text
stringlengths
8
5.74M
label
stringclasses
3 values
educational_prob
sequencelengths
3
3
Tuesday, March 6, 2007 KVM: Kernel-based Virtual Machine for Linux OK, I'm impressed...I have tried a lot of virtualization "solutions" but this time I'm really impressed.KVM (abbreviation of Kernel-based Virtual Machine) work fast, installed in less that 5 minutes and really easy to manage. And the best part is, that every virtual machine is just a process on the host. You can monitor (top) and/or kill it in a sec...While still in the early development stages, KVM shows a real potential. I even can say that I have enjoyed "playing" with it.
Mid
[ 0.6423357664233571, 33, 18.375 ]
Category: Sportpax The Sportpax football and rugby ball backpacks have bounced their way into a range of regional titles, featuring as the perfect school accessory for all sports-mad children. Stand out from the crowd and fit in your daily essentials, from your sports kit to your packed lunch! With the Rugby World Cub Final just around the corner, get ready to show your support with one of the brilliantly designed rugby backpacks from Sportpax. The perfect accessory to complete a sporty wardrobe! We are absolutely thrilled to be working with Sportpax and their iconic sport backpacks. It is therefore no surprise that our product of the week is the perfectly practical 3D Football Backpack that has been created with space to fit a child’s daily essentials and even a child-size football! A winning accessory for all football fans, this would make the perfect Christmas gift for all sports-mad children!
Mid
[ 0.6425120772946861, 33.25, 18.5 ]
Evaluating the potential for conservation development: biophysical, economic, and institutional perspectives. The widespread conversion of rural land to low-density residential development poses an immediate threat to biodiversity and to the provision of ecosystem services. Given that development will continue and environmental stakes are high, analyzing alternative growth strategies is critical. Conservation development is one such strategy that has the potential to benefit ecosystems and diverse stakeholders including developers, homebuyers, governments, and society as a whole. Conservation development clusters homes on one part of a property to manage the most ecologically important land for the conservation of biodiversity and ecosystem services. We draw on lessons learned from landscape ecology, open-space development, and regional planning to weigh the biophysical, economic, and institutional evidence for and against conservation development. Conservation development offers many potential environmental and economic advantages: relatively high home values and appreciation rates, lower development costs, and social and ecological benefits to society including landscape connectivity, protection and active stewardship of important ecological assets, and the maintenance of ecosystem services. But this approach also has shortcomings: it may require enlightened institutional regulations and regional planning (and/or ecologically aware developers), it is not always more profitable than conventional development and thus may require subsidies or incentives, and additional research is required to fully understand its benefits and drawbacks. With more information on the effects of clustering, the development of flexible zoning laws, and effective regional planning, conservation development could be a viable strategy for sustaining biodiversity and ecosystem services in changing landscapes.
High
[ 0.669950738916256, 34, 16.75 ]
Q: comparing modem.oqpsk probability error and ber hi currently i have the following code in my matlab values = [0;1;0;0;1;0;1;0]; % can contain only 0s and 1s h = modem.oqpskmod; y = modulate(h, values); g = modem.oqpskdemod(h); z = demodulate(g,y); BER = sum(logical(values(:)-z(:)))/numel(values);% thanks to gnovice! now my question is how can i compare this BER to the Probability Error of the OQPSK? A: After you've run a number of different sets of values through the modulation/demodulation process above, the resulting average BER measure is an estimate of the bit-wise probability for an error to occur. Perhaps you are wanting to compare the above estimate to an actual derived formula for what the expected error rate is? This Wikipedia page says that the probability of bit-error for QPSK (and I assume also for OQPSK) is given by the formula: Pb = Q(sqrt(2*Eb/N0)); where the function Q and the parameters Eb and N0 are described here.
Mid
[ 0.61, 30.5, 19.5 ]
DESCRIPTION: The long-term goal of this revised research proposal is to determine the specific mechanisms by which progesterone mediates neuronal rescue and recovery of function in traumatic brain injury (TBI); the major cause of death in young adults under the age of 35. These findings will be employed in the evaluation of progesterone as a safe and effective treatment for TBI. Progesterone has recently been classified as a neurosteroid because it is also synthesized in astrocytes and oligodendrocytes in the brains of both males and female, where it may play other roles than that of a sex hormone. Previous research has already shown that systemic injection of progesterone in laboratory rats can reduce some of the neuropathological consequences of TBI and enhance behavioral recovery of function. Progesterone treatments reduce cerebral edema dramatically in both males and females when administered within 24 hours of the injury. This is one type of protective effect that can lead to reduced neuronal death and improved functional outcomes. The primary goal of the current proposal is to understand better the physiological mechanisms by which progesterone mediates its neuroprotective actions. We propose a series of 4 Aims using both in vitro and in vivo models of neural injury to determine: (1) if progesterone exerts its effects via its specific receptors. This will be studied by co-administering the hormone with ORG31710, a known progesterone receptor antagonist, or substituting progesterone with an agonist that cannot be metabolized (R5020) in both in vivo and in vitro models of TBI; (2) if, in an in vitro model of injury, progesterone's short-term neuroprotective effects are mediated specifically via sigma receptors; (3) if progesterone will prevent loss of mitochondrial function by reducing oxidative stress initiated in both in vivo and in vitro models of TBI; and (4) if progesterone will reduce the destructive aspects of the inflammatory immune reaction that occurs after TBI. The combination of in vivo and in vitro models will provide parallel evaluation of the mechanisms of progesterone's action. The research proposed here will help to determine whether progesterone can be used as a low-cost, safe and effective therapeutic agent in the acute stages of CNS injury. Furthermore, the detailed assessment of progesterone's mechanisms of action will provide a foundation for the intelligent design of artificial therapeutic pharmaceuticals.
High
[ 0.723346828609986, 33.5, 12.8125 ]
[Diagnostic imaging in hepatosplenic candidiasis]. Hepatosplenic candidiasis is a severe complication encountered in immuno-compromised patients. Different imaging techniques can establish the diagnosis. After an introduction to the pathophysiological and clinical principles, the role of plain radiography, radionuclide scans, ultrasound, computed tomography and magnetic resonance imaging is discussed.
High
[ 0.719640179910045, 30, 11.6875 ]
package cc.mrbird.web.controller; import org.springframework.security.core.Authentication; import org.springframework.security.core.context.SecurityContextHolder; import org.springframework.web.bind.annotation.GetMapping; import org.springframework.web.bind.annotation.RestController; @RestController public class TestController { @GetMapping("hello") public String hello() { return "hello spring security"; } @GetMapping("index") public Object index(Authentication authentication) { // return SecurityContextHolder.getContext().getAuthentication(); return authentication; } }
Low
[ 0.524296675191815, 25.625, 23.25 ]
Q: Bricked Nexus 7 in Recovery Mode I have a Nexus 7 2012 grouper in recovery mode (TWRP). I have wiped the /system /cache and /data partitions and believe it has wiped the /boot partition. When I go to file manager, it says the /boot folder is empty. I don't want to reboot the device because it may render it unusable. What should I do? A: Download the factory image for your device here: https://developers.google.com/android/nexus/images Follow the instructions at the top of the page to flash. Note that the WIFI and Mobile versions have different images. Make sure to use flash-all otherwise the bootloader and radio will remain the same and the images won't flash. Another option if you want to keep your ROM would be to download the factory image for the version you have on the device and flash only the boot.img using fastboot flash boot boot.img instead of flash-all. That should restore your boot but you have to know which version you have on the device.
High
[ 0.661458333333333, 31.75, 16.25 ]
Q: Dynamically loaded input field on click? At the moment I have a list of strings I am getting from the database. I then loop through these strings with a foreach statement and print them within their own <li></li>. When I click on a <li> I have a jQuery event which triggers. It gets the string from within the <li></li> and places it within an input field value, up until now it still works fine. Though, when I click within the input field the text value disappears and also I am unable to get the input field to focus and it doesn't allow me to type. My questions are: why is my input value disappearing and why is it not allowing me to type anything within the input field? Code below: HTML before click <li id="list_item-47" class="sortableList" data-id="47"> The Title <br> <br> </li> HTML after click <li id="list_item-47" class="sortableList" data-id="47"> <input type="text" class="inputField" value="The Title"> <div class="updateLink" data-id="47"></div> </li> HTML after focus <li id="list_item-47" class="sortableList" data-id="47"> <input type="text" class="inputField" value> <div class="updateLink" data-id="47"></div> </li> jQuery: $(".sortableList").on("click", function(event){ event.preventDefault(); var list_item = $(this).text(); var data_id = $(this).data('id'); $(this).html('<input type="text" class="inputField" value="' + list_item + '"></input><div class="updateLink" data-id="' + data_id + '"></div>'); return false; }); Any help is greatly appreciated. A: The input is disappearing because the input that you create is within a .sortableList span, and that span has a click event attached to it. So when you click on the input, you're triggering the click event, which replaces the contents of that li with an empty text box. A quick fix would be to add this inside your click function: $(this).off('click'); http://jsfiddle.net/8D9VY/ You'll still need to handle what when you want to save what's in the text field, though, and then turn that click event back on if you want to modify the value again...
Mid
[ 0.643391521197007, 32.25, 17.875 ]
Instagram Goodreads lookin’ for clues We’re watching Blue’s Clues this morning, since we have the posh Digital Cable and can finally appreciate the brain-expanding goodness that is Noggin. Only it isn’t the real Blue’s Clues. There is no stripey-shirted Steve. There is only “Joe.” I do not believe in “Joe.” When Steve talks to the screen, he seems sincere, if unnaturally childlike. “Joe” comes across as rather smarmy, like the uncle who insists he’s really good with kids because he took three ECD classes when he was in college. “Joe” says “You’ll help us, won’t you?” and instead of sounding engaging and friendly he sounds like he’s trying to convince the kids that scrubbing the kitchen floor would be really fun. I do not like “Joe.” Ellison, however, is not picky (at least where the Joe/Steve continuum is concerned). He’s in his bouncer, kick-kick-kicking his little legs. He has the cutest, fattest little legs. There are fat folds where there aren’t even folds. I just want to eat them up. Ditto his arms, his cheeks, his scrunched-up neck…basically I want to eat the kid. Is that so wrong? Last night I was talking to Matt about the baby. “I just want to keep him forever,” I said. “You get to,” Matt said. “He’s always going to be your baby.” “No. I get to keep you forever. Ellison I only get for a little while. Then he’s going to belong to himself.” It’s not that I want to infantilize him…but I’m going to miss all this when he’s big enough to be on his own. I waited so long for a baby and I love watching him grow, but a pause button would be really, really nice.
Low
[ 0.508771929824561, 29, 28 ]
David Jackson USA TODAY Donald Trump appointed campaign manager Kellyanne Conway as his White House counselor on Thursday, and tapped long-time Republican Party spokesman Sean Spicer as the next White House press secretary . Conway "has been a trusted adviser and strategist who played a crucial role in my victory," Trump said in a statement. "She is a tireless and tenacious advocate of my agenda and has amazing insights on how to effectively communicate our message." In addition to giving the spokesman's job to Spicer — who served as an RNC liaison to the Trump campaign — Trump named campaign aides Hope Hicks as White House director of strategic communications, Jason Miller as communications director, and Dan Scavino as director of social media. “Sean, Hope, Jason and Dan have been key members of my team during the campaign and transition," Trump said. "I am excited they will be leading the team that will communicate my agenda that will Make America Great Again." Trump also waded into an Israeli-Palestinian dispute at the United Nations on Thursday, issuing a statement criticizing a proposed United Nations Security Council resolution seeking to halt Israeli settlements on land disputed with the Palestinians. "As the United States has long maintained, peace between the Israelis and the Palestinians will only come through direct negotiations between the parties, and not through the imposition of terms by the United Nations," Trump said. "This (proposal) puts Israel in a very poor negotiating position and is extremely unfair to all Israelis." Trump nominates Friedman as ambassador to Israel Trump and aides had talked to Conway about becoming White House press secretary, but she sought a more advisory position. Some aides had criticized Conway for making public criticism of secretary of State candidate Mitt Romney, and at one time Conway talked about taking a job outside the Trump administration, perhaps with a newly formed pro-Trump political organization. In thanking the president-elect for an "amazing opportunity" to be presidential counselor, Conway said that "a Trump presidency will bring real change to Washington and to Americans across this great nation. I am humbled and honored to play a role in helping transform the movement he has led into a real agenda of action and results." The transition team said that Trump's victory last month "shattered the glass ceiling for women. Conway is the first female campaign manager of either major party to win a presidential general election." Conway now becomes the highest-ranking woman in Trump's White House. Trump made the Conway announcement before another day of meetings at his Mar-a-Lago resort in Palm Beach, Fla. In other developments, the Trump transition announced that: • Vice President-elect Mike Pence will hold a conference call Thursday with Cabinet nominees. • The president-elect will interview former Texas A&M University president Elsa Murano for the still-vacant position of secretary of Agriculture. Stay with USA TODAY for full coverage of the 2017 inauguration
Mid
[ 0.634482758620689, 34.5, 19.875 ]
Q: Python3 pass lists to function with functools.lru_cache I want to cache a function that takes a list as a parameter, but when I try to do so with the functools.lru_cache decorator, it fails with TypeError: unhashable type: 'list'. import functools @functools.lru_cache() def example_func(lst): return sum(lst) + max(lst) + min(lst) print(example_func([1, 2])) A: This fails because a list is unhashable. This would make it hard for Python to know what values are cached. A way to fix this is by converting lists to tuples before passing them to a cached function: since tuples are immutable and hashable, they can be cached. TL;DR Use a tuple instead of a list: >>> @lru_cache(maxsize=2) ... def my_function(args): ... pass ... >>> my_function([1,2,3]) Traceback (most recent call last): File "<input>", line 1, in <module> my_function([1,2,3]) TypeError: unhashable type: 'list' >>> # TO FIX: use a tuple >>> my_function(tuple([1,2,3])) >>> A: It should not throw an error, rather convert into hash-able form within decorator without user even knowing it. You can fix this problem by decorating your functions like this: #Custom Decorator function def listToTuple(function): def wrapper(*args): args = [tuple(x) if type(x) == list else x for x in args] result = function(*args) result = tuple(result) if type(result) == list else result return result return wrapper #your cached function @listToTuple @lru_cache(maxsize=cacheMaxSize) def checkIfAdminAcquired(self, adminId) -> list: query = "SELECT id FROM public.admins WHERE id IN ({}) and confirmed_at IS NOT NULL" response = self.handleQuery(query, "int", adminId) return response You might want to use yet another decorator after lru_cache to make sure that output of the function is not a tuple, but a list, since right now it will return tuple.
Mid
[ 0.569711538461538, 29.625, 22.375 ]
Pulitzer Prize-winning journalist Jose Antonio Vargas was arrested Tuesday after attempting to board a plane out of McAllen, Texas, according to United We Dream, an immigration advocacy group. On July 10, Vargas, who is an undocumented immigrant, flew to the small border town with a camera crew from his own organization, Define American. Vargas, like many other immigration activists, was there to interview and film undocumented minors fleeing escalating violence in their home countries in Central America. But what Vargas didn't know is that in order to leave the border town, he would need to pass through an interior U.S. Border Patrol checkpoint set up within 45 miles of McAllen. In an interview with The Huffington Post on Saturday, Vargas, a former HuffPost editor, said he intended to fly out of McAllen using his Philippines-issued passport. On Tuesday morning, prior to reports of his arrest, Vargas alerted his Twitter followers that he would be attempting to pass through airport security. "About to go thru security at McAllen Airport. I don't know what's going to happen. For updates follow @DefineAmerican & @MAC_UTPA," he said. According to a United We Dream press release, Vargas was taken into custody by the Border Patrol in McAllen after attempting to board a flight to Los Angeles. The Border Patrol maintains a security presence at the McAllen-Miller International Airport. A TSA agent checked Vargas' Philippines passport and compared it to his ticket, according to a video of the exchange as well as sources familiar with the exchange. Satisfied, the agent initialed the ticket and cleared Vargas for travel. At that point, a Border Patrol agent took the passport from the TSA. "Do you have your visa?" he asked. "No, there's no visa," Vargas replied. The agent asked Vargas a few more questions, then placed him in handcuffs and escorted him to the McAllen Border Patrol station for further questioning, according to the source. The station is not a detention center. The source provided HuffPost with the following photo of Vargas (story continues below): Cristina Jimenez, managing director of United We Dream, said Vargas' arrest highlighted the struggles many undocumented immigrants face. "We stand in solidarity with Jose Antonio and demand for his immediate release, but we must remember that there are thousands of people along the border that live with this same fear every day," Jimenez said. "Once again, the Border Patrol has proven to be a rogue agency after arresting Jose Antonio, a low-priority case for detention and deportation." The Washington Post reports that over the weekend, Vargas texted WaPo reporter Ernesto Londoño with the following message: "I feel stupid. I've been traveling around the country, visiting 43 states in like 3 years, and I've been flying using my Philippine passport. But I've never been to the Texas border area. I just figured I could use the passport. But apparently I can't because border patrol agents check foreign passports." A call to Vargas was not immediately returned. White House Press Secretary Josh Earnest declined to comment on Vargas' detention during the daily White House briefing on Tuesday. "I’m not in a position to talk about individual enforcement cases from the podium," Earnest told reporters. Update: 2:45 p.m. -- Rep. Alan Grayson (D-Fla.) expressed his support of Vargas Tuesday afternoon, tweeting: "No one brought and raised here as a child should be expelled for being undocumented. #ReleaseJoseAntonioVargas." Note: A previous version of this story reported that Vargas had been asked for his visa by TSA. Subsequent reporting indicates that TSA cleared Vargas to travel, but a Border Patrol agent intervened. Sign up below to get an email when Ryan Grim publishes a new story.
Mid
[ 0.5456570155902001, 30.625, 25.5 ]
Characteristics of cutaneous lymphomas in Korea. The clinicopathologic characteristics of malignant lymphomas vary according to geography. The aim of this study was to determine the relative frequency of cutaneous lymphomas and to examine the clinical relevance of the WHO classification in Korean cases of cutaneous lymphoma. The Korean Dermatopathology Research Group conducted a clinicopathologic review of a nationwide collection of 80 cutaneous lymphomas, diagnosed at 23 institutes over a recent 3-year period. The clinical records, haematoxylin & eosin-stained slides and immunohistochemical stains from 80 patients with malignant lymphomas of the skin were reviewed. In our study, the most frequent cutaneous lymphoma was mycosis fungoides. Compared with Western countries, Korea had higher rates of NK/T cell lymphoma and subcutaneous panniculitis-like T-cell lymphoma and a much lower rate of B-cell lymphoma. The occurrence rates for various subtypes of malignant lymphoma in Korea are distinct from those in Western countries. The EORTC classification is not fully appropriate in dealing with Korean cases of cutaneous lymphoma, because NK/T cell lymphoma is not included in the EORTC classification for cutaneous lymphoma.
High
[ 0.6797385620915031, 32.5, 15.3125 ]
Travel Nurse SICU RN (Surgical Intensive Care) Company: HCEN Location: West Covina Posted on: May 12, 2020 Job Description: Nationwide Travel Nurse Jobs - Surgical Intensive Care RN Are you looking for a new nursing job? Would you like to spend the season somewhere you've never been? Hospitals nationwide are looking for qualified registered nurses for their seasonal travel assignments. With the HCEN Network of staffing agencies, registered nurses like you receive competitive job offers from the nation's top healthcare employers every day! The HealthCare Employment Network works with agencies and facilities nationwide offering: Flexible assignment lengths (8, 13, & 16 week contracts) Excellent compensation and benefits ASAP starts available Veteran Traveler or researching your first assignment options, You are in the right place. Tired of always being asked to complete a lengthy application? Why complete multiple applications just to get information before you know if there is something you are interested in? Since 2010 HCEN has used its 5 decades of Traveling as HealthCare Professional & Staffing Agency owners to better serve those interested in being a "Traveler" Over 21,000 HealthCare Professionals have utilized this form in the last 2 years and saved themselves hours of research. Get the information you require to make informed decisions from the HealthCare Employment Network of Nationwide Staffing Agencies with one free, quick & short " More Information Request " Critical Need RN Travel Assignment Specialties: HCEN has numerous nationwide requests from the network recruiters for the following specialties. Please complete the HCEN Short Form and it will be sent over to the HCEN Network of recruiters for follow-up with you. That perfect job or travel assignment is that close. Didn't find what you're looking for? Search again! Other Healthcare Jobs Registered Nurse (RN) - Full time and Part time AvailableDescription: Position OverviewRegistered Nurse RN is responsible for providing and documenting skilled nursing care in accordance with the developed care plan and physicians orders for each individual patient while (more...)Company: Aveanna HealthcareLocation: EncinitasPosted on: 06/8/2020 Physician Assistant SurgeryDescription: Surgery-General opening in Palm Springs, California. This and other physician assistant jobs brought to you by DocCafe.com We are hiring an experienced nurse practitioner or physician assistant with extensive (more...)Company: Palm Health ResourcesLocation: Palm SpringsPosted on: 06/8/2020 Registered Nurse (RN) - Full time and Part time AvailableDescription: Position Overview br Registered Nurse RN is responsible for providing and documenting skilled nursing care in accordance with the developed care plan and physicians orders for each individual patient (more...)Company: Aveanna HealthcareLocation: EncinitasPosted on: 06/8/2020 Critical Care Nurse PractitionerDescription: This outstanding hospital in Southern CA is actively interviewing for a new ICU Nurse Practitioner to join their busy Intensive Care Unit. br One of the best hospitals in the state, this facility has (more...)Company: Nurse PractitionerLocation: MontebelloPosted on: 06/8/2020 Travel Nurse RN OrthopedicsDescription: Nationwide Travel Nurse Jobs - Orthopedic RN--- Are you looking for a new nursing job Would you like to spend the season somewhere you've never been Hospitals nationwide are looking for qualified registered (more...)Company: HealthCare TravelersLocation: BellflowerPosted on: 06/8/2020
Mid
[ 0.651994497936726, 29.625, 15.8125 ]
Q: How to Create Subarray Efficiently in VBA? In my VBA program, I have a big array of data, where I need to constantly use its sub-arrays. My method is: Redim subArr(rowBegin to rowEnd) For r = rowBegin to rowEnd subArr(r) = bigArr(r) Next r Is there any more efficient way to reference this kind of sub-arrays please? Thanks... A: Working with arrays is incredibly fast so this will probably give no discernable benefit - althouh I can understand how it may appeal from a coding sense than looping to fill a smaller array Given you are working with a single element array you could: Introduce a "marker" string inside the large array Join the large array with a delimiter into a single string Split the large array by the "marker" string, then separate the reduced string into a smaller array with the delimiter The code below dumps the numbers 1 to 100 into an array, and then splits it as above to pull out the first 10 records Sub test() Dim bigArr Dim subArr Dim strSep As String Dim strDelim As String Dim strNew As String Dim rowBegin As Long Dim rowEnd As Long strDelim = "," strSep = "||" 'fill array with 1 to 100 bigArr = Application.Transpose(Application.Evaluate("row(1:100)")) rowBegin = 1 rowEnd = 10 bigArr(rowEnd + 1) = strSep 'make a single string strNew = Join(bigArr, strDelim) 'split the string at the marker vArr = Split(strNew, strSep) ReDim subArr(rowBegin To rowEnd) 'split the smaller string with the desired records subArr = Split(Left$(vArr(0), Len(vArr(0)) - 1), strDelim) End Sub
Mid
[ 0.581196581196581, 34, 24.5 ]
Q: Try Catch in Android native library fails When I perform a throw command in my native library, my Android application crashes. Does Android not support these calls? It never reaches the catch. try { __android_log_print(ANDROID_LOG_ERROR, "nativeLib", "throw"); throw; } catch (...) { __android_log_print(ANDROID_LOG_ERROR, "nativeLib", "catch"); } I recently switched from gnustl_shared to c++_shared, I'm not sure if this has anything to do with my problem. Developer guides say that gnustl_shared has exceptions enabled by default, but c++_shared does not. I have included the -fexceptions flag as describe in the guide. https://developer.android.com/ndk/guides/cpp-support.html A: It looks like this is a known issue: https://developer.android.com/ndk/guides/cpp-support.html Compatibility The NDK's libc++ is not stable. Not all the tests pass, and the test suite is not comprehensive. Some known issues are: •Using c++_shared on ARM can crash when an exception is thrown. •Support for wchar_t and the locale APIs is limited.
Mid
[ 0.653950953678474, 30, 15.875 ]
OmniPay Authorize.Net DPM Gateway In this short series I hope to provide some practical worked examples showing how to use the DPM extension of the OmniPay Authorize.Net gateway. I’ll run through what all those terms mean first. Authorize.Net Authorize.Net is a payment processor that can be used to take payments on websites. It does a lot more than simply take payments, such as scheduled payments and refunds, but we are just looking at payments here. There are a few broad modes in which Authorize.Net can be used. They are: AIM – Advanced Integration Method. This is a machine-to-machine API. Your site collects all the details from the user (where needed), including credit card details and sends it on to the AIM interface. It gets a response, then processes that response as appropriate. This mode provides access to most of the facilities within Authorize.Net. It does, however, have strict PCI ramifications. Because the end user’s credit card details pass through your server, there are very strict rules and accreditation that must be followed and applied for. Most small shops and businesses would want to avoid this on their own websites. SIM – Server Integration Method. With this method you send the end user off to the Authorize.Net website to enter their credit card details. Your site never sees these details. You can send what contact details you already know about the user along to the SIM interface with the user, so they don’t have to fill out their details afresh. Some people don’t like this, because the branding on the SIM payment screen belongs to Authorize.Net Personally I don’t find going to a trusted payment gateway site to fill out my credit card details is a problem at all, but apparently many people perceive it to be a bad thing. PCI compliance is still relevant, but it is not as onerous as for AIM. Credit card details do not go through your site, but if your site has been hacked, then all bets are off – you really don’t know what is being captured when malware is installed. DPM – Direct Post Method. This method works in a very similar way to SIM, but with the payment form on your own site instead of a an Authorize.Net site. This payment form can be branded entirely to your liking. The form is not posted back to your site, but instead posts to the the Authorize.Net DPM site. The DPM site then posts back to your site the result of the credit card authorisation, and your site handles that and informs the end user. If there are mistakes in the form that the user submitted, then Authorize.Net DPM will inform your site, pass it the current submitted form details and give your site the opportunity to re-present the form to the user so they can make corrections. SIM is by far the easiest to implement, and is much safer for you than AIM. DPM is very similar to SIM, but requires more to be implemented on your site. The benefit of that is that you have full control of the style and branding across all the payment pages. This article will focus on the DPM method of using Authorize.Net, as it is a fairly recent additional to OmniPay – the PHP library that attempts to normalise a multitude of different payment gateways. The Authorize.Net gateway, containing support for AIM, SIM and DPM, can be found here. There are at present few examples of how the DPM gateway can be used through OmniPay. OmniPay The OmniPay package from The PHP League, originally developed by Adrian Macneil, is a pluggable library that provides access to a wide range of payment gateways. It focuses on common requirements: authorisation, capturing payments, voiding authorisation, and a few other services. It’s aim is to provide a common and consistent way to handle the different payment gateways, so it is simple easier to switch between them. OmniPay is a composer package, and support for each gateway is provided through a separate composer package. OmniPay largely meets its objectives, but suffers a little from a lack of worked examples in the documentation. Even though the library aims to make the gateway use consistent, each gateway does tend to have its own foibles – they all do something that requires some special handling in the merchant application, and that requires additional plumbing around the gateway. We are dealing here with version 2 of the OmniPay library. My hope is that version 3 (proposed for later in 2015) will look a little deeper into these exceptions to find some patterns that perhaps have not been recognised previously, and they could be handled within OmniPay to reduce the amount of exceptional plumbing required in the application. Authorize.Net DPM The Direct Post Method (DPM) was likely introduced in response to the rapid rise and popularity of Stripe. This gateway popularised the method of POSTing card and address details direct from the merchant site – the shop taking payment – to the payment gateway. This means the users stay on the merchant site when completing their credit car details, but the details are never posted back to your site. While Stripe and some similar gateways use JavaScript to POST the form details to the gateway, making them AJAX, and never taking the user away from the site, Authorize.Net DPM is different. It works like this: The merchant site presents a payment form to the user, including fields for the payee name, address and credit card details. Any number of details can be pre-filled, and the merchant site can decide which fields are shown, which can be changed, and which are hidden. The payment form is completed by the user. When the user submits the form, it POSTs direct to Authorize.Net not the merchant site. The user is handed over to Authorize.Net, but they don’t hang around for long. The supplied credit card details are checked and a decision is made on whether the payment or authorisation is approved. Authorize.Net will perform a callback. It will directly POST the results of the authorisation to the merchant site. The POST will include the status, any errors, and the details of the form as submitted (minus the credit card details – the idea is never to send them to the merchant site). The merchant site validates, stores and processes those results in the callback. The merchant site callback handler then generates a HTML page, usually based on the results, and returns it to Authorize.Net. That page will then be sent by Authorize.Net to the user’s browser. The main purpose of that page will be to redirect the user back to the merchant site. So while most payment gateways will expect the callback to return a URL, which the gateway will send the user to, this gateway asks for a HTML page containing a meta refresh and/or a JavaScript redirect to send the user to the correct page of the merchant site. When the user returns to the merchant site, they are informed of the result. If the result is an error, then the merchant site can re-present the user with the form they completed and display the error message, so the user can try again. If the payment was declined, then they are told so. All processing of the transaction should hopefully have happened in the callback, and not left for when the user returns to the merchant site, because sometimes the user may not have made it back for one reason or another. Many Authorize.Net gateways do not do that – they send the user to a “success” or “fail” page, where the transaction is processed or not from there. Don’t fall into that trap, because it is not secure. The next part in this series will introduce the sequence chart that an implementation needs to follow.
Mid
[ 0.5975609756097561, 30.625, 20.625 ]
Q: Dedekind's "different": sources, definition, original name I am interested in getting the original information regarding Dedekind's idea of the "different" (regarding ideals). Particularly, I am interested in: 1- Knowing the original German name he used for it. I think it was "diskriminant", but I am not sure. 2-Getting his original definition (It would be great if the page could be scanned and bibliographic reference could be given). Thanks." A: See : Nicolas Bourbaki, Elements of the History of Mathematics, (French ed, 1984), page 102 : in 1882, Dedekind completes the theory [of ideals] by introducing the different, which gives him a new definition of the discriminant and allows him to specify the exponents of the prime ideal factors in the decomposition of the latter. In the German text of : Richard Dedekind, Über die Discriminanten endlicher Körper, 1882, Abhandlungen der Königlichen Gesellschaft der Wissenschaften zu Göttingen 29 (2): 1–56, see page 1 for : "Grundzahl oder Discriminante" and page 38 for : "Grundideal des Körpers".
High
[ 0.664010624169986, 31.25, 15.8125 ]
Australia's most populous state declared its second state of emergency in two months on Thursday as extreme heat and strong winds were expected to fan scores of uncontrolled bushfires. Advertising Read more Firefighters were given broad powers to control government resources, force evacuations, close roads and shut down utilities across New South Wales state, where 100 wildfires are burning. With more than half of those fires burning uncontrolled and temperatures forecast to exceed 40 degrees Celsius (104 Fahrenheit), officials warned residents to be on high alert over the next several days. "The biggest concern over the next few days is the unpredictability, with extreme wind conditions, extremely hot temperatures," NSW Premier Gladys Berejiklian told reporters in Sydney. Australia has been battling wildfires across much of its east coast for weeks, leaving six people dead, more than 680 homes destroyed and nearly 3 million acres (1.2 million hectares) of bushland burnt. Some 1,700 firefightershave been deployed across the state, but officials warned that would not be enough to cover every potential danger and urged people in high risk areas to evacuate while it was still safe to do so. "There are simply not enough fire trucks for every house. If you call for help, you may not get it," the Rural Fire Service said in a statement. "Do not expect a fire truck. Do not expect a knock on the door. Do not expect a phone call." The current state of emergency will last for seven days, while a total fire ban that has been in place since Tuesday will remain until midnight on Saturday. Smoky Sydney Sydney, the capital of NSW state, was blanketed in ash and smoke for yet another day on Thursday. The heavy haze obscured visibility, hiding icons like the Opera House and Harbour Bridge. Many commuters have donned breathing masks in recent weeks as air quality has plunged to hazardous levels not previously seen in the city. NSW Ambulance Commissioner Dominic Morgan said the service had experienced a 10% surge in call-outs for patients suffering respiratory conditions over the past week. Morgan urged people with asthma and other respiratory conditions to remain indoors and keep their medication close. Home to more than 5 million people, Sydney is ringed by large areas of bushland, much of which remains tinder dry following little rain across the country’s east coast in recent months. The heightened fire danger in NSW state comes as Australia is in the grip of a nationwide heat wave. The country recorded its highest average maximum temperature of 40.9C (105.6F) on Tuesday, and Bureau of Meteorology data shows that record was likely to be exceeded again this week. (REUTERS) Daily newsletterReceive essential international news every morning Subscribe
Mid
[ 0.573304157549234, 32.75, 24.375 ]
d derivative of t(j) wrt j? -36*j**2 Let a(v) be the first derivative of 0*v + 0*v**3 - 5 + 2*v**2 - 1/2*v**4. Find the second derivative of a(z) wrt z. -12*z Suppose 3*j + 5*q = 33, -3*j + 2*q + 0*q + 12 = 0. Find the third derivative of -3*x**2 - 2*x**6 + 5*x**6 - 6*x**j wrt x. -360*x**3 Suppose -5*d + 33 = 2*h, -h = 2*h + 4*d - 32. Suppose 2*j - h*z = 18, 4*j + z - 3*z = 18. What is the second derivative of 3 - 2*u - 3*u**4 - j + 0 wrt u? -36*u**2 Let b(m) = -m**2 + m + 1. Let v(c) = -9*c**2 - 10*c - 3. Let g(z) = -3*b(z) - v(z). Find the second derivative of g(i) wrt i. 24 Suppose 5*f - 10 = 10. Let v(s) be the third derivative of 1/3*s**3 - 1/6*s**f - 3*s**2 + 0*s + 0. Differentiate v(k) with respect to k. -4 Let b(y) = -1. Let r(s) = 13*s**4 - 13. Let t(i) = 5*b(i) + r(i). What is the derivative of t(p) wrt p? 52*p**3 Suppose 4*f - 5*m - 40 = -0*f, 0 = f + 5*m + 15. Suppose -3*z = -1 - 5. Find the second derivative of i**4 + z*i**5 + 3*i - i**f - i**4 wrt i. 20*i**3 Find the third derivative of 10*z**4 + z**2 - 14*z**2 - 8*z**4 wrt z. 48*z Let q(t) be the second derivative of 7*t**4/12 - t**2 + 6*t. What is the first derivative of q(d) wrt d? 14*d Let d = -6 - -11. What is the second derivative of i**5 + 2*i**3 + i**d - 2*i**3 + i wrt i? 40*i**3 Let j(c) be the second derivative of 0 + 0*c**2 + 1/6*c**3 - 1/42*c**7 + 0*c**4 + 0*c**5 + 0*c**6 - 3*c. Find the second derivative of j(l) wrt l. -20*l**3 Let i(d) be the first derivative of d**7/280 - d**4/6 - d**3/3 + 4. Let n(v) be the third derivative of i(v). Differentiate n(g) wrt g. 9*g**2 Suppose 5*k + s - 7 = 0, -5*s = 4 + 11. What is the third derivative of m**6 - k*m**6 + 0*m**2 - 2*m**6 + 4*m**2 wrt m? -360*m**3 Find the third derivative of 37*c - 11*c**2 + 24*c**3 - 37*c wrt c. 144 Let g(b) = -b - 4. Let k be g(-4). Suppose -4*o + 5*c - 17 - 8 = k, 0 = 5*o + 5*c - 25. Find the second derivative of -h**2 + 4*h + h**2 - 4*h**5 + o*h wrt h. -80*h**3 Let i(w) = -6*w**5 + 5*w**3 + 7*w + 5. Let j(u) = 5*u**5 - 4*u**3 - 6*u - 4. Let v(b) = -4*i(b) - 5*j(b). What is the second derivative of v(d) wrt d? -20*d**3 Let x(d) = -d**3 - d**2 - d. Let o(u) = -18*u**3 - 4*u**2 - 4*u + 9. Let g(f) = o(f) - 4*x(f). What is the first derivative of g(y) wrt y? -42*y**2 Suppose 0 = 4*z - z. Let p(c) be the second derivative of 1/6*c**3 + 1/2*c**2 + z + c. Differentiate p(d) with respect to d. 1 Let j = -3 + 5. Suppose -8 = -2*f - j. What is the second derivative of -u - u**3 + 0*u**f + 2*u**3 wrt u? 6*u Let f(x) be the third derivative of 11*x**5/30 + 25*x**4/24 + 22*x**2. What is the second derivative of f(b) wrt b? 44 Let a(p) = p**2 - 6*p + 3. Let q be a(6). What is the first derivative of 5*t**2 - 5*t**2 + 6*t**q - 10*t**3 + 2 wrt t? -12*t**2 What is the second derivative of 11*p**2 - 2*p - 15 - p + 15 wrt p? 22 Let j(v) be the first derivative of -1/2*v**2 + 2 + 0*v**4 - 1/3*v**6 + 0*v + 0*v**5 + 0*v**3. What is the second derivative of j(m) wrt m? -40*m**3 Suppose 21 = 3*n + 5*r, -5*n + 1 = -r - 34. Let b = 11 - n. What is the second derivative of -5*t**b + 7*t**4 - 2*t + t wrt t? 24*t**2 Let t(x) be the second derivative of 3*x**5/2 + 41*x**4/12 + x**2/2 - 25*x. Find the third derivative of t(y) wrt y. 180 Let d = 0 - -1. Let u(s) = 2*s**3 - 3*s**2 + 1. Let q(b) = -b**3 - b**2 + 1. Let l(t) = d*q(t) - u(t). What is the third derivative of l(w) wrt w? -18 Let o(h) = -2*h**2 + 11*h + 2. Let p(y) = -1 + 2*y - 13*y + y**2 + 5*y. Let d(r) = 6*o(r) + 11*p(r). Differentiate d(x) wrt x. -2*x Let i(g) be the first derivative of 3*g**6/2 - 17*g**3/3 + 10. Find the third derivative of i(r) wrt r. 540*r**2 Let i(l) = -18*l**6 + 3*l**3 + 14*l**2. Let u(z) = -54*z**6 + 10*z**3 + 42*z**2. Let n(b) = -10*i(b) + 3*u(b). What is the third derivative of n(a) wrt a? 2160*a**3 Let s(f) be the first derivative of -2*f - 3/2*f**2 - 3. Differentiate s(o) wrt o. -3 What is the first derivative of 5*b**2 - 3*b**2 - 3*b**2 - 7 - 8*b**2 wrt b? -18*b What is the second derivative of -8558 - 30*g**5 + 4*g**5 + 8556 + 29*g wrt g? -520*g**3 Let r be 7 + (2/(-1) - 1). Differentiate -2*i**r - i**4 - 7 + 10 wrt i. -12*i**3 Let s(w) = -11*w**2 - 1. Let o(m) be the first derivative of -22*m**3/3 - m - 2. Let f(x) = -4*o(x) + 9*s(x). Differentiate f(z) with respect to z. -22*z Let p(b) = b. Let i(c) = c**2 + 2*c + 2. Let u be -1 + (3 + 2)*1. Let x = u + -2. Let z(g) = x*p(g) - i(g). What is the first derivative of z(v) wrt v? -2*v Let t(b) be the first derivative of 0*b**4 + 0*b + 5/6*b**6 - 1 + 0*b**5 + 3/2*b**2 + 0*b**3. Find the second derivative of t(a) wrt a. 100*a**3 Let o(z) = -104*z**4 - 18*z**2 - 17*z + 17. Let w(k) = 35*k**4 + 6*k**2 + 6*k - 6. Let q(j) = -6*o(j) - 17*w(j). What is the third derivative of q(m) wrt m? 696*m What is the first derivative of -u**3 - 4*u**3 - 7*u**3 - 3*u**3 - 2 wrt u? -45*u**2 Let n(v) = -42*v**4 + 64*v**2 + 7. Let c(j) = 14*j**4 - 21*j**2 - 2. Let f(m) = 7*c(m) + 2*n(m). What is the third derivative of f(i) wrt i? 336*i Let u(j) = -3*j + 0*j + 2*j - 1. Let h(r) = -3*r - 4. Let d(g) = 3*h(g) - 8*u(g). What is the first derivative of d(b) wrt b? -1 Let q be ((-2 - -1) + 2)*9. Suppose -2*u - 1 = -q. Find the second derivative of 7*m**2 + 3*m - 7*m**2 + 2*m**u wrt m. 24*m**2 Let x(n) be the first derivative of -51*n**4/4 + 2*n**3/3 + 9*n - 74. What is the third derivative of x(m) wrt m? -306 Find the second derivative of 3*c**5 + 10 - 10 - c + 2*c wrt c. 60*c**3 Suppose -w - 76 = -31. Let z be (-99)/w + 1/(-5). Find the first derivative of 4 + 0 - 5*m**2 - 2*m**z + 5*m**2 wrt m. -4*m Let p(s) = -6*s**2 + 3*s + 3. Let j(y) = -y**3 - 6*y**2 + 4*y + 4. Let r(t) = -3*j(t) + 4*p(t). What is the third derivative of r(m) wrt m? 18 Find the first derivative of -4 - 19*w**4 + 4 - 13 wrt w. -76*w**3 Let o(q) = q**3 + 2*q**2 - 2*q - 1. Let y be o(-2). What is the second derivative of 3 - 2*u**2 - y + 2*u + u wrt u? -4 Let p = -8 - -14. Suppose 0 = -d - c + 1, p*c + 2 = -d + 2*c. Find the third derivative of -3*j**2 + j**6 + 2*j**d - j**2 wrt j. 120*j**3 Suppose -7 = 5*b + 13. Let g(m) = 2*m**3 + m - 3. Let k(n) = 3*n**3 + 2*n - 4. Let c(z) = b*g(z) + 3*k(z). What is the second derivative of c(t) wrt t? 6*t Let r be (-3)/(-2 + 2/2). Find the third derivative of t**2 + 5*t**3 - 2*t**2 - t**r wrt t. 24 Let x(g) be the second derivative of 0*g**2 - 1/5*g**5 + 0*g**3 + 4*g + 1/6*g**4 + 0. What is the third derivative of x(j) wrt j? -24 Let i(y) = 7*y**2 + 2. Let q(f) = -7*f**2 - 3. Let c(l) = 5*i(l) + 4*q(l). Find the first derivative of c(p) wrt p. 14*p Let a(d) be the first derivative of -11*d**4/4 - 4*d**3/3 + 9. Find the third derivative of a(v) wrt v. -66 Let v(k) be the second derivative of 0*k**5 - 4*k - 3*k**2 - 1/15*k**6 + 0 + 0*k**3 + 0*k**4. What is the first derivative of v(u) wrt u? -8*u**3 Let l(c) be the third derivative of c**9/2160 - c**5/120 - c**4/12 - 3*c**2. Let j(w) be the second derivative of l(w). What is the derivative of j(p) wrt p? 28*p**3 What is the second derivative of -3*r**3 + 7*r**3 - 8*r**3 - 9*r + 0*r**3 wrt r? -24*r Let n(g) be the first derivative of 3/4*g**4 + 0*g - g**3 + 0*g**2 - 1. Find the third derivative of n(v) wrt v. 18 Let o = -10 + 13. What is the second derivative of w**3 - 4*w**3 + 4*w - w**o - w wrt w? -24*w Suppose -h = -3*h + 4*g + 12, -h = -5*g. Suppose 0 = -2*a + 7*a - h. Find the third derivative of j**3 + j**3 + 0*j**a + j**2 wrt j. 12 Let y = -46 - -48. Let n(d) be the third derivative of 2*d**y + 0 + 1/6*d**3 + 0*d - 1/30*d**5 + 0*d**4. Find the first derivative of n(h) wrt h. -4*h Let a(d) = d. Let z be a(-6). Let t be -5 - z - (-3 - -1). Differentiate g**t + 1 + 5*g - 5*g wrt g. 3*g**2 Let d be 6/4*(-4)/3. Let k = 6 - 3. Let y(t) = 5*t**2 - 1. Let m(v) = 4*v**2. Let w(h) = d*y(h) + k*m(h). What is the derivative of w(j) wrt j? 4*j Let w(v) be the first derivative of -4*v**6/3 - 3*v**3 + 1. Find the third derivative of w(f) wrt f. -480*f**2 Find the second derivative of 4*i**5 + 380*i**2 - 20*i - 380*i**2 wrt i. 80*i**3 Suppose 5 - 1 = k - 2*s, 6 = k - 4*s. Suppose 4*x = -2*h + 24, x - 2*h - 2 = 9. What is the first derivative of -3*c - 1 - k*c + x*c wrt c? 2 What is the second derivative of -45*v**4 + 5*v**2 - 15*v + 3*v**5 + 45*v**4 - 16*v - 2 wrt
Low
[ 0.509615384615384, 26.5, 25.5 ]
woman gives birth on the street ** graphic ** Note: to turn off these warnings you need to set the 'safe mode' to OFF (on the top right)
Low
[ 0.407572383073496, 22.875, 33.25 ]
Blank Page Double click to insert body text here... Simple vandotsch speculaas pancakes In the Netherlands, pancakes are known as pannenkoeken and are mostly eaten at lunch and dinner time, all year round. Pancake restaurants are popular with families and serve many sweet, savory, and stuffed varieties. Pannenkoeken are slightly thicker than crêpes and usually quite large, 30 cm or so in diameter. English pancakes are similar to crêpes. The pannenkoeken batter is egg-based and fillings include such items as sliced apples, cheese, ham, bacon, and candied ginger, alone or in combination. And, of course 'stroop', a thick molasses-like sugar beet-based syrup. What follows is an overview of the ingredients that we used to make vandotsch speculaas pancakes, including:
Low
[ 0.49090909090909, 33.75, 35 ]
[Study on expression styles of meridian diseases in the Internal Classic]. To probe expression styles of meridian diseases in the Internal Classic. Expression styles for meridian diseases in the Internal Classic were divided by using literature study methods. Expression styles of meridian diseases in the Internal Classic include the 4 types, i. e. twelve meridians, the six channels on the foot, indications of acupoints, and diseases of zang and fu organs. The recognition of later generations on the meridians diseases in the Lingshu Chanels has a certain history limitation.
