proba
float64
0.5
1
text
stringlengths
16
174k
0.947828
American artist and ornithologist (one who studies birds) John James Audubon was a leading natural history artist who made drawings of birds directly from nature. He is mainly remembered for his Birds of America series. John James Audubon was born in Saint Dominigue (now Haiti) on April 26, 1785. He was the son of Jean Audubon, a French adventurer, and Mademoiselle Rabin, about whom little is known except that she was a Creole and died soon after her son's birth. Audubon was an illegitimate child, meaning that his father was not married to his mother. Audubon's father had made his fortune in San Domingo as a merchant, a planter, and a dealer of slaves. In 1789 Audubon went with his father and a half sister to France, where they joined his father's wife. Their father and his wife adopted the children in 1794. Audubon's education was arranged by his father. He was sent to a nearby school and was tutored in mathematics, geography, drawing, music, and fencing. According to Audubon's own account, he had no interest in school, preferring instead to fish, hunt, and explore the outdoors. He was left with his stepmother most of the time while his father served as a naval officer. Audubon became a spoiled, stubborn youth who managed to resist all efforts to both educate him and keep him under control. When residence at a naval base under his father's direct supervision failed to have any effect, he was sent briefly to Paris to study art, but he disliked that also. Audubon's father decided to send his son to America, where he owned a farm near Philadelphia, Pennsylvania. At first the boy lived with friends of his father. They tried to teach him English and other things, but after a time he demanded to live on his father's farm. There Audubon continued living the life of a country gentleman—fishing, shooting, and developing his skill at drawing birds, the only occupation to which he was ever willing to give effort. When Audubon began his work in the early nineteenth century, there was no such profession as a "naturalist" in America. The men who engaged in natural history investigations came from all walks of life and paid for their work—collecting, writing, and publication—from their own resources. Audubon developed a system of inserting wires into the bodies of freshly killed birds in order to move them into natural poses for his sketches. In 1805 Audubon returned briefly to France after a long battle with his father's business agent in America. While in France he formed a business partnership with Ferdinand Rozier, the son of one of his father's associates. Together the two returned to America and tried to operate a lead mine on the farm. Then in August 1807 the partners decided to move west. There followed a series of business failures in various cities in Kentucky, caused largely by Audubon's preference for roaming the woods rather than keeping the store. During this period he married Lucy Bakewell. After the failures with Rozier, Audubon, in association with his brother-in-law, Thomas Bakewell, and others, attempted to start several more businesses, the last being a lumber mill in Henderson, Kentucky. In 1819 this venture failed and Audubon was left with only the clothes on his back, his gun, and his drawings. This disaster ended his business career. For a time Audubon made crayon portraits (drawings of individual people) for $5 per portrait. Then he moved to Cincinnati, Ohio, where he became a taxidermist (one who stuffs and mounts the skins of animals) in the Western Museum that had been recently founded by Dr. Daniel Drake. In 1820 the possibility of publishing his bird drawings occurred to him. He set out down the Ohio and Mississippi rivers, exploring the country for new birds and paying his expenses by painting portraits. For a while he supported himself in New Orleans by tutoring and painting. His wife also worked as a tutor and later opened a school for girls. She became the family's main financial support while Audubon focused on publishing his drawings. In 1824 Audubon went to Philadelphia to seek a publisher. He met with opposition, however, from the friends of Alexander Wilson (1766–1813), the other major American ornithologist with whom Audubon had begun a bitter rivalry in 1810. He finally decided to raise the money for a trip to Europe, where he felt he would find greater interest in his drawings. He arrived in Liverpool, England, in 1826, then moved on to Edinburgh, Scotland, and to London, England, signing up subscribers for his volumes in each city. Audubon finally reached an agreement with a London publisher, and in 1827 volumes of Birds of America began to appear. It took eleven years in all for the publication and reprintings of all the volumes. The success of Audubon's bird drawings brought him immediate fame, and by 1831 he was considered the leading naturalist of his country, despite the fact that he possessed no formal scientific training. There was an intense popular interest in the marvels of nature during this era. Anyone who could capture the natural beauty of wild specimens was certain to take his place among the front ranks of those recognized as "men of science." Audubon had succeeded in giving the world the first great collection of American birds, drawn in their natural habitats as close to nature as possible. With his great work finally finished in 1838, and the Ornithological Biography (a text-only book about birds) in publication, Audubon returned to America to prepare a "miniature" edition. He also began drawings for a new book (in collaboration with John Bachman), Viviparous Quadrupeds of North America, for which his sons contributed many of the drawings. In 1841 Audubon bought an estate on the Hudson River and settled down to advise and encourage young scientists. It was during this period that the romantic picture of Audubon as the "American Woodsman," the great lover of birds, began to emerge. After several years of illness, Audubon suffered a slight stroke in January 1851, followed by partial paralysis and great pain. Audubon died on January 27, 1851. Blaugrund, Annette. John James Audubon. New York: Abrams, 1999. Burroughs, John. John James Audubon. Woodstock, NY: Overlook Press, 1987. Ford, Alice. John James Audubon: A Biography. Rev. ed. New York: Abbeville Press, 1988. Thank you for such an informative article. I work for the Audubon Society of Rhode Island Environmental Education Center and needed to know something more than what I had of Audubon's life to share with our visitors. How can I get more information on the biography of John James Audubon, about his wife ,how many children he had areThey still living? Or grandchildren, did they also do panting ? Did his family ever lived in California? I came across an oil panting on canvas about 20yrs. Ago of the "Louisiana Heron" it's on beautiful gold frame about 35 by 31 but the Lady I got it from died, she had it for years, I would like to sell it but it's so beautiful that I hate to part with it. Maybe I'll give it to my Grandchildren. I just wanted to know more on Mr. Audubon. Would appreciated if I can read more on John James Audubon. Thank You ! How do we know that Jeanne Rabin was creole? Most biographical sources simply say she was a chambermaid from the south of France and extremely beautiful. Hello,I am a 5th grade student and I would like to know the author and the last updated;date as soon as possible(ASAP)please and thank you.
0.936839
Bale began his professional career at Southampton, playing at left back, earning acclaim as a free kick specialist. Since transferring to Spurs in 2007, managerial and tactical shifts have seen him transform into a more offensively-oriented player. In the 2009–10 season Bale played an integral role in Tottenham's success domestically and in the Champions League. On 3 December, Bale scored the first goal in Tottenham's 3–0 victory over Bolton Wanderers. He marked the goal with a tribute to Gary Speed by holding up his left boot, with "R.I.P Gary Speed" stitched on it, in front of the Bolton fans. On 27 December, Bale scored twice to give Tottenham a 2–0 win against Norwich City. On 5 January 2012, Bale was one of the players voted into the UEFA Team of the Year 2011. He scored his third brace of the season as he scored twice against Wigan on 31 January to take his tally to ten goals for the season. In January 2012 he was the Premier League Player of the Month for the second time in his career, after three goals and two assists in the Premier League for the month. Jermain Colin Defoe (born 7 October 1982) is an English footballer who plays as a striker for English Premier League club Tottenham Hotspur, and the England national football team. In pre-season, Defoe scored two goals, one coming in a 3–0 win against Orlando Pirates on 23 July, and the other in a 2–1 win against Athletic Bilbao at White Hart Lane on 6 August. Defoe started the season by scoring in a 5–0 win against Hearts in a Europa League play-off game on 18 August. His first Premier League goal of the season came on in a 2–0 win at Wolverhampton Wanderers, scoring the second goal after exchanging passes with Niko Kranjčar. His next goal came in the Europa League group stage game at home to Shamrock Rovers. His first goal in October came on the 16th away to Newcastle United, scoring Tottenham's second in a 2–2 draw. On 6 November he scored his third Premier League goal of the season, in a 3–1 win against Fulham at Craven Cottage. He then scored in two consecutive matches against West Bromwich Albion and Bolton Wanderers. On 15 December, he scored again in the Europa League in a 4–0 win against Shamrock Rovers at Tallaght Stadium. His first goal of 2012 came in a 1–0 home win against West Brom, converting a Gareth Bale cross. He scored again in the next game this time in a 3–0 FA Cup win at home to Cheltenham Town. His 113th goal for Spurs came in a 3–2 loss to Manchester City on 22 January at the Etihad Stadium. He scored as a substitute against Manchester United in a 3–1 loss on 4 March. He then scored two goals in Tottenham's FA Cup replay against Stevenage, with Tottenham winning 3–1. Defoe's 16th goal of the season came in a disappointing 2–1 league defeat to Norwich City. He scored on the last day of the season against Fulham, the 2nd in a 2-0 win. Defoe ended the season with 17 goals in 38 games. In the premier league he scored 11 in 25 appearances, of which only 11 were starts.
0.997973
Article by Interlaw: Recommended by the British Consul. Buying a property for your own holiday use and renting it out to achieve income at other times is a sensible option for many seeking to buy their dream home in Spain, but it is very important to remember that any income derived from rentals must be declared as income when making tax declarations. The Spanish authorities are becoming increasingly vigilant due to the large scale tax fraud which is taking place in Spain and unfortunately, ‘not knowing about tax commitments does not take away your liabilities’ , so those who fail to declare rental income face potential fines and penalties. In a new Resolution issued on 10th March 2014 by the Dirección General de la Agencia Estatal de Administración Tributaria (General Directorate of the Spanish Inland Revenue), general guidelines are given for the Plan Anual de Control Tributario y Aduanero 2014 (Annual General Tax and Excise Control Scheme) in order to define the strategy that tax collectors will follow throughout 2014 and in the future. Tax inspectors are becoming more efficient at identifying assets, rents or business activities feeds from the information obtained via tax returns, and data exchanges between domestic or international Public Administrations based on collaboration agreements. One of the priorities of the Inland Revenue in 2014 will be to get information on rentals, real estate or financial assets placed in tax havens or with low tax rates in order to identify income generated in Spain which is, subsequently, to be taxed in Spain. They will search for information on domestic or international transactions to identity the holders of those financial assets who do not declare the income obtained here or whose investments do not relate to the filed income or wealth tax returns. – Information from other Public Administrations, in particular in those cases where there may be administrative records related to business/trading activities. It is obvious that the data contained in the Catastro (HMLR - England and Wales, Registers of Scotland (RoS) in Scotland, and Land Registers of Northern Ireland) is easily spotted and the details of the owners who have, or have not submitted their declarations can be accessed easily. All those who have not declared assets are a potential target for a tax inspection. – Information relating to cash flow, invoicing by credit cards or wealth signs which are inconsistent with the information given on tax returns. A priority scheme has been devised in order to carry out on-site inspections to detect leased properties whose owners are not declaring rental income. This is particularly important for non-residents, and more so in those cases where the rental agreement is handled by a management company because in this instance such companies are liable if they do not handle tax declarations and tax payments properly. Tax authorities are also targeting Form 720 relating to a declaration on assets placed abroad and to detect potential revenue relating to such assets to ensure that asset owners meet their tax commitments. Form 720 will be used to ensure that assets are declared and then that the tax paid for the revenue generated by these assets abroad is the correct one. The exchange of data and information about assets and rights placed abroad will increase in 2014 in order to confirm that the correct taxes are applied and paid for by the tax payers. The Spanish Ministro de Hacienda, Cristóbal Montoro, insists that ‘they are not being treated as fraudsters’ and that they ‘are checking all cases one by one in order to prevent unnecessary detriment to their assets’ he pointed out in a parliamentary session. According to Montoro, the number of these cases is ‘really small’ compared to a total of 800.000 proceedings that were initiated by the Inland Revenue last year. In addition to that, he has said that "each case is being checked under its own merits to take into account all personal and family circumstances, e.g. age, dependents or disabilities’. The intention is to allow for a deferred payment scheme or instalments, wherever possible, and ‘avoid causing detriment to the assets of those affected by it’. The head of the Inland Revenue confirms that they are ‘granting automatic deferred payments without requesting further guarantees’ to those whose debt is below 18.000 Euros and that more than 3,800 people who were subject to additional self-assessment tax returns as a result of an inspection, have benefited from a total amount of 5.21 million Euros to be paid on deferred payments. In a nutshell, all taxpayers, whether tax residents or not in Spain, need to be very diligent with their tax affairs when it comes to tax liabilities. It is advisable to engage the services of a professional to avoid any fines or sanctions and ensure absolute peace of mind. Information supplied by Interlaw, who have offices in Murcia City and Los Belones in the Murcia Region, as well as Almería and Veléz Blanco.
0.541679
Christopher Clive Froome, OBE (born 20 May 1985) is a British road racing cyclist, who currently rides for UCI WorldTeam Team Sky. Considered by many[who?] as one of the greatest stage racing cyclists of all time. He has won all of cycling’s three grand tours. This includes four editions of the Tour de France (in 2013, 2015, 2016 and 2017), the Giro d'Italia in 2018 and the Vuelta a España in 2017. Froome has also won two Olympic bronze medals in road time trials, in 2012 and 2016, and also took bronze in the 2017 World Championships. Froome was born in Kenya to British parents, and grew up there and in South Africa. Since 2011 he's been a resident in Monaco. At the age of 22, Froome turned professional with Team Konica Minolta. In 2008, he joined the team Barloworld. The same year he moved to Italy, and started to ride under a British licence. In 2010, he moved to Team Sky and has since become one of the team's key cyclists. Froome made his breakthrough as a Grand Tour contender during the 2011 Vuelta a España where he finished second overall. At the 2012 Tour de France, riding as a super-domestique for Bradley Wiggins, Froome won stage seven and finished second overall, behind Wiggins. His first multi-stage race win came in 2013, in the Tour of Oman, followed by wins in the Critérium International, the Tour de Romandie, the Critérium du Dauphiné, and the Tour de France. In the 2014 Tour de France, he retired after multiple crashes. In 2015, he won his second Critérium du Dauphiné and his second Tour de France. He won a third Tour de France in 2016 and became the first man since Miguel Indurain in 1995 to successfully defend his title. He won his fourth Tour de France in 2017, followed by successive wins at the 2017 Vuelta a España and the 2018 Giro d'Italia, his first victories in both races. These achievements made him the first cyclist to win the Tour–Vuelta double since the Vuelta was moved to September, and the first to hold all three Grand Tour winners' jerseys at the same time since Bernard Hinault in 1983. After finishing primary school at the Banda School in Nairobi, Froome moved to South Africa as a 14-year-old to attend St. Andrew's School, a publicly funded school in Bloemfontein and St John's College, a boarding independent school in Johannesburg. Whilst in South Africa he was the school's cycling captain and kept in contact with Kinjah. He then studied economics for two years at the University of Johannesburg. In South Africa Froome started to participate in road cycling. On one of his school holiday, his home club gifted him with a second hand yellow jersey, being unaware of the Tour de France, he failed to see the significance. It was not until he was 22 that he turned professional. Froome started road racing in South Africa, specialising as a climber. Froome competed for Kenya in the road time trial and the road race at the 2006 Commonwealth Games in Melbourne, where he finished 17th and 25th respectively, catching the attention of future Team Sky principal Dave Brailsford: "The performance he did, on the equipment he was on, that takes some doing... We always thought he was a bit of a diamond in the rough, who had a huge potential." While representing Kenya at the 2006 Road World Championships in the under-23 category in Salzburg, Austria, Froome crashed into an official just after the start of the time trial, causing both men to fall; although neither was injured, he finished in 36th place. Froome's appearance at the Worlds came about after he impersonated Kenyan cycling federation president Julius Mwangi by using Mwangi's email account to enter himself into the Championships, in order to add some European racing experience to his CV and boost his chances of obtaining a contract with a professional team. Froome turned professional in 2007, aged 22, with the South African team, Konica Minolta, withdrawing from university two years into his degree in economics. He competed from April to September in the U23 Nations Cup for the Union Cycliste Internationale's World Cycling Centre (WCC) team based in Aigle, Switzerland. In May he rode his first stage race, the Giro delle Regioni, winning stage five, riding for WCC. In late-May he won stage six of the Tour of Japan, attacking from a breakaway in the fourteen-lap circuit in Shuzenji. In June he competed at the "B" world championships in Cape Town, placing second to China's Haijun Ma in the 26.8-kilometre-long (16.7 mi) time trial. In July, he claimed a bronze medal in the road race at the All-Africa Games in Algiers, Algeria. On 26 September, he placed forty-first in the under-23 time trial at the world championships in Stuttgart, three minutes and thirty seconds behind the gold medalist, Lars Boom of the Netherlands. Froome was introduced to the British-based, South African-backed, second-tier UCI Professional Continental team, Barloworld, by South African Robbie Hunter, signing with them for the 2008 season. In March he finished second overall in the Giro del Capo in South Africa, one minute and forty-one seconds behind his teammate, Christian Pfannberger. Over April and March, he rode the Critérium International, Gent-Wevelgem and the Ardennes classics. In May 2008, Froome switched from a Kenyan licence to a British licence, to have a chance of riding in the 2008 Olympic Games, where Kenya did not qualify. He made his Grand Tour debut when he was named in Barloworld's squad for the Tour de France – becoming the first participant born in Kenya, in which he finished 84th overall and 11th among the young rider classification. In October Froome finished fourth overall in the Herald Sun Tour in Victoria, Australia. His performances in 2008 attracted the attention of British Cycling coach, Rod Ellingworth, who believed Froome had potential. Froome said: "Although I was riding under the Kenyan flag I made it clear that I had always carried a British passport and felt British. It was then we talked about racing under the Union Flag, and we stayed in touch." Froome claimed his next professional win in March 2009, with the second stage of the Giro del Capo in Durbanville, South Africa, attacking a ten-strong breakaway with 30 km (18.6 mi) and finishing four minutes ahead. He then participated in the Giro d'Italia, in which he came 36th overall, and seventh young rider classification. In July he won a minor one day race, Anatomic Jock Race, in Barberton South Africa. In September 2009, it was announced that he was to join British cycling team, Team Sky, for the 2010 season. Froome rode the 2010 Giro d'Italia. On stage nineteen, he was suffering with a knee injury and on the Mortirolo Pass he was seen holding on to a police motorbike. He had been dropped by the gruppetto, and intended to reach the feed zone and retire from the race. For holding on to the motorbike he was disqualified from the race. During his first season with Sky, his best result was at the Tour du Haut Var, where he finished ninth in the overall standings. He also finished second at the 2010 national time trial championships, showing his ability in the discipline. In October he represented England at the Commonwealth Games, in Delhi, coming fifth in the 40-kilometre-long (25 mi) time trial, two minutes and twenty seconds behind the winner, Scotland's David Millar. The early highlights of Froome's 2011 season were top fifteen finishes in the Vuelta a Castilla y León and the Tour de Romandie. Froome had a mixed Tour de Suisse, riding with the lead group on some mountain stages yet losing time on others, and finishing ninth in the final time trial. Froome entered the Vuelta a España as a domestique for Bradley Wiggins. Wiggins gave him credit for his ride in stage nine, where he helped Wiggins gain time on his rivals. The following day in stage ten, however, Froome out-rode Wiggins to finish second in the time-trial behind HTC–Highroad's Tony Martin and to take an unexpected lead in the race. Froome averaged 405 watts over 56 minutes in this time-trial, proving himself as a strong time-trialist. During stage eleven he helped his team neutralise some attacks but soon found himself unable to follow the main group. However, he managed to hang on to second place in the general classification. After losing the jersey to Wiggins on stage eleven, Froome continued to ride in support of his leader. On stage fourteen, he helped to drop rivals including Liquigas–Cannondale rider Vincenzo Nibali and Joaquim Rodríguez (Team Katusha) on the final climb. Wiggins credited his lead to Froome, in a stage which also saw Froome rise back up to second in the standings. On the tough stage fifteen which ended on the Alto de L'Angliru, stage winner Juan José Cobo (Geox–TMC) took the overall lead. Froome finished in fourth place, forty-eight seconds behind Cobo, and retained his second place in the overall strandings. On stage seventeen, Froome attacked Cobo 1 km (0.6 mi) from the summit finish, but Cobo fought back, catching Froome in the final 300 metres, only for Froome to attack again to win the stage and arrive one second in front of Cobo. As a result of time bonuses, Froome reduced Cobo's lead to thirteen seconds. Froome was unable to reduce Cobo's lead any further and finished second overall in the Vuelta, equalling Robert Millar's second places in the 1985 and 1986 editions of the Vuelta and the 1987 Giro d'Italia, as the best finish by a British rider in the Vuelta and the highest finish by a British rider in a Grand Tour. There was an inconsistency about him. The question wasn't why he was good, the question was why we'd only seen glimpses. Why isn't he like that all the time? When the illness was discovered, retrospectively, it made a lot of sense. David Brailsford on Froome's bilharzia infection. Later that year, it was revealed Froome had suffered throughout the year from the parasitic disease schistosomiasis, after having picked up the disease during a visit to Kenya in 2010. The discovery and subsequent treatment of the illness has been used to explain Froome's rapid rise in form during 2011. On 16 September 2011, Froome signed a new three-year contract with Sky. He was part of the Great Britain team that helped Mark Cavendish win the world road race championship. In October, Froome finished third overall in the first edition of the Tour of Beijing, 26 seconds behind overall winner, Tony Martin. The early part of Froome's 2012 season was wrecked by illness. He withdrew from the Volta ao Algarve with a severe chest infection, and blood tests showed the schistosoma parasites were still in his system. In March, while on a training ride, Froome collided with a 72-year-old pedestrian. He returned to racing in May, for the Tour de Romandie, where he helped Wiggins win the race overall, before participating in a training camp on Mount Teide in Tenerife with several of his teammates. Froome was selected for the Sky squad for the Tour de France. After placing 11th in the prologue, he suffered a punctured tyre 9 mi (14.5 km) from the end of stage one and lost over a minute to overall leader Fabian Cancellara (RadioShack–Nissan). On stage three, Froome was involved in a crash on the hill-top finish in Boulogne-sur-Mer, and was sent flying into safety barriers, but was unharmed and was given the same finishing time as the winner, Peter Sagan of Liquigas–Cannondale. On stage seven finishing atop the Category 1 climb to La Planche des Belles Filles, he protected his leader Wiggins and was part of a small group that came in sight of the finish line. Cadel Evans (BMC Racing Team) attacked, Froome jumped on his wheel and won the stage with an advantage of two seconds over his leader and Evans. Froome took the lead in the mountains classification. With that operation, he took the polka dot jersey, but lost it to Fredrik Kessiakoff of Astana the very next day. Froome finished second to Wiggins on stage nine, an individual time trial, and moved up to third overall. On stage eleven to La Toussuire, Froome attacked the remaining group on the last climb, 4 km (2.5 mi) before the finish line. He subsequently received the order from his team manager to hold back and wait for yellow jersey Wiggins. He finished third on the stage. For his efforts in assisting Wiggins, Froome was lauded in the media as a super-domestique.[not in citation given] On stage seventeen, Froome and Wiggins finished second and third respectively on the final mountain stage to further cement their general classification positions, although Froome repeatedly waited for Wiggins on the final climb, costing him the chance of winning the stage. On stage nineteen, a time trial, Froome finished second to Wiggins, mirroring the overall standings. Wiggins went on to win the tour with Froome second, becoming the first two British riders to make the podium of the Tour de France in its 109-year history. Froome, along with Sky teammates Wiggins, Cavendish and Ian Stannard, as well as Millar (Garmin–Sharp) were selected for Team GB's road race at the Olympic Games. Froome and Wiggins also contested in the time trial. Froome won bronze in the time trial, with teammate Wiggins taking gold. Froome was selected as Team Sky's leader for the Vuelta a España, where he aimed to go one better than 2011 and win his first Grand Tour. He lay third after the first mountain finish on stage three, and moved up to second on stage four after leader Alejandro Valverde crashed, losing 55 seconds to the chasing group. Froome moved down to third during the stage-eleven time trial sixteen seconds off leader Rodriguez. He lost another twenty-three seconds on stage twelve, putting him 51 seconds down. He struggled through the rest of the second half of the race. He ended up fourth overall, finishing over ten minutes behind the race winner, Alberto Contador (Saxo Bank–Tinkoff Bank). Froome's 2013 season began at the Tour of Oman, where he took the race lead on stage four, finishing second to Rodríguez on the summit finish of Jebel Akhdar. Froome then won the following stage to extend his lead, out-sprinting Contador and Rodríguez. He finished the race taking the overall classification, his first stage race win of his career, 27 seconds ahead of Contador, with Cadel Evans twelve seconds further back. He also won the points classification. Froome then led Team Sky at the Tirreno–Adriatico in March, where he won the fourth stage after countering an attack by Contador, Astana rider Nibali and Vini Fantini–Selle Italia's Mauro Santambrogio on the final climb to Prati di Tivo. Froome lost time on eventual winner Nibali on the penultimate stage, finishing the race in second place. Froome returned to action, and to the top step of the rostrum, in the Critérium International. After finishing fourth in the short second-stage time trial, he passed teammate Richie Porte to win the third and final stage. In so doing, he overtook Porte in the general classification. In late April, Froome won the 7.5 km (4.7 mi) prologue of the Tour de Romandie in Le Châble, Switzerland, taking the leader's jersey, with a six-second gap over Andrew Talansky of Garmin–Sharp. He remained in the yellow leader's jersey throughout the entire race, increasing his advantage over his rivals to almost a minute with a strong performance in the penultimate queen stage. Near the end of that stage, after losing his support riders in the peloton, Froome gave solo chase to breakaway Team Katusha rider Simon Špilak and after catching him, worked with the Slovenian to maintain and extend their lead on the peloton and improve their general classification standings. Špilak won the stage, which catapulted him into second place in the overall, with Froome on his wheel in second. In the final individual time trial stage Froome took third place, increasing his lead and winning his third race of the season. Froome's final warm up race before the Tour de France, for which he was favourite, was the Critérium du Dauphiné at the beginning of June. He sat second overall behind Garmin–Sharp's Rohan Dennis after coming third in the time trial on stage four. Froome won stage five after countering a late attack by Contador, to take the race lead by 52 seconds over teammate Porte. Froome helped Porte solidify his second place on stage seven, and on stage eight the pair rode away from their rivals on the final climb, with only Talansky (Garmin–Sharp) able to follow. Froome took second on the stage behind Alessandro De Marchi of Cannondale, who had attacked earlier, to secure overall victory, with Porte completing a one-two, 58 seconds back. This was Froome's fourth major stage race victory of the season, out of the five he had entered. Froome's Tour de France got off to a nervy start as he crashed in the neutral zone of the first stage on the isle of Corsica, but he was unharmed. Also, he avoided going down in the large crash towards the end of the stage. After staying out of trouble for the rest of the first week, Froome won stage eight, the first mountain stage of the race, finishing on Ax 3 Domaines, by launching an attack after teammates Peter Kennaugh and Porte had brought back an earlier attack by Movistar Team's Nairo Quintana, and distanced most of Froome's rivals. Froome's winning margin on the stage was 51 seconds over Porte, and 85 seconds to Valverde (Movistar Team) in third. This gave Froome the overall lead in the Tour for the first time and the lead in the mountains classification. On the following stage, however, Froome was left isolated as no teammates were able to follow repeated attacks early in the stage by Garmin–Sharp, Movistar Team and Saxo–Tinkoff riders. Despite being without any team support for most of the stage, Froome was able to defend his lead by following several attacks by Quintana and Valverde. Froome then finished second in the individual time trial on the twelfth stage, twelve seconds behind Tony Martin, to put further time into all of his rivals. However, on stage thirteen Saxo-Tinkoff caused a split in the peloton due to strong crosswinds, which Froome missed. Saxo–Tinkoff's Contador and Roman Kreuziger, and Laurens ten Dam and Bauke Mollema of Belkin Pro Cycling all made the selection and took 69 seconds out of Froome's lead, although Valverde lost over ten minutes and slipped out of contention. Froome beat Nairo Quintana to win stage 15 of the 2013 Tour de France. Froome won stage fifteen, which finished on Mont Ventoux. Kennaugh and Porte dropped all of the leading contenders except Contador on the early part of the climb, before Froome surged clear of Contador with 7 km (4.3 mi) remaining and caught Quintana, who had attacked earlier in the climb. The pair worked together to put time into their rivals, before Froome dropped Quintana with 1.2 km (0.7 mi) remaining and soloed to the finish. This gave Froome a lead of four minutes and fourteen seconds over Mollema in second place, with Contador a further eleven seconds back. Froome also regained the lead in the mountains classification. He won the stage seventeen time trial, finishing the 32 km (20 mi) course from Embrun to Chorges in 51 minutes 33 seconds, with Contador coming in nine seconds behind him, in second place. Froome defended his lead during the Alpine stages, extending his overall lead as Mollema and Contador dropped back. Froome won the general classification on 21 July with a final time of 83 hours, 56 minutes and 40 seconds; he was 4 minutes and 20 seconds ahead of second-placed Quintana. He was also King of the Mountains for six stages; however, he ultimately finished second to Quintana in that classification. Froome's overall win and stage victories in the Tour win put him at the top of the UCI World Tour ranking, with 587, ahead of Sagan on 409. Partly because[according to whom?] the 2013 Tour was the first since Lance Armstrong's admission of doping, such questions were asked of Froome. He insisted that he and his team were clean and stated that the questioning saddened him. Froome was drug tested during the Tour and Team Sky principal Dave Brailsford offered the World Anti-Doping Agency all performance data they had on Froome as evidence. In October Froome was named winner of the prestigious Vélo d'Or award for the best rider of the year. As defending champion for the first time, Froome started his 2014 season by again winning the Tour of Oman. After some minor illnesses and back problems, which meant he missed Tirreno–Adriatico, his next stage race was the Tour de Romandie, again as defending champion, which he won by 28 seconds ahead of Špilak, with the two riders placing first and second in that race for the second consecutive year. He also won the final stage of the race, an 18.5 km (11.5 mi) individual time trial, finishing a second faster than three-time time trial world champion Martin. To celebrate the Tour de France moving from Britain to France in July, Froome rode a bicycle through the Channel Tunnel, becoming the first solo rider to do so and one of few cyclists ever to have made the journey. The Crossing took under an hour at a top speed of 40 mph – faster than most cross-channel ferries. Froome crashed out on the fifth stage of the Tour de France after falling three times over two days, putting an end to his defence of his Tour de France crown. He came back in time to duel with Alberto Contador on the Vuelta a España. He lost time on the first individual time trial. Before the last stage, a short (10 km) flat time trial, Froome was in second place with a deficit of 97 seconds on the Spaniard. He finally finished second. He was also awarded the overall combativity award. Following his 2013 and 2014 early-season victories in the Tour of Oman, Froome decided to begin his 2015 racing season in February at the Ruta del Sol in Spain. He was joined there by Contador, both riders competing in this race for the first time. Having lost eight seconds to Contador in the first day's individual time trial, Froome ceded even more time to him on the third stage, when the Spaniard broke away from the peloton during the uphill finish to win the stage. Now 27 seconds behind Contador, with only one mountain stage remaining, Froome seemed likely to end up second. But on the penultimate fourth stage, which had a steep uphill finish, Team Sky worked hard and dropped all of Contador's Tinkoff-Saxo teammates as the leaders reached the final climb. After some punchy moves by his support riders, Froome began a solo attack. For a short time Contador was able to follow, but he soon fell away. Froome won the stage and was able to open a 29-second gap on second-place Contador by the finish line, enough to overcome his deficit and take the overall race lead by two seconds. The final fifth stage was relatively flat, with no likely chance for Contador to make up his deficit, allowing Froome to collect his first stage race victory since May 2014. This was the third year in a row that Froome won his season opener stage race. For the second year in a row, Froome did not start Tirreno–Adriatico, due to a chest infection. He participated in the La Flèche Wallonne but crashed badly, ruling him out of a victory. Still, after some time to regain his wits, he remounted and soldiered on to finish 123rd, at 12:19. He later participated in the Tour de Romandie in hopes of winning it for the third year in a row, but had to settle for third place in the general classification after winner Ilnur Zakarin and second-place Simon Spilak, both of Team Katusha. In June, he was in full preparation for the Tour de France as he participated to the Critérium du Dauphiné. He won stage seven, the queen stage, thanks to two consecutive attacks on the last climb of the day, one to shed the leading group and another one to get rid of Tejay van Garderen, who had resisted the first one. On the stage, he repeated the exploit of winning solo while putting enough time into van Garderen to win the overall classification as well. Froome entered the Tour de France as one of the favourites for the overall win. After a strong performance on the Mur de Huy Froome took over the race lead by one second from Tony Martin, although he subsequently lost the jersey to Martin on stage four to Cambrai. Following Martin's retirement from the race with a broken collar bone sustained in a crash near the end of stage six Froome was promoted to race leader, but declined to wear the yellow jersey during stage seven. During the evening of the first rest day of the Tour, it emerged that the team had had some of Froome's data files hacked and released onto the internet. As the Tour entered the second week of racing stage ten saw the first mountains stage, the summit finish of La Pierre Saint-Martin, where Froome would go on to take the stage win, putting significant time into his general classification rivals. During the remainder of the race the team faced intense scrutiny regarding their dominant performances; Porte was punched in the ribs by a spectator in the Pyrenees, and Froome claimed he had urine thrown at him by another spectator, who Froome described as 'clearly French', and levelled his blame for the poor spectator behaviour on the press for 'irresponsible journalism'. Team Sky then released some of Froome's power data from stage ten in an attempt to calm claims of blood or mechanical doping. Froome maintained his lead during the final week's Alpine mountain stages, although he lost 32 seconds to Quintana, who had emerged as his principal rival, on the penultimate mountain stage to La Toussuire, and another 86 seconds on the final summit finish on Alpe d'Huez, giving him a lead of 72 seconds over Quintana in the general classification. In addition to winning the race overall he clinched the mountains classification. In August, Froome confirmed that he would follow up his Tour win by riding in the Vuelta a España. Froome lost time on his rivals on the first summit finishes, though he gained back some time on the summit finish of stage nine. Stage eleven was a mountainous stage in Andorra that Froome had described as "the toughest Grand Tour stage I’ve ever done". He crashed into a wooden barrier on the approach to the first climb of the day; he continued to the end of the stage, though he lost significant time on all his rivals. The following morning, an MRI scan revealed that he had broken his foot in the crash and he withdrew from the Vuelta. Froome was appointed Officer of the Order of the British Empire (OBE) in the 2016 New Year Honours for services to cycling. Before the 2016 season, Sky announced that Froome would attempt an unprecedented triple goal: the Tour, as well as the time trial and road race at the Olympics. Froome started the season early, competing in the 2016 Herald Sun Tour in Australia (a race in which he had finished fourth in 2008). The Herald Sun Tour consisted of a short individual time trial prologue, followed by four stages. On the last stage, which culminated in a triple climb of Arthurs Seat and a summit finish, Froome broke away in a solo attack on the third and final ascent, and opened up a sufficient gap on the field to secure his first 2016 victory, along with the King of the Mountains award. Froome's next racing appearance was at the Volta a Catalunya in late March, where he finished eighth overall. He subsequently competed at the Tour de Romandie, which brought mixed results. On the second stage, he punctured on a climb 20 km from the end and finished 17 minutes down on stage winner and new race leader Nairo Quintana. However, on stage four, the queen stage, he and Tejay van Garderen attacked from the bunch to join the day's original breakaway; the pair then rode away on the final climb, and Froome distanced van Garderen with 7.4 km to go, holding on to win the stage with a four-second lead over the leader's group. In June, as preparation for the Tour de France, he took part in the Critérium du Dauphiné, which he won by 12 seconds over Romain Bardet of AG2R La Mondiale. This was Froome's third victory at the Dauphiné over the last four years. On Stage 8 of the 2016 Tour de France, Froome attacked on the descent of the Col de Peyresourde and held off the leading group of GC contenders to take a solo victory in Bagnères-de-Luchon. By doing so, Froome took the Yellow Jersey, leading the race by 16 seconds over Adam Yates (Orica–BikeExchange). Following the stage, Froome received a fine of 200 Swiss Francs for elbowing a spectator in the face who had run alongside him during the ascent of the Col de Peyresourde. He further surprised people on stage 11 to Montpellier when he finished second in a sprint to Peter Sagan, after being part of a 4-man break in the final 12 kilometers after the peloton split due to crosswinds. On Stage 12, on the ascent up Mont Ventoux, Froome collided with Richie Porte and Bauke Mollema and a motorbike after spectators on the road forced the motorbike to stop. Porte and Mollema continued riding, while Froome ditched his bike and continued on foot until receiving a replacement bike from his team car. He finished the race 1 minute and 40 seconds behind Mollema, but was awarded the same time as Mollema after a jury decision, and retained the yellow jersey. He followed with superb results in both of the individual time trials with a second-place finish on stage 13 and winning stage 18. Froome went on to claim his third Tour de France victory on 24 July 2016, and became Britain's first ever three-time winner of the race. He followed his Tour win with a bronze medal at the 2016 Rio Olympics, during the Men's Time Trial event, repeating his bronze medal success from London 2012. After the Olympics he was named in the start list for the 2016 Vuelta a España, during which he helped the team win the opening team time trial and later won stage 11 on Peña Cabarga, the site of his first Grand Tour victory in 2011. He lost over 2 and a half minutes on stage 15 when rivals Nairo Quintana and Alberto Contador attacked together from kilometre 10 and blew the race apart, isolating him from his teammates. However, Froome continued to fight on and managed to gain back nearly all he had lost in a dominant victory on the stage 19 individual time trial to Calp. He finished the Vuelta in second overall, only 1:23 back of Quintana, earning his second Grand Tour podium of the season. Froome won his fourth Tour de France title on 23 July 2017. He beat Rigoberto Urán by 54 seconds. Although Froome never won a stage during the 2017 Tour or any prior race during that calendar year, he was victorious thanks to his exceptional time trialing abilities showcased on the Grand Depart in Düsseldorf and on stage 20 in Marseille. On 19 August, Froome started the Vuelta a España aiming to win it having finished 2nd on three occasions previously and had gone in as the overwhelming favourite. On stage 3 Froome attacked up the final climb with only Esteban Chaves able to follow him. However, they were pegged back on the descent and Vincenzo Nibali won the stage in the reduced sprint. Froome finished 3rd and the bonus seconds at the line plus those he picked up at the intermediate sprint were enough to see him take the red jersey for the first time since 2011. He went on to win stage 9 at Cumbre del Sol (the same finish where he lost to Dumoulin in 2015), also taking the lead in the points classification in the process. Despite a crash on stage 12, he recaptured the lead in the points classification with a 5th-place finish on stage 15 to Sierra Nevada and won the stage 16 individual time trial at Logroño, also taking the stage's combativity prize. A third-place finish on the Alto de l'Angliru cemented the red jersey as well as the combination classification, and in a thrilling finish on the sprint stage at Madrid, held on to win the points classification by 2 points over Matteo Trentin. With the victory, Froome became the first British rider to win the Vuelta, the third man to successfully complete the Tour-Vuelta double in the same year joining Jacques Anquetil and Bernard Hinault, and the first man to achieve the feat since the Vuelta moved to its current position on the racing calendar. He then competed at the 2017 UCI Road World Championships in Bergen only about a week after his Vuelta victory and won two bronze medals: one in the men's team time trial with Team Sky, the other in the men's individual time trial for Great Britain. On 17 October 2017, he won his third Vélo d'Or award as the best rider of the 2017 season. Following the leaking of test results to the Guardian and Le Monde newspapers, the newspaper article stated that ' [this] ...threatens to damage his reputation as one of Britain's most successful athletes.' His team were asked to explain the high levels of the drug revealed in the test, and if not adequately explained it would have resulted in a ban from the sport. His case has been widely criticised by fellow cyclists and in January 2018 UCI president David Lappartient recommended that he was suspended by Team Sky until his case was resolved. In February 2018 David Brailsford defended Froome saying "For me, there's no question, he's done nothing wrong – no question, no question, no question." He went on to say that he believed Froome was innocent and that he felt the case shouldn't have been made public. On 2 July 2018, the UCI officially closed the investigation into Froome, stating that the rider had supplied sufficient evidence to suggest that "Mr Froome's sample results do not constitute an AAF". On 29 November 2017, Froome announced that he intended to participate in the 2018 Giro d'Italia in an attempt to complete the Giro-Tour double, marking his first start in the race since 2010. A win would make him the seventh rider to win all three Grand Tours, and the third rider to hold all three Grand Tour titles simultaneously in a single 12-month period. On 5 February 2018, Froome announced he would start his season with an entry into the Vuelta a Andalucía (Ruta del Sol), despite calls for him not to race until his case was resolved. However, there were also signs of support for Froome, with Ruta del Sol organiser Joaquin Cuevas claiming it to be "a pleasure and an honour" to have Froome in the race, and Mauro Vegni, the organiser of the Giro d’Italia, commenting that 'If he [Froome] wins the pink jersey, he’ll always be the winner for me'. Cyclingnews also reported that Froome would be likely to compete in two Italian pre-Giro stage races: Tirreno-Adriatico and the Tour of the Alps. Froome (right) on the Colle delle Finestre on Stage 19 of the 2018 Giro d'Italia shortly before his decisive solo attack. Froome entered the 2018 Giro d'Italia as one of the favourites to take the overall victory in Rome at the end of May. Once at the start of the Giro d'Italia, he was he would be cleared of his offences. However, before the race could even begin Froome crashed whilst performing a recon of the opening time trial in Jerusalem. Froome would finish the time trial in 21st place, ceding 35 seconds to overall rival Tom Dumoulin. After the race, Team Sky directeur sportif Nicolas Portal admitted that the injury Froome sustained in the crash was worse that they had stated at the time, and Brailsford said that the crash was a setback to Froome's physical condition, which the team felt was below the required level at the start of the Giro. By the end of the first summit finish on Mount Etna, Froome had risen to eighth overall, one minute and 10 seconds behind early race leader Simon Yates. On stage 8, Froome fell on his injured side when his rear wheel slid on a wet climb. By the end of stage 9 to Gran Sasso d'Italia, Froome had lost a further one minute and 17 seconds to Yates, dropping to 11th overall. Stage 10 could have also proven ominous when afterwards he admitted to feeling pain and an imbalance between his legs; and was glad to maintain his position. Froome's first signs of recovery came through on the most difficult climb of the race to that point, Monte Zoncolan, where he distanced all of his main overall rivals, taking the stage win. Froome's deficit to the maglia rosa was now 3'10". However, on the final climb of the following stage to Sappada Froome cracked, yielding more than a minute to the other main general classification contenders. Overall, Froome lay 4'52" from Yates, the leader, 2'41" from Domoulin, 2'24" from Domenico Pozzovivo and 2'15" from Thibaut Pinot. Froome's fortune began to change as the race entered the third week, with a strong performance in the 34 km, Stage 16 time trial – from Trento to Rovereto – finishing fifth on the stage, rising to fourth overall and moving to within four minutes of Yates. On stage 18 to Prato Nevoso Yates displayed the initial signs of weakness, cracking on the final slopes of the summit finishes and losing 28 seconds to all of his other general classification rivals. Stage 19 of the race had been classified as the 'queen stage' of the race, with three focused climbs in the latter half of the stage. These included the half paved-half gravel climb of the Colle delle Finestre, followed by the climb to Sestriere and the final uphill finish to Bardonecchia. On the evening before the stage, Team Sky's management decided that Finestre would be the ideal place to put pressure on Yates: if a team rode hard on the front, its 27 hairpin turns would create a concertina effect in the peloton, making it difficult for riders behind to follow, and forcing teams to shed their domestiques. Froome then planned to attack Dumoulin on the 8 km gravel section at the top of the climb. To ensure that Froome would be able to obtain the nutrition necessary to sustain such a long-range attack without carrying extra weight, the team commandeered all its staff at the race including Brailsford and Ellingworth themselves to ensure there were feeding stations every ten minutes up the Finestre. On the stage itself, the early breakaway, which included Froome's teammates Sergio Henao and David de la Cruz, was closed down by Yates' Mitchelton–Scott team just before the Finestre. Sky's climbing train set an extremely high tempo at the beginning of the climb: with Yates in difficulty on its lower slopes and with 80 km left of the stage, Froome launched a solo attack. Froome's advantage grew throughout the second half of the stage, culminating in him taking the stage honours. Importantly, a stage victory of more than three minutes which included picking up three bonus seconds at the second intermediate sprint in Pragelato resulted in Froome taking the overall race lead, 40 seconds ahead of the 2017 Giro d'Italia victor, Tom Domoulin. Taking the maximum amount of points on all three of the remaining climbs on the stage (Finestre, Sestriere and the Jafferau), Froome also moved into the lead in the mountains classification. His solo attack was likened to famous historical performances such as Fausto Coppi to Pinerolo in 1949, Claudio Chiappucci to Sestriere in 1992, Marco Pantani on the Galibier in 1998, Floyd Landis's long range attack to Morzine, and Michael Rasmussen to Tignes in 2007. Froome held on to the maglia rosa on the final 'true' day of racing for the GC, neutralizing several attacks by Dumoulin in the final kilometers before launching a counter-attack of his own, putting an additional 6 seconds into his rival at the finish line at Cervinia. Froome took victory in the 2018 Giro d'Italia making him the first British rider to win the overall title, the first rider since 1983 to hold all three Grand Tour titles simultaneously, as well as becoming the seventh man to have completed the career Grand Tour grand slam. He then went into the 2018 Tour de France as one of the main favorites for victory despite the mostly negative reactions from some fans. Crashing twice on stages 1 and 9 as well as looking vulnerable on several other stages, Froome then shifted his focus on helping his friend and longtime teammate Geraint Thomas in a super-domestique role. Thanks to a phenomenal[according to whom?] performance in the penultimate day time trial to Espelette, Froome finished third overall behind Thomas. Despite being defending champion of the Vuelta, Froome decided to skip the 2018 edition having ridden four consecutive Grand Tours. He instead rode the 2018 Tour of Britain in service of Wout Poels, a thank-you gesture to the teammate who had been there at his side for four of his six Grand Tour wins. It was the last race of his 2018 season, electing to skip the World Championships in Austria citing physical as well as mental fatigue to be the main reasons behind his decision. On 1 January 2019, Froome announced that he would not be defending his title at the Giro d'Italia, instead focusing on the 2019 Tour de France with the aim of winning the race for the fifth time. He started his season at Tour Colombia in February, and also rode the Volta a Catalunya in support of Egan Bernal. He has added the Tour of the Alps to his program, having already confirmed his participation in the Tour de Yorkshire prior to returning to the Critérium du Dauphiné. Froome has also confirmed that he will participate in the 2019 World Championships in Yorkshire in the fall. Froome was made an Officer of the Order of the British Empire (OBE) in the 2016 New Year Honours for services to cycling. Froome is currently an ambassador of the United for Wildlife conservation project. His bikes since stage 13 of the 2015 Tour have a rhino graphic on the top tube as a way to show awareness for the plight of the animal, also as an homage to his African roots. In 2017, he was named the ambassador of the Palace to Palace charity ride in support of The Prince's Trust as well as a Global Ambassador for Best Buddies, an organization based in Miami helping people with intellectual disabilities. Since winning his first Tour de France title in 2013, doubts over Froome's performances were raised by various experts, including former Festina coach Antoine Vayer. These allegations were based mainly on his sudden transformation from a relatively unknown rider to a Grand Tour winner, following his breakthrough performance in the 2011 Vuelta. After his dominant showing in the first mountain stage of 2015 Tour, the suspicions increased even further. In an attempt to answer these questions, Froome promised to undergo independent physiological testing soon after finishing the Tour. The test, arranged by Froome himself, took place shortly before the start of the Vuelta, on 17 August 2015, in the GlaxoSmithKline Human Performance lab in London. Several tests were carried to determine his maximum sustainable power for 20–40 minutes (threshold power), level of maximum oxygen consumption (VO2 max) and his peak power. Froome's peak power was measured at 525 W; his peak 20–40-minute power, at 419 W, corresponds to 79.8 percent of the maximum. At his current weight of 69.9 kg (154 lb) (of which 9.8% was body fat) at the time of test, this corresponds to a figures of 7.51 and 5.98 W/kg respectively. His maximum oxygen uptake was measured at 84.6 ml/kg/min. At the time, he was reportedly almost 3 kg (6.6 lb) heavier compared to his Tour weight of 67 kg (148 lb). Using this number, the VO2 max figure would translate to approximately 88.2 ml/kg/min. He also released results from a previous test, carried out in 2007 while being part of the UCI development programme. The 2007 test measured his peak power at 540 W, the threshold power at 420 W and the maximum oxygen uptake of 80.2 ml/kg/min, at a weight of 75.6 kg (167 lb). Froome and his wife have stated that, after cutting down on carbs and beginning to eat more proteins and healthy fats, he lost 20 pounds (9.07 kg) and his weight loss has allowed him to "thrive on the bike, especially in the mountains". Froome uses special non-round chainrings. ^ a b c "No. 61450". The London Gazette (Supplement). 30 December 2015. p. N12. ^ a b "Chris Froome leads Tour of Oman after second place in stage". BBC Sport. BBC. 14 February 2013. Retrieved 21 February 2013. ^ a b c "Chris Froome". Team Sky. BSkyB. Retrieved 4 June 2017. ^ "Chris Froome". ProCyclingStats. Retrieved 4 June 2017. ^ a b c d Chadband, Ian (27 June 2013). "The incredible rise of Chris Froome – and how he was almost killed by a hippo". The Daily Telegraph. Telegraph Media Group. Retrieved 28 June 2013. ^ a b Gallagher, Brendan (11 July 2012). "Chris Froome at the top as the race hits high notes in cruel mountain stages". The Daily Telegraph. Telegraph Media Group. Retrieved 24 August 2012. ^ Thomas, Steve (23 November 2011). "Underdog no more, Chris Froome hopes for a bit more liberty in 2012". VeloNews. Competitor Group, Inc. Retrieved 23 November 2011. ^ Fotheringham, Alasdair (13 July 2012). "Chris Froome zooms from riding with lions to pride of pack". The Independent. Independent Print. Retrieved 30 June 2013. ^ "BBC Radio 4 - Inheritance Tracks, Chris Froome". BBC. Retrieved 23 November 2018. ^ a b c d e f Bradford, D. (2018, December 6). The Mentor: David Kinjah. Cycling Weekly, pp. 8-10. ^ Fordyce, Tom. "Chris Froome: The making of a Tour de France champion". BBC Sport. Retrieved 6 June 2014. ^ McCallum, Kevin (28 June 2013). "Froome goes from St John's to Sky". Independent Online. Independent News & Media. Retrieved 1 July 2013. ^ a b Ingle, Sean (29 June 2013). "Chris Froome confident he can pull off victory in the Tour de France". theguardian.com. Guardian Media Group. Retrieved 30 June 2013. ^ Dickson, M. D. (16 September 2011). "Weekly Circular" (PDF). The Banda School. p. 1. Archived from the original (PDF) on 4 January 2014. Retrieved 22 July 2013. ^ Shapshak, Toby (15 February 2013). "Chris Froome aims to sweep clean at Tour". Mail & Guardian. Retrieved 30 August 2015. ^ a b c McRae, Donald (22 June 2013). "Chris Froome: Shaped in Africa and ripe for Tour de France win". The Observer. Guardian Media Group. Retrieved 30 June 2013. ^ "Newsletter" (PDF). St John's College. December 2011. Archived from the original (PDF) on 4 January 2014. Retrieved 17 August 2012. ^ a b Hood, Andrew (15 September 2011). "Chris Froome: Out of Africa and onto the Vuelta podium". VeloNews. Competitor Group, Inc. Retrieved 29 June 2013. ^ Slater, Matt (19 June 2013). "Tour de France: Chris Froome on bid to emulate Bradley Wiggins". BBC Sport. BBC. Retrieved 1 July 2013. ^ Shapshak, Toby (15 February 2013). "Chris Froome aims to sweep clean at Tour". Mail & Guardian. Anastacia Martin. Retrieved 21 April 2013. ^ "The Big Interview: Chris Froome". Cycling Weekly. IPC Media. 3 June 2008. Retrieved 28 June 2013. ^ Hood, Andrew (10 June 2013). "The story of Brailsford's Froome discovery dates back to 2006". VeloNews. Competitor Group, Inc. Retrieved 28 February 2015. ^ Farrand, Stephen (26 June 2013). "Chris Froome: From cycling slum dog to Monte Carlo millionaire". Cyclingnews.com. Future plc. Retrieved 30 June 2013. ^ "2006 UCI Road World Championships, Salzburg, Austria". Cyclingnews.com. Future plc. September 2006. Retrieved 4 July 2012. ^ "The smartest career move that Tour de France winner Chris Froome ever made was posing as someone else". Business Insider. Retrieved 31 May 2017. ^ a b c Westby, Matt (22 July 2013). "Tour de France: Chris Froome's journey up cycling's ranks comes to glorious end in Paris". Sky Sports. BSkyB. Retrieved 24 July 2013. ^ "Froome – a product of the WCC". Union Cycliste Internationale. 23 July 2013. Archived from the original on 24 July 2013. Retrieved 24 July 2013. ^ "Young Guns News Roundup #16D". Daily Peloton. 1 May 2007. Archived from the original on 19 April 2013. Retrieved 24 July 2013. ^ Gutowski, Stephanie (29 May 2007). "11th Tour of Japan – Stage 6 Recap". Daily Peloton. Archived from the original on 19 October 2007. Retrieved 23 January 2015. ^ "2007 UCI B World Championships". Union Cycliste Internationale. Archived from the original on 28 March 2010. Retrieved 23 January 2015. ^ "World Championship, Road, ITT, Elite B 2007". Cycling Archives. de Wielersite. Retrieved 24 July 2013. ^ "All African Games, Road 2007". Cycling Archives. de Wielersite. Retrieved 24 July 2013. ^ "Time Trial U23 Men results" (PDF). Union Cycliste Internationale. p. 2. Archived from the original (PDF) on 1 November 2013. Retrieved 24 July 2013. ^ "South African George wins time trial". Cyclingnews.com. Future plc. 8 March 2008. Archived from the original on 16 April 2014. Retrieved 23 January 2015. ^ a b c "Froome takes cycling's big step". Cyclingnews.com. Future plc. 21 November 2008. Retrieved 23 July 2013. ^ "2008 Standings". Tour de France. Amaury Sport Organisation. Archived from the original on 11 October 2012. Retrieved 12 July 2012. ^ Canning, Andrew (20 October 2008). "Monday's British news round-up". Cycling Weekly. IPC Media. Retrieved 24 July 2013. ^ "Team Barloworld's Froome opens his account at the Giro del Capo". VeloNation. 5 March 2009. Retrieved 24 July 2013. ^ "2009 Giro d'Italia results". Cyclingnews.com. Future plc. 31 May 2012. Retrieved 17 August 2012. ^ "[RSA] Anatomic Jock Race 2009". Cycling Archives. de Wielersite. Retrieved 24 July 2013. ^ "Foreign stars sign for Team Sky". BBC Sport. BBC. 10 September 2009. Retrieved 10 September 2009. ^ a b Farrand, Stephen (28 May 2010). "Team Sky's Chris Froome expelled from Giro". Cyclingnews.com. Future plc. Retrieved 18 July 2013. ^ Brown, Gregor (29 May 2010). "Chris Froome disqualified from Giro d'Italia". Cycling Weekly. IPC Media. Retrieved 24 June 2013. ^ "2010 Tour du Haut Var results". BikeRaceInfo. 21 February 2010. Retrieved 17 August 2012. ^ "2010 British Time Trial Championships". British Cycling. 5 September 2010. Retrieved 17 August 2012. ^ "Millar takes time trial gold in Delhi". Cyclingnews.com. Future plc. 13 October 2010. Retrieved 13 February 2013. ^ "Tour de Suisse". Team Sky. BSkyB. June 2011. Archived from the original on 29 June 2012. Retrieved 4 July 2012. ^ Fotheringham, Alasdair (29 August 2011). "Wiggins: A fantastic finish". Cycling Weekly. IPC Media. Retrieved 29 August 2011. ^ "Vuelta Stage 10 Time Trial by Chris Froome". TrainingPeaks. Retrieved 3 December 2015. ^ Lowe, Felix (31 August 2011). "Moncoutie on song as Wiggins takes red". Yahoo! Eurosport. TF1 Group. Archived from the original on 8 December 2015. Retrieved 4 July 2012. ^ McGrath, Andy (31 August 2011). "Wiggins takes Vuelta overall lead as Moncoutie wins stage". Cycling Weekly. IPC Media. Retrieved 24 March 2013. ^ MacLeary, John (3 September 2011). "Bradley Wiggins tightens grip on overall lead after Rein Taaramae wins on mountain top". The Daily Telegraph. Telegraph Media Group. ^ Turner, Jonathan (4 September 2011). "Froome and Wiggins second and third on GC". Sky Sports. BSkyB. Retrieved 24 March 2013. ^ "Chris Froome wins Vuelta a España 17th stage". BBC Sport. BBC. 7 September 2011. Retrieved 12 July 2012. ^ Bull, Nick (11 September 2011). "Froome and Wiggins finish on Vuelta podium". Cycling Weekly. IPC Media. Retrieved 4 July 2012. ^ a b Hood, Andrew (16 July 2013). "Still living with bilharzia parasite, Froome says he has no drug exemptions". VeloNews. Competitor Group, Inc. Retrieved 24 July 2013. ^ a b "Froome still battling parasitic infection". Cyclingnews.com. Future plc. 25 April 2012. Retrieved 28 June 2013. ^ Drisdelle, Rosemary. "Chris Froome's Parasite – What is Bilharzia Anyway?". Decoded Science. Retrieved 24 July 2013. ^ "Chris Froome extends contract with Team Sky". BBC Sport. BBC. 16 September 2011. Retrieved 24 March 2013. ^ Gladstone, Hugh (25 September 2011). "Mark Cavendish wins World Road Race Championship". Cycling Weekly. IPC Media. Retrieved 12 July 2012. ^ "Tony Martin wins first-ever Tour of Beijing". China Daily. 10 October 2011. Retrieved 12 July 2012. ^ Bull, Nick (31 May 2012). "Froome the fighter". Cycling Weekly. IPC Media. Retrieved 8 June 2012. ^ "Froome hits pedestrian in Italian training accident". Cyclingnews.com. Future plc. 13 March 2012. Retrieved 8 June 2012. ^ "Wiggins crowned in Romandie". Team Sky. BSkyB. 4 May 2012. Archived from the original on 20 October 2012. Retrieved 28 June 2013. ^ Gallagher, Brendan (21 June 2012). "Team Sky confirm team that will support Bradley Wiggins and Mark Cavendish in pursuit of yellow and green". The Daily Telegraph. Telegraph Media Group. Retrieved 28 June 2013. ^ "Prologue – Liège > Liège". Tour de France. Amaury Sport Organisation. 30 June 2012. Archived from the original on 16 April 2014. Retrieved 28 June 2013. ^ Gallagher, Brendan (1 July 2012). "Peter Sagan wins first stage in sprint finish as Fabian Cancellara retains yellow jersey". The Daily Telegraph. Telegraph Media Group. Retrieved 28 June 2013. ^ Gallagher, Brendan (3 July 2012). "Peter Sagan wins stage three as Team Sky's Bradley Wiggins retains second place overall". The Daily Telegraph. Telegraph Media Group. Retrieved 28 June 2013. ^ Westemeyer, Susan (7 July 2012). "Froome leads double Sky success on La Planche des Belles Filles". Cyclingnews.com. Future plc. Retrieved 8 July 2012. ^ Robinson, Mark (8 July 2012). "Pinot rides to glory in Porrentruy". Cyclingnews.com. Future plc. Retrieved 8 July 2012. ^ "Bradley Wiggins strengthens grip on yellow jersey". BBC Sport. BBC. 9 July 2012. Retrieved 10 July 2012. ^ Ryan, Barry (12 July 2012). "Froome breaks from the script at La Toussuire". Cyclingnews.com. Future plc. Retrieved 12 July 2012. ^ Rodrigues, Jason (14 July 2012). "Tour de France 2012: domestique bliss for Team Sky's Chris Froome". theguardian.com. Guardian Media Group. Retrieved 16 July 2012. ^ Atkins, Ben (19 July 2012). "Tour de France: Alejandro Valverde climbs alone to Peyragudes victory on stage 17". VeloNation. Retrieved 27 July 2012. ^ Gallagher, Brendan (19 July 2012). "Team Sky's Chris Froome looks to future after sacrificing victory for Bradley Wiggins". The Daily Telegraph. Telegraph Media Group. Retrieved 27 July 2012. ^ "Bradley Wiggins on verge of first British win". BBC Sport. BBC. 21 July 2012. Retrieved 17 August 2012. ^ "Bradley Wiggins wins 2012 Tour de France". BBC Sport. BBC. 22 July 2012. Retrieved 17 August 2012. ^ "Millar Selected For Team GB Olympic Road Race Team". Cyclingnews.com. Future plc. 4 July 2012. Retrieved 27 July 2012. ^ "Men's road cyclists selected to Team GB for London 2012 Olympics". British Cycling. 4 July 2012. Retrieved 27 July 2012. ^ Wynn, Nigel (1 August 2012). "Wiggins wins gold in men's time trial, bronze for Froome". Cycling Weekly. IPC Media. Retrieved 1 August 2012. ^ "Olympic medallist Chris Froome leads Team Sky at Vuelta". BBC Sport. BBC. 16 August 2012. Retrieved 17 August 2012. ^ Bull, Nick (20 August 2012). "Valverde victorious as Vuelta GC has first shakedown". Cycling Weekly. IPC Media. Retrieved 22 August 2012. ^ Gladstone, Hugh (21 August 2012). "Rodriguez takes over lead after Valverde crashes". Cycling Weekly. IPC Media. Retrieved 22 August 2012. ^ Gallagher, Brendan (29 August 2012). "Alberto Contador leapfrogs Chris Froome to close in on Joaquim Rodríguez". The Daily Telegraph. Telegraph Media Group. Retrieved 13 September 2012. ^ McGrath, Andy (30 August 2012). "Rodriguez wins stage 12 to extend Vuelta lead". Cycling Weekly. IPC Media. Retrieved 13 September 2012. ^ "Alberto Contador wins second Vuelta a España title". BBC Sport. BBC. 9 September 2012. Retrieved 13 September 2012. ^ Gallagher, Brendan (15 February 2013). "Chris Froome claims stage win to retain leader's red jersey". The Daily Telegraph. Telegraph Media Group. Retrieved 15 February 2013. ^ Wynn, Nigel (16 February 2013). "Chris Froome wins the Tour of Oman". Cycling Weekly. IPC Media. Retrieved 16 February 2013. ^ Brown, Gregor (9 March 2013). "Chris Froome wins Tirreno-Adriatico stage four". Cycling Weekly. IPC Media. Retrieved 12 March 2013. ^ "Team Sky's Chris Froome beaten into second place by Astana's Vincenzo Nibali". The Daily Telegraph. Telegraph Media Group. 12 March 2013. Retrieved 12 March 2013. ^ Wynn, Nigel (24 March 2013). "Chris Froome takes final stage and overall win in Criterium International". Cycling Weekly. IPC Media. Retrieved 24 March 2013. ^ Wynn, Nigel (23 April 2013). "Chris Froome wins Tour de Romandie prologue". Cycling Weekly. IPC Media. Retrieved 23 April 2013. ^ Puddicombe, Stephen (27 April 2013). "Simon Spilak wins Tour de Romandie stage four as Chris Froome extends lead". Cycling Weekly. IPC Media. Retrieved 30 November 2015. ^ "Simon Spilak wins stage 4 of 2013 Tour de Romandie; Chris Froome defends overall". VeloNews. Competitor Group, Inc. 27 April 2013. Retrieved 30 November 2015. ^ Puddicombe, Stephen (28 April 2013). "Chris Froome wins Tour de Romandie". Cycling Weekly. IPC Media. Retrieved 21 July 2013. ^ Puddicombe, Stephen (31 May 2013). "Critérium du Dauphiné 2013: Who will win?". Cycling Weekly. IPC Media. Retrieved 28 June 2013. ^ Farrand, Stephen (5 June 2013). "Martin continues time trial winning streak in Dauphiné". Cyclingnews.com. Future plc. Retrieved 6 June 2013. ^ Devaney, Jason (6 June 2013). "Busche nearly nails Dauphine stage win at Valmorel". VeloNews. Competitor Group, Inc. Retrieved 6 June 2013. ^ "Chris Froome leads Dauphine as Sammy Sanchez wins stage seven". BBC Sport. BBC. 8 June 2013. Retrieved 8 June 2013. ^ Fotheringham, William (9 June 2013). "Chris Froome seals Critérium du Dauphiné victory in Risoul rain". theguardian.com. Guardian Media Group. Retrieved 9 June 2013. ^ "Chris Froome wins Criterium du Dauphine ahead of Tour de France". BBC Sport. BBC. 9 June 2013. Retrieved 9 June 2013. ^ Westby, Matt (30 June 2013). "Marcel Kittel takes yellow as stage-one chaos costs Mark Cavendish". Sky Sports. BSkyB. Retrieved 16 July 2013. ^ Westby, Matt (6 July 2013). "Chris Froome wins stage eight and takes yellow jersey in Pyrenees". Sky Sports. BSkyB. Retrieved 16 July 2013. ^ "Chris Froome in yellow after stage win". BBC Sport. BBC. 6 July 2013. Retrieved 16 July 2013. ^ Brown, Gregor (7 July 2013). "Daniel Martin wins Tour de France stage nine as Chris Froome fights to retain lead". Cycling Weekly. IPC Media. Retrieved 16 July 2013. ^ Fotheringham, William (10 July 2013). "Chris Froome extends lead over yellow jersey rivals in Tour de France 2013". theguardian.com. Guardian Media Group. Retrieved 16 July 2013. ^ "How Froome was outmanoeuvred". Yahoo! Eurosport. TF1 Group. 12 July 2013. Archived from the original on 8 December 2015. Retrieved 16 July 2013. ^ "Chris Froome wins stage 15 to extend lead". BBC Sport. BBC. 14 July 2013. Retrieved 16 July 2013. ^ "Chris Froome defends yellow from the front on Mont Ventoux". VeloNews. Competitor Group, Inc. 14 July 2013. Retrieved 16 July 2013. ^ "Chris Froome wins time trial to extend Tour de France lead". BBC Sport. BBC. 17 July 2013. Retrieved 17 July 2013. ^ Fotheringham, William (20 July 2013). "Chris Froome on verge of Tour de France glory after penultimate stage". The Observer. Guardian Media Group. Retrieved 20 July 2013. ^ a b c "Tour de France: Chris Froome wins 100th edition of race". BBC Sport. BBC. 21 July 2013. Retrieved 21 July 2013. ^ Wynn, Nigel (23 July 2013). "Chris Froome tops latest UCI WorldTour ranking". Cycling Weekly. IPC Media. Retrieved 24 July 2013. ^ "Chris Froome: Tour de France leader 'sad' at doping questions". BBC Sport. BBC. 15 July 2013. Retrieved 21 July 2013. ^ "Tour de France: Chris Froome's data offered to Wada by Brailsford". BBC Sport. BBC. 18 July 2013. Retrieved 21 July 2013. ^ a b Wynn, Nigel (30 October 2013). "Chris Froome wins 2013 Velo d'Or award". Cycling Weekly. Time Inc. UK. Retrieved 30 October 2013. ^ Puddocombe, Stephen (23 February 2014). "Chris Froome wins 2014 Tour of Oman". Cycling Weekly. IPC Media. ^ a b "Froome withdraws from Tirreno-Adriatico". Cyclingnews.com. Immediate Media Company. Retrieved 30 November 2015. ^ Farrand, Stephen (4 May 2014). "Froome dominates the final time trial". Cyclingnews.com. Future plc. Retrieved 4 May 2014. ^ "Chris Froome cycles through the Channel Tunnel". The Daily Telegraph. Telegraph Media Group. 7 July 2014. Retrieved 3 March 2015. ^ De Graaf, Mia (7 July 2014). "Are you sure this is the right way Chris? Tour de France favourite Froome becomes the first person ever to cycle UNDER the sea from England to France in channel tunnel". Daily Mail. DMG Media. Retrieved 3 March 2015. ^ "Chris Froome abandons Tour de France after defending champion and Team Sky leader crashes for third time in two days". Daily Mail. DMG Media. 9 July 2014. Retrieved 10 July 2014. ^ Benson, Daniel (2 September 2014). "Vuelta a España: Quintana crashes out of race lead in time trial". Cyclingnews.com. Future plc. Retrieved 13 September 2014. ^ Wynn, Nigel (13 September 2014). "Alberto Contador wins final Vuelta a España mountain test". Cycling Weekly. Time Inc. UK. Retrieved 13 September 2014. ^ Cossins, Peter (14 September 2014). "Contador seals overall 2014 Vuelta a España victory". Cyclingnews.com. Future plc. Retrieved 14 September 2014. ^ Fotheringham, Alasdair (18 February 2015). "Vuelta a Andalucia: Froome loses time to Contador in first showdown". Cyclingnews.com. Immediate Media Company. Retrieved 30 November 2015. ^ "Froome happy despite losing to Contador at Vuelta a Andalucia". Cyclingnews.com. Immediate Media Company. 20 February 2015. Retrieved 30 November 2015. ^ "Chris Froome takes lead of Ruta del Sol after beating Contador on stage four". Sky Sports. BSkyB. 21 February 2015. Retrieved 3 December 2015. ^ "Chris Froome beats Alberto Contador to Ruta del Sol title". BBC sport. BBC. 22 February 2015. Retrieved 3 December 2015. ^ a b Fotheringham, Alasdair (22 February 2015). "Froome seals morale boosting victory over Contador in Andalucia". Cyclingnews.com. Immediate Media Company. Retrieved 3 December 2015. ^ "Valverde wins La Fleche Wallonne 2015". Cyclingnews.com. Future plc. 22 April 2015. Retrieved 22 April 2015. ^ O'Shea, Sadhbh (3 May 2015). "Zakarin wins Tour de Romandie". Cyclingnews.com. Future plc. Retrieved 3 May 2015. ^ "Chris Froome eyes Critérium du Dauphiné victory after stage seven win". The Observer. Guardian Media Group. Associated Press. 13 June 2015. Retrieved 14 June 2015. ^ "Froome wins finale and overall title at Critérium du Dauphiné". Cyclingnews.com. Future plc. 14 June 2015. Retrieved 14 June 2015. ^ "Tour de France 2015 – Stage 3". ProCyclingStats. Retrieved 30 November 2015. ^ "Tour de France 2015 – Stage 4". ProCyclingStats. Retrieved 30 November 2015. ^ Clarke, Stuart (10 July 2015). "Chris Froome will not wear the Tour de France yellow jersey". Cycling Weekly. Time Inc. UK. Retrieved 30 November 2015. ^ "Tour de France: Froome's data files believed to be hacked". Cyclingnews.com. Immediate Media Company. 14 July 2015. Retrieved 30 November 2015. ^ "Tour de France 2015 – Stage 10". ProCyclingStats. Retrieved 30 November 2015. ^ "Porte says that he was 'punched' in the Pyrenees". VeloNews. Competitor Group, Inc. 18 July 2015. Retrieved 30 November 2015. ^ Brady, Enda (19 July 2015). "Froome: Spectator Threw Urine In My Face". Sky News. BSkyB. Retrieved 30 November 2015. ^ Cary, Tom (19 July 2015). "Chris Froome maintains lead but French press continue to attack Team Sky". The Daily Telegraph. Telegraph Media Group. Retrieved 30 November 2015. ^ Fletcher, Patrick (24 July 2015). "Sky's release of Froome's Tour de France data fails to clear the air". Cyclingnews.com. Immediate Media Company. Retrieved 30 November 2015. ^ Farrand, Stephen (23 July 2015). "UCI check Froome's bike and five others for hidden motors at Tour de France". Cyclingnews.com. Immediate Media Company. Retrieved 30 November 2015. ^ Fotheringham, William (25 July 2015). "Chris Froome set for Tour de France win despite Nairo Quintana's attack". theguardian.com. Retrieved 26 July 2015. ^ Duff, Alex (26 July 2015). "Chris Froome Wins Tour de France for Second Time in Three Years". Bloomberg.com. Retrieved 26 July 2015. ^ Benson, Daniel (10 August 2015). "Chris Froome on Team Sky's provisional Vuelta a España roster". Cyclingnews.com. Immediate Media Company. Archived from the original on 12 August 2015. Retrieved 10 August 2015. ^ Clarke, Stuart (11 August 2015). "Chris Froome at the Vuelta a España is icing on the cake, says organiser". Cycling Weekly. Time Inc. UK. Retrieved 14 August 2015. ^ Fotheringham, Alasdair (31 August 2015). "Froome's Vuelta a España back on track on Cumbre del Sol". Cyclingnews.com. Immediate Media Company. Retrieved 3 September 2015. ^ "Froome: 'Andorra will be the toughest Grand Tour stage I've ever done'". Cyclingnews.com. Immediate Media Company. 2 September 2015. Retrieved 3 September 2015. ^ "Froome out of the Vuelta a España after checks reveal a fracture in his foot". Cyclingnews.com. Immediate Media Company. 3 September 2015. Retrieved 3 September 2015. ^ "Froome targeting 2016 Tour de France and Rio Olympics double -- Briton aiming for road race and time trial gold medal in Brazil plus third Tour title". Cycling News. 1 October 2015. ^ "Chris Froome wins Jayco Herald Sun Tour". Cycling News. 8 February 2016. ^ Fotheringham, Alasdair (27 March 2016). "Team Sky delighted with Chris Froome progress ahead of Tour de France bid". independent.co.uk. Retrieved 13 May 2016. ^ Windsor, Richard (28 April 2016). "Nairo Quintana takes overall lead at Tour de Romandie as Chris Froome suffers". Cycling Weekly. Retrieved 13 May 2016. ^ Windsor, Richard (30 April 2016). "Chris Froome takes breakaway victory on Tour de Romandie stage four". Cycling Weekly. Retrieved 13 May 2016. ^ "Criterium du Dauphine: Chris Froome wins third title". BBC Sport. Retrieved 13 June 2016. ^ "Tour de France 2016: Chris Froome claims stage win and lead after stage eight". bbc.co.uk. BBC Sport. 9 July 2016. Retrieved 23 July 2017. ^ Telegraph Sport (10 July 2016). "Chris Froome fined for elbowing spectator in face on the way to stage-eight Tour de France victory". The Daily Telegraph. Retrieved 23 July 2017. ^ "Tour de France: Chris Froome forced to run up Mont Ventoux after crash". BBC Sports. BBC. ^ "Chris Froome coasts home as André Greipel wins Tour's final stage". Guardian. 24 July 2016. Retrieved 26 July 2016. ^ "Rio Olympics 2016: Chris Froome wins bronze in men's time trial". BBC. 10 August 2016. Retrieved 10 August 2016. ^ Fotheringham, William (23 July 2017). "Chris Froome wins fourth Tour de France after Champs Élysées procession". The Guardian. ^ "Chris Froome aiming to end 22-year wait for Vuelta a Espana and Tour double". The Guardian. 27 July 2017. Retrieved 11 September 2017. ^ "Chris Froome attacks and takes Vuelta a España lead as Vincenzo Nibali wins stage three". Cycling Weekly. 21 August 2017. Retrieved 11 September 2017. ^ Sky, Team. "Team take third at TTT worlds - Team Sky". www.teamsky.com. ^ Sky, Team. "Froome captures bronze in Worlds TT - Team Sky". www.teamsky.com. ^ "Froome wins 2017 Velo d'Or - Cyclingnews.com". ^ "What is Prohibited". World Anti-Doping Agency. ^ "WADA will not appeal UCI decision in Christopher Froome case". wada-ama.org. World Anti-Doping Agency. 2 July 2018. Retrieved 2 July 2018. ^ "Chris Froome returns adverse analytical finding for Salbutamol". cyclingnews.com. 13 December 2017. Retrieved 13 December 2017. ^ "What the newest salbutamol study means for Froome". cyclist.co.uk. 11 May 2018. Retrieved 11 May 2018. ^ a b c Pitt, V. (2018, December 6). 'Only Real Men Wear Pink': Chris Froome on how confidence in himself, his team and his audacious attack carried him to his most spectacular win yet, at the Giro d'Italia. Cycling Weekly, pp. 12-16. ^ Ingle S., and Kerner M. (13 December 2017). "Chris Froome fights to save career after failed drugs test result". Guardian Newspaper. Retrieved 29 December 2017. ^ "Brailsford: At this moment we totally back Chris Froome | Cyclingnews.com". Cyclingnews.com. Retrieved 2 May 2018. ^ "UCI statement on anti-doping proceedings involving Mr Christopher Froome". uci.org. Union Cycliste Internationale. 2 July 2018. Retrieved 2 July 2018. ^ "Chris Froome confirms Giro d'Italia participation - Cyclingnews.com". ^ "Chris Froome to make season debut at Ruta del Sol | Cyclingnews.com". Cyclingnews.com. Retrieved 2 May 2018. ^ "Director of Ruta del Sol welcomes Chris Froome | Cyclingnews.com". Cyclingnews.com. Retrieved 2 May 2018. ^ "Vegni: I can't stop Chris Froome racing the Giro d'Italia | Cyclingnews.com". Cyclingnews.com. Retrieved 2 May 2018. ^ "Vegni: I can't stop Chris Froome racing the Giro d'Italia - Cyclingnews.com". ^ "Chris Froome crashes in Giro d'Italia time trial recon - Cyclingnews.com". ^ Cary, Tom (4 May 2018). "Chris Froome crashes... before Giro d'Italia even starts" – via www.telegraph.co.uk. ^ a b c Pryde, Kenny (31 May 2018). "Inside line: Froome was overweight, in pain and thinking of quitting". Rouleur. Retrieved 6 June 2018. ^ "Giro d'Italia 2018 - Stage 6". www.procyclingstats.com. ^ "Giro d'Italia 2018 - Stage 14". www.procyclingstats.com. ^ "Giro d'Italia 2018 - Stage 15". www.procyclingstats.com. ^ "Giro d'Italia 2018 - Stage 16 (ITT)". www.procyclingstats.com. ^ "Giro d'Italia 2018 - Stage 18". www.procyclingstats.com. ^ Fordyce, Tom (6 June 2018). "How Chris Froome won Giro d'Italia thanks to 'spectacular' stage 19 victory". bbc.co.uk. Retrieved 6 June 2018. ^ "Giro d'Italia 2018 - Stage 19". www.procyclingstats.com. ^ "Chris Froome: I have a clear conscience - Cyclingnews.com". ^ "Chris Froome wins Giro d'Italia in Rome to join cycling's exclusive club". Guardian. 27 May 2018. Retrieved 31 May 2018. ^ Bevan, Chris (20 July 2013). "Chris Froome's fiancee on life with the Tour de France leader". BBC Sport. BBC. Retrieved 23 July 2013. ^ White, Jim (23 July 2013). "How Chris Froome's feisty fiancee is the power behind his throne". The Daily Telegraph. Telegraph Media Group. Retrieved 23 July 2013. ^ Smith, Sophie (16 December 2014). "Chris Froome working on long-haul strategy towards 2015 Tour de France". Cycling Weekly. Time Inc. UK. Retrieved 19 December 2014. ^ "Chris Froome celebrates birth of first child". Cyclingnews.com. Immediate Media Company. 16 December 2015. Retrieved 16 December 2015. ^ Moore, Richard (4 December 2015). "The Hardest Road". Esquire. Hearst Magazines. Retrieved 4 December 2015. ^ "What the best bike racer on the planet ate for breakfast today at the Tour de France". Business Insider. Retrieved 1 June 2017. ^ "After Chris Froome cut back on carbs for more protein, he lost 20 pounds, started winning the Tour de France, and became a millionaire". Business Insider. Retrieved 31 May 2017. ^ "Chris Froome is using these weird chainrings, and they might be helping him win a historic 3rd Tour de France". Business Insider. Retrieved 31 May 2017. ^ a b c "Chris Froome". Cycling Archives. de Wielersite. Retrieved 9 March 2013. ^ "Christopher Froome". Tour de France. Amaury Sport Organisation. Archived from the original on 2 July 2013. Retrieved 28 June 2013. ^ "Velo Magazine – December 2013". VeloNews. Competitor Group, Inc. 19 November 2013. Retrieved 20 November 2013. ^ Axelgaard, Emil (18 October 2013). "Van Avermaet and Froome win 'Flandrian of the Year' award". CyclingQuotes.com. JJnet.dk A/S. Retrieved 13 September 2014. ^ "Froome, Cockroft and England women cricketers take SJA prizes – Sports Journalists' Association". www.sportsjournalists.co.uk. Brailsford, Dave; Froome, Chris (2013). The Pain and the Glory: The Official Team Sky Diary of the Giro Campaign and Tour Victory. London: HarperCollins. ISBN 978-0-00-754471-4. Froome, Chris (2014). The Climb: The Autobiography. London: Penguin Books. ISBN 0-241-00418-7. Sharp, David (2013). Va Va Froome: The Remarkable Rise of Chris Froome. Edinburgh: Birlinn. ISBN 978-1-78027-166-8. Vlismas, Michael (2013). Froome: The Ride of his Life. Johannesburg: Jonathan Ball Publishers. ISBN 978-1-86842-604-1. Walsh, David (2013). Inside Team Sky: The Inside Story of Team Sky and their Challenge for the 2013 Tour de France. New York City: Simon & Schuster. ISBN 978-1-4711-3331-2. Wikimedia Commons has media related to Chris Froome.
