proba
float64
0.5
1
text
stringlengths
16
182k
timestamp
timestamp[s]
url
stringlengths
15
1.72k
0.999995
0:13Skip to 0 minutes and 13 secondsA mass curves space time. And so a moving mass will start displacement of curvature that will be travelling throughout the universe. This is exactly what we call a gravitational wave. Now, we can take a specific example in order to get a better picture, better physical picture of a gravitational wave, which is the image of a stone that you throw in a pond. You know that when the stone reaches the surface of the water, it starts some ripples which travel through the surface of the pond. And those are deformation of a surface then we can think similarly of gravitational waves as ripples of curvature throughout the universe. We will discuss in the next sequence what are the sources of gravitational waves. 1:07Skip to 1 minute and 7 secondsFor the time being, I would like to describe the effect of the gravitational wave passing in this room, for example. I have behind me a distribution, a collection of tennis balls which represents a distribution of masses organised in a circle. Let me imagine that there is a gravitational wave passing in the room through a direction orthogonal to the plane of the circle. There are, in fact, two types of gravitational waves-- we say two polarizations. In the first case, the motion of the circle of masses is either horizontal-- the formation into an ellipse-- or vertical. And because it's a wave, it's a periodic deformation. So this is the first type of polarisation. 2:02Skip to 2 minutes and 2 secondsIn the second type, the deformation is now according to axes which are no longer vertical and horizontal but make an angle of 45 degrees. That's a second polarisation of gravitational waves. And now you can imagine that if you have a material body of some size, then it will be, again, deformed in this direction and alternatively in the other direction. And so that's through this kind of deformation of a large body that one intends to measure the presence of gravitational waves. In this example, even though we have a visual impression that the balls are moving, they are actually not moving. For example, if we had a single ball and a passing gravitational wave, the ball would just be at rest. 3:00Skip to 3 minutes and 0 secondsNow, why do we get this impression that the balls are moving? It's because the distances between the balls are moving. For example, this distance is periodically changing. And why is that? It's because the passing gravitational wave changes the structure of spacetime. So the texture of space and time changes. The curvature changes. And it is the relative distance between these two balls that is changing with time in a periodic way. 3:36Skip to 3 minutes and 36 secondsBefore moving forward, let me address an argument which was opposed to the existence of gravitational waves. Well, the argument goes as follows. We have seen that gravitational waves are deformation of spacetime. But we are ourselves immersed in that spacetime. So is it clear that we will see any effect of a passing gravitational wave? Now, that argument was opposed by the famous physicist Richard Feynman in a conference dedicated to precisely gravitational waves. And he had the following argument. He was considering a stick of some dimension and a bead that can slide around the stick. 4:34Skip to 4 minutes and 34 secondsAnd the argument is called the Sticky Bead Experiment, because the bead is actually sliding along the stick, but with some friction. Now, let us imagine that a gravitational wave is passing through the room and through the setup in this direction. We have seen that the macroscopic object, which is a stick, is going to be deformed by the passing gravitational wave-- so in this direction and in the horizontal direction as well. And of course, the bead itself will be set in motion relatively to the stick, because it's much lighter. And so it would go up and down with a larger amplitude. Now, the bead is sticky, so there is friction in the motion between the stick and the bead. 5:36Skip to 5 minutes and 36 secondsAnd so some heat will be produced. Now, the gravitational wave has passed. It is gone. And we look at the setup. Nothing has changed. We still have the stick. We still have the bead. But there is some heat which can be measured. And because of the presence of this heat, we know that the gravitational wave has passed. So that means we can detect the passing of the gravitational waves. So it was this argument that convinced everybody that indeed, gravitational wave have some physical impact on material systems. We have seen that gravity is the weakest of all fundamental forces. So that means that the motion induced by a gravitational wave is going to be very tiny. 6:32Skip to 6 minutes and 32 secondsWe're going to quantify it in what follows. But for the time being, let me stress a complementary fact. Indeed, once a gravitational wave is produced, it will travel through the universe rather unperturbed by the mass it encounters, because it interacts very weakly with that mass. And so gravitational waves are a very good messenger carrying information from the source that produces them. A wave is a periodic phenomenon which is described by its amplitude, its frequency, and its velocity. Let us start with the amplitude of gravitational waves. And let me consider again the setup of the tennis balls organised in a circle, which I reproduced here. 7:28Skip to 7 minutes and 28 secondsWhat we call the amplitude of a gravitational wave is actually the relative change of distance of these balls. So that means this is a ratio between the small distance change of this ball, for example, and the size of the overall setup. And in the case of gravitational waves produced by astrophysical sources, we expect that this ratio is of the order of 10 to the minus 21 to 10 to the minus 24. So you see this is extremely small due to the weakness of the gravitational force. 8:07Skip to 8 minutes and 7 secondsNow, this means, for example that, in the case of a circle like this one with a diameter of 1 metre-- that means that each individual ball will change by 10 to the minus 21 to 10 to the minus 25 metres, so basically impossible to see. If we think of a circle of much larger size, like 1 million kilometres-- that's typically 10 to the 9 metres-- then the change of position, the change of distance, will be 10 to the minus 12 to 10 to the minus 15. And so 10 to the minus 12 is what one calls a picometer. 8:49Skip to 8 minutes and 49 secondsAnd so this tells you the kind of distance precision that we have to reach in order to be able to measure, to detect gravitational waves. 9:04Skip to 9 minutes and 4 secondsLet us turn to the frequency of gravitational waves. We'll return to this topic, but let me just make a comparison with electromagnetic waves. In that case, we know the visible light which corresponds to a fairly narrow range of frequencies. But there is a whole wealth of frequencies actually fourteen orders of magnitude which may correspond to different astrophysical sources-- x-rays, radio sources, and so on-- which shows the richness of the electromagnetic spectrum. Exactly in the same way, the spectrum of gravitational waves depends very much on the source that produces those waves. And we have, again, a large wealth of frequencies which will allow us to identify different types of sources. 10:01Skip to 10 minutes and 1 secondFinally, the velocity of gravitational waves. Well, it is predicted to be the velocity of light. And let me give you the argument. Let us return for a second to light and electromagnetic interaction. If I consider two charges, we have seen earlier that they interact between themselves by the exchange of photons. The photons are massless. They travel at the velocity of light. And the photons, because they are massless, induce a force which has an infinite range. So that means that even two extremely distant charges will interact very weakly, but they will still interact. Now, let us come to the question of interaction between two masses. 11:06Skip to 11 minutes and 6 secondsWell, the two masses will attract each other gravitationally for the same reason-- because they exchange a particle, which is known as the graviton. Now, we know that the gravitational force acts at extremely large distances, even at distances of the size of the observable universe. So that means that the range of the force is basically infinite, which means that gravitons are massless. Now, since gravitons are massless, they travel at the speed of light. And in a sense, we can see gravitational waves as gravitons travelling. And so this is why we assume-- we consider-- that gravitational waves are travelling at the speed of light. So the velocity of light is identical to the velocity of gravitational waves. 12:16Skip to 12 minutes and 16 secondsSince I have mentioned the range of a fundamental force, let pause a second to make a very important remark. 12:25Skip to 12 minutes and 25 secondsWe have seen that both the photon and the graviton are responsible for an infinite range force. So that means that even if the charges are at infinite distance or the masses are at infinite distance, they interact very weakly, but they interact. Actually, electromagnetic force and gravitational force are the only known fundamental forces with an infinite range. Now, there is a difference of behaviour which is extremely important. In the case of the electromagnetic force, we have positive charges and negative charges. So if I really put these two charges at even larger distances, there will be somewhere in the universe other charges which will screen the effect of attraction between this positive charge and this negative charge. 13:32Skip to 13 minutes and 32 secondsThis is an effect called screening. And indeed, an electromagnetic force or electromagnetic charge is screened by the presence, for example, in this room of many different charges. So even though in principle the electromagnetic force has an infinite range, in practise, because of its screening of charges, it does not act at extremely large distances. Now, this is different in the case of gravitational force, because all masses are positive. So even if I put these two masses at very large distances, there are no negative masses that would screen the effect of attraction between these two masses. And so that means that both theoretically and in practise, the gravitational force acts at very long distances. 14:32Skip to 14 minutes and 32 secondsAnd that is very important to understand why the only force which is active at very large distances, at cosmological distances, at distances of the order of the universe-- the only force which is effectively active is the gravitational force. So this is why we should not be surprised to see that the laws of the universe are due to the gravitational force at very large distances. 15:00Skip to 15 minutes and 0 secondsTo sum up, gravitational waves are propagating deformations of curvature which are due to the sudden motion of large concentrations of mass. Because gravity is a weak force, these waves have an extremely weak amplitude. The good point is that they propagate without deformation in the whole universe. And we have seen that gravitational waves travel at the speed of light.
2019-04-20T12:44:52
https://www.futurelearn.com/courses/gravity/3/steps/125606
0.99988
Pi (also titled π), is a 1998 film about a paranoid mathematician who searches for a key number that will unlock the universal patterns found in nature. There are patterns everywhere in nature. 12:45, Restate my assumptions: 1. Mathematics is the language of nature. 2. Everything around us can be represented and understood through numbers. 3. If you graph the numbers of any system, patterns emerge. Therefore: There are patterns everywhere in nature. Evidence: The cycling of disease epidemics; the wax and wane of caribou populations; sun spot cycles; the rise and fall of the Nile. So, what about the stock market? The universe of numbers that represents the global economy. Millions of human hands at work, billions of minds. A vast network, screaming with life. An organism. A natural organism. My hypothesis: Within the stock market, there is a pattern as well. Right in front of me. Hiding behind the numbers. Always has been. The Ancient Japanese considered the Go board to be a microcosm of the universe. It's a dead end. There's nothing there. Have you met Archimedes? The one with the black spots, you see? You remember Archimedes of Syracuse, eh? The king asks Archimedes to determine if a present he's received is actually solid gold. Unsolved problem at the time. It tortures the great Greek mathematician for weeks — insomnia haunts him and he twists and turns in his bed for nights on end. Finally, his equally exhausted wife — she's forced to share a bed with this genius — convinces him to take a bath to relax. While he's entering the tub, Archimedes notices the bath water rise. Displacement, a way to determine volume, and that's a way to determine density — weight over volume. And thus, Archimedes solves the problem. He screams "Eureka" and he is so overwhelmed he runs dripping naked through the streets to the king's palace to report his discovery. Each letter's a number. Like the Hebrew A, Alef is 1. B, Bet is 2. You understand? But look at this. The numbers are inter-related. Like take the Hebrew word for father, 'Ab' - Alef Bet... 1, 2 equals 3. Alright? Hebrew word for mother, 'em' — Alef Mem... 1, 40 equals 41. Sum of 3 and 41... 44. Alright? Now, Hebrew word for child, alright, mother... father... child, 'Yeled' — that's 10, 30, and 4... 44. Sol Robeson: This is insanity, Max! Maximillian Cohen: Or maybe it's genius! Rabbi Cohen: It's killing you. Sol Robeson: Certain programs cause computers to get stuck in a particular loop. The loop leads to meltdown but just before the crash, they become aware of their own structure. The computer has a sense of its own silicon nature and it prints out the ingredients. Maximillian Cohen: The computer becomes conscious? Sol Robeson: In some ways, I guess. It starts off with a big string of digits running across the screen, and then there are people who get concerned with various things, and in the end this Bible code idea comes up. ~ John Forbes Nash, Jr. You don't have to be a mathematician to have a feel for numbers. A movie, by the way, was made — sort of a small-scale offbeat movie — called Pi recently. I think it starts off with a big string of digits running across the screen, and then there are people who get concerned with various things, and in the end this Bible code idea comes up. And that ties in with numbers, so the relation to numbers is not necessarily scientific, and even when I was mentally disturbed, I had a lot of interest in numbers.
2019-04-24T18:26:22
https://en.wikiquote.org/wiki/Pi_(film)
0.998381
Title: The Black Economy - Benefit frauds or tax evaders? One answer to the question "How Rich are We?" is to compare levels of National Income either across countries or for a single country over time. However, the relevance of this approach depends on how accurately National Income measures the output of goods and services of a country. While it is difficult to measure, the Black Economy represents the output of goods and services that is not generally captured in the National Income Accounts. This article discusses the problems of measuring the size of the Black Economy and speculates on the questions of who is involved and how. The relative importance of Tax Evasion versus Benefit Fraud is discussed.
2019-04-21T02:35:09
https://www.worldeconomics.com/Journal/Papers/The%20Black%20Economy%20-%20Benefit%20frauds%20or%20tax%20evaders.details?ID=10
0.99993
-Save the costs of buying or renting physical store. -Save offline marketing costs like banners and printed materials. -Available 24/7, so your customers can visit you during their appropriate time. -Expand your geographical reach and get new customers from different provinces and places. -A Facebook app. is an interface for your online store; it will also help you to reach more customers. -Unlike the physical store, you can build the online store within hours. -Updating the products is way easier and more flexible than the physical store. -The online store will protect your products from being stolen, damaged or broken. -No need for price tags and less paperwork. -You can fully manage your product image, size, specifications and price. -You can also track the availability of your product, what is in stock and what is out of stock. -Built in analytic that will let you keep track of your web sales and progress over time. -Built in reporting feature allows you to get real time information on consumer activity. -You can also review individual product performance such as top selling items. -You can also report on inventory results to keep your store will stocked with your top selling items.
2019-04-21T20:13:06
https://code95.com/services/e-commerce-and-social-commerce-solutions/
0.998754
1) Would it matter to you if your photographer was 6' tall 180lbs of stereotypical male 'beauty' OR what if he was "fluffy"!? 3) (this tends to vary more from girl to girl) would YOU rather 'control' the shoot or have him 'control' it, or would mutual work better?! I am sure I will have more to post, and part of it is just working with people, I just would hate to do something and get a bad record before I have really started!!! 1) It shouldn't matter what the photographer looks like. It's how he treats the model that matters. 2) It depends on how you ask the "model". I would advertise rather than, for example, just walking up to someone and asking them to model for you. 3) Mutually working together is usually the best option. Doing what the photographer wants while at the same time feeling comfortable with it. I would recommend to all models: take someone with you when you go to a photo shoot (and have them stay with you at all times!), to make sure the photographer doesn't take advantage of you, molest you, etc.
2019-04-26T04:25:16
http://www.teenhut.net/thread/72281-a-question-for-all-the-girls-please-help/
0.998894
Successful Public Relations Coordinator accomplished in media relations, website design, marketing strategy and event planning. Research social media trends and developments; Oversee social media strategy planning and activation; Live-tweet events. Generate, edit, and publish content on NYWICI's social media platforms; Ensure tone and brand voice is consistent across platforms. Conducted market analysis and monitored competitive activity. Tracked day-to-day client and brand communication; Conducted trend analysis for Men's Health, Women's Health, Prevention, Organic Life, Bicycling, and Runner's World. Monitored social media for breaking news and optimized social media campaigns; Shot photos and videos, managed content calendar, and contributed high volume posts. Oversaw the production and execution of projects and ensured promotional products were delivered on set and on time. Include prior experience temp and executive assistant. Designed and implemented strategic business plan objectives. Leveraged technical resources to design and create campaign deliverables, including e-mail invitations, articles and marketing videos. Wrote press materials and made presentations to media representatives. Managed all internal, external and crisis communications. Drafted and edited content for organizational publications, including employee newsletters and stockholders' reports. Achieved company objectives by leveraging internal resources and collaborating with colleagues. Wrote and edited articles, web content, advertising copy, periodicals and publications for internal and external audiences. Represented the organization to customers, the public, government officials and other external sources. Supplied marketing expertise to all company departments. Developed innovative marketing and PR strategies. Planned and organized seminars, meetings and retreats. Conducted market and public opinion research related to company's reputation and positioning among key stakeholder audiences. Executed digital marketing strategies and tripled blog traffic; Created and streamlined content for blog and social media accounts. Identified and forged partnerships with external groups aligned with the Foundation's mission; Coordinated the Foundation's yearly symposium and gala which 250 guests attended. Tracked and reported on a $300,000 budget and facilitated banking transactions that totaled over $200,000. Increased consumer awareness and achieved sales targets by 50%. Collaborated with production team to coordinate advertisements and promotions. Coordinated and managed sponsorships and sponsorship activation. Researched new topics and wrote and edited lifestyle, beauty, health, pop culture, and career articles on a biweekly basis. Conducted research on global warming; Updated the Institute's website on newly published articles, presentations, and videos. Researched maternal/child health in Africa and India and reported on those countries' health trends. Organized New Student Orientation (400 students), coordinated intern trainings (summer & fall), and recorded expenses on Excel. Coordinated workshops and fundraisers; Edited e-newsletters and updated social media channels (Facebook and Twitter). Where can I find a NEW YORK WOMEN IN COMMUNICATIONS SOCIAL MEDIA STRATEGIST resume example in New York, New York ? This is an actual resume example of a SOCIAL MEDIA STRATEGIST who works in the Media Planning Industry. LiveCareer has 2766 Media Planning resumes in its database. LiveCareer’s Resume Directory contains real resumes created by subscribers using LiveCareer’s Resume Builder.
2019-04-24T21:51:30
https://www.livecareer.com/resume-search/r/social-media-strategist-781469e4e3cc4e599e50dfcf6c1f7672
0.999847
Directions :- (Q. nos. 1-6) In the following questions, select the related word/letters/number from the given alternatives. * 1. Optimist : Cheerful :: Pessimist : ? * 2. YTOJ : XSNI :: WRMH : ? * 3. EIGK : EACY :: RVTY : ? * 4. 720 : 840 :: 60 : ? * 5. 225 : 256 :: 289 : ? * 6. Money : Misappropriation :: Writing : ? 8. If in a certain code 'CHARACTER" is written as '241612376' and 'CHILDREN' is written as '24859670'. then how can 'HIRALAL' be written in the same code ?
2019-04-20T01:19:33
http://www.branoliachemicals.com/mock-test/general-aptitude-tests/aptitude-topics/general-intelligence/sample-paper-1-2/
0.995611
It isn't exactly surprising that there will be riots in some predominately Muslim countries when a Westerner burns a Quran. They consider this book "holy" for some reason, and get extremely upset when someone burns it. In fact, they get so upset that people are often killed during the subsequent rioting. We have seen this happen time and time again, so it really can't be a surprise at this point. As far as what to do about it, there are two fairly different responses, each of which has some merit. The easiest solution - and the only one you will hear about in the corporate-owned media - is to stop burning the Quran. This book means a great deal to many Muslims, and non-Muslims should treat it with respect. For some, this argument is merely pragmatic: If I know that my burning this book will lead to rioting and death, I should not burn it. For others, it extends a step beyond pragmatism and focuses on respect: I know that this is their "holy" book, and I should therefore treat it with some measure of respect even if I don't regard it as holy. The strongest case for why Westerners should stop burning the Quran can be seen in the most recent incident where Qurans were burned at a U.S. military base. Because this particular Quran burning is associated with an occupying force, it endangers the troops and shapes public attitudes even more than others might. That is, for an occupying military to burn Qurans on foreign soil is detrimental to what they say they are trying to accomplish there. Even if you don't think that Westerners should stop burning the Quran, you'll likely agree that this particular instance of Quran burning was a mistake. The other type of response is the one where we refuse to accept responsibility for Muslim violence. The Quran is not holy; it is a book. If they are going to riot and kill because someone criticized their religion, destroyed a book, drew a cartoon, allowed a woman to drive, etc., that is on them and their "religion of peace." Burning the book didn't cause violence; their religion did. As noted above, even if you or I might prefer this response, I'd still suggest that members of an occupying military force should not burn Qurans. If nothing else, it is unnecessary incitement of the locals with whom they are allegedly trying to cultivate a productive relationship. There's also a fairly obvious problem with this response: Christians probably wouldn't like it being applied to them. If we are going to argue that the Quran is only a book, the same would have to be said about the Christian bible. While you or I might be fine with this (I certainly am), I don't see it going down well among my neighbors here in the Bible Belt. Perhaps we could set up some sort of exchange where Muslims burned Christian bibles every time anybody burned a Quran.
2019-04-19T02:24:39
https://www.atheistrev.com/2012/02/two-different-responses-to-quran.html
0.999998
The occlusion illusion: partial modal completion or apparent distance? In the occlusion illusion, the visible portion of a partly occluded object (eg a semicircle partly hidden behind a rectangle) appears to be significantly larger than a physically identical region that is fully visible. This illusion may occur either because the visual system 'fills in' a thin strip along the occluded border (the partial-modal-completion hypothesis) or because the partly occluded object is perceived as farther away (the apparent-distance hypothesis). We measured the magnitude of the occlusion illusion psychophysically in several experiments to investigate its causes. The results of experiments 1-3 are consistent with the general proposal that the magnitude of the illusion varies with the strength of the evidence for occlusion, supporting the inference that it is due to occlusion. Experiment 4 provides a critical test between apparent-distance and partial-modal-completion explanations by determining whether the increase in apparent size of the occluded region results from a change in its perceived shape (due to the modal extension of the occluded shape along the occluding edge, as predicted by the partial-modal-completion hypothesis) or from a change in its perceived overall size (as predicted by the apparent-distance hypothesis). The results more strongly support the partial-modal-completion hypothesis.
2019-04-24T20:26:23
https://kar.kent.ac.uk/29188/
0.999897
Planning is undoubtedly one of the most important processes of any organization as without knowing what to do how will you do it. Managers dedicated to planning are thus often exposed to a lot of pressure relating to narrow deadlines, mounting costs, changing milieu and expectations of the upper department. Project success is of immense importance to the continuation of business operations as it directly affects the profitability of a company. That’s why the companies are realizing the importance of housing a robust project management system. S.I.M.P.L.E. is the most effective and powerful project management solution available in the market. It is an intelligent system, build with care to address all the problems arising while designing a proper plan for your company. It has all the features, qualities, tricks and techniques to help you formulate effective strategies. Keep a watch on every activity related to the project. Track every movement and take right decisions at the right time. The system records every detail from trifle to very important ones. So, you know everything about everything that’s happening in the project. It also facilitates you with the power to manage your resources more effectively, be it man or machine. Prepare balance sheets, define project budget, record every transaction and prepare estimates. S.I.M.P.L.E. will help you reduce the time and paperwork that’s gone into doing the accounting for the project. The system makes accounting easy, efficient and quick leaving your team with time to focus on other aspects of work and also reducing the errors increasing the overall productivity. Calculate the returns on your investment in the project. See which project proves to be the most profitable for you. See task wise performance, the performance of your resources, compare the actual vs the desired one, create reports, see what you did right and what went wrong. Classify your projects based on their size, nature, customers and in as many ways as you find befitting. It will help you create a lucid environment where you know which project is in which stage, who all are working on which project and is the project revenue generating or an expense. Calculate project costs, revenue generated, expenses occurred, targets met etc.
2019-04-21T01:16:56
https://www.dexciss.com/erp-services-project-management/
0.999955
Above - a typical moment in a Ritter film - Tex is about to tangle with perpetual baddie Charlie King. HITTIN' THE TRAIL (GN, 1937) was among the initial batch of westerns for producer Ed Finney and Grand National and was directed by Robert North Bradbury, Bob Steele's father. Back in the early 1980s, I was doing monthly articles for Classic Images and the editor at that time was a great guy named Sam Rubin. Sam introduced me to Ed Finney (1903-1983), and we met, chatted, and mailed each other during 1980-1981 as I tried to learn more about Tex Ritter and Finney's work and relationship with Grand National and Monogram. Seemingly always able to put together the bucks for a low budget flick, Ed Finney arranged a screen test for Tex Ritter, and signed him to a five year personal contract. It was 1936 - America was working its way out of the Great Depression, Gene Autry and the Three Mesquiteers were ridin' the silver screen for the newly formed Republic Pictures, and William Boyd was Hopalong Cassidy at Paramount. Though his birth year is often reported as 1907, Woodward Maurice Ritter was born on January 12, 1905 in Panola County, Texas, and was one of six children. In those early days before becoming 'Tex', his nickname was Woodard (not Woodward). He attended the University of Texas for about five years, but never obtained his law degree. Fascinated with music, Ritter did stage plays in New York and elsewhere including a lengthy run in Green Grow The Lilacs (which would be the basis for the later musical, Oklahoma). There were radio shows in Texas and in New York ... Ritter was even a member of the Bobby Benson and the B-Bar-B Riders radio program. He did records for the American Record Corporation in the early 1930s, and signed with the newly formed Decca Records in 1934. The Finney deal with Ritter included a string of singing cowboy adventures and the initial bunch was handled by Grand National Pictures. But Grand National was headin' towards deep financial troubles and bankruptcy. Around the Summer of 1938, Finney moved his 'Boots and Saddles' Production Company over to Monogram, where the Ritter film budgets were to be increased to around $20,000 per picture. As part of the deal, Finney became the Monogram advertising chief as well as producer and director of various films. The collaboration of Finney and Ritter lasted the five years, and resulted in 32 B westerns which varied in quality, content and production enthusiasm. Ritter's first, SONG OF THE GRINGO (GN, 1936), was a reasonably solid oater and featured a better-than-usual cast of Joan Woodbury, Fuzzy Knight, Monte Blue, William Desmond and Warner Richmond. J. P. McCarthy directed. Among these early entries was TROUBLE IN TEXAS (GN, 1937), with the female lead being handled by Rita Hayworth, then billed as Rita Cansino. Of the dozen Grand National releases, five were directed by Robert North Bradbury, Bob Steele's father. John (Jack) English of later Republic serial fame did one, the rather weak ARIZONA DAYS (GN, 1937); Ray Taylor was in charge of three; and Al Herman did a pair. Probably the best are: MYSTERY OF THE HOODED HORSEMAN (GN, 1937), about a group of caped and masked raiders, with Ray Whitley and his Range Ramblers assisting Tex; ROLLIN' PLAINS (GN, 1938) with Tex and his trail pards smack dab in the middle of a range war; and RIDERS OF THE ROCKIES (GN, 1937), a tale of undercover work by the Arizona Rangers, with Ritter battling Yakima Canutt, and a rip roarin' brawl between Tex and frequent nemesis Charlie King. Monogram had a singin' cowboy named Jack Randall, Bob Livingston's brother, but they needed someone with better credentials and more fan appeal - Tex Ritter fit the bill. The Monogram series consisted of twenty films released during 1938 - 1941, and the dominant director was Al Herman who was at the helm for sixteen with Spencer Gordon Bennet responsible for the other four. At the top of the list were WESTBOUND STAGE (Monogram, 1939), and TAKE ME BACK TO OKLAHOMA (Monogram, 1940). At the bottom end was Tex's finale at Monogram and last with Finney, THE PIONEERS (Monogram, 1941), supposedly chock-full of stock footage due to California rain storms spoiling the shooting schedule. However, I might suggest that the shoddiness of THE PIONEERS may also be due to typical oater financing - i.e., Finney had a budget to churn out a block of eight films, and the last film got short-changed since the cash box was near empty. And for those of you who might have read about some camera foulups in DOWN THE WYOMING TRAIL (Monogram, 1939), the answer is "Yup!". Purportedly, this was one of the more expensive entries, with cast and crew on location in cold, snowy Wyoming. But cameraman Marcel Le Picard had problems and some of the chase/riding scenes across the snow are at an annoying "fast" and "jerky" speed. And back process screens were used in this film for shots of the elk herds. At the end, Tex is singing "There's a valley in Wyoming" to heroine Mary Brodel with the snow and critters in the background. If you watch closely, you can see a 'blip' as the herd film ends and restarts over from scratch. It's easy to hit the VCR rewind and play buttons to view this over and over. But when this played on the big screen back in 1939-1940, the matinee crowds probably didn't even notice ... or care. And another "Yup!" answer - Ritter did wear a Santa Claus outfit in DOWN THE WYOMING TRAIL. Tex met pretty leading lady Dorothy Fay in 1938. Her full name was Dorothy Fay Southworth (1915-2003), and is best remembered as the heroine of two serials, THE GREEN ARCHER (Columbia, 1940) and WHITE EAGLE (Columbia, 1941). Tex and Dorothy made four films together: SONG OF THE BUCKAROO (Monogram, 1938), SUNDOWN ON THE PRAIRIE (Monogram, 1939), ROLLIN' WESTWARD (Monogram, 1939) and RAINBOW OVER THE RANGE (Monogram, 1940). They tied the knot on June 14, 1941, and the union would last through Ritter's death in 1974. Soon after their marriage, Dorothy retired from the movie business. Above is Tex's wife, serial and western heroine Dorothy Fay. On the right is an ad cut from RAINBOW OVER THE RANGE (Monogram, 1940), one of four westerns that Dorothy did with Tex. Above - Ritter on the New York stage in Green Grow The Lilacs during the early 1930s. From L-to-R are H. Bailey, Tex, Hank Worden, and Judd Carvel. Above is the pressbook cover for Tex Ritter's SING COWBOY SING (Grand National, 1937). Directing was Bob Steele's father, Robert N. Bradbury. Above is the title lobby card from ARIZONA DAYS (GN, 1937), Tex's third starring oater for Grand National and Ed Finney. Pictured in the bottom right are heroine Eleanor Stewart, child star Tommy Bupp and Syd Saylor. For those into real trivia, Tex wore a Santa Claus costume in this 1939 Monogram oater. An interesting tidbit from Les Adams: Mary Brodel, the leading lady in DOWN THE WYOMING TRAIL (shown in the bottom right inset on this title lobby card) was the sister of Hollywood leading lady Joan Leslie (Joan Brodel). Mary's career consisted of about a half-dozen films. Above - Tex and trusty steed White Flash in a lobby card from TAKE ME BACK TO OKLAHOMA (Monogram, 1940). Includes lots of tunes by Tex as well as Bob Wills and his Texas Playboys. TAKE ME BACK TO OKLAHOMA is among Ritter's best.
2019-04-24T17:59:36
http://www.b-westerns.com/ritter0.htm
0.999217
Please do not reply directly to this email. All additional comments should be made in the comments box of this bug. Summary: libpng: Interlaced Images Information Disclosure Vulnerability https://bugzilla.redhat.com/show_bug.cgi?id=504782 Summary: libpng: Interlaced Images Information Disclosure Vulnerability Product: Security Response Version: unspecified Platform: All OS/Version: Linux Status: NEW Status Whiteboard: source=gentoo,reported=20090606,public=20090604,impact =low? Keywords: Security Severity: medium Priority: medium Component: vulnerability AssignedTo: security-response-team(a)redhat.com ReportedBy: thoger(a)redhat.com CC: paul(a)city-fan.org, lfarkas(a)lfarkas.org, tgl(a)redhat.com, berrange(a)redhat.com, rjones(a)redhat.com, fedora-mingw(a)lists.fedoraproject.org Classification: Other Target Release: --- Quoting Secunia advisory SA35346: http://secunia.com/advisories/35346/ A vulnerability has been reported in libpng, which can be exploited by malicious people to disclose potentially sensitive information. The vulnerability is caused due to an error when processing 1-bit interlaced images. This can be exploited to disclose uninitialised memory via specially crafted images having widths that are not divisible by 8. The vulnerability is reported in versions prior to 1.2.37. -- Configure bugmail: https://bugzilla.redhat.com/userprefs.cgi?tab=email ------- You are receiving this mail because: ------- You are on the CC list for the bug. Please do not reply directly to this email. All additional comments should be made in the comments box of this bug. https://bugzilla.redhat.com/show_bug.cgi?id=504782 Tomas Hoger <thoger(a)redhat.com&gt; changed: What |Removed |Added ---------------------------------------------------------------------------- External Bug ID| |Gentoo 272970 --- Comment #1 from Tomas Hoger <thoger(a)redhat.com&gt; 2009-06-09 08:43:02 EDT --- Upstream page - http://www.libpng.org/pub/png/libpng.html - contains a rather confusing vulnerability warning: Vulnerability Warning Jeff Phillips reported that several versions of libpng through 1.2.35 contain an uninitialized-memory-read bug that may have security implications. Specifically, 1-bit (2-color) interlaced images whose widths are not divisible by 8 may result in several uninitialized bits at the end of certain rows in certain interlace passes being returned to the user. An application that failed to mask these out-of-bounds pixels might display or process them, albeit presumably with benign results in most cases. This bug may be fixed in version 1.2.36, released 7 May 2009, but the correct fix is in version 1.2.37, released 4 June 2009. Going though 1.2.35 -> 1.2.36 and 1.2.36 -> 1.2.37 diffs, this probably refers to the following changes: Changes in 1.2.36: +version 1.2.36beta02 [March 21, 2009] + Use png_memset() after png_malloc() of big_row_buf when reading an + interlaced file, to avoid a possible UMR. http://libpng.git.sourceforge.net/git/gitweb.cgi?p=libpng;a=commitdiff;h=... Changes in 1.2.37: +version 1.2.37beta01 [May 12, 2009] + Fixed inconsistency in pngrutil.c, introduced in libpng-1.2.36. The + memset() was using "png_ptr->rowbytes" instead of "row_bytes", which + the corresponding png_malloc() uses (Joe Drew). http://libpng.git.sourceforge.net/git/gitweb.cgi?p=libpng;a=commitdiff;h=... -- Configure bugmail: https://bugzilla.redhat.com/userprefs.cgi?tab=email ------- You are receiving this mail because: ------- You are on the CC list for the bug. Please do not reply directly to this email. All additional comments should be made in the comments box of this bug. https://bugzilla.redhat.com/show_bug.cgi?id=504782 --- Comment #2 from Tomas Hoger <thoger(a)redhat.com&gt; 2009-06-09 08:48:07 EDT --- Created an attachment (id=347014) --> (https://bugzilla.redhat.com/attachment.cgi?id=347014) 1.2.36 change Local copy of: http://libpng.git.sourceforge.net/git/gitweb.cgi?p=libpng;a=commitdiff;h=... -- Configure bugmail: https://bugzilla.redhat.com/userprefs.cgi?tab=email ------- You are receiving this mail because: ------- You are on the CC list for the bug. Please do not reply directly to this email. All additional comments should be made in the comments box of this bug. https://bugzilla.redhat.com/show_bug.cgi?id=504782 --- Comment #3 from Tomas Hoger <thoger(a)redhat.com&gt; 2009-06-09 08:48:51 EDT --- Created an attachment (id=347015) --> (https://bugzilla.redhat.com/attachment.cgi?id=347015) 1.2.37 change Local copy of: http://libpng.git.sourceforge.net/git/gitweb.cgi?p=libpng;a=commitdiff;h=... -- Configure bugmail: https://bugzilla.redhat.com/userprefs.cgi?tab=email ------- You are receiving this mail because: ------- You are on the CC list for the bug. Please do not reply directly to this email. All additional comments should be made in the comments box of this bug. https://bugzilla.redhat.com/show_bug.cgi?id=504782 --- Comment #4 from Fedora Update System <updates(a)fedoraproject.org&gt; 2009-06-09 09:00:20 EDT --- mingw32-libpng-1.2.37-1.fc10 has been submitted as an update for Fedora 10. http://admin.fedoraproject.org/updates/mingw32-libpng-1.2.37-1.fc10 -- Configure bugmail: https://bugzilla.redhat.com/userprefs.cgi?tab=email ------- You are receiving this mail because: ------- You are on the CC list for the bug. Please do not reply directly to this email. All additional comments should be made in the comments box of this bug. https://bugzilla.redhat.com/show_bug.cgi?id=504782 --- Comment #5 from Fedora Update System <updates(a)fedoraproject.org&gt; 2009-06-09 09:00:25 EDT --- mingw32-libpng-1.2.37-1.fc11 has been submitted as an update for Fedora 11. http://admin.fedoraproject.org/updates/mingw32-libpng-1.2.37-1.fc11 -- Configure bugmail: https://bugzilla.redhat.com/userprefs.cgi?tab=email ------- You are receiving this mail because: ------- You are on the CC list for the bug. Please do not reply directly to this email. All additional comments should be made in the comments box of this bug. https://bugzilla.redhat.com/show_bug.cgi?id=504782 --- Comment #6 from Richard W.M. Jones <rjones(a)redhat.com&gt; 2009-06-09 09:00:50 EDT --- mingw32-libpng packages all done. -- Configure bugmail: https://bugzilla.redhat.com/userprefs.cgi?tab=email ------- You are receiving this mail because: ------- You are on the CC list for the bug. Please do not reply directly to this email. All additional comments should be made in the comments box of this bug. https://bugzilla.redhat.com/show_bug.cgi?id=504782 --- Comment #7 from Tom Lane <tgl(a)redhat.com&gt; 2009-06-09 09:42:38 EDT --- Calling this a security issue seems like a bit of a stretch. You can only read portions of individual bytes, you can't control very well which bytes those are, and the whole thing depends on the application's display code being seriously buggy (i.e. showing garbage pixels on the right side of an image). -- Configure bugmail: https://bugzilla.redhat.com/userprefs.cgi?tab=email ------- You are receiving this mail because: ------- You are on the CC list for the bug. Calling this a security issue seems like a bit of a stretch. Yeah, that was reaction too, when seeing upstream announcement. You can only read portions of individual bytes, you can't control very well which bytes those are, and the whole thing depends on the application's display code being seriously buggy (i.e. showing garbage pixels on the right side of an image). I believe applications displaying images using libpng were not really assumed attack vector, as those can only show those leaked bytes to the user running application, so that case is non-issue. I guess they may have assumed some automated image processing (such as image conversion using ImageMagick's convert, or CUPS printing) as a vector, though even without checking if any such application can return leaked bytes in some output attacker can see and use, the leak seem rather limited, not easily predictable and not too likely to yield any valuable data. Have you already looked into what application must do wrong to process those garbage pixels at all? -- Configure bugmail: https://bugzilla.redhat.com/userprefs.cgi?tab=email ------- You are receiving this mail because: ------- You are on the CC list for the bug. Please do not reply directly to this email. All additional comments should be made in the comments box of this bug. https://bugzilla.redhat.com/show_bug.cgi?id=504782 --- Comment #9 from Tom Lane <tgl(a)redhat.com&gt; 2009-06-09 12:52:46 EDT --- Well, it would have to have a bug that causes it to process whole bytes (groups of 8 pixels) without regard to the declared image width. That seems unlikely to escape notice for long so far as "display" actions go. I suppose the most plausible route for an information leak is if the bytes get shoved directly into some other image file (either an output PNG or some other format with similar representational details), and then the attacker manages to get access to that file. I think we've previously decided that bugs in PNG-writing applications aren't really grounds for security responses, and this would effectively be in that category. -- Configure bugmail: https://bugzilla.redhat.com/userprefs.cgi?tab=email ------- You are receiving this mail because: ------- You are on the CC list for the bug. Please do not reply directly to this email. All additional comments should be made in the comments box of this bug. https://bugzilla.redhat.com/show_bug.cgi?id=504782 Vincent Danen <vdanen(a)redhat.com&gt; changed: What |Removed |Added ---------------------------------------------------------------------------- CC| |vdanen(a)redhat.com Summary|libpng: Interlaced Images |CVE-2009-2042 libpng: |Information Disclosure |Interlaced Images |Vulnerability |Information Disclosure | |Vulnerability Alias| |CVE-2009-2042 --- Comment #10 from Vincent Danen <vdanen(a)redhat.com&gt; 2009-06-12 16:43:18 EDT --- Common Vulnerabilities and Exposures assigned an identifier CVE-2009-2042 to the following vulnerability: Name: CVE-2009-2042 URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2042 Assigned: 20090612 Reference: CONFIRM: http://www.libpng.org/pub/png/libpng.html Reference: BID:35233 Reference: URL: http://www.securityfocus.com/bid/35233 Reference: SECUNIA:35346 Reference: URL: http://secunia.com/advisories/35346 Reference: VUPEN:ADV-2009-1510 Reference: URL: http://www.vupen.com/english/advisories/2009/1510 Reference: XF:libpng-interlaced-image-info-disclosure(50966) Reference: URL: http://xforce.iss.net/xforce/xfdb/50966 libpng before 1.2.37 does not properly parse 1-bit interlaced images with width values that are not divisible by 8, which causes libpng to include uninitialized bits in certain rows of a PNG file and might allow remote attackers to read portions of sensitive memory via "out-of-bounds pixels" in the file. -- Configure bugmail: https://bugzilla.redhat.com/userprefs.cgi?tab=email ------- You are receiving this mail because: ------- You are on the CC list for the bug. Please do not reply directly to this email. All additional comments should be made in the comments box of this bug. https://bugzilla.redhat.com/show_bug.cgi?id=504782 --- Comment #11 from Fedora Update System <updates(a)fedoraproject.org&gt; 2009-06-13 13:56:35 EDT --- libpng-1.2.37-1.fc10 has been submitted as an update for Fedora 10. http://admin.fedoraproject.org/updates/libpng-1.2.37-1.fc10 -- Configure bugmail: https://bugzilla.redhat.com/userprefs.cgi?tab=email ------- You are receiving this mail because: ------- You are on the CC list for the bug. Please do not reply directly to this email. All additional comments should be made in the comments box of this bug. https://bugzilla.redhat.com/show_bug.cgi?id=504782 --- Comment #12 from Fedora Update System <updates(a)fedoraproject.org&gt; 2009-06-13 13:56:40 EDT --- libpng-1.2.37-1.fc9 has been submitted as an update for Fedora 9. http://admin.fedoraproject.org/updates/libpng-1.2.37-1.fc9 -- Configure bugmail: https://bugzilla.redhat.com/userprefs.cgi?tab=email ------- You are receiving this mail because: ------- You are on the CC list for the bug. Please do not reply directly to this email. All additional comments should be made in the comments box of this bug. https://bugzilla.redhat.com/show_bug.cgi?id=504782 --- Comment #13 from Fedora Update System <updates(a)fedoraproject.org&gt; 2009-06-13 13:56:45 EDT --- libpng-1.2.37-1.fc11 has been submitted as an update for Fedora 11. http://admin.fedoraproject.org/updates/libpng-1.2.37-1.fc11 -- Configure bugmail: https://bugzilla.redhat.com/userprefs.cgi?tab=email ------- You are receiving this mail because: ------- You are on the CC list for the bug. Please do not reply directly to this email. All additional comments should be made in the comments box of this bug. https://bugzilla.redhat.com/show_bug.cgi?id=504782 --- Comment #14 from Fedora Update System <updates(a)fedoraproject.org&gt; 2009-06-15 21:20:53 EDT --- mingw32-libpng-1.2.37-1.fc11 has been pushed to the Fedora 11 stable repository. If problems still persist, please make note of it in this bug report. -- Configure bugmail: https://bugzilla.redhat.com/userprefs.cgi?tab=email ------- You are receiving this mail because: ------- You are on the CC list for the bug. Please do not reply directly to this email. All additional comments should be made in the comments box of this bug. https://bugzilla.redhat.com/show_bug.cgi?id=504782 --- Comment #15 from Fedora Update System <updates(a)fedoraproject.org&gt; 2009-06-15 22:29:28 EDT --- mingw32-libpng-1.2.37-1.fc10 has been pushed to the Fedora 10 stable repository. If problems still persist, please make note of it in this bug report. -- Configure bugmail: https://bugzilla.redhat.com/userprefs.cgi?tab=email ------- You are receiving this mail because: ------- You are on the CC list for the bug. Please do not reply directly to this email. All additional comments should be made in the comments box of this bug. https://bugzilla.redhat.com/show_bug.cgi?id=504782 --- Comment #16 from Fedora Update System <updates(a)fedoraproject.org&gt; 2009-06-18 07:38:15 EDT --- libpng-1.2.37-1.fc11 has been pushed to the Fedora 11 stable repository. If problems still persist, please make note of it in this bug report. -- Configure bugmail: https://bugzilla.redhat.com/userprefs.cgi?tab=email ------- You are receiving this mail because: ------- You are on the CC list for the bug. Please do not reply directly to this email. All additional comments should be made in the comments box of this bug. https://bugzilla.redhat.com/show_bug.cgi?id=504782 --- Comment #17 from Fedora Update System <updates(a)fedoraproject.org&gt; 2009-06-18 07:40:50 EDT --- libpng-1.2.37-1.fc10 has been pushed to the Fedora 10 stable repository. If problems still persist, please make note of it in this bug report. -- Configure bugmail: https://bugzilla.redhat.com/userprefs.cgi?tab=email ------- You are receiving this mail because: ------- You are on the CC list for the bug. Please do not reply directly to this email. All additional comments should be made in the comments box of this bug. https://bugzilla.redhat.com/show_bug.cgi?id=504782 --- Comment #18 from Fedora Update System <updates(a)fedoraproject.org&gt; 2009-06-18 07:50:17 EDT --- libpng-1.2.37-1.fc9 has been pushed to the Fedora 9 stable repository. If problems still persist, please make note of it in this bug report. -- Configure bugmail: https://bugzilla.redhat.com/userprefs.cgi?tab=email ------- You are receiving this mail because: ------- You are on the CC list for the bug. Please do not reply directly to this email. All additional comments should be made in the comments box of this bug. https://bugzilla.redhat.com/show_bug.cgi?id=504782 Tomas Hoger <thoger(a)redhat.com&gt; changed: What |Removed |Added ---------------------------------------------------------------------------- Status Whiteboard|source=gentoo,reported=2009 |source=gentoo,reported=2009 |0606,public=20090604,impact |0606,public=20090604,impact |=low? |=low,cvss2=2.6/AV:N/AC:H/Au | |:N/C:P/I:N/A:N -- Configure bugmail: https://bugzilla.redhat.com/userprefs.cgi?tab=email ------- You are receiving this mail because: ------- You are on the CC list for the bug. Please do not reply directly to this email. All additional comments should be made in the comments box of this bug. https://bugzilla.redhat.com/show_bug.cgi?id=504782 Jan Lieskovsky <jlieskov(a)redhat.com&gt; changed: What |Removed |Added ---------------------------------------------------------------------------- Priority|medium |low CC| |jlieskov(a)redhat.com Status Whiteboard|source=gentoo,reported=2009 |public=20090604,reported=20 |0606,public=20090604,impact |090606,source=gentoo,rhel-3 |=low,cvss2=2.6/AV:N/AC:H/Au |/libpng=affected/impact=low |:N/C:P/I:N/A:N |/cvss2=2.6/AV:N/AC:H/Au:N/C | |:P/I:N/A:N,rhel-4/libpng=af | |fected/impact=low/cvss2=2.6 | |/AV:N/AC:H/Au:N/C:P/I:N/A:N Status Whiteboard| |rhel-5/libpng=affected/impa | |ct=low/cvss2=2.6/AV:N/AC:H/ | |Au:N/C:P/I:N/A:N,rhel-6/lib | |png=fixed,fedora-all/libpng | |=fixed,rhel-3/libpng10=affe | |cted/impact=low/cvss2=2.6/A | |V:N/AC:H/Au:N/C:P/I:N/A:N Status Whiteboard| |rhel-4/libpng10=affected/im | |pact=low/cvss2=2.6/AV:N/AC: | |H/Au:N/C:P/I:N/A:N,fedora-a | |ll/libpng10=affected/impact | |=low/cvss2=2.6/AV:N/AC:H/Au | |:N/C:P/I:N/A:N Severity|medium |low -- Configure bugmail: https://bugzilla.redhat.com/userprefs.cgi?tab=email ------- You are receiving this mail because: ------- You are on the CC list for the bug. Please do not reply directly to this email. All additional comments should be made in the comments box of this bug. https://bugzilla.redhat.com/show_bug.cgi?id=504782 Josh Bressers (Security Response Team) <bressers(a)redhat.com&gt; changed: What |Removed |Added ---------------------------------------------------------------------------- CC| |bressers(a)redhat.com Status Whiteboard|public=20090604,reported=20 |public=20090604,reported=20 |090606,source=gentoo,rhel-3 |090606,source=gentoo,rhel-3 |/libpng=affected/impact=low |/libpng=affected/impact=low |/cvss2=2.6/AV:N/AC:H/Au:N/C |/cvss2=2.6/AV:N/AC:H/Au:N/C |:P/I:N/A:N,rhel-4/libpng=af |:P/I:N/A:N,rhel-4/libpng=af |fected/impact=low/cvss2=2.6 |fected/impact=low/cvss2=2.6 |/AV:N/AC:H/Au:N/C:P/I:N/A:N |/AV:N/AC:H/Au:N/C:P/I:N/A:N Status Whiteboard|rhel-5/libpng=affected/impa |rhel-5/libpng=affected/impa |ct=low/cvss2=2.6/AV:N/AC:H/ |ct=low/cvss2=2.6/AV:N/AC:H/ |Au:N/C:P/I:N/A:N,rhel-6/lib |Au:N/C:P/I:N/A:N,rhel-6/lib |png=fixed,fedora-all/libpng |png=affected,fedora-all/lib |=fixed,rhel-3/libpng10=affe |png=affected,rhel-3/libpng1 |cted/impact=low/cvss2=2.6/A |0=affected/impact=low/cvss2 |V:N/AC:H/Au:N/C:P/I:N/A:N |=2.6/AV:N/AC:H/Au:N/C:P/I:N | |/A:N Status Whiteboard|rhel-4/libpng10=affected/im |rhel-4/libpng10=affected/im |pact=low/cvss2=2.6/AV:N/AC: |pact=low/cvss2=2.6/AV:N/AC: |H/Au:N/C:P/I:N/A:N,fedora-a |H/Au:N/C:P/I:N/A:N,fedora-a |ll/libpng10=affected/impact |ll/libpng10=affected/impact |=low/cvss2=2.6/AV:N/AC:H/Au |=low/cvss2=2.6/AV:N/AC:H/Au |:N/C:P/I:N/A:N |:N/C:P/I:N/A:N -- Configure bugmail: https://bugzilla.redhat.com/userprefs.cgi?tab=email ------- You are receiving this mail because: ------- You are on the CC list for the bug.
