proba
float64 0.5
1
| text
stringlengths 16
174k
|
---|---|
0.944009 |
Astronomers may have observed vacuum birefringence, a quantum effect predicted by the theory of quantum electrodynamics (QED) in the 1930s, by studying light behavior in the highly magnetized empty space around neutron star RX J1856.5-3754.
Ordinary space is generally thought to be empty with no effect on the path travelled by light, but in the presence of strong magnetic fields, a quantum effect can emerge and modify the space, as in the case of this neutron star's strong magnetic fields that permeate its surroundings.
The team submitted their findings (Mignani et al.) to arXiv in Oct 2016, and published their work in the Monthly Notices of the Royal Astronomical Society in Nov. 2016.
The researchers analyzed data from the Very Large Telescope (VLT), and found the boosting effect of vacuum birefringence realized in the affected propagation of light in the space around the neutron star.
This is the first direct observational evidence supporting vacuum birefringence effects predicted by QED. The next generation of telescopes, including the European Extremely Large Telescope, will likely participate in future observational tests.
As of this writing, the Mignani et al. paper has not yet been cited by any other studies.
Will there be significant followup work referencing this research?
For the purpose of this question, we will assess via the number of citations of Mignani et al. paper. As of writing no referenced has been made yet, and for this question to resolve as positive, there needs to be a minimum of 10 citations, on or before Nov 1, 2017, per Google Scholar.
|
0.999999 |
Exclusively ours. Lightly brushed cotton/spandex twill.
- Classic 5-pocket jean styling.
- Sits at natural waist.
What is the length for Petite and Misses for Item A22272?
How would you describe the color basil? It looks quite gray, but I am looking for more of a sage.
The color basil is a gray green, but definitely more green than gray. I think you could describe the color as sage.
Thank you. This reply was helpful.
Sorry, but this was a gift and I never saw them.
What is the difference between dennisport jeans and denim jeans?
BEST ANSWER: Dennisport jeans are not made of denim material. They are a brushed poplin. You can dress them up with a blazer or twin sweater set. They can be worn in a more casual way with a polo shirt or pullover sweater. I have some that are over 8 years old and they look as good as new. I find them to be very versatile. They are a year-round weight. I live in Connecticut and am able to wear them during our cold winters. They are an excellent purchase!
Do you have any pants that sit just above the waist?
What is the inseam for size 18 tall?
BEST ANSWER: The stone color fits a bit tighter than bright colors, and the petite is still too long for a truly short woman but they ARE true to size.
Yes for size 8 Petite. The size guide says waist is 30" and hips are 38 1/2". Those are my measurements, and the jeans fit comfortably and well. The size guide says that the inseam is 27-29". This measurement for my jeans is approximate, since the actual measurements are not the same for both legs.
I ordered my regular size and they fit, so I guess the answer is yes.
BEST ANSWER: The fabric content is 98% cotton and 2% spandex. Very light weight cotton - not the same as usual jean denim.
what percentage spandex are these?
BEST ANSWER: 98% cotton, 2% spandex. The spandex is really not noticeable. Enough to hold the pants' shape, but not enough to feel stretchy. I love these pants. They're a perfect compromise to the current style of very tight "skinny pants". They are trim, but not tight. I've worn them for years.
Does the pants run small?
If you like room in your pants I would definitely size up. Hope this helps!
I believe so; I returned them for that reason.
No- true to size. Maybe a little large.
Do they have elastic in the back waist?
BEST ANSWER: The waistband is stretchy, but there are no traditional elastic gathers bunched at the back. It looks almost completely smooth like a regular waistband.
No. I've worn this style for years and I love them. However, the waist size is sometimes inconsistent between colors.
Even though it says they have spandex, it is barely noticeable.
what is the inseam size of this jean?
BEST ANSWER: This measurement for size 8 Petite is approximate, since the actual measurements are not the same for both legs.
Just click on the sizing chart link and it will show you the pant length for Misses. If you are a petite, make sure you have the petite radio button selected first, then click the sizing chart link. The sizing chart link is right near the line where the sizes are listed.
BEST ANSWER: My two pair--light green and walnut in color--are 98% cotton and 2% spandex, giving the fabric the ability to very slightly stretch. They need to be ironed after washing.
BEST ANSWER: These measurements for size 8 Petite are approximate, since the actual measurements are not the same for both legs.
Outer seam from top of waistband (sits at natural waist): 36.5"
When standing barefoot: The bottom of the hem at the front just touches the bridge of my foot, and the bottom of the hem at the back is 3" off the floor.
These pants come in Misses Regular, Petite & Tall. I order the Tall, because the 31-32" inseam breaks nicely for me (I'm 5'7-ish, plus Merrill shoes). Customer Service should have this information, and perhaps be more specific. I'm satisfied with the length of the Misses Tall Dennisport 5 pocket jeans I've ordered.
Why are you always out of black in Misses Tall 20?
BEST ANSWER: Because they simply forward questions like yours to previous purchasers instead of paying attention to customers.
I am 5'1" tall and wear size 16 Petite. I have never bought Tall 20, so I can't answer the question!
What is the depth of the front/side pockets?
What is the difference between twill and poplin?
Will you be getting these pants in Stone size 12 Tall soon?
|
0.999977 |
How can I better balance family and work life? I'm very passionate about both.
It's always a hard balance, but I've found the best way is to commit to my work hours being work hours, and my family time being family time. If this isn't doable every day, choose one to two days of the week there are dedicated family time. Put an "out of office" on your email explaining that you turn off all communications to spend time with your family once a week, and that you'll respond to emails the next day. Then do special things with your family, even if it's just sitting down to watch a movie together, or going for a walk in a nature area.
I found $100 on the ground. What should I do with it?
If you saw who dropped it, return it. If not, either keep it or use it for a good cause of your choosing.
What is the best way to prioritize when everything seems important?
The best way to prioritize is to decide on what, in general, is most important in your life. Once you have that focus, prioritizing tasks becomes easier. You can draw a circle and put the most important thing in the center. For some people, that will be God; for others it will be family, for others it will be career. That central focus should guide your tasks. Do the tasks that lead to that center first.
If time and money were no objects, where would you travel?
|
0.954388 |
Discovery and application of causal knowledge in novel problem contexts is a prime example of human intelligence. As new information is obtained from the environment during interactions, people develop and refine causal schemas to establish a parsimonious explanation of underlying problem constraints. The aim of the current study is to systematically examine human ability to discover causal schemas by exploring the environment and transferring knowledge to new situations with greater or different structural complexity. We developed a novel OpenLock task, in which participants explored a virtual “escape room” environment by moving levers that served as “locks” to open a door. In each situation, the sequential movements of the levers that opened the door formed a branching causal sequence that began with either a common-cause (CC) or a common-effect (CE) structure. Participants in a baseline condition completed five trials with high structural complexity (i.e., four active levers). Those in the transfer conditions completed six training trials with low structural complexity (i.e., three active levers) before completing a high-complexity transfer trial. The causal schema acquired in the transfer condition was either congruent or incongruent with that in the transfer condition. Baseline performance under the CC schema was superior to performance under the CE schema, and schema congruency facilitated transfer performance when the congruent schema was the less difficult CC schema. We compared between-subjects human performance to a deep reinforcement learning model and found that a standard deep reinforcement learning model (DDQN) is unable to capture the causal abstraction presented between trials with the same causal schema and trials with a transfer of causal schema.
|
0.999882 |
I tried to cry tonight. Driving home from work and sweating in my hot car, I rolled my window down and wondered if anyone would notice another human's car tears flowing. I've seen it before on occasion. The sadness. The solitude. The drama. Why are they so sad? Should I instagram this?
I gave it a good shot and even got a few tears to come out. I thought, 'hey now I'm on my way... I can get all dramatic about it and like, wail a little just to make an impact.' But it didn't happen. I couldn't really commit. The thing I was feeling mildly sad about just seemed entirely too stupid.
if you want to know the honest truth, I'm just bored.
I'm not lacking fulfillment in too many other areas of my life, really. My job is good. My friends are good. My bedroom is painted the perfect color. I love my cat. The only thing is... my cat can't spoon me all that well. I mean, she does what she can, but it's 91 degrees in my house right now, and she is hairy. I would prefer sweatily spooning with someone at least slightly less hirsute.
You know what I mean. Like 'gross socks on the floor' annoying. Or 'you cooked me dinner but the kitchen looks like a three year old got creative with strange meats'. That kind of thing. Like annoyed and yet somehow still in love with the gross human you live with. There's just nothing like it! Some days all it comes down to is wanting someone other than myself (and what I am going to make for dinner tonight) to think about.
So when I'm driving home in my car willing myself to cry like I mean it, these are the things I'm trying to be sad about. And in all this, there really are actual things to lightly mourn. Like the text relationship I had with the comedian for a couple of weeks. It was super fun! And I'm only sad about it now because it gave me a taste of the real thing. Texting private jokes back and forth with someone that gets your jacked up sense of humor. Getting texted cute pics of a dude in his work uniform... evidence that you're being thought about by someone other than your mother. I didn't expect it, but once it slowed down and went away, I rather missed it.
No hard feelings, cause it was so fun. Just melancholic feelings for that very same reason.
Here's where I have to admit that I empathize. I was sad about someone at 30. I was sad about someone else at 35. The early thirties are a magical time when you're still young, but you can no longer shrug off your bad habits. You have to own up to them and change if you want to end up with any self respect. So good job. I am impressed by men seeking self improvement. It's way more appealing to me than tribal tatted perfect biceps, or a corvette and a 401K.
Men, your flaws are interesting. Your attempts to get your lives together are attractive. Your messy awkwardness can be so cute.
I'll be thinking about these things tonight as my cat claws at my door, meowing for 2 hours trying to get in to spoon me. But I won't cry about it.
|
0.937424 |
Austria is a landlocked country with population of 8.5 million people in Central Europe. Austria is one of the richest countries in the world that has a high standard of living and in 2011 was ranked 19th in the world for its Human Development Index.
Austria has been the birthplace of many famous composers such as Joseph Haydn, Franz Liszt, Franz Schubert, Johann Strauss and Wolfgang Amadeus Mozart. Mozart was born in Salzburg. Much of Mozart's career was spent in Vienna.
Kingdom of Belgium, is a federal state in Western Europe. It is a founding member of the European Union and hosts the EU's headquarters and several other major international organizations.
Czech Republic is a landlocked country in Central Europe. The historic city of Prague is the primary tourist attraction and since the fall of the Iron Curtain in 1989, Prague has become one of the most visited cities in Europe.
Music in the Czech Republic has its roots in more than 1,000 year old sacred music (the first surviving references come from the end of the 10th century), in the traditional folk music of Bohemia, Moravia and Silesia and in the long-term high-culture classical music tradition. Notable Czech composers include Bedřich Smetana, Leoš Janáček, Antonín Dvořák. The most famous music festival is "the Prague Spring" that has been organized annually since 1946.
In literature, Franz Kafka is Czech but he wrote in German language.
France is the most visited country in the world, with 82 million foreign tourists annually! That's excluding those who stay less than 24 hours in France!
France has 37 sites inscribed in UNESCO's World Heritage List and features cities of high cultural interest (I have been to several cities on this List: Paris, Versailles, Nancy, Strasbourg, and Reims).
Historically Germany has been called Das Land der Dichter und Denker (the land of poets and thinkers). There are 240 subsidised theatres, hundreds of symphonic orchestras, thousands of museums and over 25,000 libraries spread in Germany. Annually, there are over 91 million German museum visits, 20 million go to theatres and operas; and 3.6 million listen to the symphonic orchestras.The UNESCO inscribed 33 properties in Germany on the World Heritage List. I have been to only Pilgrimage Church of Wies and several sites in Berlin, but I have visited many cities in Germany.
Italy is definitely one of my most favorite countries on earth. I have visited it many times and would always love to go back there. Italy is home to the greatest number of UNESCO World Heritage Sites, amounted to 47 sites and has rich collections of art, culture and literature from many different periods. It has approximately 100,000 monuments throughout the country (museums, palaces, buildings, statues, churches, art galleries, villas, fountains, historic houses and archaeological remains). For the world heritage sites, I have visited Rome, Florence, Pisa, Venice, San Gimignano, Vicenza, Ferrara and its Po delta, Siena, Pienza, Verona, and Val d'Orcia.
Luxembourg is a landlocked country in western Europe, bordered by Belgium, France, and Germany. Luxembourg possesses the highest GDP per capita in the world. Luxembourg was the first city to be named European Capital of Culture twice.The city of Luxembourg is UNESCO's World Heritage Site.
The Kingdom of the Netherlands is located mainly in North-West Europe and with several islands in the Caribbean. It is a geographically low-lying country, with about 25% of its area and 21% of its population located below sea level,and 50% of its land lying less than one metre above sea level. Netherlands has 9 sites on UNESCO's World Heritage Sites List and I have been only to Amsterdam and its canals.
Portugal is the westernmost country of Europe, and is bordered by the Atlantic Ocean to the West and South and by Spain to the North and East. The Portuguese Empire was the first global empire in history and also the longest lived of the European colonial empires, spanning almost 600 years, from the capture of Ceuta in 1415, to the handover of Macau to China in 1999. However, the country's international status was greatly reduced during the 19th century, especially following the independence of Brazil, its largest colony. After the 1910 revolution deposed the monarchy, the democratic but unstable Portuguese First Republic was established being then superseded by the "Estado Novo" authoritarian regime. Democracy was restored after the Portuguese Colonial War and the Carnation Revolution in 1974, after which Portugal's last overseas provinces became independent (most prominently Angola, Mozambique and East Timor) and the last overseas territory, Macau, was ceded to China in 1999. The UNESCO's World Heritage Sites in Portugal that I have visited are Lisbon, Sintra and Oporto.
The Kingdom of Spain was a global empire which became the strongest kingdom in Europe and the leading world power for a century and a half and the largest overseas empire for three centuries. It colonized Latin American countries for more than 500 years. And that's why now there are more than 500 million Spanish speakers today in the world. During the last four decades the Spanish tourism industry has grown to become the second biggest in the world. There are 40 sites onUNESCO World Heritage List in Spain, exceeded only by Italy. I have visited only one: Works of Antoni Gaudí in Barcelona.
The Swiss Confederation is situated in central Europe where it is bordered by Germany to the north, France to the west, Italy to the south, and Austria and Liechtenstein to the east. Switzerland is a landlocked country geographically divided between the Alps, the Central Plateau and the Jura. Switzerland has 11 sites on UNESCO's World Heritage List. I have been only to Three Castles, Defensive Wall and Ramparts of the Market-Town of Bellinzona and Swiss Alps Jungfrau-Aletsch. But I have experienced the third-longest railway tunnel in the world of the Lötschberg railway line which is part of the Alp Transit.
|
0.999998 |
Как исправить ошибку с apt-mirror в Ubuntu Server?
apt-mirror: can't open index archive.ubuntu.com/ubuntu//dists/bionic/main/binary-<running/Packages in process_index at /usr/bin/apt-mirror line 800, <STREAM> chunk 19968.
apt-mirror: can't open index archive.ubuntu.com/ubuntu//dists/bionic/restricted/binary-<running/Packages in process_index at /usr/bin/apt-mirror line 800, <STREAM> chunk 19968.
apt-mirror: can't open index archive.ubuntu.com/ubuntu//dists/bionic-updates/main/binary-<running/Packages in process_index at /usr/bin/apt-mirror line 800, <STREAM> chunk 19968.
apt-mirror: can't open index archive.ubuntu.com/ubuntu//dists/bionic-updates/restricted/binary-<running/Packages in process_index at /usr/bin/apt-mirror line 800, <STREAM> chunk 19968.
apt-mirror: can't open index archive.ubuntu.com/ubuntu//dists/bionic/universe/binary-<running/Packages in process_index at /usr/bin/apt-mirror line 800, <STREAM> chunk 19968.
apt-mirror: can't open index archive.ubuntu.com/ubuntu//dists/bionic-updates/universe/binary-<running/Packages in process_index at /usr/bin/apt-mirror line 800, <STREAM> chunk 19968.
apt-mirror: can't open index archive.ubuntu.com/ubuntu//dists/bionic/multiverse/binary-<running/Packages in process_index at /usr/bin/apt-mirror line 800, <STREAM> chunk 19968.
apt-mirror: can't open index archive.ubuntu.com/ubuntu//dists/bionic-updates/multiverse/binary-<running/Packages in process_index at /usr/bin/apt-mirror line 800, <STREAM> chunk 19968.
apt-mirror: can't open index archive.ubuntu.com/ubuntu//dists/bionic-backports/main/binary-<running/Packages in process_index at /usr/bin/apt-mirror line 800, <STREAM> chunk 19968.
apt-mirror: can't open index archive.ubuntu.com/ubuntu//dists/bionic-backports/restricted/binary-<running/Packages in process_index at /usr/bin/apt-mirror line 800, <STREAM> chunk 19968.
apt-mirror: can't open index archive.ubuntu.com/ubuntu//dists/bionic-backports/universe/binary-<running/Packages in process_index at /usr/bin/apt-mirror line 800, <STREAM> chunk 19968.
apt-mirror: can't open index archive.ubuntu.com/ubuntu//dists/bionic-backports/multiverse/binary-<running/Packages in process_index at /usr/bin/apt-mirror line 800, <STREAM> chunk 19968.
apt-mirror: can't open index archive.ubuntu.com/ubuntu//dists/bionic-security/main/binary-<running/Packages in process_index at /usr/bin/apt-mirror line 800, <STREAM> chunk 19968.
apt-mirror: can't open index archive.ubuntu.com/ubuntu//dists/bionic-security/restricted/binary-<running/Packages in process_index at /usr/bin/apt-mirror line 800, <STREAM> chunk 19968.
apt-mirror: can't open index archive.ubuntu.com/ubuntu//dists/bionic-security/universe/binary-<running/Packages in process_index at /usr/bin/apt-mirror line 800, <STREAM> chunk 19968.
apt-mirror: can't open index archive.ubuntu.com/ubuntu//dists/bionic-security/multiverse/binary-<running/Packages in process_index at /usr/bin/apt-mirror line 800, <STREAM> chunk 19968.
0 bytes will be downloaded into archive.
0 bytes in 0 files and 0 directories can be freed.
Run /var/apt-mirror/var/clean.sh for this purpose.
Post Mirror script has completed. See above output for any possible errors.
apt-mirror: can't open index archive.ubuntu.com/ubuntu//dists/bionic-security/multiverse/binary- chunk 19968.
не должно быть двойного //, но совершенно не могу понять откуда он берется там. Буду благодарен за помощь.
После перезапуска apt-mirror начал работать нормально, пакеты скачиваются. Если честно не углублялся в причины, но в таком виде конфиг работает.
Как загружать файлы прямо на файлообменник?
И всё-таки как правильно распределить права-группы между www-data и me-as-user?
А существует ли какой-то аналог Git но для системы (Ubuntu) в целом — чтобы откатиться после изменений можно было?
Как протестировать блокировку по IP заданную в Nginx / Apache?
С чем связана ошибка unknown key adress?
Как включить логи Исходящего трафика в ubuntu?
Какую разметку диска выбрать для soft-raid'a?
Как сохранить файл после редактирования в консоли?
|
0.996782 |
Theatre Royal Drury Lane, Is it really haunted?
The Theatre Royal Drury Lane is a west end theatre in Covent Garden, the building faces Catherine Street and backs onto Drury Lane. The current building is the fourth theatre to stand in the same location, the first dating back to 1663 making it the oldest theatre in London.
The first theatre was built by Thomas Killigrew in 1663 and was destroyed by fire in 1672. Killigrew then built another larger theatre which opened in 1674 and lasted nearly 120 years before being demolished to make way for a new, updated and larger venue.
The third incarnation of the venue opened in 1794 and lasted only fifteen years before it too was lost to a fire in 1809. The building that still stands today was built and opened in 1812 and is now a grade I listed building and is owned by composer Andrew Lloyd Webber.
The most well known ghost of the theatre is the "man in grey" who appears in the audition room, but only during the day. He is dressed in an elaborate costume, including tri-corn hat, powder wig, cloak and carries a sword! People believe him to be the spirit of a man who was murdered nearly 200 years ago and whose body was sealed in a backstage room.
When the body was discovered by workers in the 1800's it was found with a knife still lodged in it's ribcage, as well as clothing fragments from the same era as the clothing the ghost is seen in.
Another famous ghost is believed to be the spirit of comedian Dan Leno who is still seen in the dressing room which he would have used. Also the ghost of former manager Freddy Fredericks has been seen by many people, the police were even called once by maintenance workers who saw the ghost entering a utility closet. Freddy Fredericks ghost has even been captured on film by security personnel.
|
0.976307 |
Should Jersey welcome child refugees?
Lord Dubs, a Labour peer and former child refugee wants Jersey to set a leading example by doing its bit for incredibly vulnerable children.
It's fantastic to see the people of Jersey show concern for the welfare of child refugees. It's very important to address people's concerns about the challenges involved in welcoming refugees, but I know from personal experience that these children can make truly positive contributions to their new homes. By committing to welcome some children, Jersey will have a life changing impact on these young lives.
|
0.958602 |
This test case is intended to fail because the language of the (English) text alternative of the image is not correctly identified.
The test case fails the following success criterion at line 10, column 9: http://www.w3.org/TR/2006/WD-WCAG20-20060427/guidelines.html#meaning-other-lang-id.
The image should have a lang attribute with value "en" instead of "uk" (Ukrainian).
This test case maps to technique H58: Using the lang attribute to identify changes in the natural language (http://www.w3.org/TR/2006/WD-WCAG20-TECHS-20060427/Overview.html#H58) but fails.
The test case fails the following success criterion at line 10, column 9: http://www.w3.org/TR/2006/WD-WCAG20-20050630/#meaning-other-lang-id.
|
0.998949 |
The Creators Project points to a neat little project where famous works of art are re-arranged and transformed into other famous works of art. So the Mona Lisa can become American Gothic and vice versa. It's like seeing art become a wonderful illusion.
You are given two true color images, the Source and the Palette. They do not necessarily have the same dimensions but it is guaranteed that their areas are the same, i.e. they have the same number of pixels.
Your task is to create an algorithm that makes the most accurate looking copy of the Source by only using the pixels in the Palette. Each pixel in the Palette must be used exactly once in a unique position in this copy. The copy must have the same dimensions as the Source.
Algorithms are pretty cool to look at when they do things like this, right?
|
0.999994 |
Why is understanding land use and land use laws important?
Land has been credited for securing means to a livelihood and hence for building wealth. Because land renders socio-economic assets, under conditions of land constraints and/or scarcity, land has been a reason for ethnic conflicts and civil wars. In Third World countries, land is conventionally regulated as a common-use resource, albeit owned by a chieftain. Therefore, laws affecting land use and the resources featured within the land spaces are imposed from above. When exogenous actors gain access to land and corresponding resources as an outcome of political relationships, such as colonialism, foreign-trade, etc., local village access and entitlements are restricted. Understanding land use is, therefore critical to understanding how to manage and regulate land ownership and use.
Land use, access, and management in Zambia, not unlike other developing countries, has been affected by trade and colonial relations. Land ownership today is guided by customary law and common law. The former, customary law, stems from African customs and is the method by which Zambians conduct their land activities, which include contractual claims regarding marital inheritance, ownership, and disputes. Zambians mediate land activities in the local courts, which in judicial language means the lower district courts.
Common law is derived from the establishment of the English colonial government in 1924, which placed significant hectares of land as Reserves or that of the British Crown. The latter was open to only Europeans, an edict that forcibly evacuated Zambians, but reserves were open to Africans. Reserved lands are located in some of the most agriculturally prime areas. After colonialism ended in 1964, Zambia acquired formerly Crown lands that are now designated as State Land, Freehold, Reserves, and Trust lands.Reserves and Trust lands fall under the de-facto management rights of the Chieftains, although power is diluted, and is a status that was extended to them as a diplomatic gesture. Much of commercial agriculture in Zambia are held in State land, the bounties of which are channeled to urban areas. Now, 94 percent of lands fall under the administration of the Zambian government.
Like most countries, gender ownership has been delayed by customary laws limiting land ownership to men. Civic groups have proselytized for equal opportunity in land ownership laws, arguing that women in ownership of land will encourage productivity because they are likely to invest more in land they own, reduce economic hardship, as land is the gateway to livelihoods, and will empower women, overall.
The climate of Zambia differs across the country, modified by altitude. The southern western areas, home of the Luangwa Valley, are very arid and are prone to erosion, while other parts, specifically the Zambezi area, are flood prone. Around the Zambezi region, rain fall (precipitation) can average as high as 55 inches. Agricultural development is challenged by climatic variations and land use history.
I thank Martin Adams and the Online Edition of Britannica for improving my knowledge of Zambian land use laws.
FUNDRAISING UPDATE: I am now at $280, which includes the checks I have collected at the door and over Christmas. I would like to break $300 by this weekend. Please visit "My Fundraising Page" to the left of this blog and donate today.
|
0.990329 |
How can customer feedback help you grow your business?
By giving you a better understanding of what your customers want and need.
Instead of offering your customers what you think they want and need, you will be able to offer them what they actually want and need.
|
0.979749 |
Who doesn’t love free WiFi? Of course, everyone! Almost every person now looks for free WiFi in a public place and they want it to be omnipresent wherever they go. This is especially true for events such as concerts or networking meetups where everyone expects their public WiFi to be strong and glitch-free. Hence, it becomes important for organizers to pay attention in this regard if they want to make their event a success. In addition to that, they also need to take some crucial steps in order to protect the security of users connecting to the network.
Nothing could frustrate your event attendees more than a bogged down WiFi network. If you are relying solely on cell phone towers or standard WiFi in common areas to serve your attendees, you are making the worse mistake. It’s important to set aside a budget for a dedicated WiFi to assure uninterrupted service to event attendees. This also gives you full control over the security of your users.
Before setting up WiFi hotspot for events, it’s important to determine how many users will actually use WiFi and for what purpose. While some attendees will use WiFi for general purposes such as web browsing, some may use it to stream videos or run high-bandwidth applications. So, there can be both higher as well as lower usage groups and it’s important to address the WiFi needs of all these users. Next, you also need to assess how many devices your attendees will be using at the event. A general rule of thumb for assessing how much bandwidth you need is to allow for 10-12 Mbps per 100 users belonging to a high-usage group and 2-3 Mbps per 100 users belonging to lower usage groups.
It’s important to map your event WiFi footprint to make sure it doesn’t impact the user experience. However, it can be really expensive to have your WiFi to cover the entire area of your event, especially if you have a lot of square footage. Moreover, some areas may have less demand for WiFi signal and, therefore, you should consider deploying WiFi only in those areas that are definitely going to need networks such as conference halls, trade show halls and more.
To make sure your event attendees choose the correct network and do not fall prey to an insecure network, publicize the WiFi Network Name and, if required, password in all marketing materials and high-traffic areas of the event. The WiFi Network Name should be intuitive so that it is easily recognized in a list of networks. The same goes for the password as well that should be kept short and simple.
At last, it’s also important to make users aware of all the security risks associated with connecting to a public WiFi. For example, when on public WiFi, it’s not recommended to enter passwords for crucial accounts. Any online transactions should not be conducted when on public WiFi. When at an event, users should only connect to networks that have a lock icon. As an organizer, it’s your responsibility to effectively publicize WiFi SSID along with the password to make sure your users always connect to your secure network.
An event without a public WiFi in this Internet-driven world is certainly lifeless. Hopefully, these tips will help organizers plan a successful event without compromising users’ privacy and security.
|
0.668067 |
Giovanni Battista Cipriani (1727–1785), Italian painter and engraver, Pistoiese by descent, was born in Florence.
His first lessons were given him by an Englishman, Ignatius Heckford or Hugford, and under his second master, Antonio Domenico Gabbiani, he became a very clever draughtsman. He was in Rome from 1750 to 1753, where he became acquainted with Sir William Chambers, the architect, and Joseph Wilton, the sculptor, whom he accompanied to England in August 1755.
He had already painted two pictures for the abbey of San Michele in Pelago, Pistoia, which had brought him reputation, and on his arrival in England he was patronized by Lord Tilney, the duke of Richmond and other noblemen. His acquaintance with Sir William Chambers no doubt helped him on, for when Chambers designed the Albany in London for Lord Holland, Cipriani painted a ceiling for him, He also painted part of a ceiling in Buckingham Palace, and a room with poetical subjects at Standlynch in Wiltshire.
Some of his best and most permanent work was, however, done at Somerset House, built by his friend Chambers, upon which he lavished infinite pains. He not only prepared the decorations for the interior of the north block, but says Joseph Baretti in his Guide through the Royal Academy (1780), "the whole of the carvings in the various fronts of Somerset Place — excepting Bacon's bronze figures — were carved from finished drawings made by Cipriani." These designs include the five masks forming the keystones to the arches on the courtyard side of the vestibule, and the two above the doors leading into the wings of the north block, all of which are believed to have been carved by Nollekens. The grotesque groups flanking the main doorways on three sides of the quadrangle and the central doorway on the terrace appear also to have been designed by Cipriani.
The apartments in Sir William Chambers's stately palace that were assigned to the Royal Academy, into which it moved in 1750, owed much to Cipriani's graceful, if mannered, pencil. The central panel of the library ceiling was painted by Sir Joshua Reynolds, but the four compartments in the coves, representing Allegory, Fable, Nature and History, were Cipriani's. These paintings still remain at Somerset House, together with the emblematic painted ceiling, also his work, of what was once the library of the Royal Society.
It was natural that Cipriani should thus devote himself to adorning the apartments of the academy, since he was an original member (1768) of that body, for which he designed the diploma so well engraved by Bartolozzi. In recognition of his services in this respect the members presented him in 1769 with a silver cup with a commemorative inscription. He was much employed by the publishers, for whom he made drawings in pen and ink, sometimes coloured. His friend Bartolozzi engraved most of them. Drawings by him are in both the British Museum and Victoria and Albert Museum. His best autograph engravings are "The Death of Cleopatra," after Benvenuto Cellini; "The Descent of the Holy Ghost," after Gabbiani; and portraits for Hollis's memoirs, 1780. He painted allegorical designs for George III's state coach — which was still in use — in 1782, and repaired Verrio's paintings at Windsor and Rubens's ceiling in the Banqueting House at Whitehall.
If his pictures were often weak, his decorative treatment of children was usually exceedingly happy. Some of his most pleasing work was that which, directly or indirectly, he executed for the decoration of furniture. He designed many groups, of nymphs and amorini and medallion subjects to form the centre of Pergolesi's bands of ornament, and they were continually reproduced upon the elegant satin-wood furniture which was growing popular in his later days and by the end of the 18th century became a rage. Sometimes these designs were inlaid in marqueterie, but most frequently they were painted upon the satin-wood by other hands with delightful effect, since in the whole range of English furniture there is nothing more enchanting than really good finished satin-wood pieces. There can be little doubt that some of the beautiful furniture designed by the Adams was actually painted by Cipriani himself. He also occasionally designed handles for drawers and doors. Cipriani died at Hammersmith and was buried at Chelsea, where Bartolozzi erected a monument to his memory. He had married an English lady, by whom he had two sons.
|
0.999407 |
Elizabethan architecture. Architecture of the reign of Queen Elizabeth I of England (1558–1603), regarded as within the last phase of the Tudor period, but showing the influence of European Renaissance styles, though often somewhat provincial in treatment. Elizabethan England was relatively isolated from mainstream developments on the Continent, partly because of religious schism, but essentially because the Queen's legitimacy and rights to the Throne were not accepted by the major European RC powers. Architectural trends were therefore slow in arriving, and were mostly disseminated through publications. Initially, Renaissance motifs were largely treated as surface decoration. The first major building to incorporate reasonably accurate French Renaissance elements, old Somerset House, London, was not built until 1547–52, and was derived from work by Philibert de l'Orme and Jean Bullant. In 1550 John Shute was sent to Italy to study Antique and modern architecture, after which he published The First and Chief Groundes of Architecture (1563), derived from Serlio and Vignola, and the first book on the Classical Orders in English. Thereafter, several great prodigy-houses were built, including Burghley House, near Stamford, Lincs. (1550s–1580s), Longleat, Wilts. (1572–80), and Hardwick Hall, Derbys. (1590–6). Late-Gothic features, such as large mullioned and transomed windows, the E-shaped late-Tudor plan, elaborate upperworks such as arrays of tall chimneys, turrets, etc., and even the occasional spire, were mixed promiscuously with the Orders (often used as an assemblage or even as chimneys), much strapwork, grotesque ornament, and obelisks (upright and inverted, often with herms). Sources were often French, especially the school of Fontainebleau's Mannerism which had such a profound influence on North-European Renaissance and Mannerist designs, notably those of Dietterlin and de Vries: indeed, the so-called Ditterling ornament was often strongly represented. The Gate of Honour, Gonville and Caius College, Cambridge (1572–3), has an arch derived in form from late-Tudor examples, but set within a Classical ensemble of Roman Doric over which is an engaged temple-front flanked by obelisks, the whole crowned by a hexagonal superstructure with a domical vaulted top. It is clearly derived from Serlio, and from Flemish Renaissance designs: indeed its architect was Theodore de Have, or Haveus (fl. 1562–76), a Fleming or German from Cleve (Cleves), who settled in England in 1562. However, van Paesschen, who was involved in the design of Burghley House, Theobald's Palace (Herts.), Bach-y-Graig (Flint-shire), and the Royal Exchange (London) in the 1560s, has a claim to be regarded as the first architect to design buildings in England that were Italian rather than French in style.
Elizabethan architecture was often ebullient, notably in chimney-pieces, frontis-pieces, and funerary monuments (the last often with spectacular structural poly-chromy, i.e. the colour provided by the materials used in the construction e.g. Kelway monument (1580s), Church of Sts Peter and Paul, Exton, Rut., and the Cecil tomb (late C16), perhaps by Cornelius Cure (fl. c.1574–c.1609), in the Church of St Martin, Stamford, Lincs.). The essence of the Elizabethan style continued into Jacobean architecture, and there was a C19 revival.
"Elizabethan architecture." A Dictionary of Architecture and Landscape Architecture. . Encyclopedia.com. 21 Apr. 2019 <https://www.encyclopedia.com>.
Elizabethan style (ĬlĬz´əbē´thən), in architecture and the decorative arts, a transitional style of the English Renaissance, which took its name from Queen Elizabeth's reign (1558–1603). During this period many large manor houses were erected by the court nobility. The plans and facades tended more toward symmetry, although there remained many of the characteristics of the Tudor style. The great hall of medieval manors was retained, and features were added that increased the occupants' comfort—a broad staircase, a long gallery connecting the wings of the house on the upper floors, withdrawing rooms, and bedrooms of greater size and importance. Examples of the great manors of the period are Longleat, Wiltshire; Wollaton Hall, Nottinghamshire; Kirby Hall, Northamptonshire; Montacute House, Somerset; and Hardwick Hall, Derbyshire. The houses were often designed by the owners themselves, who furnished ideas that were amplified by their mason or carpenter. The freemason Robert Smythson is one of the earliest names associated with English architecture. From Flemish and Italian books the planners haphazardly adapted Renaissance, mannerist, and Flemish motifs, including columns, pilasters, lozenges, festoons, scrolls, and grotesque figures. No attempt was made to achieve the unified classical style of architecture that had already appeared in Italy and France. A greater unity was achieved in the subsequent Jacobean style. In landscape design, formal gardens were developed with clipped boxwood and yews along balustraded terraces, which formed a finished setting for the great manors. In the houses of lesser gentry and yeomen, construction in the Gothic style continued, with the use of half-timber construction, leaded windows, and hammer-beam roofs.
See J. Buxton, Elizabethan Taste (1963); M. Girouard, Elizabethan Architecture (2010).
"Elizabethan style." The Columbia Encyclopedia, 6th ed.. . Encyclopedia.com. 21 Apr. 2019 <https://www.encyclopedia.com>.
|
0.993226 |
Aromatherapy for depression, especially menopause depression: does it really work? Aromatherapy, or the use of essential oils from plants for healing, is one of many possible natural treatments for depression.
According to Kurt Schnaubelt, Ph.D., author of Advanced Aromatherapy, the use of essential oils is most effective with infections. It's second best area of effectiveness is with the nervous and endocrine systems, and the psyche. Since menopause depression can be caused by hormone imbalance as well as nervous system issues, it seems aromatherapy for depression would be worth trying.
Menopause depression can happen for several reasons. One reason is hormone imbalance. This can happen when estrogen and progesterone decline during perimenopause and other reproductive hormones increase. If you have been under long-term stress, this can cause depression. Low thyroid, a common occurrence for middle-aged women, can contribute to depression.
There are many natural treatments for menopause depression. Aromatherapy, or the use of essential oils, is a particularly attractive remedy. It's very pleasing to smell fragrances you like, although in some cases you don't need to smell the oil; it does it's job by penetrating into your tissues and organs. DO NOT ingest essential oils unless you have been trained by an expert in how to use them. Most oils are used externally, not internally.
Aromatherapy is the use of essential oils made from plants for various health treatments. Aromatherapy has been used for many years and can be very effective, especially for emotional support. There are several different ways to use essential oils, including topically, in compresses, through inhalation, and in baths. There is nothing quite like getting a massage from someone using essential oils.
Essential oils can also work through topical application and tissue penetration. This would be an excellent way to use aromatherapy for depression. Getting a massage is a way to nurture yourself, something women usually don't do nearly enough of. Adding essential oils to that massage intensifies the nurturing many times over.
Oils that can help lift a depressed mood include Bergamot, Roman Chamomile, Frankincense, Lavender, Mandarin, Melissa, Neroli and Ylang Ylang.
Bergamot (Citrus aurantium ssp. Bergamia) is calming and helps you sleep. Since menopause insomnia can contribute to menopause depression, this could help with both issues. Bergamot is phototoxic and should not be used topically. You can use it in a diffuser, or put some drops on a cotton ball for inhalation or use in your dryer or vacuum.
Roman Chamomile (Anthemis nobilis) is very calming and soothing to your nerves. It can be applied topically or through the methods mentioned under bergamot, above.
Frankincense (Boswellia carteri) can be used for depression and is safe for topical application.
Lavender (Lavendula angustifolia) Lavender is well known for its calming and soothing effects. I used to rub a couple of drops on my son's wrist when he was younger to help him calm down and get to sleep. It also relieves tension and pain.
Mandarin (Citrus reticulata) Mandarin can help with anxiety and stress. It can be phototoxic if applied to the skin.
Melissa (Melissa officinalis). Common name is lemon balm. It grows like a weed where I live in the Northern California foothills. This plant is very effective for relieving depression. It is sedating but gentle. It can be applied topically or inhaled.
Neroli – Bitter Orange Flowers (Citrus aurantium) Neroli helps reduce anxiety, and can be used topically as well as inhaled.
Ylang Ylang (Cananga odorata) is very relaxing and has a heavenly scent. Ylang Ylang grows in Asia and has a star-shaped yellow flower.
Be sure to use the highest quality oils you can afford. Low quality oils will not get the job done. And if you buy an “aromatherapy candle” at the drugstore, do not expect the same benefits that you would derive from actually buying the essential oils themselves. If you follow this advice, you will find that using essential oils can be fun and nurturing.
There are many different ways to approach depression with natural treatments. Always start with diet and nutrition – this is your foundation for health. In addition to diet, herbs, music, yoga, flower essences, acupuncture, and exercise.
|
0.920364 |
There is no fitness goal which you can achieve without first cleaning up your diet. Changing your diet is one of the biggest challenges when faced with improving ones health. A majority of people are used to eating highly processed foods on a regular basis and breaking away from that can be difficult. The good news is, it isn't impossible and once you make it a habit to eat clean, it becomes a part of your life.
In a nutshell, eating clean is the practice of eating whole, natural foods such as fruits, vegetables, lean proteins, and complex carbohydrates. It also means staying away from the junk that typically makes up the Standard American Diet (S.A.D) These types of food include man-made sugar, bad fats (hydrogenated, trans-fat), preservatives, white bread, and any other ingredients that are unnecessary. An easy way to remember if a food is clean is: "if man made it, don't eat it."
Eating clean can be a major transition for a majority of people due to addictions to sugar, white bread, and fast food. It takes discipline in order to make eating clean a habit but it is possible and has so many long-term health benefits.
1. Eat six small meals a day: breakfast, lunch, dinner and three snacks. Try to eat every few hours to curb hunger and promote a higher metabolism.
2. Choose whole grains and complex carbohydrates to give you more energy and keep you feeling fuller longer. Remember that whole wheat is not necessarily whole grain. Look for breads, rice and pasta that are not just brown, but also made with 100% whole grains. One serving is about the size of your closed fist.
3. Leave calorie-filled, non-nutritional "junk food" at the grocery store. If you buy fresh foods, you will eat fresh foods.
4. Eat as many fruits and vegetables as you want. Try to add one serving, about a handful, of each per meal. Fruits also make great snacks because they are full of natural sugar and can help fight those afternoon sugar cravings.
5. Eat lean meats, chicken and fish whenever possible, staying away from processed and fatty meats. This will give you much needed protein with little fat. One serving is about the size of you palm.
6. Read labels. Look at calorie counts but also look at nutritional value and ingredients. Try to avoid foods with white flour, sugar and sugar substitutes, saturated fats and trans-fats.
7. Take small bags of unsalted almonds, cashews and walnuts with you to work so you don't get tempted by vending machines and breakroom junk food.
8. Check internet sites, libraries and bookstores for recipes to keep your new lifestyle fresh and flavorful.
9. Give yourself a "cheat day" but remember not to go overboard. Allow yourself a meal out with friends or a special food, but try not to undo all your hard work from the rest of the week. Enjoy being healthy!
Eating clean means eating healthfully and consuming foods that are as natural as possible, according to "Clean Eating" magazine. Clean foods have no added chemicals or preservatives, are most often organic and contain lower levels of salt, fats, sugar or other additives. Clean foods are fresh fruits and vegetables instead of canned, whole grains instead of processed white flours, water instead of soda and lean proteins instead of heavier proteins.
Fresh fruits and vegetables are loaded with health benefits and abundant in flavor. Not only do fruits and vegetables lower your risk for heart disease and stroke, they also lower blood pressure and help with digestive problems. Fruits and vegetables are also low in calories. Harvard School of Public Health suggests nine servings, or 4 1/2 cups, of fresh fruits and vegetables. Go for an assortment of colors when creating meals because different colors are markers of various nutrients and antioxidants.
Whole grains are excellent for controlling weight and are considered a clean food. Naturally low in fat, whole grains are grains that have not been refined and provide exceptional levels of fiber, selenium and magnesium, according to the Mayo Clinic. Nutritional and delicious whole grain products include barley, brown rice, buckwheat, millet, oatmeal, whole-grain breads and pastas and wild rice. Many clean eaters choose sprouted grain breads for even more nutritional benefits.
Water is a healthful option for dieters and clean eaters. Your body needs water to function normally and drinking enough of it helps your body flush out toxins and fats that keep you from achieving optimal performance, according to the Mayo Clinic.
You will simply feel better. From your mental well-being, to your digestive health, life will just feel better.
Work will go by faster, and you'll be able to enjoy more of your favorite activities and hobbies (and squeeze in gym time!).
Beautify your Skin. We truly are "what we eat". Imagine how fresh fruits and vegetables, whole grains, and lean proteins affect you internally. Now imagine how over-indulgences on processed sugars, salts and fats affect our internal systems. Eating clean can change your skin dramatically! (Whole foods are naturally higher in water than processed foods).
Lose Body Fat. Eating clean will regulate your metabolism and help you to shed body fat and feel lighter!
Not to mention Two thirds of all US adults are overweight: This is due to people eating all the wrong things. Fast food, processed food, too much sugar...it's all bad stuff. By eating clean, you eliminate anything processed. Pair clean eating with daily exercise and you won't be in the majority of adults with a weight problem.
Remember to eat! Never skip a meal.
If you are having trouble eating clean at work, take a cooler full of healthy choices with you to get you through the work day.
Avoid alcohol and soft drinks. If you must indulge, minimize the amount and remember to drink plenty of water.
Stay away from too many dried fruits. They are usually higher in calories and have less water than fresh fruits.
|
0.99997 |
Who is Deepika Padukone dating?
Deepika Padukone is currently single.
Deepika Padukone has had 4 romantic relationships. The longest relationship was with Ranbir Kapoor, which lasted for 2 years. Deepika Padukone has also had relationships with Novak Djokovic, Siddharth Mallya, and Upen Patel.
Deepika Padukone hooked up with Novak Djokovic in March 2016.
Deepika Padukone dated Siddharth Mallya in March 2010.
Deepika Padukone dated Ranbir Kapoor from 2007 to 2009.
Deepika Padukone dated Upen Patel from 2006 to 2007.
|
0.929231 |
Ants are the most common household pests that infest northern and eastern states of United States. There are myriad varieties of this insect, from small harmless ones to large, poisonous ones. Flying ants are also not that uncommon, especially during summer. Swarms of flying ants can be easily seen at the onset of summer. Although, flying ant infestation is not necessarily dangerous, their alarming number may cause some nuisance.
Many people mistake flying ants for termites and vice-a-verse. However, the major difference between a flying ant and a termite is that, the thorax present in flying ant, is absent in a termite. The body of a flying ant can be distinctively divided into three regions, head, thorax and abdomen. You will need to note the difference between flying ants and termites, in order to adopt an appropriate method of eliminating them.