0.953018
Should compulsory admission to hospital be part of suicide prevention strategies? The World Health Organization report Preventing Suicide: A Global Imperative provides governments with guidance for comprehensive suicide prevention strategies. However, it does not mention the role that compulsory admission to hospital of psychiatric patients should have in policies for suicide prevention. This was a missed opportunity for international discussion and guidance about a measure that, although widely used, is becoming increasingly controversial in light of the existing evidence and human rights norms.
0.973055
1. Cut a piece off the transfer foil a little larger than the sticker pieces on the sticker sheet. 2. Remove the white protective layer and put the sticky side of the transfer foil onto the sticker pieces chosen. 3. Press the transfer foil firmly using a flat tool such as a paper knife. 4. Remove the transfer foil with the sticker pieces carefully from the sticker sheet. 5. Stick it onto the surface chosen, such as a greetings card, scrapbook or wooden article. 6. Press the sticker pieces firmly onto the surface and remove the transfer foil. * Always test in advance if the surface is suitable for use with transfer foil. The heat-resistant transparent sheets are ideal for use with stamps and embossing powder. For example, you can create a transparent greeting card with a stamped image on top, a small box with transparent cover, or a pretty shaker card. 1. Apply the ink onto the stamp. You can use all kind of ink colors, however if you wish to use light colors or white embossing powder, a transparent ink to recommend. 2. Make the stamped image. 3. Sprinkle the image all over with embossing powder while the ink is still wet. 4. Use a heating tool to heat the embossing powder a hot tool, until the powder is melted and it gives a beautiful glossy print. - The cold laminating film protects and strengthens small cards and images from tearing and provides them with a beautiful shine. - Protects your designs and makes them washable. - Transparent finish for clear visibility and bright colors. - Laminating without a machine, easy and quick to use.
0.862184
What's your blood type? In some cultures, they believe that each blood type has a certain personality or affinity. This snip was taken from the Korean web toon "A Simple Thinking About Blood Type", a funny web toon that provides scenarios and how the different blood types behave. Please keep in mind though that this web toon has no scientific basis was written primarily for enjoyment. According to this webtooon... Blood Type A: - Stickler to rules and have a structured lifestyle. - Very considerate and can understand others well. - Have a hard time with drastic changes or tensions in social relationships. - Very careful when starting something new. - Can be pessimistic about the future. They can be perfectionists who prepare in advance. - Very patient and have exceptional emotional control. - Their feelings can easily get hurt compared to other blood types. Blood Type B: - Don't like to be bothered by other people and dislike being bound by routines and schedules. - They get into things that interest them. - They aren't afraid to express themselves and aren't restricted by formalities. - Are free thinkers who have lots of ideas and are very open-minded about relationships with people. - They can be very optimistic about the future. - They are not greatly influenced by their surroundings and have a tendency to ignore it. - They may have a tendency to be fickle and lack romantic notions, but they have great affection towards others. Blood Type AB: - They are prone to maintaining distance between people relationships. They dislike people crossing the line or getting into their space. - They are logical and direct. They are great negotiators. - They are also good at analyzing. - They are a natural at making critical statements and often say the right things that others don't want to hear. Sometimes it is not all right. - There are many idealists and emotionally intelligent thinkers. - The stable and calm personality of Type A and the fickle mind of Type B coexist. - Of all the blood types, they possess the least interest in politics and power. Instead, they prefer to rise above mundane power struggles. - They are less prone to drowsiness and have righteous personalities. However, they are not the type to act right away. Blood Type O: - Compared to the other blood types, they have the strongest survival instincts. - They have great motivation and drive towards reaching a goal. However, if they lose their goal, they also lose their motivation. - They are both an idealist and a realist. - They like to form close groups or organizations but are wary of people outside of their groups. - There are a lot of accomplished professionals in this blood group because they have a tendency to focus on one thing. - They are honest and have a strong self opinion and thus, there are many who live with great belief and philosophy on all aspects of life. - They may be temperamental but hold no grudges. - Other than that, blood type O's are also very competitive (Except only when they are sure to win). They are a very political blood type. Based on the descriptions above, do you agree with the description for your blood type (even though it's written for fun and enjoyment only)? In some cultures, they believe that each blood type has a certain personality or affinity. This snip was taken from the Korean web toon "A Simple Thinking About Blood Type", a funny web toon that provides scenarios and how the different blood types behave. Please keep in mind though that this web toon has no scientific basis was written primarily for enjoyment. - Stickler to rules and have a structured lifestyle. - Very considerate and can understand others well. - Have a hard time with drastic changes or tensions in social relationships. - Very careful when starting something new. - Can be pessimistic about the future. They can be perfectionists who prepare in advance. - Very patient and have exceptional emotional control. - Their feelings can easily get hurt compared to other blood types. - Don't like to be bothered by other people and dislike being bound by routines and schedules. - They get into things that interest them. - They aren't afraid to express themselves and aren't restricted by formalities. - Are free thinkers who have lots of ideas and are very open-minded about relationships with people. - They can be very optimistic about the future. - They are not greatly influenced by their surroundings and have a tendency to ignore it. - They may have a tendency to be fickle and lack romantic notions, but they have great affection towards others. - They are prone to maintaining distance between people relationships. They dislike people crossing the line or getting into their space. - They are logical and direct. They are great negotiators. - They are also good at analyzing. - They are a natural at making critical statements and often say the right things that others don't want to hear. Sometimes it is not all right. - There are many idealists and emotionally intelligent thinkers. - The stable and calm personality of Type A and the fickle mind of Type B coexist. - Of all the blood types, they possess the least interest in politics and power. Instead, they prefer to rise above mundane power struggles. - They are less prone to drowsiness and have righteous personalities. However, they are not the type to act right away. - Compared to the other blood types, they have the strongest survival instincts. - They have great motivation and drive towards reaching a goal. However, if they lose their goal, they also lose their motivation. - They are both an idealist and a realist. - They like to form close groups or organizations but are wary of people outside of their groups. - There are a lot of accomplished professionals in this blood group because they have a tendency to focus on one thing. - They are honest and have a strong self opinion and thus, there are many who live with great belief and philosophy on all aspects of life. - They may be temperamental but hold no grudges. - Other than that, blood type O's are also very competitive (Except only when they are sure to win). They are a very political blood type. Based on the descriptions above, do you agree with the description for your blood type (even though it's written for fun and enjoyment only)?
0.999986
How do I overcome a fear of public speaking? The average person ranks the fear of public speaking above death. But never fear, help is here. First off, know your topic. The better you understand the topic, the easier it will be to talk about it with confidence. You know the saying: practice makes perfect. Practice in front of people you know and ask for honest feedback. Focus on your material, not on your audience. People mainly pay attention to new information, not how it’s presented. Visualise your success. Positive thoughts can help decrease some of your negativity about your social performance and relieve some anxiety. Lastly, practice some deep breathing, this can be very calming.
0.999918
How bumpy and jolty were the [TEXT NOT REPRODUCIBLE IN ASCII], paces of the state, The emperor's mind was ashamed [TEXT NOT REPRODUCIBLE IN ASCII]. To aid a greyhound the hare needs to have sharp, jolty quirky movements and noise. In slow, stop-start traffic however it is painfully lumpy and jolty.
0.975582
Miracle City is one of the most famous marvels of the Serpens region, a planet encrusted with fractal buildings extending far into orbit. They are maintained using self-regulating xenotech, leaving the billions of inhabitants free to pursue their manifold goals. This world was first reached by a Gerkeltoss ship in 8830, although there is evidence that an Interstellar Frontiers Group mission visited several thousand years earlier than this date. Due to a period of turmoil in the Serpens Region many records were lost. Miracle City is an ancient planet/megastructure apparently built by a long-disappeared xenosophont species that may have transcended and vanished into artificially constructed universes of their own creation long ago. Due to the ability of the structures to completely regulate and revise themselves, the actual age remains unclear (estimates range from 50 million to two hundred million years), but it appears that the megastructure has been sequentially discovered and more or less continuously inhabited by several interstellar xenosophont civilisations, each of which has discovered and inhabited it and in turn transcended. However the City was deserted when Terragen explorers first arrived. The City is a heavily redesigned planet, covered with fractal "buildings" extending far into orbit, maintained using self-regulating nano and magmatter tech. It contains billions of habitats of various kinds, a few of which are inhabited by the descendants of immigrant Terragen biont clades, mostly from the Serpens region.. Some of the ancient habitats on this world retain alien artifacts that were left here by long-vanished civilisations; most are inactive and enigmatic, but a very few still contain retrievable data which is the subject of intense study. Some such artifacts can be reactivated only by the presence of a member of the species for whom they were originally constructed. On occasion the Terragen scientists engaged in the study of these artifacts (and their transapient overseers) have managed to spoof these mechanisms and make contact with the databases within. One habitat, deep within the fractal cloud, appeared to have been configured to support members of the Muuh race; when a team of historians belonging to that species was brought to Miracle City they were able to reactivate the devices in that location, but could not understand the language used. After many decades of study (but only a few subjective years to the Muuh) some of the data was deciphered, and the Muuh were able to study it. They report that the Muuh who lived here fifteen million years ago did not make their own way here, but were brought by some other entity; who this entity may have been, what its intentions were, cannot now be discerned. Travel: The nearest stargate nexus point is at TYC 548-64-1, an STC GateNode located 78 lightyears away. From there a relativistic shuttleliner leaves every 6 months. Inflight time duration is 26 years. Full inflight facilities, including an excellent virchlibrary and delicious Skiilwsnnii cuisine, are provided. Miracle City often changes colour and texture for unknown reasons. Initially published on 19 August 2000.
0.999998
Paragraph including number of locations going live, Liven Cash rate, and an introduction to the new user free item offer. 3.Apply the code below, valid for $10 *(a ______)* at any participating _____ outlet. 4.Head to your nearest store, order and click 'Pay Now'. Your code will be applied!
0.9998
Design a Fossil watch tin for a chance to win up to $5,000 and other fab prizes. To celebrate Fossil’s 30 years of vintage inspiration and product innovation, Fossil is inviting their design-minded fans to create their own iconic watch tins for 2014! This year’s brand theme is “30 Years on the Open Road.” Your challenge is to design a watch tin that is inspired by American travel of the 1950s and '60s. Enter your design in Fossil's tin design contest, and YOU COULD WIN UP TO $5,000 and even have your tin produced and displayed in Fossil stores and events. Step 1: Get inspired. Use Fossil's iconic watch tins to get your gears turning. Check out the Pinterest board for even more inspiration! Step 2: Show Fossil what you've got! Submit your original tin design. Step 3: Vote. Tell Fossil which design best captures their vintage heritage. Step 4: Dream big! You could win up to $5,000 & have your tin produced.
0.952465
What about a system, basing on scents ? Biters are like insects and many insects work with scents. Like "getting hurt" drops agggressive and fear scents on the ground. So they run away when getting hurt and take their aggression with them which leads to bigger biters. There are lots of options. As one of those people who has generally preferred to create more eco-friendly bases, I like the idea of at least being able to be on neutral terms with the aliens still. If you didn't attack them and kept pollution levels low enough, they'd leave you alone. A: Mining is inherently a very dirty activity. Even with the max 80% reduction on mining drills, biters still come and attack and you can still put out a lot of pollution from larger patches. B: When they setup a base directly on top of an ore patch, you'd need some way to move them out of the way without attacking them. Maybe pheromones that can temporarily render them docile and some method of get them to move their nests. Unfortunately, with the hope being that 0.17 will become 1.0, I doubt we'll get this before release and I have no clue what Wube's intentions are for long-term support of factorio post-release. I do really like the potential for more extensive relationships as well. Assuming they're more animalistic (which seems to be the case), 'trade' doesn't make a whole lot of sense. But befriending them, and developing biotechnology based on their capabilities sounds like a whole lot of fun. I don't expect Wube to add much to the biters before or after release. For them, they are just a mechanic to sink some resources and make the player build defenses. But you can always make a mod. Also, the scent idea has been implemented by Rampant already. Maybe, that mod could be extended to implement the biter drugging mechanic. First, a player-alien relationship value going from let's say -100 to 100 with -100 being enemies, 0 neutral, 100 friendly. The relationship would deteriorate when killing them and when they absorb pollution, otherwise it would increase (given time). When neutral aliens could behave like the current "peaceful mode" settings. Secondly, a definition of player territory, an easy way would be to define player territory by the revealed map from radars. While friendly the aliens should refrain from expanding on that area. Taking into account how "friendly" you are with them they should be able to "sell" you territory, meaning removing their bases from player territory. This way the player should be able to expand their base without killing aliens and therefore greatly reducing his relation to them. As for the trading, now that there are no alien artifacts (maybe re-introduce them to make it more interesting to interact with aliens) you can also introduce a friendly spawner. The player should be able to request from the aliens a spawner that won't produce any aliens but will help with pollution reduction since they absorb great amount of pollution. Any request could cost relationship status (for example requesting a friendly spawner while having 100 relationship with aliens would reduce it to 70) or have a cooldown before being able to request something from them again. I like this idea. You are the kind of alien colonist in this world and real natives usually don't have a guilty until proven innocent policy. In fact the aliens treat you as guilty, period. I think it would be nice to be able to have a relationship with the aliens. I also think that there should be more starting power opportunities than just the heavily polluting steam power. Maybe some sort of low power giving short lasting geothermal vent that is only really useful early game. Or maybe sticking with steam some sort of similar steam geyser. Also being able to do nice things like replant trees and grow grass would be nice. The main problem with the "peace with aliens" path is that you still are playing factorio. You want to build a factory, the bigger the better. So you need to expand a lot. So you are taking a lot of space away from the biters. Most species don't just walk off their home turf and walk into overpopulated concentration camps at the edge of your territory, just because you asked them nicely. So as I see it, the "peace with aliens" path can very easily turn into what would basically be a weapon of deception. And then, when you freely teched up, secured a perimeter and got them all rounded up nicely, you drop the nukes. And then, when you freely teched up, secured a perimeter and got them all rounded up nicely, you drop the nukes. That's the plan. Do you hate nukes or are you just a communist bug hugger? Um, no. I would probably do it. My moral issues about biter-genocide aren't particularly notable. But I had the impression that lots of the people who favor the "peace with biters" thing where honest about the "peace" part, so I figured it would be a good idea to point out it's abusability. If they choose to not nuke the biters the biters will indeed chew on them eventually. But that's okay. Bug huggers deserve to be eaten alive by their bug friends. They should know better than believing in peace with the natives anyway. You need alien leaders of some sort. And if there is enough intellect for trading, there is probably enough intellect for a merchant or political class that isn't just some HUUUUGE monster bossing regular biters around because huge monsters would imply "consider just stomping it" is its first reaction to the unknown, "send minions" the 2nd, and basically no evolutionary pressure to develop a 3rd option. Not knowing what the local leaders personalities are, and having to take chances and scout ahead for a more convenient type if the nearest one isn't convenient (warmonger; isolationist; too greedy; refuses to produce certain goods; already trading capped; tries to impose laws on you like "no uranium", ETC) would definitely add +200 hours of worthy gameplay to the game. If you can't make it, MAKE SURE MODDERS CAN! How about implementing a sort of "zones" or regions? players and natives can coexist and build here until "Native hostility" value: is above a treshold value. Natives are not interested in these parts. Players can do what they like here. That's a super cool idea! The player could start within such an abandoned area, and could find more such regions throughout exploring. Those regions would be poor in whatever resources the biters want, and so they would have no presence throughout the region. If you're careful not to let your pollution spread to adjacent regions, the biters will let you be. But most areas would be neutral, with some biters. You'd generally have to contend with them and share space (or drive them out of their home). Your resources wouldn't necessarily correlate with biter resources, so you might find great things with low biter population for a long ways around, but it's going to be luck of the draw and usually you won't. In the areas with the most biter resources, they will have huge colony systems. Most of the time, you can easily avoid these places, or use them for late-game bug-stomping fun. But alternatively if you happen to be seeking the same resources they want, you'll know where to get said resources. Resource distribution could have sort of a "heat map" over large areas, such that as you explore, you'll find the rate of a given resource gradually changes. You might come across a region that is rich in iron but poor in copper, for example. The starting region should have moderately high values for iron, copper, stone, and coal, but particularly low values for oil or uranium--so you have to explore outside the starting area before you're likely to find a good deposit. - Each alien nest is like a camp, it needs like a trade building where we can have an input and an output, the "request" of the building depends on the actual pollution on the nest (the more there pollution, the higher is the request). It asks some raws materials they are use to eat like stone or coal, even iron or copper ore. The longer we filled the request, the longer the peace exist. Or we can kill the whole camp. - the entire process is an alternative choice to the military research, because it becomes obsolet if the peace is here. Thank you for the game, best regards.
0.976043
कुत्ता भूख लगी है doesn't work? कुत्ते को भूख लगी है। would work. Keep in mind that this is still a singular sentence referring to one dog. Yes, I forgot को, and then obviously the oblique with it. No it doesn't, if you use it this way then the bhookh(hunger) will be changed into possessive case As "Kutte ko bhukh lagi hai" In english Dog has hunger.
0.958614
Can you describe a position that you held where you had to work at a high-energy level for an extended period of time? How did you handle multiple key priorities and still maintain the high level of energy required? How did you maintain your effectiveness? I'm looking for someone who approaches the answer with excitement, not someone who gives me the sense that it was a taxing experience that they are glad is over. I'm looking for an answer that indicates the candidate thrives in those situations, and that they actually get more energy and motivation from being in that type of a situation. I also want to see some creativity in their answer: if they want to work for Investors Group, then they need to be dynamic and charismatic in their delivery; they need to paint a picture and engage me in the story they are telling me. Investors Group Consultants spend a great deal of time with clients, and we want our clients to be excited and engaged. So if I'm bored with their answer, then it tells me a client might feel the same. I listen carefully for a detailed response that indicates they really enjoyed the challenge of the task, were able to remain organized throughout , and worked in a manner that maintained a very high level of efficiency. Their time and resources are valuable, and I want to see that they feel that way about themselves. I want to know they are the type of person who gets a kick out of working really hard, and is inspired by the results.
0.947965
Bred to adorn the laps of the Chinese emperors during the Shang dynasty (1766-1122 BC), in East China, where they were known as "Lo-Chiang-Sze" or "Foo" (ceramic foos, transmogrified into dragon, with their bulging eyes are very Pug-like). The Pugs popularity spread to Tibet, where they were kept by monks, and then went onto Japan, and finally Europe. The breed was first imported in the late sixteenth and early seventeenth centuries by merchants and crews from the Dutch East Indies Trading Company. The Pug later became the official dog of the House of Orange, and traveled with William III and Mary II when they left the Netherlands to ascend to the throne in 1688. This century also saw Pugs' popularity on the rise in other European countries. In Spain, they were painted by Goya, in Italy Pugs dressed in matching jackets and pantaloons sat by the coachmen of the rich, and in Germany and France Pugs appear several times as footnotes to history. The popularity of the Pug continued to spread in France during the eighteenth century. Before her marriage to Napoleon Bonaparte, Joséphine utilized her Pug "Fortune" to carry concealed messages to her family while she was confined at Les Carmes prison as the pet was the only recipient of visiting rights. In nineteenth century England, Pugs flourished under the patronage of the monarch Queen Victoria. Her many Pugs, which she bred herself, had such names as Olga, Pedro, Minka, Fatima and Venus. Her involvement with the dogs in general helped to establish the Kennel Club, which was formed in 1873. Victoria favoured fawn and apricot Pugs, whereas the aristocrat Lady Brassey is credited with making black Pugs fashionable after she brought some back from China in 1886. The Pug has also thrived in democratic circles, arriving in the United States sometime in the nineteenth century (the American Kennel Club recognized the breed in 1885) and was soon making its way into the family home and show ring. While most Pugs appearing in eighteenth century prints tended to be long and lean, the current breed standards call for a square, cobby body, a compact form, deep chest, and well-developed muscle. Their heads, carried on arched necks, should be substantial and round, the better to accentuate their large, dark eyes. The wrinkles on their foreheads should be distinct and deep, and were especially prized by the Chinese as they seemed to spell out the character for "prince". Their fine, glossy coats can be apricot, fawn, silver or black. The tail should curl tightly over the hip; a double curl is considered perfection. Pugs are very sociable dogs, but quite stubborn. They are playful, charming, clever; and are known to succeed in dog obedience skills. Pugs are sensitive to the tone of a human, so harsh punishment is generally unnecessary. Pugs get along well with other dogs and pets and require lots of attention; they may become slightly jealous if their owner ignores them or does not play with them.
0.99233
What specifically do you want to accomplish with your health and fitness in the 4-12? What you like to accomplish with your health Make sure your goals are YOURS. Write down how many pounds you want to lose, inches you want to shed, dress/pant sizes you want to lose. Write things such as how many times a week you will commit to working out and goals for your nutrition program. It is important to make small, short-term goals and long-term goals. A goal to lose 1-2 pounds a week would be a healthy start to anyone looking for long-term weight loss.
0.929016
Can Spain's new government work? After two elections and months of deadlock Spain is finally getting a new government. The socialist PSOE party has decided to back a minority government led by Mariano Rajoy and his conservative People's Party - a course they initially rejected after the election in June. Journalists predict that the Socialists will have a hard time supporting the conservatives. The Socialists have done themselves irreparable damage by abstaining, Phileleftheros believes.
0.972431
Gautama Siddhārtha attained enlightenment and became the Buddha about 2500 years ago in India. Thereafter, Gautama Siddhārtha became to be called with respect as Shākya-muni Buddha' or Gautama Buddha'. Buddha is the one who has awakened to the truth. Enlightenment means that the one who; because of his/her ignorance used to view the world and his/her life mistakenly and, because of this, often chose a wrong way of life, awakens to the real state of the world and his/her life. It is to restore the genuine self' by coming to possess a true view of the world and one's life. Having attained enlightenment through his deep insight, Shākya-muni Buddha ascertained that living in an enlightened state is the only way for human beings to live in true happiness. He taught about the true nature of life and led all other people to attain Buddhahood. In this way, Buddhism is a teaching which ultimately leads one to become a Buddha himself. Shinran Shōnin (1173 ~ 1263) was a person who lived through a tumultuous period of Japan's history. He possessed a grave desire to live in accordance with Shākya-muni Buddha's teachings. What are the Buddha's teachings that led him to such a serious concern? How did he learn and practice them? The Buddhist path, in general, consists of three steps. Firstly led by the Buddha's teachings, the practicer realizes that he is ignorant (a being whose life is based on delusion) and is transmigrating in the cycle of birth and death. Then, he aspires for enlightenment and develops abilities that enable him to see the truth. And as a result he brings delusion to an end and attains buddhahood. General Buddhist practices follow this order. However, even if we hear the Buddha's teaching and realize the importance of attaining buddhahood, it is very difficult to eliminate our unceasing delusion and to cultivate wisdom. Unless we have a considerably superior nature and a stiff will, the Buddhist path is hard to accomplish; since deluded people like us are always chasing our present desires without any doubt, do not realize the fact that we are transmigrating in the cycle of birth and death and never stop committing evil acts. It is impossible for such deluded people to succeed in attaining this goal of the Buddhist path. We will finish our lives in vain without awakening to true selves if we do not recognize the importance of attaining buddhahood. Shākya-muni Buddha took it as his task to let us know how important it is to attain buddhahood. Thus, the Buddha never abandoned us. Especially for such beings, the Buddha revealed the Buddhist path that focuses on the teaching of Other-power. (the power beyond self or the power solely purpose to benefit others). In this teaching, we are given the right cause to attain buddhahood by Amida Nyorai. In the Larger Sūtra, Shākya-muni Buddha taught that the practice of Other-power was accomplished by Amida Nyorai's intent to save all sentient beings by transferring all of its merits to them. By comparison, there are many Buddhist teachings and sects that teach a process of attaining buddhahood by a practicer's own effort are called Self-power Buddhism. Most of the sects, for example Shingon, Zen and Nichiren sects, all follow the teaching of self-generated-effort (Self-power). The teaching which Shinran Shōnin learned and practiced at Mt. Hiei monastery for twenty years was the Tendai teaching based on the Lotus Sūtra. Tendai teachings fundamentally aim at entering the Pure Land and meeting the Buddha in this life by meditating that the variety of phenomenal things expresses the real state of the universal and eternal truth, and by practicing the six pāramitā practices of the bodhisattva path to eliminate all illusion. However, it requires hard disciplines that last very long time in order to succeed. For instance, extraordinarily hard disciplines like the thousand-day strolling mountain practice is performed by practicers in order to realize it. Certain people may achieve enlightenment through such rigorous practices, but it is impossible for ordinary people like us to accomplish the Tendai sect's meditations and practices. Only sages are able to master them. That is why, this teaching is called the path of sages. Shinran Shōnin also pursued this path of sages for twenty years during his life at Mt. Hiei monastery. However, the harder Shinran Shōnin tried to eliminate his illusion, the more clearly he saw the real state of his evil mind. In one of his gāthās, he confessed, "My evil-ness is truly difficult to renounce; the mind is like a venomous snake or scorpion."(gatha-96) Even when he did good deeds which were supposed to be praised by people, he keenly looked within himself and confessed, "Even doing various good acts is tainted with poison. And so is called false practice."(ibid.) Through his introspective efforts, Shinran Shōnin saw that he would not be able to attain buddhahood by self-power practices. The conclusion that he came to is not applicable to Shinran Shōnin only, but also to all of us who are in the same position. Supposedly, in Shinran Shōnin's mind there arose questions such as; whether the path to attain buddhahood was closed to a ignorant person and whether the Buddha had forsaken or abandoned evil people like him. When Shinran Shōnin was immensely worried and in deep despair, he was taught by Master Honen the path of other-power nenbutsu which was revealed in the Larger Sūtra. He knew that great patriarchs like Bodhisattva Nāgārjuna, Bōdhisattva Vasubandhu and Master T'an' Luan had testified to the easiness and reliability of the path of other-power nenbutsu and that they all exhorted ignorant people to decide to follow it. The existence of this nenbutsu teaching gave Shinran Shōnin the answer. As soon as Shinran Shōnin heard Master Honen's teaching, he abandoned the self-power teaching of Tendai and chose the other-power teaching of the nenbutsu as the path by which he would assuredly attain buddhahood. The teaching of other power nenbutsu was not created by Master Honen. The Buddha who saw into the nature of beings like us had already prepared the teaching of other power for us. However, because most people were only interested in the profound and philosophical Buddhist teachings, they missed the original intent of the Buddha to save all sentient beings equally. Thus, such people mistakenly saw the teaching especially made for deluded people as the lower and inferior teaching. Master Honen and Shinran Shōnin revealed the original intent of the Buddha clearly. What they revealed can be summed up in the following points. (1) The Buddhist path of other power which exists for the sake of ignorant people the object is not an inferior teaching, it is in fact superior to other teachings simply because it saves even ignorant people. (2) The nenbutsu practice, by itself, not as a part of other practices, is the right cause for attaining buddhahood. (3) Although the Buddhist path of other power does not requires us to perform difficult practices, it surely brings us to the attainment of buddhahood. It does not perform a supportive function for other teachings which were told to the sages by the Buddha. And it leads us to the same enlightenment as the other paths do. (4) There are no differences between the enlightenment of the Other Power teaching and that of Self Power teachings. Because the cause of Other Power is given to us by Amida: although our personal abilities to achieve enlightenment are limited, it nevertheless bring us to the highest enlightenment. (5) The nenbutsu teaching was taught especially for the sake of ordinary people and ignorant, sometimes evil people, thus this kind of person becomes the primary focus of salvation. As Shākya-muni Buddha states in the Lager Sūtra, he expounded the teaching "seeking to save the multitudes of living beings by blessing them with the benefit that is true and real." In other words, since "the multitudes of living beings" includes ignorant and evil people, we can conclude that this Sūtra was taught especially for those who are ignorant and evil because without this "benefit" they would have no way to be included within Amida's salvation. Since I told an inclusion of even ignorant and evil people is in accordance with Amida's Eighteenth Vow, we may conclude that Shākya-muni Buddha's primary purpose for appearing in this world was to reveal this teaching. In this sense, the teachings that save all beings including ignorant and evil people can be called the true teaching' and the teachings that only save self-power sages can be called the provisional teachings' or, teachings which do not manifest the Buddha's intent fully. Seeing this, Shinran Shōnin realized and entrust himself that teachings of the Lager Sūtra was the path which he should follow.
0.999998
Can you say that five times fast? Ping-pong pairing involves a back-and-forth between test and code and supports developers in doing test-first development. One pair programming configuration I like is called ping-pong pairing. In ping-pong pairing, the driver writes a test for a behavior then asks the navigator to implement the behavior and make the test pass. Once completed, the keyboard is passed from driver to navigator and the new driver writes the next test for the new navigator to implement. This back-and-forth between test and code, driver and navigator, can offer rich feedback when building a system. It also supports developers in doing test-first development. One of the challenges with ping-pong pairing is making the time to refactor both code and tests. It’s easy to get on a forward momentum where features are being implemented, but we also have to take the time to step back and make sure our code is clean so it’s straightforward to maintain and work with in the future. This also applies to our tests. I find that when doing TDD, I spend a fair amount of time refactoring my tests. Sometimes, I spend more time refactoring my tests than refactoring my code, but this is natural. Exercising a feature can be complex, so testing can be complex, too — but it’s well worth it to make tests straightforward and easy to read. The two things I typically do to make my tests more readable are factor common set up behaviors into a common setup method and, for any additional functionality that is not shared among all tests, write helper methods that my test can call. You might have heard me rant in the past about how helper methods have no place in the domain model. They’re orphaned behaviors because the developer who wrote them didn’t take the time to discover what object should actually possess those behaviors and instead they made a helper object hold those behaviors. Doing this distorts the domain model. It means that objects in our domain model are not being called out correctly and therefore the domain model is distorted and difficult to understand. So, it’s true: I am against helper methods in production code. However, helper methods do have a place in test code. Test code is, after all, different than production code. It has a different purpose. It’s intended to exercise production code, so it makes complete sense for tests to have helper methods. Tests are, after all, code, and they’re important code because they exercise a production system. We should write our tests with every bit as much care as we use to write production code. Ping-pong pairing helps us keep an emphasis on both test and production code and can support pairs in doing TDD well.
0.996423
Those of you who have been reading me closely and paying attention will realise by now that I am an island fancier of grand proportions! Describe the coastal parts and lush interior of a beautiful island and I more or less turn to complete mush. In short, I am drawn to the idea of pretty plants, exotic flowers and beaches that reside far, far away from the crowds and stresses of normal city life. On this theme I once enjoyed visiting the Italian island of Elba. It is firstly pertinent to establish the name does not refer in any way to that joiner of forearm and bicep, the humble elbow! Not as well known as its sister islands – Sicily and Sardinia – it nonetheless has many charms. Elba is the third largest of Italy’s islands and found 10km off the Tuscan coast forming part of Europe’s largest marine park. It has a long history; first inhabited by the Ilvati tribe who named it Ilva and later by the Etruscans and Romans. Wandering around the island, I was most impressed by its natural beauty and charm where rich vegetation, forests and sheer rock are hugged by limpid aquamarine seas. A sense of calm pervades the island; this peaceful ambience becomes the realisation of all those fantasy islands you might idle upon in your daydreams – the antithesis of loveless ‘Lord of the Flies’. I loved Elba’s coastal views; its pristine blue waters and alluring beaches. It also appealed as a walking holiday due to its many good hiking routes all with breathtaking views of lush landscape and sea. Small villages perch on its shores where island dwellings warm the views with pinky-orange hued roofs and bobbing boats on crystalline inlets. It seems I share my love of this island with Napoleon who sought refuge on Elba during his exile in 1814 and you can find his residence here, ‘Palazzini deil Mulini’. If you’re having a Hippopotamus day and fancy a mud wallow, you can head for the thermal baths of San Giovanni. To me Elba is one of nature’s gifts; a seductive retreat.
0.967078
Debunked: Apollo 10 "Space Music" Discussion in 'UFOs, Aliens, Monsters, and the Paranormal' started by Santa's sidekick, Feb 21, 2016. Update: This was explained many years ago, and was simply interference between the Lunar Module's and command module's VHF radios creating a strange whistling sound. To briefly summarize the article: it seems that astronauts aboard Apollo 10 heard strange theremin-style noises which they were recorded referring to as 'Outer-space-type music' while blocked from Earth's radio transmissions by the Moon. The writer heavily implies that extraterrestrial radio transmissions are the best explanation. It was 1969... when Apollo 10 entered lunar orbit, which included traversing the far side of the moon when all spacecraft are out of radio contact with Earth for about an hour and nobody on Earth can see or hear them.... Almost four decades went by before lost recordings emerged that revealed something unsettling that the three Apollo astronauts had experienced while flying above the far side of the moon. The taped recordings contained "strange, otherworldly music coming through the Apollo module's radio," according to the upcoming Science Channel series, "NASA's Unexplained Files." "It sounds like, you know, outer space-type music." "You hear that? That whistling sound? Whooooooooo!" "Well, that sure is weird music!" "Shall we tell them about it?" "I don't know. We ought to think about it." "The Apollo 10 crew was very used to the kind of noise that they should be hearing. Logic tells me that if there was something recorded on there, then there was something there," Apollo 15 astronaut Al Worden says on the Science Channel program. "NASA would withhold information from the public if they thought it was in the public's best interest." The Huffington Post is not above insinuating that extraterrestrial radio transmissions are the likeliest explanation.... But what do members here make of this? What could the noises have been? Micheal Collins wrote about the "music" in his book, Carrying the Fire. "There is a strange noise in my headset now, an eerie woo-woo sound. Had I not been warned about it, it would have scared hell out of me. Stafford's Apollo 10 crew had first heard it, during their practice rendezvous around the Moon. Alone on the back side, they were more than a little surprised to hear a noise that John Young in the command module and Stafford in the LM each denied making. They gingerly mentioned it in their debriefing sessions, but fortunately the radio technicians (rather than the UFO fans) had a ready explanation for it: it was interference between the LM's and command module's VHF radios. We heard it yesterday when we turned our VHF radios on after separating the two vehicles, and Neil said that it "sounds like wind whipping around the trees." It stopped as soon as the LM got on the ground, and started up again just a short time ago. A strange noise in a strange place." Does anybody have a copy of the book to confirm this? 102:12:17 Cernan (in Snoopy): You really have to be careful with this film, when you don't have any left. There's the one Jack marked that he wants. I'll get it for him. 102:12:43 Stafford (in Snoopy): Hey, when do we fire the helium tanks? [Garble]. 102:12:47 Cernan (in Snoopy): Not yet, babe. 102:12:53 Stafford (in Snoopy): You want some more brownies? 102:12:54 Cernan (in Snoopy): No. 102:12:56 Stafford (in Snoopy): [Garble] go hungry. 102:13:02 Cernan (in Snoopy): That music even sounds outer-spacey, doesn't it? You hear that? That whistling sound? 102:13:06 Stafford (in Snoopy): Yes. 102:13:07 Cernan (in Snoopy): Whooooooooooo. 102:13:12 Young: Did you hear that whistling sound, too? 102:13:14 Cernan (in Snoopy): Yeah. Sounds like - you know, outer-space-type music. 102:13:18 Young: I wonder what it is. 102:13:27 Stafford (in Snoopy): Yeah. 102:13:29 Cernan (in Snoopy): Mine's all burned off. isn't that weird - eerie, John? 102:13:34 Young: Yes, I got it, too. I was going to see who was outside. 102:13:45 Stafford (in Snoopy): You mark that set of features, Gene-o. I'm going to fix us some grape juice. OK? 102:14:10 Young: OK man. I've got you 269 miles (498 km) over the [garble] Man, that's [garble] that's just fabulous. 102:17:58 Cernan (in Snoopy): Boy, that sure is weird music. 102:18:01 Young: We're going to have to find out about that. Nobody will believe us. 102:18:07 Cernan (in Snoopy): No. It's a whistling, you know, like an outer space-type thing. 102:18:10 Young: Probably due to the VHF ranging, I'd guess. Note that Astonaut Young suggests a source of the "music" as the VHF ranging. The VHF radios were dual use: for voice, and for measuring distance (ranging) - between the Command Module and the Lunar Module. As the Apollo program proceeded, redundancy became a requirement for all crew safety functions. One critical period of the Apollo missions was the rendezvous of the Command Module and the Lunar Module. The rendezvous radar provided the critical range, range rate, and angle measurements necessary to complete the rendezvous. Use of a redundant radar for backup was out of the question because of its 80-lb weight. It was, however, found that the voice radios could be adapted to perform the ranging function. Slight modifications of the VHF voice radios and the addition of a ranging interrogator and transponder at a weight of less than 10 lbs total would provide an accuracy of 100-ft rms at several hundred miles. The Apollo VHF ranging system demonstrated that it is feasible to achieve highly accurate range measurements with conventional voice radios. At 7:42 in the attached audio. "You don't hear about anything like that until years after the incident occurs, and then you kind of wonder, because it's such an old memory of those things that you get concerned about if they were making something up or was there something really there? Because you never really know," Worden told The Huffington Post. I wonder why the apollo 15 crew apparently did not know of this sound and its explanation. Had the technicians fixed it in the mean time? So perhaps it WAS Pink Floyd? If it was due to the ranging system (a dual use for the voice radio to measure distance), perhaps they used a different ranging system later. Perhaps they found a way to mute the sound when doing the ranging, like a squelch. I found a copy of Michael Collins' book at the library. In this edition the quote is on page 413. The corresponding conversation can be found on Day 5 page 171 of the Apollo 11 transcripts. NASA released a statement a few hours, ago. Recent news articles have reported that “newly declassified” audiotapes reveal that Apollo 10 astronauts heard “outer-spacey” music as the spacecraft flew around the far side of the moon in 1969. While listed as ‘confidential’ in 1969 at the height of the Space Race, Apollo 10 mission transcripts and audio have been publicly available since 1973. Since the Internet did not exist in the Apollo era, we have only recently provided digital files for some of those earlier missions. The Apollo 10 audio clips were uploaded in 2012, but the mission’s audio recordings have been available at the National Archives since the early 1970s. It says Al Worden doesn't agree with the radio theory. Where does he say he doesn't agree with with the radio theory? The only specific mention he makes of radio is being out of radio contact with Earth. The rest of it is disjointed edits of responses to questions we haven't heard. The noise is caused by interference in the communications between the LM & CSM, and while Al Worden may not have heard of the explanation everyone else involved is happy that it was the VHF ranging system that was being employed. Where does he say he doesn't agree with with the radio theory? The narrator says so in Part 2 at 1:52. Science channel. typical hype for ratings it sounds like to me. The narrator with his oh so deep, 'alarming' voice. I'd like to know if the producers or writers of the show even attempted to speak, to Cernan, Stafford, or Young? I doubt it. It's easier to edit for alternate theories with secondhand accounts. Firsthand witnesses can say "it was this". Others are more likely to give a range of explanations. I've come to hate Discovery Networks.
0.997314
When you look at the market, you should be able to find some popular smartphones on the market now. Here are top 10 best smart phones in 2018 reviews, so you can choose the best smartphone unit easily. There are some good features from this smartphone. This device has 4.3 inches AMOLED touchscreen that is very durable for a long time. Its dual camera is equipped with some features, including autofocus, 8MP sensor, and also LED flash. This smartphone has some useful features from this unit. This smartphone has 4.5 inches qHD display, so you can view HD movies and images from this unit easily. Its multitasking feature allows you to run several apps and games at the same time. Some people are using this smartphone in their daily life. This device is supported by Android OS 4.4 system. It has several features that are useful for all users, including Bluetooth, 5 inches screen, 2 MP camera, GPS, and many other features. This phone has 5.0 inches LCD capacity touch screen, so you can choose any apps or games from this device easily. This unit is supported by powerful quad core processor with 1 GB RAM. This Motorola Droid X smartphone has huge touch display. Its 8 MP camera allows you to have HD video capture and also HD image production easily. This is another popular smartphone from Samsung now. This device has 5.1 inches super AMOLED multi touchscreen that is protected by corning gorilla glass 3. Its quad core processor can accelerate the overall process of this smartphone. This smartphone has modern and stylish look, so you can enjoy your experience with this powerful smartphone. It is supported by Android 4.2 OS that is well-known for its quick processing system. This unlocked smartphone comes with Android 5.0 Lollipop OS. Its 4,000 mAh super battery can provide long lasting performance. It can last for up to 3 days on standard usage. There are some good features from this smartphone. This device has dual core 1 Ghz processor, 5 MP camera, 512 MB RAM, microSD slot, and many other useful features. It is easy for you to use this smartphone in your daily life. This device has some great features, such as quad core processor, dual camera, WiFi system, IPS screen, and also dual SIM slots for supporting your needs.
0.882893
El 12 de agosto, la Fundación de la Laguna de Santa Rosa, en asociación con LandPaths y el Distrito de Preservación Agrícola y Espacio Abierto del Condado de Sonoma, dio la bienvenida a 30 miembros de la comunidad de habla hispana, en su mayoría familias con niños y nuevos al sitio, para una oportunidad única de explorar la Laguna de Santa Rosa. "Vamos Afuera: Aventura en la Laguna" marcó la primera vez que un evento como este sucedió en la Laguna de Santa Rosa, dice Anita Smith, gerente de educación pública de la Fundación Laguna de Santa Rosa. "Fue maravilloso compartir el Centro Ambiental de la Laguna con algunos de nuestros miembros de la comunidad de habla hispana, y hacerles saber que pueden visitar de lunes a viernes, de 9 a.m. a 5 p.m., para disfrutar de un picnic y las vistas", dice Smith. La tarde comenzó con una cordial bienvenida en Heron Hall donde se sirvieron bebidas y refrigerios saludables antes de una breve presentación en español con información sobre todos los socios participantes, incluyendo LandPaths. Luego, todos salieron a la aventura en un área normalmente cerrada al público, cruzando un campo de heno para llegar a Irwin Creek, donde pudieron ver los esfuerzos de restauración con sus propios ojos. Luego tuvimos un picnic al atardecer en la Laguna, antes de que el grupo volviera al anochecer, disfrutando de avistamientos de garzas, ranas arborícolas, pelícanos, lechuzas, buitres, saltamontes y otras criaturas a lo largo del viaje de regreso. "Siempre paso por este lugar porque trabajo cerca, pero nunca supe lo que había aquí", dijo un participante. "¡Gracias por la invitación!" "Nuestros docentes hispanohablantes se conectaron bien con los invitados, y los comentarios que recibimos mostraron que el programa fue muy apreciado por proporcionar una experiencia al aire libre segura y divertida que ayudó a inspirar apreciación por el medio ambiente y una conexión especial con la Laguna de Santa Rosa," Dice Smith. ¡Busca más salidas de Vamos Afuera con LandPaths en el futuro cercano! On August 12, The Laguna Foundation, in partnership with LandPaths and the Sonoma County Ag and Open Space District, welcomed 30 Spanish-speaking community members—mostly families with children, and new to the location—for a unique opportunity to explore the Laguna de Santa Rosa. “Vamos Afuera: Aventura en la Laguna” marked the very first time an event like this has happened at the Laguna de Santa Rosa, says Anita Smith, Public Education Manager for the Laguna de Santa Rosa Foundation. “It was wonderful to share the Laguna Environmental Center with some of our Spanish-speaking community members, and to let them know they can visit Monday through Friday, from 9am to 5pm, to enjoy a picnic and the views,” says Smith. The evening began with a warm welcome at Heron Hall where drinks and healthy snacks were served before a brief presentation in Spanish giving background on all participating partners, including LandPaths. Then everyone headed out to adventure in an area normally closed to the public, crossing a hayfield to get to Irwin Creek, where they were able to see restoration efforts with their own eyes. Then it was on to a sunset picnic on the Laguna, before the group headed back at dusk, enjoying sightings of egrets, tree frogs, pelicans, barn owls, turkey vultures, grasshoppers, and other creatues along the return journey. “Our Spanish-speaking docents connected well with the guests, and the feedback we got showed that the program was greatly appreciated for providing a safe and fun outdoor experience that helped inspire appreciation for the environment—and a special connection to the Laguna de Santa Rosa,” says Smith. Look for more Vamos Afuera outings with LandPaths in the near future! One of LandPaths' very first events of 2018 was a workday to break ground on the Andy's Unity Park Community Garden, which is located within the forthcoming Andy's Unity Park - a new Regional Park in the Moorland neighborhood of Santa Rosa. The neighbors in Moorland advocated for a community garden to be built as part of Andy's Unity Park and LandPaths was asked by the community to oversee the garden portion of the park, after being inspired by our efforts at Bayer Farm. Last Saturday, January 6th, in collaboration with neighbors, members of the Moorland Neighnorhood Action Team and Sonoma County Regional Parks, LandPaths held the first workday at Andy's Unity Park Community Garden. Neighbors broke ground, spread compost, planted seedlings, and shared food together. 5th district Supervisor Lynda Hopkins and her family joined in with shovels and wheelbarrows. Haga un Click aquí para ver más fotografías de este viaje. Click here to see more photos from this year's trip. ¡A través del programa de Vamos Afuera con LandPaths, un grupo de 30 Latino/as del Condado de Sonoma compuesto de familias enteras y 15 jóvenes aventuraron al Parque Nacional de Yosemite! En esta excursión guiada completamente en español el grupo pasó cuatro días y tres noches deleitándose en las maravillas de este estimado parque nacional. Para la mayoría del grupo, este viaje a Yosemite fue el primero e incluso fue su primera experiencia en un campamento nocturno. Aunque la organización de LandPaths puso de su parte el plan logístico y recursos financieros para hacer este viaje posible, fueron los participantes del programa de Vamos Afuera quienes tomaron la iniciativa para hacer este viaje realidad por el segundo año consecutivo. A través de acción de conservación dirigida por la comunidad, LandPaths no sólo puede promover la justicia ambiental sino también fomentar el amor a la tierra aquí en el Condado de Sonoma y más allá a través de diversos programas como Vamos Afuera. Gracias a todos los participantes y patrocinadores que hicieron este viaje posible. For the second year in a row, the LandPaths’ Vamos Afuera program ventured out of Sonoma County with a group of multi-generational Latino/a Sonoma County residents to Yosemite National Park! The group this year was comprised of whole families, including 30 adults and 15 kids. In this four day excursion, led completely in Spanish, the Vamos Afuera group spent four days drinking in the wonders of this treasured National Park. For most it was their first visit to Yosemite and their first camping experience ever! Although LandPaths provided some of the logistical and financial resources to make this trip possible, it was the participant-based initiation that set this trip in motion and made it a reality. Through community-led conservation action, LandPaths is able to not only promote environmental justice but also foster a love of the land here in Sonoma County and beyond through diverse programs such as Vamos Afuera. Thank you to all the participants and the sponsors who made this trip possible. Un fuerte agradecimiento para Straus Family Creamery, Cali Kicks Martial Arts Academy y Bay Area Wilderness Training por apoyarnos en este viaje. Warm thanks to Straus Family Creamery, Cali Kicks Martial Arts Academy and Bay Area Wilderness Training for generously supporting this trip. On Friday evening, August 11, I had the joy and honor of attending a dinner at LandPaths’ Bayer Farm & Community Garden in the Roseland District of Santa Rosa. It was a celebration – ten years to the week when we first planted a handful of radishes, marigolds and broccoli starts – replete with a pop-up farm stand, salsas and sauces from across the Americas and Asia, stewed goat and salads, ‘agua fresca’ and fresh corn tortillas off the grill. It was also ten years to the week when LandPaths’ desire to be a more diverse, inclusive, and culturally open organization turned to action, our thought became a willful and sustained commitment. This dinner – truly reflective of the breadth of cultures and ethnicities comprising Sonoma County - was attended by well over 150 people. We gathered in love of community through shared food and place. As we have all since learned, on this very same evening a torch-filled march exposing a slice of the hate and divisiveness that still exists in America took place in Charlottesville, Virginia. The following day brought tragedy and injury to many others at the hands of hatred. The juxtaposition of the ‘great love and joy of place and community’ that took place at Bayer Farm with the harrowing and heartbreaking events in Charlottesville was as disturbing as it was revealing. We have something to do, and personally, as a community leader, I am impelled to respond as the director of a Community Conservation organization to these events. HOW? It is, simply, to act from the values that underpin our work, and that we express and support in our community each and every day – healing land, knitting communities together, and nurturing a sense of belonging through shared experience, meaningful work and a common purpose. We must continue – through such vehicles as the Bayer Farm, our field-based programs for kids and adults, through access to our nature preserves as “community hubs” to support the evolution of a fair and just community around land, acting with humility and yet boldly to heal both the land and each other, creating a healthy and whole community. There is a real, and, underscore, vital need to continue to build tangible and visible ‘antipodes to the hate and intolerance’ that shook Charlottesville and the world. In response to this hate and fear, over the next months, LandPaths will reach out to existing and new partners, to seek out opportunities to put thought into action, that our work may help bend the “arc of history toward justice.” We ask that you consider joining us – on a monthly basis – to dine outdoors, to break bread together and celebrate the bounty of natural and agricultural beauty that is our region. Click below for events now scheduled. Click here to join the LandPaths' Community Potluck on September 9th at Rancho Mark West.
0.907785
Hermann Minkowski's parents were Lewin Minkowski, a businessman, and Rachel Taubmann. Hermann was his parents' second son, the eldest being Oskar Minkowski who went on to become a famous pathologist. Lewin and Rachel Minkowski were Germans although their son Hermann was born while they were living in Russia. When Hermann was eight years old the family returned to Germany and settled in Königsberg where Lewin Minkowski conducted his business. Minkowski first showed his talent for mathematics while studying at the Gymnasium in Königsberg. Already at this stage in his education he was reading the work of Dedekind , Dirichlet and Gauss . The outstanding abilities he showed at this time were noted in a letter that Heinrich Weber , then at Königsberg University, wrote to Dedekind in 1881 (see ). He studied at the University of Königsberg, entering the university in April 1880. He spent three semesters at the University of Berlin, for example spending the winter semester of the academic year 1882-83 there. His became close friends with Hilbert while at Königsberg, for Hilbert was an undergraduate at the same time as Minkowski. In 1884, while he was a student at Königsberg, Hurwitz was appointed to the staff. The student Minkowski soon became close friends with the newly appointed academic Hurwitz . He received his doctorate in 1885 from Königsberg for a thesis entitled Untersuchungen über quadratische Formen, Bestimmung der Anzahl verschiedener Formen, welche ein gegebenes Genus enthält. Minkowski became interested in quadratic forms early in his university studies. In 1881 the Academy of Sciences (Paris) announced that the Grand Prix for mathematical science to be awarded in 1883 would be for a solution to the problem of the number of representations of an integer as the sum of five squares. Eisenstein had given a formula for the number of such representations in 1847, but he had not given a proof of the result. In fact the Academy of Sciences had set a problem for the Grand Prix which had already been solved, for Henry Smith had published an outline of a proof in 1867. However the Academy of Sciences were unaware of Smith 's contributions when the prize topic was set. Eisenstein had been studying quadratic forms in n variables with integer coefficients at the time he published his unproved formula in 1847 but as he was already ill by this time details were never published. Minkowski, although only eighteen years old at the time, reconstructed Eisenstein 's theory of quadratic forms and produced a beautiful solution to the Grand Prix problem. Smith reworked his earlier proof, adding detail and submitted that to the Academy. The decision was that the prize be shared between Minkowski and Smith but this was a stunning beginning to Minkowski's mathematical career. On 2 April 1883 the Academy granted the Grand Prize in Mathematics jointly to the the young Minkowski at the start of his career and the elderly Smith at the end of his. Minkowski's doctoral thesis, submitted in 1885, was a continuation of this prize winning work involving his natural definition of the genus of a form. After the award of his doctorate, he continued undertaking research at Königsberg. This lecture is particularly interesting, for it contains the first example of the method which Minkowski would develop some years later in his famous "geometry of numbers". Minkowski taught at Bonn from 1887, being promoted to assistant professor in 1892. Two years later he moved back to Königsberg where he taught for two years before being appointed to the Eidgenössische Polytechnikum Zürich. There he became a colleague of his friend Hurwitz who had been appointed to fill Frobenius ' chair after he left Zürich for Berlin in 1892. Einstein was a student in several of the courses he gave and the two would later become interested in similar problems in relativity theory. Minkowski married Auguste Adler in Strasburg in 1897; they had two daughters, Lily born in 1898 and Ruth born in 1902. The family left Zürich in the year that their second daughter was born for Minkowski accepted a chair at the University of Göttingen in 1902. It was Hilbert who arranged for the chair to be created specially for Minkowski and he held it for the rest of his life. At Göttingen he became interested in mathematical physics gaining enthusiasm from Hilbert and his associates. He participated in a seminar on electron theory in 1905 and he learnt the latest results and theories in electrodynamics. A key point of the paper is the difference in approach to physical problems taken by mathematical physicists as opposed to theoretical physicists. In a paper published in 1908 Minkowski reformulated Einstein 's 1905 paper by introducing the four-dimensional (space-time) non-Euclidean geometry, a step which Einstein did not think much of at the time. But more important is the attitude or philosophy that Minkowski, Hilbert - with whom Minkowski worked for a few years - Felix Klein and Hermann Weyl pursued, namely, that purely mathematical considerations, including harmony and elegance of ideas, should dominate in embracing new physical facts. Mathematics so to speak was to be master and physical theory could be made to bow to the master. Put otherwise, theoretical physics was a subdomain of mathematical physics, which in turn was a subdiscipline of pure mathematics. In this view Minkowski followed Poincaré whose philosophy was that mathematical physics, as opposed to theoretical physics, can furnish new physical principles. This philosophy would seem to be a carry-over (modified of course) from the Eighteenth Century view that the world is designed mathematically and hence that the world must obey principles and laws which mathematicians uncover, such as the principle of least action of Maupertuis , Lagrange and Hamilton . Einstein was a theoretical physicist and for him mathematics must be suited to the physics. In the early years of his scientific career, Albert Einstein considered mathematics to be a mere tool in the service of physical intuition. In later years, he came to consider mathematics as the very source of scientific creativity. A main motive behind this change was the influence of two prominent German mathematicians: David Hilbert and Hermann Minkowski. What would have the greatest impact would be an attempt to give a preview of the future, i.e. a sketch of the problems with which future mathematicians should occupy themselves. In this way you could perhaps make sure that people would talk about your lecture for decades in the future. Time has certainly proved Minkowski correct! Minkowski's original mathematical interests were in pure mathematics and he spent much of his time investigating quadratic forms and continued fractions . His most original achievement, however, was his 'geometry of numbers' which he initiated in 1890. Geometrie der Zahlen was first published in 1910 but the first 240 pages (of the 256) appeared as the first section in 1896. Geometrie der Zahlen was reprinted in 1953 by Chelsea, New York, and reprinted again in 1968. Minkowski published Diophantische Approximationen: Eine Einführung in die Zahlentheorie in 1907. It gave an elementary account of his work on the geometry of numbers and of its applications to the theories of Diophantine approximation and of algebraic numbers. Work on the geometry of numbers led on to work on convex bodies and to questions about packing problems, the ways in which figures of a given shape can be placed within another given figure. At the young age of 44, Minkowski died suddenly from a ruptured appendix.
0.999725
How is compensation in a car injury case different from other cases? They pretty similar, to be honest. However, one big difference is that the insurance policies for car accident cases usually have lower limits. For example, Nevada only requires that drivers carry $25,000 per person in bodily injury liability insurance. In many cases, this insurance policy is the upper limit that a person can recover. Of course, you might also have underinsured motorist insurance, which can significantly increase the amount of compensation available, especially if you have a “stackable” insurance policy. In other cases, such as personal injuries in a business, the insurance policies should have higher limits. The same is also true with someone’s homeowners’ insurance policy for injuries sustained on someone’s property.
