know me judge me for being exempted from NS, for being a ‘chao keng’, but that’s okay.
People avoid me once they see the scars and plagues on my thigh thinking that they are contagious, but that’s okay too.
People chide me for making unconventional decisions, thinking that my dreams are impossible, but that’s fine as well.
At times, my thoughts stray because I get the feeling like I am a huge burden to everybody because of my condition, as I am unable to do the everyday things that normal people do.
But do I just want to be normal?— I’d give anything to be.
And that is why I run.
15 marathons and a few ultramarathons later, I found out that the people who mind, don’t matter and the people who matter, don’t mind. I am really thankful for having awesome friends and family providing all kinds of support in the crazy pursuit of my dreams.
Who, or what do I run for and why?
Running is a release. Running is an outlet. Running is therapy.
Running doesn’t need reason, we just go.
We are but creatures of passion, driven to achieve beyond the norms.
Right now, I am living the best life that I can ever have. I work in a full-time job that utilises the best of my abilities, and fulfills the things I have always wanted to be and do in life. I am a coach, a tour guide, and managing the operations of a small company.
Everyday, I know how fortunate I am to have people around me who accept me exactly as I am.
I have an amazing girlfriend who provides me with all kinds of support—emotionally, physically and psychologically, and that is something I am forever grateful for. And I am more than grateful for a family who lets me figure out my life and supports me through my journey.
Because of all the support that I have, I have embarked on a quest that seems achievable and easy for a majority of my running friends, but near to unattainable for me due to my skin condition. I fatigue easily, I don’t recover as fast as others, I don’t perspire (which is extremely dangerous because my body doesn’t get cooled and that results in heat injuries) but that won’t stop me from trying.
The quest to break the 3-hour marathon barrier.
I don’t have anyone to prove to but myself. Excuses are plenty, but I love to find that one reason why this matters to me.
We want to prove to ourselves that limits are meant to be broken, and that cancer is just another limit in life that is waiting to be broken through any means possible. Because to earn the best days in life, we have to fight through some bad days to know that it is going to be worth it in the end.
This article is contributed by Goh Chang Teck.
All images used in this article are provided by the contributor.
Also read: Kicking The Habit – My Struggle With Quitting Smoking. | 2019-04-21T02:50:38 | https://millennialsofsg.com/2019/03/31/dealing-with-cancer-running-called-chao-keng/ |
0.998758 | Uniforms form an essential part of school life in a lot of schools around the world. Students are expected to abide by a strict dress code where everyone wears the same school uniform. But why is this custom necessary? Why should all the students be made to wear the same uniform? There are a lot of reasons for this.
Now imagine a scenario where your children are supposed to wear casual clothes everyday to school. This would mean that they would want to buy a lot of fancy clothes frequently. Add to it the impact of peer pressure and no amount of clothes would be enough for them. Now instead, if they are supposed to wear a uniform throughout the year, it solves the problem completely. Having a few pairs of uniform that would last your children at least for 2-3 years is much better than spending on new clothes every few days. Thus, a uniform substantially reduces the cost of school clothing for your children.
One of the biggest reasons why uniforms are promoted and appreciated throughout the world is because they promote equality among students. Since all the children come from different socioeconomic backgrounds, they would have different quality of clothes. Now if the students are to wear these different casual clothes to school, it would create a sense of inequality. Some would feel richer and have a superiority complex while others would feel poorer and have an inferiority complex. It would also make students judge each other on the basis of their clothes and the assumed socio-economic status. Now instead if all the children have to wear the same uniform, this class divide diminishes. All the students would be wearing the same dress, thus creating a sense of equality amongst them.
School is a place where students are supposed to learn and grow, personally as well as professionally. However, efficient learning requires a certain mindset. A positive learning environment is required which would felicitate the urge to learn in students. That is why schools are build in a particular way that promotes learning. However, when you allow students to wear casual clothes to school, you are taking away that sense of sincerity and seriousness out of the school environment. Instead, if you make them all wear a uniform, it would create a more structured and disciplined environment. A mindset will be created that will encourage students to focus on learning while wearing the uniform. Thus, school uniforms play a very important role in building a school environment that will encourage students to learn more and more.
Apart from this, there are a lot of other reasons why school uniforms are a good idea. Basically, the idea is to promote better learning by using uniforms as a tool. | 2019-04-20T09:06:06 | https://www.schooluniformsaustralia.com.au/blogs/testimonial-blog-post/why-should-students-wear-school-uniforms |
0.999818 | "For the fate of men and the fate of beasts is the same. As one dies so shall the other." A young wolf has nightmarish dreams of chaos and strife. What do the choices on one person matter to the fate of the world? In one word: everything. | 2019-04-26T16:22:26 | https://www.inkshares.com/books/of-beasts-and-men |
0.998266 | Are epidural injections effective for treating sciatica pain?
I suffer from sciatica, which has caused a lot of pain over the past six month. My doctor has recommended epidural injections, but I hear that they have been disproven. Can you help me sort this out?
Here’s an answer I’m sure you’ll find satisfying: It depends! It depends on what’s causing the sciatica, and on which studies you believe.
Sciatica is a persistent aching or burning pain felt along the sciatic nerve. The two sciatic nerves are the longest nerves in the body. They run from the lower back down through the buttocks and into each of the lower legs. The pain of sciatica can be severe. It can go away on its own, but for many people, sciatica is a chronic condition that keeps coming back.
Sciatica occurs when the sciatic nerve is pinched, irritated or injured. Inflammation, arthritis or a displaced disk in the lower spine is often to blame.
Doctors commonly treat sciatica with epidural injections into the spine. (The word “epidural” refers to a particular area in the spine.) The injections contain a steroid, which reduces inflammation. The injections can also contain a long-lasting painkiller.
The different causes of sciatica may be one reason that studies come to different conclusions. If a person’s sciatica is caused by inflammation rather than by arthritis, it may be more successfully treated by steroids — since the main effect of steroids is to reduce inflammation.
The best kind of study for any treatment procedure, like an injection of medicines, is a randomized trial that includes a sham procedure. In this kind of study, every person gets an injection, but only some people, chosen at random, get an injection of the real medicine; the rest get just a placebo injected or nothing injected (a sham procedure).
Unfortunately, different randomized trials have come to different conclusions. What doctors do in such a situation is to pool the results of all the different studies to see if they collectively come to a clear conclusion.
Probably the best such study was published in 2012. These were patients like you — as best I can tell from your letter. They all had been suffering from sciatica that was not going away with conservative treatment: exercises and mild painkillers. The conclusion of the study was that the epidural injections produced a small improvement in leg pain over the next three months. However, by one year later, there was no clear benefit — sciatica was just as much a problem in those who received the epidural injections as those who did not.
Given the severity of your sciatica pain, it might be worth trying an epidural injection. But bear in mind that this treatment may offer only a small and short-lasting benefit.
Talk to your doctor about whether simpler treatments such as exercises, physical therapy, compresses, painkilling medicines, chiropractic manipulation, massage, yoga or acupuncture might be worth considering. | 2019-04-23T06:19:57 | https://www.askdoctork.com/are-epidural-injections-effective-for-treating-sciatica-pain-201604049024 |
0.999641 | ROUGH CUT (NO REPORTER NARRATION): STORY: U.S. television personality Kim Kardashian and rapper Kanye West left a Paris apartment block on Friday (May 22) hours before their wedding celebrations are expected to take place at the Chateau de Versailles. The couple were accompanied by their daughter North who was in a stroller and Kardashian's mother Kris Jenner. West and Kardashian are then expected to travel to Florence on Saturday (May 24) where the wedding is due to be held, an official from the mayor's office confirmed last week. The official said the couple had rented the 16th century Belvedere Fort for 300,000 euros (244,293 pounds) for the occasion, which will be presided over by a Protestant pastor. | 2019-04-19T09:32:39 | https://in.reuters.com/video/2014/05/23/kim-and-kanye-leave-paris-apartment-as-w?videoId=313066443 |
0.999965 | Is the plot of `Baahubali` inspired by Jain mythology?
Is the plot of 'Baahubali' inspired by Jain mythology?
The plot of Baahubali has remained a closely guarded secret but the title of the film hinted at the possibility that it might be influenced by the story of Rishabha and his two sons Jadabharata and Bahubali from Jain mythology.
Rishaba's story appears in multiple sources like the Bhagavata Purana, the Rig Veda and the Jain text Adi purana, written in the 10th century by Adikavi Pampa. The first of the twenty four tirthankaras, Rishaba, is revered as the founder of Jainism.
According to legend, Rishaba divides his kingdom between Bharata and Bahubali. Bharata becomes the ruler of the northern half of the kingdom, ruling from Ayodhya while Bahubali presides over the southern half of the kingdom from Podanapur. Bahubali and Bharata subsequently go to war for control over the entire territory. Bahubali gains victory but gives up his kingdom to his brother.
From what is known of Baahubali's plot, the rivalry between the brothers played by Prabhas and Rana Daggubati seems to have a resemblance to the story of Bharata and Bahubali. The similarity in the stories landed the makers of the film in trouble when a Jain mutt raised concerns over the portrayal of Bahubali in the film. The character in the film was perceived to be too violent. On the other hand, Bahubali, who is revered as Lord Gomateshwara, is an embodiment of peace.
However, the makers of the film have assured everyone that the plot of the film is fictional and is not based on the religious texts. Other than the similarity in the name, there is little in common between the two stories. | 2019-04-19T10:56:35 | http://www.sify.com/movies/is-the-plot-of-baahubali-inspired-by-jain-mythology-news-telugu-pf0qB7baehhhd.html |
0.993244 | Proponents of the glycemic index say the secret to losing your gut is to eat by their numbers. But what happens when those numbers lie?
Here's a riddle: What do a Twix candy bar, a Pizza Hut supreme pizza, and a Betty Crocker chocolate cake have in common?
Answer: They're all "low glycemic" foods. And according to many nutrition experts, that qualifies them not only as healthy but also as great diet fare. For example, NutriSystem has pegged its marketing campaign on the science of the "glycemic advantage," which the company claims is the key to losing weight while allowing you to eat the foods you love.
What is all this glycemic science? A bit of background: The glycemic index (GI) ranks foods based on the impact they have on your blood sugar. So the higher a food's glycemic index, the higher it elevates the amount of glucose coursing through your veins. The idea is that this overload of glucose leads to wild swings in blood sugar (it goes up, then comes crashing down), which ultimately causes you to crave more carbs. As a result, you overeat, or at the very least feel deprived from denying yourself, say promoters of the glycemic index. What's more, they argue that high blood sugar triggers the release of insulin, a hormone that helps lower blood-glucose levels, but that also signals your body to store fat.
This has led to the differentiation between good carbs and bad carbs. The good carbs are said to be low glycemic, meaning they break down slowly, which keeps blood sugar and insulin levels more stable and holds hunger at bay; the bad carbs are high glycemic and do the opposite.
All of which sounds smart, of course, but don't put Pizza Hut on your speed dial just yet. Turns out, the science of the glycemic index isn't that simple -- and in fact, it's even a little sketchy.
Let's say you decide to eat based on the glycemic index. So when given a choice, you'll choose the foods with the lowest GIs. Now consider these GI facts.
1. Both pound cake and soda have a lower GI than watermelon.
2. Chocolate ice cream has a lower GI than a parsnip.
3. The GI of a Twix bar is lower than that of all the foods we just mentioned.
According to this analysis, you should opt for a Twix over a slice of watermelon. A soda would be better, too. Intuitively, of course, that doesn't make sense. After all, per serving, the watermelon is lower in calories and higher in essential nutrients than the Twix. And, well, it's fruit—not junk.
What gives? It's simple: The glycemic index doesn't compare real-world portion sizes. You see, the GI of a food is determined by giving people an amount that provides 50 grams of digestible carbohydrates, which include starch and sugar but not fiber.
This is the amount of carbs in about three-quarters of a king-size Twix. However, you'd have to eat 5 cups of diced watermelon to match that number—not exactly an apples-to-apples comparison. So even though eating a lot of watermelon may raise blood sugar dramatically, a single serving of the fruit has significantly less sugar than a candy bar.
Your takeaway A food's ranking on the glycemic index doesn't necessarily indicate whether it's a good or bad choice. As a general rule of thumb, whole foods—such as produce—are superior to their processed counterparts, regardless of where the items fall on the glycemic index.
Another surprise: The glycemic index of a food isn't a set number. University of Toronto scientists found that the value can vary by 23 percent to 54 percent from person to person. What's more, it can also differ within the same person. Scientists at Syracuse University discovered that a single weight-training session reduces the effect of a high-sugar drink on blood glucose by 15 percent for 12 hours after an intense workout.
Exercise uses the glucose stored in your muscles. And to replenish those stores after a workout, your body starts shuttling more of the glucose from your bloodstream to your muscles where it's packed away for future use. This helps reduce blood-glucose levels quickly, even after a high-sugar meal. Consider it another reason to lift weights: That extra muscle gives you a larger storage area for glucose.
Your takeaway The more active you are and the more muscle you build, the less you need to worry about how foods affect your blood sugar. This is also why the best time to eat fast-absorbing carbs is just before, during, and right after your workout.
Look on the back of a package of a king-size Twix and you'll find that it has 46 grams of sugar. How then, can it be a low-glycemic food? Three reasons.
1. Not all sugar causes spikes in blood glucose. Here's why: The nutrients you eat that have the greatest impact on your blood sugar are glucose and starch. But most sweeteners, such as sucrose (table sugar) and high-fructose corn syrup, are only about half glucose. The rest is primarily fructose, a sugar that has just a tiny effect on blood sugar. So only a portion of the sweetener in a Twix bar is high glycemic.
Your takeaway Don't be fooled into thinking low-glycemic junk food isn't still junk. Remember, eating highly sweetened snacks is an easy way to consume the excess calories that lead to a bulging belly.
2. Fat lowers a food's GI. That's because it slows the absorption of glucose into your bloodstream. (As does fiber.) For instance, U.K. researchers found that adding full-fat cheddar cheese to a baked potato reduced the meal's glycemic index. With a Twix bar, you're eating a combination of sugar and fat, which means that your blood sugar won't rise as high after you've finished it. Fiber also slows glucose absorption: That's why bread made from whole-grain flour has a lower glycemic index than the kind made from refined flour.
Your takeaway Go ahead, have some fat. Adding a pat of butter to a slice of whole-wheat bread or tossing some nuts onto your cereal will ensure that your blood sugar rises at a more even rate after a meal—instead of all at once. Keep in mind, though, that this is not a license to overindulge. Total calories is the most important factor in managing your weight.
3. The glycemic index is relative. High-glycemic foods are those with GI values of 70 and up; medium-GI foods fall between 56 and 69 on the scale; low-GI foods are at 55 and below. However, within that low-glycemic category, for instance, there's broccoli, with a GI of 0, and macaroni, with a GI of 47. A serving of broccoli contains just 4 grams of digestible carbs and 31 calories, yet it shares the same classification with this pasta, which delivers 49 grams of carbs and 221 calories.
Your takeaway Low glycemic doesn't necessarily mean low carb. The reality is that the most dominant factor affecting how much a food raises your blood sugar is the total amount of digestible carbs you eat. My recommendation: When you're trying to lose weight, limit higher amounts of carbohydrates—more than 40 grams—to the hours around your workout. The rest of the time, cap your carb intake at 40 grams per meal and 20 grams per snack.
Here's the bottom line on the GI.
Unless you're having just a soda, you're usually eating a mix of nutrients. That is, most meals with fast-absorbing carbs also include protein, fiber, and/or fat. (If yours don't, they should.) This makes the GI an unreliable tool, as fat and fiber both lower your blood-sugar response after you eat.
You don't need the glycemic index to make wise choices. Just eat the majority of your calories from whole foods: meat, fish, fruit, vegetables, dairy, and whole grains. This automatically eliminates the junk and provides a filling diet rich in vitamins and minerals and other healthful nutrients.
Calories are king. If you don't overeat, you'll stay lean and healthy for life. So a diet that you find the easiest to maintain is probably the right one for you.
We eat many types of sugar, but the two main ones are glucose and fructose. They combine to create other sugars, such as sucrose.
Glucose: Your body's main energy source, this is the "sugar" in blood sugar. Since it's already in the form your body needs, it's quickly absorbed into your blood.
Fructose: To use fructose, your body must first send it to your liver, where it's converted to glucose or fat and stored. This is why fructose doesn't spike blood-sugar levels.
The definition for these is simple: Any carbohydrate that's composed of more than two sugar molecules.
Starch: This is a bundle of glucose molecules held together by a weak chemical bond. As a result, it's broken down easily into pure glucose and absorbed quickly.
Fiber: Like starch, fiber is a bundle of sugar molecules. However, human digestive enzymes can't break the bonds that hold them together, preventing absorption.
Glycemic Load: A Better Number?
Even experts who promote the glycemic index realize it's not perfect. But is their solution really an improvement?
To address the flaws in the glycemic index (GI), Harvard University scientists came up with another number to base food choices on. It's called the glycemic load, and it takes into account a food's portion size as well as its GI. You can calculate a food's glycemic load by dividing its GI by 100 and then multiplying that by its grams of digestible carbohydrates (total carbs minus fiber).
There's little doubt that using the glycemic load is better than considering a food's GI alone. But here's a secret: If you're concerned about how a specific food affects your blood sugar, you don't need to figure out its glycemic load. All you must know is the number of digestible carbs it has. The higher the number, the higher your blood sugar will rise. Simply take the total number of carbohydrates listed on a product's label and subtract the number of grams of fiber. A rule of thumb: Any amount over 40 grams will likely send blood sugar soaring. Take macaroni: It has a GI of 47, and 48 grams of digestible carbs. Do the math, and you'll find that its glycemic load is 23. A glycemic load of 20 or higher is considered high; 11 to 19 is medium; 10 or below is low. | 2019-04-23T00:47:37 | https://www.menshealth.com/nutrition/a19525801/understanding-the-glycemic-index/ |
0.998829 | Tokyo: Japanese Prime Minister Shinzo Abe has a chance to stay in power through the 2020 Tokyo Olympics and become the country's longest-ruling leader after his party decided this week to allow its presidents to serve a third straight three-year term.
The rule change by Abe's Liberal Democratic Party could give Abe a better chance to achieve his controversial goal of revising the post-war pacifist constitution, revered by some as a beacon of democracy but seen by many conservatives as a humiliating symbol of Japan's defeat in World War Two.
Abe took office for a rare second term as prime minister in December 2012, promising to reboot a stale economy and bolster defence. He is now serving a second consecutive term as LDP president, which ends in September 2018.
LDP rules now cap the presidency at two consecutive three-year terms. The rule change to allow a third term must be formalised at an LDP convention set for March next year.
Japanese prime ministers are elected by parliament's lower house and therefore are members of the majority party or a ruling coalition party.
If Abe wins reelection as LDP head and his party remains in power, he could stay on as premier into September 2021, which — combined with his 2006-2007 tenure — would make him the longest-serving leader of a country accustomed to a revolving door of short-term premiers.
"It is certain the environment would be created for him to settle down and tackle long-term issues such as revising the constitution," said the conservative Yomiuri newspaper in an editorial.
Abe's reelection as party president, and hence premier, two years from now is hardly a done deal.
His popularity has remained mostly robust — a September Yomiuri survey put it at 62 percent - and the main opposition Democratic Party is languishing in public opinion polls.
But voters were split on the desirability of extending Abe's term as LDP chief, with 48 percent in favour and 43 percent against.
Doubts persist as to whether his "Abenomics" recipe for revving up the economy with hyper-easy monetary policy, spending and promised reforms is working. The same survey said 55 percent did not expect the economy to improve under his administration.
Some critics worry that with opposition parties weak and LDP members willing to speak against Abe few and far between, governance could suffer from a lack of checks and balances.
"A lack of competition can lead to complacency and good governance would possibly be in danger," said Sophia University professor Koichi Nakano.
If Abe lasts until late 2021, he would have served longer than early 20th century premier Taro Katsura and than his great-uncle, Eisaku Sato, Japan's longest-serving post-war premier. | 2019-04-24T10:32:35 | https://www.firstpost.com/world/shinzo-abe-may-become-japans-longest-ruling-pm-as-his-party-allows-president-third-consecutive-term-3075914.html |
0.999993 | Will I buy the cabin/property?
The question is asked on the Day of Saturn and in the Hour of Mars. There is no agreement between the lord of the Hour or the Libra ascendant or Lady thereof. The chart is not radical and there is warning of displeasure. With a non-radical chart there is something out of tune or something that doesn�t quite rhyme. There is a need to look at the details of the chart.
The querent is signified by the ascendant, it�s Lady Venus and any planet in the first house, which in this case is Mercury who is on the cusp of the ascendant. The querent is a broker (Mercury) and the leader of his own business (Venus in Leo 10th). His Sunsign is Libra � so the chart describes him neatly. The seller is a car salesman who is represented by Aries on the 7th and Mars who is in the sign of his fall on the cusp of the 10th. Mars comes from the opposition of Pluto and anyone who has been following the financial crises would recognize that anyone working within the car sales industry has been in for a tough time the last couple of years. The seller in a difficult situation, may be close to bankrupt, and has to sell one of his properties to save his situation.
The property is signified by Capricorn on the cusp of the 4th and it�s ruler Saturn, who is in his own terms of Virgo but yet cadent in the 12th house. Saturn in his own terms shows a property of a fair condition. The 12th house shows a remote and withdrawn location, yet there may be a detriment due to cadency � and my suspicions are raised by the applying opposition with retrograde Uranus in the Pisces 6th. It was impossible for me to come to terms with this configuration and I advised the buyer that there could be something wrong with the wires or pipework, Saturn in Virgo, imposing some necessary renovation. The buyer said that the cabin had no bathroom or water closet and that a tight tank would have to be installed to facilitate these appliances.
The owner of the cabin had the property appreciated in 2008 and the value was assumed NOK 1.150.000. The current rate of exchange �1 = NOK 10,-. However, this was before the financial crises had set in and he was offering it on the market for NOK 995.000. Cancer was on the cusp of the 10th house so the price was due to negotiation and change. Considering the Moon�s South node in the 10th together with Mars on the Midheaven the price could do nothing but fall. I noticed that the Moon, Lady of the 10th, was cadent in the 3rd house, hence poorly located, but even more important I observed that she was Void of Course and intercepted. This meant that the price of the property ws incorrectly represented and that the cabin held a secret.
I noted that Saturn, Lord of the 4th, and Mercury on the cusp of the ascendant were in mutual reception by exaltation, so I judged that the property would become the querent�s if he wanted it. Yet Mercury was slow of motion in such a way that Mars, signifer of the seller, applied to him by a square though signs of long ascension. This will usually indicate negotiable terms unless both significators are below the horizon. I advised the querent that he should not initiate the purchase but that the seller should come to him and the price move in his direction.
On September 8. it was confirmed that the seller had moveed in direction of the buyer and that he was willing to sell the cabin in the price range NOK 850-900.000. The buyer was considering an offer in the range of NOK 800.000, however, having conferred with the prospectus and the local authorities it turned out that the seller had installed water facilities in the cabin yet never delivered an official application. So as the querent discovered, his plans of improving the bathroom were immediately stopped by the cabin�s water facilities being reduced to a bucket of water. The lack of approved water facilities in house does greatly change the value of the property.
I noticed how the Moon separated from the square of Saturn and lastly the square of the retrograde Uranus in Pisces in the 6th house. This thus showed the sellers tampering with the regulations (also Moon in Sagittarius). Seeing that the Moon was VOC I judged that the price was going nowhere and that as she entered Capricorn, the sign of her detriment, and encountered the conjunction of Pluto before the opposition to Mars, the price was due to be cut further.
The client thanked me greatly for my judgement and advice.
Very nice discussion and a methodical approach.
Yes, I agree this is very neat.
I have a question.. why is the 10th house "the price"?
Does the 10th have significance over prices generally, so say the price of the ring, or the price of the car, would also be the 10th?
Or is the 10th the price in a property purchase only.. maybe because it's the 7th of the 4th.. the contract of the house?
Thanks. Sorry if this is available elsewhere, I couldn't find a rationale.
CA, CHAP. XXXIII. Of Buying and Selling Lands, Houses, Farmes, &c.
Let the 10th house, a Planet or Planets posited therein, and Lord of that house signifie the Price, that is, Whether it will be sold cheap or deer.
This is knowne by the Lord of the 10th, for if he be Angular, Direct, and strong in essentiall Dignities, the price will be high, and the Seller will put it off at deare rates; but if the Lord of the 10th be cadent, retrograde, slow of motion, afflicted, then the price will not rise high.
Let the 10th house and the Lord thereof signifie the Profit which may arise by that undertaking. | 2019-04-25T06:39:28 | http://skyscript.co.uk/forums/viewtopic.php?t=4725 |
0.999507 | While it may be difficult to straighten short hair, especially for a man, something as simple as a blow dry your hair with a flat brush, or comb, depending on hair length can help to relax some of which are found in the hair curls, because heat can help to straighten hair. This can reduce the need for straightening iron and allows you to create the popular hair styles, regardless of your hair texture.Is your hair curly or straight, it all looks the same when the buzzing is only a half inches long. Strip of hair in the middle is where it should begin. One can try several different products to make them stand upright, but that requires much effort for something that might not work. The best thing to do is to use a flat iron to straighten hair, and use lots of hairspray to hold it in place. A flat iron is not often found in the apartment of a man, but it is not too difficult to get one's hands on real iron. This can be used as well.curly faux hawk How to Create a Faux Hawk with Curly HairThere are many different hair styles out there today. With the new generation of them, they have done something different with their hair ridiculously. Something from the short hair at the back and long in front, for different colors of hair on one's head, something that is often seen is fake hawk. faux hawk generally appear to be done with straight hair, but where that leaves people who have curly hair? Here's how to make fake eagle with curly hair. | 2019-04-25T02:31:09 | http://africanamerican-hairstyles.blogspot.com/2011/05/how-to-create-faux-hawk-with-curly.html |
0.999822 | 0:12Skip to 0 minutes and 12 secondsWe're now going to study two more conic sections. Two other types of curves that enter into-- for example-- the orbit that a comet can have, and things like that. Let's begin with the parabola. Classically, a parabola begins by specifying in the plane-- a point, F-- and also a straight line-- called the directrix. So here they are. As you know, when you have a point, P, you can define the distance, d, from the point P to the point F. But you can also talk about the distance from the point P to the straight line that I've given. And that's going to be d as well. So to summarize-- a parabola is going to be specified by the following thing.
1:03Skip to 1 minute and 3 secondsHaving fixed F, and the directrix-- the straight line-- I'm looking at all points, P, whose distance to F is the same as the distance to the line.
1:16Skip to 1 minute and 16 secondsThat's the definition of a parabola-- geometrical definition. As usual our main theme here, is to find a more concrete, more numerical, more equational way to describe parabolas. How do we do that? Well, we introduce coordinate axes. Now here I've introduced them according to the canonical configuration. What that means is the x-axis is going to be parallel to my initial given line. I'm also going to place the origin in such a way-- in this canonical configuration-- that it's halfway between the point F and the initial given line. Therefore I'm going to call this distance between F and the line-- 2p. So p is the distance between F and the origin. And it's also the distance from the origin to the line.
2:07Skip to 2 minutes and 7 secondsSo therefore the point V-- which, here, is the origin-- is clearly a point on my parabola, because it satisfies the condition that its distance to F is the same as its distance to the directrix. When you fill in the points that you get on a parabola, you get something that has a shape like this.
2:32Skip to 2 minutes and 32 secondsIt turns out that the canonical equation of a vertical parabola-- that is, when you describe in terms of equations what the distance condition means-- gives you the equation y equals x squared over 4p. And this is called the canonical form of the equation of a parabola. The p is a positive parameter here. There is some jargon that goes with parabolas, just like there was a certain amount of terminology with ellipses. We defined the vertex to be the lowest point of our parabola. Here it's the origin-- 0, 0-- in our canonical configuration. And the focus of the parabola is to point 0, p-- the point F. The focus has a very interesting geometrical property, well, several really.
3:23Skip to 3 minutes and 23 secondsBut one of them is even related to the use of satellite signals, for example, also important in optics. Let me describe it to you. If you have a straight line coming in parallel to the y-axis-- and it bounces on your parabola by the usual law of incidence-- that straight line will then proceed to go through the focus, F. This is true for any vertically approaching line, such as the following. Now if you imagine, for example, that your straight lines are incoming signals from a satellite, why would they be parallel? Well, because the satellite is so far away, that essentially its signal lines-- when they reach your satellite dish-- are parallel.
4:14Skip to 4 minutes and 14 secondsAll those signal lines will reflect on the dish in such a way that they go through the F-- the focus-- of the parabola. In other words, they concentrate the signal at the focal point. This is an extremely important property, which explains why your dishes have a parabolic cross-section.
4:38Skip to 4 minutes and 38 secondsNow, we'll look at curves that have other interpretations-- namely hyperbolas. Now a hyperbola starts out a bit like an ellipse. That is, I give you-- in the plane-- two points F1, and F2. But the condition defining the hyperbola is going to be different. Let's call the distance between the two points-- as before-- 2c. c is a positive parameter. The canonical configuration for our hyperbolas will be the case in which the two points are on the x-axis, and the origin is at the midpoint of the segment, F1 F2. And this is the canonical configuration. And we'd like to know the equation of a hyperbola, which I haven't defined yet. Here's how we define it.
5:26Skip to 5 minutes and 26 secondsTypical point P will have a distance-- d1-- to the first point--F1-- that's given, and d2 to the second point. We're going to require-- of our points on the hyperbola-- that they satisfy the following condition. For a given parameter a-- strictly between 0 and c-- we want the difference between these two distances, d1 and d2, to be 2a-- in absolute value. In other words, the difference between the two distances is plus or minus 2a. What does that describe? Well, when you work it out you get a curve that looks like this. The reason the curve now has two branches-- a left branch and a right branch-- is because the difference of the distances could be either plus 2a or minus 2a.
6:19Skip to 6 minutes and 19 secondsSo it gives you two cases-- two branches. The two points where the x-axis is crossed, of course, turn out to be the points a, 0, and minus a, 0. The distance, c-- the original parameter-- simply corresponds to the point F1, which is the point, then, c, 0. And if we define now, another parameter, b, by means of the equation b squared equals c squared minus a squared-- then we can write the canonical equation of a hyperbola in the following form. It's the set of points x, y-- in the plane-- satisfying the equation x squared over a squared, minus y squared over b squared, equals 1.
7:07Skip to 7 minutes and 7 secondsSo you see the equation looks exactly like the equation of an ellipse-- except there's a minus sign, where before there was a plus.
7:17Skip to 7 minutes and 17 secondsThat's the canonical equation. And there is a certain amount of jargon for hyperbolas. There's one focus, two focus, two foci. They are the points c, 0 and minus c, 0-- the points F1, F2. The vertices, then, are the points where the hyperbolas cross the x-axis-- the points plus or minus a, 0. And there are also something called asymptotes associated with a hyperbola. What's an asymptote? Well, it's a line that describes the limiting shape, or position, of the hyperbola. Here's one of them. The line y equals b over a times x. It tells you what the hyperbolas are asymptotically approaching to-- on the upper right, for example. And the negative of that line completes the picture in the other directions.
8:11Skip to 8 minutes and 11 secondsNow we've met the 3 conic sections-- ellipses, parabolas, hyperbolas. We will see in the next segment why they are called conic sections.
In this video, Francis introduces the canonical equation of parabolas and hyperbolas, vertically and horizontally oriented, respectively. | 2019-04-24T06:42:41 | https://www.futurelearn.com/courses/advanced-precalculus/1/steps/306946 |
0.997704 | 1. Pass several inches of line through the eye of the hook.
2. Loop the line along the shank of the hook.
3. Wrap the tag end through the loop and around the shank about 5 times.
4. Moisten the line and draw it partially tight. I find it is easier to control if you start this process near the bend of the hook rather than near the eye.
5. Moisten the hook shank, slide the knot up to the eye, and draw the knot fully tight. Trim the tag to a reasonable length. | 2019-04-25T20:19:32 | http://fishtek.com/yet-another-use-for-the-uni-knot/ |
0.999999 | Plus sign (+) if content is closed, 'X' if content is open. When are the best times to pick/harvest fruits and vegetables for canning and freezing?
It's best to harvest produce early in the morning or during the coolest time of the day. To gain the best quality, it's also a good idea to freeze or can vegetables as soon as possible after they are picked. If you must hold them, keep them refrigerated. In research done at Pennsylvania State University, peas held 4 hours at room temperature before blanching lost 50 percent of their sugar content.
Plus sign (+) if content is closed, 'X' if content is open. How do I freeze kiwi fruit?
Kiwi can be frozen sliced, crushed or whole. It's high in acid and adding sugar will improve the flavor and help keep the fruit firm. Slices may be frozen individually by placing on a cookie sheet and freezing. When frozen, package in freezer bags. These slices are good for garnishes.
For syrup pack: Use 3 cups sugar to 4 cups water.
For dry sugar pack: Use 1 cup sugar to 1 quart kiwi slices. Toss to coat before packing.
For crushed fruit: Use 1 cup sugar to 1 quart fruit (or to taste).
NOTE: Kiwi contains enzymes that break down protein. Therefore, frozen and fresh kiwi must be heated to boiling before it is used in gelatin dishes. Frozen kiwi can be used to tenderize meat. Small whole fruits may be frozen for this purpose.
Frozen kiwi can be used to tenderize meat.
Plus sign (+) if content is closed, 'X' if content is open. Can I freeze fruit using sugar substitutes?
Yes. Both saccharin and aspartame are comparable in flavor to sugar-sweetened frozen fruit. To sweeten fruit, use the sugar substitute in the amount of sugar you would normally use. Equivalent amounts are given on the package. Use the dry pack method rather than the syrup pack.
Plus sign (+) if content is closed, 'X' if content is open. Is it safe to can thawed frozen meat?
Yes, as long as the meat has been thawed in the refrigerator.
Refrigerator thawing: Allow 24 hours for every 5 pounds of meat. Once thawed, can the meat within 2 days. When ready to can, do not let thawed meat remain at room temperature for more than 2 hours.
Plus sign (+) if content is closed, 'X' if content is open. Is it safe to pack dried tomatoes in oil?
Dried tomatoes in oil flavored with garlic and fresh herbs adds flavor to many recipes. The Food and Drug Administration requires food manufacturers making garlic or herbs-in-oil to acidify the product to prevent the growth of spores that cause botulism. Currently, there is no USDA researched tested recipe or process for acidifying tomato-in-oil mixtures at home for long term storage. If the tomato is not dried properly and moisture remains, one creates the perfect condition for Clostridium botulinum spores to germinate and grow. When oil is added, it acts as an oxygen barrier--another condition aiding growth.
Sometimes we can't create the same product we buy. Food processors have controlled recipes and conditions. Research done on home food preservation also tests for quality of the preserved product. Tomatoes dried packed in oil and garlic at home may result in a soggy and limp product. Instead, add oil, garlic and herbs to dried tomatoes just before preparing your favorite recipe or freeze for longer storage.
Ingham, B. Drying food at home, Wisline program, August 20, 2012, University of Wisconsin.
National Center for Home Food Preservation. Frequently asked questions..
Marrs, B. University of Iowa Extension, AnswerLine Program Specialist, August 23, 2012, email correspondence.
Feirtag, J. University of Minnesota, Food Safety Specialist, August 23, 2012, email correspondence.
Plus sign (+) if content is closed, 'X' if content is open. Can I preserve fruits without sugar?
Most frozen fruits have better texture and flavor when packed in sugar or syrup. Fruits that freeze especially well without sweetening include raspberries, blanched apples, blueberries, gooseberries and rhubarb.
Fruit can be canned with no sugar added. Use fully ripe, firm fruit for best flavor. The use of an antioxidant such as ascorbic acid will result in better color when no sugar is used.
Fruit being prepared for canning can be either hot packed or cold packed. Hot packing is preferred to extract the natural liquid and flavor from the fruit.
Unsweetened fruit can be packed in jars in the following ways: use water, the fruit's own juice or other unsweetened juice. It's better not to add artificial sweeteners before canning because they may change the flavor. If you want to sweeten your canned fruit with an artificial sweetener, add it when you serve it.
Plus sign (+) if content is closed, 'X' if content is open. Can Splenda® (sucralose) be used in preserving food?
According to the National Center for Home Food Preservation (NCHP), using Splenda® instead of sugar should work as a sugar substitute for syrup recipes used in canning fruits because the product is heat-stable. Some people report an aftertaste when used in various products, so it's possible for flavor to change during storage.
In other cases, where sugar is important, like some preserves or pickled fruits, it is NOT recommended that Splenda® be substituted for sugar. You could use Splenda® as the optional sweetener in a jam or jelly made with a no-sugar needed pectin, such as Mrs. Wages™ Lite Home Jell® Fruit Pectin or Ball® No-Sugar Needed Pectin. With these low-methoxyl pectins, no sugar is required at all. Sugar substitutes can be added as desired simply for flavor. The package inserts with these pectins give instructions on when to add the sugar substitutes (usually after all the cooking and just before filling the jars).
NCHP has developed three canning recipes using Splenda®. 1) Pickled sweet cucumber slices, 2) pickled beets, 3) pickled cantaloupe.
Plus sign (+) if content is closed, 'X' if content is open. Can I use the hot water bath to process pepper jelly/jam or do I need to use the pressure canner?
Acid, sugar and pectin are required ingredients for jelly or jam products. As a result, the water bath process is acceptable for pepper jelly or jam. Most pepper jam/jelly recipes include vinegar, lemon juice, sugar and pectin.
Plus sign (+) if content is closed, 'X' if content is open. Where can I get the thickener ClearJel® or Therm-flo® to can pie filling?
ClearJel® and Therm-flo® are heat stable thickening agents. Other starches (such as cornstarch or tapioca) break down and result in a runny filling.
You may find these produce in some cooperatives and stores selling canning supplies. Kitchen Krafts and Kaufmans are online resources.
Plus sign (+) if content is closed, 'X' if content is open. When I've canned pie fillings using ClearJel®, the filling seems to leak out the jars. What can I do to prevent this?
Slice the apples into thin slices, no more than ½" thick.
Blanch the apples as directed, working in small batches. Blanching stabilizes the product and also helps to remove air trapped in the apple cells.
Cook the sugar and ClearJel® mixture as directed in a large kettle. Rapidly heat and maintain even heat while adding apple slices.
Don't increase headspace to try and prevent product over-flow; it won't work.
Air trapped in the apple tissue may be a prime 'suspect' in product over-flow. As the air expands and leaves the cells and the jar, it carries product along with it. Effective blanching and using thin apple slices may help release trapped air.
If you have tried everything to no avail, try switching apple varieties. Many things can influence the success of the product, including apple variety, growing conditions, length of storage, etc.
Plus sign (+) if content is closed, 'X' if content is open. How do I can dried beans so they are ready to use (e.g. kidney beans for chili)?
Sort out and throw away any defective or discolored beans.
Place beans in a large pot, cover with water and let stand in a cool place for 12 - 18 hours and then drain.
Or cover beans with boiling water in a saucepan and boil 2 minutes. Remove from heat and soak 1 hour and then drain.
Cover the drained beans with fresh water and boil 30 minutes.
Fill hot beans into hot jars, leaving 1-inch headspace.
Add 1/2 teaspoon salt to pints or 1 teaspoon salt to quarts, if desired.
Fill jar to 1 inch from top with boiling water. Remove air bubbles. Adjust lids and process.
Process pints for 75 minutes.
Process quarts for 90 minutes.
Plus sign (+) if content is closed, 'X' if content is open. Is there a recipe for cream of tomato soup that is safe to can?
Home-developed recipes, like soup, may be dangerous when canned unless research tested recipes are used.
NEVER thicken soups with cornstarch, flour or tapioca before canning.
There is no safe method for canning milk or milk products at home that yields an edible product. We suggest you can your tomato soup without milk or thickener and add the milk/cream or thickener when you are ready to serve it.
Plus sign (+) if content is closed, 'X' if content is open. What do I do if the pressure canner lid is stuck?
Sometimes a lid on the pressure canner will become "stuck" if the lid is not removed when the pressure has reached zero. NEVER try to hurry the cooling of any canner or force it open by pouring cold water over it. This "shock treatment" could cause the seals to loosen, the liquid to siphon off or the jars to break.
NEVER try to hurry the cooling of any canner or force it open by pouring cold water over it.
Reheating the canner and letting it return once again to zero pressure should release the vacuum. You can also use a rubber mallet, gently tapping around the rim to loosen the lid. Then, exert equal downward pressure while turning the cover. Never use a regular hammer. If the canner lid is stubborn due to a sticky sealing ring, it's time to replace the gasket. (Source: National Presto).
Plus sign (+) if content is closed, 'X' if content is open. When and where can I get my pressure canner dial gauge checked?
If it has been submerged in water.
If the gauge glass is broken or has fallen out.
When any parts are rusty.
When the pointer is not in the "0" block.
Anytime you believe the gauge may not be accurate.
The Presto Company test dial gauges at no cost. Remove the gauge from the canner lid, wrap in newspaper and package in a small sturdy box. Send to: PRESTO - Service Department, 3925 North Hastings Way, Eau Claire, WI 54703-3703. In most cases, the gauge will be returned in a short amount of time. Check with your local County Extension Office to see if there is a local source for testing. For more information, see Testing dial pressure canner gauges.
Plus sign (+) if content is closed, 'X' if content is open. Can I use one-piece canning lids for home canning?
No. One-piece, screw type canning lids are not designed or approved for home canning use. This type of lid is used in food processing as a hot-fill-hold process under very strict time and temperature controls. In home-canning a two-piece lid is needed to let the air escape during the boiling water or pressure canning process. A one-piece lid doesn’t allow the air to escape resulting in either blowing out the jar bottom or buckling of the lid.
(Source: Barb Ingham, University of Wisconsin, Tomatoes Tart and Tasty! home food preservation Wisline call. July 23, 2012).
