proba
float64
0.5
1
text
stringlengths
16
174k
0.999871
Isn't it an irony that while you are scuba diving you run the risk of dehydration underwater even while you are enveloped by millions of gallons of water? Ironic but true. Scuba diving can get a scuba diver dehydrated if there is an inadequate quantity of water in his body. That can cause major problems as water is crucial for the smooth functioning of a dozen biophysical systems and biochemical processes. At the cell level, chemical reactions in the cell require water. At the tissue level, water keeps the tissues flexible and plump. Water is also needed for blood production and circulation through the cardiovascular system. A scuba diver can lose fluids through sweat or urination. Yes, divers do sweat even underwater. But breathing causes the most loss of water for divers. Have you ever observed what happens when you breathe near a piece of glass? The glass becomes foggy. This shows that when you breathe normally, you are expelling high amounts of moisture into the air. Since the scuba tanks contain air that is drier than surface air, you tend to breathe out more moisture underwater. Moisture tends to flow from wet to dry areas just as heat gets transferred from warmer to cooler bodies. Lowered concentration of fluids in the blood can cause serious consequences. If a diver is dehydrated his muscle tissues will receive reduced blood flow. This affects the ability of his body to absorb and release nitrogen, thereby altering the time required for ascending safely. A diver must ascend at a rate lesser than 30 feet per minute and also make several stops on the way up. If these safety rules are ignored, the diver can suffer from decompression sickness - whose symptoms include cramps, joint pain, and many other serious consequences. Dehydration affects the rate of nitrogen release. This makes ascents take longer and the diver's oxygen may run out. In this situation, a diver faces an unpleasant choice. Compared to decompression sickness, dehydration causes lesser harm. Yet, the consequences like lowered blood flow, which makes the heart pump faster are still unpleasant enough and you must make all efforts to avoid this. If dehydrated, the diver will fatigue more rapidly, spoil his enjoyment and have to surface quicker. It is not difficult to achieve the proper level of hydration before and while scuba diving. Before setting off, just drink lots water or a sports drink which does not contain too much sugar. In warmer weather and for longer dives, you will need to drink more fluids. Drink slowly, so your body gets enough time to absorb the fluids without the kidneys getting overwhelmed. But remember to avoid caffeinated drinks like coffee and colas or any alcoholic beverages for many hours before the dive. Inadequate fluid in the blood vessels of the neck and head cause headaches, so look out for headaches - they are the first indication that you may be facing dehydration. Before the dive, examine your urine to ensure that it's clear and light colored. Once you have surfaced, re-hydrate slowly. So, use common sense and go for safe dive!
0.999717
This outfit has been on repeat this fall. It's so casual and comfy, but I feel a bit dressed up when I wear it. Also, this is how I do my hair often when I can't think of anything else to do with it: throw it up on my head and put in about a million hairpins. What outfit have you been wearing multiple times lately? You're so pretty! My go-to outfit for going out and about is jeans and boots and some sort of a top with a scarf.
0.70703
Not to be confused with Hendrikus Albertus Lorentz or Ludvig Lorenz. See also Lorentz and Lorenz. Hendrik Antoon Lorentz (/ˈlɒrənts/; 18 July 1853 – 4 February 1928) was a Dutch physicist who shared the 1902 Nobel Prize in Physics with Pieter Zeeman for the discovery and theoretical explanation of the Zeeman effect. He also derived the transformation equations underpinning Albert Einstein's theory of special relativity. According to the biography published by the Nobel Foundation, "It may well be said that Lorentz was regarded by all theoretical physicists as the world's leading spirit, who completed what was left unfinished by his predecessors and prepared the ground for the fruitful reception of the new ideas based on the quantum theory." He received many honours and distinctions, including a term as chairman of the International Committee on Intellectual Cooperation, the forerunner of UNESCO, between 1925 and 1928. On 17 November 1877, only 24 years of age, Hendrik Antoon Lorentz was appointed to the newly established chair in theoretical physics at the University of Leiden. The position had initially been offered to Johan van der Waals, but he accepted a position at the Universiteit van Amsterdam.[B 2] On 25 January 1878, Lorentz delivered his inaugural lecture on "De moleculaire theoriën in de natuurkunde" (The molecular theories in physics). In 1881, he became member of the Royal Netherlands Academy of Arts and Sciences. Lorentz theorized that atoms might consist of charged particles and suggested that the oscillations of these charged particles were the source of light. When a colleague and former student of Lorentz's, Pieter Zeeman, discovered the Zeeman effect in 1896, Lorentz supplied its theoretical interpretation. The experimental and theoretical work was honored with the Nobel prize in physics in 1902. Lorentz' name is now associated with the Lorentz-Lorenz formula, the Lorentz force, the Lorentzian distribution, and the Lorentz transformation. In 1892 and 1895, Lorentz worked on describing electromagnetic phenomena (the propagation of light) in reference frames that move relative to the postulated luminiferous aether. He discovered that the transition from one to another reference frame could be simplified by using a new time variable that he called local time and which depended on universal time and the location under consideration. Although Lorentz did not give a detailed interpretation of the physical significance of local time, with it, he could explain the aberration of light and the result of the Fizeau experiment. In 1900 and 1904, Henri Poincaré called local time Lorentz's "most ingenious idea" and illustrated it by showing that clocks in moving frames are synchronized by exchanging light signals that are assumed to travel at the same speed against and with the motion of the frame (see Einstein synchronisation and Relativity of simultaneity). In 1892, with the attempt to explain the Michelson-Morley experiment, Lorentz also proposed that moving bodies contract in the direction of motion (see length contraction; George FitzGerald had already arrived at this conclusion in 1889). In 1899 and again in 1904, Lorentz added time dilation to his transformations and published what Poincaré in 1905 named Lorentz transformations. It was apparently unknown to Lorentz that Joseph Larmor had used identical transformations to describe orbiting electrons in 1897. Larmor's and Lorentz's equations look somewhat dissimilar, but they are algebraically equivalent to those presented by Poincaré and Einstein in 1905.[B 3] Lorentz's 1904 paper includes the covariant formulation of electrodynamics, in which electrodynamic phenomena in different reference frames are described by identical equations with well defined transformation properties. The paper clearly recognizes the significance of this formulation, namely that the outcomes of electrodynamic experiments do not depend on the relative motion of the reference frame. The 1904 paper includes a detailed discussion of the increase of the inertial mass of rapidly moving objects in a useless attempt to make momentum look exactly like Newtonian momentum; it was also an attempt to explain the length contraction as the accumulation of "stuff" onto mass making it slow and contract. Albert Einstein and Hendrik Antoon Lorentz, photographed by Ehrenfest in front of his home in Leiden in 1921. Lorentz (left) at the International Committee on Intellectual Cooperation of the League of Nations, here with Albert Einstein. In 1906, Lorentz's electron theory received a full-fledged treatment in his lectures at Columbia University, published under the title The Theory of Electrons. The increase of mass was the first prediction of Lorentz and Einstein to be tested, but some experiments by Kaufmann appeared to show a slightly different mass increase; this led Lorentz to the famous remark that he was "au bout de mon latin" ("at the end of my [knowledge of] Latin" = at his wit's end) The confirmation of his prediction had to wait until 1908 and later (see Kaufmann–Bucherer–Neumann experiments). It will be clear by what has been said that the impressions received by the two observers A0 and A would be alike in all respects. It would be impossible to decide which of them moves or stands still with respect to the ether, and there would be no reason for preferring the times and lengths measured by the one to those determined by the other, nor for saying that either of them is in possession of the "true" times or the "true" lengths. This is a point which Einstein has laid particular stress on, in a theory in which he starts from what he calls the principle of relativity, [...] I cannot speak here of the many highly interesting applications which Einstein has made of this principle. His results concerning electromagnetic and optical phenomena ... agree in the main with those which we have obtained in the preceding pages, the chief difference being that Einstein simply postulates what we have deduced, with some difficulty and not altogether satisfactorily, from the fundamental equations of the electromagnetic field. By doing so, he may certainly take credit for making us see in the negative result of experiments like those of Michelson, Rayleigh and Brace, not a fortuitous compensation of opposing effects, but the manifestation of a general and fundamental principle. [...] It would be unjust not to add that, besides the fascinating boldness of its starting point, Einstein's theory has another marked advantage over mine. Whereas I have not been able to obtain for the equations referred to moving axes exactly the same form as for those which apply to a stationary system, Einstein has accomplished this by means of a system of new variables slightly different from those which I have introduced. 1909: Yet, I think, something may also be claimed in favour of the form in which I have presented the theory. I cannot but regard the ether, which can be the seat of an electromagnetic field with its energy and its vibrations, as endowed with a certain degree of substantiality, however different it may be from all ordinary matter. 1910: Provided that there is an aether, then under all systems x, y, z, t, one is preferred by the fact, that the coordinate axes as well as the clocks are resting in the aether. If one connects with this the idea (which I would abandon only reluctantly) that space and time are completely different things, and that there is a "true time" (simultaneity thus would be independent of the location, in agreement with the circumstance that we can have the idea of infinitely great velocities), then it can be easily seen that this true time should be indicated by clocks at rest in the aether. However, if the relativity principle had general validity in nature, one wouldn't be in the position to determine, whether the reference system just used is the preferred one. Then one comes to the same results, as if one (following Einstein and Minkowski) deny the existence of the aether and of true time, and to see all reference systems as equally valid. Which of these two ways of thinking one is following, can surely be left to the individual. Lorentz also gave credit to Poincaré's contributions to relativity. Indeed, for some of the physical quantities which enter the formulas, I did not indicate the transformation which suits best. That was done by Poincaré and then by Mr. Einstein and Minkowski [...] I did not succeed in obtaining the exact invariance of the equations [...] Poincaré, on the contrary, obtained a perfect invariance of the equations of electrodynamics, and he formulated the "postulate of relativity", terms which he was the first to employ. [...] Let us add that by correcting the imperfections of my work he never reproached me for them. The total eclipse of the sun of May 29, resulted in a striking confirmation of the new theory of the universal attractive power of gravitation developed by Albert Einstein, and thus reinforced the conviction that the defining of this theory is one of the most important steps ever taken in the domain of natural science. Lorentz gave a series of lectures in the Fall of 1926 at Cornell University on the new quantum mechanics; in these he presented Erwin Schrödinger's wave mechanics. The most satisfactory theory is that of Lorentz; it is unquestionably the theory that best explains the known facts, the one that throws into relief the greatest number of known relations ... it is due to Lorentz that the results of Fizeau on the optics of moving bodies, the laws of normal and abnormal dispersion and of absorption are connected with each other ... Look at the ease with which the new Zeeman phenomenon found its place, and even aided the classification of Faraday's magnetic rotation, which had defied all Maxwell's efforts. ... at every moment [the twenty physicists from different countries] could be heard talking of the [quantum mechanics] which they contrasted with the old mechanics. Now what was the old mechanics? Was it that of Newton, the one which still reigned uncontested at the close of the nineteenth century? No, it was the mechanics of Lorentz, the one dealing with the principle of relativity; the one which, hardly five years ago, seemed to be the height of boldness. Lorentz was also asked by the Dutch government to chair a committee to calculate some of the effects of the proposed Afsluitdijk (Enclosure Dam) flood control dam on water levels in the Waddenzee. Hydraulic engineering was mainly an empirical science at that time, but the disturbance of the tidal flow caused by the Afsluitdijk was so unprecedented that the empirical rules could not be trusted. Originally Lorentz was only supposed to have a coordinating role in the committee, but it quickly became apparent that Lorentz was the only physicist to have any fundamental traction on the problem. In the period 1918 till 1926, Lorentz invested a large portion of his time in the problem. Lorentz proposed to start from the basic hydrodynamic equations of motion and solve the problem numerically. This was feasible for a "human computer", because of the quasi-one-dimensional nature of the water flow in the Waddenzee. The Afsluitdijk was completed in 1932, and the predictions of Lorentz and his committee turned out to be remarkably accurate.[B 11][B 2] One of the two sets of locks in the Afsluitdijk was named after him. In 1881, Lorentz married Aletta Catharina Kaiser. Her father was J.W. Kaiser, a professor at the Academy of Fine Arts. He was the Director of the museum which later became the well-known Rijksmuseum (National Gallery). He also was the designer of the first postage stamps of The Netherlands. There were two daughters, and one son from this marriage. Dr. Geertruida Luberta Lorentz, the eldest daughter, was a physicist. She married Professor W.J. de Haas, who was the Director of the Cryogenic Laboratory at the University of Leiden. The funeral took place at Haarlem at noon on Friday, February 10. At the stroke of twelve the State telegraph and telephone services of Holland were suspended for three minutes as a revered tribute to the greatest man the Netherlands has produced in our time. It was attended by many colleagues and distinguished physicists from foreign countries. The President, Sir Ernest Rutherford, represented the Royal Society and made an appreciative oration by the graveside. Unique 1928 film footage of the funeral procession with a lead carriage followed by ten mourners, followed by a carriage with the coffin, followed in turn by at least four more carriages, passing by a crowd at the Grote Markt, Haarlem from the Zijlstraat to the Smedestraat, and then back again through the Grote Houtstraat towards the Barteljorisstraat, on the way to the "Algemene Begraafplaats" at the Kleverlaan (northern Haarlem cemetery) has been digitized on YouTube.[B 13] Einstein gave a eulogy at a memorial service at Leiden University. In addition to the Nobel prize, Lorentz received a great many honours for his outstanding work. He was elected a Foreign Member of the Royal Society (ForMemRS) in 1905. The Society awarded him their Rumford Medal in 1908 and their Copley Medal in 1918. ^ Hendrik Lorentz (1875). "Over de theorie der terugkaatsing en breking van het licht" (PDF). ^ "Hendrik Antoon Lorentz (1853 - 1928)". Royal Netherlands Academy of Arts and Sciences. Retrieved 17 July 2015. ^ Poincaré, Henri (1900), "La théorie de Lorentz et le principe de réaction" , Archives Néerlandaises des Sciences Exactes et Naturelles, 5: 252–278 . See also the English translation. ^ Einstein, Albert (1905), "Zur Elektrodynamik bewegter Körper" (PDF), Annalen der Physik, 322 (10): 891–921, Bibcode:1905AnP...322..891E, doi:10.1002/andp.19053221004 . See also: English translation. ^ a b Lorentz, Hendrik Antoon (1910) . "Das Relativitätsprinzip und seine Anwendung auf einige besondere physikalische Erscheinungen" . In Blumenthal, Otto; Sommerfeld, Arnold (eds.). Das Relativitätsprinzip. Eine Sammlung von Abhandlungen. pp. 74–89. ^ Lorentz, Hendrik Antoon (1914). Das Relativitätsprinzip. Drei Vorlesungen gehalten in Teylers Stiftung zu Haarlem (1913) . Leipzig and Berlin: B.G. Teubner. ^ Lorentz, H. A. (1926). The New Quantum Theory (PDF). Ithaca, New York: Typescript of Lecture Notes. Retrieved August 12, 2016. ^ Poincaré, Henri (1902), Science and Hypothesis, London and Newcastle-on-Cyne (1905): The Walter Scott publishing Co. Many papers by Lorentz (mostly in English) are available for online viewing in the Proceedings of the Royal Netherlands Academy of Arts and Science, Amsterdam. ^ Russell McCormmach. "Lorentz, Hendrik Antoon". Complete Dictionary of Scientific Biography. Retrieved 25 April 2012. Although he grew up in Protestant circles, he was a freethinker in religious matters; he regularly attended the local French church to improve his French. ^ a b c d e f g h i j Kox, Anne J. (2011). "Hendrik Antoon Lorentz (in Dutch)". Nederlands Tijdschirft Voor Natuurkunde. 77 (12): 441. ^ Miller, Arthur I. (1981). Albert Einstein's special theory of relativity. Emergence (1905) and early interpretation (1905–1911). Reading: Addison–Wesley. ISBN 978-0-201-04679-3. ^ Kox, A.J. (1993). "Einstein, Lorentz, Leiden and general relativity". Class. Quantum Grav. 10: S187–S191. Bibcode:1993CQGra..10S.187K. doi:10.1088/0264-9381/10/S/020. ^ Janssen, M. (1992). "H. A. Lorentz's Attempt to Give a Coordinate-free Formulation of the General. Theory of Relativity.". Studies in the History of General Relativity. Boston: Birkhäuser. pp. 344–363. ISBN 978-0817634797. ^ Justin Wintle (8 February 2002). Makers of Nineteenth Century Culture: 1800–1914. Routledge. pp. 375–. ISBN 978-0-415-26584-3. Retrieved 25 July 2012. ^ Langevin, P. (1911), "The evolution of space and time", Scientia, X: 31–54 (translated by J. B. Sykes, 1973). ^ (Arch. ex. hist. Sci, 1984). ^ "Carlo Beenakker". Ilorentz.org. Retrieved 2012-02-01. ^ a b Richardson, O. W. (1929), "Hendrik Antoon Lorentz", J. London Math. Soc., 4 (1): 183–192, doi:10.1112/jlms/s1-4.3.183 . The biography which refers to this article (but gives no pagination details other than those of the article itself) is O'Connor, John J.; Robertson, Edmund F., "Hendrik Lorentz", MacTutor History of Mathematics archive, University of St Andrews . Langevin, Paul (1911), "L'évolution de l'espace et du temps", Scientia, X: 31–54 :n.p. Poincaré, Henri (1900), "La théorie de Lorentz et le principe de réaction", Archives Néerlandaises des Sciences Exactes et Naturelles, V: 253–278 See English translation. Wikimedia Commons has media related to Hendrik Antoon Lorentz. Scanned Ph.D. theses of the students of Lorentz. This page was last edited on 14 April 2019, at 14:04 (UTC).
0.942687
Pan-Turkism is the name given to the idea of uniting all Turkic-speaking peoples of the Caucasus, the Volga-Ural region, the Crimea, Western and Central Asia under the aegis of a greater Turkish state. According to Pan-Turkist advocates, Turkic peoples have certain characteristics in common, such as related languages, a supposedly common descent and common history, and cultural traditions. Pan-Turkism was inspired by linguistic, ethnolinguistic and racial research in European Oriental Studies in the 19th century. The "scientific" foundations of Pan-Turkism, which are rejected today, go back to contemporaneous "Turan research". The terms Pan-Turkism and Turanism were often used synonymously in the beginning, although the geographical reach of the latter was greater. Pan-Turkism appeared among the Turkic peoples in the Russian Empire, especially in the Volga-Ural region, in conjunction with a "national awakening". Around 1900, Pan-Turkism also developed in the Ottoman Empire into a political independence movement. Other researchers in the context of Western European Oriental Studies, which began to institutionalize in the second half of the 19th century, also provided inspiration for the idea of Pan-Turkism. While the French Orientalist Joseph de Guignes (1721‒1800) already in 1756 put the "barbaric" peoples of the Huns, Turks, and Mongols into the European historical picture,10 his compatriot and colleague Léon Cahun (1841‒1900) about a century later became the most important source of inspiration for Pan-Turkism, alongside Vámbéry. Cahun's romantically written work Introduction à l'Histoire de l'Asie; Turcs et Mongols des origines à 1405 , which appeared in 1896, had a major influence on the French-speaking educated Ottoman class.11 The book could be found in all bookshops in Constantinople and was translated into Turkish in 1899 by Necip Asım Yazıksız (1861‒1935).12 Cahun's study inspired, among others, Ziya Gökalp (1876‒1924) – the most famous Pan-Turkist and thought leader of Turkish nationalism – to do his own research on the history of the "Turks" in pre-Islamic times.13 Léon Cahun described the Turks as a "conquering nation", which boasted warriors who were superior to those belonging to the Arabs and Persians. He declared not only the Mongolian warlord Genghis Khan (1162‒1227), but also the first inhabitants of Europe to be Turks. Prominent Orientalists such as the Russian schoolteacher Wilhelm Radloff (1837‒1918)14 and Vasilij Vladimirovič Bartol'd (1869‒1930)15 also provided important work on the history and linguistic diversity of Central Asia and inspired future Turkologists and anthropologists. At the same time, natural-scientific influences were starting to be felt in contemporary linguistics and ethnolinguistics, for example in the case of the German philologist and Indo-Europeanist August Schleicher (1821‒1868). Following Charles Darwin's (1809‒1888) dictum of the survival of the fittest, he predicted the downfall of the inferior language groups in favor of the superior Indo-European languages.16 Subsequently, leading Turkologists and Orientalists attempted to prove that the Turkic languages are also capable of surviving and, moreover, that they are spoken by language carriers who have made an important contribution to Western civilization. The preoccupation with the origins of the "Turks" in the Ottoman Empire went hand in hand with the period's modernization efforts: Among the educated classes of the Ottoman Empire, interest grew in secular European culture, Western intellectual trends, technology and science. As a reaction to European philhellenism, the Ottoman hommes de lettres also increasingly devoted themselves to the history of Western philosophy, Greek antiquity, and Western literature and poetry. These studies were primarily concerned with emphasizing an equivalent standing with Europe and demonstrating that the Ottomans and Turks were also among history's "oldest" state-founding peoples. In a time of emerging independence efforts of the Christian peoples, Ottomanism was declared, as a kind of imperial patriotism, state policy in order to protect the multi-ethnic empire from drifting apart. The imperial decrees of 1839 and 1856 and the Ottoman Constitution adopted in 1876 were intended to create a modern territorial state, which would give its citizens, regardless of origin, equality before the law and guarantee the free exercise of religion. The reforms were primarily intended to strengthen state authority, neutralize the secessionist forces in the Empire, and thus counteract the expansionist efforts of European powers. This was especially true of Russia, which presented itself as the protector of the Orthodox population in the Ottoman Empire. Under these circumstances, the Ottoman leadership did not find it expedient to promote nationalism based solely on Turkish ethnicity. After it proved impossible to neutralize the Christian national movements, however, the state-sponsored policy of pan-Islamism alternately came into play. In order to help bind the Muslim imperial populations (Albanians, Arabs, Kurds) – which were also experiencing a "national awakening" – to the multi-ethnic empire, stronger appeals were made to the common bond of religion and the Islamic idea of unity (ittihad-i Islam). The expulsion of Muslim Caucasian peoples, who flowed into the Ottoman Empire on a massive scale after the conquest and pacification of the High Caucasus by the Tsarist Empire, also provided new legitimacy26 for the politics of pan-Islamism under Sultan Abdülhamid II (1842‒1918)[ ]. Broadly speaking, it can be said that until around 1900 the ideological foundations for a Pan-Turkist movement had been laid, but that its far-reaching political and social impact did not unfold in the Ottoman Empire until after the turn of the century. Tatar-Turkish emigrants from the Tsarist Empire played a decisive role in this process. For good reasons, the Russian Muslims had already developed a national consciousness before their fellow believers in the Ottoman Empire. In turn, this formed the spiritual basis for the development of political Pan-Turkism. While the raison d'être of the Ottoman state elite consisted in ensuring the cohesion of the multi-ethnic and multi-denominational multi-ethnic empire with supranational integration concepts, the Russian Muslims, on the other hand, belonged to one of the numerous foreign ethnic population groups which in the second half of the 19th century produced different varieties of a national-religious relocation movement. The development of the national idea among the Tartars in the Tsar Empire correlated with the economic and socio-cultural development stage of the respective Muslim settlement areas within the Tsarist Empire. In particular, it was the economically more developed regions around Kazan in Crimea and in Azerbaijan in which a specific "Tatar" or "Turkish" national consciousness emerged in the 19th century. The torch bearers of the national movement were the economic (i.e. merchants and entrepreneurs) and spiritual elites, because they were directly affected by the Russian assimilation policy. For the economic elites, the Russifying homogenization pressure entailed substantial financial losses and discrimination. The development and expansion of the trade and industrial enterprises of the Tatars were constrained or even prevented by high tax burdens and the restrictive measures of the Russian government. The renewal movement of Islam known as Jadidism, which combined the reformation of the Islamic religion with enlightened secular demands, is regarded as the precursor of a "modern" national consciousness.37 Not least due to the influence of the Crimean Tatar Ismail Gaspirali (1851‒1914)[ ], Jadidism stood for a reinforcing of the Muslim sense of togetherness through reformed Islam and the formation of a nation variously understood as Muslim, Turkish, or Pan-Turkist.38 The "imagined" nation was predominantly understood as the ancestral community of Turkic peoples, held together by the bond of ethnic and linguistic origin. Like other nationalisms, Jadidism also referred to a nation that had already existed historically, had been destroyed in the course of Russian colonization, and needed to be revived. For this purpose, a common writing and language culture had to be created first, just as the modern European cultural role models had already done by standardizing their respective languages.39 In the newspaper Tercüman ("Translator", 1883-1918), published by Gaspirali, the linguistic aspect of national identity was a primary focus. From this standpoint, the cultural self-determination of the Turkic peoples was only possible within the framework of linguistic standardization, which would then entail the "unity in language, thought and action" ("dilde, fikirde ve işte birlik") of the Turkic peoples.40 Gaspirali envisioned an all-Turkish language, which would be spoken from the "Crimea to Herat, from Constantinople to Kashgar" by all "Turks", by the educated as much as by the common people.41 The newly created Turkic language needed to be purified both of the ornamental components of Ottoman-Turkish and of Russian language elements and thus contribute to a better understanding of the Muslims of Russia and the Ottoman Empire.42 Until the Russian revolutionary year of 1905, the newspaper Tercüman became the most important organ of the Tatar nationalists as well as of the Jadidist language reform. It also met with great approval among the elites in the Ottoman Empire. The Volga and Crimean Tatars became pioneers of the national current not least because of the impulses emanating from Jadidism.44 In the last decades of the 19th century, political circles formed here with Pan-Turkist, Tatar national, Pan-Islamic, socialistic and liberal tendencies. Similar developments were also witnessed among the Azeris, who were linguistically more closely related to the Turks of the Ottoman Empire. Here, too, Pan-Islamic and Pan-Turkist movements found supporters who were in competition with the liberals and socialists. Pan-Islamic and Pan-Turkist ideas, on the other hand, were not mutually exclusive, but sometimes reinforced each other. As a Turk, one was generally also Muslim at the same time. Under Pan-Turkist influences, however, the point of view increasingly narrowed until Islamic history, geography, language and, finally, Islam itself came to have a "Turkish" connotation.45 The protagonists of the Turkish and Pan-Turkist currents, which were generally synonymous during this period, found their inspiration in the early works of European and Russian Oriental Studies and Turkology outlined above. They contributed considerably to giving the bourgeoning movement a scientific aura and to situating the national ideology historically. The Turkological picture of the racial and ethnic origin of the Turks, the stylization of their language and customs, and the myth of the common Turkic descent of all Turkic peoples provided powerful arguments for the Pan-Turkist activists. Political liberalization after the Russian Revolution of 1905 came to an abrupt end with the coup d'état of 1907. Both Pan-Turkist and national movements, with or without political demands for unification with the Ottoman Empire, were now subject to persecution and repression. Like Yusuf Akçura, politicians and intellectuals such as Ahmet Ağaoğlu (1869‒1939),54 Sadri Maksudi Arsal (1880‒1957), Resulzade Mehmet Emin (1884‒1954) and Ahmed Zeki Velidi Togan (1890‒1970), to name just a few of the prominent names, emigrated to the Ottoman Empire. Under the auspices of Pan-Turkism, they helped nationalism, understood as a guarantor of progress, to become more popular there.55 The focus of Pan-Turkism thus shifted from the Tsarist Empire to the Ottoman Empire. Akçura, Yusuf: Üç tarz-ı siyaset, Cairo 1904. Cahun, Léon: Introduction à l'Histoire de l'Asie: Turcs et Mongols des origines à 1405, Paris 1896, online: http://archive.org/details/introductionlh00cahuuoft [17/01/2019]. Celâleddin, Mustafa: Les Turcs anciens et modernes, Constantinople 1869. Guignes, Joseph de: Histoire générale des Huns, des Turcs, des Mogols, et des autres Tartares Occidentaux, Paris 1756–1758, vol. 1–5. Herbelot, Barthélemy d': Bibliothèque orientale ou dictionnaire universel contenant généralement tout ce qui regarde la connaissance des peuples de l'Orient, Paris 1697, online: http://gallica.bnf.fr/ark:/12148/bpt6k82422h [17/01/2019]. Vámbéry, Armin: Reise in Mittelasien, Leipzig 1873, online: http://archive.org/stream/reiseinmittelas00vmgoog [17/01/2019]. Vámbéry, Armin: The Story of my Struggles, London 1904, vol. 1–2, online: http://archive.org/details/storyofmystruggl01vmuoft and http://archive.org/details/storyofmystruggl02vmuoft [17/01/2019]. Vámbéry, Armin: Das Türkenvolk in seinen ethnologischen und ethnographischen Beziehungen, Leipzig 1885, online: http://archive.org/stream/dastrkenvolkins00vmgoog [17/01/2019]. Vámbéry, Armin: Der Ursprung der Magyaren, Leipzig 1882, online: http://archive.org/stream/derursprungderm00vmgoog [17/01/2019]. Paşa, Süleyman: Tarih-i Alem, Constantinople 1876. Sami, Şemseddin: Kamus-i Türki, Constantinople 1899. Schleicher, August: Die darwinische Theorie und die Sprachwissenschaft, Weimar 1873. Adam, Volker: Auf der Suche nach Turan: Panislamismus und Panturkismus in der aserbaidschanischen Vorkriegspresse, in: Raoul Motika et al. (eds.): Caucasia between the Ottoman Empire and Iran: 1555–1914, Wiesbaden 2000, pp. 189–205. Adam, Volker: Russlandmuslime in Istanbul am Vorabend des Ersten Weltkriegs, Frankfurt am Main 2002. Alder, Lory / Dalby, Richard: The Dervish of Windsor Castle: The Life of Arminius Vámbéry, London 1979. Allen, William E.D. / Muratoff, Paul: Caucasian Battlefields: A History of the Wars on the Turco-Caucasian Border 1828–1921, Cambridge 1953. Art. "Vasily Vladimirovich Bartold", in: Encyclopædia Britannica, online: http://www.britannica.com/EBchecked/topic/54410/Vasily-Vladimirovich-Bartold [17/01/2019]. Aytürk, İlker: Turkish Linguists against the West: The Origins of Linguistic Nationalism in Ataturk's Turkey, in: Middle Eastern Studies 40, 6 (2004), pp. 1–25. Azrael, Jeremy R. (ed.): Soviet Nationality Policies and Practices, New York, NY et al. 1978. Barkey, Karin et al. (eds.): After Empire: Multiethnic Societies and Nation-Building: The Soviet Union and the Russian, Ottoman, and Habsburg Empires, Boulder, CO 1997. Bartholomä, Ruth: Von Zentralasien nach Windsor Castle: Leben und Werk des Orientalisten Arminius Vámbéry (1832–1913), Würzburg 2006. Bauer, Henning et al. (eds.): Die Nationalitäten des Russischen Reiches in der Volkszählung von 1897, Stuttgart 1991. Behar, Büşra Ersanlı: İktidar ve Tarih: Türkiye'de "Resmi Tarih" Tezinin Oluşumu (1929-1937), 2nd ed., Istanbul 1996. Benecke, Werner: Militär, Reform und Gesellschaft im Zarenreich: Die Wehrpflicht in Russland 1874–1914, Paderborn 2006. Berkes, Niyazi: The Development of Secularism in Turkey, Montréal 1964. Broxup, Marie Bennigsen (ed.): The North Caucasus Barrier: The Russian Advance towards the Muslim World, London 1992. Bucher-Dinç, Gabriele: Die Mittlere Wolga im Widerstreit sowjetischer und nationaler Ideologien (1917–1920): Eine Untersuchung anhand autobiographischer und publizistischer Schriften des Wolgatataren Mirsaid Sultan-Galiev, Wiesbaden 1997. Çolak, Yılmaz: Language Policy and Official Ideology in Early Republican Turkey, in: Middle Eastern Studies, 40,6 (2004), pp. 67–91. Deringil, Selim: The Ottoman Origins of Kemalist Nationalism: Namık Kemal to Mustafa Kemal, in: European History Quarterly 23 (1993), pp.165–191. Dumont, Paul: L'axe Moscou-Ankara: Les relations turco-soviétiques de 1919 à 1922, in: Cahiers du Monde russe et soviétique 18,3 (1977), pp. 165–193. Dumont, Paul: La fascination du bolchevisme: Enver pacha et le parti des soviets populaires 1919-1922, in: Cahiers du Monde russe et soviétique 14,2 (1975), pp. 141–166, online: http://www.persee.fr/web/revues/home/prescript/article/cmr_0008-0160_1975_num_16_2_1234 [17/01/2019]. Dumont, Paul: La Revue Türk Yurdu et les Musulmans de l'Empire Russe 1911–1914, in: Cahiers du Monde russe et soviétique 15 (1974), pp. 315–331. Eisener, Reinhard: Auf den Spuren des tadschikischen Nationalismus: Aus Texten und Dokumenten zur Tadschikischen SSR, Berlin 1991. Fenz, Hendrik: Vom Völkerfrühling bis zur Oktoberrevolution 1917: Die Rolle der aserbaidschanischen Elite bei der Schaffung einer nationalen Identität, Münster 2000. Fragner, Bert et al. (eds.): Zentralasien: 13. bis 20. Jahrhundert: Geschichte und Gesellschaft, Vienna 2007. Fragner, Bert: Probleme der Nationswerdung der Usbeken und Tadschiken, in: Andreas Kappeler (ed.): Die Muslime in der Sowjetunion und in Jugoslawien: Identität, Politik, Widerstand, Cologne 1989, pp. 19–34. Georgeon, François: Aux origines du nationalisme turc: Yusuf Akçura (1876–1935), Paris 1980. Hanioğlu, Şükrü: Ataturk: An Intellectual Biography, Princeton, NJ 2011. Heyd, Uriel: Foundations of Turkish Nationalism: The Life and Teachings of Ziya Gökalp, London 1950. Heyd, Uriel: Language Reform in Modern Turkey, Jerusalem 1954. Holquist, Peter: To Count, to Extract, and to Exterminate: Population Statistics and Population Politics in Late Imperial and Soviet Russia, in: Ronald Grigor Suny et al. (eds.): A State of Nations, Empire and Nation Making in the Age of Lenin and Stalin, Oxford 2001, pp. 111–144. Hosking, Geoffrey: Russland: Nation oder Imperium? 1552–1917, Berlin 2000. Hostler, Charles W.: Türken und Sowjets, Frankfurt am Main et al. 1960. Jäschke, Gotthard: Der Turanismus der Jungtürken: Zur osmanischen Außenpolitik im Weltkriege, in: Die Welt des Islams 23 (1941), pp. 1–54. Johanson, Lars et al. (eds.): The Turkish Languages, London 1998. Karpat, Kemal H.: Ottoman Population: 1830–1914: Demographic and Social Characteristics, Madison, WI 1985. Karpat, Kemal H.: The Politicization of Islam: Reconstructing Identity, State, Faith, and Community in the Late Ottoman State, New York, NY 2001. Kessler, Joseph A.: Turanism and Pan-Turanism in Hungary, 1890–1945, PhD Diss. Berkeley, CA 1967. Key, Kerim K.: An Outline of Modern Turkish Historiography, Istanbul 1954. Kırımlı, Hakan: National Movements and National Identity among the Crimean Tatars (1905–1916), Leiden et al. 1996. Kramer, Martin: Islam Assembled: The Advent of the Muslim Congresses, New York, NY 1986. Krecker, Lothar: Deutschland und die Türkei im Zweiten Weltkrieg, Breslau 1964. Kuran, Ercüment: The Impact of Nationalism on the Turkish Elite in the Nineteenth Century, in: William R. Polk et al. (eds.): Beginnings of Modernization in the Middle East: The Nineteenth Century, Chicago, IL 1968, pp. 109–119. Kushner, David: The Rise of Turkish Nationalism, 1876–1908, London 1977. Landau, Jacob M.: Exploring Ottoman and Turkish History, London 2004. Landau, Jacob M.: Pan-Turkism in Turkey: A Study of Irredentism, London 1981. Landau, Jacob M.: Pan-Turkism: From Irredentism to Cooperation, 2nd ed., London 1995. Landau, Jacob M.: Pan Islam and Pan Turkism during the Final Years of the Ottoman Empire: Some Considerations, in: Union européenne des arabisants et islamisants, 10th Congress: Edinburgh, 9–16 September 1980: Proceedings, Edinburgh 1982, pp. 43ff. Lazzerini, Edward J.: Reform und Modernismus (Djadidismus) unter den Muslimen des Russischen Reiches, in: Andreas Kappeler et al. (eds.): Die Muslime in der Sowjetunion und Jugoslawien, Cologne 1989, pp. 35–47. Lazzerini, Edward J.: Ismail Bey Gaspirali and Muslim Modernism in Russia, 1878–1914, PhD Diss., Seattle, WA 1973. Lewis, Bernard: History Writing and National Revival in Turkey, in: Middle Eastern Affairs 4 (1953), pp. 218–227. Lewis, Geoffrey: Turkish Language Reform: A Catastrophic Success, Oxford 1999. Mardin, Şerif: The Genesis of Young Ottoman Thought: A Study in the Modernization of Turkish Political Ideas, Princeton, NJ 1963. Neumann, Christoph: Bad Times and Better Self: Definitions of Identity and Strategies for Development in Late Ottoman Historiography, 1850–1900, in: Fikret Adanır et al. (eds.): The Ottomans and the Balkans: A Discussion of Historiography, Leiden et al. 2002, pp. 57–78. Noack, Christian: Muslimischer Nationalismus im Russischen Reich, Stuttgart 2000. Olcott, Martha B.: The Basmachi or Freemen's Revolt in Turkestan 1918–1924, in: Soviet Studies 33,3 (1981), pp. 352–369. Önder, Zehra: Die türkische Außenpolitik im Zweiten Weltkrieg, München 1977. Önen, Nizam: İki Turan: Macaristan ve Türkiye'de Turancılık, Istanbul 2005. Özdoğan, Günay G.: "Turan" dan "Bozkurt"a: Tek Parti Döneminde Türkçülük (1931–1946), Istanbul 2001. Renner, Andreas: Russischer Nationalismus und Öffentlichkeit im Zarenreich 1855–1875, Cologne et al. 2000. Reynolds, Michael A.: Shattering Empires: The Clash and Collapse of the Ottoman and Russian Empires, 1908–1918, New York, NY 2011. Sanders, Thomas et al. (eds.): Russian-Muslim Confrontation in the Caucasus: Alternative Visions of the Conflict between Imam Shamil and the Russians: 1830–1859, London 2004. Shissler, A. Holly: Between Two Empires: Ahmet Ağaoğlu and the New Turkey, London 2003. Springer, Louis A.: The Romantic Career of Enver Pasha, in: Asia 17,6 (1917), pp. 457–461. Swietochowski, Tadeusz: Russian Azerbaijan: 1905–1920: The Shaping of National Identity in a Muslim Community, Cambridge 1985. Temir, Ahmet: Leben und Schaffen von Friedrich Wilhelm Radloff (1837–1918): Ein Beitrag zur Geschichte der Turkologie, in: Oriens 8,1 (1955), pp. 51–93. Thaden, Edward C.: Russia's Western Borderlands: 1710–1870: With the Collaboration of Marianna Forster Thaden, Princeton, NJ 1984. Timur, Taner: Osmanlı Kimliği, 2nd ed., Istanbul 1994. Usmanova, Dilara M.: The Activity of the Muslim Faction of the State Duma and its Significance in the Formation of a Political Culture among the Peoples of Russia (1906–1917), in: Anke von Kügelgen et al. (eds.): Muslim Culture in Russia and Central Asia from the 18th to the Early 20th Centuries, Berlin 1998, pp. 417–455. Üstel, Füsun: Imparatorluktan Ulus-Devlete Türk Milliyetçiliği: Türk Ocakları, 1912‒1931, Istanbul 1997. Wiederkehr, Stefan: Die eurasische Bewegung: Wissenschaft und Politik in der russischen Emigration der Zwischenkriegszeit und im postsowjetischen Russland, Cologne et al. 2007. Yamauchi, Masayuki: The Green Crescent under the Red Star: Enver Pasha in Soviet Russia: 1919–1922, Tokyo 1991. Zgusta, Ladislav: Lexigraphy Then and Now: Selected Essays, Tübingen 2006, pp. 279–287. ^ Herbelot, Bibliothèque orientale 1697. ^ Aytürk, Turkish Linguists 2004, pp. 5ff.; see also Mangold, Deutsche Orientalistik 2004. ^ Bartholomä, Von Zentralasien nach Windsor Castle 2006; Alder / Dalby, Dervish 1979. ^ Vámbéry, Reise in Mittelasien 1873; see also Vámbéry, Magyaren 1882. ^ Landau, Exploring Ottoman 2004, p. 172. ^ Vámbéry, Türkenvolk 1885, p. 612. According to Vámbéry, the term "Türcke" already had a derogatory meaning in the 16th century in the sense of "coarse, unpolished" (Vámbéry, Türkenvolk 1885, p. 612). On his later journeys through the Ottoman Empire, Vámbéry discovered that the Turks were no longer ashamed of their origins. See also Vámbéry, Struggles 1904, p. 353. ^ Vámbéry, Turks 1885, p. 594. ^ Hostler, Turks 1960, pp. 243ff; Landau, Pan Islam 1982, pp. 43ff. ^ Wiederkehr, Eurasische Bewegung 2007, p. 88. Since the second half of the 19th century, Hungary and the Ottomans have come closer together in the cultural sphere. Around the turn of the century, various associations and organizations with a "Turanistic" orientation were established in Hungary, including the "Turáni Társaság", which carried out lively cultural work with state support. The magazine Turán appeared in 1913. See Önen, İki Turan 2005, pp. 57–65. On the Hungarian Turan movement, see Kessler, Turanism in Hungary 1967. Both Austria-Hungary and the Ottoman Empire felt threatened by Pan-Slavism and Russian expansion in the Balkans, which is why they allied themselves against the Russian menace. Hungarian Oriental Studies and especially the Turanists helped to found an anti-Slavic front consisting of Bulgarians, Hungarians, and Ottomans. Ironically, the Turanist avowals decreased when Austria-Hungary and the Ottoman Empire entered the First World War. According to Hostler, since then "only the Turks alone" have stuck to this "pseudo-movement" (Hostler, Türken 1960, pp. 241f.). Despite the different meanings of the terms Pan-Turkism and Turanism, these terms continued to be confused in political literature and European diplomacy, but also by their advocates in the Ottoman Empire itself (Hostler, Türken 1960, p. 243). In Turkey, for example, a court case against Pan-Turkists was initiated in 1944, which was publicly known as "Irkçılık-Turancılık Davası" ("Racism-Turanism Trial"). The defendants partly described themselves as Turanists, although they actually meant Pan-Turkism (in Turkish: "Türkçülük"). See Özdoğan, Turan 2001, pp. 89–125. ^ Guignes, Histoire générale 1756–1758, vol. 1–5. ^ Timur, Osmanlı 1994, pp. 140f.; cf. Cahun, Introduction 1896. ^ Cahun, Introduction 1896, pp. 134f., 140. ^ Heyd, Ziya Gökalp 1950, p. 28, 105. ^ Kushner, Turkish Nationalism 1977, p. 10. On Radloff's work, see Temir, Wilhelm Radloff 1955; and Zgusta, Lexigraphy 1955, pp. 279–287. ^ Cf. Art. "Vasily Vladimirovich Bartold". ^ Aytürk, Turkish Linguists 2004, p. 4. See also Schleicher, Darwinian Theory 1873. ^ Celâleddin, Les Turcs 1869. ^ Cf. Aytürk, Turkish Linguists 2004, pp. 8ff. According to Şükrü Hanioğlu, Mustafa Kemal (Atatürk), the founder of the Turkish state (1923), was an avid reader of Mustafa Celâleddin Paşas; he was especially inspired by Celâleddin Paşa's call for language reform. Cf. Hanioğlu, Ataturk 2011, p. 172. ^ Cf. Kushner, Turkish Nationalism 1977, p. 121. ^ Deringil, Ottoman Origins 1993, p. 167; and Taner, Osmanlı 1994, pp. 138–143. ^ Paşa, Tarih i Alem 1876. ^ On the influence of Western European historiography on the Ottoman intelligentsia, see Lewis, History Writing 1953, pp. 218–227; Key, Outline 1954; see also Neumann, Bad Times 2002, pp. 57–78. ^ Sami, Kamus-i Türki 1899. ^ For further works on Turkish linguistics created during the Tanzimat period and their authors, see Aytürk, Turkish Linguists 2004. ^ Jäschke, Turanism 1941, p. 3. For the intellectual and political ideas of the Young Ottomans, see Mardin, Genesis of Young Ottoman 1963; Kuran, Impact of Nationalism 1968, pp. 109–119. ^ As a result of the Russian Caucasus campaign, about 80 percent of the Muslim population of about 500.000 had to leave the Western Caucasus. Cf. Holquist, Count 2001, pp. 113–119. According to Carpathian estimates, between 1859 and 1879 1.5 million people, mostly from Circassians, were expelled from their homelands. Between 1881 and 1914, another 500.000 people fled to the Ottoman Empire. Cf. Carpathian, Ottoman Population 1985, p. 69. See also Allen / Muratoff, Caucasian Battlefields 1953; Broxup, North Caucasus 1992; Sanders / Tucker / Hamburg, Russian-Muslim 2004. ^ Kappeler, Russia 1992, p. 195. ^ See Johanson / Csató, Turkish Languages 1998. ^ According to the 1897 census, the total population of the Russian Empire was 125.6 million; the Muslim population was estimated at 13.6 million. Landau, Pan-Turkism 1995, p. 7. Among the Muslim Turkic-speaking population of the Russian Empire, Landau counts among others the Volga Tatars, Crimean Tatars, Kazakhs, Turkmen, Uzbeks, Kyrgyz, Azeris as well as a part of the Tajiks. ^ Fenz, Völkerfrühling 2000, p. 49; Noack, Muslim Nationalism 2000, p. 40. ^ Kappeler, Russia 1992, pp. 203–220. See also Azrael, Soviet Nationality 1978; Thaden, Russia 1984; Bauer / Kappeler / Roth, Nationality 1991; Renner, Russian Nationalism 2000; Hosking, Russia 2000. ^ Karpat, Politicization 2001, p. 289; Noack, Muslim Nationalism 2000, pp. 110–113; Kappeler, Russia 1992, pp. 215–217. ^ On Russian military reform, see Benecke, Militär 2006. ^ Kappeler, Russia 1992, p. 195. For the development of the Crimean Tatar National Movement, see Kırımlı, National Movements 1996. ^ Carpathian, Politicization 2001, pp. 283–287. For information on migration and flight movements from Russian to the Ottoman Empire, see references in Note 26. ^ The term Jadidism was derived from the term "usul-u ğadid" (in Turkish: "usûl-ü cedid"), which stood for secular teaching methods in Islamic schools and gradually became synonymous with the adoption of Western techniques and ideas. The reformers fought against the supposed cultural backwardness of the Muslim communities and, among other things, advocated equality between men and women. Lazzerini sees in this reform movement a synthesis between Western progress and Muslim traditions (Lazzerini, Reform und Modernismus 1989, pp. 35–47). ^ See Lazzerini, Ismail Bey Gaspirali 1973. ^ Noack, Muslimischer Nationalismus 2000, p. 172. ^ Kushner, Turkish Nationalism 1977, p. 12. ^ Hostler, Türken 1960, p. 159. ^ Kırımlı, National Movements 1996, p.40ff. ^ Noack, Muslimischer Nationalismus 2000, p. 173. ^ Landau, Pan-Turkism 1995, p. 14. ^ Adam, Suche nach Turan 2000, p. 204. ^ Heyd, Foundations 1950, pp. 107f., 126; Swietochowski, Russian Azerbaijan 1985, p. 33. ^ Swietochowski, Russian Azerbaijan 1985, pp. 33, 58–60. ^ On Yusuf Akçura, see especially Georgeon, Nationalisme turc 1980. ^ Akçura, Üç tarz-ı siyaset 1904. ^ In the wake of the Russian defeat in the war against Japan in 1905, the dissatisfaction with the autocracy of Nicholas II (1868–1918) grew. After the brutal suppression of a peaceful demonstration by tsarist soldiers, opposition groups were formed nationwide, including such diverse population groups as peasants, liberal aristocrats, bourgeois intellectuals, and socialists from the labor movement. There were strikes, mutinies, and numerous protests, which were violently put down the tsar. In the end, however, Nicholas II had to heed the demands for reforms and promised his people greater freedoms and the establishment of a parliament, the Duma, in the so-called October Manifesto of October 30, 1905. The latter, however, was already dissolved in 1907. ^ Usmanova, Activity 1998, pp. 417–455. ^ For Türk Yurdu see Dumont, La Revue 1974, pp. 315–331. ^ Hostler, Turks 1960, p. 178. ^ On Ahmet Ağaoğlu, see Shissler, Between Two Empires 2003. ^ Landau, Pan-Turkism 1995, pp. 39–47. See also Adam, Russian Muslims 2002. ^ Akçura himself opposed the Young Turks in the "Milli Meşrutiyet Partisi" ("National Constitutional Party"), which he co-founded and which pursued a decidedly Turkish nationalist line. See Georgeon, Nationalisme turc 1980, pp. 41f. Berkes, Development 1964, p. 322. Criticism of Pan-Turkism was voiced, for example, by Islamic journals such as Sebilürreşad ("The Path of Guidance") and Sırat-ı Müstakim ("The Straight Road"). They took the view that the principle of nationalism contradicted Islam and that the Pan-Turkists' policy was to divide Muslims. Cf. Alp, Türkismus 1915, pp. 20–25. ^ Alp, Türkismus 1915, p. 6. ^ "For the Turks, the fatherland is neither Turkey nor Turkestan - their fatherland is a great and eternal country: Turan", quoted in: Jäschke, Turanism 1941, p. 5. ^ Heyd, Foundations 1950, p. 127; identically in Hostler, Türken 1960, p. 175. ^ See Üstel, Imparatorluk 1997. ^ Alp, Türkismus 1915, p. 27. ^ Quoted in: Jäschke, Turanism 1941, p. 8. ^ Alp, Türkismus 1915, p. 97. ^ Kappeler, Russia 1992, pp. 285f. ^ Hostler, Turks 1960, p. 57. Yusuf Akçura called on Germany to "support the Turkic peoples of Russia against the tsarist government" with a propaganda text published in Bern in 1916. Quoted in: Wiederkehr, Eurasische Bewegung 2007, p. 157. ^ See Springer, Romantic Career 1917, pp. 457–461; Olcott, Basmachi 1981, pp. 352–369; Yamauchi, Green Crescent 1991. On Enver Paşas' contacts and cooperation with the Bolsheviks and his deployment by Vladimir I. Lenin (1870–1924) to Bukhara, where he finally turned against the Bolsheviks, see Dumont, Fascination du bolchevisme 1975, pp. 141–166; see also Kramer, Islam Assembled 1986. ^ Kappeler, Russia 1992, pp. 284–298; see also: Reynolds, Shattering Empires 2011; Barkey / Hagen, After Empire 1997; Brower, Turkestan and the Fate of the Russian Empire 2003. ^ Jäschke, Turanism 1941, p. 21. For the development after 1917, see Noack, Muslimischer Nationalismus 2000, pp. 499–538. ^ Fenz, Völkerfrühling 2000, pp. 97, 105, 126. For developments at the Volga Tatars after the October Revolution, see Bucher-Dinç, Mittlere Wolga 1997; for Central Asia, see Fragner, Probleme 1989, pp. 19-34; Eisener, Auf den Spuren 1991; and, in general, Fragner / Kappeler, Zentralasien 2007. ^ Dumont, L'axe Moscou-Ankara 1977, pp. 165-193. ^ On the Pan-Turkist movement in the Second World War, see Krecker, Deutschland 1964; Önder, Türkische Außenpolitik 1977; Landau, Pan-Turkism in Turkey 1981; and Özdoğan, Turan 2001. ^ Behar, İktidar ve Tarih 1996. In linguistic terms, Pan-Turkist ideas also found their way into the Turkish language reform of the 1930s. At the beginning of the language reform, linguistic research on the other Turkic languages was intensified. The reformers used them in many ways to create equivalents for Arabic and Persian language elements. During this time, the ominous "Sun Language Theory" was also developed, according to which all languages allegedly originated from Turkish. Geoffrey Lewis described the language purification and language reform of Turkish, which was carried out excessively until recently, as a "catastrophic success". See Lewis, Turkish Language Reform 1999; Heyd, Language Reform 1954; Lewis, Turkish Language 1999; Çolak, Language Policy 2004. by Berna Pekesen Pekesen, Berna: Pan-Turkism, in: Europäische Geschichte Online (EGO), hg. vom Leibniz-Institut für Europäische Geschichte (IEG), Mainz European History Online (EGO), published by the Leibniz Institute of European History (IEG), Mainz 2019-01-29. URL: http://www.ieg-ego.eu/pekesenb-2014-en URN: urn:nbn:de:0159-2018120327 [JJJJ-MM-TT][YYYY-MM-DD].