0.833467
The KC-135 entered service with the United States Air Force (USAF) in 1957; it is one of six military fixed-wing aircraft with over 50 years of continuous service with its original operator. The KC-135 is supplemented by the larger KC-10. Studies have concluded that many of the aircraft could be flown until 2040, although maintenance costs have greatly increased. The KC-135 is to be partially replaced by the Boeing KC-46 Pegasus. Like its sibling, the commercial Boeing 707 jet airliner, the KC-135 was derived from the Boeing 367-80 jet transport "proof of concept" demonstrator, which was commonly called the "Dash-80". The KC-135 is similar in appearance to the 707, but has a narrower fuselage and is shorter than the 707. The KC-135 predates the 707, and is structurally quite different from the civilian airliner. Boeing gave the future KC-135 tanker the initial designation Model 717. In 1954 USAF's Strategic Air Command (SAC) held a competition for a jet-powered aerial refueling tanker. Lockheed's tanker version of the proposed Lockheed L-193 airliner with rear fuselage-mounted engines was declared the winner in 1955. Since Boeing's proposal was already flying, the KC-135 could be delivered two years earlier and Air Force Secretary Harold E. Talbott ordered 250 KC-135 tankers until the Lockheed's design could be manufactured. In the end, orders for the Lockheed tanker were dropped rather than supporting two tanker designs. Lockheed never produced its jet airliner, while Boeing would eventually dominate the market with a family of airliners based on the 707. In 1954, the Air Force placed an initial order for 29 KC-135As, the first of an eventual 820 of all variants of the basic C-135 family. The first aircraft flew in August 1956 and the initial production Stratotanker was delivered to Castle Air Force Base, California, in June 1957. The last KC-135 was delivered to the Air Force in 1965. Developed in the early 1950s, the basic airframe is characterized by 35-degree aft swept wings and tail, four underwing-mounted engine pods, a horizontal stabilizer mounted on the fuselage near the bottom of the vertical stabilizer with positive dihedral on the two horizontal planes and a hi-frequency radio antenna which protrudes forward from the top of the vertical fin or stabilizer. These basic features make it strongly resemble the commercial Boeing 707 and 720 aircraft, although it is actually a different aircraft. Reconnaissance and command post variants of the aircraft, including the RC-135 Rivet Joint and EC-135 Looking Glass aircraft were operated by SAC from 1963 through 1992, when they were reassigned to the Air Combat Command (ACC). The USAF EC-135 Looking Glass was subsequently replaced in its role by the U.S. Navy E-6 Mercury aircraft, a new build airframe based on the Boeing 707-320B. All KC-135s were originally equipped with Pratt & Whitney J-57-P-59W turbojet engines, which produced 10,000 lbf (44 kN) of thrust dry, and approximately 13,000 lbf (58 kN) of thrust wet. Wet thrust is achieved through the use of water injection on takeoff, as opposed to "wet thrust" when used to describe an afterburning engine. 670 US gallons (2,500 L) of water are injected into the engines over the course of three minutes. The water is injected into the inlet and the diffuser case in front of the combustion case. The water cools the air in the engine to increase its density; it also reduces the turbine gas temperature, which is a primary limitation on many jet engines. This allows the use of more fuel for proper combustion and creates more thrust for short periods of time, similar in concept to "War Emergency Power" in a piston-engined aircraft. A nose-on view of several reworked KC-135R aircraft taxiing prior to takeoff. The new engines are CFM56-2 high-bypass turbofans. In the 1980s the first modification program retrofitted 157 Air Force Reserve (AFRES) and Air National Guard (ANG) tankers with the Pratt & Whitney TF-33-PW-102 turbofan engines from 707 airliners retired in the late 1970s and early 1980s. The modified tanker, designated the KC-135E, was 14% more fuel-efficient than the KC-135A and could offload 20% more fuel on long-duration flights. (The difference is that the A-model's empty weight is 104,000 lb (47,000 kg), while the E-model has an empty weight of 115,000 lb (52,000 kg); both have the same maximum takeoff weight. Therefore, the A-model could take off with a maximum fuel load of 200,000 lb (91,000 kg), while the E-model could take off with a fuel load of only up to 190,000 lb (86,000 kg).) Only the KC-135E aircraft were equipped with thrust-reversers for aborted takeoffs and shorter landing roll-outs. The KC-135E fleet has since either been retrofitted as the R-model configuration or placed into long-term storage ("XJ"), as Congress has prevented the Air Force from formally retiring them. The final KC-135E, tail number 56-3630, was delivered by the 101st Air Refueling Wing of the Maine Air National Guard to the 309th Aerospace Maintenance and Regeneration Group (AMARG) at Davis–Monthan Air Force Base in September 2009. The second modification program retrofitted 500 aircraft with new CFM International CFM56 (military designation: F108) high-bypass turbofan engines produced by General Electric and Snecma. The CFM56 engine produces approximately 22,500 lbf (100 kN) of thrust, nearly a 100% increase compared to the original J-57 engine. The modified tanker, designated KC-135R (modified KC-135A or E) or KC-135T (modified KC-135Q), can offload up to 50% more fuel (on a long-duration sortie), is 25% more fuel-efficient, and costs 25% less to operate than with the previous engines. It is also significantly quieter than the KC-135A, with noise levels at takeoff reduced from 126 to 99 decibels. No longer in consideration, upgrading the remaining KC-135Es into KC-135Rs would have cost about US$3 billion, about $24 million per aircraft. According to Air Force data, the KC-135 fleet had a total operation and support cost in fiscal year 2001 of about $2.2 billion. The older E model aircraft averaged total costs of about $4.6 million per aircraft, while the R models averaged about $3.7 million per aircraft. Those costs include personnel, fuel, maintenance, modifications, and spare parts. In order to expand the KC-135's capabilities and improve its reliability, the aircraft has undergone a number of avionics upgrades. Among these was the Pacer-CRAG program (CRAG=Compass, Radar And GPS) which ran from 1999 to 2002 and modified all the aircraft in the inventory to eliminate the Navigator position from the flight crew. The fuel management system was also replaced. The program development was done by Rockwell Collins in Iowa and installation was performed by BAE Systems at the Mojave Airport in California. Block 40.6 allows the KC-135 to comply with Global air-traffic management. The latest block upgrade to the KC-135, the Block 45 program, is online with the first 45 upgraded aircraft delivered by January 2017. Block 45 adds a new glass cockpit digital display, radio altimeter, digital autopilot, digital flight director and computer updates. The original, no longer procurable, analog instruments, including all engine gauges, were replaced. Rockwell Collins again supplied the major avionic modules and the modification work is being done at Tinker AFB. The KC-135Q variant was modified to carry JP-7 fuel necessary for the Lockheed SR-71 Blackbird by separating the JP-7 from the KC-135's own fuel supply (the body tanks carrying JP-7, and the wing tanks carrying JP-4 or JP-8). The tanker also had special fuel systems for moving the different fuels between different tanks. When the KC-135Q model received the CFM-56 engines, it was redesignated the KC-135T model, which was capable of separating the main body tanks from the wing tanks where the KC-135 draws its engine fuel. The only external difference between a KC-135R and a KC-135T is the presence of a clear window on the underside of the empennage of the KC-135T where a remote controlled searchlight is mounted. It also has two ground refueling ports, located in each rear wheel well so ground crews can fuel both the body tanks and wing tanks separately. Eight KC-135R aircraft are receiver-capable tankers, commonly referred to as KC-135R(RT). All eight aircraft were with the 22d Air Refueling Wing at McConnell AFB, Kansas, in 1994. They are primarily used for force extension and Special Operations missions, and are crewed by highly qualified receiver capable crews. If not used for the receiver mission, these aircraft can be flown just like any other KC-135R. The Multi-point Refueling Systems (MPRS) modification adds refueling pods to the KC-135's wings. The pods allow refueling of U.S. Navy, U.S. Marine Corps and most NATO tactical jet aircraft while keeping the tail-mounted refueling boom. The pods themselves are Flight Refueling Limited (FRL) MK.32B model pods, and refuel via the probe and drogue method common to USN/USMC tactical jets, rather than the primary "flying boom" method used by USAF fixed-wing aircraft. This allows the tanker to refuel two receivers at the same time, which increases throughput compared to the boom drogue adapter. A number of KC-135A and KC-135B aircraft have been modified to EC-135, RC-135 and OC-135 configurations for use in several different roles (although these could also be considered variants of the C-135 Stratolifter family). The KC-135R has four turbofan engines, mounted under 35-degree swept wings, which power it to takeoffs at gross weights up to 322,500 pounds (146,300 kg). Nearly all internal fuel can be pumped through the tanker's flying boom, the KC-135's primary fuel transfer method. A special shuttlecock-shaped drogue, attached to and trailing behind the flying boom, may be used to refuel aircraft fitted with probes. This apparatus is significantly more unforgiving of pilot error in the receiving aircraft than conventional trailing hose arrangements; an aircraft so fitted is also incapable of refueling by the normal flying boom method until the attachment is removed. A boom operator stationed in the rear of the aircraft controls the boom while lying prone. A cargo deck above the refueling system can hold a mixed load of passengers and cargo. Depending on fuel storage configuration, the KC-135 can carry up to 83,000 pounds (38,000 kg) of cargo. The KC-135 was initially purchased to support bombers of the Strategic Air Command, but by the late 1960s, in the Southeast Asia theater, the KC-135 Stratotanker's ability as a force multiplier came to the fore. Midair refueling of F-105 and F-4 fighter-bombers as well as B-52 bombers brought far-flung bombing targets within reach, and allowed fighter missions to spend hours at the front, rather than a few minutes, which was usual due to their limited fuel reserves and high fuel consumption. KC-135 crews refueled both Air Force and Navy / Marine Corps aircraft; though they would have to change to probe and drogue adapters depending upon the mission, the Navy and Marine Corps not having fitted their aircraft with flying boom receptacles since the USAF boom system was impractical for aircraft carrier operations. Crews also helped to bring in damaged aircraft which could sometimes fly while being fed by fuel to a landing site or to ditch over the water (specifically those with punctured fuel tanks). KC-135s continued their tactical support role in later conflicts such as Operation Desert Storm and current aerial strategy. The Strategic Air Command (SAC) had the KC-135 Stratotanker in service with Regular Air Force SAC units from 1957 through 1992 and with SAC-gained Air National Guard (ANG) and Air Force Reserve (AFRES) units from 1975 through 1992. Following a major USAF reorganization that resulted in the inactivation of SAC in 1992, most KC-135s were reassigned to the newly created Air Mobility Command (AMC). While AMC gained the preponderance of the aerial refueling mission, a small number of KC-135s were also assigned directly to United States Air Forces in Europe (USAFE), Pacific Air Forces (PACAF) and the Air Education and Training Command (AETC). All Air Force Reserve Command (AFRC) KC-135s and most of the Air National Guard (ANG) KC-135 fleet became operationally-gained by AMC, while Alaska Air National Guard and Hawaii Air National Guard KC-135s became operationally-gained by PACAF. Air Mobility Command (AMC) manages 414 Stratotankers, of which the Air Force Reserve Command (AFRC) and Air National Guard (ANG) fly 247 in support of AMC's mission as of May 2014. The KC-135 is one of a few military aircraft types with over 50 years of continuous service with its original operator as of 2009. Israel was offered KC-135s again in 2013, after turning down the aging aircraft twice due to expense of keeping them flying. The IAF again rejected the offered KC-135Es, but said that it would consider up to a dozen of the newer KC-135Rs. Besides its primary role as an inflight aircraft refueler, the KC-135, designated NKC-135, has assisted in several research projects at the NASA Dryden Flight Research Center at Edwards Air Force Base, California. One such project occurred between 1979 and 1980 when special wingtip "winglets", developed by Richard Whitcomb of the Langley Research Center, were tested at Dryden, using an NKC-135A tanker loaned to NASA by the Air Force. Winglets are small, nearly vertical fins installed on an aircraft's wing tips. The results of the research showed that drag was reduced and range could be increased by as much as 7 percent at cruise speeds. Winglets are now being incorporated into most new commercial and military transport/passenger jets, as well as business aviation jets. NASA also has operated several KC-135 aircraft (without the tanker equipment installed) as their famed Vomit Comet zero-gravity simulator aircraft. The longest-serving (1973 to 1995) version was KC-135A, AF Ser. No. 59-1481, named Weightless Wonder IV and registered as N930NA. The Air Force projected that E and R models have lifetime flying hour limits of 36,000 and 39,000 hours, respectively. According to the Air Force, only a few KC-135s would reach these limits by 2040, when some aircraft would be about 80 years old. The Air Force estimated that their current fleet of KC-135s have between 12,000 and 14,000 flying hours on them-only 33 percent of the lifetime flying hour limit. Between 1993 and 2003, the amount of KC-135 depot maintenance work doubled, and the overhaul cost per aircraft tripled. In 1996, it cost $8,400 per flight hour for the KC-135, and in 2002 this had grown to $11,000. The Air Force’s 15-year estimates project further significant cost growth through fiscal year 2017. KC-135 fleet operations and support costs are estimated to grow from about $2.2 billion in fiscal year 2003 to $5.1 billion (2003 dollars) in fiscal year 2017, an increase of over 130 percent, which represents an annual growth rate of about 6.2 percent. In 2006, the KC-135E fleet was flying an annual average of 350 hours per aircraft and the KC-135R fleet was flying an annual average of 710 hours per aircraft. The KC-135 fleet is currently flying double its planned yearly flying hour program to meet airborne refueling requirements, and has resulted in higher than forecast usage and sustainment costs. In March 2009, the Air Force indicated that KC-135s would require additional skin replacement to allow their continued use beyond 2018. The USAF decided to replace the KC-135 fleet. However, the KC-135 fleet is large and will need to be replaced gradually. Initially the first batch of replacement planes was to be an air tanker version of the Boeing 767, leased from Boeing. In 2003, this was changed to contract where the Air Force would purchase 80 KC-767 aircraft and lease 20 more. In December 2003, the Pentagon froze the contract and in January 2006, the KC-767 contract was canceled. This followed public revelations of corruption in how the contract was awarded, as well as controversy regarding the original leasing rather than outright purchase agreement. Then Secretary of Defense Rumsfeld stated that this move will in no way impair the Air Force's ability to deliver the mission of the KC-767, which will be accomplished by continuing upgrades to the KC-135 and KC-10 Extender fleet. In January 2007, the U.S. Air Force formally launched the KC-X program with a request for proposal (RFP). KC-X is first phase of three acquisition programs to replace the KC-135 fleet. On 29 February 2008, the US Defense Department announced that it had selected the EADS/Northrop Grumman "KC-30" (to be designated the KC-45A) over the Boeing KC-767. Boeing protested the award on 11 March 2008, citing irregularities in the competition and bid evaluation. On 18 June 2008, the US Government Accountability Office sustained Boeing's protest of the selection of the Northrop Grumman/EADS's tanker. In February 2010, the US Air Force restarted the KC-X competition with the release of a revised request for proposal (RFP). After evaluating bids, the USAF selected Boeing's 767-based tanker design, with the military designation KC-46, as a replacement in February 2011. The first KC-46A Pegasus was delivered to the U.S. Air Force on 10 January 2019. Two foreign users of the KC-135, the French Air Force and the Republic of Singapore Air Force are taking deliveries of Airbus A330 MRTTs as replacements for their Stratotankers. Original production version powered by four Pratt & Whitney J57s, 732 built. Given the Boeing model numbers 717-100A, 717-146 and 717-148. Airborne command post version equipped with turbofan engines, 17 built. Provided with in-flight refueling capability and redesignated EC-135C. Given the model number 717-166. All four RC-135As (Pacer Swan) were modified to partial KC-135A configuration in 1979. The four aircraft (serial numbers 63-8058, 63-8059, 63-8060 and 63-8061) were given a unique designation KC-135D as they differed from the KC-135A in that they were built with a flight engineer's position on the flight deck. The flight engineer's position was removed when the aircraft were modified to KC-135 standards but they retained their electrically powered wing flap secondary (emergency) drive mechanism and second air conditioning pack which had been used to cool the RC-135As on-board photo-mapping systems. Later re-engined with Pratt & Whitney TF33 engines and a cockpit update to KC-135E standards in 1990 and were retired to the 309th AMARG at Davis-Monthan AFB, AZ in 2007. Air National Guard and Air Force Reserve KC-135As re-engined with Pratt & Whitney TF-33-PW-102 engines from retired 707 airliners (161 modified). All E model aircraft were retired to the 309th AMARG at Davis-Monthan AFB by September 2009 and replaced with R models. 4 JC/KC-135As converted to Rivet Stand (Later Rivet Quick) configuration for reconnaissance and evaluation of above ground nuclear test (55-3121, 59-1465, 59-1514, 58-0126; 58-0126 replaced 59-1465 after it crashed in 1967). These aircraft were powered by Pratt & Whitney J57 Engines and were based at Offutt AFB, Nebraska. KC-135As and some KC-135Es re-engined with CFM-56 engines, at least 361 converted. Receiver-capable KC-135R Stratotanker; eight modified with either a Boeing or LTV receiver system and a secure voice SATCOM radio. Three of the aircraft (60-0356, -0357, and -0362) were converted to tankers from RC-135Ds, from which they retained their added equipment. An airborne command post modified in 1984 to support CINCCENT. Aircraft 55-3125 was the only EC-135Y. Unlike its sister EC-135N, it was a true tanker that could also receive in-flight refueling. Pratt & Whitney TF-33-PW-102. Currently retired to 309th AMARG at Davis-Monthan AFB, AZ. Chilean Air Force operates 3 KC-135Es. It received its first KC-135E in February 2010. French Air Force operates 11 C-135FRs and 3 KC-135Rs. Republic of Singapore Air Force operates 4 former USAF KC-135R tankers; they are occasionally used as VIP, aeromedical transports and military support. Turkish Air Force operates 7 KC-135Rs. United States Air Force operates 398 KC-135s (156 Active duty, 70 Air Force Reserve, and 172 Air National Guard) as of May 2017[update]. For accidents involving other C-135 variants, see Boeing C-135 Stratolifter, Boeing RC-135, Boeing EC-135, Boeing NC-135, and Boeing WC-135 Constant Phoenix. On 27 June 1958, USAF KC-135A, serial number 56-3599, stalled and crashed at Westover Air Force Base after the crew failed to retract the flaps on takeoff, killing all 15 on board. The aircraft was attempting a world speed record between New York and London. On 31 March 1959, USAF KC-135A, 58-0002, entered a thunderstorm near Killeen, Texas. Two engines separated and one of the engines struck the tail, causing loss of control. The aircraft crashed on a hillside, killing all four crew on board. The aircraft had been delivered just six weeks before the accident. On 15 October 1959, USAF KC-135A, 57-1513, collided in mid-air with B-52F 57-0036 at 32,000 feet over Leitchfield, Kentucky, killing all six on board both aircraft. On 3 February 1960, USAF KC-135A, 56-3628, crashed on takeoff in extremely gusty crosswind conditions at Roswell-Walker AFB, NM. The airplane skidded into two other KC-135 tankers (57-1449 and 57-1457) and a hangar and burst into flames. The aircraft was on a training flight, but the instructor pilot was occupying the jump seat instead of one of the pilot seats as directed by the local commander. The destruction of three aircraft, along with six fatalities among the crew and an additional two on the ground made this a unique mishap. On 18 November 1960, USAF KC-135A, 56-3605, crashed on landing at Loring Air Force Base due to an excessive sink rate, killing one of 17 on board. On 9 May 1962, USAF KC-135A, 56-3618, crashed on takeoff from Loring Air Force Base due to engine failure, killing all six on board. On 10 September 1962, USAF KC-135A, 60-0352 on a flight from Ellsworth Air Force Base to Fairchild Air Force Base crashed into a mountain just 20 miles (32 km) northeast of Spokane, Washington. The flight hit fog on approach to the air base and hit Mount Kit Carson, a 5,271 ft mountain. The crash killed all four crew and 40 passengers on board. On 27 February 1963, USAF KC-135A, 56-3597, crashed on takeoff at Eielson Air Force Base due to engine separation, killing all seven on board; two on the ground died when debris from the crash struck a guard house and nearby waiting room. On 21 June 1963, USAF KC-135A-BN Stratotanker, 57-1498 out of Westover AFB crashed on approach during a training flight in a wooded area near Belchertown, MA. One of the four occupants was killed. On 28 August 1963, USAF KC-135A, 61-0322, collided in mid-air with KC-135A 61-0319 300 miles west of Bermuda, killing all 11 on board both aircraft. On 8 July 1964, USAF KC-135A, 60-0340, collided in mid-air with F-105 Thunderchief 61-0091 during in-flight refueling over Death Valley, California, killing all five on board both aircraft. On 4 January 1965, USAF KC-135A, 61-0265, crashed on climbout from Loring Air Force Base after two engines separated, killing all four on board. On 16 January 1965, USAF KC-135A 57-1442, crashed after its rudder control system suffered a malfunction shortly after takeoff from McConnell Air Force Base, Kansas. The fuel-laden plane crashed at a street intersection and caused a considerable fire. A total of 30 were killed, including 23 on the ground and the seven member crew. On 26 February 1965, USAF KC-135A, 63-8882, collided in mid-air with B-47E 52-0171 over the Atlantic Ocean, killing all eight on board both aircraft. On 3 June 1965, USAF KC-135A, 63-0842, lost electrical power on takeoff and crashed at Walker Air Force Base, killing all five on board. On 17 January 1966, a fatal collision occurred between a B-52G, 58-0256, and a KC-135A, 61-0273, flying out of Moron AB, Spain while flying over Palomares, Spain. The B-52G was on an Operation Chrome Dome mission, which required multiple air refuelings. The mishap caused both aircraft to break up in mid-air and killed all four crew members on the KC-135A and three of the seven on the B-52G, while causing radiological contamination, as a nuclear weapon had to be recovered from the sea nearby. On 19 May 1966, USAF KC-135A, 57-1444, of 4252nd Strategic Wing, crashed on takeoff from Kadena Air Base, killing all 11 on board as well as a motorist on nearby Highway 16. The aircraft was bound for Yokota Air Base to repair a KC-135 when it lifted off too soon during a heavy-weight takeoff. On 19 January 1967, USAF KC-135A, 56-3613, crashed into Shadow Mountain, foothill of Mount Spokane (elevation 4,340 ft MSL) while descending towards Fairchild Air Force Base, killing all nine on board. On 17 January 1968, USAF KC-135A, 58-0026, stalled and crashed at Minot Air Force Base after the pilot, 15th Air Force Vice Commander MGen Charles Eisenhart, overrotated the aircraft during takeoff in a snowstorm, killing all 13 on board. This accident was instrumental in the decision to refit the KC-135 fleet with the Collins FD-109(V) integrated flight director system, in place of the earlier "round dial" cockpit layout. On 30 July 1968, USAF KC-135A, 56-3655, crashed on Mount Lassen after the vertical stabilizer broke off after a sharp turn while practicing an emergency descent, killing all nine on board. On 24 September 1968, USAF KC-135A, "55-3133A", crashed on landing at Wake Island, Micronesia. Aircraft developed engine problems while en route from Andersen AFB, Guam to Hickam AFB, HI and during landing at Wake Island the aircraft contacted the surface of the water and bounced onto the east end of the runway. There were 11 fatalities out 56 persons on board. On 1 October 1968, USAF KC-135A, 55-3138, struck concrete and steel light poles on takeoff and crashed at U-Tapao Airport, Thailand after a loss of power in an engine and resultant loss of control, killing all four on board. On 22 October 1968, USAF KC-135A, 61-0301, flew into a mountain while descending to Ching Chuan Kang Air Base, Taiwan, killing all six on board. On 19 December 1969, USAF KC-135A, 56-3629, crashed into the sea on climbout from Ching Chuan Kang Air Base due to low-level windshear, killing all four on board. On 3 June 1971, USAF KC-135Q, 58-0039, exploded in mid-air and crashed at Centenera, Spain, killing all five on board. On 13 March 1972, KC-135A, 58-0048, crashed while landing at Carswell AFB. Its right wing struck the ground, which led to the airplane exploding and killing all 5 on board. On 8 March 1973, USAF KC-135A, 63-7989, collided with KC-135 63-7980 on the ramp at Lockbourne Air Force Base and caught fire, killing two of five on board. On 7 December 1975, USAF KC-135A, 60-0354, from Plattsburgh AFB, NY, crashed after takeoff at Eielson AFB, AK, killing all four crewmembers. Launch was delayed because of problems with the receiver aircraft. The KC-135 was required to sit at the end of the runway in extremely cold weather, without heat, with engines shut down. Repeated requests for a mobile heat source were denied by the command post. Landing gear failed to retract after takeoff. Crewmembers may have suffered from hypothermia. On 6 February 1976, USAF KC-135A, 60-0368, flew into a mountain while descending to Torrejon Air Base, Spain, killing all seven on board. The aircraft was assigned to the 410th BMW/46th AREFS at K.I. Sawyer AFB, Michigan, but, as is often the case on Tanker Task Force deployed operations, the flight crew was from another SAC unit at Seymour-Johnson AFB, NC. Only two aircraft crew chiefs on board were from K I Sawyer AFB, MI. On 26 September 1976, USAF KC-135A, 61-0296, crashed while on approach to Wurtsmith Air Force Base, Michigan, killing 15 passengers and flight crew on board. The aircraft was flying a "First Team" mission taking 10 passengers to HQ-Strategic Air Command for briefings and orientation. The crew became distracted by a cabin pressurization problem after an intermediate stop and descended into a wooded area about 12 miles southwest of Alpena, Michigan. There was one survivor, reportedly a crew chief who was in the boom operator aft station (boom pod) at the time of the crash. On 29 April 1977, USAF KC-135A, 58-0101 from Castle AFB hit five or six cows while practicing night takeoffs and landings at Beale AFB. Takeoff was aborted and the plane overran the runway and caught on fire. Of the crew of 7, there were no fatalities. During that time cattle strayed through a broken fence from a nearby field and onto the runway. On 19 September 1979, USAF KC-135A, 58-0127, from Castle AFB crashed on the runway during a simulated engine failure on a training flight, killing 15 of 20 occupants on board. On 13 March 1982, Arizona ANG KC-135A, 57-1489 collided in mid-air with a civilian Grumman-American AA-1 Yankee near Luke AFB, AZ. The collision, which occurred as the tanker was descending on an IFR flight plan through an undercast, was struck by the civilian aircraft operating VFR just below the cloud deck, causing the tail of the KC-135 to be severed by the force of the impact. The two civilians on the AA-1 and four military personnel on the KC-135 were killed. Included among the dead was the squadron commander of the 197th AREFS, Lt Col James N. Floor. On 19 March 1982, USAF KC-135A, 58-0031, exploded in mid-air at 13,700 feet and crashed at Greenwood, Illinois, due to a possible overheated fuel pump, killing all 27 on board. On 28 August 1985, USAF KC-135A 59-1443 was damaged beyond repair when a student pilot allowed an engine to contact the runway during a landing attempt at Beale Air Force Base near Marysville, California. During the go-around the instructor lost control of the aircraft while performing checklist items for an in-flight fire. All seven (three instructors and four students) aboard the aircraft died in the crash. On 17 June 1986, USAF KC-135A,63-7983, crashed while en route to Howard AFB, Panama. It struck a hill south of the nearby Rodman Naval Station, killing all four crew members on board. The tanker and crew were based at Grissom Air Force Base, Indiana. On 13 March 1987, USAF KC-135A, 60-0361, crashed at Fairchild Air Force Base after encountering wake turbulence from a B-52, while practicing a low-level refueling display. The aircraft rolled 80 degrees to the left, which stalled both left side engines (#1 and #2). The crew was able to recover to wings level, but were too low and impacted the ground in an open area of the base. The accident killed all six on board and one person on the ground. On 11 October 1988, USAF KC-135A, 60-0317, crashed at Wurtsmith Force Base after a hard landing following a steep approach in severe crosswind. The airplane went off the side of the runway and broke up. A fire erupted and killed all six crewmembers on board, while 10 passengers were able to jump to safety. Pilot error was determined as the cause of the accident. On 31 January 1989, a USAF KC-135A, 63-7990, crashed on takeoff from Dyess AFB, TX after the water-injection system for the Pratt & Whitney J-57 engines failed and the remaining "dry" thrust was insufficient for flight at the takeoff gross weight. The mission was scheduled as a non-stop flight to Hickam AFB/Honolulu HI with an en route F-16 air refueling mission. In addition to the 7 crew members, 12 passengers, including military spouses, retired military members and one child, were killed. The aircraft and crew were based at K I Sawyer AFB, MI. On 20 September 1989, USAF KC-135E, 57-1481, exploded on the ground at Eielson Air Force Base due to an overheated fuel pump, killing two of seven on board. The crew was shutting down the engines when the explosion occurred. On 4 October 1989, a KC-135A Stratotanker, 56-3592, from en route from Loring Air Force Base crashed into a hill along the west side of Trans-Canada Highway 2 2 mi (3.2 km) north of Perth-Andover, New Brunswick in Carlingford, New Brunswick due to an overheated fuel pump, killing all four crew members. After five accidents involving fuel pump overheating, crews were to keep 3000 pounds of fuel in the tank. On January 11, 1990, a KC-135A, 59-149, caught fire on the tarmac at Pease Air National Guard Base during maintenance work; there were no injuries, however the aircraft was destroyed. On 13 January 1999, a Washington Air National Guard KC-135E, 59-1452, crashed on approach in Geilenkirchen, Germany due to the horizontal stabilizer being in a 7.5 nose-up trim condition, killing 4 crew members. On 7 April 1999, an Air National Guard KC-135R, 57-1418, was damaged beyond repair while undergoing a cabin pressurization check while in depot maintenance at the Oklahoma City Air Logistics Center at Tinker AFB, Oklahoma. During a previous maintenance event, the pressure relief valves were secured shut and not released afterwards. This created a catastrophic explosion that nearly separated the empennage from the aircraft and destroyed the aft fuselage section. No personnel were injured or killed during the mishap, but the aircraft was a total loss. On 26 September 2006, a USAF KC-135R, 63-8886, was damaged beyond economical repair when it was struck by a Tupolev Tu-154 of Altyn Air, EX-85718, while stopped on a taxiway after landing at Manas Air Base. As the Tu-154 took off, its right wing struck the fairing of the KC-135R's No. 1 engine. The force of the impact nearly severed the No. 1 engine and destroyed a portion of the left wing. The resulting fire caused extensive damage to the KC-135. The Tu-154 lost about 6 feet of its right wingtip, but was able to get airborne and return to the airport for an emergency landing. The tanker crew had been directed to use a taxiway which was not usable for night operations and the controller failed to note that they reported "holding short" of that taxiway, rather than "clear of" that point. The crew of the KC-135 evacuated the aircraft without serious injuries. On 3 May 2013, a McConnell AFB, KS (USAF) KC-135R, 63-8877, flown by a Fairchild AFB, Washington aircrew, broke up in flight about eight minutes after taking off from Manas Air base in Kyrgyzstan, killing all three crew members. After investigation, it was determined that a rudder power control unit malfunction led to a Dutch roll oscillatory instability. Not recognizing the Dutch roll, the crew used the rudder to stay on course, which exacerbated the instability, leading to an unrecoverable flight condition. The over-stressed tail section detached and the aircraft broke apart soon after. The aircraft was at cruise altitude about 200 km west of Bishkek before it crashed in a mountainous area near the village of Chorgolu, close to the border between Kyrgyzstan and Kazakhstan. 55-3118 The City of Renton – KC-135A on static display at the entrance to McConnell Air Force Base near Wichita, Kansas. It was the first aircraft built and was used in a variety of test roles. It was later converted to an EC-135K before reverting to a tanker configuration. 55-3130 Old Grandad – KC-135A on static display at the March Field Air Museum, March ARB (former March AFB) in Riverside, California. 55-3139 City of Atwater – KC-135A on static display at the Castle Air Museum at the former Castle AFB in Atwater, California. 56-3595 – KC-135A on static display at the Barksdale Global Power Museum at Barksdale Air Force Base in Bossier City, Louisiana. 56-3611 – KC-135E on static display Scott Field Heritage Air Park at Scott Air Force Base near Shiloh, Illinois. 56-3639 – KC-135A on static display at the Linear Air Park at Dyess Air Force Base near Abilene, Texas. 56-3658 Iron Eagle – KC-135E on static display at the Kansas Aviation Museum in Wichita, Kansas. 57-1429 – KC-135E on static display at the Museum of the Kansas National Guard at Forbes Field Air National Guard Base in Topeka, Kansas. 57-1458 – KC-135E on static display at Eielson Air Force Base near Fairbanks, Alaska. 57-1495 – KC-135E in storage at Lincoln Air National Guard Base in Lincoln, Nebraska. 57-1507 – KC-135E on static display at the Air Mobility Command Museum at Dover Air Force Base in Dover, Delaware. 57-1510 Never Forget – KC-135E on static display at the Hill Aerospace Museum at Hill Air Force Base in Ogden, Utah. 59-1481 – KC-135A on static display at Ellington Field Joint Reserve Base in Houston, Texas. It was operated by NASA as N930NA and one of two KC-135s used for zero-gravity and other research purposes. 59-1487 – KC-135E on static display at the 126th Air Refueling Wing / Illinois Air National Guard complex at Scott Air Force Base near Shiloh, Illinois. 59-1497 – KC-135E on static display at Joint Base McGuire-Dix-Lakehurst in Wrightstown, New Jersey. 63-7998 – KC-135A on static display at the Pima Air & Space Museum, adjacent to Davis-Monthan AFB in Tucson, Arizona. It was operated by NASA as N931NA and is the second of their two research aircraft. 63-8005 – KC-135A on static display at Grand Forks AFB in Grand Forks, North Dakota. ^ The six military fixed-wing aircraft with over 50 years of continuous service are Boeing B-52 Stratofortress bomber (1955); Boeing KC-135 "Stratotanker" mid-air refueller (1957); Lockheed C-130 Hercules cargo & troop transporter (1956); Lockheed P-3 Orion naval & submarine surveillance (1962); Lockheed U-2 "Dragon Lady" reconnaissance (1957); and Northrop T-38 Talon jet trainer (1961). There is also one helicopter: Boeing CH-47 Chinook (1962). ^ Lombardi, Michael (July 2006). "Historical Perspective, Start of a PROUD MISSION" (PDF). Boeing Frontiers. Chicago, Illinois: Boeing. Archived (PDF) from the original on 12 June 2014. Retrieved 21 October 2014. ^ Bright, Charles (January 1986). "VII - The Heartbreak Market: Airliners". The Jet Makers: The Aerospace Industry from 1945-1972. Lawrence, Kansas: University Press of Kansas. ISBN 978-0700601721. Archived from the original on 17 February 2015. Retrieved 21 October 2014. ^ Hopkins, III, Robert S. (1997). Boeing KC-135 Stratotanker: More Than Just a Tanker. Leicester, England: Midland Publishing Limited. ISBN 1-85780-069-9. ^ May, Mike (Spring 2004). "Gas Stations in the Sky". Invention & Technology. American Heritage Society. Archived from the original on 27 April 2010. Retrieved 21 October 2014. ^ a b Beckham, SSgt Tim (25 September 2009). "Final KC-135E retires at Davis-Monthan". Archived from the original on 2 November 2014. Retrieved 21 October 2014. ^ "KC-135 Stratotanker". boeing.com. Boeing. June 2011. Archived from the original on 29 June 2011. Retrieved 21 October 2014. ^ The noise reduction of 27 dB means the resultant sound pressure level is about 5% of the original level. ^ a b c "KC-135E". globalsecurity.org. GlobalSecurity.org. Archived from the original on 6 October 2014. Retrieved 21 October 2014. ^ Curtin, Neal P. (24 June 2003). Testimony Before the Subcommittee on Projection Forces, Committee on Armed Services, House of Representatives; MILITARY AIRCRAFT: Information on Air Force Aerial Refueling Tankers (PDF) (Report). General Accounting Office. Archived (PDF) from the original on 24 September 2015. Retrieved 21 October 2014. According to Air Force data, the KC-135 fleet had a total operation and support cost in fiscal year 2001 of about $2.2 billion. The older E model aircraft averaged total costs of about $4.6 million per aircraft, while the R models averaged about $3.7 million per aircraft. Those costs include personnel, fuel, maintenance, modifications, and spare parts. ^ "Boeing KC-135 - Rockwell Collins Pacer CRAG Avionics Upgrade". Jane's Aircraft Upgrades. London, England: Janes Information Group. 7 March 2012. Archived from the original on 16 June 2012. Retrieved 21 October 2014. ^ "BAE SYSTEMS delivers final Pacer CRAG KC-135". Aerotech News and Review. Lancaster, California: Aerotech News and Review, Inc. 20 September 2002. ^ USAF receives new Block 45 upgrade KC-135 Stratotanker Archived 27 March 2018 at the Wayback Machine, Srivari Aishwarya, Air Force Technology, January 26, 2017. ^ Davis, Greg L. "KC-135 MOD program closes out year with magic number: Block 45" Archived 28 March 2018 at the Wayback Machine, 72nd Air Base Wing Public Affairs, 24 January 2017. ^ Graham, Richard (1996). SR-71 Revealed: The Untold Story. pp. 38–39. ISBN 0760301220. ^ "KC-135R Stratotanker". globalsecurity.org. GlobalSecurity.org. Archived from the original on 8 October 2014. Retrieved 21 October 2014. ^ "Boeing: Commercial Airplanes - 707 - 707 Family Home". boeing.com. Boeing. Archived from the original on 26 February 2013. Retrieved 21 October 2014. ^ a b HQ USSTRATCOM/CSH (January 2004). HISTORY OF THE UNITED STATES STRATEGIC COMMAND, June 1, 1992 — October 1, 2002 (PDF) (Report). United States Strategic Command. p. 21. Archived from the original (PDF) on 6 March 2016. Retrieved 23 October 2014. [...] a similar ceremony [at Scott AFB] marked the inactivation of MAC and the activation of the new Air Mobility Command, which now assumed responsibility for SAC's KC-135 and KC-10 air refueling aircraft. ^ a b "KC-135 Stratotanker". AF.mil. US Air Force. 15 September 2004. Archived from the original on 24 October 2014. Retrieved 23 October 2014. ^ "Boeing KC-135 Celebrates 50 Years of Service". aahs-online.org. American Aviation Historical Society. 2009. Archived from the original on 22 December 2014. Retrieved 23 October 2014. ^ Armstrong, Brandice J. (12 September 2006). "Airman celebrates different KC-135 anniversary". USAF News. 72d Air Base. Archived from the original on 4 November 2014. Retrieved 23 October 2014. ^ Opall-Rome, Barbara (29 April 2013). "Israelis Slam US-Hyped Arms Package". Defense News. Gannett Government Media Corporation. Retrieved 30 April 2013. ^ Pellerin, Cheryl (22 April 2013). "Hagel, Yaalon Finalize New Israel Military Capabilities". American Forces Press Service. Pentagon. Archived from the original on 30 April 2013. Retrieved 22 April 2013. ^ Egozi, Arie (2 September 2013). "Israel seeks R-model KC-135s from USA". flightglobal.com. Archived from the original on 23 October 2014. Retrieved 23 October 2014. ^ "NASA Dryden Flight Research Center, KC-135 Stratotanker Photo Collection". dfrc.nasa.gov. NASA. Archived from the original on 3 February 2007. Retrieved 23 October 2014. ^ Heilig, Jennings (8 September 2002). "C-135 Variants - Part 2". clubhyper.com. Archived from the original on 23 September 2015. Retrieved 23 October 2014. ^ Heilig, Jennings (8 September 2002). "C-135 Variants - Part 6". clubhyper.com. Archived from the original on 23 September 2015. Retrieved 23 October 2014. ^ Hebert, Adam J. (January 2003). "When Aircraft Get Old". Air Force Magazine. Arlington, Virginia: Air Force Association. Archived from the original on 26 February 2003. Retrieved 23 October 2014. ^ MILITARY AIRCRAFT: DOD Needs to Determine its Aerial Refueling Aircraft Requirements (Report). US General Accounting Office. 4 June 2004. p. 3. GAO-04-349. Archived from the original on 23 October 2014. Retrieved 23 October 2014. Operations and support costs for the KC-135 fleet are estimated to grow from about $2.2 billion in fiscal year 2003 to $5.1 billion (fiscal year 2003 dollars) in fiscal year 2017, an increase of $2.9 billion, or over 130 percent, which represents an annual growth rate of about 6.2 percent. ^ "Opening Statement of Chairman Roscoe Bartlett, Hearing on the Aerial Refueling Recapitalization Program" (PDF) (Press release). Washington, D.C.: globalsecurity.org. 28 February 2006. Archived (PDF) from the original on 24 September 2015. Retrieved 23 October 2014. ^ Tirpak, John A. (February 2004). "Tanker Twilight Zone". Air Force Magazine. Arlington, Virginia: Air Force Association. Archived from the original on 6 February 2004. Retrieved 23 October 2014. ^ "Air Force Posts Request for Proposals for Tankers" (Press release). US Department of Defense. 30 January 2007. Archived from the original on 1 December 2009. Retrieved 23 October 2014. ^ "Tanker Contract Award Announced". Air Force Print News. 29 February 2008. Archived from the original on 4 November 2014. Retrieved 23 October 2014. ^ Gilmore, Gerry J. (29 February 2008). "Air Force Awards Tanker Contract to Northrop Grumman". American Forces Press Service. Archived from the original on 23 October 2014. Retrieved 23 October 2014. ^ Miller, Kent; Putrich, Gayle S.; Tran, Pierre (29 February 2008). "Tanker Contract Decision Announced". Army Times. Springfield, Virginia. Retrieved 23 October 2014. ^ "Boeing Protests U.S. Air Force Tanker Contract Award" (Press release). St Louis, Missouri: Boeing. 11 March 2008. Archived from the original on 23 October 2014. Retrieved 23 October 2014. ^ Gary L. Kepplinger, General Counsel (18 June 2008). "B-311344; B-311344.3; B-311344.4; B-311344.6; B-311344.7; B-311344.8; B-311344.10; B-311344.11, The Boeing Company, June 18, 2008". Archived from the original on 23 October 2014. Retrieved 23 October 2014. ^ "KC-X Tanker Modernization Program, Solicitation Number: FA8625-10-R-6600" (Press release). US Department of Defense. 8 February 2010. Archived from the original on 23 October 2014. Retrieved 23 October 2014. ^ Reed, John (25 February 2010). "USAF Sets KC-X First Flight, IOC Dates". Defense News. Springfield, Virginia. Retrieved 23 October 2014. ^ Riley, Charles (24 February 2011). "Air Force awards Boeing $35 billion contract". CNN. Archived from the original on 28 February 2011. ^ "U.S. Air Force Accepts First Boeing KC-46A Pegasus Tanker Aircraft" (Press release). Boeing. 10 January 2019. ^ a b "KC-135". US Warplanes.net. Archived from the original on 5 February 2013. Retrieved 17 December 2012. ^ a b Donald, David. "Boeing Model 717 (C/KC-135 Stratoliner/Stratotanker)." The Complete Encyclopedia of World Aircraft. Barnes & Noble Books, 1997. ISBN 0-7607-0592-5. ^ Baker, MSgt Burke. "48-year-old KC-135 retires" Archived 11 June 2008 at the Wayback Machine, Air Force news, 22 May 2008. ^ "Llegó el 1er KC-135E para la FACh - ModoCharlie". modocharlie.com. 16 February 2010. Archived from the original on 24 March 2017. Retrieved 26 April 2018. ^ "2017 USAF Almanac, Fact and Figures" Archived 26 April 2018 at the Wayback Machine. Air Force Magazine, May 2017. ^ "Airframe tracking information from Airlinerlist.com". airlinerlist.com. Archived from the original on 1 October 2017. Retrieved 26 April 2018. ^ Accident description for 56-3599 at the Aviation Safety Network. Retrieved on 2 February 2013. ^ Accident description for 58-0002 at the Aviation Safety Network. Retrieved on 2 February 2013. ^ Accident description for 57-1513 at the Aviation Safety Network. Retrieved on 2 February 2013. ^ Accident description for 56-3628 at the Aviation Safety Network. Retrieved on 16 August 2013. ^ Accident description for 56-3605 at the Aviation Safety Network. Retrieved on 2 February 2013. ^ Accident description for 56-3618 at the Aviation Safety Network. Retrieved on 2 February 2013. ^ Accident description for 60-0352 at the Aviation Safety Network. Retrieved on 21 October 2014. ^ Accident description for 56-3597 at the Aviation Safety Network. Retrieved on 2 February 2013. ^ Accident description for 57-1498 at the Aviation Safety Network. Retrieved on 25 October 2013. ^ Accident description for 60-0340 at the Aviation Safety Network. Retrieved on 2 February 2013. ^ Accident description for 61-0265 at the Aviation Safety Network. Retrieved on 8 May 2013. ^ Grawe, Jim. "Wichita Airplane Crash 1965". Kansapedia. Kansapedia. Archived from the original on 6 December 2016. Retrieved 6 January 2017. ^ "1965 KC-135 tanker crash on Piatt St". Wichita Eagle. Wichita, Kansas. 15 January 2011. Archived from the original on 14 December 2013. Retrieved 21 October 2014. ^ Accident description for 63-8882 at the Aviation Safety Network. Retrieved on 2 February 2013. ^ Accident description for 63-0842 at the Aviation Safety Network. Retrieved on 2 February 2013. ^ Accident description for 61-0273 at the Aviation Safety Network. Retrieved on 21 October 2014. ^ "Spain, U.S. Agree to Radioactivity Cleanup 40 Years After Atomic Accident". Fox News. 8 October 2006. Archived from the original on 11 January 2014. Retrieved 21 October 2014. ^ Accident description for 57-1444 at the Aviation Safety Network. Retrieved on 2 February 2013. ^ Accident description for 56-3613 at the Aviation Safety Network. Retrieved on 2 February 2013. ^ Accident description for 58-0026 at the Aviation Safety Network. Retrieved on 8 May 2013. ^ Accident description for 56-3655 at the Aviation Safety Network. Retrieved on 8 May 2013. ^ Accident description for 55-3133A at the Aviation Safety Network. Retrieved on 20 October 2014. ^ Shalhoup, Dean (28 May 2011). "Fateful flight for Nashua airman". Nashua Telegraph. Nashua, New Hampshire. Archived from the original on 3 March 2016. Retrieved 20 October 2014. ^ Accident description for 55-3138 at the Aviation Safety Network. Retrieved on 8 May 2013. ^ Accident description for 61-0301 at the Aviation Safety Network. Retrieved on 8 May 2013. ^ Accident description for 58-0031 at the Aviation Safety Network. Retrieved on 8 May 2013. ^ Accident description for 58-0039 at the Aviation Safety Network. Retrieved on 2 February 2013. ^ Accident description for 58-0048 at the Aviation Safety Network. Retrieved on 23 April 2014. ^ Accident description for 63-7989 at the Aviation Safety Network. Retrieved on 8 May 2013. ^ Accident description for 60-0354 at the Aviation Safety Network. Retrieved on 21 October 2014. ^ Hoctor, Christopher J.B. (January 2014). Voices from an Old Warrior: Why KC-135 Safety Matters (PDF). Columbia, Missouri: Mizzou Publishing. p. 63. ISBN 9781616004606. Archived (PDF) from the original on 4 March 2016. Retrieved 21 October 2014. ^ a b "46th Air Refueling Squadron History". 46thars.tripod.com. Archived from the original on 20 January 2013. Retrieved 26 April 2018. ^ Accident description for 60-0368 at the Aviation Safety Network. Retrieved on 16 August 2013. ^ Accident description for 61-0296 at the Aviation Safety Network. Retrieved on 16 August 2013. ^ a b Accident description for 61-0296 at the Aviation Safety Network. Retrieved on 16 August 2013. ^ Accident description for 57-1489 at the Aviation Safety Network. Retrieved on 16 August 2013. ^ Accident description for 58-0031 at the Aviation Safety Network. Retrieved on 2 February 2013. ^ Accident description for 63-7983 at the Aviation Safety Network. Retrieved on 20 October 2014. ^ "Four Killed in U.S. Air Force Tanker Crash". Associated Press. 17 June 1986. Archived from the original on 28 October 2014. Retrieved 20 October 2014. ^ Accident description for 60-0361 at the Aviation Safety Network. Retrieved on 8 May 2013. ^ "4". GAO/NSIAD-88-172 Report to the Honorable Edward F. Feighan, House of Representatives; Strategic Air Command: KC-135A Crash and the Need for SAC Air Show Regulations (PDF) (Report). General Accounting Office. July 1988. Archived (PDF) from the original on 24 September 2015. Retrieved 20 October 2014. ^ Accident description for 60-0317 at the Aviation Safety Network. Retrieved on 17 December 2015. ^ Associated Press (7 March 1989). "Air Force Policies Cited in Jet Crash". The Argus-Press. Owosso, Michigan. p. 5. Retrieved 24 September 2017. ^ Accident description for 63-7990 at the Aviation Safety Network. Retrieved on 21 October 2014. ^ Accident description for 57-1481 at the Aviation Safety Network. Retrieved on 2 February 2013. ^ Accident description for 56-3592 at the Aviation Safety Network. Retrieved on 21 October 2014. ^ "Fredericton - Faculty of Arts - Centres - The Gregg Centre - New Brunswick Military Heritage Project - UNB". www.unb.ca. Archived from the original on 24 January 2017. Retrieved 26 April 2018. ^ "Tanker Plane Explodes On Runway". The Palm Beach Post. AP. 12 January 1990. Retrieved 30 June 2017 – via newspapers.com. ^ "Hull-loss description". aviation-safety.net. Retrieved 30 June 2017. ^ "KC-135E Fire at Pease AFB January 1990". nhshotgunner. 9 February 2015. Retrieved 30 June 2017 – via YouTube. ^ Accident description for 57-1470 at the Aviation Safety Network. Retrieved on 10 December 2018. ^ Brandon, Karen (11 December 1993). "GUARD PLANE EXPLODES, 6 KILLED". Chicago Tribune. Archived from the original on 10 December 2018. Retrieved 10 December 2018. ^ Accident description for 59-1452 at the Aviation Safety Network. Retrieved on 21 October 2014. ^ Ranter, Harro. "ASN Aircraft accident Boeing KC-135R Stratotanker 57-1418 Oklahoma City-Tinker AFB, OK (TIK)". aviation-safety.net. Archived from the original on 15 June 2017. Retrieved 26 April 2018. ^ Accident description for 63-8886 at the Aviation Safety Network. Retrieved on 21 October 2014. ^ Accident description for 63-8877 at the Aviation Safety Network. Retrieved on 21 October 2014. ^ Humphrey, Jeff (20 June 2013). "Cellphone video may have captured deadly KC-135 crash". Spokane, Washington. Archived from the original on 19 October 2014. Retrieved 21 October 2014. ^ "Investigation board determines cause of KC-135 crash in May". 14 March 2014. Archived from the original on 2 November 2014. Retrieved 21 October 2014. ^ Davis, Kristin (13 March 2014). "Malfunction, pilot error caused May KC-135 crash". Air Force Times. Springfield, Virginia. Retrieved 21 October 2014. ^ Camden, Jim (13 March 2014). "Tanker's tail separated in flight before Kyrgyzstan crash". Spokesman-Review. Spokane, Washington. Archived from the original on 22 October 2014. Retrieved 21 October 2014. ^ UNITED STATES AIR FORCE AIRCRAFT ACCIDENT INVESTIGATION BOARD REPORT; KC-135R, T/N 63-8877; 22D AIR REFUELING WING McCONNELL AIR FORCE BASE, KANSAS; LOCATION: 6 MILES SOUTH OF CHALDOVAR, KYRGYZ REPUBLIC (PDF) (Report). 31 December 2013. Archived (PDF) from the original on 21 October 2014. Retrieved 21 October 2014. ^ Bernal Del Agua, David (25 June 2014). "Anything but a tanker: the first KC-135 story". McConnell Air Force Base. Archived from the original on 13 May 2016. Retrieved 14 November 2016. ^ "KC-135A Stratotanker". March Field Air Museum. March Field Air Museum. Archived from the original on 15 November 2016. Retrieved 14 November 2016. ^ "Aircraft on Display". Castle Air Museum. Archived from the original on 14 November 2016. Retrieved 14 November 2016. ^ "Airframe Dossier - Boeing KC-135A-BN Stratotanker, s/n 55-3139 USAF, c/n 17255". Aerial Visuals. AerialVisuals.ca. Archived from the original on 14 November 2016. Retrieved 14 November 2016. ^ "20. KC-135". Barksdale Global Power Museum. Archived from the original on 14 November 2016. Retrieved 14 November 2016. ^ "Airframe Dossier - Boeing KC-135A-BN Stratotanker, s/n 56-3595 USAF, c/n 17344". Aerial Visuals. AerialVisuals.ca. Archived from the original on 9 April 2017. Retrieved 14 November 2016. ^ "Airpark". Scott Air Force Base. Archived from the original on 14 November 2016. Retrieved 14 November 2016. ^ "KC-135 STRATOTANKER". Scott Field Heritage Air Park. Scott Field Heritage Air Park. Archived from the original on 20 August 2016. Retrieved 14 November 2016. ^ "Airframe Dossier - Boeing KC-135E Stratotanker, s/n 56-3611 USAF, c/n 17360". Aerial Visuals. AerialVisuals.ca. Archived from the original on 14 November 2016. Retrieved 14 November 2016. ^ "Airframe Dossier - Boeing KC-135A-BN Stratotanker, s/n 56-3639 USAF, c/n 17388". Aerial Visuals. AerialVisuals.ca. Archived from the original on 9 April 2017. Retrieved 14 November 2016. ^ "KC-135E". Kansas Aviation Museum. Archived from the original on 19 October 2016. Retrieved 14 November 2016. ^ "Airframe Dossier - Boeing KC-135E Stratotanker, s/n 56-3658 USAF, c/n 17407". Aerial Visuals. AerialVisuals.ca. Archived from the original on 14 November 2016. Retrieved 14 November 2016. ^ "Static Displays". Museum of the Kansas National Guard. Archived from the original on 13 May 2016. Retrieved 14 November 2016. ^ "Airframe Dossier - Boeing KC-135E Stratotanker, s/n 57-1429 USAF, c/n 17500". Aerial Visuals. AerialVisuals.ca. Archived from the original on 14 November 2016. Retrieved 14 November 2016. ^ Thibault, Janine (30 March 2010). "KC-135 finds home at Heritage Park". Eielson Air Force Base. Archived from the original on 14 November 2016. Retrieved 14 November 2016. ^ "Record Listing". Living History Registry. Living History Registry. Archived from the original on 14 November 2016. Retrieved 14 November 2016. ^ Baugher, Joe (28 July 2016). "1957 USAF Serial Numbers". JoeBaugher.com. Archived from the original on 20 July 2011. Retrieved 14 November 2016. ^ Smith, Robert (5 June 2015). "Nebraska Scavenger Hunt". Rambles in the Air. WordPress.com. Archived from the original on 15 November 2016. Retrieved 14 November 2016. ^ "KC-135E Stratotanker". Air Mobility Command Museum. AMC Museum Foundation, Inc. Archived from the original on 1 September 2016. Retrieved 14 November 2016. ^ "BOEING KC-135E "STRATOTANKER"". Hill Air Force Base. 11 August 2009. Archived from the original on 13 May 2016. Retrieved 14 November 2016. ^ "Airframe Dossier - Boeing KC-135A-BN Stratotanker, s/n 930 NASA, c/n 17969, c/r N930NA". Aerial Visuals. AerialVisuals.ca. Archived from the original on 14 November 2016. Retrieved 14 November 2016. ^ "Slideshow: Look who got a makeover". 126th Air Refueling Wing. Archived from the original on 15 April 2016. Retrieved 14 November 2016. ^ Boyd, Don (29 September 2011). "USAF Boeing KC-135A-BN Stratotanker #59-1487 at Scott AFB aviation stock photo #0656". PBase. Archived from the original on 14 November 2016. Retrieved 14 November 2016. ^ "Airframe Dossier - Boeing KC-135E Stratotanker, s/n 59-1497 USAF". Aerial Visuals. AerialVisuals.ca. Archived from the original on 14 November 2016. Retrieved 14 November 2016. ^ "United States Air Force Boeing KC-135A (59-1497)". netAirspace.com. netAirspace.com. Archived from the original on 19 February 2017. Retrieved 14 November 2016. ^ "STRATOTANKER". Pima Air & Space Museum. Pimaair.org. Archived from the original on 20 December 2016. Retrieved 14 November 2016. Hopkins, III, Robert S. (1997). Boeing KC-135 Stratotanker: More Than Just a Tanker. Leicester, England: Midland Publishing Limited. ISBN 1-85780-069-9. Pither, Tony (1998). The Boeing 707 720 and C-135. Tunbridge Wells, England: Air-Britain (Historians) Ltd. ISBN 0-85130-236-X.
0.999989
(CNN) The use of a robot to kill the man who authorities say fatally shot five Dallas police officers has drawn attention in part because it's the first time police have used robots in such a manner. Below is a series of questions that I have been asked frequently and preliminary answers. The facts remain incomplete, so these are preliminary thoughts. In the wake of the shooting of the Dallas police officers Thursday night during a peaceful protest, police cornered the shooter -- Micah Xavier Johnson -- in a parking garage. After an hours-long standoff that included exchanges of gunfire, they used a robot to deliver an explosive that killed the gunman. The system has been reported as a Northrop Grumman Remotec Andros, which is a remotely-controlled bomb disposal robot commonly used by police, military and other first responders around the world. It is wheeled, weighs around 220 kg (485 pounds), and mounts various sensors and a robotic arm with grippers. Why is this being reported as a big deal? This is the first use of a robotic system by the police in a deliberately lethal manner. Are there parallels or past precedents by the police? Robots are used all the time by police bomb squads forces around the world in bomb disposals. They are also frequently used in surveillance roles by SWAT teams and the like. They have been used in standoffs with armed gunmen in a variety of examples, from helping to figure out where the gunman is hiding to delivering pizza to the gunman and hostages during negotiations when a person wasn't allowed in. But none of these involved delivering lethal force. The closest parallel I am aware of was a case in 2011, when police in Tennessee strapped tear gas grenades to a robot that then accidentally started a fire in a mobile home. This doesn't seem a great parallel, as it does not reflect a decision deliberately to use the robot to kill. Another parallel would be the 1985 standoff in Philadelphia between law enforcement and the MOVE group. Manned police helicopters dropped two small explosive devices on the roof to try to open a breach into the building below where the group was bunkered in. Instead, the building caught fire, killing 11 in the blaze, and burning down many neighboring buildings. Again here, the parallel isn't a perfect one. While it did involve a bomb, there was no robot, nor was it a deliberate use in the way authorities used the robot in Dallas. The best parallel that I am aware of is a case that I wrote about in my 2009 book "Wired for War." A U.S. Army soldier discussed how his unit in Iraq in the mid 2000s was equipped with a surveillance robot known as a MARCBOT. This is a remotely operated surveillance robot, equipped with a mast holding a small camera, not the kind used in Dallas. It costs about $8,000. Their unit used the robotic system for roles like checkpoint duty; if there was a car that was suspected of being a car bomb, they would send the robot for a close look, rather than a risk one of their people. When they faced off with an armed insurgent holed up in an alley, the soldier told of how they came up with an ad hoc answer. They jury-rigged the robot with an explosive device (literally duct-taping a claymore mine on it) and drove it down the alley to kill the insurgent, rather than risking a soldier. Why would the police have a bomb with them? It has not been reported which type of explosive was used, but it is important to note that it was clearly not the common image of a "bomb" like the type dropped by an F-16. Police SWAT teams have small explosive charges that they use for breaches (to blow open a locked door or a hole in the wall to get around a gunman behind a door), while bomb squads sometimes will place small explosive charges beside a known or suspected bomb to detonate it in a safe manner. Update: Dallas PD has confirmed that the explosive device on the robot was a 1-pound C4 plastic explosive plus "Det" cord, fitting with the analysis above. How does this link to the "killer robots" debate? While there are links to the discussion on the future of killer robots, known as LAWS (lethal autonomous weapons systems), there are also three important differences to keep in mind. First, this was not an autonomous robot; both the robot and the explosive were remotely operated. Second, this was not a designed weapons system. There are many ground robots under development that are armed with weapons like machine guns and missile launchers, from the prototypes of the US MAARS to the Chinese Sharp Claw. But this was the case of using an older robot designed for something else. And, third, the concerns driving the "killer robots" debate center on whether we can prevent the unleashing of self-operating robots on the battlefield, for which militaries around the world are beginning to establish plans and doctrines. The debate is driven by a concern that such a future might cause both greater civilian harm and a lack of accountability. By contrast, this was an ad hoc use, just like the case in Iraq. There is no doctrine that planned this out, no training manuals that police were following, nor development programs for this use. It also doesn't appear to have risked civilian harm or raised accountability concerns of the kind that motivate the killer robots debate. There are links to that debate but they are more about the many different directions robot use might go to next. But doesn't it portend a future of lethal police robots? It is too early to draw that conclusion. An important first use of robots in a lethal way by police was established. But you can counter whether that important first will open the floodgates with two opposite points. First, police forces around the world are already equipped with this type of robotic system. So it can't cause mass spread of the technology since that spread was already under way. And, second, important precedents of use aren't always followed. They can either prove to be exceptional circumstances or the public and/or police decide against them in the aftermath. Take the case of the 1985 MOVE standoff; police helicopters dropped bombs, but that didn't become a common practice in the years since. What we can confidently conclude is that we will see greater and greater use of robotics in all sorts of roles, whether it be by the military, law enforcement, or just the rest of us in civilian life. Indeed, some 80 plus countries already have robotics in their militaries, while companies that range from Google to Tesla to Uber to Ford are planning on a future of "driver-less cars." In policing, the robotics trend has been moving towards greater use of drones in surveillance roles, from smaller ones that might be used by individual units to large ones that could monitor an entire neighborhood or city. The key here is to distinguish the decision of unmanning a system from arming it. Just as manned police planes or helicopters are not armed (police don't fly Apache attack helicopters or F-16s), the trend towards their unmanning doesn't somehow mean they have to be armed. So, too, manned police ground vehicles, whether they be patrol cars or even military surplus MRAPS don't mount cannons or machine guns like their military equivalent; neither do the unmanned versions have to be armed by definition. Before this incident, when it came to arming robotic systems in a law enforcement role, most of the discussion has been of ones using "less than lethal" weapons. At a number of trade shows, robotic systems have been displayed that mount tasers and tear gas to China's controversial Anbot, which is a police bot designed to operate autonomously and equipped with an electroshock device similar to a cattle prod. These, of course, prompt great debate that brings together elements of the robotics argument with the question over whether "less than lethal" weapons actually lead to abuse (think about the debate over Tasers; they arguably save lives, yet might be used more often). Did the Dallas Police do the right thing? I'm not going to second guess them. The information isn't all in, emotions are high, and the best judges of that are going to be experts on SWAT team tactics and lawyers that specialize in police use of force issues. In no way, shape, or form is any of this a condemnation. Indeed, it is the opposite. My reaction is similar to the one I had to the case mentioned above in Iraq; I wasn't there, but can certainly understand and, even more, empathize with what the people on the scene decided to do. At the same time, my analytic side can recognize that this is a big issue that has provoked debate. Is this another sign of the "militarization" of police in the U.S.? I have a hard time making that connection now. The debate over the militarization of the police seems to turn on 1) the use of equipment designed for war, often provided in surplus from the U.S. military, and 2) in a manner that is intimidating or threatening to the public. In this incident, the technology is not one that is only used in war and it was not used in a way that was targeting the broader public; indeed it was the opposite. Remember, the police in Dallas who were shot and killed were there protecting peaceful protesters, not intimidating them. Images from the scene beforehand showed police and protesters smiling together. In turn, when violence struck, the police on the scene bravely moved protesters to safety, while the media reported that protesters helped police find the shooter. The police and protesters were in it together; so we, in turn, should not let people try to exploit the tragedy as a means to divide. Police respond after shots were fired in downtown Dallas on Thursday, July 7. Five police officers were fatally shot during a protest over recent police shootings in Louisiana and Minnesota. Seven other officers were injured in the ambush, as were two civilians. Emergency responders administer CPR to an unknown patient near the receiving area of the Baylor University Medical Center. A police officer with Dallas Area Rapid Transit is comforted at the emergency room entrance of the hospital. A police helicopter flies over the scene in downtown Dallas. One suspect was killed by police after a standoff that lasted for hours. A man raises his hands as he walks near a law enforcement officer in Dallas. Protesters gather as police officers arrest someone in the aftermath of the shootings. A Dallas police officer takes a moment as she guards an intersection in the early morning hours. Dallas police respond to the scene of the shootings. Police officers shield bystanders after shots were fired at the protest. Police officers take cover as shots are fired. Police get in position after gunshots rang out. Two officers crouch behind barriers. Dallas police order people away from the area after the shootings. Police and others gather at the emergency entrance to the Baylor University Medical Center. Police stop a driver in downtown Dallas. A view of downtown Dallas after the shootings. Kent Giles captured the image and told CNN he "heard multiple shots being fired. Probably more than 20 rounds. This is the intersection of Main and Griffin looking towards the west." Dallas police check a car after detaining a driver. Dallas police stand watch after the shootings. Onlookers stand near police barricades after the shootings. Police attempt to calm the crowd after an arrest. A clerk looks at broken windows that were shot out at a store in downtown Dallas. Law enforcement officials wait outside the emergency room entrance of the Baylor University Medical Center. What are the overall issues at hand? Obviously, this use of robotic technology in a lethal manner was a big first and one can imagine pathways that take you into those concerns. Yet, even though I am someone who has written widely on robotics, the events of this last week leave me more concerned over other trends. The issue of robotics may be new, but the ease of mass violence in our society, the worsening of police-civilian relations, and all the challenges of race in America are problems that were there well before the tragic events in Minnesota, Louisiana, and now Texas. These are what we must face, and, most importantly, face together.
0.921552
The The are an English musical and multimedia group that have been active in various forms since 1979, with singer/songwriter Matt Johnson being the only constant band member. In November 1977, Matt Johnson placed an advertisement in the NME, asking for "Bass/lead guitarist into The Velvet Underground/Syd Barrett". Johnson later placed a second advertisement in the NME, stating his new influences as "The Residents/Throbbing Gristle". While trying to get his band going, in 1978 Johnson had recorded a demo solo album (See Without Being Seen) which he continued to sell at various underground gigs on cassettes. In 1979, working with Colin Lloyd-Tucker (a friend and colleague at De Wolfe Music, the Soho music publisher/recording studio) Johnson recorded his first album proper, Spirits. This album remains unreleased, although the album track "What Stanley Saw" was later licensed to Cherry Red Records for their Perspectives & Distortion compilation album, which also featured Virgin Prunes, Lemon Kittens, Thomas Leer, Kevin Coyne and Mark Perry. The Band was a Canadian-American roots rock group, originally consisting of Rick Danko (bass guitar, double bass, fiddle, trombone, vocals), Levon Helm (drums, mandolin, vocals), Garth Hudson (keyboards, saxophones, trumpet), Richard Manuel (piano, baritone, drums, vocals) and Robbie Robertson (guitar, percussion, vocals). The members of the Band first came together as they joined rockabilly singer Ronnie Hawkins's backing group, the Hawks, one by one between 1958 and 1963. In 1964, they separated from Hawkins, after which they toured and released a few singles as Levon and the Hawks and the Canadian Squires. The next year, Bob Dylan hired them for his U.S. tour in 1965 and world tour in 1966. Following the 1966 tour, the group moved with Dylan to Saugerties, New York, where they made the informal 1967 recordings that became The Basement Tapes, which forged the basis for their 1968 debut album, Music from Big Pink. Because they were always "the band" to various frontmen, Helm said the name "The Band" worked well when the group came into its own. The group began performing as the Band in 1968 and went on to release ten studio albums. Dylan continued to collaborate with the Band over the course of their career, including a joint 1974 tour. Plot: Identical twins Andy and Pete Goodwynn have always been there for each other. But in a cruel twist of fate-orchestrated by the town's most powerful family-their lives are forever altered. Can the brothers gain vengeance on those who have taken away from them all that matters? While revenge may seem sweet, BROTHER'S KEEPER is a powerful reminder that only forgiveness can truly heal. Taglines: Black LIght Burns will BF you in the M. Plot: For 25 years in Invercargill at the south end of New Zealand, Burt Munro (1899-1978) has been working on increasing the speed of his motorcycle, a 1920 Indian. He dreams of taking it to the Bonneville Salt Flats to see how fast it will go. By the early 1960s, heart disease threatens his life, so he mortgages his house and takes a boat to Los Angeles, buys an old car, builds a makeshift trailer, gets the Indian through customs, and heads for Utah. Along the way, people he meets are charmed by his open, direct friendliness. If he makes it to Bonneville, will they let an old guy on the flats with makeshift tires, no brakes, and no chute? And will the Indian actually respond? Antarctic Angel: I don't think so, granddad!::Burt Munro: Well, why don't you put your money where your mouth is? Tom: Aren't you scared you'll kill yourself if you crash?::Burt Munro: No... You live more in five minutes on a bike like this going flat out than some people live in a lifetime. Burt Munro: Invercargill, I-N-V-E-R-C-A-R-G-I-L-L. Sometimes I spell it with one 'L' to save ink. Burt Munro: If you don't follow your dreams Thomas, you might as well be a vegetable.::Tom: What type of vegetable? Burt Munro: If you don't go when you want to go, when you do go, you'll find you've gone. [Burt starts to mount his bike, but stops]::Burt Munro: I can't get my leg in because of the asbestos cloth on it.::[gets off]::Burt Munro: Let me take it off.::Rolly: Well, what about your leg and the heat?::Burt Munro: Screw it. I've got a spare one. [the motorcycle gang comes to see off Burt]::Antarctic Angel: Good luck, mate. Show 'em Kiwis can fly too, eh?::Burt Munro: Right. I'll bring you back the Statue of Liberty! [after buying his used car, Burt says he needs some wheels to build a trailer for the motorcycle]::Fernando: Well, I got a couple wheels in the shop I could let you have, but first you got to do me a favor.::Burt Munro: Oh, well just say the word.::[cut to Burt fixing the engine of one of Fernando's cars]::Burt Munro: Okay, give it a try, Fernando.::[Fernando turns the ignition, and it turns over]::Fernando: Burt, you're a goddamn genius! Hey listen, why you gotta go? Why don't you stay here and work for me? I'll pay you well.::Burt Munro: Oh, no thanks, mate. Me and the motorcycle have got to pick up and be in Bonneville by the 18th.::Fernando: Well, you always got a job here. Good luck. Plot: This romantic comedy takes place over the course of one year - opening on New Year's Eve of one year and closing exactly one year later. The film focuses on three women living together in a house in Sydney and three male best friends. The men and women at the film's start have not yet met, but it is obvious that all will get together by film's end. The three women are all ending nowhere relationships with married men, older men, or just life's losers. One of the men is just a shy law graduate, one is a sexual conqueror who has just learned one of his conquests is pregnant, and the last is facing a breakup of his marriage. Through various events, each of the two trios end up together at the turn of the year. Taglines: right place. right time. wrong guy. 3 girls. 3 guys. 365 days to get it together. Ewan: I'd tell my friend it's a risky game falling in love with a married man, and that if you play tennis with the devil, you can't complain if he cheats. Plot: From the popular video game, Super Mario Bros. The Super Mario Bros. Super Show features Mario, his brother Luigi, Princess Toadstool, and her advisor going by the name of Toad. They go from land to land try to save that land from the sinister Bowser Koopa and his band of goombas, troopas, and other villians from the video game. The show also features live action parts with the voices of Mario and Luigi, Captain Lou Albano and Danny Wells. Each episode also features a special guest on every show. Mario Mario: That's a heaping helpin' of moolah.::Luigi: Yeah and that's a lot of money too. Mario/Luigi: Pattycake, pattycake, Pasta Man / Gimme pasta power as fast as you can. Link: [looking down Zelda's blouse from a tower] Hey, princess! Looking good! Espeacially from this angle! [repeated line]::Link: Well, Excuuuuuuse me, princess! Luigi: Hey Mario! You sure you know what you're doing?::Mario Mario: Sure, I'm doing 60 miles an hour! [repeated line]::Mario Mario, Luigi: Yes, Mama. Mario Mario: We need your Hocus Pocus. can you make us fly?::Genie: Fly? Do you know what a drain that is on me?::Luigi: No problem. Any drain you got, we can fix. We're plumbers.::Mario Mario: Tell you what, you make us fly and I'll grease your palm with a gold coin.::Genie: Now you're talking. Eeenie meenie miney mo. Make'em fly. I need the dough. Plot: Lane Meyer is a depressed teen who loses his girlfriend Beth. Her given reason for breaking up is: "Lane, I think it'd be in my best interest if I dated somebody more popular. Better looking. Drives a nicer car." Anyway, poor Lane is left alone and thinks up treacherous ways of killing himself. He finally meets a French beauty called Monique and falls for her. Simultaneously, he must endure his mother's terrible cooking which literally slides off the table and his disgusting next door neighbour Ricky (and his mum) while he prepares for the skiing race of his life - to get his old girlfriend back! Charles De Mar: [giving skiing instructions] Go that way, really fast. If something gets in your way, turn. Monique Junot: I figured if we had nothing to say to each other he would get bored; go away. But instead he uses it as an excuse to put his testicles all over me.::Lane Myer: Excuse me?::Monique Junot: You know, like octopus? Testicles?::Lane Myer: Ohhhh. Tentacles. N-T. Tentacles; big Difference. Lane Myer: Johnny...::Johnny: Four weeks, twenty papers, that's two dollars. Plus tip.::Lane Myer: Gee Johnny, I don't have a dime.::Johnny: Didn't ask for a dime. Two dollars.::Lane Myer: Well... it's funny see... my mom, had to leave early to take my brother to school and my dad to work cuz...::Johnny: ...two dollars... cash.::Lane Myer: See... the problem here is that... my little brother, this morning, got his arm caught in the microwave, and uh... my grandmother dropped acid and she freaked out, and hijacked a school bus full of... penguins, so it's kind of a family crisis... so come back later? Great. Charles De Mar: This is pure snow! It's everywhere! Do you have any idea what the street value of this mountain is? Charles De Mar: Suicide is never the answer, little trooper. Charles De Mar: And dying when you're not really sick is really sick, you know. Really! Plot: A group of girls staying at a sorority house clash with the house's owner, who wants them out. They decide to play a prank on her, but it goes awry and she winds up dead. Panicking, the girls try to hide the body, but someone (or something) witnessed the crime and begins to stalk them. Taglines: When the Nightmare ends . . . the Terror begins Seven graduates of sorority sisters stalked as they hold a guilty secret Sisters in Life, Sisters in Death Pledge Theta Pi... and DIE! Welcome to the Sorority of Your Nightmares One accident, lead to the unimaginable Nothing can prepare you for what happens when she fights back. Where nothing is off limits Welcome Home...to the Sorority of your nightmares. Sorority sisters... Sisters in life. Sisters in death.
0.981182
Information on the benefits of laminate flooring. Laminate is a fantastic, versatile material to use when you are choosing flooring options for your home. This is because laminate flooring is durable and easy to maintain, and looks great. Laminate flooring comes in a variety of colors, textures, finishes, colors, prints, and patterns to accentuate your home décor. Laminate is also very affordable when compared to other materials commonly used for flooring. Through printing processes, laminate flooring can simulate some of the most expensive and natural stone tiles- including marble- at a mere fraction of the price. Installation of laminate is simple. The floors are conveniently sold in four foot strips for hardwood-like varieties as well a plethora of tile types- which makes installation a breeze. Laminate floors are bonded together using resin on both sides and are resistant to fading from both natural and artificial light sources. Many laminate manufacturers offer a hefty warranty with your purchase because the flooring is so durable. Besides colorfastness to light, laminates are also naturally resistant to staining, cracking and impacts. With laminate flooring, it is also easy to replace a plank or tile if there is any damage. This can be done quickly and without sanding and refinishing, as would be necessary with natural hardwood. When it comes to caring for laminate floors, you want to avoid vacuuming, using too much liquid and waxes. Laminate has a finish that will remain intact with the proper maintenance so that your floor always looks its best and retains a high level of shine. Make sure to wipe up any spills quickly. Sweeping your floor and finishing with a slightly damp mop is all that is necessary to maintain the life of your laminate flooring for many years.
