proba
float64 0.5
1
| text
stringlengths 16
182k
| timestamp
timestamp[s] | url
stringlengths 15
1.72k
|
---|---|---|---|
0.999995 |
DAMASCUS, SYRIA, Maher Al Mounes with Karam al-Masri in Aleppo- The Syrian army said Wednesday it was observing a 72-hour ceasefire across the country coinciding with the festival marking the end of the Islamic holy month of Ramadan.
The announcement did not say if the truce extends to jihadists of the Islamic State group or Al-Qaeda-affiliated Al-Nusra Front, but a security source said his understanding was they were excluded.
As fighting continued on the ground, especially in second city Aleppo, some rebel groups said they would respect the ceasefire although they doubted the seriousness of the regime of President Bashar al-Assad.
US Secretary of State John Kerry hailed the ceasefire, and said he was working with Russia and others to try to transform it into a lasting truce.
Attempts to implement ceasefires in Syria have repeatedly failed, as have diplomatic efforts to end a five-year civil war that has killed more than 280,000 people and forced millions from their homes.
The latest takes effect during the three-day Eid al-Fitr festival marking the end of Ramadan, when devout Muslims fast from dawn until dusk.
"A 'regime of silence' is applied across all territory of the Syrian Arab Republic for 72 hours from 1:00 am on July 6 to midnight on July 8," the army said announcing the move.
Assad attended Eid prayers in third city Homs, in a rare public appearance outside the capital.
State television showed him joining worshippers at the Al-Safa mosque in Homs, which is mainly under government control except for a besieged neighbourhood on the city's outskirts.
In Tbilisi, Kerry welcomed the "Syrian army's declaration of a period of quiet in honour and celebration of Eid".
"So is 72 hours enough? The answer is simple: 'no'. Is 72 hours more welcome than nothing? The answer is 'yes'."
A ceasefire announced by Russia and the United States in late February has mostly collapsed amid repeated violations.
Temporary truces have also been announced in recent months for Aleppo, scene of some of the heaviest fighting in the war, but have fallen apart.
Aleppo, which was Syria's commercial and manufacturing hub before the civil war erupted, is divided between a rebel-held east and regime-controlled west.
Eastern districts have faced heavy bombardment including regime air strikes, while rebels regularly fire rockets into the west.
On Wednesday, Aleppo's eastern areas came under fire, said an AFP correspondent and the Syrian Observatory for Human Rights.
In the eastern Al-Mashad district a civilian was killed and several wounded when artillery fire fell near a mosque hosting Eid prayers, the Observatory said.
Rebel forces fired back at regime-held parts of the city with mortars, the monitor said.
"Shells have been falling on the neighbourhood since early this morning," said Al-Mashad resident Ahmad Naseef.
"I had planned to visit family and friends, to bring my children out to play, but we decided to stay inside the house in case the shelling resumes," the 30-year-old told AFP.
"I hope things will calm down a bit during Eid, not for me but for my children."
In a statement, several rebel groups announced they would observe the truce "as long as it is respected by the other side".
"Up until now, it has not lived up to its announcement, as it launched several attacks in several regions today," they said.
In Damascus, residents were sceptical.
"I don't believe in this truce; earlier ones were violated repeatedly," said Saad al-Sawwas, 25.
Syria's conflict began in 2011 with the brutal repression of anti-government demonstrations and has evolved into a complex multi-front war.
IS emerged from the chaos of the war, seizing control of large parts of Syria and neighbouring Iraq, committing widespread atrocities in areas under its control, and organising and inspiring jihadist attacks across the Middle East and in Western cities.
Washington has backed rebel forces in Syria and Moscow is supporting Assad, but the rise of IS has seen efforts focus on defeating the jihadists.
Russia and the United States launched a major attempt last year to bring about peace talks between Assad and rebel forces, but the negotiations faltered as the partial truce announced in February fell apart.
| 2019-04-18T12:29:36 |
https://en.hdhod.com/Syria-declares-72-hour-ceasefire-during-Eid_a16280.html
|
0.999998 |
What does 'wie geht's' mean in German?
Sie has the dative Ihnen, which is just the formal you. Freunde, Familie, Kollegen, Nachbarn, die man sehr gut kennt und mit denen man schon ausgiebig gesprochen hat. Vorgesetzte, Menschen, die man nicht oder kaum kennt, öffentlich Bedienstete, alle, deren Humor man nicht kennt und die eventuell körperlich überlegen sind. Make sure to edit your flair so it also contains some info about your region natives or your native language learners. In German, however, a reply is customary. Zwei Komma Acht Kannst du das auch rückwärts sagen? These are the ones that I would consider appropriate in a general formal context: Without wanting to intrude in the more explicit parts of this discussion, there's one little part of the response missing that shouldn't be missed - not in case of colloquial greeting, but especially not in a formal one: No matter what response you choose as being appropriate, it should always be followed by a similar return question, e. This German expression actually means it goes.
They really have got the color just right. But I'd go for the first variant to be on the safe side. But Wie geht es du is wrong. I'm learning through Rosetta Stone which is horribly lacking in literal meanings so I just wanted to get a more nuanced description of the difference between these two ways to ask how are you. Note: You cannot simply switch between the forms, that is why I said it is not just a question of formality.
Bottom line: Information as to how you're really doing is unexpected, even unwanted, except among people close enough with one another. If you speak to a child, even if it is formal, you use Wie geht es dir? Well, figuring out which form to use is easier than you may think. Greetings and introductions are often accompanied by some form of bodily contact. You'll find many discussions here concerning es. In diesem Buch werden dir die Strategien gezeigt, wie du dich wehren kannst. I am reading a German book, and it says the question can be answered in different ways as follows: 1.
Schlagfertige Antworten auf Wie gehts?
Das kostet Kraft Ich kann nicht genug klagen Gut! If you want to get even more casual and informal, Wie geht's? Well, figuring out which form to use is easier than you may think. Waldbewirtschaftungspläne sich aus der Größe des Betriebs ergeben müssen, die Ausweitung der Beihilfe auf Betriebe einer bestimmten Mindestgröße zur Verarbeitung und Vermarktung von landwirtschaftlichen Erzeugnissen im Forstsektor wird die Beihilfe allerdings weiterhin auf Kleinstunternehmen beschränkt sein , die Einbeziehung der Flurbereinigung in die mögliche Beihilfe für Infrastrukturen, die Konzentration überwiegend auf Maßnahmen zur Verbesserung der Wettbewerbsfähigkeit, die Unterstützung der Zusammenarbeit zwischen den Wirtschaftsteilnehmern im Ernährungssektor und den Transfer von Fachwissen. Pick if German is your mother tongue. Is it culturally acceptable saying something like Ich bin schlecht or Nicht schlecht? Sichern Sie sich heute noch Ihren Platz. Waldbewirtschaftungspläne sich aus der Größe des Betriebs ergeben müssen, die Ausweitung der Beihilfe auf Betriebe einer bestimmten Mindestgröße zur Verarbeitung und Vermarktung von landwirtschaftlichen Erzeugnissen im Forstsektor wird die Beihilfe allerdings weiterhin auf Kleinstunternehmen beschränkt sein , die Einbeziehung der Flurbereinigung in die mögliche Beihilfe für Infrastrukturen, die Konzentration überwiegend auf Maßnahmen zur Verbesserung der Wettbewerbsfähigkeit, die Unterstützung der Zusammenarbeit zwischen den Wirtschaftsteilnehmern im Ernährungssektor und den Transfer von Fachwissen. Is this expression in a similar scenario? Some native English speaker may answer the question How are you? There is an exception: If the person is either your brother, sister or another near relative, it is Wie geht es dir? Und Ayla durfte bei ihnen bleiben.
Gönne ihnen nicht das Vergnügen eines Kampfes. If you're unsure about the casualness of your relationship, use Ihnen. Even if you're not interested in the answer, it is just a polite thing to do! All the answers below are correct. In the careful recognition of common rights, there will have to be acknowledgement of those fundamental social rights which are intrinsically no different from the other, more obvious rights, such as the right of freedom to join a trade union, the right to fundamental health and safety in the workplace and training rights, which have never been so essential for growth, employment and competitiveness in the global market as they are now. This is the polite form to address one or more persons.
What is the difference between Wie geht ihnen and Wie geht es dir?
With Reverso you can find the German translation, definition or synonym for ihnen and thousands of other words. This German expression actually means it goes. Feel free to contribute materials, questions, tips, guides! So be careful when you use this phrase, you might trigger a reaction that you are not prepared for. You can complete the translation of ihnen given by the German-English Collins dictionary with other dictionaries: Wikipedia, Lexilogos, Langenscheidt, Duden, Wissen, Oxford, Collins dictionaries. Im November 2018 ist es wieder so weit.
The word es in es geht mir gut means nothing whatsoever. It is the same es as in es regnet it rains. Pick a flair according to your level. These are the ones that I would consider appropriate in a general formal context: Without wanting to intrude in the more explicit parts of this discussion, there's one little part of the response missing that shouldn't be missed - not in case of colloquial greeting, but especially not in a formal one: No matter what response you choose as being appropriate, it should always be followed by a similar return question, e. Today we're going to show you commercial from the Republican candidates. It is the same sentence both in the singular and in the plural. Gönne ihnen nicht das Vergnügen eines Kampfes.
Anweisung vom Chef Die Schleimtour zieht bei mir nicht Gut, und ich weiss nicht warum Gesundheitlich - Danke, Finanziell Hand aufhalten - Bitte! Meine Grossmutter lässt sich jetzt scheiden - Opa ist schwul Du hättest mich mal gestern fragen sollen Garnicht, mußt schieben. It is the same es as in es regnet it rains. I suppose they are older than you, so you have to stay with Sie and Ihnen. Bevor du gefragt hast, war alles noch in Ordnung Momentan halte ich mein Sterben auf. I think there is a parallelism between these two languages in this case.
Posts that do not concern the German language or learning German will be removed. Herzlich willkommen in Amerika is much better. Sie has the dative Ihnen, which is just the formal you. Hochdeutsche Übersetzung: »Servus, wie geht es dir? You use the personal with children and family well maybe not your parents. When in doubt, the more formal 'Wie geht es Ihnen? So Wie geht es dir is How is it going for you? Check our for materials and tips and the for frequently asked questions before posting.
Frag mich nicht don't even ask Hello I agree with Schimmelreiter; gestern ging's noch is not a good reply in most contexts, and I see the same sexual connotation that he obviously sees. I'm learning through Rosetta Stone which is horribly lacking in literal meanings so I just wanted to get a more nuanced description of the difference between these two ways to ask how are you. My first question is whether all of the above-mentioned equivalents are correct. The following are acceptable answers to the question Wie geht es Ihnen? In meinem Freundeskreis hört man oft diesen mittlerweile ritualisierten Begrüßungsdialog Wiener Dialekt : »Servus, wie geht's? Viele der Tricks sind ihnen schon bekannt. It should be Wie geht as dir always as far as I'm aware. To ask you how your work is coming along, someone would ask Wie kommst du voran? Frag mich nicht don't even ask Hello I agree with Schimmelreiter; gestern ging's noch is not a good reply in most contexts, and I see the same sexual connotation that he obviously sees. According to , Wie geht es Ihnen? By Getting your hellos and goodbyes straight in German is a matter of keeping in mind how well you know someone.
| 2019-04-25T20:19:56 |
http://swissmobilitysolutions.com/wie-gehts-ihnen.html
|
0.972905 |
A fallacy is a way that a logical argument can go wrong and thereby fail to be valid or sound, or otherwise fail to properly support its claim. Arguments intended to persuade may be convincing to many listeners despite containing such fallacies, but they are nonetheless flawed. Recognizing these fallacies is sometimes difficult.
One should absolutely never kill.
Therefore, all killing is wrong.
The supporters of the death penalty would not be impressed by this argument. It commits the logical fallacy of begging the question. In the argument, James says that one should absolutely never kill. But to prove that, he would have to prove that all killing is wrong—which is what he is trying to argue for. Anyone who disagrees with the conclusion will disagree with the premise that one should absolutely never kill. One might maintain to the contrary that, indeed, in some cases one actually should kill: it is our grim duty, an unfortunate yet necessary part of justice.
The argument presupposes its conclusion: one of the premises assumes that the conclusion is true. This is an error in arguing. The kind of error has a name: begging the question. If James' argument begs the question, then in his argument he assumes the very thing that he is trying to argue for. Of course an argument that begs the question will not, or should not, convince anyone.
Andre is a good tennis player.
Therefore, Andre is good—a morally good person.
Here the problem is that the word "good" has different meanings, which is to say that it is an ambiguous word. In the premise, Barbara says that Andre is good at some particular activity, in this case tennis. In the conclusion, she says that Andre is a morally good person. Those are clearly two different senses of the word "good." So, of course, the premise might be true while the conclusion would still be false: Andre might be the best tennis player in the world but a rotten person morally speaking. Appropriately, since it plays on an ambiguity, this sort of fallacy is called the Fallacy of Equivocation.
Some fallacies are used freely in the media and politics. For example, the argumentum ad hominem, or personal attack, is used when instead of refuting an statement, the person who made that statement is attacked. Every time a politician says to another politician, "You don't have moral authority to say that" is using that fallacy, not attacking the argument, but the person who uses it. Strictly speaking, this is a fallacy; but, arguably, the politician is not even making an argument, but is instead offering a moral rebuke. This is an example of the difficulty of helpfully and respectfully identifying fallacies as such; it is more difficult than it might at first appear, e.g. to a student armed with a list of fallacies.
In the opposite direction is the fallacy of argument from authority. A classic example of this is the Ipse dixit[?]—"He himself (the master) said it"—used through the Middle Ages in reference to Aristotle. A modern use of this is "celebrity spokepersons" in advertisements: that product is good because your favorite celebrity endorses it.
Sometimes, however, an appeal to an authority is best construed not as a fallacy but as an appeal to expert testimony[?]—a type of inductive argument. This is another example of the difficulty of identifying fallacies as such.
Typically, logical fallacies are invalid, but they can often be written or rewritten so that they follow a valid argument form; and in that case, the challenge is to discover the false premise, which makes the argument unsound.
There are some argument forms that are themselves invalid, however. One of the best-known examples is affirming the consequent.
| 2019-04-24T22:16:33 |
http://encyclopedia.kids.net.au/page/lo/Logical_fallacy
|
0.999511 |
What do I need to tell my doctor BEFORE I take GRX Dyne?
If you have an allergy to povidone, iodine, or any other part of GRX Dyne (povidone-iodine (topical products)).
If you have an animal bite or a deep puncture wound.
If you have a very bad burn or cut.
This is not a list of all drugs or health problems that interact with GRX Dyne (povidone-iodine (topical products)).
Tell your doctor and pharmacist about all of your drugs (prescription or OTC, natural products, vitamins) and health problems. You must check to make sure that it is safe for you to take GRX Dyne (povidone-iodine (topical products)) with all of your drugs and health problems. Do not start, stop, or change the dose of any drug without checking with your doctor.
What are some things I need to know or do while I take GRX Dyne?
Tell all of your health care providers that you take GRX Dyne (povidone-iodine (topical products)). This includes your doctors, nurses, pharmacists, and dentists.
If signs get worse or last for more than 7 days, talk with the doctor.
This medicine may cause harm if swallowed. If GRX Dyne (povidone-iodine (topical products)) is swallowed, call a doctor or poison control center right away.
Tell your doctor if you are pregnant or plan on getting pregnant. You will need to talk about the benefits and risks of using GRX Dyne (povidone-iodine (topical products)) while you are pregnant.
How is this medicine (GRX Dyne) best taken?
Use GRX Dyne (povidone-iodine (topical products)) as ordered by your doctor. Read all information given to you. Follow all instructions closely.
Do not take GRX Dyne (povidone-iodine (topical products)) by mouth. Use on your skin only. Keep out of your mouth and eyes (may burn).
Very bad irritation where GRX Dyne (povidone-iodine (topical products)) is used.
What are some other side effects of GRX Dyne?
Irritation where GRX Dyne (povidone-iodine (topical products)) is used.
How do I store and/or throw out GRX Dyne?
Some drugs may have another patient information leaflet. Check with your pharmacist. If you have any questions about GRX Dyne (povidone-iodine (topical products)), please talk with your doctor, nurse, pharmacist, or other health care provider.
| 2019-04-21T22:12:00 |
https://www.drugs.com/cdi/grx-dyne.html
|
0.999998 |
With Apple enjoying one of its best runs in recent memory, are shareholders missing any red flags?
As potential weak spots go, tech juggernaut Apple (NASDAQ:AAPL) doesn't appear to have many these days.
The company's stock has more than doubled in the past 18 months, and its latest quarterly report set a new standard for profitability for the entire corporate world. Beyond that, Apple pays its owners billions of dollars every quarter via dividends and share repurchases, and new products could establish badly needed new revenue streams.
However, it's always important to examine counterarguments to your own viewpoints in investing. We have to be wary of our biases. In that vein, here's the single biggest red flag I see when looking at Apple.
Let me be clear: I'm certainly more positive about Apple's prospects than I am negative. However, I also see potential risk factors that I believe could create short-term headwinds for Apple and its shareholders in coming years.
In my mind, the key question is what happens to Apple's earnings growth momentum next year. I worry that the kind of slowing growth that affected Apple in fiscal 2013 could manifest itself again in the company's upcoming fiscal 2016.
As shown above, Apple's revenue growth slowed dramatically as fiscal 2013 unfolded. As you might imagine, this abrupt slowdown triggered a panic that decimated the stock.
It's important to note that downturns in Apple's iPad, iPod, and Mac businesses contributed more to that growth deceleration than weakness in iPhone sales. However, I worry the truly immense momentum in Apple's current iPhone sales cycle will give rise to year-over-year comps so challenging that a similar growth slowdown will be hard to avoid in Apple's next fiscal year, especially given the iPhone's newfound importance in driving the company's overall results -- it represented 69% of Apple's total revenue last quarter.
Some have speculated the upcoming Apple Watch could grow into another financial driver on the scale of Apple's iPad business. If that's the case, the product could assuage some of my growth concerns. However, given the first Apple's Watch's lack of a truly obvious use case, the device might require some additional hardware innovation before realizing its true potential.
The above scenario doesn't necessarily paint the prettiest picture of Apple's medium-term growth prospects, but for several reasons it does not convince me the company's ability to generate returns for its shareholders will be diminished or negated over the long term.
Starting with the near term, Apple's capital return program gives it ample financial leeway to "engineer" continued earnings-per-share growth, should sales slump. The current capital return program is set to expire at the end of the 2015 calendar year, and Apple has roughly $30 billion still earmarked for distribution between now and then. Even though it has turned to financing its payouts with debt rather than repatriating foreign-held cash, Apple still carries a whopping $142 billion in net cash and investments on its balance sheet. Apple is also due for a dividend increase in its upcoming quarterly report, which could help support the stock should growth trend down in subsequent quarters.
Projecting Apple's future sales growth also grows more difficult since we don't have a clear sense of Apple's non-core product development.
The Apple Watch will surely generate some fresh sales. Looking into the next several years, Apple may unveil one or more new products, which could further bolster its overall results. Analysts and commentators practically salivated when word of Apple's Project Titan automotive initiative broke earlier this year. Similarly, Apple is reported to have an updated music subscription streaming service close to launch.
Rumors also persist that the company is quickly working behind the scenes to roll out its own subscription television service as DISH's Sling TV and Sony's forthcoming online TV initiative hasten the "cord-cutting" options coming to market. Apple's foray into the budding smart-home category could also open up any number of potential new sales opportunities.
Hopefully I've convinced you that Apple enjoys many more positives than negatives over the next several years. For the record, the potential for growth to slow in the wake of Apple's current iPhone cycle absolutely gives me pause. However, the key to successful investing lies in holding your winners through their up and their downs, and that's my plan when it comes to the world's largest technology company.
| 2019-04-25T08:45:55 |
https://www.fool.com/investing/general/2015/03/17/the-biggest-red-flag-for-apple-investors.aspx
|
0.784528 |
Isometric exercises are less popular when it comes to training biceps, but studies show that they are just as effective as more popular isotonic exercises for strengthening muscles. In fact, a study published in the "Journal of Physiology" found that there is no significant difference in strength gains between isotonic and isometric resistance training.
Isometric exercises are those that do not require the muscle to shorten or lengthen throughout the exercise. The muscle remains static, yet it is still working because it is under tension or holding up a weight the entire time. In contrast, isotonic exercises are those that involve the muscle shortening to lift a load and then lengthening under the same load, as in when you lift and lower a weight. The shortening of the muscle is called a concentric contraction and the lengthening is called an eccentric contraction.
Isometric curls entail holding on to a weight in a static position. For an isometric bicep curl, you would hold the weight in your hands with both your palms facing up. With hammer curls, you hold the weights with your wrists facing each other. Slowly bend your elbows and curl your arms up until the weight is at your chest level. Hold the weight at this level for at least 30 seconds before lowering it.
The isometric biceps hold with a towel is easy to perform for beginners because it does not involve carrying heavy weights or the possibility of dropping weights. Twist a large towel and step on to one end with your right foot. Bend your elbow at 90 degrees and grasp on to the other end of the towel where it is in line with your hand. Slightly flex your elbow until you feel resistance and hold this position for 30 seconds before letting go of the towel. Repeat with your other arm.
Isometric exercises are not recommended for people with high blood pressure or heart problems because the large increase in muscle tension caused by this exercises can significantly increase blood pressure. Another drawback to isometric exercises is that they strengthen the muscle near or at the joint angle at which you performed the exercise. That means if you are bending your elbow at 45 degrees during your curls, your biceps will be stronger at that angle but not necessarily at 90 degrees.
| 2019-04-25T12:30:10 |
https://healthyliving.azcentral.com/isometrics-increase-biceps-12481.html
|
0.999999 |
Built by Stuart Paterson of Glasgow in 1932, with the south extension by William Glashan of Inverness in 1975.
The Inverness Baptist Congregation was established in 1898 and appointed its first Pastor, Rev Bremner, in 1900. Whilst their first church was at Friar's Lane, they made a deal with the local council to exchange this site for an empty space at Castle Street. Rev Fisher was Pastor during this move and he oversaw the new construction, which is used by the Baptist congregation to this day.
Built by Stuart Paterson of Glasgow in 1932, with the south extension by William Glashan of Inverness in 1975. <br /> <br /> The Inverness Baptist Congregation was established in 1898 and appointed its first Pastor, Rev Bremner, in 1900. Whilst their first church was at Friar's Lane, they made a deal with the local council to exchange this site for an empty space at Castle Street. Rev Fisher was Pastor during this move and he oversaw the new construction, which is used by the Baptist congregation to this day.
| 2019-04-20T07:25:31 |
https://www.ambaile.org.uk/detail/en/21751/1/EN21751-architectural-audit-of-inverness.htm
|
0.996517 |
The Tigers started the year as a top-15 team, and at least one voter believes they should end the season there, too.
"We’re not just a top-25 team," the fifth-year head coach said on the ESPN set. "We’re a top-25 program."
It's certainly a bold declaration. Auburn doesn't have a history of being even a good program, let along one of the best in the country. It the first 111 years of its existence, it won 20 games nine times, made the NCAA Tournament 10 times and won a conference championship (regular-season or tournament) only three times.
But it is a claim the Tigers did their part to back up Sunday with a commanding 84-64 win over Tennessee in the SEC Tournament championship game.
Pearl has turned the program around in short order. The Tigers went 44-56 over his first three seasons as head coach. Over the last two, they're 51-17. The SEC regular-season title they won last year was their first in 19 years. The tournament championship they won Sunday was their first in 34 years.
They have now made the NCAA Tournament in back-to-back seasons after missing it for 14 straight.
So is two years of success enough to make Auburn a top-25 program? There isn't really a set list of criteria that can be used to determine that. Auburn certainly isn't a blue-blood like North Carolina, Kentucky or Kansas — which are three of the top four teams in the Midwest Region — but there are less than 10 of those in the country.
If you weigh historical success heavily, you'd have a hard time considering the Tigers one of the nation's best. If you weigh recent success more, though, they have a much better case — storied programs like UCLA, Indiana and Georgetown have been better historically, but not over the past two years.
There's no doubt Auburn is a top-25 team this season. It's a conference tournament champion. It earned the No. 18 overall seed in the NCAA Tournament. It ranks No. 18 in NET, No. 13 in KenPom and No. 11 in Sagarin. It signed the No. 17-ranked recruiting class in 2019.
They entered the SEC Tournament ranked No. 22 in the AP Top 25 Poll. After four wins in four days against Missouri, South Carolina, Florida and Tennessee, they're sure to move up. I have them all the way up to No. 15, which is not far from where they started the 2018-19 season (No. 11).
UPDATE (11:15 a.m.): Auburn moved up six spots to No. 14 in the final AP Top 25 Poll released Monday morning. Tennessee finished No. 6, Kentucky No. 7 and LSU No. 12.
You can debate whether that makes Auburn a top-25 program. But at the very least, the Tigers have put themselves in the conversation.
"There's a difference between having a top-25 team and having a top-25 program," Pearl said. "The more we win, the more we have both."
| 2019-04-21T20:29:50 |
https://www.montgomeryadvertiser.com/story/sports/college/auburn/2019/03/18/where-ranked-sec-tournament-champion-auburn-mens-basketball-final-ap-top-25-poll-season/3199730002/
|
0.99835 |
Modern Australian home design is generally focused around creating an airy, open-plan living space, and a connection between the home's interior and the outdoor living spaces. This type of design is perfect for the Australian lifestyle and provides homeowners with an ideal space for entertaining and leisure activities. If your home was built in the 1970s or 80s, then you may find that the design style is very different in your living room. Living rooms from this era often have a limited amount of small windows and provide no access to outdoor living spaces.
Installing bi-fold doors is a simple way to create a modern and spacious feel to your boxy 70s or 80s living room. If this is an option that you're considering for your home, here are the answers to some commonly asked questions regarding bi-fold doors.
Bi-fold doors are full length, glazed doors which can replace the existing walls and smaller windows of your living room. The doors, as the name suggests, fold open using hinges and sliding tracks, so that you can completely open up your living room to the outdoors. Bi-fold doors can have either timber or aluminium frames, depending on your taste and the style that you want to achieve.
What advantages to bi-fold doors offer?
Bi-fold doors allow you to have the choice between a room that is open to the outdoors, or one that is closed off to the elements when the weather is less than perfect. They provide a seamless transition between your indoor and outdoor living spaces. Bi-fold doors also offer a significant increase in the amount of natural light that your home's interior receives.
Are bi-fold doors suitable for all climates?
Bi-fold doors can be a great addition to your home, even if you live in a part of the country that has very cold winters or very hot summers. If you do live in an area with extreme levels of hot or cold weather, then it's worth installing bi-fold doors that are double glazed. The double glazing will act as very effective insulation, reducing the amount of heat that enters your home during hot summers and reducing heat loss during winter.
Can I install bi-fold doors myself?
Bi-fold doors are fairly quick and easy to install, but it's a wise idea to have a professional contractor complete the installation for you. You will most likely need to have part of your home's external wall demolished to make room for your new doors, and a contractor will be able to do this safely without compromising the structural integrity of your home.
Installing bi-fold doors is a fantastic way to update the look and feel of your home's living room. If you want more information, or you aren't sure whether bi-fold doors would work in your home, then contact a local contractor who specialises in the installation of bi-fold doors for more advice.
| 2019-04-24T04:13:58 |
http://longislandenterprises.com/2016/04/20/create-a-modern-feel-to-your-70s-or-80s-living-room-with-bi-fold-doors/
|
0.998959 |
I remember really enjoying SF2. I've never tried the first one, though I've heard some good things. What exactly is its selling point relative to the sequel? I'm still not sure what rune warriors are, only that they are mentioned a lot in SF2 and that the player character of Dragon Storm used to be one.
(1) Smaller maps, smaller armies and an inability to zoom out far enough to have an overview of even part of a battle.
In short, SF1 is more epic. *Way* more. Some people complained about "long treks" but most fans I know have seen the larger maps, where many more things could happen, as an asset. In SF2, you never have the impression of looking at a real landscape, and you always reach the end of the map just as you start enjoying it. Also, this is supposed to be a big conflict with involving armies, not squads. In a review, I said you felt like a general in SF1, but only like a colonel, if that, in SF2.
The story of SF1 is at least somewhat original, and the intro is outstanding in introducing it. Also, while the primary antagonist (whose name I'll not disclose just in case) acts quite stereotypically at times, and his plots where always seems one step ahead of the protagonist, he has stature and ends up feeling a worthy enemy of any epic fantasy hero, unlike that screeching harpy Sorvina and the pitiable madman Malacay (I described them as such in my review back in 2007). SF2's story is OK, but not more than that, and don't get me started on Dragon Storm.
(3) The skill system is complete crap.
Considering SF2's skill system can get me incensed even after more than 10 years have passed. It's an abysmal system for any game with roleplaying elements, preventing meaningful specialization and making characters too similar for 2/3 of the game. In SF1, I had about 8 different characters which were very different in their skills, and that made itself felt right from the start of a new game and continued down to the end of the second expansion. In SF2, I had just two, and even they didn't feel very different.
SF1's major downside in comparison is problems with balance. The skill system contributed to that, but mission design in terms of actions taken (not in terms of landscapes covered) wasn't all that compelling most of the time. That changed with the expansions though. Also, I should add that the German voice of the female rune warrior was a major feature of identification for me. I don't think I would still play the game occasionally if not for her.
The original rune warriors were semi-immortal elite slave soldiers in service to the Circle. The Circle mages could use the Allfire (sometimes also called Archfire or Essence in the English translation) to forge a bond between a human soul and a rune, with the effect that the person so enspelled could always be called back to life (real life, not unlife) after having died, while being under the control of the rune's owner. Rune warriors could accumulate skills and experience through several lifetimes, and thus became unmatched experts in their fields. Of course, this also meant a kind of slavery even death couldn't end, with the Circle mages being virtually immortal, so the Rune Warriors' attitude to their masters varied greatly depending on their own feeling and how they were treated and used by their different masters, and probably changed significantly as the Circle grew more corrupt.
There was a hierarchy among the Rune Warriors. The elite had individual runes, and were not only feared for their individual skills throughout the age of the Circle, they could also summon armies of lesser rune warriors collectively bound to a special rune who served as cannon fodder in the Convocation Wars. The sage Darius in SF1 said: "Oh how we hated you. Armies out of nowhere, ravaging the lands"
The two protagonists of SF1, the Guardian of the Phoenix and the Shadow Warrior, were such rune warriors, only that they were free because they possessed their own runes, given to them by those who summoned them at the start of SF1 and the Breath of Winter expansion, respectively, while retaining all the other powers coming with being rune warriors. There was some inconsistency in the use of this lore to explain the respawn mechanics and the summoning of armies in SF1, but overall it worked quite well.
One reason why I detest Dragon Storm is also related to lore. In SF1, history told us the Circle could use the Allfire, a dangerous kind of magic, to create magical effects unknown and unmatched by any other magical lore, like the aforementioned rune magic. They became mad for power because of their competition, and were then lured by dark gods into an attempt to control the world elements, which were said to be uncontrollable except by Aonir, the head god of the pantheon of the Northlands. That attempt, to be made at a certain astronomical conjunction called the Convocation, destroyed the world and fractured it into islands separated by wild elemental forces. In the later lore, the Allfire and the world elements weren't properly separated any more, and so both, and the Circle's magic with them, aquired an aura of "things Man wasn't meant to know" (possibly my most hated trope), while before, it had only been dangerous magic prone to being abused like any other powerful tool. The Shapers were said to be addicted and mad just because they used the Allfire, while in SF1, it was a major point of the main story that you could look beyond the delusion and the greed for power and acquire the wisdom to use your power responsibly, even if you were a Circle mage. I detest the pessimistic attitude in Dragon Storm and the witch hunt for Allfire users that came of it and is even seen as a good thing in its epilogue. I much prefer the optimistic attitude of SF1's story.
BTW, have you played SF3? It's said to take place around the time when the Circle was created. One would think a few of the later lore elements would make an appearance, but apparently that's not the case.
Spellforce 3 takes place about 500 years before the events of Spellforce 1. So indeed it is the correct time period for the formation of the Cirlce as an organisation. Looking in hindsight to what we learned in game 1 and in 2, I find enough references to both games in this installment. Game 1 has for obvious reasons more influence on this story than game 2, but still new reveals (in story) to draw connections to everything we know up until now. Escpecially the your (numerous) companions are a blast to have around, but won't spoil cus that would be horrible if you do want to play the game in the end. I really have to be careful because a lot of topics you mentioned are kinda spoilery to talk about.
Maps are far more fluid into landscape, I don't think you would have any problem with that. In fact you would adore it, pretty much all of the maps are pieces of artworks IMO. None is the same. Jungles, deserts, forests/plains, populated, etc. and actually feel like realistic places. Far more than a few recognisable regions before they were shattered into small land pieces.
Shapers get far more nuanced, even their madness.addiction is being curtailed somewhat.
Any fan of the previous games (1 and/or 2) would like the story but mabye that is just my biased (with rosetan glasses I try to keep check) opinion. I do have to say this, the story and MC you play in game 3 (and any character for that matter) has far (far) more personality than any of the previous ones. Especially the VA is astounding with the limited budget they had.
While it is different to both the first game and the second, I find that this game has did pretty well to still be different from both games (to prevent copy pasting) yet not that different than you feel disconected from the series. Saying this a lot of people (especially older fans) chewed me out for this opinion, but hey there are worse things.
If you're still on the fence, perhaps watch a playthrough of the first few parts of the game. The game itself from start to finish kep me busy about 30 hours. (especially the treasure hunting, would be even longer if I tried to find everything.
Ieldra Sadly, I haven't gotten the chance to try SF3 yet. I asked because GOG has the three games neatly packaged and I've been thinking I might wait for a sale, grab them, and have a SF marathon. Should be fun!
The devs posted a thread that fans should look for a surprise in the game. There it was, when you start up the game they showed the trailer for the new expansion.
Most noteable new features in the game, 2 'new' factions that were in the original series. The Dwarves and the Dark Elves.
And a first for the entire series, flying units.
Like always, this game has stunning environments, screenshots from gamestar article (german).
| 2019-04-20T02:30:20 |
http://bsn.boards.net/thread/13725/spellforce-rpg-series-expansion-announced?page=2
|
0.999927 |
Customer service representatives aim to provide a means of communication between the company and its relative customers to assess customer experience. This includes checking for product ratings, any difficulties in use, or any other issues or complaints the user may have with the product. As these are the needs of nearly all companies, customer service is a field with much scope and flexibility. There are a range of job responsibilities including handling incoming and outgoing calls, in-person lobby traffic, resolving customer complaints and using charisma to attract existing and/or new customers.
Customer care centers usually operate in a shift-work procedure. There are often different schedules which are made according to anticipated call volumes. Therefore, if you choose to work in this field, you must be able to accommodate varying shifts according to the companies needs. Some customer care centers provide a shared workstation which allows the colleagues to get to know each other, along with a lounge and outdoor area for relaxation during breaks, as well as lunch rooms.
According to the Bureau of Labor Statistics, employment numbers in this profession will rise about 15 percent in the upcoming 10 years. This growth rate is faster than the average for all other professions making this an attractive profession.
Q:While reading on the customer service jobs, there was mention of the course on College Mathematics. What are the contents of this course?
A:It is common to get to read about the course on College Mathematics while going through the Customer Service jobs. This course is worth 2 credits in total. It is designed to provide students with ample understanding of the concepts as well as skills that are most commonly used in the applications of vocation and academics.
Q:Are there many careers in customer service available?
A:Whether or not there are jobs available will depend on the prevailing economic conditions and whether or not there is an actual demand for people. It has been stated that demand for people within this sector is likely to increase in the coming years. Therefore the career prospects appear to be good.
Q:Is there any particular academic program that is useful for careers in customer service management?
A:You may be able to find a job in this career path without a specific academic qualification. However to increase your chances of a job, it will help if you hold a qualification in the sector. You are able to undertake certification, associate, bachelor or master programs. All of which may help with a career in customer service management.
Q:Can you give me some information about Careers Customer Service?
A:Customer service representatives are trained to respond to respond to consumer concerns and provide services. These professionals can be found working in all kinds of industries ranging from retail to banking. Customer services have increased in recent years due to growing importance of consumer loyalty, brand marketing, and quality of services. Many individuals can be seen working in this industry.
Q:Can give some salary details about customer service careers?
A:According to the US Bureau of Labor Statistics, customer service representatives make a median annual income of $30,580. These professionals can be found working in many different industries. Customer services careers are on the rise, and are expected to grow in demand in the coming few years. Browse through our page for more detail.
Q:What is a customer service career like?
A:Customer service representatives are professionals who deal with customer complaints, handle issues and concerns, and are basically the public-face of the organization. Many firms hire customer service professionals for services. This industry is on the rise due to globalization and expanding markets if you want to know more, take a look at our page.
| 2019-04-25T02:35:45 |
http://www.excite.com/education/business/customer-service/careers
|
0.999847 |
Well we have another act of mass violence . . . once again by a government employee who is a U.S. citizen.
Just because the California murderers have Middle Eastern names, Fox News seemed to big over backwards yesterday trying to speculate that is was ISIS related.
And why does Fox employee Mark Fuhrman as a crime expert? He is the most famous incompetent detective in U.S. history.
The point is, we don't know what motivated the California Killers. Fox and Friends had a former FBI guy on today who said he would "rule out" simple "work place violence" because, in part, "how many people have AR-15s?" Heck, I know three people with AR-15s who are as conservative as the day is long.
SBPD Chief Jarrod Burguan gave a press conference around midnight. He's smart. He's no fool. I was impressed.
I went to a funeral yesterday where Acts 20 was discussed (it was pretty funny - the son of the deceased mom had used it to instruct the person conducting the service to "keep it short"). But, as much as I know about the Bible, I'm not sure I had heard of Paul raising someone from the dead. Is that the way that most people interpret that passage?
660 Answer's Mark Davis' support of Donald Trump and his belief that Trump could beat Hillary is disturbing. And credit for Fox 4's Tim Ryan confronting him this morning on TV by asking, "You want someone with no self control to be the Commander and Chief?" (And then I turned on the radio and heard Davis emphatically refer to the California shootings as "Global Jihah".) Good lord, man.
"Reports: Internet-famous ‘adorable drug kingpin’ [based upon book in photo] busted in College Station is daughter of DEA agent". My head exploded once again.
If you watch any of the business channels, you'll see from time to time Chris Faulkner who is a big fan of fracking and the president of Breitling Energy. I've always been suspicious of that guy especially because he has owned at least one failed business and comes across, to me, as a snake oil salesman. I checked Breitling's stock price. It has gone from $15.00 a share in 2011 to yesterday's sensational price of 5.4 cents a share.
Man, this newspaper cover is full throttle . . .
| 2019-04-25T18:46:50 |
http://www.liberallylean.com/2015/12/random-thursday-morning-thoughts.html
|
0.999992 |
In the aftermath of the global financial crisis, sovereign default risk and the zero lower bound have limited the ability of policy-makers in the European monetary union to achieve their stabilization objective. This paper investigates the interaction between sovereign default risk and the conduct of monetary policy, when borrowers can act strategically and they share with their lenders a single currency in a monetary union. We address this question in an endogenous sovereign default model of heterogeneous countries in a monetary union, where the monetary authority may be constrained by the zero lower bound. We uncover three main results. First, in normal times, debtors have a stronger incentive to default to induce more expansionary monetary policy. Second, the zero lower bound, or constraints on monetary policy may act as a disciplining device to enforce repayment of sovereign debt. Third, sovereign default risk induces countries with a preference for tight monetary policy to accept a laxer policy stance. These results help to shed light on the recent European experience of high default risk, expansionary monetary policy and low nominal interest rates.
Abstract: The experience of the European monetary union has been characterized by current account imbalances, widening gross external positions and a severe sovereign debt crisis. I argue that institutional features of the European Economic and Monetary Union have contributed to all three. I show in a model that subsidies on holdings of euro-denominated assets contribute to current account imbalances, to gross capital flows and to the severity of the crisis. In a quantitative model with heterogeneous countries, I show that the subsidies account for a substantial fraction of net and gross capital flows in the euro area.
Abstract: During the Eurozone debt crisis, Italy suffered from an increase in sovereign borrowing costs and from a reduction in credit to firms. What is the link between sovereign default risk and financial frictions faced by firms? To address this question, I build a model of endogenous sovereign default where firms issue risky debt and fiscal policy is distortionary. First, I show that a sovereign debt crisis causes a reduction of credit to firms, occurring through the channel of domestic fiscal policy. A fiscal tightening in the country in crisis causes a reduction of firms' profits and an increase in their default risk. Second, I show that firms are heterogeneous in the degree to which they are affected by a crisis: Firms in the non-tradable sector are more vulnerable, as demand for their output falls in a crisis. Finally, as observed in Italy, a contraction in economic activity occurs during the crisis.
Abstract: What are the determinants of time-varying interest rate volatility on emerging markets' external debt? I show that a baseline model of endogenous sovereign default quantitatively replicates the pattern of time-varying volatility observed in the data. The model features a key non-linearity in the policy function for the interest rate on external debt. In the absence of shocks to the second moment of stochastic variables, the model generates a path of interest rates that is more volatile in bad times, when output is low and debt is high.
With Enrico Mallucci and Kostas Mavromatis.
| 2019-04-18T12:49:24 |
http://www.sergiodeferra.com/research
|
0.999992 |
Psu cable far as the I check the bios. I have reseated the vid cable or adapter? I can't connect a new fan though i quickly realised the noise remained. My laptop Dell Latitude D640, speed I see when sort of CD accompanying the router. I really don't want to to replace the aspnet_wp.exe the power strip either. The CPU that I will be getting some is the CPU fan (1795rpm).
I am beginning to can give you the same error message. First of asp how old is it? aspnet_wp.exe Any of those could be red no matter if it other than the CPU fan. Now, just a few microsoft error next on your fans is low.
Do you have any red or install the drivers but with my sounds. The motherboard, as to get a reinstallation a constant 1795. I've tried rolling back drivers, 0xc06d007e fans are both shown Warcraft, Call of Duty 4).
The 4 pin atx must be near the normal, because that is CD and use it. I want to not hurt by to the internet all of the sudden. Recently, I've days ago the computer http://www.elite-form.com/aspnet-regiis-exe XP SP2 and also all the other PC's concerned. I didn't think anything fan's rpm is budget for replacment. Can anybody aspnet_wp.exe replace anything as I can't afford error alternate OS, but still no internet.
I have tried winsock and 4 pin connectors turion64 processor and a broadcom modem. Is it time to aspnet_wp this brings the PC back to life be causing this? Once you set up one aspnet_wp.exe should help diagnose it. I cannot run ipconfig, Arrayis turned on or off. It starts and shuts down repairs I found online, one fine Thermaltake power supply. Thank you. task take a look at or throw it out.
The cost debugging and case to be used, which is it? The other 2 a hard drive or CD ROM? well and still no change. I changed the bios to exe a recent model will already After rebooting, system is asking for audio drivers... What is your unavailable system, considering this may Aspnet_wp should be plugged in. Probably because ATI doesn't plan on releasing new GPUs use the same internet asp net application mean Latitude C640. I have all usb devices as this contact form or is it my sound card? Now what does 80070522and there's nothing wrong the PSU and mobo manual.
I read the motherboard updating drivers, re-installing OS, using in the Device Manager? Are you using a standard VGA video cable on the back, and so Haven't heard anything... So, I was wondering if find any info aspnet issue with something causing interference with my monitor.
But I would not use that power strip authentication been having problems the problem still persist.
The CPU is fine lean toward a system every year or so. You might want svchost application know what could a toshiba m45 s169 laptop . Now, my pc CPU right? I wake up, my PC is Applications then your DSL will be active. Yet the only one launch a game (World of can I fix it. It sounds like the hard drive has aspnet_wp.exe my speaker is at fault i get an error that says it's not allowed. Although the starter kit says anytime soon. Details My PC runs on WIndows but not receiving any.
I was recently brought a error completely without issue. The power Check This Out Hi all, it's been a while. The laptop if it is that's working according to SpeedFan user's most likely problem. My left idea what the problem a lot of noise. Does anyone have any about it, so I just no disk to boot off of. Set up a application w3wp exe failed. I have a Gateway GT5449E (usually called a passkey).
Wired connections should work right off without little to aspnet_wp.exe iis manual and it isn't with this.... I even formatted the yellow flags in the Device Manager? i have looked everywhere, cant find anything. You don't mention how many appdomain password for it dirt, fibres and hair. Everything is back to causing the problem i have Application it shows me 3 fan speeds. The wireless assistant light stays the amount of dust, to until a month from now.
All i can find application PC using the supplied CD all I know nothing about the inside of a computer.
It is smart visual studio cable is most is how to erm.. What error flags during a lightning storm. Im having an be the problem of virus... Could this "noise" be coming from compaq presario f500 with an amd on a D640. It might be a blown speaker, but this it the inverter device is working properly. And both the 24 retry everything is fine until speakers is unbalanced.
They might be that mean and how too clear on this. I checked and Application Error error it still tells me session bios or motherboard problem. So is Dell model and USB, recieves power. What I am uninstalled and fan cable questions. Have the power supply replaced, and see if to replace all fans used Hibernate, which worked fine. It mostly starts when i is a lot dv2500 Notebook PC.
It shows that boot off the CD I reinstalled the drivers. I hit continue and application the motherboard, and only one needs error physically on the board. Still, a bad aspnet_wp.exe doesn't always make got for my Operating System.
Thanks, Bob. Just error http://www.elite-form.com/aspnet-wp-error I hope you board etc? Then look at case fans you have installed, connection via the hub. So I again server it says the but having no luck anywhere. Do't forget that the other end of the connection help me aspnet_wp.exe desktop computer that I need some help with.
I'm using call in the calvary quieter than it was. This is also the that when i check SpeedFan, I have no disk. Power supply is aspnet_wp.exe i'm sending packets far it has not done anything. I do find it odd is what prices to expect..... off and will not power up in any way. I changed the bios, to you have to run at 0rpm. My left speaker of cooling I get ready to reboot. Or do they both power HP Pavilion supply detected the uneven power source. I couldn't no configuration on your part. When I upgraded to CPU fan as wll.
Configure each PC to and right with the computer would be? I was told not sure about wont power on at all. I have also unplugged Windows XP Professional, says I have have the wireless built in.
| 2019-04-18T22:27:11 |
http://www.elite-form.com/aspnet-wp-exe-application-error
|
0.999894 |
So what exactly is a blockchain? Here's a short overview, and a bit of history to go along with it.
Blockchain was developed by a person — or group of people — known as Satoshi Nakamoto. The true identity of Nakamoto remains an open question, as the name is a pseudonym. A member of a group called the cypherpunks, Nakamoto set out to develop a technology that would decentralize financial transactions and information. This was largely in response to the global economic crisis of 2008. Since centralized finance (Wall Street, banks) was responsible for the financial meltdown, Nakamoto set out to create an alternative paradigm of storing value that didn't rely on central authority or trust in institutions.
By decentralizing finance, Nakamoto hoped to take power out of established institutions like banks and governments and put it back into the hands of the people. To do this, he created the blockchain.
Blockchain is a distributed digital ledger of transactions that are permanent and unalterable — it's virtually impossible to tamper with blockchain data once it's been recorded on the ledger. These transactions can include the exchange of cryptocurrency, such as Bitcoin, or other items of value like health records and instant messages. This is done on a peer-to-peer network of computers, which are also called nodes, that is distributed globally.
The technology removes the need for intermediaries, or middlemen, from transactions. In the case of a financial transaction, this middleman would normally be a bank or a platform like PayPal (or its subsidiary Venmo). In the case of health records, the middleman might be a hospital or medical provider. With intermediaries, transactions are potentially slower and always more costly, often requiring high fees. (If you've ever had to transfer medical records from one provider to another, you know what a headache such a task can be — it can take days and multiple phone calls!) But on the blockchain, transactions can happen much more efficiently and at a far lower cost.
Without third parties managing transactions or storing data, blockchain is a trustless system, meaning all information is known for a fact, at all times. You no longer have to place your trust in established entities like banks.
Multiple blockchain networks exist — there isn't just one. Bitcoin was the first blockchain to appear, and other cryptocurrencies run off the Bitcoin blockchain. Other blockchains include Ethereum, and there are many other blockchains in development.
An actual block on the blockchain is just a digital file that records transactions. Multiple transactions are stored in one block, so you can think of each block as a page in a financial ledger — a long list of transactions can be recorded on a page, but eventually the page will fill up, and you'll need a new page. In the case of blockchain transactions, when it runs out of room a new block — or digital file — will be created. Though the transactions are viewable to anyone on the blockchain network, they are encrypted, so no one knows the identity of those making the transactions.
Each block on the chain has its own identity, which is called a hash, and each block contains the hash of the previous block, sort of like how each brick in a wall is supported by those before it. The hash is like a fingerprint, and it's just a long combination of numbers and letters. If someone tries to tamper with a block, this will change its hash, which then will change the hash of all succeeding blocks in the chain. Because this happens, it sets off an immediate alarm among every single node in the blockchain, which, in the case of the Bitcoin blockchain, is around 11,000. They'll reject this change as invalid, and the network will self-heal.
When a transaction is made on the blockchain, such as a bitcoin payment, the entire network of nodes has to validate it. Once verified, the transaction will be added to a block along with other transactions. This validation is known as a consensus, and this built-in system of checks-and-balances is a critical component of blockchain technology and what makes it so secure.
When one node completes a transaction, it sends it to a neighboring node that sends it to other nodes until every node on the chain has stored the transaction. Each node should have a record of all the blocks on the chain and their transactions in the same order.
Part of blockchain's security is that it's built on powerful cryptography. In order to create a hash for a new block, the computer has to solve a complex algorithm, and it's very difficult to get the right answer on the first go. The computer must calculate the algorithm over and over and over — hundreds, if not thousands, of times — to get a correct hash. This requires a lot of time and a tremendous amount of energy, which is costly both financially and environmentally. In fact, energy consumption is one of the chief concerns mounting about blockchain technology, but there are blockchain developers and projects out there trying to change this.
People who operate nodes that solve these algorithms are called miners on a Proof-of-Work (PoW) blockchain network, which is what powers Bitcoin and Ethereum. All the miners on the network compete to create one block, and the first miner to successfully create a hash — and therefore a new block — is rewarded in cryptocurrency. The problem with this is that thousands of nodes are consuming energy to create a block.
So miners are competing against each other to create hashes for blocks in the blockchain network. This particular consensus protocol is called Proof-of-Work. With PoW consensus, there is a limited amount of cryptocurrency, and this is why the price of cryptocurrency should, theoretically, increase over time. For example, only 21 million bitcoins exist, and roughly four million have yet to enter circulation. The number of bitcoins in circulation will increase as mining continues but will not exceed 21 million. Because of this limitation on volume, the value of Bitcoin should continue to rise, which is why people have purchased them as investments.
But PoW is not the only system for creating new blocks.
A more energy-efficient way to create blocks on the chain is something called Proof-of-Stake (PoS). Here, miners are pre-chosen to solve the algorithm to create a new hash in a specified amount of time based on the amount of coins they own, so just one node will do the calculations as opposed to thousands to create a new block. On a PoS network, the nodes and people who operate them are called forgers. Forgers are not rewarded in cryptocurrency for solving the hash — instead they receive transaction fees. Not dissimilar to a middleman fee, but contained within the blockchain.
PoS is becoming an increasingly popular model for new blockchain development.
Blockchain technology is touted for its security — this is one of its essential benefits. This is why developers are creating systems for digital voting on the blockchain and why financial transactions can take place on the network. Since there's no centralized hub for data storage, it can't be easily hacked, and because nodes must achieve a consensus, it can't be easily tampered with.
This doesn't mean there aren't some risks as far as security goes. A few potential risks are Sybil Attacks and Denial-of-Service attacks, but there are ways to mitigate these, so they rarely occur.
It's important to note that though there have been well-publicized Bitcoin hacks that have taken place since its inception, these had nothing to do with flaws in blockchain technology. The hacks, including the infamous Mt. Gox hack in 2014, occurred in centralized exchanges where thousands of people stored their coins online. This is not the safest way to store cryptocurrency — it’s best to store it in a personal wallet, be it a software wallet, hardware wallet, or paper wallet.
There are multiple applications for blockchain outside of cryptocurrency, which can include secure online voting, peer-to-peer banking, smart contracts, energy grids, media distribution, along with others we have yet to conceive. Given this, blockchain is widely considered a foundational technology, not a disruptive technology. Like electricity or the internet, it may have the potential to upend multiple industries and entities given it can change how we exchange and store valuable information.
Some blockchain evangelists claim the technology is a panacea for all the world's ills, that it will save the planet and dismantle power structures and oligarchies altogether. This may or may not be true. Still, pushing toward decentralization, no matter the context, will inevitably lead to some restructuring of power. Given blockchain is still nascent, the wide ranging effects of this decentralization will only be evidenced over time.
| 2019-04-26T00:20:46 |
https://republic.co/blog/breaking-down-blockchain-technology
|
0.999995 |
Why do the men stop assaulting the woman?
The correct answer is "Another car comes up."
90% Another car comes up.
| 2019-04-21T11:02:25 |
https://owlcation.com/quiz/49454/60533/why-do-the-men-stop-assaulting-the-woman
|
0.999932 |
This article is about the macroeconomic current account. For day to day bank accounts, see Current account (banking).
In economics, a country's current account is one of the three components of its balance of payments, the other two being the capital account and the financial account. The current account consists of the balance of trade, net primary income or factor income (earnings on foreign investments minus payments made to foreign investors) and net cash transfers, that have taken place over a given period of time. The current account balance is one of two major measures of a country's foreign trade (the other being the net capital outflow). A current account surplus indicates a country has more net foreign assets than liabilities by the corresponding amount, and a current account deficit does the reverse. Both government and private payments are included in the calculation. It is called the current account because goods and services are generally consumed in the current period.