0.94248
A crowd of Northern Virginia residents and clergy members marched to General Electric's offices in Washington DC today, demanding that the company's CEO, Jeffrey Immelt, take responsibility for helping homeowners who received subprime loans from the company's now-closed mortgage arm, WMC Mortgage Corp. By: CLYDE ELLIS AND NANCY MCDONALD LADD On Sunday afternoon, Feb. 19, the Virginia House Appropriations and Senate Finance committees failed our state's struggling homeowners. Faced with a decision about how to spend the $69 million in cash due Virginia from the National Mortgage Settlement negotiated by the 50 states' attorneys general, Virginia legislators released budgets that would divert these funds to fill budget gaps and finance pet projectsinstead of helping the thousands of families and communities devastated by foreclosure across the commonwealth. Lina Jamoul from London Citizens argues that Work Programme contractors could learn lessons from London Citizens’ success in helping east Londoners to find jobs at the 2012 games. Common Ground, a coalition of religious groups and other organizations, has been awarded a $56.4 million federal loan to start a nonprofit health insurer that would be run by its members. Five Democratic candidates for Cuyahoga County prosecutor promised criminal justice reforms to a standing-room only crowd nearly 1,000 at Anshe Chesed Fairmount Temple at a February 20 forum organized by Greater Cleveland Congregations. No Republican entered the race, so the March 6 Democratic primary will determine the next prosecutor. The Massachusetts law has had strong and steady support — and little opposition. Last year an attempt to repeal the "individual mandate" — the part that requires most people to have insurance — couldn't get enough signatures. Last week only 39 people had "liked" its Facebook page. To get an idea of how it's working at the ground level, I stopped by the office of Dieufort Fleurissaint, a self-employed Haitian-American businessman. He has a tax prep and insurance business. He's also an evangelical minister who worked with a group called Greater Boston Interfaith Organization that helped get the health law passed. Bill Moyers Essay: Newt's Obesession with Saul Alinsky from BillMoyers.com on Vimeo. <p style="\\&quot;text-align:" left;\\"="">Memo to the Obama Administration: if you want to see the makings of a national model to hold big banks accountable for fixing foreclosure-devastated neighborhoods, go to Milwaukee and talk to citizen leaders of a community organization who are practicing what Saul Alinsky preached. After the successful setup of independent citizens’ organizations in Berlin-Schöneweide and Berlin-Wedding/Moabit, Berlin-Neukölln has also created the conditions for a functioning civic organization based on the community organizing model. With its members including some 40 Neukölln groups, including migrant organizations, school development associations, neighborhood centers and church communities, and co-funded by local businesses, associations, and foundations, the Neukölln Citizens’ Organization will be officially and formally launched at an inaugural event. In 1996, the Industrial Areas Foundation, an organizing group that has built thousands of homes across New York City, proposed that private firms contracting with the city pay food service workers, security guards, cleaners and temporary office workers a wage that ranged at the time from $7.25 to $12 an hour. “We started with a pretty simple idea: If you work full time, you shouldn’t be poor,” recalled Jonathan Lange, an organizer with Metro I.A.F., the local affiliate. As far as the District’s local political spectacle goes, it’s awful hard to beat a Washington Interfaith Network “action.” It’s bully democracy in the best sense, with politicians forced to stand in front of huge swaths of voters and answer simple questions with a yes or no. BRIDGEPORT — In what founders call a first of its kind for the state, a new multi-faith coalition is being formed today with the intention of effecting some change in the political arena. Gov. Dannel Malloy, Speaker of the House Chris Donovan, Majority Leader Brendan Sharkey, Sen. Joe Crisco, D-Woodbridge, and insurance and health care industry leaders are scheduled to appear at the founding assembly for CONECT, Congregations Organized for a New Connecticut, at the Cathedral of the Holy Spirit. BRIDGEPORT ---- A significant new multi-faith organization, united to fight such social ills as unfair banking practices, high health insurance costs and abusive treatment of immigrants, got a rousing start Wednesday night as about 1,500 packed an East End church to incorporate CONECT. CLEVELAND, Ohio -- In its first major public action, Greater Cleveland Congregations, a newly formed coalition of churches, synagogues and mosques, is calling on the Cleveland school district to restore programs recently cut to save money. Amid the uproar during the past few weeks over the proposed living wage law there’s one important point that you might have missed: the city already has a living-wage law. Its rules cover thousands of workers employed under more than $1 billion worth of contracts with the city. In fact, New York City had one of the first living-wage laws in the country, though the city’s first bill covered just a couple thousand workers. Passed in 1996, over the veto of then-Mayor Rudolph Giuliani, the legislation was championed by advocacy organizations such as the Industrial Areas Foundation as well as local unions. It required that private firms contracting with the city to provide food services, security guards, cleaners, and temporary office workers pay their employees a living wage that ranged at the time from about $7.25 to $12 an hour. While most attention is focused on a drawn-out debt crisis in Washington and spasmodic demonstrations in several cities, the most important economic and political battle of the period is being played out largely under the radar. This struggle pits the White House and a set of attorneys general who want a quick and limited settlement with the major banks over their conduct during the foreclosure crisis against another set of attorneys general, led by Eric Schneiderman of New York and Beau Biden of Delaware, who are pushing for more in-depth investigations and a much larger financial commitment to address the damage done to American homeowners. U.S. Senator Mark Warner reacts to VOICE's organizing around the foreclosure crisis in Northern Virginia. Members from more than 40 religious institutions across Northern Virginia are asking some of the country’s largest banks to commit to helping rebuild neighborhoods that have been devastated by housing foreclosures. Virginians Organized for Interfaith Community Engagement (VOICE) drew a crowd of about 900 congregants, political leaders and representatives of two major financial institutions — Bank of America and J.P. Morgan Chase — to Freedom High School in Woodbridge on Sunday to discuss the issue. More than two years ago, on a brilliant July morning, we were two of about 350 New Yorkers who took to Charlotte, London were doing the same thing. It was a coordinated campaign led by the pastors, rabbis, imams and lay people in hundreds of religious and civic institutions associated with the <a data-cke-saved-href="\\" href="\\&quot;http://www.nydailynews.com/topics/Metro+Industrial+Areas+Foundation\\&quot;" title="\\&quot;Metro" industrial="" areas="" foundation\\"="">Metro Industrial Areas Foundation. BOSTON — Many health care experts say the U.S. will not wrestle down health care spending unless consumers jump into the debate. But explaining the wonky world of health care finance is tough, even in the medical mecca of Boston. That’s not stopping two grassroots groups that played a key role in passing the state’s health coverage law. On Sunday night they held their first rally on healthcare spending at a church in Roxbury. Lenders may have foreclosed on hundreds of homeowners in Prince William County, Manassas and Manassas Park using unreliable, “robo-signed” documents, according to a report by the group Virginians Organized for Interfaith Community Engagement. Prince William County has the highest rate of foreclosures in Virginia, and residents of one neighborhood who blame the foreclosure rate on the practice of 'robo-signing,' are demanding accountability from the banks and an investigation by state officials. At the height of the foreclosure crunch, approximately 25 percent of homes in the Georgetown South development in Manassas were foreclosed and vacant. On Monday, our nation will celebrate Labor Day. It will be marked by parades and picnics, and here in Cleveland, by the air show and the 10th annual Peace Show. With unemployment hovering around 9 percent and higher in cities like Cleveland, growing numbers of uninsured workers, collective bargaining under attack, and predictions of another recession, some might ask what there is to celebrate on a day that honors the American worker.
0.999999
For centuries the landmass thought to exist in the southern hemisphere was named 'terra australis incognita', the 'unknown southern land.' 'Australis' is the Latin term for 'southern.' In 1627 the Dutch ship Gulden Zeepaard had sailed along the southern coast reaching present day Fowler's Bay. In deference to the Dutch discoveries made in the seventeenth century along the western and northern coastline, the western section of the continent was referred to as 'New Holland.' The south coast of Van Diemen's Land was charted by Abel Tasman in 1642. The eastern section of the continent was named 'New South Wales' by James Cook. The southern coast, and the actual extent of the continent remained 'unknown' until Flinders' voyage - some thought that there might be a strait separating New South Wales from the western section. Matthew Flinders was the first to circumnavigate the continent, and chart the 'unknown coast.' By 1803 the complete outline of the Great Southern Land was mapped, but Flinders' detention at Mauritius delayed the publication of his journal and atlas until their eventual appearance in 1814. Flinders used 'Terra Australis' on his charts. He recognised that now that he had determined that New South Wales and New Holland were one land, there should be a general name for the whole continent. Flinders' chart accompanying the book was entitled General Chart of Terra Australis or Australia. However, Flinders' patron Sir Joseph Banks preferred 'Terra Australis'. In 1817 Governor Macquarie of New South Wales received a copy of Flinders' book, and started to use 'Australia' in his official correspondence. Later explorer Phillip Parker King also used 'Australia' on his maps of the northern and western coasts, and by the end of the 1820s 'Australia' was commonly used as the continent's name. Extract from the introduction to Matthew Flinders' journal A voyage to Terra Australis: Flinders discusses the naming of Australia, and his wish to use the term "Australia". Weekend Australian, 26-27 January 2002 - page 19. Sizgoric, Viki. 'The first circumnavigation'. Brunton, Paul. 'The man who put Australia on the map'. Flinders, Matthew. A voyage to Terra Australis. Adelaide: Libraries Board of South Australia, 1966. Australiana facsimile editions; no. 37. Reprint of 1814 ed. Flinders, Matthew. Terra Australis: Matthew Flinders' great adventures in the circumnavigation of Australia / edited and introduced by Tim Flannery. Melbourne: Text Publishing, 2000.
0.983317
A total of 31 ill persons infected with the outbreak strains of Salmonella Newport (20 persons), Salmonella Hartford (7 persons), or Salmonella Oranienburg (4 persons) were reported from 16 states. The number of ill persons identified in each state was as follows: Arizona (1), California (4), Colorado (1), Connecticut (3), Florida (1), Illinois (2), Maryland (1), Massachusetts (1), Michigan (1), New York (7), Ohio (1), Rhode Island (1), Texas (2), Utah (1), Washington (1), and Wisconsin (3). As of July 14, 2014, a total of 25 ill persons infected with the outbreak strains of Salmonella Newport (16 persons), Salmonella Hartford (7 persons), or Salmonella Oranienburg (2 persons) have been reported from 15 states. The number of ill persons identified in each state is as follows: Arizona (1), California (3), Colorado (1), Connecticut (3), Florida (1), Massachusetts (1), Michigan (1), New York (5), Ohio (1), Rhode Island (1), Texas (2), Utah (1), Washington (1), and Wisconsin (3). As of June 9, 2014, a total of 21 ill persons infected with the outbreak strains of Salmonella Newport (13 persons), Salmonella Hartford (6 persons), or Salmonella Oranienburg (2 persons) have been reported from 12 states. The number of ill persons identified in each state is as follows: Arizona (1), California (3), Colorado (1), Connecticut (3), Florida (1), Massachusetts (1), Michigan (1), New York (4), Ohio (1), Utah (1), Washington (1), and Wisconsin (3). A total of 17 ill persons infected with the outbreak strains of Salmonella Newport (12 persons) or Salmonella Hartford (5 persons) have been reported from 10 states. The number of ill persons identified in each state is as follows: Arizona (1), California (2), Connecticut (2), Ohio (1), Florida (1), Massachusetts (1), Michigan (1), New York (4), Utah (1), and Wisconsin (3). A total of 12 ill persons infected with the outbreak strain of Salmonella Newport have been reported from 7 states. The number of ill persons identified in each state is as follows: Arizona (1), California (2), Connecticut (1), Massachusetts (1), New York (4), Utah (1), and Wisconsin (2).
0.948534
Booth was born in Bel Air, Maryland, into the English American theatrical Booth family. He was the illegitimate son of another famous actor, Junius Brutus Booth, an Englishman, who named Edwin after Edwin Forrest and Thomas Flynn, two of Junius' colleagues. He was the older brother of John Wilkes Booth, himself a successful actor who gained notoriety as the assassin of President Lincoln. Nora Titone, in her book My Thoughts Be Bloody, recounts how the shame and ambition of Junius Brutus Booth's three illegitimate actor sons, Junius Brutus Booth, Jr. (who never achieved the stage stardom of his two younger actor brothers), Edwin Booth, and John Wilkes Booth, spurred them to strive, as rivals, for achievement and acclaim—Edwin, a Unionist, and John Wilkes, a Confederate and the assassin of Abraham Lincoln. In early appearances, Booth usually performed alongside his father, making his stage debut as Tressel or Tressil in Colley Cibber's version of Richard III in Boston in 1849. His first appearance in New York City was in the character of Wilford in The Iron Chest, which he played at the National Theatre in Chatham Street, on the 27th of September 1850. A year later, on the illness of the father, the son took his place in the character of Richard III. After his father's death in 1852, Booth went on a worldwide tour, visiting Australia and Hawaii, and finally gaining acclaim of his own during an engagement in Sacramento, California, in 1856. Before his brother assassinated Lincoln, Edwin had appeared with his two brothers, John Wilkes and Junius Brutus Booth Jr., in Julius Caesar in 1864. John Wilkes played Marc Antony, Edwin played Brutus, and Junius played Cassius. It was a benefit performance, and the only time that the three brothers appeared together on the same stage. The funds were used to erect a statue of William Shakespeare that still stands in Central Park just south of the Promenade. Immediately afterwards, Edwin Booth began a production of Hamlet on the same stage, which came to be known as the "hundred nights Hamlet", setting a record that lasted until John Barrymore broke the record in 1922, playing the title character for 101 performances. After John Wilkes Booth's assassination of President Lincoln in April 1865, the infamy associated with the Booth name forced Edwin Booth to abandon the stage for many months. Edwin, who had been feuding with John Wilkes before the assassination, disowned him afterward, refusing to have John's name spoken in his house. He made his return to the stage at the Winter Garden Theatre in January 1866, playing the title role in Hamlet, which would eventually become his signature role. In 1867, a fire damaged the Winter Garden Theatre, resulting in the building's subsequent demolition. Afterwards, Booth built his own theatre, an elaborate structure called Booth's Theatre in Manhattan, which opened on February 3, 1869, with a production of Romeo and Juliet starring Booth as Romeo, and Mary McVicker as Juliet. Elaborate productions followed, but the theatre never became a profitable or even stable financial venture. The panic of 1873 caused the final bankruptcy of Booth's Theatre in 1874. After the bankruptcy, Booth went on another worldwide tour, eventually regaining his fortune. In 1869, Edwin acquired his brother John's body after repeatedly writing to President Andrew Johnson pleading for it. Johnson finally released the remains, and Edwin had them buried, unmarked, in the family plot at Green Mount Cemetery in Baltimore. Portrait of Edwin Booth by John Singer Sargent, 1890, which hung at the Players Club. Now in the collection of the Amon Carter Museum of American Art. In 1888, Booth founded the Players' Club, for actors and others associated with the arts, and dedicated his home on Gramercy Park to it. His final performance was, fittingly, in his signature role of Hamlet, in 1891 at the Brooklyn Academy of Music. Edwin Booth had a small stroke (1891) which made his health rapidly decline after the event. On April 1893 he had another stroke which made his health worse and in the end died June 1893 at the Players', and was buried next to his first wife at Mount Auburn Cemetery in Cambridge, Massachusetts. His bedroom in the club has been kept untouched since his death. The New York Times also wrote an article of his sad departure shown here. Edwin Booth saved Abraham Lincoln's son, Robert, from serious injury or even death. The incident occurred on a train platform in Jersey City, New Jersey. The exact date of the incident is uncertain, but it is believed to have taken place in late 1864 or early 1865. Robert Lincoln recalled the incident in a 1909 letter to Richard Watson Gilder, editor of The Century Magazine. Booth did not know the identity of the man whose life he had saved until some months later, when he received a letter from a friend, Colonel Adam Badeau, who was an officer on the staff of General Ulysses S. Grant. Badeau had heard the story from Robert Lincoln, who had since joined the Union Army and was also serving on Grant's staff. In the letter, Badeau gave his compliments to Booth for the heroic deed. The fact that he had saved the life of Abraham Lincoln's son was said to have been of some comfort to Edwin Booth following his brother's assassination of the president. Edwin's acting style was distinctly different from that of his father. While the senior Booth was, like his contemporaries Edmund Kean and William Charles Macready, strong and bombastic, favoring characters such as Richard III, Edwin played more naturalistically, with a quiet, more thoughtful delivery, tailored to roles like Hamlet. A number of modern dramatizations have been made of Edwin Booth's life, on both stage and screen. One of the best known is the 1955 film Prince of Players written by Moss Hart, based loosely on the popular book of that name by Eleanor Ruggles. It was directed by Philip Dunn and stars Richard Burton and Raymond Massey as Edwin and Junius Brutus Booth, Sr., with Charles Bickford and Eva Le Gallienne, who plays Gertrude to Burton's Hamlet. The film depicts events in Booth's life well before, and then surrounding, the assassination of Lincoln by Booth's younger brother. The Brothers BOOTH!, by W. Stuart McDowell, which focuses on the relationships of the three Booth brothers leading up to the assassination of Lincoln, was workshopped and given a series of staged readings featuring David Strathairn, David Dukes, Angela Goethals, Maryann Plunkett, and Stephen Lang at the New Harmony Project, and at The Guthrie Theatre Lab in Minneapolis, and later presented in New York at the Players' Club, the Second Stage Theatre, and the Boston Athenaeum. It was given its first fully staged professional production at the Bristol Riverside Theatre outside Philadelphia in 1992. A second play by the same name, The Brothers Booth, which focuses on "the world of the 1860s theatre and its leading family" was written by Marshell Bradley and staged in New York at the Perry Street Theatre in 2004. Austin Pendleton's play, Booth, which depicts the early years of the brothers Edwin, Junius, and John Wilkes Booth and their father, was produced off Broadway at the York Theatre, starring Frank Langella as Junius Brutus Booth, Sr. In a review, the play was called "a psychodrama about the legendary theatrical family of the 19th century" by the New York Times. Pendleton had adapted this version from his earlier work, Booth Is Back, produced at Long Wharf Theatre in New Haven, Connecticut, in the 1991-1992 season. A play by Luigi Creatore called Error of the Moon played off-Broadway on Theatre Row in New York City from August 13 to October 10, 2010. The play is a fictionalized account of Booth's life, hinging on the personal, professional, and political tensions between brothers Edwin and John Wilkes, leading up to the assassination of Lincoln. In 1959, the actor Robert McQueeney played Booth in the episode "The Man Who Loved Lincoln" on the ABC/Warner Brothers western television series, Colt .45, starring Wayde Preston as the fictitious undercover agent Christopher Colt, who in the story line is assigned to protect Booth from a death threat. In 1966, Martin Landau played Edwin Booth in the episode "This Stage of Fools" of the NBC western television series, Branded, starring Chuck Connors as Jason McCord. In the story line, McCord takes a job as the bodyguard to the actor Edwin Booth, brother of the presidential assassin, John Wilkes Booth. In 2013, Will Forte played Edwin Booth in the "Washington, D.C." episode of the Comedy Central's series, Drunk History, created by Derek Waters. In December 2010, descendants of Edwin Booth reported that they obtained permission to exhume the Shakespearean actor's body to obtain DNA samples to compare with a sample of his brother John's DNA to refute the rumor he had escaped after the assassination. However, Bree Harvey, a spokesperson from the Mount Auburn Cemetery in Cambridge, Massachusetts, where Edwin Booth is buried, denied reports that the family had contacted them and requested to exhume Edwin's body. The family hopes to obtain DNA samples from artifacts belonging to John Wilkes, or from remains such as vertebrae stored at the National Museum of Health and Medicine in Maryland. On March 30, 2013, museum spokesperson Carol Johnson announced that the family's request to exhume DNA from the vertebrae had been rejected. The Players' Club still exists in its original clubhouse at 16 Gramercy Park South in Manhattan. A statue of Booth as Hamlet, by Edmond T. Quinn, has been the centerpiece of the private Gramercy Park since 1916. It can be seen by the public through the south gate of the park. Booth left a few recordings of his voice preserved on wax cylinder. One of them can be heard on the Naxos Records set Great Historical Shakespeare Recordings and Other Miscellany. Another place to hear his preserved voice is on the site shown here [3:34] Booth's voice is barely audible with all the surface noise, but what can be deciphered reveals it to have been rich and deep. Memorials of Booth can still be found around Bel Air, Maryland. In front of the courthouse is a fountain dedicated to his memory. Inside the post office is a portrait of him. Also, his family's home, Tudor Hall, still stands and was bought in 2006 by Harford County, Maryland, to become a museum. A chamber in Mammoth Cave in Kentucky is called "Booth's Amphitheatre" - so called because Booth entertained visitors there. The Springer Opera House in Columbus, Georgia, is said to be haunted by the ghost of Edwin Booth. Broadway's Booth Theatre was the first, and remains the oldest, Broadway theatre to be named in honor of an actor. Stephen Sondheim's musical Assassins mentions Edwin in "The Ballad of Booth" with the lyrics: "Your brother made you jealous, John/You couldn't fill his shoes." Edwin Booth is a member of the American Theater Hall of Fame. ^ Based on the description in the Library of Congress for this photo, labeled:"Edwin Booth [as] Hamlet 'to be or not to be, that is the question', CALL NUMBER: LOT 13714, no. 125 (H) [P&P]." ↑ "Map | Mount Auburn Cemetery". Mountauburn.org. Retrieved 2013-09-03. ↑ William Winter. Life and Art of Edwin Booth. MacMillan and Co., (New York, 1893) pp. 48-49. ↑ This article incorporates text from a publication now in the public domain: Chisholm, Hugh, ed. (1911). "Booth, Edwin Thomas". Encyclopædia Britannica. 4 (11th ed.). Cambridge University Press. p. 239. ↑ "Historic Photo Gallery: 1850 to 1899". www.walnutstreettheatre.org. Retrieved 2015-11-23. ↑ "Booth, Edwin (1833-1893) | The Vault at Pfaff's". pfaffs.web.lehigh.edu. Retrieved 2015-11-23. ↑ "EDWIN BOOTH IS DEAD". 7 June 1893. ↑ Charles H. Shattuck. "Shakespeare on the American Stage: From the Hallams to Edwin Booth." Educational Theatre Journal, Vol. 29, No. 4 (The Johns Hopkins University Press, Dec., 1977), p. 579. ↑ "The New Harmony Project". The New Harmony Project. Retrieved 2013-09-03. ↑ "'Brothers Booth!' Opens In Bristol". philly-archives. Retrieved 2015-11-23. ↑ "The Brothers Booth is one of Riverside's Best Premieres," John J. Buettler, The Bristol Pilot, 19 March 1992. ↑ "Brothers Booth! is a Play with Merit at the Riverside," Ken Bolinsky, Philadelphia Courier Times, 15 March 1992. ↑ Dr. Clive Swansbourne, quoted on the cover of The brothers Booth by Marshal Bradley. (Authorhouse, 2004). ↑ Ben Brantley, "Acting Up a Storm As a Stormy Actor Known for Acting Up," The New York Times, January 24, 1994. ↑ Bryan, William. "Theatre Review: The Tragedian" Charleston City Paper, 23 January 2008. ↑ "Redrawing a Picture of Lincoln's Assassin", Rachel Salz,The New York Times, 30 August 2010. ↑ ""This Stage of Fools", Branded, January 16, 1966". Internet Movie Data Base. Retrieved March 3, 2013. ↑ "Branded". Classic Television Archive. Retrieved March 3, 2013. ↑ "Brother of John Wilkes Booth to Be Exhumed". Philadelphia Inquirer. 23 December 2010. ↑ "Booth relatives want DNA testing to verify ID". Pittsburgh Post-Gazette. 23 December 2010. ↑ Edward Colimore (March 30, 2013). "Booth mystery must remain so - for now". Philadelphia Inquirer. Retrieved November 6, 2013. ↑ "Great Historical Shakespeare Recordings and a Miscellany: Henry Irving: 9789626342008: Amazon.com: Books". Amazon.com. Retrieved 2013-09-03. ↑ Booth, Edwin (1890). "Othello by Edwin Booth". Archive. Wikimedia Commons has media related to Edwin Booth. The memory palace podcast episode about Edwin Booth. "Booth, Junius Brutus". Appletons' Cyclopædia of American Biography. 1900.
0.999969
I'm trying something new: Interactive quizzes! I tried out a quiz building platform to learn how to make quizzes that build my email list. Should you really trust platforms like Facebook and Instagram with your audience?
0.976034
I am imagining today that I am a barista. Make double portion of espresso. Add honey and salt into the coffee and stir it. You should make vanilla salt in advance: just put a half of vanilla pod with a salt in a jar and wait for at least five days. Warm up milk and pour it in a bowl with coffee, whisk until the scum is ready.
0.99986
Find out the top 10 core skills you need to master as a senior quality auditor and what hard skills you need to know to succeed in this job. A Senior Quality Auditor is responsible for ensuring a successful completion of all assigned audit engagements for the beginning to the end including the preplanning and wrap up activities. This position is liable to manage and direct the daily operations of the junior auditors. The general responsibilities include developing audit programs and testing the relevant procedures to risk and test objectives, conducting assigned audit engagements successfully from beginning to the end, obtaining and reviewing evidence ensuring those audit conclusions are well-documented, identifying and communicating issues raised while offering workable solutions relevant to business risk, ensuring adherence at all times to all applicable department and professional standards, ensuring all audit outcomes are based on the complete understanding of the process, circumstances, and risk. A senior quality auditor should master the following 10 core skills to fulfill her job properly. A Senior Quality Auditor portrays his/her image and that of the company by the way he/she communicates; strong verbal communication skills are vital for business development and forging lasting relationships with customers, suppliers, and colleagues. A Senior Quality Auditor must necessarily learn and stay updated on effective written communication skills that involve the construction of a logical argument, note taking, editing and summarizing as well as incorporating new ways of writing presentations. A Senior Quality Auditor ought to learn how to tap into the employee's enthusiasm as well as motivate the staff not just with money but with a motivation that comes through the daily relationship with each employee and creating an environment that fosters employee engagement and motivation. A Senior Quality Auditor cannot afford to make poor decisions, that's why he ought to develop a systematic approach to decision making that allows him to make every decision with skill, confidence, and wisdom producing a final choice of competence in the workplace. A Senior Quality Auditor must learn the art of creating corporate policy, organizing, planning, controlling and directing organization resources to achieve the aims of the policies formed while making decisions to oversee the enterprise. A Senior Quality Auditor needs to support, coach, positively impacts and effectively aid in developing talents of their staff by motivating them to become outstanding in their behavioral change and performance improvement that opens up development opportunities in the organization. A Senior Quality Auditor needs to invest in his employees by creating room for individual advancement that encourages stronger job performance because it positions the employees to demonstrate just how well they can perform their jobs through motivation and feedback that are critical to the employee performance. A Senior Quality Auditor needs to creatively learn how to schedule work according to the abilities of different individuals to ensure a balance that will not put an unsustainable level of pressure on the employees and cause them to accumulate work related stress. A Senior Quality Auditor should consider the quality management earnestly for the success of the business by improving the processes, products, services, the discipline and the culture in which they work under to warrant the improvement of profitability and productivity. A Senior Quality Auditor must be dedicated to establishing and maintaining the schedule using either manual or technology methods to ensure it is always updated according to the tasks, the employees responsible or the time allocated to each task without fail or delay. A senior quality auditor should have a good command of the following hard skills to succeed in her job.
0.998138
Some stats on me- I'm 17, 118 lbs(about) and 5'7" tall, with essentially no fat except in my lower abdomen, which sticks out and refuses to go away. I am fairly "fit" having done several beachbody programs, which I have found to be intense training(which I enjoy!) yet I still can't seem to get lean in that area. I was eating completely clean paleo for a month before I started to attempt to lean bulk, back when I was still doing a hybrid of several of beachbody's programs, so I assumed I was fairly fat adapted, but I am not sure. -As I intend to keep using these beachbody workouts, how should I alter my carbohydrate to adjust to the increased glycotic activity, while attempting to "recomp" my body? -And also, is it even possible to lose fat while consuming a higher amount of carbs to fuel activity? -if so, would having carbs+protein post strength workouts and only protein post HIIT/Plyo workouts be the right thing to do? -FINALLY, could it have been that I was merely eating too little overall, and should I try eating lowish carbs as I was earlier, but just increase calories(through more fat) ? I have read robb wolf's posts on whether to have high or low carb post workout, but I didn't know how to apply it to my workouts, so that is why I was asking. The 118 pounds at 5'7" led me to say that. I would recommend you forget about "recomping" and stop being so precise with your food. Start lifting and eat a lot of food. You will look much better if you gain some muscle mass. To sum up what I'm about to write: LIFT and EAT MORE CARBS. OK where to start. I'll go point by point. I HIGHLY suggest you get on a strength based resistance training program. Those beachbody programs are great for raw beginners, but pretty much worthless for anybody else. You say you've done several of them, so I think it is high time for you to start squatting, pressing, and pulling on a smart strength progression. There are endless resources online, so I'll let you do your own digging. Basically: squat, push, and pull heavy things 3 or more times a week. If you would like to, find a GOOD trainer (extremely hard to find) who can teach the basic compound movements. If you must continue these beachbody shenanigans, I highly suggest you increase carbohydrate intake. I think it would be very beneficial for you to push your resistance training to later in the day (mid morning or afternoon), and eat your carbs both pre and post workout. You want the carbs beforehand to allow you to actually get more out of the training, and post to replenish glycogen stores and facilitate muscle growth. I would eat the most carbs on restance training days, slightly less on HIIT days, and low (but still above 80ish) on yoga or rest days. I would also suggest you replace 1-2 of the HIIT days with just a long, brisk, walk in the morning. I would also suggest 3-4 resistance days a week. I hate this myth, although it comes with good intentions. You absolutely CAN BURN FAT while eating MORE CARBS than what you are currently. I said can, not that it is optimal or the most important variable. You ask if you are eating too little overall, and I find myself scratching my head on this. You say your maintenance is 2600. You weigh ONE HUNDRED and EIGHTEEN POUNDS, and you are a female who does beachbody workouts. I weigh 180 pounds and I squat 2x bw, bench 1.5 bw, etc for REPS multiple times a week. I am currently recomping eating and average of 2600 calories a day. It's working for me, but I can see why it's not working for you. A rough guide for cutting: 13 calories per pound of bodyweight, 1.5g protein/lb, carbs and fats inversely proportional. For you, on a recomp but with moderate activity (beachbody is not the same as lifting and sprinting, sorry), I would venture to say you should eat about 15 cal/lb. That would put you at about 1800 calories per day. One last thing. You are 17. Go play a sport and find some performance goals. Body composition will follow. If you aim to be strong, fast, and have endurance, your body will reflect it. There's a lot in your post to read & digest. By my SWAG / 'blink' (unless you have a very small frame) you're at least 30 lbs light and you're working out too much. I think you're body is less concerned with building muscle & burning fat as it is trying to stave off starvation (at least from its point of view). My guess is that your at a very low BF %. I'm not sure I understand your overall objective. Are you sure that "fat" at the lower abdomen is really fat? or something else? Maybe you body is trying to hold onto the last bit of fat it has? If you want to build muscle.... lift heavy, eat well... give yourself some easy days or days off. Rest is a wonderful thing. I've always been a proponent of "build the muscle first, worry about losing the fat later". Not to say you should pig out & over eat & get fat. But concentrating on lifting & eating to build muscle seldom results in excessive fat gain. Since you intend to continue using these Beachbody workouts, no adjustment of carbs is necessary. These sorts of workouts trick your body into thinking it is constantly being chased by a lion. Cortisol becomes dominant and any chance you have of gaining muscle is impossible on such a regimen. It is possible to lose fat while consuming carbs. I don't know if it possible for you. I lift twice a week and then eat carbs on those days after workout. The rest of the week is low carbish. Initially was less careful, went up 15lbs, but managed to lose 8lbs of that and feel like what's left is muscle and I am slowly inching up now, but my belt fits fine still. It is possible you were just eating to little. Generally speaking, I want to do this clean, but if I don't see results, I know I can always eat more until my jeans start getting tight, and then clean up my diet again. The powerlifters/bodybuilders eat like crazy to lift heavier/grow muscle. A 10lb swing on the scale really shouldn't faze us too much.
0.999253
Did you know about the benefits of bird's nest soup? This article, I want to highlight the benefits of bird's nest soup is very popular in Southeast Asia market, especially in Malaysia. Do you know the bird swiftlet? The birds mostly found in Asia such as China, Southeast Asia countries such as Malaysia, Vietnam, Indonesia, Thailand, Myanmar, and more. Bird's nest has properties that are very good to the health of the human body. For pregnant women, making bird's nest soup will consistently improve the nutrition and health of infants and pregnant women. If the pregnant woman in labor, this soup will help accelerate the recovery of the body is weak, the body will quickly slim, and overall help maintains health and beauty. If the newborn is given a bird's nest soup is the soup dissolves into the milk, it will add to the health of the baby or add shortcomings there are in the body of the baby. Six-month-old baby, bird's nest soup if dissolving into mush, it helps stimulate the brain, increase appetite baby to eat, and help digestion, and constipation. Mix sugar cubes into a bird's nest soup in food for the baby porridge. For children, making bird's nest soup is consistent will provide many benefits to their bodies, for example, strengthen immunity, improve metabolism, and strengthen various body functions. Bird's nest soup nourishes very nice to women, for example, beautify and soften the skin, and maintains a timeless beauty. Moreover, if women have busy work, stress, tired, soup is capable of restoring enthusiasm and strength. Bird's nest is rich in antioxidants, high protein content, amino acids, containing six hormones which are important to humans such as testosterone and stradiol. In addition, according to experts, this bird's nest also contains a number of carbohydrates and fats. 5. Reduce a cough, asthma, influenza, and throat infections and many other diseases. 8. The food was very good for smokers, reduce the effects of nicotine, and attack cancer. Even so, the bird's nest is very expensive health food. If you want a bird's nest, make sure you buy from the cooperative bird's nest to get a good price. In Malaysia, bird's nest business is very lucrative because of the high demand in Asia and Southeast Asia market. Residents in Sarawak, Malaysia, willing risking their lives to get the bird nests in caves that there are in the country because of very high prices in the market. According to reliable sources, they find bird nests are very worthwhile because they are able to earn thousands of Ringgit in one day.
0.937228
What is Bereavement Counselling or Grief Counselling and how could it help me to cope better? Any of these can lead to a loss of sense of self or identity which can be very painful and distressing. The reactions and time taken to mourn differ widely from person to person. Some people turn anger in towards themselves and the world. Some withdraw into themselves while others become numb and stop reacting to what goes on around them altogether. At times when grief is prolonged it can turn into something of serious concern, such as deep depression. Many people refer to the bereavement period as “recovery time”, which is a bit of a misnomer. Recovery implies that the mourning person will eventually return to being the way they were before the loss. In fact loss, like every event that takes place in our lives, reshapes us, bringing change and growth. Bereavement and grief are about dealing with the loss, adjusting and doing the best to move on with and forward in life. We can never go back to being exactly the way we were before, even if we wish we could. • Neglecting oneself – losing all interest in personal hygiene and appearance; people who used to be well put together and look smart, suddenly overlook even brushing their teeth. • Losing appetite, not eating properly. As a direct consequence, the person’s health begins to deteriorate, adding more challenges to their life. • Not being able to perform any tasks. Even the simplest things seem impossible. The person stops meeting friends, talking on the phone, neglects their spouse, children or pets. Some go as far as leaving the job they used to love and giving up hobbies, preferring to stay in bed or sit on the couch for extended periods. • The feeling that life without the lost person or thing is not worth living. Believing life will never get any better, completely isolating themselves from others, suicidal thoughts. • Is the person suddenly drinking much more than before, using illegal substances or gambling? • Is the person acting more impulsively? • Is the person having any suicidal thoughts? • Is he or she beginning to act violently, either verbally or physically? • Help the person in need acknowledge the loss; acknowledging fully that the loved one or thing has gone and will never be part of their lives other than in memory. • Help the grieving person identify and express their feelings, be they guilt, shame, anger, anxiety, fear, sorrow or anything else. • Work with the person on reshaping a life without the deceased – admitting and committing to the fact that no matter how loved that person was, life has to go on in absence as there are other people who deserve attention and love, other things in which time and energy are worth investing. • Identify and explore areas that could prevent the person from moving on. • Offer support in dealing with emotional conflicts that may arise during the grieving process. • Offer support in adjusting to the new sense of self. • Address suicidal thoughts if they are present. Grief counselling can be carried out in individual therapy sessions or group therapy, in person, on the phone, through video calling, email or live chat. Regardless of the form it takes, therapy helps the grieving person to reach a point where life feels normal again, no matter how long that may take.
0.934883
A complex of heathland and acidic grassland, this site comprises the most northerly heathland communities on the Tertiary deposits of Dorset. There is considerable variety of vegetation with dry and wet heath, bog and grassland, subject to differing management and with great species-richness, including many plants and animals which are local and rare. On much of the higher ground soils drain freely and support dry heath dominated by Heather (Calluna vulgaris) with Dwarf Gorse (Ulex minor) and Bell Heather (Erica cinerea).In contrast on the prominent hillock at King Barrow Dwarf Gorse is replaced by Western Gorse (Ulex gallii) , which is unusual on the eastern Dorset Heaths. In both areas stands of Common Gorse (Ulex europaeus) and Bracken (Pteridium aquilinum) occur. The dry heath grades into wet heath where Cross-leaved Heath (Erica tetralix) , Purple Moor-grass (Molinia caerulea) and the bog mosses (Sphagnum compactum) and S. tenellum are frequent. In the wettest places Bog Asphodel (Narthecium ossifragum) is frequent, together with several species of Sphagnum including (S. papillosum) and the local (S.magellanicum) .Brown Beak-sedge (Rhynchospora fusca) , a nationally scarce plant, and White Sedge (Carex curta) , a species rare in southern Britain, are also present. Some of the heaths are grazed and additional characteristic species here include Petty Whin (Genista anglica) , Meadow Thistle (Cirsium dissectum) , Marsh Lousewort (Pedicularis palustris) and the nationally scarce Yellow Bartsia (Parentucellia viscosa). At the western end of the site the heath is replaced by acidic grassland.Although heathers are present, the sward is dominated by grasses such as Molinia, Heath Grass (Danthonia decumbens) , Sweet Vernal-grass (Anthoxanthum odoratum) and bent grasses (Agrostis spp). At least seven sedge species occur,with local species such as Flea Sedge (Carex pulicaris) and Pill Sedge (C. pilulifera) present. Extensive stands of Marsh and Heath Spotted Orchids (Dactylorhiza spp) occur and the local Pale Butterwort (Pinguicula lusitanica) is present. The site supports the most northerly populations in Dorset of two rare and protected reptiles Sand Lizard (Lacerta agilis) and Smooth Snake (Coronella austriaca).Dartford Warbler (Sylvia undata) pictured and Nightjar (Caprimulgus europaeus) also breed on this heathland and several of the rarer heathland invertebrates are recorded. These include two Red Data Book species,Heath Grasshopper (Chorthippus vagans) and Large Marsh Grasshopper (Stethophyma grossum), as well as Bog Bush-cricket ( Metrioptera brachyptera) , Small Red Damselfly (Ceriagrion tenellum) and the butterfly Silver-studded Blue (Plebejus argus), 3 nationally scarce insects.
0.994345
To come up with a good online marketing strategy, you will require enough time. It requires proper understanding of how respective strategies work, how to initiate them, and at what moment to test progress. You should never engage in social media campaigns simply because others are doing it. To get more from any online marketing effort, you will need a good strategic approach. The following are 5 important things to do before implementing any online marketing strategy. Before you can start with any online marketing campaign, make sure to pinpoint the targeted audience. Who do you want to get your services, product, or message to? This is critical in selecting the channels to reach and influence the target audience. For example, if you intend to sell digital downloads to young people between 20-25 years; you will need to understand their social media activities and come up with an appropriate business app. Having selected the target audience, it is important to work out on the right personas. A persona is a representation of the target audience. It requires a name, job title, interests, hobbies, and age range. This is a method of tagging an identity to the target audience so that you can generate the ideal content in every online effort. The secret of coming up with an appropriate persona is using real customers. To understand the characteristic of your audience, visit their social media profiles or use Google Analytics to capture their characteristics. To be successful in any marketing strategy, the objective of the business website must be very clear. Many are the times when people are simply interested in getting top ranking by Google. However, you should establish whether your business is interested in selling products, generating leads, or enquiries about your product. Once the objective of the website is clear, you can now set out selecting the right channel to utilize. One thing that must be clear to you from the first moment is that online marketing is not free. To keep getting results, you will need to invest a lot in time and money. While it is true that you can go to some extent with paid advertising such as Pay-Per-Click among others, your failure will start immediately you stop investing. Get a budget that is manageable and select channels that can assist you to get the highest value for money. The last step in your online strategy is selecting the right channels. Here, all the info you have gathered is put into use to identify the right channel that will deliver results. The most popular digital marketing channels include social media marketing (Twitter, Facebook, and LinkedIn), content marketing, social media marketing, and SEO. For example, you can create a blog for the business website, share it on Facebook and expand in the form of videos for YouTube channel to get the message across. Once you have selected the right channel and initiated various activities, make sure to use online analytics such as Google Analytics to analyze traffic and keep improving from time to time. One thing that must be very clear is that for a digital strategy to work, you must be willing to learn, keep improving, and work hard all the time.
0.957526
As a first-time investor, you might be faced with the common dilemma of whether you should invest in commercial or residential property. While many newbie investors think that residential investment is a safer choice, the truth is that commercial real estate offers a significantly higher rental yield than its residential counterpart and can be a highly rewarding form of investment when done correctly. Here is a comparison of investing in commercial vs. residential real estate. 1. Investment cost: The upfront investment cost of commercial property is higher than that of residential property, but the payoff is much better in the long run. 2. Capital appreciation: A commercial property in a prime location is likely to remain in demand and appreciate steadily regardless of the market conditions. This also makes it a fairly risk-free investment. 3. Rental yield: Commercial property serves as a source of regular and sizeable rental income. The rental yield on commercial property is significantly higher than that of its residential counterpart. The rental value of commercial property also increases with capital appreciation. 4. Tax benefits: As a homeowner, you can avail of certain tax concessions, which may or may not be associated with the purchase of commercial property. 5. Lease period: The lease agreements for commercial properties are typically signed for a period of 5 years at a time (as opposed to 1 year in the case of residential property) and include the clause of a marginal increase in rent every year, irrespective of the market conditions. This guarantees regular and increasing rental income, without the hassle of looking for a new tenant every year. 6. Possession: Residential property comes with the risk of delay in delivery and possession, which is less likely to happen with commercial property. 7. Repairs and maintenance: The cost of maintenance and repairs must be borne by the homeowner in case of residential property, whereas these costs are borne by the tenant in the case of commercial property. 8. Tenant profile: Commercial properties in a good location attract reputed tenants, such as banks, retail chains, known brands and business houses. This further enhances the visibility and value of the property. Tenant profiles for residential properties are unregulated. 9. Loan advantages: It is much easier to get a loan sanctioned for a commercial property than it is for a residential property. You can also opt for hedge funds and other methods of financing the property. Whether you are a first-time buyer, seasoned investor or business owner, you can benefit in many ways by choosing to invest in commercial property over residential property. Make an auspicious beginning this festive season by investing in Ganga Trueno, a premium commercial property for sale in Viman Nagar, Pune. Explore state-of-the-art office spaces in Viman Nagar, Pune, at Ganga Trueno.