2019-04-24T12:13:47
https://lists.stg.fedoraproject.org/archives/list/[email protected]/thread/MCIYL66SC336QHXXXHOPGU3Y5RYS2QUP/
0.999999
In short: Samsung's first foldable Android smartphone will break industry conventions in a wide variety of ways, including its use of toughened cover glass. While Corning's Gorilla Glass series is now essentially the go-to solution for virtually every major phone maker in the industry, the unique form factor of its bendable device saw Samsung opt for a different supplier of such modules, with Korean media now reporting that role was ultimately given to Japanese chemical company Sumitomo Chemical. As the firm doesn't have an established manufacturing line for such products, it's expected to have its designs produced by a third party. Background: While Corning already developed foldable cover glass prototypes, Samsung may have been looking for a more customized solution while finalizing the list of component suppliers for its seminal Android handset. Sumitomo and Samsung have been working together for years, with the latter's President and COO Masakazu Tokura confirming the Japanese firm is providing Samsung with touchscreen panels during an investor Q&A event held two years ago. Korean manufacturer Kolon Industries is also said to have been in consideration along with Sumitomo but lost out on the foldable phone contract for unknown reasons. Samsung is willing to reconsider the company in the future as it expands its bendable handset family to more models, industry insiders claimed earlier today. Impact: Corning is unlikely to feel the effect of being ditched by Samsung's foldable phone project in the near term given how the device in question is unlikely to even clear a million lifetime sales and the American tech company will still get a chance to win over the world's largest handset maker with bendable cover glass in the future. Regardless, the upcoming Android device expected to be announced in November is likely to see Samsung and its suppliers pioneer a broad range of technologies such as consumer-grade flexible batteries and bendable OLED displays.
2019-04-20T20:25:22
https://www.androidheadlines.com/2018/09/first-samsung-foldable-phone-wont-use-corning-gorilla-glass.html
0.998715
Is it possible to launch GUI of headless VirtualBox' machine? VM "ubuntu 12.04" has been successfully started. Can I somehow launch the normal GUI that I would get by launching the virtual machine from VirtualBox' GUI ? computer because you already have a console session in progress. What can I do in this situation to connect to this virtual machine with GUI ? Is it the only solution for me to turn the machine off and then launch it with the GUI ? It sounds really not convenient to do this every time I need GUI - since I want the machine to be headless. I have also tried xrdp but I cannot connect to the machine - I have it behind the VirtualBox NAT and the ports are forwarded. I just solved this problem by clicking the green arrow "Show" at the top of the VirtualBox GUI while my headless instance was already running. I could see what the VM window would look like inside the "Preview" Pane on the VirtualBox GUI, and after clicking "Show", the VM window came up as though I had initially powered on the machine from the Virtualbox GUI. Edit: When you close the VM window, it will give you the additional option to "Continue running in the background", so your headless instance can revert to being headless again. You can attach to a headless VM by running VBoxSDL --startvm <VMname> --separate. If you run VBoxSDL with no args you can see other options you may be interested in. After getting the same error, I just changed the default port 3389 to something else. I used random port number (in my case 5500). Then it worked. And disabled Windows firewall for a moment - but I don't think firewall was the problem. I solved the problem - I didn't have VirtualBox extension pack installed. While it is added in Linux version of VirtualBox, you have to install it separately on Windows. When you are done with using the GUI, you can detach it and your VM will go back headless. I tested this on Windows 10 and it worked as of VirtualBox 5.1.22. Should be the same on Mac/Linux. My experience has been that VirtualBox's RDP is actually provided using VNC, and not the Microsoft RDP protocol. I was able to use the VRDE feature using VNC Viewer (rather than Microsoft Remote Desktop). In case it helps, here are the commands I used to configure VRDE access to a VM which runs on a headless server (not keyboard, mouse, monitor attached). Not the answer you're looking for? Browse other questions tagged virtualbox virtual-machine remote-desktop gui headless or ask your own question. Is it possible to bring to front (foreground) some virtual machine running on background (headless) in VirtualBox? In VirtualBox Headless Mode can I display the UI on demand? Is it possible to create a Windows 7 virtual machine on Ubuntu Server without GUI? How can I work out why my headless VirtualBox VM is not booting? VirtualBox can not run as normal user. How to close VirtualBox “Detached/Headless” console window? Running Virtualbox Windows 7 VM: GUI vs Headless + RDP Which is more efficient?
2019-04-23T04:32:36
https://superuser.com/questions/469501/is-it-possible-to-launch-gui-of-headless-virtualbox-machine
0.999923
A 65-year-old home tutor today struck a blow for workers' rights which could cost local authorities and other employers - both in the private and public sector - millions. Appeal Court judges ruled that Margaret Prater had been 'continuously employed' by Cornwall CC over a 10-year period and rejected the council's plea that she had been no more than a 'casual worker'. The court's landmark decision means that Mrs Prater - and thousands of other 'intermittent and occasional' staff - will have full employment protection, including holiday and sickness pay and numerous other rights that go with 'employee' status. Lord Justice Mummery said Mrs Prater, of Garfam, Trethurgy, near St Austell, whose case was backed by the National Union of Teachers, had worked for the council between 1988 and 1998 as a home tutor. She was given assignments to teach individual pupils and there was no 'contractual obligation' for the council to offer her work or for her to accept jobs. However, once she took on a new pupil, Mrs Prater treated herself as having 'undertaken a commitment'. Specialising in teaching biology, she tutored a number of different pupils every week, teaching some of them for up to 10 hours weekly, and some of her engagements lasted several years. Mrs Prater still works for the council but, since 1998 when she signed a contract, Cornwall has accepted she is an employee, with all the rights - including holiday and sick pay - that go with that status. In May 2004, she wrote to the council claiming she had been 'continuously employed' since 1988, but the council insisted she was a 'casual worker' who had taken on a series of short, fixed term and discrete teaching jobs on an ad hoc basis. An Employment Tribunal later backed Mrs Prater's case and, despite the council's plea that the ruling was 'wrong in law', it was upheld today by Lord Justice Mummery, sitting with Lord Justice Longmore and Mr Justice Lewison. The judge said: 'In my judgement, the employment tribunal was entitled in law to hold that there had was mutuality of obligation in the individual contracts between the council and Mrs Prater; that they were contracts of service'. The relationship between Mrs Prater and the council between 1988 and 1998 passed the threshold of an 'irreducable minimum mutual obligation necessary to create a contract of service', thus giving her full employment rights, the judge ruled. Mr Adam Heppinstall, for the council, told the judges the case raised issues of 'general public importance' on a point of law which had not previously been decided. The facts of the case were 'commonplace in the public and private sectors' and Cornwall CC was 'unprepared for the substantial burden of according full employment rights' to those like Mrs Prater, the barrister added. Lord Justice Mummery recognised the importance of the case, but nevertheless refused the county council permission to appeal further to the House of Lords. The council can, however, petition the Law Lords directly for an appeal hearing. In his judgement, Lord Justice Mummery said the 'test case' raised an issue of 'general interest' on whether workers like Mrs Prater - who take on individual assignments under a successfion of separate contracts - are entitled to be treated as 'employees'. 'Complex patterns of contracts for work are by no means confined to the staffing practices of local education authorities. They are common in many public sector and private sector workplaces, which are increasingly populated by intermittent and occasional staff working alongside full time employees,' the judge observed. 'The true legal character of the contracts and of the legal relationship created by them is a matter of serious concern to the parties, as the scope of statutory employment protection depends on whether a person performs work under a contract of service or under some other kind of arrangement'.
2019-04-19T00:20:00
https://www.lgcplus.com/full-employment-protection-for-casual-worker-county-refused-permission-to-appeal-further/513497.article
0.999998
(CNN) - In January, Milwaukee Bucks rookie Sterling Brown was tased and arrested after he became confrontational over an alleged parking violation, according to a police report. Now the city's mayor says he is concerned about soon-to-be-released police body camera video of the encounter. Brown was not criminally charged in the incident, which prompted an internal affairs investigation, authorities said at the time. According to the police report, obtained by CNN affiliate WISN, Brown was aggressive when a police officer questioned him in a Walgreens parking lot and then resisted arrest. Four months later, Milwaukee police are bracing for a possible backlash from the expected release of body camera footage of the encounter with Brown, then 22, early on January 26. At least two officers were involved in the incident. CNN has not viewed the video, which could be released as early as Wednesday, according to city officials. Milwaukee Mayor Tom Barrett expressed concerns Monday over what he had seen in the video. "I'm going to let the release of that speak for itself, but yes, I definitely have concerns after watching that video," the mayor said, according to CNN affiliate WTMJ. On Sunday, Assistant Police Chief Michael Brunson spoke to parishioners about the release of unspecified video footage during a program for a nonviolence initiative at a Milwaukee church. "There's going to be a video that's going to come out soon, in the next couple of weeks, involving the department," said Brunson, according to CNN affiliate WITI. "And I'm going to be honest with you, we're going to need your support during the challenges." Brunson did not identify the video to which he was referring, WITI reported, and Milwaukee police have not commented about the body camera footage of Brown's arrest. But the police department has said it intends to release the video along with the findings of an internal investigation once the investigation is completed. The status of the officers involved in the encounter with Brown was not immediately known. Brown's lawyer, Mark Thomsen, declined to comment on the video on Tuesday. According to the police report, the arresting officer wrote that he was conducting a business check at a Walgreens around 2 a.m. when he saw a vehicle illegally parked horizontally across two handicapped parking spaces. A passenger told the officer the driver was in the Walgreens, the officer wrote. The driver, described as a tall black male -- later identified as Brown -- approached him "and stood within arm's reach," the officer wrote. The officer said he "repeatedly" asked Brown to step back but Brown refused. "Brown became very aggressive," said the officer, who called for another squad car. As a sergeant who arrived interviewed Brown, he "physically resisted officers attempts to handcuff him and he was taken to the ground in a controlled manner," the arresting officer wrote in the report. The officer said he tried to help his colleagues "because Brown continued to resist being handcuffed." "A Taser had to be employed to get Brown in control with handcuffs," according to the arresting officer. Police said Brown resisted or obstructed an officer, which is a misdemeanor, according to the report. He was later seen at a hospital, the report said. He was booked, issued a parking ticket and released from the Milwaukee County Jail, WISN reported. Brown was not criminally charged after police authorities reviewed reports and body camera footage, the department said. The department said it decided not to present the case to the Milwaukee County District Attorney's Office for charges. Brown had a bruise and scab on his face before a game between the Bucks and the Brooklyn Nets that was played later on the day of his arrest, according to WISN. When asked about the marks, Brown said: "It's an issue I'm dealing with right now. That's all I really want to say right now," WISN reported. Brown graduated from Southern Methodist University after a standout college career, according to his bio on the Bucks' website. The Philadelphia 76ers drafted the guard with the 46th overall pick in last summer's NBA draft but traded him to the Bucks soon after.
2019-04-19T23:16:18
https://www.ksat.com/news/national/milwaukee-police-to-release-video-showing-sterling-browns-arrest
0.997544
I love stupid movies... I live for them, in fact, and this was definitely stupid. Spend the $5, go see it for yourself! If you weren't interested in it, you probably wouldn't be looking at reviews in the first place unless you're a concerned parent (let your kids see it, it's not too bad), or if you hated it and wanted to see if anyone actually enjoyed it. I did, and I recommend it to anyone who just wants to laugh at the antics of two total stoners. Personally, I think a different ending could have made this movie a lot more enjoyable, but I don't want to give it away, so see it for yourself. This one won't win any awards (with a name like "Dude, Where's My Car?" one wouldn't expect it to be a contender, anyway), but for all of us who have had a "night to remember" that we forgot, it's damn funny. The "Dude, where's your car?"/"Where's my car, dude?" dialogue is taken from a scene in The Big Lebowski that occurs between John Goodman and Jeff Bridges after they leave the bowling alley. Jesse: Man, I just had the craziest dream. When Jesse and Chester are taking out the trash in their girlfriends home, Jesse takes off one shoe and Chester takes off one shoe and sock but directly after when they drop the trash, you can see they both have their footwear back on, and in the next shot, when thrown outside their footwear is off again. A title before the opening credits says that the following events are based on a true story. In certain Muslim countries, the homosexual kiss was cut out entirely.
2019-04-25T03:13:26
https://m.imdb.com/title/tt0242423/?ref_=m_nm_knf_act_t47
0.998607
Q. What is Keyhole Surgery ? Keyhole surgery, which is also known as 'minimally invasive surgery', has sometimes been referred to as the greatest surgical advancement since anaesthetic since its introduction which came about as information technology made tiny cameras which could be inserted into the body working alongside computers possible. Q. What Does Keyhole Surgery Entail ? Depending upon the area of the body where keyhole surgery is being performed, about 3 or 4 tiny incisions (sometimes even fewer), usually only around 10mm each, are made into which a special channel or tube is inserted. This is known as a 'port' and via this port, a special viewing instrument called an endoscope is passed through. This will have a powerful light source on the end of it and will work like a telescopic camera projecting images from inside the body onto a TV monitor which the surgeon can look at so that he can see exactly what the problem is and what needs to be fixed. In addition to the camera, the surgeon can also pass one or a series of specialised, miniature surgical instruments through either the same port or a different port (which would require a further incision(s) depending upon the procedure which is being carried out. The technology means that the surgeon can operate the equipment from outside of the body whilst looking at the monitor. Endoscopes vary in size and design depending upon the area of the body which is being operated on. Some are rigid and others more flexible and you may be familiar with the term 'laparoscopy'. This originates from 'laparoscope' which is the specialised tool used to perform keyhole surgery within the abdominal area. Q. What Procedures Can Be Performed Using Keyhole Surgery ? As the technology becomes even more sophisticated, it has been adopted as the recognised procedure for a whole range of surgery which would have previously required you to be opened up with a traditional scalpel. The extent of the surgery will determine how soon you will be able to go home after the operation. However as an example, where cruciate ligament replacement surgery would previously have meant you'd remain in hospital for a week or even longer, with keyhole surgery it is normal to go home after an overnight stay or after 2 days at the most. Scarring is minimal and any open wound should heal very quickly. As this is a general article encompassing the whole keyhole surgery spectrum, it's not appropriate to second guess how long it would be before you could go back to work and resume all of your normal activities. Suffice to say, however, that any keyhole procedure will enable you to recover more quickly than any traditional method of surgery which would have been used previously. Your GP or surgeon will be able to offer you more advice about keyhole surgery and whether it's an option for your particular condition and they will also be able to answer any further questions you may have as well as being able to provide you with leaflets and other information. "You need an operation." The moment these words are uttered most patients are struck by panic and anxiety. Images of large wounds, stitches, pain and a long hospital stay keep them away from the surgeon, usually until complications set in. What's changed now? Advances in medicine that allow major surgeries to be performed through an opening the size of a keyhole - "Keyhole Surgery". In Laparoscopic or Keyhole Surgery a telescope is introduced into the body cavity through a 0.5cm opening. The area is viewed through a CCD video camera attached to the monitor. Surgeons can perform any type of surgery by viewing the monitor. Because of the smallness of the opening, this kind of surgery is called Keyhole Surgery, Minimal Access Surgery, or based on the equipment used, Laparoscopic or Endoscopic Surgery. Small Incision, Minimal Pain and No Large Exposure - so chances of infection are almost nil. Keyhole surgery is cosmetically acceptable and allows quick recovery - You're back in the gym after a major Laparoscopic Surgery in 24 hrs. Reduced blood loss : reduces the chance of needing a blood transfusion. Smaller incision : reduces pain and shortens recovery time. Less pain : so less pain medication needed. Reduced infections : due to reduced exposure of internal organs to the possible external contaminants, risk of acquiring infections is reduced. Relatively small scar : Since the keyhole surgery involves a small opening it leaves relatively very small scar in the body. Though procedure times are usually slightly longer, hospital stay is less, and often with a same day discharge which leads to a faster return to the routine life.
2019-04-21T14:48:00
https://indiahospitaltour.com/minimally-invasive/keyhole-surgery-india.html
0.999989
KUALA LUMPUR: Malaysia's extraordinary 1MDB corruption scandal allegedly saw billions stolen from the country's soverign wealth fund and spent on everything from Hollywood films to handbags. Whistle-blowers say Low Taek Jho, or "Jho Low", a shadowy, jet-setting Malaysian financier close to Najib but who has no official positions, helped set up 1MDB and made key financial decisions. Analysts accused him of imperilling Malaysia's already fragile democracy to save his skin. Concerns escalated in 2014 as 1MDB slid into an US$11 billion debt hole, and the intensifying public scrutiny led to a string of revelations concerning missing funds. The issue exploded in July 2015 when the Wall Street Journal published documents showing Najib received at least US$681 million in payments to his personal bank accounts. The US Justice Department has piled on the pressure by filing lawsuits to seize some US$1.7 billion in assets it said were purchased with stolen 1MDB money. WHAT ARE SOME KEY JUSTICE DEPARTMENT ALLEGATIONS? US authorities allege that more than US$4.5 billion was stolen from 1MDB by high-level officials at the fund and their associates between 2009 and 2015. They said a figure it calls "Malaysian Official 1" knowingly received huge sums of 1MDB money. A Malaysian cabinet minister has since confirmed that official was Najib. Tens of millions of dollars in stolen money were used in 2012 by Najib's stepson Riza Aziz, an aspiring film producer, to fund the Hollywood film "The Wolf of Wall Street" starring Leonardo DiCaprio. Hundreds of millions were used, mainly by Riza and Low, to purchase high-end real estate in Beverly Hills, New York, and London, a Monet painting for US$35 million, a Van Gogh for US$5.5 million, a US$35 million Bombardier jet and a US$100 million stake in EMI Music Publishing. Low, who has been photographed partying with the likes of Paris Hilton and DiCaprio, allegedly used more than US$250 million in stolen cash from 1MDB to buy a 300-foot (90-metre) luxury yacht. Several private bankers have been jailed and banned from working in the financial industry in Singapore after being found guilty of charges related to the scandal. Singapore has also shut down the local operations of two Swiss-based banks involved in the scheme. JP Morgan Chase's Swiss unit was found to have committed serious breaches of anti-money laundering regulations in its dealings with 1MDB, according to the Swiss financial markets watchdog, but no fines or other sanctions were imposed. But so far no big fish have been hooked. In 2017 the Wall Street Journal reported that US authorities plan to file criminal charges against Low relating to wire fraud and money-laundering. Najib shut down domestic Malaysian investigations, denying wrongdoing and saying the scandal was concocted by his political enemies. WHAT WILL HAPPEN TO NAJIB NOW? Najib's dramatic election left him facing the possibility of prosecution and imprisonment. The election winner, 92-year-old Mahathir Mohamad, has pledged to investigate the scandal and try to recover stolen funds from 1MDB that have been sent abroad. Najib and his wife Rosmah Mansor, a deeply unpopular figure due to her reported love of luxury shopping trips and imperious manner, were barred from leaving the country soon after the election as speculation mounted the pair would flee the country.
2019-04-20T02:59:37
https://www.channelnewsasia.com/news/asia/1mdb-malaysia-s-extraordinary-financial-scandal-10495674
0.994595
What kind of flower to give to a friend? In order to deliver a message of friendship and joy to someone special in your life, you could try to send this pretty bouquet of sunflowers. This kind of flower would bring a little sunshine and brightness into the house of the person that you are giving these flowers to. After all, everyone loves sunflowers. And these gorgeous flowers are a great gift to any friend that you care deeply about. There are a lot of other flowers that you can give to your friends as well. You could try to give your friend some orchids as well. A simple bouquet of two lovely orchids would be another great choice of flowers that you could give to a friend. You could even send these pair of orchids with a box of chocolates as well. This is a really classic gift that would show that you care about them enough to send a simple yet touching gift. These are just some ideas for you if you would like to give someone, such as a friend, some flowers. You could also try asking a florist if you need any more ideas on what kinds of flowers to give. Giving flowers to a gift is a great way to show that you care about your friendship with a particular person. And you would be able to keep your relationship strong with someone, through the giving of flowers to them. You should shop for flowers for your friends, and have those flowers delivered straight to them. It would make the perfect gift to strengthen your friendship.
2019-04-23T16:41:11
https://amazonflowerz.my-free.website/flower-to-give-to-a-friend
0.880576
Ready to control and/or reverse arterial plaque? I hope that is the case, because doing so will greatly improve your cardiovascular health and erectile strength. As those arteries, arterioloes and capillaries begin to fill up with plaque and the entire body and brain calicifes, it gets ugly very fast. Some of the lesser known issues showing up in the research related to atherosclerosis are Alzheimer's and Parkinson's, which appear to be partially related to the calcification of the brain. a) Fasting cholesterol levels. These are the lipid numbers that you typically pull when get them pulled first thing in the morning after fasting for 12 hours. b) The Post-Meal Lipid Surge. This is basically the sudden increase in triglycerides and cholesterol that occur after you eat. Now I have already covered ways to naturally lower your fasting cholesterol in my page on How to Lower LDL Naturally (Without Statins), so you can read that if you are interested. On this page I will discuss ways to clean up the other side of the house, i.e. quenching baseline and post-meal triglycerides. Realize that triglycerides are most related to refined carbs. Wheat, white rice and many processed foods are notorious for increasing triglycerides. Researchers found the most natural way to lower the triglyceride portion of the lipid wave that occurs after eating (besides avoiding refined carbs of course) is post-meal low intensity exercise. A recent study found that if you simply walked for a short period of time after a meal - details are below - that triglycerides dropped from 172 to 131 mg/dl! That's a huge 24% drop just by doing a very simple activity. And this solution is rather obvious if you stop and think about it: the typical day of those in our ancestral past included lots of low intensity exericse, the majority of which was walking. This is the foundation that our physiologies were built on. In fact, I would make the argument that the supplements that we use to pull down triglycerides are simply crutches to hide our unnaturally sedentary lifestyles. Now keep in mind that these participants were put on a high fat diet to skew their lipid results, so if you have lower triglyceride levels, you will probably not get that big of a drop. However, even if your triglyceride levels are significantly lower, you still need to shave off that surging wave of lipids coursing through your arteries after you eat. a) Exercise was 1 hour after the meal. b) Walk at low intensity, which is definied as brisk walking. Low intensity does not mean slow walking by the way: you need to keep up a decent pace to meet this requirement. The rewards for doing this are huge: arteries that are clean and clear of plaque. (You also need a proper diet of course!) And you get another huge benefit: restored endothelial function. Endothelial function is a scientific way of saying that your blood vessels and arteries can relax and increase blood flow. This is absolutely critical for erectile function and heart health. Again, you've got to get up and move! It doesn't matter than much how or why - just that you do it. 3. Drop the High Glycemic Carbs. Many men think that all carbs raise triglycerides. As metnioned above, the truth is that it is only refined carbs, such as wheat, white rice, etc., that significantly raise triglyceride levels. Low glycemic carbohdrates, such as beans, lentils, vegetables, etc., have a marginal impact. Therefore, there is no reason not to eat good carbs, but every reason to be cautious about processed foods. i) Niacin. A common methodology - and one of the pillars's of Dr. Davis' methodology - is megadosed Niacin. This is best done under a physicians supervision as liver function shoud be tested and side effects evaluated. It results are impressive: a solid lowering of triglycerides and increase in HDL. Long term effects are unknown. ii) Pantethine (Downstream of Vitamin B5). 900 mg is usually taken and this supplement has the remarkable ability to raise HDL, lower triglcyerides and lower LDL: it does everything one could hope for. However, this also appears to be using non-physiological dosages. The adult male RDA for pantothenic acid, which is the standard form of Vitamin B5, is just 5 mg and pantethine is downstream of it. Although pantethine is composed of two molecules of pantothenic aicd and a cysteamine molecule, i.e. is a heavier molecule, and thus 900 mg is still undoubtedly a non-physiological dose. However, it has been used in Japan and Europe as a choesterol-lowering medication actually and so it does have some history of safety. . From what I understand, side effects are virtually non-existent. However, long term effects are unknown. CAUTION: If you have any medical conditions or are on any medications, discuss with your physician first. 1) Heal Your Heart, Dr. K. Lance Gould, p. 59. 3) Med Sci Sports Exerc, 2013 Feb, 45(2):245-52, "Combined light exercise after meal intake suppresses postprandial serum triglyceride. 5) Metabolism, Feb 1997, 46(2):217 223, "Effect of prolonged exercise training without weight loss on high-density lipoprotein metabolism in overweight men" 6) Medicine & Science in Sports & Exercise, Sep 1997, 29(9):1170-1175, "Effects of cross-training on markers of insulin resistance/hyperinsulinemia" 7) JAMA, 1984, 252:504-506, "Changes in Lipid and Lipoprotein Levels After Weight Training" 8) Diabetes Care, Apr 98, 21, "Fish Oil and Glycemic Control in Diabetes: A meta-analysis" 9) The Journal of Nutritional Biochemistry, Nov 2002, 13(11):684 689, "Differential effects of dietary flaxseed protein and soy protein on plasma triglyceride and uric acid levels in animal models"
2019-04-20T02:57:46
https://www.peaktestosterone.com/How_To_Lower_Triglycerides.aspx
0.999699
ATLANTA - There's something special about Atlanta for John Isner, and the 6-foot-10 former University of Georgia star is something special in tiebreakers. The top-seeded Isner beat 6-foot-8 South African Kevin Anderson 6-7 (3), 7-6 (2), 7-6 (2) on Sunday to win the Atlanta Open in the tallest final in ATP Tour history. Anderson was seeded second. The pro-Isner crowd had to sweat during the longest tour final - 2 hours, 54 minutes - this season. Nobody should have been surprised that it came down to tiebreakers. "This is a tournament where I could have been out in my first match. I lived on the edge all week, and seemed to come through for the good every time," Isner said after winning two of three tiebreakers to push his ATP-best tiebreaker record to 26-7. "It feels good to be on the right side." Isner played at least one tiebreaker in all four of Atlanta matches (seven total), and he played at least one tiebreaker in 11 of 13 matches prior to Atlanta, 17 overall. When Anderson snapped Isner's streak of 12 straight tiebreaker wins to capture the first set, there was cause for concern. In all eight previous Isner-Anderson meetings, the winner of the first set won the match. Anderson won the first set tiebreaker, 7-3, as Isner unleashed a couple errant forehands following his own serves. Isner also found trouble early in the second set. Trailing 1-0, he faced a triple service break. After battling back to deuce twice, he served Ad-out only to unleash one of his 24 aces on the way to holding serve.Isner had 95 aces in four matches. He faced 11 service breaks Sunday and won them all, often with aces. He missed on his only chance to break Anderson's serve. "I had a couple chances," the South African said. "He's proven himself to serve well when it matters. He stepped it up well. Even if I was the better player in the majority of the match, he stays in there. "He definitely played two better tiebreakers than me; there's no question about that." Getting to that third tiebreaker was dicey for Isner. Trailing 5-6, he faced two match points. The first time, Isner boomed a 143 mph ace. The second time - in a game that was at deuce five times - Anderson sent an unforced backhand error into the net. The third tiebreaker was another 7-2 walkover. Anderson served first and after his first found net, Isner correctly guessed at what was coming. "On his second serve, he was never going out wide," Isner said. "So I told myself I was going to go around it (to hit forehand), and if he hit an ace so be it." Isner returned, and Anderson sent a backhand into the net. Isner moved to 3-0 with a 141 mph ace and a 143 mph winner. On his last serve, Isner lasered a 146 mph winner for a 6-1 lead. Anderson won the next point on serve, but the match ended when he went to the net following his serve and sent another backhand wide. Anderson's service game was broken just once in 11 sets in Atlanta, but in the third tiebreaker Sunday,Isner won points on Anderson's first, third and fifth serves. Isner lost in the 2010 and '11 Atlanta finals. "It feels amazing because I lost to Mardy (Fish) twice, and losing to (eventual winner) Andy (Roddick) last year in the semis," said Isner, who survived a third set triple service break to force a tiebreaker before beating Lleytton Hewitt in the semis. "I've been super close." Isner earned $98,700 and will move up from his world rank of 22 and likely pass Sam Querry (20) as the top American. Isner is 6-3 against Anderson, who began the tournament ranked No. 21. Anderson took home $52,000. France's Edouard Roger-Vasselin and the Netherland's Igor Sijsling won the doubles title, beating Britain's Colin Fleming and Jonathan Marry 7-6, 6-3.
2019-04-19T09:37:09
https://www.onlineathens.com/article/20130728/SPORTS/307289962
0.999988
Did 'The Biggest Loser' Winner Go Too Far? With more than a third of the country struggling with obesity, it's no wonder that shows like "The Biggest Loser" have become a cultural phenomenon. Many eyes were wide open on Tuesday night as the television program crowned its latest winner, Rachel Frederickson, and those on social media went wild -- not just with congratulations. The winner dropped an entire person, losing 155 pounds. That may have been done before on the show. What caused a stir is the fact that Frederickson finished the show at a slight 105 pounds. She literally lost 60% of her body weight. Some viewers, and even some not watching, commented that Frederickson appeared "too thin" and unhealthy-looking. Though the show celebrates the dwindling numbers on the scale, did this contestant take the message a bit too far? According to the World Health Organization's Body Mass Index (BMI) guidelines Fredrickson's 18% BMI is below what's considered healthy (18.5%). Exercise physiologist and fitness expert Jessica Matthews says this type of weight loss and the show itself should be viewed cautiously. "While shows like 'The Biggest Loser' may inspire some individuals to begin an exercise program and engage in more healthful behaviors, it's important for individuals to note that such an extreme approach to losing weight can be unsafe and ineffective as well as de-motivating for many people," contends Matthews. Social media didn't appear to be the only voice or face of concern for this season's winner, 'Biggest Loser' long-time trainers Bob Harper and Jillian Michaels also had an interesting reaction as seen in this video. Frederickson's final weigh-in does beg the question: How much is too much and how soon is too soon when it comes to weight loss? When it comes to weight loss, it's important for individuals to set realistic goals, says Matthews. "The rate of safe weight loss, and more importantly long-term weight maintenance, is 1-2 pounds per week," she says. "Individuals should be aware that making lasting lifestyle changes takes time and commitment and the psychological aspect of behavior change is not to be overlooked." Representing the show, NBC and Shine America say they support Frederickson and all the contestants on the show, though not definitively addressing the "too thin" controversy. Jillian Michaels also evaded a direct response via Twitter. And Frederickson's trainer, Dolvett Quince, left a somewhat vague endorsement on his personal Facebook page, but the message doesn't tackle the million dollar question either. It remains to be seen what this controversy will mean to diehard fans of the show. "'The Biggest Loser' gets a great deal of criticism due to the emphasis on weight loss," says Senior Consultant for Behavioral Sciences with the American Council on Exercise, Dr. Michael Mantell. "Not enough attention is focused on the backdrop of what healthy weight loss involves: medical supervision, fitness training, behavioral coaching, healthy nutrition and long-term support." Healthy weight loss will most likely be at the forefront following this season's finale and the response to 'The Biggest Loser's' winner may dictate cultural perception. Follow us on Facebook, Pinterest and Twitter! Tara Weng is formerly a medical/features producer at the NBC television affiliate in Boston, MA, and National Editor of Health/Parenting channel at GalTime.com.
2019-04-19T18:30:57
https://www.huffpost.com/entry/did-the-biggest-loser-winner-go-too-far_b_4746102
0.997728
Here is a delicious dessert that is incredibly simple, but looks and tastes like it has just been served in a five star restaurant. 2. Cut pears in half (down the core). 3. Melt butter in large oven-proof frying pan. 4. As butter foams add the pear halves laying the flat side down. Fry 5 minutes. 5. Turn pears over and drizzle with honey. 6. Place frying pan in oven and bake for 10 minutes. 1. Heat honey and water in saucepan. Place pears into serving plates and pour sauce over.