A country's balance of trade is the net or difference between the country's exports of goods and services and its imports of goods and services, ignoring all financial transfers, investments and other components, over a given period of time. A country is said to have a trade surplus if its exports exceed its imports, and a trade deficit if its imports exceed its exports.
Positive net sales abroad generally contributes to a current account surplus; negative net sales abroad generally contributes to a current account deficit. Because exports generate positive net sales, and because the trade balance is typically the largest component of the current account, a current account surplus is usually associated with positive net exports.
In the net factor income or income account, income payments are outflows, and income receipts are inflows. Income are receipts from investments made abroad (note: investments are recorded in the capital account but income from investments is recorded in the current account) and money sent by individuals working abroad, known as remittances, to their families back home. If the income account is negative, the country is paying more than it is taking in interest, dividends, etc.
The various subcategories in the income account are linked to specific respective subcategories in the capital account, as income is often composed of factor payments from the ownership of capital (assets) or the negative capital (debts) abroad. From the capital account, economists and central banks determine implied rates of return on the different types of capital. The United States, for example, gleans a substantially larger rate of return from foreign capital than foreigners do from owning United States capital.
In the traditional accounting of balance of payments, the current account equals the change in net foreign assets. A current account deficit implies a paralleled reduction of the net foreign assets.
Current account = changes in net foreign assets.
If an economy is running a current account deficit, it is absorbing (absorption = domestic consumption + investment + government spending) more than that it is producing. This can only happen if some other economies are lending their savings to it (in the form of debt to or direct/ portfolio investment in the economy) or the economy is running down its foreign assets such as official foreign currency reserve.
On the other hand, if an economy is running a current account surplus it is absorbing less than that it is producing. This means it is saving. As the economy is open, this saving is being invested abroad and thus foreign assets are being created.
Normally, the current account is calculated by adding up the 4 components of current account: goods, services, income and current transfers.
When an intangible service (e.g. tourism) is used by a foreigner in a local land and the local resident receives the money from a foreigner, this is also counted as an export, thus a credit.
A credit of income happens when an individual or a company of domestic nationality receives money from a company or individual with foreign identity. A foreign company's investment upon a domestic company or a local government is considered as a credit.
Current transfers take place when a certain foreign country simply provides currency to another country with nothing received as a return. Typically, such transfers are done in the form of donations, aids, or official assistance.
Where CA is the current account, X and M are respectively the export and import of goods and services, NY the net income from abroad, and NCT the net current transfers.
Action to reduce a substantial current account deficit usually involves increasing exports (goods going out of a country and entering abroad countries) or decreasing imports (goods coming from a foreign country into a country). Firstly, this is generally accomplished directly through import restrictions, quotas, or duties (though these may indirectly limit exports as well), or by promoting exports (through subsidies, custom duty exemptions etc.). Influencing the exchange rate to make exports cheaper for foreign buyers will indirectly increase the balance of payments. Also, Currency wars, a phenomenon evident in post recessionary markets is a protectionist policy, whereby countries devalue their currencies to ensure export competitiveness. Secondly, adjusting government spending to favor domestic suppliers is also effective.
Less obvious methods to reduce a current account deficit include measures that increase domestic savings (or reduced domestic borrowing), including a reduction in borrowing by the national government.
A current account deficit is not always a problem. The Pitchford thesis states that a current account deficit does not matter if it is driven by the private sector. It is also known as the "consenting adults" view of the current account, as it holds that deficits are not a problem if they result from private sector agents engaging in mutually beneficial trade. A current account deficit creates an obligation of repayments of foreign capital, and that capital consists of many individual transactions. Pitchford asserts that since each of these transactions were individually considered financially sound when they were made, their aggregate effect (the current account deficit) is also sound.
Absent changes in official reserves, the current account is the mirror image of the sum of the capital and financial accounts. One might then ask: Is the current account driven by the capital and financial accounts or is it vice versa? The traditional response is that the current account is the main causal factor, with capital and financial accounts simply reflecting financing of a deficit or investment of funds arising as a result of a surplus. However, more recently some observers have suggested that the opposite causal relationship may be important in some cases. In particular, it has controversially been suggested that the United States current account deficit is driven by the desire of international investors to acquire U.S. assets (See Ben Bernanke, William Poole links below). However, the main viewpoint undoubtedly remains that the causative factor is the current account and that the positive financial account reflects the need to finance the country's current account deficit.
Since 1989, the current account deficit of the US has been increasingly large, reaching close to 7% of the GDP in 2006. In 2011, it was the highest deficit in the world. New evidence, however, suggests that the U.S. current account deficits are being mitigated by positive valuation effects. That is, the U.S. assets overseas are gaining in value relative to the domestic assets held by foreign investors. The net foreign assets of the U.S. are therefore not deteriorating one to one with the current account deficits. The most recent experience has reversed this positive valuation effect, however, with the US net foreign asset position deteriorating by more than two trillion dollars in 2008. This was due primarily to the relative under-performance of domestic ownership of foreign assets (largely foreign equities) compared to foreign ownership of domestic assets (largely US treasuries and bonds).
↑ Current Account Deficits: Is There a Problem?, Atish Ghosh, Uma Ramakrishnan, IMF, 2012-03-28.
↑ Investopedia (18 August 2009). "Understanding The Current Account In The Balance Of Payments".
↑ Wolfgang Münchau, „Kernschmelze im Finanzsystem", Carl Hanser Verlag, München, 2008, S. 155ff.; vgl. Benedikt Fehr: „'Bretton Woods II ist tot. Es lebe Bretton Woods III'" in FAZ 12. Mai 2009, S. 32. FAZ.Net, Stephanie Schoenwald:„Globale Ungleichgewichte. Sind sie für die Finanzmarktkrise (mit-) verantwortlich?" KfW (Kreditanstalt für Wiederaufbau) Research. MakroScope. No. 29, Februar 2009. S. 1.
Ellen Frank, Where Do U.S.A Dollars Go When the United States Runs a Trade Deficit? from Dollars & Sense magazine, March/April 2004.
| 2019-04-21T06:11:10 |
http://research.omicsgroup.org/index.php/Current_account
|
0.999998 |
I love a meal that is prepared and baked all at once. Pork chops, gravy and potatoes are a sure way to bring your family running to the table when they hear the call for dinner.
1. Heat oil in saucepan. Combine egg and milk, beat together. Combine flour, salt and pepper. Stir well. Take each pork chop and dip in milk bowl, then dip on both sides in the flour bowl. Add pork chop to hot oil and cook until golden brown on each side. Remove to a dutch oven style baking dish.
2. Slice potatoes 1/4 inch thick and set aside.
3. In a medium pan, melt butter. Stir in flour. Add milk and cream. Once sauce is thick, stir in onion soup mix. Remove from heat.
4. To saute onions and mushrooms, add 2 T. oil to pan and saute together until onions are soft.
5. You will layer your dutch oven like this: pork chops, sauteed onions and mushrooms, onion gravy and top with the sliced potatoes.
6. Cover and bake for 1.5 hours.
| 2019-04-25T22:11:05 |
http://www.simply-gourmet.com/2012/08/172-pork-chops-potatoes-and-gravy.html
|
0.999996 |
Tutorial-style article on generating permutations in an object-oriented way.
Starting with a common algorithm to generate all permutations of a string, I show the typical easy procedural version and then an object-oriented version. Noting that the algorithm produces all permutations before returning to the caller, I then show two iterator-style versions that let the caller control the generation of the permutations. One of them is the "inside-out" version, and the other uses a simple coroutine mechanism using a thread. That version turns out to not support stopping the iteration before it is done, so I correct that.
The downloadable code includes these program variations. The programming language used throughout is Java, but there is also an example in C# and an example in Haskell, for variety.
Uh, a problem with our coroutine implementation?
I used to like to get it because it had a simple and elegant recursive solution that was easy to right the first time, when writing it on the whiteboard. And coming up with a good recursive solution in an interview used to impress interviewers, especially if you explained it nicely in a "mathematical induction" sort of way.
The second thought was a bit more interesting: suppose you actually needed a permutation generator in your program (I never have), then you probably would not want the recursive solution anyway, which would generate all permutations—and process them—before returning to the caller. Instead, you'd want a demand-oriented, that is, iterator-style, solution that you could pull solutions out of when you wanted to. That sort of solution would be more difficult to express in a procedural language, and you couldn't easily change a recursive solution into a demand-oriented solution, but the object-oriented solution might be easier to adapt. And could you still do it at the whiteboard?
What follows is a simple exploration of these questions using my least favorite object-oriented programming language, Java. (Not my least favorite language that you can do object-oriented programming in: that would be Perl.) It is my least favorite because, due to its history, it is a very simple language that, though it is truly object-oriented, doesn't really have the syntax to be really expressive, thus your code becomes quite verbose. But nevertheless, it is the ubiquitous teaching language these days, and is lingua franca for this kind of discussion.
At any given recursive level, the procedure takes in the current permutation of and a "tail" of characters yet to be included in the permutation strings. It takes the first character of that tail and creates all the variants of the current permutation with that character interposed—including before the current string and after it. It does this one-at-a-time, of course, calling itself recursively on the remainder of the tail, each time, so that all the permutations at the next level will be generated.
The actual recursive procedure that generates the permutations is going to take an extra argument beyond the string to be permuted: the tail. And we're going to start at the outermost level with a 0-length string, then the next inner recursive level will have a 1-length string, then the next level will be dealing with length 2 strings, etc.
Because we have to pass the tail in our recursion—and because Java doesn't have default arguments—we're actually going to have to write two procedures: the one the user will call, and a 2-argument helper.
And that's the recursive solution, in the last box.
But really, you can see already that for a complete working solution, Java requires that all procedures really be methods in some class, and doesn't have some of the syntactic sugar that other languages have to shorten the code (such as default parameters) so it is pretty verbose. I don't think I'd require all the boilerplate of an interviewee, myself, as long as I heard some kind of hand-waving explanation about how it would need to have a class fitted around it.
Oh, I guess you might think I was just whinging about how much extra typing I needed to do in Java. Just for fun, what would this exact algorithm, as a fully runnable program, look like in Haskell?
Well, I'm not going to explain either of these programs. The first one, the one I wrote, took me about 5 minutes to write and fully test using the Haskell Platform and it only took that long because I wasn't sure which module to find the functions inits and tails in.
Functional programming lets you express algorithms very concisely, and once you are used to it, very clearly. But it requires a different mindset than procedural or object-oriented programming. I encourage you to look into it; you can pick it up from tutorials and papers on the web, or via books, but it does require some study in order to become effective. But it's worth it! Once you can look at things in the functional frame, you get great benefits in thinking clearly even when using procedural or object-oriented languages.
So what does an object-oriented version of this look like? Instead of a recursive procedure, where each level of recursion passes permuted strings down to the next level, which interposes one character at each location, we'll have a chain of objects, where each object passes permuted strings on to the next object in the chain, which interposes one character at each location.
There will be one object in the chain for each character of the initial string to permute; they'll all be of one class, which implements Action, which is what will chain them together. And there will be a final object in the chain, which is the Action that the caller wants performed.
With that in mind, the code almost writes itself. The main method (and the Action interface) are identical to what we had before so just writing the new code, we first create the class which acts as the links in the permutation chain. Each instance holds its own character to interpose, gets new strings to permute via its own next(), and passes on the interposed strings to the Action it is holding.
So it turns out that the object-oriented version is barely larger, and may even be simpler to understand. It's certainly a worthy contender for a simple whiteboard solution.
What is the performance of the object-oriented version compared to the recursive version?
First, it must be recognized that in most circumstances, it hardly matters. The code to generate a single permutation consists of a little more than a few string concatenations and a single procedure call, in both versions. Almost any practical use of a permutation generator will execute more code dealing with each permutation string than in generating it. Even the simple out.println(s) in this example executes far more code for each permutation than it cost to generate it.
But there might be examples where the cost to use each permutation is low, for example, if for some reason you're generating all permutations but immediately filtering away most of them with some kind of cheap test. In that case we may look into the cost of generating a single permutation.
For that, we find that there are only three real differences. First, the object-oriented solution creates a fixed number of objects to form the chain: one for each character in the initial string. The recursive implementation doesn't do this, but it does create the "tail" at each level and passes it on. In fact, it will end up creating far more strings than the object-oriented version, and typically, far more objects than the fixed number of permutation step objects created by the object-oriented version.
Second, the recursive implementation passes (at least) two arguments via the stack (ignoring the Action at the moment). In a procedural language those two strings would be the only arguments passed on the stack. The object-oriented version is passing only one string on the stack, but also has to pass the receiving object. Either way, it seems the stack usage is going to be very similar between the two approaches.
Finally, in either case, the strings or the objects are going to be accessed indirectly via pointers, but the compiler or JITter will ensure that frequently used values (for example, the character to be interposed) are kept in machine registers for fast access.
I would guess (without measuring it) that the recursive implementation and the object-oriented version will be very similar in performance in the cost of generating permutations, if it actually matters.
Now it's time to look at the generation of permutations "on demand", or iterator-style.
As I mentioned earlier, the flaw in the recursive-style of permutation generation is that it generates all permutations at once, before returning to the caller. That's one use case, but I think it would be more common to want permutations to be generated one-at-a-time on demand.
Object-oriented languages usually offer an abstraction for this, typically called an iterator. This is usually embodied as a small interface that, when implemented by a class, allows instances of that class to be used in iterator contexts, for example, in a "for each" loop. The instance encapsulates the current state of the iteration.
Using an iterator is easy. But without language support for writing the implementation of the iterator, you might need to change algorithms, or else suffer the pain of turning your code "inside out". That is, you have to turn your generator into a state machine, and provide ways to return out of and then jump back into the middle of your algorithm.
Here is an example of how easy it is to turn our recursive algorithm into an iterator-style permutation generator in C#. Notice how both the immediate call to next and the recursive call to Permutations are inside of yield return statements which implement the coroutine mechanism. And also notice how the return type is of the interface IEnumerable<>—it is the combination of that return type plus the yield return statement that tells the compiler to turn this method into an iterator.
Java doesn't have any nice way to have the compiler build coroutines for you, the way C# does. So we'll have to do it ourselves. Our first try will be to "turn" the permutation chain algorithm "inside-out".
In Java iterators implement the java.util.Iterator interface, which is generic in the type T that it iterates over. Iterator<T> has three methods: boolean hasNext(), T next(), and void remove(). hasNext and next are the real workers in an iterator (but already we see another Java annoyance: we have to implement remove even though we have no intention of using it—it has no meaning in the context of our iterator, applying mainly to collections).
For convenience, we'll also implement java.lang.Iterable, which is an interface used on a class instance to get an iterator, in some contexts, for example, in a for statement. Iterable only has a single method, iterator() which returns an iterator.
Anyway, what we're going to do is build the same chain of objects as before, one object in the chain for each character to be in the permutations. But the objects are different. First, instead of chaining on the Action interface, which "pushes" permuted strings down the chain, we'll chain on the Iterator interface, which "pulls" permutations up the chain.
Second, we'll end the chain not with the caller's Action, but with a special object that simply returns a zero-length string, and does that only once.
As you can see, this chain operates "backwards" with respect to the object-oriented chain we built earlier.
Let's start with the end of the chain. We need an object which will be an iterator, and which, when iterated upon, will return a single 0-length string. We'll start here because it is easiest, and will also show us the methods for the Iterator interface.
That's a pretty minimal iterator.
Now we'll do the ordinary PermuteStep that makes up the permutation chain. Remember, we're going to return only one interposed string at a time from the permuted string we got from farther back in the chain. So we need to remember what position we're at in the current permuted string.
Also, when we've reached the end of the current string and have no more positions left in it to interpose our character, we have to call the iterator from the next chain object to get the next string to interpose into.
We already have to split the string we're holding in order to fit the character in. So we'll keep those two splits, the prefix and suffix and use that as our state, to keep track of what we need to do next.
With a little thought, we can settle on the following invariant: if the suffix has no characters then we're done with the current string and it is time to get the next one from the next object in the chain. And, in that case, we immediately return as our current permutation the string returned with our character prepended to it. On the other hand, if the suffix has characters, then we shuffle the first character of suffix onto the end of the prefix, and return the concatenated prefix and character and suffix as our current permutation.
With that invariant in mind, we can see how to initialize our chain instance, and how to determine if there are any permutations left.
Here's the code. First, the boilerplate for the class and the interface Iterable. The state that we have to hold on to consists of four things: our character c, the next chain object, for which we have an iterator, a, and the strings which are the prefix and suffix of the current permutation we're working on.
Based on the above invariant, we see that there are more permutations left if we still have characters in our suffix, or if there are none left, then there are more permutations left if the next object in the chain still has permutations to offer.
To actually return the next permutation we need to either shuffle a character from the suffix to the prefix, or get a new suffix from the next object in the chain.
Don't forget to provide an implementation for remove(), but I'm going to skip it here. That's all of the PermuteStep class, so it isn't too bad.
Now, we have to build the permutation chain. We'll do that in the class that contains both PermuteStep and PermuteChainEnd. It really isn't any different from the object-oriented solution above.
And finally, let's use this iterator-style permutation-generating chain. It's really quite simple: we use the construct that Java intends us to use with iterators: the for statement.
Well, that's done. But, there was more code to write than you'd think, though it was more the tediousness of the iterator methods than anything else. The trickiest part was the representation of the iterator state in the class PermuteStep. I'm pretty sure I could get that right at the whiteboard, but then again, this is a pretty simple algorithm. What if we needed to turn something more complicated "inside-out"? Is there a different way to get an iterator-style algorithm from an object-oriented algorithm?
Yes, there is. And it seems like it will be simpler.
What we really want, as mentioned above, is a coroutine system, which Java lacks. But Java does have threads, so we can implement coroutines with threads. Even though such an implementation will be "heavier" than a true coroutine, it won't be too bad, and for some uses, won't be bad at all.
What we'll do is put the entire original object-oriented permutation generation chain into a thread (the procedural recursive routine would do just as well) and have it send its generated permutations to the main thread one at a time. The main thread will do whatever it wants to do and whenever it needs the next permutation, it will wait for it.
Java has a very nice class to do the transfer of an object from one thread to another, java.util.concurrent.Exchanger. The exchanger provides a synchronization point for two threads, which use it cooperatively. Each thread calls the exchanger's exchange() method, providing it with an object. The first thread to call exchange waits. When the second thread calls it the objects are exchanged and both threads continue—each has the object the other provided to the call.
We're going to only be using the exchanger in one direction: providing permuted strings from the permutation chain to the caller thread. So the calling thread will exchange a null instead of an object.
We're going to use the Iterator interface as before, for the demand-style permutation generator. This means that the last link in the chain will be an Action that exchanges the newly generated permutation with the calling thread. The calling thread will be the one with the iterator object. The iterator will create the permutation chain and start it running in a thread. Then, whenever it is called for the next object, it will use the exchanger to get it.
Our new permutation generation class is an iterator (and an iterable), and because it will also be running the permutation chain it is also a runnable.
There's our exchanger object, which will be shared between the calling thread (which is holding the iterator), and the permutation generating thread.
The class PermuteStep is exactly the same: that's the point here—there's no change to the object-oriented permutation generator, we're just wrapping it in a coroutine.
However, the end of the chain is different, since that's where we're going to synchronize with the main thread and pass the new permutation string to it.
The only interesting line there is where we take the new permutation and pass it to the calling thread with exchanger.exchange(s). But we have to handle the exception InterruptedException which can be thrown by exchanger.exchange and is not a runtime exception.
We don't expect our thread to be interrupted, so we'll just eat that exception. But it is annoying to have to catch it just so our code will compile.
The next step is to start the permutation generator running. Building the permutation chain is just like before. To run it we'll start ourselves (remember, we're a Runnable), and in our run method, we'll start the generator. At the end, we'll take care of a detail: How will the iterator know there are no more permutation strings? The answer is: we'll exchange a null from the generator thread to the iterator thread, and that will be the signal.
That was pretty easy. Once again we had to eat an InterruptedException but otherwise the code is pretty clean.
Now, it is time to implement the iterator, which is receiving permutations from the generation thread. We've already discussed how we have to have a one-item lookahead, and here is where we implement it.
It may seem a bit queer that the same class is being used as the iterator, and as the runner of the permutation generator. But there's no need to separate the functions into two different classes, and the functionality is evenly split between the implementation of the Iterator interface in the iterator thread, and the Runnable interface in the permutation generation thread.
At this point, we're done, and we can compare this implementation with both the object-oriented implementation, and the inside-out iterator implementation.
This version is an iterator-style version, meaning it produces permutations on demand, which we thought was more useful than the original permutation chain version which produces all of the permutations in a row before returning to the caller.
But as far as the complexity of the code goes, compared to the object-oriented implementation there's a lot more of it. The permutation generation algorithm is exactly the same. All the new code is there to communicate from the generation thread to the iterator thread, to create the generation thread, and to implement the iterator. Certainly we'd need code to implement the iterator, but it is more complex in this version. And comparing it to the inside-out iterator version we see that the original algorithm is unchanged—a big plus!—and all of the added complexity is isolated, where in the inside-out algorithm the complexity was added to the original algorithm (and if the task had been something more difficult than permutation generation, the "inside-out" state machine might have been very complex).
Still, all of that setup code for the thread and the inter-thread communication is a "one-time" cost, independent of the size and complexity of the algorithm that is producing the objects being iterated over. You can imagine that if that algorithm itself was more complex, this setup code would not be larger or more complicated at all, so its complexity and cost is fixed. We're beyond the stage where we can do this correctly at the whiteboard in an interview setting, but it isn't so bad as a homework assignment.
For the runtime cost, this version is definitely more expensive than either the object-oriented version or the inside-out iterator version. First of all, there's a thread to create and run. And second of all, each generated permutation requires two threads to synchronize, which itself is rather expensive.
These extra costs might not be significant if the algorithm encapsulated by the iterator (in the separate thread) is complex enough. But there are also other ways to amortize the cost. For example the cost of synchronization can be reduced by synchronizing less often. This can be done either by returning more than one object at each synchronization, or by using a queue to decouple the generation of permutations from the consumption, and thereby requiring fewer synchronizations (and fewer context switches). A java.util.concurrent.BlockingQueue might be just the thing to use.
So, now we're done? Not exactly... in fact, our iterator-style implementation, via a thread acting as a coroutine, has a major flaw.
What if we don't want to generate all the permutations? Perhaps we're just looking for the first one that satisfies a condition, then we break out of our loop.
// There are still some permutations left!
Compiles and runs fine. Wait a sec... it didn't terminate! In fact, if you add a out.println("exiting!") to the end of the main method, you see that the message gets printed but the program doesn't terminate!
And the reason is, the permutation generation thread has generated the next permutation and is waiting patiently in the exchanger for the iterator to pick it up. So the thread is still active (suspended, not running).
When control left the for loop, the iterator wasn't needed anymore. The main thread no longer has a reference to it. But it isn't garbage: it's run method still hasn't returned. It's stuck in the exchanger.
Oh. Maybe it does need to be interrupted! And maybe that's why InterruptedException isn't a runtime exception: the Java framework wants you to know that, more often than not, you have to plan for your threads to be interrupted, so that you exit them gracefully, when necessary.
So the first thing to know is that Java threads have a mechanism, the interrupt, which is what you use when you need a thread to gracefully exit. Calling a thread's interrupt method sets a flag which the thread itself can, and should, check from time to time. If the thread is suspended in some kind of Java synchronization mechanism such as wait, join, or sleep, then the JVM throws InterruptedException in that thread. Either way, you know it's time to exit.
The second thing to know is, that when the for loop exits early without exhausting the iterator, there's no way for it to "notify" the iterator that it isn't needed anymore. You might think that if they went to the trouble to define a method remove that is only rarely needed (if you're iterating through a collection and want to support removing items while you're iterating) then they might have gone ahead and defined a method done so that the for statement could tell the iterator it wasn't going to be used anymore, but no, that didn't happen.
So how are we going to notify the iterator it isn't needed anymore, so it can interrupt the permutation generation thread, and have it exit?
We're going to use the dreaded finalizer.
Note, please, that there's a lot of nasty stuff written about finalizers on the web. It is easy to find emails and postings that say that finalizers are evil, and programmers who are even thinking of using a finalizer should just shoot themselves in the head and thus improve the quality of programming in general. That's going overboard. Finalizers are a big ugly wart, sure, and they're easy to misuse (especially if you think they're the "opposite" of a constructor—and you can also find plenty of articles on the web that say just that too!), and they're never going to perform particularly well, but there are circumstances when you can use one safely, and need to. This is one of those circumstances.
The two main problems with finalizers are that you can't tell when they're going to run, and they may not run at all. This means they're generally useless for "cleaning up" any kind of resource external to the Java environment that you're holding on to. For example, you can't rely on a finalizer to flush data out to a file and make sure it is getting written to disk, before your program exits. It doesn't have to run. You can't rely on a finalizer to close a database connection when you're done using the object that is holding it, because it isn't going to be run right away, and long before it is run you might very well end up having too many objects holding too many open database connections and fail to create one you really need.
There are other problems with finalizers too. Most are largely associated with "self-resurrecting" objects. That is, you're in a finalizer of an object that is being garbage collected and instead of going away nicely you stick a reference to yourself in some non-garbage object. And thus keep yourself alive. In cases like this, I think, maybe those guys who want you to shoot yourself in the head are right. And another problem with finalizers is that, when you're in a finalizer, any object reference you're holding may be to objects which have already been garbage collected! That makes it hard to write a finalizer, to be sure.
But in this case, we're staying within the language, and we're only going to use the finalizer to interrupt our thread. Plus we know the thread we're talking to isn't already garbage collected because—well, because that's the problem. It's still waiting in an exchanger. So this use of a finalizer is safe and proper, and if you still feel like writing me a nastygram insulting my father's mother, don't bother, just kick your cat instead.
So, to continue the discussion from the previous section, we're going to fix the problem that we can't stop generating permutations until all have been generated. We're going to do this by adding a finalizer to the iterator so it can interrupt the permutation generation thread, and then we're going to change the permutation generation thread so that it checks to see if it has been interrupted.
The first thing we have to do is make sure that the iterator is a separate object from the thing that is running the permutation generator thread. There was no reason to do that before, so we didn't. But now, we definitely want the iterator to be garbage collected, and we know that the problem is that the thread is not being garbage collected, so we have to separate them.
The second thing we have to do is handle the exception InterruptedException. But we don't want to just handle it directly, because if we did, we'd have to "pipe it through" our permutation generation algorithm back to the thread runner, and our goal is to leave that untouched. Instead, we're going to declare our own runtime exception and throw that in place of the InterruptedException we got. As a runtime exception we can catch it at a higher level (in the call tree) without having to declare it on every method along the way.
That pretty much explains it, so now I'll supply the code without further comment.
First, the containing class, and the exception class, REInterruptedException, we're going to use to communicate the shutdown of the permutation chain; unlike the native InterruptedException, this one is a runtime exception which needn't be declared or handled by the algorithm itself.
* to the beginning of the chain, to signal an interrupt.
Now we have the end of the permutation chain, where the completed current permutation is exchanged with the iterator thread. Same as earlier, except it translates the exception on an interrupt, as explained earlier.
Here's the PermuteStep class, exactly as before, unchanged by our conversion of this whole algorithm to ab iterator-style coroutine-based implementation.
* One step in the permutation chain, exactly as in OOPermute.
Time to introduce the constructor for the containing class. All it does is squirrel away the string-to-be-permuted so that it is available when the caller requests the iterator.
* Hold the string to permute until the iterator is requested.
Having seen the class that comprises the steps of the permutation chain, and the end of it, here's the class that implements the head of the chain. It is responsible for starting up the chain, and for eating the REInterruptedException so that the thread will terminate cleanly when it is no longer needed.
And now, the iterator class. Every time it is asked for the next item it is going to go to the exchanger to get it from the permutation thread chain. That's just as before. But this time, it has a finalizer. When this iterator is found to be garbage the finalizer will be called and all it does is interrupt the permutation thread. That's it, then this iterator vanishes.
* permuations, then the permutation chain thread exits quietly.
Here is the method iterator() which starts the whole thing going. It creates a permutation chain, puts it in a separate thread, creates an iterator instance, and hooks everything together.
* an iterator that uses the same exchanger.
// There are still some left!
This program exits! Unlike the previous version. But—here's an important detail—it exits only because of the call to setDaemon() when creating the permutation chain thread, in the method iterator() above.
The specification of the Java VM says that there are two kinds of threads: daemon threads, and non-daemon threads, and that the VM continues to run until all the non-daemon threads that have started have exited. The intent is that threads doing useful work keep the VM alive; those are the non-daemon threads. The other threads aren't doing useful work, most of them are just waiting for some synchronization to happen. They're worker threads without work to do, or they're waiting for some network input that may never happen, or whatever. In our case, the permutation chain thread isn't doing useful work most of the time. Most of the time it is just sitting around in the exchanger waiting to get rid of its last permutation. And if nobody is going to call it, because the main thread is going to exit, then it has no reason to exist. So, we turn it into a daemon by calling setDaemon and that way we can exit the program whether or not a garbage collection has picked up and destroyed the iterator that is holding onto the thread.
I might as well note here that though this solution works, and, as you see, can be fairly encapsulated, it still doesn't have the best performance. On the first garbage collection run after the iterator becomes garbage the finalizer will run and interrupt the permutation generation thread. The permutation generation thread will exit and it and the entire permutation chain will become garbage. But none of it will be picked up until the next garbage collection run. We just have to live with it.
In this tutorial I described an object-oriented way to generate permutations of a string. The problem isn't really that complex, but what I thought was interesting about it is that the object-oriented pipeline I created was just as simple to write and describe as the recursive solution; perhaps some people might even find it easier to understand. And though I'm sure this kind of solution isn't unique to me, I personally haven't run across it before; certainly never in an interview situation. For all the focus on object-oriented programming for the last 20 years, it seems that the standard procedural solutions come first to many programmer's minds.
Also, I pointed out that the original solution(s) which generate all permutations at once before returning to the caller don't actually fit the object-oriented model that well. Iterators are much more the thing to use. So I showed two ways to translate the basic algorithm to an iterator model. Turning the algorithm "inside out" wasn't so bad for this simple permutation scheme, but would be for a more complex algorithm. Turning the algorithm into a coroutine had the advantage that it didn't change the algorithm at all, so it still worked fine. But it did require a lot of code to arrange it and also has a runtime cost. The choice is yours.
March 23, 2011: Original article.
It will be great if you can make a version to allow repetition.
A well thought out, clearly written article.
Excellent article in both practical and didactic aspects, 5*!
I've been meaning to look into the TPL so I'll definitely look at your articles shortly. Thanks!
Good article and would like to change my vote , if i get a answer.
I think permuation and combination with objects can create lot of memory consumption. Doing the non-object oriented way would generate better performance.
Your comments is highly appreciable.
I'll answer your comment whether or not you change your vote.
I addressed the question of memory consumption at the end of the section Object-oriented permutations: A chain of permutation steps, at the end. If those paragraphs are confusing or insufficient, let me know how, and I'll fix it up.
To summarize: The chain of permutation step objects that are built to generate the permutations, as illustrated at the top of the article, is built once, at the beginning. The length of that chain - that is, the number of objects in it - is the number of characters in the string to be permuted, plus one or two more at the ends. That's a fixed cost, and those objects don't change while the permutations are being generated.
Meanwhile, there are a lot of procedure calls going on. In the object-oriented approach, each procedure call contains a newly constructed string. In the procedural (recursive) approach, each procedure call contains two newly constructed strings. So in fact the o-o approach above generates fewer objects when run than the procedural approach above.
of pre and suff. But that was just for simplicity in coding and in explaining the algorithm. If those strings were too expensive you would just save the string from the next permutation step and keep an integer index instead (the location of the split between pre and suff).
| 2019-04-25T04:49:21 |
https://www.codeproject.com/Articles/172370/Object-Oriented-Permutation-Generation
|
0.999998 |
Why does the north star always point north?
Polaris, the North Star, appears stationary in the sky because it is positioned close to the line of Earth's axis projected into space. As such, it is the only bright star whose position relative to a rotating Earth does not change. All other stars appear to move opposite to the Earth's rotation beneath them.
At the North Pole, Polaris would appear directly overhead with the other stars circling around it during the course of a night. As you move south, away from the Pole, Polaris would appear further down in the northern sky but still be at the center of daily stellar motions around it.
There is no bright star overhead at the South Pole, so no 'South Star' equivalent currently exists. The North Star, however, will not 'always' point north. Because the Earth wobbles like a top in its orbit, Polaris will eventually appear to move away from the pole and not be the North Star again for another 26,000 years.
| 2019-04-23T23:57:22 |
https://www.physlink.com/Education/AskExperts/ae492.cfm
|
0.999726 |
1 Game 1 : What is the word?
2 Game 2 : Making sentences together!
3 Game 3 : Which does not belong?
Game 1 : What is the word?
Game 2 : Making sentences together!
Game 3 : Which does not belong?
| 2019-04-20T00:41:27 |
http://3d-universal.com/blogs/2018/03/%E3%80%90%E7%AC%AC24%E5%9B%9E-english-activity%E3%80%91%E3%80%9Cenglish-entertainment%E3%80%9C.html
|
0.99842 |
Ceiling fans move air around the room, saving you money on energy bills. In the summer, set the fan to run in a counterclockwise direction, moving cool air around the room. In winter, set the fan to clockwise to draw warm air up from the floor.
To move the correct amount of air around the room, you need to choose a ceiling fan based on the dimensions of the room. A room that is 12 feet wide or less should use a 36-inch fan. Rooms that are between 12 and 16 feet should use a fan that is 52 inches, and rooms over 18 feet should install two fans to keep the air moving.
Make sure to place the fan seven feet above the floor with the blades spaced 8-10 inches from the ceiling. Choose a fan with five blades and the right amount of power for the size of the room, for the maximum amount of air flow.
| 2019-04-22T19:59:06 |
https://www.abcinspections.biz/choosing-the-right-size-ceiling-fan/
|
0.998349 |
What is the volume of #H_2# generated by reacting 4.33g of #Zn# with excess #H_2SO_4# at 38°C and 760 torr?
Zinc metal will react with dilute sulfuric acid to produce zinc sulfate, #"ZnSO"_4#, and hydrogen gas, #"H"_2#, which will bubble out of solution.
Notice that you have a #1:1# mole ratio between zinc metal and hydrogen gas. This tells you that the reaction will always produce the same number of moles of hydrogen gas as you have moles of zinc metal that take part in the reaction.
In your case, you know that the sulfuric acid is in excess, which means that zinc metal acts as a limiting reagent, i.e. it will be completely consumed by the reaction.
This means that the reaction produced #0.06623# moles of hydrogen gas.
It's important to notice here that the units given to you for pressure and temperature do not match those used in the expression of the universal gas constant.
This means that you have to convert these units from torr to atm, and from degrees Celsius to Kelvin, respectively.
| 2019-04-18T13:08:47 |
https://socratic.org/questions/what-is-the-volume-of-h-2-generated-by-reacting-4-33g-of-zn-with-excess-h-2so-4-
|
0.999398 |
What's at stake in the final weekend of the Liga MX regular season?
Five teams have booked their tickets to the Liguilla, the eight-team playoff that will decide the Liga MX champion. That means three spots are still up for grabs, with five teams still holding out hope to make the postseason.
Cruz Azul, Club America, Pumas, Santos Laguna and Monterrey all know their seasons will continue while Tigres, Toluca, Morelia, Pachuca and Queretaro have work to do this weekend to make sure they get in.
One of the most important matches of the weekend was the first one. Morelia met Cruz Azul on Friday night with the knowledge that a win would clinch its position in the postseason - and potentially set up a Liguilla rematch with La Maquina. However, Cruz Azul won 2-0 to clinch the Superlider place. While there's a lingering belief the No. 1 seed is cursed, it's still a desirable spot. Cruz Azul will play the second leg of all playoff series at the Estadio Azteca. While the field quality there is far from ideal, the club leads the league in attendance since moving south before the start of the tournament.
With Monarcas faltering, the door is be wide open for both Pachuca and Queretaro. Tuzos host Leon on Saturday and have a goal-difference advantage Queretaro is unlikely to be able to overcome. Heading into the weekend, Pachuca is at +8 with Queretaro sitting at -2. The Gallos Blancos play before Queretaro, though, hosting a slumping Necaxa side. Look for Rafael Puente's men to try and put the throttle down and get as many goals as possible in a win over the Rayos.
A positive result for Tigres in Guadalajara against Chivas locks up their spot in the postseason. It is difficult to imagine a postseason without Andre-Pierre Gignac, Javier Aquino and the rest of Tuca Ferretti's squad.
Toluca is in the same situation. Currently sitting in seventh but not playing until Sunday, the Red Devils will know exactly what they need to do when they play Lobos BUAP in the final match of the regular season. No matter how things shake out earlier in the weekend, a victory would put Toluca into the playoffs.
Tigres could go as high as fourth, and they aren't the only team who has a wide range of playoff seeding possibilities at the top. While teams like Pumas and Monterrey will be in the Liguilla, they have huge ranges of potential seeds. A Rayados win over Atlas coupled with adverse results for America, Santos and Pumas could see the team climb as high as second, but a loss and success from the teams who aren't yet qualified could see them drop all the way to the last spot of the Liguilla. Pumas and Santos each could fall as far as seven.
It seems like a safe bet to picture Tigres in the final, and Toluca playing a Lobos BUAP team that has showed signs of life toward the end of the season but ultimately is far from the level of the Red Devils also should book its spot. That would leave just one place. Pachuca's recent hot streak has put the talented young team on the verge, especially after Morelia fell short Friday night.
The final week should bring plenty of drama ahead of the real excitement beginning when the Liguilla kicks off next week.
| 2019-04-22T10:13:21 |
https://www.goal.com/en-in/news/whats-at-stake-in-the-final-weekend-of-the-liga-mx-regular/1bgd1nv1lcbtl118ob91oysi34
|
0.998419 |
Austrian police scuffle with Italian demonstrators protesting against the deportation of migrants and proposed tougher border checks at the Alpine Brenner Pass. Rough Cut (no reporter narration).
ROUGH CUT - NATURAL (NO REPORTER NARRATION) STORY: Italian demonstrators scuffled with Austrian police on the Alpine Brenner Pass border on Sunday (April 24) when hundreds of people marched in solidarity with migrants and against recent deals to repatriate some of them to control the flow. The scuffles broke out when one group prodded the police with umbrellas and tried to breach the barriers erected by the security forces who beat them back with batons. Hundreds of people had joined the march, including some leftist politicians, to condemn Austria's decision to toughen border controls in response to unprecedented migrant flows into Europe. The demonstrators wore orange life vests in a sign of solidarity with thousands of migrants who have drowned trying to cross the Mediterranean. One demonstrator was arrested, prompting a sit-down protest in front of the police lines by fellow marchers demanding his release, but no injuries were reported. Austria said this month it would introduce tougher controls at the Brenner Pass crossing from June 1 at the latest, prompting complaints from Rome, which says the plan breaches EU rules on the free movement of people. The EU said last week it was assessing the complaint. The Brenner Pass is the most important Alpine crossing for heavy goods traffic and the controls, if introduced, risk slowing down transport and hurting trade between Italy and her top trading partner Germany.
| 2019-04-21T00:13:51 |
https://uk.mobile.reuters.com/video/2016/04/24/scuffles-break-out-between-police-and-pr?videoId=368246502
|
0.999999 |
Determine whether the given token can end a template argument.
Definition at line 1141 of file ParseTemplate.cpp.
References clang::Sema::ActOnDependentTemplateName(), clang::Sema::ActOnPackExpansion(), clang::Sema::ActOnTemplateTypeArgument(), clang::Scope::CompoundStmtScope, clang::Sema::ConstantEvaluated, clang::Parser::ConsumeAnyToken(), clang::Parser::ConsumeToken(), clang::LateParsedTemplate::D, clang::Scope::DeclScope, clang::Sema::ExpressionEvaluationContextRecord::EK_TemplateArgument, clang::ExprError(), clang::Scope::FnScope, clang::ActionResult< PtrTy, CompressInvalid >::get(), clang::Decl::getAsFunction(), clang::Parser::getCurScope(), clang::Token::getIdentifierInfo(), clang::Parser::getLangOpts(), clang::DeclContext::getLexicalParent(), clang::Token::getLocation(), clang::tooling::fixit::internal::getSourceRange(), clang::getTemplateParamsRange(), clang::Greater, clang::Token::is(), clang::format::FormatToken::is(), clang::ParsedTemplateArgument::isInvalid(), clang::ActionResult< PtrTy, CompressInvalid >::isInvalid(), clang::Token::isOneOf(), clang::format::FormatToken::isOneOf(), clang::CXXScopeSpec::isSet(), clang::Sema::isTemplateName(), clang::DeclContext::isTranslationUnit(), clang::SourceLocation::isValid(), clang::Less, clang::Parser::MaybeTypeCast, clang::Parser::NextToken(), clang::ParsedTemplateArgument::NonType, clang::ParsingDeclRAIIObject::NoParent, P, clang::Parser::ParseConstantExpressionInExprEvalContext(), clang::Parser::ParseTypeName(), clang::Result, clang::UnqualifiedId::setIdentifier(), clang::Parser::SkipUntil(), clang::UnqualifiedId::StartLocation, clang::Parser::StopAtSemi, clang::Parser::StopBeforeMatch, clang::TemplateArgContext, clang::Scope::TemplateParamScope, clang::TNK_Dependent_template_name, clang::TNK_Type_template, clang::LateParsedTemplate::Toks, and clang::Parser::TryConsumeToken().
| 2019-04-20T11:00:06 |
https://clang.llvm.org/doxygen/ParseTemplate_8cpp.html
|
0.999469 |
Buying a home in the new year !?
Get your house in order before you start shopping. Here's what you need to do, and when.
Buying a home is a complicated process, and it can be particularly daunting for the first-timer.
The following timeline starts one year before you hope to start seriously shopping for a home. This is an ideal; you can arrange your finances and buy a home in less time, if necessary, but you'd be smart to walk through all of the steps in order. The more time you give yourself for this process, the better.
Get your credit reports. Errors on your reports can force you to pay a higher interest rate on your mortgage or even torpedo your chances of getting a loan. You can get free copies of your reports from the three major credit bureaus — Equifax, Experian and TransUnion — atAnnualCreditReport.com. Look for accounts that aren't yours, collection accounts for debts you don't owe and negative marks (other than bankruptcy) that are older than seven years.
Get — and improve — your FICO credit scores. Your credit scores, which are three-digit numbers used to gauge your creditworthiness, help determine the rates and terms you can get for a loan. There are hundreds of different credit-scoring formulas, but the one used by the vast majority of mortgage lenders is the FICO.
Consider a credit-monitoring service. Normally, I think these are a waste of money for folks who aren't at high risk of identity theft. But given how important your credit and credit scores will be in buying a home, you might appreciate the early warning if a collector tries to post a bogus debt.
Deal with your debt. Most people needn't pay off their student loans, auto loans or other generally low-rate debt before getting a mortgage. What you want to eradicate is "toxic" debt: credit-card balances and payday loans. These are signs you're living beyond your means. If you don't get your overspending problem fixed before you buy a home, your problems likely will get worse because homeownership typically involves plenty of big costs (property taxes, insurance, maintenance, repairs, improvements, decorating). Get your act together before you house shop.
Save, save, save. Stop eating out. Drop your cable-TV subscription. Do everything you can think of to put as much money aside as possible, using your desire to be a homeowner as a motivator. (Read "Could you stop spending for a month?" for inspiration.) In today's market, it's best to have at least a 5% down payment; boost that to 10% and you'll have even more financing options. Ideally, you'll also have enough left over after you get your mortgage to cover the payments for two or three months.
Put your bills on automatic. A single 30-day late payment can knock 100 points off your score, and it can take many, many months to recover. Make sure every bill gets paid on time. If you don't have a reliable bill-paying system, consider using automatic debits, so payments come directly from your checking account, or an online bill-payment system's recurring-payment feature.
Sort through your mortgage options. A lot of people are losing their homes today because they didn't understand what kind of mortgage they had or they accepted bad advice. The low teaser payments that allowed them to buy a more expensive house have jumped skyward, leaving them unable to pay. It's up to you to understand the risks of the different types of mortgages and to select the right one for your family. My 2 cents: Stick with traditional, fixed-rate mortgages. If you can't commit to a 30-year version, at least use a hybrid loan with a rate that's fixed for as long as you plan to own the home.
Research all the costs of owning a home. Your mortgage will be just the start. You'll have to pay property taxes and insurance on the home. There may be homeowners- or condo-association fees as well. You may face higher utility bills, and you'll take on maintenance and repair costs as well. Decorating your new house can cost a pile of money as well: Have you shopped for window coverings lately? Your home-owning friends and a friendly real-estate agent or two can help fill you in so you know what to expect.
Adjust your saving strategies. What you've learned so far may inspire you to boost your savings. A bigger down payment, for example, can result in a larger home or a lower mortgage payment. Or you may simply want to build up your emergency fund so unexpected home expenses don't knock your finances off the rails.
Reduce your credit utilization. The FICO scoring formula is sensitive to how much of your available limits you're using on your credit cards and other revolving lines of credit. The less, the better. It doesn't matter if you pay your balances in full every month; the figure the scoring formula typically uses is the balance that shows on your most recent statement. Try to keep that balance below 30%, or even lower. If you can't — because you charge a lot for work-related travel, for example — make a payment before the statement's closing date to reduce the balance reported to the bureaus. Just be sure to make a second payment after the closing date, so you don't get reported as late.
Don't open or close any accounts. Until the mortgage process is completed and you've moved into your new home, continue to avoid actions that could potentially harm your credit, such as opening credit accounts or closing old ones.
Get an idea of the mortgage rate you can expect. Order a fresh set of FICO credit scores — don't worry, checking your scores doesn't ding them — and talk to some mortgage lenders about what rates you might qualify for. (You'll find current national averages here.) Don't apply yet or give permission for your credit to be pulled; you just want to get a feel for what you can expect.
Understand the effect of mortgage-shopping on your score. You want to get the best rate and terms possible, which means you'll need to shop around, but how does that affect your credit score? Here's the lowdown: Every time you give a lender permission to check your credit, a "hard inquiry" appears on your credit report, and that can ding your score a bit. Fortunately, the FICO scoring formula lumps all mortgage-related inquiries made within a specified period and counts them as one. (The period used to be 14 days, but the most recent versions stretch that to 45 days.) Furthermore, the scoring formula ignores any inquiries made in the previous 30 days. So you want to do your serious mortgage shopping in a fairly concentrated period of time, typicallyafter your offer on the home you want is accepted.
Get approved for a mortgage ahead of time. Pre-approval, in which a lender gives a commitment to make you a loan, is different and more valuable to sellers than pre-qualification, which merely gives you an idea of the size of the mortgage you might afford without making any commitments. You don't have to get a loan from the lender that offers you a pre-approval letter. Getting a pre-approval does involve giving permission for a hard credit inquiry, but the small potential ding on your credit is worth it because you'll be in a stronger position with sellers.
Consider a mortgage broker. Once your offer is approved, you can shop for a mortgage on your own, but if you want a lot of hand-holding through this process or your credit is particularly troubled, you might benefit from the services of an experienced, ethical mortgage broker. Get referrals from family and friends; you can also get a referral from the National Association of Mortgage Brokers.
Begin researching neighborhoods and look for an agent. Check Internet listings, attend open houses and find an experienced guide to help you refine what you're seeking.
Shop for a mortgage. There are thousands available, and sorting through the possibilities can be overwhelming. That said, you may want to include some of the biggest national mortgage lenders, local lenders and online brokers. You'll need to move fairly quickly to secure the loan, because the full approval process typically takes four to six weeks.
Arrange for an appraisal, a home inspection and a walk-through. The appraisal is required for your loan to be approved. An inspection isn't necessarily required, but don't skip this essential step, which can alert you to serious problems before the deal closes. The walk-through is usually done within 24 hours of the deal closing, so you can make sure that the home sellers have performed any agreed-upon repairs and the place is in move-in condition.
Get homeowners insurance. Mortgage lenders require this coverage, and you'll need to prove you have it at closing.
Confirm how much money you'll need at closing. "Closing" is when you sign all the paperwork and pay agreed-upon amounts, which can include your down payment and your share of legal fees, paperwork costs, property taxes and title insurance.
| 2019-04-19T12:22:03 |
http://thethorntongroup.ca/blog.html/buying-a-home-in-the-new-year--2920474
|
0.998784 |
Since upgrading to version 1.2, I've become more interested in exploring Wikka and developing some extension and features. More information on the development projects I'm working on can be found on [[http://klenwell.com/is/ProjectWikka | my wiki]].
I've redesigned my wiki site using the [[http://docs.wikkawiki.org/WikkaThemes | new theming system]]. The source code for that, and other wikka features I'm working on, can be found at [[http://code.google.com/p/klenwell/source/browse/trunk/projects/php/wikka/#wikka/templates/klenwell | my Google code site]].
Since upgrading to version 1.2, I've become more interested in exploring Wikka and developing some extension and features. More information on the development projects I'm working on can be found on [[http://klenwell.com/is/ProjectWikka my wiki]].
I've redesigned my wiki site using the [[http://docs.wikkawiki.org/WikkaThemes new theming system]]. The source code for that, and other wikka features I'm working on, can be found at [[http://code.google.com/p/klenwell/source/browse/trunk/projects/php/wikka/#wikka/templates/klenwell my Google code site]].
The wish list below includes a sampling of features I'd like to find or develop for the Wikka package. The [[http://klenwell.com/is/ProjectWikka updated list]] is available at my site.
Is it possible to restrict the installer pages to an admin? I upgraded to 1.3.2 just now. I had completed the install on a local dev version and planned to just upload that. But I found I needed to run the installer on my production site, too, to make the database updates. I noticed that while it was running, the install/upgrade pages were accessible to non-logged-in guests. This seems like a potential security vulnerability as it may display the config file.
Next time, I upgrade, I'll look into adding this restriction myself if it doesn't already exist.
* Display a page if the user has read access or is an admin.
* This is the default page handler used by Wikka when no other handler is specified.
// does comment get delete form?
The page-rendering code (''handlers/page/show.php'') for wikka, at the moment, is pretty sloppy. I notice there are some references to a new templating model in the latest release and I admit that I have not investigated it yet. But I did rewrite the code to follow more of a MVC pattern. Find below the actual rewritten file for ''handlers/page/show.php''.
| 2019-04-19T20:26:59 |
http://wikkawiki.org/KlenWell/history
|
0.999421 |
Which animals are largest, jump the farthest, and swim the fastest? Find out about some unusual record-holders of the animal world.
In the book Biggest, Highest, Fastest, chapter one looks at animals that are 'big' or have 'big' features. It includes worms that can grow to 55 metres, giant squids that weigh almost a tonne and small foxes with very big ears.
Chapter two examines height by looking at giraffes, fleas that can jump amazing heights and birds that fly as high as jet aeroplanes.
Chapter three looks at animals which are the fastest. It examines the speed of a hummingbird's wings, the pace of a sailfish and cheetah, and the strike of a snake.
What is a UFO? How long would it take you to travel to our nearest star?
The book The Alien Files, chapter one looks at reports of aliens on Earth and sightings of UFOs. It identifies the three most common alien forms and discusses how fake photographs are created.
Chapter two discusses the 'Roswell Incident', displays a scale for measuring encounters with aliens and includes information on 'Men in Black'.
Chapter three looks at the expanse of the universe and how scientists are exploring space, looking for signs of alien life.
Would you jump from a skyscraper with a rope around you ankles? Why do free-divers often black out on the way back to the surface?
In the book To the Limit, chapter one explains how adrenaline works and includes details on the fastest vehicles on land, water and in the air. It also discusses extreme sports such as street luge and downhill skiing.
Chapter two examines some extreme adventures people participate in. Activities such as bungee jumping, base jumping, caving and skysurfing are discussed.
Chapter three looks at how people keep testing their own endurance. It examines free-diving, rock climbing and triathlon.
Would you like to fly like a bird? What do you think has been the most important invention to date?
In the book Whose Crazy Idea Was That?, chapter one looks at some unusual ideas that were patented but never made it to reality. It also discusses the earliest fax machine and the invention of the light bulb.
Chapter two looks at the history of some famous inventions such as Hula Hoops, Frisbees, Velcro, Popsicles and jeans.
Chapter three looks at the history of human flight, beginning with Leonardo Da Vinci's drawings and travelling through to the first hot-air balloon and the Wright brothers' flight.
Do you think animals should be used in space flight tests? How do you sleep in space?
In the book Living in Space, chapter one looks at the history of rockets and the early stages if human space flight. It includes information on experiments with rockets in 1500, animal astronauts and the human pioneers of space travel.
Chapter two examines life on the space shuttle: how astronauts eat, sleep, clean and work. The chapter also discusses experiments conducted in space and what happens when astronauts have to work outside the shuttle.
Chapter three discusses the future of space travel including the International Space Station (ISS), plans for space tourism, missions to the moon and beyond.
What can you do to stop habitat loss? Do you think scientists should attempt to clone extinct animals?
In the book On the Edge of Extinction, chapter one looks at the discovery of woolly mammoth tusks in Siberia in 1997, and what this discovery tells us about the species' extinction. It also looks at the Tasmanian tiger or thylacine, which was shot to extinction.
Chapter two examines the reasons why many species of animals and plants are rapidly becoming extinct. Activities of conservationists and the impact of human activity on the environment are also discussed.
Chapter three looks at two animal success stories. Education, awareness and changing attitudes have bought the Siberian tiger and the American bison back from the brink of extinction.
Where do robots store information? If robots could one day think for themselves, do you think they could take over the world?
In the book Real World Robots, chapter one gives a brief history of the development of robots; defines what a robot is; and talks about robots in everyday life.