High
[ 0.6928675400291121, 29.75, 13.1875 ]
/* get the executable path */ #include "../fb.h" #include <sys/stat.h> char *fb_hGetExePath( char *dst, ssize_t maxlen ) { char *p; struct stat finfo; ssize_t len; if ((stat("/proc/curproc/exe", &finfo) == 0) && ((len = readlink("/proc/curproc/exe", dst, maxlen - 1)) > -1)) { /* NetBSD-like proc fs is available */ dst[len] = '\0'; p = strrchr(dst, '/'); if (p == dst) /* keep the "/" rather than returning "" */ *(p + 1) = '\0'; else if (p) *p = '\0'; else dst[0] = '\0'; } else { p = NULL; } return p; }
Low
[ 0.404819277108433, 21, 30.875 ]
NHL and the NHL Shield are registered trademarks and NHL Mobile name and logo, NHL GameCenter and Unlimited NHL are trademarks of the National Hockey League. NHL and NHL team marks are the property of the NHL and its teams. Hockey East Second All-Star Team (2006) Traded to Colorado by Phoenix for Colorado's 4th round choice (Rhett Holland) in 2012 Entry Draft, June 28, 2010. Traded to San Jose by Colorado with T.J. Galiardi and Anaheim's 7th round choice (previously acquired, San Jose selected Emil Galimov) in 2013 Entry Draft for Jamie McGinn, Michael Sgarbossa and Mike Connolly, February 27, 2012. Signed as a free agent by Anaheim, July 20, 2012. Signed as a free agent by Toronto, July 28, 2014. PLAYER BIO 2012-13: Appeared in his sixth NHL season, his first with Anaheim…scored 6-13=19 points with a +13 rating and 16 PIM in 48 games…ranked fifth on the Ducks in plus/minus (+13) and tied for ninth in the NHL in plus/minus on the road (+12)...recorded a plus-or-even rating in 38 of his 48 games…was one of three Anaheim players to appear in all 48 regular season games…appeared in his 400th career game, Mar. 29 @ CHI…recorded his third multi-point game of the season (0-2=2), Mar. 18 vs. SJ…logged a season-high 20:34 TOI, Mar. 4 @ PHX…registered a career-tying +3 rating, Mar. 2 @ PHX…became the first player in club history to score five goals in the first four games of a single season (5-1=6), Jan. 19-26…scored his fifth goal in a 3-2 shootout win, Jan. 26 vs. NSH…opened his Anaheim career with back-to-back multi-goal games on Jan. 19 @ VAN (2-0=2) and Jan. 21 @ CGY (2-0=2), tying his career high for goals in a game. CAREER: Signed by Anaheim as a free agent on July 20, 2012...Was acquired by San Jose with T.J. Galiardi and a seventh-round selection in the 2013 NHL Entry Draft from Colorado in exchange for Jamie McGinn, Mike Connolly and Michael Sgarbossa, Feb. 27, 2012…was acquired by Colorado from Phoenix in exchange for a fourth-round pick in 2012 Entry Draft, June 28, 2010…2011-12: Split his fifth NHL season with Colorado and San Jose…appeared in 84 regular-season games, collecting 8-15=23 points with 52 PIM…led the league in games played, which represented the most in the NHL since Sean Avery played 84 in 2006-07 with Los Angeles and the New York Rangers…was acquired by San Jose as part of a five-player deal at the trade deadline, Feb. 27…collected his 100th career NHL point (goal), Apr. 3 @ DAL…earned an assist (0-1=1) with a season-best +3 rating in his penultimate game with Colorado, Feb. 24 @ CBJ…logged a season-high 23:12 TOI on Dec. 17 vs. WSH, the second-highest of his career…recorded his first career “Gordie Howe hat trick” on Dec. 15 @ SJ, marking a season high in points (1-1=2)…appeared in his 300th NHL game, Nov. 15 @ PIT…PLAYOFFS: Made his second career appearance in the Stanley Cup Playoffs with San Jose, earning one point (0-1=1) in a five-game CQF loss to STL…earned his first career postseason point (assist) in Game 5 of the CQF, Apr. 21 @ STL...2010-11: Appeared in his fourth NHL season, his first with Colorado…scored 11-15=26 points with 35 PIM in 80 games, matching career highs in goals, assists and points…also set a career high in shots (167) and a then-career high in appearances, which was tied for the team lead with Matt Duchene…in addition, led Colorado in shorthanded points (3), shorthanded goals (2), and total shorthanded minutes (218:51)…recorded a career-high seven shots on Mar. 28 @ ANA…scored his first career PPG on Feb. 14 vs. CGY and first NHL shorthanded tally on Dec. 31 @ CGY…2009-10: Made his Stanley Cup Playoff debut with Phoenix, going scoreless in seven games…appeared in his first career NHL postseason game in Game 1 of the CQF, Apr. 14 vs. DET…played 74 regular-season games with the Coyotes, scoring 4-15=19 points with a +1 rating with 12 PIM…led team forwards in blocked shots (54) and ranked second in takeaways (30)…also ranked third in shorthanded TOI (3:04)…compiled a career-high four-game point streak (1-4=5), Oct. 26-31… 2008-09: Appeared in his second NHL season with Phoenix, collecting 3-4=7 points with a +1 rating and a career-high 63 PIM in 49 games…was a plus-or-even in 39 of his 49 games…notched a career-best 2-1=3 points with a +3 rating, Feb. 14 vs. CGY…logged a career-high 17 PIM, Oct. 11 vs. CBJ…missed five games due to injury, Nov. 18-26…went scoreless during a five-game conditioning assignment with San Antonio, Jan. 1-10…2007-08: Made his NHL debut with Phoenix, earning 11-15=26 points with 25 PIM in 79 games…among NHL rookies, ranked ninth in shots (122), tied for 13th in goals and games played, tied for first in shorthanded assists (2) and tied for second in SH points (2)…recorded his second NHL multi-point game (1-1=2) in a career-high 23:13 TOI, Mar. 18 @ EDM…posted his first career multi-point contest (1-1=2), Nov. 24 vs. TOR…earned his first career NHL assist, Oct. 11 @ NSH…scored the GWG in his NHL debut on Oct. 4 vs. STL, a 3-2 victory…2006-07: Appeared in his second AHL season with San Antonio, scoring 9-12=21 points with 34 PIM in 66 games…also played five games for the Phoenix RoadRunners (ECHL)…2005-06: Made his professional debut with San Antonio, scoring 1-1=2 points with eight PIM in seven games…scored a goal in his AHL debut, Apr. 6 vs. Milwaukee…Miscellaneous: Played three seasons with the University of New Hampshire (Hockey East) from 2003-06, collecting 37-58=95 points with 82 PIM in 118 career games…was named a Hockey East Second Team All-Star as a junior in 2005-06, finishing tied for fifth in the league in scoring (15-26=41)…shared the team lead in assists and was tied for second in points…was named Hockey East Player of the Month for November 2006. PERSONAL: Graduated from Loyola Catholic Secondary High School (Mississauga, Ontario) in 2003…has one older brother, Andrew…says Doug Gilmour was his favorite NHL player growing up…enjoys listening to Wiz Khalifa, Of Monsters and Men and Kaskade…likes to eat at Bear Flag Fish Company while in Orange County…other sporting interests include golf, baseball and football…spent most of the summer traveling and playing golf…resides in Toronto during the offseason. NHL and the NHL Shield are registered trademarks and NHL Mobile name and logo, NHL GameCenter and Unlimited NHL are trademarks of the National Hockey League. NHL and NHL team marks are the property of the NHL and its teams.
Mid
[ 0.57347670250896, 40, 29.75 ]
Rajesh, Have you been able to get a draft COU agreement from Clay? How is your move coming? Paul
Low
[ 0.40724946695095904, 23.875, 34.75 ]
Copenhagen Challenge for AXA AXA’s “ironmen” Martin Merstrand, Lars Schrøder and Michael Brock made their first AXA team début at the Challenge Copenhagen It was a glorious debut of Challenge Copenhagen with more than 125.000 spectators cheering the 1.600 athletes on in the center of the Danish capital Copenhagen on Sunday August 15. Team AXA accomplished at 11 hours and 20 minutes as follows:
Mid
[ 0.6153846153846151, 34, 21.25 ]
Morpheus Backdrop for Photography SKU : CP7361 Searching for a unique photo background? This could be your lucky day! Capture the look of an abandoned car port, factory, or warehouse with the Denny Morpheus backdrop. A one of a kind design for one of a kind photos. Shoots perfectly with all kinds of clothing and accessories Outstanding for studio and outdoor photography Printed in flawless detail and color Now available in colorfast Freedom Cloth, flexible Twist Flex, or moisture resistant canvas Created with precision detail Backdrop Material Backdrop Mounting Backdrop Size You Need These (Just add and save) Backdrop stands up to 50% off (when you purchase a backdrop) By submitting this form, you are granting: Denny Manufacturing, PO Box 7200, Mobile, Alabama, 36670, United States, http://www.dennymfg.com permission to email you. You may unsubscribe via the link found at the bottom of every email. (See our Email Privacy Policy for details.) Emails are serviced by Constant Contact.
Mid
[ 0.6136363636363631, 33.75, 21.25 ]
Pope Francis & the State of Illinois This past week, Pope Francis captured the attention of our nation. His visit brought tears to the eyes of otherwise-cynical TV commentators. The Speaker of the U.S. House, John Boehner, even decided to step down in the wake of the first-ever address by the Roman Pontiff to Congress. We haven’t seen a papal reception like this since Pope John Paul II visited in 1979. In the wall-to-wall TV coverage of Pope Francis, the reporters discussed his speeches in detail, which covered a range of subjects, from the environment to religious liberty, from immigration to the protection of life. But the Pope didn’t lay out a political program – what he shared with our nation is a set of guiding principles. While we are deluged every day by various “programs,” “solutions,” and “four-point plans,” we don’t hear a lot of talk about principles in our political discussions. Not so with the Pope. If you look past the political commentators, you see that the real focus of the Pope’s message was on the virtues of faith, hope and love. In his final homily at Sunday Mass in Philadelphia, Pope Francis summed it up in his words on the family. What touched me was when he talked about the little ways we show love in our family. He spoke of how these gestures of love begin in the family and radiate out into the world and those we encounter: “How are we trying to live this way in our homes, in our societies? What kind of world do we want to leave to our children? We cannot answer these questions alone, by ourselves. It is the Spirit who challenges us to respond as part of the great human family. Our common house can no longer tolerate sterile divisions.” These words can be applied to many different scenarios and issues – to what happens in your home and mine. How do we treat each other? Are we truly doing unto others as we would have them do unto us? The Golden Rule is simple, but certainly not easy to follow! Despite the media reports, Pope Francis is not preaching a different Gospel than that preached by Pope Benedict or Pope John Paul II. For instance, Pope John Paul II regularly spoke of “solidarity” and the common bonds of fraternity and responsibility between all peoples. Looking specifically at Pope Francis’ words, I ask myself how the Illinois General Assembly is doing. What kind of state are we leaving for our children? On the one hand, are we truly caring for the most vulnerable when our funding for the developmentally disabled is the worst in the country? Yet we rack up debt because we refuse measures like pension reform – and refuse to even discuss how to pay for government pensions. Is it right to put off paying for these obligations and instead force our children and grandchildren to pay for them? The principles that Pope Francis has shared are timeless, and if we can agree on the principles, they can guide our consideration of specific policies to improve our common life together. We can look critically at how our government should spend the taxpayer dollars entrusted to it. We can carefully review our laws and legal structures to cut waste and abuse. We can ask whether government policies promote or hurt the family. Then together, we can truly make our state a bit more faithful, a bit more hopeful, and a bit more loving. Paid for by Friends of Peter Breen. A copy of our report filed with the State Board of Elections is (or will be) available on the Board’s official website (www.elections.il.gov) or for purchase from the State Board of Elections, Springfield, Illinois.
Mid
[ 0.649885583524027, 35.5, 19.125 ]
With development potential already realised right across the road, you can see a great example of the type of modern home you can build! Don&rsquo;t miss out on this great opportunity to secure land in a lovely quiet street.
Low
[ 0.42682926829268203, 21.875, 29.375 ]
The designer 2-star Texas Inn features 24-hour reception, laundry and ironing service. The hotel was opened in 2009 and remains an example of historical architecture in Brownsville ever since. More details Offering non-smoking guest rooms, the attractive Surestay Hotel Brownsville lies within a 30-minute walk from Historic Brownsville Museum . The property opened in 2017 and features historical architecture. More details The 2-star Motel 6 Brownsville provides guests with a budget accommodation featuring 24-hour front desk, laundry and housekeeping. The hotel was opened in 2004 and remains an example of historical architecture in Brownsville ever since. More details The 3-star Staybridge Suites Brownsville lies within 6 km from Historic Brownsville Museum . Since 2005 the hotel has been offering accommodation in a 4-story building with historic architecture and furnishings. More details
Mid
[ 0.6009732360097321, 30.875, 20.5 ]
Laxity after cruciate ligament injury in 94 knees. The KT-1000 arthrometer versus roentgen stereophotogrammetry. We examined 94 knees with chronic anterior cruciate ligament injuries, 55 of which had been operated with ligament reconstruction, using the KT-1000 arthrometer (89 N anterior force) and roentgen stereophotogrammetry (RSA, 150 N anterior, 80 N posterior force). In intact knees the tibial displacement did not differ between the methods. In injured knees, operated or not, the KT-1000 recorded smaller AP translations and side-differences than RSA. Thus, the stabilizing effect of reconstructive surgery may be overrated, if evaluated with the standard KT-1000 technique.
Mid
[ 0.620111731843575, 27.75, 17 ]
#%RAML 1.0 title: Swagger Petstore version: 1.0.0 baseUri: 'http://petstore.swagger.io/v2' protocols: - HTTP description: This is a sample server Petstore server. /pet: displayName: pet '/{petId}': displayName: '{petId}' uriParameters: petId: description: ID of pet to return type: string displayName: ID of pet to return get: displayName: getPetById description: Returns a single pet responses: '200': body: application/json: type: Category[] description: successful operation '/{petId}2': displayName: '{petId}' uriParameters: petId: description: ID of pet to return type: string displayName: ID of pet to return get: displayName: getPetById description: Returns a single pet responses: '200': body: application/json: type: Pet1 description: successful operation '/{petId}3': displayName: '{petId}' uriParameters: petId: description: ID of pet to return type: string displayName: ID of pet to return get: displayName: getPetById description: Returns a single pet responses: '200': body: application/json: type: Pet2 description: successful operation post: displayName: addPet description: Add a new pet to the store body: application/json: description: Pet object that needs to be added to the store type: array items: Category responses: '200': description: ok patch: displayName: addPet description: Add a new pet to the store body: application/json: description: Pet object that needs to be added to the store type: Category[] responses: '200': description: ok types: Category: displayName: Category properties: id: type: string required: false name: type: string required: false Pet1: displayName: Pet1 type: array items: Category Pet2: displayName: Pet2 type: Category[] Pet3: displayName: Pet3 properties: ids: type: array items: Category name: type: Category[] home: type: boolean
Mid
[ 0.574423480083857, 34.25, 25.375 ]
Vascularization of small hepatocellular carcinomas: correlation with differentiation. Hepatocellular carcinoma (HCC) is generally considered a hypervascular tumor when visualized by angiography. However, small HCCs are not always found to be hypervascular. To evaluate this, 50 HCCs < or =3 cm in diameter were studied. The 50 tumors consisted of 16 well-differentiated HCCs, 25 moderately differentiated HCCs, and 9 that were each a mixture of well- and moderately differentiated HCC. The mean number of portal tracts in the well-differentiated HCCs was 34% of the number in the surrounding nontumorous liver, and few intratumoral arterioles were seen. In contrast, the mean number of portal tracts in the moderately differentiated HCCs was 0.6% of the number in the surrounding nontumorous liver, and abundant intratumoral arterioles were seen. For HCCs that contained both well-differentiated and moderately differentiated tumor, the distribution of portal tracts and intratumoral arterioles in each portion was similar to that seen in well-differentiated or moderately differentiated HCC alone, respectively. HCCs that were larger than 1.5 cm in diameter had fewer portal tracts and more intratumoral arterioles than HCCs whose diameters were < or =1.5 cm. As small HCCs increase in size and become increasingly dedifferentiated, the number of portal tracts apparently decreases and intratumoral arterioles develop. These findings may reflect changes in the hemodynamics as the HCC develops.
High
[ 0.688741721854304, 32.5, 14.6875 ]
pragma Singleton import Qt.labs.settings 1.0 /** * Persistent Settings related to the GraphEditor module. */ Settings { category: 'GraphEditor' property bool showAdvancedAttributes: false property bool lockOnCompute: true }
Low
[ 0.46201232032854206, 28.125, 32.75 ]
Claude Chappuys Claude Chappuys (c. 1500 – 17 November 1575) was a 16th-century French poet. Biography Born in Amboise, Chappuys was a valet and librarian for François I, then secretary to cardinal du Bellay. He entered the priesthood and was appointed high dean of the Chapter of Rouen by the King. However, the Chapter refused to accept this nomination and he had to accept a post of great cantor of the Rouen Cathedral, which was later reduced to that of canon. In addition to his court poems, he composed blasons, epigrams, epistles, and songs. He was linked to Mellin de Saint-Gelais and Marot, who considered him to be one of the good poets of his time; however, his name remained long forgotten. He died in Rouen 17 November 1575. Works 1538: Panégyrique récité au très illustre et très chrestien roy Françoys premier de ce nom, à son retour de Provence, l'an mil cinq cens trente huit, au mois de septembre 1539: La Complaincte de Mars sur la venue de l'empereur en France,read online 1543: Discours de la Court, présenté au Roy par M. Claude Chappuys, son libraire et varlet de chambre ordinaire read online 1543: L'Aigle qui a faict la poulle devant le coq à Landrecy,read online (satirical poem against the emperor Charles V). 1545: Le Grand Hercule gallique qui combat contre deux, (verse piece to the praise of Francis 1.) 1549: Le Sacre & Couronnement du trèsauguste, trespuissant & treschrestien roy Henry deuxiesme de ce nom à Reims. Lan M D XLVII en juillet. Avec la harengue faicte au roy par monseigneur le cardinal de Guyse archevesque de Reims, & la response du roy 1550: Harangue au roi Henri II lorsque ce prince fit son entrée à Rouen en 1550. 1563: La Réduction du Hâvre de Grâce par le roy Charles, neufiesme de ce nom. Modern editions 1932: Blasons: anatomiques du corps féminin, publiés par le bibliophile B. G., décorés de vignettes par Grès, Chartres: Les Parallèles read online 1967: Poésies intimes, critical edition by Aline Mary Best, Geneva: Droz, series Textes littéraires français Music Wilhelm Killmayer set one of his poems in his song cycle in 1968. Bibliography Louis P. Roche, Claude Chappuys, ?-1575 : poète de la cour de François 1er, thesis for the doctorate of University, presented at the Faculty of Arts of Poitiers, Paris : Les Belles Lettres, 1929 References Sources Louis-Gabriel Michaud, Biographie universelle ancienne et moderne, vol. VIII, 1813, (pp. 69). Précis analytique des travaux de l'Académie des sciences, belles-lettres de Rouen pendant l'année 1852-1853, Imprimerie Alfred Péron, Rouen, 1853, (pp. 457-458). External links Claude Chappuys nomme Mellin de Saint-Gelais dans sa présentation de la cour de François Ier (1543) Le Blason de la main Category:1500 births Category:1575 deaths Category:People from Amboise Category:16th-century French poets Category:French male poets Category:Writers from Centre-Val de Loire
High
[ 0.667647058823529, 28.375, 14.125 ]
The Federalist Papers The Federalist Papers Summary and Analysis of Essay 4 In this paper, John Jay continues his argument in favor of a strong union under a single national government. He contends that such a united government will be better able to deter foreign aggression, particularly from Great Britain, France and Spain. Jay argues that America’s growing economic influence as a trading nation creates tension between American and foreign commercial interests. This tension may lead to foreign powers going to war with the United States, even if the United States gave no just cause for war. Jay argues that a single government can better organize a strong and coordinated defense against foreign aggression than an America divided into multiple independent bodies. Analysis This paper advances one of the core arguments of the Federalist Papers, which is that uniting the thirteen American states under a single union with significant powers will better serve the people. This paper speaks to what Jay asserts is the primary concern of any people: security. Jay structures his argument around a single question: which form of government can best defend Americans from foreign aggression? Is it a single national government with strong powers, or multiple independent governments each representing an individual state or loose confederation of states? He puts this question in the context of America’s growing commercial influence and the inevitable tensions that will arise from economic competition with European powers. He then asks his readers to consider whether a united government will be better able to defend against foreign aggression than a disunited government. He uses the example of Great Britain and asks what would happen if its constituent parts (Wales, Scotland, England and Ireland) all had separate militias responsible for national defense. He suggests that if the United States were divided among multiple sovereign governments, then Americans would be less likely to come to one another’s aid in a time of war. Foreign aggressors could exploit the disunity within the US and pursue a strategy of divide and conquer. Madison didn't believe that Man was inherently good or bad. He believed that Man became what society and opportunity made him. Madison supported the idea that confidence and opportunity allowed Man to achieve, whereas, a lack of those things... Study Guide for The Federalist Papers The Federalist Papers study guide contains a biography of Alexander Hamilton, John Jay and James Madison, literature essays, a complete e-text, quiz questions, major themes, characters, and a full summary and analysis. Essays for The Federalist Papers The Federalist Papers essays are academic essays for citation. These papers were written primarily by students and provide critical analysis of The Federalist Papers by Alexander Hamilton, John Jay and James Madison.
High
[ 0.668192219679633, 36.5, 18.125 ]
/*============================================================================= Copyright (c) 2001-2011 Joel de Guzman Copyright (c) 2001-2011 Hartmut Kaiser Copyright (c) 2011 Jan Frederick Eick Copyright (c) 2011 Christopher Jefferson Copyright (c) 2006 Stephen Nutt Distributed under the Boost Software License, Version 1.0. (See accompanying file LICENSE_1_0.txt or copy at http://www.boost.org/LICENSE_1_0.txt) =============================================================================*/ #if !defined(SPIRIT_NUMERIC_UTILS_APRIL_17_2006_0816AM) #define SPIRIT_NUMERIC_UTILS_APRIL_17_2006_0816AM #if defined(_MSC_VER) #pragma once #endif #include <boost/spirit/home/support/unused.hpp> #include <boost/spirit/home/qi/detail/attributes.hpp> #include <boost/spirit/home/support/char_encoding/ascii.hpp> #include <boost/spirit/home/support/numeric_traits.hpp> #include <boost/preprocessor/repetition/repeat.hpp> #include <boost/preprocessor/iteration/local.hpp> #include <boost/preprocessor/comparison/less.hpp> #include <boost/preprocessor/control/if.hpp> #include <boost/preprocessor/seq/elem.hpp> #include <boost/utility/enable_if.hpp> #include <boost/type_traits/is_integral.hpp> #include <boost/type_traits/is_signed.hpp> #include <boost/mpl/bool.hpp> #include <boost/mpl/and.hpp> #include <boost/limits.hpp> #include <boost/static_assert.hpp> #include <iterator> // for std::iterator_traits #if defined(BOOST_MSVC) # pragma warning(push) # pragma warning(disable: 4127) // conditional expression is constant #endif #if !defined(SPIRIT_NUMERICS_LOOP_UNROLL) # define SPIRIT_NUMERICS_LOOP_UNROLL 3 #endif namespace boost { namespace spirit { namespace qi { namespace detail { /////////////////////////////////////////////////////////////////////////// // // The maximum radix digits that can be represented without // overflow: // // template<typename T, unsigned Radix> // struct digits_traits::value; // /////////////////////////////////////////////////////////////////////////// template <typename T, unsigned Radix> struct digits_traits; template <int Digits, unsigned Radix> struct digits2_to_n; // lookup table for log2(x) : 2 <= x <= 36 #define BOOST_SPIRIT_LOG2 (#error)(#error) \ (1000000)(1584960)(2000000)(2321920)(2584960)(2807350) \ (3000000)(3169920)(3321920)(3459430)(3584960)(3700430) \ (3807350)(3906890)(4000000)(4087460)(4169920)(4247920) \ (4321920)(4392310)(4459430)(4523560)(4584960)(4643850) \ (4700430)(4754880)(4807350)(4857980)(4906890)(4954190) \ (5000000)(5044390)(5087460)(5129280)(5169925) \ /***/ #define BOOST_PP_LOCAL_MACRO(Radix) \ template <int Digits> struct digits2_to_n<Digits, Radix> \ { \ BOOST_STATIC_CONSTANT(int, value = static_cast<int>( \ (Digits * 1000000) / \ BOOST_PP_SEQ_ELEM(Radix, BOOST_SPIRIT_LOG2))); \ }; \ /***/ #define BOOST_PP_LOCAL_LIMITS (2, 36) #include BOOST_PP_LOCAL_ITERATE() #undef BOOST_SPIRIT_LOG2 template <typename T, unsigned Radix> struct digits_traits : digits2_to_n<std::numeric_limits<T>::digits, Radix> { BOOST_STATIC_ASSERT(std::numeric_limits<T>::radix == 2); }; template <typename T> struct digits_traits<T, 10> { static int const value = std::numeric_limits<T>::digits10; }; /////////////////////////////////////////////////////////////////////////// // // Traits class for radix specific number conversion // // Test the validity of a single character: // // template<typename Char> static bool is_valid(Char ch); // // Convert a digit from character representation to binary // representation: // // template<typename Char> static int digit(Char ch); // /////////////////////////////////////////////////////////////////////////// template <unsigned Radix> struct radix_traits { template <typename Char> inline static bool is_valid(Char ch) { return (ch >= '0' && ch <= (Radix > 10 ? '9' : static_cast<Char>('0' + Radix -1))) || (Radix > 10 && ch >= 'a' && ch <= static_cast<Char>('a' + Radix -10 -1)) || (Radix > 10 && ch >= 'A' && ch <= static_cast<Char>('A' + Radix -10 -1)); } template <typename Char> inline static unsigned digit(Char ch) { if (Radix <= 10 || (ch >= '0' && ch <= '9')) return ch - '0'; return spirit::char_encoding::ascii::tolower(ch) - 'a' + 10; } }; /////////////////////////////////////////////////////////////////////////// // positive_accumulator/negative_accumulator: Accumulator policies for // extracting integers. Use positive_accumulator if number is positive. // Use negative_accumulator if number is negative. /////////////////////////////////////////////////////////////////////////// template <unsigned Radix> struct positive_accumulator { template <typename T, typename Char> inline static void add(T& n, Char ch, mpl::false_) // unchecked add { const int digit = radix_traits<Radix>::digit(ch); n = n * T(Radix) + T(digit); } template <typename T, typename Char> inline static bool add(T& n, Char ch, mpl::true_) // checked add { // Ensure n *= Radix will not overflow T const max = (std::numeric_limits<T>::max)(); T const val = max / Radix; if (n > val) return false; T tmp = n * Radix; // Ensure n += digit will not overflow const int digit = radix_traits<Radix>::digit(ch); if (tmp > max - digit) return false; n = tmp + static_cast<T>(digit); return true; } }; template <unsigned Radix> struct negative_accumulator { template <typename T, typename Char> inline static void add(T& n, Char ch, mpl::false_) // unchecked subtract { const int digit = radix_traits<Radix>::digit(ch); n = n * T(Radix) - T(digit); } template <typename T, typename Char> inline static bool add(T& n, Char ch, mpl::true_) // checked subtract { // Ensure n *= Radix will not underflow T const min = (std::numeric_limits<T>::min)(); T const val = min / T(Radix); if (n < val) return false; T tmp = n * Radix; // Ensure n -= digit will not underflow int const digit = radix_traits<Radix>::digit(ch); if (tmp < min + digit) return false; n = tmp - static_cast<T>(digit); return true; } }; /////////////////////////////////////////////////////////////////////////// // Common code for extract_int::parse specializations /////////////////////////////////////////////////////////////////////////// template <unsigned Radix, typename Accumulator, int MaxDigits, bool AlwaysCheckOverflow> struct int_extractor { template <typename Char, typename T> inline static bool call(Char ch, std::size_t count, T& n, mpl::true_) { std::size_t const overflow_free = digits_traits<T, Radix>::value - 1; if (!AlwaysCheckOverflow && (count < overflow_free)) { Accumulator::add(n, ch, mpl::false_()); } else { if (!Accumulator::add(n, ch, mpl::true_())) return false; // over/underflow! } return true; } template <typename Char, typename T> inline static bool call(Char ch, std::size_t /*count*/, T& n, mpl::false_) { // no need to check for overflow Accumulator::add(n, ch, mpl::false_()); return true; } template <typename Char> inline static bool call(Char /*ch*/, std::size_t /*count*/, unused_type, mpl::false_) { return true; } template <typename Char, typename T> inline static bool call(Char ch, std::size_t count, T& n) { return call(ch, count, n , mpl::bool_< ( (MaxDigits < 0) || (MaxDigits > digits_traits<T, Radix>::value) ) && traits::check_overflow<T>::value >() ); } }; /////////////////////////////////////////////////////////////////////////// // End of loop checking: check if the number of digits // being parsed exceeds MaxDigits. Note: if MaxDigits == -1 // we don't do any checking. /////////////////////////////////////////////////////////////////////////// template <int MaxDigits> struct check_max_digits { inline static bool call(std::size_t count) { return count < MaxDigits; // bounded } }; template <> struct check_max_digits<-1> { inline static bool call(std::size_t /*count*/) { return true; // unbounded } }; /////////////////////////////////////////////////////////////////////////// // extract_int: main code for extracting integers /////////////////////////////////////////////////////////////////////////// #define SPIRIT_NUMERIC_INNER_LOOP(z, x, data) \ if (!check_max_digits<MaxDigits>::call(count + leading_zeros) \ || it == last) \ { \ break; \ } \ ch = *it; \ if (!radix_check::is_valid(ch)) \ { \ break; \ } \ if (!extractor::call(ch, count, val)) \ { \ if (IgnoreOverflowDigits) \ { \ first = it; \ } \ traits::assign_to(val, attr); \ return IgnoreOverflowDigits; \ } \ ++it; \ ++count; \ /**/ template < typename T, unsigned Radix, unsigned MinDigits, int MaxDigits , typename Accumulator = positive_accumulator<Radix> , bool Accumulate = false , bool IgnoreOverflowDigits = false > struct extract_int { #if BOOST_WORKAROUND(BOOST_MSVC, >= 1400) # pragma warning(push) # pragma warning(disable: 4127) // conditional expression is constant #endif template <typename Iterator, typename Attribute> inline static bool parse_main( Iterator& first , Iterator const& last , Attribute& attr) { typedef radix_traits<Radix> radix_check; typedef int_extractor<Radix, Accumulator, MaxDigits, Accumulate> extractor; typedef typename std::iterator_traits<Iterator>::value_type char_type; Iterator it = first; std::size_t leading_zeros = 0; if (!Accumulate) { // skip leading zeros while (it != last && *it == '0' && (MaxDigits < 0 || leading_zeros < static_cast< std::size_t >(MaxDigits))) { ++it; ++leading_zeros; } } typedef typename traits::attribute_type<Attribute>::type attribute_type; attribute_type val = Accumulate ? attr : attribute_type(0); std::size_t count = 0; char_type ch; while (true) { BOOST_PP_REPEAT( SPIRIT_NUMERICS_LOOP_UNROLL , SPIRIT_NUMERIC_INNER_LOOP, _) } if (count + leading_zeros >= MinDigits) { traits::assign_to(val, attr); first = it; return true; } return false; } #if BOOST_WORKAROUND(BOOST_MSVC, >= 1400) # pragma warning(pop) #endif template <typename Iterator> inline static bool parse( Iterator& first , Iterator const& last , unused_type) { T n = 0; // must calculate value to detect over/underflow return parse_main(first, last, n); } template <typename Iterator, typename Attribute> inline static bool parse( Iterator& first , Iterator const& last , Attribute& attr) { return parse_main(first, last, attr); } }; #undef SPIRIT_NUMERIC_INNER_LOOP /////////////////////////////////////////////////////////////////////////// // extract_int: main code for extracting integers // common case where MinDigits == 1 and MaxDigits = -1 /////////////////////////////////////////////////////////////////////////// #define SPIRIT_NUMERIC_INNER_LOOP(z, x, data) \ if (it == last) \ { \ break; \ } \ ch = *it; \ if (!radix_check::is_valid(ch)) \ { \ break; \ } \ if (!extractor::call(ch, count, val)) \ { \ traits::assign_to(val, attr); \ return false; \ } \ ++it; \ ++count; \ /**/ template <typename T, unsigned Radix, typename Accumulator, bool Accumulate> struct extract_int<T, Radix, 1, -1, Accumulator, Accumulate> { #if BOOST_WORKAROUND(BOOST_MSVC, >= 1400) # pragma warning(push) # pragma warning(disable: 4127) // conditional expression is constant #endif template <typename Iterator, typename Attribute> inline static bool parse_main( Iterator& first , Iterator const& last , Attribute& attr) { typedef radix_traits<Radix> radix_check; typedef int_extractor<Radix, Accumulator, -1, Accumulate> extractor; typedef typename std::iterator_traits<Iterator>::value_type char_type; Iterator it = first; std::size_t count = 0; if (!Accumulate) { // skip leading zeros while (it != last && *it == '0') { ++it; ++count; } if (it == last) { if (count == 0) // must have at least one digit return false; traits::assign_to(0, attr); first = it; return true; } } typedef typename traits::attribute_type<Attribute>::type attribute_type; attribute_type val = Accumulate ? attr : attribute_type(0); char_type ch = *it; if (!radix_check::is_valid(ch) || !extractor::call(ch, 0, val)) { if (count == 0) // must have at least one digit return false; traits::assign_to(val, attr); first = it; return true; } // count = 0; $$$ verify: I think this is wrong $$$ ++it; while (true) { BOOST_PP_REPEAT( SPIRIT_NUMERICS_LOOP_UNROLL , SPIRIT_NUMERIC_INNER_LOOP, _) } traits::assign_to(val, attr); first = it; return true; } #if BOOST_WORKAROUND(BOOST_MSVC, >= 1400) # pragma warning(pop) #endif template <typename Iterator> inline static bool parse( Iterator& first , Iterator const& last , unused_type) { T n = 0; // must calculate value to detect over/underflow return parse_main(first, last, n); } template <typename Iterator, typename Attribute> inline static bool parse( Iterator& first , Iterator const& last , Attribute& attr) { return parse_main(first, last, attr); } }; #undef SPIRIT_NUMERIC_INNER_LOOP }}}} #if defined(BOOST_MSVC) # pragma warning(pop) #endif #endif
Low
[ 0.5069444444444441, 27.375, 26.625 ]
Men and mental wellbeing: why the secrecy? What do Stormzy, Jonny Wilkinson and Prince Harry all have in common? It’s not a trick question: they’ve all spoken out publicly about their own struggles with mental health. Together, they show that anyone’s mental wellbeing can suffer, and it doesn’t discriminate over age, gender or how rich and famous you are. At any time, 12.5% of men in the UK are experiencing a common mental health problem. To put that into perspective, that’s 1 in every 8 men or two to three players in any given football game. However, compared to women, men are far less likely to confide in a friend or partner or to seek professional help, which means that too many men are suffering in silence and their problems go longer without being resolved. This might explain why men account for 3 in 4 suicides in the UK but it also points to something we might be able to target to lead to positive change: encouraging openness. As a clinical psychologist who worked for several years in an inner London prison, I was amazed at how much effort some men made to portray a “tough guy” image when inside they were consumed with anxiety or depression. It often seemed to me that harder the exterior that someone portrayed, the more turmoil that was going on underneath. The thing is, mental health is a fluid concept and lies on a spectrum: we all experience fluctuations along a line between totally thriving and barely surviving, and that is what makes us human. Anyone who says they’ve never been at the lower end of the spectrum probably isn’t giving you the whole story. So, what needs to change to give men a more equal footing when it comes to maintaining healthy mental wellbeing? First, know yourself: you need to recognise when there might be a problem. It’s normal to have “off days” and to experience fluctuations in sleep, motivation and appetite, but if symptoms like this persist for more than a fortnight, it could be a sign of underlying depression or anxiety, rather than just a fleeting change. Remember that you don’t need to be at breaking point before you ask for help. Adopting a proactive, preventative approach to mental health is an investment so try to address any issues early before things get out of hand. Bust the myth that you’ll be wasting the time of busy health professionals if you see them for a “minor problem”. This is absolutely not the case and your GP will be used to talking about mental wellbeing with patients on a daily basis. And if you do feel dismissed or discouraged by your GP, know that you’re entitled to ask to see someone different within the practice. Lose the idea that men need to be stoic and ”just get on with it”. Admitting to feeling off colour is not a sign of weakness and is by no means a reflection of someone’s masculinity. Experiment with showing a little bit of vulnerability and this can pave the way to being more open in general. If you’re not used to talking about how you feel then it’s going to feel a bit weird but it’s worth a try. Check in with your own mates and colleagues in terms of how they’re getting on too – if someone’s behaviour changes or you notice they’re withdrawing socially, open up a conversation and find out if they’re okay. Numerous campaigns have brought men’s mental health into the spotlight in recent years. The Movember campaign isn’t just about competing to see who can grow the most comedy facial hair. They have campaigned fiercely to reduce male suicide and their message is simple: “Talk. Ask. Listen. Encourage action. Check in.” The message is clear: nobody is exempt from fluctuations in mental health. We know that proactive, early intervention works best: you’d go to the dentist at the first sign of toothache, and you wouldn’t walk around for weeks on end with a broken ankle, hoping it would sort itself out. The approach to mental health should be no different, regardless of your gender.
Mid
[ 0.6467889908256881, 35.25, 19.25 ]
Martinez has Thomas plans Wigan manager Roberto Martinez has told midfielder Hendry Thomas he still has a future at the club despite his lack of involvement towards the end of last season. The Honduras international, entering the final year of his contract, did not feature in the Barclays Premier League after February 1, but Martinez believes the 26-year-old Thomas will provide valuable competition in central midfield after benefiting from a summer break. "It can be difficult to keep people happy who are not in the team, but what's important is that the player realises it's a team game and everyone is going to have good and bad moments," the Latics manager told the Wigan Evening Post. "Hendry is a player who needs to be at 100% from a physical point of view to be able to do himself justice and play his usual high-intensity game. "Although he started the season really well he paid the penalty for playing in the World Cup last summer and not having a proper rest. "The Premier League can be a really cruel competition in that respect and the season was probably a bit too long for him. "Hopefully he'll come back for pre-season raring to go and will be able to rediscover that intensity that we all associate with Hendry. "If he can do that, he'll give us even greater competition for places in that midfield." Report author of article DISCLAIMER This article has been written by a member of the GiveMeSport Writing Academy and does not represent the views of GiveMeSport.com or SportsNewMedia. The views and opinions expressed are solely that of the author credited at the top of this article. GiveMeSport.com and SportsNewMedia do not take any responsibility for the content of its contributors. Want more content like this? Like our GiveMeSport Facebook Page and you will get this directly to you.