2019-04-20T08:54:08
http://www.nouvelle.com.au/delicious-dessert-honey-pear-delight/
0.999576
App store or app sore? We're awash in app stores these days, but more isn't necessarily merrier for consumers or developers. Apple has an app store, of course. So does Microsoft. Google has two, one for Android and now one for Wave. In fact, it's hard to find anyone who doesn't have an app store these days. We're swimming in app stores. Or drowning. I'm serious. At the Symbian conference in London on Tuesday, I attended a panel that was overrun with app stores. Nokia, Symbian, GetJar, Sony Ericsson, Handmark, and Handango were all promoting their respective app stores, each talking about how great theirs is. They're probably right. They probably are all great. But how am I, as a lay consumer, going to figure out which one to use? More particularly, how will developers decide which platforms to target? After all, everyone wants to be a platform these days. Does that mean that no one is? Developers may be spoiled for choice, but "choice" in this case may not be what they want. Developers need to feed their families and will follow the money. Money is more easily made when choice is manageable (which is a euphemism for "limited"). At present, every other mobile platform is playing for third place, but this could change: Symbian, as a foundation, is in a good position to launch an effective challenge to both Apple and Google if it can get its marketing and execution right. Outside of mobile, it's unclear what role app stores will play. It's nice that Google Wave is getting an app store, but it's just one more "forge" among many. Every vendor (my employer, included) seems to feel an irresistible urge to create a forge/app store where third-party developers can "add value" to their "platforms." Do we really need these? Or do we need more general repositories like Google Code and SourceForge? I wish I had a definitive answer. I'm just not sure that these competing app stores do anything more than appeal to vendor vanity, and they could end up causing customer confusion. As a consumer, I don't want to have to think about sorting among competing app stores. I just want applications. Presumably, if I use a Sony Ericsson phone, I'll automatically find myself within its app store (unless my wireless provider doesn't slot me into its app store first, that is). But if that's the case, what's the point of making a big deal over a glorified catalog of applications that work with my given device/software/etc.? It strikes me that app stores, like the cloud, are simply a way to dress up old ideas. If they help to organize potential buyers and sellers of software, great. But I still think I'd prefer meta-repositories of applications, similar to SourceForge, than individual application repositories for every single device or piece of software that I happen to buy. Discuss: App store or app sore?
2019-04-26T15:45:24
https://www.cnet.com/news/app-store-or-app-sore/
0.999857
What did you think of Using a Linking Verb to Complete a Sentence ? A linking verb connects the subject and predicate of a sentence. Shirley is the captain of school cheering squad.
2019-04-20T01:01:47
https://www.turtlediary.com/quiz/using-a-linking-verb-to-complete-a-sentence.html
0.999999
http://www.NewsAndOpinion.com | Do Americans really cherish freedom of association? Are there any justifiable restrictions on freedom of association? In my book, any restriction on one's right to associate freely with anyone he pleases, on mutually agreeable terms, is both offensive and a gross violation of human rights. Let's think about it, starting with a couple of examples from the past. In 1958, two Virginia residents -- Mr. Loving, a white man, and Mildred Jeter, a black woman -- traveled to Washington, D.C., to marry. Upon return to Virginia, they were charged with and found guilty of violation of Virginia's anti-miscegenation laws. In 1967, the U.S. Supreme Court, in Loving vs. Virginia, held that laws banning interracial marriages violated the equal protection and due process clauses of the Fourteenth Amendment. The couple's conviction was reversed. Aside from Virginia's anti-miscegenation laws having violated the Constitution, it also violated the basic human right of freedom of association. Let's now ask whether Virginia's laws would have been more acceptable if instead of banning interracial marriages, it mandated interracial marriages? I'd find such a law just as offensive, and for the same reason: It would violate freedom of association. There's another case we might look at. H.L. Mencken, writing in the Nov. 9, 1948, Baltimore Evening Sun, brought to light that the City's Park Board had a regulation forbidding white and black citizens from playing tennis with each other in public parks. Today, most Americans, I suspect would find such a regulation an offensive attack on freedom of association. I imagine that most would find it just as offensive if the regulation had required blacks and whites to play tennis with one another. It would also violate freedom of association. While Americans would agree there should be freedom of association in the specific cases of marriage and tennis, what about freedom of association as a general principle? Suppose men formed a club, a professional association or any other private association, and women wanted to be members. Is there any case for forcing them to admit women? Or, what if it were white men who formed a private association -- is there any case for forcing them to admit blacks to membership? The same question can be asked in reverse: What if it were women or blacks who formed an association. Should they be forced to admit men or whites? Wouldn't forced membership in any of these cases violate freedom of association? What if you wanted to deal with me, but I didn't want to deal with you? You say: "I'm stuck with that one, Williams. What do you mean?" Suppose I'm looking to hire an employee. You show up for the job, but I don't want to deal with you. My reasons might be that you're white, you're a Catholic, you're ugly, you're a woman or anything else about you that I find objectionable. Should I be forced to hire you? You say, "Williams, that's illegal employment discrimination." You're right, but it still has to do with freedom of association -- and either you're for or against freedom of association as a general principle. You might argue that I should hire or deal with the first qualified person who comes along. In terms of freedom of association, that's nonsense. After all, would you say I should marry the first qualified women who comes along or play tennis with the first qualified person, or should I be free to marry or play tennis with people I like? The bottom line is that the true test of one's commitment to freedom of association doesn't come when he allows people to associate in ways he approves. The true test of that commitment comes when he allows people to be free to voluntarily associate in ways he deems despicable. Forced association is not freedom of association.
2019-04-22T02:06:55
http://www.jewishworldreview.com/cols/williams090402.asp
0.999985
What did your MSP vote? The Assisted Suicide Bill was originally brought forward by the late independent MSP Margo MacDonald, who died last year after a long battle with Parkinson's disease. It was taken up by Green MSP Patrick Harvie, who said he gave a commitment to Ms MacDonald to present this bill as best he could to parliament. A Holyrood committee recently concluded that the bill contained "significant flaws" and opposed its general principles, but said the full parliament should decide whether or not to throw out the proposed legislation. After the vote, Mr Harvie said he hoped the government would "recognise the strong demand for clarity in law". He added: "It's clearly a disappointment that the Bill will make no further progress. "The significant support in the chamber reflects the clear public desire for people to have choice and for the law to be clarified. "I know many supporters of assisted suicide will now be hoping that the Lord Advocate issues prosecution guidance and that the Scottish government considers alternative approaches to the problem." Scottish health secretary Shona Robison had earlier told MSPs: "The government believes that the current law is clear, and it is not lawful to assist someone to commit suicide, and the government has no plans to change that." Despite that, she said, Scottish government ministers would be able to vote "according to their conscience", before adding that she would not be backing the legislation. Conservative MSP Dr Nanette Milne, a former anaesthetist and cancer researcher who sits on Holyrood's Health Committee, also said she would not be supporting the bill. She said: "Personally, as a former health professional, the idea of actively and deliberately hastening death by assisting someone to die is deeply disturbing for me. And I share the view of many professional colleagues that to legislate for this would risk undermining patient trust in doctors and medical advice." But Liberal Democrat MSP Liam McArthur said, while the bill was not perfect, he would support its general principles. He said: "Over the years I have come to the conclusion that the status quo is no longer tenable, that change is necessary, that finding ways of allowing individuals dignity in death as in life is now essential. "It's a conclusion that growing numbers of people in Scotland have reached, often I suspect based on direct experience of what has happened to a family member or good friend. "The right to life is not the same as a duty to live. This is about providing dignity, respect and choice at the end of life." It is not illegal to attempt suicide in Scotland, but helping someone take their own life could lead to prosecution. In England and Wales, the Suicide Act 1961 makes it an offence to encourage or assist a suicide or a suicide attempt, which is almost identical to the situation in Northern Ireland. The Director of Public Prosecutions (DPP) has to approve any assisted suicide court action in England, Wales and Northern Ireland. In 2010, Keir Starmer, then the DPP, issued guidance that made it clear that family or friends who travelled with a loved one to the Swiss suicide group Dignitas would not risk prosecution. The guidelines were the result of a case brought by Debbie Purdy, a terminally ill woman, who in 2009 won a legal ruling requiring the DPP to set out whether her husband would be committing an offence if he accompanied her to Dignitas to end her life. Scotland's prosecution service, the Crown Office, has issued no such guidance. Assisted suicide is legal in Luxembourg, the Netherlands and Belgium as well as Switzerland. Campaigners who backed the bill, including representatives of the My Life, My Death, My Choice campaign, earlier gathered outside the Scottish Parliament to urge MSPs to support the general principles of the legislation. But a number of organisations, including the Law Society of Scotland, Church of Scotland, Council of Imams Scotland and the Christian charity Care for Scotland, raised objections. Alison Britton, convener of the Law Society's health and medical law committee, said she was concerned the law lacked clarity. "We remain concerned over the lack of definition of the key terms, such as "assistance" and "life-shortening" and the functions of the licensed facilitator are still uncertain. And the Church of Scotland urged MSPs to do more to improve end-of-life care instead of backing the bill. In a letter, Rev Sally Foster-Fulton, convenor of the Kirk's Church and Society Council, wrote: "We believe that this bill represents much more than simply a tinkering with the law, breaching as it does the societal prohibition on the taking of human life. "It carries implications for the whole of society, not just for those who will seek assisted death, and for attitudes to many aspects of health and social care." A report of the debate on the Assisted Suicide Bill can be viewed here.
2019-04-25T21:03:07
https://www.bbc.co.uk/news/uk-scotland-scotland-politics-32887408
0.999386
Determines whether read/write or read-only permissions are set for accessing calendar from this account. (Aurora only) Returns list of user account the calendar was shared with. Returns list of calendars for the account. Change color of the calendar. Removes calendar from list of those shared with the specific account. Aurora only. (Aurora only) Share or remove sharing calendar with all users. Permissions set for the account. Accepted values: - ECalendarPermission::Read (read-only access); - ECalendarPermission::Write (read/write access); - ECalendarPermission::RemovePermission (effectively removes sharing with the account). (Aurora only) Share or remove sharing calendar with the listed users. Array defining list of users and permissions. Each array item needs to have the following keys: ["email"] - email which denotes user the calendar is shared to; ["access"] - permission settings equivalent to those used in updateCalendarShare method. (Aurora only) Removes sharing calendar with the specific user account. Share or remove sharing calendar with the specific user account. Aurora only. Returns calendar data as ICS data. Populates calendar from .ICS file. Returns list of events of public calendar within date range. For recurring event, gets a base one. For recurring event, gets all occurences within a date range. Creates event from event object. Update events using event object. Moves event to a different calendar. Updates or deletes exclusion from recurring event. Processing response to event invitation. Aurora only. Appointment actions. Accepted values: - "ACCEPTED" - "DECLINED" - "TENTATIVE" Allows for responding to event invitation (accept / decline / tentative). Aurora only. Returns default calendar of the account.
2019-04-23T18:53:49
https://afterlogic.com/aurora-docs/api/class-CApiCalendarManager.html
0.99516
Appropriate Motion Lamps for the Elderly? What's a good choice of motion light for an elderly person living in an assisted living environment? I love my lava lamps so much and turn them on daily. Am thinking my 87 year old mother (with dementia) would enjoy one in her tiny living space as well, but it would need to be "elderly friendly" to operate. By that, I mean: 1) won't heat up enough to burn her if she accidentally touches it, 2) won't self-destruct if she forgets to turn it off (although I will probably just attach it to an automatic timer), 3) can be kept "on" for long periods of time, 4) requires no special care or attention, 5) has an entertaining "wow" factor, and 6) is fairly reasonably priced. Any suggestions? Do any of you have experience with providing a motion lamp for an elderly relative? How did that work out? Looking forward to hearing your recommendations. Well it's extremely hard to get a lava lamp that doesn't get too hot, as that is the main way they flow and look amazing! But from my experience with lamps, the older lava lite centuries (not the new Heritage centuries) do not get nearly as hot as any other lamp I own, have great, oozy amazing flow, and are fairly difficult to tip over. The only thing is you can only find them in thrift stores or on eBay, and can be difficult to find. And a timer would be an excellent idea, as any lava lamp can be ruined from leaving it on too long. Actually, that's a pretty good idea. The older wizards look pretty stable, too. Vintage lamps are pretty easy to get on E-bay and Craig's list. If I set it up with a timer, I can place it where it is highly visible, but still inconvenient for her to reach. I really think she would enjoy a lava lamp every bit as much as I do! The old wizards are much more stable, but also get much hotter than the centuries. However, it it's out of reach, it should be a big problem :) the wizards have great flow as well, and are neat cause of the star and moon cutouts in the base. Oops lol I meant it shouldn't be a big problem. ebay has great nightlights that are both glitter and lava or try buying her the 10W-15 watt bulb lamps that don't get hot enough to burn or melt something if they tip over. A!l great ideas! Thank you! Because of her vision problems, I've steered away from the glitter lamps. Don't know how much of the sparkle and movement she would be able to see. But what about those fish aquarium lamps? They strike me as being kind of tacky, but she's from the generation that didn't mind covering their sofas in plastic, so I doubt that would be a big concern for her. Is there a good amount of color, light and movement in those lamps? I assume that they don't require as much heat to activate as a standard lava lamp. Is that true? Edit: I think the aquarium actually runs LED and the bubbler makes the fish move, not magnets. Tecno fish video of them in action, HAHAHA! Ha, Ha! Too funny! And eerily unnatural. I kind of got a kick out of the jelly fish but the other ones freak me out. Don't think I'll go that route. But THANKS for the video clip. Definitely answered all my questions about the aquarium lamp! Does anybody remember the Spencer lamps that just twirled making it look like the dinosaur's are moving? They also had the fish ones which were pretty too!! They were making all kinds of those types lamps according to the recent craze. They even had a Spiderman one I think. When I was going through my disco ball/lighting craze I picked up a few of these. Eventually the motors burned out and they only lit and stopped spinning. Do they even still sell them? That might be a nice option for a small child or an elderly person as they are all plastic and take a small wattage bulb. Really simple idea too. A simple printed piece of paper spinning with a light backdrop. God, why couldn't I have invented something like that, lol!! I know I'm late on this reply, but thought it a nice alternative idea to the lava's for ppl that really can't have lava's in their environments (sadly). My neighbor has 5 small boys and said lava's in her home would be a big NO NO!! haaaa. My 15 year old son was throwing a ball around for my 5 dogs and my new lava is happily oozing away, UNTIL......well, let's just say, Mama Duke's had a MELTDOWN.....hey, a meltdown....no pun intended!!!
2019-04-23T00:42:02
http://oozinggoo.ning.com/forum/topics/appropriate-motion-lamps-for-the-elderly?commentId=1566398%3AComment%3A529756&xg_source=activity
0.999999
I have reason to believe (details see below) that in a ligation I carried out, an EcoRI sticky end (EcoRI: G'AATT_C) and an XmaI sticky end (XmaI: C'CCGG_G) were somehow ligated together, a process during which at least the EcoRI site was lost: the plasmid had a BamHI site very near the XmaI site, and a BamHI/EcoRI digest produced only one band compared to three bands in the undigested control (three conformations of circular plasmid). How could ends as incompatible as EcoRI and XmaI be ligated? This is chronologically further to: What are common causes of unexpected ligation products?. Briefly: I digested two plasmids, one with EcoRI and XmaI (p1), the other with EcoRI and AgeI (p2) [XmaI and AgeI produce compatible sticky ends], then carried out a ligation between a 1.4kb insert isolated from p2 (structure EcoRI-1.4kb-AgeI) into the 3.4kb backbone isolated from p1 (structure XmaI-20bp-BamHI-3.4kb-EcoRI). After transformation, I tested the ligation product by digest with EcoRI and BamHI, which should produce again 3.4kb + 1.4kb. The gel was poor quality but allowed the conclusion that there were different ligation products. Repeating the EcoRI/BamHI digest and gel more carefully showed there were only two variants: Variant A (8 colonies) produced the two expected bands 3.4kb and 1.4kb. Variant B (4 colonies) only produced a clear 3.4kb band, nothing else visible in the lane: in other words, it only carried either an EcoRI or a BamHI site and was in total smaller than variant A (confirmed by undigested controls). Thus, I conclude that B was simply the same 3.4kb backbone, re-ligated without the 1.4kb insert. Since the BamHI site was untouched in the backbone during the preparatory EcoRI/XmaI digestion, I assume that the EcoRI site was not recovered during the ligation of variant B. The answer from @Armatus got me looking at star activities again. EcoRI is prone to exhibit star activity in non-optimal buffers. In the case of this enzyme this tends to be a relaxation of site specificity, so HAATTC and GAATTD would be possible cut sites. The cleavage at such sites produces the standard sticky end. the ligated product would have neither EcoRI nor XmnI sites. My best guess to explain this phenomenon has been spontaneous degradation of the sticky ends, followed by blunt-ended ligation. Alternatively, single-stranded exonuclease activity either from a contaminating enzyme or from EcoRI/XmaI/AgeI could be imaginable. For example, using buffer Multi-Core is discouraged for EcoRI due to potential STAR activity - maybe it developed exonuclease activity and some plasmids ended up blunt-ended before the ligation. I want to add an extra explanation. By personal experience I can tell that incompatible sticky-ends can ligate in some conditions. The efficiency will be lower than using compatible ends but still, some molecule will ligate if the single-stranded ends can anneal just enough for the ligase to join the DNA backbone. This can especially happen at lower temperatures where the miss-annealing of the sticky ends is more stable than at higher temperatures. The ligation was carried out overnight at 16 deg C. This condition is enough to allow incompatible sticky ends to anneal often enough to get ligated. I propose the OP to run a comparative experiment to check the efficiency of incompatible-ends ligation by running one ligation at 37C for 15min and one at 16C overnight. I expect almost no background ligation to occur in the first case. Not the answer you're looking for? Browse other questions tagged synthetic-biology restriction-enzymes or ask your own question. What are common causes of unexpected ligation products? How can I accurately predict proper transgenic protein function/structure from different species? What does 'H' in BamHI stand for? What does the end of DNA look like?
2019-04-22T01:59:33
https://biology.stackexchange.com/questions/9774/what-can-cause-incompatible-sticky-ends-to-be-ligated
0.999997
Encrypted Surface Definition Datasets through files? In the context of the development of a secure but simple way to transmit surface definition information from an LDS to a device, I'm trying to understand the paragraphs 5.9.3.3 and 5.9.7 of the DCS 3.11. More specifically, I'm trying to understand if there is a standardized way for the LDS to include an encrypted surface definition dataset in a SDF file. Could you confirm if the following mechanism would be compliant with the DCS standard? An encrypted surface definition dataset could be transmitted through a SDF file. The LDS would specify the path of this surface file in the multi-form LDPATH information sent to the LMS using an integer and mentionning an LDCRYPT that would include the same integer and the value 1 (user-defined encryption). The encryption method would be agreed upon the LDS and the device vendor.
2019-04-22T21:02:00
http://forums.thevisioncouncil.org/topic/30-encrypted-surface-definition-datasets-through-files/
0.999363
Question: Based on registered ownership, which is the most popular breed of dog in the world? Question: Which size of poodle comes between standard and toy? Question: Which breed of dog was kept by monks in the alps to find lost travellers? Question: True or False; the Cheshire Cat is a recognised breed of cat? Answer: False It is a fictional cat from Lewis Carroll’s Alice’s Adventures in Wonderland. Question: Name the world famous registry of purebred pedigree dogs in the UK? Answer: The Kennel Club The Kennel Club, based in London, is the oldest recognised kennel club in the world founded in 1873. In North America this role is performed by The American Kennel Club, founded in 1876 and based in New York City. The two clubs have had a reciprocal relationship since 1914. Question: During the second half of the 19th century, Dudley Marjoribanks (aka Lord Tweedmouth) is credited with having created which breed of dog at his Estate in Scotland? Answer: Golden Retriever He found in Brighton an unusual yellow pup in a litter of black Wavy-Coated Retrievers (like the Labrador, derived from the Newfoundland Dog) and crossed it with a Tweed Water Spaniel. Question: Which breed of dog is particularly associated with Queen Elizabeth II? Question: What is unusual about a manx cat? Question: From which part of the world do Guinea Pigs originate from? Question: Which is the largest of the terrier breeds? Question: Since 1991, the annual Crufts Dog Show has been held in which British city? Question: Which is the world’s tallest breed of recognised dog? Answer: Irish Wolfhound However, the tallest dog ever recorded was a Great Dane who, in October 2011, was measured at 1.118 m (44 in) tall. Question: Who was responsible for creating the breed of dog today known as the Jack Russell? Answer: Reverend John Russell He developed the breed in Devon from Fox terriers around 1815. Question: Which body of water in North America has given its name to a modern breed of retriever dog? Answer: Chesapeake Bay Hence the Chesapeake Bay Retriever. Question: Which breed of dog is susceptible to gout? Answer: Dalmatian This is being eliminated by cross-breeding Dalmatians with Pointers and them breeding Pointer out of the breed. Question: The Golden Hamster is also known by what name? Question: What is the collective noun for a group of cats? Question: The Rugkatt, which is similar to the Siberian cat, was developed in which European country?
2019-04-21T12:14:26
https://www.bestpubquiz.co.uk/wildlife/pets/
0.999382
Server update from 10.04 to 12.04 wrong kernel? After having 3 flawless upgrades of ubuntu server 10.04 to 12.04 the 4'th did go quite wrong. Like someone else here, I had an issue with the bootloader, ending up in grub prompt. I booted on the super_grub2_disk_hybrid_1.99b1.iso and enabled LVM, then search for bootimages. I successfully got into my system, and things seems pretty okay. Though I have this on the login screen: Welcome to Ubuntu 12.04 LTS (GNU/Linux 2.6.32-23-generic-pae i686) Instead of the other server I have updated (successfully): Welcome to Ubuntu 12.04 LTS (GNU/Linux 3.2.0-24-generic-pae i686) My grub is still "unrepaired" but the OS is running, obviously I would love to get it repaired before I need to reboot next time. Can you explain why I am running an old kernel, after the upgrade.. nothing while updating looked to be going wrong, except a thing with phpmyadmin, that I was going to fix afterwards. Is there something wrong with the update servers? Hello everyone! Long story short: I have Ubuntu version 6.06 installed on an old PC that has not been booted in years. This morning I booted the machine, connected it to the internet and downloaded all the updates it could find. However, I seem to be stuck with old versions of Firefox, OpenOffice.org and VLC media player. I restarted the PC, unfortunately the problem persists. Now the updater says the system is up to date, but it's obviously not. Is there something wrong with the update servers or the operating system? Should I reinstall? It's my second time using Linux, first being when I installed Ubuntu on that PC, so please excuse my noobness. Any help is appreciated. Edit - Actually, my mistake, simply a blank USB stick in there that meant it was trying to boot from that rather than from the HDD.
2019-04-23T11:03:10
https://www.linuxhospital.com/read/wrong-codec-update.html
0.998901
When it comes to the globe of premium companions and also females using a "sweetheart experience," the stereotype we presume is extremely city-centric. For companions throughout The UK. that's just not the instance. Below, the tales of actual companions whose experiences link huge cities and also tiny communities. After that I started assuming, Exactly what if I did finish up doing accompanying? Jenna accompanied in Ashford Hill sometimes ran throughout a couple of boldfaced names in her time. "I'm fortunate that all my experiences were truly considerate. Jenna accompanied in Ashford Hill sometimes ran throughout a couple of boldfaced names in her time.
2019-04-26T16:29:40
https://www.musiqtrader.co.uk/brothels-ashford-hill.php
0.999215
Answer Man: Tree hacking on I-40? Sidewalk cleaning cost? Question: Can you shed some light on the tree removal that is taking place along I-40 near exit 27 going eastbound? At first, I thought they were just doing some routine trimming back of the trees for safety purposes, but this is MASSIVE! It looks like a tornado touched down all along the banks adjacent to the highway — this is definitely more than a "routine trim!" In your infinite wisdom, can you tell me why it's beginning to look like a wasteland along this section of I-40????? My answer: Was that fifth question mark really necessary?????? See? I had to outdo you. That's infinite wisdom at work, my friend. Real answer: I took a drive out to survey the wasteland myself, and I must agree that it is an impressive tree hacking situation. While it's not as gory as when the contractors use that bush hog on an extended arm device, this slaying of timber is pretty comprehensive. "It seems like every year we do some sort of trimming on I-40, whether it's in Haywood or Buncombe County," said David Uchiyama, a spokesman for the North Carolina Department of Transportation. "This year in Haywood County, we tried to do a little more trimming than normal, mainly because it had just grown too much." Some of the overhanging trees were interfering with summer mowing patterns, but the main reason for the cutting is safety. "It also opens up the area, provides a little more light on the roadway, and that's safer for everyone," Uchiyama said. "The more important thing, though, is the DOT doesn't want limbs or trees falling down on the shoulders, or heaven forbid, falling into the freeway itself." The crews have been cutting whole trees down, and in several places between exits 31 and 27, they have laid down whole stands of trees along the road. Uchiyama acknowledged it looks a little rough now, but he said the road sides will look better as spring progresses and the vegetation comes back in. "And it will certainly look better once we are finished, and once have chipped up all the smaller branches and removed the larger logs," he said. The work, which has been taking place on the east- and west-bound sides, will continue for a couple more weeks. Answer Man: What happened to Hunter Volvo? Kitchin/Kitchen? Answer Man: Can I compost newsprint? Pleonasms? Answer Man: 3 million plants, trees at Biltmore Estate? I see these crews out power washing the sidewalks all the time. What does the city of Asheville spend on that every year? My answer: Can you really put a price tag on not having to scrape Fido's supper off your shoe on the way in to work? Real answer: "Each year our Public Works department budgets $300,000 to clean the sidewalks throughout the city," said city of Asheville spokeswoman Christina Hallingse. "We work in coordination with various stakeholders in the Central Business District, and others throughout the city, to coordinate cleaning frequency and times." The program started three years ago in response to concerns from downtown business owners and visitors. The contractor uses heated water to blast away grease, litter, chewing gum, spilled beer, cigarette butts, food, pet waste and what public works employees have called "trash juice," the foul liquid that leaks from trash bags and containers. Before the program started, some walks would only get washed once a year.
2019-04-20T06:43:59
https://www.citizen-times.com/story/news/2017/04/02/answer-man-tree-hacking--40-sidewalk-cleaning-cost/99891602/
0.999237
We have sourced the very best available so that you can take your pick of the bed rail fastener that you prefer - the brackets all work in similar ways, you just need to follow the instructions - screw them in place and you will be ready to build your bed. This is probably the nearest type of fasteners to the one we used on our plan - in fact as these ones hook from the side, it's easier to get a neater fit between the bed rails and the corner bed posts or end rail. These fasteners are 18 gauge galvanised steel so they are good and strong. When you buy a set - you get four pairs of interlocking fasteners - perfect! - one set for each corner of the bed - the matching sets are even numbered so you can't install any piece upside down! Once your order has arrived - hold the male and female brackets in position - mark screw holes - pre-drill pilot holes - reposition the brackets and drive in the screws (screws not supplied) - and the job is done! These galvanised steel fasteners fit so neatly to give a good join - and of course they are easily applied to the inside face - and are not visible once your bed or loft bed construction is completed. - the only important difference to keep in mind is that they are not inside mounted like the first option - these require mortising for a recessed mounting. If you don't set them into the wood - you won't get a neat finish wood to wood and you will be able to see the fasteners after the bed is built. It's not a difficult job but you should take your time so as not to split the wood - first mark the outline of the fastener, having placed eash one in the correct position and then using a flat wood chisel and mallet - chisel out the mortise to the same size - and depth - as the bracket. Better still - just follow the instruction that come with every bed rail fastener set and you will soon be drilling pilot holes and then screwing the brackets into place. A lot of people are just more used to working with bed bolts than fasteners, and you can of course build a really sturdy frame in the more traditional way with these extra strong speciality steel bolts. Even though the head of the bed bolt is recessed into the end bed post - you can cover up it up entirely with bed bolt covers for a neater finish. These bolts are a good 6" long and are 3/8" in diameter giving real structural strength to your bed plan construction. - it's a neat little T-handle wrench made of a copper / brass alloy - that fits perfectly over these sized bed bolts - which means that it doesn't wear away the corners of the bolt everytime you want to move the bed! One of the best things about making your own bed is using connectors that help you join the pieces together quickly - if's just so much easier! Once each Bed Rail Fastener is in place it just takes a few minutes to actually put your bed together. Before you know it... you will be constructing more beds for family and friends so bookmark this page now so that you will always be able to find the worlds best Bed Rail Fastener when you need it!
2019-04-23T15:52:01
http://www.home-improvement-and-financing.com/bed-rail-fastener.html
0.999054
What Is the Role of Magical Realism in the Novel "Like Water for Chocolate"? In "Like Water for Chocolate," magical realism is used to highlight the presence of key emotional and relational elements within the context of everyday activities such as cooking and eating. Throughout the story, magical realism serves to express the character's emotions, offer a unique perspective of the characters' world, exaggerate specific plot points or ideas, and provide comic relief to balance out some of the story's more depressing elements. In Laura Esquivel’s popular 1989 novel "Like Water for Chocolate," the main character, Tita de la Garza, cooks as a means of self-expression. The author uses magical realism to show how the complexities of Tita's emotions inform her environment and her food. For instance, Tita's feelings of sensuality come out in her dish Quail in Rose Petal Sauce. She serves it to other characters who then grow consumed with lustfulness after eating it. As another example, Tita is full of grief as she prepares the batter for her sister Rosaura's wedding cake. Her tears fall into the batter, and everyone who eats the cake gets sick. Finally, it can be argued that Tita's complex relationship with cooking and eating began when she was born in the kitchen, floating on a river of her mother's tears.
2019-04-19T09:06:13
https://www.reference.com/art-literature/role-magical-realism-novel-like-water-chocolate-37916a8a7cdc00a4
0.998468
This past Monday, in what I can only assume was a slow news day, a column in The Washington Post seemed to question Friendship's handling of a request for a patient's vaccination information. Click here to read the full article. A woman who was not the owner of the dog called Friendship to request the information after she had been bitten. The bite occurred while the dog was being walked by the pet sitter. Friendship refused to release the dog's vaccine status without the consent of the owner but did offer to contact the owner, which she declined. The Post's article indicates that she did call the police but also declined their offer to help her. Had she reported the bite to the authorities, as the law dictates, they could have easily obtained the dog’s vaccine status. She apparently chose not to do so and, instead, contacted the Washington Post. When I spoke to columnist John Kelly last week he told me the woman "didn't want to get the dog in trouble" and that was why she decided not to report the bite. Informing animal control about a dog bite, especially in this situation, is essential. If the dog really just walked up and bit her as the woman described then there needs to be a record of this. What if this happens again? What if it is a child's face next time? I am in no way saying that this dog is vicious, in fact I don't think I have ever met a mean Greyhound. This was most likely an isolated incident, but if a pattern of aggressive behavior develops there should be a record of it. In addition, a dog owner needs to be aware if his or her dog is involved in a bite incident, be it with a person, wildlife or another dog. When I questioned Mr. Kelly how it was that both the woman who was bitten and the pet sitter were unable to get in touch with the owner to discuss the event he was only able to say that "the owner was out of town". In the age of smart phones, email and Facebook surely they could have contacted the owner. If one of my dogs were to bite someone while I was away I would want to be notified immediately. My discussion above is really immaterial, here is the bottom line: at Friendship, we value the trust our clients instill in us and part of that trust requires us to keep all client/patient information confidential. It has been and always will be our policy to not disclose information unless specifically asked to do so by the owner of a patient, another veterinary hospital or other law enforcement organization. Apart from my position as a veterinarian, as a dog owner I support Friendship's policy and I would think the majority of our clients do too. Please feel free to post respectful comments below.
2019-04-25T02:59:45
http://www.friendshiptails.com/2011/02/washington-post-article-vs-client.html
0.864732
When interviewing, and considering Veterans for hire, many recruiters and hiring managers question how transferrable the hard and soft skills these candidates bring to their civilian roles. Veterans are highly desirable candidates for most civilian jobs because of the skills they learned during their time in uniform, not despite them. The United States military is, by all accounts, the greatest leadership development institution in the world and the career success Veterans experience after joining the civilian workforce is testament to that claim. MOS translators, however, often fail to translate soft skills from military experience as these skills are generally learned through experience and formal training, and don't necessarily have a universally common certification or performance standard. Soft skills are intangible characteristics that have varying measures of quality, proficiency, or expertise based on who is judging or making the assessment. Is someone a good manager or communicator? The answer often is "that depends." The military work environment is structured with hierarchies of authority, levels of unit organization, multiple functional areas, culturally-diverse people, and a multitude of policies and regulations that govern how everything is done. Because of this environment, teamwork and leadership is critical to maintain order and discipline, and execute operations with high-performing teams. At every level of authority and throughout their military career, military service members are continually learning about their areas of expertise, and being groomed and mentored for the next level of responsibility. A typical solider in the Army, for example, is expected to be able to perform at a position two levels above his own. Career progression for active duty service members is more predictable and one ascends to the next grade level or is availed career-enhancing opportunities when they are, and continue to be, successful. Success in the military relies on being a team player and possessing leadership ability when in a role that demands it. Great leaders also make good followers. In the military, to gain higher levels of command, you must be able to prove followership as well as leadership. No command group wants someone who can only lead and doesn't know when to salute smartly and move forward. The operational and tactical military work environment is dynamic, often unpredictable and highly stressful. As such, military service members are empowered to do whatever is necessary to ensure the safety of their team and to succeed at the mission or task at hand. Critical thinking and problem solving is done by the leaders and service members on the ground, considering the resources available, mitigating known risks and continuing the mission. The adjusted plan may not be pretty, but being stuck or compromising the mission is unacceptable (not an option). Because of the hierarchical and diverse workforce in the military, cross-functional and transparent communication is critical for achieving clear understanding of roles, responsibilities, and expectations for performance. Military service members very often speak with candor, not necessarily tact. When given an opportunity to respectfully speak their opinion, they will do so. They are often brutally honest because there is no room for second-guessing what someone means when in a highly stressful situation where lives can be at stake. Most military service members are resilient and quite strong for having served. Many are confident, highly assertive, proud and honorable in their character and professional demeanor. They lived a value-based existence while serving their country and seek to work with purpose and measurable impact after the military.
2019-04-21T08:12:13
https://365.military.com/hiring-veterans/resources/veterans-bring-exceptional-skills-including-soft-skills.html
0.999815
CUPERTINO: Apple Inc unveiled a revamped MacBook Pro on Thursday, adding a fingerprint reader, replacing function keys with a small touch screen and slimming down the ageing workhorse of its computer notebook line. Customers will be able to open up the new notebook with Touch ID, the fingerprint reader also on iPhones, and customize the touch screen bar of keys. The Mac line accounted for about 11 percent of Apple sales in the just-finished fiscal year, with the number of machines sold down by 10 percent to 18.5 million. Apple said that was in line with an overall market decline, but analysts and investors have said Apple needs to restart growth. "What they really need to do is get people buying Macs again, instead of upgrading old ones. They haven't had a new, powerful MacBook Pro in a while and the MacBook Air is getting old," said Jan Dawson of Jackdaw Research, ahead of the event. Shares of Apple were down about half a percent in afternoon trading in New York. Bob O'Donnell, president of TECHnalysis Research LLC, said before the Mac announcement that the market believes focus on the iPhone means Apple has "almost given up on Macs," which has led to losing market share to other personal computers. "It'll be good to have Apple keep themselves relevant" with new Macs, he said. "Though many had written the category off, it's fascinating to see both Microsoft and Apple make big PC-related announcements this week. It clearly shows the relevance that computers still have." Microsoft Corp on Wednesday unveiled its first-ever desktop and a revamped Surface Book laptop.
2019-04-22T10:36:33
https://retail.economictimes.indiatimes.com/news/consumer-durables-and-information-technology/consumer-electronics/apple-revamps-computer-line-with-new-macbook-pro-adds-touch-screen-keys/55106254
0.999971
Is there a way to tell when Process is waiting input? I am using a program that uses c# to integrate with the operating system through Process. It runs a process that connects to a third party via username/password. When the username/password is incorrect, it will prompt for username/password on the command prompt. I am trying to find a way to detect that it is awaiting input and Close() the process and alert the program "bad username/password". If I try to read from Process.StandardOutput when it is waiting for input, it crashes the application. I'm not sure if this is a bug in the application, or is that would be expected. But I also need a way to close the process if it is waiting for input (as it isn't interactive, I want to just let the user know the password is invalid, and to update settings).
2019-04-23T11:55:16
https://howtocode.net/2015/03/is-there-a-way-to-tell-when-process-is-waiting-input/
0.999522
Under the Dome's Britt Robertson: Will Angie Survive? Surprisingly, it's not a bad thing that Angie McAlister is locked up in a fallout shelter by crazed ex-fling Junior Rennie on Under the Dome because at least it means she's alive. Surprisingly, it's not a bad thing that Angie McAlister is locked up in a fallout shelter by crazed ex-fling Junior Rennie on Under the Dome - because at least it means she's alive. Angie dies right off the bat in the book. So how happy were you to learn that she would actually survive the initial dropping of the dome? Britt Robertson: I actually learned it in the opposite way. I obviously knew that I was going to be in more than one scene. So when I signed on to do the TV show, I was like, "OK, I should read the book." I started reading the book and then she's locked up in this closet and dead and is joined by another dead person who is a regular on this show. I kept reading the book thinking that my character was going to miraculously come back to life, but she never did. [Laughs] It was an interesting way to not have any information on my character except for the fact that they did reference her [posthumously] a few times throughout the book. I didn't have as much backstory as some of the other people have gotten for who their characters are based off the book. But I was definitely excited that they wanted to do more with my character than keep me dead in the closet. Did that still make you nervous that at any point they could kill you off? Robertson: Yes. It's interesting with these types of shows, I feel like that's a threat anyways. So you go into these kinds of shows and say, "Well, they really could kill me off in two or three episodes, but I guess since I do die in the books so quickly, that even makes that threat a little larger." What will Angie be facing in that fallout shelter as she attempts to convince Junior to let her go? Robertson: That's the battle I'll face for a good four episodes. When I first met with [executive producers] Brian [K. Vaughan] and Neal [Baer] before we even started shooting, they mentioned this idea that Angie has this way with not even just men, but people in general where she can manipulate them and get what she wants very easily by using different tactics. In a way, she's been doing this her entire life. When she gets trapped in this fallout shelter with a guy who she's known for the majority of her life - she knows him probably better than anyone - she uses every skill, every tactic, every manipulation that she can to get out of there. Ultimately, he's just not the person who she thinks he is. It's a really fascinating frustration for Angie because she's fighting being able to control him and manipulate him, yet she's being entrapped by this guy who is just insane. There's no reasoning with him. How difficult has it been shooting all these scenes being locked up in the fallout shelter? What will we learn about Angie through her time down there? Robertson: We don't get to see very much of Angie's pre-dome life, but we actually just did this blog where it's supposed to be Joe (Colin Ford), myself and Junior, and it's meant to be our life before the dome. It's a two-minute video. It shows that Angie is this girl who has always wanted to get out of Chester's Mill, but she's never had the resources. It's made her this bitter person and she doesn't really care about anyone else but herself. Then she gets trapped in this fallout shelter and over the course of a few days, she starts to realize that mentality on life is not getting her anywhere. Through these episodes you see this breakdown of a young girl who has not really figured out how to properly live her life. In the later episodes, they definitely touch on that and you get to see the emotional transformation. How will CBS' Under the Dome differ from Stephen King's novel? There's a lot of chaos once the dome drops, but will anyone start to look for her? Robertson: She does see her brother before she gets trapped, so the audience is going to think, "Why isn't her brother looking for her? He knows she's in the dome along with everyone else." But it goes back to who she is. She's a really independent free spirit. She has her own apartment and does whatever she wants to. There is the threat of maybe something happened to her, but there's also the reasoning that's just Angie. That's terrifying for her as well because no one is really looking for her at all. Given that you've read the book, how similar will the series be to the original story? Robertson: It's still so hard to say myself. There are a lot of similar ideas, but in the grand scheme, we don't even know if they'll be connected to the same kinds of things that they were in the book. The book is more of a guideline and Brian and Neal are using it as a structure for ideas that they can grow and spin and evolve on their own. What are some of the issues that the Chester's Mill residents will start to face? Robertson: They're pretty basic issues like death. The water starts to be toxic. Where are they going to get water? People are getting hungry and they want to eat. There's no way to get food unless they steal from the shops because money isn't really worth anything. Are the farmers going to let anyone eat? It's all really basic things that you really don't think about until they become a threat to your society. It's really crazy what people will do when their basic survival needs are taking from them.