0.969684
Out there ... Who says million-dollar properties in Greenwich aren't selling? Grammy Award-winning pop star Justin Timberlake thinks differently. Seems that the former lead singer of 'N Sync and boy toy of actress Jessica Beil recently purchased a sprawling home in backcountry Greenwich. I wonder which golf course he's looking to play on? Scene "¦ Katonah, N.Y., resident Martha Stewart, founder of media and merchandising company Martha Stewart Living Omnimedia, was seen in the audience at Just Books in Old Greenwich on Tuesday evening at a book-signing for best-selling author and Westport resident Jane Green. Green introduced her latest novel, "Dune Road," which is set in an exclusive beach community in a Connecticut town. Scene "¦ Stamford resident and actor Gene Wilder and his wife Karen were seen having dinner at La Cremaillere Restaurant in Banksville, N.Y., recently. Also seen was Bedford, N.Y., resident Clive Davis, of Arista Records/J Records/Sony Music Entertainment, who directs the careers of Whitney Houston, New Canaan resident Harry Connick Jr., and Rod Stewart, to name a few. Golf champion Gary Player, "The Black Knight," was seen having dinner there on Tuesday night, talking with Westport resident and sports commentator Jim Nantz, who stopped by his table to say hello. Also dining on that same night was high-profile attorney and Armonk, N.Y., resident David Boies with his family and friends. Out there "¦ Leonards New England antique furniture and home furnishings in Westport is responsible for selling President Barack Obama and Michelle their White House bed, a 19th-century, antique, tiger maple, four-poster bed. Owner Jeff Jenkins has sold furniture to many a celebrity, including Westport resident and actress Joanne Woodward, Martha Stewart, Bedford resident and designer Ralph Lauren and actor Tom Cruise. Scene "¦ New Canaan resident and singing/songwriting icon Paul Simon was seen having dinner with friends at Sole Restaurant in New Canaan on Monday. Also seen dining there on Thursday evening was New Canaan resident and NBC Nightly News anchor Brian Williams with his family. Out there "¦ Old Greenwich resident and television news executive Albert Primo's book, "Eyewitness Newsman," is used in the advanced writing classes at Rutgers University taught by Professor Ben Davis as a teaching text every semester. Barnes &amp; Noble operates the bookstore at Rutgers and orders 15 copies each semester. Primo is executive producer and founder of "Teen Kids News," which airs on more than 200 stations throughout the United States, and more than 170 countries. Scene "¦ South Salem, N.Y., resident and actor Stanley Tucci was seen having lunch with his children at Terra Ristorante on Greenwich Avenue last week. Scene... Some of the stunning jewelry and accessories that anchor Deborah Norville, host of "Inside Edition" on CBS, is sporting lately on television comes from Stamford-based Agabhumi, the Best of Bali. Norville's stylist fell in love with the line recently and asked for samples. Regina Kirshbaum, Agabhumi's owner and creative mind, sent piles of goodies. Out there "¦ Grammy Award-winning singer and blues guitarist Robert Cray will perform at The Klein Memorial auditorium on Fairfield Avenue on Friday. For tickets, call 203-259-1036 or e-mail fairfiedtheatre.com.
0.938707
Studio sessions are versatile and useful in many ways. Some may say these types of images with simple back drops are traditionally seen in studios handling family photography, but there are a number of reasons and ways to justify a setting that does not have a busy background. 1. Okay, so we've already identified family photos with simple back drops. Yes, especially when getting annuals, and printing them for display in homes, white, gray and even black backdrops may provide consistency through the years. 2. Senior portraits are often captured outdoors, although a high school student may prefer a studio setting over the natural light outdoors when given a choice. Some photographers may offer packages that allow and provide both types of photography in celebrating this monumental occasion. 3. Studio sessions are also great for headshots and images that will be used for LinkedIn, websites, and business cards. 4. Additionally, dance and sports teams prefer to have packages with combinations of self portraits as well as team photos in their uniforms. 5. Even more, studio sessions are great for product photography opportunities, which may or may not include a model's hand or leg, but primarily focus and hone in on the product or idea of a service being purchased and enjoyed.
0.999996
Article: Is fully automatic bond testing possible? A great strength of the established Condor Expert software is that it is completely open, allowing you to easily customize it for the widest range of tests. For more standard applications the Condor EZ software features onboard graphics and intelligent wizards, providing intuitive operator control. It ensures complete documentation of the test protocol, provides preset configurations and simple, intuitive operator screens, making it ideal for the production environment. The more capable and flexible options are still there should you need them, but they can be hidden for day to day use. The Condor software provides sophisticated SPC software. It has multiple user definable tables that can be used as SPC grouping levels for storing measurements. Control rules can be defined and used for real-time monitoring of the measurement data. Furthermore it offers comprehensive statistical information for analyzing the complete production process, including different types of graphs that can be viewed on screen or printed in a report. A major software feature is the capability of the Condor software to provide real three-dimensional automatic testing. Automatic test procedures are created and maintained through the engineering level, while operators can start automation just by a single click. Numerous features can be used for optimal customization to fully suit the requirements. For example: the input of variable data of the test sample, or the automatic generation of data extraction through print-out and/or export. One of the most important parts in all software that collects data like the Condor software, is the possibility to extract measurement data in several ways. The Condor software is able to export data in other formats such as PDF, XML, CSV and the Windows clipboard for use in other applications. If required, the software is made to hook-up with an existing SPC server, to provide the measurement data through RS-232 or network format. Did we catch your attention? Please contact us for more information or to request a demonstration or a quotation. Click here to download the flyer on our patented Self Aligning Shear Solution (PDF). Please contact us if you have any special requirements. Click here to download the "Condor 150HF flyer" (PDF).
0.764213
The company was incorporated on 29 December 1945, in Amalner a small town in Jalgaon district by Mohamed Premji as 'Western India Palm Refined Oil Limited', later abbreviated to 'Wipro'. It was initially set up as a manufacturer of vegetable and refined oils in Amalner, Maharashtra, India under the trade names of Kisan, Sunflower and Camel. The company logo still contains a sunflower to reflect products of the original business. The year 1980 marked the arrival of Wipro in the IT domain. In 1982, the name was changed from Wipro Products Limited to Wipro Limited. Meanwhile, Wipro continued to expand in the consumer products domain with the launch of "Ralak" a tulsi-based family soap and "Wipro Jasmine", a toilet soap. In 1988, Wipro diversified its product line into heavy-duty industrial cylinders and mobile hydraulic cylinders. A joint venture company with the United States' General Electric in the name of Wipro GE Medical Systems Pvt. Ltd. was set up in 1989 for the manufacture, sales, and service of diagnostic and imaging products. Later, in 1991, tipping systems and Eaton hydraulic products were launched. The Wipro Fluid Power division, in 1992, developed expertise to offer standard hydraulic cylinders for construction equipment and truck tipping systems. The market saw the launch of the "Santoor" talcum powder and "Wipro Baby Soft" range of baby toiletries in 1990. In 1995, Wipro set up an overseas design centre, Odyssey 21, for undertaking projects and product developments in advanced technologies for overseas clients. Wipro Infotech and Wipro Systems were amalgamated with Wipro in April that year. Five of Wipro's manufacturing and development facilities secured the ISO 9001 certification during 1994–95. In 1999, Wipro acquired Wipro Acer. Wipro became a more profitable, diversified corporation with new products such as the Wipro SuperGenius personal computers (PCs). In 1999, the product was the one Indian PC range to obtain US-based National Software Testing Laboratory (NSTL) certification for the Year 2000 (Y2K) compliance in hardware for all models. Wipro Limited joined hands with a global telecom major KPN (Royal Dutch telecom) to form a joint venture company "Wipro Net Limited" to provide internet services in India. The year 2000 was the year Wipro launched solutions for convergent networks targeted at Internet and telecom solution providers in the names of Wipro OSS Smart and Wipro WAP Smart. In the same year, Wipro got listed on New York Stock Exchange. In early 2000 Wipro Vice Chairman Vivek Paul and Azim Premji approached KPMG Consulting Vice Chairman Keyur Patel and CEO Rand Blazer to form an mega-outsourcing joint venture between the two organizations.. In February 2002, Wipro became the first software technology and services company in India to be certified for ISO 14001 certification. Wipro also achieved ISO 9000 certification to become the first software company to get SEI CMM Level 5 in 2002. Wipro Consumer Care and Lighting Group entered the market of compact fluorescent lamps, with the launch of a range of CFL, under the brand name of Wipro Smartlite. As the company grew, a study revealed that Wipro was the fastest wealth creator for 5 years (1997–2002). The same year witnessed the launch of Wipro’s own laptops with Intel's Centrino mobile processor. Wipro also entered into an exclusive agreement with the owners of Chandrika for marketing of their soap in select states in India. It set up a wholly owned subsidiary company viz. Wipro Consumer Care Limited to manufacture consumer care and lighting products. In 2004 Wipro joined the billion dollar club. It also partnered with Intel for i-shiksha. The year 2006 saw Wipro acquire cMango Inc., a US-based technology infrastructure Consulting firm Enabler, and a Europe-based retail solutions provider. In 2007, Wipro signed a large deal with Lockheed Martin. It also entered into a definitive agreement to acquire Oki Techno Centre Singapore Pte Ltd (OTCS) and signed an R&D partnership contract with Nokia Siemens Networks in Germany. Wipro entered into the technology business in 1981 and has over 140,000 employees and clients across 54 countries. IT revenues were at $7.1 billion for the year ended 31 March 2015, with a repeat business ratio of over 95%. Wipro Consumer Care and Lighting (WCCLG), a business unit of Wipro Limited operates in the FMCG segment dealing in consumable commodities. Established in 1945, its first product was vegetable oil, later sold under the brand name "Sunflower Vanaspati". It sells personal care products, such as Wipro Baby Soft and Wipro Safewash, toilet soaps Santoor and Chandrika as well as Yardley. It sells lighting products, including Smartlite CFL, LED, and emergency lights. Through product sales and acquisitions, Wipro Consumer Care and Lighting has grown steadily in the FMCG segment. Wipro Infrastructure Engineering is the hydraulics business division of Wipro Limited and has been in the business of manufacturing hydraulic cylinders, truck cylinders, and their components and solutions since 1976. This division delivers hydraulic cylinders to international OEMs and represents the Kawasaki, Sun Hydraulics and Teijin Seiki range of hydraulic products in India. It has entered into partnerships Kawasaki and aerospace giant EADS. In 2010 Wipro Infrastructure Engineering was the second largest independent manufacturer of hydraulic cylinders in the world. Wipro GE Medical Systems Limited is Wipro’s joint venture with GE Healthcare South Asia. It is engaged in the research and development of advanced solutions to cater to patient and customer needs in healthcare. This partnership, which began in 1990, today includes gadgets and equipment for diagnostics, healthcare IT solutions and services to help healthcare professionals combat cancer, heart disease, and other ailments. There is complete adherence to Six Sigma quality standards in all products. Wipro has been ranked 1st in the 2010 Asian Sustainability Rating (ASRTM) of Indian companies and is a member of the NASDAQ Global Sustainability Index as well as the Dow Jones Sustainability Index. In November 2012 Guide to Greener Electronics, Greenpeace ranked Wipro first with a score of 7.1/10. Listing: Wipro's equity shares are listed on Bombay Stock Exchange where it is a constituent of the BSE SENSEX index, and the National Stock Exchange of India where it is a constituent of the S&P CNX Nifty. The American Depositary Shares of the company are listed at the NYSE since October 2000. Shareholding: On 30 September 2013, 73.51% of the equity shares of the company were owned by the promoters: Azim Premji, his family members, partnership firms in which he is a partner and Trusts formed by him/his family. The remaining 26.49% shares are owned by others. At the end of December 31, 2015, its employee strength was 170,664. Abid Ali Neemuchwala was appointed as Wipro's CEO after T. K. stepped down in early 2016. In May 2016,it was ranked 755th on the Forbes Global 2000 list. Wipro was ranked 2nd in the Newsweek 2012 Global 500 Green companies. Wipro received the 'NASSCOM Corporate Award for Excellence in Diversity and Inclusion, 2012', in the category 'Most Effective Implementation of Practices & Technology for Persons with Disabilities'. In 2012, it was awarded the highest rating of Stakeholder Value and Corporate Rating 1 (SVG 1) by ICRA Limited. It received National award for excellence in Corporate Governance from the Institute of Company Secretaries of India during the year 2004. In 2014, Wipro was ranked 52nd among India's most trusted brands according to the Brand Trust Report, a study conducted by Trust Research Advisory. In March 2015, Wipro has been recognized as the world’s most ethical company by US-based Ethisphere Institute for the fourth consecutive year. Wipro won Gold Award for ‘Integrated Security Assurance Service (iSAS)’ under the ‘Vulnerability Assessment, Remediation and Management’ category of the 11th Annual 2015 Info Security PG’s Global Excellence Awards. 1 2 3 "Wipro: From a vegetable oil maker to an IT major". NDTV Profit. Retrieved 15 November 2013. 1 2 3 4 5 6 "Wipro Financial Statements 2016". Wipro Ltd. ↑ "Premji, chairman of Wipro Ltd, presents quarterly results". Yahoo Finance India. 10 February 2013. ↑ "Wipro's bagful of ideas". Business Today. 29 November 2009. ↑ "Wipro Ltd. - Company Information". The New York Times. Retrieved 17 November 2013. ↑ "Wipro falls 12% as stock adjusts to demerger". The Hindu. 12 April 2013. Retrieved 17 November 2013. 1 2 3 4 "Company History of Wipro". Money Control. Retrieved 15 November 2013. ↑ "Billionaire Profile: Azim Premji". Mens XP. 1 2 "Wipro acquires 45 per cent of Wipro Net from KPN Telecom". The Financial Express. Archived from the original on 22 May 2013. ↑ "Company profile for Wipro". Reuters. 1 2 3 "Company History — Wipro". The Economic Times. Economic Times. Retrieved 17 November 2013. ↑ "Corporate Round-up". Capital Market. 2 May 1999. Retrieved 17 November 2013. ↑ "In brief". The Financial Express. 16 February 1999. Retrieved 15 November 2013. ↑ "Wipro releases WAP solutions". The Hindu. 16 June 2000. Retrieved 17 November 2013. ↑ "Wipro lists on NYSE with marginal premium". 19 October 2000. Retrieved 16 July 2013. ↑ "Wipro Tech gets ISO 14001". Business Line. 9 February 2001. Archived from the original on 12 November 2013. Retrieved 17 November 2013. ↑ "Wipro world's first to achieve level 5 in people's assessment". Rediff. ↑ "Software Engineering Institute". The Economic Times. ↑ "Wipro Lighting launches new range". Business Line. Archived from the original on 12 November 2013. ↑ "Wipro Is Fastest Wealth Creator For 5 Years: Study". The Financial Express. ↑ "Wipro is biggest wealth creator during 1998-2003: Study". Business Line. ↑ "Acer, Wipro laptops have new wi-fi chips". Business Line. ↑ "Wipro To Market Chandrika Soap in Select States". The Financial Express. ↑ "Wipro buys lease rights of Chandrika soap". Business Standards. ↑ "Wipro to set up consumer care unit in Himachal". Business Standards. ↑ "Wipro joins billion dollar club, announces 2:1 bonus shares". The Hindu. ↑ "Wipro and Intel launch 'I-Shiksha' solution". The Economic Times. ↑ "Wipro, Intel Join Forces to Launch i-shiksha". Channel Times. ↑ "Wipro buys US-based cMango for $20M". Business Line. ↑ "Wipro bags US consulting co cMango". The Economic Times. ↑ "India's Wipro acquires Enabler". CNET News. ↑ "Lockheed Martin, Wipro To Light Ambar Jyoti in India". EFYTimes. 1 2 "Wipro, Lockheed Martin start ops in Gurgaon". The Economic Times. ↑ "Wipro to Acquire Oki's Wireless Chip Design Arm". PC World. ↑ "Wipro to manage R&D for Nokia Siemens". Reuters. ↑ "Wipro to buy Nokia Siemens R&D unit in Berlin". EE Times Asia. ↑ "The Inside Story of Azim Premji's Next Billion Dollar Plan". Forbes. ↑ Rahul Sachitanand (February 7, 2010). "Stable, yet supple". Business Today. ↑ "Wipro buys part of SAIC IT business for $150 mn". The Economic Times. ↑ "India's Wipro to buy SAIC energy tech biz for $150 mln". Reuter. ↑ "Wipro to acquire Australia's Promax Applications Group for Rs 192 crore". The Economic Times. ↑ "Wipro to buy analytics firm Promax for $36 mn". Business Standard. ↑ "Top 10 Employers" (PDF). H-1B Temporary Visa Program — Selected Statistics, FY 2012. OFFICE OF FOREIGN LABOR CERTIFICATION. Retrieved 9 June 2013. ↑ "Wipro hives off non-IT business into separate company". The Economic Times. 1 November 2012. Retrieved 15 November 2013. ↑ "Wipro's Scheme of Arrangement for Demerger Effective from March 31, 2013". Wipro. 2 April 2013. Retrieved 15 November 2013. ↑ "Wipro demerger scheme comes into effect". The Times of India. 2 April 2013. Retrieved 15 November 2013. ↑ "Wipro to demerge non-IT businesses". Business Standard. 1 November 2012. Retrieved 17 November 2013. ↑ "Azim Premji says son Rishad will never be CEO of Wipro". Indian Express. 23 January 2013. Retrieved 16 November 2013. ↑ "Wipro buys Canadian firm Atco I-Tek for $195 million". The Times of India. 18 July 2014. ↑ "Wipro launches iPhone app". The Times of India. ↑ "Results for the quarter and year ended March 31, 2013 under IFRS" (PDF). Wipro. ↑ "Industry, Materials and Utilities". Reuters. ↑ "Wipro Consumer Care & Lighting to launch Glucose tablets". The Economic Times. ↑ "Wipro sees high demand for CFL bulbs". Business Standard. ↑ "Company Overview of Wipro Consumer Care and Lighting Ltd.". Bloomberg BusinessWeek. ↑ "Wipro's Santoor is largest soap brand in South India". The Economic Times. ↑ "Wipro FMCG arm reports 26% rise in revenues on strong demand". The Financial Express. ↑ "Yardley's proof of Wipro's FMCG focus". The Economic Times. ↑ "Company History — Wipro Ltd". The Economic Times. ↑ "Wipro, Kawasaki in talks for hydraulic oil pumps". Business Line. Archived from the original on 5 November 2013. ↑ "Wipro, Kawasaki enter into a joint venture". CIOL. Archived from the original on 7 October 2012. ↑ "Wipro Infrastructure Engineering to set up Rs 50 cr plant in Bangalore". The Economic Times. ↑ "Wipro Infrastructure Engineering ties up with EADS arm". The Economic Times. ↑ "Pumping up the world". Made in India. ↑ "Wipro GE to consolidate healthcare biz". Business Standard. ↑ "About Wipro GE Healthcare". GE Healthcare. ↑ "Six Sigma has worked wonders for Wipro GE". The Financial Express. ↑ "Wipro continues to lead in sustainability disclosures". Business Standard. ↑ "Nasdaq-100 includes Wipro in Global Sustainability Index". Business Line. ↑ "Wipro Named Among World's Most Ethical Companies". EFYTimes. ↑ "Guide to Greener Electronics 18 | WIPRO". Greenpeace. November 2012. ↑ "Scripwise Weightages in S&P BSE SENSEX". BSE India. Retrieved 16 November 2013. ↑ "Download List of CNX Nifty stocks (.csv)". NSE India. Retrieved 16 November 2013. ↑ "Form 20F". SEC.gov. 12 June 2013. Retrieved 17 November 2013. ↑ "Top five takeaways from Wipro Q3 earnings". timesofindia-economictimes. Retrieved 2016-02-25. ↑ "Wipro names Abid Ali Neemuchwala as CEO". The Hindu. 2016-01-04. ISSN 0971-751X. Retrieved 2016-05-22. ↑ "Wipro on Forbes Global 2000". Forbes. May 2013. Retrieved 16 November 2013. ↑ "13 Indian firms in Newsweek's global green; Wipro no.2". Hindustan Times. 27 October 2012. Retrieved 16 November 2013. ↑ "6 ways to ensure inclusivity and diversity at workplaces". Data Quest. 28 January 2013. Retrieved 16 November 2013. ↑ "Wipro in highest category of stakeholder value creation: Icra". Economic Times. 10 February 2004. Retrieved 16 November 2013. ↑ "Corporate governance award for Wipro". The Hindu. 21 December 2004. Retrieved 16 November 2013. ↑ "India's Most Trusted Brands 2014". ↑ "Wipro Voted World's Most Ethical Firm". ↑ "Tata Steel, Wipro among world's most ethical". Hindustan Times. 18 March 2012. Retrieved 16 November 2013. ↑ "Wipro World's Most Ethical company : Ethisphere Institute". indiainfoline.com. 7 March 2013. Retrieved 16 November 2013. ↑ "Wipro won Gold Award for 'Integrated Security Assurance Service (iSAS)'". ↑ "Wipro won 7 awards, including Best Managed IT Services and Best System Integrator in the CIO Choice Awards 2015, India'". Wikimedia Commons has media related to Wipro.
0.999932
Why did the Italians immigrate to Scotland? Never knew about that. Britain was much richer than Italy in the late 19th, early 20th century, so Italians emigrated to Britain for the same reasons as they went to the USA. They went to other parts of the UK as well as Scotland, but I think that proportionately more went to to Scotland than England; I’m not sure why. Italian entrepreneurs filled market gaps, such as for cafes and ice cream parlours. Even today, a lot of the best ice cream parlours and fish and chip shops in Scotland are owned by people of Italian ancestry. Stories are sometimes told of naive emigrants from rural Italy being ripped off by unscrupulous travel agents, arriving in Glasgow or Liverpool, thinking that they are in New York and staying. I suspect that it is more likely that the stories have been exaggerated in the retelling, and that they always knew that they were breaking their journey in Britain, liked it and stayed.
0.970949
Can I stream my app using WiFi or Data? In order to get the best experience, we recommend streaming our app using a reliable WiFi. Many data plans (LTE, 3G, etc.) disrupt the video many times. If you are using an IPhone make sure that the switch to silence your phone in the top left corner is switched to “On” or to be able to hear the ringer. If it is switched to silent, the sound will not play.
0.983605
If I am writing a paper in a foreign language and my works-cited list contains works in more than one language, should labels such as “edited by” be given in the foreign language or in English? Also, should the works-cited-list entry be punctuated according to the rules of the foreign language? The language that you use to describe elements in your works-cited list should be the language that your paper is written in, which should also determine the punctuation used. In other words, if your paper is in Spanish but you cite a work published in English in the works-cited list, use “editado por” instead of “edited by” and follow the rules of Spanish punctuation.
0.94482
Is it the path to salvation or ruination? You make my soul dance to the beats of your heart. Pulls me like the moon pulls the tides. I get lost in the savor of your skin. Where dreams and fantasies reside. Your touch sets me in thunders that engulf me. Your breath makes me vulnerable and passionate to taste the elixir off your lips. To have you and have my heart broken into million pieces a million times. To be wrecked by you again and again. Astrayed to fall back yet again in every course that leads to you. To be sewn by the slaughterer. My path to salvation is the path to ruination.
0.911044
Alicia Reiss Masters is a fictional character appearing in American comic books published by Marvel Comics. She is usually depicted as a supporting character to the superheroes the Fantastic Four and Silver Surfer. Created by Stan Lee and Jack Kirby, she first appeared in The Fantastic Four #8 (Nov 1962). Alicia is a blind sculptor who is able to create incredibly lifelike representations of real people by touch and memory alone; her sculptures of the Fantastic Four and other superheroes are frequently depicted. A caring, sensitive character, she has been a romantic interest and confidante of The Thing, a member of the Fantastic Four who is frequently ashamed of his monstrous appearance. She has also helped explain human life and emotion to the alien Silver Surfer. Actress Kat Green played her in the unreleased The Fantastic Four film from 1994, and then Kerry Washington portrayed her in the 2005 film Fantastic Four and the 2007 sequel Fantastic Four: Rise of the Silver Surfer. The Thing (left) tries to rescue Alicia Masters on the cover to The Fantastic Four #66 (Sept 1967). Alicia is introduced in Fantastic Four #8, along with her stepfather, the supervillain known as the Puppet Master. She initially aids him out of obedience in his first scheme against the Fantastic Four, though she immediately senses the "gentle" and "sensitive" spirit of the Thing when she first feels his palpably monstrous face. Alicia turns on her stepfather when she realizes that he is mad and power-hungry, and accidentally causes him to fall to his apparent death out of a window. A subsequently published story explains that the Puppet Master had been responsible for her permanent blindness, which was caused by an explosion of radioactive clay during his fight with a rival. Alicia Masters pleads with the Silver Surfer for the survival of humanity in Fantastic Four #49 (April 1966). Art by Jack Kirby. Alicia Masters was a recurring character in early issues of Fantastic Four as the love interest of the Thing, serving as a plot device to cause him to resist changing back to a normal human form, for fear that Alicia would not love him as "plain Ben Grimm." The physically vulnerable Masters was also frequently used as a damsel in distress. The character plays an integral role in one of the most acclaimed comic book stories of the Silver Age, "The Coming of Galactus," in Fantastic Four #48–50 (March – May 1966). In that story arc, the Silver Surfer first comes to Earth as a herald to the powerful, world-destroying being Galactus, and crashes into Alicia's apartment after fighting the Fantastic Four. Her passionate pleading with him about the value of life convinces him to reject his master and defend the Earth from destruction. After the Thing chooses to remain on an alien planet where he could change back to human form, Alicia falls in love with the dashing Human Torch, another member of the Fantastic Four. The Thing returns to unhappily attend their wedding. In Fantastic Four #300, Johny Storm and Alicia have their wedding, but it is nearly foiled by the Mad Thinker, the Wizard, and Alicia's stepfather, the Puppet Master. These three villains planned to attack the wedding, but at the last moment Puppet Master stopped them, with the (unwilling) help of Dragon Man. After several months, the Fantastic Four discovers that Alicia was kidnapped and replaced by Lyja, a Skrull espionage agent sent to infiltrate the Fantastic Four and set them up for her handler, Paibok the Power Skrull, to destroy them. The Fantastic Four defeats Paibok and retrieves Alicia. She was taken before Ben broke up with her, and her feelings for Ben never changed. This makes things difficult for both him and Johnny. The two of them had months to resolve things between them. Now Johnny has to come to grips with the fact that the real Alicia never loved him and that Lyja is the woman he loves. Ben has to deal with having gotten over Alicia, only to have her back and in love with him. With her relationships with Ben and Johnny now complicated by Johnny's marriage to 'Lyja' and Ben's prior attempts to resolve his old feelings for her after Lyja's marriage, Alicia subsequently becomes romantically involved with the Silver Surfer and eventually leaves Earth with him, traveling through outer space at his side in an armored suit. Alicia is frequently trusted as a babysitter for Franklin Richards, the son of Invisible Woman and Mr. Fantastic. During the year-long period in which the FF were missing ("Heroes Reborn"), Alicia is seen as his primary caretaker. In a 2007 storyline set in the aftermath of an apparent assassination of Captain America, Alicia designed the memorial to him. Following the events of the 2008 "Secret Invasion" storyline, Alicia is made part of a support group for people replaced by the Skrulls, as she has firsthand knowledge of what it is like being replaced and then returned after a long period of time. After the Fantastic Four have disbanded following the collapse of the multiverse, Peter Parker purchases the Baxter Building to keep it safe until the team are ready to come back together, including a statue of the FF in the entrance hall that was made by Alicia. Ben initially spends some time with the Guardians of the Galaxy, but eventually, after a failed attempt to find the Richards' family in the multiverse, he proposes to Alicia just before the Richards return to Earth. The two marry just as Galactus returns to Earth in Latveria, but Reed reveals that he has actually developed a pocket temporal generator that freezes time everywhere on Earth but a small bubble for four minutes, allowing the rabbi to complete the ceremony and marry Ben and Alicia before they depart to fight Galactus. In the alternate future of the 1999 miniseries Earth X, Alicia has married Ben Grimm. They have two children, Buzz and Chuck, who have Ben's orange-rock skin. Like most of humanity, Alicia has been granted powers due to the release of a mutative agent. In the 2005 storyline "House of M", Alicia is part of the human resistance, struggling against the ruling class of mutants. She has spent some time as a sculptor, J. Jonah Jameson had commissioned one of himself for his home. In the 2007 miniseries Fantastic Four: The End, which depicts a possible future of the Fantastic Four, Alicia is married to Ben Grimm and they have three children and live on Mars, where she uses her sculpture talents for terraforming. The Ultimate Marvel version of the character is introduced into the modern revamp of the Fantastic Four, Ultimate Fantastic Four, in issue #29, where she is a sculpture student at an arts college. She finds a depressed Ben in the park; her simple gesture of friendship instantly places her in mortal danger from Doctor Doom. In A.I.M.'s pocket dimension of Earth-13584, it is mentioned that Alicia Masters is dead. Thing even mistook Moonstone for Alicia at the time when the Dark Avengers were drawn into this pocket dimension. Alicia Masters and the Silver Surfer in the Marvel Action Hour episode, "The Silver Surfer & the Coming of Galactus". Alicia made her animated debut in the 1982 Incredible Hulk series. She appears in the episode "Bruce Banner: Unmasked" where her stepfather gets control of the residents in Metro City, as well as The Hulk. She is the only person of whom he does not make a puppet and assists the Hulk in defeating him. Alicia Masters was a regular character in the 1994-1996 Fantastic Four animated series voiced by Pauline Arthur Lomas. In Fantastic Four: World's Greatest Heroes, Alicia is portrayed as an African-American woman and voiced by Sunita Prasad, keeping some level of visual continuity with the feature film. Alicia Masters appears in The Super Hero Squad Show episode "Blind Rage Knows No Color" voiced by Tara Strong. In the unreleased 1994 film The Fantastic Four, Alicia Masters first live-action appearance was played by Kat Green. Alicia appears in the 2005 film Fantastic Four, where she is played by Kerry Washington. She becomes the love interest of Ben Grimm after the latter's fiancée leaves him following his mutation into the Thing. In a scene in Alicia's studio, Ben notes a number of puppets on the wall, which she says belong to her "stepfather". Washington reprised the role in the 2007 sequel, Fantastic Four: Rise of the Silver Surfer. She serves as Sue Storm's maid of honor. According to Michael Chiklis, Masters and Grimm's relationship would have had a greater focus in the cancelled third installment of the Fantastic Four film series. The character appears in the game based on the movie, voiced by Cree Summer. In the story, the Thing and Mr. Fantastic must rescue her from the Mole Man's minions. On one level of the game, her stepfather, the Puppet Master, brings Egyptian and prehistoric museum exhibits to life to attack the Fantastic Four, as he feels that association with the Thing will be dangerous for Alicia. ^ Sanderson, Peter (2007). The Marvel Comics Guide to New York City. New York City: Pocket Books. p. 11. ISBN 1-4165-3141-6. ^ Fantastic Four #25 (April 1964), p.2. Marvel Comics. ^ Cronin, Brian (February 19, 2010). "A Year of Cool Comics – Day 50". Comic Book Resources CSBG Archive. Retrieved September 29, 2010. ^ "Dearly Beloved," by Roger Stern, John Buscema, and Sal Buscema. Fantastic Four #300 (March 1987). Marvel Comics. ^ Thunderbolts #2. Marvel Comics. ^ Loeb, Jeph (w). Fallen Son: The Death of Captain America #5 (July 2007), p. 3. Marvel Comics. ^ Avengers: The Initiative #20. Marvel Comics. ^ Universe X #1–14 (2000–2001). Marvel Comics. ^ Spider-Man: House of M #3 (2005). Marvel Comics. ^ Fantastic Four: The End #1–4 (2007). Marvel Comics. ^ Ultimate Fantastic Four #29 (2005). Marvel Comics. Alicia Masters at the Grand Comics Database. The Beyonders are a fictional enigmatic higher-dimensional race appearing in American comic books published by Marvel Comics. Fantastic Four, also known as Fantastic Four: The Animated Series, is the third animated television series based on Marvel's comic book series of the same name. Airing began on September 24, 1994, until ending on February 24, 1996. The series ran for two seasons, with 13 episodes per season, making 26 episodes in total. Fantastic Four (stylized as Fantastic 4) is a 2005 superhero film based on the Marvel Comics team of the same name. It was directed by Tim Story, and released by 20th Century Fox. The film stars Ioan Gruffudd, Jessica Alba, Chris Evans, Michael Chiklis, Julian McMahon and Kerry Washington. This was the second live-action Fantastic Four film to be filmed. A previous attempt, titled The Fantastic Four, was a B-movie produced by Roger Corman that ultimately went unreleased. Fantastic Four was released in the United States on July 8, 2005. It received mixed reviews but was a commercial success. A sequel, Fantastic Four: Rise of the Silver Surfer, was released in 2007. A reboot was released in 2015. The Human Torch (Johnny Storm) is a fictional superhero appearing in American comic books published by Marvel Comics. The character is a founding member of the Fantastic Four. He is writer Stan Lee and artist Jack Kirby's reinvention of a similar, previous character, the android Human Torch of the same name and powers who was created in 1939 by writer-artist Carl Burgos for Marvel Comics' predecessor company, Timely Comics. Like the rest of the Fantastic Four, Jonathan "Johnny" Storm gained his powers on a spacecraft bombarded by cosmic rays. He can engulf his entire body in flames, fly, absorb fire harmlessly into his own body, and control any nearby fire by sheer force of will. "Flame on!" which the Torch customarily shouts when activating his full-body flame effect, has become his catchphrase. The youngest of the group, he is brash and impetuous in comparison to his reticent, overprotective and compassionate older sister, Susan Storm, his sensible brother-in-law, Reed Richards, and the grumbling Ben Grimm. In the early 1960s, he starred in a series of solo adventures, published in Strange Tales. Human Torch is also a friend and frequent ally of the superhero Spider-Man, who is approximately the same age. Jay Underwood played him in the unreleased 1994 film The Fantastic Four; Chris Evans portrayed him in the 2005 film Fantastic Four, and its 2007 sequel Fantastic Four: Rise of the Silver Surfer; and Michael B. Jordan portrayed him in the 2015 film Fantastic Four. Kat Green born as Kathryn Greenblatt is an American actress, composer, producer and writer. She's best known for being the first woman to play Marvel Comics' Alicia Masters in The Fantastic Four in 1994, directed by Oley Sassone and co-produced by Roger Corman. Kerry Marisa Washington (born January 31, 1977) is an American actress. From 2012 to 2018, Washington has gained wide public recognition for starring in the ABC drama Scandal, a Shonda Rhimes series in which she played Olivia Pope, a crisis management expert to politicians and power brokers in Washington, D.C., and also is a producer. For her role, she has been nominated twice for a Primetime Emmy Award for Outstanding Lead Actress in a Drama Series, Screen Actors Guild Award for Outstanding Performance by a Female Actor in a Drama Series, and a Golden Globe Award for Best Actress in a Television Series. Washington is also known for her roles as Della Bea Robinson, in the film Ray (2004), as Kay in The Last King of Scotland (2006), as Alicia Masters in the live-action Fantastic Four films of 2005 and 2007, and as Broomhilda von Shaft in Quentin Tarantino's Django Unchained (2012). She has also starred in the independent films Our Song (2000), The Dead Girl (2006), Mother and Child (2009) and Night Catches Us (2010). In 2016, she portrayed Anita Hill in the HBO television film Confirmation, for which she was nominated for a Primetime Emmy Award for Outstanding Lead Actress in a Limited Series or a Movie. In April 2014, Time magazine included Washington in its annual Time 100 list. Lyja is a fictional character appearing in American comic books published by Marvel Comics. A Skrull, she possesses the ability to shapeshift into almost any humanoid or animal form. Modifications on her body give her the power to generate energy blasts. The Puppet Master (real name Phillip Masters) is a fictional character and supervillain appearing in American comic books published by Marvel Comics. The Puppet Master uses radioactive clay to make puppets in the likenesses of real people, whom he can then control by attaching the clay puppets to strings and moving them about. Presumably he has some sort of psionic ability that enables him to do this. He has a deep hatred of the Thing, who is romantically interested in his stepdaughter, Alicia Masters. He once tried to take over the world but was thwarted in this effort by the Fantastic Four. Marvel Super Heroes Secret Wars, commonly known as Secret Wars, is a twelve-issue American comic book crossover limited series published from May 1984 to April 1985 by Marvel Comics. The series was written by Jim Shooter with art by Mike Zeck and Bob Layton. It was tied to the same-named toyline from Mattel. Spider-Man and the Fantastic Four is a four-issue comic book limited series published by Marvel Comics. It was published in May - August 2007, written by Jeff Parker and illustrated by Mike Wieringo shortly before his death. Sunita Prasad is a Canadian actress. She has appeared in television series such as iZombie, Bates Motel and UnREAL and also voiced Alicia Masters in Fantastic Four: World's Greatest Heroes. The Fantastic Four was an unreleased 1994 independent superhero film based on Marvel Comics' long-running comic book and features the origin of the Fantastic Four and the team's first battle with the evil Doctor Doom, combining the superteam's origin from The Fantastic Four #1 and Doom's origin from Fantastic Four Annual #2 with original elements. Executive produced by low-budget specialist Roger Corman and Bernd Eichinger (who went on to produce a big-budget Fantastic Four film in 2005), the film was ultimately never released officially, but illegal copies have began circulating after a few years. The Thing (Ben Grimm) is a fictional superhero appearing in American comic books published by Marvel Comics. The character is a founding member of the Fantastic Four. The Thing was created by writer-editor Stan Lee and artist Jack Kirby, and he first appeared in The Fantastic Four #1 (November 1961). The character is known for his trademark rocky appearance, sense of humor, and famous battle cry, "It's clobberin' time!" The Thing's speech patterns are loosely based on those of Jimmy Durante. Actor Michael Bailey Smith played Ben Grimm in The Fantastic Four film from 1994, Michael Chiklis portrayed the Thing in the 2005 film Fantastic Four and its 2007 sequel Fantastic Four: Rise of the Silver Surfer, while Jamie Bell acted the part in Fantastic Four (2015). In 2011, IGN ranked the Thing 18th in the "Top 100 Comic Book Heroes", and 23rd in their list of "The Top 50 Avengers" in 2012. The Thing was named Empire magazine's tenth of "The 50 Greatest Comic Book Characters" in 2008. The Wizard (Bentley Wittman), also known as the Wingless Wizard, is a fictional character, a supervillain appearing in American comic books published by Marvel Comics. He first appeared as an enemy for the Human Torch. Wyatt Wingfoot is a fictional supporting character appearing in American comic books published by Marvel Comics. While having no superpowers, he has spent much time in the company of the Fantastic Four due to his friendship with Human Torch, and his relationship with occasional Fantastic Four member She-Hulk. Wingfoot is an excellent athlete, marksman, hand-to-hand fighter, tracker and animal trainer, and has been of timely help in numerous potentially devastating situations.
0.91873
Are airlines authorised to carry out a background check prior to check-in and deny you boarding? My son reported to the check-in counter at Nairobi Airport to catch a flight to Quito through Amsterdam. He was asked few questions regarding his visa and employment, which he answered. However, he was denied boarding. When he asked why, they said we don't have to give you an explanation and he was asked to leave the airport after cancelling his ticket. The next day, an airline customer service executive told him that they were not happy with his background check. The airline has not stated that visa or travel papers were the issue. When in the check in line he was asked where he has come from. He told them that he had come from DareSalaam and that he was working there with the One Acre Fund and also showed them his Tanzanian resident permit. About his education and he told them that he had graduated from BITS, Dubai with a degree in mechanical engineering. When they asked about his job in Tanzania, he told them that he was the country Logistics Lead. The Kenyan comment that it was odd for an engineer to do logistics. He was then made to step to of the check-in line and asked to wait for the manager who turned up after the counter was closed. After discussing with the person who spoke to him, she said he would not be boarded. When asked on what grounds, she said she does not need to give an explanation. When asked again she said, I am done with you, you may leave the airport, and cancelled his ticket. He had to get a 3 day visa and find a place to sleep in town in the middle of the night. The KLM office in Nairobi the next day told him that his background check had a problem, no mention of visa specifics and problem with the background check was also not shared. He has filed a complaint with the airline. All airlines do maintain a no-fly list, as does the US government (https://www.no-fly-list.com/). If your son's name or a similar name popped up on KLM's list, he would be denied boarding. Unfortunately, there isn't a lot of information how the airlines maintain these lists. It may include checking government records, like the one from the TSA. Running a full background check on each passenger would be prohibitively expensive, but they may very well go through publicly available databases on a regular basis. Whether this is legal or not would depend and what exactly they are actually doing, and this question would be a better fit for https://law.stackexchange.com/questions anyway. Once you're on a list, it's hard to get off, even if you are totally innocent. A friend of mine has a very common English name, which happened to be on the no-fly list of a large airline. Every time he tried to check in, it turned into a huge discussion and headache. He eventually stopped flying with them altogether. Not the answer you're looking for? Browse other questions tagged legal airlines check-in kenya or ask your own question. Why does luggage need to be rechecked across two American carriers?
0.999998
I recently experienced a kundalini awakening, but I don’t really know what it’s for. Could you please talk a little about that? Yes. The kundalini is a very important part of your energy system. This is part of what the training was in the mystery schools: the development of the full energy body and system, including the kundalini. Ultimately, the kundalini is for carrying you into higher dimensions and opening higher centers within you that will be required as you move into those higher dimensions. Sometimes the kundalini is activated spontaneously. Oftentimes when that happens, it is not a full activation; it is a partial activation. A partial activation can happen when the structures or vessels for the kundalini are not fully prepared. This is why a spontaneous kundalini awakening can have challenging effects, such as confusion or disorientation. It is valuable to have a guide or teacher for this kind of process.
0.868848
Is Wireless Charging coming to future OPPO and OnePlus phones? OPPO and OnePlus (Vivo too) operate under the same parent company, and none of their past or present smartphones support wireless charging. That could change in the future as OPPO has been spotted as a member on the Wireless Power Consortium webpage. This is a prerequisite for any manufacturer who wants to enable QI wireless charging on their devices. Members include Apple, Samsung, Huawei, and other notable manufacturers. Now, it is also possible to be a member of the Consortium and not have products supporting QI wireless charging. Or joining the Consortium for a product other than a phone. So, whether future OPPO and OnePlus phones will feature wireless charging or not is yet unknown. Only time will tell. Even though OPPO filed for a 15W fast wireless charging patent recently, OnePlus clearly stated that the company is waiting for the technology to evolve.
0.972588
Will drain camera see whether P-trap is filled with water? I rent in a highrise apartment building. It can take upward of a year when asking the landlord to check for obstructions in the ventilation and/or clean the conduit, e.g., as might be prompted by lots of condensation after showering, leading to mold. I have a sewagy smell in the bathroom, especiallly pronounced when I've kept the bathroom door closed. I fear that it might be the bathtub P-trap, as the sink P-trap was recently cleared of obstruction (after years of slow drainage -- I usually try to find work arounds for as long as possible before imposing on the landlord for servicing). Perhaps there is a leak in the bathtub P-trap, or there is a strand of something that wicks water out. I did not imagine that it would be trivial to pull up the bathtub to inspect this, and shining a flashlight down reveals that the drain pipe immediately dekes horizontally. If online images are any indication, it likely meets a vertical pipe for the overflow, and then curls into a P-trap. Since I anticipate much resistance and delay to a nontrivial request to check the bathtub P-trap, I considered renting a drainage camera to look myself. They're quite expensive, with limited options in my city. Two offerings I found were for $220 and $150 per day. I also found that a hardware chain with continental presence (Canadian Tire) sells a cheap camera for $300 ("MAXIMUM Inspection Camera"). So I might just buy one at twice the cost of renting, which gives me the freedom to re-inspect if necessary. Can such cameras typically see whether the P-trap is water filled, or is there an large uncertainty in their effectiveness? I don't want to blow $300 on a course of action for which there is (say) 50% chance of being able to see the water with some degree of certainty. I found a youtube video alluding to seeing reflection off the water in a P-trap, but frankly, I couldn't make anything out of it. If it takes a highly experienced eye to recognize such a reflection, or otherwise discern whether sufficient water is present, then that reduces the chances of effectiveness of this "solution" for me. Yes, they should get you the answer you seek. It should be plainly apparent whether there's water standing or not. You can buy cameras that do what you need for much less. Note that there is variety in the type and rigidity of the cables, so read carefully. Should a curtain drain be covered/back filled? Trap adapter on wall drain rough in - what is this? Is this flexible drain trap configuration acceptable?
0.999999
Where can I find humidity data for the United States? Your best bet will probably be the daily First Order Summary of the Day (FSOD) from the National Weather Service. It is a dataset of stations primarily within the United States. The earliest record begins in 1869, but the last record is from 1999. The dataset does contain daily minimum and maximum relative humidity values, and other measures of atmospheric moisture, including average wet-bulb temperature and average dew point temperature. Not every station in the dataset will have values for all the listed variables, but you may be able to find enough stations for your needs.