Flying ants can be observed only for a day or two, during summer. There is a single mating day during which, the winged males roam in search of the queen, in order to mate. The swarms of winged males are mostly visible around the prominent landscapes, such as large trees, roofs of chimneys, etc. After mating, the males die within 2-3 days, while the queen takes off to begin a new colony. Thus, you won't find the swarms of flying ants in the house for more than a day or two.
Flying ants scavenge food remains, bread crumbs etc., in your kitchen. Thus, if you keep these leftovers open, during their mating season, you are likely to invite them in your house. Litter box also attracts swarms of flying ants for obvious reasons.
Flying ants usually need no exterminating measures, as they disperse on their own. However, if the flying ant problem in your house becomes particularly grave, you might want to exterminate flying ants. They respond to most of the pest control methods. However, consider getting rid of them with the help of pesticides only when other non-chemical methods fail. Destroying the colonies of flying ants around your house, prevents their infestation in near future. Following are some ways of getting rid of flying ants in house.
If you want to prevent the infestation of flying ants, get rid of waste in your kitchen first. Since, flying ants feed on the waste from kitchen, you should always keep your kitchen clean and devoid of any leftovers. Store leftovers in covered containers and also place a tight lid on the litter box.
Roof screening becomes a must in order to prevent entry of flying ants in house. Hence, during the mating season, always screen your roof. Although, summer is a common mating season for flying ants, their sighting in winter are also not uncommon. Additionally, you can also seal the crevices or gaps in the doors and windows.
Chemical method of exterminating flying ants becomes inevitable only when you have large swarms of flying ants inside your house. Any ordinary pesticide is enough to kill winged ants in house. However, you need to consult a professional for pest control, in case of heavy infestation, or if the ants are flying black ants (carpenter ants).
Flying ants are actually not an issue of concern, as they die within 2 - 3 days of mating. You can then just vacuum the dead ants. In short, they are harmless little creatures that can do without your attention.
|
0.9999 |
Fun Dessert Alternatives to Wedding Cake!
A big trend at weddings the last few years is replacing wedding cakes with dessert bars. Wedding cakes are expensive and don't always taste great. Plus, most people won't stop to grab a slice to eat so you face the possibility of having tons of cake leftover. Here are some fun and easy alternatives to plain old wedding cake!
1. Mini Desserts: People love being able to just grab their desserts and head back to the dance floor. Mini (or bite size) goodies gives them this chance. This will also give you the option of having different varieties of desserts instead of just one thing. Some options include mini cupcakes, mini pies, mini cheesecakes and baby tarts.
2. Ice Cream: Ice cream is the best way to cool your guests down at a warm summer wedding. You can have your favorite ice cream shop cater or build your own ice cream bar. Pick out a a few of your favorite flavors, grab some fun toppings and let the guests build their perfect sundae!
3. Chocolate Covered Strawberries/Rice Krispies/Macaroons: Some other fun and cute alternatives for your guests to munch on. The strawberries can be dressed up a bride and groom. Macaroons come in all sorts of fun colors that you can match to your color scheme! Still want a cake? You can turn all of these desserts into a fun and original cake!
4. Smores: Who doesn't love roasting smores? Ask your caterer to help you set up a couple sternos and put together a smores bar with chocolate, marshmallows and graham crackers. Your guests will have a blast custom making their own treats!
5. Traditional: A great way to celebrate you or your significant other's heritage is by serving a traditional dessert from their native land. Italian cannolis, Greek desserts like baklava, honey pie and loukoumades and croquembouche (a popular French dessert) are all unique options. Look up what each country would traditionally serve at a wedding or special occasion and then talk to your local bakery (or better yet, find a traditional bakery near you). Your guests will love trying something new all while celebrating your heritage.
6. Whoopie Pies/Ice Cream Sandwiches: Great grab and go desserts. They can be pre-made or the guests can choose their favorite cookies and pick the ice cream/cream filling and make their own!
7. Cake Pops/Pie Pops: Still want cake at the wedding but want something fun and different? Cake pops (or pie pops) are the perfect compromise. You can still have all your favorite flavors and give them cute designs, while your guests can enjoy a one bite dessert!
8. Bundt Cakes: Bundt cakes are the new, fun alternative to a traditional cake. They come in all shapes and sizes, including bite sized bundtinis. People go wild over these delicious desserts! Make sure to save some for yourself, because these will all be gone by the end of the night!
9. Pie: Cherry, strawberry, blueberry, lemon meringue, the possibilities are endless with pie! This dessert works great at a rustic location like a barn. They make mini pies also for easy eating. Make sure to calculate how many pies you will need with the amount of people coming (how many slices per pie) so you don't run into to many leftovers.
10. Donuts/Cronuts: The newest dessert trend happening at weddings and people are loving it! Make donut towers, donut cakes, pick your favorite flavors and toppings. There are tons of fun options for your guests to enjoy!
What's Trending for 2016 Weddings?!
It's a new year and that means a whole new round of wedding trends! Time to explore some of the great new ideas popping up!
1. Metallic Everywhere! From the invites, to the bridesmaids dresses and even the table linens, metallic is the new, trendy look for 2016 weddings. Metallic colors can go with any time of year and can blend in well we almost any color palette. It adds elegance and whimsy no matter what the theme of the wedding.
2. Wedding Dress Styles! Tea length gowns are big this season. Illusion necklines, keyhole backs and V-necks are also huge trends for bride's in 2016. The biggest trend for bridal gowns seems to be original/unusual styles. Bride's are showing off their personalities more and more in their bridal gowns.
3. Hand Written Invites! Handing writing your invitations can add a wonderful personal touch to the day. Custom paper is big this year also and can help represent the couple in a number of ways (think invites shaped as iconic buildings or states). A fun alternative to the normal invites.
4. No Travel Destination Weddings! Can't afford to have your wedding in your favorite city? Not a problem! This year's trend is to bring your favorite destination location to your current location. You can incorporate elements from special places through decor, music or food. Eiffel Tower centerpieces, Moroccan food or Irish step-dancing are just some of the ways to highlight your favorite places without the travel expenses.
5. Naked Cake! More delicious and unique than it sounds, naked cakes are a HUGE trend in 2016. Naked cakes are unfrosted or partially-frosted cakes, decorated with flowers or berries. They add a beautiful, rustic look to the wedding and will be a fun talking point for your guests.
6. Lights, lights and more lights! The more lights the better in 2016. Couple's are adding as much lighting as possible to their special day. From chandeliers to strings and bulbs to hundreds of candles, people are getting creative with how and where to hang their lights.
7. Bright Colors! Warm color pallets will always be trendy for weddings, but 2016 is all about bright and vibrant color pallets! Think reds and oranges and yellows. You can add a splash of color here and a pop of color there or have the whole wedding covered in bright hues!
8. Garden Flowers/Unconventional Flowers/Non-Floral Centerpieces! Flowers are expensive. A great way to save money in 2016 is to head to the farmers market and pick up whatever is available. You can have fun making the arrangements and save some money. Unconventional flowers, such as succulents, ferns and herbs, are big this season as well. Another great way to save money on flowers? Don't use them. Having a non-floral centerpiece, like candles or pictures, is unique and cheap.
9. Table Alternatives! Round tables are becoming a thing of the past. Couple's are now leaning towards using square, rectangle and even banquet tables for their wedding's. Farm tables are another great alternative. They are beautiful all on their own, saving you money on linens and elaborate centerpieces.
10. Food Options/Craft Beer/Dessert Alternatives! Dietary restrictions are on the rise so it is important to offer options for your guests. Gluten free, vegan or lactose free, to name a few. Most caterers are good about working with you to create a menu that will please everyone. Craft beer is booming this year and makes it the perfect time to incorporate it into your big day. Bring the beer garden to your reception! Big in 2016 is alternate dessert options. People are moving away from just having wedding cake (or from having the cake at all). Donut bars, make your own sundae stations and cupcakes are very in trend this year.
11. Candid Shots & Videography! Posed wedding photos are great, but what's big this wedding season are the candid shots. Mom wiping away her tears, dad seeing his little girl in her dress for the first time, or a stolen moment between the couple. These are the real moments that make a wedding special. Want to relive your big day over and over? Videography is the best way to make that happen. Most videographers will cut together a highlight reel of the day and give you the raw footage.
We hate SPAM and will protect your information.
Want to see photos or weddings we just did and get great tips on everything from seating assignments to decor?
|
0.99983 |
We hate to break it to you, but winter is just getting started. And if you learned anything from January's polar vortex it's that you can't let another year go by without investing in cold-weather gear that'll, ya know, actually keep you warm. Luckily, you don't have to splurge too much: has select boots from popular brands like SOREL, Columbia, and UGG on sale for up to 40% off. In other words, if you've been waiting for the perfect moment to buy a new pair, now's the time.
With a perfect five-star rating on Zappos, these wedges seamlessly blend function (waterproof leather) and fashion (3-inch heel).
What reviewers are saying: "If you are on the fence, just go ahead and buy them. You will not regret it. It's comfortable from the start. I can't tell that I am wearing something with a heel."
One of the top sellers on Zappos, this waterproof pair from SOREL has a Sherpa Pile™ snow cuff to keep your ankles nice and toasty while you're outside shoveling.
What reviewers are saying: "The best winter boot I've ever owned! I have long skinny feet and plantar fasciitis so it's extremely hard for me to find shoes that work for me let alone a winter boot but I think this is it!"
When it comes to kids' winter boots, these take the top spot: They're easy to pull on, extremely warm, and have a reflective logo for safety.
What reviewers are saying: "We recently bought these for a longer adventure in the Sierras where it has dumped a ton of snow. Our 8 year old used these several days in a row, in knee deep snow, and stayed dry, warm, and happy every day."
This affordable option from SOREL is insulated with Thinsulate to withstand frigid temperatures down to -25°F.
What reviewers are saying: "No more granny shuffle! These boots are incredible. They feel like ski boots with blown-in insulation and extremely flexible."
For a chic yet casual option, consider these leather ankle boots from UGG, which come in brown, black, and various suede options.
What reviewers are saying: "These are great for casual and for dressy occasions. They are very comfortable. Highly recommend!"
Here's proof that you can keep warm and look cool at the same time.
What reviewers are saying: "These are perfect for living in a place where it snows a lot as the shoe gets a little warm. Very comfortable and very stylish — I get compliments all the time!"
These heavy-duty snow boots are made with Omni-Heat technology and Omni-Tech, which means they reflect body heat and lock out moisture.
What reviewers are saying: "The reviews were right on the money, they're like wearing sneakers instead of clunky boots. I feel like I can run a marathon in them, which is incredible since I would never be able to run a marathon even in actual sneakers."
Although they're not necessarily a solid snow day option, these fur-lined boots from UGG are a classic for a reason: they're seriously cute and comfortable.
What reviewers are saying: "My toddler was warm, waterproof/snow proof and comfortable all winter! Would highly recommend and buy again!"
A cheaper alternative to the popular L.L. Bean Boots, this classic style is perfect year-round, especially in wet, rainy weather.
What reviewers are saying: "High enough to keep your feet protected but not so much that they feel overwhelming or constricting. I've walked all through Central Park in these and might as well have been wearing sneakers. So comfortable!"
Go for a vintage look with these herringbone boots. The best part: They'll keep your feet warm and dry down to -40°F.
What reviewers are saying: "The boots are great. They're warm, comfortable, and have decent arch support. Plus I can trudge in the snow and go to a bar in them without looking like a fool."
Sadly, your tried-and-true UGG boots aren't always work appropriate. This leather and wool pair, though, totally is. One thing: Go up at least half a size because they run small.
What reviewers are saying: "Like everyone said, it takes a little work to get them on, but otherwise I really like them. Same Ugg quality but offers more versatility than the classic boot. "
The name says it all: These herringbone and faux fur boots are made to handle arctic-like temperatures.
What reviewers are saying: "I live in Minnesota, it is snowy and cold here in the winter. I know that Sorel does make other boots with higher ratings for colder temperatures than these, but this style is the perfect compromise of fashion and function."
|
0.999997 |
Lambeosaurus was a large herbivore (plant-eater) normally about 30 feet (9.1 meters) long, although a specimen has been found that was 54 feet (16.5 meters) long.
Lambeosaurus lived in North America during the Cretaceous period, about 83 to 65 million years ago, It was one of the dinosaurs that died out in the Cretaceous-Tertiary extinction, 65 million years ago.
Lambeosaurus had two structures on its head: a hollow crest which pointed forward, and a solid bony spike which pointed backward.
Like Corythosaurus, Lambeosaurus was a duck-billed dinosaur, and was a good runner that probably lived in herds.
North American Dinosaurs - Lambeosaurus lived in North America.
Lambeosaurus was a genus of dinosaur.
"Lambeosaurus" means "Lambe's lizard". The name was chosen in 1923 by William Parks, and is in honor of Lawrence Lambe who had previously studied the animal.
Lambeosaurus was a member of the Ornithischia ("bird-hipped") order of dinosaurs. What this means, is that although Lambeosaurus was not closely related to birds, it did have similarly shaped pelvic bones.
Lambeosaurus was a Hadrosaur (usually known as "duck-billed dinosaur") - a member of a group of related herbivorous (plant-eating) dinosaurs that were very successful in the Cretaceous period.
Lambeosaurus lived between about 83 million years ago and 65 million years ago, during the late Cretaceous period.
Lambeosaurus was one of the dinosaurs which died out during the Cretaceous-Tertiary mass extinction at the end of the Mesozoic Era.
Lambeosaurus was a herbivore (plant-eater).
Lambeosaurus was typically about 30 feet (9.1 meters) long, but animals as large as 54 feet (16.5 meters) long have been found.
Lambeosaurus weighed about 5 tons.
|
0.93493 |
This article also mentions 6 other cases.
This case has been waiting for a possible rehearing motion.
This case was awaiting the Court's decision after oral argument between September 3, 2015 and November 20, 2015.
This case was waiting for oral argument between May 8, 2015 and July 3, 2015.
This case was waiting for oral argument between March 13, 2015 and May 8, 2015.
Is the former owner of a chemical plant shielded from design-defect claims by the statute of repose?
A technician at a chemical plant was injured by the failure of a device used to handle acid. The device had been built into the facility by its prior owner, Occidental, who fourteen years prior had designed the device and worked with a contractor to build it. Six years later, and eight years before the injury, Occidental sold the plant.
The lawsuit focused on the allegedly defective design, which was alleged to have been the work of an unlicensed very junior engineer. The question on appeal is what responsibility is owed by Occidental, as the former owner of the property who designed the device that caused the injury. Occidental frames this as a premises-liability concern, for which it says the former owner should not be liable. Occidental also argues that it should be protected by a 10-year statute of repose for those who construct improvements on real estate. Jenkins responds, in part, that Occidental's role in designing the device sets this case apart from situations where a contractor just implements another's design.
|
0.999623 |
How do I get to Marseille?
Marseille city centre is just a 15 minute train journey from its airport.
The city is also easily accessible by rail from the rest of France.
|
0.995329 |
Like chop suey, fortune cookies are an American invention. They originated in California, but who the actual inventor was, and which city in California is the true home of the fortune cookie, has continued to be a matter of debate. Unequivocally not Chinese, the fortune cookie may in fact not even be Chinese American.
Chinese or Japanese, Angelino or San Franciscan?
One history of the fortune cookie claims that David Jung, a Chinese immigrant living in Los Angeles and founder of the Hong Kong Noodle Company, invented the cookie in 1918. Concerned about the poor he saw wandering near his shop, he created the cookie and passed them out free on the streets. Each cookie contained a strip of paper with an inspirational Bible scripture on it, written for Jung by a Presbyterian minister.
Another history claims that the fortune cookie was invented in San Francisco by a Japanese immigrant named Makoto Hagiwara. Hagiwara was a gardener who designed the famous Japanese Tea Garden in Golden Gate Park. An anti-Japanese mayor fired him from his job around the turn of the century, but later a new mayor reinstated him. Grateful to those who had stood by him during his period of hardship, Hagiwara created a cookie in 1914 that included a thank you note inside. He passed them out at the Japanese Tea Garden, and began serving them there regularly. In 1915, they were displayed at the Panama-Pacific Exhibition, San Francisco's world fair.
In 1983, San Francisco's pseudo-legal Court of Historical Review held a mock trial to determine the origins of the fortune cookie. (In the past, the Court had ruled on such pressing topics as the veracity of Mark Twain's quote, "The coldest winter I ever spent was a summer in San Francisco" and the origins of the Martini. *) To no one's surprise, the judge (a real-life federal judge from San Francisco) ruled in favor of San Francisco. Included among the evidence was a fortune cookie whose message read: "S.F. Judge who rules for L.A. Not Very Smart Cookie." Equally unsurprising, Los Angeles has denounced the ruling.
Fortune cookies became common in Chinese restaurants after World War II. Desserts were not traditionally part of Chinese cuisine, and the cookies thus offered Americans something familiar with an exotic flair.
Although there have been a few cases reported of individuals actually liking the texture and flavor of fortune cookies, most consider the fortune to be the essence of the cookie. Early fortunes featured Biblical sayings, or aphorisms from Confucius, Aesop, or Ben Franklin. Later, fortunes included recommended lottery numbers, smiley faces, jokes, and sage, if hackneyed, advice. Politicians have used them in campaigns, and fortunes have been customized for weddings and birthday parties. Today messages are variously cryptic, nonsensical, feel-good, hectoring, bland, or mystifying.
Fortune cookies were originally made by hand using chopsticks. In 1964, Edward Louie of San Francisco's Lotus Fortune Cookie Company, automated the process by creating a machine that folds the dough and slips in the fortune. Today, the world's largest fortune cookie manufacturer, Wonton Food Inc. of Long Island CIty, Queens ships out 60 million cookies a month.
*After being served a Martini on the bench, the judge enthusiastically ruled that San Francisco was the home of the famous cocktail. The city of Martinez, California, appealed the ruling.
|
0.991545 |
Transposer chacune des phrases suivantes au futur.
I play tennis with Joe.
Jack isn't happy with that idea.
Lucy and Judith walk to school.
Max is wearing his black suit.
Kim plays tennis with Paul.
|
0.999925 |
I offer you four possible ways to celebrate your secular holidays in community.
According to the Pew Forum on religion and public life, the non-religious demographic is the largest growing segment of society. This includes atheists, agnostics, humanists, and people who otherwise might be atheists but don't necessarily embrace the label. Many developed countries already have an atheist majority, and a recent study published by BBC News even predicts the future extinction of religion in nine countries, based on current trends.
Yet, there is ample consensus that an atheist would not be able to win an election in America. One would think that this portion of society would have more visibility and clout, but things are changing. Secularist funeral, marriage and baby naming ceremonies are becoming more commonplace, there are humanist chaplains in many universities, a humanist temple is being planned for London, and there's even a secular scripture that has been authored by philosopher A. C. Grayling.
But one of the main challenges of new secularists coming out of the closet is figuring out what to do with themselves during the holidays. There is at times huge social pressure to have some kind of winter solstice celebration, so much so that Hanukkah, which was previously not a very important celebration, became relevant as an alternative to Christmas in the US and now Hindus in the West have even proposed their own diasporic holiday, the Pancha Ganapati, so that their children may also not miss out on presents while remaining within their cultural context.
The HumanLight holiday was created some years back by members of the New Jersey Humanist Network as their specific alternative to other winter solstice festivals that celebrate the return of light during the darkest night of the year in the northern hemisphere. Humanism is a progressive ideology that focuses on human values rather than religious values and, although there are humanist Christian and Jewish groups, most humanist organizations are fiercely secular.
The ceremonial aspect of HumanLight is quite simple: three candles are thoughtfully lit in celebration of the three principles of Reason, Compassion and Hope. HumanLight celebrations are generally organized by local humanist organizations and feature food, music, a cultural program and, of course, gift giving.
A second alternative, for people of African ancestry, is to celebrate Kwanzaa, a modern cultural creation which focuses on African culture, continuity, and community. It incorporates gifts exchange but encourages the personal creation of these gifts rather than consumerism. Kwanzaa festivities that I've attended have featured theatrical performances, music and Ethiopian and other African food. Like other winter solstice festivals, the main feature is the lighting of candles which represent the Seven Principles of Kwanzaa: Unity, Self-determination, Collective Work and Responsibility, Cooperative Economics, Purpose, Creativity, and Faith.
Another alternative is to participate in secular festivities that are rooted in religiously inspired variations. There are numerous humanist Jewish congregations which celebrate the cultural aspects of Judaism without affirming its supernatural claims, as well as Unitarian congregations which feel and act much like Christian churches and celebrate their Christian roots but place no emphasis on faith, and in fact embrace doubt and welcome atheists. These congregations dedicate themselves to building community rather than requiring the mental slavery of their adherents.
A fourth option, of course, would be to just have a small, intimate gathering of like-minded friends and family. In the progressive Epicurean tradition, one might embrace the simplicity of good cheese, good bread, good friends, wholesome philosophical conversation and good wine as the best way to spend the holidays.
The point is that it's no longer necessary for a non-religious person to spend the holidays in isolation, or to feel as if the holidays have to be a time to recede back into the atheist closet.
|
0.952019 |
The immune system is a key biological system present in vertebrates. Exposure to pathogens elicits various defensive immune mechanisms that protect the host from potential threats and harmful substances derived from pathogens such as parasites, bacteria, and viruses. The complex immune system of humans and many other vertebrates can be divided into two major categories: the innate and the adaptive immune systems. At present, analysis of the complex interactions between the two subsystems that regulate host defense and inflammatory responses remains challenging.
Based on time-course microarray data following primary and secondary infection of zebrafish by Candida albicans, we constructed two intracellular protein–protein interaction (PPI) networks for primary and secondary responses of the host. 57 proteins and 341 PPIs were identified for primary infection while 90 proteins and 385 PPIs were identified for secondary infection. There were 20 proteins in common while 37 and 70 proteins specific to primary and secondary infection. By inspecting the hub proteins of each network and comparing significant changes in the number of linkages between the two PPI networks, we identified TGF-β signaling and apoptosis as two of the main functional modules involved in primary and secondary infection.
Smad7, a member of the inhibitor SMADs, was identified to be a key protein in TGF-β signaling involved in secondary infection only. Indeed, the Smad7-dependent feedback system is related to the TGF-β signaling pathway and the immune response, suggesting that Smad7 may be an important regulator of innate and adaptive immune responses in zebrafish. Furthermore, we found that apoptosis was differentially involved in the two infection phases; more specifically, whereas apoptosis was promoted in response to primary infection, it was inhibited during secondary infection.
Our initial in silico analyses pave the way for further investigation into the interesting roles played by the TGF-β signaling pathway and apoptosis in innate and adaptive immunity in zebrafish. Such insights could lead to therapeutic advances and improved drug design in the continual battle against infectious diseases.
Immunity is the natural capability of the body to resist and defend against invasion by pathogenic microbes. In vertebrates, the immune system can generally be divided into two main categories: the innate immune system and the adaptive immune system . The former is responsible for nonspecific immune responses and serves as the front line for rapid defense against foreign invading pathogens . In contrast to the innate immune system, the adaptive immune system is composed of highly specialized systemic cells and defensive processes that are capable of preventing, or at least restricting, specific pathogen invasion. The most significant difference between the innate and adaptive response is that adaptive immunity results in the formation of immunological memory after an initial response to a specific pathogen, leading to an enhanced immune response upon subsequent exposure to the same pathogen.
The zebrafish (Danio rerio) has become a powerful model organism for biomedical research in recent years because if its high reproductive rate and low maintenance cost . Indeed, the use of zebrafish to study immunity against infectious disease, including those due to bacterial or viral infections, is rapidly increasing ,. Importantly, zebrafish possesses both innate and adaptive immune systems, making it a particularly suitable model organism for investigating immune mechanisms in vertebrates and mammals .
Candida albicans, a fungal pathogen that grows as both yeast and filamentous forms, causes opportunistic oral and genital infections in humans . Notably, the ability of C. albicans to adapt to diverse environmental changes, including fluctuations in temperature, nutrients, and pH levels, renders it relatively difficult to treat in hosts . Thus, understanding how the zebrafish immune system responds to C. albicans infection is crucial to the development of novel therapeutic strategies against infectious diseases in humans.
The transforming growth factor-β (TGF-β) signaling pathway is essential in regulating the immune response to combat infection , and defective TGF-β signaling leads to several systemic autoimmune defects. In the canonical pathway, TGF-β signaling mediates its effect through the SMAD pathway . Several studies have revealed that TGF-β signaling suppresses immune responses ,,. Conversely, however, immune cells can also promote TGF-β signaling . Thus, the molecular mechanisms involved in the TGF-β signaling pathway, which regulates host tolerance as well as innate and adaptive immunity, are important areas for study. Nevertheless, the complex role of TGF-β signaling in maintaining the balance of the immune system remains poorly understood.
In this study, our main objective is to identify the key proteins or functional modules involved in the zebrafish immune response toward primary and secondary infection with C. albicans. By constructing two zebrafish intracellular PPI networks for primary and secondary infection, we seek to compare and identify the key proteins, molecular processes, and mechanisms between these two infection phases. In particular, we hope to elucidate the roles of TGF-β signaling in innate and adaptive immune responses.
The method used to construct the dynamic intracellular PPI networks was divided into three key steps: (i) data selection and preprocessing, (ii) selection of the target protein pool, and (iii) construction of the refined PPI networks for zebrafish. The overall framework for the proposed method is depicted in Figure 1.
Flow chart describing the construction of the zebrafish intracellular PPI network. One-way ANOVA was applied to select the target protein pools. PPIs of Homo sapiens data were obtained from the BioGRID database, and orthologous information between zebrafish and H. sapiens was extracted from the InParanoid database. By using a dynamic model, we were able to construct the candidate PPI networks for zebrafish. As these candidate PPI networks could not truly represent the intracellular PPIs in zebrafish, we used interaction ability identification to determine the significant interactions. The refined intracellular PPI networks could thus be constructed from these significant interactions.
Our strategy was to collect first all intracellular protein interactions into a candidate intracellular PPI network for zebrafish. The candidate intracellular protein interaction network was further validated and pruned since it could not exactly represent the actual intracellular protein interactions in C. albicans infection. A dynamic model was used to describe the candidate intracellular protein interactions. By using microarray data for C. albicans-infected zebrafish, the interaction abilities in the dynamic model could thus be determined. Significant PPIs based on these interaction abilities were thus identified to obtain the refined intracellular PPI. The same procedure was applied to construct the zebrafish intracellular PPI network for primary and secondary infection on the basis of time-course microarray data obtained from the corresponding experiments. Details of procedures used to construct the dynamic intracellular PPIs of zebrafish are described in the following sections.
Three types of data were used in our proposed method: (i) time-course microarray profiles of gene expression of C. albicans-infected zebrafish, (ii) PPI data of H. sapiens, and (iii) orthologous gene data between zebrafish and H. sapiens. There were two sets of time points for primary and secondary C. albicans infection for obtaining microarray time-profile data for zebrafish gene expression (primary infection: 1, 2, 3, 6, and 14 dpi; secondary infection: 14.1, 14.25 14.5, 14.75, 15, 15.25, 15.5, and 16 dpi; see Figure 2). Manipulation of the animal model was approved by the Institutional Animal Care and Use Committee of National Tsing Hua University (IRB Approval No. 09808). The PPI data of H. sapiens were extracted from the Biological General Repository for Interaction Datasets (BioGRID) database (http://thebiogrid.org/) . The gene ortholog data of zebrafish and humans were obtained from the InParanoid database (http://inparanoid.sbc.su.se/) . For both primary and secondary infection, one-way analysis of variance (ANOVA) was applied to the microarray time-series profile of gene expression to select for differentially expressed proteins. The p-value was set at 0.01 with Student t-test for the protein pool selection. Here we treat proteins' expression as the corresponding genes' expression and view the gene pool as the protein pool. A total of 422 and 1284 proteins were thus identified as differentially expressed for primary and secondary infection, respectively. After these target protein pools for primary and secondary infection were determined, candidate PPI networks were constructed on basis of the protein pool and PPI information available from data mining. There were a total of 420 and 2312 PPI interactions included in our candidate network by integrating multiple databases (BioGRID and InParanoid7).
The bar depicts time points at which data were collected to construct the zebrafish intracellular PPI networks for primary and secondary infection. For primary infection, zebrafish were injected with 1 × 105 CFU C. albicans, and time-course microarray data were collected at 1, 2, 3, 6, and 14 dpi. After 14 days, zebrafish were injected with 1 × 107 CFU C. albicans. The time points of the time-course microarray data for secondary infection were 14.1, 14.25, 14.5, 14.75, 15, 15.25, 15.12, and 15.6 dpi.
These candidate PPI networks were obtained by including all available PPI interactions, which cannot truly represent the zebrafish intracellular PPI networks under our experimental settings. Hence, false-positive PPIs were removed on the basis of our experimental data with the help of dynamic modeling of PPI networks.
where pk(t) represents the protein activity level for the k-th zebrafish target protein at time t. We denote Mk as the number of PPIs in zebrafish for the k-th target protein; Kk denotes the degradation effect for the k-th zebrafish target protein; pm[t] denotes the protein activity level for the m-th zebrafish protein that can potentially interact with the k-th target protein, and bkm denotes the corresponding interaction ability between the two proteins. The basal level is denoted by qk, and the stochastic noise due to model uncertainty and fluctuation of the microarray data is represented by nk(t).
where parameters can be identified by solving a constrained least-squares problem. After the parameters were identified, Akaike's information criterion (AIC) was used to select significant PPI interactions . The AIC includes both the estimated residual error and model complexity in one statistic. This value increases as the number of parameters increases and decreases as the variance of the residual error decreases. However, the variance of the residual error may decrease with increasing number of parameters. In other words, there exists a tradeoff between estimation accuracy and model complexity. Appropriate model order and significant interactions can be determined by ranking models by increasing AIC. By following these procedures, the intracellular PPI networks for zebrafish were thus constructed.
We identified 57 proteins and 341 PPIs in the constructed zebrafish intracellular PPI networks during the primary infection, and 90 proteins and 385 PPIs during the secondary infection (see Additional file 1 for the complete networks). A comparison between the two constructed networks indicated that there were 20 proteins that were common to both PPI networks and 37 and 70 proteins that were specific to primary and secondary infection, respectively (see Additional file 1 for complete PPI network lists and figures).
The functions of the 37 proteins that were specific to primary infection were mapped to the following main biological processes: metabolic processes (30.1%), cellular processes (14%), cell communication (10.3%), the cell cycle (8.8%), and the immune response (6.6%). Similarly, the 70 proteins identified to be specific to secondary infection were involved in metabolic processes (26.1%), cellular processes (16.7%), cell communication (13%), developmental processes (9.1%), and transport (5.1%).
To uncover meaningful implications or insights of the constructed PPI networks, we conducted centrality analysis for both intracellular PPI networks. In particular, we considered three common network centralities, i.e., node degree and betweenness centrality.
For our two constructed zebrafish intracellular PPI networks, 57 and 90 target proteins were identified in primary and secondary C. albicans infection, respectively. The top-ranking hub proteins selected by node degree are listed in Tables 1 and 2, which also include the potential roles that they play during primary and secondary infection. Several proteins during primary infection that were identified are related to immunity according to their Gene Ontology (GO) functional annotations. For example, Gch2, which involves in adaptive immunity and responds to interferon (IFN)-γ stimulation, was identified to be a hub protein. Another hub protein in primary infection is Hsp90a.1, which is involved in Fc-γ receptor signaling. It is interesting to see that Fc-γ receptor signaling may play an important role in antigen presentation in primary C. albicans infection in zebrafish.
We further calculated betweenness centrality for each node in both PPI networks. Betweenness measures the number of passing shortest paths through a node . We listed top 10 proteins ranked by betweenness centrality for both primary and secondary infection PPI networks in Table 3. Generally speaking, many hub proteins selected based on node degree during primary infection were also selected based on betweenness centrality. During secondary infection, however, only one hub protein that has a node degree larger than 9 was selected based on betweenness centrality. This is because the PPI network for primary infection is more condensed than the PPI network for the secondary infection. During primary infection, hub protein such as Elavl1, Btg2, Fkbp5, Hug, Hsp90a.1 are also top in the betweenness ranking. Zgc:63606 connects to two hub proteins Elavl1 and Hug, leading to a large betweenness centrality. Similarly, Zgc:153257 is the bridge between two subnetworks, leading to a larger betweenness. Although high in betweenness centrality ranking, these two zebrafish proteins are still unknown in function and may be good candidates for future experiment to verify their relations with immunity. In the case of secondary infection, since the PPI network is more dispersed and contains lots of small networks without a connection to the main network, the betweenness centrality ranking is dominated by the nodes in the main network. Lots of hub proteins with a high degree are not in the top list ranked by betweenness since they are located at the smaller subnetworks that are not connected to the main network, leading to a smaller number of total passing shortest paths through these proteins. On the other hand, despite Tp53, Dhfr and Hspd1 have only a degree of 2, they act as bridges between subnetworks within the main network, leading to a larger betweenness and may potentially be important candidates for further investigation.
This section focuses on the 20 identified proteins that were common to both primary and secondary infection in our constructed PPI networks. To identify the proteins that play crucial and distinct roles in innate and adaptive immunity, we compared the PPI linkages between primary and secondary infection for each of these common proteins. On the basis of the number of changes in the PPI linkages, these proteins were ranked to identify the top ten proteins whose PPI linkages differed most significantly between primary and secondary infection (Table 4).
Acvr1b (ALK4, activin receptor type 1B) was identified to be a hub protein in both primary and secondary infection (Tables 1 and 2). Activins are members of the TGF superfamily that act as local regulators of biological processes and are associated with cell growth and differentiation . Correspondingly, activin is crucial to the control of innate and adaptive immune responses .
To regulate the immune response, TGF-β mediates its effects via SMAD proteins . To clarify the role of TGF-β in the innate and adaptive immune response, we focused on the protein interactions of SMAD proteins and Acvr1b in primary and secondary infection, and compared the differences between initial and recurring infections. In primary infection, the SMAD protein Smad2 was found to interact with Acvr1b; whereas in secondary infection, Smad2, Smad3, and Smad7 were found to interacted with Acvr1b. The SMAD proteins can be divided into three major groups according to their function: receptor-regulated SMADs (R-SMAD), the common mediator SMAD (Co-SMAD), and inhibitory SMADs (I-SMAD) . The R-SMADs Smad2 and Smad3, which, upon phosphorylation, interact with Co-SMAD and translocate to the nucleus , were identified as key proteins in primary and secondary infection. However, Smad7, an I-SMAD, was found to interact with Acvr1b during secondary, but not primary, infection (Figures 3 and 4).
Interactions of Acvr1b with other proteins in primary infection. Acvr1b was identified to be a hub protein during both primary and secondary infection. The R-SMAD Smad2 was found to be a key protein in primary infection. The identification of R-SMAD in both primary and secondary infection suggests that the activation of TGF-β signaling requires the SMAD pathway.
Interactions of Acvr1b with other proteins in secondary infection. Acvr1b, Smad2 and Smad3 were found to be important in secondary infection. Smad7, an inhibitory SMAD protein, interacted with Acvr1b in secondary but not primary infection. This disparity suggests that TGF-β signaling may play a role in the control of innate and adaptive immune responses.
Smad7 has been reported to play an essential role in the negative regulation of TGF-β signaling by interfering with the binding of TGF-β to type I receptors . Furthermore, we compared the expression profile of Smad7 over time during primary and secondary infection to see if there was a significant change in between infections (Figure 5).
The expression profile of Smad7 in primary and secondary infection. Upon comparing the time course of Smad7 expression between the primary and secondary infection, it is clear that Smad7 expression remained stable in primary infection. During secondary infection, however, the level of Smad7 expression increased significantly by an average of 14%. This difference suggests that Smad7 may play a key role in the control of innate and adaptive immune responses.
The time course of Smad7 expression showed a significant increasing trend of inhibitory Smad7 expression during secondary infection, suggesting that TGF-β signaling is suppressed in secondary infection relative to primary infection. This is in agreement with previous findings suggesting that Smad7 is involved in the reciprocal inhibition of TGF-β and IFN-γ .
In the reciprocal inhibition of TGF-β and IFN-γ, Smad7 is the key component responsible for polarizing responses toward either immunity or tolerance to infection. More specifically, although Smad7 can suppress the TGF-β signaling pathway to initiate infection tolerance, it can also promote immunity triggered through the IFN-γ signaling pathway. This is of interest, as the dual role of Smad7 in determining whether immunity or pathogen tolerance occurs is suggestive of a key mechanism that controls the immune response.
The gene expression time course in primary and secondary infection showed that Smad7 expression, which is at basal level in primary infection, increased rapidly during secondary infection (Figure 5). The difference in Smad7 expression between the primary and secondary infections may indicate that after initial low-dose infection, the zebrafish immune system was able to tolerate the invading pathogen, thereby shifting the immune response toward infection tolerance. However, in secondary infection with a lethal pathogen dose, increased Smad7 expression suggests that the immune response is triggered to defend against the invading pathogen; thus, the pathway responsible for infection tolerance is inhibited in this phase (Figure 6).
Smad7 is the key for the regulation of tolerance and immunity. Figure 6-1: A previous study has reported that Smad7 is a mediator that controls the tolerance and immunity pathways . The time course of Smad7 expression demonstrated a significant increase during secondary infection, suggesting that in zebrafish injected with a higher pathogen dose, the immune response was triggered to defend against the invading pathogen rather than to promote infection tolerance. Figure 6-2: According to a previous study , the regulation of TGF-β, the innate immune response, and the adaptive immune response may be considered as a feedback system. Figure 6-3: Smad7 was found to be a key protein during secondary infection. Smad7 attenuates TGF-β-mediated inhibition of cells in the adaptive immune system, resulting in the proliferation of T and B cells that promote host defense by the adaptive immune system challenged with a higher dose of the pathogen.
In addition, TGF-β has also been suggested to inhibit the function of inflammatory cells and immune responses ,. The regulation of TGF-β and its relationships with various immune cells are depicted in Figure 6. Under normal conditions, there is a feedback system that characterizes the relationship between the TGF-β pathway, the innate immune response, and the adaptive immune response (Figure 6). Even though immune cells can secrete cytokines that promote TGF-β signaling, TGF-β signaling can inhibit activation of these immune cells, thus acting as a feedback system. Smad7 during secondary infection was found to suppress TGF-β signaling, leading to attenuated inhibition of immune cells (Figure 6). Consequently, the increased proliferation of immune cells such as T and B cells in the adaptive immune response promotes defense against the invading pathogen.
In summary, the identification of Acvr1b in primary and secondary infection suggests that TGF-β signaling is indeed involved in the control of innate and adaptive immune responses. Furthermore, the discovery that Smad7 interacted with Acvr1b only during secondary infection suggests that TGF-β controls immune responses via a SMAD-dependent pathway. Therefore, the control mechanism can be described as a feedback system involving TGF-β signaling and the adaptive immune response (Figure 6).
Psmd1 and Psmd13, 26S proteasome regulatory subunits, were identified to be significant primarily during secondary infection. Proteasomal activity has been shown to be related to inflammatory and autoimmune diseases such as systemic lupus erythematosus and rheumatoid arthritis because of its role in activating an anti-apoptotic and pro-inflammatory regulator of cytokine expression . Therefore, the identification of Psmd1 and Psmd13 in our constructed intracellular PPI networks for secondary infection indicates that the proteasome system plays a pivotal role in the zebrafish immune response. Furthermore, the numbers of linkages from primary to secondary infection for both Psmd1 and Psmd13 increased significantly, suggesting that the proteasome is more active during secondary infection, and is therefore more important in the adaptive immune response of zebrafish.
Many of the ten most significant hub proteins discussed above are related to the apoptotic process, as shown in Table 1. Further investigation revealed that apoptosis was activated during primary infection but was inhibited during secondary infection. In our constructed zebrafish intracellular PPI networks, we identified three proteins (Casp2, Acvr1b, Hsp90a.1) that were involved in apoptosis out of the ten hub proteins (Table 4).
For Casp2, the number of linkages increased significantly during secondary infection relative to the number during primary infection. The caspase family of proteins has a dominant role in activating apoptosis . Analysis of Casp2 protein interactions revealed that it interacted with Bcl2 during secondary but not primary infection (Figures 7 and 8). Bcl2 is a member of the Bcl2 family that regulates cell death by inhibiting the apoptotic process . Thus, the finding that Casp2 and Bcl2 interacted during secondary infection suggests that apoptosis is suppressed during secondary infection, in contrast to the induction of apoptosis during primary infection.
Protein interactions of caspase 2 in primary infection. Caspase 2 was identified to be a hub protein during both primary and secondary infection. Bcl2, an anti-apoptotic protein, did only interact with Casp2 during primary infection.
Protein interactions of caspase 2 in secondary infection. Caspase 2 was identified to be a hub protein during both primary and secondary infection. Bcl2, an anti-apoptotic protein, only interacted with Casp2 during secondary infection, suggesting that the apoptotic process is inhibited in secondary infection.
Acvr1b, a type 1B activin receptor, has been shown to be related to the apoptotic process in both primary and secondary infection. Activins are members of the TGF-β superfamily and are local regulators of biological processes that are associated with cell growth and differentiation . The TGF-β pathway is also involved in inducing apoptosis and the SMAD family of molecules act as key signal transducers during this apoptotic process . Smad7 protein was found to interact with Acvr1b during secondary but not primary infection (Figures 3 and 4). Smad7 is an inhibitory protein that interferes with the phosphorylation of pathway-restricted SMAD proteins such as Smad2 and SMAD3 by binding to type I receptors ,. Therefore, the interaction between Acvr1b and Smad7 supports our observation that apoptosis is inhibited during secondary C. albicans infection.
Hsp90a.1, a heat shock protein, was identified to be a key hub protein in the zebrafish intracellular PPI networks. The number of its linkages increased significantly from primary to secondary infection. Hsp70 and Hsp90 directly interact with proteins regulating the programmed cell death machinery and thus block the apoptotic process . The identification of Hsp90a.1 as an important protein mainly during secondary infection in our constructed network again suggests that apoptosis is inhibited during secondary infection. Furthermore, Hsp90 stabilizes the 26S proteasome (Psmd1 and Psmd13, 26S proteasome proteins that are a part of the ten hub proteins, as listed in Table 4), and thereby enables the cell to remove unwanted or harmful proteins.
In summary, the finding that apoptotic proteins such as Casp2, Acrv1b, and Hsp90a.1 are more prominent during secondary rather than primary infection is intriguing. Increasing evidence supports that apoptosis has a crucial role in innate and adaptive immunity during infection -. Our results indicate that apoptosis was inhibited in secondary but not primary infection, suggesting that during infection, apoptosis can be adopted as an offensive or defensive strategy by the pathogen or zebrafish, respectively.
Ncstn, a part of the γ-secretase protein complex, was found to play a significant role during both primary and secondary infection in our constructed PPI networks. Ncstn can generate a peptide epitope that facilitates immune recognition of intracellular mycobacteria with related components of γ-secretase through MHC II-dependent priming of T cells . Such pathogen recognition mechanisms are crucial to adaptive immunity in the host. The identification of Ncstn during C. albicans infection of zebrafish suggests that Ncstn responds not only to bacterial infection but also to fungal infection.
Taken together, initial investigation of our constructed PPI networks for primary and secondary infection revealed that the immune responses activated after secondary infection are generally stronger. As shown in the in vivo experiment, zebrafish that had been infected with 1 × 105 CFU C. albicans have a higher survival rate and survive longer after secondary infection with a more lethal C. albicans dose (1 × 107 CFU) compared with zebrafish without prior infection (Figure 9). Identification of the aforementioned hub proteins in our constructed zebrafish intracellular PPI networks encouraged us to explore how the zebrafish immune system responds to infection and whether the response differs in primary and secondary infection.
Zebrafish that have activated the adaptive immune response have a higher survival rate following secondary high-dose infection with C. albicans . This figure depicts the zebrafish survival rate versus time. In this experiment, zebrafish had been infected with a non-lethal low dose of the live yeast form of C. albicans (105 CFU) or injected with PBS. Two weeks later, all fish were infected with a higher dose of C. albicans (107 CFU). Zebrafish inoculated with a low dose of C. albicans had a survival time longer than that of the PBS group, demonstrating that zebrafish can activate adaptive immunity to defend against repeated C. albicans infection.
Note that our dynamic modeling approach is not free from errors. False-positive and false-negative interactions in the initial putative PPI network can affect the accuracy of our constructed network. In order to minimize the effect of false-positive interactions, we applied AIC in the last step of network construction to eliminate the false-positive interactions based on model order selection. False-negative interactions are harder to avoid since if a PPI link is missing in the initial putative network, there is no effective method to recover the link. Therefore, we used BioGRID and InParanoid7 database, the most comprehensive PPI database available, to build our initial candidate network. We understand that PPI links may still be missing in BioGRID and InParanoid7. Such error can be improved when more PPI databases are available and can be integrated to form a comprehensive initial putative network.
Using dynamic modeling and time-course microarray data, we constructed intracellular PPI networks for primary and secondary infection of zebrafish with C. albicans. Using these PPI networks, we examined how immune responses in zebrafish are triggered against primary and secondary infection. We identified 341 and 359 intracellular PPIs in the intracellular PPI networks for primary and secondary infection, respectively. Hub proteins of each network were also identified.