Plus sign (+) if content is closed, 'X' if content is open. What is the "recipe" for bleach and water to sanitize equipment?
Ultra (6%) bleach: 2½ teaspoons per gallon; ¾ teaspoon per quart.
Regular (5.25%) bleach: 1 tablespoon per gallon; 1 teaspoon per quart.
Plus sign (+) if content is closed, 'X' if content is open. What are reliable food preservation books or resources?
Use recipes and procedures that were developed in 1994 or later.
Cooperative Extension Service of the University of Georgia. (2015). So Easy To Preserve. 6th Edition.
USDA. (2015). USDA's Complete Guide to Home Canning.
Alltrista/Jarden Home Brands. (2009). The Ball Blue Book of Preserving.
AnswerLine, University of Minnesota Extension and Iowa State University Extension. 1-800-854-1678. Provides research-based answers to your questions. | 2019-04-18T22:18:37 | https://extension.umn.edu/som/node/4991 |
0.952419 | The hidden div shows itself when user hovers over area on mapped image. But I need the hidden div to be positioned next to the mouse. It currently positions itself some distance from the mouse and this distance varies depending on the size of the browser window.
left: (e.pageX - 90) + "px"
<div class="boxinner">Trecerus Farm Development: 22 Two, Three & Four bed homes.
left: ((e.pageX - $("#main").offset().top) + 10) + "px"
left: (mouseX + 10) + "px"
When you set top and left properties to an element that has position:absolute, those values are distances from the first parent element that has position:relative.
Your CSS for .singular .hentry sets position:relative to the article element inside which your div is. So when you set top:50px, it means it should be 50px from the top of that article element, not 50px from the top of the page.
Either remove the position:relative from the article element or calculate the coordinates for the div so that they are relative to the article element and not the entire page.
EDIT: Also, you shouldn't subtract the dimensions of the div from the e.pageX and e.pageY. The top and left values specify where the upper left corner of your div will start. You can add 5px to both values to make it appear right next to the cursor.
left: (e.pageX - offset.left + 10) + "px"
So! In the end the problem was that I had the jquery running on a div that was within a centred fixed width div on the page.
To get around this I basically detected the html document width, subtracted the fixed width of the div, then divided the remainder by two, giving me the left margin that I needed to offset my mouse calculation by in order to get the hidden div to pop up next to the mouse no matter what the window size was.
The header of the site is also a fixed size, so I subtracted it's height from my mouse position to get the hidden to div to position correctly on the other axis.
left: (e.pageX - marginleft + 10) + "px"
Not the answer you're looking for? Browse other questions tagged jquery html css positioning or ask your own question. | 2019-04-24T21:22:31 | https://stackoverflow.com/questions/11207443/jquery-div-positioned-next-to-mouse-moves-depending-on-browser-window-size |
0.98809 | We warmly welcome clients from all around the world for Pa66 Material , pa66 material , pa6 material , organization name is your greatest choice!
We normally believe that one's character decides products' quality, the details decides products' high-quality ,while using the REALISTIC,EFFICIENT AND INNOVATIVE staff spirit for Pa66 Material , pa66 material , pa6 material , Now with the development of internet and the trend of internationalization we have decided to extend business to overseas market. With the propose of bringing more profits to oversea customers by providing directly abroad. So we've changed our mind from home to abroad hope to provide our customers more profit and looking forward to more chance to make business. | 2019-04-25T23:50:29 | https://www.xyhplastic.com/dp-pa66-material.html |
0.999996 | The words of Andrea Riccardi on the occasion of the march commemorating the deportation of Roman Jews in the October 16, 1943, organized by the Sant'Egidio Community and entitled: "There is no future without memory."<br><br>The commemoration off October 16, 1943 was attended by the chief rabbi of Rome, Riccardo Di Segni, the founder of the Community of Sant'Egidio, Andrea Riccardi, the president of the Jewish Community of Rome Ruth Dureghello, the mayor of Rome Virginia Rays and the president of the Region Lazio Nicola Zingaretti.
[Andrea Riccardi]: "We are convinced that the real memory is not in the tombstones, is not monuments, paradoxically, is not even in museums or libraries, which abound in Rome, but the real memory is in the culture, in the lifes, in the ethos of the people. This is the great guarantee, this common feeling is the greatest guarantee against dangerous impulses." | 2019-04-22T21:00:13 | https://www.andreariccardi.video/pageID/2/langID/en/itemID/49/Andrea-Riccardi-the-real-memory-is-in-the-culture-in-the-lifes-in-the-ethos-of-the-people.html |
0.998241 | This recipe is just too good not to share. I have no idea if it's authentic or not... I just know it tastes good!
If starting with whole peas: soak the brown rice and peas separately for several hours or overnight. Boil peas in 4 cups water for 45 minutes, then add brown rice and boil 30 mins. Check to see if done, otherwise boil longer.
If split peas: soaking the rice improves flavor but is not necessary. Combine 4 cups water, peas, and rice and boil 40 mins.
Meanwhile, use another pan to fry onions, garlic, and curry powder in a small amount of olive oil. Simmer lightly until the onions are cooked. Add to pot and stir well after rice and peas are done cooking.
I'll go back to debunking the Abascal diet the next post.
Are Vegetarian Diets Really Cheaper?
I want to say that in writing this post I don't mean to denigrate vegetarians. Like most vegetarians, I also care about animal welfare and go the extra mile to buy animal products that were treated with respect and raised naturally. I'm not here to change or criticized anyone's eating habits. Mostly, I object to the blanket statement that going vegetarian is better for the animals, better for your health, and better for your wallet. Many other authors with better blogs than mine have already challenged the notion that vegetarian diets are inherently healthier than omnivorous diets. However, I haven't seen an unbiased, in-depth look at the cost-effectiveness of vegetarian diets, which is why I decided to write this post. This table shows prices and cost effectiveness for the highest-quality animal flesh and the highest-quality vegetarian animal products.
The average cost effectiveness of animal flesh is 14.2, whereas the average cost effectiveness of vegetarian animal products is 9.98. Per gram of protein, meat is cheaper than vegetarian animal products. So, it's not cost-effective to go vegetarian if one is planning to eat the same amount of animal protein and determined to buy the highest quality animal products possible. It's also very cheap to be an omnivore who is willing to forgo the steak for beef heart, liver, kidneys, and tongue. But what about "merely" organic products? Is it still cheaper to eat meat?
Averages are 25 for meat; 19.3 for vegetarian products. Again, the price per gram of protein is actually cheaper for meat than for vegetarian protein sources. However, both protein sources were much more inexpensive than the higher-quality protein in the above table. That would make an omnivorous diet that had an equal amount and types of plant foods and equal amounts and quality of animal protein cheaper than the equivalent vegetarian diet.
However, the average vegetarian eats only less animal protein than the average omnivore. Since animal protein is one of the more expensive components of a diet, especially when that protein comes from naturally raised animals, a diet lower in animal protein tends to be cheaper. However, a low-protein omnivorous diet would still cost less than a low-protein vegetarian diet.
Studies have shown that the main reason vegetarians live longer is because they tend to eat healthier diets overall, lower in fast food and processed food and higher in fruits and vegetables***; not because they avoid meat. Compared to omnivores, vegetarians are also less likely to smoke and more likely to exercise regularly. Other studies have raised questions about the long-term nutritional sufficiency of strict (lacto-ovo) vegetarian diets. Vitamin B-12 is only found in supplements and animal products, making it a major concern for vegans. It is found is small amounts in dairy and eggs, but it is not clear that these amonts are enough to ensure vitamin B-12 sufficiency. Some studies suggest that a majority of strict vegetarians who do not take supplements may eventually develop vitamin B-12 deficiency. The dangers of vitamin B-12 deficiency are greatest in children and the elderly, and breastfed children born to asymptomatic vegetarian mothers may have severe vitamin B-12 deficiency. This deficiency may impact the cognition of the children in the long term, even after B-12 status is restored.
Luckily, vitamin B-12 deficiency is easily ameliorated by supplements available over the counter in the USA, or small quantities of animal flesh. Bivalves (a family of seafood including oysters, scallops, mussels, and clams) are rich in vitamin B-12 and non-sentient, making them acceptable to some vegetarians and vegans. Other shellfish and finfish are also good sources of B-12.
* These are typical prices for these products in grocery stores and farmer's markets in the Seattle area.
** Assuming 2/3 of the "whole chicken" is edible meat and organs, and the protein density of these parts is 140 g/lb.
*** See Denise Minger's Death by Food Pyramid. She can explain this a lot better than I can. There are multiple studies involved, and I can't find all of them to cite here.
The result is a diet that contains 2000 calories per day: 70g of protein (12% of calories), 45g fat (19% of calories) and 350g carbs (69% of calories). Fat calories come primarily from monounsaturated fat, with 7g of polyunsaturated fat (3% of calories) and less than 6 g of saturated fat (2.5% of calories). For comparison, the American Heart Association recommends less than 7% of calories from saturated fats. I'm not convinced that saturated fat is harmful in moderate quantities, but this amount should satisfy all but the most extreme anti-fat crusaders. The omega-6 to omega-3 ratio of the diet is 3.8:1, which is favorable, and even more so when one considers that most of the omega-3 is marine, long-chain omega-3 (from shellfish). If more calories were necessary for some reason, the calories could come from additional potato consumption.
The diet is also sufficient in all micronutrients, in most cases supplying more than the RDA. Besides calcium and choline, both supplying 100%, all other micronutrients are in excess of 120% of the RDA. This includes commonly deficient micronutrients like magnesium (680 mg, or 170%), potassium (7.5g, 160%), selenium (100ug, twice RDA), and zinc (18mg or 163%). Vitamin K and vitamin B-12 are the two most abundant micronutrients; both supply well over 500% of the RDA. That's good considering their low toxicities and the dangers of deficiency.
The math involved in figuring the amount of space necessary per person on this nutritional regime is complicated, especially considering that land may bear multiple harvests in a year (for instance, if fava beans were overwintered on the same soil that bore summer vegetables), the complexity of soil conditions and climate. I'm no expert in gardening, let alone shellfish farming, and I would even question the logic of coming up with a seemingly precise figure balanced on dozens of flimsy assumptions.
*In the nutritional analysis, I used 1 lb strawberries and 2 lb raspberries per week. Berries grow great in our local climate, as the vigorous raspberry patch flowering outside my window attests.
Note: much of this information is derived from what I have seen at farmer's markets, assuming that the foods sold there reflect what grows efficiently in our climate. Also, I have to thank Stephan Guyenet's posts on gardening and our own (much smaller and less efficient) urban garden. We grow tomatoes (not suited to the climate!) raspberries, blueberries, and herbs. We used to grow strawberries and are now growing kale and swiss chard. | 2019-04-24T10:18:30 | https://theancestralchemist.weebly.com/blog/category/all |
0.999997 | A cat's pancreas has two main jobs: 1) making and storing digestive enzymes and fluids; 2) producing and releasing hormones that regulate blood sugar.
The sugar released into the bloodstream from a a cat on a high-carbohydrate diet sends an alarm to the pancreas to produce insulin to lower the tide of sugar into a cat's system. A continual high level of insulin pumped into the cat's system causes an accumulation of fat in the cat's body - it's a natural response to an unnatural (for a carnivore) dietary situation.
SO WHAT? Diets high in carbohydrates - such as dry kibble - raise a cat's risk for both obesity and feline type 2 diabetes. | 2019-04-25T06:37:32 | http://www.catnutrition.org/digestible-bites/lil-bite-of-the-day-pancreas-and-insulin |
0.999992 | Four years ago, the United States women’s national team went to France and got played off the park to open their 2015 campaign. Saturday brought déjà vu – a 3-1 loss to France, this time in Le Havre, and another sour note to open a World Cup year.
Context is everything, of course. In 2015, the U.S. was legitimately struggling, a trend which carried on into the group stage of the World Cup before the now famous quarterfinal turnaround which propelled the Americans to victory.
But the U.S. entered 2019 as more legitimate favorites heading into the World Cup year, unbeaten in their last 28 matches. One result in January doesn’t necessarily change that, particularly when the starting eleven rolled out by head coach Jill Ellis on Saturday was absent five starters from what should be considered her preferred lineup (that being the eleven she chose in Tuesday’s 1-0 win over Spain, but swapping in Kelley O’Hara – recovering from ankle surgery – for Emily Sonnett at fullback).
What the Americans’ two-game jaunt to Europe – their only two matches away from U.S. soil prior to the 2019 World Cup – did confirm was that the best approach against the U.S. is to serve, in return, a taste of their own aggression.
France came out in a 4-2-3-1 on Saturday and displayed the tactical flexibility, high-pressure defending and physically dominant demeanor which is so synonymous with this U.S. side. Les Bleues throttled the Americans with a high line of confrontation, exposed their fullbacks in isolation on the flanks (much like in that 2015 encounter) and successfully hit them on the counter attack. There was a physicality and a mentality which, in that match, appeared to flip sides. Of course, France has been the Americans’ bogey team for a while, the two aforementioned results and the emphatic 2017 SheBelieves Cup victory among the evidence (R.I.P., three-back).
France is and has long been among the world elite; a U.S. loss at this stage is hardly cause for sudden, dramatic concern. The cynic in me says that some combination of Ellis not wanting to show all her cards in what could be a preview of a World Cup quarterfinal – combined with the need to weed out players not ready to start, and perhaps ground the group amidst a 28-match unbeaten streak – are also considerations in Saturday’s performance.
What the United States’ matches against France and Spain confirmed is something that Utah Royals head coach Laura Harvey spoke about earlier this month at the United Soccer Coaches Convention: the best way to beat the U.S. is to play them straight up. Go right back at them with high pressure and don’t be afraid of them; the teams which choose to sit back invite an onslaught of pressure that the Americans have ostensibly figured out how to crack since being fully exposed at the 2016 Rio Olympics. ‘Bunkering’ isn’t necessarily the answer — certainly not for teams with enough quality to create opportunities.
France fought tempo with tempo, deadly counter attacks with deadly counter attacks. (Amandine Henry’s words from three years ago, about coming to Portland to soak in the American mentality, were personified on Saturday.) England and Australia, among others, have also taken note.
Spain, playing the U.S. for the first time at the senior level, hardly stood still in reverence of the Americans. La Roja controlled most of the match in the middle of the park but lacked execution in the final third to create and finish opportunities on goal, particularly in the first half.
U.S. group opponents Chile and, certainly, Thailand won’t have the overall quality of Spain, and fellow contenders like France aren’t going to take an inherently negative approach to a match, regardless. These past two matches, along with some from last year – the U.S.’ draw with Australia among them – string together a blueprint on how to play the Americans, sources of inspiration for some of the many rising programs like Spain, which are looking for their first real marker at a senior World Cup. There’s a non-negligible chance that the U.S. and Spain could meet in the round of sixteen in June.
Of course, as Tuesday proved – and as the U.S. has successfully refuted over the past year – a blueprint is merely a plan; there’s no guarantee it will lead to victory. That eroding air of invincibility surrounding the U.S. – which has been discussed ad nauseam over the past few years – is real. And that’s a good thing for the sport, overall. | 2019-04-21T00:30:58 | https://equalizersoccer.com/2019/01/22/uswnt-france-spain-analysis-blueprint-womens-world-cup/ |
0.998647 | 1. Preheat the oven to 200ºC, gas mark 6. Peel the prawns, put into a bowl and set aside. Put the shells onto a roasting tray, toss with the oil and roast for 25-30 minutes. Leave to cool slightly.
2. Set a frying pan over a medium heat, add the spices and toast for 2 minutes until fragrant. Strain the prawn oil into the pan, stir to combine then add the garlic and ginger and fry for 3 minutes until soft. Tip the mixture into a large bowl, leave to cool slightly then stir in the yogurt. Season, then add the prawns. Toss to coat then cover and place in the fridge for 3 hours, or overnight if possible.
3. To make the salsa, preheat the oven to 60ºC, or the lowest setting on a gas oven. Cut the tomatoes into quarters and place on a tray. Roast for 4 hours. Remove the tomatoes from the oven and allow to cool. Cut the tomatoes into small cubes and combine with the red onions, chillies and olive oil. Season and sprinkle with the parsley.
4. To make the raita, mix the cucumber with the salt in a bowl and allow to stand for 1 hour. Squeeze most of the water out of the cucumber using a clean kitchen towel, then mix in a bowl with the yogurt and chopped mint. Season with freshly ground black pepper.
5. Preheat the barbecue. Remove the prawns from the yogurt marinade and place on the grill. Cook on all sides until fully cooked through.
6. Place the flat breads on the barbecue for a couple of minutes to toast. Spread some of the raita on each flatbread, add the prawns and top with a little salsa and a handful of rocket. | 2019-04-19T12:32:57 | https://www.waitrose.com/home/recipes/recipe_directory/h/heston-s-barbecuedprawntikkawraps.html |
0.992668 | "Duplicate, submitted URL not selected as canonical" error in Search Console - anyone else seeing this?
I'm curious to know if anyone else has been encountering an error on Search Console for Squarespace sites.
I recently put a new Dublin Public Transport guide live with Squarespace, and as usual submitted a site map for it in Search Console. All was generally fine with it, and the site was performing pretty well in search, but few days ago Google seemed to de-index some of the pages — with the most important page on the site, our Dublin train map page, becoming totally invisible in search.
I resubmitted the site map to Search Console, and it basically rejected it, returning a bunch of "Duplicate, submitted URL not selected as canonical" errors for all the pages (Search Console seemed to be getting confused by pages with trailing slashes, treating them as 'user-declared canonicals' and duplicates).
But then, the pages started to reappear in search results.
Worryingly, I've been getting notifications from Search Console that the error now applies to other Squarespace sites I run.
I suspect it might be a bug at the Squarespace end, or some issue with the new version of Search Console...I'm currently in touch with Squarespace Support about this issue, but I'm wondering if anybody else has come across it and if you have any take on the situation (or fixes). | 2019-04-21T02:22:08 | https://answers.squarespace.com/questions/248875/duplicate-submitted-url-not-selected-as-canonical.html?sort=oldest |
0.999061 | PAX BRITANNIA: 10 years of Pax Britannia!
Did you know, according to the Rebellion Publishing website, Unnatural History, the first Pax Britannia novel, was published ten years ago today?
I first pitched the idea for what would become Abaddon Books' Steampunk science fantasy series, when Jonathan Oliver - now Editor-in-Chief of Abaddon, Solaris and Ravenstone Books - put out the call for authors, but the kernel of the idea had been knocking around in my mind for years before that.
The oldest notes I can find that would be recognisable as the basic outline of what would become Unnatural History are dated 1990. (I wouldn't be published for the first time until 1993.) The dinosaurs in the Challenger Enclosure at Regent's Park Zoo get a mention, as does Queen Victoria being in a life support throne. There's even a line about bases on the Moon and Mars, but the protagonist is one Mandeville Sachs, Gentleman Adventurer, rather than Ulysses Quicksilver.
So although later today, I'll be raising a glass to Ulysses Quicksilver and toasting the Pax Britannia series as a whole, the idea is actually at least 27 years old, making it older than my writing career (which is 25 years old this July)!
And what's lovely is that people are still discovering the series for the first time and, I'm pleased to say, enjoying it. And who knows, maybe one day I'll get to bring Ulysses Quicksilver's story to a conclusion. | 2019-04-20T12:29:46 | http://paxbritanniablog.blogspot.com/2017/02/10-years-of-pax-britannia.html |
0.999749 | Does spoken Na’vi vary systematically with the different clans of Pandora?
To clarify, systematically in this sense means that there are phonetic changes that ALWAYS hold true.
The main argument I see to support this theory is that in the real world, many widespread languages vary systematically with pronunciation. At a larger scale, there are Chinese, Arabic, and their linguistic counterparts, all of which have many different dialects that are each in effect their own language. For example, a speaker of Levantine Arabic can barely if at all understand a speaker of Moroccan Arabic, and likewise. Might this be so in Na’vi?
There are also smaller examples, like in English. Even though speakers of British English, Australian English, and American English can understand eachother, there are still many systematic phonetic differences.
But what about the so-called Brooklynese? Even though this accent is not only native to Brooklyn but to NYC as a whole, there are still less than 10 million speakers in all (and the number is slowly dwindling). Speakers of Brooklynese are known for three major phonetic changes that are very systematic and regular. These changes hold with every speaker, even though there are so few.
These smaller examples are roughly anologous to the clans of Pandora. So shouldn’t the clans speak systematically different, or at least dialected, variations of Na’vi as well?
I believe in dialects, too, but we have absolutely no information about language except in the movie and the ASG.
Yeah, I believe in dialect too. I would be very surprised if there was not any dialects across all clans on Pandora.
Yeah, I thought about it too. However I think that despite it there is still enough space for language changes, I think.
But your idea is completelly right.
I would expect dialects, but perhaps the variation is no more than that between UK vs. US English as most extreme.
I think that ToV transfer memories as particular feelings rather than words, but so far we can't be sure about this.
Back to topic, there have to be dialects but I also expect something like English - slight different US, UK or Australia. Nothing more.
I don't think that an Omatikaya will connect with someone on the other side of the world via the Tree of Voices.
That same person would live in a more or less different reality and will therefore develop sayings according to their environment, so I would not be surprised to see closely related languages and dialects.
But anyway, since it's a movie, it wouldn't be impossible for James Cameron to say "All Pandorans speak Na'vi, period."
This is really interesting! I didn't think about such being possible until now. I'm sure there would be different pronunciations of Na'vi words from different parts of Pandora.
1. In products like Avatar video games and the Survival's Guide to Pandora, there are some non-Frommerian Na'vi words and names that don't fit with the rules. The concensus is that these words are "non-canon", but I like to think about them as words that come from another dialect. For example the non-canon name Beyda'amo, a Na'vi of the Tipani clan in the Avatar video game, could perhaps correspond to *Pxeytxa'amo in Omaticaya (where Omaticayans say px and tx, the Tipani could pronounce them b and d). But this explanation exists only in my mind. I prefer this explanation than wiping such words out from the canon.
2. in another thread, I expressed an idea about very few canonical words that phonotactically don't fit with the majority of other Na'vi words, for example they have a lot of consecutive vowels, like mauia or meoauniaea. In my mind, this could mean that these words are loan from another dialect or from an ancient form of the language. | 2019-04-23T01:53:07 | https://forum.learnnavi.org/linguistics/navi-through-different-clans/ |
0.998632 | Catch and release is a practice within recreational fishing intended as a technique of conservation. After capture, the fish are unhooked and returned to the water before experiencing serious exhaustion or injury. This prevents a shortage in the supply and sustains a supply of fish. However, in field of education there is a strong need to 'catch' (recruit) teachers and prevent the 'release' of effective teachers. However, after many teachers are 'captured' and lured into the profession, they quickly abandon the field of education. This form of catch and release in the field of education does not support sustainability. Teacher retention is a national crisis with nearly one-third of all beginning teachers abandoning the profession within their first three years of teaching (National Commission on Teaching and America's Future, 2007). In South Carolina alone, 28,500 teachers left the profession in the last five years, or an average of 5,700 per year. This translates to a turnover rate of approximately 10.1 % for the state. The Center for Educator Recruitment, Retention, and Advancement (CERRA) reported the Lowcountry and the Pee Dee regions as having the largest number of vacant teacher positions, representing 55% of statewide vacancies (CERRA, 2011). Districts in these two regions, however, accounted for only 36% of all teacher positions in South Carolina (CERRA, 2011).
High quality induction district initiatives for beginning teachers have reduced the attrition rates for many states (Ingersoll and Smith, 2004). The purposes of this research was to examine the components of beginning teacher induction which might have a positive impact on novice teachers' intentions to stay in their teaching positions and to determine which aspects of induction will increase teachers' job satisfaction and commitment by examining the commonalities among their perceptions of their induction. The comprehensive question steering this study was: Which of the various components of induction programs implemented in The Lowcountry School Districts most influence the retention intentions of induction teachers?
1. How do induction teachers perceive factors of induction in their current teaching assignment?
2. Are there specific factors of teacher induction beginning teachers identify as essential for teaching? 3. Are there specific factors of teacher induction that increase job satisfaction and commitment in novice teachers? The participants for this quantitative study were first-year teachers in the Lowcountry of South Carolina during the 2011-2012 school year. First-year teachers were invited to participate in an online survey that contains a demographic questionnaire and the Perceptions of Success Inventory for Beginning Teachers (PSI-BT). The online PSI -BT inventory asked beginning teachers questions regarding their experiences andperceptions of their induction program and their retention intentions. | 2019-04-25T11:03:01 | https://scholarcommons.sc.edu/etd/955/ |
0.999999 | Born in London in 1953, Graham Gooch is one of England's greatest ever cricketers. Captain of Essex and England, he scored 8,900 runs in Test matches and 44,846 first-class runs at an average of 49. His aggregate 456 against India at Lords in 1990 remains a world record. As a bowler he took over 200 first-class wickets and returned best figures in a Test of 3-39. As captain of England his commitment to personal fitness and a strong work ethic inspired the team to some outstanding performances at a time when results had been disappointing. He captained England 34 times and was Wisden Cricketer of the Year 1980. He has continued to play an active role in cricket since his retirement from playing. Graham has been an England selector, England specialist batting coach and was England Tour Test Manager to Australia in 1998/99. He is also in great demand as a broadcaster.
In 2006 Graham Gooch was made an Honorary Doctor of the University.
"The Senate of Anglia Ruskin University is pleased to confer on Graham Gooch OBE the award of Honorary Doctor of the University in recognition of his long and dedicated contribution to County Cricket in Essex, and of his illustrious international record as a successful Test captain of England, and one of England's foremost batsman of any generation.
Whilst this University confers honours on many truly outstanding people from many walks of life, it is not often that we have the pleasure of honouring a contemporary living legend, but today is one of those occasions. How did this career develop and what is the evidence for this assertion?
He was born in Leytonstone in East London in 1953, and his interest in cricket was nurtured by his father Alf and at the Ilford Cricket School by his mentor, Bill Morris. He progressed as a cricketer who could do a bit of everything, and was sent on the London Schools Tour of East Africa. Shortly after he made the Essex Second Eleven and in 1973, made his first class debut. In 1975, he broke into the national scene making 75 for the MCC against the Australians but in his First Test, which followed on the strength of this, he regretfully made a pair! He returned to the Test team in 1978, his self-discipline, determination and technique having been substantially reinforced with an emerging Essex side which was soon to dominate the County scene.
The next decade and a half witnessed the greatest personal run accumulation exercised in the history of cricket. On his retirement from Test cricket in 1995 at the age of 41, he still is England's all time highest run scorer with 44,846 runs in all first class cricket at an average of 49, including 128 centuries (20 in Tests) and a further 22,211 runs in List A matches, in all, a world record. He lies eighth in the highest ever Test innings (one run behind Bradman); Has the record of most Test runs in a calendar year (1,264); and is third in the world in terms of most runs in a Test career, just behind Border and Gavaskar, both of whom play rather more innings. He is the only Test player in history to have scored a triple century and century in the same Test, against India in 1990, and his match aggregate of 456 remains the world record for a Test match. Many pundits and he himself, would count his greatest performance to have been against the West Indies in 1991, where he carried his bat for 154 out of 252 on a damp wicket against the combined artillery of Ambrose, Walsh, Marshall and Pattison. He captained England on 34 occasions and gave way to Michael Atherton in 1993. He made a brief comeback for MCC against New Zealand at the age of 47 but time was not on his side.
When one considers he lost three years Test cricket as a result of captaining the so-called Rebel Tour of South Africa in 1982 at the height of apartheid, it is clear that virtually every record in the book would have been comfortable smashed.
His personal regime throughout has been one of strict discipline, self determination and inner strength, linked to a ruthless commitment to physical training. As captain, this stern philosophy did not entirely endear to more cavalier brethren so as David Gower and Ian Botham. This personal philosophy reinforces his belief that coaching can only go so far - it is the inner man that matters. He thus thrives on responsibility and unlike some other captains his batting actually improved with the captaincy.
After retirement from the pleasurable employment of belting red leather to sundry parts of the planet, he has certainly ploughed his expertise and experience back into the game in many capacities - as an England cricket selector (1996 - 1999); as England Specialise Batting Coach (1998 - 2000); as England Test Tour Manager to Australia (1998 - 1999); as 'A' Team Tour Manager to Sri Lanka (1998); as Batting Coach at Durham County Cricket Club (1998 - 2001) and Head Coach at Essex County Cricket Club (2002 - 2004).
However, it is as Special Ambassador to Essex County Cricket that he sees his principal priorities these days - and who better to fulfil this role. This role has developed into a multi-faceted one. In the commercial domain, he has long acknowledged that County Cricket cannot rely on government or TV handouts, but has to generate its own independent funding streams (just like universities!). The centre piece of this is the ambition to make the Ford County Ground at Chelmsford into a world-class facility in its city centre location. This involves considerable activity in seeking out and securing new corporate contracts and sponsorships also, in supporting the County Academy for both boys and girls of 12 - 19 years of age. He has established the "Graham Gooch Scholarship Fund", an initiative to raise money to send some of the Club's best young players for experience overseas. He is keen on persuading state schools to embrace cricket once more, through a colt system and by a coach development programme. The selling of school playing fields for development is clearly not helping his cause! His links with this university are also evident in that Tony Palladino and other Essex players have attended this university.
In short, in the above, we see a massive commitment to the integration of the Club into Essex life and society; to its contribution to Country life; and its role as a family club. The University is itself honoured to be associated with these endeavours and to future collaboration - our vision is very similar in these respects.
Among its more serious manifestations such as national pride; triumphalism and cyclical despondency; and international strife, sport and particularly cricket can certainly be classed both as entertainment and education. In his post-retirement era, our honorary graduand has developed an enviable reputation in this regard. He has been a special commentator for Channel 4, Sky, Test Match Special and Radio Five Live since 2000 when his witty and penetrating observations have raised significantly the understanding of millions of the intricacies of cricket. He is a regular contributor to Question of Sport and is a much sought after pundit at senior management development seminars for well known companies on such topics as leadership, motivation, management talent and teamwork, where his style of analysis, relevant anecdotes and intelligent humour has provided fascinating insights on common leadership issues in business and sport. A receding hairline lately has also offered him scope to advocate and advertise the virtues of hair transplants!
So, in the light of the above, and exercising the power conferred on me by Senate, may I therefore invite the Vice Chancellor, to bestow the award of Honorary Doctor of the University upon Graham Gooch." | 2019-04-21T18:41:26 | https://www.anglia.ac.uk/graduation-and-alumni/honorary-award-holders2/graham-gooch |
0.996903 | Freeze-drying of raw beef. : 2. Influence of some freezing and dehydration variables.
Freeze-drying of raw beef.: 2. Influence of some freezing and dehydration variables. | 2019-04-25T19:45:02 | http://ri.diva-portal.org/smash/record.jsf?pid=diva2%3A966967&c=316&searchType=SIMPLE&language=en&query=&af=%5B%5D&aq=%5B%5B%7B%22categoryId%22%3A%2211713%22%7D%5D%5D&aq2=%5B%5B%5D%5D&aqe=%5B%5D&noOfRows=50&sortOrder=author_sort_asc&sortOrder2=title_sort_asc&onlyFullText=false&sf=all |
0.996729 | The wig light, with a gold wig (of course, can also be other colors) replaced the traditional lampshade, so that the light turned into a cute "smiling stunner" in the blink of an eye, but it would be a headache for the "hairstyle" in the future. What kind of hairstyle does this "face" match? Is it a straight hair, or is it a few small scorpions? The wig is designed by the German designer Anika Engelbrecht.
The origin of the fireplace can be traced back to the time when mankind has just moved into the cave when using the "fire pond" lighting, heating, barbecue food. With the development of productive forces, lighting, heating, barbecue food these three functions gradually evolved and separated.
Fireplaces become dedicated heating equipment: the development of the times, to the fireplace has brought new changes. Morphologically speaking, the fireplace from the traditional firewood fireplace, gas fireplace, charcoal fireplace, etc., and then derived a new category: electric fireplace.
Electric fireplace is a reference to the European classical fireplace production process and modern acoustics principle, so that the traditional fireplace in the design has been greatly improved, in the elegant yet created a green and more bruised real wood burning effect. | 2019-04-26T08:07:28 | http://www.balochcomputer.net/article-1059.html |
0.827067 | Here is one way to solve our federal budget deficit. Remember that old saying, "Don't nickel-and-dime me?" The inference was that nickels and dimes are peanuts in the big picture.
However, coinage is quite meaningful when considering all of the daily transactions in retail establishments. May I suggest that the U.S. government begin to implement a round-up strategy in which any "change" in the form of coins be converted into a tax? In that way, there will be huge savings at the retail level as coins would no longer be necessary, consumers won't have to cart around coins in their pockets and the rising value of copper and nickel will allow the government to recoup spending on these metals that can better be used in the private sector.
Inflation has made the value of a penny minuscule, as is the value of a nickel. To protect a high tax on low-cost transactions, I suggest that people buy more than one of something that sells for less than a dollar. Or the tax on any transactions under $5 could be waived.
This is an easy tax to collect, not as burdensome as some suggested tax increases, and it can add up to a bundle. Since 45 percent of people in the U.S. don't pay federal income taxes, maybe this "nickel-and-dime" tax would be fairer to us all and keep the federal government from declaring bankruptcy. | 2019-04-24T16:59:07 | https://www.islandpacket.com/opinion/letters-to-the-editor/article33417750.html |
0.999891 | "You might consider calling this model the Symphonic C trumpet. Here is what I would recommend for a short description: The Symphonic C trumpet has an easy and brilliant high register and a full, colorful low register. The large 135mm (5.25 inches) red brass bell has excellent projection in the concert hall. Easy to play soft or loud. All with excellent intonation and little to no need for alternate fingerings" Custom C trumpet based on CarolBrass standard series model CTR-5060H-GSS-C. Its model name is CTR-5060H-RLM(D)-C-SS. Medium Large bore size, sterling silver leadpipe, standard tuning slide with single brace and both rounded and squared slide bows available, yellow brass tuning slides, 90% copper red brass wired bell, large throat size with extra large diameter by 5.25" (135.00m/m), handcrafted satin silver, polished silver on mouthpiece receiver and inside of bell. A fully custom made C trumpet. | 2019-04-20T04:53:50 | http://carolbrass.com/blog_post.php?i=187 |
0.999996 | [He is] not a neutral legal mind but someone with a deep-seated conservative ideology.
The White House says it's "truly disappointing" that Senate Democratic leader Chuck Schumer has announced that he intends to oppose Judge Neil Gorsuch's nomination to the Supreme Court.
"My vote will be no, and I urge my colleagues to do the same", Schumer added.
Feinstein noted that Merrick Garland, Democratic former President Barack Obama's Supreme Court nominee who the Republican-led Senate a year ago refused to consider for confirmation, also earned the ABA's highest rating. But when McConnell announced this week that he meant to get Gorsuch confirmed by the Senate's Easter recess on April 7, that was a clock that forced the Democrats' hand. But in 2013, Senate Democrats employed a series of procedural maneuvers to change that requirement to a simple majority, or 51 votes, for all Cabinet-level and judicial nominations - except for those to the Supreme Court.
Democratic Pennsylvania Senator Bob Casey is also going on the record against Judge Gorsuch, saying his judicial approach will not ensure fairness for workers and families. But his decision to support the filibuster of Gorsuch is significant.
Senate Majority Leader Mitch McConnell, R-Ky., said Democratic threats of delay, in the face of what he called Gorsuch's outstanding performance, stem from their base's refusal "to accept the outcome of the election".
The nominee received glowing GOP reviews but complaints from frustrated Democrats that he concealed his views from the American public.
"Judge Gorsuch is, by all accounts, a jurist in the mold of the late Antonin Scalia and a worthy and appropriate successor for his seat on the Court." said Chris Cox, Executive Director of the NRA-IL "The NRA has every confidence that Judge Gorsuch will protect the Second Amendment rights of law-abiding gun owners and will faithfully apply the Constitution in the cases that come before him".
Schumer said Gorsuch "was unable to sufficiently convince me he'd be an independent check" on President Trump. Manchin spoke Wednesday after watching the nominee emerge unscathed from testimony to the Judiciary Committee.
The Senate Judiciary Committee is expected to recommend Gorsuch's confirmation to the full Senate on April 3, and he is expected to be confirmed. Republicans now need 60 votes to confirm the judge, unless they trigger the so-called "nuclear option" to eliminate the filibuster and confirm Gorsuch with just 51 votes - although Schumer advised against it on Thursday. The deal centered on three vacancies on the U.S. Court of Appeals for the District of Columbia Circuit. He is not up for re-election next year and his state voted for Democrat Hillary Clinton in 2016.
If enough Democrats join Schumer in attempting to block Gorsuch's nomination, at least one Republican seems ready to go nuclear. Sen. How will the Russian Federation investigation affect Neil Gorsuch's confirmation?
On Friday, Ross said the United States was "about the least protectionist" and China is "one of the most protectionist" of major countries.
Tiafoe, who grew up in the tennis-friendly area of College Park, Maryland began, like numerous best players today, very early. Federer conceded that he has ridden his luck at times to advance.
Malaysian Prime Minister Najib Tun Abdul Razak was on Saturday accorded a ceremonial welcome at the Rashtrapati Bhawan here. Najib arrived in Chennai on Thursday on his third visit to India since becoming prime minister in 2009.
According to UNHCR, there are over 1 million registered refugees in Lebanon, but some believe there are 1.5 million. He said much of the global community was also failing refugees, increasingly closing borders and turning them away.
So to sort through what this means for Republicans and the president is NPR political editor Domenico Montanaro. That would leave just one week to process the as-yet-unfinished spending package through the House and Senate.
Meridian Medical Technologies manufactures the devices, which Mylan Specialty distributes in the United States. The widening recall is yet another setback for Mylan in its quest to maintain EpiPen as a big-selling product.
After shying away from the spotlight, Jennifer Lopez and Alex Rodriguez are ready to take their relationship very public. The two seemed to be having a great time spending time together - going on dinner dates and even enjoying joint workouts. | 2019-04-26T16:35:47 | http://antandsons.com/2017/04/casey-will-vote-no-on-gorsuch/ |
0.999901 | How do you reconcile a cliché-filled, anti-progressive plot with one of the most famous operas of all time?
In 'Great Scott,' Joyce DiDonato leads an opera within an opera.
The opera superstar talks about Jake Heggie and Terrence McNally's Great Scott, in which the lead role was written for her. It has its world premiere at the Dallas Opera this week.
The death of 15 people on Mount Everest in 1996 has now been chronicled in an opera premiering in Dallas, Texas, simply called Everest.
Lise Lindstrom will sing the title role in the Dallas Opera’s “Salome” Wednesday night, replacing Deborah Voigt, who has withdrawn because of pain from a hip replacement.
Pretty Yende, Leah Crocetto, Patricia Racette among major stars of Dallas Opera’s 2019-20 season.
Dallas Opera's Emmanuel Villaume opens the season conducting very different 'Flying Dutchman' and 'Carmen'.
With an impressive resume that includes training as a singer and experience as a stage manager and production director, he previously worked with Dallas Opera, between 2014 and 2016.
In a surprise move, Keith Cerny, general director and CEO of the Dallas Opera for 7 1/2 years, has tendered his resignation, and will move to the same position with the Calgary Opera. | 2019-04-24T04:22:09 | https://theoperacritic.com/The_Dallas_Opera/dal |
0.999999 | Citi supports IFC trade plan | City A.M.
CITIGROUP will today unveil a $1.25bn (£760m) funding partnership with the International Finance Corporation (IFC) as it pledges to support attempts to unfreeze world trade flows.<br /><br />The tie up is part of the $50bn initiative announced by the IFC, the private sector arm of the World Bank, in April. <br /><br />It is understood that $750m of the funding will be channelled to banks in emerging markets in Asia, the Middle East and Latin America, with an additional $500m being invested by the IFC and other development groups.<br /><br />These banks should then be in a position to lend to trade clients – importers and exporters – opening up trading flows and helping to fuel recovery in their local economies.<br /><br />Citi’s commitment to pump money into short-term loans is a positive sign that banks are willing to re-enter developing markets and gives the bank the lead over competitors in capitalising on the credit crunch.<br /><br />Up to 90 per cent of the $13-14 trillion in world merchandise trade is funded by trade finance – through letters of credit – traditionally one of the simplest and safest forms of credit. But during a credit crunch banks tend to reduce their exposure as a defensive measure, decreasing short-term trade lines.<br /><br />As cash flow problems at exporters and importers become more severe, and they are less able to access cheap short-term finance to cover immediate needs, banks may be less willing to extend trade credit and reluctant to agree alternative forms of finance.<br /><br />In times of crisis, imports are critical to a country and exports can generate supportive foreign exchange. | 2019-04-19T14:33:09 | http://www.cityam.com/article/citi-supports-ifc-trade-plan |
0.998863 | What is one example that is true concerning network management for the data center?
A. The Network Analysis Module is best deployed in the core for highest visibility.
B. It utilizes flexible NetFlow for enhanced network anomaly and security detection.
C. NetFlow support is available on most IOS and Nexus products, excluding the Nexus 1000v.
D. NetFlow Data Export is best positioned on the Nexus 5500 at the access or aggregation layers.
Which tool, previously known as Cisco Fabric Manager, would you use in a data center to help manage unified fabrics with SAN connectivity?
Which tool provides centralized device and security policy management for Cisco VSG?
Which tool is a part of the Cisco ACE product family and is a critical component for cloud computing architectures?
Which tool is used to manage NX-OS devices and features like vDC and vPC?
What is one example of a business requirement that drives the design of a newly installed data center?
Which technologies will be found in a data center that is designed for Cisco equipment?
Catalyst 6500 Series FWSM, and Cisco UCS.
D. Cisco DCNM should be used to manage everything except the aggregation service layer. | 2019-04-20T04:54:47 | http://www.oracledumps.com/2016-nov-new100-valid-ccnp-642-996-pdf-exam-dumps-203qas-provided-by-braindump2gonq51-nq60.html |
0.999764 | What do you think are the most common symptoms that a startup will fail?