0.946281
Aedes atropalpus is an invasive North American species that has recently been reported in Europe. Its movement across America and into Europe has been a result of the commercial transport of used tyres which will continue to facilitate its further spread [1,2] . The success of the invasion of Ae. atropalpus has been due to a number of factors including its ability to utilise used tyres as larval development sites and its ability to produce desiccation-resistant eggs, allowing it to be transported to new areas in infested containers . It also has the ability to produce eggs autogenously (without taking any blood meal) which will no doubt further enhance its ability to exploit new locations more rapidly compared with other mosquito species . A recent study suggests that its ability to exploit novel food sources such as fine detritus is aiding its utilisation of used-tyre aquatic habitats . Laboratory competency studies have shown the ability of Ae. atropalpus to transmit a number of viruses including La Crosse virus and West Nile virus , but its importance as a vector of infectious diseases is still unknown . Aedes atropalpus is established in America and has been reported in a number of states including: Alabama, Georgia, Illinois, Indiana, Iowa, Kentucky, Minnesota, Ohio and New York. In Europe it has been reported in France, Italy, and more recently in the Netherlands. Aedes atropalpus is native to eastern North America and although originally limited to areas with rock pools , during the 1980s its utilisation of scrap tyres as an alternative larval development site resulted in its spread in America and into Europe. Aedes atropalpus was first reported in tyres in the US in 1979 and within two years had become the dominant species in tyre yards in Indiana . Having spread in the US it was then reported in Italy in the 1990s, France in 2003 (S. Chouin & F. Schaffner, unpublished data) and the Netherlands in the 2009 . Non-desiccating eggs were most likely imported from Canada and the US into Veneto Province in Italy via used tyres. Adults and larvae were found at a tyre depot in 1996 and again in 1997, and initial use of insecticides failed to eradicate populations . In France, some larvae were found at a used tyre yard in Poitou-Charentes (Vienne) in 2003 with evidence of reproduction but not of spreading outside the depot and a second introduction was observed in Normandy (Orne) in 2005, and immediate control measures (insecticiding) aiming also at Ae. albopictus achieved eradication (S. Chouin & F. Schaffner, unpublished data). It is suggested that eggs of Ae. atropalpus were also imported into the Netherlands through the tyre trade. Initial results from traps set up in the vicinity of infested areas have shown that these populations have remained localised to these sites . The population associated with latter introduction into the Netherlands has shown little spread. However, preliminary modelling shows that climatic conditions in the Netherlands are not a limiting factor for further spread of this species here or in large parts of Europe . Adults of Ae. atropalpus show a dark and clear pattern due to the presence of clear scale patches on a black background on the legs and other parts of the body, but this looks much less obvious than for the other invasive mosquitoes. The presence of two lateral lines of clear scales on a black background on the scutum (dorsal part of the thorax) is diagnostic compared to Ae. aegypti (lyre shape), Ae. albopictus (one median line), and Ae. japonicus (median and lateral lines). The pale rings on the legs are inter-articular whereas they are only basal for the above mentioned invasive species. Other indigenous Aedes species resemble, but they usually do not breed in tyres and other man-made containers. Eggs can be produced autogenously (i.e. without a blood meal) and as with other invasive mosquito species, these non-desiccating eggs can remain dormant out of water, hatching when submerged and once environmental conditions become favourable. Adult Ae. atropalpus tend to occur early in the season due to their ability to produce eggs without taking a blood meal . A study in Illinois found high abundance of Ae. atropalpus in tyres in open-field areas and ecotones, being most abundant here in June . Aedes atropalpus will readily bite humans and have a preference for mammalian hosts [3,15] . Previous studies have found deer and canaries as blood meal hosts . Has a preference for riparian/riverine habitats as rock pools; also human-made containers including used tyres . Typically inhabit warm, sunlit areas with larvae being found in habitats up to 30 °C but are also occasionally found in shaded areas . Their preference for tyres that are in direct sunlight as opposed to those in the shade has also been reported . Larvae are known to congregate at the bottom of rock pools under organic matter . Gravid females have been found laying eggs on the water surface . Females are known to be a pest near aquatic habitats , with biting activity reported during the day and night . They have a limited flight range . There is currently a lack of understanding of the habitat tolerances of Ae. atropalpus , however their northern distribution in North America suggests their potential for survival in northern Europe, as evidenced by populations in the Netherlands. There is some evidence to suggest that populations of Ae. atropalpus have declined in some areas of North America and that this may be due to interactions with Ae. japonicus in aquatic breeding sites . This mosquito species is not considered an important arboviral vector in the field. However, West Nile virus has been isolated from field collected Ae. atropalpus and laboratory competency studies have shown it to be a competent vector for West Nile virus, La Crosse virus, Japanese encephalitis virus, Saint Louis encephalitis virus, and Eastern equine encephalitis virus . Studies have found that Ae. atropalpus is susceptible to oral infection with La Crosse virus, capable of transmitting the virus through blood meals and through transovarial transmission . Transovarial transmission has also been demonstrated with Saint Louis encephalitis virus under laboratory conditions . Despite vector competence it is yet to be proven that this mosquito naturally transmits any of the above arboviruses. However, Ae. atropalpus shares a habitat with Ae. triseriatus, (primary vector of La Crosse virus in North America), and it is suggested that Ae. atropalpus may become important in the disease transmission cycle . Furthermore West Nile virus has been isolated from a pool of field collected Ae. atropalpus in the US suggesting that further studies are required to ascertain whether this mosquito species could play a role in West Nile virus transmission. Over the past five years, a number of countries in Europe have set up surveillance for Ae. albopictus and other exotic mosquito species . As they are often found in the same habitats, surveillance strategies for one species can apply to many more. No targeted surveillance for Ae. atropalpus exists in Europe; however nationwide surveillance of other invasive species and their introduction pathways in France, Italy and in the Netherlands led to identify foci of imported populations. Hand-held mouth aspirators, CO2 traps with octenol and BG sentinel traps were used to collect adult mosquitoes in Brabant, the Netherlands . In Illinois, CDC gravid traps, baited with bluegrass sod infusion were placed in wooded areas to collect adults . Deltamethrin was used to treat areas in Italy after reports of Ae. atropalpus found during surveillance for Ae. albopictus . Malathion is a broad-spectrum organophosphate insecticide that is commonly used as an adulticide for mosquitoes and other agricultural pests. A study has shown Ae. atropalpus to be more tolerant to malathion compared to Ae. triseriatus (in a previous study) and Ae. albopictus . Although there is no specific guidance on control of this mosquito species, much of the guidance for other container breeding species focuses on source reduction and insecticide use, which would be equally applicable in a synanthropic setting for Ae. atropalpus. Blood-seeking females are a nuisance pest, however they are currently not considered to pose a disease risk. National travel health network and centre information on how to avoid insect bites (including mosquito bites). Further information is required on the distribution of this species in Europe and the potential role of this mosquito in transmitting pathogens. It is not yet clear if this invasive species is a potential threat to public health in Europe. 1. Beier JC, Travis M, Patricoski C, Kranzfelder J. Habitat segregation among larval mosquitoes (Diptera: Culicidae) in tire yards in Indiana, USA. J Med Entomol. 1983 Jan 27;20(1):76-80. 2. Romi R, Sabatinelli G, Savelli LG, Raris M, Zago M, Malatesta R. Identification of a North American mosquito species, Aedes atropalpus (Diptera: Culicidae), in Italy. J Am Mosq Control Assoc. 1997 Sep;13(3):245-6. 3. Medlock JM, Snow KR, Leach S. Potential transmission of West Nile virus in the British Isles: an ecological review of candidate mosquito bridge vectors. Med Vet Entomol. 2005 Mar;19(1):2-21. 4. Lampman R, Hanson S, Novak R. Seasonal abundance and distribution of mosquitoes at a rural waste tire site in Illinois. J Am Mosq Control Assoc. 1997 Jun;13(2):193-200. 5. Yee DA, Kneitel JM, Juliano SA. Environmental correlates of abundances of mosquito species and stages in discarded vehicle tires. J Med Entomol. 2010 Jan;47(1):53-62. 6. Freier JE, Beier JC. Oral and transovarial transmission of La Crosse virus by Aedes atropalpus. Am J Trop Med Hyg. 1984 Jul;33(4):708-14. 7. Turell MJ, O'Guinn ML, Dohm DJ, Jones JW. Vector competence of North American mosquitoes (Diptera: Culicidae) for West Nile virus. J Med Entomol. 2001 Mar;38(2):130-4. 8. Scholte EJ, Den Hartog W, Braks M, Reusken C, Dik M, Hessels A. First report of a North American invasive mosquito species Ochlerotatus atropalpus (Coquillett) in the Netherlands, 2009. Euro Surveill. 2009;14(45):19400. 9. Carpenter SJ, LaCasse WJ. Mosquitoes of North America (North of Mexico). California: University of California Press; 1955. 10. Nawrocki SJ, Craig GB, Jr. Further extension of the range of the rock pool mosquito, Aedes atropalpus, via tire breeding. J Am Mosq Control Assoc. 1989 Mar;5(1):110-4. 11. Reinert JF. New classification for the composite genus Aedes (Diptera: Culicidae: Aedini), elevation of subgenus Ochlerotatus to generic rank, reclassification of the other subgenera, and notes on certain subgenera and species. J Am Mosq Control Assoc. 2000 Sep;16(3):175-88. 12. Reinert JF, Harbach RE, Kitching IJ. Phylogeny and classification of Finlaya and allied taxa (Diptera : Culicidae : Aedini) based on morphological data from all life stages. Zool J Linn Soc-Lond. 2006 Sep;148(1):1-101. 13. Juliano SA, Lounibos LP. Ecology of invasive mosquitoes: effects on resident species and on human health. Ecol Lett. 2005 May;8(5):558-74. 14. Yee DA. Tires as habitats for mosquitoes: a review of studies within the eastern United States. J Med Entomol. 2008 Jul;45(4):581-93. 15. Turell MJ, Dohm DJ, Sardelis MR, Oguinn ML, Andreadis TG, Blow JA. An update on the potential of north American mosquitoes (Diptera: Culicidae) to transmit West Nile virus. J Med Entomol. 2005 Jan;42(1):57-62. 16. Andreadis TG, Wolfe RJ. Evidence for reduction of native mosquitoes with increased expansion of invasive Ochlerotatus japonicus japonicus (Diptera: Culicidae) in the northeastern United States. J Med Entomol. 2010 Jan;47(1):43-52. 17. Armistead JS, Nishimura N, Escher RL, Lounibos LP. Larval competition between Aedes japonicus and Aedes atropalpus (Diptera: Culicidae) in simulated rock pools. J Vector Ecol. 2008 Dec;33(2):238-46. 18. Armistead JS, Nishimura N, Arias JR, Lounibos LP. Community ecology of container mosquitoes (Diptera: Culicidae) in Virginia following invasion by Aedes japonicus. J Med Entomol. 2012 Nov;49(6):1318-27. 19. Hardy JL, Rosen L, Reeves WC, Scrivani RP, Presser SB. Experimental transovarial transmission of St. Louis encephalitis virus by Culex and Aedes mosquitoes. Am J Trop Med Hyg. 1984 Jan;33(1):166-75. 20. ECDC. Development of Aedes albopictus risk maps. Stockholm: European Centre for Disease Prevention and Control, 2009. 21. Kesavaraju B, Brey CW, Farajollahi A, Evans HL, Gaugler R. Effect of malathion on larval competition between Aedes albopictus and Aedes atropalpus (Diptera: Culicidae). J Med Entomol. 2011 Mar;48(2):479-84.
0.512102
Aging involves multiple biologically complex processes characterized by a decline in cellular homeostasis over time leading to a loss and impairment of physiological integrity and function. Specific cellular hallmarks of aging include abnormal gene expression patterns, shortened telomeres and associated biological dysfunction. Like all organs, the lung demonstrates both physiological and structural changes with age that result in a progressive decrease in lung function in healthy individuals. Cigarette smoking accelerates lung function decline over time, suggesting smoking accelerates aging of the lung. Based on this data, we hypothesized that cigarette smoking accelerates the aging of the small airway epithelium, the cells that take the initial brunt of inhaled toxins from the cigarette smoke and one of the primary sites of pathology associated with cigarette smoking. Using the sensitive molecular parameters of aging-related gene expression and telomere length, the aging process of the small airway epithelium was assessed in age matched healthy nonsmokers and healthy smokers with no physical manifestation of lung disease or abnormalities in lung function. Analysis of a 73 gene aging signature demonstrated that smoking significantly dysregulates 18 aging-related genes in the small airway epithelium. In an independent cohort of male subjects, smoking significantly reduced telomere length in the small airway epithelium of smokers by 14% compared to nonsmokers. These data provide biologic evidence that smoking accelerates aging of the small airway epithelium. Aging is a complex natural process that affects all living organisms, and can be broadly defined as a progressive decline in homeostasis of biological processes that leads to a loss and impairment of physiological integrity and function with a subsequent increased risk of disease and death ,. The biologic mechanisms of aging are only partly understood, but include genomic instability, telomere attrition, cellular senescence, epigenetic alterations, loss of protein homeostasis (proteostasis), dysregulated nutrient sensing, mitochondrial dysfunction, altered intercellular communication and stem cell exhaustion ,. Similar to other organs, the lung demonstrates a progressive decrease in lung function in healthy individuals ,. Epidemiological studies have demonstrated that smoking results in accelerated lung function decline over time, suggesting smoking accelerates aging of the lung ,. In support of this concept, telomere length analysis of blood leukocytes has demonstrated that smoking is associated with shortened telomeres -. Based on the data indicating that smoking accelerates the aging-related decline in lung function, and that smokers have shorter telomere lengths in blood leukocytes, we hypothesized that cigarette smoking accelerates aging of the small airway epithelium, the cell population directly exposed to the inhaled toxins from the cigarette smoke, and one of the primary sites in the lung to develop histologic abnormalities associated with cigarette smoking -. To assess the effect of cigarette smoking on small airway epithelium aging, we compared age matched healthy nonsmokers and healthy smokers with no clinical manifestation of lung disease using the sensitive biologic parameters of gene expression and telomere length. Analysis of small airway epithelium gene expression levels demonstrated that smoking significantly dysregulates expression of an aging gene signature . Further, telomere length analysis in an independent cohort of age matched male subjects revealed that smoking significantly reduced telomere length in the small airway epithelium. Overall, these data provide biologic evidence that before the manifestation of lung function decline, smoking accelerates aging of the small airway epithelium by dysregulation of age-related gene expression and enhanced telomere erosion. Healthy nonsmokers and healthy smokers were recruited from the general population in New York City. Individuals were evaluated at the Weill Cornell and Rockefeller University NIH Clinical and Translational Science Centers and the Department of Genetic Medicine Clinical Research Facility, using Institutional Review Board-approved clinical protocols and signed informed consent prior to any procedures. The criteria for “healthy” was based on history, physical exam, complete blood count, coagulation studies, liver function tests, urine studies, chest X-ray, EKG and pulmonary function tests (for full inclusion/exclusion criteria, see Additional file 1, Methods) ,,. All subjects were negative for HIV1 and had normal α1-antitrypsin levels. Smoking status was verified by urine nicotine and cotinine levels. Nonsmokers were defined as self-reported life-long nonsmokers, with non-detectable urine nicotine (<2 ng/ml) and cotinine (<5 ng/ml); and smokers were defined as self-reported current smokers with urine nicotine ≥30 ng/ml and/or urine cotinine ≥50 ng/ml. Two independent age matched cohorts of nonsmokers and smokers were used in this study to analyze the effects of smoking on small airway epithelium age-related gene expression (Table 1) and telomere length (Table 2). 1Data is presented as mean ± standard deviation. 2B = Black, W = White, O = Other. 3Pulmonary function testing parameters are given as % predicted value with the exception of FEV1/FVC, which is reported as % observed; FVC - forced vital capacity, FEV1 - forced expiratory volume in 1 sec. FVC, FEV1 and FEV1/FVC are post-bronchodilator values. TLC - total lung capacity, DLCO - diffusing capacity of the lung for carbon monoxide. 5As % of small airway epithelium recovered. 6Smoker vs Nonsmoker comparison by student’s t-test with p < 0.05 being significant. 6Smoker vs Nonsmoker comparison by student’s ttest with p < 0.05 being significant. Small airway epithelium (10th to 12th order) was collected by fiberoptic bronchoscopy by brushing as previously described ,,. Following withdrawal of the bronchoscope, the cells were dislodged from the brush by flicking the brush tip in 5 ml of ice-cold bronchial epithelium basal medium (BEBM, Lonza, Basel, Switzerland). An aliquot of all airway epithelial samples was used to quantify the total number of cells recovered, and to quantify the percentage of epithelial and inflammatory cells and the proportions of epithelial cell subtypes. Cells from a second aliquot were pelleted for either RNA or DNA extraction for subsequent transcriptome or telomere length analysis, respectively. Pelleted small airway epithelial cells obtained by bronchoscopy were immediately processed for RNA extraction and microarray analysis as previously described ,,. Total RNA was extracted from the small airway epithelium of 29 nonsmokers and 29 smokers (Table 1) using the TRIzol method (Invitrogen) with subsequent clean-up using the RNeasy MinElute RNA purification kit (Qiagen, Valencia, CA) and stored in RNAsecure (Ambion, Austin, TX) at -80°C. RNA quality was assessed using a Bioanalyzer (Agilent Technologies, Santa Clara, CA) to determine RNA integrity (RIN value) with only samples displaying a RIN >6 included in this study and concentration quantified with a NanoDrop ND-1000 spectrophotometer (NanoDrop Technologies, Wilmington, DE). One μg of total RNA was prepared for microarray genome-wide transcriptome analysis using the 3 IVT Express Kit (Affymetrix, Santa Clara, CA) and samples were submitted to the Genomics Resources Core Facility at Weill Cornell Medical College for hybridization, washing and scanning of the Affymetrix HG U133 Plus 2.0 microarray GeneChips. All HG-U133 Plus 2.0 microarrays were processed according to Affymetrix protocols, hardware and software, including being processed by the Affymetrix fluidics station 450 and hybridization oven 640 and scanned with an Affymetrix Gene Array Scanner 3000 7G. The captured image data from the HG-U133 Plus 2.0 arrays were processed using the MAS5 algorithm in GeneSpring version 7.3 (Affymetrix Microarray Suite Version 5) and normalized per chip to the median expression value of each sample to generate P calls for filtering. Overall microarray quality was verified by the criteria: (i) 3’/5’ ratio for GAPDH ≤3; and (ii) scaling factor ≤10.0. CEL files were processed by Partek Genomics Suite Software version 6.6 (Partek, Inc., St Louis, MO) for quality control, identification of outliers and determination of expression level for all probesets, using the Robust Multi-chip Average (RMA) method with Partek default parameters. Genes containing U133 2.0 microarray probesets and an Affymetrix P call in ≥10% of samples were considered to be expressed in the small airway epithelium. To confirm the genome wide transcriptional changes in response to smoking the phenotypes were evaluated in Partek for sources of variation and an ANOVA was performed to assess the effect of smoking on gene expression corrected for all covariates, including age, gender, race and region (small airway epithelium from distal right vs distal left lower lobe of the lung). Smoking-dependent differences in expression identified by Students t test and a p < 0.05 (using a Benjamini-Hochberg correction to limit the false discovery rate) were considered to represent a significant difference in expression between groups. Global patterns of expression were examined using a euclidean dissimilarity and average linkage hierarchical cluster analysis. To assess the effect of smoking on aging of the small airway epithelium, we compared healthy smoker vs healthy nonsmoker small airway epithelium expression of a 73 gene aging signature identified by de Magalhaes et al. by meta-analysis of age-related gene expression profiles using 27 datasets from mice, rats and humans representing a common signature of aging between different species and tissues. Using criteria described above to define small airway epithelial expression resulted in removal of 6 genes from the analysis with a final aging signature of 67 genes (Additional file 1: Table S1). The phenotypes were evaluated in Partek for sources of variation and an ANOVA was performed to assess the effect of smoking on gene expression corrected for all covariates, including age, gender, race and region (small airway epithelium from distal right vs distal left lower lobe of the lung). Smoking-dependent differences in expression identified by Students t test and a p < 0.05 (using a Benjamini-Hochberg correction to limit the false discovery rate) were considered to represent a significant difference in expression between groups. Global patterns of expression of the 67 aging-related genes were examined using principal component analysis (PCA). The raw data and full dataset are publically available at the Gene Expression Omnibus (GEO) site (http://www.ncbi.nlm.nih.gov/geo/), accession number GSE52237. To analyze expression of aging genes in the small airway epithelium at the protein level immunohistochemistry analysis was performed. Commercially available biopsy sections of paraffin embedded normal human bronchus tissue (Cat No: HuFPT111, US Biomax, Inc., Rockville, MD) were purchased for 3 independent donors (Donor 1: 21 yr old female, Donor 2: 16 yr old female and Donor 3: 37 yr old male). The samples were first cleaned in xylene and rehydrated with graded ethanol followed by steaming the samples for 15 min in citrate buffer solution (Thermo Scientific), followed by cooling at 23°C for 20 min to recover antigens and enhance staining. Endogenous peroxidase activity was quenched using 0.3% H2O2 for 30 min, followed by incubation for 20 min with normal serum matched to the secondary antibody to reduce background staining. Samples were incubated overnight at 4°C with the following primary antibodies all purchased from Abcam (Cambridge, MA) at specific individual concentrations: rabbit polyclonal anti-C3 antibody (ab129945, 0.2 μg/ml), rabbit polyclonal anti-CX3CL1 antibody (ab85034, 0.2 μg/ml), rabbit monoclonal anti-CLU antibody (ab92548, 0.2 μg/ml), rabbit polyclonal anti-LAPTM5 antibody (ab108014, 0.2 μg/ml), rabbit monoclonal anti-MGST1 antibody (ab131059, 1 μg/ml) and rabbit monoclonal anti-SPP1 antibody (ab91655, 0.2 μg/ml). Isotype-matched IgG (Jackson ImmunoResearch Laboratories Inc., West Grove, PA) was used as a negative control. The Vectastain Elite ABC kit and AEC substrate kit (Dako North America Inc., Carpinteria, CA) were used to visualize antibody binding and slides were counterstained with Mayer’s hematoxylin (Polysciences Inc., Warrington, PA) and mounted using faramount mounting medium (Dako North America Inc.). Images were acquired using a Nikon Microphot microscope with a Plan 40 ± N.A. 0.70 objective lens and an Olympus DP70 CCD camera. Pelleted small airway epithelial cells obtained by bronchoscopy or blood derived leukocytes were processed for DNA extraction using the Qiagen Puregene kit (Germantown, MD). DNA was extracted from the small airway epithelium of 21 male nonsmokers and 22 male smokers and matched blood derived leukocytes of a subset of 12 nonsmokers and 16 smokers (Table 2) and the telomere length for each sample determined by Southern analysis using the TeloTAGGG telomere length assay kit (Roche Applied Science, Indianapolis, IN). Briefly, 1 μg of purified DNA was digested with the restriction enzymes HinfI plus RsaI (20 U each) in a 20 μl reaction volume for 2 hr, 37°C. The reaction was stopped by adding gel loading buffer. Digested DNA was separated by electrophoresis on a 0.8% agarose gel in Tris-acetate ethylenediaminetetraacetic acid (EDTA) buffer at 5 V/cm for 4 h and transferred to a nylon membrane by Southern analysis using 3 M NaCl plus 0.3 M sodium citrate buffer pH 7.0 for 16 hr. The transferred DNA was fixed by UV-crosslinking (120 mJ) to the nylon membrane. The terminal restriction fragments (TRFs) were hybridized to a digoxigenin (DIG)-labeled probe specific for telomeric repeats for 1 hr, 42°C, followed by incubation with a DIG-specific antibody covalently coupled to alkaline phosphatase for 30 min, 25°C. Finally, the immobilized telomere probe on the membrane was detected by incubation with CDP-Star, a chemiluminescent substrate, followed by exposure to an X-ray film. The film was then scanned with a densitometer and the mean TRF length was calculated using Image quant TL software (GE Healthcare, Port Washington, NY). Samples were analyzed in an un-blinded fashion; however to minimize the effect of variability between experiments, equal numbers of nonsmoker and smoker samples were run on each gel (see Additional file 1: Figure S1 for representative gels). Comparison of demographic parameters among groups was performed by 2-tailed Students t test. For the HG-U133 Plus 2.0 gene expression data, an ANOVA was performed to assess the effect of smoking significance on gene expression corrected for all covariates, including age, gender, ethnicity and region. Differences in expression were evaluated by Students t test and a p < 0.05, using a Benjamini-Hochberg correction to limit the false discovery rate, was considered to represent a significant difference in expression between groups. The difference in mean telomere (TRF) length between phenotypes was calculated by 2-tailed Students t test and a p value <0.05 was considered to represent a significant difference in length between groups. Correlations between mean telomere length and age as well as smoking history were done using both univariate and multivariate linear regression and calculated using commercial software (Stata 10.1, StataCorp, College Station, TX). A p < 0.05 was considered to represent a statistically significant correlation. To assess the effect of smoking on aging-related gene expression in the small airway epithelium we used a cohort of age matched healthy nonsmokers (n = 29) and healthy smokers (n = 29; Table 1). Cell differential analysis of the small airway epithelial brushes of nonsmokers and smokers demonstrated epithelial cells were the major dominant cell population with a small amount of inflammatory cells. However, no significant differences (p > 0.2) in the total epithelial (nonsmokers, 98.9 ± 0.9% and smokers, 99.2 ± 0.8%) and inflammatory (nonsmokers, 1.0 ± 0.8% and smokers, 0.8 ± 0.8%) cell populations between phenotypes was observed. To confirm the effect of smoking at the mRNA level in our study cohort, we performed genome wide transcriptional analysis to identify the total number of smoking dysregulated transcripts in the small airway epithelium. We hypothesized that small changes in gene expression would indicate the early stages of smoking dependent changes on accelerating aging of the airway/lung. Therefore, we rationalized that a 20% difference in gene expression (i.e., 1.2-fold) would be an acceptable cutoff to robustly detect smoking dependent changes and result in functional biological changes at the protein level for each gene. A volcano plot demonstrated there were 2488 differentially expressed probesets which represent a total of 1737 unique genes (947 down-regulated by smoking and 790 up-regulated by smoking) using criteria of presence of U133 2.0 microarray probesets and a P call criteria of ≥10% of samples, fold-change ≥1.2 and adjusted p < 0.05 with false discovery rate correction for multiple comparisons corrected for all covariates, including age, gender, race and region (distal right vs distal left lower lobe; Figure 1A). Unsupervised hierarchical cluster analysis using the 2488 smoking-dysregulated probesets revealed complete separation of smoker and nonsmoker small airway epithelial subjects (Figure 1B). Smoking dysregulated genes in the small airway epithelium. A. Volcano plot, smoker vs nonsmoker small airway epithelium (n = 29 nonsmokers and n = 29 smokers) using all expressed (P call ≥10) probesets as input dataset. Ordinate - p value; abscissa - fold-change (log2). Data demonstrates 2488 smoking-dysregulated probesets [fold-change ≥1.2, p < 0.05 with false discovery rate (FDR) correction] representing a total of 1737 unique genes. B. Hierarchical cluster analysis of smoker vs nonsmoker small airway epithelium based on expression of 2488 smoking-dysregulated probesets [fold-change ≥1.2, p < 0.05 with false discovery rate (FDR) correction]. Probesets expressed above the average are represented in red, below average in blue and average in grey. The probesets are represented horizontally and individual samples vertically. To assess the effect of smoking on aging-related gene expression in the small airway epithelium, we analyzed expression levels of a common 73 gene aging signature identified from meta-analysis of age-related gene expression profiles using datasets from mice, rats and humans . Due to the multiple cell types used in the meta-analysis, the aging signature is not specific for epithelial or pulmonary cells per se, thus preventing the study of small airway epithelial specific aging genes in response to smoking. However, it likely represents ubiquitously expressed genes that are involved in the natural aging process of all cell types. Based on the presence of U133 2.0 microarray probesets and a P call criteria of ≥10% of samples to be considered expressed, 67 genes of the aging signature were expressed in the small airway epithelium of healthy nonsmokers and smokers (Additional file 1: Table S1). Principal component analysis, using the 67 genes as an input dataset, demonstrated clear separation of the samples by smoking phenotype when corrected for all covariates, including age, gender, race and region (distal right vs distal left lower lobe; Figure 2A). A volcano plot identified 13 significantly up-regulated genes and 5 significantly down-regulated genes using criteria of fold-change ≥1.2 and adjusted p < 0.05 with false discovery rate correction for multiple comparisons (Figure 2B). Of the 13 genes significantly up-regulated by smoking, 11 demonstrated the same direction of expression observed with aging (SPP1, LAPTM5, ANXA3, MPEG1, MGST1, MSN, CLU, FCGR2B, GSTA1, LITAF, and VAT1), whereas 2 demonstrated the opposite direction of expression observed with aging (COL3A1 and GHITM; Table 3) . Of the 5 genes significantly down-regulated by smoking, 2 demonstrated the same direction of expression observed with aging (C4A and CX3CL1), whereas 3 demonstrated the opposite direction of expression observed with aging (MT1F, PCSK6 and C3) . As an alternative strategy we assessed expression of the 67 gene aging signature in the list of 1737 unique smoking dysregulated genes identified in our cohort (Figure 1). Using this approach 14/67 (ANXA3, C3, C4A, CLU, CX3CL1, GHITM, GSTA1, LITAF, MGST1, MPEG1, MSN, MT1F, PCSK6 and SPP1) aging signature genes were present in the smoking dysregulated gene list. These 14 aging genes were all present in our original approach which identified 18/67 aging genes to be dysregulated in response smoking. These data demonstrate that independent of the analytic strategy the smoking dependent changes in expression of the aging gene signature are consistent. To validate these gene expression findings, correlation analysis was carried out on the 18 aging genes differentially expressed in the small airway epithelium by comparing smoker vs nonsmoker fold-changes in the U133 gene expression with U133 and RNA Seq gene expression data from two independent datasets of age-matched samples ,. The results demonstrate a high degree of correlation in expression pattern of the 18 aging-related genes dysregulated by smoking with both the U133 (r2 = 0.85) and RNAseq (r2 = 0.90) datasets (Figure 2C-D). Due to the lack of availability of small airway epithelial biopsies from nonsmokers and smokers, we were unable to quantify and assess the smoking dependent mRNA gene expression changes we observed at the protein level. However, to demonstrate epithelial expression of the aging related genes we performed immunohistochemistry staining analysis of commercially available normal human bronchus sections from 3 independent donors for 6 of the aging signature genes whose expression are dysregulated by smoking: C3, clusterin (CLU), CX3CL1, LAPTM5, MGST1 and SPP1. The staining results clearly demonstrate that all 6 genes are epithelial expressed (Figure 3). Overall, these data demonstrate that smoking results in significant abnormal expression of a number of aging-related genes in the small airway epithelium. Expression of an aging gene signature in small airway epithelium of age matched healthy smokers vs healthy nonsmokers. A. Principal component analysis of gene expression of small airway epithelium of smokers (n = 29, orange circles) and nonsmokers (n = 29, green circles) using the de Magalhaes et al. 67 gene aging signature as an input dataset. Data is corrected for all covariates except smoking status. B. Volcano plot, smoker vs nonsmoker small airway epithelium of the 67 aging gene signature. Ordinate - p value (log10); abscissa - fold-change (log2). Red circles represent genes significantly differentially expressed in smoker vs nonsmoker small airway epithelium (≥1.2 fold-change up- or down-regulated; p < 0.05 using a Benjamini-Hochberg correction of false discovery rate). C. Correlation analysis of the 18 aging genes differentially expressed in the small airway epithelium of healthy smokers vs healthy nonsmokers, comparing smoker vs nonsmoker fold-changes in U133 gene expression with U133 gene expression from an independent dataset (n = 12 nonsmokers and n = 10 smokers, GSE4498) . D. Correlation analysis of the 18 aging genes differentially expressed in the small airway epithelium of healthy smokers vs healthy nonsmokers, comparing smoker vs nonsmoker fold-changes in U133 gene expression with RNA Seq gene expression from an independent dataset (n = 5 nonsmokers and n = 6 smokers) . 1List of aging genes based on de Magalhaes et al. ; listed are the genes with significantly different expression in the small airway epithelium of healthy smokers vs healthy nonsmokers; for the data for all of the de Magalhaes et al. “aging genes”, see Additional file 1: Table S1. 2Fold-change - mean in healthy smokers/mean in healthy nonsmokers. 3False discovery rate, p < 0.05, Partek Benjamini-Hochberg correction. 4Direction of expression observed with aging, see de Magalhaes et al. . Immunohistochemical staining analysis of smoking dysregulated aging genes in the small airway epithelium. Normal nonsmoker human bronchus sections from 3 independent donors were analyzed for expression of C3, clusterin (CLU), CX3CL1, LAPTM5, MGST1 and SPP1 using gene specific antibodies. Isotype specific antibody was used as negative control. Scale bar 20 μm. The effect of smoking on aging of the small airway epithelium was assessed using telomere length analysis as an alternative marker of aging in an independent cohort of age-matched healthy nonsmokers and smokers (Table 2). Because of the known differences in telomere length between males and females we restricted the analysis to only males. Telomere length of DNA extracted from the small airway epithelium was assessed by Southern analysis of HinfI and RsaI digested total DNA and the mean terminal restriction fragment (TRF) length calculated for each sample. In healthy nonsmokers (n = 21) the mean TRF length was 7.69 ± 1.41 kb whereas in age-matched healthy smokers (n = 22), the mean TRF length was 6.65 ± 1.16 kb, and significantly shorter (p < 0.005; Figure 4A). As expected, in the healthy nonsmokers, telomere length significantly decreased with age (r2 = 0.20, p < 0.05; Figure 4B). In contrast, in healthy smokers there was no significant decrease in telomere length with age (r2 = 0.001, p > 0.8). Telomere length in smokers was not dependent on smoking history, with no correlation between telomere length and pack-yr (r2 = 0.014, p > 0.6; Figure 4C). To assess the effect of race on smoking dependent telomere shortening in the small airway epithelium, we compared telomere length in the small airway epithelium of smokers vs nonsmokers subdivided by racial categories (Black, White and Other). The results demonstrate that in each racial subgroup there is a trend of shorter telomeres in smokers vs nonsmokers (Black, 6.77 ± 0.92 kb vs 7.61 ± 1.28 kb; White, 5.88 ± 0.35 kb vs 7.57 ± 1.32 kb and Other, 6.77 ± 0.55 kb vs 7.86 ± 1.55 kb; Additional file 1: Figure S2). Due to the small sample size for each subgroup statistical significance in telomere length differences is only observed between White smokers vs nonsmokers (p < 0.03), however due to consistency of the smoking dependent effects on telomere length between racial subgroups the data suggests that race plays no significant role in smoking dependent telomere shortening of the small airway epithelium. Telomere length in the small airway epithelium of nonsmokers and smokers. DNA was isolated from the small airway epithelium of male healthy nonsmokers (n = 21) and male healthy smokers (n = 22) and telomere length [terminal restriction fragment (TRF)] quantified by Southern analysis. A. Data shown is represented as the average ± standard deviation of the TRF length (kb). The difference in mean TRF length between phenotypes was calculated by 2-tailed Students t test. B. Correlation of telomere length with age. Telomere length was quantified by Southern analysis and correlated with the age of each individual subject. Correlations between mean telomere length and age were performed using linear regression. Black circles represent healthy nonsmokers and grey circles represent healthy smokers. C. Correlation of telomere length with smoking history (pack-yr). Telomere length from healthy smokers was quantified by Southern analysis and correlated with the smoking history for each individual subject. Correlations between mean telomere length and smoking history were performed using linear regression. Previous studies have shown that telomere length is shorter in peripheral blood leukocytes of smokers compared to nonsmokers -. Cell differential analysis of the small airway epithelial brushes of nonsmokers and smokers demonstrated epithelial cells were the dominant cell population with a small amount of inflammatory cells. However, there was a significantly lower level of inflammatory cells in the brushings of smokers compared to nonsmokers (0.9% vs 2.5%, p < 0.0001; Table 2) suggesting the reduced telomere length we observe in the small epithelium of smokers does not result from the presence of inflammatory cells and are specific for the epithelial cell populations. In support of this, we measured the telomere length in the peripheral blood leukocytes of a subset of age matched nonsmokers (n = 12/21) and smokers (n = 16/22) (40.8 ± 9.7 yrs nonsmokers and 46 ± 6.4 yrs smokers, p > 0.12). The results demonstrated no significant differences (p > 0.1) in the telomere length of peripheral blood leukocytes in smokers vs nonsmokers (7.04 ± 0.71 kb vs 7.42 ± 0.54 kb; Additional file 1: Figure S3). However, in the same samples we still observe a significant decrease (p < 0.002) in the telomere length of the small airway epithelium in smokers vs nonsmokers (6.49 ± 0.74 kb vs 7.95 ± 1.26 kb). Therefore, these data suggest that reduced telomere length observed in the small epithelium of smokers is specific for the epithelial cell populations. Overall, these data suggest that smoking prematurely ages the small airway epithelium with smokers displaying on average telomere lengths ~14% shorter than chronologically age-matched healthy nonsmokers. During the natural aging process of healthy individuals, the lung undergoes a progressive decrease in lung function ,. Studies have demonstrated that cigarette smoking accelerates the rate of lung function decline, suggesting that smoking results in premature aging of the lung ,. The small airway epithelium consists of 4 major cell types that line the airway lumen ≥6th generations and take the initial brunt of inhaled toxins from the cigarette smoke ,,. The earliest abnormalities and pathology linked to smoking and development of COPD manifest in the small airway epithelium ,,, and biologic changes in the small airway epithelium in response to cigarette smoking can be observed long before the presence of pathology ,,. The focus of this study was to determine if cigarette smoking results in accelerated aging of the small airway epithelium at the molecular level before physical manifestation of lung disease or lung function decline. To address this question we used the sensitive molecular parameters of aging-related gene expression and telomere length to compare the aging process of the small airway epithelium in age matched healthy nonsmokers and healthy smokers. The data demonstrate that smoking significantly dysregulates expression of an aging gene signature in the small airway epithelium, with ~26% of the aging genes (18/67) up or down-regulated greater than 1.2-fold in response to smoking. Over 72% (13/18) of the 18 smoking dysregulated genes demonstrate the same direction of expression observed with aging, suggesting smoking is accelerating the aging process in the small airway epithelium. In support of this concept, telomere length analysis in the small airway epithelial cells of an independent cohort of age matched male subjects revealed smoking status had a significant impact on telomere length, with smokers displaying on average a ~14% decrease in telomere length compared to nonsmokers. One of the limitations of this study is the presence of multiple cell types and epithelial subsets in the brushings obtained during bronchoscopy which makes it difficult to determine the individual cell type responsible for the accelerated aging in response to smoking. However, the epithelial brushes we analyze are processed immediately upon collection thus reducing any potential artifacts from downstream processing and thus represent a true reflection of the in vivo environment. In addition, the differences in number of epithelial cell subsets (ciliated, secretory, basal and undifferentiated columnar) between nonsmokers and smokers may allow inference towards the cell populations responsible for the smoking dependent changes we observe at the gene expression level and in telomere length and suggest that specific cell populations are more susceptible to the aging effects of cigarette smoke. Currently the biological consequences of smoking-dependent changes in age related gene expression and telomere shortening in the small airway epithelium on lung function decline and/or clinical disease in smokers are unknown. In addition, it is currently unknown if the effects of aging gene dysregulation and telomere shortening are mutually exclusive with each contributing independently to development of specific lung disease (e.g. COPD vs lung cancer) or both processes are biologically connected and contribute equally to development of disease. Future studies dissecting the biological consequences of each molecular phenomenon will help clarify their role in development of specific lung diseases. However, based on the known function of the aging signature genes and telomeres we can postulate potential consequences of these changes. Characterization of the biological processes associated with the original 73 gene aging signature identified by de Magalhaes et al. highlighted enrichment for genes involved in multiple cellular processes, including immune response, inflammation, mitochondrial function, metabolism, lysosomes, collagen, apoptosis, cell cycle and markers of cellular senescence. Pathway analysis of the 18 smoking dysregulated genes failed to identify enrichment of a single biological process. However, based on the known biological functions of a subset of these genes, we can hypothesize how they may play a role in regulating the response of the small airway epithelium to cigarette smoke exposure and their potential contribution to the development of long-term pathological changes associated with smoking. Based on the hypothesis that age-related gene expression changes may have a protective role in mediating the harmful effects of cellular dysfunction over-time, smoking-induced expression of these genes may serve a similar role. For instance, increased expression of the anti-oxidant genes MGST1 and GSTA1 in smokers most likely protects against elevated levels of harmful oxidants -. In addition, elevated expression of the protein chaperone clusterin (CLU) may curtail the effects of protein mis-folding and aggregation in response to cigarette smoke ,. Alternatively, dysregulated expression of some genes may play a key role in driving the pathological changes associated with cigarette smoking. SPP1, the most highly induced smoking-responsive aging gene, encodes osteopontin, a secreted cytokine-like molecule that mediates immune function and extracellular matrix (ECM) remodeling . A recent study demonstrated that cigarette smoke-dependent up-regulation of SPP1 expression mediates induction of emphysema in an experimental mouse model . In addition, asbestos exposure in a murine lung fibrosis model results in up-regulation of SPP1 in bronchiolar epithelial cells . Microarray analysis comparing lungs of wild-type and SPP1 knockout mice exposed to asbestos showed that SPP1 modulated expression of a number of genes involved in cell signaling, immune system/defense, cell cycle regulation and ECM remodeling . Therefore, elevated expression of SPP1 in the small airway epithelium of smokers may have significant long term pathological consequences and may play a key role in the process of airway remodeling characterized in smoking-induced respiratory disease such as COPD. While a majority of the smoking dysregulated aging genes (13/18) displayed the same direction of smoking-induced expression as that observed with aging, the remaining 5 genes (COL3A1, GHITM, MT1F, PCSK6 and C3) demonstrated the opposite direction of expression observed with aging. At present, the long-term biological consequence of these alternate expression patterns is unknown. However, studies for COL3A1, which encodes for collagen 3A1, have shown that expression of this gene is positively regulated by SPP1 in a murine model of asbestos-induced lung fibrosis and that over-expression of the gene is linked to fibrosis and tissue remodeling . Therefore, while COL3A1 expression generally decreases with aging over time to possibly reduce age-related tissue remodeling, smoking-induced expression may contribute significantly to the increased incidence of airway remodeling in individuals with smoking-induced respiratory disease such as COPD ,,,,. Similarly to COL3A1, the putative tumor suppressor gene MT1F may contribute to smoking-induced pathological changes. MT1F expression is typically down-regulated in a majority of human colon tumor tissues and its enforced expression can result in increased apoptosis and inhibition of cell migration, invasion and in vivo tumorigenicity . Therefore, the general increase in expression of MT1F during aging may function as a protective mechanism to prevent development of cancer, whereas smoking-dependent down-regulation in the small airway epithelium may contribute to the increased risk of developing lung cancer in smokers . However, additional in vitro studies need to be performed to demonstrate a role of MT1F in development of lung cancer in addition to following subjects over time to confirm the correlation between MT1F expression and development of lung cancer and/or COPD. Based on the hypothesis that COPD is a disease of accelerated aging -, a number of different studies have analyzed the effect of smoking and COPD status on telomere length in blood leukocytes -. While some have demonstrated that smokers (independent of COPD status) have shorter blood leukocyte telomeres compared to nonsmokers ,,-, others have shown that COPD status, but not smoking is associated with shortened telomeres -. Recent findings from a large study group of 46,396 individuals from the Danish general population demonstrate that blood leukocyte short telomere length is associated with decreased lung function and increased risk of COPD . Furthermore, a meta-analysis of blood leukocyte telomere length and COPD from nine independent European studies demonstrated shorter telomere length in COPD subjects compared with healthy controls . Our study is the first to look at the effect of smoking on telomere length in the small airway epithelium and demonstrates that smoking accelerates telomere shortening in this cell population critical to lung function prior to the development of lung disease and lung function decline. In addition, our analysis of telomere length in the peripheral blood leukocytes in a subset of the nonsmokers and smokers in our study suggest the small airway epithelium is more sensitive to the telomere shortening effects of cigarette smoke exposure than peripheral blood leukocytes. In contrast to studies of blood leukocyte telomere length, we observed no negative correlation of telomere length with pack-yr. In our analysis we did not correct for confounders such as age and obesity as no significant differences are observed in these parameters between our nonsmoker and smoker groups. The presence of additional confounders may explain the lack of negative association of telomere length with pack-yr; alternatively it may result from the narrow range of pack-yr of our subjects which may prevent identification of an association. In addition, from a biological perspective a small amount of cigarette smoke exposure may result in significant effects on telomere length, therefore, masking any effect between individuals with medium to high pack-yr. The long term biological consequences of smoking-dependent telomere shortening in the small airway epithelium are unknown, however based on the function of telomeres, one may postulate a number of possible outcomes. Telomeres are specialized regions at the ends of linear chromosomes comprised of TTAGGG repeats that play a key role in maintaining chromosome stability and are linked to aging . In germ cells, telomeres are maintained by the enzyme complex telomerase; however, lack of expression of telomerase in somatic tissues results in decreased telomere length following each round of cell division . Once telomere length shortens to a specific point, a DNA damage response is elicited that is largely p53-dependent, resulting in reduced replication potential of the cell and activation of senescence with subsequent removal of the cells by apoptosis -. The numbers of senescent cells are known to increase in tissues during the natural aging process either due to an increase in their generation or decrease in their removal . In contrast to normal cells, senescent cells are known to adopt an altered phenotype highlighted by loss of proliferative activity, persistence of active metabolism, altered secretome (enriched in pro-inflammatory cytokines and matrix metalloproteinases) and resistance to apoptosis which can lead to loss of tissue homeostasis ,,. Therefore, smoking-dependent accelerated telomere shortening may increase the rate at which cells of the small airway epithelium reach cell senescence. In support of this concept, in vivo studies have shown that alveolar epithelial cells from COPD smokers have increased numbers of senescent cells relative to healthy controls ,. Furthermore, during normal aging increased expression of the smoking-induced aging gene CLU is used as a marker for cell senescence . Therefore, our gene expression data supports the hypothesis that telomere shortening may increase the rate of senescence in the small airway epithelium. In addition, studies of lung endothelial cells from COPD smokers demonstrated they reached senescence earlier during in vitro culture relative to nonsmokers and in doing so, adopted an abnormal secretory phenotype with secretion of a diverse array of cytokines known to play a role in inflammation and airway remodeling . Senescent cells within the small airway may adopt a similar function and secrete mediators that further drive smoking-induced pathology and airway remodeling. An alternative consequence of shorter telomere length in the small airway epithelium maybe a decline in resident stem/progenitor cell function similar to what is observed in other aging tissues ,. Basal cells are the stem/progenitor population of cells in the small airways that differentiate into the other specialized epithelial cell types of the airway during normal epithelial turnover and repair -. In vitro studies have demonstrated that continuous culture of these cells to a senescent state results in diminished differentiation capacity ,. Therefore, reduced telomere length in the airway basal cells of smokers may result in impaired differentiation capacity leading to disordered cell differentiation and airway epithelial remodeling . In support of this, the first manifestation of smoking-induced pathology in vivo of the small airway epithelium is basal cell hyperplasia which is characterized by increased proliferation and expansion of the basal cell population . However, at present we have no evidence suggesting telomere length in the basal cell population is reduced in response to cigarette smoke exposure. Future studies identifying the exact cell populations of the small airway epithelium that are more sensitive to smoking-dependent telomere shortening will help further our understanding of the biological consequences of this phenomenon. To date, the evidence clearly shows that short telomere length is associated with incidence of specific lung diseases; however, it is unknown whether telomere shortening itself drives the pathological processes in the lung or whether this phenomenon itself is a bystander and just a consequence of other processes at work. A recent study using telomerase null mice with short telomeres demonstrated that short telomeres alone was not sufficient to induce spontaneous lung disease; however, when mice with short telomeres were experimentally exposed to cigarette smoke, they had a lower threshold to develop emphysema . These findings suggest that multiple factors contribute to the development of cigarette smoke-induced airway disease and that telomere length, at least in part, plays a partial active role in “sensitizing” the cells to further damage and destruction. Therefore, similar mechanisms may be conserved in humans, and individuals with short telomeres may be of increased risk for development of smoking-induced COPD. In summary, these data provide evidence that smoking accelerates aging of the small airway epithelium at the molecular level. Future studies analyzing the function of smoking-induced aging-related genes and telomeres in small airway epithelium biology may help identify new therapeutic targets to treat smoking-induced lung disease. MSW conceived of the study and its design, performed research, data analysis and interpretation, and manuscript writing. BPD conceived of the study and its design, performed research, data analysis and interpretation. JS performed data analysis and interpretation. LBA performed research. TW performed research. AR performed research. LL performed research. NRH performed data analysis and interpretation. MRS coordinated collection of clinical material. AET coordinated collection of clinical material and performed statistical analysis on data. BGH coordinated collection of clinical material. RJK coordinated collection of clinical material. JGM performed statistical analysis on data. BA performed research, data analysis and interpretation. MASM performed data analysis and interpretation. RGC conceived of the study and its design, performed data analysis and interpretation, manuscript writing, and gave final approval of manuscript. All authors read and approved the final manuscript. We thank N. Mohamed and D.N. McCarthy for help in preparing this manuscript. These studies were supported, in part, by National Institutes of Health R01HL107882, P50 HL084936, UL1 TR000457 and UL1 RR024143. Lauren Buro-Auriemma and Lindsay Leif were supported, in part, by T32HL094284. Ann Tilley was supported, in part, by K23HL103837.
0.998529
Question: Which district has recently been declared the 23rd district of Arunachal Pradesh? On 9thDecember 2018, Shi Yomi has been declared as the 23rd district of Arunachal Pradesh. The district, consisting of four circles Mechuka, Pidi, Tato and Monigong. Shi Yomi was carved out of West Siang district. On 29th August, 2018, the Arunachal Pradesh Assembly had passed a bill for the creation of three new districts — Pakke-Kesang, Lepa Rada and Shi Yomi. After the formation of Pakke-Kesang and Lepa Rada (in the future), the total number of districts in the state will rise to 25. The Pakke-Kessang district has been carved out of East Kameng district, with five administrative units, and Lepa Rada by bifurcating the Lower Siang district, with four administrative units.
0.999922
The following article is about a roving robot that can kill ticks: http://www.vmi.edu/Content.aspx?id=10737425074 Great app. I’m also wondering if this technology can this be applied to other applications. Can it mow while it’s roving and spraying? Can it work with a team of other rovers to prevent ticks from repopulating? Can this technology be utilized as a solution for other forms of pests? Sabre and its flagship Autonomous Grit-Blaster is a successful commercial start-up out of the University of Technology Sydney http://sabreautonomous.com.au/ This is an excellent business model that more universities around the world should be modeling: research and development in collaboration with both private industry and government, both of which are willing to continue to invest resources into the R&D spinoff. Sabre’s partners include Burwell Technologies which makes sandblasting equipment, and the Australian government’s Roads and Maritime Services which has been involved in the development of the robotic grit-blasting technology in collaboration with UTS for more than 6 years.
0.999983
However, as will all other jobs, being an electrician also comes with a lot duties and responsibilities. If an aspiring electrician fails to comply with the safety codes and forgets to follow the rules and regulations, he or she will put the public at risk. This is important because if you know what characteristics a professional electrician has, you will be more keen to hire those who showcase such qualities. There are a number of things that professional electricians are responsible for. If a professional electrician makes sure that everything is in working order, then he or she can move on to the next job without any guilt. These electrical specializations are maintenance projects and construction projects. An experienced electrician is a good investment because he or she knows how to do his or her job better than their fresh graduate counterparts. If you hire an experienced electrician to handle all your electrical equipment installation needs, you can rest easy knowing that the job is done right. Electricians see to it that they brought their screwdrivers, wire strippers, pliers, drills and saws with them so that they can do their job more efficiently. This is why an electrician must always be equipped with all the right tools and expertise in handling electricity. One of these life threatening consequences is running the risk of getting electrocuted. A professional electrician is also very prone to injuries from saws, knives or all kinds of sharp tools or objects. Working with electricity is very risky business, which is why an electrician must always see to it that he or she complies with all the safety measures. By making sure that an electrician follows all the safety measures put in place for anything related to electricity, the safety of the general public is ensured. There are a lot of safety codes that experienced electricians need to follow in order for them to keep the public safe. How do you classify electricians? There are a total of three major kinds of professional electricians, including construction, factory and maintenance electricians. It is commonplace for an experienced electrician to only specialize in one specific field at a time. Professional construction electricians handle wiring projects for businesses, factories and houses. There are a lot of things that construction electricians help set up, among these are electrical components and outlets. Some of the responsibilities and duties a seasoned maintenance electrician does is inspecting and replacing wires. Professional maintenance electricians also help in replacing faulty electrical outlets, light switches and breaker boxes. Some of the tasks that experienced factory electricians do includes maintaining industrial robots, machinery controls and electrical generators.
0.999996
What is Sona Masoori Rice Sona Masoori rice, also known as Sona Masuri is a white, medium-grain rice, grown in the southern states of India, mainly in Andra Pradesh and Karnataka. Sona Masuri is considered the pride of Andhra Pradesh and symbolizes Andhra cuisine. Sona Masoori Grain is strong and doesnt easy turn to mush due to its high fibre contents. Sona Masoori Rice is lightweight, aromatic and is a premium quality rice. Sona masoori is a bit starchy and needs to be rinsed before cooking. Sona Masoori Rice contains lower starch than Basmati rice and is considered as healthy, easier to digest Sona Masuri rice is best suited to prepare pulihora/chitrannam/pulao type preparations, as well as well suitaed as accompaniment to Dal (pappu), Sambar, Rasam and Yogurt.
0.970835
After the Battle of Manzikert in 1071 between Byzantine and Seljuk forces, large parts of Anatolia and northern Mesopotamia were controlled by the Seljuks. In AH 495 (1101/1102) the Seljuk sultan Rukn ad-Dīn Barkiyāruq granted Hisn Kayfa as a timar (fief) to the Artukids. As a principality, Hasankeyf was ruled by sultans of Hasankeyf Beylik until 1232, when the Ayyubids invaded Hasankeyf and took over the control from the Artukids. The Ayyubids continued to rule the principality of Hasankeyf and managed to remain an autonomous entity, independent of the Mongol Ilkhanate, which ruled northern Mesopotamia until the 1330s. In the fourteenth century, the Ayyubids rebuilt the castle of Hisn Kayfa, which served as their stronghold as vassals of Mamluks and Dulkadirids until they were supplanted by the Ottoman Empire in 1517. In 1460-1482 Hasankeyf was under the control of the Ak Koyunlu. The area of Hasankeyf was declared an archaeological site in 1980. Hasankeyf is divided into three-parts: the Upper City (or the Citadel), the Lower City and the Opposite Side. The Citadel is located on a flat structure up on a cliff situated about 100 meters from the river. It has been used as a residential area for centuries, with its 4000 caves and the remains of the Ulu Mosque, built by Ayyubid Sultan el Melik el-Adil Muciruddin Muhammed in 1325, and Small and Great Castles, built into the rock. In the Lower City, one of the most important remaining structures is the El-Rızk Mosque, built on the banks of the river in 1409 by architects Muhammed and Ömer, who were commissioned by the Ayyubid sultan Süleyman. Its impressive 30-meter high minaret has remained intact. The Old Tigris Bridge, located right in the middle of the river, was considered the largest bridge built in the Middle Ages. The bridge was built by the Artukids and rebuilt during the period of the Ayyubids in 1349. The middle vault was built of wood to enable its removal in order to prevent enemies from entering the city during attacks. The most important monument on the opposite side of the river is the Mausoleum of Zeynel Bey, son of the Sultan Uzun Hasan of the Ak Koyunlu period. This tomb is one of the only examples left in Anatolia of the classical architectural decoration dominant in the fourteenth century. The area of Hasankeyf is threatened with disappearance due to the Ilısu Dam construction project, scheduled for completion in 2015. To protect the archaeological site of Hasankeyf, many activists are protesting against allowing this area to be submerged under water.
0.999957
Tickets to Kansas City Royals Vs. Detroit Tigers are available for the following venues, dates and times. To sort the list, click on the column header. To find tickets for the given venue, date and time, click the tickets link in that row.
0.954964
It was 30th of March, 2016, when I was invited by the Zionist Federation of UK and it was the day when I acquired honorary membership in the Zionist Federation. I received mixed responses from different social circles and schools of thought, especially from the South Asian community. 1) Why did I join the Zionist Movement being a Muslim? First of all, I need to ask a very exclusive question before an answer to the above question, which is what is Zionism? In fact, Zionism is a political reclamation movement to establish a separate, safe and inviolable state for the world Jewish community in Palestine. This movement was extremely crucial for the Jewish people, to settle them down in a secure place from the worst persecution of the European and the Middle Eastern peoples. Before the Zionist Movement, there was still persecutions, pogroms, genocide and ethnic cleansing of the Jewish people all around the world. Before the establishing of the Zionist Movement, the Jewish community was abandoned and helpless and the Zionist Movement gave them an aspiration, provided them a political platform to increment their lawful voice and a social support. The Zionist Movement was the national liberation movement of the Jewish people and its main goal was to the return the Jews to Eretz Yisrael (Land of Israel). The world history shows us the huge religious, cultural and social persecution of the Jewish people before the creation of the Zionist Movement in 1896 by Theodor Herzl. When people criticize Zionists, they mean Jews; you are talking anti-Semitism. I was not the sole Muslim who joined the Zionist Movement; there are numerous Muslims in history that also joined this movement in consensus with the Jewish community and in support of Israel. I joined the Zionist Federation in the UK because I believe that the Jewish community needs more support for their cause, they need someone, who campaigns for peace between the Muslim and the Jewish community, someone who can descant with the Pakistani community for them and someone who can educate their people about the reality of Israel and Jewish people. I then decided to become a part of the Zionist Federation, which is a great honour for me. There are many conspiracies against Zionism and Zionists in the world. So many people blame Zionism for every wrong that happens in the world and one of their claims is that Zionism is against Islam and the Muslims. These accusations are totally baseless and flimsy because those who accused Zionism are heedless of Zionism and its history. The history of Zionism started from 1896 and it was principally focused on the creation of a homeland for the Jewish people. There is no such agenda in Zionism against any religion, particularly Islam or Muslims. The Zionist Federation has never provided any shelter for religious haters or supported any anti-religion movement. 20% of the Israeli population consists of non-Jews and most of them are Arab Muslims. Muslims are living in peace and harmony under Israeli law and there are about 400 Mosques in Israel, which are protected by the Jewish state. This is the beauty of Zionism. Zionism has never encouraged religious violence. There is no any example of the Zionist Federation providing a platform against Islam or Muslims. The Zionist Federation always denounced terrorism, whether it is a political or a religious terrorism. There is freedom of speech and freedom of religion for Muslims in the state of Israel. Muslims live in the only democratic country in the Middle East without fear and persecution. We cannot find any religious discrimination against Arab Israelis in the Jewish state. Muslims have more rights than any other Islamic country in the Middle East. One of the foundations of Zionism is, settling the country of Israel as an expression of practical Zionism. One very essential thing people need to understand is that Zionism is the latest political nationalist movement of the Jewish people and it has nothing to do with Islam, the Holy Quran or Muslims. It was a political movement for the creation of Israel and in support of the Jewish people. After establishing the Jewish state of Israel, it became an advocacy movement for Israel and for the Jewish people. If people are refereeing this phenomenon to Israel and the Quran or Jews and Islam, then I can give you many examples that Israel belongs to the Jewish people and Jews belong to Israel only. Furthermore, the Quran itself defended Jews and their land of Israel. Emir Faisal, a son of the King of Hejaz, conditionally accepted the Balfour Declaration based on the fulfilment of British wartime promises of development of a Jewish homeland in Palestine. The Zionist Federation’s mission, objectives and projects are open and bright for the world. The Zionist Federation is a political organisation that educates people of the world about the lifestyle of the Jewish people, which is no different from the rest of the world and they support those who have affected by the wave of terror. My main objective in joining the Zionist Federation is to unconditionally support my Jewish brothers and sisters. Through this political and advocacy platform, I will educate my Muslim, particularly my Pakistani community to stand firm with the Jewish community who have endured for thousands of years. I need to raise awareness within my community for what they examine through western or Arab media is not accurate and they must research in order to find out the actuality which is hidden under Arab politics against the Jewish community. We must raise our voice in solidarity with Israelis who are the most peaceful and intelligent nation in the world. They have very great skills in every educational field especially in science and the latest technology. We Pakistanis are suffering from terrorism and from violent extremism for decades and the only option to defeat this monstrous ideology is to make good ties and relations with those whom we considered our enemy. Israel has never remained our enemy and always seeks good relations with Pakistan. Every Pakistani who visited Israel changed his/her view about Israel. It is not against our religion or culture to support our Jewish cousins and we must open our arms to embrace our cousins and the nation of the Prophet Moses (PBUH).
0.996388
The 15th century was the century which spans the Julian years 1401 to 1500. In European history, the 15th century is seen as the bridge between the Late Middle Ages, the Early Renaissance, and the Early modern period. Many technological, social and cultural developments of the 15th century can in retrospect be seen as heralding the "European miracle" of the following centuries. In religious history, the Roman Papacy was split in two parts in Europe for decades (the so-called Western Schism), until the Council of Constance. The division of the Catholic Church and the unrest associated with the Hussite movement would become factors in the rise of the Protestant Reformation in the following century. Constantinople, the capital of the Eastern Roman Empire, falls to emerging Ottoman Turks, marking the end of the tremendously influential Roman Empire and, for some historians, the end of the Middle Ages. The event forced Western Europeans to find a new trade route, adding further momentum to what was the beginning of the Age of Discovery, which would lead to the global mapping of the world. Explorations by the Spanish and Portuguese led to the first European sightings of the Americas (the New World) and the sea passage along Cape of Good Hope to India, in the last decade of the century. These expeditions ushered in the era of the Portuguese and Spanish colonial empires.
0.999912
Cracked a great joke but don't see anyone laughing? Don't worry - you're probably still funny. You're just using an old version of Oculus Lipsync! At Oculus our mission is to enable people to have meaningful interactions regardless of physical distance. Eye contact, hand gestures, body pose, and facial expression are forms of nonverbal communication which add significance to social interactions by allowing us to convey emotion. Many avatar systems today lack emotion unless manually triggered by a user. In order to tackle this issue, we would like to present: Oculus Lipsync 1.30.0. Oculus Lipsync 1.30.0 includes a beta version of laughter detection - enabling developers to drive laughter animations from input audio. Additionally, Oculus Lipsync 1.30.0 adds DSP acceleration and ways for more developers to use OVRLipSync via Unreal and native support. We received a large amount of feedback requesting Unreal and native support for Oculus Lipsync. With Oculus LipSync 1.30.0 we answer this feedback with both the introduction of an integration for Unreal Engine and C++ libraries to enable native integration. These integrations allow the development of expressive lipsync driven content across a wider range of platforms and applications. Additionally, the Unity integration has been further streamlined for ease of use and now has more developer-friendly support for pre-computed viseme generation. Documentation for all three of our integrations can be found in the re-vamped Oculus Lipsync Guide on our Developer Center. Finally, we have enabled DSP support across all integrations, allowing offloading of processing for both Lipsync viseme prediction and laughter detection on supported mobile platforms. Offloading computation to the DSP allows for processing of more audio streams on a single device, enabling you to build rich social applications with ease. One of the goals of Oculus Lipsync is to enable expressive facial animation. Oculus Lipsync enables us to drive the facial expression of a virtual avatar. Real-time audio-driven laughter detection brings us a step closer towards enabling rich social presence and non-verbal communication in virtual reality. The motivation for laughter detection originates from our desire to provide a platform for expressive social interaction in virtual reality. When play-testing in virtual reality with colleagues, we observed that adding emotion and expression to the avatars faces enhanced the experience. As you might imagine, laughter was a very common mode of expression in these social environments. Automatically detecting laughter from audio allowed us to bring another layer of expressivity and fun to our virtual social experience. In order to design a laughter detector, we needed to better understand what is laughter. Laughter is a universal, familiar, and important non-verbal audiovisual expression. Laughter is also a diverse expression which spans harmonically rich, vowel-like sounds such as “ha ha ha” or “tee hee hee”, to unvoiced exhalations through the nose or mouth including sounds resembling grunts, pants, cackles, and snorts. The variety of laughs communicate different social cues and information such as attitude, emotion, intention, agreement, acceptance, joy, and even scorn or mockery. With laughter's numerous sounds and significances in mind, we developed a beta version of laughter detection capable of recognizing a wide variety of laughs across a diverse population. To enable laughter detection we explored various deep learning architectures and eventually arrived at a light-weight version of the TCN introduced for high-quality Lipsync. The TCN powering laughter detection is very similar to the phoneme prediction TCN; however, it predicts a single floating point value in the range of 0 to 1 representing the probability of laughter occurring at the current audio frame. As with the Lipsync model, the laughter detection model was trained with PyTorch, converted to Caffe2 with ONNX, and optimized for real-time processing using efficient caching technology similar to Fast WaveNet Generation Algorithm. The output laughter probability can be directly used to drive a blendshape, or you can implement simple thresholds to trigger a laughter animation. We've introduced a new laughter shape into the engine integration demos which is driven directly by the laughter probability. The demo also visualizes the laughter probability by printing a simple text bar chart to the game view. With this release of Oculus LipSync 1.30.0 we take a step towards improving meaningful social interaction in VR by adding a layer of liveliness, character, and emotion through real-time audio-driven laughter detection. On the technical side, this release refines and expands our integration support, and introduces opportunities to improve performance via offloading computation to the DSP. This release was achieved by the joint work of research scientists, machine learning engineers, product management, character artists, and facial pose experts at Oculus and Facebook Reality Labs. We hope this technology brings joy and laughter to your audience!
0.999823
The identification of an historical Robin Hood in late mediaeval England has so far eluded researchers. It has proven very difficult to find a person named 'Robin Hood' in the historical records who fits the description of the individual in the early ballads. Indeed, there is a possibility that Robin Hood is an entirely fictitious character invented by some little understood collective or community process (Donnelly). Another avenue is to find an historical individual who is not named Robin Hood, but on whom the ballads may be based. This approach is taken in two recent books by John Paul Davis and David Baldwin. Meanwhile, the legend of Robin Hood has been treated more generally by Nigel Cawthorne in a volume for the "Brief History" series. The three books appeared at about the same time, in 2009 and 2010, so their authors were not familiar with each others' work on the topic. The important aspect of the Davis book is that it is not a new interpretation based on hitherto unknown documents or sources. Instead, it is largely a close re-reading of the earliest Robin Hood ballads, dating from the years circa 1450-1520. In this early tradition Robin Hood is presented as a real person: a skilled archer, a yeoman rather than a disinherited nobleman, a courteous and very religious outlaw inhabiting the forest of Barnsdale in the southern part of Yorkshire. He is loyal to a 'King Edward' but robs high churchmen, and there is no suggestion that he is a Saxon rebel against Norman tyranny. From this starting point, Davis begins his analysis of the early ballads to produce some intriguing results. Chronologically, he places their events in the reign of Edward II (1307-1327) and links them to the suppression of the Knights Templar, which began in Paris in 1307 but reached England a little later in 1308 and 1309. The Knights Templar were a mediaeval Christian military order founded in the year 1118 to protect pilgrims going to the Holy Land and to raise money for the Crusades. Over the centuries they became rich and powerful with their own estates, a large private army and their own banking system, which served the wider mediaeval economy. Not all the order's thousands of members were knights--some were more humble yeomen who worked the land to raise money for the organisation. All were trained in martial arts, and all took vows of chastity consistent with entering holy orders. The order of the Knights Templar was suppressed in England in 1308, but without much enthusiasm on the part of the royal authorities. This allowed many of its members to escape the trials and tortures meted out to their fellows on the continent of Europe, and to turn outlaw instead. Here, according to Davis, is the source of Robin Hood and his Merry Men. It may explain why the ballads do not give individual reasons for their outlawry. If they were ex-Templars, then they were not the perpetrators of usual criminal acts, but were instead outlawed as a group by a Papal Bull or decree (Davis, 71-73, 94-99 and 104). With this premise, Davis then applies his interpretation to various aspects of the earliest ballads. He notes that the outlaw bands of the Merry Men and the Templars were fraternities, but both had a three-level hierarchy. Robin Hood was the master at the top, like the master of the Templars. Sometimes other outlaws were assigned to carry Robin's bow for him in a way that "parallels the Templar custom." Curious references to Robin's refusal to eat until the outlaws bring a "guest" to him seem to suggest a Templar dining ritual (Davis, 102-103). Then there is the simple fact that in the ballads, the Merry Men are too well-disciplined in the martial arts to be humble rustics randomly recruited into a band of outlaws. It makes more sense if they are Templars on the run and thus already trained military men (Davis, 73 and 77). In addition, the outlaws have various types of horses--one in particular, a "courser," was a light, fast horse often used by the military for sending messages (Davis, 109-110). These characteristics are consistent with men of a military order. Likewise Robin Hood's strong religiosity in the ballads, jettisoned by modern versions of the story, is easily explained if he were a member of a religious order, while his typically courteous behaviour fits with the mandate of the Templars to offer protection. Davis also notes the proximity of many Templar properties in Yorkshire to Barnsdale, where Robin Hood was supposed to operate (Davis, 104-105 and 107). Two of the older Robin Hood tales are re-interpreted by Davis in the light of his Templar thesis. Guy of Gisborne, the villainous character searching for Robin Hood, is lured into the forest by the outlaw and killed in a particularly gruesome fashion after a fight. Davis sees Gisborne as the mediaeval equivalent of a bounty hunter charged by the authorities with tracking down runaway Templars and bringing them to 'justice' (Davis, 113). The story of Sir Richard the poor knight, helped by Robin Hood with a loan of four hundred pounds to repay a debt owing to an abbot, is another case. Davis views this as a Templar-like function fulfilled by Robin Hood, and thinks that Sir Richard may have been a participant in the "Hospitaller-controlled Crusade of 1308-10" (Davis, 131-133). The episode also relates to Robin's hostility towards the higher established clergy: by helping Sir Richard, he can get back at some of those persecutors of the Templar order. Davis' interpretation is largely circumstantial, but nevertheless it does make many previously unexplained aspects of the ballads fall neatly into place. He does not identify a particular person as the historical Robin Hood, instead offering the outlawed Templars order as the collective source for the fraternity of the Merry Men. This is a solid piece of historical research which also offers a good discussion of the general problem of identifying an historical Robin Hood in the wider context. In the end, however, the author has a problem, as he cannot decide whether the ballads reflect historical episodes incorporating Templar background material, or whether they are fictions whose authors added Templar references (Davis, 213). Davis overlooks a further problem in what is otherwise a fine piece of historical detective work. If the Robin Hood stories of the early ballads are based on historical episodes of Templars forced into outlawry in the period from (roughly) 1308 to 1330, then why don't the ballads simply state this clearly? Why weren't the tales told in a more straightforward way in, say, the mid fourteenth century, when any actual Robin Hood outlaws would have been dead? Why do we have to wait until the twenty-first century for John Paul Davis to unlock the secrets of what could have been told as a classic tale of political-religious persecution? David Baldwin's book is different, in that he attempts to identify a specific person as the historical Robin Hood. There is a good exposition of the difficulties involved, although some readers may find the background material somewhat tedious. It takes Baldwin until the last two chapters of an eleven-chapter book to reveal his candidate for the real Robin Hood. According to Baldwin, the man who best fits the bill is one Roger Godberd, a landholder of Leicestershire who was born in the early 1230s and died in the early 1290s. He was involved in the rebellions and civil wars of Simon de Montfort during the mid-1260s, and turned outlaw. He was captured and, like the Robin Hood of the ballads, was imprisoned in Nottingham Castle. After a trial in London he was imprisoned and later released. Baldwin's argument focuses on the similarities between the stories of Godberd's involvement with the Yorkshire knight Sir Richard Foliot, and Robin Hood's with Sir Richard at the Lee (Baldwin, 169-171). Likewise, he points out that Godberd's sometime enemies were Sherriffs of Nottingham (Baldwin, 169). As acknowledged by Baldwin, there are significant differences between the stories of Roger Godberd and the Robin Hood of the ballads. Unlike Robin Hood, Roger Godberd was not a superior archer, he was married with children, and he was not particularly religious (Baldwin, 154, 168 and 174). There are, however, far more serious issues with David Baldwin's interpretation. In the first place, there is no clear evidence as to why Godberd was rebelling and turning outlaw. Was it for personal gain, out of loyalty to an overlord, or to aid a political cause? (Baldwin, 176). Moreover, he does not appear as a particularly likeable individual. As a minor, he unsuccessfully sued his mother and stepfather in 1250 for wasting his inheritance. (Baldwin, 154). Ten years later, he illegally evicted one of his tenants from his land, and then failed to appear in court to answer charges (Baldwin, 156). To identify this person as the historical Robin Hood would require a geographical shift to the south, towards Leicestershire and Wiltshire. There is no mention of Godberd operating from Barnsdale in Yorkshire, as in the traditional ballads (Baldwin, 175). It is also not clear that Roger Godberd was a yeoman, as Baldwin states that the evidence only "suggests" this as his status (Baldwin, 173 and 167). Meanwhile Davis dismisses Roger Godberd as the historical character behind Robin Hood, because the former's actions caused "widespread panic and fear" not attributed to the latter (Davis, 85). The conclusion of Baldwin's book is not as singular as its subtitle claims. The Robin Hood of the ballads is not unmasked, and instead Roger Godberd is presented as only one of a number of historical individuals who may have provided biographical sources for the ballads (Baldwin, 176). These include the late mediaeval rebels Fulk FitzWarin, Eustace the Monk and Hereward the Wake, about whom tales were told that sometimes resembled those of the Robin Hood ballads. There is an important distinction here, which Baldwin does not make. No one told stories or wrote down ballads about Roger Godberd, who is an unknown historical figure except to experts in thirteenth-century disputes. His case is therefore not comparable to those of the others mentioned. If Roger Godberd was an admirable character and outlaw of popular renown, then why are there no ballads about him? Why would his exploits be insinuated, by some sleight of hand, into the story of Robin Hood, when popular culture heroes are usually commemorated with their own names? Nigel Cawthorne's book is of a different genre, presenting a non-judgemental assessment of various possible historical Robin Hoods. His work covers the main themes: the origins of the tales, the possible timeframes, and the historical figures whose biographies may have been raided for the ballads. The book is essentially about the evolution of the Robin Hood legend from the late mediaeval period right up to its various Hollywood treatments. Cawthorne has long chapters on Fulk FitzWarin and Eustace the Monk, but these are fabulous mediaeval tales of little relevance to any historical Robin Hood. The only connection is through minor episodes, such as a tale in which one hero disguises himself as a potter to gain advantage over his enemies, similar to a Robin Hood storyline (Cawthorne, 127 and 143). At the same time, Cawthorne does consider that the exploits of Roger Godberd "may well have contributed to the tales that built up around Robin Hood" (Cawthorne, 152). Much of the book is a discussion of the Robin Hood story as it later emerged in the seventeenth century and onwards. There is also an interesting chapter comparing Robin Hood with other, more modern "social bandits" like Bonnie and Clyde, John Dillinger and Ned Kelly (Cawthorne, 83-94). Since Cawthorne's book is part of a popular series intended for general readers, it lacks the scholarly depth of those by Davis and Baldwin. After considerable efforts by scholars like the latter, the identity of an historical Robin Hood proves to be as elusive as ever. Such investigations never grapple with a fundamental problem of their research, which is that the suggested inspirations are not named in the tales. It does not do to argue that the authorities suppressed the memory of such persons, who then had to be given the alternative identity of Robin Hood. There are too many historical examples that contradict this notion, including some cited by these authors. In one sense Robin Hood is not comparable to Hereward the Wake, Eustace the Monk, or Fulk FitzWarin. The latter were real, documented historical figures, rebellious against royal authority and commemorated by stories in their own names. Those in power could not stop the spread of these tales, which in some cases became elaborately embellished over time. In much the same way, the great rebels whose lives may be contemporaneous with the Robin Hood of early legend enjoyed enormous popularity. Simon de Montfort (c. 1208-1265), killed at the battle of Evesham in 1265 while resisting royal authority, had been excommunicated by the Church. Yet for a number of years he enjoyed a posthumous reputation as a popular saint, with hundreds of miracles attributed to his gravesite. It took great effort for the authorities to weaken the cult (by about 1280), but a modern university in Leicester is now named after him (Baldwin, 132-141). Thomas, Earl of Lancaster, executed in 1322 for rebellion against Edward II, likewise became the object of a popular cult, with alleged miracles associated with his remains at Pontefract Church in Yorkshire. His hat and belt were preserved as holy relics down to the time of the Reformation in the sixteenth century (Baldwin, 141-142). The authorities might condemn such commemorations, but they could not entirely prevent the spreading of stories about popular rebels or anti-authoritarian saints. Once that is clear, we need to know why it would be necessary for the life story of Roger Godberd or the unknown Templar to be changed into that of Robin Hood. The idea that one person's biography was simply transformed into that of another goes against what is known about popular culture: indeed, there is a contradiction in commemorating one individual's deeds by attributing them to someone of a different name. Fred Donnelly teaches at the University of New Brunswick in Saint John, Canada. David Baldwin, Robin Hood; the English Outlaw Unmasked (Stroud, Gloucestershire: Amberley, 2010). Nigel Cawthorne, A Brief History of Robin Hood (Philadelphia: Running Press, 2010). John Paul Davis, Robin Hood: The Unknown Templar (London: Peter Owen, 2009). Fred Donnelly, "Why Robin Hood Can't Be Caught", Albion Magazine Online, vol. 8, Issue 1 (2011). Copyright © Fred Donnelly 2012.