Mid
[ 0.5695364238410591, 32.25, 24.375 ]
2015 Labour Party leadership election (UK) The 2015 Labour Party leadership election was an internal Labour Party poll which was triggered by the resignation of Ed Miliband as Leader of the Labour Party on 8 May 2015, following the party's defeat at the 2015 general election. Harriet Harman, the Deputy Leader, became Acting Leader but announced that she would stand down after the leadership election. It was won by Jeremy Corbyn in the first round. Four candidates were successfully nominated to stand in the election: Andy Burnham, Yvette Cooper, Jeremy Corbyn, and Liz Kendall. The voting process began on Friday 14 August 2015 and closed on Thursday 10 September 2015, and the results were announced on Saturday 12 September 2015. Voting was by Labour Party members and registered and affiliated supporters, using the alternative vote system. Support for Corbyn, who entered the race as a dark horse candidate, and the release of opinion polls which showed him leading the race, led to high-profile interventions by a number of prominent Labour figures including Gordon Brown, Tony Blair, Jack Straw, David Miliband, and Alastair Campbell, among others, many of whom argued that Corbyn's election as leader would leave the party unelectable. Despite these interventions, Corbyn was elected in the first round receiving 59.5% of the votes, winning in all three sections of the ballot. Less than a year later, a leadership challenge saw another leadership election, where Corbyn again won, with an increased share of the vote. Procedure The leadership election, triggered by Ed Miliband's resignation, took place under the reformed rules adopted from the proposals of the February 2014 Collins Report, which was led by Ray Collins, Baron Collins of Highbury. The plan entailed a shorter election than the one that took place in 2010, with a new leader being in place before Labour's party conference in September 2015. The review changed the way in which Labour elects leaders. Under the former system, a three-way electoral college chose the leader, with one-third weight given to the votes of the Parliamentary Labour Party (i.e., Labour members of the House of Commons and Labour members of the European Parliament), one-third to individual Labour Party members, and one third to the trade union and affiliated societies sections. Following the Collins review, the electoral college was replaced by a pure "one member, one vote" (OMOV) system. Candidates are elected by members and registered and affiliated supporters, who all receive a maximum of one vote and all votes are weighted equally. This meant that, for example, members of Labour-affiliated trade unions needed to register as Labour supporters to vote. To stand, candidates now needed to be nominated by at least 15% of the Parliamentary Labour Party (PLP), i.e. 35 MPs, at that time. The vote, as in previous elections, was held under the alternative vote (instant-runoff) system. The deputy leadership election was held under the same rules. The election itself was overseen by Electoral Reform Services. In late August, the Labour Party reported that about 552,000 members and supporters were eligible to vote; about 292,000 full members, 148,000 affiliated supporters (members of trade unions and socialist societies who opted to affiliate), plus 112,000 registered supporters. Timetable A meeting of Labour's National Executive Committee took place on 13 May 2015 to set a timetable and procedure for the two elections. Tuesday 9 June 2015 – Nominations open Monday 15 June 2015 (12:00) – Nominations for the Leader close Wednesday 17 June 2015 (12:00) – Nominations for the Deputy Leader close Wednesday 17 June 2015 (12:00) – Hustings period opens Friday 31 July 2015 (12:00) – Supporting nominations close Wednesday 12 August 2015 (15:00) – Last date to join as member, affiliated support or registered supporter and be able to vote Friday 14 August 2015 – Ballot papers are sent out Thursday 10 September 2015 (12:00) – Ballot closes Saturday 12 September 2015 – Special Conference to announce the results The deadline on 12 August 2015 to join as a member or supporter was extended by 3 hours due to heavy demand making the party website difficult to use. Candidates Nominated To be placed on the ballot, candidates for leader had to obtain the nominations of 35 MPs. An MP who nominates a candidate does not have to subsequently support, or vote for, that candidate. Some MPs have stated that they nominated only to ensure that candidate got onto the ballot paper. The number of MPs next to the candidate's name below includes the candidate, who can count as one of the 35 MPs needed. Public nominations for candidates by MPs were as follows: Andy Burnham (68): Debbie Abrahams, Heidi Alexander, David Anderson, Hilary Benn, Luciana Berger, Clive Betts, Paul Blomfield, Kevin Brennan, Julie Cooper, David Crausby, Alex Cunningham, Wayne David, Peter Dowd, Michael Dugher, Bill Esterson, Paul Farrelly, Rob Flello, Yvonne Fovargue, Pat Glass, Mary Glindon, Lilian Greenwood, Margaret Greenwood, Nia Griffith, Andrew Gwynne, Harry Harpham, Carolyn Harris, Stephen Hepburn, Kate Hoey, Kate Hollern, Dan Jarvis, Gerald Jones, Graham Jones, Barbara Keeley, Ian Lavery, Emma Lewell-Buck, Ian Lucas, Holly Lynch, Justin Madders, Rachael Maskell, Chris Matheson, Kerry McCarthy, Andy McDonald, Conor McGinn, Liz McInnes, Alan Meale, Ian Mearns, Lisa Nandy, Albert Owen, Teresa Pearce, Lucy Powell, Yasmin Qureshi, Angela Rayner, Jamie Reed, Christina Rees, Rachel Reeves, Steve Rotheram, Jeff Smith, Owen Smith, Keir Starmer, Jo Stevens, Nick Thomas-Symonds, Anna Turley, Karl Turner, Derek Twigg, Valerie Vaz, Alan Whitehead, Iain Wright Yvette Cooper (59): Jon Ashworth, Ian Austin, Adrian Bailey, Roberta Blackman-Woods, Lyn Brown, Nick Brown, Chris Bryant, Karen Buck, Richard Burden, Liam Byrne, Ruth Cadbury, Ann Clwyd, Vernon Coaker, Judith Cummins, Jim Cunningham, Nic Dakin, Geraint Davies, Thangam Debbonaire, Jack Dromey, Maria Eagle, Jim Fitzpatrick, Colleen Fletcher, Vicky Foxcroft, Helen Goodman, Kate Green, Fabian Hamilton, David Hanson, Sue Hayman, John Healey, Sharon Hodgson, George Howarth, Diana Johnson, Helen Jones, Kevan Jones, Stephen Kinnock, Chris Leslie, Khalid Mahmood, Shabana Mahmood, Seema Malhotra, John Mann, Steve McCabe, Catherine McKinnell, Madeleine Moon, Melanie Onn, Matthew Pennycook, Jess Phillips, Bridget Phillipson, Stephen Pound, Marie Rimmer, Geoffrey Robinson, Naz Shah, Virendra Sharma, Paula Sherriff, Andy Slaughter, Ruth Smeeth, Karin Smyth, John Spellar, Daniel Zeichner Liz Kendall (41): Sir Kevin Barron, Tom Blenkinsop, Jenny Chapman, Ann Coffey, Simon Danczuk, Gloria De Piero, Stephen Doughty, Jim Dowd, Julie Elliott, Louise Ellman, Chris Evans, Paul Flynn, Mike Gapes, Mark Hendrick, Margaret Hodge, Tristram Hunt, Mike Kane, Peter Kyle, Ivan Lewis, Fiona Mactaggart, Siobhain McDonagh, Pat McFadden, Alison McGovern, Jessica Morden, Toby Perkins, Steve Reed, Jonathan Reynolds, Emma Reynolds, Joan Ryan, Barry Sheerman, Gavin Shuker, Nick Smith, Angela Smith, Wes Streeting, Gisela Stuart, Stephen Timms, Stephen Twigg, Chuka Umunna, Phil Wilson, John Woodcock Jeremy Corbyn (36): Diane Abbott, Rushanara Ali, Margaret Beckett, Richard Burgon, Dawn Butler, Ronnie Campbell, Sarah Champion, Jo Cox, Neil Coyle, Jon Cruddas, Clive Efford, Frank Field, Louise Haigh, Kelvin Hopkins, Rupa Huq, Imran Hussain, Huw Irranca-Davies, Sadiq Khan, David Lammy, Clive Lewis, Rebecca Long-Bailey, Gordon Marsden, John McDonnell, Michael Meacher, Grahame Morris, Chi Onwurah, Kate Osamor, Tulip Siddiq, Dennis Skinner, Andrew Smith, Cat Smith, Gareth Thomas, Emily Thornberry, Jon Trickett, Catherine West Before dropping out of the race on 12 June, Mary Creagh had 10 nominations: Sarah Champion, Jo Cox, Neil Coyle, Thangam Debbonaire, Helen Hayes, Susan Jones, Mike Kane, Stephen Kinnock, Tulip Siddiq A total of 26 Labour MPs did not nominate any candidate: Graham Allen, Ben Bradshaw, Alan Campbell, Rosie Cooper, Mary Creagh, Stella Creasy, John Cryer, Angela Eagle, Natascha Engel, Caroline Flint, Barry Gardiner, Roger Godsiff, Harriet Harman, Meg Hillier, Lindsay Hoyle, Alan Johnson, Sir Gerald Kaufman, Ed Miliband, Rob Marris, Ian Murray, Graham Stringer, Mark Tami, Keith Vaz, Tom Watson, David Winnick, Rosie Winterton Withdrew Mary Creagh, Shadow Secretary of State for International Development and MP for Wakefield Chuka Umunna, Shadow Secretary of State for Business, Innovation and Skills and MP for Streatham Declined Diane Abbott, former Shadow Minister for Public Health, candidate for leader in 2010 and MP for Hackney North and Stoke Newington (running for Mayor of London) Rushanara Ali, former Shadow Minister for Education and MP for Bethnal Green and Bow (running for Deputy Leader) Stella Creasy, MP for Walthamstow (running for Deputy Leader) Angela Eagle, Shadow Leader of the House of Commons, former Exchequer Secretary to the Treasury and MP for Wallasey (running for Deputy Leader) Tristram Hunt, Shadow Secretary of State for Education and MP for Stoke-on-Trent Central Dan Jarvis, Shadow Minister of Justice and MP for Barnsley Central Alan Johnson, former Home Secretary, former Secretary of State for Health and MP for Hull West and Hessle David Lammy, former Minister of State for Innovation, Universities and Skills and MP for Tottenham (ran for Mayor of London) Ian Lavery, MP for Wansbeck John McDonnell, MP for Hayes and Harlington Alison McGovern, MP for Wirral South David Miliband, President and CEO of the International Rescue Committee, former Foreign Secretary, candidate for leader in 2010 and former MP for South Shields Lisa Nandy, MP for Wigan Jamie Reed, MP for Copeland Rachel Reeves, Shadow Secretary of State for Work and Pensions and MP for Leeds West Owen Smith, Shadow Secretary of State for Wales and MP for Pontypridd Keir Starmer, former Director of Public Prosecutions and MP for Holborn and St Pancras Jon Trickett, Shadow Minister without Portfolio, former Shadow Minister for the Cabinet Office and MP for Hemsworth Endorsements Media reaction Burnham Burnham was praised for having both "a radical left-wing vision" and being credible enough "to unite the party and win back power", as well as for being someone who "actually listens to party members and the public". Burnham attracted press criticism for claiming £17,000 a year from the taxpayer to rent a London flat, despite owning another within walking distance of the House of Commons. A spokesman for Burnham said that renting out the original flat was necessary to "cover his costs" as parliamentary rule changes meant he was no longer able to claim for mortgage interest expenses. Burnham was criticised for saying that Labour should have a woman leader "when the time is right", with the New Statesman saying that he had "tripped over his mouth again". Cooper Cooper was praised by the Huffington Post for her hard work in local constituencies during the leadership contest and for her preparation for the Local Government Association hustings. She has been criticised both for thanking David Miliband for putting her as his second choice (after Liz Kendall) and for her "broken, downbeat delivery". Corbyn Corbyn's leadership bid has been the subject of fierce discussion within the media. Janan Ganesh in the Financial Times has argued that the election of Corbyn "spells disaster" for the Labour Party. Owen Jones argued in The Guardian that the reason Corbyn was so popular was because he "offers a coherent, inspiring and, crucially, a hopeful vision" addressing social injustice and economic inequality, comparing the surge of support for Corbyn to the popularity of both UKIP in England and the Scottish National Party (SNP) in Scotland. Kendall In June 2015, Kendall's leadership bid received praise from The Sun, who said that she is the "only prayer they [the Labour Party] have". The Sun also praised her for saying 'the country comes first' in response to Andy Burnham who said 'the [Labour] Party always comes first' in the Newsnight Labour leadership hustings. Commentators from across the political spectrum have said that Kendall is the leadership candidate that the Conservatives "fear the most". However, the Huffington Post criticised her, saying "Liz Kendall just doesn't seem to have it, she seems to be always on the verge of tripping over her own words, as if she is perpetually being caught off guard." Dispute over election integrity One of the most notable features of the election was the large increase in Labour Party membership, and the registration of significant numbers of the new affiliated and registered classes of voting supporters, during the period of the campaign. Concern was expressed that the new rules were unfairly benefiting Corbyn, and there might be a legal challenge, but in the event the result was so decisive these concerns were not pursued after the election. In June 2015, the Conservative-identifying political commentator Toby Young wrote in the Telegraph encouraging Conservatives to join Labour to vote for Jeremy Corbyn, his reason being "to consign Labour to electoral oblivion". This trended on Twitter as #ToriesforCorbyn and the attempt, as well as Labour's response, were subject to criticism. Two days later the Communist Party of Great Britain (Provisional Central Committee) wrote also in support of Corbyn. Following this, Labour MP John Mann called for the election to be halted. Acting leader of the party Harriet Harman responded by calling on constituency parties to check new members, but stated that Labour has "a robust system to prevent fraudulent or malicious applications." Labour MP Fabian Hamilton stated there was "no evidence" that groups were trying to infiltrate the election. Leadership candidates Andy Burnham and Liz Kendall also responded by saying there was no evidence of infiltration, and while not dismissing the claims, Corbyn stated he only wanted "genuine Labour supporters" to vote for him. Rejected voters It emerged in early August 2015 that 260 former candidates from the Green Party, Left Unity and the Trade Union and Socialist Coalition had attempted to become registered supporters but would now be blocked from voting. Shortly before this it was revealed that Conservative MP and former junior minister Tim Loughton had been caught applying to become a registered Labour supporter, subsequently claiming that his intention was to "blow the gaff on what a complete farce the whole thing is". Veteran Labour MP Barry Sheerman also joined calls for the election to be "paused" over the fears of infiltration by other parties. The Labour Party told representatives of the four candidates at a meeting on 11 August that 1,200 members and supporters of other parties had been excluded and a further 800 were under investigation. Harriet Harman at the time admitted that as many as 100,000 people may be blocked from voting. The number of those rejected would eventually reach 56,000, around 9.1% of the 610,753 considered eligible to vote at the start of the contest. According to the party, 45,000 of those were rejected for not being on the electoral register. Labour also confirmed that it would cancel supporters' votes after they had been cast if it was found that they were members of other parties. A number of high-profile individuals were blocked from voting, including Marcus Chown, Jeremy Hardy, Douglas Henshall, Ken Loach, Francesca Martinez, Mark Serwotka, Pete Sinclair, Mark Steel, Luke Wright and Toby Young. Andrew MacKinlay, a former Labour MP, further alleged that Labour was attempting to rig its own leadership election against Corbyn; a view shared by Jeremy Hardy. Such allegations became known to the media – and particularly Corbyn supporters – as the "Labour Purge", with #LabourPurge trending on Twitter. Claims of such a "purge" of Corbyn supporters were rejected by Harman who insisted that the exclusion processes were impartial to candidates. Scottish newspaper The National printed a page-long satirical cartoon speculating further vote-rigging by Labour's leadership. Missing ballots With less than 24 hours to go before the voting deadline, the party closed their telephone helpline. The move came during widespread complaints from "thousands" of voters who were missing emailed or physical ballot papers. The Guardian reported that one of their sources in the leadership camps stated that "the party has basically decided to stop taking calls and if you don't have a vote, you're now basically not getting one." The party refused to confirm how many ballot papers had actually been sent. Andy Burnham publicly criticised the number of missing ballots and the closure of the phone line. Labour MP David Lammy called for a full inquiry into the missing ballot papers. Of the 200 people his team phone called in London on the eve of the deadline, one in five were missing their ballots. Debates Television Radio Online Opinion polling The polls in this section have been undertaken by media pollsters known to use industry standard polling methods. The polls below were conducted after nominations for the leadership ballot closed. Where there is more than one line for a poll, this is for when a candidate has been eliminated and their second or third preference votes passed onto another candidate. Polling of eligible voters The polls below show voting intention amongst those eligible to vote in the leadership election. July 2015 August 2015 Polling of Labour voters The polls below asked Labour supporters across the country how they would vote in the leadership election if they were eligible. Polling of British voters The polls below asked voters across the country how they would vote in the leadership election if they were eligible. Polling of London voters The polls below asked voters in London how they would vote in the leadership election if they were eligible. Polling before close of nominations Labour members The polls below were conducted before nominations for the leadership closed and therefore include Labour politicians who were not in the final four candidates who were nominated. Labour voters Former Labour PPCs British residents Result Turnout for the vote was 422,871 (76.3%) of the 554,272 eligible voters, with 207 spoilt ballots. 343,995 votes (81.3%) were cast online, the UK's largest online ballot. Political reaction to the result Domestic Labour Party Ed Miliband, former party leader, offered his support to Corbyn and urged other Labour MPs to do so, though he ruled himself out of taking on a position in Corbyn's shadow cabinet, to focus on representing his constituency. Kezia Dugdale, leader of Scottish Labour, declared that "politics has changed" and people desired a "radical change", with Corbyn's election to the leadership showing that Labour had "listened to that call". Carwyn Jones, leader of Welsh Labour and First Minister of Wales, congratulated Corbyn and urged the party to embrace the fact that the campaign had "energised a huge number of people who were previously disengaged from party politics" and unite around their new leader. Corbyn's rivals for the leadership each reacted to the result. Andy Burnham said that Jeremy Corbyn was a politician with "very deep beliefs, very strong principles" which voters would embrace. Burnham later replaced Yvette Cooper as Shadow Home Secretary after she announced that she would not serve on a Labour frontbench led by Corbyn and that she would instead focus on playing a role in the upcoming EU membership referendum. Following the close of voting, Liz Kendall made a speech reflecting on her campaign stating that, after the New Labour government, there was never any debate in relation to the direction the party should go, and it had created a split "between the party and the country". All three of Corbyn's opponents in the leadership election stated they would support Corbyn, that the result should be accepted and the party should focus on attacking the Conservative government. During the announcement of Corbyn's victory, Jamie Reed resigned as a Shadow Health Minister, citing his difference in opinion, with the new leader, over the replacement of the Trident missile system. Chris Leslie (Shadow Chancellor of the Exchequer), Yvette Cooper (Shadow Home Secretary), Chuka Umunna (Shadow Secretary of State for Business, Innovation and Skills), Rachel Reeves (Shadow Secretary of State for Work and Pensions), Emma Reynolds (Shadow Secretary of State for Communities and Local Government), Tristram Hunt (Shadow Secretary of State for Education), Mary Creagh (Shadow Secretary of State for International Development) and Liz Kendall (Shadow Minister for Care and Older People) also confirmed they would not serve in Corbyn's shadow cabinet. Conservative Party David Cameron, leader of the Conservative Party and Prime Minister, stated that Corbyn's win would make the Labour Party a threat "to our national security, to our economic security and to the security of your family". This echoed the same warning from other Cabinet ministers, including Michael Fallon, current Secretary of State for Defence, and from an email sent by Conservative Campaign Headquarters to party members. However Nick Hurd, former Minister for Civil Society, and Daniel Hannan, MEP for South East England, both warned their party against "complacency". Ruth Davidson, leader of the Scottish Conservative Party, said that the result demonstrated that Labour had given up on being in government, and that many Labour MPs would show "despair at his appointment". UK Independence Party Nigel Farage, leader of the UK Independence Party, congratulated Corbyn but added his concerns about the new Labour leader's immigration policies. Before Corbyn's win, Farage stated that Corbyn's "sweeping emergence on the Left of British politics, where he has helped re-engage many who had given up on politics, is a good thing for our democracy". Liberal Democrats Tim Farron, leader of the Liberal Democrats, commented on the "massive space in the centre ground of British politics" that had been opened up, due to the perceived shift leftwards by Labour, and suggested that the Liberal Democrats would be able to appeal more directly to "sensible, moderate, progressives who are opposed to what the Conservatives are doing, but cannot bring themselves to support a party of the hard left". The President of the Liberal Democrats, Sal Brinton, accused Labour of abdicating "its responsibilities" as a party of effective opposition. Willie Rennie, leader of the Scottish Liberal Democrats, said that Corbyn's success meant a "return to the damaging see saw politics of the past". Kirsty Williams, leader of the Welsh Liberal Democrats, attacked Corbyn as the "opposite of what this country needs", accusing Labour of returning to its 1970s policies. Green Party of England and Wales Natalie Bennett, leader of the Green Party of England and Wales released a statement saying that her party would be "delighted" to work with Corbyn on a range of issues where they share common ground. Scottish National Party Nicola Sturgeon, leader of the Scottish National Party and First Minister of Scotland, praised Corbyn on winning the leadership contest but claimed that Labour's failure to defeat the Conservatives at the next general election would further the cause for Scottish independence and leave the SNP as the only real opposition. Plaid Cymru Leanne Wood, leader of Plaid Cymru congratulated Corbyn and urged the Labour Party to join with her party's MPs in opposing "Tory policies that are causing great harm to people in Wales and beyond". Social Democratic and Labour Party Alasdair McDonnell, leader of the Social Democratic and Labour Party commended Corbyn on an "incredible election campaign" and urged him to work towards returning Labour to an electable position, as well as opposing Conservative policies. Ulster Unionist Party Mike Nesbitt, leader of the Ulster Unionist Party called on Corbyn to maintain Labour's policy towards Northern Ireland and "support agreements brought forward by the local parties". International – Then President Cristina Fernández de Kirchner sent her congratulations to Corbyn, hailing him as "a great friend of Latin America". – The country's governing party, Syriza, released a statement welcoming the election of Corbyn and arguing that the result would strengthen the "pan-European front against austerity". – Gerry Adams, the President of Sinn Féin, tweeted his words of congratulation to Corbyn. – Alexander Yakovenko, the Russian Ambassador to the United Kingdom, said that he hoped that Corbyn's election would create a "positive change" in the debate around Russia-United Kingdom relations. – Íñigo Errejón, the Political Secretary of Podemos, described the result as being part of a "wave of change" across Northern Europe. – U.S. Senator Bernie Sanders, a candidate for the Democratic Party's nomination for president in the 2016 U.S. presidential election, announced that he was "delighted to see that the British Labour Party has elected Jeremy Corbyn as its new leader." He added: "We need leadership in every country in the world which tells the billionaire class that they cannot have it all. We need economies that work for working families, not just the people on top." Analysis Nobel prize-winning economist Paul Krugman said that it was not surprising that Jeremy Corbyn won the leadership contest, as all the candidates except for Corbyn essentially supported the Conservative government's austerity policies. As Krugman noted, not only the candidates but also the Labour moderates implicitly agreed with their opponents' idea that the government budget should always be balanced by the austerity policies. Krugman argued that it was a false claim that the Labour party, in power during 1997–2010, spent far beyond their means and caused a debt crisis. Economist Joseph Stiglitz, also a Nobel prize winner, argued that the Labour party platform was different from what a leftist party must do, saying that Labour had not opposed austerity programmes. He added that Corbyn's camp offered a left-wing agenda and therefore Stiglitz was not surprised at all that Corbyn became the contender for the leadership contest. See also 2015 Labour Party deputy leadership election London Labour Party mayoral selection, 2015 2015 Scottish Labour Party leadership election 2015 Liberal Democrats leadership election 2016 Conservative Party leadership election 2016 Labour Party leadership election (UK) Political party affiliation in the United Kingdom References External links Category:Jeremy Corbyn Category:Andy Burnham Labour Party leadership election Labour Party leadership election Labour Party leadership election 2015
Mid
[ 0.6390804597701151, 34.75, 19.625 ]
Q: Django url regex termination $ not matching route I have this rule that it is not matching the current route and I don't know why: path(r'api/user/connections/worker/<str:identifier>/$', views.connections.Detail.as_view()), The current url is: localhost:8000/api/user/connections/worker/test/ but it gives a 404. Without the dollar sign at the end it works but this would turn it into a catch-all rule for other routes that might share the same path and I'm trying to avoid it. Any ideas? A: new Django path() syntax does not use regex as argument just as fun fact $ is URLencoded so your URL would be available on localhost:8000/api/user/connections/worker/test/%24
High
[ 0.656796769851951, 30.5, 15.9375 ]
Philip Messing et al., New York Post, January 8, 2015 A man yelling “I want to kill cops” tried to run down two Port Authority Police officers with his car near the entrance to the ­Holland Tunnel Wednesday night in the latest attack on officers. Matthew Christian Cash, who has an extensive criminal record, was barreling down a restricted fire lane near Varick and Watts streets when he barely missed cops patrolling the tunnel and smashed his silver Audi right into their ­police cruiser at about 8 p.m., authorities said. After crashing into the cruiser, the unhinged man twice screamed “I want to kill cops” and struggled with officers trying to detain him, according to sources. “He was putting up a fight,” said witness Michael Rosselli. “They had to get him into the cruiser. He was kicking at the ­window trying to get out. They had medics on standby.” {snip} Cash, 24, was traveling with a female companion who told officers he received a phone call that seemed to upset him just before he flipped out and sped into the cop car. Officers on the scene said it wasn’t clear if he was aiming for the two cops or a security booth near the tunnel. Police sources said synthetic marijuana was found in the Audi and the crazed man claimed he was on angel dust. {snip}
Low
[ 0.46222222222222203, 26, 30.25 ]
An LPE membership is for highly ambitious Chiropractors who are driven to grow their practices, strengthen their businesses, and improve their lives. Are you the type of person that would invest $59/month in order to make an additional $5K, $15K, or $50K per month? Are you the type of person that would invest 20-30 minutes per week to learn how to better influence and impact more lives? If so, you have come to the right place. If not, you have bigger issues than I can help you with. (haha) Many Docs Have Already Joined LPE... You Will Be Glad You Did Too! An LPE Membership Is For You, If You Want To Have Any Of The Following:
Mid
[ 0.584951456310679, 30.125, 21.375 ]
Q: Redirect URLs to other domain with .htaccess So I am getting rid of my blog on my main site and want to direct everybody to my other domain where I will continue. I have already cross posted my most popular articles, but I want people to be directed there automatically. How can I use .htaccess to redirect specific URLs to the new URLs? IE http://domain.com/blog/2015/jan/responsive-doesn-t-mean-mobile-first Thanks in advance! A: You can use RedirectMatch to redirect your rule to a new location . Try in htaccess : RedirectMatch ^/blog/2015/jan/responsive-doesn-t-mean-mobile-first$ http://newdomain.com
Mid
[ 0.649867374005305, 30.625, 16.5 ]
Sharing is caring! Share Tweet Pin 1 shares As humans, we need to be sure that we are taking the right diets and sticking to relevant exercises as ways of keeping fit. With the introduction of herbal medicine into some aspects of the healthcare sector, many people have started to adopt it. That is based on the fact that the human body needs to undergo many processes, which help it to remain in top shape at all times. With the several body systems contributing their quota for that, the body’s immune system, which is also one of them, needs more of the contributions. Worthy of note is that the human immune system is like the “motor or engine” that drives the entire body. Therefore, any breakdown or inordinate functions to that end could mean adverse effects on the entire body. Moreover, the primary function of the human immune system, which is to fight illnesses and diseases, might not be feasible if it is not working as ought to. Therefore, it needs to be active at all times so that the body would be less susceptible to the excessive attacks originating from foreign bodies and diseases. Can Herbal Medicine Help? The conventional/traditional drugs are not getting the competition from natural or herbal medicine variants. If you’re one of those people that want to stick to everything natural, then this could be the option you’re looking for to boost your immune system. Interestingly, the use of herbal medicine is not a recent phenomenon because it has been in use for many decades. The use of herbal medicine is not unconnected to the many proofs of its effectiveness in increasing the protection of the immune system. Among the many ways, it achieves that is by supplying the body with the necessary supplements needed for the immediate bolstering of the immune system. University of Hawai‘i–West O‘ahu:https://www.flickr.com/photos/uhwestoahu/24125988718 Feasible Ways of Using Herbal Medicine to Boost the Immune System If you’re as fascinated as we are about the potentialities of herbal medicine in boosting the immune system, then you want to discover how to go about it. There are many natural ways of putting herbal medicine to good use. Each of the methods has its distinct features. Here are the top five (5) natural ways of boosting the immune system including those you can achieve using herbal medicine. READ ALSO: This Amazing Ginger-Garlic Soup Is All You Need to Reinforce Your Immune System Engage in More Physical Activities There are times when we throw away the suggestions to be more active with our exercises. When we talk about exercises, the focus is not on the regular jumping and others. It is more of being mindful of the kind of exercise you choose to engage in. It’s exciting to note that when you engage in the right kind of exercise, you would also be aiding the immune system to be healthy. You might not be asking yourself the right exercise you can engage in. It’s ideal that you do more of slow walking, some stretches, and a little bit of jumping. You would discover that through consistency, you can be able to trigger the production of more vitamins, such as Vitamin D, as well as maintaining the immune system’s ideal way of functioning. Herbal Substances Can Help This is the point where the intake of herbal medicine plays a dominant role in the bolstering of the immune system. Organic supplements in this category have been tipped for having antioxidant, anti-inflammatory, and antibacterial properties, which aid in the increment of the immune levels. The most significant of the herbal substances you can take is Astragalus. With the reputation as one of the leading Chinese herbal medicines, it has among many functions, the maintenance of the immune levels, and the resistance against foreign bodies. On the other hand, you may want to try Angelica Root. It is one of the herbal substances that fight respiratory problems as well as modulating the functions of the immune system. The last but not the least is the combination of honey and ginger. They are powerful antioxidants that aid in the maintenance of the body’s immune system. They also contain anti-inflammatory and antibacterial properties, which bolster the immune systems in their own ways. Peter Heeling:https://skitterphoto.com/photos/1743/drinking-tea-while-studying Rest Your Nerves All work and no play makes Jack a dull boy, they say. You don’t have to be working in a round-the-clock format. Instead, give yourself some break at some points. As a rule, aim to attain a minimum of 7 hours of sleep recommended for adults. When you begin to do that, you would realize that your body would regain the lost strength because of the excessive production of the cortisol hormone. When you begin to “rest your nerves” and sleep well, the body can then be in the best shape to fight any disease, illness, and foreign body. Reduce the Intake of Alcohol You have to modify your lifestyle, and tobacco and alcohol are some of the primary things you have to give up. That is because the excessive intake of both can cause the body’s immune system at a disadvantage. It doesn’t stop at that. Ear infections and bronchitis are some other problems triggered by the continuous intake of alcohol and tobacco. Therefore, avoid tobacco and alcohol as you continue with the natural/herbal medicine method of boosting the immune system. Change Your Diet Of course, you wouldn’t be eating the same meals that caused the problem in the first place. Therefore, a change in meal is important. Note that changing the meal demands incorporating more vegetables and fruits into your meals. Other food types, such as seeds, and nuts also have roles to play in bolstering the immune system. When you begin to adapt to this dietary change of lifestyle, it would be to your benefit as the antibodies would be in better shape to do their work. Final Words Your body’s immune system needs to be active and healthy at all times. With many diseases rampant today, you can’t afford to take the risk of having a low or malfunctioning immune system. Therefore, take a cue from the aforementioned natural methods to bolster the work of your body’s immune system. Poly Tig Polly Tlg has always been interested in holistic and alternative ways of healing. Ayurveda and yoga are the best medicines for her. Deeply intuitive she finds that true healing surpasses the boundaries of the physical body and embraces the emotional, energetic and subtlest layers of our being. Polly helps people to know how to be healthy and beautiful using only natural remedies. She believes that nature is the best source of human health. More Health & Longevity Topics
Mid
[ 0.56629213483146, 31.5, 24.125 ]
This invention relates to a device for controlling a person""s authorization upon utilization of a service with a data carrier that communicates with a reader. In order to prevent abusive use, data carriers, in particular smart cards, are nowadays used with a PIN number. Since the user must remember different numbers for different smart cards, there is a danger of him confusing or forgetting the individual PINS. This increases the error rate in smart card use, which e.g. results in even longer waiting lines than are already caused by PIN entry at peak times. DE 19648767 A1 discloses a device wherein the data carrier is formed by a smart card in which the authorized person""s fingerprint is stored and which is provided with a sensor that detects the user""s fingerprint. If the comparison yields a match when the smart card is inserted into the reader, the actual smart-card function, for example access, is released. It is also known, for example, from WO 88/04153 and EP 0691822 B1 to identify persons by the patterns of their subcutaneous blood vessels. The relevant person""s hand is positioned by the grasping of a handle or the like and the infrared emission spectrum of the back of the hand then measured. Compared to smart cards and similar data carriers that must be inserted into a reader, contactless-type data carriers, which cooperate with the reader in the radio wave range over a relatively large data transfer distance, have the advantage of being able to be fastened to clothing in the form of a card or integrated into a wristwatch for example, i.e. used xe2x80x9chandfree.xe2x80x9d Accordingly, contactless-type data carriers are preferably used for example with access control devices of ski lifts and cable cars, which generally have a person singling device, such as a turnstile, which is operated by the reader, i.e. unblocked for a person, when the reader receives corresponding data from the data carrier. Since a PIN code and a fingerprint sensor are out of the question for skiers, if only because of the gloves skiers wear, the nontransferable data carrier is nowadays usually combined with a photo fastened to the skier""s clothing in order to prevent transfer to other persons. However, show the photo involves considerable effort. The object of the invention is therefore to provide a contactless-type data carrier with nontransferable, personal authorization to utilize a service, for example for the passenger conveyors of a skiing area, that prevents abusive transfer to other persons. This is obtained according to the invention by forming the contactless-type data carrier by an object worn on the skin and provided with a sensor detecting biometric identification feature of the skin. The object worn on the skin may be a garment, for example a glove or headband. However, especially preferred objects are ones worn independently of the ambient temperature, for example a bracelet, wristwatch or ring. The biometric skin identification features detected by the sensor may be of different kinds. For example the skin furrow relief can be detected. The measurement of this feature is described in DE 2719341 C3 or DE 3433194 A1. However, an infrared sensor is preferably used. This sensor is positioned on the object so as to rest on the skin and reliably detect the subcutaneous pattern of arteries, veins, capillaries and other blood vessels thereunder. Since the hand has a special individual, intensive subcutaneous blood vessel pattern, the inventive object is preferably worn with the sensor in this area. Accordingly, the data carrier used according to the invention is a bracelet, wristwatch, ring or glove, in order to communicate contactlessly with the reader, on the one hand, and for the sensor at the same time to detect the biometric skin identification features in the area of the hand, i.e. the biometric skin identification features on the back of the hand (glove), a finger (ring) or the wrist (bracelet or watch). Compared to other objects worn on the skin, for example a headband, the abovementioned objects worn on the hand have the additional advantage of resulting in a corresponding positioning of the sensor in the hand area whose biometric skin identification data have been stored, since they are more or less always worn at the same place. The data of the biometric features to be identified can be read and stored in a chip in the wristwatch or other data carrier worn on the skin. The chip, at the same time, forms the means for comparing the stored biometric identification feature with the detected biometric data. If the comparison yields a match of the biometric data read and stored in the chip with the biometric data measured by the sensor, a data transaction with the reader is effected with the transponder for noncontacting data transfer in the object worn on the skin, thereby releasing the access control device. Further, it is possible to store the biometric data to be identified of the access-authorized persons of the relevant access control device in a memory associated with the reader or in a central processing unit with which the reader is connected on- or off-line. The reader or central processing unit thus also contains the means for comparing the stored biometric data to the detected biometric data. Finally, the biometric data to be identified can be stored both in a chip in the particular data carrier worn on the skin and in the reader or central processing unit if especially high security requirements are necessary. In order to prevent unauthorized readout and changing of the data, the biometric data can be stored in a cryptologically protected memory area that is not freely accessible. The reader is formed to radiate electromagnetic waves, in particular in the radio wave range. It has, for this purpose, coils and capacitors, resonant circuits, optocouplers and the like. The data carrier, which is preferably formed as a transponder, likewise has devices such as coils, capacitors, resonant circuits, optocouplers for nongalvanic energy and/or data transfer, so that energy and/or data are transferred between the data carrier and the reader. The sensor is preferably set in operation by the transponder only when the data carrier is located at the transaction distance from the reader. The inventive device is employable for example in tourist areas to register authorizations for access to ski lifts, cable cars and other tourist facilities, such as indoor swimming pools, parking garages and values for cashless payment transactions in restaurants, sport stores, etc. However, the inventive device is, of course, not limited to tourism. Rather, such a contactless-type data carrier can be used for a great variety of applications, for example the utilization of public transport systems, as an electronic purse and the like, i.e. in particular as a multifunctional data carrier that is employable for as many applications as possible, even as the only personal data carrier with which a person can utilize practically all services that can be controlled with a reader.
Mid
[ 0.598290598290598, 35, 23.5 ]
Screenshot : SoMD Blue Crabs ( Twitter Around the time that robot umpires were brought in to help officiate the Atlantic League All-Star Game, Major League Baseball and the independent league’s front office decided to tack on a few more rules to experiment with for the second half of the season. Among them included an expansion on the current dropped third strike rule in the majors, which now allows batters to try and steal first if a pitch is not “caught in flight” by the catcher. On Saturday, Tony Thomas, an outfielder for the Southern Maryland Blue Crabs, became the first person to actually use this new rule, and the first player in baseball history to successfully steal first base. On the second pitch of his plate appearance, the ball flew right past the Lancaster Barnstormers’ catcher for what normally would have been a 1-1 count. After a couple seconds of inaction between the two players, something appeared to suddenly click in Thomas’s head that reminded him of this rule change—likely a teammate or coach yelling at him. With the ball rolling all the way to the backstop, the catcher was unable to get to the ball before Thomas made it to first safely. The rule on its own seems fine, but it’s hard to have faith in any rule changes that stem from the office of someone who fundamentally does not seem to enjoy baseball. It’s also kind of shitty that this sizable change to the sport was made in the middle of a season, and uses players who aren’t even at the highest level of the sport as guinea pigs—especially the catchers, who suddenly have to improve on an athletic skillset that will only really be needed in this specific league. But those issues ultimately don’t matter a whole lot to Rob Manfred, who just wants to see if any of this shit sticks to the wall, and if adding this change will finally get Mookie Betts to be in more commercials, or something. Baseball fans might as well start preparing themselves to see this happen in a World Series in a few years.
Low
[ 0.49667405764966704, 28, 28.375 ]
Small supportive treatment units and the problem of recidivism in indigent chronic schizophrenic patients. This is report of a three and a half year follow-up of uprooted chronic schizophrenics, who had become disposition problems at the time of discharge from a state psychiatric hospital. One group of 14 was discharged to themselves, another in small supporting units. The results are encouraging and may throw some light into the problem of recidivisim. All patients were diagnosed chronic schizophrenic. They had multiple hospitalizations, came from the same catchment area, and were followed by the same therapist in the same hospital setting.
High
[ 0.658823529411764, 35, 18.125 ]
The race for interferon-free HCV therapies: a snapshot by the spring of 2012. After a decade of having been the standard of care (SOC) for the treatment of chronic HCV infection, PEGylated IFN (combined with ribavirin) is now at the verge of being complemented and then replaced by a combination of new DAAs and even some compounds interacting with host cell factors. Principal targets for the direct-acting antivirals (DAAs) are the protease NS3/4A, the protein NS5A, and the RNA-dependent RNA polymerase NS5B, which offers at least two target sites, the catalytic domain for nucleos(t)ides and several non-catalytic (allosteric) domains for the non-nucleoside type of NS5B inhibitors. Two PIs have already been approved, but many more NS3/4A, NS5A, and NS5B (up to 40!) inhibitors are in (pre)clinical development. The abundance of candidate anti-HCV drugs will, on the one hand, speed up their development but, on the other hand, complicate the choice of the most appropriate drug combination(s).
Mid
[ 0.6456310679611651, 33.25, 18.25 ]
1. Field of the Invention The present invention relates generally to the field of testing a semiconductor memory chip and more specifically to optimizing repair time using a fuse identifier associated with the semiconductor memory chip. 2. Discussion of the Related Art In order to ensure that a semiconductor device, such as a DRAM, is reliable, multiple tests are performed on the device before and after packaging. A DRAM includes an array of memory cells or bits in rows and columns. After packaging, a plurality of tests are performed on the device in order to determine whether there is a defect in the array of bits that will fail over time. For example, burn-in testing is performed to accelerate failure using voltage and temperature stress. When a failed memory cell is detected, the row or column in which the failed memory cell is located is substituted by a redundant row or column, respectively. After packaging, this substitution is performed using antifuses in the memory chip. Antifuses are capacitors including two conductive layers spaced by a thin insulative material, such as silicon nitride. Under normal biasing conditions, no DC current flows through the antifuse. Upon application of an excessive bias across the two conductive layers, however, the thin insulative material breaks down, thereby shorting the two conductive layers. Thus, redundant memory elements coupled to the antifuses can be selectively connected to circuitry external to the memory array by applying the excessive bias to desired antifuses. If a memory chip fails any one of the tests, it is placed in a failure bin and becomes a candidate for antifuse repair. During the repair step, redundancy analysis is performed on each of the failed memory chips which involves repeating tests in order to identify specific bits that have failed. Once a failed bit is located, either the entire row or column in which it is located is replaced with a corresponding redundant row or column. Redundancy analysis has half the throughput of the initial testing analysis because the initial analysis typically tests 64 sites wide on a chip such as 16M DRAM while redundancy analysis only tests 32 sites wide on the memory chip. Due to the relatively large amount of time required to perform redundancy analysis, only a subset of tests are run, such as the ten most commonly failed tests. However, faulty memory cells in chips failing tests not among these top ten failing tests will not be detected and repaired during redundancy analysis. In accordance with the purpose of the invention, as embodied and broadly described herein, a method is provided for testing integrated circuits or semiconductor memory chips, such as DRAMs, having a plurality of bits or memory cells. Each memory chip has a unique identifier, preferably a fuse identifier having a series of selectively blown fuses corresponding to a unique binary number, located on the memory chip. The information contained in the fuse identifier is also stored in a database. Tests are performed on the memory chips and when a memory chip fails a test, the memory chip is placed in a repair bin and the failed test identifier is stored in the database with the associated memory chip identifier. In order to repair the memory chip, failed test data are read out of the database and only selected tests which the chips failed are again performed on the failed memory chip in order to determine which bit in the memory chip is faulty. The failed bits are then repaired preferably by substitution of redundant rows or columns.
Mid
[ 0.636579572446555, 33.5, 19.125 ]
To minimise security risks, the Pakistan People's Party (PPP) has decided to use 3D hologram technology for its chairman Bilawal Bhutto Zardari's appearances at rallies, The Express Tribune learnt on Tuesday.The party’s technology experts have successfully tested the 3D hologram system in mock sessions. Bilawal will use the technology to simultaneously address party activists and supporters in different cities of the country next Sunday.After the assassination of former premier Benazir Bhutto at a public rally in 2007, Bilawal’s security, especially in Punjab, has remained the prime concern for his family and the party.In his recent public appearances in Lahore and other cities of Punjab, policemen and guards from Sindh were seen accompanying the PPP chief.They were deployed at the Bilawal House, Lahore and in his cavalcade.During last year’s PPP foundation day celebrations, several party leaders had indicated that functions at Bilawal House, Lahore were limited over security concerns.Bilawal himself has also expressed concerns over the Punjab government's arrangements for his security.Political pundits believe the appearance of "Bhutto" at rallies is necessary for the revival of the PPP in Punjab and other parts of the country.They say that the PPP's campaign for the 2018 general elections will not make a major difference if Bilawal is not physically present at rallies to interact with the public.PPP Central Secretary Information Chaudhry Manzoor Ahmad confirmed that the party would use the technology for small public gatherings of 2,500 or 3,000 people.However, he maintained that the party did not intend to use it for bigger rallies."Everywhere in the world, politicians ad business leaders are using such technologies for mass communication," he explained."It will help the PPP chairman in disseminating his message more efficiently and effectively," he added."With the help of this system, a life-size 3D hologram image of Bilawal can be broadcast right in front of the people."PPP leader Ali Qasim Gillani said the party was also planning to arrange meetings with media personnel in Lahore, Karachi, Islamabad and other cities of the country for a demonstration of its hologram technology.
Mid
[ 0.60310421286031, 34, 22.375 ]
Trouble logging in?We were forced to invalidate all account passwords. You will have to reset your password to login. If you have trouble resetting your password, please send us a message with as much helpful information as possible, such as your username and any email addresses you may have used to register. Whatever you do, please do not create a new account. That is not the right solution, and it is against our forum rules to own multiple accounts. 2 had more background info on the Bride, a little more dialogue and a little less fighting action. Quote: Originally Posted by Master Ran Kill Bill 1, i heard it was very popular in the states. But here, it was a flop. Even i can't understand why it was popular. I guess maybe the crazyness made it so. I don't know how it did in Japan overall, but the Japanese people I know liked it. (Admittedly that isn't very many) Funny side note: As a joke I told one Japanese friend that I didn't remember seeing so many people carrying swords around Tokyo like that. She thought I was serrious and said "I don't think people do carry swords in Tokyo." So then I had to explain that it was a joke. They were entertaining movies, but nothing memorable to me. I didn't identify with any of the characters and the action scenes were actually kind of bland. I mean, how can you say either of those had the best action scenes if you've seen any of the Matrix movies? I will give the movie props for story-telling method, but then, that is what Tarantino has always been best at. Storytelling is what made Pulp Fiction a great movie. I mean, how can you say either of those had the best action scenes if you've seen any of the Matrix movies? Yes I have watched all of the matrix movies. I even have the anime matrix in my collection. But the problem is that I the matrix movies didn't create that much tension on me, while the Kill Bill movies make laugh and feel exited every time that that crazy woman got into a fight. Besides the action sequences were very well coordinated, much more than in the matrix. In Kill Bill there was no slow motion or bullet-time like in matrix, and let me tell you I HATE that. Well, maybe the only fights in the matrix that I think were match for any of the kill bill action sequences were the car chasing in the highway (Reloaded) and the final encounter of Neo and Agent Smith at the end of revolutions (Yes I loved the DBZ fight ) Regarding Story telling I consider that both of these films excelled on this aspect. woaaahs. I'd have to say no way there. The action sequeances in the first Matrix completely dominate Kill Bill. Make it look amateur ... it's the presentation in Kill Bill that makes it an alright movie. Music + chopped up storyline that falls together + somewhat humorous diologue that comes once in a while. The action in Kill Bill was really weak :/ ... The GoGo fight was alright ... the rest was "cmooon get this over with ... christ" for me. __________________ There is a little known provision in the Forum Rules that explicitly allows a moderator to remove any signature image that they believe to be inappropriate for any reason. I have saved this image into my "WTF directory" just in case I ever wonder if it was only been a bad dream, and have removed it from the forum. Hopefully Lexander will never do this again! I just watched the second part of Kill Bill and I must say, it is definitely the best Action/Drama movie I've ever watched. It doesn't even have a single part that was "alright". I enjoyed every single second of it. All the scenes were carefully planned. And the character development was just outstanding. I have never seen a movie that can combine as much detail and action at the same time. The footage was just as good as the first one. Every single shoot of it was carefully thought out and each one of it carries its own meaning. Incredible. Tarantino is a genius. The music was fantastic. I can guarantee that even if you don't like the movie at all you WILL love its music. This movie manages to combine Spanish music, Japanese music and techno perfectly. The ending credits music was so good that I listened to it over and over again. The movie has the best music in an action film as well. Story wise it was complex and simple at the same time. It was complex because each of its characters has their own way of thinking. All of them are complex in a certain way, and all of them are charming in one way or another. And simple because as Tarantino said in his making of Kill Bill: "Well it is a revenge story, what else do you need? She is got a list of people and she is going to make them pay… all right? There is not much story... I can come up with some other crap that would be useless... But no I hate that in movies... Lets get rid in the of crap... and just tell a revenge movie..." Then he adds: "In the first one you are learning the mythology and world in which this story takes place. The second one; now you got the world, now you got the set up and the idea of the story, and now you get to know the characters" David Carriade (BILL) adds in this special that "The essence of a Tarantino movie is not the violence, not the action... is the inside look at the heart and mind of violent people" I personally think that this makes clear what Kill Bill is all about. ----- My favorite scenes is were: Spoiler: 1# You get to see the master of the bride... I thought that it was going to be someone out of the loop. I thought Tarantino was going to surprise me with an none-stereotypical character but... Boy a was wrong... I fell off the chair when I see this Kung fu master! He looks just like the old school martial arts masters... I almost cried of too much laughing when the old master was laughing and playing with his long stereotypical chin. 2# The way that The bride AKA (Black Manba) took the last remaining eye out of Elle Driver AKA (Californian mountain snake)... and how she exploited in anger and desperation... that was just sad. 3# The five-point-heart-break technique! Kill Bill is the best action movie ever, and if you don't agree with me YOU ARE WRONG!!11! " 'Q: Are you and Quentin still considering a Kill Bill anime spin off? LB: Yeah. Absolutely. Honestly though, I don’t think Quentin is thinking about anything else right now except finishing this movie. I mean, we’ve got two weeks left to get this entire thing finished, and I don’t know exactly what we are going to do next. As for anime though, we could do something about Vivica A. Fox`s kid, or when BB grows up. It could be a flashback about Bill and Bud’s relationship flashback. There’s a lot of stories that could come out of it, and I think Quentin would love to do that. It just a matter of what he’s going to do next. You can talk to Quentin at different times over the year and he’ll tell you something slightly different each time about where he’s going next. But at the end of the day I just know that there’s no way he’ll actually be able to say what he’s going to do next, even if he tells you himself. I mean he finishes a movie, goes to Cannes with it, then promotes it, then goes home and takes a breath and says, “okay, what girl do I want to date next?' " I am waiting impatiently... Oh and by the way, don't you think that this movie has a "perfect ending"? PS. Can any one here tell me what are the names of the 2 ending songs? The first one was "Malagueña Salerosa", it was really good. Then there is a second one in English, which sounds like soft rock. Right after that song comes the last one which is in Japanese and is quite beautiful.
Mid
[ 0.5967365967365961, 32, 21.625 ]
Q: Webpart-sharepoint 2007 I have a web part and a button click event. The page should be refreshed after submitting the button so that I get latest values from the database. Could any body suggest me is there any method that will make the page refresh. Thank you. A: If its a ASP.NET LinkButton or Button, it will automatically refresh the page as a result of postback. http://msdn.microsoft.com/en-us/library/system.web.ui.webcontrols.button.aspx
High
[ 0.7381316998468601, 30.125, 10.6875 ]
Q: Trying to add to a 2d list, getting IndexError: tuple index out of range I've written a function that will recursively go through a folder in the directory and add the contents of all .dat files to a two-dimensional list. Each column represents a file with each line on a new row. I'm using for loops to achieve this, but I'm getting IndexError: tuple index out of range when it tries to put this information into the list. I've looked at every way of getting this information into the list: appending, inserting and just assigning, but they all come out with similar errors. def initialiseitems(): items = ([], []) count = 0 for root, dirs, files in os.walk("Bundles/Items/", topdown=False): for name in files: if os.path.splitext(os.path.basename(name))[1] == ".dat": if os.path.splitext(os.path.basename(name))[0] != "English": prefile = open(os.path.join(root, name), "r") file = prefile.readlines() for lineNumber in range(0, sum(1 for line in file)): line = file[lineNumber].replace('\n', '') items[count].append(line) count = count+1 return items It should just put them all in the array. It's evident the method of getting this into the list is wrong. What's the best way to do this? Preferably, with no external libraries. Thanks Edit: Full error Traceback (most recent call last): File "C:/Users/Kenzi/PycharmProjects/workshophelper/main.py", line 3, in <module> items = initialisation.initialiseitems() File "C:\Users\Kenzi\PycharmProjects\workshophelper\initialisation.py", line 15, in initialiseitems items[count].append(line) IndexError: tuple index out of range A: You have a logic problem. You are incrementing count = count+1 for any *.dat file that is not English.dat You use count to index into items = ([], []) which has exactly 2 elements. The third *.dat will create a count of 2 -your indexes are only 0 and 1 --> error. You can simplify your code: def initialiseitems(): items = ([], []) count = 0 for root, dirs, files in os.walk("Bundles/Items/", topdown=False): for name in files: if name.endswith(".dat"): if not name.startswith("English"): fullname = os.path.join(root, name) with open(fullname, "r") as f: items[0].append( fullname ) items[1].append( [x.strip() for x in f.splitlines()] return items This returns a tuple (immutable object that contains 2 lists) - the first list contains the filenames, the second list the filecontent: (["file1","file2"],[ [ ...content of file 1...],[ ...content of file 2 ...]] The [ ...content of file 1...] is a list of lines without \n at it's ends. You can work with the result like so: result = initialiseitems() for filename,filecontent in zip (result[0],result[1]): # filename is a string like "path/path/path/filename" # filecontent is a list like [ line1, line2, line3, ...]