There are several but some of the most common are: failure to really understand & talk to their customers (i.e., an idea looking for a market vs. a product designed to satisfy a real market need); Founder's inability to admit what they don't know & to seek competent advice; Spending money excessively or ineffectively combined with poor accounting of results and cash flow; Inability to forecast or failure to raise sufficient capital.
You can look at the company's messaging and marketing and get a real sense of whether a business really understands its addressable market. If the company's value proposition and market positioning are poor then a business will ultimately fail. Also, if a company is constantly switching its senior leadership, messaging and marketing approach then this is a bad sign. The caveat here is that an innovative product or service can mask the signs of business that will not last.
I agree with Kent; owners that robbing the company of working capital generally will fail eventually.
Also in the SMB and Start-up marketplace, Founders/Owners don't listen to advice; especially if they smell success (because if they have success, they must know all).
A failure to keep an eye on the cash and the cashflow. As well as not being able to control the costst. However, there are many symptoms. Too many actually to list in a short post.
Let's not forget management which intentionally lies to and misleads the Board of Directors. Many times, the entity is under-capitalized and there is little to no understanding of how venture capital works at the ownership levels. Also be wary of CEOs and sales people who set unrealistic expectations with customers and underprice product or give it away.
One of the primary indicators is whether a given management team has the relevant industry expertise and the demonstrated ability to execute. The ability to execute and the experience to know when/how to pivot--in a startup world--dominate everything else. Too often, founders overestimate their ability to execute at a high level and wait until too late to bring in needed expertise. It's a bit of you-don't-know-what-you-don't-know. Some founders learn and deliver. Others bring in (or their investors bring in) people who can execute. The rest fail. I've been involved with brilliantly experienced executive teams that failed because they were all vision, no execution. They knew everyone in the industry and how everything works. They just could not actually roll up their sleeves and do the 80% of the work that does not involve brilliant thinking. In a startup, there is no job beneath the CEO and if the CEO is not willing to "scrub the toilets" when they need scrubbing, then it's not an execution-oriented CEO. Capital is very much secondary to this.
2. market- don't understand size of market, addressable market, etc.
All are good points. The best advice I ever got from one of Silicon Valley's most successful VC's was when I was involved in my first venture backed company: "The BOD is very critical and it most important that the members are right for the respective venture. The biggest reason most start up companies fail is the wrong BOD."
I have experienced all of the above and nothing has rung more true is the wrong BOD (read into that the venture firm they represent)..
Interesting that many of the answers include a Board as part of the problem.
For the most part, almost all the start-up's I've seen and small businesses (until they really start to grow and hit a critical mass) don't have either a Board of Directors or Advisors. (I discount the company attorney and CPA, and possibly the banker; if they are old school; as board members).
I must admit that many of the companies I've seen do not have VC/PE/IPO in their future.
Very good insights here and agree with the volume of comments related to Board. Having the right advisors on your Board; making sure that some of them are independent and experts in your industry is key. Also, be wary of your investor profile - VC/PE partners that are not the right for your company can do more harm then good, especially when they have voting power though the Board.
Cash of course is ALWAYS the most important factor - having enough runway and then managing what you have wisely.
Also, extensive research on your target market(s) and then continually test your product for acceptance. Do not think "build it and they will come". Instead, go after the MVP (minimum viable product (or service)) and then iterate off of that. | 2019-04-22T06:59:30 | https://www.proformative.com/questions/early-warning-signs-of-startup-trouble-failure |
0.999907 | Sometimes Google gets it wrong. Google is once again being criticised for highlighting untrue and fake news stories, but this time the focus is around the Google Home smart speaker. When you ask Google Home a question, it will read off top search results with a voice of authority. Even if that top result is a bucket of crazy. BBC Tech reporter Rory Cellan-Jones gave the crazy pot a stir this weekend when he posted a video asking his Google Home if Obama is planning a coup. The answer, According to details exposed in Western Center for Journalism, the Exclusive video. Not only could Obama be in bed with the Communist Chinese, Obama may be, in fact, may be planning a Communist coup de T-A-T at the end of his term in 2016. Then others chimed in. Search Engine Land editor Danny Sullivan posted a video with his own extreme questions, such as, are Republicans fascists? Yes, Republicans equals Nazis. There have been a number of stories highlighting Google's problem with presenting answers to searched questions. In this case, it's part of something called featured snippets. If you ask a question, Google finds a site that may have your answer, and it highlights a snippet of that web page. But sometimes the system will pick up bogus answers from sketchy sources. In a web search, you can always see the other results, but on Google home all you're hearing is the top answer without perspective. Just listen to the answer it gives when I ask if women are better than men. Women are smarter and have a higher college graduation rate. In the future, women will likely be the dominant gender. Women also tend to make better leaders. This is no real purpose for other men to help reproduce.>> Well maybe it's not always a problem. Google says sometimes mistakes happen with this feature. It removes several of the fake answer snippets and it will apologise for any offence it may of caused. We've been told as children that there are no stupid questions but I think Google is making the case otherwise. Because if you ask something crazy out of your Google home Prepare to get some crazy search results thrown right back at you. Also worth noting, Amazon's Alexa does not spit out these wild unedited answers the same way Google does. So if you have kids at home, who tend to say the darndest things, maybe it's best to not let them talk to Google. | 2019-04-26T04:29:21 | https://www.cnet.com/videos/google-home-spouts-crazy-talk-with-fake-news-in-answers/ |
0.999999 | How to get forward-slash / in tags to show correctly?
I'm sure there are reasons for this, but when foobar2000 (I'm using the latest, 0.9.5.1) encounters a forward-slash in the ARTIST field, it displays it as semicolon-space.
So "AC/DC" becomes "AC; DC"
However, in foobar2000 there is no acknowledgment of a forward-slash character in the artist field, whether in the normal display or when I open up tag-editing or properties box.
This is a problem for me, as I would like for the content in the tag to display when I'm using foobar2000 or searching the media library. I understand that use of semicolon is interpreted as breaking up multi-line fields (such as in the COMMENT field).
I figure there's an easy way get foobar2000 to display forward-slash / as just another character instead of interpreting it as a separator. But I have no idea how to change this or what setting it is. Any help would be appreciated. Thanks.
/ character is what separates multivalue fields in id3v2.3 tags.
use the "Rewrite File Tags" command in the context menu to write id3v2.4 tags (uses null character as a seperator), or APE tags.
Please use the search feature before asking a question.
I've found that re-writing the tags in id3v2.4 (using mp3tag*) works well for the forward-slash, but as a result, shortens the track name.
"Sweaty Wet/Dirty Damp (Shirkhan Remix)"
The title is displayed correctly in foobar but in windows media player, etc.. it is shortened.
Is there a procedure for tagging that will make it forward-slash or/and title-name friendly?
FYI: It's shortened because many products (including Windows Explorer and WMP 11) don't support ID3v2.4... so it's reading the ID3v1.1 tag, which has severe limitations, including length. Set Mp3tag to use ID3v2.3 (which is it's default) and you'll see the full name again in WMP 11, etc.
Products like WMP 11, Media Monkey, etc. have an explicit workarounds for "AC/DC" -- it does not parse it into two names when reading or writing the IDv2.3 artist tag, even though "/" is the standard delimiter in the actual tag. It looks like foobar2000 doesn't do this.
That only means that software that WISHES TO INTERPRET slash-delimited tokens as separate artist names can do so. How in the world does that justify REPLACING the slash with a different character (in this case, a semicolon) when displaying the contents of the 'artist' field to the user? Some software designers just can't resist interpreting a specification in a way that allows them to inflict the most pain on users.
Thanks for bumping this 8 year old topic. This issue has been changed to only trigger on a forward slash surrounded by whitespace. (" / ") This change is already more than a few years old. | 2019-04-26T13:43:51 | https://hydrogenaud.io/index.php/topic,62897.0.html |
0.999165 | Just why do cats eat grass? This behavior may look rather strange, but in fact a cat eating grass is really quite normal.
Cats seem to be genetically programmed to eat plant material and those kept indoors and deprived of the ability to do so will wreak havoc with your best houseplants, given half a chance!
There are a few theories that aim to explain this.
Hmm ... why do cats eat grass?
The most usual reason given for cats eating grass is that it helps them to get rid of hairballs in their stomachs by making them vomit.
A cat's tongue is covered in hundreds of little barbs which act like combs, catching the fur as the cat grooms itself.This hair is then swallowed and it gets turned into matted, furry balls in the stomach.
The theory is that the grass mixes with the hairball and makes it easier to expel.
As hairballs are quite indigestible this seems very logical, but a cat will often vomit after eating plant material whether or not it has hairballs.
So it could be that cats eat grass whenever they feel unwell in order to help them get rid of anything that might make them ill, whether it's a hairball or some other form of toxic matter.
Special note: If your cat vomits frequently, do have him checked out by your vet, just in case there's any serious underlying reason for this.
As any cat owner knows, eating grass doesn't always make a cat vomit - plant stems can often be seen in cat feces, too, so it must sometimes pass all the way through to the other end.
Then perhaps it's a herbal laxative?
It could be that a cat eats grass to help it clear out its bowels. A constipated cat will often eat grass which then mixes with its stools, making these easier to pass.
This may also be another way of clearing out hairballs that manage to get down into the lower intestines.
The zoologist Desmond Morris, in his classic book Catwatching (a must for any cat owner, though it's quite an old book now), says that a cat may eat grass for the folic acid it contains.
Folic acid is a vitamin (one of the family of B vitamins) that, among other things, helps to create healthy red blood cells and prevent anemia. Folic acid is found in all plant leaves, so this is a plausible explanation.
For humans, a good source of folic acid is liver, and a cat in the wild will first eat the offal (liver, kidneys, intestines) of its prey – probably because these are chock-full of all the nutrients consumed by their plant-eating prey.
These days, our domestic felines may not eat much offal in their diet, so this could provide further support for the folic acid theory.
Whatever the reason, cats do seem to have a need to eat grass.
An outdoor cat will do this naturally as it patrols its territory, but if you have cats that don't go outside, why not provide them with their own indoor garden?
You can buy lawn seeds from all garden centers, and some pet stores also sell grass kits especially designed for cats to eat.
Why not give it a try? At the very least it might help to preserve your expensive houseplants!
So why do cats eat grass? Have we found an answer?
It's possible that no-one really knows yet why this happens, it could be one of those 'evergreen' mysteries ... but it's really quite harmless, and it does seem to be a necessary behavior, so there's no need to worry.
Top of "Why Do Cats Eat Grass?" | 2019-04-26T16:01:46 | https://www.life-with-siamese-cats.com/why-do-cats-eat-grass.html |
0.999763 | Last weekend, I eagerly went to watch Interstellar. Over the years, Christopher Nolan has mastered sophisticated, stylized, cerebral movies which never failed to blow me away. He solidified himself as one of the greats: revolutionizes his use of film over digital and resorts to as little CGI as possible, and everything he touches seemingly turns to cinematic gold. How can someone not be eager to watch his latest flick?
While I consider this to be Nolan's weakest movie, that isn't necessarily a bad thing considering his impressive filmography as it is still superior to many other movies out there. Nolan's movies usually dabble around themes of guilt, distorted reality, paradox and obsession in neo-noir settings; his winning combination. This time around, he perceived unfamiliar grounds with matters of the heart embedded within a starry backdrop and foreign planets. Nolan's gushiest and most emotionally driven movie to date but it's clear that it isn't his strong suit yet; dropping the ball at creating a vital relationship worth caring about. While the actors did give it their all, there unfortunately wasn't enough of it on screen. Regardless of that, it did induce many tears, based on the many sniffles that could be heard in the theatre (I shed a tear here and there myself).
A star-studded ensemble composed of Matthew McConaughey, Anne Hathaway and Jessica Chastain, not without Nolan's good luck charm Michael Caine and newcomer Mackenzie Foy. Top-billed actors delivered poignant performances despite without fault, blurting occasionally corny monologues and a flat script written by Nolan's brother, Jonathan. Supporting and small characters alike are not given much of a chance at being tangible and are easily dismissed in the grand scheme of the story. One of my biggest disappointment came from a mystery A-list actor who I found brought nothing but wow factor, all plot aside. Needless to say, I thought a certain robot was a much more marvellous actor.
As for the frivolous controversy surrounding the sound, yes, my ears handled a lot but not more than most blockbuster movies. For me, this isn't the first time sound has been an issue in Nolan's movies. I'm a huge fan of his collaboration with composer Hans Zimmer and while I can't blame him for amping up the score in favour of dialogue, it can be distracting at times. The score didn't disappoint, revamping at what typical epic music should sound like. I was all the more impressed at finding out that Zimmer had no plot details prior to creating this moving score.
Visually, there are steel cold and monochromatic hues that I love about Christopher Nolan films and I wondered whether that would change without Wally Pfiser on board, the cinematographer on all of Nolan's previous movies. Hoyt van Hoytema did a fine job at recreating that signature look which felt a tad more organic than usual.
It's not a perfect movie, few are. But few look, feel and are as original and great as this one. Interstellar is exactly why we go to the movies. It demands to be seen for its cinematically epic proportions and anyone who's seen Inception knows they're in good hands. It's no wonder people compare it to sci-fi classic 2001 : A Space Odyssey, with many nods to Kubrick's masterpiece. It's ambitious, even for Nolan or any other director to delve into the intricate grandeur of time, science & space exploration. Nolan has a knack for simplifying complex stories and keeping them as accurate to life as a story line will let him. What he doesn't achieve with emotional human connection, he excels with everything else. It's a thrilling, edge-of-your-seat experience that amongst many things explores the cosmos as well as love. And how both have the capability of being equally vast. | 2019-04-19T13:21:34 | http://imkittyrouge.blogspot.com/2014/11/interstellar.html |
0.999664 | Which of the following factors affect the lift produced by spinning rotor blades?
What happens when a helicopter's main rotor blades spin rapidly?
Centrifugal force _____ spinning helicopter main rotor blades _______.
If left uncorrected, greater lift produced by the advancing side of the rotor disk compared to the lift created by the disk's retreating side could make the helicopter ______.
The driven region is _____ the blade tips and normally ____ percent of the radius.
The _____ region is normally between a blade's _____ and _____ regions.
Because of gyroscopic precession, if a wind gust applies a downward force on the left side of a helicopter's main rotor disk as it spins clockwise (as viewed from above), the movement response occurs at the __ o'clock position. | 2019-04-21T02:49:36 | https://www.brainscape.com/flashcards/sift-study-guide-army-aviation-informatio-6782054/packs/10784633 |
0.99962 | How did a dislocated shoulder turn into a lifelong problem?
Have you ever gone to the hospital to get treatment for an injury only to have your condition worsen in some way? Unfortunately, this is actually a common problem.
One man went to the hospital with an injury that many have faced- a dislocated shoulder. The young man had been playing games with some friends when he suddenly felt a pop in his shoulder. He later went to the hospital when his pain became intolerable. But by the time the hospital was done with him a dislocated shoulder was not all that he had. The hospital had caused the man permanent injuries to his hand and arm that would cause him lifelong problems in doing everyday activities.
The National Center for Biotechnology says that shoulder displacements are among the most common dislocated joint injuries in the entire body. So you would think that hospitals are skilled in treating them properly, right? Well apparently not all hospitals are reasonably trained in this injury despite its common and regular occurrence.
The NCBI explain, “Acute dislocation is a surgical emergency and demands urgent relocation. Failure to reduce a dislocated shoulder successfully within the first twenty-four hours carries the risk that it will be impossible to achieve a stable closed reduction. The experienced trauma physician can recognize an anterior shoulder dislocation at sight. The arm is usually held in an abducted and externally rotated position. There is loss of the normal contour of the deltoid and the acromion is prominent posteriorly and laterally. The humeral head itself may well be palpable anteriorly.
On more detailed examination, there may be specific damage to the bone, vascular and nervous structures of the region. It is important to record neurovascular status before reduction is attempted. In the longer term, injury to the rotator cuff may also emerge. Each of these defects will be considered in turn.” So how did the hospital mess up something that was supposed to be pretty routine and thus cause the young man permanent nerve damage in his hand and arm? Well they certainly did not seem to follow the careful protocol outlined by the NCBI.
The doctors had first decided to reduce the young man’s shoulder. This means that they essentially planned to put his shoulder back into its socket. The NCBI details what is supposed to be done in a shoulder reduction, “A plain anteroposterior X-ray is mandatory before attempting to reduce the shoulder, as an associated humeral fracture will make it both impossible and dangerous to manipulate the humeral head by holding the shaft. A second, axillary view confirms the diagnosis and determines the direction of dislocation.” They conducted this task in a rather careless way. Multiple medical staff members were pulling the young man’s arm in various directions (thus causing traction and counter-traction) in order to put it back into its socket. After this process the young man’s shoulder swelled up an abnormal amount (no surprise there, right?).
The young man started to complain of pain and swelling early on. The hospital’s physicians eventually realized that the swelling had exceeded normal levels as well. So they next ordered a MRI to figure out what was causing the massive swelling. A resident (who is a doctor in training) read the MRI report and that’s where the problem really started.
The resident actually misread the MRI which led to a series of events that made the patient’s condition much worse than it would have been if he was treated in a timely manner. The hospital did not figure out any of this until much later.
After the MRI was performed, the patient felt a great deal of numbness in his hand. This numbness increased over the next few hours and he constantly relayed his numbness, pain, and discomfort to his nurses yet none of the doctors thought anything more about it till the morning.
So what did the hospital finally do to try to fix their mistake?
A whopping twelve hours after the MRI was performed a senior doctor finally re-read the MRI to see if the resident had made any errors as the patient was experiencing numbness. The senior doctor realized that there was a complication. The MRI showed that the patient had a build up of fluid in his hand. This buildup was affecting one of his nerves and causing the numbness.
Realizing the need for speed, the senior physician immediately called for the patient to be sent into the operating room. He planned to attempt to save the patient’s arm before the injury resulted in permanent damage.
The surgeon then tried to relieve fluid from the patient’s axillary area, to no avail. But they were too late. The fluid had already caused permanent damage to the nerve.
In a nutshell this is what happened- the fluid had put extreme pressure on that nerve causing it to die. This then caused blood flow to that nerve to get cut off.
What Was the Standard of Care Here?
Courts look at the standard of care that the physician/hospital was supposed to use when determining whether the hospital is at fault. Doctors must exercise the same degree of care as an ordinary member of their profession. Many jurisdictions only compare the defendant to professionals in a similar community. However, some jurisdictions hold professionals to a national standard.
The standard of care for doctors is usually a duty to render a quality of care consistent with the level of medical and practical knowledge the physician may reasonably be expected to possess.
When bringing a lawsuit for medical malpractice in NY, we are required to bring in medical experts to testify that the doctors and hospital staff did not adhere to the basic standards of medical care.
Experts from The Journal of Bone and Joint Surgery talk in depth about how doctors can decipher whether a nerve injury has occurred.
The experts’ analysis shows that loss of feeling in the hand, which is what the patient felt in this case, is a clear indication that there is nerve damage; yet the hospital took hours to re-evaluate the results of the x-ray.
In this particular case, there is no doubt that time was of the essence. A series of missteps by the hospital staff resulted in this young man’s delay in diagnosis. That delay led to the loss of use of his entire arm and hand.
The tragedy of this all is that this was entirely preventable. Had the doctors and hospital staff timely recognized the fluid buildup and what the numbness and tingling in his arms signified, they could have rushed him into surgery many hours earlier resulting in a decompression of the nerve while it was still alive.
This young man happened to be a former bodybuilder, and now his injured arm is atrophied, shriveled and virtually useless. What a shame. | 2019-04-20T22:29:21 | https://www.oginski-law.com/library/hospital-fails-to-recognize-nerve-injury-after-shoulder-dislocation.cfm |
0.999139 | Do carbonated beverages harm your bones?
DEAR DOCTOR K: I know I should drink plenty of water every day, but sometimes I get tired of drinking plain water. So I reach for club soda, seltzer water or sparkling mineral water. But I've heard that carbonated drinks could be bad for my bones. Is this true?
DEAR READER: Several of my patients have asked the same question. Sometimes they are not asking about carbonated water, but carbonated beverages that contain caffeine (like colas) and sugar or sweetener. I'll tell you what I tell them.
What can I do to stop passing gas?
DEAR DOCTOR K: I pass a lot of gas. It's bad enough when I'm alone. But it's absolutely mortifying when I have to pass gas in public. What can I do?
DEAR READER: It's normal to have air in the digestive tract. Some gets there when you swallow it and some is produced during digestion. Your body normally produces up to two quarts of gas a day. This air moves in your digestive tract along with food and waste products. Eventually it needs to be expelled to prevent painful stretching of the stomach and intestine.
DEAR DOCTOR K: For the past few months I've been having a lot of trouble falling asleep, basically every night. I'm groggy and can't concentrate on anything all day. I'd give anything for a good night's rest.
DEAR READER: Trouble falling asleep often occurs because a person is overstimulated. There may be unusual stresses in your life that cause a lot of anxiety. With most of my patients, however, there's no one thing they can put their finger on that explains why they are lying there having trouble falling asleep. Here are some of the things I tell my patients to do, and not to do, to fall asleep more easily.
Can “holding it” hurt your bladder?
DEAR DOCTOR K: This may seem like an odd question, but can "holding it" when you need to urinate damage your bladder? I sleep on the second floor of my house, but the only bathroom is on the first. Sometimes I just don't feel like getting up! Am I hurting myself?
DEAR READER: I'd say you're in good company — we've all "held it" before, for whatever reason. Many of my patients ask me the same question you have. I've even had a patient ask if her bladder could actually explode from holding it too long.
This is the first of a new column: Ask Doctor K. My new column replaces a longstanding health column, Ask Dr. Gott. Former readers of Ask Dr. Gott know he provided considered answers to health and wellness questions from readers. I plan to do the same and I hope you will find my comments as helpful as Dr. Gott's were. | 2019-04-22T14:06:51 | https://www.askdoctork.com/2011/9 |
0.998562 | Find out what made these companies miss a huge rally.
The stock market soared on Tuesday, climbing on momentum from positive earnings reports and favorable readings on the U.S. job market. Major benchmarks were up roughly 2% to 3%, and many investors took heart in how quickly stock indexes were able to bounce back from the severe drop they saw over a two-day period last week. Yet even with good news helping stocks across the market, there were a few companies that found themselves left out of the rally. Domino's Pizza (NYSE:DPZ), Innophos Holdings (NASDAQ:IPHS), and W.W. Grainger (NYSE:GWW) were among the worst performers on the day. Here's why they did so poorly.
Shares of Domino's Pizza declined 5% after the company released its third-quarter financial report. The popular pizza chain announced solid growth in retail sales that helped earnings per share soar by more than 65% from the year-ago period. However, investors weren't satisfied with Domino's same-store sales growth numbers, which included gains of just 3.3% internationally and 4.9% at company-owned locations domestically. For a company that's routinely put up double-digit-percentage gains in comparable sales figures, the realization that Domino's period of hyper-growth is coming to an end seemed to chill investor sentiment despite the impressive bottom-line growth that the pizza chain produced.
Innophos Holdings fell nearly 17% in the wake of the issuance of its preliminary third-quarter results and new full-year guidance. The specialty ingredient company said it now expects 2018 growth to come in between 10% and 12%, down from its previous 12% to 14% range due to weaker sales in the second half of the year. Innophos made a strategic decision to discontinue some of its low-margin operations in order to concentrate on more lucrative parts of its business, and that will be responsible for much of the top-line contraction. Higher ingredient costs have affected many food companies, and they've forced Innophos to increase the prices it charges its customers as well. Although Innophos has confidence in its long-term strategic moves, investors aren't happy with the short-term impacts of the decisions it's made recently.
Finally, shares of W.W. Grainger finished lower by 12%. The supplier of maintenance, repair, and operating products said that its revenue rose 7% during the third quarter from the previous year's period, with adjusted earnings jumping 44% due to better margin figures and lower taxes. Yet despite the strong performance, investors seem to be uncertain about whether the company's rising sales from large and medium-sized customers will be able to continue indefinitely into the future. As long as Grainger can keep its overall expenses under control without jeopardizing its sales, today's decline seems like an overreaction to concerns that might very well never materialize. | 2019-04-25T07:02:27 | https://www.fool.com/investing/2018/10/16/why-dominos-pizza-innophos-holdings-and-ww-grainge.aspx |
0.999999 | Is your video and music file collection growing out of control, making it impossible to find anything? Fight this problem with Media Catalog Studio, a handy software application for classifying and tracking media files. This database is capable of identifying media files on any storage devices - hard-drives, floppies, external drives, CDs and so on. The program supports MP3, WMA, APE, OGG, WAV, AVI and Audio CD files and comes with a lot of great perks - duplicates finder, tag editor for MP3, OGG, and APE files, to name a few. The best thing about this database is that it allows users to enter all essential information about music file - track number, name of the music piece, name of the author, album, year of release, commentary, composer, mood, genre, rating and so on. Conveniently, all files stored in this database can be sorted out by artist, album, year, bitrate, frequency, genre, category, rating or any field/category. The search in the database can be conducted using multiple parameters, like file properties (name, size, etc), tag information or lyrics. Media Catalog Studio features internal tag reader and editor for MP3-tags (ID3v1, ID3v2 and Lyrics3 versions) and supports an option for storing pictures in addition to lyrics.
The program is intuitive, user-friendly and easy to learn. The great thing is that you can create playlists for WinAmp or Windows Media Player with a few mouse clicks. In addition to supporting CDDB, all data from the program can be exported to Excel; there also are a lot of other convenient options, like disk location tracker, or media file statistics feature.
The owners of large media file collections will appreciate this program's multiple visualization options, which help make sense of and find necessary media files quickly.
Here is the killer part about this program - it works with removable disks and CDs just as easily as with your hard-drive. And if your collection contains less then 500 pieces - it's free to use!
Movienizer Portable 4.1 Build 196 - Movienizera„? is a powerful movie organizer that contains features of an encyclopedia. It was developed by movie lovers specially for movie lovers. Most people keep their things in a mess.
MIDI to MP3 Converter for Mac OS 6.1 - There are many situations when you may need to convert MIDI to MP3 or WAV. MIDI files are very small, but they don&#8217;t contain any audio data. Thus you cannot burn them to Audio CD directly, or play them with your MP3 player.
mp3Tag Pro 7.4 - mp3Tag Pro is a feature-rich MP3 tag editor for music files in different formats. Supply your audio with information about titles, artists, albums, genres, with lyrics and album art. Rename and sort your MP3 collection in a few clicks.
Booknizer 5.0 - Organize all books in your home library easily with Booknizer! This book organizer offers numerous tools to work with paper, electronic and audio books. Download necessary information about your books and their authors from the internet in one click!
mp3Tag Lite 5.9 - Mp3tag is an application that allows you to edit metadata from audio files. With this application, you can import all your files and their respective metadata information and export them conserving the data.
Statement: Download Collection.com periodically updates software information of Media Catalog Studio from the publisher ManiacTools. You can visit publisher website by clicking Homepage link. Software piracy is theft. Using Media Catalog Studio crack, key, serial numbers, registration codes is illegal. The download file hosted at publisher website. We do not provide any download link points to Rapidshare, Hotfile, Depositfiles, Mediafire, Filefactory, etc. or obtained from file sharing programs such as Limewire, Kazaa, Imesh, Ares, BearShare, BitTorrent, WinMX etc.
tvitty 0.9.5 - tvitty is a bittorrent download plug-in for Microsoft Windows Vista Media Center designed for your tv & remote. it lets you browse, search, download, and watch videos distributed over the internet, right from your couch.
ActiveResize Control Lite 3.0 - VBGold ActiveResize Control is an intelligent VB form resizer that makes your Visual Basic applications completely resolution-independent without the need to write any code. | 2019-04-22T03:03:30 | https://www.downloadcollection.com/media_catalog_studio.htm |
0.998439 | A Gap Between Pulpit and Pew?
The United Church of Canada has wide divergences in theology among members and adherents. On the one hand, you can find within her ranks ministers who are extremely liberal in outlook. They regard the Bible as fallible, human records of remarkable religious experiences, some mythical and others historical. On the other hand, there are inflexible fundamentalists. But the winds of change are also felt. The experiences of Rev. J. Berkley Reynolds tell part of the story.
Rev. Reynolds felt that the presbytery's action made his case rather hopeless. He commented: "No presbytery across Canada will touch me now. It virtually means that I am being forced to leave the United Church." But Rev. Reynolds did eventually become the pastor of Ellesmere United and has now an effective ministry in Toronto. At the moment his church is planning, despite the opposition of the presbytery, to erect a large new edifice to accommodate her expanding ministry.
Rev. Reynolds is now called "probably the United Church's best known evangelical." He says: "I used to feel more or less an object of scorn in the United Church. Now it seems to me increasing numbers of clergy and lay leaders are sharing my theological perspective. It's a new day."
Liberals are feeling the pinch. One said: "I feel so lonely." The distrust of liberalism began in the early 1970's with disillusionment over Vietnam, economic policies, worry over unemployment. Patricia Clarke says: "Liberal ideas didn't seem to have worked. Cynicism grew about leaders, in government, business, the church."
The official organ of the United Church, The United Church Observer, gives a good survey of the trends within that denomination.
The divinity of Christ has come under attack by some of the more outspoken United Church leaders. Ben Smillie, a controversial university chaplain, sees Christ's divinity in His life of obedience to God. He considers it laughable that Christ would endorse the conservative belief that Adam, Eve, Cain and Jonah were real live persons. Christ merely believed about the Old Testament that what was taught in the synagogue. He did not know any better. He was not so enlightened as the modern theologians of today.
"If Adam and Eve; Cain and Abel. Noah and Jonah are personages in myth and allegory, they cannot be historical people at the same time, no matter how sincere one's faith. Does somebody question this? Then look at the Bible documents. Any student who has done a basic course on the Bible knows since the days of Karl Graf and Julius Wellhausen (two giants of the Old Testament scholarship at the end of the nineteenth century) that the first six books of the Bible are composite literary works, containing myths, legends, laws and priestly ritual."
Ruth Petricek, who works as a secretary at the United Church headquarters, is a refugee from Czechoslovakia. Her father was a minister of the Czech Brethren Church and for a time the moderator. She complains that United Church leaders at headquarters do not seem interested in the fate of the people behind the Iron Curtain. She says: "In the chapel in church headquarters I have heard prayers for the people of Chile and prayers for the people of Vietnam. Never have I heard prayers for the people behind the Iron Curtain. When I read The Observer, it is always Chile, Cuba, Vietnam, Southern Africa. Never do I read about the people under Communist rule. Clarke MacDonald is heard on Vietnam, John Foster on Chile, AI Forrest on Cuba. Never do you hear anything on the other side. This is not a thing that is past. Czechoslovakia is still under Communist rule. Human rights are still ignored." 2.
The same Observer that reported the sentiments of Ruth Petricek and N. Austrins also had an article on Chile by the Right Rev. N. Bruce McLeod. In this article Rev. McLeod strongly condemned the take-over of Chile by a right-wing military junta.4 And later issues continue with the same line of thought.
So the editorial practices show that the charges made by Ruth Petricek and N. Austrins are certainly not without substance. The critique of human rights is one-sided. It seems easier to demonstrate against South Africa and Chile than against Cambodia and Vietnam.
In his book The Changing Church in Canada Beliefs and Social Attitude of United Church People, Rev. Stewart Crysdale writes about a middle-aged doctor, . who is a member of the United Church in an Atlantic city. The doctor belongs to a service club, a recreation group, a hobby group and three professional and academic societies. He reads many books, none of them religious. His favourite magazine, among the nine he reads regularly, is Time.
He says: "I cannot believe in original sin, hence forgiveness of same or salvation and an actual life hereafter and it bothers me that it doesn't bother me further." He appreciates the instruction the church has given him over the years in character and citizenship but also believes that his church has neglected training in doctrine and "theological philosophies."
But the story about the doctor shouldn't lead us to generalities. The membership of the United Church today appears to follow the trend towards a more conservative expression of faith. But I don't think that the "official" leadership has caught up as yet with this move to the right. There is a gap between the pulpit and the pew.
sweatshops in Toronto where immigrant workers are exploited for very low wages. Unemployment is high. Little is done to help the working poor. Our high inflation to is a harsh reality for people with fixed incomes. The social concern of the United Church is commendable. But Rev. J. Berkley Reynolds laments about his denomination: "We've twisted the words of Jesus to read: 'Seek ye first the welfare state and the kingdom of God will be added to you."9.
As Reformed Christians we cannot share the United Church's approach to social issues. The leadership is strongly influenced by secular theology. It seems to have politicized the gospel. And as long as the United Church has no fence around the pulpit, i.e. as long as discipline is not possible within that denomination, we cannot expect a positive and sound Biblical approach in the near future.
Our authority must come from God's Word. We must be orthodox in thought and practice. The Reformed faith has a great opportunity in Canada's climate of change. Is it ready to meet this challenge?
One final comment. We are not to watch the developments within the United Church as mere spectators. Let us remember the evangelicals in the United Church and their leaders in our prayers. They need our encouragement.
1. Ben Smillie. Why Fundamentalists Are Wrong. The Observer, Ma, 15, 1967, p. 20.
2. Why Want the Church Listen to Us? The Observer, Jan., 1974, p.21.
4. N. Bruce McLeod. "To Say The Truth About Chile." The Observer, Jan.,1974, p.10.
5. Moderator asks Superior Oil not to invest in Chile. The Observer, June, 1978, p.38.
9. J. Berkley Reynolds. Long Live The Old Evangelism. (May 1, 1967) The Observer.
50 years of the United Church of Canada as reflected in an anthology from the New Outlook and The Observer, January, 1975, p.41. | 2019-04-22T05:59:24 | http://reformedreflections.ca/other-religions/uc-gap-between-pulpit-pew.html |
0.998868 | US Secretary of State Mike Pompeo on Thursday named a Ford Motor Co. executive as special envoy for North Korea and said they would both travel to the nuclear-armed country next week.
Stephen Biegun, 55, who is retiring as Ford's vice president for international governmental affairs, had been considered for the post of President Donald Trump's national security advisor before it went to John Bolton.
"Steve will direct the US policy towards North Korea and lead our efforts to achieve President Trump's goal of the final, fully verified denuclearization of North Korea, as agreed to by chairman Kim Jong Un," Pompeo said.
"He and I will be traveling to North Korea next week to make further diplomatic progress towards our objective," he said.
The trip will be Pompeo's fourth to North Korea, and the second since a historic summit on June 12 between Trump and Kim.
"The State Department has already done excellent work in implementing and sustaining the pressure campaign, putting together the first ever leader-level summit in Singapore and laying the groundwork to hold North Korea accountable to the promises that chairman Kim has made," Pompeo said.
State Department spokeswoman Heather Nauert later said Pompeo was not expecting to meet with Kim.
At the first-ever meeting between sitting leaders of the US and North Korea, Trump and Kim pledged in a joint statement to work toward the "complete denuclearization of the Korean Peninsula."
The statement, however, was short on details and a UN panel of experts has found that North Korea is pressing ahead with its nuclear and missile programs.
Pompeo has insisted that Kim verbally agreed to the complete and verifiable denuclearization of North Korea, under a timetable to be fleshed out in follow-up discussions led by the State Department on the US side.
Kim has followed through on some commitments made at the summit, including returning the remains of US service members killed during the Korean War.
And satellite imagery from the Sohae Satellite Launching Station on North Korea's west coast shows workers dismantling part of the site, although experts warns the move does not necessarily impact Pyongyang's nuclear program.
But overall, there is scant evidence to show Kim is serious about getting rid of his nuclear weapons.
Pompeo went to Pyongyang in early July but came back with little to show for his efforts, though he insisted the talks were "very productive."
Meanwhile North Korea has criticized Washington for its "gangster-like" and "unilateral" demands for the complete, verifiable and irreversible dismantling of Pyongyang's atomic arsenal.
Pompeo has repeatedly called for the international community to maintain pressure on North Korea, and a UN report this month warned that Pyongyang is circumventing tough sanctions imposed over its nuclear weapons program.
Following his summit with Kim, Trump famously proclaimed North Korea is "no longer a nuclear threat" and boasted of his good relationship with the strongman.
"The consultations will continue," Nauert said. "This issue is going to take some time." | 2019-04-19T21:07:18 | http://www.kogonuso.com/2018/08/pompeo-to-return-to-n-korea-with-new.html |
0.998894 | We decided to learn how to make balloon animals today.
We checked a book out of our library on how to do it and having known this book was at our library, I bought a mini balloon making kit off Amazon.
I'd like to say we read the book and voila balloon twisting just took off, but it was a lot harder than the book made it seem like!
The first two balloons popped and the kids were totally discouraged.
I folded up a bee following the instructions and then they were happy to try again. It still required a lot of help on my part but by the time we broke for lunch we had a bee, a hummingbird (really it's the same as a bee you just put the eyes on the other end), a mouse, a dog, and 4 (or maybe 5) swords. I wasn't sure what they had learned if anything so I thought I'd ask.
What did we learn making balloon shapes and animals?
1. You have to twist it and get it not to pop.
2. You can't have sharp nails or you'll pop it.
3. If you twist it too hard it will pop.
4. Sometimes you have to push the balloon together where you twisted it so it won't untwist.
5. Balloon twisting is hard for a person but easy for a clown (this one made me laugh so hard!). | 2019-04-23T02:53:50 | https://www.ourunschoolingjourney.com/2012/07/shouldve-packed-it-in-and-given-up.html |
0.999999 | Why is my average speed so low?
I recently bought a bike (never rode one real one before, only ever used the gym ones) and became quite comfortable with it so I ride it everyday around my city.
Here's the thing, I'm a 19 year old girl (if that's relevant) and I exercise almost daily (plus the cycling) so my leg muscles are fairly strong, but my average cycling speed never got over 8 km/h, I was wondering why? Does the bike use muscles I usually wouldn't train?
My city is uphill/downhill almost no flat terrain, but when I looked up even average cycling speed for uphill it was 12 km/h, am I doing something wrong?
Average speed depends a lot on various factors. But, having said that, 8km/h is very slow for a fit young person: it's not a whole lot more than walking pace.
Where you're cycling. In cities, it can be hard to cycle quickly. Cycle paths often have lots of pedestrians on them; roads often have lots of junctions, stop signs and traffic lights. If you're constantly having to stop and get going again, that will bring your average speed down a lot.
You say you're in a hilly city. Going up-hill is, of course, slower. However, on average, you'll go down as many hills as you go up, so that should balance out to some extent. If you mean that you average 8km/h up the hills, that might not be at all bad, depending on how steep the hills are!
How you measure speed. If you just compute distance travelled divided by time taken, then you're including all the time you're stopped in your average: if you cycle at 15km/h for ten minutes and spend five minutes stopped, your overall average would be 10km/h but, when you were actually cyling, you were doing 15. If you're using a cycle computer or GPS app, you should set it up to only compute average speed over the time you're actually moving.
How you cycle. Obviously, if you don't try to cycle fast, you won't be fast. Are you working quite hard when you cycle, or are you just drifting along? Do you get out of breath? Are you using your gears properly? A lot of beginner cyclists turn the pedals very slowly in much too difficult a gear, and it's hard to go fast that way (and very hard to accelerate away from a stop). As a rough guide, if you're pedalling at less than 60rpm on flat ground (i.e., pressing your right leg down once every second), you're pedalling very slowly and you should probably aim for something more like 75. Use an easier gear to compensate and, crucially, if you feel yourself slowing down, change into an easier gear. The point of the gears is that they let you keep the pedals spinning at a good rate whatever speed you're actually going at. A good way to measure how fast you're pedalling is to use the internet to find out how many beats per minute there are in some songs you know, and compare that against how often you're pressing down your right leg.
How well your bike is set up and maintained. Many beginners have their saddle much too low. An easy rule of thumb is that, when you're sat on the saddle with your foot on the pedal at its lowest point, that leg should be almost straight. If your saddle is much lower than that, it's really hard to generate any power. Is your bike well maintained? Do the wheels spin freely? Are the brakes rubbing? Is the chain properly lubricated? Does the bike make noises while you cycle?
You don’t provide much information in your question so it’s impossible to give you a specific answer, but it basically boils down to: either you're not as fit and strong as you think you are, or something is holding you back.
Your bike may be a slow bike. Is it heavy? inefficient? in poor shape? A rusty, worn out chain or low tire pressure can slow you down.
If the bike does not fit you very well it will hinder your ability to put power into the pedals.
Is your bike simply not designed to go fast, such as a beach cruiser or a hybrid with a very upright riding position?
Are you using the gears correctly? Are you pedaling too fast in a too-low gear or grinding along in a too-high gear?
What are you wearing? Regular clothes or lightweight cycling clothing that does not restrict movement?
Maybe you have just got into the habit of riding slowly? Do you concentrate on keeping your effort and speed up?
Nobody seems to have paid attention to that crucial bit of information.
It likely comes down to technique, which will not be very good if you never rode an actual bicycle before. It will improve with practice.
Not the answer you're looking for? Browse other questions tagged beginner or ask your own question.
Difficulties changing from a folding bike to a full sized MTB - why?
Why using a puncture repair kit instead of a new inner tube? | 2019-04-25T15:45:54 | https://bicycles.stackexchange.com/questions/59055/why-is-my-average-speed-so-low |
0.999974 | What is the Russian government up to in Syria? After weeks of agitating for the creation of an international "united front" to confront the Islamic State terrorist group (and rehabilitate its longtime ally in Damascus in the process), the Kremlin has taken matters into its own hands.
Beginning in early September, the Russian government commenced what amounts to a major intervention in the Syrian civil war. Over the past month, it has dispatched thousands of troops, established a new air base in the port city of Latakia and deployed heavy war materiel (including advanced T-90 tanks, howitzers and a contingent of fighter aircraft) to the Syrian battlefield. In the process, Russia has succeeded in dramatically altering the contours of the four-and-a-half-year-old conflict.