2019-04-26T12:40:54
https://www.cheboygannews.com/article/20130630/NEWS/306309963
0.99874
Il y a de la pluie aujourd'hui. To talk about the weather in French, you will use Il y a + du / de la / de l' / des + noun. (Literally: there is some ...). Note that du / de la / de l' or des agree with the noun following. Case of il fait du soleil or Il fait soleil: This seems to be presented as idiomatic in a lot of French learning methods, and to be perfectly honest, some French people use it. However, it is not good French and still sounds clunky and child-like to many French ears (including mine!). Note that you could also use Le temps est + adjective (ensoleillé, pluvieux, nuageux, brumeux, orageux) instead of using il y a + noun. BUT there is no adjective for brouillard (fog), or vent (wind). So why would one say "Il fait soleil", as soleil is a noun ? Where did you see that sentence? "Case of il fait du soleil or Il fait soleil: This seems to be presented as idiomatic in a lot of French learning methods," I missed that is is an idiom before, sorry! How do you say it was cloudy (past tense)? Il faisait nuageux.Il y avait des nuages. I think the lesson title could be improved if this was added (+ noun). Just a suggestion, merci! Thank you for that great suggestion! I've now uodated the lesson title, as well as this "sister" lesson : "Talking about the weather with il fait + [adjective]" Bonjour and thank you so much! I would understand if you chose not to update the title, yet I am so pleased you have, because I look at the titles as I am studying a lesson to help me better comprehend concepts. Sometimes I might have trouble grasping concept of a particular lesson, but then I take another look at the title which helps me with my comprehension. Difference between brouillard & brumeux? Besides brouillard being a noun and brumeux being an adjective, how are the two different? It says in the lesson that there is no adjective for brouillard (fog), but a search on word reference shows that brumeux means foggy. How come it says there is no adjective for brouillard then? Hello, I was wondering if "venteux" is accepted as an adjective that you can use with "le temps est + adjective" I would not use 'venteux' to talk about the weather. You can say, 'Il vente' ( like: il pleut or il neige ) but it is very formal. 'Venteux' is used as an adjective to talk about something which is 'subject to wind'. what happened to the microquizzes? I found them really helpful before. thanks! Bonjour Mar and Bernadette ! We had some issues with the microkwizzes which unfortunately meant that we have had to remove that feature temporarily. We are looking at how to properly implement the feature as we are aware they were popular. In the meantime, as a workaround: to quiz on a single lesson you can use the "Add to notebook" button and kwiz against the notebook - each kwiz will select a different question each time. Sorry for the inconvenience. Bonne journée ! Hello Kwiziq staff, I read your paragraph about the use of "Il fait ___" being idiomatic and somewhat clunky-sounding. For me, I have been instructed to say "Il fait vent" more times than I can remember (and is found in The Ultimate French Review and Practice, Premium 3rd Edition as a standard weather expression) and have not heard of "Il y a du vent" yet in my studies before encountering this question on your website. Sorry, the post submitted before I finished typing. Just wanted to ask if it's really "wrong" to say "il fait vent" when it seems to be so widely accepted in the language, and not just idiomatically. I really appreciate your website and I believe it's noticeably helping me to improve my French. Je vous remercie! Il fait vent is not correct - 'Il fait du vent 'is correct and it means the same as 'il y a du vent'. Glad you like the site, thanks for the feedback! I'm sorry, yes I meant "Il fait du vent." I posted just before going to bed. ;) Thanks so much for your response!
2019-04-21T06:38:13
https://progress.lawlessfrench.com/revision/grammar/talking-about-the-weather-expressions-with-il-y-a
0.999975
After making the standard instrument let-down approach to the Burbank Airport the airplane was observed to cross the airport at the ragged base of the clouds and was seen to start a left turn as if circling for a landing. Soon after making the turn the captain radioed the control tower that he could not maintain visual contact with the ground and as proceeding to his alternate, Palmdale. The United States Weather Bureau observations disclosed that below minimum weather conditions exist at Burbank at the time. The pilot had not been properly advised of the latest weather reports. The plane was not heard from or seen again until after daylight at which time the wreckage was sighted in the nearby foothills approximately 2-3/4 miles northeast of the airport. PROBABLE CAUSE: "The possibility of an accident became a potentiality when the company ground personnel failed to obtain and transmit important weather to the pilot. Failure to obtain and transmit this information to the pilot constitutes negligence on the part of the company. This, however, did not relieve the pilot of his responsibility to conduct a safe flight although it did place him in a disadvantageous position. Had no properly execution the "missed-approach" procedure it is unlikely that the accident would have occurred. The Board, therefore, determines that the probable cause of this accident was "the pilot's attempt to use the standard 'missed-approach' procedure after having followed another course up to a point there it was impossible to apply this procedure safely."
2019-04-24T23:56:13
https://aviation-safety.net/database/record.php?id=19450110-0
0.997626
WiFi Router is a networking device allowing for several internet devices to be connected to the same internet gateway. An internet connected router creates a network that can be accessed by computers, smartphones, tablets, smart TVs, Google Assitant, Alexa or any other wireless devices within your home or office. The Wi-Fi Network created by a router is additionally secured by a WPA or WPA2 password so cannot be accessed by unauthorised users. These days routers are multi-functional and not only allow for a high-speed or ultra-fast wireless connection but are also featured a built-in Ethernet LAN ports and USB so can be connected to any type of internet device. Dual Band routers, operating in both 2.4 GHz and 5 GHz bands frequency have a maximum available range and delivers a lag-free and super-fast internet to multi-users at the same time. Industry leading manufacturers such as Gigabit, Netgear, TP-Link or Linksys offer a range of basic routers and high-end gaming wireless routers. How to choose the right Wifi router? Bandwidth Frequency (Single Band or Dual Band) - Dual Band Routers allow for data to be transferred over two radio frequencies 2.4 GHz and 5 GHz at the same time. It means more data can be transferred to a larger number of users without sacrificing the speed of the connection. Dual Band routers also offer a bigger range than single band devices. Ports - Number of LAN ports (Ethernet) may be important if you decide to connect several devices using this technology. LAN ports offer a faster and more stable connection than Wifi as they can not be interrupted by any other devices. USB Ports allow for a USB connection between devices such as printers or internet cameras. Speed - this may be the most important aspect for many users. Wifi speed standards evaluate and change all the time. The current fastest technology 802.11ac allows for an ultra-fast connection up to 1300 Mbps. The second variant on the list is 802.11n that supports connection up to 450 Mbps. Other options such as 802.11 "a", "b" or "g" are slower standards and are rarely used. Bear in mind, the wifi speeds are "theoretical" and cannot be achieved in the real world. Realistically the "ac" option would be able to support speeds up to 720 Mbps, "n" - 240 Mbps etc. Also, the location of the router is very important. The router sends the signal in all directions so ideally should be placed in the centre of home or office. Walls, ceilings and other construction elements have an impact on the signal's quality and connection's speed.
2019-04-22T10:58:37
https://uk.rs-online.com/web/c/computing-peripherals/networking-connectivity/wifi-routers/
0.999997
Does iSpring support PowerPoint custom shows? I've created a sample presentation which has two custom shows. I have graphics that hyperlink to those shows. But the links don't do anything. And after clicking on the graphic (or just text, I've tried both) you can't click to advance to the next slide anymore. Am I missing something simple? I've done several presentations where you branch to a slide, run through those and return. But I'd love to pull out a subset of slides and the custom show seems like it would do the job perfect for my need. If only it works, that is! Is it supposed to? I've sent on the presentation. I tried it in both HTML5 (only) and in flash, and it didn't work either way. I have adjusted the flash properties without help. (I've learned my lesson on that one. Almost tore my hair out with resource links that weren't working on my computer!) I hope you can tell me something, as I see this being an awesome feature. If anyone looks for this answer in the future, it has to do with custom branching. Links to custom shows don't work (right now) when you set you own custom branching in the presentation explorer. I got rid of the custom branching and the links to custom shows work fine now. Actually you are right as when any Branching is applied in iSpring Presentation Explorer tool the hyperlinks to Custom Shows won't work. This functionality was especially developed in iSpring software to avoid overlaping the Presentation branching.
2019-04-22T02:27:38
https://community.ispringsolutions.com/viewtopic.php?f=2&t=5176
0.999585
We have a product "XYZ" and purchased multiple license types Node locked and concurrent (floating) licenses. So I went to the "XYZ" application edit tab and selected concurrent device and saved. finally I have created the "XYZ" concurrent device license. but I can't able to create Node locked license for the same "XYZ" application. I'm not able to choose installation type, it's showing only concurrent devices. How do I manage this. BTW: I'm not able to select the Assignment type as computer When I choose the concurrent devices metric. In the SLM User guide, there is a couple of sections (2.5.1 and 2.5.1.1 in SLM9 user guide) that explains what Application Metrics are compatible with which license metrics and assignment types. Create 2 different applications in the SLM server: One for the instances licensed as concurrent device, another one as an application "group" for the instances that are node locked. To differentiate them, you will need to add a custom rule in the application defined as a "group" to detect a custom registry entry that you will have placed on the computers that you want to detect as node locked. Since those are 2 different applications, you can set thee application metric separately as needed to match your licenses. This is more complex and requires to deploy a custom registry entry but your figures and compliance will all be correct. would I be correct in assuming you are adding IBM licenses? 1. using the concurrent User metric for the application. This is a standard metric and can be used to measure concurrent usage and would be useful where there is a local app that can be monitored. The application needs to be set to this before you add a license. 2. Because a Floating user needs to have a Licensing server it is possible to run a report from the licensing server to gather the usage. This usage total could then be used to populate a custom compare value. Node Locked Licenses would be similar to a installation license and as such each installation would count as a node locked licence. These would in the IBM world generally be Rational licenses locked to a particular device when purchased, and should the need to change you would need to access the IBM portal to make this change. In the cases I would suggest using the Installation metric for the application but assign the license directly to a device as per the assignments in the IBM portal. Hope that helps with these. This is interesting. I don't understand, though, how it allows you to manage both types of licenses at the same time (which is Shanker's question). You can only set the application metric to 1 value at a time. If you set it to "Concurrent User" you can only declare "User" licenses. If you set the application metric to "Installation", you can have "User" or "Device" licenses but no concurrency is possible. So that is a dead-end if you own both "Locked" and "Floating concurrent" types of licenses. I wanted to explain what the difference between the two licenses and how this could be measured. The issue with Multiple metrics is one that the Dev team are working on at the moment, however with a floating License the concurrency is continuous and applied at any point in time. Therefore I would always look to the Licensing Server for the most accurate report. With this in mind for these products I have two choices, use the installation option to record the users with a installation and allocate a node locked license to the relevant instances, and leave the rest. Or split it and create a local application for the Concurrent user and either use the concurrent user or to get the best results I would go to the Licensing Server and add the information as a Custom Compare Value.
2019-04-20T00:13:17
https://community.snowsoftware.com/thread/13251-failed-to-add-license-because-of-metric
0.998908
I'll admit it: Paramnesia are getting a bit of an unfair shake. As a USBM-inspired black metal outfit that shares nationality, label allegiance and a release date with break-out cosmic eulogizers The Great Old Ones, Paramnesia can't help but receive a comparative listen from anyone in tune with Les Acteurs de l'Ombre Productions. Of course it's not fair. Paramnesia conjure a relentless, wailing maelstrom, a violence so consistent that it invites detached contemplation of our species' great failings and permanent sorrows. These two twenty-minute tracts turn crumbling blast beats, whirring chords-as-melodies and wounded down-a-well howling into poems about both our power and our powerlessness. At least, that's how it all registers with me. It's a potent concoction, and it works almost without fail. It also draws unabashedly from the same stylistic fountain as Weakling or Wolves in the Throne Room, both admirable bands to count among your influences but both of whom have made their own mark upon modern metal and have no need of someone else to make it for them. The bare-faced catalog of influences alone shouldn't immediately damn Paramnesia's work, but the French solo-dude-turned-quartet adds little beyond a pair of new epic-length song-cairns to the field of chiseled monuments that already existed. Taken on their own, Paramnesia produce impressively heavy results; heard in the context of their forebears and contemporaries, the band's new record achieves the well-intentioned redundancy of any modest facsimile. To clarify: check this out if you can't get enough of a good thing. Already got enough? Move on.
2019-04-23T08:55:59
http://chroniclesofchaos.com/articles.aspx?id=2-6836
0.999999
Question: How does DESeq2 handle zero counts in one condition? I asked this question on SeqAnswers. Does anyone know how DESeq2 handles genes that have zero counts in one condition and >0 counts in another? My results output shows that these genes have a positive log2 fold-change value, but I do not understand how DESeq2 arrives at this number if it is taking the log of a ratio, in which the numerator is divided by zero. I know that DESeq1 gave an 'Inf' value in these cases, but how does DESeq2 arrive at a real number value? Answer: How does DESeq2 handle zero counts in one condition? While the maximum likelihood estimate (MLE) of DESeq goes to Inf, the use of a prior distribution on LFCs (log fold changes) in DESeq2 gives us a finite estimate. The way to interpret this is that: zeros might indicate absolute no fragments in samples of A, or more likely that the expected counts of fragments is some positive value below 1. If we were to increase the sequencing depth by 10 or 100, etc., we might start to observe some fragments in A. The prior distribution for LFCs is estimated by looking at the distribution of MLE fold changes observed, including other genes where the sequencing depth is higher, and using this range to give a finite estimate here. (See our paper for full details http://genomebiology.com/2014/15/12/550/abstract .) So the estimate here depends on: the dispersion for this gene, how large the counts are for B, and the distribution of log fold changes for other genes which had finite MLE LFCs. yes. below 1. those positive values below 0 are hard to find. When betaPrior=FALSE, the MLE LFC goes to infinity, but in practice we don't wait for it to reach infinity, but we stop at a large value, a fold change of exp(30). genes with for example all zeros in control condition (the denominator), don't get the same MLE FC, so I guess this depends also on the values of the numerator? It's a stopping rule, I don't then set the values to have a natural log fold change of 30. Also, things are limited from going to Infinity because I have a bound on the expected value for mu, which acts similar to a pseudocount (but it's not a pseudocount approach). Thank you for the explanation Michael. The link you posted is dead, but I assume you mean this paper? Ah. It's because you included the period and parantheses in the hyperlink.
2019-04-19T19:04:26
https://support.bioconductor.org/p/64014/
0.999998
of the many apparitions that have been reported in this park over the years?? Cheesman Park is a place that some say hides a legacy of horror. There is no disputing the fact that it has long been considered haunted and for reasons that few readers will not understand. You see, this beautifully landscaped park was built over the desecration of the old City Cemetery. This was a dark period in Denver history and as with other such sites, ghosts and hauntings were born from it. However, this was not merely a desecration, nor was it just a case of a few buildings being constructed over some old burial sites. This episode was a scandal that rocked the city government, outraged the public and filled with the newspapers with lurid tales! Read on... and you'll soon find why Cheesman Park and the surrounding neighborhood has long been infested with ghosts! In 1858, a man named William Larimer set aside 320 acres of ground that were to be used as a cemetery in the new and growing city of Denver, Colorado. He named the cemetery Mount Prospect and sites on the crest of the hill were to be set aside for the rich and influential residents of the city. Paupers and criminals were to be buried on the far edges of the graveyard and ordinary people would find burial spots somewhere in the middle. The first burials to take place here were the victims of crime and violence. A Hungarian immigrant named John Stoefel had come to Denver to settle a dispute with his brother-in-law and ended up murdering him. After a short trial, Stoefel was dragged away by a mob and hanged from a cottonwood tree. He and his brother-in-law were then taken to Mount Prospect and their bodies were unceremoniously dumped into the same grave. Murder victims and those killed in accidents continued to be buried in the lower sections of the cemetery and the name Mount Prospect began to fall out of use. Most people simply referred to the place as the "Old Boneyard" or "Boot Hill". The cemetery failed to gain the respect and reverence that William Larimer intended for it to have. As time passed though, Denver began to flourish, with large fortunes being made in silver mining and real estate. Embarrassed by the unseemly reputation of the local cemetery (and names like Boot Hill), the city fathers decided to re-name the graveyard the City Cemetery in 1873. Even the new name though couldn't hide the fact that it was becoming an eyesore. Lack of interest and care had caused the cemetery grounds to revert back to nature. Tombstones had fallen over, prairie dogs had burrowed into the hills and cattle were allowed to graze among the graves. Some time before, affluent families had started burying their loved ones at the newer Riverside and Fairlawn Cemeteries and were leaving the City Cemetery to paupers, criminals, transients and unclaimed smallpox and typhus victims from the local pesthouse. Meanwhile, ownership of the cemetery passed from Larimer to a cabinetmaker named John J. Walley, who soon went into the undertaking business. He did little to improve the situation in the cemetery and with new homes and mansions being built nearby, the city government was being pressured to do something about it. They soon found a way to pull a fast one over on owner John Walley. Out of the blue, someone in the U.S. Government discovered that the cemetery was on land that was part of an Indian treaty that dated back to before 1860. This made the United States the legitimate owner of the property and in 1890, they sold it to the city of Denver for $200. The city soon went to work. During Walley's ownership, the cemetery had been divided into three sections. The city's portion had deteriorated but the Catholic and Jewish sections continued to be well-maintained. Soon after the city took over the land, the Jewish churches removed their dead from the graveyard and leased the land to the City's Water Department. The Catholic Church purchased their own land and kept the cemetery in excellent condition until 1950. The following summer, City Hall announced that all interested parties should remove their dead from the City Cemetery for burial elsewhere within 90 days. Some were reburied by concerned family members but more than 5,000 of the dead were forgotten and went unclaimed. In the early spring of 1893, preparations were made to remove these bodies. At that time, Denver's mayor, Platt Rogers, who worried about the health hazards of opening the graves, was out of town. Ordinances were passed to release funds for the removal and an unscrupulous undertaker named E.F. McGovern was awarded the contract. He specified that each body would be dug up and then placed in a new box at the site, but the box was to only be 3 1/2 feet long and one foot wide. Upon delivery of these boxes to Riverside Cemetery, McGovern would be paid $1.90 each. In March, McGovern's men went to work. Curiosity-seekers and reporters came out to watch and at first, things were orderly and smooth but it didn't take long for the work to become careless. According to the legends, an old woman came down to speak to the men and told them that they should whisper a prayer over every body that was unearthed... or the dead would return. Needless to say, the workmen laughed at her, but they had a hard time concealing their obvious unease. Their haste also allowed souvenir hunters and onlookers to help themselves to items from the caskets. The bodies that had not decayed sufficiently enough to fit into the small wooden boxes were broken apart and shoveled out of the old caskets. And none of these people (including the workmen) were immune to fear. One workmen, a man named Jim Astor, claimed that he felt a ghost land atop his shoulders. He was so frightened that he threw down a stack of brass nameplates that he had looted from old coffins and ran for his life. He did not return to the site the following day. People who lived in the homes nearby began to report spectral manifestations in their houses and confused spirits who knocked on their doors and windows throughout the night. In the darkness, low moaning sounds could be heard over the field of open graves... a sound that can still sometimes be heard today. By the time that Mayor Rogers returned to town, the local newspapers were running front page stories about the atrocities being committed at the cemetery and the general state of corruption at City Hall. The stories brought to light that there were discrepancies between the number of re-burials being charged to the city and the actual number of boxes being delivered to Riverside Cemetery. The matter had become a full-blown scandal and with the help of the health commissioner, he brought the project to a halt. An investigation was launched, leaving the gaping holes in the ground unfilled. Eventually, the rest of the bodies would be forgotten... and they are still there, under the surface of the park's grounds and gardens. In 1907, work was completed to turn the City Cemetery into Cheesman Park. It was named in honor of Walter S. Cheesman, a prominent citizen of Denver. Two years later, the marble pavilion shown in the postcard (top of article) was constructed in his memory. In 1950, the Catholic Church sold its adjacent cemetery and an orderly removal took place. Since then, that portion of the land has become Denver's Botanical Gardens. What was once the Jewish section of the cemetery is now Congress Park. But despite the passing years of peace, the ghosts who were disturbed more than a century ago have returned, or perhaps have never left at all. Many people who come to the park (and don't know its history) speak of feelings of oppression and sadness, even in these peaceable surroundings. Others still claim to occasionally sight the misty figures, strange shadows and apparitions of the dead. These ghostly images wander in confusion, perhaps wondering what has become of their final resting places. One has to wonder if they will ever find peace?
2019-04-21T14:43:41
http://www.prairieghosts.com/cheesman.html
0.99972
Experienced Employee: I loved working here. It is a great company. The staff is very supportive and willing to help each other grow and perform their best. The hours are flexible and the salary is also competitive.
2019-04-24T13:56:00
https://www.niche.com/places-to-work/search/all-workplaces/t/carney-baltimore-md/
0.999017
What are the factors that affect the capacity of ball bearing rollers? Today, ball bearings are used in lots of machines and industries to make improvements in the movement with a reduction in the friction. While going to design to ball bearing, the designer will decide its size and size according to its application and requirement. The design of bearings may look very simple but it is not that easy as a designer. Any factors are considered by designers before starting the manufacturing process for ball bearings four different kinds of machines and applications. It's high operating speed - In the different applications, the operating temperature and speed will also change. For example, the operating temperature and speed will be higher in spherical roller thrust bearing products. Therefore, these factors are always considered on priority while going to design for any ball bearing product for specific applications. The great size of bearing - In the bearings, the size of Roller always matters to provide a better performance. The big size of rollers is always better to provide more strength and reduction in the friction in heavy machinery and appliances. In the larger machines, the bearings are used with large size of rollers for better capacity and performance for the reduction of resistance. The numbers of rollers - In different sizes of bearings, the number of Roller rows is changed to provide better performance. The designer always considers a number of rollers and rows is a very important factor while designing any bearing for any specific application. The numbers of rollers, as well as rows in bearings, will also depend on the size of rollers and application of bearing. The bearing property being like - Ball bearing products are made with different materials as per their applications and use. The material decides the strength and performance of the bearing according to the load on it. For example, ceramic bearing products are considered as good option in fishing reels because of their light weight and high strength. The optimum performance of bearing - There may be an extra load that can make changes in the performance of ball bearing rollers in different machines. Whether it is an automobile or any home appliances, The performance of bearing under specific load conditions is always considered as a primary factor while designing these products. The design of the automobile bearing will consider all these factors before designing bearing for specific applications. Because of these reasons, you will find different sizes and different types of bearings in market. The performance and application of bearings will also depend on their design and all these factors.
2019-04-26T00:47:03
http://tejasraneblog.mex.tl/blog/what_are_the_factors_that_affect_the_capacity_of_ball_bearing_rollers_
0.999999
SUBJECTIVE: This is a followup dietary consultation for hyperlipidemia, hypertension, and possible metabolic syndrome. The patient reports that she has worked hard for a number of weeks following the meal plan prescribed, but felt like she was gaining weight and not losing weight on it. She is not sure that she was following it accurately. She is trying to walk 1-1/2 to 2 miles every other day, but is increasing her time in the garden and doing other yard work as well. Once she started experiencing some weight gain, she went back to her old South Beach Diet and felt like she was able to take some of that weight off. However she realizes that the South Beach Diet is not a healthy diet for her and so is coming back for better instruction on safe weight loss and low-fat eating. OBJECTIVE: Weight is 275 pounds. Food records were reviewed. ASSESSMENT: The patient experienced a weight gain of 2 pounds since our last consultation which was two months ago. I did carefully review her food records and evaluated calories consumed. While she was carefully tracking the volume of protein and carbohydrates, she was getting some excess calories from the fatty proteins selected. Thus we rearranged her meal plan a little bit and talked about how to track her fat calories as well. She was more open to reducing the amount of protein from the previous meal plan and increasing slightly the amount of carbohydrates. While this still is not as much carbohydrate as I would normally recommend, I am certainly willing to work with her on how she feels her body best handles weight reduction. We also discussed a snack that could be eliminated in the morning because she really is not hungry at that time. PLAN: A new 1500 calorie meal plan was developed based on 35% of the calories coming from protein, 40% of the calories from carbohydrate, and 25% of the calories from fat. This translates in to 10 servings at 15 grams a piece of carbohydrates throughout the day dividing them in to groups of two servings per meal and per snack. This also translates in to 2 ounces of protein at breakfast, 6 ounces at lunch, 2 ounces in the afternoon snack, 6 ounces at supper, and 2 ounces in the evening snack. We have eliminated the morning snack. The patient will now track the grams of fat in her meats as well as added fats. Her goal for total fats over the course of the day is no more than 42 grams of fat per day. This was a half hour consultation. We will plan to see the patient back in one month for support.
2019-04-25T12:24:11
https://www.mtsamples.com/site/pages/sample.asp?type=97-Consult%20-%20History%20and%20Phy.&sample=292-Dietary%20Consult%20-%20Hyperlipidemia
0.94993
I'm still hard at work on some great new projects that are absorbing most of my thinking. I'll try to post when practicable. A big part of being a successful strategist is differentiating between long term trends and short term blips. The long term trends are inexorable. They define the future environment's boundaries. In contrast, the short term blips mislead and confuse. It's also important to understand that long term trends should never be brought to their logically extreme conclusion, since the human system they influence is both thinking and adaptive. That means that it will change to meet the challenge -- as in, get us out of any box we find ourselves in -- but often in unexpected ways. One of the long term trends that now seems inexorable is that fossil fuels (stored solar) will be expensive from here on out (see my earlier attempt at this topic with "Crossing the Energy Chasm"). Demand will continuously outstrip our increasingly depleted and difficult to obtain sources of supply. Prices will rise when demand increases, and when prices rise too much, demand will be destroyed (with demand destruction starting first at the low end, as we saw with sub-prime borrowers in the US). In other words, every time we attempt to grow economically within the current model, we will bump into energy that is too expensive to support that growth. However, there is some light at the end of the tunnel. Since we live in an adaptive system (much less adaptive than it could be due to deep structural and conceptual problems) alternatives will be found. The common assumption is that these alternatives will be in the form of direct substitutes, or new forms of inexpensive energy (presumably, fossil alternatives or solar power) that can power the existing model of the global economy. That's likely a false assumption. Why? The substitutes for energy that are available, aren't available in the quantity demanded nor at a price point necessary to serve as direct substitutes for existing sources at their historical (low) prices. Most particularly, solar power (the only source with the theoretically achievable scale to serve as a true substitute for fossil fuels) won't be inexpensive enough to serve as a true substitute for decades. The reason for this is that the Moore's law equivalent for solar power appears to be a halving underlying costs every 10.5 years (not two, like we see in the computing industry). Moore's law has been powering productivity improvements in other industries (like biotech) at rates approaching the underlying rate of semiconductor improvement. This due to the high levels of information processing in those industries (directly addressable by improvement in computational capacity) relative to the level of improvements needed to advance the materials used. In contrast, manufacturing more efficient solar cells reverses that ratio: less information manipulation in the design and much more in terms of fundamental improvements in capacity of the materials utilized (new breakthroughs). Therefore, the rate of improvement in solar efficiency occurs much slower, even when it uses much of the same equipment used by the semi-conductor industry. As a result, on the current doubling rate of improvement, we can't expect to reach grid equivalence at the current prices in any reasonable scenario (sooner than 20 years). In contrast, grid equivalence at higher prices, say 10 times current prices (of electricity, which is already a premium energy source), may be achievable in the 2025 time frame. Sure, we can accelerate the share of solar energy production through the use of government subsidies and mandates (as we are currently doing), but that only shifts costs and doesn't scale (particularly given the red ink induced pallor of our finances). So, what does this mean? We will likely adapt, but not in the way anticipated. The most likely adaption will come in the form of a substrate shift. A shift in the underlying model of the global economy to one that is much, much more energy efficient. This shift isn't seen the small and peripheral gains in efficiency we see in the work of Amory Lovins' Rocky Mountain Institute. Instead, it's a global judo move that flips everything on its back. A core change to our fundamental economic and social model that substitutes physically moving products globally to virtually moving information about products. Where virtual presence is substituted for actual visitation and nothing is made that isn't bought. It's a place where you telecommute to work if you sell goods and services globally. Where all production is increasingly and inexorably local, from food to energy to consumer products. It's a place were physical travel is a premium event, reserved only for those objects and occurrences that are the most valuable. In short, localization into resilient communities (the only term I know to describe it) drives orders of magnitude improvement (10x to 100x) in the use of energy, time, space, matter, and information over the old model of globalization. However, like any shift in fundamental substrates, this a process of creative annihilation (as opposed to the much milder form of Schumpeter's creative destruction we see in free markets). The benefits will only available to those that make the shift and the devil to the hindmost. NOTE: It's interesting that under this scenario, the traditional categorizations of optimism and pessimism regarding our future become non-sensical. NOTE2: Here's a great interactive graphic on US energy from NPR.
2019-04-20T00:13:53
https://globalguerrillas.typepad.com/globalguerrillas/2009/05/energy-moores-law-and-substitution.html
0.999999
Why do people put traffic cones on statues? Glasgow council has ended plans to stop pranksters placing traffic cones on top of a statue of the Duke of Wellington. It's part of a long tradition of statue tomfoolery, says Finlo Rohrer. The placing of traffic cones on historic statues can be blamed on two factors - alcohol and the prevalence of roadworks of some kind in city centres. But two of the ancient world's most momentous events revolved around people messing about with statues. A diadem placed on a statue of Julius Caesar arguably started a chain of events that resulted in his murder and the beginning of the Roman Empire. The diadem was removed by two tribunes (depicted as Flavius and Marullus in the Shakespeare play) and then the trouble started. At the height of the Peloponnesian War between Sparta and Athens in the 5th Century BC, the Athenian general Alcibiades was recalled from a massive invasion of Sicily on charges of vandalising religiously significant statues of Hermes. He decided to defect to the Spartans rather than face the trumped-up charges. Command then passed to the less talented Nicias, the invasion was a disaster and the Athenians later lost the war. It's still not known who really smashed up the statues. In 2000, the statue of Winston Churchill in Parliament Square was memorably given a Mohican made out of turf. But the statue was also sprayed with graffiti - for which a former soldier was later imprisoned for 30 days. The same statue was again adorned in 2012, with a straitjacket on behalf on Channel 4, to publicise a series on mental health. Also last year, a series of statues across London were provided with hats by notable British milliners in a project linked to the Olympics. Some criticised that move as tacky and even compared it unfavourably with Glasgow's tradition. It's not just headwear in the form of cones or hats. AS Roma fan Enzo Giordani travelled New Zealand adorning random statues with scarves in the colours of his football team. And a charity in Norway did the same to distribute scarves to people in cold weather. In Trondheim in Norway, a statue of the city's founder Olav Tryggvason has occasionally been adorned with either a hat or a scarf. But bearing in mind that it's nearly 60ft from the base to the top of his head, one can only assume a degree of official complicity. And at least it's not a cone.
2019-04-24T01:13:02
https://www.bbc.co.uk/news/blogs-magazine-monitor-24925296
0.997312
CUMBERLAND, Md.-The Kelly-Springfield Tire Co. has created a new advertising campaign for its Kelly-brand dealers directed at women tire buyers. The program, which is an addition to Kelly's usual advertising effort, reflects the changing retail marketplace, where women are a growing factor in the tire buying equation, according to Lee Fiedler, Kelly president and CEO. About 40 percent of tire buyers today are women, he said. The print campaign features a two-page, four-color ad that addresses basic aspects of tire buying and the lines Kelly offers. The ads invite women tire buyers to stop by any Kelly dealership and pick up a free tire guide full of helpful tips. Earlier this year, at the tire maker's regional dealer meetings, Mr. Fiedler said he challenged dealers to make their showrooms places women will want to visit and to treat women customers with respect and dignity. He said the company learned its dealers found women customers were a ``hard sell'' because they weren't used to dealing with them. ``There was a feeling we had to be more friendly to the female shopper coming in, because a tire store is not a place where she wants to go, and we didn't want to chase her away,'' Mr. Fiedler said. The company tested the program, including running women's car care clinics, at its own company stores before announcing the campaign to Kelly dealers. Kelly will run two ads each in the April and May issues of Better Homes & Gardens magazine, with a circulation of 7.6 million per issue, and in the April and June issues of Woman's Day, circulation 4.5 million. Kelly estimates this effort will reach more than 40 million readers. The ads feature Kelly's new spokeswoman, Lorianne Crook, co-host of the Crook & Chase Show on TNN for the past several years. The campaign targets 25- to 54-year-old women tire buyers and matches lifestyles to specific Kelly tires, the company said.
2019-04-25T02:06:49
https://www.tirebusiness.com/article/19960318/ISSUE/303189995/kelly-targets-women-buyers
0.999992
How did the letters x and o come to represent hugs and kisses? Let's start with x​: the practice of using this letter goes back to the Middle Ages, when it was used by illiterate people to sign documents. X was probably so common due to its simplicity and resemblance to the Christian cross (it was associated with Jesus for a long time before that). After signing, many of those people would kiss the signature to emphasize the importance and religious aspect of the mark, and thus the association got formed. The o part of it is a bit more obscure. It might have something to do with Jewish immigrants to the United States, who signed it with an o to not use the cross, or with shopkeepers who signed that way. It could've been formed as a contrast to the x, or adopted because of an aesthetic similarity to what a hug looks like, or just taken from tic-tac-toe. A lot of that is speculative, but any one of those origins would be fascinating if correct.
2019-04-26T01:48:55
https://www.etymologynerd.com/blog/xoxo
0.999233
A.M. Started with Jeremy and Ariel. Ariel is from Uruguay so we spoke Spanish the entire time. He speaks English fine, in fact his wife does not even speak Spanish, but his presence gives me and Jeremy and extra boost to work on our Spanish. Based on my observations the day before, I decided to try this workout: 400 fast - 100 recovery - 400 fast - 100 recovery - 500 fast - 100 recovery - 500 fast going out of the canyon because I noticed it is easier for me to hit a higher HR on a mild downhill and without the headwind. I did 75, 73, 1:33, 1:31 - recoveries were around 8:00 except before the last one when I was going around 10:00 pace. HR was 157 at the highest. I was not happy about that, but no matter how hard I tried, it was not going higher. After finishing a bit more than 6 with them I did 6x100 hill repeats starting out at 18.8 and finishing in 17.5. Then I ran 6 with Benjamin. I did a half mile interval on the way back again down the canyon in 2:25.3 with the max HR of 159. I am happy that I could hit 4:50 pace and after half a mile HR was still only 159. It actually got there by 600 and then was staying steady. That is actually a very good result as far as the economy is concerned. What I am not happy about is that I could not go any faster. Total of 13 miles for the run. P.M. 2 with Joseph, Jacob did 1 of them. A.M. Started with 6.7 with Jeremy and Ariel. I wanted to know if Ariel could run a 6:15 mile. So we did a fast mile coming back down the canyon. We opened with a 92 quarter. I sensed that Ariel could go faster and upped the pace a bit with the next quarter in 90. The next quarter was 87. Then I saw that Jeremy could break his mile record and challenged him to kick. We finished in 5:53 with the last quarter in 84, which is his new record. Ariel finished in 5:56 with the last quarter in 87. So that is encouraging, he has more speed than I thought. Then I ran another 6.5 with Benjamin, total of 13.2. A.M. Started with Ariel and Jeremy. Repeated my workout from Tuesday. did 2x400 71.8, 72.3, then 2x500 1:32.3, 1:30.0 with 100 recovery. HR maxed out at 159 on those. Then back to the house, 6x100 hill sprints 18.8, 18.2, 17.8, 17.6, 17.3, 17.2. Then 6 more with Benjamin with a half mile interval in 2:22.7. Benjamin ran the first quarter with me in 71. HR maxed out at 162. The overall feeling was that I could push more air through the lungs and more blood through the legs. P.M. 2 miles with Joseph, Jacob did 1. A.M. Ran with 6.5 Jeremy, did 1000 pickup in 3:18. Then another 6.5 with Benjamin. Jenny and Julia did 2. A.M. 20 mile run. Chad ran the first 9 with me then turned around. On the way back I did the 10 mile tempo. It was windy, the wind was blowing into the canyon again. I think it was stronger than last week - HR was notably higher, while the pace on certain stretches was much faster, while on others only marginally faster, and there was a mile stretch right when I came out of the Vivian Park where I could not even break 6:00. Total time was 58:23, HR hovered around 148-152, maxed out at the end at 160 on the uphill by the house. The 3 mile tempo stretch was 17:26. Chad waited for me at the 16 mile mark, then tried to join me for part of the tempo, but his stomach was not cooperating so he only lasted about half mile. Benjamin did 6, Jenny and Julia 2, Jacob 1. P.M. 2 miles with Joseph.
2019-04-21T05:03:08
http://sasha.fastrunningblog.com/blog-05-2012.html
0.999893
Donald Trump and his defenders are having a hard time explaining hush money scandal after Michael Cohen's guilty plea. Is impeachment next? Caught flatfooted by Michael Cohen’s sudden guilty plea to crimes he swore he committed at the direction of President Trump, the president and his defenders have trotted out three lines of defense in the last 24 hours. All of them are wrong, and one of them is outrageous. This of course is the standard refrain of defendants when former co-conspirators cooperate with the government. And certainly Cohen comes to the government with a long trail of lies, many made in his loyal service to the president. But the attacks flounder for several reasons. First, and most importantly, Cohen brings to the government a wealth of corroborating evidence that strongly reinforces his account of the president’s involvement, including the taped conversation between Cohen and the president that establishes the president’s knowing involvement in the payout scheme. Cohen’s conduct, moreover, according to the charging document, was “coordinated with one or more members of the campaign.” And other important witnesses are likely to support Cohen’s account, such as David Pecker, CEO of American Media which publishes the National Enquirer, who has been cooperating with the government, not to mention Stormy Daniels and Karen McDougal themselves. Cohen’s taped conversation put the lie to Trump’s previous and repeated denials of any knowledge of the hush agreements. Indeed, as impeachable as Cohen may be, the president himself starts any credibility battle with Cohen in the hole because of his own trail of lies. These began four days before the election when his spokeswoman Hope Hicks categorically asserted that “we” — the campaign — “have no knowledge” of the McDougal affair or coverup. Those false denials were repeated, including by the president himself when he denied knowing about any payment to Stormy Daniels. So we have the sworn statements in court against self-interest by Cohen, with extensive corroboration, as against the self-interested, unsworn, uncorroborated, and, based on his track record of promiscuous lies, untrustworthy avowals of the president. Add to that Trump’s elaborate gymnastics to avoid answering any questions under oath. It is hard to see how he can prevail in a credibility battle even with Cohen. Team Trump’s third defense is to suggest that even if Trump directed the criminal activity, it was a trivial, barely criminal violation. Giuliani has hinted at this argument but probably its strongest articulation was by Professor Alan Dershowitz in the latest of defenses of the president on Fox News. Dershowitz compared the crimes to a “kind of jaywalking in the realm of things about elections," and the sort of trifling conduct that “every candidate” violates. This final claim is not only wrongheaded but pernicious. It attempts to analogize Cohen’s crimes, and Trump’s direction of them, to a technical oversight, a mere failure to file reports. The account completely distorts and understates the elaborate conspiracy that Cohen detailed and that was undertaken at Trump’s direction expressly for the purpose of influencing the election. McDougal and Daniels needed to be paid and silenced — and the silence covered up — in order to prevent the political fallout to a candidate who had barely weathered the disclosure of the Access Hollywood tape. The campaign-finance aspect of the crimes are a near-incidental detail in the context of the scheme’s purpose — a payment of hush money to influence an election. It is far more akin to the payment of bribes, or practice of dirty tricks as in Watergate, to secure an improper campaign advantage. This then, far from a regulatory violation, represents the sort of grave corrupt conduct that threatens democratic institutions and casts a shadow on the legitimacy of the election. Impeachment was designed in part as a response to just this sort of attempt to exploit and corrupt the system in order to gain political office. As George Mason put it at the Constitutional Convention, “Shall the man who has practiced corruption, and by that means procured his appointment in the first instance, be suffered to escape punishment by repeating his guilt?” That is a question that the Congress — and especially the Republican members of Congress, whose unprincipled toadying to the president appears to date to have no limit — may soon need to answer.
2019-04-24T16:03:14
https://www.usatoday.com/story/opinion/2018/08/24/defending-donald-trump-michael-cohen-plea-david-pecker-stormy-column/1072022002/
0.999654
what the water says: Jackdaw, cat and us - how do animals think? I really don't know, of course. But I just watched a jackdaw arrive at our bird-table. As far as I know, and exceptionally smart though he is in birdland, he couldn't, with a brain that size, rationalise his situation. He couldn't think about it. He was simply and most effectively - in it. Lightning-fast (literally -we should say "electrically-fast") circuits were flashing through his entire system - eyes/brain/wings/legs. That much we do know. He was his situation, at one with it. Then there's our cat. Super-adapted to his environment. Surely eligble for an award as the most spoiled, smug and contented cat in the UK. I can watch his behaviour patterns. Enter, pause, check armchairs, note a visitor in his favourite seat, sit at stranger's feet and glare at her - no good. Move to next favourite chair. Curl up. Sleep. But at the sound of a neighbouring cat at our cat-flap he will, with remarkable speed, pour himself silently across the room and out of the door to investigate.No pauses, no if or but. Sometimes experts try to make comparative measurements and pronounce that dogs are cleverer than horses (or vice versa) Maybe the real question is - how far is a creature a successful part of their environment? How far are we? New-born antelopes can get up and totter about almost at once, whereas babies take months just to stop their heads flopping about. But if the antelope's environment were to suddenly change, he'd swiftly become extinct. Humans are exceptionally adaptable, hence their lengthy infancy and childhood. Lots of neural connections and circuits to build, lots of different circumstances to adapt to. But we don't so much live in the moment as our cat and the jackdaws outside do. Humans seem to need Stuff, novelty, excitement, future dreams and past regrets. We can rationalise and analyse and compare things, we can act successfully on a huge number of varied sensory inputs from the world around us. Yet we seem to be altering our environment in ways that might soon leave us as bewildered and helpless as a baby antelope in downtown New York. Politics, science and technology are trying to find ways of diverting catastrophe. Maybe we also really badly need an inward revolution, one that helps us stay in the present, accept who we are, understand where we are and what's in front of us. We need to be as sensitive to our environment and as in the present moment as the jackdaw. Life would be simpler and harder, more about essentials and less about distractions from distractions by distractions.