Low
[ 0.51592356687898, 30.375, 28.5 ]
2015 Course Catalog (310) Our understanding of ourselves and others are formed by visual images and bodily feelings that are social in origin. They make us feel (un)comfortable, sublime, ridiculous, grotesque. In this course we will examine how the materiality of the body grounds our metaphors about identity and subject formation. This course moves between cultural studies, queer theory, disability... This course provides an introduction to cultural anthropology, surveying its defining questions, methods, and findings. We will examine the history and utility of anthropology's hallmark method, ethnography, the long-term immersion of the researcher in the culture under study. We will compare cultural anthropology's findings and comportment in other cultures to its conclusions and conduct in our own. No prerequisites. What does it mean to "do" or to "commit" violence? How do we recognize it when it is so ubiquitous? Be it through war, ethnic cleansing, social conflict, revolution, or various forms of interaction, the topic of violence has figured prominently in anthropological scholarship as well as social thought throughout history. This course will explore major theories... An introduction to human physiology aimed primarily at undergraduates who have minimal to no Biology background or who are not concentrating in biology. Acquire a basic understanding of the physiological mechanisms that allow for the running of each major organ systems. Topics include basic cardiovascular, respiratory, urinary, digestive, endocrine, and neuromuscular function,... This course examines the structure and function of the basic unit of an organism, the cell. An experimental approach is used to examine cellular functions, ranging from gene transcription, cell division and protein secretion, to cell motility, and signal transduction. Relevance to health and disease will be considered. Prerequisite: BIOL 0200 or AP Biology score of 4 or 5. Introduction to the function and integration of animal systems with an emphasis on mammals. Includes basic concepts in cell and organ system physiology as well as fundamentals of modern trends in physiological science. Emphasizes the application of physical and chemical principles to animal function at both the cellular and systemic levels. Prerequisite: BIOL 0200 or AP Biology score of 4 or 5. In this course, we will study how television reflects and shapes American culture, from its beginnings as focal point of family life in the suburban 1950s to its current status as interactive experience. We will look at television as a business, as a medium, and as a cultural force. Within that framework, we will analyze who decides which programs to put on the air, and how... What do we mean when we talk about the modern era in the United States as a “culture of consumption?” How have Americans created and reflected identities through participation in this culture? Beginning with the advent of mass production, advertising, and branding, we will examine the development of modern consumer culture, from its foundations in the 1870’s... Why do Americans go to war? How do conflicts abroad shape politics at home? In this course, students will study debates concerning freedom of speech, civil rights, and political repression during the two World Wars, the early Cold War, and the Vietnam era. Reading a range of primary sources, including political speeches, journalism, and literature, discussions will reflect... Do you like solving ancient mysteries, traveling to exotic parts of the globe, visiting ancient monuments, examining ancient artifacts, and studying history? If so, then this course is for you!! This course will introduce you to the fascinating field of archaeology: what it is, how it’s done, how it can help us understand the human past, and how it can help us make sense... The overarching theme of this course is to supply students with an ample understanding of our human antiquity; therefore, we will use archaeology as a means to comprehend our earliest origins and our unique evolution. This course should be of particular interest to students interested in archaeology and in the humanities in general. The cultural and social diversity of the world around us is astounding. Anthropology is a discipline that examines different aspects of this diversity and allows one to better understand the complexity of social phenomena. This course introduces students to the most important concepts and approaches used by anthropologists in understanding socio-cultural variation. The course... This course explores ancient Egyptian "stuff" up close: metal weapons, wooden statues, stone monuments, glass-glazed figurines, and how they were made and used. Students will learn the science and engineering behind these ancient technologies, and discuss how their materials and designs shaped and were shaped by their use in ancient Egypt. Along with the course lectures... The manufacture of artifacts distinguishes us from all other species. This course examines the artifacts that archaeologists most commonly recover: lithics (artifacts made from stone), pottery, and metallurgy, as well as glass, wood, and bone. Students will become aware of the principles that surround human artifacts and the documentation techniques used by archaeologists,... Using the MTV series Girl Code as a platform, this course introduces basic concepts and perspectives of our gendered lives by placing gender, sexuality, and culture at the center of analysis. An emphasis will be placed on pop culture and how it continues to shape our understanding of the concepts of women, men, sex, and gender as diverse categories that intersect with class,... While History and Biology are often seen as distinct or even competing fields, in fact each has much to contribute to the other. Co-instructed by two Brown Professors, one in History and the other in Biology, this class will explore the enormous collaborative potential of both disciplines to deepen and enrich our understanding of the early development of human societies. This course provides an introduction to urban anthropology, or the study of problems, processes, cultures, and institutions associated with city life. Through classroom activities, as well as interactive field trips to urban sites in Providence, students will develop tools for seeing the city anthropologically. Students will gain a highly participatory introduction to city... Forensics is the application of science to answer questions pertaining to the law. Methods used to solve criminal investigations have progressed significantly over the past thirty years. Investigators and scientists now collaborate and use forensic technologies to uncover facts associated with criminal cases. This course will uncover the truth behind criminal investigations... We always hear about endangered species all over the world. What exactly is being done to protect these animals and their habitats? Most people do not realize it, but every endangered species has a recovery plan that maps the road to successfully increasing populations and saving habitats. Zoos are a huge part of these recovery plans by being a place for breeding and increasing... Have you ever wondered how your body does all the things that it does? Our bodies contain 206 bones and over 600 muscles, all coordinated by a central computer called the brain. In this course, you will learn how your body's components work as one, to keep you going everyday. This exciting hands-on course will provide an opportunity to answer your questions... The field of Modern Biotechnology explores breakthrough technology that has revolutionized pharmaceutical, agricultural, and biomedical research. Scientific researchers in DNA Science work to understand diseases, develop treatments and cures, and to address concerns with the environment and our food supply. This laboratory-based course is designed to expose students to the... Have you ever wondered how your body does all the things that it does? Our bodies contain 206 bones and over 600 muscles, all coordinated by a central computer called the brain. In this course, you will learn how your body’s components work as one to keep you going everyday. This exciting hands-on course will provide an opportunity to answer your questions... This exciting course will centralize around major illnesses that stem from deadly microbial organisms. Our focus will be on zoonotic infections, or in other words, diseases that pass from animals to humans. Most newly arising diseases and some of the most fatal, originate from our animal counterparts. Zoonotic diseases tend to be some of the most deadly because our bodies’... Forensics is the application of science to answer questions pertaining to the law. Methods used to solve criminal investigations have progressed significantly over the past thirty years. Investigators and scientists now collaborate and use forensic technologies to uncover facts associated with criminal cases. This course will uncover the truth behind criminal investigations... The development of powerful tools in molecular biology has led to an explosion in our understanding of genes and the factors controlling their expression. Illuminating research, including recent Nobel Prize winning work, is beginning to reveal the significant role of RNA, a molecule long thought to be merely a "messenger." So you think you want to be a doctor? This course is designed to help you answer that question by letting you see the practice of medicine firsthand, giving you a taste of what medical school would be like, and helping you evaluate how well your talents and preferences match those of a career in medicine. This course explores the structure and function of the human body at multiple levels: individual cells, their coming together to form tissues, the organization of tissues into organs, organs working together as parts of organ systems, and finally how those organ systems support one another to maintain the body. Normal structure and function are presented as a starting point,... The main objective of this course is to introduce students to the field of infectious diseases and to give students an understanding of pathogens that cause infections and their impact on worldwide public health. This course will be of interest to students who want to study medicine, life science, or public health. What is Public Health? Public health is the latest buzz word in America and encompasses efforts to improve the health of specific populations through education and advocacy. In this one-week course, students will develop an overall understanding of public health. The course will culminate with an opportunity for students to work collaboratively and use their new skills to solve... The goal of the course is to understand the organ systems’ integrated response and adaptations to the stress of exercise. This topic is interesting to anyone who wants to understand what their body is actually doing at the biological level during exercise and post exercise. The course will introduce and demystify training regimens and diets and sciences' evolving... Doctors work to treat diseases, but scientists work to cure them. Have you ever wondered about the work that goes on behind the scenes in Medicine? Do you want to find out what it is like to work in a laboratory and be a real "lab rat"? This laboratory intensive course is designed to expose students to basic laboratory research, current topics, and techniques in molecular... Did you know that the bubonic plague killed approximate 50% of Europe’s population in the middle ages? Did you know that the bacterium that causes leprosy lives inside of the American Armadillo? Bacteria floating miles high in the atmosphere can cause meningitis. Bacteria even contribute to obesity and heart attacks. Come learn about the amazing world of bacteria! Physiology is the critical study of how living things function. It is not anatomy, but as one of the most fundamental disciplines in the biomedical sciences, it depends heavily on anatomical and biological concepts. An understanding of the basic principles of physiology, especially in regard to our own bodies, is an invaluable part of any budding physicians' or scientists'... Is a career in medicine right for you? This course is designed to help you answer that question. Experience the study of medicine in a whole new way and get a taste of what medical school and practicing medicine in a variety of different medical specialties would be like. Participants in this class will: Physiology is the critical study of how living things function. It is not anatomy, but as one of the most fundamental disciplines in the biomedical sciences, it depends heavily on anatomical and biological concepts. An understanding of the basic principles of physiology, especially in regard to our own bodies, is an invaluable part of any budding physicians’ or scientists’... Molecular biology and biochemistry are two closely related fields where the properties of key biological molecules, such as proteins and DNA, and how they interact with each other in living organisms are studied. Research in these areas has become so successful at explaining living processes that it is used in almost all areas of the life sciences from medicine to the study... Organic and biochemistry are the foundation sciences for the life sciences discipline. Students hoping to have a medical career need to have a strong foundation in chemistry. The MCAT exams given to college students hoping to enter medical, dental, or veterinary schools contain a number of sections devoted to general, organic, and biochemistry. In this course you will study the major organ systems of the body, investigate normal and pathologic anatomy and physiology, and examine common diseases and injuries and their effect on the body’s organ systems. This course provides students considering a career in the health professions a foundation in the study of human form and function from the perspective of practicing... Topics to be covered in this laboratory intensive course include the structure and function of biomolecules such as proteins, enzymes, carbohydrates, and DNA, as well as the structure and function of cellular components. In the laboratory, students will carry out several introductory and advanced experimental techniques utilizing both DNA and proteins. Experiments will include... Despite world-wide advances in technology and development, providing basic health care to people in resource-poor settings continues to pose enormous challenges. Now more than ever, the global community is focused on overcoming inequities in health care and reducing poverty as a means of curbing the spread of disease and improving lives. Building on this momentum, this course... What makes an expert witness an expert? What would the perfect crime look like? These are but a couple of the many questions we will explore during this course. Forensic science is an exciting field that combines scientific principles from many different science disciplines with technology and math resulting in new, sometimes surprising outcomes! Have you ever thought about how nerve cells in your brain talk to each other, and how psychoactive drugs can affect this process? In this class, you will learn the latest ideas concerning how nerves use chemicals and electricity to communicate with each other, and how drugs such as marijuana, cocaine, LSD, caffeine, and nicotine can alter brain communication. Drugs and alcohol have been part of the human experience since prehistory. Why are drugs and alcohol so thoroughly entrenched in human society? How do different drug classes affect human behavior? Why do some people abuse drugs, while others never become addicted? In this course, we will attempt to answer these questions. This course will cover the function of drugs in human... The main objective of this course is to introduce students to the way that diseases are treated on a physiological level and how drugs are discovered and created. Students will gain an understanding of how the pharmaceutical industry approaches drug discovery, balancing patient quality of life and treatment regimen, as well as how drugs interact with the human body to elicit... Have you ever questioned why certain types of cancer are so difficult to treat or how basic science discoveries translate into clinical practice? This course will provide an introduction to cancer biology through hands-on laboratory exercises and interactive lectures. Students will have the opportunity to develop an independent research project and learn about the daily activities... Have you ever had a really bad cold? Maybe the flu? Do you know a polio survivor? Someone with AIDS? Do you ever wonder exactly how these illnesses occur? It turns out we are merely guests in a fascinating microscopic world. Among the bacteria, parasites, prions, and other microbes are tiny, lifeless, parasitic beings that have been on earth long before we ever were: we... Have you ever wondered what your life would be like without Tylenol or penicillin? How were these drugs discovered? How did they become so popular? Pharmaceutical companies spend over 1 billion dollars developing just one new drug and getting it to the market. Why does it cost so much money? In this course you will find out the answers to these questions and get a look behind... The World Health Organization describes health as a fundamental human right. Global public health is not only driven by scientific evidence, but also by community, national, and international interests. Even seemingly simple public health solutions, such as providing food for famine, vaccines for diseases, clean water, and implementing evidence-based prevention strategies,... There's a lot of controversy surrounding embryonic stem cells, but did you know that there are many types of stem cells in the body and that some are already being used to treat diseases? In this course, you'll learn about what stem cells are, what they do, and their importance to research and medicine. You’ll even learn how to culture mammalian cells. Discover... Have you ever wondered why your doctor poked you with so many needles when you were a kid? Why you got the flu this year but your best friend didn't"but if she eats peanuts she could die within minutes? What your white blood cells are and what makes them different from the "red stuff" that you can see? Why HIV is so deadly and what it means when someone... From jellyfish to squid, and deep-sea tube worms to coastal lobsters, marine invertebrates play a diverse and crucial role in our world's oceans. In this course, students will learn about the major groups of marine invertebrates, including their life cycles, anatomies and evolution, and functions in marine ecosystems. This course will also serve as a fundamental introduction... Approximately 80% of high school athletes will experience a significant sport-related injury at some point in their athletic career. However, an astounding fifty percent of sports-related injuries are from overuse and 60% of overuse injuries can be prevented. In this interactive course we will explore injury prevention principles, optimal training response, and learn performance... Why have scientists spent over 100 years studying the miniscule fruit fly Drosophila melanogaster? This humble animal has made major contributions to biomedical research and become an invaluable research tool for geneticists and developmental biologists around the world. Students will explore the history and flexibility of this favorite model organism and use it as an illustrative... Have you ever wondered about the difference between the recreational and medicinal usage of psychoactive drugs (drugs that alter mood and behavior)? Are there basic differences in the action of psychoactive drugs when they are taken for recreational versus medicinal purposes? And how does society decide how to categorize psychoactive drugs: which ones to make legal and which... Taste! Smell! Sound! Sight! Touch! Balance! How is all of this information turned into sensation? Hint: it involves the brain! Students will learn how our brains make sense of the world around us, and they'll learn a little brain anatomy along the way too! Through a combination of individual and small group experiments, students will about the sensory systems... Taste! Smell! Sound! Sight! Touch! Our world is alive with stimuli and these are just some of the many senses we use to explore it. But how are all of these senses transformed into our everyday perceptions?? I’ll give you a hint: it involves your brain! The brain is a fascinating organ- it only weighs about three pounds, but has billions of specialized cells that make... The study of the brain as a biological structure is very different from the study of any other organ in the body. The cells that make up the brain, neurons, share many of the same fundamental characteristics with other cells of the body (exocytosis, manufacturing of proteins, metabolism, growth). However, the functions of these cells result in products that are quite unique... The facts we learn as humans across our lifetime and our memories of personal experiences make each one of us unique. Consider, however, how a person’s sense of self would be affected if he or she were unable to form new memories. At a more basic level, how could animals survive if they were unable to learn from their experiences? This course will offer students the opportunity... Have you ever wondered about the difference between recreational and medicinal usage of psychoactive drugs (drugs that alter mood and behavior)? Are there basic differences in the action of psychoactive drugs when they are taken for recreational versus medicinal purposes? And how does society decide how to categorize psychoactive drugs: which ones to make legal and which illegal?... Neuroscience is the study of the nervous system, including the brain, spinal cord, and networks of nerve cells, or neurons, that travel throughout the body. Although the field of neuroscience is relatively new, being recognized only in recent decades as a formal discipline, it is growing and expanding at a very rapid rate. The rapid growth of neuroscience and the pace of biomedical... The human brain is one of the most complicated and mysterious systems on the planet. In recent decades, a huge push has been made to understand the brain through computer modeling. A large number of scientists have been involved in the development of these models not only to advance our understanding and treatments of neurological and psychiatric illnesses, but also to help... The human brain has more than 85 billion nerve cells, also known as neurons. Ever since the original description of the neuron by Santiago Ramon y Cajal in the 19th century, neuroscientists have known that understanding the neuron is key to understanding how the brain works. This course is an introduction to neuroscience in which we will examine the inner workings of the neuron:... This course will be co-taught by a Ph.D. biologist and a practicing mental health counselor. "Brain and Behavior" will provide students with a multifactorial perspective on psychopathologies. We will delve into illnesses such as depression, schizophrenia, bipolar disorder, post-traumatic stress disorder, and substance use disorders. Students will study both the biological... What do the SAT and the college application essay have in common? Both offer opportunities for the word-smith to shine: both rely on choosing the right words and understanding them in context. Expanding your vocabulary can also improve success in college, especially if you are intending to major in a STEM field, medicine, or law, which have highly specialized vocabularies based... Why do we still glorify the Spartans in movies and books over 2000 years after their city and way of life fell to ruins? What about Spartan history and culture has captured the imaginations of those who have studied them, both in the ancient and modern worlds? Their strict, regimented lifestyle produced a class of dedicated, fearsome warriors, but did their eugenics and training... Spanning from Britain to Iraq, the Roman Empire connected vast areas and different cultures in a time before the internet, telephones, or mass media. How did the Romans gain such an Empire, how did they govern it, and ultimately why did it fall? This course examines the history of the Roman Empire and considers the unique social, cultural, and political concerns of an imperial... What did the ancient Greeks do for entertainment? Today we have movies, concerts, YouTube, and countless other sources of amusement. For the ancient Greeks, theater was the main game in town. Every year, companies of citizen actors would produce original, large budget plays. The competition was fierce; the prizes: glory, gold, and undying fame. Drama, tragedy, theater -- these modern terms and concepts have their origins in Ancient Greece, which developed modes of performance that we still enjoy today. Despite the basis of modern theater in antiquity, if we could watch the original performances of Greek tragedy by Aeschylus, Sophocles, or Euripides, the experience would differ greatly from going to see a modern play.... In this course, we will analyze how different configurations of key elements--the market, the participants, the institutions, and the external factors--constitute the global business environment. It is an environment in which each participant wants to optimize a measure of welfare: for example, firms make production and pricing decisions in order to maximize profits (or any... This course provides an introduction to the study of financial assets and international financial markets. Topics covered include the purpose and functioning of financial markets and institutions, valuation of financial assets, analysis of risk and return, and the recent financial crisis. The course will address questions such as the following: What are the functions... An Introduction to Game Theory is a three-week core course in behavioral economics. Game theory is the systematic study of strategic interactions that are present everywhere, not only in economics but in politics, sociology, law, computer science, and sports. The main goal of the course is to introduce students to the basic concepts and tools of game theory and to... This course introduces students to concepts and tools needed to understand basic economic decision making. By examining how individuals, governments, and businesses allocate resources, students will gain an understanding of the environment in which resource decisions are made. In this course, we focus on economic analysis rather than investments. We examine some of the instruments... In 1980, three television stations provided entertainment, telephones were stuck to walls, computers took up entire rooms, and people found facts in books and consumer goods in a store. Today, smart chips no bigger than a fingernail hold more information than the computer of the 1980s, Google processes 1.2 trillion Internet searches per year worldwide, ecommerce sales topped... Despite unprecedented increases in global wealth, a large share of the world’s population still lives in abject poverty. Addressing economic, social, and political inequality is one of the primary challenges for the world in the 21st century. Development is a complex and controversial endeavor. Some think of development as industrial or economic growth, some as a... Do good‐looking people earn more? Are 'Emily' and 'Greg' more employable than 'Lakisha' and 'Jamal'? Can cancer affect housing prices? Does living near a fast food restaurant cause obesity? Is corruption a cultural trait? This one-week core economics course will examine selected discoveries in applied microeconomics and explain them... What are the origins of the current economic turmoil? Why do the youth rebel all over the world more than ever before? Why are Europe and America losing ground to emerging markets? How can we better understand the limits of our economic system and how will this affect our career opportunities, our health and our education? Are you full of great business ideas? Do you love sharing these ideas with your friends and family? Does your imagination wander when you think about how a product or service could be developed or improved? If so, you may be on your way to becoming the next great entrepreneur! Develop your ability to see the world with an entrepreneurial eye and look for your next great... We are exposed to economic data and statistical analysis wherever we go: at the supermarket through prices and quantities of goods, at school through relative performance and GPAs, and in advertising through comparisons between the new iPhone 6 and a competitor’s model. Understanding the message is not an issue, but being a critical user of that information requires a... This is a core course in introductory microeconomic theory, introducing students to the fundamental principles of how to think like an economist. By the end of the course, students should be able to combine abstract concepts with formal analytical tools in order to understand how consumers and producers make optimal choices, and how these choices affect real market outcomes.... Game theory is used to understand human behavior. The course will start with the study of the basic concepts of game theory and then will move on to the study of decision making by real people who are not perfectly rational. The course will help students understand how people really interact with each other in daily life, using both economic theory and experiments in economics. Being an entrepreneur means being willing to take risks, look at things in new ways, and challenge convention with your creativity. In this course, you’ll learn how the entrepreneurial process can work, as well as the ways innovation of products and services are developed and managed. We’ll look at entrepreneurial ventures within both start-up and fully developed... What is rational choice? How do economists model the decision making process? The primary objective of this course is to understand the standard way of modeling choice, which serves as the foundation of both micro- and macroeconomics. The course will be divided into two parts. In the first part, the traditional way of modeling individual and group choice will be... Does ice cream cause Polio? In 1952, social scientists were convinced that ice cream caused polio, since rates of polio and ice cream consumption seemed to rise in the summer and decline in the winter. Today, we know that ice cream consumption has no causal relationship with polio. This example illustrates the importance of distinguishing correlation from causation. This course... Do you want to contribute to the making the world free of poverty? Are you curious about why nothing seems to solve this global problem? This course will introduce you to the field of development economics. It will help you understand the economic problems of less developed countries and provide you with insights into some key issues facing policy makers today. Presidential elections, marathon times, wine quality, extramarital affairs, interest rates. What all of these topics have in common is that they can all be explained and analyzed using the tools of Econometrics and Statistics. Did you ever wonder how Nate Silver reaches his election predictions? Did you watch Moneyball and wonder how it was possible for an... The Bust of Nefertiti. The great Pyramids of Giza. Karnak Temple. Book of the Dead Papyri. These are just a few of the places and things students will examine in this course. During this course, students will be introduced to Egyptian material culture, art, and architecture, from over 3,000 years of Egyptian history. We will begin at the moment of political unification in... Ancient Egyptian temples stand as enduring remnants of Egypt's religious past. From the Great Pyramids of Giza to pit graves of the non-elite, from the great palaces and temples of kings and gods like Karnak and Luxor to private shrines in houses, this course invites you to partake in the reconstruction of ancient Egypt's religion. By analyzing Egyptian texts, statues,... This course is an intermediate-advanced level English course focused on preparation for the TOEFL test. Students will review test-taking strategies and develop skills in Listening, Grammar, Reading and Writing. Students join in class discussions to reinforce their knowledge of the structure of English. They will complete in-class and homework assignments related to developing... World Literature introduces literary works from four different countries, written in the second half of the 20th century: a Czech novel by Bohumil Hrabal, stories by Argentine master Jorge Luis Borges, a novel by German Nobel Laureate Heinrich Boll, and Little Red Riding Hood versions by British novelist Angela Carter.Through close reading and discussion, you will gain an understanding... Originally, fairy tales were not intended for children, but throughout much of their history, they were told among adult audiences for entertainment and instruction. During Romanticism, fairy tales were understood as tales sending a strong moral and didactic message. The basic structure and narrative conventions are provided through magic, supernatural elements, and happy endings.... Based on Brown’s well-regarded Academic Essay course, in this class you will learn how to organize and craft a well-researched academic essay that explores a topic of your choice on an issue that matters to you. You will develop an idea, expand and support it with evidence, articulate it by means of a carefully-structured argument, and conclude it with implications for... In this class we will write. A lot. We will write every day. And by doing so, we will develop as story tellers. We will look at work from the early days of the genre to work written last week. We will look at these stories not only out of a love for sci-fi, but also out of an interest in language. We will see how the great stories were crafted and use that knowledge to inform... This intensive, fiction writing program offers a blend of small workshops, group writing sessions, and presentations by practicing writers, which will inspire students to consider writing as a process and to experiment with new approaches and modes of creativity. Students will grow as a writer, hone their creative skills, and deepen their passion for the writer's craft.... “@katbethell: Big storm is coming in and the sky is black and the fireflies are out, thinking it's night.” The best creative nonfiction exemplifies close observation, careful selection of detail, management of voice, and construction of narrative arc. It is an old and shape-shifting form. In Flash Nonfiction, students will learn how to write nonfiction "shorts,"... Who says you need to board a plane or take a road trip to travel? Wherever you are, being “in the moment” provides each of us a unique window of experience. Good writers open up those windows for others with words by sharing their personal experience with vividness and intelligence. Reading inspires us to travel because we want to experience the places we read about... This intensive, poetry writing program offers a blend of small workshops, group writing sessions, and presentations by practicing writers, which will inspire students to experiment with new approaches and modes of creativity. Students will grow as a writer, hone their creative skills, and deepen their passion for the writer's craft. This course is designed to introduce students to the craft of journalism. Students will learn to report stories, how to conduct interviews, and to become close observers of everyday life. Students will become stronger writers, rid their writing of clutter, and learn what it takes to become a good reporter. The main objective of this course is to teach high-school students how to write a personal statement for their college applications. Wondering how you're going to describe yourself in 500 words? Talk about your dreams without using cliches? Don't you want to set yourself apart from the rest of the college-bound hopefuls? In this week-long seminar, students... After the game, when the cheering stops, a sports writer's work begins. Learn how to make sport come alive in words -- the drama, the pressure, the pivotal moments, the personalities. You will also gain deeper insights into your own athletic pursuits by learning to communicate the essence of competition. From game coverage to profiles to columns to broader issues, students... Students will hone their analytical skills with close readings of some of the most thrillingly strange narratives of the last two centuries. By foregrounding the irrational side of human nature and probing the limits of perceived reality, authors like Edgar Allan Poe, E.T.A. Hoffmann, Franz Kafka, Jorge Luis Borges, and Gabriel Garcia Marquez have greatly expanded the possibilities... Flash fiction is a story boiled down to its essence, one that hinges on a single word, a phrase or a fragment. In this class will learn by doing. We will write every evening and workshop in every class. We will read the work of a variety of modern authors, learning from those who have come before us. This is a class for exploring and pushing language, it is for students who... The goal of this two-week course is to introduce you to the practice of college-level critical reading and writing. Making the transition from high school to college writing is a complex process, one that first entails re-thinking the reading process. This class works under the assumption that there is not a single, easy meaning to any piece of literature. Thus, instead of... Experimental Writing is offered to high school students interested in producing works of fiction and non-fiction. By thinking critically about both established authors' works and those of their peers, students will enhance their own understanding of writing. They will have the opportunity to practice drafting in a variety of styles and genres, including memoir, poetry,... Language, the foundation for virtually every human endeavor, remains in many ways as mysterious as our own muscles--the fact that we use them does not automatically grant us an understanding of how they work. Learning about language structure and language use gives us unexpected insights into our ability to communicate and the nature of our social interactions. Are you ready to start writing the way college students write? Challenge yourself intellectually and creatively as you explore and experience writing as a form of inquiry, and a part of social conversation. The first half of this course offers you the chance to think carefully about writing narrative prose, which is in effect a form of storytelling. Thus you begin the course... In 2008, Nicholas Carr asked everyone on the internet, “Is Google making us stupid?” The answer seems to be yes, and no. The immediate availability of boundless stores of information gives us all a crutch to lean on when we need quick answers; if you have a smartphone in your pocket, you are a walking encyclopedia. But only so much information will fit on a smartphone... Do you ever wish you could express your thoughts in a clearer and more compelling manner? Do you have convincing arguments and brilliant insights in your mind that just don't seem to translate into your writing? This course will help you get those great ideas onto paper and communicate them effectively to your intended audience, whether that is a high school teacher,... Despite our increasing reliance on screens in our 21st-century lives, writing remains a crucial skill that one must have. The texts we will read are not only important for their philosophical and social content, but also for their exemplification of various modes of written argumentation. Our discussion of the various texts will focus on the three levels of reading: summary,... The main objective of English on Stage is to provide students with an opportunity to hone their English language skills through improvisational and scripted performance. By setting English instruction in the world of the dramatic arts, the course encourages students to experiment with newly learned vocabulary and grammar. It supplements more traditional language learning models... Do you see science or medicine in your future? Two of the greatest challenges facing budding scientists/physicians are to learn the unique language of science and how to effectively communicate with peers. This course introduces essential skills necessary for any science major or pre-med student, emphasizing the language of science and how information is disseminated. Students... Poems challenge us. They use language differently from other genres, and their subjects often elude us, and we end up asking what does the poem mean? How then do poems need to be read? What, other than the technical information we find in books on poetry, do we need to know about poetic forms and language? think about? puzzle over? How do we know when our interpretation... This course is designed to teach you how to introduce your voice into an academic conversation. You will learn how to closely read primary texts, summarize arguments, evaluate and respond to critical sources, incorporate evidence and cite references, and employ a variety of rhetorical tools and strategies that will strengthen your position. This course is designed to expose students to the diversity of contemporary American literature while developing interpretative skills for the close reading and written analysis of texts. By the end of this course, students will be familiar with major concepts in literary and cultural studies such as globalization, democracy, diaspora, genre, and representation. Through an... You know my methods, Watson! In Sir Arthur Conan Doyle's Sherlock Holmes stories, the detective frequently draws attention to his methods of detection and investigation. These methods are precise forms of close readings that focus on details as well as structures or patterns and require logical reasoning. In this seminar, the detective as a reader, as well as the reader... American society has been fascinated with global catastrophe since at least the nuclear age. But in the last few decades, we have seen a resurgance of literature and films that explore doomsday scenarios. This course will critically examine popular and lesser-known works, giving students a relevant medium in which to develop their academic and creative writing skills. "To understand the world, you must first understand a place like Mississippi." Attributed to William Faulkner, this quotation will serve as the framework for an examination of 20th century Mississippi literature. This course will introduce students to major 20th century writers and will focus on how these writers engage issues of class, race, gender, language,... This week-long workshop will explore the balance between self-expression and effective communication essential to writing powerful personal narratives, college admissions essays, and creative reflections. As you write and receive feedback daily, you’ll learn not only about purpose, revision, and style, but also about writing as a means of exploring, learning, figuring... In this hands-on course, you will learn about nanotechnology and its broad spectrum of applications in current life. You will experience the fundamental rules behind nanotechnology through interesting experiments, activities and games. You will also see how scientists at Brown conduct leading nanotechnology research. In addition, you will get a chance to design your own nanotechnology... Have you ever looked at an airplane and wanted to know how it works? Do the words; rocket, space, and satellite excite your imagination? Have you even wanted to know how NASA shoots up satellites into outer space and reach their final destination millions of miles away? Or how to build an airplane that can travel faster than the speed of sound? If these questions excite you,... Do you like LEGO's? Do you like robots? Have you heard of the Mars Rover? Do you want to learn about ultrasonic, light, and sound sensors? Do you like computers? If these questions appeal to you, then you will want to register for this course. Do you want to learn what it takes to be an engineer? There are many kinds of engineers; those who specialize in building bridges, designing submarines, or recording high-speed movies of an explosion. It might be daunting to figure out what type of engineer is right for you. Students will actually become familiar with the full range of engineering in this class. Engineers design useful or desirable objects, employing scientific principles. In Robot Rover Derby you and your teammates will design, construct, and program a useful and desirable rover that will compete with other rover teams in a ladder tournament. One of the most pressing issues of modern times is how we will satisfy our future energy needs and what influence this might have on global warming. This course pursues developing intuitive insights into the benefits and limitations of various approaches to energy generation, and how to differentiate between hype, scientific analysis, and political interference. This course... “RobotC, Robot Do” is a summer course designed for high school students interested in learning about programming, but more so about problem solving. RobotC is a text-based programming language, which is very similar to the C++ programming language, but is designed specifically to work with Lego Mindstorms robots. Students will be able to program robots to move,... What do you think will be the greatest, coolest invention of this century? Many of the greatest scientists and technologists believe that this will be in the field of Materials research: "of new materials that have amazing properties,” and what’s more, “are capable of changing themselves to suit their requirements.” Though we know of an amazing... This course will introduce you to the art of fabricating cast metal prototypes. Using three-dimensional computer aided design software, rapid prototyping equipment, and the undergraduate Materials Science lab to make metal castings, this course will demonstrate some of the basic ideas about how engineers go about designing and fabricating prototypes in the modern world. Are you considering a career in engineering? Are you fascinated by what engineers do? In this free, open course, you will gain an understanding of the various fields of engineering and explore the engineering design process, from conceptual design and optimal choice evaluation to project construction and the need for engineering ethics. Are you passionate about innovative approaches to improving human health? Biomedical engineers apply principles of biology, medicine, and science, along with problem-solving skills and critical thinking, to a broad spectrum of problems, from designing regenerative medicine and new methods of drug delivery to micro-devices and gene therapy. Are you interested in learning more about the materials that surround our everyday lives? How might newly developed, advanced materials positively impact society? In this course, you will explore the mathematical and scientific fundamentals behind the field of materials science and engineering. You will explore the current state of the art in engineering design as you test... The demand for energy is expected to grow 30% by 2040. What role can engineers play in developing renewable energy sources? In this course, you will explore the some of the science, math, and technology that is used to extract energy from renewable resources. You will: Scientific discoveries, medical breakthroughs, and emerging technologies have a major impact on our everyday lives in the 21st century. They provide new insight into our complex world and address a range of global needs and problems. Few pre-college students are exposed to the advanced research that will likely lead to the future of science, technology and medicine. In this... Are you considering a career in engineering? Are you fascinated by what engineers do? In this course, students will gain an understanding of the fundamentals of the engineering design processes, an appreciation of the far reaching impacts of engineering, a grasp of the various fields of engineering, and a better understanding of the profile of an engineer, including the typical... Have you ever wondered how scientists make pacemakers or grow cartilage for joint repair? In this course, you will learn how these scientists, called biomedical engineers, develop devices and tissue-engineered technologies that often times save lives! The aim of this course is to provide an introduction to biomedical engineering analysis, specifically relating to... If you like the idea of applying physics concepts to hurtling objects through the air, then you're in for an exciting week. From forces to launch angle, kinematics to bending stress, and composites to prototyping, you'll get the chance to do some quality engineering backed up by college-level scientific concepts. Will you be part of the team to engineer the ultimate... This course introduces students to the wide world of fluid mechanics, an area that covers vast scientific fields such as aerospace engineering, bacteria locomotion, and combustion dynamics, and which is fundamental for flight, rocketry, swimming, bio-locomotion, and countless other topics in engineering. We will focus on the physics and engineering of fluids and visualize core... Virtually every segment of our everyday lives - be it transportation, housing, clothing, communications, recreation, sports, and so on - is influenced by materials in one way or another. In our contemporary era, sophisticated electronic devices, such as laptops and cell phones, rely on components that are made of semiconducting materials. Automobiles would not have been possible... What is energy? How do we use it? Where do we get it? Why do we feel that we must find new ways of generating energy? What are the options? If you ever wondered about these questions, then this is the right course for you. If you ever saw a wind turbine and said I want to build one for myself, no need to wait! Students will learn the basics of estuarine ecology and environmental sciences through a variety of field exercises and data collection techniques. The one-week course will allow students to learn about Narragansett Bay in-depth by using Save The Bay’s waterfront Bay Center laboratory, classroom, shoreline and dock space, and from bay field trips aboard Save The Bay’s... BELL Rhode Island is a unique outdoor learning experience. The academic content of this course centers on understanding the causes, impacts, and solutions to climate change both globally and locally. In order to appreciate the many manifestations of climate change, our curriculum draws from both environmental science and environmental studies including biology, chemistry, economics,... Brown University, in partnership with the Monteverde Institute, is excited to offer a unique international environmental leadership program in Costa Rica. This 2-week pre-college program introduces students to the theory and practice of conservation and sustainability in Costa Rica. Students study and explore some of the most biodiverse regions in the world and meet with scientists... This spring, Brown University offers curious high school students a unique opportunity to explore Hawaiian culture, tropical ecology, and leadership skills. Traveling from the mountains to the sea, students will explore the Big Island’s diverse terrestrial and marine ecosystems, studying geology, forest ecology, aquatic life, cultural studies, and land use. Participants... BELL is a unique outdoor learning laboratory. The courses draw their curricula from many different disciplines: history, biology, geology, economics, environmental studies, and leadership theory. In this course, students will travel to southern Alaska to experience, first-hand, the beauty and complexities of historic and present-day Alaska. Learning will be fast-paced, experiential,... This summer, Brown University invites highly-motivated students to examine some of the most pressing and complex issues impacting our oceans and coasts. Beyond its natural beauty, the ocean is one of our most important natural resources: it is a source of seafood, minerals and oil; a primary means of transportation and shipping; and the hub of tourism and recreation. It is... Do you love science and nature? Do you consider yourself a bit of an amateur ecologist or biologist? What if you, and thousands of others like you, received a personal invitation to share your observations of the natural world with the greater scientific community? What if all that data was made available to scientists everywhere to help solve problems and answer science-related... What is climate change? How do humans interact with the climate system? How can science inform action? This course is designed to provide you with an understanding of the climate system on Earth, interactions between climate and human society, and how climate change science is communicated, interpreted, and used by different nations and cultures. The primary focus of this course is to relate concepts of sustainability, stewardship, and resilience in urban environments. We will address issues of urban and regional planning, environmental responsibility, and positive change in the awareness and behavior of individuals and organizations. The course addresses urban initiatives to increase sustainability and resiliency of... Spanish has become the second language of the United States and the third most spoken language in the world. Today’s Spanish language learner can look forward to using their language knowledge in personal and professional settings: in business, finance, education, medicine and public health, arts, law, politics, diplomacy, and humanitarian and environmental work. The aim of this course is for students to significantly improve their communications skills in Spanish, particularly their oral expression and listening comprehension, in order that their immersion in Spanish culture during their time in Segovia is successful and rewarding. Daily classes are taught completely in Spanish and focus on proficiency in everyday speech to facilitate... The planets and moons of our solar system hold untold mysteries. New secrets about the solar system are constantly being uncovered by NASA spacecraft, from Curiosity on Mars to New Horizons at Pluto. Come learn what NASA missions have discovered about our incredible solar system and learn how to plan a mission of your own to your favorite place in space. Does life exist anywhere else in the Solar System or galaxy? If you have ever looked at the sky and wondered if habitable worlds like (or unlike) ours exist elsewhere, then this is the class for you. This week-long course explores possible habitats for life on Mars, the icy moons of Jupiter and Saturn, and exoplanets (planets around other stars). Along the way, you will learn... Twitter. Facebook. 'Selfies.' How do today’s forms and uses of photography represent a continuation of, or break with, those of the past? Through a focus on photography’s use in digital contexts, students in this course will learn methods of critical visual analysis, build visual literacy skills, and prepare for coursework in fields such... This course will introduce students to the art of Egypt, Greece, and Rome in the context of the Rhode Island School of Design (RISD) Museum. Students will learn about ancient art, and how to apply this knowledge to museum collections; they will devise and present talks on ancient objects in the RISD galleries, and also have the opportunity to design their own exhibition. This course will introduce students to the history of photography as an art form, a technology, and as a means of visual communication, from its invention in 1839 to the recent rise of digital technologies. In addition to introducing students to the historical background of the medium and its practitioners, the course seeks to hone the skills of visual literacy that are critical... The sixteenth and seventeenth centuries in Rome witnessed an explosion of artistic and scientific activity. Spurred by new instruments like the telescope and the microscope, new research into the workings of the human eye, advances in dissection and medicine, and unprecedented travel across the globe, artists incorporated knowledge about the human body, the earth, and the cosmos... So you like listening to music, but have you ever stopped to consider its meaning, even its political significance? In this class we explore the relationship between music and politics, from classical music to indie rock. Through the practice of listening critically to music, this class illuminates past and present political events and demonstrates music’s crucial participation... The art of negotiation has never been more important than it is today. From the classroom to the boardroom, inter-personal skills and a clear conception of the give-and-take of personalities and tactical planning are vital elements of success in today’s world. This course is designed to encourage students to think critically about the history of theories of diplomacy... What makes a great leader? What is your own leadership potential, and how can you increase it? Do you have a passion -- such as literacy, the environment, or equal rights -- and hope to make an impact one day? Great leaders often possess several key leadership skills. Based on one of Brown University's most popular political science courses, this course offers students... This course will focus upon the American Counterculture from its emergence in the 1950s to its legacies in contemporary politics and society. We will analyze the historical, philosophical, and sociological foundations of the American counterculture in music, literature, style, and politics from the 1950s to the contemporary moment. This material, of which many pre-college students... History is told from the point of view of the winners, but the “losers” leave behind their marks. In this class, students will consider the views of those who lost and place them in context with the views of the winners. They will study the arguments of Tories and others who opposed the American Revolution; the dimensions and dynamics of the pro-slavery debate in... Whether historians like it or not, most people learn about the past at the movies. Historical movies, from Birth of a Nation (1915) to Lincoln (2012) and The Butler (2013) have larger audiences and greater cultural impact on public perceptions of history than the most celebrated and well-known scholars. Traditionally, historians have grumbled about filmmakers who encroach on... “War is hell,” an old saying goes. Yet people have waged war on one another for all of human history, and communities around the globe continue to face the harsh realities of war every day. Rather than focusing on battles and military tactics, this course offers a deeper understanding of the human experience of warfare by studying people ranging from the common... The focus of the course will be the history of the Modern Middle East from Napoleon's incursion into Egypt until the Islamic Revolution in Iran. We will discuss the following concepts and issues: nationalism, cultural renaissance, the decline of the empire, genocide, diplomacy, human rights, and the status of refugees. Thematic coverage in the course will include focus... The daily news bombards us with stories about the evils that humans commit against one another--from acts of interpersonal violence such as rape and murder, to atrocities perpetrated on a massive scale, such as genocide and terrorism. Ideas about what it means to be evil, and what it means to be just and good, continue to shape the ways that we understand and react to these... This course will examine warfare in ancient Egypt, Mesopotamia, Greece, and Rome. Blood, battles, and brutality have romanticized these warrior rulers -- Ramesses the Great, Darius the Great, Alexander the Great, and Caesar -- and have kept their memory alive into the modern era. To understand their fame, this course will use a cross-cultural approach to the study of war in... This course examines the development of popular music over the last 100 years from jazz and folk to indie rock and hip hop. Students will learn about U.S. history through the perspective of music. It provides a chance to learn how to analyze music critically and express one's ideas clearly. How can ancient Rome help us understand Beijing? Why should we care about the Hittite Empire? This course introduces students to the concepts, applications, and practices of imperialism by exploring and comparing empires of the pre-modern era from both the old and the new world. Each day we will focus on a different theme and use several different empires as case... ISIS has become an organization of considerable international interest and concern: it continues to embrace barbaric tactics like beheading, it controls land roughly the size of Great Britain, it has a coordinated and sophisticated approach to social media that helps to spread its message, and it has been publicly disavowed by Al Qaeda Central. This course is designed to look... The class introduces students to the development of writing systems, focusing primarily on the earliest known script, Cuneiform. We are most familiar with the Roman alphabet, but cultures all over the world have designed and used a wide variety of written scripts and each has a rich history and unique features. This course will consider the complexities of the Crusader era (ca. 1050-1400), with the particular aim of understanding the Crusades as a driving force in East-West interaction that came at great cost to the societies involved, but also generated fascinating and rich cultural interactions. The main objective of the course is to introduce pre-college students to the skill sets... This intensive three-week course introduces the complexities and beauties of Rome, an ancient and vibrant metropolis. Designed for high school students without prior experience in Rome, the course introduces students to workshops and lectures by world-class Brown faculty, as well as immersive Italian language studies, all in the very heart of Rome. This course seeks to "flip" the narrative of American history taught in public schools. We will look at the history of the Americas, particularly the United States, from the perspective of its Indigenous Inhabitants. An exploration of American history seen from the other side of the frontier will enable students to gain a far more complex understanding of what is... Experience what it’s like to participate in a Brown University seminar that will challenge your ideas and invigorate your thinking. In this course, you will engage with great thinkers in world history, immerse yourself in key ideological controversies that underpin contemporary global society, and explore great social movements of our time. All the while, you will learn... This course will explore the mathematics that underlies chaos, dynamics, fractal geometry, and the emergence of structure from simple rules. Understanding these principles opens one's eyes to beautiful and bizarre sides of mathematics and fundamentally enriches our understanding of the universe. Millions of individuals buy and sell in the stock market, interacting... The course provides an introduction to the history and mathematics behind cryptography. From Julius Caesar's encoded messages to his generals and Thomas Jefferson's wooden cipher to modern day encryption systems, codes have always been used to protect important or personal information. In this course we study the mathematical concepts behind encoding and decoding... "Mathematics is the queen of the sciences and number theory is the queen of mathematics." Carl Friedrich Gauss Number theory, the study of the integers, is a vibrant area of mathematical research that many students do not have the opportunity to study in high school. The objectives for this course are to expose students to this beautiful theory, to understand... The aim of this course is to reinforce fundamental concepts and techniques that a student preparing to enter a first calculus or pre-calculus class will need for success. To this end, we will focus on those topics introduced in algebra courses that most often pose difficulties for students down the road. Along the way, for enrichment and depending on student interest, we may... “For Today’s Graduate, Just One Word: Statistics.” Such was the title of a New York Times feature and the motivation behind this course. While the field of statistics is growing daily, the most critical aspects of the subject are accessible to high school students. This course will explain how, where, and why statistics is used to solve... Have you ever wondered how many numbers there really are or how big infinity is? Many mathematicians have asked these questions, and the answers can be fascinating . . . and sometimes quite strange. This course will be a journey through the mathematical concepts that have helped answer such questions, and along the way, you'll get a taste of what pure mathematics is all... Logic is a system of rules upon which human reasoning is based. It is a tool that we deploy in our everyday lives, and it pervades every academic discipline, from mathematics to the sciences to the humanities. To philosophers, logic is a deep and complex subject of study in its own right. This course is devoted in part to exploring this system of rules, which we will build... Imagine putting a random group of people in a room: how many do you need so the probability that two of them have the same birthday is at least one half? Something like 182 or about 365/2, right? Wrong! In fact, the probability is already greater than one half with a random collection of only 23 people! At its core, this is a question about counting; in this course, we study... Don’t let them fool you! You hear people talking about probabilities all the time. 80% chance of rain? Well, what does that even mean? If a medical test gives the correct answer with 99% probability, does a positive test result mean you have a 99% chance of being sick? It does not. And when you hang out with your friends playing poker, wouldn’t you like to know... The goal of this course is to introduce high-level mathematical concepts intuitively, focusing on real world applications rather than on theoretical aspects. Students will have the opportunity to see mathematics in action, applied to everyday situations beyond the dreaded "word problems" in algebra and pre-calculus. Everyone loves the movies. In addition to entertaining us, the greatest works of cinema provoke thought, inspire us, move us, and enrich our lives. However, because of the close connection between film and entertainment, we often take movies for granted and watch them strictly for pleasure or in order to evaluate or judge them instead of analyzing them for deeper meanings.... This course examines American film-making from about 1920 through the present. Its main objective is to familiarize students with the history of American film, with a special focus on films that have been highly influential both culturally and aesthetically. This course examines the history of American cinema from the silent era into the era of the studio monopolies... We will cover the evolution of television news coverage from the 1950's to the present day, from 15-minute newscasts sponsored heavily by advertisers to today's 24-hour cable channels, owned by major corporations. By week’s end, we should be able to determine whether we are better off today, with more information, and more channels, than earlier generations... Tweets, Facebook posts, e-mails, texts, instant messages, news alerts, ads: ours is the age of short-form communication. This course offers an introduction to different styles and genres of short-form verbal and non-verbal communication to help make you a more persuasive, concise, and creative writer and speaker. We will examine historical and current uses of the short form... "Introduction to Music Production" will provide hands-on study of recording studio techniques and aesthetics. Students will create original studio work while developing listening and technical skills for audio production. Technical topics include digital and analog audio technology, acoustics, microphone technique, signal processing and mixing using professional audio... Electronic Music explores how advancements in technology give rise to musical styles, such as techno, hip-hop, progressive rock, industrial, and synthpop. Students gain an understanding of the most influential works of electronic music through guided listening, video screenings, selected readings, class discussions, and creative assignments. Each class focuses on a specific... This course is designed for you to learn: 1) what music theory IS, and 2) how music theory can help you "hear music better." We will investigate patterns and trends in Western classical music (Baroque through twentieth century) and more contemporary genres. The ultimate goal of the course is to see how theory can be applied to student's own musical experiences,... Newtonian mechanics and Einstein's theory of Special Relativity is a very exciting and beautiful part of our daily life! Every single day, we see mechanics, experience it, and enjoy it through many cool activities! Every time we shoot an American football, bike, drive, take ride on a roller coaster, or fly in an airplane, we precisely obey the fundamental laws of mechanics... Lightsabers clash in a galaxy far far away as a pair of droids walk slowly towards the setting of the twin suns. It's hard to argue with the claim that Star Wars is one of the most iconic pieces of science fiction in the past century, but how does it hold up as a work of science fact? Death stars, blaster bolts, jet-packs, wormholes, space travel, the force...will... Why is the Higgs boson so important? Why does Leon Lederman, a Nobel laureate, call it “the God particle”? And what does it have to do with the world we live in: light, electricity, nuclear power, atoms, and molecules? In order to answer these questions, we will have to take a journey back in time, to the universe as it was when it was forming. Along the way, we... The Solar System. Black holes. Galaxy clusters. Quasars. The closer we look at these and other astrophysical objects, the more mysteries we uncover. This course will provide an introduction to topics of active research in astrophysics and cosmology, travelling from our galaxy to furthest reaches of the Universe. Along the way, we will explore objects like black holes, quasars,... Much is speculated and little is known about one of the most brilliant inventors at the turn of the century, Nikola Tesla. With more than 1000 patented inventions, Tesla laid the foundations of modern society. Students will be introduced to the theory of electricity and magnetism and its applications, the principles of wireless transmission of signals, and the idea of harvesting... Nearly 100 years ago, quantum mechanics changed the face of physics forever. The orderly, deterministic rules of classical physics were turbulently turned on their head, unveiling a veritable zoo in which particles can behave like waves and waves like particles, particles can tunnel through walls, and either the position or speed of an object can be known, but both can't... We all know how a falling apple helped Newton discover the laws of gravitation, but did you know that playing bongos in the desert helped Richard Feynman untangle quantum field theory? Or that every famous physicist who studied thermodynamics eventually went crazy? This is a course for people who want to understand what physics is all about. We will discuss the equations... Introduction to Nanotechnology provides a broad overview of nanotechnology, discussing the fundamental science of nanotechnology and its applications to engineering, biomedical, and environmental fields. We will discuss the interdisciplinary nature of nanotechnology and how the different basic sciences merge to create the field. In this class, we will learn to read the sky like an ancient astronomer and will address such questions as: How did the ancient astronomers know the nature of the planets? What were the names of the planets in Babylonian? Who developed the first model of the solar system based around the sun? This course is focused on the advances made by astronomers in the Greek... Why was the discovery of the Higgs boson such a significant milestone in our understanding of the fundamental building blocks of matter? The goal of this course is to introduce you to cutting edge particle physics and show you how research is done in this field. You will learn about the elusive Higgs boson, one of the greatest scientific discoveries of all time. This course will examine the history, development, and exploitation of the space environment, primarily from 1903 to the present. Students will receive a comprehensive overview of the space industry and "space culture" by examining the major milestones in space development. Students will explore the ways in which "space" has both reflected and informed the... Modern science throws light on many of the perennial questions of philosophy, sometimes seeming to confirm or refute old answers and sometimes suggesting new ones. Are sensory qualities, such as colors, in external things or only in our minds? Is the world governed by deterministic laws, and if so, what room is there for freedom of the will? Could space have extra dimensions?... By far the most popular philosophy course at Brown, this course on existentialist philosophy (taught by the current chair of the philosophy department) provides a unique introduction to philosophical thinking, by applying the methods of philosophical analysis and argumentation to questions and issues confronting all human beings: What is the meaning of a life with the distinctive... There may be no single question more important than this: What is the meaning of life? It’s a question we all face, and finding an answer is urgent. Is there even such a thing? If so, is it something outside of us or something we have to give to ourselves? In trying to find answers, we will discuss issues ranging from purpose and fulfillment to happiness and death. By... We will grapple with the great questions of philosophy. Our provocations will come from classic and contemporary authors, but we will learn to do philosophy, not just study it. Our topics will include the nature of the mind, knowledge, the existence of God, free will, and morality. In this course, we cover many of the main branches of philosophy as understood in... What kind of justification can we give for our ethical decisions? Do other people have to accept our justifications? These are questions everyone grapples with, and wondering about it never ends. This course will address different answers philosophers give to these questions. We’ve all faced tough ethical decisions and have given reasons to support what we... We typically enjoy a rich, conscious mental life: there's a subjective feel to experiencing the smell of fresh brownies, to be stuck with a pin, or to go on a first date. Conscious experience is such a