On the surface, Russia's objective is straightforward. The Assad regime has suffered a series of significant battlefield setbacks of late. According to a recent survey by Jane's Intelligence Review, the Syrian regime's hold on territory has shrunk by 18% over the past eight months. It now controls just a sixth of the country. As a result, President Bashar Assad is increasingly playing a defensive game, with his forces fighting to maintain control of vital population centers such as Damascus and Homs. Moscow, as Russian President Vladimir Putin admitted in a recent interview with Charlie Rose, is trying to reverse this decline and keep Assad afloat.
Changing the conversation. While the Russian government continues to apply broad political pressure on the Ukrainian government, it is increasingly apparent that its Ukraine strategy is struggling. Moscow still possesses the ability to dramatically escalate hostilities in its conflict with Kiev, as recent reports of a significant Russian military presence on Ukrainian soil make all too clear. But the rapid, decisive strategic victory once promised by Putin has proved elusive — while the real-world costs to Russia's economy of his foreign policy adventurism continue to mount. Against this backdrop, Russia's involvement in Syria can be seen as a way to change the subject and regain momentum lost closer to home in recent months.
Securing access to the Mediterranean. Russia's conception of itself as a global player hinges upon its continued ability to project power into multiple world theaters. In this calculus, Syria's port in Tartus — which Moscow has claimed as the home base of its Mediterranean flotilla since the early 1970s — represents a crucial strategic prize. The declining fortunes of the Assad regime have raised the unwelcome specter that the Kremlin could find itself without the ability to access the Mediterranean in the not-so-distant future. By reinforcing its troop presence within the country — and by broadening its footprint through the establishment of a second base in Latakia — Russia is working overtime to preserve its global reach.
Keeping Islamists at arm's length. Finally, Russia's steadfast support of Assad is driven, at least in part, by fears of swelling Muslim extremism closer to home. The Kremlin has good reason to be concerned. Earlier this year, the Caucasus Emirate, Russia's most potent jihadi group, formally pledged allegiance to ISIL, and the terror organization thereafter officially established a "governate" in Russia's restive majority Muslim regions of Dagestan, Chechnya, Ingushetia, Kabardino-Balkaria and Karachayevo-Cherkessia.
The group's potential to threaten Russia, meanwhile, is expanding rapidly. A year and a half ago, Russian security officials were estimating that 800 to 1,000 Islamic extremists from the North Caucasus had joined the jihad in Syria. Today, the figure is much bigger; this month, Russian Deputy Director of Federal Security Sergei Smirnov officially put the number of Russian nationals fighting with ISIL in the Middle East at 2,400.
The Kremlin understands very well that should these jihadis return from the Syrian battlefield, its problem with Islamic militancy will become much worse. It has also clearly calculated that, with the right backing, the Assad regime could whittle down this contingent before it ever makes its way home.
All of which makes Russia's intervention in Syria an exceedingly high-stakes enterprise for the Kremlin. It is also why Moscow, now that it has become embroiled in the Syrian civil war, can't be expected to scale down its involvement there any time soon. | 2019-04-20T03:11:57 | http://www.ilanberman.com/17895/deciphering-russia-syria-strategy |
0.998653 | After going up 2-0 on Day 1, Lucie Safarova saving five match points to edge Caroline Garcia and Petra Kvitova beating Kristina Mladenovic in straight sets, Kvitova clinched the Czech Republic's spot in the Fed Cup final in the first reverse singles match Sunday, beating Garcia in straight sets too.
It looked dicey at the end - Kvitova watched a 6-4, 5-1 lead evaporate to 6-4, 5-4 - but she summoned up one last big service game to put the WTA Rising Star away after an hour and 33 minutes, 6-4, 6-4.
"I saw Garcia play Lucie yesterday and she played very well, so I was prepared for a tough match," Kvitova said afterwards. "I was lucky to break her from the beginning of the set, and I'm glad my serve worked much better than yesterday - I was very relaxed out there and happy with how I played.
"Clay is coming, and that's always difficult for me, but I hope I can continue like this."
The second reverse singles match between Safarova and Mladenovic wasn't played, and Mladenovic and Pauline Parmentier beat Safarova and Barbora Strycova to close the gap in the final score to 3-1.
The Czechs are now a win away from their fourth Fed Cup title in the last five years - they won it in 2011, 2012 and 2014 as well. Italy won the title in 2013, beating the Czechs in the semifinals.
While one team was winning in front of their home crowd in Ostrava, another team was doing the same in Sochi. After storming out to a 2-0 lead on Saturday, Russia watched on as Germany mounted a valiant comeback, winning both reverse singles on Sunday to even it at 2-all, Andrea Petkovic routing Svetlana Kuznetsova, 6-2, 6-1, and Angelique Kerber routing Anastasia Pavlyuchenkova, 6-1, 6-0.
But they got their mojo back just in time, with Pavlyuchenkova and Elena Vesnina putting on a dazzling display of all-court tennis to beat Petkovic and Sabine Lisicki in the deciding doubles, 6-2, 6-3.
"It was an unbelievable victory. We're so excited," Vesnina said. "I'm proud of my team. All our girls gave so much in this tie, all their heart and energy, and I want to thank our team and our captain.
"This was Anastasia's third match of the tie and I know she was tired, but still she played great."
"Elena helped me a lot today, and the team and crowd too," Pavlyuchenkova beamed. | 2019-04-18T20:25:30 | http://tianjinopen.com/en/news_details.asp?id=47 |
0.999969 | An example method is provided for a computing device to provide quality of service (QoS) for a container in a virtualized computing environment. The method may comprise receiving a traffic flow of packets from a virtual machine and identifying a container from which the traffic flow originates based on content of the received traffic flow of packets. The container may be supported by the virtual machine. The method may further comprise retrieving a QoS policy configured for the identified container. For example, the QoS policy may specify a network bandwidth allocation for the container. The method may further comprise forwarding the received traffic flow of packets according to the QoS policy.
1. A method for a computing device to provide quality of service (QoS) for a container in a virtualized computing environment, the method comprising: receiving a traffic flow of packets from a virtual machine; identifying a container from which the traffic flow originates based on content of the received traffic flow of packets, wherein the container is supported by the virtual machine; retrieving a QoS policy configured for the identified container, wherein the QoS policy specifies a network bandwidth allocation for the container; and forwarding the received traffic flow of packets according to the QoS policy.
2. The method of claim 1, wherein the QoS policy specifies the network bandwidth allocation for the container using one or more of the following: a container shares value that specifies a network bandwidth allocation priority given to the container relative to at least one other container; a container limit value that specifies a maximum network bandwidth allocation for the container; and a container reservation value that specifies a minimum bandwidth allocation guaranteed for the container.
3. The method of claim 2, wherein the network bandwidth allocation for the container is associated with a network resource pool of the virtual machine, the network resource pool being defined by one or more of the following: a virtual machine shares value that specifies a network bandwidth allocation priority given to the virtual machine relative to at least one other virtual machine; a virtual machine limit value that specifies a maximum network bandwidth allocation for the virtual machine, the container limit value not exceeding the virtual machine limit value; and a virtual machine reservation value that specifies a minimum bandwidth allocation guaranteed for the virtual machine, the container reservation value not exceeding the virtual machine reservation value.
4. The method of claim 2, wherein forwarding the received traffic flow of packets comprises one or more of the following: scheduling the packets for forwarding at a data transfer rate that is at least the container reservation value; scheduling the packets for forwarding at a data transfer rate that is at most the container limit value; and allocating available network bandwidth to the container according to the container shares value.
5. The method of claim 1, wherein, prior to receiving the traffic flow, the method further comprises: receiving a request to allow the container to start; retrieving the QoS policy configured for the container from a management entity or obtaining the QoS policy configured for the container from the request; and in response to determination that the QoS policy can be satisfied with current available network bandwidth, allowing the container to start.
6. The method of claim 5, wherein the method further comprises: in response to determination that the QoS policy cannot be satisfied with current available network bandwidth, determining whether a network bandwidth reallocation is possible to satisfy the QoS policy; and in response to determination that the network bandwidth reallocation is possible, allowing the container to start, but otherwise disallowing the container to start.
7. The method of claim 1, wherein identifying the container comprises: parsing header data of each packet of the traffic flow to identify the container based on tag data in the header data, wherein the tag data is added to the packet by the virtual machine.
8. A non-transitory computer-readable storage medium that includes a set of instructions which, in response to execution by a processor of a computing device, cause the processor to perform a method of providing quality of service (QoS) for a container in a virtualized computing environment, the method comprising: receiving a traffic flow of packets from a virtual machine; identifying a container from which the traffic flow originates based on content of the received traffic flow of packets, wherein the container is supported by the virtual machine; retrieving a QoS policy configured for the identified container, wherein the QoS policy specifies a network bandwidth allocation for the container; and forwarding the received traffic flow of packets according to the QoS policy.
9. The non-transitory computer-readable storage medium of claim 8, wherein the QoS policy specifies the network bandwidth allocation for the container using one or more of the following: a container shares value that specifies a network bandwidth allocation priority given to the container relative to at least one other container; a container limit value that specifies a maximum network bandwidth allocation for the container; and a container reservation value that specifies a minimum bandwidth allocation guaranteed for the container.
10. The non-transitory computer-readable storage medium of claim 9, wherein the network bandwidth allocation for the container is associated with a network resource pool of the virtual machine, the network resource pool being defined by one or more of the following: a virtual machine shares value that specifies a network bandwidth allocation priority given to the virtual machine relative to at least one other virtual machine; a virtual machine limit value that specifies a maximum network bandwidth allocation for the virtual machine, the container limit value not exceeding the virtual machine limit value; and a virtual machine reservation value that specifies a minimum bandwidth allocation guaranteed for the virtual machine, the container reservation value not exceeding the virtual machine reservation value.
11. The non-transitory computer-readable storage medium of claim 8, wherein forwarding the received traffic flow of packets comprises one or more of the following: scheduling the packets for forwarding at a data transfer rate that is at least the container reservation value; scheduling the packets for forwarding at a data transfer rate that is at most the container limit value; and allocating available network bandwidth to the container according to the container shares value.
12. The non-transitory computer-readable storage medium of claim 8, wherein, prior to receiving the traffic flow, the method further comprises: receiving a request to allow the container to start; retrieving the QoS policy configured for the container from a management entity or obtaining the QoS policy configured for the container from the request; and in response to determination that the QoS policy can be satisfied with current available network bandwidth, allowing the container to start.
13. The non-transitory computer-readable storage medium of claim 12, wherein the method further comprises: in response to determination that the QoS policy cannot be satisfied with current available network bandwidth, determining whether a network bandwidth reallocation is possible to satisfy the QoS policy; and in response to determination that the network bandwidth reallocation is possible, allowing the container to start, but otherwise disallowing the container to start.
14. The non-transitory computer-readable storage medium of claim 8, wherein identifying the container comprises: parsing header data of each packet of the traffic flow to identify the container based on tag data in the header data, wherein the tag data is added to the packet by the virtual machine.
15. A computing device configured to provide quality of service (QoS) for a container in a virtualized computing environment, the computing device comprising: a processor; a physical network interface controller (NIC); and a non-transitory computer-readable medium having stored thereon instructions that, when executed by the processor, cause the processor to: receive a traffic flow of packets from a virtual machine; identify a container from which the traffic flow originates based on content of the received traffic flow of packets, wherein the container is supported by the virtual machine; retrieve a QoS policy configured for the identified container, wherein the QoS policy specifies a network bandwidth allocation for the container; and forward, via the physical NIC, the received traffic flow of packets according to the QoS policy.
16. The computing device of claim 15, wherein the QoS policy specifies the network bandwidth allocation for the container using one or more of the following: a container shares value that specifies a network bandwidth allocation priority given to the container relative to at least one other container; a container limit value that specifies a maximum network bandwidth allocation for the container; and a container reservation value that specifies a minimum bandwidth allocation guaranteed for the container.
17. The computing device of claim 16, wherein the network bandwidth allocation for the container is associated with a network resource pool of the virtual machine, the network resource pool being defined by one or more of the following: a virtual machine shares value that specifies a network bandwidth allocation priority given to the virtual machine relative to at least one other virtual machine; a virtual machine limit value that specifies a maximum network bandwidth allocation for the virtual machine, the container limit value not exceeding the virtual machine limit value; and a virtual machine reservation value that specifies a minimum bandwidth allocation guaranteed for the virtual machine, the container reservation value not exceeding the virtual machine reservation value.
18. The computing device of claim 16, wherein instructions for forwarding the received traffic flow of packets cause the processor to perform one or more of the following: schedule the packets for forwarding at a data transfer rate that is at least the container reservation value; schedule the packets for forwarding at a data transfer rate that is at most the container limit value; and allocate available network bandwidth to the container according to the container shares value.
19. The computing device of claim 15, wherein the instructions further cause the processor to: prior to receiving the traffic flow, receive a request to allow the container to start; retrieve the QoS policy configured for the container from a management entity or obtaining the QoS policy configured for the container from the request; and in response to determination that the QoS policy can be satisfied with current available network bandwidth, allow the container to start.
20. The computing device of claim 19, wherein the instructions further cause the processor to: in response to determination that the QoS policy cannot be satisfied with current available network bandwidth, determine whether a network bandwidth reallocation is possible to satisfy the QoS policy; and in response to determination that the network bandwidth reallocation is possible, allow the container to start, but otherwise disallow the container to start.
21. The computing device of claim 15, wherein instructions for identifying the container cause the processor to: parse header data of each packet of the traffic flow to identify the container based on tag data in the header data, wherein the tag data is added to the packet by the virtual machine.
Benefit is claimed under 35 U.S.C. 119(a)-(d) to Foreign application Serial No. 3244/CHE/2015 filed in India entitled "PROVIDING QUALITY OF SERVICE FOR CONTAINERS IN A VIRTUALIZED COMPUTING ENVIRONMENT", on Jun. 26, 2015, by Nicira, Inc., which is herein incorporated in its entirety by reference for all purposes.
Unless otherwise indicated herein, known approaches described are not admitted to be prior art by inclusion throughout the present disclosure.
Virtualization allows the abstraction and pooling of hardware resources to support virtual machines in a virtualized computing environment. For example, through server virtualization, virtual machines running different operating systems may be supported by the same physical machine (e.g., referred to as a "host"). Each virtual machine is generally provisioned with virtual resources to run an operating system and applications. The virtual resources may include central processing unit (CPU) resources, memory resources, storage resources, network resources, etc. Virtualization software (e.g., hypervisor) running on the physical machine is generally used to maintain a mapping between the virtual resources allocated to each virtual machine and the underlying physical resources of the physical machine.
In practice, since a single physical machine can support tens to hundreds of virtual machines, it can be challenging to manage the sharing of physical resources (e.g., network resources) among different virtual machines, and different applications supported by each virtual machine.
FIG. 9 is a schematic diagram of an example virtualized computing environment with a distributed virtual switch.
In the following detailed description, reference is made to the accompanying drawings, which form a part hereof. In the drawings, similar symbols typically identify similar components, unless context dictates otherwise. The illustrative embodiments described in the detailed description, drawings, and claims are not meant to be limiting. Other embodiments may be utilized, and other changes may be made, without departing from the spirit or scope of the subject matter presented here. It will be readily understood that the aspects of the present disclosure, as generally described herein, and illustrated in the drawings, can be arranged, substituted, combined, and designed in a wide variety of different configurations, all of which are explicitly contemplated herein.
The challenges in managing the sharing of physical resources, and particularly network resources, in a virtualized computing environment will now be further explained using FIG. 1, which is a schematic diagram illustrating example virtualized computing environment 100. Although an example is shown, it should be understood that virtualized computing environment 100 may include additional or alternative components, and each component may have a different configuration depending on the desired implementation.
Virtualized computing environment 100 includes hosts 110 (also known as "computing devices", "host computers", "host devices", "physical servers", "server systems", etc.) that are connected to management entity 160 and user device(s) 170 via physical network 150. Each host 110 includes virtualization software (e.g., hypervisor 111) and suitable hardware 112 to support virtual machines, such as "VM1" 120 and "VM2" 121. Although one host 110 and two virtual machines 120, 121 are shown for simplicity, there may be multiple hosts 110, each supporting tens or hundreds of virtual machines in practice.
Hypervisor 111 maintains a mapping between underlying hardware 112 of host 110 and virtual resources allocated to virtual machines "VM1" 120 and "VM2" 121. For example, hardware 112 includes components such as physical network interface controller (NIC) 114 to provide access to physical network 150; Central Processing Unit (CPU) 116, memory 118 (e.g., random access memory) and storage disk 119 (e.g., solid state drive, hard disk drive), etc. Although one is shown for simplicity, host 110 may include any suitable number of physical NIC 114 (also known as physical network adapters).
Virtual machines 120, 121 each represent a software implementation of a physical machine. Virtual resources are allocated to virtual machines 120, 121 to support respective guest operating systems 122, 123 and applications (e.g., containers that will be explained below), etc. For example, corresponding to hardware 112, the virtual resources may include virtual CPU, virtual memory, virtual disk, virtual network interface controller (vNIC), etc. Hardware resources may be emulated using virtual machine monitors (VMMs) implemented by hypervisor 111. For example, VMM 124 is to emulate vNIC 126 to provide network access for "VM1" 120 and similarly, VMM 125 to emulate vNIC 127 for "VM2" 121. In practice, VMMs 124, 125 may be considered as components that are part of "VM1" 120 and "VM2" 121 or alternatively, separated from "VM1" 120 and "VM2" 121. In both cases. VMMs 124, 125 maintain the state of respective vNICs 126, 127. When virtual machines 120, 121 are migrated, data relating to the state is also migrated.
Hypervisor 111 further implements virtual switch 130 to handle traffic forwarding from and to "VM1" 120 and "VM2" 121. For example, virtual switch 130 may include any suitable network module 132 to handle egress traffic (may also be referred to as "outgoing traffic") and ingress traffic (may also be referred as "incoming traffic"). The egress traffic is received by virtual switch 130 from "VM1" 120 via vNIC 126 or "VM2" 121 via vNIC 127 for forwarding to physical network 150 via physical NIC 114. The ingress traffic is received by virtual switch 130 from physical network 150 via physical NIC 114 for forwarding to "VM1" via vNIC 126 or "VM2" 121 via vNIC 127. As used herein, the term "traffic" may refer generally to a group of bits that can be transported together from a source to a destination, such as in the form of "packets", "frames", "messages", "datagrams", etc. Physical network 150 may be any suitable network, such as wide area network, virtual private network, etc.
Management entity 160 provides management functionalities to manage various components in virtualized computing environment 100, such as hosts 110, virtual machines "VM1" 120, "VM2" 121, etc. In practice, management entity 160 may be implemented by one or more virtual or physical entities. Users (e.g., network administrators) operating user devices 170 may access the functionalities of management entity 160 via any suitable interface (e.g., graphical user interface, command-line interface, etc.) and/or Application Programming Interface (API) calls via physical network 150. For example, Representational State Transfer (REST) API may be used to create, modify or delete objects defined by API module 162 using HyperText Transfer Protocol (HTTP) requests. User device 170 may be any suitable computing device, such as user workstation, client device, mobile device, etc.
In virtualized computing environment 100, container technologies may be used to run various containers inside virtual machines 120, 121. As used herein, the term "container" (also known as "container instance") is used generally to describe an application that is encapsulated with all its dependencies (e.g., binaries, libraries, etc.). For example, containers "C1" 141, "C2" 142 and "C3" 143 are executed as isolated processes on guest OS 122 inside "VM1" 120. Similarly, "C4" "C5" 145 and "C6" 146 are executed as isolated processes on guest OS 123 inside "VM2" 121. Any suitable networking drivers may also be installed on "VM1" 120 and "VM2" 121 (e.g., vmxnet, vmxnet3, etc.) to interface with the containers.
Containers "C1" to "C6" may be implemented using any suitable container technology, such as Docker (www.docker.com), Linux (http://linuxcontainers.org), etc. Unlike conventional virtual machines that have one OS per virtual machine, containers "C1" to "C6" are "OS-less", meaning that they do not include any OS that could weigh 10s of Gigabytes (GB). This makes containers "C1" to "C6" more lightweight, portable, efficient and suitable for delivery into an isolated OS environment. Running containers inside a virtual machine (known as "containers-on-virtual-machine" approach) not only leverages the benefits of container technologies but also that of virtualization technologies.
However, the use of container technologies presents a new problem in virtualized computing environment 100. Conventionally, it is not possible to differentiate traffic originating from different containers supported by the same virtual machine, or containers supported by different virtual machines. For example in FIG. 1, containers "C1", "C2" and "C3" are all supported by "VM1" and sends packets via vNIC 126, virtual switch 130 and physical NIC 114. Although containers "C1", "C2" and "C3" are run as isolated processes at "VM1", packets from these containers would appear to virtual switch 130 to have originated from "VM1". The same problem may be observed for containers "C4", "C5" and "C6" that run inside "VM2" and share access to vNIC 127.
As such, in existing systems, it is impossible for host 110 to manage the individual network bandwidth usage of different containers running inside virtual machines. This is undesirable because some containers may be starved of network bandwidth while others dominate.
According to examples of the present disclosure, Quality of Service (QoS) may be provided to containers (e.g., "C1" to "C6") in virtualized computing environment 100. For example, to provide QoS for "C1" running inside "VW1" in FIG. 1, a QoS policy may be configured for "C1". When a traffic flow of packets is received from "VM1", "C1" may be identified based on content in the packets and forwarded according to the QoS policy. This "container-aware" approach supports QoS policy configuration and traffic flow differentiation to partition network bandwidth among different containers from the same virtual machine or different virtual machines.
As used herein, QoS is a term of art that is well understood by those in the field of network bandwidth management. It may include concepts such as bandwidth reservations, weighted shares, and limits imposed on individual network bandwidth consumers (e.g., containers, virtual machines), etc. U.S. Pat. No. 9,019,826 issued to Jean-Pascal Billaud, et al., is fully incorporated by reference herein to explain possible features and certain implementation details of an example QoS management component.
In more detail, FIG. 2 is a flow chart of an example process 200 to provide QoS for containers in virtualized computing environment 100. Example process 200 may include one or more operations, functions, or actions illustrated by one or more blocks, such as blocks 210 to 240. The various blocks may be combined into fewer blocks, divided into additional blocks, and/or eliminated based upon the desired implementation.
In practice, example process 200 may be implemented using any suitable computing device. In one example, example process 200 may be implemented by host 110, such as using hypervisor 111 that implements virtual switch 130 and network module 132, etc. Depending on the desired implementation, hypervisor 111 may implement example process 200 by interacting with management entity 160 (e.g., with network management module 164 and container QoS policies 166).
At 210 and 220 in FIG. 2, when a traffic flow of packets is received from a virtual machine (e.g., "VM1"), a container (e.g., "C1") supported by the virtual machine (e.g., "VM1") from which the traffic flow originates is identified. The container (e.g., "C1") may be identified based on content of the received traffic flow of packets.
As will be described using FIG. 5, FIG. 6 and FIG. 7, traffic flow differentiation may be implemented based on tag data added to packets originating from the container (e.g., "C1"). For example in FIG. 1, when "C1" sends a traffic flow of packets (see 180), "VM1" may add tag data to the header data of each packet to generate tagged traffic flow (see 182). Different tag data may be used for different containers, such as "TAG1" for "C1", "TAG2" for "C2", "TAG4" for "C4", and so on. The tag data may be added using any suitable approach.
In one example, a guest agent (not shown for simplicity) that hooks onto a network stack of guest OS 122 may be used to add the tag data. The guest agent may be installed on guest OS 122 as part of a suite of utilities (e.g., known as "VM tools") for enhancing the performance of virtual machine 120, 121. In another example, container (e.g., "C1") add the tag data to its packets, in which case traffic flow 182 in FIG. 1 also represents a tagged traffic flow.
At 230 and 240 in FIG. 2, a QoS policy configured for the identified container (e.g., "C1") is retrieved and the received traffic flow forwarded according to the QoS policy. Here, the term "retrieved" is used to include hypervisor 111 retrieving the QoS policy from local storage on host 110, or from management entity 160 (e.g., via network management module 164 if the QoS policy is not available locally). The QoS policy configured for the container (e.g., "C1") may specify a network bandwidth allocation for the container, such as based on a network resource pool associated with the virtual machine (e.g., "VM1") supporting the container.
As used herein, the term "network resource pool" is used to refer generally to a set of network resources (e.g., network bandwidth) allocated to the virtual machine (e.g., "VM1"). Example QoS policies will be explained in more detail using FIG. 3 and FIG. 4. In practice, QoS policies may be configured using any suitable approach, such as by a user (e.g., network administrator) who interacts with management entity 160 using user device 170, programmatically using a script, etc. As will be described further using FIG. 5 and FIG. 6, another approach is to automatically configure the QoS policies as containers are started. Using QoS policies, prioritization may be enforced to reduce the likelihood of a traffic flow from one container dominating over that of others.
Since container traffic may be one of the most common traffic types in the future, example process 200 facilitates seamless network bandwidth management when container technology is used in virtualized computing environment 100. In particular, using example process 200, host 110 is able to support container traffic isolation and container QoS provisioning. Example process 200 may be performed to differentiate traffic flows from containers (e.g., "C1" to "C3") supported by the same virtual machine (e.g., "VM1") or from containers (e.g., "C1" to "C6") supported by different virtual machines (e.g., "VM1" and "VM2").
In the following, various examples will be discussed with reference to FIG. 3 to FIG. 9. In particular, example QoS policies will be explained using FIG. 3 and FIG. 4, example processes for starting a container using FIG. 5 and FIG. 6, example process for traffic forwarding using FIG. 7 and FIG. 8, and example implementation in a distributed virtual switch using FIG. 9.
FIG. 3 illustrates example table 300 of QoS policies 311-316 configured for containers in example virtualized computing environment 100 in FIG. 1. FIG. 3 will be explained with reference to FIG. 4, which is a schematic diagram illustrating subdivisions of network resource pools according to example QoS policies 311-316 in FIG. 3. In the following examples, containers "C1" to "C6" are configured with respective QoS policies 311-316. It should be understood, however, that it is not always necessary for each and every container to be configured with a QoS policy. For example, container "C6" may not require any QoS policy if it is merely implementing an application that runs as a background task or it does not require network access.
Referring to the columns of table 300, each container is associated with container name (see "CON1" to "CON8" at 317); container identifier (ID) such as a 64 hexadecimal digit string (see "C1" to "C8" at 318); Internet Protocol (IP) address to communicate with the outside world (see 320); container share, limit and reservation values (see 322, 324, 326); container tag data (see 328) and data relating to a network resource pool of associated virtual machine (see 330, 332, 334, 336). QoS policies 311, 312, 313 are configured to specify respective network bandwidth allocations for "C1", "C2" and "C3" sharing the network resource pool of "VM1", and QoS policies 314, 315, 316 to specify respective network bandwidth allocations for "C4", "C5" "C6" sharing the network resource pool of "VM2". QoS policies 311-316 may be retrieved based on container name 317, container ID 318, container tag data 328, etc.
The network resource pool of a virtual machine (see 330) may be defined using one or more of the following: (1) virtual machine shares value=S.sub.v that specifies a network bandwidth allocation priority given to a virtual machine relative to at least one other virtual machine (see 332); (2) virtual machine limit value=L.sub.v that specifies a maximum network bandwidth allocation for the virtual machine (see 334); and (3) virtual machine reservation value=R.sub.v that specifies a minimum network bandwidth allocation guaranteed for the virtual machine (see 336). Virtual machine limit and resented values may be expressed in data transfer rate, such as Megabits per second (Mbps).
The QoS policy configured for each container may be defined using one or more of the following: (1) container shares value=S.sub.c that specifies a network bandwidth allocation priority given to the container relative to at least one other container sharing a virtual machine's network resource pool (see 322); (2) container limit value=L.sub.c that specifies a maximum network bandwidth allocation for the container (see 324); and (3) container reservation value=R.sub.c that specifies a minimum network bandwidth allocation guaranteed for the container (see 326). The container limit value cannot exceed the virtual machine limit value (i.e., L.sub.c.ltoreq.L.sub.v) and container reservation value cannot exceed the virtual machine reservation value (i.e., R.sub.c.ltoreq.R.sub.v). Container limit and reserved values may be expressed in data transfer rate, such as Mbps.
As used herein, the term "shares" or "shares value" is used generally to describe the relative importance or priority of a traffic flow compared to at least one other traffic flow. Shares may be specified in absolute units with a value ranging from 1 to 100 to provide a greater flexibility for unused network bandwidth redistribution. For example in FIG. 3 (see 332), "VM1" with shares=100 is given a higher priority than "VM2" with shares=50. This means that if there is spare bandwidth of 600 Megabits per second (Mbps) during periods of network resource contention, "VM1" may be allocated with up to 400 Mbps (i.e., 100/150=67%) and "VM2" with 200 Mbps (i.e., 50/150=33%) provided respective virtual machine limit values (see 334) are not exceeded. See corresponding representations 410 for "VM1" and 420 for "VM2" in FIG. 4.
For the containers, QoS policy 311 is configured to allocate "C1" with shares=50; QoS policy 312 to allocate "C2" with shares=20; and QoS policy 313 to allocate "C3" with shares=10. In this case, "C1" with shares=50 is given a higher network bandwidth allocation priority over "C2" with shares=20 and "C3" with shares=10 (i.e., lowest priority in this example). During periods of network resource contention, "C1" may be allocated with up to 63% (i.e., 50/80), "C2" 25% (i.e., 20/80) and "C3" 13% (i.e., 10/80) of the network bandwidth available for "VM1", provided respective container limit values (see 324) are not exceeded. See corresponding representations 432 for "C1", 434 for "C2" and 436 for "C3" in FIG. 4.
Similarly, QoS policy 314 is configured to allocate "C4" with shares=80; QoS policy 315 to allocate "C5" with shares=100; and QoS policy 316 to allocate "C6" with shares=20. In this case, "C5" with shares=100 will be given a higher network bandwidth allocation priority over "C4" with shares=80 and "C6" with shares=20 (i.e., lowest priority in this example). During periods of network resource contention, "C4" may be allocated with up to 40% (i.e., 80/200), "C5" 50% (i.e., 100/200) and "C6" 10% (i.e., 20/300) of the network bandwidth available for "VM2", provided the respective container limit values (see 324) are not exceeded. See corresponding representations 444 for "C4", 442 for "C5" and 446 for "C6" in FIG. 4.
The term "limit" or "limit value" is used to generally describe a maximum network bandwidth allocation (e.g., maximum permitted data transfer rate). In the example in FIG. 3 (see 334), "VM1" has a higher limit=2000 Mbps compared to 1500 Mbps for "VM2". For containers supported by "VM1", QoS policy 312 allocates "C2" with limit=800 Mbps, which is higher than limit=500 Mbps allocated to "C1" (see 311) and limit=100 Mbps allocated to "C3" (see 313). Similarly for "VM2". QoS policy 314 allocates "C4" with limit=600 Mbps, which is lower than limit=800 Mbps allocated to "C5" (see 315) and "C6" (see 316).
In practice, the virtual machine limit value=L.sub.v (e.g., 2000 Mbps for "VM1") cannot be less than the virtual machine reservation value=R.sub.v. (e.g., 1000 Mbps for "VM1"). Similarly, the container limit value=L.sub.c (e.g., 500 Mbps for "C1") cannot be less than the container reservation value=R.sub.c (e.g., 120 Mbps for "C1"). If the limit is exceeded, packets can be dropped, even if there is bandwidth available at physical NIC 114. Since limit values 324, 334 are hard boundaries, "C1" is allowed to transmit up to 500 Mbps even when "C2" and "03" are not transmitting. Similarly, "VM1" is only allowed up to 2000 Mbps even when "VM2" is not transmitting.
The term "reservation" or "reservation value" is used to generally describe a guaranteed minimum network bandwidth allocation. Reservation, for example, is useful for time-sensitive traffic flow (e.g., voice, video, etc.) that requires a minimum data transfer rate. For containers supported by "VM1" with reservation=1000 Mbps, "C1" is allocated with reservation=120 Mbps (see QoS policy 311), "C2" with reservation=100 Mbps (see QoS policy 312) and "C3" with reservation=30 Mbps (see QoS policy 313). Similarly for "VM2" with reservation=500 Mbps, "C4" is allocated with reservation=20 Mbps (see QoS policy 314), "C5" with reservation=100 Mbps (see QoS policy 315) and "C6" with reservation=20 Mbps (see QoS policy 316). The sum of all container reservation values (e.g., 250 Mbps in total for "C1", "C2" and "C3") for containers running inside the same virtual machine (e.g., "VM1") cannot exceed the corresponding virtual machine reservation value (e.g., 1000 Mbps for "VM1").
As explained using FIG. 1, QoS policies 311-316 in FIG. 3 may be configured by a user (e.g., network administrator) operating user device 170 by interacting with management entity 160 via physical network 150. For example, QoS policies 311-316 may be configured using an interface (e.g., graphical user interface, command-line interface, etc.) and/or Application Programming Interface (API) calls supported by management entity 160, such as using API module 162 and network management module 164.
Another approach is to configure QoS policies 311-316 as corresponding containers "C1" to "C6" are started. Using example "C1" as an example, command line "Docker run -name=CON1 -network-shares=50 -network-limit=500 -network-reservation=120 -cpu-shares=20 -memory=256 ubuntu /bin/sh" may be used to run and allocate a new container with name="CON1", shares=50, limit=500 Mbps, reservation=120 Mbps, CPU shares=20 and memory=256 MB. In this case, the shares, limit and reservation values provided may be used to configure QoS policy 311, which will be added to table 300 when "C1" is started. In practice, guest tools running on corresponding "VM1" may provide the values to management entity 160 via hypervisor 111. In another example, QoS policies 311-316 in FIG. 3 may be configured programmatically, such as using a script, etc. QoS policies 311-316 may be stored in any suitable storage device accessible by management entity 160 (e.g., Container QoS policies 166) and/or host 110 to facilitate traffic forwarding when containers are running.
In practice, "VM1" and "VM2" may share an even larger network resource pool reserved for virtual machine traffic (which includes container traffic). For example, there may be other types of traffic in virtualized computing environment 100, such as traffic relating to network file system (NFS), virtual machine migration, fault tolerance (FT), Internet small computer system interface (iSCSI), management functionality, etc. Similar shares, limit and reservation values may be defined for other traffic types.
In the example in FIG. 1, containers "C1" to "C6" may be running (i.e., started) or exited (i.e., stopped) in virtualized computing environment 100. For example, when "C1" is running, it is run as an isolated process or namespace independent of other processes on "VM1" and host 110. When "C1" is exited, data relating to its operation (e.g., file system, exit value, etc.) is preserved. Depending on the desired implementation in practice, "C1" to "C6" may be started (to run), stopped or restarted (to run again).
According to examples of the present disclosure, an admission control process may be performed to govern whether containers can be started. For example, before "C1" is allowed to start running, the current available network bandwidth is assessed to ensure that QoS policy 311 configured for "C1" can be satisfied. The current available bandwidth may depend on a number of factors, such as the bandwidth of physical NIC 114, network congestion, packet size, packet loss, etc. Two example implementations will be described below using FIG. 5 (i.e., admission control by hypervisor 111) and FIG. 6 (i.e., admission control by management entity 160).
FIG. 5 is a flow chart of example process 500 for starting a container in virtualized computing environment 100 in FIG. 1 according to a first example implementation. Example process 500 is illustrated using one or more operations, functions, or actions represented by 510 to 590. The various operations, functions, or actions may be combined, divided, and/or eliminated based upon the desired implementation. Example process 500 may be implemented by virtual machine 120, 121 (e.g., using guest agent or "VM tools" on guest OS 122, 123), hypervisor 111 (e.g., using network module 132 at virtual switch 130) and management entity 160 (e.g., using network management module 164 having access to container QoS policies 166). For simplicity, "C1" and "VM1" will be used as example container and virtual machine in the following.
At 510 in FIG. 5, upon detecting that "C1" is starting, "VM1" sends a request via vNIC 126 to hypervisor 111 to allow container to start running. For example, the request may include a container name (e.g., "CON1"), container ID, tag data (e.g., "TAG1") or any other suitable data for identifying "C1". The request may further include the amount of network bandwidth (e.g., shares=50, limit=500 Mbps, reservation=120 Mbps) requested by "C1" to start running.
At 520 and 525 in FIG. 5, hypervisor 111 receives the request from "VM1" and retrieves QoS policy 311 configured for "C1". In one example, the retrieval may include sending the request to management entity 160. At 530 and 532 in FIG. 5, management entity 160 receives the request from hypervisor 111, and determines whether there is any QoS policy configured for "C1" in table 300/166. If yes, at 534 in FIG. 5, management entity 160 retrieves and sends QoS policy 311 configured for "C1" to hypervisor 111 via physical network 150. At 535, hypervisor 111 receives QoS policy 311 from management entity 160.
Otherwise, at 536 in FIG. 5, management entity 160 creates a new entry in table 300/166 to add QoS policy 311 based on the received request. At 537 in FIG. 5, hypervisor 111 is also notified to rely on the container shares, limit and reservation values for "C1" that are specified in the request. In other words, if there is an existing QoS policy for "C1", the existing policy retrieved from management entity 160 will be used. Otherwise (e.g., when "C1" is started for a first time), if there is no existing QoS policy for "C1", the QoS policy is obtained from the request. This facilitates automatic configuration of QoS policies 311-316 as containers are started.
At 540 in FIG. 5, hypervisor 111 determines whether QoS policy 311 can be satisfied with current available network bandwidth in the network resource pool of "VM1". As explained using FIG. 3, QoS policy 311 specifies shares=50, limit=500 Mbps and reservation=120 Mbps for "C1", which depend on shares=100, limit=2000 Mbps and reservation=1000 Mbps for "VM1". Hypervisor 111 may calculate the network bandwidth available for "VM1" and determine whether QoS policy 311 can be satisfied. For example, if "VM1" has only used up 50% of its reservation=1000 Mbps, the remaining network bandwidth of 500 Mbps may be used to guarantee reservation=120 Mbps for "C1".
At 550 in FIG. 5, in response to determination that QoS policy 311 cannot be satisfied at 540, hypervisor 111 determines whether a network bandwidth reallocation is possible to satisfy QoS policy 311. For example, if there is unused network bandwidth from the network resource pool of "VM2" or "VM3", a portion of the unused network bandwidth may be (e.g., temporarily) reallocated to "VM1" and therefore "C1". Additionally or alternatively, a virtual machine may be migrated to another host or a container stopped to release some network bandwidth to support "C1". For example, another virtual machine (e.g., "VM2") may be migrated or "VM1" itself may be migrated to another host with sufficient network bandwidth to support "C1".
At 560 and 570 in FIG. 5, in response to determination that QoS policy 311 cannot be satisfied, hypervisor 111 instructs "VM1" to disallow "C1" to start running. Otherwise, at 580 and 590 in FIG. 5 (i.e., QoS policy 311 can be satisfied), hypervisor 111 instructs "VM1" to allow "C1" to start running. Once "C1" starts running, the shares value, limit value and reservation value defined by QoS policy 311 will be enforced for any traffic flow to and from "C1".
Although example process 500 shows hypervisor 111 allowing or disallowing "C1" to start running, an alternative implementation may involve management entity 160 making admission control decisions. In more detail, FIG. 6 is a flow chart of example process 600 for starting a container in example virtualized computing environment 100 in FIG. 1 according to a second example implementation. Example process 600 is illustrated using one or more operations, functions, or actions represented by 610 to 675. The various operations, functions, or actions may be combined, divided, and/or eliminated based upon the desired implementation.
Similar to FIG. 5, example process 600 may be implemented by virtual machine 120, 121 (e.g., using guest agent or "VM tools" on guest OS 122, 123), hypervisor 111 (e.g., using network module 132 at virtual switch 130) and management entity 160 (e.g., using network management module 164 having access to container QoS policies 166). Again, for simplicity, "C1" and "VM1" will be used as example container and virtual machine in the following.
At 610 in FIG. 6 (related to 510 in FIG. 5), upon detecting that container "C1" is starting, "VM1" sends a request via vNIC 126 to hypervisor 111 to allow "C1" to start running. The request may include a container ID, tag data (e.g., "TAG1") or any other suitable data for identifying "C1". The request may further include shares=50, limit=500 Mbps, reservation=120 Mbps requested by "C1" to start running. At 620 and 625 in FIG. 6 (related to 520 in FIG. 5), hypervisor 111 receives the request and sends it to management entity 160.
At 630 (related to 530 in FIG. 5), upon receiving the request from hypervisor 111, management entity 160 determines whether a QoS policy has been previously configured for "C1". If yes, at 634 in FIG. 6, management entity 160 retrieves QoS policy 311 configured for "C1" from table 300/166, such as based on the container ID and container name in the request. Otherwise, at 636 in FIG. 6, management entity 160 creates a new entry in table 300/166 to add QoS policy 311 that includes the container shares, limit and reservation values requested by "C1".
At 640 in FIG. 6 (related to 540 in FIG. 5), management entity 160 determines whether QoS policy 311 can be satisfied. The determination may be based on whether the current available network bandwidth in the network resource pool of "VM1" can be used to support shares=50, limit=500 Mbps and reservation=120 Mbps defined in QoS policy 311 configured for "C1".
At 645 in FIG. 6 (related to 550 in FIG. 5), in response to determination that QoS policy 311 cannot be satisfied, hypervisor 111 determines whether a network bandwidth reallocation is possible to satisfy QoS policy 311. Similar to 550 in FIG. 5, the reallocation may involve "borrowing" spare network bandwidth from another resource pool, or releasing network bandwidth by migrating virtual machine(s), stopping container(s), etc. For example, another virtual machine (e.g., "VM2") may be migrated or "VM1" itself may be migrated to another host with sufficient network bandwidth to support "C1".