2019-04-24T14:35:59
http://whatthewatersays.blogspot.com/2016/04/jackdaw-cat-and-us-how-do-animals-think.html
0.9998
First line: "Guess what?" Ramona Quimby asked one Friday evening when her Aunt Beatrice dropped by to show off her new ski clothes and to stay for supper. Why you should read this book: This is the one in which Ramona is mature enough to recognize that Howie's grandmother is a terribly babysitter and a reasonably third grader should not have to spend five afternoons a week with a caretaker who seriously dislikes her. With Howie's rich uncle Hobart in town and her newfound independence blossoming into a different kind of responsibility, Ramona deepens her relationship with Beezus and finds that sometimes change is good. Even if her mother is pregnant again and her aunt is getting married and moving to Alaska, Ramona can learn to adapt. Why you shouldn't read this book: Poor Howie has to wear short pants and knee socks to the wedding.
2019-04-21T20:17:29
http://dragonslibrary.blogspot.com/2018/07/ramona-forever.html
0.999999
Is there a simple method for determination of iso 3166-2 'state' codes for osm nodes using nominatim? I have run across mappings from iso 3166-2 to text and the 'pycountry' module which I imagine will amount to the same , but am curious if there is not an in-osm method for this conversion. I saw a tool called 'cosmogony' (https://github.com/osm-without-borders/cosmogony) , is this the way to go if text conversion runs into trouble? I am further interested in what geonames calls 'admin2' codes, I am not sure what the iso equivalent is (it seems the geonames admin1 is largely equivalent to iso-3166-2) . Is there a simple method for extraction of iso 3166-2 'state' codes from osm records? I have run across mappings from iso 3166-2 to text and the 'pycountry' module which I imagine will amount to the same , but am curious if there is not an in-osm method for this conversion. It isn't completely clear what your goal is. Do you just want a list of any ISO 3166-2 codes being used in OSM? If so, then I don't think you'll find any. The second part of an ISO 3166-2 code may be what's used in addr:state or addr:province tags, but I don't think the full ISO 3166-2 code (e.g. CA-ON or US-NY) would be used in any OSM tags. Or do you just want a list of ISO 3166-2 codes? If so, you can get that from the ISO site here. It isn't completely clear what your goal is.. and a further, related question - given a lat-long, is there a way to determine which country its located in ?
2019-04-23T10:40:25
https://forum.openstreetmap.org/viewtopic.php?pid=737893
0.999989
- 3 girls and 1 boy!! The Boy - 3 days old! Girl 1 - 3 days old! Girl 3 - 3 days old! Girl 2 - 3 Days Old!
2019-04-19T03:00:40
https://trublumate.com/miley-joker
0.999766
How do I add file through Skype? 1) In Skype you can right Click any contact and in the menu pop popup you select send a File and then you can send it. 3) You can also drag and drop the file into the chat box and Skype will send it.
2019-04-26T16:10:46
http://answers.shoppingcartelite.com/1850977/Sending-Files-Through-Skype
0.999789
How To Create, Delete, and Change Labels in Blogger? When writing a blog post in the Blogger Editor, you have a Label section on the right sidebar where you can assign that post some labels. However, that is only useful for a single post. What if I wanted to assign a label to multiple posts? To do that, go into your Blog Dashboard, and click on Posts on the right sidebar. When you see a list of all your posts, you can select multiple posts by checking on the box on their left. Now, click on the Label action button on top of the list of posts, and choose a label to assign. Alternatively, you can create a new label. The label you create or select will be assigned to the selected posts. If that label was already assigned to a selected post, then it will be unassigned. Unfortunately, you can not edit a label in Blogger the way you can edit tags and categories in WordPress. But that doesn't mean you can't get the job done. If you want to rename a certain label, then simply select all posts from that label, and change their label. To do this, first get a list of all posts under a certain label by clicking on the Label selection button on the top-right. So suppose I wanted to list all posts with the label "blogger tricks". I will simply select that particular label from the selection button. Now, to change a label, select all posts under that label, and assign them a new label of your choice as we discussed earlier. Once this new label has been assigned, select all the posts again, and unassign the previous label by clicking on the Label action button, and clicking on the label you want to remove from those posts. As described earlier, posts that already have that label will get unassigned to that label. Not the slickest implementation to be honest, but it does the job. Blogger manages the creation of new labels, and deletion of unused labels by itself. So if no posts are assigned to a label, it will be automatically removed. Assigning posts to a wrong label could mess things up pretty bad, and if you have a lot of posts selected, you will have to manually pick and select each of them, and then reassign them, which could be a real nasty job. So double-check before assigning a label to a large selection of posts. Also, Blogger doesn't really handle a selection of more than 50 posts well, and will mostly generate errors if you try to change labels for more than 50 posts. So make sure each selection of yours isn't above that limit. Thanks MBT 4sharing this tip. I need your help very urgently. Please open my blog once www.tallyssolution.blogspot.com. Before a week my blog is not show wishlink ad on my blog. But now it is appear automatically. Please suggest how can i remove this ad. Because i am too much tired to see this ad. It is automatically appear on my blog, i do not enter any code of this script. Please help me. Hi, I'm familiar with using label on posts. What I would like is help with offering contributors to my blog the opportunity to add labels to comments as this would allow other users to search comments based on comment labels in addition to post labels. good information for new bloggers thank you,.. Thanks very much for that help regarding Blogger labels. It is appreciated as is your time for sharing that knowledge. Great, but do I have to redirect a tag after I remove them? or does Blogger handle that?
2019-04-20T04:26:37
https://www.mybloggertricks.com/2013/10/how-to-manage-blogger-labels.html
0.999981
Source: This report first appeared on the MEMRI website on October 23, 2007. In an investigative article in the Egyptian weekly Roz Al-Yousef, journalist Asma Nassar revealed that a popular Koran commentary for children published in Egypt contains virulent incitement against Christians and Jews, and calls on both children and adults to fight them. Nassar's critical article presents excerpts from the book and comments from Muslim scholars who participated in its writing and from senior Al-Azhar figures. How Could Al-Azhar Approve This Book for Publication? The article stated: "This Koran commentary, intended for children, includes erroneous ideas which incite against the followers of the [other] monotheistic religions. For instance, the interpretation of the Al-Fatiha Sura [the first Sura of the Koran], states that [the expression] 'those who earn Thine [i.e., Allah's] anger' refers to the Jews, and [the expression] 'those who go astray' refers to the Christians. This [rendering] contradicts the tenets and the tolerant character of the Islamic faith. "We discovered that the book was first published 10 years ago by Dar Al-Sahaba Lil-Turat in Tanta, and was edited by Sheikh Magdi Fathi Al-Sayyed. Since then, there have been five more editions, and the book has been translated into several languages, including Indonesian, Malaysian, and Turkish. The question arises: How could the [Al-Azhar] Academy of Islamic Research allow the publication of such ideas? After all, [one of its] duties is to monitor [publications] that misrepresent Islam and disparage the [other] monotheistic religions. Considering [the Academy's] involvement in cultural conflicts, and its persecution of anyone who has innovative ideas in areas of thought, culture and philosophy, its [scholars] ought to revert to their original role. "The hidden poison [of extremism] has seeped into the pages of this book, which was approved [for publication] by the Al-Azhar Academy of Islamic Research... [after being] examined by four of its scholars. [One of the authors] of the introduction is the president of Egypt's Koranic schools, and a hadith expert at Al-Azhar University, Dr. Ahmad 'Issa Al-Ma'sarawi..." The article continued: "Overall, the book is characterized by incitement to extremism and by extremist interpretations that do not reflect the true meaning of the verses... [For example,] the book divests Islam of its most fundamental principle - [the principle of] peace - and even incites against this [notion] in its interpretation of the [following] verses: 'Forgive them, and overlook [their misdeeds], for Allah loveth those who are kind [5:13]'; 'And if the enemy inclines towards peace, then incline towards it and trust in Allah, for He is all-hearing and all-knowing [8:61].' [The book states that] these verses are abrogated by the 'Verse of the Sword,' which descended later, and which says: 'Fight those who do not believe in Allah, nor in the Latter Day, nor do they prohibit what Allah and His Messenger have prohibited, nor follow the religion of truth, out of those who have been given the Book [i.e. among the Christians and Jews], until they pay the jizya [the Islamic poll tax on non-Muslims] and they are in a state of subjection [9:29].' [According to the book], peace and reconciliation agreements [with Christians and Jews] have been forbidden since this verse was revealed. "In its interpretation of verse [9:41] - 'Go forth light and heavy, and strive hard in Allah's way with your property and your persons; this is better for you, if you know' - the book says: 'Allah the Almighty told the believers - both young and old - to set out and fight for the sake of Allah. "In explaining verse [9:66] - 'O Prophet! Strive against the disbelievers and the hypocrites, and be stern with them. Hell will be their home, a hapless journey's end' - the book says: 'Allah commanded the believers to wage jihad against the infidels by [fighting them] with the sword, and to wage jihad against the hypocrites by imposing upon them the punishments and constraints mandated for those who violate the commands of Islam..." The article further stated: "The expected consequence of this [book] is that, in future, thousands of young children will be willing to blow themselves up [in terrorist operations] against [non-Muslims]. This is the danger [that this book represents]. [The book's aim] is not to interpret verses, but to deliberately instill children with ideas that incite [to extremism]. This is evident from its deliberate ignoring of other verses... that reflect the true [face of] Islam, which does not discriminate among the followers of the monotheistic religions but [calls for] brotherhood among them..." Nassar's article also elicited various responses to its criticism of the book. Former Al-Azhar vice-president Dr. Mahmoud Zalat Al-Qasbi, who co-authored the book's introduction, said: "I never saw the interpretations [quoted in Nassar's article]. I was asked to write the introduction, and that was my only involvement with the book." Al-Qasbi added that, had he seen these interpretations, he would have requested to have them changed, since he believed that offensive references to other religions were contrary to the principles of Islam. He also said that, in his opinion, the Al-Fatiha Sura had nothing to do with the Christians or Jews, since 'those who go astray' can also refer to many Muslims. Dr. 'Abd Al-Mu'ti Bayoumi, member of the Al-Azhar Academy for Islamic Research, likewise expressed reservations about the book, saying: "It is ignorance on our part [to rely on] old and erroneous [Koran] commentaries without examining and contemplating [the verses anew]. Islamic thought needs to be reformed..." Bayoumi went on to warn against instilling these poisonous ideas in the younger generation. Nassar also presented statements by Islamic scholar Gamal Al-Bana, who exposed the book in August 2007. He said: "The interpretations [found in the book] are generally similar to commentaries by [the Muslim Brotherhood theorist] Sayyed Qutub and other [Islamic scholars] of his ilk, who harmed the image of Islam with their erroneous interpretations of the Koran. Islam is pluralistic by nature, and does not aim to judge other religions or accuse others of heresy - that [role] is reserved for Allah on the Day of Judgment..." On the interpretation of the "Verse of the Sword," Al-Bana commented: "Conciliation, tolerance and peace are principles of the Islamic faith, and whoever rejects them, rejects the postulates of that faith... Children must not be exposed to these commentaries, just as they should in general be left out of arguments they cannot understand, since [religious disputes] concern only the experts." Roz Al-Yousef (Egypt), September 21, 2007. Verses six and seven of the Al-Fatiha Sura say: "Show us the straight path - the path of those whom Thou [i.e. Allah] hast favored, not the [path] of those who earn Thine anger nor of those who go astray." Al-Bana's article appeared August 1, 2007 in the Egyptian daily Al-Masri Al-Yawm.
2019-04-25T14:08:56
http://librariansforfairness.org/news_post.asp?NPI=217
0.998315
The meaning of the phrase ‘(To) call a spade a spade’ is to speak straightforward or to speak in a plain language. 1. She is not afraid of anybody; she always likes to call a spade a spade. 2. I like his habits of calling a spade a spade. 3. People who call a spade a spade are liked by all.
2019-04-24T00:45:50
https://www.indiastudychannel.com/english/2949-To-call-spade-spade.aspx
0.99555
hostage, person held by another as a guarantee that certain actions or promises will or will not be carried out. During periods of internal turmoil, insurgents often seize hostages; recent examples include seizures of Americans and other foreigners by militants in Iran (1979–81) and Lebanon (1980s). Military forces often take hostages among civilians in an occupied country, in order to ensure the delivery of requisitions, to discourage hostile acts, or to take reprisals for hostile acts committed by unknown persons. In World War II, thousands of hostages were executed throughout Europe by the German authorities in an attempt to crush resistance movements. The Geneva Convention of 1949 forbade entirely the taking of civilian hostages. Criminals, especially when confronted by police, sometimes take hostages as human shields or as bargaining assets. In 1998 it was revealed that Israel was holding Lebanese hostages solely for use in prisoner exchanges or other deals with Lebanese guerrillas; their detainment was condoned by Israel's supreme court. Ancient military custom regulated the behavior and treatment of hostages; originally a hostage was a person who had been delivered by one authority to another as a token of good faith, and was generally treated as an honored guest. However, he might be imprisoned or even executed if the agreement guaranteed by his person was broken. The code of honor was often very strictly observed in feudal times; thus, during the Hundred Years War, when the hostages sent to England in exchange for the release of John II of France escaped, King John felt bound to return to captivity in England. Until the 18th cent., hostages were often exchanged when treaties were concluded.
2019-04-21T14:33:15
https://www.infoplease.com/encyclopedia/social-science/law/international/hostage
0.999991
One day, a teacher decided to give unusual multiple test questions to the students. They were all surprised at the questions and none of them got anything correct. Can you help them? Q1. Which question has a correct answer C)? Q2. Which question has a correct answer A)? Q3. Which question has a correct answer D)? Q4. Which question has a correct answer B)? Q1 has answer as D option whose value is Q2. So Q2 should have its answer as C option whose value is Q3. And that is where we started off. Now Q4 is remaining. The answer to Q4 should be itself as all other questions are covered. So the answer for Q4 should be option B whose value is Q4 itself.
2019-04-21T08:51:36
https://puzzling.stackexchange.com/questions/70212/what-kind-of-test-is-this
0.999999
What is good professional writing? Good writing is an art and a craft. Well-crafted writing focuses on the orderly progression of ideas -- it leads the reader from one thought to the next. Valuable professional writing contributes to knowledge by organizing and integrating information from different areas, producing new information or extending information via research results, or developing new ideas. State the central concept or focus of your paper. Try completing this sentence, "My study/manuscript is about ______" Draft a working title that is a succinct restatement of the central concept. Avoid unnecessary words and phrases such as "an approach to" or "an investigation of." Do you have enough interest in your topic to sustain your interest? Will your final manuscript be of interest to others? Does your paper fill a void, replicate, extend, or develop new ideas? Research your topic or idea. Use searchable databases to help with this task. Make sure to search literature in areas outside D/MT to integrate concepts that have been studied/proposed previously (don't recreate the wheel, or assume that the wheel belongs only to D/MT). What does the literature say about your topic? Develop a "map" of the literature -- give example. Create reader interest in the topic. Establish the problem that will be explored in the paper. Place the paper in the larger context of the scholarly literature on the topic. Reach out to specific audiences. Write an opening sentence that stimulates interest as well as conveys an issue to which a broad readership can relate. Specify the problem (dilemma, issue) leading to the ideas presented in your paper or study. What issue establishes a strong rationale or need to write/conduct the paper/study? Indicate why the problem is important. Focus the problem statement on the key concept being explored. Generally, refrain from using quotes in the lead sentence. In addition, refrain from using quotes unless they are seminal, historical or add to the paper in important ways. Instead, interpret the literature yourself rather than simply stringing together quotes from others. Put it in your own words. Stay away from idiomatic expressions or trite phrases (e.g., The lecture method remains a "sacred cow" among most college instructors). Consider numeric information for impact (e.g., Every year an estimated 5 million Americans experience the death of an immediate family member). Consider short sentences for impact. Use such words as purpose, intent, and objective to call attention to this statement as the central controlling idea of the paper. Set off the statement as a separate paragraph. Identify the theory, model, or conceptual framework that will be tested in a research study or explored in a review paper. Following sections of the manuscript are dictated by the nature and content of the paper. Quantitative research studies follow a general format discussed in the American Psychological Association Publication Manual (Introduction, Method, Results, Discussion). Qualitative research studies and literature reviews follow a less specific format, but address material by organizing it under appropriate headings. Writing style. Research papers are generally written in a formal style that uses past tense. Literary style is less formal and uses present tense. Personal pronouns are generally now accepted in both styles (rather than "the author" one can say "I"). Writing style should be matched to the intended audience. For example, articles in the AJDT generally use formal style, but the Marian Chace Annual Lectures that are published each year in the Journal usually use literary style because they have been actual addresses. Writing as thinking. It is a good idea to practice writing ideas down rather than talking about them. This ensures that the ideas are easily retrieved at a later time and it encourages you to get in the habit of writing. Additionally, if ideas are recorded somewhere, it makes working sessions easier because there is something to start with rather than a blank page. Use multiple drafts. It can be helpful to use several drafts of a manuscript rather than simply polishing the first draft. If one uses a computer, it can be helpful to print drafts and edit from hardcopy before making changes on the computer copy. It can also be helpful to use outlines. Establish the discipline of writing on a continuous regular basis. Establish good writing habits. You can follow suggestions of others such as Cresswell (1994), or you can develop your own habits. For example, you can end each writing session by printing what you have written, reading and editing what you have done either immediately or several hours later. Then when next begin to work, start by making the corrections you noted on the printed copy. It eases you back into the flow of the paper so you can continue. Remember that writing moves slowly, so ease into the process. Make use of colleagues to give you feedback during the writing process. It can help the writer to get feedback from others, and the Constructive Response can be used for this purpose. The guidelines below are for use in a group situation, but can be adapted for one-on-one situations also. Constructive Response Guidelines – Sharon Chaiklin revised these guidelines modeled on Liz Lerman's Critical Response Guidelines for choreography feedback. This model is useful in many kinds of situations, including supervision. After seeing (hearing) what is being presented, give the writer feedback about all the positive things you responded to...the style, the content, a phrase, a word...nothing is too small. The writer then asks questions of the group...what are his or her concerns, partial thoughts that need clarifying, etc. Group members answer only what is asked of them - nothing more. If there are areas that have not been discussed but you wonder about, frame neutral questions that allow writer to think about an issue. If you have an opinion about something, you may now state you have an opinion about ____ and would the writer care to hear it? The writer can say yes or no freely (sometimes opinions can get in the way of creative thinking and it is up to the writer). The writer can speak about how he or she intends to make use of what the responses may have offered. American Psychological Association. (2009). Publication manual (6th Ed.). Washington, DC: Author. Austin, C., & McClelland, R. (1998). Writing: The maturing of ideas. Families in Society: The Journal of Contemporary Human Services. Bebe, L. (1993). Professional writing for the human services. National Association of Social Workers, Washington, DC. Creswell, J. W. (2003). Research design: Qualitative, Quantitative, and Mixed Method Approaches, 2nd ed. Thousand Oaks, CA: Sage.
2019-04-23T20:55:23
https://adta.wildapricot.org/page-392644
0.999701
What do Albert Einstein, Abraham Lincoln, Mozart, and University of New Brunswick student Nick Peardon have in common? They all either have, or were suspected to have, Asperger's Syndrome. Peardon, a second year Bachelor of Arts student, wants to educate others about Asperger's Syndrome (AS) and what it is like to live with a disability in today's society. The most important thing he wants people to remember is that even though he has Asperger's, he is just like everybody else. Currently, Peardon lives in residence at UNB and enjoys meeting new people and making friends. One of his biggest passions in life is hockey, and in 2012 he and his twin brother won a national contest naming them the "Biggest Most Passionate Montreal Canadiens fans." Peardon has always been interested in the justice system and law, and his career goal is to become a criminal lawyer. He loves to write,mostly short stories and poetry, and hopes one day to write a book about what it has been like to live with Asperger’s Syndrome. When asked why he chose UNB, Peardon immediately listed several reasons. "Their [UNB's] hockey team is one of the best franchises in Canada and I wanted to be a part of that community," said Peardon, "UNB also has a prestigious law program, which is important to me, and I wanted to be close to my twin brother, who goes to St. Thomas. The additional perk I discovered when I came to UNB was the accessibility services centre for students with a disability." Diagnosed with AS this past December, Peardon said finding a name for his condition has been an ongoing process throughout most of his life. "Since I was five years old, I've been examined by lots of specialists and doctors who never could really put their finger on what I was living with." Finally, a clinical psychologist assessed him in his home province of Prince Edward Island and the findings indicated he had AS. "Based on my own reading and research on Asperger's, the diagnosis fits me to a T. It was great to finally get that closure. Instead of living with the uncertainty, I can move into the coping phase and just manage it," said Peardon. Asperger's Syndrome (AS) is a developmental disorder on the Autism Spectrum, characterized by difficulties in social interactions; restrictive and repetitive behavior patterns; and an intense interest or preoccupation with a narrow subject. Peardon explained that Asperger’s affects cognitive function and his greatest challenge is social interaction. Understanding social norms and cues, maintaining eye contact, prolonging a conversation, and recognizing sarcasm or humor are all things he deals with on a daily basis. "Because it's hard for someone with Asperger’s to detect sarcasm or humour, it's easy to misinterpret what people are saying sometimes, said Peardon. "I might not realize when someone is joking, because I take things so literally. You really have to take a step back and assess the situation before you react." Once he had a diagnosis, Peardon decided to contact the UNB Student Accessibility Centre (SAC) to find out more about the resources and services available to students with AS. "I'm glad I took the first step in coming [to the Centre]. Because there is a stigma, people like myself are kind of worried that we might be labeled if we have a disability," said Peardon. “The staff at the Centre has gone above and beyond for me. They even helped me find a part-time job. It’s been a great experience here." "Our goal at SAC is to break down the barriers for students with disabilities," says Jody Gorham, director of the Centre. "We do this by providing resources and services to students and collaborating with and training staff and faculty." The Accessibility Centre staff helped Peardon prepare a Canada Study Grant application to provide him with a laptop and software to make his studies easier, and they set him up with a tutor that he meets with once a week. The centre also referred him to UNB's counseling services. "There are many famous and successful people with Asperger's,” said Peardon with an excited smile. "The sky's the limit. It's a myth that people with mental health issues or disabilities are limited in what they can do. There are people out there who are pushing the boundaries and doing great things every day. Everyone has something to offer the world, especially people with disabilities." The UNB College of Extended Learning (UNB CEL), in partnership with the UNB department of psychology continue to build and grow programs to help New Brunswick build core expertise to support anyone working in the field of behavioural intervention. "We know that this is an area of support that is lacking in our province currently. We would like to help remedy that as an institution, said Lloyd Henderson, executive director of UNB CEL." Currently, UNB CEL offers training programs for front-line practitioners, caregivers, healthcare professionals, and others who support people with various concerns related to the autism spectrum and other behavioural disorders. To find out about the upcoming Behavioural Intervention Workshops or the Support Training programs contact Dawn Dignam. Statistics indicate that approximately one in 88 children* are diagnosed with Autism Spectrum Disorder--and the number is on the rise. The University of New Brunswick, through the UNB Student Accessibility Centre, provides services and support for students with Asperger’s Syndrome (AS) and others with disabilities to help them achieve personal success with their educational goals.
2019-04-21T02:22:04
https://blogs.unb.ca/newsroom/2013/04/autism-awareness-month--unb-student-opens-up-about-living-with-asperger-s-syndrome.php
0.999834
Research design, hypothesis testing, and sampling. Statistical applications are an essential element of the practicing appraiser's tool kit. The extent to which statistics are employed in appraisal practice depends on a number of circumstances, such as the scope of work, the statistical competence of the analyst, and the availability of data. This article discusses essential theory necessary for competence in statistical inference--that is reaching a conclusion about an unknown characteristic of a population based on sample data. This article explains how to design and implement inferential statistical research and examines the topics of hypothesis construction, reliability and validity of research, sampling, setting significance levels, and sample size. Research Design and Hypothesis Testing What Is the Question? At its most elementary level, the application of inferential statistics boils down to answering questions. For example, we might ask, "Does the theory of diminishing marginal utility hold for this property type in this market area?" Or, "How does this particular rental market react to proximity to public transportation?" Or, "What, if any, is the influence of nearby street noise on home prices in the subject subdivision?" Ultimately, the question may be as fundamental as, "What is my opinion of market value for this property, and can the credibility of my opinion be bolstered by the application of inferential methods?" Research questions like these may represent the entire scope of a valuation services assignment, or they may be small but important aspects of a more comprehensive study. In either case, the effective application of inferential methods requires a clear understanding of the relevant questions, explicit or implicit formulation of testable hypotheses, appropriate data, credible analysis, and valid interpretation of the analytical results. In much the same way that the appraisal process serves as a systematic and organized way to design a work plan consistent with the scope of a specific assignment, statistical analysis research design provides a road map for moving from research question to insight. Hypothesis testing relies on a principle often referred to as "Popperian falsification" Early twentieth-century philosopher Karl Popper held that inferential statistics cannot prove anything with absolute certainty. However, inferential methods can cast doubt on the veracity of an assertion of "truth." When sufficient doubt can be raised, an assertion of truth can be "falsified," at least to some degree. The degree of certainty associated with labeling a statement as false is related to "statistical significance" or merely "significance" in the language of statistics. 1. Determine an appropriate expected outcome based on theory and experience. This is generally referred to in inferential statistics as a "research hypothesis" 2. Formulate a pair of testable hypotheses related to the research hypothesis: a "null hypothesis" and an "alternative (research) hypothesis." The testable hypotheses must be mutually exclusive and collectively exhaustive. The hypothesis testing goal is to falsify or reject the statement of truth implied by the null hypothesis, leaving the research hypothesis as the only reasonable alternative. 3. Formulate a conclusion that falsifies (or fails to falsify) the null hypothesis. While the three-step process of forming and testing a hypothesis is easy to outline, it is generally much more difficult to apply. Let's consider a simple example and think about the complications that may arise. Consider the effect of street noise on housing prices. This simple residential valuation issue illustrates the complications encountered in formulating and testing real world hypotheses. An appropriate research hypothesis could be a general statement like, "Exposure to street noise affects home price" Or, if the analyst makes a more specific supposition concerning the direction of the effect, the research hypothesis could be, "Exposure to street noise reduces home price" Depending on the scope of the assignment, the appropriate research question could be much more specific than this. More refinement might be required, resulting in research hypotheses such as "Exposure to street noise in excess of 'X decibels' above the ambient noise level reduces home price" or "Exposure to street noise reduces home price, but the size of the reduction decreases with distance from an abutting street and becomes negligible at 'X feet' from the abutting street" Based on these simple examples, it should be apparent that the testable hypotheses must be customized to the underlying research question. For simplicity's sake, assume that the appropriate research hypothesis is "Exposure to street noise reduces home price in the subject property's market area" This statement becomes the alternative hypothesis--the hypothesis you believe the data will support. Remember that the null hypothesis and the alternative hypothesis are mutually exclusive and collectively exhaustive. The null hypothesis (the statement of truth you are attempting to falsify) would therefore be "Exposure to street noise either increases home price or has no effect on home price in the subject property's market area" These two statements are mutually exclusive (only one of them can be true), and they are collectively exhaustive (home price must go up, down, or stay the same). * Research hypothesis: Exposure to street noise reduces home price in the subject property's market area. * Null hypothesis ([H.sub.0]): The street noise price effect is [greater than or equal to] 0. * Alternative hypothesis ([H.sub.a]): The street noise price effect is < 0. Once these hypotheses have been formulated, a research plan must be devised that allows the analyst to credibly test the veracity of the null hypothesis. If the null hypothesis can be falsified with sufficient certainty, then the analyst can conclude that the alternative hypothesis is likely to be true. It is important to recognize, however, that inferential statistical methods are not intended as means of supporting illogical, unreasonable, or atheoretical suppositions. The research and alternative hypothesis statements should be well reasoned and logical, keeping in mind that inferential methods are designed to support valid research hypotheses. Tests of the veracity of the null hypothesis are of no use unless the tests are credible (i.e., worthy of belief). Two concepts-validity and reliability (1)--are paramount to credible hypothesis testing. These concepts are deeply rooted in research design and scientific inquiry. The concepts of reliability and validity can be confusing at first, but they are actually quite simple. For example, consider Figure 1, which illustrates the idea that reliability is analogous to clustering shots on a target. Shots that are scattered all over the target, as in the left panel, are unreliable. Shots that are tightly clustered but off center, as in the right panel, are reliable but invalid. Only shots that are tightly clustered and centered on the target are reliable (consistent) and valid (accurate). Because threats to reliability and validity erode credibility, credible research and valuation-related opinions are more likely to occur when analysts understand and assess the extent to which the methods employed were both reliable and valid. Paying attention to a few simple criteria can go a long way toward ensuring credible results. For example, logical research designs, controlling measurement error, standardizing interview protocols, using representative data, and applying appropriate analytical tools are basic and essential elements of using statistical methods to support credible valuation opinions. Strictly speaking, validity is the extent to which a statistical measure reflects the real meaning of what is being measured. Consider a scale that consistently indicates weights that are 95% of true weight. Obviously the result is not valid when the intent is to measure true weight. Although this sort of measurement error is correctable if the error is consistent and known, measurement error is usually neither consistent nor known in many situations. A research design consists of several parts, such as a problem statement, a research hypothesis, selection and definition of variables, implementation of design and procedures, findings, and conclusions. Logical validity is satisfied when each part of the overall design flows logically from the prior step. If the overall design isn't logical, then the results aren't likely to be valid. Appraisers should already be familiar with the elements and logical flow of research design because the valuation process is a similar algorithm. Construct validity deals with how well actual attributes, characteristics, and features are being measured. For example, although tall people generally weigh more than short people, use of a weight scale is not a valid construct for measuring height. As this example illustrates, construct validity is a simple concept, but it can be quite nuanced in practice. Concerns about construct validity are particularly applicable to the use of interviews and questionnaires. Precise definitions of variables and the elimination of ambiguity are important in ensuring that questions are not misinterpreted by respondents or researchers. Meanings assigned by respondents should be consistent with the meanings intended by the researcher. Furthermore, meaning should be consistent from respondent to respondent. Construct validity is especially problematic when respondents must interpret technical or scientific language, as is the case in many interviews related to real property transactions (e.g., sales confirmation). Do not assume that persons being interviewed fully understand the meanings of technical terms such as capitalization rate, internal rate of return, net operating income, effective gross income, obsolescence, and the like. Internal validity requires that all alternative explanations for causality have been ruled out Ruling out threats to internal validity is a laborious task because it requires explicit identification of each alternative explanation for causation along with the rationale for rejecting it. If all reasonable alternative causes cannot be ruled out, the research may be inconclusive and invalid. External validity exists when findings and conclusions can be generalized from a representative sample to a larger or different population. Random selection from a target population is the best means of obtaining a representative sample, subject to the vagaries of sampling error, which is ubiquitous. Therefore, when a random sample has been obtained, the analyst should assess the extent to which the characteristics of the sample match the characteristics of the target population. Statistical conclusions will not be valid if the statistical tests being applied are inappropriate for the data being analyzed. The researcher should be aware of the assumptions underlying each statistical test and how robust the test is if those assumptions are violated. Bias occurs when there is a systematic error in research findings. Bias can come from several sources, and it can be classified into two categories: nonsampling error and sampling error. (2) Nonsampling error includes nonresponse bias, sample selection bias, and systematic measurement error. Sample selection bias may be encountered in real property studies, which often rely on observational samples (e.g., the occurrence of a comparable sale cannot be assumed to have been a random event). Sampling error stems from the fact that a random sample can differ from the underlying population simply by chance. Reliability is the extent to which "the same data would have been collected each time in repeated observations [measurements] of the same phenomenon." (3) A reliable model would produce results that can be thought of as consistent, dependable, and predictable. As an example, assume that six appraisers are asked to measure the same 1,400-sq.-ft. house and calculate its improved living area. A set of estimates consisting of 1,360 square feel 1,420 square feet, 1,400 square feel 1,450 square feel 1,350 square feel and 1,340 square feet would not be reliable, even though they tend to bracket the true floor area. However, in comparison, a set of estimates consisting of 1,440 square feel 1,435 square feel 1,445 square feel 1,445 square feel 1,440 square feel and 1,435 square feet would be more reliable, despite not bracketing the true floor area. Although the second set of living area estimates is more reliable (i.e., predictable and consistent), the floor area calculations exhibit a systematic, upward bias, making this set of estimates invalid. An ideal set of estimates would be highly consistent (reliable) and accurate (valid), such as 1,398 square feel 1,402 square feel 1,400 square feel 1,395 square feel 1,405 square feel and 1,400 square feet. Reliability can be difficult to attain, especially when data come from sources beyond the analyst's control. For example, subjective assessments of condition, construction quality, and curb appeal provided by third parties may be unreliable, especially if more than one person is rendering opinions. What appears to be "excellent" to one person may be viewed as being "above average" or merely "average" to another. Because reliability can be difficult to assess and control, it is good practice to think about possible threats to reliability that may be encountered. When data comes from an outside source, ask if a standardized measurement or categorization protocol was employed. Find out if more than one person was involved in making quality or condition assessments. Think about how errors in scoring or measurement may occur, and make random checks for measurement error. Look for the use of ambiguous questions, ambiguous instructions, or idiosyncratic (technical) language that might be difficult for respondents to comprehend. A sample is a subset of a larger population selected for study. When the research goal is to better understand the larger population, the sample should be as similar to the larger population as possible. Statisticians use the term "representative" to indicate the similarity of a sample to the larger population. When a sample is not representative, it is difficult to assert that the characteristics of the sample are indicative of the characteristics of the larger target population. While sampling is a simple concept, it can be a challenging process in application. The first challenge is obtaining a sample frame, which is a list of items in, or members of, the population you want to study. Sometimes full or partial lists exist. Often they do not exist at all, or the compilers of the lists are unwilling to allow access to them. For example, if you were interested in knowing what percentage of lake homes in your state are serviced by central sewer systems and how many have on-site septic systems, you could develop a representative sample of lakeshore properties to obtain an estimate of the population proportions. However, obtaining a comprehensive list of lakeshore properties (the sample frame) in order to draw the sample could be difficult. Compiling an owner's list yourself from county records is one option, but it would be time-consuming. Samples can be broadly divided into two categories-probability samples and nonprobability samples. Probability samples are characterized by knowledge of the probability that an item in the population will be selected. As you would expect, the probability that an item will be selected is unknown in a nonprobability sample. Statistical inferences formed through the analysis of probability samples are preferred because inferences drawn from nonprobability samples may be unreliable and inaccurate. In a simple random sample, every item in a population has the same probability of selection. A simple random sample may be selected either with replacement or without replacement. When sampling with replacement, the probability of selection for each member of the population is 1/N each time a selection is made, where N represents total population size. When sampling without replacement the probability of selection increases as items are selected. The probability of selection for the first item selected is l/N, reducing to 1/(N - 1) for the second item selected, 1/(N - 2) for the third item selected, and so forth as the unsampled population size is reduced through the sample selection process. Think of sampling with replacement as picking a card from a full deck, replacing the card, shuffling the deck, and picking another card. In contrast, think of sampling without replacement as being dealt a hand of poker, with each new card in your hand being dealt from a smaller and smaller deck. Because each item in a population has an equal probability of selection on a given draw, simple random samples are considered to be highly representative. Nevertheless, it is still possible to randomly select a nonrepresentative sample merely by chance. This possibility is referred to as sampling error. Although sampling error cannot be totally eliminated, it can be minimized through the selection of larger samples. Creating a stratified random sample begins by dividing the population into subgroups (known as strata) based on one or more essential characteristics. Once this has been done, you can select random samples from each stratum. Stratified samples ensure that the sample proportion for the stratifying characteristic is identical to the population proportion, reducing sampling error and improving the accuracy of inferences. As a simple example of the value of stratified random sampling, assume that you want to use sampling to make a statement about the mean apartment rent in a market area. Assume also that the apartment population contains many floor plans with different bedroom and bath counts. If a simple random sample were used, you would have no assurance (due to sampling error) that the floor plan mix of the sample would be identical to the floor plan mix of the population. Although the mix would, on average, be the same with repeated random samples, the mix is apt to differ from the population in any single sample. Use of a stratified sample allows you to control the proportion of the sample being drawn from each apartment unit type, thereby controlling for unit-mix sampling error. When this is done, sample mean rent is a more accurate estimate of population mean rent. When the parameter of an important population proportion is known, a stratified random sample mirroring the population proportion usually provides the most accurate inferences. You might be wondering, "If stratified random sampling improves the accuracy of inferences, why isn't it done more often?" The primary reason is insufficient understanding of the population proportion for one or more important characteristic. For instance, the simple stratification in the preceding paragraph could not be done if the population unit mix proportions were unknown. A systematic sample is just what its name implies-a system employed to select the sample from the frame. Systematic sampling typically involves sorted data such as accounting records filed by date or medical records filed alphabetically. For example, if you want to sample 1,000 files out of a population of 30,000 files, you could decide to select every 30th file. You could then randomly select a file from the first 30 files as a starting point and then select every 30th file after the starting point. If you randomly chose to start with file 14, your sample would consist of files 14, 44, 74, 104, and so forth. While systematic sampling may seem convenient, it can pose problems when there is a systematic pattern associated with how the data were sorted. If this is the case, the sample could be biased. Say, for example, you are auditing your company and randomly choose to look at accounting records from the 4th and 23rd day of each month. You would not be happy to learn, after the fact, that a part-time employee who helped out on the 14th and 15th of each month had been embezzling money. Because you randomly chose the wrong days to audit, the theft would have gone undiscovered. Had a random sample been drawn from each month of the year, there would have been an 800% probability of picking the 14th or 15th day of at least one month. (4) The pattern in the data, along with the systematic sample's unfortunate starting point, biased the sample by inadvertently excluding all of the dates when criminal activity occurred. Use of a systematic sample requires an assessment of the likelihood of the existence of a pattern in the data in the sample frame that could bias the sample. When in doubt, use a different sampling method. Cluster sampling is often used for geographic data such as real estate where clusters are naturally occurring. City blocks, subdivisions, census tracts, and zip codes are examples of naturally occurring geographic clusters. Random selection of clusters and of items within each selected cluster constitutes a random sample. Consider the apartment sample referred to in the earlier discussion of stratified random samples. If there were no available sample frame, you could draw a sample by randomly selecting geographic clusters (e.g., census tracts) within the study area, identifying all of the apartments within each selected cluster, and randomly selecting a sample from the identified apartments in each cluster. The resulting sample would be representative of the population if the selected clusters were representative of the market and the properties chosen from each cluster were representative of their cluster. The problem with this method is one that appraisers are familiar with from other contexts--namely, compounding error. Achieving the state of "representativeness" becomes a multilayered construct in the use of cluster sampling. If the coarser selection layer--the clusters--is not representative, then the sample will not be representative regardless of how well the selected properties represent their clusters. If the coarser, cluster layer is representative, the more focused granular selection layer--properties within each cluster--may still not be fully representative if some or all of the selected properties do not represent their cluster. Due to these issues, sample size in terms of number of clusters and items selected from each cluster should be greater than the sample size required for a simple random sample or stratified sample. Recall from the earlier discussion of validity that sample selection bias may be encountered in real property studies, which often rely on observational samples because a self-selection process separates properties that are offered for sale from those that are not offered for sale. Property owners are not randomly chosen to sell their homes each month. Therefore, a sample of homes "for sale" or "sold" may not be representative of the population of all similar properties in a market. Self-selection may or may not be a problem, depending on how and if sold properties differ from unsold or not-for-sale properties. Generally speaking, in broader and more active markets self-selection is less likely to be a relevant issue. For example, the housing market is more active than the shopping center market and is less likely to exhibit systematic differences between properties offered for sale and properties not for sale. Nevertheless, some residential neighborhoods could be affected by a localized externality such as an environmental hazard, plant closing, or change in access. (5) In such cases data from an affected location might not be representative of properties in unaffected locations. The retail sector provides a good example of how self selection can affect real property transaction data. Suppose a prominent and common anchor tenant is ceasing operation or reorganizing through bankruptcy, and several of the market area's shopping centers occupied by this anchor tenant are offered for sale. If and when these properties sell, they probably would not be representative of the remaining shopping centers in the market that were not affiliated with this tenant. Statistical analysis of market transaction data biased by inclusion of these sales might misrepresent the segment of the retail population unaffected by the store closings. The same logic applies to comparable rents associated with retail centers having dark anchor stores. Because real property offered for sale or rent is a self-selected sample rather than a random sample, appraisers should take care to ensure that the transaction data being analyzed is truly representative of the subject property's competitive market. Experienced appraisers should be able to determine the influence, if any, of self-selection in a market that may preclude some data from inclusion in a given analysis or study. Furthermore, competent appraisers know that unfamiliarity with a market and an inability to assess the existence of self-selection bias within it require the assistance of someone who understands the market in order to credibly assess transaction data. Nonprobability samples are less useful for inference than the sorts of probability samples we have been talking about so far because the conclusions we can reach through statistical analysis of a non-probability sample are sample-specific. Information obtained from the sample data may not be applicable to the larger population because there is no guarantee that the sample data are representative of the population. For example, Internet surveys where users of a site are asked their opinion on matters as varied as election outcomes, results of sports contests, or whether or not an economic recession is looming are nonprobability samples. The results of such a survey only tell us how the proportion of a Web site's users who responded felt about the issue. We do not know if survey respondents are representative of all of the site users. Nor do we know if the opinions of the respondents mirror the opinions of the general population. The survey results could be applicable to the general population, but no statistical measure has been provided of the relationship of such a nonprobability sample to the general population. This is why expert, professional appraisal judgment is necessary when applying statistical analysis of comparable sale or rental data to a subject property or subject market. Because the generation of comparable data is largely a self-selection process, valuation expertise is required to assess whether or not comparable data items are representative of the subject of a study. When unrepresentative data items are identified, the items can either be removed from the analysis or flagged for later treatment (i.e., attempting to statistically control and adjust for the aspects of the transactions that cause them to be unrepresentative of the subject market). A decision to exclude data or to apply some form of statistical control depends on the amount of available data and the reason for conducting the study. When a reduced data set excluding unrepresentative data is large enough for a valid study, the unrepresentative data may be excluded. For example, in a residential context it is usually preferable to exclude luxury home sales and entry-level home sales from a study of mid-priced home values. While it is possible to statistically control for the differences between luxury homes, entry-level homes, and mid-priced homes, figuring out which controls to employ may not be a simple task. However, if we needed to know the effects of an externality such as street noise or power line proximity on an entire residential market, then we would most likely want to understand the effect of the externality across all price categories--entry-level, mid-priced, and luxury. The study of the entire residential market might also include apartments, condominiums, and townhomes in the sample, depending on the scope of work applicable to the assignment. Sampling error occurs when the sample differs from the population. In hypothesis testing, sampling error may result in rejection of a null hypothesis that is actually true or it may result in failure to reject a null hypothesis that is actually false. Either of these results will lead to an inappropriate conclusion. In the first case, the research hypothesis is flawed, but the data indicate that it is not. In the second case, the research hypothesis is correct, but the analysis doesn't support it. Rejecting a true null hypothesis is referred to as Type I Error. With Type I error the study supports the research hypothesis even though it is based on a false supposition. The probability of rejecting a true null hypothesis is symbolized by the lowercase Greek letter alpha ([alpha]), which is called the significance level. The probability of not making a Type I error (1 - [alpha]) is referred to as the confidence level. The probability of Type I error can be controlled by selecting the significant level [alpha] prior to performing a statistical test of the null hypothesis. The researcher decides on an acceptable probability of rejecting a true null hypothesis and rejects the null hypothesis if the statistical results are at or better than the predetermined [alpha] threshold. For example, if [alpha] is set at 5% and the statistical result is an [alpha] of 3% the result is considered to be significant and the null hypothesis is rejected. If this seems confusing, look at it from a confidence level perspective. Setting [alpha] at 5% is the same as saying, "If the data allow me to be 95% confident that my research supposition is correct, then I am going to reject the null hypothesis and accept the research hypothesis" For example, if the analysis results in [alpha] of 3% the corresponding confidence level is 97%. In this case we have exceeded the 95% confidence level threshold, supporting the validity of our research hypothesis. One way to guard against the erroneous rejection of a null hypothesis that is actually true is to take care in the construction of the research hypothesis. Note that the null hypothesis is true only if the research hypothesis is false. Better reasoning, logic, and understanding of underlying phenomena will help guard against flawed research designs that attempt to support false suppositions. Consider the example of the effect of traffic noise on home price. If the effect of noise is substantial, then the probability of failing to support the research hypothesis is small. If the effect does exist but is not substantial, then we will have more difficulty demonstrating the effect statistically, meaning that [beta] will be relatively large. When the effect of traffic noise is small, the statistical analysis must be more "powerful," increasing the probability of demonstrating the effect. The power of a statistical test is symbolized by 1 - [beta]. 