fundamental part of what it is to be a creature like us that we often take it for granted, but some of philosophy's most fascinating and difficult questions revolve... What does Confucius have to say about what career to choose? What does Buddhist or Islamic philosophy say about how to live your life? Examining the ideas from other cultures can be overwhelming and confusing. This course provides a basic overview of the context and major ideas from cultures around the world. The course introduces the study of happiness by considering classic and contemporary research from the two most relevant disciplines, philosophy and psychology. Besides exposing the students to a topic of immediate human interest, the course also exposes them to two distinct modes of inquiry about it, allowing them to compare and contrast them. Though science is unquestionably one of the most successful of all human endeavors, there are many perplexing philosophical questions at the very core of scientific reasoning and practice. Can science provide us knowledge about the unobservable parts of reality, or can it only tell us about the parts of the world we can directly measure? In what ways is science “objective,”... Physicians, scientists, philosophers, and writers alike have grappled with the challenges of describing physical pain. The question of pain -- and more specifically how much pain one is able to or should endure -- is found in discourses pertaining to issues as diverse as healthcare, sports, grief, sexuality, illness, disability, torture, capital punishment, and war. This is a course about breaking the law. The law is not always on the side of justice, and when it is not, we have to decide what to do about it. Do we obey the law, or do we engage in civil disobedience? But what is civil disobedience, and what makes it different from other kinds of law breaking? Are we only allowed to participate in civil disobedience when the... Globalization is transforming the relationship between world events and U.S. politics. This course analyzes some of the main challenges, threats, and questions facing the United States in the first decades of the twenty-first century. In addition to introducing students to core theoretical perspectives, concepts, and debates in the study of International Relations and American... Can Twitter be used effectively as platform for protest? Can the use of Facebook make a difference in national elections, social movements, and human rights campaigns? Can Tumblr be used as a community building tool, connecting people around the world towards a shared vision? This class will investigate the possibilities and pitfalls of using social media for social change.... How should we evaluate the laws that govern and bind society? This course will examine the moral and political value of American law through the lens of political theory. As such, students will be able to evaluate for themselves whether laws are legitimate. During the course, we will read contemporary and classic political theory in light of the history of American... The abduction of more than 200 school girls in Nigeria, the oppression of gays and lesbians in Russia, and the deaths of thousands of Ebola victims in West Africa have rightfully drawn the condemnation of human rights advocates. The recent killings of unarmed black men in the United States remind us that human rights violations are not just a problem over there; violations... Public policy is the set of laws, rules, and regulations enacted and enforced by government. Policy is made in response to a societal issue or problem that requires attention and is made on behalf of the public. Examples of public policy include: marijuana legislation, standardized testing in schools, environmental regulations, and immigration. Policy affects virtually every... Most countries claim a commitment to democracy, America especially, but we must always ask how well they live up to its ideals. What is democracy? How does it work? How should it work? How can we all be good citizens despite the enormous differences between us? Must we all vote, campaign for and lobby elected officials, or would we be better off occupying public spaces in protest?... The world is a complicated place. World leaders must address an array of domestic and international issues on a daily basis. Their leadership qualities and styles often reflect cultural and social norms as well as their nation’s political system. Understanding how global leaders make decisions and how those decisions impact the world is vital as the world becomes increasingly... This course gives students a chance to undertake a fascinating and highly challenging process of political and intellectual exploration. In addition to well-established far right- and left-wing ideas, you will be exposed to and asked to evaluate such ideologies as Nihilism, Radical Feminism, Radical Environmentalism, and even Radical Islam. Do we have duties to help the poor in other countries? Is every human being owed a human right to health as a basic moral entitlement? This course introduces students to the most important ethical debates about global politics. The course strongly appeals to students who are interested in ethics, political philosophy, public policy, and international relations. Wiretapping. Enhanced, invasive airport security screening. Evacuations. Financial bailouts. In these and many other ways, our regular ways of democratic life are disrupted when a crisis looms. But what happens to individual freedom and the accountability of government to its citizens when the red alert siren goes off? All of us are formally equal in a democracy. But does equality breed conformity? Can we really be individuals in the crowd? And conversely, given our many differences--social, economic, and personal--is formal equality enough to keep a democracy going? Or do we need something more, like a shared sense of tradition or purpose? What does a commitment to democracy require of us... This course examines the complex relationship between ethics and politics in international affairs. Starting with an overview of different perspectives on the role of ethics and morality in international relations, the course then explores the ethical dimensions of issues central to foreign policy and the study of world politics, including the use of force, human rights, and... Everyone does it " but no one talks about it " until now. The Snowden revelations of extensive American surveillance operations has upset the world of international relations in a dramatic fashion, yet the United States is not the only country that spies. Is spying allowed under international law? Can surveillance and spying be reconciled with democratic values... This course aims to provide students with a deeper understanding of the role of ethics in international affairs. It does not aim to convert students to a particular perspective, opinion, or other viewpoint. Instead, the goal is to equip students with the ability to apply ethical principles to international phenomena. To accomplish this goal, this course will focus on developing... The international section of today’s newspapers look far different than it did only a few decades ago: rather than stories on large-scale conflict (e.g., World War II), or the prospects for such (specifically, the Cold War), we’re presented with gruesome tales of ISIS, Boko Haram, and other shadowy actors. As these groups grow in strength and number, states and... One of the deadliest and most common forms of political violence in the world today is civil war, affecting people from all corners of the globe, in countries such as Syria, Ukraine, South Sudan, and Colombia. This course will introduce students to our current understanding of the origins, dynamics, and termination of civil war. We will pay close attention to some of the key... Should the United Nations and World Bank be reformed? How should states cooperate to address global warming? This is the second part of a two-part course introducing students to the most important ethical debates about global politics. The course strongly appeals to students who are interested in ethics, political philosophy, public policy, and international relations. Students... Climate change is the most important issue humanity faces and will increasingly dominate our experiences and global discourse over the course of our lives. The takeaway message of this course is that while global governance is presently dysfunctional, there is reason to hope, and that motivated individuals can still make a difference. Students will learn who the major actors... This course will introduce students to methods used by psychological science to help answer common questions about the “unknown.” We will examine common ways in which human thinking leads people to believe strange things and to maintain these beliefs even in the face of contradictory information. Students will develop critical thinking skills for evaluating claims... The completion of the Human Genome Project may be the most important scientific achievement of our lifetime, but how much can genes tell us about complex human behavior? How much does the environment impact human behavior? What kind of research techniques can be used to identify specific genes and specific environments that influence behavior? In this course, students will be exposed to the science and practice of Clinical Psychology. Students will learn about the clinical characteristics of many major classes of psychiatric disorders, and the scientifically validated treatments available for these conditions. This course is intended to provide information for those considering a career in clinical psychology, allowing... Can bipolar disorder be accurately diagnosed in children? Do certain antidepressant medications increase risk of suicide? Can alternative remedies such as fish oil stabilize mood swings? These questions address only a few of the recent controversies that surround the study of mood disorders, such as major depression and bipolar illness. Using these disorders to illustrate key... For years, psychology has been the study of what ails the human mind. For example, why do certain individuals develop depression or abuse substances? Currently, there is a movement within psychology to study not only what ails the human mind, but what makes us happy, healthy, and content in our lives. Positive psychology is the scientific study of what goes right in our life,... This course provides an introduction to the profession of counseling. As such, a primary goal of this course is to introduce students to the field of counseling and the multiple training disciplines. The course will address the various fields of counseling (e.g., school counseling, marriage and family therapy, social work, clinical psychology) and the required training needed... In "Psychology and the Media," we will explore and evaluate the ways in which psychology and psychologists are (mis)-represented in the popular media. Films, TV clips, and websites will be used to illustrate the ways in which psychology and psychologists are portrayed in the media and to stimulate discussion about the accuracy, ethics, and implications of the media... This course will introduce students to what psychologists mean when they use the term personality. Does money make people happy? Why do some people prefer to study in a noisy coffee shop while other people prefer a quiet library? How is personality related to health outcomes such as heart disease? What motivates people? Are men from Mars and women from Venus? What does it mean... Are you interested in psychology and really want to have an impact on your school, neighborhood, community, or society? Are you passionate and have a vision of how to affect and maybe change the system? Community psychologists seek to understand the relationships between individuals and larger systems. If you have ever wanted to learn about applied psychology that could... What is the latest science about how gender identity develops? Are fathers essential for a child’s well-being? Is fetal sex selection harmful for society? What are the consequences of advertisements that suggest that an individual’s status depends on so-called sex appeal? This course will address these questions, and provide a broad survey of the field of the psychology... How do we cope with war, natural disaster, or terrorism? What about surviving experiences with abuse or torture? How are these experiences different or similar to routine life stresses like exams, moving, or getting divorced? How can you prevent or treat psychological problems that might arise after trauma? These are some of the overarching issues that will be addressed in... Have ever wondered if your friend has an eating disorder, if your uncle is an alcoholic, or if your math teacher is depressed? Have you ever thought about why a behavior that is normal in one culture might be considered a disorder in another culture? If so, you have already thought about abnormal psychology. The field of psychology has long focused on the harmful impact of stress, adversity, and trauma. Yet many remarkable individuals show incredible resilience in the midst of difficult, even horrible, situations. How are some people resilient in the face of abuse, torture, war, natural disaster, or terrorism? What about resilience to routine life stresses like taking exams or... What does it mean to know yourself? Why is love so painful? What is the source of man’s belief in God? How does history repeat itself? Why do our dreams haunt us? Is there a difference between men and women? What is an Oedipus complex, and do you have one? Sigmund Freud devoted his life to answering these questions. A standard course in any undergraduate Business department, Organizational Behavior integrates the study of management principles and practices with the study of human behavior within organizations. Students will be exposed to philosophies, theories, and generally accepted techniques in the management of people in the work environment as we focus on issues, such as organizational... The psychology of sport is the study of the interaction between psychological variables and performance in athletic and physical activities. The overall objective of this course is to introduce students to psychological theory and practical skills that influence sport performances. Students will be encouraged to incorporate the personal significance of the course content to... Social psychology is the intriguing study of social context and the way it influences our thoughts, feelings, and behaviors. Students will be encouraged to reflect on the application of social psychology research to real-world problems and to incorporate concepts explored in class to its relevance in their own lives. Have you ever wondered where the terms “cold feet” or “butterflies in your stomach” come from? Have you ever wondered why zebras and other animals don’t get ulcers? This course will answer these and other questions related to the role of psychology in the onset, course, and treatment of medical conditions. Have you ever wondered how mental illness affects children and their families? Can kids "catch" autism? Can children really suffer from schizophrenia? From autism and anxiety to pediatric bipolar and schizophrenia disorders, students will learn what psychiatric disorders look like in children, how they are treated, and controversies in childhood psychiatric diagnoses.... This course will focus on landmark scientific studies and political movements that have changed the way psychological disorders are viewed. Through the study of the history of psychological disorders, students will be able to track how society and science influence one another. The course will help students develop a critical view of science and medicine. There is a recent groundswell of interest in empathy; CEOs, best-selling authors, and international leaders have identified empathy as one of the most important leadership skills of the 21st century. Generally understood as “the ability to understand and share the feelings of another,” empathy will play an increasingly important role in our interdependent and hyper-connected... Does freedom mean acting on every desire we experience? To what extent are we free, and in what ways are our thoughts and actions determined by factors beyond our control (such as our biology or our culture)? How well do we know ourselves? Do we really know why we do what we do? This course examines classic explanations of human action and character. We explore these topics... Are religion and science fundamentally in conflict with one another? The U.S. has been called the "most religious of the advanced industrial democracies," yet it also stands at the forefront of scientific discovery. Think about the conflict, for example, between evolutionary theory’s and creationism’s understanding of the human being. At the same time,... The past decade has seen a relative explosion in attention in what is typically called "religious violence." This phrase peppers news coverage of current events, books on contemporary politics, and discussions of national and international security. The primary objective of this course is to make sense of this language: Why do we describe some violence as religious?... Despite remarkable progress over the last hundred years, women continue to face unique challenges in educational, career, social, and political arenas. In this course, students analyze the position and portrayal of women in society, explore how gender and other factors influence our understanding of leadership, and propose strategies to facilitate inclusion and social justice... Participants in sports, athletes and fans alike, are more than just players in an American past time or a competition. Rather, they are part of a powerful social vehicle that demonstrates "inherent fundamental truths" central to the American identity. This course will consider how sport perpetuates cultural values embedded in masculinity, with implications... Despite remarkable progress over the last hundred years, women in the 21st century still face unique challenges in educational, career, social, and political arenas. In this course, students (1) analyze the position and portrayal of women in society, (2) explore how gender and other factors influence women’s leadership styles, and (3) propose strategies to facilitate... Leadership and Social Justice is a course designed to provide engaged students with the tools and theory needed to become successful change makers, activists, and community organizers. This course explores how grassroots movements can transform communities, cultural norms, and global systems. How are campaigns developed, initiated, and orchestrated? What factors determine a... Social Entrepreneurs are individuals with innovative solutions to the world’s most pressing social problems. In this course, students will study how social entrepreneurs and social enterprises are addressing global challenges in areas such as education, job creation, the environment, arts, poverty, health care, and finance. Students will explore how different kinds of... Who am I and how does my personal background impact my life experiences, my world view, and my relationships with others? To work effectively as a leader towards social change, one must have self-knowledge and an understanding of how individual, institutional, and societal inequity manifests in society, both locally and globally. How do doctors decide what is wrong with you? What happens when your symptoms cannot be explained medically? How do patients negotiate diagnoses, and where does self-diagnosis come in? This course will address these questions, as well as the decision-making process of diagnosis through a sociological lens. Diagnosis is the cornerstone of modern biomedical practice, since it... Why is the world the way it is? Do we act as individuals with free will or do we follow social structures that we have no control over? Why are societies unequal and why do these inequalities persist? How is social change possible? Social theory tackles these ‘big questions’ and addresses some of the most challenging social issues today. Through studying... Why do black men in the United States die nearly ten years earlier, on average, than white women? Can having overweight friends cause you to gain weight, independent of your own eating and exercise habits? Can stress from living in your neighborhood cause breast cancer? Increasingly, researchers are finding that the social worlds that we inhabit “get under our skin”... In the past decade, human trafficking has rapidly risen to the top of the global human rights agenda. This course introduces students to the varying definitions of human trafficking in law and practice in a variety of global contexts. It provides an overview of critical debates in "modern day slavery" studies, including: gender, labor, migrant, and sexual... How do small, local interactions with one's neighbors and community members foster democratic participation and create what we broadly term "civil society"? What is gained from running into your neighbor at the local coffee shop, the dog park, or at the gym? Are people who sit and chat in coffee shops really more engaged with their local and national communities... The TheatreBridge Acting Company offers a connecting link between high school and college theatre and encourages a commitment to a life of creative engagement. This highly selective intensive provides promising young actors an opportunity to stretch their imaginations as they build their skills and create new work under the mentorship of established theatre professionals. Past... This two-week course offers a unique workshop experience for young writers and performers interested in the special challenges of writing sketch comedy for performance. Students will work both collaboratively and individually to develop and refine short scenes, to edit them based on student and instructor feedback, to stage them with minimal time and resources, and afterwards... Want to make amazing presentations and influence people? Learn the tips, tricks, tactics, and tools of giving effective public presentations. This course will introduce you to fundamental methods of public speaking and designing effective graphic presentations. Public presentation skills are central to success in any academic or professional career. This course will... In this course, we will study how art and activism have intersected in contemporary society. Students will study the ways in which artists and community-based art initiatives are effectively addressing a wide array of social issues. Providence is home to a several nationally recognized youth arts programs and students will have an opportunity to learn about these organizations... Digital video production is for budding movie-makers with an emphasis on experimentation in the use of the video medium. The primary goal of the course is to serve as a foundation for further exploration in digital video artwork and storytelling. Students will write, direct, act, shoot, and edit short videos, with beginning and intermediate instruction. We will cover the fundamentals... Ascending a staggering half mile into the sky, the Burj Khalifa represents the culmination of a story that began in 1896 with the ten-story Wainwright Building; the world's first skyscraper. What happened in the intervening century is the story of this class, which traces the forgotten histories of the world's tallest structures. The glistening pinnacle of the Chrysler... Drawing Intensive introduces students of all levels to a totally immersive drawing experience on a daily basis. Each day's real art-school-based studio session offers three full hours of drawing combined with group critique, one-on-one feedback to hone technique, and the freedom to experiment. This course gives students a head start in preparing for college art classes... This two-week course combines studying the lives and practices of famous artists with students’ own active engagement in creating their own art. We will get to know artists like Andy Goldsworthy, Cristo, Vik Muniz and Ushio Shinohara as well as Graffiti artists Banksy and Swoon, using documentary films to explore the complexity of these artists’ careers and lifestyles.... Explores the electronic structure of atoms and molecules, thermodynamics, solution equilibrium, electrochemistry, chemical kinetics, and reaction mechanisms. Course includes lecture and laboratory sections. Laboratory cannot be taken without the lecture. Students who previously passed 0330 lab may be excused from repeating the lab portion of the course. Prerequisite: CHEM 0100,... Literature gestures us toward a certain kind of knowledge not quite psychological, not quite philosophical. We read widely in the classical and medieval traditions in order to gauge the peculiar nature of what this knowledge tells us about experience and the ways in which expressions of selfhood abide or are changed over time. Authors include but are not limited to Sappho, Pindar, Catullus, Horace, Augustine, and Fortunatus. An examination of the Palestinian-Israeli conflict through the lens of cultural production. We will read literature and film in combination with historical texts, exploring how cultural producers have responded to key events from the partition of Palestine in 1947 until the second Intifada. We will examine the way that novels, poetry, documentaries and films provide us with... Extensive coverage of economic issues, institutions, and vocabulary, plus an introduction to economic analysis and its application to current social problems. Required for all economics concentrators. Course serves as a prerequisite for ECON 1110, 1130, 1210 and 1620. Serves as a general course for students who will take no other economics courses and want a broad introduction to the discipline. Are humans born naturally good, evil, neither, or all of the above? Does evil lurk deep within the heart of all that is good, or can the forces of good eradicate those of evil? Is evil an inextricable part of what it means to be human in the first place? We'll examine these and related questions by reading some especially provocative literature, including Frankenstein,... An introduction to university-level writing. Students produce and revise multiple drafts of essays, practice essential skills of paragraph organization, and develop techniques of critical analysis and research. Readings from a wide range of texts in literature, the media, and academic disciplines. Assignments move from personal response papers to formal academic essays. Enrollment... Designed to develop the reading competence in French for graduate students (or advanced undergraduates with permission of the instructor). Fundamentals of grammar and syntax are emphasized as well as reading skills in the fields of individual students. Successful completion should satisfy the foreign language requirement for graduate students in other departments. (Consult... A four-skill language course that stresses oral interaction in class. Thematic units will focus on songs, poems, a short novel (E-E Schmitt), two graphic novels (Sattouf, Larcenet), films and a detective novel by Fred Vargas. Activities include a creative project using Comic Life, and a systematic grammar review. Prerequisite: FREN 0400, FREN 0200 with written permission,... In this course we will investigate the "felt histories" of the American Civil War -- the personal experiences of Americans (northerners and southerners, slaves and freed people, European immigrants and Native Americans, men and women) who fought its battles and bore its consequences. These histories, as Robert Penn Warren notes, are an "index to the very complexity,... A workshop for students who have little or no previous experience in writing fiction. Enrollment limited to 17 per section. This course is limited to undergraduates and pre-baccalaureates. Grade Option: S (Satisfactory) / NC (No Credit) only. Enrollment limited to 17. A workshop for students who have little or no previous experience in writing screenplays. This course is limited to undergraduates and pre-baccalaureates. Grade Option: S (Satisfactory) / NC (No Credit) only. Enrollment limited to 17. An intensive course in calculus of one variable including limits, differentiation, maxima and minima, the chain rule, rational functions, trigonometric functions, and exponential functions. Introduction to integration with applications to area and volumes of revolution. MATH 0090 and 0100, or AP Calculus BC score 4 or 5 are recommended for all students intending to concentrate... A continuation of the material of MATH 0090 including further development of integration, techniques of integration, and applications. Other topics include infinite series, power series, Taylor's formula, polar and parametric equations, and an introduction to differential equations. MATH 0090 and 0100, or AP Calculus BC score 4 or 5 are recommended for all students intending... In our exploration of Middle Eastern social movements, this course addresses the role of culture and art in social change; the relationship between faith and politics; as well as the impact of national, regional, and transnational discourses on identity, ethics, and citizenship. The study of social movements in the region will address the impact of technology, media, women’s... An examination of research on music and the brain; connections between music, mathematics and history; and music's interrelationship with literature. Readings include The Power of Music (Mannes), Musicophilia (Sacks), The Kreutzer Sonata (Tolstoy), Doctor Faustus (Mann), A Clockwork Orange (Burgess), and writings by Morike, Hofstadter, Vaget, and Taruskin, in which music... Introduction to the mammalian nervous system with emphasis on the structure and function of the human brain. Topics include the function of nerve cells, sensory systems, control of movement and speech, learning and memory, emotion, and diseases of the brain. No prerequisites, but knowledge of biology and chemistry at the high school level is assumed. While a large part of being a neuroscientist involves performing experiments to collect data, the reality of studying the brain is that you can often collect way more data than you know what to do with! In this course, we will discuss data analytic challenges in neuroscience. We will provide real data sets for hands-on student activities. By the end of the course, students... Some fundamental moral and metaphysical issues concerning ourselves as persons: What is a person? Are we (humans) the only persons on this planet? What (if anything) gives us a moral status different from that of the other animals? Do we have the sort of free will required for us to be morally responsible for our actions? What makes you today the very same person as the person... The overall goal of this course is to improve students' ability to think clearly and carefully and to enable them to identify and evaluate arguments. This includes enabling them to: understand and apply relevant concepts like truth, validity, and soundness; determine the structure of an argument; work with arguments using basic propositional logic; understand and apply... Survey of mechanics, electricity, magnetism, optics, and modern physics for concentrators in sciences other than physics-including premedical students or students without prior exposure to physics who require a less rigorous course than PHYS 0050, 0060. Employs the concepts of elementary calculus but little of its technique. Lectures, conferences, and laboratory. Twelve hours... The search for true happiness is as relevant today as it was 2500 years ago in South and East Asia. What constitutes leading a rewarding and fulfilling life, according to the most recent research in neuroscience and psychology and to the ancient sages of India and China? Can it be attained through pleasures of the senses or through pleasures of the spirit? Attained through... Provides an introduction to public speaking, and helps students develop confidence in public speaking through the presentation of persuasive speeches. Primarily for seniors. Limited to 18. Instructor's permission required. No permission will be given during pre-registration; interested students should sign up well in advance on the TAPS 0220 waitlist (form is at http://www.brown.edu/academics/theatre-arts-performance-studies/undergraduate-program/required-course-information)... This course draws upon the multi-disciplinary expertise of four instructors to provide a detailed exploration of recent neuroscientific research on meditation combined with guided first-person experiential learning in various meditation practices. The course focuses on the cognitive, affective, and neurophysiological effects of meditation practices and their clinical applications... Introduction to the new field of Contemplative Studies focusing on identifying methods human beings have found, across cultures and across time, to concentrate, broaden and deepen conscious awareness. We will study what these methods and experiences entail, how to critically appraise them, how to experience them ourselves, and how they influence the development of empathy,... An introduction to basic visual art concepts, exploring a range of materials with emphasis on experimentation and analysis of visual relationships. Drawing is a vital part of this course. VISA 0100 or 0110 is a prerequisite to any advanced studio course work at Brown or the Rhode Island School of Design. Under certain circumstances a student may petition for a waiver of this requirement upon submission of a portfolio. This is an extensive study in form and structure to develop spatial understanding and the fundamentals of 3-dimensional design and construction. Students will explore the structural, compositional and conceptual implications of basic materials, such as wood, metal, plaster and found objects. Projects are designed as a means for investigating a variety of sculptural processes....
Mid
[ 0.577272727272727, 31.75, 23.25 ]
Q: Dynamic expand UITextView I have UITextView and I want to expand it dynamically. If the text is should scroll I want to expand the view to fit the amount of the text. How can I do that. Thanks A: When you end the editing of your text write this. - (void) textViewDidEndEditing:(UITextView *)textView { CGRect frame = myTextView.frame; frame.size.height = myTextView.contentSize.height; myTextView.frame = frame; }
Mid
[ 0.540865384615384, 28.125, 23.875 ]
Q: Getting a file folder from Open File Dialog I'm a newbie to c++, and I can't figure out how simple get a directory of chose file from open file dialog. I'm trying to use standard functions, in my case it's GetFullPathName. That's how I'm trying to do: OPENFILENAME ofn; // common dialog box structure char szFile[260]; // buffer for file name HANDLE hf; // file handle // Initialize OPENFILENAME ZeroMemory(&ofn, sizeof(ofn)); ofn.lStructSize = sizeof(ofn); ofn.hwndOwner = hWnd; ofn.lpstrFile = szFile; // Set lpstrFile[0] to '\0' so that GetOpenFileName does not // use the contents of szFile to initialize itself. ofn.lpstrFile[0] = '\0'; ofn.nMaxFile = sizeof(szFile); //ofn.lpstrFilter = "All\0*.*\0Text\0*.TXT\0"; ofn.nFilterIndex = 1; ofn.lpstrFileTitle = NULL; ofn.nMaxFileTitle = 0; ofn.lpstrInitialDir = NULL; ofn.Flags = OFN_PATHMUSTEXIST | OFN_FILEMUSTEXIST; // Display the Open dialog box. if (GetOpenFileName(&ofn) == TRUE) hf = CreateFile(ofn.lpstrFile, GENERIC_READ, 0, (LPSECURITY_ATTRIBUTES) NULL, OPEN_EXISTING, FILE_ATTRIBUTE_NORMAL, (HANDLE) NULL); char buffer[MAX_PATH]; char *buffer2[MAX_PATH]; GetFullPathName(ofn.lpstrFile, ofn.nMaxFile, buffer, buffer2); //PathRemoveFileSpec(ofn.lpstrFile); MessageBox(hWnd, buffer, "Tutorial", 0); // and show the path A: When GetOpenFileName() returns, the chosen file is stored in the buffer you provided via the lpstrFile member. This is the full path to the file (e.g. C:\Path\To\File.txt). To get the folder the file is in all you need to do is strip off the last component. You can do this manually by searching the string backwards for the last backslash character, or use one of the utility functions to do it for you: char chFolderPath[MAX_PATH]; StringCchCopy(chFolderPath, MAX_PATH, ofn.lpstrFile); PathRemoveFileSpec(chFolderPath); // chFolderPath now contains "C:\Path\To" Note you'll need to #include <shlwapi.h> and link with shlwapi.lib to use the PathRemoveFileSpec function.
Mid
[ 0.6296296296296291, 29.75, 17.5 ]
Filed 9/10/15 P. v. Jones CA3 NOT TO BE PUBLISHED California Rules of Court, rule 8.1115(a), prohibits courts and parties from citing or relying on opinions not certified for publication or ordered published, except as specified by rule 8.1115(b). This opinion has not been certified for publication or ordered published for purposes of rule 8.1115. IN THE COURT OF APPEAL OF THE STATE OF CALIFORNIA THIRD APPELLATE DISTRICT (Sacramento) ---- THE PEOPLE, C076049 Plaintiff and Respondent, (Super. Ct. No. 12F04447) v. MATTHEW STEVEN JONES, Defendant and Appellant. While he was living in a residential facility for juvenile sex offenders, defendant Matthew Jones left the home late at night, broke into the home of 12-year-old G. Doe, woke her up, and engaged in lewd and lascivious acts. Defendant’s image was caught on surveillance cameras around G. Doe’s home, and defendant was apprehended when the manager of his residential facility recognized his picture and called authorities. Defendant volunteered to authorities that he had committed similar acts against a young boy (A. Doe) who lived in the area, and that he had entered four other homes for the same purpose, but had found no children. Defendant was 18 at the time of these offenses. 1 Defendant also volunteered that he committed a similar offense several times against a boy in Stockton when defendant had been living at a residential facility in Stockton. Defendant was 15 when he committed those offenses. Defendant was tried by the court. The court found him guilty of four counts of lewd and lascivious acts with a child under the age of 14 for the offenses defendant committed in Stockton when he was 15. The Court found defendant guilty of four counts of lewd and lascivious acts with a child under the age of 14 by force or violence and one count of lewd and lascivious acts with a child under the age of 14 (a lesser included offense to the forcible act) for the two children he violated when he was 18. The court also found defendant guilty of two counts of first degree burglary. For the violations of Penal Code section 288, subdivision (b)(1)1 (forcible lewd & lascivious acts against a child under the age of 14), the court found true the allegations pursuant to section 667.61, subdivision (j)(1) that the crimes were committed during the commission of a first degree residential burglary, and sentenced defendant to four consecutive terms of life in prison without the possibility of parole. For the four violations of section 288, subdivision (a) (lewd & lascivious acts against a child under the age of 14) that defendant committed when he was 15, the court found true the allegations pursuant to section 667.61, subdivision (j)(1) that the crimes were committed during the commission of a first degree residential burglary, and sentenced defendant to four consecutive terms of 25 years to life. For the violation of section 288, subdivision (a) that defendant committed when he was 18, the court sentenced defendant to a consecutive term of 15 years to life. For the two first degree burglary convictions, the court sentenced defendant to a determinate terms of seven years four months. Defendant thus received a 1 Further statutory references to sections of an undesignated code are to the Penal Code. 2 sentence of seven years four months, plus 115 years-to-life, plus four terms of life without the possibility of parole. Defendant argues the convictions for the offenses he committed when he was 15 must be reversed because there is insufficient evidence of the corpus delicti. He further argues he received ineffective assistance of counsel at sentencing because his trial counsel failed to argue the sentence was cruel and unusual, and because his counsel failed to object to the court’s reason for imposing consecutive terms. He also argues certain corrections must be made to the abstract of judgment. We shall remand for resentencing as to counts one through four, and we shall order the corrections to the abstract, but shall otherwise affirm the judgment. FACTUAL AND PROCEDURAL BACKGROUND Defendant was living in a residential facility for juvenile sex offenders on North Avenue in Sacramento County in August 2012. He was 18. On the morning of August 12, 2012, the Sacramento County Sheriff’s Department issued a media release with video footage of an individual who had been breaking into homes and molesting children. The program director for the North Avenue residential facility saw the media release, recognized defendant, and contacted the sheriff’s department. Detectives went to the North Avenue residence, where they handcuffed defendant with the intention of taking him back to the office for an interview. Defendant indicated he wanted to talk immediately, so the deputies Mirandized him.2 As they were driving to the office, defendant pointed out a house where he had molested a boy. It was the house of A. Doe. At the office, the detectives gave defendant his Miranda rights again. Defendant admitted that on the previous Friday night around midnight he had climbed a ladder and 2 Miranda v. Arizona (1966) 384 U.S. 436 [16 L.Ed.2d 694]. 3 entered an open window in A. Doe’s house with the purpose of finding “a kid to [sexually] offend.” He knew A. Doe lived there, because he passed by the house every day. He found A. Doe’s bedroom, touched A. Doe’s leg under the blanket near his buttocks, woke him up, and forced him into the kitchen. He tried to touch A. Doe’s penis three or four times, but A. Doe pushed him away. When A. Doe ran, defendant left through the window he had used to enter the house. Defendant went back to A. Doe’s house the next night around midnight. The front door was open, but before he could go in, an adult came around the corner asking him what he wanted. Defendant ran away. Defendant confessed that approximately a week earlier, he went out looking for a house with toys in the yard indicating a child lived there. He went in a house through an unlocked sliding glass door. He went into a bedroom where he thought a boy was sleeping. When he woke the child up and stuck his hand under her underwear, he realized the child was a girl. He preferred boys, but he decided to try to see if he could be aroused by a girl. He licked her and tried to have sex with her, but he was not aroused. The girl, G. Doe, told defendant she was 12 years old. Before leaving, defendant told her not to tell anyone what happened or he would kill her. G. Doe’s family had surveillance cameras around the outside of the house. When G. told her father someone came in her room and touched her sexually, he checked the security cameras. He gave the surveillance video with defendant’s image on it to law enforcement, and the images on the video led to defendant’s apprehension. Defendant confessed to breaking into other houses. He said he went in the house next door to G. Doe’s because he had seen boys there. He went in through an unlocked door. An adult male caught him and ran him out of the house. He also confessed to entering another home at night through an unlocked door. He went to a room that was a kid’s room, but there were no kids in the room, and an adult got up to go to the bathroom, so he left. He entered yet another house through an unlocked door, but he got chased out by a dog before he could find any children. After being chased by the dog, he found 4 another house with an open window. He looked through the house, but there were no children. Defendant then told the detectives about a boy he had violated when he was about 15 years old and living at a group home in Stockton, California. The first time had been around Christmas, because defendant remembered a Christmas tree. Defendant told the detectives he orally copulated the boy, fondled him, and simulated sex with him. The boy had slept in the lower bunk of a set of bunk beds. There was a child in the top bunk as well, but he never bothered that one. He estimated the boy was about three years old because he had been wearing a diaper. The boy never said anything to him. Defendant said he took the boy’s diaper off. He took most of the boy’s clothes off. He could not get the boy’s shirt off, so he pulled his shirt up under his arms. The boy had some kind of tube on his stomach. He went to the boy’s house five times over a period of about two months. He went in the front door because the front door was never locked. The detectives took defendant to Stockton so he could show them which houses he had entered to molest children. While they were outside the house of the boy with the diapers, the boy and his father came outside and defendant identified the boy as the one he had molested. The boy was obviously disabled. S. Doe was the Stockton boy defendant recognized. S. Doe’s parents testified at trial. S. Doe’s father testified that S. Doe had Leigh’s disease, a mitochondrial disorder in which the immune system attacks the motor control centers of the brain. In December 2009 through January 2010, S. Doe could move his head a little from side to side and occasionally lift an arm or leg, but had no coordinated movement and no fine motor control. He could not speak, could not feed himself, could not dress or undress himself, and could not move from one place to another. He was being fed through a gastric tube. S. Doe’s mother testified he slept in the bottom bunk bed, and his older sister slept in the top bunk. She testified that during December 2009 and January 2010 there were four mornings when his clothes were in disarray. Sometimes the diaper was all the way 5 off, sometimes it was only half off. Sometime his pants were completely off on the floor, and sometimes they were down around his ankles. His shirt was taken off one night. She asked her daughter if she saw or heard anything, or knew why S. Doe’s diaper was off, but the daughter did not notice anything. DISCUSSION I Corpus Delicti Defendant argues there was insufficient evidence of the corpus delicti of the crime of lewd and lascivious acts with a child under the age of 14 years to support his conviction in counts one through four, the crimes he committed against S. Doe. We disagree. The corpus delicti rule holds that the prosecution must prove: (1) the fact of injury, loss, or harm, and (2) the existence of a criminal agency as its cause. (People v. Alvarez (2002) 27 Cal.4th 1161, 1168-1169.) Furthermore, the prosecution may not satisfy this burden by relying exclusively on the extrajudicial statements of the defendant. (Id. at p. 1169.) The corpus delicti “must be established independently of the extrajudicial statements, confessions or admissions of the defendant.” (People v. Towler (1982) 31 Cal.3d 105, 115.) “In every case, once the necessary quantum of independent evidence is present, the defendant’s extrajudicial statements may then be considered for their full value to strengthen the case on all issues.” (People v. Alvarez, supra, at p. 1171.) The rule is not mandated by statute or the Constitution, but has its roots in the common law. (Id. at p. 1169.) Only a slight or prima facie showing of the corpus delicti is necessary. (People v. Huynh (2012) 212 Cal.App.4th 285, 301.) The corpus delicti may be proved by circumstantial evidence and reasonably drawn inferences from such evidence. (People v. Mehaffey (1948) 32 Cal.2d 535, 545.) “ ‘[T]he prosecution need not eliminate all inferences tending to show [no crime was committed]. Rather, the foundation may be 6 laid by the introduction of evidence which creates a reasonable inference [a crime was committed] even in the presence of an equally plausible noncriminal explanation of the event.’ ” (People v. Martinez (1994) 26 Cal.App.4th 1098, 1104, quoting People v. Jacobson (1965) 63 Cal.2d 319, 327.) Counts one through four alleged defendant violated Penal Code section 288, subdivision (a). The relevant parts of that section provide that a person is guilty if he or she “willfully and lewdly commits any lewd or lascivious act . . . upon or with the body, or any part or member thereof, of a child who is under the age of 14 years, with the intent of arousing, appealing to, or gratifying the lust, passions, or sexual desires of that person or the child . . . .” The definition of a lewd or lascivious act is quite broad, such that even an innocuous touching may violate the law if done with lewd intent. (People v. Lopez (1998) 19 Cal.4th 282, 289.) The circumstantial evidence independent of defendant’s confession was sufficient prima facie evidence that he violated section 288, subdivision (a). S. Doe’s parents testified that he was unable to move in a controlled fashion, and that he could not dress or undress himself. S. Doe’s sister, who slept in the same room, denied that she had taken S. Doe’s clothes off. The trial court could reasonably infer from the fact that S. Doe’s mother discovered him four times in the morning with his clothes partially or completely off and his diapers partially or completely off, that an intruder had taken his clothes off. There would be no real reason for anyone to do this, other than to commit a lewd or lascivious act against S. Doe. Even if there was another plausible explanation for S. Doe’s clothes to have been removed, there was enough evidence presented for a reasonable trier of fact to infer that an intruder removed S. Doe’s clothes, and that he did it in order to perform a lewd or lascivious act. The fact that there might be an equally plausible noncriminal explanation for S. Doe’s clothes to have been in disarray is immaterial to a finding of the corpus delicti. (See People v. Martinez, supra, 26 Cal.App.4th at p. 1104.) 7 II Ineffective Assistance of Counsel Defendant argues he received ineffective assistance of counsel at sentencing in several respects. Defendant’s challenge to his sentence is focused on the four consecutive life without the possibility of parole (LWOP) terms for counts five, six, seven, and eleven, and the four twenty-five year to life sentences for counts one through four. A. LWOP for Counts Five, Six, Seven, and Eleven Defendant received four consecutive LWOP sentences for three lewd or lascivious acts by force or violence (§ 288, subd. (b)(1)) against G. Doe and one lewd or lascivious act by force or violence (§ 288, subd. (b)(1)) against A. Doe. The sentences were mandated by section 667.61, subdivision (j)(1), which provides that the trial court “shall” impose the term if the crime was committed during the commission of a first degree burglary with the intent to commit a lewd or lascivious act. Defendant contends his trial counsel was deficient because he failed to argue the sentence was cruel and/or unusual under the state and federal Constitutions. Trial counsel was not deficient if such an argument had no merit. (People v. Ochoa (1998) 19 Cal.4th 353, 463.) We therefore turn to the merits of the argument. “A defendant has a considerable burden to overcome when he challenges a penalty as cruel or unusual. The doctrine of separation of powers is firmly entrenched in the law of California and the court should not lightly encroach on matters which are uniquely in the domain of the Legislature.” (People v. Bestelmeyer (1985) 166 Cal.App.3d 520, 529.) In California, a punishment may be cruel or unusual if “it is so disproportionate to the crime for which it is inflicted that it shocks the conscience and offends fundamental notions of human dignity.” (In re Lynch (1972) 8 Cal.3d 410, 424, fn. omitted.) Punishment is cruel and unusual under the Eighth Amendment if it involves the 8 “unnecessary and wanton infliction of pain” or if it is “grossly out of proportion to the severity of the crime.” (Gregg v. Georgia (1976) 428 U.S. 153, 173 [49 L.Ed.2d 859].) Under the California and federal Constitutions, courts follow substantially the same three guidelines in measuring the relationship between the crime and the punishment: (1) the nature of the offense and the offender, including his age, prior criminality, personal characteristics, and state of mind; (2) the comparison of the penalty with punishments in the same jurisdiction for different offenses that are more serious; and (3) the comparison of the penalty with the punishments for the same offense in other jurisdictions. (In re Lynch, supra, 8 Cal.3d 410 at pp. 425-427; People v. Dillon (1983) 34 Cal.3d 441, 479; Solem v. Helm (1983) 463 U.S. 277, 290-291 [77 L.Ed.2d 637].) Defendant makes no effort to compare his sentence with punishment for the same offense in other states or with more serious offenses in California, and since it is his burden to establish that the punishment is cruel and/or unusual, we take his silence as a concession that his sentence withstands constitutional challenge on those bases. (People v. Retanan (2007) 154 Cal.App.4th 1219, 1231.) Defendant cites several cases invalidating death and life without parole sentences for juvenile offenders.3 However, defendant was not a juvenile at the time of the offenses for which he received LWOP. Defendant’s only analysis of the offense and offender is a recognition that the crimes were “inexcusable and reprehensible,” and an assertion that he was young and had a troubled upbringing. Defendant attempts no explication of his troubled upbringing. Although he was young, he was legally an adult. 3 Roper v. Simmons (2005) 543 U.S. 551 [161 L.Ed.2d 1] (Eighth Amendment prohibits execution of defendant under 18 at time of crime); Graham v. Florida (2010) 560 U.S. 48 [176 L.Ed.2d 825] (Eighth Amendment prohibits life without parole for juvenile who did not commit homicide); Miller v. Alabama (2012) 567 U.S. ___ [183 L.Ed.2d 407] (mandatory life in prison without parole for defendant under 18 at time of crime violates Eighth Amendment); People v. Caballero (2012) 55 Cal.4th 262 (Eighth Amendment prohibits 110-year-to-life sentence in juvenile for nonhomicide offense). 9 His argument is plainly insufficient to carry his burden of demonstrating that the punishment for the crimes committed when defendant was legally an adult was cruel and/or unusual. As there is no merit to the argument that the punishment was cruel and/ or unusual, defense counsel was not ineffective for failing to make the argument below. B. Consecutive Sentencing for Counts Five, Six, Seven, and Eleven Defendant argues his trial counsel was also ineffective for failing to object to the bases for the court’s decision to impose consecutive LWOP terms for counts five through seven. Counts five through seven were the charges involving G. Doe. The trial court stated that it selected consecutive sentencing because the defendant had a reasonable opportunity to reflect on his conduct in between the separate acts. Subdivision (d) of section 667.6 provides for consecutive terms for each violation of section 288, subdivision (b) if the offenses “involve the same victim on separate occasions.” “In determining whether crimes against a single victim were committed on separate occasions under this subdivision, the court shall consider whether, between the commission of one sex crime and another, the defendant had a reasonable opportunity to reflect upon his or her actions and nevertheless resumed sexually assaultive behavior. Neither the duration of time between crimes, nor whether or not the defendant lost or abandoned his or her opportunity to attack, shall be, in and of itself, determinative on the issue of whether the crimes in question occurred on separate occasions.” (§ 667.6, subd. (d).) A finding of separate occasions requires neither a break of any specific duration, nor any change in location. (People v. Garza (2003) 107 Cal.App.4th 1081, 1092.) If the trial court finds the offenses were committed on separate occasions, “we may reverse only if no reasonable trier of fact could have decided the defendant had a reasonable opportunity for reflection after completing an offense before resuming his assaultive behavior.” (People v. Garza, supra, 107 Cal.App.4th at p. 1092.) Here, there was evidence defendant first felt G. Doe under her underwear. He then said to her, “You’re a girl? . . . Oh, I thought you were something else.” By 10 defendant’s own admission he “tried to tell myself well I’ll try to see if I like it.” He then pulled down G. Doe’s underwear and licked her vagina. After he licked her vagina, he asked her how old she was. He then got up from his crouching position by the bed, took all his clothes off, pulled G. Doe’s underwear down, and rubbed his penis against her crotch. Thus, between the three incidents, touching, licking, and rubbing, defendant had brief conversations with G. Doe. A reasonable trier of fact could have decided defendant had a reasonable opportunity for reflection during these brief exchanges before resuming his assaultive behavior. The consecutive sentences were thus proper, and defendant’s trial counsel was not ineffective for failing to object. Defendant argues his trial counsel was ineffective because he failed to object when the trial court used the threats to G. Doe as the basis of its decision to impose consecutive sentences, and argues that because the threats were incorporated as an element of the offenses for which he was convicted, i.e., forcible lewd acts, it was improper for the court to rely on that element of the offense as a reason for imposing consecutive terms. Defendant misreads the trial court’s explanation of its sentencing choice. The trial court did not choose consecutive sentences because the acts on G. Doe were forcible acts. The court chose consecutive sentences “because I do find that the defendant had a reasonable opportunity to reflect on his conduct in between these separate acts.” As detailed above, there was sufficient evidence to support this finding. Defendant’s trial counsel was not ineffective for failing to assert a meritless objection Counts ten and eleven were both violations of section 288, and were both offenses against A. Doe. Count ten alleged that defendant committed a lewd and lascivious act when he entered the victim’s home through a window and touched the victim’s leg near his buttocks while he was in bed. Count eleven alleged defendant forced A. Doe from his bedroom to the kitchen and attempted to touch Doe’s penis. 11 Defendant argues the trial court wrongly believed a consecutive sentence was mandatory for count ten, when a consecutive term for count ten was discretionary, since it was a nonforcible offense. Defendant misreads the trial court’s sentence. The trial court stated that it “selected” consecutive sentencing for counts ten and eleven “because the crime involved a separate victim than the victims of Counts One through Nine; and in these crimes, the defendant had a reasonable opportunity to reflect upon his actions, committing one act and then forcing the victim into a separate room to commit the second act. And during the commission of the second act, this victim continually resisted the efforts by the defendant to assault him. Thus, I find they were committed separately in different times and different places.” It is clear from the court’s use of the term “selected” that it was aware of its discretion. Moreover, the trial court properly considered that the crimes were separate, and were committed at different times and separate places since defendant forced the victim into a separate room to commit the second act. (See Cal. Rules of Court, rule 4.425.) The trial court did not err, and defendant’s trial counsel was not ineffective for failing to object. C. Failure to Argue Mitigating Factors Defendant argues his trial counsel was ineffective for failing to argue mitigating factors such as his background and mental and emotional development. We need not determine whether such failure rendered counsel’s performance below an objective standard of reasonableness because we conclude defendant was not prejudiced.4 4 “ ‘If it is easier to dispose of an ineffectiveness claim on the ground of lack of sufficient prejudice . . . that course should be followed.’ ” (In re Fields (1990) 51 Cal.3d 1063, 1079.) 12 There is no statement in the record that the court did not consider the factors defendant now claims should have been considered. The trial court was aware of all the information in the probation report, and all the information presented at trial. Defendant himself addressed the court before sentencing, informing the court of his treatment history and asking for further treatment. Nevertheless, after hearing the defendant’s statement, the court told defendant: “While living in a treatment facility that was focused on helping you with the problems that you speak about today, you made choices. . . . [¶] You haven’t fixed anything. And the fact that you think you have because you cooperated with law enforcement, leads me to believe that those are just empty words, that you haven’t found the empathy that you say you have. [¶] . . . [¶] It’s not anyone’s fault but your own, sir, that you committed these crimes. Until you accept and believe that, no amount of counseling or programming will protect our community.” Given the court’s statements, no argument of the mitigating factors defendant now puts forth would have resulted in a more lenient sentence. D. Life Sentences for Counts One Through Four Defendant argues his trial counsel was deficient for failing to argue that the aggregate sentence of 100 years to life imposed for counts one through four was unconstitutional. Defendant was 15 when he committed these acts, and a series of United States and California Supreme Court cases have held life sentences for juvenile offenders in nonhomicide offenses to be cruel and/or unusual punishment.5 In particular, People v. Cabellero, supra, 55 Cal.4th at p. 268, held that “sentencing a juvenile offender for a nonhomicide offense to a term of years with a parole eligibility date that falls outside the 5 See footnote 3, ante. 13 juvenile offender’s natural life expectancy constitutes cruel and unusual punishment in violation of the Eighth Amendment.” To show ineffective assistance of counsel, a defendant must establish that his trial counsel’s performance was below an objective standard of reasonableness and that the deficient performance prejudiced the defendant. (People v. Ledesma (1987) 43 Cal.3d 171, 216-217.) We must conclude that had defendant’s trial counsel objected to the sentence for counts one through four, the trial court would have sentenced defendant to a sentence for those offenses that did not fall outside defendant’s natural life expectancy, and that trial counsel’s failure to object to the sentence fell below an objective standard of reasonableness. We will remand the case for resentencing on counts one through four. III Clerical Errors Defendant notes a number of clerical errors in the abstract of judgment that need correcting. The People are in agreement. The trial court did not orally impose a parole revocation fine pursuant to section 1202.45, yet one appears in the abstract. A parole revocation fine may not be imposed for a term of life in prison without the possibility of parole. (People v. Jenkins (2006) 140 Cal.App.4th 805, 819.) We will order this correction. The abstract also lists the conviction for count ten as a violation of section 288, subdivision (b)(1), which was charged, even though the court found defendant was guilty of the lesser included offense of violating section 288, subdivision (a). We will order this corrected. The abstract also incorrectly states that the offenses in counts one through four occurred between 2009 and 2014. In fact, these crimes occurred between 2009 and 2010. We will order the correction. 14 DISPOSITION The sentence for counts one through four is vacated and the cause is remanded for resentencing on those counts. The trial court is directed to amend the abstract of judgment by striking the parole revocation fine, changing the violation for count ten to a violation of section 288, subdivision (a), and changing the date of the offense for counts one through four to 2009-2010. The trial court is further directed to forward the amended abstract to the Department of Rehabilitation and Correction. In all other respects, the judgment is affirmed as modified. Pursuant to Business and Professions Code section 6086.7, subdivision (a)(2), the clerk of this court is ordered to forward a copy of this opinion to the State Bar upon finality of this appeal.6 Further, pursuant to Business and Professions Code section 6086.7, subdivision (b), the clerk of this court shall notify defendant’s trial counsel that the matter has been referred to the State Bar. /s/ Blease, Acting P. J. We concur: /s/ Murray, J. /s/ Renner, J. 6 Business and Professions Code section 6086.7, subdivision (a)(2) requires the court to notify the State Bar “[w]henever a modification or reversal of a judgment in a judicial proceeding is based in whole or in part on the misconduct, incompetent representation, or willful misrepresentation of an attorney.” 15
Mid
[ 0.543577981651376, 29.625, 24.875 ]
Drew Brees-owned sports bar franchise Walk-On's coming to Viera Touchdown! Walk On's could open in spring 2019. Suzy Fleming Leonard | Florida Today Show Caption Hide Caption Walk-On's Coming to Brevard Walk-On's Bistreaux & Bar, a sports bar co-owned by New Orleans Saints quarterback Drew Brees, is coming to the Space Coast next spring. Check out some of the dishes on the menu. Video by Suzy Fleming Leonard. Uploaded July 5, 2018. As a Florida State alum and football fan, Nate Fowler of Melbourne was less than happy with last fall's 7-6 record. But the season wasn't a total loss. The Seminoles ended the year with a 42-13 win over Southern Mississippi in the Walk-On's Independence Bowl in Shreveport, Louisiana, and Fowler discovered a new business opportunity. Walk-On's Bistreaux and and Bar, a Louisiana-based sports bar and restaurant co-owned by New Orleans Saints quarterback Drew Brees, is relatively unknown in Florida, but Fowler and his wife, Courtney, want to change that. They plan to open a Walk-On's in Viera or Melbourne next spring. "Six or seven months ago, we had never heard of it either," Fowler said. While watching the Independence Bowl, he got curious and did a Google search on Walk-On's. "I got more and more intrigued," he said. More: NY Pizza. Maine lobster. Key lime pie. What dish best represents YOUR state? More: Why restaurants are becoming a battleground for politics, social issues More: That Cozy Restaurant brings a homey dining experience to the Suntree area The Fowlers, who both are in the medical device sales business, had been thinking about opening a restaurant for a while, and Walk-On's seemed like a perfect fit. Brandon Landry and Jack Warner, co-founders of the original restaurant, came up with the idea as teammates on the LSU basketball team in 1997. Both were walk-ons. They opened the first Walk-On's in Baton Rouge in 2003. In 2012, ESPN named Walk-On's the No. 1 Sports Bar in America. Brees signed on in 2015 as a co-owner and partner. Now, with Brees and Landry leading the team, Walk-On's has expanded to more than 100 locations in 15 states. Ann Maloney, who covers food and dining for NOLA.com and the Times-Picayune, said the franchise has gained a huge following in her city. "The spot is extremely popular with football fans," she said, "particularly LSU fans who want a place where they can eat, watch and cheer. It's packed around game time." The Walk-On's menu features sports bar fare, such as fried pickles, waffle cheese fries and burgers. But there are plenty of items with a Louisiana accent, such as Cajundillas, a quesadilla with chicken, andouille sausage and boudin; and duck and andouille gumbo. Courtney Fowler admitted Cajun isn't her favorite cuisine, but her husband loves New Orleans, so when he got excited about the franchise, she supported him. As she learned more about the restaurant, she got excited, too. "A lot (of sports bars) are just for guys to go drink beer and watch a game," she said. "This is family-oriented. It's kid-oriented. It's a place you could go for girls' night out." And while there are several Cajun dishes on the menu, there are also several salads and seafood dishes, things that will appeal to everyone. She raved about the ahi nachos on the Walk-On's Lenten menu. "It sounds so simple, but this was the best ahi I've ever tasted," she said. Brandon Landry introduces Drew Brees Walk-On's CEO Brandon Landry introduces Drew Brees Nate Fowler said they're still in the site-selection process now, but they're getting close to pinning down a location, probably in Viera. It needs to be a space that can hold an 8,000-square-foot restaurant and more than 130 parking spaces. "We want somewhere the whole county can get access to," he said. If all goes as planned, the restaurant should open in spring 2019, making it the third in Florida. Walk-On's restaurants are scheduled to open in Orlando and Tampa in the coming months. Anticipating the new restaurant has definitely taken some of the stink out of the Seminoles' less-than-stellar 2017 season. "I like to think they tanked just for us," Nate said. Leonard is food and dining reporter at FLORIDA TODAY. Contact Leonard at 321-242-3614 or [email protected]. Facebook: /SuzyFlemingLeonard and /321FlavorWhereBrevardEats Instagram: @SuzyLeonard Support local journalism: To sign up for a special summer sale offer for new subscribers, visit floridatoday.com/subscribe Saints QB Drew Brees talks with Acadiana's best athletes Drew Brees was the special guest for The Daily Advertiser's Sports Awards May 15, 2018, at the Cajundome Convention Center. He and sports editor Kevin Foote talked about Brees' career and his advice for high school students.
Mid
[ 0.6320754716981131, 33.5, 19.5 ]
TMC Cargo10 Tactical Pants with inside Pads (L size / RG) Description TMC Cargo10 Tactical Pants with inside Pads (L size / RG) offer specially moveable knee pads which are much more comfortable to wear than conventional knee pads with straps. These are comfortable enough to wear out and about as well as during skirmish. It may not have the most camouflage as it is all in one colour, but in CQB games, that should not matter at all!
Mid
[ 0.561181434599156, 33.25, 26 ]
BREAKING: San Diego Sailors Make Peace With God As Steady Rain Threatens Life As We Know It SAN DIEGO, Calif. – The worst storm to slam sunny San Diego in the past six years has encouraged thousands of sailors to repent for their sins and seek the unconditional forgiveness of the omniscient deity of their choosing, sources confirmed Friday. Many service members elected to remain home and spend their last moments with their families — except those on duty — who were tasked with bringing two animals of every kind aboard their ships. “Duty is duty,” proclaimed an unidentified master chief. While the storm hammered central and northern California with gale force winds, washing out roads and causing landslides, San Diego’s unreal exposure to steady precipitation for more than two hours has led many to accept that the end is, in fact, near. “I’ve never seen anything like it,” said Petty Officer 1st Class Eric James. “Today was the second time in my naval career that I’ve actually prayed. The first time was in boot camp, when I learned that I could leave the barracks if I went to church.” James added: “I stayed home today boarding up my windows and trying to get the generator to work. There’s no way I’d risk driving. San Diegan motorists are conditioned to use highways built for consistent sunshine and the occasional mild drizzle.” The storm, part of the “Pineapple Express” weather system, is expected to break from the coast and swing inland by Friday evening. “I always knew that my life would be at risk when I decided to join the Navy,” said Petty Officer 3rd Class Jeff Miller, who held a candlelight vigil in his barracks room with several close shipmates. “I just never imagined I’d go out like this,” he added. “I always assumed I would drink myself to death.” Even transplants from harsher climes, such as the rest of the United States, expressed unease with the doomsday-like downpour. “No, no, no! Not again!” cried out Chief Petty Officer Andre Allen, a Virginia native who has spent the entirety of his 15-year naval career in San Diego. “I can’t go back to this!” At press time, a momentary lull in the rain had inspired a glimmer of hope and the promise of brighter days to follow, while also inspiring commanding officers to recall everyone back to work for full accountability. Can you help us? We aren't some gigantic media corporation. Duffel Blog is literally just one guy editing a bunch of articles written by military contributors — all on a shoestring budget. If you love what we do, please donate a few bucks to keep our doors open. Even the smallest amount is a big help.
Low
[ 0.48093220338983006, 28.375, 30.625 ]
[High technology in a family perspective]. High technology medicine poses high demands for knowledge and technical competence. In addition, the hospital is expected to represent a model for total care where the "customers" also include family members, eg. parents and children. Both economic and human resources are needed in order to avoid negative after-effects and complications for both patient and family. High technology medicine also raises difficult ethical questions: How much decision-making should be left to parents? These problems are illustrated by clinical examples, and hospital-based ethical committees are suggested as a structure for the further efforts to improve ethical competency at the hospital and to find appropriate solutions for patients and their families in both the long and the short term.
High
[ 0.675191815856777, 33, 15.875 ]
Turkish President Erdogan announced that the EU must accept Turkey as a member to prove that they are not an Islamophobic "Christian club." MOSCOW, January 24 (Sputnik) — Turkish President Recep Tayyip Erdogan announced that if the European Union (EU) is opposed to Islamophobia, it must accept Turkey within its ranks, the Hurriyet Daily News reports. At a press conference during his visit to Djibouti, the Turkish President gave a speech on his opposition to terrorism and mass deaths of Muslims in regional conflicts and civil wars. He announced that Turkey will never tolerate terrorists, who may represent different religions. After this, he sharply changed his rhetoric, focusing on the relations between Turkey and the European Union, according to the publication. "We are testing Europe. Will Europe be able to digest and to accept Turkey, whose people are Muslims? If you oppose Islamophobia, then you must admit Turkey into the EU," he declared, saying that otherwise the EU is a "Christian club," according to Turkish news website Today's Zaman. "Turkey is included in NATO, OECD… And why don't you admit it into the EU? Then, the problem is elsewhere," Erdogan said. "Turkey is a strong country now and it will not come to the EU's door to beg [for membership]." President Erdogan also underscored that if Turkey is not allowed to join the EU, it will follow a different path.