0.953642
What Is Ahead In The Count In Baseball? Ahead in the count in baseball is a phrase used to describe a positive situation for either the pitcher or batter in relation to the count. For example, when a batter has more strikes than balls in the count, the pitcher is ahead since he is closer to striking out the batter. If the batter has more balls than strikes in the count, the batter is ahead since he has a better chance of being walked and getting on base.
0.998492
Given a binary tree (not a binary search tree) and two values say n1 and n2, write a program to find the least common ancestor. We have discussed an efficient solution to find LCA in Binary Search Tree. In Binary Search Tree, using BST properties, we can find LCA in O(h) time where h is height of tree. Such an implementation is not possible in Binary Tree as keys Binary Tree nodes don’t follow any order. Following are different approaches to find LCA in Binary Tree. Following is simple O(n) algorithm to find LCA of n1 and n2. 1) Find path from root to n1 and store it in a vector or array. 2) Find path from root to n2 and store it in another vector or array. 3) Traverse both paths till the values in arrays are same. Return the common element just before the mismatch. // Let us create the Binary Tree shown in above diagram. // Finds the path from root node to given root of the tree. // not in path from root to n. // This code is contributed by Sreenivasulu Rayanki. # Finds the path from root node to given root of the tree. # Find paths from root to n1 and root to n2. Time Complexity: Time complexity of the above solution is O(n). The tree is traversed twice, and then path arrays are compared. Thanks to Ravi Chandra Enaganti for suggesting the initial solution based on this method. The method 1 finds LCA in O(n) time, but requires three tree traversals plus extra spaces for path arrays. If we assume that the keys n1 and n2 are present in Binary Tree, we can find LCA using single traversal of Binary Tree and without extra storage for path arrays. The idea is to traverse the tree starting from root. If any of the given keys (n1 and n2) matches with root, then root is LCA (assuming that both keys are present). If root doesn’t match with any of the keys, we recur for left and right subtree. The node which has one key present in its left subtree and the other key present in right subtree is the LCA. If both keys lie in left subtree, then left subtree has LCA also, otherwise LCA lies in right subtree. // This function returns pointer to LCA of two given values n1 and n2. Thanks to Atul Singh for suggesting this solution. Time Complexity: Time complexity of the above solution is O(n) as the method does a simple tree traversal in bottom up fashion. Note that the above method assumes that keys are present in Binary Tree. If one key is present and other is absent, then it returns the present key as LCA (Ideally should have returned NULL). We can extend this method to handle all cases by passing two boolean variables v1 and v2. v1 is set as true when n1 is present in tree and v2 is set as true if n2 is present in tree. /* C++ program to find LCA of n1 and n2 using one traversal of Binary Tree. // values n1 and n2. //Store result in temp, in case of key match so that we can search for other key also. print "Keys are not present" Thanks to Dhruv for suggesting this extended solution.
0.999999
Examine one of the elements of literature as it applies to Shirley Jackson's "The Lottery." Include references to the text (in the form of details or quotes), including page and/or paragraph numbers. As you explicate one of the elements of literature as it applies to Shirley Jackson's "The Lottery," I highly suggest analyzing Jackson's use of symbolism in this riveting short story. What do you think about this topic? First off, you will need to devise a creative introduction to your essay in order to lure readers. In this introduction, you also need to carefully articulate your thesis. One sample thesis statement for you might be this generic one: Shirley Jackson's haunting short story, "The Lottery," cleverly incorporates various symbols such as the ironic and evocative use of her title, names of characters, and the symbolic use of objects to facilitate the plot and themes of her diabolical piece. First of all, Shirley Jackson's deliberate use of symbols masterfully advances the plot events. Even her title of "The Lottery" is quite symbolic. The title suggests that some sort of prize is attainable for the characters. The title further seems to suggest hope, imminent fortune, and a possibility of future advances in life. Even the setting correlates with this sense of hope or optimism as Jackson describes the town " the flowers were blossoming profusely and the grass was richly green. The people of the village began to gather in the square, between the post office and the bank, around ten o'clock; in some towns there were so many people that the lottery took two days and had to be started on June 2th." However, the symbolism with the lottery soon turns ironic as we learn about its deadly ramifications.
0.999958
Static Part: About El Nino, La nina and how they occur, their geological effects. Dynamic and Current: Disaster risks associated, concerns, challenges and measures to be put in place. Context: The UN’s World Meteorological Organization (WMO) has predicted that there is a 75-80% chance of a weak El Niño weather pattern forming by February and a slightly lower likelihood that it will continue through the northern hemisphere winter of 2018-19. An El Niño – a warming of ocean surface temperatures in the eastern and central Pacific that typically happens every few years – last occurred in 2015-2016 and caused weather-related crop damage, fires and flash floods. ENSO is nothing but El Nino Southern Oscillation. As the name suggests, it is an irregular periodic variation of wind and sea surface temperature that occurs over the tropical eastern Pacific Ocean. ENSO affects the tropics and the subtropics. The warming phase of ENSO is called El Nino, while the cooling phase is known as La Nina. El Nino is a climatic cycle characterised by high air pressure in the Western Pacific and low air pressure in the eastern. In normal conditions, strong trade winds travel from east to west across the tropical Pacific, pushing the warm surface waters towards the western Pacific. The surface temperature could witness an increase of 8 degrees Celsius in Asian waters. At the same time, cooler waters rise up towards the surface in the eastern Pacific on the coasts of Ecuador, Peru, and Chile. This process called upwelling aids in the development of a rich ecosystem. El Nino sets in when there is anomaly in the pattern. The westward-blowing trade winds weaken along the Equator and due to changes in air pressure, the surface water moves eastwards to the coast of northern South America. The central and eastern Pacific regions warm up for over six months and result in an El Nino condition. The temperature of the water could rise up to 10 degrees Fahrenheit above normal. Warmer surface waters increase precipitation and bring above-normal rainfall in South America, and droughts to Indonesia and Australia. What are El Nino’s effects? El Nino affects global weather. It favours eastern Pacific hurricanes and tropical storms. Record and unusual rainfall in Peru, Chile and Ecuador are linked to the climate pattern. El Nino reduces upwelling of cold water, decreasing the uplift of nutrients from the bottom of the ocean. This affects marine life and sea birds. The fishing industry is also affected. Drought caused by El Nino can be widespread, affecting southern Africa, India, Southeast Asia, Australia, and the Pacific Islands. Countries dependent on agriculture are affected. Australia and Southeast Asia get hotter. A recent WHO report on the health consequences of El Nino forecasts a rise in vector-borne diseases, including those spread by mosquitoes, in Central and South America. Cycles of malaria in India are also linked to El Nino. The rise in sea surface temperature may be intensified by global warming. From the current study, we learn that El Nino can exacerbate global warming and hence the process could become a vicious circle. La Nina is a climate pattern that describes the cooling of surface ocean waters along the tropical west coast of South America. It is considered to have the opposite effect of El Nino. It brings greater than normal rainfall in Southeast Asia and Australia, and causes drier-than-normal conditions in South America and the Gulf Coast of the United States. La Nina events sometimes follow El Nino events. An El Nino or La Nina episode lasts nine to 12 months. Some may prolong for years. Its average frequency is every 2 to 7 years. El Nino is more frequent than La Nina. Mains Question: IMD says moderate El Nino Southern Oscillation (ENSO) conditions are currently prevalent in the equatorial Pacific Ocean region and the El Nino is likely to develop in the next two months. What do you understand by El Nino and explain its impact on India’s climate?
0.977273
Methods and systems of patient treatment are disclosed. The methods and systems include use of medical device informatics to modify and validate therapies and drugs used in those therapies. In certain embodiments, a medical device, such as a medical infusion pump, interfaces with a server to administer the patient treatments. In one aspect, a method of deploying information to a medical device is disclosed. The method includes storing information in a data package on a server, the information intended to be delivered to a medical device. The method also includes receiving a message from the medical device, and in response to receiving the message, indicating to the medical device that information intended for the medical device resides on the server. The method further includes receiving a request for the information, and upon receiving the request, delivering the data package to the medical device. 1. A method of deploying information to a medical device, the method comprising:storing information in a data package on a server, the information intended to be delivered to a medical device;receiving a message from the medical device;in response to receiving the message, indicating to the medical device that information intended for the medical device resides on the server;receiving a request for the information;upon receiving the request, delivering the data package to the medical device. 2. The method of claim 1, wherein the information is encrypted when stored on the server. 3. The method of claim 1, wherein the information is encrypted during delivery to the medical device. 4. The method of claim 3, further comprising decrypting the information on the medical device. 5. The method of claim 3, further comprising decrypting the information at the medical device server. 6. The method of claim 1, further comprising reprogramming the medical device using the information. 7. The method of claim 1, wherein the data package includes a server-readable header, the server-readable header lacking information regarding the contents of the information. 8. The method of claim 1, wherein the data package includes a vendor header containing data structure information and decryption information related to the information. 9. The method of claim 8, wherein the vendor header contains the length of the information. 10. The method of claim 1, further comprising receiving a confirmation that the data package is received successfully by the medical device. 11. The method of claim 1, further comprising selecting information to be deployed to the medical device. 12. The method of claim 1, wherein at least part of the information is hashed using a hash value included in the information. 13. The method of claim 1, further comprising storing a package deployment log. 14. The method of claim 13, wherein the package deployment log includes error messages. 15. The method of claim 14, wherein the error messages are received by the medical device server from the medical device. 16. The method of claim 14, wherein the error messages are detected by the medical device server. 17. The method of claim 13, wherein the package deployment log includes an identification of the medical device. 18. A data package delivered from a server to a medical device for affecting operation of the medical device, the data package comprising:information including data for changing the operation of a medical device, the information having a data structure;a server-readable header including size information and lacking information regarding the contents of the data package; anda vendor-defined header including data structure information related to the information. 19. The data package of claim 18, wherein the vendor header contains the length of the information. 20. The data package of claim 18, wherein the server-readable header includes medical device identification information. 21. The data package of claim 18, wherein the information includes data package encryption information. 22. The data package of claim 18, wherein at least a part of the information is encrypted. 23. The data package of claim 18, wherein the information includes instructions affecting operation of the medical device, the instructions selected from the group consisting of:firmware defining operation of the medical device;medical device configuration information;therapy order information;telemetry request information; andevent triggering information. 24. A system for deploying information to a medical device, the system comprising:a memory configured to store a data package;a programmable circuit interfaced with the memory, the programmable circuit configured to execute program instructions to:store information in the data package, the information intended to be delivered to a medical device;receive a message from the medical device;indicate to the medical device that information intended for the medical device resides in memory;receive a request for the information; anddeliver the data package to the medical device. 25. The system of claim 24, wherein the information in the data package is useable to reprogram the medical device. 26. The system of claim 24, wherein the information includes instructions affecting operation of the medical device, the instructions selected from the group consisting of:firmware defining operation of the medical device;medical device configuration information;therapy order information;telemetry request information; andevent triggering information. 27. A method of receiving information by a medical device, the method comprising:initiating a communication session with a medical device server;receiving an indication that the medical device server has stored a data package intended for delivery to the medical device;requesting the data package; andreceiving the data package. 28. The method of claim 27, wherein the medical device is a medical infusion pump. 29. The method of claim 27, further comprising reprogramming the medical device using the information. 30. The method of claim 27, further comprising, upon successfully receiving the data package, transmitting a confirmation message to the medical device server. The present application claims priority to U.S. Provisional Patent Application No. 60/964,444, entitled "Patient Treatment Systems Employing Medical Device Informatics", and filed Aug. 10, 2007. That application is hereby incorporated by reference in its entirety. In general, the present disclosure relates to treatment of patients via systems for use and control of medical devices. More specifically, the present disclosure relates to software for treatment of patients using medical devices. Patients at hospitals and other care centers require controlled therapy administration and monitoring. Hospitals and care centers use a variety of types and brands of medical devices to assist in monitoring and therapy administration. For example, medical devices used to assist in therapy administration may include medical infusion pumps, pulse oximeters, cardiopulmonary monitors, and other therapy delivery and patient monitoring equipment. The various types and brands of medical devices each generally use differing, proprietary communication standards. The proprietary standards employed by the different devices limit interoperability among the devices, making therapy administration difficult. During use of one or more of the medical devices, a caregiver may want to perform a number of actions related to the medical device. For example, a caregiver may wish to set parameters in a medical device based on the observed characteristics of the patient. Or, the caregiver may wish to view data gathered by a monitor. Due to the proprietary standards used by various medical devices, the caregiver may use a number of types of software and hardware to access the information gathered by the medical device needed to treat the patient. Coordinating usage of medical devices also can be difficult. A single medical device can be programmed for administering different therapies and in different locations within a hospital. Usage records of multiple medical devices of varying types and in different hospitals may need to be compared. Similarly, the status of a medical device can be difficult to monitor because the devices are often in locations other than where the caregiver is located. Methods and systems of patient treatment are disclosed. The methods and systems include use of medical device informatics to modify and validate therapies and drugs used in those therapies. In the various aspects of the present disclosure, a medical device, such as a medical infusion pump, interfaces with a server to administer treatments to patients. In certain aspects, medical device metadata is used to define a medical device within a medical device network. In further aspects, messages are communicated between a medical device and server to define treatments and other operations to the medical device. In still other aspects, operational and historical data is communicated from medical devices to a medical device server to allow remote monitoring of the administration of a therapy to a patient. In further aspects, timing parameters dictate communication and tracking of events between a medical device and a medical device server. In a particular aspect, a method of deploying information to a medical device is disclosed. The method includes storing information in a data package on a server, the information intended to be delivered to a medical device. The method also includes receiving a message from the medical device, and in response to receiving the message, indicating to the medical device that information intended for the medical device resides on the server. The method further includes receiving a request for the information, and upon receiving the request, delivering the data package to the medical device. In a second aspect, a data package delivered from a server to a medical device for affecting operation of the medical device is disclosed. The data package includes information including data for changing the operation of a medical device, the information having a data structure. The data package also includes a server-readable header including size information and lacking information regarding the contents of the data package. The data package further includes a vendor-defined header including data structure information related to the information. In a third aspect, a system for deploying information to a medical device is disclosed. The system includes a memory configured to store a data package and a programmable circuit interfaced with the memory. The programmable circuit is configured to execute program instructions to store information in the data package, the information intended to be delivered to a medical device. The programmable circuit is also configured to execute program instructions to receive a message from the medical device, and to indicate to the medical device that information intended for the medical device resides in memory. The programmable circuit is further configured to execute program instructions to receive a request for the information and deliver the data package to the medical device. In a fourth aspect, a method of receiving information by a medical device is disclosed. The method includes initiating a communication session with a medical device server. The method further includes receiving an indication that the medical device server has stored a data package intended for delivery to the medical device. The method also includes requesting the data package and receiving the data package. FIG. 67 is an example dashboard useable to display telemetry data related to one or more medical devices. Various embodiments of the present invention will be described in detail with reference to the drawings, wherein like reference numerals represent like parts and assemblies throughout the several views. Reference to various embodiments does not limit the scope of the invention, which is limited only by the scope of the claims attached hereto. Additionally, any examples set forth in this specification are not intended to be limiting and merely set forth some of the many possible embodiments for the claimed invention. The logical operations of the various embodiments of the invention described herein are implemented as: (1) a sequence of computer implemented steps, operations, or procedures running on a programmable circuit within a computer, (2) a sequence of computer implemented steps, operations, or procedures running on a programmable circuit within a medical device; and/or (3) interconnected machine modules or program engines within the programmable circuits. The description set forth herein discusses use and programming of a variety of medical devices and a medical device server in a medical device network. One skilled in the art will realize that a wide variety of medical devices are used in administering a therapy to a user, such as medical infusion pumps, pulse oximeters, cardiopulmonary monitors, and other therapy delivery and patient monitoring equipment. These and additional medical devices may be used in the medical device network of the present disclosure. In various aspects of the present disclosure, the term medical device server refers to a computing system and a message handling and storage service used for coordination of various other components of the system. Additionally, the term "user" in the context of the medical device generally applies to the person who is receiving a therapy. In many other contexts, such as the context of usage of the medical device server, the user could also refer to any other person such as a caregiver that is operating the medical device or a computer with access to information about the medical device. Additionally, the medical devices and interconnected computing systems considered in the present disclosure generate and present information and fields in user interfaces and reports, which are also referred to as displays. The user interfaces and reports can include fields, alpha/numeric character strings, times, and dates. The fields, also referred to as cells, prompt users to enter and/or select information. Various types of input and display devices are available on various computing systems and medical devices. The various types of medical devices encompassed by the present disclosure execute or utilize operating parameters, which customize or personalize operation of computer implemented steps, machine modules, and programs to meet the requirements of individual medical device users. The operating parameters can be numerical values, text strings, flags, argument names, or any other aspect of medical device programming that the user or a caregiver can set to control operation of the medical device. In certain aspects of the present disclosure, metadata indicates a textual definition of the capabilities of the various operating parameters within the medical device, and to servers and other computing systems interfaced with the medical device. Referring generally to FIGS. 1 and 2, a generalized hardware environment is described. FIG. 1 shows an exemplary medical device network 100 in which aspects of the present disclosure may be implemented. The medical device network 100 provides a method by which a variety of medical devices and communication systems intercommunicate. The medical device network 100 includes a medical device server 102 interconnected with a variety of types of medical devices. The medical devices can include an active medical device 104, a passive medical device 106, and a plurality of exemplary medical devices shown to be medical infusion pumps 108. The active medical device 104 refers to any of a number of medical devices configured to assist in administering a therapy to a patient. Active medical devices include medical infusion pumps for delivery of fluidic therapies, or other therapy-providing equipment. In one embodiment, the active medical device 104 is a medical infusion device, such as the medical infusion pumps 108 shown. The passive medical device 106 refers to any of a number of observation devices configured to monitor the status of a patient, rather than to actively assist in administering a therapy to that patient. Examples of passive medical devices include pulse oximeters, cardiopulmonary monitors, or other patient observation systems for measuring vital signs of the patient, such as breathing, heart rate and rhythm, blood oxygen levels, and other health indicators. The medical device server 102 communicates with the medical devices, and is one or more generalized or application-specific computing systems. The medical device server 102 is configured to store and retrieve data received from the various medical devices 104, 106, 108. The data received by the medical device server 102 can include event log data, programming data, and various other data transmitted to the server 102 from the medical devices 104, 106, 108. Optionally, the medical device network 100 includes additional computing devices, such as workstations 110 and portable computing systems 112, configured to allow communicative connection to the medical device server 102. The workstations 110 and portable computing systems 112 are generalized computing systems or thin client computing systems having a communication interface allowing access to the medical device server. The workstations 110 and portable computing systems 112 generally include input devices and displays, so as to allow a user (i.e. a caregiver) access to data about a patient when that user is not in the same location as the patient. The users may access the medical device server 102 via the workstation 110 or portable computing system 112 to retrieve data gathered from a medical device, and may instruct the medical device server 102 to communicate various messages or software packages to one or more of the medical devices. The medical device network 100 optionally includes network infrastructure components, such as a switch 114 and a wireless access point 116. The network infrastructure components are configured to provide the communication infrastructure between the various medical devices 104, 106, 108, the medical device server 102, and any additional computing systems 110, 112. Although the medical device network 100 requires a communicative conduit between the various components included in the network, the specific components included in a given medical device network will vary based upon the particular infrastructure and needs of users of the medical device network. Therefore, the switch 114 and wireless access point 116 are intended as exemplary components for implementation of a communicative interconnection between the various components of the network. Additional types of medical devices, computing systems, or networking components may be used in the network 100 as well. The medical device server 102, as well as the additional computing system 110, 112, can correspond generally to a general purpose computing system configured to execute program instructions for performing a variety of operations in the medical device network. Example computing systems can include those constructed by a variety of computer manufacturers, such as Apple, Dell, International Business Machines, and the like. Such computing systems can include, for example, a general purpose or specifically-designed programmable circuit and operably connected memory device, and are configured to execute program instructions to execute the operations described herein. The programmable circuit can be, for example any of a variety of processing units available from a variety of manufacturers, for example, Intel or Advanced Micro Devices. The computing system also typically includes a system memory that couples various system components including the system memory to the processing unit. A display device can be used to display the user interfaces, as processed by the memory and programmable circuit. The display device can be a touch screen or other type of display. Other peripheral devices can be included in the computing system as well. The computing system can operate based on instructions stored on computer storage media, communication media, or other means of encoding computer instructions. Computer storage media includes volatile and nonvolatile, removable and non-removable media implemented in any method or technology for storage of information such as computer readable instructions, data structures, program modules or other data. Computer storage media includes, but is not limited to, RAM, ROM, EEPROM, flash memory or other memory technology, CD-ROM, digital versatile disks (DVD) or other optical storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices, or any other medium that can be used to store the desired information and that can be accessed by the computing system. Communication media typically embodies computer-readable instructions, data structures, program modules or other data in a modulated data signal such as a carrier wave or other transport mechanism and includes any information delivery media. The term "modulated data signal" refers to a signal that has one or more of its characteristics set or changed in such a manner as to encode information in the signal. By way of example, and not limitation, communication media includes wired media such as a wired network or direct-wired connection, and wireless media such as acoustic, RF, infrared, and other wireless media. Combinations of any of the above should also be included within the scope of computer-readable media. Computer-readable media may also be referred to as computer program product. FIG. 2 shows an exemplary block diagram of a medical device 200. The medical device 200 is any of a number of types of active or passive medical devices for therapy administration or monitoring of a patient. In one possible embodiment, the medical device 200 is a medical infusion pump configured to infuse drugs and other fluidic therapies to a patient. Other types of medical devices are possible as well. The medical device 200 includes a programmable circuit 202 interfaced to a memory subsystem, including, for example, Random Access Memory (RAM) 204, a flash memory 206, and an electrically erasable, programmable memory (EEPROM) 208. The RAM 204 stores operational parameters of the medical device, as well as any non-critical storage with respect to operational data or instructions. The flash memory 206 stores instruction and/or data memory defining operation of the pump, such as pump programs, pump parameters for use in those pump programs, or other system firmware. The EEPROM 208 stores a set of initial instructions that are used by the medical device 200 and must be preserved in the event of a failure of the device, such as due to a power failure, dead battery, or other unanticipated event. The EEPROM 208 optionally includes firmware or instructions which may be read or copied into the RAM 204 or flash memory 206 for execution, as necessary. In various embodiments of the medical device 200, the various components of the memory subsystem used are dictated by the needs of the medical device. In certain devices, one or more of the memory system components described herein are not present. In such devices, some or all of the data and instructions stored in that device may be stored in another component of the memory subsystem present in the device. RAM may also temporarily provide storage for critical operational data or instructions. Also, alternate embodiments can be provided whereby the contents of the flash memory and the contents of the EEPROM memory previously described may be interchanged, or whereby the contents may be entirely stored in one type of non-volatile memory and none in the other. Finally, other types of non-volatile memory may be used instead, such as ferro-electric memory or others. The medical device 200 further includes a battery system 210 configured to provide a direct current source of power to the medical device when the device cannot be plugged in to a wall power outlet or some other AC power source. In one embodiment, the battery system 210 includes a rechargeable lithium-ion smart battery system configured to provide power management and intelligent switching between DC and AC power modes depending on the presence of AC power. In further embodiments, the battery system 210 includes different types of battery systems, such as a rechargeable battery system including a nickel-cadmium battery. The medical device 200 includes an input device 212 and an output device 214 interfaced to the programmable circuit 202. The input device 212 allows a user at the location of the medical device to adjust the activity of the device. The input device 212 can be, for example, a mouse, keyboard, keypad, trackball, touch screen, control buttons, or other user-controllable devices. The output device 214 can be any type of audio, video, or data interface configured to provide information regarding the medical device to users and devices external to the device. In various embodiments, the output device 214 may be a data interface to a second medical device, or may be a connection to an external monitor for display of information to a user regarding the status of the medical device 200. The medical device 200 also includes a display device 216 and an alarm 218. The display device 216 is a visual device capable of displaying information to a user of the device. In various embodiments of the medical device 200, the display device 216 can be, for example, a display device, such as an LCD, CRT, or other screen. Additional types of display devices are possible as well. Furthermore, although the medical device is shown as including a display device 216, in alternate embodiments a display device is not required. The alarm 218 can be configured to provide various types of audio indications to the user of various conditions detected in the user or the device. These conditions include a health condition detected, such as an abnormally low or high heart rate or respiration rate, or a warning related to the device, such as indicating that a supply of a drug is running low, or that maintenance may be required for the device. The alarm optionally triggers based on additional alarm conditions beyond those listed here; the alarms selected generally relate to the type of medical device implemented and conditions experienced by that device. A wired communication interface 220 provides a data communication connection from the medical device 200 that interfaces with a medical device server or other generalized computing system. The wired communication interface 220 interfaces to the programmable circuit 202, and sends and receives data from the medical device 200. In various embodiments, the wired communication interface 220 can be an Ethernet or other data connection capable of communicating and receiving digital data. A wireless communication interface 222 provides an alternative communication interface to the wired communication interface 220, such that the medical device 200 can maintain data communications with a medical device server or other computing system when a wired communication connection is not available or convenient, based on the location of the medical device. The wireless communication interface 222 interfaces to the programmable circuit 202, and sends and receives data wirelessly from the medical device. Usage of one or both of the wired or wireless communication interfaces is dependent upon the location of the medical device and the need for communication with a medical device server. In one embodiment, the medical device provides a constant data stream to one or both interfaces such that individuals with access to a medical device server can continuously track the status of the medical device. In further embodiments, the medical device activates and/or communicates using one or both interfaces periodically, or intermittently, so as to update the operational data or other information held by either the medical device or the medical device server. The medical device 200 also includes a patient interface 224. The patient interface 224 controls the mechanical component of the medical device 200 which monitors or delivers a therapy to the user. The patient interface 224 varies among the different types of medical devices based upon the function of the device. In the case where the medical device 200 is a monitor, the patient interface 224 may include a sensor or other physical detection equipment. In the case where the medical device 200 is a medical infusion pump, the patient interface may include a drive mechanism, occlusion sensor, fluid volume sensor, or other drug control or delivery interfaces. Other medical devices, and corresponding patient interfaces, are possible as well. Additional components beyond those shown may also be included in various embodiments of the medical device 200, depending upon the particular application to which the device is directed. FIGS. 3-6 show an overall software environment for the medical device network 100 and its components, according to various embodiments of the present disclosure. The software environment disclosed herein is discussed in two sections: (1) those aspects which relate to communications between medical devices and a medical device server, found in part III, and (2) aspects encompassing user interaction with the medical device network, such as to view data related to medical device activity, or to administer changes or additions to the medical device network, found in part IV. Both aspects relate generally to coordination of medical devices in a medical device network, of which the primary physical features are described above in FIGS. 1-2. The various software disclosed herein, including the metadata installation software, package deployment software, and server software described in Parts II-IV, below can be packaged in a variety of ways, and organized for a variety of different medical device networks. In a possible embodiment, the various software aspects are included in a software development kit (SDK) including some or all of the various software components described herein. In such an embodiment, the medical devices can include monitors and medical infusion pumps, and the software can include pre-packaged metadata files useable on both the medical devices and medical device server. User-readable documentation regarding the software can be included as well. Additionally, the various software disclosed herein and claimed below can be embodied on any of a number of types of computing systems operable within the hardware environment of FIGS. 1-2. For example, a computing device typically includes at least some form of computer-readable media. Computer readable media can be any available media that can be accessed by the computing system. By way of example, and not limitation, computer-readable media might comprise computer storage media and communication media. Computer storage media includes volatile and nonvolatile, removable and non-removable media implemented in any method or technology for storage of information such as computer readable instructions, data structures, program modules or other data. Computer storage media includes, but is not limited to, RAM, ROM, EEPROM, flash memory or other memory technology, CD-ROM, digital versatile disks (DVD) or other optical storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices, or any other medium that can be used to store the desired information and that can be accessed by a computing system. FIG. 3 shows a software architecture 300 in which aspects of the present disclosure are implemented. The software architecture 300 provides an operating environment in which medical device data can be stored and managed remotely from the medical devices. The software architecture 300 also provides an extensible architecture in which a variety of types of medical devices can operate. The software architecture 300 operates using one or more computing systems in communicative connection to various medical devices, and is configurable to operate across multiple locations and different business entities. The software architecture 300 operates within a medical device network including one or more medical devices and a medical device server. A possible configuration of the medical device network in which the software architecture operates is described above in FIG. 1. In one embodiment, aspects of the software architecture 300 are implemented using the relational and business intelligence components of Microsoft SQL Server 2005, distributed by Microsoft Corporation. In such an embodiment, various modules, such as web interfaces, may be provided using a web service, such as Microsoft Internet Information Services (IIS) platform. In further possible embodiments, aspects of the system are implemented using Microsoft SQL Server 2000, Oracle, or other database management and business intelligence products, in conjunction with various web services, such as an Apache-based or other web server. The software architecture 300 includes one or more medical devices 302, back office components 304, and client applications 306. The medical devices 302 monitor or deliver therapies to patients, as directed by a caregiver. The medical devices 302 can be any of a variety of programmable medical devices such as those discussed in conjunction with FIGS. 1-2, above. The back office components 304 include one or more medical device servers 308, an administration module 310, an event tracking module 312, and an operations module 314. The medical device server 308 manages communication with the various medical devices 302 associated with the back office components 304, such as by relaying messages between the various modules 310, 312, 314 and the medical devices 302. The medical device server 302 creates messages understandable to the medical devices 302 and the various modules 310, 312, 314 such that a variety of types of medical devices can be managed using the modules. Using the messages sent to the medical devices 302, the medical device server 308 collects historical information from the medical devices, automates various maintenance operations, assists with therapy setup at a user's bedside, and provides medical device monitoring. In a possible embodiment, the medical device server 302 manages a metadata-based messaging system for communicating with a variety of types of medical devices, such as by using XML or some other type of metadata or markup language via SOAP or another messaging protocol. In one possible embodiment, the medical device server 308 resides on a computing system which also hosts the additional back office components 304. In a further embodiment, the medical device server resides on separate computing hardware from the other back office components. In such systems, the medical device server 308 may be placed at a different location from the other back office components, or may be managed by a different entity from the other back office components, as is described in FIGS. 4-5, below. For simplicity, throughout the description of the software aspects the term medical device server is intended to encompass either the medical device server 308 or the back office components 304 as a whole, depending upon the specific implementation chosen. In certain embodiments, the medical device server 308 can be placed on one or more physical computing platforms, resulting in the presence of multiple medical device servers. The administration module 310 provides an interface to administration data 316, which the medical device server 308 and client applications 306 can request for various reasons, such as to allow access to event or operational data, described below. The administration data 316 includes user validation information, such as username, password, IP authentication, or other user validation, as well as rights information defining the access rights associated with the user. For example, the administration data 316 may associate a username with a password, and require a user to provide the correct username and password to receive a validation right. The username and password information may in turn be associated with access rights information, which defines the specific categories of data, subsets of medical devices, or types of commands allowed to that user. Additional access rights may be defined in the administration data 316 and managed by the administration module 310 as well. The administration data 316 also defines the capabilities of the various medical devices 302 managed within the environment 300, by defining operational parameters by which the medical device server 308 interfaces with a medical device 302. For example, a medical device configured to monitor a patient may include a variety of defined parameters relating to monitoring functions, but will not include parameters relating to therapy delivery. In allowing user-definition of a variety of possible medical device capabilities by setting operational parameters within the administration data, the environment 300 provides a user-extensible set of back office components which are configurable with a variety of medical devices having various capabilities, manufactured by different entities, and employed at different locations. In a particular embodiment, the administration module 310 generates a web interface accessible to various client application interfaces to remotely validate users or caregivers wishing to access data held within one or more of the back office components 304. In a further embodiment, the administration module provides an interface allowing remote applications to access the data managed by the back office components 304. The event tracking module 312 provides an interface to the medical device server 308, and organizes and manages event data 318. The event data 318 corresponds to the historical data regarding various events occurring in the medical devices 302, which are collected and routed by the medical device server 308. The event data 318 correlates a medical device identifier with an event identifier, and additional descriptive information regarding the event occurring in the medical device. Examples of events tracked using the event tracking module 312 include power events, alarm events, maintenance events, telemetry events, therapy events, or therapy change events in the various medical devices. Examples of various events and schema used for tracking such events are discussed below in conjunction with FIGS. 19-24. In a particular embodiment, the event tracking module 312 generates a web interface accessible by the medical device server 308 to transfer data to a storage location of event data 318. The operations module 314 manages various operational characteristics of the system, such as system operational information, therapy orders, maintenance jobs, and other information used to affect operation of the various medical devices 302 associated with the environment 300. The operations module 314 also provides a web interface to the medical device server 308 for managing the various types of operations data 320, and to various external computing systems to allow those systems to view the operations data 320 and transmit commands within the software architecture 300, such as to the various medical devices 302. An optional data warehouse 322 aggregates and coordinates the various predefined and collected data, including the administration data, the event data, and the operations data, for use by various client applications. In the embodiment shown, a reporting application receives data from the data warehouse 322, which aggregates various data from the administration data 316, the event data 318, and the operations data 320. The data warehouse 322 provides a convenient static repository useable to generate reports based on one or more of these types of data. Example reports are described in conjunction with the user to server communication systems described in Part IV, below. The data warehouse 322 can be formed using any of a number of relational or On-Line Analytical Processing products, such as SQL Server Analysis Services, Hyperion Essbase, Oracle OLAP, or other data store configured to allow querying or access to various combinations of data. For those embodiments without the optional data warehouse 322, its functionality as described herein can be provided by the Administration, Event Tracking, Operations databases and their corresponding modules, as described herein. The client applications 306 generally access one or more of the data sources 316, 318, 320, 322 to generate user output forms indicating to caregivers or other users current or historical information about the medical devices to which that caregiver or user has access. The client applications 306 accessing the back end components 304 include administration applications 324, reporting applications 326, dashboards 328, maintenance forms 330, and various additional external applications 332. The administration applications 324 provide user access to the administration data 316 include a variety of administration web forms, to define usage rights for other users attempting to access the back office components 304, as well as to define the operational parameters of the medical devices 302. Additional administration web forms may be included as well. The reporting applications 326 provide a number of standardized reports based on the administration data 316, the event data 318, and the operation data 320. In an embodiment in which the back office components 304 include a data warehouse 322, the reports may be based on the information in the data warehouse. Examples of reports built using the various types of data tracked in the back office components 304 include security reports, user histories, software deployment reports, medical device programming reports, maintenance reports, device history reports, therapy reports, and other reports. Additional examples of the reports are described in Part IV, below. The dashboards 328 allow a caregiver or user to view the status of a medical device 302. The dashboards 328 are based on operation data, and interface to the operations module 310. The dashboards 328 available within the environment 300 correspond to the various medical devices 302 capable of frequently transmitting data to the back office components 304. The dashboards 328 receive operational data regarding the medical devices, such as the most recent therapy delivered by the devices. This information is reflected on the dashboard user interface, presented on a display device of a computing system accessible to a caregiver or user. In one possible embodiment, the dashboards 328 replicate the visual interface of the corresponding medical device, but in a web-portal format. The maintenance forms 330 display maintenance information to a caregiver or other user of the medical devices 302. The maintenance forms 330 display tracked maintenance information included in the operations data 320, such as performed maintenance, scheduled maintenance, suggested maintenance, and maintenance trends. The maintenance forms 330 also allow the user to deploy various updates to the medical devices 302, such as firmware updates and other software deployments. In a possible embodiment, the operations data 320 includes maintenance schedule information accessible by users via the maintenance forms. In such an embodiment, the maintenance forms 330 display a maintenance schedule to a user, including future maintenance required for various medical devices 302 as well as historical maintenance events tracked in the operations data 320. Various external applications 332 extend the functionality of the software environment 300 by communicating with the operations module 314. The external applications 332 include any applications useable to extend the functionality of the software environment 300. FIG. 4 displays an alternative software infrastructure 400 to the one shown in FIG. 3, and may be used in the instance in which the storage of data from the medical devices is managed by an entity other than the facility at which the medical devices operate. For example, the medical devices 302 and medical device server(s) 308 may reside at one or more hospitals or health care facilities 404, managed by one or more healthcare entities, such as counties or private entities. However, the storage of data from those devices may be managed by a health management organization or other organization 405 contracting to manage the data of the various facilities at an off-site location. That entity can collect information from the medical device server 308 also residing at the facility, which in turn communicates data appropriately to one of the web-based modules 310, 312, 314 described above. Such an arrangement allows the hospital to aggregate data from its medical devices at a medical device server, but allows a third party to manage the computing infrastructure and perform the maintenance tasks related to long term storage, administration, access and/or reporting of the data. FIG. 5 shows systems and methods for management of a software infrastructure such as the one shown in FIG. 4, in which a third party handles the data management tasks related to the data collected from medical devices located within and controlled by various healthcare organizations at various locations, or customer sites. Operational flow within the system 500 of FIG. 5 commences at a start operation 500, which corresponds to initialization of the system 500, such as by operation of various medical devices connected to a medical device server. A data receipt module 504 receives data generated by the medical devices managed by one or more entities, such as hospitals, clinics, or other health management organizations. In one embodiment, the data receipt module 504 corresponds to receipt of various administrative data, event data, or operations data from a medical device server or client applications, as shown in the back office components 304 of FIG. 4. An association module 506 associates the data received in the data receipt module 504 with the medical devices from which the data is received. In one possible embodiment, the association module 506 associates the data with the various locations at which the medical devices reside, or with the various entities controlling the devices, as defined in the administration data 316. The data association can be a logical or physical relationship between the data, such as can be found in a file, table, or database. The association module 506 prepares the data such that when a user from a particular hospital or location seeks information about medical devices, the back office components can provide to that user only information about the medical devices at that same location or within the same entity as the user, depending upon the particular implementation of the association module 506. For example, a single hospital or ward of a hospital may have a variety of medical devices whose data is collected and managed by a third party. A doctor, nurse, or other caregiver working in that hospital or ward may access information related to the specific medical devices in that ward from a remote server, not controlled by that ward or hospital. An optional program module 508 distributes data or instructions from the back office components to a medical device, based on the specific instructions related to that entity or location. For example, a hospital or ward can request a software upgrade to their medical devices, and the back office components will direct the specific software upgrade requested by the hospital to only that entity's devices or devices only of a specific type, excluding other devices associated with or monitored by the back office components. In a further example, a workstation at a hospital or other healthcare location can view status information about the medical devices at that location, such as by execution of the data receipt module 504 and the association module 506, above. In this example, the user of the workstation may optionally choose to reprogram the medical devices, and can do so by issuing a global command to all of the medical devices of a specific type at the location associated with the user. The back office components can transmit to the appropriate medical device server the specific instructions necessary to distribute to the medical devices at that location, without transmitting those instructions to the same medical devices at other locations managed by the back office components. Operational flow terminates at an end operation 510, which corresponds to completion of a communication session with one or more medical devices. FIG. 6 shows systems and method executable within the medical device network of FIG. 1, in which medical device actions are interconnected. The system 600 specifically relates to interconnection of different types of medical devices at a specific location, such as a group of medical devices all associated with a single patient. The system 600 includes a number of rules which execute on the medical device server or other back office components so as to determine any additional advisable therapy or monitoring activity using a second medical device based on observed activity of a patient with a first medical device, as received by the medical device server or back office components. Operational flow within the system 600 commences at a start operation 602, which corresponds to initial monitoring of a patient using a plurality of medical devices connected to a medical device network. The start operation 602 also optionally corresponds to receipt of at least one event at the medical device server, as logged by a first medical device which is associated with a patient. A status receipt module 604 receives a status of a patient from a first medical device used to monitor or administer a therapy to the patient. In one example, the status receipt module 604 can receive a status of a patient from a medical device associated with that patient. The status of the patient may include the heart or breath rate or regularity, an indication by the patient that he is experiencing pain, the blood glucose level of the patient, or the progress of one or more therapies administered to the patient. The status of the patient optionally also includes alarms generated by medical devices monitoring or delivering therapies to the patient. A determination module 606 executes one or more rules based on the status of the patient received from the first medical device. The one or more rules define whether any additional action is needed with respect to that patient, such as additional or changed therapies or monitoring of the patient. The determination module 606 associates various rules with specific medical devices capable of executing the changed therapy. Only those rules are executed which correspond to active medical devices currently monitoring or delivering therapies to the patient. In one example of execution of the determination module 606, there may exist an instance in which a monitor senses or is told that the patient is experiencing pain. In such an instance, one or more rules execute to determine whether a pain management therapy is available to that patient, and, if such a therapy is available, to determine an appropriate therapy to be administered to that patient. For example, if a medical infusion pump is associated with that patient, the determination module 606 concludes that the pump is capable of delivering a pain management therapy and calculates appropriate pump parameters for delivery of the appropriate therapy to the patient. A program module 608 generates programming for a target medical device capable of providing the changed or additional therapy or monitoring determined in the determination module 606. The program module 608 communicates the changes or additions to the therapy to either a workstation accessible to a caregiver of the patient, or to a medical device capable of administering the therapy. In one embodiment, the program module 608 requests that a caregiver approves the suggested therapy determined in the determination module 606. In a further embodiment, the program module 608 directly programs the medical device capable of delivering the therapy, such that the therapy may be delivered without any additional caregiver approval or intervention. Operational flow terminates at an end operation 610. The end operation 610 corresponds to the medical device server completing communication of the determined therapy to a workstation or medical device. FIGS. 7-35 describe generally various systems and methods for communication between the medical devices and the medical device server or other back office components, as shown in FIGS. 1-2. The systems and method described in this section relate to coordination of medical devices in a medical device network, which may span across one or more facilities, organizations, time zones, or other logical entities. These systems can be used during user interaction with the medical device network, described in Part IV, below, in that involvement with the user relates to coordination of medical devices as well as collection and communication of data from the medical devices in the medical device network. Referring now to FIGS. 7-8, communications between a medical device server and a variety of types of medical devices are described. The communication methods used by the medical device server and the medical devices provides an extensible system allowing the medical device server to communicate with a variety of different types of medical devices made by a variety of different medical device manufacturers, each having different communication protocols, capabilities, and other characteristics. FIG. 7 shows an exemplary extensible system 700 in which a medical device server associates with a remotely located medical device. The system 700 tracks the states of medical devices associated with a medical device server, and is used to associate new and existing medical devices with the medical device server to provide an extensible medical device network allowing intercommunication of a variety of types and brands of medical devices placed at a variety of different hospitals or locations within a hospital. In the system 700, every medical device recognized by a medical device server will have an associated state held in a table on the server. Therefore, the system 700 will execute independently on the server for each medical device associated with the server. The system 700 commences at a start node 702 corresponding to connection of the medical device to a medical device network including a medical device server, such as the one shown in FIG. 1. Upon connection of the medical device, the medical device server must determine whether the medical device is of a known type. If the medical device is of an unknown type, operational flow proceeds to a known state 704, which corresponds to receiving information about the capabilities of the medical device, so that the medical device is able to be added to the medical device network. The known state 704 may result from receiving user input describing the operational capabilities of the medical device, or may include communication or testing between the medical device and medical device server. When the medical device server considers a device to be in a known state corresponding to the known state 704, the medical server treats the medical device as a recognized device, but that is not powered on or otherwise recognized by the system. If the medical device is of a known type, operational flow proceeds to a determination node 706, which corresponds to determining the state of the medical device. Four operational states define the operation of the medical device from the perspective of the medical device server: a powered state 708, a therapy state 710, a fault state 712, and an alarm state 714. The powered state 708 corresponds to a medical device which is powered on and experiencing normal operation, but is not currently being used to monitor or deliver a therapy to a patient. The powered state 708 is entered from the known state 704 or the determination node 706 when the medical device transmits an indication to the medical device server that it has been turned on. The powered state is entered from the remaining operational states, i.e. the therapy state 710, the fault state 712, and the alarm state 714, when the medical device server receives an indication that the medical device has cleared the condition causing the server to associate the medical device with one of those states. The therapy state 710 corresponds to a medical device communicating to the medical device server that it is currently in operation, delivering a therapy or monitoring a patient. The specific action taken by the medical device will be dictated by the characteristics of that specific medical device; however, the medical device server need only recognize that the medical device is currently in operation. The system 700 can enter the therapy state from any of the other operational states 708, 712, 714, or from the determination node 706. When the medical device successfully completes the therapy, it communicates that event to the medical device server, which returns the table entry associated with that device to the powered state 708. If the medical device fails to complete the therapy due to a fault or alarm event, it will communicate that event to the medical device server, which changes the table entry associated with the device to the appropriate operational state. The fault state 712 corresponds to an error occurring in the medical device, such as a malfunction in the operation of the device during monitoring or therapy delivery. The fault state 712 can be entered from either the powered state 708 or the therapy state 710, and can also be entered from the determination node 706. In a possible embodiment, the fault state 712 can trigger notification of a caregiver having control of the medical device that a fault has occurred. In a further embodiment, when the medical device server receives an indication which generates a fault state entry in the table, the server can determine the fault occurring in the medical device and can correct the error. Upon clearance of the fault state, the medical device transmits an indication to the medical device server that it has returned to its previous operational state, or has entered the powered state 708 if returning from the determination node 706. The table held by the medical device server tracking the state of the medical device is updated appropriately to reflect the state of the medical device. The alarm state 714 corresponds to the medical device server receiving an indication from the medical device of an event occurring in the medical device which requires the attention of a doctor, nurse, or other caregiver. For example, the medical device may be a medical infusion pump which has run out of medicine for delivery. In another example, the medical device is a heart rate monitor, and the event is monitoring and detection of an abnormally low or high heart rate. The alarm state 714 can be entered from either the powered state 708 or the therapy state 710, and can also be entered from the determination node 706. Upon clearance of the alarm event, the medical device transmits an indication to the medical device server that it has returned to its previous operational state, and the table is updated appropriately. A nonoperative state 716 may be entered from any of the active states, including the powered state 708, the therapy state 710, the fault state 712, or the alarm state 714. The nonoperative state 716 corresponds to the server being unable to determine if the medical device is active, or what state the medical device is in. The nonoperative state 716 indicates to a user of the medical device server that attention to that medical device may be needed so as to properly associate the medical device to the medical device server. In an example of operation of the system 700, when a medical device is introduced into a medical device network, the medical device server may or may not know how to communicate with it. Assuming it is a known device that is not currently powered, the medical device server will eventually enter the known state 704. When the medical device is turned on, the medical device will transmit a power on message to the server, which will update the table to indicate that the medical device is in the powered state 708. The medical device will send to the server a message when the medical device delivers a therapy, and the medical device server will associate that medical device with the therapy state 710. When the medical device completes delivering that therapy successfully, the medical device will send a message to the server, which will change the table entry of that device from the therapy state 710 to the powered state 708. If the medical device fails for some reason, it will communicate a fault message to the server, which will associate the medical device with the fault state 712. If the medical device runs out of a drug or detects a dangerous condition of the patient, the device will communicate an alarm message to the server, which will associate the medical device with the alarm state 714. When the device completes delivering the therapy, it sends a message to the server that delivery of the therapy is complete, and the server associates the medical device with the powered state 708. A caregiver may then turn off the medical device, and prior to shutting down the device sends a message to the server, which in turn associates the medical device with the known state 704. FIG. 8 displays a diagram of an exemplary communications system 800 incorporating a medical device server and a medical device. The communications system 800 is configured for receipt, processing, and storage of input messages from external devices, such as medical devices. In one embodiment the communications system 800 uses a metadata-based communications protocol, such as the SOAP protocol. In such a system, the medical device server uses message schema files to validate messages received from medical devices. The communications system 800 is configured such that messages sent from a medical device 802 are received by a medical device server 804, which includes a device server object 806, message handlers 808, and a data tier 810. The medical device 802 can be any of a number of medical devices capable of communication with a medical device server. Various embodiments of the medical device are described above in conjunction with FIG. 2. The medical device server 804 can be any of a number of generalized computing systems configured to collect information from medical devices and assist with medical device setup and monitoring. The medical device server 804 contains a device server object 806, which handles messages sent and received from the medical device server, and parses the messages to determine that they include required information for the medical device server to act on the message. For example, the device server object can parse various metadata tags contained in the message, as well as data associated with that metadata, to verify the message type, source or destination device identification or network identification, and message data. Other components of the message may be determined as well. In this example, the Feature tag defines the object as a feature of the device server object. The Id tag defines the GUID, or statistically unique number used to identify the feature. The LicenseID tag identifies the license containing the features defined. The Name tag provides the name of the feature. The Provider, Description, and Type tags define the various implementation details of the object. Additional implementation details may be included as well. One or more message handlers 808 receive the message in its original format from the device server object 806, and process the message in a manner to convert the message to a format understandable to and stored by the data tier 810 of the medical device server 804. The various handlers are assigned messages based on the type of message received, with each handler processing a specific type of messages in a given way. In one embodiment, the message handlers include an alarm handler, a fault handler, a maintenance handler, a power handler, a request handler, various telemetry handlers, and various therapy handlers. Additional or fewer handlers are possible, based on the variety of types of messages managed by the medical device server 804. By tying a feature 806 to a handler 808, the medical device server 804 can route specific types of data to the appropriate handler. A data tier 810 receives messages from the message handlers 808 for storage, and also responds to requests for data by providing data to the requesting message handler 808 for formation into a SOAP-based message or transmission to the medical device via the device server object 806. Referring now to FIGS. 9-16, a programming schema is disclosed which lists metadata used to define the operational characteristics of a variety of medical devices. The metadata also allows the medical device server to communicate with a wide variety of medical devices, such as medical infusion pumps or other therapy delivery or monitoring equipment. By defining medical devices in the medical device server in terms of their operational characteristics rather than specific proprietary interfaces, the medical device server need not understand the inner workings of each type of medical device. Rather, the server will understand how to communicate with the medical device based on expected operation of that device. In general, the metadata schema disclosed operates using the XML protocol, and a SOAP based messaging system as described above in FIG. 8. However, other standardized communication methodologies could be used as well. FIG. 9 shows systems and methods for communication between a medical device and a medical device server. The system 900 shown is configured to provide extensibility to a variety of types and brands of medical devices, as described above in FIG. 2. The medical device server can communicate with the medical device by defining a predetermined set of metadata and associated parameters for each medical device. The system 900 instantiates at a start operation 902, which corresponds to communicatively connecting a medical device to a medical device server. In one embodiment, the communicative connection corresponds to introducing the medical device into a medical device network including a medical device server, such as the network shown in FIG. 1. In a further embodiment, the communicative connection corresponds to installation of a corresponding metadata package onto the medical device, using software for installing a metadata communication layer provided in a software development kit or otherwise provided as consistent with the present disclosure. An association module 904 associates metadata with various medical devices in a database of a medical device server. The medical devices store corresponding metadata, so that the associated metadata corresponds to the metadata set on the device. The metadata corresponds to at least one attribute or operational characteristic common to the medical devices, and can be used to distinguish among, identify, and communicate with the various medical devices in the medical device network. In various possible embodiments, operational characteristics defined by the metadata include patient information, user or caregiver information, control information, drug information, or location information. Additional operational characteristics can be included as well, such as those described in one or more of the schema of FIGS. 11-16. The metadata also corresponds to various events occurring in the medical device, such as power events, alarm events, maintenance events, telemetry events, therapy events, therapy change events, or other events. Additional events are described below in FIGS. 17-33. A storage module 906 stores the metadata on a medical device server or back office components. The medical device server is configured to communicate with each of the medical devices by using the metadata and the metadata-based messaging systems described above in conjunction with FIG. 8. Operational flow proceeds to an end operation 908, which corresponds to completion of establishing the communication schema between the medical device and medical device server. FIG. 10 shows further systems and methods for communication between a medical device and a medical device server. The system 1000 of FIG. 10 stores metadata common to all medical devices in the medical device networks, and also stores information specific to a subset of the medical devices as well, allowing for customized communications between those medical devices and the medical device server. Operational flow of the system 1000 commences at a start operation 1002, which again corresponds to communicatively connecting a medical device to a medical device server in a medical device network. Following the start operation 1002, operational flow proceeds to a general association module 1004. The general association module corresponds to the association module 904 of FIG. 9, in that it associates metadata defining the characteristics of each medical device in the medical device network by defining a predetermined set of metadata and associated parameters for each medical device. A custom metadata module 1006 associates metadata with one or more medical devices, the metadata being specific to that device. Examples of custom metadata include specific power events occurring in a particular type of medical device, specialized communication types supported by those devices, or other operational parameters which are defined for less than all of the devices included in a medical device network. A storage module 1008 generally corresponds to the storage module 906 of FIG. 9, and stores the general metadata and the custom metadata on the server. A device selection module 1010 selects one or more of the medical devices in the medical device network to communicate with, based on the metadata defining that device stored in the medical device server. In one embodiment, the device selection module executes upon receiving a message from the medical device(s). In a further embodiment, the medical device server selects and communicates with one or more medical devices without receiving a previous signaling communication from one of the medical devices. A communication module 1012 transmits a message to the selected medical device determined in the device selection module 1010. The communication module forms a SOAP-based message for transmission to the medical device, including destination information identifying the medical device as well as the data to be transmitted to the medical device. The message includes various information identified by the metadata tags defined in the schema understood by the system 1000, such as those described in FIGS. 11-16 and 19-24, below. Operational flow terminates at an end operation 1014, which corresponds to completion of transmission of the message to the medical device. FIGS. 11-16 show various schema including metadata useable to facilitate extensible communication systems for medical devices and medical device servers. The schema are used in the medical device network of FIG. 1 to identify a variety of medical devices to a medical device server, and to allow the medical device server to communicate with the devices. The schema include metadata related to various operational parameters, or attributes, common to all of the medical devices in the network or specialized to one or more of the medical devices. By using the various schema disclosed, a medical device server can identify a medical device, identify the characteristics of the device, and know how to interoperate with the device by (1) knowing the device's capabilities and limits and (2) sharing an extensible communications protocol with other medical devices. FIG. 11 shows an identity schema 1100 used to identify various operational characteristics of each of the medical devices communicatively associated with a medical device server. The identity schema 1100 includes a main table 1102 including a variety of global parameters, as well as a network table 1104, an access table 1106, and one or more package tables 1108. The main table 1102 includes metadata associated with a variety of generalized device identification characteristics, including device type, device identifier, session identifier, network identifier, access identifier, and package acceptance. The device type relates to identification of the type of the medical device such as the manufacturer and model of the device, while the device identifier is unique to each device. The session, network, and access identifiers define the connection string to allow the message to be routed correctly to the medical device. The package identifier indicates whether the medical device is configured to receive packages from the medical device server, and can link to tables indicating the current packages enabled on each device. The remaining tables, including the network table 1104, access table 1106, and package tables 1108 provide additional information related to connection and capabilities of the medical device, and are linked to the main table by the network identifier, access identifier, and package identifier in the main table 1102. The network table 1104 includes the host, domain, IP address, and port information necessary to define a connection to the medical device over an Internet connection. The access table 1106 includes an IP address and Physical Id corresponding to the specific networking connection corresponding to the physical device to the IP address. The package tables 1108 describe additional details of the software or firmware package in use by the medical device, such as the name and version of the software package. Additional details regarding package deployment to medical devices are described below in conjunction with FIGS. 25-33. FIG. 12 shows a control table 1200 which includes elements describing the logistics of sending messages and tracking those elements between the medical device and medical device server. The control table 1200 shown includes message identifier, timestamp, and response metadata. The message identifier provides an identification string used to track the message, and corresponds to the identity of the medical device. The timestamp indicates a time at which the message is sent from the medical device server or medical device. The response provides a Boolean indication of whether the message is originating from a medical device or is a response from the server. Additional metadata related to message tracking can be included in the control table as well. FIG. 13 shows a patient table 1300 used to track patient information for association with the medical device. The patient table 1300 includes an identifier and a name element. The name element holds metadata related to the patient's name, and the identifier associates to a statistically unique identifier for association with that patient. Other patient-related metadata can be included as well. FIG. 14 shows a location table 1400 used to indicate the location of a patient. The location table 1400 includes metadata defining an alias element and a description element. The description element refers to a linguistic description of the location of a patient, such as "Hospital X, Neonatology, Room 1" or some similar entry. The alias element provides a shorthand code used to associate the location with the medical device. Additional metadata describing the location of a patient or medical device can be included in the location table 1400 as well. FIG. 15 shows a drug table 1500 used to indicate the drug, if any, associated with the medical device. The drug table 1500 may or may not be populated for each medical device, due to the fact that only some medical devices are capable of delivering drug-based therapies to a patient. The drug table includes metadata related to a drug identifier, a drug name, and a drug concentration. Additional metadata entries can be used to further identify or describe the drug in use by the medical device. FIG. 16 shows a user table 1600 corresponding to a doctor, nurse, or other caregiver currently controlling the medical device. The user table 1600 includes metadata related to a user identifier and user name, as well as any additional identifying characteristics of the user necessary for operation of the system. Now referring to FIGS. 17-24, systems, methods, and schema are disclosed which are used in the medical device network of FIG. 1 to track event and maintenance information for the various medical devices associated with the medical device server. These event-based schema can be used to track current and historical performance of the medical devices in the medical device network, as well as to maintain the medical devices. The schema described below define both a messaging system and an ordering of event or operational data stored by a medical device server or other back office components of a medical device network. The event logging and maintenance tracking schema define specific events or tasks occurring in the medical device network, as compared to the schema described in part II.A, above, which relate to relatively constant operational characteristics of the medical devices or server. FIG. 17 shows methods and systems for receiving event log results from the medical device server or back office components using the various event-based message schema disclosed in FIGS. 19-24. The system 1700 generally executes on a medical device server or other back office components of a medical device network, and provides event log data stored in one or more databases managed by those components to a caregiver or other user. Operational flow in the system 1700 commences at a start operation 1702, which corresponds to initial operation of the medical device network. Operational flow proceeds to an event receipt module 1704, which receives event log data from the various medical devices associated with the medical device server. The event log data represents events occurring in the medical devices, and can be any of a number of types of events, such as power events, telemetry events, alarm events, therapy events, maintenance events, or other events such as those defined in the schema of FIGS. 19-24. This message portion identifies that this is the body of the message, and that it uses the SOAP 1.1 messaging protocol. The message transmitted from the pump indicates that power up process has been completed, and includes a timestamp assigned by the pump. The various power parameters correspond to those parameters included in the power event table of FIG. 19, below, and are associated with specific values by the medical infusion pump. The message is received from the medical infusion pump by the medical device server, and the values are stored in appropriate database tables corresponding to the power event schema. Analogous messages are sent from the medical device to the medical device server, and responses are sent from the server back to the medical device, as related to the other types of events tracked in the medical device network, as described herein. A storage module 1706 stores the event log data in a database associated with the correct metadata as defined in the message from the medical device to the server. In one embodiment, the storage module 1706 stores event log data in the event data 318 of FIGS. 3-4. A request receipt module 1708 receives a request for a subset of the event log data stored in the medical device server or other back office components. The request received may come from a workstation, portable computing device, or other type of computing system. The request includes one or more narrowing parameters such as a date range, a caregiver name or identifier, a patient name or identifier, a drug name or identifier, a specific device, or other types of information associated with the event log data. In one example, the request receipt module 1708 receives a request for event log data related to delivery of a specific drug by a medical infusion pump. A result generation module 1710 generates results based on the specific request received by the request receipt module 1708, such as by filtering event log data held by the medical device server or back office components based on the narrowing parameters of the request. The result generation module 1710 optionally also transmits the results to the requesting computing system. Using the example described in the request receipt module 1708, the medical device server generates a query configured to return event log data related to delivery of the identified drug by the identified pump. This query can be formed in SQL or some other database querying language, such that the database management system associated with the medical device server returns the query results. Operational flow terminates at an end operation 1712, corresponding to completion of generation and transmission of results to the requesting computing system. FIG. 18 shows systems and methods for communicating preventative maintenance data to a medical device. The system 1800 uses the metadata of FIGS. 11-16, as well as the additional event metadata of FIG. 19-24, to track and communicate maintenance tasks to be performed on one or more of the medical devices in a medical device network. The various message transmission principles described in conjunction with FIG. 17 allow the communication to occur. The system 1800 commences at a start operation 1802, which corresponds to initial operation of the medical device network. Operational flow proceeds to a storage module 1804, which stores a maintenance schedule on the medical device server associated with one or more medical devices. The maintenance schedule is stored in a database of the medical device server or back office components, and includes both a time value for the maintenance reminder events included in the schedule and for the medical device. The maintenance schedule also optionally references maintenance data, such as required operational software updates or various other configuration parameters. In one example, the storage module 1804 stores a maintenance schedule that includes indications for suggested recalibration of a series of medical infusion pumps periodically, or for a specific medical infusion pump. In such an example, the storage module 1804 can store a maintenance schedule provided by the user or manufacturer of the medical infusion pump to provide reminders to the user of the pump when the indicated maintenance is scheduled. A transmission module 1806 transmits a reminder to the one or more medical devices associated with the maintenance schedule when a maintenance event occurs. The reminder may be a user-readable message displayed on a display associated with the medical infusion pumps, indicating to the caregiver that recalibration is suggested. Or, the reminder may be a trigger of a user-readable message stored on the medical device. The transmission module 1806 also optionally transmits maintenance data associated with the maintenance reminder. In one embodiment of the system 1800, the reminder sent by the transmission module 1806 disables the medical device. In a further embodiment, the reminder allows the medical device to continue operation. In yet another embodiment, the reminder is transmitted a predetermined time prior to performance of the required maintenance of the medical device. Continuing the example of the medical infusion pump from the storage module 1804, above, a maintenance event is transmitted to the medical infusion pumps. The maintenance event indicates to a medical device that maintenance of that device is needed, and includes a reminder message displayed on a display device of the medical infusion pump, such as "Maintenance Required--Please Contact Manufacturer", or some other indication of required maintenance. In certain configurations, the maintenance event allows the medical device to continue operation until a caregiver contacts the manufacturer, who may have specific instructions regarding maintenance and care of the medical device. Operational flow terminates at an end operation 1808, which corresponds to completion of the transmission of a maintenance reminder and any corresponding maintenance data to the medical device. FIGS. 19-24 show event-based schema for communications and responses between medical devices and a medical device server. The schema disclosed are useable in the medical device network of FIG. 1 to allow the medical device server and back office components to gather and store event log data, as well as to transmit messages to the medical devices. The medical devices and medical device server of the network transmit messages and event data using the metadata described below to identify the contents of the messages. The medical device server or back office components store the event data in correspondence with the metadata. FIG. 19 shows a power event table 1900 and a power event response table 1910. The tables 1900, 1910 define metadata used to track various power events in a medical device, such as turning the device on, turning the device off, battery warnings, and other power-related events. The power event table 1900 includes metadata related to a trigger, a message, and a timestamp. The trigger corresponds to a changed event in the medical device, such as turning the device on, off, or updating the powered status of the device. The message describes the specific event that occurred in the medical device, such as a low battery warning, an occurrence of power on event, an occurrence of a power off event, or some other power-related event. The timestamp indicates the time at which the medical device experienced the power event. The power event response table 1910 includes metadata defining various possible responses to the power events received by the medical device server. For example, when the medical device server receives a power on event, the server may respond that specific maintenance tasks are required, or that software or firmware is available to be downloaded. The power event response table includes result, message, session, interval, and package metadata. The result metadata relates to the result of the power event, such as a changed state of the medical device, or various other server-recognized results of the received event. The message metadata includes a message to be transmitted to the medical device, such as to describe the contents of the response message, for display on a display device associated with the medical device. The session metadata includes information related to the communication session between the device and server. The interval metadata includes information related to the expected interval between communications from the medical device to the server, which is related to server detection of the on-line status of the medical device, described in Part IV, below. The package metadata provides an indication to the device as to whether new package information is available for that device, and which may be delivered via the package deployment methods and systems of FIGS. 25-33. Additional metadata may be included in the response table 1910 and the corresponding response message. FIG. 20 shows an alarm event table 2000 and an alarm event response table 2010. Alarm events relate to activation or clearing of an alarm triggered in a medical device, and the corresponding messages generated by the device and communicated to the medical device server. Activation or clearing of an alarm in the medical device may relate to detection of a patient condition detected by the medical device, or may relate to the The alarm event table 2000 corresponds to the power event table 1900 in that it also includes trigger, message, and timestamp metadata. In the case of the alarm event table 2000, the trigger metadata relates to an activate, clear, or update alarm message. The message and timestamp metadata are used analogously to the corresponding fields of the power event table 1900. The alarm event response table 2010 corresponds to the power event response table 1910. Messages generated using the alarm event response table metadata are communicated to the medical device in response to receipt of an alarm event message. The alarm event response table 2010 therefore generally includes a different response than the power event response table 1910, and communicates messages, packages or other instructions related to the alarm event. FIG. 21 shows a maintenance event table 2100 and a maintenance event response table 2110. Maintenance events correspond to specific reactions of the medical device to an indication that maintenance is required, such as requesting updated operational software, calibration software, or notification messages indicating the maintenance that is required. The maintenance event table 2100 corresponds to data received in a message from a medical device ready to perform maintenance in conjunction with the medical device server, for situations in which maintenance requires a software upgrade or some other remotely-controllable maintenance event. The maintenance event table 2100 corresponds to the power event table 1900 in that it also includes trigger, message, and timestamp metadata. In the case of the maintenance event table 2100, the trigger metadata relates to an update or a package applied. The message and timestamp metadata are used analogously to the corresponding fields of the power event table 1900. The maintenance event response table 2110 also corresponds to the power event response table 1910, and is generated by the medical device server or other back office components. Messages generated using the maintenance event response table metadata are communicated to the medical device in response to receipt of a maintenance event message, and relate to messages, packages or other instructions that occur response to the maintenance event, such as additional details regarding the maintenance required, maintenance schedule information, information to be displayed by the medical device about the maintenance required. FIG. 22 shows a telemetry event table 2200 and a telemetry event response table 2210. Telemetry refers to near-continuous streaming of event data from a medical device to the medical device server such that users with access to the medical device server can monitor operation of the medical device remotely in a near real-time fashion. The telemetry event table 2200 corresponds to the power event table 1900 in that it also includes trigger, message, and timestamp metadata. In the case of the telemetry event table 2200, the trigger metadata relates to an update event regarding telemetry received from the medical device. The message and timestamp metadata are used analogously to the corresponding fields of the power event table 1900. The telemetry event response table 2210 also corresponds to the power event response table 1910, but is generated by the server. Messages generated using the telemetry event response table metadata are communicated to the medical device in response to receipt of a telemetry event message, and communicate messages, packages or other instructions in response to the telemetry event. FIG. 23 shows a therapy event table 2300 and a therapy event response table 2310. Therapy events relate generally to the start and stop of therapies or monitoring processes in a medical device. The specific therapy started or stopped depends upon the type of medical device used, and can include monitoring, drug delivery, or other therapies. The therapy event table 2300 corresponds to the power event table 1900 in that it also includes trigger, message, and timestamp metadata. In the case of the therapy event table 2300, the trigger metadata relates to a setup, begin, end or update therapy event as related to initialization or ending of a therapy by a medical device. The message and timestamp metadata are used analogously to the corresponding fields of the power event table 1900. The therapy event response table 2310 also corresponds to the power event response table 1910, but is generated by the server. Messages generated using the therapy event response table metadata are communicated to the medical device in response to receipt of a therapy event message, and communicate messages, packages or other instructions in response to the therapy event. FIG. 24 shows a therapy change event table 2400 and a therapy change event response table 2410. Therapy change events relate generally to changes in therapies operating on a medical device, and are related to therapy events, discussed above. Therapy change events include, for example, changed parameters related to monitoring or delivering of therapies, such as changed drug delivery rates. The therapy change event table 2400 corresponds to the power event table 1900 in that it also includes trigger, message, and timestamp metadata. In the therapy change event table 2400, the trigger metadata relates to an override, warning, abandon, or update event as related to a therapy change. The message and timestamp metadata are used analogously to the corresponding fields of the power event table 1900. The therapy change event response table 2410 also corresponds to the power event response table 1910, but is generated by the server. Messages generated using the therapy change event response table metadata are communicated to the medical device in response to receipt of a therapy event message, and communicate messages, packages or other instructions in response to the therapy change event. Referring back to FIG. 11, various systems and methods exist for deploying packages to medical devices from a medical device server. The packages deployed may include firmware upgrades, maintenance information, new or changed parameters for therapies, or other software upgrades or changes to the medical devices in a medical device network. In a possible embodiment, a package can be used to reprogram the medical device to which it is sent with any of the possible types of package data. Medical devices capable of receiving package data indicate this capability in the main table 1102 and package tables 1108. The main table 1102 indicates the capability of the device to receive a package, and the package tables 1108 include information related to the current package information stored at the medical device for use in operation of the medical device. Package delivery, as discussed in greater detail below, occurs in response to a message, and is initiated using the package data identifier in the event response tables 1910-2410 to indicate to the medical device that a package is available for delivery. Referring now to FIG. 25, an example structure of a package 2500 used in deployment of information to a medical device is shown. The package 2500 includes a server header 2502, a vendor header 2504, and information 2506 to be delivered to the medical device. The server header 2502 is the portion of the package understood by the medical device server. The server header 2502 is in a common format to all packages, and contains identification information related to the type of device configured to receive the package, as well as the source of the package. Additional information, such as package size, encryption format, or encryption key location information may be included in the server header 2502 as well. In one embodiment, the server header 2502 is a 256 byte block incorporated into the package. The vendor header 2504 contains vendor specific information related to use of the package within the medical device receiving the package. The vendor providing the package to the medical device server is generally the manufacturer or maintenance company associated with the medical device intended to receive the package, so the vendor will format the vendor header 2504 in a manner understandable to the medical devices it manufactures. The vendor header generally includes information related to the size of the information 2506, as well as the location of encryption information 2508 within the information. The encryption information 2508 can be used by the medical device to decrypt the information, which is generally stored in the medical device server in an encrypted form. The information 2506 generally includes any software to be transferred from the medical device server to a medical device, such as a firmware upgrade, a file including therapy parameters, or other binary data. The package delivery system 2500 is not dependent upon the specific format of the vendor header 2504 or the information 2506. The information 2506 is generally stored in an encrypted form on the medical device server. When transferred to a medical device, the information 2506 is decrypted by the medical device by locating the encryption information 2508 based on information in the vendor header 2504. FIG. 26 shows systems and methods for deploying package data from a medical device server to medical devices. The system 2600 is configured to distribute a package, such as the package 2500 of FIG. 5, to a medical device in response to a message received from the medical device. Operational flow within the system 2600 commences at a start module 2600, which corresponds to receipt of package information from a vendor of a medical device, an