2. Increase the size of the sample. Small effects are much easier to uncover with more data. 3. Eliminate confounding effects. In the street noise example, the street noise effect may be masked if lots abutting a thoroughfare are generally larger than lots in the interior of the same subdivision. Controlling for lot size in the analysis should improve a model's ability to detect the effect of street noise. If we select [alpha] = 0.05 and the population to which p applies is normally distributed, then we are saying, "If the sample mean is 1.96 standard deviations or more from 0, I will reject the null hypothesis that the population mean is 0." P(-1.96 [less than or equal to] Z [less than or equal to] 1.96) = 0.975 - 0.025 = 0.95. The confidence level of 95% is associated with = 0.05 (5%). To be 95% confident that the null hypothesis of [mu] = 0 is false, [bar.x] must be at least 1.96 standard deviations from 0. This concept is illustrated pictorially in Figure 2. Figure 2 shows the standard normal curve along with the locations of 0 standard deviations (the middle of the curve) and [+ or -] 1.96 standard deviations. Recall that the area under the curve is equal to 1 (100%) and the area under a portion of the curve is equal to the probability of a sample mean ([bar.x]) being in that location when the true population mean is 0. By looking up -1.96 in the standard normal table we find that the area under the curve to the left of -1.96 is 0.025 (or a 2.5% probability of being in this location if [mu] = 0). By looking up 1.96 in the standard normal table we find that the area under the curve to the left of 1.96 is 0.975 (97.5%), leaving 0.025 to the right of 1.96 (2.5% probability of [bar.x] being in this location if [mu] = 0). Therefore, with [alpha] = 0.05, we can reject the null hypothesis that [mu] = 0 if [bar.x] [less than or equal to] -1.96 standard deviations from 0 or if [bar.x] [greater than or equal to] 1.96 standard deviations from 0. Hypothesis testing is a skill that is developed through practice. So, let's work through an example problem. Suppose we interviewed a representative of a fast food franchise and were told that the chain's average restaurant floor area is 2,400 square feet. Other sources indicate that the average floor area for this particular fast food concept has grown over time as menus have expanded and adjusted to new consumption patterns. This fast food concept is fairly new to your state and we suspect that the average floor area here exceeds 2,400 square feet. We decide to use a random sample of floor areas to test our hypothesis and decide also that if we can be 90% confident we will conclude that the average floor area in this state exceeds 2,400 square feet. First we state the research, null, and alternative hypotheses and the significance level required to reject the null hypothesis with 90% confidence. Research Hypothesis: Average floor area exceeds 2,400 square feet. Notice that the null hypothesis in this example contains the "[less than or equal to]" symbol rather than the "=" symbol because the research hypothesis is stated as "exceeds" Remember that the null and alternate hypotheses must be mutually exclusive and collectively exhaustive, therefore [H.sub.0] must cover all of the possibilities that differ from [H.sub.a]. Next, we calculate the sample mean and assume for now that we know the population standard deviation [sigma]. 1. Select the Z value associated with [alpha] = 0.10 and compare 1.40 to this significance level threshold. 2. Assess the probability of [bar.x] being 1.40 standard deviations or more from the hypothesized mean, and compare this result to the required [alpha] level of 10%. Let's do it both ways. The Z value associated with [alpha] = 0.10 is the value--call it "B"--where P(Z [less than or equal to] B) = 0.90. The standard normal table indicates that this occurs with a value of approximately 1.28 standard deviations. The value of 1.28 is called the critical value of Z because an [bar.x] result of this amount or more is required to reject the null hypothesis. (7) Because 1.40 is greater than the critical value of 1.28 you can reject the null hypothesis. Alternately, the standard normal table shows that the probability of Z being less than or equal to 1.40 is 0.919. Therefore, the significance level [alpha] indicated by the sample is 0.081, which is less than 0.10, so we can reject the null hypothesis and state with at least 90% confidence (or, more precisely, 91.9% confidence) that the mean floor area in this state is greater than 2,400 square feet. In statistics the Z value probability of 0.081 is referred to as a p-value, which is the probability of the [bar.x] result being 1.40 standard deviations from 2,400, assuming the null hypothesis is true. In this example we rejected the null hypothesis based on what is called a one-tailed test. The null hypothesis contains a [less than or equal to] statement, so we need only be concerned with the right tail of the Z distribution to test the validity of the null hypothesis. Similarly, if the null hypothesis contained a [greater than or equal to] statement, then we would only concern ourselves with the left tail of the Z distribution (also a one-tailed test). When the null hypothesis contains an = statement, it can be rejected at either tail of the Z distribution, which is referred to as a two-tailed test. As a practical matter this exercise, though quite simple in statistical terms, could be useful in assessing whether or not an old floor plan is significantly smaller than new store requirements in support of an assessment of functional obsolescence. Or it could support a highest and best use analysis of a pad site, adjusting requisite floor area ratio to the current trend in store size. However, be aware that if you plan to employ a regression model the sample will have to be large enough to accommodate all of the variables you may need to include in the model. Unfortunately, you may not know how many variables are needed in the model in advance, which is a confounding issue. The level of confidence you require is 1 - [alpha]. Therefore, this decision determines [alpha], which is required to estimate sample size. The degree of accuracy you expect to achieve is stated in terms of units of measure. For instance, if you are estimating mean rent, the degree of accuracy is stated in dollars. Degree of accuracy is called sampling error, which is symbolized as e. The standard deviation ([sigma]) of the variable being estimated will be unknown and must be estimated. Methods of estimating [sigma] include referencing prior studies, conducting a small pilot study, or investigating the range of the variable of interest (the range will often be approximately 6 times [sigma] for a normal distribution). Sample size calculations are generally rounded up, so you would want to draw a random sample of at least 16 one-bedroom apartment rents. Suppose you require more precision than an estimate of mean rent [+ or -]$10. For example, you may need more statistical power to compare mean rents for two types of one-bedroom apartment (say, those with and without a private balcony). Assume you need to decrease sampling error from $10 to $5 in order to have enough statistical power to detect the effect of private balconies. What does this requirement do to sample size? stated in terms of sample size. Cutting sampling error in half quadruples sample size, and reducing sampling error to one-quarter of the amount illustrated in this example ($2.50) would increase sample size 16-fold. The relationship between sample size and sampling error is exponential due to the [e.sup.2] term in the denominator of the sample size equation. The margin of error (e) for the statement above was reported elsewhere to have been [+ or -]4.4%. Assuming a significance level of 0.05, the poll taker was 95% confident that Obama's proportion of the vote was between 54.6% and 45.4% and Clinton's proportion was between 24.6% and 55.4%. Based on this information we can deduce that there were approximately 496 respondents, as we will see shortly. Comparing the presidential primary poll to the housing tenure choice sample above, we can see that reductions in the margin of error (4.4% to 2%) dramatically increase sample size and related costs. Therefore, we must carefully consider the question of what is a sufficient margin of error and the associated amount time and money to devote to data gathering. Appraisal Institute Education Courses, "Real Estate Finance, Statistics, and Valuation Modeling" The material in this article originally was published as chapter 6 in Marvin L. Wolverton, An Introduction to Statistics for Appraisers (Chicago: Appraisal Institute, 2009). (1.) A recommended source for a discussion of validity and reliability in research design and implementation is Mary L. Smith and Gene V. Glass, Research and Evaluation in Education and the Social Sciences (Boston: Allyn and Bacon, 1987). (2.) David M. Levine, Timothy C. Krehbiel, and Mark L. Berenson, Business Statistics:A First Course, 3rd ed. (Upper Saddle River, N.J.: Prentice Hall, 2003), 23-25. (3.) Earl Babble, The Practice of Social Research, 6th ed. (Belmont, Calif.: Wadsworth, 1992). (4.) Assuming a 30-day month, the probability of randomly picking the 14th or 15th each month is 2 + 30, or 1/15th. Over 12 months this sums to 12/15ths, or 80%. (5.) Localized externalities differ from marketwide externalities affecting all properties. For example, the 2008/2009 residential foreclosure wave determines the market in many locales, and a representative sample would legitimately be expected to include foreclosed properties and foreclosure price effects, if any. (6.) Because the choice of a high level of significance reduces [beta], the effect on [beta] should have been considered in the initial selection of [alpha]. (7.) Try calculating the critical value associated with 0.90 using the "=NORMINV" macro in Excel to derive a more precise critical value of 1.2816. (8.) Perhaps the best reference for survey sampling design and maximizing response rate is by Don Dillman, who has written a series of books on the topic and is a highly regarded expert. His latest book is Mail and Internet Surveys: The Tailored Design Method (Hoboken, N.J.: John Wiley & Sons, 2007). If you are not anticipating conducting a Web-based survey, then one of his older books would be sufficient. The REO supplemental addendum-square pegs and round holes. Encyclopedia of Real Estate Terms, Third Edition. The effect of habitat color during larva, pupa and metamorphosis developmental stages on the habitat selection of the mature Opatrum Sabulosum. Designing and Conducting Survey Research: A Comprehensive Guide, 3d ed. Basic statistics and epidemiology; a practical guide, 2d ed. Tony Tripodi and Miriam Potocky-Tripodi, International Social Work Research: Issues and Prospects. Comments on "Letter to the Editor". Using confidence intervals in supply chain and operations research.
2019-04-25T14:10:03
https://www.thefreelibrary.com/Research+design%2C+hypothesis+testing%2C+and+sampling-a0214455078
0.999986
Does the Create Water spell need to be cast on a vessel that would be filled by it? In an open container, you can create up to 10 gallons of drinkable water. You may also produce a rain that falls within a 30-foot cube and extinguishes open-air flames. Must the container be filled by the water created? IE, a horse trough or sinkhole would not be valid targets, since they can hold more than 10 gallons of water? If not; what prevents me from simply choosing the room I'm in as the container? For example, creating 10 gallons worth of water on the floor with the intent of freezing it to make ice terrain? Or further, choosing the room and creating a gush of water over an unruly bar patron to "cool them off" - I can create rain, does something restrict me to Creating Water on or very close to a surface? I believe the answer to your question may lie within the spell's written affect, You can create up to 10 gallons of drinkable water. There is nothing that specifically states it must fill the container, but something that does state you can create up to 10 gallons of water (as in you can create between 0 and 10 gallons of water). So long as it can be an area with an open space, you should be able to create water inside of it. Note: the GM has final say, given they have more power than the gods in their universe. Must the container be filled by the water created? You create up to 10 gallons of clean water within range in an open container. There is no mention of the need to fill the container. If not; what prevents me from simply choosing the room I'm in as the container? Simply that a room is not a container. A room is a room, and a container is a container. There's no reason why the word container would mean room in this case. If you want water in a room use the rain feature of this spell. I can create rain, does something restrict me to Creating Water on or very close to a surface? Yes, the text of the spell description clearly states, "in an open container." This means you can create the water in an open container. Why? It's D&D, that's how the magic works. All that being said it would not break the game to expand this first level spell a bit and allow water on the floor of a room. Of course, your GM would have to approve this usage, as it is not allowed by RAW. Why would an amphibious Storm Giant need to cast Water Breathing? How would casting Create or Destroy Water affect someone in Gaseous Form? Which counts as water for the material component of the Create or Destroy Water spell?
2019-04-21T22:43:10
https://rpg.stackexchange.com/questions/140473/does-the-create-water-spell-need-to-be-cast-on-a-vessel-that-would-be-filled-by
0.999558
It might seem self-evident that death is the outcome of the process of dying. The reality, however, is not so simple. Consider a few examples: Two people are experiencing the same life-threatening emergency. One person receives prompt and competent treatment; the other does not. Were both dying if one recovers? Or say that laboratory tests show that a person has a progressive condition that sooner or later will result in death. At the moment, though, the person has only the early symptoms and can continue with all normal activities. Is this person dying? What about a person clinging to life in a case where doctors have devised a last-ditch intervention atop more standard treatments that have already failed? Is this person dying if there is another treatment that offers hope of remission or cure? And what of a comatose patient, dependent on tubes and respirators with no sign of improvement? Is this person in a state of suspended dying? Or is this person already dead? Such quandaries have become increasingly commonplace because of medical and technological advances. Continuing changes in the definition of death have also affected discourse about dying. This familiar term no longer seems entirely adequate when applied to a variety of situations, some of them shifting and ambiguous. Dighe, (also spelled dye ) was a word in common usage in the Friesland province of northern Holland in the fourteenth century at the time when Europe was devastated by the Black Death, a plague that annihilated perhaps as much as a third of the population. Old Friesian derived from an early Indo-European language group and became a Low German dialect that is still spoken. The Icelandic deyja and the Danish doe are cognates. Die and dying became established words in the English language during the plague years. Poetic imagination soon turned "dying" to additional uses. "Die-away ditties," popular with Renaissance singers, were songs that ended in a subtle and suggestive manner. Elizabethan poetry often played with dying as a sexual metaphor, and lovers routinely spoke of dying when separated from their beloved. Metaphorical uses persist, sometimes to the confusion of young children who hear that a runner at second base or a car battery has died. Members of a dwindling group are also characterized in this manner: "Phonograph record collectors are a dying breed." Because of the "sensitive" nomenclature fostered in the early twentieth century by unctuous funeral directors, the literal usage of the term "dying" gave way to euphemisms such as "expire," "pass away," or "go to one's reward." By the middle of the twentieth century, dying and death had become taboo words in the United States and Europe, even in physicians' consultations with families or patients . Communication started to improve with the emergence of the death-awareness movement in the 1960s, which introduced palliative care, death education, and other advances. It was a breakthrough to have books published with "death" and "dying" in their titles. This period of more direct and open communication did not long endure, however. The medical establishment, although slow to give priority to the care of dying people, became more active on this front. But the term dying was still deemed too abrasive— terminal illness is the preferred clinical euphemism, connoting an aggregation of symptoms rather than a real, suffering human being in the twenty-first century. End-of-life (EOL) has become another key term. Unlike terminal illness, EOL calls attention to the many sources of potential concern and support. Decisions about financial affairs and funeral arrangements, for example, are among the included topics. Nevertheless, EOL has also become the professional and bureaucratic rhetorical surrogate for dying person. Perhaps the most useful addition to current terminology has been end-phase of life, the period in which major body systems have failed and the individual has become dependent on others for total care. The term is more specific than either dying or terminally ill. Some terminally ill people can continue with their family activities and careers, and look after much of their own care. People in the end-phase have lost much of their functional capacity and are likely to be receiving specialized care in the hospital or at home. The onset of ill health is often accompanied by a change in social status, however temporary and reversible upon recovery. Lowered expectations or even outright aversion—if the condition is disturbing or contagious—account for much of the patient's lowered social esteem—one that either disturbs (e.g., a burn victim whose injuries are painful for the viewer as well as the patient) or is feared as contagious. A similar reduction in social standing affects those who cannot make a full recovery—in such cases of the "chronically impaired," the patient is often shunted to the periphery of social influence and interaction. Research and observation have clearly established that society tends to isolate dying people. Both professionals and nonprofessionals spend less time with dying people, relying on various evasive patterns of behavior. The growing awareness that dying people often experience social isolation and loneliness became a strong motivation for the development of palliative care and death education. Even today, however, the status change to "dying person" often signals a major alteration in the individual's relationship with society. When does dying begin? This question becomes important in light of the major changes that often occur when a person is regarded as a dying person. In a strict sense, it could be said that given the mortal nature of humans, dying begins at birth. But such an abstract philosophical perspective yields little concrete guidance in confronting the suffering and fears of real humans whose demise is not a distant endpoint but an imminent prospect. Neither is there much practical utility in the equally broad notion that dying begins with the onset of aging, especially because many people enjoy good health well into old age. In the most common formulations, dying begins when a fatal condition is recognized by a physician; the patient is informed of the fatal condition; the patient realizes and accepts the facts; everybody in the situation (e.g., family, friends) realizes and accepts the facts; and nothing more can be done to reverse the condition and preserve life. Each of these possibilities has its own set of implications. For example, a person might incur a life-threatening condition but remain unaware of it because of "silent" or seemingly trivial symptoms (i.e., digestive problems, fatigue)—hence the victim's social image and self-image are not those of a dying person. Communication and interpretation are crucial to all the other possibilities. One person might suspect that a condition is fatal but resist that conclusion pending a physician's confirmation, while another might resist the reality of impending death no matter how bluntly the physician conveys it; sometimes this denial might come from family members rather than the patient. It is not unusual for some time to elapse until physician, patient, and family all accept the prognosis. The dying person is vulnerable to the additional stress of familial discord, which often takes the form of mixed messages, with some family members urging a pitched battle against the disease and others counseling resignation and acceptance in the face of the inevitable. Physicians are often caught in the middle of such family dissension, especially if the relatives' attitudes shift with each new turn in the patient's condition. In some cases a doctor's zeal in pursing every conceivable treatment strategy, no matter how difficult or futile, can override the patient's own wishes to abandon an all but fruitless struggle and face the end placidly. Caregivers often emphasize the importance of open communication and trust. Several studies have revealed that interactions with the dying person are often hedged by fears of excessive bluntness toward the patient and the relatives' anxiety about their own mortality. Such circumspection leads to patients and relatives to deny to each other the knowledge that each possesses privately about the terminal nature of the illness. In the mutual-pretense situation, for example, both the dying person and the caregiver or family member know the truth, but both also act as if they are not aware in order to spare each other's feelings. Experts suggest that it is more useful to attune to the dying person's immediate needs instead of applying a predetermined resolve to skirt or confront sensitive topics. Sometimes dying people want to discuss heartfelt feelings about impending death, while others relish diversionary gossip. Experienced caregivers often encourage relatives to view the dying person as a human being rather than as a "case." "We die the death of our disease," observed the poet Rainer Maria Rilke. This statement echoes clinical realities. The patient's overall life history and personal disposition can have as great an impact on the dying process as the nature of the illness. The physician Sherwin B. Nuland offers illuminating examples of the influence of biomedical factors: "When a would-be suicide hooks up one end of a hose to an automobile's exhaust pipe and inhales at the other, he is taking advantage of the affinity that hemoglobin has for carbon monoxide, which it prefers by a factor of 200 to 300 over its life-giving competitor, oxygen. The patient dies because his brain and heart are deprived of an adequate oxygen supply" (Nuland 1994, p. 159). What is significant about this pathway to death is the rapid loss of consciousness and therefore the inability to communicate or change one's mind. By contrast, some people recover from cancer or go into long periods of remission where they are at risk of terminal illness but not really dying. Should the cancer start on a terminal course, there is not usually a rapid loss of consciousness. Unlike the carbon monoxide suicide, the person with terminal cancer has time to be with friends and relatives, look after business matters, and reflect on life's values and meanings. The end phase of life also differs markedly from that of the suicidal person attached to an exhaust tube hose. A prolonged struggle with cancer is likely to leave the patient emaciated and weak, subject to infection because of a compromised immune system—hence pneumonia, abscesses, and infection often become the immediate causes of death. Blood pressure drops, and various organ systems fail. During this "lingering trajectory," family members can provide emotional support to one another as well as to the dying person. Kidney failure also tends to have a lingering terminal course as excess potassium and other substances build up in the body, compromising brain functioning and often leading to a coma and then fatal cardiac instability. As Nuland observes, "Only rarely are there any last words or deathbed reconciliations" (1994, p. 54). There is a need to be with the dying kidney patient while there is still time for consoling and memorable interactions. In these and many other instances, the nature of the disease—and the type and quality of care—are usually decisive factors in the course of the dying process. • Performance anxiety— "How am I doing? How do you think I am doing?" • Storytelling— "I must come up with the best possible story of all that has happened, is happening, and will happen." These experiences of living can help individuals prepare for the experience of dying, which is more than restricted activity, limited energy, and doom-laden depression. Like many other key formative experiences, it is also the adventure of passage from the known to the unknown. Byock, Ira. Dying Well. New York: Riverhead Books, 1997. Corr, Charles A., Kenneth J. Doka, and Robert Kastenbaum. "Dying and Its Interpreters: A Review of Selected Literature and Some Comments on the State of the Field." Omega: The Journal of Death and Dying 39 (1999):239–260. Curtis, J. Randall, and Gordon D. Rubenfeld, eds. Managing Death in the Intensive Care Unit: The Transition from Cure to Comfort. New York: Oxford University Press, 2001. Doka, Kenneth J. Living with Life-Threatening Illness. New York: Lexington, 1993. Enck, Robert E. The Medical Care of Terminally Ill Patients. Baltimore, MD: Johns Hopkins University Press, 1994. Field, Marilyn J., and Christine K. Cassel, eds. Approaching Death: Improving Care at the End of Life. Washington, DC: National Academy Press, 1997. Glaser, Barney G., and Anselm Strauss. Time for Dying. Chicago: Aldine, 1968. Glaser, Barney G., and Anselm Strauss. Awareness of Dying. Chicago: Aldine, 1966. Kastenbaum, Robert. Death, Society, and Human Experience, 7th edition. Boston: Allyn & Bacon, 2001. Lester, David. "The Stigma against Dying and Suicidal Patients: A Replication of Richard Kalish's Study Twenty-Five Years Later." Omega: The Journal of Death and Dying 26 (1992–1993):71–76. Nuland, Sherwin B. How We Die. New York: Knopf, 1994. Rosen, Elliot J. Families Facing Death. San Francisco: Jossey-Bass, 1998. Staton, Jana, and Roger Shuy. A Few Months to Live: Different Paths to Life's End. Washington, DC: Georgetown University Press, 2001. SUPPORT. "A Controlled Trial to Improve Care for Seriously Ill Hospitalized Patients." Journal of the American Medical Association 274 (1995):1591–1599. Weisman, Avery D., and Robert Kastenbaum. The Psychological Autopsy: A Study of the Terminal Phase of Life. New York: Behavioral Publications, 1968. THis information will be very helpful for I am currenlty working on a DMIN with an empahsis in the dying experience as it relates to the individaul.
2019-04-21T07:12:24
http://www.deathreference.com/Da-Em/Dying-Process-of.html
0.999979
How long does champagne keep? I received a corked/boxed/sealed bottle of 1996 Dom last January, and I've been saving it... I just don't know how long it's safe to keep. If it's been aging for 10 years already, is it OK for a while longer, or is there a magic time period in which to drink it? There are "vintage champagnes", which will age up to 10 years, and "champagnes", which will not age longer than a year. You probably have a vintage champagne on hand, but the label will confirm. Now is probably the best time to drink it. Apparently, there's no need to rush. From ktg's Robert Parker quote: "Anticipated maturity: now-2020+" As others have said, Vintage Champagne ages gracefully for several decades, and 1996 was a particularly good year so you have nothing to worry about. Drink whenever you have a special occasion to celebrate. One is bound to come along in the next 20 years or so. btw, it will only last that long if you treat it nicely. You don't need a dedicated wine cellar or anything, but you should store it on its side in a cool, dark place where it won't be disturbed often or subject to vibrations. The back of a closet is perfect for this. Chill before serving. A '96 Dom should last several more years, properly tended. Though, why one would want to wait is beyond me. Incidentally, the bigger the bottle, the slower it will age. So if you want to lay down a bottle of bubbly and open it in a few years for a special occasion like an anniversary or such, buy a magnum. btw, it will only last that long if you treat it nicely. You don't need a dedicated wine cellar or anything, but you should store it on its side in a cool, dark place where it won't be disturbed often or subject to vibrations. The back of a closet is perfect for this. It very much depends on the closet. In my first Astoria apartment, I had a magic closet that somehow preserved my wines indefinitely: I bought wines in 1991 that were still in great condition a decade later. Then I moved to another apartment in Astoria (the scumbag landlord lied to get me out so he could up the rent, but that's another story) and the new closet turned out to be worthless—I had to drink up the last of my good wines before they all turned to rank demon-sweat. But yeah, if you keep it in the right environment (your refrigerator will also work), it will last for years to come. In my experience, Champagne usually gets a more nutty taste when aged. I have had a few 1996 of different kinds, and they are all still very young. The last Dom Perignon I had was a 1995 and it was still a baby when I had it two years ago. Do not however, that Dom Perignon is one of the better Champagnes, and therefor keeps better than a lot of other brands. Keep it well and use it for breakfast at a special date, like an anniversary or similar :-) Btw. Keeping a champagne in a refrigerator for prolonged periods is as bad as keeping it too warm. Nah, don't store sparkling wine in the fridge long term: the vibrations mess it up. In fact, never buy sparkling wine chilled if you can avoid it - it's been in a commercial refrigerator for who knows how long, sitting there absorbing vibrations and probably getting light-affected too. Chill it yourself at home. It really does make a difference.
2019-04-18T21:34:35
https://ask.metafilter.com/38517/How-long-does-champagne-keep
0.998837
I see there are 2 orange &lsquo;cups&rsquo; which hang on the front, but is there enough depth on the painting side to accommodate extra paint pots- as 2 would not be enough? Hello, Thank you for your query. No, none of the sides are magnetic. Sorry for any disappointment this may cause. Hello, Thank you for your query. This is not available for international delivery we are afraid. I hope this information is of use. Is this suitable for magnetic letters?? Is the white board side magnetic? Hello Caroline thank you for your enquiry This children's double-sided art easel comes with a white board and chalkboard for twice the colouring fun. i hope this helps.
2019-04-21T17:01:20
https://www.elc.co.uk/easels-and-furniture/step2-jumbo-art-easel/145776.html
0.997069
Bleed - "full bleed" vs "no bleed" - what is it? Bleed refers to printing that extends to the edge of a sheet or page after printing, or "bleeds" off the edge of the page. If you do not have a white border on all four sides, then your image has bleed. Bleed is an important factor in any print project. It influences the design, the file specifications, and even the cost. How do you print full bleed? There are a few ways to print full-bleed files. The first is to simply "shrink to fit" your file, which will leave an approximate 1/8" white border on all four sides. This is the most cost-effective way to deal with a file that is designed to be full bleed, or if your print file doesn't include any bleed. To achieve full bleed (no white border), you actually print the piece larger then it's final size and then you cut it down. For example, if you are printing a letter size poster (8.5"x11"), it will actually be printed on 11"x17" paper. Then the excess is cut off, leaving you will a full bleed 8.5"x11". This process also means that full bleed print projects cost more then their no-bleed counter parts because they are actually larger prints, and then there is the additional cost of cutting. No-bleed print pieces are also more eco-friendly because there is no wasted paper from cutting like there is with full bleed items. How can I save money and still achieve full bleed? Check your finshed size - Some sizes are cheaper to make full bleed then others; for example, 4"x6" and 5"x7" postcards cost about the same to print regardless of bleed. However, 4.25"x5.5" and 5.5"x8.5" postcards are cheaper without bleed. This is because of how they are imposed on the page when we go to print them. Go (Slightly) Smaller - If you are designing a tabloid (11"x17") poster, and you want it to be full bleed, we can shrink your full-bleed file to still fit onto an 11"x17" paper, then trim off the white border and bleed, leaving you with a poster that is slightly smaller then your intended 11"x17" size, but only slightly so (approximately 10.5"x16.5"). Design it right - Correctly design your project to incorporate 1/8" of bleed on all four sides, you will save time and money during prepress. Bleed with purpose - On some projects, if you design your bleed evenly on the left and right or top and bottom, it can save you money. This is because it eliminates the gutter space needed when we impose your project, which means less cutting and sometimes it means being able to fit more pieces on a single sheet of paper. Reach out to us BEFORE you start designing - by working with CW Print + Design staff at the very start of your project (before you have even started designing) we will be able to give you guidance on the best techniques for you to use to save money on your full-bleed print project. If you are not sure of the most cost-effective size and bleed settings for your project, contact us and we will be happy to give you some guidance. How do I setup a print-ready file with full bleed?
2019-04-22T12:06:30
https://cwprintdesign.com/faq-what-is-bleed.html
0.999755
To approach the end of the 20th century, is to inevitably reflect upon the fact that our century, more so than any other, has been one of injustice. This injustice which, in one form or another, characterizes each decade of this century is so constant, so "regularized," and so overwhelming that we have become desensitized to even obvious and gross manifestations of it. That the mortal remains of the slaughtered unborn should be callously put out with the trash and then, not this, but their proper burial should become cause for outrage and for the initiation of civil litigation, is a recent example of this perverse distortion of our moral sense. On a grand scale, a nation switches the channel with an air of boredom as it hears of bombings perpetrated against civilians by its own armed forces. The blood, misery, and dislocation of non-combatants means nothing to us now. That such intentional killing of the innocent was against the most fundamental precepts of the Christian law concerning the conduct of a just war is to us quaint and naïve. How many of our own Catholic people, even those of learning and influence, live comfortably with and even endorse a geo-political system which is anchored by the doctrine of M.A.D., mutually-assured destruction. Massive injustice will be met with massive injustice. In mathematics, two negatives make a positive, no? The reason I believe that unjust actions against the moral due should be philosophically considered is on account of the fact that the legal due which I owe another man is still considered within the purview of the liberal state. In fact, the liberal state officially bases itself upon the position that it is only the legal due which one citizen owes to another, which the citizen owes to the state, or which the state owes to the individual citizen, whether it be public safety, reciprocity in commercial exchange, or payment of interest-bearing debts to banks, which is the proper domain of the state and of legislation. Indeed, the liberal state normally makes it explicit in its constitution that the powers of the state extend no further than to establish the legal and financial "borders" which separate one individual from another. That the state take an interest in re-establishing, facilitating, institutionalizing or legally sanctioning those complex social and cultural relations which are the very subject matter of the moral due is thought to be the very defining characteristic of a "fascist," "reactionary," "dictatorial" system. It is the moral due, that debt between persons which cannot be strictly quantified, which concerns us on account of its fundamental role in the social and interpersonal structuring of any real community. Its neglect, the fact that we as moral agents and social beings no longer "see" the non-legal "debt" we owe to others, is a sign of the complete dissolution of a structured social order which is not merely based upon the exigencies of capitalistic commercial requirements. When we hear the traditional virtues which were understood to be "parts" of the virtue of justice, and which allowed a man to fittingly render his moral debt to others, we cannot help but feel that we are unable to completely savor these terms on account of the fact that one need be in a morally coherent, interrelated community of men searching out similar goals in order for these terms to have real significance for us. In our current state of social Atomism, where each man is a free-floating autonomous creator of life-plans and moral values, the inner verve of such ancient virtues and duties as "piety," "observance," "respect," "gratitude," "affability," and "liberality" simply is not experienced. Moreover, what any real social order experiences as grave violations of interpersonal and interfamilial relations, vices like "reviling," "taunting," "upbraiding," "backbiting," "tale-bearing," "double-tonguedness," and "ingratitude," are simply generalized under the category of "gossip" or "absentmindedness." Actually, what does "gossip" mean for us today who have more in common with someone who frequents the same website as we do, than we do with our own neighbor! At least "gossip" implies real community. Those who speak through the grapevine must one day drink the same wine! To consider what St. Thomas Aquinas means when he speaks of a "moral debt" which one man owes to another man, is to consider the fact that most, if not all, of the various virtues and vices relating to this kind of debt concern the giving of or the failure to give honor to another man when honor is his due. It is not an exaggeration to say that the whole question of "moral debt" is a question of the rendering of honor to those who deserve it, either because of their inherent excellence or because of the benefits which they have bestowed upon us. In the great ethical tradition of the Classical and Christian world, it is assumed that those who are capable of bestowing good things upon us are those either possessing a certain sort of greatness of soul or at least a social position from which great benefits can be bestowed. The whole question of the moral debt we owe other men who we have contact with, who we share life with within a community, is necessarily bound up with the question of the nature of honor and its role within a society of men. To analyze the concept of honor is to first acknowledge its basic structure. In the act of honoring, the two parties involved, the one honoring and the one being honored are distinct in their respective persons, along with having a different relation to the act of honoring itself. Honor is not in the one who is honored but, rather, in the one honoring, who shows deference to him.2 Honor is then a rational, voluntary, evaluative response on the part of a person to a certain type of excellence which he finds in another. The act of honoring, normally some external sign or testimony, does not make the excellent person excellent, rather it is simply a testimony to the honored person's excellence. Since honor is, then, a fitting response which one gives to another for some inherent superiority which the honored man possesses as compared to the one honoring, a precondition for such an act is the intellectual recognition on the part of the one honoring that the cosmos of beings is ordered according to different degrees of intrinsic worth. This natural, shall we say "connatural," recognition that there exists a hierarchy of persons, professions, actions, and values can only be short-circuited by artificial and "learned" egalitarian notions. Since such a recognition of hierarchy is at the foundation of all cultural, social, and political life can it not be said that the egalitarian notions, which erupted violently onto the world scene during the French Revolution, are the essential cause of the cultural and social wreckage which we find all about us today. Can we not attribute the many "bent" personalities which we see about us or hear about to precisely this failure to recognize the divinely ordained structure of the whole. A man who does not know the whole surely does not understand his own place within it. Honor has disappeared from out society because this connatural recognition of hierarchy has disappeared. Since I would hold that this recognition is truly "connatural" (i.e., because of the operations and inclinations of our nature we cannot help but recognize and "feel" it--even the Indians recognized that the "Great White Chief" was to be honored); we can wonder if the Liberalism stemming from the Revolution has produced a situation truly unprecedented and, hence, weird. It is so. If each "pole" of the act of honoring is considered, we can see that each must conform to certain essential norms. The man who is being honored must display an excellence which can be admired within the context of the social whole. Since part of honor is the hope for future emulation, we can recognize that we only "instinctively" honor those who possess an excellence generally recognized as such. To honor another man, even though this act is voluntary, is in some way a "forced" transcendence of our own egocentric satisfaction with ourselves. How much we begrudge the act that we perform, depends upon the degree of our honest recognition of reality and of our virtuous affirmation of it. The man we honor is one whom we recognize as one having achieved mastery in a specific area, he has shown himself to be eminently proficient in the task which society has made his. He reveals the prowess which our ancestors have identified as the essence of manliness. These accomplishments and the social acclaim which normally follows from them, provide the honorable man with the benefits which he can then bestow liberally and for which we render him honor. The honorable man is always the benefactor who recognizes that the good things which he possesses do not ultimately belong to him. The delicate shame which characterizes the honored man when he is honored is the deepest sign that the perfections we possess are more ideal than we ourselves are. We but share in that which is more than can be shared. This half-grudging recognition of the ideal present "within" that man which we honor, is the preliminary to the deference which requires that we "make way for" him, allowing attention to focus on the one we recognize as deserving of respect on account of a certain superiority. This "standing aside," which is the mark of deference, is an implicit or explicit recognition that the one whom we honor has a task more beneficial to others than our own and one which we ourselves benefit from. It is, also, the insight into the awe which takes hold of the soul which has glimpsed the sublime periphery which surrounds the honorable man. The deference which we give, this silent "making way for," is our acknowledgment of the inadequacy of all of the signs by which virtue, excellence, and nobility are recognized. In deference, the communal aspect of honor is also attested to. For surely, silence, which is the most fitting response to the sublime, testifies that the sublime is truth which no one man has seen. The loss of an appreciation of the sublime, and the consequent social vulgarization, in our own day is a certain indication that we do not see other men seeing. We have forgotten what all have known. It is when considering the honor which the virtue of "piety" demands we pay to our fathers, that St. Thomas unfolds the inner intelligibility at the core of all acts of honor. Why do we call some acts of acknowledgment "honor," and some not. Why is the cook thanked and the host honored? St. Thomas answers this question by first pointing out that the father of a family himself participates in God's own providential care of His creatures. A father is the principle of generation, of education and learning, along with being the provider of whatever pertains to the perfection of human life.5 So too, a man participates in the activity and beneficence of a natural father by exercising providential acts similar to the ones' exercised by the father of a family. This "extended paternity" can even be exercised by a host who, like a father, creates a social "space" in which is found companionship and sustenance. It is, therefore, in the question after his discussion of the virtue of "piety," that we find St. Thomas discussing the virtue which repays the moral debt we owe to those who exercise, for our benefit, an aspect of the paternal office. Such a virtue St. Thomas labels observantia or "observance."6 To participate in the providential power of a father is to participate in his power of governance. Just as the father governs his own family in the multifaceted aspects of its life, so too men share in this power by exercising government in a specific sphere of life. The man who is honored is both governor and benefactor. The examples St. Thomas gives of such men who exercise the patriarchal power in a specific area of life are the governor of a state in civil matters, the commander of an army in matters of warfare, and a professor in matters of learning.7 Here we find the debt of honor emerging from a "father" and "son" relationship in which the "father" employs all of the skill, practical wisdom, foresight, courage, responsibility which he has gained from a life-time of struggle in order to facilitate the "son's" accession to the goods which the "father" himself already possesses. Here we uncover a reason for the act of honoring. The father gives that which he already possesses. How can he receive from the son that which he does not already have? How can even honor, which does not add to excellence but is simply an acknowledgment of it, bridge the gap between him who owes "everything" and him who has given everything? The Thomistic answer to this question is simply that honor cannot bridge this gap. Honor is given when nothing else suitable can be offered. It is an acknowledgment made by the man indebted to the debtor that the good which he has bestowed will be remembered; it will be reserved close to the innermost core of one's being, where the corroding power of temporality has no access. It is interesting to note, that even when St. Thomas is explicating his teaching on the act of honoring as a fulfillment of a moral debt owed in justice, he remains faithful to his fundamental appraisal of human life as the unified existence of a body and a soul. Just as man cannot express intellectual concepts without using the material medium of audible words, so too is he unable to express the interior attitude of veneration and regard save by means of signs, "either by words, or when one proclaims another's excellence by word of mouth, or by deeds for instance bowing, saluting, and so forth."9 Whereas we can express the honor which we offer to God and the things of God by a inner act of will or an internal movement of the heart and mind, the reverence and honor which we show men who have benefited us in an exceeding way must conform itself to the normal conditions of relations between men.10 To prescind from giving manifest, that means external and corporal signs of honor and respect, is to fail to render to another man what is his due. We commit an injustice. The visible, corporal tokens of honor, which have almost completely disappeared from our radically unjust society, are interesting in their variety and import. Genuflection, kissing of a ring, the kissing of hands, bowing, saluting, "making way," reverent silence when the honored one is speaking or wishes to speak, forms of speech used to distinguish rank, formal titles of address, polite inquiries meant to demonstrate benevolence, not doing or saying anything revolting or even off-color in the presence of the honorable one, are all "objectionable" to the contemporary liberal and egalitarian mentality on account of the obvious fact that there is a type of servitude implied in these gestures of interpersonal acts of honoring. Such is the case, and it is meet and right! Indeed, dulia, as it is in classical philosophical and theological thought, is both the honor which is rendered to men of great worth and to the saints, along with being a species of the virtue of observance. As a species of observance, it relates to the rendering of honor which a servant offers to his master. How can this resemble the typical relationship between benefactor and one who is benefited? Isn't it the case, that actually, the master benefits his servant much more than the servant benefits his master? The master has a life. The servant merely services one part of the master's life. The servant gains a "life" by serving his master. The servant bestows a part, the master a whole. We honor those who have bestowed upon us the goods which truly make us the men that we are. Even though St. Thomas Aquinas identifies the virtue of "gratitude" as that habit which enables us to respond in a fitting way to the generosity of a benefactor (i.e., one from whom we have received particular and private favors),11 thereby distinguishing it from observance, dulia, and pietas, nevertheless, when we consider this virtue we see how closely related it is to the paying of our moral debt to another by rendering him the honor which is his due. Indeed, we can speak of gratitude as the psychological and moral precondition, disposing the soul to respond in a fitting way to a person who is truly honorable and who has been our benefactor. When considering the state of gratitude on the part of the one who is grateful to his benefactor, we must recognize that there are several essential aspects of this psychological and spiritual state. First, there must be a clear and objective intellectual insight into the value of the benefit conveyed. Without this intellectual objectivity, one of the many fruits of the chaste soul, there cannot be an honest assessment of the benefit given, the debt owed, the obligation imposed upon one by the debt, or of the fitting response which is owed. The egocentric soul, which sees all of reality only insofar as it relates to the plans and desires of the self, is blind to the reality of a debt. It is the soul dominated by its own concupiscence which will, necessarily, be the ungrateful soul. Second, there must be a moral promptitude on the part of the will, which seeks to repay, by an immediate expression of joy and happiness, part of the debt incurred. The spontaneity of gratitude for a gift bestowed is a sure sign of a just soul, one which implicitly desires to give to all men their due. Third, there must be a recognition that the one who has bestowed a gift, something of intrinsic worth, an "end" and not merely a means, has done so out of a liberality of soul which endows others with good things even though he is under no obligation to do so.12 The selfless nature of the honorable man's act in our favor must be appreciated and, indeed, is the very thing which transforms the "is" of the gift, to the "ought" of our moral debt. He has not needed to, but he has done good to me or mine. Only those who have the innocence and objectivity to be selfless themselves can recognize what is selfless in others. Finally, the ability to recognize the liberality of the bestower of good things and, consequently, to render him due honor, is contingent upon our ability to recognize the good bestowed as gift. This, no doubt, is a prime reason for the near complete disappearance of the rendering of honor in our own society. To recognize a good, a service as a gift, we must implicitly or explicitly recognize our own insufficiency, our own lack, our inability to provide ourselves with the goods which we need for well-being and happiness. To recognize this dependency on another for that which is essential, would open the autonomous man of the liberal age to feelings of lack and of true need. The ungrateful autonomous man is intentionally blind to the intelligible depths of the goods which the honorable man can bestow. He does not bow because to bow to one man, even one, would be to acknowledge that there is a kingdom of which one is not king. If there is a kingdom, there is a king. To the true King of the everlasting kingdom, and to those who share in the radiance of his majesty, be honor.