0.999927
A method for enticing users to behave securely in a computing environment. For security related input, such as selection of password, a progress indicator is provided to the user. The progress indicator correlates to the level of security obtained by the user's entry, rather than to the completion of the task. The indicator follows a non-linear function that crosses zero security and maximum expected security for the task. The function starts at shallow slope, increases towards the middle, and then reverts to shallow slop towards the end of the task. The subject invention relates to progress indicators, such as progress bars indicating task progress. The subject invention also relates to methods of encouraging secure behavior, especially secure behavior in electronic communication. Progress indicators, such as progress bars, are well known and widely used, especially in computing environments. Progress bars are used, e.g., to indicate the progress of a file download to a computer or other computing machines, such as handheld units. Such bars generally progress linearly according to the size of the file and the part that has been downloaded up to the indicated point. Progress bars are also used when a user has to perform a given task, so as to indicate the progress of the user towards the completion of the task. Again, such progress indicators generally relate to the part completed, as compared to the total task. Progress indicators may also be used for task relating to security features. For example, a progress bar may be displayed when a user is asked to enter a password. However, using prior art methodology, such progress bars indicate the amount of task that is completed. For example, if the user is asked to enter a password of length between 6-8 characters, the progress bar would linearly advance according to the how many characters the user entered as compared to how many the user must enter. The security derived from cryptographic mechanisms is measured by a work factor k. Here, k corresponds to the length of a cryptographic key or (the entropy of) a password measured in bits. For manual key entry or verification tasks, given a problem with a work factor of k, it is common to assume that an adversary requires 2k units of work in order to breach the security. Alternatively, the adversary's probability of breaching the security is about 2−k in each attempt. User interfaces that require a user to enter a password or to verify two cryptographic keys for equality typically show progress by rendering a linear display of the work factor. This is highly misleading because the displayed progress differs significantly from the actual level of attained security, which is exponential in the work factor. On the other hand, an accurate rendering of the attained security would be frustrating for users as no progress would be visible for the majority of the interactions. FIG. 1A illustrate a progress bar according to the prior art, used for a password generation or key verification task. As is shown, the progress is generated linearly with the data entry by the user. Such a progress bar is beneficial in providing the user an indication of progress in completing the task, but may be misleading with respect to the level of security obtained. For example, according to the illustration of FIG. 1A, the advancement made from 0.25 to 0.625 is more than double, while the security has not doubled while advancing via these steps. FIG. 1B illustrates a progress bar that directly correlates to the level of security attained with the user's input. The bars of FIG. 1B correspond to the bars of FIG. 1A. As can be seen, providing a progress bar that directly correlates to the security level attained may be somewhat puzzling or frustrating to the user, as in the early stage no progress indication would be provided, as the level of security attained is too low to be represented in this scale. Accordingly, there is a need in the art to provide a progress indicator that more properly reflects the level of security attained, as correlated to the task progress. The subject invention provides a solution that occupies a middle ground between progress indicator that is linearly correlated to the task progress and a progress indicator that accurately reflects security progress. The rendering is not completely faithful to either one of the approaches discussed above, but it is meant to entice users to behave more securely than in the linear case without frustrating them, as the exponential case certainly would. According to various aspects of the invention, a method for providing a security progression indication to a user is provided, comprising: selecting maximum expected security level; selecting a non-linear function that crosses zero security level and the maximum expected security level; and generating a security level display that progresses with the user's input according to the non-linear function. The non-linear function may follow an S-curve, The non-linear function may follow a shallow slope at a range adjacent to zero security, an increased slope at mid-range, and reverts to shallow slope at a range adjacent the maximum expected security. The non-linear function may follow a Bezier curve. The non-linear function may be bounded by a linear function and an exponential function representing the work function necessary to breach security. Selecting a maximum expected security level may comprise selecting a plurality of maximum expected levels, and wherein selecting a non-linear function comprises selecting a plurality of non-linear functions, each corresponding to one of the maximum expected levels, and wherein generating the display comprises monitoring the totality of the user's input to determine which of the plurality of non-linear functions should be used to generate the display. The method may further comprise generating a task progress display correlated to the amount of completion of a task by the user. The method may further comprise generating security score display providing an indication of the security level of the user's complete entry with respect to the search space corresponding to the user's complete entry. Generating a security level display comprises generating a progression bar display. Generating a security score display may comprise generating a numerical display. According to other aspects of the invention, a method for encouraging secure behavior in a computing environment is provided, comprising: prompting the user to complete a task by entering a plurality of input characters; defining a zero security level and a maximum security level for completion of the task; selecting a non-linear function that crosses the zero security level and the maximum security level; and monitoring the user's input of characters and in response generating a security level display that progresses with the user's input of characters according to the non-linear function. The task may comprise at least one of: entering a password, generating an electronic key, verify integrity of a code, and verifying authenticity of a code. The non-linear function may follow an S-curve. The non-linear function may follow a Bezier curve. The non-linear function may follow a shallow slope at a range adjacent to zero security, an increased slope at mid-range, and reverts to shallow slope at a range adjacent the maximum expected security. Selecting a maximum expected security level may comprise selecting a plurality of maximum expected levels, and wherein selecting a non-linear function comprises selecting a plurality of non-linear functions, each corresponding to one of the maximum expected levels, and wherein generating the display comprises monitoring the totality of the user's input to determine which of the plurality of non-linear functions should be used to generate the display. The method may further comprise generating a task progress display correlated to the amount of completion of the task by the user. The task progress display may follow a linear function. The method may further comprise generating security score display providing an indication of the security level of the user's complete entry with respect to the search space corresponding to the user's complete entry. Generating a security level display may comprise generating a progression bar display. Generating a security score display may comprise generating a color-coded display. The non-linear function may be bounded between a linear function and an exponential function representing the work function necessary to breach security. Other aspects and features may be apparent from the following non-limiting description of various embodiments of the invention. FIG. 1A illustrates a linear progress bar, while FIG. 1B illustrates a progress bar that directly correlates with the level of security attained. FIG. 2 illustrates a plot of proportional progress vs. proportional user input. FIG. 3 illustrates an embodiment having a progress and security level indicators, according to the invention. FIGS. 4A and 4B illustrate embodiments wherein an indication of the total security achieved is provided in addition to the progress bar. Various embodiments of the invention provide progress indicators that have functional correlation to the level of security attained. The progress indicators according to embodiments of the invention entice a secure behavior by the user, while avoiding frustrating the user. Current security technology may require users to generate passwords, verify two cryptographic keys, produce “randomness” for key generation, etc. Typically, the security derived from n units of work of the user is such that an opponent would have to perform in the order of bn units of work, where b is a suitable base. For instance, if the entropy of an English letter is 1.3 bits and the user enters a password with n letters then it is fair to assume that an adversary must perform in the order of 1.3n units of work in order to break the password by brute force. During the aforementioned tasks, modern systems provide feedback to the user in the form of progress indicators, which are known to be an important and useful interface tool. These progress indicators are meant to indicate the level of security that a user has achieved at any given time so that the user can make an informed trade-off between the amount of work he or she wishes to spend and the desired security level. Therefore, the progress indicator has an influence on the amount of work the user is motivated and willing to spend on the task. It is common to indicate progress by a linear display of the user's work up to a desired maximum. For instance, if 80 bits worth of entropy are desired for a password then for each added letter the progress bar would advance a fraction of 80. However, this suggests to the user that the increase in security is linear in the amount of work he or she spends, which is very misleading. FIG. 2 illustrates a plot of proportional progress vs. proportional user input. The abscissa gives the proportion of work performed by the user towards the desired maximum level of security. The ordinate gives the proportion of security achieved up to the desired maximum level. The linear curve, A, illustrates the prior art linear correlation to user input, while exponential curve B illustrates the progress' correlation to real level of security attained, i.e., the estimated work, k, required to breach security given a base b=2. As can be seen from curve B, illustrating direct correlation to level of security is somewhat impractical, as the user would not see any progress for several steps. Therefore, according to embodiments of the invention, modified correlation is provided to illustrate the progress. For instance, the progress indicator can advance slower in the beginning so that users are less optimistic about the achieved level of security. During the middle, the indicator advances faster in order to keep the user motivated and to feed his or her desire to achieve maximum security. Subsequently, the indicator slows down in order not to overshoot its bounds towards the maximal security level. Notably, it has been proposed in the prior art that providing a “slow-to-fast” progress indicator, e.g., an indicator that initially progresses slower than linear and then accelerates towards the end, is detrimental and causes user disengagement (break off). However, in contrast to such suggestion in the prior art, the inventors of the subject invention propose that using a functional slow-fast-slow progress indicator may lead users to a more secure behavior. Two examples of slow-to-fast functions according to embodiments of the invention are shown in FIG. 2 by graph C1 and graph C2. Graph C1 increases at a rate between that of A and B. After an accelerated growth rate in the middle range, the function plateaus at a level that is similar to A. Thus, the function C1 is generally between the curves representing user input (A) and attacker work to breach security (B). It gives the user a sense that progress is being made toward a reasonable level of security, but does not over represent the level of security attained. By accelerating the progress bar in the middle range, the user will have a sense that rapid progress is being made and that further efforts will pay off in measurably better security. This will encourage the user to continue, leading to better security, although not to the level suggested by A. Graph C2 is similar, except that it actually accelerates to a higher value more quickly than C1, leading to a value in the progress indicator that is even higher than A. For certain users in certain contexts, the closeness to the maximum to be obtained is a strong motivator. The expected benefit of this approach would be to entice users to perform more units of work on average. Since the level of security increases exponentially with the user's work, enticing the user to perform one more unit of work (compared to the prior art case) would double the attained level of security. This in turn would have a positive impact on the bottom-line security for organizations whose security against attacks on their IT infrastructure often depends on the weakest link. In some instances, there may be tension developed between the need to provide the user with an indication of task progress and an indication of security level. In such cases, two indicators may be provided, as illustrated in FIG. 3. In FIG. 3, the top indicator, labeled “progress” indicates a linear relationship to the task completion, while the bottom indicator, labeled “security level” indicates a functional relationship to the level of security attained. As can be understood, embodiments of the invention may use various functions to generate the progression curve that, while may not have a direct functional relation to the security attained, provides the user an apprehension of improved security and entice the user to perform more units of work to achieve higher security. In some embodiments the functions are also designed so as not to convey a “too optimistic” view of the security achieved, i.e., not more optimistic than a linear display, although this is not an absolute requirement, as will be illustrated by curve C2. In the example illustrated in curve C1 of FIG. 2, a Bezier function is used. However, this is just one example of a function that may be used. In general, the curve is an S-shaped curve having a relatively shallow slop at the beginning, increasing slop about the middle section, and shallow slop towards the end. The security measure depends on the expected entropy of each entry. Thus for example, if the password is of 8 characters that together spell an English word, then the search space is much smaller than if the 8 characters were random and did not correspond to an English word. Moreover, if the characters involve numerical characters and random lower case and capital letters, then the search space is much increased and likelihood of a breach is diminished. Various embodiments of the invention resolve this issue in different ways. According to one embodiment of the invention, an expected search space is assumed, and the function is generated according to the expected search space. The expected search space may be determined experimentally, or by using some averaging function of the search spaces available, e.g., averaging of search spaces for random lowercase letters, English words, English words and numbers, random numbers and letters, etc. In this manner, the progress bar would provide an indication of security relative to some expected search field, regardless of the search field of the password generated by the user. According to another embodiment of the invention, several curves are generated, each corresponding to one search space. As the user progresses in its task, different curves may be used as the system learns more about the user's entries. For example, on initial entry it is not clear whether the user will input an English word. Therefore, the random letters space may be used. Then, if the user inputs a number, the function may be changed to that representing search space of letters and numbers, and so on. Similarly, at the start the function corresponding to the expected search space may be used, and as the user progresses a different curve may be used as more information becomes available about the user's chosen password. As can be appreciated, according to embodiments of the invention, the advancement of the progress bar may be correlated not to the progress in the user's completion of the task at hand, but rather according to a function that stimulates secure behavior. The function may be selected according to the entropy ascribed to the user's entries. As characters are entered, the entropy of the character, as related to the increased security or the work it takes to break the code, is used to select the appropriate function for the progression of the progress bar. An apparent disadvantage of such an embodiment is that as more characters are added, the security level may actually go down, resulting in the progress bar reverting to a lower value. For example, if after typing five letters the system recognizes that the letters form an English word, the search space is dramatically reduced and the security drops. Consequently, the maximum attainable security is lower, and the function selected for the progress bar would reflect that. On the other hand, this may further encourage the user to select a more secure password that correspond to a larger search space then the chosen password. With respect to the illustration of FIG. 2, in order to generate the curve according to any of the embodiments of the invention, one may take the origin as zero security, while the maximum value on the y-axis as the maximum security attainable for the requested input. For example, if the requested input is a password of 8 characters, the maximum value on the y-axis would correspond to the security attained by entering 8 random characters, which may include lowercase, uppercase, and numbers. A curve is then fit between these two values (which may be normalized). Then, each entry of the user provides an ε advancement on the curve. According to some embodiments of the invention, the curve is mapped to be between a linear curve, i.e., x+ε→a+ε, and the exponential curve that is characteristic of the increased security, i.e., x+ε→a(x+ε). As noted above, a Bezier curve may be used to generate the progress bar. A way to illustrate the advancement per user input in a somewhat mathematical or formal way would be as follows: where x is the amount of user input and y is the current progress display, the new progress display y′ for additional user input, ε, would be y′ such that (x+ε, y′) is a point on a two-dimensional Bezier curve f from (0,0) to (1,1), where (0,0) represents no security and (1,1) represents the maximum level of security desired for the application. According to yet another example, a progress bar advances according to a function that terminates in expected security. However, once the user completes the entry, the complete password is examined to determine its search space. For example, the entry may be compared to an onboard dictionary. When the search space is determined, the user is given an indication of the security level based on the search space. Examples of such embodiments are shown in FIGS. 4A and 4B. In FIG. 4A, the progress bar advances according to a function according to any of the described embodiments. The security score changes according to the search space of the total entry. Consequently, if the complete entry is an English word, a social security number, a birth date, etc. the score would be lower than if the total entry is composed of random lowercase, upper case, and numbers. In FIG. 4B, the same concept is followed, except that a different color is used to convey security level of the total entry. As can be appreciated, the progress indicator according to the embodiments of the invention progresses according to a non-linear parameterized function that, while not correlates the user entry to the level of security attainable by the completed entry, entices user to invest more units of work in order to achieve higher security. This is in contrast to the prior art, where the progress is linear or correlates to the advancement of completion of the task, rather than to the security attained. The present invention has been described in relation to particular examples, which are intended in all respects to be illustrative rather than restrictive. Those skilled in the art will appreciate that many different combinations of hardware, software, and firmware will be suitable for practicing the present invention. Moreover, other implementations of the invention will be apparent to those skilled in the art from consideration of the specification and practice of the invention disclosed herein. It is intended that the specification and examples be considered as exemplary only, with a true scope and spirit of the invention being indicated by the following claims. c. generating in a computing environment a security level display that progress with the user's input for the password according to the estimated work required to breach security indicated by non-linear function and displaying the security level display on a display device. 2. The method of claim 1, wherein the non-linear function follows an S-curve. 3. The method of claim 1, wherein non-linear function follows a shallow slope at a range adjacent to zero security, an increased slope at mid-range, and reverts to shallow slope at a range adjacent the maximum expected security. 4. The method of claim 1, wherein the non-linear function follows a Bezier curve. 5. The method of claim 1, further comprising generating a task progress display correlated to the amount of completion of a task by the user. 6. The method of claim 1, further comprising generating security score display providing an indication of the security level of the user's complete entry with respect to the search space corresponding to the user's complete entry. 7. The method of claim 1, wherein generating a security level display comprises generating a progression bar display. 8. The method of claim 5, wherein generating a security score display comprises generating a numerical display. monitoring the user's input of characters and in response generating in a computing environment a security level display that progresses with the user input of characters according to the estimated work required to breach security indicated by the nonlinear function and displaying the security level display on a display device. 10. The method of claim 9, wherein the task comprises at least one of: entering a password, generating an electronic key, verify integrity of a code, and verifying authenticity of a code. 11. The method of claim 9, wherein the non-linear function follows an S-curve. 12. The method of claim 9, wherein the non-linear function follows a Bezier curve. 13. The method of claim 9, wherein non-linear function follows a shallow slope at a range adjacent to zero security, an increased slope at mid-range, and reverts to shallow slope at a range adjacent the maximum expected security. 14. The method of claim 9, further comprising generating a task progress display correlated to the amount of completion of the task by the user. 15. The method of claim 14, wherein the task progress display follows a linear function. 16. The method of claim 9, further comprising generating security score display providing an indication of the security level of the user's complete entry with respect to the search space corresponding to the user's complete entry. 17. The method of claim 9, wherein generating a security level display comprises generating a progression bar display. 18. The method of claim 9, wherein generating a security score display comprises generating a color-coded display. Berque, Dave, "Implementing Progress Indicators for Recursive Algorithms," ACM-SAC 93/2/93/IN, USA, 1993, pp. 533-538. Conlan, Richard M., "Improving Interface Designs to Help Users Choose Better Passwords," CHI 2006, Work in Progress, Apr. 22-27, 2006, Montreal, Quebec, Canada, pp. 652-657. Conrad, Frederick, "Impact of Progress Feedback on Task Completion: First Impressions Matter," CHI 2005, Late Breaking Results: Short Papers, Apr. 2-7, 2005, Portland, Oregon, USA, pp. 1921-1924. Myers, Brad, "The Importance of Percent-Done Progress Indicators for Computer-Human Interfaces," University of Toronto, CHI '85 Proceedings, Apr. 1985, pp. 11-17. Yee, Ka-Ping, "Passpet: Convenient Password Management and Phishing Protection," University of California, Berekely, Symposium on Usable Privacy and Security (SOUPS) 2006. Jul. 12-14, 2006, Pittsburgh, PA, USA.
0.999209
Upon completion, you’ll understand various ways to incorporate deep learning techniques to game development. We live in a data-hungry world fueled by the public's desire for high-quality video feeds. Every day, more than a billion cameras capture almost every event around the world. In order to process these video feeds, we need advanced techniques to transform them into actionable analytics. This involves identification, classification, segmentation, prediction, and recommendation. Upon completion, you’ll be able to deploy object detection and tracking networks to work on real-time, large-scale video streams.
0.999537
Are you someone who is a great cook? Do you love watching cooking competitions such as Master Chef and dream to open your own restaurant? Well, it indeed is a great idea to pursue and it is, of course, possible to start your own business. Many people turn to outsourcing online for earning, while others with sufficient funding can turn to businesses such as opening a restaurant. If you are someone who is looking for some information on how to start your own restaurant to make money and you came across this article to look for the relevant information, then you have come to the right place to look for the relevant information! This article will take a look at how to start your own restaurant. Step1: First of all, you will need to determine a particular food concept for your future restaurant. There are various concepts that are available such as: steakhouse that is family style, an upscale cuisine restaurant, ethnic restaurant, fast food etc. The reason you need a food concept for your future restaurant is that it will allow you to understand and determine your customer base. For example: the area where you are planning to open a restaurant, the customers prefer mostly fast food instead of other types of cuisine. In this case, to start your restaurant and achieve a greater customer base, your food concept needs to be that related to fast food. As soon as you plan your food concept, the next thing you need to do is to plan and design your own food menu for your restaurant. At the beginning, you don’t need to plan and put pricing on your meal as you can do it later on. Your food menu will reflect your restaurant, therefore be very careful while designing your menu. Also make sure your menu should be unique than your competitors and this is necessary to stand out than your competitors. Step2: Then you will need to consider the ambience of your restaurant. The ambience of the restaurant is linked to your food menu. A lot of factors will contribute when you are selecting the ambience of your restaurant such as: furniture, dish and glassware, lighting, the uniform of the servers, clientele and music etc to serve your unique visitors to your restaurant. Step3: You will need to plan the serving style and this will depend on the food concept, location and also the customers. Now, there are three types of serving style available that you can consider and these are: quick service serving style, mid scale serving style and upscale serving style. Also another thing that will factor in is the category of your restaurant that falls in. Quick service restaurants such as fast food restaurant offers food menu that are low cost and doesn’t require much time to prepare. Mid scale ones will fall between fast food and upscale restaurant style. Upscale restaurant styles will offer high end menu and best quality meal but at a high price compared to the previous two. Step4: You will then need to research the costs related of starting your new restaurant. You can have talk with other local restaurant owners or those who has restaurant style similar to your plan. Also find out about the rent that is required to pay and how the rent will be paid off, insurance cost and also permit costs of your new restaurant. Step5: Then you will need to craft an effective business plan regarding your restaurant. Describe all the points that you have gathered. Step6: Then you will need to look out for the best location for your restaurant. Location is a very important thing to consider and also the location that you are planning to select should be very convenient to your customers so that it is easy for the customers to get an access to your restaurant. Also make sure you select a location that is adequate in space. Restaurant should not be cramped and also it will not be able to accommodate required customers and also customers do not prefer eating at crammed restaurant. Step7: Then you will need to register your business aka restaurant with a suitable name. The name should be catchy and unique. Also you will need a license for your restaurant. In general, business licenses are granted by the local municipality or the city municipality. This can vary from one place to another. You should also get any additional permits or licenses that are required for your restaurant to open its door. Step8: Then you should get a health inspector to inspect your restaurant who will check whether you have got the required licenses and hygienic space and equipments as well. Step9: then you will need to take a look at the funding sources. Are you funding your restaurant yourself or with another partner? Do you need to take loan from the bank? Etc. Step10: Gather the necessary equipments and hire employees and also spread words about your new restaurant!
0.968008
The rapidly expanding electronics industry requires reliable performance in a variety of environments. The electronics industry is one of the most rapidly expanding industries to date, with endless research and introduction into new applications. Printed circuit boards (PCBs) are found in many domestic, industrial, automotive and military devices, to name but a few. In most of these applications, reliability is essential, even when the device may be subject to harsh conditions such as high humidity, corrosive atmospheres or high levels of dust or contamination. Conformal coatings can be utilised to protect the PCBs from such environments, ensuring optimum performance under the toughest conditions. They are applied as thin films, typically ranging from 25-75µm, and conform to the contours of the board, providing maximum protection with minimum weight or dimensional change to the PCB. This is one of the primary advantages of conformal coatings, particularly with popular trends in miniaturisation and portable devices. There are many types of conformal coating available on the market, each providing a few characteristic properties which make them suitable for particular applications. To distinguish between the different types of conformal coating available a number of tests must be performed on the coating. Therefore, in order to establish the correct test methods, each application must be considered in detail in order to provide information on both the standard operating conditions and possible excursions outside of these parameters. The most common environment that a coating can be subjected to is standard atmospheric conditions. Initial tests are generally conducted to evaluate both the electrical and mechanical performance. Following this the surrounding environment can then be altered to assess the performance of the coating under more severe conditions. Such conditions can include salt mist, high humidity, high temperature and thermal changes either as a gradual rise or decline in temperature or an immediate thermal shock. After exposure to such environments the coating can then be re-tested for its electrical and mechanical properties, determining its suitability for various applications. Typical standards for the electronics industry have developed over the years from specific military or defence standards to industry wide standards required for many different types of application. Some of the most highly regarded approvals include; MIL- 1-46058-C, now superseded by IPC-CC-830B, IEC-61086 and UL746. These refer to the most common methods of testing to simulate the typical use of a conformal coating. Some obsolete standards, such as DEF-STAN 59/47, are also considered important within the industry but newly developed coatings can no longer be approved to these standards. IPC (The Institute for Interconnecting and Packaging Electronic circuits), IEC (International Electrical Commission) and UL (Underwriters Laboratory) are the three main test bodies associated with coatings for (loaded) printed wiring boards. Various industry standards have been carefully developed and updated to assist in understanding the performance of different types of conformal coating in a variety of environments. Most approvals consist of many stages and refer to specific methods for each individual test. These methods are also commonly associated with certain governing bodies such as; ASTM (American Society for Testing and Materials), BSI (EN) (British Standards Institute (European)), DIN (German Institute for Standardisation) as well as various IEC methods. These methods carefully describe the set up parameters required to evaluate a coating and can be used as a basis for all conformal coating testing, allowing for a comprehensive comparison of different chemistries and processes to be conducted. Environmental testing often consists of elevated levels of humidity or salt mist and general changes in temperature. A humid or salt atmosphere is created in a corrosion testing chamber, typically at around 85% humidity, 35˚C and for salt mist, 5% salt. The atmosphere is kept constant within the chamber for a set amount of time. This can vary from 24 hours to a number of weeks depending on the requirements. The surface insulation resistance (SIR) is measured before, during and immediately after environmental exposure. In order to meet industry standards for high humidity environments, a voltage of around 50Vdc is applied to the board during the test and the SIR of the coating should not be lower than 108 ohms for the duration of the test. Thermal testing is designed to simulate all possible scenarios, particularly those in extreme conditions such as military, aerospace or automotive applications. Thermal cycling tests are carried out in one chamber where the temperature is changed at a set rate. The highest specification in industry standards is a rate of change of temperature set at 12⁰C/min, covering a temperature range of approximately -55⁰C to +125⁰C. Thermal shock tests are slightly different, however. In this case, the board is transferred between one chamber set at the lowest temperature to another set at the highest temperature, with no dwell time in between. The flexibility, appearance and SIR are all evaluated following a set number of cycles through either the gradual or shock method. Selection of the most suitable coating for each application is essential to ensure reliability and optimum performance of the device. Other performance testing of conformal coating includes the evaluation of electrical properties. This is essential to all applications of conformal coatings to a printed circuit board, regardless of the environment it is exposed to. Typical tests, also outlined in many of the standards discussed previously, are dielectric strength, surface resistivity, dissipation factor and dielectric constant. Additionally, further specialist properties may be required such as flame retardance and resistance to moulds and fungi, harsh chemicals, UV light or corrosive gases, for example. Due to fairly recent changes in the manufacture of PCBs, another particularly relevant property is the ability of conformal coatings to inhibit the growth of tin whiskers – a subject which is under much review and testing at the moment. In summary, to select the best coating it is imperative that the application is considered in detail, highlighting all possible exposure scenarios and considering all processing factors. For standard atmospheric conditions many conformal coatings available on the market will provide the level of protection required. Therefore, the decision in this case would most likely surround the processing conditions and associated hazards of using each material. For harsher environments, the various chemistry and coating types should be evaluated thoroughly. For example, acrylic coatings, such as Electrolube Ltd IPC-CC-830B approved TFA, offer good environmental protection with superior clarity and stability following prolonged exposure to UV light. Acrylic coatings do not crosslink and therefore do not provide the required protection against chemicals or high humidity environments where prolonged condensation or periodic immersion in water is likely. In this case, a tougher coating such as Electrolube Ltd UL746 approved DCA or environmentally friendly Non-VOC Coating (NVOC) would provide superior protection and therefore optimum performance of the device under these conditions. To meet demanding requirements set by the variety of electronic applications now possible, the conformal coatings market continues to expand at an equally rapid pace. Electrolube are at the forefront of this developing industry, providing unparalleled technical support for customers and offering many solutions for a vast array of conditions and processes worldwide.
0.99625
Get revenge on Sid for ruining him. The Teacher is the unnamed main protagonist and titular character of the poem and 2014 animated short film There's A Man in the Woods. He was voiced by Michael Ho. The teacher was formerly a teacher over a group of young children. Before his tragic fall from grace, the teacher valued his students dearly, even Sid to a degree and he would also allow them to collect honeysuckles at recess. This would all change when Sid began to spread lies about there being a serial killer in the woods by the school. While he knew about Sid's lies, the teacher convinces himself that the rumors would die down and normalcy would return. Unfortunately, word about the allegations began to spread throughout the town, leading to many parents and moral guardians to criticize the school for not taking any action. The teacher is blamed for his inactivity, and he was fired. The teacher tried to find work at other schools, but he was rejected. The teacher's life slowly became a wreck with him resorting to drinking heavily and smoking cocaine among other hard drugs. Becoming wrought with vengeance towards his former student Sid, the teacher became the eponymous "Man in the Woods" by waiting for Sid to be alone, and he reaches into his trench coat to grab an unknown object tucked away inside. The video abruptly ends with no indication of whether the teacher truly did kill Sid or if it was a murder-suicide scenario. He was also most likely taken to a mental ward in the events that he did murder his former student. Darker theories suggest that Sid may as well have been just the first of his many victims with him going onto kill the other students in his class, or the parents of the children who were indirectly responsible for his firing.
0.999977
How do I add files to a zip file? Select Add from the Edit menu. Press [Ctrl+A] on your keyboard. Use the drive selector, folder tree and folder content list to locate the folder containing the files to add to the archive. Highlight the files to add. With all of the options listed below set, you can now click either the Add with wildcard button or the Add button. Compression - set to one of these four options: None, Light, Normal and Maximum. Maximum takes the longest time to compress, but gives the best compression result. Volume - specifies size if you are creating a multi-part, or split, zip file. Select between the predefined sizes or enter a custom size, in bytes, using digits only. Note: This option is for zip files only. Include files in sub-folders - adds files in folders below the current folder. Include folder information - stores folder information in the archive so that the same folder structure may be created when extracting the files. Include drive information - stores drive information in the archive so that files may be extracted to the same drives. Relative folders - begins folder names at the current folder, and does not contain the full path. This means that the folder tree from the current folder and below will be stored, but not the structure above the current folder. Only add if archive bit is set - adds only files with the archive bit set. Clear archive bit after adding - removes the archive bit from the files after adding them to the archive. Delete files after adding - deletes the files from your hard drive after they have been added to the archive. Note: Use this feature with great caution. Password - encrypts the content of the archive. The password is used later when you want to extract files from the archive. There is no way to recover a lost password other than trying all password combinations; therefore, it is important to remember the password. Enter the amount of space, in kilobytes, that you want to leave on the first disk. This space can be used for a readme.txt file, for example. Specify a list of filenames and filespecs that you never want to include in archives. This feature is most commonly used to avoid adding backup files and other temporary files to archives. Click the checkbox Create new archive, and click Next. Enter the name of your new archive or browse your system for the destination folder, and click Next. Select the files to include in your archive, using one of the following methods, and then click Next. Click the Add button to browse your system for the files. Drag the files or folders from Windows Explorer and drop them onto the file list. Add to... - specifies the name and location of an archive to which you want to add the file. Add to x:\archive-name.zip - creates a new archive with the same name as the file and adds the file to the archive. Add to x:\TEMP\untitled.zip - adds the files to an archive called untitled.zip in the Windows temporary folder. Zip and e-mail - creates an archive with the same name as the file, starts your default e-mail client, and attaches the new archive to the new message. The email message is then ready to send. Click a mouse button to select the files or folders to archive. Do not release the button as you drag your files to BitZipper. The left mouse button immediately adds the files or folders to the archive. The right mouse button pops up a menu that gives you more options: Add the files immediately, display the standard Add Files window to select more files, or cancel the operation. Your files are now in the open archive.
0.999688
Now it's 20000 A.D., and the androids also participate in the ACM Inter-national Collegiate Programming Contest (ACM/ICPC). In order to select the members of Android University ACM/ICPC Training Camp, a contest was held. There were N teams competing in the contest, among which there might be some teams whose members are all girls (they are called all-girls teams). Some of the N teams will be selected, then all the members of those teams are selected as the members of the training camp. To be selected, one team has to solve at least one problem in the contest. The the top M teams who solved at least one problem are selected (If there are less than M teams solving at least one problem, they are all selected). There is an bonus for the girls - if top M teams contains no all-girls teams,the highest ranked all-girls team is also selected (together with the M top teams), provided that they have solved at least one problem. 1. The more problems a team solves, the higher order it has. Given the number of teams N, the number M defined above, and each team's name, number of solved problems, penalty value and whether it's an all-girls team, you are required to write a program to find out which teams are selected. The input has multiple test cases. The first line of the input contains one integer C, which is the number of test cases. Each test case begins with a line contains two integers, N (1 <= N <=10^4) and M (1 <= M <= N), separated by a single space. Next will be N lines, each of which gives the information about one specific competing team.Each of the N lines contains a string S (with length at most 30, and consists of upper and lower case alphabetic characters) followed by three integers, A(0 <= A <= 10), T (0 <= T <= 10) and P (0 <= P <= 5000), where S is the name of the team, A indicates whether the team is an all-girls team (it is not an all-girls team if Ai is 0, otherwise it is an all-girls team). T is the number of problems the team solved, and P is the penalty value of the team. The input guarantees that no two teams who solved at least one problem have both the same T and P. For each test case, print one line containing the case number (starting from 1). Then, output the selected teams' names by the order they appear in the input, one on each line. Print a blank line between the output for two test cases. Refer to the Sample Output section for details.
0.999429
In this article I have provided information on the Ponda city of Goa. I have mentioned it's hitorical importance and given glimse of various tourist spots in Ponda city. Goa is known for its many beaches throughout the world. Apart from the beaches there are many historical and religious architectural monuments. Ponda city of Goa is filled with such architectural marvels and tourists regularly visit these places in their Goa vacation. Ponda comes under the northern district of Goa and is one of the most sought after tourist places in Goa. It is located at 29 km south east of Panaji and 18 km north east of Margoa. Ponda is not only an old city of heritages but also new technological industries and factories. It is the industrial capital with its many industries. It is the fastest growing city of Goa and has a population of 20,000. Goa engineering college, one of Goa's premier colleges is located in Farmagudi near Ponda. Hence it is quite aptly known as the cultural capital of Goa. Ponda was a part of the Vijaynagar kingdom or the Bijapur sultanate and was ruled by the Sonde kings. Ponda was a safe haven for all the Hindus during the 16th century from the Portuguese who were strong in the neighbouring areas. Chatrapati Sivaji Maharaja later conquered it from the Bijapur Sultanate in 1675. Till 1764 it was under the hands of the Maratha kingdom. The Portuguese however took it from the Marathas in 1791. As this city was constantly under inquisition and religious changes, Ponda has a Hindu majority even during the Portuguese rule.As Ponda was a safe haven for the Hindus, a lot of temples can be found in Ponda. Also there are many mosques and churches in Ponda. Ponda is famous for its wildlife sanctuaries. It is a gateway to the Bondla and the Mahavir wildlife sanctuary and also for the famous Dudhsagar waterfalls of Goa. Also the Butterfly conservatory of Ponda is quite famous and is a must visit place for the nature enthusiasts. Not only one can find various kind of butterflies here; but also people are provided information on butterfly gardening as well as the use of SLR camera. Most of the famous beaches and cities are quite near to Ponda and one can easily commute through the roadways. The historic fort Cabo de Rama is also situated in the Ponda region and is one of the famous destinations for the tourists. Konkani and Marathi are the main languages spoken in Ponda. Ponda city has a literacy level of 82% which is quite high as compared to the national literacy level of 59.5%. Shree Vijayadurga Temple, Kerim, Ponda. There are regular bus services available from Panaji and Margoa available for Ponda. Also buses are available between Hubli, Dharwad, Belagaum and Ponda. One can also hire a taxi or get a rented vehicle for commuting.
0.986968
Most people know that drug use, especially compulsive drug use, is tied to trauma—but they may not understand why, or how serious this reality truly is. If you've never heard that trauma and addiction are connected...well, honestly, if you're claiming you've never heard trauma and addiction are connected, I don't believe you. This knowledge is so widespread that it has crossed (somewhat horrifyingly) into joke territory. From movies like Deadpool to standup to TV sitcoms, the image of someone chasing away traumatic memories with a drink, a snort, or a shot has become a staple of pop culture. The result is that most people know that drug use, especially compulsive drug use, is tied to trauma—but they may not understand why, or how serious this reality truly is. There is an ongoing debate about the causal relationship between opioid addiction and trauma, especially trauma that results in post-traumatic stress disorder (PTSD). Does having one or more traumatic experience leave people more vulnerable to developing an addiction to opiates, or does the use of "hard" drugs and the often concurrent involvement in the black market place users in traumatic situations? Research and street wisdom suggest the reality is a two way street. Frequent intoxication and interactions on the black market can leave people vulnerable to violence and sexual assault, but there also appears to be a strong link between earlier trauma and subsequent drug use. When people experience significant stressors like an assault or a car crash, our bodies releases a gush of neurochemicals meant to help us survive the experience. These include adrenaline and cortisol, which allow us to think clearly and react quickly during short-term, acutely stressful situations. If pain is involved, our bodies might also release naturally occurring opioids, which help mask some of that pain and allow us to function through it. But these are meant to be short-term responses. When someone develops PTSD, her body continues to react, in many ways, as though it is experiencing ongoing trauma. This might include increased adrenaline, which results in hyperarousal. It's not going to include a continued physiological pain response, however, so people with PTSD are essentially getting their brains and bodies "switched on" but they're not getting the chemicals that switch it back off, or calm it down. That's where drugs come into play; opiates like heroin and oxycodone provide the relaxation that the bodies of trauma survivors crave but aren't getting. Making those of us with PTSD much more prone to misuse of opioids, which can eventually lead to addiction. There is still a lot more research that needs to be done on the relationship between opioids and PTSD/trauma. Current research has already made some interesting discoveries. For example, a study of young children with serious burn wounds found that being treated with morphine directly after the traumatic incident led to less PTSD symptoms later, especially those related to arousal. This implies that opioids might have some legitimate function when it comes to the treatment of psychological trauma—which is not to say that it's a good idea to self-medicate with heroin. But it does suggest that trauma survivors who self-medicate with opioids are responding to a physiological impulse attempting to calm their hyperaroused nervous system. If you're a trauma survivor with an opioid use disorder diagnosis, this is something to keep in mind the next time someone tries to tell you that you're amoral, weak, or shameful. You're none of those things; your body was simply trying to find a way to correct biochemistry that became imbalanced by trauma. Can Buprenorphine Help Treat PTSD? One of the implications of these early findings is that opioids might, potentially, have some legitimate use in the treatment of PTSD. Of course, prolonged opiate use will lead to dependency in any user, and has the potential to lead to addiction in some users. Trauma survivors are an especially vulnerable population when it comes to opioid addiction. So nobody is really looking into the use of opiates for PTSD; the general consensus is that the harms outweigh the benefits. But what about those patients who already have an opioid addiction and/or dependency? Buprenorphine, the active ingredient in Suboxone, is primarily used to treat opioid addiction, and sometimes also prescribed for chronic pain patients. A study of combat veterans with co-occurring PTSD, substance use disorder, and chronic pain found that buprenorphine was able to help alleviate symptoms across disorders. Interestingly, the patients on buprenorphine saw a decrease in PTSD symptoms, while the patients using a full-opioid agonist (which they were prescribed due to their pain conditions) saw their PTSD worsen. The study findings align with my personal experience. Although I don't have chronic pain, and my trauma is from physical and sexual assault rather than combat (therefore I do not perfectly match the patient profile), I found that while heroin initially masked my PTSD symptoms, over time it seemed to aggravate them. As my addiction worsened, so did my anxiety, depression, suicidal impulses, reclusive behavior, and fixation on my trauma. When I began taking prescribed buprenorphine, however, I once again saw a decrease in my symptoms. It was a mild decrease—nothing like the psychological obliteration heroin provided when I first tried it. It manifested as a slight decrease in anxiety and mood swings, coupled with a refreshing mental clarity and freedom from fixation on my trauma. More research needs to be conducted on the relationship between opioids and PTSD—but what we know now is that there is a relationship. If you are addicted to opioids and have PTSD or a trauma history, you are far from alone, and you have nothing to be ashamed of.
0.936309
Slovakia (Slovak: Slovensko) (Official name The Slovak Republic, Slovenská republika) is a country with no access to the ocean in Central Europe. It is in between countries and is bordered by Austria in the southwest, Hungary in the south, Ukraine in the east, Poland in the north and Czech Republic in the northwest. Its capital city is Bratislava, the only capital of the world that borders with other two countries. Other main cities are Košice, Banská Bystrica, Žilina, Trenčín, Nitra, Prešov, Bardejov and Trnava. Slovakia is a member of the European Union since 2004 and its official currency is the Euro. The Celts started to settle since 450 BC. The coins named Biatec represent the first use of writing in Slovakia. At the turn of millenniums, many different Germanic tribes like Quadi and Marcomanni started to overtake the area. The Roman Empire established many outposts along the Danube river. They even fought Germanic tribes, with the most northern presence being in Trenčín (Laugaritio), during the Marcomannic Wars. The expansion of the Ottoman Empire in the 16th century from the south, who occupied the two most important towns in the kingdom, Buda (capital) and Székesfehérvár (coronation capital) and southern regions, the center shifted to Slovakia and the capitals moved to Bratislava (Pressburg, Pozsony at that time). The fights against the Ottomans and an uprising against the Habsburgs caused a lot of destruction. After the Ottomans started to retreat back from Hungary Bratislava continued to be capital until 1848, when it was moved back to Budapest. The creation of a dual monarchy, Austria-Hungary, enabled the Hungarian government to initiate a policy of suppressing the teaching of languages other than the Hungarian language in state schools. The official use of other languages than Hungarian was also discouraged. During this time, a nationalist movement arose among Slovakians. A part of this movement joined forces with a part of the Czech nationalist movement. During World War I, this movement convinced the future victorious powers to recognise a new state of Czechoslovakia after the war. The territory of today's Slovakia was a part of Czechoslovakia from 1918 to 1938 and again from 1945 until 1989. Czechoslovakia was one of the states which came into existence after the breakup of Austria-Hungary at end of World War I in 1918. Czechoslovakia split up in 1939, when Slovakia, under Hitler's influence and pressure, declared independence and became an independent state. The state existed during World War II. It was a one-party totalitarian state which was a puppet ally of Nazi Germany. Under the regime, the state fought in the war on the side of Nazi Germany and deported about 70,000 of its Jewish citizens to Nazi extermination camps as part of the Holocaust. The territory of Czechoslovakia was liberated by the Soviet Union at the end of World War II in 1945. After the liberation, Czechoslovakia was reunified and briefly existed as a democratic country. The Communist Party successfully performed a state coup in 1948 and ruled Czechoslovakia as a totalitarian one-party state which was a satellite of the Soviet Union. In 1989, the one-party rule of the Communist Party was overthrown during the Velvet Revolution, which was a series of large and peaceful demonstrations by the citizens in the streets. Czechoslovakia again became a democratic country. However, it split up into two independent countries (Slovakia and Czech Republic) on January 1, 1993 in what became known as the Velvet Divorce. Slovakia has been a member of the European Union since May 1, 2004. Slovakia is landlocked. It is noted primarily for its mountainous nature, with the Carpathian Mountains being in the north and various lowlands mostly in the south. The highest mountain range are the Tatra mountains with the highest peak, the Gerlachov Peak (Slovak: Gerlachovský štít; 2,654 m). Major Slovak rivers besides the Danube are the Váh and Hron. At low altitudes, Slovakia's climate is humid continental (Dfb in the Koeppen climate classification, with warm summers and cloudy, cold and humid winters. At high altitudes it is subarctic and alpine. ↑ "Slovakia: Ethnicity of the Population Section". Government of Slovakia. 2010. Retrieved 5 October 2010. ↑ 3.0 3.1 3.2 3.3 "Slovakia". International Monetary Fund.
0.999243
Are great leaders born or made? I believe leaders are made through events in their life that pull out the leader from within and trigger changes in how they see themselves concerning others. Here are two financial reasons for developing leaders. First: Leadership development is business development. Since labor is the most significant cost in most organizations, it is the largest source of POTENTIAL value creation. Senior financial analysts place up to 25% of a firm’s valuation on the quality of leadership throughout the entire organization. Well-developed leaders think critically, creatively, and strategically; coordinate and collaborate with others to achieve positive shared objectives, and correct mistakes before they cause organizational failures; all of which adds to the value of organizations, in real dollars and cents. Second: Leader development initiatives give organizations the greatest return on investment, in most cases exceeding 200%, according to research. Why? Because a rising tide lifts all ships. People who learn to lead make everyone around them perform better, and intentionally develop future leaders through sharing what they know. Compare leader development ROI to stock market returns of 2-6% annually. Alternatively, investing in depreciating assets like machinery and hoping it pays itself off in 5 years. The importance of knowing how to be, and make, a leader is mission critical for executives. Know this, as you develop others, you are growing and advancing in your leadership. Dr. Bryan J. Deptula is a subject matter expert in developing effective leaders and followers through assessment, training and executive education; closing the gap on millennial leadership, guiding critical, creative, and strategic thinking; and creating powerful mentoring relationships. He guides executives to focus on growing their business by leveraging leader development into business development. Dr. Deptula is CEO and co-founder of BKD Leaders, a training firm that transforms today’s worker into tomorrow’s leader. BKD Leaders is an approved SHRM recertification provider of PDC's. He capitalizes on years of industry experience, his own research, and knowledge of leadership to discover and develop leaders that make organizations grow. Deptula believes that the most important people in our lives are those who see the leader within us that we cannot see for ourselves. These people give us the courage and confidence to become the best possible version of ourselves. His motto learn, lead and live reminds himself, and all people that encounter him, to live into their highest potential. Dr. Deptula is published in leading journals, the Leadership Quarterly, Personality and Individual Differences, and Human Resource Development Quarterly. Bryan is a former Rotarian, and has traveled to more 26 countries across 5 continents. He truly enjoys the excitement of guiding people towards their best self- and organizational leadership. Working abroad for a period of over a decade, he bilingually negotiated with international corporations and Boards of Tourism in Mexico, Bahamas, and Jamaica and liaised with international federal and state governmental offices.
0.999945
A High Court judge has praised lawyers representing parents fighting to keep their eight-month old baby, who suffers from a rare genetic condition, alive for acting pro bono. Mr Justice Francis today ruled that Great Ormond Street Hospital can lawfully withdraw all treatment save for palliative care to permit Charlie Gard, who suffers from a rare genetic condition - mitochondrial depletion syndrome - and has brain damage, to die with dignity. Charlie’s parents, Constance Yates and Chris Gard (pictured), had opposed the orders sought by Great Ormond Street Hospital for Children NHS Foundation Trust. Francis, in a summary published on the judiciary's website to assist understanding of the court's decision, paid tribute to the lawyers. He said: 'Plainly, by reason of his age, it is not in issue that Charlie lacks capacity to make decisions regarding his medical treatment. Charlie has been represented throughout this hearing by his guardian and by very experienced counsel. 'The parents have been represented by experienced and dedicated solicitors and counsel who have acted pro bono and I wish publicly to pay tribute to them for their excellent assistance to the court and, I am sure, to their clients. London firm Bindmans, whose public law and human rights solicitor Laura Hobey-Hamsher is acting for the parents, said Yates and Gard want to look carefully at the reasons behind the court’s decision and are considering what they can do now. Hobey-Hamsher said Charlie’s parents were devastated by today’s decision, which will have the effect of preventing them from taking Charlie to America to receive pioneering treatment. Francis said some people may ask why the court has any function in the process. He explained: 'The answer is that, although the parents have parental responsibility, overriding control is vested in the court exercising its independent and objective judgment in the child’s best interests. Hobey-Hamsher said Charlie’s parents 'are struggling to understand why the court has not at least given Charlie the chance of treatment in America. The medical evidence is complex, and the treatment offered, potentially groundbreaking’. Francis made his ruling 'with the heaviest of hearts, but with complete conviction for Charlie’s best interests’. Hobey-Hamsher said the High Court had to face one of the most fundamental issues for any court. Anyone know whether this child was born normal birth or was his birth complicated birth as breech birth? This week’s High Court baby ruling (Charlie Gard) which has been widely publicised highlights that not only doctors but Judges can get it wrong too. The real issue is, who is the decision maker on behalf of this baby? Whether this baby should receive treatment abroad or not should rest with the parents who, in law, have parental responsibility to act in his bests interests. Unless it can be shown that the parents are not acting within the reasonable bounds of decision making it should not be for the doctors or for the Court to interfere. For the parents to exhaust every possible avenue (however small) to save their child is not unreasonable. However the doctor’s interference in preventing the parents from obtaining treatment (however remote its likely success) and labeling the parents as a “spanner in the works” speaks for itself. Would Aysha King be alive today if his parents had not refused to allow the doctors or indeed the Court to be the decision maker? Anon at 08.48, you said "As far as I am concerned IF there is a proven and moreover succesful treatment that is available in another country.." - but there is not. In this case, there is not a proven or successful treatment available. There is a a completely unproven and experimental treatment which even the Doctors in America offering the treatment accepted was very unlikely to help this little boy. I think anyone can understand why the parents wanted to try, but the court has to think about the child himself, and whether it is right to prolong his suffering. I don't think that either the Judge, or the doctors, think that they are god. They are trying to make incredibly hard decisions and trying to put the child at the centre of those decisions. It is also worth bearing in mind that sometimes where there are these kind of heartrending choices to be made, it can be helpful for parents to have the decision made for them. Having to bear the knowledge that you agreed for life support to be withdrawn from your loved one can be very hard indeed, I have personal knowledge of at least one person who ought against such an order, because they felt that they had to do everything in their power to keep their family member alive. However, after the court made its decision they were able to accept that it was the right thing for the patient herself, and that knowing that they had done everything they possibly could was a source of comfort to them as they grieved. It is very rarely a simple or easy question with a single right or wrong answer. I seem to recall there was a young boy in a Southampton hospital who the doctors said should be allowed to die and the parents should not be allowed to take him abroad for treatment; when the parents did discharge their child and took him to Spain, where they had a property, the hospital had the parents arrested and sought extradition, and only after an outcry did the doctors and hospital relent and the parents were released. They were then allowed to take their child to have his treatment in eastern Europe and, as far as I am aware, the boy is still alive and doing well. The doctors are not always right, but can be remarkably stubborn when parents have the temerity to disagree with doctors' decisions. So far as I am aware the doctors never apologised for their actions but just sought to justify themselves. They have, however, damaged their credibility and that of every other doctor as a result of their conduct (or misconduct). Being a mother who has lost her 8 month old angel in October 2016 makes me so sad to hear of this outcome. The law and judges must never cone into place in such matters. The only decision is that of the parents. Nothing else matters. To lose a child is the worse thing that any parent will go through. Life is pointless thereafter but it is the decision of the parents not judges who have no connection with the poor soul . This is far from being the first time that medical opinion had been given that a child will never walk, talk, live past an hour, live past a day, live on to be an adult and so on and so forth. And had their parents not insisted and pushed for their survival these so called soon to die children would not be healthy, fully functioning adults today. How do pioneering treatments become fully viable treatments if they are never tried and therefore developed??. I have a close family member who's baby was diagnosed with a serious unknown heart defect whilst still in the womb. The child's mother had to endure endless pressure throughout her pregnancy to terminate this 'impossible' pregnancy as it was said that the outcome would be a stillborn child or a newborn baby who would die within minutes never mind hours of its delivery. Today the child is a happy 6 year old boy whom having undergone 'pioneering' emergency surgery upon his immediate delivery, now looks and plays with his friends just like any other little boy. I have a close friend who suffered a massive stroke that left in a coma for 3 years. Her family were told that she was brained dead and in a vegetable state and that she who would never walk, talk or care for herself again without 24hr care and that in fact she would if she survived, never know again that they were even there. They were bombarded with pressure to turn the machines off. Today that woman is a fully functioning adult who can do just the same as everybody else. Whom having rehabilitated herself went to university to re-study and then became a successful accountant who owns her own business. This is my point!!! It's not clear what the 'treatment' was supposed to do? All the experts agreed that the serious brain damage was irreversible, and he was both blind and deaf. This is a very sad case; I am sure the judge would not have found it easy to reach such a conclusion. Just because they are the child's parents, it does not mean that they are making decisions based on what is, fundamentally, in the child's best interests. They are clearly devoted to him, and love him very much. Like any parent, they want to do the right thing...but what the right thing is in their eyes is not necessarily the right thing in reality. They are not medical professionals. The evidence overwhelmingly states that the treatment in America is experimental, and has very little chance of working. Why treat him like a guinea pig? Why put an innocent child through that? Why make him, potentially, suffer more? GOSH has been demonised on social media. The decision to take court action must have been reached with a very heavy heart, yet motivated by a sense, from their point of view, of doing the right thing for the child and not the child's parents. There are no winners. People are questioning why the courts have the ability to be involved in such a matter. It's the fact that, with all the very best of intentions and love for their child, parents don't always make rational decisions for their children because of the emotions involved. These cases are very rare. I think it is important that the last resort is the courts, which can make decisions in the best interests of vulnerable people, based on the evidence in front of them and, as best as they can, take all emotion out of it. The judge was very sympathetic to the parents, but I think he made the right decision for Charlie. My heart goes out to his brave parents. They have tried to do the very best for Charlie, and for that they cannot reproach themselves. Anonymous 08.48, I do not believe the judge felt he was acting as God, and no murder is being committed. Somebody had to make a final decision, and sadly the judge was tasked with that heaviest of burdens. I think it would be sensible to read the judgment before making such inflammatory, ignorant comments. Perhaps if you took time to read the summary from the court, you would understand the court's logic and reasoning. “Seeing the documents this morning has been very helpful. I can understand the opinions that he is so severely affected by encelopathy that any attempt at therapy would be futile. I agree that it is very unlikely that he will improve with that therapy. It is unlikely.”" Therefore, even the US doctors confirm that the proposed treatment is futile. The court had to ensure that it acted in Charlie's best interests, in accordance with established legal principles. This was a very difficult and highly emotive decision to make and the court had to balance all competing arguments. This is not about judges and doctors playing God - it is about humans making decisions on behalf of the most vulnerable humans in their best interests. Clearly there will be arguments that the hospital and court shouldn't interfere and that the State should leave parents to decide what's best for their children. But with respect, this misses the fundamental point - the court must and has a duty to act on behalf of those that can't represent themselves. Ugly and abusive language saying that they are murderers and acting like God does nothing to help the families' case (and whose arguments were not in fact based on religion or illegal state-endorsed judicial killing). My thoughts go out to all involved in Charlie's treatment, as this type of medical decision is not one that is reached lightly, and has a profound impact upon the clinicians involved. But most of all, my thoughts go out to Charlie's parents - for the way in which they have handled their tragedy being played out in a very public manner, and for the way in which they fought their case - with utmost dignity and compassion - to do right by their son. Whatever steps they now take, I hope that they spend as much time with their son as possible and create and hold those memories dear. As a father of 2 children, my heart goes out to this couple. I know that I would do everything and anything, if there was a glimmer of hope. As far as I am concerned IF there is a proven and moreover succesful treatment that is available in another country that the parents wish to explore as it may possibly save their little boys life, (which is what I imagine most parents would wish to do.) Then the Hospital the instigators and the Judiciary who have made this disgusting verdict are both committing murder, where it is that they are not the mother or father and they are CERTAINLY NOT GOD and therefore they should not be acting as if they are!! There are now to many strands that have been given 'pretended powers' to then have the final say over the mothers and fathers decisions that are being made in the best interest of their families.