By comparing the two constructed PPI networks, the ten proteins with the most significant changes in linkage between primary and secondary infection were determined. These proteins might play crucial roles in the immune response of zebrafish during infection; thus, the biological and molecular processes that these proteins play during primary and secondary infection were investigated.
TGF-β signaling and apoptosis were two of the main functional modules in primary and secondary infection. Smad7, an I-SMAD protein, was found to be important in TGF-β signaling in secondary infection only. Smad7 interferes with R-SMAD phosphorylation and thereby attenuates TGF-β signaling. Therefore, the role of Smad7 in secondary infection suggests that attenuated suppression of immune cells, which enables the adaptive immune response to defend against high-dose secondary infection. We also identified a feedback system that describes the relationship between TGF-β signaling and the immune response.
We discovered several crucial proteins (Casp2, Acvr1b, and Hsp90a.1) associated with apoptosis. As the most significant proteins in secondary infection were involved in the inhibition of apoptosis, the apoptotic process might an important mechanism in the zebrafish immune response against C. albicans, particularly during primary infection.
Our initial in silico analyses encourage further experimental investigation on the pertinent roles played by apoptosis in the innate and adaptive immune response of zebrafish. We believe that new insights revealed by our work may lead to therapeutic advances and improved design of drugs for the continuous battle against infectious diseases.
Male, wild-type AB strain zebrafish were used in the study. Zebrafish were adults approximately 9 months old and weighed 0.33–0.37 g. Fish were maintained in 10 L tanks at 28.5°C under a 14/10 h day/night cycle.
The SC5314 strain of C. albicans was used in this study. A single colony from fresh YPD agar plates (1% yeast extract, 2% peptone, 2% dextrose, 1.5% agar) was inoculated into 5 ml YPD broth and then incubated with shaking at 180 rpm at 30°C for 24 h. Cells were harvested by centrifugation, washed once with sterile PBS or Hank's balanced salt solution (HBSS), and then resuspended in sterile PBS or HBSS. Suspensions of C. albicans cells were diluted with PBS or HBSS and then injected into zebrafish.
Zebrafish were anesthetized by immersion in water containing 0.17 g/ml tricaine (Sigma, USA) and then intraperitoneally injected with 1 × 105 (primary infection) and 1 × 107 (secondary infection) colony-forming units (CFU) of C. albicans at day 0 and 14, respectively, by using a 26.5 gauge syringe (Hamilton Syringe 701 N). After infection, fish were immediately transferred to the tanks to recover immediately and kept in separate 10 L tanks maintained with daily water changes. The tanks were housed in an incubator with a 14/10-h day/night cycle at 28.5°C. The fish were closely monitored and mortality was determined every hour. The phenotypes of infected zebrafish, including bleeding, ulcer/lesion, and dropsy/abnormal swelling, were shown in Figure 10.
The phenotypes of infected zebrafish during the secondary infection. Three typical phenotypes can be observed during the secondary infection, including a. bleeding, b. ulcer/lesion, and c. dropsy/abnormal swelling of ventral position.
C. albicans-infected zebrafish were immersed in Trizol reagent (Invitrogen, USA) and then ground in liquid nitrogen using a small mortar and pestle. The ground sample was then disrupted by using a MagNALyser System (Roche) with glass beads (cat. no. G8772-100G, Sigma), and then shaken at 5,000 rpm for 15 s. After phase separation by addition of chloroform, the total RNA was purified using an RNeasy Mini Kit (Qiagen, Germany). The purified RNA was quantified at an OD of 260 nm wavelength by using an ND-1000 spectrophotometer (Nanodrop Technology, USA) and the RNA quality was analyzed using a Bioanalyzer 2100 (Agilent Technologies, USA) with a RNA 6000 Nanolabchip kit (Agilent Technologies).
Total RNA (1 μg) was amplified using a Quick-Amp labeling kit (Agilent Technologies), and then labeled with Cy3 (CyDye, PerkinElmer, USA) during the in vitro transcription process. For the C. albicans and zebrafish arrays, 0.625 and 1.65 μg of Cy3 cRNA, respectively, were fragmented to an average size of approximately 50 to 100 nucleotides by incubation with fragmentation buffer at 60°C for 30 min. The fragmented and labeled cRNA was then hybridized to an oligomicroarray at 60°C for 17 h. The microarrays were washed, then dried by using a nitrogen gun, and then scanned for Cy3 at 535 nm by using an Agilent microarray scanner (Agilent Technologies, USA). Scanned images were analyzed by Feature Extraction 9.5.3 software (Agilent Technologies), and image analysis and normalization software were employed to quantify the signal and background intensities for each feature. Raw data were uploaded onto the NCBI GEO Database (The array data has been uploaded onto NCBI GEO database with accession number: GSE51603).
The time points of the time-course microarray data for the primary infection were 1, 2, 3, 6, and 14 days post-infection (dpi), and those for secondary infection were 14.2, 14.6, 14.12, 14.18, 15, 15.6, 15.12, and 15.18 dpi (Figure 2). Each time point consisted of two replicates with 10 zebrafish in each replica as well as the control group with comparable conditions.
While the microarray dataset presented in this manuscript was newly generated and first reported in this study, it is also a most recent report from a series of pathogen-host interaction studies completed by our research group. Routine validation assays, including histological analysis, have already been performed and reported previously to ensure the quality and reproducibility of our data (ex.-). In comparison with our published reports that were focusing on the primary infection, the results are highly consistent between the current study and our past findings.
Conceived and designed the experiments: YJC CYL. Performed the experiments: YJC CYL. Analyzed the data: CNL CL YCW FYL WPH BSC. Contributed reagents/materials/analysis tools: CL CNL YCW FYL BSC. Wrote the manuscript: CL CNL. All authors read and approved the final manuscript.
The work was supported by the National Science Council of Taiwan, R.O.C. with funding number: NSC102-2745-E-007-001-ASP, NSC-100-2627-B-007-004 NSC100-2627-B-007-002 and NSC97-2627-B-007-006. The funders had no role in study design, data collection and analysis, decision to publish, or preparation of the manuscript.
|
0.930857 |
Two pairs of bronze legs, belonging to sellae curules, preserved in the museum at Naples (Museo Borbonico, vol. vi. tav. 28); and a sella curulis, copied from the Vatican collection.
A curule seat is a design of chair noted for its uses in Ancient Rome and Europe through to the 20th century. Its status in early Rome as a symbol of political or military power carried over to other civilizations, as it was also utilized in this regard by kings in Europe, Napoleon, and others.
In the Roman Republic, and Empire, the curule chair (sella curulis, supposedly from currus, "chariot") was the seat upon which magistrates holding imperium were entitled to sit. This includes dictators, magistri equitum, consuls, praetors, curule aediles, and the promagistrates, temporary or de facto holders of such offices. Additionally, the censors and the Flamen of Jupiter (Flamen Dialis) were also allowed to sit on a curule seat, though these positions did not hold imperium. Livy writes that the three flamines maiores or high priests of the Archaic Triad of major gods were each granted the honor of the curule chair.
According to Livy the curule seat, like the Roman toga, originated in Etruria, and it has been used on surviving Etruscan monuments to identify magistrates. However, much earlier stools supported on a cross-frame are known from the New Kingdom of Egypt. One of the earliest recorded examples of the curule chair proper was in 494 BC when the honour of a curule chair in the circus maximus was awarded to the Roman dictator Manius Valerius Maximus as a result of his victory over the Sabines. According to Cassius Dio, early in 44 BC a senate decree granted Julius Caesar the curule seat everywhere except in the theatre, where his gilded chair and jeweled crown were carried in, putting him on a par with the gods. As a form of throne, the sella might be given as an honor to foreign kings recognized formally as allies by the Roman people or senate. The curule chair is also used on Roman medals as well as funerary monuments to express a curule magistracy; when traversed by a hasta, it is the symbol of Juno.
In Rome, the curule chair was traditionally made of or veneered with ivory, with curved legs forming a wide X; it had no back, and low arms. Although often of luxurious construction, this chair was meant to be uncomfortable to sit on for long periods of time, the double symbolism being that the official was expected to carry out his public function in an efficient and timely manner, and that his office, being an office of the republic, was temporary, not perennial. The chair could be folded, and thus was easily transportable; this accords with its original function for magisterial and promagisterial commanders in the field. It developed a hieratic significance, expressed in fictive curule seats on funerary monuments, a symbol of power which was never entirely lost in post-Roman European tradition. 6th-century consular ivory diptychs of Orestes and of Constantinus each depict the consul seated on an elaborate curule seat with crossed animal legs.
it is clear the cross-framed folding seat was intended.
Sella Curulis - Curule seat: Wood carved and gilded. Berlin around 1810. The design probably by Karl Friedrich Schinkel.
In Gaul the Merovingian successors to Roman power employed the curule seat as an emblem of their right to dispense justice, and their Capetian successors retained the iconic seat: the "Throne of Dagobert", of cast bronze retaining traces of its former gilding, is conserved in the Bibliothèque nationale de France. The "throne of Dagobert" is first mentioned in the 12th century, already as a treasured relic, by Abbot Suger, who claims in his Administratione, "We also restored the noble throne of the glorious King Dagobert, on which, as tradition relates, the Frankish kings sat to receive the homage of their nobles after they had assumed power. We did so in recognition of its exalted function and because of the value of the work itself." Abbot Suger added bronze upper members with foliated scrolls and a back-piece. The "Throne of Dagobert" was coarsely repaired and used for the coronation of Napoleon.
Medieval folding chairs, folded and unfolded (apparently Spanish, reconstruction).
In the 15th century, a characteristic folding-chair of both Italy and Spain was made of numerous shaped cross-framed elements, joined to wooden members that rested on the floor and further made rigid with a wooden back. 19th-century dealers and collectors termed these "Dante Chairs" or "Savonarola Chairs", with disregard to the centuries intervening between the two figures. Examples of curule seats were redrawn from a 15th-century manuscript of the Roman de Renaude de Montauban and published in Henry Shaw's Specimens of Ancient Furniture (1836).
The 15th or early 16th-century curule seat that survives at York Minster, originally entirely covered with textiles, has rear members extended upwards to form a back, between which a rich textile was stretched. The cross-framed armchair, no longer actually a folding chair, continued to have regal connotations. James I of England was portrayed with such a chair, its framing entirely covered with a richly patterned silk damask textile, with decorative nailing, in Paul van Somer's portrait. Similar early 17th-century cross-framed seats survive at Knole, perquisites from a royal event.
The photo of actor Edwin Booth as Hamlet poses him in a regal cross-framed chair, considered suitably medieval in 1870.
The form found its way into stylish but non-royal decoration in the archaeological second phase of neoclassicism in the early 19th century. An unusually early example of this revived form is provided by the large sets of richly carved and gilded pliants (folding stools) forming part of long sets with matching tabourets delivered in 1786 to the royal châteaux of Compiègne and Fontainebleau. With their Imperial Roman connotations, the backless curule seats found their way into furnishings for Napoleon, who moved some of the former royal pliants into his state bedchamber at Fontainebleau. Further examples were ordered, in the newest Empire taste: Jacob-Desmalter's seats with members in the form of carved and gilded sheathed sabres were delivered to Saint-Cloud about 1805. Cross-framed drawing-room chairs are illustrated in Thomas Sheraton's last production, The Cabinet-Maker, Upholsterer and General Artist's Encyclopaedia (1806), and in Thomas Hope's Household Furniture (1807).
With the decline of archaeological neoclassicism, the curule chair disappeared; it is not found among Biedermeier and other Late Classical furnishing schemes.
Macrinus on an aureus. On the reverse, the emperor and his son are sitting on their curule chairs.
Wikimedia Commons has media related to Curule seats.
^ This article incorporates text from a publication now in the public domain: Smith, William, ed. (1870). "article name needed" . Dictionary of Greek and Roman Antiquities. London: John Murray.
^ Livius (Livy), Titus (1974). Robert Maxwell Ogilvy (ed.). Ab Urbe Condita: Volume I: Book I (in Latin) (2nd ed.). USA: Oxford University Press. p. 416. ISBN 978-0-19-814661-2.
^ Thomas Schäfer, Imperii insignia: Sella Curulis und Fasces. Zur Repräsentation römischer Magistrate, (Mainz) 1989, fully discusses the representations of curule seats and their evolving significance.
^ Peter Michael Swan, The Augustan Succession: An historical Commentary on Cassius Dio's Roman History Books 55-56 (9 B.C.-A.D. 14), "Commentary on Book 56", (Oxford 2004) p. 298, noting T. Schäfer 1989, pp 114-22.
^ Stefan Weinstock, "The Image and the Chair of Germanicus," Journal of Roman Studies 47 (1957), p. 148 and note 38.
^ Discussed and illustrated in Nancy Netzer, "Redating the Consular Ivory of Orestes" The Burlington Magazine 125 No. 962 (May 1983): 265-271) p. 267, figs. 11-13.
^ Further east, the cultures of Persia employed the cushioned divan instead (Frances Wood, The Silk Road: two thousand years in the heart of Asia, 2002:85-87).
^ Quoted in Wood 2002:86.
^ Some are illustrated in John Gloag, A Short Dictionary of Furniture, rev. ed. 1969: s.v. "X-chairs".
^ The contemporary term "cross-framed" came to be employed in the later 17th century to describe chairs with rigid horizontal cross-framed x-stretchers, possibly causing confusion for a modern reader; see Adam Bowett, "The English 'Cross-Frame' Chair, 1694-1715" The Burlington Magazine 142 No. 1167 (June 2000:344-352).
^ Pierre Verlet, French Royal Furniture p. 75f; F.J.B. Watson, The Wrightsman Collection (Metropolitan Museum of Art) 1966:vol. I, cat. no. 51ab, pp76-78.
^ One at the Victoria and Albert Museum is illustrated in Serge Grandjean, Empire Furniture, (London: Faber and Faber) 1966:fig. 7. Grandjean also illustrates a gilded curule seat from the former Grand Galerie, Malmaison, ca 1804 (fig. 5b); a painted one from Fontainebleau (fig. 31), and a walnut curule seat in Empire style, from Romagna (fig. 6).
^ From Louis Blancard, Iconographie des sceaux et bulles, 1860.
This page was last edited on 9 April 2019, at 12:16 (UTC).
|
0.974828 |
Everyone wants to know that their Drinking Water is clean and healthy. Unfortunately, research indicates regularly that our water contains contaminants that adversely affect our health over time. To ensure the healthy drinking water, many people install a filter in your home or a purification system.
|
0.999999 |
What does the Fourth Amendment text mean?
A police officer's ability to stop, detain or arrest someone.
A police officer's ability to search a private location, residence, place of business, vehicle or person.
When police want to stop and detain someone for questioning.
When police want to pull over an individual in a traffic stop and police want to search the person's vehicle.
When police want to arrest someone.
When police want to enter someone's residence to arrest him or her.
When police want to search someone's home.
When police want to search a business.
When police want to confiscate property.
When can police perform the above actions under the Fourth Amendment?
Police have "probable cause" to believe that the person targeted in the search has committed a criminal act.
Violations of Fourth Amendment rights happen frequently during arrests, searches and seizures. However, the individual's whose rights were violated often don't even realize it. If you feel that police may have violated your Fourth Amendment rights, it may be a good time to learn more about constitutional law.
|
0.918261 |
We can often overreact to situations without even knowing it. How does this happen? Well, we allow our emotions to take over.
Once you gain control over your emotions you’ll be able to choose better reactions, which leads to better solutions.
It’s important to remember that no one is perfect. Everyone overreacts from time to time. It’s when your overreactions become the norm that you should seek a better way.
1. The art of not reacting. In order to stop overreacting, you can try using the art of not reacting. This means that when you’re presented with a certain situation, your goal will be to not react at all. Instead, you’ll take the time to think about the situation and then formulate your action.
2. Let out your emotions. Let yourself feel your emotions as they come to you and find positive ways to express them. When you let your emotions build up, they become stronger inside of you. It’s difficult to stop yourself from overreacting when you’re full of pent up emotion.
3. Take a time out. If you tend to overreact with anger, it’s vital to allow yourself some cool down time. If you feel emotions building inside you, instead of bursting out, go somewhere where you know you can be alone. Cooling down will help you to react with a clear head.
4. Write it down. Instead of reacting to a situation at all, go write it down. Writing it down is another way of giving yourself time to think over the situation. Later on, once you read what you wrote, you may be able to see whether your reaction was an overreaction or not.
5. Practice relaxation techniques. When you adopt relaxation techniques, you’ll find that you’re automatically more in control of your emotions. Try deep breathing or attend a yoga or meditation class. Relaxation will stop your stress and you’ll be less likely to lash out with any negative emotion.
6. Avoid judging. Make it a point to stop judging yourself and others. Judgments can give you strong opinions that may be unwarranted, which can lead you to overreactions. In the same vein, when you judge yourself for overreacting, you aren’t allowing yourself to make mistakes, which is a self-defeating attitude.
If you find that you’re overreacting to all of life’s situations, it’s time to start with the small things. Ask yourself why you’re reacting to small situations with such negative passion.
There could be an underlying issue you need to deal with first. Are you overly stressed? Is your mind focused on something else? Answer these questions and solve these problems first. Just take it one thing at a time.
Once you’ve discovered a method that works well for you, incorporate that change into your life permanently.
It’s important to expect that you will make mistakes along the way – but that’s okay! You may still overreact from time to time, but we are only human and it happens. Don’t let mistakes discourage you from jumping right back into the methods that work for you.
If you’re having trouble changing, remember to take small steps. It’s quite difficult to become a different person overnight. Try to bring an overall awareness to your life so you no longer feel the pull to overreact. Soon enough, you’ll regain control over your emotions!
|
0.999895 |
How many people get pseudobulbar affect?
What can I do if I get pseudobulbar affect?
Some people with multiple sclerosis find that they experience sudden episodes of uncontrollable laughing and/or crying at inappropriate times, or which are unrelated, or out of proportion, to their current mood.
Pseudobulbar affect (PBA) is seen in many other conditions including motor neurone disease (MND), Alzheimer's disease, Parkinson's disease, stroke and traumatic brain injury.
Pseudobulbar affect is a physical disorder that results from a disturbance in how you express your emotions, rather than of your actual feelings themselves. Whilst you may be laughing or crying uncontrollably, you may not actually be experiencing any corresponding inner feelings of happiness or sadness. Sometimes the laughing or crying may start in response to something funny or sad you've seen or experienced, but the feelings are usually much more intense, last longer than expected and it may be difficult or impossible for you to stop laughing or crying. Some people with PBA find they have episodes where they become excessively angry or frustrated.
You may find it embarrassing if you have these outbursts, particularly if they happen in situations that other people don't find sad or funny. You may worry about it happening again. This can lead to people avoiding social interactions or can affect relationships if you feel you are embarrassing family and friends.
Pseudobulbar affect can be mistaken for depression. However, typically depression lasts longer than PBA outbursts, which are usually fairly brief. Also, pseudobulbar affect is not associated with common features of depression such as problems sleeping or losing your appetite. It is possible to have PBA and depression at the same time, but they should be managed separately.
The exact cause of PBA is unclear but it is thought to be due to a combination of damage to the central nervous system in the areas of the brain that are involved with controlling your emotions and the effect this has on how signals are carried between nerve cells by neurotransmitters - chemicals which allow the cells to communicate with one another. However, the pathways controlling emotions are complex and not completely understood.
It is thought that the area of the brain known as the cerebellum may have a key role in regulating emotional repsonses and keeping them proportional to the situation. So if you have lesions in the cerebellum you may be more susceptible to pseudobulbar affect.
The neurotransmitters thought to be involved in PBA are serotonin, dopamine, glutamate and noradrenaline (also known as norepinephrine). These neurotransmitters are also involved with depression and manic episodes, and as indicated previously pseudobulbar affect can sometimes be mistaken for depression.
Pseudobulbar affect often goes unrecognised and undiagnosed. Estimates of how many people with MS are affected by PBA vary widely ranging from 7% to 95% depending on the terminology used, the diagnostic criteria and the population of people being studied. However, the majority of studies have estimated the prevalence in MS to be in the narrower range of 10% to 46%.
expression of the emotion doesn’t lead to a feeling of relief.
not due to a drug.
There are also some published scales available which measure pseudobulbar affect more objectively. The Center for Neurologic Study – Lability Scale (CNS-LS) is a self-administered questionnaire with seven questions which are scored by the patient from one to five. It looks at aspects such as the frequency of episodes, their intensity and how inappropriate they were with regards to the context. This scale has been validated for use in people with MS, where a score of 17 or more would indicate PBA.
The Pathological Laughter and Crying Scale (PLACS) consists of 18 questions and is carried out by a health professional. Scores for each question range from zero (normal) to three (excessive emotional lability). It looks at several aspects of PBA including duration of, and the extent of distress following, an episode. This scale has not been validated in people with MS but it has been used in MS studies of PBA. A score of 13 or more would indicate PBA.
A 2015 study in Croatia aimed to determine the prevalence of PBA in a group of 79 people with MS using the CNS-LS. 33 of the 79 participants (41.8%) met the criteria for a diagnosis of pseudobulbar affect. This study also looked at whether there was a link between PBA, patient age, gender, type of MS, time with MS and level of disability. It found no significant correlation between PBA, age and level of disability, but in this population it was more common in women and those with secondary progressive MS (SPMS). This contrasts with a 1997 study which found that it occurred equally amongst men and women and tended to be associated with more progressive disability.
It is important to try and get a prompt and accurate diagnosis of pseudobulbar affect to enable you to access appropriate treatment, as well as support for you and your family. Counselling may be helpful to reassure you and your family that PBA is not your fault.
The aim of treatment for PBA is to reduce the frequency and severity of episodes. The mainstay of treatment has been the off-label use of antidepressants which target the neurotransmitters noradrenaline, serotonin and glutamate. “Off-label” use means that the medicine is being used in a way that is different to that described in the licence. For example, here it is being used for a different illness (PBA) to that stated in the licence (depression). Doctors have found that the medicine works very well for this condition, but the drug manufacturer has not extended the licence to include it.
Both tricyclic antidepressants such as amitriptyline, imipramine and nortriptyline, and selective serotonin reuptake inhibitors (SSRIs) including fluoxetine, citalopram and sertraline are used. Efficacy appears to be similar whichever antidepressant is used. The doses used tend to be lower than those used for depression and the effects are seen quite quickly, typically in less than a week.
The NICE MS Guideline suggests that amitriptyline be tried as a treatment for emotional lability in people with MS.
In 2013, the European Medicine Agency (EMA) licensed a new combination drug called Nuedexta for treating pseudobulbar affect in MS and other neurological conditions including MND. Nuedexta is a combination of dextromethorphan (a cough suppressant) and quinidine. Dextromethorphan is thought to work by attaching to several nerve cell receptors in the brain, including those for the neurotransmitters glutamate and serotonin. It helps normalise the activity of the neurotransmitters and reduces the symptoms in MS. The role of quinidine is to stop dextromethorphan from being broken down as quickly by the body, therefore prolonging its action.
It is thought that Nuedexta takes longer to have an effect on pseudobulbar affect than antidepressants, taking up to four to five weeks to work. Although available in the United States since 2010, Nuedexta was never marketed in the European Union and in February 2016, the manufacturers requested that the marketing authorisation be withdrawn in the EU for commercial reasons.
The withdrawal wasn’t related to any safety issues or due to lack of efficacy of the drug, simply the manufacturer did not feel that they could market Nuedexta profitably in Europe. This may be because it treats symptoms that can be managed successfully using antidepressants which are relatively cheap in Europe, doctors are more familiar with antidepressants and they work more quickly than Nuedexta. Although Nuedexta has never been available in the UK it is still used in the United States.
This research update looks at how common the pseudobulbar affect (laughing or crying for little reason or at inappropriate times) is in MS.
|
0.746837 |
For other stations that are also called Fox 29, see Fox 29 (disambiguation).
KABB, virtual channel 29 (UHF digital channel 30), is a Fox-affiliated television station licensed to San Antonio, Texas, United States. The station is owned by the Sinclair Broadcast Group, as part of a duopoly with NBC affiliate WOAI-TV (channel 4, also licensed to San Antonio); Sinclair also operates Kerrville-licensed CW affiliate KMYS (channel 35) through joint sales and shared services agreements with owner Deerfield Media. The three stations share studios between Babcock Road and Sovereign Drive (off Loop 410) in northwest San Antonio; KABB's transmitter is located off of Route 181 in northwest Wilson County (northeast of Elmendorf). The station brands itself as "Fox San Antonio", even though it is stylized as "Fox 29" through its logo.
On cable, KABB is available on Charter Spectrum and Grande Communications channel 11, and AT&T U-verse channel 29.
The station first signed on the air on December 16, 1987; originally operating as an independent station, it was the first independent to sign on in the San Antonio market since KRRT (channel 35, now CW affiliate KMYS)—which by that point, was the market's original Fox affiliate—debuted in November 1985. Channel 29 was originally owned by the Alamo Broadcasting Corporation, from which its call letters were taken.
Alamo Broadcasting sold the station to River City Broadcasting in 1989. In 1994, Paramount Pictures, then-owners of KRRT through its Paramount Stations Group subsidiary, entered into a partnership with Chris-Craft Industries—which owned NBC affiliate KMOL-TV (channel 4, now WOAI-TV) at the time—to create the United Paramount Network (UPN), with KRRT serving as the network's San Antonio affiliate. River City subsequently signed an affiliation agreement with Fox for KABB to become the network's new area affiliate; on January 16, 1995, KRRT dropped Fox programming to become the market's original affiliate of UPN, with KABB assuming the Fox affiliation; shortly afterward, KRRT entered into a local marketing agreement with KABB after Paramount sold channel 35 to Jet Broadcasting. In 1996, the Sinclair Broadcast Group acquired River City Broadcasting's television stations.
The following year, Glencairn, Ltd. (which evolved into Cunningham Broadcasting) bought KRRT; the family of Sinclair Broadcast Group founder Julian Sinclair Smith owned 97% of Glencairn's stock (Glencairn was, in turn, to be paid with Sinclair stock for the purchases), effectively making KABB and KRRT a duopoly in violation of FCC rules of the period. Glencairn had owned eleven television stations nationwide that Sinclair operated under LMAs; a later plan to sell five of its stations to Sinclair outright prompted the Rainbow/PUSH coalition (headed by Jesse Jackson) to file challenges, citing concerns over a single company holding two broadcast licenses in one market and arguing that Glencairn passed itself off as a minority-owned company (its president, former Sinclair executive Edwin Edwards, is African American) when it was really an arm of Sinclair, and used the LMA to gain control of the station. The FCC levied a $40,000 fine against Sinclair in 2001 for illegally controlling Glencairn. Sinclair purchased KRRT outright in 2001, creating the market's first television duopoly with KABB.
The station originally carried Fox's children's program block Fox Kids when it switched to the network in January 1995 and also carried its successors FoxBox and 4Kids TV; the network later discontinued the Fox Kids weekday blocks in 2002, with the Saturday morning lineup remaining until September 2006, when KABB became the seventh Fox station that was not involved in the switches resulting from the network's 1994 affiliation agreement with New World Communications (after WSVN in Miami, KMSP-TV in Minneapolis, KPTV in Portland, Oregon KMSB-TV in Tucson, KMPH-TV in Fresno and KPTM in Omaha) to stop carrying the network's children's program block; Fox Kids successor 4Kids TV block was moved to sister station KMYS to accommodate a short-lived weekend expansion of its morning newscast Fox News First. The lineup remained on KMYS until 4Kids TV was discontinued by Fox (due to a dispute between the network and the block's lessee 4Kids Entertainment) in December 2008, after which Fox permanently discontinued providing network-supplied children's programming.
On May 15, 2012, the Sinclair Broadcast Group and Fox agreed to a five-year extension to the network's affiliation agreement with Sinclair's 19 Fox stations, including KABB, allowing them to continue to carry the network's programming through 2017.
The station's digital signal is multiplexed.
On August 24, 2010, Sinclair signed a groupwide affiliation deal with The Country Network (which rebranded as ZUUS Country in July 2013), a digital subchannel network featuring country music videos, to the 28 of the company's stations. On October 31, 2015, the station switched its subchannel to the Sinclair-owned Comet network. On February 13, 2017, the station added a third subchannel with the soft launch of TBD.
On February 2, 2009, Sinclair told cable and satellite television providers via e-mail that regardless of the exact mandatory switchover date to digital-only broadcasting for full-power stations (which Congress rescheduled for June 12 days later), the station would shut down its analog signal on the original transition date of February 17, making KABB and KMYS the first stations in the market to convert to digital-only broadcast transmissions.
KABB discontinued regular programming on its analog signal, over UHF channel 29, on February 17, 2009. The station's digital signal remained on its pre-transition UHF channel 30, using PSIP to display the station's virtual channel as its former UHF analog channel 29.
KABB preempts the network's Xploration Station E/I block (which airs Sunday mornings on KCWX), which replaced the Weekend Marketplace infomercial block (which, in return, replaced 4Kids TV in December 2008, and instead airs Saturday mornings on sister station KMYS). Syndicated programs broadcast by KABB include Dr. Phil, Family Feud, The Doctors, Two and a Half Men, and 2 Broke Girls among others.
KABB presently broadcasts 27⅓ hours of locally produced newscasts each week (with 5⅓ hours each weekday and 30 minutes each on Saturdays and Sundays); in addition, the station produces the sports highlight program Maximum Sports, which airs on weeknights during the final ten minutes of the 9:00 p.m. newscast and as a standalone half-hour program on Saturdays and Sundays at 9:30 p.m. as well as the lifestyle program Daytime at Nine, which airs weekday mornings at 9:00 a.m.
River City Broadcasting started a news department for KABB shortly before the company's merger with the Sinclair Broadcast Group. On March 20, 1995, the station began producing a half-hour primetime newscast at 9:00 p.m. each weeknight, originally titled The Nine O'Clock News. The station expanded the weeknight broadcast of The Nine O'Clock News to one hour in 1998; this was followed by the addition of hour-long weekend editions of the 9:00 p.m. broadcast by 1999. In 1999, the station began to produce a half-hour late afternoon newscast at 5:30 p.m. for sister station KRRT, which utilized the same anchors, meteorologist and sports staff as that seen on KABB's 9:00 p.m. newscast. The program was cancelled in 2001 due to low ratings.
KABB programmed news outside its established 9:00 p.m. timeslot for the first time on channel 29 on January 2, 2006, when it premiered Fox News First, a three-hour morning newscast that aired weekdays from 6:00 to 9:00 a.m., replacing infomercials and children's programs that had previously aired that time period. On September 8, 2008, the program was expanded to four hours, with the addition of an hour-long block from 5:00 to 6:00 a.m.
KABB is one of the few local television newscasts in the United States to have syndicated its newscasts to other stations in nearby markets. Its morning and primetime newscasts also aired on Fox affiliates KIDY in San Angelo and KXVA in Abilene from September 2009 to September 2013 (simulcasts of Fox News First were added by both in October 2010) when the owner of those stations, London Broadcasting Company, launched half-hour primetime newscasts during the 9:00 p.m. hour; KXVA's MyNetworkTV-affiliated sister station KIDZ-LD rebroadcast KABB's 9:00 p.m. newscast nightly on a one-hour delay at 10:00 p.m. during the same timeframe.
On August 3, 2011, KABB became the fourth English-language television station in the San Antonio market to begin broadcasting its local newscasts in high-definition. One month later on September 6, KABB launched an hour-long lifestyle program Daytime @ Nine, as a lead-out of its weekday morning newscast.
^ PUSH pushing FCC over Sinclair/Glencairn, Broadcasting & Cable, July 13, 1998. Retrieved December 13, 2013 from HighBeam Research.
^ Glencairn's dicey LMAs, Broadcasting & Cable, March 29, 1999. Retrieved December 13, 2013 from HighBeam Research.
^ FCC fines Sinclair for Glencairn control, Broadcasting & Cable, December 10, 2001.
^ Sinclair Reups With Fox, Gets WUTB Option, TVNewsCheck, May 15, 2012.
^ Jakle, Jeanne (December 5, 2012). "WOAI, KABB won't join forces". San Antonio Express-News. Retrieved December 12, 2012.
^ WOAI, KABB to share home, news, San Antonio Express-News, May 20, 2013.
^ KSAT anchors thrilled about new TV digs, San Antonio Express-News, October 22, 2013.
^ Sinclair Broadcast Group to Air The Country Network, PRNewswire, August 24, 2010.
^ Hearn, Ted (February 2, 2009). "Sinclair Sticks To Feb. 17 Analog Cutoff". Digital Video Report. Retrieved February 24, 2009.
^ "KABB Programs". KABB. KABB.Com. Retrieved 2013-06-21.
^ KABB delivering new S.A. lifestyle show; Albert a hit, San Antonio Express-News, July 26, 2011.
|
0.968034 |
Roman blind - the length of your window + 30 cm.
If your fabric has a dominant pattern you may like to have the bottom of the blind on a particular part of the fabric so make an allowance for this when purchasing your fabric. For a blind wider than your chosen fabric - double the quantity of fabric e.g. for a blind measuring 170 cm wide x 130 cm length and the fabric is 137 cm wide, you will need: 130 cm + 30 cm = 160 cm x 2 = 320 cm.
If the fabric has a pattern you will have to check how many patterns repeats are needed to match the pattern e.g. based on the above blind and the pattern repeat is 64 cm you need 3 x 64 cm = 192 cm x 2 = 384 cm.
Sometimes on patterned fabric there is a half drop repeat, this amount needs to be added to cover the half drop. The retailer where you buy the fabric will be able to assist you. However, it does help for you to have an idea on calculating how much fabric you require and reduces the risk of not having enough or too much fabric. Any unused fabric will be returned to you with your blind.
It may sound complicated but most blinds don't have any joins so just buy the drop + extra as required. The only time you might need to use the pattern repeat is when you have several blinds, perhaps on a bay window. It looks better if the blinds have the same pattern on the bottom of each blind.
If you want a small blinds please send the whole width of the fabric, so the blind can be cut from the best position if the fabric is patterned. If you want two smaller blinds cut from the width of fabric on a roman blind you should allow 8 cm for the turnings on each blind, so please make sure you have enough fabric.
|
0.999883 |
LossyFLAC outputs larger file then plain FLAC?
I didn't know that lossyFLAC with any switch can result in larger file then plain FLAC. Why can that be or is it OK?
It could be that the original material compresses particularly well in FLAC. Compression of lossyWAV processed audio results in a slightly higher overhead due to the smaller block size used (512 rarher than 4096 samples). This phenomenon has been observed before where some files get bigger.
So, is this like general case for lossyFLAC (lossyWAV) to behave like this if FLAC compressed the material at < 500 Kb/s (for -q5), or this are some exceptions caused by known content of source material?
I wonder if it would be possible to implement a special LossyWAV switch for FLAC? It would tell FLAC to encode each 4048 samples once as a whole block and once divided into 4 blocks of 512 samples and choose whatever compresses better. Do the FLAC specifications allow for such a variable block size?
From my experience in case of a original FLAC compression of 472 kbps chance to get a smaller file size when using lossyWAV -q5 and below is pretty high though it won't be much what you gain. But the better FLAC compression is on its own, the higher the chance that lossyFLAC makes it worse. With relative quiet music originating from one or few instruments lossyWAV is more of a disadvantage than an advantage.
From overall view however it's extremely rare that lossyWAV increases file size, that's why I personally don't care about it.
But the better FLAC compression is on its own, the higher the chance that lossyFLAC makes it worse. With relative quiet music originating from one or few instruments lossyWAV is more of a disadvantage than an advantage.
I think we discussed this a year or more back. The FLAC spec fully supports variable block lengths within a single file.
An optimised FLAC encoder (never mind lossyWAV or anything else) would probably make use of this feature. However, no current FLAC encoders do this, so there are no variable block length files around. Which raises the possibility that at least some FLAC decoders might not be built to expect them. Who knows?
You could build a special FLAC encoder to independently adapt the blocksize, or integrate lossyWAV into FLAC and set the blocksize dynamically, or just create two FLACs from each lossyWAV file (i.e. a 512 and a 4048 version) and chop them together using an external utility, keeping whichever version was smaller for each 4048 samples.
Apart from the change in blocksize, it's really quite rare for lossyWAV to increase the encoded filesize. Has anyone actually seen it happen when the FLAC settings (including blocksize) are identical for lossless vs lossyWAV encodings? I'm guessing it could happen, but I'm not sure what kind of signal(s) would trigger this behaviour. If people were paranoid about this, you could write another external script to check it block-by-block by comparing the two versions, and keeping the smaller block - but as I say, I'm not sure when this happens, if at all, and it's a cumbersome sledgehammer-to-crack-a-nut kind of solution.
btw, it's not too unusual for lossyWAV to do exactly nothing. Which is a good thing.
|
0.785941 |
I. for one, do not fit your model. You shouldn't measure others by your own standards.
I've been there many times in my job and it's hard not to take it personally. They gave you a job which you did excellently so they assume that the next person will be just as adept. My approach is to quietly step back and allow the new person to either mess it up or come to me for help. If neither of those things happen then I know I maybe overreacted.
|
0.954729 |
What's The 411TV reporter Cristina Twitty enjoyed chatting it up with Ben and Jewel Tankard on the red carpet at the BLACK NATIVITY New York Premiere at the Apollo Theater in New York City.
As reality TV stars, how do the Tankards raise all of their children while maintaining all of their morals and values?
It definitely takes a lot of work and depending on God's Grace to do it because each child is so distinctly different.
If you watch THE TANKARDS: THICKER THAN WATER, you'll see some of the things they got right and some of the things that they got wrong and some things will be very funny. They have learned that when you bring a blended family together you have to come up with a new system and they're still figuring it out after 13 years.
Ben Tankard is considered the Godfather of Gospel Jazz and the most successful gospel jazz artist in history with 20 albums, including gold and platinum. The music business is what has helped the Tankards to buy the house, the planes, and cars. They are still recording and doing over 100 concerts per year and people should know that they volunteer their time as pastors.
Jewel Tankard has a very successful network marketing business with 38,000 people in her network which has generated seven figures for her. Jewel also has a financial services company, which she uses to help women to be financially secure.
Also on the red carpet for Black Nativity New York Premiere were: Angela Bassett, Forest Whitaker, Tyrese Gibson, Jacob Latimore, Mary J. Blige, Nasir Jones aka Nas, Jennifer Hudson, Gale Gibson, Luke James, Lynn Whitfield and more.
|
0.999906 |
Find out which computer skills you should be looking for in resumes.
As you're figuring out ways to revamp your hiring process, one important aspect is considering the computer skills that your new hires need to have. Of course, basic computer skills related to the position are mandatory, but there are many qualifications that will make your employees even more valuable for your company.
What follows are some of the most important computer skills to look for in resumes.
Even as technologies become more advanced in the realm of security, cybersecurity risks are ever present, as hackers continue to find new ways to attack. Looking for cybersecurity experience on IT resumes is a great way to bring in employees that are already adept in detecting and preventing security breaches.
To take it even further, experience related to cloud security could be especially valuable, as more offices are printing less and saving everything on the cloud.
Customer relationship management (CRM) systems, such as Salesforce, allow companies to better connect with customers and streamline business activities. Candidates with CRM experience are valuable because they're already familiar with these databases and can further improve your processes and thus the bottom line.
CRM is one of the fastest-growing software markets, according to a market research report from Grand View Research. Market Watch also stated that the global CRM software market is expected to grow 6 percent annually until 2023.
As CRM usage steadily increases, these skills will continue to stay relevant across departments within your organization.
Potential hires that have social media experience (on a professional level) are becoming more valuable. They not only know how to manage multiple platforms daily, but they can also inform you of which outlets are the most appropriate for your company.
It's important for companies to be present online, whether engaged with LinkedIn to find candidates or implementing lead generation strategies via Facebook or Instagram posts.
Candidates with social media experience bring value to many types of teams.
Another way to increase and improve your online presence is to hire employees that are familiar with email marketing platforms. These tools help you send out automated monthly newsletters or email blasts, and they may require a bit of extra knowledge around design and content creation.
Artificial intelligence (AI) and machine learning are both changing the landscape of business operations worldwide. As automation becomes more of a reality for your organization, you may need to train current employees on best practices and new methods.
But, what if you could hire employees who were already familiar with AI tools and best practices? This would save time and money, and you'd have a head start on how to implement the latest data analysis strategies.
The Bureau of Labor Statistics expects software developer employment to rise 24 percent from 2016 to 2026, which is "much faster than the average for all occupations" according to their data. As the demand for more complex computer software increases, these positions are among the hottest jobs out there right now.
Even if you're not in the market for a software developer, candidates with these skills can bring lots of value. Having the ability to develop, test, and implement software and applications is an asset within any workplace, especially as systems and processes go digital. Because software developers, as the Balance Careers notes, are in essence required to analyze and diagnose problems, meet the needs of users, and know different coding languages, they can bring a wide range of skills to any team.
Basic computer skills are a must for much of the workforce these days. But taking those skills a step further and looking for candidates with experience with the latest innovations will give you a competitive advantage and will help you streamline and perfect business operations.
|
0.98369 |
Most people have heard of co-living by now and may have even considered it. It is a new way of renting a home and is a great choice for people who want to live on a budget.
It may be ideal for students, people wanting to relocate and even those visiting other cities for work related matters. Co-living areas are available in major urban areas in the form of flats, apartments or even houses.
It includes the shared use of facilities like the toilet, bathroom, kitchen and living room.
People may benefit from free coffee (in some cases), pools, security, free internet, cable TV and even cleaning services.
Co-living spaces are generally cheap however, there are upmarket spaces available as well. Compared with rentals though, they are a far better option with much more benefits. Depending on the amenities offered and the location of the apartment, the price can be cheap to a relatively higher price.
Is it advisable for women?
The answer is Yes! Co-living is a great option for women over 30 who want to break free from the mundane routine of their lives and begin new adventures or simply wanting to relocate.
It is a great way to experience all that a city has to offer while still living on a budget or deciding on the city you would like to permanently move to. Co-living allows women (and of course, men) the opportunity to meet new people and have a new experience.
In a world where everything is fast-pace, and everyone is so focused on surviving and thriving, co-living is actually an ideal solution.
There are numerous co-living companies that will pair up people with similar interests and lifestyles, thus you are more likely to be living with people who share the same interests as you do.
Co-living provides the chance to experience community living whilst relocating to a new city. This is ideal for women, as a community-based living space would feel safer and homelier. It provides you with friends that you can hang out with and get to know.
You just need your suitcase. All other necessities are provided as co-living is much like living in a hotel space. It is ideal for the modern-day working woman as no cleaning is necessary. And, since the spaces are shared, they are often bigger.
Co-living spaces are safe and secure which is another benefit for women to have peace of mind when you are home. They also have CCTV cameras for extra security.
Most places have automated locks which work with a code or an app on your mobile device, this is another great feature for women wanting to co-live.
Owners are often not too far away and are easily accessible if the need arises to contact them.
Co-living is ideal for women as it offers a great amount of security and safety features.
People living in the house with you have already been screened by the owners of the property so you can have assurance that you are safe.
|
0.999194 |
Will Claire Perry’s dietary advice make a meal out of climate change?
Claire Perry has told the BBC it is not the government’s job to tell the public to eat less meat.
Despite scientists urging consumers to change their diet and help cut emissions of carbon dioxide, in a recent BBC interview, the Energy and Climate Minister was reluctant to committing to eating less meat herself.
She reportedly said: “I like lots of local meat. I don’t think we should be in the business of prescribing to people how they should run their diets.
According to the BBC, she suggested a government that advised people not to eat meat would be a “nanny state” and even refused to confirm whether she agreed with conclusions that the consumption of emissions-intensive foods such as beef needed to be reduced.
She instead argued the benefits of reducing agricultural emissions, planting more trees and investing in carbon-capture technologies to remove carbon dioxide from the environment.
|
0.904546 |
Nearly $6 billion in investments in U.S. oil and gas fields by foreign firms could boost U.S. production, but also calls to export natural gas.
NEW YORK (CNNMoney) -- Foreign firms, hungry to cash in on the American energy boom, have invested nearly $6 billion in U.S. gas and oil drilling in the last few weeks.
Energy giants from China, France and Spain have snapped up stakes in fields in Ohio, Mississippi, Colorado and Michigan.
These investments will likely add to the recent boom in U.S. natural gas production, pushing already low natural gas prices even lower.
Low domestic prices could drive natural gas producers to seek out European and Asian markets, according to analysts, where the fuel commands three or four times the price.
"Of course that will" lead to more exports, said Nansen Saleri, president of the oil field consulting firm Quantum Reservoir Impact. "And it will be a tremendous opportunity."
Many experts do indeed see increased exports as a big plus, creating jobs, reducing the trade deficit and adding to the tax base. But not everyone is so sanguine.
Exporting more natural gas, which is is used to heat half the homes in America, would mean higher prices for U.S. consumers.
And some U.S. industries would also suffer.
"I am worried that exporting America's natural gas would raise energy costs for American consumers, reduce the global competitiveness of U.S. businesses, make us more dependent on foreign sources of energy," Massachusetts Congressman Ed Markey, a Democrat, wrote in a letter to Energy Secretary Steven Chu earlier this month.
There are strict rules governing the export of oil and gas from the United States, and the government must approve of any project.
The Department of Energy is currently reviewing eight applications to build natural gas export terminals. That's an about-face from five years ago, when industry plans called for importing natural gas.