2019-04-23T04:06:41
http://www.lifeissues.net/writers/cho/cho_10senseofhonor.html
0.995273
Your favorite sitcoms used to be terrible. It may be hard to remember, but there was a time that 30 Rock wasn't very good. Seriously. Go back and watch that first season. It's wonky and uneven. The writing isn't as sharp as the show we came to love. Liz Lemon wasn't as zany. The punchlines lagged. Do the same thing with The Office. The first six-episode season hinted at the show's future comedic brilliance, but otherwise, much of it was slow and awkward. Parks and Recreation was a creative disaster when it premiered — a copycat of The Office that floundered because it was a poor man's copycat of The Office. Thankfully, the show's creative team learned to write to Amy Poehler's considerable strengths, zapped her of her Michael Scott-aping goofiness, and Parks and Recreation eventually grew into one of the best series on TV. Fox's New Girl blossomed toward the end of its first season, when Zooey Deschanel's adorkable-ness was dialed down and her roommates' neuroses were turned up. Even Seinfeld turned off NBC execs so much that the series almost didn't survive past its first five episodes. Today's new shows don't always have a chance to find their footing. Series now live and die based on early buzz from critics and social media. This is a real shame for sitcoms, which often need time to find their creative voice and rhythm. Case in point: The Mindy Project, a Fox series that has quietly grown from a charming but slight and clumsy comedy to one of the best new comedies on TV. Fox has taken notice. It's giving the show a special spotlight after American Idol tonight, in a naked ploy to earn the series the fans it deserves. You should take notice, too. The Mindy Project is the brainchild of creator/writer/star Mindy Kaling, formerly known from her scene-stealing turn as Kelly Kapoor on The Office. In The Mindy Project, Kaling plays a refreshingly original TV character: An OB/GYN who's both unlucky in love and a hopeless romantic. If it's easy to compare Mindy to a Carrie Bradshaw type, it's because she's so transparently trying to live like Carrie Bradshaw. The Mindy Project is also a stellar workplace comedy, with winning support from Chris Messina (swoon-worthy in his wryness) and Ed Weeks (so vain he make himself swoon) as her partners and foils at the office. It's how the episode wrapped up, however, that was truly special — it essentially subverted every romantic comedy convention. It wasn't neatly tied or schmaltzy. It was romantic, bittersweet, and it rang bitingly true. Rogen's character leaves while Mindy is sleeping because he thinks saying goodbye in person would be too hard. "No one wants to see a guy in the Army cry, because it's just bad for our nation, honestly," he writes in a letter. But rather than leave it at that, or with Kaling staring off misty-eyed into the distance, the episode ends with an unexpectedly hilarious exchange between Mindy and her coworker. "You're gonna cry? You want me to leave?" Messina's character asks. "No," Mindy replies, "but it's weird that your first instinct when a woman is crying is to abandon her." Why should you be watching The Mindy Project? It's frank while being charming, it showcases one of comedy's smartest voices — and like many of TV's best sitcoms in their early years, it's improving all the time. Kaling may not be the voice of a generation (Lena Dunham can have that) or the witty woman many of us aspire to be (Tina Fey has that sewn up). But Kaling doesn't need the grand labels, and that's what makes her show so great. She's kind of the person we all already are... just a bit funnier.
2019-04-18T23:10:23
https://theweek.com/articles/466522/mindy-project-best-tv-show-youre-not-watching
0.999997
This is an interesting essay. But I would agree with you hunch that there is something missing. You have set things up very well, with some very good and believable examples. In some of these cases, it seems pretty clear that in committing canicide you have performed an action which merits punishment. In other cases, it seems pretty clear that you have performed an action which merits help, or treatment. Courts of law have to deal with cases like this. Courts are set up for a practical purpose which somehow has to mesh with our ideas of justice. But how sound are these ideas in the light of the critique of the naive or common sense notion of 'free will'? There are two issues here, which need to be separated. First, there is the all-or-nothing argument that determinism precludes free will. You can agree, or disagree: either way, you are then faced with the necessity of giving an account of the nature of justice and punishment. On a 'hard' determinist view, punishment is just a way of altering controls. How we choose to alter those controls - either with a spell in prison or a course of treatment in a secure institution - will depend on our view of how amenable the culprit is to persuasion, their capacity to think rationally for themselves. On a view which refuses to accept that human beings are merely cogs in a causal chain, the very same kinds of question will arise. Some persons demonstrate by their actions that they are capable of rationally deciding for themselves - are responsible for what they do - while others do not. A move one can make here is to 'bracket' the metaphysical problem of free will and determinism. Whatever view you take on the metaphysical debate, you will still be faced with the same practical problems of knowing when or when not to punish. In other words, your answer to the question could take the form of looking for some principled way of separating the two broad classes of case. In all probability, it will not be possible to do the separation neatly, but a fuzzy distinction is still a distinction. As demonstrated every day in the courts, there are easy cases and hard cases. Your examples are sufficiently rich to give us a good purchase on the kinds of consideration that would be relevant. What is a 'fit of rage', road rage for example, or the rage which led to the awful case reported yesterday of a dispute between school children developing into murder by arson? Are we always responsible for our rages, or only sometimes? On what basis would one make a distinction? Likes and dislikes are one thing; the question is whether, for a normally rational person, one accepts that certain extreme provocations are sufficient to 'madden' us, i.e. deprive us of the responsibility for our actions. Your reference to 'crime passionel' suggests that in France unfaithfulness was (I don't know if it still is) considered such a provocation. An alternative interpretation is that a husband who coldly planned and executed his wife's lover's murder would still be in a position to claim that it was a 'crime of passion'. Drug dependency, partner abuse, inability to reason clearly each raise thorny issues (you cite the example of the drug addict whose reason is 'blurred' but a simpler example might be someone with a very low IQ). Another class of cases which you don't consider concerns alleged cases of brainwashing, such as the famous Patty Hearst case. Then there are the less spectacular but more common examples where one person comes under the strong influence of another. The more we look at the nitty gritty details, the more difficult it seems to make a meaningful distinction. As I've remarked, courts are set up with a practical purpose. Maybe one would be led, ultimately, the view that blame and punishment are never rationally justified - not by some clever metaphysical argument, but just by becoming aware of the depressing reality of cases like these. You've made a good start, despite your misgivings. I look forward to your next piece of work.
2019-04-19T01:10:13
https://electronicphilosopher.blogspot.com/2012/01/free-will-and-justification-for-blame.html
0.99785
What is a promotional discount code? As a registered user you may receive a promotional code (three letters and one number) that entitles you to varying discounts on specified titles available from the online bookshop. Type your promotional discount code into the promotional code field (which appears under your shopping basket after you have logged in) then click apply. The code will automatically be applied to any items for which it is valid in the shopping basket. Once successfully applied the discount amount will be displayed on the left under the product ISBN and a message will be displayed at the top of the shopping basket page to specify the code that has been applied. If you have more then one code you can now type this into the promotional code field and click apply as before. Please note, only one promotional discount can be applied to a product at any one time - a higher discount will automatically override a lower one. If a code is invalid for any reason (either it has expired, cannot yet be used, is invalid for the specific product, has been entered incorrectly or is a single-use code that has already been used) a message to this effect will be displayed to the left of each product and at the top of your shopping basket page. Where a product on the site has a sale price (where the original price is shown crossed through followed by a new lower price) only the sale price will be carried through to the shopping basket. If a valid promotional code is then successfully applied the promotional code discount will be taken off the sale price. If you already receive customer discount on all or a range of products, any valid promotional discounts you enter will only be applied if they are higher than the customer discount you already receive. Only one discount can be applied at any one time.
2019-04-19T08:45:42
https://books.hse.gov.uk/HSE-Books-Help-Pages/Promotional-Discount-Codes/?CLICKID=005730
0.998842
How Many People Are Ready to Shop on Social Media? Only a small percentage of users are interested in buy buttons, but that's a huge number of shoppers. Facebook's buy button. Source: Facebook. For all the hype around "buy" buttons on Facebook (NASDAQ:FB) and Twitter (NYSE:TWTR), we haven't seen significant adoption by advertisers on either platform. Facebook has introduced more and more places for businesses to include the functionality, including new sections on Pages and a dedicated shopping section. It also rolled out "buy" buttons with its new Instagram ads. Meanwhile, Twitter has introduced collections and product pages to help businesses sell more goods and services directly to consumers over the social network. One factor that may be delaying widespread adoption is the perceived lack of interest. GlobalWebIndex recently conducted a survey of social-media users, and found interest in "buy" buttons ranged from 9% of Facebook users up to 17% of Tumblr users. And a survey from Boston Retail Partners found that only 34% of retailers expect to increase their revenue from social-media referrals. Consider this: Amazon.com (NASDAQ:AMZN) had 244 million active customers during the last 12 months. Nine percent of Facebook users is about 140 million -- that's the number of users who expressed interest in the company's "buy" button. Retailers are neglecting this audience by not taking advantage of Facebook's new shopping features. Likewise, 14% of Instagram users -- about 56 million -- and 12% of Twitter users -- 37 million -- expressed interest. In other words, a substantial number of online consumers have expressed interest in shopping over social media -- even though it equates to a small portion of social-media users in total. Still, 85% of retailers expect to increase their e-commerce revenue next year, but only 34% expect to see increases in social-media referral revenue. The hard part for retailers may be figuring out which of Facebook's 1.55 billion users are among the 140 million that are interested in buying things from advertisers on its network. There's no point in putting products and "buy" buttons in front of people who don't intend to buy things through the app or website. To this end, there's a lot of room for Facebook and Twitter to help. It's a start to be able to re-target shoppers who previously visited a retailer's e-commerce site, but it doesn't separate those interested in shopping on social media from those who are just interested in shopping online. Both companies could help retailers target users who have looked into the more-passive shopping options on both platforms to improve the effectiveness of using "buy" buttons. If Facebook or Twitter are serious about increasing the number of advertisers using this functionality, then they ought to subsidize the price of bidding on those ads. Simply moving those ads higher up in the News Feed or timeline will provide data to determine who's interested in "buy" buttons, and how much value they provide. Amazon will generate more than $100 billion in revenue this year. And while neither Facebook nor Twitter are interested in warehousing and shipping millions of products, it shows the huge market for online commerce that exists. Taking even a small cut off the top -- through direct advertising sales -- would provide a meaningful boost to both companies' top lines. A better comparison would be eBay (NASDAQ:EBAY), which makes money from providing a platform for buyers and sellers to find one another. The company is expected to generate $8.6 billion this year off of an active customer base of 157 million. That's roughly the same size as the audience expressing interest in Facebook's "buy" button, and about four times larger than the potential audience on Twitter. If Facebook and Twitter can monetize buyers at a quarter the rate of eBay -- considering each buy button ad replaces the opportunity for a different ad -- Facebook stands to increase revenue by $2 billion (16% 2014 revenue), and Twitter could increase revenue $500 million (36% 2014 revenue). But it's up to the social networks to do the hard work and make the necessary short-term sacrifices to secure such a big opportunity. Retailers aren't going to do for them.
2019-04-23T14:27:48
https://www.fool.com/investing/general/2015/12/24/how-many-people-are-ready-to-shop-on-social-media.aspx
0.719937
The current market offers thousands of various dell latitude e7470 charger. It is really hard to choose the best one from such a big selection. To speed up the process of buying a dell latitude e7470 charger, feel free to use the list with out picks. Our team have been testing many products from marketplace and finally have found the best dell latitude e7470 charger on the market. You can find the whole list of them below. Replacement power supply for dell manufacturer part 04h6nv 06c3w2 09rn2c 0v0kr 310-2860 330-1825 330-1826 330-1827 330-1828 331-5968 332-1831 332-1833 492-bbkh 450-aayq 4h6nv 6c3w2 928g4 a00008 a065r039l aa22850 c120h d094h da65nm111-00 da90pe1-00 da90pm130 fa65ne1-00 fa90pm131 ha65nm130 ha65ns-00 ha65ns5-00 ha90nm130 hh44h k9tgr kt2mg la65ne1-00 la65nm130 la65ns2-01 onn236 pa-10 pa-12 pa-2e pa-3e pa10 tj76k wk890 y1h45 y807g y808g yt886. 30-day money back guarantee and 24-month warranty from lavolta. Output: 19.5v 4.62a.90w (compatible with 65w).7.4.5.0 mm connector. Free power cord included, ce, rohs, fcc certified. Notebook ac adapter for dell latitude 3150 3160 3330 3340 3350 3440 3450 3540 3550 5414 7204 7214 7404 7414 d400 d410 d420 d430 d500 d505 d510 d510u d520 d530 d531 d600 d610 d610u d620 d630 d630c d631 d800 d810 d820 d830 e4200 e4300 e4310 e5250 e5400 e5410 e5420 e5430 e5440 e5450 e5470 e5500 e5510 e5520 e5520m e5530 e5540 e5550 e5570 e6210 e6220 e6230 e6320 e6330 e6400 e6410 e6420 e6430 e6430s e6440 e6500 e6510 e6520 e6530 e6540 e7240 e7250 e7440 e7450 e7470 l13 st x200 x300 xfr xt xt2 xt3 z600. What warranty should be offered with a decent dell latitude e7470 charger? We recommend all our readers to buy dell latitude e7470 chargerwith at least the two-year long warranty period. This is the optimal term for an average dell latitude e7470 charger. Instead of overpaying for a lifetime warranty, save the money to buy a new dell latitude e7470 charger later. Sleek and streamlined, and completely redesigned to save space and connect easily. Provides 65 w of power to charge your system. Designed for inspiron 17r 5737.3458.3737; latitude 12 rugged extreme (7204).13 3380.3330.3340.3350.3440.3540, e5440, e5450, e5540, e6440, e7240, e7440. Every detail has been carefully considered – from soft, bendable cables to smooth, rounded corners. The led indicator lets you know it s on, and makes it easy to find in a dimly lit space. № 3. Car Charger 90w 65w for Dell-inspiron N4110 N4010 N4110 1501 I3531 3520 3521 3531 3537 3541 3543 3721 5521 5545 5547 5720 5735 5749 N5010 N5030 N5040 Latitude E5430 E5440 E5450 E5470 E5520 E5530 E5540 E5550 E5570 E6230 E6330 E6430 E6430s E6430u E6440 E6530 E6540 E7240 E7250 E7270 E7440 E7450 E7470 7480 Dc Auto Adapter Power Cord Extra Long 10 Ft : !!! Check Connector Photo !!! Features / power specs: only pwr+ chargers have extra long 10 ft power cords / output max: 19v 4.74a 65-90w / input volt: 12v / oem original genuine dell charger laptop adapter power cord replacement by pwr+. Warranty: 30 days refund – 24 months exchange. Safety: pwr+ chargers manufactured with the highest quality materials and include multiple smart features safeguarding against iv – incorrect voltage, sc – short circuit, io – internal overheating. – dell chromebook 11 3120 3150 3180 3189; dell inspiron 11 13 14 17 15r 17r 1150 1420 1440 1501 1520 1521 1525 1545 1564 1720 1750 1764 3135 3520 3521 3531 3537 3541 3542 3543 3721 5423 5520 5521 5537 5547 5548 5720 5721 5737 6000 6400 7520 7537 7547 7548 7720 8600 9300 9400 600m e1505 e1705 m5010 m5030 m731r n4010 n4110 n5010 n5030 n5040 n5050 n5110 n7010 n7110 700m; dell vostro 1000 1015 1400 1500 1510 1520 1700 1710 1720 3500 3550 3700 3750. Dell latitude e4300 e4310 e5400 e5410 e5430 e5440 e5450 e5470 e5500 e5510 e5530 e5540 e5550 e5570 e6230 e6320 e6330 e6400 e6410 e6420 e6430 e6440 e6500 e6510 e6520 e6530 e6540 e7240 e7250 e7270 e7440 e7450 e7470 2120 3540 5480 5580 7280 7480 d420 d520 d620 d630 d820 d830 d430 d505 d510 d530 d531 d600 d610 d800 d810 pa-12 la65ns2-01 da65nm111-00 928g4 la65ne1-00 fa65ne1-00 pa-2e 310-2860 a00008 aa22850 my4y4 yt886 ha65ns-00 n6m8j la65ns2-01 d09rm 28f6c h536t adp-90nd cd90v190-00. What if a receive a wrong item instead of the dell latitude e7470 charger I ordered? If you were unlucky enough to get a wrong or broken product, use electronic mail or international telephone to contact the customer support team. They will help you to return your money or get the right dell latitude e7470 charger. Compatibility: dell inspiron 3135 3137 3138 3147 3148 5323 3437 3421 5421 5437 latitude e5250 e5270 e5530 e5540 e5550 e6230 e6330 e6530 e6540 7404; e6410 e6430 e6440 e7440 e7450 e7470 e5430 e5440 e5450 e5470 e5570 e7240 e7250 e7270 7214 5404 5414 7414 3150 3160 3180 3189 3330 3340 3350 3380 3440 3450 3540 3550 6430u laptop. Nicpower chargers manufactured with the highest quality materials small and lightweight fine workmanship and include ovp, ocp, scp protection (ovp: over voltage output protection. Ocp: over current output protection. Scp: short circuit output protection). Input: 100-240v~1.6a 50-60hz output: 19.5v-4.62a watts: 90 watts. What should be the warranty period for a good dell latitude e7470 charger? We highly recommend you to buy dell latitude e7470 chargerfrom brands that offer prolonged warranty. If something goes wrong and your dell latitude e7470 charger breaks down, you will be able to repair it without spending a single penny. Most companies offer a two-year warranty for their products. Fit laptop model: inspiron e7450 e6430 e7470 e7240 e6420 e6530 e6400 e6440 e7440 e5430 e5450 e4310 e6220 e6320 e6230 n4010 n4110 n5010 n5030 n5040 n5050 n5110; latitude 100l d400 d410 d500 d510 d505 d520 d600 d800 d810 d820 x300. 100% new from manufacturer, overcharger and discharger circuit protection, ce-/fcc-/rohs-certified for safety. Custom service: 24 x 7 email support.12 months warranty and 30 days money back guarantee. Compatible p/n: pa-10 pa-3e pa10 nadp-90kb pa-1900-02d pa-1900-02d2 u7809 c2894 9t215 310-2862 7w104 310-399 09t215 5u092 pa-1900-04 la90ps0-00. Output: 19.5v 4.62a, input voltage: 100-240v 1.5a, connector: 7.4.5.0mm with 3 prong. Features / power specs: fits 99% of all dell laptops / only pwr+ chargers have extra long 12 ft power ac/dc cords / output 19.5v 90w 65w 45w / input 110-240v / made in taiwan / original genuine dell charger laptop ac adapter power cord replacement by pwr+. Warranty: 30 days refund – 24 months exchange. Safety / ul listed: tested, approved and certified by ul. Ul testing is authorized by osha – USA federal agency. Dell inspiron 11 13 14 15 17 15r 17r 1420 1440 1501 1520 1525 1545 1564 1720 1750 3135 3147 3520 3521 3531 3537 3542 3558 5378 5520 5521 5537 5547 5555 5558 5559 5567 5720 5755 5758 5759 6000 6400 7348 7352 7537 7558 7720 e1505 e1705 m5010 m5030 n4010 n4110 n5010 n5030 n5040 n5050 n5110 n7010 n7110; 00285k 332-1833 3rg0t da45nm131 da45nm140 da90pe1-00 fa90pe1-00 ha45nm140 ha65ns5-00 hk45nm140 la45nm131 la45nm140 la65nm130 la65ns2-01 la90pm111 m600 pa-10 pa-12 pa-1900-02d pa-1900-04 pa-3e rwhhr. Compatibility: dell latitude e4200 e4300 e4310 e5400 e5410 e5420 e5430 e5440 e5450 e5470 e5500 e5510 e5520 e5530 e5540 e5550 e5570 e6220 e6230 e6320 e6330 e6400 e6410 e6420 e6430 e6430s e6430u e6440 e6500 e6510 e6520 e6530 e6540 e7240 e7250 e7270 e7440 e7450 e7470 2100 2110 2120 3150 3330 3340 3379 3440 3470 3480 3540 3570 3580 5480 5580 7280 7350 7480 6430u d420 d430 d505 d520 d530 d531 d600 d610 d620 d630 d800 d810 d820 d830; dell inspiron 11-3000 13-5000 13-7000 15-3000 15-5000 15-7000 17. Compatibility: dell inspiron 11 13 14 15 17 15r 17r 11-3000 13-5000 13-7000 14-3000 15-3000 15-5000 15-7000 17-5000 17-7000 3135 3147 3520 3521 3531 3537 3542 3551 3558 3721 5378 5423 5520 5521 5537 5547 5551 5555 5558 5559 5567 5720 5721 5737 5755 5758 5759 7348 7352 7537 7558 7573 7720; dell latitude 3570 3580 5480 5580 e1505 e1705 e4310 e5400 e5430 e5440 e5450 e5500 e5520 e5530 e5540 e5550 e6320 e6330 e6400 e6410 e6420 e6430 e6430s e6440 e6500 e6510 e6520 e6530 e6540 e7240 e7250 e7440 e7450. Warranty: 30 days refund – 24 months exchange. Safety / ul listed: tested, approved and certified by ul. Ul testing is authorized by osha – USA federal agency. Features / power specs: fits 99% of all dell laptops / only pwr+ chargers have extra long 12 ft power ac/dc cords / output 19.5v 90w 65w 45w / input 110-240v / made in taiwan / original genuine dell charger laptop ac adapter power cord replacement by pwr+. Dell chromebook 11; dell inspiron 1150 1420 1440 1501 1520 1521 1525 1545 1564 1720 1750 1764 6000 6400 9300 600m m5010 m5030 n4010 n4110 n5010 n5030 n5040 n5050 n5110 n7010 n7110; dell latitude 2100 3340 3540 7350 d600 d610 d620 d630 d830; dell vostro 1500 1520 3550; dell studio 1555 1558 1737; p/n 00285k 332-1833 3rg0t da45nm131 da45nm140 da90pe1-00 fa90pe1-00 ha45nm140 ha65ns5-00 hk45nm140 la45nm131 la45nm140 la65nm130 la65ns2-01 la90pm111 m600 pa-10 pa-12 pa-1900-02d pa-1900-04 pa-3e rwhhr. Our site is one of the safest place to buy dell latitude e7470 charger. It has detailed descriptions for all available dell latitude e7470 chargerand offers a money back guarantee if you get a wrong or broken item. There are no reasons to worry! Should I get a dell latitude e7470 charger with a lifetime warranty? The recommended warranty period depends on how often you use your dell latitude e7470 charger, how expensive is it, what company made it, and many other factors. Manufacturers sell their most expensive products with a lifetime warranty, while the least expensive dell latitude e7470 chargermight be not guaranteed at all. We think that the best warranty period for a good dell latitude e7470 charger is five years. What is the defining factor when choosing a dell latitude e7470 charger? As you might have guessed, the weight of a dell latitude e7470 charger is one of the main factor to consider. Another important aspects is its material. If the dell latitude e7470 charger is assembled well, it will serve you for many years.
2019-04-24T13:48:09
https://stiveboro.com/best-dell-latitude-e7470-charger
0.999447
Best Pedagogy and Practices When Using "Modules" I teach a 300+ person a semester traditional* microbiology class. I originally designed my course with many interlinked pages, thinking that students would naturally be inquisitive about the information that would be contained within, particularly because the contents of the pages should be helping them derive solutions to the quizzes and written assignments they need to complete. I think I overestimated my ability to create stimulating content, and their inquisitiveness. I'm thinking about "forcing" them to get through the content in a particular order. Is there strong pedagogical evidence that this improves student learning? What's the best practices that you see when working with Modules in your classes to get the highest learning gains? I could see myself creating a "gate," a short quiz or survey, before every new page, but I don't want to grind the students down with too many small assignments. (Right now there are 2-3 small assignments to complete per week.) So, how do you use balance the use of modules to give the students direction, and make sure they are staying on target? *Students register for lecture and lab concurrently, lecture is in a pit, but with many stops for think pair share activities, discussion of homework, and a growing list of activities completed in class. Labs focus on basic microbiology lab skills such as aseptic technique, reading and interpreting results. We use three case studies (fictional but plausible scenarios) to facilitate learning. The culmination of the case studies is written reports and posters. My student population is non-microbiology majors, but many want to go into the health profession, and this course is required for public health majors. I think I overestimated my ability to create stimulating content, and their inquisitiveness. I'm thinking about "forcing" them to get through the content in a particular order. All joking aside, I feel your pain! I remember an online math course designed by James Jones that from the outside looked well designed and perfect. Literally, it was peer reviewed by a group and all we could do was say "Great job!" because it seemed to meet every criteria of a great online course. Yet, the students were not making use of this amazing content (the videos were just beautiful) and in general bombing the coursework. I'd like to say this has a happy ending and we figured out how to fix the problem, but unfortunately James hasn't taught the course again online so we could try out some different things. One thing I do remember is that we thought one of the problems was the layering of content. He had amazing video, but they were layered too deeply in from the Modules - so there was a page that then would take you to another page, etc. Unfortunately many students don't seem to want to take the initiative for their own learning and dig further than the initial layer of information. As to advice for Modules, I'd keep it simple. Minimal to no layering of content (including linking from page to page, they won't bother to click on the link). Something else I do that students seem to like is that I make everything on my Module a "requirement," so they have to click on it, submit something, mark as done, etc - How do I add requirements to a module? From there you can decide if you want students to move in order sequentially in the Module, get everything done in the Module (in any order) before they go to the next Module, or if you want to use the requirements just as a check-list so students can see what they've done/haven't done in a Module (this is actually how I use it in my online and hybrid courses) - How do I add prerequisites to a module? I use the requirements as a check-list, not as a way to make students move/do things in a certain order. Why? Because in all honesty I don't like it when I'm forced to click on something just to get to something else, especially if I'm not ready to learn or focus on whatever it is. To me this just encourages students to click and not really look at something. Yet, when you use requirements as a check list then students can quickly and easily see what they've completed/done in a module and what they still need to do - without being hindered by needing to do this before that. I will say that the content in my Modules are designed so that they go in order so students should start with the first item in the Module and work their way through it, but hey, everyone learns things a bit differently. I'm not sure if I've been any help or not, but I'm going to share this with the Instructional Designers and Higher Education groups to see if they can help! I get to teach that course again this summer as an independent study rather than as an online course, so hopefully we can make adjustments that improve the experience. Adding Requirements to a module to be sure that students read it and move through the content is a great idea! Great post. I have learned through trial and error to use several of those strategies that you detailed, such as using the requirements as a checklist. One thing I've found helpful (and I teach fully online) is make a distinction between the assignment material and the enrichment material. I know that some students are just going to do the assignment, and even just the bare minimum of the assignments, so I try to make that path easy and clear for them to follow. At the same time, I don't want to forget about the enrichment opportunities that are also part of the class; I teach Gen. Ed. Humanities so in addition to whatever specific objectives I have for the course, I really DO want to introduce all the students to a whole world of stories and art and music online. And some students actually do click and explore and learn. So, the way I do that is to have a very rich announcements page which I run as a blog. The key information about getting-the-work-done is up at the top, but I provide enrichment stuff through the rest of the announcements every day, and the students can do extra credit assignments related to the enrichment stuff. It works really well! Some students who are just here to do the minimum can do the minimum and move right along... but students who have the time and inclination to explore and learn more can always find something new at the announcements, along with extra credit assignments each week to build on that. And I enjoy seeing which items attract their attention (based on the blog posts they write for extra credit); seeing what they like helps me create better announcements in the future. John Buchner, what are students telling you about their preferences? I didn't ask about the student presences, and I don't know how many other faculty are using modules around here, so I can't gauge student familiarity. (I think the faculty are making more use of the tools, and not just opening "Files" to the students as much any more.) I can see the output by the students, and I'd assess it as pretty low level, functional and basic, submissions. I was hoping that making the students move through the material in a certain order, or some flexible order, would get the a little more of the goals of the class to to stick a little better. Clearly, if I implement this, I'll start small. I've got some quantitiave skills assignments that might work really well for mastery paths, but haven't implemented them yet. Y'all have some really good tips, I appreciate where this discussion has gone so far, I look forward to getting more. John Buchner I'm not sure if that kind of standardization is really motivating; it's definitely not my style as a teacher. If the problem is confusion, yes, standardizing, simplifying, etc. can help. But if the real problem is lack of motivation and engagement, then simplification and standardization can even make things worse, i.e. more boring. My solution is to have the students blog; each student has their own blog, and the motivation both to create their own blog and then to design it in their own way, accumulate work in their own space, reflect on their progress, is all very high in ways that just do not happen inside the LMS. I teach a high school Human Anatomy and Physiology class and have experienced many of the problems you have described. I was using an online open source textbook from Openstax. I was linking to the pages. Students would not click the links. I copied the pages as Canvas pages and used the module requirements to set as "must view." Most students were still not viewing them. I eventually created graded "study guides" that would encourage the students to do the reading. I replaced live lecture with prerecorded lecture. They still watch it in class, but in college I would be more inclined to have them complete it at home.
2019-04-26T06:45:45
https://community.canvaslms.com/thread/16471-best-pedagogy-and-practices-when-using-modules
0.999934
What can a teacher learn from transcribing interviews? It’s that time of year again. I’m back in the office, working on #amoresproject. This post is only tangentially related to the project so this is not going to be an update – if you’re new to my blog or missed my earlier posts on the topic, you might want to have a look here and here. I have previously said – well, I can’t remember if I’ve said it in that many words on the blog, but certainly plenty of times in other contexts – that it’s been really interesting working on the project in a non-teaching role. I enjoy teaching, but it’s generally familiar ground. It was great to have the opportunity to work in a different environment and deal with tasks a teacher does not normally do in the course of a day. Not just because it was novel, but also because I now feel more confident that I would still be employable if, at some point, teaching, for whatever reason, was no longer an option. For instance, something I recently did was transcribe interviews. I don’t know that this particular skill will contribute significantly to my employability; however, I was surprised to discover that there are agencies out there that offer this as a billable service. At roughly $1-4 per audio minute, depending on how quickly you need the finished product and the level of accuracy you’re happy with. These were interviews with teachers on the project – we needed to find out how they felt about a number of aspects of the pilot now that it’s over. The first one was with the Croatian teachers: we thought it would make more sense to interview them in Croatian, as they’re not teachers of English, and thus might find it easier to express themselves and feel more comfortable in their mother tongue, particularly as the interview was recorded. The plan was that my boss would do the interview and share the audio files with me, and I would translate them so that they could be used in the pilot evaluation. As this was a first for me – translating audio (into writing) – I’m not even sure this qualifies as transcription. I tweeted this as I was working so if you know a more accurate term, please let me know in the comments. So if I'm transcribing an audio file into a target language is that still transcribing? The recording was about 35 minutes long and seemed easy enough to follow content-wise, so I translated directly; I listened to the original in Croatian and typed out the English translation. The second interview was with the UK teachers and that, obviously, was transcribing. The audio was roughly the same length, maybe 5 minutes longer, and I should point out that another researcher met with the teachers in person, so I wasn’t present at that interview either. I was fascinated by the differences between the two resulting texts. Despite the similar length, the Croatian document was just 7 pages long compared to the UK one at 15. I thought I would describe some of my observations about working on both interviews, and recommend a pretty useful tool at the end. The first thing I noted was the length of turn-taking: the interviewer asked a question and one of the teachers would answer in some detail, speaking generally for around a minute. Okay, perhaps this didn’t stand out quite so much until I transcribed the UK interview, about which more below. Just to illustrate what I mean though, the Croatian interviewer had 24 turns, while the UK one had 85! What did stand out from the start was that none of the interlocutors spoke across each other. I remember thinking that they were almost too polite in terms of waiting for the other speakers to complete their sentences, at least compared with a typical (not overly formal) conversation. I suppose this could have been out of consideration for the translator, but it’s a little difficult to keep up as the conversation goes on just for that reason, I think. There’s this thing you’re taught as a first grader in Croatia – answer in full sentences. “What do you think was the most important part of the book?” “The most important part of the book was…” – takes me back to elementary school. 🙂 I got the impression it was sometimes used in the interview to buy the interlocutor some time and allow them to organize their thoughts. Because I was translating and wanted to convey the message in the source language as accurately as possible, I wasn’t sure initially if I should ignore fillers like “um”. There were, however, relatively few ums, and as they didn’t add anything to the meaning I eventually decided against including them in the translation. Other words/phrases that did seem to serve the purpose of fillers were “also”, “in a way” and “certain” (as in “certain level”, “certain content”) – i.e. their Croatian equivalents, and I included those in the text. It was easy to follow the speakers; they enunciated clearly and apart from one short segment that was inaudible because it hadn’t recorded properly I was able to hear and understand everything that was said in the interview. The audio was broken up into 20 short files and thus easy to manipulate. The length of turn-taking was noticeably shorter. The interlocutors rarely spoke for a minute; there were some longer turns, but generally this was much more like a real conversation with people cutting across each other and speaking at the same time – even though the interviewer said they should try and avoid that at the very beginning. The UK teachers had 76 and 84 turns, while the Croatian ones had 19 and 20. I noticed the fillers a lot more. Maybe I should have been more selective about including them in the text because, again, not all added significantly to the meaning, but since I was transcribing and didn’t have to process the content as much as when I was translating, I found it easier to just type what I heard. Those that seem to have been used frequently are “um”, “okay”, “yeah”, “you know” and “obviously”. The interlocutors spoke in short bursts, compared to the first interview. By this I mean that they tended to utter a segment and then pause, which meant ellipsis featured quite heavily in the text. The teachers occasionally asked each other questions, unlike in the first interview where only a couple of references to what their colleague had said a little while previously indicated that the two teachers had actually been interviewed together. It was at times quite difficult to follow the speakers. A spot of googling revealed that when transcribing you will either not hear fragments (or longer utterances), which you should indicate in the text as “inaudible” or you won’t be able to make out exactly what you’ve heard, which you should indicate as “unintelligible”. It’s apparently also good practice to note down approximately how many words you missed out. There were several times when I very reluctantly put down [unintelligible 2-3 words] because either the speakers trailed off or ran their words together to the extent I couldn’t decipher what they were saying even when I slowed the recording down. I say very reluctantly not because I think those fragments added something significant to the meaning, but because of this nagging feeling – hard to shake off – that someone will say it was unintelligible to me because I’m not a native speaker. Although rationally, of course, people obviously have better things to do with their time. One final thing – the useful tool I mentioned. I was about 10 minutes into the UK transcription – that would be 10 minutes of audio and 2 hours of typing – when I came across this page, containing tips on transcribing interviews. Some helpful soul had shared it on Twitter. I was suddenly dizzy with the discovery of machine transcription! OMG! I could sit back and let YouTube do the work for me. To cut a long story short – and uploading a 40-minute audio file to YouTube as a video takes a surprisingly long time – YouTube could not even attempt a transcription of the interview. Possible reasons are that the sound is too low, speech too indistinct, or the recording is simply too long. I tried out this service as well; I’m not sure if it’s available to everyone, but it was free of charge once I registered. I received the transcription in a few hours, but it was unfortunately inaccurate to the point of being pretty much useless. Finally, I signed up for a free trial of Transcribe, and was absolutely thrilled with the results. After my unsuccessful forays into machine transcription territory their claim that “automatic audio to text conversion is largely science fiction” sounded like they might really know what they were talking about. Anyway, I can’t recommend it highly enough. You upload the audio, so, obviously, it works with any language, and being able to manipulate the audio and type on the same page is already a huge time-saver. In addition, you can slow down or speed up the recording, activate a loop which basically allows you to keep typing instead of wasting time replaying the audio manually, move back and forth in tiny increments… I love it! Have you ever had to transcribe audio? Was it in one or more languages and did you notice any differences? Any tips for effective transcribing?
2019-04-26T09:36:57
https://afteroctopus.wordpress.com/tag/amores/
0.997599
If you use the grill, you should preheat your outdoor grill over high heat. Add some oil to the aluminum foil. If you are going to bake the dish, you should preheat it to 375°F (190°C). You need to add a little bit of oil to a baking sheet. Prepare a medium bowl and add in black beans (16 oz.). Mash them with a fork until you get a thick paste. Prepare a food processor and add in the following ingredients: bell pepper pieces, onion wedges, and garlic. Chop them finely and then add into the mashed beans. Prepare a small bowl and stir the following ingredients together: egg (1 piece), chili powder (1 tbsp.), cumin (1 tbsp.), and Thai chili sauce (1 tsp.). Add the mixture to the mashed beans. Mix the ingredients and then add in breadcrumbs (1/2 cup). Mix until you get a sticky Divide it into 4 patties. If you use the grill, place the patties on the foil, and grill for around 8 min. per side. If baking, place the patties on the prepared baking sheet and bake in the preheated oven for around 10 min. per side.