0.999972
The Poisson disc is a popular sampling pattern used in 3D programming. The samples are distribued randomly on an unit disc (Poisson distribution). The Poisson disc is used, for example, in some soft shadows algorithms to blur shadow edges in the pixel shader. Is this one tileable? Many poisson disk sampling algorithm produce non-tileable sampling patterns.
0.960414
How long until Constitution Day? This holiday next takes place in 249 Days. The DPRK Socialist Constitution was adopted on 27 December 1972 with Kim Il-sung becoming the President of North Korea. Constitution Day is a public holiday in North Korea, observed on 27th December. This holiday commemorates the adoption of the current constitution on 27 December 1972. After the Democratic People's Republic of Korea was formed in 1948, the initial constitution was based on the 1936 Soviet Constitution. Indeed, Joseph Stalin was personally involved in editing the constitution. The 1948 Constitution was replaced by a new Constitution on 27 December 1972. Under the new constitution, Kim Il-sung became the President of North Korea. Under the old constitution, there was no one designated as the head of state. The Constitution also included references to Juche ideology. The Democratic People's Republic of Korea is guided in its activities by the Juche idea developed by President Kim Il Sung. The Juche idea means, in a nutshell, that the masters of the revolution and construction are the masses of the people and that they are also the motive force of the revolution and construction. The Socialist Constitution of the Democratic People's Republic of Korea established North Korea's official name and its status as a socialist state. It lays out the framework of the national government and the functions of the ruling state party, the Workers' Party of Korea in relation to the Cabinet and Supreme People's Assembly (the country's parliament). The constitution is divided into 166 articles, split between three sections. Since its adoption in 1972, the Constitution has had revisions in 1998, 2009, 2012, 2013 and 2016.
0.999623
Summary: This book is a guide to students on how to get involved in their communities and take social action. The author provides a step-by-step guide for students on how to solve problems in their communities. The book teaches students to go around their communities, see a problem they care about, and try to come up with a solution to solve it. The author makes sure to make students aware that to solve a problem in a community, you can't work alone, but will need to rally a group of people to support and help you with your cause. The book also gives student's pointers on how to do research on their problems, how to reach out to city officials through letters or on the phone, and take a survey and make a petition. The book even goes into detail on how to give a "power speech" to inform or persuade people on your cause. What is great about this book is that it offers stories of real kids and the actions they took to better their communities, making the idea of social action not just an abstract idea, but a concrete one. Element 6: This book fits exactly into this element because it encourages kids to get up and do something about the problems in their communities. Kids learn that they are never too young to care about the world around them, and they can actually do something about it if they try. It's important for students to learn from a young age to get involved in their communities and try to help in any way that they can. This book lets students know that even at a young age, they still have a vice that should be heard, and they should do everything they can to let that voice be heard. Activity: One of the activities described in the book is to have a scavenger hunt doing research on the cause of your choice. With a group of people, the students will go out and try to gather as much information on their problem as they can. Different things you do will get you more points, like actually talking to a city official or business, or making an appointment to talk about the issue, or actually getting a promise from someone that they will help with the cause. In class, you can simply have students talk about problems they see in their communities and how they think they can be fixed. This book is about doing social action outside the classroom to affect the community, so the main activities would not be done in the classroom. We want this to be not just a lesson for the students, but for it to become part of their lives.
0.999997
Deciding whether an email is spam or not. Deciding what the topic of a news article is, from a fixed list of topic areas such as "sports," "technology," and "politics." Deciding whether a given occurrence of the word bank is used to refer to a river bank, a financial institution, the act of tilting to the side, or the act of depositing something in a financial institution. This is an example of how to use naive Bayesian concepts to train a classifier to guess the gender of a name without the use of Social Security Administration statistics. While the statistical method is likely to be more accurate, this kind of classifier could work for specialized use cases, such as making up a totally new name and estimating whether it seems more "male" or "female". Label the dataset: For each name, label it as being "male" or "female" Decide on the "features": In other words, think about what makes the text of a name male or female. It could be something as simple as, "the kinds of letters at the end of the name", e.g. "ah" for "Sarah" "Vectorize" the features: Naive bayesian, and pretty much every other mathematical algorithm, deals with numbers. Whatever we decide are the "features", we need to express them in a way that can be put into a mathematical formula. Create a training and test set: from the labeled data, split it so that some names are used to train the classifier. The test set is then used to see if the classifier can guess the labels correctly. Obviously, you don't want names to show up in both the training and test set. Come up with a "feature" This is the more "creative" part: looking just at the text of a name.
0.999999
What are the examples of traditional footwear from East Asia? 1. Japan: The country is home to traditional footwear like the geta and zori sandals, and fukagutsu boots. 2. China: Over its long history, China has had numerous variants of sandals and shoes made out of materials like leather, cloth, wood, and even jade. 3. Korea: Traditional footwear is classified into two categories – the Hwa (over the ankle shoes) and the Hye (shoes not covering the ankle). Asia is known as a continent that has a rich history and culture since it is the home of some of the world’s oldest civilizations and the largest empires. The continent’s cultural heritage can be seen in many aspects such as music, art, cuisine, clothing, and even footwear like step-in slippers. There are many different forms of footwear that are present in Asia, and all of them are an important element to their fashion, along with their tradition and beliefs. Fine examples of this footwear are from East Asia, where countries like Japan, China, and South Korea have their own unique variants of footwear. Some of these forms of footwear have stood the test of time since they still remain important at this day and age. Here are some of the well-known traditional footwear from the East Asian region. The Land of the Rising Sun is home to traditional footwear like the geta, zori, and the fukagutsu. The geta is one of the most common types of traditional footwear in the country and remains as one of the most popular styles of footwear. The geta is a sandal made out of wood and straw. The design of the geta varies greatly, with some styles tailor made for people of high status and nobility. Some of the designs are intricate with some having jewelry and even lacquered wood, which gives it some shine. The geta, along with other Japanese shoes are usually worn with tabi socks. The zori are shoes that are commonly worn by women wearing kimonos. These are thong toed and wedge soled shoes that are also known for having many different styles. Both the geta and the zori are shoes that are still being manufactured today, with more and more new styles being introduced each year. Lastly, the fukagutsu are snow boots made out of reed that protect the feet from the cold snow. With Japan’s rich history, their tradition will always remain a big part of their culture. Being one of the oldest continuous civilizations in the world, China has one of the richest cultures and deepest histories. Given that fact, their history of traditional footwear is diverse as well. Some of the earliest forms of Chinese footwear were made out of fur from the animals they hunted, along with some straw to bind it on the feet. Later on, various kinds of shoes, sandals, and slippers will be made. Most traditional shoes and sandals made in China are made out of cloth, leather, and wood, and are known for their intricate designs. In some cases, some shoes are made out of clay, metal, and jade, though most of these shoes are for decorative purposes only. One of the most common kinds of traditional Chinese shoes is embroidered flats, which are still one of the most common types of shoes worn in the country. While China has been adapting modern styles of footwear over the past few years, traditional footwear remains abundant among their population. Being a country influenced by the culture of China and Japan, Korea shares some elements of their culture from both civilizations. The country has their own versions of traditional shoes and sandals. There are two classifications of traditional Korean footwear – the Hwa (over the ankle shoes) and the Hye (shoes that do not cover the ankle). Common types of Hwa footwear are boots and shoes that are suitable for extreme conditions. Meanwhile, popular types of Hye footwear are flats, which have colorful and embroidered designs similar to the ones from China. Like China and Japan, South Korea has been adapting more modern styles of footwear, but traditional forms of footwear remain an important part of their culture. East Asia is one of the most culturally diverse areas in the world and their traditions run deep within their countries. While footwear would always see numerous changes and innovations as the years go by, traditional footwear would always have its place in history.
0.937588
Who is the is base imposter? The Blue Meanie was trawling through the AI member's directory today (we didn't have anything fancy like that in the old days on this site - it was all fields round here when I was a lad). And what's this he finds? Some member called "bluemeanie"? Who is this base imposter? Declare yourself sir! I'm tempted to register "The Blue Weenie" for no apparent reason. There's only one Meanie. Often immitated, never duplicated. No...no one comes close to you...may I ask why you were looking through the directory? Just checking your self out? Maybe you referred to yourself in the third person so often your ego registered itself. When the plebs asks der echte Kopf what, or who for that matter, a blue meanie is, he, although obviously an impressive Professor Of Everything, always sends them of into the field for some more hours of harvesting the Kropf. Therefore, one can only conclude, with Professor Kopf, that the blue meanie simply is not. The nobody that, listen carefully, does NOT define the single instance of body ("somebody") through its not being. Not even that last miniscule honor is laid aside for blue meanies. In layman's terms, for I doubt not that you, as I, have problems comprehending the crystalline thoughts of der Kopf, a blue meanie is less than nothing, for nothing does, through its definition, add flavor to its negation, this being "something". Blue meanie, even negated, adds nothing of substance to all that already is. Such, in any case, are the words I managed to discern from between der Kopf's puckered and bearded lips. I lay them before you in the hopes they will vastly improve your respective lives. Hey meanie- you probably registered 20 variations of yourself out of paranoia and then forgot about it. The Blue Meanie was indeed ego-surfing when he chanced upon the mystery name-squatter in question. Oooh...a quadruple post...that's taboo on Appleinsider, you know. We'll have to sacrifice you now.
0.960628
The novel, “A Lesson Before Dying,” by Ernest J. Gaines, takes place in the 1940s, in a small plantation community in rural Louisiana. Paul, Grant and Jefferson are members of the society who illustrate, infer and prosper from the essential lesson learnt before dying. Though the three characters are distinct people, facing different scenarios in life, they engage in a struggle to achieve or support self-assurance and provide hope for civil rights movement in a society that restricts them. They learn the importance of one believing in their own integrity and provide an aspiration for justice, despite societal opinions.
0.999801
We stayed here on our first day in Udaipur. We chose this hotel based on the pricing and pictures/reviews on Tripadvisor. On arrival, we were given an option to choose for a room upgrade to the premium category for INR. 1500 - which we were happy to opt for. This is a hill-side property located at Rampura Circle. While I may not be the best judge for commenting on the locality, the hotel is ticked away from the busy lake-side localities - which are preferred locations to stay for tourists. It was a twin room designed in a ground plus one model; we occupied the one on the ground floor. The room was reasonably large sized (something that might be otherwise rare in a crowded travel city like Udaipur) and had a great visual appeal - could not decide whether it looked better in day or night. But that said, the hotel maintenance was below par. Our issues ranged included: broken bathroom flush, dis-functional telephone (this is a big no for a property where the lobby is a kilometer from the room), stained bathtubs, etc. Their other facilities included spa, swimming pool, few indoor games, a fully functional pub, etc. Specifically referring to the pool facility, they have two options - one central pool accessible to all customers and other being a private one which had a paid entry. The service was patchy. While they attended to most requests instantly, our efforts to get the telephone fixed went unanswered - despite informing twice. On a summary note, this is a good resort if you are looking to spend time with family and relax. That said, they need to maintain the place better; which is an essential for five star properties. My rating for the hotel is 6/10.
0.999637
Secure coding concepts are important for application developers to understand. Additionally, IT security managers who manage development projects should understand these concepts, even if they aren’t writing the code. If you’re planning to take the SY0-501 exam, you should have a basic understanding of some common secure application development and deployment concepts. Q. Developers have created an application that users can download and install on their computers. Management wants to provide users with a reliable method of verifying that the application has not been modified. Which of the following methods provides the BEST solution? In general, sensitive data is often encrypted to prevent the unauthorized disclosure of data. If an application is accessing any sensitive data, developers need to ensure that this access doesn’t result in inadvertent data exposure. For example, if an application accesses encrypted data on a different server, the application needs to ensure that the data is encrypted while in transit. Applications need to decrypt data before processing it. When done processing the data, applications need to encrypt the data before storing it. Additionally, applications need to ensure that all remnants of the data are flushed from memory. Certificates are used for various purposes such as authenticating users and computers. They can also be used to authenticate and validate software code. As an example, developers can purchase a certificate and associate it with an application or code. This code signing process provides a digital signature for the code and the certificate includes a hash of the code. This provides two benefits. First, the certificate identifies the author. Second, the hash verifies the code has not been modified. If malware changes the code, the hash no longer matches, alerting the user that the code has been modified. Developers are encouraged to reuse code whenever possible. As an example, imagine a developer created code for a web application to create, modify, and authenticate users and this code has been in use for a year. The code has gone through internal testing and has survived the use within the application. Instead of creating brand-new code for a new application, it’s best to use this tested code. Code reuse saves time and helps prevent the introduction of new bugs. However, when reusing code, developers should ensure that they are using all the code that they copy into another application. As an example, imagine a developer has created a module that has three purposes: create users, modify users, and authenticate users. While working on a new application, he realizes he needs a module that will authenticate users. If he simply copies the entire module into the new application, it creates dead code. Dead code is code that is never executed or used. In this example, the copied code to create and modify users isn’t used in the new application, so it is dead code. Logic errors can also create dead code. For example, imagine a function tests the value of a variable called Donuts. If Donuts has a value (such as 12), it squares it. If Donuts is null (a value of nothing), it returns an error and exits the function. Next, the function checks to see if Donuts is null and if so, it prints a message in an error log. Do you see the error? The code to print to an error log never executes. If Donuts is null, the previous check exited the function, so the second check never occurs. This logic error creates the dead code. Software development kits (SDKs) are like third-party libraries, but they are typically tied to a single vendor. For example, if you’re creating an Android app, you can use the Android SDK. It includes software tools that will help you create apps for Android-based devices. Obfuscation attempts to make something unclear or difficult to understand. Code obfuscation (or code camouflage) attempts to make the code unreadable. It does things like rename variables, replace numbers with expressions, replace strings of characters with hexadecimal codes, and remove comments. For example, a meaningful variable of strFirstName might be renamed to 94mdiwl, and the number 11 might be changed to 0xF01B – 0x73 – 0xEF9D (which still results in the decimal number 11). It’s worth noting that most security experts reject security through obscurity as a reliable method of maintaining security. Similarly, code obfuscation might make the code difficult to understand by most people. However, it’s still possible for someone with skills to dissect the code. Answer is A. Code signing provides a digital signature for the code and verifies the publisher of the code and verifies that it hasn’t been modified since the publisher released it. None of the other answers verify the application hasn’t been modified. Input validation verifies data is valid before using it. Code obfuscation makes the code more difficult to read. Stored procedures are used with SQL databases and can be used for input validation. Normalization refers to organizing tables and columns in a database to reduce redundant data and improve overall database performance. See Chapter 7 of the CompTIA Security+: Get Certified Get Ahead: SY0-501 Study Guide for more information on secure coding concepts. Thanks for this great pop up quiz, it really helps me to reinforce some concepts from the study guide, I have scheduled the exam for September.
0.988646
Create a `ServiceFeatureTable` from a web service. Set the `ServiceFeatureTable` to a `FeatureLayer` and `.setRenderingMode(FeatureRenderingMode::Dynamic)`. When definining the `FeatureLayer`'s `Renderer`, remember to `.setExtrusionMode(...)` on the `SceneProperties`. Finally, also on `SceneProperties`, use `setExtrusionExpression("[SOME_FIELD]")` to a `Field` from the `ServiceFeatureTable`.
0.995859
You are probably wondering what has happened to Ms X. What is the cause of this pain? Is the pain causing the fatigue and difficulty concentrating or is the fatigue making the pain worse? Why is it worse when she is stressed? And why is it widespread and not just to her leg? So many questions and at times, especially for people suffering from fibromyalgia, so little answers. Fibromyalgia is a musculoskeletal pain syndrome which has no identified cause and because of this, treatment also tends to be difficult. It is estimated to occur in 2-8% of the population and occurs in more women then men (Agency for Healthcare Research and Quality 2015; Clauw 2015). You can probably guess the main debilitation symptom of this condition from Ms X’s statement is chronic and widespread pain. Fibromyalgia can also change the person’s ability to process pain and often leaves them with an increased sensitivity to pain and, like Ms X mentioned, the slightest touch can feel extremely painful, a condition otherwise known as allodynia (Agency for Healthcare Research and Quality 2015). Not only is fibromyalgia associated with pain, but other symptoms include chronic fatigue, sleep disorders, and often people are also diagnosed with illnesses such as anxiety and depression (Agency for Healthcare Research and Quality 2015). It has also been found that people with fibromyalgia are more likely to experience headaches, irritable bowel syndrome as well as other functional gastrointestinal tract disorders, further pain syndromes (including chronic back and neck pain), endometriosis, chronic fatigue and painful bladder syndrome. Fibromyalgia is also commonly seen to coexist other chronic pain conditions such as rheumatoid arthritis, lupus and osteoarthritis, with between 10-30% of people with rheumatic disorders also meeting the criteria for fibromyalgia (Clauw 2015). So as you can imagine, fibromyalgia can often severely impact the quality of life and be a significant cause of disability for the individual. Fibromyalgia is diagnosed based on specific diagnostic criteria that states that symptoms must have been present for a minimum of three months and that there is no other disorder that can account for the symptoms present in the individual (Agency for Healthcare Research 2015). The criteria also takes into account other symptoms associated with fibromyalgia such as fatigue, sleep problems and cognitive disturbances. It also recognises that symptoms will fluctuate over time (Guymer & Littleohn 2013). Based on that diagnostic criteria, it can be very difficult to diagnose fibromyalgia and be an even more difficult time for the individual waiting for a diagnosis to tell them why they are feeling this way and what they can do about it. Treatment of fibromyalgia is based around therapies that will improve both the symptoms and the level of functioning of the individual. So these therapies will generally be based on decreasing musculoskeletal pain, improving both physical and cognitive function, managing any co-morbidities such as depression, and increasing the level of independence for that person. Treatment will often be a multimodal approach and incorporate strategies such as pharmacological management, exercise programs, patient education and cognitive behavioural therapies (Agency for Healthcare Research and Quality 2015). The pain experienced in fibromyalgia is often difficult to manage. This can be a result of its unknown cause and also because it is understood to be neuropathic in nature. One of the main thoughts relating to pain and fibromyalgia is that there have been changes to the central nervous system, which has resulted in central sensitisation that causes the pain and also the increased sensitivity to pain (Clauw 2015; National Health Service 2016). Unfortunately, there is no cure for fibromyalgia. Treatment focuses on symptom control and pain management. Pharmacological pain management can include the use ofcentrally-acting antidepressants and anticonvulsants to help reduce the pain. However, these medicines can also cause a number of side effects for the individual including nausea, dry mouth, drowsiness, agitation, anxiety, weight gain and constipation. Tramadol may also be prescribed to the individual, which has been shown to help decrease pain in those with fibromyalgia, however there are limited studies completed in its treatment of fibromyalgia-related pain (Hauser et al. 2014; National Health Service 2016). Strong opioids can also be prescribed, however they are generally not recommended for use in the treatment of fibromyalgia. This is also true of anti-inflammatory agents. Caution should be used with both of these types of medicines due to their risk of side effects and the lack of research undertaken into their effectiveness of treatment of fibromyalgia (Hauser et al. 2014). In the case of use of strong opioids for treatment of fibromyalgia, they have a high risk of addiction and also the tendency for their effect to weaken over time. This can often result in opioid dose increases and then consequently increases in side effects of the opioid as well as further addiction (National Health Service 2016). Muscle relaxant medications can also be used for any muscle stiffness or spasms associated with fibromyalgia. These medications can also help with the sleeping difficulties present in those with fibromyalgia and then further assist with other symptoms that may have been exacerbated due to fatigue (National Health Service 2016). Individuals can also participate in non-pharmacological pain management techniques such as relaxation, exercise, hydrotherapy and cognitive behavioural therapy (National Health Service 2016). Often treatment will involve a variety of these interventions and look at the holistic view of the patient to ensure they are cared for in all areas of health, as fibromyalgia will impact on all areas of their life. The main focus of treatment is to control symptoms. Everyone with fibromyalgia will have different symptoms and different goals of treatment, therefore treatment will be individualised. As nurses, we may find our role is to provide support to the individual, as well as to focus on pain management. It is also important to remember that fibromyalgia isn’t just about pain management – there are many other symptoms the person will be experiencing, and all of these symptoms will be impacting on their quality of life.
0.984918
Conservationists are winning the battle against whaling. Just over a decade ago, some 43,000 whales were harvested annually. This year, an estimated 6,000 will be taken; and next year that figure is expected to drop to 2,000. At this year's meeting of the International Whaling Commission, which ends today in Bournemouth, England, the focus was on how to reduce this number even further. The Soviet Union was the most recent nation to announce that it was scuttling its commercial whaling operations. The move delighted environmentalists, who see it as a crucial step toward a global ban. Most of the reduction in next year's whale harvest is attributed to the Soviet pullout. But activists insist that their fight is far from over. At least four nations, including Japan and Norway, plan to continue hunting under a provision in the international agreement governing whaling, which permits the animals to be killed for ``scientific purposes.'' These scaled-down hunts allow nations to keep fleets operational, while technically abiding by a moratorium on commercial whaling. A limited amount of whaling is also permitted for aboriginal people who depend on whales for their livelihood. At this year's commission meeting, Japan tried but failed to get its small coastal whaling operation - which is separate from its larger, long-distance fleets - reclassified into this category. ``The fact that we've forced countries to try to use these loopholes is a victory of sorts,'' says Dean Wilkinson, a spokesman for the international environmental lobbying group Greenpeace. Mr. Wilkinson says even a short-term ban could force most nations out of the whaling business permanently, since the cost of reestablishing fleets would become prohibitive after several years. Meanwhile, scientists say it will take years to determine whether most whales have actually been saved. ``The whales are surviving, but in some cases only in very small numbers,'' says Douglas Chapman, a maritime mammal expert at the University of Washington. Whale populations grow very slowly and are difficult to monitor, since the animals range over vast stretches of open sea. The right whale has been protected since the 1930s, but it is still thought to number only a few hundred worldwide. By contrast, the gray whale, also protected for half a century, is now thought to number close to 15,000. Scientists are not sure why some whale populations recover, while others do not. The 40-member whaling commission has called for a five-year moratorium on commercial whale harvests. The ban was supposed to take effect last year, but several nations objected. When the commission was established in 1946 it was never envisioned that the group would push for a total ban on commercial whaling. Over the years, however, the body has become increasingly concerned with conservation. The moratorium is to be followed by a comprehensive review of whale stocks in 1990. But it's the Japanese who have attracted the most criticism. Japan announced in early April that it would take 875 whales next year under an eight-year research program. Scientific whaling has long been used to gather information about whales. Researchers study the size and condition of individual animals. This information is used for general science as well as for whaling operations. For example, scientists study the contents of a whale's stomach to determine the foods it eats. This enables whaling fleets to pinpoint areas where they are most likely to find the animals. The United States introduced a resolution that would tighten controls on many aspects of scientific whaling operations, which was passed by the whaling commission yesterday. The US plays a key role in the commission. The international body lacks the power to punish nations that violate rules, so the US has traditionally provided the muscle. For example, in 1979 Congress mandated that any country found to ``diminish the effectiveness'' of a commission decision could have its general fishing allotment in US waters cut in half. Continued violations could lead to a total ban. In 1986, the Soviet Union was banned from fishing in US-controlled waters. But Washington has been less willing to slap its allies with similar sanctions. The Soviet decision to stop whaling could have a powerful impact on other whaling nations. Each time a country pulls out, it helps ``isolate the intransigents,'' says Greenpeace's Wilkinson. Soviet leaders are certainly using the decision to their advantage. Next week, a series of events is planned in Moscow where scientists, conservationists, and filmmakers will discuss international efforts to save whales and other endangered species. Included on the roster is the Soviet debut of the American film ``Star Trek IV: The Voyage Home.'' The plot of the film revolves around the 20th-century extinction of humpback whales. Roger Payne, a whale expert with the World Wildlife Fund who will attend the activities, says the moment is ripe to introduce ideas about whale conservation to the Soviets. ``Maybe then they'll go further in the direction they've already started to move in,'' Dr. Payne says. The Soviets have not yet withdrawn their official objection to the whaling moratorium. They also supported the views of whaling nations at this year's commission meeting. Besides the Soviets, only Norway maintains its objection. The Japanese withdrew their objection as part of a 1984 agreement with the US which allowed them to continue whaling until 1988. Peru also objected but later withdrew it.
0.957988
A leotard is a unisex skin-tight one-piece garment that covers the torso but leaves the legs free. It was made famous by the French acrobatic performer Jules Léotard (1842–1870). Leotards are worn by acrobats, gymnasts, dancers, figure skaters, athletes, actors, and circus performers both as practice garments and performance costumes. They are often worn together with ballet skirts on top and tights or sometimes bike shorts as underwear. There are sleeveless, short-sleeved and long-sleeved leotards. A variation is the unitard, which also covers the legs. As a casual garment, a leotard can be worn with a belt,it can also more commonly worn under overalls or short skirts. Leotards are entered through the neck, in contrast to bodysuits which generally have snaps at the crotch, allowing the garment to be pulled on over the head. Scoop-necked leotards have wide neck openings and are held in place by the elasticity of the garment. Others are crew necked or polo necked and close at the back of the neck with a zipper or snaps. Leotards are used for a variety of purposes, including yoga, cardiovascular exercise, dance (particularly for ballet and/or modern), as pajamas, for additional layered warmth under clothing, and for recreational and casual wear. They may form a part of children's dressing up and play outfits and can also be worn as a top. Leotards are commonly worn in figure skating, postwar modern dance, traditional ballet and gymnastics, especially by young children. Practice leotards are usually sleeveless. Female competition garments for gymnastics and skating are almost always long-sleeved, while male competition leotards may be sleeved or sleeveless, the latter more common in gymnastics, the former in figure skating. The first known use of the name leotard came only in 1886, many years after Léotard's death. Léotard himself called the garment a maillot, which is a general French word for different types of tight-fitting shirts or sports shirts. In the early 20th century, leotards were mainly confined to circus and acrobatic shows, worn by the specialists who performed these acts. The 1920s and 1930s saw leotards influencing the style of bathing suits, with women's one-piece swimsuits today still being similar in appearance to leotards. Leotards were also worn by professional dancers such as the showgirls of Broadway. Stage use of the leotard typically coordinated the garment with stockings or tights. By the late 1970s leotards had become common both as exercise and street wear, popularized by the disco craze, and aerobics fashion craze of the time. These leotards were produced in a variety of nylon and spandex materials, as well as the more traditional cotton previously used for uni-colored leotards and tights. Exercise videos by celebrities such as Jane Fonda also did much to popularize the garment. The dancewear company Danskin flourished during this period, producing a wide variety of leotards for both dance and street wear. Other companies, such as Gilda Marx, produced leotards during this time period then ceased production when they were no longer in fashion. By the late 1980s leotards for exercise wear had become little more than bikini bottoms with straps over the shoulders, generally worn with cropped shirts. From the mid 80's through the mid 90's leotards were popularly worn as tops with jeans especially skinny jeans. By the mid 1990s leotards had been almost completely replaced for exercise wear by the sports bra and shorts. For gymnastics, the leotard should fit snugly, like a second skin. Leotards that are too big and baggy can prove a danger to both the gymnast and coach. If the leotard catches on an apparatus, the gymnast may fall. When Jules Léotard created the Maillot it was initially intended for men. This style of leotard can be seen in early 20th century photos of the circus "strong man". Men's leotards evolved along with the women's style, eventually resembling it, except that the men's version had a slightly lower cut leg opening and a lower cut front. Leotards are commonly worn by male dancers (particularly for ballet) and gymnasts. Leotard-like garments (often of the "biketard" type) are also often worn by men in sports such as rowing, wrestling, cycling and running.
0.935863
Does Kindness Weekend have anything to do with business or is it just about school-yard bullying and politicians? I’d say it has to do with every aspect of our lives, but this being a business column, we should discuss kindness and its role in making money. I know; I’m crass. First let’s get passed the actual business side of this particular kindness event. In life, as in business, we get that on which we focus our attention. If you want more sales, focus on your sales efforts; if you want more kindness in your life, focus on kindness. It is more effective to focus on sales than to focus on fear of financial failure. It is also more effective to teach and practice kindness, than focus on fear of bullying or conflict. Focus on what you want. This event is simply a community wide focus on kindness. Cynics might say this is some sort of business gimmick, and I’m devaluing the message by talking about making money from it. Being involved in the event, I can tell you first hand it is about quality of life; both the benefits of kindness and making money. Kindness Weekend was conceived out of a desire solely for public benefit. To fund the event, the N. Conway Village Association invested in it to bring traffic to the valley, so it is being promoted as another reason to bring families to the valley for Memorial Day weekend. Of all the things we could create to sell for a profit, what could be more beautiful? The event is sponsored by The Evergreen Institute for Wellness, with their message that Kindness produces physical health benefits for the giver of kindness. When you do something for someone else, it can reverse feelings of depression, provide social contact and decrease feelings of hostility and isolation that can cause stress, overeating, ulcers, etc. With everything to gain, nothing to lose and no cost, who would even want to argue with that? So, what about you making a profit from all this? Business is about making money. Some think it is more profitable to be unkind. They are wrong. K=R=P is a formula Tom Peters uses to explain the impact of kindness on business. In 1982, Tom Peters authored the world-changing business book In Search of Excellence, and more recently, his new book 163 Ways to Pursue Excellence. The formula stands for Kindness = Repeat Business = Profit. Far be it from me to challenge the mind of Tom Peters, but I would change the R to stand for Relationships. The repeat business he talks about comes from the same relationship-building trust that increases productivity, reduces turn-over, sick time and labor problems with employees. Better relationships also help negotiate better terms with suppliers. So my version of the formula K=R=P is Kindness = Relationships = Profit. Consider an extreme example featured in a New York Times article in May 2008 – American Airlines and Southwest Airlines held annual meetings in Dallas on the same day. Airline pilots picketed the American Airlines meeting while Southwest pilots bought full page newspaper ads thanking founder Herb Kelleher for his 37 years of service. Animosity between management and labor is near impossible to navigate when there is no trust. We see this in our political system globally, nationally and locally. We see it sometimes with our own staff relationships. Without kindness, there is no trust, without trust, there is no relationship. Without relationship, we’re fighting and clawing our way through all our dealings. Kindness is no longer an option in business. It is critical to the customer and the employee and if you’re smart (and I know you are), you’ll make it critical with the supplier, landlord, neighbor and even wrong numbers. Everyone is a potential relationship. My regular seminar students and column readers know I talk a lot about building trust. In all business relationships, trust reduces cost and increases speed. Dr. Stephen Covey calls it “moving at the speed of trust” in his book Predictable Results in Unpredictable Times. If your customer needs a lawyer before signing a contract, it is far more expensive and time consuming than making a hand-shake deal. If you have to “sell” your employees on a new idea, you would enjoy greater productivity if you had instant buy-in based on trust. This is not to say you should expect people to follow blindly doing as they are told; those days of curmudgeonly bosses are long gone. This is about leadership, which involves employee in-put, which is a form of kindness. I hear some of you grumbling, so hear me out. I know that you know what you’re doing. I know you don’t have time for every employee’s ideas. I know you want to be able to trust your employees as well, to empower them to be their best. So how do you become the cultivator of employee engagement? We have a system for that! Yes, we have a system for everything, as you have surely read in previous columns. An effective business development process has a management system that provides the framework and structure for employee engagement in an orderly fashion that respects input efficiently, maintains focus, creates accountability and drives productivity like nobody’s business. It allows for, no – it requires kindness. Good thing kindness is free. In researching this column, I was online listening to Tom Peters lecture at Cornell University. When Tom tells you that his ridiculously over-the-top-big-time selling book In Search of Excellence really didn’t say anything more than take care of people – maybe there’s something to that. How to make it fit in the real world can be complex, but the message is simple. Albert Schweitzer said: "Constant kindness can accomplish much. As the sun makes ice melt, kindness causes misunderstanding, mistrust and hostility to evaporate."
0.999858
What is the standard equation of a circle with center ##(-2, 0)## and radius ##4##? The of a circle is. ##color(red)(|bar(ul(color(white)(a/a)color(black)((x-a)^2+(y-b)^2=r^2)color(white)(a/a)|)))## where (a ,b) are the coordinates of the centre and r, the radius. Substitute these values into the standard equation.
0.995621
The implications of the printed word have always been and will always be very vast. There are many who will argue that the Protestant revolution and Martin Luther could never have taken place without the help of the printing press. While this may not be entirely true, the printing and the already widespread distribution of printed books during his time has certainly added to the distribution of his work and ideas. The history of the printed book presents us with an observable yet complete revolution of communication. This historical record is so diverse that we are able to observe the economic, political, and sociocultural change that occurred over a period of 300 to 500 years. In the shifts that took place in the world from the 15th century to the 18th century, science diverged from religion and thus, a new world opened up. In order to completely understand the effects of the printing press in the 15th century, we need to go right back to the 7th century to find out how the book world was being organized before printing was discovered. In doing so, you will see for yourself the changes that have taken place and that brought about the introduction of the printing press. Many authors and Historians believe that it was the single most important invention in the middle ages, and it single handedly brought about changes in the Protestant reformation, scientific theories, European literary class, and the artistic Renaissance way of thinking. Towards the mid-15th century period, things really began to change with its invention. In the year 1452, Gutenberg thought of the idea of a movable type. Working hard in his workshop, he brought together three different technologies - paper, the winepress, and oil-based ink - so as to print books. It should be noted that the printing press is not the result of a single invention; it is but the aggregation of three different technologies that were known centuries before even Gutenberg was born. However, Gutenberg still gets the credit for inventing it, which was said to have been developed simultaneously in Prague and Holland. In his pursuit for developing and refining it, there were many other inventions that were brought together by Gutenberg. The adaptation of the olive or wine oil in the screw-type press, which had been used for hundreds of years in Asia and Europe. The implementation of block-print technology, which has been known throughout Europe ever since Marco Polo arrived from Asia in the 13th century. The development of certain paper production techniques that could be used for mass production. Paper was brought to Italy from China in the 12th century but was considered to be too flimsy to be out into books. Before the onset of the printing press, books were generally made up of vellum because it was considered to be durable. For books that took a year or more to produce, paper was considered to be too flimsy. However, vellum was way too costly to produce for print books. The implementation of oil-based inks. These inks had been around ever since the 10th century but were not used, as they tended to smear on vellum. In his pursuit to refine it, Gutenberg developed a special punch and mold system that allowed for the mass production of the movable type that was used to reproduce a certain page of text. These letters were then brought together in a type tray that was used to print a particular page of text. So, if a letter did break down, it could then be replaced. When the copies of one page were printed, the type could then be reused for the next page or book. However, these technological advancements stretched over a span of 5 centuries. They are not clustered around Gutenberg's time. The first few books to be printed and sold at print shops were religious tracts and bibles. The next category of books that attracted publishers was the 'humanist' types and other antique texts, but there was no or very little printing of new ideas taking place. Most people entered the printing business and then quickly left it. The main reason was the distribution of books was not organized. The potential for improvement was there, the market was there, and the demand was definitely there, but the control, transport, and advertising mechanisms were poorly organized. To add to this, the literacy rate in Europe was still very low. Most people did not even know how to read. However, this situation was improved by the Frankfort Fair, which was a center for printing and drew hundreds of booksellers, scholars, publishers, and collectors from all over the world. This helped to improve and coordinate demand and supply. The main effect however, was to multiply the supply and cut down the costs of books. Thus, it made information of all kinds, readily available to a larger segment of the population. Libraries were then able to store more information, that too at a lower cost. The printing press also facilitated the preservation and dissemination of knowledge in the standardized form - this was very important for the advancement of scholarship, science and technology. It has certainly fueled the start of the 'information revolution', which is at par with the Internet of today. Printing could spread new ideas and information quickly, and with much greater impact. Printing encouraged literacy in the population and eventually brought about a deep and lasting impact on many people's lives. Although many of the earlier books dwelt on religious subjects, businessmen, students, the upper and middle class strata of society still bought these books. Printer on the other hand, responded to this demand with medical, moralizing, travel, and practical manuals. Printing also provided a platform for scholars and prevented corruption of texts taking place through hand copying. By giving everyone the same texts to work from, the printing press has brought about progress in science and scholarship in a faster and more reliable way.
0.997771
Draw affinity diagram easily from examples and templates for process improvement! Affinity Diagram is widely used to sort and categorize large amounts of data by finding relationships between ideas for process improvement. It help discover meaningful groups of ideas within a raw list or categories. Edraw is a professional project management diagram software which can easily create the affinity diagrams from the examples and templates. After you drag an affinity diagram shape into the page, you can click the quick action button to add an item, or delete an item, or change the item style. The following is a dynamic affinity diagram template. The designer can easily change the group amount and items.
0.940895
The first passage time (FPT) is a parameter often used to describe the scale at which patterns occur in a trajectory. For a given scale r, it is defined as the time required by the animals to pass through a circle of radius r. The mean first passage time scales proportionately to the square of the radius of the circle for an uncorrelated random walk (Johnson et al. 1992). Johnson et al. (1992) used this property to differenciate facilitated diffusion and impeded diffusion, according to the value of the coefficient of the linear regression log(FPT) = a * log(radius) + b. Under the hypothesis of a random walk, a should be equal to 2 (higher for impeded diffusion, and lower for facilitated diffusion). Note however, that the value of a converges to 2 only for large values of radius. Another use of the FPT was proposed that, instead of computing the mean of FPT, use the variance of the log(FPT). This variance should be high for scales at which patterns occur in the trajectory, e.g. area restricted search (Fauchald and Tverra 2003). This method is often used to determine the scale at which an animal seaches for food. The value fpt computes the FPT for each relocation and each radius, and for each animals. This function returns an object of class "fipati", i.e. a list with one component per animal. Each component is a data frame with each column corresponding to a value of radii and each row corresponding to a relocation. An object of class fipati has an attribute named "radii" corresponding to the argument radii of the function fpt. meanfpt and varlogfpt return a data frame giving respectively the mean FPT and the variance of the log(FPT) for each animal (rows) and rach radius (column). These objects also have an attribute "radii". Figure 3.2: Plot of a First Passage Time for a mule deer in Colorado identifying mean FPT by month. Another look at the time and distance between relocations of each animal. If GPS collars are programmed to collect 1 locations per 24 hours or a location every 4 hours, what would we expect Figure 3.3b to look like? The code can be used to produce these figures and can be used initially to inspect the data if there is concern about consistency in location fixes or distance between each location.
0.975593
This week has been good! I'm not sure I want to go into why exactly but I've felt giddy and excited this week, I've felt things I've not felt in years. It's been good to be reminded of what I'm capable of feeling, it's fun and a bit silly.
0.999947
It has been suggested that this article be merged into List of Marvel Comics characters: C. (Discuss) Proposed since February 2019. Caiera is a fictional character appearing in American comic books published by Marvel Comics. The character was introduced during the "Planet Hulk" storyline. She first appeared in Incredible Hulk vol. 2 #92 (April 2006), and was created by Greg Pak and Carlo Pagulayan. Caiera was born on Sakaar to a tribe of Shadow People, the creators of the Old Power. She was raised by the priests to be a shadow warrior. When she was thirteen, her village was attacked by alien "spikes" that caused the other villagers to mutate into monsters. Caiera, the only survivor, was rescued by the Red Prince. When the Red Prince becomes the Red King, Caiera is his loyal lieutenant and the mother of his daughter. When the Hulk arrives on Sakaar and gains public support as a gladiator, she protects the Red King from him. After a failed attempt to ruin his popularity, the Hulk and his Warbound escape. Caiera is sent to kill the Hulk, but they encounter spikes during their battle. The Red King reveals he controls the spikes, devastating her. She turns against the Red King and aids the Hulk in a coup. Hulk becomes the Green King, and he marries Caiera. She becomes pregnant, but appears to die in the warp core explosion which laid waste to much of the planet. Hulk returned to Earth in World War Hulk. Although Caiera died, she posthumously - through the Old Power - gave birth to two sons, spawned from beneath the surface of the planet: Skaar and Hiro-Kala, who each found their own destiny. Caiera possessed abilities that were derived from the planet itself. She could transform her body into stone and become incredibly resistant and strong, to the extent that she battled the Hulk to a standstill even when his strength and fighting skills had dramatically increased. She was also an expert fighter and tactician. A special issue of the series What If? examined what would have happened if Caiera had survived the explosion instead of Hulk. Angered at the loss of her husband, Caiera takes the entirety of her planet's energies into herself, vastly increasing her power. She then goes to Earth to avenge his death. She kills the Illuminati and enslaves Earth. Caiera appears in the animated direct-to-video film Planet Hulk, voiced by Lisa Ann Beley. She follows the Red King loyally because he saved her from the Spikes that destroyed her village and her family. However, it later turns out that the Red King was the one who created the Spikes, thus he is responsible for destroying Caiera's village and killing her people. Once the truth is revealed, Caiera angrily severs her loyalty to the Red King and aids the Hulk and the Warbound into defeating him. Caiera then plants a Spike bug on the Red King, leaving him to be killed by his Death Guard robots (as part of their programming to kill any Spike infestation) as revenge for her tragedy. She then goes on to becoming the Queen Consort to Hulk, who accepts his new role as the new King of Sakaar. ^ James Harvey (December 25, 2009). "Animated "Planet Hulk" Cast And Crew Details, "Hulk Versus" 2009 Year-End Sales". Marvel Animation Age. Archived from the original on December 25, 2013. Retrieved September 8, 2010. This page was last edited on 20 March 2019, at 01:05 (UTC).
0.999548
What’s the purpose of the pitcher’s mound in baseball? What is the reason for the pitcher's mound in baseball? Are there any regulations regarding the dirt heap in question? The best way to understand the purpose of the mound is to imagine the situation greatly exaggerated: picture yourself trying to hit a fastball thrown at you from ten feet in the air. The angle of the ball’s path (and, I suppose, the force of gravity, to some imperceptible extent) would make the task more difficult than it would be if the pitcher were standing level with you. In short, the height gives the pitcher an advantage. Over the years, baseball men have tinkered with this and other variables in order to fine tune the delicate balance between pitching and batting. Thus in 1879, it took nine balls (i.e., nonstrikes) to draw a walk; before 1887, the batter had the right to demand a high or low pitch; the distance from pitcher’s plate to home plate was increased from 45 to 50 feet in 1881, and again to 60 feet, 6 inches in 1893. The mound first shows up in the rules of 1903. In 1969, to adjust for a perceived pitcher’s advantage, its height was changed from 15 inches to 10. The rules also give specifications for such things as the size of the pitcher’s plate, or “rubber” (24 by 6 inches), the radius of the circle (nine feet), and the frontal slope (one inch per foot over a specified range). Though these specs appear in the official rules under the dubious heading “Suggested Layout,” they are considered law. Various other aspects of mound construction are left up to the imagination, if any, of individual team owners.
0.962131
The infamous video game company LJN was most active during the 8-Bit era, with its games being published mainly on the NES. These days, they are often criticised for the low quality of their games and the frustration these games have caused players. Because their games are all based on popular movie or comic franchises, they sold well, but were critically panned. LJN was founded by pioneer toy maker and business man, Jack Friedman. Friedman was born and raised in New York City and began his career in the toy industry as a sales rep in the 60s. In 1970, Friedman partnered with his boss, Norman J. Lewis, to open a toy manufacturing company in Manhattan called LJN (Lewis' initials, reversed). After Lewis left LJN, Friedman moved the company away from original products and instead began to pursue licensing deals. While not a new idea, Friedman leveraged his skills as a business man and his creative talents to acquire popular licenses, and produce incredibly successful toy lines based on those franchises. Friedman is considered a pioneer of the male collectables toy industry. Friedman continued to license popular franchises and release popular toy lines, including Thundercats, Gremlins, and the WWF (World Wrestling Federation). In 1985, Friedman sold LJN to MCA. MCA acquired LJN for $66-67 million. Friedman went on to found Toy Head-Quarters in 1990; after a merger with Trinity Acquisition Corporation in 1991, the company became THQ. Friedman also founded the toy company Jakks Pacific. He died on May 3rd, 2010 from a rare blood disorder at the age of 70. MCA (Music Corporation of America) was a large talent agency, record label, TV and Film company that had previously attempted to get into the video game industry by partnering with Atari, Inc. They founded MCA Video Games, which produced arcade and home versions of games based on various MCA properties. MCA had been buying up companies in order to increase profits and broaden their portfolios. After acquiring LJN, MCA continued Friedman's model of licensing popular franchises. The only difference was their focus on the emerging video game market. The strategy was to acquire licenses and farm out the work to various third parties in order to produce video games based on the licenses. In many cases, LJN did not credit or release information as to which company developed each game. Many different developers were used, making it quite difficult to discover the real developer behind some games. LJN began publishing video games for the Nintendo Entertainment System in November 1987 with three releases: The Karate Kid, Jaws, and Gotcha! The Sport! Along with the games, LJN continued to produce toy lines to go along with the licenses they acquired. Popular toy lines included: Advanced Dungeons & Dragons, Back to the Future Part II, Dune, E.T., Gremlins, Indiana Jones and the Temple of Doom, Magnum, P.I., Michael Jackson, Thundercats, Voltron, Who Framed Roger Rabbit, WWF, and The Terminator. LJN began posting losses in 1987 after fallout from their toy guns, which were produced by their Entertech division. A set of paintball guns was also made as a tie-in for the Gotcha! NES game. The company never managed to get back on track and continued to post losses. In 1990, Acclaim began talks with MCA to purchase LJN. On April 20th, 1990, Acclaim closed the deal with MCA to purchase LJN for cash and 6.7% common stock. The deal was valued at $53 million. Though never officially stated, it is believed that Acclaim wanted to purchase LJN to get around Nintendo's ‘5 games per publisher, per year’ rule. With LJN, they could ship twice as many games annually for the popular console. Acclaim continued LJN’s business model of licensing and producing games based on those licenses, but dropped the toy division entirely. Because of another Nintendo rule that stated games released on the NES could not be released on competing systems by the same publisher, Acclaim also leveraged its Flying Edge and Arena brands to publish LJN titles on Sega systems, including the Master System, Genesis, and Game Gear. As Nintendo loosened their publishing guidelines in the middle of the 16-bit era, LJN, Flying Edge, and Arena were no longer needed by Acclaim, and were folded into the parent company. The company was absorbed into Acclaim in 1994. Acclaim resurrected the LJN label in 2000 to publish a single game on the Dreamcast entitled Spirit of Speed 1937. The decision is rumoured to have been made in order to distance the Acclaim brand from the low quality of the title. This decision only further cemented LJN's legacy as a company that produced some of the worst video games of those eras.