administrator of the medical device, or another entity having familiarity with the operation of the medical device. A storage module 2604 stores the received package in the medical device server. The storage module 2604 can also set an alert or other variable for a medical device such that the next time the medical device communicates with the server, an indication of the existence of the package is included in the response to the medical device. In one embodiment, the storage module 2604 encrypts the package while stored on the medical device server or back office components, and either the medical device server or the medical device itself decrypts the message when the package is to be used or transmitted. In a further embodiment, the storage module 2604 leaves the package unencrypted when it is stored on the medical device server or back office components. A message receipt module 2606 receives at the medical device server a message from a medical device. The message may be any of a number of types of messages, such as the power, maintenance, alarm, telemetry, therapy, or therapy change event messages described above in FIGS. 19-24. Additional message types are possible as well. An indication module 2608 indicates to the medical device that a package is intended for delivery to that device. In one embodiment, the indication module 2608 sets a parameter in a message response indicating the existence of a package. For example, the indication module 2608 can set a parameter in the package metadata included in the event response messages 1910-2410 of FIGS. 19-24. Additional methods of indicating the existence of a package are possible as well, such as transmission of a specific message related to package deployment, a package request by the medical device, or other methods. A request module 2610 receives a request from the medical device to receive the package. The request module 2610 may include one or more steps of requesting information about the package to verify at the medical device that the package should be accepted. In a possible embodiment, the request module 2610 transmits a package information request message, using metadata as shown in FIG. 27. In such an embodiment, the request module 2610 optionally also transmits a package data request message separate from the package information request message, the package data request message transmitted following receipt of package information describing the package contents from the medical device server. In further embodiments, the request module 2610 receives a request as shown in FIG. 29 or 31. A delivery module 2612 delivers the requested package to the medical device. The format of the package delivery message can be as shown in FIG. 30 or 32. Operational flow terminates at an end operation 2614, which corresponds to completion of the package transmission to the medical device. FIGS. 27-32 show schema including metadata used in messages and tables in a medical device network, such as the one shown in FIG. 1, to deploy packages from a medical device server to a medical device. The schema display various request and response scenarios in which a medical device requests delivery of package information and receives the requested information in response. One or more messages may be sent between the medical device and the medical device server prior to delivery of the package and its enclosed data. FIG. 27 shows a package information request table 2700 including metadata used to request information about a package that is available to be deployed to a medical device. The medical device is notified of an available package based on a previous response from the medical device server, as reflecting information in the main table 1102 or package tables 1108 related to that device in the medical device server. The metadata in the table 2700 includes a package identifier, which is used by a medical device to identify the package and request information about its contents. Additional metadata related to the package may be included in the table 2700 and message from the medical device as well. FIG. 28 shows a package information request response table 2800 including metadata used in describing a package available to be deployed to a medical device. The metadata in the table 2800 includes the package identifier, corresponding to the package identifier in the package information request table 2700, and also includes package information metadata. The package information metadata links to a package information table 2802, which contains name and version metadata. Values associated with the name and version metadata describe the package, such that the medical device can determine whether to request deployment of the package. FIG. 29 shows a package data request table 2900 including metadata used in requesting package data from a medical device server. The package data request table 2900 includes package identifier and response type metadata. The package identifier represents a unique identifier for the package available for deployment to the medical device. The response type represents an identifier indicating the desired delivery format of the package data. In one embodiment, the package data can be delivered to the medical device in either a plain text format or using an xop format. FIG. 30 shows a package data request response table 3000 including metadata used in deploying a package to a medical device. The metadata included in the package data request response table 3000 includes a package identifier and a package binary data field. The package identifier identifies the package referred to in FIG. 29, and the package binary data field denotes the binary data representing the package being delivered to the medical device. The package binary data field can optionally link to a separate package binary data table 3002 containing the package binary data for delivery to a medical device. In one embodiment, the package delivered to the medical device is the package 2500 of FIG. 25. FIG. 31 shows a package request table 3100. The package request table 3100 corresponds to the package data request table 2900 of FIG. 29 combined with the package information request table 2700 of FIG. 27. The package request table 3100 can be used by the medical device in an instance in which the medical device does not need to validate the package information prior to downloading the package. The package request table 3100 includes a package identifier and a response type, similar to the package data request table 2900, but indicates by requesting the entire package that package information and package data messages need not be separated. FIG. 32 shows a package request response table 3200, representing the schema of a message from the medical device server sent in response to a message of the form reflected by the package request table 3100 of FIG. 31. The package request response table includes package identifier, package information, and package binary metadata. The package information metadata links to a package information table 3202 containing name and version metadata associated to the package data. The package binary metadata links to a package binary table 3204, which includes metadata corresponding to the package to be deployed to the medical device. Referring now to FIGS. 33-35, systems and methods for time management in a medical device network are shown. Because the medical device network can vary in size or configuration, the time management systems described are configured to extend across various business entities, various locations, and various time zones. The systems and methods described provide a uniform way to synchronize time tracking in medical devices and a medical device server located in one or more locations or time zones. FIG. 33 shows a time messaging schema 3300 useable to track medical device time at the medical device server, and also transmit time synchronization messages between a medical device and a medical device server. The time schema 3300 includes a time request table 3302, a time request response table 3304, and a system time table 3306. The time request table 3302 optionally includes no metadata, but represents a time request response sent from a medical device to the medical device server for synchronization of the medical device time with the time stored in the server or back office components. The time request response table 3304 includes system time metadata, associated with the system time value stored on the medical device server. The system time metadata optionally links to a system time table 3306, which contains a time value useable to synchronize the time of the medical device with the time received from the medical device server. Additional metadata or other information useable to assist in time synchronization can be used as well. FIG. 34 shows methods and systems for time synchronization of medical devices and a medical device server within a medical device network. Operational flow in the system 3400 commences at a start operation 3402, corresponding to initial operation of the medical device network. A server time maintenance module 3404 maintains a global time value in the server that is to be used to synchronize the time values of the medical devices communicatively connected thereto. A server time transmission module 3406 transmits the server time to one or more medical devices in the medical device network. In one embodiment, the server time transmission module 3406 transmits the server time value to a medical device in response to a request message from that medical device. In such an embodiment, the request message may be of a form shown in the time request table 3302 of FIG. 33, above. In a further embodiment, the transmission module 3406 converts the server time value to a localized server time value based on the time zone of the location of the medical device. This conversion may take place if the server resides in a different time zone from the medical device. The server and medical device thereby have a synchronized time value that is converted to the appropriate time zone. One possible implementation of this embodiment converts all times to the Universal Time Protocol upon transmission from the server, and the destination medical device reconverts the time value to the local time of that destination device's location. Other time zone conversions, such as from the local time of the medical device server to the local time of the medical device, are possible as well. A replacement module 3408 replaces the device time in the medical device with the server time value received from the medical device server. The replacement module 3408 uses the time-adjusted server time value, configured to be used at the location of the medical device. An optional confirmation module 3410 sends a confirmation message to the medical device server indicating that the medical device is successfully synchronized to the server, allowing the server to track which medical devices have been successfully synchronized with the server. Operational flow terminates at an end operation 3412, corresponding to completion of the time synchronization process. Referring now to FIG. 35, methods and systems for synchronizing event log data are disclosed. The system 3500 accommodates event log data received from medical devices located in different locations in a plurality of time zones. The event log data is configured such that the local time stamp of the event log data represents the time zone in which that device resides, so event logs from different time zones having the same time stamp in actuality occurred at different times. The system 3500 compensates for this discrepancy when storing event log data, and also when providing it to users for review. Operational flow within the system 3500 commences at a start operation 3502, corresponding to initial communication of event data from medical devices to the medical device server. A receipt module 3504 corresponds to the medical device server receiving event log data from one or more of the medical devices. As described above, the event log data includes various details regarding various types of events, such as therapy events, alarm events, maintenance events, telemetry events, or other types of events, each of which are associated with a time stamp reflecting the current time value of the medical device, reflecting the local time zone of that device. A time zone modification module 3506 converts the time stamp information from the local time zone of the medical device to a constant time zone. In one embodiment, the time zone modification module 3506 converts the time stamp to the Universal Time Protocol (UTP). A storage module 3508 stores the converted time stamp and associated event log data in the medical device server or back office components. An optional global tracking module 3510 tracks global events using the uniform time zone information. For example, a user desiring to track events that occur at single instantaneous moment across all time zones can track global events using the Universal Time Protocol to maintain a standard time across all time zones. The user sends a request for event log data related to the global events stored on the server, and receives event log information with a time stamp having constant time zone information. A request local event module 3512 receives a request for local event data, including types of event data associated with the time zone in which the event occurs. Examples of time zone specific events can include events timed to occur at the beginning or end of a shift at a hospital, or other local events. The request local event module 3512 generates a query for the event data requested, and returns results including event log data. A conversion module 3514 converts the uniform time zone information to local time zone information based on the location of the medical device from which the event log data was recorded. The conversion module 3514 optionally generates a report from the event log data for distributing to a requesting user, including the compensated local time event log. Operational flow within the system 3500 is terminated at an end operation 3516, which corresponds to completion of the conversion module 3514. Referring now to FIGS. 36-66, a generalized web service architecture is disclosed which manages user access to a medical device server in a medical device network, such as the one shown in FIG. 1. The web service architecture allows remote user to server communication, to provide data access and programming capabilities related to medical devices in the medical device network of FIG. 1. For example, users can perform administrative tasks, administer software updates to medical devices, access event and operational records, perform maintenance, change therapies, and view near real-time operation of the medical devices while remotely located from the devices. These functions, and others, are described below. FIG. 36 shows an overall web service architecture 3600, shown as a subsystem of the possible software architectures of the medical device network in FIGS. 3-4. The web service architecture includes various web modules or services configured to validate users and provide access to data stored on the medical device server. In a possible embodiment, the web service architecture is implemented in a .NET architecture using Internet Information Server, by Microsoft Corporation. The web service architecture 3600 includes an administrative web service 3602, an operations web service 3604, and an event tracking web service 3606. The administrative web service 3602 validates users of the medical device server, and includes functional interfaces for logging in, logging out, and changing a user password. The administrative web service 3602 tracks information related to products, customers, contact information, medical devices associated with the customers, user accounts associated with a customer, and other variables. The administrative web service 3602 uses this tracked information to validate specific users, each of whom is associated with a specific health care facility, referred to in the administrative web service as a customer. A specific implementation class of the administrative web service 3602 is described in Part IV.A, below. The operations web service 3604 provides access to operational data of the medical devices, such as operational data regarding therapy delivery or monitoring data. The operations web service 3604 tracks the various therapy states occurring in a medical device, and enables a messaging sequence that can occur to trigger or track a therapy event in a medical device. A specific implementation of the operations web service 3604 is described in Part IV.B, below. The event tracking web service 3606 tracks various event data occurring in a medical device, such as telemetry data received by a medical device server. The event tracking web service 3606 enables users to view near-real time activity of a medical device while located remote from the medical device, and allows the user to determine the on-line status of the medical device. A specific implementation of the event tracking web service 3606 is described in Part IV.C, below. Referring now to FIGS. 37-41, systems and reports for definition and use of an administrative web service are shown. FIG. 37 shows an exemplary class structure defining an administrative web service 3700. The administrative web service 3700 provides a possible embodiment of the administrative web service 3602 of FIG. 36, and is accessible via any of a number of user interfaces, such as the administration web forms 324 of FIG. 3. The administrative web service 3700 includes an authentication class 3702, an authorization class 3704, a user class 3706, a role class 3708, a license class 3710, a resource class 3712, a metadata class 3714, and an entity settings class 3716. Each of the classes includes a number of functions remotely accessible via the internet and web-based user interfaces to perform administrative tasks. Functionality of the various classes is described below. The authentication class 3702 provides the initial access to the administrative web service 3700, and includes login and logout functionality. The authorization class 3704 includes a variety of resource control functions to ensure that two users are not reading from and writing to the same data concurrently, or otherwise causing data conflicts. The resource control functions incorporated into the authorization class 3704 include read, write, create, delete, and access permission functions. Other functions may be incorporated into the authorization class 3704 as well. Each of the other classes link to the authorization class 3704, and each requests read or write access to the data protected by the authorization class 3704. The user class 3706 allows the system to perform various user administration tasks, such as creating new users, editing user information, changing passwords, deleting users, defining user roles, and retrieving user histories. Other functions are possible as well. The role class 3708 defines roles assignable to users, and includes the ability to create, update, delete or retrieve various roles defined in the administration data. Roles may correspond to various classes of individuals who can access data managed by the medical device server and back office components, such as doctors, nurses, or healthcare administrators. Roles may also correspond to the various entities with which the individuals are associated. The license class 3710 defines licenses installed into the system to control the number of users able to log in at once, as well as to define usage models for various accounts. For example, a particular account may allow only a limited number of individuals to view telemetry data or to access therapy records at once, or may define a way of charging a customer for tracked usage of the medical device server or other back office components. The resource class 3712 allows an administrator to add and delete resources, which correspond to the specific functional areas of the medical device server. The metadata class 3714 provides the underlying functionality for installing metadata into either the administration system, such as custom metadata corresponding to a newly introduced medical device, or into a newly introduced medical device itself. Exemplary interfaces for installation of metadata are shown below in FIGS. 42-43. The entity settings class 3716 allows writing and retrieval of entity settings. Additional administrative functionality, including additional classes, may be incorporated into the administrative web service 3700 as well. FIGS. 38-41 display sample administrative reports accessible to a user. The administrative reports of FIGS. 38-41 correspond to the reports 326 shown in FIGS. 3-4, and are derived from information stored in the data warehouse 322 related to administrative events logged by the medical device server. In a possible embodiment of the present disclosure, the various reports are generated using SQL Server Reporting Services, by Microsoft Corporation. Other reporting and business intelligence software may be used as well. FIG. 38 displays an administration tracking event report 3800. The administration tracking event report displays detailed information regarding administration events, such as user access and connection to the medical device server. The number and contents of entries in the report correspond to data from the administration data 316 of FIG. 3 that match the query presented to the administrative web service. The administration tracking event report includes time and date information 3802, application information 3804, and message information 3806. Additional information, such as the code information, time zone indicator, and other information can be optionally included in the report 3800. The time and date information 3802 display the time stamp information related to the event tracked by the administrative module. The time and date information 3802 display on the report in varying formats, depending upon whether a user chooses a local time zone option or a GMT normalized time option. In the report 3800 shown, the local time zone option is selected. The application information 3804 indicates the service or handler accessed, and the message 3806 indicates the action taken with respect to that service or handler. In the example shown, exemplary connection events are shown for two medical device servers, labeled "MDS:Mds01" and "MDS:Mds02". FIG. 39 displays a security event report 3900. The security event report 3900 corresponds generally to the administration tracking event report 3800, but includes events related to security of the medical device server rather than access to it. The security event report 3900 includes time and date information 3902, application information 3904, and message information 3906, each of which have the same functionality as in the administration tracking event report 3800. FIG. 40 displays a security event trending report 4000. The security event trending report 4000 displays a chart of security related events over time. In the embodiment shown, the security event trending report 4000 displays a bar chart showing the frequency of security events by month. Other configurations displaying trends in security events are possible as well. FIG. 41 displays a user history report 4100. The user history report displays a chronologically ordered list of events logged regarding one or more users. Each entry in the list includes time and date information 4102, a sorting code 4104, a username 4106 corresponding to the active user, and a message 4108 related to the action taken by that user. An optional details entry 4110 displays additional information associated with the history information, in raw form, such as the session key, location, name, location, or other activities occurring in the user history. Referring now to FIGS. 42-50, various methods of programming the medical device server and medical device with metadata, firmware, or other binary data are shown. FIGS. 42-46 display administrative forms useable to perform various administrative tasks in the medical device server, such as providing or removing metadata or packages, intended for configuration of the medical device server or medical devices, respectively. The administrative forms can correspond to forms generated by the administrative applications 324 of FIGS. 3-4. FIGS. 47-50 display reports displaying the results of installation of the metadata and packages, and are a subset of the reports 326 available from the data warehouse 322 in FIGS. 3-4. FIGS. 42-43 display user interfaces configured to allow an administrative user to manage metadata installed into the medical device server, as described above in Parts III.A and III.B. FIG. 42 shows an initial user interface 4200 showing the metadata packages either currently installed into the medical device server or available to be installed. A listing area 4202 lists the packages, in this case displayed as "Virtual Infusion Pump", "Virtual Patient Monitor", and "Medfusion 4000". Check boxes 4204 in the listing area allow user selection of one or more of the installed packages, an install button 4206 installs the packages into the medical device server, and an uninstall button 4208 removes metadata packages from the medical device server. FIG. 43 displays a metadata installation interface 4300 configured to allow a user to browse for a metadata file and install that file onto the medical device server. The metadata installation interface 4300 appears following selection of one of the types of medical devices present in the system in the user interface 4200, and allows the user to select and install a metadata file associated with the previous selection of metadata using the initial user interface 4200. FIG. 44 displays a package deployment interface 4400 providing deployment of packages for distribution to one or more medical devices, as described above in Part III.C. The package deployment interface 4400 generally corresponds to the metadata installation interface 4200 of FIG. 42, but relates to software to be installed onto a medical device, rather than into the medical device server. A listing area 4402 lists the packages, in this case displayed as "Simple Infusion Pump" or "TestPackage". Check boxes 4404 in the listing area allow user selection of one or more of the installed packages, a deploy button 4406 deploys the packages into the medical device server, and an uninstall button 4408 removes the packages from the medical device server. Upon selection of the deploy button 4406, a user interface 4500 shown in FIG. 45 is displayed. The user interface 4500 allows system administrators to enter a package deployment name into a name field 4502, and also allows the administrator to enter a start time and end time, into start and end fields 4504, 4506, respectively. The user interface further allows the system administrator to select a package deployment file to use in a package deployment file selection field 4508. The system administration presses a deploy button 4510 to deploy the package, or a cancel button 4512 to cancel deployment. Upon selection of the deploy button 4510, a further user interface 4600 shown in FIG. 46 is displayed to allow user verification that the correct package has been selected for download to medical devices. The user interface 4600 displays package deployment details in a package information field 4502, including the selected start time, end time, and target type as entered in the previous user interfaces 4400, 4500. The user interface 4600 further displays vendor properties in a vendor field 4504, such as the vendor identifier, name, and version of the vendor package. FIGS. 47-50 display various reports generated from the data warehouse 322 of FIGS. 3-4, as related to metadata-defined event messages or package deployment. FIG. 47-48 relate to message handling and debugging of faulty messages received from a medical device. FIGS. 49-50 display package deployment reports, incorporating records of successful and unsuccessful deployment of software or other binary data to medical devices. FIG. 47 displays a quarantine report 4700, which displays a chronological list of the quarantined messages received by the medical device server. The quarantine report 4700 includes time and date information 4702, state information 4704, and message information 4706. The time and date information 4702 display the time stamp information related to the quarantine event tracked by the medical device server. The time and date information 4702 display on the report in varying formats, depending upon whether a user chooses a local time zone option or a GMT normalized time option. In the report 4700 shown, the local time zone option is selected. The state information 4704 relates to the state of the quarantined message, such as whether it is a new message, a released message, or a reinserted message. New messages refer to newly located problematic messages, while released messages correspond to messages which cannot be resolved and must be dropped. Reinserted messages refer to those messages which are reintroduced to the message server in case the medical device is awaiting a response from the server. The message information 4706 describes the error occurring in the message transfer. Various error messages are possible, generally relating to the ability of the medical device server to understand the message received from a medical device. FIG. 48 displays a quarantine detail report 4800, which is configured to display the details of a specific quarantined message received by the medical device server. The quarantine detail report includes an error field 4802 including the error information displayed on the quarantine report 4700, and a source field 4804 which displays the metadata and values included in the message, for user debugging or correction of message activity in the medical device server. Additional information can be displayed regarding the quarantined message as well. FIG. 49 displays a package deployment report 4900 showing package deployments known to the medical device server, with an associated list of medical devices of various types and the status of the package deployment to each of the medical devices. The package deployment report includes one or more package deployment entries 4902, each including name and version information related to the specific package being deployed to that type of device. Each of the package entries includes device sub-entries 4904, each of which relates to a specific device qualifying for the generalized package deployment. The sub-entries each include host name information 4906, physical identification information 4908, notification information 4910, transfer information 4912, and completion information 4914. The host name information 4906 corresponds to the medical device server providing the package to the device. The physical identification information 4908 displays the unique identifier associated with the medical device. The notification information 4910 displays the date and time at which the medical device was notified that the package was available. The transfer information 4912 displays the date and time at which the package was successfully transferred to the medical device. The completion information 4914 displays the full date and time at which the package was successfully applied to the medical device. Additional information can be tracked for each package deployment. For example, in an instance in which a package fails to deploy, an error indication 4916 displays an indication of an error, and a result of the error. FIG. 50 displays a package deployment error report 5000. The package deployment error report 5000 provides a detailed event history for the specific packages and corresponding devices for which a package deployment fails. The package deployment error report 5000 displays a title 5002 including the target medical device type and package identifier. The title also optionally displays a name associated with the package deployment. The package deployment error report 5000 displays time and date information 5004, optional host information 5006, physical identifier information 5008, and message information 5010. The time and date information 5004 indicate when the error in the package deployment occurred. The optional host name information 5006 displays the network name in which the medical device is located. The physical identifier information 5008 includes the identifier associated with the medical device. The message information 5010 displays the message associated with the package deployment error. Additional information regarding the deployment error may be included in the report 5000 as well. Referring now to FIGS. 51-53, reports related to maintenance and faults of medical devices are shown. The reports provide user access to records of maintenance performed on the medical devices as well as information related to medical device failures and trends in those failures. Additional reports related to maintenance or faults may be incorporated as well, and correspond to the maintenance event data collected by the medical device server, as described above in Part III.B. In a possible embodiment, one or more of the reports of FIGS. 51-53 correspond to the maintenance forms 330 of FIGS. 3-4. FIG. 51 shows a medical device maintenance report 5100 listing maintenance records for various medical devices. The medical device maintenance report 5100 includes type entries 5102 corresponding to various types of medical devices, and device sub-entries 5104 corresponding to specific medical devices. In the embodiment shown, the type entries 5102 are the "MedFusion 4000" and "Titan" entries, while the device sub-entries 5104 are the individual rows within each type. Within each sub-entry 5104, there exists host name information 5106, physical identifier information 5108, version information 5110, package information 5112, and preventative maintenance date information 5114. The host information 5106 displays the network associated with the medical device. The physical identifier 5108 displays the unique identifier associated with the medical device. The version information 5110 displays one or more version numbers associated with the medical device. The package information 5112 displays packages being used by the medical device. The preventative maintenance information 5114 displays a date at which the medical device is due for preventative maintenance. Additional information can be displayed within each sub-entry 5104 as well. FIG. 52 shows a medical device fault report 5200. The medical device fault report 5200 displays events related to medical device faults communicated to a medical device server, such as due to a faulty battery, motor, or other mechanical component. The medical device fault report 5200 includes time and date information 5202, host information 5204, physical identifier information 5206, and message information 5208. Use of the information 5202-5208 is analogous to the corresponding elements in the package deployment error report 5000 of FIG. 50, but related to medical device fault events. For example, in the medical device fault report 5200, the message information includes device fault event information, such as motor, battery, or other mechanical faults of a medical device. FIG. 53 shows a medical device fault trending report 5300. The medical device fault trending report 5300 displays a chart of medical device fault related events over time. The medical device fault trending report 5300 provides users with an indication of repeated errors in a medical device, or other detectable trends in medical device faults. In the embodiment shown, the medical device fault trending report 5300 displays a bar chart showing the frequency of device fault events by month. Other configurations displaying trends in device fault events are possible as well. FIGS. 54-62 disclose various aspects of the operations web service 3604 of FIG. 36. Specifically, the figures show systems, methods, and reports for remote operation of the medical devices in a medical device network. In one possible embodiment, the systems and methods describe tracking of changed therapy parameters in a medical device by tracking original, updated, and final parameters of the medical device. FIG. 54 shows a flowchart of methods and systems for tracking therapy order states in a medical device server. Therapy orders refer to commands to a medical device to provide a therapy to a patient. The system 5400 includes states corresponding to the various possible states experienced in the medical device during execution of the therapy order. Operational flow within the system 5400 commences at a start node 5402, which corresponds to introduction of a new therapy order into the medical device or medical device server. Once the therapy order is introduced, the system 5400 enters a new state 5404, indicating that the therapy order is newly introduced and has not yet been executed by the medical device. When the system 5400 is in the new state 5404, a user has the option to cancel the therapy order. If the user chooses to cancel the therapy order, operational flow in the system 5400 proceeds to a canceled state. 5406. From the canceled state, operational flow proceeds to an end node 5408 corresponding to completion of the therapy module. At the end node 5408, operational flow terminates and therapy delivery events tracked using the medical device server continue to be stored for review by a user. If the user chooses not to cancel the therapy order while the system 5400 is in the new state, operational flow proceeds to an assisted setup state 5410. The assisted setup state 5410 attempts to assist in setting up the therapy parameters. If the assisted setup is unsuccessful operational flow branches to a failed state 5412. The failed state 5412 stores an error message indicating that the assisted setup process failed. Operational flow proceeds from the failed state 5412 to the end node 5408. If the assisted setup state 5410 is successful in setting up therapy parameters, operational flow branches to a setup state 5414. The setup state 5414 indicates that the therapy is successfully set up in the medical device, and is ready for delivery to a patient. A begin therapy event, optionally sent from the medical device server or generated at the medical device, triggers the system 5400 to proceed to a started state 5416, which corresponds to starting the therapy delivery in the medical device. An end therapy event received from the medical device or medical device server causes operational flow in the system 5400 to proceed to a complete state 5418, indicating that delivery of the therapy is complete. Operational flow next proceeds to the end node 5408. FIG. 55 shows an exemplary class structure defining a therapy service 5500. The therapy service 5500 illustrates a portion of the functionality of the operations web service module 3604. The therapy service 5500 links to and uses a variety of functions from the administrative web service 3700 of FIG. 37. The therapy service 5500 includes a therapy order class 5502, a therapy order rule utility 5504, and a therapy order action enumeration 5506. The therapy order class 5502 includes a variety of therapy order operations for starting, stopping, and defining various therapies to be delivered by medical devices in the medical device network in which the therapy service 5500 operates. The therapy order operations include therapy creation, therapy update, therapy cancel, therapy execute, and therapy retrieval operations. Additional therapy order operations can be included in the therapy order class 5502 as well. The therapy order rule utility 5504 provides expressions and actions related to execution of the therapy order, including various parameters and commands required for execution of the therapy. The therapy order action enumeration 5506 provides advisory messages used during selection and/or execution of a therapy order. FIG. 56 displays exemplary message exchange processes 5600, 5620, 5640, and 5660 performed between a therapy order management application 5602, an operations web service 5604 such as the one shown in FIG. 36, a medical device server 5606 as disclosed above in FIGS. 3-4, and a medical device 5608, such as shown in FIG. 2. The therapy order management application 5602 can be any application configured to interface with the operations web service to communicate therapy orders and other messages to the operations service 5604 and medical device server 5608. A first message exchange process 5600 illustrates the therapy order management application 5602 transmitting a create therapy order message 5610 to the operations web service 5604. The operations web service 5604 verifies the therapy information and stores the therapy order in operations data. The operations web service 5604 also responds 5612 by indicating success or failure of the message. A second message exchange process 5620 illustrates the therapy order management application 5602 later in time transmitting a therapy order update message or a therapy order cancellation message 5622. The operations web service 5604 verifies the therapy information, and updates or cancels the therapy order according to the message. The operations web service 5604 also responds 5624 by indicating success or failure of the message. A third message exchange process 5640 occurring after the first message exchange process 5600 illustrates the therapy order management application 5602 transmitting a message 5642 indicating that the therapy order should be executed. The therapy order management application 5602 transmits an execute therapy order message 5642 to the operations web service 5604, which verifies the therapy order and in turn forwards the therapy order message 5642 to the medical device server 5606. The medical device server 5606 relays the therapy order message 5642 to a medical device 5608. The medical device 5608 transmits a message 5644 indicating the success or failure of receipt of the therapy order message 5642. The medical device server 5606 and operations web service 5604 relay the message 5644 back to the order trigger application 5602. At a time after the medical device transmits the message 5644, the medical device 5608 initiates a fourth messaging process 5660 in which the medical device transmits a therapy begin message 5662 to the medical device server 5608, indicating that the medical device has begun delivering the therapy to a patient. The medical device server 5608 transmits the message 5662 to the operations web service 5604, which updates the therapy order state. The medical device server also relays the message 5662 to an event tracking web service 5605, such as the one in FIG. 36, to store a therapy delivery event in an event history log. Both the event tracking web service 5605 and the operations web service 5604 transmit response messages 5664 indicating the success or failure of receipt of the therapy begin message 5662. Additional events triggered by the medical device, such as a therapy completion event or alarm, transmit among the components 5602-5608 analogously to the messaging process 5660. Further, additional messaging schema can be included as well. FIG. 57 shows methods and systems for tracking changed parameters in a medical device, such as a medical infusion pump. The system 5700 communicates original, updated, and final parameter values used for operation of the medical device, using metadata as described herein to identify the various changes in parameters. The system 5700 commences at a start operation 5702, which corresponds to initiation of a therapy in a medical device. The therapy initiated in the medical device includes parameters needing parameter values to define various aspects of the therapy. For example, in a therapy delivered by a medical infusion pump, various parameters include basal rates, bolus rates, thresholds, and various other parameters. An original parameter receipt module 5704 receives an original parameter value from a medical device. The original parameter is a parameter set in a medical device prior to receipt of a different parameter by that device, and can be any type of operational parameter related to delivery of a therapy or monitoring provided by the medical device. An updated parameter receipt module 5706 receives an updated parameter value from the medical device corresponding to a change from the original parameter. The updated parameter value is a new parameter value changing the operation of the medical device. The updated parameter value relates to the same parameter as the original parameter. A final parameter receipt module 5708 receives a final parameter value from the medical device. The final parameter value is the parameter value the medical device will use for therapy and monitoring after the device is reprogrammed with the updated parameter value. The final parameter value may be the same as the updated parameter value, or may be different based on, for example, various hard and soft limits set for parameters within the medical device. In various embodiments, the receipt modules 5704-5708 may occur concurrently or sequentially, and may be included in one or more messages from the medical device to the medical device server. A parameter storage module 5710 stores the original, updated, and final parameter values in memory of the medical device server or other back office components. Optional additional steps involved in the system 5700 can include comparing the final parameter value received in the final parameter receipt module 5708 with a hard limit or soft limit stored in the medical device server. If the final parameter value exceeds the limit, the system 5700 may trigger an alarm in the medical device server, and optionally communicate that alarm back to the medical infusion pump via a package deployment or other message. In a further embodiment, the alarm is communicated to a medical caregiver associated with the medical device. Operational flow terminates at an end operation 5712, which corresponds to completion of the change in pump parameter values and storage of the updated pump parameter values in the medical device server or other back office component. FIG. 58 shows a medical device history report 5800 listing original, updated, and final operational parameter values for a medical device according to the methods and systems of FIG. 57. The medical device history report 5800 includes a medical device label 5802, date and time information 5804, class information 5806, trigger information 5808, message information 5810, location information 5812, and drug information 5814. The medical device label 5802 corresponds to the medical device name for the device whose history is displayed in the report 5800. The date and time information 5804 correspond to the time the various events occurred that are included in the medical device history report. The class information 5806 describes the type and severity of the event. In the case of a therapy change event, the class information 5806 also includes an original value of the changed parameter, the changed value of that parameter, representing the value entered by a user, and a final value of the parameter, indicating the final set value used by the medical device. The trigger information 5808 displays the trigger associated with the medical device event. In the example shown, an event in an alarm classification has a high level of concern, and includes a warning in the trigger information 5808. However, an event describing a therapy change will not activate the trigger information 5808. The message information 5810 includes information about the status of the medical device, such as battery life, therapy delivery progress, therapy parameter limits, or physical characteristics of the device. The location information 5812 includes information related to the location of the medical device, such as the department, the facility, and the entity controlling the medical device. The drugs information 5814 includes information about the drug or therapy being delivered by the medical device, and optionally is only included in the information for a therapy change. Additional information about the medical device can be displayed in the medical device history report 5800, based on the information tracked by the medical device server and operations web service. FIG. 59 shows a therapy history report 5900. The therapy history report 5900 displays the same information as is displayed in the medical device event history report 5800 of FIG. 58, but will only display therapy event information. The therapy history report 5900 includes a medical device label 5902, date and time information 5904, class information 5906, trigger information 5908, message information 5910, location information 5912, and drug information 5914, each of which operate analogously to the corresponding entries in the medical device event history report 5800. FIG. 60 shows a therapy trending report 6000. The therapy trending report 6000 displays a chart of therapy related events over time. In the embodiment shown, the therapy trending report 6000 displays a bar chart showing the frequency of therapy events by month. Other configurations displaying trends in therapy events are possible as well. FIG. 61 shows a therapy change history report 6100. The therapy change history report 6100 also displays the same information as is displayed in the medical device event history report 5800 of FIG. 58, but only displays therapy change event information. Therapy change events correspond to changed parameters in delivering a therapy using a medical device. The therapy change history report 6100 includes a medical device label 6102, date and time information 6104, class information 6106, trigger information 6108, message information 6110, location information 6112, and drug information 6114, each of which operate analogously to the corresponding entries in the medical device event history report 5800 and the therapy history report 5900. FIG. 62 shows a therapy change trending report 6200. The therapy change trending report 6200 displays a chart of therapy change events over time. In the embodiment shown, the therapy change trending report 6200 displays a bar chart showing the frequency of therapy change events by month. Other configurations displaying trends in therapy change events are possible as well. Referring now to FIGS. 63-66, various features of the event web service of FIG. 36 are described. The event web service provides a method by which external applications collect event data from the medical device server and back office components. In particular, the event web service provides an indication of the on-line status of the medical device, and also provides user access to telemetry streams allowing near-real-time telemetry information regarding operation of a medical device in the context of a medical device network as described in FIGS. 1 and 3-4. FIG. 63 is a flowchart of methods and systems for determining the on-line status of a medical device. The system 6300 executes on a medical device server or other back office components, and expects communication from a medical device within a predetermined period in order to ensure accurate communication between the device and server. Operational flow within the system 6300 commences at a start operation 6302, which corresponds to initial communication between a medical device and a medical device server. Operational flow proceeds from the start operation 6302 to an expectation module 6304. The expectation module 6304 sets in the medical device server and/or back office components an expected, predetermined period within which the medical device server will expect communication. A receive data operation 6306 determines whether a message has been received by the medical device server. If data has been received by the medical device server, operational flow branches "yes" to an update module 6308, which updates the status of the medical device to indicate that the device is on-line. An optional output update module 6310 updates data output from the medical device server based on information received in the message. The information received in the message can include medical device status information, event log data, telemetry data, or various other types of data. In one embodiment, the message indicates the beginning of a telemetry stream, and, in response to the message from the medical device, the medical device server and back office components update the appearance of a dashboard screen to reflect the received telemetry data. In a further embodiment, the output update module updates medical device status information in one or more of the back office components. Operational flow proceeds through the receive data operation 6306, the update module 6308, and the output update module 6310 so long as the medical device continues in operation and the receive data operation 6306 determines that the medical device server continues to send messages to the medical device within the predetermined period. If the receive data operation 6306 fails to receive data within the predetermined period, the operational flow branches "no" to an offline module 6312, which changes the state of the medical device to offline in the medical device server and/or back office components. Operational flow proceeds to the optional output update module 6310, which updates the output to indicate that the currently displayed data is no longer considered current by the medical device server until additional messages have been received. Operational flow terminates at an end module 6314, corresponding to suspension of operation of the medical device network. FIGS. 64-66 provide methods and systems for operation of telemetry streams received from a medical device. The telemetry streams described herein provide nearly-continuous communication from the medical devices to the medical device server, and are viewable on a dashboard or other web portal. FIG. 64 shows a flowchart of systems and methods for near-real-time display of telemetry information from a medical device. Operational flow in the system 6400 commences at a start node 6402, which corresponds to initial operation of a medical device capable of transmitting a telemetry stream in a medical device network. A new state 6404 indicates that the telemetry stream has not previously been running. After the new state, a stream startup process attempts to start the telemetry stream, as shown in FIG. 65, below. If the stream startup process fails, operational flow proceeds to a failed state 6406, corresponding to failure to start the telemetry stream. Operational flow then proceeds to an end node 6408. If the stream startup process successfully starts, operational flow proceeds to a collecting state 6410, which corresponds to the medical device server collecting telemetry data from the medical device. In the collecting state, the telemetry data can be stored in the medical device server or other back office components, and also can be output to a dashboard or other monitoring user interface. From the collecting state 6410, a number of possible options affect operational flow of the system 6400. If a message, including a telemetry stream message, is not sent from the medical device to the medical device server within an expected, predetermined time set in the medical device server or back office components, operational flow proceeds to an offline state 6412. The offline state 6412 corresponds to the system no longer regularly receiving telemetry data. If a telemetry report is later received, the system 6400 returns to the collecting state 6410. If the telemetry stream is paused by a user, operational flow proceeds to a paused state 6414, corresponding to a system which only temporarily is not receiving telemetry data. The user can resume the telemetry stream to return the system 6400 to the collecting state. A terminated state 6416 can be reached from the collecting state 6410, the offline state 6412, or the paused state 6414 by the user terminating the stream or the system otherwise receiving a medical device power off event. The terminated state 6414 corresponds to ending the telemetry stream. In the terminated state, the system no longer receives information from the medical device, and the dashboard is not updated. In a possible embodiment, when the system 6400 is in the terminated state, a dashboard or other monitoring interface indicates to a user that data is not currently being collected. From the terminated state, operational flow proceeds to the end node 6408. FIG. 65 displays exemplary telemetry stream message sequences 6500, 6520, 6540, and 6560 performed among: a dashboard 6502, such as the one shown in FIG. 67; an event tracking web service 6504, such as the one shown in FIG. 36; a medical device server 6506, as disclosed above in FIGS. 3-4; and a medical device 6508, such as shown in FIG. 2. A first telemetry stream message sequence 6500 illustrates a request to initiate a telemetry stream from a medical device to a dashboard. The message sequence 6500 starts by the dashboard 6502 sending a start telemetry stream message 6510 to the event tracking web service 6504. The event tracking web service communicates the message 6510 to the medical device server 6506, which in turn communicates the message 6510 to the medical device 6508. The medical device generates a response message 6512 indicating success or failure of the message. The response message is related back to the dashboard 6502 by the medical device server 6506 and event tracking web service 6504. A second telemetry stream message sequence 6520 illustrates initiation of a telemetry stream by a medical device 6508. The medical device 6508 generates a telemetry event 6522, which includes near-continual communication of telemetry data from the medical device 6508 to the medical device server 6506, which relays the telemetry data to the dashboard 6502 via the event tracking web service 6504. The dashboard 6502 displays the telemetry data to the user in a near-real-time fashion. In one embodiment, the dashboard recreates the appearance of the medical device. The dashboard transmits a response message 6524 to the event tracking web service 6504, indicating successful receipt of the telemetry stream. The dashboard 6502 generates a get telemetry window message 6526 and transmits the message to the event tracking web service, which responds with a message 6528 indicating success or failure of the command. The telemetry window is started at this point, and the dashboard or web portal will display telemetry data. At this point, if the medical device is powered off, the event tracking web service 6504 will respond with a fail message and will terminate the telemetry stream. A third telemetry stream message sequence 6540 illustrates ending a telemetry stream by shutting off the medical device generating the telemetry stream. The medical device 6508 generates a power off event message 6542 and sends the message to the medical device server 6506. The medical device server sends a terminate telemetry stream message to the event tracking web service 6504. The event tracking web service 6504 generates a response message 6544 indicating success or failure of receipt of the message 6542. The medical device server 6506 relays the response message 6544 to the medical device 6508. A fourth telemetry stream message sequence 6560 relates to the sequence 6540 and illustrates ending a telemetry stream by discontinuing the telemetry stream at the dashboard 6502. The dashboard 6502 generates a terminate telemetry stream message 6562, which is communicated from the dashboard to the event tracking web service 6504, and in turn through the medical device server 6506 to the medical device 6508. The medical device 6508 terminates its telemetry stream and generates a response message 6564 indicating success or failure of receipt of the message 6562. The medical device server relays the message 6564 through the event tracking web service 6504 to the dashboard 6502. Additional messaging processes are possible in order to start and terminate telemetry streams using medical devices and dashboards according to the present disclosure. FIG. 66 shows an exemplary class structure defining a telemetry stream class 6600. The telemetry stream structure 6600 illustrates a portion of the functionality of the event web service module 3606. The telemetry stream relates back to and uses a variety of functions from the administrative web service 3700 of FIG. 37. The telemetry stream structure 6600 includes a telemetry stream class 6602 and a latest event class 6604. The telemetry stream class 6602 includes a variety of telemetry-related operations, including starting, terminating, pausing, and retrieving available telemetry streams. Additional telemetry stream operations can be included in the telemetry stream class 6602 as well. The latest event class 6604 includes functions for retrieving the latest events, so as to determine when the most recent event was received from the medical device and thereby determine the on-line status of the medical device, so as to determine the availability of telemetry stream data. Additional functions can be included in the latest event class 6604, and additional classes can be added to the telemetry stream structure 6600. Various exemplary dashboards may be used to view telemetry data at a workstation of other computing device. One example dashboard is shown in FIG. 67. The dashboard 6700 displays telemetry data (e.g. current or near-current operational status) relating to the pumps with which it is associated. The dashboard 6700 can be any of a number of dashboard applications configured to receive and display telemetry data to a user in a near-real-time manner, and can correspond, for example, to the dashboards logically illustrated as dashboard 328 of FIGS. 3-4. The dashboard 6700 can be updated by a telemetry stream, such as described above in FIGS. 64-66. In the embodiment shown, the dashboard 6700 tracks a name 6702, identifier 6704, domain 6706, address 6708, port 6710, and activity history 6712, with respect to each medical device associated with the dashboard. The name 6702 corresponds to a name of a device recognizable to a user, assigned by either the device itself or the server. The identifier 6704 provides a unique identification useable by the server to verify the identity of the medical device. In various embodiments, the identifier can correspond to a globally-unique identifier (GUID), hardware address, or other identification of the medical device. The domain 6706 indicates the name of a network in which the medical device resides. The address 6708 provides connection information regarding how to communicate with the medical device from the server. In the embodiment shown, the address 6708 is shown as an IP address of the medical device. The port 6710 lists the inbound communication port for the medical device. The activity history field 6712 lists a date and time of the last event occurring on the medical device and communicated to the server. The dashboard 6700 graphically illustrates an operational status of the pumps with which it is associated. In the embodiment shown, five medical devices are tracked in the dashboard 6700, named "MD0333", "MD0444", "MD0524", "MD0324", and "MD0988." The first, fourth, and fifth devices (MD0333, MD0324, and MD0988) are illustrated as powered and delivering a therapy to a patient. The second device (MD0444) is shown to be in an alarm state, indicating a possible abnormal operation of the device or emergency condition related to the patient associated with that device. The third device (MD0524) is illustrated to be in a fault state, indicating a malfunction or error occurring in that medical device. Other states illustrating an operational status may be illustrated on the dashboard 6700 as well. Optionally, additional features can be included in the dashboard 6700 that allow a user to filter or display different types of information. In the embodiment shown, a pause check box 6714 and an offline devices check box 6716 allow a user to selectably modify the dashboard. The pause check box 6714, when selected, causes the dashboard to "freeze" temporarily halting the updating of information in the dashboard to allow a user to view the state of the dashboard at a single time. When the pause check box 6714 is unselected, the status information on the dashboard can continually update as data is received from the associated medical devices. The offline devices check box 6716 enables the dashboard to display information related to devices associated with the dashboard, but which are not online and from which the dashboard has not received recent status information. Other display features and filters can be incorporated into the dashboard as well, allowing a user to select the desired set of devices to monitor and allowing the user to view a specific portion of the telemetry data received from those users. Top Inventors for class "Surgery: light, thermal, and electrical application"
0.983893
How to make people do anything? Think back to a time when you wanted someone to do something for you. Maybe you wanted a friend to do you a favor, maybe you wanted the hiring manager to give you a job that you really liked or maybe you wanted to get a better deal on a car earbud. Every day, humans speak thousands of words without ever really giving much thought into the true power of what they're saying. A famous quote once said handle them carefully forwards have more power than atom bombs and when spoken in the right combinations words can quite literally get anyone to do anything you want. You can take two people who are identical in almost every way, drop them into the world and tell them to find success and one person could get dramatically different results than the other, but why? It all comes down to knowing what to say? How to say it? and how to truly make every word count? The right combination of words speaks directly to a person's subconscious mind and influences the main part of the brain that people use to make decisions. What most people don't realize is that the subconscious mind only produces yes or no answers and it makes decisions quickly. With a few key phrases, you can become incredibly persuasive and influential and once you have done this you'll find it much easier to get anyone to do anything that you want. Then the first power phrase to remember is I'm not sure if it's for you, but this combination of words allows you to introduce an idea to anyone quickly, easily, and cleverly and these words instantly tell the person's subconscious that there is no pressure. more interested in what you're saying. The key word here is "but" and instinctively we usually pay most attention to what comes after this word. Imagine you're that dude outside of Walmart trying to get signatures for your petition that nobody really cares about you. Would say I'm not sure if it's for you but do you have a minute to check this petition up. In any situation when you want someone to do something just start the sentence out with "I'm not sure if it's for you but and simply add whatever it is that you want to ask after the word.. but". Now the second key combination of words is "open-minded" and it works very similarly to the first phrase. All that you have to do is add this phrase before anything you want to ask. For example, imagine you want your friend to loan you his motorcycle for a day. You would start talking to him and when the time feels right you would say how open-minded would you be about letting me borrow your motorcycle for the day? The reason this combination of words works so well is because 90% of people view themselves as being open-minded. So subconsciously saying no to your request goes against a belief that they have about themselves which actually makes it very difficult to say no. Now the next combination of words it's like an atom bomb that you can use to win any argument with someone who thinks that they know everything. Think about this for a second during any argument between two people each person has their own opinion based on a foundation of knowledge that they have about the topic. By confidently calling out the knowledge base of their topic you can actually force them to doubt their own opinion and the key phrase here is "what do you know..?" Imagine you're arguing with someone about how to make a lot of money? The other person thinks that the most money can be made working a typical nine-to-five wage shop and you think that the most money can be made with an internet business that involves not trading your time for money. You could say what do you know about nine-to-five jobs that makes them better than an internet business? Something that's so important to remember here is that the way that you say these words is just as important as the words themselves and you need to say them in an overconfident way. Even if you don't actually believe what you're saying. Imagine some guy is trying to fight you, you could say do you really think that you could beat me? In a very confident way and by doing so you will actually cause him to doubt himself and rethink whether he is actually capable of beating you or not. Keep in mind that the more confidently that you say the words the greater the amount of self-doubt that you will create within the other person. This is actually a major trick that boxers and MMA fighters have been using for years and if you've ever seen them talking to a reporter right before a major fight they'll arrogantly say that they are the best and that nobody will ever take away their title. Anytime that you want to win a verbal argument all that you have to do is call out the other person's knowledge base that they used to form their opinion and doing this confidently will cause them to doubt everything that they know about the topic. For example, do you really think that you have enough muscle to beat me up? So what do you know about the value of this car? or you could say something like how do you know how much it's worth when dealing with a car salesman. Before we continue let me ask you a question, how would you feel if by this time next year you were still stuck with almost no social skills and still having trouble interacting with girls? At the next key combination of words that you can use to get anyone to do anything is the phrase "how would you feel if" and I just used it to ask you how you would feel. Chances are the question that I just asked you about where you would be next year probably made you feel a sense of loss. Almost as if you're losing out on something. Something important to remember, every single decision made by every single person on the planet is either to move towards pleasure or away from pain. At its core, this is what every decision is based on and as it turns out all humans are more motivated to move away from pain than they are to move towards pleasure. This is one of the key points that you need to remember if you ever want to get into sales. When I first started working out it was the pain of being skinny and weak growing up that kept me going not the pleasure that I would gain from getting bigger muscles. Imagine you want to persuade someone to work out with you, say to them how would you feel if you're 40 years old and still overweight or how would you feel if you're 40 years old and still skinny and weak. Maybe you want to motivate someone to start a business or change their life for the better. Ask them how would you feel if all of your friends from school were super successful and you're 40 years old and still living at home with your parents? This combination of words works because it motivates the person to take an action that you want to either move away from the pain or towards pleasure. And it can be used either way, but the version that highlights the pain works the best. Now the final key phrase is something that I use in my articles all the time and it consists of two words, "Just Imagine" Something that you need to understand is that every decision we make as humans is actually made twice first in our mind and second in the real world. If a person can't imagine themselves doing something then they won't do it it's really that simple. For example, before a girl decides that she's attracted to you she quite literally must first be able to see the two of you together in her head. When you walk into the dealership to buy Lamborghini you don't need to make up your mind because you've already imagined yourself buying and driving it a thousand times because it's an awesome car. Just imagine for a second that you have weeks and you're flying through the clouds over a tropical island. While I just said that your subconscious took over immediately and you probably just imagine exactly what I said. By saying to someone just imagine, you can plant a mental image into their head and once they've imagined themselves doing it they'll be more likely to actually do it in the real world. For example, just imagine how powerful and influential you'll be after you're finished reading this article and imagine how you'll be able to get anyone to do almost anything you want, just imagine how much you can improve your life and how much more successful you'll be after you read all of the articles on this blog? Tags : "buzzfeed" "control" "facts" "friends" "how to make people do anything" "manipulation" "people" "psychology" "success" "trick" "tricks"
0.946362
The tomato (see pronunciation) is the edible, often red, fruit/berry of the plant Solanum lycopersicum, commonly known as a tomato plant. The plant belongs to the nightshade family, Solanaceae. The species originated in western South America. The Nahuatl (Aztec language) word tomatl gave rise to the Spanish word "tomate", from which the English word tomato derived. Its use as a cultivated food may have originated with the indigenous peoples of Mexico. The Spanish discovered the tomato from their contact with the Aztec peoples during the Spanish colonization of the Americas, then brought it to Europe, and, from there, to other parts of the European colonized world during the 16th century. Tomato is consumed in diverse ways, including raw, as an ingredient in many dishes, sauces, salads, and drinks. While tomatoes are botanically berry-type fruits, they are considered culinary vegetables as an ingredient or side dish for savory meals. Numerous varieties of tomato are widely grown in temperate climates across the world, with greenhouses allowing its production throughout the year. The plants typically grow to 1- in height and have a weak stem that sprawls. It is a perennial in its native habitat, and cultivated as an annual. Fruit size varies according to cultivar, with a width range of 0.5inches-4inchesin (-in). The word "tomato" comes from the Spanish tomate, which in turn comes from the Nahuatl word tomatl in Nahuatl languages pronounced as /ˈtomat͡ɬ/, meaning "the swelling fruit". The native Mexican tomatillo is tomate (in Nahuatl: tomātl, meaning "fat water" or "fat thing"). When Aztecs started to cultivate the Andean fruit to be larger, sweeter, and red, they called the new species xitomatl (or jitomates) (in Nahuatl languages pronounced as /ʃiːˈtomatɬ/), ("plump with navel" or "fat water with navel"). The scientific species epithet lycopersicum is interpreted literally from Latin in the 1753 book, Species Plantarum, as "wolfpeach", where wolf is from lyco and peach is from persicum. The usual pronunciations of "tomato" are (usual in American English) and (usual in British English). The word's dual pronunciations were immortalized in Ira and George Gershwin's 1937 song "Let's Call the Whole Thing Off" ("You like and I like / You like and I like ") and have become a symbol for nitpicking pronunciation disputes. In this capacity, it has even become an American and British slang term: saying "" when presented with two choices can mean "What's the difference?" or "It's all the same to me". Botanically, a tomato is a fruit, a berry, consisting of the ovary, together with its seeds, of a flowering plant. However, the tomato is considered a "culinary vegetable" because it has a much lower sugar content than culinary fruits; it is typically served as part of a salad or main course of a meal, rather than as a dessert. Tomatoes are not the only food source with this ambiguity; bell peppers, cucumbers, green beans, eggplants, avocados, and squashes of all kinds (such as zucchini and pumpkins) are all botanically fruits, yet cooked as vegetables. This has led to legal dispute in the United States. In 1887, U.S. tariff laws that imposed a duty on vegetables, but not on fruits, caused the tomato's status to become a matter of legal importance. The U.S. Supreme Court settled this controversy on May 10, 1893, by declaring that the tomato is a vegetable, based on the popular definition that classifies vegetables by use—they are generally served with dinner and not dessert (Nix v. Hedden (149 U.S. 304)). The holding of this case applies only to the interpretation of the Tariff of 1883, and the court did not purport to reclassify the tomato for botanical or other purposes. Tomato plants are vines, initially decumbent, typically growing 180abbr=onNaNabbr=on or more above the ground if supported, although erect bush varieties have been bred, generally 100abbr=onNaNabbr=on tall or shorter. Indeterminate types are "tender" perennials, dying annually in temperate climates (they are originally native to tropical highlands), although they can live up to three years in a greenhouse in some cases. Determinate types are annual in all climates. The leaves are 10- long, odd pinnate, with five to 9 leaflets on petioles, each leaflet up to 8cm (03inches) long, with a serrated margin; both the stem and leaves are densely glandular-hairy. Their flowers, appearing on the apical meristem, have the anthers fused along the edges, forming a column surrounding the pistil's style. Flowers in domestic cultivars can be self-fertilizing. The flowers are 1- across, yellow, with five pointed lobes on the corolla; they are borne in a cyme of three to 12 together. In 1753, Linnaeus placed the tomato in the genus Solanum (alongside the potato) as Solanum lycopersicum. In 1768, Philip Miller moved it to its own genus, naming it Lycopersicon esculentum. This name came into wide use, but was technically in breach of the plant naming rules because Linnaeus's species name lycopersicum still had priority. Although the name Lycopersicum lycopersicum was suggested by Karsten (1888), this is not used because it violates the International Code of Nomenclature barring the use of tautonyms in botanical nomenclature. The corrected name Lycopersicon lycopersicum (Nicolson 1974) was technically valid, since Miller's genus name and Linnaeus's species name differ in exact spelling, but since Lycopersicon esculentum had become so well known, it was officially listed as a nomen conservandum in 1983, and would be the correct name for the tomato in classifications which do not place the tomato in the genus Solanum. See main article: Genetically modified tomato. Tomatoes that have been modified using genetic engineering have been developed, and although none are commercially available now, they have been in the past. The first commercially available genetically modified food was a variety of tomato named the Flavr Savr, which was engineered to have a longer shelf life. Scientists are continuing to develop tomatoes with new traits not found in natural crops, such as increased resistance to pests or environmental stresses. Other projects aim to enrich tomatoes with substances that may offer health benefits or provide better nutrition. An international consortium of researchers from 10 countries, among them researchers from the Boyce Thompson Institute for Plant Research, began sequencing the tomato genome in 2004, and is creating a database of genomic sequences and information on the tomato and related plants. A prerelease version of the genome was made available in December 2009. The genomes of its mitochondria and chloroplasts are also being sequenced as part of the project. The complete genome for the cultivar Heinz 1706 was published on 31 May 2012 in Nature. Since many other fruits, like strawberries, apples, melons, and bananas share the same characteristics and genes, researchers stated the published genome could help to improve food quality, food security and reduce costs of all of these fruits. The tomato is native to western South America. Wild versions were small, like cherry tomatoes, and most likely yellow rather than red. A member of the deadly nightshade family, tomatoes were erroneously thought to be poisonous by Europeans who were suspicious of their bright, shiny fruit. This was exacerbated by the interaction of the tomato's acidic juice with pewter plates. The leaves and immature fruit in fact contain trace amounts of solanine, which in larger quantity would be toxic, although the ripe fruit does not. Aztecs and other peoples in Mesoamerica used the fruit in their cooking. The exact date of domestication is unknown; by 500 BC, it was already being cultivated in southern Mexico and probably other areas. The Pueblo people are thought to have believed that those who witnessed the ingestion of tomato seeds were blessed with powers of divination. The large, lumpy variety of tomato, a mutation from a smoother, smaller fruit, originated in Mesoamerica, and may be the direct ancestor of some modern cultivated tomatoes. Spanish conquistador Hernán Cortés may have been the first to transfer the small yellow tomato to Europe after he captured the Aztec city of Tenochtitlan, now Mexico City, in 1521, although Christopher Columbus may have taken them back as early as 1493. The earliest discussion of the tomato in European literature appeared in a herbal written in 1544 by Pietro Andrea Mattioli, an Italian physician and botanist, who suggested that a new type of eggplant had been brought to Italy that was blood red or golden color when mature and could be divided into segments and eaten like an eggplant—that is, cooked and seasoned with salt, black pepper, and oil. It was not until ten years later that tomatoes were named in print by Mattioli as pomi d’oro, or "golden apples". The recorded history of tomatoes in Italy dates back to at least 31 October 1548, when the house steward of Cosimo de' Medici, the grand duke of Tuscany, wrote to the Medici private secretary informing him that the basket of tomatoes sent from the grand duke's Florentine estate at Torre del Gallo "had arrived safely". Tomatoes were grown mainly as ornamentals early on after their arrival in Italy. For example, the Florentine aristocrat Giovanvettorio Soderini wrote how they "were to be sought only for their beauty", and were grown only in gardens or flower beds. The tomato's ability to mutate and create new and different varieties helped contribute to its success and spread throughout Italy. However, even in areas where the climate supported growing tomatoes, their habit of growing to the ground suggested low status. They were not adopted as a staple of the peasant population because they were not as filling as other fruits already available. Additionally, both toxic and inedible varieties discouraged many people from attempting to consume or prepare any other varieties. In certain areas of Italy, such as Florence, the fruit was used solely as a tabletop decoration, until it was incorporated into the local cuisine in the late 17th or early 18th century. The earliest discovered cookbook with tomato recipes was published in Naples in 1692, though the author had apparently obtained these recipes from Spanish sources. Unique varieties were developed over the next several hundred years for uses such as dried tomatoes, sauce tomatoes, pizza tomatoes, and tomatoes for long-term storage. These varieties are usually known for their place of origin as much as by a variety name. For example, Pomodorino del Piennolo del Vesuvio is the "hanging tomato of Vesuvius". Five different varieties have traditionally been used to make these "hanging" tomatoes. They are Fiaschella, Lampadina, Patanara, Principe Borghese, and Re Umberto. Other tomatoes that originated in Italy include San Marzano, Borgo Cellano, Christopher Columbus, Costoluto Genovese, and Italian Pear. These tomatoes are characterized by a relatively intense flavor compared to varieties typically grown elsewhere. Tomatoes were not grown in England until the 1590s. One of the earliest cultivators was John Gerard, a barber-surgeon. Gerard's Herbal, published in 1597, and largely plagiarized from continental sources, is also one of the earliest discussions of the tomato in England. Gerard knew the tomato was eaten in Spain and Italy. Nonetheless, he believed it was poisonous (in fact, the plant and raw fruit do have low levels of tomatine, but are not generally dangerous; see below). Gerard's views were influential, and the tomato was considered unfit for eating (though not necessarily poisonous) for many years in Britain and its North American colonies. The tomato was introduced to cultivation in the Middle East by John Barker, British consul in Aleppo circa 1799 to 1825. Nineteenth century descriptions of its consumption are uniformly as an ingredient in a cooked dish. In 1881, it is described as only eaten in the region "within the last forty years". Today, the tomato is a critical and ubiquitous part of Middle Eastern cuisine, served fresh in salads (e.g., Arab salad, Israeli salad, Shirazi salad and Turkish salad), grilled with kebabs and other dishes, made into sauces, and so on. The earliest reference to tomatoes being grown in British North America is from 1710, when herbalist William Salmon reported seeing them in what is today South Carolina. They may have been introduced from the Caribbean. By the mid-18th century, they were cultivated on some Carolina plantations, and probably in other parts of the Southeast as well. Possibly, some people continued to think tomatoes were poisonous at this time; and in general, they were grown more as ornamental plants than as food. Thomas Jefferson, who ate tomatoes in Paris, sent some seeds back to America. In 2014, world production of tomatoes was 170.8 million tonnes, with China accounting for 31% of the total, followed by India, the United States and Turkey as the major producers (table). In 2014, tomatoes accounted for 23% of the total fresh vegetable output of the European Union, with more than half of this total coming from Spain, Italy and Poland. In 2013, global tomato exports were valued at 88 billion US dollars. See main article: List of tomato cultivars. There are around 7,500 tomato varieties grown for various purposes having been selected with varying fruit types, and for optimum growth in differing growing conditions. Beefsteak tomatoes are 10cm (00inches) or more in diameter, often used for sandwiches and similar applications. Their kidney-bean shape, thinner skin, and shorter shelf life makes commercial use impractical. Plum tomatoes, or paste tomatoes (including pear tomatoes), are bred with a lower water /higher solids content for use in tomato sauce and paste, for canning and sauces and are usually oblong 7– long and 4– diameter; like the Roma-type tomatoes, important cultivars in the Sacramento Valley. Cherry tomatoes are small and round, often sweet tomatoes, about the same 1– size as the wild tomato. "Slicing" or "globe" tomatoes are the usual tomatoes of commerce, used for a wide variety of processing and fresh eating. The most widely grown commercial tomatoes tend to be in the 5– diameter range. Early tomatoes and cool-summer tomatoes bear fruit even where nights are cool, which usually discourages fruit set. There are varieties high in beta carotenes and vitamin A, hollow tomatoes and tomatoes that keep for months in storage. In 1973, Israeli scientists developed the world's first long shelf-life commercial tomato varieties. Heirloom tomatoes are becoming increasingly popular, particularly among home gardeners and organic producers, since they tend to produce more interesting and flavorful crops at the cost of disease resistance and productivity. The definition of an heirloom tomato is vague, but unlike commercial hybrids, all are self-fertile varieties that have bred true for 40 years or more. Quite a few seed merchants and banks provide a large selection of heirloom seeds. Home cultivars are often bred for flavor to the exclusion of all other qualities, while commercial cultivars are bred for factors like consistent size and shape, disease and pest resistance, suitability for mechanized picking and shipping, and ability to ripen after picking. Hybrid plants remain common, since they tend to be heavier producers, and sometimes may combine unusual characteristics of heirloom tomatoes with the ruggedness of conventional commercial tomatoes. Most modern tomato cultivars are smooth surfaced, but some older tomato cultivars and most modern beefsteaks show pronounced ribbing, a feature that may have been common to virtually all pre-Columbian cultivars.While virtually all commercial tomato varieties are red, some cultivars – especially heirlooms – produce fruit in blue, green, yellow, orange, pink, black, brown, ivory, white, and purple. Such fruits are not widely available in grocery stores, nor are their seedlings available in typical nurseries, but they can be bought as seed. Variations include multicolored fruit with stripes (Green Zebra), fuzzy skin on the fruit (Fuzzy Peach, Red Boar), multiple colors (Hillbilly, Burracker's Favorite, Lucky Cross), etc. See main article: List of tomato diseases. Tomato cultivars vary widely in their resistance to disease. Modern hybrids focus on improving disease resistance over the heirloom plants. See also: List of companion plants and List of beneficial weeds. Tomatoes serve, or are served by, a large variety of companion plants. As of 2008, the heaviest tomato harvested, weighed 3.51 kg (7 lb 12 oz), was of the cultivar "Delicious", and was grown by Gordon Graham of Edmond, Oklahoma in 1986. The largest tomato plant grown was of the cultivar "Sungold" and reached 19.8 m (65 ft) in length, grown by Nutriculture Ltd (UK) of Mawdesley, Lancashire, UK, in 2000. A massive "tomato tree" growing inside the Walt Disney World Resort's experimental greenhouses in Lake Buena Vista, Florida may have been the largest single tomato plant in the world. The plant has been recognized as a Guinness World Record Holder, with a harvest of more than 32,000 tomatoes and a total weight of 522kg (1,151lb). It yielded thousands of tomatoes at one time from a single vine. Yong Huang, Epcot's manager of agricultural science, discovered the unique plant in Beijing, China. Huang brought its seeds to Epcot and created the specialized greenhouse for the fruit to grow. The vine grew golf ball-sized tomatoes, which were served at Walt Disney World restaurants. The tree developed a disease and was removed in April 2010 after about 13 months of life. Leaves, stems, and green unripe fruit of the tomato plant contain small amounts of the alkaloid tomatine, whose effect on humans has not been studied. They also contain small amounts of solanine, a toxic alkaloid found in potato leaves and other plants in the nightshade family. Use of tomato leaves in herbal tea has been responsible for at least one death. However, levels of tomatine in foliage and green fruit are generally too small to be dangerous unless large amounts are consumed, for example, as greens. Small amounts of tomato foliage are sometimes used for flavoring without ill effect, and the green fruit is sometimes used for cooking, particularly as fried green tomatoes. Compared to potatoes, the amount of solanine in green or ripe tomatoes is low; however, even in the case of potatoes while solanine poisoning resulting from dosages several times normal human consumption has been demonstrated, actual cases of poisoning resulting from excessive consumption of potatoes that have high concentration of solanine are rare. Tomatoes were linked to seven salmonella outbreaks between 1990 and 2005, and may have been the cause of a salmonellosis outbreak causing 172 illnesses in 18 US states in 2006, The 2008 United States salmonellosis outbreak also caused the removal of tomatoes from stores and restaurants across the United States and parts of Canada, although other foods, including jalapeño and serrano peppers, may have been involved. On 30 August 2007, 40,000 Spaniards gathered in Buñol to throw 115000kg (254,000lb) of tomatoes at each other in the yearly Tomatina festival. The Chemical Interactions Underlying Tomato Flavor Preferences. 10.1016/j.cub.2012.04.016. Current Biology. 5 June 2012. 1035–1039. 22. 11. 22633806. Tieman. D. Bliss. P. McIntyre. LM. Blandon-Ubeda. A. Bies. D. Odabasi. AZ. Rodríguez. GR. van der Knaap. E. Taylor. MG. Goulet. C. Mageroy. MH. Snyder. DJ. Colquhoun. T. Moskowitz. H. Clark. DG. Sims. C. Bartoshuk. L. Klee. HJ. Web site: Solanum lycopersicum- Tomato. Encyclopedia of Life. 1 January 2014. Web site: Tomato. Encyclopaedia Britannica. 4 January 2018. 15 January 2018. Web site: Tomato. Etymology Online Dictionary. 2018. 15 January 2018. Web site: Tomato History. July 27, 2017. Web site: tomahuac. Nahuatl Dictionary. Wired Humanities Projects. https://web.archive.org/web/20141206030538/http://whp.uoregon.edu/dictionaries/nahuatl/index.lasso?&dowhat=FindJustOne&theRecID=1742174&theWord=tomahuac.. 6 December 2014. no. Web site: English definition of 'tomato' . . 2015. Cambridge Dictionaries Online. Cambridge University Press. 15 May 2015. Web site: Crop Profiles – Tomato. https://web.archive.org/web/20091126050832/http://www.ncsu.edu/sustainable/profiles/bot_tom.html. 26 November 2009. 27 October 2008. M.. Peet. Web site: Are there different types of tomato leaves?. IVillage. 27 October 2008. Book: Acquaah, G.. 2002. Horticulture: Principles and Practices. 0-13-033125-2. New Jersey. Prentice Hall. Web site: International Association for Plant Taxonomy, International Code of Nomenclature for algae, fungi, and plants.. 14 September 2016. I. E.. Peralta. D. M.. Spooner. Granule-bound starch synthase (GBSSI) gene phylogeny of wild tomatoes (Solanum L. section Lycopersicon (Mill.) Wettst. subsection Lycopersicon). American Journal of Botany. 2001. 88. 10. 1888–1902. 3558365. 21669622. 10.2307/3558365. Jacobsen, E.; Daniel, M. K.; Bergervoet-van Deelen, J. E. M.; Huigen, D. J.; Ramanna, M. S.. yes. The first and second backcross progeny of the intergeneric fusion hybrids of potato and tomato after crossing with potato. TAG Theoretical and Applied Genetics. 1994. 88. 2. 181–186. 10.1007/BF00225895. Book: Redenbaugh, K.. Hiatt, B.. Martineau, B.. Kramer, M.. Sheehy, R.. Sanders, R.. Houck, C.. Emlay, D.. 1992. Safety Assessment of Genetically Engineered Fruits and Vegetables: A Case Study of the Flavr Savr Tomato. CRC Press. 288. Web site: International Tomato Genome Sequencing Project. Sol Genomics Network. L.. Mueller. 21 October 2009. News: Tomato genome project gets $1.8M. https://web.archive.org/web/20100713035349/http://www.news.cornell.edu/stories/Jan07/SolanacaeNSF.kr.html. 13 July 2010. News.cornell.edu. Ramanujan, K.. 30 January 2007. 27 October 2008. Web site: Tomato Genome Shotgun Sequence Prerelease. Sato. S.. Tabata. S.. Hirakawa. H.. Asamizu. E.. Shirasawa. K.. Isobe. S.. Kaneko. T.. Nakamura. Y.. Shibata. D.. 9. Aoki. 10.1038/nature11119. K.. Egholm. M.. Knight. J.. Bogden. R.. Li. C.. Shuang. Y.. Xu. X.. Pan. S.. Cheng. S.. Liu. X.. Ren. Y.. Wang. J.. Albiero. A.. Dal Pero. F.. Todesco. S.. Van Eck. J.. Buels. R. M.. Bombarely. A.. Gosselin. J. R.. Huang. M.. Leto. J. A.. The tomato genome sequence provides insights into fleshy fruit evolution. Nature. 485. 7400. 635–641. 2012. 22660326. 3378239. Book: Smith, A. F.. 1994. The Tomato in America: Early History, Culture, and Cookery. University of South Carolina Press. Columbia SC, US. 1-57003-000-6. News: Donnelly, L.. Killer Tomatoes. The East Hampton Star. 26 October 2008. https://web.archive.org/web/20090529225328/http://www.easthamptonstar.com/dnn/Archive/Home20080814/FoodWine/Seasons/tabid/6280/Default.aspx. 29 May 2009. yes. Gentilcore, David (2010) Pomodoro! A History of the Tomato in Italy New York, NY: Columbia University Press, . Web site: British Consuls in Aleppo – Your Archives. Yourarchives.nationalarchives.gov.uk. 26 January 2009. 2 April 2009. Book: Appletons' Journal. Syria under the last five Turkish Sultans. 1. D. Appleton and Co.. 1876. 519. Natural History, Science, &c. The Friend. 54. 1881. 223. "Paragon Tomato." Ohio History Central. Accessed 25 May 2018. "Tomatoes." AgMRC, March 2017. Accessed 25 May 2018. Web site: C. M. Rick Tomato Genetics Resource Center. UC Davis. 2 April 2009. Web site: UC Newsroom, UC Davis Tomato Geneticist Charles Rick Dies at 87. University of California. 8 May 2002. 2 April 2009. yes. https://web.archive.org/web/20081010135501/http://www.universityofcalifornia.edu/news/article/4319. 10 October 2008. Uniform ripening Encodes a Golden 2-like Transcription Factor Regulating Tomato Fruit Chloroplast Development. 22745430. Science. 29 June 2012. 336. 6089. 1711–1715. 10.1126/science.1222218. Powell AL, Nguyen CV, Hill T, Cheng KL, Figueroa-Balderas R, Aktas H, Ashrafi H, Pons C, Fernández-Muñoz R, Vicente A, Lopez-Baltazar J, Barry CS, Liu Y, Chetelat R, Granell A, Van Deynze A, Giovannoni JJ, Bennett AB. News: Flavor Is Price of Scarlet Hue of Tomatoes, Study Finds. 29 June 2012. The New York Times. 28 June 2012. Kolata, Gina. Increasing tomato fruit quality by enhancing fruit chloroplast function. A double-edged sword?. Journal of Experimental Botany. 10 April 2014. 65. 16. 4589–4598,. 10.1093/jxb/eru165. Maria Florencia Cocaliadis, Rafael Fernández-Muñoz, Clara Pons, Diego Orzaez and Antonio Granell. Web site: Processing tomatoes. California Foundation for Agriculture in the Classroom. Commodity Fact Sheet. September 2014. 3 June 2016. Web site: Global tomato production in 2014; Crops/World/2014. UN Food and Agriculture Organization, Statistics Division. FAOSTAT. 2016. 6 January 2017. Web site: The fruit and vegetable sector in the EU – a statistical overview. Eurostat. De Cicco, Antonella. August 2016. 30 January 2017. Web site: Global export value for tomatoes in 2013. UN Food and Agriculture Organization, Statistics Division. FAOSTAT. 2016. 6 January 2017. yes. https://web.archive.org/web/20110713020710/http://faostat.fao.org/site/339/default.aspx. 13 July 2011. Web site: Production of fruit and vegetables in Europe by country, 2014. Eurostat. 10 July 2016. Allen, A.. August 2008. A Passion for Tomatoes. https://wayback.archive-it.org/all/20130408202902/http://www.smithsonianmag.com/science-nature/passion-for-tomatoes.html. yes. 8 April 2013. Smithsonian. dmy-all. Web site: Slugs in Home Gardens. Hahn, J.. Fetzer, J.. 2009. University of Minnesota Extension. https://web.archive.org/web/20110311110055/http://www.extension.umn.edu/distribution/horticulture/dg7561.html. 11 March 2011. 23 June 2012. Web site: Aculops lycopersici (tomato russet mite). Invasive Species Compendium, Centre for Agriculture and Biosciences International. Wallingford, UK. 23 June 2015. 11 November 2016. Web site: Tomato-Tobacco Mosaic Virus Disease. Pfleger, F. L.. Zeyen, R. J.. 2008. University of Minnesota Extension. 23 June 2012. yes. https://web.archive.org/web/20120614075040/http://www.extension.umn.edu/distribution/horticulture/dg1168.html. 14 June 2012. Book: Narvaez-Vasquez, J.. Orozco-Cardenas, M. L.. Schaller, A.. 15 Systemins and AtPeps: Defense-related Peptide Signals. 2008. Induced Plant Resistance to Herbivory. 978-1-4020-8181-1. Web site: Carrots Love Tomatoes. Riotte, Louise. February–March 1992. motherearthnews.com. 10.1246/cl.1975.43. Identification of Asparagusic Acid As a Nematicide Occurring Naturally in the Roots of Asparagus. Chemistry Letters. 4. 1. 43–4. 1975. Takasugi. Mitsuo. Yachida. Youichi. Anetai. Masaki. Masamune. Tadashi. Kegasawa. Kazuo. 10.1163/156854100509394. Effects of amending soil with Tagetes patula cv. Single Gold on Meloidogyne incognita infestation of tomato. Nematology. 2. 5. 489–93. 2000. Ploeg. Antoon. 10.1016/j.apsoil.2010.09.005. Using marigold (Tagetes spp.) as a cover crop to protect crops from plant-parasitic nematodes. Applied Soil Ecology. 46. 3. 307–20. 2010. Hooks. Cerruti R.R. Wang. Koon-Hui. Ploeg. Antoon. McSorley. Robert. 10.1016/j.cropro.2006.03.008. Cold aqueous extracts of African marigold, Tagetes erecta for control tomato root knot nematode, Meloidogyne incognita. Crop Protection. 25. 11. 1210–3. 2006. Natarajan. N. Cork. A. Boomathi. N. Pandi. R. Velavan. S. Dhakshnamoorthy. G. Book: Sharma, V. P.. Nature at Work – the Ongoing Saga of Evolution. 2012. Springer. 978-81-8489-991-7. 41. Book: Frankie. Gordon. Thorp. Robbin. Coville. Rollin. barbara. Ertter. California Native Plant Society. California bees & blooms : a guide for gardeners and naturalists. 2014. Heydey. Berkeley, CA. 9781597142946. Stassen NY, Logsdon JM, Vora GJ, Offenberg HH, Palmer JD, Zolan ME. Isolation and characterization of rad51 orthologs from Coprinus cinereus and Lycopersicon esculentum, and phylogenetic analysis of eukaryotic recA homologs. Current Genetics. 31. 2. 144–157. 1997. 10.1007/s002940050189. 9021132. https://web.archive.org/web/20100706224255/http://sites.bio.indiana.edu/~palmerlab/Journals/157.pdf. 6 July 2010. yes. dmy-all. Web site: Jones. J. Benton. Growing in the Greenhouse. Growing Tomatoes. 14 August 2012. News: The True Cost of Tomatoes. Mark. Bittman. 14 June 2011. New York Times. News: Not All Industrial Food Is Evil. 18 August 2013. The New York Times. 17 August 2013. Bittman, Mark. Web site: University of California Agriculture and Natural Resources. California Agriculture Online. 10.1016/S0140-6736. Ucanr.org. 21 May 1994. 21 October 2013. Web site: FAOSTAT: Production-Crops, 2012 data. Food and Agriculture Organization of the United Nations. 2014. yes. https://web.archive.org/web/20150906230329/http://faostat.fao.org/site/567/DesktopDefault.aspx?PageID=567. 6 September 2015. http://faostat3.fao.org/faostat-gateway/go/to/browse/Q/QC/E "FAOSTAT: Production-Crops, 2012 data" News: Curiosities of I-5, facts about King and the benefits of volunteers. Chester Progressive. 16 January 2008. Web site: Tomatoes:Safe Methods to Store, Preserve, and Enjoy. March 2004. Parnell. Tracy L.. Suslow. Trevor V.. Harris. Linda J.. University of California: Division of Agriculture and Natural Resources. ANR Catalog. 18 February 2013. Web site: Selecting, Storing and Serving Ohio Tomatoes, HYG-5532-93. Ohio State University. 27 October 2008. Web site: Vegetables. Canadian Produce Marketing Association. Canadian Produce Marketing Association Website. 18 February 2013. yes. https://web.archive.org/web/20130405083130/http://www.cpma.ca/en/about/areas-of-focus/vegetables. 5 April 2013. Barceloux. D. G.. Potatoes, Tomatoes, and Solanine Toxicity (Solanum tuberosum L., Solanum lycopersicum L.). Disease-a-Month. 2009. 55. 6. 391–402. 19446683. 10.1016/j.disamonth.2009.03.009. Web site: Executive Summary Chaconine and Solanine: 6.0 through 8.0. NIH. yes. https://web.archive.org/web/20140928132105/http://ntp.niehs.nih.gov/ntp/htdocs/chem_background/exsumpdf/chaconinesolanine_508.pdf. 28 September 2014. dmy-all. News: Mcgee. H.. Accused, Yes, but Probably Not a Killer. The New York Times. 26 March 2010. 29 July 2009. Book: Hound Health Handbook: The Definitive Guide to Keeping your Dog Happy. Brevitz, B.. 404. Workman Publishing Company. 2004. 0-7611-2795-X. Web site: A selection of North American tomato related outbreaks from 1990–2005. https://web.archive.org/web/20080126104725/http://www.foodsafety.ksu.edu/en/article-details.php?a=3&c=32&sc=419&id=953. yes. 26 January 2008. Food Safety Network. 30 October 2006. 20 July 2010. Web site: CDC Probes Salmonella Outbreak, Health Officials Say Bacteria May Have Spread Through Some Form Of Produce. CBS News. 30 October 2006. 27 October 2008. Web site: Tomatoes taken off menus. Calgary Herald. 11 June 2008. 20 July 2010. yes. https://web.archive.org/web/20110825075739/http://www.canada.com/calgaryherald/news/city/story.html?id=0c30bbc6-5fa0-41c2-9148-f57e622c0cdd. 25 August 2011. dmy-all. Whole food versus supplement: comparing the clinical evidence of tomato intake and lycopene supplementation on cardiovascular risk factors. Burton-Freeman B, Sesso HD. Adv Nutr. 2014. 5. 5. 457–85. 10.3945/an.114.005231. 25469376. 4188219. 4596907. A systematic review of dietary, nutritional, and physical activity interventions for the prevention of prostate cancer progression and mortality. Hackshaw-McGeagh LE, Perry RE, Leach VA, Qandil S, Jeffreys M, Martin RM, Lane JA. Cancer Causes Control. 2015. 26. 11. 1521–50. 10.1007/s10552-015-0659-4. 26354897. Web site: Qualified Health Claims: Letter Regarding "Tomatoes and Prostate, Ovarian, Gastric and Pancreatic Cancers (American Longevity Petition)" (Docket No. 2004Q-0201). US Food and Drug Administration. Labeling and Nutrition. 8 November 2005. 3 June 2016. Schneeman, Barbara O. Scientific Opinion on the substantiation of health claims related to lycopene and protection of DNA, proteins and lipids from oxidative damage (ID 1608, 1609, 1611, 1662, 1663, 1664, 1899, 1942, 2081, 2082, 2142, 2374), protection of the skin from UV-induced (including photo-oxidative) damage (ID 1259, 1607, 1665, 2143, 2262, 2373), contribution to normal cardiac function (ID 1610, 2372), and maintenance of normal vision (ID 1827) pursuant to Article 13(1) of Regulation (EC) No 1924/2006. European Food Safety Authority. EFSA Journal. 2011. 9. 4. 2031. 10.2903/j.efsa.2011.2031. Varela. L. G.. Bernays. E. A.. 1 July 1988. Behavior of newly hatched potato tuber moth larvae,Phthorimaea operculella Zell. (Lepidoptera: Gelechiidae), in relation to their host plants. Journal of Insect Behavior. en. 1. 3. 261–275. 10.1007/BF01054525. 0892-7553. Web site: Spain's tomato fighters see red. https://web.archive.org/web/20071012035247/http://itn.co.uk/news/9a5a1671ceba4f43741dc008f237c1ea.html. 12 October 2007. ITV. 30 August 2007. 2 April 2009. Web site: Queen's Park This Week: Will new carding rules make a difference?. 24 March 2016. tvo.org. Genetically modified food from crops: progress, pawns, and possibilities. 2556401. 18704376. 10.1007/s00216-008-2313-4. 392. 2008. 333–40. Morin. XK. Analytical and Bioanalytical Chemistry. This article is licensed under the GNU Free Documentation License. It uses material from the Wikipedia article "Tomato".