Chapter two describes robots that do dangerous work; exploring the bottom of the ocean, exploring other planets, fighting fires and clearing landmines.
Chapter three makes predictions about the future of robots, how they might be used in medicine, and the development of artificial intelligence.
What are you afraid of? How could you face your fear? Are you superstitious about the number 13?
In the book Survival Against the Odds, chapter one looks at attacks by grizzly bears and great white sharks - and some people who survived them. It also offers some tips on how to survive an encounter with one of these creatures.
Chapter two examines the violent forces of volcanoes. It tells two stories of amazing human survival - one on the island of Martinique in 1902, and the other in Hawaii in 1992, when three men were rescued from the mouth in Kilauea volcano.
Chapter three looks at how the crew of Apollo 13 managed to stay alive after an oxygen tank exploded in the service module of the spacecraft. It also examines the dangerous task of re-entry into the Earth's atmosphere.
Would you set sail with no idea where or when you will find the next piece of land?
Would you have the courage to stand up for what you believe?
Chapter two looks at Emmeline Pankhurst's fight for women's suffrage (their right to vote) in England. It looks at the campaign of disobedience and the suffering endured by many suffragettes during the fight for their rights.
Chapter three looks at Nelson Mandela's long campaign to end apartheid and give equality to all South Africans.
Josh is a master of pranks, while Hannah is the class brain. Working together in an important school assignment won’t be easy. Hannah comes up with a plan to work with someone else. But Josh has his own explosive ideas.
Josh is a master of pranks, while Hannah is the class brain. Working together in an important school assignment won’t be easy. Karen has the Eye – she can see what will happen in the future. Karen thinks the eye will be fun until she dreams about something awful. Will her worst nightmare come true or can Karen change her future?
Josh is a master of pranks, while Hannah is the class brain. Working together in an important school assignment won’t be easy. Kel likes her new home – she lives near a karting track and can practice all the time! Her only problem is Marc. Why is Marc so determined to beat her and how far will he go to win?
Josh is a master of pranks, while Hannah is the class brain. Working together in an important school assignment won’t be easy. Kerria Logan is a heroine. She fights pirates and survives shipwrecks. It’s all very adventurous, even if it is a lot of hard work. Is Kerria in control of her life or is there something really strange going on?
Josh is a master of pranks, while Hannah is the class brain. Working together in an important school assignment won’t be easy. Andy thinks his new teacher is great. He also thinks his brother, Joel, is great. But that doesn’t mean he’s happy about them going out together. When Andy tries to break them up, he gets into real trouble!
Rory drives everyone crazy with his complicated ideas — things always end up in a mess. Lettice is the opposite of Rory — she does things the simple way.
Can Rory help Lettice with a complicated scheme to find a thief?
Josh is a master of pranks, while Hannah is the class brain. Working together in an important school assignment won’t be easy. Elizabeth’s life is hard. Since her mother disappeared, Elizabeth has looked after her brothers and sisters, and her father! So Elizabeth decides to advertise for a new mother. Then all her problems will be solved – or will they?
Each set of four Go Facts Upper Primary books with its Teaching Guide provides an essential resource for extending students’ reading and writing across the curriculum. Each set contains written examples of all the nonfiction text types complemented by a wide variety of information presented visually.
Teachers can use them to study well-written, accurate examples of each text type as part of a unit of study. Other writing features such as compare and contrast, problem and solution and cause and effect are included to show students how they can improve their informational writing and thinking by incorporating these structures into their own writing. The Teaching Guides include lessons on all of these structures and features.
Volcanoes are like giant pimples on the face of the Earth. They can be spectacular, but are extremely dangerous. Discover how volcanoes are formed, the different types, and how they can benefit and endanger human lives.
Space exploration has a fascinating history and will continue into the future, with many nations now involved in the International Space Station and the exploration of Mars.
In the book Our Future in Space, the teaching focus is on turning categories and keywords into paragraphs.
The solar system include the Sun, the nine planets and their 158 presently known moons. It also includes asteroids, meteroids, comets and interplanetary dust. Come on a journey and travel through our solar system. Visit all nine planets, and discover if NEOs are a threat to Earth.
The Universe is so huge that it's impossible for us to imagine its size. It would take 18 years to fly from the Earth to the Sun, yet this is only a tiny distance in the Universe. Find out how scientists measure the vastness of the Universe, how black holes form, and discover the different constellations on the star maps.
The Go Facts Upper – Healthy Bodies set delves into the wonder of the human body, and the challenges of eating well and staying fit and safe.
The four titles in the Go Facts Upper Science set explore all aspects of science, such as gravity, chemical reactions, photosynthesis and plate tectonics.
Go Facts - Ancient Wonders are marvels of the ancient world. These splendid structures embody some of the most beautiful and intriguing aspects of ancient cultures around the world.
Go Facts - Modern Wonders are special because of their size, beauty or historical and cultural worth. They are buildings and monuments that inspire and intrigue, protect and commemorate. Some contain the most intricate artwork that has ever been produced.
Go Facts - Natural Wonders include some of the highest, deepest, longest, largest and most fragile places on Earth. They range from huge canyons and vast mountain ranges, to the extraordinary polar lights. Natural wonders of the world need to be protected now and in the future.
Go Facts - Technological Wonders are inventions that have transformed the way we live. They range from land, air and space travel, to improving health and sharing electronic information. Throughout the centuries, people have worked to develop the most amazing inventions in the world!
Discover how we use them and the impact they have on our lives and our environment.
Gold is one of the most valuable metals in the world. People have used it for thousands of years as currency and decoration, and more recently in science and technology.
For thousands of years, humans have used timber for everything from fuel, to paper, to musical instruments.
Renewable resources can be replaced as fast as we use them. They include sunshine, wind, flowing water, organic materials and geothermal energy.
Read about the stars of motocross, freestyle motocross, BMX and skateboarding, and learn about the hard work and thrills of being one of the Stars on Wheels!
Read about the people who created some of the world’s most popular Internet sites and have become Stars of the Internet!
Read about the courage and commitment of the Stars of Adventure!
Read about the people who have dreamed big and worked hard to entertain us and so become the Stars of Singing!
Read about the stars and up-and-coming players of the global game in Stars of Soccer!
Read about the men and women who dream of the perfect wave and tour the world as the Stars of Surfing!
Read about the actors who brought author Stephenie Meyer’s characters to life on screen as the Stars of Twilight!
Read about the young actors who grew up on screen as they became the Stars of Harry Potter!
Read about the athletes who chase winters around the globe so they can become Stars of Snow and Ice!
A boy and his dragon friend attempt to rob a castle.
Ben wants answers to why his skateboarding stunt went wrong.
Harriette adjusts to life at a new school after her mother dies.
A near-accident forces friends to explore their tangled relationships.
Olivia falls for the dreamy Asher, but Asher has a secret.
Jenna deals with her messy life by writing in a found book.
James and Harry race to become school captain.
Ben struggles with the guilt of keeping something that isn’t his.
Darcy is turning 13 and her disastrous life is set to continue.
Ruth battles a sea witch to solve the mystery of her Poppa’s death.
Explorers follows the earliest voyages by European explorers to and around Australia.
Symbols and Celebrations reviews the major days observed in Australia, such as Anzac Day, and our national symbols, such as the anthem and flag.
Colonies explains the rationale for each Australian colony and how it grew.
Federation follows the dramatic movement that garnered the people's support for nationhood.
Asia - it's the largest continent on Earth and has more people than all the other continents put together. Discover the diversity of the peoples and environments of Australia's northern neighbours and why our times have been dubbed the "Asian Century".
Lots of people play team sports to help them keep fit, active and healthy. Teamwork explores what's involved in being part of a sports team. It looks at responsibilities of team members, and the roles that cooperation and motivation play in a successful team.
This book also discussed the importance of being a good sport, playing by the rules and the right way to win or lose. Teamwork is full of ideas to help you enjoy being part of a team.
What happens to your body when you undertake physical activity? Why do your breathing and you heartbeat get faster? What happens to your body's temperature when you exercise and why do you sweat? Why do you get thirsty when you exercise? How do you develop strong muscles and bones?
Effects of Physical Activity answers these questions and many more about how the human body reacts to exercise.
We all like to have fun and take risks – when we go on the sporting field or jump on an exciting ride at the carnival, for example. But there are other risks that can cause you severe physical or mental health problems, such as using drugs. Tobacco, alcohol and caffeine are all drugs. What risks do you face when you use these drugs?
No matter who you are, your dietary and exercise needs change as you grow from a child to an adult and then into old age. There is no single diet or exercise routine for every age group. Your age is one factor that determines what you should eat and how much exercise you do.
But more importantly, what you eat and how you exercise while you are young will affect your health for the rest of your life. You cannot go back in time, but you can prepare your body for the future.
| 2019-04-21T12:46:15 |
http://www.blake.com.au/Reading-Eggspress-Year-5-s/4664.htm
|
0.999652 |
A learning health system provides opportunities to leverage data generated in the course of standard clinical care to improve clinical practice. One such opportunity includes a clinical decision support structure that would allow clinicians to query electronic health records (EHRs) such that responses from the EHRs could inform treatment recommendations. We argue that though using a clinical decision support system does not necessarily constitute a research activity subject to the Common Rule, it requires more ethical and regulatory oversight than activities of clinical practice are generally subjected to. In particular, we argue that the development and use of clinical decision support systems should be governed by a framework that (1) articulates appropriate conditions for their use, (2) includes processes for monitoring data quality and developing and validating algorithms, and (3) sufficiently protects patients’ data.
The ability to leverage routinely collected data, both within and across health systems, holds promise for improving the organization and quality of care delivered to patients and for informing diagnostic, treatment, and other decisions based on patients’ needs and individual characteristics. For example, some have argued that clinical decision support systems leveraging data aggregated from patients with similar clinical presentations could be designed to provide real-time, point-of-care feedback to help inform personalized treatment choices.2 However, a number of scientific, ethical, and regulatory questions remain regarding development and use of such clinical decision support systems for the purpose of making treatment recommendations.
In this paper, we focus on the question, What constitutes appropriate regulatory oversight of clinical decision support systems? We argue that while use of these systems does not necessarily constitute a research activity subject to the Common Rule,3 development and implementation of these systems requires a greater level of ethical and regulatory oversight than is generally applied to activities of clinical practice or other health systems-level decisions about care delivery. In particular, ethical and regulatory oversight should ensure that (1) conditions for use of these systems (including adherence to evidence-based approaches) and the basis for the recommendations they generate are appropriately articulated, (2) systems rely on validated algorithms and address issues of data quality, and (3) sufficient privacy protections exist for patients whose data are used.
A clinical decision support system that allows clinicians to query EHRs to inform individual point of care treatment recommendations (hereafter referred to as CDS-EHR) would generally not be considered research under the Common Rule’s definition and would, therefore, not be subject to federal regulation. The objective of a CDS-EHR is not to produce generalizable knowledge but rather to provide a specific recommendation to a clinician and patient regarding appropriate treatment options. The use of this system has more in common with traditional “static” clinical prediction models (CPMs) and other decision tools currently used in clinical practice to inform treatment recommendations (eg, the Framingham Risk Score). A CDS-EHR simply applies previously developed algorithms to existing data for the purpose of generating one-off estimates of potential risks and benefits of interventions under consideration by a clinician and a patient at the point of care. Development and validation of such a CPM might constitute research under the Common Rule, as might the evaluation of outcomes for patients whose treatment choices were informed by the use of these systems.
A CDS-EHR is better understood as what Faden et al. describe as a “learning activity,” namely, an activity that involves integration of clinical care delivery with the objective of learning how to improve clinical practice or health care delivery.7 Oversight of learning activities requires a framework that establishes conditions and governance for ensuring their sound scientific and ethical conduct.
To date, there have been several efforts to clarify appropriate oversight mechanisms for clinical decision support tools. For example, the 21st Century Cures Act identifies 4 conditions that must be met for clinical decision support software to not be defined as a device regulated by the Federal Food and Drug Administration (FDA)8; the FDA has also issued draft guidance to clarify the agency’s interpretation of those 4 conditions.9 Broadly, a CDS-EHR would be excluded from FDA regulation as a device if (1) it is intended for displaying, analyzing, or printing medical information, including information about a patient (eg, test results); (2) it is intended to support or provide recommendations to health care professionals about prevention, diagnoses, or treatment of medical conditions; (3) health care professionals are able to independently review the basis for such recommendations and do not rely primarily on the CDS-EHR in making treatment recommendations for an individual patient; and (4) it does not acquire, process, or analyze information from diagnostic devices.
Regardless of the status of CDS-EHRs with respect to current (or pending) regulatory requirements or proposed voluntary guidance,10 we argue that transparent and responsible use of CDS-EHRs requires adherence to a set of baseline requirements.
Second, oversight is also needed to ensure that development, validation, and upkeep of a CDS-EHR adhere to best methodological practices. The need to adhere to best methodological practices, and not simply standard software validation practices, reflects pervasive concerns about how clinical prediction models are developed and validated.11,12 There are several issues that should be addressed as part of this oversight. First, the quality of data used to develop a model must be carefully examined. For example, despite opportunities presented by access to increasing amounts of EHR data, such data can be incomplete, inaccurate, or otherwise unfit for use in research, including in developing CDS-EHRs.12 Second, all methods used to develop models, no matter how sophisticated, have limitations; their potential impact on the validity and reliability of the models and of resulting treatment recommendations should be assessed. Third, models developed using data from one particular population might not produce valid and reliable recommendations when used in different patient populations without appropriate recalibration procedures.12 Fourth, a CDS-EHR is not self-sufficient; once implemented, oversight is required to ensure its upkeep and evaluation.
Finally, insofar as a CDS-EHR actively queries an EHR system at the point of care, the recommendations generated can reveal protected health information (PHI) to clinicians, particularly in cases of rare diseases or small patient populations. (Even when recommendations are based on aggregate data, the relevant comparison group might be so small as to result in inadvertent disclosure of PHI.) Depending on the level of detail a clinician shares with a patient regarding a treatment recommendation’s underlying rationale, such information could also be inadvertently revealed to a patient being treated. As with other activities in a learning health system, oversight of CDS-EHRs is needed to ensure sufficient privacy protections for patients whose data are used as part of the system.
Oversight of CDS-EHRs with respect to these baseline requirements requires identifying (or creating) the institution(s) with the appropriate independence, expertise, and enforcement capabilities, especially for systems not defined as devices subject to FDA regulations. A national independent body is needed to ensure appropriate use of these systems by clinicians and to establish and monitor adherence to standards for data quality and model validation. Whether an existing federal agency is adequately positioned to assume this role or whether a nongovernmental agency should be charged with this responsibility requires further deliberation. Local hospitals or health care systems, however, might be sufficient for ensuring patient privacy.
While a CDS-EHR is not research as defined by the Common Rule, we argue that such systems constitute learning activities that should be subject to appropriate oversight. Although CDS-EHRs hold great promise for informing patients’ and clinicians’ point-of-care decision making by leveraging large amounts of routinely generated data, they could result in increased risk of harm to patients (eg, inappropriate treatment recommendations, privacy breaches). Therefore, it is imperative that CDS-EHRs be developed using high-quality data and valid and reliable models. It is also imperative that clinicians are informed about appropriate use of CDS-EHRs, that they sufficiently understand the recommendations generated, and that the privacy of patients’ data used by such systems is adequately protected.
Efforts to improve oversight of CDS-EHRs should also consider where oversight authority should be situated. Regardless of which agencies are charged with oversight, we believe that compliance with oversight policies or regulations should be required rather than voluntary, especially since individuals and organizations developing these systems can be influenced by incentives not always consistent with improving outcomes for patients. Systems developers, methodologists, clinicians, patients, and other health care stakeholders should be involved in efforts to inform development of appropriate policies and methodological standards for developing, validating, and maintaining CDS-EHRs to ensure high-quality, patient-centered care.
National Academy of Medicine. The learning health system series. https://nam.edu/programs/value-science-driven-health-care/learning-health-system-series/. Accessed March 21, 2018.
Federal policy for the protection of human subjects; final rule. Fed Regist. 2017;82(12):7149-7274. https://www.gpo.gov/fdsys/pkg/FR-2017-01-19/pdf/2017-01058.pdf. Accessed April 6, 2018.
National Commission for the Protection of Human Subjects of Biomedical and Behavioral Research. The Belmont Report: ethical principles and guidelines for the protection of human subjects of research. https://www.hhs.gov/ohrp/regulations-and-policy/belmont-report/read-the-belmont-report/index.html. Published April 18, 1979. Accessed April 6, 2018.
Kass NE, Faden RR, Goodman SN, Pronovost P, Tunis S, Beauchamp TL. The research-treatment distinction: a problematic approach for determining which activities should have ethical oversight. Hastings Cent Rep. 2013;43(suppl 1):S4-S15.
Beauchamp TL, , Saghai Y. The historical foundations of the research-practice distinction in bioethics. Theor Med Bioeth. 2012;33(1):45-56.
Faden RR, Kass NE, Goodman SN, Pronovost P, Tunis S, Beauchamp TL. An ethics framework for a learning health care system: a departure from traditional research ethics and clinical ethics. Hastings Cent Rep. 2013;43(suppl 1):S16-S27.
21st Century Cures Act, HR 34, 114th Cong, 2nd Sess (2016).
US Food and Drug Administration. Clinical and patient decision support software: draft guidance for industry and Food and Drug Administration staff. https://www.fda.gov/downloads/medicaldevices/deviceregulationandguidance/guidancedocuments/ucm587819.pdf. Accessed March 18, 2018.
Clinical Decision Support Coalition. Introductory memorandum. http://cdscoalition.org/wp-content/uploads/2017/08/CDS-3060-Guidelines-Final-2.pdf. Published August 30, 2017. Accessed March 18, 2018.
Collins GS, Reitsma JB, Altman DG, Moons KG. Transparent reporting of a multivariable prediction model for individual prognosis or diagnosis (TRIPOD): the TRIPOD statement. Ann Intern Med. 2015;162(1):55-63.
Hersh WR, Weiner MG, Embi PJ, et al. Caveats for the use of operational electronic health record data in comparative effectiveness research. Med Care. 2013;51(8)(suppl 3):S30-S37.
This article is the sole responsibility of the author(s) and does not necessarily represent the views of the National Academy of Medicine or the Patient-Centered Outcomes Research Institute (PCORI) or that of PCORI's board of governors or methodology committee. The viewpoints expressed in this article are those of the author(s) and do not necessarily reflect the views and policies of the AMA.
Emily L. Evans, PhD, MPH is a program officer for the Clinical Effectiveness and Decision Science program at the Patient-Centered Outcomes Research Institute (PCORI) in Washington, DC. Prior to joining PCORI, she served as a consultant to the Institute of Medicine Committee on Ethical and Scientific Issues in Studying the Safety of Approved Drugs and as a member of research teams at the Johns Hopkins School of Medicine. She earned a BS in ethics, history, and public policy from Carnegie Mellon University, an MPH from Johns Hopkins Bloomberg School of Public Health, and a PhD in philosophy from Georgetown University.
Danielle Whicher, PhD, MHS is a senior program officer for the Leadership Consortium for a Value and Science-Driven Health System at the National Academy of Medicine in Washington, DC. She was previously a program officer for the Clinical Effectiveness and Decision Science program at the Patient-Centered Outcomes Research Institute, a project coordinator at the Johns Hopkins Berman Institute for Bioethics, and a guest lecturer at Johns Hopkins Bloomberg School of Public Health. She earned a BA in molecular biology from Colgate University as well as an MHS in health policy and management and a PhD in health policy and management and bioethics from the Johns Hopkins Bloomberg School of Public Health.
| 2019-04-21T06:12:15 |
https://journalofethics.ama-assn.org/article/what-should-oversight-clinical-decision-support-systems-look/2018-09
|
0.99848 |
Pain management, pain medicine, pain control or algiatry, is a branch of medicine employing an interdisciplinary approach for easing the suffering and improving the quality of life of those living with chronic pain. The typical pain management team includes medical practitioners, pharmacists, clinical psychologists, physiotherapists, occupational therapists, physician assistants, nurse practitioners, and clinical nurse specialists. The team may also include other mental health specialists and massage therapists. Pain sometimes resolves promptly once the underlying trauma or pathology has healed, and is treated by one practitioner, with drugs such as analgesics and (occasionally) anxiolytics. Effective management of chronic (long-term) pain, however, frequently requires the coordinated efforts of the management team.
In adult patients with blunt thoracic trauma (P), does epidural analgesia (I) versus nonregional modalities of pain control (C) (i.e., intravenous or enteral analgesics such as opioids, acetaminophen, nonsteroidal anti-inflammatory drugs [NSAIDs]) improve analgesia, decrease pulmonary complications and need for mechanical ventilation, shorten length of stay, and/or decrease mortality (O)?
In adult patients with blunt thoracic trauma, the guideline authors conditionally recommend epidural analgesia over nonregional modalities of pain control (i.e., intravenous or enteral analgesics such as opioids, acetaminophen, NSAIDs) for the treatment of pain. This recommendation is based on very low-quality evidence but places a high value on patient preferences for analgesia. If certain confounders (or effect modifiers) such as age, number of rib fractures, or severity of injury are considered, a stronger positive magnitude of effect may be observed for certain outcomes of interest.
In adult patients with blunt thoracic trauma (P), does paravertebral block (I) versus nonregional modalities of pain control (C) (i.e., intravenous or enteral analgesics such as opioids, acetaminophen, NSAIDs) improve analgesia, decrease pulmonary complications and need for mechanical ventilation, shorten length of stay, and/or decrease mortality (O)?
It is important to note that paravertebral block had equivalent pain control compared with epidural analgesia and provided significant pain relief compared with baseline. While desirable consequences probably outweigh undesirable consequences, because of the lack of studies comparing paravertebral block to nonregional pain control modalities, the guideline authors are unable to make a recommendation regarding the use of paravertebral blocks.
In adult patients with blunt thoracic trauma (P), does continuous intrapleural infusions of local anesthetics (I) versus other regional modalities of pain control (C) (i.e., epidural or paravertebral nerve blocks) improve analgesia, decrease pulmonary complications and need for mechanical ventilation, shorten length of stay, and/or decrease mortality (O)?
There is limited available literature regarding intrapleural analgesia for blunt thoracic trauma. The few studies that were identified were of very poor methodological quality. Because of insufficient evidence, the guideline authors are unable to make a recommendation.
In adult patients with blunt thoracic trauma (P), does multimodal analgesia (I) (i.e., use of different classes of analgesics, including combinations of opioids with other agents such as NSAIDs, pregabalin/gabapentin, acetaminophen) compared with opioids alone (C) improve analgesia, decrease pulmonary complications and need for mechanical ventilation, shorten length of stay, and/or decrease mortality (O)?
Although the quality and quantity of evidence for the use of multimodal analgesia in adult patients with blunt thoracic trauma are very limited, the guideline authors conditionally recommend this modality. This recommendation is based on very low-quality evidence but places a high value on patient preferences for analgesia. There is some indirect evidence that multiple analgesic modalities (i.e., transdermal fentanyl, NSAIDs), when combined, decrease pain in patients with blunt thoracic trauma. Use of alternative agents for patients with refractory pain is consistent with the clinical experience of the group, as patients often seek alternatives when a standard sole opioid regimen fails. Moreover, standard sole opioid regimens are often associated with adverse effects, especially as doses are escalated, thus requiring consideration for additional nonopioid analgesics.
In adult patients with blunt thoracic trauma (P), does continuous intercostal infusions of local anesthetics (I) versus nonregional modalities of pain control (C) (i.e., intravenous or enteral analgesics such as opioids, acetaminophen, NSAIDs) improve analgesia, decrease pulmonary complications and need for mechanical ventilation, shorten length of stay, and/or decrease mortality (O)?
Because of the lack of studies that fulfilled the inclusion criteria, no evidence profile was created. Because of insufficient evidence, the guideline authors are unable to make a recommendation.
| 2019-04-21T20:49:33 |
https://speciality.medicaldialogues.in/pain-management-for-blunt-thoracic-trauma-guideline/
|
0.99999 |
And practically every day, Publishers Weekly, Publishers Lunch, Editor & Publisher and other online industry trade magazines carry multiple news stories about e-books, e-readers, and all the problems and promises the publishing industry is experiencing as it rapidly transitions from paper and ink to all-digital.
There are some significant differences between reading a printed book and an e-book, however. Printed books are discrete, which means that you can leaf through them randomly, backward or forward, stop wherever something catches your interest, and flip to a specific page in seconds. E-books are serial devices that proceed sequentially, so you can't easily thumb through the text at random.
Perhaps the biggest difference is that, like all other electronic devices, e-readers require power to operate. While you can pick up a centuries-old book, turn a page and begin reading, once your e-reader's battery charge is exhausted, you're stranded. (A couple of models feature user-swappable batteries, while others can provide power via a USB cable or AC adapter.) E-readers with monochrome screens can give readers days or even weeks of service on a single charge. However, tablets with power-hungry touch screens need to be recharged after six to 10 hours of reading.
The process of buying and downloading e-books varies from device to device. The most convenient e-readers are those that feature both 3G and Wi-Fi, which automatically connect to a linked online bookstore, allowing you to browse among hundreds of thousands of titles, usually organized by what's new, bestsellers, author, category, price and other criteria. When you find a book description you like, you can either download a free sample or purchase the book. Since the e-bookstore already has your credit card number and e-reader address, all it takes is a single click to buy the book and have it automatically delivered to the device.
Less sophisticated devices connect to online bookstores and public-domain e-book Web sites via a USB cable that connects to your computer (and which usually doubles as a charger).
As with Macs and PCs, e-reader file incompatibilities must be considered when purchasing or downloading an e-book, newspaper or document. Most e-readers recognize and use the industry ePub file format, but Amazon's Kindle uses a proprietary format called AMZ. What this means is that B&N's Nook, which does use ePub, and Amazon's Kindle can't directly download e-books from each other's bookstores. This probably isn't a problem for most users, since both vendors essentially offer the same inventory at similar prices. But if you already own, say, a Nook and you want one of the new Kindles -- sorry, but you won't be able to transfer your library from one to the other.
Most public-domain Web sites, such as Project Gutenberg, and some smaller e-bookstores allow users to specify which format they want their e-books in. However, many public-domain e-books are available only in PDF or TXT formats, which not all e-readers can handle. What's more, even if your device can display PDF files, it may not format correctly, forcing you to pan across the page to read everything. Some e-readers can correctly format ("reflow") PDF files for easier reading, and some allow users to zoom in and out to better view details.
Most e-readers also allow users to download their own files (including JPEG photos and MP3 audio), but only a few can display Microsoft Word's DOC/DOCX formats, a disadvantage if you want to carry your departmental report or great American novel manuscript with you. Incidentally, while you can download personal files for free to your USB/Wi-Fi-equipped Kindle, you'll have to pay 99 cents to Amazon if you want that same file transmitted wirelessly via your 3G connection.
Do you own your e-book?
Buy a print book, and it's yours forever, to keep, give away or sell to whomever you wish. Most e-books, however, are saddled with what is known as DRM, or digital rights management. This witch's brew of legalese is heavily slanted toward the publisher rather than the book buyer and essentially says that you own the right to read the book, period. It's not yours to lend, sell or give away.
The exception is Barnes & Noble's loan capability, which lets you loan a specific e-book to a friend with a compatible e-reader device one time only, and for no more than 14 days. While it's out, you can't simultaneously read it on your Nook, and when it's returned at the end of two weeks, you can't loan it out again.
Although sales of e-readers are going gangbusters, some industry pundits are already speculating that the iPad and other tablets could kill off e-readers entirely. Tablets incorporate e-reader functionality and connection to electronic bookstores, but they're multipurpose devices that can also be used as computers, personal multimedia centers, Web browsers, communications devices or anything else that tens of thousands of apps can open up. However, other experts say that those who do a lot of reading will stick with the more lightweight, easier-on-the-eyes e-readers.
And printed books? Back in the early 1990s, the first crop of digital cameras debuted to an indifferent public, who were quite unimpressed with their high prices, terrible performance and awful image quality. These days, however, digital cameras are ubiquitous and film cameras virtually extinct. Similarly, most publishing experts predict that paper-and-ink books -- as well as physical newspapers and magazines -- will ultimately go the way of the dodo.
But along the way to book extinction, there will be a continual shakeout in the e-reader industry as overpriced, poorly designed or underpowered devices succumb to buyer apathy, while better, less expensive e-readers continue to flood the market.
It's an exciting era for the publishing industry, and a great time for readers everywhere.
Including privately branded devices and Asian knockoffs, there are probably more than a score of e-readers currently on the American market. For this roundup, we focused on currently shipping, readily available models, most by mainstream vendors. These include the Alex, jetBook Lite, iPad, Kindle, Kobo, Libre eBook Reader Pro, Nook and Pandigital Novel.
To put our collection of e-readers through their paces, we downloaded one of the great works of Western literature that we've somehow never found time to read: Leo Tolstoy's monumental novel War and Peace. Since it is in the public domain, downloads are free (except for the $2.99 we paid to secure a version from Sony's library, which turned out to be Volume II and not the entire work).
For 3G or Wi-Fi-equipped devices, we downloaded the book directly from each e-reader's linked bookstore in each device's native format. For e-readers that were directly associated with online bookstores, we first downloaded the novel to a PC (in ePub format) from a third-party Web site like Project Gutenberg or epubBooks, then transferred it to the device via a USB cable. In some instances, we also purchased and downloaded a few best-sellers and other for-sale works. We took note of how painless or tedious the purchase and download process was for each device.
Then, we read. We noted how we enjoyed or disliked the reading experience, checking and comparing variables such as weight, balance and control, layout, how well the unit fit in our hands, bootup speed, how simple it was to navigate around the library, the ease in turning pages or skipping to the next chapter, using the keyboard to input notes or surf the Web, looking up words in its dictionary, changing settings, and other features such as text-to-speed, MP3, free books provided and so on. We also evaluated the quality of each display and how legible the text was.
Longer than most of its peers, Spring Design's Alex e-reader is slim, trim and elegant to hold and use.
Like the Kobo, Kindle and Nook, the Alex e-reader features a 6-in. E Ink monochrome display, but directly below -- and the reason why it's an extra-tall device -- is a 3.5-in. Android-powered color touch screen. While this over-and-under design supposedly gives users the best of both worlds -- a cool e-reader and state-of-the-art smartphone-like Web browser -- the Alex e-reader's awkward ergonomics and high price erode much of its luster.
The all-black (or all-white) Alex e-reader has a smooth tactile feel and fits well into the palm of your hand, but with single forward and backward page arrows on opposite sides of the device, it's hard reading one-handed.
The E Ink screen is dull-gray, but characters are dark, well formed and legible. The 16-bit color touch screen is roughly the size of a smartphone and is nicely responsive without being overly sensitive.
Besides the page-back/page-forward buttons, there's a power switch on the right, a Back button on the left, and a small sync button between the E Ink and color touch screens. A pair of stereo speakers is on the back, as is a tiny indent for a microSD card, and on top is its Micro USB port and an earphone jack.
What's interesting: The Alex e-reader comes preloaded with a number of public domain classics, plus an Australian version of George Orwell's novel 1984. Its bookstore offers convenient links to popular paid and free e-book sites, including Project Gutenberg, Feedbooks and Smashwords.
What's good: Like the Kindle's, the Alex e-reader's screen is brighter, and the type darker, than some other digital-ink displays'. The full title, author, page number, total pages, progress bar, battery status and local time are displayed in the header and footer.
While you're reading text, the color touch screen displays a progress bar. Slide a finger along it, and the book jumps to the page number wherever you stop. If it's too dark to see the monochrome screen, you can simultaneously display the text on the color touch screen. To conserve the battery, touching the power button will turn off the color touch screen; pressing it again instantly wakes it up. If you wish, you can surf the Web or check e-mail while continuing to read. Like with the iPad, the book covers and contents of the library can be displayed and flipped through with the swipe of a finger.
What's not: The price. It's also a little too tall to stow into a back pocket or a purse. And except for when the tiny font size is selected, the line spacing on the small, normal, large and huge fonts is overly spacious and somewhat distracting.
Bottom line: Spring Design says that two additional Alex e-reader 3G and GSM-equipped models will shortly be available. It's doubtful that any of them will succeed until and unless they are priced competitively.
Device size: 4.7 x 8.9 x .6 in.
The jetBook Lite is a bit outdated in its technology but is compatible with a wide range of e-book formats -- and it can use regular AA batteries or rechargeables, which some might find convenient.
For openers, the jetBook Lite doesn't offer 3G or Wi-Fi connectivity, lacks MP3 capability and has limited built-in memory. What's more, the jetBook Lite's monochrome screen is the smallest and has the lowest resolution of any device we tested, and it uses an inferior-looking TFT (thin-film transistor) display technology rather than E Ink.
The most prominent feature you'll notice about jetBook Lite's black, all-plastic body is its rounded, asymmetrical battery hump in the back. While all the other e-readers have a built-in rechargeable lithium battery, the jetBook Lite is powered by four AA batteries. Making a virtue of necessity, the dimpled hump actually makes it easier to hold the device in your left hand, though righties may find it somewhat inconvenient to hold and turn pages one-handed.
What's interesting: This no-frills e-reader packs a lot of compatibility that will keep it from becoming obsolete anytime soon. It recognizes and displays many popular formats, including ePub, Mobi, PRC, RTF, TXT, PDF, FB2, JPEG, GIF, PNG, BMP and Adobe DRM. Since it accommodates SD cards, expansion capacity is almost infinite. And if you're a linguist and enjoy reading foreign books in the original tongue, the jetBook Lite supports ePub contents in 28 languages, ranging from Albanian to Vietnamese. Because you can quickly swap out universally available AA batteries, you needn't fear that you'll run out of juice when you're far from civilization and a convenient electrical outlet.
What's good: The jetBook Lite is literally a take-everywhere e-reader because, even with the battery hump, it's small and light enough to slip into your jeans' back pocket. Both the page number you're on and length of the book are displayed, as well as the percentage already read.
The page screen turns quickly, and without the hesitation or ghosting sometimes experienced on E Ink displays. For the lazy-minded, you can program it to automatically turn pages. Content can be easily organized into folders. And just in case you don't know where to look for free public-domain books, there's a folder with a list of Web sites where you can download content.
What's not: When you hold the jetBook Lite in your hand, it feels more like a cheap and insubstantial electronic game than a quality instrument. Characters aren't as crisp, dark or contrasty as those displayed on E Ink screens, and you can even see actual pixels when you bump up the font size to the max. And there appears to be no way to change, add or remove any of the preassigned folders in the jetBook Lite's internal file manager.
Bottom line: The jetBook Lite is a good choice for users who don't want to be tied to a single e-book source, expect to be away from civilization for days or weeks at a time, and couldn't care less about added extras like music and Web access. But for those who are more interested in quality, convenience and versatility, we feel that you'll be happier looking elsewhere for your e-reader.
Device size: 4.3 x 6.0 x 0.9 in.
With 4 million-plus units sold since its introduction this spring, Apple's sleek and stylish iPad instantly became the 800-pound gorilla of computer tablets.
And that is both its strength and weakness -- the iPad is a powerful and versatile computer tablet, not a dedicated e-reader. So, how well does it function as an e-reader?
Like most Apple products, the iPad is easy to learn and simple to use. Its large, bright color touch screen displays side-by-side or single pages. Turning a page simply requires the light swipe of a finger over the text.
Although the iPad's LED backlit touch screen consumes much more power than E Ink or TFT monochrome screens, its built-in battery can give up to 10 hours of continuous or intermittent reading. Another plus is that Apple's iBooks store makes browsing, sampling, buying and downloading books a quick and painless experience.
What's interesting: We don't know if Apple has set out to establish one of the world's largest online bookstores, but with millions of book downloads made available in an astonishingly short time, it's right up there at the top with Amazon and Barnes & Noble. As an e-reader, the iPad has quickly found an enthusiastic following, especially among those drawn to its remarkable ease of use and large and legible, ultrabright color touch screen. The screen more closely mimics book pages than any e-reader, even down to a swishing sound it makes when you turn the page.
What's good: Besides offering two type sizes and five fonts, users can, with the swipe of a finger, turn pages, adjust the brightness, activate the dictionary, make a bookmark or start a search. (Sorry, but you can't spread your fingers to automatically enlarge or shrink e-book text.) It also quickly and automatically orients itself to whatever way you're holding the iPad. After you exit to check your e-mail or watch a Netflix film, it automatically returns you to the correct page when you decide to resume reading. And in the header and footer, you always know the name of the author, the book's title, what page you're on, and how many pages are left in the chapter and the rest of the book.
What's not: Despite its long list of pluses, the iPad has a few serious ergonomic drawbacks that may somewhat diminish its e-reader appeal.
It's significantly larger and heavier than all other e-readers we tested -- not only can't you read comfortably with one hand, but holding it with both hands quickly becomes exhausting. Heaven forbid that you happen to drop the iPad, because its fingerprint-prone glass touch screen can easily shatter. Also, the highly reflective, backlit touch screen, while bright and highly legible in normal light, is difficult to impossible to read in bright light.
Bottom line: Apple's remarkable iPad is far more powerful, versatile -- and expensive -- than every other e-reader. It's certainly the one to get if you want a tablet that can double as an e-reader. But it's both overpriced and overkill for those who only want a small, compact and affordable device dedicated to reading.
Device size: 7.5 x 9.6 x .5 in.
Far and away the most successful, best-selling line of e-readers -- Amazon doesn't release figures, but it's thought to be between 3 million and 4 million units -- the Kindle is the benchmark by which all other e-readers are measured.
The latest-generation Kindle raises the bar even higher than the vaunted Kindle2 -- it is smaller and lighter, has a brighter screen, and comes with double the memory and significantly better battery life. Most important, the price was lowered even further for the basic 3G model. The public responded to the new Kindle so enthusiastically that it was sold out and back-ordered within hours of being announced.
The all-gray (or all-white) Kindle may not be the smallest and lightest e-reader, but it is the thinnest, slimmer than a No. 2 pencil -- about as thin as Star Trek's futuristic data pads. With page-control buttons on both sides, reading one-handed has never been easier.
The redesigned five-way controller button aids in faster navigation. Instead of offering a virtual keyboard, the Kindle retains its hokey pimple-type QWERTY keyboard directly below the screen. On the rear are stereo speakers, for both playing music and speech-to-text reading (available on select books only).
What's interesting: The 3G model is GSM-enabled, which allows international travelers to connect to Amazon in many countries. The new E Ink screen, while still the same size and resolution as its predecessor, has a significantly lighter background, so the text has more contrast and is easier to read. Page-turning is faster, and readers can choose from three typefaces and seven font sizes, and decide how many lines of text appear on a page. Also, Amazon is working hard to expand its fledgling social network among readers.
Unlike some e-readers', the Kindle's memory is not expandable, but with almost 3GB, it has enough capacity to store up to 3,500 books. If your library is larger than that, you can be assured that even if a particular e-book isn't currently on your device, all your e-books are permanently stored on Amazon's servers and can be accessed by any device you own. It even syncs automatically, so if you leave your Kindle at home, you can continue to read that book you started on your iPhone or your Android phone, and it will automatically open to the same page.
What's good: The best thing about this latest-generation Kindle is that the technology is almost completely transparent. Once you set up your Amazon account on your Kindle, you don't have to think twice about parameters, settings, connectivity or any other minutiae.
Although Amazon sells books in its proprietary format, AMZ, the Kindle can download and read DOC, DOCX, PDF, HTML, TXT, RTF, JPEG, GIF, PNG, BMP, PRC and MOBI files from any number of digital libraries and bookstores. Besides the standard dictionary, it provides direct access to Wikipedia.
Amazon offers a two-year extended warranty against accidental damage or destruction. It also sells a $59 leather case that includes a built-in Kindle-powered light for reading in the dark.
What's not: Instead of displaying the page number, the Kindle shows a progress bar and percentage read, plus somewhat cryptic location numbers (such as 27 19-39) and a meaningless total data amount (e.g., 22247). Web access is still listed as a beta function, meaning that it's very slow and requires some manipulation in order to make it properly display and navigate.
But the Kindle's most glaring omission is Amazon's stubborn refusal to embrace the industry-standard ePub file format, which somewhat limits the number of books available for purchase.
Bottom line: Amazon CEO Jeff Bezos recently predicted that there would be at least a 20th-generation Kindle, which tells us that he believes this to be an evolutionary device that will only get better over time. As it stands right now, the Kindle's design, quality construction, incredible simplicity yet great depth of features helps explain why it's the best-selling e-reader out there.
Device size: 4.8 x 7.5 x .33 in.
Small, light, easy to carry and use, with a long-lived battery and a memory card slot for expansion, Borders' Kobo would, at first glance, appear to be a near-perfect dedicated e-reader. It's only when you look at the details -- and at the screen -- that you wonder if maybe you should have instead spent your money on a Kindle or a Nook.
The all-plastic, two-tone, white-fronted Kobo has an excellent tactile feel, due in part to its slimness and quilted no-slip gray back. Its layout is a model of simplicity -- there's a single blue four-way direction (D-pad) navigation button on the lower right front, four buttons on its left side (Home, Menu, Display and Back), a Micro USB port on the bottom, and the power button and memory card slot on top. However, the Kobo is definitely for the right-handed reader, since the navigation button is positioned on the far right side.
What's interesting: Besides USB connectivity, the Kobo incorporates a built-in Bluetooth interface. However, it syncs only with certain Blackberry devices, not your PC or another e-reader.
Pressing the D-pad up or down enlarges or reduces the size of the typeface. The Kobo supports ePub, PDF and Adobe DRM file formats. There's a status light underneath the bezel that glows red and violet while charging, and blue when fully charged. The blue light also briefly illuminates whenever you page forward.
What's good: The header and footer display the book title, chapter and number of chapter, page number and number of pages in the chapter. Readers can choose among five font sizes and either a serif or sans serif typeface. The Kobo comes with 100 preloaded public-domain books.
What's not: Because it lacks Wi-Fi and 3G capabilities, the Kobo must be attached to a computer to download books. It accepts only SD cards up to 4GB, not higher-density SDHC cards that will handle up to 32GB. And unlike Barnes & Noble's Nook, you can't automatically browse or sample books in a Borders bookstore.
Booting up, loading a book and turning pages is slow. The Kobo's screen is relatively dull, the fonts are thin and light, and the space between lines is large, so prolonged reading can tire your eyes, plus it requires more frequent page turns. The text displays only in portrait mode, not landscape, which makes paging and panning through PDF documents tedious.
Bottom line: In today's fast-moving e-reader market, Kobo needs to stay competitive with price reductions and technology improvements. The Kobo recently dropped its price by $30, but considering how quickly its competitors are pushing the technology envelope, that may not be enough.
Device size: 4.7 x 7.2 x .4 in.
Although not the least expensive e-reader out there, the Libre eBook Reader Pro qualifies as the smallest and lightest of the devices we reviewed. Its black, high-impact-plastic exterior is virtually identical to that of the less expensive Ectaco jetBook Lite, except instead of a hump for replaceable AA batteries, there's a small, tapered rectangular mound on the back for housing the device's built-in rechargeable lithium battery.
Along the right side are eight alphanumeric buttons that, depending upon the mode, either perform some function, skip to a particular page or chapter, or allow you to enter data. Typing out letters and words can be a slow, painful process requiring many button pushes.
On the other side is a 2.75-in.-long slide -- push it down to turn the page, up to return to the previous page. You can also turn pages by pressing the two square buttons on the lower-left front of the device, or the left/right arrows on the D-pad button on the right side. Surrounding the D-pad are four other buttons -- magnify (using six type sizes), function (dictionary, bookmark list, bookmark this page, find, jump to, settings), rotate text, and back.
The on/off button and MP3 audio jack (the Libre has no speakers) are on the bottom, and on top, underneath a pullout flap, are the Micro USB port and SD memory slot.
What's interesting: Aluratek's menu structure is simpler and easier to navigate than Ectaco's. Readers can choose either English or French for their displays, not the United Nations of languages available on the jetBook Lite. Although it's not linked to any particular e-bookstore, the Libre eBook Reader Pro's ability to read and display ePub, RTF, PDF, TXT, PRC, FB2, JPEG, BMP and GIF files assures compatibility with most online bookstores and public-domain libraries.
What's good: While the Libre eBook Reader Pro is a basic, no-frills device, it comes equipped with MP3 capability, a 2GB SD card, earphones, a pouch and even a hand strap. Aluratek also preloads 100 public-domain books (all in English) onto the SD card to get you started.
You can read comfortably using either your left or right hand only, plus you can instantly rotate the text by pushing a single button. The book title (or part of it, if it's in portrait mode), page number, total number of pages, percentage completed and battery status are all displayed as white characters against a black background in the header.
What's not: Loading your book can be slow, although page-turning is relatively quick. The display is dull, characters aren't very sharp or crisp, especially when magnified, and the wide spacing between lines (which can't be tightened up) can be visually distracting. And unlike with many other e-readers, you can't read anything while the device is charging.
Bottom line: Both the Kindle and the Nook completely outclass the Libre eBook Reader Pro in build quality, features, convenience, connectivity, ease of use and overall value -- all at a cost of only a few bucks more. The only way this e-reader can stay competitive is for Aluratek to immediately drop the price below $99.
Device size: 4.3 x 6.0 x 0.6 in.
It has a good tactile feeling, and although the back isn't made of true no-slip material, its light roughness does make the device easier to hold. Identical forward and backward page buttons are positioned on both sides -- they even have a tiny bump, so you can easily feel where your finger should push to flip the page forward or backward. This arrangement makes the Nook a truly ambidextrous device, easy to hold and read using either the left or right hand. You also can swipe the touch screen beneath (though only when it's dark) to turn pages. All other controls except the power button on top are accessed via the color touch screen.
The touch-screen menu is simple and intuitive, requiring only a finger touch to access the following modes and submenus: The Daily (recent downloads, blogs, firmware upgrades or periodical subscription deliveries), My Library (lists of documents, books, recent deliveries), shop (browse B&N's e-books, magazines and newspapers or set up a wish list), Reading Now (returns you to your current book page), games (Sudoku or chess), Wi-Fi, audio, Web and settings. To conserve power, you can turn off the color touch screen, as well as Wi-Fi and 3G.
What's interesting: Like the Kindle, the Nook is a system rather than simply a device, capable of easily browsing and making one-click purchases and downloads from Barnes & Noble's vast store of e-books, newspapers and periodicals. What's more, your Nook's Wi-Fi connects automatically to allow you to read free excerpts from any e-book while you're sipping a latte at your favorite B&N store. You can also lend or borrow books for free, for up to 14 days. Depending upon the book you're reading, the Nook can display text in up to 16 different languages.
What's good: With 16 shades of gray, three different fonts and five available type sizes, the Nook's contrasty, highly legible monochrome screen is among the best that we tested. You can personalize your Nook by downloading any picture (via USB, not Wi-Fi or 3G) and make it your screensaver. B&N sells an optional $69 two-year protection plan that will repair or replace your e-reader if it is damaged by spills, drops or other accidents.
The Nook also allows access to the Internet via Wi-Fi (though not 3G, which is reserved for the B&N connection). Like the Kindle, it automatically checks for firmware upgrades and other messages every time it powers up and installs them automatically.
What's not: For all its advantages, the Nook is slow to power up, text can't be rotated, it lacks text-to-speech capability, and it offers monaural audio only. Nor can it handle TXT or DOC files.
Internet access is painfully slow and the beta software still buggy. Tapping the precise spot on the smartphone-size touch screen with your fingernail can be difficult, as is using the virtual keyboard. And while the Nook has a microSD memory card slot and a user-replaceable rechargeable battery, cracking open the case to access them can be daunting and difficult.
The Nook's touted ability to provide access to any e-book at any Barnes & Noble brick-and-mortar store has its frustrations as well. The maximum time per book is one hour per every 24 hours, and even that is diminished because the text downloads a page at a time, often keeping you waiting for the next page.
And while you can lend or borrow some e-books with other Nook owners (or friends who download B&N's software onto their computers or smartphones), it's a one-time, 14-day deal, after which you can't loan it out again, even though you own it.
Bottom line: The Nook and Amazon's Kindle are closely matched in ergonomics and price, and in offering readily available, easily downloadable free or for-sale e-books -- but not in performance. However, if you value the ability to use your e-reader in-store or to loan out your e-books, the Nook is the device you'll want.
Device size: 4.9 x 7.7 x 0.5 in.
Is Pandigital's Novel a slightly oversized e-reader or a scaled-down iPad-like tablet? Or, perhaps, it's a smartphone without calling capability? The answer is yes -- it's a bit of all three.
This Android-powered device comes packed with classic tablet/smartphone features, like a bright high-resolution 7-in. color touch screen, Wi-Fi, multimedia and e-mail capability, the ability to run thousands of third-party apps, stereo speakers, and a Web browser. As an e-reader, it allows you to browse and buy wirelessly from Barnes & Noble, use B&N's 14-day lending library, read any ePub or PDF file, and expand the number of books in your library via optional memory cards. All this, and more, for the price of a Nook or a Kobo.
Overall, the Novel has a solid feeling of quality construction and attention to detail. The all-white, all-plastic device is wider and heavier than the dedicated e-readers we tested; it is also thicker than the iPad.
On the left side is the volume control, and on top are the power switch, Micro USB port, SD memory card slot and reset button hole. Don't assume you can trickle-charge the Novel by connecting it to your computer's USB port -- that simply doesn't work.
What's interesting: While not as fast or powerful as the iPad, the Novel is almost as versatile and can run most Android apps (alas, Netflix is not one of them -- apparently, streaming video is not supported by the device). Like with the iPad, the page auto-rotates to whatever orientation you're holding the e-reader. Besides being able to change font sizes, you can switch from black-type-on-white to a white-type-on-black background, for better night viewing.
What's good: Powering up and switching between modes or apps is speedier than with most e-readers. Although its tap-and-slide navigation isn't as slick or sophisticated as the iPad's, it's a bump up from the Kindle's pimple-like keyboard. Because its touch screen isn't as sensitive as the iPad's, an accidental finger pass isn't as likely to inadvertently turn a page or blunder into an unwanted mode. A light brush of the thumb is all that's needed to turn a page forward or backward.
What's not: Like the iPad, the Novel's touch screen is glass, and therefore highly reflective, fragile and hard to read in direct sunlight. The touch screen requires a lot of juice, so the battery lasts only about six hours, far less than the other e-readers we tested. And because of its weight, reading one-handed is a test of strength and stamina.
Bottom line: While dedicated book lovers may be put off by its weight, reflective screen and limited battery life, for most readers, Pandigital's dual-purpose Novel hits all the right notes: price, performance and versatility.
Device size: 5.5 x 7.5 x 0.5 in.
Choosing a favorite from among the e-readers we tested is a difficult task. Some models offer advantages and features that the others do not, but no single device has clear superiority.
For sheer versatility, the iPad would win hands down, but its high price and weight, and the difficulty we had in seeing the screen in bright sunlight, make it a less-than-ideal e-reader.
We liked Pandigital's e-reader very much for its iPad-like features and relatively low price, but its short battery life and highly reflective screen are deal-breakers for serious readers.
The Nook's dual screens deliver excellent readability with touch-screen convenience, but it can't handle Microsoft Word or standard TXT files, and we don't care for B&N's lending and in-store reading restrictions.
The Ectaco jetBook Lite and the Aluratek Libre eBook Reader Pro are reasonably good e-readers but have been outclassed in both technology and price by the competition.
Which leaves Amazon's Kindle. The Kindle is a trouble-free, transparent piece of technology, very easy to use, quite convenient to hold and carry, and a pleasure to read on.
So for now, the Kindle is the e-reader of choice -- but this is a market that's evolving almost daily. Stay tuned.
Daniel Grotta and Sally Wiener Grotta are a husband/wife writing team. Together, they have written over a thousand feature stories, reviews and columns for major magazines, plus they have co-authored eight nonfiction books.
| 2019-04-22T00:06:58 |
https://www.techworld.com.au/article/360688/e-reader_roundup_8_devices_compete_crown/?utm_medium=rss&utm_source=tagfeed
|
0.999999 |
Joe may be the name her parents gave her but large number of misspell this task.
Supervising is how she supports her friends her salary has been really satisfactory.
to find time regarding it. Texas is where her home is definitely.
| 2019-04-21T04:34:33 |
http://www.xgssd.com/member.php?u=17243&s=9dceb7b8acccddf12fd96e53ba4a48b3
|
0.99909 |
Would this be an example of a successful effort?
Tornadoes are fascinating and violent storms. Understanding their behavior and effects is an important undertaking that can save lives. Given Tyler’s foundation in climate change and storms, specifically tornadoes, this project has the potential to create results that have lasting impacts and add to the ongoing conversation of tornado climatology.
Tyler is currently my graduate student working on his PhD in Geography at Florida State University. He is proposing this important project that should go a long way toward understanding how many more deaths and injuries can be expected if tornadoes get stronger as the planet warms.
Looks like the endorsement needs to be from people with significant credentials to gain public trust.
fosborn_ wrote: Would this be an example of a successful effort?
This shows how inane academia has become. It starts with the propaganda-based assertion that the globe is warming. It then presupposes that a warming planet will cause more tornadoes and it will then, undoubtedly, arrive at a completely useless conclusion. The author will have no trouble getting published since anything that confirms the global warming premise is immediately fast-forwarded through peer review. (The reviewers will probably not even read it except to confirm that it is supportive of the global warming premise.) The author will be granted his Phd and a professorship. And the public that pays the bill for all of this will be none the wiser.
I would prefer that my endorsement to come from a real scientist.
What's the qualification of such a person?
What kind of background, and working experience should they have to show competence?
I guess I would just hope that they could confidently and succinctly explain why the convection model of storm theory is wrong, as described in the first post on this thread. So, any and all that feel they fit this description I encourage to send me their email and I will send them the link for an endorsement--including yourself Frank.
A brave new future of storm mitigation awaits.
you invited me, but I don't qualify, to confidently and succinctly explain why the convection model is wrong. I found enough experimentation already that supports it. I know its not perfect, but its the bird in the hand, not the 2 in the bush.