At 650, 655 and 660 in FIG. 6 (related to 560 and 570 in FIG. 5), in response to determination that QoS policy 311 cannot be satisfied, management entity 160 instructs hypervisor 111 to disallow "C1" to start running, in which case hypervisor 111 also instructs "VM1" the same. Otherwise, at 665, 670 and 675 in FIG. 6 (related to 580 and 590 in FIG. 5), management entity 160 instructs hypervisor 111 to allow "C1" to start running, in which case hypervisor 111 also instructs "VM1" the same.
FIG. 7 is a flow chart of example process 700 for forwarding a traffic flow of a container according to a QoS policy in example virtualized computing environment 100 in FIG. 1. Example process 700 is illustrated using one or more operations, functions, or actions represented by 710 to 770. The various operations, functions, or actions may be combined, divided, and/or eliminated based upon the desired implementation.
Similar to the examples in FIG. 5 and FIG. 6, example process 700 may be implemented by virtual machine 120, 121 (e.g., using guest agent or "VM tools" on guest OS 122, 123), hypervisor 111 (e.g., using network module 132 at virtual switch 130) and management entity 160 (e.g., using network management module 164 having access to container QoS policies 166). Again, for simplicity, "C1" and "VM1" will be used as example container and virtual machine in the following.
At 710 and 720 in FIG. 7, upon detecting a traffic flow of packets from "C1", "VM1" tags the traffic flow with any suitable data identifying "C1". The traffic flow from "C1" represents an egress traffic flow (may also be referred to as "outgoing packets") from "C1" to a destination accessible via physical network 150. In practice, the traffic flow may be detected and tagged by "VM1" using a guest agent that hooks onto the network stack of guest OS 122. As described using FIG. 3, "VM1" is aware of, or has access to, the mapping between container ID (see 318 in FIG. 3), container IP address (see 320 in FIG. 3) and tag data (see 328 in FIG. 3).
In response to detecting packets having a source IP address that matches with the IP address=172.17.42.1 associated with "C1", "VM1" generates a tagged traffic flow by modifying the packets to include tag data "TAG1". At 730 in FIG. 7, "VM1" forwards the tagged traffic flow via vNIC 126 to hypervisor 111 for forwarding to physical network 150 via virtual switch 130 and physical NIC 114. See also traffic flow 180 and tagged traffic flow 182 in FIG. 1.
In one example, the tagging process at 720 may involve modifying header data in each packet to include "TAG1" associated with "C1". FIG. 8 illustrates example packet 800 tagged with data identifying a container for forwarding according to example process 700 in FIG. 7. In this example, example packet 800 is a Transport Control Protocol/Internet Protocol (TCP/IP) packet, but any other suitable protocol may be used. In practice, example packet 800 may include alternative or additional fields based upon the desired implementation.
Example packet 800 includes suitable header data, such as source port 810, destination port 815, sequence number 820, acknowledgement number 825, data offset 830, reserved field 835, various flags 840, window size 850, checksum 855, urgent pointer 860, and options 865. Payload information 870 follows the header information. According to 720 in FIG. 7, options field 865 may be modified to include tag data 870 (e.g., TAG 1) such that hypervisor 111 is able to identify "C1".
It may be possible for hypervisor 111 to identify "C1" based on the source IP address of the traffic flow. However, it is not always reliable to rely on the source IP address to identify "C1", especially if the IP address is volatile and susceptible to frequent changes. In this case, it may be inefficient to update table of QoS policies 348 every time the IP address changes and as such, the tagging process 720 at FIG. 7 may be implemented.
At 740, 750 and 760 in FIG. 7, in response to receiving the traffic flow from "VM1", hypervisor 111 identifies "C1" from which the traffic flow originates and retrieves QoS policy 311 configured for "C1". For example, hypervisor 111 may parse the header data of the received traffic flow to examine tag data 870 in options field 865 (see FIG. 8). Hypervisor 111 identifies "C1" as the source container if tag data 870 matches with "TAG1".
The retrieval at 760 in FIG. 7 may include hypervisor 111 retrieving QoS policy 311 from local storage, or from management entity 765 (shown in dotted box) if QoS policy 311 is not available at host 110. In the latter case at 765, network management module 164 at management entity 160 may retrieve QoS policy 311 based on tag data "TAG1" or container ID associated with "C1" and send retrieved QoS policy 311 to hypervisor 111 via physical network 150.
At 770 in FIG. 7, hypervisor 111 forwards the traffic flow of packets from "C1" according to QoS policy 311 configured for "C1". In practice, network module 132 at virtual switch 130 may implement a packet scheduler to schedule the packets for forwarding at a data transfer rate that is at least reservation=120 Mbps but at most limit=500 Mbps. Packet scheduler may also allocate available network bandwidth according to shares=50 while satisfying reservation=120 Mbps and limit=500 Mbps. For example, a dedicated software queue may be maintained for the traffic flow from each container for this purpose.
Using the examples in FIG. 3 and FIG. 4, if there is unused network bandwidth=1000 Mbps in the network resource pool of "VM1", "C1", "C2" and "C3" will be guaranteed at least 120 Mbps, 100 Mbps and 30 Mbps respectively. The remaining unused network bandwidth of 750 Mbps (i.e., 1000-sum of container reservation values) may be allocated according to respective shares values (i.e., 50/80 or 63% for "C1", 20/80 or 25% for "C2" and 10/80 or 13% for "C3") without exceeding respective limit values (i.e., 500 Mbps for "C1", 800 Mbps for "C2" and 100 Mbps for "C3").
When "C1" is stopped, "VM1" may inform hypervisor 111, which may in turn inform management entity 160 to remove QoS policy 311 configured for "C1". In this case, table 300 may be updated by management entity 160 as containers are started and stopped in virtualized computing environment 100.
Although the examples in FIG. 2 to FIG. 8 are explained with reference to hypervisor 111 implementing virtual switch 130 in FIG. 1, it will be appreciated that a distributed virtual switch (DVS) may also be used. The DVS represents a collection of different virtual switches 130 across different hosts 110. In practice, the DVS may be implemented using any suitable technology, such as vSphere Distributed Switch (developed by VMware, Inc.), etc.
In more detail, FIG. 9 is a schematic diagram of example virtualized computing environment 900 with DVS 910. Although an example is shown, it should be understood that environment 900 and DVS 910 may include additional or alternative components, and each component may have a different configuration, depending on the desired implementation. DVS 910 (see dotted line box) spans across multiple hosts, such as Host-A 110A and Host-B 110B. In the following, reference numerals with a suffix "A" refer to elements relating to Host-A 110A and suffix "B" to Host-B 110B.
Similar to the example in FIG. 1, Host-A 110A executes hypervisor 111A and includes hardware 112A to support virtual machines "VM1" 120A and "VM2" 121A. Hypervisor 111A implements VMM 124A to emulate vNIC 126A associated with "VM1" 120A, as well as VMM 125A to emulate vNIC 127A associated with "VM2" 121A. To support "VM3" 120B, Host-B 110B includes hardware 112B and executes hypervisor 111B to implement VMM 124B that emulates vNIC 126B. Using container technologies, containers "C1" 141A, "C2" 142A and "C3" 143A may run on guest OS 122A inside "VM1" 120A; "C4" 144A, "C5" 145A and "C6" 146A on guest OS 123A inside "VM2" 121A; and "C7" 141B, "C8" 142B and "C9" 143B on guest OS 122B inside "VM3" 120B.
DVS 910 binds virtual switch 130A of Host-A 110A and virtual switch 130B of Host-B 110B into an aggregate virtual switch. Compared to having to manage individual and segregated virtual switches 130A, 130B, DVS 910 is logically configurable to simplify the provisioning and administration of virtual networks connecting virtual machines 120A, 121A, 120B across multiple hosts 110A, 110B. DVS 910, being a software abstraction, may be implemented using any suitable number of components distributed in different hardware. In the example in FIG. 9, components of DVS 910 may be implemented using hypervisor 111A on Host-A 110A and hypervisor 111B on Host-B 110B.
Similar to the examples in FIG. 1, FIG. 2 and FIG. 7, "VM1" 120A may tag traffic flow of packets (see 920) originating from "C1" 141A may be with tag data identifying "C1". The resulting in tagged traffic flow (see 922) is then forwarded to DVS 910 via vNIC 126A. Upon receiving tagged traffic flow 922 from "VM1", DVS 910 may identify "C1" based on the tag data, and retrieve QoS policy 311 configured for "C1". For example, QoS policy 311 may be retrieved from a local storage, or from management entity 160 (e.g., via network management module 164 with access to QoS policies 166).
Such container traffic flow differentiation allows DVS 910 to forward tagged traffic flow 922 according to QoS policy 311 via physical NIC 114A. Similar to the examples in FIG. 3 and FIG. 4, QoS policy 311 specifies a network bandwidth allocation for "C1", for example based on a network resource pool of "VM1". QoS policy 311 may specify according to least one of: container shares value, container limit value and container reservation value.
Prior to the above traffic forwarding, an admission control process may be performed. In this case, DVS 910 may interact with management entity 160 to determine whether to allow "C1" to start running based on QoS policy 311. Similar to the examples in FIG. 5 and FIG. 6, the determination may be made by DVS 910 or management entity 160. In practice, management entity 160 may implement a Network Input Output Control (NIOC) module and network virtualization manager (NSX manager) to facilitate the examples explained using FIG. 2 to FIG. 8.
Although one DVS 910 is shown for simplicity, multiple DVSs may be configured to form multiple virtual networks logically connecting different virtual machines on different hosts. As used herein, the term "virtual network" refers generally to a logical overlay network, and not simply a software implementation of a physical network, which is sometimes the intended meaning of the same term by those in the art. The logical overlay network is a conceptual network that can be arbitrarily defined and distributed in an arbitrary manner over physical resources.
In one example, a "device" (e.g., container, virtual machine, etc.) may reside on a layer-2 logical network that is overlayed on a layer-3 physical network. In such a scenario, a tunnelling protocol (e.g., Virtual eXtensible Local Area Network (VXLAN), Generic Network Virtualization Encapsulation (GENEVE), Network Virtualization using Generic Routing Encapsulation (NVGRE), etc.) may encapsulate Ethernet layer-2 frames in IP (e.g., Media Access Control (MAC) in User Datagram Protocol (UDP) or "MAC-in-UDP" encapsulation) and allow the "device" to participate in a virtualized layer-2 subnet that operates in separate physical layer-3 networks. The term "layer-2" generally refers to a Media Access Control (MAC) layer and "layer-3" to a network layer in the Open System Interconnection (OSI) model.
Although not shown in FIG. 9 for simplicity, DVS 910 may include a logical collection of distributed virtual ports (DV ports) that connect (e.g., logically associated) with respective vNICs 126A, 127A, 126B. A DV port may be understood as a software abstraction that encapsulates the "personality" (including configuration and runtime state, etc.) of a corresponding virtual port of virtual switch 130A, 130B. Unlike a virtual port, a DV port usually persists and migrates with its associated virtual machine. Multiple DV ports may form a DV port group.
The above examples can be implemented by hardware (including hardware logic circuitry), software or firmware or a combination thereof. For example, host 110, 110A, 110B and management entity 160 may be implemented by any suitable computing device, which may include processor and memory that may communicate with each other via a bus, etc. The computing device may include a non-transitory computer-readable medium having stored thereon instructions that, when executed by the processor, cause the processor to perform processes described herein with reference to FIG. 1 to FIG. 8.
The techniques introduced above can be implemented in special-purpose hardwired circuitry, in software and/or firmware in conjunction with programmable circuitry, or in a combination thereof. Special-purpose hardwired circuitry may be in the form of, for example, one or more application-specific integrated circuits (ASICs), programmable logic devices (PLDs), field-programmable gate arrays (FPGAs), and others. The term `processor` is to be interpreted broadly to include a processing unit, ASIC, logic unit, or programmable gate array etc.
The foregoing detailed description has set forth various embodiments of the devices and/or processes via the use of block diagrams, flowcharts, and/or examples. Insofar as such block diagrams, flowcharts, and/or examples contain one or more functions and/or operations, it will be understood by those within the art that each function and/or operation within such block diagrams, flowcharts, or examples can be implemented, individually and/or collectively, by a wide range of hardware, software, firmware, or virtually any combination thereof.
Those skilled in the art will recognize that some aspects of the embodiments disclosed herein, in whole or in part, can be equivalently implemented in integrated circuits, as one or more computer programs running on one or more computers (e.g., as one or more programs running on one or more computer systems), as one or more programs running on one or more processors (e.g., as one or more programs running on one or more microprocessors), as firmware, or as virtually any combination thereof, and that designing the circuitry and/or writing the code for the software and or firmware would be well within the skill of one of skill in the art in light of this disclosure. | 2019-04-26T12:15:10 | http://patents.com/us-20160380909.html |
0.998971 | Which c++ standard should we compile YateBTS with ?
As you might already know, YateBTS trunk does not compile with recent versions of GCC, due to a few errors related to iostream manipulations.
These errors are easy to fix in yate-bts source code (see https://forum.yate.ro/index.php?topic=1966.0).
Though, I was confused why they were not an issue for you, I mean upstream. Which version of GCC do you use ? GCC 4.x, right ?
By default, g++ is equivalent to g++ -std=gnu++14 since GCC 6, and g++ -std=gnu++98 for older releases.
And actually, if I set -std=gnu++98 in the appropriate Makefile, yate-bts compiles just fine.
My concern is that -std=gnu++98 and -std=gnu++14 may be somewhat different languages, and hence, depending on the C++ features and the GNU extensions the yate-bts source code actually use, and combine, building as -std=gnu++98 or -std=gnu++14 may not generate semantically identical object code.
Which makes me think that setting -std=gnu++98 might be a more consistent fix than (just) patching MSInfo.cpp and Sgsn.cpp to remove the compilation errors. Can someone confirm this ?
IMHO, if it's somewhat important to build the source code as 1998 ISO C++ with GNU extensions, it might be a good idea to enforce this through the Makefiles: -std=gnu++14 is the default for Ubuntu since Artful 17.10 (and thus for Bionic 18.04 LTS), for Debian since stretch, and obviously for Arch, which sum to a huge Linux users base. BTW, none of these users would be able to build YateBTS out of the box.
The same question may also apply to C code (should we enforce -std=gnu99 or something else ?).
And may be also when building yate (server) itself: it compiles fine, but should we also enforce standards there ?
I've attached the patches I use to consistently set -std=gnu++98 as C++ standard, and -std=gnu99 as C standard for both yate and yate-bts build files. I'm not sure it's the simplest/best fix, but yate and yate-bts build with GCC 8.2 without the need to otherwise patch the source code.
The diff are against versions 6.1.0-1, and may apply to any 6.x.
May be it still would not hurt to fix MSInfo.cpp and Sgsn.cpp, though ?
Re: Which c++ standard should we compile YateBTS with ?
A very interesting finding! Does it work stable for you after you changed the standard, instead of patches?
Will this patch function with Yate 5,x? I'm working with the BladeRF and was told there are specific versions of Yate, YBTS and BladeRF firmware/FPGA that "play well" together, do you know what versions of BladeRF are compatible with Yate 6.x? | 2019-04-24T08:00:00 | https://forum.yate.ro/index.php?topic=1998.0 |
0.999997 | Prince Harry and Duchess Meghan of Sussex are getting their own "household," to be based at Buckingham Palace.
The long-rumored, much-debated "split" is here: Prince Harry and Duchess Meghan of Sussex are getting their own "household," as they say in royal circles.
Kensington Palace announced Thursday that Harry and Meghan, who is about eight months pregnant, will set up their own office apart from that of Prince William and Duchess Kate of Cambridge, and it will be based at Buckingham Palace instead of Kensington Palace where both couples now live.
"The Queen has agreed to the creation of a new Household for The Duke and Duchess of Sussex, following their marriage in May last year," the palace statement said. "The Household, which will be created with the support of The Queen and The Prince of Wales, will be established in the spring."
Translation: Grandmother Queen Elizabeth II and father Prince Charles will foot the bill for Harry and Meghan's new office and staff.
Harry has had his own private office at Kensington Palace for some time, and it took over handling the former Meghan Markle's public appearances and activities after they announced their engagement in November 2017.
"This long-planned move will ensure that permanent support arrangements for The Duke and Duchess’s work are in place as they start their family and move to their official residence at Frogmore Cottage" on the Windsor Castle estate about 25 miles from London and both palaces.
The queen granted permission for Harry and Meghan, 37, to base their household office at her London base in Buckingham Palace.
Kensington Palace also announced that Harry and Meghan will hire a new communications staff, with Sara Latham named as their chief public spokeswoman. She and their team will be reporting to the queen's communications team and press secretary, Donal McCabe.
Latham served as chief of staff to John Podesta, who served as Hillary Clinton's campaign chairman during the 2016 presidential election. She is a longtime Democratic fixer: Summoned in 1996 to help choreograph Bill Clinton’s reelection campaign and again in 2008 when she helped Podesta sneak President Obama’s cabinet prospects in for secret interviews. Before coming to work for the royals, she was employed by Freuds, a communications and PR firm, according to a press release from the royal communications team.
While this sort of office reorganization is routine for senior royals as they grow up and take on new duties, the rumors about this move circulating in the British media for months have been used as "evidence" of an alleged "feud" festering between the brothers and their wives.
So, too, have the plans by Harry and Meghan to move from a cramped two-bedroom apartment at Kensington Palace to a more spacious and renovated home, Frogmore Cottage.
Harry, 34, and Will, 36, have different responsibilities now and will in the future (Will is the presumed Prince of Wales and future king). Like any pair of brothers, they have different interests that grow more apparent as they grow older.
Harry and Meghan's household, however, had been expected to remain at Kensington, Palace so the news that it will be in Buckingham Palace comes as a surprise.
Meanwhile, the "feud" rumors have been quieting, partly because the royal sisters-in-law have appeared in public together twice in recent weeks and showed no signs of any tension.
In fact, on Monday, Duchess Kate, 37, publicly kissed Duchess Meghan on both cheeks when the two joined the royal family for the annual Commonwealth Day service at Westminster Abbey.
"There has long been reason to doubt the reports of a feud between the two women, though there was indication last fall that Harry and William were experiencing some tensions," reported Vanity Fair's Katie Nicholl, who has followed the story for months. "Now they’re said to be getting along well, and there were no signs of any distance between William and Harry on Monday." | 2019-04-26T13:49:51 | https://www.dailyworld.com/story/life/2019/03/14/prince-harry-meghan-split-office-prince-will-kate-feud-buzz/3164492002/ |
0.999999 | When Dylan played Newport in 1965 he shocked the crowd. Will he do so again when he returns tomorrow?
On Saturday night Bob Dylan returns to the scene of the crime. For the first time since 1965 - when he appalled traditionalists by playing electrified rock'n'roll - he will be appearing at the Newport folk festival.
Having been Grammied, Clintoned and Poped, Dylan has no need of Newport's belated seal of approval. But it is a moment worth pausing over, especially now, with the hard rain headed Iraq's way.
The 16 minutes of music blasted out by Dylan on that summer night 37 years ago were to become, in the words of Dylan's biographer, Clinton Heylin, "the most written-about performance in the history of rock". And not without cause. Dylan's clash with the milieu from which he had emerged was high drama, and more. The moment was culturally, politically and commercially resonant - a fulcrum of the American 60s.
History vindicated Dylan - and in short order. Like a Rolling Stone, booed at Newport, soared up the charts, detonating an explosion of pop music innovation and ambition (as well as pretension). But, unexpectedly, history may also end up vindicating Dylan's Newport opponents. One of those scandalised by the new sound was the folk archivist Alan Lomax, who died two weeks ago. Lomax's collections of American music were the foundations of Dylan's art. But when Dylan turned up the amps, all Lomax heard was a sellout to the forces the festival was supposed to challenge.
The festival had always been intertwined with the civil rights movement, giving northerners a taste of the freedom songs being sung on the frontline, and sending anthems such as Blowin' in the Wind back down south to expand the traditional repertoire. Also on the bill with Dylan that evening was Fannie Lou Hamer, not a singer but a Mississippi militant. Hamer was there because the festival organisers assumed the audience would share a political as well as a musical ethic. Indeed, to them, the two were one.
A tenet of the folk revival was that young people should aspire not merely to consume but to participate - in music, in public life. In contrast to the manufactured sound of teen-targeted pop, folk promised something enduring, authentic and collective. Dylan himself had declared that folk music was "the only true, valid death you can feel today". In that context, as folk veteran Oscar Brand explained, "the electric guitar represented capitalism".
It sounds far-fetched today, but Lomax, as it turned out, had a point. Dylan's boundary-blurring rock'n'roll helped create a new record-buying constituency, a milestone in the construction of today's global music industry. Now dominated by a handful of giant media conglomerates, it is both more centralised and more socially segregated as executives calibrate the music to chime with consumer demographics. As Lomax feared, the demands of authenticity and political independence do indeed clash with those of commerce (ask George Michael).
"You don't need a weatherman to know the way the wind blows" - but these days there is an army of well-paid weathermen advising us. You can walk into any chain bookstore and purchase the Rough Guide to Cult Movies or a pocket precis of the Madchester scene. Since 1965, capitalism's expertise in packaging the dissident and flogging it back to the people from whence it came has become intimidatingly awesome - never more so than when PriceWaterhouse-Cooper adopted The Times They are A-Changin'.
The Newport festival itself is not what it was. Abandoned in 1970 (because of what its official website terms "growing social unrest"), it was revived in the mid-1980s, largely stripped of political aspirations. Today it occupies a cosy niche in the industry. The title sponsor for this year's event is a company mass producing "natural juices" (it is also backed by Borders, the bookselling giant, and ABC television).
What will Dylan play on Saturday night? With Dylan, it's anyone's guess. However, one number featured in recent outings is Masters of War, his 1963 assault on the military-industrial complex. When he performed this in the US after September 11, many in the audience seized on it as an indictment, not of a cabinet stuffed with arms dealers, but of America's enemies in the war on terror. Some fans punctuated the master's rendition with lusty shouts of "Death to Bin Laden".
It is unlikely Dylan will ever tell us why he chose to sing this song at this moment. However, it is worth noting that he plucked out the same song at the 1991 Grammy ceremony during the Gulf war. If there is an all-out war on Iraq in the coming months, no one should be surprised if a new generation finds meaning in the old lyrics: "You fasten the triggers/for others to fire/ then you set back and watch/ when the death count gets higher." Or, more importantly, composes new ones. In doing so, they could study Dylan at Newport in 1965, in all its glorious contradictions, to some advantage. | 2019-04-24T02:44:54 | https://www.theguardian.com/music/2002/aug/02/artsfeatures.popandrock |
0.997669 | I love a slice of panettone at Christmas - dusted liberally with icing sugar and accompanied by a cup of tea it's light enough to be the perfect follow up to a heavy meal.
So when I was invited to an international Christmas meal, I thought panettone would be perfect. Only this being me, I wanted to do a twist on the classic panettone by replacing the raisins and sultanas in a normal panettone with cranberries and orange peel.
I've said it before, I'll say it again: small is cute. And I'm not just saying that because I'm slightly under average height and therefore have a vested interest in extolling the virtues in all things small. It's also a lot easier to serve a panettone if it already comes in individual servings.
If you have a standing mixer or a handheld mixer with a dough hook you will want to use it for this because it's a very moist dough and quite hard to knead by hand. If you are kneading by hand you will need to flour your hands very well to deal with this sticky mixture!
1. Put the flour in a large mixing bowl and add the salt and sugar on one side and the yeast on the other side.
2. Make a well in the middle of the dry ingredients and add the milk, eggs and butter and mix. If you're using the standing mixer, mix on slow speed for 3 minutes before ramping it up to medium for 4 minutes. If you're kneading by hand, beat in the wet ingredients with a wooden spoon until a dough starts to form and then get your hands involved. Tip the dough into a bowl and cover with clingfilm then leave to rise until doubled in size, about an hour.
3. When the dough has risen, knock it back by pushing down with your knuckles and knead in the orange juice, orange zest, candied peel, cranberries and flaked almonds.
4. Cut out 24 squares of greaseproof paper about 8cm by 8cm and lay one across each of the holes in the muffin tray, then lay another on top at an angle to the first. Divide the dough into 12 portions and put one in each of the muffin holes. Wrap in clingfilm or tie inside a large bag and leave to rise for about 2-3 hours until doubled in size.
5. While the panettones are proving, preheat the oven to 200C. When they have risen, bake for 20 minutes. Meanwhile, mix the egg whites, caster sugar and ground almonds for the topping together. Take the panettones out the oven, brush the topping across them and sprinkle with the flaked almonds and a little more caster sugar. Lower the oven setting to 180C and cover the panettones with foil if you think they are browning a little too much and bake for another 10 to 20 minutes.
6. When the panettones are golden brown, remove from the oven and leave to cool.
They don't resemble the traditional panettone, but I think they're lovely. And there's something about the greaseproof paper wrapping which is quite nice - simple but elegant. | 2019-04-26T09:49:48 | http://thebegrudgingbaker.blogspot.com/2014/12/mini-cranberry-and-orange-panettones.html |
0.997975 | Choose which types of sequences you want to include in the questions (Linear, Quadratic, Cubic or Geometric).
Decide if you want a negative first coefficient (for linear that means descending sequences, quadratic and cubic means a<0 and for geometric it means the sequence will oscilate).
Choose the type of question you would like to appear.
If you want simple examples, then it will either have a constant or a single coefficient.
Finally choose how big you want the coefficients to be. | 2019-04-20T20:43:30 | https://www.interactive-maths.com/sequences-qqi-worksheets.html |
0.994432 | Here are two rules to follow when using defining adjective clauses.
There are some simple rules which can help you to make good defining adjective clauses and avoid mistakes.
1. Never use commas with a defining adjective clauses.
Right: I like people who are on time.
Wrong: I like people, who are on time.
A relative pronoun is a word which signals the beginning of an adjective clause. If the adjective clause describes a person, we can use 'who' or 'that'.
The family who live next door to us bought a new car.
The family that live next door to us bought a new car.
If the adjective clause describes a thing, we can use 'which' or 'that'.
The car that they bought was red.
The car which they bought was red.
If the adjective clause shows some kind of possession or who something belongs to, then we use 'whose'.
We threw away the chairs whose legs were broken.
She's the girl whose boyfriend was in an accident.
Please notice we can use 'whose' for people or things.
We can use the relative pronoun 'where' for places sometimes.
Do you know a place where I can buy an interesting birthday card?
The shirt that she gave me was too big.
The shirt she gave me was too big.
In the first example, please notice the defining adjective clause is 'that she gave me'. In the second example, notice how it's possible to drop the relative pronoun because it's not the subject of the verb in the clause. (The subject of the verb in the clause is 'she'.) Both examples are good English — you can use either one.
Right: The police arrested the guy who hit my car.
Wrong: The police arrested the guy hit my car.
The second example is bad English because “who” is the subject of “hit”. The verb in the adjective clause needs a subject, and that subject is the relative pronoun “who”, so we can't omit it. | 2019-04-21T20:37:43 | https://web2.uvcs.uvic.ca/courses/elc/studyzone/490/grammar/defining-adjective-clauses-rules.htm |
0.998468 | Should we start a Concrete5 Q&A site on Stack Exchange?
Edit: I went ahead and created a trial-balloon site proposal: http://area51.stackexchange.com/proposals/94596/concrete5... if it is to take off, it needs active participation of as many people as possible, so check it out!
Concrete 5's forums are decent, but they are no match to Stack Overflow's Q&A engine. Understandably - the forum is not part of C5's core business. Stack Overflow has dozens of developers working on the engine full time.
Stack Exchange, SO's sister network featuring Q&A sites on a variety of topics, has the Area 51 process for creating new Q&A sites specific to a technology or topic:http://area51.stackexchange.com/... Because SE doesn't want to create ghost towns, they require a pretty big community to gather *before* a new proposal is allowed to even go into private beta, during which time the site is seeded with questions and answers, and its viability determined. The community that wants to form the site also largely decides what is on topic and what is an example of a good question (check out the proposal linked above).
- Easy formatting options, easy insertion of images, etc.
Many CMS communities already have their own very successful Q&A sites there: Drupal (http://drupal.stackexchange.com/), Joomla (http://joomla.stackexchange.com/), Expression Engine (http://expressionengine.stackexchange.com/), and more.
Would it be worth starting a Concrete5 Q&A site on Stack Exchange, and outsource most Q&A there, keeping the forums for real *discussion* only?
Bio: Web dev and designer.
One note though, it is "concrete5" and not "Concrete5". Are you able to update the name?
Someone fixed this while I was asleep :) Which is kind of testament to the power of the engine. Anyone can edit anything (or suggest edits if you're new).
The guys and I discussed this last month when I was in town. How can we help promote this? Tweets, a blog post?
There is now a dedicated "StackOverflow" page and navigation link on concrete5.org. The link is found under Community.
If enough people get in the habit of using Stack Overflow, it could make a future proposal easier to pass.
we're happy to support it. I'll add the link in our newsletter and do my best to spread the good word.
OK, but we need the proposal to go active before that (or start a new one...). I'll write to a community manager and see whether we can get the existing one reopened for one last chance.
I spoke to the CM and unfortunately, as far as site proposals go, what's dead is dead.
I can start a new proposal, but we should organize it so a couple people can seed questions right away, and your newsletter can mention it.
Would it make sense to start, say, a week or two before your next newsletter is due?
There is now a Stack Overflow link in the concrete5.org navigation under Community. The goal of this was to get people used to using Stack Overflow for certain types of questions.
I think it might be better to wait a few months before starting a new proposal.
I am afraid I am always sceptical of new channels for for help. There are already several communication mediums that have been enthusiastically started for concrete5 and pretty much atrophied. In the course of atrophying they have spread resources and placed information in places outside the usual search scope.
My impression is that the current concrete5.org forums and howtos are not as well used or as in depth as they used to be and it would be detrimental to the community if they received even less high-level input as a consequence of a new communication (unless everything switched).
It all comes down to striking a balance between how widely to wave the flag and diluting the resources needed to support that flag waving so far as to become ineffectual.
I see so many benefits.
1. typical reply times, looks like the Wordpress one (http://wordpress.stackexchange.com/) is very active and replies are typically within minutes or within the hour. The Drupal one is also fairly quick (http://drupal.stackexchange.com/) but appears to be a little slower than the Wordpress one.
Magento seems to have a very active developer community too.
* The sheer popularity of the system ensures a strong community can grow, and feedback is much more immediate. It's not uncommon for a question to attract really high-quality answers within minutes of being asked. In my experience, this is much, MUCH faster than traditional forums.
Thank you so much for doing this Pekka, I think stackoverflow for developer q/a is the right way to go so if we can get our own silo that would be amazing.
So here's my thoughts on the issue of many "communication mediums", firstly stackoverflow is not a medium for communication, it is a place to ask questions and get answers. We will not be communicating anything in there at all, people will just get their questions answered.
Notice that there is a VERY clear difference between the content of the questions, the stack overflow question has a lot more information and even has a bounty attached to it.
I am confident that had Daenu not posted to stackoverflow, he'd still be waiting for an answer.
so it should go in our forums where we have site owners and developers willing to help other site owners and developers.
Thanks for your feedback guys, glad to hear there's interest in doing this!
Great writeups @jessicadunbar and @Korvin. They echo exactly my thoughts why this might be a net benefit to the C5 community.
As to what needs to be done, spreading the word through Twitter / a Blog post would be really helpful. We still need 49 followers for the proposal, and 40 more highly voted example questions. Anyone who signs up in this phase will be able to participate in the private Beta, and shape direction the site will take.
Examples of questions that would NOT work (say, because they'd be more on topic in the forum under the separation Korvin outlines) would be great as well!
> There are already several communication mediums that have been enthusiastically started for concrete5 and pretty much atrophied. In the course of atrophying they have spread resources and placed information in places outside the usual search scope.
That's a serious concern for sure. I thought about this before making the suggestion - but like others in this thread have said, the SO infrastructure so many advantages that could make this actually work *better* than the forums that it seems like it's worth a shot.
I am in agreement with JohntheFish regarding the risk of diluting resources.
- It helps promote concrete5 to a new audience.
- I imagine many people view a product with a dedicated StackExchange community as being more "legitimate".
- For many, there will be a much greater incentive to answer questions on StackExchange than the concrete5 forum. Due to most StackExchange users using their accounts for getting jobs and networking. Which makes them very focused on earning StackExchange points and badges.
Currently there is an issue with the forums generally serving to answer low level and non-technical questions. The developers who have the knowledge and skill to answer more technical questions often avoid the forums. This leaves technical questions unanswered and pushes the question asker to other venues like IRC.
Considering Korvin's outline of how StackExchange question asking works, this could provide a separate outlet serving a different purpose and a different set of users.
E. You want help implementing the answer"
A great majority of the questions posted on the forums would not qualify for StackExchange. They are often broad and lack specific details.
This still leaves one area unaddressed, technical questions that are suited for the concrete5 forum.
i completely agree with Korvin on this. Stack force people to write a good and clear question.
Why move all developers forum to Stack and keep only editor and other funky forum on C5 ?
While i tend to agree with Korvin, i'm not sure what will happen, if a question of "for" StackOverflow quality is posted in the concrete5 forums? Would a possible answer then be, sorry, we don't answer questions of this level here, please post your question on StackOverflow?
A skilled user is not necessarily a developer - getting an answer like that could draw him away from the concrete5 forums, what would also mean losing a potential supporter.
The current problem is that many skilled developers who know a lot about concrete5 avoid the forums. I think part of this has to do with many forum questions not including specific details, are not written clearly, require a lot of work to coach the question asker to provide useful information, and could be self-answered by doing a search of the forum, documentation, and tutorials. This makes answering questions much more time consuming and requires a lot of patience. Patience some don't have or have the time to invest.
The core team currently does not have enough time to work on the core and look through the forum questions to see what needs answering. This means many of the technical questions on the forum go unanswered.
There are patient and skilled developers answering questions on the forum, but there are only so many of them and they only have so much time. They can't get to all questions, which means some fall through the cracks.
If StackExchange could provide a channel for clear, well formed questions that can be more easily understood and answered. I think it could be a compliment to the forums and attract skilled developers to ask and answer questions.
As an experiment, there is no harm in trying.
Ideally yes, of course it would be great to have the right place for the right question. But i'm wondering who will decide which question will go where? Basically the user will, but who will then filter out 'unsuitable' questions and will these then get rejected, and by whom?
"but who will then filter out 'unsuitable' questions and will these then get rejected, and by whom?"
If we use exchangecore's idea to create an area of concrete5.org that has StackExchange questions, we can include question guidelines for forums and for StackExchange. Something like Korvin's descriptions could be at the top of each page.
If users choose to ignore the guidelines and post the wrong type of question on StackExchange, these "unsuitable" questions will be rejected by StackExchange moderators and users with high reputation scores.
I agree, this sounds like being practicable, while not affecting concrete5 forums in any way.
Just a thought, would it be possible so that we could have a "read only" section on the forums which automatically pulls in questions posted to the Stack Exchange and links to them? This way it's made known that Concrete5 encourages questions to go on SE simply by the fact that there are links to it, additionally it provides the benefit for users who do post questions there getting the exposure of the SE community as well as the concrete5 community.
I think this is an excellent idea. The StackExchange section could have a pinned message describing the distinction between the regular forum and StackExchange and how the questions are different.
what about the concrete5 forums then? Should there be another pin saying "don't ask too advanced questions here, go to StackOverflow instead'...?
Just wondering how this should be handled in practice.
I'm not sure if there are enough questions asked on our CMS at SO.
What I'm missing a bit in this thread is the fact that SO is having tags not only as topics but also for subjects that aren't big enough to have an own site.
If you look at the number of followers/questions our tags are having it shows that we aren't by far big enough to get our own site.
For comparison the "drupal" tag has 4.3K followers & 16.4K questions.
"joomla" has 2.3K followers & 13K questions.
So if we take the amount of questions that would fit for SO (Korvin: "A great majority of the questions posted on the forums would not qualify for StackExchange. They are often broad and lack specific details.") and the amount of questions being asked in here that wouldn't fit on SO at all, In my opinion we aren't a community big enough to have our own site on SO.
Also an editor really can't be bothered to ask code questions on SO.
The question Korvin mentioned is mine, BUT I surely wouldn't have had to go on SO if our docs were complete. I remember when working with c5 5.6 I had always an answer in here or when reading our proper docs (googling around usually led me to concrete5.org).
BTW As soon as I have some spare time (it will be next week) I'll write some docs too.
What I'm trying to say is that we should first complete our own docs, especially the developer part, and if then there is still the need of an own SO site, we could think about.
Don't forget that very often people don't invest time in Google researches nore they are reading the docs nore they are byting thru the source code. It is easier to cry "Help Me!" in the forums than googling, byting & trying around to get a solution from the CMS itself.
Also I'm agreeing with JohnTheFish that more channels aren't necessarily better to find a solution.
As for the numbers, while I won't argue your point, I'd just say I think maybe it's a bit of a "what came first, the chicken or the egg?" scenario. If we can somehow qualify, it will likely add fuel to the Concrete5 fire.
I think a specific Stack Exchange site might work much better than the Concrete5 tag on Stack Overflow ever will.
On SO, you are limited by the extremely strict on-topicness guidelines of the whole site. Those guidelines are enforced by moderators and users that don't necessarily know anything about C5.
On a SE site of our own, we could work out for ourselves what is on topic and what isn't. Chances are we are going to be slightly more lenient than SO, allow good questions that focus on non-programming aspects of the system that would likely be closed as off-topic on SO (usage, customization, configuration...) and generally be less harsh than SO has to be with its 10,000+ new questions every day.
Please don't missunderstand me. I am not against a concrete5 SO site at all! I'm just doing a bit the "devils advocate...." and saying that if the docs were ready, me personally I wouldn't have to go to the IRC or SO that often though.
And I totally agree that on a SO site we could make the rules and it would be better than any tag will ever be.
Right. That's certainly a fair point!
Those numbers are a feedback loop, if we have a link in the header saying "Developer Support" that goes to a stackoverflow tag, I'd bet we would get a lot more questions. It's just a matter of putting some effort into building that community.
In terms of documentation, I agree we should continue to work on documentation but I disagree that we need to halt any other community activities until that is resolved. Part of what made v6 documentation more "complete" is that we had a lot of questions and answers developer or not in the forums. Encouraging more of that can only help.
On the question of multiple avenues of communication, IMHO that is a red herring. Stack overflow is not a way to communicate, it's a platform for asking and answering questions.
I think part of the misunderstanding here is that forums are for discussion while stack overflow is for answers. We have tools to make a discussion forum work as an answer platform, but we have no way to restrict extra discussion or prevent the thread from running off onto a different topic.
When I search google for an answer and find a result on concrete5.org, I end up having to wade through tons of discussion to find a suitable answer. Stackoverflow doesn't have this issue because stackoverflow doesn't allow discussion. For that reason any time I'm googling for an answer to ANYTHING and I see a stackexchange site, I go there instead of any other resource.
I agree with Korvin that just by having a StackExchange concrete5 community, it would likely attract developers and drive more technical questions and answers. The worst thing that could happen is we don't make it to the next stage or we do get our own community and it isn't active enough to be sustained. It could potentially be a benefit too, so it seems worth trying even as an experiment.
If we don't get enough followers and questions to move into the next phase, then I think we should look into creating a StackOverflow page under the Community navigation link. On this page we could link to existing StackOverflow concrete5 related tags and include information that describes what StackOverflow is, is not, and what it is suited for. This could address the issue of diluting the concrete5 communication channels.
For anyone who hasn't followed the concrete5 StackExchange community proposal, please do. After you follow the proposal, you will have 5 votes that you can use to upvote any existing questions. You will also have the ability to write 5 example StackExchange style questions.
Following can be done by anyone, users, designers, and developers.
We can use some more enthusiasts.
If you haven't followed this proposal, please sign up.
And of course vote for questions that are below a 10, no point in having questions with 11, 12, ...20 points for example!
Hey all you decent concrete5 developers out there!
1. Click on the orange button "Follow"
Please use your 5 votes on questions with less then 10 votes!!
Yes, we need you !
Please sign up and vote for questions that have LESS than 10 votes. | 2019-04-26T14:01:41 | http://www.concrete5.org/community/forums/chat/should-we-start-a-concrete5-qanda-site-on-stack-exchange/ |
0.998938 | Cal Ripken's 14-year march into baseball history placed him side-by-side with New York Yankees legend Lou Gehrig last night, and just hours away from an achievement so monumental that it will leave a very famous monument at Yankee Stadium with a serious credibility problem.
No one figured on this when the Yankees placed a stone in center field on July 4, 1941, to honor the Iron Horse, ". . . whose amazing record of 2,130 consecutive games should stand for all time."
Ripken officially equaled it at Camden Yards when the Orioles left the field in the middle of the fifth inning with a seven-run lead. The mid-game ceremony has become familiar to Orioles fans during a well-orchestrated three-week countdown, but the sellout crowd of 46,804 exploded into an emotional 5-minute, 20-second ovation when an illuminated No. 2,130 was unfurled on the wall of the B&O; warehouse.
The record -- once seemingly unapproachable -- should fall tonight when the Orioles close out a three-game series with the California Angels, but it would be hard to imagine a more perfect evening than the one in which Ripken had three hits, three fifth-inning curtain calls and joined in a home run barrage that carried the Orioles to an 8-0 victory. Even the final score was a perfect tribute to No. 8.
"I'm not in the business of scriptwriting," Ripken said afterward, "but that would have been a pretty good one."
Ripken, who has been in the starting lineup without interruption since May 30, 1982, came through the game without a bruise, making No. 2,131 pretty much a foregone conclusion.
Pitcher Scott Erickson helped assure the happy ending with a three-hit shutout, but who's going to remember the score 30 years from now? The night belonged to Ripken, who made two curtain calls during the fifth-inning stretch before umpire Al Clark motioned Jeff Manto to the plate, then a third when the crowd forced Manto out of the batters box with another deafening roar.
"It was a very powerful moment," Ripken said. "You wish everybody would be able to experience a moment like that."