0.999444
His wife (girlfriend at the time) was concerned about the impact on her career, her reputation and the public nature of reporting the crime. Dear Amy: My wife and I have been happily married for 26 years. We have raised two terrific daughters. I continue to struggle with an event that happened while we were still dating. While at a business conference, my wife (girlfriend at the time) was sexually assaulted by a client. She was concerned about the impact on her career, her reputation and the public nature of reporting the crime. He was also deemed to have very powerful friends across the industry that would protect him. She made the very difficult decision not to pursue this individual for his crime, and was able to resolve the suffering and pain he caused. While I fully supported (and still do) my wife’s decision not to proceed, I was torn by the fact that a man was (and is) walking the streets unaware or indifferent to the agony and suffering he caused. For years, I have buried these conflicting feelings, however with all of the recent coverage of sexual harassment — these feelings have resurfaced, and my desire for justice grows louder every day. I have seen a counselor, and he has been helpful. I persistently worry: How am I going to protect my daughters when I wasn’t able to assist their mother? Amy, I am struggling to reconcile my promise to my wife with my overwhelming desire to see some form of justice served. I feel an intense sense of rage and agonize over his ability to get away with his crime. You don’t mention if the “Me Too” movement has triggered your wife’s experience of her sexual assault; I would assume that it has — no matter how successfully she has put this event behind her. Your question is a perfect illustration of how the pain and trauma of assault radiates outward and affects many people, including family members, friends, colleagues and other witnesses to the consequences of sexual violence. I agree that you should respect your wife’s needs and choices here, but I also think that you should advocate — but not pressure — her to explore her options regarding reporting this assault, including telling your daughters about it. You can relieve your feeling of powerlessness by becoming an advocate for survivors, by believing them, even if it takes decades to report their experience, and by making sure your daughters feel empowered. Even empowered people can become victims of crime, and that’s why removing the shame and stigma is so important. I hope that as you move through this you will turn your focus from rage toward prevention and empowerment. Dear Amy: I work as a caregiver for an elderly man with dementia. His health went downhill recently after a fall, but he’s slowly recovering. In the meantime, his well-meaning granddaughter temporarily moved into the basement of his house to help take care of him (although I never asked for help or said I needed it; I have other fellow caregivers who also take care of this same client). When she moved in, I noticed behavior from her toward my client that made me feel very uncomfortable. She’s overly affectionate and constantly touches and kisses him. She even “snuggles” with him in his bed every night. I don’t know how to tell her that this is too much, especially considering the fact that he has dementia and isn’t “all there.” I want to tell her to back off without losing my job. What should I do? Dear Caregiver: All states have mandatory reporting laws protecting elder citizens. As a caregiver, you are a mandated reporter. You must report this to your supervisor and/or adult protective services/law enforcement in your area. I can’t state unequivocally that this is abusive, but you are a professional, you know the client and his capacities for consent, and your instincts are screaming. Do the right thing. Dear Amy: Thank you for your answer to “Want to be Grandpa,” who wanted to be called “Grandpa,” but had never acted like one to his own grandchildren. I am always astounded at some people’s insistence that their age alone should confer special status. I’m glad you called him out. Dear Grandparent: People demanding a pass rarely deserve one.
0.92977
can you tell me what the issue may be? My car has 137250 miles. Hi there. Any number of concerns can create a loss of power. Assuming, the check engine light is not coming on, this leads me to believe the PCM (powertrain control module)/computer is not recognizing the fault. A plugged catalytic converter should be a consistent overall lack of power. Low fuel pressure caused by a faulty fuel pump, a faulty fuel pressure regulator, a plugged fuel filter would create a lack of power. A dirty/faulty MAF (mass airflow) sensor incorrectly calculating the incoming air to the engine would create a lack of power. There are more possibilities and proper diagnoses needs to performed. Replacing components without diagnosis can be expensive and time consuming without resolution. I recommend having your vehicle’s hesitation issue diagnosed diagnosed and repaired by a certified technician, such as one from YourMechanic. Q: Rotor or anti-lock brakes problems? Q: What may cause my transmission to jerk?
0.942671
When deciding what to wear on a plane trip, it’s important to consider comfort, safety and the security screening process. Navigating through airports can require a lot of walking and standing in line. Boarding and deplaning often requires walking through areas that are not climate controlled, and airplane seats can be cramped. Taking care to choose clothing that looks and feels good in all of these conditions is critical to enjoyable air travel. Shoes are a primary concern when dressing for air travel since you’ll spend so much time on your feet working your way through one or more airports. Wear comfortable low-heeled shoes designed for walking. Avoid wearing new shoes. Wear a comfortable pair already broken in that are easy to walk in. Select a shoe style that is easy to remove and put back on, as you’ll have to remove your shoes to clear security. Sneakers, sandals and flip flops are good options. Dress in layers so you can add or remove items for comfort when temperatures fluctuate throughout your trip. Because airports are crowded, they tend to set cool temperatures, but it may be warm on the airplane while waiting for takeoff. Depending on your travel plans, your destination and point of departure temperatures may also be much different. Layers can also help you clear security faster. Avoid wearing a heavy, oversized sweatshirt or any pullover garment if you don’t have a T-shirt or other top underneath. If you are wearing a bulky top that you can’t remove before passing through the X-ray machines at the security checkpoint, you’ll have to go through a thorough pat-down before being cleared. Keep in mind that you’ll be moving around quite a bit when you travel, possibly going in and out of small rows of seats and reaching overhead to stash or remove items from overhead bins. Women should, consequently, choose slacks over dresses or skirts. It’s a good idea to wear clothes that are fairly loose-fitting when you fly. This can help you stay comfortable and can keep your blood flowing the way it should during extended periods of sitting. It’s not unusual for people to experience leg, foot and ankle swelling during flights, so it’s very important to avoid wearing tight-fitting pants and shoes. You should also avoid wearing pantyhose, knee-highs and snug socks for this reason. Airport X-ray machines and metal detectors are quite sensitive. To avoid delays passing through security, do not wear a bra that has metal underwiring when traveling by air. If you are traveling for business, pack clothes appropriate for work in your carry-on bag and change in the airport restroom once you arrive at your destination.
0.997909
Fue autor de obras como The Wreck of Reparations (1933),​ The Pipe Dream of Peace: The Story of the Collapse of Disarmament (1935),​ Wooden Titan. Hindenburg in Twenty Years of German History: 1914-1934 (1936), una biografía de Paul von Hindenburg,​ Brest Litovsk: The Forgotten Peace (March 1918) (1938), sobre el Tratado de Brest-Litovsk,​​​ Munich: Prologue to Tragedy (1948),​​ The Nemesis of Power: The German Army in Politics 1918-1945 (1953),​[a]​ King George VI, His Life and Reign (1958), una biografía de Jorge VI del Reino Unido,​[b]​ A Wreath to Clio: Studies in British, American and German Affairs (1967)​ o Knaves, Fools and Heroes: Europe Between the Wars (1974),​ entre otras. ↑ Schofield, 2012, p. 1. ↑ Schofield, 2012, p. 279. ↑ Schofield, 2012, p. 60. ↑ Dawson, 1933, pp. 686-688. ↑ Nelson, 1936, p. 11. ↑ Seton-Watson, 1939, pp. 479-481. ↑ Dean, 1939, p. 19. ↑ Rudin, 1949, pp. 197-198. ↑ Ebenstein, 1964, pp. 185-186. ↑ Waite, 1954, pp. 272-274. ↑ Carr, 1978, pp. 170-171. ↑ McCallum, 1960, pp. 374-376. ↑ Cannadine, 1998, pp. 60-61. ↑ Stansky, 1969, pp. 215-216. ↑ Gulick, 1976, p. 848. Wheeler-Bennett, John Wheeler (1935). The Pipe Dream of Peace: The Story of the Collapse of Disarmament (en inglés). New York: William Morrow & Company. —— (1938). Brest-Litovsk, the forgotten peace, March, 1918 (en inglés). London: Macmillan and Co. Cannadine, David (1998). History in Our Time. Yale University Press. ISBN 9780300077025. Carr, William (1978). «National Socialism: Foreign Policy and Wehrmacht». En Walter Laqueur. Fascism, a Reader's Guide: Analyses, Interpretations, Bibliography. University of California Press. pp. 151-178. ISBN 9780520036420. Dawson, W. H. (diciembre de 1933). «The Wreck of Reparations. by John W. Wheeler-Bennett». The Economic Journal (en inglés) (Wiley / Royal Economic Society) 43 (172): 686-688. ISSN 1468-0297. JSTOR 2224522. doi:10.2307/2224522. Dean, Vera Micheles (21 de enero de 1939). «Drive to the East. The Forgotten Peace, by John W. Wheeler-Bennett». The Saturday Review of Literature (en inglés): 19. ISSN 0036-4983. Ebenstein, William (septiembre de 1964). «Munich: Prologue to Tragedy by John W. Wheeler-Bennett». Annals of the American Academy of Political and Social Science (en inglés) (Sage Publications / American Academy of Political and Social Science) 355: 185-186. ISSN 0002-7162. JSTOR 1036710. Gulick, Edward V. (octubre de 1976). «Modern Europe. Knaves, Fools and Heroes, by John Wheeler-Bennett». The American Historical Review (en inglés) (American History Association): 848. ISSN 0002-8762. McCallum, R. B. (abril de 1960). «King George VI, His Life and Reign by John W. Wheeler Bennett». The English Historical Review (en inglés) (Oxford University Press) 75 (295): 374-376. ISSN 1477-4534. JSTOR 557446. Nelson, Boris Erich (14 de noviembre de 1936). «Man, Marshal, Myth. Wooden Titan, by John W. Wheeler-Bennett». The Saturday Review of Literature (en inglés): 11. ISSN 0036-4983. Rudin, Harry R. (marzo de 1949). «Munich: Prologue to Tragedy by John W. Wheeler-Bennett». Annals of the American Academy of Political and Social Science (en inglés) (Sage Publications / American Academy of Political and Social Science) 262: 197-198. ISSN 0002-7162. JSTOR 1026995. Schofield, Victoria (2012). Witness to History: The Life of John Wheeler-Bennett (en inglés). Yale University Press. ISBN 9780300179019. Seton-Watson, R. W. (enero de 1939). «Brest Litovsk: The Forgotten Peace (March 1918) by John W. Wheeler-Bennett». The Slavonic and East European Review (en inglés) (Modern Humanities Research Association / University College London, School of Slavonic and East European Studies) 17 (50): 479-481. ISSN 2222-4327. JSTOR 4203504. Stansky, Peter (junio de 1969). «A Wreath to Clio: Studies in British, American and German Affairs by John W. Wheeler-Bennett». The Journal of Modern History (en inglés) ([[The University of Chicago Press]]) 41 (2): 215-216. ISSN 1537-5358. JSTOR 1899323. Waite, Robert G. L. (junio de 1954). «The Nemesis of Power: The German Army in Politics 1918-1945 by John W. Wheeler-Bennett». The Western Political Quarterly (en inglés) (University of Utah / Western Political Science Association) 7 (2): 272-274. ISSN 0043-4078. JSTOR 442474.
0.971665
Cytidine deaminase (CDA) deficiency induces an excess of cellular dCTP, which reduces basal PARP-1 activity, thereby compromising complete DNA replication, leading to ultrafine anaphase bridge (UFB) formation. CDA dysfunction has pathological implications, notably in cancer and in Bloom syndrome. It remains unknown how reduced levels of PARP-1 activity and pyrimidine pool imbalance lead to the accumulation of unreplicated DNA during mitosis. We report that a decrease in PARP-1 activity in CDA-deficient cells impairs DNA-damage-induced Chk1 activation, and, thus, the downstream checkpoints. Chemical inhibition of the ATR–Chk1 pathway leads to UFB accumulation, and we found that this pathway was compromised in CDA-deficient cells. Our data demonstrate that ATR–Chk1 acts downstream from PARP-1, preventing the accumulation of unreplicated DNA in mitosis, and, thus, UFB formation. Finally, delaying entry into mitosis is sufficient to prevent UFB formation in both CDA-deficient and CDA-proficient cells, suggesting that both physiological and pathological UFBs are derived from unreplicated DNA. Our findings demonstrate an unsuspected requirement for a balanced nucleotide pool for optimal Chk1 activation both in unchallenged cells and in response to genotoxic stress. Genetic stability is ensured by complete genome duplication and balanced chromosome segregation. DNA replication errors are particularly deleterious because they can affect both DNA duplication and segregation during mitosis (Gelot et al., 2015). Replication stress is defined as any phenomenon affecting completion of the DNA replication program, including alterations to the initiation and elongation steps of DNA replication, conflicts between DNA replication and metabolic pathways, such as transcription and mRNA processing, nucleotide pool disequilibrium, and the overexpression or activation of oncogenes (Hills and Diffley, 2014; Lecona and Fernandez-Capetillo, 2014; Magdalou et al., 2014; Mazouzi et al., 2014). Such stress can jeopardize the completion of DNA replication and chromosome segregation, as illustrated by our previous studies showing that pyrimidine pool disequilibrium resulting from cytidine deaminase (CDA) deficiency is a source of replication stress and subsequent segregation defects (Chabosseau et al., 2011; Gemble et al., 2015). CDA is an enzyme of the pyrimidine salvage pathway that catalyzes the hydrolytic deamination of cytidine and deoxycytidine into uridine and deoxyuridine, respectively (Nygaard, 1986). CDA deficiency leads to intracellular dCTP accumulation, lowering the basal activity of poly(ADP-ribose) polymerase 1 (PARP-1), a multifunctional enzyme involved in many cellular processes, including in particular the response to DNA damage (Tallis et al., 2014). Decreases in PARP-1 activity lead to the under-replication of some ‘difficult-to-replicate’ loci in the genome, resulting in ultrafine anaphase bridge (UFB) formation (Gemble et al., 2015). UFBs reflect a defect in sister chromatid segregation during anaphase. They cannot be stained with conventional DNA dyes or antibodies against histones, but they can be detected with an antibody against Plk1-interacting checkpoint helicase (PICH, also known as ERCC6L), a protein recruited to UFBs (Baumann et al., 2007; Chan et al., 2007). UFBs are present in almost all cell lines and are, therefore, probably physiological structures (Chan et al., 2007). In the absence of exogenous stress, most are of centromeric origin, but some originate from common fragile sites or telomeres (Chan et al., 2007, 2009; Barefield and Karlsedar, 2012). UFB frequency often increases under constitutive or induced replication stress conditions (Chan et al., 2007, 2009). CDA dysfunction has pathological implications, particularly in cancers, in which CDA activity might be either up- or downregulated, affecting the sensitivity of cancer cells to nucleotide analogs, such as gemcitabine (Ye et al., 2015; Zauri et al., 2015; Serdjebi et al., 2015). The importance of CDA defects and, more broadly, of pyrimidine pool disequilibrium, is illustrated by Bloom syndrome, a rare genetic disease displaying one of the strongest known correlations between chromosomal instability and an increase in cancer risk (German, 1997). In Bloom syndrome(DSA2) cells, the expression of genome instability markers results partly from pyrimidine pool disequilibrium resulting from a CDA defect. In particular, the supernumerary UFBs observed in Bloom syndrome cells result from CDA deficiency, which decreases basal PARP-1 activity (Gemble et al., 2015). Supernumerary UFBs are generated from unreplicated DNA. Thus, these observations raise questions about the mechanism underlying the persistence of unreplicated DNA during mitosis that we will need to resolve to improve our understanding of the pathological consequences of the incomplete genome replication caused by CDA defects. We explored the potential role of one of the targets and partners of PARP-1, checkpoint kinase 1 (Chk1, also known as Chek1), in preventing the accumulation of unreplicated DNA during mitosis. Chk1, and its kinase, ataxia telangiectasia and Rad3-related (ATR), are key players in the regulation of the intra-S, S–M and G2–M checkpoints (Sancar et al., 2004; Petermann and Caldecott, 2006; Eykelenboom et al., 2013; Smits and Gillespie, 2015). In response to genotoxic stress, the serine 317 and 345 residues of Chk1 are phosphorylated by ATR (Zhao and Piwnica-Worms, 2001; Liu et al., 2000), abolishing Chk1 auto-inhibition and allowing the subsequent activation of downstream checkpoints. Thus, activated Chk1 plays a major role in maintaining replication fork integrity and preventing cells from entering mitosis prematurely (Zuazua-Villar et al., 2014). We show here that a lowering of basal PARP-1 activity levels in CDA-deficient cells compromises optimal Chk1 activation and decreases the efficiency of downstream checkpoints, leading to the accumulation of unreplicated DNA during mitosis and, ultimately, UFB formation. These results establish an unexpected link between the nucleotide pool and Chk1 activation and reveal a new role for Chk1 in preventing chromosome segregation defects. PARP-1 catalyzes poly(ADP-ribosyl)ation (PARylation) by transferring ADP-ribose units from nicotinamide (NAD+) onto diverse acceptor proteins (Luo and Kraus, 2012). The interaction of Chk1 with PAR is required for its efficient retention on DNA, and, thus, for its optimal activation (Min et al., 2013). We hypothesized that the lower levels of PARP-1 activity in CDA-deficient cells might decrease the stability of Chk1 on DNA and its activation. We analyzed the relative abundance of Chk1 in the chromatin-bound fractions from CDA-deficient or -proficient cells. GAPDH, BLM and histone 3 (H3) were used as loading controls for the cytoplasm, soluble nuclear and chromatin-bound fractions, respectively (Fig. 1A; Fig. S1A). Chk1 was found to be less abundant in the chromatin-bound fraction of PARP-1-deficient cells than in that of control cells. We thus confirmed that PARP-1 defects decrease the stability of Chk1 on DNA (Min et al., 2013) (Fig. S1A). Chk1 was also less abundant in the chromatin-bound fraction of CDA-deficient cells than in that of control cells (Fig. 1A). Additionally, PARP-1 was less abundant in the chromatin-bound fraction in the absence of CDA (Fig. 1A). Thus, CDA-deficient cells have small amounts of Chk1 bound to their DNA, suggesting that the activation of this protein might be weak in these cells. CDA deficiency compromises PARP-1 and Chk1 activation after genotoxic stress. (A) Representative immunoblot of subcellular fractions from HeLa-Ctrl(CDA) or HeLa-shCDA cell lines. GAPDH, BLM and H3 proteins were used as loading controls for the cytoplasmic, nuclear and chromatin-bound fractions, respectively. (B) Left panel, representative immunoblot of HeLa-Ctrl(CDA) or HeLa-shCDA cells left unexposed or exposed to 8 J/m2 UVC. Right panel, corresponding quantification of the amount of Chk1 S317 normalized against Chk1. (C) Left panel, representative immunoblot of HeLa-Ctrl(CDA) or HeLa-shCDA cells left untreated or treated with 25 nM CPT for 2 or 8 h. Right panel, corresponding quantification of the amount of Chk1 S317 normalized against Chk1. (D) Representative immunoblot of HeLa-Ctrl(CDA) or HeLa-shCDA cells left untreated or treated with 1 mM dC for 8 h, with or without treatment with 25 nM CPT for 2 h. (E,F) Relative numbers of PAR foci in HeLa-Ctrl(CDA) and HeLa-shCDA cells (E) left untreated or treated with 25 nM CPT for 8 h (n=4, >530 cells analyzed) or (F) left unexposed or exposed to 8 J/m2 UVC (n=4, >500 cells analyzed). The error bars indicate the mean±s.d. Statistical significance was calculated with Student's t-test. We then investigated whether Chk1 activity was affected in CDA-deficient cells. Phosphorylation of the serine 317 residue of Chk1 is a classical marker of the activation of this protein (Zhao and Piwnica-Worms, 2001; Katsuragi and Sagata, 2004; Ng et al., 2004). However, this phosphorylation cannot be detected by standard immunoblotting in basal conditions without exogenous stress. We thus activated Chk1 by exposing CDA-deficient cells, or PARP-1-depleted cells as a control, to UVC (8 J/m2) and analyzed Chk1 phosphorylation by immunoblotting. For CDA deficiency, we used two isogenic cell models, CDA-depleted HeLa cells and the corresponding control cells [HeLa-shCDA and HeLa-Ctrl(CDA), respectively] and Bloom syndrome cells expressing neither BLM nor CDA [BS-Ctrl(BLM)] and the corresponding control cells expressing both BLM and CDA (BS-BLM) (Gemble et al., 2015). Chk1 phosphorylation levels were lower in PARP-1-deficient cells than in control cells (Fig. S1B), confirming that PARP-1 contributes to optimal Chk1 activation (Min et al., 2013). In CDA-deficient cells, Chk1 phosphorylation levels were 34% lower than those in CDA-expressing cells after exposure to UVC (Fig. 1B). These observations were reproduced by treating both HeLa-shCDA and BS cells with 25 nM CPT for 2 or 8 h (Fig. 1C; Fig. S1C). CDA deficiency leads to an intracellular accumulation of dCTP (Chabosseau et al., 2011; Gemble et al., 2015). The addition of dC to the culture medium of CDA-proficient cells reproduces the increase in dCTP levels observed in CDA-deficient cells, mimicking CDA deficiency (Chabosseau et al., 2011; Gemble et al., 2015). We treated CDA-proficient and CDA-deficient cells with dC before CPT treatment. Lower levels of PARP-1 activity, resulting in lower levels of Chk1 activation, were observed in both cell types (Fig. 1D; Fig. S1E). Thus, increasing the size of the intracellular dCTP pool is sufficient to weaken the activation of PARP-1 and Chk1 in response to genotoxic stress and to decrease the activation of these proteins further in CDA-depleted cells. These data reveal an unexpected link between nucleotide pool disequilibrium and Chk1 activation. The intracellular accumulation of dCTP resulting from CDA deficiency leads to a 30–50% decrease in basal PARP-1 activity (Gemble et al., 2015). We therefore investigated whether PARP-1 activity was also compromised in response to acute exposure to genotoxic stress, reflecting suboptimal Chk1 activation. We quantified PAR levels in CDA-deficient cells following treatment with either CPT or UVC, by immunofluorescence analysis with customized software for the automatic counting of PAR foci (Gemble et al., 2015). Basal PARP-1 activity in untreated CDA-deficient cells was weak, as previously reported (Gemble et al., 2015), but we also observed significantly fewer PAR foci in CDA-deficient cells treated with 25 nM CPT or exposed to 8 J/m2 of UVC than in control cells exposed to the same stimuli (Fig. 1E,F; Fig. S1D). Thus, the PARP-1 activity of CDA-deficient cells is weak not only in basal conditions, but also in response to genotoxic stress. These data indicate that, in CDA-deficient cells subjected to genotoxic stress, the intracellular accumulation of dCTP decreases PARP-1 activity, thereby compromising optimal Chk1 activation. Our data showing that Chk1 activation was compromised in CDA-deficient cells subjected to genotoxic stress led us to explore the possible functional consequences for downstream cell-cycle delays in these cells. Chk1 plays a key role in the S- and G2–M-phase checkpoints in response to DNA damage (Smits and Gillespie, 2015; Segurado and Tercro, 2009). S-phase checkpoint activation suppresses replication origin firing and stabilizes stalled replication forks, leading to a decrease in DNA synthesis and an accumulation of cells in S-phase (Smits and Gillespie, 2015; Segurado and Tercero, 2009). Thus, to quantify S-phase checkpoint efficiency, we first measured DNA synthesis in CDA-deficient cells and control cells by exposing them to UVC (8 J/m2) and adding EdU to the cell culture medium for one hour, either immediately after UVC treatment or 16 h later. Then we analyzed EdU incorporation into DNA by flow cytometry, to determine the relative proportions of DNA synthesis after UVC treatment, with decreases considered to reflect S-phase checkpoint efficiency. DNA synthesis had decreased one hour after UVC treatment in all cells analyzed (Fig. 2A; Fig. S2A), but PARP-1-depleted cells displayed higher levels of DNA synthesis than PARP-1-expressing cells, as previously reported (Min et al., 2013) (Fig. S2A). Similarly, CDA-depleted cells displayed higher levels of DNA synthesis one hour after UVC exposure than CDA-expressing cells (Fig. 2A). DNA synthesis had returned to basal levels 16 h after UVC exposure in both cell types, confirming that the decrease in DNA synthesis resulted from transient checkpoint activation rather than cell death (Fig. 2A; Fig. S2A). The inhibition of Chk1 by CHIR-124, its specific inhibitor (Tse et al., 2007), abolished the decrease in DNA synthesis one hour after UVC treatment, in both CDA-deficient and CDA-proficient cells (Fig. S2B). The efficiency of Chk1 inhibition was confirmed by the accumulation of Cdc25A protein, the degradation of which is dependent on Chk1 activity (Boutros and Ducommun, 2008) (Fig. S2C). These data confirmed that the decrease in DNA synthesis in response to UVC resulted from Chk1-dependent activation of the S-phase checkpoint, and revealed a lower efficiency of this checkpoint in CDA-deficient cells. CDA deficiency jeopardizes the efficiency of Chk1-dependent checkpoints. (A) Percentage relative DNA synthesis in HeLa-Ctrl(CDA) or HeLa-shCDA cell lines unexposed or exposed to 8 J/m2 UVC (n=3). (B) Left panel, representative cell cycle distribution of HeLa-Ctrl(CDA) and HeLa-shCDA cells unexposed or exposed to 8 J/m2 UVC. Right panel, percentage HeLa-Ctrl(CDA) and HeLa-shCDA cells in S-phase 8 h after exposure to 8 J/m2 UVC (n=3). (C) Left panel, representative cell cycle distribution for HeLa-Ctrl(CDA) and HeLa-shCDA cells left untreated or treated with 25 nM CPT. Right panel, percentage of HeLa-Ctrl(CDA) or HeLa-shCDA cells in S-phase after being left untreated or treated with 25 nM CPT for 8 h (n=7). Red arrows in B,C indicate peak representing cells in S-phase. (D) Left panel, representative immunoblot of HeLa-Ctrl(CDA) and HeLa-shCDA cells left untreated or treated with 25 nM CPT for 8 h. Right panel, corresponding quantification of the amount of H3S10 normalized against actin. (E) Relative number of mitotic cells in HeLa-Ctrl(CDA) and HeLa-shCDA cells left untreated or treated with 25 nM CPT for 8 h (n=3; >1500 cells analyzed). Error bars represent the mean±s.d. Statistical significance was calculated with Student's t-test. Further support for these conclusions was provided by an analysis of the cell cycle distribution of cells with and without CDA expression, at various times after exposure to genotoxic stress. The increase in the percentage of cells in S-phase (red arrows in left panels, Fig. 2B,C) in response to CPT or UVC treatment was significantly smaller in CDA-deficient cells (Fig. 2B,C, right panels) than in control cells, and entry into S-phase was inhibited by CHIR-124 treatment (Fig. S2D,E). Thus, Chk1-dependent S-phase checkpoint activation was less efficient in the absence of CDA, reducing the inhibition of DNA synthesis and resulting in the accumulation of smaller number of cells in S-phase, in response to a genotoxic stress. We also observed that more CDA-deficient cells than control cells accumulated in the G2–M phase (Fig. 2B,C, left panels). We therefore investigated the efficiency, in CDA-deficient cells, of the G2–M checkpoint, which prevents entry into mitosis in the presence of DNA damage (Dai and Grant, 2010). We quantified histone 3 with a phosphorylated serine 10 residue (H3S10), a specific marker of mitosis, after CPT treatment. The H3S10 signal was still visible eight hours after treatment with 25 nM CPT in CDA-deficient cells, whereas it was not detectable in control cells (Fig. 2D). Thus, a higher percentage of cells enter mitosis, despite DNA damage, in the absence of CDA. Consistent with these results, analysis of the mitotic index revealed a significantly higher percentage of CDA-deficient cells than of control cells in mitosis after CPT treatment (Fig. 2E). These results were confirmed by flow cytometry analysis, which showed the percentage of H3S10-positive cells after CPT treatment to be significantly higher for CDA-deficient cells than for CDA-proficient cells (Fig. S2F). Thus, G2–M checkpoint activation was less efficient in CDA-deficient cells. These results show that the low levels of Chk1 activation in CDA-deficient cells decrease the efficiency of the DNA damage-induced S and G2–M checkpoints, leading to a premature passage of cells from S-phase to mitosis despite the presence of DNA damage and, potentially, under-replicated DNA, particularly at late-replicating sequences. As CDA-deficient cells contain smaller amounts of DNA-bound Chk1, we hypothesized that the low levels of basal Chk1 activity contributed to the formation of UFB-containing unreplicated DNA in the absence of exogenous genotoxic treatment. The excess UFB formation in CDA-deficient cells is a marker of unreplicated DNA accumulation during mitosis, but the origin of the basal UFBs remains unclear (Gemble et al., 2015). Chk1 inhibition triggers the premature entry of S-phase cells into mitosis before the completion of DNA replication (Zuazua-Villar et al., 2014), and we observed low levels of Chk1 activation in CDA-deficient cells (Fig. 1), which are known to present supernumerary UFBs (Gemble et al., 2015). We therefore hypothesized that Chk1 inhibition might favor the accumulation of unreplicated DNA during mitosis, and, consequently, UFB formation. We treated CDA-deficient or CDA-proficient cells with Chk1 inhibitor CHIR-124 or with VE-821, an inhibitor of ATR, the kinase that activates Chk1 in response to DNA damage (Zhao and Piwnica-Worms, 2001), and analyzed UFB frequency in anaphase cells. Increases in H3S10 expression in both CDA-proficient and CDA-deficient cells treated with VE-821 revealed premature entry into mitosis, confirming ATR inhibition (Fig. 3A). We found that the inhibition of Chk1 or ATR led to an increase in UFB frequency in CDA-proficient cells, to levels similar to those in CDA-deficient cells, whereas it had no effect on UFB frequency in CDA-deficient cells (Fig. 3B–D). These results demonstrate the importance of the ATR–Chk1 pathway for preventing supernumerary UFB formation. As the inhibition of ATR or Chk1 had no effect on UFB frequency in CDA-deficient cells, these results suggest that CDA and ATR–Chk1 prevent UFB formation through the same pathway. Our previous results showing that CDA-deficient cells display a constitutive activation of both γH2AX and Chk2 (Gemble et al., 2015) led us to investigate the possible involvement of the ATM–Chk2 pathway in supernumerary UFB formation in these cells. We analyzed UFB frequency in CDA-deficient cells and in CDA-proficient cells left untreated or treated with KU55933, a specific inhibitor of ATM (Hickson et al., 2004). As expected, the level of phosphorylation of the threonine 68 residue of Chk2 by ATM was much lower in the KU55933-treated cells, confirming the inhibition of ATM (Fig. S3A). ATM inhibition had no effect on UFB frequency in CDA-expressing cells or CDA-deficient cells (Fig. S3B), demonstrating an absence of ATM–Chk2 pathway involvement in UFB formation. Chk1 inhibition promotes UFB formation in CDA-expressing cells. (A) Representative immunoblot of HeLa-Ctrl(CDA) and HeLa-shCDA cell lines left untreated or treated with 10 µM VE-821 for 8 h. (B) Representative deconvoluted z-projection immunofluorescence images of PICH-positive UFBs in HeLa-Ctrl(CDA) anaphase cells. DNA was visualized with DAPI (in blue). UFBs were stained with an anti-PICH antibody (in green). Scale bar: 5 µm. (C,D) Mean number of UFBs per anaphase cell in HeLa-Ctrl(CDA) and HeLa-shCDA cells left untreated or treated for 8 h with (C) 400 nM CHIR-124 or (D) 10 µM VE-821 (n=3; >100 anaphase cells analyzed). (E,F) Mean number of UFBs per anaphase cell in HeLa-Ctrl(CDA) and HeLa-shCDA cells left untreated or treated with 2 pM CPT for 8 h, with or without (E) 400 nM CHIR-124 or (F) 10 µM VE-821 (n=3; >95 anaphase cells analyzed). Error bars represent the mean±s.d. Statistical significance was calculated with Student's t-test. We have shown that the treatment of CDA-deficient cells with very low doses of CPT (2 pM) is sufficient to increase basal levels of PARP-1 activity to those observed in untreated CDA-proficient cells. Such a restoration of PARP-1 activity is sufficient to prevent the accumulation of unreplicated DNA and, thus, supernumerary UFBs (Gemble et al., 2015). We investigated whether the ATR–Chk1 pathway acted downstream from PARP-1 to prevent UFB formation in CDA-deficient cells, by determining whether the suppression of UFB formation by low-doses of CPT required a functional ATR–Chk1 pathway. In CDA-proficient cells, the inhibition of Chk1 or ATR stimulated UFB formation, independently of treatment with low doses of CPT (Fig. 3E,F, black bars). In CDA-deficient cells, low doses of CPT abolished the formation of supernumerary UFBs, unless Chk1 or ATR was inhibited (Fig. 3E,F, gray bars). Thus, PARP-1 activation prevents the formation of supernumerary UFBs in CDA-deficient cells in an ATR–Chk1-dependent manner. These findings demonstrate that the accumulation of unreplicated DNA and, thus, of supernumerary UFBs in the absence of CDA is caused by low levels of PARP-1 activity, resulting in a weakening of ATR–Chk1-dependent checkpoints. The results presented above suggest that the low levels of ATR–Chk1 activity observed in the absence of CDA lead to the premature entry of S-phase cells with partially replicated chromosomes into G2–M, resulting in an excess of UFB-containing unreplicated DNA. These data led us to investigate whether delaying entry into mitosis might allow cells to complete DNA replication before entering mitosis, thereby preventing UFB formation. The treatment of cells with low doses of RO-3306, a cyclin-dependent kinase 1 (Cdk1) inhibitor, or with volasertib, a polo-like kinase 1 (Plk1) inhibitor, delays entry into mitosis (Eykelenboom et al., 2013; Rudolph et al., 2009; Raab et al., 2015). Cells were treated with either RO-3306 or volasertib, leading to an increase in the percentage of cells in the S and G2 phases (Fig. 4A,B), and an increase in cyclin B1 levels (Fig. 4C,D). This delaying of entry into mitosis was associated with a significant decrease in the frequencies of unreplicated centromeres and UFBs during mitosis, not only in CDA-deficient cells, but also in CDA-proficient cells (Fig. 4E–G; Fig. S4A,B). We checked that the cells in anaphase had previously experienced extended S and G2 phases by adding EdU to cell cultures one hour before RO-3306 treatment for the labeling of S-phase cells (Fig. S4C). All the mitotic cells analyzed were EdU-positive, confirming that cells in anaphase with low UFB frequencies had previously gone through extended S and G2 phases (Fig. S4D). Finally, given that PICH is regulated by Plk1 and Cdk1 (Baumann et al., 2007), we checked that low doses of RO-3306 had no effect on the location of PICH at the centromeres of mitotic cells (Fig. S4E), confirming that the decrease in UFB frequency did not result from a change in PICH distribution. Promoting the completion of DNA replication prevents UFB formation. (A,B) Representative distribution in the cell cycle of HeLa-Ctrl(CDA) and HeLa-shCDA cells left untreated or treated for 6 h with (A) 2.5 µM RO-3306 or (B) 5 nM volasertib. (C,D) Representative immunoblot of HeLa-Ctrl(CDA) and HeLa-shCDA cells left untreated or treated for 6 h with (C) 2.5 µM RO-3306 or (D) 5 nM volasertib. (E) Schematic representation of the protocol for the treatment with Cdk1 or Plk1 inhibitors; all cells analyzed during mitosis were treated with Cdk1 or Plk1 inhibitors during S and G2 phases. (F,G) Mean number of UFBs per anaphase cell in HeLa-Ctrl(CDA) and HeLa-shCDA cells left untreated or treated for 6 h with (F) 2.5 µM RO-3306 or (G) 5 nM volasertib (n=4; >95 anaphase cells analyzed). Error bars represent the mean±s.d. Statistical significance was calculated with Student's t-test. These data indicate that delaying entry into mitosis is sufficient to promote the completion of DNA replication, thereby preventing the formation of basal and supernumerary UFBs. These findings suggest that all UFBs result from the accumulation of unreplicated DNA during mitosis. We recently reported a new mechanism by which excess cellular dCTP, resulting from CDA deficiency, partially inhibits the basal activity of PARP-1, leading to the under-replication of some ‘difficult-to-replicate’ loci, resulting in UFB formation during mitosis (Gemble et al., 2015). Here, we identify a downstream target of PARP-1, the ATR–Chk1 pathway, dysfunctions of which lead to an accumulation of UFB-containing under-replicated DNA. Our findings reveal that pyrimidine pool disequilibrium jeopardizes Chk1 activation. We demonstrate that the intracellular accumulation of dCTP resulting from CDA deficiency reduces PARP-1 activity and, thus, Chk1 activation, thereby weakening the S and G2–M checkpoints. We suggest that this decrease in checkpoint efficiency promotes the accumulation of unreplicated DNA during mitosis, leading to excess UFB formation (Fig. 5). Balanced pyrimidine pool ensures optimal Chk1 activation, preventing the formation of supernumerary UFBs. (A) In CDA-proficient cells, basal PARP-1 activity ensures optimal Chk1 activation, promoting optimal checkpoint efficiency and preventing the accumulation of unreplicated DNA at the onset of mitosis. (B) In CDA-deficient cells, low levels of PARP-1 activity compromise optimal Chk1 activation, decreasing checkpoint efficiency and promoting the entry into mitosis of cells containing unreplicated DNA and, consequently, excessive UFB formation. We found that PARP-1 activity levels were low in CDA-deficient cells not only in basal conditions, but also in response to genotoxic stress. The intracellular accumulation of dCTP thus also impairs the enhancement of PARP-1 activation. PARP-1 interaction with DNA is necessary for its activation (Langelier and Pascal, 2013); the low levels of PARP-1 in the chromatin-bound fraction from CDA-deficient cells studied here suggest that increases in dCTP concentration disturb the interaction of PARP-1 with DNA, thereby compromising its subsequent activation. We also found that Chk1 levels were low in the chromatin-bound fraction from CDA-deficient cells. These results are consistent with those of a previous study showing that PAR, supplied by PARP-1, interacts with Chk1, promoting its efficient retention on DNA and its optimal activation (Min et al., 2013). Thus, the small amounts of DNA-bound Chk1 probably result from the low level of PARP-1 recruitment to DNA, and, thus, from insufficient Chk1–PAR interaction. As expected, the low levels of DNA-bound Chk1 affected the activation of this protein in response to genotoxic stress, confirming that optimal PARP-1 activity is required for the correct enhancement of Chk1 activation. Culturing cells with deoxycytidine, which is known to increase intracellular levels of dCTP and to decrease PARP-1 activity (Gemble et al., 2015), was sufficient to reproduce the cellular phenotype associated with CDA-deficiency; poor Chk1 activation in response to genotoxic stress. These data reveal an unexpected requirement for a balanced nucleotide pool to ensure optimal Chk1 activation. The weakening of downstream checkpoint efficiency is a direct consequence of the low levels of Chk1 activity in the absence of CDA. Indeed, CDA-deficient cells present incomplete S and G2–M checkpoint activation in response to genotoxic stress. These data confirm our previous findings that, in response to UVC, BLM-deficient cells display partial escape from the G2–M cell cycle checkpoint (Ababou et al., 2002). The failure of CDA-deficient cells to activate the S and G2–M checkpoints optimally in response to genotoxic stress might account for the accumulation of DNA damage observed directly by electron microscopy in these cells and indirectly detected through the constitutive activation of the γH2AX–Chk2 pathway (Gemble et al., 2015). Our findings suggest that insufficient Chk1 activity allows cells with partially replicated chromosomes to enter mitosis, leading to the formation of UFB-containing under-replicated DNA in CDA-deficient cells. We would thus expect to reproduce this phenotype by inhibiting Chk1 or its sensor kinase, ATR. We found that ATR–Chk1 pathway inhibition resulted in excess UFB formation in CDA-proficient cells but not in CDA-deficient cells. These results not only support our hypothesis, but also indicate that CDA, PARP-1, Chk1 and ATR act through the same pathway to prevent the accumulation of unreplicated DNA, and, thus, the formation of supernumerary UFBs, during mitosis. Consistent with this finding, we demonstrated that restoring PARP-1 activity by treating CDA-deficient cells with very low doses of CPT did not prevent UFB formation if either Chk1 or ATR was inhibited. The ATR–Chk1 pathway prevents S-phase cells from entering mitosis prematurely (Eykelenboom et al., 2013; Zuazua-Villar et al., 2014). Thus, the low levels of Chk1 activation in CDA-deficient cells might promote premature entry into mitosis, before the completion of DNA replication, thereby accounting for the excess of UFB-containing unreplicated DNA formation. Consistent with this hypothesis, we showed that delaying entry into mitosis led to a decrease in the frequencies of unreplicated centromeres and UFBs during mitosis, not only in CDA-deficient cells, but also in CDA-proficient cells. These results indicate that all UFBs are derived from unreplicated DNA sequences, regardless of CDA status. We suggest that UFBs can be considered markers of the accumulation of under-replicated DNA during mitosis. This raises the question of the significance of UFBs, as these structures have been detected in all cells tested, whether primary or transformed, under physiological conditions (Chan et al., 2007). The MUS81–EME1 and ERCC1 nucleases and mitotic DNA synthesis have been reported to process unreplicated DNA sequences in mitosis (Gemble et al., 2015; Ying et al., 2013; Naim et al., 2013; Bergoglio et al., 2013), preventing excess UFB formation. All the experimental strategies used to date have succeeded only in reducing UFB numbers to the threshold UFB frequency in control cells, a physiological level. Our results are the first to show that delaying entry into mitosis is sufficient to reduce physiological UFB frequency in control cells to below this threshold. We therefore suggest that UFB formation is an additional mechanism for processing unreplicated DNA during mitosis, in situations in which processing by nucleases or mitotic DNA synthesis has failed. Cell lines were cultured in DMEM supplemented with 10% FCS. BS-Ctrl(BLM) and BS-BLM cells were obtained and cultured as previously described (Chabosseau et al., 2011). HeLa-Ctrl(CDA) and HeLa-shCDA cells were obtained and cultured as previously described (Gemble et al., 2015). HeLa-Ctrl(PARP-1) and HeLa-shPARP-1 cells were cultured as previously described (Gemble et al., 2015). Deoxycytidine (dC) was provided by Sigma Aldrich (D0779); Camptothecin (CPT) was provided by Sigma Aldrich (C9911); CHIR-124 was provided by Selleckchem (S2683); MK-1775 was provided by Selleckchem (S1525); VE-821 was provided by Selleckchem (S8007); volasertib was provided by Selleckchem (S2235); KU55933 was provided by Selleckchem (S1092) and RO-3306 was provided by Calbiochem (217699). Drugs were added to the cell culture medium at the following concentrations: dC, 1 mM; camptothecin, 2 pM or 25 nM; CHIR-124, 400 nM; VE-821, 10 µM; volasertib, 5 nM; KU55933, 10 µM; RO-3306, 2.5 µM. For the UVC experiment, we used the cells to seed six-well plates, which were incubated for 24 h before UVC exposure. Exponentially growing cells were irradiated in 1 ml PBS. Plates were placed uncovered under a UVC lamp (G25T8 germicidal lamp, Sankyo Denki, Japan) operating at 0.02 mW/cm2. Dosimetry was performed with a VLX 3W radiometer (Vilber Lourmat, France) equipped with a 254 nm probe. All cells were routinely checked for mycoplasma infection. Cells were lysed in 8 M urea, 50 mM Tris HCl, pH 7.5 and 150 mM β-mercaptoethanol, sonicated and heated at 75°C for 10 min. Samples (equivalent of 2×105 cells) were subjected to electrophoresis in NuPAGE Novex 4–12% Bis-Tris pre-cast gels (Life Technologies). The procedures used for gel electrophoresis and immunoblotting have been described elsewhere (Gemble et al., 2015), except that a Bio-Rad ChemiDoc XRS+ camera was used for detection. Primary and secondary antibodies used were as follows: rabbit anti-BLM antibody (1:5000; ab2179 from Abcam); rabbit anti-CDA antibody (1:500; ab56053 from Abcam); rabbit anti-β-actin antibody (1:10,000; Cat no. A2066 from Sigma); rabbit anti-PARP-1 antibody (1:4000; ALX-210-302 from Enzo Life Sciences); rabbit anti-Chk1 (1:500; sc-8408 from Santa Cruz Biotechnology); rabbit anti-Chk1-S317 (1:500; 2344 from Cell Signaling); mouse anti-H3S10 (1:500; 14955 from Abcam); mouse anti-Cdc25A (1:500; sc-7389 from Santa Cruz Biotechnology); rabbit anti-H3 (1:5000; ab1791 from Abcam); rabbit anti-cyclin-B1 (1:1000; sc-245 from Santa Cruz Biotechnology); mouse anti-GAPDH (1:500; G8795 from Sigma); rabbit anti-Chk2 (1:500; 2662 from Cell Signaling); rabbit anti-Chk2-T68 (1:500; 2661 from Cell Signaling); rabbit anti-H2AX (1:500; 2595 from Cell Signaling); rabbit anti-H2AX-S139 (1:500; 2577 from Cell Signaling) and horseradish-peroxidase-conjugated goat anti-rabbit-IgG or goat anti-mouse-IgG (1:5000; Cat nos. sc-2054 and sc-2055, respectively, from Santa Cruz Biotechnology). We used 4×105 HeLa cells to seed the wells of a six-well plate. The cells were left untreated or were treated as mentioned in the figures. They were then washed in PBS and fixed by incubation in 4% paraformaldehyde for 20 min. Nuclear DNA was detected by mounting slides in ProlongH Gold Antifade reagent supplemented with DAPI (Invitrogen), making it possible to distinguish between mitotic and interphase cells. Images were acquired with a Leica DM RXA microscope equipped with a motorized xy stage, using a 40× PlanApo N.A. 1.25 objective and a CoolSNAP HQ interline CCD camera (Photometrics). For each slide, a mosaic of 10×10 partly overlapping images was acquired with a Metamorph software (Molecular Devices) routine developed in-house. Image collections were assembled into a mosaic with the ‘Stitching 2D/3D’ plugin32 (available from http://fly.mpi-cbg.de/~preibisch/software.html) for ImageJ software (National Institutes of Health, Bethesda, Maryland). Mitotic index was calculated by measuring the percentage of mitotic cells in each mosaic. Immunofluorescence staining and analysis were performed as previously described (Gemble et al., 2015). Primary and secondary antibodies used were as follows: rabbit anti-PICH (1:150; H00054821-D01P from Abnova); mouse anti-PICH (1:400; H00054821-M01 from Abnova); human anti-CREST (1:100; 15-234-0001 from Antibodies Inc); goat anti-human Alexa Fluor 633 (1:500; A21091 from Life Technologies); goat anti-rabbit Alexa Fluor 555 (1:500; A21429 from Life Technologies); goat anti-mouse Alexa Fluor 555 (1:500; A21050 from Life Technologies). Cell images were acquired with a 3D deconvolution imaging system consisting of a Leica DM RXA microscope equipped with a piezoelectric translator (PIFOC; PI) placed at the base of a 63× PlanApo N.A. 1.4 objective, and a CoolSNAP HQ interline CCD camera (Photometrics). Stacks of conventional fluorescence images were collected automatically at a z-distance of 0.2 mm (Metamorph software, Molecular Devices). Images are presented as maximum intensity projections, generated with ImageJ software, from stacks deconvolved with an extension of Metamorph software (Savino et al., 2001). EdU incorporation into DNA was visualized with the Click-it EdU imaging kit (C10338 from Life Technologies), according to the manufacturer's instructions. EdU was incubated with cells at a concentration of 10 µM for 1 h. We used 4×105 HeLa cells to seed the wells of a six-well plate. The cells were left untreated or were treated as mentioned in the figures. They were then washed in cold PBS on ice and fixed by incubation in a 1:1 (vol/vol) mixture of methanol and acetone for 10 min on ice. After three washes in PBS–Tween (0.05%), cells were incubated overnight at 4°C with a mouse anti-PAR antibody [1:500; generously provided by Valérie Schreiber (Illuzzi et al., 2014)]. The cells were washed three times with PBS–Tween (0.05%) and incubated with a goat anti-mouse Alexa-Fluor-555-conjugated antibody (1:500; A21050 from Life Technologies) for 2 h. After two washes in PBS–Tween (0.05%), cells were mounted on slides with Prolong Gold with DAPI (P36931 from Life Technologies). Cell images were acquired with a 3D deconvolution imaging system consisting of a Leica DM RXA microscope equipped with a piezoelectric translator (PIFOC; PI) placed at the base of a 63× PlanApo N.A. 1.4 objective, and a CoolSNAP HQ interline CCD camera (Photometrics). Stacks of conventional fluorescence images were collected automatically at a z-distance of 0.2 mm (Metamorph software, Molecular Devices). Images are presented as maximum intensity projections, generated with ImageJ software, from stacks deconvolved with an extension of Metamorph software (Savino et al., 2001). PAR foci per nucleus were counted by a customized macro using a semi-automated procedure, as follows: the nucleus stack was first smoothed using a median filter (radius 5), the user defined an intensity value as a threshold (one value for all experiments); a mask was then generated and transferred onto the stack of foci so that only foci in nuclei were analyzed. A top-hat filter was applied to the result to eliminate local background and facilitate the segmentation process, based on a simple threshold (user-defined value). Finally, the macro counted and characterized foci. At least 500 nuclei were analyzed for each condition. Cells were detached by treatment with Accutase (Sigma), immediately washed in 1× PBS, fixed in 70% ethanol and stored at −20°C overnight. They were then washed in 1× PBS and 1× staining buffer (554656 from BD Pharmingen). DNA content was visualized by incubating the cells with 7-AAD (559925 from BD Pharmingen) for 15 min at room temperature. DNA synthesis was visualized with the Click-iT EdU Alexa Fluor 647 Flow Cytometry Assay Kit (C-10419 from ThermoFisher Scientific), according to the manufacturer's instructions. EdU was used at a concentration of 10 µM for 1 h. Cell cycle analysis or EdU incorporation was visualized with a FACSCalibur (Becton-Dickinson), by analyzing 50,000 cells per condition. Data were then analyzed with FlowJo software (Tree Star Inc.). Cells were detached by treatment with Accutase (Sigma), immediately washed in 1× PBS, fixed in 70% ethanol and stored at −20°C overnight. They were then washed two times in 1× PBS and incubated for 1 h with an anti-histone 3 (phospho S10) antibody (1:200; 14955 from Abcam) in Stain Buffer (554656 from BD Pharmingen). Cells were washed in 1× PBS and incubated for 30 min with a goat anti-mouse Alexa-Fluor-633-conjugated antibody (1:500; A21052 from Life Technologies), propidium iodide (P4864 from Sigma) and RNAse A (R6513 from Sigma) in Stain Buffer at 37°C. P-Histone 3 staining and DNA content were visualized with a FACSCalibur (Becton-Dickinson), by analyzing 10,000 cells per condition. Data were then analyzed with FlowJo software (Tree Star Inc.). Subcellular analysis was performed with the Subcellular Protein Fractionation Kit for Cultured Cells (78840 from ThermoFisher Scientific), according to the manufacturer's instructions. At least three independent experiments were carried out to generate each dataset and the statistical significance of differences was calculated with Student's t-test, as indicated in the figure legends. We acknowledge the assistance of Marie-Noëlle Soler (PICT-IBiSA, Institut Curie, Orsay) and Charlène Lasgi (Flow Cytometry platform, Institut Curie, Orsay). We thank V. Schreiber and Jean-Christophe Amé (Institut de recherche de l'Ecole de biotechnologie de Strasbourg, Strasbourg) for providing us with anti-PAR antibodies. S.G. performed the experiments, participated in the design of the experiments and data analysis, generated the figures and wrote the manuscript. G.B.-L., R.O.-D. and D.B. performed experiments. S.L. contributed to data analysis and preparation of the manuscript. M.A.-G. designed the experiments, analyzed the data and wrote the manuscript. This work was supported by grants from the Institut Curie [grant PICSysBio], the Centre National de la Recherche Scientifique (CNRS), the Ligue Contre le Cancer (Comité de l'Essonne), the Association pour la Recherche sur le Cancer (ARC) [grant number SFI20121205645], the Agence Nationale de la Recherche [grant number ANR-14-CE14-0004-01] and by a fellowship awarded to S.G. by the Ministère de l'Education Nationale, de l'Enseignement Supérieur et de la Recherche and the Association pour la Recherche sur le Cancer [fellowship number DOC20140601310], and Institut Curie [PICSysBio]. Eckert, K. A. et al. (2000). Chk1 is an essential kinase that is regulated by Atr and required for the G(2)/M DNA damage checkpoint. Genes Dev. 14, 1448-1459. Lopes de Menezes, D. E. et al.