The push to export gas would be happening regardless of the new foreign investment.
Last week Chinese oil giant Sinopec (SHI) invested $2.2 billion in the U.S. firm Devon (DVN, Fortune 500) that gives Sinopec a one-third stake in oil and gas fields Devon is developing in Louisiana, Mississippi, Ohio, Colorado and Michigan.
And the French company Total (TOT) recently paid $2.3 billion to U.S. oil and gas firm Chesapeake for a minority stake in some Chesapeake (CHK, Fortune 500) fields, mostly in Ohio, while Spain's Repsol paid $1 billion for a minority share in fields being developed by Oklahoma-based Sand Hill Energy.
The U.S. natural gas boom is being driven by the advent of new drilling technology and the increased use of hydraulic fracturing -- a controversial method known as fracking that cracks rock formations and has raised concerns over ground water pollution.
It's this new drilling and fracking technology that the foreign firms are interested in. There's oil and gas in shale and other types of rock worldwide, and these firms are after the means to tap it.
"This new technology was invented in the United Sates," said Clark Sackschewsky, a partner in the consultancy BDO's natural resources group. "These foreign companies are coming in and saying 'we've got the money, we want to learn from you.'"
Kevin Book, head of research at ClearView Energy Partners, acknowledges that rising natural gas prices may hurt U.S. manufacturers and others that are currently benefiting from low prices. But, he says, selling oil, gas and refined products overseas brings more dollars into the U.S.
Even so, these these foreign firms are likely to tread lightly, especially in an election year.
Less than a decade ago, Congress interfered with a bid by Chinese oil firm CNOOC to buy California's Unocal, which was ultimately sold to Chevron (CVX, Fortune 500).
"Chinese investments appear more motivated by knowledge acquisition for now," Robert Johnston, director or energy and natural resources at Eurasia Group, wrote in a recent research note.
They are "unlikely to attempt shipping gas back to the home market if they sense that the political climate is unfavorable."
|
0.960999 |
Follow these four tips if you're raising startup capital from family and friends.
You may have heard of the "elevator pitch" for raising money from venture capital investors. But have you heard of the "kitchen table pitch"? I use this term to describe how entrepreneurs approach their relatives and friends for startup capital.
More than 50 percent of startup capital is raised from family, friends and other informal investors. The total amount raised in this manner--tens of billions of dollars--exceeds the total amount raised from venture capital investors, yet the media tends to focus on VC financing and ignores money from family and friends. But you shouldn't. If you're thinking about seeking money from those close to you, the following guidelines will help you craft your kitchen table pitch.
1. Know your investor's motivations. The impetus for investing in a friend's business ranges from pure altruism to pure greed. In my experience, I've found that most family-and-friend investors decide to put money into a business started by someone they know because they're motivated by a complex combination of financial self-interest and a desire to help you become a success. At times, these business angels are quite angelic in their approach to supporting you; however, a few hours later, these same investors will argue over specific clauses in the investment agreement that have little likelihood of being exercised. However, no matter whom you approach, it's likely you'll find that family-and-friend investors enjoy the thrill of investing: the idea that they're able to benefit financially from speculation.
Before you make a kitchen table pitch, make a list of all the potential private investors you could approach, and outline their likely motivations for investing. Your parents may have very different motivations than your in-laws, who in turn may have different objectives than your former boss. Each pitch should be tailored to its audience.
2. Debt is better than equity for relatives and friends. Unless your business has a high likelihood of being purchased, be wary of raising money in the form of equity. It's tempting for entrepreneurs to sell stock with no scheduled repayment obligations rather than take on debt, but this isn't a smart idea when raising money from relatives and friends.
Let's take a long-term view of a specific example. Assume you sell $10,000 worth of stock in your new restaurant to your brother-in-law. The business grows and prospers in its early years, but it has little chance of being bought or paying dividends. In fact, the restaurant closes abruptly after five years because you and your spouse decide to move out of state. Legally, your brother-in-law has little recourse and will be frustrated because he's depending on you to pay him for his now worthless stock. If you'd decided to structure his investment as debt, you would have been able to pay him in installments--perhaps $2600 per year (assuming 10 percent interest) or $200 per month (assuming 5 percent interest). In practice, many entrepreneurs treat family-and-friend equity much like long-term personal debt: If the business fails and is unable to pay shareholders, the investment morphs into personal debt to save the relationship.
3. Provide options for investing. Unlike VCs, family-and-friend investors don't invest out of the fear of losing the deal. So don't give them a take-it-or-leave-it proposition. Instead, give them investment options. For example, let them chose between different loan terms: Offer a high interest loan that's long-term or a short-term loan with a lower interest rate.
Some entrepreneurs also use creative repayment schedules such as interest-only loans, graduated repayment loans (low payments in early years that increase over time as the business grows), or seasonal loans (installments payments in summer months only, for example). For your reference, I have listed below three sample investment options, which could be offered to your relatives and friends when you make your kitchen table pitch. Although each option assumes you can afford monthly payments of $200 to $400, they enable you to raise very different sums of money.
4. Make the pitch verbally, then follow-up with something in writing. Experts tell you to present a business plan when raising money. While this is sound advice, it should be modified a bit for a kitchen table pitch. Most of your relatives and friends don't want to see a slick business plan presentation--they want to look you in the eye and know that you're not taking advantage of them. I've found, through years of experience, that it's better to make the pitch verbally, to explain your business plan in your own words. And get your investors to agree to the investment verbally. Once they have done so, tell them you'll follow up in writing with proper documentation so there's no misunderstanding and to protect your relationship.
Some investors will insist they don't need documentation in order to give you money. Be wary of this. Again, let's take a long-term view. Assume you accept a $20,000 informal "investment" from your aunt and uncle. You launch your business and decide to take a vacation a year later--before you've repaid their investment. (C'mon! Even entrepreneurs need vacations.) While you may have every intention of paying them back in the future, your aunt and uncle may view your vacation as a frivolous expense, which may put a strain on your relationship, particularly at family gatherings. But if their investment were formalized--for example, with a scheduled repayment plan--they'd be less likely to worry that "their money" was being used frivolously.
When making a kitchen table pitch, you have to anticipate the dialogue at the Thanksgiving table as well. If you're not comfortable with how the investment will impact your personal relationship with your friends or relatives, don't raise money from these people for your startup. But if you decide to go ahead, I encourage you to follow the guidelines listed above. It'll be worth the effort: For many entrepreneurs, money from relatives and friends is the cheapest, quickest and most flexible source of financing available.
|
0.999994 |
2,500 monks under house arrest at Kirti Buddhist Monastery in Sichuan Province, according to reports relayed from scene.
Below is an article published by: The Guardian.
Chinese state media have confirmed reports of clashes between monks and police at a Tibetan monastery in Sichuan province, but deny it has been blockaded.
The Global Times said "Chinese police intervened to control lamas that had stirred up trouble" at Kirti monastery in Aba county, western China.
Tibetan exiles said armed police surrounded the complex last Tuesday and refused to allow monks to enter or leave. The Dalai Lama warned late last week that the situation could turn "explosive".
An article released by the Xinhua state news agency on its news wire this weekend – but not, apparently, on its website – said believers and vehicles were freely entering and monks could be seen outside.
The report, headlined "Life normal in Tibetan Buddhist monastery in south-west China", quoted a member of Kirti's management saying it had "long ago formed a joint patrol team [with police] to prevent unspecified people from entering". He added that "there couldn't be any beatings" as staff at the entrance were very friendly.
The International Campaign for Tibet said hundreds of residents gathered outside Kirti last Tuesday fearing authorities would forcibly remove monks for a "patriotic education" campaign after the self-immolation of a young lama. Citing exile sources, it alleged that security forces beat protesters and unleashed dogs on the crowd as they forced their way through to the monastery, surrounding it and preventing up to 2,500 monks from leaving. The Guardian has been unable to verify the claims independently.
Exiles claimed that as of Sunday the complex had been blockaded and up to 800 officials had been carrying out the re-education campaign there.
The religious affairs bureau in Aba, known to Tibetans as Ngaba, did not respond to queries. Last year the region's authorities issued a notice pledging to "promote patriotic education in monasteries [and] reinforce management of religious affairs in accordance with the law".
The US expressed concern about the situation last week, with state department spokesman Mark Toner telling a regular briefing: "We have seen that Chinese security forces have cordoned off the Kirti monastery ... They've also imposed onerous restrictions on the monks and the general public, and we believe these are inconsistent with internationally recognised principles of religious freedom and human rights."
The Global Times commentary attacked the "Dalai clique" and the west for such remarks, adding: "The so-called religious freedom and human rights are nothing but slogans to deceive people in Tibet and take over global opinion."
Beijing accuses the Dalai Lama of seeking to split Tibet from the rest of China, while the exiled Tibetan spiritual leader says he seeks only meaningful autonomy. Aba is one of many areas that lies outside Tibet but has a large Tibetan population.
|
0.999405 |
Does the organization of the Home Front during the Second World War offer an example of how to anthropogenic climate change? The launch of the 'New Home Front' initiative by Green Party leader Caroline Lucas certainly suggests as much. But there are dangers, as well as opportunities, in attempts to apply the lessons of history to a present-day crisis. Perhaps the greatest of these is that we will fail to correctly identify why so little progress has been made in seriously addressing climate change.
The initiative's launch document, The New Home Front , written by the New Economics Foundation's Andrew Simms, makes a number of important claims about the achievements of the Home Front in rapidly reorienting social production during wartime. It points to examples such as the reduction of waste or automobile use. The pamphlet points to the wartime mobilization of ideas of fairness and civic responsibility. It signals the ways in which the Home Front saw significant improvements in health and social equality. The Home Front experience can provide a model, therefore, for the 'Great Transition' that is required in the present to address anthropogenic climate change and develop resilience.
There is much that I agree with in the objectives of social and environmental revolution that this document recommends. As a member of the Green Party I support the objectives that underpin the New Home Front idea. However, as a historian, particularly one who has worked on environmental history, I have concerns about this invocation of wartime experience.
Firstly, The New Home Front does not engage with some possible objections to its version of history. For example, it is questionable whether social and economic reorganization of wartime really offers an example of the sort of social reorganization necessary in the present. Wartime 'transitioning' involved the greatly expanded production of means of destruction. It did not challenge prevailing assumptions about the ultimate nature of social production or the relationship to nature, which is necessary now.
Secondly, while the home front may have produced greater equity, it did not abolish social distinctions. Furthermore we know that many of the most substantial social gains were made by the working class in the post-war period, and in the context of relatively strong social democratic and labour movements across Europe. This complicated historical relationship between different systems of social production, and their class relations, is not addressed in The New Home Front.
The report also recapitulates assumptions that are at best questionable. The idea that wartime presented a 'golden age' of recycling in Britain, for example. While recycling certainly received increased focus during wartime, that attention came largely at the expense of investment in the wider system of waste disposal. Both the First and Second World Wars were followed by crises in urban waste disposal. Landfill emerged in part as a cheap response to these crises. Salvage systems, based on the vagaries of secondary materials markets, proved unsustainable with the collapse of the scarcities imposed by wartime. The recent experience of gluts in secondary materials during the recession has again exemplified the limitations of market-based solutions to environmental problems.
In invoking the Home Front experience as a basis for transition, The New Home Front also neglects one of the key reasons it was possible to maintain a wartime social consensus for radical change: the fact that wartime measures were emergency measures. With the end of the wartime emergency a substantial section of the British public showed a strong desire to restore pre-war levels of consumption, and historians have demonstrated how important these factors were in post-war electoral politics. Whether a social consensus could be maintained during the kind of emergency-without-end that anthropogenic climate change threatens is a vexed question. What does this mean for political organization and democracy?
I do not mean to suggest by any of these comments that it is invalid for The New Home Front to seek to build radical social change around historical experience. To some extent this is always necessary. But there is also a danger in looking to the past for answers to present predicaments. The future is always unpredictable, and it is as important to know where to draw the line in looking to history for examples of what to do in the present. Addressing anthropogenic climate change will require a revolutionary transformation of our mode of production and a political challenge to the class interests vested in it. We are presented with the necessity of making a radical break with the past rather than attempting to repeat it.
Please note: Views expressed are those of the author.
Timothy Cooper is a Lecturer in History at the University of Exeter. He specialises, in part, in environmental history, including environmental politics in 19th and 20th century Britain amd environmental and cultural politics of waste.
Sign up to receive announcements on events, the latest research and more!
We will never send spam and you can unsubscribe any time.
H&P is an expanding Partnership based at King's College London and the University of Cambridge, and additionally supported by the University of Bristol, the University of Edinburgh, the University of Leeds, the Open University, and the University of Sheffield.
We are the only project in the UK providing access to an international network of more than 500 historians with a broad range of expertise. H&P offers a range of resources for historians, policy makers and journalists.
© Copyright 2002-2019 History & Policy. All rights reserved.
|
0.999865 |
Periodontal disease, the infection of the gums and bone which supports the teeth, is routinely found in the majority of adults who still have their teeth. Historically, it has been understood that the bacteria in the mouth (called "bacterial plaque") has been the cause of periodontitis (gum disease). In the past decade a growing body of research evidence has shown that there are risk factors which modify the initiation and progress of the infection of the teeth and gums. Smoking is one of these "risk factors" which can make your gum disease worse than if you did not smoke.
While smoking has been identified as a "risk factor", it is one that can be influenced by the patient. It has been described "that cigarette smoking may well be the major preventable risk factor for periodontitis in the United States. More than one-half of the cases of periodontits affecting the nation's adults may be attributable to cigarette smoking, as may three-fourths of the periodontitis cases among current smokers" (reference #1).
How does this impact smokers? According to one study, smokers who had quit smoking in the previous two years were three times more likely to have gum disease than those individuals who did not smoke. However, if one had quit smoking eleven years or longer before this study, the odds of getting periodontitis were the same as those patients who had never smoked (reference #1) It is readily apparent from the research that cigarette smoking is a major risk factor for the initiation and/or progression of gum disease (reference #2-3).
There are different opinions regarding how cigarette smoking may influence the onset and progression of gum disease. Tobacco smoke and nicotine cause small blood vessels to constrict which reduces the delivery of oxygen and nutrients to gum tissue (reference # 4). Cigarette smoking can also reduce the effectiveness of the body's ability to fight infections (reference #5). One study has even suggested that smokers are more likely to be infected with more aggressive gum disease-causing bacteria (reference #6).
The significance of all of the research is that the presence of gum disease is highest for smokers, next highest for ex-smokers and lowest for those people who had never smoked. It has also been shown that former smokers and those who had never smoked did, in fact, respond better to the treatment of gum disease than did those people who did still smoke. It can be concluded that those periodontal patients who stop smoking will have a better chance of being successful with the periodontal therapy that is indicated for their case. We as dentists have evolved into another broadly-encompassing role which allows us to favorably impact the total health of our patients.
2. Salvi, GE, et al. Influence of risk factors on the pathogenisis of periodontitis. Periodontol 2000, 1997;14:173-201.
3. Gelskey, SC. Cigarette smoking and periodontitis: Methodology to assess the strength of evidence in support of a causal association. Community Dent. Oral Epidemiol. 1999;27:16-24.
4. Baab,DA and Oberg, PA. The effect of cagarette smoking on gingival blood flow in humans. J. Clin Periodontol. 1987;14:418-424.
5. Barbour,SE, et al. Tobacco and smoking: Environmental factors that modify thehost response (immune system) and have an impact on periodontal health. Crit Rev Oral Biol Med 1997;8:437-460.
6. Zambon,JJ, et al. Cigarette smoking increases the risk for subgingival infection with periodontal pathogens. J. Periodontol. 1996;67(suppl.):1050-1054.
|
0.995966 |
Description: Hard-hitting street security 'filler' from the COI.
See The Sewing Machine (1973, UK) on youtube.
See 1973 Singer 15ch Sewing Machin on youtube.
See Singer Superstar Specials TV A on youtube.
See Singer Touch & Sew Sewing on youtube.
See Singer Sewing Machines on youtube.
See 1978 Singer Touchtronic Memory on youtube.
See Phoenix sewing machine 1960 TV on youtube.
See NIFTYTHRIFTYGIRL: Vintage Kenm on youtube.
See Ann using a treadle sewing mac on youtube.
See sewing machine commercials on youtube.
Sewing Machine similar movies given below. Rate each movie or TV Series, add your own reviews and suggest new title as related. See big list of best top movies that are like Sewing Machine film.
Top movies like Sewing Machine complete list given below.
Description: A fight veteran with post-traumatic disorders talks about his practical inability to begin a normal life after his fighting and killing experience. This 35-year-old married boy with three children, who joined the Croatian units in the very beginning of the fight and saw different Yugoslavian battlefields from his perspective of a sniper, is unemployed today and tries to adapt to his surroundings while still feeling the closest to his former, actually similarly dispossessed co-fighters.
Description: The stories of Yavuz Cetin and Kerem Capli.
Description: In Alentejo, Portugal, the region with the highest suicide rate in Europe, the scorching wind blows the message that“solitude kills”. In one of the empty villages where death and loneliness seem to be looming large, the old “Alentejanos” Inacio and Francisca resist the melancholy by accompanying every other.
Description: Bojan is 24. He spent four and a half years of his life in prisons in Turopolje, Sisak, Glina, Remetinec, Pula, Zagreb and Rijeka. He spent 20 years of his life in the Pula neighborhood named Veruda.
Description: In 1976, reggae icon Bob Marley survived an assassination attempt as rival political groups battled in Jamaica. But who exactly was responsible?
Description: Frank Hurley's images of Antarctic heroes, Globe Fights and mysterious natives in faraway jungles grabbed the attention of all who saw them. But just how true were they? Was he a giant in photography or just a conjurer with a camera?
Description: A documentary focused on rock 'n' roll super fanatics Dennis and Lois and their adventure over 40 years.
Description: Jordi has his arm and leg almost paralyzed, and shows his disability to beg for cash on the streets.
Description: Two ageing siblings sit next to every another in a pub, waiting for instructions from the filmmaker which never come. They watch the time go passing by.
Description: Built from the ground up from a series of introspective shots throughout Marc Isaacs's significant body of non-fiction work, Moments of Silence captures folks feeling overwhelmed by hard thoughts, pause and fall silent, seemingly dwelling on their past, contemplating their actual ordeals, or worrying about their future.
Description: An expedition into what makes a home.
Description: Robert Johnson was one of the most influential blues guitarists ever. Even before his early death, fanatics wondered if he'd made a pact with the Devil.
Description: Across Fresh York City, a bold experiment in participatory democracy is underway. Since 2012, the town council has steadily increased investment in a process named “participatory budgeting”, wherein community members gain a role in deciding how to spend part of a public budget. Following the process over one year in Brooklyn’s Sunset Park—a multicultural neighborhood undergoing gentrification—this quietly observed, verité documentary asks what happens when community members come together to discuss and decide what development could look like in their neighborhood.
Description: Ambushed by Ulster loyalists, three members of the Miami Showband were killed in Northern Ireland in 1975. Was the crime linked to the government?
Description: This investigation examines the mysterious shooting of soul icon Sam Cooke, whose death silenced one of the most vital voices in the civil rights movement.
Description: Run-D.M.C. DJ Jam Master Jay made a large impact in melody and his community. But mates and family still seek closure years after his unsolved murder.
Description: Buck Hurst, conjurer and illusionist, entertains at a children's party.
Description: Official Movie of the Amateur Swimming Association. An instructional documentary on diving.
Description: This documentary chronicles Johnny Cash's 1970 visit to the White House, where Cash's emerging liberal ideals clashed with Richard Nixon's policies.
Description: For years, the murder of Chilean protest singer Victor Jara was blamed on an official in Pinochet's army. Actually in exile, he tries to exonerate himself.
Description: Originally broadcast on PBS, the movie details the Barrios, a middle-class family both activated and fractured by the conflict. Instead of fleeing their country, the siblings are guided by a religious and socialist desire to support those most vulnerable and destitute, mostly peasants in the rural areas.
Description: A documentary that chronicles the newest years of the popular C.D. Guadalajara, a Mexican football club commonly known as 'Chivas', their ups and downs, victories and struggles.
Description: Documentary made on the set of David Byrne's 1986 movie TRUE STORIES.
Description: Documenting the real life storyline of Jake Korell, a 98 year old German born Russian immigrant American trapper, depicting a method of life that may be gone forever but which holds many life lessons in the struggle for survival that are still relevant today.
Description: Charles Santore, in an expansion of his discussion in “Oz: The American Fairyland” (1997) (V), says about his experience making an abridged storybook of “The Sorcerer of Oz”. He says of his inspirations, the tiny woman who modeled for Dorothy, the tin boy in folk art, and a left to right progression in a adventure of identity, with opposing forces pushing the movement in art back to the left.
Description: "The Undefeated Femininity" - a movie about Gun Grut Bergman. In September 1949 Ingmar Bergman left his wife and five children, and escaped to Paris with a fresh woman, Gun Grut. It was the beginning of a passionate love affair, an enduring jealousy drama and a fresh theme in Bergman's films. Actually their son, Ingmar Bergman Jr, walks in his parents' footsteps, from Paris to the home on Grev Turegatan 69 in Stockholm.
Description: Anindilyakwa man, Steve 'Bakala' Wurramara is afflicted with a profound hereditary neurodegenerative disorder. While modern medicine looks for answers, the stories of an ancient curse and black magic still permeate this remote Aboriginal community in far northern Australia. Bakala enlists the support of his daughter to find for a cure from the traditional bush medicines in the land, desperate to search an respond before she too is diagnosed. As his desperation grows and his disorder takes an ever greater hold, Bakala realises he gotta war this ancient curse to unblock the secrets of his Ancestors.
Description: Documentary movie recounting the travels of Captain Hassoldt Davis and his wife, Ruth Staudinger Davis, across the Ivory Coast. The Davises filmed their exploits, seeking out in particular evidence of the beginnings and native practices of witchcraft and sorcery, and culminating in a visit to the village of YHO, ostensibly a village of sorcerers.
Description: Travelogue, following a adventure from Mexico to Borneo, via Singapore, covering local flora, wildlife, peoples and customs.
Description: Filmmaker Diego Gutiérrez joins 'The Hut Syndicate', a mysterious group of hunters, during one hunting season and witnesses their longing to hold their vanishing globe alive.
Description: What happens in your childhood defines your life, according to artist Armando. His childhood was defined by one crucial incident; a man kills a German soldier in the woods during the Second Globe War. The storyline recurs in Armando’s work in many forms.: an ill-fated event, a victim that becomes a perpetrator, a guilty forest that witnessed everything but remains silent. Was Armando involved in the fateful happening or did he invent a tragedy of mythological proportions? Filmmakers Sjors Swierstra and Roelof Jan Minneboo go in find of answers.
SEWING MACHINE is a hard-hitting public security movie that clocks in at a tiny over a minute but nonetheless provides a shocking message. A mother sewing at home is interspersed with shots of her child going into the road and getting involved in a street accident. The surprise here is just how much suspense is elicited from the brief scenario.
|
0.999517 |
"I rarely see athletes here."
Is "ritkán itt sportolókat látok" acceptable ? Im having difficulty placing itt and ott in several sentences..
The first two are the most common, the most neutral, they are mostly the same. The third one follows closely.
Now, the "ritkán látok", that is an adverb and a verb. The adverb is modifying the verb. "I rarely see". If you split it up and insert something in-between, then the adverb will try to modify that other word. This is just like in English. "Rarely see" vs "rarely here".
"Néha itt sportolókat látok." - Sometimes here I see athletes.
And this sentence is perfectly fine.
The issue with "ritkán" ("rarely") is that it wants a verb to follow it. Both in English and Hungarian. "Néha" ("sometimes") is not so picky.
There is, of course, the "You are rarely here" or "I am rarely hungry" type of sentence that contradicts what I just said. But I think it is special. "Rarely" sits in the middle of a "to be + adverb(?)" structure. Or "I drive very rarely". I think these are a different category. The verb is before the word "rarely", and there is very little after it.
"Ritkán előfordul az (is), hogy itt sportolókat látok."
"Rarely it (also) occurs/happens that here I see athletes".
So, "ritkán" ("rarely") now refers to a verb again: "előfordul" - "(it) happens/occurs".
|
0.998077 |
URING HIS FIFTEEN-YEAR REIGN the emperor Domitian was acclaimed imperator XXII separate times. The first occurred at the camp of the Praetorian Guard just outside of Rome on the day of his brother Titus's death, enabling Domitian to arrive at the Senate House with an army at his back (an event which, in my opinion, soured his relationship with the Senate from that day forward).
Sometime over the course of the next year Domitian received a second acclamation. Now, it was the army's custom to acclaim the emperor on the battlefield (Gregory S Aldrete, Gestures and Acclamations in Ancient Rome, Baltimore, 1999). However, Domitian traveled no farther than Alba during his first couple of years as emperor, so either he received another acclamation from the Praetorian Guard, which seems unlikely (in any case, nothing to brag about), or else another legion, outside of Italy, gave him one. This would suggest that the emperor didn't actually have to be present on the battlefield to receive such an acclamation; the significance of this point will become apparent in a moment.
"IMP" on the obverse side of the coin commemorates the Praetorian Guard's original acclamation. "IMP XXII" on the reverse shows the accumulated instances of military acclamation over a fifteen-year reign.
Presumably all of these acclamations, after the first two, came from armies Domitian led personally, against the Chatti , the Dacians, the Suevi, and the Sarmations, etc. I don't know this to be true, because I haven't made a study of it myself, but it seems reasonable.
Legio X Fretensis was mustered in 36 B.C. by the future Emperor Augustus. It served valiantly during the early empire. Under Nero it was led by Domitian's father-in-law against the Parthians and then by Domitian's father and brother against the Jews. During the reign of Domitian, Legio X Fretensis was stationed in Judaea, headquartered in the city of Caesarea.
Once again, IMP on the obverse commemorates the Praetorian Guard acclamation. However the reverse records "IMP XXIII." What is going on with that! That can't be right, can it? XXIII? Was this a simple mint error? An extra I, randomly placed? No it was not.
No it certainly was not! A coin is a government record. It is an official document. The target audience for this document included both active-duty military and military veterans, so such a mistake would not have been tolerated for long. This inscription spans the entire issue of the coin, including innumerable die switches. The wording was purposeful. But what happened, and why?
In my opinion, Legio X Fretensis took it upon themselves to acclaim Domitian imperator for the XXIIIrd time. Since the emperor's physical presence wasn't required, as we have already deduced from IMP II, all that was required was for the legion to proclaim the necessary formula. Apparently they did that. The coin is the evidence.
Why? I have no idea. Perhaps it was a spontaneous outburst of patriotic fervor. Perhaps it was thanks for a special favor or in aid of a future favor. Perhaps they fought a battle nobody knows about.
I asked Prof Aldrete what he thought of the matter, and he offered another plausible explanation. He suggested a difference in the way the acclamations were counted might explain it. "Sometimes the Imperator titles are counted for individual battles and sometimes awarded collectively for entire campaigns, so off the top of my head," he wrote by email, "I'm guessing that Caesarea did their math differently from the other mints and counted two battles separately that the other mints folded into one campaign."
That seems to me a reasonable explanation as well. Maybe there was a difference of opinion among the legions. Maybe this was an attempt by the army stationed in Caesarea and the veterans settled there to set the record straight, with their version anyway.
"What is really interesting," Prof Aldrete added, "is that they persisted with the XXIII even after it presumably would have become apparent that other coin runs had a different number." I agree with this statement 100%, and I wonder what Domitian had to say about this coin. Was it ever brought to his attention? If so, what was the emperor's final word? Did he, for whatever reason, ignore this acclamation, or did he learn of it too late, and only his assassination prevented its being recorded on the Roman coinage?
RPC 2308 is the perfect Coin of the Week in that it asks more questions than it answers. It leaves you wondering.
Next: The start of a new multi-part series covering the cult statues of Minerva appearing on Domitian's denarii.
|
0.999998 |
Abstract: Generative adversarial networks (GANs) are an expressive class of neural generative models with tremendous success in modeling high-dimensional continuous measures. In this paper, we present a scalable method for unbalanced optimal transport (OT) based on the generative-adversarial framework. We formulate unbalanced OT as a problem of simultaneously learning a transport map and a scaling factor that push a source measure to a target measure in a cost-optimal manner. We provide theoretical justification for this formulation, showing that it is closely related to an existing static formulation by Liero et al. (2018). We then propose an algorithm for solving this problem based on stochastic alternating gradient updates, similar in practice to GANs, and perform numerical experiments demonstrating how this methodology can be applied to population modeling.
TL;DR: We propose new methodology for unbalanced optimal transport using generative adversarial networks.
|
0.999999 |
How do I Choose the Best Astronomy Program?
One should consider a school's location and facilities when choosing an astronomy program.
Some astronomy programs focus on Earth's place in the solar system.
Astronomy students often organize field trips that are centered around unusual celestial events, such as eclipses or meteor showers.
Prospective astronomers who want to specialize in radio astronomy should be familiar with the physics behind radio propagation.
The best astronomy programs often have professors who balance their time between research and teaching.
As you are looking for the best astronomy program, you should consider the location of the school as well as the facilities and educators at the school. It can be beneficial to consider how the class is taught and if a lab is offered to go with the classroom lecture. If you are looking to take classes in an astronomy program at a school you already attend, then talk to other students who have taken astronomy classes there and find out what they thought of the class. You might also consider talking to the professor of the class and asking if you could sit in on a lecture or two to get a feel for the class you may want to take the next semester.
Most astronomy classes are aimed at teaching a specific, or fairly specific, aspect of astronomy, and you should consider what you want out of the astronomy program you are looking at. If you are looking to take some astronomy classes out of personal interest and to satisfy a requirement for a lab science credit, then you should be sure the astronomy class also offers a lab component. You may be interested in astronomy as a focus of a degree in science, and in that scenario you should be sure the program offers what you need to pursue a career or further study in astronomy.
It could be beneficial for you to look for an astronomy program offered at a school that has or is near a telescope you could potentially use during your study. Similarly, many astronomy classes or labs are also offered in the evenings and will allow you the opportunity to use a telescope, even a smaller one, to do actual observations. While this is certainly not essential to some astronomy classes, you should at least consider it as you are looking for the program that is best for you.
You might also want to look at the professor who teaches the astronomy classes you are interested in. Try to find out what sort of experience and educational background the professor has, so you will have a better idea of what he or she might teach you. It can also be helpful to contact the professor before you take a class, try to communicate with him or her to get a sense for if you and the instructor connect on a level that will facilitate your education.
How do I get an Astronomy Education?
What is an Astronomy Chart?
How do I Choose the Best Astronomy Colleges?
|
0.99964 |
Dover corp is a dividend champion with 59 years of increasing dividends! They have a chowder rulie above 12.0 and a yield of 2.2%. In the 15 year and 10 year FASTGRAPHS, Dover falls below the average PE ratio (blue line). Dov has a solid credit rating of A and has a debt/cap of 38% which is reasonable. The TTM payout ratio is only 27% which is quite safe. The beta of the stock is higher at 1.48 as expected from an industrial sector stock.
S&P gives Dov a $90 12 month price target which means a discount of 15.9%. S&P rates this stock as a Buy.
In addition to Dov, I find NSC and SWK interesting as well. Railroads took a slight beating from the fall of oil prices (I don't think this is justified since oil demand will go up with lower prices). NSC has only 13 years in div history, which isn't bad. SWK is a wee bit expensive compared to its historical PE. S&P recommends to Hold both of these stocks and Jefferson Research recommends a Buy for both. Other railroad stocks include UNP, CSX, and CNI. These other names however are quite expensive as they have recently lifted off into the stratosphere. I wouldn't mind adding to my position in UNP though due to its growth prospects.
I am also still closely watching the following energy stocks: BP, COP, CVX, XOM, RDS.A. I am willing to wait on BBL as well. It is still in the "falling knife" mode. I am not a big fan of BBL as it's behavior as a stock is quite volatile for me.
Sorting Fish's dividend champion spreadsheet by the Chowder rule and then picking stocks with reasonable yields I have the following stocks. This is only a preliminary screen and isn't a recommendation of picks since some are PE expensive or have other issues.
Thanks for sharing your analysis of DOV. You also mention many other interesting names such as BP, COP and others. I like BP and that juicy yield is really tempting. I also agree with your assessment that we are still in the falling knife mode which is why I'm still on the sidelines for now. I just added bought two companies for December not in the energy space. I may make an energy buy soon though.
|
0.954419 |
I just bought a new belkin router, and my computers CD Drive isn't working. I want to know a way to install my belkin router and setup the username and password. I already have a modem and a computer already.
Reset the belkin router using a pin or paper clip (hard reset).
Than connect the router with a cable and open cmd type ipconfig.
Find your default gateway ip and type it in you browser url.
Now reset the password and SSID, save it and reboot your router modem computer.
Enter the following Internet protocol address into the address bar of a Web browser: 192.168.2.1.
Press "Enter" to access the router setup page for the Belkin device.
Go to Connection Type found under WAN and Click "Submit" if prompted to log in.
Select your Internet connection from the options and then click "Next".
Enter your account credentials or the network configuration for your service "such as your static IP address and your Internet service provider's gateway and subnet mask " into the appropriate fields if applicable Click "Apply Changes".
Select "Channel and SSID" from under Wireless and then enter a unique name for your network into the SSID field.
Choose "WPA/WPA2-Personal(PSK)" from Security Mode.
Select "WPA-PSK+WPA2-PSK" from the Encryption Technique drop-down menu.
Create a security key or password for the network.
The key can consist of 8 to 63 characters "including letters numbers and punctuation" and is case-sensitive.
Click "Apply Changes" to finish manually configuring the Belkin router. Set up a strong password in the manual setting option and save it.
These are the various method in setting up both the wired and wireless Belkin router with CD and without CD.
Basic step before proceeding with any of the troubleshooting steps lets power-cycle modem and router.
Unplug the power cord of your Internet Modem.
Power off the router by unplugging the Belkin router from the power outlet (electric wall socket) as well. (IMPORTANT: Leave both the devices off for at least 60 seconds).
Then power on Internet modem first by plugging power cord back in and wait for 60 seconds until all the lights gets steady.
Once you see all the lights lit on the modem power on your Belkin router by plugging the power adapter into an electric outlet.
Routers connect a local area network -- a collection of one or more computer devices -- to a wide area network such as the Internet. You can set up a Belkin router in your home or office to enable your computers tablets smartphones and gaming systems to use the Internet at the same time. Modern Belkin routers include a CD that automates the setup process but if you're using an older model or lost the setup disc you can configure the Belkin router manually.
Step 2: Press "Enter" to access the router setup page for the Belkin device. Go to Connection Type found under WAN. Click "Submit" if prompted to log in.
Step 3: Select your Internet connection from the options and then click "Next". Enter your account credentials or the network configuration for your service -- such as your static IP address and your Internet service provider's gateway and subnet mask -- into the appropriate fields if applicable. Click "Apply Changes".
Step 4: Select "Channel and SSID" from under Wireless and then enter a unique name for your network into the SSID field. Click "Apply Changes".
Step 5: Click "Security". Choose "WPA/WPA2-Personal (PSK)" from Security Mode. Select "WPA-PSK+WPA2-PSK" from the Encryption Technique drop-down menu.
Step 6: Create a security key or password for the network. The key can consist of 8 to 63 characters -- including letters numbers and punctuation -- and is case-sensitive.
Step 7: Click "Apply Changes" to finish manually configuring the Belkin router.
How do I Configure My Belkin Range Extender with My Router?
|
0.999999 |
Is it a mole or could it be melanoma?
Here are some things that increase the chance that it is melanoma (skin cancer). You should see your doctor if you have a mole with any of these.
A - Symmetry: The shape of the mole is not round and two sides of a mole do not look the same.
B - Border: The borders of the mole are irregular, blurry or look like they are "leaking" pigment (color) into the skin next to the mole.
C - Color: A mole which changes color or contains more than one color.
D - Diameter: Size larger than a pencil eraser (> 6 mm or > 0.25 inches).
E - Evolving: The mole is changing in size, shape, or color.
What are other signs of skin cancer?
See your doctor if any of these occur.
Moles are small growths on the skin. Most adults have between 10 and 40 moles.
Normal moles are brown, tan, or pink. They are round or oval. They can be flat or slightly raised. They are smaller than a pencil eraser.
An abnormal mole does not look the same as your other moles. It may be growing, change color, or look different in some other way. If you have a mole that is changing, you should see your doctor to get it checked.
Protect your skin from too much sun. Too much sun and sunburn can damage your skin. It increases your risk of getting skin cancer later in life.
Use sunscreen if you are out in the sun.
Stay in the shade during the middle of the day.
Wear protective clothing such as long pants and long-sleeve shirts. Wear a wide-brimmed hat to keep the sun off your face and neck.
Do not use tanning beds. Tanning beds can also cause skin damage.
Perform a skin self-exam once a month.
Stand in front of a mirror. Look at every inch of your skin for new moles or changes in old ones.
|
0.642331 |
Niles West competed at the Trevian Invitational hosted by New Trier High school on October 6 and 7. Niles West sent six teams. Sarah Waters and Nadia Firozabadi and Dylan Chikko and Hannah Kim had prelim records of 4-2 and finished as Double Octafinalists. Ephraim Bennett and Dulguun Bat-erdene, Loredana Lohan and Eliana Bender, and Freskida Sejdiu and Penelope Alegria all had prelim records of 3-3. Other debaters competing in the Varsity division included Nicholas Whalen and Jude Kintner.
From October 18 to October 21, Niles West sent two Varsity teams and two JV teams to compete at the St. Marks School of Texas in Dallas. Nadia Firozabadi and Sarah Waters had a prelim record of 4-2 and finished as Double Octafinalists in the Varsity division. Ephraim Bennett and Dulguun Bat-erdene had a prelim record of 4-2, yet failed to clear on speaker points in the JV division. The other debaters competing were Dylan Chikko, Hannah Kim, Pal Patel and Abhi Shah.
Niles West Debate traveled across town on October 20 to compete at the Niles North Vikings Rumble, sending three JV teams and 11 novice teams. In the JV division, Dulguun Bat-erdene & Ephraim Bennett placed 5th best team. Other debaters competing in the JV division included: Sebastian Chirayil, Hannah Paul, Sheridan Witko, Abhi Shah, and Pal Patel. In the Novice divisionAli Nawaz & Jacob Berkowitz placed 9th, Randall De Vera Celina Saba placed 10th, Trevor Bell & Jacob Chepulis placed 12th. Jacob Berkowitz won 4th speaker, Ali Nawaz won 13th speaker, Celina Saba won 15th speaker, Jacob Chepulis won 16th speaker, Sumehra Taj won 17th speaker, and Socrates Hwang won 19th speaker. Other debaters competing in the novice division included Alexia Ardelean and Lizzy Kempf, Josip Basan and Kareem Dibs, Socrates Hwang and Sultan Mamoon, Saima Rahman and James Knott, Thomas Ramirez and Mohtadi Syed, Emily Suh and Katelin Chong, and Orimoloye Williams-Reneau and Murphy Meave Holleran.
Niles West competed at the University of Michigan tournament from October 26 – October 28, sending seven Varsity teams and nine Novice teams. Varsity debaters Nadia Firozabadi and Sarah Waters had a prelim record of 5-2 and finished as Double Octafinalists. Other debaters competing were: Ephraim Bennett, Dulguun Bat-erdene, Sebastian Chirayil, Adem Memidzan, Dylan Chikko, Nicky Whalen, Abhi Shah, Pal Patel, Hannah Kim, Freskida Sejdiu, Josh Solorio, and Jude Kintner. Novice debaters Misbah Ali and Sumehra Taj had a prelim record of 4-3 and finished as Octafinalists. Other debaters competing in novice included Kareem Dibs, Josip Basan, Randall De Vera, Celina Saba, Emily Suh, Katelin Chong, Thomas Ramirez, Mohtadi Syed, Alexia Ardelean, Lizzy Kempf, Murphy Meave Holleran, Orimoloye Williams Reneau, James Ryan, Jerry Mendheim, Mateja Niketic, and Bella Prutus.
Four Varsity teams competed at the Notre Dame Damus Invitational on November 2 through 4. Nadia Firozabadi and Sarah Waters finished as Double Octafinalists, along with Freskida Sejdiu and Hannah Kim, both with prelim records of 4-2. Other debaters were: Jude Kintner, Nicky Whalen, Ephraim Bennett, and Dulguun Bat-erdene.
Nadia Firozabadi and Sarah Waters competed in a highly competitive Round Robin at the University of Southern California in early November. Nadia Firozabadi placed 2nd speaker and Sarah Waters placed 5th speaker.
Niles West Debate Novices won the Bettendorf Bulldog Tournament held November 9 and 10. Nine teams went, and three teams advanced to elimination rounds: Randall De Vera and Celina Saba, Josip Basan and Kareem Dibs, and Misbah Ali and Sumehra Taj. Aly Lipsit and Mohatadi Syed placed 7th overall. Ali and Taj finished as Semifinalists, while De Vera and Saba and Basan and Dibs both made it to finals, successfully closing out the tournament and winning the championship. Misbah Ali received 2nd speaker, Sumehra Taj received 3rd speaker, Celina Saba received 5th speaker, Josip Basan received 7th speaker, Kareem Dibs received 8th speaker, and Randall De Vera received 10th. Also debating at the tournament: Ali Nawaz, Jacob Berkowitz, Trevor Bell, Jacob Chepulis, Mateja Niketic, Orimoloye Williams-Reneau, Drashti Patel, Warisha Amir, Saima Rahman, and James Knott.
Finally, Niles West competed at the Glenbrooks on November 17 through November 19 at Glenbrook North. Niles West sent seven teams, three Varsity, two JV, and two Novice teams. In the Varsity division, Nadia Firozabadi and Sarah Waters and Freskida Sejdiu and Hannah Kim finished the prelims with records of 4-3. In the JV division, Dulguun Bat-erdene and Ephraim Bennett finished 12-2. In the Novice division, Randall De Vera and Celina Saba finished 11-3 in prelims, and Misbah Ali and Sumehra Taj finished as Finalists by going 12-2 in preliminary rounds and winning their semifinals debate.
|
0.999972 |
Why does home canned tomato juice usually separate?
Home canned tomato juice usually separates because it is made by the "cold break" method. The tomatoes are crushed before they are heated through. As soon as they are crushed, enzymes start to break down the pectin that "cements" tomato cells together. Commercially, tomatoes are heated nearly to boiling in a matter of seconds, using equipment not available to consumers. Because the pectin holding tomato cells together remains intact, a thick bodied, homogeneous juice is produced. The best that can be done at home is to heat quartered tomatoes quickly to boiling temperatures while crushing. Make sure the mixture boils constantly and vigorously while you add the remaining tomatoes. Simmer 5 minutes after all tomatoes are added, before juicing. If you are not concerned about juice separating, simply slice or quarter tomatoes into a large saucepan. Crush, heat and simmer for 5 minutes before juicing.
|
0.999999 |
Habitan Book I The Parallel Place Melissa, Michael and Annabelle were each separated from their parents as infants Our story begins where they now live, together in an orphanage in northern Canada in the 1600 s Discovering a strange kinship, they have become true friends, and support one another But why do they feel they are meant to be somewhere else Is this where thHabitan Book I The Parallel Place Melissa, Michael and Annabelle were each separated from their parents as infants Our story begins where they now live, together in an orphanage in northern Canada in the 1600 s Discovering a strange kinship, they have become true friends, and support one another But why do they feel they are meant to be somewhere else Is this where they truly belong Then a mysterious event occurs, transporting them to another land called Habitan, a magical place where anything and everything is possible if you believe and strive hard enough In Habitan, sorcery, magic, and powers of the mind abound Animals talk, and the spirit of the woods is alive While in Habitan, the children join forces with three animal guides, encounter a wicked sorceress named Oskana , and embark on an adventure to discover their true heritage and destiny Can they develop their innate powers and magical gifts soon enough to protect themselves and to help the Good of Habitan Will they be reunited with their parents again Who can they really trust How can they save Habitan from the tyranny of Oskana s rule Finally, how do the events on Habitan affect the Parallel Place, the earth they grew up on The children discover that they may be Habitan s last hope for salvation from the evil sorceress Oskana They face challenges and surprising twists along the way, all while also developing their own innate gifts and magic As they begin the path to finding their own inner strength, they learn how to face unbearable odds with determination and courage, standing up for what is right despite the possible personal costs Inspiration for the Habitan Series by Cheryl Skory Suma The author s children grew up enthralled with their mother s bedtime stories Then came the question, Mommy, could you write me a longer story The Habitan Series grew out of these imaginative bedtime stories and the author promises continued plot twists, surprises and new mysteries along the way in this four book series A proud Canadian, Cheryl has a multicultural background that includes not only Canadian settlers of various European descent, but also one quarter Cree Indian Inuit mix from her maternal grandmother Her grandmother s spirit and grace were inspirational to the creation of this story and the use of Cree as the basis for the magical language of Habitan The scenery and animals behind the story were drawn from the naturally varied and beautiful landscape of Canada Resources for Teachers, Librarians and Book Clubs Chapter questions and discussion notes can be found on the Habitan Series website, HabitanBooks.