There are certain to be more of the same tonight, when another sellout crowd packs Camden Yards for the record-breaker. Both President Clinton and Vice President Al Gore are scheduled to attend tonight's game, apparently becoming the first chief executive and vice president ever to watch a baseball game together outside of Washington.
It also will be another night of diversion for the discouraged Orioles, who were supposed to be fighting for a title while Ripken carved out his place in baseball history. Instead, there is little left to fight for but a place in line to shake his hand after the game.
"It's a pretty big event for everybody," said pitcher Mike Mussina, who will be the Orioles starter tonight. "We're just fortunate to be on the field with him. He's been playing so long and he has played with so many people, and we're going to be out there when he does it. It might be the most impressive athletic accomplishment of our lifetime."
The proof may be in the star-studded guest list for the tying and record-breaking games. The stands were full of familiar faces last night, including Hall of Fame quarterback John Unitas, all-time home run king Hank Aaron, Chicago Cubs great Ernie Banks, actor Tom Selleck, rock star Joan Jett (who sang the national anthem), basketball star David Robinson, Maryland basketball coach Gary Williams and former Terrapin star Joe Smith. Most of them took part in a surprisingly informal post-game roast.
"What he has done, well, it would be easier to hit the lottery," said former Orioles manager Earl Weaver, who wrote Ripken into the lineup on Day One and delivered the ceremonial first pitch last night. "It's just fantastic . . . something that I don't think any generation will ever see again."
The Streak has always invited comparisons between Ripken and Gehrig, but there was no way to compare last night's game with the 2,130th and final game that Gehrig played for the Yankees in 1939. No one would know the significance of that game until a weakened, confused Gehrig took himself out of the lineup the following day and went in search of a medical answer for his rapidly deteriorating physical condition.
He had broken the previous consecutive games record (1,307 by Everett Scott) nearly six years earlier, so the streak had simply become a way of life. There was no magic number to chase. No banners to unfurl. Nothing but the inevitability that it would have to end some time. He died two years later of the rare neuromuscular disease that now bears his name.
Ripken's attempt to break that record years ago spawned a growing sense of anticipation that erupted in last night's mid-game and post-game celebrations. Fans in the sellout crowd, many of whom had paid ticket scalpers far above face value to get in, reveled in a moment that was both historic and hysteric. No doubt, tonight's festivities will be even more impressive, with special appearances by members of the starting lineup from the first game of the streak and a post-game speech by Ripken certain to bring the house down.
"Nobody's going to make people forget Lou Gehrig," said Weaver. " 'Pride of the Yankees' will still bring a tear to your eyes 30 years from now, but maybe in 30 years, there will also be a 'Cal Ripken Story.' " | 2019-04-26T10:23:16 | https://www.baltimoresun.com/news/bs-xpm-1995-09-06-1995249027-story.html |
0.999986 | Did ancient civilisations indulge in nuclear warfare?
Religious texts and geological evidence suggest that several parts of the world have experienced destructive atomic blasts in ages past.
... .. ...At Rajasthan in India, radioactive ash covers three square miles not far from Jodhpur.
This is an area of high rates of cancer and birth defects and it was cordoned off by the Indian government when radiation readings soared astonishingly high.
An ancient city was unearthed which, the evidence indicates, was destroyed by an atomic explosion some 8,000 to 12,000 years ago.
It has been estimated that half a million people could have died in the blast and it was at least the size of those that devastated Japan in 1945.
Vitrified Ruins in California's Death Valley: Evidence of Atomic War?
In Secrets of the Lost Races, Rene Noorbergen discusses the evidence for a cataclysmic war in the remote past that included the use of airships and weapons that vitrified stone cities.
The most numerous vitrified remains in the New World are located in the western United States. In 1850 the American explorer Captain Ives William Walker was the first to view some of these ruins, situated in Death Valley. He discovered a city about a mile long, with the lines of the streets and the positions of the buildings still visible. At the center he found a huge rock, between 20 to 30 feet high, with the remains of an enormous structure atop it. The southern side of both the rock and the building was melted and vitrified. Walker assumed that a volcano had been responsible for this phenomenon, but there is no volcano in the area. In addition, tectonic heat could not have caused such a liquefication of the rock surface.
An associate of Captain Walker who followed up his initial exploration commented: "The whole region between the rivers Gila and San Juan is covered with remains. The ruins of cities are to be found there which must be most extensive, and they are burnt out and vitrified in part, full of fused stones and craters caused by fires which were hot enough to liquefy rock or metal. There are paving stones and houses torn with monstrous cracks. [as though they had] been attacked by a giant's fire-plough."
These vitrified ruins in Death Valley sound fascinating--but do they really exist? There certainly is evidence of ancient civilisations in the area. In Titus Canyon, petroglyphs and inscriptions have been scratched into the walls by unknown prehistoric hands. Some experts think the graffiti might have been made by people who lived here long before the Indians we know of, because extant Indians know nothing of the glyphs and, indeed, regard them with superstitious awe.
Piute legends tell of a city beneath Death Valley that they call Shin-au-av. Tom Wilson, an Indian guide in the 1920s, claimed that his grandfather had rediscovered the place by wandering into a miles-long labyrinth of caves beneath the valley floor.
Eventually the Indian came to an underworld city where the people spoke an incomprehensible language and wore clothing made of leather.
Wilson told this story after a prospector named White claimed he had fallen through the floor of an abandoned mine at Wingate Pass and into an unknown tunnel. White followed this into a series of rooms, where he found hundreds of leather-clad humanoid mummies. Gold bars were stacked like bricks and piled in bins.
White claimed he had explored the caverns on three occasions. On one, his wife accompanied him; and on another, his partner, Fred Thomason. However, none of them [was] able to relocate the opening to the cavern when they tried to take a group of archaeologists on a tour of the place.
It seems one local character knew how to find the place. Brandon relates that "Death Valley Scotty", an eccentric who spent millions building a castle-estate in the area, was known to go "prospecting" when funds ran low. Death Valley Scotty would check out for a few days of wandering in the nearby Grapevine Mountains, bringing back suspiciously refined-looking gold that he claimed he had prospected. Many believe that he got his gold from the stacked gold bars in the tunnel system beneath Death Valley.
* Various omens appeared among the gods: winds blew, meteors fell in thousands, thunder rolled through a cloudless sky.
* Drona called Arjuna and said: "Accept from me this irresistible weapon called Brahmasira. But you must promise never to use it against a human foe, for if you did it might destroy the world. If any foe who is not a human attacks you, you may use it against him in battle. None but you deserves the celestial weapon that I gave you."
* At last they came to blows, and seizing their maces struck each other.they fell like falling suns.
* These huge animals, like mountains struck by Bhima's mace, fell with their heads broken, fell upon the ground like cliffs loosened by thunder.
* Bhima took him by the arm and dragged him away to an open place where they began to fight like two elephants mad with rage. The dust they raised resembled the smoke of a forest fire; it covered their bodies so that they looked like swaying cliffs wreathed in mist.
* Arjuna and Krishna rode to and fro in their chariots on either side of the forest and drove back the creatures which tried to escape. Thousands of animals were burnt, pools and lakes began to boil... The flames even reached Heaven... Indra without loss of time set out for Khandava and covered the sky with masses of clouds; the rain poured down but it was dried in mid-air by the heat.
Several historical records claim that Indian culture has been around for literally tens of thousands of years. Yet, until 1920, all the "experts" agreed that the origins of the Indian civilisation should be placed within a few hundred years of Alexander the Great's expedition to the subcontinent in 327 BC. However, that was before several great cities like Harappa and Mohenjo-Daro (Mound of the Dead), Kot Diji, Kalibanga and Lothal were discovered and excavated. Lothal, a former port city now miles from the ocean, was discovered in Gujarat, western India, just in the late 20th century. These discoveries have forced archaeologists to push back the dates for the origin of Indian civilisation by thousands of years--in line with what the Indians themselves have insisted all along.
A wonder to modern-day researchers, the cities were highly developed and advanced. The way that each city was laid out in regular blocks, with streets crossing each other at right angles and the entire city laid out in sections, gives archaeologists cause to believe that the cities were conceived as a whole before they were built--a remarkable early example of city planning. Even more remarkable is that the plumbing/sewage systems throughout the large cities were so sophisticated--superior to those found in Pakistan, India and many Asian countries today. Sewers were covered, and most homes had private toilets and running water. Furthermore, the water and sewage systems were kept well separated.
Well, yes, in modern history.
A recent study also opts for this explanation, although no one has found a crater of suitable size or other supporting evidence.
Barakat holds up one of the many, huge chunks of glass in the desert.
Oppenheimer also quoted "If the radiance of a thousand suns, were to burst at once into the sky, that would be like the splendor of the Mighty One."
This is mentioned in a book I read recently called The Atlantis Blueprint,well worth a read!
This is wow, a really eye opening thread. Ancient warfare using nuclear weapons, or similar, are possible. Look at what happened in India thousands of years ago in Mohenjo-Daro and not to mention the glazed green glass phenomenon, found in Hiroshima, atomic test sites and even Tunguska.
This subject is (one word) breathtaking!!
Add all the info you got folks.
Are the Indian remains of Mohenjo Daro and Harappa, their sudden abandonment and the apparent discovery of an ancient site with a layer of radioactive ash the best available evidence for the possibility that our ancient ancestors possessed a highly advanced technology – which might have included atomic warfare?
Did an ancient advanced civilization exist on Earth? The question is very intriguing and the search for “evidence” to support a positive answer has intrigued Mankind for many decades – if not centuries. Many possibilities have been put forward, from outright statements that Atlantis was a high tech civilization, to the possibility that the Nazca lines might be a prehistoric airport.
Rather than an accumulation of various items of evidence that is then subjected to the possibility that it might be either alien or advanced, it is more scientific – and perhaps better- to focus on the quest for the “best evidence”: a single piece of evidence that in itself is the best example to support a conclusion. In the search for an advanced ancient civilization, what would be this “best evidence”?
One possible item that would classify as “best evidence” exists within the Indus River Valley, where towns such as Harappa and Mohenjo Daro flourished in 3000 BC. The question is why these cities were abandoned. And one answer that has been put forward is that the ancient cities might have been irradiated by an atomic blast. If true, it would be impossible to ignore the conclusion that ancient civilization possessed high technology.
Hi There are plenty of books out there that go into all this W Raymond Drake in his books seems to think that it was the Ancient gods that brought atomic warfare to this earth. Either that or life on this planet goes in cycles and we blow ourselves up and go back to living in caves.
Mahabarata is ripe with stuff about "atomic" weapons. They are called Sudarsan Chakra, the little disk you see on Visnu's finger. They destroy entire worlds with that thing.
My research has just led me to information on Nibiru / Planet X and I watched yesterday 4 videos of Jordan Maxwell at The Republic Forum, discussing The Bible & End Times. He hypothesizes that a great war is coming, with destruction the likes of which we (current inhabitants) have never seen before and how this can be shown in the original Hebrew texts.
There is evidence that this will not be the first time that "waste and desolation" has been visited upon the Earth and I believe that this ties in nicely with this thread.
Don't let you eyes decieve you"
Thanks for adding this veritas!
At around the 12 minute mark, Bill Jenkins refers to Zacharia Sitchin's reference to an alien battle around the Sinai peninsula using nuclear weapons c.2,000BC. | 2019-04-19T02:21:56 | https://forum.davidicke.com/showthread.php?t=10928 |
0.999969 | I am using my laptop for a long time. And I have to charge the battery while using it. Does this have a negative impact on the battery? And should I remove the battery? Give me advice?
Once the battery is fully charged, it's best to remove it if using laptop on mains power for long or frequent periods.
Thereafter, pop the battery back in about once a month to top it up (or whenever you need to use battery power of course).
Any advice for purchasing a new Laptop? Are there any deals?
I need some advice about purchasing a new laptop battery. | 2019-04-23T14:02:44 | https://forums.tomsguide.com/threads/battery-advice-for-laptop.433968/ |
0.998751 | This article is about the German title. For other uses, see Führer (disambiguation).
Führer (German pronunciation: [ˈfyːʁɐ], spelled Fuehrer when the umlaut is not available) is a German word meaning "leader" or "guide". As a political title it is associated with the Nazi dictator Adolf Hitler. Nazi Germany cultivated the Führerprinzip ("leader principle"), and Hitler was generally known as just der Führer ("the Leader").
Führer was the title demanded by Adolf Hitler to denote his function as the head of the Nazi Party; he received it in 1921 when, infuriated over party founder Anton Drexler's plan to merge with another antisemitic far-right nationalist party, he resigned from the party. Drexler and the party's Executive Committee then acquiesced to Hitler's demand to be made the chairman of the party with "dictatorial powers" as the condition for his return. It was common at the time to refer to leaders of all sorts, including those of political parties, as Führer. Hitler's adoption of the title was partly inspired by its earlier use by the Austrian Georg von Schönerer, a major exponent of pan-Germanism and German nationalism in Austria, whose followers commonly referred to him as the Führer, and who also used the Roman salute – where the right arm and hand are held rigidly outstretched – which they called the "German greeting". According to historian Richard J. Evans, this use of "Führer" by Schönerer's Pan-German Association, probably introduced the term to the German far right, but its specific adoption by the Nazis may have been influenced by the use in Italy of "Duce", also meaning "leader", as an informal title for Benito Mussolini, the Fascist Prime Minister, and later dictator, of that country.
After Hitler's appointment as Reichskanzler (Chancellor of the Reich) the Reichstag passed the Enabling Act which allowed Hitler's cabinet to promulgate laws by decree.
One day before the death of Reichspräsident Paul von Hindenburg, Hitler and his cabinet decreed a law that merged the office of the president with that of Chancellor, so that Hitler became Führer and Reichskanzler – although eventually Reichskanzler was quietly dropped. Hitler therefore assumed the President's powers without assuming the office itself – ostensibly out of respect for Hindenburg's achievements as a heroic figure in World War I. Though this law was in breach of the Enabling Act, which specifically precluded any laws concerning the Presidential office, it was approved by a referendum on 19 August.
Hitler saw himself as the sole source of power in Germany, similar to the Roman emperors and German medieval leaders. He used the title Führer und Reichskanzler (Leader and Chancellor), highlighting the positions he already held in party and government, though in popular reception, the element Führer was increasingly understood not just in reference to the Nazi Party, but also in reference to the German people and the German state. Soldiers had to swear allegiance to Hitler as "Führer des deutschen Reiches und Volkes" (Leader of the German Reich and People). The title was changed on 28 July 1942 to "Führer des Großdeutschen Reiches" (Leader of the Greater German Reich). In his political testament, Hitler also referred to himself as Führer der Nation (Leader of the Nation).
One of the Nazis' most-repeated political slogans was Ein Volk, ein Reich, ein Führer – "One People, One Empire, One Leader". Bendersky says the slogan "left an indelible mark on the minds of most Germans who lived through the Nazi years. It appeared on countless posters and in publications; it was heard constantly in radio broadcasts and speeches." The slogan emphasized the absolute control of the party over practically every sector of German society and culture – with the churches being the most notable exception. Hitler's word was absolute, but he had a narrow range of interest – mostly involving diplomacy and the military – and so his subordinates interpreted his will to fit their own interests.
According to the Constitution of Weimar, the President was Supreme Commander of the Armed Forces. Unlike "President", Hitler did take this title (Oberbefehlshaber) for himself. When conscription was reintroduced in 1935, Hitler created the title of Commander-in-Chief of the Armed Forces, a post held by the Minister for War. He retained the title of Supreme Commander for himself. Field Marshal Werner von Blomberg, then the Minister of War and one of those who created the Hitler oath, or the personal oath of loyalty of the military to Hitler, became the Commander-in-Chief of the Armed Forces while Hitler remained Supreme Commander. Following the Blomberg–Fritsch Affair in 1938, Hitler assumed the commander-in-chief's post as well and took personal command of the armed forces. However, he continued using the older formally higher title of Supreme Commander, which was thus filled with a somewhat new meaning. Combining it with "Führer", he used the style Führer und Oberster Befehlshaber der Wehrmacht (Leader and Supreme Commander of the Wehrmacht), yet a simple "Führer" since May 1942.
An additional title was adopted by Hitler on 23 June 1941 when he declared himself the "Germanic Führer" (Germanischer Führer), in addition to his duties as Führer of the German state and people. This was done to emphasize Hitler's professed leadership of what the Nazis described as the "Nordic-Germanic master race", which was considered to include peoples such as the Norwegians, Danes, Swedes, Dutch, and others in addition to the Germans, and the intent to annex these countries to the German Reich in 1933. Waffen-SS formations from these countries had to declare obedience to Hitler by addressing him in this fashion. On 12 December 1941 the Dutch fascist Anton Mussert also addressed him as such when he proclaimed his allegiance to Hitler during a visit to the Reich Chancellery in Berlin. He had wanted to address Hitler as Führer aller Germanen ("Führer of all Germanics"), but Hitler personally decreed the former style. Historian Loe de Jong speculates on the difference between the two: Führer aller Germanen implied a position separate from Hitler's role as Führer und Reichskanzler des Grossdeutschen Reiches ("Führer and Reich Chancellor of the Greater German Empire"), while germanischer Führer served more as an attribute of that main function. As late as 1944, however, occasional propaganda publications continued to refer to him by this unofficial title.
Führer has been used as a military title (compare Latin Dux) in Germany since at least the 18th century. The usage of the term "Führer" in the context of a company-sized military subunit in the German Army referred to a commander lacking the qualifications for permanent command. For example, the commanding officer of a company was (and is) titled "Kompaniechef" (literally, Company Chief), but if he did not have the requisite rank or experience, or was only temporarily assigned to command, he was officially titled "Kompanieführer". Thus operational commands of various military echelons were typically referred to by their formation title followed by the title Führer, in connection with mission-type tactics used by the German military forces. The term Führer was also used at lower levels, regardless of experience or rank; for example, a Gruppenführer was the leader of a squad of infantry (9 or 10 men).
Under the Nazis, the title Führer was also used in paramilitary titles (see Freikorps). Almost every Nazi paramilitary organization, in particular the SS and SA, had Nazi party paramilitary ranks incorporating the title of Führer. The SS including the Waffen-SS, like all paramilitary Nazi organisations, called all their members of any degree except the lowest Führer of something; thus confusingly, Gruppenführer was also an official rank title for a specific grade of general. The word Truppenführer was also a generic word referring to any commander or leader of troops, and could be applied to NCOs or officers at many different levels of command.
The word Führerstand translates to a "driver's cab"
In Germany, the isolated word "Führer" is usually avoided in political contexts, due to its intimate connection with Nazi institutions and with Hitler personally. However, the term -führer is used in many compound words. Examples include Bergführer (mountain guide), Fremdenführer (tourist guide), Geschäftsführer (CEO or EO), Führerschein (driver's license), Führerstand or Führerhaus (driver's cab), Lok(omotiv)führer (train driver), Reiseführer (travel guide book), and Spielführer (team captain — also referred to as Mannschaftskapitän).
The use of alternative terms like "Chef" (a borrowing from the French, as is the English "chief", e.g. Chef des Bundeskanzleramtes) or Leiter (often in compound words like Amtsleiter, Projektleiter or Referatsleiter) is usually not the result of replacing of the word "Führer", but rather using terminology that existed before the Nazis. The use of Führer to refer to a political party leader is rare today and Vorsitzender (chairman) is the more common term. However, the word Oppositionsführer ("leader of the (parliamentary) opposition") is more commonly used.
^ "Means Used by the Nazi Conspiractors in Gaining Control of the German State (Part 4 of 55)".
^ Evans, Richard J. (2003) The Coming of the Third Reich. New York; Penguin. pp.43, 184. ISBN 0-14-303469-3. Schönerer also invented the "pseudo-medieval" greeting "Heil", meaning "Hail".
"§ 1 The office of the Reichspräsident is merged with that of the Reichskanzler. Therefore the previous rights of the Reichspräsident pass over to the Führer and Reichskanzler Adolf Hitler. He names his deputy."
^ Shirer, William L. (1960). The Rise and Fall of the Third Reich. New York: Simon & Schuster. pp. 226–27. ISBN 978-0-671-62420-0.
^ Thamer, Hans-Ulrich (2003). "Beginn der nationalsozialistischen Herrschaft (Teil 2)". Nationalsozialismus I (in German). Bonn: Federal Agency for Civic Education. Archived from the original on February 8, 2008. Retrieved 4 October 2011.
^ Winkler, Heinrich August. "The German Catastrophe 1933–1945". Germany: The Long Road West vol. 2: 1933–1990. pp. 38–39. ISBN 978-0-19-926598-5. Retrieved 28 October 2011.
^ "NS-Archiv : Dokumente zum Nationalsozialismus : Adolf Hitler, Politisches Testament".
^ Joseph W. Bendersky (2007). A Concise History of Nazi Germany: 1919–1945. Rowman & Littlefield. pp. 105–6.
^ De Jong, Louis (1974) (in Dutch). Het Koninkrijk der Nederlanden in de tweede wereldoorlog: Maart '41 – Juli '42, p. 181. M. Nijhoff.
^ Bramstedt, E. K. (2003). Dictatorship and Political Police: the Technique of Control by Fear, pp. 92–93. Routledge.
^ a b c De Jong 1974, pp. 199–200.
^ Adolf Hitler: Führer aller Germanen. Storm, 1944. | 2019-04-21T06:21:03 | https://en.m.wikipedia.org/wiki/F%C3%BChrer |
0.999168 | Here's a dinner recipe I've been enjoying lately. It is quick and easy to throw together, and imbued with the beautiful Mexican flavours I love so well.
2. Saute diced red onion in oil in a frying pan on medium heat until softened.
3. Add 1/2c water and 2/3 of the enchilada sauce to the frying pan and stir with the onion to combine.
4. Place chicken breasts in the enchilada liquid, turn heat to a medium high and cover pan with a lid to poach for 10 minutes.
5. While chicken breasts are cooking, blend cannellini beans and cottage cheese together in a bowl with a hand blender until smooth. Set aside.
7. Remove cooked chicken breasts from heat and shred with two forks.
8. Mix shredded poached chicken in its sauce with the cannellini bean and cottage cheese mixture.
9. Spread 1/6 of this mixture in a line along the centre of a tortilla.
9. Roll tortilla up and place at the end of a 20x30cm rectangular oven proof dish. Continue this process with the rest of the chicken mixture and tortillas, until oven dish contains six filled tortilla wraps.
10. Pour the remaining 1/3 enchilada sauce in a line down the centre of the 6 tortilla wraps and sprinkle grated Parmesan cheese over the top.
11. Place in oven and bake at 180°C for 25 minutes, or until the tortillas are golden brown.
Serves 6. Enjoy with a crispy green coriander and lime salad. | 2019-04-26T08:31:02 | http://www.cravingfresh.com/2014/08/chicken-enchilada-bake.html |
0.999544 | What's the meaning of the phrase 'Adversity makes strange bedfellows'?
The proverbial saying 'adversity makes strange bedfellows' suggests that, in times of trouble, people who wouldn't normally associate with each other may form an alliance.
What's the origin of the phrase 'Adversity makes strange bedfellows'?
My best way is to creep under his gaberdine; there is no other shelter hereabout. Misery acquaints a man with strange bedfellows.
Illustrative, like the preceding one, of the old proverb, that adversity brings a man acquainted with strange bedfellows.
Dickens certainly didn't coin the phrase and was good enough to label it as 'an old proverb' but I can find no example of it in print before his use of it.
Party politics, like poverty, bring men 'acquainted with strange bedfellows'. - Phillip Hone Diary, 1839.
Even enemies have something in common. Statecraft produces strange bedfellows. - Peter van Greenaway Dissident, 1980.
Poverty makes strange bedfellows. - London Times headline 15 March 1982. | 2019-04-19T02:36:28 | https://www.phrases.org.uk/meanings/adversity-makes-strange-bedfellows.html |
0.999424 | What is all this nonsense about not showing ID at the polls? When I came to the USA, I was told I would have to carry an ID card with picture (a green card).
What is all this nonsense about not showing ID at the polls? When I came to the USA, I was told I would have to carry an ID card with picture (a green card). I was happy to do this for the privilege to stay in this great land of ours. I was glad to show it to any official who asked to see it. Also, I had to register once a year at the post office. I considered this a small price to pay to be able to stay here. Since then, I have become a U.S. citizen. I would be happy to show any ID at the polls to keep our electoral system above suspicion. If there is nothing to hide, why is there such an uproar? It seems that all Americans would want their votes to be protected. When I first came here, I heard the old joke, �I want to be buried in Chicago so I can keep voting.� I thought it was just a joke, but am now beginning to wonder. | 2019-04-20T10:57:44 | https://www.newbernsj.com/20130619/letter-voter-id/306199894 |
0.998255 | Who first used the phrase “Web 2.0” in the first place? ( picture or video ) The one the phrase “Web 2.0” in the first place was the video.
Write a brief summary of each Web.
Web 1.0: Back then when we have retro computers, floppy disks, CDS, VHS, Hotmail, MSN and Myspace it was a simpler time and the Internet was created and everyone was amazed by it. The creator of the Internet was a man named Tim Berners-Lee without him the Internet would not have existed to this day. We should all be thankful for this guy created something amazing that have changed the world. Make sure that you celebrate his birthday which is on the June 8 to show how much we appreciate him. Thank you for giving us the Internet we all appreciate your hard work and keep the good work.
Web 2.0: When the websites we use are starting to evolve into something better to help us advance in the future. Also, you can use web applications to basically to do anything nowadays and will be less time consuming. You will be able to share your information anywhere around the world through social media.
3.What are the sites called wikis? (examples using logos) A wiki is a server program that allows users to collaborate in forming the content of a Web site. A wiki provides a simplified interface. It is not necessary to know HTML. At any time, contributors can review the history of the page they are working on or preview the Web page before publishing it.
4. Explain what is the trend named Nomadicity. The trend Nomadicity means the ability to access platforms and compute data from various types of devices.
5.What is a “Mashup” for networks? (examples) A mashup is a web application that integrates data from multiple web sources in order to provide a unique service. Internal data sources, RSS/Atom feeds, Screen-Scraping and Web Services are some resources used by mashups.
6. What do you think about the 2.0 controversy? What I think about 2.0 controversy is that , it can be very helpful or harmful depending on the situation that is occurring. Also, the situation can be solved by, finding the problem and fix so there will be peace and everyone will be happy. | 2019-04-25T07:05:38 | https://ahmal2611.wordpress.com/2018/05/17/exploring-the-web/ |
0.999736 | Cupid Crunch - no-bake Valentine's treat! Great for gifts! Everyone gobbles this up! So quick and easy!
This week I will be sharing some easy Valentine's Day treats. First up - Cupid Crunch. This is sweet and salty at its best!
I came across some Valentine candy corn at Wal-Mart and immediately decided to make this Cupid Crunch. It is made with popcorn, candy corn, peanuts, M&Ms and almond bark. I love to make popcorn snacks. They are so easy to make and extremely addictive! If you can't find the Valentine candy corn, try some mini marshmallows and/or craisins. This makes a ton, so plan on giving some away. It would make a great neighbor or teacher gift.
Pop popcorn and place in a large bowl. The largest you have. Pour peanuts, candy corn, and M&Ms on top.
Break up almond bark. Melt according to package directions. Pour over popcorn mixture. Stir until everything is well coated and then spread out onto waxed paper, parchment, or foil. Let sit until completely dry and then break up into clumps.
Break up almond bark. Melt according to package directions.
Pour over popcorn mixture. Stir until everything is well coated and then spread out onto waxed paper, parchment, or foil.
Let sit until completely dry and then break up into clumps.
How good is this going to be when we are watching our annual Valentines movie tomorrow. thanks for the idea.
I loved your idea and made this using a bag of pre-popped kettle corn, valentine m&m's, heart shaped sprinkles, milk chocolate chips and white chocolate chips tinted pink.
How far ahead can you make this?
I think it would be fine for at least 5 to 7 days. If not longer.
In the potato chip aisle at the grocery store, there is a product called Puffcorn. I love popcorn but the hull is a dental nightmare. Puffcorn is a great alternative.
Try Puffcorn - no popcorn hulls . It's in the aisle with potato chips .
I literally have stumbled onto some of the best recipes from you at Plain Chicken! I have printed, shared, and made so many of your recipes it's amazing! Thank you for sharing, I'm a huge fan!!!!!!
Thanks!! SO glad you are enjoying the recipes!!! | 2019-04-20T13:06:38 | https://www.plainchicken.com/2012/02/cupid-crunch.html |
0.998414 | Hi, I want to add a light to an existing ceiling rose, however there are no spare connection points in the rose, so would have to double up on them, is this a bad idea?
It is a type 1 circuit.
I have to ask what is a "type 1" circuit?
Also what exactly are you trying to achieve? will this new lamp illuminate the same time as the one it is fed from, or will it be independent with its own switch?
I read somewhere that a type 1 circuit , used the ceiling rose as the junction box in the lighting ring.
Any way , I just want to add a light that works off the same switch as the existing light.
I wouldn't read any more from that place you have been reading, its all wrong, lights are not on a ring either.
Regarding your original question, yes you will have to, but make sure the cables are secure. I also can not help but wonder what the grey cable that is hanging down, is for?
The grey cable is the new one I need to connect in.
All you need is to take a 1mm or 1mm twin and earth cable and connect to the same terminals that the pendant light is connected to and take it to the new ceiling rose and connect it to the new pendant. I am also wondering what the extra cable hanging down is for. | 2019-04-20T10:15:54 | https://www.diydoctor.org.uk/forums/adding-light-from-existing-ceiling-rose-but-no-spare-wires-t44877.html |
0.998543 | The Patriots are back in the Super Bowl, but here in the deepest-blue region of the country, the jubilation is tempered with anxiety. We are none of us confident of victory. The arrogant, haughty, overconfident Patriots fan of old, or at least the last decade, is an endangered species. They started disappearing en masse on February 3, 2008, when the Patriots’ high-flying 2007 season ended with a whimper in a shocking Super Bowl loss to the New York Giants, 17– 14.
Every season since has led to further worry. The 2008 season ended with an 11–5 record, but no playoff berth as the Patriots lost Tom Brady for the campaign in the first game. The 2009 season ended in a crushing loss to the Baltimore Ravens in a game where the Patriots never had a lead. The 2010 playoffs ended in even more brutal fashion with a lopsided divisional-series loss to the archrival New York Jets only a month after crushing them, 45–3, on Monday Night Football.
As a lifelong red-blooded New Englander, I do not hide my deep and abiding man-crush on Tom Brady, the first true Boston sports hero since Larry Bird. So it pains me deeply to write that the future Hall of Fame quarterback is the common denominator in each of the losses above.
In the Super Bowl against the Giants, New England had less than 100 passing yards in the first half, and Brady looked tentative all night. He started the Ravens game with a fumble, a three-and-out, and two interceptions, finishing with a dismal QB rating of 49.1. For context, Brady’s career QB rating is 96.4, fourth-best in NFL history. On January 17, 2011, USA Today covered the game against the Jets with the headline, “Patriots’ loss shines light on Tom Brady’s playoff woes.” The Boston Herald noted that Brady’s vision of the field and open receivers seemed to shrink during the game.
This year, the Patriots ended the regular season with a 13-3 record and once again had Wildcard Weekend off. Against the Denver Broncos in second-round action, Brady had the kind of game we remember from the glory days. With 26 of 34 passing for 363 yards and an NFL-record 6 touchdowns, Brady recorded an unworldly QB rating of 137.6. The highest possible is 158.3 and anything over 125 is considered spectacular.
This may have been more a reflection of the deficiencies of the Denver team than a renaissance for the New England quarterback. The very next week, against the much stouter Ravens defense, Brady struggled. He recorded no passing touchdowns, two interceptions, and an anemic 239 passing yards, finishing with a disappointing QB rating of 57.5.
How did one of the greatest clutch big-game performers ever to play become a playoff mediocrity? Maybe even a liability.
The theories echo through every office building, worksite, and sports bar in New England. The lines to sports talk stations are perpetually jammed with callers needing to speak their minds on what happened to Number 12.
Maybe science offers a better explanation.
Think: When did Brady start to struggle? When history was on the line. When he was on the verge of the only 19–0 season ever, while breaking every major passing record.
Brady is a student of the game and apprentice to the Great Hooded One, arguably the NFL’s most comprehensive historian. Brady knows more than the rest of us what that fourth championship ring will truly mean: immortality. The fourth ring places him on par with his childhood hero Joe Montana as a champion. The rest of his career — the MVPs, the passing records, the 16–0 2007 season — surpasses Montana and Brady becomes the Greatest of All Time.
Brady has become too distracted by what postseason success means to his legacy to just let go and play the game. He is thinking too much. A great athlete displays unconscious competence, which is high performance achieved by reflex without thinking. This is what all of those thousands of hours of practice achieve, moving action from conscious though to reflex, but outside thoughts disrupt the flow of unconscious muscle memory.
This means Brady isn’t looking flustered and missing receivers because defenses have adjusted and are hitting him. Nor has he gotten soft. Soft, easily rattled quarterbacks don’t have 13–3 and 14–2 regular seasons, as Brady has these past two years.
He is slow to check receivers because the distraction of becoming the Greatest of All Time has basically switched his decision-making process from automatic to manual. Rather than scanning the field and absorbing the needed information, he has moved to conscious thought: “Option 1? No. Option 2? No. Option 3? Maybe.” By then the passing pocket is collapsing and Brady really is facing pressure, maybe even being sacked.
The Great Hooded One has taken notice. Bill Belichick had Brady take a knee — twice!!! — in the final minute of the first half of the most recent Ravens game rather than run a play. Clearly, he did not want to risk Brady making a poor passing decision in a hurry-up offense.
If I could do anything to help the Patriots win the Super Bowl (and don’t put it past me), I would have a sports psychologist move in with Brady and the supermodel missus. They could talk at great length, reminding the quarterback that he has already met every goal he has set for himself. That he is already among football royalty. That he has nothing further to prove to anyone else. That Montana already concedes Brady’s greatness. Remind him that football is a game he has mastered and to trust his instincts, letting his inner Brady shine through.
After all, Brady’s playoff woes are a problem that just a little lack of thought will solve. | 2019-04-21T08:55:45 | https://www.nationalreview.com/right-field/tom-brady-using-wrong-part-his-brain-2008-neil-minkoff/ |
0.998569 | 156 million people, over 65% of the mobile market, own smartphones according to the latest data from comScore. These millions of smartphone users have been watching more and more video with each passing quarter. Adobe’s Q4 2013 analysis of over 22.5 billion video starts found that mobile devices accounted for 20% of video streaming. Additionally, video viewing on smartphones has seen tremendous year-over-year growth (86%) and now makes up 12.8% of all digital video consumption.
The number of smartphone owners is growing as well as the number of videos viewed by this segment. If brands and advertisers want to reach these users with video content, marketing on Facebook is a must. In its data, comScore reported that Facebook reaches 86% of the mobile media audience and is the top smartphone app, reaching 77.4% of the app audience. Adobe also claims that Facebook is the king of video social sharing with 80.6% of the 6% of starts from video shares coming from the site.
In 2013, Facebook averaged 556 million mobile daily active users, a 49% year-over-year increase. The audience and targeting capabilities this social network offers are ideal for brands and advertisers. Smartphone users are actively engaging with Facebook on a regular basis and are more likely to share video content on the site—point blank: you need to serve branded video to users on Facebook.
One way to do this is through Instagram Video. Acquired by Facebook in early 2012, Instagram and its 150 million monthly active users are tied to this social media giant. According to Unruly, nine out of 10 Instagram video shares occur on Facebook and 40% of the 1,000 most-shared Instagram videos come from brands. Social video sharing on Facebook is especially important for companies as new studies report that nearly seven in 10 millennial social users are at least somewhat likely to make a purchase after seeing a friend’s post. Simply having Instagram video content will improve your brand’s ability to generate word-of-mouth advertising on Facebook among smartphone users.
Video marketing directly through Facebook was only made available to a select group of companies in late 2013; the use of these mobile video ad units has yet to become widespread amongst brands and advertisers. The focus of Facebook’s video ads, at this point, seems to be branding which is why established companies like Nestlé and Estée Lauder were the first to take the plunge.
Ultimately, there are two ways that marketers can leverage video within creative mobile ad units. The first, placing a video within a mobile app install unit to drive app downloads. The second, embedding a video into a sponsored post for a Page with the goal of branding. Brands have also begun to incorporate an autoplay feature which prompts a video start as users scroll past it.
Industry leaders have commented on the value Facebook offers in terms of reach and engagement with video content.
“Video has introduced a new layer of engagement and relevancy, empowering marketers to reach Facebook’s 875 million person mobile audience with content in motion—content that delights, entertains and inspires consumers” said Cheryl Morris, director of marketing at Nanigans, Boston.
“Consumers are watching more and more premium video on their smartphones and tablets, so it only makes sense for advertisers to market in that space,” said Paul Bremer, general manager at blinkx Mobile, San Francisco.
The smartphone user base is growing and so is the percentage of them that share video content. Facebook is a major hub for mobile users to engage with branded videos. In order for you to maximize views, shares and conversations with your mobile videos, establish a strong presence on the site and constantly deliver videos to content hungry users. | 2019-04-24T10:48:35 | https://www.viralgains.com/resources/press-blog/2014/02/facebook-reach-smartphone-video-viewers/ |
0.999999 | What's behind TEPCO ban on term 'core meltdown' after Fukushima crisis?
Tokyo Electric Power Co. (TEPCO)'s then President Masataka Shimizu instructed staff not to use the term "core meltdown" when describing the disaster at the Fukushima No. 1 Nuclear Power Plant in 2011, according to a report by a third-party investigative committee of TEPCO that was made public on June 16.
The report acknowledged that the instructions were conveyed widely within TEPCO by telephone and other means. It hinted that there had been "pressure" from the prime minister's office through a request for TEPCO to provide the content of announcements in advance, but it remained unclear whether the office had any involvement in clamping down on the use of "core meltdown."
What, then, prompted TEPCO to seal off the term? According to the report, the move was triggered by a hydrogen explosion at the building of the Fukushima nuclear plant's No. 1 reactor on the afternoon of March 12, 2011, the day after the plant was crippled by the massive Great East Japan Earthquake and tsunami.
The prime minister's office was aware of the explosion from TV images. But when TEPCO went ahead and held a news conference, publicly releasing a photograph of the explosion without contacting the prime minister's office for many hours, then Prime Minister Naoto Kan and other government officials got furious. Shimizu was called to the prime minister's office on March 13 and was told to contact the office in advance when announcing important accident information.
The removal of a senior official of the then Nuclear and Industrial Safety Agency from a public relations position on March 13 after he acknowledged a core meltdown in a news conference without first contacting the prime minister's office is also thought to have influenced TEPCO.
On the evening of March 14, when then TEPCO vice president Sakae Muto was giving a news conference, a memo from Shimizu was passed to him by a company employee, saying, "By instruction of the prime minister's office, don't use 'core meltdown.'" Hints of pressure from the prime minister's office had emerged during a teleconference beforehand, with Shimizu saying reports to the prime minister's office should be made "properly, in advance."
Shimizu's position was conveyed within the company by phone and other means. The report concluded that "an understanding was shared within TEPCO that statements acknowledging a meltdown should be avoided."
After that Muto and TEPCO employees switched to the term "core damage." The report pointed out, "If the memo had not been passed over, vice president Muto may have responded differently."
The third-party investigative committee searched for the memo, which was said to be handwritten, but did not find it. The committee questioned Shimizu on two occasions over a period of about four hours, but the report concluded, "His memory has faded and clear facts could not be confirmed."
However, it quoted a TEPCO employee who was summoned in April by then Minister of Economy, Trade and Industry Banri Kaieda as saying that Kaieda had told him, "There doesn't appear to be a clear definition of a core meltdown, so let's make it the melting of fuel pellets." After that, a fax was distributed within the company saying, "'Melting of fuel pellets' is to be used. This is because 'core meltdown' conveys the image that the whole core has melted, like the China syndrome."
This was in spite of a manual that was "discovered" at TEPCO in February this year, nearly five years after the meltdowns. The manual defined a core meltdown as having occurred when over 5 percent of the reactor core had been damaged. This being the case, TEPCO could have judged as early as March 14, 2011, three days after the outbreak of the disaster, that core meltdowns had occurred.
The third-party panel report stated that quite a few of some 55 TEPCO employees in charge of TEPCO external reports had checked the manual, and rejected TEPCO's claim that "nobody had noticed" it until its "discovery."
"It would have been natural to list 'core meltdowns' in reports, but the company avoided this," the report stated.
On June 16, Democratic Party Secretary-General Yukio Edano, who was Chief Cabinet Secretary at the time of the meltdowns, told reporters in Yokkaichi, Mie Prefecture, on June 16 that he had never issued any orders to avoid use of the phrase "core meltdown."
"Neither I or then Prime Minister Kan made any such request to TEPCO," he said, adding, "During news conferences at the time I myself acknowledged core meltdowns. Putting the brakes on (the use of the term) would have been out of the question." | 2019-04-24T00:47:55 | http://mainichi.jp/english/articles/20160617/p2a/00m/0na/013000c |
0.999882 | Hampden start… but will it be his last for Rangers?
Deposed captain Barry Ferguson is poised for a starting place at Hampden in a Scottish Cup Final farewell to Rangers.
Sportsmail understands Pedro Mendes has been all but ruled out of the showpiece tie against Falkirk with a thigh injury, while Maurice Edu is also a fitness doubt after picking up a knock in the SPL title clincher against Dundee United last weekend.
That opens the door for Ferguson to make his first start since the Boozegate affair - and gives him the chance to complete his Ibrox career with an active part in landing the Double.
The player's agent, John Viola, is due to hold discussions with Rangers over his future next week, with newly-relegated West Bromwich Albion among the clubs eyeing a �1million summer deal.
Ibrox assistant manager Ally McCoist admitted Ferguson was likely to feature against Falkirk but was unwilling to predict it would be his last appearance. 'He has a year left on his contract and hasn't sat down with the manager or the chairman to discuss anything,' said McCoist.