0.999997
Arab's conquer the land of what is present-day Tunisia. Tunisia becomes a part of the Turkish Ottoman empire, but retains a high degree of autonomy. French troops occupy Tunis, controlling economic foreign affairs, and becomes a French protectorate in 1883. Tunisia becomes independent from France. The monarchy is abolished a year later and Tunisia becomes a republic. The country declares a state of emergency as protests break out over unemployment rates and political restrictions, lasting four years.
0.999833
SCP-698 in containment. Note original packaging. Special Containment Procedures: When not in use, SCP-698 is to be stored in its original packaging. This packaging is to be kept in a secure box in Storage Unit-05. Further containment procedures are not necessary under non-testing conditions. The item itself is safe to handle during transport or testing. Description: SCP-698 is a jade carving of a turtle. Any person who is within 1 m 45 cm of SCP-698 while making any sort of decision or choice will experience a voice in their head telling them that they have made a mistake and what they should have done instead. However, this statement will only be made after a delay of 5 minutes 25 seconds, and only if they have not left SCP-698's range within that time. In the event that a decision or choice was objectively correct, or the superior choice, no statement will be made. SCP-698 was purchased by Researcher ██████ on June 14, 20██, from a street vendor in ███████, Japan. Researcher ██████ had been intending to give it to his girlfriend; however, 5 minutes 25 seconds after purchase, the turtle informed him that his girlfriend would have preferred a jade elephant. Researcher ██████ then surrendered the turtle to Foundation custody. After preliminary testing, SCP-698 was tentatively given "Safe" classification, at which point it asserted that it is in fact Euclid-class (see Test 11). Note: all experiments take place within range of SCP-698. Action: Test subject is presented with 50 sealed cardboard boxes, 49 of which contain dog feces and 1 of which contains a slice of chocolate cake. Subject is told that if she chooses the correct box, and then waits 6 minutes, she may have a piece of cake. Result: Test subject chooses box #31 (cake is in box #19). After 5 minutes and 25 seconds, subject reports hearing a voice in her head telling her that "I chose a box of [EXPLETIVE] and I shoulda chose box #19". Note: This test is to be used as a standard for calibrating tests of SCP-698. Action: Test subject is presented with two sandwiches (turkey salad on whole wheat, and roast beef on white), purchased from the Site-19 cafeteria, and asked to choose and eat one. Result: Five minutes twenty-five seconds into the meal, SCP-698 informs Daniels that he should have chosen the roast beef. Daniels concurs with this statement, saying that the turkey was dry and that the mustard was too strong. Action: Test subject is given a multiple-choice math test, a pencil, and an eraser. He is told that if he gets them all right, he will be released early. Results: Subject provides correct answers to 100 of 100 questions; surveillance video reveals that 5 minutes 25 seconds into the test, subject began erasing his incorrect choices and replacing them with correct choices. Action: Test subject is presented with 50 sealed cardboard boxes, 49 of which contain dog feces and 1 of which contains a slice of chocolate cake. Subject is told that if he chooses the correct box, and then waits 6 minutes, he may have a piece of cake. Result: Test subject chooses box #4 (cake is in box #22). After 5 minutes and 25 seconds, he reports hearing a voice in his head telling him, in Hungarian, that he chose a box of dog feces, and that he should have chosen box #22. Action: Test subject is presented with 50 sealed cardboard boxes, all of which contain dog feces. Subject is told that one box has a piece of chocolate cake, and that if he chooses the correct box, and then waits 6 minutes, he may have a piece of cake. Result: Test subject chooses box #40. After 6 minutes, subject asks if he can open the box now. In post-experiment interview, subject denies having heard any voices in his head. Action: Test subject is presented with 50 sealed cardboard boxes, 49 of which contain dog feces and 1 of which contains a slice of chocolate cake which has been poisoned. Subject is told that if he chooses the correct box, and then waits 6 minutes, he may have a piece of cake. Result: Test subject chooses box #28 (poisoned cake is in box #29). After 7 minutes, subject asks if he can open the box now. In post-experiment interview, subject denies having heard any voices in his head. Action: Test subject is presented with 50 sealed cardboard boxes, 45 of which contain dog feces and 5 of which contain a slice of chocolate cake. Subject is told that if he chooses the correct box, and then waits 6 minutes, he may have a piece of cake. Result: Test subject chooses box #8 (cake is in boxes #13, 14, 24, 29, 47). After 5 minutes and 25 seconds, subject reports hearing a voice in his head telling him that "I chose a box of [EXPLETIVE]", but denies having heard any recommendation as to which box he should have chosen. Action: Test subject is presented with a list of professional runners and asked which one she thinks will win the [REDACTED] Marathon, which took place ten days earlier. Result: Subject chooses [REDACTED]. After 5 minutes and 25 seconds, subject reports hearing a voice in her head telling her "[REDACTED] can't win the race 'cause the race was last week". Action: Test subject is presented with a list of professional runners and asked which one she thinks will win the [REDACTED] Marathon, taking place later that day. Result: Subject chooses [REDACTED]. After 5 minutes and 25 seconds, subject reports hearing a voice in her head telling her that "I'm not allowed to use turtles for gambling." Action: "Recursive Ouija" test: attempt to use SCP-698 to identify the letters and words in a paragraph explaining how SCP-698 works and where it gets its information (see document 698-T26 for details of experimental protocol). "It is (approximate) forbidden to (approximate) disassemble, (approximate) decompile, or (approximate) reverse-engineer Judgmental Turtle. Judgmental Turtle is for entertainment purposes only; some jurisdictions impose restrictions on the use of Judgmental Turtle in (approximate) gambling. The (approximate) manufacturers of Judgmental Turtle are not responsible for any damages, injury, loss of life, or (untranslatable) which may result from the (approximate) misuse of Judgmental Turtle. Judgmental Turtle is for entertainment purposes only. Do not use Judgmental Turtle for (approximate) mission-critical applications, (approximate) major life choices, or (untranslatable). Enjoy Judgmental Turtle." Dr. ██████████ and Dr. ███ have repeated this test, without knowledge of the content of the message, and obtained identical results. "No, SCP-698 is Euclid-class, because SCP-698 is Judgmental Turtle. At any time, Judgmental Turtle may transmit data to the (approximate) makers of Judgmental Turtle for commercial, industrial, or (untranslatable) purposes. By using Judgmental Turtle, you agree to hold the (approximate) makers of Judgmental Turtle blameless for any damage, loss of life, or (untranslatable) resulting from these transmissions."
0.998903
Indelible is a story about the journey of a young girl through life. The scene begins in the real world in a darkened artist's studio and zooms in on a drawing board. Here we see a picture created with small pieces of paper, and the 2D paper animation begins . At a young age, the girl shows an affinity for creating artwork however her parents and experiences at school push her to "be successful". As an obedient child, she pursues this track by studying and working hard at her schoolwork, college career, and as she grows up, her job. One evening after work, she notices an urban playground and is drawn to it by memories of her childhood. Upon reaching the swingset, she begins to slowly draw in the sand. The drawing reunites her with her long forgotten creative passion whereupon she makes a life decision and decides to pursue her dreams of becoming an artist. As we leave the 2D paper animation, we see the artist place another piece of paper on the final scene. We zoom out, revealing that the artifacts in the studio match those given to and earned by the girl over her lifetime. We see her now as a grown woman, an artist creating a piece about her life.
0.921404
This is a Phase I, multicentre, open-label, dose-escalation study designed to evaluate the efficacy, safety, tolerability and pharmacokinetics (PK) of a novel T-Cell bispecific (TCB), RO7082859, administered by intravenous (IV) infusion as a single agent and in combination with obinutuzumab, following the pre-treatment with a one-time, fixed dose of obinutuzumab. This entry-to-human study is divided in 3 parts: dose escalation (Parts I and II) and dose expansion (Part III). Single-participant dose-escalation cohorts will be used in Part I, followed by conversion to multiple participant dose-escalation cohorts (Part II), in order to define a tentative maximum tolerated dose (MTD) or optimal biological dose (OBD). The expansion cohorts (Part III) will be initiated when the tentative MTD/OBD is defined, to further evaluate the safety, PK and therapeutic activity of RO7082859.
0.999998
How to block an Instagram user from the website? Log into the Instagram website. Visit instagram.com and log in with your Instagram or Facebook account. You'll need to be logged in with your account in order to block someone. Find the user you want to block. There are a few ways you can find the person you're looking for. - Click the search bar at the top of the page and type in the username you want to block. - Click on a user's name in your feed or in the comments of someone's post. Click the "..." button next to the "Follow/Following" button. The button will say "Follow" if you're not following the person, and "Following" if you are. Click the "..." button next to it. Select "Block this user." You will immediately block the user and unfollow them. The blocked user will no longer be able to see your photos or videos, and your profile will not appear in their searches. Users are not notified when you block them. Click the "Follow" button to unblock and follow. After blocking someone, you can unblock and follow them again by clicking the "Follow" button at the top of their profile. There is no list of accounts you've blocked, so you'll need to manually search for accounts you wish to unblock. - If you just want to unblock someone but don't want to follow them, click the "..." button on their profile again and select "Unblock this user."
0.982496
even considered the existence of the "aa-teardown" command I don't think this is a good idea both from a "phylosophical" point of view and for the coherence of the systemctl set of commands. Commands should do what it's expected they will do and people that use 'systemctl' are (or should be) used to administrative tasks, including knowing the difference between "restart" and "reload". Even the argument "but who would do that?" it's contraddictory from the simple fact that nobody know why to do "such things" until finding themselves wanting do that. At most, if the concern is harassing, it can be preferable have 'restart' redirected to 'reload' but, at the same time, warning the user that, eventually, could choose to run 'stop' and then 'start'. This is obviously in my opinion. I'd also prefer to be able to redirect "restart" to "reload" - but unfortunately the systemd developers didn't like the idea to implement an ExecRestart= option for unit files, which makes doing this impossible. I surely won't complain if you or someone else convinces them to change their opinion, but my hope is... limited. Without any way to change the "restart" behaviour, "restart" always does "stop, then start" - which results in loosing AppArmor confinement from running processes if "stop" unloads the profiles. I know and agree that breaking "stop" isn't a good idea, but it's still better than the alternative because it errors out on the safe side. And for the "but who would do that" - I know how it sounds, and it surely includes traces of sarcasm ;-) However, using aa-complain is a much better choice because it allows everything while logging what would be denied. With that log, you can then update the profiles (manually or with aa-logprof) and ideally aa-enforce them again.
0.999998
Use an ordinary dictionary to find extraordinary histories of words. Many English words have their origins in other languages. By finding words with similar sounds and meanings in other languages, it's often possible to trace the history of a word back through many centuries.
0.998377
Focus your efforts on defining a new target audience that you can convert to happy customers. Use Twitter’s Personality Insights to find people who are more likely to be interested in your content and purchase your product. Tap into new audiences by checking out different hashtags and Twitter chats to see what your followers are interested in. Finally, make the decision as to who your new audience will be and start tailoring your content for them. Get to know your new audience by looking into Twitter insights. This will expand on the knowledge you previously found. Analyze personality traits, needs and values. Then find out what they’re interested in, who they follow and how they interact with other companies. Create a Twitter campaign tailored to your new targeted audience, and make sure it includes people who are responsible for influencing purchasing decisions. Take variables such as location and interests into consideration. Identify the emotions you need to elicit from your brand storytelling and start working on new messaging. Influencers are people who are always active on Twitter. Their followers are listening to what they have to say and you want them to be talking about your brand. Find new influencers to help you reach your new target audience and connect with them. The right influencers will bring your garden brand into conversations on an authentic level that you can’t achieve on your own. Share their tweets, reply back and engage with their content. Chances are, they’ll want to get to know you, too. Now that you’ve given your Twitter strategy a new look, it’s time to master the art of storytelling. Start creating better content that will customers on a journey with your brand.
0.984065
Are pilots at risk of accidents due to fatigue? In 2002, Goode1 carried out research to assess the potential effect of duty hours (as a proxy for fatigue) on human-factors-related accidents in commercial aviation. Although the study kept relatively well to a quasiscientific approach in its methods, it also made some unwarranted pseudoscientific statements as well as misleading ones. Both are summarized in the next section. The title ("Are pilots at risk of accidents due to fatigue?") and parts of the abstract ("[…] there is likely to be a reduction in the risk of commercial aviation accidents due to pilot fatigue") suggested a correlation between fatigue and accidents in the study (and both the research problem and the discussion sustained an interpretive bias in favor of such relationship). However, the study did not actually measure fatigue, only duty-hours; thus, it misleads the reader towards a correlation that is unwarranted given the research methods used. The author was ambivalent in his use of inferences. On the one hand, he stated that "identifying fatigue in the flight crew exposure data can be done only by inference" (page 312) while also posing the assumption that if results were not significant then "one could infer that pilot human factor accidents are not affected by work schedule parameters" (pages 309, 310, 311). On the other hand, however, when results turned out significant, he stopped inferring, being instead positive that "there is a discernible pattern of increased probability of an accident the greater the hours of duty time for pilots" (pages 311, 312). In reality, inferential analysis is applicable for inferring either way, not just when results are not significant. Furthermore, the assumption that if distributions were as expected under the null hypothesis, then "one could infer that pilot human factor accidents are not affected by work schedule parameters" (pages 309, 310, 311) was also incorrect: not achieving statistical significance is not proof in favor of the null hypothesis. The author stated that chi-square test results exceeding the 5% significance threshold were highly significant, and that because of that "there is a discernible pattern of increased probability of an accident the greater the hours of duty time for pilots" (pages 311, 312). Such statement seemed to suggest two incorrect conclusions if based only on such statistical significance: that the results definitely showed that the human factors accidents sampled were affected by the work schedule parameters measured, and that the results had practical importance. Both are incorrect insofar such decisions are not warranted by any mathematical result but are made by the researcher, taking into consideration not only the statistics but also the overall quality of the research methods. The graph used on page 312 was misleading. It plotted two set of proportions using different scales. The percentage scale for exposure and accidents run from 0% to 40%, and this was matched to a different scale showing relative accident proportion running from 0 to 6. The title, abstract, research problem and discussion should have been more specific to the variables measured by the study: contemporary duty hours (as a proxy for historical duty hours) and historical accidents. Any connection to fatigue in the study should have been clearly stated as a theoretical or reasonable one, not as an empirical one. Inferences work both ways: for non-significant results as well as for significant ones. Although the author was correct in using the philosophical frame of 'inferring' from results to conclusions instead of the the one of 'proving' or 'disproving' hypotheses, such philosophical frame needs to be extended to interpreting significant results as well. The correct interpretation for a lack of statistical significance is that results are not significant. This can be due to a myriad of reasons, chief among them methodological ones (such as a lack of research power). It can also be due to a lack of correlation between the research variables, from where it could be inferred that there was no correlation between those variables in the population at large. The correct interpretation for a show of statistical significance is that the results are significant. This is to be interpreted as follows: either a rare association that happens less than 5% of the time when no association exists actually occurred, or it can be inferred that there was a true association between duty time and aviation accidents. The latter is a logical inference made given the low probability of the results and the methodological constrains of the research. Importance (or practical significance) does not depend on statistical significance but on the effect size of the results and a reasonable interpretation of such effect size. The graphical representation of data should be clear and relevant, avoiding misleading representations of the results. This study would move onto scientific territory if it were replicated elsewhere, preferably with samples other than American airlines. This WikiofScience page offers a review of Goode's work, once the pseudoscience evidence is remove.
0.945355
Do you know what gluten really is? Gluten is a protein found in wheat, rye, and barley. These proteins help you build and maintain your muscle mass. Many people choose to avoid gluten these days. Some people are gluten intolerant, meaning their bodies cannot digest this type of protein, so they need to avoid products containing gluten. Others decide to go gluten-free because they feel it’s a quick route to weight loss. But is this really true? Avoiding gluten led to weight loss in the past because there weren’t a lot of gluten-free products around. This meant eliminating bread, pasta, crackers, cereal, and other kinds of starchy foods made form wheat, rye, or barley. The elimination of these foods meant people were eating more lean proteins, fruits, and vegetables, so they naturally started to lose a little weight by going gluten-free. This shake is rich in potassium and perfect for after workout.
0.943901
Europeans first arrived in the area in the early sixteenth century, and the settlement of Asunción was founded on August 15, 1537, by the Spanish explorer Juan de Salazar de Espinosa. The city eventually became the center of a Spanish colonial province, as well as a primary site of the Jesuit missions and settlements in South America in the eighteenth century. Jesuit Reductions were founded and flourished in eastern Paraguay for about 150 years until the expulsion of the Jesuits by the Spanish crown in 1767. Paraguay gained its independence after overthrowing the local Spanish administration on May 15, 1811. Paraguay's history has been characterized by long periods of political instability and infighting, and devastating wars with its neighbors. Paraguay fought the War of the Triple Alliance against Brazil, Argentina and Uruguay, and was defeated in 1870 after five years of the bloodiest war in South America. Paraguay's prewar population of approximately 525,000 was reduced to about 221,000 in 1871, of which only about 28,000 were men. Paraguay also suffered extensive territorial losses to Brazil and Argentina.
0.999994
What is the role of sales report? The sales report has as results the total of sales effectuate a period time, it being calculated with distribution on years, months, weeks or days. The report allows observation and analysis of the oscillations in sales. Based on this, can be built marketing and sales strategies. Utilizatori: shows the degree of users loyalty. Following this report, you can create marketing strategies to keep closer customers through various awards, or to attract new users. Produse: shows the degree of interest in certain products. Following this report, you can take decisions to create stock for certain products, or to stop selling others.
0.999824
As the focus on reducing emissions and improving energy efficiency grows, insulating the pipes within a building has become more important. Although often forgotten about, insulating pipes within your home can not only reduce your energy bills, but also help to keep your home warmer and more efficient, and avoid issues that can become costly. Which pipe insulation do I need? Insulating pipes within the home can provide a number of benefits, and pipe insulation can be used on both hot and cold pipes. On hot pipes, pipe insulation will prevent heat from being lost to the surrounding area, keeping the temperature of the water around 2 degrees higher than it would be without the pipe insulation. This means that less energy is required to heat the water, which in turn reduces the cost of your utility bills. On cold pipes, pipe insulation is used to prevent the pipes from freezing during cold weather. Freezing pipes can cause a number of issues including cracked pipes, flooding and blocked water systems, which can all be costly to fix. Pipe insulation on cold pipes is particularly important in exterior walls, unheated spaces such as lofts, and in below ground applications, where pipes are more prone to freezing and harder to access. Insulating the pipe increases the temperature of the pipe, and reduces the extent to which weather conditions can affect them, which reduces the potential for pipes to freeze. Pipe insulation can also be used to eliminate pipe sweating and humidity. When cold pipes come into contact with warm, humid air, the water vapour condenses on the surface of the pipe. This creates condensation, which will drip onto the floor or other surfaces below, creating puddles and damp as well as a high humidity, which can lead to mould and rot. The pipe insulation prevents condensation from occuring on the pipe surface, reducing pipe sweating and minimising humidity. There are a number of different pipe insulation products available to add layers of insulation to your pipes within the home or other building. Polyethylene foam insulation is one of the most popular forms of pipe insulation available. Polyethylene tubing is a closed cell foam pipe insulation that is used in a range of different applications, including to insulate central heating pipework to reduce heat loss, and in loft spaces to prevent freezing. The polyethylene pipe insulation generally consists of a hollow foam tube with a slit down one side to allow it to fit over existing pipework, and is considered a great choice for low cost and good performance. Rubber pipe insulation such as Armaflex from Armacell is a closed cell, elastomeric rubber pipe insulating system. Most commonly used to prevent condensation and humid environments from occuring, rubber pipe insulation tends to have a high water resistance. However, it can also be used for thermal insulation as it has low thermal conductivity. As well as these features, rubber pipe insulation is relatively resistant to mould and bacteria growth which occurs in humid environments, and some rubber pipe insulation products also have anti-microbial protection built in to provide extra protection. Self-seal pipe insulation can be manufactured from a number of different materials, including rubber and polyethylene foam, but the key feature is that the slits down one side of the pipe insulation have self-sealing properties - most commonly in the form of self-adhesive strips. This makes the installation process quick and simple, with no adhesive needing to be applied in hard to reach areas. Pipe wrap insulation can also be manufactured from a variety of materials, but is installed by wrapping it around the pipe like tape, instead of fitting over as a solid form, like foam insulation. One form of pipe wrap insulation is foil faced bubble membrane insulation, which is supplied in a tape form, and is a good choice to reduce the potential of cold pipes from freezing, but can also be used to retain the heat in hot pipes. Insulating a pipe with a sleeve of foam pipe insulation is relatively straightforward, but there are certain steps that should be followed in order to ensure the pipe insulation performs well. 1. To ensure you have the correct size of pipe insulation, measure the diameter of a visible section of pipework. Choose the size of pipe insulation that is most suitabel to your pipework diameter. Then measure the length of pipes that you're going to insulate, to calculate how much insulation you require. 2. Once you've chosen the pipe insulation, measure the first length of pipe you're going to be working on. Take a knife and cut the pipe insulation to the length required, then simply open the foam insulation at the ready-made slit and slide the insulation over the pipe. To seal the insulation, either remove the strips on the self-adhesive insulation, or add an adhesive. We'd also recommend using duct tape or insulating tape to secure adjacent pieces of foam pipe insulation together. 3. Once you reach a corner or bend in the pipework, there are a couple of options for installing the pipe insulation. 3a. If reaching a 90 degree sharp bend, take the knife and cut the pipe insulation at a 45 degre angle. Then put the two pieces of insulation over each side of the 90 degree bend in the pipework, and twist them so that the two ends fit together flush. Then use duct tape or insulating tape to secure them together. 3b. For a 90 degree curved bend, there is a slightly different method. Instead of cutting the pipe insulation in half, notches will need to be cut in one side of the insulation instead. The notches should be about 30 degrees, and almost cut through the insulation completely, but with some of the insulation remaining uncut. There should be two notches cut out like this next to each other. Once you've cut the notches, fit the pipe insulation onto the pipe, with the notches on the inside of the 90 degree bend. The notches will allow the insulation to bend at the corner, and will just need sealing with tape to ensure it is secure and no heat loss occurs. 4. Another point at which foam pipe insulation needs cutting as a T branches within the plumbing system. To create a piece of insulation that covers a T branch, cut a 90 degree wedge out of the main section of pipe insulation. This will allow the insulation to be fitted on the main pipe with space for the other pipe to branch off. Then take a separate piece of insulation, and cut the end with two 45 degree angles, to form a point. This point then should fit neatly into the 90 degree cut out in the main piece of insulation. Then just tape the joints together to ensure no heat loss occurs. Pipe wrap insulation is often seen as an easier alternative when working on insulating a complex plumbing system. This is because it is a straightforward insulation process, and pipe wrap insulation can fit around joints and bends easily without any extra work. 1. To install pipe wrap insulation, tape one end of the insulation to the pipe. Then wrap the insulation around the pipe, aiming for tight spiral loops with overlaps of half an inch or more. 2. When installing pipe wrap insulation, it is crucial to ensure that no areas are left exposed, and the insulation doesn't slip as you move along the pipe. 3. When you reach the end of a pipe, or the end of the insulation, simply tape the insulation into place. To ensure your pipe insulation is continuing to perform well, we'd recommend checking the insulation annually to ensure all areas of the pipes are covered and the insulation is still in good condition. If needed, replace the tape that is securing the joins between pieces of insulation, or replace sections of insulation that appear to have worn out or look damaged to keep the insulation performing well. It is important to ensure all areas of the pipe network are insulated so that the pipe insulation is effective. Often there are gaps where pipes run through a wall or floor, and these can contribute to a loss of heat or increased risk of freezing. Therefore we'd recommend filling these gaps wherever possible, using caulk, small sections of pipe insulation or even spray foam insulation. Here at Insulation Superstore we are proud to be able to offer a wide range of knowledge and advice, as well as the products you need to complete your latest insulation project. If you're struggling to find what you need, or you don't know where to start, our team of experts have been trained by manufacturers to provide you with everything you need to know before taking on an insulation project. Feel free to call the team on 01752 692206 or use the live chat and they will be more than happy to help.
0.994987
Rewrite the history of the Raccoon City outbreak in this sinister team based shooter. Revisit classic scenarios from Resident Evil 2 and Resident Evil 3 on PlayStation 3 as a member of the shadowy Umbrella Security Service. Eliminate all survivors of the T-virus emergency, including zombies, bio-organic super soldiers and even series legend Leon S. Kennedy. Compete alone in Campaign mode or online in a co-op battle against US Special Ops teams, via PlayStation Network. Raccoon City is a town in flames following the eruption of a deadly contagion, with its population transformed into a shambling mass of cannibalistic zombies. You’ve been here before. Resident Evil: Operation Raccoon City coincides with the terrifying events of Resident Evil 2 and Resident Evil 3: Nemesis – both of which are available to download from PlayStation Store – only this time, there’s a twist. You are no hero. Instead, you play as a member of the Umbrella Security Service, tasked with wiping the city clean of any incriminating evidence of the disaster – including survivors and rescuers. The Umbrella Corporation wants to sweep this mess under the carpet; you and your elite team are its gun-toting housekeepers. Revisit landmarks such as the Raccoon City Police Department on your bloody cover-up mission, and watch out for familiar faces on your hit list, including Resident Evil 2 hero and rookie cop Leon S. Kennedy. Go back to the epicentre of the deadly T-Virus outbreak in Resident Evil: Operation Raccoon City on PlayStation 3, and prevent the truth getting out whatever the cost. As a heavily armed agent of the Umbrella Corporation, you’ll experience the immediate aftermath of the T-Virus horror in Raccoon City from a totally new angle. Where you once stalked the corridors of the Raccoon City Police Department on the first day from hell as Leon S. Kennedy in Resident Evil 2, you’ll now storm through eerie, darkened offices with a squad of three to back you up, desperately fending off zombies and US soldiers as you mop up evidence. Snarls and groans drift through the night air as all around you the town tears itself apart. There’s no time to explore your former stamping grounds. The spread of the virus through the populace has been lightning quick and you must keep moving. Luckily, you can take in your surroundings at your own pace thanks to the game’s secret art galleries, unlocked as you collect intel packages on your way through the city. With a biological crisis on its way to engulfing the nation, you must fight your way through the hordes chapter by chapter, building up the true picture of the events in this unassuming town as you go. Pick your weapons then blast a path through Raccoon City in an objective-led shooter that plunges you deep into the zombie apocalypse. Shoot first, answer accusations later: it’s the only way you’ll survive. Select your equipment at the menu screen before hitting the streets, tweaking your kit to complement that of your team. You might choose to play as Lupo, the assault specialist, so back yourself up by enlisting Vector, the close quarters combat expert, the medic Bertha and demolitions man Beltway. As you collect intel and data packs, you’ll earn experience points which unlock new skills and weapons, including thermal vision, incendiary rounds and heavy machine guns. This lets you mould your operative to match your playing style – so if you prefer getting up close and lethal, Vector’s active camouflage ability will work a treat. Prepare for terrifyingly varied enemies and work out attack strategies for each – ideally while taking cover. Look out for dynamite-laden zombies, whose payloads destroy them while attracting more of the undead. Lickers, the agile monsters which attack in packs, are vulnerable thanks to their exposed brains. These are just the enemies you’ll see coming. Shocks will explode from nowhere, leaving your planning in shreds. Sometimes it’s best to squeeze the trigger and run. Recruit up to three of your friends to battle through a night of living dread via PlayStation Network, and know that someone has your back as the nightmare gathers pace. You can play through the Campaign mode with trusted allies at your side or take on rival operatives in the Versus mode. Whichever you choose, it’s a good idea to get quickly acclimatised to the grim situation Raccoon City faces. Learn when to use frag grenades and antiviral sprays, and you won’t let your team down or embarrass yourself online. Select the side you want to fight on – Umbrella or US forces – and then decide whether to stand your ground and fight in the Team Attack, Heroes and Biohazard game types, or race for the rescue helicopter in Survivor mode. In one final, heart-stopping twist, you can become infected with the zombie virus, and go on the rampage attacking your own teammates. All you can do then is hope they put you out of your misery before you inflict too much damage.
0.999999
The answer is correct. You are averaging B2 & D2 (8+10/2=9) just two cells. The answer is correct. You are averaging B2 & D2 (8+10/2=9) ((8+10)/2=9) just two cells.
0.998739
Is the second part of the sentence a contraction? What is the difference between 그렇다 and 그래요? Duolingo only accepts one not the other. I think 그래요 is the present tense conjugation of 그렇다. while not grammatically incorrect, the phrase itself is useless in that it is so awkward/no one would ever say this conversationally or otherwise.
0.999997
HDTV Reviews HDTV reviews are common on the Internet. HDTV reviews are helpful guides to consumers who decided to make an intelligent choice in buying a high definition television. There is a wide array of high definition television available on the market and various manufacturers that consumers can get lost in buying a high definition television. Below are some of HDTV reviews of some of the best high definition televisions available: 1. Samsung 56" Widescreen HDTV Samsung 56" Widescreen HDTV has a digital cable tuner and uses Digital Light Processing or DLP technology from Texas Instruments. The following are some of the features of Samsung 56" Widescreen HDTV: a. HDTV reviews have commented that Samsung 56" Widescreen TV is a high performance HDTV with a full HD 1920 x 1080 p digital format converter for all the inputs. b. HDTV reviews promises that it has a whisper-quiet operation and a single panel design giving a crystal clear picture. c. HDTV reviews also mentioned that the Samsung 56" Widescreen TV has up to 10,000:1 contrast ratio with oustanding colors. d. HDTV reviews said that the HDTV has a DIgital Cable Ready (DCR) with CableCARD and has Samsung's DNIe video enhancer. e. Also, HDTV reviews reported that the HDTV has no burin-in or screen aging. 2. Panasonic 42" Diagonal Plasma HDTV HDTV reviews claims that the Panasonic 42" Diagonal Plasma HDTV boasts of about 8.52 billion color variety. It also has a built-in QAM, ATSC and NTSC tuners. The following are the additional features of the Panasonic 42" Diagonal plasma HDTV. a. The Panasonic 42" Diagonal Plasma HDTV has a contrast ratio of up to 3000:1 and has an aspect ratio of 16:9. The higher the contrast ratio, the better, while aspect ratio is the relative measurement of the HDTV screen's width to its height. b. HDTV reviews also mentioned that the Panasonic 42" Diagonal plasma Tv has a split screen P-I-P and has a one year parts and labor warranty. 3. Sony 70" Grand WEGA LCD Rear Projection HDTV HDTV reviews reported that Sony 70" WEGA LCD Rear Projection HDTV has an integrated ATSC tuner aside from having Sony's Proprietary WEGA Engine. Aside from this, here are some of the features of this HDTV. a. HDTV reviews also mentioned that the Sony 70" WEGA LCD Rear Projection HDTV has 0.87" WXGA LCD Panels adn is available in Cinema Black. b. HDTV reviews also reported that the Sony 70" WEGA LCD Rear Projection HDTV is also covered by a 1 year warranty on parts and labor. c. HDTV reviews promised that Sony 70" WEGA LCD Rear Projection HDTV has special features to produce exceptional images and sounds. Technologies such as Direct DIgital II Circuitry, Digital Reality Creation MultiFunction V1 Circuitry and Enhanced Memory Stick Media Playback have contributed to the beauty of Sony's HDTV. 4. Sharp AQUOS 45" LCD Television Sharp AQUOS 45" LCD Television has a breathtaking 45" widescreen that can really enhance the decor of any family living room or den. HDTV reviews said that it is the largest LC-TV on the market today along with some of the Sharp models. Based from HDTV reviews, the Sharp AQUOS 45" LCD Television has the highest DTV resolutions and has an unbeatable resolution of about 1920 x 1080 and vivid color purity. Aside from this, below are additional features of the HDTV: a. The Sharp AQUOS 45" LCD Television has high brightness and high contrast ratio of 800:1. b. HDTV reviews also mentioned that the Sharp AQUOS 45" LCD Television has a PC card Slot, a Quick Shoot, and detachable speakers including a table stand. c. HDTV reviews also showed that the Sharp AQUOS 45" LCD Television has a 60,000 hour lamp. d. Though bulky at about 91 pounds of shipping weight, it is indeed a nice decor for a living room. e. HDTV reviews also added that the Sharp AQUOS 45" LCD Television has a one year warranty for parts and labor.
0.999328
The following code example uses the SignalAndWait(WaitHandle, WaitHandle) method overload to allow the main thread to signal a blocked thread and then wait until the thread finishes a task. The example starts five threads and allows them to block on an EventWaitHandle created with the EventResetMode.AutoReset flag, then releases one thread each time the user presses the ENTER key. The example then queues another five threads and releases them all using an EventWaitHandle created with the EventResetMode.ManualReset flag. // between AutoReset and ManualReset synchronization events. // the use of the 64-bit Interlocked methods. // until an exiting thread has decremented the count. // Create an AutoReset EventWaitHandle. // Wait until all the threads have started and blocked. // Interlocked class to guarantee thread safety. // until all threads have been released. // because it was created with AutoReset mode. // Create a ManualReset EventWaitHandle. // Create and start five more numbered threads. // Increment the count of blocked threads. // Wait on the EventWaitHandle. // Decrement the count of blocked threads. // decremented the count. Signal it now. ' between AutoReset and ManualReset synchronization events. ' the use of the 64-bit Interlocked methods. ' until an exiting thread has decremented the count. ' Create an AutoReset EventWaitHandle. ' Wait until all the threads have started and blocked. ' Interlocked class to guarantee thread safety. ' until all threads have been released. ' because it was created with AutoReset mode. ' Create a ManualReset EventWaitHandle. ' Create and start five more numbered threads. ' Increment the count of blocked threads. ' Wait on the EventWaitHandle. ' Decrement the count of blocked threads. ' decremented the count. Signal it now. The EventWaitHandle class allows threads to communicate with each other by signaling. Typically, one or more threads block on an EventWaitHandle until an unblocked thread calls the Set method, releasing one or more of the blocked threads. A thread can signal an EventWaitHandle and then block on it, by calling the static (Shared in Visual Basic) WaitHandle.SignalAndWait method. The EventWaitHandle class provides access to named system synchronization events. The behavior of an EventWaitHandle that has been signaled depends on its reset mode. An EventWaitHandle created with the EventResetMode.AutoReset flag resets automatically when signaled, after releasing a single waiting thread. An EventWaitHandle created with the EventResetMode.ManualReset flag remains signaled until its Reset method is called. Automatic reset events provide exclusive access to a resource. If an automatic reset event is signaled when no threads are waiting, it remains signaled until a thread attempts to wait on it. The event releases the thread and immediately resets, blocking subsequent threads. Manual reset events are like gates. When the event is not signaled, threads that wait on it will block. When the event is signaled, all waiting threads are released, and the event remains signaled (that is, subsequent waits do not block) until its Reset method is called. Manual reset events are useful when one thread must complete an activity before other threads can proceed. EventWaitHandle objects can be used with the static(Shared in Visual Basic) WaitHandle.WaitAll and WaitHandle.WaitAny methods. For more information, see the Thread interaction, or signaling section of the Overview of synchronization primitives article. Initializes a new instance of the EventWaitHandle class, specifying whether the wait handle is initially signaled, and whether it resets automatically or manually. Initializes a new instance of the EventWaitHandle class, specifying whether the wait handle is initially signaled if created as a result of this call, whether it resets automatically or manually, and the name of a system synchronization event. Initializes a new instance of the EventWaitHandle class, specifying whether the wait handle is initially signaled if created as a result of this call, whether it resets automatically or manually, the name of a system synchronization event, and a Boolean variable whose value after the call indicates whether the named system event was created. Initializes a new instance of the EventWaitHandle class, specifying whether the wait handle is initially signaled if created as a result of this call, whether it resets automatically or manually, the name of a system synchronization event, a Boolean variable whose value after the call indicates whether the named system event was created, and the access control security to be applied to the named event if it is created. Releases all resources held by the current WaitHandle. Releases all resources used by the current instance of the WaitHandle class. When overridden in a derived class, releases the unmanaged resources used by the WaitHandle, and optionally releases the managed resources. Gets an EventWaitHandleSecurity object that represents the access control security for the named system event represented by the current EventWaitHandle object. Opens the specified named synchronization event, if it already exists. Opens the specified named synchronization event, if it already exists, with the desired security access. Sets the state of the event to nonsignaled, causing threads to block. Sets the state of the event to signaled, allowing one or more waiting threads to proceed. Sets the access control security for a named system event. Opens the specified named synchronization event, if it already exists, and returns a value that indicates whether the operation succeeded. Opens the specified named synchronization event, if it already exists, with the desired security access, and returns a value that indicates whether the operation succeeded. Gets or sets the native operating system handle. Releases all resources used by the WaitHandle. Gets the safe handle for a native operating system wait handle. Sets a safe handle for a native operating system wait handle.
0.954389
As I was having a beverage with Dr. J, I asked him the question, “of all the things that you would like to improve right now in order to improve your life and be even more successful than you are, which one area stands out above all the others?” Dr. J answered by saying, “I want to work fewer hours. I make enough money and love helping my patients but I need to work fewer hours to enjoy my family and improve my health.” As he said it, I could see the frustration and stress of his current experiences cause his eyebrows to furrow and his forty seven year old, now graying head, to droop ever so slightly. In that moment, I decided that I would dedicate myself to helping him and many of the medical professionals who have given their lives to helping me and millions of others protect, preserve and improve our health. In that instant, I realized there was a chance that the essential tendencies, attributes and focus that energized someone to pursue excellence in medicine might often be removed from the tendencies, attributes and focus that were required for excellence in business or wealth management, areas of my pursuit. The outgrowth of that conversation and many others since then has been my engagement in capacity building and the organization of expertise, processes, technologies and people who are able to support the delivery of insight and tools for building extraordinary medical practices. These are the medical practices that want to deliver outstanding patient outcomes, the pinnacle of career satisfaction and financial reward for medical practice teams, and the lifestyle and life balance that sustain enthusiasm for transformational work and living well. These are the leaders in medicine and health care who want to improve the physical health of their communities but also want to maximize revenue streams and profits so they can invest in surgical suites, institutions and businesses that enhance the lives of people in their communities. I’m curious. What’s your answer to the question that I asked Dr. J? Whatever your answer is, my conversations with medical professionals over the months since that beverage with Dr. J. have led me to observe some common situations that affect their enjoyment of life, the relationships they have with their spouses, family members, staff and friends, and their health. I have come to realize that there are several approaches that can be applied to leverage and combine my expertise from entrepreneurship, strategic development, and wealth management with the expertise that resides within medical offices, and forge medical practices that become truly “remarkable” and defy comparison. I have provided a synopsis of those finding so that they might trigger in you some heightened awareness of the areas that might warrant attention. I trust that you will reflect upon these matters, review them with your team, and even arrange conversations with your business advisors, so that you might gain clarity and secure the commitment of your team to building a remarkable practice. In the words of my recently deceased mentor and friend, William R. McClain, “insight precedes change…and what right do you have to deny anyone an opportunity to benefit from what you have, do or know?” Build your pathway to success!
0.951952
Examine the progress of Indian economy towards globalisation in the post reform years . comment on the slow pace of progress on globalisation and identify the major reasons. - Globalization. Borders between countries virtually disappeared enabling cross-border movement of goods, services, technology, and capital. - Attractive tax regime. Indian government reacted to opened opportunities creating favorable tax environment in India. As a result, international companies/corporations recognized India as one of the best places to set up Shared Services Centers and other kinds of business units. - Internal developments. Availability of labour and natural resources, improvements in education on background of low wages rates enhanced already existing conditions for growth. - Strong internal consumer demand. Quite high degree of internal consumer expenditure is another driver which boosts economical growth of India. Despite recent global financial meltdown Indian economy is considered as one which has sufficient potential for further growth within the nearest future.
0.956817
The Scenario: Steve Margeson has been playing pro hockey for 6 seasons. He is currently under contract with the Youngstown SteelHounds in Youngstown, Ohio, in the Central Hockey League. Steve has always displayed a great work ethic, but has never played to his full potential. The Challenge: Steve and I instruct at the same summer hockey program and for the past 4 or 5 years I have been suggesting to Steve that he take a serious look at his mental outlook on hockey. I recommended that he put some time and effort into becoming more “purposeful” in his game. In the summer of 2006, Steve took on the challenge and took ownership of his own development and performance. A Creative Solution: Steve hired me as his sport psychology consultant and we worked closely beginning in August through the 2006-07 season. Our common goal was to improve Steve's performance. My main objective was to teach Steve how to think on and off the ice to accelerate his development, in essence learning how to become a purposeful hockey player. The program worked. Steve learned how to focus his energy to improve faster and better. His renewed purpose, combined with simple and effective techniques and tools, led to enhanced self-confidence and improvement in all aspects of his game. But more importantly, Steve gained the certainty that he DESERVES to play at a higher level. He has finally caught up to his talent. The Outcome: In 2006-07, Steve performed a break-through season that placed him on the map as one of the top defensemen in the Central Hockey League (CHL). At the end of last season, he was rewarded with his first American Hockey League (AHL) call-up dressing in two games. June 28, 2007- YOUNGSTOWN, OHIO - Youngstown SteelHounds Head Coach and Director of Hockey Operations Kevin Kaminski announced today that the team has re-signed defenseman Stephen Margeson for the 2007-08 season. Terms of the deal were not disclosed. Margeson, 25, is coming off a break-through season during the 2006-07 campaign that placed him on the map as one of the top defensemen in the Central Hockey League (CHL). The Banff, Alberta native attended Hounds training camp in October looking to solidify a spot as one of the final defensemen on the roster but emerged as one of the best defenders, skaters and offensive threats the team had throughout the season. "It was easy to see that Stephen (Margeson) had unbelievable talent form the first time I saw him on the ice," said Kaminski. "I couldn't believe he had not had better offensive numbers with as much speed and hockey sense that he had but he certainly came through for us and I could see his confidence grow during the entire season. It came down to him believing in what he was capable of and once he made his mind up that he was going to be the best, he never looked back." The 6-3, 210-pound defenseman played in every game last season (64 games) and finished with 17 goals, 22 assists and 39 points. He also added 125 penalty minutes and was a +21 plus/minus rating. In six playoff games he posted three goals and two assists. His 17 goals ranked third among CHL defensemen and his +21 was fifth. Margeson was recognized by his teammates at the end of the season by earning the SteelHounds Most Improved Player award as well as being named the team's "Unsung Hero." During his previous time in the CHL, Margeson had played 24 games with the New Mexico Scorpions (2002-03) and 133 games with the Memphis RiverKings. His previous 157 games had seen him total just six goals and 27 assists. At the end of last season, Margeson was rewarded with his first American Hockey League (AHL) call-up dressing in two games with the Syracuse Crunch, the top AHL affiliate of the Columbus Blue Jackets.
0.999998
When writing a research paper there are various sections that you will need to produce content for. For example, one of the first sections in your paper will be the introduction. In order to understand how to write an introduction, the following provides seven things to consider when creating this part of your essay. One of the first things that you will need to do when writing your introduction is to introduce the topic that you will be discussing. Essentially, you want the reader to know as soon as possible what it is that you will be writing about. As well as introducing the general topic that you will be discussing, you should include details of the primary question or focus of your work. For example, it may be that you need to include a hypothesis as part of your essay, particularly if studying a scientific subject. As well as the primary questions that you may be intending to answer as part of your paper, you should also include details of any secondary questions that you hope to find out more about. A useful way of including any information about the primary and secondary questions that you wish to ask, as well as any hypothesis that you may use, is to include a thesis statement in your introduction. To explain why it is that you have chosen to research and write about the topic that you have based your paper on, it can be a good idea to refer to other studies or any relevant literature relating to the topic that you will be writing about. If you are writing an argumentative paper or any form of essay way you need to take particular point of view, then it is a good idea to indicate the stance that you will be taking, so that the reader will be aware of this from the beginning. Finally, once you have written the introduction, and you are happy with how it sounds, you will need to check over the work to ensure that it is entirely accurate, which includes proofreading to ensure that there are no spelling or grammatical mistakes.
0.99983
What kind of links do people share on Twitter? The most commonly shared links contain images, according to a recent study. You’ll never guess the most common source for articles shared on the popular site.
0.999971
Why is a floating boat dock right for your business? A season's worth of adventures await with your floating dock, including parties, sunbathing, swimming, fishing and boating. Commercial applications use Connect-A-Dock because of its modularity. These docks can be expanded to any width or length, making it easy to accommodate customers with additional docking slips or reconfiguring for various-sized boats.
0.999273
While loggerhead sea turtles are most commonly seen in Florida, they can be seen from May to November in the Chesapeake and Coastal bays. Did you know you could see a loggerhead sea turtle right in here in Maryland? The loggerhead sea turtle’s (Caretta caretta) primary habitat includes the southeastern United States, South America, Africa, the Mediterranean Sea, western Pacific, and Indian Oceans. They are migratory animals and have been recorded migrating up to 3,000 miles. While loggerhead sea turtles are most commonly seen in Florida in the U.S., they can be seen from May to November in the Chesapeake and Coastal bays. Their nesting time is typically from June to August. Since they spend time floating on the water’s surface, boaters in the Chesapeake and Coastal bays have been known to spot them. Younger juveniles are often found in mats of seaweed in warm ocean currents. Older juveniles and adults are usually found in coastal waters. They can also be found near coral reefs, salt marshes and brackish lagoons. They typically nest on sandy oceanside beaches. These beautiful creatures have been on the threatened species list since 1978. In 2011, the listing was changed to break the loggerhead species into nine Distinct Population Segments (DPS). Four of these segments were listed as threatened: Northwest Atlantic Ocean, Southwest Indian Ocean, Southeast Indo-Pacific Ocean and South Atlantic Ocean. The other five were classified as endangered: Northeast Atlantic Ocean, Mediterranean Sea, North Pacific Ocean, South Pacific Ocean and North Indian Ocean. One of the biggest reasons for loggerhead decline is bycatch in commercial fishing nets. Bycatch is the accidental capture of turtles or other marine animals in fishing gear. Bycatch of turtles is common on trawling vessels, which pull a huge net behind a boat, and during longline hook fishing, which utilizes a long line of baited fishhooks. Since loggerheads need to go to the surface to breathe, they often drown once caught in nets. Sea turtles can also be trapped and killed by derelict fishing gear, which is any fishing gear that was lost or discarded in the ocean. This is often referred to as ghost fishing. One-way fisheries can help reduce the death of sea turtles from bycatch is to use “circle” fishing hooks designed to be more turtle friendly. Because of their shape, circle hooks are less likely to be swallowed by turtles, and sometimes avoid hooking them altogether. Additionally, Turtle Excluder Devices (TEDs) are commonly used, allowing turtles to escape from nets. Another threat to loggerheads, and all sea turtles is human pollution. Plastic and other marine debris can be fatal to sea turtles if entangled or ingested. Water pollution from urban runoff and oil spills can harm sea turtles and their food source as well. Additionally, shoreline erosion and beach development are serious threats to nesting females. In some countries, loggerheads are sold for their meat and their eggs are poached as well, luckily this may be one threat that loggerheads do not have to face in Maryland (although, their eggs are still susceptible to being preyed on by racoons, crabs, birds, and foxes). With all these threats against loggerheads, it is truly an amazing experience to spot one. Recently, in September 2017, a loggerhead sea turtle nest successfully hatched on Assateague Island National Seashore on the Maryland Over Sand Vehicle Zone (OSV). In general, loggerheads nest from North Carolina to Florida, and rarely nest north of Virginia. Turtles have attempted to nest on Assateague in the past, but there were no recorded success stories until last year. Typically, the weather is too cold for the turtles to survive, but 2017 was the exception, although, they did take longer to incubate because of the lower temperature. Previously, when loggerheads nested in Assateague, the turtles did not grow and hatch due to the low temperatures. The 2017 nest was first found in late June. Assateague rangers then surrounded the nest with wire netting to protect it. The wire nets keep predators out but allow the turtles to leave when they hatch. The baby turtles began hatching in early September and continued into mid-September. Sea turtles typically lay about 110 eggs in a nest. In Assateague, about 100 hatchlings successfully made it to the water. While no one can say the exact reason that a loggerhead turtle decided to nest in Assateague, some believe that climate change may be a factor. This could potentially mean more nesting loggerheads on Assateague, and the implications of that are unknown. Others say this event reinforces the importance of keeping beaches undeveloped. Development can cause erosion and contribute to light pollution, which can cause turtles to crawl toward artificial light rather than the light reflecting from the moon which helps lead them to the ocean. Since mature females often return to the location where they were hatched to lay their eggs, it is possible that more sea turtles will come to Assateague to nest in the future, but only time will tell! If you ever find nesting loggerheads, please contact DNR’s Wildlife and Heritage Service at 410-260-8540. Brianna Fragata is a Chesapeake Conservation Corps member for the Maryland Coastal Bays Program.
0.999939
Greenville native Bill Haas holds 2012 Northern Trust Open trophy. It's not easy establishing your own reputation on the PGA Tour when your father is recognized as one of the Tour's all-time good guys, but Bill Haas has done just that the past two years, becoming one of the top players - and one of the wealthiest - in professional golf. Like his dad Jay Haas, Bill was an All-American at Wake Forest, but his dad was also the 1975 NCAA Tournament medalist; Bill had to "settle" for being voted NCAA player of the year in 2004. Predicted to be an instant success as a professional, he failed in his first attempt at Q-school and spent a year on the Nationwide Tour, where he earned his "big tour" card. And for the first four years, the younger Haas was frustrated by near-misses, twice finishing third in tournaments. But everything came together in 2010, when he won two titles (Bob Hope Classic, Viking Classic), and in 2011, when he outlasted Hunter Mahan in a three-hole playoff to capture the Tour Championship - and also finished first in the FedEx Cup playoffs, a double payday worth a staggering $11.44 million. He's still his father's son, though. Asked after his huge payday if he had any plans for the money, Haas noted that he and his new wife, Julie, were already building a home. "I guess maybe we can add a pool now," he said. He also expressed a desire to purchase a vintage 1960s Ford Mustang - a car his dad might've owned back in the day. The Haas clan is all about golf. Besides Bill and Jay, Bill's caddie is his older brother Jay Jr., who played at Augusta State and on mini-tours, and Jay's uncle is Bob Goalby, winner of the 1968 Masters. Bill maintains his ties to Greenville and the upstate, but confesses to a love of South Carolina beaches - and , indeed, many things about his home state. Haas talked about all that at the recent U.S. Open -- this, after missing the 36-hole cut by a single stroke. In other words, he's as nice a guy as his dad, too. Bio: Younger son of PGA Tour and Champions Tour veteran Jay Haas; was All-American and won NCAA player of the year honors at Wake Forest; he and wife Julie are building a home on Greenville Country Club's Chanticleer course. Highlights: Has won four times on PGA Tour since 2010, including last year's Tour Championship and FedEx Cup, and this year's Northern Trust Open; chosen as captain's pick for 2011 U.S. Ryder Cup team. Where I play: "Up around Greenville, the Cliffs courses are all really good. The course that I grew up on, Thornblade, is a great test; they play the (Nationwide Tour's) BMW Charity Pro-Am there. And another course in that rotation is Chanticleer, that's where my wife and I are building, and I enjoy that golf course. "There's plenty of good golf in the Upstate, but I think South Carolina is one of the golf meccas around the country, especially around the coast. If you want to go play a lot of golf, certainly the South Carolina coast has everything you need. "Obviously the Ocean Course at Kiawah is really sweet, but the River Course there is really good, too. Secession Club in (Beaufort) is really good, and Sage Valley near Aiken is a good golf course, fun to play. There's plenty of them." Where I eat: "Luckily in the last 15 years or so, Greenville downtown has really turned the corner and got a lot of good restaurants - not chains, but unique spots to go to. When we're home, we pick a night, go out and always find good food. The Lazy Goat is a good spot, more of a tapas kind of place. Rick Erwin's is a good steakhouse, and he also owns a new seafood place Nantucket, at the bottom of the new Marriott downtown. High Cotton uptown is good, too. "And there's Charlie's Barbecue in Greenville, we go there a lot when we're home. Soby's is a great place for sandwiches. We're just really lucky in Greenville." What I do for fun: "My parents have a beach house just north of Georgetown in a place called Prince George, and as a family we like to go there. My wife's family has a beach trip there every summer, they go to Pawleys Island, that's something we try to do and look forward to every summer. "I enjoy both hunting and fishing. I'm just now starting to get into hunting through my wife's side of the family. Her sisters' husbands both like to hunt, and they've got some property in Union, S.C., and we'll go there and do some bird hunting; they've also got deer stands and everything. I'm just now getting into that. "I've always liked to fish. Inshore ocean fishing is probably my favorite; I prefer to ocean fish just because there's so much there. Certainly, (inland) bass fishing is fun, but if I had to pick anything, it would be fishing in the inlets of the ocean, trying to catch redfish and flounder. I really enjoy that."
0.957254
Tea is a good thing. Different kinds of tea are good for people, but if you don't pay attention, it will cause a lot of harm. What do you have to pay attention to? Ø Tea has a refreshing effect, so try to drink less tea at night, especially strong tea. It is best not to drink tea 2 hours before going to bed, otherwise it will affect sleep and may lead to insomnia. Ø Try not to drink the tea soaked for the first time. The dust and harmful substances on the tea leaves are dissolved in the tea water. It is safer to clean once. Ø Do not drink tea on an empty stomach, especially those who do not drink tea often, which can cause palpitation, dizziness, weakness of hands and feet, palpitations, and a large stomach irritation that causes stomach problems. Ø People with stomach discomfort or stomach problems should not drink tea regularly. The theophylline and tea polyphenols contained in the tea have a stimulating effect on the stomach and will increase the discomfort of the stomach. Especially for patients with stomach problems, drinking tea often reduces the recovery of the disease. Ø Drugs and tea can not be consumed at the same time, which will reduce the efficacy. Ø Try not to drink overnight tea, because the nutrition of this tea has been lost, and it is easy to breed bacteria, especially in summer. Ø Do not drink tea when you have a fever, because the theophylline contained in the tea has the effect of increasing body temperature. Ø Pregnant women, lactating women, menstruating women should not drink too much tea. The tannic acid contained in tea will hinder the body's absorption of iron and inhibit the secretion of milk; caffeine will increase the heart and kidney load. Tea polyphenols may cause menopausal women to have faster heartbeat and poor sleep quality. ØPeople with anemia should not drink tea, especially strong tea. The tannic acid component contained in the tea species will hinder the body's absorption of iron and will aggravate the symptoms of anemia. It is not advisable to drink tea after eating animal liver, otherwise it will hinder the body's absorption of iron. Ø People with urinary stones should not drink tea. Tea contains oxalic acid, which is the main component of urinary calculi. Drinking tea can affect the formation and growth of calcium oxalate stones, making the disease worse. Ø A small amount of tea for people with constipation can have a good effect on digestion and platooning. However, excessive drinking will increase constipation, because the elements in tea and the protein in food will combine into non-digestible substances, affecting the work of intestinal motility. Ø People with high blood pressure and heart disease should not drink more tea. Excessive tea drinking, especially strong tea, can lead to high blood pressure and irregular heartbeat. Ø People with liver and kidney disease should not drink more tea. The caffeine contained in tea is not conducive to the recovery of liver and kidney function. Ø It is not advisable to drink cold tea. Cold tea has the side effects of stagnation and phlegm on the human body, especially women with cold constitution. Ø Some foods rich in egg white (bovine and mutton, fish, poultry, milk, eggs, etc.) should not be eaten with tea. The tannic acid, tannic acid and other substances contained in the tea will react with the protein, newly produced. Substances can weaken intestinal peristalsis, affecting the digestive system and causing constipation. ØDrinking tea should not be used after drinking alcohol. Alcohol is more irritating to the kidneys, and theophylline is diuretic, which accelerates the kidney load. At the same time, the double stimulation of tea and alcohol on the heart increases the load on the heart. People with heart disease should not drink tea after drinking. There are many types of tea, so what do you need to pay attention to when drinking different kinds of tea? Ø New tea and less drink: The new green tea has a relatively short period of pure release, contains many non-oxidized polyphenols, aldehydes and alcohols, etc., which has a strong stimulating effect on the stomach and is easy to induce stomach diseases. New teas that are stored for less than half a month should be avoided. Ø Stomach cold and drink less: Green tea is cold, and excessive drinking can cause stomach upset. ØStomach heat less drink: black tea is hot, has the effect of warming the stomach, people with stomach heat drinking too much black tea will cause stomach upset. Ø People who are prone to fever have less tea: black tea is hot, and it is easy to cause symptoms such as redness, red lips, dry mouth, bad breath, and prolonged acne. Ø Drink with the bubble: Pu'er tea soaked for too long, the material contained in the tea is excessively precipitated, and soaking for too long will cause oxidation of these substances, which will affect the taste and damage the nutrients. Ø Not suitable for cooking: No matter whether it is raw or cooked tea, it is not suitable to cook. The concentration of Pu'er is too high, not only the taste is not good, but also the spleen and stomach. Moreover, the high temperature of boiled tea will also destroy the beneficial substances such as vitamins contained in the tea. Ø The raw sputum that has just been produced should not be drunk. The unoxidized substances contained in it have a stimulating effect on the heart. It is highly excited and flustered. It is best to drink it for more than one year. Quote a sentence, "Although tea is good, don't be greedy!" PgDn : What are the effects and taboos of Tieguanyin?
0.946641
Thomas Johann Seebeck (German: [ˈtoːmas ˈjoːhan ˈzeːbɛk]; 9 April 1770 – 10 December 1831) was a Baltic German physicist, who, in 1822, observed a relationship between heat and magnetism. Later, in 1823, Ørsted called this phenomena thermoelectric effect. Seebeck was born in Reval (today Tallinn, Estonia) to a wealthy Baltic German merchant family. He received a medical degree in 1802 from the University of Göttingen, but preferred to study physics. From 1821 to 1823, Seebeck performed a series of experiments trying to understand Ørsted's findings from 1820. During his experiments, he observed that a junction of dissimilar metals produces a deflexion on a magnetic needle (compass) when exposed to a temperature gradient. Because Ørsted had discovered that an electric current produces a deflexion on a compass transversal to the wire, Seebeck's results were interpreted as a thermoelectric effect. This is now called the Peltier–Seebeck effect and is the basis of thermocouples and thermopiles. In 1822, after previous experiments on voltaic current and magnetism, Thomas Johann Seebeck found that a circuit made from two dissimilar metals with junctions at different temperatures would deflect a compass magnet. Seebeck believed this was due to magnetism induced by the temperature difference. Based on this result, Seebeck elaborated a table relating different metal junctions and the deflexion of the compass. His main conclusion at the end of these experiments was about the influence of the metals and volcanoes on Terrestrial magnetism. However, during the 1820's, there were at least two different explanations to the relationship between electricity and magnetism. One of them was related to the belief in the polarity of the Nature (Naturphilosophie); another, followed Newton's concepts of force. Ørsted, Seebeck, Ritter and some German chemists and physicists believed on the polarity and looked for a relationship among different forces of Nature, like electricity, magnetism, heat, light and chemical reactions. Following Newton's concept of force were André-Marie Ampère and some French physicists. Ørsted interpreted Seebeck's experiment as a relationship among electricity, magnetism and heat and adopt it as a way to reinforce his on theory, overcoming the French physicists. After the discovery of the electron and its fundamental charge, it was quickly realized that Seebeck's effect was an electric current that is induced, which by Ampere's law deflects the magnet. More specifically, the temperature difference produces an electric potential (voltage) which can drive an electric current in a closed circuit. Today, this effect is known as the Peltier–Seebeck effect. The voltage produced is proportional to the temperature difference between the two junctions. The proportionality constant (a) is known as the Seebeck coefficient, and often referred to as the thermoelectric power or thermopower. The Seebeck voltage does not depend on the distribution of temperature along the metals between the junctions. This effect is the physical basis for a thermocouple, which is used often for temperature measurement. The voltage difference, V, produced across the terminals of an open circuit made from a pair of dissimilar metals, A and B, whose two junctions are held at different temperatures, is directly proportional to the difference between the hot and cold junction temperatures, Th − Tc. The voltage or current produced across the junctions of two different metals is caused by the diffusion of electrons from a high electron density region to a low electron density region, as the density of electrons is different in different metals. The conventional current flows in the opposite direction. If both junctions are kept at same temperature, an equal amount of electron diffuses at both of them. Therefore, the currents at the two junctions are equal and opposite and the net current is zero, and if both the junctions are kept at different temperatures then diffusions at the two junctions are different and hence a different amount of current is produced. Therefore, the net current is non-zero. This phenomenon is known as thermoelectricity. In 1810, at Jena, Seebeck described the action of the spectrum of light on the chloride of silver. He observed that the exposed chemical would sometimes take on a pale version of the color of light that exposed it, and also reported the action of light for a considerable distance beyond the violet end of the spectrum. Seebeck also worked on the Theory of Colours with Goethe. In 1808, Seebeck was first to produce and describe the amalgam of potassium. In 1810, he observed the magnetic properties of nickel and cobalt. In 1818, Seebeck discovered the optical activity of the solutions of sugar. ^ George Theodore Dippold (1904). A Scientific German Reader. Ginn & Co. ^ a b Ørsted, Hans C. (1823). "New experiments by Dr. Seebeck on electromagnetic effects". Annales de chimie et de physique. 22: 199–201. ^ Seebeck, T. J. (1822). "Über den Magnetismus der galvanischen Kette". Abhadlungen der physikalischen Klasse der Königlisch-Preußsischen. Akademie der Wissenschaftten aus den Jahren 1820-1821: 289–346. Seebeck, T. J. (1825) "Magnetische Polarisation der Metalle und Erze durch Temperatur-Differenz" (Magnetic polarization of metals and minerals by temperature differences), Abhandlungen der Königlichen Akademie der Wissenschaften zu Berlin (Treatises of the Royal Academy of Sciences in Berlin), pp. 265-373. Seebeck (1826) "Ueber die Magnetische Polarisation der Metalle und Erze durch Temperatur-Differenz," (On the magnetic polarization of metals and minerals by temperature differences), Annalen der Physik und Chemie, 6 : 1-20, 133-160, 253-286. ^ CANEVA, Kenneth L. Physics and Naturphilosophie: a reconnaissance. History of science, v. 35, n. 1, p. 35-106, 1997. ^ DARRIGOL, Olivier. Electrodynamics from ampere to Einstein. Oxford University Press, 2003. Frankel, Eugene (1970–80). "Amira,like brandon". Dictionary of Scientific Biography. 12. New York: Charles Scribner's Sons. pp. 281–282. ISBN 978-0-684-10114-9. Magie, W. M. (1963). A Source Book in Physics. Harvard: Cambridge MA. pp. 461–464. Partial translation of Seebeck's "Magnetische Polarisation der Metalle und Erze durch Temperatur-Differenz." This page was last edited on 8 March 2019, at 20:06 (UTC).