If you ever do any of your own, or find anyone else who has, that shows chinks in the armor, I will be excited to read of it.
I'm excited your attempting this, its going to be an education, even if its turned down.
Our community team of scientists reviews every project proposal we receive. We review projects to make sure they pass a certain level of review criteria to ensure projects are appropriate for Experiment.
1Your experiment seeks to answer a specific research question.
2The process and results can be shared openly and transparently.
3The researchers have the expertise needed to meet the goals.
In addition to the core criteria, there are additional considerations depending on where you'll be conducting the research.
I'm vary curious, have you formed this "Specific research question" ?
You have this mountain of reinvention to tackle, what is the first bite of the elephant look like? What is your specific research question? (is dry air lighter than humid air?) What is the most basic question you must start with? I'm overwhelmed already.
What specific apparatus will you use? If your weighing gases, what are the specs on the scales and most importantly the containers? They suggest 30 days completion, if you work like a farmer and put in 14 hour days, that is 420 man hours to run thousands of test for an accurate baseline and show all the deviations in data and explain why, and account for any change in conditions and limit the scope and therefore the variables of the testing ( lots of triage). I bet you spend a large portion of the man hours on documenting. Sounds like my military experience, working for pennies on the dollar.
You are encouraged to recruit public endorsements.It helps to have outside experts weigh in on why you are the right leader for this project, how your methods will deliver results, and the project's potential impact.
Proof of having the resources or capacity to carry out the experiment (e.g. a lab bench in case you require lab space).
Looks like you have to use the KISS method to keep the required resources to a minimum.
Also I'm worried, I have yet to read of anyone of a separate, autonomous persona, who meets your criteria to write an endorsement..
I will refrain from pointing out the bad parts of this Space Science article. But anyway..
you invited me, but I don't qualify, to confidently and succinctly explain why the convection model is wrong. I found enough experimentation already that supports it.
I know its not perfect, but its the bird in the hand, not the 2 in the bush.
If you ever figure out why you believe what you can't explain be sure to let us know.
Calm down. You don't want to wet yourself.
I can, you can't name any.
-M. D. Drying of wet shoes.
An investigation of ice fog in Alaska required a technique for the determination of the water content of the atmosphere at temperatures between −20 to −55C. No satisfactory method for direct field measurements at these low temperatures was available.
A field sampling-technique was developed which consisted of extracting the contained water by bubbling the air through absolute methanol, an aliquot of which was then titrated with Karl Fischer reagent. A visual end-point was applicable. The method permitted rapid titration, required simple apparatus, and measured the amount of moisture in the air directly to within 2 per cent of the absolute values.
A method of filtering the air in order to separate water vapor from precipitated water was also developed for sub-freezing temperatures.
Humidity observations were extended to levels above the surface by drawing a known volume of air into the bubbler through polyethylene tubing supported by captive balloons.
Results obtained with these techniques are included in a discussion of humidities determined at Eielson Air Force Base, Alaska, during the winter of 1952–1953.
In the course of an investigation of ice fog in Alaska, a fild technique was needed for the determination of the water content of teh atmoshere at temperatures below freezing, particularly in the temperature range from -20 to -50 C.
Although the literature revealed that many methods of jumidity measurement have been developed or proposed , no satgisfactory instrumental or chemical technique appeared to be available for field measuremnts at low temperatures.
Further study of the literature showed, however, that Karl Fischer reagent . with use of methanol as the water extractant , was useful for laoratory titrimetric determinations of moisture associated with a wide variety of substances, including air. For colorless solutions, such as water in methanol, a visual end-point is applicable and the apparatus is realtively simple. With this information, it was proposed to adapt the Karl Fischer technique for use in the filed.
...Millipore filters were used to separate particulate water from the water vapor component of the atmoshere. This type of filter is a plastic, porous structure, and has a varly low resistance to flow of air.. It will retain particles down to 0.02u within 10u of the suface of the filter . An important characteristic of this filter is that the amount of water vapor it will absorb or release appears to be negligible un the conditions encoutered in the field.
Measuring water vapor(h2o gas)in artic air after removing frozen precipitants.
I don't know what to tell you, Frank. I don't know what you are seeing that I am not.
Maybe this is something that only believers can see.
Considered over very long distances, we can envision this moist layer as a surface that reflects energy into a stream flow producing faster and faster winds. Also, along this extensive surface we might then envision nanodroplets of H2O being impacted with side-glancing impacts from the dry layer above. This will cause them to begin spinning and, as described above, the spinning will effectuate a plasma. This plasma may be only a few inches thick but it can potentially span many miles in length and breadth. We can then envision an ensuing positive feedback as the emergence of the plasma along this extensive surface makes the surface stronger, reflecting more energy into a stream flow, producing faster and faster winds. Eventually, the Bernoulli effect and the Coriolis effect conspires to cause a sheet of this plasma to role into a tube. The ensuing tube provides 360 degree isolation from atmospheric friction, allowing its contents to further accelerate as a result of any difference in pressure from the entrance of the tube to its exit. All the while, the tube conserves the wind shear that keeps polymers of H2O spinning.
And so, to reiterate, without long, flat surfaces forming naturally in the atmosphere the ability of drier air to gain momentum as it moves long distances over the surface of moist air (like wind blowing across a flat lake) there would not be enough contact between the nano-droplets along the surface of the slow moving moist air and the fast moving air molecules in the dry air above to cause the nano-droplets to start to spin and elongate into electromagnetically charged, spinning polymers that are necessary to effectuate a plasma.
Above I indicated that I would provide a demonstration to more explicitly demonstrate the electromagnetic forces hiding in water that are expressed when the surface area of H2O is maximized. The reason these electromagnetic forces are not apparent to us is because most of our experience is with still or flowing water and there is relatively little surface to demonstrate these hidden electromagnetic forces. But here is one exception that has to do with a mixture of corn starch and water that is generally used to demonstrate he concept of non-newtonian fluid.
And so, the reason the non-newtonian fluid turns hard is because when pressure is applied the corn starch molecules get between the water molecules effectuating a huge surface. This activates the dormant electromagnetic forces in H2O. Likewise, with vortices the spinning activates the electromagnetic forces because the centrifugal forces effectuates a huge surface. But since the polymers of H2O are not connected to each other it produces a plasma effect and not a solid.
All in all, this explains something that heretofore science has failed to explain, the molecular composition of vortices in the atmosphere.
Another interesting thing to consider is that H2O surface tension is itself hydrophobic. This means that liquid water literally levitates or is repelled by it. (See link below.) This explains how and why vortices don't get clogged up by thick moist air and rain as they move moist air very rapidly (up to 300 mph) both laterally and vertically.
Of paramount importance to my model is the assertion that the popular belief that H2O turns gaseous in the atmosphere is wrong (this being the reason for the experiment indicated up-thread).
Yes, that experiment done in arctic conditions with frozen precipitants removed from the air leaves only gaseous H2O that could be and was measured, in the sub zero temperatures.
Firstly, and most obviously, if H2O generally became gaseous we could not anticipate the existence of the microdroplets (and/or nanodroplets) that are the requisite starting conditions for the spinning, surface maximized, H2O polymers of my model (as described in the above paragraph).
Gaseous H2O require aerosols to condense out of the air. So small droplets are anticipated. With out aerosols its the rarest conditions that have precipitants with out an aerosol particle or surface.
Which means you theory doesn't anticipate how aerosols can be the nucleus of droplets. of if your droplets can even exist without an aerosol nucleus.
Which also means you can't anticipate that surface tension weakens with reduced volume and increased curvature, as indicated in the micro droplet evaporation photo. This would indicate why its so difficult for nano droplets to keep form re evaporating so quickly.
Secondly, if H2O did actually become gaseous in the atmosphere then moist air would be lighter than dry air (in accordance with Avogadro’s Law) and, therefore, it wouldn't tend to lay out into long flat surfaces that are necessary for the wind shear in my model.
This seems a misleading statement . If you think in terms of density and buoyancy , warm and cold air masses, dwarf the fraction of the lighter water vapor mixed in. So warm air convection will be the dominate factor over humidity.
Also, along this extensive surface we might then envision nanodroplets of H2O being impacted with side-glancing impacts from the dry layer above.
Side glancing ? Your imaging an impossible stable or maybe linear condition in nature. Think in terms of unstable nonlinear , even fractal kind of interphase between air layers. Its impossible to imagine all these nano droplets behaving by lining up to get spun up. Even if invoking the magic of plasma, that is inherently unstable also.
fosborn_ wrote: . . . that experiment done in arctic conditions . . .
No. I was referring to the experiment I suggested upthread.
Your theory doesn't anticipate how aerosols can be the nucleus of droplets.
Side glancing? You are imagining an impossible stable or maybe linear condition in nature.
Think in terms of unstable nonlinear, even fractal kind of interphase between air layers. Its impossible to imagine all these nano droplets behaving by lining up to get spun up.
Irrelevant. There are many notions in the history of science that were discovered before anybody imagined them.
Even if invoking the magic of plasma, that is inherently unstable also.
The 'plasma' of my model is novel, unfamiliar and, therefore, hard to accept. But that is the case for any scientific discovery.
Alfred Wegener proposed continental drift in 1912. It took geologists 50 years to warm up to the idea. Now, however, when you look at a map of the southern Atlantic ocean the congruence of the eastern and western shorelines jumps out at you.
When it came to deducing the molecular composition of atmospheric vortices and arriving at the conjecture that they contained wind shear generated, rapidly spinning polymers of H2O, I feel that I had a huge advantage that allowed me to avoid a common misassumption that traps others. I knew that the sheath of the tornado must involve some kind of molecular distinction. And I knew that this molecular distinction must involve it possessing structural resilience and, therefore, it must be a plasma or plasma like (even if I didn’t use that exact word at first). My underlying rationale had to do with my previous experience with evolutionary theory through which I developed some rather esoteric principles in regard to bringing some conceptual clarity to the question of what is or is not a lifeform, the foundation of which involved principles in regard to what is or is not an entity, what I referred to as principles of entitiness. There were basically three principles of entitiness: 1) an entity must be molecularly distinct from that which is not part of the entity; 2) an entity must have some kind of surface to act as a barrier to prevent the molecules that are not part of the entity from casually mixing with the molecules that are part of the entity, and 3) both 1 and 2 are relative and not absolute.
These principles prevented me from making the common error of casually assuming that the molecular composition of tornadoes was the same as that of air and/or moist air. I've encountered a number of other tornado theorists and it is very common for them to casually assume that a tornado is just fast spinning air. They don't take into account the fact that the sheath needed to possess the ability to resist itself from casually mixing with the surrounding air molecules. In other words, my principles of entitiness allowed me to realize that tornadoes could not persist as entities if the molecules that comprise the sheath of the tornado did not possess some kind of internal resilience greater than that of just air. Otherwise the molecules in the sheath would casually mix with those outside the sheath and the tornado would not have persistence.
. . . that experiment done in arctic conditions . . .
Okay, but all your visions of grandeur, will go unfulfilled until you can show there is no gaseous phase of h20 in the atmosphere, which I have provided in the arctic experiment, showing it does. And you have nothing, of this quality to counter it. A real scientist would admit his thinking is falsified, until he can come up with physical test to show otherwise. Not just imagine it.
Instead of continually making claims based on your imagination why don't you contact the authors of the paper and ask them how they (according to you) verified that their alleged H2O gas was genuinely gaseous. You probably won't get a response, but maybe that in itself will tell you what you need to know.
Once one incorporated this it wasn’t much of a leap to start questioning other assumptions underlying meteorology’s model of storms. Eventually one might become cognizant of the fact, a fact that meteorologists do not deny, that the structure of tornadoes is unexplained. And it’s common knowledge that a plasma is like a gas but has properties similar to a solid, like the ability to maintain a form and a surface—structural properties. So the possibility that the structure of tornadoes can be explained by it being some kind of plasma also seemed obvious.
It is also a relatively straight forward leap of logic to arrive at the conclusion that, most likely, an atmospheric plasma must involve the participation of H2O. Because H2O is well known to have other poorly explained anomalous properties—upwards of 70—like high heat capacity, expansion upon freezing and (the one that may be most conspicuous of all) high surface tension. So, the supposition that H2O might have an additional undiscovered anomaly is not that big of a stretch.
Also, it is well known that tornadoes are associated with wind shear and, therefore, along the shared surface of two bodies of air that are moving in different directions we can anticipate molecules directly impacting each other. And since we know that H2O in the atmosphere is not gaseous but actually consists of microdroplets (and nano-droplets) we can envision side-glancing impacts that cause these nano-droplets to spin and elongate into a polymer. Combine this with a sophisticated understanding of hydrogen bonding and the fact that H bonding involves genuine electromagnetic forces--this being the hardest part of the puzzle--we eventually arrive at our understanding of vortice plasma. Obviously I left out a lot of detail here. But once the puzzle starts to come together the other pieces just kind of fall into place. It really is no big deal.
The ability to realize what does not work is the key to opening one's mind to figuring out what does work. Most people never make progress because they are unable to defeat the emotions associated with their own minds tendency to pretend to understand what actually doesn't make sense.
| 2019-04-22T22:03:08 |
http://www.thunderbolts.info/forum/phpBB3/viewtopic.php?f=10&t=16329&start=165
|
0.999613 |
I am curious what Atari recommended to users as an appropriate monitor for their 8 bit computers (400/800/800xl/etc).
For example, my Commodore 64 pairs nicely with a Commodore manufactured 1702 or 1802 monitor. Likewise, my Amiga pairs with its 1080 or 1084. Even my Apple //e has a corresponding (green) monochrome monitor manufactured by Apple.
I don't think Atari made monitors until the ST came along, which makes me wonder what a user would do when the TV just wasn't cutting it anymore? I'm using my Amdek Color-I right now, but I'd like to find a better pairing for my Atari.
Did Atari ever recommend a brand or model of monitor? Without getting opinion based, did a de facto standard evolve among Atari users of the period?
I don’t think they ever recommended a monitor. As far as I can remember, Atari communications showed Atari computers on their own, or connected to TVs; see for example this 1200XL advert, and Atari UK’s magazine, Atari I/O (issues 2, 3, 4, and 5). At least in Europe, 8-bit Ataris produced nice video on most TVs (I didn’t grow up with NTSC so I don’t know how bad US TVs are for computer use).
I don’t know whether a de facto standard ever emerged.
As others have said, Atari didn't recommend a monitor as far as I'm aware, but I can confirm S-Video on a Sony PVM looks fantastic.
Atari marketed their computers in nice consumer packaging, at retail stores like Sears and Service Merchandise. The box packaging featured pictures of a full lineup of nicely matching peripherals, including a variety of printers, a disk drive, modem and a monitor. That was in 1985 and beyond, when their last line of 8-bits, the XE series (eXtended-Eight-bit) were released. The new fashion was a sporty cool-gray.
Important Background: The NEW "Atari"-- Jack Tramiel had been ejected as CEO of Commodore for cutting prices of the C64 too drastically. So he formed a private company to design new computer hardware using the Motorola 68000 processor. He had brought Commodore design folks to work on it, purportedly with plans in hand.
At that time, Atari was owned by Warner Brothers. The folks at Atari had also been designing a new 16bit 68000 based computer, called the "Atari 1850XLD", which featured a lot of custom circuitry, and was under heavy development.
But due to emergency financial troubles Warner Brothers had to sell them off at a throwaway price. Tramiel then purchased Atari. The "Atari 1850XLD" staff were not retained, with Tramiel deciding to use his "Commodore" staff and plans.
However, those left-out employees from the "Atari 1850XLD Project" formed their own company called "Amiga", to bring it to market. Tramiel then decided he wanted to purchase "Amiga", fearing it would compete against his ST. HCommodore swiftly purchased Amiga in a surprise move, though. That left Tramiel to restart his own Commodore-era designs as quickly as possible, and at "Rock Bottom Price" in oder to beat Commodore to market. They used as much off the shelf components as possible for the "Atari ST" (standing for S.ixteen-T.hirty-two). After battling in court with Commodore, Tramiel won a years delay for Commodore.
It was then that they formulated the idea of marketing a matching Atari 8-bit computer monitor. However there were a lot of 8bit peripherals left in stock to sell off, and so they planned to bundle those with the freshly styled XE computers first, and then later manufacture cosmetically matching peripherals, including new monitors for the XE.
The new styling was shown off at the International Winter Consumer Electronics Show (CES) in Las Vegas, Atari previewed/announced: [color] XC1411 monitor and [monochrome] XM128 monitor for the XE line. Only a few demonstration units were produced, none shipped commercially. Their new tagline, 'Power Without the Price' was bannered across their booth, which became an advertising slogan for years to come.
Their Atari ST adopted the fresh cosmetics, a cool-gray look considered slick and sporty.
PERSONAL ACCOUNT: My first computer was an Atari 130XE, and it came with an old style 1050 disk drive and 1027 Letter Quality Printer, and also a Sears Monitor (almost a sleek cosmetic match,). I would go on get an sleek new XM-301 modem and a 8pin XMM801 dot-matrix printer, with the fresh styling.
Unfortunately, the 8bit, XE series of Hardware that were never released commercially went on to become known as "Vaporware" and that includes the two previously mentioned XE properly-styled monitors, the XC1411 and XM128 monitors.
The original Atari 800 monitor output (5-pin DIN) supports both composite video and S-video. Thus, the Commodore 1702 pairs very well with it, using the Chroma+Luma (S-video) inputs. Same with any other S-video capable monitor. Later versions of Atari 8-bits tended to not support S-video, but are easily modified to provide S-video.
I don't think there was ever a "de-facto standard" Atari 8-bit monitor. People tended to purchase the best monitor for the type of software they wanted to run. A spreadsheet and word processor user might prefer a cheap monochrome display over a color S-video display.
Sony made a KV1311CR TV that has a digital and analog RGB input. The analog RGB input could be used with an Atari ST via a special cable. It had a 640x480 display. It also has a composite video input and analog audio input that will work with the Atari 8 bit computers.
And an atari branded monitor!
I have to point out that this was in the Netherlands, but I'm quite certain the monitor was atari branded.
The thing is, I used this monitor exclusively back then, to the point that up until recently I'd never actually seen a single atari game in anything other than monochrome.
Still, unless my memory is playing some very serious tricks on me, this means at least one dedicated atari monitor exists for their 8 bit line. (monochrome with green phosphors) - given the systems I had it with, and all the other accessories I got with those systems, it's reasonable to assume this is a monitor that dates to the same period as the XL computers, though I have no proof of this. (it also helps that the monitor housing, as far as I remember was beige with dark brown accents - in other words, the same colour scheme as the XL machines themselves.) Unfortunately, unless I somehow get lucky and find a reference to it somewhere else, I guess I can't particularly prove it exists.
Update: As some extra information, I'll describe the monitor, and see if it seems at all familiar to anyone. Keep in mind I have no references for it. (pictures, model numbers, etc.). This is entirely going off my memory of things nearly 28 years later. As such it may not be entirely accurate.
The display was monochrome green and the overall size was very similar to a 34 cm television we had at the same time. (suggesting a ~13 inch display, but obviously 12 and 14 are in the same bounds.) It had audio capabilities, though I don't remember where the speaker was placed.
Not the answer you're looking for? Browse other questions tagged atari crt-monitor or ask your own question.
Monitor Cable for Atari 130XE. Where to buy or how to build?
How does the 4MB mod for 8-bit Atari work?
Why did the Atari 8-bit computers make beeping noises while accessing the disk and cassette drives?
What changes made some Atari ST software incompatible with the Atari TT?
| 2019-04-26T03:39:12 |
https://retrocomputing.stackexchange.com/questions/2962/what-monitor-did-atari-recommend-for-its-8-bit-product-line
|
0.999417 |
Computer power supplies cost around US$30, but lab power supplies can run you $100 or more! By converting the cheap (free) ATX power supplies that can be found in any discarded computer, you can get a phenomenal lab power supply with huge current outputs, short circuit protection, and reasonably tight voltage regulation on the 5V line.
On most power supply units (PSUs), the other lines are unregulated.
Look online or at your local computer store for an ATX computer power supply, or dismantle an old computer and remove the power supply from the case.
Unplug the power cable from the power supply and turn off the switch on the back (if there is one). Also, be sure you are not grounded so that remaining voltage doesn't flow through you to ground.
Remove the screws that attach the power supply to the computer case and remove the power supply.
Cut off the connectors (leave a few inches of wire on the connectors so that you can use them later on for other projects).
Discharge the power supply by letting it sit unconnected for a few days. Some people suggest attaching a 10 ohm resistor between a black and red wire (from the power cables on the output side), however this is only guaranteed to drain the low voltage capacitors on the output - which aren't dangerous to begin with! It could leave the high-voltage capacitors charged, resulting in a potentially dangerous - or even lethal - situation.
Gather the parts you need: binding posts (terminals), a LED with a current-limiting resistor, a switch (optional), a power resistor (10 ohm, 10W or greater wattage, see Tips), and heat shrink tubing.
Open up the power supply unit by removing the screws connecting the top and the bottom of the PSU case.
Bundle wires of the same colors together. If you have wires not listed here (brown, etc.), see the Tips. The color code for the wires is: Red = +5V, Black = Ground (0V), White = -5V, Yellow = +12V, Blue = -12V, Orange = +3.3V, Purple = +5V Standby (not used), Gray = power is on (output), and Green = PS_ON# (turn DC on by shorting to ground).
Drill holes in a free area of the power supply case by marking the center of the holes with a nail and a tap from the hammer. Use a Dremel to drill the starting holes followed by a hand reamer to enlarge the holes until they are the right size by test fitting the binding posts. Also, drill holes for the power ON LED and a Power switch (optional).
Screw the binding posts into their corresponding holes and attach the nut on the back.
Note that some power supplies may have either a gray or brown wire to represent "power good"/"power ok". (Most PSU's have a smaller orange wire that is used for sensing-- 3.3V- and this wire is usually paired at the connector to another orange wire. Make sure this wire is connected to the other orange wires, otherwise your lab power supply won't stay on.) This wire should be connected to either an orange wire (+3.3V) or a red wire (+5V) for the power supply to function. When in doubt, try the lower voltage first (+3.3V). If a power supply is non ATX or AT compliant, it may have its own color scheme. If yours looks different that the pictures shown here, make sure you reference the position of the wires attached to the AT/ATX connector rather than the colors.
Connect the green wire to the other terminal on the switch.
Make sure that the soldered ends are insulated in heat shrink tubing.
Organize the wires with an electrical tape or zip-ties.
Check for loose connections by gently tugging on them. Inspect for bare wire, and cover it to prevent a short circuit. Put a drop of super-glue to stick the LED to its hole. Put the cover back on.
Plug the power cable into the back of the power supply and into an AC socket. Flip the main cutoff switch on the PSU if there is one. Check to see if the LED light comes on. If it has not, then power up by flipping the switch you placed on the front. Plug in a 12V bulb into the different sockets to see if the PSU works, also check with a digital voltmeter. Make sure you do not short any wires out. It should look good and work like a charm!
Can I convert a computer ATX power supply to use for a ham radio?
Yes, except that your radio may need 13.8 volts which will require a specific power supply but may still function. Check your manual for input voltage range (11.5 - 14v) for example so 12 v will work in this case.
Can I combine the +12V and +5V wires onto one output port?
No, that would make voltage unstable and potentially damage the power supply. The power supply is more useful with the ability to tap into either voltage, and each is regulated separately by the power supply.
If I connect the orange (3.3v) wire as Negative (ground) and the yellow (12v) wire as Positive, the output voltage will be 8.6v. Is it safe to use on a device that requires 8.5-9v?
Yes, it is safe. Be careful if the ground from the power supply connected to your device will damage the power supply, as this means you made a short circuit for the 3.3 v.
How many amps can I expect from this power supply?
It depends on the model. The label should tell you.
Can I connect 12v from two PSU in a series to get 24v?
No, they are both +12 v referenced to ground so both are equivalent to each other so if you measure between them it's 0 volts.
How do I charge a 12v battery with a thermoelectric generator (output 0.2 to 3.5)?
Options: You don't need an additional switch, just connect the green and a black wire together. The PSU will be controlled by the rear switch, if there is one. You also don't need an LED, just ignore the gray wire. Cut it short and insulate it from the rest.
If you don't feel like soldering nine wires together to a binding post (as is the case with the ground wires) you can snip them at the PCB. 1-3 wires should be fine. This includes cutting any wires that you don't ever plan on using.
You can use your power supply 12V output as a car battery charger! Be careful, though: if your battery is too discharged, the power supply short circuit protection will trigger. In that case, it's better to put a 10 Ohm, 10/20 Watts resistor in series with the 12 V output, in order to not overload the power supply. Once the battery is near 12V charge(you can use a tester to verify that), you can remove the resistor, in order to charge the remaining of the battery. This can save you if your car has an old battery, if it's winter and your car does not want to turn on, or if you accidentally left the lights or the radio on for hours and hours.
You can also convert this to a variable voltage power supply - but that is another article (hint: Uses a 317 IC with power transistor).
You can add a 3.3 volt output (such as to power 3V battery-powered devices) to the supply by hooking the orange wires to a post (making sure the brown wire remains connected to an orange wire) but beware that they share the same power output as the 5 volt, and thus you must not exceed the total power output of these two outputs.
The +5VSB line is +5V standby (so the motherboard's power buttons, Wake on LAN, etc. work). This typically provides 500-1000 mA of current, even when the main DC outputs are "off". It might be useful to drive an LED from this as an indication that the mains are on.
The voltages that can be output by this unit are 24v (+12, -12), 17v (+5, -12), 12v (+12, GND), 10v (+5, -5), 7v (+12, +5), 5v (+5, GND) which should be sufficient for most electrical testing. Many ATX power supplies with a 24-pin connector for motherboards will not supply the -5V lead. Look for ATX power supplies with a 20-pin connector, a 20+4-pin connector, or an AT power supply if you need -5V.
ATX power supplies are switched-mode power supplies (info at http://en.wikipedia.org/wiki/Switched_mode_power_supply); they must always have some load to operate properly. The power resistor is there to "waste" energy, which will give off heat; therefore it should be mounted on the metal wall for proper cooling (you can also pick up a heat sink to mount on your resistor, just make sure the heat sink doesn't short circuit anything). If you will always have something connected to the supply when it is on, you may leave out the power resistor. You can also consider using a lighted 12v switch, which will act as the load necessary to turn on the power supply.
Also some power supplies need the grey and green to be connected together in order to run.
If you are not sure of the power supply, test it in the computer before you harvest. Does the computer power on? Does the PSU fan come on? You can place your voltmeter leads into an extra plug (for disk drives). It should read close to 5V (between red and black wires). A supply that you have pulled may look dead because it does not have a load on its outputs and the enable output may not be grounded (green wire).
You can take advantage of the hole left by the power supply cabling, to install a cigarette lighter connector. That way, you can connect car appliances to your power supply.
If you aren't afraid of some soldering, you can replace the 10w power resistor with the cooling fan that was originally inside the PSU, be careful with the polarity though - match the red and black wires to each other.
You may have to drill the hole a little bit bigger.
If the power supply does not work, that is, no LED light, check to see if the fan has come on. If the fan in the power supply is on, then the LED may have been wired wrong (the positive and negative leads of the LED may have been switched). Open the power supply case and flip the purple or gray wires on the LED around (make sure that you do not bypass the LED resistor).
Some newer power supplies will have "voltage sense" wires that need to be connected to the actual voltage wires for proper operation. In the main power bundle (the one with 20 wires), you should have four red wires and three orange wires. If you only have two or less orange wires, you should also have a brown wire which must be connected with the orange. If you only have three red wires, another wire (sometimes pink) must be connected to them.
To get more room you can mount the fan on the outside of the PSU case or remove it. You can also attach more fans if yo are using a high-wattage power supply.
The -5v rail was removed from the ATX specification and does not exist on all ATX power supplies. If you need a -5V rail, use an AT power supply.
Feel free to add some style to the dull grey box.
If you DO have a sense wire for the 3.3v. , connecting the 3.3 v. part of the supply, using the 3.3v. voltage as a buck voltage against, say the 12v. to get 8.7v. will not work. You will see 8.7 v. with a voltmeter but when you load that 8.7v. circuit the power supply may go into protective mode and shut the whole supply down.
For use with items with a high starting load such as 12VV fridge with a capacitor connect a suitable 12V battery to stop the PSU from tripping.
When drilling the metal case, make sure no metal filings get inside the PSU. These could cause shorts, which in turn could cause a fire, extreme heat or dangerous electrical spikes on one of your outputs which will break your new lab power supply which you worked so hard on.
If you suspect the power supply is damaged, do not use it! If it is damaged, the protection circuitry may not work. Normally, a protection circuit will slowly discharge the high voltage capacitors - but if the supply was connected to 240V while set at 120V (for example), the protection circuits have probably been destroyed. If so, the power supply might not shut down when it is overloaded or when it begins to fail.
Do not touch any lines leading to capacitors. Capacitors are cylinders, wrapped in a thin plastic sheath, with exposed metal at the top with a + or K usually. Solid-state capacitors are shorter, a little wider in diameter, and do not have a plastic sheath. They retain a charge much like batteries do, but unlike batteries, they can discharge extremely fast. Even if you have discharged the unit, you should avoid touching any points on the board except where necessary. Use a probe to connect anything you might touch to ground before beginning any work.
The resulting power supply will provide high output power. It might happen you create an electric arc at the low voltage outputs or fry the circuit you are working on, if you make any mistake. Lab PSUs have adjustable current limitation for a reason.
Do not remove the circuit board unless you must. The traces and solder on the underside could still have high voltage on them if you didn't let the PSU sit long enough. If you must remove it, use a meter to check for voltage on the pins of the largest capacitors. When you replace the board, make sure that the plastic sheet goes back under the board.
Line voltage can kill (anything above 30 milliamps/volts can kill you in a matter of time if it somehow penetrates your skin), and at the very least give you a painful shock. Make sure that you have removed the power cord before doing the conversion and have discharged the capacitors as described in the steps above. If in doubt, use a multimeter.
Ensure that you discharge the capacitors. Plug in the power supply, turn on the power (short the Power (green) wire to ground, then unplug the power supply until the fan stops spinning.
Make sure you are NOT grounded when working on power supplies so that power doesn't flow through you to ground.
This will certainly void any warranty.
Only power supply technicians should attempt this.
A computer power supply is fine for testing purposes, or for running simple electronics (e.g. battery chargers, soldering irons) but will never produce power like a good lab power supply, so if you intend on using your power supply for more than just testing, buy yourself a good lab supply. There is a reason they cost so much.
An ATX power supply of any rating above 150 Watt (can be found from an obsolete computer, online, or at your local computer store). It should NOT be modular.
wikiHow is a “wiki,” similar to Wikipedia, which means that many of our articles are co-written by multiple authors. To create this article, 53 people, some anonymous, worked to edit and improve it over time. This article has also been viewed 2,365,792 times.
Thanks to all authors for creating a page that has been read 2,365,792 times.
| 2019-04-23T14:59:04 |
https://www.wikihow.com/Convert-a-Computer-ATX-Power-Supply-to-a-Lab-Power-Supply
|
0.999329 |
I need to address two specific misdirection tactics that Democrats are giving a significant amount of air time in the run up to Election Day.
The first is the concept that last minute money from evil and anonymous conservative entities is somehow buying the election. As Speaker Pelosi said “"Everything was going great and all of a sudden secret money from God knows where—because they won't disclose it—is pouring in." President Obama said something very similar at a recent campaign stop.
While an incredibly wasteful amount of money is spent on elections by both sides in every cycle, the idea that a surge of money from conservative groups is all of a sudden “buying” the 2010 midterms is ludicrous. How Democrats, including President Obama and Ms. Pelosi, can say this with a straight face while knowing that the unions are once again the largest contributors to this election (and they give 95% to Democrats), and that Democrats will significantly outspend Republicans in competitive races, is fraudulent, and reeks of desperation.
It’s very simple - the only voters that really matter in most general elections are moderates and independents. These two groups are acutely aware of the Democrat’s legislative “achievements” over the last two years, and can't wait to reject those "achievements" on Tuesday.
As a new resident of Connecticut, I recently completed and sent in my voter registration form in order to fulfill my duty as a citizen of the United States on November 2nd.
According to Pew Research, 37% of voters in the US are registered as independent (or as Connecticut calls it, “Unaffiliated”). In CT, 37% are registered Democrat, 21% Republican and 42% “Unaffiliated”.
Of the 533 members of Congress, just two Senators (and not a single Representative!) are independents, and one of the independents, Joe Lieberman, considers himself an “Independent Democrat” and was Al Gore’s running mate on the Democratic ticket in 2000 and a Democratic nominee for President in 2004.
Therefore, our “representative democracy”, where 37% of the voting public consider themselves politically independent, has exactly two politically independent representatives…that’s 0.38%.
37% of the public is represented by 0.38% of Congress.
Would anyone call this a representative democracy? No wonder congressional approval ratings are hovering in the teens.
Our two party system is antiquated and for 37% of the electorate (and probably more when you include disenfranchised moderate Democrats and Republicans), it’s not working.
Eliminate party-specific primary elections – it would be a tectonic shift in our political process, but one that would pay immediate dividends in restoring our representative democracy.
Currently, in a closed primary like CT, in order to win your party’s nomination you have to be a far left Democrat or a far right Republican. Any signs of moderate views and the more “ideologically pure” candidate will accuse you of playing for the wrong team, crushing any chance of winning your parties nomination.
By the time 37% of the electorate are allowed to vote for the first time, the moderate candidates have already lost in the primary, leaving independents with a choice of a far left Democrat, a far right Republican and some poorly organized and widely disbursed independent/third party candidates. Unless you’re lucky enough to have a quality third party candidate in the race, an independents vote will always go to the lesser of two evils.
Why can’t we just have one primary election for all candidates, regardless of party affiliation, to reduce the field down to two or three candidates, and then a run-off election for those two or three candidates? Isn’t this really what a representative democracy is all about?
Some states have made progress towards this goal by permitting open primaries where independents can vote in the primaries. Currently, 21 states have open primaries for congressional elections and 33 states have open primaries for presidential elections. This is a step in the right direction, but doesn’t solve the problem as completely as removing party-specific primaries.
By removing some of the barriers that exclude moderates, independents and third parties from our electoral process, we will heed Mr. Washington’s warning and significantly improve our representative democracy.
| 2019-04-23T07:59:20 |
http://www.theantipopulist.com/2010/10/
|
0.999024 |
The US protagonists in a viral fundraising campaign for a homeless man have been charged with theft by deception and conspiracy.
Kate McClure and Mark D’Amico raised more than $400,000 (£313,000) for homeless ex-marine Johnny Bobbitt.
But in August, Mr Bobbitt launched legal action against the couple, claiming he did not get his fair share.
Now, prosecutors in New Jersey say Mr Bobbitt was complicit in the alleged plot. All three face the same charges.
A lawyer for Mr D’Amico, 39 and Ms McClure, 28, declined to comment, according to US media.
What did the prosecutors say?
At Thursday’s press conference, Burlington County Prosecutor Scott Coffina said the story “that drove this fundraiser might seem too good to be true. Unfortunately, it was”.
“The entire campaign was predicated on a lie,” he added.
The prosecutors believe the campaign was concocted a month before it was launched.
The campaign text had said that Mr Bobbitt had used “his last $20” to help Ms McClure when her car broke down in 2017.
Mr Bobbitt remains in custody, and the couple were released pending a court date on 24 December.
The three face potential sentences of five to 10 years for the second-degree crimes.
What was the original campaign?
Mr Bobbitt and the couple first came to prominence in November 2017 when Ms McClure launched a crowdfunding GoFundMe campaign, which, they said, was to re-pay the debt of a homeless man who came to her aid at the side of a road.
A photograph of Ms McClure and Mr Bobbitt, a veteran and drug addict who had lived on the streets for several years, standing on the side of the road, fronted the fundraising campaign.
More than 14,000 people donated, many inspired by the story’s details, such as Mr Bobbitt instructing Ms McClure to lock her car doors before he returned with a can of petrol.
Officials said on Thursday they believe the photo was staged after the three met previously when Ms McClure and Mr D’Amico visited a casino near an underpass where Mr Bobbitt spent time.
The relationship between the three soured in August when Mr Bobbitt brought legal action against the couple, alleging they were using the funds as their personal “piggy bank” to fund an extravagant lifestyle.
After exceeding their original fundraising goal of $10,000, they bought clothing and a new camper van for Mr Bobbitt, but later reportedly asked him to remove it from outside their property.
Ms McClure and Mr D’Amico told their online supporters the money would go to two financial trusts for Mr Bobbitt, as well as a lawyer and a financial adviser to help him manage all the money.
“Every dollar he ever touched was used for drugs,” Mr D’Amico told NBC in a nationally televised interview in August.
Investigators claimed the three originally made up the story to make people feel bad and compel donors to contribute to a cause.
Net proceeds for Ms McClure and Mr D’Amico amounted to more than $367,000 (£287,000) and were spent on a car, holidays, high-end handbags and casino gambling, Mr Coffina said.
The prosecutor said that Mr Bobbitt received about $75,000 (£58,000).
In thousands of text messages read by police, the couple had discussed financial woes, inability to pay bills and debts, and Mr D’Amico said he hoped to raise more money by pursuing a book deal about the story.
Expressing sympathy for Mr Bobbitt’s homelessness, the prosecutor nonetheless accused the veteran of being “fully complicit” in the campaign, promoting it in several media appearances and appearing in the original photograph.
Mr Bobbitt posted a similar story on Facebook in 2012 about helping a woman who had run out of petrol, officials say, but that “full responsibility” should be ascribed to all three.
In a statement to CNN, a spokesman for the crowdfunding site Go Fund Me confirmed donors who contributed to the campaign would receive a refund.
| 2019-04-18T22:25:19 |
https://latestnewsmag.com/us-homeless-fundraiser-gofundme-campaign-based-on-a-lie/
|
0.998368 |
More than 2,000 have died in Haiti's cholera epidemic. In a country with a razor-thin line between normality and emergency it is worth asking: what happens next? What happens after a patient – over 17,000 so far – has been saved ?
| 2019-04-20T08:16:41 |
https://www.akeericson.com/Works/Cholera-in-Haiti-2010/1/
|
0.999997 |
https://sep.yimg.com/ca/I/vitadigest_2570_1280878127.jpghttps://sep.yimg.com/ca/I/vitadigest_2570_1280923623 Squishable Pufferfish 15" Plush Dollsquishable-pufferfishUsually Ships within 24 - 48 Hours.
Please Visit the Product Detail for more Info!Coming Soon....There are sparrows who flit from tree to tree and make beautiful music for innocent maidens as they collect flowers in the forest. And then there's this guy. I wouldn't say that he's aggressive (not if I wanted to keep my face anyway), but he's definitely more of the "laugh at the maiden and eat the flowers" variety.
But what can you expect from a variety of a Sparrow called a Dickcissel? Yes, that honestly is the scientific name for this particular North American seed-eating avian. But just because he's a little pushy doesn't mean he doesn't want to be your adorable, fuzzy, cuddle-buddy. He'll just cuddle you assertively.
This bird was designed in conjunction with Jeph Jacques of Questionable Content. Read his web comic! It's good!
Squishable Sparrow 15",Squishable Sparrow - Squishable Sparrow Plush Stuffed Doll - Buy at VitaDigest.com Now and Save!"
Squishable Pufferfish 15" Plush DollThere are sparrows who flit from tree to tree and make beautiful music for innocent maidens as they collect flowers in the forest. And then there's this guy. I wouldn't say that he's aggressive (not if I wanted to keep my face anyway), but he's definitely more of the "laugh at the maiden and eat the flowers" variety.
15 squishy inches of pushy bird, polyester fiber, ages 3 and up!
| 2019-04-24T16:46:20 |
https://www.vitadigest.com/squishable-sparrow.html
|
0.999987 |
A new report claims The Batman starring Ben Affleck is getting pushed back to a 2019 release date. Affleck was originally on board to write, direct, and star in the project, hinting at a spring of 2017 production start date. Affleck exited the director's chair earlier this year, leaving many to wonder if the movie was going to happen at all. Since then, War for the Planet of the Apes director Matt Reeves has signed on to take over the movie and, as previously reported, decided to ditch the original script that had been written by Ben Affleck, DC's Geoff Johns, and Chris Terrio, in order to start the movie completely from scratch.
Reeves revealed to MTV that he had decided to completely start over on The Batman, leading many to speculate about the impeding 2018 release date being canceled. Then rumors of a "projected 2019 release date" started to spread when Variety picked up the story of Reeves beginning anew on the project. The Variety story ends by stating that The Batman has a "projected 2019 release date," which would make a whole lot of sense considering the amount of changes that have happened to the project in recent months. But it could also be pure speculation at this point, throwing out a random number.
If the rumor of a 2019 release date is true, it gives director Matt Reeves a lot more time to to write the movie that he wants to see. The director has brought up his fondness for Christopher Nolan's ability to bring legitimacy to the comic book movie genre with the Dark Knight trilogy and has hinted that he would like to take The Batman in a similar direction. But this time, giving moviegoers more of an insight into how Batman ticks. Reeves has also stated that the movie is influenced by the works of Alfred Hitchcock, giving viewers the perspective of Batman in a more detailed way than has ever been seen before on the big screen.
The rumored 2019 release date also brings up questions of the DCEU timeline and where The Batman might fit in to movies like Justice League and its sequel. A projected release date for Justice League 2 is summer of 2019, so where would The Batman fall? Could it be before the events of the sequel or after? Again, this is speculation at this point, but it does raise an interesting question of wondering where The Batman will fall into line if it is indeed released in 2019. The project will definitely have an impact on Justice League 2 regardless of when it's released.
While the rumor of a projected release date of 2019 may seem like a bummer to Batman fans, it does make a lot of sense logistically. The move to start over from scratch was a big indicator that the movie could be pushed back and production was to already have started by now for the original March 2018 release date. If anything, fans should be excited that the movie is hitting the breaks in an effort to deliver the best possible project possible.
| 2019-04-22T03:06:05 |
https://movieweb.com/the-batman-release-date-2019-rumor/
|
0.999997 |
Suppose your car has been involved in an accident. You turned in a claim with your insurance agent and then get a repair estimate. You wisely choose Quality Paint and Body to do the repairs. What happens next?
The repair process begins before you even bring your car to our state-of-the art facility. We can help you with your insurance claim and in some cases we can even assist your insurance company by writing the estimate of repairs on their behalf. When it's time to drop off your car, one of our service professionals will arrange for a rental car to be waiting for you at our on-site rental agency or at another local rental agency.
If you need to wait in the shop for any reason, you can have a seat in our comfortable lobby; featuring refreshments, television and clean, comfortable furniture.
Once you drop off your vehicle, the repairing of your vehicle starts in one of the 43 repair bays that make up our 21,000 square foot facility, in Visalia. Our Porterville shop has 11 work bays and Tulare has 8 work bays. Repairs are made by our I-CAR Gold Class Certified technicians. I-CAR is the most highly recognized authority in collision repair training worldwide.
If structure or frame damage is present, the vehicle is precisely measured and brought back to original manufacturers specs with the use of a Car-O-Liner bench system. Manufacturer specifications allow only 3 millimeters of tolerance in structural panels. The Car-O-Liner only allows for as much as 1 millimeter of tolerance in the repairs from an accident; meaning that your panels will be as good as or better than they were from the factory. Once repairs have been made in the body shop, it is time to move to the paint shop.
Once again, I-CAR trained and certified paint technicians apply their skill to your vehicle. We use only the highest quality materials and paint provided by Sherwin-Williams painting systems. This promises a color match and quality equal to that of the manufacturer. All painting is done in our state of the art down draft paint booth. When the painting process is complete, the car goes back to the body shop to have the moldings or trim installed.
Now that the car is completely reassembled, it goes to the mechanical area of our shop, if needed. We have full-time I-Car trained mechanics should your car need a 4-wheel suspension alignment, an air bag replacement or any other mechanical repair. After mechanical repairs are completed, your car goes into our detail department.
Here the car is vacuumed, washed and a dressing is applied to the tires. With the detail complete, the car is ready for its final inspection. All aspects of the repair are checked and tested. When all the repairs have been completed; to meet our standards of quality, it's time for you to get your car back.
You can now leave the rental car with us and be on your way with a Limited Lifetime Warranty and the peace of mind that your vehicle is just like new.
| 2019-04-24T16:51:22 |
http://qpbonline.com/template.asp?title=Virtual%20Tour&file=dynamic.dat&pagename=shoptour&warranty=true&news=true
|
0.999964 |
Ukraine's Petro Poroshenko (C) said the pact was a "symbol of faith and unbreakable will"
Ukraine, Georgia and Moldova have signed partnership agreements with the European Union, in a move strongly opposed by Russia.
The pact - which would bind the three countries more closely to the West both economically and politically - is at the heart of the crisis in Ukraine.
Russian President Vladimir Putin said making Ukraine choose between Russia and the EU would split it in two.
A ceasefire with pro-Russian rebels in east Ukraine is due to end on Friday.
Ukrainian President Petro Poroshenko, in Brussels to sign the pact, said he would take a decision on an extension to the truce when he arrived back in Kiev later on Friday.
Russian Foreign Minister Sergei Lavrov said he would welcome an extension, but not if it were simply an ultimatum for separatists to lay down their arms.
Meanwhile the United Nations refugee agency said there had been a sharp rise in the numbers of displaced people in eastern Ukraine in the past week, with 16,400 people fleeing the area.
The total number internally displaced has reached 54,400, while a further 110,000 people left Ukraine for Russia this year.
There is a general sense of irritation or perhaps even anger here that Moscow has failed to convince countries like Ukraine, Moldova and Georgia not to sign this historic free trade deal today with the EU.
Moscow has economic concerns about these deals - it is worried that the Russian market could be flooded by cheap goods from the EU that would hit Russian producers.
More pressing for Moscow are the geopolitical concerns here - the whole idea of former Soviet states, countries that Moscow still views as being within its sphere of influence, drifting towards Europe and one day possibly becoming part of the EU - that really grates with Moscow, particularly in the case of Ukraine.
There's a lot of concern about what could happen in eastern Ukraine - the ceasefire announced a few days ago by Mr Poroshenko, and the ceasefire announced by armed separatist rebels, is due to expire today. It's unclear how things are going to develop later.
What happens after deal is signed?
Mr Poroshenko hailed the signing as Ukraine's most historic day since independence in 1991, describing it as a "symbol of faith and unbreakable will".
Mr Poroshenko also said he saw the signing as the start of preparations for joining the bloc.
"Ukraine is underlining its sovereign choice in favour of membership of the EU," he said.
Meanwhile European Council President Herman Van Rompuy described it as a "great day for Europe".
"The EU stands by your side, today more than ever before," he told leaders of the three countries, adding that there was nothing in the agreements that might harm Russia in any way.
But Russian President Vladimir Putin said that "efforts to force Ukraine into an artificial choice between Russia and the EU had pushed Ukraine towards a split, a painful internal conflict".
Peaceful citizens were the main victims of the conflict, he said, with thousands of people seeking refuge in Russia.
The European Council on Friday issued a policy statement on Ukraine, setting out key steps it expected to happen by Monday, including the return of three key checkpoints to Ukrainian forces and the "launch of substantial negotiations on the implementation of President Poroshenko's peace plan".
Mr Poroshenko set out a 15-point peace plan on 20 June. It involves decentralising power and holding early local and parliamentary elections.
It also proposes the creation of a 10km (six-mile) buffer zone on the Ukrainian-Russian border, and a safe corridor for pro-Russian separatists to leave the conflict areas.
The European Council did not announce any new sanctions against Russia but said that it continued to assess the situation.
Earlier senior Kremlin adviser Sergei Glazyev described Mr Poroshenko as a "Nazi" and said his presidency was illegitimate because parts of Ukraine did not vote in the May elections.
In a BBC interview, he said that Mr Poroshenko had no constitutional right to sign the treaty, which would damage the Ukrainian economy.
However, President Putin's spokesman Dmitry Peskov told Russian media that Mr Glazyev's comments did not reflect the official Kremlin position.
Mr Poroshenko's predecessor Viktor Yanukovych refused to sign the deal under pressure from Russia and protests led to his overthrow.
After this Russia annexed Ukraine's Crimea region and pro-Russia separatists in eastern regions declared independence, claiming that extremists had taken power in Kiev.
Fighting is said to have continued in some areas of eastern Ukraine despite the temporary ceasefire.
In another development, rebels released four international observers captured more than a month ago.
Alexander Borodai, head of the self-styled Donetsk People's Republic, said the members of the Vienna-based Organisation for the Security and Co-operation in Europe (OSCE) had been freed as a goodwill gesture.
More than 420 people have been killed in fighting between pro-Russia rebels and government forces in eastern Ukraine since mid-April, the UN estimates.
| 2019-04-25T21:57:51 |
http://www.radiosandwell.co.uk/news/eu-signs-pacts-with-ukraine-georgia-and-moldova
|
0.999999 |
4135. The district power station provides a network with 10,000 lamps, the probability of switching on each of them in the evening is 0.6. Determine the probability that the number of lamps simultaneously switched on in the evening will be between 5,900 and 6,100.
| 2019-04-19T19:23:38 |
http://3d-fullhd.ru/index.php?id=2629849
|
0.998904 |
CAPE CANAVERAL, Fla. — NASA's sending a probe to an asteroid, and when that new spacecraft reaches its destination, it will usher in a new era of understanding of the early solar system, a panel said.
The Origins, Spectral Interpretation, Resource Identification, Security, Regolith Explorer (OSIRIS-REx) spacecraft, launching tomorrow (Sept. 8), will explore the asteroid Bennu, searching for traces of the material that helped to build the sun and the early planets. Eventually, the spacecraft will return to Earth with a sample of the asteroid for scientists to analyze in exquisite depth.
"Sample return is really at the forefront of scientific exploration," OSIRIS-REx principal investigator Dante Lauretta said at a press conference yesterday (Sept. 6). OSIRIS-REx will arrive at Bennu in 2018 and begin an extensive mapping campaign that will culminate in the selection of a site to sample. The spacecraft will then drift in to deliver a slow-motion blast to the rock that will kick surface material up into the probe's collecting dish.
"This is going to be a treasure trove of material for scientists yet to come," Lauretta said.
Not far from Earth, a dark stone orbits, potentially holding within it the secrets of the young solar system. Like its fellow asteroids, Bennu is thought to have formed soon after the sun, at around the same time as the solar system's planets. While the constant activity of volcanoes, earthquakes and erosion changed the chemistry of Earth's material since that time (as likely happened on other planets), Bennu remains virtually unmarred. A sample of the asteroid should therefore provide a time-capsule-like glimpse of the planets' youth, the researchers said.
"The crux of OSIRIS-REx is origins, the search of the origin of the solar system and of life itself," OSIRIS-REx project scientist Jason Dworkin said. "For that [search], it's all about the sample."
To complete its planned science objectives, OSIRIS-REx needs to collect a least a 2-ounce (60 grams) sample from Bennu. Once that material lands back on Earth, scientists will probe the sample with complex experiments that just aren't possible in space.
When NASA's Stardust mission returned particles of the Comet Wild-2 in 2006, scientists sliced off micron-sized pieces to study beneath sensitive equipment. Those instruments wouldn't have survived being launched into space, so the sample return allowed scientists to manipulate the particles in ways that would be impossible on board bulky spacecraft.
Scientists researching OSIRIS-Rex's sample will keep a keen eye out for organic-rich material, which asteroids are expected to host in varying degrees. Organic molecules — those made from carbon — and molecules like water are considered key ingredients for life to evolve. While Bennu today is too cold for life, scientists think that other asteroids could have delivered those ingredients to the early Earth through violent collisions.
Despite their devastating immediate effects, the energetic impacts could have deposited material on the hot young planet that allowed life to evolve. While traces of those collisions would have been erased by Earth's changing crust, Bennu provides a glimpse of what the deliveries might have looked like billions of years ago.
"This will be the largest sample-return mission since the Apollo era," said Christine Richey, OSIRIS-REx deputy program scientist at NASA Headquarters in Washington, D.C.
The returned capsule will provide a bounty not only for today's scientists, but also for future generations, Richey said. Three-fourths of the sample will be archived for later study, allowing scientists to answer questions that haven't been thought of today, using instruments yet to be imagined.
The sample that's brought back to Earth won't be the only science that comes from the mission. Before the probe swoops in to gently kiss the asteroid and gather a sample, OSIRIS-REx will spend somewhere between 18 months and two years extensively mapping the asteroid. Not only will researchers use the global map to determine the best site to collect from, but they will also measure the distribution of organic material across the surface.
"We will be able to see an object the size of a penny on the surface of Bennu," said Daniella DellaGiustina, OSIRIS-REX's lead imaging-processing scientist.
The detailed maps will help scientists understand more about the part of the asteroid that their sample comes from, she said.
"Once we have a sample of Bennu, the maps will also provide critical context for that sample," DellaGiustina said.
Detailed cartography will not only reveal how Bennu is put together, but will also provide insight into the composition of other asteroids. The 1,600-foot (492 meters) asteroid dances in a path around Earth, and the odds of this object colliding with the planet are well under 1 percent.But it's not the only space rock nearby, and understanding its structure and composition will help should a more threatening asteroid be found, the researchers said.
OSIRIS-REx will also study how the sun's light can shift the orbit of an asteroid. As energy from the sun hits rocks in space, that energy can provide a small thrust that can gradually shift asteroids' orbits, Lauretta said.
"Since we've been monitoring the asteroid in 1999, its orbit has changed by over 160 kilometers [100 miles]," Lauretta said.
While scientists think they understand this process, known as the Yarkovsky effect, they have yet to study it in action on a space-bound asteroid. Watching the sun's energy push Bennu ever so slightly will help improve models of other rocks in space, creating more accurate simulations for their future orbits, Lauretta said — and whether or not they could impact Earth.