'At this moment, I would think Barry has a very good chance of appearing for Rangers at Hampden. I would rather not comment on anything else until after the decision has been made between Barry and the chairman. If he stays on, I would be delighted.
Ferguson has made substitute appearances against Aberdeen and Dundee United over the last fortnight but hasn't started a match since Scotland's defeat in Amsterdam on March 28. The fitness concerns over Mendes and Edu, however, have put him in line to face John Hughes' men at the national stadium.
Team-mate Steven Davis admitted he would be delighted to see Ferguson join skipper David Weir in collecting the Scottish Cup - if Rangers can overcome Falkirk - after they joined forces to hoist the SPL trophy at Tannadice on Sunday.
'It would be nice for Barry to go up there for another trophy with David,' said Davis.
'He has been a great player for Rangers for a number of years. I think all the boys look up to him. You see his influence in training and in matches.
Final call: Ferguson set for Hampden start¿ but will it be his last for Rangers? | 2019-04-23T12:08:50 | https://www.dailymail.co.uk/sport/football/article-1189345/Final-Ferguson-set-Hampden-start-Rangers.html |
0.998515 | What type of cat is Macavity?
A. Fill in each of the numbered blanks in the following passage with one suitable word.
B. Choose the word which best completes each sentence. | 2019-04-24T19:52:03 | https://www.aulafacil.com/cursos/ingles/english-proficiency/literary-approach-follow-up-l22971 |
0.999999 | He never says a word unless he's being threatened in someway.
My question here is why the speaker used the form "is being threatened" and not "is threatened". When I should use the first form "is threatened" and not the second "is being threatened"? Is there a certain rule to follow?
If you drive carefully, you will have fewer accidents.
If you drove carefully, you wouldn't have so many accidents.
The first sentence doesn't sound like a warning to me, but rather like advice, I'd say. The second sentence uses the past tense but it is not retrospective because in conditional clauses the simple past tense-when it's used in both clauses; the main and condition clause-usually refers to either the unreal present or the unreal future but never to the past.
If you had driven carefully, you wouldn't have had so many accidents.
Which means you didn't drive carefully at some time in the past and as a result you had so many accidents.
I think the speaker in the second sentence " If you drove carefully, you wouldn't have so many accidents" is referring to unreal or imaginary condition in the present (you don't drive carefully so you do have so many accidents, but if you drove carefully, you wouldn't have so many accidents.
The trouble I am having with unreal/hypothetical conditionals is that sometimes I can't tell whether the sentence refers to a present/future real condition or to a present/future unreal condition. Is it a matter of the speaker's choice and his/her degree of certainty about the possibility of a situation-if it is likely or unlikely to happen?
If you help me now, you are a true friend.
If you helped me, you would be a true friend.
The first sentence makes a complete sense to me. It suggests that the speaker is somewhat sure that his/her friend is gonna help. Am I right there? The second sentence, however, indicates that the speaker doubts that his/her friend will lend a hand.
If they didn't show him the way, he will not find the right office.
If they don't show him the way, he will not find the right office.
If they didn't show him the way, he wouldn't find the right office.
The first sentence sounds fine (the guy has already asked for directions, but he will not find the right office unless the people he has asked them for directions have already showed him the way. Is my interpretation correct?
Usually if the condition clause (that contains the "if") is in the simple past tense, the main clause cannot be in the future tense. However, in the first sentence tenses; simple past and future are mixed up. Is this grammatical? Under which conditions can we mix up tenses like in the first sentence?
The second sentence is predictive. The speaker is certain that the guy will not find the office (as long as they don't show him the way, he definitely won't find the right office). Predictive sentences usually refer to the real future (events and situations that are possible and likely to happen). Various forms of the present tense can be used in the condition clause and different forms of the future tense can be used in the main clause. I am right?
The third sentence is also predictive but more hypothetical (less possible and unlikely to happen). The speaker in this sentence is less certain whether the guy may find the right office (I don't think he is likely to find the office). My question here is about the tense reference. Is the speaker referring to the unreal present or to the unreal future? Again, how can I tell?
If it rains tomorrow, be sure to close the windows.
If it should rain tomorrow, be sure to close the windows.
If it is raining tomorrow, be sure to close the windows.
The first and the third sentences sound perfectly correct to me. Both suggest the possibility of raining tomorrow. The third, however, implies that it is less likely to rain tomorrow but if it happens to rain, then be sure to close the windows. The use of "should" implies that something is probable, 85% likely to happen. "rains" and "is raining" suggest a higher possibility of raining, 95-100% likely to happen. Am I right?
Is the use of "should" above restricted to formal context? Is it likely to occur in everyday conversational conditionals?
If the truth is known, public opinion will change.
If the truth were known, public opinion would change.
The speaker in the first sentence is somewhat sure that if the truth is revealed, then public opinion will change whereas the speaker in the second sentence sounds less certain (if the truth were to be known-which I don't think would happen, then public opinion would probably change).
My question is again about the tense reference. Do both sentences 1&2 refer to the present unreal or to the future unreal? How can I tell if a predictive or hypothetical statement refers to the real/unreal present or future? Any specific grammatical rules?
I think overall you have a good grasp on tenses and a good understanding of how exactly to use them. I wouldn't be able to better explain how appropriate the above tense combinations are, and most of your comments make full sense to me.
I'd say the continuous form here indicates he has to be persistently threatened before we can hope to hear a word from him.
That particular one does not sound ok to me. Assuming it indeed happened in the past that he was provided with the itinerary, then I would think using 'if' isn't correct. It would have to be 'As' or 'Since' or 'Because'.
I'm sorry I can't answer your main question about real/unreal present or future. Hopefully some native will be of assistance to you : there are a couple of active grammar gurus in this forum.
What a long post! You might consider breaking it up into smaller posts so as not to scare off the reponders!
In general, native speakers don't focus much, if at all, on the question of real or unreal conditions, pasts, futures, and the like. More simply, each form tells more or less the same story, but with a different "feeling content". Moreover, native speakers don't always speak in such formulaic ways, with a clearly defined "if" and "then" clause.
The forms with "will" (or the present tense, or the imperative) are matter-of-fact in feeling-content. They are mere observations of a relationship between one situation and another.
The forms with "would" have various non-matter-of-fact elements showing the attitude of the speaker toward the facts portrayed within the condition and consequence.
"If they didn't show him the way, he will not find the right office."
This pattern is not common. The meaning to be conveyed here would likely be expressed differently.
"Well, he's certainly not going to find the right office if they didn't show him the way!"
"Well, he'll never find the right office because they didn't even show him the way!"
"How do they expect him to find the right office if they didn't (even) show him the way?" | 2019-04-21T10:14:28 | https://www.englishforums.com/English/ConditionalSentences/bnxdg/post.htm |
0.999934 | How do I Clean my Maytag Griddle?
Following the instructions below will allow you to properly clean your chrome infused griddle. It will help maintain its appearance and performance characteristics without damaging the surface.
1 Multi-purpose pad holder designed for griddle cleaning or a long wooden spoon to protect your hands.
Important: Do not use soap, abrasive materials or cleaning chemicals, including stainless steel cleaner, to clean the chrome griddle as these may damage the griddle surface.
Prior to cleaning the griddle, be sure all cooktop burners have been turned off and the oven controls have been locked.
For best results, clean the griddle shortly after removing the food.
Set the temperature to 300°F and wait 10-15 minutes.
Using a measuring cup, pour up to 1 cup tap water over the soiled area starting at the back allowing the water to run toward the drip tray in the front. Allow the water to bubble on the griddle for 3-4 seconds.
Use a pad holder or wooden spoon with the non-scratch pad to clean the soiled area, moving the residue and water to the drip tray at the front. It will be necessary to apply pressure on soiled areas. For heavy soils, it may be necessary to repeat this process.
Fold a damp towel and with the pad holder or wooden spoon, go over the griddle to remove remaining residue.
Turn the griddle off and allow it to cool, approximately 10 -15 minutes.
Once cool, wipe the griddle with a clean, damp towel followed immediately by buffing it with a microfiber cloth. If streaking, rainbowing or ghosting occur, use a mixture of 1 part white vinegar to 2 parts water on a towel to wipe the griddle.
Once cool, remove the drip tray to empty. Clean the drip tray with warm soapy water. Wipe the area under the drip tray clean. Once dry, put the drip tray back in position. | 2019-04-19T02:18:49 | https://producthelp.maytag.com/Cooking/Cooktops/Cooktop_Cleaning_and_Care/How_to_Clean_a_Chrome_Electric_Griddle |
0.995078 | Everyone knows that nowadays smartphones are both expensive in terms of the price (The average smartphone price is around $600!) and with the time it takes to buy a new one and replace all of your old contacts and media. Losing a smartphone due to any kind of damage is a harrowing experience now, considering that most of our social lives now are always connected through our phones. Almost every person is used to using social sites like Twitter, Facebook, and Instagram, and if you use them on your cellular device and that device happens to get ruined, you may lose significant data that you may have wanted to preserve. One easy way to make sure that your phone will be quickly repaired while damaged is finding a knowledgeable and reputable repair place to fix it; and for those who feel like they do not want to deal with the prospect of finding a store to get their device fixed, you can now purchase insurance for your expensive cell phone. There are pros and cons for both finding stores yourself and going through the insurance process, and we will address those pros and cons in the following paragraphs.
One pro with finding your own store is that the price of the repair in store generally costs less than the deductible that the insurance will charge you for replacing the screen. For example, I personally moved to Vegas a while ago, and while I was going through the airport I accidentally dropped my iPhone. It cracked the screen to bits, and I knew I was going to need a repair as soon as possible. The only thing I had to do was go on the internet and look up Cell Phone repair Las Vegas on google, and I found a very reputable shop called Einstein Repairs. I had brought my phone to them, told them that I needed an iPhone glass replacement as soon as possible, and they began work. Not only did I get the phone back in the same day, but I also had to pay $100 dollars less than what I would have had to pay my insurance. I also did not lose any of my information on my phone, which is a major pro when it comes to quick repair.
A con regarding doing a repair through a shop though is that you need to put some effort into finding a shop that will do quality work and can be trusted with your phone. A cell phone is a very personal device, and you want to make sure that the shop you go to recognizes that. It might take a little to find the right shop for you, but in the end not only will it cost less, but it will also take less time to repair the device versus replacing it with a brand new one from the insurance.
Another pro that comes with repairing your phone at a shop though is that they will try to repair your phone no matter what. Some phone insurance plans only cover certain damages. If your phone happens to be damaged by a force that is not covered in your insurance plan, you cannot get your phone replaced. There are also many stipulations in which you can void your phone, one most notably being the process of jailbreaking or rooting (which has become a very popular process) your phone. I had a friend that had a limited insurance plan on his Samsung S5, and he was looking for a Samsung Digitizer replacement through his insurance. The insurance would not help him because of one reason. Unlocking and rooting his phone voided his insurance, so he was stuck with an insurance plan that would not help him. This is a pain that many go through, where a single thing can void insurance on an expensive phone. Luckily, he went to a repair shop and got his phone fixed within the same day, and now he knows what to do if something like this ever arises again.
One thing that you may be able to consider a con though is that with a repair, you still have that same phone and not a brand new one. When you go through insurance to replace your phone, if they deem it “unsavable”, they’ll send you a brand new phone of the same model. You do not get that luxury with a repair. This could be considered a double-edged sword issue though; you either get a brand new device through insurance that has none of your information on it, or get your device repaired through a shop and be able to keep all of your information on it.
There are a couple pros and cons when it comes to replacing your phone via insurance and repairing your phone at a shop. Through personal experience, I would always choose repairing my phone at a shop. It costs less, I do not have to abide by strict insurance policies, and I get to keep all of my information on my phone. Some might like replacing their phone through their insurance though, it all comes down to personal preference. Either way, you will never want to be stuck with an expensive, broken phone. | 2019-04-25T02:26:00 | http://einsteinrepairs.com/blog-3/ |
0.999845 | 1) reservations may be cancelled 48 hours prior to trip or rental time for full refund.
2) If reservation is not cancelled with in 24 hours of trip time then any remaining balance due will be charged at trip time.
3) If captain cancelled trip due to weather then full refund will be given.
1) 90 day notice of for full refund.
2) If captain cancelled trip due to weather then full refund will be given. | 2019-04-25T17:50:51 | https://booking.sunsetwatersportskeywest.com/product/tara-meinholdbrendan-wehmann-rise-reef-morning-snorkel-trip/160 |
0.983315 | Given I am running Openstack (Icehouse 2014.1.3) in active/active HA with Ceph as the storage backend, and I have booted a VM from a cloned snapshot, is it expected behavior that I cannot snapshot or delete the clone if I lose the controller that initially created the volume?
If so, is the only recovery method to manually change the host field in the database to an active controller?
Currently, the cinder-volume service is very much _not_ HA. If you lose the cinder-volume service that created the volume you will run into a host of issues including the one you describe. You can only run it in active-passive.
Install cinder-volume services on both controllers.
Then you should have an HA solution. The hostname part is what is going to trip you up. It has to be the same name so cinder sees it as the same service.
I am told this is all being worked on for Kilo. If it isn't fixed in Kilo, it should be by the time we get to "L" | 2019-04-19T09:28:22 | https://ask.openstack.org/en/question/55268/ha-recovering-from-cinder-node-loss-with-ceph-backend/ |
0.998358 | E By his use of the word lustHeaney is suggesting the children pick the berries with a wild sense of abandon and their desire to collect them in as vast a quantity as possible is almost uncontrollable.
Heaney leaves the reader pondering the fact that change — whether in terms of the berries or life in general - is inevitable, no matter how unlikely it may seem at the time.
The boy was in tears because Coles had reached him with some recognition and acknowledgement of what he was wrestling with; Coles had shown some honesty about what the boy could see and was struggling with, namely the horror of the utter hypocrisy of human behaviour—which all those who had already resigned to living in denial of the human condition had determinedly committed their minds to not recognising.
Much more is said about the problem of the deaf effect in Part 3: When the monster makes his proposition, Frankenstein actually considers with the monster.
The tragedy of Romeo and Juliet is one of the most dramatic and influential love stories of all time. In fact, the human condition has been such a fearfully depressing subject we humans spend most of our time just making sure we avoid any encounter with the damn thing. As I describe in chapters 2: For me, swearing signals to those listening that I am not party to the hypocritical world of denial.
In The Plotter, he conveys the message that society operates in a created sense of urgency. Through the journeys of the individual…. However, he is cowardly.
Here is an example paragraph using the PEER structure that deals with the imagery in the poem: His experience of childhood summers spent picking fruit - only for the vast amount of it to rot - serves as a metaphor for life in general, where optimism and the focus on immediate pleasure are replaced by a natural conservatism and pessimism.
The depression and glandular fever experienced by young adolescents are a direct result of the trauma of having to resign to never again revisiting the subject of the human condition.
It explains that there has been a good reason for why we humans have not been ideally behaved. Parker utilises visual motifs and cinematic devices to Essay Title: In the beginning when he moves to Out-With, he starts off an innocent 9 year old boy, completely oblivious to all the horrors going on just behind his back.
So yes, what exactly is the human condition? Essay 24 and in depth in chapter 3: In this essay, those differences will be discussed and the similarities examined for their message. Certainly—and quite understandably given how guilty we have felt about our seemingly imperfect behaviour—we invented excuses for being competitive, aggressive and selfish.
So extrapolate that experience over 2 million years and you can begin to appreciate just how much volcanic frustration and anger must now exist within us humans!
As described in F. E After wildly picking every berry in sight, the persona and his friends return to the byre the next day, only to find the "glossy purple" berries have been transformed by a "rat-grey fungus".
He suffered not before His killers. The idea is that the majority of the people believe that acting too slowly upon seeing an opportunity… Violence And the Human Condition 1. What is so significant about humans having cooperative and loving moral instincts is that when we became fully conscious, and began experimenting in understanding, and were criticised by our instincts and unavoidably responded in an angry, egocentric and alienated way, that divisive response caused even greater criticism from our instincts because they expected us to behave cooperatively and lovingly.
To fully appreciate the agony of our human condition we do need to keep immersing ourselves in the full horror of our predicament. In the past it meant extreme, brutal or sadistic behavior.Human condition and the passage from innocence to experience In Frankenstein, Mary Shelley reflects her views on the faults and weaknesses of human beings and the disasters these imperfections can cause through the personalities and actions of the characters in the novel.
Human condition and the passage from innocence to experience Essay. A. Pages:7 Words This is just a sample. To get a unique essay.
We will write a custom essay sample on Human condition and the passage from innocence to experience specifically for you for only $ $/page.
Here is an example of how to use this in a poetry essay: this experience highlights the human condition itself, which can be summed up as the passage from innocence to experience.
(R) It is. QUESTION: You spoke of humans being horrifically oppressed by the agony of the human condition and that being free of that condition is what TRANSFORMS us, but I’m not sure what, or at least I’m not relating to what, the human condition actually is.
The critical essay paper this experience clearly highlights the human condition itself, which can be summed up as the passage from innocence to experience. (R). Human condition and the passage from innocence to experience In Frankenstein, Mary Shelley reflects her views on the faults and weaknesses of human beings and the disasters these imperfections can cause through the personalities and actions of the characters in the novel. | 2019-04-22T21:58:32 | https://foxemap.adrenalinperformance.com/human-condition-and-the-passage-from-innocence-to-experience-essay-4661dt.html |
0.998302 | About halfway through the first time I played through the original Deus Ex, I slowly came to the realization that I was playing one of the greatest games ever created. Since then I've played a lot of great games, some very exciting (Rainbow Six series) some involving (SS2, KOTOR, Bioshock), some moving (The Longest Journey and Dreamfall)--but no game has ever come close to the immersive feeling I got from Deus Ex: the sense that I was actually there--not playing a game, trying to anticipate the designers' wishes--but acting in a real world where I could do anything. I had dreams about levels in the game--I got bathyphobia (fear of deep water) in one level and claustrophobia in another. Truly one of the most immersive entertainment experiences of my life.
Why couldn't more games be this way? What quality in Deus Ex was so unique that it evaded replication in every other game, even the ones that tried to replicate it (STALKER, Bioshock, Oblivion)? Certainly it wasn't the graphics.
There approximately seven "things" a person can remember at once; this is one of the reasons telephone numbers are grouped by no more than seven digits. Our mind counts "one, two, three, four, five, six, seven, many"--so anything more than seven can be thought of as an un-trackable amount of numbers, i.e., more than can be comprehended at once.
When the number of perceived ways to accomplish a goal exceeds this number, a psychological effect occurs in the player: Since there are too many options to remember all at once, the player perceives the game has having not just "many" options but an _infinite_ number of options--since an infinite number and an unmanageable number are, in a sense, the same.
By "options", we mean completely _disjoint_ categories of solutions: fighting (NPCs), evading (NPCs, cameras, beams), conversing (NPCs), buying (information, tools), manipulating (cameras, machinery, terminals, switches), navigating (levels, obstacles), opening (doors, containers), unlocking (doors, containers), damaging (doors, containers, machinery, objects), discovering (secret passages, switches), reading (books, newspapers, email). Sub-categories of each solution (weapon choice, path choice) are not counted.
It is when a player perceives an _infinite_ amount of options that true _immersion_ happens. This immersion will override any graphical or aural limitations of the game; the player will start to perceive the world as _real_ and start to think of not what the game's solution is supposed to be, but which choice the player would make _in a real world_ to find a solution. Suddenly the player may start to dream about places he has visited; they might also experience vertigo, claustrophobia, or bathyphobia depending on their situation.
This is the heart of Deus Ex. A few games have many finite solutions, i.e. "sandbox" games; Deus Ex takes this idea further and succeeds in creating an immersive world.
One of the most difficult things for a developer to do is to create a level, event, or situation that they know the player may never find. Developers _want_ the player to see their levels, and find their solutions. I believe it is an act of nobility when the developer gives this choice to the player instead of making the player figure out how the developer wanted the game to be played.
Keep in mind this goal can be accomplished _without_ allowing the player to choose any moral alignment (KOTOR, Fable), or faction to join (Bloodlines), or even clothing (WOW). It doesn't hurt, but it can't cause the developers to sacrifice their fundamental goal--a perceived infinite number of disjoint choices to reach each narrative focal point. It is better to present the player with a single character in an immersive world than present them with a choice of characters in a limited one; many developers make mistake "customization" for true freedom.
From what I have seen from my experiences with earlier projects "Project: Snowblind" and "Tomb Raider: Legend", I believe the Crystal Dynamics Engine _is_ capable of creating this environment. Obviously it takes a lot of work to develop and QA a game with this goal: Deus Ex took over a year just to test. It is up to the current keepers of the Deus Ex flame to decide if this will be their goal.
Good luck to everyone at Eidos Montreal.
A "narrative focal point" is a point in the game that the player must come to _regardless_ of the path they took to get there; e.g. boss fight, plot twist, essential location, etc. For example, the player in Deus Ex is _always_ captured and must _always_ escape from UNATCO.
Emergent game play is a powerful, yet elusive element to incorporate into games. You're right, Deus Ex 1 was an emergent game play oriented game. They should focus on not only retaining that, but developing it further. AI social behaviour, a fluctuating economy, realistic physics and collisions, are probably the base they can start from.
I think story telling in future games can use techniques to mimic what emergent game play has brought to video games. I'd have to think about how that could be accomplished, but I imagine it would be well received by the fanbase, as Deus Ex was really one of the first big games to tinker with emergent game play techniques. They can do it again, but I think it's time to push the envelope further.
You mention narrative focal points, and I don't really think they are always going to have to be mandatory. Carefully designing the game to allow sequence breaking, without breaking the logical flow of the story is something that can really make the story seem more under the player's control. Perhaps looking at Mass Effect will yield some insight into where to start in that kind of story telling. Although Mass Effect did not truly accomplish it, there are areas of the game that can be done in any order and still manage to tell their part of the story in a logical way.
BTW, nice topic rhalibus! It's important the developers know what truly made the original so cool.
I would argue that the immersive quality of Deus Ex would be that in that particular situation the player could also be thinking of the other options of getting to the area beyond that door (which is the true goal other than simply unlocking it). In Deus Ex, the player knows that they might not have to unlock the door at all--they can find another way around, blow up the door, or even ignore the area completely if it's not a primary goal...Furthermore, each alternate solution into the area has its own multiple solutions (Secret passage? Information from guard?) that form an expanding tree of real-world options.
My humble point is that you actually can't logically deduce what your potential options are because Deus Ex gives you too many to remember.
In other games, you need to unlock the door. In Deus Ex, you simply need to get to the area beyond it, and you get to figure out your own solution.
Sadly what I found in DX:IW is when I found a locked door I'd be thinking about all the ways to get into that room based on what I'd seen so far, knowing that each and every way to access what was beyond that door was purposely designed into the game.
I think it's more immersive when the game world is set up in a way where not even the developers could have foreseen all the ways a player can accomplish a goal.
I agree...a famous example is when a player figured out that a solution to get into the top of the Statue of Liberty in the first level was to use their LAMs as stepping blocks to climb the outside wall, all the way up to the roof. Amazingly, it didn't break the game because the developers were only concerned with the player reaching the goal, by any means necessary; they didn't have _any_ locations the player had to visit other than the final location.
But it took a world with consistent rules and logic to make it happen: A LAM can be stuck to a wall, and the player can stand on it. The rest was just an innovative solution. This is the heart of Deus Ex.
Might that emergent gameplay be the vehicle for a more fundamental feature of the game, like self-expression? Warren Spector talked about that, letting the player express themselves through their actions in a world where you have to question what is ethical and what is not, and what consequences will be spawned by your actions.
Sandbox gameplay is great but I'm not so sure that's Deus Ex's thing. That gameplay tends to produce unpredictable series of events rising from many interacting systems (well, RedFeather mentioned emergence).. and it can be highly entertaining and memorable. But those games are usually light on specifically designed content. The less likely it is that a player is going to visit a specific location, the less likely it is that the developers will hide a juicy datacube in that room.
Mass Effect was a good example of having so much choice of where to go and what to do that the quality of your experiences in each location was badly diluted. You could go explore one of a bewildering amount of star systems, but there wasn't anything entertaining to find (and why would there be, when 5% of players are likely to find it).
Part of what was at the "heart" of Deus Ex has to be meaningful choice. The feeling that the world was malleable, and your choices affected meaningful consequences. JC had real power over events, and how they unfolded were up to you.
On a slightly more specific note, part of what captured my imagination was the setting and atmosphere. I loved that society-at-the-brink-of-collapse dystopian world. I had the feeling that I was in over my head, that the world was almost too turbulant, too unstable. It made my choices more meaningful; in a world so tumultuous and chaotic, the slightest events can have the largest repercussions.
I'm dumbfounded as to how horribly you get stuck in your own rhetoric. I stopped reading the second you mentioned emergent gameplay though.
Let's see if we can keep this discussion thread positive, minus0ne!
If you were referring to me, I probably do get too interested in my own opinions sometimes. This is the right thread for rhetorical commentary though.
I have to respectfully disagree with you then. :) Somehow, I just can't connect the dots between memory and the number of options, and even if I could, I just don't feel like the game gave me _infinite_ options as you say. Perhaps it's a matter of individual perception, I don't know. Also being RTS games fan, I for example cannot even compare the complexity of decision making and the amount of choices in an RTS with Deus Ex.
"Infinite options" is an exaggeration of course but there really is an impressive amount of different ways (planned and unplanned) to reach many of the goals in DX - as we all know. Especially for the time it was released and the genre(s) it covered. I think it is well possible to summarize them but add a modern physics engine (destructible environments) and a better AI and the amount of options will be multiplied. Sounds promising but will be very hard to balance the difficulty level correctly. Might need even more beta-testing than ever before.
I hope Eidos Montreal understands what they have.
I agree with rhalibus. It seems like you can do almost anything. When you think about it, there are only a few ways to get past a door, but because there are multiple ways to get to that door, and because there might be an alternative route to avoid the door completely, it SEEMS like there are infinite possibilities when you are playing the game.
And many RTS aren't so complex... BFME anyone? (EA, of course).
Rome: TW wasn't so complex and M@:TW wasn't, either. Red Alert wasn't. Generals wasn't. Panzers wasn't. Soldiers: Heroes of WW2 was quite complexe, as complex as DX1 was.
I mean, in an RTS you HAVE to complete every goal. And there is only one way to do it: by fighting. Of course, you have to decide what approach you're going to use, and what troops you're going to let whatever enemy unit, but that's about it.
In DX, you have to that when you are going to fight (instead of selecting certain troops to kill certain enemy units you select a weapon), but you have to decide whether you do that, or that you're going to sneak, or going to look for an alternative route. And if you're going to sneak, what approach and where you can hide and so on. When you're trying to find an alternative route, you have to think about where it will lead you and what use it is, and you need tot hink of a way to get past the obstacles there.
Good job rhalibus, excellent thread, I read all through it and enjoyed the read.
Gotta like this thread. I'd like to put forward a fairly small theory, in that the feeling of many choices comes from the varous levels of choice you have. You can choose all sorts of weapons in one game, but you always have to fight. Fighting games, you can pick a character and a position to launch your moves from, but that's it.
Deus Ex seems to hold a lot of levels at which you can make your decisions, and further varies these levels, rather than keeping the same ones. In one situation you can initiate or avoid, fight or sneak, use vents or time the patrol patterns, and combine options at each level (stealth-kill, use the vents to get in the right position to duck patrols). In another, you're having a conversation, and can take the basic methods of branch conversation, themselves already a decent representation of this if enough options are kept.
Last off, it may be possible that in DX, despite the complexety of the situations, your next choices are always clear, and it is always clear exactly how you came to them, making the entire game a huge choice tree. There was no obvious reset button, despite some well-hidden ones scattered across the game to keep you on track and in plot. Everything was beleivibly the result of your actions and reactions. The huge machine of the various schemes for global dominance could be expected to go on fairly normaly, but the parts you interact with always respond to your actions. This veiw can be reinforced with datacubes left behind warning people about your imminent arrival, or newspapers reacting to the incidents you participate in, and also your own mind hooking together the various bits of story, as it does in life, and to a greater extent in less immersive video games.
Another immersive quality to Deus Ex was the knowledge that you could shoot anyone and they would react, regardless of their alignment to you: Shoot a UNATCO NPC and they'll change their alignment and attack you. It doesn't mean that you'd do that, but the knowledge of what would happen deepens the player's sense of a real world.
Now, what if it were possible to kill anyone in the game, with the appropriate consequences? Kill Nicolette and you get a datalink message informing you that you can't complete the mission; maybe you'd get one more chance to find another way to reach the goal, but if you blew that then the mission would truly be impossible to finish. But the game wouldn't end.
Most developers would say that there needs to be a way to complete a game no matter what happens--that's why they make certain NPCs invulnerable...But what would happen in the real world if an agent were to kill their contact? They probably wouldn't be able to finish their mission either. So what would be so wrong about allowing an essential NPC to die with the consequence that the player would have to reload a previous game? The player would learn a lesson: Want to finish the game? Then don't kill your contact! | 2019-04-23T06:54:53 | https://forums.eu.square-enix.com/archive/index.php/t-84766.html?s=d91e7e39c3ef2ec1f4092b389d352e16 |
0.988938 | One of the best things about social media account hacking? Plausible deniability.
In the age of the Donald, there have been several instances of Twitter being used in the US as a platform for “goin’ rogue,” as the Sarah Palin-originated saying goes. The most high profile example is the National Park Service, which started pointedly and clinically tweeting out climate change science facts once Pres. Cheeto took office and deleted climate change from the White House website’s list of issues. It was quickly slapped with a directive to knock it off, but several individual parks throughout the US then took up the cause. When they too were told by the new boss to stop making so much sense, “alternative” accounts proliferated, like the AltNatParkService, purportedly run by disgruntled federal employees.
Other such accounts joined in, like Rogue NASA and the like. As NPR (America’s BBC equivalent, soon to be defunded, if the Trump budget is adopted) pointed out, there’s no real way of knowing if these are run by actual federal employees in an act of resistance, or if it’s just a fun, public-confusing phenomenon for anti-administration types to spend their free time on. Which means plausible deniability if anyone in the West Wing wants to start a witch hunt for the people supposedly running these accounts from within the belly of the beast.
In that spirit, it was great to see an official McDonald’s company Twitter account goin’ rogue on Thursday, tweeting directly at President Trump in no uncertain terms: “@RealDonaldTrump You are actually a disgusting excuse of a President and we would love to have @BarackObama back, also you have tiny hands.” Even better, the tweet was pinned to the top of the account.
It was since deleted, and the plausible deniability that we all knew was coming floated out into the public socialverse. In a statement, McDonald’s apologized for the tweet, and suggested it had been hacked.
“Based on our investigation, we have determined that our Twitter account was hacked by an external source. We took swift action to secure it, and we apologize this tweet was sent through our corporate McDonald’s account,” the statement read.
Did an employee at the burger empire mistakenly tweet something personal from the wrong account? Was it an intentional, defiant act of Fight the Power? Was McDonald’s actually hacked?
The Guardian points out that the tweet had been sent from Twitter web, “while every other tweet on the McDonald’s account had been sent using a social media management platform.” Good backup for the “hacked” theory. But then again—why would the attacker only send the one lone tweet, and then retreat? It seems more of an act of scrambled desperation, a protest tweet from within that was quickly thrown up in an opportunistic manner before the supervisor returned from his smoke break.
It SEEMS that way. But again—plausible deniability. Are there people working at Golden Arches HQ that are willing to do their small part to protest the chaos that is the Donald? We’ll likely never know. But if there are, they’ve just shown how social media—and the culture of hacking—can be manipulated to cover their tracks.
In any event, McDonalds may have curried favor with a whole new set of potential customers: Liberals. | 2019-04-25T00:12:27 | https://www.infosecurity-magazine.com/slackspace/mcdonalds-goes-rogue-on-twitter/ |
0.996705 | Jim Renacci said he only needs two terms in the Senate. Brown's campaign calls him "worthless."
Renacci traveled to Cincinnati on Tuesday to sign two term-limit pledges on large cards about the size of a novelty check.
How many terms does a person need in the United States Senate?
U.S. Rep. Jim Renacci says he needs only two.
The Republican from Wadsworth in Northeast Ohio is running for U.S. Senate against incumbent Sen. Sherrod Brown, a Democrat from Cleveland.
Renacci traveled to a small conference room on the fourth floor of the Hilton Cincinnati Netherland Plaza on Tuesday to sign two term-limit pledges on large cards about the size of a novelty check.
The previous Republican Senate candidate, Ohio Treasurer Josh Mandel, signed the same pledge in May of 2017, before dropping out of the race.
"We have to make sure that we bring the power of individual people back and the representatives that represent them go to Washington get their job done and then leave and allow others to serve," Renacci said.
Opponents of term-limits have argued setting term limits would give more power to congressional staffers and lobbyists who write legislation and would have more experience.
That argument doesn't convince Renacci.
"For me, it's a broken system that needs to be changed with fresh ideas," Renacci said.
Renacci accused Brown of flip-flopping on the issue, having supported term-limits early in his political career.
"Today we have someone who wants to run for almost 30 years in Congress," Renacci said.
In a 2004 interview with the Associated Press, Brown said he changed his mind about term limits after seeing the impact they had on the Ohio state legislature. He argued that after term limits were adopted, state legislators spent more time learning the ropes and trying to get re-elected than they did grappling with substantive policy issues.
Brown's campaign had a blunt response to Renacci.
“Congressman Renacci’s word is worthless," said Friends of Sherrod Brown director Preston Maddock in a statement. "He’s already said he doesn’t believe in term limits and, as a four-term Congressman, he’s in violation of this gimmick pledge. Instead of setting fake deadlines for his time in office, Ohio would be better off without Congressman Renacci’s anti-worker, self-serving agenda in Congress at all."
The public should not jump to conclusions against Rep. Jim Jordan, who has been caught in a scandal for allegedly ignoring sexual abuse that took place while he was a wrestling coach at Ohio State. "I know Jim Jordan, he's a great man, good man," Renacci said. "What we really need to do is let's let the facts come out."
A man wearing Renacci stickers on his shirt asked him "What would be an acceptable percentage of Muslims in the country?" Renacci responded that he believes in protecting the borders and "making sure we have legal immigration." | 2019-04-20T02:51:33 | https://www.cincinnati.com/story/news/politics/2018/07/10/jim-renacci-said-he-only-needs-two-terms-senate-browns-campaign-calls-him-worthless/771092002/ |
0.998443 | For more efficient responses by our staff, please adopt this subject line format: “[Department you are contacting]: [Message topic] – [your full name]”. We aim to get back to you within 2-3 business days.
How would my company go about potentially working with Blockchain @ Berkeley on research or consulting projects?
Our consultancy arm takes on projects on a case-by-case basis, with considerations made based on timeline, nature, and scope of project. To inquire about our various services, please contact [email protected] and we’d be glad to give you more information about our team and our process.
Does Blockchain at Berkeley offer educational services or speaking engagements for my company or organization?
Yes, we offer several education programs for companies and employees. For more information, please contact us at [email protected].
My organization is interested in buying or licensing educational material from Blockchain @ Berkeley. How would that work?
If you are interested in licensing our material for third-party use or instruction, please contact us at [email protected].
My organization is interested in partnering, sponsoring, or establishing a recruitment pipeline with your organization. How would that work?
We are involved in very limited and particular partnerships with external organizations. If you believe that a partnership would be mutually beneficial, then we’d love to hear from you!
We offer sponsorship opportunities for both Blockchain @ Berkeley’s general funds and for our specific projects and events, such as workshops and conferences.
In terms of recruitment, we have many talented members and if you would like to talk to us about establishing a channel for full-time or internship opportunities, we would be more than happy to talk to you. For more information, please contact our external department, which handles all our business development and partnerships, at [email protected].
Do I have to be an expert or have background in the field to join Blockchain at Berkeley?
Absolutely not! Blockchain at Berkeley aims to create a tight network of collaborators and educators in the space with any skill sets and any level of blockchain-related proficiency. Our mission is to educate the general public alongside our exciting and innovative projects.
Do I have to be a Cal student to join Blockchain @ Berkeley?
At the moment, yes, our members comprise UC Berkeley undergraduate students, graduate students, professors, and alumni. If you are not a Cal student, we would love for you to be a part of our community! Feel free to join our Discord, as well as follow us on our social media pages linked below.
What makes Blockchain @ Berkeley different from other tech clubs on campus?
Blockchain @ Berkeley focuses on expanding and defining the boundaries of a new, burgeoning field. We have the unique privilege in being able to partake in this revolution of sorts, and make active decisions in shaping not only this space, but the decentralized world’s future. Several start-ups, research labs, and non-profits have spun out of B@B; that in itself shows our unique entrepreneurial attitude and impact in the space(For a full list, click <here>). Our work and community extends beyond the campus, and while we provide opportunities in education and projects (for consultants and developers), what you get out of it is ultimately up to you. Members become experts in niche areas of blockchain with just a few weeks of self-studying; they are now working on noteworthy projects with many of our connections in the industry.
Is Blockchain at Berkeley a campus organization run by Cal students?
Yes, we are a registered student organization of UC Berkeley, and our leadership team is entirely made up of Cal students. Go Bears!
How can I join Blockchain at Berkeley?
For currently enrolled Cal students of any standing, we recruit once at the beginning of every semester for a variety of positions depending on our needs at the time. Please follow our social media for the most up to date information on how to join us.
Do I have to have a technical background to be recruited by or to join Blockchain at Berkeley?
Not at all! Educating members and building experts is the main focus of Blockchain at Berkeley. While a technical background may come in handy for understanding certain topics or for participating in certain projects, we welcome members from all backgrounds! As a fully independent, self-sustaining organization, we comprise many departments beyond just a developer team. In the past, our members have had backgrounds in law, political economy, economics, business, bioengineering, computer science, mathematics, industrial engineering, and many more fields.
I have this interesting proof-of-concept or project I want to explore with the help of Blockchain at Berkeley. How would I go about doing this?
We are always interested in hearing new ideas and working on interesting projects. While projects are usually undertaken with organizational sponsors, we are always open to help with individual collaborators. For individuals interested in collaborating on a project, we ask that they have a thorough proposal/proof-of-concept ready; please check out our website for educational resources if you need help. When you are ready, please send an email to [email protected] with the subject line “Consulting: Blockchain Project Proposal” – [your full name] so we can see if our capabilities match with your needs. Please contact the above email for formal proposals.
Where can I stay up-to-date with upcoming events?
Signup for our email newsletter on our website, join our Discord, and follow us on all our social media to get the latest news, events, and opportunities!
Are events open to the public and free?
Our events are open to the public and free unless explicitly stated. However, space limitations may mean attendance caps. For limited or exclusive events, Cal students may be prioritized.
No, unless explicitly specified. For limited or exclusive events where attendance is limited, registration may occur through Eventbrite or some other medium. This information will be posted on our social media.
My organization or company wants to host an event with you. Who do I contact?
Please email [email protected] to inquire about our meetups, general meetings, and conferences and how you can potentially be involved.
There’s no official “DeCal” offering for Blockchain Fundamentals through the university, but we have a team in Education who will be running workshops and meetups throughout the semester that cover material related to Blockchain Fundamentals and Blockchain for Developers. Anyone is welcome to join (no application needed). Join our Meetup page and subscribe to our newsletter for updates on location, time, and topics. | 2019-04-18T15:34:07 | https://blockchain.berkeley.edu/contact-us/ |
0.999999 | Knowledge of propaganda techniques is necessary to improve one's own propaganda and to uncover enemy PSYOP stratagems. Techniques, however, are not substitutes for the procedures in PSYOP planning, development, or dissemination.
Characteristics of the content self-evident. additional information is required to recognize the characteristics of this type of propaganda. "Name calling" and the use of slogans are techniques of this nature.
Additional information required to be recognized. Additional information is required by the target or analyst for the use of this technique to be recognized. "Lying" is an example of this technique. The audience or analyst must have additional information in order to know whether a lie is being told.
Evident only after extended output. "Change of pace" is an example of this technique. Neither the audience nor the analyst can know that a change of pace has taken place until various amounts of propaganda have been brought into focus.
Nature of the arguments used. An argument is a reason, or a series of reasons, offered as to why the audience should behave, believe, or think in a certain manner. An argument is expressed or implied.
Inferred intent of the originator. This technique refers to the effect the propagandist wishes to achieve on the target audience. "Divisive" and "unifying" propaganda fall within this technique. It might also be classified on the basis of the effect it has on an audience.
Appeal to Authority. Appeals to authority cite prominent figures to support a position idea, argument, or course of action.
Assertion. Assertions are positive statements presented as fact. They imply that what is stated is self-evident and needs no further proof. Assertions may or may not be true.
Bandwagon and Inevitable Victory. Bandwagon-and-inevitable-victory appeals attempt to persuade the target audience to take a course of action "everyone else is taking." "Join the crowd." This technique reinforces people's natural desire to be on the winning side. This technique is used to convince the audience that a program is an expression of an irresistible mass movement and that it is in their interest to join. "Inevitable victory" invites those not already on the bandwagon to join those already on the road to certain victory. Those already, or partially, on the bandwagon are reassured that staying aboard is the best course of action.
Obtain Disapproval. This technique is used to get the audience to disapprove an action or idea by suggesting the idea is popular with groups hated, feared, or held in contempt by the target audience. Thus, if a group which supports a policy is led to believe that undesirable, subversive, or contemptible people also support it, the members of the group might decide to change their position.
Glittering Generalities. Glittering generalities are intensely emotionally appealing words so closely associated with highly valued concepts and beliefs that they carry conviction without supporting information or reason. They appeal to such emotions as love of country, home; desire for peace, freedom, glory, honor, etc. They ask for approval without examination of the reason. Though the words and phrases are vague and suggest different things to different people, their connotation is always favorable: "The concepts and programs of the propagandist are always good, desirable, virtuous."
Generalities may gain or lose effectiveness with changes in conditions. They must, therefore, be responsive to current conditions. Phrases which called up pleasant associations at one time may evoke unpleasant or unfavorable connotations at another, particularly if their frame of reference has been altered.