Low
[ 0.460251046025104, 27.5, 32.25 ]
Here at GnomeWatch we are dedicated to ensuring your safety in the presence of—while not malign, still really nosy and rather irritating—gnomes. Gnomes are (mostly) harmless and (mostly) well-meaning, but there is just something about, say, an open tub of cinnamon butter that your average gnome can not resist having a tread through. Yes, that’s where those greasy, cinnamon-scented footprints came from. It’s not their fault—they were born this way! When not trotting through condiments gnomes can usually be found hanging out under a nice leafy clump of hostas in the garden. You’ve been warned.
Low
[ 0.358904109589041, 16.375, 29.25 ]
Tag Archives: UK Food waste is an untapped energy source that mostly ends up rotting in landfills, thereby releasing greenhouse gases into the atmosphere. Food waste is difficult to treat or recycle since it contains high levels of sodium salt and moisture, and is mixed with other waste during collection. Major generators of food wastes include hotels, restaurants, supermarkets, residential blocks, cafeterias, airline caterers, food processing industries, etc. In United States, food waste is the third largest waste stream after paper and yard waste. Around 13 percent of the total municipal solid waste generated in the country is contributed by food scraps. According to USEPA, more than 35 million tons of food waste are thrown away into landfills or incinerators each year, which is around 40 percent of all food consumed in the country. As far as United Kingdom is concerned, households throw away around 8 million tons of food each year. These statistics are an indication of tremendous amount of food waste generated all over the world. Food Waste Management Strategy The proportion of food waste in municipal waste stream is gradually increasing and hence a proper food waste management strategy needs to be devised to ensure its eco-friendly and sustainable disposal. The two most common methods for food waste recycling are: Composting: A treatment that breaks down biodegradable waste by naturally occurring micro-organisms with oxygen, in an enclosed vessel or tunnel; Anaerobic digestion (AD): A treatment that breaks down biodegradable waste in the absence of oxygen, producing a renewable energy (biogas) that can be used to generate electricity and heat. Currently, only about 3 percent of food waste is recycled throughout U.S., mainly through composting. Composting provides an alternative to landfill disposal of food waste, however it requires large areas of land, produces volatile organic compounds and consumes energy. Consequently, there is an urgent need to explore better recycling alternatives. Anaerobic digestion has been successfully used in several European and Asian countries to stabilize food wastes, and to provide beneficial end-products. Sweden, Austria, Denmark, Germany and England have led the way in developing new advanced biogas technologies and setting up new projects for conversion of food waste into energy. Of the different types of organic wastes available, food waste holds the highest potential in terms of economic exploitation as it contains high amount of carbon and can be efficiently converted into biogas and organic fertilizer. Food waste can either be used as a single substrate in a biogas plant, or can be co-digested with organic wastes like cow manure, poultry litter, sewage, crop residues, abattoir wastes, etc. Food waste is one of the single largest constituent of municipal solid waste stream. Diversion of food waste from landfills can provide significant contribution towards climate change mitigation, apart from generating revenues and creating employment opportunities. Rising energy prices and increasing environmental pollution makes it more important to harness renewable energy from food wastes. Anaerobic digestion technology is widely available worldwide and successful projects are already in place in several European as well as Asian countries which makes it imperative on waste generators and environmental agencies in USA to strive for a sustainable food waste management system. Food waste in the United Kingdom is a matter of serious environmental, economic and social concern that has been attracting widespread attention in recent years. According to ‘Feeding the 5K’ organisation, 13,000 slices of crusts are thrown away every day by a single sandwich factory which is featured in the figure above. More recently, Tesco, one of the largest UK food retailers, has published its sustainability report admitting that the company generated 28,500 tonnes of food waste in the first six months of 2013. TESCO’s report also state that 47% of the bakery produced is wasted. In terms of GHG emissions, DEFRA estimated that food waste is associated with 20 Mt of CO2 equivalent/year, which is equivalent to 3% of the total annual GHG emissions. Globally, 1.2 to 2 billion tonnes (30%-50%) of food produced is thrown away before it reaches a human stomach. Food waste, if conceived as a state, is responsible for 3.3 Bt-CO2 equivalent/year, which would make it the third biggest carbon emitter after China and USA. What makes food waste an even more significant issue is the substantially high demand for food which is estimated to grow 70% by 2050 due to the dramatic increase of population which is expected to reach 9.5 billion by 2075. Therefore, there is an urgent need to address food waste as a globally challenging issue which should be considered and tackled by sustainable initiatives. A War on Food Waste The overarching consensus to tackle the food waste issue has led to the implementation of various policies. For instance, the European Landfill Directive (1999/31/EC) set targets to reduce organic waste disposed to landfill in 2020 to 35% of that disposed in 1995 (EC 1999). More recently, the European Parliament discussed a proposal to “apply radical measures” to halve food waste by 2025 and to designate the 2014 year as “the European Year Against Food Waste”. In the light of IMechE’s report (2013), the United Nations Environment Programme (UNEP) in cooperation with FAO has launched the Save Food Initiative in an attempt to reduce food waste generated in the global scale. In the UK, WRAP declared a war on food waste by expanding its organic waste programme in 2008 which was primarily designed to “establish the most cost-effective and environmentally sustainable ways of diverting household food waste from landfill that leads to the production of a saleable product”. DEFRA has also identified food waste as a “priority waste stream” in order to achieve better waste management performance. In addition to governmental policies, various voluntary schemes have been introduced by local authorities such as Nottingham Declaration which aims to cut local CO2 emissions 60% by 2050. Sustainable Food Waste Management Engineering has introduced numerous technologies to deal with food waste. Many studies have been carried out to examine the environmental and socio-economic impacts of food waste management options. This article covers the two most preferable options; anaerobic digestion and composting. In-vessel composting (IVC) is a well-established technology which is widely used to treat food waste aerobically and convert it into a valuable fertilizer. IVC is considered a sustainable option because it helps by reducing the amount of food waste landfilled. Hence, complying with the EU regulations, and producing a saleable product avoiding the use of natural resources. IVC is considered an environmentally favourable technology compared with other conventional options (i.e. landfill and incineration). It contributes less than 0.06% to the national greenhouse gas inventories. However, considering its high energy-intensive collection activities, the overall environmental performance is “relatively poor”. Anaerobic Digestion (AD) is a leading technology which has had a rapidly growing market over the last few years. AD is a biologically natural process in which micro-organisms anaerobically break down food waste and producing biogas which can be used for both Combined Heat & Power (CHP) and digestate that can be used as soil fertilizers or conditioners. AD has been considered as the “best option” for food waste treatment. Therefore, governmental and financial support has been given to expand AD in the UK. AD is not only a food waste treatment technology, but also a renewable source of energy. For instance, It is expected that AD would help the UK to meet the target of supplying 15% of its energy from renewable sources by 2020. Furthermore, AD technology has the potential to boost the UK economy by providing 35,000 new jobs if the technology is adopted nationally to process food waste. This economic growth will significantly improve the quality of life among potential beneficiaries and thus all sustainability elements are considered. When disposing of small electrical items from the home, most householders only have the option of visiting their local recycling facility to drop them off. However, in order to meet recycling targets, local authorities in the UK are now considering kerbside (or curbside) collections of small domestic appliances. This is expected to help prevent small electrical items being placed into the general waste/refuse containers from households. This waste stream has become a priority as figures show that the average amount of WEEE (waste electrical and electronic equipment) recycled per person is only 1.3kg. The original WEEE directive targeted 4kg per person, as a recycling rate, so there is a considerable shortfall. It is important that householders find it easy to recycle their items in order to increase the rates. Initial trials have taken place to assess the viability of these kerbside collections and the following conclusions were made: On collections, small electrical items were often damaged, so the reuse of items was less likely. Levels of recycling were encouraging at 140 grams per household. The monetary value of the separated materials of the small items showed that a positive net value could be achieved. Whilst the potential reuse of small electrical items was reduced it was a positive that local authorities could generate revenues from the collections. Quarterly or bi-annual collection frequencies would ensure volumes of equipment on the collections were maximised. Due to the success of the trials, the UK is likely to see more and more local authorities adopt some form of collection schedule for small electrical waste items. An old refrigerator uses almost four times the electricity of a new one Larger electrical items such as washing machines and fridge freezers pose a different collection issue. Some local authorities offer a collection service for bulky electrical items, however due to their size, weight and manpower requirements there is often a charge. As with smaller electrical items, you can deliver these to the local recycling facility, but you may not be able to fit these into your own vehicle. It is best to check with the local recycling facility on the options available and possibly even if they allow large, commercial sized vehicles onto site. The collection of small electrical items from householders will ultimately increase the amount of electrical waste being recycled in the UK. It will also further promote the recycling of such items instead of placing them into general waste containers. Going forward it is hoped that more local authorities will adopt a collection schedule even if only bi-annually from their local householders. By 2075, the United Nations estimates the global population will peak at 9.5 billion, an extra 3 billion mouths to feed by the end of the century. Meanwhile, while we produce about four billion tonnes of food annually, it is estimated that 30-50% of this never reaches our plates. Of the food that does reach us, some western societies throw away up to a third of all food purchased. This has enormous implications for the global environment, from wasting the water used to grow the food to adverse effects on climate, land and biodiversity. The drivers behind these phenomenal levels of food waste are complex and include food pricing, logistical and storage issues. However, given the significant level of waste that happens within the households of societies like the UK and US, it is useful and informative to consider those behaviours that drive this level of waste. The quality of data around food waste, as with much of waste data, has historically been poor. To this end, WRAP commissioned groundbreaking research in the UK in 2006/7 to act as a baseline to their Love Food Hate Waste campaign. This came up with the alarming statistic that 1/3 of food bought by a UK household was thrown away. Until this time, there had been no comprehensive research, either by food manufacturers, retailers or interest groups, suggesting the importance of government, or some other dis-interested party, taking a lead on the issue. Back to Basics There may be a link between the amount of time spent preparing food, and the skill and effort that goes into this, and the amount of food waste produced. This has led to a loss of confidence in the kitchen, with individuals losing basic skills that allow them to cook with leftovers, understand food labeling, including Best Before and Use By, even basic storing. WRAP had found little evidence of best practice storage advice so carried out the research themselves – leading the (surprising for many) conclusion that fruit such as apples and pears are best stored in the fridge wrapped in a plastic cover. However, this has masked a larger trend of less time spent in the kitchen, due to demographic changes. This of course begs the question – how should we use this when trying to reduce food waste? Should we encourage people to cook from scratch as a principle? Although waste prevention and recycling are clearly separated within the waste hierarchy, there are apparent links between the two when considering food waste. There is an urgent need for legislation to enforce separate food waste collections, not only to ensure it was diverted to anaerobic digestion or composting, but also as it led to greater self awareness around food waste. WRAP research has clearly showed a fall in food waste when separate food waste collections were introduced. Role of Packaging Historically, packaging has always been a high priority to the public when asked about priorities for reducing waste. However, as awareness of food waste has grown, a more nuanced position has developed among waste managers. While excess packaging is clearly undesirable, and, within the UK for instance, the Courtauld Commitment has helped reduced grocery packaging by 2.9 million tonnes of waste so far, there is a realization of the importance of food packaging in preserving food and hence reducing food waste. Making food easily accessible and affordable by many, it could be argued, is one of the crowning achievements of our age. Over the last century, the proportion of household income that is spent on food has plummeted, and there is a direct link to malnutrition and food prices, particularly for children. But does cheap food mean that it is less valued and hence greater wastage? Is the answer expensive food? The evidence from WRAP in the UK is that food waste is still a serious economic issue for households, and underlining the economic case for reducing food waste a major incentive for households, especially as food prices are not entering an era of increase and instability, providing added economic urgency Political Persuasions Different political persuasions often differ in the approaches they take to changing behaviours and food waste is no different. In the UK, the Courtauld Commitment is a voluntary agreement aimed at encouraging major retailers to take responsibility mainly for packaging, later growing to encompass food waste, voluntary and so far has seen a 21% reduction in food waste post-consumer. Meanwhile Wales (in the UK) effectively banned food waste from landfill. Scotland has ensured that businesses make food waste available for separate collection – again it’s only once you see it, you can manage it. Campaigns like the UK’s Love Food Hate Waste have been successful but measuring food waste prevention, as with all waste prevention, is notoriously difficult. But, people are now widely aware of food waste as an issue – we even see celebrity chefs actively talking about food waste reduction and recipes involving leftovers or food that is about to go off. There is clearly a balance between food waste and food safety, with a commitment to reducing food waste throughout the retail and catering world, not just at home. By engaging environmental health officers to help deliver this, a potentially conflicting message can be delivered in a nuanced and balanced way. Indeed, environmental health officers in Scotland will be responsible for ensuring that Scottish food businesses present their food waste for separate collection. Role of Communication It is worth considering how the message should be communicated, and by whom. The community sector are more trusted by the public than government and the private sector are more effective at imparting personal, deeply held beliefs – the sort of beliefs that need to change if we are to see long term changes in attitudes towards consumption and hence waste production. Furthermore, communications can engage wider audiences that hold an interest in reducing food waste that is perhaps not primarily environmental. The health and economic benefits of issues and behaviours that also result in food waste prevention may be the prevalent message that fits with a particular audience. So whilst the main aim of a training session might be food waste prevention, this is may not be the external message. And this has wider implications for waste prevention, and how we engage audiences around it. Municipal authorities tasked with waste prevention will need to engage with new groups, in new ways. They will have to consider approaches previously considered to be beyond their powers to engage new audiences – should they be partnering with public health authorities with an interest in nutrition, or social housing providers that are focused on financial inclusion. Should waste prevention even be a discipline in itself? After all, across material streams it is a motley assortment of behaviours with different drivers. Furthermore, with the knots that one can tie oneself in trying to measure waste that doesn’t get generated, – therefore doesn’t exist – should we integrate waste prevention in to other socio-economic programmes and position it as an “added benefit” to them? Note: The article is being republished with the permission of our collaborative partner be Waste Wise. The unabridged version can be found at this link. Special thanks to the author Mike Webster. There has been a flurry of activity in the biomass energy and waste-to-energy sector in recent year, with many new projects and initiatives being given the green light across the globe. This movement has been on both a regional and local level; thanks to the increased efficiency of green energy generators and a slight lowering in implementation costs, more businesses and even some homeowners are converting waste-to-energy systems or by installing biomass energy units. Latest from the United Kingdom Our first notable example of this comes from Cornwall in the UK. As of this week, a small hotel has entirely replaced its previous oil-based heating system with biomass boilers. Fuelled from wood wastes brought in from a neighboring forest, the BudockVean hotel has so far been successful in keeping the entire establishment warm on two small boilers despite it being the height of British winter – and when warmer weather arrives, plans to install solar panels on the building’s roof is to follow. Similar projects have been undertaken across small businesses in Britain, including the south-coast city of Plymouth that has just been announced to house a 10MW biomass power plant (alongside a 20MW plant already in construction). These developments arein part thanks to the UK government’s Renewable Heat Incentive which was launched back in 2011. The scheme only provides funding to non-domestic properties currently, but a domestic scheme is in the works this year to help homeowners also move away from fossil fuels. Initiatives (and Setbacks) in the US Back across the pond, and the state of New York is also launching a similar scheme. The short-term plan is to increase public education on low-emission heating and persuade a number of large business to make the switch; in the longer term, $800m will be used to install advanced biomass systems in large, state-owned buildings. A further $40m will be used as part of a competition to help create a series of standalone energy grids in small towns and rural areas, which is a scheme that could hopefully see adopted beyond New York if all goes well. Unfortunately, the move away from fossil fuels hasn’t been totally plain sailing across the US. Georgia suffered a blow this week as plans to convert a 155MW coal plant to biomass have been abandoned, citing large overheads and low projected returns. The company behind the project have met similar difficulties at other sites, but as of this week are moving ahead with further plans to convert over 2000MW of oil and coal energy generation in the coming years. Elsewhere in the US, a company has conducted a similar study as to whether biomass plant building will be feasible in both Florida and Louisiana. Surveying has only just been completed, but if things go better than the recent developments in Georgia, the plants will go a long way to converting biomass to fertilizer for widespread use in agriculture in both states. Far East Leading the Way One country that is performing particularly well in biomass energy investment market is Japan. Biomass is being increasingly used in power plants in Japan as a source of fuel, particularly after the tragic accident at Fukushima nuclear power plant in 2011. Palm kernel shell (PKS) has emerged as a favorite choice of biomass-based power plants in the country. Most of these biomass power plants use PKS as their energy source, and only a few operate with wood pellets. Interestingly, most of the biomass power plants in Japan have been built after 2015.. On the contrary, the US and Europe saw a fairly big fall in financing during this period; it should be noted, however, that this relates to the green energy investment market as a whole as opposed to biomass-specific funding. The increase seen in Japan has been attributed to an uptake in solar paneling, and if we look specifically to things such as the global demand for biomass pellets, we see that the most recent figures paint the overall market in a much more favorable light for the rest of the world. Brighter Times Ahead All in all, it’s an exciting time for the biomass industry despite the set backs which are being experienced in some regions. On the whole, legislators and businesses are working remarkably well together in order to pave the way forward – being a fairly new market (from a commercially viable sense at least), it has taken a little while to get the ball rolling, but expect to see it blossom quickly now that the idea of biomass is starting to take hold. The Earth is facing a climate crisis, as the burning of fossil fuels to generate electricity and power our cars overloads the atmosphere with carbon dioxide, causing a dangerous atmospheric imbalance that’s raising global temperatures. A report from the UN’s Intergovernmental Panel on Climate Change (IPCC) released earlier this month cautioned that the planet has just 12 years to dramatically curb greenhouse gas emissions, by overhauling our energy systems and economies and likely, our societies and political systems. Even a half degree rise beyond that would cause catastrophic sea level rises, droughts, heat, hunger, and poverty, spelling disaster for our species. UK’s Commitment to Climate Change Mitigation The UK government has committed to reducing carbon emissions by 80% of 1990 levels by 2050, a process that will involve overhauling our energy supply, which is responsible for 25% of greenhouse emissions in the country, just behind transport (26% of all emissions). But it may be too little too late. The government has already said it is reviewing these targets in light of the IPCC report and in the spring began consulting on a net-zero carbon emissions target for 2050. But despite these dire prognoses and the enormity of the task facing us as a species, there’s reason to be optimistic. The UK has already managed to cut greenhouse gas emissions by 43% on 1990 levels, with much of the reduction coming from a 57% decline in emissions from energy generation. This is in part thanks to several providers offering you the chance to have a 100% renewable domestic energy supply. Reduction in Coal Usage The use of coal has plunged nearly overnight in the UK. In 2012, 42% of the UK’s electricity demand was met by coal. Just six years later, in the second quarter of 2018, that figure had fallen to just 1.6%. Emissions from coal-fired power stations fell from 129 million tonnes of CO2 to just 19 million tonnes over the same period. A coal-free Britain is already on the horizon. In April 2017, the UK logged its first coal-free day since the Industrial Revolution; this past April we extended the run to 76 consecutive hours. In fact, in the second quarter of 2018, all the UK’s coal power stations were offline for a total of 812 hours, or 37% of the time. That’s more coal free hours than were recorded in 2016 and 2017 combined and in just three months. When the UK does rely on coal power, it’s primarily to balance supplies and to meet demand overnight and during cold snaps, such as during the Beast from the East storm in March. The UK is so certain that coal is a technology of the past, that the government has plans to mothball all seven remaining coal-fired power stations by 2025. Share of Renewables in Energy Supply The decline in coal has been matched by an explosion in renewable energy, particularly in wind power. In the second quarter of 2018, renewables generated 31.7% of the UK’s electricity, up from under 9% in 2011. Of those, wind power produced 13.3% of all electricity (7.1% from onshore turbines farms and 6.2% from offshore wind farms), biomass energy contributed another 11% of the UK’s electricity, solar generated 6% and hydro power made up the rest of renewables’ pie share. The UK’s total installed renewables capacity has exploded, hitting 42.2GW in the second quarter of 2018, up from under 10GW in 2010. That includes 13.7GW of onshore wind capacity and 7.8GW of offshore wind capacity—a figure which will get a boost with the opening in September of the world’s largest wind farm, the Walney Extension, off the coast of Cumbria, itself with a capacity of nearly 0.7GW. Solar panels contributed another 13GW of renewable capacity, and installed plant biomass infrastructure reaching 3.3GW. However, while renewables are transforming electricity generation in the UK, our energy system consists of more than simply electricity. We also have to account for natural gas and the use of fuel in transport, and renewables have made fewer in roads in those sectors. The UK is meeting just 9.3% of its total energy needs from renewable sources, short of the 15% it has earmarked for 2020 and far behind its peers in the EU, where Sweden is already running on 53.8% renewable energy. Conclusion Emissions are dropping overall in the UK, largely due to an ongoing revolution in electricity generation and a decisive move away from coal. But these reductions have concealed stagnant and even increasing levels of greenhouse gas emissions from other sectors, including transport and agriculture. Our transition to a sustainable economy has begun but will require more than wind farms and the shuttering of coal-fired power stations. It must encompass electric vehicles, transformed industries, and ultimately changing attitudes toward energy and the environment and our responsibility toward it. Waste management is an important tool for curbing climate change and for keeping our environment clean and healthy. Methane generated from biodegradable wastes is a powerful greenhouse gas, and when it’s not captured and used as a fuel it contributes to rapid warming of the atmosphere. Estimates suggest that biodegradable waste in dump sites and uncapped landfill sites are contributing far more methane to the atmosphere than previously thought. What’s more, urban food waste is predicted to increase by 44% from 2005 to 2025, and with no proper management in place, will significantly add to global greenhouse gas emissions. Worryingly, 38 of the world’s 50 largest dumps are close to the sea, contributing to marine and coastal pollution. The accumulation of plastics in the marine food chain is causing global concern. While we don’t yet know how to clean the oceans, stemming the flow of waste into marine environments would be a step in the right direction. Wasted health 40% of the world’s waste ends up in open dumps. These aren’t even what you’d call “landfill”. They don’t have any impervious lining to prevent noxious leachate from entering the surrounding environment, nor are they capped to prevent the spread of disease. In fact, in India, the Philippines and Indonesia, the health risk from open dumping of waste is greater than the risk of malaria[i]. 3.5 billion people in the world lack access to proper waste management. That figure is expected to grow to 5 billion by 2050. Respiratory diseases, gastrointestinal diseases and occupational health risks add to the misery experienced by the 50,000+ people living from open dumps. Waste is any material that is no longer wanted for its original purpose. The owner doesn’t have a need for it, and so discards it. Even valuable items can and do end up as waste purely because someone has thrown them away. The recent (and rather brilliant) BBC programme Hugh’s War on Waste shone the spotlight on attitudes towards disposable fashion. A look through the bins of a typical street uncovered a startling amount of clothing that had been thrown away, despite it still being in perfectly good condition. This highlights a simple fact: there is plenty of value in waste. Estimates suggest there are 40 million people globally who are making their living from waste – half of these are working informally. During the last recession in the UK, the waste management sector was one of the only industries to keep growing, resulting in it being termed the “Green Star of the Economy”. Showing people how to turn a waste stream into something valuable isn’t rocket science. There are lots of examples of informal, community-based, grassroots recycling and upcycling projects that generate wealth for the poorest in society. Internet is allowing simple waste processing techniques to be replicated all over the world, and helping make that information accessible is one of the most fulfilling aspects of my career. Business skills “Give a man a fish and he can eat for a day. Show a man how to fish and he can eat for the rest of his life.” Teaching people how to make valuable products from waste is important. But just as important, is passing on the business skills to be able to identify a market, factor in costs, check out the competition, market their products and run a successful business. Development work in the waste arena needs to address both sides of the coin, and in doing so will enable people to start up their own businesses, in their own communities, and generate wealth organically. That’s far more valuable than delivering aid in a ready-made package (which incidentally rarely works – there’s a great TED Talk on this topic by Ernesto Sirolli, called “Want to help someone? Shut up and listen”). Why closing dumps isn’t a silver bullet The proliferation of megacities, particularly in developing countries, is causing a health crisis. Decent waste management is an indicator of good governance – that is, if a council or government can collect taxes and provide a waste management service, then it most likely isn’t (very) corrupt. However, in many places where corruption or other forms of bad or weak governance prevail, top-down solutions are notoriously difficult to implement. Often, when the world’s attention turns to an open dump, the government responds by closing it and the journalists go home. This is what happened with Smokey Mountain dumpsite in the Philippines (and many others around the world). All that happens is another open dump emerges nearby, and the scavengers move to the new site. The problem is that if there is no alternative solution in place, people will discard of their waste in the only ways available – dumping it or burning it; and the poor will follow the waste. Replacing an open dump with a government-controlled waste management system isn’t a silver bullet either. The losers, again, are the hundreds, and sometimes thousands of men, women and children who live from scavenging from the dump. It may seem horrific to many of us, but the truth is that if you take that opportunity to earn a paltry living away from the poorest in society, they will starve. Solutions need to be inclusive. Power to the people To close dump sites, you need to have a workable alternative solution in place. You need to have regular waste collection taking place, and you need somewhere to take it. Building materials recovery facilities alongside existing open dumps is one idea. Informal waste pickers who are currently working in dangerous conditions on the dumpsite can gain employment (or better still, form a cooperative) sorting recyclable materials and reducing the amount of real “waste” that needs to be disposed of. For example, Wecyclers in Lagos, Nigeria employs people to cycle around collecting recyclable materials from households. In return for their source-separated waste, the householder receives a small reward. In Bangalore, IGotGarbage has harnessed the power of phone apps to enable people who were previously waste pickers to be called directly to a house to collect the waste materials. Solutions like this work because they continue to provide livelihoods for people, while taking waste off the streets. The need for appropriate technology There will always be something left though: the stuff that really has little value other than the energy embodied in it. In industrialised countries, energy-from-waste incinerators have become popular. Seen as a clean alternative to landfill, these facilities burn the waste, release the energy, and convert it into heat, electricity and ash. Some of that ash (from the air pollution control system) still needs to be disposed of in specially-prepared hazardous waste landfill sites. The remainder, being fairly benign, can be used to make concrete building blocks. However, incinerators are fairly technology-heavy, rendering them unsuitable for many developing country contexts. A problem that we’ve witnessed is that waste management companies from industrialised nations try to wholesale their technology in developing countries. The technology is usually unaffordable, and even if the capital can be raised to procure a facility, as soon as something breaks down the whole solution can fall apart. There is a need for information about simple waste processing technologies to become more open-sourced. Smart future-thinking businesses could capitalise on selling blueprints rather than entire prefabricated facilities. Most of the time it’s far cheaper to fabricate something locally, and also means that when something breaks it can be fixed. The continuing need for landfill The fact is that in most cases, a standard, lined landfill site with landfill gas capture is still the most appropriate answer for non-recyclable waste. Add to that a well-organised, low-cost waste collection service with source separation of recyclable materials and biodegradable waste, and you have a relatively affordable solution that is better for the climate, better for health, better for the local economy, and contributes to a more sustainable future. Landfill may seem very unfashionable to those of us who work in the recycling sector, but nevertheless it will remain a necessity both in developed and developing countries for the foreseeable future. Joining forces and stepping stones The success of the Sustainable Development Goals and potential Climate Change Agreement depend on developed and developing countries working together. Miguel Arias Cañete, the EU climate commissioner, said the Climate Coalition alliance showed that developed and developing countries could work together with a common interest. “These negotiations are not about them and us. They are about all of us, developed and developing countries, finding common ground and solutions together. We urge other countries to join us. Together we can do it.” Necessity is the mother of invention, and we are facing a waste crisis of unprecedented proportion. The potential for waste management in reducing GHG emissions has never been more pertinent. Waste and development practitioners, academics and entrepreneurs around the world are working together more and more to help bring about the change we want to see, which will benefit the billions of people suffering from poor waste management, and the rest of us who share a warming planet – and share the burden of climate change and poverty. By sharing knowledge through platforms such as beWasteWise and ISWA, and through initiatives like WasteAid, WASTE and Wiego, we can start making a dent in this very large problem. No silver bullets, but lots of small stepping stones in the right direction. Note: The original and unabridged version of the article can be found at this link. Please visit http://zlcomms.co.uk/ for more information about the author. Food waste is a global issue that begins at home and as such, it is an ideal contender for testing out new approaches to behaviour change. The behavioural drivers that lead to food being wasted are complex and often inter-related, but predominantly centre around purchasing habits, and the way in which we store, cook, eat and celebrate food. Consumer Behavior – A Top Priority Consumer behaviour is a huge priority area in particular for industrialised nations – it is estimated that some western societies might be throwing away up to a third of all food purchased. The rise of cheap food and convenience culture in recent years has compounded this problem, with few incentives or disincentives in place at producer, retail or consumer level to address this. While it is likely that a number of structural levers – such as price, regulation, enabling measures and public benefits – will need to be pulled together in a coherent way to drive progress on this agenda, at a deeper level there is a pressing argument to explore the psycho-social perspectives of behaviour change. Individual or collective behaviours often exist within a broader cultural context of values and attitudes that are hard to measure and influence. Simple one-off actions such as freezing leftovers or buying less during a weekly food shop do not necessarily translate into daily behaviour patterns. For such motivations to have staying power, they must become instinctive acts, aligned with an immediate sense of purpose. The need to consider more broadly our behaviours and how they are implicated in such issues must not stop at individual consumers, but extend to governments, businesses and NGOs if effective strategies are to be drawn up. Emergence of Food Waste Disposers Food waste disposer (FWDs), devices invented and adopted as a tool of convenience may now represent a unique new front in the fight against climate change. These devices, commonplace in North America, Australia and New Zealand work by shredding household or commercial food waste into small pieces that pass through a municipal sewer system without difficulty. The shredded food particles are then conveyed by existing wastewater infrastructure to wastewater treatment plants where they can contribute to the generation of biogas via anaerobic digestion. This displaces the need for generation of the same amount of biogas using traditional fossil fuels, thereby averting a net addition of greenhouse gases (GHG) to the atmosphere. Food waste is an ideal contender for testing new approaches to behaviour change. The use of anaerobic digesters is more common in the treatment of sewage sludge, as implemented in the U.K., but not as much in the treatment of food waste. In addition to this, food waste can also replace methanol (produced from fossil fuels) and citric acid used in advanced wastewater treatment processes which are generally carbon limited. Despite an ample number of studies pointing to the evidence of positive impacts of FWDs, concerns regarding its use still exist, notably in Europe. Scotland for example has passed legislation that bans use of FWDs, stating instead that customers must segregate their waste and make it available curbside for pickup. This makes it especially difficult for the hospitality industry, to which the use of disposer is well suited. The U.S. however has seen larger scale adoption of the technology due to the big sales push it received in the 1950s and 60s. In addition to being just kitchen convenience appliances, FWDs are yet to be widely accepted as a tool for positive environmental impact. Note: Note: This excerpt is being published with the permission of our collaborative partner Be Waste Wise. The original excerpt and its video recording can be found at this link Pet waste is a growing public health and environmental risk. According to a report commissioned by the Pet Food Manufacturers’ Association, 13 million UK households (45%) keep pets of some kind. Cats and dogs are each kept by 8.5 million households (these numbers are not additive, as some will of course keep both). Can those of us who want both the joys of animal companionship and waste minimisation, find ways to cut down, or better manage, the huge amount of pet waste generated in the UK every year? With so many cats and dogs in the UK, pet waste must represent a significant mass of organic matter within the residual waste stream. Does this waste represent a floater in the residual waste stream by necessity—due to inherently unpleasant and possibly dangerous characteristics of the waste—or is it only there out of convention and squeamishness? I’ve written before about the relationship between waste management and squeamishness, and talking about faeces really brings the point home. There are some undoubtedly nasty pathogens present in pet faeces, notably the parasites Toxocariasis and Toxoplasmosis. But might these be safely killed off by the temperatures reached in anaerobic digestion (AD)? If so, provided any litter and bags were made of organic matter, might pet waste be collected along with food waste? I began by contacting a local authority waste officer, but was told that no one had asked this question before, and that I might be better off talking to AD plant operators. This I did, but most seemed similarly baffled by my query. However, one mentioned that AD digestate goes through a pasteurisation process, where it is heated to a temperature of 70oC for one hour, in order to make it safe for land application. I also attempted to contact some technical specialists in the field, but to no avail. There are some theoretical indications that this pasteurisation should be sufficient. Hanna Mizgajska-Wiktor and Shoji Uga’s essay Exposure and Environmental Contamination states: “Anaerobic waste treatment kills Toxocara spp. eggs at temperatures in excess of 45oC”, well below the 70oC mentioned by my operator. The susceptibility of Toxoplasma to heat is less clear, although numerous internet sources suggest this can be killed in meat by cooking at 66oC. So far, then, I haven’t confirmed or falsified my initial inkling, and so the collection of pet waste in the municipal organic stream remains a theoretical possibility. Motivated dog owners can already turn their pet’s waste into a resource within their own home. The website London Worms explains how you can turn your dog’s poo into rich and useful vermicompost, although it warns that the results will only be suitable for use on non-edible plants. Foul Pay Household pet droppings may still be largely fated for disposal, but even when binned this waste is at least moving through proper waste management channels. Unfortunately, not all pet poo is binned, and we have real data measuring public perceptions of the disamenity resulting from dog fouling. For most, the presence of this unwelcome waste in our streets, parks and footpaths is of much higher concern than its diversion from landfill. A 2011 Defra-funded study on local residents’ willingness-to-pay — via an increase in council tax — for improvements across a range of environmental factors found that dog fouling was the third most important issue out of the presented range (with litter and fly-tipping taking first and second place). Surveys were conducted in inner-city, suburban and rural/semi-rural areas around London, Manchester and Coventry. In order to move from the current level of dog fouling to the best possible scenario, it was found that inner-city residents would on average be willing to pay £8.87 per month, suburban residents £7.79 per month, and rural residents £2.72. Combining these figures with population statistics allows us to place a disamenity value on dog fouling. National statistics only allow for an urban-rural split, but based on a 2012 Defra rurality study which found that 18.9% of the population lives in rural areas, we can calculate that across England we would collectively be willing to pay £462m per year to achieve best case scenario improvements in dog fouling. This somewhat crude calculation gives an indication of the perceived disamenity of dog fouling. Presenting the matter in terms such as these may allow economically minded policy makers a means of engaging with this important street scene issue and evaluating the costs and benefits of interventions. Food for Thought Let’s wash our hands of poo (with plenty of soap and warm water) and look to the other end of the pet waste problem. According to a report published by WRAP, the UK uses around 75,000 tonnes of primary packaging annually. This holds 1,263,000 tonnes of wet and dry cat and dog food, of which 9,000 uneaten tonnes are thrown away. Although this wasted food constitutes less than 1% of the total sold (if only we were as careful with food for human consumption) the estimated cost to the consumer is still £21m a year. WRAP examined a number of designs intended to cut to down on the amounts of both pet food and packaging thrown away. A major problem with packaging design is the need to account for portion sizes, which vary from animal to animal and change depending on age and level of activity. Single serve packaging may actually lead to regular food wastage if the portion provided is too big for a particular pet; indeed, this is a problem I am experiencing with my own cat, whose appetite seems to fluctuate wildly. Re-sealable packaging that allows owners to dish out meals in accordance with the changing appetites of their pets is therefore preferable. The material that packaging is made of is also significant: for example, relatively heavy tins are recyclable, whereas lightweight plasticised plastic foil packets are not. Pet food and its packaging can be pushed up the waste hierarchy by simply choosing a recyclable and resealable container which will allow them to adequately provide for the appetite of their pet. However, these issues are likely to be given less weight compared with health, convenience and cost in the minds of most householders. The onus has to be on manufacturers to develop packaging which is both low cost and easily recyclable. Love pets, hate waste? People love animals, but are rather less keen to engage with pets as an environmental issue. Leaving aside questions of whether it is sustainable for so many of us to have pets at all, there are clearly ways in which we can reduce their impact. The convenience of single serving pouches of pet food seems to win out over more recyclable and waste-avoiding alternatives, although pet owners might be willing to change their choices if presented with a better option. While worrying about recovery options for cat poo might seem somewhat academic, it may be easier to tackle than dog fouling. It might even help to tackle the common psycho-social root of both issues. Cultural distaste perhaps lies behind the lack of information available on dealing with household pet waste, and the persistence of dog fouling as a street scene issue. Things were very different in Victorian London when “pure finders” earned a living by seeking out doggie doo to supply the tanning trade. But for us this kind of waste is a disagreeable fact of life which we deal with as simply and with as little thought as possible. But as a nation of animal lovers, it’s our responsibility to engage with the waste management issues our pets present. Note: The article is being republished with the kind permission of our collaborative partner Isonomia. The original article can be viewed at this link
Mid
[ 0.5863636363636361, 32.25, 22.75 ]
Using a creative teaching process with adult patients. Because the patient or caregiver must manage healthcare needs after the nurse has left the home, patient education is an important component to home health nursing (Rice, 1996). Fortunately, patient teaching is ideal for home healthcare. To make the most of the home learning environment with adult patients, the nurse must assess, design, develop, implement, and evaluate an individualized patient teaching plan. Throughout the ADDIE process, the nurse manipulates and integrates the home environment to maximize the possibility that the patient will accept, remember, and apply the information presented. Taking into account how adults learn, the nurse provides relevant problems and situations for the patient to practice newly acquired knowledge and skills. The instruction presents learners with alternatives to their current ways of thinking, behaving, and living (Brookfield, 1986). Given the information and the tools needed to regain a sense of control and experience life safely, within their abilities of medical illness or injury, informed adult patients are likely to experience fewer complications and enhanced self-esteem. For pertinent, timely, and personal healthcare instruction, there is no place quite like home.
High
[ 0.6756032171581771, 31.5, 15.125 ]
Sogn og Fjordane is a county in West Norway. Sogn og Fjordane borders Hordaland in south, Møre og Romsdal in north. And Oppland and Buskerud to the east. This county sits in the centre of Norway's famous western fjords, and it also home to the longest and deepest fjord in Europe. Deeper fjords are found in Antarctica only. Unlike great fjords of Greenland and Antarctica, these fjords are easily accessible by train and car. Sogn og Fjordane is the part of Norway most dominated by fjords and glaciers. The majestic Sognefjord cuts through the southern section right to the alpine Jotunheimen mountains, while romantic Nordfjord cuts through the northern part to Jostedalsbreen glacier. Between are several other fjords. This is the least urbanised part of Norway. There are hardly any towns and some areas only have tiny villages. The area is very mountainous, about 50 % of the area is around 1000 meters above sea level or more. Road construction is extremely difficult and long stretches of fjords are untouched by roads. A couple of main roads allow relatively fast transport through the county. Sogn og Fjordane is characterized by its many fjords, of which the Sognefjord, with a length of 204 km (127 mi), is the longest fjord in Europe (although not the longest in the world as claimed in some tourist brochures). The fjord systems in this county is complex and mountains rise directly from fjord making land transport challenging. Nærøyfjord an arm of Sognefjord is together with Geirangerfjorden listed as a UNESCO World Heritage Site. North of Sognefjord there are two shorter fjords, Dalsfjord and Førdefjord. North of those you will find Nordfjord, which is 106 km (66 mi) long. The geography of the county is very varied and complex, featuring high mountain peaks, islands, and glaciers (including the Jostedalsbreen glacier, the largest glacier in continental Europe), gorge-like valleys, lovely lakes and some of the world's tallest waterfalls. Because of the very fragmented landscape settlement and roads are largely confined to narrow spots such as low valleys and shores. Sogn og Fjordane is deer land. Sogn og Fjordane is also home to Norway's largest population of red deer ("hjort"). Often seen along roads at dusk or dawn, particularly in spring. People speak a Norwegian dialect. There is a vast variety of dialects, even in single municipalities there may be several. Nynorsk is the official form of writing in all municipalities. This writing form differs from Bokmål Norwegian written in urban areas and East Norway, and is more similar to the dialects spoken on the west coast. Most people speak English, and many also have some knowledge of German. Sogn og Fjordane has only one railway line, the railway between Myrdal and Flåm, which is a great scenic ride, and a big tourist atraction. Myrdal is a station on the Oslo-Bergen line. A train journey from Oslo to Myrdal and then to Flåm, is an interesting way to enter Sogn og Fjordane. There are two high-speed catamaran services from Bergen operated by Norled. One runs from Bergen up the coast and into the Sognefjord, ending in Flåm. The other runs up the coast of Sogn og Fjordane, ending in Selje at the border with Møre og Romsdal. Hurtigruten (Norwegian Coastal Steamer) calls Florø and Måløy. E39 is the major route from Bergen. From north on E39, from Ålesund. E16 (or the more scenic road 50) from Oslo to southern Sogn og Fjordane. Road 15 is a good road from Oslo to northern Sogn og Fjordane. Route 55 from Lom to Sogndal is a beautiful scenic drive over the highest mountain pass in Norway, 1440 m (4724 ft) above sea level. Because of sparse population public transport is limited. The entire county is covered, although departures are scarce. However with some planning it is possible to experience Sogn og Fjordane by bus. Schedules for all http://www.ruteinfo.net/en/[dead link] public transportation can be found on internet]. Schedules covering all public transportation can be found on ferries, buses, bus stations and tourist information offices. These schedules are however only found in Norwegian. But they can be deciphered in the following way: On top of each row in the schedule some letter and numbers are found. This tells which day this route is operated. D=daily, numbers is days of the week (1=monday, etc), x means except (Dx7 means every day except sunday). Schedules on a grey background are operated only in winter(mid Aug-mid Jun), schedules on a red background are operated only during summer. Express passenger boats ("hurtigbåt") operates like buses on water. Trips must often be pieced together by combining boat and bus service. For some connections car ferries are useful also for travelers without car, for instance the sightseeing ferry Gudvangen-Kaupanger. The easiest way to explore Sogn og Fjordane is by car, since the public transportation is not so good, and the distances are long, and some attractions is only possible to reach by car. The main south-north route is E39. Route 5 runs mainly east-west from Sogndal to Skei and all the way to the coast in Florø. Route 13 goes from Balestrand over the mountain to Førde. The fjords are generally possible to cross only by car ferries. These ferries depart 1-2 times per hour, crossing time is typically 10-25 minutes, and need no prebooking. They have fees, often between 50-100 NOK. Car ferries are generally not a separate means of transport as most docks are often in remote places far from towns and villages. Cycling is nice way to experience the rugged nature of western Norway. Unpredictable weather, many tunnels, narrow roads (without shoulder) and steep hills at mountain passes does however make bicycle travel more challenging than most other places. The bicycle tourist should read maps carefully to understand what tunnels are not recommended or in fact illegal for bicycles. New tunnels often replace an old road that remains open to bikes. Some tunnels, such as Høyanger tunnel on road 55, does not have an old road alternative and bicycles are not allowed in the tunnel. Car ferries and passenger boats are nice ways to avoid tunnels and unpleasant roads such as E16 Gudvangen-Flåm. 61.4627.8751Jotunheimen (Road 55 (and/or Tindevegen road to Årdal)). Western part of Norway's highest mountains are in Luster and Årdal districts. These are also the wildest part of Jotunheimen, steep summits and sharp ridges. 61.07786.56764Hopperstad Stave Church (Hopperstad Stavkyrkje), Vik (2 km (1 mi) from Vik village.), e-mail: [email protected]. Built around 1140, one of the most elaborate of Norway's ancient stave churches, set in picturesque Vik village. Astruptunet at Jølster lake near Skei, the home of painter Nikolai Astrup (1880-1928). In his own particular style Nikolai Astrup captured the feeling of West Norway's landscape and Jølster in particular. "Astrup does that rare thing: he makes landscape painting seem fresh and alive again.", Astrup remained too long in Edvard Munch's shadow (The Telegraph). 61.56134.77055Kinn island and church (Kinn) (By boat, west of Florø). A small island, one of the western most points in Norway, only a handful of residents but with the oldest church in the area. The church is masonry building from the 12th century. Unusually rich interior. (updated Mar 2016) 62.0475.3136Selje abbey ruins (Selje kloster). Selje Abbey (Selje kloster) was a Benedictine monastery on the island of Selja near Stad penninsula. The abbey was founded around year 1100. At the time one of Norway's 3 bishops resided at Selje (the others were in Oslo and Trondheim), the bishop shortly after moved to Bergen. The monastery was abandoned before the 1537 protestant reformation. (updated Mar 2016) 62.1883335.1258337West cape (Vestkapp (Mt Kjerringa at Stadlandet)). West cape is a panorama point at Stad peninsula (Stadlandet), the northwestern corner of Sogn og Fjordane. This peninsula has some of the roughest weather in Norway and one of the few places where the shipping lane is totally unprotected by islands. Fine panorama in all directions. (updated Mar 2016) There are many oportunities for an active holiday in Sogn og Fjordane. Many scenic routes for trekking in the mountains can be found with breathtaking views from many mountaintops. Fishing in the sea or in lakes is a favourite with many tourists. 61.0127.3312Aurland mountain road (Snow road, Aurlandsfjellet), Aurland-Lærdal. Summer only. This road climbs the steep hills to the mountain pass (1300 meters) between Aurland and Lærdal villages. Replaced by the world's longest tunnel in 2000. Maintained as one of Norway's national tourist routes. Magnificent panorama. Snow may fall even in summer.Free. 61.5177.8263Sognefjellet mountain pass (Sognefjellsvegen), Road 55 from Skjolden. Summer only. Norway's highest mountain pass runs pass Norway's highest mountains in Jotunheimen with view to summits and glaciers. On the eastern side through Bøverdalen valley to Lom village. The road is closed in winter, opens about May. Steep ascent and descent, sharp corners. Cross country skiing is possible until June.Free. 60.8466.7345Nærøydalen and Nærøyfjorden, Road E16 Voss-Gudvangen (Car or bus). All year (boat daytime only). Main road E16 runs through the wild Nærøydalen valley with incredibly steep rock faces and some of the world's tallest waterfalls, at Gudvangen the valley joins the Nærøyfjorden UNESCO-listed fjord landscape. Sightseeing boat on fjord. Kayaking possible. 61.65137.27656Glacier walking on Jostedalsbreen (car or bus). Summer only. Easiest hiking is on Nigardsbreen arm of the great Jostedalsbreen. But arms also stretching to Fjærland and Olden. Caution: Do not walk on your own, go with guide. Tap water is drinkable and often of very good quality. Olden is bottled water, the source of which is the glacier Jostedalsbreen. It is sold as natural water (In Norwegian: Uten kullsyre), or as carbonated water (In Norwegian: Med Kullsyre). The crime rate in Sogn og Fjordane is low. But even so, common sense applies. Visitors should stay a generous distance away from glaciers. Hiking on glaciers can only be done with a guide and proper equipment. Be careful around waterfalls. Along the very coast, Atlantic waves are treacherous. Fjords and lakes are very deep and very cold most of the year. Glaciers are one of the most dangerous places for visitors to the Norwegian outdoor. Never underestimate the power of the glacier. Observe warning signs. Never approach the front of the glacier. A glacier is not a stable piece of ice, it is constantly moving and huge chunks regularly fall of. Do not enter a glacier without proper equipment and a skilled local guide. Sunrays get reflected from the white snow, so it necessary to use sunscreen to protect your skin. Bring warm clothes for tours on the glacier.
Mid
[ 0.627634660421545, 33.5, 19.875 ]
Taiwan ranked 10th most innovative nation NEW YORK--Taiwan topped the global rankings in patent activity and was ranked as the 10th most innovative nation in the world and the fourth most innovative in Asia, according to the Global Innovation Rankings released by Bloomberg on Thursday. According to Bloomberg, the patent activity category looked at resident patent filings per million residents and per US$1 million of research and development spent, as well as patents granted as a share of the world's total. In addition to patent activity, Taiwan finished second in high-tech density and tertiary efficiency in the Bloomberg innovation rankings. The high-tech density category calculated the number of high-tech publicly listed companies as a percentage of all listed companies. The United States came in first. The tertiary efficiency category measured the number of secondary graduates enrolled in post-secondary institutions and the percentage of the labor force with tertiary degrees. The category, in which Canada was ranked first, also looked at the annual number of science and engineering graduates as a share of the labor force and as a percentage of all tertiary graduates. In addition to the three categories, the Bloomberg global innovation rankings weighed four other factors: R&D density, productivity, researcher concentration, and manufacturing capability. The rankings evaluated more than 200 countries and regions based on the seven factors. South Korea came in first in the overall innovation rankings but did not lead in any of the seven categories, according to Bloomberg. Sweden was ranked the second most innovative nation in the world ahead of the United States, Japan, Germany, Denmark, Singapore, Switzerland, Finland and Taiwan. Taiwan, however, has been unable to translate its edge in patent activity into national competitiveness because the patents are not "core" enough, the Ministry of Economic Affairs (MOEA) said Friday. Wang Mei-hua, head of the MOEA's Intellectual Property Office, said Taiwan applies for an average of 20,000 patents a year in the United States. "So it's not surprising that Taiwan's number of patents tops the world," Wang said after Bloomberg ranked Taiwan first in the world in patent activity in its Global Innovation Ranking. Taiwan was also ranked as the 10th most innovative nation overall in the world and the fourth most innovative in Asia, behind South Korea, Japan and Singapore. Most of Taiwan's patents, however, generally only improve on the ideas of others and are not the "basic patents" with pioneering ideas that can generate higher incomes, Wang told reporters.