0.503331
Feb. 12 airpower summary: C-130s sustain transport missions AFNS 13 Feb 2009 -- Coalition airpower integrated with coalition ground forces in Iraq and ISAF in Afghanistan. Iraqi, U.S. Forces Find Bomb, Seize Weapons AFPS 13 Feb 2009 -- Iraqi and U.S. forces foiled a bomb attack and seized stockpiles of weapons. Airmen help Iraqi aircrew perform night-vision missions AFNS 13 Feb 2009 -- Initiative in the works since August 2008 now a realization as the Iraqi air force continued their quest toward night-vision operations. At Least 30 Killed in Suicide Blast Targeting Iraqi Pilgrims VOA 13 Feb 2009 -- Iraqi police say a female suicide bomber has killed at least 32 people in an attack on Shi'ite pilgrims south of Baghdad. UK costs of Iraq, Afghan wars soar IRNA 13 Feb 2009 -- The cost of Britain's military operations in Afghanistan and Iraq soared by more than 50 per cent according to the latest official figures. Russia: Collective security pact, only way to ensure Persian Gulf security IRNA 13 Feb 2009 -- Russian deputy foreign minister: Persian Gulf security only through cooperation among region, Russia and the US. Afghan Commandos Liberate Hostages, Detain Militants, Destroy Bomb AFPS 13 Feb 2009 -- Afghan commandos liberated 3 Taliban hostages, detained 6 armed militants and destroyed a roadside bomb. U.S. to transit non-military cargo to Afghanistan via Russia RIA Novosti 13 Feb 2009 -- US will transit a consignment of non-military supplies to Afghanistan via Russian territory in the next few days. Kyrgyz Politician Says U.S. Forces Might Stay At Manas RFE/RL 13 Feb 2009 -- Leader of the Social Democratic faction: US forces will most likely remain at Manas, despite a government decision to close it. Top US Envoy Meets Afghan Officials in Kabul VOA 13 Feb 2009 -- The new U.S. envoy to Afghanistan and Pakistan has begun his first round of meetings with top Afghan officials in the capital, Kabul. Decision Pending on Status of Suspected Somali Pirates AFPS 13 Feb 2009 -- The 16 suspected pirates captured by American ships have been transferred to the USNS Lewis and Clark. Rights Group Questions US Deal to Send Pirates to Kenya VOA 13 Feb 2009 -- The US Navy holding 16 suspected pirates aboard a warship while awaiting orders to move the suspects to Kenya for prosecution. Senior Leaders Examine 2010 Defense Budget Choices AFPS 13 Feb 2009 -- Senior defense leaders are taking a serious and critical look at the president’s fiscal 2010 defense budget request. Obama Intel Chief: North Korea Unlikely to Use Nuclear Weapons VOA 13 Feb 2009 -- President Obama's national intelligence director: N Korea probably would not use nukes unless on the verge of military defeat. Economic Crisis Is Top U.S. Security Concern RFE/RL 13 Feb 2009 -- Director of national intelligence Blair: Global economic crisis is now the top US security concern, not terrorism. NAVSEA Puts Cost-Saving Initiatives to Work Navy NewsStand 13 Feb 2009 -- The Navy announced five major cost-saving initiatives by the Cumbersome Work Practices Task Force (CWP-TF) have been implemented by the four Naval Shipyards (NSYs) Feb. 10 in Washington. Deployed Seabees Accomplish Public Works Projects Navy NewsStand 13 Feb 2009 -- Seabees from Naval Mobile Construction Battalion (NMCB) 4 have been tasked with many types of construction projects in various countries in East Africa, while deployed to the Horn of Africa (HOA) including the public works projects on board Camp Lemonier. Bataan Welcomes New CMC Just in Time for COMPTUEX Navy NewsStand 13 Feb 2009 -- The crew of multipurpose amphibious assault ship USS Bataan (LHD 5) welcomed a new command master chief (CMC)prior to Bataan's departure Feb. 3 for Composite Unit Training Exercise (COMPTUEX). Clinton Deputy Sees Positive Path for North Korea in Nuclear Talks VOA 13 Feb 2009 -- Deputy Secretary of State Steinberg: N Korea has a positive path ahead if it adheres to disarmament agreements. South Korea on Alert as Clinton Prepares Trip to Region VOA 13 Feb 2009 -- South Korean anti-missile defense systems are on alert, bracing for a possible North Korean missile test. Missile Defense: A 'Virtual' Issue That Could Get Real Results RFE/RL 13 Feb 2009 -- Supporters of US missile defense say the initiative is needed to make the world a safer place. U.S. Offers Moscow Concession On Missile Shield RFE/RL 13 Feb 2009 -- US ready to look at remodeling missile-defense plans to include Moscow. US Signals Flexibility With Moscow on Missile Defense VOA 13 Feb 2009 -- State department official: US open to reconfiguring a European missile-defense program that has generated Russian concerns. U.S. Must Prepare for 'Hybrid' Warfare, General Says AFPS 13 Feb 2009 -- The US military boasts dominant nuclear and conventional capabilities, but must improve its capacity to fight irregular wars. Record Inactivation for Norfolk Naval Shipyard Navy NewsStand 13 Feb 2009 -- Norfolk Naval Shipyard completed in record time Los Angeles-class inactivation at the decommissioning for USS Augusta. USS Bunker Hill Completes Sea Trials Navy NewsStand 13 Feb 2009 -- USS Bunker Hill successfully completed sea trials off the coast of San Diego to test and validate its recently installed combat systems. When pigs fly... with ospreys AFNS 13 Feb 2009 -- For the first time, the tilt-rotor CV-22 Osprey and the fixed-wing A-10 Thunderbolt II, often nicknamed the Warthog, teamed up for some high-flying training recently. Air Forces Africa Works to Boost Nigerian Air Safety AFPS 13 Feb 2009 -- Advances in technology, stringent maintenance and rigorous training for aircrews contributed to safe aerial environment in most of the world. APS Completes Work in Senegal, Sails for Ghana Navy NewsStand 13 Feb 2009 -- The Africa Partnership Station Nashville team departed first African port after team building events, seminars and training evolutions. India to fire 5,000 km range Agni missile by December 2010 IRNA 13 Feb 2009 -- India is likely to fire its Agni-V ballistic missile with a range of 5,000 km by the end of 2010. India, Russia enter into $ 600 million JV to develop new aircraft IRNA 13 Feb 2009 -- India and Russia would establish a fifty-fifty Joint Venture to develop a multi-role transport aircraft. Russia offers India 320 combat helicopters RIA Novosti 13 Feb 2009 -- Russia ready to provide India with 320 military helicopters and hopes to expand cooperation. Russia, Armenia to set up joint air defense network RIA Novosti 13 Feb 2009 -- Russia and Armenia will set up an integrated air defense network similar to recently announced Russian-Belarusian air defenses. Russian destroyer escorting 4 ships through Gulf of Aden RIA Novosti 13 Feb 2009 -- Russia's Admiral Vinogradov destroyer escorting 4 vessels through waters off the Horn of Africa. Russian warship detains 3 pirate vessels off Horn of Africa RIA Novosti 13 Feb 2009 -- Russia's Pyotr Veliky missile cruiser has detained three pirate vessels off the coast of Somalia. General Dynamics Awarded $95 Million Contract for U.S. Navy Information Fusion Center General Dynamics 13 Feb 2009 -- Network Centric Systems, St. Petersburg, Fla.; Northrop Grumman Information Technology, Chantilly, Va.; Whitney, Bradley and Brown (WBB), Reston, Va.; New Directions Technologies Inc. (NDTI), Ridgecrest, Calif.; International Association of Virtual Organizations, Research and Scientific (IAVO) , Durham, N.C.; and Advanced Fusion Technologies (AFT), Springfield, Va. ISRAEL-OPT: Hamas providing emergency relief to Gazans IRIN 13 Feb 2009 -- The Hamas government in Gaza has said it is trying to help thousands of Palestinians who lost their homes and/or loved ones in the 22-day Israeli offensive which ended on 18 January. According to deputy minister of social affairs, Sobhi Redwan, Hamas has so far spent an estimated US$50 million on emergency relief assistance, but more aid is needed. Violence Persists as Israel, Palestinians Report Near Truce VOA 13 Feb 2009 -- Israelis and Palestinians fought again Friday, raising tension as the two sides try to forge a long-term ceasefire for the Gaza Strip. Hamas agrees on long-term truce with Israel RIA Novosti 13 Feb 2009 -- Hamas has accepted a new truce agreement with Israel in return for the lifting of the Israeli blockade of Gaza. Hamas, Fatah to discuss unity talks in Egypt RIA Novosti 13 Feb 2009 -- Senior officials from the two main Palestinian factions are discussing resuming Egypt-sponsored reconciliation talks. Security Council renews call for greater humanitarian access to Gaza UN News Centre 13 Feb 2009 -- The United Nations Security Council again voiced deep concern today about the humanitarian situation in Gaza and stressed "importance and urgency that more needs to be done." CONGO: Purchase of illegal weapons under way IRIN 13 Feb 2009 -- The Congolese government has started an operation to buy 3,000 weapons from ex-combatants and others illegally possessing weapons in the Pool region, southern Congo, an official told IRIN on 11 February. DRC-RWANDA: Refugees in DRC opting to go back home IRIN 13 Feb 2009 -- Rwandans who have lived in eastern Democratic Republic of Congo (DRC) since the early 1990s have started returning home following a joint military offensive against the rebels, officials said. DR Congo: new developments could pave way for uprooted to return home – UN UN News Centre 13 Feb 2009 -- Recent developments in the eastern Democratic Republic of the Congo (DRC) – including the arrest of a rebel leader and a large-scale military operation against another militia – have sparked a “new dynamic” that could lead to the start of large numbers of displaced people returning home, the top United Nations relief official said today. UN aid reaches Central African refugees in south-eastern Chad UN News Centre 13 Feb 2009 -- A team from the United Nations High Commissioner for Refugees (UNHCR) has reached thousands of people who fled violence in the Central African Republic (CAR) to a remote area of south-eastern Chad. Security Council renews UN Georgia mission for four months, pending revisions UN News Centre 13 Feb 2009 -- The Security Council today unanimously extended the 15-year-old United Nations mission on the ceasefire line between the Government and Abkhaz separatists. UN Security Council Set To Extend UNOMIG Mandate RFE/RL 13 Feb 2009 -- Abkhazia does not object to the draft Security Council resolution on extending mandate of the UN Observer Mission in Georgia. 39 Tamil Tigers killed by Lankan troops IRNA 13 Feb 2009 -- At least 39 Tamil Tigers were killed in the fierce clashes with the advancing Sri Lankan troops. Air Raid Kills Hutu Militia in DRC VOA 13 Feb 2009 -- Army officials in the Democratic Republic of Congo say an air raid has killed more than 40 Rwandan Hutu rebels. AU Condemns Somali Insurgent Attacks on AMISIOM Supply Ship VOA 13 Feb 2009 -- The African Union has condemned Islamic insurgent attacks on a ship carrying logistics for its peacekeeping troops in Somalia. Report Of Turkish-Mediated Karabakh Conflict Settlement Denied RFE/RL 13 Feb 2009 -- Representatives of the Armenian, Azerbaijani, and Turkish Foreign Ministries separately denied report claiming Turkey had mediated a "partial" settlement of the Karabakh conflict. UN General Assembly on verge of negotiating Security Council reform UN News Centre 13 Feb 2009 -- On-going work on reshaping the size and membership of the Security Council and making the vital organ of the world body more democratic is finally heading for serious negotiations, the Ambassador to the United Nations for Afghanistan, Zahir Tanin, told the press today. UN chief expresses 'sorrow' on fourth anniversary of Hariri murder UN News Centre 13 Feb 2009 -- On the fourth anniversary of the massive car bomb blast that killed Lebanon's former prime minister Rafiq Hariri and 22 others, Secretary-General Ban Ki-moon today expressed his sorrow to the Lebanese people over the tragic loss of a man who stood strongly for the independence and sovereignty of his country. ZIMBABWE: Abduction threatens unity government IRIN 13 Feb 2009 -- The future of Zimbabwe's 48-hour-old unity government may hang in the balance after a leading member of the Movement for Democratic Change (MDC) was abducted by police outside the capital, Harare, on 13 February. Final Israeli Election Results Bring Political Uncertainty VOA 13 Feb 2009 -- Final results have been announced in Israeli elections. Campaigning Under Way Ahead Of IAEA Vote On El-Baradei's Successor RFE/RL 13 Feb 2009 -- Ambassadors to the IAEA declared as candidates to succeed Director-General el-Baradei. MDC Minister Roy Bennett Arrested in Harare VOA 13 Feb 2009 -- Roy Bennett, the MDC's choice to become deputy agriculture minister, was reportedly seized at a Harare airport, hours before the ministers in the unity government were to be sworn in. Police Open Fire in Southern Madagascar Amid Rioting VOA 13 Feb 2009 -- Police in southern Madagascar opened fire Thursday as a large group young people rioted and threatened to loot businesses. Sharmarke Chosen as PM in Somalia's National Unity Government VOA 13 Feb 2009 -- Somalia's President Sheikh Sharif Sheikh Ahmed has chosen a Western-educated son of an assassinated former president to be the country's prime minister. Lebanon Provides Fertile Ground for Iranian Influence VOA 13 Feb 2009 -- The 1979 Islamic Revolution not only changed the face of Iran, but was also meant for export. Liberian President Says She Was Misled in Supporting Taylor's Rebel Movement VOA 13 Feb 2009 -- Liberian President Sirleaf's long-awaited testimony before the country's Truth and Reconciliation Commission finally took place. Successful launch of two SPIRALE demonstration satellites for an early warning system Thales 13 Feb 2009 -- Two demonstration satellites for SPIRALE (French acronym for "preliminary infrared warning system") were successfully launched from Kourou, French Guiana, by an Ariane 5 rocket. As prime contractor for this national program, on behalf of the DGA, the French defence procurement agency, EADS Astrium will supply and operate a complete system designed to collect infrared images of terrestrial backgrounds.
0.999993
Can a bank charge any interest rate it wants? The rate of interest national banks may charge on credit cards and other types of loan accounts is not determined by Federal banking laws and regulations. Yes. The term "variable" refers to the interest rate. It means that the interest rate on your loan is tied to an index or formula that reprices periodically. At the time you contracted for the loan, the bank was required to provide you with a disclosure that explained this variable rate feature. Since the variable rate feature was disclosed at the inception of the loan, the rate change is not considered a change in terms. Therefore, the bank doesn't have to notify you at least 15 days in advance. Even though you paid off your account, there could have been residual interest from previous balances. Residual interest will accrue to an account after the statement date if you have a balance transfer, cash advance balance, or have been carrying a balance from month to month. From the time your statement cycles until the bank receives your payment, the interest continues to accrue.
0.987364
Whether your organization has been around for a while or is just getting started, you need to promote your nonprofit in the best way possible. Effective promotions allow nonprofits to generate support from the community and establish strong ties to the community as well. A nonprofit organization is a business that does not seek to make a profit, for the sake of being profitable from providing a product or service. A nonprofit organization is typically established to provide some type of needed service within a community or communities. The service can be education, help with medical care, public awareness, or anything that benefits a population. Nonprofits can be established to provide education and awareness of a common problem or health issue within society. They can also be established to provide specific services to those who need them. Other nonprofit organizations are established to raise funds to fight diseases and support research. Every nonprofit has a purpose, or an aim, which focuses on benefiting society in one way or another. Social welfare agencies, labor organizations, chambers of commerce, and professional boards are all examples of nonprofit organizations. These organizations are also established to provide some type of benefit for community members, certain types of professionals, or those working in certain industries. Some unions of professionals are also considered nonprofit, because they only collect dues to offset administrative costs for member services. Marketing and promoting nonprofits requires some knowledge and skill in selecting the right channels. This is important, because many nonprofit organizations rely on financial and other donations from private and public sources. Supporters of nonprofits should be able to make donations easily, without any hassles. Effective promotions allow other potential donors or contributors to see what the organization does, how it operates, and why contributions are important. The methods for promotion below should be considered for all nonprofit organizations. Social media is popular among people of all ages. Any nonprofit that wants to reach people from different age groups and cultures should consider reaching out via social media. The message doesn’t have to be long. In fact, the shorter the better, when contacting people through social media. Social media can be used for press releases, updates, and for spreading awareness of what the organization does. A website is almost essential for any organization, including a nonprofit. The website allows the organization to connect with potential supports, current and past supporters, and community partners. It also allows supports to connect in a personal way, through email inquiries. Some organizations use blogs for members to share information and experiences. Blogs can be used to share general information and discuss community challenges or problems the organization often addresses through its work. Community events such as expos can be a great way for nonprofits to get the word out about what they do or increase social awareness of certain community issues. Community events can increase exposure to potential donors and supporters as well. Any written communications used in promoting a nonprofit should explain what the organization does, why support is needed, and how the organization has helped in the past. The message should be aligned with any messages available on the organization’s website and in social media messages. Other channels for promotion, such as radio or television advertising, are usually adopted by larger organizations that must reach very large audiences. Radio and television promotions are expensive, so their value should be considered carefully.
0.999787
Having come from a battle of bad genetics, motivation and knowledge myself, I am more than happy to share how I learnt to run effectively and most importantly, efficiently. What does it mean to run efficiently? By running "efficiently", I mean taking the the least amount of time required to achieve the biggest improvement. You might think you are running great because you are clocking huge mileages each week, but some fairly basic principles might actually reveal that you are not utilising your runs to the fullest potential. A simple way to see how efficiently you are running is the heart rate/Vo2 max tests. This is a test which calculates the rate at which your body ultilises oxygen. There are a few ways to calculate your Vo2 max tests, some which may be expensive. This Vo2 max test is probably one of the simpler ways to calculate it yourself. While studies reveal that some people have a better Vo2 max ratio compared to others, increasing your Vo2 max efficiency is a great way measure your benchmarks. There is no upper limit to Vo2 efficiency, and even up till now, I am trying to improve my Vo2 efficiency. A great way to increase your Vo2 max ratio is High Intensity Interval Training (HIIT will be used from here onwards). Long aerobic workouts (including running) have been promoted as the best method to reduce fat. This is because fatty acid utilization is usually believed to occur at least after 30 minutes of training. But interestingly, HIIT is a form of anaerobic exercise. In contrast, HIIT sessions last no longer than 30 minutes! But even though it is an anaerobic exercise, HIIT has shown that in addition to an increase in resting metabolic rate, it can also significantly lower insulin resistance and causes skeletal muscle adaptations that result in enhanced skeletal muscle fat oxidation and improved glucose tolerance. Simply put: insulin resistance and skeletal muscle adaptation = fat burning too. They're just different mechanisms that both contribute to burning fat. Now here's some news that might be hard to take: More time spent running does NOT necessarily mean that it's more effective at improving your fitness. Aerobic exercises (i.e. running) is NOT the only way to burn fat. There are other ways to burn fat and increase your fitness, and HIIT is one of those! There are many regiments one of the most popular being, the Tabatha regime. You can try the Tabatha Regimen for yourself. It's designed to push you extremely hard, but not waste a single second of your time. 1 set: 20 seconds of intense running (170% intensity) and 10 seconds of rest. The first set might seem easy, but repeat this for 8 total sets (for a total of 4 minutes), and you will feel the burn! Long Runs and HIIT: Why Not Both? Let me get things straight: Of course you should still continue your long runs. In fact, if you talk to a certified coach of any form of sports, they should understand that every athlete should plan their recovery and rest as seriously as their training and that will be what helps them improve their threshold. But what I'm saying is that you should consider adding in one or two HIIT sessions to your weekly workout routines, for the different benefits that both types of exercises bring. Think of these HIIT sessions as conditioning exercises for yourself; your active rest while taking a break from extended distance running. Before I read up more sports science knowledge, I was running long distances and running shuttle sprints (technically a distance of less than a basketball court which is about 50m) many times a week. But even though I appeared to be lean, I found out that I had a fat percentage of over 18 (which is below average definitely for a active athlete and at that point I was even playing competitively). Visually, my stomach was not just round, but flabby, and I even had "love handles", which was something I am sure that nobody would visualise under the basketball jersey of a skinny, young athlete! But after months and months of training with aerobic exercise such as kickboxing, calisthenics weights and of course, running, the results were great. My belly flattened, and my "love handles" started to disappear. In conclusion, don’t always go for extended runs. Spicing things up with other activities such as HIIT can increase your fitness and can give you better timings! Stay tuned and I will cover more on the other spectrum of running: Different kinds of aerobic runs! If you've enjoyed Leon's article, you may enjoy more training tips and strategies (or even share your own training regime) over at the RunSociety Forums! He credits his love of running, basketball, obstacle challenges and exercise to his past and current coaches, mentors and seniors who gave him advice, as well as the professionals he came across during his life journey. His certifications include Fitness Instructor Certification (Sports SG), Fitness nutrition (ISSA), Muay thai trainer (AMAS) and National Coaching Accreditation Kapap(Krav Maga) and undergoing Junior NBA coach course. He is also the lead trainer of the Reebok Running Club Project, active basketball player and coordinator of specialised fitness classes for remedial training for NSmen who need help to pass their IPPT (Individual Physical Proficiency Test).
0.999977
(CNN) - Tesla is accusing a former employee of stealing intellectual property worth hundreds of millions of dollars and sharing it with a Chinese rival. The electric car maker filed a lawsuit in the United States on Thursday, alleging that engineer Guangzhi Cao stole key details from Tesla's self-driving car project and took them to Xiaopeng Motors, a Chinese electric vehicle startup. Elon Musk's company is seeking damages and to stop Cao from using the information. Tesla says Cao uploaded complete copies of the company's self-driving source code to his personal Apple iCloud account. He took more than 300,000 files and directories, according to a complaint filed in US District Court in California. After accepting a job with Xiaopeng, Cao then deleted 120,000 files from his work computer and disconnected his iCloud account from it, the complaint says. He then repeatedly logged into Tesla's networks and cleared his browser history before leaving Tesla in early January. Cao now works at XMotors, Xiaopeng's US subsidiary. Xiaopeng said in a statement that it has started an internal investigation but is unaware of any alleged misconduct by Cao, adding that it did not ask him to "misappropriate trade secrets, confidential and proprietary information of Tesla." "XMotors fully respects any third-party's intellectual property rights and confidential information," it said. Chinese efforts to get hold of American companies' tech secrets are a sensitive issue. It's one of the main reasons cited by the Trump administration for launching a trade war with China last year. In July, engineer Xiaolang Zhang was arrested and charged with stealing trade secrets from Apple's self-driving project. Xiaopeng said that no Apple-related information was transferred to the company, and that Zhang had been dismissed. Zhang has pleaded not guilty. Xiaopeng has so far raised 100 billion yuan ($1.5 billion) from some of Asia's biggest tech companies, including Alibaba, Foxconn and Xiaomi. It started selling its first and only electric vehicle, the XPeng G3, in China in December. The SUV includes a self-driving feature called X-Pilot. Tesla's self-driving feature is called Autopilot. Tesla is accusing the Chinese company of blatant theft, saying in the complaint that it "has transparently imitated Tesla's design, technology, and even its business model" and that XMotors currently employs at least five of Tesla's former Autopilot employees, including Cao. "Tesla believes Cao and his new employer, XMotors, will continue to have unfettered access to Tesla's marquee technology, the product of more than five years' work and ... hundreds of millions of dollars of investment, which they have no legal right to possess," the complaint says. There's a lot of Tesla already inside Xiaopeng's car, according to Tu Le, founder of research firm Sino Auto Insights. "The XPeng G3 is in a lot of ways a poor man's Tesla Model X," he said.
0.999958
As you plan your class trip to the Los Angeles area, you should take some time to visit Venice Beach. There are a variety of entertaining activities to enjoy during the visit. The team can also shop and enjoy quality cuisine at a variety of shops and restaurants in the area. You will find areas such as the Boardwalk, Muscle Beach, handball courts, paddle tennis courts, Skate Dancing Plaza, numerous beach volleyball courts, and the bike trail. Are you searching for entertainment attractions? If so, Venice Beach has plenty to offer its visitors. Your class will find places such as Arcade Edit, the Boardwalk, AMC Movie Theaters, Santa Monica Pier, and the Applegate Art Gallery. The Boardwalk is a popular attraction with hundreds of street vendors and performers. The team can also purchase souvenirs on the west side of the Boardwalk as well. Venice Beach has several shopping destinations for your pupils to explore. You will find locations such as Urban Country, Tomben’s Design LLC, 6 Shop of Aspen, A and J Fashion, California Gifts, Cast and Crew Gifts, Dalia’s, and David Schwartz Music Inc. Dalia’s has clothing items. California’s Gifts has gifts and fascinating souvenirs. Venice Beach is also known for its many local restaurants. The team will find dining options such as the Brickhouse Kitchen, Danny’s Venice, Mercedes’ Grill, and the Sidewalk Café. At Danny’s Venice, you will find a mix of California cuisine and comfort food. The Sidewalk Café serves a variety of American, Mexican, and Italian cuisine.
0.948355
What do all numbers have in common with their prime factors? Number theory is pretty much beyond my knowledge. If the numbers you want to deal with are relatively small, then the coding you want is easily done because each positive number is 1, prime, or a unique product of primes. So if you took the 50 of the 52 letters, both minuscule and majuscule, of the English alphabet, and coded in blocks of three letters, you could use those 50 to code for the first 125000 primes. You would need, I think, to reserve at least one letter for other use. Let's say we reserve Y and Z for other use. So I might code 1 as aab, 2 as aac, 3 as aad, 4 as aacaac, 5 as aae, 6 as aacaad, 7 as aaf, 8 as aacaacaac, 9 as aadaad, and so on. Of course your words would soon become very long, but each would uniquely describe and decompose your number. I always picture MMBt as an aging bald-headed guy apoplectic with impotent rage, his face a deep shade of red from an outrageously high blood pressure and viens popping on his forehead and neck. Especially when you're off your medication. Bahahaha... My my.. Nothing like a bit of banter i guess. This is all very helpful. The aac aad aacaac idea is a lot like what I'm going for, only I would then need to refine this so for instance where 6 would be aacaad, but I'd want to knock it down to size, maybe becoming aabd or caad where it's clear what the two primes are without needing all the information. Minimum information to deduce the components. EDIT: I'll also point out that I won't be using any numbers with more than 3 prime factors or numbers with multiple of the same prime factor. Also the highest prime I'm using is around 1223. You really need help from someone who knows number theory, and I am not that someone. However, it is obvious that using doubletons of 50 letters (distinguishing between minuscules and majuscules) would let you code 2500 primes directly, which takes you well past 1223. Furthermore, that would leave two doubletons free for other purposes. What seems promising is to reserve one doubleton for 1 and another for a plus sign. You could code many composite numbers up to around 15 billion using between 2 and 3 doubletons, and many primes using between 1 and 4 doubletons. Unfortunately, some numbers starting somewhere around 10000 would result in very cumbersome "words" under the kind of coding scheme I am contemplating. I think you need someone with more knowledge than I have. ok sure, but thanks for the help anyway. I was intending to base it around components of syllables as my system needs restrictions on what letters can follow others. I have 37 onsets (38 at the start of a word), 30 nuclei, and 27 codas. So I have 30,779 word starting syllables and 29,970 other syllables. This again is far more than enough.
0.999998
The Self is Pure Consciousness , as it is presupposed by all modes of consciousness , which function in the form of consciousness of external conditions or objects . Human consciousness is characterized by objectiveness . It is more a cognition or a perception than simple unadulterated consciousness . The cognitions and perceptions are the processes of knowing through the mind and the senses . In the waking state of ordinary consciousness , the different senses receive different forms of knowledge , and the function and the knowledge of one sense is quite different from and unconnected with that of another . For instance , the eye alone can perceive forms and the ear alone can hear sounds . Knowledges differ with regard to the different senses . Even if these sense-knowledges are entirely cut off from one another , the person experiencing these sense-knowledges is one and the same . The person is the synthesizer of sense perceptions which by themselves , do not have relations among themselves . " I am the seer , the hearer " , etc , but does not feel that the seer is different from the hearer . The ultimate Knower must , therefore , be an absolutely indivisible whole of Consciousness . Even if there be the slightest distinction within the constitutive essence of the knower , ie , if the knower is made up of parts , complete synthesized knowledge would never have been possible . If there is a division within the knower , what is the relation between one part and another therein ? If one part is different from the other , what is that which exists between one part and another ? The question cannot be answered , as knowledge does not admit of space within itself , as knowledge is presupposed by the idea of space and the notion of time and causality . If the parts which are said to constitute the consciousness or the knower are not differentiated by anything other than the knower , then , the knower does not become a composite of parts , but exists as an undivided consciousness which is absolutely identical with itself . The nature of the knower must be knowledge itself . If not , what is the nature of the knower ? The most fundamental experience is consciousness or awareness , pure and simple , free from the self-contradictory divisions and fluctuations of thought . None can experience anything greater than or equal to consciousness as the ultimate basis of all experiences in life . The knower of sense-perceptions cannot be the mind , too , though the mind is able to know without the help of the senses and is able to coordinate , arrange , and systematically synthesize sense-perceptions . Thoughts differ in different places , times and conditions . Hence , there must be some other synthesizing agent of even mental cognitions . Otherwise a person cannot know that one is the same individual experiencing different kinds of thought . Even memory would be impossible but for a non-relative consciousness transcending thoughts . Mental cognitions and sensuous perceptions are heterogeneous in their nature . Therefore the possibility and experience of a unified completeness of self-identical , absolutely immediate and direct consciousness shows that the true Self is Pure Consciousness in its essence , which is not affected by the revolting activities of the mind and the senses . The essential nature of the Knower or the Self must be transcendental Consciousness , because , in the state of deep sleep it is seen that when the body , the vital currents , the senses , the mind , the intellect , the ego , the subconscious and everything that goes to make the individual get suspended and denied their validity as existence , the person still exists , as is testified by the following experience which , with great certainty , identifies the person who has woken up with the person who slept previously . The existence of the essential person , the Self , in the condition of deep sleep , was one of awareness of nothing , an awareness together with nothingness , which means mere awareness , as nothingness has no value . Further , the existence of the experience of the Self corroborated by the subsequent remembrance of the existence of oneself in deep sleep . As remembrance is not possible without previous experience , and as experience is never possible without consciousness , we have to conclude that the Self does exist in deep sleep as mere Consciousness . This Consciousness exists in the waking state as the unchanging basis of the changing mind and the senses . In the dreaming state it exists as the synthesizer of mental functions . The objects in the waking and the dreaming states differ from one another , but the consciousness of objects is one and the same ; it does not differ in relation to objects . The only difference between the waking and the dreaming states is that in the former experience is the effect of the function of the mind taking the help of the senses , while in the latter experience is the effect of the function of the mind alone . But , nevertheless , the consciousness is the same , both in the waking and the dreaming states . As this Consciousness is proved to exist in the deep sleep state also , it is evident that this one Consciousness endures without even the least change in Itself in all states of experience , without a past or a future for its existence . It does not differ from another consciousness , nor does it differ from Itself now and then , here and there , in this or that state , as objects and mental states do . Consciousness is always one and is ever secondless . We cannot conceive of two consciousnesses , though mental states may be two or more . Consciousness is , therefore , eternal . Metaphysically , anything that is eternal must be infinite , without restrictions . Since limitation , too , is what is known by the Consciousness , Consciousness transcends limitation . The ignorance that is generally experienced in deep sleep cannot be a real existence , for , if it did really exist , it would be an eternal antagonist of consciousness , and consciousness would thereby be limited and become perishable . The illogicality and the impossibility of the existence of ignorance cancels its value and establishes the existence of the Absolute as Consciousness alone , which is not a bare , featureless transparency , but comprehensive of the whole universe of objects . Everyone experiences consciousness and not ignorance as one’s basic being or Self . The Self is therefore different from ignorance in the sense that consciousness is not ignorance , but it does not mean that the Self is a witness of an objective ignorance , which , too , is existence . The Self neither dies , nor is born , nor has it any modification . If it has these changes , they have to be experienced by some other consciousness , which argument would lead to an infinite regress . The ultimate experiencing Consciousness is the Self . This Absolute Self is self-luminosity , non-duality , independence , Consciousness , the sole Being .
0.99295
The new product taster is for tasting and trying food during cooking. It's a spoon on one side and a fork on the other, and the fork does an additional trick: it has a small hook for testing pasta while cooking. The taster has an aesthetically slim form and is a functional 10.8" long.
0.999957
The following events and venues match your search for "Keith-Sweat". To sort the list, click on the column header. To find tickets for the given event, date & time, click the tickets link in that row. To find events taking place at a matching venue, click that venue name.
0.999993
Ask a question to Billie S. Parisian charm, the workshops of creators, vintage shops and trendy jazz club. Along the streets, le Marais, Saint-Germain-des-Prés and St-Michel, let me make you discover the secret and fascinating Paris! The charm of Paris, the city's fashion design studios, vintage shops and trendy jazz bars. Let me show you the secret Paris, chic and fascinating!
0.999999
Who invented Concrete? The Ancient Romans are generally credited with the invention of concrete due to their prolific use of the material, although similar building materials were used in construction techniques applied by the Mesopotamian, Egyptian, Chinese and Greek civilizations. The 'secret' of Roman concrete was their addition of volcanic ash which was readily available due to the volcanic eruptions of Mount Vesuvius, the Monte Albano volcano and several other volcanoes on the Italian mainland. How was Roman Concrete made? Roman concrete was made by mixing a strong volcanic material, called pazzolana or "pit sand", with coarse materials used in construction called aggregates. The construction aggregate used to make Roman concrete was rubble and limestone with the addition of water and the volcanic ash to create a mixable paste called a mortar. The Romans also used Tuff, from the Italian word 'tufo' as an aggregate, a type of rock made of volcanic ash to make concrete. Definition of Concrete: Concrete is defined as a strong hard building material composed of sand, broken stone, pebbles, gravel, cement and water that hardens into a stone-like mass. Concrete is adaptable, fire resistant and is now used by semi-skilled workers for the construction of modern sidewalks, roadways, foundations, etc. Fact 1: Who invented Concrete? The name of the inventor of Concrete is unknown but it is believed that concrete was invented c200 BC during the Ancient Roman era of inventions (600 BC - 400AD). Fact 2: Who invented Concrete? Prior to the invention of Roman Concrete the first mortars were made of mud and clay, using pitch for mortar. Due to a lack of readily available stone and an abundance of clay, the constructions built by the Babylonians of Mesopotamia were made of baked brick, using lime or pitch for mortar. Fact 3: Who invented Concrete? Gypsum mortar, also called plaster of Paris, was used in the construction of the Egyptian pyramids. Gypsum mortar and Lime mortar, composed of lime and an aggregate such as sand, mixed with water, were used in the construction of structures built by the Ancient Greeks. Fact 4: Who invented Concrete? Any concrete, consists of an aggregate and mortar, a binder mixed with water that hardens over time and used to bind building blocks such as stones, marble and bricks. Fact 5: Who invented Concrete? An aggregate consisted of the coarse materials used in construction. Mortar is a mixable paste or binder used in building for holding bricks or stones together. Fact 6: Who invented Concrete? The development of Roman concrete began when Augustus Caesar (63BC - 14AD), the first Roman emperor, initiated an extensive building program in Rome which resulted in an explosion of building industries in Rome and the extensive use of Roman concrete. The Emperor Augustus famously said "I found Rome a city of bricks and left it a city of marble". Fact 7: Who invented Concrete? The Roman builders and engineers experimented and refined the production and use of aggregate and looked for readily available materials to use in their construction projects. The region around the Monte Albano volcano, only 12 miles southeast of Rome in the Alban Hills (Colli Albani), was heavily covered with meters thick beds of pozzolana, volcanic ash and tuff from previous eruptions. Fact 8: Who invented Concrete? The Roman builders began to mix the strong volcanic material with other coarse materials used in construction and produced concrete. Layers of volcanic ashes were several feet in thickness and thickly deposited across regions surrounding volcanoes. Fact 9: Who invented Concrete? The method used by the Romans to produce concrete started with heating limestone to produce quicklime. Water was added to the quicklime to create a paste. Volcanic ash was then added to the concrete mixture. Fact 10: Who invented Concrete? The proportions used to create concrete, three parts volcanic ash to one part lime, were detailed by a famous architect and engineer called Marcus Vitruvius Pollio in his 'Ten Books on Architecture', which he dedicated to his patron, the Emperor Caesar Augustus. Fact 11: Who invented Concrete? The volcanic ash reacted with the quicklime paste to create a durable mortar that was combined with bricks, or volcanic rocks called tuff. Fact 12: Who invented Concrete? Tuff, from the Italian word 'tufo', was often used as an aggregate. Tuff is a type of rock made of volcanic ash ejected from a vent during a volcanic eruption. Fact 13: Who invented Concrete? The durable mortar developed by the Romans was called Pozzolanic mortar, a lime based mixture made with the additive of volcanic ash. Fact 14: Who invented Concrete? Pozzolana is a fine, sandy volcanic ash. The Pozzolana found on the lands around the Monte Albano volcano near Rome was a reddish-brown color. But there were other volcanoes in Italy and Pozzolana was mined at other sites. The best known being Mount Vesuvius, situated near Naples, its volcanic ash was a brownish-yellow-gray in color. Fact 15: Who invented Concrete? The name Pozzolana, derives from the modern-day town of Pozzuoli situated just 25 miles east of Mount Vesuvius in the Bay of Naples. The famous Roman scholar Pliny the Elder, who died attempting the rescue of his family from the eruption of Mount Vesuvius in A.D. 79, had written that the best maritime concrete was made from volcanic ash found in regions around the Gulf of Naples, especially from near the modern-day town of Pozzuoli. Fact 16: Who invented Concrete? The volcanic ash dug from around Pozzuoli became so well-known that ash with similar mineral characteristics, no matter where in the world it was found, was dubbed pozzolana or pozzolanic ash. Fact 17: Who invented Concrete? Other volcanoes found on the Italian mainland are the Campi Flegrei, Larderello, Amiata, Vulsini and Roccamonfina volcanoes and all proved excellent sources of the volcanic ash (pozzolana) required in the Roman formula for its highly durable concrete. Fact 18: Who invented Concrete? The Great Fire of Rome in 64AD destroyed large parts of the city. The Emperor Nero (37 AD – 68 AD) decreed that the city of Rome was to be rebuilt and this monumentous task, the biggest single building project in ancient history, was accomplished quickly using brick-faced concrete as one of the most important building materials. Four years after the Great Fire the Emperor Nero committed suicide, but two thirds of the city of Rome had been re-built. Fact 19: Who invented Concrete? The invention of the highly durable Roman Concrete made it possible to build lasting monuments to Rome, which we still gaze at in awe and wonder 2000 years after they were built. Fact 20: Who invented Concrete? The Roman Colosseum oval in shape, 615 ft long, 510 ft wide, 187 ft high with a base area of 6 acres was built in A.D. 81 - it took less than eight years to build. Vaulted arches added strength to the building without adding excessive weight - the Colosseum would never have survived without the use of concrete. Fact 21: Who invented Concrete? After the fall of the Roman Empire in 476 AD the techniques for making pozzolana concrete were lost for hundreds of years. Fact 22: Who invented Concrete? In 1824, an Englishman named Joseph Aspdin (December 1778 – 20 March 1855) invented the first true artificial cement which became known as Portland cement, due to its resemblance to Portland stone. In 1867 Reinforced Concrete was invented by the French inventor Joseph Monier. Who Invented Concrete? - Invention - Definition - History - Timeline - Meaning - Famous - Device - Innovation - Significant - Development - Building and Construction - First - Definition - Kids - Facts - Information - Info - Who invented Concrete - Dates - When - Why - Impact - Purpose - Use - New - Old - Definition - Meaning - Awesome - Cool - Concrete History - Timeline - Roman Empire - Who invented Concrete?
0.972786
Is Mange in Dogs Contagious to Humans? Mange in dogs is caused by one of three mites: the cheyletiella mite, the sarcoptes mite or the demodex mite. The last type of mange, called demodectic mange, is not considered contagious, but cheyletiellosis and sarcoptic mange (also called canine scabies) are contagious among dogs. In some cases, they can also be spread between dogs and people. Mange was once considered to be a problem that affected only uncared-for stray animals, but any dog can contract mange, regardless of age or breed. It is most often spread by direct contact between dogs, but dogs can also be infected with mange mites by using accessories that an infected dog also used. Dogs that are infected with the Cheyletiella yasguri mite show symptoms on their skin. They may itch, and they usually have dandruff flakes, scales or crusts on their skins. Affected dogs may also have swollen lymph nodes. You may be able to see the cheyletiella mites on your dog's coat. They appear as white specks that can be seen with or without the use of a magnifying glass. Dogs that are affected by the sarcoptes mite also show skin symptoms. These dogs have inflamed, itchy skin from the mites burrowing beneath it. Female mites lay eggs in these burrows, and larvae hatch in about a week. Those that stay in the burrows and molt into adults survive, while those that crawl to the dog's skin surface die. After the second molt, the adult mites migrate to the skin surface where they can infect other dogs or people. In some cases, dogs affected by cheyletiellosis or canine scabies may carry the mites without showing symptoms. These carriers can spread the mites to other dogs or people. Your veterinarian can diagnose mange several ways. Dogs with cheyletiellosis are usually diagnosed through physical observation of symptoms and microscopic examination of skin samples, while canine scabies is often diagnosed by the success level of the canine scabies treatment. Dogs that are infected with cheyletiella mites can be treated with flea treatments as prescribed by your veterinarian. Treat all pets in your home, as well as your home itself, to eliminate this mite. Canine scabies is treated with a combination of medication from your veterinarian, bathing your dog with medicated shampoos and dipping him in lime sulfur dips. You will need to disinfect his accessories, such as bedding, brushes, carriers, collars and combs, to kill the mites and prevent reinfection. Consult your veterinarian as to the effectiveness of home treatments or the need to treat other pets in your home for canine scabies. Human mange infections are called scabies. Dog owners who sleep with their pets or who cuddle and hug them excessively are most prone to contracting scabies. Symptoms include itchy subcutaneous burrows on the armpits, hands, inner thighs or wrists. Diagnosis is made by visual observation of the symptoms and microscopic examination of skin scrapings. Treatment includes the use of permethrin cream or lindane lotion as prescribed by your physician. Canine mange mites do not appear to reproduce on people, so any mange infestations are usually self-limiting. Is Dog Scabies Contagious to Humans?
0.999964
\nCedar County is a county located in the U.S. State of Nebraska. As of 2000, the population is 9,615. Its county seat is Hartington6. \nAccording to the U.S. Census Bureau, the county has a total area of 1,932 km² (746 mi²). 1,917 km² (740 mi²) of it is land and 14 km² (6 mi²) of it is water. The total area is 0.75% water. \nAs of the census2 of 2000, there are 9,615 people, 3,623 households, and 2,565 families residing in the county. The population density is 5/km² (13/mi²). There are 4,200 housing units at an average density of 2/km² (6/mi²). The racial makeup of the county is 99.07% White, 0.10% Black or African American, 0.20% Native American, 0.04% Asian, 0.01% Pacific Islander, 0.18% from other races, and 0.40% from two or more races. 0.43% of the population are Hispanic or Latino of any race. There are 3,623 households out of which 34.80% have children under the age of 18 living with them, 63.60% are married couples living together, 4.30% have a female householder with no husband present, and 29.20% are non-families. 27.00% of all households are made up of individuals and 15.70% have someone living alone who is 65 years of age or older. The average household size is 2.60 and the average family size is 3.20. In the county the population is spread out with 29.40% under the age of 18, 6.00% from 18 to 24, 24.20% from 25 to 44, 20.30% from 45 to 64, and 20.00% who are 65 years of age or older. The median age is 39 years. For every 100 females there are 100.10 males. For every 100 females age 18 and over, there are 97.10 males. The median income for a household in the county is $33,435, and the median income for a family is $39,422. Males have a median income of $26,707 versus $18,370 for females. The per capita income for the county is $15,514. 9.10% of the population and 6.30% of families are below the poverty line. Out of the total people living in poverty, 10.70% are under the age of 18 and 9.70% are 65 or older.