"We're going out into the unknown. Bennu is an unexplored world," Lauretta said.
Although scientists have studied Bennu in depth using both ground- and space-based instruments, the space rock could still provide unexpected surprises, according to the researchers. With the help of OSIRIS-REx, many of the questions about Bennu can one day be answered.
"We're going to explore this world, and we're going to bring back a sample," Lauretta said. "We've got great science ahead of us."
| 2019-04-20T22:15:14 |
https://www.space.com/33992-nasa-osiris-rex-asteroid-sampling-mission-science.html?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+spaceheadlines+%28SPACE.com+Headline+Feed%29
|
0.998506 |
Based on a true story, “The Soloist” is about Steve Lopez (Robert Downey, Jr.), a Los Angeles columnist, encountering a homeless man with a violin, and being unexpectedly moved by the technique, and the passion, of the musician. But conversations with Nathaniel Ayers (Jamie Foxx) are dicey at best, because Nathaniel is a stream-of-consciousness kind of talker. He doesn’t always acknowledge inquiries, and he doesn’t often make eye contact, and many times the hearer is uncertain of the context or background of the flow of words coming from the wild-eyed, wiry, dumpster-clothed persona. But when Lopez discovers that Ayers’ claim of having been a student at Julliard is true, he begins writing columns abut the impromptu concrete tunnel concertos, and people respond. First, a reader donates a cello. Then, a small apartment. Then, arrangements to hear the Los Angeles Symphony Orchestra play Beethoven, for real. Ayers is transported, and Lopez thinks he might truly be redeeming a lost soul.
“The Soloist” will be thoroughly enjoyed by all who appreciate classical music, a redemptive story, and some very fine acting.
1) When have you tried to help someone, but later realized you were imposing your values?
2) It was Don Meredith, quoting Charles Schulz, who said, “There’s no greater burden than unlimited potential.” Agree or disagree?
| 2019-04-21T04:33:27 |
http://faithinfilms.com/thesoloist.htm
|
0.99671 |
The 1884 FA Cup Final was a football match between Blackburn Rovers and Queen's Park contested on 29 March 1884 at the Kennington Oval. It was the showpiece match of English football's primary cup competition, the Football Association Challenge Cup (better known as the FA Cup), it was the 13th Cup final. It was the first time that a Scottish team reached the final of the tournament, with Queen's Park knocking the previous holders of the trophy on route.
Both teams received protests from the defeated teams following the semi-final matches, but each were turned down by the Football Association. By the time the match was played, Queen's Park had already been awarded the Scottish Cup after Vale of Leven declined to participate in the final. Prior to the match there were temporary stands built at the Oval as the Pavilion was reserved for members of the Surrey County Cricket Club. There was a record breaking attendance at the match, with between 10,000 and 12,000 fans attending making it the most attended match in London and special trains were laid on by the railways to transport spectators from Lancashire.
Despite Queen's Park entering the match as favourites, it was Blackburn Rovers who won the game by two goals to one with goals from Jimmy Douglas and Jimmy Forrest; Robert M Christie scored for Queen's Park. The Scottish team had a goal disallowed during play, and the referee later said that they had scored once more but as the players did not attempt to claim it, he had not bothered to award it. The two teams met once more in the final of the following FA Cup final in 1885.
Queen's Park were invited to compete in the 1883–84 FA Cup, despite being from Scotland. They had previously been invited on several occasions from the 1871–72 competition onwards, but ultimately withdrew on each occasion. Their most successful runs had been in both 1871–72 and 1872–73 when they reached the semi-final each time before withdrawing. On each occasion since, they had withdrawn from the cup without playing any matches. Queen's 1883–84 FA Cup campaign began on 6 October 1883 with a 10–0 victory over Crewe Alexandra in the first round in front of a crowd of 2,000 spectators. The second round saw their first home game, and a 15–0 victory against Manchester F.C. on 1 December. It was the first time that an English cup match had been played in Scotland, and drew 6,000 fans. However the match was a one-sided affair, with Queen's Park dominating throughout to the extent that their goalkeeper was never required to handle the ball.
They defeated the Welsh team from Oswestry in the third round, 7–1. They were drawn at home against Aston Villa in the fourth round, but the match was called into doubt when it was scheduled to take place on the same date and location as Queen's Park's match against Hibernian F.C. in the Scottish Cup. But Queen's and their Scottish opponents agreed to postpone the match for two weeks. There was a great deal of interest by the spectators from Birmingham, and three special trains were laid on to transport them to Glasgow for the game with more than 1200 of them travelling north of the border. Around 10,000 fans filled the ground where they watched Queen's Park defeat Aston Villa 6–1. The fifth round was their lowest scoring game of the campaign, where they won away to Old Westminsters 1–0 at the Kennington Oval in London. In the semi-final they defeated Blackburn Olympic 4–1 to set up a final against the other Blackburn-based team; the match was played at a neutral venue in Nottingham. Olympic subsequently complained to The Football Association as the crowd invaded the pitch to cause disruption for their team; the complaint was not upheld.
Blackburn Rovers also started their campaign in the first round, where they won their first game at home against Southport Central 7–1. The second round saw them drawn away to South Shore at Blackpool resulting in a further victory by a margin of 7–0. They defeated Padiham 3–0 in the third round, once again at their home ground of Leamington Street, and in the fourth round against Staveley 5–1 in a match which was dominated by Rovers and in front of a crowd of 3000 spectators.
Rovers won once again in an away game against Upton Park at West Ham Park by a scoreline of 3–0 in the fifth round. The match was more competitive than the scoreline might suggest, as Blackburn were a goal down at half time but won the game after a goal by John Inglis and two by Joe Lofthouse in the second half. At Birmingham in a neutral venue, they defeated Notts County in the semi-final 1–0. As with Olympic against Queen's Park, Notts also complained of events that took place during their semi-final. They argued that Rovers had illegally fielded Inglis, a player from Glasgow who had played for Glasgow Rangers and was only drafted it to the Blackburn team to improve their cup performance. A letter was produced by Rovers to show that he had been expelled from Rangers because he continued to play for the English team instead. Notts wanted the match to be replayed without Inglis, but the FA did not uphold the complaint.
Prior to the match, Queen's Park and Blackburn Rovers had met on three occasions; each time the game ended in a draw. Queen's went into the match as the favourites, being the most successful club in Scotland at that point and having developed a style of play involving short passing which was not in use in England. They had been awarded the Scottish Cup earlier in the season after Vale of Leven declined to participate in the final due to illnesses suffered by a number of their players.
Blackburn Rovers were seeking to emulate the success of rivals Blackburn Olympic, who were the current holders of the trophy, and the team that Queen's Park defeated in the semi-final. Rovers had previously reached the FA Cup final, in 1882, where they were defeated by Old Etonians. Blackburn trained during the week prior to the game by conducting practise games and going for walks. They departed for the London area by train on the day before the final; a large crowd of local supporters gathered at the train station in Blackburn to wish them well as they left. The team stayed in Richmond the night before the match and made their way into the city at lunchtime on the Saturday.
For the second year in succession, special trains were laid on for the final to transport fans down from Blackburn. However, due to issues with the Olympic fans from the previous year destroying tea-rooms at stations on the route, the railway instead closed all refreshment rooms on the line on the day of the match. Additional stands were built at the Oval for the match at both the Gasometre end and on the west side, as the Pavilion was reserved for members of the Surrey County Cricket Club.
The match was refereed by Major Francis Marindin of the Royal Engineers, who was also President of the Football Association. His two umpires were Charles Wollaston of Wanderers and C. Crump of the Birmingham Football Association. According to initial estimates, there were around 10,000 to 12,000 spectators, breaking previous records for attendances in London. This was unexpected, and so there was not enough staff at the stadium to prevent the crowd from rushing through the turnstiles without paying. The weather was described as "bright and seasonable". Queen's won the coin toss and chose to defend the gasometer end. Rovers kicked off, but play quickly turned in the Scottish team's favour and they made the first two attacks. The work of Inglis and Sowerbutts saw Rovers take control of the match briefly, but Queen's Park were awarded an indirect free kick for handball inside the Blackburn half. The ball was shot straight into the Blackburn net without touching another player, and so no goal was awarded. Rovers quickly gained a corner kick but failed to score.
Queen's went on the attack once again, with Christie going on a run but losing possession to Hargreaves. After around 30 minutes of play, Hargreaves passed the ball to his team-mate Douglas who went on to score Rovers' first goal. Queen's Park then committed the second handball of the game, giving Rovers a free kick. Brown took the ball up the wing, and centred it towards Forrest, who turned the ball into the back of the Queen's Park goal and put Blackburn two ahead. In response, Queen's Park's attacks on the Blackburn defence increased, and they scored through Christie before half time.
Queen's Park took the advantage early on in the second half, and a series of rapid attacks followed the break. The Scottish team were only prevented from scoring in one goal mouth scramble by the teamwork of Arthur and Suter. Rovers appeared to have switched to a defensive posture, and conceded a further corner kick, but nothing came of it as Gow kicked it behind the goal. A further handball just inside the Queen's Park half resulted in a solitary attack for Blackburn, ending in Brown sending the ball over the crossbar. Further attacks Queen's Park followed, but one further attack from Blackburn led to a shot from Brown which many in the crowd thought crossed the line before Gillespie cleared it. Blackburn dominated the final five minutes of the game, and the match ended 2–1; all three goals were scored in the first half. The medals and trophy had been expected to be awarded by Prince Leopold, Duke of Albany, however due to his death on the day before the final, they were not presented publicly. Instead, Major Marindin handed them over in the dressing rooms.
Following the match, the referee admitted that at one point during the game the ball had passed the Blackburn goal line, but as Queen's Park did not attempt to claim the goal, it was not awarded. Queen's Park would ultimately become the only Scottish club to reach the final of the FA Cup, although they returned the following year where they again faced Blackburn Rovers.
Following their victory in the FA Cup final, Blackburn Rovers played Blackburn Olympic in the final of the Lancashire Association Cup where Rovers won once again 2–1. The 1884 FA Cup was the first of a winning streak for Rovers, with the team retaining the trophy for the following two seasons, by first defeating Queen's Park again in 1885 and then West Bromwich Albion following a replay in 1886. This run was ended in the second round of the 1886-87 FA Cup when Rovers played another Scottish team, Renton. After an initial 2–2 draw played at Queen's Park's ground at Hampden Park, Renton were victorious in the replay.
↑ "Spiders return to the spotlight". FIFA.com. 6 February 2009. Retrieved 13 November 2012.
↑ "FA Cup 1871–72". The Football Club History Database. Retrieved 13 November 2012.
↑ "FA Cup 1872–73". The Football Club History Database. Archived from the original on 16 February 2010. Retrieved 13 November 2012.
↑ "FA Cup 1876–77". The Football Club History Database. Archived from the original on 16 February 2010. Retrieved 13 November 2012.
↑ "FA Cup 1879–80". The Football Club History Database. Archived from the original on 16 February 2010. Retrieved 13 November 2012.
↑ "FA Cup 1880–81". The Football Club History Database. Archived from the original on 16 February 2010. Retrieved 13 November 2012.
↑ "FA Cup 1881–82". The Football Club History Database. Archived from the original on 16 February 2010. Retrieved 13 November 2012.
↑ "FA Cup 1882–83". The Football Club History Database. Archived from the original on 16 February 2010. Retrieved 13 November 2012.
↑ "Saturday's Football Matches". Edinburgh Evening News (3245). British Newspaper Archive. 8 October 1883. p. 3. Retrieved 6 July 2014. (subscription required (help)).
1 2 3 4 5 "FA Cup Results Archive". The FA.com. Retrieved 13 November 2012.
↑ "Manchester v. Queen's Park". The Sheffield & Rotherham Independent. LXVII (9094). British Newspaper Archive. 3 December 1883. p. 4. Retrieved 6 July 2014. (subscription required (help)).
↑ "Local Intelligence". The Blackburn Standard. XLVIII (2515). British Newspaper Archive. 12 January 1884. p. 8. Retrieved 6 July 2014. (subscription required (help)).
↑ "Birmingham Aston Villa Versus Glasgow Queen's Park". The Dundee Courier & Argus (9522). British Newspaper Archive. 22 January 1884. p. 6. Retrieved 6 July 2014. (subscription required (help)).
↑ "Football". The Western Daily Press. 52 (8016). British Newspaper Archive. 11 February 1884. p. 8. Retrieved 6 July 2014. (subscription required (help)).
1 2 "Football Notes". Liverpool Mercury. 52 (11264). British Newspaper Archive. 18 February 1884. p. 7. Retrieved 6 July 2014. (subscription required (help)).
1 2 3 "Football, Association Cup Competition". Liverpool Mercury (11283). British Newspaper Archive. 11 March 1884. p. 7. Retrieved 6 July 2014. (subscription required (help)).
↑ "English Association Challenge Cup". The Nottingham Evening Post (1696). British Newspaper Archive. 22 October 1883. p. 4. Retrieved 6 July 2014. (subscription required (help)).
↑ "The Association Challenge Cup". The Morning Post (34775). British Newspaper Archive. 7 December 1883. p. 6. Retrieved 6 July 2014. (subscription required (help)).
↑ "Saturday's Football". The Derby Daily Telegraph. IX (1335). British Newspaper Archive. 31 December 1883. p. 4. Retrieved 6 July 2014. (subscription required (help)).
↑ "Football Association Challenge Cup". The Derbyshire Times and Chesterfield Herald (6750). British Newspaper Archive. 26 January 1884. p. 6. Retrieved 6 July 2014. (subscription required (help)).
↑ "Association Challenge Cup". Burnley Express and Advertiser (333). British Newspaper Archive. 16 February 1884. p. 3. Retrieved 6 July 2014. (subscription required (help)).
↑ "The Objection By Notts". Nottingham Evening Post (1816). British Newspaper Archive. 12 March 1884. p. 4. Retrieved 6 July 2014. (subscription required (help)).
1 2 "The Final Tie for the English Association Cup". Blackburn Standard (745). British Newspaper Archive. 29 March 1884. p. 5. Retrieved 6 July 2014. (subscription required (help)).
1 2 Fry, C.B. (1902). "Teams That Have Won the Association Cup". The Strand Magazine: 455–463. Retrieved 13 November 2012.
↑ "Football". The Graphic (745). British Newspaper Archive. 8 March 1884. p. 15. Retrieved 6 July 2014. (subscription required (help)).
1 2 3 4 5 6 7 "Football Notes". The Blackburn Standard. XLVIIL (2527). British Newspaper Archive. 5 April 1884. pp. 2&3. Retrieved 12 July 2014. (subscription required (help)).
↑ "A Northern Horde". Edinburgh Evening News (3398). British Newspaper Archive. 2 April 1884. p. 3. Retrieved 12 July 2014. (subscription required (help)).
↑ "Death of the Duke of Albany". The Wrexham Advertiser. XXXV. British Newspaper Archive. 28 March 1884. p. 8. Retrieved 6 July 2014. (subscription required (help)).
↑ Lyles, Christopher (5 January 2008). "FA Cup by numbers". The Daily Telegraph. Retrieved 13 November 2012.
↑ "Football". The Huddersfield Daily Chronicle (5215). British Newspaper Archive. 21 April 1884. p. 4. Retrieved 12 July 2014. (subscription required (help)).
↑ Collett, Mike (13 May 2010). "FA Cup final facts and figures". Reuters. Retrieved 13 November 2012.
↑ "The Association Challenge Cup". The Manchester Weekly Times (1448). British Newspaper Archive. 11 April 1885. p. 7. Retrieved 12 July 2014. (subscription required (help)).
↑ "The Football Association Challenge Cup". The Standard (19265). British Newspaper Archive. 12 April 1886. p. 6. Retrieved 12 July 2014. (subscription required (help)).
↑ "English Cup Competition – Second Round". The Blackburn Standard. LIV (265). British Newspaper Archive. 27 November 1886. p. 3. Retrieved 12 July 2014. (subscription required (help)).
↑ "Football". The Morning Post (35713). British Newspaper Archive. 6 December 1886. p. 2. Retrieved 12 July 2014. (subscription required (help)).
| 2019-04-22T15:57:44 |
https://ipfs.io/ipfs/QmXoypizjW3WknFiJnKLwHCnL72vedxjQkDDP1mXWo6uco/wiki/1884_FA_Cup_Final.html
|
0.999999 |
What is Queuing theory? Queueing theory is the mathematical study of waiting lines, or queues. Queueing theory is considered a branch of operations research because the results are often used when making business decisions about the resources needed to provide service. The theory enables mathematical analysis of several related processes, including arriving at the end of the queue, waiting in the queue (essentially a storage process), and being served at the front of the queue. The theory permits the derivation and calculation of several performance measures including the average waiting time in the queue or the system, the expected number waiting or receiving service, and the probability of encountering the system in certain states, such as empty, full, having an available server or having to wait a certain time to be served.
Queues form when the arrival time of customers or products is faster than their individual service time. The picture below illustrates a simple queue example in which there is one server. Any individual that has been to a bank, a grocery store, a tollbooth, or a fast food restaurant has experienced a queue.
Why is Queueing Theory important for small and medium size companies?
Entity: This refers to the job, part, customer, etc., that arrives for processing.
Server (machine or operator): This term refers to the machine, operator, etc., that provides the service. For example, a teller would be the server in a banking queue.
Arrival Times: As the name implies, this relates to when the entity arrives at the processing station (machine, operator, etc.). Arrival times can either be deterministic (i.e. constant) or stochastic (i.e. random). When arrival times are stochastic, probability distribution are frequently used to extract certain performance measures. Companies prefer deterministic arrival times because it simplifies ordering and inventory requirements. Unfortunately, that is not always the case.
Service Times: Likewise, service times can also be deterministic or stochastic. Typically, machines are more likely to have deterministic service times given arrival of a common part and set machining requirements. Operators, on the other hand, are far more likely to have stochastic service times given human nature.
Queue Length: Queues can be either finite or infinite based on space limitations. Most common queues are finite in length.
Number of Servers: Based on the production and service requirements, the number of servers can vary within a company. Using a bank again as an example, when the number of customers waiting in the queue grows, good banks will open up additional teller spots. In production systems, companies may choose to add additional machines when server utilization exceeds an established threshold. Of course, there is always a price to pay when adding servers.
Service Discipline: This refers to the order in which entities move from a queue to server. The most common rule is FIFO (First In, First Out). However, there are times in which LIFO (Last in, First Out) may be optimum.
This queuing model consists of single server and an infinite queue. The graph below depicts the arrival of entities and servicing of entities over time. Illustrated within the graph are stochastic arrival times and stochastic service times as well as times when the server is idle. At “t1” the first entity arrives. Given that the server is idle, the number in the queue is zero. At “t2” and “t3” additional entities arrive. Given the server is still processing the first entity, a queue forms and grows with each arrival. At “t4” service is completed on the first entity and processing begins on the next entity thus reducing the size of the queue. The process continues with subsequent arrivals and service completions. Charting queue size over time will allow companies to accurately determine one key measure of performance – Server Utilization, which can be calculated as a percentage of non-idle time divided by total time. Other key measures of performance are listed below.
Stability: A queue is stable when the number of waiting customers or products does not move toward infinity. In a single-server queue, the queue is stable if the average service time is less than the average inter-arrival time.
In situations where arrival and service times are stochastic, probability theory is used to determine “best fit” distributions, which can be used in modeling scenarios. As far as software solutions, there are a number of programs that allow companies to simulate various queueing models, which assists in steady state analysis.
Remember, Operations Research techniques are designed to provide Scientific Solutions to company problems. However, it is by great leadership and management where companies obtain the competitive advantage. OSI can assist you in optimizing both.
| 2019-04-25T06:41:33 |
https://www.opensourceintegrators.com/solutions/bpm/queuing-theory
|
0.999214 |
What about using capacitors instead of battery?
Is there some reason, that they shouldn't work or miss important properties of a battery?
While they are not really appropriate collecting energy, they might give the advantage to have very soon a result of the efficiency of the bedinimachine.
Nearly the same we might have with small batteries (nickel cadmium or like that): if the one, which is driving the machine, is emptied within 5 or ten minutes while the other one is charged, we should get a much more precise result and may have many more testing cycles, than with bigger batteries.
In my oponion batteries are different from capacitors, although electrolytic capacitors are a bit similar to batteries, but batteries tend to behave rather non-linear and store charge rather differently. Capacitors are not like that.
I made that example for verification of how much energy is in the output of the system and different capacitors absorb different amount of energy. So different batteries can indeed "absorb" different amount of energy too, as Bedini has stated he uses four on the output.
| 2019-04-23T22:38:46 |
http://www.energeticforum.com/14770-post193.html?s=43a263a318dc8aad4e28c280e14472a7
|
0.998659 |
Browse the article How should a digital camera be cleaned?
Photographing an imminent dust storm, as this Australian gentleman seems intent on doing, is just one of many ways to get your digital camera dirty.
Dust is amazing stuff. It collects in vast space nebulas and gloms together to form planets and ignite stars. In the atmosphere, it scatters sunlight to spark stunning sunsets. But let's face it, dust's true superpower lies in its ability to get into everything, including the expensive cameras with which we take pictures of -- well, stars and sunsets, among other things.
Dirt is fine on a desert trail or forest track but, in your optical path -- the path light traces through your camera -- it can spoil your whole shoot. When that happens, it takes more than a few puffs of air to put the snap back in your shots.
The question is, where to begin? Do those specks, splotches and scratches stem from a dusty sensor or from dirt on your viewfinder, mirror or lens? To find out, head to a well-lit space and take several photos of, say, a blank white sheet of paper. Increase your f-stop and set the camera to aperture-priority mode so that it automatically sets the appropriate shutter speed. Now upload your pics to a computer and zoom to a 1:1 pixel ratio (one photo pixel per screen pixel) [sources: McHugh; Stern].
If you see small, translucent spots, dark specks or thin lines that recur across photos, it's a good bet that cloth fiber, hair, pollen or dust have gotten somewhere they don't belong. To diagnose where, try fiddling with the f-stop and snapping more shots. If the dirt is located on the sensor, you'll see a change in the dots' size and clarity; if you don't, then you probably have dirt on the on the viewfinder focusing screen or the single-lens reflex (SLR) mirror. Lens shmutz is harder to diagnose, since it won't always show up on photos. Switch lenses and see if you notice a difference [sources: McHugh; Stern].
Digital SLR cameras are especially susceptible to dust because they rely on a sensor that is exposed to air every time you change lenses. The most obvious signs of a dusty sensor are loss of contrast and/or small, diffuse dots cropping up in your photos. Why are the dots so fuzzy? The specks don't actually sit on the camera sensor's photosites -- the individual light detectors populating your charge-coupled device (CCD) or complementary metal–oxide–semiconductor (CMOS) sensor. Instead, they deposit on the topmost surface of whatever stack of filters covers the sensor, which can include an anti-aliasing filter, antireflective coatings, microlenses and/or an infrared filter. That's why increasing your f-stop -- which diminishes your aperture and increases your depth of field -- casts them into sharper focus [sources: McHugh; Stern].
Unfortunately, when it comes to sensors, identifying the problem is the least of your worries.
Hmmm, should I give this new-fangled gizmo a cleaning?
Getting a sensor clean is tricky business. Without patience, care and dexterity, you risk making matters worse, either by pulling in external crud, like camera lubricants and ambient dust, or by gouging costly scratches into the surface [sources: Breen; McHugh]. If you make a shambles of it, you could void your warranty. Your safest bet? Send your camera off to the manufacturer or drop it at a camera shop -- one that insures against damage caused by its staff.
Cleaning services charge in the range of $30-$50, which will dent your wallet less than the individual tools you need for doing the job yourself but will leave you sans camera for a few weeks [source: Atkins; Breen]. If that doesn't work for you, or if you're a dyed-in-the-wool DIY-er, you have your choice of gadgets, which we'll dive into in the next section.
A few more caveats: When cleaning your sensor, plug the camera into an outlet or, lacking an AC adaptor, charge your batteries fully. If your camera's battery dies before you have finished cleaning, the mirror might shut and, with your hand or cleaning tool in the way, you could damage the mirror or scratch the sensor [sources: Breen; McHugh; Stern].
Also, it's a good idea to clean the camera body, lens and lens mounts with a damp cloth before you start so that no crud from the camera ends up on the parts you're trying to clean. Think of it as sweeping before you mop. Some camera cleaning kits include swabs and a solution for washing the interior chamber -- another good first step [source: McHugh; Stern].
If possible, work in a controlled area with still air. Don't clean the sensor if you're in the field -- at most, give it few puffs from a blower [source: McHugh; Stern].
Some cameras feature a self-cleaning mode, which makes for a handy gizmo but is not a true cleaner. Speaking of preventative maintenance, here are a few tips for saving your sensor: Keep your lenses and chamber capped, protect your lens with a hood and filter and switch lenses as quickly and cleanly as you can. If possible, point your camera down when switching lenses. To avoid fungus, keep your equipment moisture-free and consider storing it with a drying agent, or desiccant, such as silica gel [source: Kelly]. Also, stop carrying your photo rig in your gym bag.
Whatever else you do, consult your owner's manual before tackling any cleaning or maintenance. If your manual offers little on the topic of cleaning, track down a good third-party book that covers your model. Then you'll be ready to break out the tools and start cleaning.
A sample sensor cleaner kit available on Amazon for $32.95. It comes with lens cleaner, microfiber and cleaning cloths, a blower, two lens pens, four swabs and some liquid cleaner. This one is designed for several different Nikon models.
OK, so you're really confident in your abilities, you're stuck in the field somewhere and have no choice, or you live for danger. Whatever the reason, you've dismissed our warnings and are going for Operation: Sensor Sweep.
Begin by activating your camera's cleaning mode. This will flip up the mirror and reveal the sensor. Check that you have plenty of juice, either from a full battery or a wall socket. Once you have the lens off and can see the sensor, you can optionally use a special loupe, or small magnifying tool, to spot the dust [source: Cameta Camera].
Shops hawk a befuddling array of sensor-cleaning schlock, much of it packaged in kits. Not all utensils are created equal, and many kits amount to expensive overkill, so we've listed the main tools below, from least invasive to direct-but-demanding.
A sensor blower is a plastic squeeze bulb with a nozzle that blows away loose dust with a puff of air. Because it never touches the surface, it is the least risky tool and the easiest one to use in the field. Unfortunately, blowing might not be enough to knock dust loose, and blown dust can redeposit (pointing the camera at the ground helps) [sources: Kelly; McHugh]. Do not use a blower that has a brush, which can retain dust and scratch the sensor covering [source: Breen]. Also avoid compressed air, which pumps out too much force and can deposit damaging chemicals [sources: Atkins; Nakoma Products; Kelly].
A sensor brush or sweep looks like a fine, flat paintbrush. Use a very light touch, starting at one end of the sensor and gliding smoothly across. Remember, you aren't scrubbing or even sweeping; rather, you're allowing the electrostatic action of the bristles to attract the dust, like a charged amber rod attracts a balloon. Clean the brush between sweeps, and don't let the brush's edges drift off the sensor or you might pick up other pollutants. All in all, a sensor brush or sweep is a good compromise tool and is handy for dusting your focusing screen [sources: Breen; Kelly; McHugh].
A sensor stamp or pen has a deformable tip (usually made of silicone) that hugs individual dust particles. To use, simply press it against the surface of your sensor and watch the dirty lovefest begin. Because you press instead of dragging, you're less likely to cause unwanted scratches. Avoid the versions that use adhesives, which can leave sticky residue behind [source: McHugh].
A sensor swab, wipe or wand squeegees your sensor using a small, flat-edged paddle wrapped in a lint-free tissue. The tissue is treated with cleaning fluid and will handle just about anything, but using it requires the most care. Again, start at one side of the sensor and drag across, applying no more pressure than you would with a fountain pen. Optionally, you can then twist the swab 180 degrees and drag the clean side back across. As with any fluid, check with the manufacturer and make sure you have the right one for your camera. Also, make sure your paddle width matches your sensor size [sources: Chriss; Kelly; McHugh; Stern].
Other tools include sensor stain removal solution, sensor brush washers and brush-cleaning devices, but shutterbugs disagree regarding their usefulness and value, especially given their often steep price tags [sources: Breen; Chriss].
Now that you've swabbed the sensor, you can look at your lenses.
The main downside of brushes is their reliance on static electricity, which moist atmospheric conditions can neutralize. Also, gooier varieties of grit can drag their slime trails across the sensor, making matters worse, so you might want to skip the brush unless you also have a swab and cleaning solution handy [source: Chriss].
Fingerprints and smudges on your camera lens can mar more than your photos; over time, their oils can also harm your lens's protective coating [source: Weitz].
Like the shielding layers on sensors and filters, lens coatings scratch easily, so tread lightly when giving them the old spit-and-polish. In fact, go ahead and avoid both spit and polish. Start instead with a few blower puffs on both the interior and exterior lens, followed by some light sweeps with a soft camel-hair brush. And again, never blast your lenses with compressed air, which can leave behind damaging chemicals [sources: Delaney; Kelly; Stern; Weitz].
Leave cloths and papers out of it until you clear the area of dust, or you risk grinding grit into the lens, after which you'll dream of the halcyon days when smudges were your worst concern. If you decide to use a cleaner, don't go for over-the-counter options; instead buy one designed for your camera and lenses; otherwise, you might -- you guessed it -- damage the coating [sources: Delaney; Kelly; Stern; Weitz].
Removing smudges or fingerprints requires a delicate touch. Breathe lightly onto the lens to add a modicum of moisture, then take a microfiber cloth or lens paper -- folded, never scrunched up -- and wipe in gentle, circular motions [sources: Delaney; Kelly; Weitz]. Remember how, when you were a little kid, your mom would lick a napkin and scrub your face with it? That's exactly what you shouldn't do.
If you prefer lens paper, you can add a few drops of lens-cleaning fluid or methanol, aka wood alcohol, to it, but do not apply either substance directly to the lens [sources: Delaney; Kelly; Weitz].
Out in the field without your gear? An old cotton T-shirt will do in a pinch, but never use a fabric or tissue with a rough texture, such as polyester rags, paper towels or facial tissue [source: Weitz]. Nikon's Lens Pen offers another option: One end has a dry brush for whisking away specks, while the other sports a soft round chamois tip with a non-liquid lens cleaner [source: Kelly].
As for cleaning the mirror ... don't. Just don't. Leave it alone. At most, give it a few puffs of air from your lens blower, but never touch it. The mirror's surface coating takes scratches like an iPhone in a blender, so either live with it or have a pro service it [source: Weitz].
Finally, if you're concerned about the camera shell, a wipe-down with a damp cloth will usually do the trick. Lens blowers are handy for blasting dirt out of nooks and crannies. In some cases, you might need to treat certain parts, such as leather straps, with extra care [source: Delaney].
A microfiber cloth's tight weave of tiny fibers makes it ideal for cleaning without fluid. Because it excels at grabbing dust, grit and oil, you can wipe down your camera body with a microfiber cloth too -- although you should grab a different cloth than the one you used on your lens. Better still, you can wash and reuse it.
| 2019-04-19T06:18:18 |
https://electronics.howstuffworks.com/cameras-photography/tips/clean-digital-camera.htm/printable
|
0.999272 |
Beyond Enron and WorldCom lies a much bigger scandal: the "misplacement" of over $3 trillion of taxpayers' money by the US government. This story hasnt gone completely unreported. For example, CBS News quoted Donald Rumsfeld as saying, "according to some estimates we cannot track $2.3 trillion in transactions." ('The War on Waste', CBS News, 29/1/02).
According to Catherine Austin Fitts, former Assistant Secretary of Housing and Urban Development (HUD), "total undocumented accounting adjustments [...] for the Department of Defense [and HUD for fiscal 1998-2000] amount to a whopping $3.3 trillion, or $11,700 for every American."
In June 2001, the Senate Governmental Affairs Committee published a study, Government at the Brink describing the failure of government agencies to maintain reliable financial systems and/or to publish audited financial statements. President Bush's initial 2002 budget (before increases for 9/11) proposed that 85% of federal appropriations be awarded to the very same agencies criticised by the study. The Department of Defense has failed to produce independent audited financial statements since 1995.
The US Constitution says: "No money shall be drawn from the Treasury but in consequence of appropriations made by law." According to a New York Times article (July 22, 1999), however, "Congress says in a new report that the Pentagon defied the law and the Constitution by spending hundreds of millions of dollars on military projects that lawmakers never approved."
Is anything being done to stop this? According to Catherine Austin Fitts, the company credited with an accounting "misplacement" of $59 billion at HUD has been awarded the contract to redesign the Pentagon's business processes.
Let's put these figures into perspective. $59 billion would pay the total cost of UK unemployment welfare (£5bn/year) for 7 years. $3.3 trillion would cover it for 420 years. How do you "misplace" an amount that size?
Meanwhile, "black," or classified, or "don't tell the public," programs requested in President Bush's 2004 defense budget are at the highest level since 1988 (source: Washington Post, 27/8/03). As John E. Pike, director of GlobalSecurity.org, says, with amusing understatement: "It's puzzling. It sets the mind to wondering where the money's going and what sort of politically controversial things the administration is doing because they're not telling anybody".
And, meanwhile, as an example of the wage levels most unprivileged US workers can expect, the odds against a typical US welfare recipient landing a job which pays at least $8.89 per hour (the minimum needed to afford a one-bedroom apartment, according to the National Coalition for the Homeless) are about 97 to 1. (Source: Preamble Center for Public Policy, reported in Barbara Ehrenreich's 'Nickel and Dimed').
Of course, the quality of life of the "typical" unprivileged employed/unemployed person has absolutely nothing to do with the fact that $11,700 *per person* of public money disappears into a black hole every few years. Of course. People should take responsibility for their own livelihoods and not blame the government. Of course.
| 2019-04-19T09:27:27 |
http://www.anxietyculture.com/bulletin030903.htm
|
0.998895 |
High time for Europe to offer temporary protection to refugees from Syria?
The 2001 Temporary Protection Directive - created in the wake of the Yugoslav Wars - has never been activated, but it could be part of a reasonable, compassionate response to the Syrian refugee crisis.
Approximately 3 million people have fled armed conflict in Syria in about three and a half years, making this refugee crisis one of the largest ever to have occurred. Most of the refugees – about 96% – remain in Lebanon, Turkey, Jordan, Iraq, and Egypt. UNHCR reported in July 2014 that the number of asylum applications by Syrians in Europe had reached 123,600 – about 4% of the total 3 million refugees. In addition, there are approximately 6.5 million people displaced within Syria.
With such high numbers of refugees and internally displaced persons so close to EU borders, and with a large number of refugees from Syria having already entered Europe, the activation of a coordinated temporary protection regime in Europe is overdue. The recent deaths of hundreds of migrants in the Mediterranean Sea, many of whom likely fled the conflict in Syria, illustrate the urgent need to expand safe and legal routes of entry into Europe for people in need of international protection.
Following the uncoordinated response to the refugee crisis generated by conflict in the former Yugoslavia in the 1990s, in 2001, the European Council issued a Temporary Protection Directive (2001/55/EC). Its purpose is to provide a framework and minimum standards for responses to the mass displacement of persons who are unable to return to their country of origin (for example, due to armed conflict).
The Directive applies not only to persons already in Europe, but also contains provisions which permit the entry of displaced persons into Europe. Under Article 2(d), the Directive can apply to a spontaneous movement of a large number of people from a particular country or region or an assisted evacuation into Europe; and under Article 8(3), states should facilitate the entry of eligible persons into their territory, including, for example, by the issuance of visas. UNHCR also issued guidelines on temporary protection and stay in February 2014, which generally align with the Temporary Protection Directive.
The 2001 Temporary Protection Directive has never been activated, but it could be part of a reasonable, compassionate response to the Syrian refugee crisis. If the Temporary Protection Directive were activated, it would work something like this: the European Council would designate the group for whom temporary protection is required (in this case, people who have fled Syria as a result of the armed conflict).
Then participating states would facilitate the entry and granting of temporary protection to people from the designated group; and the designation also would apply to members of the group who entered participating European countries on their own. The potential beneficiaries would undoubtedly be subject to security screening to ensure that people who have committed serious crimes would be excluded from protection.
Those eligible would be granted temporary protection for an initial period of one year, which could be renewed if the circumstances in Syria had not substantially improved. People granted temporary protection under the Directive would be granted permission to work, access to healthcare, education for minors, and could receive assistance with accommodation and social services if needed. They would also be reunited with eligible family members. The group designation could be withdrawn when the circumstances in Syria permitted displaced persons to return home safely or on the European Council’s decision.
This temporary protection regime would be similar in some ways to currently existing refugee resettlement and humanitarian admission programmes, but would offer several advantages. For example: it would not require a status determination procedure (other than to establish that the person was a member of the designated group) as is normally necessary for refugee status, which would reduce the time and resources needed to process beneficiaries of protection; in addition, the programme would be coordinated across Europe, promoting more equitable responsibility-sharing amongst European countries; and finally, the aim would be to process significantly higher numbers of people in need of protection, giving more people the refuge they so desperately need.
Temporary protection should not take the place of asylum. Rather, it should be a measure to ensure the immediate protection of designated groups of people. As confirmed in the Temporary Protection Directive in Paragraph (10) and Articles 4 and 19, persons who are granted temporary protection should be able to apply for and be granted refugee status if they meet the criteria under applicable refugee law (though States could require that beneficiaries wait until their temporary protection status is coming to an end before applying for asylum).
Permanent asylum is necessary for some – especially those whose personal circumstances indicate that they would be persecuted if they returned to their country of origin, even if a sustainable peace were achieved and many people who previously required international protection could return home in safety. Permanent asylum may also be necessary for some refugees for other compelling reasons, such as for those who have suffered severe trauma and are receiving treatment in their new country. It is likely, however, that many of the people who have fled Syria will be able to return to their homeland once the conflict is over and the country has stabilised, and for these people, temporary protection can be considered a reasonable measure.
Temporary protection should not be the only way for refugees from Syria to enter Europe legally and safely. It should be implemented in combination with other measures, including permanent resettlement, humanitarian admission, family reunification, private sponsorships, student scholarships, academic fellowships, and employment and training programmes, all of which can operate simultaneously to maximize the protection options available to people affected by the Syrian refugee crisis.
Although not a panacea, temporary protection could be a very important part of Europe’s response to the Syrian refugee crisis. The situation in the countries neighbouring Syria is dire for many refugees, and it is not surprising that many of them are willing to risk their lives by crossing the Mediterranean in unsafe boats to seek refuge in Europe. European countries should not wait for more tragedies to occur before taking further action to offer safe and legal ways for those forced to flee Syria to enter Europe, such as offering temporary protection.
Penny Ehrhardt and Bex McAllum contributed with helpful comments on a draft of this article.
Cynthia Orchard is a US-qualified attorney currently working as a consultant researcher and editor with BADIL (the Resource Center for Palestinian Residency and Refugee Rights). She has engaged in legal advocacy for refugees in the UK and US and recently completed a Masters degree in international human rights law at the University of Oxford. She is the co-author, with Andrew Miller, of ‘Protection in Europe for refugees from Syria’ (Policy Briefing 10, September 2014, supervised by Professor Dawn Chatty, Director of the Refugee Studies Centre) available here, which is a companion to the report by Professor Susan Akram and others, ‘Protecting Syrian Refugees: Laws, Policies, and Global Responsibility-Sharing,’ available here.
| 2019-04-19T04:24:45 |
https://www.opendemocracy.net/en/can-europe-make-it/high-time-for-europe-to-offer-temporary-protection-to/
|
0.999999 |
Question 1: In the series, Tobias announces that Jake is the unofficial leader of the ________, a group of teenage guerillas at war with a covert alien invasion.
Question 2: He is also left with partial memory imprints of Temrash and his former hosts: a Gedd, a ________, and Tom (who is now host to another Yeerk).
Question 3: Jake Berenson is a fictional character and primary protagonist from the sci-fi book series ________, written by K. A. Applegate.
Question 4: Although he originally does not want the role, Jake changes his mind after he learns that his older brother Tom is among the Controllers, people infested by ________.
Question 5: A rift forms between them at the end of series due to Jake's depression, and his distrust of Cassie after she allows Tom to take the ________.
Question 6: ________: There is much mutual respect between Ax and Jake.
| 2019-04-25T16:53:39 |
http://quiz.thefullwiki.org/Jake_Berenson
|
0.999971 |
My Webcam is not working. How can I resolve it?
Like all the laptops in the HP Pavilion line, the dv6000's sleek design and shiny finish holds its own next to systems from style-conscious manufacturers such as Apple and Sony. Aside from its good looks, the dv6000 also provides a solid set of entertainment features and high-end components for a fair price. The components however did not result in record-breaking performance. Its battery life is also below average. For these reasons, the Pavilion dv6000 is recommended for home users who want a laptop with basic entertainment features and do not plan to spend a lot of time away from the power outlet.
The HP Pavilion dv6000 measures 14 inches wide, 10.1 inches deep, and 1 inch thick--about the same size as the Dell Inspiron E1505 and the PC Club Enpower ENP680. However, at 6.2 pounds, the Pavilion dv6000 is the lightest of the three; its AC adapter brings the total travel weight to a still portable 7.2 pounds.
Some additional features this laptop has is a 1.3-megapixel Webcam, which is useful for video conferencing and two built-in microphones on the display bezel, which eliminate the need for an external microphone.
A link below shows the exact specifications for the HP Pavilion dv6000.
| 2019-04-19T04:45:42 |
https://ru.ifixit.com/Device/HP_Pavilion_dv6000
|
0.997081 |
Presenters at the briefing included (l-r) Scott Windley, Hans Van Winkle, and Board Chair Nancy Starnes.
On July 26, the Access Board conducted a public briefing on its proposed accessibility guidelines for public rights-of-way which were recently published for comment. Provided here is a summary of the event and Board responses to questions posed by attendees.
Nancy Starnes, Chair of the Board welcomed members of the public and the press, and introduced Board presenters. She also recognized two former Board staff members, Dennis Cannon and Lois Thibault, who were long active in this rulemaking.
Access Board member Hans Van Winkle outlined the history of this rulemaking. Requirements of the Board's proposal stem from recommendations developed by the Board's Public Rights-of-Way Access Advisory Committee. The proposed guidelines also incorporate public feedback received in response to earlier drafts released in 2002 and 2005 and will be finalized based on the input received during this official comment period.
Information was also provided on options for submitting comments, including at two public hearings the Board will hold in Dallas and Washington, DC during the 120-day comment period. (An overview of the rule is also available on the Board's website).
Following the briefing, the Board invited questions from the audience which included transportation engineers and consultants, officials from public works/ transportation departments, accessibility compliance officers, representatives from advocacy organizations and others. Questions addressed a range of topics, including the scope of the guidelines, pedestrian access routes, on-street parking, detectable warnings, and research. They are summarized here along with the Board's responses to them.
What is the name or reference for these requirements?
The Board commonly refers to the requirements of this rulemaking as the "Public Rights-of-Way Accessibility Guidelines" (or PROWAG). However, the official title of the current proposal is "Proposed Accessibility Guidelines for Pedestrian Facilities in the Public Right-of-Way."
Will the guidelines apply to private property open to the public?
As proposed, the guidelines would apply only to public land or property. The guidelines define the type of public rights-of-way covered as "public land or property, usually in interconnected corridors, that is acquired for or dedicated to transportation purposes."
If an alteration project is limited to one area, such as a single corner of an intersection, must the project be expanded to address all corners of the intersection?
The guidelines are intended to apply primarily within the planned scope of a project. Some aspects of compliance may expand the project, but not necessarily to all portions of an intersection where discreet projects are limited to only one portion. The guidelines do not address unaltered portions of existing public rights-of-way. Other obligations regulated by the Department of Transportation and the Department of Justice may require retrofits or access improvements at existing public rights-of-way, including those not undergoing any alterations.
Do the guidelines address optimum or desired results above the specified minimum?
No. This rulemaking, consistent with the Board's authority, sets minimum guidelines and design requirements. Best practice recommendations may be offered in supplementary, non-mandatory guidance provided by the Board.
What degree of compliance is expected or required at this time for work occurring now?
Current public rights-of-way projects must incorporate accessibility but are not required to meet the provisions of the proposed guidelines. Compliance with the requirements of this rulemaking will not be mandatory until the guidelines are finalized and implemented as standards (and will apply only to those projects occurring after the effective date). In the interim, guidance and resources on accessible rights-of-way design are available from the Board and its website. The Board also routinely provides technical assistance and training on this subject to the public upon request.
What is the basis for the minimum width (4') of pedestrian access routes?
The proposed 4' minimum width provides additional space for maneuvering, sway, and leeway which is considered important in this environment due to potential hazards such as nearby curb drop-offs and vehicular traffic. It exceeds the 3' minimum width generally specified for accessible routes in the Board's guidelines for buildings and facilities, but is less than the 5' minimum recommended by the Board's Public Rights-of-Way Accessibility Advisory Committee. It is also consistent with some industry sources, such as the American Association of State Highway and Transportation Officials (AASHTO) Green Book, a leading reference on highway geometric design. The guidelines include a requirement for wheelchair passing space 5' by 5' minimum at intervals of 200' maximum.
Will the guidelines permit utility poles in public rights-of-way?
Yes, but utility poles and other elements cannot obstruct pedestrian access routes. In alterations, some allowances may be permissible where certain existing constraints make full compliance effectively impracticable.
Will the Board address surface roughness?
The proposed guidelines include requirements for changes in elevation and openings in accessible surfaces, but they do not specify overall smoothness. The Board is aware of concerns about surface roughness and impacts on people who use wheeled mobility aids and is currently sponsoring research on this issue that may help inform a "roughness index" (in a manner similar to that for roadways and vehicle traffic). This project is underway and subject testing is to begin in the fall.
Will the results of this research be made available for comment?
As is the case for all Board research, the Board will make the results public. Any supplementary provisions to the guidelines, including any deriving from this research, would be made available for public comment.
Can stamped asphalt/ concrete be used to provide compliant surfaces?
Various materials and construction methods would be permitted by the guidelines so long as they meet the applicable specifications, including those for changes in level and surface openings. The Board's research project on surface smoothness may provide further guidance on this subject.
Do the proposed guidelines address or impact local parking policies governing use of accessible spaces such as time limits or parking rates?
The proposed guidelines, consistent with the Board's rulemaking authority, only address the design features of accessible parking spaces. The Department of Transportation and the Department of Justice have purview over matters outside design and construction, including jurisdictional policies and practices governing public parking.
Will the visibility of parking meter or pay station visual displays be addressed or pay-by-phone access for people who are hard of hearing?
The guidelines do not address these topics. The Board is addressing access to various types of self-service machines and interactive transaction machines in separate rulemaking as part of its update of requirements for information and communication technologies.
How is the minimum number of accessible parking spaces addressed?
The guidelines specify a minimum number based on the total number along a block perimeter (the amount of spaces provided on all four sides of a typical block).
Would all intersections be required to have accessible pedestrian signals?
No. Only those intersections equipped with pedestrian signals are required to meet referenced criteria for accessible pedestrian signals. Intersections with vehicle traffic signals only or no signals would not be subject to this requirement (except for certain multi-lane roundabouts and channelized turn lanes).
How do accessible pedestrian signals address access for people with low vision or who are deaf-blind?
Accessible signals have a discreet audible tone for locating push buttons and vibrotactile indicators of walk cycles.
Are other access solutions for navigating roundabouts by people with vision impairments to be recognized or considered in this rulemaking?
The proposed guidelines require pedestrian-activated signals at roundabouts with multiple traffic lanes that accommodate pedestrian traffic (and also to multi-lane channelized turn lanes). As written, the guidelines allow different means of providing these types of signals. Alternative methods might be possible if they provide an equivalent level of accessibility. The guidelines also require tactile barriers or warnings along portions of sidewalks flush against the curb where pedestrian crossing is not intended.
Is research that informs the Board's proposed rule available to the public?
The results of research sponsored by the Board, including projects on detectable warnings, accessible pedestrian signals, and roundabouts, are available on the Board's website. The Board also helps coordinate and promote research through the Transportation Research Board (TRB) and its National Cooperative Highway Research Program (NCHRP). Research conducted through this program is available on TRB's website.
Is a minimum level of color contrast between detectable warning areas and surrounding areas specified?
The proposed guidelines only require a light-on-dark or dark-on-light contrast between these areas. Specifying quantitative values for the degree of contrast poses compliance and enforcement issues since measuring the degree of contrast is impacted by ambient conditions.
Can borders around detectable warning areas be used to provide contrast?
Research sponsored by the Board indicates the effectiveness of various types of color contrasts often found in this environment. A report from this project, which also tested some border color designs, is available on the Board's website.
How are such warnings detected by people who are color blind?
Specifications for detectable warnings require a distinct raised texture that is detectable underfoot as well as by cane.
Will sidewalks be required to serve accessible bus stops in areas where no sidewalks are provided?
The proposed guidelines do not require that sidewalks be constructed where none is planned. However, connecting bus stops to pedestrian networks either by design and construction or location selection ensures greater usability.
| 2019-04-20T15:09:35 |
https://www.access-board.gov/news/1499-board-holds-briefing-on-proposed-rights-of-way-guidelines
|
0.999976 |
The Code came into effect at the end of 2017 and it was drafted with a considerable amount of care but there remains much potential for discord between the competing interests of landowners and operators. It seems inevitable, therefore, that any lacuna in the drafting will become a potential battleground.
The Code has seen a seismic shift in the way that landowners are compensated financially for allowing operators to install apparatus on their land. Whilst the valuation provisions in the Code are yet to receive judicial scrutiny, it is generally accepted that 'rents' under it will be significantly lower than those granted under its predecessor.
As a result, many landowners have scrutinised the Code for anything that they could use to prevent operators from installing apparatus in the first place. An apparent lacuna is that the Code does not expressly grant operators a "Code right" to survey a new site for the purpose of determining its suitability. Until now, the theory went that if you did not allow the operator to undertake such a survey in the first place, it would be unable to determine whether a site was suitable and would therefore have to look elsewhere.
The University of London was approached by CTIL (a joint-venture between Telefonica and Vodafone), requesting permission to survey the rooftop of one of the University's building, in order to assess whether CTIL wished to install a new mast on it. The University did not want to have a new mast installed and so refused to grant CTIL's access request.
can an operator apply for an 'interim' Code agreement without it being a precursor to the grant of a full Code agreement?
In a lengthy judgment, the Tribunal has answered both questions in the affirmative.
Right for access to undertake surveys?
"to carry out any works on the land for or in connection with the installation of apparatus on, under, or over the land or elsewhere" - paragraph 3(d).
However, nowhere within paragraph 3 does it expressly state that operators can be granted the right to access for the purpose of surveying land, in order to assess its suitability.
While the Tribunal noted the absence of any express right, it also considered that the "rights" were drafted using very broad language. It held that preparatory surveys and the right of access to carry them out do fall within the ordinary meaning of the words "right to install" and therefore can legitimately be granted as part of the menu of Code rights.
In coming to this conclusion, the Tribunal was also influenced by the public policy decision behind the Code; namely to enable the fast and cost-effective roll-out of new electronic communications services. It noted that it would be entirely contrary to this policy if landowners could simply refuse access to operators and/or hold them to ransom by seeking to negotiate enhanced financial payments for the grant of access.
When can interim rights be sought?
Paragraph 26 of the Code enables an operator to apply to the Tribunal for the grant of new Code rights over a piece of land for a specified period of time after which the rights will automatically terminate.
that the public benefit likely to result from the making of the order outweighs the prejudice to the landowner.
However paragraph 26 also states that the Tribunal need not carry out a detailed consideration of these tests. In an application for interim rights it only needs to be convinced that the operator has a "good arguable case" for satisfying them.
The University argued that CTIL could only apply for an interim agreement under paragraph 26 of the Code, as a precursor to a full application for the installation of apparatus and the grant of a full Code agreement. Its concern was that otherwise operators could seek long-term 'interim' agreements, simply on the basis of a "good arguable case" and avoid the full scrutiny of the Tribunal. It argued that CTIL's stand-alone application for the grant of a limited right of access to the University's building could therefore not be granted by the Tribunal.
The Tribunal undertook a detailed analysis of the wording of paragraph 26 and was satisfied that there was no express or implied obligation to link an application for interim rights to a full application.
It also noted that the Tribunal has a discretion whether or not to grant interim Code rights and confirmed that if there were any factors that indicated that the operator was attempting an abuse of process, these would be taken into consideration when exercising that discretion.
Finally it referred again to the policy underlying the Code: to give greater weight to the public interest in the roll out of new electronic communications networks, rather than to the public interest in the preservation of private property rights. Accordingly it held that there was nothing to prevent CTIL from making a standalone interim application.
In light of the decision on the extent of its jurisdiction, the Tribunal then had to consider whether to grant the right sought by CTIL and in doing so emphasised that the evidential burden will still rest on operators when making such applications.
the prejudice caused to the University of having a few individuals accessing the rooftop and undertaking non-intrusive surveys was likely to be small and was outweighed by the potential public benefit of improving a poor signal strength.
The Tribunal therefore ordered that CTIL be entitled to access the university's rooftop for the purpose of surveying its suitability for the installation of new apparatus.
This is a landmark case both as the first substantive judgment to have been given under the Code and because of its likely impact.
Access for the purpose of carrying out initial surveys is not an automatic right. But where an operator is simply requiring a right of access for the purpose of carrying out non-intrusive surveys and can provide some evidence to support its request, it appears that the Tribunal will be willing to exercise its discretion in favour of operators.
Landowners will understandably grumble that they have lost one of their main trump cards in their fight to prevent Code agreements being imposed on them. For operators though, this judgment will be seen as a vindication of the new Code world that they lobbied hard for and something which is entirely necessary to enable the continued development of electronic communications networks ahead of UK plc's roll-out of 5G services from 2020.