High
[ 0.6860158311345641, 32.5, 14.875 ]
Signal detection and threshold models of source memory. Recently, several authors claimed that the curvilinear shape of rating-based source memory receiver operating characteristics (ROCs) refutes threshold models. However, rating-based ROCs are not diagnostic to disprove threshold models. Furthermore, source memory ROC-analyses ignore influences of other processes like old-new-detection and old-new-response-tendencies, so direct estimation of parameters is preferable. Five source monitoring experiments with different response bias manipulations and materials were conducted. We fitted the Two High Threshold Multinomial Model of Source Monitoring by Bayen, Murnane, and Erdfelder (1996) and the Multivariate Signal Detection Model for Selection DeCarlo (2003). We also included rating-based ROCs. The results suggest that both models are at least equally valid as measurement tools which capture bias processes in the corresponding parameters, and they can perhaps be integrated theoretically.
High
[ 0.6966618287373001, 30, 13.0625 ]
A local turkey hunter survived a bizarre encounter with a bobcat during opening day of Missouri's turkey season Monday. The hunter, from Clever, was using a turkey call to lure birds in. His turkey call was so good it fooled a large male bobcat, which pounced on the hunter, leaving a wound to the back of his head. Conservation agent Jeff Harris filed this report, which the News-Leader obtained through a Sunshine Request: "Hunter was calling turkeys on his property," Harris wrote. "He felt a crash on his shoulder and head as if he was being attacked. He fought it off and turned and a bobcat was standing a few feet away. He was caught off guard and shot the bobcat. He sent pictures of a puncture wound to the back of his head. I made contact and issued a disposition for the bobcat that is a big tom. I advised him to contact the health department if he wants to get the bobcat tested for rabies." Hunting news: Ozarks lawmaker looks to reopen public lands to feral hog hunting, defying MDC The hunter declined to be interviewed because he has received backlash on social media for killing the bobcat and posting photos of it on his Facebook page. The post has been removed. MDC spokesman Francis Skalicky said the hunter did everything right by immediately calling the conservation department and reporting that he had killed the bobcat. "This is an odd thing that sometimes happens," Skalicky said. "The bobcat thought the hunter was a turkey. Whatever sound he was making was good enough that it fooled the bobcat." More: Young hunters bagged more wild turkeys than last year's youth weekend
Low
[ 0.485148514851485, 30.625, 32.5 ]
The A-League finally has a new big-name star after Melbourne Victory confirmed the signing of Keisuke Honda to put an end to weeks of will-he-won’t-he speculation. The 32-year-old, who has scored in the last three World Cups and boasts 37 goals in 98 games for Japan, arrives in Australia thanks to financial support from the $3m marquee fund set up by Football Federation Australia and Fox Sports. In something of a coup for Victory, the former AC Milan and CSKA Moscow player becomes the A-League’s most globally-recognised star since his compatriot Shinji Ono, Alessandro Del Piero, Emile Heskey and David Villa played in Australia during the 2013-14 season. Just how close is Australia to being suspended by Fifa? | Jonathan Howcroft Read more Honda is expected to land in Melbourne next week and, while he was surprised to hear of Victory’s interest a week after Japan were knocked out of World Cup in Russia, he said Victory’s reputation and the passion of coach Kevin Muscat were enough to convince him to make the move. “My brother is my agent and he told me after the World Cup that Melbourne Victory was interested in me,” Honda told Fox Sports. “I couldn’t believe it because I am Japanese and I never thought I’d play in Australia in my career. “Melbourne Victory is the most successful club in the A-League over the last 13 years I think that’s amazing. They became champion many times. I’m proud of these kind of clubs. Also the manager Kevin [Muscat], he’s a really nice guy. When I talked to him he has big big passion. I love it. That’s a reason also why I decided to play with the club.” Honda made a name for himself at Nagoya Grampus in the J-League before securing a move to Europe with VVV-Venlo in the Netherlands. Five seasons in Moscow followed, before he pricked the attention of AC Milan who snapped him up on a free transfer at the beginning of 2014. Then came a move from San Siro to Pachua in Mexico, where he scored 10 in 29 games. “We’re honoured he’s chosen to join our club this season,” said Victory chairman Anthony Di Pietro, while FFA CEO, David Gallop, called the signing a “significant boon” for the upcoming A-League season. “To have a player of his experience, calibre and marketability will also boost the Hyundai A-League’s image and reputation within the Asian region and around the world,” said Gallop. Honda’s ability in the final third helped Japan win the Asian Cup in 2011, when he was named the tournament’s most valuable player. “It goes without saying that Keisuke has consistently proven himself at the highest level and we can’t wait to see what he can do in Melbourne,” said Muscat. Honda is set to take his A-League bow in the opening round of the new season, when Victory play City in the Melbourne derby at Marvel Stadium.
Mid
[ 0.646370023419203, 34.5, 18.875 ]
Impact of the inflammatory microenvironment on T-cell phenotype in the progression from reflux oesophagitis to Barrett oesophagus and oesophageal adenocarcinoma. The incidence of oesophageal adenocarcinoma (OAC), arising from reflux-induced Barrett oesophagus (BO), is increasing dramatically. T-cells have recently been implicated in the initiation of oesophagitis; however, their role in the progression from oesophagitis to BO and OAC has not been fully elucidated. Previous studies have examined the secreted cytokines from oesophageal tissue during disease progression but this study is the first to examine the activation phenotype and the inflammatory profile of CD4(+) and CD8(+) T-cells in human oesophagitis, BO and OAC tissue. Results demonstrated significantly higher levels of IL-4 producing CD4(+) T-cells and secreted levels of IL-6, confirming a Th2 phenotype in BO. In OAC tissue, both pro- and anti-inflammatory cytokines were secreted, with significantly higher levels of IL-6, IL-1β, TNF-α, IFN-γ, IL-2 and IL-10 compared with normal oesophageal tissue. In addition, CD4(+) T-cells infiltrating OAC tissue displayed a decreased activation profile, with significantly lower CD45RO and CD69 expression compared with normal tissue. Data from this study suggest that factors in the tissue microenvironment may alter T-cell phenotype and function early during oesophageal disease progression and may represent targets for immune intervention.
High
[ 0.6982408660351821, 32.25, 13.9375 ]
#!/usr/bin/gnuplot # compare SPH shock output with exact solution plot 'dump.3d.last' u 3:6, "exact_solution.dat" w l pause -1
Low
[ 0.49546827794561904, 41, 41.75 ]
The Advantages and Disadvantages of Single-Sign-On (SSO) Technology (mini-whitepaper) Overview Single-Sign-On (SSO) is a user-authentication process, in which the user signs in to one screen name, and it makes multiple applications or websites unlocked or logged-in. Usually, the system will have conditional measures that will know what a certain user has access to, permissions, etc., and be able to provide the services. Now, the question brought to attention is, what are the advantages and disadvantages of single-sign-on? Advantages In the healthcare industry, it could be booming with single-sign-on. If a doctor were to need to sign-on to a database to access a patient’s files, he/she would also have to access x-rays, and other data that would be on a different application. Having a single-sign-on for all that would be life-saving and totally worth it. Not only that, but hours of saved time. Apps such as OneLogin provide easy-access to tons of accounts across the board, particularly social media. It says on their site that they are supporting “identity & access management for the cloud”. Could work wonders for those with disabilities. Having a disability may limit you from typing a lot of words at one time, or typing fast enough. If a single-sign-on system were in place, one login means much saved time. Reduces the chance of forgetting your password. By having your one-set master password, it will be a lifesaver to not have to remember a ton of passwords. Reduces IT help desk costs, by reducing the number of calls to the help desk about lost password. Newer technologies are being implemented to help detect the attempt to hack a certain system, in which it would lock out the hacker from the remaining systems. But, this has more studying to prove how good it works. Disadvantages The lacking of a backup stronger authentication, such as smart cards or one-time password tokens. The SSO is a highly-critical tool to keep up always. If the SSO goes out, the user would lose access to all sites. It would be critical to have a good password, one that is very hard to crack. With the reduction of accounts, particularly the fact that SSO is in play, it’ll be easier to find and hack accounts. Once the SSO account is hacked, all others under that authentication are hacked as well. SSO is bad news for a multi-user computer, especially if the user stays logged in all the time. This is more prevalent of an issue in plant operations, business floors, etc. where multiple users can access the computer (if the original user left their desk). Examples of current implementations Conclusion Overall, the usage of SSO systems are good and bad. Based on your organization or personal life, it is your choice on whether to use it or not. Based on how potentially problematic it may be, you will have to be on your toes about a lot of it. But, I guess the time you save trying to figure out or remember your passwords, you can spend on staying guard for SSO systems.
High
[ 0.6700767263427111, 32.75, 16.125 ]
The biggest organ in the human body is, unsurprisingly, your skin. It covers every inch of your body and is the organ most exposed to external dangers. The sun, pollution, even your own beauty routine can all cause damage to your skin that may not be
Low
[ 0.5017543859649121, 35.75, 35.5 ]
I am as horrified by Donald Trump as any post-Bronze Age member of Homo sapiens, but I am never surprised by him. And let’s not pretend he’s any different from the rest of the GOP 2016 field. Today, the political world is aghast because Trump said that “for now,” Muslims should be barred from entering the country. That’s awful, of course. But let’s remember that mere days ago, Jeb Bush, Ted Cruz, and other “mainstream” Republican candidates were saying that the U.S. should only help the Christians among the Syrian refugees. This is not only a no-Muslims policy, it’s a Christians-only policy. How is this less awful than what Trump is saying today? If anything, it’s worse. It’s not only saying that one group is on the outs, it’s saying that there is only one group of people worthy of compassion at a time of utterly desperate need. (And this doesn’t even begin to address the lunacy of Lindsey Graham, who Dave Weigel at the Post just referred to as a “moderate,” who is maniacally obsessed with total war with large swathes of the Islamic world.) Jeb, Cruz, Rubio, they all like to contrast themselves with Trump to show themselves as somehow above his demagoguery. But be it on this issue, or on many, many others such as women’s rights, LGBT rights, and even acceptance of scientific facts of existential importance, when it comes to what they themselves say they believe, they are all Trumps. They just suck at it. I always believed that Trump would be a real contender for the nomination, even when the press laughed him off. Every time he’s said something awful, about Mexicans, Muslims, women, it’s presumed that it will be the beginning of the end for him, and every time I’ve said, actually, no, this is exactly what the GOP electorate wants to hear. And every time, he’s solidified his base and built on it. The only recent exception is Ted Cruz topping a new poll in Iowa (for whatever Iowa polls are worth), and let’s be honest, Ted Cruz is Trump with an elected office and a smarmier face. Trump is the GOP. He may not be what the plutocrats who bankroll the party want the GOP to be, he may not be what the Family Research Council wants the GOP to be, but it is what it is. These other candidates are just as cynical, just as backward, just as eager to feed off of the fear and hate of the electorate. They’re just not nearly as good at it. Except Cruz. He’s really good at it. Watch out for that bastard.
High
[ 0.6716417910447761, 33.75, 16.5 ]
Taking control of the subscriber terminal is useful in some situations, such as in a situation where criminals are using the subscriber terminal for communication. Only government authorized personnel may perform such operations.
Low
[ 0.5267857142857141, 29.5, 26.5 ]
This book covers the long history, from its origins through to the present day, of the historic Italian manufacturer Beta Motorcycles, active in the two-wheeled world for over 100 years, presenting previously unpublished material. A particularly versatile firm, over the decades Beta Motorcycles has proved capable of diversifying its products – building all kinds of motorcycle – and satisfying the mutating demands of its clientele. The Florentine marque built its own two- and four-stroke engines in-house, but has always been open to joint ventures with other European or Japanese firms.Founded as a bicycle manufacturer, Beta Motorcycles moved into the moped market in the 1960s, off-road motorcycles in the late 1970s, enduro models in the following decade and then scooters, for over 20 years, not to mentions the Trial sector in which it conquered eight World Championship titles. In more recent years the company has returned to the “classic” Motocross and Enduro categories and in 2016 collected a further two world titles, including the Constructors’ Championship. The book features a comprehensive catalogue of every model and every engine produced by Beta Motorcycles during the course of over a century.
High
[ 0.675062972292191, 33.5, 16.125 ]
Children and core-periphery differences. This study examines the differences between children's (0-15 yr of age) use of primary care services in core and peripheral municipalities in Uusimaa province in southern Finland following the implementation of the Primary Health Care Act (1972). In the ecological study (municipality-based), children's total use of primary health care services during 1973-1979 was continuously lower in peripheral municipalities than in core areas in spite of the Primary Health Care Act, the express purpose of which was to reduce regional differences. Some equalization of utilization of private practitioners occurred during this period. The individual-based study material collected in 1979 enabled us to control for the influences of (1) distance to the core of the municipality, (2) age of the child, (3) socio-economic status of the family, (4) type of visit and (5) diagnosis. These factors somewhat modified the influence of the core/periphery dichotomy, but the overall picture that children in the core use more primary health care services remained the same. This suggest that health care policy should be quite specific and based on detailed regional analysis, if equalization between core and peripheral municipalities is to be achieved.
Mid
[ 0.6469248291571751, 35.5, 19.375 ]
If you're the parent of a very young child around toddler age, you may be watching—or listening to—the child's speech development like a hawk. These years can be a bit nervewracking because you want to catch any speech or language disorders before they get too entrenched. At the same time, though, you want the child to learn language organically, discovering what gets a good reaction and what gets puzzled looks. There are some sounds that are naturally more difficult than others, though, and they naturally take a longer time for most children to master. However, they too can serve as good signposts of your child's development. Difficult Sounds Sounds that get confused like "r" and "w," or "s" sounds that are lisped instead of properly pronounced, can make the child's speech sound oddly mushy or hard to understand. But it's common for even preschool-age children to have some issues with these sounds, so if your toddler is saying "wabbit" instead of "rabbit," you really should not be worried yet. Once your child starts to get into preschool and kindergarten, though, these pronunciation issues can begin to resolve. If they persist at that age, though, then an evaluation by a speech pathologist is a good idea. One thing you can try on your own is finding a model of the human mouth in cutaway form showing all the articulators—the teeth, tongue, palate, and other parts of the mouth that contribute to sound. You can try forming games to show your child how everything moves around to create certain sounds and see if the child can imitate them. For example, "s" is generally pronounced with the front part of the tongue (just behind the tip of the tongue) close to but not touching the alveolar ridge, the bony protrusion behind the front teeth. Have the child try to imitate that, moving the tongue backwards and forwards until he or she achieves the sound. Treat it as a game, though, and don't show impatience or anger if the child doesn't get it. This is simply practice, not a test. Legal Variations Some sounds have multiple correct ways of being made. "Th" is one of these sounds; you can pronounce it either with the tip of the tongue placed between the top and bottom teeth, or with the tip of the tongue placed just behind the top teeth. Which one you use is a matter of preference, so if your child appears to be using a different placement than the one you use, that's not necessarily a bad thing as long as the sound is being produced correctly. Hesitancy Stuttering is a speech and language condition that many people look out for early on, but some hesitation (or disfluency, which is another term you might hear) in toddlers isn't always cause for alarm. They're still trying to figure out how all this speech stuff works, and they may be unsure about the sounds they're trying to make. You may hear them draw out a sound and look kind of confused at the same time. But the hesitancy can quickly turn into stuttering; if your child reaches preschool age and is still doing this, then that's a sign he or she should see a speech pathologist or language therapist. One of the best things you can do is remain calm and just observe how the child's language is doing over time. Obviously, take action if the child is past the age where the sounds should be a problem. But don't try to force the child to pronounce sounds like adults early on. If you're truly concerned, talking to an early childhood development specialist (like those at Northside Center) may help. About Me I am passionate about helping people of all ages succeed in their educations. I raised four children and really learned about the educational system over the years, although it changes often. When my oldest was ready to go to college, he asked me what college would be best for him, and I remember feeling very overwhelmed with the decision due to not knowing much about today's colleges. I asked friends and neighbors for advice, and I was very lucky that they were able to help me give him great advice. I know that not all parents know how to answer their children's questions about school, college, and learning in general, so I thought I would make a blog to pass on what I have learned over the years during my children's educations and what I have learned from others. I hope I can help you help your child!
Mid
[ 0.6510416666666661, 31.25, 16.75 ]
Practical and Helpful Tips: Clothing Belts are essential accessories in the men’s wardrobe. Not unless a man is wearing a belt they will always fell like they are halfway dressed. The belt should not be considered as just a piece of cloth or leather that is used to secure a man’s pant. They can also be used as an accessory. Women are very wild about their shoes and purses while men are wild about their belts. The most important thing a man can do is choosing the right belt. While a man is choosing the right belt they should consider the size of the belt. It has always been a myth that a man should choose a belt that is the same size as his waste. Most men who deal with men’s accessories will tell you most men buy belts that are large or even larger than their waists. You can take an example where if the size of a man’s waist is 34 they can buy a belt which is size 36 or 38. Most don’t like belts that are too big because they will look too bulky when they are tucked into the loops of their pants. Whenever you are choosing a large belt to make sure it does not go beyond the second loop of your trousers. The belt should be long enough such that it will fit you properly. When you buckle your belt on the first hole it will look so small and when you buckle it on the last hole it will look so big, the best place to buckle your belt is at the middle hole for it will look fitting. A man should carefully the width of the belt when he is considering getting one. When a man is dressed up in either official al casual the belt should be two inches wide or wider. A belt that is one or one and a half inches wider will do very well for a formal occasion wear. While choosing the width of your belt it is important to consider the loops of your pants. Look for a belt that will not touch the loops of your pants or a belt that seem lost on the loops of the pants. Checking on the price of the belt is very important. A man should consider his budget when choosing a belt. The belt will look obvious when it is very expensive when put on together with clothes that are not expensive. Your expensive jeans will look cheap once it is put on with a cheap belt. Style is another feature that a man should look for while choosing a belt. A brown or black belt will be ideal for everyday wear and for an event a printed belt will do.5 Takeaways That I Learned About SalesA Simple Plan: Accessories
Mid
[ 0.652777777777777, 35.25, 18.75 ]
Steep switchbacks form the basis of the following advice but the principle is the same for any steep section. Switchbacks an increasingly common occurrence on our trails. From the steep, twisty singletrack in the Alps to the snaking black routes of Wales or Scotland, they seem to crop up everywhere. Dictated by the steep terrain they’re built on, switchbacks often seem pretty intimidating obstacles, with narrow exits and precipitous drops on one side. Although it’s not usually too difficult to negotiate them slowly, carrying speed and staying in balance is often a real challenge. A lack of rider confidence is often the biggest mistake. So, these five steps will show you a few simple tips to use next time you’re tackling one head-on. Approach This is the part you really want to get right. Keep your head up and have a look at the trail ahead. In our sequence, you can see the right hand turn looks quite far away. But, by spotting it from a few metres back, you should be able to get yourself over to the outside of the trail, ready for the corner. This is the opposite side to what you might think! Most of your braking should be done now. Getting high Now that you are on the outside, you can start your switchback. To get up the bank easily, think of it as an off-camber section. It’s always easier to go up rather than along an off-camber, and by starting on the outside of the trail, you’re in the perfect place to look left and head straight up. If the bank is steep, drop your outside (downhill) foot to get more pressure on the edge of the tyres. Lead from the front Your front wheel will lead the way. A great tip at this point is to allow your front wheel to go higher or wider than the back. On steep switchbacks, your back wheel may not even leave the main line, but as long as the front is wide you’ll be able to get around even the tightest of bends. Speed can also dictate this part. If you’re coming in really slow, there won’t be enough speed to get your whole bike onto the high line. So just let the front go for it and relax. Getting grippy Once your front wheel is sufficiently wide, look down into the corner, let go of the brakes and start transferring your weight onto the other leg. In this case, the weight goes from the right leg to the left. As the bike starts to accelerate off the bank, put more weight onto your outside pedal (don’t brake!) to keep the grip coming. You’ll probably find that the steeper and tighter the corner is, the further down your outside foot is. Look to the finish With the boost in speed you’ll have, keep looking to the exit. The exit is the point where things often go wrong. Don’t worry about the drop off the edge of the trail. Instead, focus your attention on where you want to end up. Just by looking where you want to go, and not over the edge, you’ll probably find that your confidence to stay off the brakes and keep all that speed you just made will grow.
High
[ 0.6744186046511621, 36.25, 17.5 ]
[Risk factors of novel severe influenza A(H1N1) with concurrent adult respiratory distress syndrome]. To analyze the risk factors of novel severe influenza A (H1N1) with concurrent adult respiratory distress syndrome (ARDS). A multivariable Logistic regression analysis was conducted for ARDS risk factors in controlled clinical trials for comparing the clinical features between the ARDS and non-ARDS groups and comparing ARDS patients' lymphocyte counts and T lymphocyte subsets between the smoking and non-smoking groups through a retrospective analysis of 92 novel influenza A (H1N1) patients who admitted to our hospital from October 2009 to January 2010. Through a single factor analysis between ARDS and non-ARDS groups, the comparisons in the factors including smoking (17 cases vs 11 cases), T lymphocyte subsets, lactate dehydrogenase (LDH), initial treatment point of oseltamivir and initial oxygen flow greater than 2 L/min (28 cases vs 18 cases) had statistically significant differences (all P<0.05). The comparison in T lymphocyte subsets had statistically significant difference between the smoking and non-smoking groups in ARDS patients (all P<0.05). The multivariable Logistic regression analysis showed that smoking (P=0.027, OR=8.05, 95%CI: 1.28-50.80) and initial oxygen flow greater than 2 L/min (P=0.010, OR=16.70, 95%CI: 3.29-84.84) were relevant to the incidence of ARDS in novel influenza A (H1N1) patients. Smoking and initial oxygen flow greater than 2 L/min were the risk factors of novel severe influenza A (H1N1) with concurrent ARDS.
High
[ 0.7031019202363361, 29.75, 12.5625 ]
In the lead-up to a three-month closure of six stations along the Washington, D.C., Metrorail system this summer, agencies across the federal government have offered a wide variety of messages to their employees about how to handle potential commuting challenges. The Office of Personnel Management last Monday urged agencies to allow their employees to use telework, alternative work schedules and other flexibilities throughout the course of the summer Metro closures, which are scheduled to run from May 25 through Sept. 8. “Individual agencies are best positioned to determine the impact that the project will have on their workforce and to provide guidance to their employees on potential workplace flexibilities that may be available,” acting OPM Director Margaret Weichert wrote in a May 20 memo. “Workplace flexibilities made available during the project will assist agencies in retaining their workforce during this time period and will provide stewardship of taxpayer dollars by maintaining continuity of operations.” Yet one day after Metro’s platform improvement project kicked off this month, at least one agency implemented a new limit on telework for some of its employees. The Department of Health and Human Services’ Office of the Assistant Secretary for Health (OASH) “notified the National Treasury Employees Union that effective in the pay period beginning May 26, employees would be limited to one day of telework per week, regardless of their previous telework agreements,” national President Tony Reardon said in a statement to Federal News Network. “OASH cites the the Federal Service Impasses Panel decision as the basis for its new policy requiring employees to work in the office at least four days a week.” OASH has about 110 bargaining unit employees. HHS first announced its intention to limit telework to one day a week for employees in OASH in October, according to guidance from David Mansdoerfer, deputy assistant secretary for management and operations. The guidance is dated Oct. 18, 2018 and indicates it would be fully implemented Jan. 1, 2019. NTEU, however, said it wasn’t notified until May of this year of OASH’s plans to implement the new telework policy starting May 26. HHS didn’t respond to requests for confirmation or clarification about its telework policy for OASH employees. The changes in telework policy come after the Federal Service Impasses Panel (FSIP) ruled on 22 proposals from both the agency and the union this spring. The panel’s decision rewrote much of the existing HHS-NTEU collective bargaining agreement, including an article on HHS’ employee telework policy. Specifically, the FSIP said HHS could set an “expectation” that employees report to their official worksite for a minimum of four days a week. The panel said it viewed HHS’ proposal as one that simply set the expectation that employees should telework no more than one day a week — but it wasn’t a requirement. “The decision by OASH leaders to pursue the most limited telework policy possible is both illegal and unfortunate, especially for a workforce that has demonstrated that telework is an effective tool to improve productivity and recruit and retain skilled employees,” Reardon said. OASH’s telework limitation is also “problematic” because the union and department haven’t agreed to terms for all bargaining articles, the union said. From NTEU’s perspective, the two parties have unfinished business with their collective bargaining agreement. HHS, however, has previously told Federal News Network it would begin implementation of its new contract with NTEU. Reardon last week sent letters to leadership at HHS, IRS, the Environmental Protection Agency, Customs and Border Protection and the Bureau of Fiscal Service to encourage them to explore more flexibilities for employees during the summer Metro closures. HHS hasn’t yet contacted NTEU about plans to allow additional flexibilities during the summer Metro closures, the union said. The department didn’t immediately respond to a request for more details about its plans to handle potential commuting challenges for its employees this summer. No changes to USDA telework policy According to recent guidance from the Agriculture Department, which Federal News Network obtained, USDA’s telework policy remains in place throughout the course of the summer. The department began limiting telework to one day a week for employees last year, a move that didn’t sit well with many employees. “Because the Metro platform improvement project is temporary, changes to core telework agreements are not anticipated,” guidance from USDA’s Office of Human Resource Management reads. “USDA’s telework directive remains in effect and no changes to USDA’s telework policy are being made. USDA’s telework directive envisions situations where situational telework may be required, but these should be rare.” USDA is, however, “strongly encouraging” subcomponents to approve employee leave requests throughout the summer. “USDA recognizes that these closures can impact individual employee commutes,” the guidance reads. “Therefore, agencies are strongly encouraged to work with their employees on identifying alternative work schedule options that will meet the mission and the employee’s needs.” In addition, the department wants individual agencies to collect information about the number of employees who are impacted by summer Metro closures so USDA can “evaluate ongoing needs for flexibility.” Other agencies push more telework, alternative work schedules Meanwhile, federal employee unions are trying to work with other agencies to secure flexibilities during the summer Metro closures. The American Federation of Government Employees last Friday filed a demand to bargain with the Education Department over this particular topic. Because both parties never agreed for a formal, signed collective bargaining agreement, AFGE can’t compel the department to work with the union to secure additional telework or flexible work schedules, an AFGE spokesman said. Education last spring announced it would end bargaining negotiations with AFGE and instead said it would implement a series of new terms that described how the department would interact with the union and its bargaining unit employees. The document eliminated a wide variety of previously-agreed-to articles on telework and employee training, to name a few. Education limited telework to one day a week for employees starting last October. At the time of publication, AFGE said it hadn’t yet heard whether Education would agree to bargain with the union over additional workplace flexibilities. Unions have fared better with other agencies. Reardon said NTEU and the U.S. Patent and Trademark Office have reached an agreement that would temporarily expand telework for employees impacted by the Metro disruptions. NTEU said it was also encouraged by steps the Nuclear Regulatory Commission said it would take to work with employees ahead of the summer Metro closures. An internal employee announcement from NRC leadership on May 23 encouraged employees to not only plan for extra commuting time to and from work but also consider the agency’s flexible scheduling tools and request telework or additional project-based telework, David Castelveter, an NRC spokesman said. “We also encourage supervisors to closely consider, in their review of employee requests … ways to improve the employee’s commuting challenges, as long as the employee can effectively accomplish his or her work,” he said in an email to Federal News Network.
Low
[ 0.50566037735849, 33.5, 32.75 ]
He poured the coffee Into the cup He poured the milk Into the cup of coffee He put the sugar Into the coffee with milk With a small spoon He stirred it He drank the coffee And he put down the cup Without speaking to me He lighted a cigarette He made circles With the smoke He put the ash Into the ashtray Without a word Without looking at me He got up He put a hat on his head He put on his raincoat As it was raining And he left Into the rain Without speaking to me Without looking me And I put My head into my hands And I cried. "Stopping by Woods on Snowy Evening" By Robert Frost "He gives his harness bells a shake To ask if there is some mistake. The only other sounds a sweep Of easy wind and downy flake." I'm Back By Eminem "Sorry Puff but I don't give a **** if this chick was my own mother, Id still **** her with no rubber and cum inside her and a son and a new brother at the same time, and just say that it aint mine" I am weak Looking to get stronger When I open my eyes all the way It's all there is for me Kindness is strength It's easier to close a door, than to keep it open Hatred is easy Frustration is life on pause These are truths that are hard for me to deal with I learned a lot this year I think I am stronger than last year Self-creation is painful Trying to take my parent's blood out of mine Trying to stand on my own two feet Without leaning on someone else Looking to myself for total strength To be One From None Henry Rollins O CAPTAIN! my Captain! our fearful trip is done; The ship has weather'd every rack, the prize we sought is won; The port is near, the bells I hear, the people all exulting, While follow eyes the steady keel, the vessel grim and daring: But O heart! heart! heart! O the bleeding drops of red, Where on the deck my Captain lies, Fallen cold and dead. O Captain! my Captain! rise up and hear the bells; Rise up--for you the flag is flung--for you the bugle trills; 10 For you bouquets and ribbon'd wreaths--for you the shores a-crowding; For you they call, the swaying mass, their eager faces turning; Here Captain! dear father! This arm beneath your head; It is some dream that on the deck, You've fallen cold and dead. My Captain does not answer, his lips are pale and still; My father does not feel my arm, he has no pulse nor will; The ship is anchor'd safe and sound, its voyage closed and done; From fearful trip, the victor ship, comes in with object won; 20 Exult, O shores, and ring, O bells! But I, with mournful tread, Walk the deck my Captain lies, Fallen cold and dead. Walt Whitman If you were exchanged in the cradle and your real mother died without ever telling the story then no one knows your name, and somewhere in the world your father is lost and needs you but you are far away. He can never find how true you are, how ready. When the great wind comes and the robberies of the rain you stand on the corner shivering. The people who go by-- you wonder at their calm. They miss the whisper that runs any day in your mind, "Who are you really, wanderer?"-- and the answer you have to give no matter how dark and cold the world around you is: "Maybe I'm a king." I've read everything Charles Bukowski ever wrote, This is the best of them all. That man is a legend. Let It Enfold You either peace or happiness, let it enfold you when I was a young man I felt these things were dumb, unsophisticated. I had bad blood, a twisted mind, a precarious upbringing. I was hard as granite, I leered at the sun. I trusted no man and especially no woman. I was living a hell in small rooms, I broke things, smashed things, walked through glass, cursed. I challenged everything, was continually being evicted, jailed,in and out of fights, in and out of my mind. women were something to screw and rail at, I had no male freinds, peace an happiness to me were signs of inferiority, tenants of the weak an addled mind. but as I went on with my alley fights, my suicidal years, my passage through any number of women-it gradually began to occur to me that I wasn't different from the others, I was the same, they were all fulsome with hatred, glossed over with petty greivances, the men I fought in alleys had hearts of stone. everybody was nudging, inching, cheating for some insignificant advantage, the lie was the weapon and the plot was empty, darkness was the dictator. cautiously, I allowed myself to feel good at times. I found moments of peace in cheap rooms just staring at the knobs of some dresser or listening to the rain in the dark. the less I needed the better I felt. maybe the other life had worn me down. I no longer found glamour in topping somebody in conversation. or in mounting the body of some poor drunken female whose life had slipped away into sorrow. I could never accept life as it was, i could never gobble down all its poisons but there were parts, tenous magic parts open for the asking. I re formulated I don't know when, date, time, all that but the change occured. something in me relaxed, smoothed out. i no longer had to prove that I was a man, I did'nt have to prove anything. I began to see things: coffee cups lined up behind a counter in a cafe. or a dog walking along a sidewalk. or the way the mouse on my dresser top stopped there with its body, its ears, its nose, it was fixed, a bit of life caught within itself and its eyes looked at me and they were beautiful. then- it was gone. I began to feel good, I began to feel good in the worst situations and there were plenty of those. like say, the boss behind his desk, he is going to have to fire me. I've missed too many days. he is dressed in a suit, necktie, glasses, he says, 'I am going to have to let you go' 'it's all right' I tell him. He must do what he must do, he has a wife, a house, children. expenses, most probably a girlfreind. I am sorry for him he is caught. I walk onto the blazing sunshine. the whole day is mine temporailiy, anyhow. (the whole world is at the throat of the world, everybody feels angry, short-changed, cheated, everybody is despondent, dissillusioned) I welcomed shots of peace, tattered shards of happiness. I embraced that stuff like the hottest number, like high heels, breasts, singing,the works. (dont get me wrong, there is such a thing as cockeyed optimism that overlooks all basic problems just for the sake of itself- this is a shield and a sickness.) The knife got near my throat again, I almost turned on the gas again but when the good moments arrived again I did'nt fight them off like an alley adversary. I let them take me, i luxuriated in them, I bade them welcome home. I even looked into the mirror once having thought myself to be ugly, I now liked what I saw,almost handsome, yes, a bit ripped and ragged, scares, lumps, odd turns, but all in all, not too bad, almost handsome, better at least than some of those movie star faces like the cheeks of a baby's butt. and finally I discovered real feelings of others, unheralded, like lately, like this morning, as I was leaving, for the track, i saw my wife in bed, just the shape of her head there (not forgetting centuries of the living and the dead and the dying, the pyramids, Mozart dead but his music still there in the room, weeds growing, the earth turning, the toteboard waiting for me) I saw the shape of my wife's head, she so still, I ached for her life, just being there under the covers. I kissed her in the, forehead, got down the stairway, got outside, got into my marvelous car, fixed the seatbelt, backed out the drive. feeling warm to the fingertips, down to my foot on the gas pedal, I entered the world once more, drove down the hill past the houses full and empty of people, I saw the mailman, honked, he waved back at me. I'm just saying there's all sorts of shit i could be doing! I could watch a movie, play a video game, rub one out, read a book, learn a foreign language, etc.. But i'm still watching the assholes because i love them, and I hate myself
Mid
[ 0.55291576673866, 32, 25.875 ]
<?php use yii\helpers\Html; use yii\helpers\Url; use yii\helpers\StringHelper; use yii\helpers\ArrayHelper; use source\LuLu; use source\libs\Common; use source\libs\Constants; use source\core\grid\GridView; use source\core\widgets\ActiveForm; use source\modules\log\models\Setting; /* @var $this source\core\back\BackView */ ?> <?php $form = ActiveForm::begin(); ?> <?= $form->field($model, 'post_taxonomy')->dropDownList(ArrayHelper::map($categories, 'id', 'name')) ?> <?= $form->defaultButtons() ?> <?php ActiveForm::end(); ?>
Low
[ 0.502222222222222, 28.25, 28 ]
/* ------------------------------------------------------------------------------ Licensing information can be found at the end of the file. ------------------------------------------------------------------------------ tinyfiles.h - v1.0 To create implementation (the function definitions) #define CUTE_FILES_IMPLEMENTATION in *one* C/CPP file (translation unit) that includes this file Summary: Utility header for traversing directories to apply a function on each found file. Recursively finds sub-directories. Can also be used to iterate over files in a folder manually. All operations done in a cross-platform manner (thx posix!). This header does no dynamic memory allocation, and performs internally safe string copies as necessary. Strings for paths, file names and file extensions are all capped, and intended to use primarily the C run-time stack memory. Feel free to modify the defines in this file to adjust string size limitations. Read the header for specifics on each function. Here's an example to print all files in a folder: cf_dir_t dir; cf_dir_open(&dir, "a"); while (dir.has_next) { cf_file_t file; cf_read_file(&dir, &file); printf("%s\n", file.name); cf_dir_next(&dir); } cf_dir_close(&dir); */ #if !defined(CUTE_FILES_H) #define CUTE_FILES_WINDOWS 1 #define CUTE_FILES_MAC 2 #define CUTE_FILES_UNIX 3 #if defined(_WIN32) #define CUTE_FILES_PLATFORM CUTE_FILES_WINDOWS #if !defined(_CRT_SECURE_NO_WARNINGS) #define _CRT_SECURE_NO_WARNINGS #endif #elif defined(__APPLE__) #define CUTE_FILES_PLATFORM CUTE_FILES_MAC #else #define CUTE_FILES_PLATFORM CUTE_FILES_UNIX #endif #include <string.h> // strerror, strncpy // change to 0 to compile out any debug checks #define CUTE_FILES_DEBUG_CHECKS 1 #if CUTE_FILES_DEBUG_CHECKS #include <stdio.h> // printf #include <assert.h> // assert #include <errno.h> #define CUTE_FILES_ASSERT assert #else #define CUTE_FILES_ASSERT(...) #endif // CUTE_FILES_DEBUG_CHECKS #define CUTE_FILES_MAX_PATH 1024 #define CUTE_FILES_MAX_FILENAME 256 #define CUTE_FILES_MAX_EXT 64 struct cf_file_t; struct cf_dir_t; struct cf_time_t; typedef struct cf_file_t cf_file_t; typedef struct cf_dir_t cf_dir_t; typedef struct cf_time_t cf_time_t; typedef void (cf_callback_t)(cf_file_t* file, void* udata); // Stores the file extension in cf_file_t::ext, and returns a pointer to // cf_file_t::ext const char* cf_get_ext(cf_file_t* file); // Applies a function (cb) to all files in a directory. Will recursively visit // all subdirectories. Useful for asset management, file searching, indexing, etc. void cf_traverse(const char* path, cf_callback_t* cb, void* udata); // Fills out a cf_file_t struct with file information. Does not actually open the // file contents, and instead performs more lightweight OS-specific calls. int cf_read_file(cf_dir_t* dir, cf_file_t* file); // Once a cf_dir_t is opened, this function can be used to grab another file // from the operating system. void cf_dir_next(cf_dir_t* dir); // Performs lightweight OS-specific call to close internal handle. void cf_dir_close(cf_dir_t* dir); // Performs lightweight OS-specific call to open a file handle on a directory. int cf_dir_open(cf_dir_t* dir, const char* path); // Compares file last write times. -1 if file at path_a was modified earlier than path_b. // 0 if they are equal. 1 if file at path_b was modified earlier than path_a. int cf_compare_file_times_by_path(const char* path_a, const char* path_b); // Retrieves time file was last modified, returns 0 upon failure int cf_get_file_time(const char* path, cf_time_t* time); // Compares file last write times. -1 if time_a was modified earlier than path_b. // 0 if they are equal. 1 if time_b was modified earlier than path_a. int cf_compare_file_times(cf_time_t* time_a, cf_time_t* time_b); // Returns 1 of file exists, otherwise returns 0. int cf_file_exists(const char* path); // Returns 1 if the file's extension matches the string in ext // Returns 0 otherwise int cf_match_ext(cf_file_t* file, const char* ext); // Prints detected errors to stdout void cf_do_unit_tests(); #if CUTE_FILES_PLATFORM == CUTE_FILES_WINDOWS #if !defined _CRT_SECURE_NO_WARNINGS #define _CRT_SECURE_NO_WARNINGS #endif #include <Windows.h> struct cf_file_t { char path[CUTE_FILES_MAX_PATH]; char name[CUTE_FILES_MAX_FILENAME]; char ext[CUTE_FILES_MAX_EXT]; int is_dir; int is_reg; size_t size; }; struct cf_dir_t { char path[CUTE_FILES_MAX_PATH]; int has_next; HANDLE handle; WIN32_FIND_DATAA fdata; }; struct cf_time_t { FILETIME time; }; #elif CUTE_FILES_PLATFORM == CUTE_FILES_MAC || CUTE_FILES_PLATFORM == CUTE_FILES_UNIX #include <sys/stat.h> #include <dirent.h> #include <unistd.h> #include <time.h> struct cf_file_t { char path[CUTE_FILES_MAX_PATH]; char name[CUTE_FILES_MAX_FILENAME]; char ext[CUTE_FILES_MAX_EXT]; int is_dir; int is_reg; int size; struct stat info; }; struct cf_dir_t { char path[CUTE_FILES_MAX_PATH]; int has_next; DIR* dir; struct dirent* entry; }; struct cf_time_t { time_t time; }; #endif #define CUTE_FILES_H #endif #ifdef CUTE_FILES_IMPLEMENTATION #ifndef CUTE_FILES_IMPLEMENTATION_ONCE #define CUTE_FILES_IMPLEMENTATION_ONCE #define cf_safe_strcpy(dst, src, n, max) cf_safe_strcpy_internal(dst, src, n, max, __FILE__, __LINE__) static int cf_safe_strcpy_internal(char* dst, const char* src, int n, int max, const char* file, int line) { int c; const char* original = src; do { if (n >= max) { if (!CUTE_FILES_DEBUG_CHECKS) break; printf("ERROR: String \"%s\" too long to copy on line %d in file %s (max length of %d).\n" , original , line , file , max); CUTE_FILES_ASSERT(0); } c = *src++; dst[n] = c; ++n; } while (c); return n; } const char* cf_get_ext(cf_file_t* file) { char* name = file->name; char* period = NULL; while (*name++) if (*name == '.') period = name; if (period) cf_safe_strcpy(file->ext, period, 0, CUTE_FILES_MAX_EXT); else file->ext[0] = 0; return file->ext; } void cf_traverse(const char* path, cf_callback_t* cb, void* udata) { cf_dir_t dir; cf_dir_open(&dir, path); while (dir.has_next) { cf_file_t file; cf_read_file(&dir, &file); if (file.is_dir && file.name[0] != '.') { char path2[CUTE_FILES_MAX_PATH]; int n = cf_safe_strcpy(path2, path, 0, CUTE_FILES_MAX_PATH); n = cf_safe_strcpy(path2, "/", n - 1, CUTE_FILES_MAX_PATH); cf_safe_strcpy(path2, file.name, n -1, CUTE_FILES_MAX_PATH); cf_traverse(path2, cb, udata); } if (file.is_reg) cb(&file, udata); cf_dir_next(&dir); } cf_dir_close(&dir); } int cf_match_ext(cf_file_t* file, const char* ext) { return !strcmp(file->ext, ext); } #if CUTE_FILES_PLATFORM == CUTE_FILES_WINDOWS int cf_read_file(cf_dir_t* dir, cf_file_t* file) { CUTE_FILES_ASSERT(dir->handle != INVALID_HANDLE_VALUE); int n = 0; char* fpath = file->path; char* dpath = dir->path; n = cf_safe_strcpy(fpath, dpath, 0, CUTE_FILES_MAX_PATH); n = cf_safe_strcpy(fpath, "/", n - 1, CUTE_FILES_MAX_PATH); char* dname = dir->fdata.cFileName; char* fname = file->name; cf_safe_strcpy(fname, dname, 0, CUTE_FILES_MAX_FILENAME); cf_safe_strcpy(fpath, fname, n - 1, CUTE_FILES_MAX_PATH); size_t max_dword = MAXDWORD; file->size = ((size_t)dir->fdata.nFileSizeHigh * (max_dword + 1)) + (size_t)dir->fdata.nFileSizeLow; cf_get_ext(file); file->is_dir = !!(dir->fdata.dwFileAttributes & FILE_ATTRIBUTE_DIRECTORY); file->is_reg = !!(dir->fdata.dwFileAttributes & FILE_ATTRIBUTE_NORMAL) || !(dir->fdata.dwFileAttributes & FILE_ATTRIBUTE_DIRECTORY); return 1; } void cf_dir_next(cf_dir_t* dir) { CUTE_FILES_ASSERT(dir->has_next); if (!FindNextFileA(dir->handle, &dir->fdata)) { dir->has_next = 0; DWORD err = GetLastError(); CUTE_FILES_ASSERT(err == ERROR_SUCCESS || err == ERROR_NO_MORE_FILES); } } void cf_dir_close(cf_dir_t* dir) { dir->path[0] = 0; dir->has_next = 0; if (dir->handle != INVALID_HANDLE_VALUE) FindClose(dir->handle); } int cf_dir_open(cf_dir_t* dir, const char* path) { int n = cf_safe_strcpy(dir->path, path, 0, CUTE_FILES_MAX_PATH); n = cf_safe_strcpy(dir->path, "\\*", n - 1, CUTE_FILES_MAX_PATH); dir->handle = FindFirstFileA(dir->path, &dir->fdata); dir->path[n - 3] = 0; if (dir->handle == INVALID_HANDLE_VALUE) { printf("ERROR: Failed to open directory (%s): %s.\n", path, strerror(errno)); cf_dir_close(dir); CUTE_FILES_ASSERT(0); return 0; } dir->has_next = 1; return 1; } int cf_compare_file_times_by_path(const char* path_a, const char* path_b) { FILETIME time_a = { 0 }; FILETIME time_b = { 0 }; WIN32_FILE_ATTRIBUTE_DATA data; if (GetFileAttributesExA(path_a, GetFileExInfoStandard, &data)) time_a = data.ftLastWriteTime; if (GetFileAttributesExA(path_b, GetFileExInfoStandard, &data)) time_b = data.ftLastWriteTime; return CompareFileTime(&time_a, &time_b); } int cf_get_file_time(const char* path, cf_time_t* time) { FILETIME initialized_to_zero = { 0 }; time->time = initialized_to_zero; WIN32_FILE_ATTRIBUTE_DATA data; if (GetFileAttributesExA(path, GetFileExInfoStandard, &data)) { time->time = data.ftLastWriteTime; return 1; } return 0; } int cf_compare_file_times(cf_time_t* time_a, cf_time_t* time_b) { return CompareFileTime(&time_a->time, &time_b->time); } int cf_file_exists(const char* path) { WIN32_FILE_ATTRIBUTE_DATA unused; return GetFileAttributesExA(path, GetFileExInfoStandard, &unused); } #elif CUTE_FILES_PLATFORM == CUTE_FILES_MAC || CUTE_FILES_PLATFORM == CUTE_FILES_UNIX int cf_read_file(cf_dir_t* dir, cf_file_t* file) { CUTE_FILES_ASSERT(dir->entry); int n = 0; char* fpath = file->path; char* dpath = dir->path; n = cf_safe_strcpy(fpath, dpath, 0, CUTE_FILES_MAX_PATH); n = cf_safe_strcpy(fpath, "/", n - 1, CUTE_FILES_MAX_PATH); char* dname = dir->entry->d_name; char* fname = file->name; cf_safe_strcpy(fname, dname, 0, CUTE_FILES_MAX_FILENAME); cf_safe_strcpy(fpath, fname, n - 1, CUTE_FILES_MAX_PATH); if (stat(file->path, &file->info)) return 0; file->size = (int)file->info.st_size; cf_get_ext(file); file->is_dir = S_ISDIR(file->info.st_mode); file->is_reg = S_ISREG(file->info.st_mode); return 1; } void cf_dir_next(cf_dir_t* dir) { CUTE_FILES_ASSERT(dir->has_next); dir->entry = readdir(dir->dir); dir->has_next = dir->entry ? 1 : 0; } void cf_dir_close(cf_dir_t* dir) { dir->path[0] = 0; if (dir->dir) closedir(dir->dir); dir->dir = 0; dir->has_next = 0; dir->entry = 0; } int cf_dir_open(cf_dir_t* dir, const char* path) { cf_safe_strcpy(dir->path, path, 0, CUTE_FILES_MAX_PATH); dir->dir = opendir(path); if (!dir->dir) { printf("ERROR: Failed to open directory (%s): %s.\n", path, strerror(errno)); cf_dir_close(dir); CUTE_FILES_ASSERT(0); return 0; } dir->has_next = 1; dir->entry = readdir(dir->dir); if (!dir->dir) dir->has_next = 0; return 1; } // Warning : untested code! (let me know if it breaks) int cf_compare_file_times_by_path(const char* path_a, const char* path_b) { time_t time_a; time_t time_b; struct stat info; if (stat(path_a, &info)) return 0; time_a = info.st_mtime; if (stat(path_b, &info)) return 0; time_b = info.st_mtime; return (int)difftime(time_a, time_b); } // Warning : untested code! (let me know if it breaks) int cf_get_file_time(const char* path, cf_time_t* time) { struct stat info; if (stat(path, &info)) return 0; time->time = info.st_mtime; return 1; } // Warning : untested code! (let me know if it breaks) int cf_compare_file_times(cf_time_t* time_a, cf_time_t* time_b) { return (int)difftime(time_a->time, time_b->time); } // Warning : untested code! (let me know if it breaks) int cf_file_exists(const char* path) { return access(path, F_OK) != -1; } #endif // CUTE_FILES_PLATFORM #endif // CUTE_FILES_IMPLEMENTATION_ONCE #endif // CUTE_FILES_IMPLEMENTATION /* ------------------------------------------------------------------------------ This software is available under 2 licenses - you may choose the one you like. ------------------------------------------------------------------------------ ALTERNATIVE A - zlib license Copyright (c) 2017 Randy Gaul http://www.randygaul.net This software is provided 'as-is', without any express or implied warranty. In no event will the authors be held liable for any damages arising from the use of this software. Permission is granted to anyone to use this software for any purpose, including commercial applications, and to alter it and redistribute it freely, subject to the following restrictions: 1. The origin of this software must not be misrepresented; you must not claim that you wrote the original software. If you use this software in a product, an acknowledgment in the product documentation would be appreciated but is not required. 2. Altered source versions must be plainly marked as such, and must not be misrepresented as being the original software. 3. This notice may not be removed or altered from any source distribution. ------------------------------------------------------------------------------ ALTERNATIVE B - Public Domain (www.unlicense.org) This is free and unencumbered software released into the public domain. Anyone is free to copy, modify, publish, use, compile, sell, or distribute this software, either in source code form or as a compiled binary, for any purpose, commercial or non-commercial, and by any means. In jurisdictions that recognize copyright laws, the author or authors of this software dedicate any and all copyright interest in the software to the public domain. We make this dedication for the benefit of the public at large and to the detriment of our heirs and successors. We intend this dedication to be an overt act of relinquishment in perpetuity of all present and future rights to this software under copyright law. THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE. ------------------------------------------------------------------------------ */
Mid
[ 0.6334056399132321, 36.5, 21.125 ]
Q: SQL Server : left join results in fewer rows than in left table I am using SQL Server (I believe it is 2005). I have TableA that has 2 columns and 439 rows (each row is unique). +----------+ |ID | Name | +----------+ I have TableB that has 35 columns and many hundreds of thousand rows (each row is also unique). +------------------------------------------------------------------------------+ |Date | ID | Name | Blah1 | Blah2 | ... | Hour1 | Hour2 | Hour3 | ... | Hour24 | +------------------------------------------------------------------------------+ Each row in TableB has hourly observations and some other house keeping information. Now for testing purposes I am only interested in today's date i.e 4/19/2013. If I do: Select count(*) from TableB where Date = '4/19/2013 12:00:00 AM' I get 10526, which is correct as there are 10526 distinct locations for which there is hourly observation data each day. I want to LEFT JOIN TableA and TableB on a.id = b.id, which SHOULD produce a result that has 439 rows. Unfortunately, the result has 246 rows. How can this be? Isn't a LEFT JOIN suppose to return all rows in TableA regardless of whether there was a match in TableB? *EDIT* The complete query I used was: select * from TableA as a left join TableB as b on a.id = b.id where RealDate = '4/20/2013 12:00:00 AM' A: Try this: select * from TableA as a left join (SELECT * from TableB where RealDate = '4/20/2013 12:00:00 AM') as b on a.id = b.id Or this: select * from TableA as a left join TableB as b on (a.id = b.id AND RealDate = '4/20/2013 12:00:00 AM')
Mid
[ 0.5797752808988761, 32.25, 23.375 ]
Vulcanization Vulcanization (British: vulcanisation) is a chemical process, invented by Charles Goodyear, used to harden rubber. Vulcanization traditionally referred to the treatment of natural rubber with sulfur and this remains the most common example, however the term has also grown to include the hardening of other (synthetic) rubbers via various means. Examples include silicone rubber via room temperature vulcanizing and chloroprene rubber (neoprene) using metal oxides. Vulcanization can therefore be defined as the curing of elastomers; with the terms 'vulcanization' and 'curing' sometimes used interchangeably in this context. It works by forming cross-links between sections of polymer chain which results in increased rigidity and durability, as well as other changes in the mechanical and electrical properties of the material. Vulcanization, in common with the curing of other thermosetting polymers, is generally irreversible. The word vulcanization is derived from Vulcan, the Roman god of fire and forge. Overview In contrast with thermoplastic processes (the melt-freeze process that characterize the behavior of most modern polymers), vulcanization, in common with the curing of other thermosetting polymers, is generally irreversible. Five types of curing systems are in common use: Sulfur systems Peroxides Metallic oxides Acetoxysilane Urethane crosslinkers Vulcanization with sulfur By far the most common vulcanizing methods depend on sulfur. Sulfur, by itself, is a slow vulcanizing agent and does not vulcanize synthetic polyolefins. Accelerated vulcanization is carried out using various compounds that modify the kinetics of crosslinking, this mixture is often referred to as a cure package. The main polymers subjected to sulfur vulcanization are polyisoprene (natural rubber) and styrene-butadiene rubber (SBR), which are used for most street-vehicle tires. The cure package is adjusted specifically for the substrate and the application. The reactive sites—cure sites—are allylic hydrogen atoms. These C-H bonds are adjacent to carbon-carbon double bonds. During vulcanization, some of these C-H bonds are replaced by chains of sulfur atoms that link with a cure site of another polymer chain. These bridges contain between one and several atoms. The number of sulfur atoms in the crosslink strongly influences the physical properties of the final rubber article. Short crosslinks give the rubber better heat resistance. Crosslinks with higher number of sulfur atoms give the rubber good dynamic properties but less heat resistance. Dynamic properties are important for flexing movements of the rubber article, e.g., the movement of a side-wall of a running tire. Without good flexing properties these movements rapidly form cracks, and ultimately will make the rubber article fail. Vulcanization of polychloroprene The vulcanization of neoprene or polychloroprene rubber (CR rubber) is carried out using metal oxides (specifically MgO and ZnO, sometimes Pb3O4) rather than sulfur compounds which are presently used with many natural and synthetic rubbers. In addition, because of various processing factors (principally scorch, this being the premature cross-linking of rubbers due to the influence of heat), the choice of accelerator is governed by different rules to other diene rubbers. Most conventionally used accelerators are problematic when CR rubbers are cured and the most important accelerant has been found to be ethylene thiourea (ETU), which, although being an excellent and proven accelerator for polychloroprene, has been classified as reprotoxic. The European rubber industry has started a research project SafeRubber to develop a safer alternative to the use of ETU. Vulcanization of silicones Room-temperature vulcanizing (RTV) silicone is constructed of reactive oil-based polymers combined with strengthening mineral fillers. There are two types of room-temperature vulcanizing silicone: RTV-1 (One-component systems); hardens due to the action of atmospheric humidity, a catalyst, and acetoxysilane. Acetoxysilane, when exposed to humid conditions, will form acetic acid. The curing process begins on the outer surface and progresses through to its core. The product is packed in airtight cartridges and is either in a fluid or paste form. RTV-1 silicone has good adhesion, elasticity, and durability characteristics. The Shore hardness can be varied between 18 and 60. Elongation at break can range from 150% up to 700%. They have excellent aging resistance due to superior resistance to UV radiation and weathering. RTV-2 (Two-component systems); two-component products that, when mixed, cure at room-temperature to a solid elastomer, a gel, or a flexible foam. RTV-2 remains flexible from . Break-down occurs at temperatures above , leaving an inert silica deposit that is non-flammable and non-combustible. They can be used for electrical insulation due to their dielectric properties. Mechanical properties are satisfactory. RTV-2 is used to make flexible moulds, as well as many technical parts for industry and paramedical applications. See also Polymer stabilizers Vulcanized fibre References Category:Chemical processes
Mid
[ 0.6271604938271601, 31.75, 18.875 ]
A customer called Bankers South not long ago with a problem. He was coming close to a foreclosure on a tract of timberland. He wanted to sell off the tract, but not under distress in a fire sale, where he might lose his shirt. Our loan specialists had the plan to buy him some time: a hard money loan. Instead of losing the property, he had time to put it up for sale, wait for the right buyer, and was able to walk away with a profit. He was elated, not only because he retained the equity built up in the land, but also because his credit was not ruined. We were proud that he was able to get out from underneath a bad loan – and we were happy to help him stand tall in a tough situation. Hard money lending, or private lending, is often misunderstood. Put simply, a hard money loan is an asset-based loan. Some people wrongfully believe that hard money borrowers are in financial trouble, when actually these types of loans were the original way to borrow money. In the 19th century, it was near impossible for a lender to verify a borrower’s income, so all mortgages were asset-based loans. Over the decades, as banks competed for business, lenders slowly began evaluating borrowers’ abilities to repay the debt according to their income, instead of just looking to the value of the collateral. Nowadays, since institutional banks look more to a borrower’s ability to repay the loan and less to the asset itself, hard money lenders have a place again in the market. Hard money lenders like Bankers South are there to help not just those in financial trouble, but any borrower who has enough equity in an asset. Hard money borrowers are often stable, successful businesspeople that just happen to find themselves with a need not met by a traditional bank loan. Some of our borrowers are in need of a short-term loan, say a few weeks or six months, to “bridge” them over to a new project or goal. Others are behind in their current payments and need a “loan buyout” from an institutional bank. We’ll often take over their loan and restructure the payments to more manageable levels. We can help our customers sell their property too, through our real estate brokerage division, Land South Realty. These hard money loans have seen our customers through the tough times, often allowing them walking money after the sale, and everybody is happy. Our entire team at Bankers South is knowledgeable and experienced in real estate valuation. Due to this experience, loan underwriting and property appraisal are completed in a timely fashion. Depending upon the type of loan, funding can take as little as one to three weeks. If you think a hard money loan could work for you, we’re standing by to help you through the process. Contact us at 855 898-BANK or write us an email at [email protected].