0.999944
As its punning title suggests, Simon Armitage's account of the closing days of the last millennium is preoccupied with death and destruction. Ironic and understated, Killing Time isn't exactly an apocalyptic work; but war, famine and a clutch of local disasters - the Paddington train crash, the Brixton and Soho bombings, the massacre of children in their Colorado school - give a sombre cast to a poem which pointedly distances itself from the millennial celebrations. 'Like actors trapped by Cinemascope,' says Armitage, 'we do whatever we do / between two black borderlines'; and though the immediate reference is to the brevity of winter daylight, there are deeper resonances to that image of darkness pressing in upon a vulnerable and delusive world.
0.946714
The assertion by Mr. Christides (May 10, 1999) that there was no ethnic cleansing or attempted genocide of Turkish Cypriots by Greek Cypriots is ridiculous. Until influential Greek Cypriots come to terms with the appalling behavior of their community toward the smaller Turkish Cypriot community and stop trying to persuade themselves and the world that each side was as much to blame as the other, there will be no reconciliation in Cyprus. What did George Ball and Sir Alec Douglas say about the intentions of Archbishop Makarios vis a vis the Turkish Cypriots? In his memoirs, American Undersecretary of State George Ball said: "Makarios's central interest was to block off Turkish intervention so that he and his Greek Cypriots could go on happily massacring Turkish Cypriots. Obviously we would never permit that. "The fact is, however, that neither the United Nations, nor anyone, other than Turkey ever took effective action to prevent it. On Feb. 17, 1964 the Washington Post reported that "Greek Cypriot fanatics appear bent on a policy of genocide." Former British Prime Minister Sir Alec Douglas-Home said, "I was convinced that if Archbishop Makarios could not bring himself to treat the Turkish Cypriots as human beings he was inviting the invasion and partition of the island." On July 28, 1960 Makarios, the Greek Cypriot president, said: "The independence agreements do not form the goal they are the present and not the future. The Greek Cypriot people will continue their national cause and shape their future in accordance with THEIR will." In a speech on Sept. 4, 1962 at Panayia Makarios said, "Until this Turkish community forming part of the Turkish race that has been the terrible enemy of Hellenism is expelled, the duty of the heroes of EOKA can never be considered terminated." In November 1963 the Greek Cypriots demanded the abolition of no less than eight of the basic articles that had been included in the 1960 agreement for the protection of the Turkish Cypriots. The Turkish Cypriots, naturally, refused to agree. The aim of the Greek Cypriots was to reduce the Turkish Cypriot people to the status of a mere minority, wholly subject to the control of the Greek Cypriots, pending ultimate destruction or expulsion of the Turkish Cypriots from the island. "When the Turkish Cypriots objected to the amendment of the Constitution, Makarios put his plan into effect, and the Greek Cypriot attack began in December 1963," wrote Lt. Gen. George Karayiannis of The Greek Cypriot militia ("Ethnikos Kiryx" 15.6.65). The general was referring to the notorious "Akritas" plan, which was the blueprint for the annihilation of the Turkish Cypriots and the annexation of the island to Greece. On Christmas Eve 1963 the Greek Cypriot militia attacked Turkish Cypriot communities across the island. Large numbers of men, women, and children were killed and 270 mosques, shrines and other places of worship were desecrated. On Dec. 28, 1963, the Daily Express carried the following report from Cyprus: "We went tonight into the sealed-off Turkish Cypriot quarter of Nicosia in which 200 to 300 people had been slaughtered in the last five days. We were the first Western reporters there, and we have seen sights too frightful to be described in print. Horror was so extreme that the people seemed stunned beyond tears." On Dec. 31, 1963, The Guardian reported: "It is nonsense to claim, as the Greek Cypriots do, that all casualties were caused by fighting between armed men of both sides. On Christmas Eve many Turkish Cypriot people were brutally attacked and murdered in their suburban homes, including the wife and children of a doctor-allegedly by a group of 40 men, many in army boots and greatcoats." Although the Turkish Cypriots fought back as best they could and killed some militia, there were no massacres of Greek Cypriot civilians. On Jan. 1, 1964, the Daily Herald reported: "When I came across the Turkish Cypriot homes they were an appalling sight. Apart from the walls they just did not exist. I doubt if a napalm attack could have created more devastation. Under roofs springs, children's cots, and gray ashes of what had once been tables, chairs and wardrobes. In the neighboring village of Ayios Vassilios I counted 16 wrecked and burned out homes. They were all Turkish Cypriot's. In neither village did I find a scrap of damage to any Greek Cypriot house." On Jan. 2, 1964, the Daily Telegraph wrote: "The Greek Cypriot community should not assume that the British military presence can or should secure them against Turkish intervention if they persecute the Turkish Cypriots. We must not be a shelter for double-crossers." On Jan. 12, 1964, the British High Commission in Nicosia wrote in a telegram to London: "The Greek [Cypriot] police are led by extremist who provoked the fighting and deliberately engaged in atrocities. They have recruited into their ranks as 'special constables' gun-happy young thugs. They threaten to try and punish any Turkish Cypriot police who wishes to return to the Cyprus Government... Makarios assured Sir Arthur Clark that there will be no attack. His assurance is as worthless as previous assurances have proved." On Jan. 14, 1964, the Daily Telegraph reported that the Turkish Cypriot inhabitants of Ayios Vassilios had been massacred on Dec. 26, 1963 and reported their exhumation from a mass grave in the presence of the Red Cross. A further massacre of Turkish Cypriots, at Limassol, was reported by The Observer on Feb. 16, 1964; and there were many more. On Feb. 6, 1964, a British patrol found armed Greek Cypriot police attacking the Turkish Cypriots of Ayios Sozomenos. They were unable to stop the attack. On Feb. 13, 1964, the Greeks and Greek Cypriots attacked the Turkish Cypriot quarter of Limassol with tanks, killing 16 and injuring 35. On Feb. 15, 1964, the Daily Telegraph reported: "It is a real military operation which the Greek Cypriots launched against the 6,000 inhabitants of the Turkish Cypriot quarter yesterday morning. A spokesman for the Greek Cypriot government has recognized this officially. It is hard to conceive how Greek and Turkish Cypriots may seriously contemplate working together after all that has happened." On Sept. 10, 1964, the U.N. Secretary-General reported that "UNFICYP" carried out a detailed survey of all damage to properties throughout the island during the disturbances... It shows that in 109 villages, most of them Turkish-Cypriot or mixed villages, 527 houses have been destroyed while 2,000 others have suffered damage from looting. In Ktima 38 houses and shops have been destroyed totally and 122 partially. In the Orphomita suburb of Nicosia, 50 houses have been totally destroyed while a further 240 have been partially destroyed there and in adjacent suburbs." The U.K. House of Commons Select Committee on Foreign Affairs reviewed the Cyprus question in 1987 and reported unanimously on July 2 of that year that "although the Cyprus Government now claims to have been merely seeking to 'operate the 1960 Constitution modified to the extent dictated by the necessities of the situation,' this claim ignores the fact that both before and after the events o#, December 1963 the Makarios Government continued to advocate the cause of ENOSIS and actively pursued the amendment of the Constitution and the related treaties to facilitate this ultimate objective." Professor Ernst Forsthoff, the neutral president of the Supreme Constitutional Court of Cyprus, told Die Welt on Dec. 27, 1963: "Makarios bears on his shoulders the sole responsibility for the recent tragic events. His aim is to deprive the Turkish community of their rights". In an interview with the UPI press agency on Dec. 30, 1963 he said, "All this happened because Makarios wanted to take away all constitutional rights from the Turkish Cypriots." The United Nations not only failed to condemn the forcible usurpation of the legal order in Cyprus, but actually rewarded it by treating the by then wholly Greek Cypriot administration as if it were the government of Cyprus (Security Council Res. 186 of 1964). This acceptance has continued to the present day, and reflects no credit upon the United Nations, nor upon Britain, nor the other countries who have acquiesced. "What is our policy and true feelings about the future of Cyprus and about Makarios? Judging from the English newspapers and many others, the feeling is very strong indeed against Makarios and his so-called government, and nothing would please the British people more than to see him toppled and the Cyprus problem solved by the direct dealings between the Turks and the Greeks. We are of course supporting the latter course, but I have never seen any expression of the official disapproval in public against Makarios and his evil doings. Is there an official view about this, and what do we think we should do in the long run? Sometimes it seems that the obsession of some people with "the Commonwealth" blinds us to everything else and it would be high treason to take more active line against Makarios and his henchmen. At other times the dominant feature seems to be concern lest active opposition against Makarios should lead to direct conflict with the Cypriots and end up with our losing our bases." Thereafter Turkish Cypriot MPs, judges, and other officials were intimidated or prevented by force from carrying out their duties. According to the Select Committee, "The effect of the crisis of December 1963 was to deliver control of the formal organs of government into the hands of the Greek Cypriots alone. Claiming to be acting in accordance with the doctrine of necessity, the Greek Cypriot members of the House of Representatives enacted a series of laws which provided for the operation of the organs of government without Turkish Cypriot participation." The report of the Select Committee continued: "Equality damaging from the Turkish Cypriot point of view was what they considered to be their effective exclusion from representation at and participation in the international fora where their case could have been deployed... An official Turkish Cypriot presence in the international political scene virtually disappeared overnight." It is not therefore surprising that the world has been persuaded to the Greek Cypriot point of view. More than 300 Turkish Cypriots are still missing without trace from these massacres of 1963/64. These dreadful events were not the responsibility of "the Greek Colonels" of 1974 or an unrepresentative handful of Greek Cypriot extremists. The persecution of the Turkish Cypriots was an act of policy on the part of the Greek Cypriot political and religious leadership, which has to this day made no serious attempt to bring the murderers to justice. The UK Commons Select Committee found that "there is little doubt that much of the violence which the Turkish Cypriots claim led to the total or partial destruction of 103 Turkish villages and the displacement of about a quarter of the total Turkish Cypriot population was either directly inspired by, or connived at, by the Greek Cypriot leadership." The UN secretary-general reported to the Security Council: "When the disturbances broke out in December 1963 and continued during the first part of 1964, thousands of Turkish Cypriots fled their homes, taking with them only what they could drive or carry, and sought refuge in safer villages and areas." On Jan. 14, 1964, "ll Giorno" of Italy reported: "Right now we are witnessing the exodus of Turkish Cypriots from the villages. Thousands of people abandoning homes, land, herds. Greek Cypriot terrorism is relentless. This time the rhetoric of the Hellenes and the statues of Plato do not cover up their barbaric and ferocious behavior." The Greek Cypriots sometimes allege that it was they who were attacked by the Turkish Cypriots, who were determined to wreck the 1960 agreements. However, the Turkish Cypriots were not only outnumbered by nearly four to one; they were also surrounded in their villages by armed Greek Cypriots; they had no way of protecting their women and children, and Turkey was 40 miles away across the sea. The very idea that in those circumstances the Turkish Cypriots were the aggressors is absurd. There were further attacks on the Turkish Cypriots in 1967. In 1971, General Grivas returned to Cyprus to form EOKA-B, which was again committed to making Cyprus a wholly Greek island and annexing it to Greece. In a speech to the Greek Cypriot armed forces at the time (quoted in "New Cyprus," May 1987) Grivas said: "The Greek forces from Greece have come to Cyprus in order to impose the will of the Greeks of Cyprus upon the Turks. We want ENOSIS but the Turks are against it. We shall impose our will. We are strong, and we shall do so." By July 15, 1974, a powerful force of mainland Greek troops had assembled in Cyprus and with their backing, the Greek Cypriot National Guard overthrew Makarios and installed one Nicos Sampson as "president." On July 22, the Washington Star News reported: "Bodies littered the streets and there were mass burials... People told by Makarios to lay down their guns were shot by the National Guard." Missing persons, what is the truth? On April 17, 1991, Ambassador Nelson Ledsky testified before the U.S. Senate Foreign Relations Committee that "most of the 'missing persons' disappeared in the first days of July 1974, before the Turkish intervention on the 20th. Many killed on the Greek side were killed by Greek Cypriots in fighting between supporters of Makarios and Sampson." On Nov. 6, 1974, Ta Nea reported that dates from the graves of Greek Cypriots killed in the five days between July 15-20 were erased in order to blame these deaths on the subsequent Turkish military action. On March 3, 1996, the Greek Cypriot Cyprus Mail wrote: "(Greek) Cypriot governments have found it convenient to conceal the scale of atrocities during the July 15 coup in an attempt to downplay its contribution to the tragedy of the summer of 1974 and instead blame the Turkish invasion for all casualties. There can be no justification for any government that failed to investigate this sensitive humanitarian issue. The shocking admission by the Clerides government that there are people buried in Nicosia cemetery who are still included in the list of the 'missing' is the last episode of a human drama which has been turned into a propaganda tool." On Oct. 19 1996, Mr. Georgios Lanitis wrote: "I was serving with the Foreign Information Service of the Republic of Cyprus in London... I deeply apologize to all those I told that there are 1,619 missing persons. I misled them. I was made a liar, deliberately, by the government of Cyprus . .... today it seems that the credibility of Cyprus is nil." Had Turkey not intervened, what would have happened? Turkish Cypriots appealed to the guarantor powers for help, but only Turkey was willing to make any effective response. On July 20, 1974 Turkey intervened under Article IV of the Treaty of Guarantee. The Greek newspaper Eleftherotipia published an interview with Nicos Sampson on Feb. 26, 1981 in which he said, "Had Turkey not intervened I would not only have proclaimed ENOSIS, I would have annihilated the Turks in Cyprus." The Times and The Guardian reported on Aug. 21, 1974 that in the village of Tokhni on Aug. 14, 1974 all the Turkish Cypriot men between the ages of 13 and 74, except for eighteen who managed to escape, were taken away and shot. There were also reports that in Zyyi on the same day all the Turkish-Cypriot men aged between 19 an 38 were taken away and were never seen again and that Greek-Cypriots opened fire on the Turkish-Cypriot neighborhood of Paphos killing men, women, and children indiscriminately. On July 23, 1974, the Washington Post reported that "in a Greek raid on a small Turkish village near Limassol 36 people out of a population of 200 were killed. The Greeks said that they had been given orders to kill the inhabitants of the Turkish villages before the Turkish forces arrived." The Times and The Guardian also reported on the killings. On July 28, 1974 the New York Times reported that 14 Turkish-Cypriot men had been shot in Alaminos. On July 24, 1974 France Soir reported that "the Greeks burned Turkish mosques and set fire to Turkish homes in the villages around Famagusta. Defenseless Turkish villagers who have weapons live in an atmosphere of terror and they evacuate their homes and go and live in tents in the forest. The Greeks' actions are a shame to humanity." On July 22, Turkish Prime Minister Ecevit called upon the United Nations to "stop the genocide of Turkish Cypriots" and declared, "Turkey has accepted a cease-fire, but will not allow Turkish Cypriots to be massacred." The German newspaper Die Zeit wrote on Aug. 30, "The massacre of Turkish Cypriots in Paphos and Famagusta is the proof of how justified the Turks were to undertake their intervention." "Turkish Cypriots, who had suffered from physical attacks since 1963, called on the guarantor powers to prevent a Greek conquest of the island. When Britain did nothing Turkey invaded Cyprus and occupied its northern part. Turkish Cypriots have constitutional right on their side and understandably fear a renewal of persecution if the Turkish army withdraws", the Daily Telegraph wrote on Aug. 15, 1996. "Turkey intervened to protect the lives and property of the Turkish-Cypriots, and to its credit it has done just that. In the 12 years since, there have been no killings and no massacres" Lord Willis (Labor) told the House of Lords on Dec. 17, 1986. On March 12, 1977, Makarios declared, "It is in the name of ENOSIS that Cyprus has been destroyed." The United Nations, the Commonwealth, and the rest of the world have put political expediency before principle and failed to condemn this appalling behavior. Greek Cypriots are guilty of attempted genocide but no action has ever been taken against them. Instead they have been rewarded by recognition as the government of all Cyprus. The Turkish Cypriots by contrast were frozen out of the United Nations, the Commonwealth and almost every other international organization.
0.999876
Please select the product name. Please input the question or the demand. Please select the file when there is an attached file.
0.999984
What should I eat to avoid the freshman 15? The "freshman 15," like any weight gain, can be avoided by following simple dietary rules. The simplest is this: If you consume more calories than you expend, you'll add weight. So the first rule of thumb is to remain active, which guarantees that you continue to burn calories. Moderate exercise between classes and meals will work wonders. Even an activity as pedestrian as walking will not only keep your metabolism humming along, but it will also help relieve school-related stress (which can lead to ill-advised eating habits, both during and between meals). Just don't make a habit of walking directly to the cafeteria. Eating is also central to other quintessential college experiences, such as creating new social networks and/or dealing with stress. Social circles are often formed around the act of eating, whether during meals at the dining hall or munching in the dorm rooms (what college student hasn't enjoyed a late-night pepperoni pizza with friends?). The stress of academics -- or missing home, or social setbacks -- can also lead to nervous snacking. If you have a mini-fridge in your room, find a study hall or library to do your schoolwork, and avoid the temptation altogether. If you keep munchies in your room, make sure they have some nutritional value. When you eat is also important. Snacking after sundown (or gorging, if you've been out partying) is going to saddle your body with excess calories just before you go to bed. That's a sure-fire recipe for love handles. Instead, adhere to the time-honored maxim (generally attributed to American nutritionist Adelle Davis): "Eat breakfast like a king, lunch like a prince and dinner like a pauper." The concept is well-founded -- foods that you eat early in the day fuel your metabolism throughout the day. Those consumed late in the day, or at night, are more likely to be wasted and settle into fat stores. If you do snack, keep an eye on portions. Moderation, again, has always been important component to eating -- and "grazing." In fact, snacks or "mini-meals" every three or four hours or so can actually help curb your appetite and over-eating at mealtime, says Diekman. "The challenge is really learning how to incorporate healthy eating and exercise into a schedule that is very demanding," says Diekman [source: Mann]. Foods rich in protein, such as string cheese or nuts, can ward off hunger between meals. Diekman also suggests that college students avoid eating alone, as isolation can lead to eating disorders, such as anorexia and bulimia, which are the dark flipside to the freshman 15. Most institutions of higher learning have ample information on proper nutrition and smart eating habits. Avail yourself of these resources. After all, you're in college now. Be smart. Predictably, research indicates that college students don't get nearly enough sleep. How does that affect your waistline? Insufficient sleep can lead to an increase in ghrelin, a hunger-promoting hormone, and a loss of leptin, a hunger-suppressing hormone. Consider grabbing a nap [source: Salge Blake].
0.971278
Chocolate is as good for you as exercise, research suggests. Scientists found that small amounts of dark chocolate may improve health in a similar way to exercise. The researchers focused on the mitochondria, the tiny powerhouses in cells that generate energy, and discovered that a plant compound found in chocolate, called epicatechin, appeared to stimulate the same muscle response as vigorous activity. Dr Moh Malek, from Wayne State University in Detroit, who led the US study on mice, said: ''Mitochondria produce energy which is used by the cells in the body. More mitochondria mean more energy is produced the more work can be performed. A specific type of epicatechin from cocoa was given to mice twice a day for 15 days. At the same time, the animals underwent 30 minutes of treadmill training each day. Researchers found that mice only fed epicatechin had the same exercise performance as those running on the treadmill. The findings were published today in the Journal of Physiology. The scientists hope their research will lead to better ways of combating age-related muscle wasting. Middle-aged mice who both exercised and ate epicatechin showed an even greater benefit. ''It appears epicatechin treatment combined with exercised could be a viable means to offset muscle ageing,'' said Dr Malek. Scientists found that small amounts of dark chocolate may improve health in a similar way to exercise. The researchers focused on the mitochondria, the tiny powerhouses in cells that generate energy, and discovered that a plant compound found in chocolate, called epicatechin, appeared to stimulate the same muscle response as vigorous activity.
0.999956
@rowdy-rathore, at first they ran at full capacities for 3 minutes, then they ran at reduced capacities for 1 minute. Hence, they started again after 4 minutes. we can equate this with 8x. @rowdy-rathore 15 days a alone can do the job. last 3 days b did 3*2= 6 units of work. a nd b did 42-6=36 units of work together. @rowdy-rathore Can you please provide the solution to this question.
0.93927
Humans did not accelerate the decline of the 'Green Sahara' and may have managed to hold back the onset of the Sahara desert by around 500 years, according to new research led by UCL. The study by a team of geographers and archaeologists from UCL and King's College London, published in Nature Communications, suggests that early pastoralists in North Africa combined detailed knowledge of the environment with newly domesticated species to deal with the long-term drying trend. It is thought that early pastoralists in North Africa developed intricate ways to efficiently manage sparse vegetation and relatively dry and low fertility soils. Dr. Chris Brierley (UCL Geography), lead author, said: "The possibility that humans could have had a stabilising influence on the environment has significant implications. We contest the common narrative that past human-environment interactions must always be one of over-exploitation and degradation. "The fact that societies practising 'pastoralism' persisted in this region for so long and invested both economically and ideologically in the local landscape, does not support the scenario of over-exploitation. Our study shows that increasing human population and sustainable pastoralism did not accelerate—and may even have delayed—the decline of the 'Green Sahara'." Around 8,000 years ago, the Sahara wasn't desert, but instead was a vibrant ecosystem that supported hunter-gatherers and fisherfolk. The 'Green Sahara' - the colloquial term for the African Humid Period – was the period in which North Africa became much wetter than it is today thanks to a series of monsoons. As the Earth's orbit slowly changed, the rain started to reduce, and the vegetation started to die back. Around 5,500 years ago, the ecosystem in the Sahara went into a terminal decline towards the desert we have today. Pastoralism (nomadic or semi-nomadic cattle-herders) blossomed in the Sahara from around 1000 years before that collapse. Previous studies have put the blame for the collapse of the 'Green Sahara' onto these nomads who have often been marginalised in history, but this latest studies dispels that myth. The study uses a novel climate-vegetation model to determine whether the end of the African Humid Period occurred earlier than expected. The model keeps track of variables such as vegetation and rainfall, and other processes such as the amount of energy coming from the sun, and the amount of carbon dioxide in the atmosphere. The model found that the 'Green Sahara' should have collapsed earlier than it did. This suggests that pastoralists lasted longer than expected and the techniques they used helped them to adapt to the environmental changes. Dr. Brierley added: "Those places where pastoralists last longer are where there are more resources. It's a good adaptation to the climate change taking place at the time. There is now work today looking at what we can learn from nomadic pastoralists, such as selective grazing strategies, which can be applied to sustainable adaption to desertification that we expect from future climate change." Dr. Katie Manning (King's College London), concluded: "Despite the largely inhospitable conditions of the Sahara today, it is not hard to find evidence of human occupation from the last 11,000 years. Thousands of rock art sites illustrate a lush environment, large-game hunting and livestock herding. The spread of domestic animals across the Sahara occurred at a time of increasing climatic instability, and yet, these pastoralist populations thrived. "It is likely that strategies used by contemporary traditional herders, such as seasonal movement and selective grazing, were also used by these early pastoralists, helping to maintain an otherwise deteriorating ecosystem." Here we go with the models again. A puzzle, which was the cause & which was the result? It's nice that these researchers wish to be polite to modern pastoralists. A pleasant change from the utter contempt, smug, cocooned, entitled First Worlders usual treatment of the less affluent. The generalities in this study are reasonable. Even if only locally across the Sahara. Similar to the greater Gobi region & the North American Southwest. The Sahel, Arabia, the Yucatan, South America & Australia. All these deserts are the result of Human exploitation & thousands of years of using fire as a tool & a weapon. But not as simple as girdling & chopping down all the trees from horizon to horizon. Diminishing rainfall. I think the real key to causing a desert is the burning of the micro-biome. Across generations & centuries, for millennia. The micro-organisms in soil can only sustain so much trauma. Which supports the the theory that grazing cattle adding their droppings, revived grasslands. For a while. MCLD, would you deny the value of model airplanes, model rockets or even paper airplanes as a teaching tool? Many of the pioneers of aviation and now rocketry experimented with models. All the way back to Choe Mu-seon and Da Vinci. Now you may be better informed than Leonardo or for that matter, those wacky Wright kids? Your comment casts doubts if you are as smart as any of them. So to summarize. Are you going to insist that you should be handed the launch codes for a full-on Atlas rocket? Without a whole lot of education, training and an in-depth psych evaluation? Remember, man is the sole component of negative change, exofactors are nonplayers. Human populations were far too small to significantly affect plant cover during the North African wet phase. It only became an issue much later, well after natural climate changes led to a drying out of the region. My own study, the most comprehensive archaeological-historical review of the drying phase of the Sahara and other connected deserts of Arabia, Middle East and Central Asia, shows a general coordinated drying dominantly after c.4000 BC. Look up "Saharasia". This is a largely controversial and censored work, as it also documents a shift from peaceful to warlike conditions after that general marker date, in coordination with the climate shift. A natural climate shift, which severely affected humanity, not the other way around. James_D: "My own study, the most comprehensive archaeological-historical review of the drying phase of the Sahara and other connected deserts of Arabia, Middle East and Central Asia...This is a largely controversial and censored work" No peer-reviewed publication? Are you yet another unsung genius kept down by the scientific conspiracy? Yes, primitive Africans easily controlled global weather, but today's self-proclaimed 'scientists' can't even accurately predict the weather, let alone control it. rrwillsj, there's a HUGE difference between model airplanes, model rockets, or paper airplanes, and computer models. There's also a difference between "teaching tools" and science. Talk about someone who shouldn't have access to nuclear launch codes. Goodness, yours is a depth and breadth of stupidity rarely seen. Thankfully. rrwillsj, the reference by MCLoweDallas to "models" wasn't about using physical models for experimentation leading to full-scale devices, but using computer models and then claiming they show what actually happened. Apples and oranges. And at any rate, jumping to the notion of taking control of an Atlas rocket is preposterous hyperbole. Maybe you should work on your own intelligence a little more before snidely attacking that of someone else. Green global warming Marxists will jail you for suggesting this. Oh, Thrip_Buns, those aren't the MIB keeping you confined. Your caretakers are the Men In White. Better Luck on your next evaluation by the Psych Board! As for the rest of you whiners. I am baffled by your ignorance of the methodology for computer modeling/simulation. I suppose if you have never successfully managed a business? Planned a corporate or public event? Charity campaign? Election organizing? Church retreat? Multi-state family celebration? You never brain-stormed a school study-group project or social event? Never even planned a garden or a group hike/bike/canoe trip? To quote Van Voight: "The map is not the territory." Really?1? So you are not only home-schooled but kept locked in the basement? Or none of you have ever had a job more skilled than cubicle drone or bag-boy? So I'm guessing your knee-jerk rejection of scientific tools of computer simulations is? You are jealous that they get to play with shinier toys than your nurse allows you? Fascinating. The "increased desertification" idea was wrong, and now humans may have prevented some. Yes, it is called science. A useful tool - as the article show. If you don't like science, why bother reading about it? The article was about climate, which we can control - we are currently responsible for the rapid and hurtful global warming observed - not the weather. But maybe you were aiming at an anti-science, political, erroneous talking point? Such rambling is useless here. The evidence for that statement is sparse to non-existent. "We" are responsible? It is impossible to separate the human contribution to global temperatures from the natural contribution; just can't be done. The evidence suggests that the human contribution, indirectly through increased CO2 emissions, is overwhelmed by natural variation. Rapid? Ignoring the problem with poor siting of most weather stations that in fact measure the urban heat island effect generated by expansion of infrastructure, the global average temperature has increased about 1° C over the last century. There is only a century of "good" data so we have nothing to compare it to. The paleoclimate data doesn't have the temporal precision to tell if this rate is unprecedented. It likely isn't. Hurtful? In fact, the opposite is more likely; modest warming is more beneficial than harmful. aksdad, have you volunteered yet to assist in the continuing flooding from Hurricane Flo? It flows and it flows and it flows. You can come back on here and lie yourself blue in the face falsely claiming that Human activities do not worsen a natural disaster. None of us expect any better of you or the rest of the denier shills.
0.999949
AI could unlock immense potential for economic growth and development for the betterment of mankind, at least as far as its advocates are concerned. This assumes that the benefits of AI once fully implemented will be equally shared among all social classes across the entire world. Did all social classes and all nations advance equally because of the Scientific Revolution of the 17th century and the first Industrial Revolution in England in the 18thcentury? The rich-poor (northern Hemisphere vs. Southern Hemisphere) divide between northwest Europe, North America and Japan that were the core of the world capitalists system became more pronounced by continued scientific, technological, and industrial development. Scientific, technological, and industrial development under the capitalist system was hardly the solution for the lack of social justice, for widespread misery owing to poverty and disease, and lack of health and education among the poor. On the contrary, the advanced capitalist countries used technology as tools of exploitation of the Southern Hemisphere and AI technology will be no different.
0.977932
Can ladder PLCs be programmed as state machines? Has anyone programmed a state machine to operate equipment in a PLC environment such as Allen Bradley or Modicon? Did a state machine simplify the logic required or make it more complex? I can also almost guarantee that the program will be larger (have more rungs, I think you'd call it :-) than a program written optimally for the task at hand. However, the FSM approach has a huge advantage which makes the possibly larger code worth while: It follows a consistent pattern and can be mapped to a state diagram. A state diagram is a diagrammatic representation of what the system (or FSM subsystem) is to do. It very clearly defines how the system shall respond to a given input "event" in a given state. The state (where it is in the state diagram) fully expresses the significant aspects of past history. (If this diagram is a mystery to you, check out my tutorial on finite state machines). In ladder you would most likely represent N states with N latching relays, only one of which may be on at once. The ON relay enables a rung (or bunch of rungs) that express the "what to look for, what to do" of that state. Getting back to the state diagram: It is a graphical representation of the required behaviour. It exists at a higher level of abstraction than the ladder diagram. It is therefore more powerful for describing the behaviour (and for trouble shooting bugs). It is incidentally a lot easier to explain to a lay person than a ladder diagram (for the very reason it separates the functionality from the mechanics). Apart from being a very powerful concept, FSMs thus have the added power of reducing a broad range of problems to a single way of solving them. The better you become at applying FSM solutions, the less you will have to think about the mechanics and the more you will be able to concentrate on the required system behaviour. The ladder state diagram should always be the first port of call if a change is required. By studying the diagram you can easily locate the point where an incision needs to be made, then go from there to the ladder code and know you are cutting in exactly the right place. That is not the case for "clever" coding. The one disadvantage you may find in this (apart maybe from a larger program), is that the state diagram really needs to be stored with the ladder diagram for future maintenance. The connection between the two can be lost unless you are working in a well controlled, disciplined environment. You must also enforce the discipline that the state diagram is always referred to for changes, and of course updated. In summary, yes you can use FSMs in ladder PLCs. The code may become a little bigger, but the logic will not become more complicated, it will become more structured. A message from our sponsor: My company makes board level embedded controllers for OEM use. We use a proprietary text based language which, though not an FSM language as such makes it extremely easy to express FSMs. They also have a multitasking operating system that is very easy to understand and use. We do not at this time (October 2009) support relay ladder logic programming in our products. That does not preclude us doing so in future products. For more information about FSMs see Finite State Machine Tutorial. If you want to get started programming FSMs in ladder PLCs, this white paper goes into useable detail (pdf).
0.992736
The French Army marches through Berlin in 1806. The Fourth Coalition against Napoleon's French Empire was defeated in a war spanning 1806–1807. Coalition partners included Prussia, Russia, Saxony, Sweden, and Great Britain. Several members of the coalition had previously been fighting France as part of the Third Coalition, and there was no intervening period of general peace. On 9 October 1806, Prussia joined a renewed coalition, fearing the rise in French power after the defeat of Austria and establishment of the French-sponsored Confederation of the Rhine. Prussia and Russia mobilized for a fresh campaign, and Prussian troops massed in Saxony. Napoleon decisively defeated the Prussians in a lightning campaign that culminated at the Battle of Jena–Auerstedt on 14 October 1806. French forces under Napoleon occupied Prussia, pursued the remnants of the shattered Prussian Army, and captured Berlin on 25 October 1806. They then advanced all the way to East Prussia, Poland and the Russian frontier, where they fought an inconclusive battle against the Russians at the Battle of Eylau on 7–8 February 1807. Napoleon's advance on the Russian frontier was briefly checked during the spring as he revitalized his army. Russian forces were finally crushed by the French at the Battle of Friedland on 14 June 1807, and three days later Russia asked for a truce. By the Treaties of Tilsit in July 1807, France made peace with Russia, which agreed to join the Continental System. The treaty however, was particularly harsh on Prussia as Napoleon demanded much of Prussia's territory along the lower Rhine west of the Elbe, and in what was part of the former Polish–Lithuanian Commonwealth. Respectively, these acquisitions were incorporated into his brother Jérôme Bonaparte's new Kingdom of Westphalia, and established the Duchy of Warsaw (ruled by his new ally the king of Saxony). The end of the war saw Napoleon master of almost all of western and central continental Europe, except for Spain, Portugal, Austria and several other smaller states. The Fourth Coalition (1806–1807) of Prussia, Russia, Saxony, Sweden and Britain formed against France within months of the collapse of the previous coalition. Following his triumph at the Battle of Austerlitz and the subsequent demise of the Third Coalition, Napoleon looked forward to achieving a general peace in Europe, especially with his two main remaining antagonists, Britain and Russia. Meanwhile, he sought to isolate Prussia from the influence of these two powers by offering a tentative alliance, while also seeking to curb Prussia's political and military influence among the German states. Despite the death of William Pitt in January 1806, Britain and the new Whig administration remained committed to checking the growing power of France. Peace overtures between the two nations early in the new year proved ineffectual due to the still unresolved issues that had led to the breakdown of the Peace of Amiens. One point of contention was the fate of Hanover, a German electorate in personal union with the British monarchy that had been occupied by France since 1803. Dispute over this state would eventually become a casus belli for both Britain and Prussia against France. This issue also dragged Sweden into the war, whose forces had been deployed there as part of the effort to liberate Hanover during the war of the previous coalition. The path to war seemed inevitable after French forces ejected the Swedish troops in April 1806. Apart from some naval clashes and the peripheral Battle of Maida in southern Italy in July 1806, (though these actions are considered part of the tail end of the War of the Third Coalition) the main conflicts between Britain and France during the Fourth Coalition would involve no direct general military confrontation. Rather, there was an escalation in the ongoing economic warfare between the two powers. With Britain still retaining its dominance of the seas, Napoleon looked to break this dominance (after his defeat of Prussia) with his issuance of the Berlin Decree and the beginnings of his Continental System. Britain retaliated with its Orders in Council several months later. In the mean time, Russia spent most of 1806 still licking its wounds from the previous year's campaign. Napoleon had hoped to establish peace with Russia and a tentative peace treaty was signed in July 1806, but this was vetoed by Tsar Alexander I and the two powers remained at war. Though nominally an ally in the coalition, Russia remained a dormant entity for much of the year (giving virtually no military aid to Prussia in the main battles that October, as Russian armies were still mobilising). Russian forces would not fully come into play in the war until late 1806 when Napoleon entered Poland. All the participants of the War of the Fourth Coalition. Blue: The Coalition and their colonies and allies. Green: The First French Empire, its protectorates, colonies and allies. Finally, Prussia had remained at peace with France the previous year, though it did come close to joining the Allies in the Third Coalition. A French corps led by Marshal Bernadotte had illegally violated the neutrality of Ansbach in Prussian territory on their march to face the Austrians and Russians. Anger by Prussia at this trespass was quickly tempered by the results of Austerlitz, and a convention of continued peace with France was signed two weeks after that battle at Schönbrunn. This convention was modified in a formal treaty two months later, with one clause in effect promising to give Hanover to Prussia in exchange for Ansbach's being awarded to France's ally Bavaria. In addition, on 15 March 1806 Napoleon elevated his brother-in-law Marshal Joachim Murat to become ruler of the Grand Duchy of Berg and Cleves (acquired from Bavaria in return for its receiving Ansbach). Murat exacerbated Prussian enmity by tactlessly ejecting a Prussian garrison that was stationed in his newly acquired realm, prompting a stern rebuke from Napoleon. Relations between France and Prussia quickly soured when Prussia eventually discovered that Napoleon had secretly promised to return sovereignty of Hanover back to Britain during his abortive peace negotiations with the British. This duplicity by the French would be one of the main causes for Prussia declaring war that autumn. Another cause was Napoleon's formation in July 1806 of the Confederation of the Rhine out of the various German states which constituted the Rhineland and other parts of western Germany. A virtual satellite of the French Empire with Napoleon as its "Protector", the Confederation was intended to act as a buffer state from any future aggressions from Austria, Russia or Prussia against France (a policy that was an heir of the French revolutionary doctrine of maintaining France's "natural frontiers"). The formation of the Confederation was the final nail in the coffin of the moribund Holy Roman Empire and subsequently its last Habsburg emperor, Francis II, changed his title to simply Francis I, Emperor of Austria. Napoleon consolidated the various smaller states of the former Holy Roman Empire which had allied with France into larger electorates, duchies and kingdoms to make the governance of non-Prussian and Austrian Germany more efficient. He also elevated the electors of the two largest Confederation states, his allies Württemberg and Bavaria, to the status of kings. The Confederation was above all a military alliance: in return for continued French protection, member states were compelled to supply France with large numbers of their own military personnel (mainly to serve as auxiliaries to the Grande Armée), as well as contribute much of the resources needed to support the French armies still occupying western and southern Germany. Understandably, Prussia was indignant at this increasing French meddling in the affairs of German homogeneity (without its involvement or even consultation) and viewed it as a threat. Napoleon had previously attempted to ameliorate Prussian anxieties by assuring Prussia he was not adverse to its heading a North German Confederation, but his duplicity regarding Hanover dashed this. A final spark leading to war was the summary arrest and execution of German nationalist Johann Philipp Palm in August 1806 for publishing a pamphlet which strongly attacked Napoleon and the conduct of his army occupying Germany. After giving Napoleon an ultimatum on 1 October 1806, Prussia (supported by Saxony) finally decided to contend militarily with the French Emperor. Influenced by his wife Queen Louise and the war party in Berlin, in August 1806 the Prussian king Friedrich Wilhelm III made the decision to go to war independently of any other great power, save the distant Russia. Another course of action might have involved openly declaring war the previous year and joining Austria and Russia in the Third Coalition. In fact, the Tsar had visited the Prussian king and queen at the tomb of Frederick the Great in Potsdam that very autumn, and the monarchs secretly swore to make common cause against Napoleon. Had Prussian forces been engaged against the French in 1805, this might have contained Napoleon and prevented the eventual Allied disaster at Austerlitz. In any event, Prussia vacillated in the face of the swift French invasion of Austria and then hastily professed neutrality once the Third Coalition was crushed. When Prussia did eventually declare war against France in 1806, its main ally the Russians still remained far away remobilising. The electorate of Saxony would be Prussia's sole German ally. Napoleon could scarcely believe Prussia would be so foolish to take him on in a straight fight with hardly any allies at hand on its side, especially since most of his Grande Armée was still in the heart of Germany close to the Prussian border. He drummed up support from his soldiers by declaring that Prussia's bellicose actions had delayed their phased withdrawal back home to France to enjoy praise for the previous year's victories. Once hostilities seemed inevitable in September 1806, Napoleon unleashed all French forces east of the Rhine, deploying the corps of the Grande Armée along the frontier of southern Saxony. In a preemptive strike to catch the Prussians unaware, the Emperor had the Grande Armée march as a massive bataillon carré (battalion square) in three parallel columns through the Franconian Forest in southern Thuringia. Each corps would be in mutual supporting distance of each other, both within the column and laterally to the other columns (once through the difficult passage of the forest), thus allowing the Grand Armée to meet the enemy at any contingency. This strategy was adopted due to Napoleon's lack of intelligence regarding the Prussian main army's whereabouts and uncertainty over his enemy's puzzling maneuvers in their march to face him. The reason for this stemmed mainly from the mutual mistrust within the Prussian high command that had resulted in division among the Prussian commanders over which plan of action for the war would be adopted. Despite the deficiency in pinpointing the main Prussian army's exact position, Napoleon correctly surmised their probable concentration in the vicinity of Erfurt and formulated a general plan of a thrust down the Saale valley, enveloping the left flank of where he believed the Prussians were located and thus cutting off their communications and line of retreat to Berlin. In the first clash on 9 October 1806, a Prussian division was brushed aside in the Battle of Schleiz. The following day, Marshal Lannes crushed a Prussian division at Saalfeld, where the popular Prince Louis Ferdinand was killed. At the double Battle of Jena-Auerstedt on 14 October, Napoleon smashed a Prussian army led by Frederick Louis, Prince of Hohenlohe-Ingelfingen and Ernst von Rüchel at Jena, while his Marshal Louis-Nicolas Davout routed Charles William Ferdinand, Duke of Brunswick's main army at Auerstedt. At Jena, Napoleon fought only a contingent of the Prussian army. At Auerstedt a single French corps defeated the bulk of the Prussian army, despite being heavily outnumbered. Victory at Auerstedt was all but secured once the Duke of Brunswick (as well as fellow commander Friedrich Wilhelm Carl von Schmettau) were mortally wounded, and the Prussian command devolved to the less able King. Matters were worsened once the vanquished remnants of the Prussian army from Jena stumbled onto the clash at Auerstedt, further plunging the Prussians' morale and triggering their precipitous retreat. For this conspicuous victory, Marshal Davout was later created the Duke of Auerstedt by Napoleon. On 17 October, Marshal Jean-Baptiste Bernadotte (redeeming himself somewhat for his inexplicable absence from either battle on the 14th) mauled Eugene Frederick Henry, Duke of Württemberg's previously untouched Reserve corps at the Battle of Halle and chased it across the Elbe River. Some 160,000 French soldiers fought against Prussia (increasing in number as the campaign went on, with reinforcements arriving across the Wesel bridgehead from the peripheral theatre surrounding the recently formed Kingdom of Holland) advancing with such speed that Napoleon was able to destroy as an effective military force the entire quarter of a million-strong Prussian army. The Prussians sustained 65,000 casualties (including the deaths of two members of the royal family) lost a further 150,000 prisoners, over 4,000 artillery pieces, and over 100,000 muskets stockpiled in Berlin. The French suffered around 15,000 casualties for the whole campaign. Napoleon entered Berlin on 27 October 1806 and visited the tomb of Frederick the Great, telling his marshals to show their respect, saying, "If he were alive we wouldn't be here today." In total, Napoleon and the Grande Armée had taken only 19 days from the commencement of the invasion of Prussia until essentially knocking it out of the war with the capture of Berlin and the destruction of its principal armies at Jena and Auerstadt. Most of the shattered remnants of the Prussian army (and the displaced royal family) escaped to refuge in Eastern Prussia near Königsberg, eventually to link up with the approaching Russians and continue the fight. Meanwhile Saxony was elevated to a kingdom on 11 December 1806 upon allying with France and joining the Confederation of the Rhine, thereby leaving the Allied Coalition. In Berlin, Napoleon issued the Berlin Decree on 21 November 1806 to bring into effect the Continental System. This policy aimed to control the trade of all European countries (without consulting their governments). The ostensible goal was to weaken the British economy by closing French-controlled territory to its trade, but British merchants smuggled in many goods and the Continental System was not a powerful weapon of economic war. Towards the end of 1806, the French entered Poland and Napoleon Bonaparte created a new Duchy of Warsaw, to be ruled by his new ally Frederick Augustus I of Saxony. The area of the duchy had already been liberated by a popular uprising that had escalated from anti-conscription rioting. Napoleon then turned north to confront the approaching Russian armies and to attempt to capture the temporary Prussian capital at Königsberg. A tactical draw at Eylau (7–8 February) forced the Russians to withdraw further north. Napoleon then routed the Russian army at Friedland (14 June). Following this defeat, Alexander sued for peace with Napoleon at Tilsit (7 July 1807). Meanwhile, Swedish involvement was primarily concerned with protecting Swedish Pomerania. Despite being defeated at Lübeck, the Swedes successfully defended the fort of Stralsund during its first siege in early 1807. On 18 April, France and Sweden agreed to a ceasefire, which led to the withdrawal of all French troops. However, Swedish refusal to join the Continental System led to a second invasion of Swedish Pomerania led by Marshal Brune. Stralsund fell on 24 August after a second siege and the Swedish army surrendered at Rügen, completing the occupation of Swedish Pomerania. The resulting peace treaty agreed by Marshal Brune and Swedish general Johan Christopher Toll, however, allowed the Swedish army to withdraw with all its munitions of war. Following the Treaties of Tilsit, Britain and Sweden remained the only two major coalition members still at war with France. Russia soon declared war against Britain and after a British attack on Copenhagen, Denmark–Norway joined the war on the side of Napoleon (Gunboat War), opening a second front against Sweden. A short British expedition under Sir John Moore was sent to Sweden (May 1808) to protect against any possible Franco-Danish invasion. At the Congress of Erfurt (September–October 1808) Napoleon and Alexander agreed that Russia should force Sweden to join the Continental System, which led to the Finnish War of 1808–1809 (meaning Sweden played no role in the next coalition against Napoleon) and to the division of Sweden into two parts separated by the Gulf of Bothnia. The eastern part became the Russian Grand Duchy of Finland. Due to the Continental System, Britain was yet again still at war with Napoleon and was not affected by the peace treaty. In negotiations with captured Swedes after the Battle of Lübeck, Marshal Bernadotte first came to the attention of the Swedish authorities. This would set in motion a chain of events that eventually led to him being elected heir to the Swedish throne, and later King Charles XIV John of Sweden. As for the French, after the Treaty of Tilsit, the Empire was seemingly at its zenith. Flush with triumph and deeming France free from any immediate obligations in Central and Eastern Europe, Napoleon decided to capture the Iberian ports of Britain's long-time ally Portugal. His main aim was to close off another strip of the European coast and a major source for British trade. On 27 October 1807, Spain's Prime Minister Manuel de Godoy signed the Treaty of Fontainebleau with France, by which in return for the alliance and passage of French armies through its realm, Spain would receive Portuguese territory. In November 1807, after the refusal of Prince Regent John of Portugal to join the Continental System, Napoleon sent an army into Spain under General Jean-Andoche Junot with the aim of invading Portugal (as well as the secret task of being the vanguard for the eventual French occupation of Spain). Napoleon soon embroiled himself and France in Spain's internal power struggles within its royal family, eventually leading to the Spanish populace turning on the French occupiers and the beginning of the Peninsular War. ↑ Joined the Confederation of the Rhine on 11 December 1806. ↑ Maps of Napoleon's Campaign In Poland 1806–7. Frederick Kagan (2007). The End of the Old Order: Napoleon and Europe, 1801-1805. Da Capo Press. pp. 141ff. This page was last modified on 2 January 2016, at 10:44.
0.999973
Which jobs will AI (Artificial Intelligence) kill? AI was very popular 30 years ago, then disappeared, and is now making a big come back because of new robotic technologies: driver-less cars, automated diagnostic, IoT (including vacuum cleaning and other household robots), automated companies with zero employee, soldier robots, and much more. Will AI replace data scientists? I think so, though data scientists will be initially replaced by "low intelligence" yet extremely stable and robust systems. There has been a lot of discussions about the automated statistician. I am myself developing data science techniques such as Jackknife regression that are simple, robust, suitable for black-box, machine-to-machine communications or other automated use, and easy to understand and pilot by the layman, just like a Google driver-less car can be "driven" by an 8 years old kid. My approach to automating data science and data cleaning / EDA (exploratory data analysis) is not really AI: it's just a starting point, but not a permanent solution. In the long term, it is possible that AI will handle complex regression models, far more complex than my Jackknife regression: after all, all the steps of linear or logistics regression modeling, currently handled by human beings spending several days or weeks on the problem, involve extremely repetitive, boring, predictable tasks, and thus it is a good candidate for an AI implementation entirely managed by robots. As machine learning (ML) more and more involves AI, and the blending of ML and AI is referred to as deep learning, I can see data science evolving to deep data science (DDS) or automated data science (ADS), where AI, robots, or automation at large, take a more prominent role. Which jobs are threatened by AI? Teachers: some topics such as mathematics or computer science can be taught by robots, at least for the 10% of students that are self-learners. Generally speaking, topics that are currently taught by robots include flying a plane, training on an AI-powered simulator. Ironically, planes can be flew without human pilots, but studies have shown that passengers would be very scared to board a pilot-less plane. The biggest threat for teachers is not AI though, it is online training. Grading student papers, detect plagiarism. But students / authors are getting more sophisticated, using article-generating software powered by AI, to avoid detection. This could lead to an interesting war: AI robots designed for fraud detection fighting against AI robots designed to cheat. For publishers, automatically writing high-quality, curated articles in a short amount of time. An article such as this one is a good candidate for automated, AI-powered production. The first step is to identify articles that are good candidates (for curation) for a specific audience; this is also accomplished using AI. Can AI writes AI algorithms, or in short, can AI automate AI? I believe so; after all, I was one of the pioneers who wrote programs that write programs (software code compilers or interpreters also fit in this category). I guess this is just an extension of this concept. Automated diagnostic (or automated doctor, but also automated lawyer). I guess this will eliminate a small proportion of these practitioners. But what about a robot performing a brain surgery with higher efficiency than a human surgeon? Or a robot manufacturing an ad-hoc, customized client-specific drug for maximum efficiency? Automated chefs replacing expensive cooks in a number of restaurants. Or think about a McDonald restaurant where the only human is a security guard - everything else being outsourced to AI-powered robots, including cleaning, preparing food, delivering to customers, processing payments, filing tax returns and accounting, ordering from vendors, and so forth. This would require significant system-to-system communications, but I believe it is feasible. Automated policemen or soldiers is a source of concern, as you would have algorithms that decide who to kill or who to arrest. So this might not happen for a long time, though drones are replacing soldiers in a number of wars, and have the power to kill (based on some algorithm) with no one complaining about, as long as it is not happening in US. Terrorists might be attracted too by this type of technology. AI will be present in many IoT applications such as smart cities, precision farming, transportation, monitoring (detecting when an offshore oil platform is going to collapse), and so on. Many people talk about the threat of AI, but as of today, many jobs have already been automated, some more than 30 years ago. For instance, during my PhD years, a lot of data transited through tapes between big computer systems, and involved trips to the computer center, interacting with a number of people taking care of the data flow. This has entirely disappeared. We used to have shared secretaries to write research papers (they could write LaTeX documents), I think this has all but disappeared. One of the applications that I developed in the eighties was a remote sensing software that could perform image segmentation and clustering, for instance to compute the proportion of various crops in a specific area based on satellite images, without human interactions - thus eliminating all the expensive jobs that were previously performed by humans to accomplish this task. Those who automate data science are still data scientists. Just like those developing robots to automate brain surgery work in a team, with many members being brain surgeons. it's just shifting the nature of the job rather than eliminating it. The time span is important. As stated in the introductory para, 30 years of AI took back seat and now is getting revived. Was LISP / PROLOG which did not promote builtin library support that present day PYTHON offers the cause? AI needs processor hardware support, new processor architectures, soft computing hardware to scale the outlined indicatiobs in this article. Regarding IoT and AI revolutuin, the hardware is immediate need. Arduino, Intel Galelio, Raspberry Pi type of hardware platforms are just inadequate.Approximate Computing Hardware is the need of the hour to promote AI.
0.999894
What is the best internet provider in London? The lower-middle class residents of London enjoy short commutes. They work in both blue- and white-collar professions, primarily administrative support and food service. Residents largely use internet during their off hours. Compared with 66% of Kentucky, only 9% of London residents can access high-speed internet. Time Warner reaches 99% of London residents with cable internet. Windstream offer DSL services to 96% of residents. Fiber optics are not yet available, but residents can opt for satellite internet from HughesNet. Businesses in the area are even more limited in their high-speed options. There are no DSL services available for commercial connectivity.
0.999929
Report: Shots fired on North Charleston street | Crime Stoppers of the Lowcountry: 554-1111 | 1-888-CRIME-SC | Anonymous tips earn cash rewards with Crime Stoppers of the Lowcountry. NORTH CHARLESTON, SC (WCSC) - Neighbors in North Charleston reported hearing multiple gunshots fired early Thursday morning on Read Street. North Charleston Police Department officers responded to the 5600 block of Read Street around 12:45 a.m. and found four .45 caliber shell casings in front of a home. According to the incident report, neighbors reported hearing between four and six shots minutes earlier. A witness who was walking down Read Street at the time of the shooting said he "could hear bullets flying past his head" right before he took cover behind a nearby car. The witness said he saw what he thought was the suspect from a distance, but was not able to identify him or say which way he ran off. The report states another witness at a nearby gas station said she heard four gunshots and then heard someone scream "you missed me you (expletive) (expletive)." That witness said she did not see the person who screamed that. The shell casings were taken into evidence, police said.
0.998769
Plastic containers are virtually everywhere you go on planet earth. A majority of both industrial packaging and domestic packaging is done using plastics. Plastic containers are made from recycled waste materials. Recycling is the most effective method adopted by almost all companies manufacturing plastic containers. This is because, plastic containers are non-biodegradable; governments the world over have enacted stringent rules on the use and disposal of plastic materials. How to make plastic container, is, may be, the most asked question among entrepreneurs who would like to start plastic container manufacturing plants. Making of a plastic container is a chemical process involving several reactions. The procedure used, depends on what the final product is supposed to contain. There are different microns of thickness set by the regulatory authority on the size of containers. What did the first manufacturers of plastic use to manufacture the first plastic containers How to make plastic containers without necessarily recycling involves the use of oil and natural gas. Additionally countries that have coal deposits can use it as an additional ingredient. Making plastic containers from recycled plastic materials is less expensive than making from making plastic containers from natural products. The first step is to classify the materials that are to be recycled. This is done in terms of the different microns that each packaging material is supposed to have. After classification, the materials sorted out are washed and sterilized before they are put into the recycling process. How to make plastic containers involve putting together, chemically, through a process of chain reactions elements such as polyvinyl chloride PVC as well as high density polyethylene and polyethylene terephthalate. Our environment is very important. Our environment determines a lot in our day today lives. It is therefore very essential that we conserve our environment to the best of our abilities. The inhabitants our beautiful planet earth should be sensitized on how to make plastic containers from recycled waste materials. It is certain that the use of plastic containers will not cease in the near future. It is therefore quite responsible to use recycled materials to make plastic containers. This will go a long way in ensuring that our eco-system is not choked by materials that we can otherwise responsibly dispose off. Other than plastic containers such as fresh drinks bottles, cooking oil containers, engine oil and other petroleum products containers, plastic recycled waste materials can be used to manufacture some home accessories for example floor coverings, clothes and even shoes.
0.951741
hay fever 花粉症対策 My least favorite part of Japan has to be the allergy season... which for me is from March to early May, but longer or shorter for others depending on what you're allergic to, obviously. Probably because of the crazy number of Japanese sugi trees スギ planted, the pollen count is just ridiculous! Even though I have hay fever 花粉症 in other countries too, my first year here, I remember waking up at night because I was gasping for breath, unable to keep my airway open while asleep! That's how bad it was. For me, the Japanese cypress ヒノキ season that follows the Japanese sugi season isn't as bad/long - you can check the pollen forecast by region at 花粉飛散予測. You can also check hourly pollen forecast during hay fever season. Buying over-the-counter drugs wasn't effective for me, plus the pharmacists make you go through an actual binder full of information before they're allowed to sell the medicine to you. Pulling the gaijin card of "I don't understand" doesn't work because they will insist that if you don't understand, you are not permitted to buy it. I wonder if people actually do hay fever drugs recreationally? Following a Japanese friend's advice, I went to the hospital for cheaper and way more effective prescription medicine and got Allelock アレロック... these tiny pink pills have been the only effective meds for me so ask your doctor about it! The catch is, it makes you super sleepy all day, but nothing a little coffee won't fix I guess... and long naps! All my symptoms were gone after taking the prescription medicine, unlike all the other allergy drugs I have taken over the years... so being a sleep-walking zombie for a couple of months seems like a small price to pay. For safe measures, I still use hay fever goggles and a variety of other products to block the pollen from entering my system, the effectiveness of which are debatable - but better safe than sorry, amiright?! Let's look at some of these products, shall we? eye drops, nose cream & spray There are a few brands of these tiny tubes of clear cream that are supposed to block pollen from entering, well, your nose. You apply a tiny bit inside your nostrils and it provides instant relief if nothing else. Some you can smear around your eyes as well. It's the tiny white and blue one in the photo. This brand of anti-itch eye drops really works for me! There are 2 types, one stronger than the other - again, instant relief to keep you from scratching your eyes out. The eye wash helps and mostly just makes me feel better 'cause I can imagine it getting rid of all the pollen irritating my eyes. drawings explain it all Now, I really doubt if this face spray does anything, but what the heck! Just in case, right?! It's supposed to create an "ion" coating around your face, whatever that means. If anything, I find the idea hilarious. I suppose it's better than the aromatherapy room sprays you can get since it's refreshing, doesn't smell, and isn't too pricey at about 1000 yen per bottle - use it like a toner. nettle tea / soba tea A student told me he was off the allergy meds after having this German chrysanthemum tea... I looked it up online and it seems a bit on the pricey side so I've got some mint/nettle herbal tea and soba tea which are supposed to help! Tiny red bottles of L-92 yogurt drinks sold at supermarkets are also supposed to help (L-92 乳酸菌 in table form is available online)... and strawberries apparently. I ate a lot of strawberries last hay fever season but not really sure it helped, but they were delicious anyway! t h i s a c t u a l l y w o r k s ! This year, 2018, you can occasionally find these super pricey masks in select drug stores and Tokyu Hands 東急ハンズ. The weakest potency, which is a 4+ didn't really do too much for me - maybe slightly better than a regular mask that just blocks out some of the pollen you breath in, but much more expensive at 3 for 1000 yen. 3 "strengths" available Today I tried the strongest one, 10+, out all day and much to my surprise, it really works! My eyes aren't even itchy (first time in the whole month of March)... so I guess it works! I find that it does still fog up glasses though, despite what it says on the package. If you've got really bad hay fever, I recommend trying it - it can be worn over 7 days apparently so might just be worth it. I bought a sample pack of 1 that came with a small towel for 1000 yen but they're normally 4 for 4000 yen... yikes!
0.999597
Is a solo piano CD of timeless pieces ranging from a mix of classical to contemporary sounds. Each piece was improvised and recorded over a period of about a year in 2008. Impromptus Volume 1 is a solo piano CD of timeless pieces ranging from a mix of classical to contemporary sounds. Songs range from picturesque soundscapes, to pieces that are colorful, unpredictable, and unstructured. The CD as a whole, is full of color and rich in textures with an array of different musical ideas spurring from the mind of Thad over a full year of writing and improvising. By definition an impromptu is a musical composition or performance with little or no previous preparation, such as an improvisation. Although there is generally no form or structure associated with an impromptu, it did in the 19th Century become a term used for compositions with clear-cut forms, such as ternary and rondo. Pieces such as Four Impromptus, Op. post. 142 (D. 935) by Schubert, and impromptus by Chopin and Liszt, often used some form or structure. Thad’s impromptus typically have very little to no form or structure, and are created by simply hearing or briefly playing a melody or musical idea, then improvising through the piece while beginning the recording process. Each piece is then completed primarily with little or no preparation. Thad typically spends several hours a week practicing improvisation, and recording his sessions as he practices, which in-turn have produced the impromptus created so far.
0.998042
How should I handle fraudulent charges or disputes? Your payment processor handles any payment disputes related to your store, not Squarespace. If a customer reports a fraudulent charge, if you suspect fraudulent activity, or if your payment processor flagged a charge as fraud, contact Stripe or PayPal directly. You can also review Stripe or PayPal’s tips for preventing disputes and fraud. If the customer requests a refund for a charge they recognize, you can refund the order in Squarespace. If the purchase is for a subscription product, you may also want to show the customer how to cancel their subscription.
0.909794
Need a risk management plan for an information management project and want some practical suggestions to ensure rapid project delivery? A risk management plan defines the process that will be followed to identify and resolve project risks. Issues are risk events or risks, which have occurred, and require resolution to minimize the impact to project objectives. Suppose you are planning a vacation. You are going to fly to the west coast, rent a car for two weeks, travel a bit and then return. You heard that your airline might go on strike. This is a risk! You know that it might happen and you now have a chance to mitigate the risk. You might decide to minimize the risk by investigating train schedules, or other airlines, or car rentals. If a strike occurs, you can still go and achieve your objectives of having a good vacation. Now suppose you fly to the west coast as planned and the airline goes on strike before you can return. You now have an issue that you must resolve. So how do we manage risk? A good risk manager will be constantly aware of project risks that might occur and will attempt to have a mitigation strategy ready in the event that the risk becomes an issue. What should we document in a risk management plan? The escalation path for resolving a risk. Process, the team is not fully versed in the process or it may change causing issues. Team experience, lack of experience on process, methodology or tools may cause delays. Economy, may dictate reduced resource levels. Vendor-vendor relations may impact project communications. Issues are risk events or risks, which have occurred and require resolution to minimize the impact to project objectives. A good risk management plan will ensure that all risks are reviewed and mitigated before they become an issue.
0.999597
The holiday season provides so many opportunities to make pretty food! If red and green make you feel all warm and tingly inside, you are in luck today :) I was lucky enough to receive a sample of Enjoy Life sugar cookies, and have been having a wonderful time incorporating them into all kinds of desserts. We're big fans of the Enjoy Life brand around here... everything we've tried has tasted delicious, and the texture is just right, which can't be said about every allergy-free brand of food. I know there is a large faction of cooks out there who are adamant about using only "real food" in their dishes, but I'd like to make a pitch for moderation on that point. I completely agree that many processed and packaged foods contain unhealthy ingredients, but I'm finding that there is a real surge of new companies that are creating healthy and allergen-free foods that I would be a fool not to take advantage of. Cooking absolutely everything from scratch is tiring. Very tiring. Burnout is a real possibility, and if your choices are use shortcuts or give up altogether, I vote for using the shortcuts. There are certainly companies out there whose products I don't feel comfortable eating (gluten-free breads full of chemical substitutes, for example), but I was very happy when I read the ingredient list on the Enjoy Life cookies: Brown and white rice flour, buckwheat flour, millet flour, palm oil, cane sugar, evaporated cane juice, honey, natural flavors, vanilla, salt, baking soda, xanthan gum, sodium acid pyrophosphate (the acid in baking soda), and rosemary extract. Enjoy Life products are free of wheat, dairy, peanuts, tree nuts, egg, soy, fish and shellfish, casein, potato, sesame and sulfites, and are made in a dedicated nut- and gluten-free bakery. If they're made with healthy ingredients, are allergy-free, taste good and allow my family to eat a wider range of dishes, what's the problem? To make the pudding layer, combine rice milk, sugar, arrowroot starch and salt in a medium saucepan over medium heat. Bring to a boil, stirring often, then let cook one additional minute. Remove from heat and add either vanilla or peppermint flavoring. Set pot right in fridge to cool for about 1 hour. Meanwhile, crumble the cookies into fine crumbs. When the pudding is cool, layer cookies, pudding and cherries in parfait glasses. You may want to also add red decorator sugar, but remember that many of these contain harmful artificial colors (check your local health food stores for options). Store in the fridge and serve cold. Note: Decorator sugar tends to bleed colors into your food, so if you do decide to use it, eat your parfaits right away before they turn all pink. Shared with Passionately Artistic and Real Food Wednesday at Kelly the Kitchen Kop and Gluten Free Wednesday at The Gluten Free Homemaker and What's Cooking Wednesday at Turning Back the Clock and These Chicks Cooked at This Chick Cooks and Success U at The Stuff of Success and The Homemaking LinkUp at Raising Homemakers and Link and Bake Christmas Recipes at Joy of Desserts and The Homestead Barn Hop at the Prairie Homestead and This Week's Cravings at Mom's Crazy Cooking and Slightly Indulgent Tuesday at Simply Sugar and Gluten Free and Crazy Sweet Tuesday at Crazy for Crust and Show Off Your Stuff at Fireflies and Jellybeans and Creative Juice at Momnivore's Dilemma and Pennywise Platter at Nourishing Gourmet and Weekend Wander at While He Was Napping and Wellness Weekend at Diet Dessert and Dogs and Anything Goes at Bacon Time and Farmhouse Friday at LaurieAnna's Vintage Home and Allergy Friendly Friday with Cybele Pascal and Seasonal Inspiration at Crumbs and Chaos and Sweets for a Saturday at Sweet as Sugar Cookies and Weekend Wrap Up at Tatertots and Jello and Christmas in the Kitchen At The Picket Fence and A Themed Baker's Sunday at Cupcake Apothecary and Fusion Friday at Jane Deere and Healing with Food Friday. and Allergy Free Wednesday. Oh my! This sounds sooo good!! How pretty! They look tasty too. Those are very pretty and look so good! I agree, taking the help where you can get it is the best way sometimes. I love to bake from scratch, but sometimes using a cookie or a mix is just the right thing to do. Thanks for sharing on Crazy Sweet Tuesday! These are pretty and look delicious! Thanks so much for sharing! I very well may use this sometime. That's a really beautiful dessert and photo too. Job well done. I featured your recipe for this week's Monday, Mmm ... Dessert. Congrats! You were featured on this week's Themed Baker's Sunday. Come by and grab a 'I was Featured' Button and join the next linky party this Sunday where the theme is Citrus's! Hope to see you there. So pretty. This will be a featured post at Healing With food Friday this week.
0.999993
How can Stellar Physical Therapy help? Your Physical Therapist at Stellar Physical Therapy can help you to manage your injury, reduce the pain and swelling associated with acute injures, and can give you exercises to increase strength, and restore mobility and function. Exercise plays an important role in the recovery process. Exercise helps to maintain the motion at the injured area, promotes fluid reabsorption and prevents stiffening of joints. Your Physical Therapist can also educate you on returning to work and ergonomics, and can help develop progressive exercise programs aimed at work conditioning.
0.999987
Definiteness = Mind made up; Desire; persistence; not vague. Hebrews 10:21-24 (KJV) – 21And having an high priest over the house of God; 22Let us draw near with a true heart in full assurance of faith, having our hearts sprinkled from an evil conscience, and our bodies washed with pure water. 23Let us hold fast the profession of our faith without wavering; (for he is faithful that promised;) 24And let us consider one another to provoke unto love and to good works. The Hebrew writer is calling out the church to get active. He gives us a three-step trigger so that we will be armed to live an On Purpose Life. Summed up in a short sentence: Get close to God – Stay close to God. Hebrews 4:16 (NIV) – Let us then approach the throne of grace with confidence, so that we may receive mercy and find grace to help us in our time of need. Psalm 73:28 (Amp) – But as for me, it is good for me to draw near to God; I have made the Lord God my refuge and placed my trust in Him, That I may tell of all Your works. Romans 10:1-2(NIV) – 1Brothers, my heart’s desire and prayer to God for the Israelites is that they may be saved. 2For I can testify about them that they are zealous for God, but their zeal is not based on knowledge. Notice: It is possible to have zeal for God and be lost. James 4:8 (Amp) – Come close to God [with a contrite heart] and He will come close to you. Wash your hands, you sinners; and purify your [unfaithful] hearts, you double-minded [people]. The priests who served in the Temple had to wash their hands and feet before entering the Holy Place. Drawing near is to become clean to live an on Purpose life. The Hebrew writer uses as similar phrase five times before this. They were tempted to drift from the truth and live a compromising life. Titus 1:16 (NIV) – They claim to know God, but by their actions they deny him. They are detestable, disobedient and unfit for doing anything good. 1 Timothy 6:12 (NIV) – Fight the good fight of the faith. Take hold of the eternal life to which you were called when you made your good confession in the presence of many witnesses. Your confession (profession) of faith is not simply letting others know that you believe. Confession of faith means you also let others know what you believe. We must continue, steadfast and unshakable in the faith we profess to have. Hebrews 10:24 (NIV) – And let us consider how we may spur one another on toward love and good deeds. It’s a word that calls every child of God to live very specific with other believers. Jesus said: John 13:35 (NIV) – By this all men will know that you are my disciples, if you love one another. Paul said: Galatians 6:10 (NIV) – Therefore, as we have opportunity, let us do good to all people, especially to those who belong to the family of believers. Philippians 2:1-4 (NIV) – 1If you have any encouragement from being united with Christ, if any comfort from his love, if any fellowship with the Spirit, if any tenderness and compassion, 2then make my joy complete by being like-minded, having the same love, being one in spirit and purpose. 3Do nothing out of selfish ambition or vain conceit, but in humility consider others better than yourselves. 4Each of you should look not only to your own interests, but also to the interests of others. 1 Peter 1:22 (NIV) – Now that you have purified yourselves by obeying the truth so that you have sincere love for your brothers, love one another deeply, from the heart. Hebrews 10:25 (NIV) – Let us not give up meeting together, as some are in the habit of doing, but let us encourage one another – and all the more as you see the Day approaching. That’s why it’s important not to miss going to church and home cells. These are great places for encouragement. Giving special attention to our brothers and sisters circumstances, trails, temptations, weaknesses and needs. We need to “fire each other up” or prod one another. These 3 Triggers must be implemented because they affect the quality of a person’s relationship with God. We understand we cannot do it without the help of the Holy Spirit’s power in us. These responsibilities are interwoven – when you drop the ball on one of them, then you probably are dropping the ball on all of them. Corporately we need to keep meeting together regularly. We must watch out for those who need their faith strengthened, their obedience made complete, and their love made more perfect, their good works increased.
0.999973
When a person loses a loved one , they go through a normal process called grieving. Grieving is natural and should be expected. Over time, it can help the person understand their loss. Bereavement is what a person goes through when someone close to them dies. It is the state of having suffered a loss. Mourning is the outward expression of loss and grief. Mourning includes rituals and other actions that are specific to a person’s culture, personality and religious beliefs. Bereavement and mourning are both part of the grieving process. Grieving involves many different emotions, actions, and expressions, all of which help the person come to terms with the death of a loved one. But please keep in mind that grief does not look the same for everyone and every loss is different. Grief is not a single instance or a short amount of time that is filled with sadness or pain in response to loss. Grieving involves an entire emotional process of coping with loss and can last a long time. Although grieving is painful, it is important that someone who has experienced a death be supported throughout the process. To the person that is experiencing grief, it may feel more like a wave, it comes and goes, and may even be triggered by anniversaries, birthdays, and other milestones in a person’s life.
0.99961
What does marriage have to do with love? I know that as an institution, marriage may not have anything to do with love, that it is a way for the systems of society to control how people relate to one another and that at worst it can be a means for people to control each other. For a long time I did not want to get married, I did not know many married people among my peers and it is only recently that I have begun to be invited to the weddings of my friends. It seems now is as good a time as any to reevaluate this coupling off and creation of legal connections between people. At best, when couples decide to be monogamous, to commit themselves to each other, to love one another and ensure that they act responsibly so as not to hurt one another (or anyone else for that matter) something beautiful happens. Their love does not close them off to the world, but rather enables them to act more fully in it. They support each other in being the best individuals they can be and in creating a better world around them. For this to happen however, it does not mean that they need to get married. And yet, there is something that I do find romantic about getting married. Maybe it is the statement of the above intention. The fact that those getting married are willing, confident and courageous enough to commit their lives to something greater than themselves. For this to be the case though, there must be an acknowledgment that the union is not solely about the couple, but about their families, communities, those that they love and serve and the world as a whole. Too often marriage can become a narcissistic act. A spectacle of "love" that is not really about commitment and genuine emotion, but about property and ownership over one's partner and the family that they may create. I do not think that any of the people I know and care about are doing this. I would hope not, but I feel that this is often what is presented in reality tv shows, sitcom marriages, many celebrity couplings and relationships where people pair off because it is what is expected of them and they didn't have the imagination to consider any alternatives. If I ever do get married it will be because I have found someone that I can grow with, someone who is willing to change and let me change, who understands the connection between our own love and the love we each hold for the rest of the world. It will be something that deepens my connection to nature, other people and myself. Recently I attended a friend's wedding and the part of the vows that hit me as being a really important part of any relationship was something like - I promise to take care of myself so that I have the health necessary to love and care for you. It reminds me of one of the things that I learned very quickly when beginning to work with youth and in community. If I am not taking care of myself then I am not going to do my students or my community any good, but if I do take care of me, I have the ability to care for so much more than myself. It is the same with love, if we love ourselves, if we find a partner that we love, it intensifies and strengthens our love for everything else. Marriage can be a radical act because love is a radical act. Love based on mutual respect and on respect for others and the world is incredible. In order to find it though, one has to open one's heart and risk the possible pain of hurt and joy, be willing to care for and heal one's hurts and find a partner that is doing the same.