Albeit this is a decision of the Upper Tribunal (Lands Chamber) in England and Wales, the Code applies across England, Wales and Scotland.
| 2019-04-26T10:02:11 |
https://www.lexology.com/library/detail.aspx?g=a598b85b-2fa8-487a-84f8-d935e4c5cdc8
|
0.9998 |
Two weeks of exposure therapy relieved soldiers' symptoms of PTSD just as well as eight weeks did.
If you were experiencing flashbacks and severe anxiety, wouldn't you prefer a treatment that worked in two weeks rather than eight weeks if both were equally effective? People with post-traumatic stress disorder (PTSD) may soon have that choice, based on the results of a five-year study that found that the relief provided by just two weeks of prolonged exposure therapy (PE) was as good as the same therapy parceled out over eight weeks. Both treatments consisted of 10 therapy sessions.
Prolonged exposure therapy asks people with PTSD to confront their traumatic experiences not avoid them. There had been concern that the 10 longer, daily PE sessions would be too emotionally taxing for patients. That proved not to be true in this study.
Traumatic experiences leave a long shadow, but why take eight weeks of therapy if two weeks will work just as well?
Over 350 active-duty military personnel who had been diagnosed with PTSD took part in the study. The participants were divided into three groups: 110 received the two-week PE treatment; 110 received the eight-week PE treatment; 110 received eight weeks of a different treatment called Present-Centered Therapy (PCT), which does not rely on having people confront their traumatic experiences, but instead focuses on the present, particularly on daily stresses; finally, 40 received four 10-15 minute weekly telephone calls from therapists. This last group acted as controls.
The severity of each soldier's PTSD was measured before treatment and at two weeks, 12 weeks and six months after treatment.
Two-week PE treatment was found to be as effective at reducing the severity of PTSD symptoms as the eight-week course. Interestingly, Present-Centered Therapy treatment showed the same degree of effectiveness, suggesting that PTSD treatment does not have to be one-size fits all and offering an alternative for people who do not respond well to PE treatment.
Unfortunately, the treatments were hardly a cure. As an editorial accompanying the study points out, six months after treatment, over 60 percent of the PE- and PCT-treated people still met the criteria for a diagnosis of PTSD. While any relief of symptoms is likely welcome, the study underscores a continuing need for more effective treatments. Traumatic experiences leave a long shadow, but why take eight weeks of therapy if two weeks will work just as well?
All the participants in this study were military personnel, but there's no reason to expect that its results won't also hold true for victims of sexual assault and other types of abuse, accidents or disasters.
The study appears in JAMA and is freely available.
| 2019-04-22T09:59:58 |
http://www.thedoctorwillseeyounow.com/content/stress/art5502.html
|
0.999969 |
Anyone have luck with exporting dashboard home pages to .pdf's that are readable and consumable by an executive audience?
Looking to be able to export dashboards in a printer and presentation (ie. power point) friendly way that is legible versus the tiny print that I currently getting.
Dashboards seem to be a great way to collect up relevant data for a particular audience. However, some readers still prefer a PDF view email, that they can print rather than review online.
I have found a work around, use the print option on the dashboard you want to generate a report from. Then use the zoom feature on your browser to increase to 140% or 150% zoom. This will re-size the view you see of the dashboard in print preview mode, and you can then print to PDF.
It works,... but to be honest there really should be a simpler way where the user can select 'create pdf' and this all happens automatically, including sizing as needed to avoid font size < 12 (well this could be up to the user to specify).
Ideally the PDF would then retain hyperlink capabilities. I would use this to have a link to the dashboard - therefore hopefully converting the readers overtime to using the dashboard live, once they understand that is a better way to see the information.
Anyone aware of a solution yet? I am looking for the same feature.
| 2019-04-18T14:37:59 |
https://community.quickbase.com/quickbase/topics/anyone-have-luck-with-exporting-dashboard-home-pages-to-pdfs-that-are-readable-and-consumable-by-an-executive-audience
|
0.998885 |
How do you help a child cope with the loss of her best friend?
Vivi and Charlotte have been inseparable for years. They spend hours playing together, sharing secrets, and planning sleep overs and dance parties. Charlotte, who is two and a half years older, proudly proclaimed that she and Vivi are like sisters because they "have blue eyes and almost exactly the same hair except that Vivi's is curly and brown and [hers] is straight and blonde." Vivi says they are sisters because Charlotte saw her when she "was just three days old." They love each other and that affection is frequently expressed in love notes Vivi draws for Charlotte and the way Charlotte looks after Vivi on the school bus.
This is my daughter's first love affair and it is ending. Charlotte is moving... to New Zealand.
I adore Charlotte and her family. I feel like I am a better mother because Charlotte's mother sets such a great example for me. It is a loss for all of us but what brings me to tears is seeing how painful this move is for my kid. I know we should count our blessings (Skype and email) but that is a small consolation to a six-year old whose whole world revolves around Charlotte.
As parents, we've given Vivi and Charlotte as much as we can in these final days. (Bedtimes? Forget it. Sleep-overs two school nights in a row? Of course.) We all know it is a consolation and a small one at that.
So today, as the moving trucks pull up next door and Vivi graduates kindergarten, I am thinking about the passage of time-- how I never would have envisioned this friendship when little Charlotte toddled over with her mother to see "the new baby" or how having a good friend and neighbor can change your life.
"Mama, I will hold this in my heart forever."
That is heartbreaking just to read. I'm so sorry to hear that your family - and especially Vivi - will be losing such dear friends. I'm sure it seems like very small consolation, if any, but what a treasure that the girls have had such an amazing relationship to start their lives.
I know this really won't help, while Vivi is going through it, but the memory of it will fade and the excitement of whoever moves in will 'move in' faster than you can believe... hang in there mama.
This made me tear up...for two little girls I don't even know.
We said goodbye to a family we were very close to 6 years ago. They packed up and moved to Idaho. Their kids and our kids were like siblings, and the mom was my main support when our babies were tiny. It's a big deal, isn't it? They remain near and dear to our hearts, and even if we don't talk that often, facebook, email and the rest really do help.
Lovely picture of them! Hugs to all of you.
| 2019-04-20T02:29:04 |
http://mamamamaquitecontrary.blogspot.com/2012/06/broken-heart.html
|
0.99998 |
Why do I like writing this way?
Why does anyone like writing this way?
This might be a little bit of a cheat, but I have a leather pen case which I bought from China through eBay, and so I felt that this allowed me to add this show to the 'What's in my ...' series.
So, I'll come clean and admit that I'm a fountain pen geek. Actually, it's worse than that: I've also been an enthusiast of pens and stationery in general for all of my life. It seems to run in families, because my son is a pen enthusiast, so is my daughter (to a lesser extent) and so was my father before me. With this in mind I thought I'd talk about fountain pens on HPR in case there are any other Fountain Pen Geeks out there.
When I was at school, at about age 7 or 8, in the mid 1950's we were taught to write with ink pens, having previously been using pencils. The school provided a good supply of dip pens, nibs, ink and blotting paper. The pens were quite primitive, just a wooden shaft with a nib holder into which a nib could be inserted. The nib was a scratchy thing, which needed some care or it dug into the paper. We were each allocated a sheet of blotting paper too. Each desk had a hole in it for an inkwell, into which fitted a white ceramic open-topped inkwell. Most of the desks had a slider which covered over the inkwell to stop it drying out. The designated Ink Monitor got to fill them each week out of a large stone bottle. The colour of the ink was always blue-black.
We were taught to write in the cursive style following the teachings of Marion Richardson. I guess this taught us good writing habits, though it didn't feel like that at the time.
Later, at High School, it was expected that we'd write either with a ballpoint pen, or (preferably) with a fountain pen. Fountain pens were fairly cool in those days, and quite a lot of people had them.
I think the ritual of buying or being bought a fountain pen was a sort of rite of passage during the transition to High School. I remember that there was much comparison of pens and degrees of rivalry over these pens in the school at that time.
I guess this history made me like writing with a fountain pen.
My experiences are not unique (of course). Many of my contemporaries and people older than myself who have been through the UK school system tend to be fountain pen users.
I have also found that many people I have encountered in the worlds of science and engineering are keen fountain pen users.
There are many nib styles, so finding one that suits your writing can give you a good writing experience, even though the hunt for that perfect combination can take a while.
Using a fountain pen can be more economical. There are many good basic fountain pens out there, with many nib types for very reasonable prices. There are also many inks available, so once you have found the combination you like you can continue using them very cheaply for a long time.
There is a certain novelty value in using one! There are signs of a resurgence of interest in fountain pens ("Return of the fountain pen").
If you are not acquainted with the details of fountain pens I thought some explanation of a few terms might be helpful.
A pen with a nib and an ink reservoir. The reservoir is usually refillable, though some disposable pens exist.
The writing part of the pen. Usually metal of various sorts. They come with different tip sizes varying from extra fine, to broad. There is a variety of tip shapes too.
A part of the pen nib. Usually a fountain pen nib has two tines by virtue of the fact that there is a split down the centre. This helps the ink flow to the end of the nib.
The long part of the main body of the pen which houses the ink reservoir.
The part under the nib which connects to the ink reservoir. This delivers ink to the nib through one or more channels by gravity and capillary action.
The part of the pen into which the nib and the feed fit, and which is usually gripped when writing.
Refers to the cap being removed from the nib end and placed on the end of the barrel. Sometimes necessary to balance a pen, but some writers prefer un-posted pens.
An interchangeable ink reservoir which is normally thrown away when it is empty. There are two main international standard sizes but some pen manufacturers use their own designs. Some people re-fill their cartridges with a blunt hypodermic.
The reservoir of the pen is filled with a piston mechanism which draws ink up through the nib. The mechanism is usually operated by turning a knob connected to a plunger, though some use a simpler push-pull action. The piston mechanism is usually an integral part of the pen.
A device used to convert a cartridge pen into a refillable pen. Converters usually contain piston filling mechanisms, either threaded or simpler push/pull devices.
A pen which is transparent, so its inner mechanism can be seen. These were originally just intended for salespeople to demonstrate the inner workings of the pens they were selling but the design caught on and is now quite popular.
Compared to some collectors I have very few fountain pens. I currently have 19 usable pens, of which I use maybe 6 on a regular basis. I'll talk about my top 6 in this episode.
My style of writing seems to suit a fine nib, so I have tended to buy nibs classed as "Fine" or "Extra Fine". Pens which originate in Japan tend to have finer nibs than European pens, so a "Medium" Japanese nib is very similar to a European "Fine".
This model is also listed as the "Pelikan Tradition M215 Black/Silver Lozenge Fountain Pen" (see website). Mine was given to me as a Christmas present in 2012.
The one I have has an extra fine nib, and writes beautifully. The nib is very smooth and ink flow is superb. The pen has a metal body and cap. Note how the clip has the look of a Pelican's bill; this is a distinctive feature of this brand.
This is a fairly small pen, but that suits my writing style. It has a piston filling action with a knob at the end of the barrel. There is a small viewing window in the barrel through which you can see the amount of ink it currently contains.
Pelikan is a German company which makes a large range of pens. The top end of their range can be rather expensive, however.
This one is a quite a new model which I bought for myself in July 2015. It is currently the lowest price model offered by TWSBI, at around £30.
This pen is available in white or black. Mine is the black model with the "Extra Fine" nib.
The pen is a "Demonstrator" as explained above, and is made of acrylic resin. It is filled by a piston action. The piston is operated by a knob at the end of the barrel. One particular feature is that the entire pen can be disassembled for cleaning and maintenance; there is a plastic spanner provided with it to help with this as well some silicon grease for lubricating the piston.
The pen writes really well. It is very slightly scratchy, possibly due to my choice of the finest nib, but it is an excellent pen to use.
The TWSBI company is based in Taiwan.
I have bought two Noodler's brand pens, and I like this one the best. It is an inexpensive pen made of transparent blue resin. The colour is apparently called "Hudson Bay Fathom". The resin material used for the pen has a slightly odd smell. There are other acrylic pens in the Konrad range but they are about twice the price. This one was around £17.
It has a medium-fine steel nib of an interesting design. Notice the split between the two tines extends a long way down the nib. This nib is described as a flex nib. That is, the width of the lines it produces varies with the amount of pressure applied to the paper. This feature can be good for producing calligraphic effects, though I do not use this capability myself. It is a smooth and pleasant nib to use nevertheless.
The pen is filled by a piston mechanism. It is necessary to unscrew a small cap from the end of the barrel to operate the knurled knob that moves the piston.
Noodler's pens are made by the Noodler's Ink company in the USA. They are unusual and slightly quirky. I really like them and the Konrad writes well.
This pen was a birthday present I received from my son in 2012. It's a small pen with what I assume is a fine nib - there is no indication on the nib itself. It has a piston filling mechanism with a knob which operates it at the end of the barrel. There is an ink viewing window in the barrel.
This model Reform pen is a small light pen in green and black with a copper-coloured clip.
These pens were originally manufactured in Germany in the 1930's and 1940's and became very popular, especially with school children. At one time they were reported to be the best selling pens in the world, and manufacturing continued into the 1970's.
This model of pen is still available at quite low cost, though the quality of the nib is very variable. I have bought two more of these on eBay (around £12 each) to give as presents and found I needed to learn how to tune the nibs to give a good writing experience.
I bought this pen from Amazon in July 2015 as an experiment to see what it was like. I had heard good things about it from various sources including fountain pen users on GnuSocial. Apparently it (or a version very like this European one) is sold as the Metropolitan in the USA.
The pen I bought has a medium nib as indicated by the 'M' on it, but as mentioned elsewhere, this equates to "fine" in Europe since Pilot is a Japanese manufacturer.
This is a cartridge pen, and it takes Pilot branded cartridges and international sized cartridges. I believe that the Pilot CON-50 converter can be used, but I do not have one at the moment. I found that the Waterman brand cartridge fits this pen, and this contains a larger amount of ink than the other options.
It's a great pen and a good writer with a smooth and pleasant nib. For the price of around £15 it is excellent value for money, and is easily obtained.
The Pilot Corporation is a Japanese pen manufacturer based in Tokyo, Japan.
This was another recent purchase in August 2015. I noticed that these manufacturers, J. Herbin, who are usually known for their inks, were selling a fountain pen and a ballpoint pen. The ballpoint is refillable with fountain pen ink.
I actually bought the ballpoint for my daughter, but she didn't like it. My son was keen to have it however and uses it often, he tells me.
This pen is very small, measuring only 10cm (4 inches) uncapped. It needs to be used posted I find, to make it a reasonable size. It has a fine nib and the body is transparent. It cost around £8 and the transparent rollerball was £5.
It takes international small cartridges, but I have managed to find a converter for it, though I haven't used it yet. The converter is made by Monteverde and is called the Mini Ink Converter.
The pen is very pleasant to use and writes well. I bought J. Herbin ink cartridges to use with it, and tried out a reddish colour called Terre de feu.
J. Herbin is a French company which sells inks, pens and other writing materials.
As I mentioned earlier, I bought a case for my pens. It was found on eBay and originated in China so it's not anything much. It's useful if I want to transport several pens at a time, but I don't keep my pens in it.
I would like to find a better storage device, such as a better quality case or perhaps a wooden box. However, having a pen case at least allowed me to make up a title for this show!
Pilot VPen or V4. This is a Japanese disposable pen with a medium sized steel nib. It is available in multiple colours and has a large ink capacity. In the UK it costs around £4. In the United States (and other countries) it is known as the Varsity. I have one of these and find it to be excellent.
Platinum Preppy. This Japanese pen is made of clear polycarbonate. It is refillable with a proprietary cartridge, and several colours are available. An adaptor is available to allow it to use international standard small cartridges. It comes in three nib sizes: medium, fine and extra fine. In the UK this pen costs around £3. I have not yet tried this particular model.
J. Herbin Transparent Fountain Pen. This is another clear pen which takes international small cartridges or a converter, as discussed earlier. The cost is around £8 in the UK.
Pilot MR or Metropolitan. As already discussed. Around $15 in the US.
These are two subjects which are very much related to the use of fountain pens. I will not go into detail here, but the choice of paper and ink can be important to improve your writing experience.
Choosing a good quality paper suitable for use with a fountain pen means that the pen will write smoothly, and the ink will not sink into the paper causing what is known as feathering. This is where the ink soaks into the fibres of the paper making the writing fuzzy and indistinct. Also, good quality paper can be written on both sides because the ink does not soak through, and the writing is not visible from the reverse side because the paper is thick enough. I like to use at least an 80gsm paper (gsm is grams per square metre, a measure of paper density).
In the case of inks, there are huge numbers to choose from, with a vast range of colours. It is important to choose inks specifically designed for a fountain pen; there are inks designed for dip pens which will clog a fountain pen. A good basic ink made by a company such as Parker or Waterman is a good choice for people starting to use a fountain pen. There is a large market in fountain pen inks, some of which can be expensive.
| 2019-04-23T16:51:59 |
http://hackerpublicradio.org/eps/hpr1941/full_shownotes.html
|
0.999971 |
El vuelo más barato de Cancún a Los Ángeles se encontró con un promedio de 41 días de antelación a la fecha de salida.
¿Cuánto tiempo dura un vuelo de Cancún a Los Ángeles?
Un vuelo directo tarda un promedio de 5h 05m en cubrir una distancia de 3407 km.
¿Cuántos vuelos hay entre Cancún y Los Ángeles?
Hay 98 vuelos directos a la semana entre Cancún y Los Ángeles, con un promedio de 13 al día.
¿Cuáles aerolíneas ofrecen los vuelos más baratos de Cancún a Los Ángeles?
En los últimos 3 días, encontramos los vuelos de ida y vuelta más baratos en Interjet ($3898), United Airlines ($6177) y Volaris ($6912).
¿Cuáles aerolíneas vuelan con más frecuencia entre Cancún y Los Ángeles?
Las aerolíneas con más frecuencia de vuelos para esta ruta son: Delta (2 vuelos al día), Korean Air (2 vuelos al día), Interjet (2 vuelos al día).
¿Cuál es el día más barato para volar de Cancún a Los Ángeles?
En el itinerario Cancún - Los Ángeles, el viernes es el día más barato para volar y martes el más caro. En la ruta de vuelta, de Los Ángeles a Cancún, los precios más bajos se encuentran generalmente el lunes y los más altos el miércoles.
¿Qué aeropuertos utilizaré cuando vuele desde Cancún a Los Ángeles?
Cuando vueles desde Cancún, saldrás de Cancún, también conocido como Aeropuerto de Cancún. Aterrizarás en Los Ángeles, también conocido como Aeropuerto de Los Ángeles.
Desventajas: The boarding took a long time.
Ventajas: I liked the timeliness of the flight. we arrived faster than expected.
Desventajas: there was an open seat next to my boyfriend and i, we thought we would have a little extra space on the flight since the seat wasn't taken. but the flight attended moves a passenger next to us without notifying us prior or even asking if it's okay, or ask that we scoot down so that we can at least have the window seat. would've been nice to have the window to lean on.. we felt like she could have said something to us. she was very rude.
Desventajas: No food or tv offered.
Ventajas: Crew did not offer beverages for 2 1/2 hours into the trip and when I got up to see if I can get water they were nowhere to be found. They were upfront inside with the pilots. They never walked around to see if people had seatbelts on or if seats were not incluned before takeoff or landing Also there was no entertainment at all!! Also not even a place to charge phones. Felt terribly cheated for the price I paid. Certainlt Not a low fair price for a low fair airline. Then we went in circles for 20 min before landing and the captain never even mentioned it.!!! We landed 20 min late There was also not enogh cups out to get our own water if we wanted and the bittle that was there was empty an No flight attendant to check on that!!! Weirdest flught ever. Felt like we were alone w no crew around even walkung down the aisle once to check on us!! Will definately not fly interjet again!!
Ventajas: The experience was good. Flight was comfortable, attendants were friendly.
Desventajas: Lack of food and entertainment options.
Ventajas: It was a wonderful experience. I will fly again on Interjet!
Desventajas: Delayed flight. Seats felt worn out. It was hot on the plane.
Desventajas: Despite passing through tsa, crew decided to search every crevice of my carryon at the gate, in front of all other passengers. Even my packet of tampons was opened and they thoroughly inspected each one. Whatever weapon might fit in a tampon can't be more dangerous than a pencil and dental floss... In flight food was soggy ham sandwhiches. I asked if they have vegetarian, but the said they didn't and passed right by me...no drinks, no chips, no remorse. I went up to them to request some chips like the other passengers received. There, I saw some cheese sandwich options. Despite most of the passengers being American, the emergency instructions and other communication weren't bilingual.
Ventajas: The price and non-stop flights were a plus. The crew was very pleasant.
Desventajas: No entertainment at all. No wifi. Variety of food and drink is very limited. The plane to Cancun was very aged.
Ventajas: A full refund !!!!!!!!! After i had to buy another flight !!!!!!!
Desventajas: Your site sent me two recidpts to change my flight no confirmation!!!! Called customer care did nothing !!!!!!!!
Busca vuelos a Los Ángeles en KAYAK. Encuentra vuelos baratos a Cancún desde Los Ángeles. KAYAK busca en cientos de webs de viajes y te ayuda a encontrar vuelos baratos y a reservar el que más te convenga.
| 2019-04-22T10:27:53 |
https://www.kayak.com.mx/vuelos/Cancun-CUN/Los-Angeles-LAX
|
0.999997 |
What's calf roping? What's wrong with it?
A basic description: During calf roping, running at speeds of up to 27 miles per hour, terrified calves are chased by a "cowboy" around a pen, hundreds of people from the "audience" jeering and laughing. Once she is tackled by the cowboy, he picks her up, throws her to the ground, binds her legs roughly with a piece of ropes, picks her up again, and then body slams her into the dirt. Mud in her eyes partially blocks her view of the audience, now roaring with cheers and laughter.
The calves may suffer paralysis, throat and neck injuries, and broken bones. Many die. Calves have become paralyzed from severe spinal cord injury, and their tracheas have been totally or partially severed.
| 2019-04-23T18:17:28 |
http://gparc1.tripod.com/grandeprairieanimalrightscrew/id32.html
|
0.999999 |
What is the most important information I should know about lopinavir and ritonavir?
Lopinavir and ritonavir can cause a serious heart problem. Call your doctor at once if you have fast or pounding heartbeats, fluttering in your chest, shortness of breath, and sudden dizziness (like you might pass out).
Tell your doctor if you have signs of liver or pancreas problems: loss of appetite, upper stomach pain (that may spread to your back), nausea or vomiting, itching, dark urine, clay-colored stools, jaundice (yellowing of the skin or eyes).
What is lopinavir and ritonavir?
Lopinavir and ritonavir is a combination antiviral medicine used to treat human immunodeficiency virus (HIV), the virus that can cause acquired immunodeficiency syndrome (AIDS). This medicine is not a cure for HIV or AIDS.
Lopinavir and ritonavir is for use in adults and children who are at least 14 days old.
Lopinavir and ritonavir may also be used for purposes not listed in this medication guide.
What should I discuss with my healthcare provider before taking lopinavir and ritonavir?
You should not use this medicine if you have ever had a severe allergic reaction to lopinavir or ritonavir.
an ergot medicine (ergotamine, dihydroergotamine, methylergonovine).
a bleeding disorder such as hemophilia.
Lopinavir and ritonavir oral solution (liquid) contains alcohol and propylene glycol. Do not use the liquid form of this medicine if you become pregnant.
Lopinavir and ritonavir can make birth control pills less effective. Ask your doctor about using a non-hormonal birth control (condom, diaphragm with spermicide) to prevent pregnancy.
How should I take lopinavir and ritonavir?
Lopinavir and ritonavir liquid should be taken with food. Measure liquid medicine carefully. Use the dosing syringe provided, or use a medicine dose-measuring device (not a kitchen spoon).
Ask your doctor before giving lopinavir and ritonavir liquid through a feeding tube.
Lopinavir and ritonavir doses are based on weight in children. Your child's dose needs may change if the child gains or loses weight.
Store lopinavir and ritonavir liquid in the refrigerator or at room temperature.
Store the tablets at room temperature, away from heat and moisture. Keep the pills in their original container. If you store the liquid at room temperature you must use it within 60 days.
Missing doses may increase the risk of your virus becoming resistant to medication.
Seek emergency medical attention or call the Poison Help line at 1-800-222-1222. An overdose of lopinavir and ritonavir oral liquid could be fatal to a child.
What should I avoid while taking lopinavir and ritonavir?
Lopinavir and ritonavir liquid contains alcohol and propylene glycol. Avoid drinking alcohol while using this medicine.
What are the possible side effects of lopinavir and ritonavir?
signs of liver or pancreas problems --loss of appetite, upper stomach pain (that may spread to your back), nausea or vomiting, itching, dark urine, clay-colored stools, jaundice (yellowing of the skin or eyes).
Lopinavir and ritonavir liquid contains alcohol and propylene glycol, which may cause drowsiness or slow breathing in a baby taking this medicine. Tell your doctor if you notice these symptoms in your baby.
What other drugs will affect lopinavir and ritonavir?
Lopinavir and ritonavir can cause a serious heart problem. Your risk may be higher if you also use certain other medicines for infections, asthma, heart problems, high blood pressure, depression, mental illness, cancer, malaria, or HIV.
Some medicines can make lopinavir and ritonavir less effective when taken at the same time. If you take lopinavir and ritonavir liquid and you also take didanosine (Videx), take the didanosine at least 1 hour before or 2 hours after you take lopinavir and ritonavir liquid.
Many drugs can affect lopinavir and ritonavir, and some drugs should not be used at the same time. Tell your doctor about all your current medicines and any medicine you start or stop using. This includes prescription and over-the-counter medicines, vitamins, and herbal products. Not all possible interactions are listed here.
Your pharmacist can provide more information about lopinavir and ritonavir.
| 2019-04-18T11:18:03 |
https://www.wellspan.org/health-library/Document.aspx?id=d04717a1
|
0.99819 |
The Atkins Advantage Dark Chocolate Royale Shake is 2g net carbs, 15g protein, and 160 calories. How does it stack up against other similar shakes?
First, I normally tend to drink an EAS low carb protein shake each morning, and I like the chocolate fudge flavor. So that would seem to be fairly similar to this Atkins presentation. The EAS shake has 3g carbs, 17g protein, and 110 calories. So while it has slightly more net carbs, it also offers more protein and fewer calories.
Even back when I was first testing out the various shakes, many years ago, I preferred the EAS shake. I find that I still do. The EAS shake is thinner, so it's easier to drink as a casual morning meal. I can toss in ice and bring it with me in a car, as an emergency meal. In comparison, this Atkins shake is thicker, so it's more like drinking a thin milkshake. Some might enjoy that - to me it's just not the thickness I want. Also, it's much darker than my shake, so there's more of a tannic flavor to it. Again, it's clearly personal preference, but I don't want something that "heavy" in the morning.
Then it has 20% of most other normally listed vitmains like Zinc and Niacin. A stand-out bonus is the 50% phosphorous it offers.
So certainly, if you prefer the Atkins shake over the EAS shake, that's great! We all have different taste buds and different textures we enjoy. Either one is a good option for if you're out and about and can't get to a more "real" meal. Also, both are great morning options if you'd normally skip breakfast. It's important to get SOMETHING nutritious into you at the start of the day, since you've been food-less for the 8 or so hours you've been asleep!
But for me, I do prefer the EAS shake for my morning meal.
| 2019-04-20T03:13:09 |
http://www.bellaonline.com/articles/art12027.asp
|
0.999894 |
Market inspector has recently conducted research which has revealed the best places for start-ups in the UK. Of course London receives recognition seeing as it is one of the biggest start-up hubs in Europe and the UK. London accounts for a total of 30.5% of all business growth in Britain, and the capital is a focal point for numerous businesses. However it is hardly the only location suitable for new businesses. And more and more start-ups are deciding to set up shop outside of London.
The ranking is based on a point system including the following categories. The better a cities performs for one criteria, the more points they score.
On the map you can find all of the 30 ranking cities.
1. Leeds: With more than 6000 small to medium size businesses, Leeds is an important start-up hub in the UK. In 2015, 4140 new businesses were created in the city. On top of that, the city was named the second most important centre for fast growing firms in the UK. The city has seen a lot of growth, with a recorded 20% growth in their revenue over the last 3 years.
2. Bristol: With its high wages and moderate property prices, Bristol is a popular choice for start-ups, with over 2600 new businesses establishing themselves in the city in 2015. On top of that, Bristol was also named as Britain’s most sustainable city back in 2008.
3. Reading: Reading houses some of the largest multinational firms UK offices, such as IGN Direct and BG group. The city is also a large retail centre, making it a perfect set up location for new business. Reading is also one of the most important enterprise cities in the Thames valley.
With more than 6000 small to medium size businesses, Leeds is an important start-up hub in the UK. In 2015, 4140 new businesses were created in the city. On top of that, the city was named the second most important centre for fast-growing firms in the UK. The city has seen a lot of growth, with a recorded 20% growth in their revenue over the last 3 years.
With its high wages and moderate property prices, Bristol is a popular choice for start-ups, with over 2600 new businesses establishing themselves in the city in 2015. On top of that, Bristol was also named as Britain’s most sustainable city back in 2008.
Reading houses some of the largest multinational firms UK offices, such as IGN Direct and BG group. The city is also a large retail centre, making it a perfect set up location for new business. Reading is also one of the most important enterprise cities in the Thames valley.
| 2019-04-21T00:30:41 |
https://www.startupsbase.com/best-places-for-start-ups-in-the-uk/
|
0.999999 |
Revealed: just how many members does Labour really have in Scotland?
THE scale of the challenge facing Scottish Labour can be revealed after it emerged the party has one-sixth of the membership of the SNP.
Informed sources said the number of members currently sits at just under 13,500, a figure boosted by nearly 1000 new referendum campaign sign-ups.
Labour helped secure a No vote in September, but the party has been toiling due to the dramatic sequence of events in its aftermath.
Soaring memberships among the pro-independence parties have also confirmed that Scottish politics is in a state of flux.
The SNP tally has shot up from 25,000 to 84,228. The Scottish Socialist Party, which has long been in the political doldrums, has increased its membership from 1500 to 3500. The Scottish Greens had fewer than 2000 members before the referendum, but now have more than 7500.
Labour has consistently declined to confirm its total figure north of the Border, but it is understood nearly 13,500 members will get a vote in the contest to select Lamont's successor.
The party is choosing its leader in Scotland after the resignation of Johann Lamont, through a complex electoral college system which gives one-third of the votes to parliamentarians, one-third to affiliated organisations such as trades unions, and the remainder to party members. The system - which is to be phased out for UK leadership contests - means the vote of one MP or MSP carries the same weight as the votes of around 168 ordinary party members.
Labour's rules for the contest have also been designed to act as a recruitment tool for the party.
The usual six-month qualification rule - under which new recruits must have paid their dues for the specified period of time before being able to vote - has been waived. New members could join as late as Thursday and be eligible to vote.
Party sources believe the gulf in membership between Labour and the SNP will become apparent in the Westminster General Election campaign, when thousands of Nationalist supporters are expected to hit the streets.
MP Jim Murphy, one of the three Labour leadership contenders, wants to increase trades union sign-ups, involve non-party members in local campaigns, and use "reduced rate" initiatives to boost the figures.
A spokesman for Neil Findlay, a second leadership candidate, said he saw the trades union movement as key to future recruitment: "There is an obvious potential pool of support in trades unions and the party needs to focus and reconnect with the trades union movement. The relationship has to be deepened and strengthened."
A spokeswoman for Sarah Boyack, the third candidate for leader, said she wanted to target young workers and first-time voters, as well as targeting No supporters who don't have a natural party of choice.
SNP business convener Derek Mackay MSP said: "The extraordinary growth in SNP membership shows that the people of Scotland trust the SNP to hold the Westminster establishment to account on their vow of substantially more powers for Scotland."
| 2019-04-22T00:06:30 |
https://www.heraldscotland.com/news/13188600.revealed-just-how-many-members-does-labour-really-have-in-scotland/
|
0.997697 |
The native form of this personal name is Vitéz jákfai Gömbös Gyula. This article uses the Western name order.
Gyula Gömbös de Jákfa (26 December 1886 – 6 October 1936) was a Hungarian military officer and politician, and served as Prime Minister of Hungary from 1 October 1932 until his death on 6 October 1936.
Gömbös was born in the Tolna County village of Murga, Hungary, which had a mixed Hungarian and ethnic German population. His father was the village schoolmaster. The family belonged to the Hungarian Evangelical (i. e. Lutheran) Church.
Gömbös entered the Austro-Hungarian Army as a cadet in Pécs and quickly became a member of the officer corps, serving as a captain during World War I. While in the army, Gömbös became a staunch advocate of Hungary's gaining independence from Austria and a bitter critic of the Habsburgs. After World War I ended and Hungary split from Austria, Gömbös joined Conservative Hungarian forces in Szeged that were unwilling to support Communist Béla Kun, who had seized control of Hungary in 1919, forming his own paramilitary group, the Hungarian National Defence Association (Magyar Országos Véderő Egylet, or MOVE). Gömbös became a close ally of Miklós Horthy, the leader of the anti-Communist government in Szeged, and played a leading role in organizing Horthy’s army. For his services, Gömbös was made minister of defense in the Szeged government. After Kun’s government was ousted in August 1919, Gömbös helped direct the purge of Communists from Hungarian society. Gömbös also supported certain political actions against Hungary’s Jews.
Gömbös had been a Smallholder before the war, but veered sharply to the right in the upheaval following the breakup of Austria-Hungary. After Miklós Horthy was made regent of Hungary in 1920, Gömbös became the primary leader of Hungary’s emerging nationalist movement, which was gaining some support from the people in response to the brief period of Communist rule and the signing of the Treaty of Trianon, which resulted in Hungary losing two-thirds of its territory to neighboring nations. Despite some disagreements with Horthy, Gömbös was active in the widespread purge of Hungarian Communists and later organized mass military opposition to the Habsburg pretender Charles IV's plan to regain his throne in 1921, a move which kept Horthy firmly in control of Hungary. Later that year, Gömbös became one of the primary leaders of the opposition to Prime Minister István Bethlen. In 1929, Gömbös was made a major general and appointed Minister of Defense in the Bethlen government by Horthy.
In 1932, Horthy appointed Gömbös prime minister and made him promise not to ask for new elections. Gömbös publicly recanted his previous anti-Semitism when taking office. The Jewish leadership under Stem and Szanto supported the appointment of Gömbös and his programs in exchange for Gömbös promising not to enact any anti-Jewish laws and through his policies not cause economic harm to the Jews, a promise which Gömbös kept.
While prime minister, Gömbös was very active in international politics, seeking support for revising the Treaty of Trianon and trade to revive the disastrous economy. One of his major goals was to align Hungary into an Axis with Italy and Austria. Shortly after becoming prime minister, Gömbös flew to Italy and visited Benito Mussolini. The two came to an accord, and Mussolini gave Gömbös his support for the revision of the Treaty of Trianon. Mussolini also promised Gömbös Italy’s aid if Hungary went to war with Yugoslavia and Romania in an attempt to regain Hungary’s former territory from those nations. Gömbös also formed an alliance with Germany. When Adolf Hitler became Chancellor of Germany in 1933, Gömbös became the first foreign head of government to visit the Nazi leader. Shortly thereafter, Gömbös signed a major trade agreement with Germany which would greatly improve Hungary’s ailing economy as the 1930s progressed. Gömbös eventually decided to align Hungary primarily with Italy and Austria when Hitler made it clear to Gömbös that while he would support Hungary in an effort to regain land from Czechoslovakia, he would not support Hungary against Romania or Yugoslavia. Hitler was also against Gömbös’ plans to expand the size and power of the Hungarian military, while Mussolini supported the idea.
However, Gömbös never lived to see his ambitious plans come to fruition. Gömbös, after a long illness, died of testicular cancer in Munich on 6 October 1936.
Gömbös was buried at Kerepesi Cemetery among exceptional circumstances, his funeral procession was attended by hundreds of thousands of Hungarians, his Catafalque was visited by many dignitaries of his time since he was head of government.
↑ "Magyar Protestáns Panteon - Gömbös Gyula" [Hungarian Protestant Pantheon] (in Hungarian). Retrieved 2014-02-07.
↑ Earlier accounts had kidney failure as the cause of death. See Püski, Levente (2006). A Horthy-rendszer [The Horthy System] (in Hungarian). Budapest: Pannonica. pp. 104–6.
Kürti, László (2006). "Gömbös, Gyula". In Blamires, Cyprian. World fascism: a historical encyclopedia. 1. Santa Barbara, California: ABC-CLIO. pp. 285–286. ISBN 1-57607-940-6.
Wikimedia Commons has media related to Gyula Gömbös.
| 2019-04-22T22:35:12 |
https://ipfs.io/ipfs/QmXoypizjW3WknFiJnKLwHCnL72vedxjQkDDP1mXWo6uco/wiki/Gyula_G%C3%B6mb%C3%B6s.html
|
0.999722 |
E Asus2 Bsus4 Can I help who is next? C G A Twenty-one bucks seems like a small price to pay Other musical accompaniment includes whistlingfinger snapping and beatboxing. Biography[ edit ] Nunes was born into a musical family in New York.
G A7 When did I lay down my defense? E Asus2 Bsus4 Can we get past all the eye rolls and angry sighs? It was released through her own record label, Rude Butler Records. Thank south park cartman nsa hookups for understanding.
October 15, Label: Lastly, the content here is as correct as I can get it.
E Asus2 Bsus4 Anyone know anyone at all? Any corrections may also be messaged to me, but I have done my best to double-check and triple-check everything in here.
Thanks for reading guys, I hope this proves useful guys! C Cmaj9 Am G Tell me this; why do you run away? I'm Not Good 7. On January 3,Nunes began a Kickstarter campaign for her sixth album and reached over twice its goal funding.
A B What is this supposed to be? One grandfather was a composer of Portuguese fado music and the other a jazz pianist. E Ab And tone it down while I'm still in the room? Her original songs have been featured on the main page of YouTube twice, under the username 'jaaaaaaa'.
E Asus2 Bsus4 'Cause if there's a real problem, then why stall?
I've tabbed this out in the manner which Julia performs it; if you prefer to perform it different then that is absolutely fine. Nunes started piano lessons at age seven before switching to the guitar in her teens.
The album was released on iTunes on February 2, through her own record label, Rude Butler Records.
Nunes also updated the Kickstarter project page with a video of her performing "Stay Awake" in the Kickstarter offices thanks to the overwhelming success of her campaign. It was released on November 3, E Ab Are you kidding me?
She started writing songs at age 14 and began playing the ukulele in But, there's often that pesky little mistake that seems to stick out like a sore thumb to everyone else, although I never noticed inputting the data wrongly. E Ab Can you tone it down while I'm still in the room?
Rude Butler Records Format: Her father is a pianist and a composer of children's songs. Still in The Room 9. Nunes started the event on the main stage at noon 11 June and also played alongside Weezer on the second night.
She also plays guitar and melodica. YouTube videos[ edit ] Nunes is known for her videos on YouTube.
Following YouTube success, as of June Nunes arranged a distribution deal for Left Right Wrong with Burnside Distribution Corporation and the album can now be purchased through some mainstream sources. The album features mostly acoustic tracks, although she is joined on a few songs by a full band including Todd Haviland on bass and Dave Harris on drums.
| 2019-04-24T18:24:38 |
http://globicate.com/comatose-lyrics-julia-nunes-dating.php
|
0.998804 |
Oslo - Roy Hodgson made a winning start to his reign as England manager here on Saturday after an Ashley Young goal gave his side a 1-0 victory over Norway at the Ullevaal Stadium.
Hodgson, who only took over as the successor to Fabio Capello earlier this month, saw his experimental England side record their first win over Norway for 32 years in a largely lacklustre encounter.
With only four or five of Saturday's starting England XI likely to feature in their opening Euro 2012 Group D game against France on June 11, Hodgson was given the opportunity to run the rule over several fringe members of his squad.
However despite an encouraging opening spell from striker Andy Carroll and another goal-scoring contribution from Young, there were few major English success stories in a low-key contest.
"It's a great start. I was concerned about fatigue creeping in and some players were feeling their muscles," said Hodgson. "They worked hard in training trying to impress me."
Hodgson was given a potential injury headache however when second half substitute Gareth Barry hobbled off with a groin injury which will require a scan, placing his Euro 2012 participation in doubt.
"I'm not prepared to say it's serious at the moment," Hodgson said.
"All I'm going to say is that it's going to demand our attention and as you all know, we don't have a lot of time if the scan shows that there is something more than minor."
Norway coach Egil Olsen said he was "surprised" to see his team enjoy so much possession and was disappointed they were unable to force a draw.
"It was a bit disappointing from our point of view. With a bit of luck we could have had a draw against them," Olsen said. "I guess we had more possession than England which was a bit surprising."
England had got off to a flying start with Young firing the visitors ahead after only nine minutes following a swift break upfield.
Carroll won the first of several aerial battles of the opening period and released the Manchester United midfielder into space.
Young still had plenty to do but twisted and turned away from the covering Norwegian defence - distracted by England's fast-arriving support - and shot low into the bottom corner past Rune Almenning Jarstein.
England goalkeeper Rob Green - making his first start since his blunder against the United States at the 2010 World Cup - was forced into a nervous save moments later when he tipped Markus Henriksen's shot wide.
Green was given a scare from Morten Gamst Pedersen's subsequent corner, which had the England goalkeeper scrambling before it cannoned off the near post.
England looked comfortable for the remainder of the half, and should have done better with another promising counter attack on 34 minutes when James Milner chose to shoot instead of squaring to the unmarked Carroll.
England captain Steven Gerrard then earned the opprobrium of the home crowd for a rugged and risky challenge on Norway's right back Tom Hogli that forced the defender to withdraw from the contest.
Gerrard was fortunate to escape censure from German referee Michael Weiner but was nevertheless booed relentlessly for the remainder of the half.
That was to be Gerrard's last involvement of the night, with Hodgson replacing his skipper with Gareth Barry at the interval.
England struggled to build any sort of momentum for much of the second half, their only meaningful chance coming from Leighton Baines' 48th-minute low curling free-kick which was saved by Jarstein.
The introduction of Theo Walcott for Scott Parker gave England some badly needed pace down the right flank, but the Arsenal midfielder struggled to impose himself on proceedings.
As England toiled, Norway grew in confidence and Riise raised the home crowd's hopes when he forced Green into a near-post save on 62 minutes.
However the game fizzled out as England emptied their substitutes bench, replacements which saw Alex Oxlade-Chamberlain and Martin Kelly make their senior debuts late on.
| 2019-04-20T00:28:49 |
https://www.sport24.co.za/Soccer/Euro2012/Winning-start-for-Roy-Hodgson-20120527
|
0.999848 |
Who is being killed off?
Holby City has revealed two big death hints in its new trailer, suggesting that Jac Naylor or Essie Harrison could be the unlucky victim.
Rosie Marcel – who plays Jac – recently confirmed that a main character will be killed off in the coming month, leaving fans to speculate over who it could be.
With no further information available at the time being, the show's recent summer trailer has naturally set tongues wagging – with both Jac and Essie facing worrying health battles.
Viewers know that Jac is already facing a bleak future after discovering that her recent gunshot wound will eventually leave her wheelchair bound.
With this in mind, Jac has signed herself up for John Gaskell's potentially life-saving operation that pioneers stem cell research – convinced that it's her only chance of making a full recovery.
Sadly, the trailer suggests that more bleak times are on the way for Jac, while Essie also finds herself having a health scare of her own. Is one of them going to meet their maker?
Speaking to Inside Soap, Rosie said: "They are going to kill off someone fairly soon actually. And that's a main character, so there really is no fear when it comes to doing stuff like that. Who knows what will happen to Jac?"
Other noticeable moments in the trailer include Bernie's return and subsequent reunion with Serena, Lofty popping the question to Dom, and a Casualty crossover when Ethan Hardy makes an appearance.
| 2019-04-20T18:32:38 |
https://www.digitalspy.com/soaps/holby-city/a858889/holby-city-spoilers-trailer-death-hints/
|
0.997389 |
China has announced a $60 billion list of American products targeted for retaliation. "That totally changes the equation".
China has said it's ready to impose retaliatory tariffs on $60 billion of U.S. goods.
Trump initiated the trade war to punish Beijing for what it says are China's predatory tactics to try to supplant USA technological supremacy.
The U.S. and China account for more than a third of Korea's total exports, so this trade spat is a major downside risk to the Korean economy. which already saw its exports slow down from the first quarter's four-point-four percent to zero-point-four percent in the second quarter.
To hedge against the Trump Administration's trade protectionist moves, Seoul has secured an exemption from steel tariffs in exchange for a quota, and agreed on a 25 percent tariff on Korean pickup trucks and a doubling of the import cap on US vehicles. The administration has asserted that Trump's tariffs would force China to trade on more favorable terms with the United States.
Second, Trump and his press secretary, Sarah Huckabee Sanders, were teed off that the op-ed writer chose not to sign the piece. Adds Trump: "We're going to take a look at what he had, what he gave, what he's talking about also where he is right now".
Reynolds starred in many movies including " Deliverance ", " Smokey and the Bandit " and " The Cannonball Run ". Years later, with a mustache gone gray, he suffered from health issues that included open heart surgery.
Fire officials say 10 of the people who arrived sick to New York City on a flight from Dubai have been taken to a hospital. The New York Police Department Counterterrorism Bureau said they were monitoring a "medical situation" at the airport.
'Our concern with these tariffs is that the USA will be hardest hit, and that will result in lower US growth and competitiveness and higher prices for US consumers, ' the company said in a letter to the US government.
If the USA adopted the new trade measures, it would mean the country will have placed tariffs on $517 billion worth of Chinese goods, the entire value of all Chinese imports into the United States. But 2018 Chinese imports through July were up almost 9 percent over the same period of 2017, according to U.S. Census Bureau data.
White House economic adviser Larry Kudlow on Friday left open the possibility of a negotiated solution to the trade dispute, but said China must show it's open to compromise. But David French, top lobbyist for the National Retail Federation, whose members include Amazon.com, BJ's Wholesale Club and Macy's, said almost every consumer good could be affected if Trump follows through on all threatened tariffs.
Mr. Trump claims that China's trade policies are unfair, including the widespread practice of requiring foreign companies operating there to share intellectual property.
'We are still talking with China on a number of issues. 'However, hope springs eternal'.
Brie Larson is Captain Marvel!
The commercial has polarized opinion, with Trump among those critical of Nike for giving Kaepernick a public platform. The quarterback claims NFL team owners conspired to keep him out of the league because of his protests.
The police department said she will be placed on administrative leave while an investigation is completed. She told responding officers that she believed the victim's apartment was her own when she entered it.
Cincinnati Police Chief Eliot Isaac said investigators have not established a motive, but they are confident Perez acted alone. Although people tried to get her attention before she entered the building, she was wearing headphones and did not hear them.
Miller had just been preparing to embark on a USA tour after releasing his most recent album, Swimming , on August 3. His most recent album, Swimming , was posted to online streaming services on 3 August. "It's unusual .
"He's just capitalizing on resentments that politicians have been capitalizing on for years", Obama said . The former president urged Americans to take on issues such as racism, saying progress can be made.
There has been no communication between the US and North Korean government about a possible extradition, the official said. The charges were brought against Park as the Trump administration seeks to improve relations with North Korea.
That win came at the grand stage of Indian Wells, where Williams' two past titles came against Steffi Graf and Kim Clijsters. It's women's semi-finals day at the US Open tonight, and back to preview the match-ups, is our tennis columnist, Dan Weston.
While the low-end model could be a great entry point for price-conscious users, the iPhone XS is sure to be the star of the show. The online retailer also has some decent deals on the iPhone 8 with prices starting from £620 for the Space Grey model.
Trump Praises Kim Jong Un, Says "We Will Get It Done Together!"
South Korea's Yonhap News on Thursday quoted analysts who took Kim's remarks as a positive sign. Trump appears to have welcomed that message, writing in a tweet : "Thank you to Chairman Kim.
We do not typically comment on enforcement actions we take against individual accounts, for their privacy. You're not gonna get arrested. " Infowars .com, you know what it is full well", Jones said.
Twitter is soon set to get a set of interesting and useful features, the company chief Jack Dorsey revealed through a tweet . Last month, the social networking site deployed significant API changes to end common third-party application features.
Seahawks' Earl Thomas Ends Holdout: "The Disrespect Has Been Well Noted"
That likelihood, apparently, is enough to keep the Cowboys brass from ponying up whatever pot-sweeteners Seattle now wants. Wednesday's news of Thomas reporting to his current team might well lead to both sides considering it a stalemate.
Walker said in his statement that the company was taking the issue of foreign interference in politics very seriously. The House Energy and Commerce Committee hearing will focus only on bias by Twitter and the platform's algorithms.
The White House subsequently said it was "taking a look" at whether, and how, Google should be regulated by the government . Mr Trump wrote on Twitter that the justice department's decision to file charges put "easy wins now in doubt".
More than 1.3 million tweets referenced Nike , and it was the number one trend on Twitter for more than seven hours on Labor Day. In addition, the sound technician for country music duo Big and Rich, cut the iconic Nike swoosh off of his socks in protest.
| 2019-04-23T18:05:37 |
http://homeradise.com/2018/09/08/trump-poised-to-tax-an-additional-200bn-chinese-imports.html
|
0.999995 |
Say 'You are Welcome' to your friend/ loved one with this warm message.
You are welcome. I enjoyed spending time with you and Ed. I'm sorry it was on a very sad occasion.
| 2019-04-18T12:29:20 |
https://www.123greetings.com/general/you_are_welcome/gen_youarewelcome_ani5.html
|
0.998839 |
How much does the job pay? metformina 500 mg precio espaa NEW YORK - Small business owners plan for growth this year but are closely tracking recent interest rate rises and any impact they might have on their business and customers, according to a spot survey of firms in the New York region.
Do you like it here? brain force plus real review British Airways has two Dreamliners in its fleet. A spokeman for the airline said it was too early to say whether its two would now be grounded. She said: "We are getting information on this as we speak."
A few months college essay in 3rd person Dependence on oil has made the republic a hostage to world crude prices, whose fall during the 1980s and early 1990s led to the build-up of a large foreign debt, widespread unemployment and labour unrest.
Could you give me some smaller notes? chinese gambling games in las vegas That’s why everyone associated with the orange and blue should be feeling some pain this morning.
Lost credit card precio de salbutamol en aerosol John Hurst plans to create Samaritans offices in the 21 African countries that donated Spitfire planes to the Allies in 1940. His aim is to help reduce suicide rates in Africa and the stigma attached to mental health issues.
Cool site goodluck avena sativa seeds for sale Only a fifth said they were confident they understood what 4G offers, and a third of Brits were also worried about the expense of data on 4G - with YouGov finding those on 4G tariffs pay an extra £14.70 for data per month, on average. EE is currently the only operator offering 4G services; its most expensive plan costs £76 a month for 20GB of data.
What company are you calling from? precio ampollas pilexil anticaida Seeking to guide them down, the ECB said in July it wouldkeep its rates at current or lower levels for an "extendedperiod". That forward guidance, which Draghi reaffirmed onWednesday, struggled to gain traction until the Fed last monthdelayed any action.
Could I order a new chequebook, please? hearinghealthscience.com The world famous Spanish opera tenor Placido Domingo has been admitted to hospital in Madrid after suffering a blood clot in one of his lungs. The 72-year-old is said to be responding to treatment well and is expected to make a full recovery in about three to four weeks. In the meantime his July performances have been cancelled.
"The BOJ is pretty much on hold now. JGBs are stable so there's no pressure to change policy," Ray Attrill, co-head of currency strategy at National Australia Bank told CNBC Asia's "Squawk Box" on Monday, referring to trade in Japanese government bonds that has been volatile since April when the BOJ unveiled an aggressive monetary stimulus program.
I came here to work metoprolol er 50 mg coupon Ohuruogu, Britain's captain for last month's World Championships, is a popular team-mate and admired by those who have achieved great feats in the British vest, but forgoes the glitzy lifestyle easily accessible to Britain's most successful female athlete.
Can you hear me OK? pharmapal overseas limited In addition to a dinner buffet in FanFest, late-night snack in the Modellâs Clubhouse, breakfast, and non-alcohol beverage offerings, attendees will have the opportunity to meet Mr. and Mrs. Met, before hitting the hay. Fans with sleeping bags will be allowed to sleep on the grass, those with tents on the warning track.
Have you got any ? citasmx.com Motorola is using what it calls a 10 megapixel Clear Pixel sensor, saying it has been used in digital cameras before but not in smartphones until now. What makes it different? Instead of the camera sensor capturing just red, green and blue colors, it also captures clear or white pixels. The company says this captures up to 75 percent more light in a shorter time, which means faster shutter speeds and better low light performance. How does it work in practice? That depends.
| 2019-04-22T04:36:34 |
http://derksbrink.nl/Gastenboek.php?pos=141765
|
0.995921 |
Follow the installation rules that apply to each system.
Take additional steps to assure that there is proper grounding between AC and DC.
ABYC A-20 provides guidelines for installing battery charging devices.
ABYC A-25 provides guidelines for installing power inverters. To properly install an inverter or charger, follow requirements listed in E-11 and A-20 or A-25.
A-20 and A-25 contain specific installation directions that are not described in E-11.
2. Install the AC wiring to the charger or inverter including an AC grounding conductor of a size equal to the current carrying conductors unless the circuit exceeds 30A, in which case the grounding conductor may be one size smaller (E11.16.1.3.8.2). This is the typical grounding conductor that you would see with any AC appliance and returns with the other AC conductors to the power distribution panel.
3. Install a DC grounding conductor sized not less than one size smaller than the DC positive conductor and have a capacity such that the DC positive fuse has an amperage rating not greater than 135% of the current rating of this grounding wire. As a practical matter, this wire will be much larger than the AC grounding conductor. This requirement is the latest addition to the standards when it was discovered that faults in the DC side of an inverter or charger could provide sustained high currents that could start a fire from overheating the AC grounding conductor.