High
[ 0.669354838709677, 31.125, 15.375 ]
// Copyright 2020 The Chromium Authors. All rights reserved. // Use of this source code is governed by a BSD-style license that can be // found in the LICENSE file. #include "components/arc/mojom/ime_mojom_traits.h" #include "ui/events/keycodes/keyboard_code_conversion.h" namespace mojo { using KeyEventUniquePtr = std::unique_ptr<ui::KeyEvent>; bool StructTraits<arc::mojom::KeyEventDataDataView, KeyEventUniquePtr>::Read( arc::mojom::KeyEventDataDataView data, KeyEventUniquePtr* out) { const ui::EventType type = data.pressed() ? ui::ET_KEY_PRESSED : ui::ET_KEY_RELEASED; // TODO(yhanada): Currently we have no way to know the correct keyboard layout // here, so assuming US layout. Find a way to get the more precise DomCode. const ui::DomCode dom_code = ui::UsLayoutKeyboardCodeToDomCode( static_cast<ui::KeyboardCode>(data.key_code())); int flags = 0; if (data.is_shift_down()) flags |= ui::EF_SHIFT_DOWN; if (data.is_control_down()) flags |= ui::EF_CONTROL_DOWN; if (data.is_alt_down()) flags |= ui::EF_ALT_DOWN; if (data.is_capslock_on()) flags |= ui::EF_CAPS_LOCK_ON; ui::KeyboardCode key_code; ui::DomKey dom_key; if (!DomCodeToUsLayoutDomKey(dom_code, flags, &dom_key, &key_code)) return false; *out = std::make_unique<ui::KeyEvent>(type, key_code, dom_code, flags, dom_key, base::TimeTicks::Now()); return true; } } // namespace mojo
Mid
[ 0.588, 36.75, 25.75 ]
FRIDAY, Feb. 21, 2014 (HealthDay News) -- Even a little walking each week appears to lower the risk of hip fractures in men over 50, a new long-term study suggests. Researchers from Brigham and Women's Hospital mined data from a large study, collecting information on the activity and sitting habits of almost 36,000 men over 24 years. Their study relied on answers on questionnaires that the men filled out every two years about how vigorously they walked -- at an easy, average or brisk pace -- as well as their time spent sitting and performing other activities, including tennis, lap swimming and outdoor work. During the 24-year follow-up period, 546 hip fractures were reported, not including fractures due to cancer or a traumatic event such as a fall during skiing or a car accident. Eighty-five percent of the fractures involved "low-trauma" events such as slipping, tripping or falling from a chair. The results suggest that the more a man walked, and the more vigorously he walked, the lower his risk for hip fracture as he aged, the authors reported. For men whose primary activity was walking, doing so at least four hours a week was associated with a significant drop in hip fractures -- a 43 percent lower risk than walking less than one hour a week. "It's well known that physical activity helps to prevent hip fractures, that it helps to build bone and muscle tone. It can help with balance, too," said study author Diane Feskanich, an assistant professor at Harvard Medical School and an associate epidemiologist in the department of medicine at Brigham and Women's Hospital in Boston. "One thing we're pointing out here is that it doesn't necessarily have to be strenuous activity," Feskanich said. "A lot of studies have focused on the benefits of strenuous activity, but we found walking alone helped to prevent hip fractures, and when you come down to it, older people are often more comfortable with walking." Because of different fracture risks, men of African American or Asian ancestry were not included in the study, which was published online Feb. 13 in the American Journal of Public Health. Dr. Neil Roth, an attending orthopedic surgeon at Lenox Hill Hospital in New York City, and a specialist in sports medicine, said bones are not static organs -- they're fluid. "The cells are constantly breaking down bone and making new bone," he said. The way to keep bones healthy and strong is by increasing stress on the bone through activity, but not to overdo it, either, he said. "You want to stay below the threshold that becomes dangerous but also push it to the point that builds bone mass -- find the sweet spot -- but that will be different for everybody," Roth said. An obese 75-year-old man will not be able to do the same activity as a 65-year-old who is in good shape, Roth noted. He also said that while walking may help with some balance and cardiovascular issues, it may not fully address those and other health issues. "Balance in the elderly is a very complicated situation. If someone has better balance, they're much less likely to fall and the majority of hip fractures occur from a fall. But all sorts of things can affect balance in elderly -- inner ear issues, or vertigo," he said, as well as poor eyesight and medications. But he said a walker or cane can help people maintain a healthy walking routine. Roth advises that men get cleared by their internist or cardiologist, though, before starting an exercise routine, and that they listen to their bodies during physical activity, especially if they experience bone pain. Feskanich said she and colleagues performed a similar earlier study in women and the results almost mirrored this study: "We found almost the exact same results in women and men, about the same numbers." She said the new findings may boost recommendations for more walking. "But a good clinician is already telling their older patients to be walking and active," she added.
Mid
[ 0.639386189258312, 31.25, 17.625 ]
Raising the Minimum Wage Would Help, Not Hurt, Our Economy By T. William Lester, David Madland, and Jackie Odum Posted on December 3, 2013, 9:04 am Updated January 2, 2014: This column has been revised to include two new paragraphs that clarify the differences between the methodology used for this analysis and the methodologies employed by the academic papers cited and other similar academic analyses. Raising the minimum wage would be good for our economy. A higher minimum wage not only increases workers’ incomes—which is sorely needed to boost demand and get the economy going—but it also reduces turnover, cuts the costs that low-road employers impose on taxpayers, and pushes businesses toward a high-road, high-human-capital model. Despite these positive benefits, and the sad fact that the minimum wage is worth far less today than it was in the late 1960s, with the Senate set to vote to raise the federal minimum wage from $7.25 to $10.10 per hour, opponents will likely trot out the same unfounded argument that the minimum wage reduces employment. And with today’s unemployment rate stuck above 7 percent, we anticipate these types of arguments to reach a fevered pitch. The evidence, however, is clear: Raising the minimum wage does not have the harmful effects that critics claim. A significant body of academic research finds that raising the minimum wage does not result in job losses, even during periods when the unemployment rate is high. Critics of the minimum wage, however, often hold on to the claim that raising the minimum wage will lead to job losses and ultimately hurt the overall economy, exacerbating the problem of high unemployment. The argument that raising the minimum wage will increase unemployment is somewhat far-fetched, since the minimum wage impacts a relatively small share of the overall workforce, which is itself concentrated in certain industries such as restaurants and demographic groups such as teenagers. Nevertheless, we analyzed more than two decades’ worth of minimum-wage increases in U.S. states and found no clear evidence that the minimum wage impacts aggregate job creation during periods of high unemployment. Our analysis includes every state that saw its effective minimum wage increase from 1987 through 2012, when the state’s unemployment rate was at or above the current rate of 7 percent. We then studied changes in employment in these states over the next year.* We include minimum-wage increases that occur because of either state or federal action, though we disaggregate results later. According to our analysis, the majority of states that raised the minimum wage saw a decrease in their unemployment rate over the next year. There were a total of 91 cases where a state minimum-wage increase occurred during a period of high unemployment over the past two and a half decades. In 47 of these cases, the unemployment rate decreased over the next 12 months, and in 4 other cases the unemployment rate remained unchanged. In contrast, there were only 40 occurrences where the unemployment rate increased. That means when a minimum-wage increase occurred during a period of high unemployment, unemployment rates actually declined 52 percent of the time. (see Table 1) Comparisons to national averages produce similar results. Of the 91 cases of minimum-wage increases during high unemployment, states saw their unemployment rate fare better than the national unemployment rate 51 times over the subsequent 12 months. A few states, including Alabama and Tennessee in 2009, saw their unemployment decrease much more than the national average. Following the minimum-wage increase that year, Alabama and Tennessee’s unemployment rates fell by 1.6 percentage points and 1.4 percentage points, respectively, compared to a decline in the national unemployment rate of only 0.1 percentage points. To be fair, some states, such as Michigan in 2008, had significantly worse outcomes than the national average. However, a majority of states that raised their minimum wage did slightly better than the national average. Comparing state employment growth to the national average produced similar results. Furthermore, a separate analysis of minimum-wage increases that occurred as a result of federal action versus increases coming from state action yields nearly identical results. No matter what caused the increase, more than half of the states that increased their minimum wage saw their unemployment rates decline or remain unchanged. Ultimately, from a look at the aggregate data, there is not clear correlation that minimum-wage increases are associated with harmful changes in unemployment or job growth. This basic state-by-state comparison of what happens to unemployment and/or aggregate employment one year after a minimum-wage increase—rather than providing conclusive evidence on its own—suggests instead that one must dig deeper to look for the real causal effects of the minimum wage. As the data above suggest, there are wide regional variations in economic trends across states, for example, Michigan versus Alabama. These regional growth differentials are unrelated to minimum-wage policy and are driven rather by deeper structural forces including decades-long industrial restructuring processes and divergent population trends, to name a few—all of which may obscure the impact of minimum-wage changes. Fortunately, there are at least five different academic papers that utilize a research design that controls for precisely such regional trends. Specifically, these papers collectively find that an increase in the minimum wage has no significant effect on employment levels. Critically, these papers all include in their samples periods of high unemployment, with unemployment rates ranging from 7 percent to 12.3 percent. These five academic studies also cover different geographical areas and different time periods, and use a range of methodologies—from small case studies to large econometric analysis—lending great credibility to their findings. In addition, they focus on highly impacted groups such as restaurant workers and/or teenagers, where minimum-wage increases actually result in wage increases (i.e., they are binding). (see Figure 1) Furthermore, the most recent studies are considered significant improvements over previous studies because of the methodologies employed. Specifically, these studies accurately control for confounding regional trends by either controlling for heterogeneous trends across Census divisions, or byexamining all U.S. counties along state borders that had different minimum wages. This research design combines the detailed analysis possible in case studies with the generalizability of a nationally representative sample. All of the studies came to the same conclusion: Raising the minimum wage had no effect on employment levels. What’s more, there may be another factor that comes into play even more during hard times: economic power. Low-wage workers have very little of it, particularly during periods of high unemployment. When the economy is doing poorly, employers have less incentive to raise wages, while workers, especially those making near minimum wage, have little ability to demand a raise because there is a ready supply of unemployed labor available to take their job. Even though these workers likely become more productive—labor productivity has generally increased over time, and productivity growth during the past two recessions was especially strong—they have less economic power to share the gains of their increased productivity. This suggests that during hard economic times, there is a critical role for government to raise the minimum wage to ensure that workers are being paid for their economic contributions. In short, policymakers should feel confident that raising the minimum wage would not hurt employment. Instead, it would provide the kind of boost in consumer demand that our economy sorely needs. T. William Lester is an assistant professor in the department of city and regional planning at the University of North Carolina, Chapel Hill. David Madland is Director of the American Worker Project at the Center for American Progress Action Fund. Jackie Odum is a Special Assistant at the Action Fund. * Note: Analysis presented in this column is based on changes from the quarter that the minimum wage occurred to the similar quarter the following year. Analysis based on the quarter after the minimum wage occurred produces similar results.
Mid
[ 0.620947630922693, 31.125, 19 ]
#09-11 passed 4/25/2011 COMMITTEE REVIEW: FINANCE COMMITTEEINTRODUCED BY: COUNCILMEMBER PINKERTONINTRODUCED ON: APRIL 11, 2011DATE OF FIRST READING: APRIL 11, 2011DATE OF SECOND READING: APRIL 25, 2011DATE OF THIRD READING: ________________EMERGENCY CLAUSE: YES/NOTITLE ONLY PURSUANT TO SECTION 4.07 OF THE CHARTER: YES/NO AN ORDINANCE DESIGNATING WAGES AND SALARIES AND OTHER EMPLOYMENT BENEFITS AND ESTABLISHING PERSONNEL POLICIES FOR THE APPOINTED OFFICIALS AND EMPLOYEES OF THE VILLAGE OF SEBRING OHIO; REPEALING INCONSISTENT ORDINANCES amended 4/25/11 AND DECLARING AN EMERGENCY WHEREAS, this Council is of the opinion that certain increases and other modifications should be made in the wages, salaries, and benefits of the various appointed officials and employees of the Village as the same have previously been designated and set by enactment of a series of Ordinances including but not limited to Ordinance 38-08 and amended by Ordinance #03-09, Ordinance #16-09, Ordinance #06-10, Ordinance #07-10, Ordinance #12-10 and Ordinance #26-10 by this Council; and WHEREAS, this Council is also of the opinion that certain modifications ought to be made in enacted wages, salaries, fringe benefits and personnel policies for the various appointed officials and employees of the Village of Sebring as the same have previously been established and enacted by this Council; and WHEREAS, this Council deems it in the best interest of the Village and its appointed officials and employees to adopt a comprehensive wage, salary, fringe benefit and personnel policy to take effect on May 8, 2011 and continue thereafter until otherwise modified, altered, amended or changed by this Council. NOW, THEREFORE, BE IT ORDAINED BY THE COUNCIL OF THE VILLAGE OF SEBRING, MAHONING COUNTY, OHIO: SECTION 1: Wages and Salaries That the wages and salaries of the various employees and appointed officials of the Village of Sebring be and the same are hereby set and designated as follows, to wit: POSITIONCURRENT SALARYCOMMENCING 5-08-11 OFFICIAL/EMPLOYEE Clerk of Council/ Administrative Assistant $ 14.18 hr. $ 14.18 hr. Administrative Assistant $ 14.18 hr. $ 14.46 hr. Part Time Administrative Assistant $ 10.00 hr. $ 10.00 hr. Chief, Division Police $ 44,761.60 yr. $ 45,656.83 yr. Sergeant, Division Police $ 16.97 hr. $ 17.31 hr. 1st Grade Police Officer/Patrolman $ 15.45 hr. $ 15.76 hr. 2nd Grade Police Officer/Patrolman $ 13.94 hr. $ 14.22 hr. Probationary 3rd Grade Police Officer/Patrolman $ 12.42hr $ 12.67 hr. Police Officer (part-time) $ 12.20 hr. $ 12.20 hr. Police Telecommunication Supervisor $ 15.65 hr. $ 15.96 hr. Police Telecommunicator $ 14.18 hr. $ 14.46 hr. Police Telecommunicator (P/T) $ 11.00 hr. $ 11.00 hr. Public Service – Deputy Director $ 43,000.00 yr. $ 43,860.00 yr. Public Services Operator $ 14.61 hr. $ 14.90 hr. Public Services Laborer (full-time) $ 12.20hr. $ 12.44 hr. Public Services Laborer (part-time) $ 12.20hr. $ 12.20 hr. Seasonal Public Services Laborer (P/T) $ 7.50 hr $ 7.50 hr Water Treatment Plant-Supt. $ 42,640.00 yr. $ 43,492.80 yr. Water Treatment Plant-Oper. $ 14.61 hr. $ 14.90 hr. Wastewater Treatment Plant-Supt. $ 42,640.00 yr. $ 43,492.80 yr. Wastewater Treatment Plant-Oper. $ 14.61 hr. $ 14.90 hr. Recreation Coordinator (part-time) $ 12.20 hr. $ 12.20 hr. Park/Recreation Supervisor minimum wage minimum wage Pool Manager $ 8.20 hr. $ 8.20 hr. Concession Stand Assistant minimum wage minimum wage Lifeguards $ 7.50 hr. $ 7.50 hr. Water Safety Instructor minimum wage minimum wage Caretaker Park/Recreation $ 7.50 hr. $ 7.50 hr. Civic Center Assistant minimum wage minimum wage Janitor/Boiler Operator $ 15.20 hr. $ 15.20 hr. Chief, Division of Fire $ 6,300.00 yr. $ 6,300.00 yr. Volunteer Fireman $ 10.20 hr. $ 10.20 hr. The Village Manger may, at his sole discretion, place newly hired employees at a rate of pay less than the above rates for training and probationary evaluation purpose. SECTION 2:Shift Differential Any employee regularly scheduled to work the "second shift" as defined by the Department Head and Village Manager shall be paid in addition to his/her regular hourly rate the sum of ten cents ($.10) per hour as a shift premium. Any employee regularly scheduled to work the "midnight shift" as defined by the Department Head and Village Manager shall be paid in addition to his/her regular hourly rate the sum of fifteen cents ($.15) per hour as a shift premium. SECTION 3:Effective Date That this Ordinance be and is hereby made effective as of 12:01 A.M. May 8, 2011 and the same shall remain in effect unless and until modified by subsequent Ordinance. SECTION 4:Work Schedule/Overtime Pay That all salaries and wages herein established shall be based upon a forty- (40) hour workweek. Any overtime authorized by the Department Heads shall be paid at the rate of one and one-half (1 1/2) times the hourly rate as provided above, with the exception of salaried employees, who are hereby declared to be ineligible for overtime compensation. The overtime rate in compensation shall be paid for all hours in excess of eight (8) hours in any one-day or any hours over eight (8) consecutive hours and over forty (40) hours in any one week. For the purpose of calculating overtime compensation, a "day" is defined as the twenty-four (24) hour period commencing at twelve o'clock (12:00) A.M. (Midnight) and terminating at eleven fifty-nine o'clock (11:59) P.M.; and a "week" is defined as the seven (7) day period commencing at twelve o'clock (12:00) A.M. (Midnight) on Sunday and terminating at eleven fifty-nine o'clock (11:59) P.M. on Saturday, unless otherwise provided by statute or Ordinance, work schedule of employees shall be determined by various Department Heads. The forty (40) hour workweek shall consist of hours actually worked, as well as holidays, vacation days and sick days, which may have been taken during the week. SECTION 5:Pay Periods That all wages and salaries shall be paid in bi-weekly installments, except for compensation of Volunteer Firemen which shall be paid on the last payroll of each calendar quarter for work performed during that quarter. Payday shall be designated as Friday. SECTION 6:Certificates and Licenses That in addition to the compensation provided in Section 1 foregoing, eachemployee shall receive an additional 2% of the base wage rate for each licensure, other than Commercial Driver's License (CDL), issued to said employee by the State of Ohio, not to exceed three such licensures, that relates to the employee’s job assignment. In addition, each employee that holds a Certificate from the State of Ohio shall receive an additional 1% of the base wage rate for each said Certificate. This additional licensure / certificate pay shall be paid to qualifying employees who possess appropriate licensure/ certificate during the calendar year 2006 and each year following. The additional licensure/ certificate pay for 2006 may be paid to qualifying employees within thirty (30) days of the adoption of this Ordinance. For calendar years 2007 and each year following, said compensation shall be paid with the second pay period in November of each year. That in addition to the compensation provided in Section 1 foregoing, each full time or part time member of the Division of Police holding a Basic and/or Senior Operators’ Certificate to verify blood alcohol content (BAC,ADAP),Radar Certificate, Criminal History (CCH) Certified, Notary Public, or Annual In-service Training Certificate from the State of Ohio on January 1 of each calendar year shall be paid 1% per annum; and each member of the Division of Police holding an approved Instructor Certificate from the State of Ohio, other than the Ohio Peace Officer's Basic Qualification Certificate from the State of Ohio shall be paid a sum of 2% per annum for each certificate held on January 1 of each calendar year; and full time employees obtaining Instructor certification during the calendar year shall be paid a sum equivalent to 2 % per annum for each certificate. All Payments for certificates shall be paid in separate pay check with the second pay period of November in each year. SECTION 7:Longevity Pay Any employee who has fully met the following requirements shall be granted an additional lump sum annual longevity payment to coincide and be distributed with the second pay period of November in each calendar year provided that the employee has met all of the requirements by the November 1 of the calendar year for which the longevity annual payment shall be made. Period of ServiceFull Time Employees Part Time Employees 0-5 years $100.00 $ 50.00 6-10 years $200.00 $100.00 11-15 years $300.00 $150.00 16-20 years $400.00 $200.00 21 + years $500.00 $250.00 SECTION 8: Training Any employee who attends any training session, school or seminar which has previously been approved by the Village Manager during regularly scheduled work hours, shall be compensated for such time spent in such attendance, including travel time to and from said training session, schools or seminar up to but not more than eight (8) hours straight time in any one (1) day. This provision or any other provision or provisions of this Ordinance shall not be construed, either individually or jointly so as to provide multiple compensation for any time spent in training session, schools or seminars under this Section. Said employees may receive in addition to any compensation as provided hereunder, reimbursements for mileage tuition and meals under the usual conditions applicable to all employees. All accommodations must be approved by the Department Head and Village Manager prior to the actual session. That in addition to the compensation provided in Section 1 foregoing for the time spent in actual fire-fighting, each member of the Volunteer Fire Department attending the a regularly scheduled work night or training session shall receive two (2) hours additional compensation at the same hourly rate for each such work night or training session attended. SECTION 9:Mileage That any employee who uses his/her private vehicle for the City purposes with authorization from his/her supervisor shall be eligible to receive a mileage reimbursement equal to the rate established by the U.S. Internal Revenue Service. SECTION 10:Health Coverage That the Village of Sebring will pay on a monthly basis Ninety Percent (90%) of the full premium for hospitalization and major medical coverage for all full time employees in accordance with the Village’s master insurance carrier plan now in effect or hereafter modified, altered or changed; the employees shall pay Ten Percent (10%) of the cost for the hospitalization, medical and major medical insurance from the employee’s pay every two weeks; no deduction will be made from a third payroll if three payroll fall within a one month period. That those employees who obtain alternative hospitalization, medical and major medical insurance shall receive One Thousand Two Hundred Dollars ($1,200.00) annually paid in equal monthly increments from the Village of Sebring as an incentive to obtain such alternative insurance. Those employees who elect to take the incentive must provide proof of alternative insurance coverage. That each full time employee of the Village shall be entitled to be reimbursed for actual eye and/or dental care expenses for the employee and his/her family unit as the same is defined for purposes of the Village’s Medical Insurance Plan up to a maximum amount of Four Hundred and no/100 Dollars ($400.00) during each calendar year. Any unused portion may be accumulated up to ($600.00). SECTION 11:Uniforms That an annual credit in the amount of Five Hundred and no/100 Dollars ($500.00) be established for the Chief, Sergeant and full-time Police Officers of the Division of Police for the purpose of providing new or replacement uniforms. That an annual credit in the amount of Three Hundred and no/100 Dollars ($300.00) be established for each full time Telecommunicator that is a sworn member of the Division of Police, for the purpose of providing new or replacement uniforms. That an annual credit in the amount of One Hundred Fifty and no/100 Dollars ($150.00) be established for part time Police Officer and Telecommunicators that have more then two (2) years of service with the Village in their most recent hiring for the purpose of providing new or replacement uniforms; and an annual credit in the amount of Two Hundred and Fifty and no/100 Dollars ($250.00) be established for part time Police Officers and Telecommunicators that have more then four (4) years of service with the Village in their most recent hiring for the purpose of providing new or replacement uniforms. The uniform credit established by this Section may either be paid directly to the employee in one (1) or more installments, upon the approval of the Village Manager and proper proof of purchase; or applies to uniform purchases made by or through the Village according to a standard procedure and policy to be established by the Village Manager. That the Village will provide, and the employees normally assigned to the Wastewater Treatment Plant, Service Department, Water Treatment Plant will wear uniforms as approved by the Village Manager. SECTION 12: Fringe Benefits Waiting Period After conclusion of the waiting period, employees will be added to the Village’s hospitalization at the next monthly billing. Employees shall be entitled to other fringe benefits provided hereunder or under any other Ordinance after each such employee has served at least sixty (60) consecutive calendar days as a full time Village employee in his/her most recent hiring. SECTION 13: Work Schedules That Department Heads are hereby directed to so determine the work schedules of their subordinate employees, subject to the approval of the Village Manager. SECTION 14: Call Back Pay Any employee called to report for work without advance notice shall receive a minimum of one (1) hour of pay at the employee’s appropriate rate of pay subject to the overtime provisions in Section (4). Any full time employee called in to work by his/ her Department Head during an emergency situation on a holiday and/or vacation as specified in Section (14) shall be paid at the rate of one and one-half (1 ½) times his/her hourly rate for the hours actually worked in addition to his/her holiday or vacation pay, with the exception of the salaried employees, who must take equivalent time off at a later date. SECTION 15: Holidays That the following days are hereby declared to be paid holidays for full time employees of the Village of Sebring, Ohio: NEW YEAR’S DAY LABOR DAY GOOD FRIDAY THANKSGIVING DAY MEMORIAL DAY DAY AFTER THANKSGIVING FOURTH OF JULY CHRISTMAS DAY DAY AFTER CHRISTMAS In the event that any of the foregoing holidays fall on a weekend, the same shall be observed on either the Friday immediately preceding or the Monday immediately succeeding said holiday, at the discretion of the Village Manager. In addition to the foregoing specified paid holidays, each full time employee of the Village who is in the service of the Village on January 1st of each calendar year, shall be entitled to three (3) paid personal holidays during said calendar year, which personal holiday must be scheduled in advance and which personal holiday must be scheduled prior to November 30th of the calendar year. A personal holiday not taken by December 31st of the calendar year will be forfeited; and will be neither carried over into the subsequent year nor paid or compensated in lieu, thereof. All full time employees who work their scheduled day that falls on a declared holiday shall be paid at the rate of one and one-half (1 and ½) times his or her hourly rate for the hours actually worked. All full time employees will receive eight (8) hours holiday pay at their rate of pay for each declared holiday that falls within that pay period. If the declared holiday falls on a full time employee's scheduled day off or the full time employee's request to be off is approved by a Department Head or the full time employee is off sick, the employee will receive eight (8) hours holiday pay only. If a full time employee works or is ordered to work a declared holiday on his/her scheduled day off that employee will only receive the appropriate rate of pay set by the wage ordinance subject to the overtime provisions in section (4) and no other compensation other than the above stated holiday pay. (For example, an employee ordered in to work, or who voluntarily works, on a non-scheduled day which is a declared holiday will receive eight (8) hours holiday pay and the scheduled rate of pay in the wage ordinance at overtime rate, if applicable) Holidays and Personal Days shall be used in minimum increments of one-half day (4 hours). SECTION 16: Vacation Leave The vacation year shall date from January 1 through December 31 each year. Employees shall take their vacation for the relevant calendar year prior to December 31st, if practicable. In the event that it is not practical for any employee to take all of his/her vacation by that date, then any such employee shall be paid for any unused vacation time at his/her straight hourly rate; and there will be no carryover of unused vacation into the next calendar year. Such payment in lieu of time off shall be calculated and paid by separate check in the last pay period of January of the following calendar year, subject to the approval of the Village Manager. Each full time employee of the Village of Sebring, Ohio who has at least one (1) full year of service with the Village shall receive vacation leave with pay based on the following formula and further based upon continuous full time employment. Employed (1) through (5) years ……………………………………..80 work day hours Employed (6) years…………………………………………………..88 work day hours Employed (7) years…………………………………………………..96 work day hours Employed (8) years…………………………………………………104 work day hours Employed (9) years…………………………………………………112 work day hours Employed (10) through (14) years………………………………….120 work day hours Employed (15) through (19) years………………………………….140 work day hours Employed (20) or more years……………………………………….160 work day hours Vacation shall be used in minimum increments of one-half day (4 hours). New employees will, on the January 1st following their hire date, receive a pro-rated benefit for their first period of service for use during the following vacation/calendar year. On January 1st of succeeding years newly hired employees shall receive their appropriate earned annual allocation of vacation leave based on service tenure along with other employees. SECTION 17: Sick Leave (a) Sick leave is a period of time that an employee is excused from the work place by reason of illness or injury. (b) Sick leave may be requested by an employee for only the following reasons: (i) Illness or injury of the employee or a member of his/her immediate family. (ii) Medical, dental, optical, chiropractic examinations and treatment procedures of an employee or his/her immediate family which prevents the employee from performing assigned duties within the department or division. (iii) Pregnancy, childbirth, adoption or guardianship of a minor child, or related medical conditions of the employee or member of his/her immediate family. (iv) An employee’s immediate family shall include spouse, mother, father, child, stepchild living in an employee’s home, minor ward, brother, or sister. (c) The provisions governing the use of sick leave and related absences from work contained in Ordinance No. 1672-00 passed by this Council on May 22, 2000 are hereby referenced and included in this Ordinance. (d) Each full time employee of the Village of Sebring shall be entitled to one and one fourth (1.25) days per month credited to their unlimited sick leave account. Sick leave may be used in increments of one (1) hour for illness, medical, dental, or similar professional appointments or health needs. (e) Any full time employee who retires according to the Rules and Regulations established by the Applicable Retirement Board shall be entitled to a compensation from the payroll account in an amount in a lump sum for the portion of unused sick leave up to 960 hours (120 days). Compensation shall be computed at the rate of compensation at the time of employee’s retirement. (f) Any full time employee who shall die while employed by the Village and who has been continuously employed as a full time employee of the Village for at least five (5) years prior to his/her decease shall be considered to have retired under subsection (b) of this Ordinance; and the accumulated sick leave of any such deceased employee up to the maximum provided in subsection (b) hereof, shall be paid to the personal representative of the estate of such deceased employee or to such other person or persons as may be authorized by order of the appropriate Probate Court. (g) That the Village establishes a Wellness Program. Each full time employee who is in the service of the Village on May 1st of each year and who uses zero (0) hours of paid sick leave time from May 1st through April 30th of the following year will receive a One Hundred and no/100 Dollars ($100.00) Wellness Award. SECTION 18: Bereavement Leave Each full time employee of the Village shall be eligible for up to three (3) calendar days additional paid personal leave at the discretion of the Village Manager in the event of the death of an immediate family member. Members of the immediate family shall include mother, father, sister, brother, spouse, employee’s children, mother-in-law, father-in-law, brother-in-law, sister-in-law, grandparents or grandchildren. This Bereavement Leave is in addition to any benefits applicable through the Family Medical Leave Policy established by the Village. SECTION 19: Jury Duty That in their representative capacity, each full time employee of the Village summoned to appear for the Federal or State jury duty shall continue to receive his/her respective wages and salaries from the Village until discharged by the Court. Any full time employee who is paid any per diem fee for an appearance for jury duty shall turn over the fee to the Village and will not be given credit against his/her wages and salaries. SECTION 20:Repeal of Prior Related Ordinances That all Ordinances setting salaries and wages and benefits of employees or officials listed in Section 1 hereof and previously adopted by this Council shall be and are hereby repealed by the passage of this Ordinance. SECTION 21:Conformity with the Ohio Revised Code and Municipal Charter That it is found and determined that all formal actions of this Council relating to the passage of this Ordinance were adopted in open meetings of this Council; and that all deliberations of this Council and of any of its committees which resulted in such formal action were made in compliance with all legal requirements, including those of Section 121.22 of the Ohio Revised Code, all pursuant to Section 3.11 of the Charter of the Village of Sebring. SECTION 22: Emergency Measure That this Ordinance is herby determined to be an EMERGENCY MEASURE necessary for the immediate preservation of the public health, safety and welfare of the citizens of the Municipality of Sebring. AMENDED 4/25/11
Low
[ 0.504444444444444, 28.375, 27.875 ]
Fictionverses ‘under Ravages’ In one early post I asked for potential rivals to The Ravages of Time that are better when it comes to all four criteria of allusions/citations, philosophizing, convoluted schemes, and (implicit or explicit) social commentary – so far I have yet to find such a worthy series, though lots of texts here and there beat Ravages in at least one or two or even three of those benchmarks. In another previous post I mused about ‘ideal’ and ‘utopian’ conditions where Ravages could flourish. For this piece I shall shift the contours of the conjecture a bit and ask: what happens if Ravages dominates the worlds of fiction (production and consumption)? In other words, imagine a world where every fictional piece (and some narratives deemed ‘non-fictional’) is following and cultivating what I would call ‘the Ravages template’. Note: if this exercise comes off as a bizarre and excessive display of favoritism, that’s mainly because I desperately want Ravages to get noticed and appreciated -and studied and critiqued – some more (outside of Chinese fandom, and preferably among Anglophone readers…); so please, help me out by committing to read and study and promote Ravages. To kick off, begin visualizing… South Park having sharper satire, more cunning schemers whose machinations go on despite the ostensibly episodic format of the stories, broader citations not just to (American) pop culture but also to academic and classical texts of various sorts, and more nuanced positions blending with the overall silliness and crudeness. Or perhaps imagine Gintama still with the gags and the dirty jokes and medium-awareness and the parody (and the drama and the action), but augmented with more intricate conspiracies, random allusions to older Japanese texts, more profound ways of weaving mythology and folklore, more sophisticated life lessons and arguments, and more explicit commentary on the source historical period and contemporary political trends. One can go on and on with this: (Marvel) Civil War and Secret Wars featuring even more contending parties with their vested interests and plans, as well as solid discussions on things like communism and libertarianism and posthumanism; the Shinobi World War with more pronounced factionalism and smarter stratagems, with Madara and Obito and the others having backup plans, and with intense epistemological and axiological debates with allusions to a variety of treatises; the current war in Fairy Tail having better thought-out battle plans to go along with the incredible magic, not to mention references to occult and hermetic texts; Game of Thrones with more elaborate intrigues and cleverer players and hefty literary and philosophical quotations; high fantasy series with lots of brilliant ‘gray’ schemers doing their thing amidst the greater backdrop of good versus evil, and paraphrasing some ideas of the Church Fathers and doctors and heretics; detective stories also doubling as multiple battles of manipulation accompanied by disquisitions and disputations on logic and evidence and methodology; et cetera, et cetera, et cetera. Should something like this actually happen with regard to many if not all forthcoming narrative works (as if!), Ravages would no longer seem that special, but its wonderful formula would end up becoming the hegemonic paradigm for all else to follow and/or internalize (unfortunately such a hypothetical scenario would also lead to the marginalization if not extinction of certain ‘less serious’ and ‘more simplified’ ways of speaking, reading, and writing). This is what is called losing the battle but winning the war, or ceding territory but gaining influence, or showing enlightenment by shunning (the desire for) an enlightened stage or guru, or whatever. I now throw this query: wouldn’t it be nice if every story of whatever style and target audience implements to an appropriately significant extent the Ravages template as far as the four aforementioned characteristics are concerned? Like this: Related Extra Menu What is to be done? An important message to blog visitors BASIC POINTS Survive. Read Ravages (and do not drop out). Interact with the translator. Talk about Ravages more frequently and intensely in various online and offline forums. Start a blog or something to promote Ravages. JOIN THE RAVAGES DISCORD SERVER. ADVANCED POINTS Keep up with the intricacies and details involved in Ravages. Study related texts and media. Update those pages and sites dedicated to Ravages. COLLABORATE IN JOINT FAN PROJECTS. ASSISTANCE IN A CAPITALIST CONTEXT Give financial aid to the translator. Buy those volumes whenever feasible. Try to collaborate with the surviving scanlator. Not a priority, but do check out the other commodities related to Ravages. Or just stay tuned to this small venue. And merely suspend or pause if the situation calls, but do not quit irrevocably. KSM: Kasama “Up to now, we have witnessed only the first act of the civil war – the constitutional waging of war. The second act, the revolutionary waging of war, is at hand.” Karl Marx 1862 150 years ago this month, the Emancipation Proclamation went into affect — declaring that ending slavery was now a war aim […] The following letter was shared by some participants in Kasama with the Communist Party of Nepal-Maoist at the start of their recent national congress. This meeting represented a regroupment of revolutionary forces who were previously part of the Unified Communist Party of Nepal (Maoist) — and who are straining to retake the revolutionary road. From […] Nullzone: ZERO ANTHROPOLOGY Did Canadians get to vote on whether or not to bring potential terrorists or supporters of terrorists to Canada? No. Will Canadians get a say in where these potentially dangerous men will be settled? Highly unlikely. Ninety-eight members of the White Helmets, and a few hundred of their families, were evacuated by Israel and allies […] Why is there growing inequality in wealth distribution in the US? Is inequality inevitable? If inequality is inevitable, can it be useful? Can inequality become a problem? If so, when does inequality become a problem? How can a society reduce problematic inequality? Which model of growth should the US be emulating? What are the keys […] Finally, on Monday, July 16, 2018, the Helsinki Summit bringing together Russian President Vladimir Putin and US President Donald Trump took place, despite shrill demands that it be stopped, canceled, or turned into a platform for more aggression. “President Trump should cancel his meeting with Vladimir Putin until Russia takes demonstrable and transparent steps to […] In Madeleine Albright’s new book, dramatically titled Fascism: A Warning, she slams the anti-globalization crowd, claiming yet again that globalization is here to stay—it’s a “fact of life”. It must be another of those facts of life that we are seeing today, like “Donald Trump will never be elected president” or “UK voters will ultimately […] Both leaders arrived in Singapore, with significant excitement greeting them. Trump, arriving from a bitter G7 meeting, after which he attacked Justin Trudeau personally, flew into Singapore on Sunday, June 10, as did Kim Jong-un, who took serious precautions in his travel arrangements. By this point Trump had already significantly lowered expectations, saying that it […] Finder Join the Network Promoted Pieces Try Mistranslating this Site in Other Languages sic et non Treasury Treasury Classification Classification Sales Pitch PLEASE GIVE RAVAGES A CHANCE BEFORE IT GETS RAVAGED BY TIME Yes, it can get complicated at times (or perhaps for some, it may not be sophisticated and nuanced enough). Sure, the scans can be substandard and the unofficial English translation(s) a bit unpolished. True, the faces can get repetitive, the close-ups can get boring, the horses can look silly, the action can get reduced, there are few moments of fan service, and the plans and predictions are somewhat hyperbolic. Fine, it’s not (Japanese) manga and it’s just yet another reinterpretation of an oft-visited historical period – but still, the series has its charms waiting to be appreciated: the poetic lines; the quotations of classical works; the clash of ideas and ideals with the brutal realities of war; the creative twists; and so on… Dare to Ask and Testify Prominent Pieces 0ch 1ch Greetings FOR THE PERPLEXED For those who just want to stick to Ravages, don’t wander off into the middle portion (past a bunch of Youtube embedded playlists) where many of the feeds are located. Be sure to check the headings of the links to the left to see which ones are closely related to Ravages. The (visible) followed blogs to the right are hardly related to Ravages. In addition, a few things related to Ravages can be found in the footers, mixed with other stuff. Oh, and do savor the music while figuring out where else to go. Contact Name(required) Email(required) Website Submission Agenda(required) Brief Summary Detailed Comment(required) Background(required) Almost little to no idea what Ravages is about Basic knowledge of Ravages Comfortable familiarity with Ravages A fan and student of Ravages Proficient in traditional written Chinese Image View This slideshow requires JavaScript. Another Poster {Jingkou} [?]: So this means the rebels in the Chuan region have long been colluding with the southeast? [?]: Yes. The Jing Province is on the brink of collapse after Huang Zu’s death. And as Cao Cao is poised to march south, [?]: the seizure of Jing will affect West Chuan as well, despite its […] Fellow Travelers Follow Blog via Email Enter your email address to follow this blog and receive notifications of new posts by email. Bulletin Character lists finally in fleshed-out form, to be updated when new people appear or are mentioned. Recaps on hold until a new arc has been scanlated. Chapter summaries are still suspended. Blog operations remain slow due to a temporary shift in focus to other projects (and offline matters). In case it’s not glaringly obvious yet, I want more people to answer my polls in the Inquisitor’s Corner. I’m also asking for comments and advice. And if anyone else wants to submit a testimonial or a review (or if anyone wants to join the blog as an author), feel free to get in touch. BONUS C Virtual Presence Just some advocate for the further appreciation of The Ravages of Time. Also interested in various topics and discourses (like conspiracies and yandere and communism and philosophy), but would wish to focus on Ravages without necessarily excluding other issues and matters, at least as far as this venue is concerned.
Mid
[ 0.6109725685785531, 30.625, 19.5 ]
Q: Webfont not loading on firefox I have an issue loading a font on Firefox. I keep receiving an error message even though I tried using a webfont. I am using it on Tumblr and uploaded the fonts via the theme assets. Here is the Error I get: Cross-Origin Request Blocked: The Same Origin Policy disallows reading the remote resource at http://static.tumblr.com/**/****/neona-webfont.woff. This can be fixed by moving the resource to the same domain or enabling CORS. neona-webfont.woff downloadable font: download failed (font-family: "neonaregular" style:normal weight:normal stretch:normal src index:1): bad URI or cross-site access not allowed source: http://static.tumblr.com/**/****/neona-webfont.woff Would anyone know a way to fix this issue? In advance, Thank you. A: I assume you don't have access to static.tumblr.com , if so there isn't a solution to your problem (that I know of). Reason: Firefox blocks cross-domain fonts by default, unless the server sends a specific header. This header can be send by adding this to the .htaccess file: <FilesMatch "\.(ttf|otf|eot|woff)$"> <IfModule mod_headers.c> Header set Access-Control-Allow-Origin "*" </IfModule> </FilesMatch> But without access to the font server, this isn't possible to do.
Low
[ 0.40961098398169304, 22.375, 32.25 ]
Main menu Taxes & Reminiscing Submitted by rob on Sun, 02/03/2013 - 00:00 I got my tax forms gathered in an effort to be a responsible adult. My videography related income this year far exceeded my expectations, which is to say that I will be claiming this work on my taxes. It would be fair to say that I didn't plan for this. I was lucky this year that people hired me to work on projects that A) I was interested in and B) could do. The last time I even came close to making money doing this was when I was part of a trio of gentleman who's office was in an elderly woman's basement. What we lacked in financial know-how, we made up for in sheer humor. Seems like it was only yesterday... I have no idea what this will look like, as I'm hardly a business professional, although I'm getting better every day. I will likely have to pay out, instead of recieve money. As always with tax season, I tell myself that my money will be going toward libraries and schools (two of the things I highly value in this society of ours). I know my portion gets spread thinly over many programs, but I prefer to think that two institutions that are supposed to be monuments to knowledge, will get the lion's share of my cut. It just makes me feel better. As of this writing, my two previously paid projects are complete (I hope) and I'm preparing the latest Victorian Cut-out Theatre for premiere. This episode is literally about the last scene of Jane Eyre, and consequently, may alienate some people. I hope that this doesn't happen. I hope that people get the references, or barring that, can enjoy it on its own. I chose to use this topic as the seed of the episode, because I find that story fascinating. I kind of view the ending as a bit of a cop-out, not unlike the end of Pretty in Pink. It's also a prime candidate for a "semi-Valentine's Day Episode". Nothing says love, like blindness and mood swings. Anyway, you may like to know that the second Victorian Cut-out Theatre commentary is live. It features my thoughts about VCoT: Eternal Kiss and a bit about the history behind the episode. Check it out. Also, new episode of Victorian Cut-out Theatre drops this week. keep your eyes peeled.
Mid
[ 0.5442764578833691, 31.5, 26.375 ]
A Lange & Sohne - Lange 1 Tourbillon Perpetual Calendar Share on Facebook Share on Twitter 0 Shares A Lange & Sohne Astonishing complexity and detail meet with calm simplicity and balance in this stunner, the most complicated watch ever produced in the emblematic Lange 1 range. The tourbillon, you’ll note, is not shown on the front -- an unusually understated act in watchmaking these days, but a brilliant one. Instead, there’s the ingenious peripheral month ring, the off-center dials, a beautiful moonphase indicator, and that tremendous outsize date display. The Calibre L082.1 movement inside is as refined and gorgeous a movement as you’ll find.
High
[ 0.72, 30.375, 11.8125 ]