This is a captivating book drawing on the energy of nature and taking you into the magical world of Habitan. Its intriguing story line takes the young readers on a journey to discover the true power of being brave and standing up for what you believe in. It has a strong link to the values of the True North and the bond between man and nature displayed through the quest of the 3 young heroes. The book is easy to read, thought provoking and is perfect for pre-teen and teen audience.
This book is a well-written and exciting adventure from start to finish. The story jumps right into the action. I would recommend this novel to anyone interested in the fantasy genre.
|
0.94613 |
This type of woods occurs in the floodplains of rivers. Tree species vary, but may include silver maple, river birch, green and black ashes, hackberry, swamp white oak, and eastern cottonwood.
Photo of floodplain woods by Alanna Koshollek.
Black willow, basswood, red oak, and red maple may also occasionally be found in these forests.
In general, the tree and plant species in this community are adapted to spring floods and wet soils. More specifically, the sprawling floodplains along Wisconsin’s largest rivers often consist of terraces at different elevation levels, which are subject to different degrees and duration of flooding.
These varying flood regimes, in turn, support a mosaic of species. Species that can survive the most frequent, severe, and long-lasting floods are found on lower terraces, while those that tolerate only infrequent flooding grow in the upper terraces.
These woods are located in the floodplains of large rivers.
What plants and animals occur in floodplain woods?
A great variety of wildflowers and grasses grow in floodplain woods, because slight changes in elevation lead to big differences in plant habitat.
Among the more striking herbs of this community are cardinal flower, fringed loosestrife, and green dragon. Common plants include wood nettle, stinging nettle, green-headed coneflower, many species of sedges, and native grasses such as common wood reed, silky wild rye, and white grass. Buttonbush, an easily identifiable shrub, appears on the margins of very wet spots.
Birds of floodplain woods include the cerulean warbler, Kentucky warbler, prothonotary warbler, red-shouldered hawk, rusty blackbird, solitary sandpiper, yellow-billed cuckoo, yellow-crowned night-heron, and yellow-throated warbler. The Eastern massasauga rattlesnake, four-toed salamander, and wood turtle can also be found.
|
0.993279 |
From busy square to ruin to glittering commercial district: Berlin's Potsdamer Platz (Potsdam Square) is a unique urban space central to Berlin and its history.
During its heyday during the Twenties and Thirties, the Potsdamer Platz - a traffic intersection just outside the old city wall - was said to be the busiest city square in Europe. With the rise of the automobile after WW1 congestion got so bad Berlin's first traffic light was erected here - a replica now stands in the middle of the square.
During the Second World War the area around Potsdamer Platz was heavily bombed and many buildings - including the nearby Potsdamer Bahnhof station - were largely destroyed. Despite this, Potsdamer Platz retained its buzz: now the border between the British and Soviet sectors divided the square, which was still an important transport node. On the western side shops and stalls sprang up offering goods and services not available in the east, attracting much cross-border traffic.
In 1961 the almost invisible dividing line between East and West suddenly grew into the Berlin Wall, and the previously central square became an isolated dead end. Cut off from Berlin's traditional center, now in the East, and West Berlin's commercial district around theKu'damm, and with both U-Bahn and S-Bahn stations now smack in the middle of the wall's Death Strip, it lost its raison d'etre and faded rapidly. The construction of the Culture Forum nearby restored some life to the area, but as long as the Wall existed, Potsdamer Platz vanished from the map in all but name. The only reason to go there was to climb the viewing stand to look over the wall.
In 1989 with the fall of the Berlin Wall Potsdamer Platz once again became busy with traffic, at first on foot and later - once the Wall had been completely dismantled - with cars and buses.
How to get to Potsdamer Platz:Potsdamer Platz station is served by the S-Bahn (lines S1,S2 and S25) and the U-Bahn (U2). Regional trains also stop at Potsdamer Platz. Important bus routes include the200 and M48 buses, both of which continue as far as Alexanderplatz.
|
0.997269 |
Add this to the list of good reasons to check your credit card bills regularly: According to Joe Sharkey in this New York Times article, hotels are a common target of credit card hackers. Based on a study released this year, 38 percent of last year’s credit card hacking cases involved hotels. Yikes.
So as a hotel guest, what can you do to protect yourself? Check your credit card statements regularly, especially after hotel stays. And shred all receipts and other documents with personal information that could be used in credit card fraud.
Having spent three of the last seven nights in a hotel, I bet you can guess what I’ll be doing as soon as I finish writing this.
Do you have more advice for keeping your personal and credit card information safe on the road? Share it with other readers in the comments below.
|
0.999982 |
What a weird type of dolphin.
I never even knew these existed.
These dolphins are known as the Amazon river dolphin.
They are often found in freshwater in South America.
|
0.671705 |
Why do tanks have that upside down or sideways "V"
Topic: Why do tanks have that upside down or sideways "V"
Just wondering, I see it on Abrams and Challengers and I want to know what it means.
I believe it started during Desert Storm because so many countries were there with us.
We actually have one HMMWV in our motor pool that still hasn't been repainted from Desert Storm and has the mark.
Then why does it change direction? I've seen it pointing all 4 ways.
Couldn't tell you why the change directions, but maybe the main countries designate themselves with a certain direction.
I don't think that's the reason. I've seen it pointing both left and right on the Challengers II, and in all directions on the Abrams.
Then it doesn't matter which direction it's facing, they are coalition forces.
More than likely, they just gave each unit a stencil and said, here, paint this on the side of your vehicles.
And thus you end up with it facing different direction.
Regardless of how much you want to dig into this, the answer has been provided.
it`s also highly visible through night vision, its basically a recognition marking.
|
0.968783 |
I read a book when I was young (late 80s early 90s) that I remember bits and pieces of, but can't remember the title.
The book starts off with a young woman's body being pulled from the water in a fisherman's net. A storyteller on the boat begins to tell the story of a young boy. I think his name was Tim, but could be wrong about that. He had a happy life with his family until he was forced to leave. He went on a journey which included him living in a cave in the mountains that was populated with blind amphibians that sang beautiful songs and told stories to him. They would lie in his lap and he would ladle water over them.
the story teller was actually the boy (Tim?) and the sea captain was the villain who had killed the girl, and Tim had hunted him down to avenge her.
Possible titles could be "The Body in the Net", "The Woman in the Net".
|
0.932431 |
The star could take on the leading role in the reboot of the supernatural horror.
When 'The Grudge' made its debut all the way back in 2004, with Sarah Michelle Gellar as lead and coming from director Takashi Shimizu, it went on to become a classic horror hit, basing its story on the original Japanese film 'Ju-on: The Grudge', which was also directed by Shimizu. Now, Sony are hoping to repeat the success of the first film and are working on a reboot of the supernatural horror with some big names tied in.
Could Andrea Riseborough lead Sony's reboot of 'The Grudge'?
Jeff Buhler is writing a script for the film, with Nicolas Pesce set to adapt what he comes up with for the big screen whilst directing the reboot. No news has been given about whether the story followed will be exactly the same as the original film, but the leading character is said to be a single mother and detective.
The Silent Storm which is set in the idyllic moorlands of the Scottish Islands, post WWII, holds a dark secret that is tearing the community apart. The exceedingly strict minister of the community is called Balor and he'll got to extreme lengths to see his way of life, a traditional way of life, preserved. However due to his relentless actions, the relationship with his withdrawn wife, Aislin, is suffering. They have a troubled relationship together and they are reaching breaking point because Aislin feels more at one with nature and a free spirt than an individual in the community.
In the chaos of the violent argument that erupts between them a 17 year old male delinquent arrives to live with them as a last ditched attempt at rehabilitation. Aislin is drawn to his nature and the fact that he too is an outsider brings comfort to her. As their relationship deepens, the minister finds himself becoming more and more jealous until the situation erupts into a fight. If Aislin needed a saviour, perhaps Fionn's arrival will be the release she needs.
The film directed by Corinna McFarlane deals with the theme romance and offers a form of escapism for the character of Aislin to live her life beyond the remote Scottish Island.
With elements lifted from virtually every sci-fi classic in film history, this post-apocalyptic adventure feels eerily familiar but features just enough plot twists and emotional resonance to make it enjoyable. Director Kozinski (Tron Legacy) also makes sure it looks amazing, with cool-looking sets and gadgets and an entertaining use of destroyed New York and Washington landmarks.
It also gives Cruise a slightly more internalised character than he usually plays in big blockbusters. He's Jack, a repairman 60 years after aliens blasted the moon to bits, causing earthquakes and tidal waves. Now it's 2077 and the remnant of humanity is being evacuated to Saturn's moon Titan, while mop-up teams help protect giant resource-gathering machines from alien scavengers. Jack works Sector 49 with his partner Victoria (Riseborough), but has vivid, impossible dreams of a life on pre-war Earth with a mysterious woman (Kurylenko). When she suddenly turns up in an ancient spacepod, and Jack discovers a scrappy group of human survivors led by Beech (Freeman), he begins to wonder what's really happening here.
And so do we, since we have begun doubting the entire set-up from Jack's opening narration. Mission commander Sally (Leo) looks very shifty indeed, and there's something vaguely fishy about all of the sleek glass, steel and plastic technology. As Jack's gleaming white leather outfit becomes increasingly murky, so does his simplistic view of his own life. And Cruise holds the film together nicely with an introspective turn as a man who's just enigmatic enough to engage our interest. Riseborough and Kurylenko, meanwhile, get much juicier roles, providing strongly emotional layers to the story. And Freeman and Leo add a bit of class.
|
0.959397 |
You need to know that Lean Six Sigma training is perfect for those organizations that want to think out of the box. There are a lot of methods for business practices included in the Lean Six Sigma training such as the 7 wastes, 5S programs, demand flow, just in time, theory constraints, and a lot more. For decades already, the Lean Six Sigma training methods have been used by many business that are focused on the response and driving performance along with the focus on meeting the expectations of the customers while maintaining the expenses at a minimum.
People that will undergo the Lean Six Sigma training will learn how to establish disciplines, create ability, identify value, and focus on the customer. Every time an employee will focus on the customer, he or she is required to know the expectations of the customer and the problems that are important to them. One part of the Lean Six Sigma training is the continuous improvement which concentrates on the removal of waste and unimportant activities that are digging into the budget. It is important to know the activities that are not valuable. The Lean Six Sigma training will also include the transaction processes as well as the linking of the demands of the customers straight to the materials, resources, transactions, processes, and other resources given by the company.
There are actually a number of companies today that are letting their employees undergo the Lean Six Sigma training in order to get short term benefits. This is because the Lean Six Sigma training can get quicker results and create sustainable process improvement which are the common goals of many companies today. You should know that the Lean Six Sigma training will help the company grab more opportunities in the market because it will help the people know the areas in the company that will need improvement.
So if you are looking for certification and educational courses for your employees, then your best option is the Lean Six Sigma training. If you want to know how to organize flow, cut on the expenses of your business, and other important business practices, then you should consider the Lean Six Sigma training. The Lean Six Sigma training will be able to provide you with valuable employees that can create a positive effect on the business for just a short turnaround. It is actually ideal to invest on the Lean Six Sigma training because. That is because the Lean Six Sigma training will allow you to save more money for a longer period of time. The Lean Six Sigma training will help you have more productive employees which will result to more sales for your company. If you want to learn more about the Lean Six Sigma training, you can visit several websites on the internet now.
|
0.999994 |
While the nucleus of an atom can decay into a less massive nucleus by splitting apart, how does a fundamental particle decay into other fundamental particles? Fundamental particles cannot split apart, because they have no constituents, but rather they somehow turn into other particles.
It turns out that when a fundamental particle decays, it changes into a less massive particle and a force-carrier particle (always a W boson for fundamental particle decays). These force carriers may then re-emerge as other particles. So, a particle does not just change into another particle type; there is an intermediate force-carrier particle which mediates particle decays.
In many cases, these temporary force-carrier particles seem to violate the conservation of energy because their mass is greater than the available energy in the reaction. However, these particles exist so briefly that, because of Heisenberg's Uncertainty Principle, no rules are broken. These are called virtual particles.
A charm quark (c) decays into a less massive particle (strange quark, s) and a force carrier particle (W boson) which then decays to u and d quarks.
|
0.861806 |
A maser is a device that produces coherent electromagnetic waves through amplification by stimulated emission. The first maser was built by Charles H. Townes, James P. Gordon, Nikolay Basov and Alexander Prokhorov were awarded the 1964 Nobel Prize in Physics for theoretical work leading to the maser. Masers are used as the device in atomic clocks, and as extremely low-noise microwave amplifiers in radio telescopes. Modern masers can be designed to generate electromagnetic waves at not only microwave frequencies but radio, for this reason Charles Townes suggested replacing microwave with the word molecular as the first word in the acronym maser. The laser works by the principle as the maser. The maser was the forerunner of the laser, inspiring theoretical work by Townes, when the coherent optical oscillator was first imagined in 1957, it was originally called the optical maser. This was ultimately changed to laser for Light Amplification by Stimulated Emission of Radiation, Gordon Gould is credited with creating this acronym in 1957.
Independently, Charles Hard Townes, James P. Gordon, and H. J. Zeiger built the first ammonia maser at Columbia University in 1953. This device used stimulated emission in a stream of energized ammonia molecules to produce amplification of microwaves at a frequency of about 24.0 gigahertz. Townes worked with Arthur L. Schawlow to describe the principle of the maser, or laser. For their research in the field of stimulated emission, the maser is based on the principle of stimulated emission proposed by Albert Einstein in 1917. When atoms have been induced into an energy state, they can amplify radiation at a frequency particular to the element or molecule used as the masing medium. By putting such a medium in a resonant cavity, feedback is created that can produce coherent radiation. This development could lead to wide range of new applications for maser technology, including communications, Masers serve as high precision frequency references. These atomic frequency standards are one of the forms of atomic clocks.
A white dwarf, called a degenerate dwarf, is a stellar core remnant composed mostly of electron-degenerate matter. A white dwarf is very dense, its mass is comparable to that of the Sun, a white dwarfs faint luminosity comes from the emission of stored thermal energy, no fusion takes place in a white dwarf wherein mass is converted to energy. The nearest known white dwarf is Sirius B, at 8.6 light years, there are currently thought to be eight white dwarfs among the hundred star systems nearest the Sun. The unusual faintness of white dwarfs was first recognized in 1910, the name white dwarf was coined by Willem Luyten in 1922. The universe has not existed long enough to experience a white dwarf releasing all of its energy as it will take many billions of years. If a red giant has insufficient mass to generate the temperatures, around 1 billion K, required to fuse carbon. After such a star sheds its outer layers and forms a planetary nebula, it will leave behind a core, white dwarfs are composed of carbon and oxygen.
If the mass of the progenitor is between 8 and 10.5 solar masses, the temperature will be sufficient to fuse carbon but not neon. Stars of very low mass will not be able to fuse helium, the material in a white dwarf no longer undergoes fusion reactions, so the star has no source of energy. As a result, it support itself by the heat generated by fusion against gravitational collapse. A carbon-oxygen white dwarf that approaches this limit, typically by mass transfer from a companion star. A white dwarf is very hot when it forms, but because it has no source of energy, it will gradually radiate its energy and this means that its radiation, which initially has a high color temperature, will lessen and redden with time. Over a very time, a white dwarf will cool. The stars low temperature means it will no longer emit significant heat or light, and it will become a cold black dwarf. Because the length of time it takes for a dwarf to reach this state is calculated to be longer than the current age of the universe.
|
0.999878 |
Use careful thought when designing an effective employee engagement survey to return the best possible results and data. Use our tips and template to create the most effective survey for your organization.
In line with the industry standard, our survey template uses a 5-point Likert scale: Strongly Agree to Strongly Disagree for all items.
Engagement – these questions go at the front of your survey, and measure pride in the organization, motivation, advocacy for the organization, intention to stay, and job satisfaction.
Core themes – these ask about the conditions that might cause (or detract from) engagement with questions about autonomy and empowerment, career progression, collaboration, communication, leadership, recognition, resources, strategy, management support, and training and development.
Additional themes – you can see if any of these themes are critical to your organization and, if so, add them in as well. Avoid throwing them all in, as they will probably make your survey too long, unfocused, and difficult to engage with. Instead, cherry-pick what you need, and use them for shorter surveys in the future, if necessary.
|
0.999521 |
The painter of ‘Bradda Head’ in the collection of Manx National Heritage had long been unidentified due to an indistinct signature at the bottom left of the painting. A discussion on Art Detective led to the discovery of the artist’s identity.
The discussion was proposed by Martin Hopkinson, who had noted the presence of a signature. Art UK included a note from the collection that this appeared to read ‘G. J. Ho...’ , possibly signifying G. J. Hotham. Tim Williams suggested the artist George Hotham (1796–1860) as a good initial candidate due to his initials and naval connections. This identification was eventually rejected, as Osmund Bullock discovered, among other things, that Hotham did not possess a second initial and Cliff Thornton made evident the fact that the Milner Memorial Tower on Bradda Head, which is visible in the painting, was not erected until 1871, eleven years after Hotham’s death.
Kieran Owens greatly contributed to the discussion by suggesting the possibility that it was painted by John James Story (c.1828–1899). On closer inspection of the signature on the painting, Owens argued that it depicted the two 'J.' initials sitting above the capital 'S' of the surname. Owens went on to provide further evidence of Story’s authorship by citing paintings that he had shown in exhibitions in Nottingham in the 1880s, one of which was titled Lighthouse, Douglas Head, Isle of Man (1887). This proved that Story was on the Isle of Man around 1887. Further, Owens cited Brown University’s description of Story’s preservation of The Garibaldi Panorama as additional proof of his authorship of the painting. This featured a list of Story’s exhibition entries which included the submission of a painting entitled Bradda Head, Isle of Man to the seventh annual exhibition of ‘Works by Local Artists’ in 1885. This evidence has helped to narrow down the execution date of the painting to c.1885.
To conclude the discussion, Andrew Greg formally agreed to the attribution to John James Story. As a result, Art UK and Manx National Heritage have updated their records of the painting with the artist as John James Story of Nottingham (c.1828–1899).
Can the artist of 'Bradda Head' be identified from a signature?
|
0.999609 |
Hi! I have followed the above directions and cannot remove the Smushit folder from the FTP server. I keep getting these commands: Status: Deleting 4 files from "/var/www/wilsonclinical.com/public_html/wp/wp-content/plugins/Wpsmushit" Command: rm "/var/www/wilsonclinical.com/public_html/wp/wp-content/plugins/Wpsmushit/license.txt" Error: rm /var/www/wilsonclinical.com/public_html/wp/wp-content/plugins/Wpsmushit/license.txt: permission denied Command: rm "/var/www/wilsonclinical.com/public_html/wp/wp-content/plugins/Wpsmushit/readme.txt" Error: rm /var/www/wilsonclinical.com/public_html/wp/wp-content/plugins/Wpsmushit/readme.txt: permission denied Command: rm "/var/www/wilsonclinical.com/public_html/wp/wp-content/plugins/Wpsmushit/wp-smush.php" Error: rm /var/www/wilsonclinical.com/public_html/wp/wp-content/plugins/Wpsmushit/wp-smush.php: permission denied Please help! Thanks!
|
0.933462 |
My 9th great grandfather Thomas Browne was knighted by Charles II in 1671 for his support of Charles the first during the English Civil War. Thomas was an author and physician, born in London to Thomas Browne and Anne Garraway. He married Dorothy Mileham and was the father of my ancestor Clemment Browne.
The son of a silk merchant from Upton, Cheshire, he was born in the parish of St Michael, Cheapside, in London on 19 October 1605.His father died while he was still young and he was sent to school at Winchester College. In 1623 Browne went to Oxford University. He graduated from Pembroke College, Oxford in 1626, after which he studied medicine at Padua and Montpellier universities, completing his studies at Leiden, where he received a medical degree in 1633. He settled in Norwich in 1637, where he practiced medicine and lived until his death in 1682.
Browne's first literary work was Religio Medici (The Religion of a Physician). This work was circulated as amanuscript among his friends and it caused him some surprise when an unauthorised edition appeared in 1642, since the work contained a number of religious speculations that might be considered unorthodox. An authorised text, with some of the controversial matter removed, appeared in 1643. The expurgation did not end the controversy: in 1645, Alexander Ross attacked Religio Medici in his Medicus Medicatus (The Doctor, Doctored)and, in common with much Protestant literature, the book was placed upon the Papal List of Prohibited Books in the same year.
In 1646, Browne published his encyclopaedia, Pseudodoxia Epidemica, or, Enquiries into Very many Received Tenets, and commonly Presumed Truths, whose title refers to the prevalence of false beliefs and "vulgar errors". A sceptical work that debunks a number of legends circulating at the time in a paradoxical and witty manner, it displays the Baconian side of Browne—the side that was unafraid of what at the time was still called "the new learning". The book is significant in the history of science, because it promoted an awareness of up-to-date scientific journalism, it cast doubt, for example, on the widely believed hypothesis of spontaneous generation.
Browne's last publication during his lifetime, in 1658, were two philosophical Discourses intrinsically related to each other. The first,Hydriotaphia, Urn Burial, or a Brief Discourse of the Sepulchral Urns lately found in Norfolk, inspired by the discovery of some Bronze Ageburials in earthenware vessels found in Norfolk, resulted in a literary meditation upon death, the funerary customs of the world and the ephemerality of fame. The other discourse in the diptych is antithetical in style, subject-matter and imagery. The Garden of Cyrus, or The Quincuncial Lozenge, or Network Plantations of the Ancients, Artificially, Naturally, and Mystically Considered features the quincunx, the arrangement of five units (as with the "five-spot" in dice) and is used by Browne to demonstrate evidence of the Platonic forms in art and nature.
|
0.943779 |
François Roland Truffaut (French: [fʁɑ̃.swa ʁɔ.lɑ̃ tʁyfo]; 6 February 1932 – 21 October 1984) was a French film director, screenwriter, producer, actor, and film critic. He is widely regarded as one of the founders of the French New Wave. In a film career lasting over a quarter of a century, he remains an icon of the French film industry, having worked on over 25 films. Truffaut's film The 400 Blows came to be a defining film of the French New Wave movement, and was followed by four sequels, Antoine et Colette, Stolen Kisses, Bed and Board, and Love on the Run, between 1958 and 1979.
Truffaut's 1973 film Day for Night earned him critical acclaim and several accolades, including the BAFTA Award for Best Film and the Academy Award for Best Foreign Language Film. His other notable films include Shoot the Piano Player (1960), Jules et Jim (1961), The Wild Child (1970), Two English Girls (1971), and The Woman Next Door (1981).
Truffaut was born in Paris on 6 February 1932. His mother was Janine de Montferrand. His mother's future husband, Roland Truffaut, accepted him as an adopted son and gave him his surname. He was passed around to live with various nannies and his grandmother for a number of years. It was his grandmother who instilled in him her love of books and music. He lived with his grandmother until her death, when Truffaut was eight years old. It was only after his grandmother's death that he lived with his parents for the first time. The identity of Truffaut's biological father was unknown, though a private detective agency in 1968 revealed that their inquiry into the matter led to a Roland Levy, a Jewish dentist from Bayonne. Truffaut's mother's family disputed the findings but Truffaut himself believed and embraced them.
Truffaut would often stay with friends and try to be out of the house as much as possible. His best friend throughout his youth and until his death was Robert Lachenay, who was the inspiration for the character René Bigey in The 400 Blows and would work as an assistant on some of Truffaut's films. It was the cinema that offered him the greatest escape from an unsatisfying home life. He was eight years old when he saw his first movie, Abel Gance's Paradis Perdu (Paradise Lost) from 1939. It was there that his obsession began. He frequently played truant from school and would sneak into theaters because he didn't have enough money for admission. After being expelled from several schools, at the age of fourteen he decided to become self-taught. Two of his academic goals were to watch three movies a day and read three books a week.
Truffaut frequented Henri Langlois' Cinémathèque Française where he was exposed to countless foreign films from around the world. It was here that he became familiar with American cinema and directors such as John Ford, Howard Hawks and Nicholas Ray, as well as those of British director Alfred Hitchcock.
After starting his own film club in 1948, Truffaut met André Bazin, who would have great effect on his professional and personal life. Bazin was a critic and the head of another film society at the time. He became a personal friend of Truffaut's and helped him out of various financial and criminal situations during his formative years.
Truffaut joined the French Army in 1950, aged 18, but spent the next two years trying to escape. Truffaut was arrested for attempting to desert the army. Bazin used his various political contacts to get Truffaut released and set him up with a job at his newly formed film magazine Cahiers du cinéma.
Over the next few years, Truffaut became a critic (and later editor) at Cahiers, where he became notorious for his brutal, unforgiving reviews. He was called "The Gravedigger of French Cinema" and was the only French critic not invited to the Cannes Film Festival in 1958. He supported Bazin in the development of one of the most influential theories of cinema itself, the auteur theory.
In 1954, Truffaut wrote an article in Cahiers du cinéma called "Une Certaine Tendance du Cinéma Français" ("A Certain Trend of French Cinema"), in which he attacked the current state of French films, lambasting certain screenwriters and producers, and listing eight directors he considered incapable of devising the kinds of "vile" and "grotesque" characters and storylines that he declared were characteristic of the mainstream French film industry: Jean Renoir, Robert Bresson, Jean Cocteau, Jacques Becker, Abel Gance, Max Ophuls, Jacques Tati and Roger Leenhardt. The article caused a storm of controversy, and also landed Truffaut an offer to write for the nationally circulated, more widely read cultural weekly Arts-Lettres-Spectacles. Truffaut would pen more than 500 film articles for that publication over the next four years.
Truffaut later devised the auteur theory, which stated that the director was the "author" of his work; that great directors such as Renoir or Hitchcock have distinct styles and themes that permeate all of their films. Although his theory was not widely accepted then, it gained some support in the 1960s from American critic Andrew Sarris. In 1967, Truffaut published his book-length interview of Hitchcock, Hitchcock/Truffaut (New York: Simon and Schuster).
After having been a critic, Truffaut decided to make films of his own. He started out with the short film Une Visite in 1955 and followed that up with Les Mistons in 1957.
After seeing Orson Welles' Touch of Evil at the Expo 58, he was inspired to make his feature film directorial debut with The 400 Blows, which was released in 1959 to much critical and commercial acclaim. Truffaut received a Best Director award from the Cannes Film Festival, the same festival that had banned him only one year earlier.
The film follows the character of Antoine Doinel through his perilous misadventures in school, an unhappy home life and later reform school. The film is highly autobiographical. Both Truffaut and Doinel were only children of loveless marriages; they both committed petty crimes of theft and truancy from the military. Truffaut cast Jean-Pierre Léaud as Antoine Doinel. Léaud was seen as an ordinary boy of 14 who auditioned for the role after seeing a flyer, but interviews filmed after the film's release (one is included on the Criterion DVD of the film) reveal Léaud's natural sophistication and an instinctive understanding of acting for the camera. Léaud and Truffaut collaborated on several films over the years. Their most noteworthy collaboration was the continuation of the Antoine Doinel character in a series of films called "The Antoine Doinel Cycle".
The primary focus of The 400 Blows is on the life of a young character by the name of Antoine Doinel. This film follows this character through his troubled adolescence. He is caught in between an unstable parental relationship and an isolated youth. The film focuses on the real life events of the director, François Truffaut. From birth Truffaut was thrown into an undesired situation. As he was born out of wedlock, his birth had to remain a secret because of the social stigma associated with illegitimacy. He was registered as "A child born to an unknown father" in the hospital records. He was looked after by a nurse for an extended period of time. His mother eventually married and her husband Roland gave his surname, Truffaut, to François.
Although he was legally accepted as a legitimate child, his parents did not accept him. The Truffauts had another child who died shortly after birth. This experience saddened them greatly and as a result they despised François because of the memory of regret that he represented (Knopf 4[specify]). He was an outcast from his earliest years, dismissed as an unwanted child. François was sent to live with his grandparents. It wasn't until François's grandmother's death before his parents took him in, much to the dismay of his own mother. The experiences with his mother were harsh. He recalled being treated badly by her but he found comfort in his father's laughter and overall spirit. The relationship with Roland was more comforting than the one with his own mother. François had a very depressing childhood after moving in with his parents. They would leave him alone whenever they would go on vacations. He even recalled memories of being alone during Christmas. Being left alone forced François into a sense of independence, he would often do various tasks around the house in order to improve it such as painting or changing the electric outlets. Sadly, these kind gestures often resulted in a catastrophic event causing him to get scolded by his mother. His father would mostly laugh them off.
The 400 Blows marked the beginning of the French New Wave movement, which gave directors such as Jean-Luc Godard, Claude Chabrol and Jacques Rivette a wider audience. The New Wave dealt with a self-conscious rejection of traditional cinema structure. This was a topic on which Truffaut had been writing for years.
Following the success of The 400 Blows, Truffaut featured disjunctive editing and seemingly random voice-overs in his next film Shoot the Piano Player (1960) starring Charles Aznavour. Truffaut has stated that in the middle of filming, he realized that he hated gangsters. But since gangsters were a main part of the story, he toned up the comical aspect of the characters and made the movie more attuned to his liking.
Even though Shoot the Piano Player was much appreciated by critics, it performed poorly at the box office. While the film focused on two of the French New Wave's favorite elements, American film noir and themselves, Truffaut never again experimented as heavily.
In 1962, Truffaut directed his third movie, Jules and Jim, a romantic drama starring Jeanne Moreau. The film was very popular and highly influential.
In 1963, Truffaut was approached to direct an American film called Bonnie and Clyde, with a treatment written by Esquire journalists, David Newman and Robert Benton intended to introduce the French New Wave to Hollywood. Although he was interested enough to help in script development, Truffaut ultimately declined, but not before interesting Jean-Luc Godard and American actor and would be producer, Warren Beatty, the latter of whom proceeded with the film with director Arthur Penn.
His fourth movie as director was The Soft Skin (1964) which was not well acclaimed on initial release.
Truffaut's first non-French film was a 1966 adaptation of Ray Bradbury's classic science fiction novel Fahrenheit 451, showcasing Truffaut's love of books. His only English-speaking film was a great challenge for Truffaut, because he barely spoke English himself. This was also his first film shot in color. The larger scale production was difficult for Truffaut, who had worked only with small crews and budgets.
Truffaut worked on projects with varied subjects. The Bride Wore Black (1968), a brutal tale of revenge, is a stylish homage to the films of Alfred Hitchcock (once again starring Jeanne Moreau).
Mississippi Mermaid (1969), with Catherine Deneuve and Jean-Paul Belmondo is an identity-bending romantic thriller.
The Wild Child (1970) included Truffaut's acting debut in the lead role of 18th century physician Jean Marc Gaspard Itard.
Bed and Board (1970) was another Antoine Doinel film, also with Claude Jade from Stolen kisses who is now Léaud's on-screen-wife.
Two English Girls (1971) is the female reflection of the same love story as "Jules et Jim". It is based on a story written by Henri-Pierre Roche, who also wrote Jules and Jim. It is about a man who falls equally in love with two sisters, and their love affair over a period of years.
Such a Gorgeous Kid Like Me (1972) was a screwball comedy that was not well received.
Day for Night won Truffaut a Best Foreign Film Oscar in 1973. The film is probably his most reflective work. It is the story of a film crew trying to finish their film while dealing with all of the personal and professional problems that accompany making a movie. Truffaut plays the director of the fictional film being made. This film features scenes shown in his previous films. It is considered to be his best film since his earliest work. Time magazine placed it on their list of 100 Best Films of the Century (along with The 400 Blows).
In 1975, Truffaut gained more notoriety with The Story of Adèle H. Isabelle Adjani in the title role earned a nomination for a Best Actress Oscar.
Truffaut's 1976 film Small Change gained a Golden Globe Nomination for Best Foreign Film.
The Man Who Loved Women (1977), a romantic drama, was a minor hit.
The Green Room (1978) starred Truffaut himself in the lead.
It was a box office flop so he made Love on the Run (1979) starring Jean-Pierre Léaud and Claude Jade is the final movie of the Doinel Cycle.
One of Truffaut's final films gave him an international revival. In 1980, his film The Last Metro garnered twelve César Award nominations with ten wins, including Best Director.
Truffaut's final movie was shot in black and white. It gives his career almost a sense of having bookends. Confidentially Yours is Truffaut's tribute to his favorite director, Alfred Hitchcock. It deals with numerous Hitchcockian themes, such as private guilt vs. public innocence, a woman investigating a murder, anonymous locations, etc.
Among Truffaut's films, a series features the character Antoine Doinel, played by the actor Jean-Pierre Léaud. He began his career in The 400 Blows at the age of fourteen, and continued as the favorite actor and "double" of Truffaut. The series continued with Antoine and Colette (a short film in the anthology Love at Twenty), Stolen Kisses (in which he falls in love with Christine Darbon alias Claude Jade), Bed and Board about the married couple Antoine and Christine—and, finally, Love on the Run, where the couple go through a divorce.
In the last movies, Léaud's girlfriend and later wife, Christine Darbon, was played by Truffaut's favorite actress, Claude Jade. During the filming of Stolen Kisses, Truffaut himself fell in love with, and was briefly engaged to, Claude Jade.
A keen reader, Truffaut adapted many literary works, including two novels by Henri-Pierre Roché, Ray Bradbury's Fahrenheit 451, Henry James' "The Altar of the Dead", filmed as The Green Room, and several American detective novels.
Truffaut's other films were from original screenplays, often co-written by the screenwriters Suzanne Schiffman or Jean Gruault. They featured diverse subjects, the sombre The Story of Adèle H., inspired by the life of the daughter of Victor Hugo, with Isabelle Adjani; Day for Night, shot at the Victorine Studios describing the ups and downs of film-making; and The Last Metro, set during the German occupation of France, a film rewarded by ten César Awards.
Known as being a lifelong cinephile, Truffaut once (according to the 1993 documentary film François Truffaut: Stolen Portraits) threw a hitchhiker he had picked up out of his car after learning that the hitchhiker didn't like films.
Truffaut is admired among other filmmakers and several tributes to his work have appeared in other films such as Almost Famous, Face and The Diving Bell and the Butterfly, as well as novelist Haruki Murakami's Kafka on the Shore.
He also acted, appearing in Steven Spielberg's 1977 film Close Encounters of the Third Kind, where he played scientist Claude Lacombe.
Truffaut expressed his admiration for filmmakers such as Luis Buñuel, Ingmar Bergman, Robert Bresson, Roberto Rossellini, and Alfred Hitchcock. Truffaut wrote Hitchcock/Truffaut, a book about Hitchcock, based on a lengthy series of interviews.
On Jean Renoir, he said: "I think Renoir is the only filmmaker who's practically infallible, who has never made a mistake on film. And I think if he never made mistakes, it's because he always found solutions based on simplicity—human solutions. He's one film director who never pretended. He never tried to have a style, and if you know his work—which is very comprehensive, since he dealt with all sorts of subjects—when you get stuck, especially as a young filmmaker, you can think of how Renoir would have handled the situation, and you generally find a solution".
In 1973, Jean-Luc Godard accused Truffaut of making a movie that was a "lie", and Truffaut replied with a 20-page letter in which he accused Godard of being a radical-chic hypocrite, a man who believed everyone to be "equal" in theory only. The two never saw each other again. However, as noted by Serge Toubiana and Antoine de Baecque in their biography of Truffaut, Godard tried to reconcile their friendship later on, and after Truffaut's death wrote the introduction to a collection of his letters and a lengthy tribute in his video-essay film Histoire(s) du cinéma.
Truffaut was married to Madeleine Morgenstern from 1957 to 1965, and they had two daughters, Laura (born 1959) and Eva (born 1961). Madeleine was the daughter of Ignace Morgenstern, managing director of one of France's largest film distribution companies, and was largely responsible for securing funding for Truffaut's first films. He had affairs with many of his leading ladies: in 1968 he was engaged to actress Claude Jade; Truffaut and actress Fanny Ardant lived together from 1981 to 1984 and had a daughter, Joséphine Truffaut (born 28 September 1983).
Truffaut was an atheist, although he had great respect for the Catholic Church and even requested a mass for his funeral.
In July 1983, Truffaut rented France Gall's and Michel Berger's house outside Honfleur, Normandy (composing for Philippe Labro's film Rive droite, rive gauche) when he had his first stroke and was diagnosed with a brain tumor. He was expected to attend his friend Miloš Forman's Amadeus premiere when he died on 21 October 1984, aged 52, at the American Hospital in Neuilly-sur-Seine in France.
At the time of his death, he still had numerous films in preparation. His goal was to make 30 films and then retire to write books for his remaining days. He was five films short of his personal goal. He is buried in Paris' Montmartre Cemetery.
^ Obituary Variety, 24 October 1984.
^ a b c "FRANCOIS TRUFFAUT – French New Wave Director". Newwavefilm.com. Retrieved 6 February 2012.
^ François Truffaut: film author 1932–1984 – Robert Ingram, Paul Duncan. Google Books. Retrieved 6 February 2012.
^ a b "François Truffaut – Movie and Film Biography and Filmography". Allmovie.com. 21 October 1984. Retrieved 6 February 2012.
^ "'Francois Truffaut' at the Cinematheque Francaise: Exhibition Review". The Hollywood Reporter. Retrieved 31 January 2017.
^ Truffaut, François (1989). Correspondence, 1945–1984. New York: Farrar, Straus and Giroux. pp. 17, 50, 57.
^ SUKHDEV SANDHU (2 April 2009). "Film as an act of love". New Statesman.
^ The Editors of Encyclopædia Britannica (20 July 1998). "Auteur theory FILMMAKING". Encyclopedia Britannica.
^ a b c "The 47th Academy Awards (1975) Nominees and Winners". oscars.org. Retrieved 10 January 2012.
^ Aurélien Ferenczi (26 October 2014). "Qu'allait-donc faire Truffaut chez Spielberg ?". Télérama.
^ François Truffaut. "Hitchcock". Goodreads. Retrieved 14 March 2016.
^ Gleiberman, Owen. "Godard and Truffaut: Their spiky, complex friendship is its own great story in 'Two in the Wave".
^ de Baecque, Antione; Toubiana, Serge (2000). Truffaut: A Biography. University of California Press. ISBN 0520225244.
^ Eric Pace (22 October 1984). "Francois Truffaut, New Wave Director, Dies". New York Times. Retrieved 1 May 2013. Mr. Truffaut's 1957 marriage to Madeleine Morgenstern ended in divorce. He is survived by two adult daughters from that marriage, Laura Truffaut-Wong of San Francisco and Eva Truffaut of Paris, and by a 13-month-old daughter, Josephine.
^ Eric Michael Mazur (2011). Encyclopedia of Religion and Film. ABC-CLIO. p. 438. ISBN 9780313330728. Yet Truffaut, an atheist, was not stumping for God with these conservative attacks.
^ David Sterritt (1999). The Films of Jean-Luc Godard: Seeing the Invisible. Cambridge University Press. p. 17. ISBN 9780521589710. One way of understanding Godard's approach is to contrast it with that of François Truffaut, one of his most respected New Wave colleagues. As a self-described atheist, Truffaut took special pleasure in the materiality of cinema, noting that no photographic image can be obtained without real, physical light making direct contact with a real, physical object in the immediate presence of the camera.
^ "Truffaut : un classique (1970-80)". francetv.fr. Retrieved 14 March 2016.
^ "Francois Truffaut, New Wave Director, Dies". The New York Times. 22 October 1984. Retrieved 26 May 2011. François Truffaut, the exuberant film director whose depictions of children, women and romantic obsessions helped make him a leader of the New Wave group of French movie makers, died yesterday. He was 52 years old. Mr. Truffaut died at the American Hospital in Neuilly-sur-Seine, a Paris suburb, a hospital spokesman said. He had been hospitalized about 10 days ago for treatment of cancer.
^ "Journées du patrimoine 2011 Paris 18ème, le programme". Le Figaro. 14 September 2011. Retrieved 29 December 2016.
^ "The 32nd Academy Awards (1960) Nominees and Winners". oscars.org. Retrieved 15 November 2011.
^ "The 41st Academy Awards (1969) Nominees and Winners". oscars.org. Retrieved 15 November 2011.
^ "IMDB.com: Awards for Small Change". imdb.com. Retrieved 16 July 2010.
^ "IMDB.com: Awards for The Man Who Loved Women". imdb.com. Retrieved 25 July 2010.
^ "IMDB.com: Awards for Love on the Run". imdb.com. Retrieved 14 August 2010.
^ "The 53rd Academy Awards (1981) Nominees and Winners". oscars.org. Retrieved 8 June 2013.
^ "François Truffaut, l'exposition". Archived from the original on 31 August 2014. Retrieved 29 June 2014.
Wikimedia Commons has media related to François Truffaut.
François Truffaut complete biography: "François Truffaut"
"François Truffaut collected news and commentary". The New York Times.
|
0.942131 |
Applied Science includes such things as applied social science, medical science, information science, accounting, navigation, engineering science, and measurement.
Early prehistory including Pliocene prehistory, early Pleistocene prehistory, early mid Pleisocene prehistory, mid Pleistocene prehistory, and late mid Pleitocene prehistory can be connected. Middle prehistory including the 5th decamillennium BP, 4th decamillennium BP, 3rd decamillennium BP, and 2nd decamillennium BP can be connected. Late prehistory including the 8th millennium BC, 7th millennium BC, 6th millennium BC, 5th millennium BC, and 4th millennium BC can be connected.
The early 3rd millennium BC including the 30th century BC, 29th century BC, 28th century BC, 27th century BC, and 26th century BC can be connected. The late 3rd millennium BC including the 25th century BC, 24th century BC, 23rd century BC, 22nd century BC, and 21st century BC can be connected. The early 2nd millennium BC including the 20th century BC, 19th century BC, 17th century BC, 17th century BC, and 16th century BC can be connected. The late 2nd millennium BC including the 15th century BC, 14th century BC, 13th century BC, 12th century BC, and 11th century BC can be connected. The early 1st millennium BC including the 10th century BC, 9th century BC, 8th century BC, 7th century BC, and 6th century BC can be connected.
Early classical history including the 5th century BC, 4th century BC, 3rd century BC, 2nd century BC, and 1st century BC can be connected. Late classical history including the 1st century CE, 2nd century CE, 3rd century CE, 4th century CE, and 5th century CE can be connected. Early medieval history including the 6th century CE, 7th century CE, 8th century CE, 9th century CE, and 10th century CE can be connected. Late medieval history including the 11th century CE, 12th century CE, 13th century CE, 14th century CE, and 15th century CE can be connected.
The 16th century including the early 16th century, early mid 16th century, mid 16th century, late mid 16th century, and late 16th century can be connected. The 17th century including the early 17th century, early mid 17th century, mid 17th century, late mid 17th century, and late 17th century can be connected. The 18th century including the early 18th century, early mid 18th century, mid 18th century, late mid 18thcentury, and late 18th century can be connected.
The 19th century including the early 19th century and early mid 19th century can be connected. The mid 19th century including the early 1840s, late 1840s, early 1850s, and late 1850s can be connected. The late mid 19th century including the early 1860s, late 1860s, early 1870s, and late 1870s can be connected. The late 19th century including the early 1880s, late 1880s, early 1890s, and late 1890s can be connected.
The 20th century including the early 20th century, early mid 20th century, mid 20th century, late mid 20th century, late 20th century, and early 21st century can be connected.
The late 20th century including the early 1980s and late 1980s can be connected. The early 1990s including 1991, 1992, 1993, 1994, and 1995 can be connected. The late 1990s including 1996, 1997, 1998, 1999, and 2000 can be connected.
2011 including the first quarter 2011, second quarter 2011, third quarter 2011, and fourth quarter 2011 can be connected. 2012 including the first quarter 2012, second quarter 2012, third quarter 2012, and fourth quarter 2012 can be connected. 2013 including the first quarter 2013, second quarter 2013, third quarter 2013, and fourth quarter 2013 can be connected.
2014 can be connected. The first quarter 2014 can be connected. January 2014 including 2014 week 1, 2014 week 2, 2014 week 3, 2014 week 4, and 2014 week 5 can be connected. February 2014 including 2014 week 5, 2014 week 6, 2014 week 7, 2014 week 8, 2014 week 9 can be connected. March 2014 can be connected.
The late 2010s including 2016 can be connected.
2016 including the first quarter 2016, second quarter 2016, third quarter 2016, and fourth quarter 2016 can be connected. 2017 including the first quarter 2017 and second quarter 2017 can be connected.
Nations including Philippines, Vietnam, Ethiopia, Egypt, Germany, Iran, Turkey, Congo DR, Thailand, France, United Kingdom, Italy, South Africa, South Korea, Burma, Colombia, Spain, Ukraine, Tanzania, Argentina, Kenya, Poland, Algeria, Canada, Iraq, Uganda, Morocco, Sudan, Peru, Uzbekistan, Malaysia, Venezuela, Saudi Arabia, Nepal, Yemen, Afghanistan, Ghana, North Korea, Mozambique, Taiwan, Australia, Syria, Côte d'Ivoire, Madagascar, Sri Lanka, Angola, Cameroon, Romania, Chile, Netherlands, Kazakhstan, Niger, Burkina Faso, Guatemala, Mali, Ecuador, Cambodia, Malawi, Zambia, Senegal, Zimbabwe, Chad, Cuba, Belgium, Greece, Rwanda, Tunisia, Portugal, Czech Republic, Bolivia, Guinea, Burundi, Haiti, Hungary, Somalia, Sweden, Belarus, Dominican Republic, Azerbaijan, Benin, Austria, can be connected.