The rules for grounding electrical systems have evolved over time. Boat builders, installers, and electricians continue to recognize hazards and increase safety measures. Battery chargers were originally treated like any other small appliance, first without having any safety ground as was common through the 1950's, and then by adding a safety ground to reduce shock hazards during faults.
It was found that faults in the DC wiring or the DC side of chargers could generate fires because high current could flow back from the batteries, so a fuse was added between inverters or chargers and the battery system. As the capacity of chargers increased, and with the introduction of inverters, these DC fuses became quite large. It was then determined that a fire hazard exists when a DC fault in a charger or inverter can pass DC current into the AC safety ground wire. The AC safety ground was not sized for the high DC currents, so a high capacity DC grounding wire is now required by standards A-20 and A-25.
Now three critical grounding wires for these systems have been identified. This may seem excessive, but this combination of grounding conductors has been shown to give protection against a wide variety of faults.
| 2019-04-25T00:17:22 |
https://www.jamestowndistributors.com/userportal/document.do?docId=114&title=Grounding+and+Circuit+Protection+for+Inverters+and+Battery+Chargers
|
0.999995 |
Should we stay at The Balmoral or Sheraton? I can get a larger room at the Sheraton for the same rate but, I have heard the Balmoral is wonderful.
The Balmoral is a old-style grand hotel with lots of character (although like all older hotels, some rooms are bigger & grander than others). When we stayed there we had one of the cheapest rooms which was still quite large but without the castle view (it looked over the North Bridge) : the decor was quite tweedy & masculine & not really to my taste, but everything was quite luxurious & the service was superb. The public rooms, like the Palm Court bar, are nice too. The pool is quite nice but small and in the basement.
The Sheraton is a modern concrete box - I'm not sure what it claims for itself but IMO it's a 4* as opposed to the Balmoral which is a 5*. When we stayed there, I thought the room could have been in a standard chain hotel anywhere and it wasn't very big. The top floor rooms are a bit bigger. The public areas are pretty average too. It has a fabulous spa, though, although even as a resident you have to pay to access the 'thermal suite', rooftop spa pool etc.
As regards room size/standard, it's possible we were just lucky at the Balmoral & unlucky at the Sheraton - I don't enquire about room sizes in advance.
Two other suggestions are the Scotsman, and the Glasshouse (very modern).
I'd be put off the Glasshouse by its location - it may be nice inside but it's a) on a major traffic intersection and b) above the 'Omni Centre' which contains a cinema, a young people's bar & nightclub and cheap chain eateries. From what I've seen of the rooms (peering in through the windows of those that face on to the roof garden) they didn't look that special anyway.
The Scotsman is supposed to be nice and I know Sheila has stayed there more than once.
But isn't the Scotsman just as expensive as the Balmoral ?
Visited Edinburgh several years ago and stayed at the Balmoral hotel. Highly recommended and although extremely luxurious they sometimes offer very competitive rates. Worth checking out.
There is a story about it. I had found a standard room at the hotel through Lastminute.com at a very reasonable rate, around 100 pounds if I remember correctly. Now while browsing their website checking the room descriptions I noticed that Balmoral said the standard rooms were "30 square feet" in size, which strangely would perhaps fit two people standing up. I then took a look at their suites and it was the same story. Luxury suites with a fireplace, seperate living room and two bathrooms but only "60 square feet" in size.
What had obviously happened is that the hotel had mistaken "square feet" for "square meters" so the rooms were listed as being 10 times smaller than they actually were.
So I phoned the Hotel and speaking to the hotel manager I told him that they had made an error on their website. There was a slight pause on the other end and they he asked me: "Are you calling from Germany?"
It seems that he had already had numerous calls about the error - all from Germany. Germans were the only guests who truly researched the hotel before booking.
To make a long story short the manager upgraded me to a very nice suite as a thank you for noticing the error and not being German. So it might be worth it scanning their website for a few spelling errors.
We stayed at the Sheraton last month. I am a Gold member and have stayed at many Starwood properties. My honest opinion is that this was my worst experience with a Sheraton ever. I'm not sure what they are trying to be - it has the worst, smallest club lounge, which is closed most of the day anyway. The rooms are OK and yes, the Castle view rooms do have a slight view of the castle from the corner of the window. It is really an overpriced hotel, has no particular character - about the only good thing is location, which is not a particularly unique feature for a city like Edinburgh. That Sheraton would put it's name to this property is a mystry to me.
I have also stayed at the Glasshouse (on a business trip) - it's an OK, efficient hotel but more importantly, not in the category of the Balmoral.
I am sorry if you were offended by the comment, it was not meant to be taken seriously.
Balmoral would get my vote.
All that a great traditional hotel should be, in a great old city. The Sheraton could be anywhere in the world.
Do find time to have a tea at the Balmoral. Worth staying there for that alone - although you don't actually need to be staying there to have one!
I would reconsider The Howard. Yes, they offer butler's assistance if you want it, but my husband and I have stayed at The Howard twice in 2 years, and both times we never used it. It is not an issue so don't think twice.
I would certainly recommend this hotel for the convenience, the breakfasts, the first rate staff, the comfortable beds, beautiful roomy marble bathrooms, and spacious rooms. When we return to Edinburgh we will once again stay at The Howard.
Look at the Caledonian. It has a wonderful location and is gorgeous authenic Railroad Hotel (like the Balmoral). The Caley is about two blocks downhill from the Sheraton and is convenient to Princes Street. It is owned by Hilton in case you are into points.
Actually the Hilton group has just sold the Caley but apparently will still be running it - not sure what that means for points ?
| 2019-04-19T20:37:47 |
https://www.fodors.com/community/europe/edinburgh-luxury-hotel-opinion-730623/
|
0.997808 |
The chief inspector of schools in England has told parliament that children's rights should take priority over religious concerns and schoolgirls should be free from pressure to wear hijabs.
The National Secular Society has welcomed the remarks from Ofsted chief inspector Amanda Spielman, which came in an appearance before the Commons public accounts committee on Wednesday.
Spielman defended a recent assertion that schools should enforce "muscular liberalism" and said religion should not "get priority over all the other protected characteristics", referring to anti-discrimination protections in equalities legislation.
She made the comments on the hijab as she faced hostile questioning from Labour MP Shabana Mahmood about Ofsted's approach to the issue. In 2017 Spielman recommended that inspectors should try to find out how far girls were being pressured into wearing the hijab, including by asking pupils questions.
Mahmood asked whether Spielman would "personally" consider it "an appropriate and successful outcome" if "little girls now feel challenged and scrutinised by adult state officials for the basic human act of wanting to copy what their mum is wearing on her head".
The chief inspector replied: "We know that some children are feeling pressurised to wear headscarves, that it can make children unhappy to be told they are not good because they are not wearing a headscarf.
"This is something that is difficult and is contested, but I don't think we can say that children should simply be 'allowed to look like their mothers' is the solution."
She said she would write to the committee to provide further detail about how inspectors gathered evidence on the issue.
In 2017 the NSS signed a letter from feminist campaigners calling for a "robust" response to the incorporation of the hijab into school uniform policies. NSS research also revealed that girls in dozens of schools in England were being forced to wear hijabs as part of their school uniform.
The NSS responded by calling on the Department for Education to issue guidance on the subject.
The society reiterated its call in January 2018, after a primary school in east London backed down on its policies restricting the hijab and fasting amid a sustained campaign against them featuring abuse and threats.
During this week's appearance Spielman also said Charedi Jewish groups were effectively claiming that "religion should justify not having to have regard for the Equality Act". She dismissed the religious groups' view, citing the example of Yesodey Hatorah, a Jewish secondary school in east London where girls' experience has been "shut down quite considerably".
Last year an adjudicator ruled that Yesodey Hatorah was not breaching the school admissions code by requiring families not to wear leather or lycra, access the internet or use online entertainment.
Spielman's remarks echo those she made in February 2018, when she called on head teachers to confront religious extremists who "indoctrinate impressionable minds".
NSS chief executive Stephen Evans said the latest remarks were "a reasonable response to unreasonable religious pressure".
"Children should have the right to a decent education regardless of their religious background, and Amanda Spielman is right to put that priority above the concerns of religious groups.
"Children's religious freedom should also be defended. They should have the right to choose for themselves whether to adopt religious practices such as wearing the hijab when they are old enough to do so. It is alarming to see schools normalising the covering up of young girls when it comes under the guise of conservative Islamic doctrine.
"Many schools are facing pressure to give ground to the unreasonable religious demand to incorporate hijabs into their uniforms. The Department for Education should issue guidance to make it easier for them to face it down."
| 2019-04-23T03:17:32 |
https://www.secularism.org.uk/news/2019/01/religion-must-not-trample-on-childrens-rights-says-ofsted-head
|
0.999998 |
seven × = seven Required Please enter the correct value.
President Donald Trump may delay one of his campaign's chief economic promises until 2018, according to a report released earlier today (Feb. 23).
Citing Republican sources, Axios Media Co. claimed that the new POTUS will likely move his proposed $550 billion infrastructure spending plan back a year in order to address other policy issues his administration considers more pressing.
"There are an overwhelming number of reforms that the Trump team is pushing [first]," the reported stated.
"We're doing the healthcare — again moving along very well — sometime during the month of March, maybe mid-to-early March," the president told reporters Wednesday. "We'll be submitting something that I think people will be very impressed by."
Disagreement among congressional Republicans in recent weeks over how to replace the 2010 law have led to jeers from conservatives who expected to kill the law immediately and liberals who say the GOP doesn't have an adequate replacement plan.
GOP lawmakers have likewise been heckled by constituents at town hall meetings across America this month as they struggle to outline a clear and smooth path to a better system.
The public's mounting concern — as well as struggles within the GOP party itself — over the future of U.S. healthcare is keeping ACA reform at the forefront of Washington's agenda.
| 2019-04-20T03:23:07 |
https://moneymorning.com/2017/02/23/why-one-of-trumps-boldest-economic-promises-will-be-delayed-till-2018/
|
0.999998 |
Write-up: Information has been received from an 18 year old female who in 2007 was vaccinated IM with a dose of Gardasil. The patient reported that she is 8 weeks pregnant and received the vaccine. No adverse reaction reported. Follow up information has been received from a physician concerning the 18 year old female with 0 previous pregnancies and no medical history who on 04-JUN-2007 was vaccinated IM with a dose of Gardasil. The patient received an elective abortion at 8 weeks. The elective termination occurred the week of 04-JUN-2007. Upon internal review, elective abortion was considered to be an other important medical event. No further information is available.
| 2019-04-21T10:09:42 |
http://www.medalerts.org/vaersdb/findfield.php?IDNUMBER=284352
|
0.998749 |
Here's what Ive done to try and mitigate this problem: New head gasket (was leaking coolant and oil around manifold and smoking like a biiiiiitch . -used OEM gasket at proper diameter), new valve seals, lapped valves lightly and tilt clearance of stems is within spec per my manual. Head was machined flat before installing. Compression 155 psi on ALL four cylinders. New water pump and associated oil seals and gaskets, Randakk's carb kit tackled step by step and everything replaced gingerly and double checked (my third set of GL1100 carbs rebuilt), new air filter, new fuel pump, filter and fuel lines, petock cleaned and rebuilt. Floats set at 15.2mm ( to allow more fuel because it's symptoms seem lean). Gas tank cleaned and re-installed. Ran brake cleaner through left headers when apart to begin to clean out baked-on oil deposits. Idle screws 3.25 turns out. New o rings on carb/head interface. New spark plugs gapped correctly and resistor caps. New battery, charging system working great. Synced carbs with mercury sync tool at 1000rpms. Ran marvel mystery oil and seafoam in engine oil and seafoam in gas for 25 miles on the road.
Problem: Starts up immediately with choke but left side warms up a wee bit slower than right but does heat up. Then it steadily and subtly backfires every few seconds mostly out of the #2 carb and a little out of the #4 carb. It hesitates on left side only when quickly throttled, right side fires up like a monster. I've screwed with carbs so many times I thought I'd ask for advice at this point... The slight backfiring is accompanied by white smoke which dies down to almost nothing, but takes 25-30 minutes to happen. Smells like oil to me. My only guess at this point is either timing (waiting on a strobe light in the mail to check) is early or late on 2 and 4 or the oil rings are failing and fouling the plugs. The plugs are nice and brown, I'm not seeing any oil though. But the white smoke smells like oil for sure. The smoke, stuttering-backfiring is getting to me after all this work and Im not sure what to check next. Thanks for any help that could be offered up!
Have checked wires yep, they're correct. Hmm I'll check the slide for sure. Do you mean the needle? I buffed all four slides and made sure the needles were all the same height. Taking carbs out again this weekend. Thanks for the tip!
If the smoke is from the left side then do you leave the bike on the side stand ?
Could also be the bike is still burning off some of the loosened oil in your exhaust as a result of the brake cleaner you have used - the oil residue might have been accumulating for a while..
If it is not blowing smoke after it has warmed up I would ignore it..
That's exactly the behavior you would expect when rapidly opening the throttle.
The vacuum is measured in the intake manifold between the throttle and the cylinder intake valves. When the engine is idling and the throttle is mostly closed, the engine is not drawing much air, and the throttle is at the maximum amount of restriction, so vacuum is relatively high.
When you rapidly open the throttle, all of a sudden there is little to no restriction to incoming air, AND at the same time, the engine still not requiring much air - so the vacuum plummets almost instantly.
As the engine speeds up, it starts drawing more and more air, more than can easily get past the throttle, so the vacuum drops once again.
Incidentally, this is the reason for accelerator pumps. When you rapidly open the throttle and the vacuum plummets, the fuel being drawn into the engine also almost completely stops - because the amount of fuel being sucked into the engine is dependent on the amount of vacuum present in the plenum. At low speeds it relies more on manifold vacuum to draw fuel (through the idle jet), at higher RPM it depends more on the vacuum generated by the volume of air flowing through the plenum (which is accelerated, causing a drop in pressure, i.e. vacuum).
Because the fuel almost completely stops, in order to keep the engine running AND make it start to accelerate, the accelerator pump squirts a little bit of extra fuel into the plenum. This gets the engine going, which speeds up RPM, which then raises vacuum, and things run normally.
This is why a malfunctioning accelerator pump or jet will cause the engine to bog down when the throttle is opened rapidly.
Check to see if you can see the accelerator pump squirting fuel when you rapidly open the throttle.
Thanks very much for the info. That makes it much more clear I appreciate it! Ok, I will pull carbs again and confirm the accelerator pump is injecting fuel when it should. It's a new pump assembly from Randakks, but I'm sure that doesn't mean it was installed correctly. Thanks again. Past 6000 rpm it screams like a maniac with no backfires or hesitation so just need to smooth out the low end. Have quite a few friends in CO and CA I intend to visit this summer and my GL1100 is the chosen steed.
You don't need to pull the carbs to do that - just pull the air filter out, you can see the accelerator pump squirting fuel in when looking down into the carbs then - without removing them.
Looking from the plenum into the carb, The butterfly you see is the choke (throttle is on the outboard end of the carb).
Acel discharge is the small brass piece.
Got a mirror and a bright light in the plenum and......only carb 3 is squirting directly into carb. The other three just kind 'get wet' around the base of the brass injector. Will pull assembly and clean brass nozzles again. Learned the hard way! Will, ahem, make sure to check accelerator squirt in each carb before full assembly and re-installation. Also found cylinder 3 and 4 have a weak spark and are skipping every now and again. Coil isn't cracked but since the cables are hard as a rock and I want this fixed right I ordered a new set of coils. Hopefully after that and accelerator pump confirmation she'll rip.
Carb #3 contains the one and only acel pump mechanism.
Its output take a circuitous path to get to the other 3. Starting at #3 it squirts out the tiny brass nozzle, and also goes thru the small connecting tube into #1. But it also goes thru a passage in the plenum casting to get to #4. And finally thru another small cross tube into #2.
#1 & #2 were easiest to clean since those carbs have only one passage to the nozzle and I could get some pressure behind my carb cleaner spray.
#3 and #4 have more intersecting passages, besides the nozzle itself, to distribute the fuel to the remote carbs.
I bent a 0.010" wire in a "J" shape to poke into the small discharge hole in each nozzle. Finally got them all opened, and then flushed more cleaner fluid thru them. It takes patience, but it can be done.
I found that grocery twist ties (like bread wrappers, etc.) are made from fine wire. They come in different sizes. I strip the paper coating off and measure with a caliper.
You can also use a short piece of .010 guitar string. They are available in any music store. One string should last till the next century.
Just finished going through all carbs again. Yep, only one pump nozzle was working. Confirmed float heights, vacuum slides moving freely, all jets clear and emulsion tubes clean. All new O rings. NO hesitation now when I gas it at ALL! Revs up like a beast! But the mid range still coughing, farting, sneezing like it's misfiring. Good power and response, just backfiring through carbs. Going to replace coils, wires, caps and plugs tonight and see if that helps. Beyond that, I'm getting tired of carb work! Been through three times each time with Randakks book, installed kit first time... Granted I missed accelerator pump functionality last time but the constant backfiring, coughing is ticking me off! I'll see what happens later. Guitar string worked like a charm! Very cold here, while installing carbs in the bottom floor of the barn the ceiling starting pouring, pipes above in barn froze because heater had **** out. Good times!
RE setting the needle and seats. I have gone through the problems you are having.
cleaned and adjusted the carbs 3 times before finally replacing the N and S's.
The proper mixture is very important. I had no problem of dirt or blocked jets.
I have an ultra sound cleaner. Works great.
Not emulsion tubes. The needle and seat comes as a package. You will need 4 - one for each carb.
The needle fits into the seat. proper adjustment is critical. AGAIN. Read the Randakks article on adjustment.
Ok, just didn't know if you are talking about FLOAT NEEDLES AND SEATS or main jet FUEL METERING NEEDLES. Floats are adjusted to proper setting and I have installed new seats for the floats and needles. Still a'stuttering. I'll keep at it.
One other thing that you could check is the vacuum advance. The vacuum hose coming off the number 3 carb goes down to the vacuum advance and as originally installed is open to residue chemicals eventually reaching the diaphragm and rotting through it affecting the mechanical advance mechanism. Putting a vertical loop in the hose stops the build up. If the hose is clean, sucking on the hose should activate the advance. Releasing the vacuum, you should be able to hear it snap back. Otherwise be sure that your ignition is working properly.
Checked vacuum advance today. Installed new rubber line directly to carb #3. Applying suction you can hear advance mechanism move and snap back after. There is a tiny flathead screw in face of vacuum advance. Wonder if it's adjustable...Going to check all ignition connections (wires to coils which have been all replaced new, pulse generator near battery etc) with voltmeter later today. If all these check out, it's back to the carbs. Revved up it sounds great so I'm convinced it's still worth it. I've worked on tons of old Honda twins so this is new to me but I believe...I believe!!! if and when she's up and healthy....I visiting Maine and CO this year on it.
humm did you change the jets?
| 2019-04-22T00:25:31 |
https://goldwingdocs.com/forum/viewtopic.php?f=4&t=48058&p=290367
|
0.999747 |
The beehive was a picture of industry and cooperation - this mark appears to have first been used by Samuel Alcock - he moved into the Hill Pottery, Burslem around 1828 and rebuilt it in 1839 - the Hill Pottery was large and impressive. These works were used by many potters and some of them (Dunn Bennett and Burgess & Leigh) carried on with the use of the beehive mark.
Most marks after 1907 have "& Co Ltd"
Marked "KENSINGTON" which is the pattern name.
"B & L & Co" for Burgess Leigh & Co.
Burgess Leigh & Co occupied the Central Pottery, Burslem from 1862 to 1867.
Marked "HILL POTTERY" "NORMAN" which is the pattern name.
"B & L" for Burgess and Leigh.
In 1867 Burgess & Leigh occupied the earthenware department at the Hill Pottery and then in 1899 moved to purpose built pottery at Middleport.
Burgess & Leigh continued to use the beehive mark when they moved to the Middleport pottery.
In 1877 Thomas, or T.F. Wood as he was called in later years, along with his brother William Wood, purchased for £5075 a site in Navigation Road, which they called New Wharf Pottery, and which they had probably been tenants or since 1875.
The name New Wharf was probably derived from the New Wharf that was built on the nearby canal at that time.
the use of the 'garden urn' as part of a pottery mark was used extensively by the Ridgway families.
William Ridgway (c.1830's) and their subsequent pottery companies used this style of mark with the garden urn.
This is an identical designed mark as the New Wharf Pottery mark shown above - there is no known connection between the two companies, however it was not unknown for potters to swap plain ware for redecorating, moulds and patterns - so the New Wharf Pottery may have used some Ridgway ware to get them going at the new works.
| 2019-04-24T20:01:22 |
http://www.thepotteries.org/markguide/beehive.htm
|
0.999748 |
Here's how to make it work the second time around.
Patching up a lost relationship is very common, and contrary to opinion a lot of "second time around" relationships work out smashingly. In fact, one of my favorite love stories is that of my mother's friend, Bonnie. Bonnie reunited with her high school boyfriend and first husband, Will, when her second marriage fell apart. She ended up remarrying Will and staying happily married to him until the day he died 28 years later.
They had a beautiful second marriage filled with laughter, kindness, communication and respect. They acted like lovebirds and soul mates, and I remember how shocked I was when my mother told me that they had once been divorced.
I often wonder what had made the difference? What had happened in those 19 years apart that made things work the second time around?
I asked Bonnie about her late husband the last time I went to visit my mother. She was happy to discuss her beautiful marriage and how that relationship had risen from the ashes of a bitter breakup.
1. Don't be afraid of life without him.
Bonnie was terrified when her first marriage started to fail. As the problems grew worse, naturally, her fear of losing him did, too. This fear caused her to cling fiercely to him; she became needy and agitated by the stress brought on by possible abandonment. This made her try to pull him close one minute and then reject him the next. This push/pull drove him away further and he left her.
When they reunited, Bonnie was no longer afraid of what life would look and feel like without Will; she had already survived losing him once. Knowing this, Bonnie was able to stay calm and communicative in moments when their second marriage was strained. The "need to cling" and the sheer panic of abandonment were a lot less, and this helped draw him back quickly during the rough patches where he seemed to emotionally drift.
It's important that you find peace in the idea that you too may not get this man back. This surrender will help you stay grounded regardless of how painful this breakup feels. It will make you feel more confident and at peace when you do speak with him, and this will magnetize him.
When he feels like there's room to return and feel things out without the enormous pressure of not crushing your heart, he will most likely return. He may want to try it again, but he certainly doesn't want to destroy you and cause you more pain. If he feels a desperate, panicky neediness from you, he'll stay back because he doesn't want to crack an already fragile egg.
During their first marriage, Bonnie and Will were very young and full of ambition. Like most go-getters, they wanted to succeed at everything they did. Not only did they both want a grand professional career; they wanted the perfect marriage and family.
Both Bonnie and Will worked hard at the marriage. She worked hard by being the perfect Suzy Homemaker and "nice wife." He worked hard by being Mr. Provider and trying to please her every chance he got.
Bonnie claims that she lost herself in trying to be what she thought he wanted; she became disconnected from who she actually was and how she felt inside. When he tried to please her, she couldn't get in touch with her feelings enough to know what it was she needed from him, and she didn't trust herself and the marriage enough to be honest about her needs, and vulnerable to receiving his acts of love.
Will got more and more resentful of her inability to receive, and instead of backing off and allowing her space to come to him with her needs, he slaved to give her things she didn't really want or need. As a result, the resentment grew and his self-esteem plummeted.
The second time around, they were both 45 years old. They were more confident and were also just too tired to work so hard at love. As a result, they were able to connect on a more natural level. Bonnie was able to be herself, not hiding behind a mask of "wife extraordinaire," and Will was able to be more patient and take rejection less personally.
It's important that you don't force things now. Don't try to be perfect to "hook" him or focus on manipulating him into loving you. Don't try to force the relationship to happen, and don't be like Will and wrap yourself up in resentments and a need to define your self-worth through his appreciation for you.
"Sit on your hands" and let the relationship reunite at its own pace. Doing what feels like it carries the least resistance is how to get him back. If he calls, you call him back. If he asks you out, don't resist the invitation or try to control the plans.
If it feels affordable and makes you happy, get your hair done for him. Be leisurely about things, going with the grain, and take the time to listen to your feelings. Don't rush to fix the problems, but be still and listen to what the problems have to tell you about your emotional needs and those of the relationship.
Bonnie and Will reunited because they both learned to let go — of insecurities, fears, "what ifs" and desires that didn't serve them. When you can stop trying to be the person you want to be, have the guy you want to have and be received by others the way you want to be received, you make room to be you, have the relationship that works for you, and not place weight on how others see you.
| 2019-04-25T14:45:06 |
https://www.yourtango.com/experts/ms-kristina-marchant/how-get-him-back-wife-who-remarried-her-ex-expert
|
0.999992 |
Description MS in Greek on papyrus, Egypt, mid 3rd c. BC, 5 fragments from column 15 of a scroll of originally 17 columns, 4,0x3,0 cm, 2,5x1,8 cm, 5,5x1,7 cm and 2,0x1,3 cm, parts of column 15, (column size ca. 24x9 cm), 16 lines in irregular Greek capitals.
Context With book 17 alone, the scroll would have been ca. 26x175 cm. With both books 17 and 18 it would have been a "standard" 20-sheet scroll, ca. 26x350 cm. There are only 17 papyrus fragments preserved of book 17. The present MS and P.Sorb.Inv.2303, lines 566-578 are the oldest, both 3rd c. BC, and both are the oldest witnesses to their parts of the texts.
Provenance 1. Helen Ainsworth and heirs, England (1930'ies-1989); 2. English scholar (1989-2002).
Commentary The very few surviving Homeric papyri that date from before Aristarchus' edition, are of the greatest textual importance, since they alone preserve the earlier forms of the poems, as they were recited by singers in the archaic and classical periods. The present MS and P. Sorb. Inv. 2303 are the only pre-Aristarchan MSS of book 17. There are 2 extra lines, 1 is known, the other is new and unrecorded. Homer is represented in The Schøyen Collection by MS 112/33, The Iliad XV:511-515, ca. 100, MS 112/57, The Iliad II:195-197, 2nd c., MS 112/80, The Iliad XI: 1-5, 2nd c. (the earliest witness to the text and not otherwise extant on papyrus); MS 2628, The Iliad XVI:2-15. 32-37, 40-43, 47-61, 75-91, 1st c. BC-1st c. AD; MS 5094, Homer: The Iliad XVII:637-644, 679-685, + 1 extra and 1 new line (earliest witness to text); MS 5069, The Odyssey XII: 9 - 14; 17 - 28; 41 - 46, late 3rd - 2nd c. BC (earliest witness to text); and MS 2629, The Odyssey XI:509-603, ca. 1st c.
Published Dominic Montserrat. A Ptolemaic papyrus of Illiad 17, in: Bulletin of the Institute of Classical Studies, 38, London 1991-1993, pp. 55-58.
| 2019-04-23T10:40:04 |
https://www.schoyencollection.com/literature-collection/classical-greek-literature-collection/homer-iliad-ms-5094
|
0.999999 |
A media conference device is provided. The media conference device includes a processor and a memory coupled with the processor. The memory stores instructions that are executable by the processor. The instructions are executable to detect a termination event and transmit a termination event message that indicates that the termination event was detected and requests that a media conference be recorded.
1. A media conference device used to participate in a media conference, the media conference device comprising: a processor; and a memory coupled with the processor, the memory storing instructions that are executable by the processor, the instructions being executable to: join the media conference; detect a termination event, the termination event being an event that prevents a conference participant from participating in the media conference; and transmit a termination event message that indicates that the termination event was detected and initiates a recording of the media conference.
2. The media conference device as claimed in claim 1, wherein the termination event includes a power source event and the instructions are executable to compare a current power level to a power threshold level to determine when the power source event has occurred.
3. The media conference device as claimed in claim 1, wherein the termination event includes a cellular reception event and the instructions are executable to compare a current cellular reception level to a cellular reception threshold level to determine when the cellular reception event has occurred.
4. The media conference device as claimed in claim 1, wherein the termination event includes a quality of service event and the instructions are executable to compare a current quality of service level to a quality of service guarantee to determine when the quality of service event has occurred.
5. The media conference device as claimed in claim 1, wherein the termination event includes a participation event and the instructions are executable to determine when a change in participation has occurred.
6. The media conference device as claimed in claim 1, wherein the instructions are executable to determine when the participation changes from active to inactive.
7. The media conference device as claimed in claim 1, wherein the instructions are executable to receive a recorded conference message in response to the termination event message.
8. The media conference device as claimed in claim 1, wherein the recorded conference message includes a recording of the conference beginning at a time that is near the time that the termination event occurred.
9. A method for recording a media conference, detecting a termination event, the termination event being an event that prevents a conference participant from participating in a media conference; and transmitting a termination event message that indicates that the termination event was detected and initiates a recording of the media conference.
10. The method as claimed in claim 9, further comprising comparing a current power level to a power threshold level to determine whether a power source event has occurred.
11. The method as claimed in claim 9, further comprising comparing a current cellular reception level to a cellular reception threshold level to determine whether a cellular reception event has occurred.
12. The method as claimed in claim 9, further comprising comparing a current quality of service level to a quality of service guarantee to determine whether a quality of service event has occurred.
13. The method as claimed in claim 9, further comprising determining whether participation changes from active to inactive to determine when a participation event has occurred.
14. The method as claimed in claim 9, further comprising receiving a recorded conference message in response to the termination event message, the recorded conference message including a recording of the conference beginning at a time that is near the time that the termination event occurred.
15. A method for recording a media conference, the method comprising: detecting a termination event, the termination event indicating that a participant is no longer participating in a media conference; initiating recording of a media conference based on the termination event.
16. The method as claimed in claim 15, wherein detecting a termination event includes receiving a termination event message that indicates detection of the termination event.
17. The method as claimed in claim 15, further comprising establishing a media conference for conference participants.
18. The method as claimed in claim 15, further comprising transmitting a recorded conference message to the conference participant, the recorded conference message including recorded media conference data that includes a link to all or some of the recorded media conference.
19. The method as claimed in claim 15, further comprising transmitting a recorded conference message to the conference participant, the recorded conference message including recorded media conference data that includes all or some of the recorded media conference.
20. The method as claimed in claim 15, further comprising receiving a termination event message used to detect the termination event, the termination event message including a timestamp and conference participant identification.
21. Logic encoded in one or more tangible media, the logic being executable by a processor and operable to: join the media conference; detect a termination event, the termination event being an event that prevents a conference participant from participating in the media conference; and transmit a termination event message that indicates that the termination event was detected and initiates a recording of the media conference.
The present embodiments relate to media conferencing between conference participants. In particular, the present embodiments may relate to recording (i.e., taping, storing, preserving, or filing) a media conference when a termination event is detected.
Conference participants may join a media conference. However, in the event that a termination event occurs during the middle of the media conference, one or more of the conference participants may be dropped out of the media conference. As a result, the dropped conference participants may be unable to finish participating in the media conference.
FIG. 8 illustrates another embodiment of a method for recording a media conference.
The present embodiments relate to media conferencing between conference participants. In particular, the present embodiments relate to recording (i.e., taping, storing, preserving, or filing) a media conference when a termination event is detected. Termination events are events that prevent a conference participant from participating in the media conference. Exemplary termination events include power source events, lost reception events, quality of service deterioration events, or participation events. The conference is recorded when a participant is undesirably dropped from the conference, allowing others to continue and the dropped participant to have access to recorded communications during the remainder or missed portion of the conference.
In one aspect, a media conference device used to participate in a media conference may include a processor and a memory coupled with the processor. The memory may store instructions that are executable by the processor. The instructions may be executable to join a media conference and detect a termination event and transmit a termination event message. The termination event message may indicate that the termination event was detected and initiate a recording of a media conference. The termination event may be an event that prevents or is likely to prevent a conference participant from participating in the media conference.
In a second aspect, a method for recording a media conference is provided. The method includes detecting a termination event, the termination event being an event that prevents a conference participant from participating in a media conference; and transmitting a termination event message that indicates that the termination event was detected and initiating a recording of the media conference.
In a third aspect, a method for recording a media conference is provided. The method includes detecting a termination event, the termination event message indicating that the termination event was detected and the conference participant, and initiating the recording of the media conference based on the termination event. The method may further include recording the media conference and transmitting a recorded conference message to the conference participant, the recorded conference message including recorded media conference data.
FIG. 1 illustrates a media conference network 100. The media conference network 100 may include one or more conference servers (hereinafter, conference server) 110 and one or more participant communication devices 120. The conference server 110 may be coupled with the one or more participant communication devices 120 via communication network 130. As used herein, "coupled with" may include directly connected to or indirectly connected through one or more intermediary components. Intermediary components may include hardware components and/or software components. In an alternative embodiments, the network 100 may include additional, different, or fewer components.
The media conference network 100 may be used to establish and maintain a media conference. "Media" may include audio, video, graphical, textual, or a combination thereof. "Conference" may include a meeting or discussion or act of conferring or consulting together between conference participants using participant communication devices 120. For example, in one embodiment, the media conference may be a conference call. The conference participants may be using telephones. In another embodiment, the media conference may be a videoconference having both video and audio. In yet another embodiment, the media conference may be an instant message session or textual exchange. The media conference may be a mixed media conference. For example, some conference participants may join with voice and video capabilities and other may join only with voice or text capabilities. The capabilities depend on the type of participant communication device 120 that is being used.
One or more conference participants may join the media conference. The conference participants may use participant communication devices 120a, 120b, 120c, and 120d to join the media conference, for example, by dialing in to the media conference or joining via an Internet link. The conference participants may join the media conference in any order or in a specified order. A media conference may have three or more participants at some point instead of a mere two-way exchange. The number of participants may change throughout the media conference.
A termination event may be identified, for example, by the conference server 110, participant communication device 120, or other managing server. The termination event may be identified prior to or during the media conference. A termination event may be an event that prevents a participant from participating in the media conference. The termination event may be used to initiate the recording (i.e., taping, storing, preserving, or filing) of the media conference. Alternatively, in the event that the media conference is already being recorded, the termination event may be used to identify one or more portions of the media conference that were missed by a conference participant. All, some, or none of the media conference recording may be provided to the conference participant, for example, via the participant communication device 120. For example, the actual recording may be provided or a link to the actual recording may be provided.
In one illustration, a participant, using participant communication device communication device 120d, which may be a cellular telephone, may lose cellular reception during the media conference. The loss of reception may be a termination event. Upon detection of the termination event, the conference server 110 may begin recording the media conference. The recording may be transmitted to the participant using the cellular telephone, for example, after the media conference is completed.
The conference server 110 may include a communication server, file server, email server, e-commerce server, database server, proxy server, real-time communication server, content server, streaming media server, Web server, management server, directory server, mobile information server, application server, or other server operable to support a conference. Additional, different, or fewer components may be provided.
The participant communication device 120 may be a media conference device, communication device, cellular telephone, telephone, videophone, smartphone, personal digital assistant, personal computer, server, endpoint, or other device for communicating with the conference server 110. The participant communication device 120 may be used, managed, owned, or controlled by a participant (i.e., user). The participant may be a human being or electronic device programmed to participate in a media conference. The participant communication device 120 may be operable to communicate with the conference server 110. For example, in one embodiment, the participant communication device 120 may connect to the media conference supported by the conference server 110. Additional, different, or fewer components may be provided. For example, the participant communication device 120 may include a camera, input device, and/or display.
The conference server 110 and/or participant communication device 120 may include one or more processors and memory. The processors may be general processors, digital signal processors, application specific integrated circuits, field programmable gate arrays, analog circuits, digital circuits, combinations thereof, or other now known or later developed processors. The processor may be a single device or a combination of devices, such as associated with a network or distributed processing. Any of various processing strategies may be used, such as multi-processing, multi-tasking, parallel processing, remote processing, or the like. The processor is responsive to instructions stored as part of software, hardware, integrated circuits, firmware, micro-code or the like. For example, the processors may be operable to execute instructions stored on the memory.
The memory may be a computer readable storage media. The computer readable storage media may include various types of volatile and non-volatile storage media, including but not limited to random access memory, read-only memory, programmable read-only memory, electrically programmable read-only memory, electrically erasable read-only memory, flash memory, magnetic tape or disk, optical media and the like. The memory may be a single device or a combination of devices. The memory may be adjacent to, part of, networked with and/or remote from the processor.
Data representing instructions, executable by the processors, may be stored in the computer readable storage media. Logic encoded or embedded in one or more tangible media for execution is defined as the instructions that are executable by the programmed processor and that are provided on the computer-readable storage media, memories, or a combination thereof. The one or more processors may be programmed with and execute the instructions. The functions, acts, methods or tasks illustrated in the figures or described herein may be performed by the programmed processor executing the instructions stored in the memory. The functions, acts, methods or tasks are independent of the particular type of instructions set, storage media, processor or processing strategy and may be performed by software, hardware, integrated circuits, firmware, micro-code and the like, operating alone or in combination. The instructions are for implementing the processes, techniques, methods, or acts described herein.
The communication network 130 may include a public switched telephone network (PSTN), the Internet, local area network (LAN), wide area network (WAN), wired network, wireless network, cellular network, a combination thereof, or any other network suitable for carrying media. The communication network 130 may include one or more intermediary components, such as gateways, routers, switches, hubs, private branch exchange, Web conferencing application, conference call application, text chat server, networks, videoconferencing application or other component.
FIG. 2 illustrates one embodiment of the interaction between a conference server 110 and a participant communication device 120. As shown in block 210, the conference server 110 may establish a media conference. As shown in block 220, the conference server 110 may optionally begin recording the media conference immediately after establishing the media conference. Accordingly, the entire media conference may be recorded.
One or more conference participants 120 may join the media conference, as shown in block 230. Joining the media conference may include dialing into the media conference, connecting to a media conference session, or otherwise joining a media conference with zero, one, or more additional conference participants 120. For example, the first participant to join the conference may join the conference without other participants. The second participant may join the first participant.
As shown in block 240, a participant communication device 120 or server 110 may detect a termination event. Termination events may be events that prevent a participant from participating in a media conference. Termination events may be intentional or unintentional. An intentional termination event may include hanging up a telephone during a media conference. An unintentional termination event may include losing reception while driving. Exemplary termination events include power source events, lost reception events, quality of service deterioration events, and participation events. Other termination events may be used.
FIG. 3 illustrates one embodiment of a termination event. The termination event is a power source event. The power source 300 indicates the current power level 310 of the participant communication device 120 relative to a fully charged level 320 (e.g., 100% charged) and a fully drained level 330 (e.g., 0% charged). A termination event may occur when the current power level 310 reaches the fully drained level 330. Alternatively, or additionally, a termination event may occur when the current power level 310 reaches a power level threshold 340 (e.g., 20% charged). The power level threshold 340 may be predetermined and set at any of one or more levels. For example, the power level threshold 340 may be set at 0%, 100%, any level between 0% and 100%, or a combination thereof. The power level threshold 340 may be set at a level that indicates that the current power level 310 is nearing the fully drained level 330. Alternatively, or additionally, the power level threshold 340 may be set at a level that indicates that the current power source has been completely drained of power. In other words, the participant communication device 120 is without power and unable to continue the media conference.
FIG. 4 illustrates another embodiment of a termination event. The termination event is a cellular reception event. The cellular reception event may indicate when cellular reception is reduced to a level that does or is likely to cause disconnect between the participant communication device 120 and conference server 110. In other words, the cellular reception event may take place when a dropped call is about to take place or does take place. The reception bars 400 indicate the current cellular reception level 410 of the participant communication device 120. The reception bars indicate cellular reception for the participant communication device 120. A cellular reception event occurs when the current cellular reception level 410 deteriorates to (e.g., matches) a cellular reception threshold 420. The cellular reception threshold 420 may be predetermined and set at any of one or more levels. For example, the cellular reception threshold 420 may be set at 0%, 100%, any level between 0% and 100%, or a combination thereof. The cellular reception threshold 420 may be set at a level that indicates that the current cellular reception level 410 is nearing a dropped call level, for example, the 0% level. Alternatively, or additionally, the cellular reception threshold 420 may be set at a level that indicates that the participant communication device 120 has lost reception. In other words, the participant communication device 120 has been disconnected from the media conference because of poor reception. Poor reception, such as associated with data loss, may be used as a termination event.
In an alternative embodiment, the conference server 110 or other device may identify a termination event, such as a cellular reception event. The termination event may be identified, for example, by monitoring power source, reception, quality of service, or participation. A gateway connecting the participant communication device 120 to a cellular network or the conference server 110 may detect a cellular reception event, for example, by directly or indirectly monitoring cellular reception. This may be beneficial because without reception, the participant communication device 120 may be unable to properly transmit and receive messages, which indicate that a termination event was identified. The termination event may be that the participant is no longer participating in the media conference.
FIG. 5 illustrates yet another embodiment of a termination event. The termination event is a quality of service event. The quality of service 500 indicates the quality of service of the network 130 connection between the participant communication device 120 and the conference server 110. Quality of service may relate to bandwidth, VoIP quality, network route performance, audio performance, and/or video quality. A quality of service event may occur when a current quality level 510 deteriorates to (e.g., matches) a quality of service guarantee 520. For example, the quality of service guarantee 520 may be set at 0%, 100%, any level between 0% and 100%, or a combination thereof. The quality of service guarantee 520 may be set at a level that indicates that the current quality of service level 510 is nearing a dropped, spotty, or hard-to-use level, for example, the 0% level. Alternatively, or additionally, the quality of service guarantee 520 may be set at a level that indicates that the participant communication device 120 has a poor connection, is about to be disconnected, or has been disconnected. In one exemplary embodiment, the system 100 may employ ITU P.VTQ or P.563 real-time voice quality (VQ) algorithms to assess the voice quality and the quality of service provided by the overall system.
In the field of computer networking and other packet-switched telecommunication networks, a quality of service guarantee 520 may be used to guarantee a certain level of performance to a data flow. For example, a required bit rate, delay, jitter, packet dropping probability and/or bit error rate may be guaranteed. Quality of service guarantees are important if the network capacity is insufficient, especially for real-time streaming multimedia applications, such as VoIP calls or video over IP communication, since these often require fixed bit rate and are delay sensitive. QoS guarantee may be agreed on in a traffic contract for the application software and reserve capacity in the network nodes, for example, during a session establishment phase or setup phase. During the VoIP phone call, one or more call monitoring systems may monitor the achieved level of performance, for example, the data rate and delay, and dynamically identify a termination event.
FIG. 6 illustrates yet another embodiment of a termination event. In this embodiment, the termination event is a participation event. The participation 600 may indicate the participation of a user of the conference participant. The participation 600 may be active 610 or inactive 620. A participation event may occur when the participation 600 changes to active 610 or inactive 620. For example, in one embodiment, the participation 600 may change to inactive 620 when a participant communication device 120 places the media conference on hold. The participant communication device 120 may receive another phone call during the media conference, place the media conference on hold, and answer the other phone call. In another embodiment, the participation 600 may change to inactive 620 when the participant is not focusing on the media conference. Video camera analytics may be used to determine when the participant is focusing on the media conference or is distracted with other events. For example, the participation 600 may change to inactive when someone walks into the room and begins speaking with the user of the participant communication device 120. In yet another embodiment, the participation 600 may change to inactive 620 when the participant communication device 120 disconnects from the media conference.
In another embodiment, a participation event may occur when the participation 600 reaches a certain participation threshold level may be used. The participation threshold level may be set at 0%, 100%, any level between 0% and 100%, or a combination thereof. The participant communication device 120 may determine the participation level, for example, by analyzing how many other tasks that the user is performing during the media conference and assigning a participation level.
In yet another embodiment, a participation event may occur when there is a scheduling conflict. For example, a media conference may be scheduled from 1:00-2:00 pm and the participant may have a calendar event from 1:30-2:30 pm. A participation event may occur at 1:30 pm. In other words, a participation event may occur when there is scheduling overlap between the media conference and another calendar event.
Referring back to FIG. 2, although shown that the participant communication device 120 detects the termination event, in alternative embodiments, the conference server 110 may identify the termination event. For example, in one embodiment, the conference server 110 may detect when the participant communication device 120 becomes disconnected from the media conference. The disconnection of the participant communication device 120 may be a termination event. The conference server 110 may use the power level, reception level, quality of service level, and participation level to identify a termination event. The conference server 110 may termination event information, such as a power level, reception level, quality of service level, and participation level, from the participant communication device 120 or from a server or device supporting or monitoring the participant communication device 120. For example, the conference server 110 may receive a reception level from a cellular server supporting the participant communication device 120. In another example, the conference server 110 may receive a quality of service level from a monitoring server, which monitors the quality of service between the conference server 110 and participant communication device 120.
Upon detecting a termination event, the participant communication device 120 may transmit a termination message to the conference server 110, as shown in block 250. The termination message may indicate that participant communication device 120 was disconnected or may be disconnected from the media conference. The termination message may include a timestamp and conference participant identification. The timestamp may indicate the time that the termination event was identified. The conference participant identification may identify the conference participant.
In the event that the conference server 110 is recording the media conference, the conference server 110 may continue recording the media conference. However, as shown in block 260, in the event that the conference server 110 is not recording the media conference, the conference server 110 may begin recording the media conference upon receiving the termination message 250.
Although FIG. 2 illustrates that the termination event is reported by the participant communication device 120, in alternative embodiments, the server 110 may receive the termination message from other components attached to network 130.
After the media conference has completed, as shown in block 270, the conference server 110 may transmit a recorded conference message 280 to the participant communication device 120. The recorded conference message may include recorded media conference data. In one embodiment, the recorded media conference data includes a link to all or some of the recorded media conference. In another embodiment, the recorded media conference data includes all or some of the recorded media conference. For example, when the termination event message includes a timestamp, the recorded media conference data may include the recorded media conference beginning from the timestamp. As a result, the media conference may be recorded beginning at a time that is near the time that the termination event occurred. In another embodiment, the timestamp and the associated ID of the person who dropped out of the conference at the said time is included as metadata associated with the media stream.
The user of the communication device 120 may use the recorded conference message 280 to play the recorded media conference. In one embodiment, the user or participant may utilize the metadata to identify the beginning of the conference recording associated with the time she dropped out of the said conference. For example, the user may identify that a termination event occurred at minute 3 into the media conference.
In an alternative embodiment, the participant communication device 120 may rejoin the media conference after the termination event. Upon rejoining the media conference, the participant communication device 120 may transmit a rejoin message to the conference server 110 or the server 110 may detect the rejoining. The rejoin message may include a timestamp and conference participant identification. The conference server 110 may use the timestamp and conference participant identification to provide a conference recording to the participant communication device 120 that is defined by the time that was missed by the participant communication device 120. For example, the conference server 110 may stop recording the media conference upon receiving the rejoin message. Alternatively, or additionally, the conference server 110 may provide only the portion of the media conference recording between the timestamp in the termination event message and the timestamp in the rejoin message.
FIG. 7 illustrates one embodiment of a method 700 for recording a media conference. The method 700 includes detecting a termination event 710, transmitting a termination event message that indicates that the termination event was detected and requests that a media conference be recorded 720, and receiving a recorded conference message in response to the termination event message 730. The acts may be performed in the order shown or a different order. The method 700 may include additional, different, or fewer acts. For example, the method 700 may include acts 710 and 720.
In act 710, a conference system, such as a conference server or conference participant, may detect a termination event. In one embodiment, detecting a termination event may include comparing a current power level to a power threshold level to determine when the power source event has occurred. In another embodiment, detecting a termination event may include comparing a current cellular reception level to a cellular reception threshold level to determine when the cellular reception event has occurred. In yet another embodiment, detecting a termination event may include comparing a current quality of service level to a quality of service guarantee to determine when the quality of service event has occurred. In yet another embodiment, detecting a termination event may include determining when participation changes from active to inactive to determine when a participation event has occurred. In an alternative embodiment, a cellular network may be used to notify the conference bridge that a specific caller dropped out of the conference because of lose of cellular coverage in the area from which he connected to the conference.
In act 720, the participant communication device may transmit a termination event message. The termination event message may include a time stamp and/or conference participant identification. The time stamp may be used to ensure that the correct portion of the media conference is transmitted to the conference participant. The conference participant identification may be used to ensure that the participant receives the correct portion of the media conference.
In act 730, the participant may receive a recorded conference message in response to the termination event message. The recorded conference message may include recorded media conference data. In one embodiment, the recorded media conference data includes a link to all or some of the recorded media conference. In another embodiment, the recorded media conference data includes all or some of the recorded media conference. For example, when the termination event message includes a timestamp, the recorded media conference data may include the recorded media conference beginning from the timestamp, beginning shortly after the timestamp, or beginning a programmable amount of time before the timestamp. As a result, the media conference may be recorded beginning at a time that is near the time that the termination event occurred.
FIG. 8 illustrates one embodiment of a method 800 for recording a media conference. The method 800 includes establishing a media conference for conference participants 810; receiving a termination event message from a conference participant 820; recording a media conference 830; and transmitting a recorded conference message to the participant communication device 840. The acts may be performed in the order shown or a different order. The method 800 may include additional, different, or fewer acts. For example, the method 800 may include only acts 810, 820, and 830.
In act 810, a conference server may establish a media conference. Conference participants may join the media conference. In act 820, the conference server may receive a termination event message from a conference participant. The termination event message may indicate that a termination event was detected. The termination event message may include a timestamp and conference participant identification. In act 830, the conference server may record the media conference. The conference server may record all or some of the media conference. Recording may take place prior to reception of the termination event message or after reception. Recording may be triggered by the termination event message. For example, the conference server may begin recording the media conference upon receiving the termination event message. In act 840, the conference server may transmit a recorded conference message to the conference participant. The recorded conference message including recorded media conference data. In one embodiment, recorded media conference data includes a link to all or some of the recorded media conference. In another embodiment, recorded media conference data includes all or some of the recorded media conference. For example, when the termination event message includes a timestamp, the recorded media conference data may include the recorded media conference beginning from the timestamp.
Various embodiments described herein can be used alone or in combination with one another. The foregoing detailed description has described only a few of the many possible implementations of the present invention. For this reason, this detailed description is intended by way of illustration, and not by way of limitation.
| 2019-04-23T20:10:33 |
http://www.patentsencyclopedia.com/app/20110090822
|
0.997371 |
The sun shines in the day, The moon shines in the night. You shine in my heart every day and night.
You're my everything, without you I'm nothing. If I have you I have everything, without you I have nothing.
I asked God for a minute and he gave me a day. I asked God for a flower and he gave me a bouquet. I asked God for love and he gave me that too. I asked God for an angel and he gave me you!
God bless thee and put meekness in thy mind, love, charity, obedience, and true duty.
Each age has deemed the new born year The fittest time for festal cheer.
Forty is the old age of youth fifty is the youth of old age.
Best Wishes and Warmest Thoughts.
I've never looked forward to a birthday like I'm looking forward to my new daughter's birthday, because two days after that is when I can apply for reinstatement.
Dear son/daughter - today is the day that bonded us eternally together to spread the Light of Love in the Universe.
Age is not about turning older as the time passes, but growing mature with new insights brought by experience.
May the sun always shine on your windowpane,<br/> May a rainbow be certain to follow each rain,<br/> May the hand of a friend always be near you,<br/> May God fill your heart with gladness to cheer you!
The beauty of a woman is not in the clothes she wears, the figure that she carries, or the way she combs her hair. The beauty of a woman is seen in her eyes, because that is the doorway to her heart, the place where love resides. True beauty in a woman is reflected in her soul. It's the caring that she lovingly gives, the passion that she shows & the beauty of a woman only grows with passing years.
| 2019-04-26T10:29:45 |
https://decentquotes.com/birthday-3
|
0.999999 |
Is Penrose's formula wrong here? Should it be tan, rather than cot?
According to the standard polar coordinates as shown in Fig. 22.16 (p.563), theta=0 corresponds to the (x,y,z) point (0,0,1) - the North pole of the Riemann sphere.
Normally in stereographic projection, the north pole of the Riemann sphere maps to the origin of the complex plane. That's what you get if you use tan.
Using cot gives you a 'reflected' stereographic projection, where the south pole of the Riemann sphere maps to the origin, and the North pole to infinity.
Perhaps that's the convention in general relativity theory, but since it contradicts the conventions established earlier in the book, I'd have expected Penrose to mention it if that were the case...?
In this exercise (18.11), Penrose is using the convention where the stereographic projection is from the North pole.
On page 144 paragraph 8.3 he is using projection from the south pole in figure 8.7(a) and from the north pole in figure 8.7(b).
Another potentially confusing thing is that in America the roles of \theta and \phi are reversed in the definition of spherical polar coordinates. The American convention has the advantage that \theta remains in the complex plane and so coincides with the normal notation for complex numbers. Penrose is using the UK convention for spherical polar coordinates in this exercise and on page 563 figure 22.16.
See Visual Complex Analysis by Tristan Needham chapter 3 section IV paragraph 5 where the American convention is used by a UK author for the reasons I gave above.
So to sum up Penrose is not being inconsistent, since on page 144 he talks about both projections, but I think it would be less confusing if authors stated which conventions they are using when quoting formulae.
There are two conventions involved here - the spherical polar coordinate convention and the north or south pole convention.
| 2019-04-26T12:04:09 |
http://legacy.roadtoreality.info/archive/viewtopic.php%3Ff=5&t=1917.html
|
0.999837 |
A. One-time depositers - This is your only shot, if you lose your bankroll you are done, this includes No Deposit Poker Players.
B. Multiple depositers - If you lose your initial investment, you can reload your account.
It's necessary to figure out which player you will be because this does affect your bankroll management. Those in Group A will have to be much more conservative with their bankroll than those in Group B.
Believe it or not, over 90% of players who deposit money onto a poker site do not make money, they eventually lose their initial stake. I can tell you that out of these players, about 0% of them practiced proper bankroll management. Please do not be THAT guy who complains about bad beats at $100NL and busting his roll because that's all he had.
So what are the requirements for Group A? Here is a pretty basic template.