0.94043
Cell organization is governed and maintained via specific interactions among its constituent macromolecules. Comparison of the experimentally determined protein interaction networks in different model organisms has revealed little conservation of the specific edges linking ortholog proteins. Nevertheless, some topological characteristics of the graphs representing the networks - namely non-random degree distribution and high clustering coefficient - are shared by networks of distantly related organisms. Here we investigate the role of the topological features of the protein interaction network in promoting cell organization. We have used a stochastic model, dubbed ProtNet representing a computer stylized cell to answer questions about the dynamic consequences of the topological properties of the static graphs representing protein interaction networks. By using a novel metrics of cell organization, we show that natural networks, differently from random networks, can promote cell self-organization. Furthermore the ensemble of protein complexes that forms in pseudocells, which self-organize according to the interaction rules of natural networks, are more robust to perturbations. The analysis of the dynamic properties of networks with a variety of topological characteristics lead us to conclude that self organization is a consequence of the high clustering coefficient, whereas the scale free degree distribution has little influence on this property. Genes encode the amino acid sequence of their protein products that in turn assemble into organized cellular structures to perform specific functions that support cell physiology and organism development. In recent years the explosion of genome sequence data has enabled the investigation genome and proteome evolution and the formulation of hypotheses on the mechanisms creating diversity and fixation of the characteristics that we observe in extant organisms . The paradigm used in comparative genomics and proteomics is that sequence and structure conservation is a sign of selective pressure and can be used to identify "functional" elements [2–4]. On the other hand gene products do not act in isolation but form a complex web whose specific links are important to determine phenotypes. Thus, at a different level, conservation of the specific physical and functional links among gene products might reveal the processes that have shaped "interactomes", the intricate web determining the formation of the functional complexes that we observe in the cell. Although the available experimental information about interactomes is not as complete and as accurate as the one on genomes, the recent completion of large protein interaction studies has offered an unprecedented amount of information about the protein web shaping cell organization [5–7]. We are now in the position to ask questions about conservation of protein interaction networks. At present, comparative interactome analysis has revealed a limited conservation when specific edges, representing physical interactions and connecting orthologous proteins are compared in interactomes of different model organisms . On the other hand the topological properties of the graphs representing interactomes are similar in distantly related species and markedly different from typical random graphs. As a matter of fact, all experimental protein interaction networks display features, such as high clustering coefficient and scale-free degree distribution that are not found in random networks . The question arises as to whether these topological properties are found in interactomes because they are the outcome of common evolutionary processes or rather they have been imposed on random or quasi-random networks by natural selection because they confer some selective advantage. As an example, the power-law degree distribution can be explained by a model based on growth and preferential-attachment, whereby new proteins preferentially link to highly connected proteins . A second type of network models, known as hierarchical , can overcome some limits of "growth and preferential attachment" scheme and yield interactomes that are both scale free and characterized by a high clustering coefficient. Alternatively these two topological characteristics may not be the result of any specific growth mechanism but rather they may have been selected in evolution because they confer to the cellular system some functional advantage. While some specific links among proteins may be conserved because they are part of functional modules, such as for instance signaling pathways, conservation of global graph properties are more likely to reflect some general properties of the cell. We tested the hypothesis that some features of cell organization may be explained by molding of the cell interactome so that, under selective pressure, it acquires specific topological characteristics that are reflected in advantageous functional patterns in the cell. To this purpose we use a cellular automaton model of a cell and, starting from a random spatial distribution of proteins, we let the automaton evolve under interactions rules that are either determined experimentally, thereby mimicking the interactions that occur in the cell milieu, or selected at random. We next define a metric of cell self organization and we show that cellular automata evolving under experimentally-determined interaction-constraints reach a higher level of organization than those ruled by random interactions. Furthermore natural networks are more "robust", since they yield pseudocells, whose organization is not affected by small stochastic perturbations of the initial conditions of the system. Graph representations of protein interaction networks are static and as such they are inadequate to model the highly dynamic protein interaction network inside the cell. To fill this methodological gap we have designed and implemented ProtNet a computer model that captures the discrete and stochastic nature of protein interactions . ProtNet represents an in silico cell as a three-dimensional lattice in which molecular entities (proteins or protein complexes) can shift, rotate and form new complexes with their neighbors, or dissociate, depending on a set of interaction rules. Each lattice point of the automaton corresponds to a volume with linear size (~5 nm) comparable to the diameter of an average globular protein. The cell is filled with proteins with an occupancy (20%) compatible with the estimated crowding of proteins in the cell cytoplasm . The whole procedure can be seen as a sort of "discrete molecular dynamics" applied to interacting proteins in a cell. We have used the ProtNet model to monitor the dynamic consequences of the global and local properties of protein interaction networks. The biological protein interaction networks that provide the rules for the evolution of the cellular automaton are "yeast_net" and "human_net", representing the interactions in the yeast and human cells. Both networks have been obtained from the resource mentha . This resource integrates all the published information curated by the IMEx databases MINT , Intact , DIP , BIOGRID and MatrixDB and uses a ranking procedure, similar to the one implemented in WI-PHI , to offer human and yeast interactomes where each interaction is assigned a weight according to experimental support (See Additional file 1 and Additional file 2 for the list of Yeast and Human interactions). yeast_net includes the 4714 interactions with the highest weight. The complete list of experimental human interactions has been filtered by setting a weight threshold in order to have a number of high confidence interactions comparable with that of yeast_net. The two resulting networks both include 1890 protein species (nodes) and 4714 interactions (edges). To each natural network we associate a random network assembled according to Erdös-Rényi (ER) model . In Table 1 we have reported the main topological characteristics of the networks that we have used in the simulations presented here. Topological metrics of the networks used for the simulations in ProtNet SSI (Self-Similarity Index), SFFI (Scale Free Fitting Index), APL (Average Path Length), ACC (Average Clustering Coefficient). Irrespective of the interactions rules, starting from a random distribution of proteins in the space, the ProtNet cell evolves in time till it reaches a dynamic equilibrium state where the number of complexes of a given degree remains approximately constant (Figure 1). We call the cubic lattice whose organization evolves under the rules set by a protein interaction network a "pseudocell". ProtNet pseudocell dynamic organization. The three boxes represent snapshots of the same pseudocell frozen at different steps during the simulation. In the first box protein monomers of different protein species are represented with different colors. After 5000 steps many small complexes are formed as a result of the diffusion and interaction dynamics. The size of the circles reflects the number of protein species in the complexes. Smaller spheres correspond to monomeric proteins. Complexes with the same number of protein species but different composition have different random colors. The third snapshot represents a psuedocell at equilibrium. We have used such a model to answer the following questions about pseudocell organization. Is the pseudocell obtained by using as input an experimental network different (i.e. more organized) than one originating from a network with an equivalent number of nodes connected at random? If we perform independent simulations with the same input graph, how similar are the structures of the resulting pseudocells? Is the structure of pseudocells governed by experimental interaction rules more robust to perturbations introduced in the initial system settings? Does it make any difference if the input graph is a random or a natural network? What are the network topological properties responsible for self-organization? Interactomes obtained by integrating protein interaction data compiled from a variety of experimental techniques appear as intricate webs where each protein can deal with a large number of partners. This somewhat contrasts with the observation of organized leaving cells where any given protein tends to form one or a few specific protein complexes. Ribosomal proteins mostly assemble into ribosomes whereas proteasomal proteins are found preferentially in proteasomes. Even a simple interactome, such as the one in (Figure 2) can in principle support the formation of many complex types that are compatible with the rules established in the interaction graph. Nevertheless complexes formed in natural cells take a precise structure and dynamic organization emerging from both local and global properties of the interactome topology. In order to investigate if our model can simulate these self-organization properties we observed the evolution of the organization of our cellular automaton under the constraints of the interaction rules encoded in the interactome. We define a pseudocell as more organized if contains complexes that are more "coherent", that is if they are characterized by the presence of a cohesive subset of interacting proteins that, like a repeating pattern, can be found in many complexes. The rationale behind the idea of coherence and organization is more clearly explained in Figure 2. The two outlined pseudocells are both compatible with the interaction rules represented in the simple graph at the top. However, the complexes of different composition that are formed in the pseudocell at the left are fewer than the ones found at the right. Thus we define the first pseudocell as more organized. We introduce here a new metrics, the Self-Similarity Index (SSI), to quantify self-organization in pseudocells and compare pseudocells originated from different networks. The SSI is formally defined in the methods section. In a few words it defines how complex a pseudocell is. A pseudocell formed by identical large complexes has maximum SSI whereas a pseudocell containing a large variety of complexes of different composition has a small SSI. Definition of coherence. The cartoon schematically depicts our definition of coherence. The complexes that are formed in either pseudocell in the lower part of the figure are compatible with the interaction network at the top. However, the two pseudocells are fundamentally different because, while in the pseudocell on the left much fewer complexes are formed (see the list of complex species on the left side of the first pseudocell), in the one on the right each protein takes part in a larger variety of complexes as depicted in the list of complexes on the right side of the second pseudocell. Thus we conclude that the pseudocell on the left is simpler and therefore more organized than the one on the right. The similarity index between two complexes is obtained from the following formula S . I . ( C 1 , C 2 ) = ( | C 1 ∩ C 2 | ) 2 | Δ ( C 1 , C 2 ) | + 1 . The Self-Similarity Index of a pseudo-cell then can be computed as S S I C = ∑ i = 1 n - 1 m a x j = i + 1 n S . I ( C i , C j ) n . Starting from proteins randomly distributed in the cell grid, Figure 3 shows the evolution in time of the SSI in pseudocells whose interactions are governed by the experimentally determined networks of S. cerevisiae (Figure 3 upper chart) and Homo sapiens (Figure 3 lower chart) or by random networks, with approximately the same number of nodes and edges. During the interaction and diffusion phases, small complexes start to aggregate till the pseudocell reaches an equilibrium state in which the emerged complex structure remains stable. The SSI rises comparably in both types of pseudocells, but after a few thousand simulation steps, when large complexes begin to form, the SSI of pseudocells governed by random networks reaches a plateau, while that of pseudocells governed by natural network interaction rules continues to grow. Notably the self organization properties of natural networks are observed in simulations of pseudocells covering a wide range of protein concentrations (Additional File 3). Consistently with our definition of SSI these results indicate that pseudocells governed by natural networks reach a higher level of organization, irrespective of protein concentration. Self-Similarity Index evolution. We have measured the SSI values at different times during the evolution of a pseudocell. The first chart A) shows the evolution in time of the SSI for ten pseudocells that evolved following the interaction rules of the yeast protein interaction network and ten whose organization was evolved under the rules established by the random network. The second chart B) shows the results of a similar experiment where we used the human interactome. An additional property of living cells is that of being robust to perturbations. In other words we expect a cell model to be able to recover organization, once it is perturbed, and to reach again a structure that is similar to that it had before perturbation. We modeled this property by measuring the similarity/diversity of cell organization when equilibrium is reached in the cell automaton, starting from different initial "cell configurations" (distribution of proteins inside the lattice). To compare different pseudocells we defined a second metric of cell organization that we call the Inter-Cells Similarity Index (ICSI). This metric (see methods) is similar to the SSI that we have defined to monitor cell organization. The difference being that ICSI measures the similarity of the ensemble of complexes that are formed in two different cells and not the diversity of the complexes in a cell. Figure 4 shows the pairwise ICSI values of ten different pseudocells for each of the three types of input networks (Yeast, Human and Random). Similarly to what observed in the case of a self organization of single cells, pseudocells that organize under the rules of the natural interactomes reach an organization that is similar in all the cells, irrespective of the initial distribution of the protein monomers. Intercellular Similarity Index (ICSI) between pseudocells evolved under different starting conditions and different network rules. For each of the three networks (yeast, human and random) we carried out 10 different simulations starting from different random distributions of the proteins in the pseudocell grid. We next calculated the ICSI between all the possible pairs of the 10 resulting pseudocells. The results are presented as boxplots. Designed networks whose degree distribution is taken from the yeast interactome but having transitivity coefficient in the interval 0 with steps of 0.1. Designed networks whose degree distribution is that of an Erdös-Rényi random network with transitivity coefficient in the interval 0 with steps of 0.1. Designed networks whose degree distribution is that of the human natural interactome with transitivity coefficient in the interval 0 with steps of 0.1. where the dependent variables are the scale free fitting index (SFFI), average path length (APL), diameter, average clustering coefficient (ACC) (collective dynamics of small world networks), transitivity [31, 32]. The dispersion matrix in Figure 5 shows all pair-wise combinations of the variables. A linear relationship between two or more independent variables indicates redundancy in explaining the dependent variable. The matrix describes linear relationships between transitivity, clustering coefficient and modularity and between average path length and diameter. F-test following regression allowed us to determine the redundant variables and remove them from the model. Regression results show a linear relationship between the transitivity coefficient (associated to the hierarchical modularity) and the SSI, while other network metrics such as the degree distribution, the average path length or the modularity were either redundant or non-significant. The adjusted R-squared value, used to measure the goodness of the fit, indicates that about the 80% of the SSI is explained by the transitivity coefficient. Further details about multiple linear regression is available in Additional file 2. Scatterplot Matrix of the linear dependencies between topological metrics. The scatter-plot matrix shows all pair-wise correlations between the topological metrics measured for our networks: scale-free fitting index (SFFI), average path length (APL), Diameter, Self-Similarity Index (SSI), Average Clustering Coefficient (ACC), Transitivity and modularity. Each small chart represents the correlation between the metrics described in the corresponding diagonal elements. A linear relationship between all pair-wise combinations of SSI, ACC, Transitivity and Modularity is clearly evident. Also APL and Diameter are linearly correlated. The available experimental information on protein interaction networks reveals a poor conservation of the specific interactions between ortholog proteins in different model organisms. This is not surprising and could be explained by a high functional redundancy of some of the interactions occurring in a cell. In other words, aside from those few interactions that are necessary to form very specific complexes, many of the remaining interactions revealed by the experimental methods that are currently used to draw the interactome could be inessential but contribute in a redundant way to cell organization. For instance a protein that needs to perform its function near the cytoskeleton may find different ways to achieve its spatial localization by interacting with different partners linked to the cytoskeleton. On the other hand all interactomes described so far are characterized by graph topological properties that are conserved in distantly related species. Here we have asked whether any of the topological features of protein interaction networks could be responsible for the ability of cells to reach a robust organization. To this end we have used a cell automaton model that simulates a cell space where interactions between proteins can occur. Although in principle the model can represent cells where proteins are present at different concentrations and interact with different affinities, here we focus on the topological properties of the network and we use a simple model where proteins are all present at the same concentration and interact with the same "strength". By defining a new metrics of cell organization the Self-Similarity Index, we have shown that starting form a random distribution of protein monomers in a cell lattice, at each time step, protein complexes begins to form and the pseudocell starts organizing its structure. Interestingly the pseudocells that evolve under the rules of a natural protein interaction network reach a higher level of organization when compared to cells evolved under the interaction rules imposed by a random network. Since the interactomes differ from random network in their topological properties we have asked which topological property is responsible for the ability of natural cells to reach a robust organization. By assembling modified networks with tailored degree distribution and clustering coefficients we have been able to show that the clustering coefficient explains more than 80% of the dependence of the Self-Similarity Index on topological properties. Thus, we propose that the clustering coefficient of the protein interaction network of natural cells has been fixed by natural selection to confer self organizing properties on the cell interactome. An empty lattice containing a given number of cubic sites is created. The linear dimension of the lattice is given as input to ProtNet. A single randomly oriented monomeric protein can occupy a lattice site. The number of proteins for each molecular species is fixed at the beginning of the simulation. Protein monomers are distributed randomly in the lattice cells. Interaction phase: The entire grid is visited site-by-site. If the site is occupied, the protein in it can make a connection to proteins occupying neighboring sites, thus forming a new complex. Alternatively an existing bond can be broken thus disrupting an existing complex. Binding is stochastic and the probability of forming a complex (pon) is related to the association rate constant (kon) of the interacting protein pair. After association a complex moves as a single entity. Similarly a binding between two proteins can break down with a dissociation probability (poff) related to their dissociation rates. Since kinetic constants describing the association and dissociation of all pairs of proteins are not currently available such probability has been set to an arbitrary value that is the same for all the proteins as suggested by . Diffusion phase: A second site by site visit is carried out. If the site is occupied, the protein and the complex it belongs to are first rotated and then translated. Complexes or proteins can rotate by 90 degrees around their center of mass in a randomly chosen direction. Rotations are rigid, that is, in multi protein structures, the whole complex undergoes a rotation and there is no torsion. For multi protein complexes the probability of rotation is inversely proportional to their diameter. During the rotation and translation proteins occupying target sites can be recursively moved with a probability that is a function of the ratio between the masses of the hitting and hit protein/complex. As the diffusion coefficient of a molecule in a dilute solution increases linearly with the inverse of the radius, monomers have the highest probability of moving to one of the neighbouring sites at each time step. As a consequence complexes diffuse more slowly. In addition we assumed that all proteins have identical diffusion coefficients. Proteins in ProtNet have six binding sites, thus a single protein can bind to, at most, six other partners. To prevent the formation of very large complexes, each protein species can participate in a given complex only once. For each simulation step ProtNet produces a list of the complexes in the reference pseudo-cell, a dynamic and stochastic representation of the information contained in static protein interaction graphs. For our experiments the three-dimensional pseudocell linear dimension has been fixed to 50. Thus the whole lattice contains 125000 sites. The lattice is filled with proteins such that the occupancy is 20%. The interaction rules for natural networks are obtained from the human and yeast interactomes. The probability of creating a bond is set to 0.7 for all the protein pairs, while the probability of breaking a bond is set to 0.002. We have carried out simulations for 150000 steps on natural and random pseudocells. A simulation step, with a lattice containing 125000 sites at a protein concentration of 20%, takes 0.03 seconds. To each natural network we associate a random network obtained by the Erdös-Rényi (ER) model denoted as G(N, p). The method starts with N vertices and randomly links two nodes with probability p. In order to have the same number of edges of the natural networks we set p = m N ( N - 1 ) 2 where m is the desired number of edges and N is the number of proteins in the network. We set (m = 4714 and N = 1890). The input used in ProtNet is a list of binary interactions sorted by relevance score . yeast_net is a network extracted from mentha . The complete list of interactions was filtered in order to minimize false-positives and use only interactions described by more than one method. The resulting network is composed of 1890 protein species and 4714 interactions. human_net, similarly to yeast_net is a network extracted from mentha, and containing a ranked list of human protein interactions that was limited to a size comparable to that of yeast_net. We associate a node to each protein species in the list and draw an edge for each experimentally reported interaction. The interactomes used for our experiments can be formally represented as undirected unweighted graphs. To calculate and compare the topological properties of the different networks we used Cytoscape , a software platform for the visualization of molecular interaction networks extended with the NetworkAnalyzer plug-in . From the plethora of available metrics we considered Clustering coefficient , Transitivity , Modularity , Connectivity and Degree distribution , Average path length, Diameter and Scale-free fitting index . where Δ is the symmetric difference of the two complexes. The intersection between the two complexes is raised to the second power to give more importance to larger complexes. We first generate a similarity matrix consisting of n rows and n columns as in Additional file 5. Each entry (i,j) of the similarity matrix contains the value of the Similarity Index (S.I.) between the complexes Ci and Cj. In other words the Self-Similarity Index of a pseudo-cell C is the mean value of the best similar pairwise similarities of the complexes in C. Given the definition of the similarity index between two complexes it is possible to compare the complex composition of different pseudo-cells and measure their similarity value. In other words at each step the algorithm finds the best matching complexes and computes their Similarity Indexes. The Inter-Cells Similarity Index (ICSI) is then computed as the mean value of the Similarity Indexes stored into the list. Start initializing all nodes with a degree drawn from the degree list. For each node in PotentialTriads form a connection with the current node with a probability depending on the desired Transitivity coefficient. If no neighbors were selected from PotentialTriads, randomly select a new node to add to the network. The network grows until all nodes have neighbors. Publication of this article has been funded by ERC grant 322749-DEPTH. EG collected the data, carried out simulations, analyzed the results and drafted the manuscript.
0.999997
Why testing? For several reasons. First, competitive scenarios get more complex as time goes by, and the pragmatic way alone is becoming too risky for prospering in the long-term. Second, companies operating through organized marketing departments purchase large amounts of expensive business data containing a lot of useful information, which is often not fully available to managers yet. Finally, because a thoughtful business testing planhelps reduce managerial risk and helps you make better informed decisions. Effective testing is comparable, concise, repeatable, actionable, and focused on business. Large projects should be scaled down. Test results should be stored and their trends should be analyzed, from time to time, in order to generalize conclusions concerning the overall benefit of the process for the business.
0.999558
In this lesson, we will learn how to solve equations that contain an unknown in the numerator. If 𝑥 4 = 1 2 , what is the value of 𝑥 ? Solve 𝑥 − 9 4 = − 8 . Find the value of 7 𝑥 given 1 5 + 𝑥 7 = 1 4 7 0 . Solve 𝑥 − 6 2 = − 6 . Solve 𝑥 − 5 2 = 1 0 . Find the value of 5 𝑥 given 1 4 + 𝑥 5 = 1 0 4 0 .
0.96444
George Psaradakis, 49, was driving the bus when it was attacked with explosives. Do you feel scared to travel after the terrorist attacks on London's transport network? LONDON, England (CNN) -- The driver of the London double-decker bus that was turned into a mangled mass of metal in Thursday's bombings recalled "a bang, then carnage" Friday as he described his horror. More than 50 people were killed in the four terrorist attacks, including 13 on the No. 30 bus at Tavistock Place, near Euston railway station. The explosion peeled the roof off the bus, leaving shattered glass, a few seats and twisted debris. The bombings wounded more than 700 people, said Metropolitan Police Commissioner Ian Blair. The bus was the last target to be hit. The thoughts of the driver, George Psaradakis, 49, were released in a written statement Friday by Transport for London, the government body that oversees the transportation system, including the London Stagecoach fleet of buses. He is considered a key witness in the investigation. Psaradakis, who has been with the company for three years, said his bus route was changed after the bombings of three trains on London's Underground transit system. "My bus had been diverted because there were thousands of people coming out of the tube. There were many people who were trying to get on the bus at once," he said. "Suddenly there was a bang, then carnage. Everything seemed to happen behind me. I am still in great shock and many terrible things are still coming back to me about what I saw." Psaradakis suffered bruises and cuts in the blast. "I tried to help the poor people" the driver said. "There were many injured people, and I thought, 'How am I alive when everyone is dying around me?' The police then had to take me away because they were concerned there might be further explosions." The bus was traveling from Marble Arch to Hackney Wick when the bomb went off about 9:50 a.m. near Russell Square in central London. Psaradakis thanked his colleagues at Stagecoach and other bus companies for their show of support. "I have been very lucky. I am just relieved to be here and to be able to see my wife and children. Many other people have not been so fortunate. I feel for the people that have perished and for their families. "I am pleased that many people in London are still getting the bus, despite what has happened," he said. "We are going to continue our normal lives. We are not going to be intimidated. I need some time to recover from what has happened, but I want to get back to work with Stagecoach and see all the great people at the depot." Barry Arnold, managing director of Stagecoach London, said the company is committed to security and will review its measures in light of the attacks. The police commissioner said investigators so far had found no evidence of suicide bombers or of timing devices used with the bombs but admitted the investigation was in very early stages. "There is absolutely nothing to suggest this was a suicide bomb," he said, referring directly to the bus bomb. "It may have been that, but it may also have been a bomb that was left on the seat. It may also have been a bomb that went off in transit. These things are still open to the investigation."
0.959832
How do you create compelling marketing and advertising taglines for your business, product or service? More importantly, what makes the best taglines? In her book The Ultimate Marketing Toolkit, Paula Peters has an entire chapter dedicated to writing taglines. "A tagline is nothing more than a short statement about your business... The goal is to interest a reader, a viewer, or a passenger in your business... The tagline educates your potential customer market by elaborating on your product or service – all in a tiny, neatly wrapped little package of one line." The great thing about taglines is that they are free. And the best taglines sell your business or product for you. Use your tagline in your advertising, on your website, your business cards, your email signature, and any other communication that is seen by potential customers. Your tagline should communicate one key message about your business. There are three possible approaches: Communicate a benefit, Describe your product or service (especially if your business or product name does not make that clear), Address a specific customer segment. Keep your tagline to less than twelve words. Tie the tagline into your unique selling proposition (USP). Try to have a tagline that clearly differentiates you from your competitors. B2B (unlike B2C) taglines need to indicate, in a simple way, what your company does for the customer. Think about what will be top-of-mind for your customer when/if they need a product or service like yours. Use that in your tagline. Your tagline should reflect your core company values. Avoid vague and fluffy descriptions for your tagline. Eg, "where customers come first" is not a useful tagline, because it does nothing to further describe or differentiate your product. In order to create compelling marketing and advertising taglines, you must first narrow down on who is your ideal target customer, what is their pain point, and what is the unique value that your product or service is providing to them. If you're not absolutely clear on that, take a look at this article on analyzing your target customers and your competitive marketing strategy.
0.978185
Write a Letter to Secretary of State Clinton urging her to speak out on behalf of people with albinism in East Africa. Click the following link, which will take you to the State Department page where letters and comments can be made. See below for a sample letter if you need help expressing your thoughts.
0.999783
What is the best cordless vacuum money can buy? I hate vacuuming so much and am totally overwhelmed by the market for cleaning machines. Which one will help me tolerate the most loathsome household chore since mopping? * My floors are ~1/2 installed low-pile carpet, 1/4 "furniture finish" pine mostly covered with low-pile cotton area rugs, and 1/4 peel-and-stick vinyl tile. * Residents are me (short-haired, moderately-shedding) and sometimes one dog (short-haired, barely-shedding). * I am open to bagless, bagged, and robot vacuums as long as there is no cord and it isn't too heavy. * I've read enough to be vaguely familiar with most of the big brand names, so links to specific products would be ideal. My ex had a Roomba in his condo and it was amazing. I also hate vacuuming (and have 2 shedding dogs) - it changed my life. I bought the model that Costco sells (about $300) and it has held up very well with twice weekly use for the past year. My friend had a model he bought maybe 5 years ago that has just died. If you hate vacuuming it's absolutely the right choice if you can afford it. The only caveat is that if you live in a multi story house there is more picking up and moving it about. I'm in a ranch house so it just ranges all over. The only annoying thing about it is that when it gets stuck behind something I expect it to come when called but the technology has not reached that point yet. Link to the one I bought. I hate vacuuming, and I LOVE my Roomba 980. The Roomba really is pretty great. My only hesitation for you is the rugs on the bare floor; our Roomba has a habit of making folds in our rugs-over-bare-wood and getting stuck on said folds. This is the one we got about 6 months ago. I have a roomba that's been running 5 days a week for like 5 years. They key is cleaning after every run or two and regular maintenance, including taking it apart a couple of times a year and cleaning really well. I had to replace the battery after a few years, and I recently replaced the brush assembly. It's really easy to work on and they're constantly improving the engineering. Warning, if your sometimes dog ever craps on the floor, maybe don't run it when it's there because cleaning crap out of a roomba and off all the places the roomba has been is a really horrific experience. Ask me how I know. I also have a big vacuum for deep cleaning, but to be honest the roomba works really, really well, so I hardly ever use it. Roomba is not always great with lightweight rugs. I liked my Roomba a lot, but it would get confused by rug/floor transitions and, as supercres says, it can ruche up your rugs and get stuck on them. Also it needed to be emptied a lot, and I had to cut hair off the roller a lot (but that is true of all vacuums for me, I just shed a lot of long hairs). Eventually the battery died and I didn't love it enough to replace the battery, so I got rid of it. We currently have a Hoover Linx which I like a lot and a Dyson cordless (not sure which model). I like the Linx because you take out the battery to charge it, so you don't have to store the actual vacuum near an outlet (and you can buy extra batteries if you want more cleaning time). But the Dyson is very good and easier to clean hair out of. Also I really like pink, so having a hot pink vaccuum makes the chore a little more fun. I asked for this for Christmas a couple of years ago, and took my extreme excitement at it's presence under the tree as indication of my old age. But seriously, best vaccuum ever. I also have the pink Dyson and Love it. It cleans up after me, hubby, two big dogs and two little cats. It's really easy to use it to clean up spills or tracked - in dirt right away before or becomes a bigger mess. We also have the same Dyson, though I think ours is purple. It's pretty rad. We bought the Hoover Air Cordless 2-in-1 based on this Sweethome review, and we've been really pleased with it. It's also a hand-vac, which is a nice feature. Our condo is 780 sq feet, and the battery it comes with works for us, but you can also buy additional and/or faster charging batteries. I have a Shark Rocket that I am especially fond of. It's super lightweight (8lbs), handles long-haired cat and long-haired human shedding, and is really easy to care for. It is corded, so that might be a consideration. Super long cord, tho! My house is too cluttered/small for a Roomba, but I would be tempted to get one otherwise because I have a Mint (floor washer robot) that I use in the kitchen and bath and it's pretty good. Roombas are p. expensive, so it's definitely a commitment. I love my dear little Roomba! I have several large, extremely hairy dogs and I have to clean Roomba's brushes by hand after each use. This takes 5 mins tops. It's a small chore I'll happily do in exchange for the convenience of having Roomba work on his own. He does a great job getting everything really clean. I've had two Roombas in 10 years and replaced a battery twice so I guess I would say he's not the most durable of vacuums, but still, totally worth it in my opinion. The #1 thing that has stopped me from pulling the trigger on a Roomba thus far is the stories from folks whose hardwood floors were scratched up in the course of its robotic machinations. Has that been anyone's experience, or does anyone know how I might be able to ensure that would never happen? I'm moving from the house I currently own and can damage/fix however I please into a rental apartment, so I'm newly paranoid about anything that might damage my future LL's property. I love the cordless Dyson (linked to the cheapest model I see on Amazon). It lives in its charging station on the wall, and it takes seconds to grab it, clean up a mess, and put it back. There are no bags, and the air filter is just a sponge you wash in the sink every few months. With the default motorized brush attachment it does carpet and hard floors with no adjustment. Another vote for the Dyson. Fair warning, the battery does run out after 15 minutes (on Turbo), which irritated me when I was first using it, but then I have a 2 story house and had spent a good deal of those 15 minutes working on the crevices in the stair runner. Now, I don't mind having a time limit on my vacuuming. We have two cordless vacuums, a Roomba and a handheld purchased after reading Sweethome recommendations. Maybe I'm just lazier than the average cordless vacuum owner, but if I had to do it again I'd spend more time assessing the size of a vacuum's dirt and dog hair collection receptacle. I feel like I have to empty those things out every second time I run the things, which just makes me loathe to vacuum at all. "The #1 thing that has stopped me from pulling the trigger on a Roomba thus far is the stories from folks whose hardwood floors were scratched up in the course of its robotic machinations." I have the Roomba and hard wood floors and I have no problems at all. I love it, just recently put a new battery and bin in it and it's working great again. I also have the roomba + dyson cordless stick combo. No scratches on my floors. I never thought I would spend that much money on vacuums but I dislike cleaning and the first 2 vacuums I bought were insufficient or too annoying to use or both. I waited for a sale before buying. Can Roomba get up over the edge of a fairly thick area rug? TIA. You can pry my Dyson out of my cold, dead hands. We have used a Neato Signature series on carpet and cat hair. The newer Botvac is better. just ETA, I run the Botvac on parquet flooring and it is fine.
0.999979
After rapid economic growth lasting more than 30 years, the People’s Republic of China (PRC) has stepped into the upper middle-income stage. The country’s gross domestic product (GDP) per capita reached $6,416 (constant 2010 dollars) in 2015, equivalent to $13,400 in international dollars under purchasing power parity (constant 2011 international dollars). In 2015, Central Asia made some important improvements in the environment for cross-border e-commerce: Kazakhstan's accession to the World Trade Organization (WTO) will boost commercial transparency, while the Kyrgyz Republic’s membership in the Eurasian Customs Union expands its consumer base. Why e-commerce? Two reasons. First, e-commerce reduces the cost of distance. Central Asia is the highest trade cost region in the world: vast distances from major markets make finding buyers challenging, shipping goods slow, and export prices high. Second, e-commerce can help pull in populations that are traditionally under-represented in export markets such as women, small businesses and rural entrepreneurs.
0.99999
Is fast hiking really about being fast? The story concerns a hare who ridicules a slow-moving tortoise. Tired of the hare’s boastful behavior, the tortoise challenges him to a race. The hare soon leaves the tortoise behind and, confident of winning, takes a nap midway through the race. When the hare awakes however, he finds that his competitor, moving slowly but steadily, has arrived before him to the finish line. I won’t go into the whole story of ultra running, but rather send you to do some of your own reading about it, but I will provide a short summary: Ultra running is essentially running any distance longer than a marathon (42.195km/26 miles and 385 yards), but really focuses on the round numbers: 100km, 100 miles etc. Those races are done in “one go,” when you may have a little snooze on the trail at some point but the goal is to run the whole way. If you really want to learn more, Google “ultra-running” and spend hours (or weeks) reading, it is an amazing sport. I think we can all easily see that the ultra runners in our story are the hare. They go at a fast pace but they are still limited by distance; they may cover 100 miles, but very few of them can do the 2,000 miles or even 200 miles that most thru-hikers will walk. I will admit that you do get some extreme athletes who are able to be amazing hares that run whole thru-hikes, like Scott Jurek’s run along the Appalachian Trail, but this is a very, very rare example. Balancing out our hares, we have our tortoises – they are slower but persistent, being able to cover long distances day in and day out. I can hear your question now – but you said fast hiking, is that like running? Well, fast hiking is a misleading term, despite being used quite often, as fast hikers are rarely walking fast but rather walking constantly and over long time periods. The true way that the tortoise won the race is by walking continuously, even when the hare needed breaks to recover (or just to show off) and that is exactly how fast hikers cover distance: instead of 5-8 hours days, your days are 10-15 hours, you cut out breaks and spend less time dealing with camp time in the morning and evening (major time saver). All those factors are amazing influences on getting through long distances each day, covering up to 40 miles (65km) a day. A really great resource to learn more about this concept is the best athlete in the category: Andrew Skurka. In 2006 he wrote a post that I still find relevant and useful about how to be a tortoise, and I recommend any long distance walker who might consider fast hiking to look into it. Plan a long day in advance and keep an eye on the watch – when doing long distance trails it is easy to fall into the routine of just letting the day develop and stopping when “you feel like it”. Instead of just keeping an open itinerary, give yourself clear daily goals, break them down into segments and give them time frames. By having mini goals throughout the day with a clear end of day point, you can push yourself in harder sections and walk for longer. Plan and visualize the day’s walk the night before – on the night before each walking day, review your maps and guides over and over, creating a mental image of the next day’s route, distance, places of interest etc. By doing this you eliminate the need to constantly pull the map out to check your progress (and find that you are usually less far than you thought) but rather keep an anticipating eye for coming objects, places etc and use them as distance markers. So why even bother fast hiking? Time constraints – this is my number one reason to fast hike: I have very little time to go hiking due to family, work, hobbies and social commitments, so I need to maximize my time. The challenge – after a while it becomes a real challenge (it is always is) to hike further, to push yourself mentally and physically. The other part of fast hiking is that after having a long and hard day on the trail, you usually wake up and do it the day after (and after, and after…) which gives it a whole new layer of challenge. You get to see more – when covering 20-40 miles a day you get to see the world around you change fast enough that you can detect the changes that can be missed when walking slowly as you get absorbed in the place for longer. Vegetation changes, rock formations and more change rapidly when fast hiking, making them easier to spot. There are, of course, many other reasons to fast hike, and I’m sure you will have yours as you get into it. At the end of the day, the best way to get into fast hiking is to just go out and do it. I suggest starting with easy and clearly marked trails so you can just train your body to deal with the strain. Start with day hikes, and then two days, 3 days and so on. Another option is to go for Andrew Skurka’s way – start a 2,000 mile thru hike and hit the trail running! Fast hiking is a great way to get more miles under your belt while challenging yourself and seeing more there is to see on the trail. Try and get into it, especially if time is a big constraint.
0.932307
The most marked instance of the political involvement of the Shia ulema during this period was in the case of the first Perso-Russian War (1804-1813) in the Caucasus, which had been intermittent from about 1804, and resumed in 1811. Abbas Mirza, the son of Fateh Ali Shah was conducting the campaign, turned to the ulema of Iraq and Ispahan to issue fatwa, declaring the encounter against Russia to be holy war (jihad). Many of the prominent ulema, such as Shaikh Jafar Kashiful Gitta (d. 1227/1812) and Ahmad Naraqi (d. 1245/1829), responded to this appeal and stirred up hootest agitation. In 1812, the Iranian army defeated the Russians at Qarabagh. Russian forces were reinforced, crossed the Aras river, and defeated the Iranians at Aslanduz. The first Perso-Russian War was consequently ended in defeat of Iran, and the Treaty of Gulistan in 1228/1813 stripped Iran of all the Caucasian provinces, such as Georgia, Darband, Baku, Shirwan, Shaki, Ganja, Qarabagh, Mughan and part of Talish. This war had considerably depleted the resources of Iran. A number of disorders broke out; and the Afghans also engineered a rebellion in Khorasan in 1813. There was also repeated chaotic condition on the Turkish frontier, but war did not break out until 1821. It however lasted until 1823 when it was concluded by the treaty of Erzurum. The ulema class however continued to employ effectively the tactics of obstructionism in the Iranian politics, and emphatically agitated for another holy war against Russia. In 1825, the Russian governor-general of Georgia occupied Gokcheh, the principal disputed district with a military force. Fateh Ali Shah was reluctant but when in 1826 he set out for his summer residence in Sultaniyya, he was followed there by Aqa Sayed Muhammad Tabataba, Ahmad Naraqi (d. 1245/1829), Muhammad Taqi Baraghani (d.1230/1847) and other prominent ulema; demanded that Fateh Ali Shah should declare war on Russia. They threatened to take control of the affairs of government if Fateh Ali Shah would refuse to declare holy war. They issued fatwas, declaring the war to be obligatory and opposition to it a sign of unbelief (kufr). The king was pressed into acquiescing, and the war broke out in 1826. Iran gained initial success, recovering most of the territories ceded by the treaty of Gulistan. The Russian forces were reinforced with latest weapons. The ulema imparted to the Iranian soldiers, who had inferior weapons, to recite Sura Yasin of Holy Koran in the battlefield, to cause their enemies blind. The Russians inflicted a series of severe defeats on the Iranian army. They advanced rapidly and Tabriz was first to be fallen, and various discontented leaders in Azerbaijan went over to the Russian side. The outcome of this second Perso-Russian War was as disastrous as the first. Negotiations for peace began in November, 1827, and a treaty was signed on February 21, 1828 at Turkomanchay. As the result of the Treaty of Turkomanchay, Erivan and Nakhchivan and a large indemnity were ceded by Iran. Saiyid Athar Abbas Rizvi writes in "Iran - Royalty, Religion and Revolution" (Canberra, 1980, p. 95) that, "Thus the war-mongering bureaucrates forced upon Iran a war with Russia which ended with the even more humiliating treaty of Turkomanchay in 1828." The state over which Fateh Ali reigned had much in common with the earliest kingdoms of the Seljuqs, the Ilkhanids, the Taymurids and the Safavids. After the Perso-Russian Wars, Fateh Ali lost large part of the Iranian territories. In India, the Mughal empire was declining, and the British dominated the whole country. After Shah Alam II (1759-1806), the next rulers were Akbar Shah (1807-1837) and Bahadur Shah II (1837-1857), the last ruler, who had taken part in the Independence War of 1273/1857, the last struggle on the part of the masses in India to throw off the foreign yoke. But it failed miserably and, on the charge of engineering revolt, the last Mughal ruler was exiled by the British to Rangoon, where he died in extreme penury on 1278/1862. Neither the Muslims nor the Hindus were destined in India to build lasting kingdom on the ruins of the Mughal empire.
0.999998
List 5 reasons you can TRUST the Lord. because His word is true. 2. The Lord only wants me to succeed. 3. He fulfills my most basic needs in my life; acceptance, identity, security, and purpose. 4. Agape - God loves me, with a love so powerful I can hardly understand, nothing else is more powerful. 5. There are no reasons not to. That 5th reason is so simple, but its what so many that make excuses against God seem to overlook. I am so happy you included it, brother. 3. His Word is true, the only Truth, and on this I meditate to bring inner peace that he provides. 4. He made me in His image and sacrificed His one and only Son while we were all sinners. Now I am perfect to Him and His love never ceases. 5. He promises a place for me in His Kingdom and that He will not place on me more than I can bare in this life.
0.955407
A trademark (also known as trade mark or trade-mark) is a distinctive sign or indicator used by an individual, business organization, or other legal entity to distinguish its products or services from the others. It also tells the consumers that the product or service on or with which the trademark appears originate from a unique source designated for a specific market. A trademark is typically a name, word, phrase, logo, symbol, design, image, or a combination of these elements. There is also a range of non-conventional trademarks, which do not fall under these standard categories, such as those based on color, smell, or sound. The term trademark is also used informally to refer to any distinguishing attribute by which an individual is readily identified, such as the well-known characteristics of celebrities. When a trademark is used in relation to services rather than products, it may sometimes be referred to as a service mark. A patent is a form of intellectual property. It consists of a set of exclusive rights granted by a sovereign state for an invention, which is a product or a process that in general provides a new way of doing something. It may sometimes offer new technical solutions to a problem. Rights are granted to an inventor or their assignee/s for a limited period of time in exchange for the public disclosure of an invention. The procedure for granting patents, the requirements placed on the patentee/s, and the extent of the exclusive rights vary widely between countries according to national laws and international agreements. Typically, a patent application must include one or more claims defining the invention, which must meet the relevant patentability requirements such as novelty and non-obviousness. The exclusive right granted to a patentee in most countries is the right to prevent others from making, using, selling, or distributing the patented invention without permission.
0.99456
How do blockbusters co-opt radical movements? Following the highly anticipated release of the new Marvel superhero film, Black Panther, there has been much discussion in online circles about the idea of media corporations co-opting radical movements for their own financial gain. A criticism often levelled is that this co-option devalues, simplifies and creates a cynical view of the radical movements they take inspiration from. It is claimed that the movements do not benefit from their new prominent place in pop culture, but rather are demeaned by misrepresentation and the dilution of their radical ideals by making them more “acceptable” to a fee-paying audience. Is this the case, or can these representations paint radical movements in a positive light? A discussion of this issue would be best placed by looking at the spark that started it, Black Panther. To give a spoiler-free summary, it tells the story of the comic book character Black Panther, also known as T’Challa, who is the king of a fictional African nation called Wakanda that is kept completely secret due from the outside world. In the film, the nation of Wakanda is an unusual mix of traditional African culture with futuristic technology, inhabiting a genre between sci-fi and superhero movie. While the name for the character was originally derived before the revolutionary Black Panthers came about in the 1960s, the parallels between the portrayal of the Black Panther and Wakanda in the film and the real Black Panthers are quite visible. The makeup of Wakanda is entirely black, and in the film, value is placed on preserving the culture of Wakanda from those outside who they fear would destroy it. A nod to the famous picture of Black Panthers founder Huey P. Newton sitting on a wicker chair, with a spear in one hand and a shotgun in the other, is found in one of the promotional posters for Black Panther, as T’Challa sits on his throne in a similar position. It is reasonable to doubt the idea that a Marvel film could promote the activities of a radical group like the Black Panthers. Rather than drive home a message of black empowerment and liberation, the film seems more content to play with traditional story archetypes – the unchallenged king versus the jealous upstart who wants vengeance for past misdeeds. There is an element of isolationism versus multiculturalism, but the film favours the latter at the expense of the African culture it is trying to represent. It is, then, very easy to see where the debate has sprung from as the cynical nature of the film’s representation of a revolutionary movement probably does it no good. Another prominent example of this phenomenon also involves the Black Panther movement -Beyonce’s half-time performance at Super Bowl 50. During the show, Beyonce performed her single Formation, in (you guessed it) a “formation” with outfits resembling that of the Black Panthers, and also featured Beyonce and her dancers doing a black power salute. The performance sparked unrest among conservatives for the political and racial statement it made, but little of the discussion focused on how Beyonce had co-opted the Black Panthers for a consumer-centric Superbowl half-time show. Differences between this performance and Black Panther mostly lie in the fact that this was more blunt and was unashamed in its promotion of the real-life Black Panthers, whereas Black Panther was far more subdued in its invocation of the movement. How many of Beyonce’s younger fans, not having seen the salute before, would have copied her after seeing it on TV? In this way, it seems as that the co-opting of radical movements in pop culture could help those movements if done in a way that is non-cynical and empowering. But the co-opting of radical movements is hardly a new phenomenon. The famous Guerrillero Heroico photo of Che Guevara became a ubiquitous element of pop culture over the past few decades through its appearance on t-shirts, posters and even Irish stamps. The image of Che became massively popular among students, stoners, and others who believed they were “fighting the system”. It is quite easy to see the irony of having a Marxist revolutionary plastered all over vapid consumerist products. Its use emphasises the worst side of the co-opting of radicalism – that the movement it is trying to represent loses all value and meaning and becomes little more than a strange hypocrisy that can be laughed at. In 1997, there was the release of the Hollywood blockbuster The Devil’s Own, a film that was lambasted in some sections of the British press for “glamourising the IRA”. While that statement may just be tabloid sensationalism, the film does present a sympathetic view of its lead – an IRA member played by Brad Pitt who has come to America to buy Stinger missiles to use back home. If this co-opting of the IRA was successful in promoting their cause and activities, it begs the question – is this what we really want? The Overton window theory states that there is an acceptable range of public discourse, which can change over time and with social change. Might this co-opting of radical movements not shift the Overton window to make the radicalism acceptable? Of course, the views of what radical movements are “OK” to promote through popular culture will vary wildly between individuals. Do we then accept the co-opting in pop culture of the Black Panthers but not the IRA? What about Che Guevara? However, these discussions are moot when we realise that pop culture is not controlled by ordinary people, but by suits in marketing and consumer research departments. We must accept that we live in an inherently cynical capitalist society where these radical movements have been and will continue to be taken advantage of for the profit of corporations, but this doesn’t mean it has to be a bad thing for the movements represent in media. It just has to be done right.
0.999993
What happens when we offload voice traffic to Wi-Fi? As user demand for high-quality anytime, anywhere communications continues growing exponentially, mobile providers are evolving core networks to higher capacity technologies such as 4G LTE. As they do so, mobile network optimization increasingly relies on detecting and preventing potential performance issues. Accomplishing this detection becomes even more challenging, given the expanding mix of tools, probes, interfaces, processes, functions, and servers involved in network monitoring and optimization. Ixia's network visibility solutions provide the ongoing data needed for mobile network optimization. They deliver a high-quality subscriber experience reliably and cost-effectively, despite the growing diversity of network technologies, user devices, and security threats. As operational complexity increases, network engineers at leading mobile service providers can leverage Ixia's suite of network monitoring switches to ensure the end-to-end visibility needed to minimize OPX, sustain profitability, and safeguard quality and user satisfaction. Ixia provides telecommunications providers easy access to view end-to-end analyses of architected networks, validate field applications, and improve customer loyalty and support. They deliver the actionable insights needed to dynamically detect, avoid and address issues, Overall, Ixia's robust end-to-end network visibility solutions allow engineers to evaluate and optimize network and application performance under diverse conditions, maximizing ROI and the quality of the user experience.
0.994794
Should we make decisions on ecstasy? those changes were as a result of taking ecstasy. it's only Ecstasy that keeps us together. influence of Ecstasy? I think we probably shouldn't. My advice, as in my books, is to re-evaluate the experience later, and not make decisions until some time afterwards. Ecstasy can often provide wonderful truthful insights, but they are often "tunnel vision". That is, you may focus on one aspect without seeing the whole issue in perspective. However, I would not distrust romances started on ecstasy. Timothy Leary married a woman the week after they met on E and that lasted for 12 years or more. My own got off to a kick start on E, and from that incredible closeness we gradually discovered how much we have in common.
0.992457
Political/civic background: I served as a volunteer for Alderman Arenda Troutman, later becoming a precinct captain, then area coordinator and eventually became the President of her 20th Ward Regular Democrats organization. I helped two political candidates, Che "Rhymefest" and Dock Walls, for Che's campaign I simply served as a field soldier, and for Dock Walls, I helped to organize street teams. Please Explain: We must keep our contractual obligations, even if it means using some of the Tax Increment Financing surplus to ensure pension solvency. Keeping our contractual obligations should be seen as an emergency that requires extraordinary measures. We have a flawed system that must inevitably be restructured, but restructuring past promises, is not restructuring, it is reneging. - Naming rights of city owned property. - Tax increment finances should be used to invest in cornering the market of an emerging market, such as digital manufacturing, that we have already begun to invest in with federal support. Please explain: I believe that hiring more officers is a necessary, yet short term numerical solution to a problem in need of a new strategy. Stemming the flow of guns, officers walking beats and becoming more familiar with residents, restorative justice options more regularly used by courts, community input and power over policing decisions and job appointments, would all go a long way to build a better relationship between the community and the police force that protects it, and an even longer way to reducing the need to saturate areas with police presence.  I would support a law, that requires gun manufacturers to develop and implement a tracking system that reflects the electronic and micro-manufacturing advances of the times we live in. Please explain: The numbers indicate that, a mayor appointed board of education, is no more successful than the city council appointed boards of the past. We must bring the power of entities this crucial to the lives of constituents, closer to the direct control of the constituents, and allow we, the constituents to hold ourselves accountable. Along with this change, we must also increase the length of LSC office terms. A: I disagree with the notion that TIFs are an economic development tool, and also disagree with the inference that these surplus funds support schools and city agencies. That being said, the power over the current TIF funds should be legislated into the hands of those within the communities in which those funds were taken, and that power over directing those dollars and appointing those on the oversight, must be taken out of the hands of a mayor. A: Organize and guide cooperative investing, allowing the community increase its ownership of the retail market within its own boundaries. I would support parity legislation that would bring some balance to the way that city development contracts and dollars are awarded. I would guide the organization of an Industry Ownership And Job Creation Plan, to quickly move the community toward economic self-sufficiency. A: The city council should consist of 50 aldermen, representing approximately 53,000 constituents each. Increasing the size of an alderman’s district would hinder his or her ability to be the closest access to political power, that those 53,000 constituents have. Communicating with and addressing 53,000 constituents is a daunting task for the average citizen that wants to be a representative in this political process, increasing that difficulty would be undemocratic. Please explain: The social ills, crime and addictions that accompany this industry, would far outweigh the profits for the city, unless the city decided to build something that would rival the tourist attractions in Las Vegas and Atlantic city. Please explain: The city has far too many of these TAXES, disguised as community safety measures. The red light and speed camera programs should be dismantled.