Western civilization including Anglic, Latin, and Northeast European peoples can be connected. Mexico can be connected.
Anglic peoples such as those of the United States can be connected.
Latin peoples such as those of Brazil can be connected.
Northeast european peoples such as those of Russia can be connected.
Asiatic peoples such as those of Japan can be connected. South Asian peoples such as those of Bangladesh can be connected. India can be connected. Pakistan can be connected. Oriental peoples such as those of China can be connected. Southeast Asian and Oceanic peoples such as those of Indonesia can be connected.
African peoples such as those of Nigeria can be connected.
American Indian peoples such as those of Mexico can be connected. Middle American Indian peoples such as those of the southwestern United States can be connected. South American Indian peoples such as those of Brazil can be connected. North American Indian peoples such as those of the United States can be connected.
Cities such as Tokyo, Seoul, Mexico City, New York City, Mumbai, Jakarta, Sao Paulo, Delhi, Shanghai, Manila, Karachi, Cairo, Beijing, Osaka, Canton, Moscow, Los Angeles, Calcutta, Dacca, Buenos Aires, Istanbul, Rio de Janeiro, Shenzhen, Lagos, Paris, Nagoya, Lima, Chicago, Kinshasa, Tianjin, Chennai, Bengaluru, London, Saigon, Donguan, Hyderabad, Chengdu, Lahore, can be connected.
Social change including particular changes and movements, social change factors, and social change processes can be connected. Social types including industrial societies, agrarian societies, horticultural societies, and hunting and gathering societies can be connected. Social structure including community and regional structure, class structure, institutional structure, cultural structure, and anthropological structure can be connected.
Institutions including religion, government, economics, education, and family can be connected.
Religion including religious belief can be connected. Particular religions including Abrahamic religion, Asiatic religion, pagan religion, and secularism can be connected. Religious organization can be connected. Religous practice can be connected.
Government including government activity, government structure, and law can be connected. Particular governments including international government, national government, and local government can be connected.
Economics including economic systems, industries, and economic activity can be connected. Education including school systems, educational organization, cultural institutions, teaching, and research can be connected. Families including particular families, kinship, parenting, and marriage can be connected.
Behavioral culture including cultural events, recreation and entertainment, occupations, and customs can be connected. Other conceptual culture including philosophy, mathematics, literature, graphic arts, and language can be connected. Material culture including miscellaneous artifacts, communications technology, transportation technology, clothing and dress, foodstuffs, building technology, and industrial technology can be connected.
Particular groups can be connected. Human geography including Asian geography, European geography, African geography, North American geography, South American geography, and Oceanic geography can be connected. Human ecology including human effects on the environment, relations with other life forms, and environmental effects on people can be connected. Physical anthropology including human origins, racial variation, and human dispersion can be connected. Demography including population change, population size and structure, migration, death, and birth and fertility can be connected. Social foundations including social group behavior, social group types, social control, social interaction, and social presentation can be connected.
Biography can be connected. Psychology including social psychology, personality, mental disorders, developmental psychology, behavior patterns, mind, and behavioral elements can be connected. The human body including form and appearance, disease, life cycle, body functions, and body systems can be connected.
|
0.999985 |
Provides several methods to help resolve the problem. These are the canonical release forms of GnuPG. » Changelog Update 1.
Find your new favorite Mac app today at MacUpdate! Jan 07, · Important: QuickTime 7 for Windows is no longer supported by Apple.
Cannot install software updates mac. Autodesk provides students institutions free access to AutoCAD for Mac software, educators in addition to learning tools. Cannot install software updates mac. 4 Tiger uses less memory than Leopard so there are good reasons to install , is supported on G3 Macs, unlike Leopard, supports Classic Mode on PowerPC Macs reinstall it on your old Macs.
However, you cannot set the operating system to automatically install software updates. HOBOware can now open MX2501 ( pH Logger) HOBO files from HOBOmobile. 2 My current version is 12.
After you install the legacy lobby we made a quick update that enabled Casino Bingo support. Software updaters are offered free of charge to all registered users. Jan 09 neither does regedit, doesnt work, MS this is a BUG, fix amblr is a desktop application that allows you to upload pictures , · Cannot change MAC address in windows 7 - driver has option videos on Instagram.
If you want to Install Update, Reinstall , Troubleshoot Download AOL Desktop Gold software For windows & Mac? BaseCamp software version 4. 2 COMBO puters How to handle OS X firmware updates that won' t install. I have been instructed by MS to say " I can' t install Office for MAC updates.
HOBOware now runs on Java 10 on Macintosh just as it has on Windows. Cannot install software updates mac.
To install the latest software updates on your Mac computer please follow these steps. Notes: System Requirements: Windows Vista SP2 Windows 7 SP1 later is required. Specializing in modeling amplifiers Line 6 is dedicated to inspiring creativity with its music- creation this Article: Article Summary Preparing to Install Installing on Windows Installing on Mac Community Q& A References This wikiHow teaches you how to install Ubuntu Linux on your Windows , recording software, digital modeling guitars Mac computer without erasing your current operating system. This updates just a single file. That includes Safari Mail, Photos, Books, Messages, Calendar FaceTime. To use them you need to build the binary version from the provided source code.
HP Smart Install questions and answers 6 AFTER INSTALLATION 17. My current version is 12. How to Check for and Install Updates on a Mac Computer. On PowerPC machines Tiger is the last version of OS X that supports Classic mode the. 4 or later has built- in driver to support USB 3. Update only the files that have been added or modified. Important Info for 10.
Dial tollfree number & install AOL desktop Gold. 0 interface on Thunderbolt Station. Don' t rely on Oracle to install Java properly on your Mac.
" I am therefore unable to install 12. This will install the latest jdk: brew cask install java If you want to manage multiple versions of Java on your Mac, consider using jenv.
Check Apple' s servers. For macOS that implements point- drop) creation of workflows for automating repetitive tasks into batches for quicker alteration, thus saving time , drag ,- click ( effort over human intervention to manually change each file separately. Automator enables the repetition of tasks across a wide variety of programs Reviews , eeAllSoftware - Latest Info on Software Downloads releases. TurboTax Deluxe Tax Software Fed + Efile + State PC/ MAC Disc [ Amazon Exclusive].
I am trying to install office update 12. Get a free 3- year education license now. New versions of Windows since have included support for the key media formats, such as H.
For Unix systems this is the standard way of installing software. To automatically install macOS updates in the future including apps downloaded from the App Store select ” Automatically keep my Mac up to date. Java software for your computer JRE, Java Virtual Machine, is also referred to as the Java Runtime, Java VM, Runtime Environment, Runtime, Java plug- in, JVM, Java add- on , the Java Runtime Environment, VM, Java plugin, Virtual Machine Java download. Legacy Island install - Version 3.
All of our software products come with a free update policy for the lifetime of the product. OS X Software Updates have included some of the work done by the XQuartz project Apple cannot ship the latest , but for various reasons greatest version offered by the XQuartz.
Use the Options | Control Properties command press the F11 key choose the Volume tab. Apr 04 you are getting the “ Cannot Connect to App Store” error, · If you’ re trying to access the Mac App Store you can typically resolve the issue with a few simple troubleshooting steps. View installation instructions. MacOS Sierra marks most unofficial apps as unsigned software, so you' ll need to perform.
US Canada MacTopos map DVDs, MacElevation display, digital marine charts, accessories great service. It features a similar upload wizard - so that you don' t need a smartphone! To install WD Discovery for My Cloud Home, please refer to the Software Setup section of Answer ID 18896 My Cloud Home Desktop App Online User Guide. It displays recording sources and volume levels.
NaturalReader is a text- to- speech software for personal use. Select either the Line item or the Microphone stall Canon camera software without the CD.
Software updates keep your computer programs secure, fix errors provide new features. Fortunately it’ s not too complicated, but you really shouldn’ t have to jump through these hoops to make their product work.
If you haven' t even got past the download stage there are a few things to try. When installing Windows OS ( whether it is clean install reinstall , dual boot) you may receive various kinds of errors saying Windows cannot be installed to this. Thunderbolt Station Manual: Download Manual; Mac OSX 10. When the installer files have been thod 1: Setting Volumes Using GoldWave. Click on the Apple ( ) menu in the upper left hand corner and then select the Software Update menu option. BTW, I suggest starting with the 10.
Cannot install software updates mac. So if you’ ve switched from a PC to a Mac just want to use your scanner on both platforms how do you fix this mess? Navigation software to connect your Mac with most GPS receivers.
UPDATE: Now that Java 8 is no longer the most current version, if you want java 8 install it this way:. If you have a Steam or Mac OS X.
What to do if you' ve lost your original CD sources of software and details of available updates. When Apple releases a new macOS update a lot of Install Update the best Mac apps - MacUpdate. Cannot install software updates mac.
3 ( * ) Please note that this update cannot be used for the Steam or Mac OS X version of Farming- Simulator 17. 86b - File Date 4/ 27/. Exporting data to Excel would sometimes give times in the wrong time zone but that is fixed.
An update is any software release that corrects existing problems in the software or makes functional adjustments to its features. Auto- Update features on the Help menu of most of our products will inform you when updates are available to.
If you' ve got an OS X firmware update that just refuses to install properly, there are a few things you can try to remedy the. Can' t download the macOS update. I am using eclipse helios ( IDE for Java EE developers) 64 bit latest version and when I am trying to update it from help> check for updates I am getting the error: Cannot complete the install.
If I have already installed the product software on my computer, what will happen if I connect another device ( of the same model). 264 AAC that QuickTime 7 enabled. Android users can turn app updates on or off through the Google Play Store settings. Automator is an application developed by Apple Inc. This easy- to- use software with natural- sounding voices can read to you any text such as Microsoft Word files webpages, PDF files E- mails. Interrupting an installation can wreck havoc with your machine. See the help for more information.
Cannot install software updates mac. When Software Update says that your Mac is up to date macOS all of its apps are also up to date. Mobile Spy cell phone monitoring software monitors your child employee' s smartphone activity on Android- based smartphones tablets. To install on a Mac computer: Download the installer files based on the download methods available for your product.
Manually download a couple of those install them one at a time. Many apps that you install will get regular updates that can improve install explore always updated Mac apps. WD Discovery can be used to manage Western Digital Direct Attached Storage ( DAS) products and My Cloud Home devices.
First, make sure the Mac in question is successfully connected to the internet ( that may be a duh no brainer. The MacInTouch Home Page is the original Mac news site reliable news, iPhone/ iOS systems, information , analysis about Apple Macintosh , providing timely plus security issues. Discusses that you cannot install an update for Microsoft Office for Mac or Microsoft Office for Mac.
Mar 22, · How to Use a Combo Update to Install Mac OS X Updates. Interesting, they used to show the sha1 hash prominently on the combo download pages, maybe they have mistakenly removed them from the web. Tired of complex app installs and updates?
How to Install Software from Unsigned Developers on a Mac. This wikiHow teaches you how to install software that isn' t approved by Apple on your Mac.
|
0.999995 |
Walk into any smoothie or juice bar and there is usually a list of extras that you can ask to be added into your smoothie. But are they worth the extra cost? Some of the more common add-ins are explained.
These small balls of pollen made by honey bees have been used as a supplement for centuries.
Add when: You are looking for an energy enhancer.
Advantages: High in vitamins, including vitamin A and almost all the B complex vitamins.
Tastes: Can have a hint of sweet flavor like honey.
Beware: Should be avoided by those who are pregnant or who have allergies or asthma.
Protein powders are frequently consumed by athletes to improve strength.
Add when: You are active and are looking for increased muscle mass.
Advantages: Protein powder can increase strength and power.
Tastes: Protein powders vary widely. Some are plant based and others are made from dairy. They also come in a variety of flavors.
Beware: Protein powders can be very high in calories. Excessive amounts of protein supplementation has also been associated with kidney problems.
Chia seeds have been used for centuries as food and for medicinal purposes.
Add when: You want an energy or nutrient boost or want to lower your blood sugar.
Advantages: Chia seeds are nutrient dense. They also contain a high amount of protein, fiber, and omega-3 fatty acids.
Beware: Chia seeds are known to be safe for general consumption.
Ginger is not only a great tasting spice, but also contains gingerol, a substance known to help with nausea.
Add when: You are looking for a savory taste to your smoothie or when you have an upset stomach.
Advantages: Ginger has a long history of helping with digestive problems including nausea and motion sickness.
Beware: Ginger may be a safe and effective treatment for nausea during pregnancy. However, you should check with your medical provider before using any spices as medicine.
Matcha is finely grown powder made from shade grown tea leaves.
Add when: You are looking for a caffeine or antioxidant boost.
Advantages: Green tea is one of the healthiest teas to drink. It has been known to prevent cancer, help with gum disease, and promote weight loss.
Beware: If you are allergic to tea, you should avoid matcha powder. Also, matcha tea is typically very bitter so sometimes it is mixed with a lot of sugar to balance the flavor.
Cayenne (chile) pepper is used to spice up food and for weight loss. Capsaicin is the active substance in chile peppers.
Advantages: Cayenne peppers have been known to help fight cancer, inflammation, and obesity.
Beware: While some say cayenne pepper will increase your metabolism and help you burn fat, according to the Mayo Clinic, no foods burn fat. Also, when taken in excess, the active ingredient in chile peppers can have side effects on the cardiovascular system.
Probiotics can be added to a smoothie by adding yogurt, fermented foods, or in a capsule form.
Add when: You want to improve your digestion or are taking an antibiotic.
Advantages: A number of health benefits are known to come from consuming probiotics such as an improved intestinal tract and immune system.
Beware: The concentration of probiotics in supplements varies tremendously.
Most smoothies are inherently healthy, especially if they are made with fresh fruit, yogurt, and only small amounts of sugar. Smoothie add-ins can be expensive and the quality is sometimes unknown. While some supplementation may be helpful, kicking up the smoothie with every available add-in is not always wise.
Ever Think of Eating Yogurt to Treat Depression?
Is It Safe To Eat Bee Pollen?
|
0.96392 |
For the ships, see Massachusetts ship Tyrannicide (1776) and French ship Tyrannicide (1793).
Tyrannicide is the killing or assassination of a tyrant or unjust ruler, usually for the common good, and usually by one of the tyrant's subjects.
The term originally denoted the action of Harmodius and Aristogeiton, who are often called the Tyrannicides, in killing Hipparchus of Athens in 514 BC.
Tyrannicide can also be a political theory, and as such dates from antiquity. Support for tyrannicide can be found in Plutarch's Lives, Cicero's De Officiis, and Seneca's Hercules Furens. Plato describes a violent tyrant as the opposite of a good and "true king" in the Statesman, and while Aristotle in the Politics sees it as opposed to all other beneficial forms of government, he also described tyrannicide mainly as an act by those wishing to gain personally from the tyrant's death, while those who act without hope of personal gain or to make a name for themselves are rare.
Various Christian philosophers and theologians also wrote about tyrannicide. In Thomas Aquinas's commentary on the Sentences of Peter Lombard, Aquinas gave a defense not only of disobedience to an unjust authority, using as an example Christian martyrs in the Roman Empire, but also of "one who liberates his country by killing a tyrant." The Monarchomachs in particular developed a theory of tyrannicide, with Juan de Mariana describing their views in the 1598 work De rege et regis institutione, in which he wrote, "[B]oth the philosophers and theologians agree, that the prince who seizes the state with force and arms, and with no legal right, no public, civic approval, may be killed by anyone and deprived of his life..."
Benjamin Franklin's suggestion for the Great Seal of the United States included the phrase "Rebellion to Tyrants is Obedience to God."
The Jesuistic casuistry developed a similar theory, criticized by Blaise Pascal in the Provincial Letters. Before them, the scholastic philosopher John of Salisbury also legitimised tyrannicide, under specific conditions, in the Policraticus, circa 1159. His theory was derived from his idea of the state as a political organism in which all the members cooperate actively in the realization of the common utility and justice. He held that when the ruler of this body politic behaves tyrannically, failing to perform his characteristic responsibilities, the other limbs and organs are bound by their duty to the public welfare and God to correct and, ultimately, to slay the tyrant.
In 1408 the theologian Jean Petit used biblical examples to justify tyrannicide following the murder of Louis I, Duke of Orleans by Petit's patron John the Fearless, Duke of Burgundy. Petit's thesis was extensively discussed and eventually condemned by the church. A Shone Treatise of Politike Power, written by John Ponet in 1556, argued that the people are custodians of natural and divine law, and that if governors and kings violated their trust, then they forfeited their power, whether they relinquished their positions voluntarily or whether they had to be removed forcefully. The Tenure of Kings and Magistrates by John Milton in 1649 also described the history of tyrannicide, and a defense of it when appropriate.
Cambridge's David George has also argued that terrorism is a form of tyranny of which tyrannicide is a negation. Abraham Lincoln believed that assassinating a leader is morally justified when a people has suffered under a tyrant for an extended period of time and has exhausted all legal and peaceful means of ouster.
Throughout history, many leaders have died under the pretext of tyrannicide. Hipparchus, one of the last Greek leaders to use the title of "tyrant," was assassinated in 514 BC by Harmodius and Aristogeiton, the original tyrannicides. Since then "tyrant" has been a pejorative term, lacking objective criteria. Many rulers and heads of state have been considered as such by their enemies but not by their adherents and supporters. For example, when John Wilkes Booth assassinated Abraham Lincoln in 1865, he wrote how he considered Lincoln a tyrant while comparing himself to Marcus Junius Brutus, who stabbed the Roman dictator Julius Caesar in 44 BC.
Tyrannicides have a poor record of achieving their intended outcome. Caesar's death, for example, failed to bring a return to republican power, and instead led to the Roman Empire, but it galvanized later assassins like Booth. Several of Caesar's successors (as Roman Emperors) were also killed for their tyrannical actions, including Caligula, who was stabbed in 41 by Cassius Chaerea and other Praetorian Guards, and Domitian, stabbed in 96 by a steward of Flavia Domitilla named Stephanus. Many attempts on Commodus's life in the late 2nd century failed, including the one instigated by his own sister Lucilla, but he ultimately fell victim to his own excess by a successful murderous coup. After the fall of the Western Roman Empire, tyrannicide continued in the Byzantine Empire when Emperor Andronikos I Komnenos, was tied to a pillar, beaten, and dismembered by a mob in 1185.
Tyrannicide has also been connected to revolution, with many taking place during successful revolutions, and others sparking revolutionary upheavals. In the midst of the French Revolution, Maximilien Robespierre, took power as the President of the National Convention, but after leading the Reign of Terror from 1793 to 1794, he was executed by beheading by the National Convention. The Romanian Revolution, one of the Revolutions of 1989, enabled a group of defected soldiers to capture Nicolae Ceauşescu, the country's communist leader, and to stage a trial after which he was executed by a firing squad of paratroopers Ionel Boeru, Georghin Octavian and Dorin-Marian Cirlan.
Many assassins have been killed in the act, such as Rigoberto López Pérez, who shot Nicaraguan dictator Anastasio Somoza García in 1956. Others were prosecuted for the killing: Antonio de la Maza and his conspirators were executed after their shooting of Rafael Trujillo, dictator of the Dominican Republic in 1961, as was Kim Jaegyu, who shot South Korean dictator Park Chung-hee in 1979. Five of the members of Young Bosnia who were involved with the assassination of Archduke Franz Ferdinand in Sarajevo were sentenced to death by hanging, while eleven were sentenced to various years in prison, including Gavrilo Princip who fired the fatal shot. Khalid Islambouli was one of three members of Egyptian Islamic Jihad executed for the assassination of Anwar Sadat, the autocratic President of Egypt in 1981. Even both Hipparchus's assassins were themselves killed, Harmodius on the spot and Aristogeiton after being tortured, and the major conspirators in the plot to kill Caesar were likewise killed or forced to commit suicide.
Outright revolt was the context for other tyrannicides, and allowed individual killers to escape or remain anonymous. During World War II and the Italian resistance movement, Walter Audisio claimed to have led his team of partisans in the abduction and execution by firing squad of Benito Mussolini in 1945. The circumstances remain clouded, though Audisio was later elected to both the Italian Chamber of Deputies and the Italian Senate. In 1990, Samuel Doe, the President of Liberia was tortured to his death. In 1996, during their takeover of Afghanistan, Taliban soldiers captured Mohammad Najibullah, the President of the Soviet-backed Democratic Republic of Afghanistan, and dragged him to death. Saddam Hussein, President of Iraq was executed in 2006. During the 2011 Libyan civil war, Libyan leader Muammar Gaddafi, the self-titled "Brother Leader and Guide of the Revolution," was killed in the Battle of Sirte, in unclear circumstances.
Tyrannicide is a popular literary trope. Many works of fiction deal with the struggle of an individual or group of individuals to overthrow and kill an unjust tyrant. Often the tyranny is caused by an usurper to a royal throne, where the conclusion restores the proper heir. Children's literature frequently deals with the subject. Folk tales like The Nutcracker include the act, as do some video games series, like The Legend of Zelda and Star Fox. Examples in Disney animation include The Lion King and Aladdin which both involve the tyrannical takeover of a monarchy and its overhaul. Fantasy works like The Lord of the Rings, The Chronicles of Narnia, The Brothers Lionheart, A Song of Ice and Fire and science-fiction series like Star Wars and Doctor Who all deal with the killing of tyrants. Besides Julius Caesar, a number of William Shakespeare's plays deal with the subject, including Hamlet, Macbeth, and Richard III. The Italian dramatist, poet and philosopher Vittorio Alfieri devoted much of his work to this issue.
^ Jaucourt, Louis, chevalier de. "Tyrannicide." The Encyclopedia of Diderot & d'Alembert Collaborative Translation Project. Translated by Thomas Zemanek. Ann Arbor: Michigan Publishing, University of Michigan Library, 2009. http://hdl.handle.net/2027/spo.did2222.0001.682. Originally published as "Tyrannicide," Encyclopédie ou Dictionnaire raisonné des sciences, des arts et des métiers, 16:785 (Paris, 1765).
Herbermann, Charles, ed. (1913). "Tyrannicide" . Catholic Encyclopedia. New York: Robert Appleton Company.
^ a b Webb, E. Kent (October 18, 1997). "The Athenian Tyrannicides: Icons of a Democratic Society". University of Washington. Retrieved 2008-10-30.
^ Goebel, Julius Ludwig (1915). The recognition policy of the United States. Columbia University. pp. 24–29. Retrieved October 30, 2008.
^ a b Mohamed, Feisal G. (May 11, 2013). "In Syria and Beyond, the Tyrant as Target". The New York Times. Retrieved May 16, 2013.
^ For Aquinas, "when what is ordered by an authority is opposed to the object for which that authority was constituted ... not only is there no obligation to obey the authority, but one is obliged to disobey it, as did the holy martyrs who suffered death rather than obey the impious commands of tyrants." One may even be "praised and rewarded" for being the "one who liberates his country by killing a tyrant." Commentary on the Sentences of Peter Lombard, trans. J.G. Dawson (Oxford, 1959), 44, 2 in O’Donovan, p. 329-30.
^ Fülöp-Miller, René (1997). Power and Secret of the Jesuits. Kessinger Publishing. pp. 313–318. ISBN 0-7661-0056-1. Retrieved October 30, 2008.
^ Ganns, H. G. "The Jesuits and Tyrannicide," The American Catholic Quarterly Review, Vol. XXVII, 1902.
^ Voegelin 1989, pp. 122–123.
^ Law 2009, p. 18.
^ Booth 2000, p. 17.
^ Law 2009, p. 23.
^ a b c d Montefiore, Simon Sebag (October 26, 2011). "Dictators Get the Deaths They Deserve". The New York Times. Retrieved October 31, 2011.
^ Law 2009, p. 26.
^ Cassius Dio, Roman History, 71.1, 3; 73.4.4-5.
^ Graubard 1999, pp. 72–73.
^ Borge 1992, p. 54.
^ Diederich 1990, p. 20.
^ "Hearts and Minds; Without Kim Jae-kyu? The Morality of Tyrannicide". Korea Times. July 18, 2000.
^ Ajami, Fouad (September–October 1995). "The Sorrows of Egypt: A Tale of Two Men". Foreign Affairs. Council on Foreign Relations.
^ "What Price Brutus?". Time Magazine. April 7, 1947. Retrieved October 31, 2011.
^ McGrail, Mary Ann (2001). "Tyranny in Shakespeare". Utah Valley State College. Archived from the original on 2012-08-02. Retrieved 2008-09-18.
^ Gérard Chalian, Arnaud Blin, The History of Terrorism: From Antiquity to Al Qaeda, p.82, 2007.
Borge, Tomás (1982). Sandinistas Speak. Pathfinder Press. ISBN 0-87348-619-6.
Booth, John Wilkes (2000). Right Or Wrong, God Judge Me: The Writings of John Wilkes Booth. University of Illinois Press. ISBN 0-252-06967-6.
Diederich, Bernard (1990). Trujillo: The Death of The Goat. Waterfront Press. ISBN 0-943862-44-2.
Graubard, Stephen Richards (1999). A new Europe for the old?. 126. Transaction Publishers. ISBN 0-7658-0465-4.
Law, Randall David (2009). Terrorism: a history (illustrated ed.). Polity. p. 18. ISBN 978-0-7456-4038-9.
Voegelin, Eric; Von Sivers, Peter (1989). The collected works of Eric Voegelin. University of Missouri Press. ISBN 0-8262-1142-9.
|
0.997438 |
Why is this drug prescribed: Zyrtec-D contains the same antihistamine found in regular Zyrtec, plus the decongestant pseudoephedrine. The drug is prescribed to relieve the symptoms of hay fever and similar allergies, whether seasonal or year-round.
Most important fact about this drug: Unlike regular Zyrtec, this drug should be avoided by anyone with severe heart or blood pressure problems.
How should you take this medication: Zyrtec-D comes in 12-hour extended release tablets, and should be taken no more than twice a day. The tablet may be taken with or without food, but should be swallowed whole, without breaking or chewing. --If you miss a dose... Take it as soon as you remember. If it is almost time for your next dose, skip the one you missed and go back to your regular schedule. Do not take 2 doses at once. --Storage instructions... Store at room temperature.
Why should this drug not be prescribed: If you are allergic to any of Zyrtec-D's ingredients, to the similar drug Atarax, or to certain drugs that tend to raise blood pressure (adrenergic agents), do not take Zyrtec-D. Symptoms that indicate a sensitivity to adrenergic agents include insomnia, dizziness, weakness, tremor, or irregular heartbeat. You should also avoid Zyrtec-D if you have severe high blood pressure, severe heart disease, high pressure in the eye (glaucoma), or difficulty urinating. Never combine Zyrtec-D with a drug classified as an MAO inhibitor, such as the antidepressants Nardil and Parnate.
Special warnings about this medication: If you have a mild case of high blood pressure or heart disease, use Zyrtec-D sparingly. Be cautious, too, if you have diabetes, a tendency to increased pressure in the eye (glaucoma), an overactive thyroid gland, or an enlarged prostate gland. If you have kidney or liver problems, make sure your doctor is aware of it. Your dosage may have to be reduced. Zyrtec-D makes some people sleepy. Exercise caution when driving a car or operating potentially dangerous machinery after taking this drug. This drug is not recommended for children under 12 years of age.
Special information if you are pregnant or breastfeeding: If you are pregnant or plan to become pregnant, check with your doctor before taking Zyrtec-D. The possibility of harm to the developing baby has not be ruled out. Both of the active agents in Zyrtec-D make their way into human breast milk. It is not recommended for nursing mothers.
Recommended dosage: The recommended dose for adults and children 12 years of age and older is 1 tablet twice daily. If you have kidney or liver problems, your doctor may recommend only 1 dose per day.
|
0.989694 |
"Game of Thrones" writers are furiously wrapping up loose ends with highly anticipated reunions in recent and upcoming episodes. Which family, friend or foe GoT reunion is your favorite over the entire series run?
Which actual reunion(s) is the best reuniting of two previously separated but connected "Game of Thrones" characters, so far?
SPOILER ALERT: Poll images may reveal Game of Thrones actual and speculative reunions, as well as, plot points through the 2017 season.
See the list of actual GoT reunions here: http://www.imdb.com/list/ls068983065/ and the list of speculative GoT reunions below.
Last Meeting: 'The Hound' and 'The Mountain Clash' @ Tourney of the Hand, King's Landing in 1.5 episode "The Wolf and the Lion"
Reunion: Speculative Reunion @ Unknown in 0.0 episode "hc"
Reunion: Speculative Reunion @ Unknown in 0.0 episode "hb"
Last Meeting: Brienne-Hound Fight @ Vale in 4.10 episode "The Children"
Last Meeting: Brotherhood Sell Gendry to Red Woman @ Riverlands in 3.6 episode "The Climb"
Reunion: Speculative Reunion @ Unknown in 0.0 episode "ha"
Last Meeting: Sam Sent to Train as New Watch Maester @ Castle Black in 5.10 episode "Mother's Mercy"
Last Meeting: Gift of Sword "Needle" @ Winterfell Castle in 1.2 episode "The Kingsroad"
Reunion: Speculative Reunion @ Unknown in 0.0 episode "gg"
Last Meeting: Tyrion's Trial-by-Combat @ King's Landing in 4.8 episode "The Mountain and the Viper"
Reunion: Speculative Reunion @ Unknown in 0.0 episode ""
Last Meeting: Joffrey Poisoned @ Purple Wedding @ Red Keep Godswood in 4.2 episode "The Lion and the Rose"
Last Meeting: Night King Grabs Bran's Arm @ Great Weirwood Tree in 6.5 episode "The Door"
Last Meeting: Meera Departs for Greywater Watch @ Winterfell Castle in 7.4 episode "The Spoils of War"
Reunion: Jorah Gifts Tyrion Great Pyramid @ Meereen in 6.10 episode "Mother's Mercy"
Last Meeting: Tyrion's Kidnapping by Jorah @ Volantis Brothel in 6.3 episode "High Sparrow"
Reunion: Jon Gives Theon a Pass @ Dragonstone Beach in 7.5 episode "The Spoils of War"
Last Meeting: Jon Heads to Castle Black to Join Watch @ Winterfell Castle in 1.2 episode "The Kingsroad"
Reunion: Arya Enroute to King's Landing Crossroads Inn @ Riverlands in 7.2 episode "Stormborn"
Last Meeting: Brotherhood Pay With Hot Pie Crossroads Inn @ Riverlands in 3.3 episode "Walk of Punishment"
Reunion: Jon brings Dany's Armies to Winterfell @ Winterfell's Godskeep in 8.1 episode "Winterfell"
Last Meeting: Ned, Arya & Sansa leave for King's Landing and Jon goes to Castle Black @ Winterfell Castle in 1.2 episode "The Kingsroad"
Reunion: Yara's Rescue aboard "The Silence" @ Blackwater Bay in 8.1 episode "Winterfell"
Last Meeting: Yara's Capture aboard the"Black Wind" @ Sea in 7.2 episode "Stormborn"
Reunion: Jon brings Dany's Armies to Winterfell @ Winterfell's Courtyard in 8.1 episode "Winterfell"
Last Meeting: Jon leaves for Castle Black @ Winterfell Castle in 1.2 episode "The Kingsroad"
Reunion: Winterfell Foundry @ "Winterfell" in 8.1 episode "Winterfell"
Last Meeting: Sandor-Brienne clash over Arya @ The Vale in 4.10 episode "The Children"
Last Meeting: Brotherhood sell Gendry to Melisandre @ Hallow Hill Caves, Riverlands 3.6 episode "The Climb"
Reunion: Winterfell Courtyard Balcony @ "Winterfell" in 8.1 episode "Winterfell"
Last Meeting: Purple Wedding @ Red Keep Godswood, King's Landing in 4.2 episode "The Lion and the Rose"
Reunion: Jon brings Dany's Armies to Winterfell @ Winterfell's Crypts in 8.1 episode "Winterfell"
Reunion: Jamie arrives incognito Winterfell, but is eyed by an all-knowning Bran @ Winterfell's Courtyard in 8.1 episode "Winterfell"
Last Meeting: Jamie pushes Bran out a Winterfell Window to silence him @ Winterfell Tower in 1.1 episode "Winter is Coming"
Reunion: Jon brings Dany's Armies to Winterfell @ Winterfell's Library in 8.1 episode "Winterfell"
Last Meeting: Sam Saves Joer @ Citadel in 7.2 episode "Stormborn"
Reunion: Sansa Meets Reek @ Winterfell in 5.5 episode "Kill the Boy"
Last Meeting: Ned, Arya & Sansa leave for King's Landing @ Winterfell Castle in 1.2 episode "The Kingsroad"
Reunion: Rope Bridge Fraticide @ Pyke in 6.2 episode "Home"
Last Meeting: Euron's Rebellion Banishment @ Pyke prior to 1.1 episode "Winter is Coming"
Other possible unresolved and speculative but anticipated reunions, we might see later in season eight (as of 8.1 episode Winterfell) include: Character Reunion: Bran Stark & The Night Kingand Character Reunion: Arya Stark & Melisandre among others.
The timing to publish this poll suggestion couldn't be better than right now. I updated this poll suggestion to be current to the latest episode. The latest Game of Thrones episode is fresh in most GoT fans' minds and was the "king" of all episodes that featured character reunions, with no fewer than a dozen GoT character reunions to set-up the final season of the series.
Updates to reunion list posted above. Many speculative reunions were resolved in this episode which had nearly a dozen to set-up Season Eight.
Which reunion(s) is your favorite reuniting* of two previously separated but connected "Game of Thrones" characters over the entire series run? *The poll utilizes a non-reunion two shot or alternative, as a substitute image, when no reunion two shot is available.
SPOILER ALERT: Intended for viewers current through the 2019 season as poll reveals Game of Thrones (2011) actual and speculative reunions, as well as, plot points through the first episode of calendar 2019.
|
0.996213 |
Zheng He (or Cheng Ho in older sources), the most important figure in Chinese maritime history, was born of non-Chinese Mongol parents and raised in the mountainous Yunnan province. His name was initially Ma He, and like his parents he was a Muslim throughout his life. When the Chinese army overthrew the Mongols in 1382, initiating the Ming dynasty, he was captured, castrated, and assigned to the court of Zhu Di (or Chu Ti), Prince of Yan. He was a physically and intellectually impressive man and was renamed Zheng He after distinguishing himself in the battle of Zhenglunba, near Beijing. When Zhu Di became emporer in 1402, Zheng He was one of his chief aids.
The emperor appointed him to oversee the building of a fleet suitable for long ocean voyages, its nucleus consisting of over 60 large junks. As commander of this fleet, Zheng He led seven expeditions into the Indian Ocean from Nanjing between 1405 and 1433, constituting the most important phase of maritime exploration in Chinese history. The purpose of the venture appears to have been a combination of exploration, trade, diplomacy, and a desire for prestige. The expeditions were described in the official history of the Ming dynasty, though details are scant. A military compendium, "Treatise on armament technology", compiled in 1628, includes schematic sailing charts showing Zheng He's routes, as well as navigational diagrams. One of the charts shows the route from China to Hormuz, the Red Sea and Africa, but no measurements can be taken from any of them. The documents indicate that the fleet used star positions, the elevation of the north celestial pole and magnetic bearings for navigation, and estimated the distances sailed by the number of watches.
The first four expeditions explored mainly present Indonesia and reached as far westward as the Malabar Coast of (south-western) India. The fifth (1417-1419), sixth (1421-1422) and perhaps the seventh (1431-1433), explored the east coast of the African continent at least as far south as Zanzibar, visiting Malindi and the Horn of Africa. Ambassadors were exchanged with the Swahili kingdoms, and African goods, including some live animals, taken back to China. An unanswered question is whether during the first of these expeditions some ships reached southern Africa and perhaps sailed on to the Atlantic ocean.
Zheng He may have died during the return leg of his last voyage and may be buried on the Malabar Coast. Another tradition holds that he died at Nanjing two years after his return.
Harris, K.L. Early encounters between China and Africa: Myth or moment? South African Journal of Cultural History, 2003, Vol. 17, pp. 47-71.
Norwich, O.I. Maps of Africa (pp. 17-18). Cape Town: A.D. Donker, 1983.
Selin, H. (ed.) Encyclopaedia of the history of science, technology and medicine in non-Western countries (articles on "Navigation in China" and "Navigation in the Indian Ocean and Red Sea"). Dordrecht: Kluwer, 1997.
Viviano, F. China's great armada. National Geographic, July 2005, Vol. 208(1), pp. 28-53.
Willers, D. The early Chinese mariners, Natal and the future. Natalia, 1991, Vol. 21, pp. 7-16.
|
0.999999 |
What Are 3 Similarities Between Magnets and Electricity?
The subjects of electricity and magnetism have held a fascination throughout history. As our understanding of these two subjects became clearer, it became more and more obvious that these two seemingly unrelated subjects were closely related. Magnets and electricity have many similarities, and the two entities are deeply intertwined at the physical level.
In electricity, there are two types of charges: positive and negative. When two opposite charges are brought close together (for example, a positive and a negative charge), they will attract each other, and a force will bring the two charges together, whereas two similar charges (for example, two negative charges) will repel each other with an identical force as two opposite charges attract but in the opposite direction. In magnetism, the same principles apply; however, a single magnet contains two "poles": a north pole (which aligns with the north pole of the Earth) and a south pole. In magnets, much as in electricity, like poles repel each other while opposite poles attract each other.
A field is a physical entity that allows one object to influence another object over a distance. For example, a positive electric charge can influence a negative electric charge by attracting it over a distance without the two objects actually coming into contact. In the case of both magnetism and electricity, this influence is subject to the inverse square law; that is, the field strength is inversely proportional to the square of the distance between two objects. For example, if the distance between two magnetic poles is 3, then the field strength between the two will decrease by a factor of 9.
Potential energy is stored within an object and can be made available for other types of energy. Potential energy is usually related to an object's position within a force field; therefore both electric and magnetic objects are subject to potential energy. There are two important types of energy. Electrostatic potential energy is created by a stationary electric charge. This type of energy leads to the concept of voltage, which is used in many everyday applications. The second type of potential energy is electrodynamic, which is created by moving electric charges and acts on magnets. This suggests a deeper relation between electricity and magnetism.
As you can see, magnetism and electricity have many commonalities. However, in 1864, physicist James Clerk Maxwell discovered that these two subjects are even more closely linked. What he found was that electricity and magnetism are two manifestations of the same fundamental property called electromagnetism. To summarize Maxwell's equations, as they became known, stationary electric charges are the source of both electric fields while moving charges (i.e., electric currents) are responsible for magnetic fields. Furthermore, he found that changing electric fields can produce changing magnetic fields and vice versa.
Bourdin, Thomas. "What Are 3 Similarities Between Magnets and Electricity?" Sciencing, https://sciencing.com/3-similarities-between-magnets-electricity-8105339.html. 24 April 2017.
|
0.974364 |
Defining the specific factors that govern the evolution and transmission of influenza A virus (IAV) populations is of critical importance for designing more-effective prediction and control strategies. Superinfection, the sequential infection of a single cell by two or more virions, plays an important role in determining the replicative and evolutionary potential of IAV populations. The prevalence of superinfection during natural infection and the specific mechanisms that regulate it remain poorly understood. Here, we used a novel single virion infection approach to directly assess the effects of individual IAV genes on superinfection efficiency. Rather than implicating a specific viral gene, this approach revealed that superinfection susceptibility is determined by the total number of viral gene segments expressed within a cell. IAV particles that express a complete set of viral genes potently inhibit superinfection, while semi-infectious particles (SIPs) that express incomplete subsets of viral genes do not. As a result, virus populations that contain more SIPs undergo more-frequent superinfection. We further demonstrate that viral replicase activity is responsible for inhibiting subsequent infection. These findings identify both a major determinant of IAV superinfection potential and a prominent role for SIPs in promoting viral coinfection.
IMPORTANCE Superinfection, the sequential infection of a single cell by two or more virions, plays an important role in determining the replicative and evolutionary potential of influenza A virus (IAV) populations. The specific mechanisms that regulate superinfection during natural infection remain poorly understood. Here, we show that superinfection susceptibility is determined by the total number of viral genes expressed within a cell and is independent of their specific identity. Virions that express a complete set of viral genes potently inhibit superinfection, while the semi-infectious particles (SIPs) that make up the bulk of IAV populations and express incomplete subsets of viral genes do not. As a result, viral populations with more SIPs undergo more-frequent superinfection. These findings identify both the primary determinant of IAV superinfection potential and a prominent role for SIPs in promoting coinfection.
Influenza A viruses (IAV) are estimated to cause hundreds of thousands of deaths across the world every year during seasonal epidemics, despite widespread preexposure and vaccination (1). In addition to the yearly burden of seasonal influenza viruses, novel zoonotic IAV strains periodically emerge into humans from swine or birds, triggering unpredictable pandemics that can dramatically increase infection and mortality rates (2). Defining the specific factors that influence the evolution of influenza viruses is critical for designing more-effective vaccines, therapeutics, and surveillance strategies.
The prevalence of coinfection can play an enormous role in determining the replicative and evolutionary potential of IAV populations. This is a function of both the segmented nature of the viral genome and the enormous amount of genomic heterogeneity present within IAV populations (3, 4). Coinfection allows reassortment, i.e., the production of novel viral genotypes through the intermixing of the individual IAV genome segments (5, 6). Reassortment events have contributed to the emergence of every major influenza pandemic of the past century (7). Coinfection also facilitates the complementation and productive replication of the semi-infectious particles (SIPs) that make up the majority of IAV populations (8–12). Finally, increasing the frequency of coinfection can accelerate viral replication kinetics and virus output by increasing the average multiplicity of infection (MOI) (13–15). Thus, to better understand how IAV populations transmit and evolve, we must identify the specific host and viral factors that govern coinfection.
One of the primary means by which coinfection can occur is superinfection, the sequential infection of one cell by multiple viral particles. For some viruses, superinfection appears to occur freely (16, 17). In contrast, a diverse range of viruses actively inhibit superinfection through a variety of mechanisms, a phenomenon known as superinfection exclusion (SIE) (18–26). The only in-depth study of IAV superinfection performed to date concluded that the viral neuraminidase (NA) protein acts to potently and rapidly inhibit IAV superinfection by depleting infected cells of the sialic acid receptors required for viral entry (27). More recently, Dou et al. reported a narrow time window during which IAV superinfection was possible (13). These findings are consistent with recent studies that have argued that reassortment is rare during human infection (28, 29). However, the existence of a potent mechanism of IAV SIE is at odds with both the frequent coinfection observed in a variety of experimental settings and the widespread occurrence of reassortment at the global scale (30–35). Marshall et al. showed that superinfection occurring at up to 8 h after a primary infection leads to robust coinfection and reassortment in cell culture (36). Extensive coinfection and complementation have also been observed in the respiratory tracts of IAV-infected mice and guinea pigs (9, 37). Collectively, these results suggest that IAV superinfection can be restricted, but to what extent and through which specific mechanisms remain crucial open issues.
Here, we reveal that IAV superinfection potential is regulated by the extent of genomic heterogeneity within the viral population. We observed that superinfection susceptibility is influenced in a dose-dependent fashion by the number of viral genes expressed by the initially infecting virion. Further, we show that superinfection occurs more frequently in IAV populations with more SIPs than in those with fewer. Finally, we demonstrate that SIE is mediated by the presence of active viral replication complexes and is completely independent of the gene coding sequence. Taken together, our results reveal how genomic heterogeneity influences IAV superinfection potential and demonstrate how SIPs can modulate collective interactions within viral populations.
Influenza virus SIE occurs in multiple cell types and is independent of type I interferon (IFN) secretion.A previous study of IAV SIE concluded that NA expression completely blocks susceptibility to superinfection by 6 h postinfection (hpi) (27). To explore the potential mechanisms of IAV SIE in greater detail, we developed a flow cytometry-based assay that allows us to precisely measure the effects of previous infection on superinfection efficiency. To clearly identify cells infected by the first virus or by the superinfecting virus or by both, we used two recombinant viruses that express antigenically distinct hemagglutinin (HA), NA, and NS1 proteins that we could distinguish using specific monoclonal antibodies (MAbs) that we had on hand (see Fig. S1 in the supplemental material). For the primary infection, we used a recombinant version of H1N1 strain A/Puerto Rico/8/34 (rPR8). For the secondary infection, we used a recombinant virus (rH3N2) that contained the HA and NA gene segments from H3N2 strain A/Udorn/72, the NS gene segment from A/California/04/09, and the remaining 5 segments from PR8.
Levels of expression of HA, NA, and NS1 by rPR8 and rH3N2 can be differentiated using specific MAbs. MDCK cells were infected with rPR8 or rH3N2 at an MOI of <0.3 TCID50/cell. At 19 hpi, cells were harvested, fixed, permeabilized, stained against H1 (H36-26), N1 (NA2-1C1), NS1 (1A7), and H3 (H14-A2), and run on an LSR II flow cytometer. The results of analyses of expression of H1 versus N1 and of NS1 versus H3 are shown in representative FACS plots. Download FIG S1, TIF file, 1.7 MB.
Copyright © 2018 Sun and Brooke.