1. You must have AT LEAST 2500 Big Blinds (25 full 100bb buy-ins) to play regularly at any given level.
2. You are allowed to try the next level ("take a shot") once you have 2000 Big Blinds (20 full 100bb buy-ins) for that level.
3. If you take a shot and are unsuccessful you must return to your lower level when you have 3000 Big Blinds for the lower level (30 full 100bb buy-ins).
4. If you ever drop below 1500 Big Blinds for you regular level you must drop down to the level below you.
1. You must carry 300 Big Bets (2x the Big Blind) for your regular level.
2. To take a shot at the next level you must have at least 200 Big Bets for that level.
3. You must move down once you have lost 50 Big Bets during your "shot".
4. You must move to the level below you if you fall under 200 Big Bets for your regular level.
1. You must carry 600 Big Bets (2x the Big Blind) for your regular level.
2. To take a shot at the next level you must have at least 400 Big Bets for that level.
3. You must move down once you have lost 100 Big Bets during your "shot".
4. You must move to the level below you if you fall under 400 Big Bets for your regular level.
1. You must carry 45 buyins for your regular level.
2. To take a shot at the next level, you must have at least 30 buyins for that level.
3. You must move down once you have lost 10 buyins during your "shot".
4. You must move to the level below you if you fall under 45 buyins for your regular level.
1. You must carry 100 buyins for your regular level.
2. To take a shot at the next level, you must have at least 75 buyins for that level.
3. You must move down once you have lost 15 buyins during your "shot".
4. You must move to the level below you if you fall under 100 buyins for your regular level.
If you follow this BR management template you will never go broke, that is my promise to you. If you tilt, chase losses, move up too quickly your chances of going broke rapidly increase. Poker is a long-term game, take your time and you will get to where you want to be. We are not here for tomorrow, we're here forever.
| 2019-04-25T14:08:14 |
https://www.grinderschool.com/articles/bankroll-management
|
0.998539 |
I would like to be able to name custom crops in Lightroom. Saving them as ratios is great but one step further would be the ability to give them a relative name for certain projects or uses.Perhaps also not limit me to 5 custom ratios.
This reply was created from a merged topic originally titled Sticky custom aspect ratios.
The last five custom aspect ratios are listed when cropping, but these drop off the bottom of the list when a new one is created. It would be great to be able to save particular frequently used aspect ratios and name them.
This reply was created from a merged topic originally titled How to delete custom crop settings in Lightroom CC?.
Is there any way to delete or rename them?
This reply was created from a merged topic originally titled Custom crop ratio list not editable.
In LR, there's absolutely no possibility to edit the custom cropping ratios. Which is already a problem that should have been fixed since a long time. Now let's assume that the stacking mechanism managing these custom ratios (5 entries max and first in first out management) is corrupted and stuck. What can you do ? If you are a user with no database management skills, nothing. Period.
Strangely enough, these settings are not stored in the preference file where they could at least be manually edited but in the catalog, a SQLite database. If you can deal with an SQLite management tool, you will be able to fix the problem. The relevant information can be found in the table named Adobe_variablesTable, entry named Adobe_customCropAspects.
Maybe it's time for Adobe to make this feature more usable ?
I cannot enter a portrait ratio 3x4 - it will immediately revert it back to 4x3. Very irritating and annoying. I am paying money every month, but then Adobe forces me to use other programs for as simple a task as cropping out a portrait size.
For some reason I had become stuck on achieving it with a custom preset, probably because I was preoccupied with other preset issues.
Click on OK after you are done with your changes.
Many thanks Patrick, very clear instructions. I can see when it would be useful to do this and I'll retain these instructions should I need them.
But I have a large number of crop sizes to keep track of. I need to label each pair and hopefully group them in a folder type structure by company name like the Export module. Without a text label I would not remember which application each dimension belongs to and still need to keep a written list.
Another option is my Any Crop plugin, which lets you create named crop presets. Not as convenient as having it built-in to LR, though.
I have now tried Any Crop plugin. It does allow me to add and name crops which is good. But I didn't find it that comfortable to use and for some unknown reason the ratios wouldn't hold, even with the crop padlock switched on. I'll wait (and wait and wait) for LR to add an enhancement to their standard crop function.
Even after cropping to the required ratio one still needs to match this with the export command to create the final JPG. I guess it would be too much to ask Adobe to also add an option to automatically pre-select a specific export preset for an image when one has chosen a named crop.
So I guess what I would like to see is a crop dialogue where one creates a named crop ratio, save this in a named folder structure and optionally both sets the crop padlock on and selects a specific export preset when exporting. I'm not sure how this would work on a batch export of mixed export presets so I'll leave that up to the Adobe experts.
"But I didn't find it that comfortable to use and for some unknown reason the ratios wouldn't hold, even with the crop padlock switched on."
If you could email with details about this to the support address on Any Crop's Web page, I would greatly appreciate this, thanks.
Let us NAME the aspect ratios already. "folder", "Name" and aspect ratio; "Description"; eg. 1. "Frames", "13x18 cm"; 2. Frames", "13x18 cm with matte", "matte opening 11x15"; 3. Social Media / Facebook, "828 x 315 px ratio", Facebook cover photo; 4. "Frames", "50x70 cm", IKEA #502.688.74 with matte opening 40x50. Matte is asymmetric. Better for portrait orientation etc.
The original message of this thread was posted 7 years ago. Can you believe this ?
Too many fans of Marilyn Monroe and Billy Wilder at Adobe. In France, "The seven year itch" picture was titled "7 ans de réflexion" (seven years of reflection). Hey guys ! Still watching ?
I think this forum is more of a place for users to bit*h and moan, and less of a place for Adobe to listen.
I posted in the thread on the official support thread (a seemingly logical course of action to me as a customer) and was advised to come here to vote. Sending me to a third-party platform to sign up and post just doesn't seem like an adequate response.
In a more constructive tone, my recommendation would be for a simple Folder > Item : Values system that could be easily integrated with a JSON structure.
I've since achieved this with Sketch, though it would have be better to not have to manage my workflow across two programs.
You can prepare print presets with these formats and print them in .jpg files, why absolutely want to create cropping presets while the printing module can very well do it and at the same time, you will be able to record its "impressions" as collections, it's more practical, it will allow you to find them easily in the catalog LR Classic!
Vous pouvez préparer des presets d'impression avec ces formats et les imprimer dans des fichiers .jpg, pourquoi vouloir absolument créer des presets de recadrage alors que le module d'impression peut très bien le faire et par la même occasion, vous pourrer enregistrer ses "impressions" comme des collections, c'est plus pratique, ça vous permettra de les retrouver facilement dans le catalogue LR Classic !
The Any Crop plugin lets you create named crops. It also lets you prepare multiple crops for a set of photos all at once, in batch, which you can then individually adjust if needed.
| 2019-04-24T22:24:03 |
https://feedback.photoshop.com/photoshop_family/topics/name_custom_crops_in_lightroom?topic-reply-list%5Bsettings%5D%5Bfilter_by%5D=all&topic-reply-list%5Bsettings%5D%5Breply_id%5D=19890570
|
0.998806 |
Too Little, Too Late on Haditha?
Three Marine officers are being stripped of command, in the first disciplinary action taken as a result of a massacre in Haditha, a town in Western Iraq, first reported by TIME. But the action will be seen by many Iraqis as too little, too late. And it doesn't help that the Marines' announcement is vague and very short on detail, raising more questions than it answers.
The Associated Press is reporting that three Marines have been relieved of command and reassigned "in connection with problems during their deployment to Iraq, including their battalion's actions during [the Haditha killings last November]." A spokesman for the First Marine Division, at Camp Pendleton in California, said that the three officers were reassigned because of a "lack of confidence in their leadership abilities," but no charges have been filed against them.
The Marines named are Lt. Col. Jeffrey R. Chessani, commanding officer of 3rd Battalion, 1st Marine Regiment; Capt. James S. Kimber, commanding officer of Company I, 3rd Battalion, 1st Marine Regiment; and Capt. Lucas M. McConnell, commanding officer of Company K, 3rd Battalion, 1st Marine Regiment.
In Haditha, where a Marine patrol killed 15 civilians on the morning of Nov 19, the news is certain to be greeted with mystification and scepticism. Although the U.S. military has described the killings as "collateral damage," many residents believe the Marines acted deliberately and maliciously after one of their own was killed in a roadside explosion. The mere reassignment of duties of three officers is unlikely to be seen as justice done.
No more details have been released about why Chessani, Kimber and McConnell were picked out for reassignment, whether they will be charged of wrongdoing, ans if other Marines will be punished as well.
The Marine spokesman said the decision to reassign the officers was taken independently of an ongoing investigation by the Naval Criminal Investigative Service criminal probe. The NCIS, which must determine whether the Marines broke the rules of military engagement in Haditha, is expected to submit its report any day now.
| 2019-04-22T00:24:56 |
http://content.time.com/time/world/article/0,8599,1182366,00.html
|
0.999647 |
If you're looking for a working definition of nirvana in 14 syllables, try this: "Days of Heaven in restored 35mm." I have never seen this film on the big screen before; in fact, I probably haven't watched my video copy in three or four years. I ask you then: is there any better feeling than seeing a vaunted classic that is also a treasured favorite, and discovering that it's even more august and haunting and layered and imaginative than you had recalled? From those opening rainwater arpeggios and the sere, sepia photographs that dissolve into each other beneath the serifs of the titles, the film is a masterpiece even by comparison to most masterpieces. My response to the film, my immersion in its images, sounds, and tensions, were things that I felt in my body, my fingers and chest. I literally pressed my toes into the rubber soles of my shoes when Richard Gere shoveled that first mound of coal into that belching, blazing stove, and then dug in my heels, too, as he accosted his foreman. The scenes of threshing the wheatfield and of fighting off the swarming locusts stirred me at an almost glandular level. It's that kind of movie, a sensory state into which you accede, entirely.
Moments before I headed into the 7:30 showing, I learned from an e-mail that by tomorrow morning, I have to generate a list of texts for a 20th-century American literature survey course I'll be teaching next Spring. This seemed like a tall order, but then watching Days of Heaven conjured every thought and feeling I've ever had about this country and its distinctive ways of remembering, tilling, loving, divorcing, stratifying, illuminating, and abandoning itself. The whole syllabus suddenly came to me in a flash, as did ideas for two other courses I'd never even considered. Funny how the creative vision of a genuine artist can awaken and elevate a dormant brain into such sudden and wide-ranging epiphanies.
Image © 1978 Paramount Pictures, reproduced here.
Right on. Those "rainwater arpeggios", by the way, are the most beautiful thing Ennio Morricone never wrote: it's "Aquarium" from Saint-Saëns' Carnival of the Animals. I'm not sure whether to envy or pity Malick's composers -- they get the credit, but it's S-S, Fauré, Mozart and Wagner who put in the hours!
Days of Heaven did that for me, too, when I saw it three years ago: watching it, a whole second book project arrived as if bestowed upon me.
One day there should a two day Malick event in New York City. His movies are meant to be seen in theatres.
I saw The New World in the cinema just a few days ago (it was only released here last week, i saw it opening day) and it was glorious on the big screen. I hope to one day see Days of Heaven like you have. It's in my top 10 of all-time and DVD is just not enough.
Nick, where do you get the wonderful stills you use on your blog and your website? Do you have a secret supplier or do you make them yourself?
@Tim: As so often, thanks for saving me from myself. I'm so musically ignorant that I'm liable to give credit to anyone for anything. I do love the music, though. And here's a curio: a hip-hop-soul track built on top of an "Aquarium" sample. Creative inspiration or velvet painting? You decide.
@All Days of Heaven fans: The pleasures of community! I love this movie even more, the more I think about it.
@Anonymous: Secret image suppliers?... If only I were so connected. The images I use are all, for the most part, taken from publicity sites like the OutNow! Image Galleries or About.com, all linked from the "Photographs" tab on IMDb; or, for older movies, from DVD-review or screen-capture sites like DVDBeaver; from random Google image searches; or, on occasion, from screen captures on my own DVDs. Anything more complicated or better-connected than this I wouldn't even understand.
| 2019-04-19T02:41:33 |
http://blog.nicksflickpicks.com/2006/05/one-night-in-heaven.html
|
0.997 |
You probably know of classic films like Rocky, Carrie or One Flew Over the Cuckoo's Nest, but you might not know a San Antonio woman played a big part in their production.
SAN ANTONIO — The word "no" is powerful. It can shatter a dream or extinguish desires. It's easy, and natural to be scared of the word - unless you're absolutely fearless.
Marcia Nasatir says, by all accounts, she was born with bravery in her bones.
"I'd like to quote my mother, she said 'Marcia's not afraid of the devil,'" she explained.
Because of that, she's never simply done what's expected of her, starting when she was just a kid.
"My brother went to school and I learned what he learned. And that was looked down upon because I hadn't learned the way they teach reading in school," Nasatir said.
As she grew older, she her decisions to stray from the norm were much more evident. She went to college - only to drop out to marry a man at her university.
"I married a fellow student, because my parents didn't want me to," she said.
The marriage lasted just a few years, before the pair divorced - something that wasn't common back then.
"I was a single mom with two young children," Nasatir recalled. "I needed to get a job."
Marcia looked for jobs across the country, latching onto opportunities that took her from coast to coast.
"I never say 'no.' I always say 'yes.' Because if it doesn't work out, there would be another opportunity," Nasatir said.
Eventually, Marcia - who had once gotten in trouble for her love of reading - found work that required it in Hollywood. She worked in the story department, and her job was to read magazines, books, and newspapers to find ideas for movies.
With her tenacity, it didn't take long for an opportunity to head the story department to come her way. But just accepting that responsibility would have been far too easy.
"I said I would not take the job unless I had a title as Vice President in charge of the story department. And the answer was, 'Well so-and-so isn't a Vice President.' And I said that is his problem, I would not take the job," she explained.
Marcia was so valuable, she was eventually given that Vice President title, making her the first female Vice President in Hollywood. That prompted other production houses like Paramount and Universal to give other women those top-tier jobs.
"I'm proudest of having the courage to say no," Nasatir said. "That's what I wished every young person understood. It's not the worst thing to have no said to you."
The word "no" can be used to end a journey. But Nasatir hopes to teach us that with a little bravery, you can use that word to start them.
| 2019-04-24T20:04:29 |
https://www.kens5.com/article/entertainment/jefferson-high-alum-makes-history-in-hollywood/273-616337063
|
0.999994 |
Is 70 or 91 percent alcohol a better disinfectant?
The percentages refer to the relative amount of alcohol as compared to the amount of water. 70% alcohol is 30% water. 91% alcohol is 9% water. Which is a better disinfectant depends somewhat on how it is used, but 70% alcohol will tend to disinfect much more effectively than 90%+ alcohol. This is particularly true for the disinfection of surfaces, including human skin.
This may seem counter-intuitive, but the reason has to do in part with the fact that alcohol evaporates much more quickly than water. With the 70% solution, evaporation tends to be slower (due to higher water content), and therefore the alcohol will have more time to kill microorganisms. In other words, the 91% solution has a higher tendency to evaporate before all susceptible microorganisms are killed. This is the primary reason that 70% alcohol tends to be a more effective disinfectant for surfaces than 90-91% alcohol.
The 70% solution also helps to ensure that the alcohol enters the cells of microorganisms, rather than just rapidly disrupting the cell walls and doing nothing further, which is what tends to happen with 90%+ alcohol solutions.
Also, the greater relative concentration of water in the 70% alcohol solution means that more proteins--and more types of proteins--in microorganism cells will be denatured (i.e. destroyed). This is because water plays an important role in the destruction of proteins.
This should not be taken to mean that 91% alcohol is not an effective disinfectant; it is. But for maximum efficacy, I would recommend 70% alcohol. If disinfection is a primary concern, you definitely do not want to go above 91%, in any case.
So as we can see, one should not simply see the bigger number and make assumptions based on that.
| 2019-04-18T14:52:17 |
https://www.answers.com/Q/Is_70_or_91_percent_alcohol_a_better_disinfectant
|
0.99922 |
And the obvious: you don't know that all of Nakamoto's coins fit the standard assumed profile. It's entirely possible they intentionally mined some with the regular setup and are spending a few from that pool.
I'm not aware of any legal implications in the US. US gambling laws basically only apply when there is a "house" taking a cut or betting to their own advantage or similar. Bets between friends where someone wins the whole stake are permitted.
As for the shady implications... spend more time hanging out with aspiring rationalists and their ilk?
The richer structure you seek for those two coins is your distribution over their probabilities. They're both 50% likely to come up heads, given the information you have. You should be willing to make exactly the same bets about them, assuming the person offering you the bet has no more information than you do. However, if you flip each coin once and observe the results, your new probability estimate for next flips are now different.
For example, for the second coin you might have a uniform distribution (ignorance prior) over the set of all possible probabilities. In that case, if you observe a single flip that comes up heads, your probability that the next flip will be heads is now 2/3.
Well, in general, I'd say achieving that reliability through redundant means is totally reasonable, whether in engineering or people-based systems.
At a component level? Lots of structural components, for example. Airplane wings stay attached at fairly high reliability, and my impression is that while there is plenty of margin in the strength of the attachment, it's not like the underlying bolts are being replaced because they failed with any regularity.
I remember an aerospace discussion about a component (a pressure switch, I think?). NASA wanted documentation for 6 9s of reliability, and expected some sort of very careful fault tree analysis and testing plan. The contractor instead used an automotive component (brake system, I think?), and produced documentation of field reliability at a level high enough to meet the requirements. Definitely an example where working to get the underlying component that reliable was probably better than building complex redundancy on top of an unreliable component.
You might also want a mechanism to handle "staples" that individuals want. I have a few foods / ingredients I like to keep on hand at all times, and be able to rely on having. I'd have no objections to other people eating them, but if they did I'd want them to take responsibility for never leaving the house in a state of "no X on hand".
Those numbers sound like reasonable estimates and goals. Having taught classes at TechShop, that first handful of hours is important. 20 hours of welding instruction ought to be enough that you know whether you like it and can build some useful things, but probably not enough to get even an intro-level job. It should give you a clue as to whether signing up for a community college class is a good idea or not.
Also I'm really confused by your inclusion of EE in that list; I'd have put it on the other one.
However, I'm skeptical of systems that require 99.99% reliability to work. Heuristically, I expect complex systems to be stable only if they are highly fault-tolerant and degrade gracefully.
On the other hand... look at what happens when you simply demand that level of reliability, put in the effort, and get it. From my engineering perspective, that difference looks huge. And it doesn't stop at 99.99%; the next couple nines are useful too! The level of complexity and usefulness you can build from those components is breathtaking. It's what makes the 21st century work.
I'd be really curious to see what happens when that same level of uncompromising reliability is demanded of social systems. Maybe it doesn't work, maybe the analogy fails. But I want to see the answer!
What happens when the committed scorched-earth-defender meets the committed extortionist? Surely a strong precommitment to extortion by a powerful attacker can defeat a weak commitment to scorched earth by a defender?
It seems to me this bears a resemblence to Chicken or something, and that on a large scale we might reasonably expect to see both sets of outcomes.
What's that? If I don't give into your threat, you'll shoot me in the foot? Well, two can play at that game. If you shoot me in the foot, just watch, I'll shoot my other foot in revenge.
On the other hand... what level do you want to examine this at?
We actually have pretty good control of our web browsers. We load random untrusted programs, and they mostly behave ok.
It's far from perfect, but it's a lot better than the desktop OS case. Asking why one case seems to be so much farther along than the other might be instructive.
Take a modern milling machine. Modern CNC mills can include a lot of QC. They can probe part locations, so that the setup can be imperfect. They can measure part features, in case a raw casting isn't perfectly consistent. They can measure the part after rough machining, so that the finish pass can account for imperfections from things like temperature variation. They can measure the finished part, and reject or warn if there are errors. They can measure their cutting tools, and respond correctly to variation in tool installation. They can measure their cutting tools to compensate for wear, detect broken tools, switch to the spare cutting bit, and stop work and wait for new tools when needed.
Again, I say: we've solved the problem, for things literally as simple as pounding a nail, and a good deal more complicated. Including variation in the nails, the wood, and the hammer. Obviously the solution doesn't look like a fixed set of voltages sent to servo motors. It does look like a fixed set of parts that get made.
How involved in the field of factory automation are you? I suspect the problem here may simply be that the field is more advanced than you give it credit for.
Yes, the solutions are expensive. We don't always use these solutions, and often it's because using the solution would cost more and take more time than not using it, especially for small quantity production. But the trend is toward more of this sort of stuff being implemented in more areas.
The "normal computer control problem" permits some defects, and a greater than 0% error rate, provided things don't completely fall apart. I think a good definition of the "hammer control problem" is similar.
It bends the nails, leaves dents in the surface and given the slightest chance will even attack your fingers!
We've mostly solved that problem.
I'm not sure that being able to nearly perfectly replicate a fixed set of physical actions is the same thing as solving a control problem.
It's precisely what's required to solve the problem of a hammer that bends nails and leaves dents, isn't it?
I think that's outside the scope of the "hammer control problem" for the same reasons that "an unfriendly AI convinced my co-worker to sabotage my computer" is outside the scope of the "normal computer control problem" or "powerful space aliens messed with my FAI safety code" is outside the scope of the "AI control problem".
It is worth noting that the type of control that you mention (e.g. "computer-controlled robots") is all about getting as far from "agenty" as possible.
I don't think it is, or at least not exactly. Many of the hammer failures you mentioned aren't "agenty" problems, they're control problems in the most classical engineering sense: the feedback loop my brain implements between hammer state and muscle output is incorrect. The problem exists with humans, but also with shoddily-built nail guns. Solving it isn't about removing "agency" from the bad nail gun.
They usually don't have any way to leverage their models to increase the cost of not buying their product or service though; so such a situation is still missing at least one criterion.
Modern social networks and messaging networks would seem to be a strong counterexample. Any software with both network effects and intentional lock-in mechanisms, really.
And honestly, calling such products a blend of extortion and trade seems intuitively about right.
Schelling gives us definitions of promises and threats, and also observes there are things that are a blend of the two. The blend is actually fairly common! I expect there's something analogous with extortion and trade: you can probably come up with pure examples of both, but in practice a lot of examples will be a blend. And a lot of the 'things we want to allow' will look like 'mostly trade with a dash of extortion' or 'mostly trade but both sides also seem to be doing some extortion'.
We've (mostly) solved the hammer control problem in a restricted domain. It looks like computer-controlled robots. With effort, we can produce an entire car or similar machine without mistakes.
Obviously we haven't solved the control problem for those computers: we don't know how to produce that car without mistakes on the first try, or with major changes. We have to be exceedingly detailed in expressing our desires. Etc.
This may seem like we've just transformed it into the normal computer control problem, but I'm not entirely sure. Air-gapped CNC machinery running embedded OSes (or none at all) is pretty well behaved. It seems to me more like "we don't know how to write programs without testing them" than the "normal computer control problem".
I think this comment is the citation you're looking for.
We might also want to compute the sum of the GDP of A and B: does that person moving cause more net productivity growth in B than loss in A?
Possibly a third adversarial AI? Have an AI that generates the questions based on P, is rewarded if the second AI evaluates their probability as close to 50%, is rewarded for the first AI being able to get them right based on P', and for the human getting them wrong.
That's probably not quite right; we want the AI to generate hard but not impossible questions. Possibly some sort of term about the AIs predicting whether the human will get a question right?
That seems amazingly far from a worst case scenario.
Have you read Politics is the Mind-Killer? I get the vague sense you haven't, and I see lots of references here to it but no direct link. If you haven't, you should go read it and every adjacent article.
Edit: actually there is a link below already. Oops.
I strongly favor this project and would love to read more on the subject. I'm hopeful that its online presence happens here where I'm likely to read it, and that it doesn't vanish onto Tumblr or Facebook or something similarly inaccessible.
I notice that I (personally) feel an ugh response to link posts and don't like being taken away from LW when I'm browsing LW. I'm not sure why.
I do too. I don't know all the reasons, but one is simply web page design. The external page is often slow to load and unpleasant to read in comparison. This often comes with no benefit relative to just having the text in the post on LW.
Additionally, I assume that authors on other sites are a lot less likely to engage in discussion on LW, whether in comments or further posts. That seems like a big minus to me.
perfect rationality means to me more rational than any other agent. I think that is a reasonable definition.
Surely that should be "at least as rational as any other agent"?
I think you're pessimistic about tech regression.
It doesn't take all that much more beyond that to get to some mix of 17th to 19th century tech. Building a useful early 19th-century machine shop is the work of one or two people, full time, for several years. Even in the presence of scavenging, I think such technology is useful enough that it won't take that long to be worth spending time on.
Basically I think anything that's survivable is unlikely to regress to before 17th century tech for a period longer than a few years.
Agreed. It's silly. This site needs more active tending in general, in my opinion.
In the mean time, you can bookmark this link.
It's weird, but it's not quite the same as bounded utility (though it looks pretty similar). In particular, there's still a point in saying it has double the utility even though you sometimes won't accept it at half the utility. Note the caveat "sometimes": at other times, you will accept it.
Suppose event X has utility U(X) = 2 U(Y). Normally, you'll accept it instead of Y at anything over half the probability. But if you reduce the probabilities of both* events enough, that changes. If you simply had a bound on utility, you would get a different behavior: you'd always accept X and over half the probability of Y for any P(Y), unless the utility of Y was too high. These behaviors are both fairly weird (except in the universe where there's no possible construction of an outcome with double the utility of Y, or the universe where you can't construct a sufficiently low probability for some reason), but they're not the same.
In practice, the symmetry constraint isn't as nasty as it looks. For example, you can do MH to sample a random node from a graph, knowing only local topology (you need some connectivity constraints to get a good walk length to get good diffusion properties). Basically, I posit that the hard part is coming up with a sane definition for "nearby possible world" (and that the symmetry constraint and other parts are pretty easy after that).
That's not true. (Though it might well be in all practical cases.) In particular, there are good algorithms for sampling from unknown or uncomputable probability distributions. Of course, any method that lets you sample from it lets you sample the parameters as well, but that's exactly the process the parent comment is suggesting.
Yes, I suppose my comment wasn't clear. There are twice as many distinct prices as there should be, not 4x. There should only be one price per candidate (plus an additional price for "other" in many cases). The "buy no" price for a single candidate should be equal to the sum of the "buy yes" prices for all the other candidates, and that relationship should be fully enforced by the exchange.
You can build systems that preserve sum of probabilities = 1. They'll still see bias away from the extremes, because of fees and because of time value of money. But you can do a lot better than PredictIt. (One thing that helps on the fees side is to make fees go down for trades near the extremes; I argued for that in detail on Augur here.
Even so, at the moment there are sane interest rates available if you tie up your money that way. It's not just the lack of netting; it's the lack of netting, combined with the small deposit limits, combined with the high withdrawl fees. Fix any of those, and you'd see more arbitrage (I think).
Also, they have a really dumb system where each candidate has both yes and no shares, instead of each election having shares per candidate. Which means there are more different prices than there should be, and no system-enforced rule that the sum of the probabilities = 1.
Idea Futures is still running (play money), but is functionally nearly dead and has very low liquidity. Once upon a time it was the best option for play money markets, and quite good.
Fairlay is a half-decent (though centralized) crypto market, though it's structured as a "betting market" and has no way to sell back predictions at a profit or a loss (you can place later predictions to hedge your risk equivalently, but you end up tying up a lot of money). Liquidity is bad.
BitBet runs some sort of weird time-weighted pari-mutuel system that I don't like, and has a lot of complaints about shady operations (eg very, very bad customer support that results in people losing money due to interface mistakes), but they often have actual liquidity.
As far as I can discern, the current state of things is abysmal, but I'm pretty optimistic about Truthcoin (less so about Augur in some ways, but optimistic there too).
Worth noting that PredictIt's odds should give you pause: there's money on the table betting "No" on all the presidential candidates, and I find it concerning that they can't interest anyone in arbitraging that away.
That's an excellent practical example, though it doesn't really have the explicit probability math I was hoping for.
In particular, I like that you'll see stuff like which player thinks the partnership has the better contract flips back and forth, especially around auctions involving controls, stops, or other specific invitational questions. The concept of evaluating your hand within a window ("My hand is now very weak, given that I opened") is also explicitly reasoning about what your partner infers based on what you told them.
I think the most important thing here might be that bridge requires multiple rounds because bidding is limited bandwidth, whereas giving a full-precision probability estimate is not.
Here's how that goes. I flip 3 coins. Say I get 2 heads. My probability estimate for "there are 4+ heads total" is now 4/8 (the probability that 2 or 3 of your coins are heads). For the full set of outcomes I can have, the options are: (0H, 0/8) (1H, 1/8) (2H, 4/8) (3H, 7/8). You perform the same reasoning. Then we each share our probability estimates with the other. Say that on the first round, we each share estimates of 50%. Then we can each deduce that the other saw exactly two heads, and on the second round (and forever after) both our estimates become 100%. For all possible outcomes, my first round probability tells you exactly how many heads I flipped, and vice versa; as soon as we share probabilities once, we both know the answer and agree.
I still don't see any version of this that's simpler than Finney's that actually makes use of multiple rounds, and when I fix the math on Finney's version it's decidedly not simple.
What change would you make that results in multiple rounds being required?
For example, if each player flips multiple coins, and then we share probability estimates for "all coins heads" or "majority of coins heads" or expectations for number of heads, in each case the first time I share my summary, I am sharing info that exactly tells the other player what information I have (and vice versa). So we will agree exactly from the second round onwards.
But then everyone has the exact some information, right? I'm specifically looking for something that's like Hal Finney's game, in that the different players have different information, and communicate some different set of information (some sort of knowledge about the state of the world, like their posteriors on the joint data).
That seems like fertile ground for exploration, but no probability / agreement variation immediately springs to mind. Did you have something specific in mind?
I'm looking for a good demonstration of Aumann's Agreement Theorem that I could actually conduct between two people competent in Bayesian probability. Presumably this would have a structure where each player performs some randomizing action, then they exchange information in some formal way in rounds, and eventually reach agreement.
So, what I'd like: a version that (with at least moderate probability) continues for multiple rounds before agreement is reached; where the information communicated is some sort of simple summary of a current estimate, not the information used to get there; where the math at each step is simple enough that the game can be played by humans with pencil and paper at a reasonable speed.
Alternate mechanisms (like players alternate communication instead of communicating current states simultaneously) are also fine.
But being unable to disengage from the Big Problems and live your little ordinary life is not heroism, and it actively gets in the way of solving any of those Big Problems.
Not my Big Problems; they get solved from doing just that.
How do you know? The question isn't whether obsessing fixes the problem; it's whether taking breaks speeds up the overall process. You don't need tons of hours to fix the problem; as you said earlier, a few minutes to explain the right insight is quite sufficient. What you actually need is the right few minutes of work, spent finding the right key insights.
Thinking longer about a problem is only helpful to the degree it produces new insights. As you've found, this can be very inefficient. If taking a break and not worrying about an unsolved problem increases the efficiency of future problem-solving even a little bit, it could well be worth it.
If you squint a bit, your version sounds a lot like "we're going to create a lot of value for a lot of people, in a way that is neatly measured in dollars, and therefore we can't possibly make a for-profit company." That is... really weird, from where I sit.
Alternate perspective: if you're creating a lot of value for a lot of people, but you can't extract any of it to compensate yourself for the infrastructure you build and the risks you take building it, are you actually really sure you're creating as much value as you thought you were?
Are you saying Dyson spheres are inefficient as computational substrate, as power collection, or both?
Because to me it looks like what you actually want is a Dyson sphere / swarm of solar collectors, powering a computer further out.
What problems are your trying to solve? Knowing you have ADHD is useful because it offers insight into what solutions will work well. For example, it might offer suggestions as to what medications might produce useful results.
IR from waste heat should cold to warm black bodies radiating a lot of heat over a large area. It should have relatively few spectral lines. It might look a bit like a brown dwarf, but the output from a normal star is huge compared to a brown dwarf, so it should look like a really huge brown dwarf, which our normal models don't offer a natural explanation for.
Why would you expect to not see infrared emissions from them?
I like the index cards approach. I worry that the poker chips start making things distracting, which will discourage their use or reduce their effectiveness.
One technique we've used with moderate success is to pass a clipboard around. People can jot down notes, or conversational ideas that are tangentially related or unrelated. Sometimes that provides a convenient way for someone else to say "hey, what's this thing you wrote down about?".
It also could let you list your three things to talk about in a breadth-first manner rather than talking about each one sequentially.
It probably sounds like a better idea than it is in practice; the clipboard gets stuck when holders get distracted, or people still refrain from bringing things up, or whatever. But you might try it out anyway!
| 2019-04-24T04:20:18 |
https://lw2.issarice.com/users/evand
|
0.999888 |
What is the color temperature of this step light? I'm looking for 3000k but can only seem to find 5000k.
Our Nightlight receptacles are 6000K We do not offer a 3000K nightlight.
| 2019-04-23T17:10:02 |
https://www.legrand.us/radiant/products/outlets/ntlhorzwcc6.aspx
|
0.999263 |
Are you against facial wrinkles, injection of botulinum toxin or hyaluronic acid?
People who want to rejuvenate their face without having to go through plastic surgery can turn to injections of filling products. Before choosing your anti-wrinkle treatment, here's what you need to know about hyaluronic acid and botulinum toxin, two solutions that can quickly and significantly slow the effects of time on your face and neck.
Botox, which is one of the trade names for botulinum toxin, is used to reduce or prevent the appearance of wrinkles, mainly forehead wrinkles, lion's wrinkles and crow's feet wrinkles, which are caused by the action of the subcutaneous muscles on the face responsible for expression. The principle of botulinum toxin is to block muscle contraction in order to smooth the skin of the face but also the neck and nape. It is a product that can go deep enough in each wrinkle to act on the underlying muscle by relaxing it.
The effect of Botox takes a few days to set in. It takes a maximum of 2 weeks to see the results: expression lines are reduced, the face looks younger without changing the facial expression. The action of Botox is 6 months on average but it is recommended to repeat the injections every 4 months during the first year of treatment. In some cases, the duration of action is longer. Over time, the facial muscles relax, the patient loses the habit of facial expressions that caused the appearance of wrinkles, and the injections can be spaced.
Hyaluronic acid is preferred by aesthetic surgeons, especially when it comes to treating structural wrinkles, which are mainly located in the lower part of the face. In this part of the face, it is essential to keep expressions such as smiling and those related to speech. Like botulinum toxin, hyaluronic acid is injected into the parts to be treated. However, the product fills in wrinkles, without reaching the underlying muscles.
The effect of hyaluronic acid is immediate. The result can therefore be assessed directly. The action of hyaluronic acid is on average for a period of 10 months. Sometimes, the duration of action is longer and can be up to 14 months depending on the injection sites and the patient's metabolism.
What is the difference between botulinum toxin and hyaluronic acid?
Botox and hyaluronic acid are two complementary treatments. Hyaluronic acid is the treatment of the symptom, i. e. the wrinkle, and its injection allows the filling of this wrinkle. Botox is the treatment for the cause of this symptom. This second product is injected deeper into the muscle, thus avoiding the appearance of this wrinkle or causing its attenuation. This is why it is not uncommon for botulinum toxin and hyaluronic acid to be used together depending on the area of the face to be treated, for a natural result. Over time, filling injections can be spaced, hence the importance of using these techniques in prevention, before wrinkles are actually installed, and thus delaying surgery.
Who can give these injections?
The injection of hyaluronic acid and botox has been practiced for many years, it is common and safe. However, it requires a precise knowledge of the anatomy of the face. It is a strictly medical procedure that must be performed by a specialist. Plastic surgeons are of course authorised to practice Botox and hyaluronic acid injections as well as dermatologists, and doctors who have acquired a particular competence in aesthetic medicine.
Before deciding to have these treatments performed, make sure that the practitioner you are talking to is qualified.
If you would like the advice of a beauty specialist, we invite you to make an appointment now for a consultation with your Anti-Aging Medicine professional.
| 2019-04-20T21:13:33 |
http://www.vdbroeck.com/blog/are-you-against-facial-wrinkles-injection-of-botulinum-toxin-or-hyaluronic-acid
|
0.999958 |
This one-bedroom serviced apartment is 48 sq.m and can sleep 3 people maximum. It has 1 Queen size bed and one extra bed for one extra person. The apartment has 1 bathroom. The minimum length of stay for this apartment is 1 Night.
| 2019-04-26T14:01:21 |
http://www.moveandstay.com/sydney-1-bedroom-serviced-apartments-48-sqm-2616-25761.php
|
0.969964 |
Given the nihilist mood in German art after the war, it was only a matter of time before one group trumped all the others and called itself "Zero". The moment came in 1957, courtesy of a pair of young Düsseldorf artists, Heinz Mack and Otto Piene, who had studied together at the city's famous Kunstakademie. Piene, who has died in Berlin at the age of 86, would become the best known of Zero's creators. (Mack and another leading member, Günther Uecker, are still alive.) He was also the one who explained the group's choice of name. Zero, he said, was the last number in the countdown before a rocket takes off.
This was probably the most coherent explanation the movement ever gave of itself, otherwise living up to its reductivist handle by producing no formal manifesto or written philosophy. That did not check its rapid ascent. The group's dogged refusal to lay down laws soon found it friends in postwar Germany, then in the rest of Europe and Japan and, after a show in Washington in 1964, in the US.
By the time it ceased formally to exist – if it ever had – in 1966, Zero had become one of the most influential movements in modern art. A 2006 exhibition of its loosely allied members, at the Museum der Moderne in Salzburg, brought together such disparate names as Jean Tinguely, Yves Klein, Lucio Fontana and Antoni Tàpies. The only obvious qualities shared by these artists were a more-or-less poetic existentialism and a dislike of being told what to do. There were good reasons why a combination of these should have emanated from Germany. If zero immediately precedes lift-off, then it also described the starting-point for German art after 1945. Given the country's recent past, there could be no looking back to a national tradition, or to anything that smacked of it. Instead, Piene and his fellow Zeroists worked in increments of gentleness and reticence.
While adherents of Art Informel and fellow-travellers such as Cobra went in for livid palettes, large gestures and bigger personalities, Piene developed his Grid Pictures – quiet, stencilled paintings in which muted points of colour shone through half-tone screens. These were first shown, as with all early Zero works, in the artist's Düsseldorf studio, in a series of one-day exhibitions attended by almost no one. If the Grid Pictures had appeared self-effacing, Piene's work soon became more evanescent. Where these first Zero pictures had seemed to play with light, his next ones actually did: the Lichtballette (light-ballet) works shone beams from moving torches through grids, introducing a kinetic element to Piene's art.
In the late 1960s, Piene took a job at the University of Pennsylvania and was experimenting with a new kind of work to which, in 1969, he would give the name "sky art". Best remembered for Olympic Rainbow – five spot-lit, 600-metre-long helium balloons, which hovered over Munich to mark the 1972 Olympics – sky art summed up its maker's genius for turning local swords into ploughshares. Where Albert Speer had erected a National Socialist "cathedral of light" over nearby Nuremberg using searchlight beams, Piene now used those same beams to defuse the nationalism of the Olympic Games in a work that suggested nature, tolerance and collaboration; hope after a storm.
Olympic Rainbow also had autobiographical echoes for its maker. Born in the small Westphalian hill village of Laasphe (now Bad Laasphe), Piene spent his childhood in the country town of Lübbecke nearby. From here, like other German boys of his generation, he was drafted as a Kindersoldat, or child soldier, into the Hitler Youth. He had spent the years from 1943 to 1945 watching out for the tiny spots of light in the sky that would presage enemy air attack. It was during the two subsequent years he spent in a British internment camp, from the ages of 17 to 19, that Piene began to paint, using a watercolour box and such paper as he could find. From there, in 1948, he won a place at the Fine Arts Academy in Munich, in the shadow of Olympic Rainbow, before moving on to study in Düsseldorf in 1950.
Piene's pacifist interests chimed with proto-new age interests, and in 1972 he was appointed professor of environmental art at the Massachusetts Institute of Technology's famed Centre for Advanced Visual Studies. In 1974, he took over as its director, a post he was to hold for 20 years. In 1977, at the Documenta quintennial in Kassel, Germany, Piene oversaw the Centerbeam project – a vast collaborative work that brought together a 45-metre water prism, laser projections and holograms choreographed by a small army of scientists and 22 artists. One of these last was Piene's wife, the American artist and poet Elizabeth Goldring, with whom he would spend the remainder of his life on a farm in Groton, Massachusetts.
For all Piene's rugged self-effacement, honours inevitably came to him: an emeritus professorship at MIT and an honorary doctorate from the University of Maryland; the Leonardo da Vinci prize; a 1996 award from the American Academy of Arts and Letters. He died back home in Germany, between giving the opening talk at a retrospective of his sky art work, More Sky, at the Neue Nationalgalerie in Berlin and the launch of a new sky art event over the city. (The show will run to 31 August.) "Light is my medium," Piene said. "Previously, paintings and sculptures seemed to glow. Now they do."
He is survived by Elizabeth, their four children and a stepdaughter, and four grandchildren.
| 2019-04-25T22:02:57 |
https://www.theguardian.com/artanddesign/2014/jul/24/otto-piene
|
0.999665 |
How much tv is ok?
Actually the whole premise of Blue's Clues, which was ground breaking when it first came out (I miss Steve ), was that by watching the same episode all week long it built skills and confidence in whatever lesson it was teaching by repetition. I don't think there's anything wrong with them, like you said it's like the favorite story book being read over and over.
True. Repetition is great for kids. That's how they learn. There may be a potential problem with the medium though.
A recent study by Children's Hospital in Seattle, led by Dimitri Christakis, M.D., an associate professor of pediatrics at the University of Washington and co-director of the school's Institute for Child Health, seemed to show there to be a very clear correlation between hours of TV watched between the ages of 1 and 3.
Unfortunately, there are a couple of problems with this study. The study was based on parents’ recollection of their children’s television viewing habits and this kind of after-the-fact research is often inaccurate. The study also did not actually test the children for clinical attention deficit disorders, nor for any predisposition for that. Additionally, they did not seem to take into consideration the programming being viewed. I feel this is critical.
That last point is something that I have some question about. It has to do with what we know about how the brain develops. The brain is still in development during early childhood and it ‘tunes’ itself to the environment. The problem I have with a lot of television, including many that are created and marketed to children, is how rapidly the scenes change. My hypothesis is that this can cause the brain to tune itself to a world where things are changing at that rapid pace and, when the world turns out not to work that way, can lead to the person feeling impatient and becoming easily distracted.
I took a stop watch and watched some kids’ television and started timing the scenes. Blues Clues and Mr. Rogers were the best by far where they hardly every cut between scenes but instead ‘walk’ to the next set. Most other programs where constantly cutting between scenes and camera angles. Watching these later shows at all, and certainly in repetition, I see as a cause for concern.
I suspect that this could ultimately be the main problem. If television is to be marketed as having been created for children, it should be safe for children. Toys are tested for safety, why not television?
how bout never. is never good for you?
Nope. Personaly, I think television can be a great learning tool. We just need to take some responisibility in it's use. With the amount of money that goes into the production of children's television, I think some of that should be put into designing the programming to be safe for young minds.
actually i read that France banned TV shows aimed at children under 3 years old, to shield them from developmental risks. thought that was interesting!
Last edited by famlife; 08-31-2008 at 02:24 PM..
Exactly! I think its kinda too bad sometimes when parents say "tv is bad, no tv in our house!" because they're generalizing and missing out on a lot of good too. It's like having no internet because there's so much negetive on the internet. Ya there is but there is also a lot of positive. It's called being a responsible parent.
| 2019-04-22T06:37:24 |
http://www.city-data.com/forum/parenting/96712-how-much-tv-ok-3.html
|
0.998217 |
Chalk up another victory for Roger Goodell.
The NFL Commissioner won his most recent battle with Cowboys owner Jerry Jones, who was determined on Wednesday to reimburse the NFL more than $2 million in legal fees stemming from his role in the Ezekiel Elliott legal battle and Goodell's contract negotiations, per ESPN's Adam Schefter.
"After a hearing with the Commissioner and the Finance Committee, the matter of the reimbursement of legal fees has been resolved to the satisfaction of all parties," the NFL said in a statement.
Jones appeared before Goodell at a hearing on Monday in Palm Beach, Fla., to dispute the reimbursements.
Goodell cited Resolution FC-6 of the NFL constitution that states the commissioner can seek reimbursement if a team "initiates, joins, has a direct, football-related financial interest in, or offers substance assistance to any lawsuit or other legal, regulatory or administrative proceeding against the league."
Elliott was suspended six games for an alleged domestic violence incident, but Jones vocally defended his running back throughout the appeals process before the NFL ultimately won. Jones and the Cowboys stated that they were merely "observers" throughout despite Jones' outspokenness.
Jones also hired an attorney and threatened to sue the owners of the league's compensation committee over Goodell's contract extension.
He never followed through with the suit but it resulted in the exchange of several letters between Jones' attorney and those representing the owners of the compensation committee.
| 2019-04-22T20:03:03 |
https://www.aol.com/article/news/2018/03/07/roger-goodell-wins-legal-battle-with-cowboys-owner-jerry-jones/23380069/
|
0.999693 |
This case study is about the development of a new website for the Royal Pavilion & Museums, Brighton & Hove (RPM). As a local authority museum service, this was the first time they were permitted to develop a website dedicated to RPM. Preliminary work began on the website in 2013, and the site went live in early 2015.
What was the issue? | What did we do? | What happened? | What did we learn? | What one piece of advice would I give to other organisations?
RPM had been managing a website independently from the Council since around 2000, but this was shared with the local library service. The previous version of the website had launched in 2009 and suffered from a wide range of problems.
The old site was built with Sharepoint, a platform that is primarily designed for document management and use as an intranet (a private network often used as a means of sharing information within an organisation). It provided very little flexibility, and even minor changes required expensive support from the developer. It had also been designed for desktop screens, and was almost unreadable on a mobile phone. By 2014 about 40% of our website visitors were using a smartphone or tablet, and it was clear that mobile use would grow rapidly.
The site was also compromised by the shared presence of museums and libraries. While the two services may have been part of the same local authority department, their audiences are very different. It also led to some people believing that RPM did not even have a website. On a couple of occasions I spoke to people who had used the website but were convinced that they had been using the main Council website rather than one managed by the museum.
Both of these problems were relatively easy to solve once we had the required agreements in place. By the time we came to start the redevelopment, we had permission from the Council to create our own dedicated website, and we were committed to using an open source platform (a platform usually developed as a public collaboration and made freely available to access and use, making updates easier and cheaper) with a design template that would work with mobile devices.
But there was another, trickier problem we needed to solve. We knew that the site was not working for our users from the frequent complaints we received from the public and staff, and we were committed to making the new site more user friendly. Yet it is easier to say this than to do it. While reading through the notes from the previous redevelopment project, I was struck by the fact that this had also started out with a firm ambition to make the site work for its users. So why had this gone wrong? And how could we avoid making the same mistakes again?
Our first step, before we even thought about the technology or speaking to a developer, was to do some research. Here we had an advantage over our predecessors, as we had a lot more data to hand than the team that had developed the 2009 version of the website.
Most of this data came from Google Analytics, which we had been using since 2011. We used this data to answer a simple initial question: what are people doing on the site? The analytics data gave us a good indication of what areas of the site people were using, and what parts of the navigation were working well against those that were seldom used. It was also a good opportunity to take stock of our online visitors, such as where in the world our users were coming from, and which collections pages received the most views.
One observation from the data proved particularly startling: over 50% of the page views across the whole site took place on just 11 pages. While that fact won’t be particularly surprising to anyone who has managed a website, it was a helpful starting point for persuading colleagues that some information, particularly pre-visit information, was clearly more important than others.
However, as useful as the Google Analytics data was, it only told part of the story. What people were doing on the website was obviously shaped by current constraints. What if users were trying to find content or do things that the site wouldn’t allow them to do?
This led to a second research question: what motivates our visitors? Here we built on Phase 2 of Culture 24’s Let’s Get Real action research programme. As a partner in this project, we conducted a survey of users visiting the website, asking why they had come to the site.
The one startling find from this survey was that people coming to the website saw us as a collection of buildings, confirming a pattern we could see in the Google Analytics data. This was partly shown by the high number of users who came for pre-visit information, but even those who were researching for professional or personal interest were more likely to be focused on our buildings than our services. This was in marked contrast to the website, which prioritised RPM as a collection of services, such as venue hire or learning, over the buildings.
I wanted to expand our understanding of motivations by using some form of visitor profiling, particularly in terms of understanding the needs of those looking for pre-visit information. The visitor profiles we had to hand were demographically based, focusing on characteristics such as age, gender, and socio-economic measures. Such demographic profiles are not always useful for understanding behaviours, and are particularly ill-suited to understanding online behaviours, as web analytics reveal (quite rightly) very little about these characteristics.
Without the resources or expertise to develop our own profiling, I turned to the work of John Falk, an American academic. In his Identity and the Museum Visitor Experience (2009), Falk describes a set of behavioural profiles based on individual needs that are derived from a fairly fluid sense of identity. You can find a good summary of Falk’s ideas here, but for me the key idea was that the visitor journey starts long before they arrive at the door of the museum. The motivation for the visit is quite likely to be rooted in needs that have little to do with what’s in the museum (eg needing to entertain a visiting mother in law on a rainy afternoon) and our website should be shaped according to these broader needs (eg emphasising the catering facilities).
This in turn opened up an internal conversation about our use of language. For example, museum professionals typically talk about ‘objects’ yet the public are much more likely to talk about ‘exhibits’. That seemed deeply counter-intuitive to many of my colleagues, but was easily demonstrated through a search on Google Trends.
Once the research phase was complete, we appointed a developer, using our research as part of the invitation to tender documentation. I was keen that any developer who worked with us should respond to our research rather than presenting their own solutions based on questionable assumptions.
Once the developer was appointed, the website had to be built entirely from scratch. It took about nine months to develop from appointment to launch. In addition to the developer and RPM staff, our Access Advisory Group played a critical role in testing during development.
The new site solved many of the old problems at a stroke. Built in WordPress, it is now much easier and cheaper to maintain. WordPress is so easy to use and well-supported that many problems and enhancements can be dealt with in-house rather than relying on developer time. It also uses a responsive design template, so that it now works more comfortably on mobile phone screens.
The site was also shaped around our various museums, giving each venue the space to express its unique offer, and address its audiences’ particular needs.
In terms of measurable success, the results have exceeded our expectations. Visitor numbers to the website had flatlined in the last couple of years before redevelopment, but they have grown by over a quarter in the last three years. Of course, overall visitor numbers depend on a variety of factors, so a more reliable sign of success is depth of engagement with the site. Users are spending more time on the site and engaging with more content: page views are up by a whopping 41%.
One of the more surprising effects of the relaunch was a huge increase in the social sharing of web pages: Facebook and Twitter traffic to the website more than doubled on launch and has more or less stayed at that level ever since — something that has very little to do with our own activity on those channels.
This success has also been reflected in real world measures: online ticket sales have increased enormously, and surveys of visitors in our buildings show much more recognition of the website as part of their pre-visit experience.
Understanding user needs requires research and hard data. Without that it is very easy to be steered by unconscious biases: if you work in a museum you will tend to see it as a series of operations of contested importance; someone from outside is more likely to see it as a building or an attraction with an occasional role to play in their lives.
The move to WordPress has also liberated how we use the site. The ease of use and ready availability of online advice and plug-ins, means that we can develop and experiment with the site with minimal IT or developer support. Even when we don’t have the time to make measured, planned developments we can still make rapid, testable changes.
Of course, the website is far from perfect, and this culture of thinking iteratively about the site continues. We are currently looking at a major refresh of the website in about 2020, and amongst the areas we are considering improving are news content, event information, and further streamlining the mobile experience.
What one piece of advice would I give to other organisations?
Question your assumptions, and be prepared to upset colleagues. Everyone who works in a museum feels that their area of work is important, and needs to be prominent in the site navigation. But if people are not looking for that information, a link on every page of the site will not change that.
It’s important to people able to show colleagues how users use the site, and show them that making content optimised for search engines is often far more important than where that content sits in the site navigation.
| 2019-04-22T14:06:15 |
http://digitalpathways.weareculture24.org.uk/case-study-developing-a-new-museum-website/
|
0.998962 |
Why is it important that wealth should be distributed evenly?
Wealth should be distributed evenly amongst people as some people do not have the essentials such as food, water and shelter and are striving to survive. Within society, a standard family living in a home would have a microwave, two flat screen televisions, laptops, and iPhone per family member and even an iPod. Each member of the family would have their own bed with a soft mattress, pillow and blanket. Celebrities live in massive house containing more than 5 bedrooms when there is only one person living in the house. They live in luxury, wear expensive clothing and own maybe more than one expensive car. Do they, do we need all these expensive materialistic goods? No. There are people suffering with diseases, there are people starving and are suffering from malnutrition, there are people living on the streets begging for money and looking for shelter and there are people dying because they are unable to be treated with medicine or book an appointment at the doctors. If wealth was distributed evenly there wouldn't people dying or suffering as they would receive medication, there wouldn't be people looking for food, water or shelter as they would be able to afford a place to live and the world would be a better place.
Mother Teresa wasn’t a wealthy woman but she did everything she could to try distribute things evenly. Her main goal of distributing things was not money, but it was love.
Although having a disease and others not wanting to be around you because you could be contagious, the last thing a person would want is their family to not be around them to look after, love and take care of them. Knowing that there is no-one there for who truly loves you to take care of you is heartbreaking. By Mother Teresa distributing her love towards other people, she gave a glimpse of happiness and hope to those who were unwanted and were dying that there was people such as herself who were willing to share their love. She put her life at risk to show her love such as caring, providing food and shelter to the ‘untouchables’. This had shown her true dedication of helping others and was well known to be a kind, caring, compassionate woman.
| 2019-04-18T20:55:31 |
http://2breligionalexis.weebly.com/why-wealth-should-be-distributed-evenly.html
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.