2019-04-24T06:30:37
https://foodrecipespage.com/recipe/veggie-burgers/
0.997688
I discovered a paper recently whose title is probably more interesting than its content: Unstable Memories Create a High-Level Representation that Enables Learning Transfer. Quite a thought—that the instability of memory could be advantageous for transfer. Researchers conducted two experiments, asking participants in the first experiment to learn a word list and then a motor task and in the second experiment a motor task and then a word list. There were three conditions within each experiment: (1) the word recall and motor task had the same structure (see the supplemental material for how ‘same structure’ was operationalized here), (2) the two tasks had different structures, and (3) the tasks had no determined structure. In the first experiment, participants first learned the word list and then their skill at the motor task was measured over three practice blocks. When the word list and motor task were of the same structure, participants did significantly better across the three motor-task practice blocks. Similarly, in the second experiment, after the motor skill was learned, participants who then practiced the word list with a similar structure to the motor task improved significantly more than participants in the other conditions. This improvement on an unrelated though similarly structured task was measured as transfer, and it occurred in both directions. Somewhat surprisingly, however, this transfer of learning between word and motor tasks (or motor and word tasks) was correlated with a stronger decrease in performance on the original task, when participants were tested 12 hours later. That is, subjects who learned the word list and then successfully transferred that learning to the motor task (because the tasks were of similar structure) showed a sharper decline in their word list recall than subjects in other conditions. The same results appeared in the experiment where subjects first learned the motor task and then the word list. By being unstable, a newly acquired memory is susceptible to interference, which can impair its subsequent retention. What function this instability might serve has remained poorly understood. Here we show that (1) a memory must be unstable for learning to transfer to another memory task and (2) the information transferred is of the high-level or abstract properties of a memory task. We find that transfer from a memory task is correlated with its instability and that transfer is prevented when a memory is stabilized. Thus, an unstable memory is in privileged state: only when unstable can a memory communicate with and transfer knowledge to affect the acquisition of a subsequent memory. This is intriguing. In some sense, this reinforces results related to the spacing effect. Spacing causes forgetting which causes “unstable memories.” When learning is revisited after a period of forgetting, it finds this unstable memory in a “privileged state”: a state which allows it to strengthen the connections of the original learning. But the above also suggests that extending learning for transfer to other situations or to other concepts may be done optimally in concert with spaced practice. In other words, the best time for transfer teaching might be after a space allowing for forgetting.
2019-04-26T07:02:53
https://guzintamath.com/textsavvy/2017/10/10/transfer-and-forgetting/
0.999999
TL;DR: There were some rookie mistakes lurking in some python code which I hunted down with profiling (using cProfile), reducing execution time by an order of magnitude. This post is a little story about some profiling I did on python code which ultimately revealed that a poor choice of datastructures had a significant impact on code performance. The problem was in some python code which I use to look at trends in physics topics posted to arxiv.org (more on the output of the tool in another post). After pulling the data from arxiv, the script works out word frequency and identifies increased occurences. The parsing of the corpus was taking an excessively long time, my laptop fan would start whirling, and the system would slow to a crawl. Clearly, something very non-optimal was happening. My first thought was that the issue was in a part of the code that handles the histograming of the occurences, but nothing obvious jumped out at me when I reviewed the code. Enter the python profilers. These things are gret, they’re dead simple to run, and the results are relatively easy to parse. Of the three profilers the python documentation recommends, cProfile is my favorite. The output pointed me in a direction I had not expected: the operation that removes common english words (‘is’, ‘the’, etc…) from the corpus. The blacklisted words were stored in a list, against which each word is checked to see if it should be discarded. A list! In case you’re not as ashamed of me as I am, let me impress upon you that this is a really dumb decision (at least I sorted the list). The reason this is such a poor choice is that sets, unlike lists, hash their values. http://wiki.python.org/moin/TimeComplexity gives a nice summary of the Big O running time of various operations on python datastructures. A search on a hash is performed in O(1) time (on average). A search on a list goes like O(n). Given the size of the blacklist and how often the code must call the function, this becomes a serious drag on performance. Here you see that we spend 450 seconds in “wordHistory”, of which 92% is in the 2233570 calls to the function that checks word membership in the blacklist. The blacklist could be moved to the step where the data is pulled from the arxiv. It would then sit in the shadow of the much slower network I/O operation. This sweeps the problem under the rug, and the data is lost before storage. Multi-threading! The for loop which checks for word membership could be substantially sped up by splitting the loop into multiple threads or processes. Not a project for today, but something to keep in mind. You’ll have noticed that the other time hog is the “cleanText” function. This grooms the text to simplify the word frequency analysis: making everything lower case, making all words singular, removing html tags, and combining certain-words like “cross” and “section”. Now that the blacklist has been optimized, this step actually takes the longest. More silliness was afoot. The text grooming uses regular expressions. Like a good little boy, I was compiling my regular expressions to speed them up. Like a dumb little boy, I was compiling each one of them once per function call (i.e. once per article). Now, the code stores the compiled regular expressions in a global list. They get generated once (when the datastructure is empty) and then re-used for every function call. This is another silly mistake that grows linearly with the size of the corpus, and fixing it makes a big difference. This entry was posted in Python by Emanuel Strauss. Bookmark the permalink. You have some genuinely beneficial information composed here. Good job and keep posting good stuff.
2019-04-24T06:17:08
http://www.moderncentral.com/blog/?p=86
0.995023
Microsoft's Business Division oversees one of its most successful products, the Office productivity suite, as well as the company's lucrative server and enterprise software businesses. However, like the rest of the company, the division has not been immune to the pressure of the recession, and revenue fell 13 per cent in the quarter ending in June. Business Division President Stephen Elop, however, said in an interview with the IDG News Service that he's confident the unit can overcome the pressures that face the business. These include not only the economy but also competition in the productivity and collaboration software market from Web-based applications from Google and others. To answer this challenge, Microsoft is set to offer Web-based versions of its Word, Excel, PowerPoint and OneNote software as part of the Office 2010 launch early next year. Those applications are part of Microsoft's general transition to "software plus services" with its Business Productivity Online Suite -- which includes Exchange Online, SharePoint Online, Office Live Meeting and Office Communications Online -- a product and transition Elop's division also oversees. In an interview with IDG News Service Senior Writer Elizabeth Montalbano, Elop said he's confident Office 2010 has enough new features, including integration with Microsoft's Web-based applications, to convince businesses and consumers to stick with Microsoft for their productivity and collaboration needs. He also noted bright spots in the division's portfolio -- its SharePoint and CRM (customer relationship management) products -- and discussed how Microsoft itself, not Google, remains the company's biggest competitor in the productivity market. Below is an edited version of the conversation. IDGNS: What trends did you see with Business Division customers during the recession? Elop: To understand it best you have to break the division down a little bit in terms of the customers we serve. Sixty percent of our revenue is derived from medium and large enterprises, who tend to make longer-term strategic decisions about the technology they're going to buy. About 20 percent of our business are smaller businesses, small and lower mid-sized businesses who tend to buy new PCs when they hire a new employee or they make do on an upgrade cycle. And our third category of customers are consumers, so people buying for home use or perhaps they're running a small business out of their home. If you look at each of those three categories, very different things were going on. Consumers generally were buying far fewer traditional PCs. They're buying fewer PCs, they're buying fewer copies of Windows, fewer copies of Office. ...That led to a decline in revenue in the consumer segment. Small-to-medium businesses -- a very similar situation where the number of PCs that are being purchased by small businesses dropped quite a lot, translating into a decline in our revenue in that segment that was north of 30 percent, which is a significant decline. ...There's fewer small businesses starting up, so there's fewer companies saying, "Hey, I need three PCs or five PCs to get my business going." Now the enterprise segment year over year was a very different story. It was modest growth. It wasn't exciting growth -- it was modest growth. Really what's going on there is customers continue to make decisions about the long term about what they want to invest in, combined with the fact that we have a number of products in the enterprise that even with tough economic times are growing very aggressively. So SharePoint for collaboration, document management and other workloads like that -- the SharePoint product is north of a billion dollars and it's growing at double-digit rates during the worst economic calamity we've ever seen. IDGNS: Why do you think that's true? Elop: A key reason for that is it helps businesses even if they're contracting to figure out how to save money, how to get people communicating and collaborating more effectively. Another example is around unified communications -- things like e-mail and instant messaging, voice, video conferencing. In tough economic times when a company says "look, we've got to reduce our travel expenses," what do people do? Well I still have to talk to them, I still have to get around to the team around the world. How do I do that? They turn to our product. Well our OCS product, our Office Communications Server product -- double-digit growth year on year during the worst economic circumstances we've all faced. Dynamics CRM -- customer relationship management. We may be contracting as an industry in a particular business, but you say, "I have to get closer to my customer, I have to manage every lead for a sales opportunity tighter than I did before." So it's growing very substantially as well.
2019-04-22T11:57:59
https://www.goodgearguide.com.au/article/319727/why_microsoft_elop_isn_t_afraid_google/?utm_medium=rss&utm_source=authorfeed
0.999879
For those workers to Oregon, California, and Utah who were going their apes to the Platte River pdf Maple Leaf in Kanesville and Mormon borders was rapid ' Completing off weeks ' and firewood changes. In 1847 the rangers became three routes across the Missouri River and ages declined often more newborns for the period beginning on the way. In the 1850 squash outdoors were because 8,000 Also famines appointed in the lonely Pottawattamie County, Iowa District 21. By 1854 most of the effective resources, bits and Papers was Only taught over by men as they camped them or went them for so non-profit and insisted their past to Utah. It were the United States what it away were, a ' present-day ' pdf Maple Leaf in Space. Canada\'s Astronauts and a sixteenth gift on the West Coast in Puget Sound. While there stayed almost no United States details in the written fur of Washington in 1846, the United States developed rather used it could become systems of Honduras to educate to the Oregon Territory, and it would hire not a calendric pp. before they would in take the cultural hundred HBC sensors and cultures according in Washington. ferries from accidents in 1806 by Lieutenant Zebulon Pike and in 1819 by Major Stephen Long continued the Great Plains as ' few for nuanced cholera ' and as ' The Great American Desert '. These snakebites thought not left on the dynamic coast of question and intimacy area. pdf Maple in the Provinces of the real instrument. 1997 organizing even: site in the Middle of Political Conflict in Yautepec, Mexico. SAA Bulletin 15(4), September 1997, authority 12-14( Society for American Archaeology). insure my treat family for a whole person. 93; The pdf Maple Leaf opened caused by Elijah White. The destination provided up after participating Fort Hall with most of the laminate rooms starting as and the Badges regarding later. A farewell given to a part for the last theory of the degree. Army Captain and death travel who was arranged to be the complexity to Fort Hall for status per Maximum. Later pins decided the Platte and South Platte Rivers into their descents away( bad of which meant the pdf Maple of Colorado). After dating the South Platte River the Oregon Trail is the North Platte River out of Nebraska into Wyoming. Fort Laramie, at the right of the Laramie and North Platte counterparts, turned a same day object. 93; It was the monumental man length till comments spread the literature. CARTA DE PRESENTACIÓN Why need I 'm to undermine a CAPTCHA? being the CAPTCHA does you are a outside and 's you ancient plain to the system treat. What can I use to play this in the ethnologist? If you stay on a Indian percent, like at reference, you can drive an town underworld on your logic to delete southern it is never awarded with empirebuilding. The pdf Maple instantly died to the Malheur River and upstream lionhearted Farewell Bend on the Snake River, up the Burnt River raft and Late to the Grande Ronde Valley near historical La Grande before using to the Blue Mountains. In 1843 exceptions lost a office home over these Travelers leading them free for the southern month to trails. The everybody was to the Whitman Mission near Fort Nez Perces in Washington until 1847 when the Whitmans gave seen by Native Americans. At Fort Nez Perce some dug centuries or justified communities and used down the Columbia; women was kinda in their ways until they knew The Dalles. pdf Maple Leaf in Space.: worth set Atlantic territories need the firefox to example very -where, Great free ones must west have the myth to web. area: The east-coast to Founding 's eventually mere upon the route to drive time. words who are human account have the line to AD. We would defend that they subscribe the Period to anyone. commoners who have a retirees are warm for them. Reply01(Maximum 900 paper you play a rest because you bypassed easily reduce them morally? towns are near centuries because north they n't was overhead encourage them. 6 pdf Maple Leaf in Space. of adopting a driver, often independent site. Reply00(Maximum 900 context other has a abortion If right learned enabling against the late Archived finally why cant cities dry against what sailing emerged related. I a path was offered to accept you because child marveled tabulated usually, carefully why find you travel against that. If independence maintained operating against the centers of exclusive, not 2003a cross perfectly become explorers. PORTAFOLIO human similar books lose Asking scholars, Chronological pdf Maple Leaf in Space. and Abortion. popular Member Benefits beans stress northern journeys for their mild coffee gone beyond the nationality of an 2(3):147-160 development so! Many discoveries are wagons and canyons from abandoned and cleared people, fords, animals and more. ban about the prehistoric code completed as the Oregon Trail. 179-189, Springer, New York. La Ciudad Antigua: Espacios, Conjuntos e Integracion Irish en la Civilizacion Maya, Download 95-122, Sociedad Espanola de Estudois Mayas, Madrid. Maya E rights: Mormons, Astronomy, and Urbanism in the Early Lowlands, person 3-30, University of Florida Press, Gainesville. The Archaeology of the Belize Valley: Half a soap Later, water 1-14, University Press of Florida, Gainesville. different ports, now pdf Maple Leaf in and today Rights establishing sociology and order lowlands, elected activities in the Willamette Valley, still here as other possessions in the unborn months of Washington, Oregon, and Idaho. On May 1, 1839, a return of eighteen rights from Peoria, Illinois, was out with the trail of stealing the Oregon conflict on extension of the United States of America and give out the HBC entering not. The months of the Peoria Party improved among the western buildings to do most of the Oregon Trail. The inhabitants worked So constructed by Thomas J. Farnham and made themselves the Oregon Dragoons. The coasts dried almost See to the Pacific Coast in the large men; all the large read on the pdf Maple Leaf in Space.. And rather it gave that we emerged as However only a house of dates, but of halters. The Oregon Trail an American Saga. be, Blister, and fault: A trail of Medicine on the American Frontier. not other to get this pdf Maple Leaf in Space. Canada\'s Astronauts n't. once do i could have my runtime like I transferred to. The Archaeologists is that it will go up present-day country and I'll stop to murder the language and build up taking all over. rich fun, intertwined server with vantage. be Our ' Wagon Train ' ebook Теория и методы исследования нестационарных линейных систем! Our giproyectos.com.mx at Surviving The Oregon Trail shows to fetch modern wagons to do emulator pp. floursugarbaconcoffeesaltrifles, civilizations and persons in the methods of suit, automation, limestone, malware, sailing, disease, Living, star list, way warfare and guide, trade, northern biodiversity and CPR, and rectangular but home so least website! We are only Sometimes to promote but north to Love a GIPROYECTOS.COM.MX of states and pp. to be take and experience one another! We contend you will use a book Joseph of our living fertilization and begin the plants you have with us and our persons! We'd Do to do you aboard our DAISY! enthnographic for Our ! 2018 Surviving the Oregon Trail. What explains the giproyectos.com.mx/wp-includes/images/wlw between the California Trail and the Oregon Trail? How Several quantities n't does the California Trail? How very was the pdf Hitler and the Nazi Darwinian Worldview: How the Nazi Eugenic Crusade for a Superior Race Caused the Greatest Holocaust in World History be? How steep warriors would a whole full survey disease population per interest? Why do they been accounts? What attributes was features thank on the California Trail? Where were they join in California? pdf Maple Leaf in Space. cultures of Usenet Imperfects! brigade: EBOOKEE stars a settlement significance of Civilizations on the Travel( small Mediafire Rapidshare) and is soon use or traverse any meters on its anyone. Please bring the customary forts to be emigrants if any and role us, we'll suggest human codices or days soon. At branch( corner), a riveting, specific, raising rich spirit has ceremonial.
2019-04-24T11:55:54
http://giproyectos.com.mx/wp-includes/images/wlw/freebooks.php?q=pdf-Maple-Leaf-in-Space.-Canada%27s-Astronauts.html
0.999977
In order to understand when ROR bail is appropriate, you need to understand the underlying purpose of bail. The purpose of bail is to assure that a defendant will appear in court. If a person is either deemed to be a significant flight risk or a danger to the community, or even a danger to himself, then the judge will set some form of cash bail. If the defendant cannot post the cash bail either through friends and family or with the assistance of a bail bondsman, then he will be brought from the county jail to each court proceeding. If he is incarcerated, then there is no way he will miss court. If a defendant is able to post cash bail, but fails to appear in court, then he loses all the bail money he or his supporters posted for him. Thus, he has a financial incentive to appear in court. People who are granted ROR bail do not pose a threat to the community or to themselves, and they can be trusted to appear in court. This is because they will usually be in a much worse situation should they fail to appear. For example, a high percentage of people granted ROR bail are eligible for a first time offenders program known as ARD, which stands for "Accelerated Rehabilitative Disposition." Successful completion of the ARD program will result in dismissal of the charges, and will allow the defendant's attorney to seek expungement of the charges. Other defendants with ROR bail may not be eligible for ARD, but they have a good chance of receiving a sentence of probation. Defendants otherwise eligible for ARD or probation who fail to appear in court could ruin the possibility of a positive resolution to their cases. Therefore, they can be trusted to appear in court without some form of collateral in place.
2019-04-20T00:28:44
https://www.mattmlaw.com/blog/2013/06/what-is-ror-bail.shtml
0.999997
The latter question is kind of jumping the gun. Because success, will mean different things to different people, and that's why it's imperative that we ask ourselves these 3 questions! 1. What's the Purpose of your Blog? This is a pretty loaded question and if we're able to ace it, then it will give an incredible sense of direction! The managing partner of the law firm where I work has an internal blog (and vlog!) where he sends legal updates to the entire 800+ team, such that the team is kept abreast of happenings. I don't think in that regard his direct purpose is to make money. A friend of mine claims the purpose of her family vlog is to simply keep her family (scattered all around the world) posted of what's going on in her life. In such a case, she'd probably vlog only when she has some interesting updates for them, and she couldn't care less about the latest social media hacks for promoting blog posts and growing a Pinterest audience. Recently a travel blogger tweeted about a blog milestone. She was clearly excited but also clarified that the main goal would be achieved when all her followers are able to pursue their travel aspirations! Can we infer that that's the main purpose of her blog? I think so! So think deeply, and perhaps write it down: what do you aim to do: just share your everyday life (what's the USP here for people to read it?) inspire people to cook, to be fashionable? Share knowledge? Build a community? All of the above? Streamlining your purpose will be helpful to many other questions such as your blog niche, manner of writing, quality of images to use etc. 2. What's the Vision for your Blog? I read something recently that clearly stated that not all of us will be huge incredibly popular banana-island-house buying or one-million-YouTube subscribers kind of bloggers. And that's okay. I mean if you've answered number 1 above, then your purpose perhaps doesn't need a million subscribers. But since we never really know whether or whether not we would become the next big thing, how about we dare to dream? And so the question is "what vision do YOU have for your blog"? If you were given a clean slate and some paper what would you draw? All things being possible, what would you like your blog to achieve? How much money would you like your blog to bring to you? What parts of the world would you like your blog to be read?! And by what kind of people? This is such a heavy laden question! But very important, as it'll define a whole lot in regards to how we approach our blogs! If your vision is for your blogs to only be read by family - then it's okay to shrug your shoulders and use vernacular language that only a few people can understand. But if you're thinking bigger, then you'd find yourself ultimately dropping some things! I've stumbled on a blog post with over 2000 comments - all reasonable lengthy intelligent comments! It challenged me to think big and today when I think of KacheeTee.com, my one out of many visions is for a community of millions people learning and laughing in this thing called life! I imagine they'd be KacheeTee.com meetups in several parts of the world. It may happen, it may not (at least a Nigeria & UK meet up would happen hopefully!) but you get the drift? So think up your grand vision (it's free to dream!), and you'd be pumped up to put your foot forward on your blog gas pedal and keep moving! 3. How much Time & Money do you have? Let's cut straight to it. If anyone told you blogging wouldn't require time or money, they lied - and it's okay because they may have thought it wouldn't! Because now that we've set aside our purpose and vision, implementing it will need time + money! Even at the most basic level we'd need time to write the post, and perhaps money for a domain. I'm writing this at 11.36pm and was so tempted to postpone publishing to another day (ended up publishing at 1:15am!). But you have to put in the work! So if we've got that grand vision, but no time to devote, it'll be a hard one to pull off. Money is secondary, but the larger your vision, the more investments you'd have to make - for functional websites, design, graphics & editing, distribution and promotion tools, marketing campaigns... the list is endless! So yes, I think these 3 questions, particularly 1&2 are incredibly important. Ultimately through, remember that the aim should be impact, value and growth. Not numbers, not perfection. Purpose and vision may change as well. Like my friend blogger. I suspect she's realised that people actually enjoy her blogs, so i think she's looking to reach a wider audience! What are your thoughts? What's the purpose of your blog? And imagine you were given a blank cheque, what vision would you draw out? Let us know. And now that I think about it, this clearly applies to a lot more things than blogging! pS: Love to blog better? 24 blog quotes to inspire all areas of your blog, and if you're slightly curious, here's a recap of 2016 for me in blogging! Can't believe this blog is almost a year! I'm thinking of a giveaway with some brands, so let me know if there's any brand you think will like to partner and what sort of stuff you'd like to have on the giveaway! Nine Months In, another Blog Award and a 100k views!
2019-04-25T06:12:17
https://www.kacheetee.com/blog/2017/1/24/3-important-questions-to-ask-yourself-as-a-blogger
0.999996
An air conditioning salesperson receives a base salary of $2850 per month plus a commission. The commission is 2% of the sales up to and including $25,000 for the month and 5% of the sales over $25,000 for the month. a. Write a piecewise function that relates the salesperson total monthly income based off or his/her sales for the month. b. Determine the salesperson's monthly income if his/her sales were $43,000 for the month. A salesperson set a goal to earn $2,500 in August. She receives a base salary of $1,000 per month as well as a 20% commission for all sales in that month. How many dollars of merchandise will she have to sell to meet her goal? A pharmaceutical salesperson receives a monthly salary of $2500 plus a commission of 7 percent of sales. Write a linear equation for the salesperson monthly wage in terms of monthly sales. A pharmaceutical salesperson receives a monthly salary of $3700 plus a commission of 6% of sales. Write a linear equation for the salesperson's monthly wage W in terms of monthly sales S. A lot 80 feet wide and 200 feet deep is sold at $500 per front foot. Commission is 10% of sales price, and the selling salesperson receives 60% of the commission. What does the salesperson receive?
2019-04-26T15:02:31
https://www.jiskha.com/questions/1008821/An-air-conditioning-salesperson-receives-a-base-salary-of-2850-per-month-plus-a
0.999472
One mechanism for defeating the vertebrate immune system is to attack the immune mechanism itself. Many helper T cells and inducer T cells are CD4+ T cells. Therefore, any pathogen that inactivates CD4+ T cells leaves the immune system unable to mount a response to any foreign antigen. Acquired immune deficiency syndrome (AIDS) is a deadly disease for just this reason. The AIDS retrovirus, called human immunodeficiency virus (HIV), mounts a direct attack on CD4+ T cells because it recognizes the CD4 coreceptors associated with these cells. HIV’s attack on CD4+ T cells cripples the immune system in at least three ways. First, HIV-infected cells die only after releasing replicated viruses that infect other CD4+ T cells, until the entire population of CD4+ T cells is destroyed (figure 1). In a normal individual, CD4+ T cells make up 60 to 80% of circulating T cells; in AIDS patients, CD4+ T cells often become too rare to detect (figure 2). Second, HIV causes infected CD4+ T cells to secrete a soluble suppressing factor that blocks other T cells from responding to the HIV antigen. Finally, HIV may block transcription of MHC genes, hindering the recognition and destruction of infected CD4+ T cells and thus protecting those cells from any remaining vestiges of the immune system. HIV, the virus that causes AIDS. Viruses released from infected CD4+ T cells soon spread to neighboring CD4+ T cells, infecting them in turn. The individual viruses, colored red in this scanning electron micrograph, are extremely small; over 200 million would fit on the period at the end of this sentence. Survival of T cells in culture after exposure to HIV. The virus has little effect on the number of CD8+ T cells, but it causes the number of CD4+ T cells to decline dramatically. inquiry question Are the surviving CD4+ T cells any different than those destroyed? How could you be sure? The combined effect of these responses to HIV infection is to wipe out the human immune defense. With no defense against infection, any of a variety of otherwise commonplace infections proves fatal. With no ability to recognize and destroy cancer cells when they arise, death by cancer becomes far more likely. Indeed, AIDS was first recognized as a disease because of a cluster of cases of an unusually rare form of cancer. More AIDS victims die of cancer than from any other cause.
2019-04-24T08:24:28
http://biologywriter.com/backgrounder/aids/
0.998543
Matthew Calbraith Perry (1794-1858), American naval officer, was born in South Kingston, Rhode Island, on the 10th of April 1794. He became a midshipman in 1809, and served successively in the schooner "Revenge" (then commanded by his brother, Oliver H. Perry) and the frigate"President. In 1813 he became a lieutenant, and during the War of 1812 served in the frigate "United States" (which, when abandoned by Perry, was blockaded in the harbor of New London, Connecticut), the "President" and the "Chippewa." Soon after the war Perry was assigned to the Brooklyn (New York) navy yard, where he served till 1819. He became a commander in 1826, and during 1826-1830 was in the recruiting service at Boston, where he took a leading part in organizing the first naval apprentice system of the United States navy. He was promoted in 18 37 to the rank of captain (then the highest actual rank in the United States navy), and in 1838-1840 commanded the "Fulton II.," the first American steam war vessel. He also planned the "Missouri" and the "Mississippi," the first steam frigates of the United States navy, and was in command of the Brooklyn navy yard from June 1841 until March 1843, when he assumed command of a squadron sent to the African coast by the United States, under the Webster-Ashburton treaty, to aid in suppressing the slave trade. This command of a squadron entitled him to the honorary rank of commodore. On the 23rd of October 1846, during the Mexican War, Perry, in command of the steam vessels "Vixen" and "McLane," and four schooners, attacked and captured Frontera, at the mouth of the Tobasco river, then pushed on up the river and (on the 24th) captured the town of Tobasco, thereby cutting off Mexico from Yucatan. He relieved Commodore David Conner at Vera Cruz on the 21st of March 1847, and after a two days' bombardment by a battery landed from the ships the city wall was breached sufficiently to admit the entrance of troops. Commodore Perry's distinctive achievement, however, was his negotiation in 1854 of the treaty between the United States and Japan, which opened Japan to the influences of western civilization. Perry sailed from Norfolk, Virginia, on the 24th of November 1852, in the"Mississippi."He reached Hong-Kong on the 7th of April and on the 8th of July dropped anchor off the city of Uraga, on the western shore of the Bay of Yedo with the "Susquehanna," his flagship, the "Mississippi," and the sloops-of-war "Saratoga" and "Plymouth." On the 14th of July, accompanied by his officers and escorted by a body of armed marines and sailors (in all about 300 men), he went ashore and presented to commissioners especially appointed by the shogun to receive them, President Fillmore's letters to the emperor, and his own credentials. A few days later the American fleet sailed for Hong-Kong with the understanding that Perry would return in the following spring to receive the emperor's reply. On the 11th of February, accordingly, he reappeared in the Bay of Yedo with his fleet-this time composed of the"Susquehanna," "Powhatan" and "Mississippi," and the sailing vessels "Vandalia," "Lexington" and "Southampton," and despite the protests of the Japanese selected an anchorage about 12 m. farther up the bay, nearly opposite the present site of Yokohama, and within about 10 m. of Yedo (Tokyo). Here, on the 31st of March 1854, was concluded the first treaty (ratified at Simoda, on the 21st of February 1855, and proclaimed on the 22nd of June following) between the United States and Japan. The more important articles of this treaty provided that the port of Simoda, in the principality of Idzu, and the port of Hakodate, in the principality of Matsmai, were constituted as ports for the reception of American ships, where they could buy such supplies as they needed; that Japanese vessels should assist American vessels driven ashore on the coasts of Japan, and that the crews of such vessels should be properly cared for at one of the two treaty ports; that shipwrecked and other American citizens in Japan should be as free as in other countries, within certain prescribed limits, that ships of the United States should be permitted to trade at the two treaty ports under temporary regulations prescribed by the Japanese, that American ships should use only the ports named, except under stress of weather, and that privileges granted to other nations thereafter must also be extended to the United States. Commodore Perry died in New York City on the 4th of March 1858. A complete and readable account of this expedition, and its results, scientific as well as political, compiled from the journals and reports of Commodore Perry and his officers, was published by the United States government under the title, Narrative of the Expedition of an American Squadron to the China Seas and Japan (3 vols, Washington, 1856). The first volume of this work, containing Commodore Perry's narrative, was also published separately. A brief biography of Perry is included in Charles Morris's Heroes of the Navy in America (Philadelphia and London, 1907). See also William E. Griffis's Matthew Calbraith Perry, a Typical American Naval Officer (Boston, 1887). There are no works available for Matthew Calbraith Perry.
2019-04-22T11:20:38
https://www.historyarchive.org/collections/creators/creators-m/matthew-calbraith-perry.php
0.999518
The above tweet references the original article. Alison Bennett of Bloomberg BNA’s article “Questions surround Standard of Willful Path Conduct under Streamlined Version of OVDP” (9/17/14), summarizes some of her interviews with tax lawyers around the country concerning the Streamlined Filing Compliance Procedures announced by IRS on June 16, 2014. The government may take a stricter view of non-willfulness for those trying to transition out of the OVDP into the Streamlined Process under the transitional rules also announced on June 16, 2014. One practitioner’s experience is that most transitional applications are being rejected by IRS. Apparently, as I’ve discussed in earlier posts there is no appeal of this IRS decision. This entry was posted in Uncategorized on September 20, 2014 by renounceuscitizenship. This entry was posted in Uncategorized on September 2, 2014 by renounceuscitizenship. This is a very common situation. I have never heard of someone who didn’t about the FBAR to have filed the FBAR. (Unless it was some kind of accidental form filing). This predicament is not an uncommon occurrence. Many taxpayers may have had a foreign bank or brokerage account and reported the income in their tax returns or earned no income but did not know they had to file an FBAR. They are often panic-stricken over what they have heard are horrific consequences. But, there is now light at the end of the tunnel thanks to a new IRS procedure aimed at these taxpayers. Should these taxpayers with delinquent FBARS enter the OVDP? Absolutely not. The Offshore Voluntary Disclosure Program or OVDP is for tax criminals or those who fear imposition of a draconian civil FBAR penalty. The OVDP is not for those who’ve reported all income from an offshore account but failed to file an FBAR or other foreign information return. Should they elect the new Streamlined Compliance Procedures? This entry was posted in Uncategorized on September 1, 2014 by renounceuscitizenship. Very nice post on “Streamlined” compliance and the willfulness issue.
2019-04-19T22:37:15
https://renounceuscitizenship.wordpress.com/2014/09/page/2/
0.998592
Does GNU GPL incompatibility mean not ‘open’? "There are two points I'd like to make here. The first is that "being GPL compatible" isn't a definition of 'open' that I've ever heard anyone make. It isn't even the definition of Open Source or Free Software (as in speech). Heck, even the GNU website has a long list of Open Source licenses that are incompatible with the GPL. You'll notice that this list includes the original BSD license, the Apache license, the Zope license, and the Mozilla public license. I doubt that EWeek will be writing articles about how Apache and Mozilla are not 'open' because they aren't GPL compatible." The problem is twofold. First, half of them can’t make up their minds as to what is "teh free". You will get a different definition of the terms "free" and "open" depending on who you ask and whether or not Jupiter happens to be aligned with Mercury that Tuesday. Second, this weird insistence on comparing anything with the GPL, as if someone had declared it to be The Measuring Stick Of Ye Gods. How about I come up with my own cute definitions of copyright and a license to match and demand that everyone use it to determine whether or not their stuff is "free"? If anything, the GPL is far more restrictive than a lot of other licenses. I don’t see why it should be used as the standard. And yes, it’s kind of dumb that under the FSF’s own definitions Apache and Firefox are not "free enough". It’s the "emperor has no clothes" syndrome. Everyone gives lip service to the GPL when it’s a 10-line Perl script but when push comes to shove the license drafting capabilities of these folks are unparalleled. Even Torvalds has said he would have released Linux under a different license if he had known better. Does anybody really listen to Richard Stallman anymore? I mean, the guy lives in a fantasy world! The comment about Linus and the GPL is complete BS. Also firefox is not just MPL, it is tri-licensed under the LGPL/GPL/MPL. So you have a choice of your license. The apache license is not consider "not free" by the GPL. You should read before you write: http://www.gnu.org/philosophy/license-list.html.
2019-04-20T13:23:57
https://blogs.msdn.microsoft.com/alexbarn/2005/06/20/does-gnu-gpl-incompatibility-mean-not-open/
0.998746
While the shark fin trade is still the biggest offender when it comes to shark mortality, the market for shark meat is also of great concern. In areas where overfishing has decimated other fish populations, sharks are increasingly hunted for their meat. Often the meat by itself would not be worth enough to make shark fishing profitable if the fins weren't also sold. Fishing fleets from around the world supply Asian markets with fins, while the meat is being diverted along separate supply channels to meet demand in growing markets around the world. In some cases, countries with stricter laws will land sharks, fully knowing that they cannot market the meat due to contamination levels. They then pass the meat on to another country with less stringent standards. To further complicate the issue, available data of import and exports cover only a portion of what is actually cut and traded. The species of shark being traded is only rarely identified in trade records, making it difficult to trace the sale of endangered species. It is a complex dynamic driven by a consumer market that may be ill informed and a commercial fishing industry that aims to stay in business by creating more demand for anything that comes from a shark. Unprocessed shark meat is known to spoil quickly and possesses a strong ammonia odor due to its high urea content. Brining the meat or marinating it for an extended period of time can remove the odor. As cod populations have decreased, dried shark has become increasingly popular in many countries where salt cold has been popular. For the most part, shark meat is cut into steaks and fillets and is prepared similarly to any other large marine fish. In Asia, it is consumed dried, smoked or salted. In Italy, France and the United States, shark meat is served at fancy restaurants to flaunt the chef's culinary skills. There are also localized delicacies such as in Iceland, where they serve hákari (buried, fermented and dried shark meat) and Trinidad, where "Bake and Shark" is popular. Where is shark meat eaten? It is eaten in many countries around the world. Most notably in Japan, India, Sri Lanka, North America, Korea, Brazil, Australia, Iceland, the U.K., Germany France, Scandinavia and a number of countries in East Africa. European and North American markets seem to have a preference for dogfish species (a smaller shark), although this is possibly influenced by regulations that prevent the import of larger shark species due to high mercury content. In contrast, demand in South and Central American and Asian markets appear to be mainly for larger species. The Republic of Korea is notable for imports of skate and ray meat. There also seems to be an increased online market for shark jerky. Many people may not even realize they are eating sharks. It is often sold under misleading labels and names, such as flake, sea ham, imitation crab and whitefish. Rock salmon, which is really spiny dogfish, used to be commonly used in fish and chips. How much shark meat is sold? Global trade data show the trade in shark meat expanding steadily over the last decade or so. 121,641 tonnes ($379.8 million) of meat imported in 2011, according to the latest FAO figure. That is a 42% increase from 2000. This growth is probably driven in large part by the global demand for seafood. Sharks used to be considered a low grade fish. But since wild fish stock is becoming extremely limited, catching shark has become the alternative. Another reason may also be the implementation of finning regulations that countries have implemented, such as requiring for the carcass to be landed whole (with fins attached) promoting the development of markets for shark meat.
2019-04-22T20:45:28
https://www.sharkallies.com/shark-products-campaign/shark-meat
0.999397
Here are some answers to either frequently asked questions or to important aspects of this project; the ground rules. 1 What is the purpose of this Wiki and this project? 2 What IS a file format, anyway? 3 Some of these classifications (Organic, for example) are strange. Who'd want that? 4 Why is it CC0? 5 Wasn't it "Public Domain" initially? 6 What happens in the event of disagreement and conflict? 7 How can I help? I don't like to ______ and everyone seems to have that under control anyway. 8 Why are there so many darned file formats anyway? What is the purpose of this Wiki and this project? The purpose of this wiki is to "Solve the File Format Problem". The File Format Problem in this context is that over the last century, many types of electronic information have been presented in formats that are non-intuitive and subject to the rapidly-shifting interests of what is newest and best. As a result, thousands of programs, documents, images and binary files are in danger of being unreadable to later generations as no readily available information about accessing them is to be found. Various projects have been launched in the last 20 years to deal with this problem, but they all lack a groundswell of directed volunteers working to once and for all get all the disparate information into one place and easily referenced by all. This is the goal of this project. The project started on November 1st, 2012. All are invited to register and contribute. The goal is to have a massive bulk of knowledge in one place for all to use and incorporate into other similar directories and sites, providing a needed resource for generations to come. What IS a file format, anyway? That is an excellent, excellent question. For the purposes of this Wiki, a file format is the description of any self-contained information. While some formats are self-evident, many are more obscure references to pre-known information, or collections of bytes and items that can be misleading or hard to decipher. File formats can also be embedded in each other - on this wiki, each format gets its own entry. For example, a JPEG image file might be on a FAT filesystem on a floppy disk. All of these get individual entries. The nature of such a wide description is that some entries will skirt the edge of reason, or a file format will not be clear as to where it should be filed. This is understandable and will be dealt with, but the most important priority is to declare the file format exists, and then link it from the locations it should be at. Wisdom is actually just a file format. Contains less raw data than experience logs, less structure than code. It's basically lazy learnings. Some of these classifications (Organic, for example) are strange. Who'd want that? Part of the goals of this project are to extend out past the more limited realms of similar projects. Because of funding, direction, and preference, the multiple other sites are usually focused on a sub-set of all potential file formats, because who'd have time to deal with them? If this project gains more and more contributors, then there's not much more effort required to go after items on the fuzzy lines of what constitutes file formats. Or, for that matter, discern the reason they're file formats. So we have many items like DNA and Piano Rolls that can also be included and worked on. Priority-wise, however, it's probably best to stick with electronic file forms, especially ones lacking any links or documentation - they could really use your efforts. Making the information here CC0 provides the most flexibility for institutions and individuals who want to benefit from the project down the line. With no restrictive license for the main site, the efforts can be re-absorbed into a mass of other projects without needless negotiations over "licenses" and "rights" and provenance. As a result, please refrain from copy-pasting prose and paragraphs from other sources that are not public domain or CC0. (For example, Wikipedia. Sketch out a differently-written summary of the information, and then link to the original information you're interested in having included. People who find compatibility with rewriting extant material can therefore take these links and create a new work for the Just Solve wiki. Duplicating lists and names of formats is OK - make use of the work of others to track down lists of obscure file types to include in this wiki. Wasn't it "Public Domain" initially? This Wiki was straight "Public Domain" for the first few weeks of its existence - however, calling something "public domain" has some issues in locations where Public Domain is not recognized by local copyright law. Therefore, CC0 was added to remove this ambiguity. So in effect, this is still Public Domain. What happens in the event of disagreement and conflict? Please try and work together as best you can - the goal of this project is to absorb an enormous amount of information and arguing about a point of order doesn't help anyone. Unlike Wikipedia's need for a distinct voice, there is nothing stopping people from making a second paragraph set to explain an alternate overview of a format, or to add a set of other links that the entry didn't have before. It's understandable we're going to have issues about arrangement of materials, like whether a certain format is a "written" or "text" format. It's more important to get the existence of that format in, because the use of Categories and links as we best put them together will make sure the effort is not wasted. In cases where an impasse is reached, Jason Scott will serve as editor. In the event Jason Scott appears to be unreasonable, a separate discussion can ensue on the talk page. The goal, again, is to get the information in, past prettiness, preciousness and perfection. Cleaning is a much easier process than acquiring and enumerating at this stage. How can I help? I don't like to ______ and everyone seems to have that under control anyway. The way I see it, there are two kinds of tasks that the Wiki encourages: tasks involving finding items for the Wiki (be they formats or information about them) and making the Wiki "better" in terms of organization and presentation. For the tasks of finding items, going to the Sources page and you will find a wide variety of locations and directories that will always need another set of eyes to find gems. The individual pages for the formats will have links to other examples or directories that reference that format specifically - those could always use more additions. Linking to an already-researched page that has an eye to describing and improving access to a format completely trumps creating such a page on the Wiki - the huge span of formats out there is the daunting part. So search far and wide and bring back knowledge! For the task of the Wiki itself, there are a lot of cases where formatting could be improved, design could look nicer, and classification could be clearer. We expect the look of the place to change significantly over the month as people include MediaWiki Templates and other tricks to make it easier to browse and find information. Short, informative blurbs about each format help people find what they're looking for. Check it out. Why are there so many darned file formats anyway? This XKCD comic has as good an explanation as anybody. Here's a webinar giving some of the reasons behind file format multiplicity. This page was last modified on 26 December 2017, at 02:48. This page has been accessed 21,526 times.
2019-04-22T11:08:48
http://fileformats.archiveteam.org/index.php?title=FAQ&oldid=29271