Vagueness. Generalities are deliberately vague so that the audience may supply its own interpretations. The intention is to move the audience by use of undefined phrases, without analyzing their validity or attempting to determine their reasonableness or application.
Rationalization. Individuals or groups may use favorable generalities to rationalize questionable acts or beliefs. Vague and pleasant phrases are often used to justify such actions or beliefs.
Simplification. Favorable generalities are used to provide simple answers to complex social, political, economic, or military problems.
Transfer. This is a technique of projecting positive or negative qualities (praise or blame) of a person, entity, object, or value (an individual, group, organization, nation, patriotism, etc.) to another in order to make the second more acceptable or to discredit it. This technique is generally used to transfer blame from one member of a conflict to another. It evokes an emotional response which stimulates the target to identify with recognized authorities.
Least of Evils. This is a technique of acknowledging that the course of action being taken is perhaps undesirable but that any alternative would result in an outcome far worse. This technique is generally used to explain the need for sacrifices or to justify the seemingly harsh actions that displease the target audience or restrict personal liberties. Projecting blame on the enemy for the unpleasant or restrictive conditions is usually coupled with this technique.
Name Calling or Substitutions of Names or Moral Labels. This technique attempts to arouse prejudices in an audience by labeling the object of the propaganda campaign as something the target audience fears, hates, loathes, or finds undesirable.
-Direct name calling is used when the audience is sympathetic or neutral. It is a simple, straightforward attack on an opponent or opposing idea.
-Indirect name calling is used when direct name calling would antagonize the audience. It is a label for the degree of attack between direct name calling and insinuation. Sarcasm and ridicule are employed with this technique.
-Cartoons, illustrations, and photographs are used in name calling, often with deadly effect.
Dangers inherent in name calling: In its extreme form, name calling may indicate that the propagandist has lost his sense of proportion or is unable to conduct a positive campaign. Before using this technique, the propagandist must weigh the benefits against the possible harmful results. It is best to avoid use of this device. The obstacles are formidable, based primarily on the human tendency to close ranks against a stranger. For example, a group may despise, dislike, or even hate one of its leaders, even openly criticize him, but may (and probably will) resent any non group member who criticizes and makes disparaging remarks against that leader.
Pinpointing the Enemy: This is a form of simplification in which a complex situation is reduced to the point where the "enemy" is unequivocally identified. For example, the president of country X is forced to declare a state of emergency in order to protect the peaceful people of his country from the brutal, unprovoked aggression by the leaders of country.
Plain Folks or Common Man: The "plain folks" or "common man" approach attempts to convince the audience that the propagandist's positions reflect the common sense of the people. It is designed to win the confidence of the audience by communicating in the common manner and style of the audience. Propagandists use ordinary language and mannerisms (and clothes in face-to-face and audiovisual communications) in attempting to identify their point of view with that of the average person. With the plain folks device, the propagandist can win the confidence of persons who resent or distrust foreign sounding, intellectual speech, words, or mannerisms.
Presenting soldiers as plain folks. The propagandist wants to make the enemy feel he is fighting against soldiers who are "decent, everyday folks" much like himself; this helps to counter themes that paint the opponent as a "bloodthirsty" killer.
Presenting civilians as plain folks. The "plain folks" or "common man" device also can help to convince the enemy that the opposing nation is not composed of arrogant, immoral, deceitful, aggressive, warmongering people, but of people like himself, wishing to live at peace.
Humanizing leaders. This technique paints a more human portrait of US and friendly military and civilian leaders. It humanizes them so that the audience looks upon them as similar human beings or, preferably, as kind, wise, fatherly figures.
Vernacular. This is the contemporary language of a specific region or people as it is commonly spoken or written and includes songs, idioms, and jokes. The current vernacular of the specific target audience must be used.
Dialect. Dialect is a variation in pronunciation, grammar, and vocabulary from the norm of a region or nation. When used by the propagandist, perfection is required. This technique is best left to those to whom the dialect is native, because native level speakers are generally the best users of dialects in propaganda appeals.
Errors. Scholastic pronunciation, enunciation, and delivery give the impression of being artificial. To give the impression of spontaneity, deliberately hesitate between phrases, stammer, or mispronounce words. When not overdone, the effect is one of deep sincerity. Errors in written material may be made only when they are commonly made by members of the reading audience. Generally, errors should be restricted to colloquialisms.
Homey words. Homey words are forms of "virtue words" used in the everyday life of the average man. These words are familiar ones, such as "home," "family," "children," "farm," "neighbors," or cultural equivalents. They evoke a favorable emotional response and help transfer the sympathies of the audience to the propagandist. Homey words are widely used to evoke nostalgia. Care must be taken to assure that homey messages addressed to enemy troops do not also have the same effect on US/friendly forces.
If the propaganda or the propagandist lacks naturalness, there may be an adverse backlash. The audience may resent what it considers attempts to mock it, its language, and its ways.
Social Disapproval. This is a technique by which the propagandist marshals group acceptance and suggests that attitudes or actions contrary to the one outlined will result in social rejection, disapproval, or outright ostracism. The latter, ostracism, is a control practice widely used within peer groups and traditional societies.
Virtue Words. These are words in the value system of the target audience which tend to produce a positive image when attached to a person or issue. Peace, happiness, security, wise leadership, freedom, etc., are virtue words.
Slogans. A slogan is a brief striking phrase that may include labeling and stereotyping. If ideas can be sloganized, they should be, as good slogans are self-perpetuating.
Official Sanction. The testimonial authority must have given the endorsement or be clearly on record as having approved the attributed idea, concept, action, or belief.
Accomplishment. People have confidence in an authority who has demonstrated outstanding ability and proficiency in his field. This accomplishment should be related to the subject of the testimonial.
Identification with the target. People have greater confidence in an authority with whom they have a common bond. For example, the soldier more readily trusts an officer with whom he has undergone similar arduous experiences than a civilian authority on military subjects.
Position of authority. The official position of authority may instill confidence in the testimony; i.e., head of state, division commander, etc.
Inanimate objects. Inanimate objects may be used in the testimonial device. In such cases, the propagandist seeks to transfer physical attributes of an inanimate object to the message. The Rock of Gibraltar, for example, is a type of inanimate object associated with steadfast strength.
Enemy leaders. The enemy target audience will generally place great value on its high level military leaders as a source of information.
Fellow soldiers. Because of their common experiences, soldiers form a bond of comradeship. As a result, those in the armed forces are inclined to pay close attention to what other soldiers have to say.
Opposing leaders. Testimonials of leaders of the opposing nation are of particular value in messages that outline war aims and objectives for administering the enemy nation after it capitulates.
Famous scholars, writers, and other personalities. Frequently, statements of civilians known to the target as authoritative or famous scholars, writers, scientists, commentators, etc., can be effectively used in propaganda messages.
Institutions, ideologies, national flags, religious, and other nonpersonal sources are often used. The creeds, beliefs, principles, or dogmas of respected authorities or other public figures may make effective propaganda testimonials.
Plausibility. The testimonial must be plausible to the target audience. The esteem in which an authority is held by the target audience will not always transfer an implausible testimonial into effective propaganda.
False testimonials. Never use false testimonials. Highly selective testimonials? Yes. Lies (fabrications)? Never. Fabricated (false) testimonials are extremely vulnerable because their lack of authenticity makes them easy to challenge and discredit.
Incredible truths. There are times when the unbelievable (incredible) truth not only can but should be used.
When the psychological operator is certain that a vitally important event will take place.
A catastrophic event, or one of significant tactical or strategic importance, unfavorable to the enemy has occurred and the news has been hidden from the enemy public or troops.
The enemy government has denied or glossed over an event detrimental to its cause.
A double-cutting edge. This technique has a double-cutting edge: It increases the credibility of the US/friendly psychological operator while decreasing the credibility of the enemy to the enemy's target audience. Advanced security clearance must be obtained before using this technique so that operations or projects will not be jeopardized or compromised. Actually, propagandists using this technique will normally require access to special compartmented information and facilities to avoid compromise of other sensitive operations or projects of agencies of the US Government.
Though such news will be incredible to the enemy public, it should be given full play by the psychological operator. This event and its significance will eventually become known to the enemy public in spite of government efforts to hide it. The public will recall (the psychological operator will "help" the recall process) that the incredible news was received from US/allied sources. They will also recall the deception of their government. The prime requirement in using this technique is that the disseminated incredible truth must be or be certain to become a reality.
Insinuation. Insinuation is used to create or stir up the suspicions of the target audience against ideas, groups, or individuals in order to divide an enemy. The propagandist hints, suggests, and implies, allowing the audience to draw its own conclusions. Latent suspicions and cleavages within the enemy camp are exploited in an attempt to structure them into active expressions of disunity which weaken the enemy's war effort.
- Political differences between the enemy nation and its allies or satellites.
- Ethnic and regional differences.
- Religious, political, economic, or social differences.
- History of civilian animosity or unfair treatment toward enemy soldiers.
- Comforts available to rear area soldiers and not available to combat soldiers.
- People versus the bureaucracy or hierarchy.
- Political differences between the ruling elite, between coalitions members, or between rulers and those out of power.
- Differences showing a few benefiting at the expense of the general populace.
- Unequal or inequitable tax burdens, or the high level of taxes. The audience should be informed of hidden taxes.
- The scarcity of consumer goods for the general public and their availability to the various elites and the dishonest.
- Costs of present government policies in terms of lost opportunities to accomplish constructive socially desirable goals.
- The powerlessness of the individual. (This may be used to split the audience from the policies of its government by disassociating its members from those policies.) This technique could be used in preparing a campaign to gain opposition to those government policies.
- Leading questions: The propagandist may ask questions which suggest only one possible answer. Thus, the question, "What is there to do now that your unit is surrounded and you are completely cut off?" insinuates that surrender or desertion is the only reasonable alternative to annihilation.
- Humor: Humor can be an effective form of insinuation. Jokes and cartoons about the enemy find a ready audience among those persons in the target country or military camp who normally reject straightforward accusations or assertions. Jokes about totalitarian leaders and their subordinates often spread with ease and rapidity. However, the psychological operator must realize that appreciation of humor differs among target groups and so keep humor within the appropriate cultural context.
- Pure motives. This technique makes it clear that the side represented by the propagandist is acting in the best interests of the target audience, insinuating that the enemy is acting to the contrary. For example, the propagandist can use the theme that a satellite force fighting on the side of the enemy is insuring the continued subjugation of its country by helping the common enemy.
- Guilt by association: Guilt by association links a person, group, or idea to other persons, groups, or ideas repugnant to the target audience. The insinuation is that the connection is not mutual, accidental, or superficial.
- Rumor: Malicious rumors are also a potentially effective form of insinuation.
- Pictorial and photographic propaganda: A photograph, picture, or cartoon can often insinuate a derogatory charge more effectively than words. The combination of words and photograph, picture, or cartoon can be far more effective. In this content, selected and composite photographs can be extremely effective.
- Vocal: Radio propagandists can artfully suggest a derogatory notion, not only with the words they use, but also by the way in which they deliver them. Significant pauses, tonal inflections, sarcastic pronunciation, ridiculing enunciation, can be more subtle than written insinuation.
Card stacking or selective omission. This is the process of choosing from a variety of facts only those which support the propagandist's purpose. In using this technique, facts are selected and presented which most effectively strengthen and authenticate the point of view of the propagandist. It includes the collection of all available material pertaining to a subject and the selection of that material which most effectively supports the propaganda line. Card stacking, case making, and censorship are all forms of selection. Success or failure depends on how successful the propagandist is in selecting facts or "cards" and presenting or "stacking" them.
Increase prestige. In time of armed conflict, leading personalities, economic and social systems, and other institutions making up a nation are constantly subjected to propaganda attacks. Card stacking is used to counter these attacks by publicizing and reiterating the best qualities of the institutions, concepts, or persons being attacked. Like most propaganda techniques, card stacking is used to supplement other methods.
The technique may also be used to describe a subject as virtuous or evil and to give simple answers to a complicated subject.
- First, the propagandist selects only favorable facts and presents them to the target in such a manner as to obtain a desired reaction.
- Second, the propagandist uses these facts as a basis for conclusions, trying to lead the audience into accepting the conclusions by accepting the facts presented.
Presenting the other side. Some persons in a target audience believe that neither belligerent is entirely virtuous. To them propaganda solely in terms of right and wrong may not be credible. Agreement with minor aspects of the enemy's point of view may overcome this cynicism. Another use of presenting the other side is to reduce the impact of propaganda that opposing propagandists are likely to be card stacking (selective omission).
Lying and distortion. Lying is stating as truth that which is contrary to fact. For example, assertions may be lies. This technique will not be used by US personnel. It is presented for use of the analyst of enemy propaganda.
Simplification. This is a technique in which the many facts of a situation are reduced so the right or wrong, good or evil, of an act or decision is obvious to all. This technique (simplification) provides simple solutions for complex problems. By suggesting apparently simple solutions for complex problems, this technique offers simplified interpretations of events, ideas, concepts, or personalities. Statements are positive and firm; qualifying words are never used.
Simplification may be used to sway uneducated and educated audiences. This is true because many persons are well educated or highly skilled, trained specialists in a specific field, but the limitations of time and energy often force them to turn to and accept simplifications to understand, relate, and react to other areas of interest.
It thinks for others: Some people accept information which they cannot verify personally as long as the source is acceptable to them or the authority is considered expert. Others absorb whatever they read, see, or hear with little or no discrimination. Some people are too lazy or unconcerned to think problems through. Others are uneducated and willingly accept convenient simplifications.
It is concise: Simplification gives the impression of going to the heart of the matter in a few words. The average member of the target audience will not even consider that there may be another answer to the problem.
It builds ego: Some people are reluctant to believe that any field of endeavor, except their own, is difficult to understand. For example, a layman is pleased to hear that '"law is just common sense dressed up in fancy language," or "modern art is really a hodgepodge of aimless experiment or nonsense." Such statements reinforce the ego of the lay audience. It is what they would like to believe, because they are afraid that law and modern art may actually be beyond their understanding. Simple explanations are given for complex subjects and problems.
Stereotyping is a form of simplification used to fit persons, groups, nations, or events into ready-made categories that tend to produce a desired image of good or bad. Stereotyping puts the subject (people, nations, etc.) or event into a simplistic pattern without any distinguishing individual characteristics.
Change of Pace. Change of pace is a technique of switching from belligerent to peaceful output, from "hot" to "cold," from persuasion to threat, from gloomy prophecy to optimism, from emotion to fact.
Stalling. Stalling is a technique of deliberately withholding information until its timeliness is past, thereby reducing the possibility of undesired impact.
Shift of Scene. With this technique, the propagandist replaces one "field of battle" with another. It is an attempt to take the spotlight off an unfavorable situation or condition by shifting it to another, preferably of the opponent, so as to force the enemy to go on the defense.
An idea or position is repeated in an attempt to elicit an almost automatic response from the audience or to reinforce an audience's opinion or attitude. This technique is extremely valid and useful because the human being is basically a creature of habit and develops skills and values by repetition (like walking, talking, code of ethics, etc.). An idea or position may be repeated many times in one message or in many messages. The intent is the same in both instances, namely, to elicit an immediate response or to reinforce an opinion or attitude.
The audience is not familiar with the details of the threat posed. Ignorance of the details can be used to pose a threat and build fear.
Members of the audience are self-centered.
The target can take immediate action to execute simple, specific instructions.
Fear of change. People fear change, particularly sudden, imposed change over which they have no control. They fear it will take from them status, wealth, family, friends, comfort, safety, life, or limb. That's why the man in the foxhole hesitates to leave it. He knows and is accustomed to the safety it affords. He is afraid that moving out of his foxhole will expose him to new and greater danger. That is why the psychological campaign must give him a safe, honorable way out of his predicament or situation.
Terrorism. The United States is absolutely opposed to the use of terror or terror tactics. But the psychological operator can give a boomerang effect to enemy terror, making it reverberate against the practitioner, making him repugnant to his own people, and all others who see the results of his heinous savagery. This can be done by disseminating fully captioned photographs in the populated areas of the terrorist's homeland. Such leaflets will separate civilians from their armed forces; it will give them second thoughts about the decency and honorableness of their cause, make them wonder about the righteousness of their ideology, and make the terrorists repugnant to them. Follow-up leaflets can "fire the flames" of repugnancy, indignation, and doubt, as most civilizations find terror repugnant.
In third countries. Fully captioned photographs depicting terroristic acts may be widely distributed in third countries (including the nation sponsoring the enemy) where they will instill a deep revulsion in the general populace. Distribution in neutral countries is particularly desirable in order to swing the weight of unbiased humanitarian opinion against the enemy.
The enemy may try to rationalize and excuse its conduct (terroristic), but in so doing, it will compound the adverse effect of its actions, because it can never deny the validity of true photographic representations of its acts. Thus, world opinion will sway to the side of the victimized people.
Friendly territory. Under no circumstances should such leaflets be distributed in friendly territory. To distribute them in the friendly area in which the terrorists' acts took place would only create feelings of insecurity. This would defeat the purpose of the psychological operator, which is to build confidence in the government or agency he represents. | 2019-04-19T09:18:51 | https://drmenlo.com/abuddha/condition.html |
0.999997 | CAN we talk? That's the question the French government is asking 9 million young people this summer. A questionnaire sent to all 15-to-25-year-olds seeks comments on 58 statements about school, family, work, and society. When responses are tabulated, Prime Minister Edouard Balladur hopes to learn why so many French youths have little faith in the future.
What a novel idea - consulting young people about their opinions! How much easier it would be for talk show hosts and their adult guests simply to theorize about adolescent alienation, generation gaps, and the Angst besetting so-called Generation X. How much harder - and braver - to go to the youthful experts themselves, even giving them space on the questionnaire to write their own ideas and identify their priorities and ideals.
The completed forms will undoubtedly yield surprises. In fact, French officials eager for a preview might find clues in a much smaller poll of American teenagers conducted earlier this summer. The New York Times and CBS News asked more than 1,000 13-to-17-year-olds about their parents, friends, school, and work. The answers were often poignant, revealing young lives shadowed by violence, worry about the future, and distrust of adults.
Four out of 10 said that their parents sometimes or often are not available when they need them. And although many teenagers find their peers a solace, they also see them as a source of fear and menace. Often isolated, lonely, and scared, these young people appear cut off from the very sources of support they most need.
Call it Generation F - for Forgotten.
Yet contrary to stereotypes of teenagers as unwilling to communicate with adults, poll interviewers found young people, ``more often than not, were open and eager to talk,'' according to The New York Times.
Talking teenagers, listening adults - the solution seems so simple. Still, talk alone can't make the present more satisfying and the future more promising for young people.
If adults are to help give teenagers moral bearings and a sense of purpose, says Rev. Michael Thompson, senior pastor of the Tabernacle Church in Melbourne, Fla., they must understand the ``major sociological shapers'' affecting young people. Writing in Ministries Today, Reverend Thompson places the breakdown of the family high on his list of these shapers. He states: ``No wonder kids today have almost no relational skills. They haven't lived in a family environment to develop them.'' Media saturation also takes its toll.
What else do teenagers want? Even teenagers may not really know - which makes them just like adults. But trying to explain themselves - on a questionnaire or face to face - is a necessary part of the discovery process. It's certainly their turn to say more than, ``You don't understand me.'' And it's certainly the turn of adults who love them to listen with care and respect, as if the future depends upon connecting their generations. Which it does. | 2019-04-20T08:15:54 | https://www.csmonitor.com/1994/0721/21132.html |
0.998653 | ABSTRACT: A much-celebrated aspect of language is the way in which it allows us to express and comprehend an unbounded number of thoughts. This property is made possible because language consists of several combinatorial systems which can be used to creatively build novel words and sentences using large inventory of stored, reusable units. For any given language, however, there are many more potentially storable units of structure than are actually used in practice --- each giving rise to many ways of forming novel expressions. For example, English contains suffixes which are highly productive and generalizable (e.g., -ness; Lady-Gagaesqueness, pine-scentedness) and suffixes which can only be reused in specific words, and cannot be generalized (e.g., -th; truth, width, warmth). How are such differences in generalizability and reusability represented? What are the basic, stored building blocks at each level of linguistic structure? When is generalization possible when is it not? How can the child acquire these systems of knowledge? I will discuss how tools from machine learning, artificial intelligence, and computational linguistics can address these problems. The general approach is based on the idea that the problem of computation and storage can be solved by using a probabilistic tradeoff between a pressure to store fewer, more reusable units and a pressure to account for each linguistic expression with as little computation as possible. This tradeoff is grounded in foundational principles of inductive inference, but has surprisingly far reaching implications across multiple levels of linguistic structure. I will discuss several specific models based on this framework and provide examples of how the approach can help solve long standing empirical puzzles, simplify existing theories, and connect linguistic theories to psychology and computer science.
BIO: Tim is a Research Scientist at MIT and in his research, he develops mathematical models of language generalization, learning, and processing. His research draws on experimental methods from psychology, formal modeling techniques from natural language processing, theoretical tools from linguistics, and problems from all three. | 2019-04-26T06:48:37 | http://www.sas.rochester.edu/dsc/events/2016/02/gids-coe-seminar-feb-tim.html |
0.998605 | Mrs. Bixby went out closing the door loudly behind her. At that exact moment, Miss Pulteney, her husband's assistant, came sailing past her on her way to lunch and greeted Mrs. Bixby, smiling brightly. She walked in a very proud and confident way, and she looked like a queen, exactly like a queen in the beautiful black mink coat that the Colonel had given to Mrs. Bixby.
Is it similar to: came past her with pride ?
Sailing might describe someone moving gracefully and with aplomb, perhaps rapidly but not in a hurry.
So it is not an expression.
Then, came past her means that as Miss Pulteney was leaving to have her lunch she pass next to Mrs. Bixby?
Yes - it is an expression. It does mean that she passed by next to her - in the busy manner that Bibilept described. | 2019-04-24T23:45:41 | https://forum.wordreference.com/threads/came-sailing-past-her.618180/ |
0.911684 | How to enjoy the restaurant before the game?
The restaurant industry is very competitive. There are franchises, and everywhere restaurants, and every corner. If you have a restaurant that is not part of the chain, it may be difficult to stay ahead of us. One way to stay ahead is to have a section that differs from others and this attracts customers.
So his restaurant is in front of the game.
Custom meals in the menu. Create foods that no one else does. There is a special restaurant in the area that offers Mediterranean dishes with tasty screws and large portions. Foods are delicious and people return to try all the other meals.
Adding Valuable Service. This can be anything that you offer for free. This can be a free coffee cup with breakfast or unlimited fresh drinks when the customer orders a given lunch. You can run a purchase, a free promotion that encourages people to come in groups. If you offer this offer, you will notice that you will order other items from the menu to increase your sales.
Be child friendly with a playground. Most people have a family, especially young children. Add a safe play area with a supervised nurse who can watch the kids while my mom and dad can enjoy their meals. The playground can make a difference between a family who has chosen your restaurant or another nearby place.
Suggest a reward system. Encourage your clients to establish a loyalty program at the restaurant where they get a free holiday on their birthday or a discount on their tenth meal.
Update the restaurant. Decide on an interesting theme in the restaurant so that people can enjoy the escape. There is a restaurant with a 70's dining room with modern décor. It creates a comfortable environment that is fun and easy. Clients return to enjoy the environment.
Investing in Quality Commercial Catering Equipment . If we cut the best catering equipment, risk and prepare food, customers will notice it. Appropriate catering facilities ensure that you are more consistent with each meal because you will be able to check the timing and the size of each meal you've prepared.
In such a competitive industry, it's imperative to look at the restaurant long hard and make the necessary changes to attract as many customers as possible and ultimately stay in business. | 2019-04-23T20:43:33 | https://rfic2007.org/how-to-enjoy-the-restaurant-before-the-game/ |
0.999995 | Since the end of August 1999, the US Coast Guard have been asking to see details of ships' Y2K contingency plans whilst conducting onboard PSC inspections. The results of equipment investigations and tests have also been required and inquiries have been made of key personnel to ensure they are familiar with their own Y2K contingency plan duties. This is in addition to the requirement that Y2K readiness questionnaires must be filed with the Coast Guard ahead of a ship's arrival in US waters.
At the beginning of this month a number of ships were detained and delayed as the Coast Guard made its checks on ships moving around the 9/9/99 risk period. This was because the ships failed to meet the requirements for filing readiness questionnaires or failed to have an operational contingency plan in place. The remaining peak risk periods, that have been designated as such by the Coastguard, are 31st December 1999 through 1st January 2000 and 28th Febuary 2000 through 29th Febuary 2000. Similar detentions and delays may be anticipated around those times as well.
(b) Ships operating in US waters until 31st March 2000 but not during any of the peak risk periods.
(a) Ships reporting under (a) are required to complete and submit an IMO Questionnaire 2 form and a US Supplement form (found at www.uscg.mil/hq/g-m/y2kweb/startup.htm). A separate US Supplement form must be filled in for each ship. If the answers to the questions in the IMO Questionnaire 2 form are the same for each ship in the fleet, only one need be completed and submitted. If the answers to the questions in the IMO Questionnaire 2 differ between the ships in the fleet, separate forms must be completed for ships that generate different answers. Ships reporting under (b) need only complete US Supplement forms. Again one form must be submitted for each ship in the fleet. If a ship’s Y2K readiness status changes or the contingency plans relating to the ship are altered, the Coast Guard requires the questionnaires to be completed afresh and re-submitted. The questionnaires can be submitted to the Coast Guard by mail, by fax (+1-877-825-4357 for reporting from within the US and +1-703-522-1839 for reporting from outside the US) or on-line via the Coast Guard’s website.
Propulsion machinery under the direct, manual supervision of a senior engineering officer (particularly for ships operating with reduced engineering watches by reason of automated systems allowing minimally attended or periodically unattended machinery plant operation).
Propulsion machinery tested in the ahead and the astern conditions immediately prior to entering the 12 mile limit.
Steering gear room manned and emergency steering control tested immediately prior to entering the 12 mile limit. (If the engine room is adjacent to the steering gear room, the manning the steering gear room is not required, however a test of emergency steering control should definitely be conducted).
A minimum of two navigation officers on the bridge of ships with automated navigation systems such as ARPA or autopilot. (The autopilot should be disengaged and should not be used during peak risk periods).
Anchor detail on standby so that the master can be sure that no delay would be encountered letting-go anchors if necessary.
Towlines rigged fore and aft and ready for immediate use.
A ship will also be denied entry if, during one of the peak risk periods, it seeks to enter US waters but has not completed and submitted the readiness reporting forms. The deadline for submitting the Y2K readiness reporting questionnaires for US ships was August 20, 1999 and therefore has already passed. For non-US ships entering US waters the deadline is 24 hours before arrival but we must recommend that the reports are submitted as soon as conveniently possible so that the information can be collected and processed into the holding database in good time. | 2019-04-26T10:50:34 | https://www.ukpandi.com/ja/%E3%83%8B%E3%83%A5%E3%83%BC%E3%82%B9%E3%81%A8%E5%87%BA%E7%89%88%E7%89%A9/article/110-9-99-y2k-readiness-uscg-requirements-1316/ |
0.999992 | If you are good at math, you are good at programming. True or False?
When I was in school, my dad showed me a picture on the cover of my math textbook. The picture was of a kid using a computer. He then said, "You want to learn computer, you should be good with math."
I never really understood what he mean't by that because I was okay on the subject, but not brilliant. And another fact was that PCs were using GUI interfaces. Why would someone need to be good at math to use a computer?
It is now that I only realised that the statement might have more relevance if you are into programming not facebooking.
So is this statement true or false? Since I new to programming, I thought I'll leave it to the experts to answer.
I answered false because I think it is not a direct relation. That is I don't think that being good at math automatically makes you good at coding. However, it does give you quite a lot of tools to have a better understanding of some concepts and to learn faster as well.
false, but it's a great tool to have.
I've been a math whiz for a long time, but it's only recently that I've gotten into programming. Programming is not just math, it's also logic (and puzzle-solving/problem-solving in the case of finding and fixing bugs). There's probably several around that are bad at math, barely able to add two-digit numbers that could still program.
That depends on what you're programming usually.
And sure there's nothing stopping you from "using" X. Even if you don't understand how X works, but you do understand that X is better than Y (for whatever reason). Although not sure I'd call someone like that a "good programmer" :-).
He then said, "You want to learn computer, you should be good with math."
But your poll is asking something different: "It is enough to know math to be good with computers"
I was never particularly great at math in School, and whilst I can add small numbers up, or calculate the VAT (used to be 17.5%) by using "10% and half therof, and half again" is probably more down to having to do that all the time when programming, rather than having an innate ability for math.
I also have a colleague who is a PhD in Math - he's certainly more clever than me in both programming AND math - but I don't think there is a DIRECT correlation.
Certainly, to solve math problems, you need similar skills to programming skills. But there are many parts of programming where the math you need to solve the problem ranges between "none at all" to "what you learn in the first three years of school" (that is, simple add, subtract and some multiplication).
Of course, being able to figure out how to go from two X,Y coordinate to an angle and back again will certainly help in 3D graphics, even if you don't need it in 2D graphics.
It's not that anyone good at math is good at programming, obviously, since someone good at math may never have seen a programming language.
However, I think that any one smart enough to be really good at math is smart enough to learn a programming language properly. And to be really good at programming, you need to be not-too-bad at maths.
I doubt there's any good mathematician whose brain is not capable of comprehending the concept of programming and debugging properly.
Well I just hope that math isn't useless(!), because I just took statistics for the summer. I was going to ask if that would be helpful in systems analysis or business applications programming, but all the other math threads had half the people saying it was helpful.
It depends on what kind of programming you want to get into, really. I almost never use much math at work, because I program web apps. If you get more into the theoretical side of CS, statistics might come a bit more in handy!
Adding tax in is fairly easy - "FinalCost = BaseCost * (1+TaxRate)" is how - TaxRate is converted to decimal form. Thus, for 17.5%, you'd multiply the base cost by 1.175 to get it.
How about finding how to go from two X, Y, and Z positions instead of just X and Y? How about finding this angle (pan and tilt)?
I believe that everything in the universe is numerical in some form or another and since it is, there are mathematical rules that can be applied to pretty much anything.
False. But math can never hurt.
This depends on what you mean by math and programming.
To me, programming is just a way of communicating ideas in a very simple manner, namely writing down instructions in form of a recipe. If you can write it down in your native tongue, then you can also write it down in a programming language once you know how to make programs. From this point of view, you don't need "math" to be a good programmer. You just need a text editor.
With programming skills alone, you will have a hard time implementing these programs. With a bit of experience in math/theoretical computer science, you'll know in advance that it's impossible to do, or you can at least come up with the according proof. But even if the problem is solvable, you will need a high amount of math to argue about soundness, correctness and efficiency of your program. Forget about web applications and think of operating systems for atomic power plants, aircrafts, traffic lights or your car. If you can't prove that your program always does what it's supposed to do, it is worth nothing.
What does it mean to be a good programmer? If you can solve any problem that's solvable, but your code is impossible for anybody but you to understand, are you a good programmer?
And some of the worst code from an engineering standpoint that I've ever seen, was written by computer science professors.
I think a better implication would be "good at math => good at computer science," but computer science is not the same thing as programming.
Logical thinking is the key. Math requires it... so does programming. So that's the common link. But one does not imply or require the other.
I've seen chemical engineers and atomic scientists be terrible programmers. I'm sure they're smart in their fields but they couldn't create algorithms. Perhaps their disciplines do not require that kind of logical reasoning.
Perhaps they got their degrees by being able to learn by rote and they have some fantastic memory retention abilities. But I'm sure they wouldn't mind double integrals with their tea. Whereas my brain started hurting by the end of 1st year university math. Yet I excelled in 3rd year computer science. So there is a disconnect.
Programming (I'm not talking script-kiddie stuff) requires being able to come up with new combinations of functions and data types which aren't obvious from the stated problem or even the desired solutions. Directly. It is the ability to generate a chain of intermediate steps, of some arbitrary length... until the problem is done.
I think the question is too broad. "Math" is an unknown. I'm sure there are some branches of math that overlap the same areas of the brain as does programming. But certainly not all math.
I think a more interesting question might be: "Can an accomplished programmer be good at other tasks? Such as taking apart an engine, fixing house-wiring? Putting up drywall? Once they are shown how once or twice?" I think the answer is YES. In my opinion programmers have that inherent ability to apply logical thinking and keen observation in every-day situations. No they won't do those other tasks as well (business wise) as a veteran mechanic, but they will do them meticulously and likely with better quality.... and take 10x as long. Hence not be able to make money on that.
The same can't be said for most other disciplines trying to come over to programming as an afterthought.
My biased opinion of course. | 2019-04-25T00:58:40 | https://cboard.cprogramming.com/archive/index.php/t-114199.html?s=d9268b0c75fd3f0e6c99cd7713469813 |
0.998515 | The candidate must have knowledge of various mixed drinks, handling all cash and credit card transactions as well as providing excellent customer service in multiple outlets. The candidate must be willing to work in different bar areas as needed to take drink and food orders. The candidate must be able to provide efficient friendly customer service at all times and to maintain a clean, professional top quality bar.
Must be willing to work well under pressure and have the ability to multi-task. | 2019-04-21T07:09:21 | https://louisiana.jobing.com/omni-hotels-resorts/cocktail-server-2-37260613 |
0.999979 | "It takes a theory to beat a theory"--this is surely one of the top ten all-time comments uttered by law professors to one another in those ritual interactions that are called "faculty workshops" or "colloquia." The first instance of the comment that I can find in the legal literature appears in an article by Richard Epstein [92 Yale Law Journal 1435 (1983)], and some legal academics associate the comment with Professor Epstein, whose facility in law faculty workshops is legendary.
What does "It takes a theory to beat a theory" mean? What is the point or purpose of making this comment in a debate about normative or positive legal theory? Of course, the core idea is relatively straightforward. One can't beat a theory just by nitpicking. We go with the best theory we have, warts and all. So if you want to beat a theory, you must show it is not the best theory we have, and the only way to do that is to produce a better theory. Hence, it takes a theory to beat a theory. Or to put it crudely, if we are playing "king of the hill," whoever is on top stays there until pushed off.
Most of the entries in the Legal Theory Lexicon series deal with some concept, theory, or idea that law students are likely to encounter in their first year of law school. But this entry is a little different. "It takes a theory to beat a theory" is not likely to be heard much in the classroom. It's a "workshop comment" not a "class comment." But in a way, that makes this idea all the important for law students, including first year law students, with an interest in legal theory. And understanding this move and its counters is essential for anyone who plans a career in the legal academy.
Apart from the frailty of its theoretical underpinning, nonoriginalism confronts a practical difficulty reminiscent of the truism of elective politics that "You can't beat somebody with nobody."' It is not enough to demonstrate that the other fellow's candidate (originalism) is no good; one must also agree upon another candidate to replace him. Just as it is not very meaningful for a voter to vote "non-Reagan,"' it is not very helpful to tell a judge to be a "non-originalist."' If the law is to make any attempt at consistency and predictability, surely there must be general agreement not only that judges reject one exegetical approach (originalism), but that they adopt another. And it is hard to discern any emerging consensus among the nonoriginalists as to what this might be.
Nevertheless the economic theory of regulation is achieving a substantial scientific prosperity. Its findings with respect to both the operation and the origins of regulatory policies directed to particular industries (such as the securities markets, transportation, and occupational licensing) command a substantial support. To be sure, the explanatory triumphs have not been overwhelming, and indeed the theory itself is still relatively primitive. The main reason for the considerable acceptance of the approach is that fundamental rule of scientific combat: it takes a theory to beat a theory. No amount of scepticism about the fertility of a theory can deter its use unless the sceptic can point to another route by which the scientific problem of regulation can be studied successfully.
--"It takes a practice to replace a practice." This variation is at the root of Scalia's point. You can't vote against a candidate; you must vote for someone. You can't just stop interpreting the constitution if you reject originalism; it takes some other interpretive practice to substitute for originalism.
--"It takes a better explanatory theory to substitute for a theory that has even limited success." This variation is at the root of Stigler's point. The economic theory has some success; so it will continue as the "dominant paradigm" until something better comes along.
--"It takes a better normative theory to substitute for a normative theory that has plausible support." Thus, one might say that it takes a better theory of justice to displace Rawls's theory.
And I'm sure there are many other variations.
--Expose the hidden "presumption." It takes a theory to beat a theory may assume that the theory in question must be "beaten" or it stands. But that assumption requires a justification. It must be argued there is some "presumption" in favor of the theory's validity. What is the source of that presumption? Why does this theory enjoy the presumption rather than a rival theory? Sometimes these questions can't be answered. Other times there are answers, but once they are articulated, they can be contested.
--It doesn't take a theory to beat an argument. Even if it does take a theory to beat a theory, it doesn't take a theory to beat an argument. Arguments fail if they are invalid or unsound. Arguments are invalid if the conclusions don't flow from the premises. Arguments are unsound if their premises are false. So when someone says, "It takes a theory to beat a theory," you can reply, "Oh, you thought I was trying to beat a theory, but what I actually did was to beat an argument."
--Recharacterize the Status Quo. Frequently, "it takes a theory to beat a theory," assumes that the theory to be beaten is, in some sense, the status quo--the current king of the hill, the way we are doing or thinking now. But this is not necessarily the case. Take the "originalism" example. One might argue that "originalism" isn't the "king of the hill." Rather, the status quo is eclecticism--a little precedent, a little originalism, a little instrumentalism, etc. So if the case for originalism is inadequate, the presumption is for the status quo--not originalism. In other words, poking holes may be enough. Once the theory in question is no longer the status quo, the question becomes is the new theory demonstrably better than what we've got now.
The last ditch defense of the rational choice theory is to insist that it takes a theory to beat a theory, and that the behavioralists have only assembled a collection of empirical regularities without any unifying theory. The behavioralists indignantly respond that they do have a theory, although an incomplete one. The assumption on both sides is apparently that the sine qua non of social science is having a unified predictive theory. But perhaps this is merely another symptom of economics' famous case of "physics envy." Physics presents a breathtaking example of mathematical elegance combined with fantastically accurate predictions. But taking physics as the paradigm of science may be a mistake. Today's great success story among the sciences may well be biology. Biology does have a central paradigm (evolution) and an understanding of its molecular basis. But organisms, because they are the products of evolution rather than design, are extremely complex, and no one seems to think that their features can be predicted in any detail on the basis of a deductive theory.
There are many ways of doing this. Here's one way of making the move: "Hmm. You seem to be assuming that we need a theory here. I'm puzzled. Why would you assume that?" Stressing the words in italics. This move puts the burden on the maker of the "It takes a theory to beat a theory" move to justify the theory assumption--and as a practical matter, it also buys you time.
--Go Pragmatic. This is a variation of denying the theory assumption. When someone asks for a theory, you can reply that the subject at hand requires a "contextualist" and "pragmatic" analysis. As the scare quotes indicate, I'm not very fond of this move.
One frequently hears it said that "it takes a theory to beat a theory." Those who invoke that view are typically doing so in order to justify maintaining the rational choice paradigm until some well-articulated theory comes along to replace it. That is not, however, how scientific advances typically occur. Rather, anomalies arise and are either explained within an amended paradigm or serve as observations that make a case for another paradigm (as yet undefined).
--I've Got a Theory. Of course, this move is especially impressive in the context of a workshop. Your paper makes a critical or destructive point. Someone in the audience goes "It takes a theory to beat a theory." And you go, "Great point. I've got a theory and here it is." You then get 5 minutes of uninterrupted theory exposition, and, of course, no one at the workshop has heard your theory before, and hence, no one has had an opportunity to prepare objections.
--It Takes a Theory to Beat a Theory, but you have no Theory. This is a variation of Lloyd Bentsen's famous, "Senator, you are no Jack Kennedy." The idea is this: "It takes a theory to beat a theory," assumes that we have a theory of X on the table. So one effective counter is an argument that there is no "theory of x" to replace. One way to do this is to set out a list of criteria, C1, C2, C3 . . . Cn, that must be fulfilled if a given cluster of ideas (I1, I2, I3, . . . In) is to count as a theory, T, of a subject, X. You then argue that the view on the table is not a true theory, because it fails one or more of the criteria.
A variation on this move is "It doesn't take a theory to beat a really bad theory." If your objection to a theory makes it clear that the theory cannot be correct, then it doesn't take theory to beat a theory. Or to continue the metaphor, "You don't have to become the king of the hill to knock someone down."
Undoubtedly, there are many other standard countermoves and numerous others that are relevant to particular contexts. I hope this post gets you started.
"It takes a theory to beat a theory." Or does it? I hope this Lexicon installment has given you a taste of this famous move and some of the replies. And I also hope that it has provided some of the flavor of the intellectual atmosphere of faculty workshops and colloquia. As always, theLexicon provides only a simplified (and all too often simplistic) treatment of a subject that deserves an extended discussion.
Richard A. Epstein, Common Law, Labor Law, and Reality: A Rejoinder to Professors Getman and Kohler, 92 Yale Law Journal 1435 (1983).
George J. Stigler, The Process and Progress of Economics, Nobel Memorial Lecture, 8 December, 1982.
Thomas S. Ulen, A Nobel Prize in Legal Science: Theory, Empirical Work, and the Scientific Method in the Study of Law, 2002 U. Ill. L. Rev. 875, 887, n. 47. | 2019-04-21T15:13:35 | https://lsolum.typepad.com/legal_theory_lexicon/aphorisms_and_expressions/ |
0.999967 | No name papers: The policy on no-name papers is as follows: Student will receive 5 points off their assignment if their name is not written on their papers. This will begin effect after our first progress report of the year.
Late homework: Homework that is turned in after the first 5 minutes of class (or within the first five minutes of arriving to class, should the students not be in attendance of the start of the period) will have 5 points deducted per day for 2 days. After a total of 3 days, the homework will be accepted with a grade of 0%. This will begin effect after our first progress report of the year. | 2019-04-20T07:19:39 | https://www.houstonisd.org/domain/48391 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.