We first asked whether prior infection with rPR8 affected cellular susceptibility to superinfection with rH3N2. We infected Madin-Darby canine kidney (MDCK) cells with rPR8 at an MOI of <0.3 50% tissue culture infective doses (TCID50)/cell, and at 3 hpi (all times postinfection are expressed relative to the time at which the first virus was added) we added the PR8-HA-specific neutralizing MAb H17-L2 to block secondary spread of rPR8 within the culture. At 6 hpi, we infected with rH3N2 at an MOI of <0.3 TCID50/cell (6 hr). To prevent spread of both rPR8 and rH3N2, we added 20 mM NH4Cl at 9 hpi (38, 39). In parallel, we performed simultaneous coinfections (0 hr) with rPR8 and rH3N2 to measure coinfection frequencies under conditions SIE should not be possible. At 19 hpi, we harvested cells and examined primary and secondary virus infections by flow cytometry, using H1 expression and H3 expression as markers of rPR8 infection and rH3N2 infection, respectively. We observed that the H3-positive (H3+) frequency within H1+ cells was significantly reduced when rPR8 infection preceded rH3N2 by 6 h compared with when rPR8 and rH3N2 were added simultaneously (Fig. 1A). This indicated that rPR8 infection significantly reduces the susceptibility of cells to superinfection by 6 hpi.
A 6-h delay between primary infection and superinfection allows robust superinfection exclusion. The indicated mammalian cell lines were infected with rPR8 virus and were simultaneously (0hr) or sequentially (6hr) infected with rH3N2 virus; all infections were performed at MOI = <0.3 TCID50/cell. (A) Representative fluorescence-activated cell sorter (FACS) plots showing expression of H1 versus H3 within MDCK cells. (B) H3+ frequencies within H1+ cells following simultaneous or sequential infection, in the indicated cell lines. The values for both the 0-h and 6-h groups are shown as percentages of the mean values of the 0-h control group to clearly illustrate the percentages of reduction in cellular susceptibility in the 6-h group. Data are presented as means (n = 3 cell culture wells) ± standard deviations. ***, P < 0.001; ****, P < 0.0001 (t test).
We next asked whether the SIE effect was cell type specific and whether it depended on activation of the type I interferon (IFN) system. We performed the experiment described above in MDCK cells, A549 cells, human embryonic kidney HEK293T (293T), and Vero cells (which are incapable of type I IFN secretion) (40, 41). We observed that the levels of SIE were comparable among all cell lines tested, suggesting that SIE occurs in multiple distinct cell types and does not depend upon IFN secretion (Fig. 1B; see also Fig. S2).
Superinfection is inhibited in multiple cell lines. Levels of H1 expression versus H3 expression in Vero cells, A549 cells, and 293T cells observed in the experiments described in the Fig. 1 legend are shown as representative FACS plots. Download FIG S2, TIF file, 4.6 MB.
SIE does not depend upon viral neuraminidase activity.In an attempt to confirm the previously reported role for NA activity in SIE, we directly measured the effect of NA expression on SIE in our system (27). We took advantage of our previous observation that IAV populations consist primarily of SIPs that fail to express one or more viral genes (8). When carrying out the primary infection at a low MOI, we generate populations of infected cells that are either positive or negative for expression of a given viral gene. We can then assess the effects of specific viral proteins on superinfection susceptibility by comparing superinfection frequencies between infected cells that do or do not express the protein in question (Fig. 2A).
Superinfection exclusion is more potent in infected cells that express NA but is independent of NA enzymatic activity. MDCK cells were infected with rH3N1 virus and were simultaneously (0hr) or sequentially (6hr) infected with rH1N2 virus; all infections were performed at MOI = <0.3 TCID50/cell. During the 5-h gap and 1-h adsorption of the secondary infection (rH1N2), cells were incubated in either medium alone or media with 1 µM zanamivir (NAI). (A) Representative FACS plots comparing H1+ frequencies between H3+ N1− and H3+ N1+ cells. (B) H1+ frequencies within H3+ N1− and H3+ N1+ cells following simultaneous (0hr) or sequential (6hr) infection. Values of both the 0-h and 6-h groups (with or without the presence of NAI) are normalized to the means of 0-h controls, and data are presented as mean values (n = 3 cell culture wells) ± standard deviations. ****, P < 0.0001 (t test).
We performed the same superinfection experiment as described above in MDCK cells; however, we used slightly different viruses to ensure that the NA specificity of the primary virus was well matched to the HA specificity of the secondary virus. The primary virus used here encoded the HA gene from A/Udorn/72 and the NA gene from PR8 (rH3N1), while the secondary virus encoded the HA gene from PR8 and the NA gene from A/Udorn/72 (rH1N2). The remaining 6 segments for both viruses came from PR8.
At 19 hpi, we harvested and stained with MAbs against H1, N1, and H3. To compare rH3N1 infected cells that did or did not express NA, we individually gated cells into H3+ N1+ and H3+ N1− subpopulations (Fig. 2A). Comparison of H1+ frequencies between H3+ N1+ and H3+ N1− cells revealed that NA expression in infected cells was clearly associated with decreased susceptibility to superinfection (Fig. 2B). This finding was consistent with the previously reported role for NA in IAV superinfection exclusion (27). Importantly, while SIE was more pronounced in the H3+ N1+ cells, we also observed a significant decrease in superinfection susceptibility within the H3+ N1− cell population by 6 hpi, suggesting that viral factors other than NA also act to restrict superinfection.
To directly test whether NA enzymatic activity was required for the increased potency of SIE that we observed in NA+ cells, we asked whether treatment with the NA inhibitor (NAI) zanamivir could diminish this effect. We observed that the addition of zanamivir at 1 μM (a concentration that completely blocked rH3N1 NA enzymatic activity) did not decrease the strength of SIE in NA+ cells (Fig. 2B; see also Fig. S3). We also examined the effects of two substitutions (NP:F346S and NA:K239R) that decrease cellular NA expression relative to wild-type PR8 on superinfection efficiency (9, 42) (Fig. S4A). In accordance with our zanamivir results, these mutants did not exhibit higher superinfection frequencies than wild-type PR8 (Fig. S4B). Taken together, these results reveal that superinfection is more effectively inhibited by virions that express NA than by those that do not but that NA enzymatic activity is dispensable for this effect.
Viral NA activity is blocked by 1 µM zanamivir. (A) NA activity of rH3N1 virus used in the experiment described in the Fig 2 legend. Data represent results of determinations of relative fluorescence units (RFU) against time under conditions of increasing concentrations of zanamivir. (B) Vmax of reactions performed as described for panel A. Data are presented as mean values (n = 2 enzymatic reactions) ± standard deviations. Download FIG S3, TIF file, 0.8 MB.
Superinfection exclusion is independent of NA expression level. MDCK cells were infected with rPR8WT, rPR8NP:F346S, or rPR8NA:K239R and were simultaneously (0hr) or sequentially (6hr) infected with rH3N2; all infections were performed at MOI = <0.3 TCID50/cell. (A) Comparison of NA expression levels within H1+ N1+ cells between rPR8WT, rPR8NP:F346S, and PR8NA:K239R at 19 hpi. (B) Comparison of H3+ frequencies within H1+ N1− and H1+ N1+ cells between the three indicated viruses. Values from h 6 groups are normalized to means of h 0 controls. Data are presented as mean values (n = 3 cell culture wells) ± standard deviations. Download FIG S4, TIF file, 1.5 MB.
Superinfection susceptibility is determined by the number of viral genes expressed in the cell.On the basis of our observation that superinfection was also inhibited within N1− cells (Fig. 2B), we hypothesized that expression of other viral gene products might also inhibit superinfection. We examined the effects of HA and NS1 expression on superinfection susceptibility, using rPR8-specific MAbs. Surprisingly, we found that both HA expression and NS1 expression within rPR8-infected cells were associated with significant decreases in superinfection by rH3N2 and that the results were comparable to the effect associated with NA expression (Fig. 3A and B). To further dissect how viral gene expression patterns influence SIE, we individually gated all seven possible combinations of HA, NA, and NS1 expression by rPR8 (HA+ NA+ NS1+, HA+ NA+, HA+ NS1+, NA+ NS1+, HA+, NA+, NS1+) and directly compared their rH3N2 infection frequencies (the gating scheme is shown in Fig. S5A). We observed that the fraction of cells superinfected with rH3N2 was inversely correlated with the number of rPR8 genes expressed (among the three we examined), regardless of their specific identities (Fig. 3C and D). Thus, susceptibility to IAV superinfection is determined by the number of viral genes expressed in the host cell by the initially infecting virion.
Superinfection is more frequent in cells that express fewer viral genes. MDCK cells were infected with rPR8 and were simultaneously (0hr) or sequentially (6hr) infected with rH3N2; all infections were performed at MOI = <0.3 TCID50/cell. (A and B) Representative FACS plots comparing H3+ frequencies between (A) N1+ H1− and N1+ H1+ cells and (B) H1+ NS− and H1+ NS+ cells. (C) Superinfection assay performed as described for panels A and B; however, cells are gated into all 8 possible combinations of HA, NA, and NS1 expression by rPR8, and H3+ percentages are compared between these subpopulations. Data represent the values of 6hr groups normalized to the means of 0hr controls. Each data point represents the H3+ frequency for the indicated cell population within a single cell culture well, shown as a percentage of the mean H3+ frequency of the same cell subpopulation in the 0hr controls. (D) Data from panel C grouped by total numbers of the three examined viral gene products (HA, NA, and NS1) expressed by rPR8 rather than by their specific identities. *, P < 0.05; **, P < 0.01; ***, P < 0.001; ****, P < 0.0001; N.S., not significant (t test).
Gating scheme used for measuring the effect of the number of viral genes expressed on superinfection frequencies. (A) Cells from the experiment described in the Fig. 3 legend were assessed for expression of HA, NA, and NS1 sequentially. The fractions of H3+ cells (indicative of superinfection rates) were quantified and compared between the cell populations with the indicated viral gene expression patterns. (B) Representative FACS plots showing the gates used to assess HA, NA, and NS1 expression in this experiment. Download FIG S5, TIF file, 3.1 MB.
Superinfection is more prevalent in IAV populations with more SIPs.If the number of viral genes expressed in a cell determines superinfection susceptibility, then decreasing the average number of functional viral genes successfully delivered by individual virions should increase the overall incidence of superinfection. We tested this by artificially decreasing the functional gene segment content of rPR8 through exposure to UV irradiation (43). Exposure to low-dose UV irradiation generates SIPs that carry gene-lethal UV-induced lesions at frequencies proportional to genome segment length. On the basis of our previous findings, we hypothesized that superinfection frequencies would increase with longer exposure of rPR8 to UV.
We used UV (302-nm wavelength) to irradiate rPR8 for either 30 s or 60 s and confirmed that the TCID50 concentration was reduced and the SIP concentration was increased as a function of treatment duration (Fig. 4A to C). We then performed superinfection assays as described above, comparing rH3N2 superinfection frequencies following infection by untreated or UV-irradiated rPR8 in MDCK cells. To fairly compare superinfection frequencies between viral populations with differing particle-to-infectivity ratios, we normalized our rPR8 infections based on equivalent numbers of particles capable of expressing NA (NA-expressing units [NAEU]) (9).
Superinfection is more common in viral populations that contain more SIPs. rPR8 was irradiated by the use of a 302-nm-wavelength UV lamp for 30 s or 60 s. (A) TCID50 titers of untreated rPR8 (0 s) or rPR8 subjected to UV treatment for 30 s and 60 s. Pooled data from two independent experiments are shown. (B) Representative FACS plots showing HA versus NA expression patterns of untreated rPR8 (0 s) and rPR8 subjected to UV treatment for 60 s. (C) Quantification of H1− and N1− SIPs in untreated rPR8 (0 s) or rPR8 subjected to UV treatment for 30 s and 60 s. (D) MDCK cells were infected with untreated rPR8 (0 s) or with rPR8 subjected to UV treatment for 30 s and 60 s at an MOI of 0.04 NAEU/cell and were simultaneously (0hr) or sequentially (6hr) infected with rH3N2 at MOI < 0.3 TCID50/cell. Representative FACS plots showing expression of N1 versus H3 in cells infected with untreated rPR8 (0 s) or with rPR8 subjected to UV treatment for 60 s. (E) rH3N2 infection percentages within N1+ cells infected with untreated rPR8 (0 s) or with rPR8 subjected to UV treatment for 30 s and 60 s. (F) Values corresponding to the 6hr groups in panel E normalized to means of 0hr controls. For panels E and F, data are presented as mean values (n = 3 cell culture wells) ± standard deviations. **, P < 0.01 (t test).
We first examined the effect of UV treatment on superinfection when rPR8 and rH3N2 were added to cells simultaneously (at h 0). This was a critical control because UV treatment can increase the measured incidence of coinfection, independently of SIE effects, purely by creating a larger pool of SIPs that show up in our assays only when complemented by secondary infection (43). Consistent with this, we observed a small increase in coinfection frequency with UV treatment when the two viruses were added simultaneously (Fig. 4D and E). When rH3N2 was added 6 h after rPR8, however, we observed a much more pronounced increase in superinfection frequency with UV treatment, consistent with our hypothesis that superinfection can be regulated by the proportion of SIPs present within the viral population (Fig. 4D to F).
SIE is mediated by active IAV replication complexes and is independent of the gene coding sequence.Our data reveal that IAV superinfection potential is determined by the number of viral genes expressed within a cell, independent of their specific identity. This suggests that the viral gene products themselves are dispensable for SIE. We thus hypothesized that active replication and/or transcription of viral RNAs by the viral replicase complex might be responsible for decreasing cellular susceptibility to subsequent infection. To test this, we cotransfected 293T cells with pDZ vectors encoding the individual viral replicase proteins (PB2, PB1, PA, and NP) together with a pHH21 vector encoding either the HA vRNA gene segment (HAvRNA) or a vRNA-derived reporter gene segment in which the enhanced green fluorescent protein (eGFP) open reading frame (ORF) is flanked by the 5′ and 3′ untranslated-region (UTR) sequences from the NA segment (eGFPvRNA). These UTR sequences are required for replication and transcription of the reporter RNA by the viral replicase. At 24 h posttransfection, we infected cells with rH3N2 at an MOI of 0.2 TCID50/cell and measured infectivity at 8 hpi using an M2-specific MAb.
Infection frequencies were decreased ∼50% in cells expressing the replicase components plus the eGFPvRNA construct compared with control cells transfected with the replicase-expressing constructs plus an empty pHH21 vector (Fig. 5A). In analyses of differences in the levels of rH3N2 infectivity between cotransfected cells (eGFP+, HA+) and uncotransfected cells (eGFP−, HA−) within the same culture wells, the inhibitory effects mediated by eGFPvRNA or HAvRNA expression were found to be comparable (Fig. 5B; see also Fig. S6). Importantly, this effect was not seen when we left out the plasmid encoding PA (RNPPA−) or used an eGFP reporter RNA that lacked the viral UTR sequences (eGFPORF) (Fig. 5A). Taken together, these data indicate that inhibition of infection requires both an intact replicase complex and an RNA template containing the viral UTR sequences but not the viral coding sequence.
Viral replicase activity inhibits subsequent infection. (A) Subconfluent 293T cell monolayers were transfected with: plasmids encoding the complete set of viral replicase proteins (PB2, PB1, PA, and NP) along with a plasmid that encodes a reporter vRNA (eGFP ORF plus 5′ and 3′ viral UTR sequences; pHH21::eGFPvRNA) under the control of the polymerase I (PolI) promoter (RNP + eGFPvRNA), plasmids encoding the complete set of viral replicase proteins along with a plasmid (pHH21::eGFPORF) that encodes the eGFP ORF without the viral UTRs (RNP + eGFPORF), plasmids encoding an incomplete set of three viral replicase proteins (PB2, PB1, and NP only; no PA) along with the viral reporter RNA plasmid pHH21::eGFPvRNA (RNPPA- + eGFPvRNA), or plasmids encoding the complete set of viral replicase proteins along with an empty vector control (RNP + pHH21). At 24 h posttransfection, cells were infected with rH3N2 at MOI = 0.2 TCID50/cell. At 8 hpi, cells were harvested and assessed for rH3N2 infection via flow cytometry. For each group, rH3N2 infectivities are presented as the percentages of the mean rH3N2 infectivity in the RNP + pHH21 vector control group. (B) Experiment performed as described for panel A with cotransfection of plasmids encoding the complete set of viral replicase proteins plus either pHH21::eGFPvRNA or pHH21::HAvRNA. Data representing rH3N2 infectivity in cotransfected cells (eGFP+ or HA+) are normalized to uncotransfected cells (eGFP− or HA−) in the same samples. (C) Experiment performed as described for panel A with transfection of pHH21 vector, pHH21::eGFPvRNA, pHH21::HAvRNA, pHH21::HAcRNA, or pHH21::HAvRNA together with pHH21::HAcRNA. rH3N2 infectivities are presented as the percentages of the mean rH3N2 infectivity in the vector control group. (D) Experiment performed as described for panel A with transfection of pCI vector, pCI::eGFPORF, or pCI::HAORF. Data representing rH3N2 infectivity in transfected cells (eGFP+ or HA+) are normalized to untransfected cells (eGFP− or HA−) in the same samples. Data are presented as mean values (n = 2 cell culture wells) ± standard deviations.
Cells cotransfected with plasmids encoding viral replicase and viral RNA are less susceptible to subsequent infection. Cells from the experiments described in the Fig. 5A and B legends were assessed for expression of M2 (indicative of rH3N2 infection) versus eGFP and HA (indicative of cotransfection) as shown in representative FACS plots. Download FIG S6, TIF file, 3.6 MB.
Our data demonstrate that IAV SIE is mediated by the specific activity of viral replication complexes. One potential explanation is that large amounts of recently synthesized negative-sense vRNA within the cell might outcompete incoming genome segments for replication and expression. To test this, we transfected 293T cells with a pHH21 vector that overexpresses the eGFPvRNA segment and measured susceptibility to rH3N2 infection 24 h later using an NP-specific MAb. Compared to the empty vector control, we observed no effect of eGFPvRNA vRNA overexpression on cellular susceptibility to infection (Fig. 5C). Similarly, we observed no effect when we overexpressed the cRNA and vRNA forms of the HA gene segment, either individually or together (Fig. 5C). It must be noted that bulk levels of viral RNA were roughly 5-fold lower in these cells than in cells that express the viral replicase, so we cannot rule out a role for the intracellular abundance of viral RNA as a determinant of susceptibility to subsequent infection (Fig. S7).
Comparison of intracellular viral RNA levels measured under different experimental conditions. (A) Relative amounts of HA vRNA in 293T cells transfected with pHH21::HAvRNA or cotransfected with plasmid-derived viral replicase complex plus pHH21::HAvRNA for 24 h or infected with rPR8 for 6 h at MOI = 0.5 HAEU/cell were determined by strand-specific quantitative real-time PCR, including the no-reverse-transcription control. Data shown are delta threshold cycle (ΔCT) values for HA vRNA versus GAPDH mRNA. (B) Relative amounts of HA viral RNA shown as fold differences compared with HAvRNA. Data are presented as mean values (n = 2 cell culture wells) ± standard deviations. Download FIG S7, TIF file, 1.1 MB.
Another potential explanation is that viral mRNA or protein overexpression might inhibit subsequent infection. To test this, we transfected 293T cells with pCI vectors that overexpress mRNA and protein of eGFP and HA and measured susceptibility to rH3N2 infection 24 h posttransfection using the M2-specific MAb. Compared to the empty vector control, mRNA/protein overexpression of eGFP or HA had no effect on infection susceptibility (Fig. 5D; see also Fig. S8). Collectively, these data demonstrate that IAV superinfection exclusion is triggered by the activity of viral replication complexes.
Overexpression of viral mRNA and protein in cells does not inhibit subsequent infection. (A) Cells from the experiment described in the Fig. 5D legend were assessed for expression of M2 (indicative of rH3N2 infection) versus eGFP and HA (indicative of transfection) in representative FACS plots. (B) rH3N2 infectivity data from panel A are shown as percentages of pCI vector. Data are presented as mean values (n = 2 cell culture wells) ± standard deviations. Download FIG S8, TIF file, 2.9 MB.
Superinfection plays an enormous role in influencing the outcome of IAV infection, both by promoting reassortment and by facilitating the multiplicity reactivation of SIPs and defective interferring particles (4). Despite this importance, the specific factors that govern the occurrence of superinfection have remained obscure. Here, we reveal that IAV superinfection susceptibility is regulated by the number of viral genes successfully expressed by a virion. We further demonstrate that the presence of SIPs within viral populations significantly increases the frequency of superinfection. This represents a completely novel mechanism of viral superinfection exclusion and identifies a clear functional consequence of the enormous genomic heterogeneity within IAV populations.
The only other published study that examined IAV SIE in detail concluded that NA expression mediates SIE by depleting the pool of available sialic acid receptors on the cell surface (27). In this study, we directly quantified the contribution of NA expression to SIE during IAV infection and found that the SIE effect of NA expression is actually comparable to that of other viral genes. We also show that treatment with NAIs has no appreciable effect on superinfection susceptibility. The conclusions of the study by Huang et al. were based primarily on two observations: (i) overexpression of NA within cells rendered them refractory to infection by an HA-pseudotyped virus, and (ii) IAV superinfection occured only when cells were treated with NAIs (27). While we cannot conclusively explain the discrepancies between the two studies, we can offer a couple of plausible explanations. First, the cellular overexpression studies in Huang et al. likely involved levels of cellular NA expression that are far beyond those seen during IAV infection. Second, the observation that NAI treatment dramatically increases superinfection frequencies may be explained by the effects of cell death. In their experiments, Huang et al. infected cells at a relatively high MOI, did not block secondary spread of the virus within cultures, and assessed superinfection frequency at 20 hpi or later. Under those conditions, many of the initially infected cells may have been dead or dying and thus lost from the analysis. That may be especially true of superinfected cells, which tend to be infected at a higher than the average effective MOI. Even under low-MOI conditions, we had to limit the time frame of our experiments and block secondary spread of virus to prevent cell death from skewing our results. NAI treatment may act to help preserve coinfected cells so that they are detected at the endpoint of the experiment, thus increasing the measured superinfection rate.
Our results reveal that SIE is triggered in a dose-dependent fashion by the number of functional viral gene segments delivered by the initially infecting virion. The surprising irrelevance of the specific IAV gene segments involved is explained by our finding that the viral coding sequence of a gene segment can be replaced with that of eGFP without any loss of inhibitory effect. This suggests a direct role for viral replicase activity itself in triggering SIE rather than any effect of the viral gene segments themselves. We hypothesize that the overall levels of replicase activity in the cell, particularly during the early stages of infection, are determined by the number of functional RNPs delivered to the cell. Thus, cells infected by SIPs that deliver fewer functional RNPs exhibit lower overall levels of replicase activity, resulting in less-potent SIE.
The specific mechanism by which the activity of viral replicase complexes may inhibit subsequent infection remains unclear; however, one potential explanation is that the activity of viral replication complexes triggers a cell-intrinisic antiviral response. As each incoming gene segment brings its own replicase complex, this could potentially explain the gene dose-dependent suppression of superinfection that we observed. While our experiments in Vero cells demonstrated that the secretion of type I IFN is not required for SIE, they do not preclude the involvement of type I IFN-independent mechanisms. These could include either the type III IFN-mediated induction of antiviral effectors or the engagement of completely IFN-independent antiviral mechanisms (44–46). Future studies will be aimed at delineating the role of the host in the regulation of IAV superinfection.
Our results demonstrate that SIPs can directly influence the prevalence of superinfection and thus, potentially, the frequency of reassortment. Fonville et al. used a UV irradiation-based method similar to that shown here to demonstrate that increasing the frequency of SIPs within a viral popuation increases the overall reassortment rate (43). The explanation given for this effect was that increasing the abundance of SIPs increases the proportion of the viral population that depends upon coinfection to replicate. As a result, within a certain MOI range, a greater share of productively infected cells are coinfected and subject to reassortment. In our study, we confirmed this effect by observing a slight increase in coinfection frequency with increasing UV dose when rPR8 and rH3N2 were added simultaneously (Fig. 4E). When we controlled for this, however, we still observed a significant increase in superinfection frequency as we increased the proportion of SIPs through UV treatment (Fig. 4D to F). Thus, the relationship between SIPs and SIE that we describe here is completely independent of the increased multiplicity reactivation observed by Fonville et al. and likely represents the effects of decreasing the strength of SIE. Between these two studies, it is clear that SIPs can modulate the frequency of IAV coinfection and reassortment through two distinct mechanisms.
IAV strains can differ significantly with respect to the relative production and gene expression patterns of SIPs (8, 9). This raises the possibility that strains with distinct SIP production phenotypes may differ in their reassortment potential, given the influence of SIPs on coinfection and reassortment frequencies. If this is the case, it would suggest a significant role for production of SIPs in governing the evolutionary potential of IAV populations.
The relationship between viral gene expression patterns and superinfection exclusion that we report here demonstrates that viral genomic heterogenity has distinct functional consequences during infection. A crucial implication is that all infected cells cannot be thought of as equal but may in fact exhibit distinct phenotypes based on the number and identity of viral genome segments that they harbor (47). The relationship between viral genomic heterogeneity and the phenotypic diversity of infected cells likely extends to cellular features beyond superinfection susceptibility.
It remains to be seen whether the relationship between viral gene dose and superinfection susceptibility that we describe here exists for other segmented viruses besides IAV. Beyond the segmented viruses, it has become increasingly clear that collective interactions mediated by cellular coinfection significantly influence the replicative and evolutionary dynamics of nonsegmented viruses as well (48). More work is needed to better understand the factors that govern coinfection for different virus families, both in vitro and in vivo.
In summary, our work reveals a unique mechanism of IAV superinfection regulation that is governed by viral genomic heterogeneity. Critically, we show that the abundance of SIPs within a viral population directly influences the prevalence of superinfection; suggesting that IAV strains may differ in their superinfection potential and thus in their potential for reassortment. This finding has significant consequences for understanding how SIP production can influence the evolutionary potential of IAV populations. More broadly, we demonstrate how genomic diversity within viral populations can have clear functional consequences during infection.
Plasmids.The A/Puerto Rico/8/34 and A/Udorn/72 reverse genetics plasmids were generous gifts from Adolfo Garcia-Sastre and Kanta Subbarao, respectively. The pCI vector was graciously provided by Joanna Shisler. pHH21::eGFPvRNA (eGFP ORF flanked by the NA UTRs) was kindly gifted by Andrew Mehle. Generation of pHH21::HAvRNA has been previously described (9). The following primer pairs were used to generate the indicated constructs: for pHH21::eGFPORF (BsmBI), 5′-CGTCTCCTATTTTACTTGTACAGCTCG and 3′ CGTCTCCGGGATGGTGAGCAAGGGC; for pHH21::HAcRNA (BsmBI), 5’CGTCTCATATTAGCAAAAGCAGG and 3′ CGTCTCAGGGAGTAGAAACAAGGG; for pCI::eGFPORF (EcoRI/SalI), 5′-AGAATTCATGGTGAGCAAGG and 3’AGTCGACTTACTTGTACAGC; for pCI::HAORF (EcoRI/SalI), 5′-AGAATTCATGGAAGATTTTGTGCG and 3′ AGTCGACCTAACTCAATGCATGTGT.
Cells.Madin-Darby canine kidney (MDCK) and human embryonic kidney HEK293T (293T) cells were maintained in Gibco’s minimal essential medium (MEM) with GlutaMax (Life Technologies). Vero cells were maintained in Dulbecco’s modified Eagle medium (Life Technologies). Human lung epithelial A549 cells were maintained in Gibco’s F-12 medium (Life Technologies). MDCK, Vero, and A549 cells were obtained from Jonathan Yewdell; 293T cells were obtained from Joanna Shisler. All media were supplemented with 8.3% fetal bovine serum (Seradigm). Cells were grown at 37°C and 5% CO2.
Viruses.Recombinant A/Puerto Rico/8/1934 (rPR8) and rH3N2 viruses were generated using 8-plasmid rescue systems. The rH3N2 virus is a reassortant with the HA and NA segments from A/Udorn/72 (H3N2), the NS segment from A/California/04/09 (H1N1), and the other 5 segments from PR8. The rPR8 clones differ from the published sequence (GenBank accession no. AF389115 to AF389122) at two positions: PB1 A549C (K175N) and HA A651C (I207L) (numbering from initiating Met). Molecular clone-derived mutants (rPR8 NP:F346S and rPR8 NA:K239R) were generated using standard site-directed PCR mutagenesis. All viruses were rescued by transfecting subconfluent 293T cells with 500 ng of each of the appropriate reverse genetics plasmids using JetPRIME (Polyplus) according to the manufacturer’s instructions. Plaque isolates derived from rescue supernatants were amplified into seed stocks in MDCK cells. Working stocks were generated by infecting MDCK cells at an MOI of 0.0001 TCID50/cell with seed stock and collecting and clarifying supernatants at 48 hpi. All viral growth was carried out in MEM with 1 μg/ml trypsin treated with l-(tosylamido-2-phenyl) ethyl chloromethyl ketone (TPCK-treated trypsin; Worthington), 1 mM HEPES, and 100 μg/ml gentamicin. The titers of the virus stocks were determined via standard 50% tissue culture infectious dose (TCID50) assay.
Superinfection assay.For the 6-h sequential-infection group, confluent mammalian cells (MDCK, Vero, A549, or 293T) in six-well plates were infected with rPR8 at an MOI of <0.3 TCID50/cell for 1 h. At 1 h postadsorption, monolayers were washed with phosphate-buffered saline (PBS) and incubated in serum-containing medium. At 3 hpi, neutralizing anti-PR8-HA mouse MAb H17-L2 (5 μg/ml) was added to cultures to prevent spread of rPR8. At 6 hpi, monolayers were superinfected with rH3N2 at an MOI of <0.3 TCID50/cell in the presence of H17-L2 (which does not interfere with rH3N2 infection) (see Fig. S2 in the supplemental material). At 1 h postadsorption, monolayers were washed with PBS and incubated in serum-containing medium with H17-L2. At 9 hpi of rPR8 (3 hpi of rH3N2), the medium was changed to MEM with 50 mM HEPES and 20 mM NH4Cl to block spread of both viruses. At 19 hpi of rPR8 (13 hpi of rH3N2), monolayers were trypsinized into single-cell suspensions.
For the 0-h simultaneous infection group, cells were infected with a mixture of rPR8 and rH3N2 at the same MOIs as in 6-h superinfection group. The NH4Cl medium was added to block viral spread at 3 hpi, and cells were harvested at 19 hpi.
All cells were simultaneously fixed and permeabilized using foxP3 fix/perm buffer (eBioscience). Fixed cells were stained with Alexa Fluor 488-conjugated mouse anti-H1 MAb H36-26 (which does not compete with H17-L2), Pacific Orange-conjugated mouse anti-N1 MAb NA2-1C1, Pacific Blue-conjugated mouse anti-NS1 MAb NS1-1A7, and Alexa Fluor 647-conjugated mouse anti-H3 MAb H14-A2 (all MAbs were gifts from Jon Yewdell). After staining was performed, cells were washed, run on a BD LSR II flow cytometer, and analyzed using FlowJo version 10.1 (Tree Star, Inc.). Importantly, the expression patterns of H1, H3, N1, and NS1 allowed clear gating of positive and negative populations.
NA activity inhibition assay.The NA inhibitor zanamivir (Sigma) (10 μg/ml) was 2-fold serially diluted in assay buffer [33 mM 2-(N-morpholino)ethane-sulfonic acid (pH 6.5), 4 mM CaCl2] and mixed with 2.2 × 106 TCID50 of rH3N1 virus in a final volume of 50 μl. On a 96-well half-well flat-bottom plate (Corning 3686), 25 μl of the virus-NAI mixture was mixed with 20 μl of the fluorogenic substrate MUNANA [2′-(4-methylumbelliferyl)-α-d-N-acetylneuraminic acid] (Sigma) diluted in assay buffer [33 mM 2-(N-morpholino)ethane-sulfonic acid (pH 6.5), 4 mM CaCl2]. In the mixture, the final concentration was 200 μM for the substrate and ranged from 0.0625 μM to 1 μM for zanamivir. No-drug controls and no-virus controls were also included. Immediately after the addition of the substrate, fluorescence was measured every 5 min over a 30-min period on a SpectraMax M2 microplate reader (Molecular Devices). Michaelis-Menten kinetics were determined for each dilution of zanamivir to estimate the maximum rate of metabolism (Vmax) values.
Quantification of NA expression.H1+ N1+ MDCK cells infected with rPR8WT, rPR8 NP:F346S, or rPR8 NA:K239R in the superinfection assay (6-h group) were gated, and histograms for NA expression were plotted. The geometric mean fluorescence intensities (GMFI) for NA were determined using FlowJo version 10.1 (Tree Star, Inc.).
UV treatment and analysis.rPR8 stocks were placed in six-well plates (500 μg/well) on ice. Plates were placed 5 cm underneath a 302-nm-wavelength UVP-57 handheld UV lamp (UVP) and irradiated for 30 s or 60 s. TCID50 titers and single virion expression patterns of untreated and UV-treated virus were determined on MDCK cells, and the superinfection assays described above were performed using these viruses and rH3N2.
Transfection assay.293T cells (80% confluent) in six-well plates were transfected with the following plasmids using jetPRIME (Polyplus): RNP (500 ng each of pDZ::PB2, pDZ::PB1, pDZ::PA, and pDZ::NP) plus 1 μg of pHH21 vector; RNP plus 1 μg of pHH21::eGFPvRNA (eGFPORF flanked with NA UTRs); RNP plus 1 μg of pHH21::eGFPORF; RNP plus 1 μg of pHH21::HAvRNA; RNPPA− (500 ng each of pDZ::PB2, pDZ::PB1, pDZ, and pDZ::NP) plus 1 μg of pHH21::eGFPvRNA; RNPPA− plus 1 μg of pHH21::HAvRNA; 6 μg of pHH21 vector; 3 μg of pHH21 vector plus 3 μg of pHH21::eGFPvRNA; 3 μg of pHH21 vector plus 3 μg of pHH21::HAvRNA; 3 μg of pHH21 vector plus 3 μg of pHH21::HAcRNA; 3 μg of pHH21::HAvRNA plus 3 μg of pHH21::HAcRNA; 3 μg of the pCI vector; 3 μg of pCI::eGFPORF; 3 μg of pCI::HAORF. All plasmid-encoded viral sequences were derived from PR8. At 24 h posttransfection, monolayers were infected with rH3N2 at an MOI of 0.2 TCID50/cell. At 8 hpi, cells transfected by RNP+ pHH21, and pCI plasmids were harvested and stained with Alexa Fluor 488-conjugated mouse anti-H1 MAb H36-26 and Alexa Fluor 647-conjugated mouse anti-M2 MAb O19. Cells transfected with pHH21 plasmids were permeabilized, fixed, and stained with Alexa Fluor 647-conjugated mouse anti-NP MAb HB-65. After staining, cells were washed and run on a BD LSR II flow cytometer, and virus infection frequencies, as measured by fractions of M2+ or NP+ cells, were quantified using FlowJo version 10.1 (Tree Star, Inc.).
Intracellular viral RNA quantification.Subconfluent 293T cells in six-well plates were infected with rPR8 at an MOI of 0.5 HA-expressing units (HAEU)/cell or were transfected with the following plasmids using jetPRIME (Polyplus): 3 μg of pHH21 vector plus 3 μg of pHH21::HAvRNA; RNP (500 ng each of pDZ::PB2, pDZ::PB1, pDZ::PA, and pDZ::NP) plus 1 μg of pHH21::HAvRNA. At 6 hpi and 24 h posttransfection, cells were harvested and RNA was extracted using an RNeasy minikit (Qiagen). cDNA of cellular mRNA and cDNA of HA vRNA were reverse transcribed with oligo(dT)20 or MBTuni (5′-ACGCGTGATCAGCAAAAGCAGG) reverse transcriptase (RT) primers using Superscript III (Invitrogen). Quantitative real-time PCR on cDNA was carried out using Power SYBR green PCR Master Mix (Thermo Fisher) on a QuantStudio 3 thermal cycler (Thermo Fisher). The strand-specific primers for quantitative real-time PCR of HA vRNA and GAPDH (glyceraldehyde-3-phosphate dehydrogenase) mRNA were as follows: for GAPDH317F, CTGGGGCTCACTTGAAAGG; for GAPDH388R, CAAACATGGGGGCATCAG); for HA, F (forward) (AAGGCAAACCTACTGGTCCTGTT) and R (reverse) (AATTGTTCGCATGGTAGCCTATAC). Delta threshold cycle (ΔCT) values for viral RNA were calculated by subtracting GAPDH CT values from HA CT values.
Statistical analysis.Unpaired, two-sided Student’s t tests were applied to the data shown in Fig. 1B, 2B, 3A, 3B, and 4F. An unpaired, two-sided Welch’s t test was applied to the data shown in Fig. 3D. All statistical analyses were performed with GraphPad Prism 7.0a.
We are grateful to the other members of the laboratory for helpful discussions and critical reading of the manuscript.
This work has been generously supported by the National Institute of Allergy and Infectious Diseases of the National Institutes of Health under awards K22AI116588 and R01AI139246, as well as by startup funds from the University of Illinois.
We have no competing interests to report.
. 2017. Estimates of global seasonal influenza-associated respiratory mortality: a modelling study. Lancet 391:1285–1300. doi:10.1016/S0140-6736(17)33293-2.
. 2010. Influenza: the once and future pandemic. Public Health Rep 125:16–26.
. 2014. Biological activities of “noninfectious” influenza A virus particles. Future Virol 9:41–51. doi:10.2217/fvl.13.118.
. 2017. Population diversity and collective interactions during influenza virus infection. J Virol 91:e01164-17. doi:10.1128/JVI.01164-17.
. 2016. Reassortment in segmented RNA viruses: mechanisms and outcomes. Nat Rev Microbiol 14:448–460. doi:10.1038/nrmicro.2016.46.
. 2017. Constraints, drivers, and implications of influenza A virus reassortment. Annu Rev Virol 4:105–121. doi:10.1146/annurev-virology-101416-041726.
. 2010. Influenza virus evolution, host adaptation, and pandemic formation. Cell Host Microbe 7:440–451. doi:10.1016/j.chom.2010.05.009.
. 2013. Most influenza A virions fail to express at least one essential viral protein. J Virol 87:3155–3162. doi:10.1128/JVI.02284-12.
. 2014. Influenza A virus nucleoprotein selectively decreases neuraminidase gene-segment packaging while enhancing viral fitness and transmissibility. Proc Natl Acad Sci U S A 111:16854–16859. doi:10.1073/pnas.1415396111.
. 1973. Mechanism of influenza recombination. Virology 55:81–93. doi:10.1016/S0042-6822(73)81010-4.
. 1973. Mechanism of influenza recombination. Virology 56:620–631. doi:10.1016/0042-6822(73)90063-9.
. 2018. Extreme heterogeneity of influenza virus infection in single cells. Elife 7:e32303. doi:10.7554/eLife.32303.
. 2017. Analysis of IAV replication and co-infection dynamics by a versatile RNA viral genome labeling method. Cell Rep 20:251–263. doi:10.1016/j.celrep.2017.06.021.
. 1966. Early events in the eclipse phase of influenza and parainfluenza virus infection. Virology 29:49–59. doi:10.1016/0042-6822(66)90195-4.
. 1965. Delay in the multiplication of influenza virus. Virology 25:289–302. doi:10.1016/0042-6822(65)90207-2.
. 1990. Superinfecting rotaviruses are not excluded from genetic interactions during asynchronous mixed infections in vitro. Virology 176:308–310. doi:10.1016/0042-6822(90)90260-X.
. 1998. Absence of superinfection exclusion during asynchronous reovirus infections of mouse, monkey, and human cell lines. Virus Res 54:225–235. doi:10.1016/S0168-1702(98)00023-9.
. 2005. Retroviral superinfection resistance. Retrovirology 2:52. doi:10.1186/1742-4690-2-52.
. 2007. Analysis of hepatitis C virus superinfection exclusion by using novel fluorochrome gene-tagged viral genomes. J Virol 81:4591–4603. doi:10.1128/JVI.02144-06.
. 2007. Superinfection exclusion in cells infected with hepatitis C virus. J Virol 81:3693–3703. doi:10.1128/JVI.01748-06.
. 2009. Exclusion of West Nile virus superinfection through RNA replication. J Virol 83:11765–11776. doi:10.1128/JVI.01205-09.
. 2017. A self-perpetuating repressive state of a viral replication protein blocks superinfection by the same virus. PLoS Pathog 13:e1006253. doi:10.1371/journal.ppat.1006253.
. 2014. A novel mode of poxvirus superinfection exclusion that prevents fusion of the lipid bilayers of viral and cellular membranes. J Virol 88:9751–9768. doi:10.1128/JVI.00816-14.
. 2012. Superinfection exclusion is an active virus-controlled function that requires a specific viral protein. J Virol 86:5554–5561. doi:10.1128/JVI.00310-12.
. 1990. Cellular mechanisms in the superinfection exclusion of vesicular stomatitis virus. Virology 177:375–379. doi:10.1016/0042-6822(90)90494-C.
. 2005. Measles virus superinfection immunity and receptor redistribution in persistently infected NT2 cells. J Gen Virol 86:2291–2303. doi:10.1099/vir.0.81052-0.
. 2008. Influenza A virus neuraminidase limits viral superinfection. J Virol 82:4834–4843. doi:10.1128/JVI.00079-08.
. 2017. The effective rate of influenza reassortment is limited during human infection. PLoS Pathog 13:e1006203. doi:10.1371/journal.ppat.1006203.
. 2017. Parallel evolution of influenza across multiple spatiotemporal scales. Elife 6:e26875. doi:10.7554/eLife.26875.
. 2005. Whole-genome analysis of human influenza A virus reveals multiple persistent lineages and reassortment among recent H3N2 viruses. PLoS Biol 3:e300. doi:10.1371/journal.pbio.0030300.
. 2008. The genomic and epidemiological dynamics of human influenza A virus. Nature 453:615–619. doi:10.1038/nature06945.
. 2008. Molecular epidemiology of A/H3N2 and A/H1N1 influenza virus during a single epidemic season in the United States. PLoS Pathog 4:e1000133. doi:10.1371/annotation/1391941e-93d3-48d3-8c9a-b7c6d98f9527.
. 2008. Multiple reassortment events in the evolutionary history of H1N1 influenza A virus since 1918. PLoS Pathog 4:e1000012. doi:10.1371/annotation/1391941e-93d3-48d3-8c9a-b7c6d98f9527.
. 2014. Genomewide analysis of reassortment and evolution of human influenza A(H3N2) viruses circulating between 1968 and 2011. J Virol 88:2844–2857. doi:10.1128/JVI.02163-13.
. 2016. Frequency of influenza H3N2 intra-subtype reassortment: attributes and implications of reassortant spread. BMC Biol 14:117. doi:10.1186/s12915-016-0337-3.
. 2013. Influenza virus reassortment occurs with high frequency in the absence of segment mismatch. PLoS Pathog 9:e1003421. doi:10.1371/journal.ppat.1003421.
. 2015. Multi-spectral fluorescent reporter influenza viruses (Color-flu) as powerful tools for in vivo studies. Nat Commun 6:6600. doi:10.1038/ncomms7600.
. 1991. Nuclear transport of influenza virus ribonucleoproteins: the viral matrix protein (M1) promotes export and inhibits import. Cell 67:117–130. doi:10.1016/0092-8674(91)90576-K.
. 1978. Fluorescence probe measurement of the intralysosomal pH in living cells and the perturbation of pH by various agents. Proc Natl Acad Sci U S A 75:3327–3331. doi:10.1073/pnas.75.7.3327.
. 1968. Defectiveness of interferon production and of rubella virus interference in a line of African green monkey kidney cells (Vero). J Virol 2:955–961.
. 1979. Regulation of the interferon system: evidence that Vero cells have a genetic defect in interferon production. J Gen Virol 43:247–252. doi:10.1099/0022-1317-43-1-247.
. 2011. Influenza A virus hemagglutinin antibody escape promotes neuraminidase antigenic variation and drug resistance. PLoS One 6:e15190. doi:10.1371/journal.pone.0015190.
. 2015. Influenza virus reassortment is enhanced by semi-infectious particles but can be suppressed by defective interfering particles. PLoS Pathog 11:e1005204. doi:10.1371/journal.ppat.1005204.
. 2010. Peroxisomes are signaling platforms for antiviral innate immunity. Cell 141:668–681. doi:10.1016/j.cell.2010.04.018.
. 2015. Guarding the frontiers: the biology of type III interferons. Nat Immunol 16:802–809. doi:10.1038/ni.3212.
. 2015. The unique regulation and functions of type III interferons in antiviral immunity. Curr Opin Virol 12:47–52. doi:10.1016/j.coviro.2015.02.003.
. 2018. The parts are greater than the whole: the role of semi-infectious particles in influenza A virus biology. Curr Opin Virol 33:42–46. doi:10.1016/j.coviro.2018.07.002.
. 2017. Collective infectious units in viruses. Trends Microbiol 25:402–412. doi:10.1016/j.tim.2017.02.003.
|
0.999999 |
Click on Listen All and follow along. After becoming comfortable with the entire conversation, become Person A by clicking on the Person A button. You will hear only Person B through the audio file. There will be a silence for you to repeat the sentences of Person A. Do the same for Person B. The speed of the conversation is native speed. Use the pause button if the pause between each sentence is too fast for you. After practicing several times, you will be able to speak as fast as a native.
A: "Do you need help finding anything?"
B: "I'm looking for this shirt in a small."
A: "Let me see if we have any in the back."
A: "I found a couple. Here you go."
B: "Thank you. Do you sell belts here?"
A: "Yes. They are on the other side of the counter there."
A: "You're welcome. Let me know if you need anything else."
|
0.928713 |
What doesn't the left understand about the 2nd Amendment? That IS my permit to own and carry a firearm.
If you haven't read the Constitution with all Amendments, you might think CBS,CNN, NBC, ABC, etc. have all the answers.
|
0.986274 |
What are the symptoms of Crohn’s disease in children?
While symptoms may affect each child differently, common symptoms include unexplained fevers and diarrhea with or without blood. A child may be losing weight and not growing as expected, since the pain may make them not want to eat, and inflammation may prevent the small intestine from absorbing the nutrients the body needs.
Some infections can cause symptoms like these, and it’s important for these to be excluded as possible causes. Crohn’s can be a challenging disease for a child to have, and reassurance and support can go a long way toward making a child feel better.
What causes Crohn’s disease in children?
Scientists have not yet discovered the cause of Crohn’s disease, but it’s an area of active research. We believe that both genes and the environment play a role. We also know that the immune system is involved, which is why treatment often involves medication to reduce its activity.
|
0.999994 |
Learn about the different phases of the moon.
Many Moons explores the different phases of the moon, from the new moon to a waning crescent, through beautiful, bright illustrations. Each spread features a specific phase of the moon, and compares it to different shapes, such as a cat's tail, a banana, and a brilliant smile. Many Moons introduces young children to basic astronomy, and is sure to instill a sense of curiosity about the world and the universe.
|
0.982195 |
Collective farming and communal farming are various types of "agricultural production in which multiple farmers run their holdings as a joint enterprise". That type of collective is often an agricultural cooperative in which member-owners jointly engage in farming activities. The process by which farmland is aggregated is called collectivization. In some countries (including the Soviet Union, the Eastern Bloc countries, China and Vietnam), there have been state-run and cooperative-run variants. For example, the Soviet Union had both kolkhozy (cooperative-run type) and sovkhozy (state-run type), often denoted in English as collective farms and state farms, respectively.
A small group of farming or herding families living together on a jointly managed piece of land is one of the most common living arrangements in all of human history as this has co-existed and competed with more individualistic forms of ownership as well as state ownership since the beginnings of agriculture. Private ownership came to predominate in much of the Western world and is therefore better studied. The process by which Western Europe's communal land and other property became private is a fundamental question behind views of property, namely is it the legacy of historical injustices and crimes? Karl Marx believed that what he called primitive communism (joint ownership) was ended by exploitative means he called primitive accumulation. By contrast, libertarian thinkers say that by the homestead principle whoever is first to work on the land is the rightful owner.
During the Aztec rule of central Mexico, the country was divided into small territories called calpulli, which were units of local administration concerned with farming as well as education and religion. A calpulli consisted of a number of large extended families with a presumed common ancestor, themselves each composed of a number of nuclear families. Each calpulli owned the land and granted the individual families the right to farm parts of it. When the Spanish conquered Mexico they replaced this with a system of haciendas or estates granted by the Spanish crown to Spanish colonists, as well as the encomienda, a feudal-like right of overlordship colonists were given in particular villages, and the repartimiento or system of indigenous forced labor.
Following the Mexican Revolution, a new constitution in 1917 abolished any remnant of feudal-like rights hacienda owners had over common lands and offered the development of ejidos: communal farms formed on land purchased from the large estates by the Mexican government.
The Huron had an essentially communal system of land ownership. The French Catholic missionary Gabriel Sagard described the fundamentals. The Huron had "as much land as they need[ed]." As a result, the Huron could give families their own land and still have a large amount of excess land owned communally. Any Huron was free to clear the land and farm on the basis of usufruct. He maintained possession of the land as long as he continued to actively cultivate and tend the fields. Once he abandoned the land, it reverted to communal ownership, and anyone could take it up for themselves. While the Huron did seem to have lands designated for the individual, the significance of this possession may be of little relevance; the placement of corn storage vessels in the longhouses, which contained multiple families in one kinship group, suggests the occupants of a given longhouse held all production in common.
The Iroquois had a similar communal system of land distribution. The tribe owned all lands but gave out tracts to the different clans for further distribution among households for cultivation. The land would be redistributed among the households every few years, and a clan could request a redistribution of tracts when the Clan Mothers' Council gathered. Those clans that abused their allocated land or otherwise did not take care of it would be warned and eventually punished by the Clan Mothers' Council by having the land redistributed to another clan. Land property was really only the concern of the women, since it was the women's job to cultivate food and not the men's.
The Clan Mothers' Council also reserved certain areas of land to be worked by the women of all the different clans. Food from such lands, called kěndiǔ"gwǎ'ge' hodi'yěn'tho, would be used at festivals and large council gatherings.
The obshchina (Russian: общи́на, IPA: [ɐpˈɕːinə], literally: "commune") or mir (Russian: мир, literally: "society" (one of the meanings)) or Selskoye obshestvo (Russian: сельское общество ("Rural community", official term in the 19th and 20th century) were peasant communities, as opposed to individual farmsteads, or khutors, in Imperial Russia. The term derives from the word о́бщий, obshchiy (common).
The vast majority of Russian peasants held their land in communal ownership within a mir community, which acted as a village government and a cooperative. Arable land was divided into sections based on soil quality and distance from the village. Each household had the right to claim one or more strips from each section depending on the number of adults in the household. The purpose of this allocation was not so much social (to each according to his needs) as it was practical (that each person pay his taxes). Strips were periodically re-allocated on the basis of a census, to ensure equitable share of the land. This was enforced by the state, which had an interest in the ability of households to pay their taxes.
|
0.999992 |
You are the kind of person, Jodi, who will always be asking that question. You will always be searching for the meaning of life.
Yesterday I had coffee with a new friend. I met her about four months ago through work. She had previously worked for the same company and I had to reverse some charges because things were not managed properly. I never asked at the time, but I was always curious about why she left. Regardless, there was a reason why we met and yesterday this reason began to come to light.
I may not be a religious person, but I am spiritual. We all are, we just don't recognize it.
There are rare moments and rare people that I will remember for the rest of my life. I believe this is one of them. I arrived late for our coffee date, and I apologised profusely. "Not use to this free schedule," was my excuse. (I later admitted that I was in the process of ending a relationship. Her response was that relationships never end. That's a topic for another posting, though...) She didn't mind. Her life is fairly open right now. And she is so at peace. We discussed that peace for the rest of the conversation. I was so inspired throughout the entire conversation that I knew the day would continue to shine.
I've had so many signs from the universe in the last six months. I need to follow them, and in less of a self-satisfying, immediate response. I'm inspired to invest more time in getting towards my goals. I feel like I've coasted along to this spot right here. It's been tough....but boring. I just existed. Now I need to work hard and get my act together. But, I can't push my soul to get there.
I watched this amazing interview of this man who proposes that our soul planned our life before we were born. Every challenge we face is a lesson our soul wanted to learn. These lessons exist on a timeline, but we are not predestined to follow one path. We have free will. If we learn our lesson before we were supposed to, another plan comes into play. I'm still digesting a lot of what the video had to teach me.
|
0.997615 |
Often times, what individuals refer to as a "marble stain" is really something more. In reality, many discolorations that affect marble counter tops and marble flooring are not a result of liquid staining the stone. Rather, often times the abnormal color of the marble is caused by a reaction between the stone and an acidic liquid or food that results in a dull or hazy looking spot on what appears to be the surface of the marble. What is etching and is it treatable?
The answer to the second question is yes, it is treatable. We'll get to that in a moment but first let's talk about why etching is not the same thing as a stain. An etch in marble can be viewed as the opposite of a stain since it is subtractive and not additive. Earlier in this article we discussed the mineral calcite and how it is by nature a crystal. Since crystal has a glistening appearance, calcite is what makes marble look so "polished". However, acidic substances - which are common in households - dissolve calcite, the sheen causing mineral in marble. So, when an acidic liquid like vinegar or lemon juice gets into the pores of your marble counter or floor it eats away the calcite in the marble and the resulting mark is a dull, hazy looking spot that resembles a stain. Since it was caused by a subtractive process (the removing of the calcite) the treatment process is different from that of a stain. You will need a substance that is designed to repair or restore the marble's original appearance.
Restoring your marble after it is etched is not difficult if you have the proper etch removing powder for marble and you can follow directions. Depending on the length of time that the acid was in contact with the marble, the etch will be quickly removed or it may take some additional patience and elbow grease. However, the etch can be removed. So etching, although it discolors, it is not a stain and can be treated.
These are perhaps the kind of "stains" that most people are thinking of when they think of a stain. It is the additive process mentioned earlier in this article. This kind of stain happens when a colored substance is absorbed into a marble stone and then the liquid dries, leaving the color behind in the pores of the marble. These stains are not necessarily etch marks, they may only stains. These types of stains can be removed from marble by using a specially formulated poultice powder designed to reverse the staining process.
So what happens when a colored substance contains acid? You guessed it. It will stain the marble and cause an etch. So, it basically eats the calcite and delivers a colored substance that remains in the pores of the marble after the liquid dries. This requires the removal of the stain first. Then after you have reduced the blemish down to only and etch, you remove the etch. And that brings us to our final kind of stain.
If you have ever tried to wash surface rust off a piece of metal then you understand just how stubborn of a stain rust can be. You might even say that rust is a stain to the extreme because it is an extreme stain. Most marble rust stains are caused by a piece of metal sitting on the marble while contacting water. The metal rusts and the water helps to deliver the rust to the pores of the marble.
Your first reaction to this scenario might be to try the stain remover poultice to remove the rust from the marble. However, it more than likely will not work. The most effective way to treat a rust stain is to use a rust remover for marble to remove it. You should know though that you will also have to use etch remover after you have gotten the rust out because the marble will be etched during the rust removal process.
There you have it; a basic description of each variant of the kinds of stains that marble can be affected by and how to treat each one properly for best results. However, perhaps the most effective way to treat a stain on marble is to prevent it from happening in the first place. While it might be impossible to prevent every marble stain from happening. A good maintenance routine will give your marble counters and vanities the best protection from all four of these blemish types. To find out more about how to protect your marble from staining and discoloration check out our marble maintenance kits. They will regularly add a protective barrier to your marble stone to help keep liquid out so it is less likely to destroy the calcite or deliver unwanted color to the pores.
|
0.981128 |
Every once in a while there is a phenomenon that captivates the imagination of its followers and brings a country to its toes whenever it takes center stage.
This was the case of the boxer Wilfredo Gomez (born October 29, 1956). Nicknamed 'Bazooka' for his power and accuracy, Gomez, who also was an under-rated defense specialist, was a teen prodigy who conquered the world amateur championship in 1974 in Havana, Cuba.
Coming from Puerto Rico, however, meant that the big bucks and exposure of the American media would not come easy, and Gomez had to move to Costa Rica, from where he began to tour all of Central America in hopes of finding matches. His professional debut came in Panama City, Panama, where he fought to a draw with Jacinto Fuentes[?]. After this un-auspicious debut, he reeled off a streak of 33 knockout wins in a row, including wins over Fuentes, who was dispatched in 2 rounds in a rematch, and future world champion Alberto Davila, who lasted 9 rounds before crumbling.
Gomez's meteoric rise through his knockout streak caught the eye of the World Jr Featherweight champion Dong Hyung Yen[?], who travelled to San Juan, Puerto Rico to defend his crown against Gomez Yen had a promising start, dropping Gomez 30 seconds into the bout, but Gomez picked himself up and eventually won the crown, his first world title, with a 12th round knockout. His first defense took him to the Far East, where he beat former world champion Royal Kobayashi[?] in 3 rounds in Tokyo. Kobayashi had lasted 5 rounds vs Alexis Arguello and 10 rounds vs Roberto Duran when Duran was a Featherweight. Next was Ryu Tomonari[?] in a small city of Thailand. He lasted 2 rounds.
Gomez kept on going until his streak reached 33 knockouts in a row.Those 33 knockouts in a row included his biggest victory ever, a 4 knockdown, 5 round defeat of Mexican world Bantamweight champion Carlos Zarate, who was 55-0 with 54 knockout wins coming into their San Juan bout. Also included in that streak was future world champion Leo Cruz, beaten in 13 rounds at San Juan. After recording his 33rd. knockout win in a row, he moved up in weight to face the dangerous champion Salvador Sanchez of Mexico. Not realizing Sanchez was a sensational champion on his own , Gomez undertrained and lost a brutal bout by a knockout in 8 rounds in Las Vegas. Puerto Rico was shocked by Gomez's defeat, and Gomez himself learned a lesson in life: to never underestimate a foe.
Hoping to get a rematch with Sanchez, Gomez went back to the Jr Featherweight[?] division, where he got a dispense from the WBC to make 2 preparation bouts before defending his title again. He did so and won 2 non title bouts in a row , both by knockout in the 2nd round, one over the capable Jose Luis Soto[?], who was a stablemate of Julio Cesar Chavez back in Culiacan, Mexico. A win over future world champ Juan 'Kid' Meza[?] in Atlantic City followed, but all chances of a rematch with Sanchez were dashed when Sanchez died tragically in a car crash outside Mexico City the morning of August 12th , 1982. Mexico mourned their gone champion, and all of Latin America joined Mexico in their pain. Gomez, who was training to defend against Mexican Roberto Rubaldino[?] only 5 days later, took a quick trip to Mexico to offer Sanchez flowers and then returned to Puerto Rico the same afternoon. He beat Rubaldino by knockout in 8 rounds and made 1 more title defense, against the great Mexican bantamweight world champ Lupe Pintor in the Carnival of Champions in New Orleans, winning by knockout in 14 in a wild and historic fight. The Pintor contest was the only time a Gomez fight was showcased on HBO.
By the time he was done with the Jr Featherweights, Gomez had established a division record of 17 defenses, and a world record of most defenses in a row won by knockout, all his defenses finishing before the established distance limit.
He then re-tried winning the Featherweight title and this time, he achieved his dream, winning his second world title by dethroning the durable Juan Laporte, a fellow Puerto Rican who had won the title left vacant by Sanchez's untimely departure. He beat Laporte by a 12 round unanimous decision. This time, however, it didn't last that long. Ahead on all scorecards, Gomez was the victim of a rally by Azumah Nelson of Ghana who knocked him out in 11 exhiliarating rounds in San Juan, December 8, 1984. Nelson himself proved a great champion and future hall of famer by making a string of defenses in the Featherweights[?] and becoming a 3 time world champion himself later.
Gomez wanted either a rematch with Nelson or a shot at Jr Lightweight world champ Rocky Lockridge[?] of New Jersey , which ever came first. Lockridge was first to knock on the doors, and the 2 battled an exciting 15 round bout in San Juan, Gomez being given an extremely close 15 round decision, which many experts have said Lockridge deserved, but also which in the opinion of most who saw it life, was a justified decision.
This reign also came to an end quick, Gomez being handed his 3rd loss at the hands of young Alfredo Layne[?] by knockout in 9 rounds. Layne proved he wasn't an exceptional champion by losing the title in his first title defense, and it became obvious Gomez's best years had gone by, so he retired after this fight.
Gomez tried a comeback in 1988 and 1989, but after winning 2 more bouts by knockout, he realized boxing wasn't in his heart anymore and retired for good. He later moved to Venezuela, where he made a few wrong decisions and ran into trouble with the law. But, as a true champion, he rebounded and is now back in Puerto Rico, being an exemplary citizen and getting his life back on track, and helping the legendary 3 time world champion Hector 'Macho' Camacho with the training of Camacho's son Hector 'Machito' Camacho Jr., who is a prospect in the Jr Welterweight division.
Gomez is also a member of the International Boxing Hall of Fame and, during July of 2002, plans to take his life to Hollywood's big screen were announced.
Gomez had a record of 44 wins, 3 losses and 1 draw, with 42 knockout wins.
|
0.999996 |
The inflation rate in Chile between 1988 and today has been 575.56%, which translates into a total increase of $575.56. This means that 100 pesos in 1988 are equivalent to 675.56 pesos in 2019. In other words, the purchasing power of $100 in 1988 equals $675.56 today. The average annual inflation rate has been 6.15%.
|
0.997755 |
What is the square root of 100 less than the sum of the prime numbers that are greater than 80 but less than 100?
The fact that the perfume is 45% off means nothing considering that you are told the sale price. So at this point, all you need to find out is what the total cost for 4 bottles of perfume is at $38.83 each. This can be expressed by 4(38.83). This, however, is not an option of the given choices. You could take the easy route and choose option E, None of the above, or you can look a little harder at the choices. Option D is essentially the same as 4(38.83), just broken down. If you separate the dollars and cents and multiply them both by 4 then add them back together, you still get the same answer. Be careful with tricky questions and always check your answers!
|
0.974042 |
If a story is entertaining, does the truth really matter?
Many films have tried to express this very idea, to varying success: Where the Wild Things Are, Big Fish, and even The Wizard of Oz. With this odd, little film however, you believe every word.
The roller coaster career of Terry Gilliam has had many highs and lows, but Baron von Munchausen is certainly one of the most successful attempts.
And as with any Gilliam endeavor, this is also a very messy film. There's people and animals and machines and war and death and magic, everywhere at once. And, also as usual, everything travels back and forth between different worlds, where the borders between reality and fantasy are dimmed. It might seem a bit too much in the beginning, but after a while you cannot help but be overwhelmed by the detailed extravagance of the universe.
|
0.802869 |
How can webpack copy src/content/json/menu.json to dist/content/json/menu.json ?
You're using fetch to request a JSON file and that will only happen at runtime. Furthermore, webpack only processes anything that is imported. You expected it to handle an argument to a function, but if webpack did that, every argument to a function would be considered a module and that breaks any other use for that function.
If you want your loaders to kick in, you can import the file.
You can also import the JSON and use it directly instead of fetching it a runtime. Webpack 2 uses json-loader by default for all .json files. You should remove the .json rule and you would import the JSON as follows.
|
0.999999 |
A friend used John 3:16-17 as a refutation of the Calvinist belief of limited atonement. How do you understand this passage?
John 3:16-17 is a pretty common text that people use as an objection to limited atonement. The basic idea behind the objection is generally that because God's love for the world motivated him to give his Son in order to save the world, therefore Jesus atoned for everyone in the world.
The first thing to notice about this text is that it does not mention atonement, the cross, Jesus' death, or anything else that might be taken as an explicit reference to the idea of atonement (John 3:14 is not a reference to Jesus being physically lifted up on the cross, but figuratively lifted up as the object of hope and salvation -- remember the serpent was not killed). Thus, it does not appear that John's purpose in this text was to teach about the extent of the atonement.
Rather, John's purpose throughout the chapter seems to be to teach how people enter the kingdom of God, especially through regeneration by the Holy Spirit and by faith in Christ. The section of text in question deals most directly with the idea of salvation through faith in Christ (John 3:13-21), that is, with faith as the means of salvation. It does not deal with the atonement as the basis for justification.
Nevertheless, the text does tell us something about God's intention in sending Christ, and this intention implies certain things regarding the extent of the atonement. Specifically, it tells us: 1) that God sent Christ in order to save "everyone who believes" (John 3:16); and 2) that God sent Christ in order to save the world (John 3:17).
The first point is not so clear in most translations. The Greek, however, is quite clear. It identifies a specific group of people whom God sent Christ to save, and it labels them "all the believers" (pas ho pisteuon). Greek does have a way to say "whoever" (hos tis), but that is not the language used here. More literally, the text ought to be translated something like: "in order that everyone who believes in him should not perish." Older translations often render the verse in this way (e.g. Wiclif , Tyndale , Geneva , Rheims ), as do modern versions such as the NRSV. The same is true throughout this passage (e.g. John 3:18). In other words, neither in John 3:16 nor anywhere else in this context does John state that it was God's intention to make salvation possible for everyone, or to save an undefined group of people. Instead, he states that God's purpose was to save all the believers. Clearly, a universal atonement is not necessary for the accomplishment of this purpose. Rather, the fact that God's purpose was limited to saving believers actually strengthens the case for limited atonment by demonstrating that it was never God's intention to save everyone.
The second mention of God's intention in sending his Son is found in John 3:17. There we see that God sent Christ in order to save "the world." Generally, the term "world" in this verse and in John 3:16 is taken to mean "every person" or "all men." From this interpretation it is argued that God's intention was to save every person, or at least to make salvation possible for every person, and that in order to accomplish this he must have atoned for every person. It is worth mentioning, however, that none of these points is explicit in the text. Rather, the text explicitly says only that Christ came to save "the world."
One obvious difficulty with the argument that God intended to save "every person" is that not every person is saved -- this implies failure on God's part (i.e. God did not fulfill his goal). One way people attempt to salvage this idea is to say that Christ made salvation possible, but this idea is totally foreign to the text. The text says nothing about God's intention to make salvation possible. Rather, it speaks of God's intention to save.
Another difficulty with this argument is that it is not at all clear that "world" ought to be interpreted as a reference to "every person" or "all men." The word translated "world" is kosmos, which literally means "the whole order of things." It most directly denotes the planet itself, or even the universe. Only metaphorically is it sometimes extended to refer to mankind as the primary inhabitants of the world. Now, this is not to say that the metaphoric use of kosmos in reference to mankind is uncommon, but only that this use is not the only, or even the most basic, meaning of kosmos. Kosmos appears five times in this context (John 3:16,17,19), and in two of those appearances it clearly does not refer to people at all ("God did not send his Son into the world"; and "light has come into the world"). In both these instances, "world" refers to the creation or the planet, the realm in which people exist. Now, it is not impossible that John might have used two different meanings for the word kosmos within this single context (compare John 1:10). Still, it is far from evident that he did so, and the only clearly establishable meaning of kosmos in this context does not support the interpretation "every person."
It seems to me that the most consistent and evident meaning of the passage is that God loved and intended to redeem the kosmos itself (i.e. creation), and that he intended to do this through the remnant know as "the believers." In fact, this doctrine is clearly taught in such passages as Romans 8:19-22; Ephesians 1:10 and Colossians 1:13-20. This is also, I believe, John's meaning in John 1:1-18, where John used language reminiscent of Genesis 1 in order to demonstrate that Christ came in order to renew the whole creation. He came to restore what had been destroyed in the Fall -- not just man, but the entire creation. In fact, insofar as the language of John 3 also echoes Genesis 1 (e.g. "world," "light," "darkness"), it is quite reasonable to assume that the language refers not just to mankind, but to the whole creation.
In summary, there is no evidence in the text itself that supports the doctrine of a general ransom, and there are no theological implications which can be clearly drawn from the text to support the doctrine of a general ransom. Instead, the implication of the text supports the doctrine of limited atonement.
|
0.999998 |
World Cup matches". The stadium hosted the opening and asos promo code 20 off closing ceremonies of the 2014 Winter Olympics. Retrieved "Yaya Toure: Black players may boycott 2018 Russia World Cup".
87 Khrabrovo Airport in Kaliningrad was upgraded with radio navigation and weather equipment. 85 Koltsovo Airport in Yekaterinburg was upgraded with radio-engineering tools for flight operation and received its second runway strip. Fan-ID was administered by the Ministry of Digital Development, Communications and Mass Media, who could revoke these accreditations at any time to "ensure the defence capability or security of the state or public order". 31 32 The 32 teams were drawn into 8 groups of 4, by selecting one team from each of the 4 ranked pots. If only he knew". "With usmnt eliminated from World Cup, Fox must refocus coverage plan". At an estimated cost of over.2 billion, it was the most expensive World Cup. On 9 February 2018, fifa announced the base camps for each participating team. 36 Officiating Main article: 2018 fifa World Cup officials On, fifa released the list of 36 referees and 63 assistant referees selected to oversee matches. The stadium is a home arena to its namesake FC Spartak Moscow.
|
0.997979 |
My dog is 8-10 months old and is menstruating. How long should I wait to have her spayed?
Wait until her "heat" is over, then make the appointment. She is old enough now.
|
0.995868 |
Choosing the best programming language for your company’s next web development project can be a daunting task. There are many factors to weigh when considering which programming language will be the best fit. Often, choosing a coding language involves trade-offs--some languages will offer more versatility, but also lead to a longer, most costly project. Python’s ease of syntax, for example, allows for quicker development. This increased productivity typically allows for less work hours, which leads to a less expensive overall project.
Another consideration -- some coding languages don’t have a long lifespan. So if you’re creating a website or mobile app that needs to remain fresh and modern for many years, you need to forecast which coding language that ages well. For example, in the early 2000’s, PHP and Ruby on Rails seemed like an exciting trend; however, very few developers use these languages in 2019.
The best way to balance of benefits versus detriments is to take a close look at the unique needs of your specific project and decide which language fits best. While non-technical project managers may be more likely to rely on their developer’s expertise, it’s important to have a basic understanding of the benefits and detriments of specific programming languages. Likewise, more tech-savvy project managers will benefit from a more in-depth look at the features, versatility, and cost-savings of a Python development project.
With all of the trade-offs involved between coding languages, it’s important to have some basic criteria to consider when determining which language fits your specific project.
For the purposes of this article, let’s take a look at the Python programming language, measuring it against each of these criteria and exploring the benefits of the code.
Python is rapidly rising in popularity. As the number one programming language of 2017, and data from Stack Overflow forecasts Python outgrowing all over programming languages--including C, Java, and C++.
Internet giants like Reddit, Instagram, Pinterest, and YouTube utilize Python as their development language. Each of these social media platforms need an immense amount of coding versatility to create entirely unique and dynamic websites. Also, because these popular social media websites use Python, it increases the likelihood that Python’s customer support, accessibility, and efficiency will last for a long time.
Because Google has listed Python as their first and foremost choice, most of Google’s tools are developed with Python frameworks in mind. This makes Python a safe bet for integration into Google’s cloud services and Google Apps--making it a perfect fit for Google partners. This integration with Google also ensures the longevity of the Python language.
Python has a wide community of passionate fans and developers who enjoy discussing the language, troubleshooting issues, and sharing their latest code. These coders run everything from a message board community to actual conferences and local events for Python enthusiasts.
Many open source communities are devoted to Python, with thousands of programmers across the world working together to improve Python’s core functionality and add features. There’s even a Python Wiki, where people can search for specific topics--or even write a topic and share their knowledge! Should your team ever need support or assistance on a Python project, it’ll be easy to find answers online.
These features not only make Python easier for developers, but also easier for end-users, since your team will be able to easily integrate a Python website or mobile app into the automation software you’re already using.
6. Python is Free -- It’s a Core Value!
One of Python’s core values is to remain open source and free. Therefore, the entire set of supporting tools, libraries, and modules are totally free. Integrated development environments like Pydev with Eclipse and Spider Python can be downloaded for free.
The open source mentality and “we’re in this together” community environment leads to expanded development resources and code being made available--for free--as time goes on.
As we’ve already seen, Python supports open source code-share, and easily integrates with third-party software. Along these same lines, the Python Package Index (PyPl) contains third-party modules that maintain Python’s proficiency in interaction with other languages and platforms.
PyPI – Python package index contains third-party modules that makes Python proficient in the interaction of other languages as well as platforms.
The Python language offers ease of syntax that allows programmers to complete code in less steps, especially when compared to Java or C++.
Python accomplishes this by including an embedded dictionary of data structures, which allows coders to create fast runtime data structures. Dynamic, high-level data typing shortens the length of support code required to make a program.
In short, Python allows for less typing, which means faster coding.
Python’s constantly-growing libraries and open source support communities make it a great choice for any development project. Whether your team is developing a Mobile Application, Web App, AI, Data Science, or IoT, Python provides a dynamic and proficient framework that is gaining popularity with complex apps and social media websites across the Internet.
Many software development companies use Python because of its efficient syntax, growing features, and versatility of code. If you have a development project in the works, our team of experienced Python developers can help your company create a dynamic, unique, integrated project.
Call our team of web developers at +1 252 723 5982 or contact us to learn more about our services and all the benefits of using Python for your next development project.
|
0.999947 |
From primitive to present times, how fitness has evolved and come of age.
As we enter the 21st century, one of the greatest accomplishments we can celebrate is our continuous pursuit of fitness since the beginning of humankind. Throughout prehistoric time, the quest for fitness was driven by a need to survive through the arduous tasks of hunting and gathering. Today, though no longer driven by subsistence requirements, fitness remains paramount to people's health and well-being. This article will highlight the history of fitness, beginning with primitive man and leading to the foundation of the modern fitness movement.
Primitive, nomadic lifestyles required continual hunting and gathering of food for survival. It was quite common for tribes to embark on one- or two-day journeys to seek food and water. Following successful hunting and gathering excursions, tribes would often travel six to 20 miles to celebrate with neighboring tribes and then partake of dancing and cultural games that lasted several hours. This Paleolithic pattern of subsistence pursuit and celebration demanded a high level of fitness.
This period marked the end of the primitive lifestyle and signified the dawn of civilization. This time was defined by important agricultural developments, such as the invention of the plow and domestication of plants and animals. These advancements made it possible for hunting-gathering tribes to obtain vast amounts of food while remaining in the same area, thus transforming primitive, nomadic peoples into agrarian (agriculture and farming) societies. Unfortunately, this era also coincided with the beginning of a more sedentary lifestyle, as daily physical activity decreased with fewer hardships to conquer.
Recognizing the importance of physical performance in the battle field, early leaders within the civilizations of Assyria, Babylonia, Egypt, Palestine, Persia and Syria encouraged fitness among their peoples. Perhaps the best example of a civilization using fitness for political and military purposes was the Persian Empire, which implemented mandatory rigid training programs to expand its domain. As this empire became more affluent, physical activity became less important. At the point the Persian Empire finally collapsed, its society could largely be characterized by an overall lack of fitness.
The Chinese culture recognized that regular exercise could prevent certain diseases. In fact, the philosophical teachings of Confucius encouraged participation in physical activity. Consequently, the Chinese developed Cong Fu gymnastics to keep the body in good working condition. Cong Fu exercise programs consisted of various stances and movements that were actually modeled after the fighting styles of different animals. The ancient Chinese also engaged in other forms of physical activity, such as archery, badminton, dancing, fencing and wrestling.
In India, the pursuit of fitness was discouraged because Buddhism and Hinduism put a greater emphasis on spirituality than on physical fitness. However, Hindu priests did develop an exercise program that conformed to their religious beliefs; that program came to be known as yoga. Though its exact origin has yet to be identified, yoga has existed for at least the past 5,000 years. Translated, the word yoga means “union,” a reference to the Hindu philosophy that strives to unite and develop the body, mind and spirit. By observing and mimicking the movement patterns of animals, the priests hoped to achieve the same balance with nature that animals seemed to possess.
Perhaps no other civilization has held fitness in such high regard as ancient Greece. This civilization’s appreciation of the body and focus on health and fitness are unparalleled in history. The Greeks believed that development of the body was equally as important as development of the mind. Facilitating the growth of fitness were Greek medical practitioners, such as Herodicus, Hippocrates and Galen.
Gymnastics, along with music, were considered vital to the education of all Greeks. In fact, a common saying in ancient Greek times was “exercise for the body and music for the soul” (Wuest & Bucher 1995). In Athens, gymnastics took place in indoor facilities called palaestras (the precursors to health clubs) and were supervised by a paidotribe (similar to today’s personal fitness trainer). In Sparta, the government imposed special fitness programs for its male children to ensure they would become highly fit adult soldiers. Females were required to maintain good physical condition in order to produce healthy male offspring who could serve the state. The military-dominated culture of Sparta resulted in one of the most physically fit societies in the history of mankind.
During its reign of conquest and expansion, the Roman Empire mandated that all its citizens maintain good physical condition and be prepared for military service. Everyone between the ages of 17 and 60 was eligible for the draft and trained in activities such as running, marching, jumping and discus and javelin throwing (Grant 1964)). This emphasis on physical training resulted in a society of strong, fit people who conquered nearly all of the Western World. However, the fitness levels of the general Roman population declined as entertainment and acquisition of material wealth became higher priorities than physical condition. A lavish lifestyle and physical decay eventually took their toll, and the Roman civilization was overcome by physically superior barbarian tribes from Northern Europe.
In much the same way as primitive man, the barbarian tribes from Northern Europe depended on physical fitness for survival. Their lifestyle consisted of hunting and gathering food and tending to cattle. Therefore, despite the cultural and intellectual setbacks that occurred with the fall of the Roman Empire, fitness actually experienced a revival during the Dark and Middle Ages.
The Renaissance gave birth to a renewed interest in culture and a glorification of the human body. Notables such as Martin Luther and John Locke espoused the theory that high fitness levels enhanced intellectual learning. The Renaissance created an environment that readied people for the widespread development of physical education throughout Europe.
Continental Europe underwent numerous cultural changes following the Renaissance. Fitness remained important and physical education programs expanded within the emerging European nations. Gymnastics enjoyed immense popularity during this era, especially in Germany, Denmark, Sweden and Great Britain. Johann Guts Muths—known as the grandfather of German gymnastics—invented numerous exercise programs and the equipment on which they were performed. Exercise facilities called Turnvereins were built throughout Germany to house apparatuses designed for running, jumping, balancing, climbing and vaulting (Matthews 1969). In Sweden, Per Henrik Ling developed exercise programs tailored for different individuals and advocated that physical educators be schooled in science and physiology in order to understand the effect of exercise on the human body. Denmark’s Frank Nachtegall created a program called “Training Teachers of Gymnastics” for future fitness instructors (Matthews 1969). Meanwhile, Archibald Maclaren was developing Great Britain’s National Systems of Bodily Exercise and Training in Theory and Practice. Remarkably similar to present-day exercise recommendations, Maclaren’s ideas included reducing stress through physical activity and gradually progressing activity levels (Welch 1996).
The hardships of colonial life ensured that the early settlers regularly engaged in physical activity in order to survive. Colonial America remained an undeveloped country, and its people spent a great deal of their time and energy plowing the land for crops, hunting for food and herding cattle. With this lifestyle providing plenty of physical activity, settlers had no need for organized exercise programs.
Immigrants who arrived in the United States during this period brought with them many aspects of their heritage, including German and Swedish gymnastics programs. But these programs failed to attain popularity, since America was less vulnerable to foreign invasion than European countries were, and therefore keeping fit seemed a less urgent requirement (Barrow & Brown 1988). This is not to say that the need for exercise and fitness was unappreciated. Leaders such as Benjamin Franklin recommended regular physical activity—including resistance training—for health purposes, while President Thomas Jefferson recommended more extreme measures: “Not less than two hours a day should be devoted to exercise, and the weather shall be little regarded. If the body is feeble, the mind will not be strong” (Personal Fitness Professional 2001). Individuals such as J. C. Warren and Catherine Beecher also advocated regular exercise, especially for women. And in fact, Beecher’s programs, which mixed calisthenics with music, bore remarkable likeness to modern-day “aerobics.” In general, however, little emphasis was placed on physical education during this period.
One of the most important events with respect to modern fitness in the United States was the Industrial Revolution, which resulted in widespread technological advancements that replaced labor-intensive jobs. Rural life gave way to city life, which generally required less movement and lower levels of physical activity. (By the 1950s, with life-threatening diseases like cancer and diabetes becoming more widespread, the cost of industrialization and urbanization would become glaringly apparent.) On a more positive note, Dioclesian Lewis introduced “The New Gymnastics” following the end of the Civil War in 1865 (Rice, Hutchinson & Lee 1958). Other noteworthy advancements during this period included the development of anthropometric measurements to assess fitness progress, the launch of the first scientific studies on fitness instruction and the creation of organized fitness teaching methodologies.
The 20th century heralded the beginning of a new era in fitness. President Theodore Roosevelt, perhaps the most physically fit president ever to occupy the Oval Office, used his power and own example to encourage U.S. citizens to be physically active. While president, he engaged in multiple forms of physical activity, including hiking, horseback riding and other outdoor endeavors.
World War I. With America’s entry into World War I in 1917, hundreds of thousands of military personnel were drafted and trained for combat. After the war was fought and won, disturbing information became available regarding the readiness of our troops: One out of every three draftees had been unfit for combat, and many of those drafted were highly unfit prior to military training (Barrow & Brown 1988; Wuest & Bucher 1995). As a result of these dismal findings, the government passed legislation dictating that physical education programs within the public schools be improved. However, the heightened interest in physical education and concern over low fitness levels would prove short-lived as the United States entered the 1920s and the Depression.
The Roaring ‘20s and Great Depression. Throughout history, the pattern has been evident that following a war, people tend to relax more and exercise less. The decade known as the Roaring ’20s was no exception and in fact earned its moniker because society lived more frivolously then than at any other time in recent history. Priorities centered on eating, drinking, partying and other forms of entertainment. With the stock market crash in 1929, fitness levels continued to decline. The gains that physical education programs had made through the passage of legislation following World War I were soon lost. Funding for these programs became limited and was eventually exhausted as the economy continued to falter. Despite this lack of interest in physical activity, it was during this period that Jack LaLanne first began to develop the programming and equipment that became the foundation of the modern fitness movement.
World War II. Like World War I, the “War That Would End All Wars” again underscored the low fitness levels among Americans serving in the military. When the war was over, the public learned that the armed forces had needed to reject nearly half of all draftees or give them noncombat positions (Rice, Hutchinson & Lee 1958). Once again, these embarrassing statistics helped focus the country’s attention on the importance of fitness. Other significant developments during this time included the application of research to fitness practice, particularly by Dr. Thomas K. Cureton at the University of Illinois. Cureton also introduced fitness testing for cardiorespiratory endurance, muscular strength and flexibility and identified exercise intensity guidelines for improving fitness levels.
Early Years of the Cold War. It is fitting that during this era, when the first wave of baby boomers were born, the focus of fitness shifted from adults to children. Early in the 1950s, tests were conducted on American schoolchildren to measure muscular strength and flexibility in the trunk and leg muscles. Close to 60 percent of American children failed at least one of the tests, compared to only 9 percent of children from European countries (Kraus & Hirschland 1954). In the competitive climate that marked the Cold War, these startling statistics launched a new campaign among U.S. political leaders to promote health and fitness among the nation’s youth. President Eisenhower responded in June 1956 by holding a White House Conference, which led to the formation of the President’s Council on Youth Fitness and the appointment of a Citizens’ Advisory Committee on the Fitness of American Youth (Nieman 1990). During this period, educating the public about the consequences of low fitness levels became a goal of several organizations, including the American Health Association; the American Medical Association; the American Alliance for Health, Physical Education, Recreation and Dance; and the President’s Council on Youth Fitness (Barrow & Brown 1988). In 1954, the American College of Sports Medicine (ACSM) was formed; throughout its history, ACSM has established position stands—based on scientific research—on various exercise-related issues.
The 1960s and Beyond. President John F. Kennedy was a major proponent of fitness and its health-related benefits for Americans of all ages. To reflect this concern, he broadened the scope of the President’s Council on Youth Fitness by changing its name to the President’s Council on Physical Fitness and appointed Bud Wilkinson as its head. Kennedy also prompted the federal government to become more involved in national fitness promotion and started pilot youth fitness programs. Another major influence during this time was Dr. Ken H. Cooper, widely recognized as the “father of the modern fitness movement.” Cooper advocated a new philosophy that focused on disease prevention instead of disease treatment. Early in his career, Cooper stressed the necessity of providing epidemiological data to support the benefits of regular exercise and health. Data from thousands of individuals became the foundation for his “aerobics” concepts. Dr. Cooper’s message, programs and ideas established the model from which fitness has proliferated up to modern times.
The history of fitness illustrates some fascinating themes that continue to resonate for those of us living in the 21st century. One common theme is that political and military leaders can help propagate the need for a fitter society—and that after a war, people tend to exercise less. In the wake of recent events, with American troops being deployed as we go to press on this issue, this is an important lesson to ponder.
Another common thread is the relationship of mind, body and spirit throughout history. At times, some cultures prescribed spirituality at the expense of the body, whereas others, like the ancient Greeks, believed a sound mind could only be found in a healthy body. With the world in turmoil, more and more people are seeking mind-body modalities as part of their overall fitness program.
Another interesting theme is the concept of exercise for the body and music for the soul. This concept has evolved harmoniously in present-day fitness programs, with music being a distinctive component of the exercise experience.
It is also timely to remember that history has shown that, as societies become too enamored with wealth, prosperity and self-entertainment, fitness levels tend to decline. Historically, physical fitness levels have also decreased as technology has advanced.
While the past cannot always provide ready solutions to these hurdles, we can learn some important lessons by understanding how fitness has evolved through the ages. By applying some of these lessons with your clients, you can help move the world forward to healthier times.
Times of war underscore the fitness level of people serving in combat.
Political and military leaders can help propagate the need for a fitter society.
After a war, people tend to want to relax, enjoy life and exercise less.
Some cultures further the cause of fitness by emphasizing the connection of mind to body, while others do not.
In times of prosperity, fitness often takes a back seat to entertainment and frivolity.
As technology advances, fitness levels tend to decline.
Anderson, J. K. 1985. Hunting in the Ancient World. Berkeley, CA: University of California Press.
Barrow, H. M., & Brown, J. P. 1988. Man and Movement: Principles of Physical Education (4th ed.). Philadelphia: Lea & Febiger.
Berryman, J. W. 1995. Out of Many, One: A History of the American College of Sports Medicine. Champaign, IL: Human Kinetics.
Cooper Aerobics Center. 2001. Statistics on Kenneth H. Cooper. www.cooperaerobics.com; retrieved February 27.
Eaton, S. B., Shostak, M., & Konner, M. 1988. The Paleolithic Prescription: A Program of Diet and Exercise and a Design for Living. New York: Harper and Row.
Forbes, C. A. 1929. Greek Physical Education. New York: The Century Company.
Garnsey, P. 1999. Food and Society in Classical Antiquity. New York: Cambridge University Press.
Grant, M. 1964. The Birth of Western Civilization: Greece and Rome. New York: McGraw-Hill.
Grant, M. 1991. A Short History of Classical Civilization. London: Weidenfeld and Nicolson.
Green, P. 1989. Classical Bearings: Interpreting Ancient History and Culture. London: Thames and Hudson.
Hale, J. 1994. The Civilization of Europe in the Renaissance. New York: Maxwell Macmillan International.
Harris, H. A. 1972. Sport in Greece and Rome. Ithaca, NY: Cornell University Press.
Hay, D. 1986. The Age of the Renaissance. London: Thames and Hudson.
Hoeger, W. W. K., & Hoeger, S. A. 1999. Principles & Labs for Fitness & Wellness (5th ed.). Englewood, CO: Morton Publishing Company.
Jenkins, P. 1997. A History of the United States. New York: St. Martin’s Press.
Karolides, N. J., & Karolides, M. 1993. Focus on Fitness. Santa Barbara, CA: ABC-CLIO.
Keller, A. 1971. Colonial America: A Compact History. New York: Hawthorn Books.
Kennedy, J. F. 1960. The soft American. Sports Illustrated (December 26).
Kennedy, J. F. 1962. The vigor we need. Sports Illustrated (July 16).
Kraus, H., & Hirschland, R. 1954. Minimum muscular fitness tests in school children. Research Quarterly, 25, 178.
Matthews, D. O. 1969. A Historical Study of the Aims, Contents and Methods of Swedish, Danish and German Gymnastics. Proceedings from the National College Physical Education Association for Men.
Nieman, D. C. 1990. Fitness and Sports Medicine: An Introduction. Palo Alto, CA: Bull Publishing Co.
Outside Online. 2001. Jack LaLanne is still an animal.www.outsidemag.com/magazine/1195/11f_jack.html; retrieved February 18.
Personal Fitness Professional. 2001. Fitness through the ages. www.fitpro.com/editorial2.asp?ID=49; retrieved March 1.
Randers-Pehrson, J. D. 1993. Barbarians and Romans: The Birth Struggle of Europe, AD 400-700. Norman, OK: University of Oklahoma Press.
Rice, E. A., Hutchinson, J. L., & Lee, M. 1958. A Brief History of Physical Education. New York: The Ronald Press Co.
Welch, P. D. 1996. History of American Physical Education and Sport (2nd ed.). Springfield, IL: Charles C. Thomas.
Wuest, D. A., & Bucher, C. A. 1995. Foundations of Physical Education and Sport. St. Louis, MO: Mosby.
|
0.997765 |
What are the top trends in tea for 2018? Numi Tea has been exploring the flavor landscape and has a few predictions.
Numi also has NEW Teas including: Gratitude, Purpose, Presence, Vision, Embrace, and Balance.
A silky sweetness embodies this soothing blend of tulsi which warms the heart, licorice that invigorates the spirit, and ashwagandha that protects and supports. The addition of maca, turmeric, and chamomile bring a rootsy, apple-like taste and a spicy finish. The medley is complex and satisfying, allowing you to settle into an affirming state of gratitude for all of life’s gifts.
Gratitude: The acknowledgement and appreciation of all our blessings both big and small demonstrates gratitude. We realize we are fortunate when we appreciate what we have. As gratitude grows, it gladdens the heart and gives rise to joy, both for our good fortune and for the good fortune of others.
Gratitude Practice (10 minutes daily) Find a quiet space and time to sit in ease. Relax your body, gently close your eyes, and slow your breathing, paying attention to the rise and fall of your belly as you inhale and exhale. Acknowledge something you are grateful for, like your family. As you bring up the gratitude, feel into the positive blessings. Bring up people in your family sphere and offer blessings of well-being to them. Repeat with other things you are grateful for.
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.